Iot
Iot
Iot
Anthologize by
Ayesha Naureen M.Tech (Ph.D)
Assistant Professor
CSE Dept
BVRIT
AY: 2019-2020
SEM-I
III B.Tech
B. V. Raju Institute of Technology
III Year B.Tech. CSE I Sem
INTERNET OF THINGS
(Professional Elective I)
Outcomes: Upon the successful completion of the course, the student will be able:
1. Understand the architecture of Internet of Things and connected world
2. Understand how to use various hardware, communication and sensing technologies to build
IoT applications
3. Understand real time IoT applications that make our world super smart
4. Understand challenges and future trends in IoT
5. Apply key enabling technologies in practical day-to-day applications
6. Analyze how our surroundings can be made smarter with the help of Internet
Textbooks:
1. Internet of Things – From Research and Innovation to Market Deployment, Ovidiu Vermesan,
Peter Friess, River Publishers, 2014
2. Internet of Things – Converging Technologies for Smart Environments and Integrated
Ecosystems, Ovidiu Vermesan, Peter Friess, River Publishers, 2013
References:
1. The Internet of Things: Key Applications and Protocols, Olivier Hersent, David
Boswarthick, Omar Elloumi, Wiley, 2012
2. Building the Hyperconnected Society, Ovidiu Vermesan, Peter Friess, River Publishers, 2015
3. M2M Communications: A Systems Approach, By David Boswarthick, Omar Elloumi,
Olivier Hersent, Wiley, 2012
4. Designing the Internet of Things, Adrian McEwen, Hakim Cassimally, Wiley, 2014
Unit 1
Introduction:
The term Internet of Things was first coined by Kevin Ashton in the year 1999.
He described IoT as a “Network connecting objects in the physical world to the Internet”.
The Internet of Things can also be called as the smart object network, the web of objects,
the web of things, and cooperating objects.
It is a network of things, that are embedded with sensors and actuators, which can sense the
changes in the environment, communicate the information using the internet/cloud and
respond to those changes.
A Sensor is a device that can sense the change in the environment (or) that can read inputs
from the physical world.
An actuator is a device that can trigger an action.
Technical definition of smart objects, “A smart object is an item equipped with a form of
sensor or actuator, a tiny microprocessor, a communication device, and a power source. The
sensor or actuator gives the smart object the ability to interact with the physical world. The
microprocessor enables the smart object to transform the data captured from the sensors,
albeit at a limited speed and at limited complexity. The communication device enables the
smart object to communicate its sensor readings to the outside world and receive input from
other smart objects. The power source provides the electrical energy for the smart object to
do its work”.
A virtual object is a digital representation, semantically enriched, of a real world object
(human or lifeless, static or mobile, solid or intangible), which is able to acquire, analyse
and interpret information about its context, to augument the potentialities of associated
services for the benefits of the quality of the life of humans as final consumer of the real
world data. Examples: virtual button, virtual receptionist in theatre.
Wireless Sensor Networks (WSN): Wireless sensor networks have evolved from the idea
that small wireless sensors can be used to collect information from the physical environment
in a large number of situations ranging from wild fire tracking and animal observation to
agriculture management and industrial monitoring. Each sensor wirelessly transmits
information toward a base station. Sensors help each other to relay the information to the
base station. In wireless sensor networks envisioned sensor networks to be composed of so-
called smart dust. Smart dust would be composed of large numbers of tiny electronic systems
with sensing, computation, and communication abilities. It would be spread over an area
where a phenomenon, such as humidity or temperature, was to be measured.
Internet of Things: IoT falls under M2M interaction*. IoT is a subclass of ubiquitous
computing. We can achive pervasive computing through IoT. In IoT, Things, all over the
environment, are connected to internet/cloud and deployed by sensors and
actuators(Embedded systems). These smart objects can sense, communicate among
themselves - network of sensors(WSN)(MC). Only quality that makes IoT stand alone from
all other technologies is IoT can take a decision based on the sensed data and act accordingly.
Phases of IoT:
IoT represents a convergence of several domains and can be perceived as an umbrella term.
Fundamental Characteristics:
Interconnectivity: With regard to the IoT, anything can be interconnected with the
global information and communication infrastructure.
Dynamic changes: The state of devices change dynamically, e.g., sleeping and waking
up, connected and/or disconnected as well as the context of devices including location
and speed. Moreover, the number of devices can change dynamically.
Things-related services: The IoT is capable of providing thing-related services within
the constraints of things, such as privacy protection and semantic consistency between
physical things and their associated virtual things. In order to provide thing-related
services within the constraints of things, both the technologies in physical world and
information world will change.
Enormous scale: The number of devices that need to be managed and that communicate
with each other will be at least an order of magnitude larger than the devices connected to
the current Internet. The ratio of communication triggered by devices as compared to
communication triggered by humans will noticeably shift towards device-triggered
communication. Even more critical will be the management of the data generated and
their interpretation for application purposes. This relates to semantics of data, as well as
efficient data handling.
Heterogeneity: The devices in the IoT are heterogeneous as based on different hardware
platforms and networks. They can interact with other devices or service platforms
through different networks.
Security: IoT devices are naturally vulnerable to security threats. As we gain
efficiencies, novel experiences, and other benefits from the IoT, it would be a mistake to
forget about security concerns associated with it. There is a high level of transparency
and privacy issues with IoT. It is important to secure the endpoints, the networks, and the
data that is transferred across all of it means creating a security paradigm.
Sensing: IoT wouldn’t be possible without sensors which will detect or measure any
changes in the environment to generate data that can report on their status or even interact
with the environment. Sensing technologies provide the means to create capabilities that
reflect a true awareness of the physical world and the people in it. The sensing
information is simply the analogue input from the physical world, but it can provide the
rich understanding of our complex world.
Design Considerations of IoT application
Today’s consumers seem to want everything to be as small as possible, but at what cost?
Take wearables for example, Performance is often limited in these miniature form
factors, which are really only capable of supporting small bursts of data.
If small size and high-performance is mandated, a long-lasting battery will be needed to
extend power consumption demands, which can quickly make the overall solution larger
and more costly.
Outfitting a large space in a building can be equally as difficult since you will have to
determine just how many components will be needed to ensure sufficient signal
transmission throughout a facility.
In an indoor or urban area, with WiFi readily available, range can be measured in feet or
yards.
But in an outdoor or rural area, the range needed for a signal to reach the nearest
server/wireless gateway could be miles, requiring a cellular or GPS interface.
If it’s a long transmission distance, higher power and higher frequencies will be needed.
If it’s a remote location that can’t be accessed frequently, battery life will be an
important.
Interference with physical obstacles or other RF devices can also affect operational
distance.
Transmitter power is a very critical matter in the design of an application since it affects
both the range of the communication and the battery life.
The longer the range, the more power is required. The more power required, the shorter
the battery life.
If the device will be powered by batteries alone, then all design decisions must consider
how to preserve power.
Many networking technologies will not be a good fit with battery power. Frequency of
communication has an influence on power selection, too.
What environmental considerations need to be addressed?
One of the many benefits of wireless systems is that they can often go where human
beings cannot, include harsh and/or hazardous environments.
However, it’s important to verify what types of wireless systems are able to operate in
specific situations (hot, cold, wet, dry) and even extreme conditions.
For example, an application that needs to be implemented in a medical freezer, or one
used in a server farm that emits a great amount of heat, will likely require more frequent
monitoring and possibly built-in emergency alerts.
Even if your application isn’t targeted for use by the military, financial industry or health
organizations, security of information is, and always will be, a major design
consideration.
Bottom line, you need to design-in as many layers of encryption protocols as feasible;
SSL and passwords at the very minimum.
(OR)
When designing your first IoT device, there are 10 things to keep in mind:
1. Cost: “Smart” or IoT products help consumers and manufacturers alike, but they cost more.
Both Ethernet and wireless technologies have come down below $10, so consider networking
in your next product.
2. Network: The network technology you chose for your IoT product has distance and
gateway/router issues. If you need to get to the Internet then you need Ethernet/Wi-Fi; if you
are self-contained in a room or building then ZigBee, Z-Wave, and Bluetooth are available.
Remember all wireless technologies need FCC certification.
3. Features: With an IoT connected product, companies can now add features to their products
that were not possible or imagined. These features can get you direct access to the customer
for updates, maintenance, and new revenue opportunities.
4. User interface: How the user interfaces with a product is important. Are you going to use
buttons, LEDs, or a display on the product? Also what web and app interfaces are you going
to provide?
5. Power: One of the first decisions should be the power source. If the device will be powered
by batteries then all design decisions must consider how to preserve power. Many
networking technologies will not be a good fit with battery power. Frequency of
communication does have an influence on power selection, too.
6. Size: Size matters. Consider how the network will impact the size of the device. Connectors
and antennas required by some networks will add to the size.
7. Antenna: All wireless networks use an antenna, internal or external to the product. The trend
is to move the antenna inside the enclosure if it is plastic. All metal enclosures would require
external antennas.
8. Cloud: Cloud applications provide products a user interface to the product and the data.
There are private and public clouds. Most clouds have a standard API for developing your
application.
9. Interoperability: Does your product need to communicate with other vendors’ products? If
so, then you need to adopt a standard set of protocols, such as Apple’s HomeKit, to
communicate with other products.
10. Security: Security is becoming a major issue, so you need to design in as many layers of
security as feasible. SSL and password are the minimum.
UNIT -2
IoT Architecture
According to ITU-T:
1. Application Layer: This is the First or Top Layer, which contains the
application user interface. The application layer is responsible for delivering
application specific services to the user. It defines various applications in
which the Internet of Things can be deployed, for example, smart homes,
smart cities, and smart health.
2. Service and Application Support Layer: This layer provides the required
services and support for various Applications.
3. Network Layer: which contains the networking and transport capabilities.
This layer also performs the following functions; Gateway – Routing &
Addressing – Network Capabilities – Transport Capabilities – Error detection
& Correction. Also, it takes care of message routing, publishing and
subscribing.
4. Device Layer: This contains the gateways and the hardware and sensors and
RFID tags and others.
Along the four layers, the security and management capabilities and
functions are distributed.
According to IERC:
2. The service support and application support layer: All decisions related to the
monitoring, storage, organization and visualization of the received information, including
resolving virtual entities created, are made
a. IOT Business Process Management functions; which includes Business Process
Modeling and Business Process Execution
b. Service Organization functions; which includes Service Composition and Service
Orchestration,
c. Virtual Entity functions; which includes VE Resolution, VE service and VE &
IOT service monitoring, and finally, IOT service resolution and IOT service
functions.
3. The network and communication layer: there exists the network and communication
capabilities, such as; Gateway, Routing and addressing, Energy Optimization, QoS
(Quality of Service), Flow Control and Reliability, and error detection and correction.
Network Capabiliti, Transport Capabilities. Also, it takes care of message routing,
publishing and subscribing. With demand needed to serve a wider range of IOT services
and applications such as high speed transactional services, context-aware applications,
etc, multiple networks with various technologies and access protocols are needed to work
with each other in
a heterogeneous configuration. These networks can be in the form of a private, public or
hybrid models and are built to support the communication requirements for latency,
bandwidth or security.
4. The Device layer: This includes sensors, other hardware such as; embedded systems,
RFID tags and readers and others. The sensors enable the interconnection of the physical
and digital worlds allowing real-time information to be collected and processed. The
miniaturization of hardware has enabled powerful sensors to be produced in much
smaller forms which are integrated into objects in the physical world. There are various
types of sensors for different purposes. The sensors have the capacity to take
measurements such as temperature, air quality, movement and electricity.
In some cases, they may also have a degree of memory, enabling them to record a
certain number of measurements. A sensor can measure the physical property and convert
it into signal that can be understood by an instrument. Sensors are grouped according to
their unique purpose such as environmental sensors, body sensors, home appliance
sensors and vehicle telemetric sensors, etc. Many of these hardware elements provide
identification and information storage (e.g. RFID tags), information collection (e.g.
sensors), and information processing (e.g. embedded edge processors).
5. In the left side, the Management Capabilities, such as; QoS Manager and Device
Manager are distributed along the service support and application support layer and the
network and communication layer.
6. In the right side, the Security Management functions, such as; Authorization, Key
Exchange and Management, Trust and Reputation, Identity Management and
Authentication, exists in the service support and application support layer and the
network and communication layer.
Unit -3
Key Enabling technologies
SoC:
* A system on a chip or system on chip (SoC or SOC) is an integrated circuit (also
known
as an "IC" or "chip") that integrates all components of a computer or other electronic
systems.
A System on A Chip: typically uses 70 to 140 mm2 of silicon.
A SoC is a complete system on a chip. A `system' includes a microprocessor, memory
and peripherals.
SoC usually includes
Programmable processor(s)
Memory
Accelerating function units
Input/output interfaces
Software
Re-usable intellectual property blocks (HW + SW)
Buses
11. Multiprocessor/Multicore SoC is possible by interconnecting processors and using a
variety of mechanisms, including shared memories and message-passing hardware
entities such as specialized channels and mailboxes.
12. SoCs are found in every consumer product, from modems, mobile phones, DVD players,
televisions and iPods.
13. Types of SoCs:
SoCs built around a microcontroller,
• SoCs built around a microprocessor
3. Specialized SoCs designed for specific applications.
5. A separate category may be Programmable SoC (PSoC), where some of the
internal elements are not predefined and can be programmable.
Advantages of an SoC:
SoC consumes less power. Usually 90% of power consumption is in data and bus
address cabling. Since all the components are on the same chip and internally connected, and
their size is also very small, the power consumption is hugely
decreased.
5. A smaller size means it is lightweight and of small size.
7. Overall, the cost of a SoC is small due to advancements in VLSI technology. As
mentioned in the first point, cabling is not much required and so the cost of
cabling is conserved.
o A SoC provides greater design security at hardware and firmware levels. o
A SoC provides faster execution due to high speed processor and memory.
Disadvantages of a SoC:
o Initial cost of design and development is very high. If the number of SoCs is
small, the cost per SoC will be very high.
o Even a single transistor or system damage may prove to be very costly as the
complete board has to be replaced, and its servicing is very expensive.
o Integrating all systems on single chip increases complexity.
o It is not suitable for power-intensive applications.
Sensors:
Transducer: A device which converts one form of energy to another. Two types: o
Sensors: A device which gets input from the physical world. And converts
physical form to electrical form (ADC).
o Actuators: A device which trigger an action. And converts electrical to physical
form (DAC).
Instrument society of America defines sensor as “device which provides a usable output
in response to a specified measurements”.
Criteria to choose a Sensor: There are certain features which have to be considered
when we choose a sensor. They are as given below:
o Accuracy
o Environmental condition - usually has limits for temperature/ humidity o
Range - Measurement limit of sensor
o Calibration - Essential for most of the measuring devices as the readings changes
with time
o Resolution - Smallest increment detected by the sensor o
Cost
o Repeatability - The reading that varies is repeatedly measured under the same
environment
Sensor Features:
o It is only sensitive to the measured property (e.g., A temperature sensor senses
the ambient temperature of a room.)
o It is insensitive to any other property likely to be encountered in its application
(e.g., A temperature sensor does not bother about light or pressure.)
o It does not influence the measured property (e.g., measuring the temperature
does not reduce or increase the temperature).
Sensor Resolution
o The resolution of a sensor is the smallest change it can detect in the quantity
that it is measuring.
o The resolution of a sensor with a digital output is usually the smallest resolution
the digital output it is capable of processing.
o The more is the resolution of a sensor, the more accurate is its precision.
o A sensor’s accuracy does not depend upon its resolution.
3. Thermistors:
Thermistors are another kind of thermal resistor where a
large change in resistance is proportional to small change
in temperature.
4. ICs:
ICs - These silicon temperature sensors differ significantly from the above
mentioned types in a couple of important ways. The first is operating
temperature range. A temperature sensor IC can operate over the nominal
IC temperature range of -55°C to +150°C. The second major difference is
functionality.
A silicon temperature sensor is an integrated circuit, and can therefore
include extensive signal processing circuitry within the same package as
the sensor. There is no need to add compensation circuits for temperature
sensor ICs.
LM 35
temperature
sensor
2. IR Sensor
This device emits and/or detects infrared radiation to sense a particular phase in the
environment. Generally, thermal radiation is emitted by all the objects in the infrared
spectrum. The infrared sensor detects this type of radiation which is not visible to
human eye.
Advantages
o Easy for interfacing
o Readily available in market
o Singular casing (Transmitter + Receiver)
o Objects detection with high reflect parameter
Disadvantages
o Disturbed by noises in the surrounding such as radiations, ambient light etc.
o Low detecting distance
o Sensitive to color and quality
o Sensitive to background
o Dead zone
The basic idea is to make use of IR LEDs to send the infrared waves to the object.
Another IR diode of the same type is to be used to detect the reflected wave from the
object.
When IR receiver is subjected to infrared light, a voltage difference is produced across
the leads. Less voltage which is produced can be hardly detected and hence operational
amplifiers (Op-amps) are used to detect the low voltages accurately.
Measuring the distance of the object from the receiver sensor: The electrical property of
IR sensor components can be used to measure the distance of an object. The fact when IR
receiver is subjected to light, a potential difference is produced across the leads.
Introduction:
A fundamental concept behind cloud computing is that the location of the service,
and many of the details such as the hardware or operating system on which it is
running, are largely irrelevant to the user.
Cloud computing as a term has been around since the early 2000s, but the concept
of computing-as-a-service has been around for much, much longer -- as far back as
the 1960s, when computer bureaus would allow companies to rent time on a
mainframe, rather than have to buy one themselves.
o Platform-as-a-Service (PaaS):
This is able to develop, deploy and manage the execution of applications
using resources on cloud platform with proper software environment.
Such a platform includes operating system and runtime library support.
The platform cloud is an integrated computer system consisting of both
hardware and software infrastructure.
The user application can be developed on this virtualized cloud platform.
User does not manage the underlying cloud infrastructure.
The cloud provider supports user application development and testing on a
well-defined service platform.
This PaaS model enables a collaborated software development platform for
users from different parts of the world.
Examples: OS, SDKs, Platforms like .net, Java, Python etc.
o Software-as-a-Service (SaaS):
This refers to browser-initiated application software over thousands of
cloud customers.
Services and tools offered by PaaS are utilized in construction of
applications and management of their deployment on resources offered by
IaaS providers.
Whereas SaaS model provides software applications as a service.
As a result, there is no need to user to buy software licensing.
Examples: Google Gmail and Google Docs, Microsoft SharePoint, CRM
software from salesforce. com
Types of Clouds / Deployment models:
Public Cloud:
o Public cloud is the classic cloud computing model, where users can access a large
pool of computing power over the internet (whether that is IaaS, PaaS, or SaaS).
o One of the significant benefits here is the ability to rapidly scale a service.
o The cloud computing suppliers have vast amounts of computing power, which
they share out between a large numbers of customers -- the 'multi-tenant'
architecture.
o The public cloud allows systems and services to be easily accessible to the
general public. Public cloud may be less secure because of its openness.
o Examples of public cloud are Thingspeak for IoT, Amazon Web Services,
Google cloud, IBM Blue cloud, Microsoft Azure, Aneka etc.
Private Cloud:
o The private cloud allows systems and services to be accessible within an
organization. It is more secured because of its private nature.
o Companies can control exactly where their data is being held and can build the
infrastructure in a way they want - largely for IaaS or PaaS projects - to give
developers access to a pool of computing power that scales on-demand without
putting security at risk.
Community Cloud:
o The community cloud allows systems and services to be accessible by a group of
organizations.
Hybrid Cloud:
o The hybrid cloud is a mixture of public and private cloud, in which the critical
activities are performed using private cloud while the non-critical activities are
performed using public cloud.
o Some data in the public cloud, some projects in private cloud, multiple vendors
and different levels of cloud usage.
o According to research by TechRepublic, the main reasons for choosing hybrid
cloud include disaster recovery planning and the desire to avoid hardware costs
when expanding their existing data center.
The exact benefits will vary according to the type of cloud service being used but,
fundamentally, using cloud services means companies not having to buy or maintain
their own computing infrastructure.
This minimizes maintenance of infrastructure. All maintenance is taken care by
service provider.
Cloud services may be able to deliver a more secure and efficient service to end
users.
Cloud computing makes scaling much easy.
Bluetooth:
Bluetooth is a standardized protocol for sending and receiving data. Standard is
IEEE 802.15.1.
It is named after a Danish king, King Harald Bluetooth.
It’s a secure protocol, and it’s perfect for short-range, low-power, low-cost, wireless
transmissions between electronic devices.
It is developed by Bluetooth SIG, which includes Nokia, IBM, Intel, Toshiba, and
Ericsson etc.
The Bluetooth protocol operates at 2.4GHz in ISM frequency band where RF protocols
like ZigBee and WiFi also exist. (ISM- Industrial, Scientific and Medical Radio band)
Bluetooth Working:
Bluetooth networks (commonly referred to as piconets) use a master/slave model to
control when and where devices can send data.
In a piconet, a single master device can be connected to up to seven different slave
devices. Any slave device in the piconet can only be connected to a single master.
Slave
Slave Slave
Master
Slave Slave
Slave Slave
One master per piconet but a master in one piconet can participate as a slave in a
different piconet.
Slaves are time division multiplexed into more than one piconet.
Piconets not time or frequency synchronized.
The master coordinates communication throughout the piconet.
It can send data to any of its slaves and request data from them as well. Slaves are only
allowed to transmit to and receive from their master. They can’t talk to other slaves in
the piconet.
Connection process:
Inquiry: If two Bluetooth devices know absolutely nothing about each other, one must
run an inquiry to try to discover the other. One device sends out the inquiry request, and
any device listening for such a request will respond with its address, and possibly its
name and other information.
Paging (Connecting): Paging is the process of forming a connection between two
Bluetooth devices. Before this connection can be initiated, each device needs to know
the address of the other (found in the inquiry process).
Connection: After a device has completed the paging process, it enters the connection
state. While connected, a device can either be actively participating or it can be put into
a low power sleep mode.
Modes:
o Active Mode – This is the regular connected mode, where the device is actively
transmitting or receiving data.
o Sniff Mode – This is a power-saving mode, where the device is less active.
It’ll sleep and only listen for transmissions at a set interval (e.g. every 100ms).
o Hold Mode – Hold mode is a temporary, power-saving mode where a device
sleeps for a defined period and then returns back to active mode when that
interval has passed. The master can command a slave device to hold.
o Park Mode – Park is the deepest of sleep modes. A master can command a slave
to “park”, and that slave will become inactive until the master tells it to wake
back up.
Bluetooth Profiles:
Bluetooth profiles are additional protocols that build upon the basic Bluetooth standard
to more clearly define what kind of data a Bluetooth module is transmitting.
While Bluetooth specifications define how the technology works, profiles define how it’s
used.
A hands-free Bluetooth headset, for example, would use headset profile (HSP), while a
Nintendo Wii Controller would implement the human interface device (HID) profile.
For two Bluetooth devices to be compatible, they must support the same profiles.
Few commonly used profiles:
Serial Port Profile (SPP) - SPP is great for sending bursts of data between
two devices.
Human Interface Device (HID) - HID is the go-to profile for Bluetooth-enabled
user-input devices like mice, keyboards, and joysticks.
Hands-Free Profile (HFP) and Headset Profile (HSP) - HFP is used in the
hands-free audio systems built into cars. HSP to allow for common phone
interactions (accepting/rejecting calls, hanging up, etc.)
Advanced Audio Distribution Profile (A2DP) - defines how audio can be
transmitted from one Bluetooth device to another.
A2DP is a one-way street, but the audio quality has the potential to be much higher.
A2DP is well-suited to wireless audio transmissions between an MP3 player and a
Bluetooth-enabled stereo.
A/V Remote Control Profile (AVRCP) - allows for remote controlling of a
Bluetooth device.
It’s usually implemented alongside A2DP to allow the remote speaker to tell the
audio-sending device to fast-forward, rewind, etc.
Bluetooth Address:
Every single Bluetooth device has a unique 48-bit address (BD_ADDR).
This will usually be presented in the form of a 12-digit hexadecimal value.
The most-significant half (24 bits) of the address is an organization unique identifier
(OUI).
The lower 24-bits are the more unique part of the address of the device.
Power Classes:
The transmit power, and therefore range, of a Bluetooth module is defined by its power
class. There are three defined classes of power:
Class 3 0 dBm 1 mW 10 cm
Bluetooth Versions:
Bluetooth v1.2: The v1.x releases laid the groundwork for the protocols and
specifications future versions would build upon. Bluetooth v1.2 was the latest and most
stable 1.x version.
Bluetooth v2.1 + EDR: The 2.x versions of Bluetooth introduced enhanced data
rate (EDR), which increased the data rate potential up to 3 Mbps (closer to 2.1
Mbps in practice). Bluetooth v2.1, released in 2007, introduced secure simple
pairing (SSP), which overhauled the pairing process.
Bluetooth v3.0 + HS (High Speed): Bluetooth v3.0’s optimum speed is 24 Mbps.
Bluetooth v4.0 and Bluetooth Low Energy: Bluetooth 4.0 split the Bluetooth
specification into three categories: classic, high-speed, and low energy. Classic and high
speed call-back to Bluetooth versions v2.1+EDR and v3.0+HS respectively. The real
standout of Bluetooth v4.0 is Bluetooth low energy (BLE).
Functions of iBeacon:
UUID: 12345678910245
Major: 22
Minor: 2
A device receiving this packet would understand it’s from the Coca-Cola Beacon
(UUID) in the Target on 1st Street (Major) at the front of the store (Minor).
With an iBeacon network, any brand, retailer, app, or platform will be able to understand exactly
where a customer is in the brick and mortar environment. This provides an opportunity to send
customers highly contextual, hyper-local, meaningful messages and advertisements on their
smartphones.
Example: A consumer carrying a smartphone walks into a store. Apps installed on a consumer’s
smartphone listen for iBeacons. When an app hears an iBeacon, it communicates the relevant
data (UUID, Major, Minor, Tx) to its server, which then triggers an action. This could be
something as simple as a push message [“Welcome to Target! Check out Doritos on Aisle 3!”],
and could include other things like targeted advertisements, special offers, and helpful reminders
[“You’re out of Milk!”]. Other potential applications include mobile payments and shopper
analytics and implementation outside of retail, at airports, concert venues, theme parks, and
more. The potential is limitless.
This technology should bring about a paradigm shift in the way brands communicate with
consumers. iBeacon provides a digital extension into the physical world. We’re excited to see
where iBeacon technology goes in the next few years.
Raspberry Pi
Raspberry Pi is a credit card sized bargain micro Linux machine.
•The goal behind creating Raspberry Pi was to create a low cost devicethat would improve
programming skillsand hardware understanding for students.
•The latest model of Raspberry Pi comes sporting 1 GB of RAM, 1200 MHz quad –core ARM
Cortex-A53 processor, and basic levels of functionality that enables hobbyists, computer
enthusiasts, and students to use this device for DIY projects.
•Raspberry Pi is open hardwarewith the exception of its primary chip, the
BroadcommSoCwhich runs the main components of the board –CPU, graphics, memory, USB
controller etc.
After completing this setup , you will have your device powered up and working as a full fledged
Linux box running Debian.
If you are unable to chose the device in Win32DiskImager, try using ‘flashnul’ to do a similar
installation. Alternatively, you can use the Fedora ARM Installer to download and install RPi
Fedora Remix images (http://fedoraproject.org/wiki/Fedora_ARM_Installer)
Step 1: SD Card setup by flashing the cardInstructions for Linux command line•Download the
zip file containing the image of the distribution : http://www.raspberrypi.org/downloads•Extract
image with : unzip ~/2012-12-16-wheezy-raspbian.zip•Run df–hto see what devices are currently
mounted.•Insert SD card into your computer and run df–hagain. Your SD card will be listed as
something like "/dev/mmcblk0p1" or "/dev/sdd1". The last part ("p1" or "1" respectively) is the
partition number, but you want to write to the whole SD card, not just one partition, so you need
to remove that part from the name (getting for example "/dev/mmcblk0" or "/dev/sdd").•Now,
unmount the SD card (and all its partitions that show up) -umount/dev/sdd1 (replace
/dev/sdd1...)•In the terminal write the image to the card with this command, making sure you
replace the input fileif=argument with the path to your .imgfile, and the "/dev/sdd" in the output
fileof=argument with the right device name(IMPORTANT !!! The wrong device name will cause
you to lose all data on the hard drive) ddbs=4M if=~/2012-12-16-wheezy-raspbian.img
of=/dev/sdd---Might need to sudofor this. •As root run the commandsyncor if a normal user
runsudosync(this will ensure the write cache is flushed and that it is safe to unmount your SD
card)•Remove SD card from reader and insert in RPi.
Step 2: Raspberry Pi cabling
•Push SD card into the SD card slot.•Plug the HDMI cable into the HDMI output of the
Raspberry Pi and connect to the TV/monitor.•Turn on monitor and switch to the HDMI
port.•Insert the network cable and connect to the router.•Connect the keyboard and mouse via
USB ports.•Plug the power supply into the micro USB.•The device is now ready for the next
steps
Aurdino:-
15.Digital I / O
The Arduino UNO board has 14 digital I/O pins(15)(of which 6 provide PWM (Pulse
Width Modulation) output.Thesepins can be configured to work as input digital pins to
read logic values (0 or 1) or as digital output pins to drive different modules like LEDs,
relays,etc.The pins labeled “~” can be used to generate PWM
16.AREF
AREFstands for Analog Reference. It is sometimes,used to set an external reference
voltage (between 0 and 5 Volts) as the upper limit for the analog input pins
Arduino –Installation
After learning about the main parts of the Arduino UNO board, we are ready to learn how
to set up the Arduino IDE. Once we learn this, we will beready to upload our program on
the Arduino board. Inthis section,we will learn in easy steps, how to set up the Arduino
IDE on our computer and prepare the board to receive the programvia USB cable.
Step1:Firstyou must have your Arduino board (you can choose your favorite board) and a
USB cable. In case you use Arduino UNO, Arduino Duemilanove, Nano, Arduino Mega
2560, or Diecimila, you will need a
standard USB cable (A plug to B plug),the kind you would connect to a USB printeras
shown in the following image
Step 2: Download Arduino IDE Software. You can get different versions of Arduino IDE
from the Download pageon the Arduino Official website. You must select your software,
which is compatible with your operating system (Windows, IOS, or Linux). After your
file download is complete,unzip the file.
Step 5: Open your first project.Oncethe softwarestarts, you have two options:Create
anew project.Open an existing project example.
Arduino13Here,we are selectingjust one of the exampleswith the name Blink. Itturns the
LEDon and off with some time delay.You can select any otherexample from the list.Step
6: Select your Arduino board.To avoid any error while uploadingyour program to
theboard,you must select the correct Arduino boardname,whichmatcheswith theboard
connected to your computer.Go to Tools ->Boardand select your board.
Arduino15Step 7:
Select your serial port.Select the serial device of the Arduino board.Go toTools->Serial
Port menu. This is likely to be COM3 or higher (COM1 and COM2 are usually reserved
for hardware serial ports). To find out, you can disconnect your Arduino board and re-
open the menu,the entry that disappears should be of the Arduino board. Reconnect the
board and select that serial port.
Step 8: Upload the program to your board.
Before explaining how we can upload our program to the board, we must demonstrate the
function of each symbol appearingin the ArduinoIDE toolbar
Protocols:-
Identification and Tracking Technologies:
RFID Components
Passive tags collect energy from nearby RFID reader’s interrogating radio waves. Active tags
have a local power source (battery) and may operate at hundreds of meters from RFID
reader. Two way radio transmitter-receiver called Interrogators or readers send a signal to the tag
and read its response.
It is a set of communication protocols that enable two electronic devices, one of which is usually
a portable device such as a smartphone, to establish communication by bringing them within 4
cm (1.6 in) of each other.
1.NFC card emulation—enables NFC-enabled devices such as smartphones to act like smart
cards, allowing users to perform transactions such as payment or ticketing.
It is an open global standard for wireless technology designed to use low-power, low data rate
digital radio signals for personal area networks with close proximity.
Zigbee PRO
Zigbee RF4CE
Zigbee IP
Zigbee PRO
It aims to provide the foundation for IoT with features to support low-cost, highly reliable
networks for device-to-device communication. Zigbee PRO also offers Green Power, a new
feature that supports energy harvesting or self-powered devices that don’t require batteries or AC
power supply. Zigbee’s addressing scheme is capable of supporting more than 64,000 nodes per
network and multiple network coordinators can be linked together to support extremely large
networks.
It is designed for simple, two-way device-to-device control applications that don’t need the full-
featured mesh networking functionalities. It offers an immediate, low-cost, easy-to-implement
networking solution for control products based on Zigbee Remote Control and Zigbee Input
Device. Eg: Home entertainment devices, Garage door openers, Keyless entry systems and many
more.
Zigbee IP
It optimizes the standard for IPv6-based full wireless mesh networks, offering internet
connections to control low-power, low-cost devices.
Each node on a network can be individually addressed using IPv6 routing and addressing
protocol.
Zigbee IP provides multicast capability. It enables service discovery using multicast DNS
(mDNS) and DNS-Service Discovery (DNS SD) protocols.
IPv6
is good for IoT and IoT is good for IPv6. There are several arguments and features that
demonstrate that IPv6 is actually a key communication enabler for the future Internet of Things:
The LTE
you use on your phone is the not the same LTE for IoT. For instance, Verizon rolled out
LTE in 2014 but didn’t announce LTE for IoT until July 2017. From there, it takes time
for cellular and wireless chip providers to implement LTE into modules that can be used
for IoT applications. While some early chips were released around that time, U-Blox, a
wireless module provider, became one of the first to offer a cellular module certified to
support AT&T’s LTE-M network with the release of their SARA-R410M module. With
the SARA-R410M, IoT platform providers like Particle finally had the modules they
needed to offer LTE to their customers.
This isn’t the end of LTE for IoT either. Narrowband IoT (Cat-NB1) is a proposed Low
Power Wide Area (LPWA) technology that is supposed to work anywhere and is
optimized to handle small amounts of infrequent data. Currently, North America (AT&T
and Verizon) are adopting Cat-M1, while Europe is adopting Cat-NB1, which goes to
show that many LTE solutions are still in the works and will continue to be improved
upon over time. Due to this, product creators and enterprises should be turning their
attention to LTE if they want to work undisrupted for the next 10+ years.
UNIT 4
SERVICES AND ATTRIBUTES OF IOT
Introduction:
Data is a collection of raw facts.
Big Data: The term big data was first used to refer to
increasing data volumes in the mid-1990s.
The term has been in use since the 1990s, with some
giving credit to John Mashey for coining or at least
making it popular.
Big data usually includes data sets with sizes beyond the ability of commonly used
software tools to capture, curate, manage, and process data within a tolerable elapsed
time.
Big data philosophy encompasses unstructured, semi-structured and structured data;
however the main focus is on unstructured data.
Big data "size" is a constantly moving target, as of 2012 ranging from a few
dozen terabytes to many Exabytes of data.
Big data requires a set of techniques and technologies with new forms of integration to
reveal insights from datasets that are diverse, complex, and of a massive scale.
Big Data:
Big data can be defined by 4 Vs.
Volume:
Volume refers to the amount of data (Size of
the data).
Today data size has increased to size of
terabytes in the form of records or
transactions. 90% of all data ever created,
was created in the past 2 years.
From now on, the amount of data in the
world wills double every two years. By
2020, we will have 50 times the amount of
data as that we had in 2011.
In the past, the creation of so much data
would have caused serious problems. Nowadays, with decreasing storage costs, better
storage solutions like Hadoop and the algorithms to create meaning from all that data
this is not a problem at all.
Massive volumes of data are getting generated, in the range of tera bytes to zeta bytes.
The data generated by machines, networks, devices, sensors, satellites, geospatial data
and human interaction on systems like transaction-based data (stored through years),
text, images, videos from social media, etc.
Velocity:
The Velocity is the speed at which the data is created, stored, analyzed and
visualized.
In the past, when batch processing was common practice, it was normal to receive an
update from the database every night or even every week.
In the big data era, data is created in real-time or near real-time which is called as
“Streaming data”.
With the availability of Internet connected devices, wireless or wired, machines and
devices can pass-on their data the moment it is created.
The speed at which data is created currently is almost unimaginable: Every minute we
upload 100 hours of video on YouTube. In addition, every minute over 200 million
emails are sent, around 20 million photos are viewed and 30,000 uploaded on Flickr,
almost 300,000 tweets are sent and almost 4 to 5 million queries on Google are
performed.
According to Gartner, velocity means both how fast the data is being produced and how
fast the data must be processed to meet demand.
The flow of data is massive and continuous. This real-time data can help business to
make decision in real time.
Variety:
Variety refers to the many sources and types of data.
In the past, all data that was created was structured data, it neatly fitted in columns and
rows but those days are over.
Nowadays, 90% of the data that is generated by organizations is unstructured data.
Data today comes in many different formats: structured data, semi-structured data,
unstructured data and even complex structured data.
Structured Data: Any data that can be stored, accessed and processed in the form of
fixed format is termed as a structured data. Structured data refers to kinds of data with
a high level of organization, such as information in a relational database.
Example: Relational Data
Unstructured Data: Any data with unknown form or unknown structure is classified
as unstructured data. It often includes text and multimedia content.
Examples: e-mail messages, word processing documents, videos, photos, audio files,
presentations, webpages and many other kinds of business documents.
Veracity:
Big data veracity refers to the biases, noise and abnormalities, ambiguities,
incompleteness, inconsistencies and latency in data.
Is the data that is being stored and mined, meaningful to the problem being
analyzed?
Keep your data clean and processes to keep 'dirty data' from accumulating in your
systems.
Having a lot of data in different volumes coming in at high speed is worthless if that data is
incorrect.
Incorrect data can cause a lot of problems for organizations as well as for consumers.
Therefore, organizations need to ensure that the data is correct as well as the analyses
performed on the data are correct.
Especially in automated decision-making, where no human is involved anymore, you need
to be sure that both the data and the analyses are correct.
Big data technology ecosystem:
“The process of examining large data sets containing a variety of data types (i.e., Big
Data) to uncover hidden patterns, unknown correlations, market trends, customer
preferences, and other useful information.”
Big data analytics is the scientific process of transforming data into insights for making
better decisions.
There are various types of tools that may fall under the umbrella of Big Data Analytics or
serve to improve the process of analyzing data: data storage and management, data
cleaning, data mining, data analysis, data visualization, data integration, and data
collection.
Types of IoT Big data analytics:
They can be categorized into 6 main categories:
All these require a deep understanding of domains, situation and the requirements of
services by users.
Gaining insights and knowledge in real time and actionable insights can lead to
performance optimization.
All 5 applications are inter-related and require multiple tools like machine learning,
reasoning, optimization etc.
Analytics can provide services such as observing behavior of things, gaining
important insights and processing in real time for immediate actions.
Descriptive Analytics:
Use data aggregation and data mining to provide insight into the past and
answer: “What has happened?”
Offers insights into the situation and help in deep understanding.
The vast majority of the statistics we use fall into this category. (Think
basic arithmetic like sums, averages, percent changes).
Usually, the underlying data is a count, or aggregate of a filtered column of data
to which basic math is applied.
For all practical purposes, there are an infinite number of these statistics.
Descriptive statistics are useful to show things like, total stock in inventory,
average dollars spent per customer and Year over year change in sales.
Eg: Reports that provide historical insights regarding the company’s production,
financials, operations, sales, finance, inventory and customers.
Diagnostic Analytics:
Historical data can be measured against other data to answer the question
of “why something happened?”
To find out dependencies and to identify patterns.
Companies go for diagnostic analytics, as it gives a deep insight into a particular
problem.
2. At the same time, a company should have detailed information at their disposal;
otherwise data collection may turn out to be individual for every issue and time-
consuming.
Eg: Healthcare provider compares patients’ response to a promotional campaign in
different regions; a retailer drills the sales down to subcategories.
Another flashback to our BI projects: in the healthcare industry, customer
segmentation coupled with several filters applied.
Use statistical models and forecasts techniques to understand the future and
answer: “What could happen?”
Predictive analytics is used in applications where users require service that can
foresee the situation and act on it.
Predictive analytics provide estimates about the likelihood of a future outcome.
It is important to remember that no statistical algorithm can “predict” the future
with 100% certainty.
They combine historical data to identify patterns in the data and apply statistical
models and algorithms to capture relationships between various data sets.
Eg: Weather forecasting, Cab journey time estimation, Traffic jam estimation, Credit
score of a person (These scores are used by financial services to determine the
probability of customers making future credit payments on time) etc.
• Prescriptive Analytics:
6. The trick with Big Data visualization is choosing the most effective way to visualize
the data to surface any insights it may contain.
7. In some circumstances simple business tools such as pie charts or histograms may reveal
the whole story, but with large, numerous and diverse data sets more esoteric
visualization techniques may be more appropriate.
8. Various Big Data visualization examples include:
Linear: Lists of items, items sorted by a single feature.
2D/Planar/Geospatial: Cartograms, dot distribution maps, proportional symbol
maps, contour maps.
3D/Volumetric: 3D computer models, computer simulations
Temporal: Timelines, time series charts, connected scatter plots, arc diagrams,
circumflex charts.
Multidimensional: Pie charts, histograms, tag clouds, bar charts, tree maps, heat
maps, spider charts.
Tree/Hierarchical: Dendrogram, radial tree charts, hyperbolic tree charts.
Interactive charts
8. The tools for Big Data visualization should provide a certain set of
features: o Capability to process multiple types of incoming data
o Capability to apply various filters to adjust the results
o Capability to interact with the data sets during the analysis
o Capability to connect to other software to receive incoming data or provide input
for them
o Capability to provide collaboration options for the users.
Security
q IoT PKI:
Providing complete X.509 digital certificate and cryptographic key and life-cycle
capabilities, including public/private key generation, distribution, management, and
revocation.
The hardware specs for some IoT devices may limit or prevent their ability to utilize PKI.
Digital certificates can be securely loaded onto IoT devices at the time of manufacture
and then activated/enabled by third-party PKI software suites; the certificates could also
be installed post-manufacture.
r IoT security analytics:
Collecting, aggregating, monitoring, and normalizing data from IoT devices and
providing actionable reporting and alerting on specific activities or when activities fall
outside established policies.
These solutions are starting to add sophisticated machine learning, artificial intelligence,
and big data techniques to provide more predictive modeling and anomaly detection (and
reduce the number of false positives), but these capabilities are still emerging.
IoT security analytics will increasingly be required to detect IoT-specific attacks
and intrusions that are not identified by traditional network security solutions such
as firewalls.
s IoT API security:
Providing the ability to authenticate and authorize data movement between IoT devices,
back-end systems, and applications using documented REST-based APIs.
API security will be essential for protecting the integrity of data transiting between edge
devices and back-end systems to ensure that only authorized devices, developers, and
apps are communicating with APIs as well as detecting potential threats and attacks
against specific APIs.
Localization
Localization in the Internet of Things Network:
Location awareness, providing ability to identify the location of sensor, machine,
vehicle, and wearable device, is a rapidly growing trend of hyper-connected society and
one of key ingredients for Internet of things (IoT).
p Localization means
Identifying the Location of a smart object
Restricting area of a Network
Smart Object adopting Local Customs, slang, idioms, Trends etc.
q In order to make a proper reaction to the collected information from devices, location
information of things should be available at the data center.
r One challenge for the massive IoT networks is to identify the location map of whole
sensor nodes from partially observed distance information.
s This is especially important for massive sensor networks, relay-based and hierarchical
networks, and vehicular to everything (V2X) networks.
t Many localization algorithms and systems have been developed by means of wireless
sensor networks for both indoor and outdoor environments.
u To achieve higher localization accuracy, extra hardware equipments are utilized by most
of the existing localization solutions, which increase the cost and considerably limit the
location-based applications.
v Location-based service is a primary service of the IOT, while localization accuracy is
a key issue.
w But what localization-specific challenges are associated with this global connectivity
growth?
Volume of Data
1 The collection of data is a cornerstone of the IoT.
2 However, data is essentially useless if it cannot be translated into a usable form.
3 If a sensor captures data once every minute, this would result in 1,440 data
samples per day. What if there are 10 sensors that each capture data once per
second? Translating this mass of data for your global customer base presents a
big headache.
4 Machine Translation (MT) or Automated Translation allows for increased
productivity, reduced translation time, and greater cost savings.
Agile localization will be crucial.
1 Language Service Providers (LSPs) are already accustomed to agile
practices within the paradigms of mobile, cloud computing and big data but
the IoT whirlwind is about to make things even faster.
2 There will be rapid, regular, time-critical content distribution across multiple
devices and channels.
3 Your language strategy will need to be proactive which is why it makes sense to
leverage automated technology and continuous translation workflows.
User Experience
1 If connected devices are to be adopted on a global scale, users speaking a wide
range of languages will have to understand them.
Essentially IoT device makers will need to distribute professionally
localized content that caters for local idioms, current slang, and social and
linguistic trends. Being ‘Glocal’ will be key.
Users will want IoT devices and apps in their local language and adapted for their
culture.
Formats for date, time, temperature scales, measurement systems, currency, icons, etc. will
have to reflect the user’s specific target market.
Programmed World:
p In the Programmed World, all our devices will act as one.
q Alarm clocks will talk to coffee machines, gym machines will activate your workout
routine as you approach, medical devices will schedule appointments with your local
clinics, moisture sensors on lawns will check weather forecasts to predict water
requirements before turning on the sprinklers, your swimming pool will heat up when a
BBQ is scheduled on the calendar etc.
Actionable Intelligence:
p But what will we choose to do with all this information to benefits our lives?
q Actionable Intelligence, they call it.
r We can creatively choreograph devices to respond to our needs and we can use that
information to improve our way of life, both from a personal and business perspective.
Real-time translation:
p Many organizations across the world are already bringing devices to life through near
natural language.
q SIRI by Apple is a prime example of that.
r We can probably expect devices to evolve to optimize speech to text and text to speech
recognition linking machine translation (MT) and becoming ‘robot interpreters’.
A need to be agile:
p An agile approach is needed, with shorter word counts and faster throughputs.
q Localization is a vital part of the ‘relay race’ and resources must be in place with a tight
nit, speedy production line to get to the finish line.
Adaptation for success:
p Understanding the goal behind that device and making sure it’s achievable in all
markets.
q What are the relevant local customs and how should the device be adapted for optimal
user experience in each market?
r Companies will require consulting and testing services to reach that goal.
Maintainability
p Maintainability is defined as the probability of performing a successful repair
action within a given time.
q In other words, maintainability measures the ease and speed with which a system can
be restored to operational status after a failure occurs.
r This is similar to system reliability analysis except that the random variable of interest in
maintainability analysis is time-to-repair rather than time-to-failure.
s If it is said that a particular component has 90% maintainability for one hour, this means
that there is a 90% probability that the component will be repaired within an hour.
t When you combine system maintainability analysis with system reliability analysis, you
can obtain many useful results concerning the overall performance (availability, uptime,
downtime, etc.) that will help you to make decisions about the design and/or operation of
a repairable system.
In engineering, maintainability is the ease with which a product can be maintained in order to:
p correct defects or their cause,
q repair or replace faulty or worn-out components without having to replace still
working parts,
r prevent unexpected working condition,
s maximize a product's useful life,
t maximize efficiency, reliability, and safety,
u meet new requirements,
v make future maintenance easier, or
w cope with a changed environment.
Maintenance testing:
Maintenance testing is the type of software testing that refers to testing the changes to an
operational system or the impact of a changed environment to an operational system.
Maintainability can be either
o a static form of testing, i.e. carried out by inspections and reviews, or
p a dynamic form i.e. measuring the effort required to execute maintenance
activities.
Maintainability Assessment – Static Maintainability Testing:
Example:
The causes of poor maintainability are as follows:
Maintainability can be described in terms of four sub-attributes:
2 Analyzability: It relates to the effort required to diagnose defects or to identify parts
of the software system requiring change.
3 Changeability: It relates to the effort required to actually fix defects or make
improvements.
4 Stability: It is the likelihood that unexpected side effects occur as a result of making
changes to the software. It's what we have in mind when we sometimes say that the
software is brittle.
5 Testability: It describes the effort required for testing changed software. This is one
of the principal software quality attributes that directly affect our work.
UNIT 5
IOT Applications
Technical Challenges
Security and privacy
Connectivity
Compatibility and Longevity
Intelligent analysis and actions
Energy
Heterogeneous things
Communication protocols
Real time solutions
Connectivity:
From the viewpoint of network, the IoT is a very complicated heterogeneous network,
which includes the connection between various types of networks through various
communication technologies.
Currently, there is lack of a widely accepted common platform that hides the
heterogeneity of underlining networks/communication technologies and provides a
transparent naming service to various applications.
Connecting so many devices will be one of the biggest challenges of the future of IoT,
and it will defy the very structure of current communication models and the underlying
technologies.
At present we rely on the centralized, server/client paradigm to authenticate, authorize
and connect different nodes in a network.
This model is sufficient for current IoT ecosystems, where tens, hundreds or even
thousands of devices are involved.
But when networks grow to join billions and hundreds of billions of devices, centralized
systems will turn into a bottleneck.
Such systems will require huge investments and spending in maintaining cloud servers
that can handle such large amounts of information exchange, and entire systems can go
down if the server becomes unavailable.
The future of IoT will very much have to depend on decentralizing IoT networks.
Part of it can become possible by moving some of the tasks to the edge, such as using
critical operations and cloud servers take on data gathering and analytical responsibilities.
Compatibility and Longevity:
* IoT is growing in many different directions, with many different technologies competing
to become the standard.
* This will cause difficulties and require the deployment of extra hardware and software
when connecting devices.
* Other compatibility issues stem from non-unified cloud services, lack of standardized
M2M protocols and diversities in firmware and operating systems among IoT devices.
* Some of these technologies will eventually become obsolete in the next few years,
effectively rendering the devices implementing them useless.
Intelligent Analysis & Actions:
The last stage in IoT implementation is extracting insights from data for analysis, where
analysis is driven by cognitive technologies and the accompanying models that facilitate
the use of cognitive technologies.
Artificial intelligence models can be improved with large data sets that are more readily
available than ever before, thanks to the lower storage
Growth in crowdsourcing and open- source analytics software: Cloud-based
crowdsourcing services are leading to new algorithms and improvements in existing ones
at an unprecedented rate.
Real-time data processing and analysis: Analytics tools such as complex event processing
(CEP) enable processing and analysis of data on a real-time or a near real-time basis,
driving timely decision making and action.
Challenges facing the adoptions of intelligent analytics within IoT:
Inaccurate analysis due to flaws in the data and/or model: A lack of data or presence of
outliers may lead to false positives or false negatives, thus exposing various algorithmic
limitations
Legacy systems’ ability to analyze unstructured data: Legacy systems are well suited to
handle structured data; unfortunately, most IoT/business interactions generate
unstructured data
Legacy systems’ ability to manage real- time data: Traditional analytics software
generally works on batch-oriented processing, wherein all the data are loaded in a batch
and then analyzed
The second phase of this stage is intelligent actions which can be expressed as M2M and
M2H interfaces for example with all the advancement in UI and UX
technologies. Factors driving adoption of intelligent actions within the IoT
Lower machine prices
Improved machine functionality
Machines “influencing” human actions through behavioral-science rationale
Deep Learning tools
Challenges facing the adoption of intelligent actions within IoT
Machines’ actions in unpredictable situations
Information security and privacy
Machine interoperability
Mean-reverting human behaviors
Slow adoption of new technologies
Heterogeneous Things:
An IoT empowered framework keeps running with a few heterogeneous gadgets those are
diverse to each other as far as correspondence convention, information position,
information accumulation, and information storage ability and so forth.
This is a challenging task to develop communication protocols supported by all devices.
Standard information configuration is required to empower machine to machine(M2M)
correspondence all the more productively.
Energy:
The devices forming the base of IoT are wireless in nature and reside at remote places
(e.g. environment monitoring sensors) where energy is the most vital issue.
We need ultimate energy efficient algorithms and hardware so as to avoid quick draining
of battery power and make sensor nodes to live active for longer duration.
Machine to machine (M2M) communication has high priority in IoT because machine
automation must be improved to minimize delay, traffic, and immediate action.
Smart technologies need to be more intelligent to enable automated systems.
Communication Protocol and Real-Time
Solution: Communication Protocol:
The heterogeneous nature of IoT enabled services meet an unavoidable problem with
communication protocols.
Each types of device use separate protocol in terms of data communication.
Standard communication protocol needs to be developed for successfully implement IoT
services.
Real-Time Solution:
3. It will be really tough to implement the ‘Anytime’ concept of IoT in reality.
4. The real-time systems need to be implemented in grass root level of the IoT things to
react prominently at any time.
5. The complexity of the existing real-time systems must be minimized, so that they could
be used in nano-scopic devices.
Standardization
16. Standards mean in general common methods, norms and regulations, based on which
some work must be done, some product or service must be produced or some actions be
conducted.
• These defined by official standardization organizations and can be connected to some
legislation and they should be followed.
• The issues of standardization in the area of The Internet of Things (IoT) are very
challenging both from scientific and managerial point of view because, like the statement,
“As the pace of IoT deployments accelerate, IoT standards are undergoing major
evolutions, sometimes revolutions”.
Public Perception:
– If the IoT is ever going to truly take off, this needs to be the first problem that
manufacturers address.
– The 2015 control State of the Smart Home study found that 44% of all Americans
were "very concerned" about the possibility of their information getting stolen
from their smart home, and 27% were "somewhat concerned."
– With that level of worry, consumers would hesitate to purchase connected devices.
Vulnerability to Hacking:
– Researchers have been able to hack into real, on-the-market devices with enough
time and energy, which means hackers, would likely be able to replicate
their efforts.
– For example, a team of researchers at Microsoft and the University of Michigan
recently found a plethora of loop holes in the security of Samsung's Smart Things
smart home platform, and the methods were far from complex.
Are Companies Ready?
– AT&T's Cyber security Insights Report surveyed more than 5,000 enterprises
around the world and found that 85% of enterprises are in the process of or
intend to deploy IoT devices.
– Yet a mere 10% of those surveyed feel confident that they could secure those
devices against hackers.
True Security:
– Jason Porter, AT&T's VP of security solutions, told BI Intelligence, Business
Insider's premium research service, that securing IoT devices means more than
simply securing the actual devices themselves.
– Companies also need to build security into software applications and network
connections that link to those devices.
IoT Privacy Issues:
Research Trends
The development of IoT infrastructures will likely follow an incremental approach and
expand from existing identification techniques such as RFID.
International cooperation efforts and a system-level perspective are needed to address the
above IoT-related challenges.
In addition to conducting research to address the above challenges, identify a few other
research trends:
t Integrating social networking with IoT solutions:
There is a strong interest to use social networking to enhance the communications among
different IoT things.
A new paradigm named Social Internet of Things (SIoT) was recently proposed.
There is a trend for the move from IoT to a new vision named Web of Things that allows
IoT objects to become active actors and peers on the Web.
u Developing green IoT technologies:
As IoT involves billions of connected sensors communicating through the wireless
network, the power consumption of sensors is a big concern and limitation for the
widespread of IoT.
Saving energy should become a critical design goal for IoT devices such as wireless
sensors.
There is a need to develop energy-efficient techniques or approaches that can reduce the
consumed power by sensors.
Developing context-aware IoT middleware solutions:
When billions of sensors are connected to the Internet, it is not feasible for people to
process all the data collected by those sensors.
Context-awareness computing techniques such as IoT middleware are proposed to better
understand sensor data and help decide what data needs to be processed.
Employing AI techniques to create intelligent things or smart objects:
Creating Internet of Intelligent Things by bringing artificial intelligence into things and
communication networks.
Future IoT systems should have characteristics including “self-configuration, self-
optimization, self-protection, and self-healing”.
Combining IoT and cloud computing:
Clouds provide a good way for things to get connected and allow us to access different
things on the Internet.
Further research will focus on implementing new models or platforms that provide
“sensing as a service” on the cloud.
Sensor aggregation and virtual sensing:
Due to large numbers of sensors in a network, it sometimes becomes necessary to
aggregate multiple sensing streams as one 'virtual' sensor that provides an integrated
interface to other functionalities.
An example of a 'virtual' mobile sensor could be aggregated traffic flow information on a
highway that is derived from multiple vehicle sensors.
Robustness:
In case of fixed deployed sensing and actuation platforms, it is common for devices to
know their locations, have synchronized clocks, have knowledge of their neighbors for
cooperating, configure a consistent set of parameters
Mobility induced sensor network design:
The mobile IoT paradigm invalidates many of the assumptions of traditional wireless
sensor networks, especially with regards to wireless technologies and protocols.
In particular, mobile IoT devices would find it quite difficult to connect with each other
and other components of the IoT network in the presence of mobility, intermittent
connectivity and RF link variability.
For example, internet-connected cars would need to transmit and receive data from
different gateways depending on their location, which would keep changing due to their
(the cars) mobility.
This calls for radical new sensor network paradigms for IoT, perhaps borrowing ideas
from mobile ad-hoc networks (MANETs) or delay-tolerant networks
In Los Angeles, where traffic has been a tremendous problem for decades, data from an array of
magnetic road sensors and hundreds of cameras feed through a centralized computer system to
control 4,500 traffic signals citywide to help keep traffic moving. Completed in 2013, the $400-
million system is credited with increasing travel speeds around Los Angeles by 16 percent, and
shortening delays at major intersections by 12 percent. (Meis)
In San Francisco, SFpark uses wireless sensors to detect parking-space occupancy in metered
spaces. Installed in 8,200 on-street spaces in the pilot areas, the wireless sensors detect parking
availability in real time. In 2013, two years after launching SFpark, San Francisco published a
detailed report showing that the program reduced weekday greenhouse gas emissions by 25
percent. Traffic volume went down, and drivers cut their search time nearly in half. By making it
easier for people to pay for their parking and reducing loss due to broken parking meters, San
Francisco also increased parking-related revenue by about $1.9 million. (Meis)
London has begun tests on a smart parking project that allows drivers to quickly locate parking
spaces and remove the need for lengthy searches for an open spot. This significantly alleviates
urban traffic congestion, saves fuel and reduces harmful emissions. (“How Smart Cities & IoT
Will Change Our Communities,” Andrew Meola, BusinessInsider.com, December 20, 2016.)
In 2011, Autolib debuted an electric car sharing program in Paris that has grown to over 3,000
vehicles. The connected cars can be tracked via GPS, and drivers can use the car’s dashboard to
reserve parking spaces in advance, saving time and reducing the waste associated with long
searches for parking spots. (Meola)
Copenhagen uses sensors to monitor the city’s bike traffic in real time, which provides valuable
data on improving bike routes in the city. This is crucial, as more than 40% of the city’s residents
commute by bike each day. (Meola)
Another useful application, CitySense, uses sensors to save electricity by intuitively adjusting the
brightness of street lights, based on the presence of automobiles and pedestrians. It is also
“smart” enough to filter out interferences like animals and trees. (IBM.com)
How Big Data and IoT are Being Used in Traffic Management
Traffic management is one of the biggest infrastructure hurdles faced by developing countries
today. Developed countries and smart cities are already using IoT and big data to their
advantage to minimize issues related to traffic. The culture of the car has been cultivated
speedily among people in all types of nations. In most cities, it is common for people to prefer
riding their own vehicles no matter how good or bad the public transportation is or considering
how much time and money is it going to take for them to reach their destination.
Thus, the increased use of cars has caused an immense amount of traffic congestion. Several
countries are overcoming this traffic bottleneck by fetching information from CCTV feeds and
transmitting vehicle-related data to city traffic management centers to help create
improvements. Better-organized traffic systems mean a better flow of vehicles on the road, and it
means no idling cars, buses, and trucks in traffic jams. All this eventually translates to lower run
times, proper utilization of natural resources (gas), and less pollution. The emittance of gases is
the largest during stop-start driving, and this happens in spots where traffic is regulated by lights.
Hence, if you go for smart traffic, this helps in pollution reduction throughout the entire city.
However, smart traffic management also involves other factors, like smart parking sensors, smart
streetlights, smart highways, and smart accident assistance amongst other things.
Traffic Lights
Traffic lights that use real-time data feeds are being used to smooth traffic load. Sensors mounted
at strategic places can use IoT technology to gather data about high traffic junctions and areas
diverting vehicles from these places. Big data can analyze this information further and figure out
alternative routes, as well as better traffic signaling to ease congestion. Meanwhile, road-side
lights can also work according to weather sensors mounted on them. Dimming of light happens
not only as a part of the day-night process but also when weather conditions turn murky.
Roadside light sensors can pick up these signals and turn them on and off accordingly.
Smart Parking
Parking has become an Achilles heel in the urban planning scenario. Lack of parking spaces, as
well as parallel parking, has heightened traffic snarls at important junctions in cities. IoT-based
sensors in parking lots can give out real-time information about empty spots to cars coming from
a long distance and looking for a parking space. Such sensors have already been installed in
European cities like Paris, France, and Kansas in the US. They have all seen remarkable results
with a double-digit percentage reduction in parking issues observed in the span of a year.
Smart Assistance
Road accidents have been one of the top causes of deaths across the world. However, what adds
to this gloomy number is the untimely help and assistance to victims in these accidents. CCTVs
and sensors on roads can help in locating accident spots and communicating these to the nearest
emergency rooms. Once this communication is established in time, all else can be better
handled.
Challenges
All pros become more quantifiable with cons. While IoT and big data present a path-breaking
opportunity in smart traffic management and solutions, they also have some limitations. Firstly,
current cities already suffer from infrastructure issues like road planning, zoning, and other
construction-related issues that could potentially pose problems when implementing IoT
technology.
Secondly, all these fancy, hi-tech solutions need high-speed data transfer techniques and, thus,
can work only in cities with great internet connectivity. If for any reason, this connectivity is
hampered, the entire smart city could fall apart.
Thirdly, the number of devices accessing the central network means more opportunities for
hackers to conduct their malicious attacks. An added layer of security, apart from the usual one
and another on top of that, will be needed to make an impenetrable hack-proof smart traffic
solution. Data privacy will also have to be maintained, looping in lawmakers and engineers.