INTRODUCTION 1.1 Introduction of IoT Internet of Things The Internet of Things loT is the network of physical objects-devices, instruments, vehicles, buildings, and other items embedde
Trang 1Hanoi University of Science and Technology
MASTER THESIS
STUDY OF WIRELESS COMMUNICATION
TECHNOLOGY FOR INTERNET OF THINGS
APPLICATIONS
SARA NIIACUONGUE LAICE
Major: Teleconmunication Engincoring
Supervisor: Dr Phung Thi Kieu Ha
Tnslitute: School af Electronics and Telecommunicatians, Hanoi University of Science aud Technology
HANOL, December 2020
Trang 2CERTIFICATION OE THESIS CORRECTION
Full name of author of thesis: Sara Da Purificagdio Nhacuongue Laice
Thesis topics: STUDY OF WIRELESS COMMUNICATION TECIINOLOGY FOR
INTERNET OF THINGS APPLICATIONS
Major: Telecomuunication Engincoring
Student ID mumber: CA190273
The author, the scientific instructor and the chairman of the jury corlify thal Lhe author made corrections and additions lo the thesis according to the commons and requests af
the Jury dated cesses contin siti eee eo Wilh (he following conlenls:
Trang 3
KNOWLEDGEMENT
To God, who always lit up my walk
‘Yo my Supervisor Dr Phung Kieu Ha, for the encouragement and guidance given during the training
To all the professors of School of Electronics and Telecommunications for their knowledge sharing, availability, and attention throughout the training process
‘Yo all my family and friends for their support and collaboration
Trang 4SUMMARY
The concept of IoT was first proposed by Kevin Ashton in 1999, he referred to IoT as connected objects uniquely identifiable with radio frequency identification (RFID) technology Jol is generally defined as a “dynamic global network infrastructure with self-configuring, capabilities based on communication standards and protocols” Physical
and virtual things in an loT have their own identities and attributes which can use
intelligent interfaces and be integrated as an information network In a simplified way,
ToT can be treated as a set of conmected devices that are uniquely identifiable The ToT
system requires that "things" on the network are connected to cach other, because things
can move and need to interact with others in real-time It is also possible to develop
several applications based on it, of which only a few applications are currently deployed Examples of the Internet of ‘Things range from smartly comnected homes to wearables
and health services oT is gradually becoming a parl of every aspect of our Hives Soon,
there will be smarter apps for smarter homes and offices, smarter transportation systems, smarter hospitals, smarter businesses, and factories Intemet of ‘'hings applications not
only increase our comfort but also give us more control ta simplify work routines and
personal tasks ‘Iherefore, for this to happen, it is necessary to establish communication
between IoT devices and the Internet, and this is done using IoT communication
technologies and protocols depending on the application, factors such as reach, dala
requirements, security and energy demands, and duration of the battery which will dictate
the choice of technologies/protocols or some form of a combination of technologies
The objective of this dissertation is to study the JoT, its essential components, and the
technologies and protocols to realize several JoT systems/applications Later, the work focuses on the study of Smart Llome, a perspective specific to 1ol'-based systems, and the design and produstion of 3 prototype of a controlled lighting device connected to the
Intemet, a proof of concept of a Smart lighting control system
Trang 5The smart home is a term that refers to modern homes that have appliances, lighting, and/or electronic devices thal oan be controlled remolely by the owner, usually Ihrough a mobile app Smart home-enabled devices can also operate in conjunction with other
devices in the house and communicate information lo ofher smart devices AL Smart
Home, all devices are controlled by a home automation master controller, called a smart
home hub It combines all the different apps into a single smart home app that can be
conlzolled remolely by owners
Some smart home systems can be created from scratch, for example, using a Raspberry Pi
or other prototyping board ‘fo demonstrate an understanding of the topics covered in the dissertation we will develop and design a proof-of-concept prototype for remote moniloring and control of home appliances We also discussed the performance of the
system by doing some tests on our implemented circuit
This toxt will consist of the following contents: Chapter I discusses the introduction of lợT and Chapter 1 describes the technologies, protocols, architecture, and challenges of ToT Chapier TIT presents the description of Smart Homes in detail and mentions the future of Smart Homes In chapter 1V, we will show the design and construction of a prototype to demonstrate the monitoring and remote control of home appliances We also discussed the performance of the system by carrying out some tests on our implemented circuit and, finally, the last section presents the conclusions of our work
Trang 6Table of Contents
1.1 Introduction of foT (IuLernel of Things)
1.2 Concept and History of lat
24 — Basic Components ofloT Sywem
24 Application Protocols im JoT
24.1 Application T.ayer Protocols
Trang 8Table of Figures
Fipwe | Internet of Things (14]
Figure 3 How loT Works - infernal Working of the inlemnel of Things [4] 9
Figure 6 Architectural Layers of f
Figure 1 Future of Smart Home |22| - - - - oe 33
Figure 13, Arduino description [17]
kigue lé, Wi-ti module [10]
Figure 17 Ardtino IDE (software) with system code - - - “
Figue 19 Smart home application's GUI [23]
Figure 22, ‘Test resull of our irnplemenlcd Noức
Trang 9CHAPTERI1 INTRODUCTION
1.1 Introduction of IoT (Internet of Things)
The Internet of Things (loT) is the network of physical objects-devices, instruments,
vehicles, buildings, and other items embedded with electronics, circuits, software,
sensors, and network connectivity that enables these objects to collect and exchange data
The Internet of Things allows objects to be sensed and controlled remotely across
existing network infrastructure, creating opportunities for more direct integration of the
physical world into computer-based systems, and resulting in improved efficiency and
inventing the term "the Internet of Things" to describe a system where the Internet is
connected to the physical world via ubiquitous sensors
EY,
INTERNET
THINGS
IoT can interact without human intervention Some preliminary IoT applications have
been already developed in the healthcare, transportation, and automotive industries IoT
Trang 10technologies are at their infant stages; however, many new developments have occurred
in the integration of objects with sensors on the Tnlemel The development of ToT involves many issues such a8 infrastructure, communications, interfaces, protocols, and
network infrastructure with self-configuring capabilities based on standards and
communication protocols”
Physical and virtual things in an IoT have their own identities and attributes and are
capable of using intelligent interfaces and being integrated as an information network In
easy terms, ToT can be treated as a sel of cormected devi
es thal are ustiquely identiliable
‘The words “Internet” and ““lhings” mean an inter-connected world-wide network based
on sensors, commuunivation, networking, and information processity: lechnologivs, which
might be the new version of information and communications technology (ICL) fo date,
a number of technologies are involved in IoT, such as wireless sensor networks (WSNs),
barcodes, intelligent sensing, RFID, NFCs, low energy wireless communications, cloud
computing, and so on ‘The lot desoribes the next generation of the Intemet, where the physical things could be accessed and identified through the Internet Depending on
various technologies for the implementation, the defimtion of the ToT varices However,
the fundamental of IoT implies that objects in an oT can be identified uniquely in the
virtual representations Within an ToT, all things can exchange data and if needed, process
data according to predefined schemes
tà
Trang 111.2.2 Listory
The Interne! of Things (ToT) is a term coined by Kevin Ashton, the Excoutive Director of Auto-ID Labs at MIT in 1999, who perceived a system of ubiquitous sensors conceming
the physical world lo the Tatemet
Right from the beginmng of the Internet of Things evolution started, there were iany
things or objects connected to the internet for different applications through diverse technologies depending on the type of object for the comfortability of humans
The first Internet appliance was a Coke machine at Carnegie Melon University in the early 1980s Programmers working several floors above the vending machine wrote a server program that chased how long it had been since a storage column in the machine had been unfilled The programmers could connect to the machine over the Internet, check the statis of the machine and determine whether or nol there would be a cold drink waiting for them, should they decide to make the trip down to the machine
intemet of ‘Ihings is a technological revolution that represents the future of computing
and communications, and its development dspends on dynamic technical innovation in
several important fields, from wireless sensors to nanotechnology
The Internet of ‘things (lo) is the network of physical objects, devices, vehicles,
buikdings, and other items that are embedded with electronics, software, sensors, and
nelwork connectivity, which enables these objects to collec and exchange dala The
intemet of ‘hings allows objects to be sensed and controlled remotely across existing
network infrastructure, creating opportunities for more direct integration between the
physical world and computer-based systems, and resulling in improved officiency, accuracy, and economic benefit, when lo'l is augmented with sensors and actuators, the
technology becomes an instance of the more general class of cyber-physical systems,
which also encompasses toclnologics such as smart grids, smart homes, intelligent
transportation, and smart cities Each thing is uniquely identifiable through its embedded
computing system but car interoperate wilhin the existing Inlemet infrastructure Experts
estimate that the Lol’ will consist of almost 50 billion objects by 2020
3
Trang 121.3 Applications of IoT
The potentialities offered by the IoT make it possible to develop numerous applications
based on it, of which only a few applications are currently deployed Intemet of Things
examples extends from smart connected homes to wearables to healthcare IoT is slowly
becoming part of every aspect of our lives In the future, there will be intelligent
applications for smarter homes and offices, smarter transportation systems, smarter
hospitals, smarter enterprises, and factories Not only is the Internet of Things applications enhancing our comfort, but they also give us more control to simplify routine
work life and personal tasks
Aegure 2, Applications of &
Healthcare
The IoT is proposed to improve the quality of human life by automating some of the
basic tasks that humans must perform In that sense, monitoring and decision-making can
be moved from the human side to the machine side One of the main applications of IoT
in healthcare is in assisted living scenarios Sensors can be placed on health monitoring
equipment used by patients The information collected by these sensors is made available
on the Intemet to doctors, family members, and other interested parties to improve
treatment and responsiveness Additionally, IoT devices can be used to monitor a patient’s
Trang 13current medicines and evaluate the risk of new medications in terms of allergic reactions
and adverse interaclions
Smart environments domain
Smart water supply
Smart citics must monitor water supply to ensure that there is adequate access for residents and business needs Wireless Sensor Networks provide the technology for cities
to monitor their water piping systems more accurately and discover their greatest water
loss risks Cities that are addressing the water leakage problem with sensor technology are producing high savings from their investment Tokyo, for example, has calculated
they save $170 million each year by delecting water leakage problems early (LIBELIUM,
2013) The system can report pipe flow measurement data regularly, as well as sond
automatic alerts if water use is outside of an estimated normal range This allows a smart
etly Lo determine the location of leaking ptpes and prioritizes repairs based on the amount
of water loss that could be prevented
Smart homes and offices
Various electronic gadgets around us such as microwave ovens, refrigerators, heaters, air conditioners, fans, and lights surround us Actuators and sensors can be installed in these
devi
sto ulilize the onergy sulficiently and also to add more comfort lo Bí The
sensors can measure the outside temperature and even can determine the oocupants inside
the rooms and thereby control the amount of healing, cooling, and Mow of light, etc
Doing all these can help us to minimize the cost and increase energy saving
Improved yyms
Involving new technologies like a separate exercise profile, which can be installed on machines, can enhance the gymnasium experience and each person can be identified from his identification id alone, and thereby, the concerned profile will get activated
Food sustuinubitity
Trang 14Food that we eat has to go through various stages before they arrive in the refrigerators They are bound in a strict [ood eycke production, harvesting, transportalion, and distribution With the use of appropriate sensors, we can prevent the food from climatic
damages by keepmg a good eye on the lemperalure, hurmdity, hghl, heal, etc Sensors
can measure these variations precisely and notify the concemed person Monitoring, helps
in the prevention of possible plants
‘Transportation and logistics domain
Smart parking
The new Smart Parking sensor’s to be buried in parking spaces ta detect the arrival and
departure of vehicles Smart parking provides extensive parking management solutions
that help motorists save time and fuel (LIBELIUM, 2013) A significant contribution to
congestion arises from motorists searching for accessible parking spaces Providing
accurate information about parking spaces belps traffic [Tow better, and this will also
allow the deployment of the application to book parking spaces directly from the vehicle This will help to reduce CO2 emissions and to minimize traffic jams
3D assisted driving
Vehicles like cars, buses and trains along with the roads and rails equipped with sensors
may provide valuable information lo the driver to provide belict navigalion and safely
With the use of assisted driving, we will be able to find the right track with prior
information about traffic jams and incidents Tn an Enlerprise conlexl, information about
the vehicle transporting goods together with information about the type and status of the
goods can integrate te provide valuable information about the delivery time, delivery
delays, and [aulis
Augmented maps
Tourist augmented maps with tags allow NFC-equipped phones to browse the
information about the places and quickly connect it to the web services providing information about hotels, restaurants, monuments, theaters, and the local attractions.
Trang 15Hovering your mobile phone over the tag within its reading range so that the additional
information aboul the marker ean be displayed on the screen can do this
Logistics
Lnplemonting the Intemet of Things in Relail chain moniloring has many advantages: RIID and NEC can be used to monitor almost every lnk of the supply chain, ranging
from commodity details, raw material purchasing, and production, Wansportalion, and
storage, sale of the product and after-sales services With the help of lol’, we will track the inventory in the warehouse so that stock can be refilled at the appropriate time for
continuous sale and this will reduce the waiting time of customer which result in
customer satisfaction, which further results in increased sales
1.4 Overview of thesis work
The objective of this work is to study IoT, its essentials components, and wireless
communication tcchnologies and prolacols to realize various ToT systons/applications Later on, the work focus on the study of Smart Home, a very prospective of lof based
syslerns, and to dssign and produce a prototype Inlernel-cormecled and controlled
lighting device, a proof of concept of lighting control system Smart Home Starting from the idea of automating a residence with the Intemet of Things based system to
demonstrate its benefits, this work will consist of the following contents: Chapter I
discusses the introduction of Jol’, and Chapter Li describes the technologies, protocols, architectures, and challenges of IoT Chapter III presents the description of Smart Homes
an delail and :ventions the future of Smart Homes tn chapter TV, we will show the design
and building of a prototype to demonstrate remotely controlled home automation We
also discussed the performance of the system by doing some tests on our implemented
circuit and, finally, the lasl section summarizes the conclusions of our work
In this chapter, we introduce the Intemet of Things, with more focus on its meaning,
defirution, hislory, and applications.
Trang 16During the research, it can be understood that there is still no universal definition for IoT
il just depends on how we see it, Fmally, we discuss the applications of ToT, which ean be
in various areas of our lives, with greater emphasis on home, health, transportation,
agriculiure, industry, buildings, cities, etc
Tn the next chapler, we will study ToT technologies and protocols to understand how ToT
works.
Trang 17CHAPTER2 IoT TECHNOLOGIES AND PROTOCOLS
2.1 Basic Components of IoT System
There are four major components for IoT systems and they are sensor nodes, gateways,
internet servers, and the end-users, as shown in figure 5 below
Figure 3 How JoT Works -
il Working of the Internet of Things [4]
Sensors/Devices
Sensors or devices help in collecting very minute data from the surrounding environment
They are sometimes also known as ‘detectors’ as the primary function of sensors is to
detect even the slightest changes in the surrounding environment This allows an IoT
device to capture relevant data for real-time or post-processing
Depending on the type of sensor, this small piece of hardware can measure absolutely
anything This can be smoke, motion, or even blood pressure While advanced sensors
can measure a range of complexities, some IoT devices have multiple sensors bundled to
be able to collect a range of data or perform multiple functions Our smartphones for
example have GPS, fingerprint, camera, tilt, motion, and numerous other sensors, all bundled in one.
Trang 18The choice of sensors also depends on their accuracy reliability of results, the range at which they should work, resolution, and level of intelligence which im other words means
their ability to deal with noise and interference
i, Connectivity
lof is a network involving devices, sensors, cloud, and actuators, and all these need to
inlerconnee!, with ons another to be able to decipher data and consequemtly perform ari
Every oplion we choose has some spot tions and trade-offs between power
constunption, range, and bandwidth $o, choosing the best connectivity option in the lof
system is important
ii ToT gateways
Incoming, raw data from the sensors must pass through gateways to reach the cloud
Gateways translate nctwork protocols ensuring scamless communication of all devices
within the network Essentially this makes the gateways a crucial communication point
and is responsible for easy management of data traffic
Moreover, galeways offer security by protecting the system from unauthorived access and
malicious attacks It can also be considered as a scourity layer a3 the data flowing through
it protected by the latest encryption practices
Gateways can also preprocess data from the sensors before sending it to the cloud In other words, they minimize the large volumes of data ‘sensed’ in the previous stage Not all, but some intelligent lol’ gateways can also analyze and average data to transfer only the relevant data to the cloud
i, Lot cloud
Trang 19The cloud is where “smart stuff” takes place! This high-performance facility majorly ties
the components lo the ToT acos:
lem together Tt handles the data, slores it, and makes decisions to make ar break a deal All of this is performed for colossal amounts of data in just under ntilliseconds — the time is critical for ToT, as especially in critical concerns such as health and safety, latency cannot be compromised,
While the main purpose of IoT solutions is to provide and act on real-time information, there needs to be a component that can handle enormous amounts of data to cater to the tmme-sensitive nature of the ToT model This is where cloud systems come into play They form the brain of the Io’ ecosystem as they are typically responsible for processing, commanding, or taking analytics into account for the collected data Devices, protocols,
galeway, and storage are combined for cfficient real-time data analysis
With their immense compuling power, slorage capabilities, networking oplions, armilyties, and other service components, clouds make information effectively available for the
consumers,
While the cloud is not necessary Cor ToT, since local processing with Fdge or Fog computing is an option too, the cloud may be preferred being a high-performance facility that offers massive scalability and decreased operational costs Edge computing on the other hand is preferred when large amounts of data processing and storage are required
on-premises
iv End-user devices and user interface
The user interface is the visible component that is easily accessible and in control of the IoT user This is where a user can control the system and set their preferences The more
user-friendly this component of the ToT ecosystem is, Ihe casicr is user interaction
A user may interact with the system via the device itself, or this interaction can be conducted remotely via smartphones, tablets, and laptops Smart home systems such as
Amazm Alexa or Google Home efc also allow users to communicale with ther “things”.
Trang 20Design is a major consideration in today’s fast-paced world and one IoT device can set
itself apart from a competitor based on a strong design Touch interfaces, use of colors,
font, voice, and more are some of the factors that come to play here While an attractive design is necessary, the interface should be user-friendly enough to avoid any difficulties
for the user
2.2 ToT Architecture
2.2.1 The 3 Layer Architecture
The three-layer architecture defines the main idea of the Intemet of Things Its
responsibility is to handle the information gathered by the perception layer The handling
process contains two main topics; storing and analyzing
Figure 4, The 3 Layer Architecture [7]
Is responsible for connecting to other smart things, network devices, and servers, Its
features are also used for transmitting and processing sensor data, and
12
Trang 21Perception layer
Is the physical layer, which has sensors for sensing and gathering information about the
environment, It senses some physical parameters or identifies other smart objects in the
environment;
2.2.2 The 5 Layer Architecture
The five layers are perception, transport, processing, application, and business layers The role of the perception and application layers is the same as the architecture with three layers
Figiire 5 The 5 Layer Architecture [7) Business layer
‘Manages the whole IoT system, including applications, business and profit models, and
users’ privacy The business layer is out of the scope of this paper Hence, we do not
Trang 22services to the lower layers, It employs many technologies such as databases, cloud
computing, and big data processing modules, and
Transport layer
Transfers the sensor data from the perception layer to the processing layer and vice versa
through networks such as wireless, 3G, LAN, Bluetooth, RFID, and NFC
2.2.3 Service-Oriented Architecture for loT
A critical requirement of an IoT system is that the things in the network must be
connected IoT system connects the physical and the virtual worlds Design of IoT
involves many factors such as networking, communication, processes, ete
In designing the architecture of IoT, the extensibility, scalability, and operability among devices should be taken into consideration Because things may move and need to
interact with others in real-time mode, IoT architecture should be adaptive to make
devices interact with others dynamically and support communication amongst them
Besides, IoT should possess a decentralized and heterogeneous nature
‘Sensing Layer wets
The SoA treats a complex system as a set of well-defined simple objects or subsystems
Those objects or subsystems can be reused and are maintained individually; therefore, the
H
Trang 23software and hardware components in an IoT oan be reused and upgraded efficiently Due
lo these advantages, SoA has boon widsly applicd as a mainstream archiloclure
SoA, which consists of four layers with distinguished functioralilies, provide
interoperability among the devices in multiple ways They are:
‘The sensing layer is integrated with all available objects (things) to sense their
and the swrounding environments can be monitored for various purposes and
applications Every object in lol holds a digital identity and can be easily tacked
in the digital domain The technique of assigned a unique identity to an object is called # universal unique identifier (JUID).The identificrs might contain names and addresses A UULD is a 128-bit number used to uniquely identify some object
or entity on the Internet In determining the sensing layer of an IoT, the following
aspocls should he taker into consideration
Cost, sixe, resaurce, and energy consumption: The things might be equipped with sensing devices such as RFID tags, sensor nodes Due to a large number of sensors in applications, intelligent devices should be designed to minimize required resources as well as costs;
Trang 24+ Deployment: The sensing things (RFID tags, sensors, etc.) can be deployed one-
time, or incrementally, or randomly depending on the requirements,
« Communicatian: Sensors must be commurncable to make things accessible and
retrievable,
* Network: ‘The things are organized as multi-hop, mesh, or ad hoc network
2.2.3.2 Network layer
The network layer in IoT connects all things and allows them to be aware of their
surroundings Via the network layer, things can share data with the connected things, which is crucial to intelligent event management and processing in IoT For the sharing
of dala aril lo provide services hy a device a strong network is essential The network
should also automatically discover and map things Things uced to be assigned roles
automatically to deploy, manage, and schedule the behavior of things and should be able
1o switch to any roles al any time as required This enables devices lo perform (asks
collaboratively In the networking layer, the following issues should be addressed,
© Network management technologies including managing fixed, wireless, mobile
networks,
œ Requirements of QoS;
* Technologies for data searching, data processing;
* Security and privacy
Among these issues, information confidentiality and human privacy are critical since IoT connects many personal things, which brings potential risk regarding privacy The existing network security technologies can provide a basis for privacy and security in ToT, but more work still needs to be done
2.2.3.3 Service layer
‘The service layer enables the services and applications in Lo It is a cost-effective
platform where software and hardware can be reused The services in the service layer
16
Trang 25run directly on the network to effectively locate new services for an application and
relieve data dynamically about services Most specifications are undertaken by various standards developed by different organizations A universally accepted service layer is
imporlant for ToT A practical service layer consists of a minimum sel af applications,
application programming interfaces (APIs), and protocols supporting required applications and services All of the service-oriented activities, such as information
exchanging and storage, managemonl, of dala, search engines, and commurtcalion, arc
performed at the service layer ‘The tasks performed by the service layer are
e Service discovery: Finding objects that can provide the required service and information effectively,
@ Service composition: It enables the interaction among connected things and describes the relationships among things for enabling the desired service,
Service APIs: They provide the interface between services required by users
2.2.3.4 Interfaces layer
In IoT, a large mumber of devices are connected; these devices belong to different people and hence do not always imply the same standards ‘he compatibility issue among the things must be solved for the interaction among things Compatibility involves
information exchanging, communication, and event proce:
ing There is a strong need for
an effective interface mechanism to simplify the management and interconnection of things The interface layer works in the application frontend or API
2.3 Communication technologies of loT
When we are talking about [oT there are many communication technologies, some well- known such as Wi-l'i, Bluetooth, Ziglee, and 2G/3G/4G cellular, but there are also several new emerging, such as Thread as an alternative for home automation applications, and Whitespace TV lechnologies being implemented iu major cities for wider area ToT- based use cases Depending on the application, factors such as range, data requirements,
security and power demands, and battery life will diclate the choice of one or some form
Trang 26of a combination of technologies Below, are some of the major communication
lechnologies on offer to developors
1 Bluetooth
Is an important short-range communications leckmology, which has become very important in computing and many consumer product markets It is expected to be key for
wearable products, in particular, again commecting to the ToT albeit: probably via a
smartphone in many cases
‘The new Bluetooth Low-Hnergy (BLE) or Bluetooth Smart, as it is now branded is a significant protocol for IoT applications Importantly, while it offers a similar range to Bluetooth it has been designed lo offer significantly reduced power consumption
Devices that employ Bluetooth Smart fealures incerporale the Bluclooth Core
Specification Version 4.0 (or higher - the latest is version 4.2 announced in late 2014)
with a combined basic-data-rate and low-energy core canfiguration for an RF transceiver,
baseband, and protocol stack Importantly, version 4.2 via ils Internet Protoeel Support
Profile will allow Bluetooth Smart sensors to access the Internet directly via 6LOWPAN
connectivity This IP connectivity makes it possible to use existing ID infrastructure to manage Bluetooth Smart ‘edge’ devices
Characteristics
* Standard; Bluclooth 4.2 vore specification
Frequency: 2.4GHz (ISM)
+ Range: 50-150m (SmarBLE)
ZigBee is an TREE 802.15.4-based specification for a suite of high-level communication protocols used to create personal area networks with small, low-power digital radios,
such as for home automation, medical device data collection, and other low-power low-
18
Trang 27bandwidth needs, designed for small scale projects which need wireless comection, Honee, ZigBee is a low-power, low dala rals, and proximity (.e., personal arca) wireless
ad hoe network
‘The technology defined by the ZigBee specification is intended to be simpler and less
expensive than other wireless personal area networks (WPANs), such as Bluetooth, or
more general wireless networking such as Wi-Fi Applications include wireless light switches, home energy monitors, traffic management systems, and other consumer and
industrial equipment that requires short-range low-rate wireless data trans{or
Tts low power consumption limits transmission distances to 10-100 meters line-of-sight,
depending, on power output and environmental characteristics
ZigBee devices can transmit data over long distances by passing data through a mesh network of intermediate devices ta reach more distant ones ZigBee is typically used in low dala rale applications thal require long battery life and secure networking (7.igBee networks are secured by 128-bit symmetric encryption keys.) ZigBee has a defined rate
of 250 kbit/s, best sutled for intermittent dala lransmissions from a sensor or inpul device ZigBee smart devices communicate with each other using a radio transceiver The chip operates on the IEEE 802.15.4 protocol, over 2.4 GHz, which you might recognize as the same band used by Wi-Fi and Bluetooth Unlike Wi-T'i, ZigBee has a shorter range of
about 10-20 meters imdoors because il uses less power
Fvery ZigRee device can send and receive dala from other ZigBee devices Most importantly, every ZigBee device uses the same communication standard, with backward and forwards compatibility ZigBee devices can also copy and forward a ZigBee message from one device to the next, This means we can daisy chain smart devices and lnk therm
to a central hub, even when some of these devices are out of (direct) range of that hub
3 WiFi
Is a wide existing infrastructure as well as offering fast data transfer and the ability to handle high quantities of data
Trang 28Currently, the most common Wi-Fi standard used in homes and many businesses is 802.11n, which offers serious throughput in the range of hundreds of megabits per second, which is fine for file transfers but maybe too power-consuming for many IoT
applications
Characteristics
«Standard: Based on 802.11n (most common usage in homes today)
« Frequencies: 2 AGHz and SGHz bands
+ Range: Approximately 50m
+ Data Rates: 600 Mbps maximum, hut 150-200Mbps is more typical, depending on channel frequency used and number of antennas (latest 802.1 1-ac standard should offer 500Mbps to 1Gbps)
A, Cellular
Any Io application that requires operation over long distances can take advantage of GSM3G/4G cellular communication capabilities While cellular is capable of sending high quantities of data, especially for 4G, the expense and also power consumption will
be too high for many applications, but it can be ideal for sensor-based low-bandwidth-
data projects thai will send very low amounts of dala over lhe Triemol
Characteristics
* Standard: GSM/GPRS/EDGE (2G), UMTS/HSPA (3G), LTE (4G)
+ Frsqueneiss: 900/1800/1900/2100MHz
+ Rangs: 35km max for GSM, 200km max for HSDA
+ Dats Ratcs (lypical download): 35-170kps (GPRS), 120-384kbps (RDGP), 384K bps-2Mbps (UMTS), 600kbps-10Mbps (HSPA), 3-1 0Mbps (LT)
5 NFC (Near Field Communication)
Trang 29Is a technology that enables simple and safe two-way interactions between electronic dev and specially applicable for smartphones, allowing consumers lo pơrlonn
contactless payment transactions, access digital content, and connect electronic devices
Essentially Uf extends the capability of contactless card tectmology and enables devices to
share information at a distance that is loss than dom
long-range, low power wireless platform that has become the technology for the Internet
of ‘Things (Lol’) networks worldwide
LoRa devices and the open LoRa-WAN protocol enable smart IoT applications that solve
some of the biggest challenges facing our planet: energy management, natural resource
reduction, pollution control, inirastructure efficiency, disaster prevention, and more
Loka devices and the LoRa-WAN protocol have amassed several hundred known use
cases for smart cilies, smart homes and buiklmgs, smart agriculiue, smart metering, smart supply chain, and logistics, and more
T.oRa Wireless RF Technolagy
LoRa devices offer compelling features for ToT applications including long-range, low power consumption, and secure data transmission The technology oan be utilized by
public, private, or hybrid networks and provides a grealer range than Cellular networks
Trang 30LoRa Technology can easily plug into existing infrastructure and enables low-cost battery-operated IoT applications
° Lora: WAN
LoRa-WAN is a cloud-based medium access control (MAC) layer protocol but acts mainly as a network layer protocol for managing communication between LPWAN gateways and end-node devices as a routing protocol, maintained by
the LoRa Alliance
LoRa-WAN defines the communication protocol and system architecture for the network, while the LoRa physical layer enables the long-range communication link LoRa-WAN is
also responsible for managing the communication frequencies, data rate, and power for
all devices Devices in the network are asynchronous and transmit when they have data
available to send Data transmitted by an end-node device is received by multiple
gateways, which forward the data packets to a centralized network server The network
server filters duplicate packets performs security checks and manages the network Data
is then forwarded to application servers The technology shows high reliability for the moderate load, however, it has some performance issues related to sending acknowledgments
Trang 31Lang Range: Connects devices up to 30 miles apart in rural areas and penetrates dense
urban or deap indoor environments;
Low Power: Requires minimal energy, with a prolonged baitery lifetime of up to 10
years, minimizing battery replacement costs,
Secure: Veatures end-to-end ALS128 encryption, mutual authentication, integrity
protection, and confidentiality;
Standardized: Offers device interoperability and global availability of LoRaWAN networks for speedy deployment of lo applications anywhere;
Geolacation: Fables GPS-lree tracking applications, offering unique low power benefits
untouched by other technologies:
Mobile: Maintains communication with devices in motion without strain on power
consumption,
High Capacity: Supports millions of messages per base station, meeting the needs of
public network operators serving large markets, and
Low Cost: Reduces infrastructure investment, battery replacement cxpense, and ultimately operating expenses
7 Sigfox
Is an alternative wide-range technology in terms of the range that comes between Wi-Ti and cellular, It uses the ISM bands, which are free to use without the need to acquire licenses, to transmit data over a very narrow spectrum to and from connected objects ‘The idea for Sigfox is that for many MM applications that rm on a small battery and only require low levels of data transfer, then Wi-Ki’s range is too short while cellular is too expensive and also consumes too much power Sigfox uses a technology called Ulta Narrow Band (NB) and is only designed to handle low data-transfer speeds of 10 to 1,000 bits per second Tt consumes only 50 microwatts compared to 5000 microwatts for
Trang 32cellular communication or can deliver a typical standby time of 20 years with a 2.5Ah
batlery while it is only 0.2 yaars (or cellular
The network offers a robust, power-cilicient, and scalable network that can communicate
with millions of battery-operated devices across areas of several square kilometers,
making 1L suitable for various M2M apphealions thal are expecled 10 include smarl meters, paticnt monitors, security devices, strect lighting, and cnvironmental sensors
Bluetooth or ZigBee, 61.owPAN is a network protocol thal defies encapsulation aud
header compression mechanisms The standard has the freedom of frequeney band and physical layer and can also be used across multiple communications platforms, including Fthemel, Wi-Fi, 802.1 5.4, and sub-1 GH ISM
TPVố is the successor to IPv4 and offers approximately 5 x 1078 addresses for every
person in the world, enabling any embedded object or device in the world to have its own
unique IP address and connect to the Intemet
Designed to send IPv6 packets over IEBE802.15.4-based networks and implementing open TP slandards including TCP, UDP, HTTP, COAP, MQTT, and web-sockels, the standard offers end-to-end addressable nodes, allowing a router to connect the network to
TP 6LowPAN is a mesh network that is robusl, s ‘alable, and sel{-healing Mesh router
devices can route data destined for other devices, while hosts can sleep for long periods
24
Trang 33protocol like Bluetooth or ZigBee However, from an application pom of view, il is
primarily designed as a complement to Wi-Fi as it recognizes that while Wi-Fi is good
for many consumer devices that it has limitations for use in a home automation setup
Designed to work on existing IZEI802.15.4 wireless silicon from chip vendors such as
Freescale and Siticon Tabs, Thread supports a mesh network using TEFF802.15.4 radio transceivers and is capable of handling up to 250 nodes with high levels of authentication
and encryption A relatively simple software upgrade should allow users to run a thread
on existing TEEF802.15.4-cnabled devices:
Characteristics
Standard: Thread, based on IEBE802,15.4 and 6LowPAN
Frequency: 2.4GHz (ISM)
Range: N/A
Data Rates: N/A
2.4 Application Protocols in IoT
Io requires different protocols to address a full range of activities, such as protocols for sensor data collection, communication protocols, etc Various working groups, such as
9
Trang 34the Institute of Electrical and Electronics Engineers (IEEE), the Internet Engineering Task Force (TETF), the World Wide Web Consorlium (W3C), EPC-global, and the Thưapean Telecommunications Standards Institute (TSI) began to inchide efforts to
provide standard support protocols for ToT
For an ToT-based waste managemenL solution, nol all of the protocols described below
need to be involved, but these represent the main and most used ones within the context
of lel Ther brief description is presented per layer according to their main
funchonalities: Application, service discovery, and network infrastructure protocels
2.4.1 Application Layer Protocols
At the application layer, the protocols are used for end-user communication and are usually integrated into middleware solutions for IoT End-user applications detect sysloms, which means hey can commurticale directly wilh lower layers of the protocel stack, such as web servers widely used in system integration and communication between
different applications
Constrained Application Protocol (COAP)
The COAP is an application layer protocol developed to support applications within IoT systems Based on the Representational State Transfer (REST) functionalities over IITTP, REST is a transport protocol used in networks with low power nodes, mobile applications, and sacial networks, being able 1o transfer data belween client and server in
a more direct way, in addition to being a cached connection protocol Unlike RUST, COAP is linked to User Datagram Protocol (UDP), which makes it a lighter and more appropriate protocol for TeT applications, containing adaplations of HTTP (unctionalities for low power consumption when operating, on links in the presence of noise and packet
loss
Message Queue Telemetry Transport (MQTT)
MOTT is a publishing and signing transport protocol based on a TCP/IP server-client
structure developed for the connection between embedded applications and middleware
26
Trang 35Tt uses one-to-one, one-to-many, and many-to-many routing mechanisms, ideal for oT systems, providing flexibility and simplified deploymenl, MQTT has a lixed 2-byic header suitable for devices with limited resources, such as connections with low
bandwidth, batlery leaks or untrusted links, and IoT requirements
Extensible Messaging Presence Protocol (XMPP)
The XMPP is an inslan messagmg prolocol over the Tnlernet independent of the
operating system, designed for chat, voice and video calls, and telepresence It supports authentication, access control, privacy metermg, encryption, and interoperates with other
protocols KMPP communication, based on text using XMI., establishes an overload to
the system that is solved with XML streams compression using LXI discussed and based
on Reference
Advanced Massage Queuing Protocol (AMQP)
AMP is an open standard IoT connection layer protocol applied to a message-oriented
cnviromuent with a publishing and signing structure It supports reliable communication through primitives that guarantee delivery but requires a reliable transport protocol, such
as TCP It is facially interoperable with other protocols with oommunication-based on
message transfers and queues using a SWAP to route messages to the appropriate queues Data Distribution Service (DDS)
DDS js a subscription and publishing protocol developed for real-time communications
of a machine to machine (M2M) In contrast to AMPQ and MQTT, DDS has a deventralived structure and does nol require the presence of a broker TL uses multicast as
a form of guaranteed traffic delivery and excellent QoS that supports 23 queues with a variety of communication parameters, such as security, urgency, priority, durability, and
reliability
Due to a large number of devices connected and given the need to ensure the proper functioning of the applications developed for IoT based systems, a resource management
27
Trang 36mechanism is essential for excellent coverage of the technology Thus, the system must
be able lo discover resources and register the
aulomulically The most notorious protocols to meet these needs are the domain name system (DNS), multicast (mDNS),
and DNS Service Discovery (DNS-SD) Current research studies aim lo adapt hghter
versions to the IoT environment
Multicast DNS (mDNS)
mDNS is a very flexible protocol and uses the DNS namespace locally, being, a timely option for Intemet devices because it does not require mamual configuration or an
administration that manages the device and is capable of operating without infrastructure
or even in failures ‘the name query is done through multicast messages, in which the client requests all domain nodes the Intemet Protocol (IP) address for a specific name At
thal moment, all the ones in the network update the caches wilh the provided address
DNS Service Discovery (DNS-SD)
The DNS-based discovery service (DNS-SD) performs lhe service delivery funcuion
required by clients through mDNS, enabling customers to discover the desired services
using standard DNS messages Like mDNS, DNS-SD does not require a naming
configuration, and the DNS packets are sent through the UDP transport protocol, having
as destination 4 multicast address A first step in finding the necessary services is to find
the corresponding TP address of the respective host, and then lhe pairing funclion is sen,
also via multicast, containing the essential details for connection as the LP/Port pair of the
connected hosts, so that the names of the instances can be kept constant, increasing
robiahilily
2.4.3 Network Infrastructure Protocols
Infrastructure protocols provide communication bebween devices and the network, Le,, they are based on connectivity between different types of systems and devices, which may use different data types and may be spread out over considerable distances Thus, the Intemet is a connecting option between them
Trang 372.5 Challenges of lot
Mostly the challenges in ToT are related lo security and privacy converns Apart from these, few other challenges are interoperability, lack of standards, legal challenges, regulatory issues, rights issues, emerging ToT economy issues, and other developmental
issucs
The challenges of loi arc well described in table 1 belơw:
Trang 38Cost vs security tradeoffs
Standards & metrics
Confidentiality, authemtication &control
Field upgradeability
Shared responsibility
Lack of resources Lo train future generations abouL
secure IoT design
Lack of informed decisions over cost-benefit analysis of ToT
Lack of standards and metrics to identify the security in
ToT devices
Lack of optimally controlled role in oT device communication models to prevent the threat of hijacking, and cyber-attacks
‘No sufficient information on maintainability and
upgradeability issues This is based on the expected hfe
of IoT devices in a network
Could ToT security is achieved with shard collaborations
IoT device or software developing without security
30
Trang 39Privacy concerns
Regulation
Device obsolescence
¥aimess in data collection and use
Transparency, expression &
Lack of strict rules against data collection and use
Lack of multi-party models that enable transparency, expression, and enforcement
Lack of privacy protection models for ToT and inability
to recognize the privacy expectations of users Limited resources to develop lol devices integrating
with framed privacy principles
Lack of protection against the data collected by IoT
devices
Propnetary coosystem& consumer wish
‘Technical and cost constraints Lack of closed ccosystem concept in data collection
format and reuse as per user choice Individual security keys and protocols could be implemented
Limitations to the technical resources and investments
a1
Trang 40IoT standards issue
Schedule risk Technical nsk Device behaving badly
Logal system
Configuration
‘The proliferation of standards efforts
Chances of outpacing the interoperability standards Less awareness over the lechnical design risk protocols Lack of documented standards for best design practices Standard logal syatema [or maintaining IoT device
compatibility
Lack of standard configurations for interfacing a large
number of IoT devices
Less efforts in developing standards and protocols
Device proliferation as per legal actions
investments Less developments in data sharing and trust policies,
laws, and regulation Lack of laws on using the Lol data ina discriminatory way
Lack of laws on the Lot’ data for user to fight against the crime
Laws against the liability issues of IoT devices Confederation of complex liability during IoT device
operation
Limited investments in Lo'l research and developmental aclivitics both in developed and developing, countries