Sie sind auf Seite 1von 5

IoT Network Proposal 

Animesh A Kujur 
Tapas Kashyap 
 
 
Subject Area of the project 
Internet of Things 
 
Project Abstract 
With  rapid  growth  in  IoT  technologies  in  the  past  few  years,  developers  primarily  focus  on 
the  applications  of  the  IoT  devices  while  using  a  legacy  network  architecture.  Our  aim  is  to 
develop  a  robust,  more  secure  and  reliable  network  architecture  which  could  be  used  for  a 
variety of applications, commercially and domestically. 
 
What makes this network Unique ?  
● Currently,  there  is  no  existing  system  which  can  serve  both  as  a  automation  system 
and tracking system for smart advertising.  
● The  network  can  provide with analytics of the most visited places by a user, since the 
MAC  address  of  the  mobile  can  help  us  locate  a  particular  user  easily,  this  can  be 
used  to  study  the  pattern  of a user’s most visited sections inside the complex. Which 
has an application for personalized advertising and behavioral studies.  
● This network architecture also boast of both remote and offline access. 
 
Deliverables 
 
1. Hardware nodes capable of automation . 
2. Indoor tracking analytics system. 
3. An Android application. 
 
 
Applications 
1. Automation 
● Electrical devices can be controlled wirelessly using a smartphone. 
● Data collection from the premise using sensors. 
 
2. Surveillance System of Corporations  
Since  CCTV  cameras  often  have  blind  spots  and  aren’t  able  to  detect  unauthorized 
devices  inside  a  network.  This  system  shall  add  an  extra  layer  of  security  for 
corporations.  It  will  be  able  to  detect  unauthorized  devices  inside  its  network  and 
could raise alerts. 
 
3. Indoor Tracking 
● Track consumers and provide analytics about user behaviour.  
● Display ads/offers on consumer’s devices.  
 
 
 
 
Methodology 
The  architecture  of this platform is modeled in layers, which are generic enough to cover the 
requirements  of  smart  environment,  as  addressed  in  the  context  of  smart  buildings.  It 
consists  of  a  first  layer  that  manages  multiple  nodes  as  well  as  perform  analytics  from the 
data logs of the user.  
 
The  second  layer,  the  communication  layer  is  a  mesh  network  of  node  devices  that 
communicate  with  each  other  using  bluetooth  v4.2  and  transfers  the  data  to  the  server 
online  via  wifi.  We  consider  this  as  a  key  and  very  critical  aspect  from an architecture point 
of view, and certainly it is in our next step of the evolution of our platform. Thus, currently we 
are  implementing  a  common  language  format  to  represent  all  data  sensed  by  sensors 
deployed in buildings.  
 
The  final  layer  consists  of  hardware  layer  which  will interact with the electrical devices. The 
hardware nodes consists of ESP32 chipset and a relay to control one single device only. 
Figure 1 demonstrates the layers. 
 
Creating  a  wireless  network  is  an  integrated  task  that  comprises the whole lifecycle of the 
building. The main stages are: 
  
1. Construction, testing individual subsystems. 
2. Operation, monitoring the building and controlling devices. 
3. Data analytics to get the visuals of the indoor tracking. 
 
 
Fig 1 (Network Layer Architecture)  

 
 
 
 
   
Project Details 
 
 
Individual Node Devices: 
Each node device shall consist of an ESP32 chipset, a relay circuit along with the voltage 
conversion circuit to power the node, since the nodes will be directly attached to the 
electrical appliances, the power source of the node will be derived directly by the AC mains.   
 
Network Architecture: 

Fig 2 (Network Topology)  


The blue lines in the figure above represents Bluetooth connecting among node devices, while the black lines 
represents the connection between a node and a wifi router. 
 
Each  node  device  is  equipped  with  a  bluetooth  enabled  chipset  along  with  a  wifi  chipset, 
hence  the  mesh  is  built  upon  the  bluetooth  network.  A  few  of  the  node  devices  connect  to 
the  nearby  wifi  using  their  wifi  enabled  chipset  while  the  rest  of  the  node  devices  use  their 
wifi to track and conduct surveillance. (Fig 2) 
 
 
To  access  the  data,  a  user  could  use  their  smartphone  (Android  App)  to  get  fetch  the 
analytics  from  the  server  :  in  case  of  remote  access;  or  to  the nearest node device : in case 
of offline access. 
References 
 

1. https://media.blackhat.com/us-13/US-13-OConnor-CreepyDOL-Cheap-Distributed-Stalking-W
P.pdf 
2. https://www.espressif.com/sites/default/files/documentation/esp32_bluetooth_networking
_user_guide_en.pdf 
3. http://www.ecs.umass.edu/~deirwin/sustkdd12.pd​f 
4. http://kom.aau.dk/group/05gr999/reference_material/comparable_Kalman/comparable_Kal
man.pdf