4/10/2018

Ubiquitous Computing

IoT, Sensor Networks, RFID,

Cloudlets and Clouds

• Ubiquitous cloud computing refers to the use of Internet resources at any place and any time for any objectives. • With ubiquitous sensors, clouds, and mobile devices, we can retrieve information faster and more effectively. • Vannevar Bush predicted a dream device in 1945 :“Consider a future device for individual use, which is a sort of mechanized private file and library. It needs a name, and to coin one at random, “memex” will do. A memex is a device in which an individual stores all his books, records, and communications, and which is mechanized so that it may be consulted with exceeding speed and flexibility. It is an enlarged intimate supplement to his memory.” What a coincidence ! Today, this “memex” device goes by the name of iPad, smartphone,cloud, IoT, virtual reality, and cyber-physical system (CPS), among many others.

• Recently, researchers at Carnegie Mellon University, Microsoft, AT&T, and Lancaster University proposed a low-cost infrastructure to enable cloud computing using mobile devices. The idea is called Cloudlet, and it offers a resource-rich portal for upgrading mobile devices with cognitive abilities to access distant clouds. This portal should be designed to be trustworthy and use VMs to explore location-aware cloud applications. • Cloudlets are decentralized and self-managed, like a “virtual data center in abox.” Cloudlets operate with LAN latency and bandwidth with only a few users at a time. • Clouds are centralized at large-scale data centers. They are professionally administrated all the time and they need large machine rooms with uninterrupted power and cooling. The main problem for a distant cloud to be accessed by mobile devices lies in the long latency experienced with the Internet or WANs.

Cloud Mashup

IoT

Technology road map of IoT

• In web application development, a mashup is a web page or application that combines data, presentations, or functionality from two or more sources to create a new service. The main characteristics of the mashup are a combination of virtualization and aggregation. • Not only are AWS and GAE different in terms of their functionalities, but they also can complement each other. This has triggered the idea of mashing up different clouds to build an intercloud or cloud of clouds dynamically. • This mashup helps a user to write agile software on GAE and use the user inputs to perform parallel computing operations on AWS

• In ubiquitous computing, the Internet of Things (IoT) provides a network of sensor or radio connected devices that can be uniquely identified and located in the cyber-physical space. This IoT is mostly wirelessly connected as a self-configuring network of radio-frequency tags, low-cost sensors, or e-labels. The term “IoT” combine RFID technology with today’s IPv6-based Internet technology. All things (objects) have IP addresses, which can be uniquely identified. The IPidentifiable objects are readable, recognizable, locatable, addressable, and/or controllable via the Internet, aided by RFID, WiFi, ZigBee, mobile networks, and GPS.

1

4/10/2018

IoT Architecture

Application Domain of IoT

• The bottom layers represent various types of sensing devices: namely RFID tags, ZigBee or other types of sensors, and road-mapping GPS navigators. The sensing devices are locally or wide-area-connected in the form of RFID networks, sensor networks, and GPSes. Signals or information collected at these sensing devices are linked to the applications through the cloud computing platforms at the middle layer. • The signal processing clouds are built over the mobile networks, the Internet backbone, and various information networks at the middle layer. • A large number of sensors and filters are used to collect the raw data. Various compute and storage clouds and grids are used to process the data and transform it into information and knowledge formats. • The sensed information is used to put together a decision-making system for intelligence applications. The middle layer is also considered as a Semantic web or grid.

RFID • RFID is applied with electronic labels or RFID tags on any objects being monitored or tracked. The tagging may be applied to any objects, such as merchandise, tools, smartphones, computers, animals,or people. The purpose is to identify and track the objects using radio waves or sensing signals. • Some tags can be read from tens or hundreds of meters away via a wireless reader. • There are generally three types of RFID tags: • active RFID tags containing a battery and transmitting signals autonomously, • passive RFID tags which have no battery and require an external source to provoke signal transmission. • battery-assisted passive RFID tags which require an external source to wake up the battery but have significantly higher forward link capability.

How RFID works • In terms of functionality, there are three major components of RFID hardware: • • RFID tag A tiny silicon chip attached to a small antenna. • • Reader antenna Used to radiate the energy and then capture the return signal sent back from the tag. It can be integrated with a handheld reader device or connected to the reader by cable. • • Reader The device station that talks with the tags. A reader may support one or more antennae. Resembling an electronic barcode, a reader device can detect signals even without a line of sight

2

4/10/2018

Wireless Sensor Networks

Four Classes of Wireless Networks

• A WSN is a group of specialized transducers with a communications infrastructure intended to monitor and record conditions at diverse locations. Commonly monitored parameters are temperature, humidity, pressure, wind direction and speed, illumination intensity, vibration intensity, sound intensity, power-line voltage, chemical concentrations, pollutant levels, and vital body functions. • A sensor network consists of multiple detection stations called sensor nodes, each of which is small, lightweight, and portable. Every sensor node is equipped with a transducer, microcomputer, transceiver, and power source. • The transducer generates electrical signals based on sensed data. • The microcomputer processes and stores the sensor output. • The transceiver, which can be hardwired or wireless, receives commands from a central computer and transmits data to that computer. • The power for each sensor node is derived from the electric utility or from a battery. • A sensor node may vary in size from that of a shoebox down to a dust grain. The cost of sensor nodes also varies a lot, ranging from $100’s to a few pennies. Size and cost constraints on sensor nodes are often decided by energy, memory, computational speed, and bandwidth of the sensors used.

Three Generations of WSN

Applications of WSN • Military sensor networks to detect and gain as much information as possible about enemy movements, explosions, and other phenomena of interest • Sensor networks to detect and characterize chemical, biological, radiological, nuclear, and explosive attacks and materials • Sensor networks to detect and monitor environmental changes in plains, forests, oceans, and so on • Wireless traffic sensor networks to monitor vehicle traffic on highways or in congested parts of a city • Wireless surveillance sensor networks for providing security in shopping malls, parking garages, and other facilities • Wireless parking lot sensor networks to determine whether the lot is occupied or available

3

IoT, Sensor Networks, RFID, GPS

wirelessly connected as a self-configuring network of radio-frequency tags, low-cost sensors, or e-labels. The term “IoT” combine RFID technology with today's ...

918KB Sizes 1 Downloads 216 Views

Recommend Documents

Anti-Theft Security System Using GSM, GPS, RFID Technology ... - IJRIT
³ Head of the Department (Digital Systems Computer Applications), SLC's ..... using the Keil uVision integrated development environment, we must select a chip.

Anti-Theft Security System Using GSM, GPS, RFID Technology ... - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 2, Issue 9, ... ³ Head of the Department (Digital Systems Computer Applications), SLC's ..... [2] Garg, V. K., and Wilkes, J. E., Wireless and Personal Communication ...

34.RFID Technology for IoT-Based Personal.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. 34.

Sensor Data Cryptography in Wireless Sensor Networks - IEEE Xplore
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 3, NO. 2, JUNE 2008. 273. Sensor Data Cryptography in. Wireless Sensor ...

The Next Generation of Sensor Node in Wireless Sensor Networks
good choice for a battery-limited device likes sensor node. This paper ... Index Terms—Wireless sensor network, Dynamic Partial Reconfigurable, FPGA.

Sensor placement in sensor and actuator networks
sor placement in wireless sensor and actuator networks (WSAN). One or more ..... This scheme has obvious advantage over the algorithms in [MXD+07] in mes-.

WIRELESS SENSOR NETWORKS FOR MEDICAL SERVICE
concerning the involvement of WSNs in bio-medical service is ... sors is to replace existing wired telemetry systems for ... consequence management needs.

Wireless Sensor Networks 1 Introduction
Jun 19, 2006 - tunately, almost all WSN routing algorithms have ignored security and ... Protocols such as SPINS [23] have begun to address secure routing ..... Client Manager .... [15] J. Liu, M. Chu, J.J. Liu, J. Reich and F. Zhao, State-centric ..

Semantic Sensor Networks 2011 - ISWC 2011
semantic-aware sensor data management [7,8,9,10,11] have introduced a wide variety of .... Ontology-based streaming data access aims at generating semantic web con- tent from .... The first part is the GSN host (http://montblanc.slf.ch:22001). .... a

Robust Location Detection in Emergency Sensor Networks
that generalizes the basic ID-CODE algorithm and produces irreducible r-robust codes. The degree of robustness, r, is a design parameter that can be traded off ...

WIRELESS SENSOR NETWORKS FOR MEDICAL SERVICE
Abstract: The present work surveys and classifies various applications of the Wireless Sensor Networks. (WSNs) technology in bio-medical service. A review.

Communication–aware Deployment for Wireless Sensor Networks
which is the case for many sensor network applications in the environmental ... example for an environmental monitoring application scenario (temperature ...

Navigation Protocols in Sensor Networks
We wish to create more versatile information systems by using adaptive distributed ... VA 23187-8795; email: [email protected]; D. Rus, Computer Science and .... on a small set of nodes initially configured as beacons to estimate node loca-.

Investigating Sensor Networks with Concurrent ... - IEEE Xplore
The background behind this demonstration is described as an one-page poster submission. The goal is to show a flow of tools for quick sensor network modeling, from an high level abstraction down to a system validation, including random network genera

Sensor Networks for Monitoring Traffic
Aug 5, 2004 - traffic monitoring system using wireless sensor networks that offers high ... P. Varaiya is Professor in Electrical Engineering and Computer ...

TARANTULAS: Mobility-enhanced Wireless Sensor-Actuator Networks
3School of Computer Science and Engineering, University of New South Wales, NSW 2052, Australia. {winston ... Asynchronous Systems (TARANTULAS) project builds a system of ... information ranging from physical quantities such as.

Sentry Selection in Sensor Networks
Sensor Nodes have limited power resources. – The peak ... The typical power consumption of a sleeping node is about 3 orders of magnitude smaller than for a ... divided. The problem in a very general form can be stated as follows: For some maximum

Outlier Detection in Sensor Networks
Keywords. Data Mining, Histogram, Outlier Detection, Wireless Sensor. Networks. 1. INTRODUCTION. Sensor networks will be deployed in buildings, cars, and ... republish, to post on servers or to redistribute to lists, requires prior specific permissio

Cheap Tk102 Gps Track Locator Gps Mount Tracker Gps Bracket ...
Cheap Tk102 Gps Track Locator Gps Mount Tracker Gp ... ket For Dji Phantom 4 Quadcopter Free Shipping.pdf. Cheap Tk102 Gps Track Locator Gps Mount ...

Toward Reliable Actor Services in Wireless Sensor and Actor Networks
I. INTRODUCTION. Wireless sensor networks (WSNs) are an integral part of the ... data sink and requesting for firefighting service; one or a few actors are then ...

Global Clock Synchronization in Sensor Networks - Computer Science
Dartmouth College. Hanover, NH 03755. Email: [email protected] .... The solution targets an ad hoc network in which two nodes may be out of range and ...

Energy-Aware Path Selection in Mobile Wireless Sensor Networks: A ...
Energy-Aware Path Selection in Mobile Wireless Sensor .... Next, we illustrate the credit-based approach: a node is ... R is considered as a virtual credit of.