14-10-2016, 11:18 AM
1458924356-1.docx (Size: 1.37 MB / Downloads: 7)
INTRODUCTION
Depending on who you talk to, the Internet of Things (IOT) is defined in different ways, and it encompasses many aspects of life from connected homes and cities to connected cars and roads (yes, roads) to devices that track an individual’s behavior and use the data collected for “push” services. Some mention one trillion Internet-connected devices by 2025 and define mobile phones as the “eyes and ears” of the applications connecting all of those connected “things.” Depending on the context, others give examples that are less phone-centric, speak of a class of devices that do not exist today or point to Google’s augmented-reality smart glasses as an indication of things to come.
Everyone, however, thinks of the IOT as billions of connections (a sort of “universal global neural network” in the cloud) that will encompass every aspect of our lives. All of this public discussion suggests the IOT is finally becoming a hot topic within the mainstream media. Many recent articles point to the IOT as the interaction and exchange of data (lots of it) between machines and objects, and now there are product definitions reflecting the same concept. Hence, from a technology perspective, the IOT is being defined as smart machines interacting and communicating with other machines, objects, environments and infrastructures, resulting in volumes of data generated and processing of that data into useful actions that can “command and control” things and make life much easier for human beings … similar to the world envisioned in the 1970s cartoon The Jetsons, only better.
Estimates of the future market size of the IOT cover a broad range, but most pundits agree it will dwarf any other market. In mature markets today, the ultimate, pervasive consumer device is a mobile phone. Consider your own household, and count the number of mobile phones you currently have. Then count the number of windows, doors, electrical outlets, lights, appliances and heating and AC units you have. You’ll quickly see why the IOT market will surpass the mobile phone market, at least in the western world.
A quick Internet search highlighted the following example use cases/applications under consideration:
• Machine-to-machine communication
• Machine-to-infrastructure communication
• Telehealth: remote or real-time pervasive monitoring of patients, diagnosis and drug delivery
• Continuous monitoring of, and firmware upgrades for, vehicles
• Asset tracking of goods on the move
• Automatic traffic management
• Remote security and control
• Environmental monitoring and control
• Home and industrial building automation
• “Smart” applications, including cities, water, agriculture, buildings, grid, meters, broadband, cars, appliances, tags, animal farming and the environment, to name a few.
2.VISIONS OF INTERENT OF THINGS
In the research communities, IOT has been defined from various different per-spectives and hence numerous definitionfor IOT exist in the literature. the reason for apparent fuzziness of the definition stems from the fact that it is syntactically composed of two terms - internet and things. the first one pushes towards a network oriented vision of IOT, while the second tends to move the focus on generic objects. to be integrated into a common framework
However, the terms ’internet’ and ’things’, when put together assume a mean-ing which introduces a disruptive level of innovation into the IOT world. in fact, IOT semantically means a ”world-wide network of interconnected objects uniquely addressable, based on standard communication protocols” .
This implies a huge number of possibly heterogeneous objects involved in the process. InIOT, unique identification of objects and the representation and storing of exchanged information is the most challenging issue. this brings the third perspective of IOT - semantic perspective. Infig. 2, the main concepts, technologies and standards are highlighted and classified with reference to the three visions of IOT.The diagram clearly depicts that IOT paradigm will lead to the convergence of the three visions of IOT.
From the perspective of things, the focus of IOT is on how to integrate generic objects into a common framework and the things under investigation are radio frequency identification (rfid) tags .the term IOT, in fact, is attributed to the auto-id labs, a world-wide network of academic research laboratories in the field of networked rfid and emerging sensing technologies. These institutions, since their establishment, have focused their efforts to design the architecture of IOT integrated with epic global .
There efforts have been primarily towards development of the electronic product code (epc) to support the use of rfid in the world-wide modern trading net-works, and to create the industry-driven global standards for the epc global network. these standards are mainly designed to improve object visibility (i.e. the traceability of an object and the awareness of its status, current location etc.). While, this is an important step towards the deployment of IOT, it makes the scope of IOT much narrower. in a broader sense, IOT cannot be just a global epc system in which the only objects are rfids. Similarly,unique/universal/ubiquitous identifier (uid) architecture defined in which attempts to develop middleware-based solutions for global visibility of objects also narrows down the scope of IOT.
An IOT vision statement, which goes well beyond a mere rfid-centric approach, is proposed by casagarasconsortium .Thecasagaras consortium
(i) Proposes a vision of IOT as a global infrastructure which connects both virtual and physical generic objects and
(ii) Highlights the importance of including existing and evolving internet and network developments in this vision. from this perspective, IOT becomes the natural enabling architecture for the deployment of independent federated services and applications, characterized by a high degree of autonomous data capture, event transfer, network connectivity and interoperability.
while the perspective of things focuses on integrating generic objects into a common framework, the perspective of ’internet’ pushes towards a network-oriented definition. according to ipso (ip for smart objects) alliance , a forum formed in the year 2008, the ip stack is a light-weight protocol that al-ready connects a large number of communicating devices and runs on battery-operated devices. this guarantees that iphas all the qualities to make IOT a reality
3.ARCHITECTURE OF INTERNET OF THINGS
Implementation of IOT is based on an architecture consisting of several layers: from the field data acquisition layer at the bottom to the application layer at the top. the layered architecture is to be designed in a way that can meet the requirements of various industries, enterprises, societies, institutes, government’s etc. fig. presents a generic layered architecture for IOT. the layered architecture has two distinct divisions with an internet layer in between to serve the purpose of a common media for communication. the two lower layers contribute to data capturing while the two layers at the top is responsible fordata utilization in applications. the functionalities of the various layers are discussed briefly in the following:
The middleware (a software layer interposed between the technological and application levels) architectures proposed in the last couple of years for IOT often follow the service oriented architecture (soa) approach. the adoption of the soa principles allows for decomposing complex and monolithic systems into applications consisting of ecosystem of simpler and well-defined components. the use of common interfaces and standard protocols gives a horizontal view of an enterprise system. therefore, the development of business process of designing workflows of coordinated services, which eventually are associated with objects actions. Ansoa approach also allows for software and hardware
The applications of IOT form an extensive design space with many dimensions that include several issues and parameters some of which are mentioned below.
deployment onetime, incremental or random.
mobility occasional or continuous performed by either selected or all things in the selected environment.
• cost, size, resources, and energy very much resource-constrained or un-limited resources.
• heterogeneity a single type of thing or diverse sets of different properties and hierarchies.
• communication modality single-hop or multi-hop communication.
• infrastructure different applications exclude, allow or require the use of fixed infrastructure.
• network topology single hop, star, multi-hop, mesh or multi-tier.
• coverage- sparse, dense or redundant.
• connectivity continuous, occasional or sporadic.
• network size ranging from tens of nodes to thousands.
• lifetime few hours, several months to many years.
• qos requirements - real-time constraints, tamper resistance, unobtrusive-ness etc.
such an extensive design space obviously makes IOT application development a complicated process. one approach may be is to make the design for the most restrictive point in the design space, e.g. minimum thing capabilities, high mobility etc.
however, often there is no such global minimum and it may be desirable to exploit the characteristics of the various points in the design space. this implies that no single hardware and software platform will be sufficient to support the whole design space. complex and heterogeneous systems will be a natural requirement.
4.4. NETWORKING TECHNOLOGY:
The IOT deployment requires developments of suitable network technology for implementing the vision of IOT to reach out to objects in the physical world and to bring them into the internet. technologies like rfid, short-range wireless communication and sensor networks are means to achieve the network connectivity, while internet protocol version 6 (ipv6), with its expanded address space, enables addressing, connecting and tracking things.
InIOT paradigm, security, scalability, and cross platform compatibility be-tween diverse networked systems will be essential requirements.In this context, the network technologies has to offer solutions that can offer the viability of connecting almost anything to the network at a reduced cost. the ubiquity of network access will also change the way information is processed. today, ip provides end to end communication between devices without any requirement of an intermediate protocol translation gateway. protocol gateways areinherently complex to design, manage, and deploy and with the end to end architecture of ip, there are no protocol translation gateways involved.
4.5. NETWORK DISCOVERY MECHANISMS:
In the IOT paradigm, the networks will dynamically change and continuously evolve. also, the things will have varying degrees of autonomy. New things will possibly be added and the network topologies will be changing fast. In this scenario, automated discovery mechanisms and mapping capabilities are essential for efficient network and communication management. Without an automated discovery mechanism, it impossible to achieve a scalable and accurate network management capability. Moreover, an automated network discovery mechanism can dynamically assign roles to devices based on intelligent matching against pre-set templates and attributes, automatically deploy and start active, passive or performance monitors based on assigned roles and attributes, start, stop, manage and schedule the discovery process and make changes to any role or monitoring profile at any time or create new profiles as required.
Dynamic network discovery mechanisms enable interaction between devices that is not pre-configured and hard coded as far as the addresses or service end-points are concerned. Instead, they allow for dynamic, run-time configuration of connections, thereby enabling mobile devices to form collaborative groups and adapt to changing contexts. Examples for protocols for discovery on LAN level are ws-discovery as a part of wsdd,bonjour andssdp as a part of upnp.
Both passive and dynamic discovery mechanisms exist today and technologies are being developed to implement mechanisms real-time and dynamic discovery of network data. All discovery services must be based on authentication mechanisms to address privacy or security issues over different networks which are involved in developing network discovery services mechanism.
4.6.SOFTWARES AND ALGORITHMS:
one of the most promising micro operating systems for constrained devices is contiki.it provides a full ip stack (both ipv4 and ipv6), supports a local flash file system, and features a large development community and a comprehensive set of development tools. one of challenges in building IOT applications is how to design a common underlying software fabric for different environments and how to build a coherent application out of a large collection of diverse software modules. a substantial amount of research and development effort is currently focused on service oriented computing for developing
5.APPLICATIONS OF IOT
The potentialities offered by the IOT make it possible to develop numerous applications based on it, of which only a few applications are currently deployed. in future, there will be intelligent applications for smarter homes and offices, smarter transportation systems, smarter hospitals, smarter enterprises and factories. in the following subsections, some of the important example applications of IOT are briefly discussed.
5.1.AEROSPACE AND AVIATION INDUSTRY:
An IOT can help to improve safety and security of products and services by reliably identifying counterfeit products and elements. the aviation industry, for example, is vulnerable to the problem of suspected unapproved parts (sup). an sup is an aircraft part that is not guaranteed to meet the requirements of an approved aircraft part (e.g., counterfeits, which do not conform to the strict quality constraints of the aviation industry). thus, sups seriously violate the security standards of an aircraft.
Aviation authorities report that at least 28 accidents or incidents in the united states have been caused by counterfeits .apart from time-consuming material analyses, verifying the authenticity of aircraft parts can be performed by inspecting the accompanying documents, which can be easily forged. it is possible to solve this problem by introducing electronic pedigrees for certain categories of aircraft parts, which document their origin and safety-critical events during their lifecycle (e.g., modifications).
5.2.AUTOMOTIVE INDUSTRY:
Advanced cars, trains, buses as well as bicycles are becoming equipped with advanced sensors, actuators with increased processing powers. The automotive industry include the use of smart things to monitor and report various parameters from pressure in tiers to proximity of other vehicles.
RFID technology has already been used to streamline vehicle production, improve logistics, increase quality control and improve customer services. the devices attached to the parts contain information related to the name of the manufacturer and when and where the product was made, its serial number, type, product code, and in some applications the precise location in the facility at that moment. rfid technology provides real-time data in the manufacturing processes, maintenance operations and owners new ways of managing recalls more effectively. dedicated short range communication (dsrc) technology will possibly help in achieving higher bit rates and reducing interference with other equipment. vehicle-to vehicle (v2v) and vehicle-to-infrastructure (v2i) communications will significantly advance intelligent transportation systems (its) applications such as vehicle safety services and traffic management and will be fully integrated in the IOT infrastructure.
5.3.TELECOMMUNICATIONS INDUSTRY:
IOT will create the possibility of merging of diverse telecommunication technologies and create new services. an illustrative example is the use of gsm, nfc (near field communication), low power Bluetooth, wlan, multi-hop networks, gps and sensor networks together with sim-card technology. in these types of applications the reader (i.e. tag) is a part of the mobile phone, and different applications share the sim-card. nfc enables communications among objects in a simple and secure way just by having them close to each other. the mobile phone can therefore be used as a nfc-reader and transmit the read data to a central server. when used in a mobile phone, the sim-card plays an important role as storage for the nfc data and authentication credentials (like ticket numbers, credit card accounts, id information etc).Things can join networks and facilitate peer-to-peer communication for specialized purposes or to increase robustness of communications channels and networks. things can form ad-hoc peer-to-peer networks in disaster situations to keep the flow of vital information going in case of telecommunication infrastructure failures.
5.4.MEDICAL AND HEALTHCARE INDUSTRY:
IOT will have many applications in the healthcare sector, with the possibility of using the cell phone with rfid-sensor capabilities as a platform for monitoring of medical parameters and drug delivery. the advantage gained is in prevention and easy monitoring of diseases, ad hoc diagnosis and providing prompt medical attention in cases of accidents. implantable and addressable wireless devices can be used to store health records that can save a patient’s life in emergency situations, especially for people with diabetes, cancer, coronaryheart disease, stroke, chronic obstructive pulmonary disease, cognitive impairments.. Edible, biodegradable chips can be introduced into human body for guided actions. paraplegic persons can have muscular stimuli delivered via an implanted smart thing-controlled electrical simulation system in order to restore movement functions.
5.5.INDEPENDENT LIVING:
IOT applications and services will have an important impact on independent living by providing support for an aging population by detecting the activities of daily living using wearable and ambient sensors, monitoring social inter-actions using wearable and ambient sensors, monitoring chronic disease using wearable vital signs sensors, and in body sensors. with emergence of pattern detection and machine learning algorithms, the things in a patient’s environment would be able to watch out and care for the patient. things can learn regular routines and raise alerts or send out notifications in anomaly situations. these services can be merged with the medical technology services, mentioned in section.
5.6.PHARMACEUTICAL INDUSTRY:
For pharmaceutical products, security and safety is of utmost importance. InIOT paradigm, attaching smart labels to drugs, tracking them through the sup-ply chain and monitoring their status with sensors has many potential benefits. for example, items requiring specific storage conditions, e.g. maintenance of a cool chain, can be continuously monitored and discarded if conditions were violated during transport. drug tracking and e-pedigrees allow for the detection of counterfeit products and keep the supply chain free of fraudsters. counterfeiting is a common practice in this area as illustrated in , and it particularly affects the developing countries. the smart labels on the drugs can also directly benefit patients, e.g. by enabling storing of the package insert, informing consumers of dosages and expiration dates.In conjunction with a smart medicine cabinet that reads information transmitted by the drug labels, patients can be reminded to take their medicine at appropriate intervals and patient compliance can be monitored.
5.7. RETAIL, LOGISTICS AND SUPPLY CHAIN MANAGEMENT:
IOT can provide several advantages in retail and supply chain management (scm) operations. for example, with rfid-equipped items and smart shelves that track the present items in real time, a retailer can optimize many applications .for example, he can make automatic checking of goods receipt, real time monitoring of stocks, tracking out-of-stocks or the detection of shoplifting. IOT can provide a large savings potential in a retail store, since it has been found that 3.9% of sales loss happens worldwide .
Furthermore, IOT can help making the data from the retail store available for optimizing the logistics of the whole supply chain. if manufacturers know the stock and sales data from retailers, they can produce and ship the right quantities of products, thus avoiding the situation of over-production or underproduction. the logistic processes from supply chains in many industry sectors can benefit from ex-changing of rfid data. moreover, environmental issues can be better tackled. the carbon footprint of logistics and supply chain processes can be optimized based on the availability of dynamic and fine-grained data collected in the real world directly by some of the things of IOT, such as trucks, pallets, individual product items etc. in the shops, IOT can have many applications like guidance in the shop according to a pre-selected shopping list, fast payment solutions like automatically check-out using biometrics, detection of potential allergen in a given product, personalized marketing, verification of the cool chain, etc. commercial buildings will also benefit from smart building functionalities.
5.8MANUFACTURING INDUSTRY:
By linking items with information technology, either through embedded smart devices or through the use of unique identifiers and data carriers that can interact with an intelligent supporting network infrastructure and information systems, production processes can be optimized and the entire lifecycle of objects, from production to disposal can be monitored. by tagging items and containers, greater transparency can be gained about the status of the shop floor, the location and disposition of lots, and the status of production ma-chines. the fine grained information serves as input data for refined production schedules and improved logistics. self-organizing and intelligent manufacturing solutions can be designed around identifiable items.
5.9TRANSPORTATION INDUSTRY:
IOT owners solutions for fare collection and toll systems, screening of passengers and bags boarding commercial carriers and the goods moved by the international cargo system that support the security policies of the governments and the transportation industry, to meet the increasing demand for security in the globe. monitoring traffic jams through cell phones of the users and deployment of intelligent transport systems (its) will make the transportation of goods and people more efficient. transportation companies would become more efficient in packing containers since the containers can self- scan and weigh themselves. use of IOTtechnologies for managing passenger luggage in airports and airline operations will enable automated tracking and sorting, increased per-bag read rates, and increased security.
5.10AGRICULTURE AND BREEDING:
The regulations for traceability of agricultural animals and their movements require the use of technologies like IOT, making possible the real time detection of animals, for example during outbreaks of contagious disease. moreover, in many cases, countries give subsidies depending on the number of animals in a herd and other requirements, to farms with cattle, sheep, and goats.
As the determination of the number is difficult, there is always the possibility of frauds. good identification systems can help minimize this fraud. therefore, with the application of identification systems, animal diseases can be con-trolled, surveyed, and prevented. Offcial identification of animals in national, intra community, and international commerce is already in place, while at the same time, identification of livestock that are vaccinated or tested under offcial disease control or eradication is also possible. blood and tissue specimens can be accurately identified, and the health status of herds, regions, and countries can be certified by using IOT. With the internet of things, single farmers may be able to deliver the crops directly to the consumers not only in a small region like in direct marketing or shops but in a wider area. This will change the whole supply chain which is mainly in the hand of large companies, now, but can change to a more direct, shorter chain between producers and consumers.
6.CHALLENGES AND OPEN ISSUES
The workflows in analyzedenterprise environment, home, once and other smart spaces in the future will be characterized by cross organization inter-action, requiring the operation of highly dynamic and ad-ho relationships. The fallowing are the key challenges:
6.1.NETWORK FOUNDATION –
limitations of the current internet architecture in terms of mobility, availability, manageability and scalability are some of the major barriers to IOT.
6.2.SECURITY, PRIVACY AND TRUST–
In the domain of security the challenges are:
(a) Securing the architecture of IOT - security to be ensured at design time and execution time.
(b) Proactive identification and protection of IOT from arbitrary attacks (e.g. dos and ddos attacks) and abuse, and
© Proactive identification and protection of IOT from malicious software.
The specific challenges are:
(a) Control over personal information (data privacy) and control over individual’s physical location and movement (location privacy).
(b) Need for privacy enhancement technologies and relevant protection laws, and
© Standards, methodologies and tools for identity management of users and objects. in the domain of trust.
Some of the specific challenges are:
(a) need for easy and natural exchange of critical, protected and sensitive data - e.g. smart objects will communicate on behalf of users / organizations with services they can trust, and
(b) trust has to be a part of the design of IOT and must be built in.
6.3.MANAGING HETEROGENEITY–
Managing heterogeneous applications, environments and devices constitute a major challenge.
In addition to the above major challenges, some of the other challenges are:
(a) Anaging large amount of information and mining large volume of data to provide useful services,
(b) Designing an efficient architecture for sensor networking and storage,
© Designing mechanisms for sensor data discovery,
(d) Designing sensor data communication protocols - senor data query, publish/subscribe mechanisms,
(e) Developing sensor data stream processing mechanisms, and
(f) Sensor data mining - correlation, aggregation filtering techniques design. finally, standardizing heterogeneous technologies, devices, application interfaces etc. will also be a major challenge.
7.FUTURE RESEARCH AREAS
There are several areas in which further research is needed for making deployment of the concept of IOT reliable, massive scaling,architecture,security,privacy,human-in-the looprobust,openness,Creating Knowledge and Big Data and efficient. some of themare identified in the following are where the future areas are made to be make IOT reliable & so on.
In identification technology domain, further research is needed in development of new technologies that address the global id schemes, identity management, identity encoding/ encryption, pseudonimity, revocable anonymity, authentication of parties, repository management using identification, authentication and addressing schemes and the creation of global directory lookup services and discovery services for IOT applications with various identifier schemes. In architecture design domain, some of the issues that need attention are: design of distributed open architecture with end-to-end characteristics, interoperability of heterogeneous systems, neutral access, clear layering andresilience to physical network disruption, decentralized autonomic architectures based on peering of nodes etc.
In communication protocol domain, the issues that need to be addressed are : design of energy efficient communication by multi frequency protocol, communication spectrum and frequency allocation, software defined radios to remove the needs for hardware upgrades for new protocols, and design of high performance, scalable algorithms and protocols.
In network technology domain further research is needed on network on chip technology considering on chip communication architectures for dynamic configurations design time parameterized architecture with a dynamic routing scheme and a variable number of allowed virtual connections at each output. in addition, power-aware network design that turns on and on the links in response to burst and dips of trans on demand, scalable communication infrastructures design on chip to dynamically support the communication among circuit modules based on varying workloads and /or changing constraints are some of the important research issues.
one vision of the future is that IOT becomes a utility with increased sophistication in sensing, actuation, communications, control, and in creating knowledge from vast amounts of data. This will result in qualitatively different lifestyles from today. What the lifestyles would be is anyone’s guess. It would be fair to say that we cannot predict how lives will change. We did not predict the Internet, the Web, social networking, Facebook, Twitter, millions of apps for smartphones, etc., and these have all qualitatively changed societies’ lifestyle.
New research problems arise due to the large scale of devices, the connection of the physical and cyber worlds, the openness of the systems of systems, and continuing problems of privacy and security. It is hoped that there is more cooperation between the research communities in order to solve the myriad of problems sooner as well as to avoid re-inventing the wheel when a particular community
8.EXAMPLES OF IOT
One of the most common buzzwords in technology circles right now is “Internet of Things” (IOT). People are talking about it all over the place, from the newspaper to tech blogs—but what, exactly, is the IOT? It can be tough to wrap your head around without seeing examples of the technology in action. So here are examples of IOT technology that are in use today.
Top Examples of Internet of Things Technology in Use Today