Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

International Journal of Computer Science and Information Security (IJCSIS),

Vol. 14, No. 4, April 2016

Ensuring Interoperability Among Heterogeneous


Devices through IoT Middleware
Muhammad Ahsan, M. Ramzan Talib, M. Umer Sarwar, M. Irfan Khan, M. Bilal Sarwar
Department of Computer Science, Government College University Faisalabad, Pakistan

Abstract—Internet of Things provides truly ubiquitous and rapidly gaining ground in the scenario of modern wireless
smart environment. The multilayer distributed architecture telecommunications. The basic idea of this concept is the
with a variety of different components together with end pervasive presence around us of a variety of things– such
devices, applications and the association with its framework as Radio-Frequency Identification (RFID) tags, sensors,
poses challenge. Internet of Things middleware actions as a actuators, mobile phones, etc. which, through unique
joining link between the heterogeneous areas that
communicate across heterogeneous edges. In this work, we
addressing schemes, are able to interact with each other
study the interoperability issue between heterogeneous and cooperate with their neighbors to reach common
devices. We presented guidelines to handle the goals [2].
interoperability issue in Internet of Things. Furthermore,
we have proposed architectural framework for Home Area In accordance with Pike Study a smart location could be
Network. the integration regarding technological innovation right
strategic method of durability, citizen well-being, and
Keywords-Interoperability, Internet of things, Middleware, also monetary progress. For that reason, practical clever
Heterogeneous devices location designs has to be multi-dimensional,
encompassing different factors regarding smartness and
I. INTRODUCTION also stressing the importance regarding integration and
also interaction around multiple names. Remedies are
The phrase "Internet of Things" means all the things are
urgently needed, and also easily progressing technologies
connected to internet. Sensors can transmit data through
may just be the response. In fact, computer science
internet. In up Internet, interoperable information and
alternatives and also technologies possess the
communication, based on (physical and virtual) by
prospective, to impact most areas of location ecosystems,
interconnecting things enable advanced services to the
coming from atmosphere (waste operations, travelling,
global infrastructure of the information society, the
governance regarding organic assets and also generation
physical world object (physical goods) or identification
regarding energy) to interpersonal (safety, city planning,
and communication networks which are capable of being
housing) integration [3].
included in the information world (virtual goods).Current
information technology, networking and services in real-
MIT Auto-ID Lab IOT (RFID) and networks of wireless
world data integration technology and solutions that
sensor using a dedicated IOT Massachusetts Institute of
enable most things (IOT) of the Internet under the
Technology (MIT), 1999 came from the Auto-ID Center.
umbrella term has been defined.Such wide and embedded
Person-object and object-to-object communication IOT
devices, and RFID technology as sensor data collection
thus the connection of sensors, actuators and other smart
technology development, and continuously connected to
technologies basis. A new dimension of information and
the network with which the data are transferred lead to a
communication technologies (ICT) have been added to
number of smart devices. The number of Internet-
the world no one can access information anywhere,
connected devices such as data collection and processing,
ubiquitously and pervasively, at any time on any device.
mining and processing of the data leads to extraordinary
IOT to multiply and form a network to connect to a
challenges since 2008, the number of humans on the
whole new dynamic network, will be made [4].By simply
planet is estimated that prevails [1].
allowing availability regarding, along with interaction
Each item can be identified through a computing device
using, a diverse number of physical devices or things
embedded in a unique, work together in the existing
like, kitchen appliances, surveillance cameras,
Internet infrastructure. Experts, many have been
supervising detectors, actuators, demonstrates, motor
estimated to be comprised of nearly 50 million of the
vehicles, machines and so forth, the IoT will certainly
building in 2020. Communication Technology) industry
create the progress regarding applications in lots of
to deal with problems common IOT archieved that the
various areas, like property automation, commercial
interoperability information. In this paper we illustrate
automation, healthcare supports, mobile health, aged
the application domain of the reference IOT and cloud
assistance, wise electricity managing along with clever
computing, compatibility review of the latest trends and
grids, motor vehicle, traffic managing, and several some
challenges and future Internet design information on how
others [5].
semantic technology can support interoperability, open
Most of these applications will certainly use the possibly
service infrastructure, and information model. The
substantial volume along with number of data produced
Internet of Things (IoT) is a novel paradigm that is

251 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 14, No. 4, April 2016

by simply this kind of objects to produce brand-new managing this facts, the particular IoT middleware
products and services to help people, organizations, along presents time constrains relating to both equally opening
with open administrations [6] and [7]. Extensible Internet programs as well as selection as well as holding facts
Things (IOT) refers to something ("object"), and a measures. As a result, middleware scalability is really a
discussion of the virtual representation of the object. IOT crucial requirement for helping the actual expansion
things on the Internet and among other things that they connected with IoT [12]. "The Internet allows people to
"talk" to connect the power and features of their things and things connected anytime and anywhere, the
"services" to expose to determine how to communicate place with anything or anyone, actually in use in any /
with other devices. Electronic devices connected to the any network” [13]. Figure 1 Source: Cisco IBSG, April
Internet using the Internet of Things are not related; this 2011
is a "smart" web-enabled in order to exchange
information. IOT In other words, using the Internet as a
medium of communication and exchange of information
in the physical world into the virtual world of work.
WSNs, RFID, M2M sales and marketing
communications, as well as SCADA tend to be this a
number of necessary components (Figure 2) involving
IoT. A completely functional IoT middleware should
assimilate these kinds of systems to aid this imagined
varied application areas [8], [9]. IoT devices
heterogeneous and new types of communication devices
that challenges together, exchange information on a Figure1: Internet of things (IoT)
Ubiquitous research surroundings, sensor, middleware as
number of different types of tools designed to support
research efforts that could cover the framework well as service are extremely significant portion. The
actual middleware must mindful sensor’s data, and have
middleware expect is from the approach of middleware
absolutely to supply brilliant service to help user. Within
pose a huge challenge to find in the future
interoperability. Improve the living environment of ubiquitous research surroundings, the particular
middleware receives sensor files through a variety of
mutual benefit. Information and communication
technologies (ICT) perspective, the main idea is the idea detectors, as well as digesting these kind of files
of smart home networking devices and services to [14].Initial applications of the device as a theme. The
major problem with hardware the same certificates or
integrate the use of technology in the home in an effort to
control and monitor the living room. The dome of the passwords stored in the device. Hardware devices are
state dwelling on ubiquitous computing, effectually exposed to attack. (As discussed above) and a lot of
ability to discover, integrate, and coordinate a wide damage in one or all will not be affected. To avoid this,
variety of different devices to establish communication the device can be pre-programmed with a unique
protocols and functionality of the party. identification and capacity. At the time, the development
is in the process of registration. In both The complexity
and cost, and may affect the ease of use. We must support
II. RELATED WORK
the use of dynamic customers. The key to any device
Exploration in to the IoT continues to be with its first Cable / ID card registration in the home [15]. G-Sense is
phase, along with a typical classification of the IoT just a peer-to-peer method pertaining to worldwide realizing
isn't but obtainable. IoT can be seen coming from several and also checking. These methods, while better made and
perspectives: Internet-oriented, things-oriented along also scalable, never have been recently mostly acquired
with semantic oriented (knowledge) [10]. Dissertation, yet with the commdevicesy. Additionally, sensor
discovery remains to be a tough issue. Additional devices
Internet (IOT) deployments throughout the study
sustainability issues. Adjust the classic analysis of the focus on unique sorts of stuck devices [16]. The places
way devices and networks to discuss and contribute to frontward a general middleware framework on the
Internet connected with Things (IOT). This specific
addressing issues related to the applications tab. We will
discuss their experience with the two projects: "Safe to framework possesses dispersed, loosely bundled, scalable
extend the awareness and dissemination of smart devices capabilities. To fix the problems connected with device
processing connected with communications connected
for the residents of the house in a safe, inexpensive
sensors to detect earthquakes and a large network of with IOT, the concept of ontology is actually released
Commdevicesy Seismic Network, network, warning us to [17]. RFID and also Wi-Fi sensor commdevicesies were
improve the elastic intermediate device between devices being used collectively in a very sensible home to name a
[11]. Internet connected with Things, or perhaps IoT, is caregiver exactly who penetrates your house. Some sort
really a brand new wave on the Internet, helping of ubiquitous research structured sensible home safety
appreciable link involving items as well as mankind management pertaining to digital living seemed to be
nevertheless additional strong. This specific area is well intended inside Research [18]. UPnP is a well-known
known from the massive level of facts which can be technological innovation pertaining to home network and
generated on the RFID devices from real time. About also manage. However, making UPnP-based home
commdevicesies seriously isn't effortless. Tips on how to

252 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 14, No. 4, April 2016

be connected different devices on the home multilevel is Table1: Comparison of Different IoT Middleware
a significant issue due to the fact the majority of existing
devices don't have an UPnP software [19]. Which
development of the lot depending on SOs lifts numerous
issues concerning hw/sw device structures as well as app
development device? Several solutions (e. Gary. Fed Net,
UbiComp, as well as Sensible Devices) are actually thus
far proposed to compliment the particular perspective of
your SO-based lot structure [20].
Middleware within IoT is a quite effective research spot.
Many alternatives have been suggested in addition to put
in place, particularly within the past few years. These Table 2: Comparison of Different IoT middleware
alternatives are generally very various within their design
strategies (e. h., event-based, database), degree connected 3.2.Interface protocols of IoT middleware
with development abstractions (e. h., regional or node
degree, worldwide or system level), in addition to setup
areas (e. h., WSNs, RFID, M2M, in addition to SCADA).
IoT Middleware’s have several short comings
On this review, the existing middleware alternatives are or open issues. They are available for respective
generally gathered for conversation according to their domains separately.
own design and style solutions. As Event-based, Virtual
Machine-based, Database-oriented, Tuple-spaces and
Service Oriented. A number of middleware work with a
mix of diverse style solutions. The UBIROAD
middleware [21], ubiSOAP [22] and P2P (SMEPP) [23is
an IoT middleware explicitly built to end up being
secured, especially handling troubles within the peer-to-
peer product.
III. METHODOLOGY

3.1 Comparison of Different Middleware’s Table 3: Interface Protocols for IoT Middleware

Every one of the stated middleware’s help device


development and also operations. Context conscious
Operation is reinforced by means of HYDRA,
UBIWARE, UBIROAD and also SMEPP. Conversely,
SOCRADES, SMEPP, GSN, UBIROAD and also
HYDRA are generally some situations regarding
middleware implementing protection and also individual
privacy within their structure. Determined by device
portability, syntactic image resolution, HYDRA, SMEPP
and also ASPIRE are generally OSGi compliant,
UBIROAD works by using CAFFEINE and also XML, Table 4: Interface Protocols for IoT Middleware
UBISOAP works by using J2SE and also J2ME, GSN
works by using XML and also SQL, SIRENA and also ISMB for example. Address your RFID domain. GSN
SOCRADES make use of DPWS even though handles your sensor commdevicesies on the whole.
SOCRADES also works by using SAP NetWeaver device UBIWARE handles intelligent vehicular methods. There
and also ISMB works by using just about any exists zero general middleware and this can be applicable
CAFFEINE compliant device. Wherever by is produced over almost all probable intelligent environments-
making use of J2EE structure and it is integrated together including intelligent household, intelligent auto, and
with Oracle Software. intelligent city for example. Such as RFID domain, and
can become tailored according to your domain specific
demands. It's been witnessed with this analyze that will to
end scalability troubles IPv6 can be proposed although
not however fixed absolutely. Support pertaining to
circumstance prognosis along with processing have not
also been attained thoroughly. Support connected with
semantic modelling along with controlling connected
with information amounts in addition slide in the open
troubles, especially controlling your crowd sourcing
connected with varied domain. There exists a scope

253 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 14, No. 4, April 2016

pertaining to research perform to make some sort of


general IoT-middleware program, that's applicable over
almost all domains.

IV. PROPOSED MIDDLEWARE & IT’s


REQUIREMENTS

Smart home environment associated with the use of


different systems have different systems and applications
to perform a number to the next. The need to cooperate in
the management of heterogeneous systems, middleware
and Internet technologies Bormann, taking into account,
to change from independent suppliers and open systems.
Lightweight items from EB proposed a
ConstrainedApplicationProtocol(COAP). This paper
proposes an architecture that is based on the smart home
environment, interoperability is the general trend. Figure
2 shows the structure of the proposed system. Fig 3: Structure Execution

All three systems to assess the implementation of a


common understanding of IOT aggressive things (IOT
monitoring equipment, audio equipment and warning
devices to the Internet of Things Internet of Things),
based on the structure of the Internet. Architecture allows
stores intelligent building, new functions, types, and
corresponding information service IOT to determine the
rules that were set. Internet of Things based surveillance
provided as presented in Figure 4:

Fig 2: System Structural design

Demand system and decide on the appropriate IO consists


of several layers. The middle layer between the system
and the service provides a connection service is a service-
based Web services. A layer represents the systems,
Internet of things, building the gate and Web Service
components. The main function of the gate to access the
external network. Smart homes are new DI systems or
limitations of the service. These restrictions specific Fig 4: Interoperability of heterogeneous Devices
modules known as APIs devices and device. I introduced (Home Automation)
a new dependency system. Both modules consist of pre-
defined SQL statements in accordance with the structure According to many systems and system management
of communication in aggressively. In adding, modules features, API added value ECA layers. Sorry for the
and software developers a set of application installation of different systems in the service of other
programming interfaces included in the system software platforms may prove useful API that allows the easy
on the affected IOP connected devices to connect. The addition of new devices. Now In this situation, Systems
modules are lots of rules to SQL. For building surveillance cameras are configured by the IO access for
applications, developers only need to call your favorite the installation of the door. When you set the level of
statements architectural details. Smart House belonging proactive service completely. Architecture determines the
IO heterogeneous database query messages as structure appropriate directions established on ECA technique for
includes offensive. Request aggressive is illustrated in interoperation to occur. The supervision structure will
Figure 3. The structure of the system: conjointly perform responsibilities based on the structure
prominence of all devices arranged in Home automation.
And you gain full access to the system and the security of
the legal system in order to activate the system. Terms of
text XML, to certify interoperability among smart home
devices. It truly is really worth emphasizing that will
virtually every techniques along with devices have the

254 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 14, No. 4, April 2016

ability to carry out with cross-event circumstances with [7] J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, (2013)
“Internet of Things: A vision, architectural elements, and future
the exception of fire alarm. Fire Alarm Systems are directions,” Future Generation Computer Systems, vol. 29, no. 7, pp.
classified as universal connections and components in the 1645 – 1660,
IOT is automatically activated based on home automation
systems. [8] H. Zhou, (2012) the Internet of Things in the Cloud: A Middleware
Perspective, 1st ed. CRC Press, Inc.,
V. CONCLUSION [9] C. Perera, A. B. Zaslavsky, P. Christen, and D. Georgakopoulos,
(2013) “Context aware computing for the internet of things: A survey,”
Middleware’s have numerous brief comings or maybe CoRR, vol. abs/1305.0982,
open problems. They can be used for specific as a
[10] L. Atzori, A. Iera, and G. Morabito, (2010) “The internet of things:
separate domain. UBI-ROAD addresses workable road A survey,” Computer networks, vol. 54, no. 15, pp. 2787–2805,
techniques. We have noticed, the assortment of
middleware types can be found in diverse scenarios. A [11] Kyle, Benson. (2015). Enabling Resilience in the Internet of
Things, Seventh Annual PhD Forum on Pervasive Computing and
selection of them may be varied to attain the necessary
Communications.
requests.We can observe, that each categories of
middleware’s have a very constrained service for [12] Gomes, M., da Costa, C.A. (2014).Internet of things scalability:
Platform Portability and Interoperation. Hydra, Sirena, Analyzing the bottlenecks and proposing lternatives, Ultra-
Modern Telecommunications and Control Devices and Workshops
SMEPP and wherex tackle your RFID site. Eventually, (ICUMT), 2014 6th International Congress IEEE on6-8 ,Oct, 269 – 276.
the option of the middleware is dependent upon the duty
to achieve.We are investigating the plan further IOT- [13] P. F. Harald Sundmaeker, Patrick Guillemin and S. Woelffl´e,
based middleware layer in any environment Smart. This Vision and Challenges for Realising the Internet of Things. Publications
Office of the European Union, 2010. [Online]. Available: http://www.
paper covers the debate on this subject on behalf of the internet-of-things-research.eu/pdf/IoTClusterbook March 2010.pdf
IOT and When defining the scope of research in the
future IOT middleware. This research paper [14] Ji Eun, K., Boulos, G., Yackovich, J., Barth, T., Beckel, C. and
interoperability pain need to develop a home Mosse, D., (2012). Seamless integration of heterogeneous devices and
access control in Smart Homes, 8th International Conference on
environment. In this research paper, ECA rules must be Intelligent Environments, pp. 206–213.
based on a design proposal for the smart home IoT
interoperability. The Aggressive System offers adding of [15] FREMANTLE, P., KOPECKY`, J., AND AZIZ, B. (2015) Web
dependences each interval an Internet of things system is api management meets the internet of things. In Services and
Applications over linked APIs and Data.
organized without interference. Architecture allows
interoperability between its integration service systems [16] Alfredo J. Perez, Miguel A. Labrador, and Sean J. Barbeau. (2010).
by permitting innovative dependences to each a novel G-sense: a scalable architecture for global sensing and monitoring.
structure is added. IEEE Network, 24(4):57–64

[17] Zhou, M., Fan, H., Ma, Y. (2013).Semantic annotation method of


IOT middleware Intelligent Control and Information Processing
REFERRENCE (ICICIP), Fourth International Conference on9-11 June,IEEE 495 – 498.

[18]Hussain, S., Schaffner, S. and Moseychuck, D.: (2009),


[1] Charu, C., Aggarwal, Naveen, A., & Amit, S. (2013). The Internet of Applications of Wireless Sensor Networks and RFID in a Smart Home
Things: A Survey from the Data-Centric Perspective. Springer US, pp Environment, Seventh Annual communication Networks and Services
383-428. Research Conference, pp. 153–157.

[2] D. Giusto, A. Iera, G. Morabito, L. Atzori (Eds.) (2010), the Internet [19] Lu, Y., Fang, F., Liu, W.: (2009).Home Networking and Control
of Things, Springer, ISBN: 978-1-4419-1673. Based on UPnP: An Implementation. In: Second Inter. Workshop on
Computer Science and Engineering, WCSE. vol. 2, pp. 385–389
[3] “Smart cities. Intelligent information and communications
technology infrastructure in the gov- ernment, buildings, transport, and [20] Giancarlo Fortino, Antonio Guerrieri, Wilma Russo., (2012).
utility domains.”(2011) Pike Research, Tech. Agent-oriented Smart Objects Development Proceedings, IEEE 16th
Rep.,[Online].Available:http://www.navigantresearch.com/research/sma International Conference on Computer Supported Cooperative Work in
rt-cities Design.

[4] Michahelles, F., Uckelmann, D., & Harrison, M. (2011). an [21] TERZIYAN, V., KAYKOVA, O., AND ZHOVTOBRYUKH, D.
Architectural Approach towards the Future Internet of Things, Ubiroad: Semantic middleware for context-aware smart road
Springer-Verlag Berlin Hidelberg. environments. In Internet and Web Applications and Services (ICIW),
2010 Fifth International Conference on (2010), IEEE, pp. 295–302.
[5] P. Bellavista, G. Cardone, A. Corradi, and L. Foschini,( 2013)
“Convergence of manet and wsn in iot urban scenarios,” Sensors [22] CAPORUSCIO, M., RAVERDY, P.-G., AND ISSARNY, V.
Journal, IEEE, vol. 13, no. 10, pp. 3558–3567, Oct. ubisoap: A service-oriented middleware for ubiquitous networking.
Services Computing, IEEE Transactions on 5, 1 (2012), 86–98.
[6] K. Paridel, E. Bainomugisha, Y. Vanrompay, Y. Berbers, and W. D.
Meuter (2010), “Middleware for the internet of things, design goals and [23] Benito, R. J. C., M´aRquez, D. G., Tron, P. P., Castro, R. R.,
challenges,” Electronic Communications of the EASST, vol. 28, Mart´in, N. S., and Mart´in, J. L. S. Smepp: A secure middleware for
embedded p2p. Proceedings of ICT-Mobile Summit 9 (2009).

255 https://sites.google.com/site/ijcsis/
ISSN 1947-5500

You might also like