Internet of Things (IoT): A vision, architectural elements, and future directions (4)

(being continued from  17/04/17)


• The worldwide network of interconnected objects uniquely  addressable based on standard communication protocols.
According to Cluster of European research projects on the Internet of Things [2] –
• ‘Things’ are active participants in business, information and  social processes where they are enabled to interact and communicate among themselves and with the environment by exchanging data and information sensed about the environment,while reacting autonomously to the real/physical world events and influencing it by running processes that trigger actions and create services with or without direct human intervention.
According to Forrester [9], a smart environment –
• Uses information and communications technologies to make the critical infrastructure components and services of a city’s administration, education, healthcare, public safety, real estate, transportation and utilities more aware, interactive and efficient.
In our definition, we make the definition more user centric and do not restrict it to any standard communication protocol. This will allow long-lasting applications to be developed and deployed using the available state-of-the-art protocols at any given point in time.
Our definition of the Internet of Things for smart environments is–
• Interconnection of sensing and actuating devices providing the ability to share information across platforms through a unified framework, developing a common operating picture for enabling innovative applications. This is achieved by seamless ubiquitous sensing, data analytics and information representation with Cloud computing as the unifying framework.

3.2. Trends
Internet of Things has been identified as one of the emerging technologies in IT as noted in Gartner’s IT Hype Cycle (see Fig. 2).
A Hype Cycle [10] is a way to represent the emergence, adoption,maturity, and impact on applications of specific technologies. It has been forecasted that IoT will take 5–10 years for market adoption.
The popularity of different paradigms varies with time. The web search popularity, as measured by the Google search trends during the last 10 years for the terms Internet of Things, Wireless Sensor Networks and Ubiquitous Computing are shown in Fig. 3 [11]. As
it can be seen, since IoT has come into existence, search volume is consistently increasing with the falling trend for Wireless Sensor Networks. As per Google’s search forecast (dotted line in Fig. 3), this trend is likely to continue as other enabling technologies converge to form a genuine Internet of Things.

3.3. IoT elements
We present a taxonomy that will aid in defining the components required for the Internet of Things from a high level perspective.
Specific taxonomies of each component can be found elsewhere [12–14]. There are three IoT components which enables seamless ubicomp:

(a) Hardware—made up of sensors, actuators and embedded communication hardware

(b) Middleware—on demand
storage and computing tools for data analytics and

(c)Presentation—novel easy to understand visualization and interpretation tools which can be widely accessed on different platforms and which can be designed for different applications. In this section, we discuss a few enabling technologies in these categories
which will make up the three components stated above.


3.3.1. Radio Frequency Identification (RFID)
RFID technology is a major breakthrough in the embedded communication paradigm which enables design of microchips for wireless data communication. They help in the automatic identification of anything they are attached to acting as an electronic barcode
[15,16]. The passive RFID tags are not battery powered and they use the power of the reader’s interrogation signal to communicate the ID to the RFID reader. This has resulted in many applications particularly in retail and supply chain management. The applications
can be found in transportation (replacement of tickets, registration stickers) and access control applications as well. The passive tags are currently being used in many bank cards and road toll tags which are among the first global deployments. Active RFID readers
have their own battery supply and can instantiate the communication.
Of the several applications, the main application of active RFID tags is in port containers [16] for monitoring cargo.

3.3.2. Wireless Sensor Networks (WSN)
Recent technological advances in low power integrated circuits and wireless communications have made available efficient, low cost, low power miniature devices for use in remote sensing applications.
The combination of these factors has improved the viability of utilizing a sensor network consisting of a large number of intelligent sensors, enabling the collection, processing, analysis and dissemination of valuable information, gathered in a variety of environments [7]. Active RFID is nearly the same as the lower endWSNnodes with limited processing capability and storage. The scientific challenges that must be overcome in order to realize the enormous potential of WSNs are substantial and multidisciplinary in nature [7]. Sensor data are shared among sensor nodes and sent to a distributed or centralized system for analytics. The components that make up the WSN monitoring network include:

(a) WSN hardware—Typically a node (WSN core hardware) contains sensor interfaces, processing units, transceiver units and power supply. Almost always, they comprise of multiple A/D converters for sensor interfacing and more modern sensor nodes have the ability to communicate using one frequency band making them more versatile [7].
(b) WSN communication stack—The nodes are expected to be deployed in an ad-hoc manner for most applications. Designing an appropriate topology, routing and MAC layer is critical for the scalability and longevity of the deployed network. Nodes in a WSN need to communicate among themselves to transmit data in single or multi-hop to a base station. Node drop outs,and consequent degraded network lifetimes, are frequent. The communication stack at the sink node should be able to interact with the outside world through the Internet to act as a gateway to the WSN subnet and the Internet [17].
(c) WSN Middleware—A mechanism to combine cyber infrastructure with a Service Oriented Architecture (SOA) and sensor networks to provide access to heterogeneous sensor resources in a deployment independent manner [17]. This is based on the
idea of isolating resources that can be used by several applications.
A platform-independent middleware for developing sensor applications is required, such as an Open Sensor Web Architecture (OSWA) [18]. OSWA is built upon a uniform set of
operations and standard data representations as defined in the SensorWebEnablement Method (SWE) by the Open Geospatial Consortium (OGC).
(d) Secure Data aggregation—An efficient and secure data aggregation
method is required for extending the lifetime of the network as well as ensuring reliable data collected from sensors [18]. Node failures are a common characteristic of WSNs,
the network topology should have the capability to heal itself.
Ensuring security is critical as the system is automatically linked to actuators and protecting the systems from intruders becomes very important.

3.3.3. Addressing schemes
The ability to uniquely identify ‘Things’ is critical for the success of IoT. This will not only allow us to uniquely identify billions of devices but also to control remote devices through the Internet.
The few most critical features of creating a unique address are:
uniqueness, reliability, persistence and scalability.

Every element that is already connected and those that are going to be connected, must be identified by their unique identification,location and functionalities. The current IPv4 may support to an extent where a group of cohabiting sensor devices can be identified
geographically, but not individually. The Internet Mobility attributes in the IPV6 may alleviate some of the device identification problems; however, the heterogeneous nature of wireless nodes, variable data types, concurrent operations and confluence of data
from devices exacerbates the problem further [19].
Persistent network functioning to channel the data traffic ubiquitously and relentlessly is another aspect of IoT. Although,the TCP/IP takes care of this mechanism by routing in a more reliable and efficient way, from source to destination, the IoT faces a bottleneck at the interface between the gateway and wireless sensor devices. Furthermore, the scalability of the device address of  the existing network must be sustainable. The addition of networks and devices must not hamper the performance of the network,
the functioning of the devices, the reliability of the data over the network or the effective use of the devices from the user interface.
To address these issues, the Uniform Resource Name (URN) system is considered fundamental for the development of IoT. URN creates replicas of the resources that can be accessed through the URL. With large amounts of spatial data being gathered, it is often
quite important to take advantage of the benefits of metadata for transferring the information from a database to the user via the Internet [20]. IPv6 also gives a very good option to access the resources uniquely and remotely. Another critical development in
addressing is the development of a lightweight IPv6 that will enable addressing home appliances uniquely.
Wireless sensor networks (considering them as building blocks of IoT), which run on a different stack compared to the Internet,cannot possess IPv6 stack to address individually and hence a subnet with a gateway having a URN will be required. With this in mind, we then need a layer for addressing sensor devices by the relevant gateway. At the subnet level, the URN for the sensor devices could be the unique IDs rather than human-friendly names as in the www, and a lookup table at the gateway to address this device. Further, at the node level each sensor will have a URN (as numbers) for sensors to be addressed by the gateway. The entire network now forms a web of connectivity from users (high-level)
to sensors (low-level) that is addressable (through URN), accessible (through URL) and controllable (through URC).

3.3.4. Data storage and analytics
One of the most important outcomes of this emerging field is the creation of an unprecedented amount of data. Storage, ownership and expiry of the data become critical issues. The internet consumes up to 5% of the total energy generated today and with these
types of demands, it is sure to go up even further. Hence, data centers that run on harvested energy and are centralized will ensure energy efficiency as well as reliability. The data have to be stored and used intelligently for smart monitoring and actuation. It is important to develop artificial intelligence algorithms which could be centralized or distributed based on the need. Novel fusion algorithms need to be developed to make sense of the data collected.
State-of-the-art non-linear, temporal machine learning methods based on evolutionary algorithms, genetic algorithms, neural networks, and other artificial intelligence techniques are necessary to achieve automated decision making. These systems show characteristics
such as interoperability, integration and adaptive communications.
They also have a modular architecture both in terms of hardware system design as well as software development and are usually very well-suited for IoT applications. More importantly, a centralized infrastructure to support storage and analytics is required.
This forms the IoT middleware layer and there are numerous challenges involved which are discussed in future sections. As of 2012, Cloud based storage solutions are becoming increasingly popular and in the years ahead, Cloud based analytics and visualization
platforms are foreseen.



About sooteris kyritsis

Job title: (f)PHELLOW OF SOPHIA Profession: RESEARCHER Company: ANTHROOPISMOS Favorite quote: "ITS TIME FOR KOSMOPOLITANS(=HELLINES) TO FLY IN SPACE." Interested in: Activity Partners, Friends Fashion: Classic Humor: Friendly Places lived: EN THE HIGHLANDS OF KOSMOS THROUGH THE DARKNESS OF AMENTHE
This entry was posted in Computers and Internet and tagged , , , , , . Bookmark the permalink.

Leave a Reply

Please log in using one of these methods to post your comment: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.