Haider Raad - Fundamentals of IoT and Wearable Technology Design-Wiley-IEEE Press (2021)
Haider Raad - Fundamentals of IoT and Wearable Technology Design-Wiley-IEEE Press (2021)
Haider Raad - Fundamentals of IoT and Wearable Technology Design-Wiley-IEEE Press (2021)
Technical Reviewers
Khalid Abed, PhD, Professor, Department of Electrical & Computer Engineering
and Computer Science, Jackson State University, MS, USA
Tareef Al-Mahdawi, PhD, Sr. Principal Scientist II. BAE Systems Fast Labs, USA
John B. Anderson, PhD, Professor in Digital Communication Emeritus Electrical
and Information Technology, Lund University, Sweden
Ali Hammodi, PhD, Project Manager, Amphenol Inc, USA
Fundamentals of IoT and Wearable
Technology Design
Haider Raad
Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best
efforts in preparing this book, they make no representations or warranties with respect to the
accuracy or completeness of the contents of this book and specifically disclaim any implied
warranties of merchantability or fitness for a particular purpose. No warranty may be created or
extended by sales representatives or written sales materials. The advice and strategies contained
herein may not be suitable for your situation. You should consult with a professional where
appropriate. Neither the publisher nor author shall be liable for any loss of profit or any other
commercial damages, including but not limited to special, incidental, consequential, or other
damages.
For general information on our other products and services or for technical support, please
contact our Customer Care Department within the United States at (800) 762-2974, outside the
United States at (317) 572-3993 or fax (317) 572-4002.
Wiley also publishes its books in a variety of electronic formats. Some content that appears in
print may not be available in electronic formats. For more information about Wiley products,
visit our web site at www.wiley.com.
10 9 8 7 6 5 4 3 2 1
To my family with love
vii
Contents
2 Applications 27
2.1 Introduction 27
2.2 IoT and Wearable Technology Enabled Applications 27
viii Contents
3 Architectures 53
3.1 Introduction 53
3.2 IoT and Wearable Technology Architectures 54
3.2.1 Introduction 54
3.2.1.1 The Motivations Behind New Architectures 54
3.2.1.2 Edge Computing 56
3.2.1.3 Cloud, Fog, and Mist 57
3.2.2 IoT Architectures 59
3.2.2.1 The OSI Model 60
3.2.2.2 Why Does the OSI Model Matter? 60
3.2.2.3 Data Flow Across the OSI Model 62
3.2.2.4 Common IoT Architectures 62
3.2.2.5 Layer 1: Perception and Actuation (Sensors and Actuators) 67
3.2.2.6 Layer 2: Data Conditioning and Linking (Aggregation,
Digitization, and Forwarding) 67
3.2.2.7 Layer 3: Network Transport (Preprocessing, Preliminary
Analytics, and Routing) 68
3.2.2.8 Layer 4: Application (Analytics, Control, and Archiving) 69
Contents ix
4 Hardware 77
4.1 Introduction 77
4.2 Hardware Components Inside IoT and Wearable Devices 77
4.2.1 Sensors 78
4.2.1.1 Sensor Properties 79
4.2.1.2 MEMS Sensors 80
4.2.1.3 Commonly Used Sensors in IoT and Wearable Devices 81
4.2.1.4 Wireless Sensors 83
4.2.1.5 Multisensor Modules 84
4.2.1.6 Signal Conditioning for Sensors 85
4.2.2 Actuators 85
4.2.3 Microcontrollers, Microprocessors, SoC, and Development
Boards 86
4.2.3.1 Selecting the Right Processing Unit for Your IoT or Wearable
Device 89
4.2.4 Wireless Connectivity Unit 90
4.2.5 Battery Technology 91
4.2.5.1 Power Management Circuits 94
4.2.6 Displays and Other User Interface Elements 95
4.2.7 Microphones and Speakers 95
4.3 Conclusion 95
Problems 96
Technical Interview Questions 97
Further Reading 97
8 Security 157
8.1 Introduction 157
8.2 Security Goals 158
8.3 Threats and Attacks 159
8.3.1 Threat Modeling 160
8.3.2 Common Attacks 161
8.4 Security Consideration 162
8.4.1 Blockchain 164
8.5 Conclusion 166
Problems 166
Technical Interview Questions 167
Further Reading 168
Index 251
Solution Manual 257
xv
About the Author
Haider currently serves as the director of the Engineering Physics program and
the Wearable Electronics Research Center (XWERC) at Xavier University in
Cincinnati, OH, USA. He was previously affiliated with California State University
and the University of Arkansas, Little Rock between 2008 and 2015.
Haider received the Ph.D. and M.S. degrees in Systems Engineering, specializ-
ing in RF Telecommunication and Wireless Systems from the University of
Arkansas at Little Rock (UALR), and the M.S. degree in Electrical and Computer
Engineering from New York Institute of Technology (NYIT).
Haider teaches several courses such as Electronic Circuits, Microprocessors
and Digital Systems, Communication Systems, Antenna Engineering, and Control
Theory. He has given over 50 lectures at universities around the world and is a
frequent speaker at international conferences. Professor Raad is also connected to
the industry through his engineering consulting firm.
Haider has published five books in the fields of Wearable Technology,
Telemedicine, and Wireless Systems. He has also published over a hundred peer-
reviewed journal and conference papers on research fields of his interest which
include: Flexible and Wearable Wireless Systems, Telemedicine and Wireless
Body Area Networks, IoT, Metamaterials, and Biomedical Electronics. He is also
the recipient of the 2019 Outstanding Teaching Award, the 19th International
Wearable Technology Conference Best Paper Award in 2017, the E-Telemed
Conference Best Paper Award in 2016, Sonoma State University’s Research
Fellowship Award in 2015, and AAMI/TEAMS Academic Excellence Award
in 2012.
Haider loves spending quality time with his family. In his free time, he enjoys
composing world, rock, and smooth jazz music. He also enjoys street photography
and artistic activities.
xvii
Preface
Everything will be connected. This is one of the rules that will govern the future.
And contrary to popular belief, the impact of Internet of Things and Wearable
Technology will be much greater than a smart light bulb or a fitness tracker.
Connecting everything will dramatically reshape our world in ways we can barely
imagine.
Locating a wandering Alzheimer’s patient by sensors embedded within lighting
poles in a smart city, or detecting if a driver is having a heart attack by analyzing
vital signs and facial expressions by a system integrated within a vehicle’s
dashboard, are just a couple of scenarios these technologies will be capable of
doing. We will also witness the fantasy of fully automated smart cities and driver-
less vehicles work in coordination with one another fairly soon.
Today, IoT and Wearable Technology are recognized as two of the fastest-
growing technologies and hottest research topics in academia and research and
development centers. Wearable devices, which are characterized by being light-
weight, energy-efficient, ergonomic, and potentially reconfigurable are expected to
substantially expand the applications of modern consumer electronics. Similarly,
there has been a massive interest in smart objects that can be connected to the
Internet allowing remote access, processing, and control, which enable innovative
services and applications. Such objects are utilized in smart homes, healthcare, power
grids, transportation, and numerous other industrial applications.
Although IoT and wearable devices are electronic systems by definition, the
study of these interrelated technologies is multidisciplinary and borrows concepts
from electrical, mechanical, biomedical, computer, and industrial engineering, in
addition to computational sciences. Having worked in this field for almost 12 years
in both academic and industrial capacities, I feel the need to compile a compre-
hensive technical resource that academically tackles the various design aspects of
these technologies.
The aim of this book is to provide an extensive guide to the design and proto
typing of IoT and Wearable Technology devices, in addition to introducing their
xviii Preface
detailed architecture and practical design considerations. The book also offers a
detailed and systematic design and prototyping processes of typical use cases,
covering all practical features. It should be noted that this book attempts to address
the design and prototyping aspects of these technologies from an engineering/
technical perspective rather than from a maker/hobbyist perspective.
The intended audience of the book encompasses both undergraduate and grad-
uate students working on projects related to IoT and Wearable Technology. The
book also serves as an extensive resource for research and development scientists,
university professors, industry professionals, and practicing technologists.
It is worth noting that familiarity with fundamental computer programming,
mathematics, electricity laws and properties, digital and information theories,
and basic networking and computer architecture is required to understand the
topics covered in this book.
Chapter 1 of this book helps the reader understand what IoT and wearables
exactly are and examine their characteristics. The chapter also provides an over-
view of the history and beginnings of IoT and Wearable Technology and aims at
demystifying the differences between the two.
Chapter 2 covers the applications of IoT and wearables in various fields. It also
provides an insight on the roles these applications could play in practice and dis-
cusses the challenges and key success factors for their adoption.
Various architectures used in IoT and wearable devices along with important
architecture concepts will be discussed in Chapter 3. Further, simplified and ver-
satile architectures are proposed to help the reader articulate the key functions
and elements of IoT and wearable devices.
Chapter 4 highlights the capabilities, characteristics, and functionality of sen-
sors and actuators with an understanding of their limitations and their role in IoT
and wearable systems. Criteria for selecting microprocessors and communication
modules will be discussed next. Additionally, deciding on a suitable energy source
with a matching application-specific power management design is discussed.
Finally, the reader will gain an understanding on how to bring these foundational
elements together to realize a smart devices that makes most IoT and wearable
use cases possible.
Chapter 5 takes a look at the characteristics and basics of the communication
protocols that IoT and wearables employ for their data exchange, along with a
dive into some of the most common technologies being deployed today.
Chapter 6 discusses the development process and design considerations that
developers must follow to guarantee a successful launch of IoT and wearable
products.
Chapter 7 provides an overview of cloud topologies and platforms, and an archi-
tectural synopsis of OpenStack cloud. Next, Edge topologies and computing tech-
nologies will be presented. It will be shown that the maximum value from an IoT
Preface xix
Acknowledgment
The author would like to thank Scott Tattersall and Mustafa Kamoona for their
efforts in co-authoring Chapter 10 of this book. He also would like to thank Colin
Terry for his help in developing the book’s solution manual, and all the book’s
reviewers for their constructive feedback.
1
1.1 Introduction
IoT and wearable technology are all about enabling connectivity among
humans and objects and unobtrusively delivering information and services to
the right person at the right time. Their potential benefits are virtually limit-
less, and their applications are radically changing the way we live and are
opening new opportunities for growth and innovation. This is just the tip of a
massive iceberg.
This chapter presents a general overview and characteristics of IoT and weara-
ble technology followed by a historical background; and finally, challenges that
face these technologies are discussed.
1 IPv6 (Internet Protocol version 6) is a network protocol launched in 2012 that enables data
communications over a packet-switched network. The explosive growth in connected devices has
driven a need for additional unique IP addresses. The previous standard IPv4 supported a
maximum of approximately 4.3 billion unique IP addresses, while IPv6 supports a theoretical
maximum of 3.4 × 1038 addresses.
4 1 Introduction and Historical Background
2 Big Data is a term that describes the diverse and large volumes of data that grow at an
increasing rate. It encompasses the volume of information, the speed at which it is created,
aggregated, and collected, and the variety of points being covered. Typically, Big Data comes
from multiple sources and takes multiple formats.
1.1 Introductio 5
Sensing &
Unique actuating
Connectivity
identity
IoT
Communication
Automation & data
distribution
Intelligence
worn on the user’s body. These devices are capable of performing several of the
tasks and functions as smartphones, laptops, and tablets. However, in some cases,
wearable devices can perform tasks more conveniently and more efficiently than
portable and hand-held devices. They also tend to be more sophisticated in terms of
sensory feedback and actuating capabilities as compared to hand-held and portable
technologies. The ultimate purpose of wearable technology is to deliver reliable,
consistent, convenient, seamless, and hands-free digital services.
Typically, wearable devices provide feedback communications of some sort to
allow the user to view/access information in real time. A friendly user interface is
also an essential feature of such devices, so is an ergonomic design. Examples of
wearable devices include smart watches, bracelets, eyewear (i.e.: glasses, contact
lenses), headgears (i.e.: helmets), and smart clothing. Figure 1.2 depicts the most
important possible forms of wearable devices.
While typical wearable devices tend to refer to items which can be placed exter-
nal to the body surface or clothing, there are more invasive forms as in the case of
implantable electronics and sensors. In the author’s opinion, invasive implanta-
bles, i.e. ingestible sensors, under the skin microchips, and smart tattoos, which
are generally used for medical and tracking purposes, should not be categorized as
wearables since they have different mechanisms and operation requirements. The
reader should seek other resources which are dedicated to the design and proto-
typing of such devices.
Forms of
wearable
technology
Sensing
Low power Connectivity
Wearable
technology
Comfort &
Fashionability
ergonomics
Intelligence
A concept where two or more An ecosystem of internet Electronic devices that can be
machines communicate and connected devices with the worn or incorporated with
perform functions without ability to collect and transfer clothing to collect, process and
human intervention information over a network to conveniently deliver data and
provide automated decision services to the user
Definition making
Typical applications
Typically not scalable or less More scalable due to its cloud Could be scalable if based on
scalable than IoT based architecture cloud
Mobility &
Scalability
Figure 1.4 A summary of the main differences between M2M, IoT, and Wearable
Technology.
10 1 Introduction and Historical Background
Today computers, and, therefore, the Internet, are almost wholly depend-
ent on human beings for information. Nearly all of the roughly 50 peta-
bytes of data available on the Internet were first captured and created by
human beings by typing, pressing a record button, taking a digital picture
or scanning a bar code. The problem is, people have limited time, attention,
and accuracy. All of which means they are not very good at capturing data
about things in the real world. If we had computers that knew everything
there was to know about things, using data they gathered without any help
from us, we would be able to track and count everything and greatly reduce
waste, loss and cost. We would know when things needed replacing, repair-
ing or recalling and whether they were fresh or past their best.
connect by ARPANET to the appliance and remotely check the availability of the
drink, and if it was cold, before making the trip to the machine. This experiment
had inspired numerous inventors around the world to devise their own connected
appliances.
After the invention of the World Wide Web by the British scientist Tim Berners-
Lee in 1989 and the launching of commercial Global Positioning System, inven-
tors had been able to develop interconnected devices way more efficiently. One of
the first examples was an Internet-connected toaster introduced by John Romkey
in 1990, which is considered by many as the first “real” IoT device.
In 1991, two academicians who worked at the computer laboratory in the
University of Cambridge set up a camera to provide live picture of a coffee pot
(known as the Trojan Room coffee pot) to all desktop computers on the office net-
work to save people working in the building time and from getting disappointed of
finding the coffee pot empty after making the trip. This invention was a true inspi-
ration for the world’s first webcam. A few years later, the coffee pot was connected
to the Internet and gained international fame until it was retired in 2001.
In the year 2000, LG announces Internet Digital DIOS, the world’s first Internet-
enabled refrigerator. The refrigerator became a buzzword despite its commercial
failure.
In 2004, Walmart Inc. required its top suppliers to assign RFID tags to cases and
pallets in place of barcodes by 2005 to enhance their supply chain operations. The
suppliers were unhappy with the new requirements as Electronic Product Code
(EPC) tags were pricey and seemed unnecessary. Walmart, subsequently, offered
the suppliers to disclose point of sales information which led to a decreased mer-
chandise thefts and labor requirements. Currently, EPC is one of the international
standards, connecting billions of “things” worldwide.
The year 2005 witnessed the first Internet-connected robot, the Nabaztag rabbit.
The bunny-shaped robot is capable of gathering weather reports, news, and stock
market updates through Wi-Fi connectivity and reading them to the consumer.
Despite its retirement in 2015 due to technological impediments, Nabaztag proved
that IoT can be integrated into everyday lives.
The First International Conference on the Internet of Things took place in
Zurich, Switzerland, in 2008. The event was the first conference of its kind with
participants from 23 countries. The same year marked the first time where more
“things” are connected to the Internet than people. A year later, Google started the
first testing of self-driving cars while St. Jude Medical officially became an adop-
ter of IoT for healthcare.
The year 2010 marks the first time IoT was recognized on a governmental level
where China’s head of government Wen Jiabao decided to pay special attention to
IoT as one of the remedies to his country’s financial crisis and adopting it across
top strategic industries. The same year also marks the first implementation of
12 1 Introduction and Historical Background
machine learning techniques in IoT devices. Nest smart thermostat was the first
IoT product to adapt to the user’s habit and thus optimizing the air conditioning
schedule.
By the year 2013, IoT had evolved into a system that utilizes multiple technolo-
gies, ranging from embedded systems and wireless communication to electrome-
chanical sensors and control systems.
In 2014, Google Inc. acquires Nest after spotting the potential behind IoT and
smart home devices in particular. Moreover, Google’s self-driving car prototype
was ready for testing on public roads but would not perform the official test drive
until the following year.
On the 6th November of the same year, Amazon releases Echo, the first
commercially successful voice-controlled ambient device and IoT hub. It is also
anticipated that Amazon’s device will be one of the most disruptive technologies
in the next generation of enterprise IoT solutions.
The Global Standards Initiative on IoT takes place in 2015. The event’s main
objective was to establish a unified approach to the development of IoT technical
standards and to support the adoption of the technology, globally.
In 2016, the automotive giant General Motors invests $500 million in Lyft aim-
ing at developing a network of self-driving cars. In the same year, Apple show-
cases HomeKit products at the Consumer Electronics show. HomeKit is a platform
that allows developers to utilize a comprehensive list of software tools for smart
home application. In the meantime Google releases Google Home, another smart
ambient device competing with Amazon’s Echo. This year also witnessed the
emergence of the first IoT malware.
In 2017, Microsoft launches Azure IoT edge that allows IoT devices to deploy
complex processing and analytics locally, while Amazon offers advanced security
features, Google releases Cloud IoT Core which allows an easier connectivity to
the cloud. Witnessing such initiatives from giant technology leaders, one can real-
ize that IoT is here to stay.
3 Claude Shannon is also known as the father of information theory with his legendary paper
“A Mathematical Theory of Communication” published in 1948. He is also well known for
founding the digital circuit design and cryptanalysis theories in 1930s when he was in his early
twenties as a master’s student at the Massachusetts Institute of Technology (MIT).
Edward Oakley “Ed” Thorp was an American mathematics professor at the University of
California, Irvine between 1965 and 1977, author of the books (Beat the Dealer and Beat the
Market), and blackjack player. He is best known as the “father of the wearable computer.”
14 1 Introduction and Historical Background
Figure 1.5 The pulsar calculator LED watch released in 1975. Source: Photo courtesy of
Piotr Samulik.
Figure 1.6 Steve Mann wearing one of his wireless wearable webcam. Source: Glogger,
https://commons.wikimedia.org/wiki/File:SteveMann_with_Generation-4_Glass_1999.jpg.
Licensed Under CC BY-SA 3.0.
In 2003, the Garmin Forerunner, a watch that tracks the user’s performance,
emerged which was immediately followed by popular fitness trackers we all know
today such as the Nike+, Jawbone, and Fitbit.
Toward the end of 2000s, several Chinese companies started producing Global
System for Mobile (GSM) phones integrated within wristbands and equipped with
mini displays. On the other hand, the first smart watch, Pebble, came to the scene
in 2012, followed by the much-hyped Apple Watch in 2014.
Future wearables may enable new functions and services that one could barely
imagine, but it is clear to see how early wearables evolved into the fascinating
devices we enjoy today.
Figure 1.7 The Apple watch. Source: Photo courtesy of Apple Inc.
the user’s biometric data including heart rate, blood pressure, temperature,
calories, and sleep patterns.
Another hot wearable, Fitbit, is capable of measuring personal fitness metrics
such as the number of steps walked or climbed, heart rate, sleep patterns, and
even stress levels (Figure 1.8).
On the other hand, many argue that the most innovative wearable device of the
decade is the Google Glass, which is fundamentally a pair of glasses equipped
with a built-in microprocessor and a bundle of peripherals such as a mini display
embodies by a 640 × 360 pixels prism projector that beams out a viewing screen
into the user’s right eye, a gesture control pad, a camera, and a microphone. The
Glass runs a specially designed operating system (Glass OS) and has 2 GB of RAM
and 16 GB of flash storage, in addition to a gyroscope, an accelerometer, and a
light sensor. Through such peripherals, the user could connect to his/her smart-
phone, access mobile Internet browser, camera, maps, and other apps by voice
commands. It accesses the phone through Wi-Fi and Bluetooth which are enabled
by the wireless service of the user’s mobile phone.
1.1 Introductio 17
Figure 1.8 Fitbit Surge smart watch fitness tracker. Source: Photo courtesy of Fitbit©.
Google released the consumer version of Glass in 2013 amid much fanfare, but it
failed to gain commercial success. The Glass also faced serious criticism due to con-
cerns that its use could violate current privacy laws. In 2017, Google launched the
Glass Enterprise Edition after deciding that the Glass was better suited to workers
who need hands-free access to information, such as in health care, manufacturing,
and logistics. In 2019, Google has announced a new version of its Enterprise Edition
which has an improved processor, camera, charging unit, and various other updates.
One can imagine a considerable number of applications this technology is capa-
ble of creating. In fact, the Glass is already being utilized in a number of areas once
considered “futuristic.” For example, Augmedix, a San Francisco based company,
developed a Glass app that allows physicians to livestream the patient visit. The
company claims that electronic health record problems will be eliminated, and
their system would possibly save doctors up to 15 hours a week.
In 2013, Rafael Grossmann was the first surgeon to demonstrate the use of Google
Glass during a live surgical procedure. In the same year, the Glass was used by an
Ohio State University surgeon to consult with another colleague, remotely.
Obviously, such technology could have a positive impact on the lives of people
with disabilities. For example, one application is designed to enable parents to
swiftly access sign language dictionary through voice commands in order to
communicate effectively with their deaf children.
18 1 Introduction and Historical Background
Figure 1.9 Explorer edition of Google Glass©. Source: Photo courtesy of Google Inc.
Using a smart glass technology in the tourism and leisure industry, the experi-
ence of tourists could be substantially improved. Attractions and museum tours
can be immensely enhanced by displaying text or providing audible information
when recognizable buildings, sculptures, and artwork are detected. Users will also
be able to capture photographs and videos more conveniently, i.e. via voice com-
mand or a wink of an eye. Another helpful application dedicated to break the
language barriers when traveling provides instantaneous translation. Any text vis-
ible to the Glass field of view can be translated via voice commands (Figure 1.9).
Boeing is using the Glass to help their assembly crew in the connecting aircraft
wire harnesses, which is a very lengthy process that requires a high volume of
paperwork. The crew now could have a hands-free access to the needed informa-
tion using voice commands.
Stanford University is conducting a breakthrough research dedicated to help
autism patients read the emotions of others using the Glass by utilizing facial
recognition software to determine the emotions expressed on the people’s faces
projected within the display.
In 2014, Novartis and Google X (now X)5 started the testing of a smart contact lens
in the field of telehealth.6 The lens is equipped with a miniaturized glucose sensor
that continuously tracks blood sugar levels through the diabetic patient’s tears and
communicates the data to a smartphone through a wireless module. In 2018, Verily
5 X is an American semi-secret R&D center founded by Google in 2010 with the name Google
X. The company’s first project was Google’s self-driving car. It is located about 0.5 mile from
Google’s headquarters in Mountain View, California.
6 Telehealth, also known as Telemedicine, is providing healthcare services from a distance through
the use of telecommunication and information technologies. It came as a solution to improve
access to healthcare services that would not be readily available, especially in remote regions.
1.1 Introductio 19
Sensor
detects glucose in tears
Figure 1.10 Infographic photo of the Google Smart Lens©. Source: Photo courtesy of
Google Inc.
(a former division of Google X) announced that the lens project has been dismissed
due to the lack of correlation between blood glucose and tears (Figure 1.10).
However, competitors started to take advantage of Google’s lens failures to work on
developing their own smart eye wearables. For example, EPGLMed is working with
Apple, to develop a smart lens that corrects vision on-demand by changing the
curvature of the lenses through a smartphone app.
In summary, the applications of wearable technology are extremely powerful
and they are evolving rapidly. It is crystal clear that this technology is here to stay.
1.1.5 Challenges
While the IoT and wearable technology continue to transform our lives in the
twenty-first century, significant challenges that could stand in the way of realizing
its full potential are coming to light. Below are the major challenges that require
full attention:
1.1.5.1 Security
Security is one of the cornerstones of the Internet and is the most significant chal-
lenge for IoT and wearable devices. The hacking of fitness trackers, security cam-
eras, baby monitors, and other abuses has drawn the attention and serious
concerns of major tech firms and government agencies across the world.
While security considerations are not new in the realm of information technol-
ogy, the characteristics of many IoT and wearable technology deployments intro-
duce new and unprecedented security challenges. Addressing these challenges
and ensuring secure IoT and wearable products and services must be a top
20 1 Introduction and Historical Background
priority. As these technologies are becoming more pervasive and integrated into
our daily lives, users need to be assured that these devices and associated data are
secure from vulnerabilities such as cyber-attacks and data exposure.
The more consequential shift in security will come from the fact that IoT and
wearable technology will become more integrated into our daily activities.
Concerns will no longer be limited to protecting our sensitive data and assets.
Our own lives and health can become the target of malicious attacks.
This challenge is further amplified by other considerations such as the mass-scale
production of identical devices, the ability of some devices to be automatically
paired with other devices, and the potential deployment of these devices in unsecure
environments.
1.1.5.2 Privacy
While many of the emerging IoT and wearable technologies are giving rise to a
spectrum of new applications and innovative uses, as well as promising and
attractive benefits, they also pose privacy concerns that are largely unexplored.
In fact, a new research area concerning the security and privacy of these tech-
nologies has recently emerged. Additionally, the need for the majority of wear-
able devices and a good number of IoT systems to interact and share data with
an access point (i.e. a smart watch to smartphone, medical monitoring device
to a home server, smart bulb to an ambient home assistant) along with other
sensors and peripherals would certainly create a new class of privacy and secu-
rity hazards.
Some IoT and wearable devices deploy various sensors to collect a wide
spectrum of biological, environmental, behavioral, and social information
from and for their users. Clearly, the more these devices are incorporated into
our daily lives, the greater the amount of sensitive information will be trans-
ported, stored, and processed by these devices, which also elevate privacy
concerns.
Moreover, integrated voice recognition or monitoring features are continuously
listening to conversations or video record activities and selectively transmit
such potentially sensitive data to a cloud service for processing, which
sometimes involves a third party. Handling and interacting with such infor-
mation unveil legal and regulatory challenges facing data protection and
privacy laws.
One specific privacy concern associated with the emerging smart glasses is that
they allow users to simultaneously record and share images and videos of people
and their activities in their range of vision, in real time. This problem will soon be
intensified when such devices are integrated with facial recognition programs
which will allow users to see the person’s name in the field of view, personal infor-
mation, and even visit their social media accounts.
1.1 Introductio 21
1.1.5.5 Connectivity
According to recent research reports, around 22 billion IoT and wearable devices
will be connected to the Internet by 2020. Thus, it is just a matter of time before
users begin to experience substantial bottlenecks in IoT connectivity, proficiency,
and overall performance.
Currently, a big percentage of connected devices rely on centralized and server/
client platforms to authenticate, authorize, and connect additional nodes in a given
network. This model is sufficient for now, but as additional billions of devices join
the network, such platforms will turn into a bottleneck. Such systems will require
improved cloud servers that can handle such large amounts of information traffic.
This is already being addressed by the academic and industrial community which is
pushing toward decentralized networks. With such networks, some of the tasks are
moved to the edge, such as using fog computing, which takes charge of time-sensi-
tive operations (this will be discussed in detail in chapter 7), whereas cloud servers
take on data assembly and analytical responsibilities.
1.2 Conclusion
IoT and wearable devices are enabled by the latest developments in smart sensors,
embedded systems, and communication technologies and protocols. The fundamen-
tal premise is to have sensors and actuators work autonomously without human
involvement to deliver a new class of applications. The recent technological revolu-
tion gave rise to the first phase of the IoT and wearable devices, and in the next few
years, these devices are expected to bridge diverse technologies to enable novel appli-
cations by connecting physical objects together in favor of intelligent decision making.
Benefits are substantial, but so are the challenges. This will require businesses, gov-
ernments, standards bodies, and academia to work together toward a common goal.
In short, IoT and wearable technology are representative icons of the most
recent industrial revolution. Given that we advance and evolve by transforming
data into information, knowledge, then into wisdom, these technologies have the
potential to change the world as we know it today, in new and exciting ways.
Problems
1 What are the main differences between IoT and wearable technology?
4 Can you think of other potential challenges found in IoT and wearable tech-
nology other than the ones mentioned in this chapter?
8 List four components common between IoT and wearable devices (an appli-
cation of your choice).
10 If you are asked to add more somewhat essential characteristics to IoT, what
would they be? Why?
Interview Questions
7 What will happen in terms of jobs losses and required skills as IoT makes
devices more intelligent?
9 What is the difference between the “Things” in “Internet of Things” and sensors?
Further Reading
Aazam, M. and Huh, E.-N. (2014). Fog computing and smart gateway based
communication for cloud of things. Proceedings of the 2nd IEEE International
Conference on Future Internet of Things and Cloud (FiCloud ’14), Barcelona, Spain
(August 2014), pp. 464–470.
Atzori, L., Iera, A., and Morabito, G. (2011). SIoT: giving a social structure to the
Internet of Things. IEEE Communications Letters 15 (11): 1193–1195.
Bertolucci, J. (2010). Reliability report card: grading tech’s biggest brands. PC World
27 (2): 82–92. Chan, J. November 4.
Erfinder, A., Engebretson, A.M., Morley, R.E. Jr., and Popelka, G.R. (1984). Hearing
aids, signal supplying apparatus, systems for compensating hearing deficiencies,
and methods. US Patent 4548082.
Guo, B., Zhang, D., Wang, Z. et al. (2013). Opportunistic IoT: exploring the
harmonious interaction between human and the internet of things. Journal of
Network and Computer Applications 36 (6): 1531–1539.
Hayes, A. (2017). A brief history of wearable computing. Bradley Rhodes - MIT
Media Lab, MIT Wearable Computing Project. https://www.media.mit.edu/
wearables/lizzy/timeline.html (accessed January 2017).
Holland, J. (2016). Wearable Technology and Mobile Innovations for Next-Generation
Education. Hershey, PA: IGI Global, ISBN-13:9781522500698.
Khaleel, H.R. (2014). Innovation in Wearable and Flexible Antennas. Southampton,
UK: WIT Press.
Liang, G., Cao, J., and Zhu, W. (2013). CircleSense: a pervasive computing system for
recognizing social activities. Proceedings of the 11th IEEE International Conference
on Pervasive Computing and Communications (PerCom ’13) (March 2013). San
Diego, CA: IEEE, pp. 201–206.
Mashal, I., Alsaryrah, O., Chung, T.-Y. et al. (2015). Choices for interaction with
things on Internet and underlying issues. Ad Hoc Networks 28: 68–90.
MISTRAL (2011). The sensor cloud the homeland security. http://www.
mistralsolutions.com/hs-downloads/tech-briefs/nov11-article3.html (accessed
March 2020).
NIEPMD (2014). National Institute for Empowerment of Persons with Multiple
Disabilities (Manual), ISBN: 978-81-928032-1-0.
Peña-López, I. (2005). Itu Internet Report 2005: the Internet of Things, Report no. 7.
Popat, K.A. and Sharma, P. (2013). Wearable computer applications a future
perspective. International Journal of Engineering and Innovative Technology (IJEIT)
3 (1): 213–217.
Raad, H. (2017). The Wearable Technology Handbook. Ohio: United Scholars
Publications.
Further Readin 25
Raj, P., Raman, A.C., Nagaraj, D., and Duggirala, S. (2015). High-Performance Big
Data Analytics: The Solution Approaches and Systems. London, UK: Springer-
Verlag http://www.springer.com/in/book/9783319207438 (accessed July 2019).
Said, O. and Masud, M. (2013). Towards internet of things: survey and future vision.
International Journal of Computer Networks 5 (1): 1–17.
Schnell-Davis, D.W. (2012). High tech casino advantage play: legislative approaches
to the threat of predictive devices. University of Nevada, Las Vegas Gaming Law
Journal 3: 299–346, Fall.
Sheng, Z., Yang, S., Yu, Y. et al. (2013). A survey on the IETF protocol suite for the
internet of things: standards, challenges, and opportunities. IEEE Wireless
Communications 20 (6): 91–98.
Thorp, E.O. (1969). Optimal gambling systems for favorable games. Review of the
International Statistical Institute 37: 273–293.
Thorp, E.O. (1979). Systems for Roulette I. Gambling Times (January/February 1979).
Thorp, E.O. (1984). The Mathematics of Gambling. Secaucus, NJ: Lyle Stuart.
Vermesan, O., Friess, P., Guillemin, P. et al. (2011). Internet of things strategic
research roadmap. In: Internet of Things: Global Technological and Societal Trends,
vol. 1 (eds. O. Vermesan and P. Friess), 9–52. Aalborg, Denmark: River Publishers.
27
Applications
2.1 Introduction
As emerging technologies, IoT and wearables have given rise to a number of inno-
vative applications and enabled the integration of smarter functionalities to out-
dated technologies. Not too long ago, such technology integrations were considered
science fiction. This chapter covers the applications of IoT and wearables in vari-
ous fields. It also provides an insight on the roles these applications could play in
practice and discusses the challenges and key success factors for their adoption.
It is worth noting that several studies agree that placing fitness trackers on the
user’s hip or foot rather than the wrist would result in more accurate readings.
Even the most accurate fitness trackers in the market could overestimate step
count in some scenarios and misinterpret exaggerated gestures as steps. This fact
has motivated some wearable tech companies to design smart socks, bras, and
undergarments. For example, one smart health tracking socks is capable of track-
ing the user’s personal health metrics and offering higher accuracy in measuring
steps, velocity, altitude, and burnt calories through their unique foot-landing and
weight distribution techniques. The device consists of a cuff-shaped fitness tracker
which magnetically connects to the product’s running-friendly fabric. The product
can also communicate with a smart phone app, keep logs of the user’s activities,
and guide them via audio cues during an activity.
Another wearable product in the area of well-being is a wristwatch that utilizes
ultraviolet sensors to track the levels of sunlight exposure received by the body.
The data are then visualized via LED lights that start to flicker when the user’s
ultra violet exposure is within the dangerous level. Such device would be very
practical in countries with high skin cancer rates (i.e., Australia, New Zealand,
Argentina, Denmark, and parts of USA) due to excessive exposure to ultravio-
let energy.
One of the main reasons IoT technology has had such an impact on the fitness
industry is the visibility it offers. Regardless of the user’s exercise goals, their pri-
mary objective is to improve in some area and be able to quantify such improve-
ments. Through continuous data collection, analysis, and visualization, IoT
provides the users with unprecedented visibility to track personal growth. For
example, IoT-driven smart home bikes and elliptical workout machines that fea-
ture streaming workouts, cycling classes, and other digitally connected features
are on the rise. Such equipment offers flexibility for people with no time to go to a
gym and the sense of participating in real classes. Such demand has also triggered
software enterprises, such as Kaa, to develop IoT platforms that deliver produc-
tion-ready capabilities into smart sport and fitness products. Such platforms allow
manufacturers to automatically aggregate and analyze data from virtually any
sensors, fitness trackers, and smart sports equipment, and then visualize it on
equipment displays and/or mobile devices.
2.2.3 Sports
Today, IoT and wearable technology play a vital role in sports through athlete
development and safety, and fan engagement and experience. Organizations are
investing billions of dollars on smart stadiums where IoT is used to improve digi-
tal engagement and in-arena experience. Fans can have an immersive experience
with their favorite teams and athletes like never before.
2.2 IoT and Wearable Technology Enabled Application 31
In the area of player development, IoT is transforming the way coaches coordinate
training, manage players, and address essential situations in every game.
Integrating advanced game analytics with sensors, coaches can easily access vast
amounts of processed data to obtain players’ efficiency and performance metrics,
in addition to opponent shortcomings to develop a more educated in-game strat-
egy. Moreover, embedded sensors and microchips offer sport physicians and ther-
apists real-time health tracking which provides a holistic view of the athlete’s
state, allowing them to make a more informed decision for the athlete’s longevity
and health status.
For example, Adidas is working with professional soccer teams in parts of the
United States to monitor the heart rate and other metrics of players using its
miCoach wearable technology. The aggregated data are analyzed by coaches to
track the athletes’ performance and have the best decision on scheduling breaks
to minimize the risk of injury. Other sensing devices are worn underneath the
athletes’ garments and used to monitor other key parameters including velocity,
orientation, acceleration, blood pressure, and heart rate, which then sent to the
coach’s console.
Another sports wearable device is designed for alpine sports with onboard pro-
cessing power, sensory, and networking capabilities comparable to that of a smart-
phone. The wearable gear is intended for skiers and snowboarders to stay
connected. It is capable of displaying the user’s speed and altitude, route maps,
and social network profiles and locations of other skiers in the resort. It simply
gives the user the power of a smartphone integrated into their field of vision,
hands-free.
There are other wearable products available for hobbyists which are capable of
tracking heart rate, muscle tension, and breathing patterns, and alert the users via
text or push notification. Other products include smart sport apparatus such as a
baseball that can detect and display the speed, spin rate, and pitching trajectory
when thrown.
Wearable devices with haptic feedback and gesture control are now used to
make innovative forms of music. For instance, Imogen Heap, an English singer
and composer, introduced smart gloves which utilize gestures and motions to cre-
ate digital music.
Some theme parks around the world started to employ wearable technology to
enhance the entertainment experience of tourists. For example, Disney intro-
duced a smart wristband to help tourists navigate their theme parks. The tourist
information is linked to a database by the smart band which also serves as an
admission ticket, hotel key, and credit card. Tourists are able to schedule their
visits to each theme park and preorder food without the need to wait in the
extremely long lines.
Market research reports that the global market for the wearable interfaces of
virtual reality is estimated to reach 1 billion US dollar by 2020. It is also expected
that the use of wearables such as wristbands, earbuds, and eyewear will increase
exponentially in gaming platforms as control devices for the virtual reality and
biometric gaming market due to their potential to accurately track the gamer’s
movements. According to one company that develops biometric technology for
wearables, an exciting potential application in immersive gaming may include
action games that require gamers to hold their breath while the character is under
water. Another application would be for the user’s heart rate to directly affect their
accuracy in a shooting-based game.
2.2.5 Pets
In 2017, American Humane organization reported that around 10 million cats and
dogs are either stolen or lost in the United States every year. It is also estimated
that about 60% of cats and 56% of dogs in the United States are either obese or
overweight. Such statistics have driven innovators to find IoT and wearable solu-
tions dedicated to pets.
According to a recent market report, the global revenue of pet wearables market
was $1.4 billion in 2018, and is expected to reach 2.36 billion US dollar by 2022.
The growth in pet ownership and expenditure is expected to push product demand
over the forecast period. Moreover, the increased awareness toward pet health is
driving substantial investment for research and development of even more
advanced wearable products for pets. One example of a pet wearable is an on-
collar tracker that is able of collecting data of the pet’s physical activity through a
smartphone app and keeping records of its behavior. Such behavioral data allow
pet owners to determine whether the pet is potentially ill or has some condition;
it also allows owners to track the location of their pets.
While most IoT products emphasize on the health and security for pets, there
are other areas in which IoT can be helpful for pet owners, such as pet toys and
2.2 IoT and Wearable Technology Enabled Application 33
feeders. Feeders can help automate the precise portion that a pet should have
while also dispensing food when the owner is away. Some apps even have the
capability to remotely unlock and lock home doors to allow access for dog walkers
and pet sitters.
2.2.8 Aerospace
Until recent times, astronauts relied on printed instruction manuals in case of
emergency or system error. Such issues force the crew to call the ground station
for guidance. However, telecommunication becomes impractical the farther a
spacecraft is away from earth. For example, it could take up to 25 minutes for a
message to travel from Mars to Earth. To overcome such problems, the U.S. National
Aeronautics and Space Administration is developing smart glasses for astronauts
that can guide them through a repair process or conducting an experiment in
outer space, hands-free.
IoT is revolutionizing the aerospace industry, both on the ground and in the air.
Real-time analytics via IoT are already pushing improvements in quality and
2.2 IoT and Wearable Technology Enabled Application 35
2.2.9 Education
Many educators are starting to realize that the emerging digital technologies could
offer an opportunity to enhance the learning experience instead of being a distrac-
tion. In fact, many studies are confirming the advantageous potential of using IoT
and wearable technology as pedagogical tools.
For more than three decades, Microsoft’s PowerPoint has served educators in
almost every discipline as an indispensable illustrative tool. However, postmillen-
nial generations will most likely enjoy a more immersive classroom and learning
experience that go beyond a simple slideshow. In response to this, hundreds of
classrooms across the world have already started to deploy wearable and IoT plat-
forms to transform the learning experience of students. For example, Google
Expeditions, an educational initiative introduced by Google, uses folded card-
board with a pair of specially designed lenses to turn a smartphone into a virtual
reality headset. This gadget lets students have an immersive visual learning expe-
rience. The gadget serves as a great tool for active and hands-on learning where a
user can virtually explore places such as the Great Wall of China, the Grand
Canyon in the United States, or Rome in Italy.
“The creativity we have seen from teachers, and the engagement from students,
has been incredible.”, as reported by Google’s product manager for Expeditions.
This is one example where technology in education, if used properly, can enhance
the student’s creativity and learning experience without distractions.
IoT could also help schools improve the safety of their campuses, keep track
of essential resources, and improve access to information. Connected devices
can be used to monitor students, staff, and equipment at a reduced operat-
ing cost.
Last but not least, using IoT-enabled devices is an effective way to provide edu-
cational assistance to disabled students. Hearing-impaired students may utilize a
system of smart gloves and a tablet or a smartphone to translate from sign lan-
guage to verbal speech, and vice versa.
36 2 Applications
2.2.10 Fashion
Today, when we discuss the topic of wearable technology, the first thing that
comes to mind is the plain-looking smartwatches and fitness trackers which, from
the fashion critics’ perspective, are still lacking in “style.” As wearable technology
is marching toward becoming mainstream, developers realize that collaborating
with fashion designers is crucial to create trendy products people would actually
want to buy.
One of the first wearable industry–fashion collaborations was between Martian
and Guess to produce the Guess Connect Smart Watch. Tory Burch has also
designed various accessory that go with Fitbit fitness tracker. Swarovski is also
collaborating with Misfit trackers on the Misfit Shine fitness wristband which can
be controlled by a large Swarovski crystal. More interestingly, there is a solar pow-
ered version, which utilizes light refracted by the crystal to power the tracker.
Tag Heuer’s first smartwatch released in 2015 was one of the most significant
collaborations between a watchmaker and a high tech company. The Tag Heuer
Connected was a collaborative work of Intel and Google, running Android Wear
embodied by custom Tag Heuer skins.
The fashion guru Ralph Lauren has also entered the scene with the Polo Tech
Shirt. The smart shirt has sensors woven into the shirt fabric which are capable of
tracking metrics such as heart rate, pressure, temperature, and breathing patterns.
Needless to say, such smart shirts come with a hefty price tag.
customers would not be possible without IoT. For example, the jewelry maker
Swarovski is using virtual reality to create new forms of customer experiences,
such as watching the process of product creation, or making a purchase at the
store, all while wearing a virtual reality headset.
Smart mirrors, for example, are being used by high-end retailer Neiman Marcus
in New York City. Smart mirrors allow customers to search for other sizes or colors
when trying a product, suggest matching items, or even show how a product
might fit without physically trying them. By providing immersive experience, sup-
plemental information, and a fluid customer experience, Neiman’s smart mirror
was able to expand sales.
It is obvious that with several IoT applications in areas such as dynamic pricing,
smart shelves, and inventory management it is possible to accomplish multiple
potential outcomes. IoT is also capable of facilitating the ongoing optimization of
business processes and even shaping the employee engagement and performance.
In some industries, IoT is already being used in supply chains to autonomously
execute transactions when certain conditions are met.
2.2.12 Industry
In industrial settings, the potential market for wearable technology solutions is
expected to exceed that of the general smart living consumer market. Firms in the
field of services have already witnessed the impact of wearable technology, with
technicians and engineers wearing camera-based headsets while on field jobs. For
example, Vuzix produces a variety of glasses and headsets that offer innovative
solutions for warehouse management systems. Fujitsu, on the other hand, is
focusing on a smart glove product designed for industrial maintenance and on-
site operations. The glove is integrated with a Near Field Communication (NFC)
tag reader and features a gesture-driven input controller.
analyzing, and delivering invaluable insights that can help drive smarter and
faster business decisions.
IIoT tool-based advanced analytics solutions help industries increase asset reli-
ability and availability while minimizing maintenance costs and preventing oper-
ational risks. For example, one tool is designed to increase field service efficiency
and improve customer experience. The tool enables dispatchers to schedule and
dispatch servicing jobs, while guiding technicians to accomplish an optimized
service delivery by providing expert instructions, equipment data, and customer
information. Another tool developed by General Electric (GE) is aimed at helping
operators take the right actions to take every time utilizing model-based high per-
formance Human–Machine Interface (HMI) for faster response and development.
Such IIoT solutions are helping industrial organizations drive substantial gains
in productivity, availability, and longevity.
Security
Lighting Locks
Thermostat Appliances
Irrigation
Power
Connectivity
home devices on electricity, water, and gas consumption, users can easily identify
the energy-wasting points and habits and adjust usage accordingly (Figure 2.1).
It is also anticipated that IoT will have a positive impact on the environment.
Gadgets that give us insights and help people conserve energy, water, and
resources, or sensors that measure radiation, air and water quality, or detect
hazardous chemicals, already exist in the market, but there are also more
innovative ways IoT is used, such as in preservation of biodiversity, prevention of
deforestation, and poaching. For example, deforestation accounts for 15% of global
emissions from carbon. Some organizations have initiated IoT projects aiming at
preventing further deforestation by stopping illegal activities through smart
sensors attached to trees that allow them to remotely monitor and detect illegal
logging and poaching.
by a concealed mechanism under the bra’s hook. Every time the bra is taken off, it
notifies the user’s smartphone, which in turn generates a tweet. The tweet, for
example, will read: “Kelly has just unhooked her bra. When you do the same,
don’t forget about your self-exam.”
The Aurora Dreamband is the first smart wearable gadget designed to enhance
the awareness and perception of rapid eye movement (REM) dreaming. Aurora
analyzes the user’s brainwaves and body movements using an accelerometer,
EEG, ECG, EMG, and EOG sensors.
There are also the connected egg tray that notifies the user when they’re about
to be out of eggs, and smart water bottles that could pair with an app over
Bluetooth, then constantly remind the user to stay properly hydrated!
Cities and metropolitan areas are vital to global economic development. The con-
centration of people and businesses in cities promotes ideal conditions that give
rise to new industries and technological innovation. In the United States, urban
metropolitan areas are home to 85.7% of the country’s population, 87.7% of total
employment, 87.9% of total income, and 98.9% of the increase in Gross Domestic
Product (GDP), which is a monetary measure of the market value of goods and
services. However, cities are under a rising pressure due to the exponential growth
in urban population which is leading to drained infrastructure and resources. For
instance, most densely populated cities suffer from traffic congestion, which in
turn gives rise to air pollution and health issues. Other challenges facing urban
areas include public safety and the difficulties experienced by an aging society.
Cities need to make determined efforts to deal with such issues in order to main-
tain economic success and remain attractive to citizens. To achieve this, many cit-
ies are investing in smart city projects to improve efficiency, handle complexity,
and enhance the citizens’ quality of life.
The term “smart city” was conceived toward the end of the past century. It is
based on the implementation of information and communication technologies in
applications dedicated for future cities and their development. Smart cities pro-
mote progressive social and technological innovations and link existing infra-
structures with an eye toward optimizing the quality of life. They incorporate
novel energy, traffic, and transportation concepts with minimal adverse effects on
the environment. They also focus on new forms of governance and public involve-
ment, and finding remedies to the current global challenges, such as climate
change and shortage of resources.
2.3 Smart Citie 43
Functional areas of smart cities include but are not limited to:
●● Traffic and transportation which include smart ticketing, smart parking, and
autonomous transport systems.
●● Energy and resources which include smart grid, environmental sensors, and
irrigation management.
●● Urban infrastructure which includes smart street lighting, smart buildings, and
waste management systems.
●● Smart Governance which includes consolidated services platforms and report-
ing systems.
●● Safety and security which include integrated video surveillance and predictive
analytics.
●● Health care which includes telemedicine and remote patient monitoring.
Figure 2.2 depicts the major areas where a smart city can incorporate.
Education
Environment Transportation
Smart
city Homes
Governance and
Buildings
Living Infrastructure
Resources
and Facilities
services
2.5 Conclusion
IoT and wearable technology are ripe for new and creative ideas to add to the
applications already in use. They provide a nearly endless supply of opportunities
to interconnect our devices and equipment. When it comes to innovation, this
field is wide open, and such connectedness will substantially reshape our world in
ways we can barely imagine.
Problems 45
Accident
detection
Autonomous Driving
driving behavior
Safety Location
and and
insurance tracking
Infotainment
Maintenance and
services communication
Problems
1 Can you think of more applications (other than the ones listed in this chapter)
that could benefit from IoT and wearables?
6 List five unusual applications where IoT and wearables are utilized. Keep effi-
ciency and practicality in mind, and make sure that no products exist that
support such applications (through an internet search).
46 2 Applications
8 Write a one page scenario where at least ten of the applications mentioned in
this chapter are utilized in a typical day.
Interview Questions
3 What are the key differences between Consumer IoT and Industrial IoT?
4 What are the different sectors where the IoT can actually add value to the cur-
rent processes?
5 What are the main areas that could benefit from IoV?
6 What is a smart city and why do you think IoT is a crucial enabler of this concept?
8 Which IoT and wearable sector has the most impact/revenue share?
Further Reading
Abbasi, M.A.B., Nikolaou, S.S., Antoniades, M.A. et al. (2017). Compact EBG-backed
planar monopole for BAN wearable applications. IEEE Transactions on Antennas
and Propagation 65 (2): 453–463.
Adjih, C., Baccelli, E., Fleury, E. et al. (2015). FIT IoT-LAB: A large scale open
experimental IoT testbed. IEEE World Forum on Internet of Things (IEEE WF-IoT),
Milan, Italy (December 2015).
Aho, A.V., Sethi, R., and Ullman, J.D. (1986). Compilers, Principles, Techniques.
Boston, MA: Addison Wesley.
Alrawi, O., Lever, C., Antonakakis, M., and Monrose, F. (2019). SoK: security evaluation
of home-based IoT deployments. IEEE Security and Privacy (SP), NY, USA.
Amazon AWS IoT (2018). The internet of things with AWS. https://aws.amazon.com/
iot/ (accessed February 2020).
Further Readin 47
Hazarika, P. (2016). Implementation of smart safety helmet for coal mine workers.
Proceedings of the 1st IEEE International Conference on Power Electronics,
Intelligent Control and Energy Systems, Delhi, India (4–6 July 2016), pp. 1–3.
Heintzman, N.D. (2016). A digital ecosystem of diabetes data and technology:
services, systems, and tools enabled by wearables, sensors, and apps. Journal of
Diabetes Science and Technology 10: 35–41.
Stanford Medicine (2020). The Autism Glass Project at Stanford Medicine. http://
autismglass.stanford.edu/ (accessed March 2020).
Luckerson, V. (2015). Google will stop selling glass next week. Time Magazine (15
January 2015). http://time.com/3669927/google-glass-explorer-program-ends/.
Elgan, M. (2016). Why a smart contact lens is the ultimate wearable. Computer World
(9 May 2016). http://www.computerworld.com/article/3066870/wearables/.
Google.com (2020). Google developers, platform overview. https://developers.google.
com/glass/develop/ (accessed September 2020).
Pierce, D. (2015). iPhone killer: The secret history of the Apple watch, Wired.com.
https://www.wired.com/2015/04/the-apple-watch/ (May 2015).
IBM (2017). Connected cars with IBM Watson IoT. https://www.ibm.com/internet-
of-things/iotsolutions/iot-automotive/connected-cars/ (accessed on 03
October 2017).
IEEE (2015). Toward a definition of Internet of Things (IoT).
Iliopoulos, M. and Terzopoulos, N. (2016). Wearable miniaturization: dialog’s DA14580
bluetooth® smart controller and bosch sensors. Dialog Semiconductor, 7 March 2016.
Khaleel, H.R. (2014). Innovation in Wearable and Flexible Antennas (book).
Southampton, UK: WIT Press.
Intel (2016). Data is the new oil in the future of automated driving. Intel Newsroom
(15 November 2016).
Iqbal, M.H., Aydin, A., Brunckhorst, O. et al. (2016). A review of wearable technology
in medicine. Journal of the Royal Society of Medicine 109 (10): 372–380.
ISO (2018). ISO/IEC JTC 1/SC 41 - Internet of things and related technologies.
ITU (2012). Overview of the internet of things. https://www.itu.int/rec/T-REC-
Y.2060-201206-I. (accessed January 2020).
Jagan Mohan Reddy, N. and Venkareshwarlu, G. (2013). Wireless electronic display
board using GSM technology. International Journal of Electrical, Electronics and
Data Communication, ISSN: 2320-2084 1 (10): 50–54.
Kotz, D., Gunter, C.A., Kumar, S., and Weiner, J.P. (2016). Privacy and security in
mobile health – a research agenda. IEEE Computer 49 (6): 22–30.
Lymberis, A. and Dittmar, A. (2007). Advanced wearable health systems and
applications. IEEE Engineering in Medicine and Biology Magazine 26 (3): 29.
Lyons, K. (2015). What can a dumb watch teach a smartwatch? Informing the design
of smartwatches. Proceedings of the 2015 ACM International Symposium on
Wearable Computers, Osaka, Japan, pp. 3–10, 2015. 6.
50 2 Applications
Stankovic, J. (2014). Research directions for the internet of things. Internet of Things
Journal, IEEE 1 (1): 3–9.
Starner, T. and Martin, T. (2015). Wearable computing: the new dress code. Computer
48 (6): 12–15. 5.
ThingsWorx (2018). PTC: industrial IoT. https://www.ptc.com/en/about (accessed 20
June 2018).
Tian, Y., Zhang, N., Lin, Y.-H. et al. (2017). SmartAuth: user-centered authorization
for the internet of things. USENIX Security Symposium, Vancouver, BC, Canada.
TREND MICRO (2014). Understanding the Internet of Things (IoT).
UC Website (2015). UC workshop: using Google Glass in class. http://www.canberra.
edu.au/aboutuc/media/monitor/2014/may/9-google-glass (accessed 25 June 2015).
United States Department of Defense (2016). DoD policy recommendations for the
Internet of Things (IoT). https://www.hsdl.org/?abstract&did=799676 (accessed 09
April 2018).
United States Government Accountability Office (2017). Internet of things status and
implications of an increasingly connected world. https://www.gao.gov/
assets/690/684590.pdf (accessed December 2019).
Vallée-Rai, R., Co, P., Gagnon, E. et al. (1999). Soot: a Java bytecode optimization
framework. Centre for Advanced Studies on Collaborative Research, Mississauga,
Ontario, Canada.
WEF (2015). Industrial internet of things: unleashing the potential of connected
products and services. http://www3.weforum.org/docs/WEFUSA_
IndustrialInternet_Report2015.pdf (accessed March 2020).
Wright, A. (2017). Mapping the internet of things.
Wright, R. and Keith, L. (2014). Wearable technology: if the tech fits, wear it. Journal
of Electronic Resources in Medical Libraries 11 (4): 204–216. 3.
Yashiro, T. (2013). An Internet of Things (IoT) architecture for embedded appliances.
Humanitarian Technology Conference (R10-HTC), 2013 IEEE Region 10. Sendai,
Miyagi, Japan: IEEE.
53
Architectures
3.1 Introduction
Complexity is one of the biggest challenges that face the designer when planning
an IoT or wearable solution. A characteristic solution involves a number of het-
erogeneous IoT devices, with sensors that generate data which is then analyzed to
provide insights. Further, a myriad of IoT and wearable devices are connected
through a gateway device to a network. The job of a gateway is to enable the
devices to communicate with each other and with Cloud services and applica-
tions. Thus, we need to develop a process flow for a concrete framework over
which an IoT or a wearable solution is built.
The architecture portrays the structure of IoT and wearable solutions including
the physical aspects (i.e. devices, sensors, actuators) and the virtual aspects (i.e.
services, protocols).
There is no single IoT architecture that is agreed upon universally by the technical
communities. Various architectures have been proposed by different researchers
and technical bodies. However, adopting a multilayered architecture allows the
designer to focus on improving the understanding about how all of the aspects of
the architecture operate independently before they are integrated into an
application. Such modular approach supports managing the complexity of the
IoT and wearable solutions.
For data-driven IoT applications, a basic three-tiered architecture, which will be
discussed later in this Chapter, can be used to understand the flow of information
from smart devices, through a networking element(s), and out to the Cloud ser-
vices. A more elaborate IoT architecture would include additional vertical layers
that cut across the other layers, such as data management and information
security.
In this Chapter, various architectures used in IoT and wearable devices along
with important architecture concepts will be discussed. Further, simplified and
versatile architectures are proposed to help the reader articulate the key functions
and elements of IoT and wearable devices.
3.2.1 Introduction
Because of the outstanding opportunities IoT and wearable devices promise, more
enterprises call for their inclusion in their business and processes. However, no
proliferating technology has ever grown without adhering to certain standards.
Hence, establishing reliable architectures for IoT and wearable technology
becomes inevitable.
IoT and wearable technology protocols and platforms are in a state of flux; how
these technologies grow and what options emerge for innovative designs will have
a tremendous effect on how they expand as we move forward.
As most designers know, even the simplest project requires careful planning
and an architecture that comply with a set of standards. Furthermore, when pro-
jects become more complex, detailed architectural plans are often required by law.
IT network architectures have evolved significantly over the past 15 years and
are generally well-developed and understood; however, the network architectures
of IoT and wearable technology are new and need a fresh perspective. It is worth
noting that while some similarities between the network architectures of IT and
connected devices do exist, in most cases, the challenges and requirements of IoT
and wearable systems greatly differ from those of conventional IT networks.
IT networks are essentially concerned with the infrastructure that transports
data, regardless of its type. The main goal of IT networks is the reliable and
uninterrupted support of enterprise applications such as email, websites, and
databases. On the other hand, networks of connected devices are about the data
generated by sensors and how it is used. Thus, the core of such architectures is
about how the data is transported, aggregated, processed, and eventually
acted upon.
introduce a model where a utility such as in IIoT, IoV, and smart cities could easily
be required to support a network of such scale. Obviously, Internet Protocol ver-
sion 6 (IPv6) is the natural foundation for networks with a scale of this order.
Moreover, conventional models of IT security are certainly not suitable for
the new attacks connected devices (i.e. IoT, wearables) are prone to. Connected
devices require rigorous mechanisms of authentication, encryption, and
intrusion prevention that match the dynamics of industrial protocols and are
capable of responding to attacks on critical infrastructure. However, the end-
points of connected devices are usually located in wireless sensor networks
that are operated by unlicensed bands and are visible to the world through
spectrum analysis equipment.
There will be a massive amount of data generated by connected devices.
Although most data generated by such devices is unstructured, the insights it pro-
vides through analytics can radically transform processes and is able to create new
business models. However, such vast data could become difficult to be accommo-
dated and analyzed effectively. Hence, unlike IT networks, connected devices
should be designed to handle data consumption throughout the architecture itself
by filtering and reducing unnecessary data traveling upstream to provide the fast-
est possible response.
Lastly, most sensors in connected devices are designed to perform a single task,
and they are typically small, inexpensive with limited power, processing, and
memory resources. They often have a low duty cycle meaning that their transmis-
sion duration is small compared to their “idle” time, unless when there is a major
event to report.
Because of the substantial scale of these devices and the large heterogene-
ous environments where they are typically deployed, the networks that pro-
vide connectivity tend to support very low data rates compared to IT networks,
which enjoy connection speeds in the orders of gigabits per second (Gbps)
and nodes with powerful CPUs. Thus, connected devices require a new class
of connectivity technologies that meet both the scale and power constraint
limitations.
systems are now overwhelmed with data processing needs with the exponential
rise in real-time data processing required by connected devices. A decentralized
network is needed, and a decentralized Internet is crucial to the evolution of
connected devices.
In general, a decentralized network architecture distributes workloads among
several entities, instead of relying on a single entity such as a central server. This
trend is enabled thanks to the rapid improvements in the computational power of
microprocessors which now offer a performance well beyond the needs of most
applications of connected devices.
Analysts at Gartner, Inc. stated that 8.4 billion devices were connected to the
Internet in 2017, a rise of 31% from the previous year. They also expected this
number to reach 20.4 billion by 2020. The number is expected to balloon further
to 500 billion by 2030, according to a market analysis by Cisco.
A self-driving car generates roughly ten gigabytes of data per mile. If self-driving
vehicles continue to grow in number, it will be impossible to send data to central-
ized servers for processing every time a vehicle encounters a stop sign or a pedes-
trian. A microsecond of time is of significant importance in such scenarios. Here
is where Edge computing comes into play.
the Cloud over the backhaul network. Thus, a great reduction of data volume sent
to the Cloud is achieved.1
1 The concept of Fog computing was first coined by Flavio Bonomi and Rodolfo Milito of Cisco
Systems. The term gets its name from a comparative analogy to Cloud computing. If the Cloud
exists at a higher layer (in the sky), then the Fog layer resides closer to the physical layer (near
the ground). An interesting fact is that the term “Fog” was actually suggested by Ginny Nichols,
Milito’s wife. Although she was not involved in this project, she had a great understanding of
what the team was developing. One day she said: “why don’t we call it the “fog” layer? And,
there it was!
3.2 IoT and Wearable Technology Architecture 59
High latency
Data centers
Low latency
Real time
storage. To conclude, when thinking of designing an IoT network, one should not
only consider the amount of data to be analyzed, but also the time sensitivity of
this data. Understanding these considerations will help in deciding whether
Cloud computing is enough or whether Mist or Fog computing would improve
the efficiency of the system. In essence, Fog and Mist are standards that enable
reproducible structure in the Edge computing concept, so businesses can push
the computing out of Clouds for a more efficient and more scalable performance.
Figure 3.1 summarizes the differences between Cloud, Fog, and Mist.
However, the reader must first be familiar with the Open Systems
Interconnection (OSI) model in order to understand the IoT architectures pre-
sented in the following sections.
Application layer
Presentation layer
Session layer
Transport layer
Network layer
Physical layer
3.2.2.2.1 7. The Application Layer This is the only layer that interacts with the
user’s data directly. Software applications rely on this layer to actuate
communications. However, it should be noted that client software applications
(i.e. web browser, email clients) are not part of the application layer; rather the
application layer is responsible for the governing protocols and manipulating the
data that the software application relies on to present meaningful data to the user.
Application layer protocols include Hypertext Transfer Protocol (HTTP) as well as
Simple Mail Transfer Protocol (SMTP).
3.2.2.2.3 5. The Session Layer This layer is primarily responsible for enabling
and terminating communication between the two devices. The time between
when the communication is enabled and terminated is known as “session.” The
session layer ensures that the session stays enabled as long as the data is being
exchanged; this layer is also responsible for data transfer synchronization.
in charge of routing, i.e., finding the best physical path for the data for delivery to
its final destination.
3.2.2.2.6 2. The Data Link Layer Data link handles the flow of data into and out
of a physical link in a network identifying and correcting errors occurred in the
physical layer. As mentioned previously, the network layer is unnecessary when
the two communicating devices are on the same network. The data link layer
comes into play when the two devices are on the same network. This layer takes
packets from the network layer and breaks them into smaller fragments called
frames. Flow and error control are also performed in this layer.
3.2.2.2.7 1. The Physical Layer The physical layer includes the actual hardware
used in the data transfer, such as the cables, switches, and network interface cards
(NICs). This is also where the data gets converted into a stream of binary bits.
Network
Perception
3.2.2.4.2 oneM2M Architecture The aim of the M2M Technical Committee which
was created by the European Telecommunications Standards Institute (ETSI) in
2008 was to establish a common architecture that would lead to an accelerated
adoption of M2M devices. A few years later, the scope has expanded to include
IoT. Other organizations also started to create their own versions of architectures,
which triggered the need for a unified standard for M2M. Recognizing this need,
ETSI and other founding entities launched oneM2M architecture in 2012 as a global
initiative designed to advance efficient M2M and IoT communication systems. The
main goal of this architecture is to establish a common services layer, which can be
embedded in field devices to enable communication with the application servers.
This architecture emphasizes on the services, platforms, and applications of IoT
which include telemedicine, IoV, smart grids, and smart city automation.
By developing a horizontal platform architecture, oneM2M promotes standards
that solve one of the main challenges in designing an IoT architecture: Interoperability,
i.e. dealing with the diversity of devices, operating systems, and access methods.
64 3 Architectures
The oneM2M architecture splits up IoT functions into three key layers: the
application layer, the services layer, and the network layer. While simple, this
architecture promotes a wide range of IoT technologies and supports interopera-
bility through a set of routines, protocols, and tools for building software applica-
tions. Such framework and Application Program Interface (API) allow end-to-end
IoT communications in a consistent way, regardless of how diverse the net-
works are.
3.2.2.4.4 The IoT World Forum (IoTWF) Architecture In 2014, a seven-layer IoT
architectural reference model was published by the IoTWF architectural
committee which was led by Cisco, IBM, Rockwell Automation, and other key
players in the industry. This architecture offers a polished, yet simplified
perspective on IoT. More importantly, it includes Edge computing, data storage,
and accessibility. It also offers a concise way of visualizing IoT from a technical
point of view. Each of the seven layers is subdivided into specific functions, and
2 MPLS is a routing technique in telecommunications networks that transports data from one
node to another based on short path labels instead of network addresses, thus avoiding complex
lookups in the routing table and increasing the speed of traffic flows.
3.2 IoT and Wearable Technology Architecture 65
security is encompassed across the entire model. The IoTWF reference model is
shown in Figure 3.4.
The seven layers of the IoTWF reference model are defined as follows:
Layer 1: Physical Devices and Controllers
This layer comprises the “things” in the Internet of Things, which includes the
various endpoint devices, sensors, and actuators. The size of these “things” can
range from microelectromechanical sensors (MEMS) to massive machines and
equipment. Their primary function is generating meaningful data about a pro-
cess and capability of being controlled over a network.
Application
(reporting, analytics, and control)
Data abstraction
(aggregation and access)
Data accumulation
(storage)
Edge computing
(data analysis and transformation)
Connectivity
(communication and processing)
Layer 2: Connectivity
The primary function of this IoT layer is the reliable and prompt transmission of
data. The connectivity layer encompasses all networking elements of IoT, and
its functions include communication among Layer 1 entities, switching and
routing, protocol translation, and network-level security.
Layer 3: Edge Computing
The focus of this layer is on data reduction and converting data flows in the net-
work into information that is ready for processing and/or storage by higher
layers. The characteristic principle of this layer is that the processing of infor-
mation is initiated as early and as close to the edge of the network as possible.
Another important function that takes place at this layer is the assessment of
data to decide if it will be filtered or aggregated before forwarding to a
higher layer.
Layer 4: Data Accumulation
At this layer, data are accumulated and stored so it could be used by applications when
needed. Also, event-based data are converted here to query-based processing.
Layer 5: Data Abstraction
At this layer, multiple data formats are restored, and consistency is ensured for
data coming from different sources.
Layer 6: Application
At this layer, software applications are used to interpret data. Reports are provided
based on the analysis of data. Moreover, control and monitoring actions take
place at this layer.
Layer 7: Collaboration and Processes
The information created by IoT systems is useless unless it yields action, which
often requires collaborative efforts from people and processes. At this layer,
multistep communication and collaboration occur where application informa-
tion is shared and consumed.
It should be noted that in addition to the three IoT reference models already pre-
sented in this section, a plethora of other models exist. These architectures are
endorsed by standards bodies and organizations and are often specific to certain
industries or applications. Widely used IoT architectures the reader needs to be
aware of include Software Defined Networking (SDN) Based Architecture, Quality
of Service (QoS) Based Architecture, Service Oriented Architecture, Mobility First
Architecture, CloudThings Architecture, IoT-A Architecture, S-IoT (Social IoT)
Architecture, Purdue Model for Control Hierarchy, and Industrial Internet
Reference Architecture (IIRA).
that they all acknowledge the interconnection of the “things” in IoT to a network
that transports the data that will be eventually used by applications, in the cloud,
or somewhere in between.
It is not the intention of this book to promote any of the aforementioned IoT
architectures, and it should also be noted that IoT reference models may vary
based on the industry, application, or the technology being deployed.
In this section, an IoT reference model that highlights the primary building
blocks common to most IoT frameworks is presented, which is intended to help
the reader in designing an IoT product.
In essence, IoT reference models include numerous elements such as sensors,
actuators, protocols, and services. The framework presented here is a simplified
IoT architecture that contains the most basic building blocks (layers) which can
be used as a foundation to understand key design and deployment principles.
These basic layers can be expanded on as needed based on the industry-specific
use cases. If needed, the reader is referred to one of the more complex reference
models covered in this book or in the literature.
Data travel back and forth from smart things to the Cloud through gateways. A
gateway is a part of the IoT and wearable technology solution that provides con-
nectivity between the smart things and the Cloud. To reduce the volume of the
data aggregated from the sensors, preprocessing and filtering are also performed
here before the data is moved to the Cloud. Control commands going from the
Cloud to the actuators of the smart things are also passed through the gateway.
Using gateways prolongs battery life and lowers latency. Gateways also enable
connecting devices without a direct Internet access and provide an additional
layer of security by protecting data moving in both directions.
Advanced gateways could have additional capabilities such as analytics, secu-
rity, and data management services. Although providing insights from the data is
somehow less immediate at the gateway than it would be when delivered directly
from the sensor-actuator area, the gateway has the computational power to render
the information in a more useful form to the end user.
Data
Network Perception &
Application conditioning &
transport actuation
linking
Sensing
Control Preliminary analytics Digitization
Actuating
Archiving Routing Forwarding
Analytics
Cloud archiving
management
Configuration
Gateway basic analytics
connectivity
Perception
Wearable device control
feedback
User
processing takes place in the Cloud. Processed data are then transferred back to
the wearable device for feedback while a copy of it is archived at the data center.
Obviously, the gateway provides the means of network connectivity for such back
and forth communication. An architecture for a typical wearable device is depicted
in Figure 3.6.
It should be noted that wearables can be either simpler or more complex than
what’s shown in Figure 3.6. For instance, some wearable navigators used by pro-
fessional hikers connect directly to a Global Positioning System (GPS), thus
bypassing the gateway layer. On the other hand, some early fitness trackers relied
only on a smartphone for processing and feedback without the need to use a
Cloud service.
3.3 Conclusion
The requirements of IoT systems are giving rise to new architectures that address
the emerging constraints and data management aspects of IoT. To address these
needs, a number of IoT-specific reference models have been proposed in the
Problems 71
literature. The features shared between these models are the interconnection of IoT
endpoints, the networks that connect them, and the applications that manage them.
Due to the unique requirements of IoT, centralized data management is no
longer as practical as it is in traditional IT networks. It is simply not practical to
send data to the Cloud over a backhaul connection for processing. Before it is sent
to the Cloud, data in IoT systems are filtered, aggregated, and pre-analyzed in lay-
ers close to the edge of the network. This drives new concepts: Fog and Mist com-
puting, where services are delivered very close to the IoT endpoints.
This Chapter presented a simplified IoT framework broken down into its most
basic building blocks which can be used as a foundation to understand key design
and deployment principles that can be applied to industry-specific manifesta-
tions. It was also shown that a wearable device can be designed based on an IoT
architecture, depending on how complex the functionality is. A basic model is
also reported in this Chapter. It was shown that due to various constraints, a
typical wearable device architecture would include a gateway device layer which
is used for configuring the device and for processing the gathered data, whereas a
more in-depth data processing takes place in the Cloud.
Problems
3 List three published IoT architectures and research three more from the literature.
Compare the six architectures using a table.
4 Give an example of an IoT device and explain its operation using the simplified
IoT architecture reported in this chapter.
5 What is Edge Computing? Give four examples of IoT and wearable devices
and explain their operation within the context of Edge.
6 What is the difference between Cloud, Fog, and Mist? Explain using two practical
examples (one IoT device, and one wearable device).
8 How is the OSI model related to IoT and wearable technology architectures?
72 3 Architectures
10 Design a basic IoT garden monitor using the simplified architecture described
in this chapter.
11 Sketch a smart home system and link each component that you use (software
and hardware) to an architecture of your choice.
8 Tell us what you know about Quality of Service (QoS) Based Architecture.
Further Reading
Aazam, M., Hung, P.P., and Huh, E.-N. (2014). Smart gateway based communication
for cloud of things. Proceedings of the 9th IEEE International Conference on
Intelligent Sensors, Sensor Networks and Information Processing (IEEE ISSNIP ’14),
(April 2014). Singapore: IEEE.
Further Reading 73
Ahson, S.A. and Ilyas, M. (2011). Near Field Communications Handbook (Internet and
Communications). Boca Raton, FL: CRC Press Taylor and Francis, 23 September).
ISBN-10: 1420088149.
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., and Cayirci, E. (2002). Wireless
sensor networks: a survey. Computer Networks 38: 393–422.
Asghar, M.H. (2015). RFID and EPC as key technology on Internet of Things (IoT).
International Journal of Computer Science and Technology 6: 121–123.
Atzori, L., Iera, A., and Morabito, G. (2010). The internet of things: a survey.
Computer Networks 54 (15): 2787–2805.
Bhabad, M. and Sudhir, B. (2015). Internet of things: architecture, security issues and
countermeasures. International Journal of Computers and Applications 125 (14): 1–4.
Bilal, M. (2017). “A review of internet of things architecture”, technologies and
analysis smartphone-based attacks against 3D printers. arXiv preprint
arXiv:1708.04560, 1–21.
Bormann, C., Lemay, S., Tschofenig, H. et al. (2018). CoAP (Constrained Application
Protocol) over TCP TLS and WebSockets, IETF Internet Draft.
Botterman, M. (2009). For the European commission information society and media
directorate general, networked enterprise & RFID unit – D4. Internet of Things: An
Early Reality of the Future Internet, Report of the Internet of Things
Workshop, Prague.
Burhanuddin, A.A.-J.M.M.A. (2017). IoT architecture section I: the issue/challenge.
International Journal of Applied Engineering Research 12: 11055–11061.
Chen, F., Wang, N., German, R., and Dressler, F. (2008). LR-WPAN for industrial
applications. 2008 Fifth Annual Conference on Wireless on Demand Network
Systems and Services, Garmisch-Partenkirchen (23–25 January 2008).
Clayman, S. and Gali, A. (2011). INOX: a managed service platform for
interconnected smart objects. Proceedings of the workshop on Internet of Things and
Service Platforms (loTSP’11), NY, USA, pp. 1–8.
De Deugd, S., Carroll, R., Kelly, K.E. et al. (2006). SODA: Service-oriented device
architecture. IEEE Pervasive Computing 5: 94–96.
Deng, H. (2008). Research and implementation of the RFID middleware based on
SOA [J]. Journal of Shaanxi Normal University 10: 1–7.
Dinh, H.T., Lee, C., Niyato, D., and Wang, P. (2013). A survey of mobile cloud
computing: architecture, applications, and approaches. Wireless Communications
and Mobile Computing 13 (18): 1587–1611.
ETSI (2012). oneM2M. www.etsi.org/about/what-we-do/global-collaboration/onem2m.
Garcia-Morchon, O., Rietman, R., Sharma, S. et al. (2016). A comprehensive and
lightweight security architecture to secure the IoT throughout the lifecycle of a
device based on HIMMO. In: Algorithms for Sensor Systems. Lecture Notes
Computer Science, vol. 9536 (eds. S. Gilbert, D. Hughes and B. Krishnamachari),
112–128. Cham, Switzerland: Springer.
74 3 Architectures
Guth, J., Breitenbucher, U., Falkenthal, M. et al. (2016). Comparison of IoT platform
architectures: a field study based on a reference architecture. Cloudification of the
Internet of Things (CIoT), Paris (23–25 November 2016).
Hanes, D. (2017). IoT Fundamentals. London, UK: Pearson Education.
Ho, E., Jacobs, T., Meissner, S. et al. (2013). ARM Testimonials, in Enabling Things to
Talk, 279–322. Berlin, Heidelberg: Springer.
Hunkeler, U., Truong, H.L., and Stanford-Clark, A. (2008). MQTT-S—a publish/
subscribe protocol for wireless sensor networks. Proceedings of the 3rd IEEE/
Create-Net International Conference on Communication System Software and
Middleware (COMSWARE ’08), Bangalore, India (January 2008), pp. 791–798.
Jain, A. and Tanwer, A. (2010). Modified Epc global network architecture of
internet of things for high load Rfid systems: free download & streaming:
internet archive. Proceedings of International Conference on Advances in
Computer Science 1 (3): 3–7.
Ji, Z., Ganchev, I., and O’Droma, M. (2013). A generic IoT architecture for smart
cities. 2014, 25th IET Irish Signals & Systems Conference 2014 and 2014 China-
Ireland International Conference on Information and Communications Technologies
(ISSC 2014/CIICT 2014), Limerick, 26–27 June 2013, pp. 196–199.
Jules, A. (2006). A research survey: RFID security and privacy issue. Computer
Science 24: 381–394.
Jyothi, T., Vineetha, C., Vandana, J. et al. (2018). WIFI based agriculture environment
monitoring system using android mobile application. National Conference on
Emerging Trends in Information, Management and Engineering Sciences, West
Bengal, India, pp. 1–5.
Kang Lee, F.J. and Lanctot, P. (2017). Internet of things: wireless sensor networks.
International Electrotechnical Commission.
Kos, A., Pristov, D., Sedlar, U. et al. (2012). Open and scalable IoT platform and its
applications for real time access line monitoring and alarm correlation. Conference
on Internet of Things and Smart Spaces. International Conference on Next
Generation Wired/Wireless Networking. Lecture Notes in Computer Science,
Springer, Berlin, pp. 22–38.
Lee, B.M. and Ouyang, J. (2014). Intelligent healthcare service by using
collaborations IOT personal health device. International Journal of BioScience and
BioTechnology 6 (1): 155–164.
Locke, D. (2010). MQ telemetry transport (MQTT) v3. 1 protocol specification, IBM
developerWorks Technical Library. http://www.ibm.com/developerworks/
webservices/library/ws-mqtt/index.html.
Mohammadi, M., Aledhari, M., and Al-Fuqaha, A. (2015). Internet of things: a survey
on enabling technologies, protocols and applications. IEEE Communications
Surveys & Tutorials 17 (4): 2347–2376.
Further Reading 75
Mukherjee, M., Adhikary, I., Mondal, S. et al. (2017). A vision of IoT: applications
challenges and opportunities with Dehradun perspective. Advances in Intelligent
Systems and Computing 479 (4): 553–559.
Ngu, Q.Z.S.A.H., Gutierrez, M., Metsis, V., and Nepal, S. (2017). IoT middleware: a
survey on issues and enabling technologies. IEEE Internet of Things Journal
4: 1–20.
Ning, H. and Liu, H. (2012). Cyber-physical-social based security architecture for
future internet of things. Advances in Internet of Things 2 (1): 1–7.
Ning, H. and Wang, Z. (2011). Future IoT architecture – like mankind neural
system or social organization framework. IEEE Communications Letters 15 (4):
461–463.
OASIS (2007). Web services business process execution language version 2.0,
Working Draft. http://docs.oasis-open.org/wsbpel/2.0/
wsbpelspecificationdraft.pdf.
OASIS.org (2014). MQTT version 3.1.1. (OASIS Standard). http://docs.oasis-open.
org/mqtt/mqtt/v3.1.1/os/mqttv3.1.1-os.html.
oneM2M (2014). Technical specification. ftp.onem2m.org/Deliverables/20140801_
Candidate%20Release/TS-0002-Requirements-V-2014-08.pdf.
Pereira, P.P., Eliasson, J., Kyusakov, R., and Delsing, J. (2013). Enabling cloud
connectivity for mobile internet of things applications. Proceedings IEEE 7th
International Symposium on Service Oriented System Engineering (SOSE), Redwood
City, CA (25–28 March 2013), pp. 518–526.
Qing Hu, X.H. and Shan, Y. (2009). Based on internet of things and RFID middleware
technology research. Micro Computer Information 25: 105–185.
Ray, P.P. (2014). Internet of things based physical activity monitoring (PAMIoT): an
architectural framework to monitor human physical activity. IEEE CALCON,
Kolkata, pp. 32–34.
Ray, P.P. (2015). Towards an internet of things based architectural framework for
defence. International Conference on Control, Instrumentation, Communication
and Computational Technologies (ICCICCT), Kumaracoil (18–19 December 2015),
pp. 411–416.
Sebastian, S. and Ray, P.P. (2015). When soccer gets connected to internet.
International Conference on Computing and Communication Systems (I3CS),
Shillong, pp. 84–88.
Shelby, Z., Hartke, K., and Bormann, C. (2014). The Constrained Application Protocol
(CoAP). Tech. Rep., IETF 7959.
Spiess, P. (2009). SOA-based integration of the internet of things in enterprise
services. Proceedings of IEEE ICWS, Los Angeles, CA (6–10 July 2009).
Stanford-Clark, A. and Linh Truon, H. (2008). MQTT for sensor networks (MQTT-S)
protocol specification, International Business Machines Corporation Version 1.
76 3 Architectures
Stojmenovic, I. (2014). Fog computing: a cloud to the ground support for smart things
and machine-to-machine networksProceedings of the Australasian
Telecommunication Networks and Applications Conference (ATNAC ’14),
Melbourne, Australia (November 2014), pp. 117–122.
Toma, I., Simperl, E., and Hench, G. (2009). A joint roadmap for semantic technologies
and the internet of things. Proceedings of the Third STI Road mapping Workshop, Crete.
Traub, K., Armenio, F., Barthel, H. et al. (2014). The GS1 EPCglobal architecture
framework, 1–72, Version 1.6.
Varghese, B. and Buyya, R. (2018). Next generation cloud computing: new trends and
research directions. Future Generation Computational Systems 79: 849–861.
Villaverde, B.C., Pesch, D., De Paz Alberola, R. et al. (2012). Constrained application
protocol for low power embedded networks: a survey. Proceedings of the 6th
International Conference on Innovative Mobile and Internet Services in Ubiquitous
Computing (IMIS ’12), Palermo, Italy (July 2012), pp. 702–707.
Vucinic, M., Tourancheau, B., Rousseau, F. et al. (2014). OSCAR: object security
architecture for the internet of things. Proceeding of IEEE International Symposium
on a World of Wireless, Mobile and Multimedia Networks 2014, WoWMoM 2014 (19
June 2014). Sydney: NSW.
Wang, P., Liu, S., Ye, F., and Chen, X. (2018). A fog-based architecture and
programming model for IoT applications in the smart grid. Netw. Internet Archit.
Welbourne, E., Battle, L., Cole, G. et al. (2009). Building the internet of things using
RFID: the RFID ecosystem experience. IEEE Internet Computing 13 (3): 48–55.
Xia, F. (2009). Wireless sensor technologies and applications. Sensors 9 (11):
8824–8830.
Yang, G., Xie, L., Mäntysalo, M. et al. (2014). A health-IoT platform based on the
integration of intelligent packaging, unobtrusive bio-sensor, and intelligent
medicine box. IEEE Transactions on Industrial Informatics 10 (4): 2180–2191.
Yannuzzi, M., Milito, R., Serral-Gracia, R. et al. (2014). Key ingredients in an IoT recipe:
fog computing, cloud computing, and more fog computing. Proceedings of the IEEE 19th
International Workshop on Computer Aided Modeling and Design of Communication
Links and Networks (CAMAD ’14), Athens, Greece (December 2014), pp. 325–329.
Yunsong Tan, J.H. (2015). A service-oriented IOT middleware model. Journal of
Computer Science 4: 115–120.
Zhang, W. and Qu, B. (2013). Security architecture of the internet of things oriented
to perceptual layer. International Journal on Computer, Consumer and Control 2
(2): 37–45.
Zhao, J.C., Zhang, J.F., Feng, Y., and Guo, J.X. (2010). The study and application of
the IOT technology in agriculture. 3rd International Conference on Computer
Science and Information Technology, vol. 2, Chengdu (9–11 July 2010), pp. 462–465.
Zhou, L., Xiong, N., Shu, L. et al. (2010). Context-aware multimedia service in
heterogeneous networks. IEEE Intelligent Systems 25 (2): 40–47.
77
Hardware
4.1 Introduction
The core functionality of IoT and wearable devices starts with data acquired or an
action performed by a device. These devices are called endpoints, and they are the
“Things” in Internet of Things. The value of IoT and wearable devices is in the
data collected by these endpoints, so it is important to understand how they
acquire, process, transmit, and receive data.
The designer should ask: What type of sensor, actuator, or microcontroller
should be considered for the application/problem in hand? What energy source
should be used? What communication module should be considered?
This Chapter highlights the capabilities, characteristics, and functionality of
sensors and actuators with an understanding of their limitations and their role in
IoT and wearable systems. Criteria for selecting a microprocessor and communi-
cation module will be reviewed next. Additionally, deciding on a suitable energy
source with a matching application-specific power management design is dis-
cussed. Finally, the reader will gain an understanding on how to bring these foun-
dational elements together to realize a smart device that makes most IoT and
wearable use cases possible.
In spite of the variety and types of IoT and wearable devices, the majority share
elemental functionalities that must be implemented in the design process. Most
smart endpoints have the following components:
●● At least one sensor to perceive an analog quantity (typically physical, chemical,
biological, or environmental).
●● A conditioning circuit that filters, amplifies, and converts the perceived signal
into a digital one (analog-to-digital conversion (ADC)).
●● A processing unit along with a memory and embedded system that serves as the
brain power of these smart devices where all computations and processing
take place.
●● A connectivity unit to transmit the captured data or receive an action com-
mand to and from another layer (a mobile phone, cloud, server, etc.) using,
typically, one of the wireless communication technologies such as Wi-Fi and
Bluetooth.
●● Input and output elements for device user interface which may include a but-
ton, gesture pad, microphone, camera for input; an LCD display, LED lights,
speaker, or other motor-based actuators for output.
●● An energy source and most likely a power management system.
Noticeably, the first generation of smart connected devices has been assembled
utilizing smartphones components and technologies. For example, in the beginning
of the past decade, the sensors and microprocessors of wrist and head-mounted
wearable devices have been drafted off smartphones parts. This would, for many,
make perfect sense since using tested components with a proven success in a newly
introduced technology would help manufacturers balance features, functionality,
and price for an uncertain new market. However, electronics manufacturers today
are introducing new components designed specifically for wearables. Power-
efficient microprocessors and performance-bound hardware of smaller form factor
are being driven by the requirements of the next generation of IoT and wearable
devices. Figure 4.1 depicts the anatomy of a generic connected device.
4.2.1 Sensors
A sensor is a device that detects a change or an event in an object or environment
and converts it to usually an electrical signal. The sensor then forwards the con-
verted signal to a microprocessor unit for analysis to provide a useful output that
can be consumed by intelligent devices or humans.
Analog (continuous, nondigital) sensors are very common in biomedical and
healthcare devices. Biometric sensors such as heart rate, blood pressure, and elec-
troencephalogram (EEG) are examples of such sensors. It should be noted that an
analog front-end (AFE) unit is needed in analog sensors, which is responsible for
amplifying, filtering, and conditioning the signal, and converting it to digital,
using an ADC, so that it can be processed by a microprocessor.
There are a number of ways to categorize sensors including the following:
a) Active or Passive: Active sensors require an external power source to operate,
while passive sensors simply detect energy and operate without the need of a
power source.
4.2 Hardware Components Inside IoT and Wearable Device 79
Microprocessor
Energy source
and power Memory
management RF module
circuit
Sensor & actuator hub
Conditioning circuit
Sensor Actuator
is one that is able to detect a very small change in the input variable. Electronic
and thermal noise in the sensor and interface circuitry can highly impact the
resolution. For example, an analog temperature sensor with a resolution of 10
bits represents a range of temperature readings between 0 and 1023.
b) Sensitivity: It is defined as the ratio between the output signal and measured
property. For example, if a temperature sensor has a voltage output, the sensi-
tivity is then a constant with the units [v/k].
c) Accuracy: Accuracy can be described as the maximum difference between the
actual value measured via a standard reference and the value indicated at the
output of the sensor terminals. A difference value of zero indicates the highest
accuracy.
d) Precision: It describes the reproducibility of the measurement of a given sen-
sor and also refers to the closeness of the measurements to each other in a
given scale.
e) Drift (Stability): Drift is a change in the sensor’s reading or set point value
over extended periods due to electronic aging of components or reference
standards in the sensor.
f) Hysteresis: Ideally, a sensor should be capable of tracking the changes in the
input variable regardless of which direction the change is made; hysteresis is
the measure of this feature.
g) Response Time (Responsiveness): Response time refers to the ability of a
sensor to respond to fast changes in inputs.
h) Dynamic Range: It refers to the full range from minimum to maximum val-
ues a sensor can measure. For example, a given temperature sensor may have
a range of −40 to +120 °C.
The most challenging aspect in such sensors, however, lies in converting raw
data into useful information. As mentioned previously, sensor fusion is the pro-
cess of collecting multiple output data from multiple sensors to obtain a better
total insight. A good example here is the use of data from single 3-axis accelera-
tion along with data from a 6-axis IMU rotation sensor in fitness trackers to have
a more accurate information on the user’s motion.
4.2.1.3.4 Hall Effect Sensors The Hall effect sensor is used to detect a magnetic
field. The Hall element is comprised of a thin sheet of an electric conductor with
output terminals perpendicular to the direction of current flow. When a magnetic
field is present, it produces an output voltage proportional to its strength. The voltage
is in microvolts; hence, it needs to be amplified to be of use. Beside a magnetic field,
the sensor can be used as a sensor for current, temperature, pressure, etc.
4.2.1.3.6 Flex Sensors Flex sensors are passive resistive devices that changes
resistance when bent which can be used to detect flexing or bending of an object.
4.2.1.3.7 Galvanic Skin Response (GSR) Sensors Galvanic skin response (GSR)
measures the continuous variation of electrical impedance of human skin which
enables the detection of psychological, emotional, and physiological parameters.
4.2.1.3.11 Optical Heart Rate Sensors Based on the pulse oximetry technique,
these optical sensors distinguish between the optical features of the oxygenated
and de-oxygenated hemoglobin. The monitor consists of a red LED and optical
detector which measures the light reflectance or absorbance during the
oxygenation and de-oxygenation cycle, and the heart rate is then determined.
4.2.1.3.12 Gesture Sensors Gesture sensors aim at enhancing the user interface
in an electronic device which is usually achieved by enabling a coherent display
and touchless communication. Most modern gesture sensors used in wearables
utilize four directional photodiodes to sense infrared energy to convert direction,
distance, and velocity information to digital information. Other gestures sensors
are based on an RGBC sensor, which provides red, green, blue, and clear light
sensing which in turn detects light intensity under different lighting conditions.
Digital ambient light sensing (DALS), on the other hand, incorporates a
photodiode, an amplifier, and an analog-to-digital convertor, in a single chip.
4.2 Hardware Components Inside IoT and Wearable Device 83
4.2.1.3.14 Capacitive and Inductive Sensors These sensors are based on a high
frequency oscillator that creates a field in the immediate proximity of the sensing
surface. The presence of an object in this proximity creates a change of the
oscillation amplitude where the positive and negative peaks are identified by
another unit that triggers the change of the sensor’s output. The operation of
many sensors and interface components is based on capacitive and inductive
sensors, including position, humidity, fluid level, and acceleration sensors, in
addition to trackpads and touch screens.
each sensor connects directly to gateways which act as bridges that connect the
sensors to the Internet.
4.2.2 Actuators
Unlike sensors that provide information about a process/environment, actuators
provide action. Actuators typically receive some type of control signal based on
sensors’ data that triggers a physical effect.
Actuators can also vary in type, function, and area of application. Some com-
mon categorizations are based on power, motion, and industry.
The most powerful use cases in IoT and wearable technology are those where
sensors and actuators work together in an intelligent, complementing, and har-
monious fashion. Such combination can be utilized to solve problems by simply
elevating the data that sensors provide to actionable insight that can be acted on
by work-producing actuators.2 Examples of actuators include motors, relays,3
speakers, and lights. Just like a sensor, an actuator may need a conditioning and/
or driving circuit. Figure 4.2 depicts a signal flow in a sensor/actuator-based system.
Communication
module
Signal conditioning
and driving
Sensor and/or
actuator
on the other hand, also have a RAM, ROM, and other peripherals integrated
within a single chip along with the CPU.
The choice of the microprocessor in IoT and wearables is driven by the application,
industry, and functions performed by the device. For most applications, a general
purpose microprocessor unit would suffice; however, highly specialized devices
would most likely require a dedicated application processor. It should be noted
that nowadays microprocessor manufacturers incorporate most of the functions
in a single chip which is crucial in reducing the overall size and cost of a wearable
device. For example, the 32-bit ARM processor, which is a reduced instruction set
computer (RISC) architecture developed by Advanced RISC Machines (ARM), is
very common in IoT and wearables as it provides a sufficiently powerful compu-
tational performance and energy efficiency.
Another popular microcontroller is the Programmable System on Chip (PSoC)4
developed by Cypress Semiconductor which integrates programmable analog
and digital functionalities in a single chip utilizing the power of an ARM cortex-M
core architecture.
It is also worth mentioning that some advanced devices have a separate coproc-
essor (sensor hub) dedicated to handle the sensors’ data. This is critical when the
device has a large amount of sensors data that needs to be processed in real time,
which requires an uninterrupted CPU attention. This function is widely known as
“sensor fusion.”
It should also be noted that based on the features offered by the IoT or wearable
product, the device may or may not require a specific operating system. For
instance, a light-weight RTOS (real-time operating system) may be more than suf-
ficient to operate a wristwatch that measures temperature, tracks a user’s move-
ment using a simple accelerometer, and displays time on a basic LCD display. On
the other hand, a sophisticated smart watch that serves as an extension of a user’s
mobile phone needs to run an advanced operating system such as an iOS or
Android.
A development board, on the other hand, is a prototyping solution that features
a low-power CPU which typically supports various programming environments.
The board, in essence, is a printed circuit board containing a microcontroller unit,
interfacing circuitry, power management unit, and communication capability.
4 A System on Chip (SoC) refers to a grouping of all the components of an electronic system
in a single-integrated circuit. In addition to the processing unit, memory, and bus, a SoC may
contain a sensor(s), communication capability and other components that deal with data
compression, data filtering, etc.
88 4 Hardware
Figure 4.3 The arm MPS2 + FPGA prototyping board. The platform offers a large FPGA
for prototyping Cortex-M based designs with a range of debug options. Source: Photo
courtesy of ARM.
●● Clock Speed and Memory: Is the processing unit equipped with adequate
memory for your project? Also, some IoT or wearable applications will run ade-
quately at low speeds, some will run the processor at higher speed to achieve a
more demanding task, and some may have different clock needs depending on
the dynamics of the application. The designer needs to make an informed deci-
sion concerning this before prototyping.
●● Power Requirement: How much power will the unit need? What is its power
consumption while in action and during idle time? Energy efficiency is
extremely important for wearables and mobile/portable (nonwired) IoT
applications.
●● Customer and Community Support: Is good documentation for your unit
available? Is customer support reputable and reliable? This is crucial when
it comes to making informed decisions on how to professionally use
your unit.
●● Add-On Capabilities: Some wearable and IoT applications may require DSP
capability for analysis and modification of signals. Hence, a dedicated digital
signal processor may be required onboard.
●● Connectivity: IoT and most wearables must have a form of connectivity. The
availability of connectivity type(s), such as Ethernet, WLAN, and BLE, needed
for the project on board is a great advantage.
●● Security: Security is of paramount importance in IoT and wearable devices.
Hardware support for security may be required or preferred in some applications.
Because IoT and wearable technology cover a wide spectrum of applications,
processing and wireless requirements vary drastically. For example, some weara-
ble devices perform a small amount of processing and merely upload data to the
cloud. Such devices use low-cost, low-power microcontrollers. The wireless con-
nectivity is typically integrated within the board. Other devices, such as smart
watches and security cameras, require upper-scale processors for data analysis or
driving a display.
It is also worth noting that many smart devices in the market today use repur-
posed smartphone processors. However, other companies have gone the extra
mile and designed processors dedicated for IoT devices and wearables.
Figure 4.4 Printed monopole antenna intended for integration within flexible
electronics.
6 Moore’s law refers to an observation pointed out by Gordon Moore (a co-founder of Intel
Corp.). His observation concludes that the number of transistors per square inch in integrated
circuits is doubled each year. Although the rate seemed to hold true from 1975 until around
2012, the rate started to slow in 2013, and in 2015, Gordon Moore himself stated that the growth
rate would reach saturation in the following decade.
dBi dBi
2.22 7.19
1.94 6.29
1.66 5.39
1.39 4.49
1.11 3.59
y 0.832 2.7
0.555 z 1.8
0.277 0.898
0 0
–4.72 –4.1
–9.45 –8.2
–14.2 –12.3
–18.9 –16.4
–23.6 –20.5
–28.3 y –24.6
–33.1 –28.7
–37.8 –32.8
y
z
Phi
x y
x
z
x
Figure 4.5 Omni directional radiation pattern (left), and semi-directional (hemi-spherical radiation pattern (right).
94 4 Hardware
7 Step-up switching converters, also called boost switching regulators, enable a higher
voltage output than the input voltage. The output is regulated, as long as the power draw is
within the specified output power.
4.3 Conclusio 95
4.3 Conclusion
objects and networking them is a great way to enable advanced and well-coordinated
automations that improves efficiency, saves costs, and convenience.
This Chapter introduced sensors and actuators and their characteristics. It also
included descriptions and practical examples of microprocessors and basic guide-
lines to choose the right one for a given application. Additionally, discussions on
wireless communication modules, energy sources and management circuits, and
various other peripheral components in IoT and wearable devices were provided.
Problems
3 Pick a wearable or IoT device of your choice, then list all of the device’s com-
ponents (external and internal).
4 What is a MEMS sensor? Research five examples from the literature and
compare between their mechanisms of operation.
5 What are the different types of accelerometers? How would you characterize
a typical one?
7 Research the most common types of motors used in IoT and wearable
applications.
10 You are tasked to prototype a virtual home assistant (i.e. similar to Amazon Echo
Dot). Make a list of all the tasks needed to create such a device, along with a list
of all the components needed based on what you have learned in this chapter.
Further Reading 97
7 In antennas, what is a return loss and VSWR? How are they related?
8 Sketch a physical design and PCB with all the necessary components for a
smart light bulb.
10 Which type of technology would you choose for a touch screen on a con-
nected device?
11 What is a nonlinear phase filter? Derive group delay for this filter.
12 There is a new sensor being developed. What is your approach to test it?
Further Reading
Aasin Rukshna, R., Anusha, S., Bhuvaneswarri, E., and Devashena, T. (2015).
Interfacing of proximity sensor with My-RIO toolkit using labVIEW. International
Journal for Scientific Research & Development 3 (01): 562–566.
98 4 Hardware
Ahson, S.A. and Ilyas, M. (2011). Near Field Communications Handbook (Internet and
Communications). Boca Raton, FL: CRC Press Taylor and Francis, 23 September).
ISBN-10: 1420088149.
Atzori, L., Iera, A., and Morabito, G. (2010). The internet of things: a survey.
Computer Networks 54 (15): 2787–2805.
Azuma, R., Behringer, R., Feiner, S. et al. (2001). Recent advances in augmented
reality. Computers & Graphics 21: 34–47.
Banaee, H., Ahmed, M.U., and Loutfi, A. (2013). Data mining for wearable sensors in
health monitoring systems: a review of recent trends and challenges. Sensors 13
(12): 17472–17500.
Bennett, T.R., Jafari, R., and Gans, N. (2014). Motion based acceleration correction
for improved sensor orientation estimates. 2014 11th International Conference on
Wearable and Implantable Body Sensor Networks, Zurich, Switzerland.
Bierl, L. (1996). Precise Measurements with the MSP430. Dallas, TX: Texas
Instruments.
Bilal, M. (2017). “A review of internet of things architecture”, technologies and
analysis smartphone-based attacks against 3D printers. arXiv preprint
arXiv:1708.04560, 1–21.
Botterman, M. (2009). For the European commission information society and media
directorate general, networked enterprise & RFID unit – D4. Internet of Things: An
Early Reality of the Future Internet, Report of the Internet of Things
Workshop, Prague.
Cox, D. (2012). Implementing Ohmmeter/Temperature Sensor; Microchip
Technology AN512: Chandler, AZ, USA, 1994. J. Low Power Electron.
Appl., 2 280.
Crabtree, G., Kocs, E., and Trahey, L. (2015). The energystorage frontier: lithium-ion
batteries and beyond. Materials Research Society MRS BULLETIN 40: 1067–1076.
Dietz, P.H., Leigh, D., and Yerazunis, W.S. (2002). Wireless liquid level sensing for
restaurant applications. Proceedings of The 1st IEEE International Conference on
Sensors, Orlando, FL, USA (12–14 June 2002), pp. 715–719.
Fayyad, U., Piatetsky-Shapiro, G., and Smyth, P. (1996). From data mining to
knowledge discovery in databases. American Association for Artificial Intelligence
17: 117–152. 0738-4602-1996.
Gaitán-Pitre, J.E., Gasulla, M., and Pallàs-Areny, R. (2009). Analysis of a direct
interface circuit for capacitive sensors. IEEE Transactions on Instrumentation and
Measurement 58: 2931–2937.
Guth, J., Breitenbucher, U., Falkenthal, M. et al. (2016). Comparison of IoT platform
architectures: a field study based on a reference architecture. Cloudification of the
Internet of Things (CIoT), Paris (23–25 November 2016).
Hanes, D. (2017). IoT Fundamentals: Networking Technologies, Protocols, and Use
Cases for the Internet of Things, 1e. Indianapolis, IN: Cisco Press.
Further Reading 99
Ho, E., Jacobs, T., Meissner, S. et al. (2013). ARM testimonials. In: Enabling Things to
Talk (eds. A. Bassi, M. Bauer, M. Fiedler, et al.), 279–322. Berlin, Heidelberg:
Springer.
ARM.com (2020). Arm Cortex-M series processors (guide). https://developer.arm.
com/products/processors/cortex-m (accessed March 2020).
Huising, J.H. (2008). Smart sensor systems: Why? Where? How? In: Smart Sensor
Systems (ed. G.C.M. Meijer), 1–21. Chichester, UK: Wiley. 3.
Kang Lee, F.J. and Lanctot, P. (2017). Internet of Things: Wireless Sensor Networks.
Geneva, Switzerland: International Electrotechnical Commission.
Khaleel, H.R., Al-Rizzo, H.M., Rucker, D.G., and Mohan, S. (2012). A compact
polyimide-based UWB antenna for flexible electronics. IEEE Antennas and
Wireless Propagation Letters 11: 564–567.
Lee, B.M. and Ouyang, J. (2014). Intelligent healthcare service by using
collaborations IOT personal health device. International Journal of Bio Science and
BioTechnology 6 (1): 155–164.
Mohammadi, M., Aledhari, M., and Al-Fuqaha, A. (2015). Internet of things: a survey
on enabling technologies, protocols and applications. IEEE Communications
Surveys & Tutorials 17 (4): 2347–2376.
Mukherjee, M., Adhikary, I., Mondal, S. et al. (2017). A vision of IoT: applications
challenges and opportunities with Dehradun perspective. Advances in Intelligent
Systems and Computing 479 (4): 553–559.
Ngu, Q.Z.S.A.H., Gutierrez, M., Metsis, V., and Nepal, S. (2017). IoT middleware: a
survey on issues and enabling technologies. IEEE Internet of Things Journal 4: 1–20.
Nitzan, M., Romem, A., and Koppel, R. (2014). Pulse oximetry: fundamentals and
technology update. Medical Devices 7: P231–P239.
Pallàs-Areny, R. and Webster, J.G. (2001). Sensors and Signal Conditioning, 2e. New
York: John Wiley & Sons.
Reverter, F. and Pallàs-Areny, R. (2005). Direct Sensor-to-Microcontroller Interface
Circuits. Design and Characterization. Barcelona, Spain: Marcombo.
Reverter, F., Gasulla, M., and Pallàs-Areny, R. (2007). Analysis of power-supply
interference effects on direct sensor-to-microcontroller interfaces. IEEE
Transactions on Instrumentation and Measurement 56: 171–177.
Richey, R. (1997). Resistance and Capacitance Meter Using a PIC16C622; Microchip
Technology AN611: Chandler, AZ, USA.
Riva, G., Mantovani, F., and There, B. (2012). Understanding the Feeling of Presence in
a Synthetic Environment and Its Potential for Clinical Change. London, UK: Riva
and Mantovani, Intech.
Sadowsky, G., Dempsey, J.X., Greenberg, A. et al. (2003). Information Technology
Security Handbook. Washington, DC: World Bank.
Texas Instruments (2014). Analog Front End (AFE) for Sensing Temperature in Smart
Grid Applications Using RTD (Handbook). Dallas, TX: Texas Instruments.
100 4 Hardware
Toma, I., Simperl, E., and Hench, G. (2009). A joint roadmap for semantic
technologies and the internet of things. Proceedings of the Third STI Road mapping
Workshop, Crete.
Varghese, B. and Buyya, R. (2018). Next generation cloud computing: new trends and
research directions. Future Generation Computational Systems 79: 849–861.
Woodard, J., Weinstock, J., and Lesher, N. (2014). Integrating Mobiles into
Development Projects. Washington, DC: USAID.
Xia, F. (2009). Wireless sensor technologies and applications. Sensors 9 (11):
8824–8830.
Yamanaka, K., Vestergaard, M.’d.C., and Tamiya, E. (2016). Printable electrochemical
biosensors: a focus on screen-printed electrodes and their application. Sensors 16
(10): 1761.
101
5.1 Introduction
IoT and most wearable devices must connect to a network for their data to be
transported and utilized. In addition to the wide range of components that make
up these devices, there are also several communication technologies and protocols
used to connect them.
Protocols ensure that data from one device or sensor are reliably and securely
delivered and understood by another device or system. Given the diverse array of
IoT and wearable devices available, using the right protocol in the right context is
of paramount importance.
There exists an overwhelming number of connectivity options for designers
working on products and systems for IoT and wearable technology. How protocols
and standards support secure and reliable data exchange in the ecosystem is a
question that any serious designer should know the answer to. It is important to
take into account the application requirements, architecture, and factors that
impact signal quality, bandwidth, and range.
This Chapter takes a look at the characteristics and basics of the communica-
tion protocols that IoT and wearables employ for their data exchange, along with
a dive into some of the most common technologies being deployed today.
As we saw in the previous chapters, IoT and wearable system in general use a three‐
layer architecture: devices, gateways, and data centers/cloud. The communication
can be between the devices themselves, a device and gateway, a gateway to a data
center, or between data centers.
Computer networks are typically categorized based on the range they provide. The
size of a network in IoT and wearables can vary from connecting two devices within
the user’s body to two smart systems communicating across the world. Below is a list
of the most popular types of networks used in IoT and wearable technology:
Body Area Network (BAN): A network that connects devices within or inside
the user’s body such as wearables, insertables, and implants. This type of network
is also known as a wireless body area network (WBAN), body sensor network
(BSN), or medical body area network (MBAN).
Personal Area Network (PAN): A network that connects devices within a
room or a radius of a person’s workspace such as wearables, laptops, and personal
gadgets powered by Bluetooth and ZigBee communication protocols. A wireless
PAN (WPAN) covers anywhere between a few inches and a about 30 ft.
Local Area Network (LAN): A network that connects devices within a prem-
ise or building. Ethernet and Wi‐Fi are LAN’s two most common technologies.
Campus/Corporate Area Network (CAN): A network that combines smaller
local area networks within a limited geographical area such as a university, school
district, or an enterprise.
Metropolitan Area Network (MAN): A network that connects multiple
LANs within a metro city into a bigger network.
WAN (Wide Area Network): A network that integrates multiple LANs and MANs
into a single large network laid out across a wide geographical area such as a country.
Figure 5.1 depicts the major types of networks.
An example of a LAN setup is depicted below in Figure 5.2.
WAN
MAN
CAN
LAN
PAN
BAN
Internet
Modem
Ethernet PC2
Wireless router
PC1
Wi-Fi
5.3.1 Mesh
Mesh topology is a type of connection where all nodes work together to distribute
data in a network. The primary advantage of this topology is that it uses low power
and shorter links (typically less than 100 ft), which promotes a longer battery life.
104 5 Communication Protocols and Technologies
The main disadvantage, however, is that if one node goes down, an entire piece of
the network can fail due to the interconnected nature of mesh networks. This
topology is commonly found in IoT deployments and typically used in home auto-
mation and smart buildings utilizing protocols such as ZigBee, Thread, and
Z‐Wave.
5.3.2 Star
The star network is one of the most common network topologies. In this topology,
every host is connected to a central hub that acts as a conduit to transmit mes-
sages. An advantage of star topology is that all the complexity in the network is
driven to a central node, which also introduces a single point of failure.
5.3.3 Bus
Bus topology is a simple and easy to install network configuration in which each
node is connected to a common cable (bus). Data is transmitted in either direction
along the bus until it reaches its intended destination. However, there is a single
point of failure: If the bus fails, the entire network fails. This topology can be used
in sensor networks that are physically wired together.
5.3.4 Ring
A ring topology, which is not common in IoT and wearable technology but worth
mentioning here, is technically a bus topology arranged in a closed loop where
data are transmitted around the ring in one direction. When one node passes data
to a destination, the data have to go through each intermediate node. These
intermediate nodes retransmit the data (acting as a data repeater) which keep the
signal strong over a long distance.
Bus Ring
Star Mesh
Tree
5.4 Protocols
5.4.3.2 6LoWPAN
6LoWPAN stands for IPV6 over low‐power wireless personal area networks. It’s a
standard aimed at enabling battery‐operated IoT and wearable devices, which
often operate under constrained power budget to communicate using IPV6 pack-
ets. 6LoWPAN uses header compression and other power saving techniques
allowing devices to communicate over IEEE 802.15.4 networks which defines the
operation of low‐rate WPANs.
108 5 Communication Protocols and Technologies
5.4.3.3 RPL
RPL is a routing protocol designed for low power and networks with low‐power
devices which may experience packet loss (lossy networks). RPL is optimized for
multi‐hop and many‐to‐one communication, but also supports one‐to‐one
messages.
RPL protocol is typically implemented in wireless sensor networks, and the
most used operating system for its realization is Contiki which is an open‐source
OS developed for use in lower‐end computers and microcontrollers.
5.4.3.4 Thread
A relatively new IP‐based open‐standard networking protocol, Thread, is a low‐
power wireless mesh networking protocol designed for smart home applications.
Thread allows IoT devices to connect directly to the cloud with improved security
and reliability.
5.4.3.5 LoRaWAN
LoRaWAN (long‐range wide area network) is a network protocol designed with
low power IoT devices in mind. LoRaWAN is a medium access control (MAC)
layer (a sublayer of the data link layer) protocol but acts mainly as a network layer
protocol for managing communication between gateways and end‐point devices.
Stacks for the Web and connected devices are shown in Figure 5.4.
Figure 5.4 Typical TCP/IP stack (left), IoT/wearable devices protocol stack (right).
5.4 Protocol 109
5.4.4.1.2 NFC and RFID (Short Range, Low Data Rate, Low Power) NFC (Near Field
Communication) offers a set of communication protocols and technologies using
electromagnetic fields that enable simple and secure two‐way interaction between
electronic devices.
NFC has its origins in radio‐frequency identification (RFID) technology, which
uses electromagnetic radiation to encode and receive information. Any NFC‐ena-
bled device has a microchip that is activated when it gets in close proximity to
another NFC‐enabled device (typically less than10 cm).
NFC solves many of the challenges associated with IoT and wearable devices
such as offering a simple tap‐and‐go mechanism which makes it easy and intuitive
to connect two different devices. Also, the short range feature of NFC prevents
against unauthorized access.
1 Ethernet for IoT is a simple and inexpensive wired connection solution that provides fast
data connection and low latency in stationary IoT applications.
110 5 Communication Protocols and Technologies
5.4.4.1.3 Z-Wave (Short Range, Low Data Rate, Low Power) Z‐Wave is a low‐
power wireless communications technology that is primarily designed for IoT
products such as smart lighting, smart locks, and security and alarm among
many others.
This sub‐1 GHz band technology is designed for reliable and low‐latency com-
munication of small data packets. It is scalable (supports up to 232 devices) and
supports mesh networks without the need for a coordinator node.
5.4.4.2.2 ZigBee (Medium Range, Low Data Rates, Low Power) ZigBee‐based
networks are characterized by low‐power consumption, low data rates (up to
250 kbps), and a line of sight connectivity range of up to 300 m, and 100 m for
indoors.
The ZigBee standard is a relatively simple, easy to install, scalable to thousands
of nodes, resistant to communication errors and unauthorized readings, and has
high security and robustness. Typical applications include wireless sensor networks
(WSNs) in M2M, IoT, and wearable technology applications.
5.4.4.3.2 Sigfox (Long Range, Low Data Rate, Low Power) Sigfox is an ultra‐
narrowband (UNB) technology based on binary phase‐shift keying (BPSK). Sigfox
encodes the data by taking very narrow slices of spectrum and changes the phase
of the RF carrier signal. This allows the receiver to only tune in to a small slice of
the spectrum aiming at mitigating the effect of noise. Achievable data rate in
5.4 Protocol 111
Sigfox is modest (up to 1 kbps) but it can support a wide range of up to 50 km in
open areas with a very low‐power consumption.
5.4.4.3.3 Cellular Technology (Long Range, High Data Rate, High Power) Cellular
technology is the basis of mobile phone networks but it could also serve as a
platform for IoT applications that require long‐distance communication. Cellular
technology is capable of transferring large amounts of data but at the expense of
high‐power consumption and cost.
Global System for Mobile Communications (GSM) has also been used for IoT
systems represented by Extended Coverage GSM IoT (EC‐GSM‐IoT) which is a
standard‐based low‐power wide area network technology. It is based on e‐General
Packet Radio Services (eGPRS) and implemented as a long‐range, high capacity,
and low energy cellular system for IoT communications. 4G Long Term Evolution
(LTE) networks also support IoT. However, the exponential growth in IoT market
has kept LTE networks struggling to keep up with the resource demands. The
JSON, REST
API
Cloud
Internet and web
TCP, UDP,
transfer
Network
ZigBee, Wi-Fi,
BLE
IoT/wearable device
5.5 Conclusion
Today, IoT and wearable devices support a plethora of different protocols. In light
of this, many technical bodies have started to call for a universal protocol stand-
ardization. However, being inherently scattered, the market of IoT and wearables
will probably never be in real need of a unifying standard. Just as there are newer
applications and use cases emerging within the industry, necessary protocols for
their deployment will continue to materialize along the way.
On the other hand, selecting the appropriate type of connectivity is an inevita-
ble part of any IoT or wearable technology project. It was demonstrated in this
Chapter that the available connectivity options are governed by a trade‐off
between power consumption, range, and bandwidth.
Problems
1 You have narrowed down your choice for a network topology to either a full
mesh topology or a star topology. Determine how your final decision will
affect deployment cost and communication speed.
3 You are designing a fitness tracker. What would your protocol and topology
choices be?
5 Sketch a protocol stack for a smart watch. Compare the flow of data with the
one you sketched in the previous question.
7 A network with all the nodes acting as both servers and clients. A PC can
access files located on another PC but also delivers files to other PCs on the
network. Which network architecture is that?
9 Which layer does the Ethernet and Wi‐Fi protocols belong to?
10 Draw a diagram of a network you have worked on, and explain it in detail.
16 What are some transport layer protocols used in IoT, how do they work?
17 Explain Bluetooth Low Energy protocol for IoT and wearable technology?
20 State the differences between the client‐server model and the P2P model.
Further Reading
Aazam, M. and Huh, E.‐N. (2014). Fog computing and smart gateway based
communication for cloud of things. Proceedings of the 2nd IEEE International
Conference on Future Internet of Things and Cloud (FiCloud ’14) (August 2014).
Barcelona, Spain, pp. 464–470.
Atzori, L., Iera, A., and Morabito, G. (2010). The internet of things: a survey.
Computer Networks 54 (15): 2787–2805.
Baronti, P., Pillai, P., Chook, V.W.C. et al. (2007). Wireless sensor networks: a survey
on the state of the art and the 802.15.4 and ZigBee standards. Computer
Communications 30 (7): 1655–1695.
Further Readin 115
Bonomi, F., Milito, R., Natarajan, P., and Zhu, J. (2014). Fog computing: a platform
for internet of things and analytics. In: Big Data and Internet of Things: A Road
Map for Smart Environments, Studies in Computational Intelligence book series SCI,
vol. 546 (eds. N. Bessis and C. Dobre), 169–186. Berlin, Germany: Springer.
Chang, K.‐H. (2014). Bluetooth: a viable solution for IoT? (industry perspectives).
IEEE Wireless Communications 21 (6): 6–7.
Colitti, W., Steenhaut, K., De Caro, N. et al. (2011). Evaluation of constrained
application protocol for wireless sensor networks. Proceedings of the 18th IEEE
Workshop on Local and Metropolitan Area Networks (LANMAN ’11) (October
2011). Chapel Hill, NC: IEEE, pp. 1–6.
Culler, D. and Chakrabarti, S. (2011). 6lowpan: incorporating IEEE 802.15. 4 into the
IP architecture, IPSO Alliance. White Paper, 2009.
Eisenhauer, M., Rosengren, P., and Antolin, P. (2009). A development platform for
integrating wireless devices and sensors into ambient intelligence systems.
Proceedings of the 6th IEEE Annual Communications Society Conference on Sensor,
Mesh and Ad Hoc Communications and Networks Workshops (SECON Workshops
’09) (June 2009). Rome, Italy: IEEE, pp. 1–3.
Gomez, C., Oller, J., and Paradells, J. (2012). Overview and evaluation of bluetooth
low energy: an emerging low‐power wireless technology. Sensors 12 (9):
11734–11753.
Gubbi, J., Buyya, R., Marusic, S., and Palaniswami, M. (2013). Internet of Things
(IoT): a vision, architectural elements, and future directions. Future Generation
Computer Systems 29 (7): 1645–1660.
Han, D.‐M. and Lim, J.‐H. (2010). Design and implementation of smart home energy
management systems based on ZigBee. IEEE Transactions on Consumer Electronics
56 (3): 1417–1425.
Hanes, D. (2017). IoT Fundamentals: Networking Technologies, Protocols, and Use
Cases for the Internet of Things. London, UK: Pearson Education.
https://azure.microsoft.com/en‐us/overview/internet‐of‐things‐iot/
iot‐technology‐protocols/
Hui, J.W. and Culler, D.E. (2008). Extending IP to low‐power, wireless personal area
networks. IEEE Internet Computing 12 (4): 37–45.
Hunkeler, U., Truong, H.L., and Stanford‐Clark, A. (2008). MQTT‐S— a
publish/subscribe protocol for wireless sensor networks. Proceedings of the
3rd IEEE/Create‐Net International Conference on Communication System
Software and Middleware (COMSWARE ’08) (January 2008). Bangalore,
India, pp. 791–798.
Katasonov, A., Kaykova, O., Khriyenko, O. et al. (2008). Smart semantic middleware
for the internet of things. Proceedings of the 5th International Conference on
Informatics in Control, Automation and Robotics (ICINCO ’08) (May 2008).
Funchal, Portugal, pp. 169–178.
116 5 Communication Protocols and Technologies
Khan, W.Z., Xiang, Y., Aalsalem, M.Y., and Arshad, Q. (2013). Mobile phone sensing
systems: a survey. IEEE Communications Surveys & Tutorials 15 (1): 402–427.
Lane, N.D., Miluzzo, E., Lu, H. et al. (2010). A survey of mobile phone sensing. IEEE
Communications Magazine 48 (9): 140–150.
Liu, H., Bolic, M., Nayak, A., and Stojmenovic, I. (2008). Taxonomy and challenges of
the integration of RFID and wireless sensor networks. IEEE Network 22 (6): 26–32.
Locke, D. (2010). MQ telemetry transport (MQTT) v3. 1 protocol specification, IBM
developer Works Technical Library. http://www.ibm.com/developerworks/
webservices/library/wsmqtt/index.html.
Mashal, I., Alsaryrah, O., Chung, T.‐Y. et al. (2015). Choices for interaction with
things on Internet and underlying issues. Ad Hoc Networks 28: 68–90.
Mitrokotsa, A. and Douligeris, C. (2009). Integrated RFID and sensor networks:
architectures and applications. In: RFID and Sensor Networks: Architectures,
Protocols, Security and Integrations (eds. Y. Zhang, L.T. Yang and J. Chen), 511–535.
Boca Raton, FL: Auerbach Publications.
Noury, N., Herve, T., Rialle, V. et al. (2000). Monitoring behavior in home using a
smart fall sensor and position sensors. Proceedings of the 1st Annual International
IEEE‐EMBS Special Topic Conference on Microtechnologies in Medicine and Biology
(MMB ’00) (October 2000). Lyon, France, pp. 607–610.
Pantelopoulos, A. and Bourbakis, N.G. (2010). A survey on wearable sensor‐based
systems for health monitoring and prognosis. IEEE Transactions on Systems, Man
and Cybernetics Part C: Applications and Reviews 40 (1): 1–12.
Razzaque, M.A., Milojevic‐Jevric, M., Palade, A., and Cla, S. (2016). Middleware for
internet of things: a survey. IEEE Internet of Things Journal 3 (1): 70–95.
Schmidt, A. and Van Laerhoven, K. (2001). How to build smart appliances? IEEE
Personal Communications 8 (4): 66–71.
Serrano, M., Barnaghi, P., Carrez, F. et al. (2015). Internet of Things Semantic
Interoperability: Research Challenges, Best Practices, Recommendations and Next
Steps. Oslo, Norway: European research cluster on the internet of things, IERC.
Shanmuga Sundaram, B. (2016). A quantitative analysis of 802.11ah wireless standard.
International Journal of Latest Research in Engineering and Technology 2: 26–29.
Shelby, Z., Hartke, K., and Bormann, C. (2014). The Constrained Application Protocol
(CoAP). Tech. Rep., IETF document RFC 7252.
Sheng, Z., Yang, S., Yu, Y. et al. (2013). A survey on the ietf protocol suite for the
internet of things: standards, challenges, and opportunities. IEEE Wireless
Communications 20 (6): 91–98.
Song, Z., Cardenas, A.A., and Masuoka, R. (2010). Semantic mid‐ dleware for the
internet of things. Proceedings of the 2nd International Internet of Things
Conference (IoT ’10), Tokyo Japan (December 2010).
Stanford‐Clark, A. and Linh Truon, H. (2008). MQTT for sensor networks (MQTT‐S)
protocol specification, International Business Machines Corporation Version 1.
Further Readin 117
Sun, W., Choi, M., and Choi, S. (2013). Ieee 802.11 ah: a long range 802.11 WLN at
sub 1 GHz. Journal of ICT Standardization 1 (1): 83–108.
Vasseur, J.P. and Dunkels, A. (2008). Ip for smart objects. White Paper 1, IPSO
Alliance.
Vasseur, J.P., Bertrand, C.P., and Aboussouan, B. (2010). A survey of several low
power link layers for IP smart objects. White Paper, IPSO Alliance. 24 Journal of
Electrical and Computer Engineering.
Vasseur, J., Agarwal, N., Hui, J. et al. (2011). Rpl: the ip routing protocol designed for
low power and lossy networks. Internet Protocol for Smart Objects (IPSO)
Alliance 36.
Vermesan, O., Friess, P., Guillemin, P. et al. (2011a). Internet of things strategic
research roadmap. In: Internet of Things: Global Technological and Societal Trends,
vol. 1 (eds. O. Vermesan and P. Friess), 9–52. Aalborg, Denmark: River Publishers.
Vermesan, O., Friess, P., Guillemin, P. et al. (2011b). Internet of things strategic
research agenda. In: Internet of Things ‐Global Technological and Societal Trends
(eds. O. Vermesan and P. Friess). Aalborg, Denmark: River Publishers.
Villaverde, B.C., Pesch, D., De Paz Alberola, R. et al. (2012). Constrained application
protocol for low power embedded networks: a survey. Proceedings of the 6th
International Conference on Innovative Mobile and Internet Services in Ubiquitous
Computing (IMIS ’12) (July 2012). Palermo, Italy, pp. 702–707.
Weyrich, M. and Ebert, C. (2016). Reference architectures for the internet of things.
IEEE Software 33 (1): 112–116.
Whitmore, A., Agarwal, A., and Da Xu, L. (2015). The internet of things—a survey of
topics and trends. Information Systems Frontiers 17 (2): 261–274.
Wu, M., Lu, T.‐J., Ling, F.‐Y. et al. (2010). Research on the architecture of internet of
things. Proceedings of the 3rd International Conference on Advanced Computer
Theory and Engineering (ICACTE ’10) (August 2010). Chengdu, China: IEEE,
vol. 5, pp. V5‐484–V5‐487.
119
6.1 Introduction
The world of IoT and wearable technology is rapidly growing and steadily pushing
for new innovative products. If these devices did not provide the potential of an
immense value at a low cost, there would not be discussions about developing
solutions based on these technologies in the first place. In fact, the demand is
ongoing and the market is very exciting; however, product engineers and design-
ers face new challenges and design constraints.
With more connected devices coming to the market every day, it is extremely
important to ensure their functionality, security, and interoperability. Whether
creating a new smart connected product or incorporating a new technology into
existing products, there are key considerations to make. For example, wearables
are generally characterized by portability, flexibility, and multi-functionality com-
pared to handheld devices. Moreover, particular performance capabilities must be
integrated into compact form factors. Therefore, the design process, materials
selection, and manufacturing and packaging methods could be quite unconven-
tional at times and need to be addressed and evaluated.
This chapter discusses the development process and design considerations that
developers must follow to guarantee a successful launch of IoT and wearable products.
6.2.2 Requirements/Specifications
The outcome of the previous step results in particular design specifications, a set
of engineering requirements, along with an estimate of the cost of the end prod-
uct. Section 6.3 of this chapter discusses the general product requirements
in detail.
1 Design for manufacture (DFM) is the aspect of the design process where consideration is
given to ensure ease of manufacturing processes aiming at minimizing the production cost.
6.2 Product Development Proces 121
printed circuit board (PCB) is designed, and the first draft of Bill of Materials
(a list of components to be used in the product development) is generated.
Controls, functionalities, and user interface design are all designed in this step.
2 Signal integrity deals with the electrical performance of the wires, conductive tracing, and
other structures used to carry signals within an electronic product. At high bit rates (high-
frequency clock), various effects can degrade these signals to the point where errors take place,
and the system could fail. Signal integrity engineering deals with analyzing and mitigating such
effects. It is an essential task at all levels of electronics packaging and assembly.
122 6 Product Development and Design Considerations
will also provide a clear perspective of what the essence of the product is. This
step should start with the top-level design, breaking down the requirements to
smaller tasks that can be tackled separately.
One of the most important decisions to make before the start of product devel-
opment is determining whether an operating system will be used. The choice of
real-time operating system (RTOS), or high-level operating system (HLOS), devel-
opment packages, programming languages, use of third-party libraries such as
networking stacks, and GUIs must be determined as well. Such decisions will
have an impact on selecting the microprocessor and memory of the product.
6.2.4 Prototyping
Prototyping generally refers to creating a sample model of a new product or pro-
cess for testing and evaluation purposes. Prototyping provides specifications for a
physical, working system rather than a virtual, theoretical one.
Some preliminary prototypes are basic and simple, and intended to visualize
how a product might work, while others represent an actual representation of the
end product. The selected order of a prototype, which is cost-dependent, must fit
the specific requirements of the tests. The device enclosure, user interface designs,
and the software deployment, which was defined in the previous step, are also
implemented in this phase.
3 Product life cycle management (PLM): The development of IoT and wearable devices
requires electrical, mechanical, and software design teams to collaborate together beginning
from the earliest stages of the project. Product life cycle management (PLM) solutions are
particularly designed to help bring all teams and designs together into a single system to enable
faster design approvals and improved traceability from concept to final product launch.
6.2 Product Development Proces 123
4 Regulatory Pre-compliance Testing: The goal of this testing is to detect in the early stages
if there are EMC or safety issues that need to be fixed. Preparation from the development team
who typically support a variety of test modes is required for both pre-compliance and official
compliance testing.
5 Life cycle testing: typically involves testing the product under operating conditions
significantly beyond the norm. This type of testing in the design phase is commonly known as
highly accelerated life testing (HALT), and when conducted on production samples is known as
highly accelerated stress screening (HASS).
124 6 Product Development and Design Considerations
6.2.6 Production
The product can enter the production phase once a production readiness review is
completed. The purpose of this stage is the industrial production of the device and
making it available for purchase to the end user. Figure 6.1 depicts a general prod-
uct development process diagram for modern electronic devices.
Ideation and
research
Requirements
Engineering
analysis
Prototyping
Testing &
Functionality Compliance
validation
Production
6 Note: In practice, the designer should pay attention to the battery self-discharge rate which is
a phenomenon in batteries in which internal chemical reactions decrease the stored charge
(capacity) of the battery even when not used in a circuit.
128 6 Product Development and Design Considerations
power. For wireless designs with antenna(s) mounted on the PCB, both the
feeder(s) and the antenna(s) will require impedance matching to ensure maximum
radiation efficiency and minimize signal reflection back to the transceiver.
The integration of the RF transceiver with other subsystems in close proximity
within a small-form factor product poses a major challenge: electromagnetic
interference. The negative impacts are summarized below:
●● Interference due to the coupling of unwanted signals into the antenna and its
feeding port, which compromises the range either as a result of reduced receiver
sensitivity or lowered signal to noise ratio
●● Electronic and thermal noise caused by the microcontroller/microprocessor,
power supplies or other subsystems being coupled into RF system through their
control interfaces.
The reader is referred to antenna design and RF circuits books for theory and
design procedures.
First, one should start with the transmitted power at the source then add in the
gain from antennas and repeaters. Next, the losses of the cables, connectors, and
anything the transmitted signal passes through (channel) are subtracted.
Friis equation is used in telecommunications engineering, where the received
power by the receiving antenna is calculated under idealized conditions due to a
specific power transmitted by another antenna some distance away. Friis’ trans-
mission equation for free space propagation is given below:
Pr Pt Gt Gr 20 log 20 log D
4
where Pt is the transmitted power, Pr is the received power, Gt is the transmitting
antenna gain, Gr is the receiving antenna gain, λ is the wavelength,7 and D is the
7 Wavelength can be obtained from the frequency of the electromagnetic wave: C = λ × F,
where C is the speed of light.
6.3 IoT and Wearable Product Requirement 129
distance between the transmitter and the receiver. For example, a link budget of
120 dB at 433 MHz gives a range of approximately 2 km.
It should be noted that the decibel (dB) scale is widely used in electronics, signal
analysis, and communication systems. The dB is a logarithmic way of describing
a ratio especially when the range is extremely wide. The ratio may be power, volt-
age, some intensity, etc.
When we convert a value V into decibel scale, we always divide by a reference
value Vref, thus the quantity is dimensionless since it represents a ratio:
V
Vref
Power is normally measured in Watt (W) and milliwatt (mW). The correspond-
ing dB conversions are dBW and dBm. The reader should be familiar with such
conversions when working in this area.
For example: Sensitivity level (the threshold of receiving a signal) of a GSM
receiver is 6.3 × 10−14 W which is equivalent to −132 dBW or −102 dBm;
Bluetooth transmitted power is 10 mW which is equivalent to −20 dBW or
10 dBm; GSM mobile transmitted power is 1 W which is equivalent to 0 dBW or
30 dBm, etc.
Figure 6.2 expresses a link budget elaboration between a transmitter and a
receiver.
6.3.3.2.1 Tips
●● A 6 dB improvement gives rise to doubling the range.
●● Doubling the frequency gives rise to half the range.
Propagation loss
Transmitted power Received power
Transmitter Receiver
Antenna gain Antenna gain
The path loss for a 5 km link (λ is equal to 0.125 m at 2.4 GHz), considering
only the free space loss is:
6.4 Design Considerations
Design considerations are factors that may affect the product or system require-
ments, design, or operational concept and should be part of the systems engineer-
ing process.
6.4.3 Reliability
For a smart device to be successful, it must be precise, consistent, punctual, and
reliable. This is essential for the user to establish confidence and trust in the
device. Any error tolerances must be identified by the manufacturer before
the release of the product and must be clearly disclosed to the user. Moreover, all
the system components should be accurately integrated and field-tested to ensure
a reliable performance. For example, the problem of electromagnetic interference
(EMI) typically arises when multiple components are integrated in compact form
factors which could negatively impact the device’s performance.
EMI can also affect the accuracy of data acquisition and measurement in
addition to the reliability of the communication signals. These risks can be
eliminated by embedding all components within a specially designed low-EMI
enclosure.
6.4.5 Aesthetics
Users’ tastes vary based on psychological, societal, and cultural perceptions. Users
also differ physically in built and complexion. To establish an emotional connec-
tion between the wide spectrum of users and the product, wearables and applicable
IoT devices with different styles and fashion personalities may need to be offered
to the consumers.
6.4.6 Compatibility
As mentioned in the previous chapters, IoT and wearable devices are, in many
cases, synced to a gateway (i.e., a smartwatch connected to a smartphone or tab-
let) for data processing and forwarding. The connection is typically carried out via
6.4 Design Consideration 133
9 Ergonomics is a relatively new discipline that deals with designing products, systems, or
processes with an eye towards ensuring a proper, comfortable, and convenient handling and
interaction between the device and the user.A proper ergonomic design requires researching
other disciplines such as anthropometry, which deals with studying body sizes and shapes of a
population, biomechanics, environmental physics, and applied psychology.
134 6 Product Development and Design Considerations
6.5 Conclusion
In a competitive industry, the development of a new product may involve risks but
also creates business opportunities. The stages of product development may seem
like a long process, but they are introduced to save time and resources. A careful
planning for a new product development processes along with testing and validation
of prototypes are essential steps toward ensuring that the new product will meet the
target market needs. This chapter discussed key engineering requirements and con-
siderations for designing and deploying successful IoT and wearable products.
Problems
2 A battery-operated IoT device must run for two years without replacing the
battery, at Irun = 25 mA, with 1 ms operation for every two seconds and sleep
current Islp = 1 μA. Determine the required battery capacity?
10 Spoofing is the act of impersonating another device or user on a network in order to gain
illegitimate advantage (i.e., steal data, inject malware, or bypass access controls).
136 6 Product Development and Design Considerations
3 Pick a wearable device of your choice then list three battery candidates avail-
able commercially for a reasonable operating time. Justify your battery
choice according to the energy budget of the wearable device.
4 What is the wavelength at 900 MHz, 2.45 GHz, and 60 GHz? What is the path
loss over 1 m, 100 m, and 1 km for these frequencies?
8 List all the possible design considerations you believe they are appropriate for a
smart T-shirt that measures heart rate, breathing rate, and temperature.
10 List all the possible design considerations you believe appropriate for an
automatic dog feeder. The device lets you feed your dog remotely, schedule
meals, and control the portion size.
Interview Questions
2 What are some of the basic checks that need to be made when laying out a
microcontroller-based design?
7 You are given a physical product (i.e., a fitness tracker). What do you like
about the design, and what you dislike? How would you improve it?
8 What design considerations would you list for designing a smart baby crib
that detects if the baby is fussing, choking, having a fever, or a wet diaper?
9 Draw an RF/antenna circuit schematic and describe how you would lay it
out on a PCB.
Further Reading
Arora, S., Yttri, J., and Nilsen, W. (2014). Privacy and security in mobile health
(mHealth) research. Alcohol Research: Current Reviews 36 (1): 143–151.
Balakrishnan, A. (1998). Concurrent engineering: models and metrics. Master
dissertation. McGill University, Canada.
Belliveau, P., Griffin, A., Somermeyer, S., and Meltzer, R. (2002). The PDMA Toolbook
for New Product Development. New York: John Wiley & Sons.
Campbell, J.L., Rustad, L.E., Porter, J.H. et al. (2013). Quantity is nothing without quality:
automated QA/QC for streaming environmental sensor data. BioScience 63 (7): 574–585.
Cooper, R. (2001). Winning at New Products: Accelerating the Process from Idea to
Launch, 3e. Cambridge, MA: Perseus Publishing.
Cooper, R. and Edgett, S. (2008). Maximizing productivity in product innovation.
Research Technology Management 51 (2): 47–58.
Damm, O. and Wrede, B. (2014). Communicating emotions: a model for natural
emotions in HRI. HAI ’14 Proceedings of the Second International Conference on
Human-Agent Interaction, Tsukuba Japan, pp. 269–272.
Khaleel, H.R. (2014). Innovation in Wearable and Flexible Antennas. Southampton,
UK: WIT Press.
Lallemand, C. (2011). Toward a closer integration of usability in software
development: a study of usability inputs in a model-driven engineering process.
EICS ’11 Proceedings of the 3rd ACM SIGCHI Symposium on Engineering Interactive
Computing Systems, Pisa, Italy, pp. 299–302.
Lilien, G., Morrison, P., Searls, K. et al. (2002). Performance assessment of the lead
user idea generation process for NPD. Management Science 8 (8): 1042–1059.
138 6 Product Development and Design Considerations
7.1 Introduction
After your IoT or wearable technology project is up and running, devices will start
to generate vast amounts of data. An efficient, scalable, and cost-effective means
will be needed for managing those devices and handling all that information and
deliver the desired outcomes for you. When it comes to long-term storage, pro-
cessing, and data analysis, nothing can beat the cloud.
By minimizing the need for on-premises infrastructure, the cloud has enabled
businesses to go beyond the conventional applications of IoT and wearable devices
and accelerated the large-scale deployment of these technologies. Moreover, as
data from the physical world comes in various formats, cloud platforms offer a
wide range of management solutions from unstructured bits of data, such as
images or videos, to structured entities, and high-performance databases for
telemetry data.
On the other hand, Edge computing where data are processed closer to the end-
points is increasingly being employed in IoT and wearable technology in order to cut
down the latency and expedite the decision making process. Current deployments
often employ a mix of cloud and Edge computing to get the best of the two worlds.
For example, health monitors and other healthcare wearable devices can save
lives by instantaneously alerting medical staff when help is needed. Moreover,
smart surgical assistive devices must be able to analyze data swiftly, safely, and
accurately. If these devices strictly rely on transmitting data to the cloud for deci-
sion making, the results could be disastrous.
This Chapter provides an overview of cloud topologies and platforms, and an
architectural synopsis of OpenStack cloud. Next, Edge topologies and computing
technologies will be presented. It will be shown that the maximum value from an
IoT or wearable technology project can only be gained from an optimal combination
of cloud and edge computing, and not by a cloud-only architecture.
7.2 Cloud
7.2.1 Why Cloud?
IoT and wearable technology cloud comprises the services and standards neces-
sary for connecting, managing, and securing a wide spectrum of devices and
applications enabled by these technologies, in addition to the underlying infra-
structure required for processing and storing the data produced by these devices.
The cloud enables businesses to leverage the potential of these technologies with-
out having to build the necessary infrastructure and services from the ground up.
The cloud offers a more efficient, scalable, and flexible model for bringing the
infrastructure and services to power IoT and wearable devices and their applica-
tions. Most of IoT is virtually limitless in scale, unlike most organizations’
resources. The cloud computing model effectively takes in the ever-expanding
scale of IoT and wearable devices, and it can do so in a cost-effective manner.
Organizations may choose this model in order to benefit from lower prices, the
ability to cluster resources, in addition to customized security. The most promi-
nent examples of IaaS service are Amazon Web Services (AWS) and Microsoft Azure.
a given need. However, nine key components have been identified by the
OpenStack community. These components are part of the OpenStack’s core and
are “pre-packaged” within any OpenStack system. They are also officially main-
tained by the OpenStack community.
It is worth noting that all communications within the OpenStack components
are performed through Advanced Message Queueing Protocol (AMQP) mes-
sage queues.
●● Nova is the main computing engine behind OpenStack. It is used to identify
computation resources based on demand, and for deploying and managing the
virtual machines and other instances to handle computing tasks.
●● Swift is a widely used object storage system designed to store files, backups,
photographs and videos, analytics, web content, etc. Rather than referring to
files by their location on a disk drive, clients can instead refer to a unique identi-
fier pertaining to the file or data cluster and let OpenStack decide where to store
it. This promotes scalability since developers do not have to worry about the
capacity on systems behind the software.
●● Glance provides discovery, registration, and delivery services for disk and
server images (virtual copies). The ability to immediately capture a server image
and store it away is a powerful feature of the OpenStack cloud. Stored images
can be used as a template to quickly deploy new servers. Glance can also be
used to store and classify an unlimited number of backups. Glance interacts
with Swift (the object store) to retrieve or store the images, while the Glance
application program interface (API)1 provides an interface for querying infor-
mation about these images and allows clients to stream the images to new
servers.
●● Cinder, the block storage component in the OpenStack, acts as a storage and as
a service for scenarios involving databases. It dynamically expands file systems,
such as data lakes, which are of paramount importance in IoT and wearable
technology applications.
●● Neutron provides the networking capability for OpenStack. Its main objective
is to ensure that each OpenStack component can intercommunicate quickly
and efficiently. The entire network is configurable and provides services such as
7.3 Edge and Fog
As we saw earlier, clouds are located at the last station of the data train originating
from the IoT or wearable device, and sits over the WANs.
It should be noted that most wearables and some IoT devices utilize non-IP-based
protocols such as ZigBee and BLE when operating within PANs, otherwise, the data
travel through IP-based protocols on its way to the cloud. This is where the Edge gate-
way comes into play. It acts as a coordinator and translator between the two.
The above is not the only reason an Edge layer is needed. Latency and response
time are crucial effects that triggered the need for Edge. As we saw in the previous
chapters, latency of a millisecond can have disastrous effects in some applica-
tions, and that the cloud component introduces extra latency over the WAN.
Fog computing draws a parallel from the success of Hadoop and MapReduce,
which are open-source software utilities that facilitate the operation of networks
of too many nodes to solve problems involving significant amounts of data and
7.3 Edge and Fo 145
Milli
Cloud
seconds
Micro
Latency
Nano
seconds
2 In-depth details of the full OpenFog reference architecture are published in a 160-page
document [1].
146 7 Cloud and Edge: Architectures, Topologies, and Platforms
●● OpenFog Node Security: This layer defines the hardware security portion of
the stack. In a given topology, upper level fog nodes should be able to oversee
lower-level nodes as part of the hierarchy. Peer nodes should be able to monitor
their neighboring nodes to the right and left. Encryption, physical tampering
monitoring, and packet inspection are also among the responsibilities of
this layer.
●● Network: This is the first slice of the hardware layer. The network layer is
aware of the Fog topology and routing, and has the role of physical routing to
other fog nodes. This is a major distinction from typical cloud networks which
virtualize all their internal interfaces. Here, the geographical location of the
network has an impact on the performance of an IoT deployment.
●● Accelerators: Another aspect of OpenFog that does not exist in cloud architec-
tures is the use of accelerators such as general-purpose graphics processing
units (GPGPUs) and field-programmable gate arrays (FPGAs) to provide ser-
vices for imaging, digital signal processing, machine learning, and encryption
and decryption.
●● Compute: The compute slice of the stack is similar to the compute functional-
ity in OpenStack. The key functions of this layer include task execution, resource
provisioning, and load balancing.
●● Storage: The storage portion of the architecture supports the low-level inter-
face to the fog storage. This layer is also responsible of managing all the tradi-
tional types of storage devices, such as disk drives and RAM arrays.
●● Hardware Platform Infrastructure: This layer does not deal with the actual
software or hardware of the fog node but more with the physical structure and
mechanical support. For example, fog devices could be installed in harsh and
remote areas, and hence, they must be rugged and mechanically robust.
●● Protocol Abstraction: The protocol abstraction layer bonds the bottom ele-
ments of the system (sensors or actuators) with other layers of the fog node and
the cloud. By abstracting the interface between the layers, a heterogeneous
combination of sensors can be deployed within a single fog node.
●● Sensors, Actuators, and Control Systems: This is the bottom layer of the
stack where the physical objects are laid. All of these objects (sensors, actua-
tors, control elements, etc.) communicate with the fog node which has the
responsibility to service, secure, and manage that device.
7.4 Platforms
With AWS IoT Greengrass, you can use familiar programming languages and
models to create and test your device software in the cloud and then deploy it.
AWS IoT Greengrass can be programmed using familiar languages and program-
ming models to filter device data, manage the device data, and only send neces-
sary information back to AWS. AWS IoT Greengrass Connectors can also be used
to connect to third-party applications, on-premises software, and other AWS
services.
AWS IoT Greengrass lets the developers create IoT solutions that connect differ-
ent types of devices with the cloud and each other. Devices that run Linux, such
as Raspbian, Arm, and x86 architectures can host AWS IoT Greengrass Core
which enables the local execution of AWS Lambda code, security, messaging, and
data management.
One of the core subjects in IoT and wearable technology is how to make sense of
the massive amount of data that is generated. As mentioned previously, the real
impact of data coming from smart devices is realized only when the analysis of
the data leads to actionable business insights.
Because much of this data can seem beyond grasp, specialized algorithms and
tools are needed to find the data relationships that will lead to useful insights. This
brings us to the topic of machine learning.
Machine learning is part of a larger set of technologies commonly grouped
under the umbrella of artificial intelligence (AI). Once collected data are ana-
lyzed, intelligent actions need to be taken. Performing such analysis manually is
close to impossible or very impractical.
The most useful feature of machine learning in IoT and wearable technology is
that it can detect outliers and abnormal activities and trigger necessary actions
accordingly. As it learns more and more about an event or activity, it gets more
accurate and efficient. Moreover, machine learning algorithms can create models
which predict future events precisely by identifying the factors that lead to a par-
ticular result.
The difficulty, however, lies in determining the right algorithm and the most
appropriate learning model for each use case. Such analysis goes beyond the scope
of this chapter, and the reader is referred to a couple of resources that can be
found in the references section of this chapter ([2, 3]).
7.6 Conclusion
The cloud offers a wide range of functions and solutions; however, certain analy-
sis should be performed on the edge, closer to the devices where data are being
generated to solve security, cost, and latency issues found in cloud.
Selecting the cloud service models and frameworks, fog topology, and analytics
modules is an important task where much literature dives deep into the minute
details of creating and deploying them. The design team must have an under-
standing of the topology and framework and be able to choose the best architec-
ture to address the data needs of the project in hand with possible future scaling
in mind.
It was demonstrated in this chapter that the maximum gain from IoT or wear-
able technology projects can only be achieved from an optimal combination of
cloud and edge computing where both work together to achieve the desired out-
comes of the project.
152 7 Cloud and Edge: Architectures, Topologies, and Platforms
Problems
1 Research examples of IoT and wearable devices with each example utilizing
one of the cloud types mentioned in this chapter.
2 Research examples of IoT and wearable devices with each example utilizing
one of the cloud service models mentioned in this chapter.
3 You are working on developing a new smart home virtual assistant. Research
five of the IoT platforms mentioned in this chapter, then narrow down your
selection for this project to two candidates. Justify your choices.
4 List five applications or device ideas that could benefit from a fog layer. Justify
your answer.
5 Research five open-source API platforms and compare between their func-
tionalities, features, and related criteria in a comparison table.
8 Compare through a table the differences between the OpenStack and OpenFog
architectures
3 What are some of the cloud computing platform databases used in the indus-
try? What would your choice be for a fitness tracking project?
7 What are some of the important questions you would ask a client if you were
tasked with migrating a high traffic on-premise data and application to
the cloud?
8 How would you move 1 billion files from an on-premise data center to
the cloud?
9 How have you used DevOps3 in a project and how has it added value to your
clients?
References
3 DevOps is a set of practices that integrate software development and IT operations aiming at
shortening the project development life cycle.
154 7 Cloud and Edge: Architectures, Topologies, and Platforms
Further Reading
Security
8.1 Introduction
While many of the emerging IoT and wearable technology applications are giving
rise to beneficial and innovative uses, they also pose security and privacy concerns
that are largely unexplored. In fact, a new research area concerning the security of
these technologies has recently emerged.
According to a recent study on ten commercially available smartwatches, it was
found that all of them exhibit a form of vulnerability which includes poor authen-
tication, weak encryption techniques, and privacy-related issues. For instance,
only 50% of the surveyed devices offered a screen lock mechanism by either a PIN
or a custom pattern, while 70% transmitted data without any form of encryption.
It was recently reported that a hacker could control the mechanism of an insulin
regulator wirelessly from hundreds of feet away to deliver a lethal dose to a user.
Further, it was demonstrated that a hacker could deliver a lethal voltage shock to
a patient with a pacemaker. One can think of other horrifying scenarios!
The infrastructure of IoT and wearable systems encompass a wide spectrum of
components and technologies, and each is susceptible to a number of vulnerabili-
ties and threats. It is crucial to ensure that each component is safe and secure.
Compared to laptops, smartphones, and tablets, which were swiftly embraced
by consumers, IoT and wearable devices are being adopted on a relatively slower
pace. However, it is never too early to pay particular attention to the inevitable
security risks that come with these technologies. These concerns will be more
serious in the coming years as these devices become more mainstream, and with-
out the right security controls, data exchanged and shared by IoT and wearable
devices could end up being used in ways never intended or even imagined. New
forms of identity theft, harassment, stalking, and fraud are already emerging.
This Chapter examines the security goals that every designer should aim to
achieve. Next, an overview of the most important security challenges, threats,
attacks, and vulnerabilities faced by IoT and wearable devices is provided. Finally,
a list of security design consideration and best practices that have historically
worked are discussed.
8.2 Security Goals
The goals of information security are defined best by the CIA triad. Not to be con-
fused with the U.S government agency, CIA stands for Confidentiality, Integrity,
and Availability. The goals of information security, and its largest branch, cyberse-
curity, are to protect the confidentiality of information, the integrity of informa-
tion from unauthorized changes, and to ensure the availability of information to
the users at the expected performance level. The term information and data in the
CIA triad has a broad definition, and it spans from high-level user information to
metadata clues.
With IoT and wearable solutions maturing and taking on key responsibilities,
security becomes a critical issue. Like everything else, makers of IoT and wearable
devices are forced to develop their products within the boundaries of the informa-
tion security goals which apply to both data in motion (during transmission) or
data at rest (stored data or system configuration). However, these devices create
new entry points for attackers to get into the system which requires additional
security goals on top of the CIA:
Confidentiality: Confidentiality is an important security feature in IoT, but it
may not be mandatory in some scenarios where data is presented publicly.
However, in most cases and scenarios data is sensitive and must not be dis-
closed or read by unauthorized entities. Sensitive data include, but not limited
to, personal biometric data from wearables and smart home applications,
patient data, private business data, and military data.
Integrity: Integrity models ensure that data remain clean and trustworthy by
protecting against intentional or accidental changes to the system data.
Availability: Availability models keep data, services, and resources available
for authorized users at any given time or situation (i.e. during natural disas-
ters). Different hardware and software components in IoT and wearable
devices must be able to provide services even in malicious environments or
adverse situations. Different applications have different availability require-
ments, for example, remote health monitoring systems would most likely
have higher availability requirements than a farm soil moisture monitor-
ing system.
8.3 Threats and Attack 159
1 A botnet is a number of devices connected to the Internet that can be used to perform
Distributed Denial-of-Service (DDoS) attacks, access device data, send spam, etc.
160 8 Security
typically have some form of privileges, for instance, they are authorized to
perform some actions or access some resources, but not necessarily all of them.
Therefore, an attacker might attempt to gain additional privileges, for example
by spoofing a user with higher privileges or by tampering the system to upgrade
their own privileges.
2 Brute Force Attack: is a trial and error technique used by application algorithms to decode
encrypted data such as passwords or Data Encryption Standard keys.
162 8 Security
purposes. However, hackers often make use of back doors as a part of a malicious
exploit.
6) Physical Attacks and Theft: This type of attack deals with tampering with
the hardware components. IoT devices are more susceptible to such attacks
than wearables due to their unattended and geographically distributed
nature. Moreover, IoT devices operate in outdoor environments in many
applications which make them more prone to tampering and theft.
8.4 Security Consideration
Security for IoT devices has to be considered from the first phase of design and not
retrofitting it at the end since it would be too late at that point. Security also needs
to be viewed both holistically and atomistically from the “thing” to the cloud.
Each component in the system should have a list of security parameters and
enablers.
A plethora of lists of security considerations and ideas that have traditionally
worked exist in the literature. For example, enabling safe over-the-air updates to
maintain security codes up to date, securing sensitive data and safeguarding regu-
latory compliance, managing the lifecycle of each device, and using the most cur-
rent operating system and libraries with all relevant patches have all been
recommended as good practices during the design phase.
Biometric user authentication has also been considered as a possible solution to
some common threats. Biometric authentication offers more convenience in
wearable devices, especially in compact platforms where passwords and PIN
codes would be less appropriate. However, this solution will cover specific aspects
of the raised privacy and security concerns, but could certainly trigger more.
In addition to the functional aspects, security solutions for IoT and wearable
technology have to also be scalable and flexible enough to be integrated with plat-
forms of enterprise systems in cost-effective manner.
In 2019, the European Union Agency for Cybersecurity (ENISA) published a
document entitled “Good Practices for Security of IoT.” The aim of the report was
to provide guidelines and recommendations for designers and developers for
countering and mitigating the threats impacting IoT. The report recognizes that
securing IoT can be a tough task for software developers if hardware is not
equipped with security capabilities. For instance, when integrating a powerful
cryptographic algorithm in the software stack, a Trusted Platform Module (TPM)
is used in the hardware to ensure that the private key will not be compromised.
Therefore, the underlying hardware cannot be neglected when developing IoT
projects. In fact, the security approach is conceived as a set of requirements where
the design of hardware influences the design of software.
8.4 Security Consideratio 163
In this section, we will list the measures that are most relevant to the design of
IoT and wearable devices.
1) Test the Third Party Process: Prior to integrating components or services from
third party suppliers, a process must be defined to test their security
performance.
2) Define an Incident Management Plan: A plan to manage vulnerabilities and
updates must be defined, including third-party components, along with the
necessary actions to combat security incidents during software development.
3) Implement Configuration Management and Authorization Policy: The integ-
rity of the system has to be appropriately managed by ensuring that only
authorized changes can be made to the configuration. A privilege based
scheme has to also be established to prevent unauthorized users from access-
ing restricted resources.
4) Define Security Metrics: Security metrics have to be defined and implemented
to ensure that the security requirements are fulfilled throughout the lifecycle.
5) Provide a Secure Framework: A framework to implement security by design
must be defined and implemented throughout the solution lifecycle.
6) Specify Security Requirements: To include features that ensure regulatory
compliance and avoid vulnerabilities; security requirements must be identi-
fied prior to development.
7) Perform Risk Assessment: Risks throughout the software development
process have to be identified by analyzing all the data sources, storage,
applications, or third parties, if any.
8) Implement Data Classification: Data has to be classified based on their level
of sensitivity to establish appropriate protection measures.
9) Ensure That the Hardware Requirements Derived from Software Requirements
are Considered: Additional requirements stemming from hardware
implementation must be defined and documented.
10) Implement Authorization: In an IoT system, access control must be imple-
mented to verify that users and applications have the right permissions.
164 8 Security
11) Secure Storage of Users’ Credentials: User credentials of IoT devices must be
protected from disclosure, i.e. using hash functions for storing passwords.
12) Use Libraries and Third-Party Components that are Patched for Latest Known
Vulnerabilities: Software libraries and frameworks to be included in the pro-
ject must be verified that they are patched for the latest known security vul-
nerabilities. An upgrade roadmap for libraries and third-party components
must also be established.
13) Use Secure Communication Protocols: It must be ensured that communica-
tions will not be compromised by utilizing encrypted channels and authenti-
cated connections in order to share data between IoT devices.
14) Use Proven Encryption Techniques: System data should be protected using
encryption algorithms that are proven to be secure.
15) Implement Secure Web Interfaces: Web interfaces or technologies used in IoT
systems should also be secured in order to be used.
16) Implement Secure Coding Practices: During the design process, the software
under development must be tested to ensure that the authentication mecha-
nism conforms to globally accepted practices and that queries use parameteri-
zation to avoid code injections.
17) Implement Anti-Tampering Features: Countermeasures have to be deployed to
prevent unauthorized code modification in all steps of the development process.
18) Perform IoT SDLC Tests: A penetration test has to at least be carried out when
the software development is complete.
19) Enforce the Change of Default Settings: Change of default settings must be
ensured at first user interaction with the device.
20) Use Substantiated Underlying Components: Component customizations
must be restricted in order to not compromise security functionalities.
21) Implement Interoperability Open Standards: This is done to enhance secure
integration processes.
22) Provide Audit Capability: Security events must be ensured that they are regis-
tered in software logs.
8.4.1 Blockchain
A blockchain is a series of time-stamped records of data that are linked and
secured using cryptography. Each block contains a cryptographic hash of the pre-
vious block, and transactions are managed by a cluster of computers not owned by
any single entity.
Characteristics of blockchain are:
1) Data contained in a blockchain is resistant to modification.
2) Transactions between two parties are recorded permanently and verifiably by
an open, distributed ledger.
8.4 Security Consideratio 165
Blockchain and IoT are two technologies that will continue to thrive as they
both become more pervasive and mainstream.
The aim of this section was to introduce blockchain technology, and there is cer-
tainly much more material to cover but it is beyond the scope of this book. The reader
is referred to some suggested books specialized in this vital topic (in the Further
Reading section). It is crucial that one understands the complexities involved in
blockchain deployment before launching into using it for IoT or wearable projects.
8.5 Conclusion
IoT and wearable technology face a number of threats that must be recognized for
proactive measures to be taken. These technologies comprise a conglomeration of
components, and each of these components is subjected to a number of vulnera-
bilities and threats. It is crucial to ensure that each component is safe and secure.
Security is a process that must be considered in the first phase of design and
applied throughout the lifecycle of product. To achieve security, the design and
development team must be able to define risks and make informed decisions about
how to best address them. Fortunately, much of what is needed to minimize risks
from threats is already available. Networks can be secured with the right equipment,
configuration, practices, and policies. Threats and attacks from risky practices of
unaware users can be identified and mitigated with the right techniques and training.
Problems
2 Research the commercially available security solutions dedicated for IoT and
wearable technology. Compare between their effectiveness based on the tar-
geted area.
4 Create a table that maps the security goals against threats and attacks men-
tioned in this chapter.
5 You are designing a wearable device that controls a pacemaker. What are the
possible threats and attacks? What is your risk assessment strategy?
Technical Interview Questions 167
6 You are working on a project that involves designing a smart door lock
that can be controlled remotely. What are most important security
considerations?
7 How would you prevent brute force attacks when planning your IoT
projects?
8 Research how Mirai and Satori attacks are related. What can you do to
prevent such attacks in the future?
10 Would your soil moisture monitor project benefit from blockchain technol-
ogy? Why, or why not?
10 What are the main assets you would focus on in your security strategy for
developing an IoT project?
168 8 Security
F
urther Reading
Abomhara, M. and Køien, G.M. (2015). Cyber security and the internet of things:
vulnerabilities, threats, intruders and attacks. Journal of Cyber Security and
Mobility 4 (1): 65–88.
Andreev, S. and Koucheryavy, Y. (2012). Internet of things, smart spaces, and next
generation networking. Proceedings of 12th International Conference, NEW2AN
2012, and 5th Conference, ruSMART 2012, St. Petersburg, Russia (27–29 August
2012). LNCS, Springer, vol. 7469, 464.
Ansari, S., Rajeev, S., and Chandrashekar, H. (2002). Packet sniffing: a brief
introduction. IEEE Potentials 21 (5): 17–19.
Ball, D. (2011). Chinas cyber warfare capabilities. Security Challenges 7 (2): 81–103.
Bergman, N. and Rouse, J. (2013). Hacking Exposed Mobile: Security Secrets &
Solutions, 1e. New York: McGraw-Hill.
Bertino, E., Martino, L.D., Paci, F., and Squicciarini, A.C. (2010). Web services
threats, vulnerabilities, and countermeasures. In: Security for Web Services and
Service-Oriented Architectures (eds. E. Bertino, L.D. Martino, F. Paci and
A.C. Squicciarini), 25–44. Berlin, Germany: Springer.
Brauch, H.G. (2011). Concepts of security threats, challenges, vulnerabilities and
risks. In: Coping with Global Environmental Change, Disasters and Security (ed.
H.G. Brauch), 61–106. Berlin, Germany: Springer.
Cha, I., Shah, Y., Schmidt, A.U. et al. (2009). Trust in M2M communication. IEEE
Vehicular Technology Magazine 4 (3): 69–75.
Dahbur, K., Mohammad, B., and Tarakji, A.B. (2011). A survey of risks, threats and
vulnerabilities in cloud computing. Proceedings of the 2011 International Conference
on Intelligent Semantic Web-Services and Applications. Amman, Jordan: ACM, 12.
De, S., Barnaghi, P., Bauer, M., and Meissner, S. (2011). Service modelling for the
internet of things. 2011 Federated Conference on Computer Science and Information
Systems (FedCSIS). Szczecin, Poland: IEEE, pp. 949–955.
Dolev, D. and Yao, A.C. (1983). On the security of public key protocols. IEEE
Transactions on Information Theory 29 (2): 198–208.
Duncan, A.J., Creese, S., and Goldsmith, M. (2012). Insider attacks in cloud computing.
2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing
and Communications (TrustCom). Liverpool, England, UK: IEEE, pp. 857–862.
ENISA (2019). Good Practices for Security of IoT, Secure Software Development
Lifecycle, The European Union Agency for Cybersecurity (ENISA).
FTC Staff Report (2015). Internet of Things, Privacy & Security in a Connected
World. FTC Staff Report.
Hongsong, C., Zhongchuan, F., and Dongyan, Z. (2011). Security and trust research
in M2M system. 2011 IEEE International Conference on Vehicular Electronics and
Safety (ICVES). Beijing, China: IEEE, pp. 286–290.
Further Readin 169
Rohan, P. (2019). Demystifying the relationship between IoT and blockchain. Forbes
(29 May 2019). https://www.forbes.com/sites/forbestechcouncil/2019/05/29/
demystifying-the-relationship-between-iot-and-blockchain/#267f0c8d605d.
Jiang, D. and ShiWei, C. (2010). A study of information security for M2M of IoT. 2010
3rd International Conference on Advanced Computer Theory and Engineering
(ICACTE), vol. 3. Chengdu, Sichuan province, China: IEEE, pp. V3–V576.
Ke, W.C. and Singh, M.M. (2016). Wearable technology devices security and privacy
vulnerability analysis. International Journal of Network Security & Its Applications
(IJNSA) 8 (3): 19–30.
Kizza, J.M. (2013). Guide to Computer Network Security. Heidelberg, Germany: Springer.
Kozik, R. and Choras, M. (2013). Current cyber security threats and challenges in
critical infrastructures protection. 2013 Second International Conference on
Informatics and Applications (ICIA). Lodz, Poland: IEEE, pp. 93–97.
Kumar, J.S. and Patel, D.R. (2014). A survey on internet of things: security and
privacy issues. International Journal of Computer Applications 90 (11): 20–26,
published by Foundation of Computer Science, New York, USA.
Li, F., Lai, A., and Ddl, D. (2011). Evidence of advanced persistent threat: a case study
of malware for political espionage. 2011 6th International Conference on Malicious
and Unwanted Software (MALWARE). Fajardo, USA: IEEE, pp. 102–109.
Lopez, J., Roman, R., and Alcaraz, C. (2009). Analysis of security threats,
requirements, technologies and standards in wireless sensor networks. In:
Foundations of Security Analysis and Design V (eds. J. Lopez, R. Roman and
C. Alcaraz), 289–338. Berlin, Germany: Springer.
Padmavathi, D.G. and Shanmugapriya, M. (2009). A survey of attacks, security
mechanisms and challenges in wireless sensor networks. arXiv preprint
arXiv:0909.0576.
Pipkin, D.L. (2000). Information Security. Saddle River, NJ: Prentice Hall PTR.
Roman, R., Zhou, J., and Lopez, J. (2013). On the features and challenges of security and
privacy in distributed internet of things. Computer Networks 57 (10): 2266–2279.
Rudner, M. (2013). Cyber-threats to critical national infrastructure: an intelligence
challenge. International Journal of Intelligence and Counter Intelligence 26 (3):
453–481.
Santos, M. and Moura, E. (2019). Hands-On IoT Solutions with Blockchain: Discover
How Converging IoT and Blockchain Can Help You Build Effective Solutions.
Birmingham, UK: Packt Publishing Ltd.
Schneier, B. (2011). Secrets and Lies: Digital Security in a Networked World. New
Jersey: John Wiley & Sons.
Stango, A., Prasad, N.R., and Kyriazanos, D.M. (2009). A threat analysis methodology
for security evaluation and enhancement planning. 2009 Third International
Conference on Emerging Security Information, Systems and Technologies.
SECURWARE’09. Athens/Glyfada, Greece: IEEE, pp. 262–267.
170 8 Security
9.1 Introduction
In 2015, a father walked into his three-year-old son’s room, hearing a voice of an
adult male coming through the baby monitor, saying “Wake up little boy, daddy’s
looking for you.” The kid’s family found out that the baby monitor had been
remotely hacked by a stranger, which was also able to control the camera of the
baby monitor and spy on the family.
While IoT and wearable technology are giving rise to a spectrum of new appli-
cations and innovative uses, as well as promising super attractive user benefits,
they also pose new concerns that are largely unexplored.
This chapter first addresses the privacy issues and concerns arising from IoT and
wearable technology, including those related to health data and data collected from
children. The chapter next turns to safety and health issues, then discusses social
and psychological impacts of these technologies. Finally, the chapter examines
regulatory actions in the United States set by the federal government, including the
Federal Trade Commission (FTC), National Telecommunications and Information
Administration (NTIA), and by private companies practicing self-regulation within
the industry. As a means of comparison, this chapter next discusses the regulatory
actions taken by the European Union.
9.2 Privacy Concerns
The topic of privacy concerns in technology is not new, and it is certainly not lim-
ited to digital technologies. In fact, it has been discussed as early as in the nine-
teenth century by Louis Brandeis and Samuel Warren who defined in their work
“The Right to Privacy” the protection of the private domain as the founding basis
1 The Health Insurance Portability and Accountability Act (HIPAA) generally sets the
US standards for protecting health information, which may consist of electronic and other
forms of media containing identifiable information concerning an individual’s past, current, or
future physical or mental health that is generated or received by healthcare providers or
employers.
174 9 Concerns, Risks, and Regulations
Studies show that the average smartphone user unlocks their device 110 times a
day, a number that would undoubtedly increase once wearables become more
mainstream. Another study shows that the current generation spends about half of
their time thinking about something other than what they are intended to be doing
which affects their happiness and satisfaction levels. This is largely attributed to
the device’s distraction which diverts an individual from being immersed in a
genuine experience such as being sincerely engaged in a conversation, appreciating
a scenic view, or enjoying a good meal, to focusing on the continuous interruptions
from a phone’s text, app, or a social media notification.
Despite the many lifestyle benefits associated with IoT and wearable technol-
ogy, we need to also consider their potentials to disrupt users’ lives and the adverse
effects they cause on their social and mental well-being, which will be the discus-
sion topic of this section.
9.4 Safety Concerns
IoT and wearable technology are taking the concept of safety to a completely dif-
ferent level. Physical contact becomes optional in a connected world, and verbal,
even gestural, commands can be used to operate and control devices, which give
rise to new safety implications that have to be taken into consideration.
For example, IoT products can increase the risks of overheating, electric shocks,
auditory hazards, etc. Moreover, controlling operations remotely means that such
hazards are no longer limited by physical proximity. For example, an IoT-based
oven that can be turned on and off remotely can become dangerous if a faulty
command is received when no one is present to monitor it.
Regulations and standards that address the abovementioned hazards are being
continuously created and revised. Smart appliances and home devices such as
smart cooking pots, light bulbs, and thermostat are the frontline candidates in IoT
safety. Self-driving cars, drones, and robotic assistants with the capability of injur-
ing people or causing damage to properties and assets are also being considered.
As IoT and wearable technology continue to evolve, it is important to stay informed
about risks and safety standards and make sure products meet regulatory
requirements.
9.5 Health Concerns
This section reports the major health concerns that come with using IoT and
wearable technology raised by research studies from academia and health organi-
zations, in addition to recommendations on ways to minimize such potential risks.
the power amplitudes and frequencies responsible for the microwave hearing
effect, also known as the Frey effect that occurs with exposures of 400 μW/cm2,
which is well below FCC’s SAR limits.
The Frey effect, which was first reported by individuals working in the vicinity
of radar transmitters during World War II, consists of audible clicking and buzz-
ing induced by pulsed radio frequencies. These audible clicks are generated inside
the head without the need of any receiving antenna. The cause is thought to be the
thermoelastic expansion of parts of the middle and inner ear.
It should be noted that many IoT and wearable devices use BLE technology,
which emits much lower power than classic Bluetooth, and significantly less
than cell phones. In fact, in some cases, ultra-low power devices are not
required by the FCC to be tested for SAR as opposed to cell phones and laptops
which must pass a rigorous testing. However, most IoT devices and some
wearables do not limit their on-board wireless capability to Bluetooth and may
use WiFi too, which is comparable to cell phones in terms of electromagnetic
energy radiation.
As mentioned previously, antennas are what enable wireless communication
in electronics. In wearables, antennas are required to be compact, lightweight,
and mechanically robust. They are also preferred to be flexible with a low pro-
file (thin); yet, they must express high efficiency and desirable radiation
characteristics.
To minimize SAR in wearable devices, antennas are preferred to have a uni-
directional (hemi-spherical) radiation pattern, radiating away from the user’s
body to reduce the user’s exposure to electromagnetic radiation. However, anten-
nas that offer such characteristics, like microstrips, suffer from a relatively narrow
bandwidth which is a function of the platform (substrate) thickness. Thus, the
majority of handheld electronics designers choose printed monopole\dipole
antennas which offer a simple, thin, compact, and cost-effective solution, but also
exhibit an omni-directional radiation pattern (i.e. radiates in all directions includ-
ing the user’s body) (Figure 9.1).
Many antenna designs have been proposed in the literature to resolve the SAR
and thickness trade-off. One design proposed by the author of this book features
a low profile printed monopole antenna integrated with a compact artificial
magnetic conductor (AMC) ground plane which is utilized to provide the desired
uni-directional radiation pattern while keeping a thin antenna profile. The proposed
design offers a 65% reduction in SAR while maintaining a relatively large bandwidth
and a compact design.
Lastly, it should be noted that there are no enough studies have been conducted
on the adverse effects of 5G-enabled devices which use much higher frequencies
than the conventional wireless technologies.
dBi dBi
2.22 7.19
1.94 6.29
1.66 5.39
1.39 4.49
1.11 3.59
y 0.832 2.7
0.555 z 1.8
0.277 0.898
0 0
–4.72 –4.1
–9.45 –8.2
–14.2 –12.3
–18.9 –16.4
–23.6 –20.5
–28.3 y –24.6
–33.1 –28.7
–37.8 –32.8
y
z
Phi
x y
x
z
x
Figure 9.1 Omni-directional radiation pattern (left), and semi-directional (hemi-spherical) radiation pattern (right).
9.5 Health Concern 181
9.5.2.2 Fertility
Several epidemiological studies have found reductions in sperm quantity, motility,
and viability in male subjects using mobile phones for more than a few hours per
day. The production of reactive oxygen species (ROS) which can potentially cause
damage to cell membranes and DNA was a common finding associated with the
reported effects. Another study echoes these findings which found that ejaculated
semen from healthy donors exhibited reduced viability and motility, and an ele-
vated ROS levels after one hour of exposure to a cell phone in talk mode.
A more recent study found that exposing ejaculated sperms to WiFi radiation
from a laptop for four hours had led to reduced sperm motility and increased DNA
fragmentation when compared to samples exposed an identical laptop with the
WiFi capability turned off. It should be noted that to date, there has been no strong
evidence that cell phone radiation affects female fertility.
While most wearables utilize low energy communication schemes, it is the hub
such devices need to forward, store, and process information (i.e. cell phone and
tablet) that emit higher electromagnetic energy which could trigger the aforemen-
tioned effects.
and neck pain is also common with prolonged cell phone use, especially if it is
held between the neck and shoulders as the user multitasks. One study reported
that long hours of cell phone use cause users to arch their bodies in an unnatu-
ral posture which can lead to back and neck pain. The abovementioned sce-
narios are also applicable to wearables that may influence unnatural postures
and orientation changes.
Additionally, the findings of some studies suggest that excessive electromag-
netic radiation could also stimulate the production of adrenalin and cortisol
which may cause headaches, cardiac arrhythmia, high blood pressure, and trem-
ors. However, these effects are generally triggered by high power radiators such as
cellular base stations and are less likely to be caused by low power radiation from
wearables.
9.5.3 Recommendations
Unlike cell phones, wearables are intended to be in close contact with the user’s
body and for far more extended durations. While there are established data on the
effects of using cell phones, not enough time has elapsed for research to agree on
184 9 Concerns, Risks, and Regulations
the health risks and exact impact of wearable devices; hence, it is recommended
to use caution and common sense.
More people nowadays are abandoning their landline service and are exclu-
sively relying on their mobile phones. Also, driving laws are regulating the use of
mobile devices which has resulted in higher use of Bluetooth ear phones while
driving. Therefore, it is advisable to use the built-in hands-free feature (available
in most modern cars), wired earphones, or smart home units to minimize low
energy radiation effects whenever possible. It is also recommended to avoid posi-
tioning any wearable or mobile device in close proximity to the reproductive
organs for extended periods of time. These devices should be kept out of pants’
pockets. For female users, it is recommended to not place a wearable device within
15 cm of the breast.
The use of mobile phones and cellular-based wearables should be limited to
areas with excellent reception. The weaker the reception, the more power the
cellular-based IoT or wearable device will have to emit, which means higher elec-
tromagnetic energy deposition in the user’s body. Obviously, children would be at
higher risk from radiation due to their thinner skulls and still developing nervous
systems. WHO has stated that the farther away a wireless device is from the user’s
head, the less harmful it would be.
Lastly, wearing head-mounted wearable devices while asleep and placing IoT
and wearable devices on the nightstand next to the head or under the pillow
should be completely avoided.
9.6 Regulations
IoT and wearable devices are still largely unregulated, with no specific laws or
regulations governing how data from these devices are collected or used by parties
other than the user. In light of the security and privacy concerns associated with
these technologies, several bodies have called on the US government, including
federal agencies and Congress, to undertake a more active role in coordinating
regulation and standards.
Several U.S. agencies including the Department of Commerce, Department of
Defense (DoD), and Department of Justice have some form of IoT regulation, but
this has led to overlapping responsibilities which created bureaucratic challenges.
The need for one inclusionary authority is obvious.
Moreover, experts argue that it is difficult for the industry to develop industry-
wide standards due to the fact that the privacy and security of IoT and wearable
technology fall upon several actors, including manufacturers, network providers,
software developers, and other third parties.
9.6 Regulation 185
(GDPR) and the ePrivacy Regulation. Another action was by the European
Parliament (EP) where they recommended passing the Privacy Impact Assessments
concerning the RFID applications privacy and data protection framework to weara-
bles. The EP also recommended deleting raw data once processed, and immediately
informing the user once a data compromise risk is detected.
These regulations exemplify the different approaches pursued by the EU and
the United States. The EU uses a holistic approach, providing European citizens
with certain privacy rights across all platforms and sectors. The United States, on
the other hand, has an agglomeration of privacy laws specific to different indus-
tries. Furthermore, the U.S law typically balances privacy rights and interests
against freedom of expression, which is driven by the First Amendment, while the
EU firmly asserts that privacy is a fundamental right, and the way personal data
are used by third parties should be governed by regulation, controls, and transpar-
ency, which requires government supervision.
Further Reading
Bergman, N. and Rouse, J. (2013). Hacking Exposed Mobile: Security Secrets &
Solutions, vol. 1. New York: McGraw-Hill.
Bowman, J.D., Kelsh, M.A., and Kaune, W.T. (1998). Manual for Measuring
Occupational Electric and Magnetic Field Exposires. Washington, DC:
U.S. Department of Health and Human Services.
Buenaflor, C. and Kim, H.-C. (2013). Six human factors to acceptability of wearable
computers. International Journal of Multimedia and Ubiquitous Engineering 8 (3):
295–300.
Cellular Phone Towers (2015). Center for health, environment & justice. FactPack -
PUB 129.
Clayton, R.B., Leshner, G., and Almond, A. (2015). The extended iSelf: the impact of
iPhone separation on cognition, emotion, and physiology. Journal of Computer-
Mediated Communication https://doi.org/10.1111/jcc4.12109.
Common Sense Media (2011). Zero to eight: a common sense media research study
children’s media use in America. FALL.
Dart, P., Cordes, K., Elliott, A. et al. (2013) Biological and Health Effects of
Microwave Radio Frequency Transmissions: A Review of the Research Literature.
A Report to the Staff and Directors of the Eugene Water and Electric Board.
Desai, N.R., Kesari, K.K., and Agarwa, A. (2009). Pathophysiology of cell phone
radiation: oxidative stress and carcinogenesis with focus on male reproductive
system. Reproductive Biology and Endocrinology 7: 114.
European Commission (2011). Privacy and data protection impact assessment
framework for RFID applications.
Further Readin 187
Federal Communications Commission (2016) SAR for cell phones: what it means for
you, consumer guide. Federal Communications Commission.
Frey, A.H. (1962). Human auditory system response to modulated electromagnetic
energy. Journal of Applied Physiology 17 (4): 689–692.
FTC Staff Report (2015). Internet of Things, Privacy & Security in a Connected
World, FTC Staff Report.
Goh, J.P.L. (2015). Privacy, security, and wearable technology. Landslides, ABA
Section of Intellectual Property Law 8 (2): 493–498.
Goldsworthy, A. (2012) The biological effects of weak electromagnetic fields
problems and solutions.
Hardell, L., Carlberg, M., Söderqvist, F., and Mild, K.H. (2007). Long-term use of
cellular phones and brain tumours: increased risk associated with use for more
than 10 years. Occupational and Environmental Medicine 64 (9): 626–632.
Robert P. Hartwig, Claire Wilkinson, Cyber Risk:Threat and Opportunity, Insurance
Information Institute, New York, 2015.
Hartwig, V., Giovannetti, G., Vanello, N. et al. (2009). Biological effects and safety in
magnetic resonance imaging: a review. International Journal of Environmental
Research and Public Health 6 (6): 1778–1798.
Harvard Health Letters (2012). Blue light has a dark side, what is blue light? The
effect blue light has on your sleep and more. Harvard University, Harvard Health
Letters (May 2012). http://www.health.harvard.edu/staying-healthy/
blue-light-has-a-dark-side.
Irish Council for Bioethics (2009). Biometrics: Enhancing Security or Invading
Privacy? Dublin, Ireland: The Irish Council for Bioethics.
Kahina, C. (2015). Security issues in wireless sensor networks: attacks and
countermeasures. Proceedings of the World Congress on Engineering 2015 Vol I,
WCE 2015, London, UK (1–3 July 2015).
Ke, W.C. and Singh, M.M. (2016). Wearable technology devices security and privacy
vulnerability analysis. International Journal of Network Security & Its Applications
(IJNSA) 8 (3).
Kirtley, J. and Memmel, S. (2018). Rewriting the “book of the machine”: regulatory
and liability issues for the internet of things. Minnesota Journal of Law, Science &
Technology 19 (2): 455–513.
Knight, J.F. and Baber, C. (2005). A tool to assess the comfort of wearable computers
- human factors. The Journal of the Human Factors and Ergonomics Society 47
(1): 77–91.
Kuss, D.J. and Griffiths, M.D. (2011). Online social networking and addiction—a
review of the psychological literature. International Journal of Environmental
Research and Public Health 8 (9): 3528–3552.
Lanhart, A., Purcell, K., and Smith, A. (2010). Social Media and Mobile Internet Use
Among Teens and Young Adults. Washington, DC: Pew Research Center.
188 9 Concerns, Risks, and Regulations
10
10.1 Introduction
Now that we have learned the ins and outs of IoT and Wearable Technology, it is
time to apply the knowledge learned in the previous chapters to design and
develop two complete practical products. This chapter will take the reader, step by
step, from concept and engineering requirements through bread‐boarding, micro-
controller coding, PCB design, PCB printing, soldering, and surface mount con-
siderations all the way to a finished product.
The first product is an IoT connected device aimed at helping vineyard owners
to remotely monitor the moisture level of the vineyard soil as well as ambient
conditions such as temperature, humidity, and light levels at various points dur-
ing the day. The second product is a wearable solution that can reliably detect an
elderly person’s accidental fall, and contact emergency for help. While some of the
steps discussed in the design and consideration chapter were not used/needed in
one product, it is hoped that the processes and methodologies used in the two
products complement each other collectively.
The product that will be designed and developed in this section is a device that
helps vineyard owners monitor the moisture level of the vineyard soil as well as
ambient conditions such as temperature, humidity, and light levels at various
points during the day. This will help vineyard owners track the conditions for
their vines and understand the best and most efficient watering strategy, which is
a key consideration from a quality perspective of grape/wine production and also
from an environmental impact perspective.
The functionality choices here allow for a good demonstration of how to design
hardware with multiple components and how to integrate the outputs from these
components together into one neat package.
Sigfox cloud
User cloud servers
servers
IoT device
DS18S20
VDD
(External supply)
VPU VDD
GND DQ
μP
4.7 kΩ
Figure 10.3 Sample schematic from DS18B20 datasheet. Source: [1]. © 2019 Maxim
Integrated Products, Inc.
10.2 Product I (IoT): Vineyard Monito 193
3) Now we just need to write some Arduino code to read the temperature data
at the right Arduino pin. Here, we may need to reference some external
libraries; in this case for the temperature sensor, we will need to use the
DallasTemperature library. To do this, simply select “Include Library” from
the sketch menu and find the “DallasTemperature” by using the search box,
and then click install. Once available, some sample code for printing out
temperature data from this component, hooked up to the Arduino on Pin 2,
would look like this:
194 10 Detailed Product Design and Development: From Idea to Finished Product
The same kind of process can be used for all the other components we want to
interface with as part of the project (for example, the light sensor and the soil
moisture sensor). The result of this process should be a functional (if often somewhat
messy!) set of components on a breadboard, in this case (Figure 10.5):
10.2 Product I (IoT): Vineyard Monito 195
10.2.4 Prototyping
Once you are happy that your breadboarded solution is functional and working
reliably, it is time to start thinking about designing the schematic from your bread-
board. But before getting stuck into custom designing a PCB circuit for your
device, it is very worthwhile trying to nail down a smaller, neater prototype cir-
cuit. Here, we opt for a stripboard version of this circuit.
Stripboard is a board consisting of a regular set of holes all connected along a
row with copper (but each row is distinct from each other row). In this way, it is
easy to solder components together in a layout that more closely matches how you
want your end product to look. Also, the stripboard can be cut to size so you get a
good idea of the necessary dimensions of your final product.
The end result should be a much neater and tighter version of the circuit, which
is very useful in helping trim down the final PCB design (remember as a rule of
thumb: the larger the PCB the higher the cost). It also gives you a good idea about
what sort of housing may be required for your product.
10.2.4.1 Fritzing
Fritzing is a great piece of software for laying out Stripboard or Veroboard cir-
cuits, allowing you to completely produce a virtual circuit, which you can then
simply copy on your stripboard. There are good tutorials on Fritzing, for exam-
ple, see [2].
The prototype circuit for this project looks like this in Fritzing (Figure 10.7):
Which leads to this actual (working) circuit (note how close the real board is to
the Fritzing output) (Figure 10.8):
While there are a number of circuits and methods of assessing the current require-
ments of a circuit, most do not have a good resolution for the very low end and man-
ual mechanisms (such as an ammeters connected across the power supply lines) are
cumbersome to use and also only give snapshots of the current usage at a given time,
and in some cases, do not react fast enough for any reliable measurement.
One solution to this problem is to use a dedicated low power measurement
module, for example, the Power Profiling Kit from Nordic Semiconductor [3]. It is
not too expensive (at around $100 for both the Power Profiler Kit (PPK) and the
baseboard) and it works very well.
It produces both a constant view of the power consumption down to a very low
resolution (<1 μA) and a running average for a time window (which is exactly
what we need for our battery life calculations). Here is a sample output showing
the Quiescent current draw as well as the power spike when a message is sent (due
to the higher power requirement of the Wisol chip and RF communications in
general) (Figure 10.9):
options with the Sigfox system on how to do this but probably the easiest is to build
your own RESTful web services and have the Sigfox servers make an HTTP(S)
request to your new services with the message data (see the next section). This can
be done within the Sigfox backend by using a Callback Mechanism for your device,
where you can specify the posted variables or URL parameters as needed from a list
of available variables, including the raw message data (Figure 10.10):
common.DisplayAppError(
w,
err,
"Invalid Sensor Data format",
500,
)
return
}
sensorData := &dataResource.Data
context := NewContext()
defer context.Close()
c := context.DbCollection("SensorData")
repo := &db.SensorDataRepository{c}
// Insert a sensor data document
repo.Create(sensorData)
if j, err := json.Marshal(Sensor {Data: *sensor-
Data}); err != nil {
common.DisplayAppError(
w,
err,
"An unexpected error has occurred",
500,
)
return
} else {
w.Header().Set("Content-Type", "applica-
tion/json")
w.WriteHeader(http.StatusCreated)
w.Write(j)
}
}
It is worth noting that most of the simple web services you might build for basic
data processing of raw data from the Sigfox servers would be of a similar structure.
One thing that would be of particular use for Sigfox message parsing would be
the bit unpacking, which will be discussed in further detail in Section 10.2.7.2.
Since Sigfox messages are a maximum of 12 bytes, you really need to be squashing
as much data as possible into the message, and as such you will probably be bit
packing data. The corresponding Go code for unpacking the data, that was bit
packed with the earlier Arduino code, looks like this:
10.2 Product I (IoT): Vineyard Monito 201
#include <DallasTemperature.h>
#include <OneWire.h>
// Data wire is plugged into port 2 on the Arduino
#define ONE_WIRE_BUS 2
// Setup a oneWire instance to communicate with any OneWire
devices (not just Maxim/Dallas temperature ICs)
OneWire oneWire(ONE_WIRE_BUS);
// Pass our oneWire reference to Dallas Temperature.
DallasTemperature temp_sensor(&oneWire);
void setup(){
Serial.begin(9600);
temp_sensor.begin();
Serial.println("DS18B20 Temperature Test\n\n");
delay(300);//Let system settle
}//end "setup()"
void loop(){
Serial.print("Requesting temperatures...");
temp_sensor.requestTemperatures(); // Send the command
to get temperatures
Serial.print("Temperature is: ");
float temp_reading = temp_sensor.getTempCBy-
Index(0);
Serial.println(temp_reading);
delay(1000);
}// end loop()
For low power usage of an Arduino pro mini, there are a number of options
in terms of third party libraries. For this project, we will choose the open‐
source low power library by RocketScream [5] available on GitHub [6]. There
is a good article on using this library [7, 8], and the sample usage for this
project would be:
10.2 Product I (IoT): Vineyard Monito 203
cation with the Wisol chip is included below, this allows for easier command
sending such as to test the device and sending messages (here we use the
AltSoftSerial library, since the main Serial of the ATMEGA chip is used for com-
municating debug information with the PC):
void test_sigfox_chip(){
Serial.println("Sigfox Comms Test\n\n");
altSerial.begin(9600);
delay(300);//Let system settle
Serial.println("Check awake with AT Command...");
chip_response = send_at_command("AT", 50);
Serial.println("Got reponse from sigfox module: " +
chip_response);
Serial.println("Sending comms test...");
chip_response = send_at_command("AT", 50);
Serial.println("Comms test reponse from sigfox mod-
ule: " + chip_response);
chip_response = send_at_command("AT$I=10", 50);
Serial.println("Dev ID reponse from sigfox module: "
+ chip_response);
chip_response = send_at_command("AT$I=11", 50);
Serial.println("PAC Code reponse from sigfox module:
" + chip_response);
}
●● Enter Low Power (Sleep) Mode: For this, we opted for the basic sleep mode,
though this chip also supports a “deep sleep” option. The rationale behind this
choice is that it is not worth moving from ~1.5 to <1 μA as a 1.5 μA Quiescent
current drain was more than acceptable for the purposes of this project. The
sleep/wake cycle code looks like this:
digitalWrite(TX_PIN, LOW);
delay(100);
altSerial.begin(9600);
}
}
0b00000000 [0] = −40
0b00000001 [1] = −39.5
0b00000010 [2] = −39
…
0b11101111 [239] = 79.5
0b11110000 [240] = 80
For this project, we will choose to use only 7 bits for temperature (−10 to +50 in
half degree accuracy), 11 bits for light level (from 0 to 1000 essentially) and a sin-
gle bit for open/close or device move, and 4 bits for a message sequence number
so we can spot any missed messages.
A set of bit packing functions (original code here [10]) is adapted to that we
would take all the sensor data as well as the number of bits we want to use for
each and pack them into a single 12‐byte value:
The general process is to design the PCB schematic first, and once everything is
connected the way it needs to be (i.e.: matching your prototype/breadboard cir-
cuit) you will spend time placing all the components on a PCB and routing all the
appropriate connections.
There are many different software packages for PCB design, here we use
Autodesk Eagle [12], which is an excellent piece of software and free to use for
208 10 Detailed Product Design and Development: From Idea to Finished Product
small boards (<80 cm). There are lots of component libraries, including third
party libraries (for example: all the SparkFun and AdaFruit components).
There are some very useful resources available from SparkFun, including
several tutorials for how to get started designing your own PCB based on your
breadboard design. Learning how to use this software is too large of a topic for this
Chapter, but most of what you need to begin laying out circuits using Eagle can be
found in the following set of tutorials, which are highly recommended:
1) Install and setup [13]
2) Creating schematics [14]
3) Board layout and routing [15]
It takes some time to complete all three, but they are well worth it. Some addi-
tional tips we would suggest:
●● Save often!
●● Always run a Design Rule Check (DRC) after every change, no matter how
small. Recheck after a “ground pour”, or “Ratsnest” command even if the
change “should” not have affected the ground connections. It is easy to miss
how a single new trace can cut off a ground connection from a ground pour or
via, so always run this check after any change before creating Gerber files for
PCB printing (see Section 10.2.10 later)
●● When routing with very small components (e.g.: FPGA surface mount compo-
nents), try not to have any holes underneath the component. While this is allowable
in manufacturing and should work fine, it becomes an issue when you are hand
soldering/surface mounting components for prototype testing in the absence of
professional tooling (e.g.: solder reflow ovens, pick & place machinery, etc.). It is
hard to be sure when hand applying solder/solder paste that it does not sit under the
component and flow into a routing hole underneath (where you cannot see), and it
is easy to forgot when routing just how small some of these components are.
i.e.: Instead of this…
10.2 Product I (IoT): Vineyard Monito 209
… Do this
As above, but with larger components, try not to have a via too near any compo-
nent legs/pads for the same reason (unless the via is also connected to that
pad/leg).
Here is the resulting Eagle schematic for this project board (Figure 10.12)
Metric Imperial
comparison code code comparison
0.1×0.1 mm 0402 01005 0.1×0.1 in
0603 0201 (10×10 mils)
1005 0402
1608 0603
During testing, it was found that the simple temperature sensor (the DS18B20)
did not give reliable enough readings, and it was felt that a more advanced module
that also included other weather data (like accurate humidity and atmospheric
pressure) would be a better long‐term solution. So, the schematic was updated and
the DS18B20 was replaced with a Bosch BME280. This emphasizes both the
importance of testing devices in the field and not to be afraid of making changes
to a design to improve wide use cases for the device.
The interface for extracting useful information from the Bosch sensor is a little
more complicated, but luckily, there is a good library from Adafruit that does all
the hard work for the user, available here [17]. For example, here is how to get
simple temperature readings from a Bosch BME280 (code taken from the Adafruit
Github linked above):
10.2 Product I (IoT): Vineyard Monito 213
/*****************************************************
This is a library for the BME280 humidity, temperature
& pressure sensor
Designed specifically to work with the Adafruit BME280
Breakout
----> http://www.adafruit.com/products/2650
These sensors use I2C or SPI to communicate, 2 or 4
pins are required
to interface. The device's I2C address is either 0x76
or 0x77.
Adafruit invests time and resources providing this
open source code,
please support Adafruit and open-source hardware by
purchasing products from Adafruit!
Written by Limor Fried & Kevin Townsend for Adafruit
Industries.
BSD license, all text above must be included in any
redistribution
See the LICENSE file for details.
******************************************************
#include <Wire.h>
#include <SPI.h>
#include <Adafruit_Sensor.h>
#include <Adafruit_BME280.h>
#define BME_SCK 13
#define BME_MISO 12
#define BME_MOSI 11
#define BME_CS 10
void setup() {
Serial.begin(9600);
while(!Serial); // time to get serial running
Serial.println(F("BME280 test"));
214 10 Detailed Product Design and Development: From Idea to Finished Product
unsigned status;
// default settings
status = bme.begin();
if (!status) {
Serial.println("Could not find a valid BME280
sensor");
while (1) delay(10);
}
Serial.println("-- Default Test --");
delayTime = 1000;
}
void loop() {
printValues();
delay(delayTime);
}
void printValues() {
Serial.print("Temperature = ");
Serial.print(bme.readTemperature());
Serial.println(" *C");
Serial.print("Pressure = ");
Serial.print(bme.readPressure() / 100.0F);
Serial.println(" hPa");
Serial.print("Humidity = ");
Serial.print(bme.readHumidity());
Serial.println(" %");
Serial.println();
}
10.2 Product I (IoT): Vineyard Monito 215
And the code used during the testing of the soil moisture sensor specifically (taken
from the SparkFun soil sensor guide [18]):
–– Enclosure: A finished PCB is the most important part of the process, but in
real terms, to use a product like this in the field, it will need to be protected
from the elements within some kind of enclosure. It is possible, through a
number of small project websites, to engage a 3D modeler to create a set of
CAD files for a design to fit your product and to your specifications. For
example, below is a 3D model of the design that will fit the product built in
this section, which can be 3D printed online, or in bulk (Figure 10.15):
(a) (b)
The idea of this example project is to design a wearable product that can reliably
detect an elderly person’s accidental fall, and then, if a fall is detected, the device
would promptly contact emergency for help. A smartphone application should
enhance the product’s capabilities by offering a cloud connectivity, which would
make use of a cloud solution to log the events. It would also potentially extend the
product use case based on future requirements, for instance, updating the device
location information.
User
User
Main
Contact
emergency
Log in and
system Gather information
config. & contact emergency
Return
No
Sudden impact
detected?
Yes
Contact
emergency
10.3.3 Flowchart
A flowchart is a good way to illustrate the execution steps the system software will
take in a two‐dimensional format, especially in visualizing conditional execution
and function calls. Flowcharts are equally useful at the initial system design stages
as well as the final documentation stage of a project (when the system is opera-
tional) in order to aid in its use, maintenance, modification, and expansion.
Figure 10.17 shows the software execution steps where the execution starts with:
1) System powers up.
2) User enters their credentials to login to the system.
10.3 Product II (Wearable): Fall Detection Devic 223
Log in
System configuration
Hexiwear 2’
2’
Figure 10.20 Development boards constituting the Hexiwear platform. Source: Photo
courtesy of MikroElektronika.
Micro-B USB
190mAh Li-Po battery
Interface
Figure 10.21 Hexiwear default and optional components. Source: Courtesy of ARM.
8MB Serial flash 1.1” Color OLED User RGB LED Haptic feedback
memory display 6x Touch button vibration motor
MK64FN1M0VDC12
ARM® Cortex®-M4 up to 120MHz
1MB flash and 256KB RAM
Figure 10.22 Hexiwear MPUs capabilities and their peripheral connections. Source: Courtesy of ARM.
HTU21D TSL2561 MAX30101
Fully-calibrated humidity sensor Light to digital converter Pulse oximeter and hear rate sensor
+/−3%RH tolerance @55%RH 0.1 to 40,000 Lux dynamic range high sensitivity with 16-bit ADC
inc. both infrared and full spectrum diodes
Fully-calibrated temperature tensor
Consumption
±0.3°C accuracy from –40 to + 125°C
Consumption down to 600μA in active mode
down to 240μA in active mode
Consumption
12C digital interface
down to 450μA in active mode
12C digital interface up to 400kHz
12C digital interface up to 400kHz
up to 400kHz dual-mode
Figure 10.23 Hexiwear sensors specification and communication interfaces. Source: Courtesy of ARM.
10.3 Product II (Wearable): Fall Detection Devic 229
implementation ready out of the box gives an advantage when it comes to the
time‐to‐prototype and hence to market.
example of a working prototype that fetches readings from the six onboard sen-
sors and output to the OLED and BLE modules. A link to the stock firmware
binaries and source code is provided in [21].
Once the IDE software and the SDK are installed and the project is imported, it
should look like the snapshot in Figure 10.29:
10.3 Product II (Wearable): Fall Detection Devic 233
The control flow starts at the main function, ‘void main()’, in main.c, by initializ-
ing the low‐level Hardware and the OSA real‐time operating system (RTOS). Second
comes the activation of the Cortex M3 exceptions (events and interrupts). The con-
trol then goes to the third function, ‘HEXIWEAR_Init()’, which configures multiple
interfaces including the output GPIO pins (OLED, flash, power, VIBRO, KW40,
other LEDs), input GPIO pins (battery and tap). The ‘HEXIWEAR_Init()’ function
also initializes the task to continuously read sensors data, initializes the accelerom-
eter sensor, turns on the sensor tag and haptic feedback, initializes structures neces-
sary for the RTOS run, and finally it turns on the system clock.
The last function, ‘HEXIWEAR_Start()’, starts the RTOS scheduler and the
system runs forever until powered off (a typical embedded system operation).
Our objective here is the following:
1) Find the point in code where accelerometer and gyroscope data are being read
from hardware.
2) Come up with a relatively short real‐time algorithm that detects a fall based on
the values read.
3) Once a fall is detected, an alarm signal is sent to the smartphone via BLE.
234 10 Detailed Product Design and Development: From Idea to Finished Product
For point (1), a good probing point for the sensors readings is just before send-
ing the formatted data to the BLE. The location is in file ‘sernsor_drive.c’, at func-
tion ‘sensor_PushData()’.
After discovering the magnitude of the sensor, the next step is to find the maximum
and minimum value of the sensor. Below is the formula to find the maximum and
minimum values:
Once the maximum and minimum values are obtained, the following is the
formula to find the value sought:
aX t 2 aYt 2
Angle arccos (10.5)
aZ t 2
g is the constant of gravity that is 9.8 m/s2
Figure 10.30 shows the flowchart of the adopted algorithm:
10.3 Product II (Wearable): Fall Detection Devic 235
Start
ATt > t M
Finish
/**
* Detect a fall and alarm smartphone
* depending on the sensors's values
*/
static inline void detect_Fall(hostInterface_packet_t
sensorPacket){
if ((packetType_accel == sensorPacket.type) ||
(packetType_gyro == sensorPacket.type)){
static int64_t accel_x_pwr2 = 0;
static int64_t accel_y_pwr2 = 0;
static int64_t accel_z_pwr2 = 0;
static int64_t max_a_t = INT64_MIN;
static int64_t min_a_t = INT64_MAX; // max value
static int64_t a_t_i = 0; //ATi
static uint64_t delta_a_t = 0;
static bool acc_exceeded_thrs = false;
static uint32_t accel_sample_count = 0;
static int16_t angle = 0;
static int64_t gyro_x_pwr2 = 0;
static int64_t gyro_y_pwr2 = 0;
static int64_t gyro_z_pwr2 = 0;
static int64_t max_g_t = INT64_MIN;
static int64_t min_g_t = INT64_MAX; // max value
static int64_t g_t_i = 0; //ATi
static uint64_t delta_g_t = 0;
static uint32_t gyro_sample_count = 0;
static uint32_t gyr_exceeded_thr = 0;
if(packetType_accel == sensorPacket.type){
accel_x_pwr2 = motionData.accData[0] * motionData.
accData[0];
accel_y_pwr2 = motionData.accData[1] * motion-
Data.accData[1];
accel_z_pwr2 = motionData.accData[2] * motion-
Data.accData[2];
a_t_i = sqrt(accel_x_pwr2 + accel_y_pwr2 +
accel_z_pwr2); // ATi
if (accel_sample_count < 10000) { // Calibration
max_a_t = ( a_t_i > max_a_t )? a_t_i : max_a_t;
10.3 Product II (Wearable): Fall Detection Devic 237
Once the app is installed, the user can login using the username ‘demo’ and
password ‘demo’, then they can enter the Thingspeak channel number and the
write‐API‐key so that the smartphone app can post to the cloud IoT platform. The
user should also enter the emergency contact number and the SMS text to be sent
in case of emergency.
The snippet below shows the Swift code that checks the sensor value and com-
pares it to a threshold to send the emergency text message. The Webkit library is
used for reading the cloud channel whereas Alamofire, which is an HTTP net-
working library written in Swift, is used for sending the SMS text.
The following code snippet shows the Swift code that displays a field from a
Thingspeak channel:
import UIKit
import Foundation
import WebKit
internal class ShowLinkController: UIViewController {
// MARK: ‐ fileprivate Properties ‐
// UI
internal lazy var linkView: ChannelLinkView = {
let view = ChannelLinkView()
view.delegate = self
return view
}()
override func viewDidLoad() {
super.viewDidLoad()
setupViews()
}
}
// MARK: ‐ fileprivate Setup Helper Functions ‐
fileprivate extension ShowLinkController {
func setupViews() {
setupMainView()
}
func setupMainView() {
242 10 Detailed Product Design and Development: From Idea to Finished Product
linkView.translatesAutoresizingMaskIntoCon-
straints = false
linkView.widthAnchor.
constraint(equalToConstant: 200).isActive = true
view.addSubview(linkView)
linkView.topAnchor.constraint(equalTo: view.
topAnchor, constant: 40).isActive = true
linkView.centerXAnchor.constraint(equalTo:
view.centerXAnchor).isActive = true
}
}
extension ShowLinkController: ChannelLinkViewD-
elegate {
func userDidTapOnCannelLink(from: ChannelLinkView) {
let linkFullView = UIView()
view.addSubview(linkFullView)
linkFullView.translatesAutoresizingMaskInto-
Constraints = false
linkFullView.heightAnchor.
constraint(equalToConstant: 230).isActive = true
linkFullView.widthAnchor.
constraint(equalToConstant: UIScreen.main.bounds.width
- 17).isActive = true
linkFullView.topAnchor.constraint(equalTo:
linkView.bottomAnchor, constant: 20).isActive = true
linkFullView.centerXAnchor.constraint(equalTo:
view.centerXAnchor).isActive = true
let jscript = "var meta = document.
createElement('meta'); meta.setAttribute('name',
'viewport'); meta.setAttribute('content', 'width=420',
'height=300'); document.getElementsByTagName('head')
[0].appendChild(meta);"
let userScript = WKUserScript(source: jscript,
injectionTime: .atDocumentEnd, forMainFrameOnly: true)
let wkUController = WKUserContentController()
wkUController.addUserScript(userScript)
let wkWebConfig = WKWebViewConfiguration()
wkWebConfig.userContentController = wkU-
Controller
10.3 Product II (Wearable): Fall Detection Devic 243
The user can get the app from the Appstore with the name “Hexifall” or get the
updated source code from the GitHub link provided in the “References” section.
the platform will provide you with the channel ID to read the channel data, and a
write‐API‐key for the device to write data to the channel. Note that a read‐API‐key
will be needed to read the private fields of a channel. A link to a walkthrough to
get started with Thingspeak is provided in the “References” section.
Figures 10.32 and 10.33 show snapshots of the configuration of a typical
Thingspeak channel:
10.3.10 Security
Hexiwear uses BLE to communicate data to the smartphone; hence, all BLE
security features are inherited by that interface. Data within the payload is
encrypted with the AES‐128 block cipher to ensure confidentiality. The smart-
phone, which acts as a gateway to the internet, uses the restful HTTP API
mentioned in Section 10.2.6.2 (RESTful Web Services) to post to the cloud.
Additionally, the packets are secured by the SSL/TLS security layer to provide
authentication and data integrity which are two of the information security
pillars.
It should be noted that taking into consideration the Bluetooth Smart application
example in the MKW40Z Power Consumption Analysis [22], the power consump-
tion of the K40Z board is very low and can be ignored in the practical application
of this prototype.
10.3.12 Delivery
By going through the requirements listed in the requirements section, we can see
that the prototype satisfies all the criteria:
1) Accuracy: The system can reliably detect a person falling (up to 100% in the
walking scenario).
2) Usability: The system can easily be configured using the user‐friendly smart-
phone app.
3) Size: The device is reasonably small, around 1.9″ × 1.75″ × 0.5″.
4) Weight: The device is reasonably light in weight, it weighs 40 g.
5) Power: The device can maintain operation for at least eight hours.
10.4 Conclusion
Hopefully, during the course of this Chapter, the reader has gained a good under-
standing of the process of moving from a concept for an IoT/wearable electronic
device, through defining requirements, design, PCB printing, and soldering and
all the way through to the software and cloud implementation. There are many
further resources available to the reader on this subject, and the code and hard-
ware used in this Chapter are all documented, please see the [23, 24] links in the
References section.
References
Further Reading
Index
Solution Manual
1 What are the main differences between IoT and Wearable Technology?
A Communication is IP based in IoT, while it’s not necessary in wearables.
B Most wearables rely on a gateway device, such as a smartphone, for con-
figuration and connectivity, and in most cases to enable features and pro-
cess data. This is not always true in IoT devices.
C IoT devices are mainly stationary, wearables on the other hand are mobile
since they are worn/ integrated within the user’s body or clothing.
4 Can you think of other potential challenges found in IoT and wearable tech-
nology other than the ones mentioned in this chapter?
A There are several other challenges besides the ones mentioned in the
chapter which include: Design based challenges, safety, longevity, compat-
ibility, etc.
7 List five real world examples of the headwear form in wearable technology.
Virtual reality headsets (e.g.: Oculus), Smart motorcycle helmets (e.g.: Sena),
Smart ski goggles (e.g.: RideOn), Smart hats (e.g.: LifeBeam), Smart sleep
headbands (e.g.: Philips).
8 List four components common between IoT and wearable devices (an applica-
tion of your choice).
Microcontroller, sensor, battery/power management system, LCD screen.
1 0 If you are asked to add more somewhat essential characteristics to IoT, what
would they be? Why?
Cost effectiveness and energy‐efficiency are two additional characteristics
can be added to the ones listed in the chapter. If these devices did not provide
Solution Manual 259
1 Can you think of more applications (other than the ones listed in this chapter)
that could benefit from IoT and wearables?
Restaurants and cooking, weather and natural disasters, waste manage-
ment, etc.
6 List five unusual applications where IoT and wearables are utilized. Keep
efficiency and practicality in mind, and make sure that no products exist that
support such applications (through an internet search).
This is an open‐ended question that requires creative thinking.
8 Write a one page scenario where at least ten of the applications mentioned in
this chapter are utilized in a typical day.
This is an open‐ended question that requires creative thinking.
260 Solution Manual
3 List three published IoT architectures and research three more from the litera-
ture. Compare the six architectures using a table.
This is an open ended question which requires the reader to research the
literature.
4 Give an example of an IoT device and explain its operation using the simpli-
fied IoT architecture reported in this chapter.
This is an open ended question which requires the reader to research the
literature.
5 What is Edge Computing? Give four examples of IoT and wearable devices
and explain their operation within the context of Edge.
Edge Computing describes the work that happens at the edges of the IoT net-
work, where the physical devices connect to the cloud, exploiting mobile
phones, smart devices, and/or network gateways to perform tasks and provide
services on behalf of the cloud. With an emphasis on reducing latency,
Solution Manual 261
improving privacy and security, and minimizing bandwidth costs within data‐
driven IoT applications, edge computing architectures are becoming increas-
ingly common in the realm of IoT and wearable devices.
The aim of Edge Computing is to bring computing, and data filtering and
storage closer to the devices where it’s being collected, rather than relying on
a central site that can be thousands of miles away. This is done so that data
does not suffer from latency issues that can affect an application’s perfor-
mance. Moreover, enterprises can save money by having the processing per-
formed locally, reducing the amount of data that needs to be processed at
the cloud.
A self‐driving car generates roughly ten gigabytes of data per mile.
If self‐driving vehicles on autopilot continue growing in number, it
will be impossible to send data to centralized servers for processing
every time a vehicle encounters a stop sign or a pedestrian. A micro-
second of time is of significant importance in such scenarios. Here is
where edge computing comes into play. Other examples include pre-
dictive maintenance, voice home assistants (Alexa, Google, etc.), and
oil and gas industry.
6 What is the difference between Cloud, Fog, and Mist? Explain using two
practical examples (one IoT device, and one wearable device).
Cloud, Fog and Mist computing are all different because they all compute
and analyze data inputs at different points within the network and, as a
result, all have different latencies and calculating powers. Cloud refers to
a large, centralized data center that can make calculations and store data,
but is a significant distance from the devices. Fog refers to smaller nodes
that are at the edge of the network that can make simpler calculations
without needing to send it into the cloud. Mist refers to applications within
the device itself that is able to make basic, low‐level calculations. For
instance, IoV accident prevention feature, or a smart armband that meas-
ures blood sugar level of a diabetic wearer would likely use either Fog or
Mist computing so it can alert the wearer or another device if an issue is
occurring much sooner. Whereas, a smart home system might be more
suited to have support on a Cloud system for its processing, even with the
slight latency.
databases. On the other hand, networks of connected devices are about the
data generated by sensors and how it is used. Thus, the core of such architec-
tures is about how the data is transported, aggregated, processed, and even-
tually acted upon.
(Wi-Fi)
Gateway
1 0 Design a basic IoT garden monitor using the simplified architecture described
in this chapter.
Network/ Conditioning/ Perception/
Application transport Linking actuation
Humidity sensor
Wi-Fi/
Data analytics Microcontroller Moisture sensor
ethernet
Gateways/ Temperature
Cloud server IP routers sensor
Cloud Fog/Edge/Mist
computing computing
Solution Manual 263
1 1 Sketch a smart home system and link each component that you use (software
and hardware) to an architecture of your choice.
Using the basic architecture:
Application -Cloud services -Calculation software
Microprocessor
Sensors Actuators
-Heart rate monitor -Vibrator/Buzzer
-Accelerometer
-Touch screen
-Buttons
264 Solution Manual
Microprocessor
-Battery -Antenna
Sensor/actuator hub
Conditioning circuit
Sensors Actuators
-Camera -Speaker
-Doorbell -Lock
3 Pick a wearable or IoT device of your choice, then list all of the device’s com-
ponents (external and internal).
For a soil moisture sensor, the components would be:
●● Temperature Sensor
●● Moisture Sensor
●● Humidity Sensor
●● Pressure Sensor
●● LED lights
●● Outer casing
●● Microcontroller
●● Power Source/Battery
●● BLE/Wi‐Fi‐Connective Unit
4 What is a MEMS sensor? Research 5 examples from the literature and com-
pare between their mechanisms of operation.
A MEMS sensor is a short term for micro‐electromechanical sensor. One example
is an airbag sensor for a vehicle, which uses an accelerometer to sense when great
deceleration occurs, thus opening the airbags. A second example is a disposable
blood pressure sensor, which uses piezo‐resistive material to convert stress into
Solution Manual 265
electrical signals that reflect the current pressure in the user’s blood. A third
example is an inkjet printer head, which uses resistive material that is given elec-
trical signals to heats up ink to form bubbles to push it out of a nozzle. A fourth
example is an overhead projection display, which uses many small rotatable mir-
rors that reflect light and guide it through a lens to produce sharper images on a
projection screen. One last example is RF MEMS, which uses RF technologies to
obtain and distribute data.
5 What are the different types of accelerometers? How would you characterize
a typical one?
Some different types of accelerometers include compression accelerometers,
which applies a force to a crystal on a mass‐sensing sensor to indicate the amount
and direction of motion; shear accelerometers, which uses analyzes shear stress
on crystals using piezoelectric sensors to determine the motion; and capacitive
accelerometers, which senses the change in capacitance when the capacitor
undergoes acceleration. Typically, an accelerometer is a sensor that is able to
detect changes in orientation and/or acceleration by an external force and pro-
duces electrical signals according to these changes.
7 Research the most common types of motors used in IoT and wearable
applications.
Different types of motors can be used depending on the application. Servo
motors, stepper motors, DC motors are all used.
8 What would be a good choice of an antenna topology for a fitness tracker? Why?
Chip, PCB, and wire antennas are widely used in wearables due to their small
form factor. Miniaturization techniques (such as folding and winding) are
usually used to save space.
10 You are tasked to prototype a virtual home assistant (i.e.: similar to Amazon
Echo Dot). Make a list of all the tasks needed to create such a device, along
with a list of all the components needed based on what you have learned in
this chapter.
For the virtual home assistant, the tasks needed are:
●● Determine the specific sensors, actuators, battery and microcontroller to
●● Allow secure and safe connections between it and the cloud server
it on the device
●● Create and install software to comprehend the voice samples
●● Speaker
●● LEDs
●● Buttons
●● Battery/Power Source
●● Microcontroller
1 You have narrowed down your choice for a network topology to either a full
mesh topology or a star topology. Determine how your final decision will
affect deployment cost and communication speed.
If one was to go with a full mesh topology, then communication speed will be faster
because of the direct connections between each of the nodes on the network,
whereas with a star topology, any data sent between end systems would be sent
through the central node before reaching its destination. However, the cost would
probably be lower for the star topology because there are overall less connections
within the entire network compared to the full mesh.
3 You are designing a fitness tracker. What would your protocol and topology
choices be?
For a fitness tracker, one would use protocols such as 6LoWPAN‐UDP‐DDS and
a Point to Point topology. The fitness tracker would likely only transmit its data
to one other device, such as a cell phone or laptop, so the Point to Point topology
would be used in conjunction with the DDS while UDP and 6LoWPAN would
provide reliable, low‐power data transfer between the two devices.
5 Sketch a protocol stack for a smartwatch. Compare the flow of data with the
one you sketched in the previous question.
Application MQTT
Transport TCP
Network IPv6
Physical/Link Cellular Technology
7 A network with all the nodes acting as both servers and clients. A PC can
access files located on another PC but also delivers files to other PCs on the
network. Which network architecture is that?
This describes a mesh architecture because each PC has direct connections to
every other PC on the network.
9 Which layer does the Ethernet and Wi‐Fi protocols belong to?
Ethernet and Wi‐Fi protocols belong to the Physical/Data Link Layer.
current is 25 μA, sleep mode current is 2 μA, and wakeup time is 140 μs.
Communications run for 0.25 s every hour, data logging runs for 20 ms
every second.
3 5 6
I 3.5 10 A Ilog 2.5 10 A I slp 2 10 A
comm
tcomm 0.25 s tlog 72 s tslp 3527.75 s toperating 52560 hr
2 A battery‐operated IoT device must run for 2 years without replacing the bat-
tery, at Irun =25 mA, with 1 ms operation for every 2 seconds and sleep cur-
rent Islp=1 μA. Determine the required battery capacity?
6
I slptslp Iruntrun 10 A 1.999 s 0.025 A 0.001 s
I av
tslp trun 2 s
0.026999 A s 6
1.34995 10 A
2 s
6
Capacity I av toperating 1.34995 10 A 17520 h 0.236511 Ah
3 Pick a wearable device of your choice then list three battery candidates available
commercially for a reasonable operating time. Justify your battery choice
according to the energy budget of the wearable device.
For a wrist‐mounted device that measures heart rate, of the battery
choices listed below, one would go a battery with a capacity in the range of
150-350 mAH due to its reasonable battery capacity in conjunction with its
small physical size, because the device in question is not one that has a lot of
room for large batteries. Below are examples of a few candidates:
CR2025 (capacity: 170 mAH)
CR2032 (capacity: 210 mAH)
4 What is the wavelength at 900 MHz, 2.45 GHz, and 60 GHz? What is the path
loss over 1 meter, 100 meters, and 1 kilometer for these frequencies? Assume
dipole antennas (Gain = 1.7 dB)
270 Solution Manual
900 MHz (Wavelength = 0.33 m), Path loss: 1 m = 28.1 dB, 100 m = 68.1 dB,
1 km = 88.1 dB
2.4 GHz (Wavelength = 0.122 m), Path loss: 1 m = 36.8 dB, 100 m = 76.8 dB,
1 km = 96.8 dB
60 GHz (Wavelength = 0.0049 m), Path loss: 1 m = 64.6 dB, 100 m = 104.6 dB,
1 km = 124.6 dB
20 log Pr 20logD Pt Gr Gt 2L
4
16 20 log 3218 43 14 1.76 6
16 70.15 43 14 1.76 6 21.39 dB
7 Sketch a flow diagram for the development process of a basic fitness tracker.
Ideation/Research
List requirements
-Innovations
-Expectations
-Funcitonality
-Cost estimation
Engineering analysis
Prototyping
Production
8 List all the possible design considerations you believe they are appropriate for
a smart T shirt that measures heart rate, breathing rate, and temperature.
The design considerations for this smart t‐shirt include:
●● How quickly and how accurately the shirt measures the desired parameters
●● How well the circuitry of the shirt can handle the range of temperatures,
weather conditions, the wearer’s sweat or other bodily fluid, the constant
motion of the wearer, and other physical conditions it could be exposed to
●● How simple the parameters that are being measured could be accessed or
process data
●● How comfortable the circuitry feels wearing on the shirt and how it
9 Sketch a flow diagram for the development process of an IoT based secu-
rity system.
Ideation/Research
List requirements
-Innovations
-Expectations
-Funcitonality
-Cost estimation
Engineering analysis
Prototyping
Production
1 0 List all the possible design considerations you believe appropriate for an
automatic dog feeder. The device lets you feed your dog remotely, schedule
meals, and control the portion size.
The design considerations for this dog feeder include:
●● How reliable and accurate the data sent to the feeder is
circuitry
Solution Manual 273
●● Whether the data and specifications sent to the feeder are reliable and
accurate
●● How and how easy it is for the user to connect to and use the feeder
●● How the external aesthetics look, its total weight and whether they conceal
both the food and circuitry
●● The connectivity to other compatible devices so that the user can use the
feeder remotely
●● Whether the feeder is safe to be active when the user or their dog is
around, especially around where the user puts the food in and where it
is dispensed.
●● How easy it is to identify potential problems with the feeder, both physically
and with the software used
●● How easy it is to connect and authorize users to the feeder and pre-
vent unauthorized users from making changes to the feeder’s
specifications
1 Research examples of IoT and wearable devices with each example utilizing
one of the cloud types mentioned in this chapter.
An example of a private cloud could be an IoT‐based smart home system
because all of the specific devices and their specific information and parame-
ters could be stored securely with limited access to outside devices. An exam-
ple of a public cloud could be a streaming service that can deliver data or
information that it has stored in the cloud to various devices that are con-
nected to the cloud’s network. An example of a hybrid cloud could be a smart-
watch, where a lot of its applications and data can be sent to external clouds
while the rest of its features are embedded publicly into the device itself. An
example of a community cloud could be a smart city that exchanges and stores
information between the many different devices and servers to fulfill its
features.
2 Research examples of IoT and wearable devices with each example utilizing
one of the cloud service models mentioned in this chapter.
An example of IaaS could be the Google Compute Engine. An example of
SaaS could be GitHub. An example of PaaS could be Heroku. An example of
FaaS could be OpenFaaS. These could be used in conjunction with IoT devices
so that they can establish their structure and usage.
274 Solution Manual
3 You are working on developing a new smart home virtual assistant. Research
five of the IoT platforms mentioned in this chapter, then narrow down your
selection for this project to two candidates. Justify your choices.
Of these five IoT platforms, for a smart home system, one good choice would be
the AWS IoT platform because it provides support to a broad amount of devices
and protocols, and since a smart home would need to support lights, locks, cam-
eras, and other devices, the broadness and the security it provides would be
useful for a home.
4 List five applications or devices that could benefit from a fog layer. Justify your
answers.
Some applications or devices that could benefit from a fog layer include smart
vehicles, because it would need to make quick decisions on keeping passengers
and those around it safe; medical monitors, because it cannot delay to alert
health care workers or guardians if an issue arises; smart proximity detectors,
such as one at an intersection that could quickly alert pedestrians of any oncom-
ing traffic; and security devices, to send an alert as quickly as possible in the
event of a break‐in.
Solution Manual 275
5 Research five open source API platforms and compare between their
functionalities, features, and related criteria in a comparison table.
API Umbrella Rate Limiting, API Keys, Caching, Real‐Time Analysis, Admin
Permission Varying
Gravitee.io Rate Limiting, IP Filtering, Cross‐Origin Resource Sharing,
Developer Portals, good for comprehending data usage
APIman.io Quick Runtimes, Asynchronous Capability, Policy‐based
Governance, Billing and Analytic Options
WSO2 API High Customization, Easy Governing Policies, Better Access
Manager Control, Runs anywhere at anytime
Kong Enterprise Good for management, One‐Click Operations, Software Health
Checks, Availability of Open‐Source Plugins
[Reference] https://appinventiv.com/blog/open‐source‐api‐management‐tools/
8 Compare through a table the differences between the OpenStack and OpenFog
architectures.
OpenStack OpenFog
2 Research the commercially available security solutions dedicated for IoT and
wearable technology. Compare between their effectiveness based on the tar-
geted area.
A study on ten different IoT‐based security systems show that all were very
vulnerable. They allowed the use of weak passwords, lacked account lockout
mechanisms and proper account information protection so that brute force
tactics could be used against them. For example, most of those that involved
cameras and motion sensors could give access to the footage to multiple
accounts or devices, allowing for potential hackers to easily see the footage for
themselves. This shows a lack of confidentiality and authentication/authori-
zation on their end which makes them vulnerable IoT systems.
4 Create a table that maps the security goals against threats and attacks
mentioned in the chapter.
5 You are designing a wearable device that controls a pacemaker. What are the
possible threats and attacks? What is your risk assessment strategy?
Some possible threats and attacks include that a hacker could hack into the
pacemaker’s software and remotely control or tamper with the device to alter
the wearer’s heart rate to cause harm to the wearer’s body. Furthermore,
information specific to the wearer could be stored on the pacemaker that
could potentially be extracted from the device or modified. The wireless sys-
tem of the device must be ultimately secured.
6 You are working on a project that involves designing a smart door lock that can
be controlled remotely. What are the most important security considerations?
The most important security considerations for a smart door lock include pre-
venting the ability for hackers to either tamper with and unlock the door
themselves or to pretend to be the owner of the place where the door is and
unlock the door themselves and later hiding the fact that it was unlocked
without the owner’s knowledge.
7 How would you prevent brute force attacks when planning your IoT projects?
If a password system is used for a device, one could set a limited number of
attempts to input a correct password. If the number of attempts exceeds that
number, the device either locks itself for a certain period of time and/or lets
another device, which would likely be in the possession of some sort of
administrator, know of the repeated guessing of passwords, which could then
unlock it manually.
278 Solution Manual
8 Research how Mirai and Satori attacks are related. What can you do to
prevent such attacks in the future?
Both Mirai and Satori attacks are related by being botnet‐based cyberattacks
that can attack IoT devices through distributed denial‐of‐service attacks.
Attacks can be prevented by preventing DDoS attacks through re‐routing the
malicious and spam data and filtering it out before reaching the sites to pre-
vent any major harm from spreading as far as the Mirai and Satori attacks did.
1 0 Would your soil moisture monitor project benefit from blockchain technol-
ogy? Why or why not?
While IoT could greatly benefit from the security blockchain could offer, the
soil moisture data is not sensitive enough to be worthy of implementing such
computationally heavy algorithms.