Professional Documents
Culture Documents
Internet of Things
Internet of Things
IoT systems have applications across industries through their unique flexibility and
ability to be suitable in any environment. They enhance data collection,
automation, operations, and much more through smart devices and powerful
enabling technology.
This tutorial aims to provide you with a thorough introduction to IoT. It introduces
the key concepts of IoT, necessary in using and deploying IoT systems.
1
• Small Devices – Devices, as predicted, have become smaller, cheaper, and
more powerful over time. IoT exploits purpose-built small devices to deliver
its precision, scalability, and versatility.
IoT – Advantages
The advantages of IoT span across every area of lifestyle and business. Here is a
list of some of the advantages that IoT has to offer –
IoT – Disadvantages
Though IoT delivers an impressive set of benefits, it also presents a significant set
of challenges. Here is a list of some its major issues –
2
• Flexibility – Many are concerned about the flexibility of an IoT system to
integrate easily with another. They worry about finding themselves with
several conflicting or locked systems.
• Compliance – IoT, like any other technology in the realm of business, must
comply with regulations. Its complexity makes the issue of compliance seem
incredibly challenging when many consider standard software compliance a
battle.
IoT Applications
It is impossible to envisage all potential IoT applications having in mind the
development of technology and the diverse needs of potential users. In the
following sections, we present several applications, which are important. These
applications are described, and the research challenges are identified.
The IoT applications are addressing the societal needs and the advancements to
enabling technologies such as nanoelectronics and cyber-physical systems continue
to be challenged by a variety of technical (i.e., scientific and engineering),
institutional, and economical issues. The list is limited to the applications chosen
by the IERC as priorities for the next years and it provides the research challenges
for these applications. While the applications themselves might be different, the
research challenges are often the same or similar.
Smart Cities
By 2020 we will see the development of Mega city corridors and networked,
integrated and branded cities. With more than 60 percent of the world population
expected to live in urban cities by 2025, urbanization as a trend will have diverging
impacts and influences on future personal lives and mobility.
3
Governance. There will be about 40 smart cities globally by 2025.
The role of the cities governments will be crucial for IoT deployment. Running of
the day-to-day city operations and creation of city development strategies will
drive the use of the IoT. Therefore, cities and their services represent an almost
ideal platform for IoT research, taking into account city requirements and
transferring them to solutions enabled by IoT technology.
4
In this context there are numerous important research challenges for smart city IoT
applications:
5
Future energy grids are characterized by a high number of distributed small and
medium sized energy sources and power plants which may be combined virtually
ad hoc to virtual power plants; moreover, in the case of energy outages or disasters
certain areas may be isolated from the grid and supplied from within by internal
energy sources such as photovoltaics on the roofs, block heat and power plants or
energy storages of a residential area (“islanding”).
6
pathway for the packet to reach its destination with the best integrity levels. In this
respect the “Internet of Energy” concept is defined as a network infrastructure
based on standard and interoperable communication transceivers, gateways and
protocols that will allow a real time balance between the local and the global
generation and storage capability with the energy demand. This will
also allow a high level of consumer awareness and involvement. The Internet of
Energy (IoE) provides an innovative concept for power distribution, energy
storage, grid monitoring and communication as presented. It will allow units of
energy to be transferred when and where it is needed. Power consumption
monitoring will be performed on all levels, from local individual
devices up to national and international level Saving energy based on an improved
user awareness of momentary energy consumption is another pillar of future
energy management concepts. Smart
meters can give information about the instantaneous energy consumption to
7
the user, thus allowing for identification and elimination of energy wasting devices
and for providing hints for optimizing individual energy consumption.
These must be to a much finer time scale and spatial resolution. In the long run
electro mobility will become another important element of smart power grids.
Electric vehicles (EVs) might act as a power load as well as moveable energy
storage linked as IoT elements to the energy information grid (smart grid). IoT
enabled smart grid control may need to consider energy demand and offerings in
the residential areas and along the major roads based on traffic forecast. EVs will
be able to act as sink or source of energy based on
8
their charge status, usage schedule and energy price which again may depend on
abundance of (renewable) energy in the grid. This is the touch point from where
the following telematics IoT scenarios will merge with smart grid IoT.
Sophisticated and flexible data filtering, data mining and processing procedures
and systems will become necessary in order to handle the high amount of raw data
provided by billions of data sources. System and data models need to support the
9
design of flexible systems which guarantee a reliable and secure real-time
operation.
Such open APIs are of particular importance at module range on any abstraction
level for application-specific data analysis and processing, thus allowing
application developers to leverage the underlying communication infrastructure
and use and combine information generated by various devices to produce added
10
value across multiple environments. As a quintessence the next big leap in the
Internet of Things evolution will be the coherence of efforts on all levels towards
innovation. In case of the IoT community this would mean that out of many
possible “coherence horizons” the following will likely provide the foundation for
a step forward to the Internet of Things:
11
Towards the IoT Universe(s)
In analogy to the definition that a universe is commonly defined as the totality of
existence, an Internet of Things universe might potentially connect everything. As
a further analogy to new theories about parallel universes, different Internet of
Things worlds might develop and exist in parallel, potentially overlap and possess
spontaneous or fixed transfer gates. These forward-looking considerations do
certainly convey a slight touch of science fiction but are thought to stimulate the
exploration of future living worlds.
The overall scope is 12 cities and foster ecosystems of platforms for connected
smart objects, integrating the future generation of devices, network technologies,
software technologies, interfaces and other evolving ICT innovations, both for the
society and for people to become pervasive at home, at work and while on the
move. These environments will embed effective and efficient security and privacy
mechanisms into devices, architectures, platforms, and protocols, including
characteristics such as openness, dynamic expandability, interoperability of
objects, distributed intelligence, and cost and energy-efficiency. Whereas the
forthcoming Internet of Things related research in the scope of Horizon 2020 and
corresponding national research programs will address the above matters,
challenges from a societal and policy perspective remain equally important, in
particular the following:
12
Converging technological fields
13
Convergent technologies can integrate the fixed-line with mobile to deliver
convergent solutions. Convergent technologies include:
• IP Multimedia Subsystem
• Session Initiation Protocol
• IPTV
• Voice over IP
• Voice call continuity
• Digital video broadcasting – handheld
Living in cities can be difficult. Urbanization is on the rise, and congestion in the
city is becoming increasingly complex every day. It creates the need to launch an
automated system that allows users to book their parking slot with just a few clicks
on a mobile app. Now, the problem is quite apparent. But the big question is, what
can technology do to solve it? Is there a way out? Smart Parking System means an
IoT-based system that sends data about free and residential parking areas via a
web/mobile app.
Smart car parking systems using IoT, which include sensors and microcontrollers,
can be available in each parking slot. The user will then be able to track the
availability of all parking spaces and can choose the best one. Alternatively, the
user can also view the duration of the parking usage from the application, and costs
can be calculated and sent to the user with the help of smart parking meters. Not
only this, but the user can also decide to extend their time. All that is needed is a
working internet connection.
One of the most critical problems in urban cities is car parking and traffic control
systems. Finding parking space is often difficult for drivers in modern cities,
thanks to the growing number of private car users.
City planners can see this situation as an opportunity for IoT-based smart parking
in a busy city environment to ramp up the efficiency of their parking facilities and
lead to reduced search times, traffic congestion, and road accidents.
14
For instance, if drivers are notified about the availability of parking spaces for their
intended destination and surrounding areas, parking issues and traffic congestion
can be solved using smart parking using IoT technology.
Following the rapid development of sensory technology, many modern cities have
chosen to deploy various IoT-based systems for monitoring purposes. For example,
some parking programs claim that citizens get real-time information about
available parking spaces with IoT smart parking systems.
All these issues are a regular part of the parking experience in cities and towns
across India. But that need not be the same way. Smart Parking System can solve
the issue.
Smart parking system using IoT has smartphones and other sensors added into an
interconnected system to determine parking space or level and provide real-time
feedback. It is accomplished by using cameras, counters on the doors or gates of
parking lots, sensors embedded in the paved area of individual parking lots, among
other locations, depending on the deployment.
15
Solutions using IoT-based parking
IoT-based smart parking system transmits available and occupied parking spaces
via a web/mobile application.
Each parking space has an IoT gadget, which includes sensors and
microcontrollers. The user gets real-time updates on the availability of all parking
spaces and, therefore, an option to choose the best one. This solution alone initiates
a chain-reaction of benefits, from lesser traffic congestion to reduced fuel
efficiency, in urban areas where parking is often painstaking.
A basic flowchart for the whole process of smart parking IoT looks like this:
• Parking Sensors
The role of the parking sensors is to track space in the parking lot. Ultrasonic
sensors are used to detect the presence of vehicles.
• Processing Unit
The processor-on-a-chip acts as a central point between the sensors and the cloud
platforms, relaying data to and from.
• Mobile Application
16
It is a visual interface for end-users to interact with the smart parking system.
• The Cloud
The cloud serves as a repository for all records related to parking spaces and end-
users who have access to the system.
The future looks very promising for smart parking systems. The technologies
behind this solution are IoT, artificial intelligence, machine learning, and
augmented reality. By using these new approaches, smart parking will increase the
efficiency of parking systems.
Smart cities offer better use of space, less traffic, clean air, and more efficient
public services, increasing the quality of life. In addition, smart cities provide
many jobs and economic opportunities, and strong social connections.
Public transport routes can be adjusted in real-time according to need, and smart
traffic lights systems can improve congestion.
One can easily track down the power consumption & energy consumption by
monitoring in real-time.
17
Unit:2
M2M Value Chains
M2M literally means ‘Machine to Machine’. It describes the interaction of billions
of devices and machines that are connected to the internet and to each other. These
physical objects integrate computing capabilities that enable them to capture data
about the world around them and share this with other connected devices, creating
an intelligent network of ‘things’ or systems.
What this means is that machines can communicate and share information without
the need for human interaction. Some processes that are time-consuming or dull
can be automated, leaving people free to get on with more useful or enjoyable
activities.
18
implementation in different sectors. Still, there is a basic process flow based on
which IoT is built.
So, in this we will discuss fundamental architecture of IoT i.e.,
4 Stage IoT architecture.
1. Sensing Layer –
Sensors, actuators, devices are present in this Sensing layer. These Sensors
or Actuators accepts data (physical/environmental parameters), processes
data and emits data over network.
2. Network Layer –
Internet/Network gateways, Data Acquisition System (DAS) are present in
this layer. DAS performs data aggregation and conversion function
(Collecting data and aggregating data then converting analogue data of
sensors to digital data etc). Advanced gateways which mainly opens up
connection between Sensor networks and Internet also performs many basic
gateway functionalities like malware protection, and filtering also sometimes
decision making based on inputted data and data management services, etc.
19
3. Data processing Layer –
This is processing unit of IoT ecosystem. Here data is analysed and pre-
processed before sending it to data centre from where data is accessed by
software applications often termed as business applications where data is
monitored and managed, and further actions are also prepared. So here Edge
IT or edge analytics comes into picture.
4. Application Layer –
This is last layer of 4 stages of IoT architecture. Data centres or cloud is
management stage of data where data is managed and is used by end-user
applications like agriculture, health care, aerospace, farming, defence, etc.
20
• Communications hardware enables the device to connect to the network to
send the data from the sensors to the backend systems. This can include
hardware for connecting wirelessly via Bluetooth, Wi-Fi, ZigBee, LoRa,
cellular (for example GSM, 5G, NB-IoT, LTE-M) or several proprietary
technologies, or over a fixed network. Some devices will have hardware to
connect to multiple types of networks.
• The connectivity network, which can be cellular, fixed or satellite, delivers
the data from the sensors over the internet or a private network connection to
the user’s backend systems.
In addition, many different software components, which can be loosely grouped
as applications, deliver additional value to the end user.
• Backend systems include the servers to collect and analyse the data coming
from the sensors and from other sources (for example, weather forecast
data). These backend systems can be found in the public or private cloud, or
on on-premises hardware. For very simple systems, the backend can be a
standard PC.
• Software platforms such as device management, security and data
analytics ensure that IoT devices are functioning correctly and have not
been compromised. Such platforms also include data analytics software to
make sense of the data and improve business processes, as well as data bases
to store the data.
• This area also includes services such as billing and customer support.
Other parts of the value chain for IoT can include the systems integrators (SIs) or
developers that design, build and manage IoT services. The physical IoT device
will often need to be installed and maintained. Depending on the service, this
installation process can account for a high share of the overall value (for example,
in smart metering projects, where the installation process may cost more than the
device).
21
Shifting From M2M to IOT
Before the Internet of Things (IoT) captured the world’s imagination the utility
industry relied on machine-to-machine (M2M) technology to help manage
operations. Much of the industry still does and, truth be told, M2M fulfills much
the same functions as IoT, so why all the hype about IoT ushering in a new era?
22
open-source tools and existing infrastructure such as mobile networks and cloud-
based applications. They achieve more with less.
Potential benefits of implementing IoT solutions include improved asset
management, reduction of supply chain risks, real-time decision-making, and
reduced operating costs. IoT offers Landis+Gyr significant opportunities to add
value to the energy industry because IoT is more evolution of M2M applications
than revolution, and the smart metering industry is a natural enabler of the Internet
of Things.
A key opportunity IoT offers utilities is the delivery of profitable services using
applications enabled by real-time data. Real-time data collection and analytics
running on industrial Internet protocols, such as iPv6, facilitate simultaneous
collaboration between many different companies as well as the integration of
multiple services. In addition, seamless system management and service delivery
are possible due to universal standards being applied across systems architecture,
communication, privacy and security.
1. Focus on value
In the world of IoT, user research and service design are more crucial than ever.
While early adopters are eager to try out new technology, many others are reluctant
to take new technology into use and cautious about using it, due to not feeling
23
confident with it. For your IoT solution to become widely adopted, you need to dig
deep into users’ needs in order to find out where lies a problem truly worth solving
and what is the real end user value of the solution. You also need to understand
what the barriers of might be adopting the new technology in general and your
solution specifically. For deciding on your feature set, you need research too. The
features that might be valuable and highly relevant for the tech early adopters may
be uninteresting for most of the users and vice versa, so you need to plan carefully
what features to include and in which order.
IoT solutions typically consist of multiple devices with different capabilities and
both physical and digital touchpoints. The solution may also be provided in co-
operation with multiple different service providers. It is not enough to design one
of the touchpoints well, instead you need to take a holistic look across the whole
system, the role of each device and service, and the conceptual model of how user
understands and perceives the system. The whole system needs to work seamlessly
together in order to create a meaningful experience.
As the IoT solutions are placed in the real-world context, the consequences can be
serious, when something goes wrong. At the same time the users of the IoT
solutions may be vary of using new technology, so building trust should be one of
your main design drivers. Trust is built slowly and lost easily, so you really need to
make sure that every interaction with the product/service builds the trust rather
than breaks it. What it means in practice? First, it means understanding possible
error situations related to context of use, HW, SW and network as well as to user
interactions and trying to prevent them. Secondly, if the error situations still occur,
it means appropriately informing the user about them and helping them to recover.
Secondly, it means considering data security & privacy as key elements of your
design. It is important for users to feel, that their private data is safe, their home,
working environment and everyday objects cannot be hacked and their loved ones
are not put at risk. Thirdly, quality assurance is critical, and it should not only
focus on testing the SW, but on testing the end-to-end system, in a real-world
context.
24
4. Consider the context
IoT solutions exist at the crossroads of the physical and digital worlds. Commands
given through digital interfaces may produce real world effects, but unlike digital
commands, the actions happening in the real-world cannot necessarily be undone.
In the real-world context, lots of unexpected things can happen and at the same
time user should be able to feel safe and in control. The context places also other
kind of requirements to the design. Depending on the physical context, the goal
might be to minimize distraction of the user or e.g., to design devices that hold up
against changing weather conditions. IoT solutions in homes, workplaces and
public areas are typically multi-user systems and thus less personal than e.g.,
screen-based solutions used in smartphones, which also brings into picture the
social context where the solution is used and its’ requirements for the design.
Due to the real-world context of the IoT solutions, regardless of how carefully you
design things and aim to build trust, something unexpected will happen at some
point and your solution is somehow going to fail. In this kind of situations, it is of
utmost importance, that you have built a strong brand that truly resonates with the
end users. When they feel connected to your brand, they will be more forgiving
about the system failures and will keep on using your solution. While designing
your brand, you must keep in mind, that trust should be a key element of the brand,
one of the core brands values. This core value should also be reflected in the rest of
the brand elements, like the choice of color, tone of voice, imagery etc.
25
7. Use data responsibly
IoT solutions can easily generate tons of data. However, the idea is not to hoard as
much data as possible, but instead to identify the data points that are needed to
make the solution functional and useful. Still, the amount of data may be vast, so
it’s necessary for the designer to understand the possibilities of data science and
how to make sense of the data. Data science provides a lot of opportunities to
reduce user friction, i.e., reducing use of time, energy and attention or diminishing
stress. It can be used to automate repeated context dependent decisions, to interpret
intent from incomplete/inadequate input or to filter meaningful signals from noise.
Understanding what data is available and how it can be used to help the user is a
key element in designing successful IoT services.
It starts with how a device or sensor connects to the internet and a cloud platform.
There are many options to choose from Wi-Fi through a hub or gateway, 2G, or 3G
cellular networks. Once you have connectivity in place, now you can get the device
or sensor talking to your cloud IoT platform. Ensure you find a service provider that
can send data through clean API’s that are easy to implement and install. This will
ensure you can get quickly setup and start capturing your data within minutes.
2. Control
The next capability necessary when evaluating an IoT data platform is control of
the device. There are a number of different scenarios for control including
controlling a device through an application, device-to-device communication, or
control from the cloud (based on an event, rule or some other pre-determined
condition). For example, if you have a water leak detector, it can automatically send
a command to the device which could be an appliance or part of the core
infrastructure to turn off the water valve. Here, using two-way communication, a
26
signal can be sent from the detector to the device via the cloud to shut off the water.
Lastly, you can program the device from an app (or website) to shut off at a certain
time or schedule based on a pre-programmed rule.
3. Device Management
4. Actionable Data
The last capability you should consider in a IoT data platform is how you can query
the data in a manner that is clear and meaningful. It’s one thing to get all your data
in place, but the value of the data is only realized when it’s turned into information
that can help solve a problem. We want organizations to focus on their core
competency, like making great appliances or services that deliver value to their
customers, rather than focusing on cloud infrastructure that makes it possible. At
Buddy, our job is to provide an end-to-end turn-key solution to connect the world’s
IoT devices and provide real-time business insights for decision making. That can
27
take the form of simple dashboard or deep analytics through integration with
partners and services.
For instance, if we consider the automotive supply chain, the main goal of the
manufacturing plant is to deliver the parts at the right time and to maintain an
optimum inventory. This is only possible if there is good coordination amongst 3rd
party logistics, transportation organizations, and multiple tiers of suppliers. These
coordination processes are often enhanced by making use of the IoT integrated
blockchain systems. Such a system utilizes smart IoT sensors and numerous smart
devices, which could track the location/whereabouts of parts as well as their
quantity along with all the other useful information in real time.
This advancement leads to various other improvements and benefits for the
manufacturing supply chain, such as improvement in material and information
flow, tracking system of goods as well as a planned production schedule. Similarly,
the suppliers also greatly benefit from this as they experience reduction of faulty
orders, improved inventory and inventory level, reduction in warehousing costs
etc.
28
III Unit – IoT Architecture
The Device and Gateway Domain contains the following functional/topological entities:
M2M Device:
This is the device of interest for an M2M scenario, for example, a device with a
temperature sensor.
An M2M Device contains M2M Applications and M2M Service Capabilities.
An M2M device connects to the Network Domain either directly or through an
M2M Gateway:
• Direct connection: The M2M Device is capable of performing registration,
authentication, authorization, management, and provisioning to the Network
Domain. Direct connection also means that the M2M device contains the
appropriate physical layer to be able to communicate with the Access Network.
• Through one or more M2M Gateway: M2M device does not have the
appropriate physical layer, compatible with the Access Network technology, and
29
III Unit – IoT Architecture
30
III Unit – IoT Architecture
These are all the necessary functions to manage the Access and Core Network
(e.g. Provisioning, Fault Management, etc.).
M2M Management Functions:
These are the necessary functions required to manage the M2M Service
Capabilities on the Network Domain.
There are two M2M Management functions:
• M2M Service Bootstrap Function (MSBF): The MSBF facilitates the
bootstrapping of permanent M2M service layer security credentials in the M2M
Device or Gateway and the M2M Service Capabilities in the Network Domain.
• M2M Authentication Server (MAS): This is the safe execution
environment where permanent security credentials such as the M2M Root Key are
stored.
The most relevant entities in the ETSI M2M architecture are the M2M Nodes and M2M
Applications.
An M2M Node can be a Device M2M, Gateway M2M, or Network M2M Node.
An M2M Application is the main application logic that uses the Service Capabilities to
achieve the M2M system requirements.
The application logic can be deployed on a Device (Device Application, DA), Gateway
(Gateway Application, GA) or Network (Network Application, NA).
The SCL (Service Capability Layer ) is a collection of functions that are exposed through
the open interfaces or reference points mIa, dIa, and mId (ETSI M2M TC 2013b).
Because the main topological entities that SCL can deploy are the Device, Gateway, and
Network Domain, there are three types of SCL: DSCL (Device Service Capabilities
31
III Unit – IoT Architecture
The IoT Reference Model aims at establishing a common grounding and a common
language for IoT architectures and IoT systems.
A reference model describes the domain using a number of sub-models (Figure 7.1).
The domain model of an architecture model captures the main concepts or entities in the
domain, the domain model adds descriptions about the relationship between the concepts.
These concepts and relationships serve the basis for the development of an information
model because a working system needs to capture and process information about its main
entities and their interactions.
A working system that captures and operates on the domain and information model
contains concepts and entities of its own, and these need to be described in a separate
model, the functional model.
An M2M and IoT system contain communicating entities, and therefore the
corresponding communication model needs to capture the communication interactions of
these entities.
The foundation of the IoT Reference Model is the IoT Domain Model, which introduces
the main concepts of the Internet of Things like Devices, IoT Services and Virtual
Entities (VE), and it also introduces relations between these concepts.
Based on the IoT Domain Model, the IoT Information Model has been developed. It
defines the structure (e.g. relations, attributes) of IoT related information in an IoT
system on a conceptual level without discussing how it would be represented.
The information pertaining to those concepts of the IoT Domain Model is modelled,
which is explicitly gathered, stored and processed in an IoT system, e.g. information
about Devices, IoT Services and Virtual Entities.
10
32
III Unit – IoT Architecture
The IoT Functional Model identifies groups of functionalities, of which most are
grounded in key concepts of the IoT Domain Model.
A number of these Functionality Groups (FG) build on each other, following the relations
identified in the IoT Domain Model.
The Functionality Groups provide the functionalities for interacting with the instances of
these concepts or managing the information related to the concepts, e.g. information
about Virtual Entities or descriptions of IoT Services.
The functionalities of the FGs that manage information use the IoT Information Model as
the basis for structuring their information.
A key functionality in any distributed computer system is the communication between the
different components.
The IoT Communication Model introduces concepts for handling the complexity of
communication in heterogeneous IoT environments. Communication also constitutes one
FG in the IoT Functional Model.
11
33
III Unit – IoT Architecture
For example, in Figure 7.4, Class A is a general case of Class B or Class B is special case
or specialization of Class A.
Generalization is also called an “is-a” relationship. For example, in Figure 7.4 Class B
“is-a” Class A. A specialized class/subclass/child class inherits the attributes and the
operations from the general/super/parent class, respectively, and also contains its own
attributes and operations.
The Aggregation relationship is represented by a line with a hollow diamond in one end
and represents a whole-part relationship or a containment relationship and is often called
a “has-a” relationship.
The class that touches the hollow diamond is the whole class while the other class is the
part class.
For example, in Figure 7.4, class B represents a part of the whole Class A, or in other
words, an object of Class A “contains” or “has-a” object of Class B.
When the line with the hollow diamond starts and ends in the same class, then this
relationship of one class to itself is called Reflexive Aggregation, and it denotes that
objects of a class (e.g. Class A in Figure 7.4) contain objects of the same class.
The Composition relationship is represented by a line with a solid black diamond in one
end, and also represents a whole-part relationship or a containment relationship.
The class that touches the solid black diamond is the whole class while the other class is
the part class. For example, in Figure 7.4, Class B is part of Class A. Composition and
Aggregation are very similar, with the difference being the coincident lifetime to the
objects of classes related with composition.
12
34
III Unit – IoT Architecture
body for live capture of vital signals, e.g. heart rate); that location is basically fixed and
associated with the identification of the Human User.
Nevertheless, in such cases, sometimes the location of the whole BAN or Human User is
important for correlation purposes (e.g. upon moving outdoors, the Human User heart
rate increases in order to compensate for the lower temperature than indoors).
Therefore, the location, and often the timestamp of location, for the Virtual Entity can be
modeled as an attribute of the Virtual Entity that could be obtained by location sensing
resources (e.g. GPS or indoor location systems).
Communication model
The communication model for an IoT Reference Model consists of the identification of
the endpoints of interactions, traffic patterns (e.g. unicast vs. multicast), and general
properties of the underlying technologies used for enabling such interactions.
It is used to identification of the endpoints of the communication paths.
The potential communicating endpoints or entities are the Users, Resources, and Devices
from the IoT Domain Model.
Users include Human Users and Active Digital Artifacts (Services, internal system
components, external applications).
Devices with a Human_Machine Interface mediate the interactions between a Human
User and the physical world (e.g. keyboards, mice, pens, touch screens, buttons,
microphones, cameras, eye tracking, and brain wave interfaces, etc.), and therefore the
Human User is not a communication model endpoint.
The User (Active Digital Artifact, Service)-to-Service interactions include the User-to-
Service and Service-to-Service interactions as well as the Service_Resource_Device
interactions.
The User-to-Service and Service-to-Service communication is typically based on Internet
protocols and one or both Services are hosted in Service-to-Service interactions on
constrained/low-end Devices such as embedded systems.
The communication model for these interactions includes several types of gateways (e.g.
network, application layer gateways) to bridge between two or more disparate
communication technologies.
The Devices may be so constrained that they cannot host the Services, while the
Resources could be hosted or not depending on the Device capabilities.
This inability of the Device to host Resources or Services results in moving the
corresponding Resources and/or Services out of the Device and into more powerful
Devices or machines in the cloud.
Then the Resource-to-Device or the Service-to-Resource communication needs to
involve multiple types of communication stacks.
17
35
III Unit – IoT Architecture
Functional model
The IoT Functional Model aims at describing mainly the Functional Groups (FG) and
their interaction with the ARM.
Functional View of a Reference Architecture describes the functional components of an
FG, interfaces, and interactions between the components.
The Functional View is typically derived from the Functional Model in conjunction with
high level requirements.
The Application, Virtual Entity, IoT Service, and Device FGs are generated by starting
from the User, Virtual Entity, Resource, Service, and Device classes from the IoT
Domain Model.
The need to compose simple IoT services in order to create more complex ones, as well
as the need to integrate IoT services (simple or complex) with existing Information and
Communications Technology (ICT) infrastructure, is the main driver behind the
introduction of the Service Organization and IoT Process Management FGs respectively.
All the above-mentioned FGs need to be supported by management and security
functionality captured by the corresponding FGs.
The Device FG contains all the possible functionality hosted by the physical Devices that
are used for instrumenting the Physical Entities.
This Device functionality includes sensing, actuation, processing, storage, and
identification components, the sophistication of which depends on the Device capabilities.
18
36
III Unit – IoT Architecture
19
37
III Unit – IoT Architecture
Therefore, the Service Organization FG supports the association of Virtual Entities with
the related IoT Services, and contains functions for discovery, composition, and
choreography of services.
Simple IoT or Virtual Entity Services can be composed to create more complex services,
e.g. a control loop with one Sensor Service and one Actuator service with the objective to
control the temperature in a building.
Choreography is the brokerage of Services so that Services can subscribe to other
services in a system.
20
38
III Unit – IoT Architecture
The Functional Model, as well as the Functional View of the Reference Architecture,
contains a complete map of the potential functionalities for a system realization.
The functionalities that will eventually be used in an actual system are dependent on the
actual system requirements.
FGs are organized in such a way that more complex functionalities can be built based on
simpler ones, thus making the model modular.
Information model
Information is defined as the enrichment of data (raw values without relevant or usable
context) with the right context, so that queries about who, what, where, and when can be
answered.
IoT information model captures the details of a Virtual Entity centric model.
Association class in Figure 7.8 contains information about the specific association
between a Virtual Entity and a related Service.
On a high-level, the IoT Information Model maintains the necessary information about
Virtual Entities and their properties or attributes.
These properties/attributes can be static or dynamic and enter into the system in various
forms, e.g. by manual data entry or reading a sensor attached to the Virtual Entity.
Virtual Entity attributes can also be digital synchronized copies of the state of an
actuator.
In the presentation of the high-level IoT information model, we omit the attributes that
are not updated by an IoT Device (sensor, tag) or the attributes that do not affect any IoT
21
39
III Unit – IoT Architecture
(d) a storage resource, which provides storage of data about a Physical Entity;
(e) a tag resource, which provides identification data for Physical Entities.
3. Free text attributes or tags used for capturing typical manual input such as “fire alarm,
ceiling.”
4. Indicator of whether the resource is an on-Device resour ce or network resource.
5. Location information about the Device that hosts this resource in case of an on-Device
resource.
6. Associated Service information.
7. Associated Device description information.
A Device is a Physical Entity that could have a sensor, actuator, or tag instantiation.
26
40
III Unit – IoT Architecture
27
41
III Unit – IoT Architecture
It has three layers, namely, the perception, network, and application layers.
(i) The perception layer is the physical layer, which has sensors for sensing and
gathering information about the environment. It senses some physical parameters or
identifies other smart objects in the environment.
(ii) The network layer is responsible for connecting to other smart things, network
devices, and servers. Its features are also used for transmitting and processing sensor
data.
(iii) The application layer is responsible for delivering application specific services to
the user. It defines various applications in which the Internet of Things can be deployed,
for example, smart homes, smart cities, and smart health.
The three-layer architecture defines the main idea of the Internet of Things, but it is not
sufficient for research on IoT because research often focuses on finer aspects of the
Internet of Things.
The five layers are perception, transport, processing, application, and business layers (see
28
42
III Unit – IoT Architecture
The role of the perception and application layers is the same as the architecture with three
layers. We outline the function of the remaining three layers.
(i) The transport layer transfers the sensor data from the perception layer to the
processing layer and vice versa through networks such as wireless, 3G, LAN, Bluetooth,
RFID, and NFC.
(ii) The processing layer is also known as the middleware layer. It stores, analyzes, and
processes huge amounts of data that comes from the transport layer. It can manage and
provide a diverse set of services to the lower layers. It employs many technologies such
as databases, cloud computing, and big data processing modules.
(iii) The business layer manages the whole IoT system, including applications, business
and profit models, and users’ privacy.
29
43
III Unit – IoT Architecture
• MQTT 3.1/3.1.1
HTTP supports many libraries. Because it is a simple textbased protocol, many small
devices such as 8-bit controllers can only partially support the .
The larger 32-bit based devices can utilize full HTTP client libraries that properly
implement the whole protocol.
MQTT solve issues in embedded systems and SCADA.
MQTT is a publish-subscribe messaging system based on a broker model. The protocol
has a very small overhead.
It is designed to support lossy and intermittently connected networks.
MQTT was designed to flow over TCP.
30
44
III Unit – IoT Architecture
1. The ability to support an HTTP server and/or an MQTT broker to talk to the devices
2.The ability to aggregate and combine communications from different devices and to
route communications to a specific device (possibly via a gateway)
3.The ability to bridge and transform between different protocols, e.g. to offer HTTP
based APIs that are mediated into an MQTT message going to the device.
The bus layer may also provide some simple correlation and mapping from different
correlation models (e.g. mapping a device ID into an owner’s ID or vice-versa).
It must be able to act as an OAuth2 Resource Server (validating Bearer Tokens and
associated resource access scopes).
It must also be able to act as a policy enforcement point (PEP) for policy-based access.
This layer takes the events from the bus and provides the ability to process and act upon
these events.
A core capability here is the requirement to store the data into a database.
It has the following approaches:
• Highly scalable, column-based data storage for storing events
• Map-reduce for long-running batch-oriented processing of data
• Complex event processing for fast in-memory processing and near real-time reaction
and autonomic actions based on the data and activity of devices and other systems
The reference architecture needs to provide a way for these devices to communicate
outside of the device-oriented system.
This includes three main approaches.
• Firstly, we need the ability to create web-based front-ends and portals that interact
with devices and with the event-processing layer.
31
45
III Unit – IoT Architecture
• Secondly, we need the ability to create dashboards that offer views into analytics
and event processing.
• Finally, we need to be able to interact with systems outside this network using
machine-to-machine communications (APIs).
The API management layer provides three main functions:
• The first is that it provides a developer-focused portal where developers can find,
explore, and subscribe to APIs from the system. There is also support for publishers to
create, version, and manage the available and published APIs;
• The second is a gateway that manages access to the APIs, performing access control
checks (for external requests) as well as throttling usage based on policies. It also
performs routing and load-balancing;
• The final aspect is that the gateway publishes data into the analytics layer where it is
stored as well as processed to provide insights into how the APIs are used.
Device Management
32
46
Unit-4
IoT − Common Uses
IoT has applications across all industries and markets. It spans user groups from
those who want to reduce energy use in their home to large organizations who
want to streamline their operations. It proves not just useful, but nearly critical in
many industries as technology advances and we move towards the advanced
automation imagined in the distant future.
47
Health and Medicine
IoT pushes us towards our imagined future of medicine which exploits a highly
integrated network of sophisticated medical devices. Today, IoT can dramatically
enhance medical research, devices, care, and emergency care. The integration of all
elements provides more accuracy, more attention to detail, faster reactions to
events, and constant improvement while reducing the typical overhead of medical
research and organizations.
Almost every article written about the Oil and Gas (O&G) industry claims we may
not see $100-per barrel oil for years, if at all. Combine this uncertainty in price
with downstream O&G companies (those who process, sell, and distribute oil-
based products) who no longer benefit from just competitive prices alone and have
to compete for customers who are increasingly searching for an enhanced digital
experience. These issues go a long way toward promoting the adoption of these
IoT applications in the oil and gas industry.
48
For the O&G industry, the advantages of oil and gas IoT applications lie in
creating value through an integrated deployment strategy. IoT will allow the
industry to digitize, optimize, and automate processes that were previously
unconnected to save time, money, and increase safety. Below, we’ll discuss how
IoT can add value and be applied to the O&G sector.
Shifting toward digital technologies can yield many benefits for manufacturing
companies. Added efficiencies across production systems mean smart factories can
produce more at a lower cost. The shift toward smart factory technologies will
likely result in threefold productivity improvements in the manufacturing sector
over the next decade, according to a recent report.
49
Uint-5
50
seamless support for everyday tasks. To close the resulting gaps, the GAMBAS
project has the following scientific and technical objectives:
2. Validation of the middleware and its components using lab tests and a prototype
application in the public transportation domain.
51
IoT – Security
Every connected device creates opportunities for attackers. These vulnerabilities
are broad, even for a single small device. The risks posed include data transfer,
device access, malfunctioning devices, and always-on/always-connected devices.
The main challenges in security remain the security limitations associated with
producing low cost devices, and the growing number of devices which creates
more opportunities.
52
IoT is considered a worldwide network of individually connected devices which
communicate with each other, passing data across the internet. This data is collected
about individual users and in some cases may contain very personal and private
information about the user. Because this data can also be used for malicious purposes
it presents security and Privacy Issues with Internet of Things (IoT) devices. The
number of IoT devices is quite large. IoT devices are typically dispersed across the
globe, allowing for instant communication between connected devices. Domestic
appliances, automobiles, TVs and other devices are collecting and transmitting their
data across the internet in order to complete a variety of tasks. Users are typically
unaware of how much data is actually collected and how the data is used or shared
with others. As a result of the collecting, passing and sharing of data among these
networked devices and data recipients there is a concern among security and privacy
experts about how this data is collected, shared and used.
In addition, the IoT devices and their networks are increasingly becoming a prime
target for cybercriminals which has resulted in the breach of data security and
privacy. According to a new threat report from security firm Symantec, the number
of IoT attacks increased from about 6,000 in 2016 to 50,000 in 2017—a 600% rise
in just one year. The majority of IoT attacks in 2017—21%—originated from China,
the report found, followed by the US (11%), Brazil (7%), and Russia (6%).
In 2016, a malware known as Mirai was used to attack the execution of several DDoS
(Distributed Denial of Service) attacks and in 2017 Ransomware remained a major
threat, with the WannaCry and Petya/Not Petya attacks taking down systems
worldwide. While the number of ransomware variants increased 46% last year, the
average ransom dollar demand dropped.
Therefore, many countries are enacting additional privacy and security regulations
in order to prevent the harmful consequences that may arise due to the privacy and
security obstacles IoT presents. New regulations, including the EU’s GDPR
(General Data Protection Regulations) and the guidelines recently released by US’s
Federal Trade Commission enhance the obligations and liability for failure to take
adequate protective measures into consideration.
53
®
®
George Percivall
Chief Architect, Open Geospatial Consortium
• A Voluntary Consensus
OGC Membership Distribution
Standards Organization,
Research
founded in 1994.
• Currently 424 members
• Standards for Web Services,
LBS and Sensor Webs Academic
Commercial
• Hundreds of product
implementations
NFP
• Broad user community Government
implementation worldwide
• Alliance partnerships with 30+
standards & professional orgs
®
W3C
OGC 56
OGC themes relevant to IoT
• Location
– All objects are located somewhere
– Accurate handling of location information is vital
• Sensors
– Many objects will include sensors of local environment
– Sensor Web Enablement for scaling sensors to web scale
• ITU • W3C
– Initial coordination on – Points of Interest
GeoSMS – Geolocation API
• IETF
– GeoPriv • Standards “in the wild”
– SIP – GeoRSS
• OASIS – GeoJSON
– CAP
– EDXL Location errors typically traced to:
• Coordinate order: Lat/Lon vs. Lon/Lat
• Differing Coordinate Reference Systems
®
OGC 03/11/2011
61
Multilayered Space Model
• 1st layer: Topographic space model
– modeling of the building’s structure (topography)
– Primal space: geometric-topological model
– Dual space: network for route planning
OGC 03/11/2011
62
Examples for Sensor Space Model
Wi-Fi
RFID
Scanner
OGC 03/11/2011
63
Roadmap towards IndoorGML SWG
CfP
in the RFC
submission
team Writing
RFC draft
Forming
Review and
the team
Comments
Writing Submission
SWG of SWG
Charter Charter
OGC 65
OGC Sensor Web Enablement
72
Internet of Things
indoor/outdoor location
Corporations: OGC Sensor/actuator
IT platform providers IETF description & control
Search companies W3C Testbeds Observations/measureme
Carriers bSa Interoperability nts
Router companies OASIS experiments Machine-to-machine
Cell phone manufacturers IEEE communication
Sensor companies Plugfests
IEC Security & privacy
Government agencies/offices Pilot projects
ISO
Non-governmental organizations
Publishing & discovery
OGC 74
For Details on OGC Standards…
• OGC Standards
– Freely available
– www.opengeospatial.org/standards