1. Trang chủ
  2. » Giáo Dục - Đào Tạo

Internet of things a to z technologies and applications part 1

324 1 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Internet of Things A to Z Technologies and Applications Part 1
Tác giả Ekram Hossain, Giancarlo Fortino, David Alan Gri
Trường học IEEE Press
Thể loại editorial
Thành phố Piscataway
Định dạng
Số trang 324
Dung lượng 14,6 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

7.2.3 Security and Privacy 1977.3 The Standardization Environment 199 7.4 Standardization in Selected Application Areas 201 7.4.1 Intelligent Transport Systems Automotive Sector 201 Part

Trang 3

Internet of Things A to Z

Trang 4

IEEE Press

445 Hoes LanePiscataway, NJ 08854

IEEE Press Editorial Board

Ekram Hossain, Editor in Chief

Trang 5

Internet of Things A to Z

Technologies and Applications

Edited by Qusay F Hassan

Trang 6

Copyright  2018 by The Institute of Electrical and Electronics Engineers, Inc All rights reserved.

Published by John Wiley & Sons, Inc., Hoboken, New Jersey.

Published simultaneously in Canada.

No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers,

MA 01923, (978) 750-8400, fax (978) 750-4470, or on the web at www.copyright.com Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at

http://www.wiley.com/go/permission

Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and speci fically disclaim any implied warranties of merchantability or fitness for a particular purpose No warranty may be created or extended by sales representatives or written sales materials The advice and strategies contained herein may not be suitable for your situation You should consult with a professional where appropriate Neither the publisher nor author shall be liable for any loss of pro fit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages.

For general information on our other products and services or for technical support, please contact our Customer Care Department within the United States at (800) 762-2974, outside the United States at (317) 572-3993 or fax (317) 572-4002.

Wiley also publishes its books in a variety of electronic formats Some content that appears in print may not be available in electronic formats For more information about Wiley products, visit our web site at www.wiley.com

Library of Congress Cataloging-in-Publication Data is available.

ISBN: 978-1-111-945674-2

Printed in the United States of America.

10 9 8 7 6 5 4 3 2 1

Trang 7

Part I Concepts and Perspectives 1

1 Introduction to the Internet of Things 3

Detlef Schoder

1.2 Internet of Things Concepts 7

1.2.1 Core Concepts: Smart Objects and Smart Environments 7

1.2.2 Related Concepts: Machine-to-Machine Communications,

Industrial Internet of Things, and Industry 4.0 8

1.2.2.1 Machine-to-Machine Communications 9

1.2.2.2 Industrial Internet and Industry 4.0 10

1.3 Who Works on the Internet of Things? 11

1.4 Internet of Things Framework 12

1.5 Information and Communication Technology Infrastructure 141.5.1 Architecture and Reference Models 14

1.5.2 Networks and Connectivity 16

1.5.7.1 Radio Frequency Identification 25

1.5.7.2 Addressing Schemes Based on IPv6 and Electronic

Product Code 27

1.5.8 Localization 28

Trang 8

vi Table of Contents

1.5.9 Cloud Computing and Fog Computing 29

1.6 Derived Qualities of Modern ICT 31

1.6.1 Context Awareness, Adaptability, and Proactivity 31

1.6.2 Increased Data Quality 32

1.6.2.1 Dimensions of Data Quality 32

1.6.2.2 Effects of Increased Data Quality 33

1.6.3 Intuitive Interaction 33

1.7 Potential for Product, Process, and Business Model Innovations 341.7.1 Product Innovation 35

1.7.2 Process Innovation 36

1.7.3 Business Model Innovation 37

1.8 Implications and Challenges 38

1.8.1 New Markets 38

1.8.2 Changed Value Creation 39

1.8.3 Increased Awareness for Information Spaces 40

1.8.4 Social, Ethical, Legal, and Risk Aspects 41

2.2.2 Internet of Things as a Technical Revolution 53

2.3 Cyber–Physical–Social Systems 54

2.5.4 Erosion and Economy 61

2.5.5 Transferring Adaptable Objects 62

Trang 9

Table of Contents2.7 Cybersecurity 67

2.8 Reasoning from Data 69

2.9 Adaptable Self-Organizing Systems 70

2.10 Moral Things 72

References 75

Part II Enablers 77

3 An Overview of Enabling Technologies for the Internet of Things 79

Faisal Alsubaei, Abdullah Abuhussein, and Sajjan Shiva

3.3.4.2 Information Aggregation Services 101

3.3.4.3 Collaborative Aware Services 101

3.3.4.4 Ubiquitous Services 101

3.3.5 Business Layer Technologies 101

3.3.5.1 Semantics 101

3.3.5.2 Big Data Analytics 103

3.4 IoT Platforms and Operating Systems 105

Trang 10

viii Table of Contents

4.2 IoT System Requirements 114

4.3 Cloud Computing in IoT 116

4.3.1 Advantages of Using the Cloud for IoT 1184.3.2 Examples of Cloud-Based IoT 119

5 RFID in the Internet of Things 135

Akaa Agbaeze Eteng, Sharul Kamal Abdul Rahim,and Chee Yen Leow

5.2 Historical Perspective 135

5.3 RFID and the Internet of Things 137

5.3.1 Object Identification using RFID 139

5.3.2 RFID Sensors 140

5.3.3 RFID Sensor Localization 141

5.3.4 Connecting RFID Sensors to the

Internet 142

5.4 Emergent Issues 144

References 146

Trang 11

Table of Contents

6 A Tutorial Introduction to IoT Design and Prototyping with

Examples 153

Manuel Meruje, Musa Gwani Samaila, Virginia N L Franqueira,

Mário Marques Freire, and Pedro Ricardo Morais Inácio

6.2 Main Features of IoT Hardware Development Platforms 154

6.2.1 Key Features of Arduino Hardware Development Platforms 1556.2.1.1 Processing and Memory/Storage Capacity 155

6.2.1.2 Power Consumption, Size, and Cost of Arduino Boards 157

6.2.1.3 Operating Systems and Programming Languages for

6.2.2 Major Features of the Raspberry Pi Hardware Platforms 163

6.2.2.1 Processing and Memory/Storage Capacity 163

6.2.2.2 Power Consumption, Size, and Cost of Raspberry Pi Hardware

6.3 Design and Prototyping of IoT Applications 169

6.3.1 IoT Design and Prototyping Using Arduino Boards 169

6.3.2 IoT Design and Prototyping using Raspberry Pi Platforms 172

6.4 Projects on IoT Applications 173

6.4.1 An Arduino Project for IoT Application 173

6.4.1.1 Installing the Arduino IDE and Mosquitto Software 173

6.4.1.2 Using Arduino IDE and Downloading Libraries 174

6.4.1.3 Project Source Code and Arduino Wiring Diagram 176

6.4.1.4 Executing Mosquitto and Testing the Application 177

6.4.2 A Raspberry Pi Project for IoT Application 180

6.4.2.1 Installing the Operating System 180

6.4.2.2 Downloading and Installing the Required Packages 180

6.4.2.3 Constructing and Testing the Circuit 182

6.4.2.4 Development and Testing of a Python Web Application 183

Acknowledgments 185

References 185

Trang 12

7.2.3 Security and Privacy 197

7.3 The Standardization Environment 199

7.4 Standardization in Selected Application Areas 201

7.4.1 Intelligent Transport Systems (Automotive Sector) 201

Part III Security Issues and Solutions 219

8 Security Mechanisms and Technologies for Constrained IoT

Devices 221

Marco Tiloca and Shahid Raza

8.2 Security in IoT Protocols and Technologies 222

8.2.1 Lightweight Formats for Cryptosecurity Protocols 223

8.2.2 CoAP and DTLS 224

8.2.3 Object Security for Constrained RESTful Environments 2278.2.4 Compressed IPsec 228

8.2.5 IEEE 802.15.4 and Bluetooth Low Energy 230

8.2.6 OAUTH-Based Authorization in the IoT 233

8.2.7 Overview of Security Protocols and Mechanisms in the IoT 2348.3 Security Issues and Solutions 234

8.3.1 Denial-of-Service Against CoAP 235

8.3.2 Denial-of-Service and Scalability Issues in DTLS 238

8.3.3 DTLS-Based Group Communication 240

8.3.4 Efficient and Scalable Group Key Management 241

8.3.5 Selective Jamming in Wireless Networks 243

8.3.6 Intrusion Detection Systems and Firewalls 246

References 248

Trang 13

Table of Contents

9 Blockchain-Based Security Solutions for IoT Systems 255

Göran Pulkkis, Jonny Karlsson, and Magnus Westerlund

9.2 Regulatory Requirements 256

9.2.1 General Data Protection Regulation 257

9.2.2 Directive on Security of Network and Information Systems 2589.3 Blockchain Technology 259

9.4 Blockchains and IoT Systems 261

9.5 Examples of Blockchain-Based Security Solutions for IoT

Systems 262

9.5.1 Secure Management of IoT Devices 262

9.5.2 Secure Firmware Updates in IoT Devices 263

9.5.3 Trust Evaluation of a Trusted Computing Base in IoT Devices 2649.5.4 IoT Device Identity Validation 265

9.5.5 Secure Data Store System for Access Control Information 266

9.5.6 Blockchain-Based Security Architecture for IoT Devices in Smart

9.5.7 Improved Reliability of Medical IoT Devices 269

9.6 Challenges and Future Research 270

References 271

10 The Internet of Things and IT Auditing 275

John Shu, Jason M Rosenberg, Shambhu Upadhyaya, and

Hejamadi Raghav Rao

10.3.2 Need for Auditing 280

10.3.3 Risk Identification and Assessment 282

10.3.4 Audit Strategy 283

10.4 Use Cases of IoT in IT Auditing 286

10.4.1 Bring Your Own Devices 286

10.4.2 Electronic Utility Meter Readers 286

10.4.3 Smart Parking Meter Interfaces 286

10.5 Protecting the Business Network 287

Trang 14

xii Table of Contents

10.5.1 Traditional Security Measures 288

10.5.2 New Policies to Address New Threats 289

10.6 Conclusion 289

Acknowledgments 290

References 290

Part IV Application Domains 293

11 The Industrial Internet of Things

12 Internet of Things Applications for Smart Cities 319

Daniel Minoli and Benedict Occhiogrosso

12.1 Introduction 319

12.2 IoT Applications for Smart Cities 321

12.3 Specific Smart City Applications 330

Trang 15

Table of Contents12.6 Challenges and Future Research 349

12.7 Conclusion 350

References 351

13 Smart Connected Homes 359

Joseph Bugeja, Andreas Jacobsson, and Paul Davidsson

13.1 Introduction 359

13.2 The Smart Connected Home Domain 360

13.2.1 The Concept of the Smart Connected Home 360

13.2.2 Smart Connected Home Stakeholders 362

13.3 Smart Connected Home Systems 364

13.3.1 Energy 364

13.3.2 Entertainment 365

13.3.3 Health Care 365

13.3.4 Security 366

13.4 The Smart Connected Home Technologies 367

13.4.1 Sensors and Actuators 367

13.4.2 Gateways 369

13.4.3 End User Client Devices 372

13.4.4 Cloud Services 372

13.4.5 Integration Platforms 373

13.4.6 Communication Protocols and Models 373

13.5 Smart Connected Home Architectures 375

14 The Emerging “Energy Internet of Things” 385

Daniel Minoli and Benedict Occhiogrosso

14.1 Introduction 385

14.2 Power Management Trends and EIoT Support 390

14.2.1 Integration of Renewable Sources 391

14.2.1.1 Control 391

14.2.1.2 EIoT Roles in Integration of Resources 394

14.2.2 Smart Cities/Smart Buildings 398

14.2.3 Smart Metering and the Advanced Metering Infrastructure 400

14.2.4 Demand Response 402

Trang 16

xiv Table of Contents

15.4 Industry Standards for EIoT 439

15.4.1 Open Automated Demand Response 440

15.4.2 Building Energy Data Exchange Specification (BEDES) 44015.4.3 Institute of Electrical and Electronics Engineers (IEEE) 2030TM

44115.5 Security Considerations in EIoT and Clean Energy

Environments 441

15.6 Conclusion 442

References 444

16 The Internet of Things and People in Health Care 447

Nancy L Russo and Jeanette Eriksson

16.1 Introduction 447

16.2 The Smart Health Care Ecosystem 448

16.2.1 The Patient at the Center 449

16.2.2 Health Care Providers 450

16.2.3 Devices and Sensors 451

16.2.4 Applications and Interfaces 451

16.2.5 Other Stakeholders: Social Support 452

16.2.6 Connecting the Components 452

16.2.7 Summing up Smart Health Care Ecosystem 452

16.3 Dimensions of Internet of Things Applications in

Health Care 453

16.3.1 Well-being—Illness Dimension 455

16.3.2 Physical–Mental Dimension 455

16.3.3 Temporary–Chronic Dimension 456

16.3.4 Prevent–Cure Dimension 456

16.3.5 Monitor–Manage Dimension 456

16.3.6 Internal–External Measures Dimension 457

Trang 17

Table of Contents16.3.7 Health Care Provider–Individual Dimension 458

16.4 Examples of IoT-Related Health Care Applications and Their

17.2.3 Hierarchical Cloud Architecture 482

17.2.4 Weather Observation for Remote Rescue 485

17.3 Integration and Compatibility 486

17.3.1 Operational Consistency and Reliability Assurance 487

17.3.2 Electronic Patient Record Retrieval in Multihop Communication 49117.4 Case Study: Chronic Obstructive Pulmonary Disease 492

17.4.1 On-scene Diagnosis and Prognosis 493

17.4.2 Data Acquisition and Analytics 494

17.4.3 Decision and Selection Process 495

17.4.4 Patient and the Ambient Environment 497

17.5 Smart Ambulance Challenges 498

17.5.1 Reliability 498

17.5.2 Standards 499

17.5.3 Staff Training and Operating Procedures 499

17.5.4 Security and Privacy 500

17.6 Conclusions 500

References 502

18 Internet of Things Applications for Agriculture 507

Lei Zhang, Ibibia K Dabipi, and Willie L Brown Jr

Trang 18

xvi Table of Contents

18.3 IoT Application in Agriculture Irrigation 512

18.3.1 Crop Water Stress Index 513

18.3.2 Data Acquisition 514

18.3.3 IoT Irrigation System 515

18.4 IoT Application in Agriculture Fertilization 516

18.5 IoT Application in Crop Disease and Pest Management 51818.6 IoT Application in Precision Livestock Farming 519

18.6.1 Smart Chicken Farm 520

18.6.2 Smart Cow Farm 521

18.6.3 IoT Aquaculture 522

18.7 Conclusion 522

References 523

19 The Internet of Flying Things 529

Daniel Fernando Pigatto, Mariana Rodrigues, João Vitor de CarvalhoFontes, Alex Sandro Roschildt Pinto, James Smith,

and Kalinka Regina Lucas Jaquie Castelo Branco

19.1 Introduction 529

19.2 Flying Things 530

19.2.1 Unmanned Aircraft Systems 530

19.2.2 Flying Ad Hoc Networks 530

19.2.3 Flying Things: Unmanned Aerial Vehicles and More 533

19.3 The Internet of Flying Things 533

19.3.1 Fog and Cloud Computing 534

19.3.2 Characteristics of the Internet of Flying Things 536

19.3.3 General Modern Applications of the Internet of Flying Things 53719.3.3.1 Applications in Emergency Situations 537

19.3.3.2 Applications in Smart Cities 538

19.3.3.3 Applications in smart farms 539

19.3.3.4 Government Official Missions 539

19.3.4 Novel Applications of the Internet of Flying Things 540

19.5.2 Case Study 2: Internet Access and IoT Services Provision in Remote

and Peripheral Areas with IoFT as Fog Enabler 552

Trang 19

Table of Contents19.5.2.1 The Problem 552

Part V Relevant Sample Applications 563

20 An Internet of Things Approach to “Read” the Emotion of Children

with Autism Spectrum Disorder 565

Tiffany Y Tang and Pinata Winoto

20.1 Introduction 565

20.2.1 Current Approaches of Technology-Based Intervention on Autism

Spectrum Disorder in China 567

20.2.2 The Challenges of Technology-Based Intervention on Autism

Spectrum Disorder in China 567

20.3 Related Work 568

20.3.1 Emotion Recognition in Autism Spectrum Disorder 568

20.3.2 Emotion Expressiveness of Individuals with Autism Spectrum

Disorder 568

20.3.3 Emotion Recognition by Neuro-Typical Individuals 569

20.3.4 Affective Computing, Multisensory Data Collection in Naturalistic

Settings, and Ubiquitous Affective Objects 569

20.3.4.1 Naturalistic Settings and Ubiquitous Affective Objects 569

20.3.4.2 Sensing the Emotion from Behavioral Data Analysis 570

20.3.5 The Internet of Things in Monitoring and Tracking Individuals for

ASD Intervention 571

20.4 The Internet of Things Environment for Emotion

Recognition 571

20.4.1 System Background and Architecture 572

20.4.2 The Naturalistic Play Environment 573

20.4.3 Sensors and Sensor Fusion 574

20.4.3.1 Hardware Design on Emotion and Actuation 574

20.4.3.2 Pressure Sensors: Two Exemplary Play Scenarios 577

20.4.3.3 Data Management and Visualization for Indoor Temperature and

Humidity Detection 579

20.5 The Study and Discussions 580

Trang 20

xviii Table of Contents

20.5.1 Emotion Recognition through Microsoft Kinect 580

20.5.1.1 The Emotional Facial Action Coding System (EMFACS) and Kinect

HD Face API 580

20.5.1.2 Emotion Recognition: Preliminary Testing Results 582

20.5.2 Emotion Visualization and Broadcasting through Affective

21.4.1.2 Lab-Scale Ramp Setup 598

21.4.1.3 Selection of Components for IoT Framework 599

21.4.2 Data Logging and Alerts 602

Trang 21

Preface

Information and communication technology (ICT) has always been dynamicand evolutionary in nature, leading to the continuous emergence of newtechnologies and business models The recent advances in terms of availablecomputing resources, software systems and communication networks, and thecontinuing miniaturization of hardware components have made it possible tointegrate ICT into virtually anything, thus leading to the rise of a new computingparadigm known as the Internet of Things (IoT) The IoT aims at realizing an olddream of turning everyday objects into smart ones that are interconnected viathe Internet and able to collect and exchange data and to make decisionsautonomously This additional “smartness” covers both the communicationinfrastructure and applications, including monitoring systems, industrial auto­mation, and ultimately smart cities In a recent report, Gartner estimates thatthere will be 11.2 billion connected devices in use in 2018 and 20.1 billion in

2020.1This clearly demonstrates the great potential and importance of thismodel and is also the motivation behind this book

The potential of IoT is great and the possible applications of this model arecountless Therefore, uncovering the ins and outs of the IoT is crucial to bothtechnologyandbusinesscommunities.Thisbookseekstoprovideaholisticcoverage

of the IoT model by presenting its principles, enabling technologies, and some of itsnumerous application domains Important aspects such as the need for standard­ization, as well as security issues are also highlighted The book also presents twosampleapplicationsshowcasinghowthediscussedconceptsandtechnologiescanbeleveraged and put to practical use to solve some real-world problems

The book is a cohesive material that is composed of 21 chapters authored byseveral internationally renowned researchers and industry experts Each chapterfocuses on a specific subject and also provides the reader with the necessarybackground information, thus improving understandability and encouragingthe reader to think further

1 https://www.gartner.com/newsroom/id/3598917

Trang 22

xx Preface

The book may be used as a textbook for both undergraduate and graduatestudents It also comes in handy as a reference for researchers and IT profes­sionals who are interested in IoT concepts, technologies, and possible applica­tions I hope the readers will enjoy reading this book as much as I enjoyedreviewing and editing the submissions

Organization of the Book

The book is organized in a way that helps the reader tofirst grasp the conceptsand then learn about key enabling technologies before moving to some potentialapplications Although I would advise to read the entire book, most chapters areself-contained allowing the reader to focus on the topics they are interested in.Cross references between chapters are provided to help the reader to navigatebetween them

This book is divided intofive parts, each of which is devoted to a distinctivearea

Part I: Concepts and Perspectives

This part is composed of two chapters that cover the core concepts underlyingthe IoT, as well as its evolution and impacts

Chapter 1 provides an introductory overview of the IoT, including its coreconceptual ideas The chapter also covers closely related concepts and para­digms, as well as a list of initiatives and organizations that contribute to theirfurther development In addition, the chapter structures the broad range oftechnical as well nontechnical aspects by presenting a four-layer framework thataddresses the IoT’s enabling technologies, derived qualities of modern ICT andhow they are supporting the IoT, potential for new innovations based on the IoTecosystem, andfinally IoT implications and challenges

Chapter 2 explores some very important aspects that are usually ignored orforgotten when talking about IoT Specifically, the chapter addresses issues likethe heterogeneity of objects utilized as well as the diversity of environmentswithin which IoT systems run, how time is critical to IoT systems in terms ofdevelopment and support, people involved in the IoT ecosystem, and newsecurity challenges the IoT poses It also looks at big data, and both the technicaland the moral challenges that result from the adoption of such intelligent objects

Part II: Enablers

This part comprisesfive chapters about various IoT enabling technologies thatrange from hardware items and communication technologies to data processingand storage to the emerging standards

Trang 23

PrefaceChapter 3 gives a general overview of various enabling technologies of the IoT.The discussion of these technologies is based on their application and func­tionality in the IoT five-layer model This includes hardware components,network technologies, middleware technologies, application services, and busi­ness-related technologies Moreover, the chapter provides a brief overview ofsome of the key platforms and operating systems that are widely used in IoTenvironments

Chapter 4 provides an introduction to cloud computing and fog computing,two of the key back-end technologies in IoT systems The chapter highlightsthe importance of these two models and shows how they complement eachother and work together The chapter presents their advantages and dis­advantages, as well as some examples of IoT applications where they can beused

Chapter 5 introduces RFID, one of the core technologies in IoT systems, anddescribes the important role it plays The chapter gives a brief history of RFIDshowing how it is linked with the emergence of the IoT and highlights some of itspossible applications and implementation challenges

Chapter 6 provides a tutorial that explains the design and development of IoTprototypes using Arduino and Raspberry Pi platforms The chapter offers a guidethat covers both the hardware and software aspects of these platforms forbeginners who wish to learn about developing IoT applications Detailedexamples are provided to demonstrate how to implement IoT projects usingthese two platforms

Chapter 7 looks at the development over the past 20 years of the standardiza­tion efforts for the IoT and four of its applications (and their respectivepredecessor technologies, if any) and at the links between them The chapterspeculates about the future of standardization in those domains based on whathas been accomplished so far

Part III: Security Issues and Solutions

This part provides three chapters about various security issues, technologies, andconsiderations in IoT environments

Chapter 8 explores the main security protocols and technologies currentlyused in a typical IoT communication stack This technically oriented chapteralso discusses security issues in IoT environments and presents solutionsenabled by research and standardization efforts to address them

Chapter 9 introduces blockchain technology and how it can be leveraged tosecure IoT systems and protect their data The chapter provides some exampleswhere blockchain-based solutions were proposed to secure IoT and gives an ideaabout integration challenges and current research efforts in this area

Chapter 10 highlights the importance of IT auditing for organizations adopt­ing the IoT The chapter discusses the risks associated with the IoT and how

Trang 24

xxii Preface

routine and thorough IT auditing can prevent them Risk identification andassessment, as well as audit considerations and policies are presented

Part IV: Domains

This part is composed of nine chapters presenting various application domainswhere IoT technologies can be utilized These chapters present the concepts,underlying technologies, implementation details, and advantages and challenges

of such integration

Chapter 11 represents a foundational chapter for this part as it gives anintroduction to the use of IoT in several domains with focus on the IndustrialInternet of Things (IIoT) showing how IoT can be leveraged in industrialfields ofapplication Two of the main initiatives in the IIoT are highlighted, namely, theIndustrial Internet Consortium (IIC) and the Plattform Industrie 4.0

Chapter 12 provides an overview of IoT applications for smart cities and how itcan help in improving resource management The technical aspects and generalrequirements of such solutions as well as the challenges the broad adoption ofIoT faces in smart cities are presented

Chapter 13 provides a contemporary overview of the IoT applications in smarthomes, or what is called in the chapter as smart connected homes The chapterpresents the underlying technologies and architectures of smart connectedhomes, as well as the services they offer to householders Both the technicaland social challenges are also highlighted

Chapter 14 addresses the integration of the IoT in the energy domain Thechapter provides a broad discussion of the motivations, approaches, andchallenges of this integration and presents some specific applications includingsmart grid, green IoT, and smart lighting

Chapter 15 continues the discussion made in Chapter 14 by highlightingvarious essential developments that are required for deploying and managingsmart grids and renewable generation sources using IoT The technical require­ments, industry standards, and security concerns are addressed in this chapter.Chapter 16 provides a comprehensive discussion on the integration of the IoT

in patient-focused health applications The chapter first describes the keyelements of IoT-based health care ecosystems, and then explores the differenttypes of applications that utilize this model Challenges and expectations offuture developments are highlighted as well

Chapter 17 discusses how paramedics can use the IoT for emergency support.The chapter starts with an overview of how IoT enables the realization of smartambulance, and then it provides a case study that assesses the adoption of thismodel for diagnosis and prognosis of chronic obstructive pulmonary disease.Challenges for the global deployment of smart ambulance are highlighted.Chapter 18 reviews the various applications the IoT offers for precisionagriculture (PA) The chapter starts with an introduction to PA, and then

Trang 25

Prefaceillustrates how the integration of IoT technologies into its different sections can

be revolutionary in terms of quantity, quality, efficiency, sustainability, and effectiveness

cost-Chapter 19 provides a broad overview of the integration of the IoT intoUnmanned Aerial Vehicles (UAVs; commonly known as drones) The chapterdescribes this new model and presents its underlying technologies as well asseveral applications where it can be utilized The chapter also highlights thechallenges of this model with special focus on the security and safety issues

Part V: Relevant Sample Applications

This part contains two chapters that offer two exemplary applications of IoT.Both chapters are implemented in lab scale using smart objects with the aim oftackling some real-life issues Both technical and social details of these appli­cations are discussed The objective of providing these examples is to present theimplementation details and show the reader how the IoT can actually beimplemented

Chapter 20 demonstrates the use of IoT technologies in the behavioral andpsychological researchfield by capturing the emotions of children with autismspectrum disorder (ASD) using smart objects integrated into their play environ­ment First, ASD is explained and a literature review of related work is provided.Then, the technical details of the presented application are provided

Chapter 21 presents a low-cost IoT framework for detecting and reportinglandslides in landslide-prone areas The chapter discusses the technical details ofthis framework, including the system design, used hardware components, andtest results The proposed framework has only been tested in lab, but it clearlyshows how IoT technologies can be effectively integrated into such criticalscenarios

Cairo, Egypt

Trang 27

Acknowledgments

I would like to express my gratitude to each and every individual whoparticipated in this project In particular, I would like to acknowledge thehard work of authors and their patience during the revisions of their chapters

I also wish to thank Daniel Minoli, Marta Vos, Qiang Yang, Supriya Mitra,and Xiaojun Zhai for their comments that helped improve the quality andorganization of this book

Finally, I am very grateful to the editorial team at Wiley-IEEE Press for theirsupport through the stages of preparation and production Special thanks to myeditor Mary Hatcher for her great support throughout the entire process.Thanks to Vishnu Narayanan for overseeing the editorial phase Also, thanks tothe anonymous reviewers provided by Wiley-IEEE Press whose commentshelped improve the quality of the chapters

Qusay F Hassan

Trang 29

Computer Science Department,

University of Memphis, Memphis,

TN, USA

and

Faculty of Computing and

Information Technology, University

of Jeddah, Jeddah, Saudi Arabia

Kalinka Regina Lucas Jaquie

Castelo Branco

Institute of Mathematics and

Computer Sciences (ICMC),

University of São Paulo (USP),

São Carlos, São Paulo, Brazil

Willie L Brown, Jr.

Department of Engineering and

Aviation Sciences, University of

Maryland Eastern Shore, Princess

Anne, MD, USA

Joseph Bugeja,

Internet of Things and People

Research Center and Department of

Computer Science and Media

Technology, Malmö University,

Malmö, Sweden

Pratik Chaturvedi

Defence Terrain ResearchLaboratory, Defence Research andDevelopment Organization, NewDelhi, India

andApplied Cognitive ScienceLaboratory, Indian Institute ofTechnology Mandi, Kamand, India

Ibibia K Dabipi

Department of Engineering andAviation Sciences, University ofMaryland Eastern Shore, PrincessAnne, MD, USA

Paul Davidsson

Internet of Things and PeopleResearch Center and Department ofComputer Science and MediaTechnology, Malmö University,Malmö, Sweden

João Vitor de Carvalho Fontes

São Carlos School of Engineering(EESC), University of São Paulo(USP), São Carlos, São Paulo, Brazil

Trang 30

xxviii Contributors

Varun Dutt

School of Computing and Electrical

Engineering; School of Humanities

and Social Sciences, Indian Institute

of Technology Mandi, Himachal

Pradesh, India

Jeanette Eriksson

Department of Computer Science

and Media Technology, Internet of

Things and People (IoTaP)

Research Center, Malmö

University, Malmö, Sweden

Akaa Agbaeze Eteng

Department of Electronic and

Computer Engineering, University

of Port Harcourt, Port Harcourt,

Nigeria

Lucas Finco

Principal Consultant, Strategain,

New York, NY, USA

Department of Computer Science,

Western Michigan University,

Kalamazoo MI, USA

Virginia N L Franqueira

Department of Electronics,

Computing & Mathematics,

University of Derby, Derby, UK

Mário Marques Freire

Instituto de Telecomunicações and

Department of Computer Science,

Universidade da Beira Interior,

Covilhã, Portugal

Daniel Happ

Technische Universität Berlin,Telecommunication NetworksGroup (TKN), Berlin, Germany

Pedro Ricardo Morais Inácio

Instituto de Telecomunicações andDepartment of Computer Science,Universidade da Beira Interior,Covilhã, Portugal

Andreas Jacobsson

Internet of Things and PeopleResearch Center and Department ofComputer Science and MediaTechnology, Malmö University,Malmö, Sweden

Kai Jakobs

Computer Science Department,RWTH Aachen University, Aachen,Germany

Venkata Uday Kala

School of Engineering, IndianInstitute of Technology Mandi,Himachal Pradesh, India

Jonny Karlsson

Department of BusinessManagement and Analytics, ArcadaUniversity of Applied Sciences,Helsinki, Finland

Sudhakar Kumar

School of Computing and ElectricalEngineering, Indian Institute ofTechnology Mandi, HimachalPradesh, India

Chee Yen Leow

Wireless Communication Centre,Universiti Teknologi Malaysia,Johor, Malaysia

Trang 31

School of Engineering, Indian

Institute of Technology Mandi,

Himachal Pradesh, India

Manuel Meruje

Instituto de Telecomunicações and

Department of Computer Science,

Universidade da Beira Interior,

Covilhã, Portugal

Daniel Minoli

IoT Division, DVI

Communications, New York, NY,

USA

Benedict Occhiogrosso

Intellectual Property Division, DVI

Communications, New York, NY,

USA

Daniel Fernando Pigatto

Graduate Program in Electrical and

Computer Engineering (CPGEI),

Federal University of Technology

Paraná (UTFPR), Curitiba, Paraná,

Brazil

Alex Sandro Roschildt Pinto

Federal University of Santa Catarina

(UFSC), Blumenau, Santa Catarina,

Brazil

Göran Pulkkis

Department of Business

Management and Analytics, Arcada

University of Applied Sciences,

Helsinki, Finland

Sharul Kamal Abdul Rahim

Wireless Communication Centre,Universiti Teknologi Malaysia,Johor, Malaysia

Hejamadi Raghav Rao

Department of Information Systemsand Cyber Security, University ofTexas San Antonio, San Antonio,

Musa Gwani Samaila

Instituto de Telecomunicações andDepartment of Computer Science,Universidade da Beira Interior,Covilhã, Portugal

andCentre for Geodesy andGeodynamics, National SpaceResearch and Development Agency,Toro, Bauchi State, Nigeria

Trang 32

xxx Contributors

Detlef Schoder

Department of Information Systems

and Information Management,

University of Cologne, Köln,

Germany

Sajjan Shiva

Computer Science Department,

The University of Memphis,

Memphis, TN, USA

John Shu

Department of Information Systems

and Cyber Security, University of

Texas San Antonio, San Antonio,

TX, USA

Jan Sliwa

Department of Engineering and

Information Technology, Bern

University of Applied Sciences,

Bern, Switzerland

James Smith

Computer Science and Creative

Technologies (FET), University of

the West of England (UWE),

Bristol, England, United Kingdom

Tiffany Y Tang

Wenzhou-Kean Autism Research

Network, Assistive Technology

Research and Development Center,

Department of Computer Science,

Wenzhou-Kean University,

Zhejiang Province, China

Kamal Kishore Thakur

Computer Science and Engineering

Department, Thapar Institute of

Engineering and Technology,

Magnus Westerlund

Department of BusinessManagement and Analytics, ArcadaUniversity of Applied Sciences,Helsinki, Finland

Alexander Willner

Fraunhofer FOKUS, Software-basedNetworks (NGNI), Berlin, Germanyand

Technische Universität Berlin, NextGeneration Networks (AV), Berlin,Germany

Pinata Winoto

Wenzhou-Kean Autism ResearchNetwork, Assistive TechnologyResearch and Development Center,Department of Computer Science,Wenzhou-Kean University,Zhejiang Province, China

Srishti Yadav

School of Computing and ElectricalEngineering, Indian Institute ofTechnology Mandi, HimachalPradesh, India

Lei Zhang

Department of Engineering andAviation Sciences, University ofMaryland Eastern Shore, PrincessAnne, MD, USA

Trang 33

Part I

Concepts and Perspectives

Trang 35

“When wireless is perfectly applied, the whole Earth will be converted into

a huge brain, which in fact it is, all things being particles of a real andrhythmic whole [ ] and the instruments through which we shall beable to do this will be amazingly simple compared with our presenttelephone A man will be able to carry one in his vest pocket.”

Kevin Ashton was thefirst to use the term Internet of Things (IoT) in 1999(Ashton, 2009) in the context of supply chain management with radio frequencyidentification (RFID)-tagged or barcoded items (things) offering greater effi­ciency and accountability to businesses As Ashton wrote in the RFID Journal (June 22, 2009):

“If we had computers that knew everything there was to know aboutthings– using data they gathered without any help from us – we would beable to track and count everything, and greatly reduce waste, loss and cost

We would know when things needed replacing, repairing or recalling, andwhether they were fresh or past their best.”

In the same year, Gershenfeld (1999) published his work“When Things Start

to Think,” in which he envisioned the evolution of the World Wide Web as being

a state in which“things start to use the Net so that people don’t need to.” ATMscould be considered as one of thefirst smart objects, which went online as early

Internet of Things A to Z: Technologies and Applications, First Edition Edited by Qusay F Hassan.

 2018 by The Institute of Electrical and Electronics Engineers, Inc Published 2018 by John Wiley & Sons, Inc.

Trang 36

4 1 Introduction to the Internet of Things

as 1974 In addition, early examples of various prototype devices include vendingmachines in the 1980s performed by the Computer Science Department ofCarnegie Mellon University Since then, understanding of the possible breadth

of IoT has become much more inclusive, comprising a wide range of applicationdomains, including health care, utilities, transportation, and so on, as well aspersonal, home, and mobile application scenarios (Gubbi et al., 2013; Sund­maeker et al., 2010) More recently, the“Industrial Internet of Things” (IIoT) hasfurther expanded the scope of IoT (see Section 1.2.2 and Chapter 11) With IoT,

a world of networked,“intelligent,” or “smart” objects (Ashton, 2009; Weiser,1991; Weiser and Brown, 1996; Lyytinen and Yoo, 2002; Aggarwal et al., 2013;Gubbi et al., 2013; Mattern and Flörkemeier, 2010; Atzori et al., 2014; Chui et al.,2010) is envisioned Recently, novel extensions of IoT have emerged, whichinclude not only physical objects but also virtual objects1(which may blur thecore concept of IoT that predominately focuses on physical things and objects).The common denominator of these varied conceptions of IoT is that“things” areexpected to become active elements in business, information, and socialprocesses

If one recognizes the broad spectrum of application scenarios, the moregeneral term “Net” would be more adequate than “Internet,” since not allcommunication occurs via the Internet Communication also does not exclu­sively occur between things/devices, but also between things and people So, itwould be more appropriate to use the terms the“Internet of Everything”2

or“Net

of Everything” instead of “Internet of Things.”

As the most well-known visionary of the computerized and interlinkedphysical world, Mark Weiser asserts that a connected world of things is designed

to help people with their activities in an unobtrusive manner Interaction occurswith everyday—but computationally augmented—artifacts through naturalinteractions, our senses, and the spoken word (Weiser, 1991) In the course

of miniaturization, the increasingly smaller technical components will beembedded into physical components, with as little intrusiveness for users aspossible or without attracting attention at all For example, miniaturizedcomputers (or components thereof) and wearables with sensors are directly

1 Increasing numbers of physical objects/things are beginning to be seen in digital format or even only in digital format Examples of this include books, maps, e-tickets of any sort, business cards, electronic purses, and so on Consequently, not all “virtual objects” that are currently used are digital models of physical objects (pendants), but rather these objects “stand on their own” with no physical counterpart Virtual objects can be de fined as a digital element with a specific purpose, comprised of data and capable of performing actions (Espada et al., 2011).

2 The term “Internet of Everything” was coined by Cisco Systems and basically refers to applying the IoT model to everything, thus creating new capacities and smart processes in virtually every field Cisco calls it the connection of “people, process, data and things.” The Internet of

Everything may be perceived as a variation or extension of IoT, subtly distinguishing itself by emphasizing the connection of people to things.

Trang 37

1.1 Introductionincorporated into pieces of clothing In his essay in 1991,“The Computer for the21st Century,” Mark Weiser first expressed this vision while he was a ChiefTechnologist at the Xerox Palo Alto Research Center in the late 1980s (Weiser,

1991, 1993; Weiser and Brown, 1996; Weiser et al., 1999) Since then, this workranks among the most cited academic papers in related academic disciplines thatenvision a connected world of everyday things This vision and the relateddevelopments are referred to by Weiser as“Ubiquitous Computing” (also known

as“Ubicomp”) Since its conceptual inception more than 25 years ago, manymore related and modified concepts have emerged, including pervasive,nomadic, calm, invisible, universal, and sentinel computing, as well as ambientintelligence.3The Cluster of European Research Projects on the Internet ofThings (CERP-IoT) blend together building blocks that derive from the afore­mentioned concepts and emphasize the symbiotic interaction of the real andphysical with the digital and virtual world From their perspective, physicalobjects have virtual counterparts representing them, which translate them intocomputable parts of the physical world The CERP-IoT vision has recentlybecome even more comprehensive by incorporating issues of Social Media,anticipating massive user interaction with things and linking to additionalinformation regarding identity, status, location, or any other business, social,

or privately relevant information (Chapter 1 of Uckelmann et al., 2011).Essentially, ITU (2005) defines IoT as a concept that allows people and things

to be connected anytime, anyplace, with anything and anyone (and adding—according to CERP-IoT, 2009—ideally using any path/network and any service).Another line popularized by CISCO asserts a simple concept: The IoT is bornwhen more things are connected via the Internet as human beings As such, theadvent of IoT may be dated around 2008/2009 (Evans, 2011) or 2011 (Gubbi

et al., 2013) According to the lnternational Data Corporation (IDC)’s World­wide Internet of Things Forecast, 2015–2020, 30 billion connected (autono­mous) things are predicted to be part of the IoT by 2020 Another estimateanticipates approximately 1000 devices per person by 2025 (Sangiovanni-Vincentelli, 2014)

IoT is at the center of overlapping Internet-oriented (middleware), oriented (sensors), and semantic-oriented (knowledge) visions (Atzori et al.,2010) Specifically, (i) Internet-oriented, which emphasizes the networkingparadigm and exploiting the established IP-based networking infrastructure,

things-in order to achieve an efficient connection between devices, and on developthings-inglightweight protocols in order to meet IoT specifics (see Section 1.5.2);(ii) things-oriented, which focuses on physical objects and onfinding meansthat are able to identify and integrate them with the virtual (cyber) world; and

3 For a discussion on similarities and differences, see, for example, Aarts et al (2001); for a

summary of more than 20 years of the “Ubicomp” vision, see, for example, Cáceres and Friday (2012).

Trang 38

6 1 Introduction to the Internet of Things

(iii) semantic-oriented, which aims to utilize semantic technologies, makingsense of objects and their data to represent, store, interconnect, and manage theenormous amount of information provided by the increasing number of IoTobjects (Atzori et al., 2010; Borgia, 2014)

As IoT continues to evolve, its comprehensive definition is also likely todevelop.4Accordingly, the IEEE IoT initiative gives its community members anopportunity to contribute to the definition of the IoT (IEEE, 2015, 2017) Thedocument presents two definitions, one for small-scale scenarios: “An IoT is anetwork that connects uniquely identifiable ‘Things’ to the Internet The

‘Things’ have sensing/actuation and potential programmability capabilities.Through the exploitation of unique identification and sensing, informationabout the‘Thing’ can be collected and the state of the ‘Thing’ can be changedfrom anywhere, anytime, by anything.” The second definition is for large-scalescenarios: “Internet of Things envisions a self-configuring, adaptive, complexnetwork that interconnects‘Things’ to the Internet through the utilization ofstandard communication protocols The interconnected things have physical orvirtual representation in the digital world, sensing/actuation capability, aprogrammability feature and are uniquely identifiable The representationcontains information including the thing’s identity, status, location or any otherbusiness, social or privately relevant information The things offer services, with

or without human intervention, through the exploitation of unique identifica­tion, data capture and communication, and actuation capability The service isexploited through the use of intelligent interfaces and is made available any­where, anytime, and for anything taking security into consideration.”

Incorporating various perspectives while revealing its nucleus, we mayconsolidate and define:

IoT is a world of interconnected things which are capable of sensing,actuating and communicating among themselves and with the environ­ment (i.e., smart things or smart objects) while providing the ability toshare information and act in parts autonomously to real/physical worldevents and by triggering processes and creating services with or withoutdirect human intervention

We intentionally leave out whether this“big plot” will necessarily be realized

on standard communication protocols or a unified framework Although aunified framework would certainly be optimal, it may not be necessary or evenachievable given the dimensionalities and complexities of a likely very highlyheterogeneous computerized world of interconnected things

In order to better structure the scale and scope of IoT, this chapter provides anintroductory overview and briefly outlines the conceptual core ideas as laid out

4 A broad range of IoT de finitions can be found in Minoli (2013).

Trang 39

1.2 Internet of Things Conceptsprior to IoT with “Ubiquitous Computing.” The chapter covers not onlytechnical but also nontechnical issues of IoT

1.2 Internet of Things Concepts

With technical advancements, our interaction with information systems ischanging, both at work and during leisure time Information, sensor, and networktechnology are becoming increasingly small, more powerful, and more frequentlyused People no longer only encounter information technology at commonpoints in their lives, such as in offices or at desks, but as information andcommunication infrastructures, which are present in increasing areas of everydaylife These infrastructures are characterized by the fact that they not only includeclassic devices, for example, PCs and mobile phones, but that information andcommunication technology is also embedded in objects and environments.The Ubiquitous Computing vision of Mark Weiser implies that computers, as wecurrently know them,“disappear,” or, more precisely, move into the background.Everyday objects and our immediate environment then assume the tasks andabilities of computers (Weiser and Brown, 1996) In his seminal paper, Weiserdescribes this as follows:“The most profound technologies are those that disappear.They weave themselves into the fabric of everyday life until they areindistinguishable from it” (Weiser, 1991) Through the physical embedding of

IT, everyday objects and our everyday environment become“smart,” that is, capable

of processing and providing information, but not necessarily intelligent in the sense

of human cognitive intelligence In another highly regarded article, Weiser togetherwith Brown introduced the notion of“Calm Computing.” They also refer to aconnected world full of computers However, only in cases of service provision orwhen a need exists for interaction do those computers or their respective servicesbecome“visible”; at other times, those capabilities are “calm” in the background, andnot intrusive or even visible to the users (Weiser and Brown, 1996)

The core concepts comprising IoT, as well as related concepts and models, will

be presented in the following sections

1.2.1 Core Concepts: Smart Objects and Smart Environments

A smart object is a physical object in which a processor, data storage system,sensor system, and network technology are embedded (Poslad, 2009; Kortuem

et al., 2010; Sánchez López et al., 2011) Some smart objects can also affect theirenvironment by means of actuators In principle, all physical objects can beturned into smart objects, for example, conventional everyday objects such aspens,5wristwatches (there are numerous wristwatch models with sensors and

5 A well-known example of a computerized version of a pen is the Anoto Pen, see www.anoto com

Trang 40

8 1 Introduction to the Internet of Things

processors, for example, to measure the heart rate or to determine geographicposition), or automobiles (more recently, autonomous automobiles) In anindustrial context, it could be a machine or the product to be manipulated.Smart objects may also be anywhere In fact, there are almost no restrictionsregarding domains: consumer electronic devices, home appliances, medicaldevices, cameras, and all sorts of sensors and data-generating devices Mostsmart objects have a user interface and interaction capabilities to communicatewith the environment or other devices (e.g., displays) The capability of smartobjects to communicate with other objects and with their environment is a corecomponent of IoT In line with this is the idea that specific information can beretrieved via any networked smart object, which is uniquely identified andlocalized, and may have its“own home page,” that is, unique address Today, onecan take advantage of a broad range of fairly inexpensive, tiny, and relativelypowerful components, including sensors, actuators, and single board computers(SBC), to enrich physical things and connect them to the Internet SBCs, such asRaspberry Pi, BeagleBone Black, and Intel Edison Open, as well as open-sourceelectronics, such as Arduino, which entered the market between 2005 and 2008,catalyzed millions of new ideas and projects Creating and collecting data aboutthe status of physical objects may establish the basis for interesting home andoffice automation projects, education, and leisure activities with real-timevisualizations of information generated from data“on the go” (Baras and Brito,2017) Moreover, one can utilize the remote networks of intelligent devicesdeployed somewhere else

Tightly coupled to“smart objects” is the concept of “smart environments.”One definition emphasizes the physical extent to which smart objects aredeployed and interacting A compilation of smart objects within a given space,such as a closed space (automobile, house, room) or an outside area, for example,

a district or an entire city (i.e., a smart city; see Chapter 12), turns a commonenvironment into a smart one Another definition asserts that sensors are the keyfactor in a smart environment Essential for a smart environment is the contextinformation gathered by sensors in order to provide adapted applications andservices Weiser et al (1999) defined a smart environment as “the physical worldthat is richly and invisibly interwoven with sensors, actuators, displays, andcomputational elements, embedded seamlessly in the everyday objects of ourlives, and connected through a continuous network.”

1.2.2 Related Concepts: Machine-to-Machine Communications, Industrial Internet of Things, and Industry 4.0

IoT is not a construct that has appeared suddenly or without precursors.Technological forerunners and various conceptualizations exist prior to therelatively new“IoT” label, for example, machine-to-machine (M2M) commu­nications In addition, recent derivatives exist, for example, the Industrial

Ngày đăng: 14/10/2022, 22:50

TỪ KHÓA LIÊN QUAN

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN

🧩 Sản phẩm bạn có thể quan tâm