IOT and Applications for GTU University (VIII- CSE/IT-2180709)

1,530 100 10MB

English Pages 178 Year 2020

Report DMCA / Copyright

DOWNLOAD FILE

Polecaj historie

IOT and Applications for GTU University (VIII- CSE/IT-2180709)

Citation preview

SUBJECT CODE

: 2180709

As per New Syllabus of

Gujarat Technological University Semester - VIII (CE / CSE / IT) Elective - III

IoT & Applications Iresh A. Dhotre M.E. (Information Technology), Ex-Faculty, Sinhgad College of Engineering. Pune.

TECHNICAL

®

PUBLICATIONS SINCE 1993

An Up-Thrust for Knowledge

(i)

IoT & Applications Subject Code : 2180709

Semester - VIII (Computer Engineering / Computer Science & Engineering / Information Technology) Elective - III

First Edition : February 2017 Second Revised Edition : January 2018 Third Revised Edition : January 2019 Fourth Revised Edition : January 2020

ã Copyright with Author All publishing rights (printed and ebook version) reserved with Technical Publications. No part of this book should be reproduced in any form, Electronic, Mechanical, Photocopy or any information storage and retrieval system without prior permission in writing, from Technical Publications, Pune.

Published by : ®

TECHNICAL

PUBLICATIONS SINCE 1993

An Up-Thrust for Knowledge

Amit Residency, Office No.1, 412, Shaniwar Peth, Pune - 411030, M.S. INDIA P h . : + 9 1 - 0 2 0 - 2 4 4 9 5 4 9 6 / 9 7 , Te l e f a x : + 9 1 - 0 2 0 - 2 4 4 9 5 4 9 7 Email : [email protected] Website : www.technicalpublications.org

ISBN 978-93-332-1492-6

9 789333 214926

9789333214926 [4]

Course 13

(ii)

Table of Contents Chapter - 1 IoT and Web Technology (1 - 1) to (1 - 44) 1.1 The Internet of Things Today ............................................................................ 1 - 2 1.1.1 Component of IoT ............................................................................................... 1 - 4 1.1.2 Advantages and Disadvantages of IoT ................................................................ 1 - 6 1.1.3 Application of IoT ................................................................................................ 1 - 7

1.2 1.3 1.4 1.5

Time for Convergence ....................................................................................... 1 - 8 Towards the IoT Universe ................................................................................. 1 - 9 Internet of Things Vision ................................................................................... 1 - 9 IoT Strategic Research and Innovation Directions .......................................... 1 - 13 1.5.1 Applications and Scenarios of Relevance .......................................................... 1 - 15 1.5.2 IoT Functional View ......................................................................................... 1 - 18

1.6 Application Areas ............................................................................................ 1 - 18 1.6.1 Smart Cities...................................................................................................... 1 - 19 1.6.2 Smart Energy and the Smart Grid .................................................................... 1 - 21 1.6.3 Smart Transportation and Mobility.................................................................. 1 - 22 1.6.4 Smart Factory and Smart Manufacturing......................................................... 1 - 23 1.6.5 Smart Health ................................................................................................... 1 - 24 1.6.6 Food and Water Tracking and Security ............................................................. 1 - 25 1.6.7 Participatory Sensing ........................................................................................ 1 - 26 1.6.8 Social Networks and IoT .................................................................................... 1 - 26

1.7 Future Internet Technologies ......................................................................... 1 - 27 1.7.1 Cloud Computing............................................................................................... 1 - 27 1.7.2 IoT and Semantic Technologies......................................................................... 1 - 28 1.7.3 Autonomy.......................................................................................................... 1 - 29

1.8 Infrastructure ................................................................................................. 1 - 31 1.9 Networks and Communication ...................................................................... 1 - 32 1.10 Processes........................................................................................................ 1 - 34 1.11 Data Management ......................................................................................... 1 - 34 1.12 Security, Privacy and Trust ............................................................................. 1 - 40 1.13 Device Level Energy Issues ............................................................................. 1 - 41 1.14 IoT Related Standardization .......................................................................... 1 - 42 (v)

Chapter - 2 M2M to IoT (2 - 1) to (2 - 24) 2.1 Introduction of M2M Basic Perspective .......................................................... 2 - 2 2.1.1 Architecture and Components of M2M ............................................................ 2 - 3 2.1.2 Key Application Area ......................................................................................... 2 - 5 2.1.3 Comparison of M2M and IoT ............................................................................ 2 - 6

2.2 2.3 2.4 2.5

Some Definition ................................................................................................ 2 - 6 M2M Value Chains ............................................................................................ 2 - 9 IoT Value Chains.............................................................................................. 2 - 10 An Emerging Industrial Structure for IoT ........................................................ 2 - 12 2.5.1 Information-Driven Global Value Chain .......................................................... 2 - 13

2.6 The International Driven Global Value Chain and Global Information Monopolies ..................................................................... 2 - 17 2.7 M2M to IoT an Architectural Overview .......................................................... 2 - 18 2.7.1 Building Architecture ....................................................................................... 2 - 18

2.8 Main Design Principles and Needed Capabilities........................................... 2 - 19 2.9 An IoT Architecture Outline ........................................................................... 2 - 22 2.10 Standards Considerations .............................................................................. 2 - 24 Chapter - 3 IoT Reference Architecture (3 - 1) to (3 - 32) 3.1 State of the Art ................................................................................................. 3 - 2 3.1.1 European Telecommunications Standards Institute M2M/oneM2M ............... 3 - 2 3.1.2 International Telecommunication Union-Telecommunication Sector View ..... 3 - 9 3.1.3 Open Geospatial Consortium Architecture ..................................................... 3 - 11 3.1.4 The International Telecommunication Union’s Telecommunication Standardization .......................................................................................................... 3 - 13

3.2 Architecture Reference Model ....................................................................... 3 - 14 3.2.1 Reference Model and Architecture ................................................................. 3 - 14

3.3 IoT Reference Model ...................................................................................... 3 - 16 3.3.1 3.3.2 3.3.3 3.3.4 3.3.5

IoT Domain Model ........................................................................................... 3 - 16 Information Model .......................................................................................... 3 - 19 Functional Model............................................................................................. 3 - 20 Communication Model .................................................................................... 3 - 22 IoT Security Model........................................................................................... 3 - 23

3.4 IoT Reference Architecture ............................................................................. 3 - 24 3.4.1 3.4.2 3.4.3 3.4.4

Introduction ..................................................................................................... 3 - 25 Functional View ............................................................................................... 3 - 26 Information View ............................................................................................. 3 - 29 Deployment and Operational View .................................................................3 – 32 (vi)

Chapter - 4 IoT Applications for Value Creations (4 - 1) to (4 - 24) 4.1 Introduction ...................................................................................................... 4 - 2 4.2 IoT Applications for Industry............................................................................. 4 - 2 4.2.1 Future Factory Concept ..................................................................................... 4 - 6

4.3 Brownfield IoT ................................................................................................. 4 - 10 4.4 Smart Objects and Smart Applications ........................................................... 4 - 11 4.5 Four Aspects in your Business to Master IoT.................................................. 4 - 13 4.6 Value Creation from Big Data and Serialization ............................................. 4 - 15 4.7 IoT for Retailing Industry ................................................................................ 4 - 20 4.8 IoT for Oil and Gas Industry ............................................................................ 4 - 21 4.9 Opinions on IoT Application and Value for Industry....................................... 4 - 22 4.10 eHealth ........................................................................................................... 4 - 22 Chapter - 5 Internet of Things Privacy, Security and Governance (5 - 1) to (5 - 16) 5.1 Introduction ...................................................................................................... 5 - 2 5.2 Overview of Governance, Privacy and Security Issues ..................................... 5 - 2 5.3 Contribution from FP7 Projects ........................................................................ 5 - 3 5.3.1 5.3.2 5.3.3 5.3.4

FP7 iCore Access Framework............................................................................. 5 - 3 IoT@Work Capability Based Access Control System ......................................... 5 - 4 GAMBAS Adaptive Middleware ......................................................................... 5 - 6 Governance, Security and Privacy in the Butler Project .................................... 5 - 8

5.4 Security, Privacy and Trust in IoT-Data-Platforms for Smart Cities .................. 5 - 9 5.5 Data Aggregation for the IoT in Smart Cities .................................................. 5 - 11 5.5.1 First Steps Towards a Secure Platform ............................................................ 5 - 11 5.5.2 SMARTIE Approach .......................................................................................... 5 - 13 5.5.2.1 Smart Transportation ........................................................................................ 5 - 14 5.5.2.2 Smart Cities in India : An Overview .................................................................. 5 – 14

(vii)

(viii)

IoT and Web Technology

Chapter - 1

IOT AND WEB TECHNOLOGY Syllabus : The Internet of Things Today, Time for Convergence, Towards the IoT Universe, Internet of Things Vision, IoT Strategic Research and Innovation Directions, IoT Applications, Future Internet Technologies, Infrastructure, Networks and Communication, Processes, Data Management, Security, Privacy and Trust, Device Level Energy Issues, IoT Related Standardization, Recommendations on Research Topics. Section No.

Topic Name

Page No.

1.1

The Internet of Things Today

1-2

1.2

Time for Convergence

1-8

1.3

Towards the IoT Universe

1-9

1.4

Internet of Things Vision

1-9

1.5

IoT Strategic Research and Innovation Directions

1 - 13

1.6

Application Areas

1 - 18

1.7

Future Internet Technologies

1 - 27

1.8

Infrastructure

1 - 31

1.9

Networks and Communication

1 - 32

1.10

Processes

1 - 34

1.11

Data Management

1 - 34

1.12

Security, Privacy and Trust

1 - 40

1.13

Device Level Energy Issues

1 - 41

1.14

IoT Related Standardization

1 - 42

1-1

IoT and Applications

IoT and Web Technology

1.1 The Internet of Things Today 

The Internet of Things (IoT) is the network of physical objects i.e. devices, vehicles, buildings and other items embedded with electronics, software, sensors, and network connectivity that enables these objects to collect and exchange data.



Wikipedia definition : The Internet of Things, also called The Internet of Objects, refers to a wireless network between objects, usually the network will be wireless and selfconfiguring, such as household appliances.



WSIS 2005 Definition : By embedding short-range mobile transceivers into a wide array of additional gadgets and everyday items, enabling new forms of communication between people and things, and between things



A phenomenon which connects a variety of things. Everything that has the ability to communicate.



The Internet of Things is the intelligent connectivity of physical devices driving massive gains in efficiency, business growth, and quality of life. Fig. 1.1.1 shows IoT ecosystem.



The Internet of Things refers to the capability of everyday devices to connect to other devices and people through the existing Internet infrastructure. Devices connect and communicate in many ways. Examples of this are smart phones that interact with other smart phones, vehicle-to-vehicle communication, connected video cameras, and connected medical devices. They are able to communicate with consumers, collect and transmit data to companies, and compile large amounts of data for third parties.

1-2

IoT and Applications

IoT and Web Technology

Fig. 1.1.1



IoT data differs from traditional computing. The data can be small in size and frequent in transmission. The number of devices, or nodes, that are connecting to the network are also greater in IoT than in traditional PC computing.



Machine-to-Machine communications and intelligence drawn from the devices and the network will allow businesses to automate certain basic tasks without depending on central or cloud based applications and services.



IoT impacts every business. Mobile and the Internet of Things will change the types of devices that connect into a company’s systems. These newly connected devices will produce new types of data. The Internet of Things will help a business gain efficiencies, harness intelligence from a wide range of equipment, improve operations and increase customer satisfaction.



Ubiquitous computing, pervasive computing, Internet Protocol, sensing technologies, communication technologies, and embedded devices are merged together in order to form a system where the real and digital worlds meet and are continuously in symbiotic interaction.



The smart object is the building block of the IoT vision. By putting intelligence into everyday objects, they are turned into smart objects able not only to collect information from the environment and interact /control the physical world, but also to be interconnected, to each other, through Internet to exchange data and information.



The expected huge number of interconnected devices and the significant amount of available data open new opportunities to create services that will bring tangible benefits 1-3

IoT and Applications

IoT and Web Technology

to the society, environment, economy and individual citizens. In this paper we present the key features and the driver technologies of IoT. In addition to identifying the application scenarios and the correspondent potential applications, we focus on research challenges and open issues to be faced for the IoT realization in the real world. 

However, the IoT is still maturing, in particular due to a number of factors, which limit the full exploitation of the IoT. Some of the factors are listed below : 1.

There is no unique identification number system for object in the world.

2.

IoT uses Architecture Reference Model (ARM) but there is no further development in ARM.

3.

Missing large-scale testing and learning environments

4.

Difficulties in exchanging of sensor information in heterogeneous environments.

5.

Difficulties in developing business which embraces the full support of the Internet of Things.

Characteristics of the Internet of Things

1.

Interconnectivity :

Everything can be connected to the global information and

communication infrastructure. 2.

Heterogeneity : Devices within IoT have different hardware and use different networks but they can still interact with other devices through different networks.

3.

Things-related services : Provides things-related services within the constraints of things, such as privacy and semantic consistency between physical and virtual thing.

4.

Dynamic changes : The state of a device can change dynamically.

1.1.1 Component of IoT 

The hardware utilized in IoT systems includes devices for a remote dashboard, devices for control, servers, a routing or bridge device, and sensors. These devices manage key tasks and functions such as system activation, action specifications, security, communication, and detection to support-specific goals and actions.



Major components of IoT devices are as follows: 1.

Control units : A small computer on a single integrated circuit containing processor core, memory and a programmable I/O peripheral. It is responsible for the main operation.

1-4

IoT and Applications

IoT and Web Technology

2.

Sensor : Devices that can measure a physical quantity and convert it into a signal, which can be read and interpreted by the microcontroller unit. These devices consist of energy modules, power management modules, RF modules, and sensing modules. Most sensors fall into 2 categories: Digital or analog. An analog data is converted to digital value that can be transmitted to the Internet. a. Temperature sensors : accelerometers b. Image sensors: gyroscopes c. Light sensors : acoustic sensors d. Micro flow sensors : humidity sensors e. Gas RFID sensors : pressure sensors

3.

Communication modules : These are the part of devices and responsible for communication with rest of IoT platform. They provide connectivity according to wireless or wired communication protocol they are designed. The communication between IoT devices and the Internet is performed in two ways: A) There is an Internet-enable intermediate node acting as a gateway; B) The IoT Device has direct communication with the Internet.



The communication between the main control unit and the communication module uses serial protocol in most cases. 4.



Power sources : In small devices the current is usually produced by sources like batteries, thermocouples and solar cells. Mobile devices are mostly powered by lightweight batteries that can be recharged for longer life duration.

Communication Technology and Protocol : IoT primarily exploits standard protocols and networking technologies. However, the major enabling technologies and protocols of IoT are RFID, NFC, low-energy Bluetooth, low-energy wireless, low-energy radio protocols, LTE-A, and WiFi-Direct. These technologies support the specific networking functionality needed in an IoT system in contrast to a standard uniform network of common systems.

Working :

1.

Collect and transmit data : The device can sense the environment and collect information related to it and transmit it to a different device or to the Internet.

2.

Actuate device based on triggers : It can be programmed to actuate other devices based on conditions set by user.

3.

Receive information : Device can also receive information from the network.

1-5

IoT and Applications

IoT and Web Technology

4. 

Communication assistance : It provides communication between two devices of same network or different network.

Fig. 1.1.2 shows working of IoT.

Fig. 1.1.2 : Working of IoT



Sensors for various applications are used in different IoT devices as per different applications such as temperature, power, humidity, proximity, force etc.



Gateway takes care of various wireless standard interfaces and hence one gateway can handle multiple techologies and multiple sensors. The typical wireless technologies used widely are 6LoWPAN, Zigbee, Zwave, RFID, NFC etc. Gateway interfaces with cloud using backbone wireless or wired technologies such as WiFi, Mobile , DSL or Fibre.

1.1.2 Advantages and Disadvantages of IoT Advantages of IoT

1.

Improved customer engagement and communication.

2.

Support for technology optimization

1-6

IoT and Applications

IoT and Web Technology

3.

Support wide range of data collection

4.

Reduced waste

Disadvantages of IoT

1.

Loss of privacy and security : As all the household appliances, industrial machinery, public sector services like water supply and transport, and many other devices all are connected to the Internet, a lot of information is available on it. This information is prone to attack by hackers.

2

Flexibility :

Many are concerned about the flexibility of an IoT system to

integrate easily with another 3.

Complexity : The IoT is a diverse and complex network. Any failure or bugs in the software or hardware will have serious consequences. Even power failure can cause a lot of inconvenience.

4.

Compatibility : Currently, there is no international standard of compatibility for the tagging and monitoring equipment

5.

Save time and money

1.1.3 Application of IoT 1.

Home : Buildings where people live. It controls home and security systems.

2.

Offices : Energy management and security in office buildings; improved productivity, including for mobile employees.

3.

Factories : Places with repetitive work routines, including hospitals and farms; operating efficiencies, optimizing equipment use and inventory.

4.

Vehicles : Vehicles including cars, trucks, ships, aircraft, and trains; conditionbased maintenance, usage-based design, pre-sales analytics

5.

Cities : Public spaces and infrastructure in urban settings; adaptive traffic control, smart meters, environmental monitoring, resource management.

6.

Worksites : It is custom production environments like mining, oil and gas, construction; operating efficiencies, predictive maintenance, health and safety.

1-7

IoT and Applications

IoT and Web Technology

Fig. 1.1.3

1.2 Time for Convergence 

Smartphone are not capable of running a multiplicity of user-driven applications and connecting various sensors and objects are missing today. They cannot work properly in heterogeneous environment.



Fig. 1.2.1 shows IoT domain and application.

Fig. 1.2.1 : Domain and application of IoT 1-8

IoT and Applications

IoT and Web Technology



Step forward to the Internet of Things are as follows : 1.

Coherence of object capabilities and behavior : Large number objects are available for sensing and actuation for information processing.

2.

Coherence of application interactivity : The applications will increase in complexity and modularization, and boundaries between applications and services will be unclear to a high degree.

3.

Coherence of corresponding technology approaches : Smart Cities, Cloud computing, Future Internet, robotics will evolve in their own way, but because of complementarily also partly merge with the Internet of Things.

4.

Coherence of real and virtual worlds : Today real and virtual worlds are perceived as two antagonistic conceptions.

1.3 Towards the IoT Universe 

IoT is simply a concept wherein machines and everyday objects are connected via the Internet. Within the IoT, devices are controlled and monitored remotely and usually wirelessly.



IDC predicts that the IoT will include 212 billion things globally by the end of 2020. 1.

Development of a consistent, interoperable and accessible IoT across sectors, including standardization.

2.

Special attention is given to some of the most important application like health, environment and energy consumption.

3.

Maintaining the Internet of Things as an important subject for national and international cooperation both for sharing best practices and development.

4.

Offers security, privacy and trust in the scope of current legislation and development of robust and future-proof general data protection rules.

5.

Providing resources like spectrum allowing pan-European service provision and removal of barriers such as roaming.

1.4 Internet of Things Vision 

Internet of Things is a concept and paradigm. It considers variety of object from the environment and communicate with wireless and wired connections with unique addressing method.



A world where the real, digital and the virtual are converging to create smart environments that make energy, transport, cities and many other areas more intelligent. 1-9

IoT and Applications

IoT and Web Technology



Main goal of the IoT is to enable things to be connected anytime, anyplace, with anything and anyone ideally using any path/network and any service. It is a new revolution of the Internet.



Using IPv6 with its abundant address spaces, globally unique object identification and connectivity can be provided in a standardized manner without additional status or address processing.



New types of applications can involve the electric vehicle and the smart house, in which appliances and services that provide notifications, security, energy-saving, automation, telecommunication, computers and entertainment are integrated into a single ecosystem with a shared user interface.



There are a number of factors powering the progression of the IoT within the digital economy, including : 1.

Powerful new mobile, wearable or connected devices.

2.

Application that fuel demand for mobile data and test the limits of the network within most industry sector.

3.

Cloud-based apps and those that rely on content stored in the cloud, which will increase as development accelerates on new Platform-as-a-Service, mobile point of sale and independent software vendor platforms.

4.

New use cases, such as mobile video, which will be significant factors in driving expensive capacity upgrades in networks.



The end goal is to have plug-n-play smart objects that can be deployed in any environment with an interoperable interconnection backbone that allows them to blend with other smart objects around them. Standardization of frequency bands and protocols plays a pivotal role in accomplishing this goal.



The use of IP to communicate with and control small devices and sensors opens the way for the convergence of large, IT-oriented networks with real time and specialized networked applications.



The idea of internet of things was developed in parallel to WSNs. The term internet of things was devised by Kevin Ashton in 1999 and refers to uniquely identifiable objects and their virtual representations in an “internet-like” structure.



These objects can be anything from large buildings, industrial plants, planes, cars, machines, any kind of goods, specific parts of a larger system to human beings, animals and plants and even specific body parts of them.

1 - 10

IoT and Applications

IoT and Web Technology



While IoT does not assume a specific communication technology, wireless communication technologies will play a major role, and in particular, WSNs will proliferate many applications and many industries. The small, rugged, inexpensive and low powered WSN sensors will bring the IoT to even the smallest objects installed in any kind of environment, at reasonable costs.



Fig. 1.4.1 shows IP convergence.



The use of IP to communicate with and control small devices and sensors opens the way for the convergence of large, IT-oriented networks with real time and specialized networked applications.



Offices and residential buildings have various control systems for heating, venting, and air conditioning ; telephone service; security; and lighting.



In just the last few years, we have moved beyond simply using our machines to connect with other people and can now program them to connect directly to one another, allowing for the collection and processing of information on an unprecedented scale.



The new connectivity of both physical infrastructure and devices is being referred to as the ‘industrial internet’, or the ‘internet of things’, while the technology that facilitates this connectivity is most commonly called ‘Machine-to-Machine’ (M2M).



By 2020, there will be 12.5 billion M2M devices globally, up from 1.3 billion devices today (Hatton 2012) to put this in perspective, mobile internet use, which is also fast becoming a part of our daily experience, is growing at only a fraction of the rate of M2M, and the 400 million mobile internet users of 2007 are predicted to grow to two billion users by 2015 (By Richmond 2011).

Fig. 1.4.1 : IP convergence 1 - 11

IoT and Applications

IoT and Web Technology



M2M applications in the energy, transportation, built environment and agriculture sectors are the most promising, each offering the potential for profitably.



Internet contains all types and sizes of devices connected. For example, smart phones, home appliances, toys, cameras, medical instruments and industrial systems, all connected, all communicating and sharing information all the time. Fig. 1.4.2 shows this communication.



The Internet of Things is a “global concept” and requires a common definition.



IoT Definition : A global infrastructure for the information society, enabling advanced services by interconnecting (physical and virtual) things based on existing and evolving interoperable information and communication technologies.

Fig. 1.4.2 : Everything in Internet



IoT Definition : A global infrastructure for the information society, enabling advanced services by interconnecting (physical and virtual) things based on existing and evolving interoperable information and communication technologies.



Several factors are driving the convergence of Information Technology and Communication Technology and, consequently, contributing to the integration and transformation of cloud, pipe, and device technologies is shown in Fig. 1.4.3.

1 - 12

IoT and Applications

IoT and Web Technology

Fig. 1.4.3 : Convergence of information technology and communication technology



In Internet of Things , wireless communication technology or systems will play a vital role and they are enabling the smart objects or “Things” to be networked. The universal assumption of wireless communication systems for exchanging data or information will create various issues in terms of availability of frequency spectrum and it will impel towards the assumption of Cognitive radio Systems.



The abilities of wireless communication system can provide and identify the operation of Internet of Things and also it will be possible to locate the smart objects or “Things” in the physical area or zone. It is important that the various operations of IoT the energy which will be spent for wireless communication and computing purpose should be very less.



The most important thing is techniques or related to energy gathering i.e. the energy should be handled with proper care while dealing with the devices which are used in IoT technology.

1.5 IoT Strategic Research and Innovation Directions 

The goal of the IoT Strategic Research Agenda (IoT-SRA) is to direct the research efforts to focus areas of identified significant value creation.

1 - 13

IoT and Applications

IoT and Web Technology



We are standing on the brink of a new ubiquitous computing and communication era, one that will radically transform our corporate, community, and personal environments.



Development of new technology like smart-phones, embedded system, cloud networking, sensors, nano-electronics, network virtualization and software are requires Internet connection all the time.



The high level expert group on key enabling technologies (KETs) presented its final report. This expert group was created with the aim to elaborate a European strategy to develop several KETs - nanotechnology, micro and nanoelectronics, advanced materials, photonics, industrial biotechnology and advanced manufacturing systems – and to allow them to be more effectively exploited by industry.



The reduction in the critical dimensions while keeping the electrical field constant, and at the same time a user obtained at a higher speed with reduction in power consumption of a digital MOS circuits.



The International Technology Roadmap for Semiconductors has highlighted in its early editions and its associated benefits in terms of performances, the traditional parameters in Moore’s Law.



Mobile data traffic will be increases rapidly. In year 2015, technological survey was conducted and it is observed that data traffic was increases and mobile operators are facing problem to provide the required bandwidth to the client and customers.



Extra frequency spectrum is not available in some countries. So proposed solutions are the seamless integration of existing Wi-Fi networks into the mobile ecosystem and also this will have a very big impact on IoT ecosystems.



It is necessary to develop a chip to integrate all processes. It is called as “multicom chip”. In a single silicon package, it is expected to cover Wi-Fi and baseband communications. The architecture of mobile devices is likely to change as well as the baseband chip will be taking control of the routing process, so the connectivity components are connected to the baseband or integrated. So there will be change in the architectural design.



Today many European projects address Internet of Things technologies, knowledge and also it has been mentioned that these topics can be heterogeneous and specialized, also there is a strong need for integration of the individual results.



In this context, the integration of knowledge has been conceptualized as the process through which some specialized cognizance situated in multiple projects across Europe is applied and assimilated.

1 - 14

IoT and Applications

IoT and Web Technology



The Agenda of Strategic Research and Innovation has been developed with the proper support of a European-led community of interrelated projects and their stakeholders with dedication to the innovation, creation, development and use of the IoT technology.

1.5.1 Applications and Scenarios of Relevance 

The IERC is bringing together EU funded projects with the aim of defining a common vision of IoT technology and addressing European research challenges. The rationale is to target the large potential for IoT-based capabilities and promote the use of the results from the existing projects to encourage the convergence of ongoing work to tackle the most important deployment issues and the transfer of research and knowledge to products and services and apply these in real IoT applications.



A smart space is deployed in an IoT-enabled computing environment, creating an infrastructure for application to construct and deliver value-added services based on cooperative activity of environment participants, either human or machines.



Fig. 1.5.1 shows IERC Vison for IoT Integrated Environment and Ecosystems.

Fig. 1.5.1 : IERC vision for IoT integrated environment and ecosystems



The final goal is to test and develop innovative and interoperable IoT solutions in areas of industrial and public interest.



Smart is the new green as defined by Frost and Sullivan and the green products and services will be replaced by smart products and services.

1 - 15

IoT and Applications

IoT and Web Technology



Smart space is an ecosystem of interacting computational objects on shared knowledge base. The key goal is seamless provision of users with information using the best available resources for all kinds of devices that the users can use in the ecosystem.



Fig.1.5.2 shows smart room.

Fig. 1.5.2 : Equipment and service environment for participants in smart room



Communication in a smart room uses a wireless LAN attached to the Internet. Participants are chairman, active speaker and spectators. Two public screens are available : 1. Agenda shows the event timetable and 2. Presentation shows material that each speaker presents.



The participants access services in the smart room using personal mobile computers . The room is equipped with sensor devices that sense the physical parameters of the environment and participant activity.



All knowledge is collected, organized, shared, and searched in a common smart space. Local services run on local computers or nearby servers.



The system accesses the external world for appropriate Internet services. Service outcome is visible online on the public screens or personalized on mobile clients.



The heterogeneity of participating devices and information sources immediately faces with the interoperability challenge. Smart room service set is formed from multiple sources of heterogeneous information and requires intensive processing, including service discovery and the provision to a particular participant or a group of them.



Personal information is essential for smart room operation, but it must support rigorous security and privacy defense mechanisms.

1 - 16

IoT and Applications

IoT and Web Technology



Examples of particular problems are the following. 1.

Integration of joining devices (e.g., personal devices) is seamless.

2.

Service management is adaptive, e.g., when some services become temporarily unavailable.

3.

Knowledge exchange is supported: one service utilizes knowledge deduced by another service, e.g., discussion of participants in the blog leads to updates in the agenda.



The smart spaces concept makes clear separation between device, service, and information level interoperability. Device interoperability covers technologies for devices to discover and network with each other. Service interoperability covers technologies for space participants to discover services and use of them.



Information interoperability covers technologies and processes for making in-formation available without a need to know interfacing methods of the entity creating or consuming the information.



A smart space is a semantic information-centric extension of the IoT-aware connection of physical and virtual objects.

Fig. 1.5.3 : IoT- smart environment and smart spaces creation



Smart environments are places where different kind of embedded devices are interconnected in order to provide their occupants intelligent services improving their comfort and convenience. These smart environments are seen to be important for the

1 - 17

IoT and Applications

IoT and Web Technology

future urban ecosystems in terms of user friendliness, quality of life, energy efficiency and sustainability 

The security challenge includes traditional issues of open distributed systems, such as key exchange and resource restrictions, and specific problems caused by the dynamicity and heterogeneity of smart spaces.



IoT applications need context-dependent and fine-grained access control. Smart space access control policies define which knowledge processors (KPs) are allowed to access which objects.



Security level of joined devices is measured. Access control ontology allows representing meta-information about the context and granularity.



The approach enables devices to share knowledge with the same security level even when these devices do not have interoperable security protocols for direct confidential communication.



Many IoT devices are of low capacity (memory, CPU, battery, etc.), and they cannot use the full scale of security capabilities that the basic HIP or other Internet protocols provide.

1.5.2 IoT Functional View 

IoT solutions contains following modules : 1.

for local IoT devices interaction.

2.

for local analysis and data processing

3.

for interaction with remote IoT devices

4.

for application specific data analysis and processing

5.

for integration of IoT-generated information into the business processes of an enterprise.



A large number of applications made available through application markets have significantly helped the success of the smart phone industry.



The development of such a huge number of smart phone applications is primarily due to involvement of the developers’ community at large.

1.6 Application Areas 

Potential applications of the IoT are numerous and diverse, permeating into practically all areas of every-day life of individuals , enterprises, and society as a whole

1 - 18

IoT and Applications

IoT and Web Technology

1.6.1 Smart Cities 

The number of urban residents is growing by nearly 60 million every year. In addition, more than 60 percent of the world’s population will be living in cities by 2050. As a result, people occupying just 2 percent of the world’s land will consume about threequarters of its resources. Moreover, more than 100 cities of 1 million people will be built in the next 10 years.



Over the past decade, the city of Amsterdam, the Netherlands, has developed a vision for collaborating, envisioning, developing, and testing numerous connected solutions that could pave the way to a smarter, greener urban environment.



Fig. 1.6.1 shows application in smart city.

Fig. 1.6.1 : Application in smart city



A number of projects were launched, beginning in 2006, as Amsterdam identified ways to improve sustainable living/working, public spaces, and mobility. Most recently, the city has been exploring the potential for a connected public lighting infrastructure. Fig. 1.6.2 shows concept of smart city.

1 - 19

IoT and Applications

IoT and Web Technology

Fig. 1.6.2 : Smart city



Innovations will aim to improve the quality of life in cities, encompassing security issues and energy resourcefulness. Smart city includes : 1.

Smarter management of city infrastructure using Big Data analytics

2.

Collaboration across multiple and disparate agencies using cloud technologies

3.

Real-time data collection, enabling quick response using mobile technologies

4.

Enhanced security : improved public safety and law enforcement, and more efficient emergency response

5.

Better city planning improved schematics, project management and delivery

6.

Networked utilities smart metering and grid management

7. 

Building developments more automation, and better management and security Research challenges for smart city IoT applications :

1.

To overcome the traditional silo based organization of the cities.

2.

Creating algorithms and schemes to describe information created by sensors in different applications to enable useful exchange of information between different city services.

3.

Mechanisms for cost efficient deployment and even more important maintenance of such installations, including energy scavenging

1 - 20

IoT and Applications

IoT and Web Technology

4.

Ensuring reliable readings from a plethora of sensors and efficient calibration of a large number of sensors deployed everywhere from lamp-posts to waste bins

5.

Development of low energy protocols and algorithms

6.

Algorithms for analysis and processing of data acquired in the city and making “sense” out of it.

7.

IoT large scale deployment and integration



With smart city applications producing continuous large data from heterogeneous sources, existing relational database technologies are inadequate to handle such huge amounts of data given the limited processing speed and the significant storage expansion cost.



To address this problem, big data processing technologies, which are based on distributed data management and parallel processing, have provided enabling platforms for data repositories, distributed processing, and interactive data visualization

1.6.2 Smart Energy and the Smart Grid 

Smart grids are an advancement of the electricity grids that are being used currently. A smart grid is an electrical grid that uses modern technology (digital or analog) to collect and communicate electricity related information of both the suppliers and consumers.



It not only enhances efficiency and reliability, but also improves the production and distribution of electricity to the consumers. The process of installing a smart grid necessarily means technical re-designing of the infrastructure at different levels. One such measure means replacing the existing electronic meters (or electromechanical meters) with smart meters, to enhance the sustainability and efficiency of the entire electrical system.



Fig. 1.6.3 shows smart grid.



It uses information technologies to improve how electricity travels from power plants to consumers and allows consumers to interact with the grid. It integrates new and improved technologies into the operation of the grid.



The smart grid will require wide, seamless, often real-time use of applications and tools that enable grid operators and managers to make decisions quickly.



Decision support and improved interfaces will enable more accurate and timely human decision making at all levels of the grid, including the consumer level, while also enabling more advanced operator training.

1 - 21

IoT and Applications

IoT and Web Technology

Fig. 1.6.3 : Smart grid



Energy storage systems are highly versatile and this is a technology that can meet the needs of various users and be utilized in diverse fields. These include power generators that use renewable energy, grid equipment like energy transmission and distribution equipment, as well as commercial facilities, factories and homes.

1.6.3 Smart Transportation and Mobility 

Cities around the world face common transport challenges – from increasing congestion, safety concerns and aging infrastructure to a lack of funding and increasing environmental impacts. Like their colleagues in city administration and government, transport officials are starting to implement "smart solutions" to address these challenges and provide improved mobility in their cities, better services for citizens and a more cost-effective transport network



Vehicle networking : Utilizing the new technologies, such as wireless communication, positioning and navigation, context awareness, to implement the connections between vehicle to vehicle, vehicle to man, vehicle to infrastructure, so that the integrated service can be provided.



The Internet of Vehicles (IoV) is an integration of three networks : an inter-vehicle network, an intra-vehicle network, and vehicular mobile Internet. 1 - 22

IoT and Applications

IoT and Web Technology



The research and development, as well as the industrial application of IoV technologies will promote the integration of automotive and information technology. The integrated information services of vehicles, vehicle safety, and economic performance will contribute to a more intelligent urban transportation system and advance social and economic development.



The IoV will have far reaching influence on the consumer vehicle market, consumer lifestyle, and even modes of behavior.



The application of IoV technology in providing information services, improving traffic efficiency, enhancing traffic safety, implementing supervision and control and other aspects will make millions of people enjoy more comfortable, convenient and safe traffic service.



Large concentrations of vehicles, e.g., in city parking facilities during business hours, can also provide the ad-hoc computational resources which will be of interest to those in the IT fields.



Complementary efforts should be made for developing and enhancing middle-ware platforms which will enable analytic and semantic processing of data coming from vehicles.

1.6.4 Smart Factory and Smart Manufacturing 

Manufacturers are increasingly adding software, sensors, and wireless connectivity to their products, providing a foundation for the Internet of Things , which IDC defines as a network of uniquely identifiable endpoints that communicate without human interaction using IP connectivity.



IoT opportunities can be split into two broad categories: supporting the process or supporting the product. For IoT-supported processes, we believe that by 2020, at least half of all corporate standard processes will have automated data acquisition and a quarter will have self-correction capabilities.



For IoT-supported products, we also expect that manufacturers will see onboard service revenue double in its share of total industry revenue by 2020 because of IoT and connected products.



Manufacturers have the opportunity to adapt processes with IoT to lower costs, optimize operations, reduce resource consumption, improve productivity, enhance customer service, and manage the supply chain. Similarly, they can also use IoT to drive product-related benefits, such as improving product quality, increasing uptime,

1 - 23

IoT and Applications

IoT and Web Technology

and using actual performance data to drive future design changes in the next generation of products. 

As IoT provides the basis for an increasing amount of automated data acquisition, manufacturers will be able to adapt their processes and their products not just for incremental improvements but also for transformation of the product, service, and business model.



IoT gives manufacturers the opportunity to create "intelligent" products that can sense, learn, and predict customer needs as well as interconnect with other product ecosystems.

1.6.5 Smart Health 

IoT devices can be used to enable remote health monitoring and emergency notification systems. These health monitoring devices can range from blood pressure and heart rate monitors to advanced devices capable of monitoring specialized implants.



Smart health systems provide health related services using a network , some kind of connection between intelligent agents. These intelligent agents could be computing devices, mobile phones, sensors, Fitbit smart bands, surgical devices, devices that measure your blood chemistry, or devices that measure your brainwaves. Any of these things could be intelligent agents.



The human actors, patients or healthcare providers for example  could be intelligent agents in this system. The sensors, devices, computers, applications, and human actors are all intelligent agents that might be connected in the smart health system.



Smart healthcare is an important research area for Internet of Things , which employs sensors and other information identifying technologies, wireless and wired networks to realize large-scale, multi-layer interaction between patients and medical equipments, medical staff and healthcare institutions.



Some challenges in the healthcare system are as follows : 1.

Smarter hospital : Smarter hospital is an important improvement of smart healthcare system. A natural problem is how to build a smarter hospital for greatly improving medical services and patient experience.

2.

Data integration/realtimeness : How to combine heterogeneous health data sources in a unified and meaningful way enables the discovery and monitoring of health data from different sources. It is also important for smart healthcare to ensure the data realtimeness.

1 - 24

IoT and Applications

IoT and Web Technology





3.

Medical resource shortness : There are not enough medical resources for the population. For example, there are fewer doctors and high-level healthcare institutions but more patients.

4.

“Low” usage of community health service centers. In contrast with community health service centers, people prefer the high-level healthcare institutions. This results in the low usage of community service centers.

5.

Bad health habits. The citizens have some bad health habits that contribute to poor health, for instance, smoking and no sport.

6.

Lack of information sharing. Hospitals are not sharing enough information. This leads to the following two problems at least. First, the health information records of patients cannot be queried. Second, there is lack of medical cooperation between hospitals.

The links between the many applications in health monitoring are : 1.

Applications require the gathering of data from sensors

2.

Applications must support user interfaces and displays

3.

Applications require network connectivity for access to infrastructural services

4.

Applications have in-use requirements such as low power, robustness, durability, accuracy and reliability.

Connected medical devices and associated IoT technologies will primarily be used to achieve the following capabilities : 1.

Access real time visibility of the patient's condition, his/her activities, context and physiological parameters

2.

Monitor compliance to prescribed treatment, diet and exercise regimes

3.

Provide feedback and cues to patients, family members, doctors and caregivers in order to implement corrective action

4.

Leverage high performance computing for real time feedback and use evidencebased medicine for better patient outcome

1.6.6 Food and Water Tracking and Security 

Important natural resources in the world are food and fresh water. Organic food produced without addition of certain chemical substances and according to strict rules, or food produced in certain geographical areas will be particularly valued. Similarly, freshwater from mountain springs is already highly valued.

1 - 25

IoT and Applications

IoT and Web Technology



The research challenges are : 1.

Design of cost efficient and secure mechanism for tracking food and water from production place to consumers.

2.

Monitoring production processes

3.

Ensure trust and secure exchange of data among applications and infrastructure

1.6.7 Participatory Sensing 

Participatory Sensing is data collection and interpretation.



Participatory Sensing emphasizes the involvement of citizens and community groups in the process of sensing and documenting where they live, work, and play.



Participatory Sensing can draw on a variety of data collection devices, such as home weather stations and water quality tests, but several features of mobile phones make them a special and unprecedented tool for engaging participants in sensing their local environment.



The broad pro-liferation of cellular infrastructure and mobile phone usage makes it possible to collect data over large areas for little incremental cost.



Participatory sensing applications rely on the participation of end users with mobile computing devices to create interactive sensor networks that en-able data gathering, analysis, and sharing.



Participatory sensing applications come with a number of challenges that need to be solved : 1.

Addressing scalability and large scale deployments

2.

Ensuring privacy of individuals providing observations

3.

Efficient mechanisms for sharing and distribution of community wisdom

4.

Reliability and trustworthiness of observed data

5.

Design of algorithms for normalization of observations taking into account the conditions under which the observations were taken.

1.6.8 Social Networks and IoT 

The idea of the Internet of Things is linking digital information to a network and thereby relating digital information to real world physical items. While many terms have been used to describe the vision of seamless information access, exchange and manipulation, the IoT can become a daily reality by the adoption and deployment of more and more networked objects. The impact thus is not only achieved by communication but by cooperation. 1 - 26

IoT and Applications

IoT and Web Technology



Social networks serve human needs: by updating a status description on Face-book or sending out a tweet, users can let their network of friends - or even the digital public know what is happening in their lives. Moreover, videos, pictures, or also news and links get spread by a few mouse clicks. Currently, Facebook receives 55 millions of manual updates by 350 millions of users worldwide.



Future research directions in IoT applications should consider the social dimension, based on integration with social networks which can be seen as another bundle of information streams.

1.7 Future Internet Technologies 1.7.1 Cloud Computing 

Cloud computing is a pay-per-use model for enabling available, convenient, ondemand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, services) that can be rapidly provisioned and released with minimal management effort or service-provider interaction.



Cloud computing refer to a variety of services available over the Internet that deliver compute functionality on the service provider's infrastructure. Its environment (infrastructure) may actually be hosted on either a grid or utility computing environment, but that doesn't matter to a service user.



Cloud computing is a general term used to describe a new class of network based computing that takes place over the Internet, basically a step on from Utility Computing. In other words, this is a collection/group of integrated and networked hardware, software and Internet infrastructure (called a platform).



Using the Internet for communication and transport provides hardware, software and networking services to clients. These platforms hide the complexity and details of the underlying infrastructure from users and applications by providing very simple graphical interface or API.



In addition, the platform provides on demand services that are always on anywhere, anytime and any place. Pay for use and as needed, elastic. The hardware and software services are available to the general public, enterprises, corporations and business markets.



Cloud storage is a model of networked online storage where data is stored in virtualized pools of storage which are generally hosted by third parties. Hosting companies operate large data centers and people who require their data to be hosted buy or lease storage capacity from them. 1 - 27

IoT and Applications

IoT and Web Technology



Cloud storage services may be accessed through a web service API, a cloud storage gateway or through a web-based user interface.



Cloud computing solutions are made up of several elements. 1.

Clients : Mobile, terminals or regular computers.

2.

Benefits : Lower hardware costs, lower IT costs, security, data security, less power consumption, ease of repair or replacement, less noise.

3.

Data centers : Collection of servers where the application to subscribe is housed. It could be a large room in the basement of your building or a room full of servers on the other side of the world

4.

Virtualizing servers : Software can be installed allowing multiple instances of virtual servers to be used and a dozen virtual servers can run on one physical server.

5.

Distributed servers : Servers don't all have to be housed in the same location. It can be in geographically disparate locations. If something were to happen at one site, causing a failure, the service would still be accessed through another site. If the cloud needs more hardware, they can add them at another site.



In Software as a Service (SaaS) model, application is hosted as a service to customers who access it via the Internet.



Platform as a service is another application delivery model and also known as cloud-ware. Supplies all the resources required to build applications and services completely from the Internet, without having to download or install software.

1.7.2 IoT and Semantic Technologies 

Large number of highly distributed and heterogeneous devices in the IoT need to be interconnected and communicate in different scenarios autonomously. This implies that providing interoperability among the “Things” on the IoT is one of the most fundamental requirements to support object addressing, tracking, and discovery as well as information representation, storage, and exchange.



The suite of technologies developed in the Semantic Web, such as ontologies, semantic annotation, Linked Data and semantic Web services, can be uses as principal solutions for the purpose of realising the IoT.



Fig. 1.7.1 shows semantics in the IoT.

1 - 28

IoT and Applications

IoT and Web Technology

Fig. 1.7.1 : Semantics in the IoT



Semantic technologies will also have a key role in enabling sharing and re-use of virtual objects as a service through the cloud.



Future research on IoT is likely to embrace the concept of Linked Open Data. This could build on the earlier integration of ontologies (e.g., sensor ontologies) into IoT infrastructures and applications.



Linked Data is an approach to relate different resources and is currently adopted on the Web. The four principles, of publishing data as linked data includes: 1.

Using URI’s as names for things; everything is addressed using unique URI’s.

2.

Using HTTP URI’s to enable people to look up those names; all the URI’s are accessible via HTTP interfaces.

3.

Providing useful RDF information related to URI’s that are looked up by machine or people;

4.

Linking the URI’s to other URI’s.



The current linked open data effort on the Web provides a large of number of interlinked data represented in RDF accessible via common standard interfaces. The linked data approach is also applied to the IoT domain by providing semantic data and linking it to other domain dependent resources such as location information and semantic tags.



The linked data approach enables resources described via different models and ontologies to be interconnected. Linking the data to existing domain knowledge and resources also makes the descriptions more interoperable.

1.7.3 Autonomy 

There is still a lack of research on how to adapt and tailor existing research on autonomic computing to the specific characteristics of CPS, such as high dynamicity

1 - 29

IoT and Applications

IoT and Web Technology

and distribution, real-time nature , resource constraints and lossy environment. Most existing research in self-aware IoT is lacking experimentation for validation.



Autonomy in IoT can be realized by implementing self-managing systems. Selfmanagement is the property of a system to achieve management and maintenance of its resources intrinsically and internally. Management and maintenance is realized through many levels of decision making.



In IoT, the management scope extends to access management, device management as well as service management. Thus, for self-management, decision making in IoT should pertain to this management scope of IoT.



An Autonomic Computing (AC) system is required to be self-managing, with a “minimum of human interference”

Characteristics of an AC System

1.

Self-configuring : being able to modify interactions and behaviours based on changes in the environment.

2.

Self-healing : being able to discover, diagnose and prevent disruptions.

3.

Self-optimizing : being able to tune resource usage and improve workload balancing

4.

Self-protecting : being able to detect, identify and protect against failure and security attacks

1 - 30

IoT and Applications

IoT and Web Technology

1.8 Infrastructure 

The Internet of Things refers to the set of devices and systems that interconnect realworld sensors and actuators to the Internet. This includes many different types of systems, such as: 1.

Mobile devices

2.

Smart meters and objects

3.

Wearable devices including clothing, health care implants, smart watches, and fitness devices

4.

Internet-connected automobiles

5.

Home automation systems, including thermostats, lighting, and home security

6.

Other measuring sensors for weather, traffic, ocean tides, road signals, and more



Internet of Things applications require diverse sensors and actuators. IoT devices and services should be able to connect seamlessly and on a plug-and-play basis. How your device connects to the rest of the world is a key consideration for Internet of Things products.



To work with all features of Internet of Things, different types of application must run on it. Devices used in the IoT, must support plug and play facility.



The infrastructure needs to support applications in finding the things required. An application may run anywhere, including on the things themselves. Finding things is not limited to the start-up time of an application.



IoT infrastructure has to support finding things according to location.

Infrastructure-related Research Questions

1.

Low-power communication : Many IoT devices are small and do not have access to a continuous power source. Battery size, lifetime, and cost impose significant constraints on how these devices compute and communicate.

2.

Computer networking researchers often grapple with questions of scale. For example, today's Internet routing system interconnects more than 3 billion people, more than a half million IP address blocks, and more than 50 thousand separately administered networks. The networking community responded to the rapid growth of the Internet by designing routing protocols, router architectures, and operational practices to manage this kind of scale.

3.

The unique properties of IoT devices have the potential make the underlying network an even more important part of any viable defense. IoT devices may not 1 - 31

IoT and Applications

IoT and Web Technology

defend themselves appropriately, due to limited computing and power resources as well as a lack of security expertise among device manufacturers and end users. 4.

How IoT devices should support for security and privacy look?

5.

How can the infrastructure support accounting and charging as the basis for different IoT business models?

6.

How to provide security and privacy functions at infrastructure level on the basis of heterogeneous and resource limited components of the infrastructure?

1.9 Networks and Communication 

Internet of Things is an integrated part of Future Internet including existing and evolving Internet and network developments.



IoT allows communication among very heterogeneous devices connected via a very wide range of networks through the Internet infrastructure. IoT devices and resources are any kind of device connected to Internet, from existing devices, such as servers, laptops, and personal computers, to emerging devices such as smart phones, smart meters, sensors, identification readers, and appliances.



Capturing real world data, information and knowledge and events is becoming increasingly easier with sensor networks, social media sharing, location based services, and emerging IoT applications. The knowledge capturing and using is done in many cases at application level and the networks are mainly agnostic about what is happening around the terminals connected to the Internet.



Embedding real world information into networks, services and applications is one of the aims of IoT technology by using enabling technologies like wireless sensor and actuator networks, IoT devices, ubiquitous device assemblies and RFID.



The Internet of Things infrastructure allows combinations of smart objects , sensor network technologies, and human beings, using different but interoperable communication protocols and realises a dynamic ultimodal/heterogeneous network that can be deployed also in inaccessible, or remote spaces or in cases of emergencies or hazardous situations.



Network users will be humans, machines, things and groups of them.



IoT research and development is becoming more complex, due to the already highly advanced level of technology, the global, inter-sectoral and inter-disciplinary collaboration needed and the ever increasing demands of society and the economic global marketplace.

1 - 32

IoT and Applications

IoT and Web Technology



Capabilities such as self-awareness, context awareness and inter-machine communication are considered a high priority for the IoT. Integration of memory and processing power, and the ability to withstand harsh environments are also a high priority, as are the best possible security techniques.



Capabilities such as self-awareness, context awareness communication are considered a high priority for the IoT.



New smart antennas that can be embedded in the objects and made of new materials are the communication means that will enable new advanced communications systems on chip.



In the Internet of Things the following topics related to communication technology have to be considered:

and

inter-machine

1.

Communication to enable information exchange between “smart things/objects” and gateways between those “smart things/objects” and Internet.

2.

Communication with sensors for capturing and representing the physical world in the digital world.

3.

Communication with actuators to perform actions in the physical world triggered in the digital world.

4.

Communication with distributed storage units for data collection from sensors, identification and tracking systems.

5.

Communication for interaction with humans in the physical world.

6.

Communication and processing to provide data mining and services.

7.

Communication for physical world localization and tracking.

8.

Communication for identification to provide unique physical object identification in the digital world.



IP provides today the protocol for implementing IoT applications. More research is required for IP technology and eventually the development of different post IP protocols optimized for IoT, compatible and interoperable with the exiting IP technologies.



Issues to be addressed : 1.

Network technologies (fixed, wireless, mobile etc.).

2.

Ad-hoc, wireless sensor networks.

3.

Autonomic computing and networking.

4.

Opportunistic networking

1 - 33

IoT and Applications

IoT and Web Technology



IoT requires both an architecture and products that allow for the extension of Internet technologies, in order to reach a Future Internet of Things, Services and People.



The number of devices that are connected to the Internet is growing exponentially. This has led to defining a new conception of Internet, the commonly called Future Internet, which started with a new version of the Internet Protocol (IPv6) that extends the addressing space in order to support all the emerging Internet-enabled devices.



IPv6 is the fundamental technology for the IoT. It is estimated that several billion things will be connected by 2020. Unlike IPv4, IPv6 can address this number of objects. The IPv6 address space supports 2128 unique addresses

1.10 Processes Adaptive and Event-driven Processes



Processes become more adaptive after an IoT integration. Data collection is based on event or entity. When data is collected from the sensor or real time data, integration processes happens. Such events can occur at any time in the process.



Event occurrence probability is very low. How to react to a single event can depend on the context, i.e. the set of events that have been detected previously.

Processes Dealing with Unreliable Data



When dealing with events coming from the physical world, a degree of unreliability and uncertainty is introduced into the processes.



If decisions in a business process are to be taken based on events that have some uncertainty attached, it makes sense to associate each of these events with some value for the quality of information.

Processes Dealing with Unreliable Resources



Data as well as resources are inherently unreliable. This is because of failure of the hosting device. Processes relying on such resources need to be able to adapt to such situations. It is necessary to detect a failure.



The quality of the generated reports should be regularly audited for correctness.

1.11 Data Management 

Data management is the ability to manage data information flow. With data management in the management service layer, information can be accessed, integrated

1 - 34

IoT and Applications

IoT and Web Technology

and controlled. Higher layer applications can be shielded from the need to process unnecessary data and reduce the risk of privacy disclosure of the data source. 

Data is received from the Sensors and actuators which is relayed by the microcontroller through WiFi, GPRS, RFID, ZigBee and open connectivity to the Router. These data has to be refined from the database or repository using the Data Mining algorithms like clustering and classification which analyses semantically and syntactically.



Challenges and opportunities of data management are : 1.

Data Collection and Analysis

2.

Big Data

3.

Semantic Sensor Networking

4.

Virtual Sensors

5.

Complex Event Processing.

Data Collection and Analysis (DCA)



Main functions of a DCA module are as follows : 1.

Data storing : Provides storage of the customer’s information collected by sensors.

2.

User data and operation modeling : Allows the customer to create new sensor data models to accommodate collected information and the modelling of the supported operations

3.

On demand data access : Provides APIs to access the collected data

4.

Customer rules/filtering : Allows the customer to establish its own filters and rules to correlate events

5.

Customer task automation : Provides the customer with the ability to manage his automatic processes.

6.

Customer workflows : Allows the customer to create his own workflow to process the incoming events from a device

Big Data



Big data is about the processing and analysis of large data repositories on Cloud computing. Big document summarization method is an important technique for data management of IoT.



Traditional document summarization methods are restricted to summarize suitable information from the exploding IoT big data on Cloud. 1 - 35

IoT and Applications

IoT and Web Technology



Big data requires exceptional technologies to efficiently process large quantities of data within a tolerable amount of time.



Technologies being applied to big data include massively parallel processing (MPP) databases, data-mining grids, distributed file systems, distributed databases, cloud computing platforms, the Internet, and scalable storage systems.



Companies focused on the big data topic, such as Google, Yahoo!, Face-book or some specialised start-ups.

Semantic Sensor Networks and Semantic Annotation of Data



The sensor networks range from tiny wireless artifacts to mobile devices (with many sensors) to large scale systems (in smart cities and environmental monitoring networks).



Applications and users are typically interested in querying various events and requesting measurement and observation data from the physical world.



Integration of data from physical objects, using embedded processors and sensors, into the Web is giving rise to the emergence of a new generation of systems.



The incorporation of physical object data with the Web data, using



information processing and knowledge engineering methods, enables the construction of "‘intelligent and interconnected things"’ and "‘smart environments"’.



Utilising semantic Web technologies in the sensor networks results in a new concept, sometimes referred to as Semantic Sensor Networks.



Sheth et al. propose annotating sensor data with spatial, temporal, and thematic semantic metadata and refer to this as the Semantic Sensor Web (SSW). This approach uses the current OGC and SWE specifications, extends them with semantic Web technologies and provides enhanced machine-interpretable semantic descriptions.



Associating sensor and sensor network data with other concepts (on the Web) and reasoning the data makes this information widely available for different applications, front-end services and data consumers.



Semantics allow machines to interpret links and relations between the different attributes of a sensor description and also other data existing on the Web or provided by other applications and resources.



Fig. 1.11.1 shows publishing data from sensors and services on the Web

1 - 36

IoT and Applications

IoT and Web Technology

Fig. 1.11.1 : Publishing data from sensors and services on the Web



The example shows a parcel that is tagged with an RFID tag which is scanned every time it is loaded or unloaded. The post delivery van has a GPS sensor which reports its location and a twitter service is deployed to report the status of the parcel to interested twitter followers.



In a semantic integration scenario each of these sensors and services need to be able to describe and/or discover what type of in-formation is published and who can use this information. This includes the sensor or service descriptions and also the data reported from sensors and services.



Fig.1.11.2 shows a gateway component for Semantic Sensor Networks. The gateway component is divided into three main layers.



The connectivity layer establishes the connection with a capillary sensor network. A connector modules for each supported sensor/protocol platform should be developed.



External nodes directly connect to the gateway or use multi-hop connections. The gateway provides a common interface which higher level applications and services can access the under-lying sensor networks and their capabilities.



When a new node is activated, the node context information is stored in the gateway repository. The goal of storing this information is to obtain a semantic description that other processes can exploit and infer the status and capabilities of each node.

1 - 37

IoT and Applications

IoT and Web Technology

Fig. 1.11.2 : Gateway component for semantic sensor networks



The information processing layer uses the data from the connectivity layer and from the context information to support query analysis and processing. To establish a reliable connection between sensor nodes and gateway, a method similar to the association and negotiation protocol in the IEEE 802.11 Standard’s negotiation steps is developed.



The term “annotation” can denote both the process of annotating and the result of that process. Semantic annotations, no matter inferred from the sensor data or provided by users, represent the context data which can be utilised to create context-aware applications.

Virtual Sensors



Virtual sensors and actuators are a programming abstraction simplifying the development of decentralized WSN applications.



A virtual sensor is a software sensor as opposed to a physical or hardware sensor. Virtual sensors provide indirect measurements of abstract conditions by combining sensed data from a group of heterogeneous physical sensors.

1 - 38

IoT and Applications

IoT and Web Technology

Fig. 1.11.3 : A building fire control application



For example, on an intelligent construction site, users may desire the cranes to have safe load indicators that determine if a crane is exceeding its capacity. Such a virtual sensor would take measurements from physical sensors that monitor boom angle, load, telescoping length, two-block conditions, wind speed, etc



Signals from these individual sensors can be used in calculations within a virtual sensor to determine if the crane has exceeded its safe working load.



Applications focus on a control loop where inputs are the data sensed in a given area of the system, and outputs are the actions to be executed in a possibly different area. For in-stance, in a building fire control system, shown in Fig. 1.11.3.



A building fire control application. The control algorithm maps sensed inputs to output commands. The sensing and acting tasks insist on different parts of the system.



The virtualization of sensors can be considered at different levels and shows in Fig. 1.11.4. At the lowest level are those related with the more local processing of several simple measurements and at the highest level, the abstract combination of different sensors at the application level.

1 - 39

IoT and Applications

IoT and Web Technology

Fig. 1.11.4 : Different levels for sensor virtualization

1.12 Security, Privacy and Trust 

The security of the Internet of Things, the following principles can be established. a)

Identity : Trust is always tied to an identity. Therefore every device needs a unique identity that can't be changed. The device must also be able to prove its identity at all times.

b)

Positive intention : The device and linked service have positive intentions.

c)

Predictability and transparency : The functional scope of the service provided by devices is known to its full extent. There are no undocumented (secret) functions. The behaviour of the system can be checked at any time by independent third parties.

d)

Reputation : An increasing number of positive interactions between the things gradually form a reputation based intelligent network

Bringing Trust to the Internet of Things



The Internet of Things touches many different sectors and applications, ranging from connected cars to smart homes and intelligent infrastructure. This diversity has spawned an ecosystem that consumers need to trust to keep their data protected.

1 - 40

IoT and Applications

IoT and Web Technology

1.13 Device Level Energy Issues 

One of the essential challenges in IoT is how to interconnect “things” in an interoperable way while taking into account the energy constraints, knowing that the communication is the most energy consuming task on devices.



Low power communication technologies are as follows : 1.

IEEE802.15.4 has developed a low-cost, low-power consumption, low complexity, low to medium range communication standard.

2.

Bluetooth low energy is the ultra-low power version of the Bluetooth technology.

3.

Ultra-Wide Bandwidth (UWB) Technology is an emerging technology in the IoT domain that transmits signals across a much larger frequency range than conventional systems.

4.

RFID/NFC proposes a variety of standards to offer contact less solutions.

Energy Harvesting



It is a process by which energy is derived from external sources. Energy harvesters provide a very small amount of power for low-energy electronics. The energy source for energy harvesters is present as ambient background and is free



Energy harvesting is a topic of substantial and increasing research attention, and motion-driven devices represent a large fraction of this activity. Motion energy harvesting devices are now offered commercially by several companies, mainly for applications where machine vibration is the motion source, although body-powered applications (particularly body sensor networks) are actively pursued.



Energy harvesting (EH) must be chosen according to the local environment. For outside or luminous indoor environments, solar energy harvesting is the most appropriate solution. In a closed environment thermal or mechanical energy may be a better alternative.



The sources of energy available for harvesting are essentially of four forms : light, radio-frequency (RF) electromagnetic radiation, thermal gradients, and motion, including fluid flow.



Solar cells are the most mature and commercially established energy-harvesting solution.



While cost is a key parameter for large-scale photovoltaic generation, at the small scale of portable electronic devices this is less of an issue, and light avail-ability is instead the key limitation. 1 - 41

IoT and Applications

IoT and Web Technology



Low power devices are expected to require 50 mW in transmission mode and less in standby or sleep modes. EH devices cannot supply this amount of energy in a continuous active mode, but instead intermittent operation mode can be used in EHpowered devices.



The sensor node’s average power consumption corresponds to the total amount of energy needed for one measurement cycle multiplied by the frequency of the operation

1.14 IoT Related Standardization 

Standards mean in general common methods, norms and regulations, based on which some work must be done, some product or service must be produced or some actions be conducted. Standards can be official and binding (de jure).



De facto standards can be formed by companies or groups of companies (interest groups, consortia, alliances, associations, etc.) which have come first into the market or application area and therefore the used methods/protocols etc. have become de facto standards. Standards play an important role in applying new technologies. With standards different actors in industry and in ecosystems can utilize similar and connective systems.



Standards are published documents that establish specifications and procedures designed to maximize the reliability of the materials, products, methods, and/or services people use every day. Standards address a range of issues, including but not limited to various protocols to help maximize product functionality and compatibility, facilitate interoperability and support consumer safety and public health.



Fig. 1.14.1 shows standardization process.

Fig. 1.14.1 1 - 42

IoT and Applications

IoT and Web Technology

Interoperability and Open Standard Development



With the popularity of IoT devices, many IoT protocols and standards have been developed. In contrast to ordinary computers, IoT devices are normally constrained when it comes to memory space and processing capacity.



In addition, IoT devices may be deployed where there is no or limited access to a power grid, which means that they need to operate under power supply from batteries or small solar panels.



As a consequence, power-efficient communication protocols with small memory footprints and limited demands on processing have been developed to support IoT devices.



IoT protocols have been standardized on virtually all layers of the protocol stack. IoT and Web Technology ends….

1 - 43

IoT and Applications

IoT and Web Technology

Notes

1 - 44

IoT and Applications

M2M to IoT

Chapter - 2

M2M TO IOT Syllabus : A Basic Perspective- Introduction, Some Definitions, M2M Value Chains, IoT Value Chains, An emerging industrial structure for IoT, The international driven global value chain and global information monopolies. M2M to IoT : An Architectural Overview - Building an architecture, Main design principles and needed capabilities, An IoT architecture outline, standards considerations.

Topic Name

Section No.

Page No.

2.1

Introduction of M2M Basic Perspective

2-2

2.2

Some Definition

2-6

2.3

M2M Value Chains

2-9

2.4

IoT Value Chains

2 - 10

2.5

An Emerging Industrial Structure for IoT

2 - 13

2.6

The International Driven Global Value Chain and Global Information

2 - 17

Monopolies 2.7

M2M to IoT an Architectural Overview

2 - 18

2.8

Main Design Principles and Needed Capabilities

2 - 19

2.9

An IoT Architecture Outline

2 - 22

2.10

Standards Considerations

2 - 24

2-1

IoT and Applications

M2M to IoT

2.1

Introduction of M2M Basic Perspective



In just the last few years, we have moved beyond simply using our machines to connect with other people and can now program them to connect directly to one another, allowing for the collection and processing of information on an unprecedented scale. The new connectivity of both physical infrastructure and devices is being referred to as the ‘industrial internet’ or the ‘internet of things’, while the technology that facilitates this connectivity is most commonly called ‘Machine-to-Machine’ (M2M).



At the first look, it may appear that Machine-to-Machine (M2M) communications and IoT denote the same thing. In reality, M2M is only a subset of IoT. IoT is a more encompassing phenomenon because it also includes Human-to-Machine communication (H2M).



By 2020, there will be 12.5 billion M2M devices globally, up from 1.3 billion devices today (Hatton 2012). To put this in perspective, mobile internet use, which is also fast becoming a part of our daily experience, is growing at only a fraction of the rate of M2M, and the 400 million mobile internet users of 2007 are predicted to grow to two billion users by 2015 (richmond 2011).



Radio Frequency Identification (RFID), Location-Based Services (LBS), Lab-on-aChip (LOC), sensors, Augmented Reality (AR), robotics and vehicle telematics, which are some of the technology innovations that employ both M2M and H2M communications.



M2M communication is the communication among the physical things which do not need human intervention.



M2M communication is a form of data communication that involves one or more entities that do not necessarily require human interaction or intervention in the process of communication. M2M is also named as Machine Type Communication (MTC) in 3GPP.



M2M communication could be carried over mobile networks (e.g. GSM-GPRS, CDMA EVDO networks). In the M2M communication, the role of mobile network is largely confined to serve as a transport network.

Key features of M2M



Some of the key features of M2M communication system are given below : 1.

Low mobility : M2M devices do not move and if moves only within a certain area. 2-2

IoT and Applications

M2M to IoT



2.

Time controlled : Data can be send or receive only at certain pre - defined time periods.

3.

Time tolerant : Sometimes data transfer can be delayed.

4.

Packet switched : Network operator to provide packet switched service.

5.

Online small data transmissions : Devices frequently send or receive small amounts of data.

6.

Low power consumption : To improve the ability of the system to efficiently service M2M applications.

7.

Location specific trigger : Intending to trigger M2Mdevice in a particular area e.g. wake up the device.

M2M solutions allow end-users to capture data about events from assets, such as temperature or inventory levels. Typically, M2M is deployed to achieve productivity gains, reduce costs and increase safety or security. M2M has been applied in many different scenarios, including the remote monitoring and control of enterprise assets or to provide connectivity of remote machine-type devices.

2.1.1 Architecture and Components of M2M  Fig. 2.1.1 shows M2M architecture.

Fig. 2.1.1 : M2M architecture



The system components of an M2M solution are as follows : 1.

M2M Device : A device that runs application(s) using M2M capabilities and network domain functions. An M2M device is either connected straight to an access network or interfaced to M2M gateways via an M2M area network. 2-3

IoT and Applications

M2M to IoT



2.

M2M area network : A M2M area network provides connectivity between M2M devices and M2M gateways. Examples of M2M area betworks include : Personal area network technologies such as IEEE 802.15, SRD, UWB, Zigbee, Bluetooth, etc or local networks such as PLC, M-BUS, Wireless M-BUS.

3.

M2M gateways : Equipments using M2M capabilities to ensure M2M devices interworking and interconnection to the network and application domain. The M2M gateway may also run M2M applications.

4.

M2M applications server : Applications that run the service logic and use service capabilities accessible via open interfaces.

5.

M2M application : The application component of the solution is a realization of the highly specific monitor and control process. The application is further integrated into the overall business process system of the enterprise.

Fig. 2.1.2 shows generic M2M solution.

2-4

IoT and Applications

M2M to IoT

Fig 2.1.2 Generic M2M solution



A number of sub-sets of users of M2M services can be identified : Consumers in the home, business users and facility managers, city governments, logistics businesses, energy providers and more.

2.1.2 Key Application Area 1.

Security : Surveillances, Alarm systems, Access control, Car/driver security

2.

Tracking and tracing : Fleet Management, Order Management, Pay as you drive, Asset Tracking, Navigation, Traffic information, Road tolling, Traffic optimization/steering

3.

Payment : Point of sales, Vending machines, Gaming machines.

4.

Health : Monitoring vital signs, Supporting the aged or handicapped, Web Access Telemedicine points, Remote diagnostics.

5.

Remote maintenance/control : Sensors, Lighting, Pumps, Valves, Elevator control, Vending machine control, Vehicle diagnostics.

6.

Metering : Power, Gas, Water, Heating, Grid control, Industrial metering.

7.

Manufacturing : Production chain monitoring and automation.

8.

Facility management : Home / building / campus automation.

Sr. No.

Industry/Vertical

M2M applications

1.

Automotive

Passenger vehicle anti theft/recovery, maintenance, safety/control, entertainment.

2.

Transportation

Fleet management, asset tracking telematics manufacturing and logistics.

3.

Utilities/ Energy

Smart metering, smart grid, electric line monitoring , gas/oil/water pipeline monitoring.

4.

Security

Commercial and home security monitoring, surveillance applications, fire alarm, police/medical alert.

5.

Financial/Retail

Point of sale (POS), ATM Kiosk, vending machines, digital signage and handheld terminals. 2-5

monitoring/

IoT and Applications

M2M to IoT

6

Health care

Remote monitoring of patient after surgery (e-health), remote diagnostics, medication reminders, tele-medicine.

7.

Public saftey

Highway, bridge traffic management, homeland security, police, fire and emergency services.

India Market Scenario



As per projections by Ericssion, Indian M2M market may rise from 30 Million in 2013 to more than 250 million in 2020. Automotive (connected vehicles) is having a market share of 45 % and Energy (smart meters) 23 %.



Other applications are Point of sale (POS), health care, security and surveillance, intelligent buildings, smart homes etc. M2M applications will make the living smart and improve the quality of life.

2.1.3 Comparison of M2M and IoT Machine-to-Machine

Internet of Things

It support single application with single device

It support multiple application with multiple device

It is communication and device centric

It is information and service centric

It support closed business operations

It support open market place

M2M uses approach

IoT uses horizontal enabler approach

vertical

system

solution

It requires specialized device solutions

It requires generic commodity devices

Used in B2B

Used in B2B and B2C

2.2

Some Definition



Global value chains : A value chain describes the full range of activities that firms and workers perform to bring a product from its conception to end use and beyond, including design, production, marketing, distribution, and support to the final consumer.



Fig. 2.2.1 shows simplified value chain. It consists of five separate activities that work together to create a finalized product.

2-6

IoT and Applications

M2M to IoT

Fig. 2.2.1 : Simplified value chain



Each of the segments identified in the previous step have specific characteristics and dynamics, such as particular sourcing practices or preferred suppliers.



For example, in the fruits and vegetable value chain, the inputs for the “processing” segment may come from fruits that were intended for export but did not meet the quality controls or it may come from production grown exclusively for processing.

Fig. 2.2.2 : Fruit and vegetables global value chain

2-7

IoT and Applications

M2M to IoT



It is important to identify the type of companies involved in the industry and their key characteristics : Global or domestic; state-owned or private; large, medium or small; etc. Identifying the firms that participate in the chain will help to understand its governance structure.



International production processes have become characterized by inter-firm networks that span borders. We call these networks global value chains.



Fig. 2.2.2 shows fruit and vegetables global value chain.

What is a global value chain ?



The value chain describes the full range of activities that firms and workers perform to bring a product from its conception to end use and beyond. This includes activities such as design, production, marketing, distribution and support to the final consumer. In the context of globalization, the activities that constitute a value chain have generally been carried out in inter-firm networks on a global scale. By focusing on the sequences of tangible and intangible value-adding activities, from conception and production to end use, GVC analysis provides a holistic view of global industries.

Fig. 2.2.3



There are four basic dimensions that GVC methodology explores : 1)

An input-output structure, which describes the process of transforming raw materials into final products;

2)

A geographical consideration;

3)

A governance structure, which explains how the value chain controlled; and

4)

An institutional context in which the industry value chain is embedded.



GVCs have several attributes, one of them being governance.



Governance analysis allows one to understand how a chain is controlled and coordinated when certain actors in the chain have more power than others. Gereffi 2-8

IoT and Applications

M2M to IoT

defines governance as ‘authority and power relationships that determine how financial, material and human resources are allocated and flow within a chain. 

In GVC the most value creation is often found in : 1.

Upstream activities such as design, product development, R&D and manufacturing of key parts and components;

2.

Downstream activities such as marketing, branding and customer service.

Ecosystems vs. value chains



The concept of the business ecosystem was introduced by James F. Moore in 1993 with the description : An economic community supported by a foundation of interacting organizations and individuals, the organisms of the business world. This economic community produces goods and services of value to customers, who are themselves members of the ecosystem. The member organizations also include suppliers, lead producers, competitors and other stakeholders. Over time, they co-evolve their capabilities and roles and tend to align themselves with the directions set by one or more central companies. Those companies holding leadership roles may change over time, but the function of ecosystem leader is valued by the community because it enables members to move toward shared visions to align their investments and to find mutually supportive roles.



Business ecosystem is a dynamic structure of interconnected organization that depends on each other from mutual survival.



Value chain is associated with the creation of valueit is the instantiation of exchange by a certain set of companies within an ecosystem.

2.3

M2M Value Chains



The “value chain” has been a basic business concept for many years. Each link in the chain “adds value” in a somewhat linear progression from raw materials to finished products or services. It is a useful concept for identifying key elements in the route to market for new product ideas and for highlighting where new profits can be made.



Fig. 2.3.1 shows M2M value creation chain.



Inputs : It is raw material which converted into product. For example : Information is converted into required data. Coal mined for making domestic steel.



Production or manufacture : It processes the raw inputs which becomes a part of a value chain. Data from an M2M solution, meanwhile, needs to be verified and tagged for provenance. 2-9

IoT and Applications

M2M to IoT



Processing : Product is prepared for sale.

Fig. 2.3.1 : M2M value creation chain



Packaging : Packaging refers to the process whereby a product can be branded as would be recognizable to end-user consumers.



Distribution/Marketing : This process refers to the channels to market for products.

2.4 

IoT Value Chains IoT value chains based on data are to some extent enabled by open APIs and the other open web-based technologies.

Fig. 2.4.1 : Information-driven value chain for IoT 2 - 10

IoT and Applications

M2M to IoT



Required data is collected from publicly available resources and take from other company data. An information marketplace is available in world for getting data.



It should be noted that such a marketplace could still be internal to a company or strictly protected between the value chains of several companies.



Open APIs allow for the knowledge contained within different technical systems to become unembedded, creating the possibility for many different economic entities to combine and share their data as long as they have a well-defined interface and description of how the data is formatted.



Fig. 2.4.1 shows an Information-Driven Value Chain for IoT. M2M value chain

Input

IoT value chain

Description

Sensors

Similar to M2M device solution.

Open data

Provided by organizations.

Operational support systems / business support systems

Used increasingly in tightly information marketplaces.

Corporate database

Contains various database like supply chain management, payroll, accounting etc.

Asset Information

It store information like temperature over time of container during transit or air quality during a particular month.

Open data sets

It may include maps, rail timetables or demographics about a certain area.

Network information

Contains GPS data, services accessed via the mobile network.

Corporate information

Current state of demand for a particular product in the supply chain at a particular moment in time.

Processing

Data combination

Data is mixed together from various sources.

Packaging

Information components

Packaging section of the information value chain creates information components.

Information product

Company may have market information about a certain area of town.

Production

Distribution marketing

and

2 - 11

government

and

city closed

IoT and Applications

M2M to IoT



‘Intelligence’ is imparted through a process of generating and sharing information between these ‘things’. Therefore connectivity is an essential element where today there are a number of open and proprietary standards governing connectivity between devices and networks.



Connectivity enables applications that take advantage of the connected devices to create value to the end user. The applications are managed through platforms that provide critical and value added business support services such as device management, security, accounting and billing, data management and analytics, etc., to breathe life into the IoT infrastructure.



Fig. 2.4.2 shows IoT value stack.

Fig. 2.4.2 : IoT value stack



From a value perspective, value will be appropriated by each layer of the IoT model : Device, connectivity, applications, platforms and services. Devices and connectivity are viewed as commodities with consequently low value appropriation whereas in applications, platforms and services is where the value lies because that’s where the ‘brains’ of the operation resides as opposed to the connected limbs and veins that represent devices and connectivity.

2.5 

An Emerging Industrial Structure for IoT The Internet of Things is a network of networks where, typically, a massive number of objects /things/ sensors/ devices are connected through communications and information infrastructure to provide value-added services.



The Industrial Internet of Things (Industrial IoT) is made up of a multitude of devices connected by communications software. The resulting systems and even the individual 2 - 12

IoT and Applications

M2M to IoT

devices that comprise it, can monitor, collect, exchange, analyze and instantly act on information to intelligently change their behavior or their environment -- all without human intervention. 

Fig. 2.5.1 shows relation between industrial IoT and IoT

Fig. 2.5.1 : Relation between industrial IoT and IoT



The industrial IoT connects critical machines and sensors in high-stakes industries such as aerospace and defense, healthcare and energy. These are systems in which failure often results in life-threatening or other emergency situations.



The industrial IoT as the infrastructure that must be built before IoT applications can be developed. In other words, the IoT, to some extent, depends on the Industrial IoT.

2.5.1 Information-Driven Global Value Chain 



Organization and others are play an important role. They are as follows : 1.

Inputs : Sensors, RFID, other devices and end-users.

2.

Data factories

3.

Service providers/data wholesalers

4.

Intermediaries

5.

Resellers

Fig. 2.5.2 shows the information-driven global value chain.

2 - 13

IoT and Applications

M2M to IoT

Fig. 2.5.2 : The information-driven global value chain

Inputs to the information-driven global commodity chain



Information-driven global commodity chain (I - GVC) uses two main input. They are sensors and end users.



These two inputs supply small amount of data to I-GVC. These data is aggregated, analyzed, repackaged and exchanged between the different economic think-tankers that form the value chain.



Sensor devices and networks, RFIDs, mobile and consumer devices, Wi-Fi hotspots and end-users all form part of a network of “subcontractors” in the value chain, all contributing to the increased value of the information products.



Sensors may send data to custom gateway devices and then push to the cloud over GSM or WiFi. In such situations, cloud services push the outcome to a mobile device to update the user on the real-time activities.

2 - 14

IoT and Applications

M2M to IoT



Smart phones have also been developed that allow mobile devices to interact with sensors and RFID.



End user is one of inputs to I-GVC. In the digital economy, however, more than 4 billion individuals are now connected via mobile devices, which will soon have access to cloud computing capabilities.



Individuals, sensors and a multitude of devices are able to transmit data about their environments to computing facilities that can then process it into information.



End users them-selves now play a large role in the emerging industrial structure of the communications industries, the value chain would not exist without the contribution of their data.



More importantly, perhaps, data is a unique commodity, it is not consumed in the process of producing a product. Steel, for example is used up and consumed in the process of creating a car. Its value can therefore be viewed in terms of its purchase cost and the value an end user receives from the steel used to build a car.



Data, in contrast to traditional commodities, has a value not just in exchange and in its use, but also in its reuse. It is possible to re-form data into many different information products and to resell it many times over.



The raw inputs may, however, be reused again and again in order to develop new products and extend existing ones.

Production processes of the information-driven global value chain Data factories :



Data factory has a few key entities that work together to define input and output data, processing events and the schedule and resources required to execute the desired data flow. It produce data in digital forms for use in other parts of the I-GVC.



Data factory is a cloud-based data integration service that automates the movement and transformation of data. You can create data integration solutions using the data factory service.



Data factories are those entities that produce data in digital forms for use in other parts of the I-GVC.



Some organization and company collects various information from the field and prepare the map for purchase. Such data factories would create paper-based pro-ducts and sell them to end-users via retailers. But in the digital era, these companies now also provide this data via digital format.

2 - 15

IoT and Applications

M2M to IoT

Service providers and data wholesalers :



Service providers and data wholesalers are collect data from various sources worldwide. This massive database is used to improve their own information product or sell information products in various forms.



Twitter, facebook, google are example of this type of company.



Facebook requires massive storage infrastructure to house its enormous stockpile of photos, which grows steadily as users add hundreds of millions of new photos every day and as it expands its platform capabilities to support video.



With facebook eclipsing 900 million users and twitter closing in on 150 million, owned and earned media are now richer sources of data that include new data types that weren’t available to marketers in the past, specifically those types that involve user behaviors, intentions and affinities.



In exchange for freely distributing a sharing widget, companies like share this target users by tracking users’ sharing activity through the network of websites that have the widget installed. They collect data about what users like, read, share, save and more. This data is then augmented with additional targeting data and sold at a premium.

Intermediaries



There is a need for intermediaries that handle several aspects of the production of information products. There are many privacy and regional issues associated with the collection of personal information.



Transaction cost is reduced by using intermediaries with the establishment of a market for many different companies to participate in.

Resellers



Reseller’s collects information from various sources, combine it together, analyze it and sell it to end user or other organization.



Among the most common value-added resellers are computer retailers and service companies, automobile dealerships and furniture stores. Value-added resellers are businesses that sell products manufactured by other companies in addition to selling their own supplemental products and services, thereby increasing the value of the resold product purchased by the consumer.



The data and tools available today can give you the insight you need to improve marketing and advertising performance.

2 - 16

IoT and Applications

M2M to IoT

2.6

The International Driven Global Value Chain and Global Information Monopolies



Globalization has given rise to a new era of international competition that is best understood by looking at the global organization of industries and the ways in which countries rise and fall within these industries.



Fig. 2.6.1 shows data collection map : An example of how data is collected with just 15 minutes of a web surfing session. Browse the web normally. As you does, the graph in this popup will change and the icon in the toolbar will animate.



Each circle in the graph represents a site that’s been sent some of your personal information. Circles with a halo are sites you’ve visited. Circles without a halo are sites you haven’t.



Through being able to collect and analyze data without being restricted by the same level of privacy regulation as in Europe, for example, they are able to create a much better information product. Companies in Europe, Asia and other parts of the globe are therefore dependent on these companies in order to gain the most appropriate knowledge for their companies’ needs.

Fig. 2.6.1 : Data collection map 2 - 17

IoT and Applications

M2M to IoT

2.7

M2M to IoT an Architectural Overview



The Internet of things domain will encompass an extremely wide range of technologies, from stateless to stateful, from extremely constrained to unconstrained, from hard real time to soft real time.



So single reference architecture cannot be used as a blueprint for all possible concrete implementations. While a reference model can probably be identified, it is likely that several reference architectures will co-exist in the Internet of things.



Architecture in this context is defined as a framework for the specification of a network's physical components and their functional organization and configuration, its operational principles and procedures, as well as data formats used in its operation.



For example, the RFID tag based identification architecture may be quite different from a sensor-based architecture, which is more comparable to the current Internet. There will also be several types of communications models such as : Thing to application server, thing to human or thing to thing communication.

2.7.1 Building Architecture 

Fig. 2.7.1 shows how to build a system solution from reference architecture. Architecture contains information about main conceptual elements, the actual elements of a target system and the relation between them. It also includes principles for the design of the architecture.



A conceptual element refers to an intended function, a piece of data or a service. An actual element refers to a technology building block or a protocol.



The reference architecture is related to the generalized model. It contains set of elements and relations that are of relevance to the domain IoT.



Reference architecture can be used to select the best delivery method for particular technologies within an IT service catalog. A reference model is an abstract framework for understanding significant relationships among the entities of some environment.



Reference architecture is used to design applied architecture.

Fig. 2.7.1 : How to build a system solution from reference architecture



Reference architecture model must includes overall objective for the architecture as well as design principles. 2 - 18

IoT and Applications

M2M to IoT



Reference architecture tries to show the most complete picture of what is involved in realizing the modeled entities. It is possible to define reference architectures at many levels of detail or abstraction and for many different purposes.



Fig. 2.7.2 shows problem and solution domain partitioning.

Fig. 2.7.2 : Problem and solution domain partitioning

Layers

Domain

Functions

Needs problems constraints

Problem domain

1.

Application needs and scenarios

2. Business and technical constraints 3. Requirements Concepts base technologies

Solution domain

1.

Design objectives and principles

2.

Architecture views

3. Needed capabilities and functions 4. Technology components System solution

Solution domain

1. System design 2. Deployment view 3. Software components 4. Hardware components

2.8 

Main Design Principles and Needed Capabilities IoT-A technical objective was to create the architectural foundations of the future Internet of things, allowing seamless integration of heterogeneous IoT technologies into a coherent architecture and their federation with other systems of the future Internet.

2 - 19

IoT and Applications

M2M to IoT



In this context an architectural reference model for the interoperability of IoT systems was introduced. The project also focused on other technological issues, such as scalability, mobility, management, reliability, security and privacy.



In the SENSEI project the focus has been drawn on the realization of ambient intelligence in a future network and service environment. In this environment, heterogeneous Wireless Sensor and Actuator Networks (WSAN) are integrated into a common framework of global scale and make it available to services and applications via universal service interfaces.

IoT-A architectural reference model



European Commission within the Seventh Framework Program (FP7) has supported the proposed project; IoT-A by Martin Bauer and et.al. The recommended reference architecture provided high-level architectural views and perspectives for constructing IoT systems.



Views : Different angles for viewing an architecture that can be used when designing and implementing it.



There are different approached adapted by the industry and standardization bodies towards defining an acceptable reference architecture.



The European project SENSEI has undertaken one such initiative towards integrating the physical world with the digital world of the future internet. The objective is to develop an architecture and technology building blocks to achieve the integration of the two realms - Physical and Digital.



The approach followed by ETSI is to define the M2M service requirements based on a set of M2M use cases and then to specify the architecture along with the associated system interfaces.



Finally, the approach followed by IOT-A is based on Architecture Reference Model (ARM). The vision of IoT-A is to establish, via the ARM, a means to achieve a high degree of interoperability between different IoT solutions at the different system levels of communication, service and information.



The main goal of SENSEI is to integrate the physical with the digital world of the network of the future.



Behind the concept of SENSEI is the idea of sensors, actuators and efficiently networked nodes deployed everywhere and interconnected. They are accessible and manageable through a global and pluggable sensor and actuator networking framework.

2 - 20

IoT and Applications

M2M to IoT



It allow the connection of present and future networks, via the network support interface.



The architecture relies on the separation of resources providing sensing and actuation from the actual devices, a set of contextual and real world entity-centric ser-vices and the users of the services.



IoT-A refers to as the Architectural Reference Model (ARM). The vision of IoT-A is, via the ARM, to establish a means to achieve a high degree of interoperability between different IoT solutions at the different system levels of communication, service and information.



Introducing the IoT-A tree : 1.

A generic reference model, derived from Business considerations, applicationbased requirements and current technologies,

2.

Able to generate different reference architectures depending on domain-specific requirements.

3.

To be used as a blueprint for concrete architecture design.



Reference model : A reference model is an abstract framework for understanding significant relationships among the entities of some environment. It enables the development of specific reference architectures. A Reference Model consists of a minimal set of unifying concepts, axioms and relationships



Reference architecture : A reference architecture is an architectural design pattern that indicates how an abstract set of relationships realizes a set of requirements. The main purpose of a RA is to provide guidance for the development of concrete architectures. More reference architectures may be derived from a common reference model.

Fig. 2.8.1 : Architectural reference model 2 - 21

IoT and Applications

M2M to IoT

IoT architecture objective

1.

The overall design objective of IoT architecture shall be to target a horizontal system of real-world services that are open, service-oriented, secure and offer trust.

2.

Design for reuse of deployed IoT resources across application domains.

3.

Design for a set of support services that provide open service-oriented capabilities and can be used for application development and execution.

4.

Design for different abstraction levels that hide underlying complexities and heterogeneities.

5.

Design for sensing and actors taking on different roles of providing and using services across different business domains and value chains.

6.

Design for ensuring trust, security and privacy.

7.

Design for scalability, performance and effectiveness.

8.

Design for evolvability, heterogeneity and simplicity of integration

9.

Design for simplicity of management.

10.

Design for different service delivery models.

11.

Design for lifecycle support.

2.9 

An IoT Architecture Outline Fig. 2.9.1 shows functional layers and capabilities of an IoT solution.

Fig. 2.9.1 : Functional layers and capabilities of an IoT solution

1.

Asset layer represents the real-world objects subject to monitoring and control having digital representations and identities. Assets can be physical or virtual, animate as well as inanimate. 2 - 22

IoT and Applications

M2M to IoT



2.

Resource layer provides the functional capabilities of sensing, actuation and embedded identities. The sensors and actuators are embedded in physical objects, are linked through wired and wireless networks using the same IP protocol that connects the Internet.

3.

Communication layer provides the means of connectivity between the entities. LANs, WANs, wireless personal area networks, bluetooth or its variant Bluetooth Low Power are few examples. There are also legacy and industry-specific non-IP protocols which are now migrating towards IP. IEEE 802.15.4 is one such standard. The IEEE standard 802.15.4 offers physical and media access control layers for low-cost, low-speed, low-power Wireless Personal Area Networks (WPANs). Possible application scenarios are home networks, automotive networks, industrial networks, remote metering to just name a few.

4.

Service support layer simplifies the IOT applications by performing common and routine task for the applications.

5.

Data and information layer supports advanced control logic besides capturing knowledge through a framework called KMF (Knowledge Management Framework). The KMF integrates anything from single pieces of data from individual sensors to highly domain-specific expert knowledge into a common knowledge fabric.

6.

Application layer provides the specific IOT application. This is an open-ended array of different applications. Examples are asset management, industrial automation, smart grid, commercial building automation, smart cities, smart homes, smart factories, smart transport, participatory sensing to just name a few.

7.

Business layer supports the core business of any enterprise interested in the IOT application. Business layer is where the IOT applications are integrated into business processes and enterprise systems.

In addition to the aforementioned functional layers, there are three functional groups spanning across the functional layers - management, security, IOT data and services. 1.

Management deals with the management of the various parts of the system solution related to its operation, maintenance, administration and provisioning.

2.

Security is about protection of the system, its information and services from external threats or any other harm. Security measures provide communication security, information security. Trust and identity management, authentication and authorization, privacy protection are the key capabilities.

2 - 23

IoT and Applications

M2M to IoT

3.

Data and service processing can be topologically distributed. Sensor nodes in the WSAN (Wireless Sensor and Actor Networks) can handle the basic data processing while further processing and aggregation can take place higher up in the network topology.

2.10 Standards Considerations 

Although the establishment of standards is necessary for market acceleration, true interoperability will be realized through middleware (inter-standards “glue”) that fills the gaps between standards that do not fully meet the needs of the market.



After the standards have been defined, IoT platform vendors will need to develop middleware to create interoperability between each of the technologies defined by SDO-ratified standards.



Standards are needed for interoperability both within and between domains. Within a domain, standards can provide cost efficient realizations of solutions, and a domain here can mean even a specific organization or enterprise realizing an IoT.



Between domains, the interoperability ensures cooperation between the engaged domains and is more oriented towards a proper “Internet of Things”. There is a need to consider the life-cycle process in which standardization is one activity.



Significant attention is given to the “pre-selection” of standards through collaborative research, but focus should also be given to regulation, legislation, interoperability and certification as other activities in the same life-cycle. For IoT, this is of particular importance.



IERC is working to create a reference for pre-standardisation activities of EC IoT research projects that is the base for the position paper and the IoT standardisation roadmap. This effort has as goal to increase overall efficiency and raise mutual awareness, defragment and synergize in one unique place important information for stakeholders : Industry, Standard Development Organisations (SDOs), European Commission (EC). M2M to IoT ends….

2 - 24

IoT and Applications

IoT Reference Architecture

Chapter - 3

IOT REFERENCE ARCHITECTURE Syllabus : IoT Architecture -State of the Art – Introduction, State of the art, Architecture Reference Model- Introduction, Reference Model and architecture, IoT reference Model, IoT Reference ArchitectureIntroduction, Functional View, Information View, Deployment and Operational View, Other Relevant architectural views. Topic Name

Section No.

Page No.

3.1

State of the Art

3-2

3.2

Architecture Reference Model

3 - 14

3.3

IoT Reference Model

3 - 16

3.4

IoT Reference Architecture

3 - 24

3-1

IoT and Applications

IoT Reference Architecture

3.1  



State of the Art Several Reference Architectures and Models exist both for M2M and IoT systems. The use of standards 1.

Ensures interoperable and cost-effective solutions

2.

Opens up opportunities in new areas

3.

Allows the market to reach its full potential

The more things are connected, the greater the security risk. So security standards are also needed to protect the individuals, businesses and governments which will use the IoT.

3.1.1 European Telecommunications Standards Institute M2M/oneM2M 

The European Telecommunications Standards Institute (ETSI) produces globallyapplicable standards for Information and Communications Technologies, including fixed, mobile, radio, converged, broadcast and Internet technologies.



A new ETSI Technical Committee is developing standards for M2M Communications. This group aims to provide an end-to-end view of M2M standardization cooperating with ETSI's activities on Next Generation Networks and 3GPP standards initiative for mobile communication technologies.



The ETSI M2M specifications are based on specifications from ETSI as well as other standardization bodies such as the IETF (Internet Engineering Task Force), 3GPP (3rd Generation Partnership Project), OMA (Open Mobile Alliance), and BBF (Broadband Forum).



Goals of ETSI TC M2M : 1. To develop and maintain an end-to-end overall telecommunication high level architecture for M2M 2. To identify gaps where existing standards and provide specifications to fill these gaps

What is ETSI’s Technical Committee M2M



ETSI TC M2M focuses on M2M system.



Established in 2009, after 8 months preparation.



Monthly plenary- and rapporteurs meetings, conference calls.



Liaisons and cooperation with other SDOs, consortia.



Constantly increasing participation (group of 50 - 70 people). 3-2

IoT and Applications

IoT Reference Architecture

 

Europe, N. America, China, Korea and Japan companies (currently about 30 % operators and 60 % Manufacturers). Open approach, published and draft TR/TS are public on the ETSI server.

ETSI TC M2M has the responsibility

1.

To collect and specify M2M requirements from relevant stakeholders;

2.

To develop and maintain an end-to-end overall high level architecture for M2M;

3.

To identify gaps where existing standards do not fulfil the requirements and provide specifications and standards to fill these gaps, where existing standards bodies or groups are unable to do so;

4.

To provide the ETSI main centre of expertise in the area of M2M;

5.

To co-ordinate ETSI’s M2M activity with that of other standardization groups and fora.

ETSI M2M high-level architecture



Fig. 3.1.1 shows the high-level ETSI M2M architecture.

Fig. 3.1.1 : High-level ETSI M2M architecture 3-3

IoT and Applications

IoT Reference Architecture



A high-level architecture of M2M system consists of a Device and Gateway Domain, and a Network Domain. The device and gateway domain is composed of the following elements : 1. M2M Device runs M2M Device Applications (DA) using M2M Device Service Capabilities Layer (DSCL). 2.

M2M Gateway runs M2M Gateway Applications (GA) using M2M Gateway Service Capabilities Layer (GSCL).

3.

M2M Area Network provides connectivity based on Personal or Local Area Network technologies (e.g. Zigbee, Bluetooth) between M2M devices and M2M gateways. The case of device-to-device communication is out of the scope of ETSI's effort.



Network domain contains the following elements : 1.

M2M Access Network : It allows M2M devices and M2M gateways to communicate with the core network. It uses any one network solutions : Digital Subscriber Line (DSL), satellite, GSM EDGE Radio Access Network (GERAN), Universal Terrestrial Radio Access Network (UTRAN), evolved UTRAN (eUTRAN), Wi-Fi (IEEE 802.11), and Worldwide Interoperability for Microwave Access (WiMAX), that can be optimized for M2M communication if needed.

2.

M2M Core Network : This network enables interconnection with other networks, provides IP connectivity or other connectivity options, service and control functions, and roaming. Similarly to access network, it can be based on varied existing core networking solutions.

3.

M2M Network Service Capabilities Layer (NSCL) : It provides M2M functions that are shared by different M2M applications.

4.

M2M Applications run the service logic and use M2M service capabilities available via open interfaces.

5.

M2M network management functions consist of all the functions required to manage access and core networks.

6.

M2M management functions consist of all the functions used to facilitate the bootstrapping of permanent M2M service layer security credentials required to manage M2M service capabilities in the network domain.



Fig. 3.1.2 shows M2M service capabilities, M2M nodes and open interface. 3-4

IoT and Applications

IoT Reference Architecture

Fig. 3.1.2 : M2M service capabilities and reference points



In order to standardize the procedures that can be used for enabling these entities to communicate the ETSI M2M specifications have defined a number of Reference Points and the operations that can be used for this communication. These Reference Points are : 1.

mIa : M2M application interface : It is used by the Network Applications (NA) to communicate with the Network Service Capability Layer (NSCL).

2.

dIa : Device application interface : It is used by the Device and Gateway Applications (DA and GA) to communicate with the local service capabilities, i.e. Device Service Capability Layer (DSCL) and Gateway Service Capability Layer (GSCL).

3.

mId : M2M to device interface : It is used for the inter-SCLs communication.

ETSI M2M service capabilities



Each M2M domain has its own service capabilities layer (i.e. Network SCL, Gateway SCL, and Device SCL), which provides functions that are exposed on the mIa, dIa, mId, and mIm reference point.



Fig. 3.1.3 shows ETSI M2M service capabilities.

3-5

IoT and Applications

IoT Reference Architecture

Fig. 3.1.3 : ETSI M2M service capabilities

Fig. 3.1.4 : Basic entities, deployment view

Note : x in each of the below stands for either N for network, G for gateway, or D for device.

3-6

IoT and Applications

IoT Reference Architecture



NA ....... Network Application



interface mIa = API between applications and service platform

Mandatory :

1.

NAE .... NW Application Enablement capability (communicates with application)

2.

NSEC ... NW Security capability

3.

NRAR ... NW Reachability, Addressing and Repository cap.

4.

NCS .... NW Communication Selection capability

5.

NREM ... NW Remote Entity Management capability

6.

NGC .... NW Generic Device/Gateway)

Communication

capability

(communicates

with

Optional :

1.

NIP ...... NW Interworking Proxy capability

2.

NTM .... NW Transaction Management

3.

NTOE … NW Telco Operator Exposure

4.

NHDR … NW History and Data Retention

5.

NCB ….. NW Compensation Brokerage

1.

Application enablement (xAE) is the single contact point to M2M applications. It exposes functionalities implemented in each of the SCLs via a single reference point : mIa/dIa (depending on the SCL in question).

2.

Generic communication (xGC) is the single point of contact for communication with each of the SCLs. This capability provides transport session establishment and teardown along with security key negotiation, encryption and integrity protection on data exchanged with the SCLs. Key material for the latter is derived upon secure session establishment.

3.

Reachability, addressing and repository (xRAR) provides a map-ping between the name of an M2M entity or a group of M2M entities and their reachability status. It also manages subscriptions and notifications pertaining to events and allows creating, deleting, and listing of a group of M2M entities. It stores M2M application and SCL data, and makes it available on request or based on subscriptions.

4.

Communication selection (xCS) provides network selection, based on policies, when each of the available M2M entities can be reached through several networks

3-7

IoT and Applications

IoT Reference Architecture

or several bearers. It also includes alternative network or communication service selection after a communication failure. 5.

Remote entity management (xREM) acts as a remote management client to perform the device remote entity management functionalities for the M2M entities. It supports several management protocols, such as OMA-DM ] and BBF TR-069.

6.

Security (xSEC) supports M2M service bootstrap and key hierarchy for authentication and authorization procedures. It also initiates mutual authentication and key agreement, and is responsible for the storage and handling of M2M connection keys.

7.

History and data retention (xHDR) is an optional capability deployed when required by policies. It archives relevant information referring to messages exchanged over the reference points and also internally to each of the SCLs based on policies.

8.

Transaction management (xTM) is an optional capability that deals with transactions. Transaction is an operation that involves several atomic operations. This capability triggers a roll-back if any individual operation fails, aggregates the results of the individual operations, and commits the transaction when all individual operations have completed successfully.

9.

Interworking proxy (xIP) is also an optional capability that enables interworking between non-ETSI compliant devices and the SCLs. It can be implemented either as an internal capability of DSCL/GSCL, or an application communicating via reference point dIa with DSCL/GSCL.

10. Compensation brokerage (xCB) is another optional capability deployed only when needed. It submits compensation tokens to requesting customers, bills the customer of compensation tokens after the validity of compensation tokens is verified, and finally refunds service providers for tokens acquired as compensation for services provided to customers. 11. Telco operator exposure (xTOE) enables interworking and using of core network services exposed by the network operator. ETSI M2M resource management (REST)



REST is an architectural style by Roy T.



REST is NOT a protocol



REST is about RESOURCES 3-8

IoT and Applications

IoT Reference Architecture



RESOURCES are UNIQUELY IDENTIFIED by URIs



RESOURCES are STATEFUL



A resource may contain a LINK pointing to another resource



Actions on resources are done through a UNIFORM INTERFACE



The current implementation uses HTTP, but other protocols are also possible.



The ETSI M2M architecture assumes that applications (DA, GA, NA) exchange information with SCLs by performing CRUD (Create, Read, Update, Delete) operations on a number of Resources following the RESTful (Representational State Transfer) architecture paradigm.



Regardless of the protocol in use, resources accept only four operations : CREATE, READ, UPDATE, DELET.

Operation



HTTP Commands

CREATE

POST

UPDATE

PUT

READ

GET

DELETE

DELETE

NOTIFICATION

HTTP SERVER PUSH

Moreover, when a resource is modified, it is possible to have status-change NOTIFICATIONS. These operations can be mapped onto different network protocols. The most common implementation is HTTP.

3.1.2 International Telecommunication Union-Telecommunication Sector View 

The Telecommunication sector of the International Telecommunication Union (ITU-T) has been active on IoT standardization since 2005 with the Joint Coordination Activity on Network Aspects of Identification Systems (JCA-NID), which was renamed to Joint Coordination Activity on IoT in 2011.



The ITU-T IoT domain model includes a set of physical devices that connect directly or through gateway devices to a communication network that allows them to exchange information with other devices, services, and applications.

3-9

IoT and Applications

IoT Reference Architecture



Fig. 3.1.5 shows ITU-T IOT Reference Model.

Fig. 3.1.5 : ITU-T IOT Reference Model



It is composed of four layers as well as management and security capabilities which are associated with the four layers. The four layers are as follows : 1.

Application layer

2.

Service support and application support layer

3.

Network layer

4.

Device layer



Application layer : It contains IoT applications.



Service and application support layer : It consists of common capabilities which can be used by different IoT applications and various detailed capability groupings, in order to provide different support functions to different IoT applications.



Network layer : Provides relevant control functions of network connectivity and IoT services and applications transportation.



Device layer : Includes direct/indirect device interaction with the gateway and communication network.



Management capabilities : How to manage the devices, traffic and etc.



Security capabilities : Includes authorization, authentication, application data confidentiality and integrity protection, privacy protection, security audit, anti-virus and etc.

3 - 10

IoT and Applications

IoT Reference Architecture



Advantages : 1.

It provides a language for everyone involved.

2.

It provides an abstract but also rich view of the domain.

3.

It can assist IoT project leaders in planning the work at hand and the teams needed.

3.1.3 Open Geospatial Consortium Architecture 

The Open Geospatial Consortium (OGC 2013) is an international industry consortium of a few hundred companies, government agencies, and universities that develops publicly available standards that provide geographical information support to the Web, and wireless and location-based services.



OGC Standards used to monitor, model and forecast flood, drought and environmental events. Government agencies can rapidly integrate data from different sensor networks. External (e.g. agricultural) sensor feeds can be incorporated easily to improve prediction and decision making.



Fig. 3.1.6 shows OGC sensor web enablement.

Fig. 3.1.6



The SWE framework can be understood as an architecture consisting of a set of standards defining data formats as well as (web) service interfaces. During the development of the SWE framework, several aims had to be taken into account.



Especially the following goals were the drivers of the design of the SWE architecture : 3 - 11

IoT and Applications

IoT Reference Architecture

1.

Standardized access to sensor measurements (including real-time as well as timeseries data).

2.

Retrieval of metadata for determining sensor capabilities and the quality/reliability of measurements.

3.

Controlling and tasking of sensors.

4.

Alerting based on user defined criteria and sensor measurements.

5.

Access to sensor parameters and automatic processing of measurements based upon pre-defined processes.



The SWE architecture comprises two elementary parts : The Information Model and the Service Model. Whereas the Information Model addresses all aspects related to encoding sensor data and metadata, the Service Model deals with the specification of (web) service interfaces for sensor related functionality.



Sensor Web Enablement standards that have been built and prototyped by members of the OGC include the following pending OpenGIS Specifications : 1.

Observations and Measurements Schema (O and M) : Standard models and XML Schema for encoding observations and measurements from a sensor, both archived and real-time.

2.

Sensor Model Language (SensorML) : Standard models and XML Schema for describing sensors systems and processes; provides information needed for discovery of sensors, location of sensor observations, processing of low-level sensor observations and listing of taskable properties.

3.

Transducer Markup Language (TransducerML or TML) : The conceptual model and XML Schema for describing transducers and supporting real-time streaming of data to and from sensor systems.

4.

Sensor Observations Service (SOS) : Standard web service interface for requesting, filtering and retrieving observations and sensor system information. This is the intermediary between a client and an observation repository or near real-time sensor channel.

5.

Sensor Planning Service (SPS) : Standard web service interface for requesting user-driven acquisitions and observations. This is the intermediary between a client and a sensor collection management environment.

3 - 12

IoT and Applications

IoT Reference Architecture

6.

Sensor Alert Service (SAS) : Standard web service interface for publishing and subscribing to alerts from sensors.

7.

Web Notification Services (WNS) : Standard web service interface for asynchronous delivery of messages or alerts from SAS and SPS web services and other elements of service workflows.

3.1.4 The International Standardization

Telecommunication

Union’s

Telecommunication



The International Telecommunication Union’s Telecommunication Standardization Sector (ITU-T) Study Group 13 has produced ITU-T Y.2060. This standard identifies IoT functional characteristics, high-level requirements and an IoT reference model.



The identified functional characteristics include interconnectivity, things-related services, heterogeneity, dynamic changes and enormous scale. High-level requirements listed for the IoT are identification-based connectivity, interoperability, autonomic networking, location-based capabilities, security, privacy protection, high quality and highly-secure human-body-related services, plug and play and manageability.



Fig. 3.1.7 shows ITU-T model.

Fig. 3.1.7 : ITU-T IoT Reference Model

3 - 13

IoT and Applications

IoT Reference Architecture



The model is divided into four layers : application, service support and application support, network, and device. The model addresses required management capabilities and security capabilities for each layer.



Security is divided into generic and specific security capabilities. Specific capabilities are bound to application requirements; generic capabilities are application independent and defined for each layer.



Authorization and authentication are defined capabilities at the application, network and device layers.



The application layer adds application data confidentiality and integrity protection, privacy protection, security audit and anti-virus capabilities.



The network layer adds use data as well as signalling data confidentiality and signalling integrity protection.



The device layer adds device integrity validation, access control, data confidentiality and integrity protection capabilities.

3.2

Architecture Reference Model

3.2.1 Reference Model and Architecture 

An Architecture Reference Model (ARM) is divided into two main parts : a Reference model and a Reference Architecture.



Reference model : A division of functionality into elements together with the data flow among those elements



Reference architecture : A reference model mapped onto software elements that implements the functionality defined in the reference model.



Typically, generic reference architectures provide architecture team with an outline of their organization-specific reference architecture that will be customized for a specific organization.



The foundation of an IoT Reference Architecture description is an IoT reference model. A reference model describes the domain using a number of sub-models. Fig. 3.2.1 shows IoT Reference Model.

3 - 14

IoT and Applications

IoT Reference Architecture

Fig. 3.2.1 : IoT Reference Model



The reference model consists of domain, information, functional, communication and security models. The domain model is responsible for outlining core concepts in the IoT such as “devices”, “IoT services”, and “virtual entities”.



The information model defines the generic structural properties of information in an IoT system. The functional model identifies groups of functionalities based on the relations defined in the domain model.



The communications model addresses the complexity of communications in IoT environments. The trust, security and privacy (TSP) model is specifically identified by its importance to IoT use-case scenarios and each is addressed separately.



In addition to the IoT reference model, the ARM defines an IoT reference architecture, which is “the reference for building compliant IoT architectures” and includes guidelines intended to guide IoT system architects in creating actual architectures.



When these common language references are established, the domain model adds descriptions about the relationship between the concepts.



The basic model is extended by security capabilities, that is, security is built into each layer and each dimension of the model.



Fig. 3.2.2 shows the IoT architecture model is related to the IoT Reference Architecture.

3 - 15

IoT and Applications

IoT Reference Architecture

Fig. 3.2.2 : IoT architecture model is related to the IoT reference architecture



This figure shows two facets of the IoT ARM : a.

how to actually create an IoT ARM,

b.

how to use it with respect to building actual systems

3.3 

IoT Reference Model IoT reference model to promote common understanding 1.

High abstraction level

2.

Describes the aspects of the IoT domain that do not change

3.

Enables a general discourse on the IoT domain

4.

Provides a domain, information, functional, communication and security models

3.3.1 IoT Domain Model 

A domain model defines the main concepts of a specific area of interest. These concepts are expected to remain unchanged over the course of time, even if the details of an ARM may undergo continuous transformation or evolution over time.



The domain model captures the basic attributes of the main concepts and the relationship between these concepts.

Model notation and semantics



Unified Modeling Language (UML) Class diagram is used to shows the relationships between the main concepts of the IoT domain model.



UML is a diagramming language. It is a modeling language for visualizing, specifying, constructing and documenting the artifacts of software systems.

3 - 16

IoT and Applications

IoT Reference Architecture



Each class is a descriptor of a set of objects that have similar structure, behavior, and relationships. A class contains a name and a set of attributes and operations.

Main Concept :



The IoT is a support infrastructure for enabling objects and places in the physical world to have a corresponding representation in the digital world.



Fig. 3.3.1 shows mapping concept of physical world to virtual world.

Fig. 3.3.1 : mapping concept of physical world to virtual world



As interaction with the physical world is the key for the IoT; it needs to be captured in the domain model (DM). The DM defines the main concepts of the Internet of Things and the relations between these concepts.



User and a Physical Entity are two concepts that belong to the domain model. A User can be a Human User, and the interaction can be physical.



The physical interaction is the result of the intention of the human to achieve a certain goal. Fig. 3.3.2 shows IoT domain model.

3 - 17

IoT and Applications

IoT Reference Architecture

Fig. 3.3.2 (b) : IoT Domain model



A Physical Entity, as the model shows, can potentially contain other physical entities; for example, a building is made up of several floors, and each floor has several rooms.



A Physical Entity is represented in the digital world as a Virtual Entity. A Virtual Entity can be a database entry, a geographical model, an image or avatar, or any other Digital Artifact.



The relations between services and entities are modeled as associations. These associations could be static, e.g. in case the device is embedded into the entity; they could also be dynamic, e.g., if a device from the environment is monitoring a mobile entity. These identified concepts of the IoT domain and the relations between them are depicted in Fig. 3.3.3.

Fig. 3.3.3 : Key concepts and interaction in IoT model



One physical entity can be represented by multiple virtual entities, each serving a different purpose. For the IoT Domain Model, three kinds of Device types are the most important : 1)

Sensors : These are simple or complex devices and contain a transducer that converts physical properties such as temperature into electrical signals. These 3 - 18

IoT and Applications

IoT Reference Architecture

devices include the necessary conversion of analog electrical signals into digital signals. 2)

Actuators : These devices that involve a transducer that converts electrical signals to a change in a physical property.

3)

Tags : Tags in general identify the Physical Entity that they are attached to.

3.3.2 Information Model 

An abstract description (UML diagram or ontology) for explaining information about elements or concepts defined in the IoT Domain Model.



The information model models domain model concepts that are to be explicitly represented and manipulated in the digital world. In addition the information model explicitly models relations between these concepts.



Fig 3.3.4 shows information model. The information model is a meta model that provides a structure for the information. This structure provides the basis for defining the functional interfaces.

Fig. 3.3.4 : IoT Information Model 3 - 19

IoT and Applications

IoT Reference Architecture



IoT Information Model is represented using Unified Modeling Language (UML) diagram. The IoT Information Model maintains the necessary information about Virtual Entities and their properties or attributes.



The information model for an object can contain information about the objects structure and resource types. This can enable APIs to automatically be composed by middleware and automatically consumed by application software.



Additional metadata can indicate context, such as geographical location, and bindings, such as message protocols and event handlers, as well as access control information.



The IoT Information Model describes Virtual Entities and their attributes that have one or more values annotated with meta-information or metadata. The attribute values are updated as a result of the associated services to a Virtual Entity.

3.3.3 Functional Model 

The functional model (FM) is derived from internal and external requirements. Functional view is derived from the Functional Model in conjunction with high-level requirements.



IoT Functional model identifies Functional Groups (FGs) that is, groups of functionalities, grounded in key concepts of the IoT Domain Model.



Functional Model is an abstract framework for understanding the main Functionality Groups (FG) and their interactions. This framework defines the common semantics of the main functionalities and will be used for the development of IoT-A compliant Functional Views.



The Functional Model is not directly tied to a certain technology, application domain, or implementation. It does not explain what the different Functional Components are that make up a certain Functionality Group.



Fig. 3.3.5 shows IoT functional model.



The Application, Virtual Entity, IoT Service, and Device FGs are generated by starting from the User, Virtual Entity, Resource, Service, and Device classes from the IoT Domain Model.



Device functional group contains all the possible functionality hosted by the physical devices. Device functionality includes sensing, actuation, processing, storage, and identification components, the sophistication of which depends on the device capabilities.



Communication functional group support all the communication used by devices. It uses wired and wireless technology. 3 - 20

IoT and Applications

IoT Reference Architecture

Fig. 3.3.5 : IoT functional model



IoT Service functional group : Support functions such as directory services, which allow discovery of Services and resolution to Resources.



Virtual Entity functional group : it is related to the Virtual Entity class in the IoT Domain Model. Associations between Virtual Entities can be static or dynamic depending on the mobility of the Physical Entities related to the corresponding Virtual Entities.



IoT Service Organization functional group : to host all functional components that support the composition and orchestration of IoT and Virtual Entity services.



Finally, the “Management” transversal FG is required for the management of and/or interaction between the functionality groups.



The IoT Process Management FG relates to the conceptual integration of (business) process management systems with the IoT ARM.



The Service Organisation FG is a central Functionality Group that acts as a communication hub between several other Functionality Groups.



The Virtual Entity and IoT Service FGs include functions that relate to interactions on the Virtual Entity and IoT Service abstraction levels, respectively.



The Virtual Entity FG contains functions for interacting with the IoT System on the basis of VEs, as well as functionalities for discovering and looking up Services that can provide information about VEs, or which allow the interaction with VEs.

3 - 21

IoT and Applications

IoT Reference Architecture



Communication FG provides a simple interface for instantiating and for managing high -level information flow. It can be customized according to the different requirements defined in the Unified Requirements list.



The Management FG combines all functionalities that are needed to govern an IoT system. The need for management can be traced back to at least four high-level system goals : Cost reduction; Attending unexpected usage issues; Fault handling and Flexibility.



The Security Functionality Group is responsible for ensuring the security and privacy of IoT-A-compliant systems. It is in charge of handling the initial registration of a client to the system in a secure manner. This ensures that only legitimate clients may access services provided by the IoT infrastructure.

3.3.4 Communication Model 

IoT Communication model introduces concepts for handling the complexity of communication in an IoT environment. It is one FG in the IoT Functional model.



The communicating endpoints or entities are the users, resources, and devices from the IoT domain model. Users include human users and active digital artifacts.



The communication between these users needs to support different paradigms : unicast is the mandatory solution for one-to-one connectivity. However, multicast and anycast are needed for fulfilling many other IoT-application requirements, such as data collection and information dissemination, etc.



Fig. 3.3.6 shows use of communication model.

Fig. 3.3.6 : Use of communication model

Fig. 3.3.7 : IoT specialization of the model 3 - 22

IoT and Applications

IoT Reference Architecture



The device-to-device communication model represents two or more devices that directly connect and communicate between one another, rather than through an intermediary application server. These devices communicate over many types of networks, including IP networks or the Internet.



This communication model is commonly used in applications like home automation systems, which typically use small data packets of information to communicate between devices with relatively low data rate requirements.



In a device-to-cloud communication model, the IoT device connects directly to an Internet cloud service like an application service provider to exchange data and control message traffic.

3.3.5 IoT Security Model 

IoT enables a constant transfer and sharing of data among things and users. In such a sharing environment, authentication, authorization, access control and non-repudiation are important to ensure secure communication.



The high level of heterogeneity, coupled to the wide scale of IoT systems, is expected to magnify security threats of the current Internet. The high number of inter-connected devices arises scalability issues.



IoT systems integrate in a seamless way physical objects, data, and computing devices into a global network of information about “smart things”.



Fig. 3.3.8 shows high level security challenges of IoT.



Access control refers to the permissions in the usage of resources, assigned to different actors of a wide IoT network.



System safety is highly application- or application domain-specific. Trust Model that provides data integrity and confidentiality, and endpoint authentication and nonrepudiation between any two system-entities that interact with each other.



The trust requirements in IoT are related to identify management and access control issues. The IoT-A Privacy Model depends on the following functional components : Identity Management, Authentication, Authorization, and Trust and Reputation.



Communication security : IoT systems are heterogeneous. Not only because of the variety of the entities involved, but also because they include Devices with various capabilities in terms of communication and processing.



Communication Security Model must not only consider the hetereogenity of the system, but it also should guarantee a balance between security features, bandwidth, power supply and processing capabilities. 3 - 23

IoT and Applications

IoT Reference Architecture

Fig. 3.3.8 : IoT security challenges





3.4

IoT devices face many threats, including malicious data that can be sent over authenticated connections, exploiting vulnerabilities. Such attacks frequently exploit many weaknesses, including but not limited to : a)

failure to use code signature verification and secure boot and

b)

poorly implemented verification models which can be bypassed.

Attackers often use those weaknesses to install backdoors, sniffers, data collection software, file transfer capabilities to extract sensitive information from the system, and sometimes even command and control (CandC) infrastructure to manipulate system behavior.

IoT Reference Architecture



IoT Reference Architecture to describe essential building blocks and identify design choices to deal with conflicting requirements.



The IoT Reference Model provides the highest abstraction level for the definition of the IoT-A Architectural Reference Model. It promotes a common understanding of the IoT domain.



The description of the IoT Ref-erence Model includes a general discourse on the IoT domain, an IoT Domain Model as a top-level description, an IoT Infor-mation Model explaining how IoT infor-mation is going to be modelled, and an IoT Communication Model in order to under-stand specifics about communication between many heterogeneous IoT devices and the Internet as a whole. 3 - 24

IoT and Applications

IoT Reference Architecture

3.4.1 Introduction 

Reference Architecture is a starting point for generating concrete architectures and actual systems.



The Reference Architecture is based on the concepts of architectural views and architectural perspectives.



A view is a representation of one or more structural aspects of a reference architecture that illustrates how the reference architecture can be adopted to address one or more concerns held by its stakeholders.



Perspectives : The issues addressed by perspectives are the nonfunctional requirements of the architecture



Architectural views derive from the concerns of stakeholders (i.e., people, groups, or entities with an interest in the realization of the architecture). Views are representations of one or more structural aspects of an architecture that illustrate how the architecture addresses the concerns set by its stakeholders .



Reference Architecture, serves as a guide for one or more concrete system architects. Views are useful for reducing the complexity of the Reference Architecture.



The IoT Reference Architecture does not contain details about the environment where the actual system is deployed, some views cannot be presented in detail or at all.



Reference Architecture as a set of architectural views is as follows : 1)

Functional View : Description of what the system does, and its main functions.

2)

Information View : Description of the data and information that the system handles.

3)

Deployment and Operational View : Description of the main real world components of the system such as devices, network routers, servers, etc.

Purpose of Architectural Reference Models :

1)

Cognitive aid : common language, common concepts

3 - 25

IoT and Applications

IoT Reference Architecture

2)

Reference model as a common grounding

3)

Generation of architectures

4)

Identifying differences and commonalities in derived architectures

5)

Benchmarking

3.4.2 Functional View 

Functional View describes the system’s runtime Functional Components, their responsibilities, default functions, interfaces and primary interactions. The Functional View derives from the Functional Model and reflects the developer’s perspectives on the system.



It will need to be extended with all identified (and recommended) new profile-specific Functional Components including their interfaces and a list of Sequence Charts illustrating recommended usage of those components.



Fig. 3.4.1 shows functional view.

Fig. 3.4.1 : Functional view



The viewpoints used for constructing the IoT Functional View are hence : 1)

The Unified Requirements;

2)

The IoT Functional Model

3 - 26

IoT and Applications

IoT Reference Architecture



Once all Functional Components are defined, the default function set, system use cases, sequence charts and interface definitions are made.



Device and Application functional group : Device functional components contains the sensing, actuation tag, processing and storage components. Application functional group contains standalone application.



Communication functional group : it contains the components for end-to-end communication, network communication, and Hop-by-Hop communication. Description

Communication type End-to-End Communication FC

1) Responsible for end-to-end transport of application layer messages through diverse network and MAC/physical layers 2) Used with mesh radio networking technologies such as IEEE 802.15.4 3) The End-to-End FC interfaces the Network FC on the “southbound” direction.

Hop-by-hop FC

1) Responsible for transmission and reception of physical and MAC layer frames to/from other devices. 2) Two interfaces used : one “southbound” to/from the actual radio on the device, and another for “northbound” to/from the Network FC in the Communication FG.

Network FC

1) Responsible for message routing and forwarding and the necessary translations of various identifiers and addresses. 2) Network FC interfaces the End-to-End Communication FC on the “northbound” direction and the Hop-by-Hop Communication FC on the “southbound” direction.



IoT Service functional group : it consists of IoT Service FC and the IoT Service Resolution FC. Various service implementations are covered in service FC and service resolution FC contains the necessary functions to realize a directory of IoT Services that allows dynamic management of IoT service descriptions.



Virtual Entity functional group : The Virtual Entity FG contains functions that support the interactions between Users and Physical Things through Virtual Entity services.

3 - 27

IoT and Applications

IoT Reference Architecture



Process Management FG : Provides the functional concepts necessary to conceptually integrate the IoT world into traditional (business) processes.



The Process Modeling FC which provides the tools required for modeling IoT-aware business processes that will be serialized and executed in the Process Execution FC, which is responsible for deploying process models to the execution environments.



Service Organization FG : Acts as a communication hub between several other Functional Groups by composing and orchestrating Services of different levels of abstraction.



The Service Orchestration FC resolves the IoT Services that are suitable to fulfill service requests coming from the Process Execution FC or from Users while the Service Composition FC is responsible for creating services with extended functionality by composing IoT services with other services.



Service Choreography FC offers a broker that handles Publish/Subscribe communication between services.



Virtual Entity FG : Provides functionality for the interaction of VEs with the IoT system, for VE look-up and discovery and for providing information concerning VEs. The VE Resolution FC provides discovery services for associations between VEs and IoT.



VE and IoT Service Monitoring FC is responsible for automatically finding new associations based on service descriptions and information about VE’s. the VE Service FC handles entity services.



Service FG : Provides IoT services as well as functionalities for discovery, look-up, and name resolution of IoT Services.



Security FG : It is responsible for security and privacy matters in IoT-A-compliant IoT systems.



1)

The Authorization FC is used to apply access control and access policy management while, the Authentication FC is used for user and service authentication.

2)

Key Exchange and Management (KEM) FC enables secure communications ensuring integrity and confidentiality by distributing keys upon request in a secure way.

Management FG : It is responsible for the composition and tracking of actions that involve the other FGs. 1)

Configuration FC is responsible for initializing the system's configuration. 3 - 28

IoT and Applications

IoT Reference Architecture



2)

The Fault FC is used to identify, isolate, correct and log faults that occur in the IoT system.

3)

The Member FC is responsible for the management of the membership of any relevant entity

The Reporting FC generates reports about the system and, finally, the State FC can change or enforce a particular state on the system by issuing a sequence of commands to the other FCs.

3.4.3 Information View 

Information View provides an overview on how static information (i.e., VEs by means of hierarchies, semantics) and dynamic information (i.e., information processing, storage, flow) is represented.



The information view also describes the components that handle the information, the flow of information through the system and the life cycle of information in the system.



One of the main purposes of connected and smart objects in the IoT is the exchange of information between each other and also with external systems.

Information flow and lifecycle





Information flow in the IoT system uses two paths : 1)

From devices that produce information such as sensors and tags, information follows a context-enrichment process until it reaches the consumer application or part of the larger system

2)

Application or part of a larger system information it follows a context-reduction process until it reaches the consumer types of devices

An IoT system is typically deployed to monitor and control physical entities. Monitoring and controlling physical entities is in turn performed by mainly the devices, communication, IoT services, and virtual entity functional groups in the functional view.



The virtual entity is the key concept of any IoT system as it models the physical entity or the thing that is the real element of interest.



Virtual Entities have an identifier (ID), an entity type and a number of attributes that provide information about the entity or can be used for changing the state of the Virtual Entity, triggering an actuation on the modeled physical entity.

3 - 29

IoT and Applications

IoT Reference Architecture



Services provide access to functions for retrieving information or executing actuation tasks on IoT Devices. Service Descriptions contain information about the interface of the service, both on a syntactic as well as a semantic level, e.g. the required inputs, the provided outputs or the necessary pre-conditions as well as post-conditions.



Information in the system is handled by IoT Services. IoT Services are registered to the IoT system using service descriptions. Service Descriptions can be provided by the services themselves, by users or by special management components that want to make the service visible and discoverable within the IoT system.

General information flow concepts





There are four message exchanges patterns considered for information exchange between IoT functional components. 1)

Push-pattern

2)

Request/Response-pattern

3)

Subscribe/Notify-pattern

4)

Publish/Subscribe-pattern

Fig 3.4.2 shows message exchange pattern.

Fig. 3.4.2



The Push-pattern : It is a one-way communication between two devices (server and client).

3 - 30

IoT and Applications

IoT Reference Architecture



The Request/Response pattern is a synchronous way of communication between two parties. A client sends a request to a server. The server will receive the request and will send a response back to the client. The client is waiting for the response until the server has sent it.



The Subscribe/Notify pattern allows an asynchronous way of communication between two parties without the client waiting for the server response. The client just indicates the interest in a service on the server by sending a subscribe-call to the server. The server stores the subscription together with the address of the client wants to get notified on and sends notifications to this address whenever they are ready to be sent.



The Publish/Subscribe pattern allows a loose coupling between communication partners. There are services offering information and advertise those offers on a broker component. When clients declare their interest in certain information on the broker the component will make sure the information flow between service and client will be established.

Information flow through functional components



Fig. 3.4.3 shows the information request from a user to an IoT Service and the corresponding response.

Fig. 3.4.3 : User requests IoT service

3 - 31

IoT and Applications

IoT Reference Architecture



The IoT Service Resolution implements two main inter-faces, one for the CUD of Service Description objects in the IoT Service Resolution database/store, and one for lookup/resolution/discovery of IoT Services.



The IoT Service Resolution component offers three methods to find IoT Services : 1)

look-up of Service Description based on service identifier;

2)

discovery of Service Descriptions based on service specification;

3)

resolution of service identifier to service locator.

3.4.4 Deployment and Operational View 

Deployment and Operational View depends on the specific actual use case and requirements. Smart object in the IoT uses different methods for communication using different technology.



Hence the Deployment and Operation view is very important to address how actual system can be realized by selecting technologies and making them communicate and operate in a comprehensive way.



It provides an IoT Reference Model with a set of guidelines to application users. The different design choices that they have to face while designing the actual implementation of their services.



The viewpoints used in the Deployment and Operation view are the following : 1)

The IoT Domain Model diagram is used as a guideline to describe the specific application domain.

2)

The Functional Model is used as a reference to the system definition.

3)

Network connectivity diagrams can be used to plan the connectivity topology to enable the desired networking capability of the target application; at the deployment level, the connectivity diagram will be used to define the hierarchies and the type of the sub-networks composing the complete system network;

4)

Device Descriptions can be used to map actual hardware on the service and resource requirements of the target system. IoT Reference Architecture ends…

3 - 32

IoT and Applications

IoT Applications for Value Creations

Syllabus : Introduction, IoT applications for industry: Future Factory Concepts, Brownfield IoT, Smart Objects, Smart Applications, Four Aspects in your Business to Master IoT, Value Creation from Big Data and Serialization, IoT for Retailing Industry, IoT For Oil and Gas Industry, Opinions on IoT Application and Value for Industry, Home Management, eHealth.

Section No.

Topic Name

Page No.

4.1

Introduction

4-2

4.2

IoT Applications for Industry

4-2

4.3

Brownfield IoT

4 - 10

4.4

Smart Objects and Smart Applications

4 - 11

4.5

Four Aspects in your Business to Master IoT

4 - 13

4.6

Value Creation from Big Data and Serialization

4 - 15

4.7

IoT for Retailing Industry

4 - 20

4.8

IoT for Oil and Gas Industry

4 - 21

4.9

Opinions on IoT Application and Value for Industry

4 - 22

4.10

eHealth

4 - 22

4-1

IoT and Applications

IoT Applications for Value Creations

4.1

Introduction



IoT is a wide and rapidly developing area with expected strong and growing implications for the industry. Numerous IoT research and application projects have been done by universities or in joint industry-university consortia in recent years.



Internet of things examples extend from smart connected homes to wearables to healthcare. It is not wrong to suggest that IoT is now becoming part of every aspect of our lives. Not only internet of things applications are enhancing the comforts of our lives but also it giving us more control by simplifying routine work life and personal tasks.



Value creation lies at the core of any business model of an organization and should be a consistent instrument that enhances the value of your organization’s offering and encourages your customers’ willingness to pay.



A business that does not create value to maintain relevance in the evolving marketplace will eventually fail. For this reason, the business model of your organization must be clearly defined and kept central to the innovation process.



Given the technology barrage hitting organizations, replicating popular frameworks and consolidating established business models will not suffice.



Management guru Michael Porter stipulates three generic strategies for value creation: differentiation, cost leadership, and focus.



The users of IoT, including business enterprises, other organizations, and consumers, could capture up to 90 % of the value IoT applications create.



IoT and other technology types can generate a new revenue stream from its potential to increase service offerings. Contracts for IoT services typically specify both price structures and service-level agreements.



For the value proposition it is interesting to look at the revenue model. When a firm delivers services it wants to get something in return in the form of money which comes from the revenue model. The way a firm uses the revenue model can convince customers to stay or choose for the firm.

4.2 

IoT Applications for Industry To define the value of an industrial IoT application or IoT project is difficult. Value can be generated and may show up as a result of a combination of IoT applications with other systems or processes, or can originate in new human behavior or new interactions. Fact is that value is the key element finally asked by the project stakeholders or owners. 4-2

IoT and Applications

IoT Applications for Value Creations

IoT APPLICATIONS - VALUE CREATION FOR INDUSTRY

1.

Visibility identification, location tracking

2.

IoT -supported safety in hard industrial environments

3.

Right information providing or collecting

4.

Improved industrial operation and flows in industry

5.

Reduced production losses

6.

Reduced energy consumption

7.

New type of processes made possible by IoT applications

8.

New type of maintenance and lifetime approaches

9.

Enabled by smart objects, connected aspects.

IoT applications requirements and capabilities



Existing manufacturing field industrial I/O devices including sensors, actuators, analyzers, drives, vision, video, and robotics.



It accommodates large number of nodes and controls latency at various levels of hierarchical processing.



High reliability, high availability, safe and resilience to failure



Provides smarter services (monitoring, alarm management).



Non‐invasive IT integration with operational technology. Operational technology is defined bottom up with different vendor proprietary equipment. Communication network system that works in presence of internet, intermittent internet or, independent and connects to edge nodes for real time processing.



High access security and provision.



Fig. 4.1.1 shows Industrial IoT system architecture.



The common requirements of the IoT are technical requirements independent of any specific application domain.



IoT non-functional requirements refer to the requirements related to the implementation and operation of the IoT itself , i.e.

Interoperability, scalability,

reliability, high availability, adaptability, manageability.

4-3

IoT and Applications

IoT Applications for Value Creations

Fig 4.1.1 : Industrial IoT system architecture





IoT functional requirements refer to the requirements related to the IoT actors, these requirements have been categorized as, 1.

Application support requirements

2.

Service requirements

3.

Communication requirements

4.

Device requirements

5.

Data management requirements

6.

Security and privacy protection requirements.

The IoT application capabilities for industrial application should meet requirements such as : 1.

Reliability: Reliable IoT devices and systems should allow a continuous operation of industrial processes and perform on-site activities.

2.

Robustness. The IoT application and devices should be robust and adapted to the task and hard working conditions.

3.

Simple to use

4.

Low maintains cost

5.

Support optimal and adaptive set of features

6.

It must have reach sensing and data capabilities 4-4

IoT and Applications

IoT Applications for Value Creations



7.

Industry grade support and services. The IoT applications should be supported over years in operation by a set of rich tools and continuously updated services

8.

Support standardization

9.

Security and safety.

The Industrial Internet of Things will be shaped by the appearance of three features: 1.

The enhancement of basic mechanical devices through sensors and other data producing devices (“smartness”);

2.

The possibilities of ever faster and more flexible data allocation, transfer and processing (computing capacities);

3.

The ever increasing digital interconnectivity between the engaged devices and computational capacities (digital integration).

Challenges faced by IoT industry applications

1.

Security. As the IoT connects more devices together, it provides more decentralized entry points for malware. Less expensive devices that are in physically compromised are more subject to tampering.

2.

Trust and Privacy. With remote sensors and monitoring a core use case for the IoT, there will be heightened sensitivity to controlling access and ownership of data.

3.

Complexity : Confusion and integration issues. With multiple platforms, numerous protocols and large numbers of APIs, IoT systems integration and testing will be a challenge to say the least. The confusion around evolving standards is almost sure to slow adoption.

4.

Evolving architectures competing standards. With so many players involved with the IoT, there are bound to be ongoing turf wars as legacy companies seek to protect their proprietary systems advantages and open systems proponents try to set new standards. There may be multiple standards that evolve based on different requirements determined by device class, power requirements, capabilities and uses. This presents opportunities for platform vendors and open source advocates to contribute and influence future standards.

5.

Concrete use cases and compelling value propositions. Lack of clear use cases or strong ROI examples will slow down adoption of the IoT. Although technical specifications, theoretical uses and future concepts may suffice for some early adopters, mainstream adoption of IoT will require well-grounded, customer-oriented communications and messaging around “what’s in it for me.”

6.

There are several wireless standards which can be used to connect devices to a network, most are still developing. That means delays as products play catch‐up with new networking standards. 4-5

IoT and Applications

IoT Applications for Value Creations

4.2.1 Future Factory Concept 









 

The manufacturing sector supports the development of IoT by the provision of smart products. For instance, 43 million wearable bands were shipped in 2015, and it is estimated that 20 million smart thermostats will ship by 2023. By 2016, smart products will be offered by 53 % of manufacturers. At present, the majority of manufacturing plants and production facilities around the world are putting into place systems that will make them adaptive, fully connected, analytical and more efficient. These new manufacturing systems are introducing a new industrial revolution, called Factory of the Future (FoF). This model marks the beginning of a new phase of manufacturing characterized by complete automation and involving an increased use of technology and field devices in and outside of the manufacturing facility. Factories of the future are oriented toward ensuring the availability of all relevant information in real time through the connectivity of all elements participating in the value chain, as well as providing the ability to deduce the optimal value chain processes from this data at the demand of the individual customer. The factory of the future will increase global competitiveness and will require an unprecedented integration of systems across domains, hierarchy boundaries and life cycle phases. Many factors can contribute to establishing factories of the future, but consensus-based standards are indispensable in this process. The benefits of data to factories are across several vectors. These include : 1.

Improved compliance to environmental guidelines; a major challenge for industries at the moment.

2.

Heightened and improved security, reducing loss due to sabotage, pilferage, leakages and human error

3.

Giving your MES system an efficiency boost from process improvement and reduced down time of equipment realized through real-time alerts and predictive analytics

4.

Insights into new product demand from markets thus directly driving RandD spends and design programs

5.

Reduced cost through better demand forecasting, sourcing, supply chain management and inventory control. Smart Factory : 

The convergence of the virtual and physical worlds has given rise to the Smart Factory. This integrates artificial intelligence, machine learning, automation of knowledge work and machine-to-machine communication with the manufacturing process.

4-6

IoT and Applications

IoT Applications for Value Creations



The Smart Factory will fundamentally change how products are invented, manufactured and shipped. At the same time it will improve worker safety and protect the environment by enabling low-emissions and low-incident manufacturing.



Empowered by the Industrial Internet of Things, the factory of tomorrow promises to be a proactive, self-healing environment with increased responsiveness and ability to meet consumer demand.



Manufacturing has made huge progress in recent years. Automation levels have increased in all manufacturing sub-sectors and third party suppliers now have better vertical skills, geographical coverage and greater scalability. The number of products and product variants has exploded. Globalized capability has become the foundation of cost reduction.



Fig. 4.2.1 shows smart factory concept.

Fig. 4.2.1 : Smart factory concept 4-7

IoT and Applications

IoT Applications for Value Creations

1.

2.

3.

Smart Manufacturing Intelligence



Deeper understanding of the manufacturing process through modeling and analysis



New capacity to observe and take action on integrated patterns of operation through networked data, information, analytics, and metrics



Dynamic management of energy and material resources.

Smart Manufacturing Practice

a.

Generating and orchestrating the use of sensor-based, data-driven manufacturing intelligence

b.

Applying integrated performance metrics constructed for real-time action

c.

Reusing, scaling and repurposing integrated practice using a common infrastructure.

Smart Manufacturing Execution

a.

b. 

Dynamic orchestration of decision/action environments without losing control of state

workflows

in

heterogeneous

i.

Across different time constants and seams, including supply chain

ii.

Multi-vendor discrete, continuous, operational and human/social applications

Applications that can share data and data that can share

IoT will generate 4 primary forms of value in terms of manufacturing processes : 1.

Supply Chain Management : IoT can help manufacturers better manage their supply chains

2.

Operating Efficiency : IoT provides manufacturers a comprehensive view of what’s occurring at every point in the production process and helps make real-time adjustments

3.

Predictive Maintenance: Monitor the status of production equipment in real –time. IoT expected to reduce factory equipment maintenance costs by up to 40 %

4.

Inventory Optimization : IoT helps manufacturers better manage inventory. IoT can drive inventory optimization measures that can save 20 to 50 % of factory inventory carrying costs.

IoT and Smart Manufactured Products



All “smart products” share three key components : 1.

Physical components : E.g., Mechanical and electrical parts. 4-8

IoT and Applications

IoT Applications for Value Creations



2.

Smart components : E.g., sensors, microprocessors, data storage, controls, software, an embedded operating system, and a digital user interface.

3.

Connectivity components : E.g., Wireless connectivity, ports, antennas, etc

Fig 4.2.2 shows relation between humans and factories in the past and in the future.

Fig. 4.2.2 : Relation between humans and factories in the past and in the future

Design Implications for Smart Manufacturing Products

1.

Low - cost variability : The software in smart, connected products can make variability far cheaper.

2.

Evergreen Design : Continually upgrading of existing products.

The Augmented Operator



The utilization of the smart product, equipment and infrastructure will lead to a huge amount of available data.

4-9

IoT and Applications

IoT Applications for Value Creations



The human will need to access situation dependent filter mechanisms in order to decode the data noise.



Context information such as the task, the role or the intention of the human as well as the location, product status or costumer information can help to identify the situation and to configure the filter mechanisms.

Security :



In the factory of the future, any physical space connected to cyber space is exposed to the potential threat of a cyber-attack, in addition to concerns regarding its physical security.



To prevent such attacks, which may result in damage and liabilities, security measures are becoming increasingly important for the factory of the future.



Typically, cyber security protection is defined as following the path of confidentiality, integrity and availability which still applies for information system networks. However, factory of the future systems which integrate both physical space and cyber space require a protection priority that follows the path of availability, integrity and confidentiality.

4.3

Brownfield IoT



Brownfield refers to the implementation of new systems to resolve IT problem areas while accounting for established systems.



Brownfield describes the billions of devices and legacy software applications performing discrete functions in isolation. Some of these will require migration strategies to connect with and realize the benefits of IoT.



Brownfield is especially important in industrial IoT, such as smart buildings, bridges, roads, railways and all infrastructure that have been around for decades and will continue to be around for decades more.



Connecting these to the cloud, collecting data and obtaining actionable insights might be even more pertinent than having a light bulb that can be turned on and off with your smart phone.



An Industrial IoT is what will make our cities smarter, more efficient, and create the basis to support the technology of the future, shared economies, fully autonomous vehicles and things that we can’t imagine right now.

4 - 10

IoT and Applications

IoT Applications for Value Creations

Cost-effective Technical Integration of IoT Devices



A developer of IoT technology has to take various technical requirements into account such as energy, communication bandwidth, communication topology or processing resources of different IoT systems.



Loosely coupled, document-based Web services provide a well-defined path to configuration and measurement data from wireless ad hoc systems and automation systems, however, have the disadvantage of a very high runtime overhead. 1.

Standardized ways must be found to obtain comparable quality data sets with opportunistic, distributed measurements.

2.

Live data acquisition, needs a high throughput of data to ensure that, while energy efficiency of the hardware, requires a high efficiency of bandwidth usage.

Cost-effective Process Integration of IoT Devices



4.4

IoT enabled processes needs to be cost-effective by design and well integrated. Global interoperability in contrast to global connectivity and the use of mobile devices can enable the user to access IoT services ad-hoc.

Smart Objects and Smart Applications



Smart Object is a bi-directional communicating object which observes its environment and is able to make decisions depending on the application and based on the information extracted from the physical world.



Smart object is an item equipped with a form of sensor or actuator, a tiny microprocessor, a communication device, and a power source.



Fig. 4.4.1 shows use of smart object in IoT.

Fig. 4.4.1 4 - 11

IoT and Applications

IoT Applications for Value Creations



The sensor or actuator gives the smart object the ability to interact with the physical world. The microprocessor enables the smart object to transform the data captured from the sensors at a limited speed and at limited complexity.



The communication device enables the smart object to communicate its sensor readings to the outside world and receive input from other smart objects. The power source provides the electrical energy for the smart object to do its work.



For smart objects, size matters. They are significantly smaller than both laptops and cell phones. For smart objects to be embedded in everyday objects, their physical size cannot exceed a few cubic centimeters.



Wireless sensor networks have evolved from the idea that small wireless sensors can be used to collect information from the physical environment in a large number of situations ranging from wild fire tracking and animal observation to agriculture management and industrial monitoring.



Each sensor wirelessly transmits information toward a base station. Sensors help each other to relay the information to the base station.



The ISO/IEC JTC1/WG7 Working Group on Sensor Networks has designed reference architecture Fig. 4.4. 2, which separates the sensor node functionality into three layers : 1.

Communication layer : Describes the communication protocol for the interaction of a smart object with other smart objects, an infrastructure or backbone networks.

2.

Service layer : Represents a set of functions commonly required, such as sensor information gathering, filtering by various policies and rules, data comparison and analysis, data mining, context mod-ling, context-aware processing, selflocalization, context-aware decision and estimation.

3.

Application layer : Realizes the use case of a smart object by a set of functions to users to meet defined requirements.



The communication layer is responsible for low-level communication issues, such as device discovery, topology construction, connection establishment, and data transfer.



The application layer supports programmers in implementing context-aware services. Generally, context-aware applications have four parts : 1.

Basic application behavior, i.e., functionality that does not depend on context changes,

2.

Adaptive application behavior, which describes how an application reacts to changing situational context,

3.

Section that specifies how to derive context from local and remote sensor readings, and 4 - 12

IoT and Applications

IoT Applications for Value Creations

4.

Part that specifies how to access sensors.

Fig. 4.4.2 : Architecture overview of interconnected smart objects



From the users prospect the smartness of a smart object is realized within the service and the application layers.



The technical challenges for smart objects include the node-level internals of each smart object, such as power consumption and physical size, as well as the network-level mechanisms and structures formed by the smart objects.

4.5 

Four Aspects in your Business to Master IoT Every business has unique global trade management issues. These issues are based on factors such as the geographic locations of where products are sourced, manufactured, and shipped; the volumes that are being imported and exported; the compliance and security regulations of each destination country; the multitude of free trade agreements and foreign trade zones; the number of trade and manufacturing partners involved in the supply chain; and the level of in-house trade expertise available. In addition, an organization’s needs may change from year-to year and from location-to-location.

4 - 13

IoT and Applications

IoT Applications for Value Creations



In recent years, the internet has transformed communications, the media landscape, commerce and the music industry.



The Internet of Things is the next generation of the internet. It is a global system of interconnected computer networks, sensors, actuators, and devices that use the internet protocol to potentially connect every physical object.



Four aspects of the Internet of Things and Services are technology, business innovation, market and competencies.



Various IoT technologies can be conventionally categorized into tagging things, sensing things and embedded things. The tagging things provide seamless and costefficient item identification, allowing the things to be connected with their records in databases.



The sensing things enable us to measure and detect changes in the physical status of our environment. Finally, the embedded things yield information about the internal status of the embedding object.



Over the last decade, these technologies have been developed rapidly in the domains of, the Radio-Frequency Identification (RFID), Machine-to-Machine (M2M) Communication and Machine-type Communication (MTC), Wireless Sensor and Actuator Networks (WSAN), ubiquitous computing, and web-of-things.



The IoT field is relatively young, and still dominated by the silos of vertically integrated solutions based on incompatible technologies, with each having a relatively limited marked penetration.



However, the adoption of the various IoT technologies is expected to expand rapidly in the upcoming years, and it will be reflected in the number of connected things, expected revenues, and annual growth rates.

Connected industry



The Internet of Things in production and logistics is coined with the term “Industrie 4.0” in Germany. The term ‘Industry 4.0’ stands for the fourth industrial revolution.



While Industry 3.0 focused on the automation of single machines and processes, Industry 4.0 focuses on the end-to-end digitization of all physical assets and integration into digital ecosystems with value chain partners.



Generating, analyzing and communicating data seamlessly underpins the gains promised by Industry 4.0, which networks a wide range of new technologies to create value.



Industry 4.0 digitises and integrates processes vertically across the entire organisation, from product development and purchasing, through manufacturing, logistics and service. Fig. 4.5.1 shows Industry 4.0 4 - 14

IoT and Applications

IoT Applications for Value Creations

Fig. 4.5.1 : Industry 4.0



Digitisation of products includes the expansion of existing products, e.g. by adding smart sensors or communication devices that can be used with data analytics tools, as well as the creation of new digitised products which focus on completely integrated solutions.



Digital business models and customer access : Leading industrial companies also expand their offering by providing disruptive digital solutions such as complete, datadriven services and integrated platform solutions

4.6

Value Creation from Big Data and Serialization



Serialization is the process of transforming objects or data entities into bytes for persistence (in memory or on disk) or transportation from one machine to another over a network.



Serialization engine provides the ability to serialize and deserialize data in a Big Data platform. In Big Data platforms, serialization is required for establishing communication between machines by exchanging messages between them, and for persisting data.



The serialized bytes can either be encoded using a binary format or a plain-text format. Different serialization engines may provide different levels of speed, extensibility and interoperability. 4 - 15

IoT and Applications

IoT Applications for Value Creations



Serialized identifiers are the keys to building an Internet of Things; just as unique IP addresses are integral to the web itself.



Big Data is data which cannot be handled by traditional technologies.



Big data is about the processing and analysis of large data repositories, so disproportionately large that it is impossible to treat them with the conventional tools of analytical databases.



Machines generate data at higher speed and their production rates will grow exponentially with Moore’s Law. Storing this data is cheap, and it can be mined for valuable information.



Big data requires exceptional technologies to efficiently process large quantities of data within a tolerable amount of time.



Technologies being applied to big data include Massively Parallel Processing (MPP) databases, data-mining grids, distributed file systems, distributed databases, cloud computing platforms, the Internet, and scalable storage systems.



These technologies are linked with many aspects derived from the analysis of natural phenomena such as climate and seismic data to environments such as health, safety or, of course, the business environment.



Fig. 4.6.1 shows dimension of big data. Big data is characterized by three “Vs”: volume, velocity and variety.

Fig. 4.6.1 : Dimension of big data

1.

Volume : datasets who size runs into petabytes and beyond.

4 - 16

IoT and Applications

IoT Applications for Value Creations

2.

Variety: data who form could be structured or unstructured.

3.

Velocity: data that comes into the processing environment very fast.



Technological growth and easy access to sophisticated gadgets have led to a digital data explosion. Complex data generated by network traffic and collected from applications and process logs, outputs from numerous digital devices, interactions on the web and social media sites, digital photographs, satellites, are common examples of Big Data.



Big Data is generated in the form of RFID and sensor data from medical devices and pharmaceutical manufacturing organizations, raw data from various state-of-the-art machines that process blood samples, tissues and so on. This large volume of data can be processed using a Big Data platform to support scientific analytics.



Other sources of Big Data include websites, digital data sellers, organizational data in the form of documents, images, email messages, result datasets generated out of various experiments, and so on.

Big data in the pharmaceutical industry



From research records and patient information to utilization details and supply chain monitoring, pharmaceutical firms have been managing vast amounts of data for years.



Pharmaceutical companies need to spend less time preparing data sets for analysis and more time discovering insights that they can turn into business value, such as : a.

Identifying trial candidates and accelerating their recruitment

b.

Designing better inclusion and exclusion criteria for clinical trials

c.

Conducting virtual trials to build predictive models

d.

Uncovering unintended uses and indications for products

e.

Researching competitive products for strategic advantage.

Tracking serialized products



The pharmaceuticals industry has struggled to ensure the integrity of its products as they are transferred between the different stops on the value chain from contract manufacturers to wholesalers to dispensers and finally to the patient. This is particularly true as products move across international borders. And the problem has been growing.



In the first phase of implementing serialization the pharmaceutical industry is adopting 2D optical bar code as a transport and the GS-1 serialized Global Trade identification Number (sGTIN) symbology.



In tracking physical goods there is some debate about whether e-Pedigree specifications should include a requirement for tracking the aggregation/disaggregation of each item as it moves across the supply chain, adding expense to the process.

4 - 17

IoT and Applications

IoT Applications for Value Creations



Three major models for serialization and track and trace reporting. These include : 1.

China Food and Drug Administration (CFDA) serialization requirements, which use government issued serial numbers that are reported back to a central government database.

2.

The EU’s European Stakeholder Model, which is based on the European Medicines Verification System (EMVS) where manufacturers upload serialized information to a central institutional hub for verification.

3.

The U.S. model which requires lot traceability shared with each member of the value chain in 2015, individual saleable package serialization by 2017 and verification at the point of dispensing by 2023.



Serialization regulations will of course go a long way toward protecting patients from dangerous counterfeit drugs, and life sciences companies from lost revenues and potentially brand disrupting recalls.



Significant investments will be required, for example, to make packaging lines capable of managing serialization.



Serialization will generate massive amounts of data for global companies that will need to be retained for many years to meet compliance requirements.



This serialized information will need to be readily accessible and highly responsive to support business processes that require sub-second authentication, and to provide easy access for regulatory compliance, including investigations and statutory reporting.



We believe serialized data will also provide a rich repository of information for business value and insight, not only in terms of supply chain integrity but also for improving responsiveness, insight and financial transparency in areas such as contracts and charge backs.

4 - 18

IoT and Applications

IoT Applications for Value Creations



Creating a global, scalable serialization architecture to manage a complete end-to-end business process is critical.

Value of supply chain data



The supply chain encompasses all of those activities associated with moving goods from the raw-materials stage through to the end user.



To remain competitive, companies must seek new solutions to important Supply Chain Management issues such as modal analysis, supply chain management, load planning, route planning and distribution network design.



Companies must face corporate challenges that impact Supply Chain Management such as reengineering globalization and outsourcing.



Supply Chain Management has an important role to play in moving goods more quickly to their destination.



Product identifiers on a label can serve as a “key” to information about the processes and conditions through which the product has travelled.



Supply chain management department functions : 1.

Inventory management

2.

Transportation service procurement

3.

Materials handling

4.

Inbound transportation

5.

Transportation operations management

6.

Warehousing management.

Legal information flows





Legal issues around data exchange can be divided into two separate parts : 1.

The question of jurisdiction over data,

2.

Within that con-text, what party(s) own the data.

For example : In the US , despite a common interest in ensuring efficient oversight and promoting safe and environmentally friendly products, the FDA has not been active in developing national standards on transportation and drug packaging.

Finance flows



Every step in the development, clinical trials, manufacturing, distribution and service delivery of a biologics product involves massive amounts of data.

4 - 19

IoT and Applications

IoT Applications for Value Creations



Extensive industry guidelines and best practices are established for the use of this information in specific contexts such as quality control or product authentication.



A parallel assessment of data asset values, liabilities and exchange mechanisms for these data assets is warranted in light of pharmaceutical development, technology transfer, commercial manufacturing and product discontinuation processes.

4.7 

IoT for Retailing Industry The Internet of Things (IoT) is transforming the Retail Industry. There are four broad IoT application areas within retail 1.

Sensors - fitted in refrigeration and lighting equipment can lead to automated energy usage and provide retailers huge energy savings. This will help retailers reduce their carbon footprint which will resonate with shoppers, leading to better loyalty.

2.

Leveraging existing CCTV cameras for Video Analytics can trigger real-time automated alerts that help store associates replenish shelves just in time and serve customers in need. This not only improves conversion and customer experience, but also leads to effective labor utilization.

3.

Using RFID and IoT sensors, retailers can get better visibility into inventory and perishables. IoT can enable dynamic re-routing of delivery vans based on weather forecasts and live traffic updates. All of these result in cost savings and improved customer satisfaction.

4.

Using in-store sensors and video feeds, retailers can analyze and understand customer hot spots, dwell times and flow patterns improving store layouts and promotional placements. This will result in a better shopping experience and higher revenues.



Retailers gain a deeper understanding of the customer’s path to purchase, preferences and shopping habits, which can be used in a variety of ways to optimize various customer touch points and build differentiation as well as strong brand perception. Rich insights gained from deploying sensor-based solutions provide a multitude of options to improve operations across various retail functions.



Digital technologies such as mobility, big data, NFC, augmented reality, sensors and cloud computing provide opportunities to redefine retail stores like never before.

4 - 20

IoT and Applications

IoT Applications for Value Creations

4.8

IoT for Oil and Gas Industry



Unconventional resources challenge the oil industry. Exploration and development of oil and gas reservoirs require new sensors, analytics, and processes. Systems require better connectivity, monitoring and control, and process automation.



Process industry in general and Oil and Gas in particular put special requirements on field devices. Devices have to operate under harsh conditions; dirt, often high temperatures and sometimes in explosion prone environments. It is a challenge to develop a field device that not only is easy to install and maintain, have a long enough life length but also withstand this tough environment.



Modern process control systems often have the facility to pass HART commands through the I/O modules so that instrument configuration can be modified at the host system level.



At a time when well drilling and completion complexities are increasing and field experts are becoming scarcer, automation offers many benefits. Besides capturing domain knowledge, automation increases safety and decreases personnel time on-site and therefore lowers cost.



The data generated from a single well can be sizeable; a large field of wells can produce massive amounts of valuable information. Industrial Internet technology can tackle the large-scale collection across an entire site. The proven results include better asset utilization across all wells, reduced effluents, and accelerated production.



All of the components of the system under study must be integrated such that information can be reliably gathered. This is especially critical for real-time analytics that directly drive process improvements and production optimizations.



Data flows can be secure, independent of protocols, roles, and nodes. The security model allows protection of every dataflow.



Some of the small AC motors on an oil rig are highly critical with respect to regularity, some are critical with respect to safety if for instance placed in explosion proof zone.



Larger machines are normally always monitored but for these smaller AC motors then prevailing maintenance strategy was “run-to-failure” due to their high numbers of up to 1000 units per offshore installation and the cost associated with monitoring them.



WiMon 100 is a battery operated device with an expected lifetime of five years. Due to the cost efficiency, small size and ease of installation and commissioning of the WiMon100 sensor, on line vibration monitoring can now be realized for all types of rotating machines.

4 - 21

IoT and Applications

IoT Applications for Value Creations



WiMon100 unit contains a vibration sensor, a temperature sensor, a long-life battery and communicating using Wireless HART.



It form a mesh communication network, if configured for routing, provide a secure, reliable and redundant path from WiMon 100 sensor to a gateway and onwards to monitoring and analysis toolkits.



The WiMon Data Manager handles data acquisition and storage as well as providing a user interface for commissioning, configuration, network operation and machine supervision and analyses.

4.9

Opinions on IoT Application and Value for Industry



The Internet of Things (IoT) is undeniably transforming the way that organizations communicate and organize everyday businesses and industrial procedures. Its adoption has proven well suited for sectors that manage a large number of assets and coordinate complex and distributed processes.



The impact of IoT in the commercial sector results in significant improvements in efficiency, productivity, profitability, decision-making and effectiveness. IoT is transforming how products and services are developed and distributed, and how infrastructures are managed and maintained. It is also redefining the interaction between people and machines.



IoT represents the convergence of several interdisciplinary domains: networking, embedded hardware, radio spectrum, mobile computing, communication technologies, software architectures, sensing technologies, energy efficiency, information management, and data analytics.



The rapid growth of IoT is driven by four key advances in digital technologies. 1.

Minizing cost and miniaturization of ever more powerful microelectronics such as sensors and actuators, processing units, Field-Programmable Gate Array and receivers.

2.

Fast pace and expansion of wireless connectivity.

3.

Expansion of data storage and the processing capacity of computational systems.

4.

Advent of innovative software applications and analytics, including advancements in machine-learning techniques for big data processing.

4.10 eHealth 

The World Health Organization [WHO] defines e-Health as : E-health is the transfer of health resources and health care by electronic means. It encompasses three main areas : 4 - 22

IoT and Applications

IoT Applications for Value Creations

The delivery of health information, for health professionals and health consumers, through the Internet and telecommunications. 

E-health provides a new method for using health resources - such as information, money, and medicines - and in time should help to improve efficient use of these resources.



eHealth brings special characteristics. The monitoring device’s environment is a patient; a living and breathing human being. This changes some of the dynamics of the situation. Human interaction with the device means batteries could be changed, problems could be called in to technical support and possibly be resolved over the phone rather than some type of service call. In most cases, the devices on the patient are mobile not static with regard to location.



Fig. 4.10.1 shows High Level e-Health ecosystem Architecture.

Fig. 4.10.1 : High Level e-Health ecosystem architecture



The data flow architecture focuses on the source of the data, the destination the data and path the data. The source of the data is typically the sensor.



The data can be either locally cached or is sent to the upstream systems without storing in the sensor. The path taken by the data includes a gateway, which can also cache some of the data and do distributed processing.



Intermediate hubs can also store and process the data to filter out or make certain decisions. A distributed rules engine is used to make distributed decisions at the closest point of care. This enables data traffic to be filtered and processed efficiently without having every data being processed by the cloud service 4 - 23

IoT and Applications

IoT Applications for Value Creations



The development of wireless networks has led to the emergency of a new type of e-healthcare system, providing expert-based medical treatment remotely on time.



With the e-healthcare system, wearable sensors and portable wireless devices can automatically monitor individuals' health status and forward them to the hospitals, doctors and related people.



The system offers great conveniences to both patients and health care providers. For the patients, the foremost advantage is to reduce the waiting time of diagnosis and medical treatment, since they can deliver the emergent accident information to their doctors even if they are far away from the hospital or they don't notice their health condition.



In addition, e-health system causes little interruption to patients' daily activities. For the health care providers, after receiving the abnormal signals from the patients, appropriate treatment can be made, which saves medical resources.



Furthermore, without direct contact with medical facilities, medical personnel or other patients, the patients are unlikely to be infected with other diseases.



However, to ensure the security and privacy of patients' medical records encounters a lot of challenges :



1.

How to achieve the confidentiality and integrity of patients' information,

2.

The security of wireless body area network,

3.

The privacy and unlink ability of patients' health status,

4.

The undeniability and unlinkability of doctors' treatment,

5.

The location privacy of patients, the fine-grained access control of patients' medical record, the mutual authentication between patients and hospitals, etc.

It would be useful to create an up-to-date bibliography on secure e-healthcare systems. IoT Applications for Value Creations ends ….. 4 - 24

IoT and Applications

Internet of Things Privacy, Security and Governance

Chapter - 5 INTERNET OF THINGS PRIVACY, SECURITY AND GOVERNANCE Syllabus :

Introduction, Overview of Governance, Privacy and Security Issues, Contribution from FP7 Projects, Security, Privacy and Trust in IoT-DataPlatforms for Smart Cities, First Steps Towards a Secure Platform, Smartie Approach. Data Aggregation for the IoT in Smart Cities, Security.

Section No.

Topic Name

Page No.

5.1

Introduction

5-2

5.2

Overview of Governance, Privacy and Security Issues

5-2

5.3

Contribution from FP7 Projects

5-3

5.4

Security, Privacy and Trust in IoT-Data-Platforms for Smart Cities

5-9

5.5

Data Aggregation for the IoT in Smart Cities

5 - 11

5-1

IoT and Applications

Internet of Things Privacy, Security and Governance

5.1

Introduction



The Internet of Things" (IoT) refers to the capability of everyday devices to connect to other devices and people through the existing Internet infrastructure.



Devices connect and communicate in many ways. Examples of this are smart phones that interact with other smart phones, vehicle-to-vehicle communication, connected video cameras, and connected medical devices.



They are able to communicate with consumers, collect and transmit data to companies, and compile large amounts of data for third parties.



This increased connectivity raises a myriad of consumer privacy and data security issues. Government agencies, like the Federal Trade Commission, are concerned with issues such as data security, mobile privacy, and big data.



The development of the IoT means that companies preserve privacy. Among other things, this involves adopting privacy and data security best practices, only collecting consumer information with express consumer consent, and providing consumers with access to their data



IoT is broad term, which indicates the concept that increasingly pervasive connected devices will support various applications to enhance the awareness and the capabilities of users. For example, users will be able to interact with home automation systems to remotely control the heating or the alarm system.

5.2

Overview of Governance, Privacy and Security Issues



Governance, security and privacy are probably the most challenging issues in the Internet of Things.



As per European Union (EU), ‘governance’ refers to the rules, processes and behaviour that affect the way in which powers are exercised, particularly as regards openness, participation, accountability, effectiveness and coherence.



These five "principles of good governance" reinforce those of subsidiary and proportionality. The concept of Governance have been already applied to the Internet for specific aspects and there are already organizations like IETF, ICANN, RIRs, ISOC, IEEE, IGF, W3C, which are each responsible and dealing with a specific area.



Size and heterogeneity are the two main components that affect the governance of IoT.

5-2

IoT and Applications

Internet of Things Privacy, Security and Governance



Heterogeneity requires security to overcome the impossibility of implementing efficient protocols and algorithms on all the devices involved across the many IoT application areas.



Without guarantees in security, stakeholders are unlikely to adopt IoT solutions on a large scale. For this reason, the development of enforcement techniques to support scalability and heterogeneity, to anonymize users’ data and to allow context aware data protection are key factors.



In the IoT context, it is difficult to separate the concepts of Governance, Security and Privacy, because addressing privacy and security aspects to achieve trust in IoT would probably need governance mechanisms as well.



The security and privacy framework has to provide features to dynamically adapt access rules and information granularity to the context.

5.3

Contribution from FP7 Projects



FP7 means 7th Framework Programme for research and technological development. It will last for seven years from 2007 until 2013. The programme has a total budget of over € 50 billion.



FP7 is a key tool to respond to Europe's needs in terms of jobs and competitiveness, and to maintain leadership in the global knowledge economy.

5.3.1 FP7 iCore Access Framework 

The iCore cognitive framework is based on the principle that any real world object and any digital object that is available, accessible, observable or controllable can have a virtual representation in the “Internet of Things”, which is called Virtual Object (VO).



iCore initiative addresses two key issues in the context of the Internet of Things (IoT), namely how to abstract the technological heterogeneity that derives from the vast amounts of heterogeneous objects, while enhancing reliability and how to consider the views of different stakeholders for ensuring proper application provision, business integrity and, therefore, maximize exploitation opportunities.



The iCore proposed solution is a cognitive framework comprising three levels of functionality, reusable for various and diverse applications. The levels under consideration are Virtual Objects (VOs), Composite Virtual Objects (CVOs) and functional blocks for representing the stakeholder perspectives.

5-3

IoT and Applications

Internet of Things Privacy, Security and Governance



Virtual objects are cognitive virtual representations of real‐world objects (e.g. sensors, devices, everyday objects) that hide the underlying technological heterogeneity.



The iCore solutions will be equipped with essential security protocols/functionality, which span all levels of the framework, and consider the ownership and privacy of data, as well as controlling the actual access to objects.



A Virtual Object (VO) is the virtual representation of Real-World Objects (RWOs). RWOs may be either digital objects with Information and Communication Technologies (ICT) capabilities or non-ICT objects.



ICT objects include objects such as sensors, actuators, smart phones, etc. ICT objects may have a physical location and may offer various functions such as environmental condition measurements, location of objects /person, monitoring of places for security reasons, etc.



The VO registry includes information about VOs that are available in the system. Each VO is identified by a Uniform Resource Identifier (URI) and contains information on the association with an ICT object.

5.3.2 IoT@Work Capability Based Access Control System 

Resources’ protection requires the resource provider be able to know which client is accessing what resources for doing what. Information about clients and about their purposes when accessing a specific resource is critical for a resource provider to grant or deny the requested operation.



The most common form of access control is based on Access Control Lists (ACLs), which assign access rights to specific subjects.



Capability-Based Access Control (Cap-BAC) : A capability is a communicable, unforgeable rights markup, which corresponds to a value that uniquely specifies certain access rights to objects owned by subjects.



In Cap-BAC, the user needs to show the service provider the authorization certificate prior to performing corresponding resource request operations.



Fig. 5.3.1 shows traditional ACL-based access control and access control using capability based messaging.

5-4

IoT and Applications

Internet of Things Privacy, Security and Governance

Fig. 5.3.1(a) : Traditional ACL-based access control

Fig. 5.3.1(b) : Access control using capability based messaging



Authorization certificates are issued by the owner of a resource/service to desired users, in order to ensure that the users can request resources or services.



The IoT@Work capability based approach supports : Access right delegation, capability tokens revocation, fine-grained access rights. Token elements are based on the SAML/XACML standards.



The resource manager creates a first capability token that assigns rights to itself as the owner of the capability on resources.



The capability token contains other information and is digitally signed by the issuer. The server that is in charge of managing access to the specified resource has to trust the resource manager and, therefore, its root capability.



The resource manager can generate new capability tokens for other users using its root capability, granting them one or more of its rights. It can also flag some or all of the granted rights as delegable so they can create further capability tokens on their own.

5-5

IoT and Applications

Internet of Things Privacy, Security and Governance

The new capability token has to be digitally signed by the issuer and includes the capability token of the issuer. 

The resource PDP (Policy Decision Point) is the service in charge of managing resource access request validation and decision.

5.3.3 GAMBAS Adaptive Middleware 

GAMBAS means Generic Adaptive Middleware for Behavior-driven Autonomous Service.



Fig. 5.3.2 shows the overall system architecture. GAMBAS deployment consists of different systems.



The mobile systems of the citizens are acting as both data sources and data sinks. The city systems from different layers are managing data and providing services to the mobile systems. To do this, they may rely on information provided by other services as well as data provided by the mobile systems.



In most cases, information is accessed via the web which requires persons to memorize long URLs, click through web pages or browse through search results.

Fig. 5.3.2 : Overall system architecture

5-6

IoT and Applications

Internet of Things Privacy, Security and Governance



Furthermore, they may integrate data from legacy systems and they may be receiving data from other systems through existing means. For example, a transport system might already be collecting information through sensors deployed in a city or in vehicles. Similarly, it may already have access to geographic data describing the different roads in the city.



The GAMBAS middleware will enable the development of novel applications and Internet-based services that utilize context information in order to adapt to the behavior of the user autonomously.

Fig. 5.3.3 : GAMBAS middleware



To do this, the middleware will provide the means to gather context in a generic, yet resource-efficient manner and it will support the privacy-preserving sharing of the acquired data.



Thereby, it will apply interoperable data representations which support scalable processing of data gathered from a large number of connected objects.



In order to make the resulting novel services accessible to the user, the middleware will also support intent-aware interaction by providing a constant stream of relevant recommendations for services.

5-7

IoT and Applications

Internet of Things Privacy, Security and Governance



From a security and privacy perspective, the developments in GAMBAS are centered on a secure distributed architecture in which data acquisition, data storage and at a processing are tightly controlled by the user.



To store and manage data of services as well as data generated by devices, the GAMBAS runtime encompasses a data processing component. Internally, the data processing component itself is structured in three sub-components that (a) Store the data, (b) Query for data and (c) Discover data.



The GAMBAS middle-ware simplifies the development of smart city applications focusing on three common tasks, namely efficient data acquisition, secure and privacypreserving data distribution as well as interoperable data integration

5.3.4 Governance, Security and Privacy in the Butler Project 

The goal of the BUTLER project is the creation of an experimental technical platform to support the development of the Internet of Things.



BUTLER brought together a consortium of 19 partners, innovative companies, research and academic institutions, end-user centric service providers and business experts from eight European countries.



BUTLER focused on five “innovation eco-systems” that are part of most people’s daily lives : 1)

Smart homes and offices;

2)

Smart shopping;

3)

Smart mobility and transport;

4)

Smart healthcare and wellness; and

5)

Smart cities.



The BUTLER services are based on state-of-the-art network communication protocols that enable reliable communication using secured protocols that are adapted to the limited capacity of the devices that are part of the network.



The researchers involved used context information to develop algorithms to improve trust, security and privacy that satisfy the needs of both users and infrastructure providers.



The main achievement of the BUTLER project is the release of an open-platform portal that provides a map of open technologies that can be used to create Internet of Things applications.

5-8

IoT and Applications

Internet of Things Privacy, Security and Governance



The platform can also be used to document their interoperability, relationships, and reference to existing use cases, infrastructures and deployments.



BUTLER provides an authorization server as a security service path distinct from the application path. The authorization server and the managed resources share bootstrap security credentials enabling generation of session keys.



The authorization server authenticates user and application for providing the application with access token and session keys for accessing a specific resource.



BUTLER provides also a threat analysis model that could be used to evaluate the threat on dedicated use cases and scenarios.

5.4

Security, Privacy and Trust in IoT-Data-Platforms for Smart Cities



SMARTIE is a secure and smarter cities data management system. The SMARTIE project works on security, privacy and trust for data exchange between IoT devices and consumers of their information.



A secure, trusted, but easy to use IoT system for a smart city will benefit the various stakeholders of a smart city.



The city administration will have it easier to get information from their citizens while protecting their privacy.



Furthermore, the services offered will be more reliable if quality and trust of the underlying information is ensured.



Fig. 5.4.1 shows the components of a typical smart city information system.

Fig. 5.4.1 : Components of a typical smart city information system

5-9

IoT and Applications

Internet of Things Privacy, Security and Governance



Privacy and trust are a key prerequisite for citizens to participate in Smart City activities. A smart city can improve the smart and comfort live of their citizens enormously.



Enterprises benefit from the securely provided information. They can optimize their business processes and deal with peak demands introduced by the dynamics of the smart city. Furthermore, they can offer more tailored solutions for their customers based on the status of the smart city.



All parties involved in the overall systems such as sensors and actuators, end users, data owners but also service providers need strong mechanisms for reliability and trust.



The Objectives of SMARTIE are 1)

Understanding requirements for data and application security and creating a policy-enabled framework supporting data sharing across applications.

2)

Developing new technologies that establish trust and security in the perception layer and network layer.

3)

Develop new technologies for trusted information creation and secure storage for the information service layer.

4)

Develop new technologies for information retrieval and processing guided by access control policies in the application layer.

5)

Demonstrate the project results in real use cases.

Why risk mitigation is a top priority for smart cities



Due to the large number of connected devices that make up a smart city's digital infrastructure, enhanced security management for gateway devices, such as Industrial Control Systems (ICS) and IT Systems (ITS), is critical to prevent data breach or leakage.



Leakage of sensitive data can lead to a lock-down of critical services.



A smart city framework deals with huge volumes of data that is generated as a result of communication between various interdependent subsystems and the interactions between devices and citizens.



Protection of such private and sensitive information, especially citizen data, is of utmost importance. Further, any incident of data breach or data loss can damage citizens' perception of security in a smart city.



Other information security concerns include interception of wireless data in transit between senders and receivers, leakage of confidential information, and viruses in devices such as sensors. 5 - 10

IoT and Applications

Internet of Things Privacy, Security and Governance



Cloud-based information services and data storage in smart cities can also be compromised through hacking and other subversive activities.



An attacker can simultaneously attack on multiple layers :

5.5

1)

Manipulate the sensor measurements to infiltrate the system with wrong data, e.g. to cause certain actuations.

2)

Attack the sensors and actuators physically to obtain credentials.

3)

Attack or impersonate network components to act as a man-in-the-middle.

4)

Obtain sensitive data or cause actuation by attacking the sharing platform with forged or malicious requests

Data Aggregation for the IoT in Smart Cities



An IoT data is heterogeneous both semantically and syntactically. Despite this heterogeneity, future IoT applications including smart home, smart city and smart energy services, will require that all data be easily compared, correlated and merged, and that interpretation of the resulting aggregate into higher level context better matches people needs and requirements.



Data integration research has been focused in database schema integration approaches and the use of ontologies and related semantic technologies to provide data consistency among heterogeneous database schemas.



One major benefit of expressing data representation with semantic language relates to its ability to provide high level and expressive abstractions. For instance, in the IoT, data abstraction is concerned with the ways that the physical world is perceived and managed

5.5.1 First Steps Towards a Secure Platform 

In SMARTIE and in other IoT systems, systems belonging to different owners need to cooperate. Such a cooperating system can be denoted as a System of Systems (SoS).



Dependability have the following attributes :



1)

Availability

2) Reliability

3)

Safety

4) Integrity

5)

Maintainability

The main aspects of security are confidentiality, integrity and availability for authorized actions. Confidentiality means absence of unauthorized disclosure of information. Integrity is the prevention of unauthorized modification or deletion of information. 5 - 11

IoT and Applications

Internet of Things Privacy, Security and Governance



Fundamental building blocks for realizing and managing SoS are as follows : 1)

Autonomy : The ability to make independent choices.

2)

Belonging : Happiness found in a secure relationship.

3)

Connectivity : The ability of system to link with other systems.

4)

Diversity : Distinct elements in a group.

Privacy-preserving sharing of IoT data



The increasing development of IoT is dramatically changing the way people share information and communicate with their surrounding environment, enabling a constant, invisible and sometimes unintended data exchange, between things and people.



The main objective of privacy preservation is ensuring that private data remains protected, while processing or releasing sensitive information.



Privacy in the Internet of Things is the threefold guarantee to the subject for



a)

Awareness of privacy risks imposed by smart things and services surrounding the data subject

b)

Individual control over the collection and process-ing of personal information by the surrounding smart things

c)

Awareness and control of subsequent use and dissemination of personal information by those entities to any entity outside the subject’s personal control sphere

Fig. 5.5.1 shows an IoT reference model with relevant entities and data flows in a typical IoT application.

Fig. 5.5.1

5 - 12

IoT and Applications

Internet of Things Privacy, Security and Governance



The fundamental privacy mechanisms lie in the intelligent data management so that only the required data is collected. Detecting the redundancy, data is anonymized at the earliest possible stage and then deleted at the earliest convenience.

5.5.2 SMARTIE Approach   

SMARTIE is used for designing and building data centric information sharing platform. This information is accessed by an information service layer. An information service layer operates above the heterogeneous network devices and data sources. SMARTIE is the first EU project that relies on the IoT-ARM. IoT layer with their responsibility is given below : IoT Layer

Application layer

Devices and functions 1) Intelligent transportation 2) Smart energy

Security requirements 1) Authentication, authorization, assurance;

4) Utilities

2) Privacy protection policy management;

5) Service providers.

3) Secure computation;

3) Public safety

4) Application-specific minimization;

and

data

5) Discovery of information sources Information services 1) In-network data processing layer 2) Data aggregation

Network

1) Cryptographic data Storage;

3) Cloud computing

2) Protected data management and handling

1) Networking infrastructure

1) Communication connectivity security;

2) Network-level protocols

2) Secure Interaction;

and

sensor/cloud

3) Cross-domain data security handling Smart object

1) Sensors for data collection

1) Data format and structures;

2) Actuators

2) Trust anchors Attestation;

and

3) Access control to nodes 4) Lightweight encryption

5 - 13

IoT and Applications

Internet of Things Privacy, Security and Governance 5.5.2.1

Smart Transportation



A smart city uses collaboration and stakeholder engagement to create an aligned vision and uncover synergies that reduce costs, increase operational efficiencies, improve safety and quality of life, mitigate environmental impacts, and provide stewardship of resources for future generations.



Smart transportation should provide a comprehensive holistic approach to the broader issue of managing an urban environment by sharing and leveraging data to proactively manage traffic.



Performance measures provide quantified evidence of the consequences of deployed strategies or technologies as well as identifying traffic bottlenecks and air pollution hot spots.



Autonomous and connected vehicle technologies is expected to revolutionize traditional traffic management and operations to further reduce traffic crashes and congestion.

Smart city objectives

1)

Use of user smart phones in order to include additional information related to their travels.

2)

Extending traffic control systems with mobile traffic control systems to react fast on abnormal situations.

3)

Improving the management of individual motor car traffic, to reduce travelling time in the town.

4)

Improving the management of the public transportation networks to foster greater use of sustainable transport modes.

5.5.2.2

Smart Cities in India : An Overview



The government of India is in the process of developing smart cities in India which it sees as the key to the country's economic and social growth.



The promises of the smart city mission include reduction of carbon footprint, adequate water and electricity supply, proper sanitation, including solid waste management, efficient urban mobility and public transport, affordable housing, robust IT connectivity and digitalization, good governance, citizen participation, security of citizens, health and education



Objectives 1)

Provide basic infrastructure.

2)

Quality of life. 5 - 14

IoT and Applications

Internet of Things Privacy, Security and Governance



3)

Clean and sustainable environment.

4)

Apply smart solutions.

5)

Set examples to be replicated both within and outside the smart city and catalyze the creation of similar smart cities.

Basic infrastructure includes : 1)

Assured water and electricity supply,

2)

Sanitation and solid waste management,

3)

Efficient urban mobility and public transport,

4)

Affordable housing,

5)

Robust IT connectivity,

6)

e-governance and citizen participation,

7)

Safety and security of citizens,

8)

Health and education and

9)

Economic activities and livelihood opportunities. Internet of Things Privacy, Security & Governance ends…

5 - 15

IoT and Applications

Internet of Things Privacy, Security and Governance

Notes

5 - 16

IoT and Applications

Short Questions and Answers

Short Questions and Answers Chapter 1 : IoT & Web Technology Q.1

Define IoT.

Ans :

 By embedding short-range mobile transceivers into a wide array of additional

gadgets and everyday items, enabling new forms of communication between people and things, and between things. 

The Internet of Things (IoT) is the network of physical objects i.e. devices, vehicles, buildings and other items embedded with electronics, software, sensors, and network connectivity that enables these objects to collect and exchange data.

Q.2

How IoT differ from traditional computing ?

IoT data differs from traditional computing. The data can be small in size and frequent in transmission. The number of devices, or nodes, that are connecting to the network are also greater in IoT than in traditional PC computing. Ans. :

Q.3

List the characteristics of the Internet of Things.

Ans. : Characteristics of the Internet of Things are Interconnectivity, Heterogeneity, Thingsrelated services and dynamic changes.

Q.4

List the advantages of IoT.

Ans. :

Advantages :

1. Improved customer engagement and communication 2. Support for technology optimization 3. Support wide range of data collection 4. Reduced waste Q.5

List the name of low power communication technology.

Low power communication technologies are IEEE 802.15.4, Bluetooth, Ultra-wide bandwidth and RFIS. Ans. :

Q.6

What do you mean autonomy in IoT ?

Autonomy in IoT can be realized by implementing self-managing systems. Selfmanagement is the property of a system to achieve management and maintenance of its resources intrinsically and internally. Management and maintenance is realized through many levels of decision making. Ans. :

Q-1

IoT and Applications

Short Questions and Answers What is cloud computing ?

Q.7

Cloud computing is a pay-per-use model for enabling available, convenient, ondemand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service-provider interaction. Cloud computing refer to a variety of services available over the Internet that deliver compute functionality on the service provider's infrastructure. Its environment may actually be hosted on either a grid or utility computing environment, but that doesn't matter to a service user.

Ans. :

What are the challenges in implementing smart healthcare by using IoT ?

Q.8

Challenges are smarter hospital, data integration, lack of information sharing, bad health habits, shortness of medical resources.

Ans. :

What is smart grid ?

Q.9

A smart grid is an electrical grid that uses modern technology (digital or analog) to collect and communicate electricity related information of both the suppliers and consumers.

Ans. :

Q.10

What are the factors powering the progression of the IoT within the digital economy ?

Ans. :

 Powerful new mobile, wearable or connected devices



Application that fuel demand for mobile data and test the limits of the network within most industry sector



Cloud-based apps and those that rely on content stored in the cloud, which will increase as development accelerates on new Platform-as-a-Service, mobile point of sale and independent software vendor platforms



New use cases, such as mobile video, which will be significant factors in driving expensive capacity upgrades in networks

Q.11

What is data management ?

Data management is the ability to manage data information flow. With data management in the management service layer, information can be accessed, integrated and controlled. Higher layer applications can be shielded from the need to process unnecessary data and reduce the risk of privacy disclosure of the data source.

Ans. :

Q.12

Define virtual sensor.

A virtual sensor is a software sensor as opposed to a physical or hardware sensor. Virtual sensors provide indirect measurements of abstract conditions by combining sensed data from a group of heterogeneous physical sensors.

Ans. :

Q-2

IoT and Applications

Short Questions and Answers Chapter 2 : M2M to IoT Q.13

What is M2M communication ?

M2M communication is a form of data communication that involves one or more entities that do not necessarily require human interaction or intervention in the process of communication

Ans. :

Q.14

What are the key features of M2M communication ?

Ans. :

 Some of the key features of M2M communication system are given below :

1. Low Mobility : M2M devices do not move and if moves only within a certain area 2. Time Controlled : Data can be send or receive only at certain pre-defined time periods 3. Time Tolerant : Sometimes data transfer can be delayed 4. Packet Switched : Network operator to provide packet switched service Q.15

What is M2M device ?

A device that runs application(s) using M2M capabilities and network domain functions. An M2M Device is either connected straight to an Access Network or interfaced to M2M Gateways via an M2M Area Network

Ans. :

Q.16

What is Global value chains ?

A value chain describes the full range of activities that firms and workers perform to bring a product from its conception to end use and beyond, including design, production, marketing, distribution, and support to the final consumer

Ans. :

Q.17

What is Industrial Internet of Things ?

The Industrial Internet of Things (Industrial IoT) is made up of a multitude of devices connected by communications software. The resulting systems, and even the individual devices that comprise it, can monitor, collect, exchange, analyze, and instantly act on information to intelligently change their behavior or their environment -- all without human intervention

Ans. :

Q.18

What is Reference model ?

A Reference Model is an abstract framework for understanding significant relationships among the entities of some environment. It enables the development of specific reference architectures. A Reference Model consists of a minimal set of unifying concepts, axioms and relationships

Ans. :

Q.19

Define reference architecture.

A Reference Architecture is an architectural design pattern that indicates how an abstract set of relationships realizes a set of requirements. The main purpose of a RA is to

Ans. :

Q-3

IoT and Applications

Short Questions and Answers

provide guidance for the development of concrete architectures. More reference architectures may be derived from a common reference model. Chapter 3 : IoT Reference Architecture Q.20

What are the responsibility of ETSI TC M2M ?

Ans. :

1. To collect and specify M2M requirements from relevant stakeholders;

2. To develop and maintain an end-to-end overall high level architecture for M2M; 3. To identify gaps where existing standards do not fulfil the requirements and provide specifications and standards to fill these gaps, where existing standards bodies or groups are unable to do so; 4. To provide the ETSI main centre of expertise in the area of M2M; Q.21

What is use of mla reference point ?

mIa : M2M application interface : it is used by the Network Applications (NA) to communicate with the Network Service Capability Layer (NSCL).

Ans. :

Q.22

What is use of dla reference point ?

Device application interface : it is used by the Device and Gateway Applications (DA and GA) to communicate with the local service capabilities, i.e. Device Service Capability Layer (DSCL) and Gateway Service Capability Layer.

Ans. :

Q.23

What is Open Geospatial Consortium standard ?

The Open Geospatial Consortium (OGC 2013) is an international industry consortium of a few hundred companies, government agencies, and universities that develops publicly available standards that provide geographical information support to the Web, and wireless and location-based services.

Ans. :

Q.24

What is use of Open Geospatial Consortium (OGC 2013) ?

OGC Standards used to monitor, model and forecast flood, drought and environmental events. Government agencies can rapidly integrate data from different sensor networks. External (e.g. agricultural) sensor feeds can be incorporated easily to improve prediction and decision making.

Ans. :

Q.25

Explain an IoT domain model

A domain model defines the main concepts of a specific area of interest. These concepts are expected to remain unchanged over the course of time, even if the details of an ARM may undergo continuous transformation or evolution over time. The domain model captures the basic attributes of the main concepts and the relationship between these concepts.

Ans. :

Q-4

IoT and Applications

Short Questions and Answers Q.26

What is functional model ?

Functional Model is an abstract framework for understanding the main Functionality Groups (FG) and their interactions. This framework defines the common semantics of the main functionalities and will be used for the development of IoT-A compliant Functional Views.

Ans. :

Q.27

What is functional view ?

Functional View describes the system’s runtime Functional Components, their responsibilities, default functions, interfaces and primary interactions. The Functional View derives from the Functional Model and reflects the developer’s perspectives on the system.

Ans. :

Q.28

What is Request/Response pattern ?

The Request/Response pattern is a synchronous way of communication between two parties. A client sends a request to a server. The server will receive the request and will send a response back to the client. The client is waiting for the response until the server has sent it.

Ans. :

Q.29

Explain Publish/Subscribe pattern.

The Publish/Subscribe pattern allows a loose coupling between communication partners. There are services offering information and advertise those offers on a broker component. When clients declare their interest in certain information on the broker the component will make sure the information flow between service and client will be established.

Ans. :

Chapter 4 : IoT Application for Value Creation Q.30

What are the challenges faced by IoT industry applications ?

1. Security. As the IoT connects more devices together, it provides more decentralized entry points for malware. Less expensive devices that are in physically compromised locales are more subject to tampering.

Ans. :

2. Trust and Privacy. With remote sensors and monitoring a core use case for the IoT, there will be heightened sensitivity to controlling access and ownership of data. 3. Complexity, confusion and integration issues. 4. Evolving architectures competing standards Q.31

What is concept of future factory ?

Factories of the future are oriented toward ensuring the availability of all relevant information in real time through the connectivity of all elements participating in the value chain, as well as providing the ability to deduce the optimal value chain processes from this data at the demand of the individual customer. The factory of the future will increase global competitiveness and will require an unprecedented integration of systems across domains, hierarchy boundaries and life cycle phases

Ans. :

Q-5

IoT and Applications

Short Questions and Answers What do you mean smart factory ?

Q.32

The Smart Factory will fundamentally change how products are invented, manufactured and shipped. At the same time it will improve worker safety and protect the environment by enabling low-emissions and low-incident manufacturing.

Ans. :

What is Brownfield IoT ?

Q.33

Brownfield refers to the implementation of new systems to resolve IT problem areas while accounting for established systems. Brownfield describes the billions of devices and legacy software applications performing discrete functions in isolation. Some of these will require migration strategies to connect with and realize the benefits of IoT

Ans. :

Explain smart object.

Q.34

Smart Object is a bi-directional communicating object which observes its environment and is able to make decisions depending on the application and based on the information extracted from the physical world. Smart object is an item equipped with a form of sensor or actuator, a tiny microprocessor, a communication device, and a power source

Ans. :

What are the four aspects of Internet of Things & Services ?

Q.35

Four aspects of the Internet of Things & Services are technology, business innovation, market and competencies.

Ans. :

Define the term ‘Industry 4.0’.

Q.36

It stands for the fourth industrial revolution and focuses on the end-to-end digitization of all physical assets and integration into digital ecosystems with value chain partners. Industry 4.0 digitizes and integrates processes vertically across the entire organization, from product development and purchasing, through manufacturing, logistics and service.

Ans. :

Q.37

List the dimension of Big data.

Ans. :

Dimension of Big data are :

1. Volume : datasets who size runs into petabytes and beyond. 2. Variety : data who form could be structured or unstructured. 3. Velocity : data that comes into the processing environment very fast. Q.38

Explain the supply chain management department functions.

Ans. :

Functions are

1.

Inventory management

2.

Transportation service procurement

3.

Materials handling

4.

Inbound transportation Q-6

IoT and Applications

Short Questions and Answers

5.

Transportation operations management

6.

Warehousing management Chapter 5 : IoT Privacy, security and Governance

Q.39

What is Governance as per EU ?

As per European Union (EU), ‘Governance’ refers to the rules, processes and behaviour that affect the way in which powers are exercised, particularly as regards openness, participation, accountability, effectiveness and coherence.

Ans. :

Q.40

Define Cap-BAC.

Capability-Based Access Control (Cap-BAC) : A capability is a communicable, unforgeable rights markup, which corresponds to a value that uniquely specifies certain access rights to objects owned by subjects.

Ans. :

Q.41

Explain GAMBAS middleware

The GAMBAS middleware will enable the development of novel applications and Internet-based services that utilize context information in order to adapt to the behavior of the user autonomously. To do this, the middleware will provide the means to gather context in a generic, yet resource-efficient manner and it will support the privacy-preserving sharing of the acquired data.

Ans. :

Q.42

What is goal of BUTLER project ?

The goal of the BUTLER project is the creation of an experimental technical platform to support the development of the Internet of Things.

Ans. :

Q.43

Explain BUTLERs five “innovation eco-systems”.

Ans. :

Innovation eco-systems are as follows :

1. Smart homes and offices; 2. Smart shopping; 3. Smart mobility and transport; 4. Smart healthcare and wellness; and 5. Smart cities. Q.44

What are the objectives of SMARTIE ?

Ans. :

The objectives are :

1. Understanding requirements for data and application security and creating a policyenabled framework supporting data sharing across applications.

Q-7

IoT and Applications

Short Questions and Answers

2. Developing new technologies that establish trust and security in the perception layer and network layer. 3. Develop new technologies for trusted information creation and secure storage for the information service layer. 4. Demonstrate the project results in real use cases Q.45

Define SMARTIE.

SMARTIE is a secure and smarter cities data management system. The SMARTIE project works on security, privacy and trust for data exchange between IoT devices and consumers of their information.

Ans. :

Q.46

Explain objective of smart city.

Ans. :

Smart City Objectives

1. Use of user smart phones in order to include additional information related to their travels 2. Extending traffic control systems with mobile traffic control systems to react fast on abnormal situations 3. Improving the management of individual motor car traffic, to reduce travelling time in the town 4. Improving the management of the public transportation networks to foster greater use of sustainable transport modes Short Questions and Answers ends…

Q-8

IoT and Applications

Advanced Semiconductor Devices

S-1

December-2012

Summer - 2017 IoT and Applications Semester - VIII (CE/CSE/IT) Elective – III

Gujarat Technological University

Solved Paper

1 Time : 2 Hours] 2

[Total Marks : 70

Instructions :

Q.1

Q.2

1.

Attempt all questions.

2.

Make suitable assumptions wherever necessary.

3.

Figures to the right indicate full marks. (a) Define IoT. Discuss various application areas of IoT. (Refer section 1.1)

[7]

(b) Explain Time for convergence for IoT. (Refer section 1.2)

[7]

(a) Explain M2M value chains. (Refer section 2.3)

[7]

(b) Explain IoT functional view. (Refer section 1.5.2)

[7]

OR

Q.3

(b) Discuss IoT architecture outline with diagram. (Refer section 2.9)

[7]

(a) Explain IoT value chains. (Refer section 2.4)

[7]

(b) Explain ETSI M2M high - level architecture. (Refer section 3.1.1)

[7]

OR Q.3

(a) Discuss IoT domain model notation and semantics. (Refer section 3.3.1)

[7]

(b) Explain IoT reference architecture’s deployment and operational view. (Refer section 3.4.4) Q.4

[7]

(a) What are the requirements that IoT application for industrial application should meet ? (Refer section 4.2)

[7]

(b) What the shopping basket can tell : IoT for retailing industry ?

[7]

Ans. : Shopping Basket : 

Every supermarkets employ shopping baskets to help customers to select and store the products. The customers have to drop the products which they wish to purchase and then proceed to checkout.

S-1

Solved Paper Summer-2017 

Smartstore is a concept that describes the principle of automating retail trading platforms utilizing the Internet of Things (IoT) technology. To automate these processes, RFID sensors, POS terminals, smart shelves, smart carts, video cameras, Big Data technology and many other solutions can be used. As a result, retailers gain ample opportunities to optimize their business processes and improve the quality of service to their customers.



For example, by using RFID tags and specialized software, you can control in real time the types of goods that were taken off the shelf, which ones were loaded into carts, which ones were paid at the checkout, etc.



The customers have to drop every product which they wish to purchase into the shopping cart and then proceed to checkout at the billing counter. The billing process is quite tedious and highly time consuming and has created the need for shops to employ more and more human resource in the billing section, and yet waiting time remains considerably high.



The automated shopping cart system integrates a shopping cart (trolley) with two sets of barcode scanners placed at 2 different checkpoints, the entry and exit points respectively. It facilitates the user to self-scan the barcode of the purchased products which he intends to purchase.



Wrongful entries can be corrected by making use of a keypad that changes the functionality of the machine from addition of products to removal of products and activates the other barcode scanner at the opposite end.



Wireless smart-device makes note of all the scanned commodities of the particular trolley; and is linked with the Supermarket's backend database which contains details of the products such as cost, available stock.



The scanned products are automatically billed in the wireless smart device for their purchases, thereby significantly reducing turnaround time and reducing and transmitted to the Shop's central Billing program. By this mechanism, the time consuming work of scanning and billing every single product at the cash counter can be avoided. Users can then make use of the counter to pack and pay labour time which has become a real problem in the modern era. OR (a) Discuss GAMBAS adaptive middleware. (Refer section 5.3.3) (b) Explain smartie approach for IoT. (Refer section 5.5.2)

S-2

[7] [7]

IoT and Applications

Solved Paper Summer-2017 Q.5

(a) Explain in brief future factory concepts. (Refer section 4.2.1)

[7]

(b) Describe four aspects in your business to master IoT. (Refer section 4.5)

[7]

OR (a) Explain Butler project. (Refer section 5.3.4)

[7]

(b) Explain security, privacy and trust in IoT - Data - Platforms for smart cities. (Refer section 5.4)

[7]

                                   S-3

IoT and Applications

Solved Paper Summer-2017 Notes

S-4

IoT and Applications

Advanced Semiconductor Devices

S-5

December-2012

IoT and Applications

Gujarat Technological University

Semester - VIII (CE/CSE/IT) Elective – III

Solved Paper

Winter - 2017

1 Time : 2 Hours] 2

[Total Marks : 70

Instructions : 1.

Attempt all questions.

2.

Make suitable assumptions wherever necessary.

3.

Figures to the right indicate full marks.

Q.1 (a) Explain issues of IoT. [3] Ans. : From the beginning, IoT devices present inherited challenges since they are constrained devices with low memory, processing, communication and energy capabilities.

1. The first key challenge for a ubiquitous deployment is the integration of multitechnology networks in a common all-IP network to ensure that the communication network is reliable and scalable. For this purpose, IoT relies on the connectivity and reliability for its communications on Future Internet architecture. 2. The second key challenge is to guarantee security, privacy, integrity of information and user confidentiality. The majority of the IoT applications need to take into considerations the support of mechanisms to carry out the authentication, authorization, access control, and key management. 3. In addition, due to the reduced capabilities from the constrained devices enabled with Internet connectivity, a higher protection of the edge networks needs to be considered with respect to the global network. 4. The third key challenge is to offer support for the mobility, since the Future Internet presents a more ubiquitous and mobile Internet. Mobility support increases the applicability of Internet to new areas. 

The most present nowadays are mobile platforms such as smart phones and tablets which enable a tremendous range of applications based on ubiquitous location, context awareness, social networking, and interaction with the environment.



Future Internet potential is not limited to mobile platforms, else IoT is another emerging area of the Future Internet, which is offering a high integration of the cybernetic and physical world.



Mobility support in the IoT enables a global and continuous connection of all the devices without requiring the disruption of the communication sessions.



For example, mobility management in hospitals is required since clinical devices can be connected through wireless technologies. Mobility offers highly valuable features such as higher quality of experiences for the patients, since this allows the patients to S-5

Solved Paper Winter-2017

move freely, continuous monitoring through portable/wearable sensors, extend the coverage within all the hospital, and finally a higher fault tolerance since the mobility management allows the connection to adapt dynamically to different access points. 5. Other challenges are also arising from the application, economical, and technological perspectives. For example, from an application point of view are the requirements for processing large amounts of data for a growing number of devices, it is called Big Data. (b) Define IoT. Explain reasons to converge the technologies and shift to IOT. (Refer section 1.4) Q.2

[4]

(c) Explain research direction of IoT. (Refer section 1.5)

[7]

(a) Define M2M. Explain reasons of shifting from M2M to IoT. (Refer section 2.1)

[3]

(b) Explain IoT value chains using figure (Refer section 2.4)

[4]

(c) Explain layered IoT architecture using figure. (Refer section 2.9)

[7]

OR

(c) Explain main design principles and needed capabilities of IoT. (Refer section 2.8) [7] Q.3 (a) Explain smart parking IoT application using figure. [3] Ans.:  Smart parking system obtains the information such as availability of the parking space, the 

time when the vehicle parked in, the time when the parking vehicle left. Fig. 1 show smart parking system.

Fig. 1 : Smart parking system S-6

IoT and Applications

Solved Paper Winter-2017 

It involves the smart sensors that could be fixed in street lights for every parking space, collection of real-time data, a web-based portal to monitor the parking spaces and a mobile app which will enable user to reserve a parking space and make online payment from their mobile app for their parking



Sensing Device (Cogito) : Wireless sensors to monitor the status of parking slots on real time basis. Sends data through IEEE 802.15.4 low power radio to Transeo.



Information Gateway (Transeo) : Received data from the Cogito through IEEE 802.15.4 low power radio. Uses Wi-Fi/ Ethernet/GSM/GPRS to communicate with Server.



Parking App : Online parking booking facility .



Different digital modes of payment : Credit cards, e-wallet etc.



Real time parking availability status in parking lots.



Parking guidance on smartphone.



Parking session ending reminders.



Flexibility to extend parking sessions/cancel parking bookings. (b) Explain reference architecture of IoT using figure. (Refer section 2.8)

[4]

(c) Explain functional view, information view, deployment and operatonal view, other relevant architectural views of IoT reference architecture. (Refer section 3.4)

[7]

OR

(a) Explain smart home IoT application using figure.

Q.3

[3]

Ans. :  Smart homes using IoT provide the user varied features to operate home devices from any place where the user being and at any time whenever needed. 

Fig. 2 shows smart home. (See Fig. 2 on next page)



To allow each device to communicate with each other within a heterogeneous network.



First, it provides internet connection and data conversion services between Wi-Fi and ZigBee networks. Then, it establishes a ZigBee network that allows home devices to communicate with each other by using the ZigBee wireless protocol.



Finally, it provides a user interface control panel so that users can connect to IoT AP through the internet to get the status of each ZigBee device at home and control them remotely.



IoT sensors involved in home automation are in thousands, and there are hundreds of home automation gateways as well. Most of the firmware is either written in C, Python, Node.js, or any other programming language.



IoT sensors for home automation by their sensing capabilities : Temperature sensors, Lux sensors, Water level sensors, Air composition sensors, Video cameras for surveillance, Voice/Sound sensors, Pressure sensors, Humidity sensors, Accelerometers and Infrared sensors etc.

S-7

IoT and Applications

Solved Paper Winter-2017

Fig. 2

(b) Explain architecture reference model of IoT using figure. (Refer section 3.2)

[4]

(c) Explain I-GVC using figure. (Refer section 2.5.1)

[7]

Q.4 (a) Enlist IoT applications for value creations. Ans. : IoT applications for value creations :

[3]

1. Smart city 2. Smart health 3. Smart transportation 4. Smart energy and smart grid 5. Smart factor and smart manufacturing 6. Future factory 7. IoT for gas and oil industry 8. Value creation for big data and serialization (b) Explain needs of IoT for oil and gas industry. (Refer section 4.8)

[4]

(c) Explain value creation from big data and serialization. (Refer section 4.6)

[7]

OR

Q.4

(a) Enlist challenges faced by industry related IoT applications. (Refer section 4.1 page (4-5))

[3]

(b) Explain four aspects in one’s business to master IoT. (Refer section 4.5)

[4]

(c) Explain eHealth IoT application (Refer section 4.10)

[7]

S-8

IoT and Applications

Solved Paper Winter-2017

Q.5

(a) Data aggregation for the IoT in smart cities security. (Refer section 5.5)

[3]

(b) Explain contributions from FP7 projects. (Refer section 5.3)

[4]

(c) Explain security, privacy and trust in IoT data-platforms for smart cities. (Refer section 5.4)

[7] OR

(a) Explain security concerns for smart home application. [3] Ans. : Some of the security threats in the smart home are as follows :  Confidentiality threats are those that result in the unwanted release of sensitive information. For example, confidentiality breaches in home monitoring systems can lead to the inadvertent release of sensitive medical data.  Authentication threats can lead to either sensing or control information being tampered with. 

Access threats are probably the greatest threats. Unauthorized access to a system controller, particularly at the administrator level, makes the entire system insecure.



This can be through inappropriate password and key management, or it could be by unauthorized devices connecting to the network.



Even if control cannot be gained, an unauthorized connection to a network can steal network bandwidth, or result in a denial of service to legitimate users.



Vulnerabilities : A significant vulnerability is networked system accessibility. Because modern smart home systems are connected to the Internet, attacks can be conducted remotely, either by direct access to networked control interfaces, or by downloading malware to devices.



Due to their low cost, IoT computing devices generally are not as powerful as traditional desktop and laptop computers.



Most IoT devices are low energy, use a low-end microcontroller and have limited memory. Such controllers are well-matched to the requirements of standalone controllers in a washing machine or air conditioner.



However, these characteristics have made the move to networked IoT controllers more challenging as the existing Internet protocols are not typically designed for these embedded devices.



Several Internet Engineering Task Force (IETF) working groups have been created to tackle these problems.

(b) Explain smartie approach, properties and characteristics. Ans. : Properties and characteristics :

[4]

1. It store, share and process large volumes of heterogeneous information 2. Enable end-to-end security and trust in information delivery for decision-making purpose

S-9

IoT and Applications

Solved Paper Winter-2017

3. SMARTIE follows a data-centric paradigm, which will offer highly scalable and secure information for smart city applications 4. Applying smart solutions to infrastructure and services in area-based development in order to make them better 5. Making governance citizen-friendly and cost effective - increasingly rely on online services to bring about accountability and transparency 6. Promoting a variety of transport options 7. Confidentiality is needed to protect the privacy of citizens and valuable information of stakeholders in the city, thereby protecting against unauthorized external access 8. Guaranteeing data availability and control functionality is also essential, especially in hard situations, such as rescue operations for public safety in which coordination tasks are required. (c) Explain security concerns for industry.

[7]

Ans. : 

Industrial IoT (IIoT) infrastructure should be protected by a comprehensive security solution (device-to-cloud) that does not disrupt operations, service reliability or profitability



Many security problems associated with the IIoT stem from a lack of basic security measures in place. Security gaps like exposed ports, inadequate authentication practices, and obsolete applications contribute to the emergence of risks. Combine these with having the network directly connected to the internet and more potential risks are invited.



Unsecure IIoT systems can lead to operational disruption and monetary loss, among other considerable consequences. More connected environments mean more security risks, such as : 1. 2. 3. 4.

 



Software vulnerabilities that can be exploited to attack systems. Publicly searchable internet-connected devices and systems. Malicious activities like hacking, targeted attacks, and data breaches. System manipulation that can cause operational disruption (e.g., product recalls) or sabotage processes. 5. System malfunction that can result in damage of devices and physical facilities or injury to operators or people nearby. The device layer usually comprises the IIoT devices and applications that are brought in from different manufacturers and service providers. IIoT adopters should be able to know how their manufacturers and service providers transmit and store data. And in the event of a security issue, manufacturers and service providers should also be able to actively notify enterprises of what needs to be taken care of. Securing IIoT systems therefore requires connected threat defense and end-to-end protection, from the gateway to the endpoint, that are able to provide: S - 10

IoT and Applications

Solved Paper Winter-2017

1. 2. 3. 4. 5. 6.

Regular monitoring and detection in case of malware infection. Better threat visibility and early detection of anomalies. Proactive prevention of threats and attacks between IT and OT. Secure data transfer. A next-generation IPS to prevent attacks from exploiting vulnerabilities. Server and application protection across the data center and the cloud.

                       

S - 11

IoT and Applications

Advanced Semiconductor Devices

S - 12

December-2012

Gujarat Technological University

Summer - 2018 IoT and Applications Semester - VIII (CE/CSE/IT) Elective – III

Solved Paper

1 Time : 2 Hours] 2

[Total Marks : 70

Instructions :

Q.1

Q.2

1.

Attempt all questions.

2.

Make suitable assumptions wherever necessary.

3.

Figures to the right indicate full marks. (a) What is IoT. (Refer section 1.1)

[3]

(b) Discuss smart health using IoT. (Refer section 1.6.5)

[4]

(c) Explain research directions of IoT (Refer section 1.5)

[7]

(a) What is global value chain ? Explain it with a diagram. (Refer section 2.2)

[3]

(b) Explain IoT value chains. (Refer section 2.4)

[4]

(c) Discuss in detail smart city application of IoT. (Refer section 1.6.1)

[7]

OR

Q.3

(c) Discuss layered IoT architecture using a figure. (Refer section 2.9)

[7]

(a) What is IoT domain model. (Refer section 3.3.1)

[3]

(b) Explain M2M value chains. (Refer section 2.3)

[4]

(c) Explain functional view, Information view, deployment and operational view, other relevant architectural views of IoT reference architecture. (Refer section 3.4)

[7]

OR Q.3

(a) Discuss ETSI M2M interfaces. (Refer section 3.1.1)

[3]

(b) What is IoT functional model ? (Refer section 3.3.3)

[4]

(c) Explain open geospatial consortium architecture with a diagram. (Refer section 3.1.3) Q.4

[7]

(a) Explain strategic business aspects. (Refer section 4.5)

[3]

(b) What the shopping basket can tell : IoT for retailing industry ? (Refer Q.4(b) of Summer-2017)

[4]

(c) Explain in brief future factory concepts. (Refer section 4.2.1) S - 12

[7]

Solved Paper Summer-2018 OR (a) Describe : Smart products, smart equipment and smart infrastructure.

Q.4

[3]

Ans. :

Q.5



Smart product : It is a data processing object, which has several interactive functions. A smart product combines the physical and software interfaces. The usage of a smart product is interactive and requires also some cognitive work by the user. Smart products are dedicated to certain functionality. Smart products, also called as intelligent products. A smart product uses a different of well known and developed technologies like; GPS, QR codes, RFID and WLAN.



Smart equipment : It makes management easier and also provide status information to the user remotely



Smart infrastructure incorporate functions of sensing, actuation, and control in order to describe and analyze a situation, and make decisions based on the available data in a predictive or adaptive manner, thereby performing smart actions. (b) Discuss IoT for oil and gas industry. (Refer section 4.8)

[4]

(c) Explain : The smart factory. (Refer section 1.6.4)

[7]

(a) IoT – A Architecture. (Refer section 2.9)

[3]

(b) Discuss GAMBAS adaptive middleware. (Refer section 5.3.3)

[4]

(c) Explain privacy-preserving sharing of IoT data. (Refer section 5.4)

[7]

OR (a) Discuss activity chain 05 – goverance, privacy and security issues. (Refer section 5.2) [3] (b) Explain smartie approach for IoT. (Refer section 5.5.2)

[4]

(c) Discuss various FP7 projects. (Refer section 5.3)

[7]

          

S - 13

IoT and Applications

Advanced Semiconductor Devices

S - 14

December-2012

Gujarat Technological University

Winter - 2018 IoT and Applications Semester - VIII (CE/CSE/IT) Elective – III

Solved Paper

1 Time : 2 Hours] 2

[Total Marks : 70

Instructions :

Q.1

1.

Attempt all questions.

2.

Make suitable assumptions wherever necessary.

3.

Figures to the right indicate full marks. (a) What is M2M communication ? Why M2M has shifted to the Internet of Things ? (Refer section 2.1)

[3]

(b) What is Internet of Things ? What are the applications of IoT ? (Refer sections 1.1 and 1.6)

[4]

(c) Explain the architecture of the Internet of Things. (Refer section 2.9) Q.2

[7]

(a) Which are the network and communication technologies can be used to implement an IoT application. (Refer section 1.9)

[3]

(b) What is a cloud ? What is the role of cloud platforms in IoT ? (Refer section 1.7.1)

[4]

(c) Explain reference model of Internet of Things. (Refer section 3.2.1)

[7]

OR (c) Which are hardware and software components of IoT ? How do these components get synchronized in an IoT based application ? (Refer section 1.1.1) Q.3

(a) What is the value chain of Internet of Things ? (Refer section 2.4)

[7] [3]

(b) What are data accumulation and data abstraction in a smart city application ? (Refer section 5.5)

[4]

(c) What are the security and private issues of IOT ? Explain using suitable case scenario. (Refer section 1.12)

[7] OR

Q.3

(a) Explain functional model of IoT. (Refer section 3.3.3)

[3]

(b) What is middleware ? Explain GAMBAS adaptive middleware. (Refer section 5.3.3)

[4]

(c) Explain challenges of the Internet of Things ?

[7]

S - 14

Solved Paper Winter-2018

Ans. : IoT Issues and Challenges : 

IoT and ubiquitous integration of clinical environments define complex design challenges and requirements in order to reach a suitable technology maturity for its wide deployment and market integration.

Refer Q.1 (a) of Winter-2017 

From the economic points of view, the needs to provide economies of scale, i.e., new services based on existing modules in order to leverage the related platform investment.



From the networking point of view to offer an end-to-end support for Quality of Service , since the different IoT applications will present different requirements in terms of latency and bandwidth, for example, for clinical environments the traffic should be prioritized over other non-critical traffic coming from smart-metering.



Fig. 1 shows the key challenges to offer an Internet of Everything. This covers from the integration of heterogeneous devices to the integration into a Web of Things.

Fig. 1. Key challenges to offer an Internet of Everything 

The number of devices that are connected to the Internet is growing exponentially. This has led to defining a new conception of Internet, the commonly called Future Internet, which started with a new version of the Internet Protocol (IPv6) that extends the addressing space in order to support all the emerging Internet-enabled devices.



IoT devices are small wireless devices that would be placed in public places. Wireless communication is made secure through encryption technique. But the IoT devices are very small and not powerful enough to support encryption methods. There is need to modify encryption algorithm in order to support IoT devices.

S - 15

IoT and Applications

Solved Paper Winter-2018

Q.4



In IoT, the different devices are traceable through the interconnected network, it creates threats to personal and private data.



Many IoT devices are small in size and do not have the continuous power source. A device computation depends on battery size and cost of the device. Many IoT devices work as a single, limited purpose which could have customized network interfaces, operating systems, and programming models that make the most efficient use of limited computation, network, and energy resources.

(a) Differentiate M2M and IoT. (Refer section 2.1.3)

[3]

(b) What are the research issues of Internet of Things ? Refer section 1.5)

[4]

(c) Explain smart parking system with architecture of system. (Refer Q.3 (a) of Winter-2017)

[7] OR

Q.4

(a) Explain IoT domain model. (Refer section 3.3.1)

[3]

(b) What are Bid data and Big data analytics ? How the data captured by an IoT system can be analyzed ? (Refer section 4.6)

[4]

(c) Which is a smart city ? What are the features of IoT based smart city ? Explain role of IoT in making smart city. (Refer section 1.6.1) Q.5

[7]

(a) What is FP7 projects ? How these projects are helpful in implementing IoT systems ? (Refer section 5.7)

[3]

S - 16

IoT and Applications

Solved Paper Winter-2018 (b) What is smart health ? Discuss use of IoT smart health using all cases of the health industry. (Refer section 4.10)

[4]

(c) What is a smart home ? What are the functions of IoT based smart home ? Which sensors are required to make smart home. (Refer Q.3 (a) of Winter-2017)

[7]

OR Q.5

(a) What are the governance issues of Internet of Things ? (Refer section 5.2)

[7]

(b) How does an Internet of Things conserve the electric energy ? Discuss with a suitable case scenario. (Refer section 1.6.2)

[4]

(c) What is smart application ? How oil and gas industry can be smart using an Internet of Things ? Take all possible use cases of oil and gas industry into consideration. (Refer section 4.8)

[7]

 

S - 17

IoT and Applications

Solved Paper Winter-2018 Notes

                

S - 18

IoT and Applications

Advanced Semiconductor Devices

S - 19

December-2012

Gujarat Technological University

Summer - 2019 IoT and Applications Semester - VIII (CE/CSE/IT) Elective - III

Solved Paper

1 Time : 2 Hours] 2

[Total Marks : 70

Instructions : 1. Attempt all questions. 2. Make suitable assumptions wherever necessary. 3. Figures to the right indicate full marks. Q.1

a) Explain vision of IoT. (Refer section 1.4)

[3]

b) Explan time for convergence for loT in detail. (Refer section 1.2)

[4]

c) Explain in brief detailed layered loT architecture. Q.2

(Refer section 3.1.4) a) Compare main characteristics of M2M and IoT.

[7]

(Refer section 2.1.3) b) Explain IoT value chains. (Refer section 2.4)

[3] [4]

c) For building an architecture of IoT explain main design principles and needed capabilities. (Refer section 2.8) [7] OR

Q.3

c) Discuss IoT with various application area. (Refer section 1.6)

[7]

a) Explain IoT domain model. (Refer section 3.3.1)

[3]

b) Explain IoT function view. (Refer section 3.4.2)

[4]

c) Explain ETSI M2M high level architecture. (Refer section 3.1.1)

[7]

OR

Q.3

a) Explain IoT information model. (Refer section 3.3.2)

[3]

b) Explain IoT deployment and operational view.

Q.4

(Refer section 3.4.4) c) Explain ETSI M2M service capabilities. (Refer section 3.1.1)

[4] [7]

a) Explain brownfield IoT application. (Refer section 4.3)

[3]

b) Explain value creation from big data and serialization. (Refer section 4.6) c) Explain opiniouns on IoT application and value for industry. (Refer section 4.9)

[4] [7]

S - 19

Solved Paper Summer-2019 OR

Q.4

Q.5

a) Explain future factory concepts IoT application (Refer section 4.2.1)

[3]

b) Explain in detail smart objects and application. (Refer section 4.4)

[4]

c) Explain eHealth IoT applications. (Refer section 1.6.5)

[7]

a) Discuss activity chain 05 - governance, privacy and security issues. (Refer section 5.2) b) Explain smartie approach for IoT. (Refer section 5.5.2)

[3] [4]

c) Discuss GAMBAS adaptive middleware. (Refer section 5.3.3)

[7]

OR

Q.5

a) Explain IoT for retailing industry. (Refer section 4.7)

[3]

b) Explain security, privacy and trust in IoT-data-platforms for smart cities. (Refer section 5.4) c) Discuss various FP7 projects. (Refer section 5.3)

[4] [7]

 

S - 20

IoT and Applications