7.2.3 Security and Privacy 1977.3 The Standardization Environment 199 7.4 Standardization in Selected Application Areas 201 7.4.1 Intelligent Transport Systems Automotive Sector 201 Part
Trang 3Internet of Things A to Z
Trang 4IEEE Press
445 Hoes LanePiscataway, NJ 08854
IEEE Press Editorial Board
Ekram Hossain, Editor in Chief
Trang 5Internet of Things A to Z
Technologies and Applications
Edited by Qusay F Hassan
Trang 6Copyright 2018 by The Institute of Electrical and Electronics Engineers, Inc All rights reserved.
Published by John Wiley & Sons, Inc., Hoboken, New Jersey.
Published simultaneously in Canada.
No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers,
MA 01923, (978) 750-8400, fax (978) 750-4470, or on the web at www.copyright.com Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at
http://www.wiley.com/go/permission
Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and speci fically disclaim any implied warranties of merchantability or fitness for a particular purpose No warranty may be created or extended by sales representatives or written sales materials The advice and strategies contained herein may not be suitable for your situation You should consult with a professional where appropriate Neither the publisher nor author shall be liable for any loss of pro fit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages.
For general information on our other products and services or for technical support, please contact our Customer Care Department within the United States at (800) 762-2974, outside the United States at (317) 572-3993 or fax (317) 572-4002.
Wiley also publishes its books in a variety of electronic formats Some content that appears in print may not be available in electronic formats For more information about Wiley products, visit our web site at www.wiley.com
Library of Congress Cataloging-in-Publication Data is available.
ISBN: 978-1-111-945674-2
Printed in the United States of America.
10 9 8 7 6 5 4 3 2 1
Trang 7Part I Concepts and Perspectives 1
1 Introduction to the Internet of Things 3
Detlef Schoder
1.2 Internet of Things Concepts 7
1.2.1 Core Concepts: Smart Objects and Smart Environments 7
1.2.2 Related Concepts: Machine-to-Machine Communications,
Industrial Internet of Things, and Industry 4.0 8
1.2.2.1 Machine-to-Machine Communications 9
1.2.2.2 Industrial Internet and Industry 4.0 10
1.3 Who Works on the Internet of Things? 11
1.4 Internet of Things Framework 12
1.5 Information and Communication Technology Infrastructure 141.5.1 Architecture and Reference Models 14
1.5.2 Networks and Connectivity 16
1.5.7.1 Radio Frequency Identification 25
1.5.7.2 Addressing Schemes Based on IPv6 and Electronic
Product Code 27
1.5.8 Localization 28
Trang 8vi Table of Contents
1.5.9 Cloud Computing and Fog Computing 29
1.6 Derived Qualities of Modern ICT 31
1.6.1 Context Awareness, Adaptability, and Proactivity 31
1.6.2 Increased Data Quality 32
1.6.2.1 Dimensions of Data Quality 32
1.6.2.2 Effects of Increased Data Quality 33
1.6.3 Intuitive Interaction 33
1.7 Potential for Product, Process, and Business Model Innovations 341.7.1 Product Innovation 35
1.7.2 Process Innovation 36
1.7.3 Business Model Innovation 37
1.8 Implications and Challenges 38
1.8.1 New Markets 38
1.8.2 Changed Value Creation 39
1.8.3 Increased Awareness for Information Spaces 40
1.8.4 Social, Ethical, Legal, and Risk Aspects 41
2.2.2 Internet of Things as a Technical Revolution 53
2.3 Cyber–Physical–Social Systems 54
2.5.4 Erosion and Economy 61
2.5.5 Transferring Adaptable Objects 62
Trang 9Table of Contents2.7 Cybersecurity 67
2.8 Reasoning from Data 69
2.9 Adaptable Self-Organizing Systems 70
2.10 Moral Things 72
References 75
Part II Enablers 77
3 An Overview of Enabling Technologies for the Internet of Things 79
Faisal Alsubaei, Abdullah Abuhussein, and Sajjan Shiva
3.3.4.2 Information Aggregation Services 101
3.3.4.3 Collaborative Aware Services 101
3.3.4.4 Ubiquitous Services 101
3.3.5 Business Layer Technologies 101
3.3.5.1 Semantics 101
3.3.5.2 Big Data Analytics 103
3.4 IoT Platforms and Operating Systems 105
Trang 10viii Table of Contents
4.2 IoT System Requirements 114
4.3 Cloud Computing in IoT 116
4.3.1 Advantages of Using the Cloud for IoT 1184.3.2 Examples of Cloud-Based IoT 119
5 RFID in the Internet of Things 135
Akaa Agbaeze Eteng, Sharul Kamal Abdul Rahim,and Chee Yen Leow
5.2 Historical Perspective 135
5.3 RFID and the Internet of Things 137
5.3.1 Object Identification using RFID 139
5.3.2 RFID Sensors 140
5.3.3 RFID Sensor Localization 141
5.3.4 Connecting RFID Sensors to the
Internet 142
5.4 Emergent Issues 144
References 146
Trang 11Table of Contents
6 A Tutorial Introduction to IoT Design and Prototyping with
Examples 153
Manuel Meruje, Musa Gwani Samaila, Virginia N L Franqueira,
Mário Marques Freire, and Pedro Ricardo Morais Inácio
6.2 Main Features of IoT Hardware Development Platforms 154
6.2.1 Key Features of Arduino Hardware Development Platforms 1556.2.1.1 Processing and Memory/Storage Capacity 155
6.2.1.2 Power Consumption, Size, and Cost of Arduino Boards 157
6.2.1.3 Operating Systems and Programming Languages for
6.2.2 Major Features of the Raspberry Pi Hardware Platforms 163
6.2.2.1 Processing and Memory/Storage Capacity 163
6.2.2.2 Power Consumption, Size, and Cost of Raspberry Pi Hardware
6.3 Design and Prototyping of IoT Applications 169
6.3.1 IoT Design and Prototyping Using Arduino Boards 169
6.3.2 IoT Design and Prototyping using Raspberry Pi Platforms 172
6.4 Projects on IoT Applications 173
6.4.1 An Arduino Project for IoT Application 173
6.4.1.1 Installing the Arduino IDE and Mosquitto Software 173
6.4.1.2 Using Arduino IDE and Downloading Libraries 174
6.4.1.3 Project Source Code and Arduino Wiring Diagram 176
6.4.1.4 Executing Mosquitto and Testing the Application 177
6.4.2 A Raspberry Pi Project for IoT Application 180
6.4.2.1 Installing the Operating System 180
6.4.2.2 Downloading and Installing the Required Packages 180
6.4.2.3 Constructing and Testing the Circuit 182
6.4.2.4 Development and Testing of a Python Web Application 183
Acknowledgments 185
References 185
Trang 127.2.3 Security and Privacy 197
7.3 The Standardization Environment 199
7.4 Standardization in Selected Application Areas 201
7.4.1 Intelligent Transport Systems (Automotive Sector) 201
Part III Security Issues and Solutions 219
8 Security Mechanisms and Technologies for Constrained IoT
Devices 221
Marco Tiloca and Shahid Raza
8.2 Security in IoT Protocols and Technologies 222
8.2.1 Lightweight Formats for Cryptosecurity Protocols 223
8.2.2 CoAP and DTLS 224
8.2.3 Object Security for Constrained RESTful Environments 2278.2.4 Compressed IPsec 228
8.2.5 IEEE 802.15.4 and Bluetooth Low Energy 230
8.2.6 OAUTH-Based Authorization in the IoT 233
8.2.7 Overview of Security Protocols and Mechanisms in the IoT 2348.3 Security Issues and Solutions 234
8.3.1 Denial-of-Service Against CoAP 235
8.3.2 Denial-of-Service and Scalability Issues in DTLS 238
8.3.3 DTLS-Based Group Communication 240
8.3.4 Efficient and Scalable Group Key Management 241
8.3.5 Selective Jamming in Wireless Networks 243
8.3.6 Intrusion Detection Systems and Firewalls 246
References 248
Trang 13Table of Contents
9 Blockchain-Based Security Solutions for IoT Systems 255
Göran Pulkkis, Jonny Karlsson, and Magnus Westerlund
9.2 Regulatory Requirements 256
9.2.1 General Data Protection Regulation 257
9.2.2 Directive on Security of Network and Information Systems 2589.3 Blockchain Technology 259
9.4 Blockchains and IoT Systems 261
9.5 Examples of Blockchain-Based Security Solutions for IoT
Systems 262
9.5.1 Secure Management of IoT Devices 262
9.5.2 Secure Firmware Updates in IoT Devices 263
9.5.3 Trust Evaluation of a Trusted Computing Base in IoT Devices 2649.5.4 IoT Device Identity Validation 265
9.5.5 Secure Data Store System for Access Control Information 266
9.5.6 Blockchain-Based Security Architecture for IoT Devices in Smart
9.5.7 Improved Reliability of Medical IoT Devices 269
9.6 Challenges and Future Research 270
References 271
10 The Internet of Things and IT Auditing 275
John Shu, Jason M Rosenberg, Shambhu Upadhyaya, and
Hejamadi Raghav Rao
10.3.2 Need for Auditing 280
10.3.3 Risk Identification and Assessment 282
10.3.4 Audit Strategy 283
10.4 Use Cases of IoT in IT Auditing 286
10.4.1 Bring Your Own Devices 286
10.4.2 Electronic Utility Meter Readers 286
10.4.3 Smart Parking Meter Interfaces 286
10.5 Protecting the Business Network 287
Trang 14xii Table of Contents
10.5.1 Traditional Security Measures 288
10.5.2 New Policies to Address New Threats 289
10.6 Conclusion 289
Acknowledgments 290
References 290
Part IV Application Domains 293
11 The Industrial Internet of Things
12 Internet of Things Applications for Smart Cities 319
Daniel Minoli and Benedict Occhiogrosso
12.1 Introduction 319
12.2 IoT Applications for Smart Cities 321
12.3 Specific Smart City Applications 330
Trang 15Table of Contents12.6 Challenges and Future Research 349
12.7 Conclusion 350
References 351
13 Smart Connected Homes 359
Joseph Bugeja, Andreas Jacobsson, and Paul Davidsson
13.1 Introduction 359
13.2 The Smart Connected Home Domain 360
13.2.1 The Concept of the Smart Connected Home 360
13.2.2 Smart Connected Home Stakeholders 362
13.3 Smart Connected Home Systems 364
13.3.1 Energy 364
13.3.2 Entertainment 365
13.3.3 Health Care 365
13.3.4 Security 366
13.4 The Smart Connected Home Technologies 367
13.4.1 Sensors and Actuators 367
13.4.2 Gateways 369
13.4.3 End User Client Devices 372
13.4.4 Cloud Services 372
13.4.5 Integration Platforms 373
13.4.6 Communication Protocols and Models 373
13.5 Smart Connected Home Architectures 375
14 The Emerging “Energy Internet of Things” 385
Daniel Minoli and Benedict Occhiogrosso
14.1 Introduction 385
14.2 Power Management Trends and EIoT Support 390
14.2.1 Integration of Renewable Sources 391
14.2.1.1 Control 391
14.2.1.2 EIoT Roles in Integration of Resources 394
14.2.2 Smart Cities/Smart Buildings 398
14.2.3 Smart Metering and the Advanced Metering Infrastructure 400
14.2.4 Demand Response 402
Trang 16xiv Table of Contents
15.4 Industry Standards for EIoT 439
15.4.1 Open Automated Demand Response 440
15.4.2 Building Energy Data Exchange Specification (BEDES) 44015.4.3 Institute of Electrical and Electronics Engineers (IEEE) 2030TM
44115.5 Security Considerations in EIoT and Clean Energy
Environments 441
15.6 Conclusion 442
References 444
16 The Internet of Things and People in Health Care 447
Nancy L Russo and Jeanette Eriksson
16.1 Introduction 447
16.2 The Smart Health Care Ecosystem 448
16.2.1 The Patient at the Center 449
16.2.2 Health Care Providers 450
16.2.3 Devices and Sensors 451
16.2.4 Applications and Interfaces 451
16.2.5 Other Stakeholders: Social Support 452
16.2.6 Connecting the Components 452
16.2.7 Summing up Smart Health Care Ecosystem 452
16.3 Dimensions of Internet of Things Applications in
Health Care 453
16.3.1 Well-being—Illness Dimension 455
16.3.2 Physical–Mental Dimension 455
16.3.3 Temporary–Chronic Dimension 456
16.3.4 Prevent–Cure Dimension 456
16.3.5 Monitor–Manage Dimension 456
16.3.6 Internal–External Measures Dimension 457
Trang 17Table of Contents16.3.7 Health Care Provider–Individual Dimension 458
16.4 Examples of IoT-Related Health Care Applications and Their
17.2.3 Hierarchical Cloud Architecture 482
17.2.4 Weather Observation for Remote Rescue 485
17.3 Integration and Compatibility 486
17.3.1 Operational Consistency and Reliability Assurance 487
17.3.2 Electronic Patient Record Retrieval in Multihop Communication 49117.4 Case Study: Chronic Obstructive Pulmonary Disease 492
17.4.1 On-scene Diagnosis and Prognosis 493
17.4.2 Data Acquisition and Analytics 494
17.4.3 Decision and Selection Process 495
17.4.4 Patient and the Ambient Environment 497
17.5 Smart Ambulance Challenges 498
17.5.1 Reliability 498
17.5.2 Standards 499
17.5.3 Staff Training and Operating Procedures 499
17.5.4 Security and Privacy 500
17.6 Conclusions 500
References 502
18 Internet of Things Applications for Agriculture 507
Lei Zhang, Ibibia K Dabipi, and Willie L Brown Jr
Trang 18xvi Table of Contents
18.3 IoT Application in Agriculture Irrigation 512
18.3.1 Crop Water Stress Index 513
18.3.2 Data Acquisition 514
18.3.3 IoT Irrigation System 515
18.4 IoT Application in Agriculture Fertilization 516
18.5 IoT Application in Crop Disease and Pest Management 51818.6 IoT Application in Precision Livestock Farming 519
18.6.1 Smart Chicken Farm 520
18.6.2 Smart Cow Farm 521
18.6.3 IoT Aquaculture 522
18.7 Conclusion 522
References 523
19 The Internet of Flying Things 529
Daniel Fernando Pigatto, Mariana Rodrigues, João Vitor de CarvalhoFontes, Alex Sandro Roschildt Pinto, James Smith,
and Kalinka Regina Lucas Jaquie Castelo Branco
19.1 Introduction 529
19.2 Flying Things 530
19.2.1 Unmanned Aircraft Systems 530
19.2.2 Flying Ad Hoc Networks 530
19.2.3 Flying Things: Unmanned Aerial Vehicles and More 533
19.3 The Internet of Flying Things 533
19.3.1 Fog and Cloud Computing 534
19.3.2 Characteristics of the Internet of Flying Things 536
19.3.3 General Modern Applications of the Internet of Flying Things 53719.3.3.1 Applications in Emergency Situations 537
19.3.3.2 Applications in Smart Cities 538
19.3.3.3 Applications in smart farms 539
19.3.3.4 Government Official Missions 539
19.3.4 Novel Applications of the Internet of Flying Things 540
19.5.2 Case Study 2: Internet Access and IoT Services Provision in Remote
and Peripheral Areas with IoFT as Fog Enabler 552
Trang 19Table of Contents19.5.2.1 The Problem 552
Part V Relevant Sample Applications 563
20 An Internet of Things Approach to “Read” the Emotion of Children
with Autism Spectrum Disorder 565
Tiffany Y Tang and Pinata Winoto
20.1 Introduction 565
20.2.1 Current Approaches of Technology-Based Intervention on Autism
Spectrum Disorder in China 567
20.2.2 The Challenges of Technology-Based Intervention on Autism
Spectrum Disorder in China 567
20.3 Related Work 568
20.3.1 Emotion Recognition in Autism Spectrum Disorder 568
20.3.2 Emotion Expressiveness of Individuals with Autism Spectrum
Disorder 568
20.3.3 Emotion Recognition by Neuro-Typical Individuals 569
20.3.4 Affective Computing, Multisensory Data Collection in Naturalistic
Settings, and Ubiquitous Affective Objects 569
20.3.4.1 Naturalistic Settings and Ubiquitous Affective Objects 569
20.3.4.2 Sensing the Emotion from Behavioral Data Analysis 570
20.3.5 The Internet of Things in Monitoring and Tracking Individuals for
ASD Intervention 571
20.4 The Internet of Things Environment for Emotion
Recognition 571
20.4.1 System Background and Architecture 572
20.4.2 The Naturalistic Play Environment 573
20.4.3 Sensors and Sensor Fusion 574
20.4.3.1 Hardware Design on Emotion and Actuation 574
20.4.3.2 Pressure Sensors: Two Exemplary Play Scenarios 577
20.4.3.3 Data Management and Visualization for Indoor Temperature and
Humidity Detection 579
20.5 The Study and Discussions 580
Trang 20xviii Table of Contents
20.5.1 Emotion Recognition through Microsoft Kinect 580
20.5.1.1 The Emotional Facial Action Coding System (EMFACS) and Kinect
HD Face API 580
20.5.1.2 Emotion Recognition: Preliminary Testing Results 582
20.5.2 Emotion Visualization and Broadcasting through Affective
21.4.1.2 Lab-Scale Ramp Setup 598
21.4.1.3 Selection of Components for IoT Framework 599
21.4.2 Data Logging and Alerts 602
Trang 21Preface
Information and communication technology (ICT) has always been dynamicand evolutionary in nature, leading to the continuous emergence of newtechnologies and business models The recent advances in terms of availablecomputing resources, software systems and communication networks, and thecontinuing miniaturization of hardware components have made it possible tointegrate ICT into virtually anything, thus leading to the rise of a new computingparadigm known as the Internet of Things (IoT) The IoT aims at realizing an olddream of turning everyday objects into smart ones that are interconnected viathe Internet and able to collect and exchange data and to make decisionsautonomously This additional “smartness” covers both the communicationinfrastructure and applications, including monitoring systems, industrial automation, and ultimately smart cities In a recent report, Gartner estimates thatthere will be 11.2 billion connected devices in use in 2018 and 20.1 billion in
2020.1This clearly demonstrates the great potential and importance of thismodel and is also the motivation behind this book
The potential of IoT is great and the possible applications of this model arecountless Therefore, uncovering the ins and outs of the IoT is crucial to bothtechnologyandbusinesscommunities.Thisbookseekstoprovideaholisticcoverage
of the IoT model by presenting its principles, enabling technologies, and some of itsnumerous application domains Important aspects such as the need for standardization, as well as security issues are also highlighted The book also presents twosampleapplicationsshowcasinghowthediscussedconceptsandtechnologiescanbeleveraged and put to practical use to solve some real-world problems
The book is a cohesive material that is composed of 21 chapters authored byseveral internationally renowned researchers and industry experts Each chapterfocuses on a specific subject and also provides the reader with the necessarybackground information, thus improving understandability and encouragingthe reader to think further
1 https://www.gartner.com/newsroom/id/3598917
Trang 22xx Preface
The book may be used as a textbook for both undergraduate and graduatestudents It also comes in handy as a reference for researchers and IT professionals who are interested in IoT concepts, technologies, and possible applications I hope the readers will enjoy reading this book as much as I enjoyedreviewing and editing the submissions
Organization of the Book
The book is organized in a way that helps the reader tofirst grasp the conceptsand then learn about key enabling technologies before moving to some potentialapplications Although I would advise to read the entire book, most chapters areself-contained allowing the reader to focus on the topics they are interested in.Cross references between chapters are provided to help the reader to navigatebetween them
This book is divided intofive parts, each of which is devoted to a distinctivearea
Part I: Concepts and Perspectives
This part is composed of two chapters that cover the core concepts underlyingthe IoT, as well as its evolution and impacts
Chapter 1 provides an introductory overview of the IoT, including its coreconceptual ideas The chapter also covers closely related concepts and paradigms, as well as a list of initiatives and organizations that contribute to theirfurther development In addition, the chapter structures the broad range oftechnical as well nontechnical aspects by presenting a four-layer framework thataddresses the IoT’s enabling technologies, derived qualities of modern ICT andhow they are supporting the IoT, potential for new innovations based on the IoTecosystem, andfinally IoT implications and challenges
Chapter 2 explores some very important aspects that are usually ignored orforgotten when talking about IoT Specifically, the chapter addresses issues likethe heterogeneity of objects utilized as well as the diversity of environmentswithin which IoT systems run, how time is critical to IoT systems in terms ofdevelopment and support, people involved in the IoT ecosystem, and newsecurity challenges the IoT poses It also looks at big data, and both the technicaland the moral challenges that result from the adoption of such intelligent objects
Part II: Enablers
This part comprisesfive chapters about various IoT enabling technologies thatrange from hardware items and communication technologies to data processingand storage to the emerging standards
Trang 23PrefaceChapter 3 gives a general overview of various enabling technologies of the IoT.The discussion of these technologies is based on their application and functionality in the IoT five-layer model This includes hardware components,network technologies, middleware technologies, application services, and business-related technologies Moreover, the chapter provides a brief overview ofsome of the key platforms and operating systems that are widely used in IoTenvironments
Chapter 4 provides an introduction to cloud computing and fog computing,two of the key back-end technologies in IoT systems The chapter highlightsthe importance of these two models and shows how they complement eachother and work together The chapter presents their advantages and disadvantages, as well as some examples of IoT applications where they can beused
Chapter 5 introduces RFID, one of the core technologies in IoT systems, anddescribes the important role it plays The chapter gives a brief history of RFIDshowing how it is linked with the emergence of the IoT and highlights some of itspossible applications and implementation challenges
Chapter 6 provides a tutorial that explains the design and development of IoTprototypes using Arduino and Raspberry Pi platforms The chapter offers a guidethat covers both the hardware and software aspects of these platforms forbeginners who wish to learn about developing IoT applications Detailedexamples are provided to demonstrate how to implement IoT projects usingthese two platforms
Chapter 7 looks at the development over the past 20 years of the standardization efforts for the IoT and four of its applications (and their respectivepredecessor technologies, if any) and at the links between them The chapterspeculates about the future of standardization in those domains based on whathas been accomplished so far
Part III: Security Issues and Solutions
This part provides three chapters about various security issues, technologies, andconsiderations in IoT environments
Chapter 8 explores the main security protocols and technologies currentlyused in a typical IoT communication stack This technically oriented chapteralso discusses security issues in IoT environments and presents solutionsenabled by research and standardization efforts to address them
Chapter 9 introduces blockchain technology and how it can be leveraged tosecure IoT systems and protect their data The chapter provides some exampleswhere blockchain-based solutions were proposed to secure IoT and gives an ideaabout integration challenges and current research efforts in this area
Chapter 10 highlights the importance of IT auditing for organizations adopting the IoT The chapter discusses the risks associated with the IoT and how
Trang 24xxii Preface
routine and thorough IT auditing can prevent them Risk identification andassessment, as well as audit considerations and policies are presented
Part IV: Domains
This part is composed of nine chapters presenting various application domainswhere IoT technologies can be utilized These chapters present the concepts,underlying technologies, implementation details, and advantages and challenges
of such integration
Chapter 11 represents a foundational chapter for this part as it gives anintroduction to the use of IoT in several domains with focus on the IndustrialInternet of Things (IIoT) showing how IoT can be leveraged in industrialfields ofapplication Two of the main initiatives in the IIoT are highlighted, namely, theIndustrial Internet Consortium (IIC) and the Plattform Industrie 4.0
Chapter 12 provides an overview of IoT applications for smart cities and how itcan help in improving resource management The technical aspects and generalrequirements of such solutions as well as the challenges the broad adoption ofIoT faces in smart cities are presented
Chapter 13 provides a contemporary overview of the IoT applications in smarthomes, or what is called in the chapter as smart connected homes The chapterpresents the underlying technologies and architectures of smart connectedhomes, as well as the services they offer to householders Both the technicaland social challenges are also highlighted
Chapter 14 addresses the integration of the IoT in the energy domain Thechapter provides a broad discussion of the motivations, approaches, andchallenges of this integration and presents some specific applications includingsmart grid, green IoT, and smart lighting
Chapter 15 continues the discussion made in Chapter 14 by highlightingvarious essential developments that are required for deploying and managingsmart grids and renewable generation sources using IoT The technical requirements, industry standards, and security concerns are addressed in this chapter.Chapter 16 provides a comprehensive discussion on the integration of the IoT
in patient-focused health applications The chapter first describes the keyelements of IoT-based health care ecosystems, and then explores the differenttypes of applications that utilize this model Challenges and expectations offuture developments are highlighted as well
Chapter 17 discusses how paramedics can use the IoT for emergency support.The chapter starts with an overview of how IoT enables the realization of smartambulance, and then it provides a case study that assesses the adoption of thismodel for diagnosis and prognosis of chronic obstructive pulmonary disease.Challenges for the global deployment of smart ambulance are highlighted.Chapter 18 reviews the various applications the IoT offers for precisionagriculture (PA) The chapter starts with an introduction to PA, and then
Trang 25Prefaceillustrates how the integration of IoT technologies into its different sections can
be revolutionary in terms of quantity, quality, efficiency, sustainability, and effectiveness
cost-Chapter 19 provides a broad overview of the integration of the IoT intoUnmanned Aerial Vehicles (UAVs; commonly known as drones) The chapterdescribes this new model and presents its underlying technologies as well asseveral applications where it can be utilized The chapter also highlights thechallenges of this model with special focus on the security and safety issues
Part V: Relevant Sample Applications
This part contains two chapters that offer two exemplary applications of IoT.Both chapters are implemented in lab scale using smart objects with the aim oftackling some real-life issues Both technical and social details of these applications are discussed The objective of providing these examples is to present theimplementation details and show the reader how the IoT can actually beimplemented
Chapter 20 demonstrates the use of IoT technologies in the behavioral andpsychological researchfield by capturing the emotions of children with autismspectrum disorder (ASD) using smart objects integrated into their play environment First, ASD is explained and a literature review of related work is provided.Then, the technical details of the presented application are provided
Chapter 21 presents a low-cost IoT framework for detecting and reportinglandslides in landslide-prone areas The chapter discusses the technical details ofthis framework, including the system design, used hardware components, andtest results The proposed framework has only been tested in lab, but it clearlyshows how IoT technologies can be effectively integrated into such criticalscenarios
Cairo, Egypt
Trang 27Acknowledgments
I would like to express my gratitude to each and every individual whoparticipated in this project In particular, I would like to acknowledge thehard work of authors and their patience during the revisions of their chapters
I also wish to thank Daniel Minoli, Marta Vos, Qiang Yang, Supriya Mitra,and Xiaojun Zhai for their comments that helped improve the quality andorganization of this book
Finally, I am very grateful to the editorial team at Wiley-IEEE Press for theirsupport through the stages of preparation and production Special thanks to myeditor Mary Hatcher for her great support throughout the entire process.Thanks to Vishnu Narayanan for overseeing the editorial phase Also, thanks tothe anonymous reviewers provided by Wiley-IEEE Press whose commentshelped improve the quality of the chapters
Qusay F Hassan
Trang 29Computer Science Department,
University of Memphis, Memphis,
TN, USA
and
Faculty of Computing and
Information Technology, University
of Jeddah, Jeddah, Saudi Arabia
Kalinka Regina Lucas Jaquie
Castelo Branco
Institute of Mathematics and
Computer Sciences (ICMC),
University of São Paulo (USP),
São Carlos, São Paulo, Brazil
Willie L Brown, Jr.
Department of Engineering and
Aviation Sciences, University of
Maryland Eastern Shore, Princess
Anne, MD, USA
Joseph Bugeja,
Internet of Things and People
Research Center and Department of
Computer Science and Media
Technology, Malmö University,
Malmö, Sweden
Pratik Chaturvedi
Defence Terrain ResearchLaboratory, Defence Research andDevelopment Organization, NewDelhi, India
andApplied Cognitive ScienceLaboratory, Indian Institute ofTechnology Mandi, Kamand, India
Ibibia K Dabipi
Department of Engineering andAviation Sciences, University ofMaryland Eastern Shore, PrincessAnne, MD, USA
Paul Davidsson
Internet of Things and PeopleResearch Center and Department ofComputer Science and MediaTechnology, Malmö University,Malmö, Sweden
João Vitor de Carvalho Fontes
São Carlos School of Engineering(EESC), University of São Paulo(USP), São Carlos, São Paulo, Brazil
Trang 30xxviii Contributors
Varun Dutt
School of Computing and Electrical
Engineering; School of Humanities
and Social Sciences, Indian Institute
of Technology Mandi, Himachal
Pradesh, India
Jeanette Eriksson
Department of Computer Science
and Media Technology, Internet of
Things and People (IoTaP)
Research Center, Malmö
University, Malmö, Sweden
Akaa Agbaeze Eteng
Department of Electronic and
Computer Engineering, University
of Port Harcourt, Port Harcourt,
Nigeria
Lucas Finco
Principal Consultant, Strategain,
New York, NY, USA
Department of Computer Science,
Western Michigan University,
Kalamazoo MI, USA
Virginia N L Franqueira
Department of Electronics,
Computing & Mathematics,
University of Derby, Derby, UK
Mário Marques Freire
Instituto de Telecomunicações and
Department of Computer Science,
Universidade da Beira Interior,
Covilhã, Portugal
Daniel Happ
Technische Universität Berlin,Telecommunication NetworksGroup (TKN), Berlin, Germany
Pedro Ricardo Morais Inácio
Instituto de Telecomunicações andDepartment of Computer Science,Universidade da Beira Interior,Covilhã, Portugal
Andreas Jacobsson
Internet of Things and PeopleResearch Center and Department ofComputer Science and MediaTechnology, Malmö University,Malmö, Sweden
Kai Jakobs
Computer Science Department,RWTH Aachen University, Aachen,Germany
Venkata Uday Kala
School of Engineering, IndianInstitute of Technology Mandi,Himachal Pradesh, India
Jonny Karlsson
Department of BusinessManagement and Analytics, ArcadaUniversity of Applied Sciences,Helsinki, Finland
Sudhakar Kumar
School of Computing and ElectricalEngineering, Indian Institute ofTechnology Mandi, HimachalPradesh, India
Chee Yen Leow
Wireless Communication Centre,Universiti Teknologi Malaysia,Johor, Malaysia
Trang 31School of Engineering, Indian
Institute of Technology Mandi,
Himachal Pradesh, India
Manuel Meruje
Instituto de Telecomunicações and
Department of Computer Science,
Universidade da Beira Interior,
Covilhã, Portugal
Daniel Minoli
IoT Division, DVI
Communications, New York, NY,
USA
Benedict Occhiogrosso
Intellectual Property Division, DVI
Communications, New York, NY,
USA
Daniel Fernando Pigatto
Graduate Program in Electrical and
Computer Engineering (CPGEI),
Federal University of Technology
Paraná (UTFPR), Curitiba, Paraná,
Brazil
Alex Sandro Roschildt Pinto
Federal University of Santa Catarina
(UFSC), Blumenau, Santa Catarina,
Brazil
Göran Pulkkis
Department of Business
Management and Analytics, Arcada
University of Applied Sciences,
Helsinki, Finland
Sharul Kamal Abdul Rahim
Wireless Communication Centre,Universiti Teknologi Malaysia,Johor, Malaysia
Hejamadi Raghav Rao
Department of Information Systemsand Cyber Security, University ofTexas San Antonio, San Antonio,
Musa Gwani Samaila
Instituto de Telecomunicações andDepartment of Computer Science,Universidade da Beira Interior,Covilhã, Portugal
andCentre for Geodesy andGeodynamics, National SpaceResearch and Development Agency,Toro, Bauchi State, Nigeria
Trang 32xxx Contributors
Detlef Schoder
Department of Information Systems
and Information Management,
University of Cologne, Köln,
Germany
Sajjan Shiva
Computer Science Department,
The University of Memphis,
Memphis, TN, USA
John Shu
Department of Information Systems
and Cyber Security, University of
Texas San Antonio, San Antonio,
TX, USA
Jan Sliwa
Department of Engineering and
Information Technology, Bern
University of Applied Sciences,
Bern, Switzerland
James Smith
Computer Science and Creative
Technologies (FET), University of
the West of England (UWE),
Bristol, England, United Kingdom
Tiffany Y Tang
Wenzhou-Kean Autism Research
Network, Assistive Technology
Research and Development Center,
Department of Computer Science,
Wenzhou-Kean University,
Zhejiang Province, China
Kamal Kishore Thakur
Computer Science and Engineering
Department, Thapar Institute of
Engineering and Technology,
Magnus Westerlund
Department of BusinessManagement and Analytics, ArcadaUniversity of Applied Sciences,Helsinki, Finland
Alexander Willner
Fraunhofer FOKUS, Software-basedNetworks (NGNI), Berlin, Germanyand
Technische Universität Berlin, NextGeneration Networks (AV), Berlin,Germany
Pinata Winoto
Wenzhou-Kean Autism ResearchNetwork, Assistive TechnologyResearch and Development Center,Department of Computer Science,Wenzhou-Kean University,Zhejiang Province, China
Srishti Yadav
School of Computing and ElectricalEngineering, Indian Institute ofTechnology Mandi, HimachalPradesh, India
Lei Zhang
Department of Engineering andAviation Sciences, University ofMaryland Eastern Shore, PrincessAnne, MD, USA
Trang 33Part I
Concepts and Perspectives
Trang 35“When wireless is perfectly applied, the whole Earth will be converted into
a huge brain, which in fact it is, all things being particles of a real andrhythmic whole [ ] and the instruments through which we shall beable to do this will be amazingly simple compared with our presenttelephone A man will be able to carry one in his vest pocket.”
Kevin Ashton was thefirst to use the term Internet of Things (IoT) in 1999(Ashton, 2009) in the context of supply chain management with radio frequencyidentification (RFID)-tagged or barcoded items (things) offering greater efficiency and accountability to businesses As Ashton wrote in the RFID Journal (June 22, 2009):
“If we had computers that knew everything there was to know aboutthings– using data they gathered without any help from us – we would beable to track and count everything, and greatly reduce waste, loss and cost
We would know when things needed replacing, repairing or recalling, andwhether they were fresh or past their best.”
In the same year, Gershenfeld (1999) published his work“When Things Start
to Think,” in which he envisioned the evolution of the World Wide Web as being
a state in which“things start to use the Net so that people don’t need to.” ATMscould be considered as one of thefirst smart objects, which went online as early
Internet of Things A to Z: Technologies and Applications, First Edition Edited by Qusay F Hassan.
2018 by The Institute of Electrical and Electronics Engineers, Inc Published 2018 by John Wiley & Sons, Inc.
Trang 364 1 Introduction to the Internet of Things
as 1974 In addition, early examples of various prototype devices include vendingmachines in the 1980s performed by the Computer Science Department ofCarnegie Mellon University Since then, understanding of the possible breadth
of IoT has become much more inclusive, comprising a wide range of applicationdomains, including health care, utilities, transportation, and so on, as well aspersonal, home, and mobile application scenarios (Gubbi et al., 2013; Sundmaeker et al., 2010) More recently, the“Industrial Internet of Things” (IIoT) hasfurther expanded the scope of IoT (see Section 1.2.2 and Chapter 11) With IoT,
a world of networked,“intelligent,” or “smart” objects (Ashton, 2009; Weiser,1991; Weiser and Brown, 1996; Lyytinen and Yoo, 2002; Aggarwal et al., 2013;Gubbi et al., 2013; Mattern and Flörkemeier, 2010; Atzori et al., 2014; Chui et al.,2010) is envisioned Recently, novel extensions of IoT have emerged, whichinclude not only physical objects but also virtual objects1(which may blur thecore concept of IoT that predominately focuses on physical things and objects).The common denominator of these varied conceptions of IoT is that“things” areexpected to become active elements in business, information, and socialprocesses
If one recognizes the broad spectrum of application scenarios, the moregeneral term “Net” would be more adequate than “Internet,” since not allcommunication occurs via the Internet Communication also does not exclusively occur between things/devices, but also between things and people So, itwould be more appropriate to use the terms the“Internet of Everything”2
or“Net
of Everything” instead of “Internet of Things.”
As the most well-known visionary of the computerized and interlinkedphysical world, Mark Weiser asserts that a connected world of things is designed
to help people with their activities in an unobtrusive manner Interaction occurswith everyday—but computationally augmented—artifacts through naturalinteractions, our senses, and the spoken word (Weiser, 1991) In the course
of miniaturization, the increasingly smaller technical components will beembedded into physical components, with as little intrusiveness for users aspossible or without attracting attention at all For example, miniaturizedcomputers (or components thereof) and wearables with sensors are directly
1 Increasing numbers of physical objects/things are beginning to be seen in digital format or even only in digital format Examples of this include books, maps, e-tickets of any sort, business cards, electronic purses, and so on Consequently, not all “virtual objects” that are currently used are digital models of physical objects (pendants), but rather these objects “stand on their own” with no physical counterpart Virtual objects can be de fined as a digital element with a specific purpose, comprised of data and capable of performing actions (Espada et al., 2011).
2 The term “Internet of Everything” was coined by Cisco Systems and basically refers to applying the IoT model to everything, thus creating new capacities and smart processes in virtually every field Cisco calls it the connection of “people, process, data and things.” The Internet of
Everything may be perceived as a variation or extension of IoT, subtly distinguishing itself by emphasizing the connection of people to things.
Trang 371.1 Introductionincorporated into pieces of clothing In his essay in 1991,“The Computer for the21st Century,” Mark Weiser first expressed this vision while he was a ChiefTechnologist at the Xerox Palo Alto Research Center in the late 1980s (Weiser,
1991, 1993; Weiser and Brown, 1996; Weiser et al., 1999) Since then, this workranks among the most cited academic papers in related academic disciplines thatenvision a connected world of everyday things This vision and the relateddevelopments are referred to by Weiser as“Ubiquitous Computing” (also known
as“Ubicomp”) Since its conceptual inception more than 25 years ago, manymore related and modified concepts have emerged, including pervasive,nomadic, calm, invisible, universal, and sentinel computing, as well as ambientintelligence.3The Cluster of European Research Projects on the Internet ofThings (CERP-IoT) blend together building blocks that derive from the aforementioned concepts and emphasize the symbiotic interaction of the real andphysical with the digital and virtual world From their perspective, physicalobjects have virtual counterparts representing them, which translate them intocomputable parts of the physical world The CERP-IoT vision has recentlybecome even more comprehensive by incorporating issues of Social Media,anticipating massive user interaction with things and linking to additionalinformation regarding identity, status, location, or any other business, social,
or privately relevant information (Chapter 1 of Uckelmann et al., 2011).Essentially, ITU (2005) defines IoT as a concept that allows people and things
to be connected anytime, anyplace, with anything and anyone (and adding—according to CERP-IoT, 2009—ideally using any path/network and any service).Another line popularized by CISCO asserts a simple concept: The IoT is bornwhen more things are connected via the Internet as human beings As such, theadvent of IoT may be dated around 2008/2009 (Evans, 2011) or 2011 (Gubbi
et al., 2013) According to the lnternational Data Corporation (IDC)’s Worldwide Internet of Things Forecast, 2015–2020, 30 billion connected (autonomous) things are predicted to be part of the IoT by 2020 Another estimateanticipates approximately 1000 devices per person by 2025 (Sangiovanni-Vincentelli, 2014)
IoT is at the center of overlapping Internet-oriented (middleware), oriented (sensors), and semantic-oriented (knowledge) visions (Atzori et al.,2010) Specifically, (i) Internet-oriented, which emphasizes the networkingparadigm and exploiting the established IP-based networking infrastructure,
things-in order to achieve an efficient connection between devices, and on developthings-inglightweight protocols in order to meet IoT specifics (see Section 1.5.2);(ii) things-oriented, which focuses on physical objects and onfinding meansthat are able to identify and integrate them with the virtual (cyber) world; and
3 For a discussion on similarities and differences, see, for example, Aarts et al (2001); for a
summary of more than 20 years of the “Ubicomp” vision, see, for example, Cáceres and Friday (2012).
Trang 386 1 Introduction to the Internet of Things
(iii) semantic-oriented, which aims to utilize semantic technologies, makingsense of objects and their data to represent, store, interconnect, and manage theenormous amount of information provided by the increasing number of IoTobjects (Atzori et al., 2010; Borgia, 2014)
As IoT continues to evolve, its comprehensive definition is also likely todevelop.4Accordingly, the IEEE IoT initiative gives its community members anopportunity to contribute to the definition of the IoT (IEEE, 2015, 2017) Thedocument presents two definitions, one for small-scale scenarios: “An IoT is anetwork that connects uniquely identifiable ‘Things’ to the Internet The
‘Things’ have sensing/actuation and potential programmability capabilities.Through the exploitation of unique identification and sensing, informationabout the‘Thing’ can be collected and the state of the ‘Thing’ can be changedfrom anywhere, anytime, by anything.” The second definition is for large-scalescenarios: “Internet of Things envisions a self-configuring, adaptive, complexnetwork that interconnects‘Things’ to the Internet through the utilization ofstandard communication protocols The interconnected things have physical orvirtual representation in the digital world, sensing/actuation capability, aprogrammability feature and are uniquely identifiable The representationcontains information including the thing’s identity, status, location or any otherbusiness, social or privately relevant information The things offer services, with
or without human intervention, through the exploitation of unique identification, data capture and communication, and actuation capability The service isexploited through the use of intelligent interfaces and is made available anywhere, anytime, and for anything taking security into consideration.”
Incorporating various perspectives while revealing its nucleus, we mayconsolidate and define:
IoT is a world of interconnected things which are capable of sensing,actuating and communicating among themselves and with the environment (i.e., smart things or smart objects) while providing the ability toshare information and act in parts autonomously to real/physical worldevents and by triggering processes and creating services with or withoutdirect human intervention
We intentionally leave out whether this“big plot” will necessarily be realized
on standard communication protocols or a unified framework Although aunified framework would certainly be optimal, it may not be necessary or evenachievable given the dimensionalities and complexities of a likely very highlyheterogeneous computerized world of interconnected things
In order to better structure the scale and scope of IoT, this chapter provides anintroductory overview and briefly outlines the conceptual core ideas as laid out
4 A broad range of IoT de finitions can be found in Minoli (2013).
Trang 391.2 Internet of Things Conceptsprior to IoT with “Ubiquitous Computing.” The chapter covers not onlytechnical but also nontechnical issues of IoT
1.2 Internet of Things Concepts
With technical advancements, our interaction with information systems ischanging, both at work and during leisure time Information, sensor, and networktechnology are becoming increasingly small, more powerful, and more frequentlyused People no longer only encounter information technology at commonpoints in their lives, such as in offices or at desks, but as information andcommunication infrastructures, which are present in increasing areas of everydaylife These infrastructures are characterized by the fact that they not only includeclassic devices, for example, PCs and mobile phones, but that information andcommunication technology is also embedded in objects and environments.The Ubiquitous Computing vision of Mark Weiser implies that computers, as wecurrently know them,“disappear,” or, more precisely, move into the background.Everyday objects and our immediate environment then assume the tasks andabilities of computers (Weiser and Brown, 1996) In his seminal paper, Weiserdescribes this as follows:“The most profound technologies are those that disappear.They weave themselves into the fabric of everyday life until they areindistinguishable from it” (Weiser, 1991) Through the physical embedding of
IT, everyday objects and our everyday environment become“smart,” that is, capable
of processing and providing information, but not necessarily intelligent in the sense
of human cognitive intelligence In another highly regarded article, Weiser togetherwith Brown introduced the notion of“Calm Computing.” They also refer to aconnected world full of computers However, only in cases of service provision orwhen a need exists for interaction do those computers or their respective servicesbecome“visible”; at other times, those capabilities are “calm” in the background, andnot intrusive or even visible to the users (Weiser and Brown, 1996)
The core concepts comprising IoT, as well as related concepts and models, will
be presented in the following sections
1.2.1 Core Concepts: Smart Objects and Smart Environments
A smart object is a physical object in which a processor, data storage system,sensor system, and network technology are embedded (Poslad, 2009; Kortuem
et al., 2010; Sánchez López et al., 2011) Some smart objects can also affect theirenvironment by means of actuators In principle, all physical objects can beturned into smart objects, for example, conventional everyday objects such aspens,5wristwatches (there are numerous wristwatch models with sensors and
5 A well-known example of a computerized version of a pen is the Anoto Pen, see www.anoto com
Trang 408 1 Introduction to the Internet of Things
processors, for example, to measure the heart rate or to determine geographicposition), or automobiles (more recently, autonomous automobiles) In anindustrial context, it could be a machine or the product to be manipulated.Smart objects may also be anywhere In fact, there are almost no restrictionsregarding domains: consumer electronic devices, home appliances, medicaldevices, cameras, and all sorts of sensors and data-generating devices Mostsmart objects have a user interface and interaction capabilities to communicatewith the environment or other devices (e.g., displays) The capability of smartobjects to communicate with other objects and with their environment is a corecomponent of IoT In line with this is the idea that specific information can beretrieved via any networked smart object, which is uniquely identified andlocalized, and may have its“own home page,” that is, unique address Today, onecan take advantage of a broad range of fairly inexpensive, tiny, and relativelypowerful components, including sensors, actuators, and single board computers(SBC), to enrich physical things and connect them to the Internet SBCs, such asRaspberry Pi, BeagleBone Black, and Intel Edison Open, as well as open-sourceelectronics, such as Arduino, which entered the market between 2005 and 2008,catalyzed millions of new ideas and projects Creating and collecting data aboutthe status of physical objects may establish the basis for interesting home andoffice automation projects, education, and leisure activities with real-timevisualizations of information generated from data“on the go” (Baras and Brito,2017) Moreover, one can utilize the remote networks of intelligent devicesdeployed somewhere else
Tightly coupled to“smart objects” is the concept of “smart environments.”One definition emphasizes the physical extent to which smart objects aredeployed and interacting A compilation of smart objects within a given space,such as a closed space (automobile, house, room) or an outside area, for example,
a district or an entire city (i.e., a smart city; see Chapter 12), turns a commonenvironment into a smart one Another definition asserts that sensors are the keyfactor in a smart environment Essential for a smart environment is the contextinformation gathered by sensors in order to provide adapted applications andservices Weiser et al (1999) defined a smart environment as “the physical worldthat is richly and invisibly interwoven with sensors, actuators, displays, andcomputational elements, embedded seamlessly in the everyday objects of ourlives, and connected through a continuous network.”
1.2.2 Related Concepts: Machine-to-Machine Communications, Industrial Internet of Things, and Industry 4.0
IoT is not a construct that has appeared suddenly or without precursors.Technological forerunners and various conceptualizations exist prior to therelatively new“IoT” label, for example, machine-to-machine (M2M) communications In addition, recent derivatives exist, for example, the Industrial