IOT Seminar Report
IOT Seminar Report
IOT Seminar Report
A Seminar Report on
“Internet of Things”
For The Degree of
This is to certify that the seminar report on “Internet of Things”, which is being
submitted by ‘Rina P. Mahure’, Enrollment No. MC18F14F030 is a bonafied work completed
under my supervision and guidance. In partial fulfillment for award of the degree of ‘Master of
Computer Application’ of Government Engineering College, Aurangabad (An Autonomous
Institute of Government of Maharashtra) affiliated to Dr. Babasaheb Ambedkar Marathwada
University, Aurangabad.
Dr. P. B. Murnal
Principal
Government College of Engineering
Aurangabad
Acknowledgement
Seminar inspiration and motivation have always played a key role in the success of any venture.
We express our sincere thanks to Dr. P. B. Murnal principal of Government College of
Engineering Aurangabad. We pay my deep sense of gratitude to Dr. Praveen Shetiye Head of
the Department Masters in Computer Application, Government College of Engineering
Aurangabad to encourage us to the highest peak and to provide us the opportunity to prepare this
Seminar. We feel acknowledge to our indebtedness and deep sense of gratitude to our guide Dr.
Avinash Gulve whose valuable guidance and kind supervision given to us throughout the
seminar shaped the present work it shows.
i
ABSTRACT
The phrase Internet of Things (IoT) heralds a vision of the future Internet where
connecting physical things, from banknotes to bicycles, through a network will
let them take an active part in the Internet, exchanging information about
themselves and their surroundings. This will give immediate access to
information about the physical world and the objects in it—leading to innovative
services and increase in efficiency and productivity. This paper studies the state-
of-the-art of IoT and presents the key technological drivers, potential
applications, challenges and future research areas in the domain of IoT. IoT
definitions from different perspective in academic and industry communities are
also discussed and compared.
ii
TABLE OF CONTENTS
ACKNOWLEDGEMENT i
ABSTRACT ii
TABLE OF CONTENTS iii
LIST OF FIGURES iv
1. INTRODUCTION 1
1.1 DEFINITION 2
2. VISION OF IOT 4
3. ENABLING TECHNOLOGIES 7
4. APPLICATION OF IOT 8
4.1 Aerospace and Aviation Industry 8
4.2 Automotive Industry 9
4.3 Telecommunications Industry 9
4.4 Medical and Healthcare Industry 10
4.5 Manufacturing Industry 12
4.6 Environment Monitoring 13
4.7 Agriculture and Breeding 13
4.8 Media, Entertainment Industry 14
4.9 Recycling 14
5. ARCHITECTURE OF IOT 16
6. KEY TECHNOLOGIES 18
6.1 IDENTIFICATION TECHNOLOGY 18
6.2 IOT ARCHITECTURE TECHNOLOGY 18
6.3 COMMUNICATION TECHNOLOGY 19
6.4 NETWORKING TECHNOLOGY 20
6.5 SOFTWARES AND ALGORITHMS .20
8. CONCLUSION 27
REFERENCES
iii
LIST OF FIGURES
iv
1. INTRODUCTION
During the past few years, in the area of wireless communications and
networking, a novel paradigm named the Internet of Things (IoT) which was first
introduced by Kevin Ashton in the year 1998, has gained increasingly more
attention in the academia and industry [1]. By embedding short-range mobile
transceivers into a wide array of additional gadgets and everyday items, enabling
new forms of communication between people and things, and between things
themselves, IoT would add a new dimension to the world of information and
communication.
Unquestionably, the main strength of the IoT vision is the high impact it will
have on several aspects of every-day life and behaviour of potential users. From
the point of view of a private user, the most obvious effects of the IoT will be
visible in both working and domestic fields. In this context, assisted living, smart
homes and offices, e-health, enhanced learning is only a few examples of
possible application scenarios in which the new paradigm will play a leading role
in the near future [2]. Similarly, from the perspective of business users, the most
apparent consequences will be equally visible in fields such as automation and
industrial manufacturing, logistics, business process management, intelligent
transportation of people and goods.
1
The objective of this paper is to provide the reader a comprehensive discussion
on the current state of the art of IoT, with particular focus on what have been
done in the areas of protocol, algorithm and system design and development, and
what are the future research and technology trends.
The rest of the report is organized as follows. Section 2 presents the vision of IoT.
Section 3 discusses enabling technologies of IoT. Section 4 presents some specific
applications of IoT in various industries. Section 5 presents a generic layered
architectural framework for IoT and various issues involved in different layers.
Section 6 identifies the key technologies involved in IoT. Section 7 presents some of
the challenges in deploying the concept of IoT in the real world, and Section 8 future
research areas in the domain of IoT and Section 9 concludes the report.
1.1 Definition
2
Fig.1 shows how IOT connects people and things together at any place, anytime and
anywhere.
3
2. VISION OF IOT
In the research communities, IoT has been defined from various different
perspectives and hence numerous definitions for IoT exist in the literature. The
reason for apparent fuzziness of the definition stems from the fact that it is
syntactically composed of two terms—Internet and things. The first one pushes
towards a network oriented vision of IoT, while the second tends to move the
focus on generic objects to be integrated into a common framework [2].
However, the terms ‘Internet’ and ‘things’, when put together assume a meaning
which introduces a disruptive level of innovation into the ICT world. In fact, IoT
semantically means a “world-wide network of interconnected objects uniquely
addressable, based on standard communication protocols” [4]. This implies that a
huge number of possibly heterogeneous objects are involved in the process. In
IoT, unique identification of objects and the representation and storing of
exchanged information is the most challenging issue. This brings the third
perspective of IoT—semantic perspective. In Fig. 1, the main concepts,
technologies and standards are highlighted and classified with reference to the
three visions of IoT [2]. The diagram clearly depicts that IoT paradigm will lead
to the convergence of the three visions of IoT.
From the perspective of things, the focus of IoT is on how to integrate generic
objects into a common framework and the things under investigation are radio
frequency identification (RFID) tags. The term IoT, in fact, is attributed to the
Auto-ID labs [5], a world-wide network of academic research laboratories in the
field of networked RFID and emerging sensing technologies. These institutions,
since their establishment, have focussed their efforts to design the architecture of
IoT integrated with EPC global [6]. These efforts have been primarily towards
development of the electronic product code (EPC) to support the use of RFID in
the world-wide modern trading networks, and to create the industry-driven
global standards for the EPC global Network. These standards are mainly
designed to improve object visibility (i.e., the traceability of an object and the
awareness of its status, current location etc.). While, this is an important step
towards the deployment of IoT, it makes the scope of IoT much narrower. In a
4
which the only objects are RFIDs. Similarly, unique/universal/ubiquitous
identifier (UID) architecture defined in [7] which attempts to develop
middleware-based solutions for global visibility of objects also narrows down
the scope of IoT. An IoT vision statement, which goes well beyond a mere
RFID-centric approach, is proposed by CASAGRAS consortium [8]. The
CASAG-RAS consortium (i) proposes a vision of IoT as a global infrastructure
which connects both virtual and physical generic objects and (ii) highlights the
importance of including existing and evolving Internet and network
developments in this vision. From this perspective, IoT becomes the natural
enabling architecture for the deployment of independent federated ser-vices and
applications, characterized by a high degree of autonomous data capture, event
transfer, network connectivity and interoperability.
As mentioned earlier in this section, semantic oriented IoT visions have also
been proposed in the literature [10– 13]. The idea behind this proposition is that
the number of items involved in the future Internet is destined to become
extremely high. Therefore, issues pertaining how to represent, store,
interconnect, search, and organize information generated by the IoT will become
very challenging. In this context, semantic technologies will play a key role. in
fact, these technologies can exploit appropriate modelling solutions for things
description, reasoning over data generated by IoT, semantic execution
environments and architectures that accommodate IoT requirements and scalable
storing and communication infrastructure [ 10].
A further vision correlated with the IoT is the so called web of things [14].
According to this vision of IoT, web standards are reused to connect and
integrate into the web every-day-life objects that contain an embedded device or
computer.
6
3. ENABLING TECHNOLOGIES
3.1. Energy:
This concern about low-power chipset having new and efficient and compact
battery cells like fuel cells, polymer batteries which can help in case of IoT.
3.2. Intelligence:
The devices should have capabilities of context awareness and inter-machine
communication.
3.3. Communication:
The devices should new, smart multi-frequency band antennas, integrated on-
chip and made of new materials that will enable the devices to communicate.
3.4. Integration:
Integration of smart devices into packaging, or better, into the products themselves
will allow a significant cost saving and increase the eco-friendliness of the products.
3.5. Interoperability:
It means communication of different protocols by using some protocol stack.
Two devices might not be interoperable even if they belong to same
standards.
7
4. APPLICATIONS OF IOT
Internet of Things can help to improve safety and security of products and
services by reliably identifying counterfeit products and elements. The aviation
industry, for example, is vulnerable to the problem of suspected unapproved
parts (SUP). An SUP is an aircraft part that is not guaranteed to meet the
requirements of an approved aircraft part (e.g., counterfeits, which do not
conform to the strict quality constraints of the aviation industry).
8
Thus, SUPs seriously violate the security standards of an aircraft. Aviation
authorities report that at least 28 accidents or incidents in the United States have
been caused by counterfeits [21]. Apart from time-consuming material analyses,
verifying the authenticity of aircraft parts can be performed by inspecting the
accompanying documents, which can be easily forged. It is possible to solve this
problem by introducing electronic pedigrees for certain categories of aircraft
parts, which document their origin and safety-critical events during their
lifecycle (e.g., modifications). By storing these pedigrees within a decentralized
database as well as on RFID tags, which are securely attached to aircraft parts,
an authentication (verification of digital signatures, comparison of the pedigree
on RFID tags and within the database) of these parts can be performed prior to
installing them in an aircraft. In this way, safety and operational reliability of
aircrafts can be significantly improved.
Advanced cars, trains, buses as well as bicycles are becoming equipped with
advanced sensors, actuators with increased processing powers. Applications in
the automotive industry include the use of smart things to monitor and report
various parameters from pressure in tires to proximity of other vehicles. Radio
Frequency Identification technology has already been used to streamline vehicle
production, improve logistics, increase quality control and improve customer
services. Radio Frequency Identification technology provides real-time data in
the manufacturing processes, maintenance operations and offers new ways of
managing recalls more effectively. Dedicated Short Range Communication
(DSRC) technology will possibly help in achieving higher bit rates and reducing
interference with other equipment. Vehicle-to vehicle (V2V) and vehicle-to-
infrastructure (V2I) communications will significantly advance Intelligent
Transportation Systems (ITS) applications such as vehicle safety services and
traffic management and will be fully integrated in the IoT infrastructure.
9
4.3 Telecommunications Industry
IoT will have many applications in the healthcare sector, with the possibility of
using the cell phone with RFID-sensor capabilities as a platform for monitoring
of medical parameters and drug delivery. The advantage gained is in prevention
and easy monitoring of diseases, ad hoc diagnosis and providing prompt medical
attention in cases of accidents. Implantable and addressable wireless devices can
be used to store health records that can save a patient’s life in emergency
situations, especially for people with diabetes, cancer, coronary heart disease,
stroke, chronic obstructive pulmonary disease, cognitive impairments, seizure
disorders and Alzheimer’s disease. Edible, biodegradable chips can be
introduced into human body for guided actions. Paraplegic persons can have
muscular stimuli delivered via an implanted smart thing controlled electrical
simulation system in order to restore movement functions.
10
4.5 Independent Living
IoT can provide several advantages in retail and supply chain management
(SCM) operations. For example, with RFID-equipped items and smart shelves
11
that track the present items in real time, a retailer can optimize many applications
[23]. For example, he can make automatic checking of goods receipt, real time
monitoring of stocks, tracking out-of-stocks or the detection of shoplifting. IoT
can provide a large savings potential in a retail store, since it has been found that
3.9% of sales loss happens worldwide when shelves go empty and customers
return with getting the desired products [24]. Furthermore, IoT can help making
the data from the retail store available for optimizing the logistics of the whole
supply chain. If manufacturers know the stock and sales data from retailers, they
can produce and ship the right quantities of products, thus avoiding the situation
of over-production or underproduction. The logistic processes from supply
chains in many industry sectors can benefit from exchanging of RFID data.
Moreover, environmental issues can be better tackled. The carbon footprint of
logistics and supply chain processes can be optimized based on the availability
of dynamic and fine-grained data collected in the real world directly by some of
the things of IoT, such as trucks, pallets, individual product items etc. In the
shops, IoT can offer many applications like guidance in the shop according to a
pre-selected shopping list, fast payment solutions like automatically check-out
using biometrics, detection of potential allergen in a given product, personalized
marketing, verification of the cool chain, etc. Commercial buildings will also
benefit from smart building functionalities.
12
4.9 Process Industry
In many plants of the oil and gas industry, scalable architectures are being used
that consider possibilities for plug-and-play new ID methods combined with
sensing/actuating integrated with the IoT infrastructure and integrate the wireless
monitoring of petroleum personnel in critical onshore and offshore operations,
container tracking, tracking of drill string components pipes, monitoring and
managing of fixed equipment etc. A review of high-impact accidents in the
chemical and petrochemical sectors in the UK [25] has observed some common
features in these disasters, such as lack of understanding as well as poor
management of storage, process, and chemical segregation. IoT can help in
reducing the number of accidents in the oil and gas industry by equipping the
containers of hazardous chemicals with intelligent wireless sensor nodes.
IoT offers solutions for fare collection and toll systems, screening of passengers
and bags boarding commercial carriers and the goods moved by the international
cargo system that support the security policies of the governments and the
transportation industry, to meet the increasing demand for security in the globe.
Monitoring traffic jams through cell phones of the users and deployment of
intelligent transport systems (ITS) will make the transportation of goods and
people more efficient. Transportation companies would become more efficient in
packing containers since the containers can self- scan and weigh themselves. Use
of IoT technologies for managing passenger luggage in airports and airline
operations will enable automated tracking and sorting, increased per-bag read
rates, and increased security.
1
4.12 Agriculture and Breeding
14
4.14 Insurance Industry
4.15 Recycling
IoT and wireless technologies can be used to advance the efficiency and
effectiveness of numerous important city and national environmental programs,
including the monitoring of vehicle emissions to help supervise air quality, the
collection of recyclable materials, the reuse of packaging resources and
electronic parts, and the disposal of electronic waste (RFID used to identify
electronic subcomponents of PCs, mobile phones, and other consumer
electronics products to increase the reuse of these parts and reduce e-waste).
Radio Frequency Identification continues to provide greater visibility into the
supply chain by helping companies more efficiently track and manage
inventories, thereby reducing unnecessary transportation requirements and fuel
usage.
15
5. ARCHITECTURE OF IOT
– Edge layer: this hardware layer consists of sensor networks, embedded systems,
RFID tags and readers or other soft sensors in different forms. These entities are
the primary data sensors deployed in the field. Many of these hardware elements
provide identification and information storage (e.g. RFID tags), information
collection (e.g. sensor networks), information processing (e.g. embedded edge
processors), communication, control and
actuation.
– Access gateway layer: the first stage of data handling happens at this layer. It
– Middleware layer: this is one of the most critical layers that operates in bi-
directional mode. It acts as an interface between the hardware layer at the bottom
and the application layer at the top. It is responsible for critical functions such as
device management and information management and also takes care of issues
like data filtering, data aggregation, semantic analysis, access control,
information discovery such as EPC (Electronic Product Code) information
service and ONS (Object Naming Service).
16
INTERNET OF THINGS
– Application layer: this layer at the top of the stack is responsible for delivery of
various applications to different users in IoT. The applications can be from
different industry verticals such as: manufacturing, logistics, retail, environment,
public safety, healthcare, food and drug etc. With the increasing maturity of RFID
technology, numerous applications are evolving which will be under the umbrella
of IoT.
17
6. KEY TECHNOLOGIES
18
structures, business artifacts, and other documents. This requirement is termed as
semantic interoperability. Often technology is perceived to be the biggest
impediment to effective collaboration and integration between requestors and
providers; however, it is usually the problem of semantic interoperability which
is the root cause. Semantic interoperability can be achieved between
heterogeneous information systems (service providers and service requestors) in
a multitude of ways. On one extreme, development of comprehensive shared
information models can facilitate semantic interoperability among the participant
applications and businesses. However, the problem with this approach is its
rigidity, which translates to inflexibility. On the other extreme, semantic
interoperability can be achieved by providing appropriate semantic mediators
(translators) at each participant´c6s end to facilitate the conversion to the
information format which the participant understands. Most often systems use a
combination of context independent shared information models coupled with
context specific information specialization approaches to achieve semantic
interoperability.
The applications of IoT form an extensive design space with many dimensions
that include several issues and parameters, some of which are mentioned below.
– Deployment: onetime, incremental or random.
– Mobility: occasional or continuous performed by either selected or all things
in the selected environment.
– Cost, size, resources, and energy: very much resource-constrained or
unlimited resources.
– Heterogeneity: a single type of thing or diverse sets of different
properties and hierarchies.
– Communication modality: single-hop or multi-hop communication.
– Infrastructure: different applications exclude, allow or require the use of
fixed infrastructure.
– Network topology: single hop, star, multi-hop, mesh or multi-tier.
– Coverage: sparse, dense or redundant.
– Connectivity: continuous, occasional or sporadic.
19
– Network size: ranging from tens of nodes to thousands.
– Lifetime: few hours, several months to many years.
– QoS requirements: real-time constraints, tamper resistance, unobtrusiveness etc.
20
6.5 SOFTWARES AND ALGORITHMS
One of the most promising micro operating systems for constrained devices is
Contiki[16]. It provides a full IP stack (both IPv4 and IPv6), supports a local
flash file system, and features a large development community and a
comprehensive set of development tools. One of challenges in building IoT
applications is how to design a common underlying software fabric for different
environments and how to build a coherent application out of a large collection of
diverse software modules. A substantial amount of research and development
effort is currently focussed on service oriented computing for developing
distributed and federated applications to support interoperable machine-to-
machine and thing-to-thing interaction over a network. This is based on the
Internet protocols, and on top of that, defines new protocols to describe and
address the service instances. Service oriented computing loosely organizes the
web services and makes it a virtual network.
6.6 HARDWARE
21
IOT will create new services and new business opportunities for system
providers to service the communication demands of potentially tens of billion of
devices in future. Following major trends are being observed in use of RFID
tags. Use of ultra low cost tags having very limited features is observed. While
the information is centralized on data servers managed by service operators, the
value of information resides in the data management operations. Use of low cost
tags with enhanced features such as extra memory and sensing capabilities is
also observed. The information is distributed both on centralized data servers and
tags. The value resides in communication and data management, including
processing of data into actionable information. Use of smart fixed or mobile tags
and embedded systems is also witnessed. More functionalities are brought into
the tags bringing in local services. For such tags, information is centralized in the
tags, while the value resides in the communication management to ensure
security and effective synchronization with the network.
Industrial bodies from different domains have realized the utility of XML as the
underlying language for standardization of business artifacts. Each industry
vertical has come up with standardization bodies to develop XML standards for
its own purpose. The primary objective of such effort is to develop a
standardized way to express the contract, trust, process, workflow, message, and
other data semantics in terms of XML nodes and attributes for the nodes. These
XML vocabularies are then published as generalized document type definition
(DTD) or XML schema for consumption by members of that specific industry
vertical. Since all members follow the same standardized DTD or schema, the
semantic interoperability is achieved.
22
names in different XML markup standards.
Finally, semantic web based standards from W3C like DAML (Darpa Agent
Markup Language), RDF (Resource Description Framework) and OWL
(Ontology Working Language) are useful in providing semantic foundations for
dynamic situations involving dynamic discovery of businesses and services. The
intelligent decision-making algorithms will need to trigger activities not on the
basis of a single event (such as an individual observation or sensor
reading).Often these algorithms will have to consider correlation among events
which may possibly require transformation of raw sensor data. Appropriate
toolkits and frameworks already exist for complex event processing, such as
ESPER and DROOLS—and are likely to play useful roles in formulating
machine-readable rules for determining the trigger sequences of events for a
particular activity or process.
23
7. STANDARDIZATION IN IoT
Standards should be designed to support a wide range of applications and
address common requirements from a wide range of industry sectors as well as
the needs of the environment, society and individual citizens. Through consensus
processes involving multiple stakeholders, it will be possible to develop
standardized semantic data models and ontologies, common interfaces and
protocols, initially defined at an abstract level, then with example bindings to
specific cross-platform, cross-language technologies such as XML, ASN.1, web
services etc. The use of semantic ontologies and machine-readable codification
should help to overcome ambiguities resulting from human error or differences
and misinterpretation due to different human languages in different regions of
the world, as well as assisting with cross-referencing to additional information
available through other systems. Standards are required for bi-directional
communication and information exchange among things, their environment, their
digital counterparts in the virtual cloud and entities that have an interest in
monitoring, controlling or assisting the things. In addition, the design of
standards for IoT needs to consider efficient and judicial use of energy and
network capacity, as well as respecting other constraints such as those existing
regulations that restrict permitted frequency bands and power levels for radio
frequency communications. As IoT evolves, it may be necessary to review such
regulatory constraints and investigate ways to ensure sufficient capacity for
expansion, such as seeking additional radio spectrum allocation as it becomes
available. A particular challenge in this regard is ensuring global interoperability
particularly for things and devices that make use of radio spectrum. Historically,
various bands of radio spectrum have been allocated for various purposes, such
as broadcast communications (AM, FM, digital audio broadcasting, analogue
terrestrial television, digital terrestrial television), mobile telephony, citizen-band
radio, emergency services communications, wireless internet, short-range radio..
Re-allocation of radio spectrum is a slow process, involving government
agencies, regulators and international bodies such as the International
24
Telecommunications Union (ITU) as well as regional bodies such as the
European Telecommunications Standards Institute (ETSI) or the Federal
Communications Commission (FCC). Careful discussions are needed to
minimize disruption to existing users of radio spectrum and to plan for future
needs. In the meantime, many IoT devices using radio spectrum will need to be
capable of using multiple protocols and multiple frequencies. An example of this
is the ISO 18000-6C/EPC global UHF Gen2 standard, which is implemented
using slightly different frequencies within the 860– 960MHz band, depending on
the region of operation, as well as different power levels and different protocols
(at least initially in Europe, where the Listen-Before-Talk protocol was
required). With regard to the IoT paradigm at large, a very interesting
standardization effort has currently started in ETSI [17], which produces globally
applicable ICT-related standards.
As for the Internet Engineering Taskforce (IETF) activities related to the IoT,
recently Ipv6 over Low PowerWireless PersonalArea Networks (6LoWPAN)
IETF group has been formed [19]. 6LoWPAN has defined a set of protocols that
can be used to integrate sensor nodes into IPv6 networks. Core protocols for
6LoWPAN architecture have already been specified and some commercial
procuts have been launched that implement this protocol suite.
Another working group in IETF’ named routing over low power and lossy
(ROLL) networks, has recently produced RPL routing protocol draft. This will
be the basis for routing over low power and lossy networks including
6LoWPAN.
25
It is clear that an emerging idea is to consider the IoT standardization as an
integral part of the future Internet definition and standardization process. This
assertion has been made also by the cluster of European research and
development projects on IoT (CERP-IoT). As presented in its report, the
integration of different things into wider networks, either mobile or fixed, will
allow their interconnection with the future Internet [20].
26
8. CHALLENGES & FUTURE TRENDS
The workflows in analyzed enterprise environment, home, office and other smart
spaces in the future will be characterized by cross organization interaction,
requiring the operation of highly dynamic and ad-hoc relationships. At present,
only a very limited ICT support is available, and the following key challenges
exist.
1. Network Foundation—limitations of the current Internet architecture in
terms of mobility, availability, manageability and scalability are some of
the major barriers to IoT.
2. Security, Privacy and Trust—in the domain of security the challenges are:
(a) securing the architecture of IoT– security to be ensured at design time
and execution time,(b) proactive identification and protection of IoT from
arbitrary attacks (e.g. DoS and DDoS attacks) and abuse, and (c) proactive
identification and protection of IoT from malicious software. In the
domain of user privacy, the specific challenges are: (a) control over
personal information (data privacy) and control over individual’s physical
location and movement (location privacy), (b) need for privacy
enhancement technologies and relevant protection laws, and (c) standards,
methodologies and tools for identity management of users and objects. In
the domain of trust, some of the specific challenges are: (a) Need for easy
and natural exchange of critical, protected and sensitive data—e.g. smart
objects will communicate on behalf of users / organizations with services
they can trust, and (b) trust has to be a part of the design of IoT and must
be built in.
3. Managing heterogeneity—managing heterogeneous applications,
environments and devices constitute a major challenge.
27
In addition to the above major challenges, some of the other challenges are: (a)
managing large amount of information and mining large volume of data to
provide useful services, (b) designing an efficient architecture for sensor
networking and storage, (c) designing mechanisms for sensor data discovery, (d)
designing sensor data communication protocols— sensor data query,
publish/subscribe mechanisms, (e) developing sensor data stream processing
mechanisms, and (f) sensor data mining—correlation, aggregation filtering
techniques design. Finally, standardizing heterogeneous technologies, devices,
application interfaces etc. will also be a major challenge.
28
8.1 DATA AND SIGNAL PROCESSING TECHNOLOGY
There are several areas in which further research is needed for making
deployment of the concept of IoT reliable, robust and efficient. Some of the areas
are identified in the following. In identification technology domain, further
research is needed in development of new technologies that address the global
ID schemes, identity management, identity encoding/ encryption, pseudonimity,
revocable anonymity, authentication of parties, repository management using
identification, authentication and addressing schemes and the creation of global
directory lookup services and discovery services for IoT applications with
various identifier schemes. In architecture design domain, some of the issues that
need attention are: design of distributed open architecture with end-to-end
characteristics, interoperability of heterogeneous systems, neutral access, clear
layering and resilience to physical network disruption, decentralized autonomic
architectures based on peering of nodes etc. In communication protocol domain,
the issues that need to be addressed are: design of energy efficient
communication by multi frequency protocol, communication spectrum and
frequency allocation, software defined radios to remove the needs for hardware
upgrades for new protocols, and design of high performance, scalable algorithms
and protocols. In network technology domain further research is needed on
network on chip technology considering on chip communication architectures for
dynamic configurations design time parameterized architecture with a dynamic
routing scheme and a variable number of allowed virtual connections at each
output. In addition, power-aware network design that turns on and off the links in
response to burst and dips of traffic on demand, scalable communication
infrastructures design on chip to dynamically support the communication among
circuit modules based on varying workloads and /or changing constraints are
some of the important research issues.
29
9. CONCLUSION
When we look at today’s state of the art technologies, we get a clear indication
of how the IoT will be implemented on a universal level in the coming years. We
also get an indication of the important aspects that need to be further studied and
developed for making large-scale deployment of IoT a reality.
This report surveyed some of the most important aspects of IoT with particular
focus on what is being done and what are the issues that require further research.
While the current technologies make the concept of IoT feasible, a large number
of challenges lie ahead for making the large-scale real-world deployment of IoT
applications. In the next few years, addressing these challenges will be a
powerful driving force for networking and communication research in both
industrial and academic laboratories.
30
REFERENCES
[1] Santucci, G. From internet to data to internet of things. In Proceedings of the
International Conference on Future Trends of the Internet, 2009.
[2] Atzori, L., Lera, A., & Morabito, G. The internet of things: A survey.
Computer Networks, 54(15), 2787–2805, 2010.
[3] Heuser, L., Nochta, Z., & Trunk, N.-C. ICT shaping the world: A scientific
view. London: ETSI, Wiley Publication, 2008.
[4] INFSO D.4 Networked enterprise and RFID INFSO G.2 Micro and
Nanosystems. In: Co-operation with the working group RFID of the ETP
EPOSS, Internet of Things in 2020, roadmap for the future, Version 1.1, May
27. 2008
[5] Auto-Id Labs. http://www.autoidlabs.org.
[6] The EPC global Architecture Framework. EPC global Final Version 1.3,
Approved 19 March, 2009. http://www.epcglobalinc.org.
[7] Sakamura, K. Challenges in the age of ubiquitous computing: A case study of
T-Engine—an open development platform for embedded systems. In:
Proceedings of ICSE’06. Shanghai, China 2006.
[8] Dunkels, A., & Vasseur, J. P. IP for smart objects, internet protocol for smart
objects (ISO) alliance, White Paper #1. http://www.ispo-alliance.org 2009.
[9] Hui, J., Culler, D., & Chakrabarti, S. 6LoWPAN: Incorporating IEEE 802.15.4
into IP architecture– internet protocol for smart objects (IPSO) Alliance,
White Paper # 3. http://www.ispo-alliance.org 2009.
[10] Toma, I., Simperl, E., & Hench, G. A joint roadmap for semantic technologies
and the internet of things. In: Proceedings of the 3rd STI Roadmapping
Workshop. Crete, Greece 2009.
[11] Katasonov, A., Kaykova, O., Khriyenko, O., Nikitin, S., & Terziyan, V. Smart
semantic middleware for the internet of things. In: Proceedings of the 5th
International Conference on Informatics in Control, Automation and Robotics.
Funchal, Mederia, Portugal 2008.
[12] Wahlster, W. Web 3.0: semantic technologies for the internet of services and
of things. Lecture at the 2008 dresden future forum 2008.
[13] Vazquez, I. Social devices: Semantic technology for the internet of things.
Spain: Week@ESI, Zamudio 2009.
[14] Guinard, D., & Vlad, T. Towards the web of things: Web Mashups for
embedded devices. In: Proceedings of the international world wide web
conference. Madrid, Spain 2009.
[15] Pasley, J. How BPEL and SOA are changing web services development. IEEE
Internet Computing, 9(3), 65–67 2005.
[16] Contiki: The operating system for connecting next billion devices- the internet
of things. http://www.sics.se/contiki.
31
[17] European Telecommunication Telecommunications Standards Institute.
http://www.etsi.org.
[18] Shelby, Z. ETSI M2M Standardization, March, 2009. http://zachshelby.org.
[19] Kushalnagar, N., Montenegro, G., & Schumacher C. (August 2009). IPv6 over
Lo-Power Wireless Personal Area Networks (6LoWPANs): Overview,
assumptions, problem statement, and goals, IETFRFC 4919.
[20] Santucci, G. Internet of the future and internet of things: What is at stake and
how are we getting prepared for them? In: eMatch’99- Future internet
workshop, Oslo, Norway September 2009.
[21] CTV Deadly Fakes- CTV News.
http://www.ctv.ca/servlet/ArticleNews/story/CTVNews/20020306/ctvnews8484
63.
[22] Kelesidis, T., Kelesidis, I., Rafailidis, P., & Falagas, M. Counterfeit or
substandard antimicrobial drugs: A review of the scientific drugs: A review of
the scientific evidence. Journal of Antimicrobial Chemotherapy, 60(2), 214–
236 in 2007.
[23] Hardgrave, B. C., Waller, M., & Miller, R. RFID’s impact on out of stocks: A
sales velocity analysis, Research Report from the University of Arkansas in
2006.
[24] Gruen, T. W., Corsten, D. S., & Bharadwaj, S. Retail out of stocks, Technical
Report in 2002.
[25] Fewtrell, P., & Hirst, I. L. A review of high-cost chemical/petrochemical
accidents since Flixborough 1974. In Loss Prevention Bulletin (1998), April,
No. 140. http://www.hse.gov.uk/comah/lossprev.pdf.
[26] Coroama, V. The smart tachograph—individual accounting of traffic costs and
its implications. In: Proceedings of Pervasive 2006, (pp. 135–152). Dublin,
Ireland, May 07–10.
32