Internet of Things
Internet of Things
Internet of Things
Retailers can enhance the in-store experience of the customers using IoT. The
shopkeeper can also know which items are frequently bought together using IoT
devices.
Smart healthcare:
People can wear the IoT devices which will collect data about user's health. This will
help users to analyze themselves and follow tailor-made techniques to combat
illness. The doctor also doesn't have to visit the patients in order to treat them.
The applications' interaction will increase, the complexity will increase and the
boundaries between the applications will be unclear to a high degree.
3)The coherence of corresponding technology approaches:
Development of robotics, smart cities, the future internet will evolve and ultimately
merge with IoT.
4)The coherence of real and virtual world:
Today, the real and virtual worlds are seen as two antagonistic conceptions but they
will converge with the help of IoT in future.
Maintenance becomes an issue when we are dealing with billions of IoT devices
connected to the internet. We will need a strong and secure OS that can handle
these many devices and performs optimally.
This way, the user will not have to find empty spots and it will save time, money and
energy.
The design for the smart parking system will look like this:
patients who have a habit of forgetting things, apps for patients to guide them about
their medicine dose etc.
5)There will be IoT devices which measure patient’s condition and provide accurate
diet plans and exercise schedules for each individual.
So, these were some of the few huge applications of IoT in health care.
There are a lot of issues that the manufactures will have to face in order to achieve
this.
Some of the issues are:
Meeting the demand for number of resources
Motivate people to share their medical information online
Keep the services at reasonable cost
Real timeliness
Developing smart hospitals
Mobile operators are facing a problem to provide the required bandwidth to the
clients and customers due to that.
The extra frequency spectrum is not available in some countries.
So, there can be an integration of existing Wi-Fi network into the mobile eco-system
and also this will have a big impact on IoT eco-system.
The architecture of mobile devices will change as the baseband chip takes control of
the routine process.
So, it is necessary to develop a chip that integrates all the process. It is called a
multicom chip.
Today many European projects address IoT technologies, knowledge and also it has
been mentioned that these topics can be heterogeneous and specialized also there
is a strong need for integration of the individual results.
In this context, the integration of knowledge has been conceptualized as the process
through which some specialized cognizance situated in multiple projects across
Europe is applied and assimilated.
The agenda of strategic research and innovation has been developed with the
proper support of a Europen-led community of interrelated projects and their
stakeholders with a dedication to the innovation, creation, development, and use of
the IoT technology.
There are no firm standards that the companies have to follow while developing their
products.
This can lead to security issues on some devices.
Thus, standardization is necessary when we are talking about every device being
connected to the internet.
3)Privacy:
Privacy is another huge concern for industries.
Information that the user communicates with the device will be going on the internet.
So, the industries have to ensure the safety of that data. Otherwise, the users will
lose their trust and the idea of IoT can fail.
4)Protecting from other corporations:
Some users may not want to share their data with everyone.
So, protecting the data from other corporations is equally important as protecting it
from hackers.
5)Upgrades:
Mostly the computers upgrade the software by itself as the users are too lazy to do
that.
But when we talk about IoT, the safety of your data is in the user's hands. So, this
will require the user to update every software and device every time and that can
raise some security issues.
6)More devices, more problems:
Last but not the least is the number of increasing devices connected to the internet.
These all above-mentioned problems will increase as the number of IoT devices
increase.
It will be a huge challenge for industries to handle such big data and maintain its
security.
So, these were the security concerns for industries using IoT.
Input: Inputs are the base raw ingredients that are turned into a product.
Production: Production refers to a process that the raw inputs are put through to
become a part of the value chain.
Processing: Processing refers to the process whereby a product is prepared for
sale.
Packaging: Packaging refers to the process whereby a product can be branded as
would be recognizable to consumers.
Distribution: This process refers to the channels to market for products.
Input: There is significantly a number of inputs in an IoT value chain than an M2M
value chain. These can be open data, devices/sensors, OSS/BSS, corporate
databases.
Production: In this process, the raw inputs will undergo initial development into
information components and products. Irrespective of the input type, this process will
need to include tagging and linking of data items in order to provide traceability and
performance across the value chain.
Processing: In this stage, the data from various inputs from production stage are
combined together to create information.
Packaging: After the data from various inputs have been combined, the packaging
component in the value chain creates information components. These components
can be charts or any other traditional method to communicate the information to
consumers.
Distribution: This is the final stage in the value chain in which the information
products are created.
1)Input:
The sensors and devices are working as input by the means of capturing and
transmitting the data in order to develop information products.
The end users also provide inputs to the system.
Every human that enters any search query, allows location information, uses NFC is
also a part of value chain now.
Both of these sources provide a few inputs which are then analyzed, aggregated,
repackaged and exchanged.
2)Data factories:
Data factories produce data in a digital form so that other parts of I-GVC can use it.
3)Service providers:
Service providers collect data from various sources and create massive databases.
They use it to improve their own information product or sell some information
product in various forms
3)Intermediaries:
There is a need of intermediaries in the emerging structure of I-GVC.
Intermediaries are also required to handle scalability issues and the security and
privacy of data that is developed into information products.
4)Reseller:
Resellers combine several inputs, analyze them and sell them to end-users or
corporate entities.
1)SENSEI:
The approach in SENSEI was to develop a model that integrates the real world into
the future internet.
There is a service infrastructure that provides services that are common to many IoT
applications and the communication network should use the Internet Protocol(IP).
The architecture relies on the sensors and actuators, a set of contextual and real-
world entity-centric devices and the users.
It also relies on an open-ended constellation of providers and users.
The architecture also has its own key capabilities.
2)ETSI TC M2M:
The telecommunication industry has focused on defining a common service core for
M2M.
The approach taken is to analyze M2M use cases, derive requirements and then
provide the architecture.
Similar to SENSEI, there was a clear approach towards horizontal architecture.
Gateways, devices, communication network, service core and applications all are
separated by the reference points.
3)IoT-A:
The approach here is different from previous ones.
Here, the reference architecture is created first and captured in the IoT ARM.
Via ARM, it aims to achieve a high level of interoperability between different IoT
solutions at the different level of communication, service, and information.
It proposes a methodology on how to arrive at concrete architecture using use cases
and requirements.
The assets of interest are the real world objects and entities that are subject to being
monitored and controlled, as well as having digital representation and identities.
The resource layer provides different capabilities such as sensing, actuation, and
embedded identities. Sensors and actuators in the devices that may be
smartphones, smart meters, other sensors and actuators deliver these functions.
The purpose of communication layer is to provide the means for connectivity
between the resources on one end and the different computing instances that host
and execute the service support and application logic on the other hand. It can use
LAN or WAN.
Service support layer is generally executed in data centers or server farms inside
the organizations or in a cloud environment. Few examples include software
upgrades, remote diagnostics and recovery services.
The data information layer provides a more abstract set of functions as its main
purpose is to capture knowledge and provide advanced control logic support.
The application layer provides specific IoT applications. There is an open-ended
array of applications and typical examples include smart metering in the smart grid.
In the business layer, the integration of the IoT application and business processes
occur. It focuses on supporting the core business or operations of any enterprise
that is interested in IoT applications.
Apart from the functional layers, there are three functional groups across different
layers:
1)Management:
As the name implies, the management group deals with the management of system
solution related to maintenance, administration, operation, and provisioning. This
includes management of devices, communication networks and general IT
infrastructure in the organization.
2)Security:
Security is the protection of the system, its information, and services from the
external threats and any other harm. Authorization, authentication, identity
management, and trust are main capabilities.
3)Data and services:
Data and service processing can, from a topological perspective, be done in a very
distributed fashion and at different levels of complexity.
Device and application FG: Device functional component contains the sensing,
actuation log, processing and storage components. Application functional group
contains the standalone application.
Communication FG: It contains the components for end-to-end communication,
network communication, and hop-by-hop communication.
IoT service FG: It consists of IoT service FC and IoT service resolution FC. Various
service implementations are covered in service FC and service resolution FC
contain necessary functions to realize a directory of IoT services that allow dynamic
management of IoT service descriptions.
Virtual entity FG: The virtual entity FG contains functions that support the
interactions between users and physical things through virtual entity services.
Process management FG: Provides the functional concepts necessary to
conceptually integrate the IoT world into traditional processes.
As we can see in the figure, there are two sensor nodes #1 and #2, each of which is
connected to eight car presence sensors.
They are also connected to the payment stations through wireless or wired
communication.
The payment station acts both as a user interface for the device to pay and get a
payment receipt as well as a communication gateway that connects the two sensor
nodes and payment interface physical devices with the internet through WAN.
The occupation sign also acts as a communication gateway for the actuator node,
and we assume that because of the deployment, a direct connection to the payment
station is not feasible.
The physical gateway devices connect through WAN to the internet and towards a
data center where the parking lot management system software is hosted as one of
the virtual machines on a platform as service configurations.
The two main applications connected to this management system are human user
mobile phone applications and parking operation center applications.
As shown in the diagram, a physical entity can contain another physical entity. For
example, a building contains several floors and each floor has several rooms.
The physical entity is represented in the digital world as the virtual entity.
A virtual entity can be a database entry, an image or avatar or any other digital unit.
The relations between the services and entities are represented using associations.
These associations can be static or dynamic.
By: Parita Sheth 22
Internet of Things and Applications]
Q-25 What can the shopping basket tell: IoT for the
retailing industry?
IoT has changed the retailing industry significantly.
There are four broad IoT application areas within the retailing industry.
1)Sensors fitted in the refrigerator and other electronic devices can save a huge
amount of energy for the retailers. This way the retailers can reduce their carbon
footprint which will lead to better customer loyalty.
2)Installing CCTV cameras for video analysis can trigger real-time automated alerts
which can help the retailer to provide stuff to the customers in urgent need. It will
lead to better customer experience, effective labor utilization and will ultimately
increase sales.
3)IoT sensors can enable the dynamic re-routing of delivery vans based on the
weather forecast and live traffic updates. Retailers can get better visibility into the
inventory using the RFID tags. This all results in cost saving and improved customer
satisfaction.
4)Using in-store sensors and video analysis, the retailer can understand customer
hot spots, flow pattern and purchase timings. This way the retailer can keep the
things together which is often bought by customers together. This is called market
basket analysis. It will increase the revenues for sure.
So, using IoT retailers can gain a deeper understanding of customer’s path to
purchase, shopping habits that can be used in a variety of ways to optimize various
customer touch points and build strong brand perception.
Latest technologies like RFID, NFC. Big Data, sensors, cloud computing etc. have
provided opportunities to redefine retail stores like never before.
It will reduce the emissions of harmful gases. Thus, it will help heal the environment.
Manufacturing has made huge progress in recent years.
The automation levels have increased in development of every product.
This has led to factories meeting the demands of customers in quick successions.
IoT will help manufacturers to manage their supply chains better.
It will also help them to optimize their inventories so that the production cost can be
reduced.
IoT can help monitor the status of the machinery in real-time.
In short, the manufactures can take care of what is happening at every point in the
production process.
Production of smart products will increase.
Smart products generally have three components: 1)Physical components, 2)Smart
components and 3)Connectivity components.
However, as the factories will merge physical and virtual worlds, the system will also
have to take care of the security and confidentiality.
The following diagram shows the future factory concept:
3)Cloud computing
1)Communication and connectivity
1)Networking
security.
Network layer infrastructure
2)Secure sensor interaction.
2)Network level protocols
3)Cross-domain data security handling.
1)Data format and structures.
1)Sensors for data
2)Access control to nodes.
Smart object collections
3)Lightweight encryption
2)Actuators
4)Trust attestation.
The objectives of SMARTIE are:
Understanding requirements for data and application security and creating a policy-
enabled framework supporting data sharing across applications.
Developing new technologies that establish trust and security in perception layer
and network layer.
Develop new technologies for trusted information creation and secure storage for
the information service layer.
Develop new technologies for information retrieval and processing guided by access
control policies in the application layer.
Demonstrate the project results in real use cases.
These are commonly used in most people’s daily lives. So, BUTLER project will help
the mankind a lot.
The BUTLER project uses secure communication devices that are adapted to the
limited capacity of devices that are part of the network.
The main achievement of BUTLER project is the release of the open-platform portal
on which IoT applications can be created.
This platform can also be used to define their relationships, reference to existing use
cases, infrastructures and deployment.
BUTLER also provides an authorization server which combined with managed
resources share the credentials for generation of session keys.
Authorization server authenticates the user and grants user the access to the
application.
The BUTLER project also provides a threat analysis model which can be used to
evaluate possible threats to the application in different scenarios.
This exposes the data to many threats and that is why the security of this data is
very important.
An attacker can hack the system and use the smart city data in wrong way, damage
the sensors and actuators physically etc.
SMARTIE is the first step in the direction of smart cities security.
It assures the main aspects of security such as confidentiality, integrity, and
availability.
Confidentiality means the absence of unauthorized disclosure of information.
Integrity is the prevention of unauthorized modification.
Availability means the system should be available all the time when users need it.
It will ensure that the private data is preserved while sharing.
Furthermore, the services offered will be more reliable if quality and trust of the
information are ensured.
Privacy and trust are key pre-requisites for citizens to participate in smart city
activities.
A smart city can improve their lives significantly.
Enterprises also benefit from the securely provided information as they can optimize
the demands and offer more tailored solutions.
All parties involved in the system such as sensors, actuators, users, owners and
service providers need strong mechanisms for reliability and trust.
Risk mitigation is really important because if the trust of the citizens is not
maintained, the smart city IoT system will fail badly.
The objectives of SMARTIE are:
Understanding requirements for data and application security and creating a policy-
enabled framework supporting data sharing across applications.
Developing new technologies that establish trust and security in perception layer
and network layer.
Develop new technologies for trusted information creation and secure storage for
the information service layer.
Develop new technologies for information retrieval and processing guided by access
control policies in the application layer.
Demonstrate the project results in real use cases.