Towards The Internet of Things (IoT)


Internet of Things: A Survey on Enabling Technologies, Protocols and Applications

Ala Al-Fuqaha, Mohsen Guizani, Mehdi Mohammadi, Mohammed Aledhari, Moussa Ayyash

ARTICLE in IEEE COMMUNICATIONS SURVEYS & AMP TUTORIALS · JANUARY 2015


Abstract


In the coming years, the IoT is expected to bridge diverse technologies to enable new applications by connecting physical objects together in support of intelligent decision making.

霧運算(英語:Fog Computing)或霧聯網(Fog Networking,或Fogging)可以協助後台運算運作更有效率 , 在靠近IOT DEVICE端就具備運算,監視,收集資料的功能, 之後再將資料傳至資料中心做更隨為大量的資料分析及演算.

I. I NTRODUCTION


  • "The internet of things: A survey," Computer Networks, vol. 54, pp. 2787-2805, 2010
  • covers the main communication enabling technologies, wired and wireless and the elements of wireless sensor networks (WSNs)
  • "Future internet: The internet of things architecture, possible applications and key challenges," in Frontiers of Information Technology (FIT), 2012 10th International Conference On, 2012, pp. 257-260.
  • the authors address the IoT architecture and the challenges of developing and deploying IoT applications.
  • "Internet of Things (IoT): A vision, architectural elements, and future directions," Future Generation Comput. Syst., vol. 29, pp. 1645-1660, 2013.
  • Enabling technologies and application services using a centralized cloud vision
  • "Survey of internet of things technologies for clinical environments," in Advanced Information Networking and Applications Workshops (WAINA), 2013 27th International Conference On, 2013, pp.
    1349-1354.
  • provide a survey of the IoT for specialized clinical wireless devices using 6LoWPAN/IEEE 802.15.4, Bluetooth and NFC for Health and eHealth applications.
  • "A survey of the internet of things," in Proceedings of the 1st International Conference on E-Business Intelligence (ICEBI2010), 2010, pp. 358-366.
  • addresses the IoT in terms of enabling technologies with emphasis on RFID and its potential applications
  • "A survey on the ietf protocol suite for the internet of things: standards, challenges, and opportunities," Wireless
    Communications, IEEE, vol. 20, pp. 91-98, 2013.
  • An overview of the current IETF standards and challenges for the IoT has been presented


II. M ARKET O PPORTUNITY




All these statistics, however, point to a potentially significant and fast-pace growth of the IoT in the near future, related industries and services. This progression provides a unique opportunity for traditional equipment and appliance manufacturers to transform their products into ―smart things‖.

III. IOT ARCHITECTURE


There is a critical need for a flexible layered architecture which can be capable of interconnecting billions or trillions of heterogeneous objects through the Internet.

There are some proposed models: a 3-layer architecture and the 5-layer models:


A. Objects Layer


The first layer, the Objects (devices) or perception layer, represents the physical sensors of the IoT that aim to collect and process information.
Standardized plug-and-play mechanisms need to be used by the perception layer to configure heterogeneous objects.

B. Object Abstraction layer


Object Abstraction transfers data produced by the Objects layer to the Service Management layer through secure channels.
Data can be transferred through various LAN technologies.
Furthermore, other functions like cloud computing and data management processes are handled at this layer.

C. Service Management Layer


Service Management or Middleware (pairing) layer pairs a service with its requester based on addresses and names.

D. Application Layer


The application layer provides the services requested by users.
The application layer covers numerous vertical markets such as smart home, smart building, transportation, industrial automation and smart healthcare

E. Business Layer


The responsibilities of this layer are to build a business model, graphs, flowcharts, etc. based on the received data from the Application layer.

In the five-layer model, the Application Layer is the interface by which end-users can interact with a device and query for interesting data. It also provides an interface to the
Business Layer where high-level analysis and reports can be produced. The control mechanisms of accessing data in the application layer are also handled at this layer. This layer is hosted on powerful devices due to its complex and enormous computational needs.

IV. IOT ELEMENTS


  • A. Identification
  • Identification methods are used to provide a clear identity for each object within the network. The addressing assists to uniquely identify objects globally.
  • B. Sensing
  • The collected data is analyzed to take specific actions based on required services.
  • C. Communication
  • Examples of communication protocols used for the IoT are: WiFi, Bluetooth, IEEE 802.15.4, Z-wave, and LTE-Advanced.
  • D. Computation
  • The ―brain and the computational ability of the IoT.
    • Hardware
    • Arduino, UDOO, FriendlyARM, Intel Galileo, Raspberry PI, Gadgeteer, BeagleBone, Cubieboard, Z1, WiSense, Mulle, and T-Mote Sky.
    • OS
      • Contiki
      • Contiki has a simulator called Cooja which allows researcher and developers to simulate and emulate IoT and wireless sensor network (WSN) application.
      • TinyOS
      • LiteOS
      • Riot
      • Android
    Cloud Platforms form another important computational part of the IoT. These platforms provide facilities for smart objects to send their data to the cloud, for big data to be processed in real-time, and eventually for end-users to benefit from the knowledge extracted from the collected big data.
  • E. Services
    • Identity-related Services
    • Information Aggregation Services
    • Smart healthcare and smart grids
    • Collaborative-Aware Services
    • smart home, smart buildings, intelligent transportation systems (ITS), and industrial automation
    • Ubiquitous Services
  • Semantics
  • Semantic in the IoT refers to the ability to extract knowledge, knowledge extraction includes discovering and using resources and modeling information. Also, it includes recognizing and analyzing data to make sense of the right decision to provide the exact service. XML Interchange (EXI) converts XML messages to binary to reduce the needed bandwidth and minimize the required storage size.


V. IOT COMMON STANDARDS


The IoT protocols can be classified into into 4 broad categories,
  • application protocols
  • service discovery protocols
  • infrastructure protocols
  • other influential protocols

A. Application Protocols



1) Constrained Application Protocol (CoAP)


The CoAP defines a web transfer protocol based on REpresentational State Transfer (REST) on top of HTTP functionalities.

REST represents a simpler way to exchange data between clients and servers over HTTP.
REST can be seen as a cacheable connection protocol that relies on stateless client-server architecture.
It is used within mobile and social network applications and it eliminates ambiguity by using HTTP get, post, put, and delete methods.
REST enables clients and servers to expose and consume web services like the Simple Object Access Protocol (SOAP) but in an easier way using Uniform Resource Identifiers (URIs) as nouns and HTTP get, post, put, and delete methods as verbs.


2) Message Queue Telemetry Transport (MQTT)


MQTT is a messaging protocol which aims at connecting embedded devices and networks with applications and middleware.
MQTT simply consists of three components,

  • subscriber
  • An interested device would register as a subscriber for specific topics in order for it to be informed by the broker when publishers publish topics of interest.
  • publisher
  • The publisher acts as a generator of interesting data. After that, the publisher transmits the information to the interested entities (subscribers) through the broker.
  • broker
  • the broker achieves security by checking authorization of the publishers and the subscribers

The protocol uses a publish/subscribe architecture in contrast to HTTP with its request/response paradigm.
Publish/Subscribe is event-driven and enables messages to be pushed to clients.
The central communication point is the MQTT broker, it is in charge of dispatching all messages between the senders and the rightful receivers.
Each client that publishes a message to the broker, includes a topic into the message.
The topic is the routing information for the broker. Each client that wants to receive messages subscribes to a certain topic and the broker delivers all messages with the matching topic to the client. Therefore the clients don’t have to know each other, they only communicate over the topic.

The difference to HTTP is that a client doesn’t have to pull the information it needs, but the broker pushes the information to the client if there is something new.
Each MQTT client has a permanently open TCP connection to the broker. If this connection is interrupted by any circumstances, the MQTT broker can buffer all messages and send them to the client when it is back online.
A topic is a simple resource string that can have more hierarchy levels, which are separated by a slash.
For ex., the temperature data of the living room could be house/living-room/temperature.

Numerous applications utilize the MQTT such as health care, monitoring, energy meter, and Facebook notification.
Therefore, the MQTT protocol represents an ideal messaging protocol for the IoT and M2M communications and is able to provide routing for small, cheap, low power and low memory devices in vulnerable and low bandwidth networks.

Eclipse Mosquitto is an open source (EPL/EDL licensed) message broker that implements the MQTT protocol versions 5.0, 3.1.1 and 3.1. Mosquitto is lightweight and is suitable for use on all devices from low power single board computers to full servers.
It also includes a C and C++ client library, and the mosquitto_pub and mosquitto_sub utilities for publishing and subscribing.
  • Download the source code
  • 
    https://github.com/eclipse/mosquitto.git
    
  • Building
  • 
    $ sudo apt-get install libssl-dev docbook-xsl
    $ make
    
    • mosquitto and mosquitto_passwd will be built under src/.
    • mosquitto_pub, mosquitto_sub, mosquitto_rr, pub_test_properties and sub_test_properties will be built under client/
  • Test
    • broker
    • 
      src$ ./mosquitto
      1599634566: mosquitto version 1.6.12 starting
      1599634566: Using default config.
      1599634566: Opening ipv4 listen socket on port 1883.
      1599634566: Opening ipv6 listen socket on port 1883.
      1599634566: mosquitto version 1.6.12 running
      1599634635: New connection from 127.0.0.1 on port 1883.
      1599634635: New client connected from 127.0.0.1 as mosq-Do6tUmgA2w5veBd9DX (p2, c1, k60).
      1599634674: New connection from 127.0.0.1 on port 1883.
      1599634674: New client connected from 127.0.0.1 as mosq-4RYvbACtNUALeDAXIQ (p2, c1, k60).
      1599634674: Client mosq-4RYvbACtNUALeDAXIQ disconnected.
      
      
    • subscriber
    • 
      client$ export LD_LIBRARY_PATH=../lib/
      client$ ./mosquitto_sub -t 'test/topic' -v
      test/topic hello world
      
      
    • publisher
    • 
      client$ export LD_LIBRARY_PATH=../lib/
      client$ ./mosquitto_pub -t 'test/topic' -m 'hello world'
      
  • Documentation


Towards the Internet of Things for Physical Internet: Perspectives and Challenges

Article in IEEE Internet of Things Journal · February 2020

Hoa Tran-Dang, Member, IEEE, Nicolas Krommenacker, Patrick Charpentier, Dong-Seong Kim, Senior Member, IEEE.


Abstract

In transportation, the Physical Internet® refers to the combination of digital transportation networks that are deploying to replace analog road networks.
The Physical Internet (PI, or π) is intended to replace current logistical model.

This paper is to investigate opportunities of application of IoT technology in the PI vision.

I. I NTRODUCTION


The ICT(information and communication technology ) will be a key factor to increase the competitiveness of logistics enterprises.
IoT can also improve organization capabilities for monitoring, controlling, managing, and optimizing almost logistics activities.

Professor Montreuil reported in in his study which proposed and described Physical Internet (termed as PI, or π) as a novel logistics model.
The PI has emerged as an innovative concept in logistics that can be a potential replacement of the existing logistics system.
Originally, by taking advantage of features from the Digital Internet, the key components enabling the PI include
  • π-containers
  • π-nodes
  • π-protocols

IoT can provide a means for obtain the inter-connectivity and data exchange among the involved operations and actors.
This paper examines the trends of IoT applications in the PI and uncover various issues that must be addressed to transform this logistics
paradigm through the IoT innovation.

II. BACKGROUND


A. Internet of Things


Generally, the IoT paradigm can be viewed from 4 visions:
  • thing-oriented
  • IoT is considered as a technology making them become smart. Smart things that are capable of seeing, hearing, thinking, sharing information, coordinating decisions, and performing tasks are enabled by embedded emerging technologies such as RFID, sensors, computing, and communication.
  • Internet-oriented
  • IOT enables things to connect and communicate together. IPSO (IP for Smart Objects) alliance has developed an IP stack as a light-weight protocols to connect a large number of smart objects
  • semantic-oriented
  • There is a huge volume of data from sensors or smart objects exchanged in the IoT systems. Semantic technologies associated in the IoT system are solutions to extract the sets of raw data into homogeneous and heterogeneous formats, and then process it into meaningful representation and interpretation.
  • service-oriented
  • IoT intelligent services and applications based on the three perspectives mentioned above.
In summary, the principle of IoT is to interconnect the heterogeneous things by a single Internet protocol and to exploit the shared information through this connection to support the decision making and provide and develop intelligent services and applications.

In fact, the IoT-based systems are composed of several key blocks which are responsible for different functions to the systems such as
  • sensing
  • identification
  • actuation
  • communication
  • processing
  • computing
  • analyzing
There has been no common architecture of IoT agreed. For ex.,
  • “A survey on application layer protocols for internet of things (iot)”
  • an IoT-based system simply consists of four parts: sensor nodes, gateways, the public Internet, and the final applications.
  • “An overview of the internet of things for people with disabilities”
  • 3 major layers for IoT systems include perception layer (or sensing layer), network layer, and service layer (or application layer)

B. Physical Internet




Towards a definition of the Internet of Things(IoT)

Revision 1 – Published 27
MAY 2015
IEEE Internet Initiative | iot.ieee.org




Towards the Internet of Things

Architectures, Security, and Applications


Chapter 1 The IoT Landscape


1 What Is IoT?


The fourth wave of human life is the emergence of a cyber-age in which everything is connected to everyone in any place at any time.

IoT is based on several previous technologies that are: pervasive information systems, sensor networks, and embedded computing
The main goal of IoT is to monitor and control things from anywhere in the world.

2 Applications


  • Transportation
  • Environmental monitoring
  • Medical and health care
  • Home automation
  • Energy management
  • Media
  • Agriculture
  • Security

3 Architectures


Because of the wide domain of internet objects, there is no single consensus on IoT architecture, which is universally agreed.

According to most researchers’ views, conventional IoT architecture is considered as three layers, which are:
  • Perception layer
  • The perception layer is also known as the recognition layer
  • Network layer
  • the network layer is the most developed layer of conventional IoT architecture, it is the core layer (network layer) of IoT. This layer also ensures unique addressing and routing capabilities for the unified integration of countless devices into a single cooperative network.
  • Application layer

4 Security



Chapter 2 IoT Architecture


1 Introduction







留言

熱門文章