Beruflich Dokumente
Kultur Dokumente
INTERNET
OF THINGS ///// Finland
/ page 28
F
14 Executive Summary of the State of the Art report, Extracts inland’s national Internet of Things (IoT)
Program helps the Finnish industry to pioneer Billions of connected
15 Building networked IoT business model scenarios with the development of new products, services and
a Delphi study standards for IoT and has a global competitive advantage devices will change our
due to its existing know-how and active cross-industrial
17 IoT for Intelligent Traffic System cooperation in the Information and Communications
ways of living.
Technology (ICT) sector.
18 More fun with IoT stuff In order to prosper on a global level, IoT needs to
support a multitude of diverse “smart” objects, which are
21 Applications of collaborative analysis
extended with sensors, actuators, RFIDs or processors. Tivit is one of Finland’s Strategic Centres for Science,
22 A Risk-Driven Security Analysis and Metrics Development Those objects must be uniquely identifiable and can be Technology and Innovation (In Finnish: “SHOK” or
monitored or manipulated via various networks; they can “Strategisen huippuosaamisen keskittymät”) and brings
for WSN-MCN Router
autonomously transmit data and communicate with other together strategically important research programs or
26 Operator opportunities in the IoT objects or machines. projects, thereby giving those involved a framework
Some of the key challenges of our research and in which they not only benefit from the wide range of
28 Enabling Semantics for the IoT – Data representations and development activities are the elaboration of strong partners involved.
energy consumptions security and privacy foundations, development of Feel free to visit our website (www.iot.fi) where you
common IoT platforms, international standardization can download our “Internet of Things Strategic Research
31 Ontology Alignment for Interoperability on the IoT efforts and efforts to reduce the energy consumption Agenda”, find a list of our partners, our publications and
of devices that are attached to objects. Besides that, the additional program information.
32 Combining Sensor Networks with Social Networks by IoT Program researches the potential for new lucrative This magazine will give an insight into some of the
XMPP business models, products and services. R&D activities performed by our consortium partners
Due to its strong background in ICT, the Finnish within the IoT Program. Enjoy reading!
35 Networking small devices
T
he technical solution for realizing such an goal is to facilitate service and application development
interconnected “smart” world is more complex than in decentralized, complex, heterogeneous and dynamic
the setup of the traditional Internet and naturally environments.
calls for strong international collaboration. In order to The goal of WP4 (Human Interaction) is to gain
ensure that Finland will become a recognized leader in a better understanding on the best ways to provide Figure 1. IoT Program Work Packages
the IoT domain, Tekes granted financial support for the interactive solutions in an IoT environment. The WP
national IoT Program, which started in the beginning seeks to research user experience aspects of interaction
of 2012. The budget for this industry-driven four-year with IoT, study the best ways to empower people to
Program is around 60 Million Euros. configure and access their IoT environment, and apply As an example, big companies such as Intel, Nokia,
The Ericsson R&D Center Finland, who is the biggest innovative visualization methods to convey the IoT state, F-Secure, Elektrobit, Renesas Mobile and Ericsson have Here an excerpt of our
investor and driver of the IoT Program, defined together content, and capabilities. a strong background in soft- and hardware development, achievements so far:
with other consortium partners work package teams with The target of WP5 (Ecosystem) is to support Finnish ICT, security, the automotive and wireless industries and
team sizes of up to 60 persons, which perform various firms in forming a successful IoT ecosystem by identifying consumer electronics. • Submission of more than 50 scientific articles for IEEE
research and development tasks that benefit from (inter-) their role in the ecosystem and developing suitable Participating SMEs like Mikkelin Puhelin, There SECON, ACM SIGCOMM workshop on Mobile Cloud
national cooperation. Teams are typically led jointly by business models. Corporation, Mobisoft, Finwe and the Finnet Group bring Computing, IEEE Globecom workshop on IoT, ACM
one representative from the industry and one from a In WP6 (Trials and Demos) we plan, implement, analyze benefits to our joint research with their experience in IT ExtremeCom, IEEE Communications, IEEE Network
Finnish university. and showcase ambitious IoT solutions to demonstrate their services, ICT, energy management, home automation, magazine, IEEE Transactions on Mobile Computing,
We see it as an advantage that experts of otherwise benefits to our stakeholders and the general public. digital services, vehicle communication etc. and various conferences
competing companies find common ground by researching Identified XWP (Cross-Workpackage) activities, On an international level, we are happy to cooperate • Significant contributions to IETF CoAP and HOMENET,
and resolving common problems together and by sharing namely “Security, Privacy and Trust”, “Energy Efficiency” with other organizations, such as the Wuhan University IEEE 802.11ah, 3GPP LTE
research results within the consortium. and “Standardization and Architectural Issues” are issues, China, the French Agency for International Business
• Evaluation of cryptographic libraries and algorithms
The main objective of WP 1 (Networking and which need to be considered in all work packages Development, the Finnish-Russian University Cooperation
Communications) is the development of new technological in Telecommunications, Intel USA and other organizations • Feedback to the CoAP resource directory and mirror
solutions, network designs, and architectures that can cope The challenge is the way from silos to in Europe and Asia. proxy drafts at the IETF
with billions of IoT entities, and connection enablers for platforms Eight consortium partners come from Finnish academic • Research and prototypes for low-power, low-cost
the suppliers of the data with the respective consumers. research institutions; however, most contributions come sensor networking design for snow environments
Over time, various vertical industry segments have been from VTT Technical Research Centre of Finland, the • State-of-the-art review of M2M communications in the
solving challenges of the urban population (such as water University of Oulu, Tampere University of Technology, LTE-context from traffic point of view
We see it as an advantage that experts supply, energy resources, transportation, pollution, Aalto University and the University of Helsinki.
public safety, health, corruption, housing, waste etc.) by You can find an updated list of our partnerships on the • Literature review related to security and energy
of otherwise competing companies efficiency of various resources-constrained networks
T
he underlying fundamental enabler that makes the latter representing the bulk of future deployed devices. multi-purpose devices
this happen is technology evolution. The key The things we are interested in are very diverse and range
!"#$%&'()*+,-./0123456789:;<=>?
@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcd
efghijklmnopqrstuvwxyz{|}~Á¢£Û´¦§¨©ª«¬®¯°
web paradigm
enabling technologies are ubiquitous connectivity, from industrial machines to vehicles, appliances, lights, and
±²³
´¶·¸¹º»¼½ÀÁÂÃÄÅÆÇÈËÌÍÎÏÐÑÒÓÔÕÖ×ØÙÚÛÜÝ
Þßàáâãäåæçèéêëìíîïðñòóôõö÷øùúûüýþÿĀ apps migrate to cloud
smart devices, and the ability to integrate smart objects in buildings. The things are not limited to tangible objects;
āĂăąĆćĊċČĎďĐđĒĖėĘęĚěĞğĠġĢģĪīĮįİõĶķĹĺĻļĽ
ľŁłŃńŅņŇňŌŐőŒœŔŕŖŗŘřŚśŞşŠšŢţŤťŪūŮů
ŰűŲųŴŵŶŷŸŹźŻżŽžƒȘșöÿùúûþ÷ýẀẁẃẄẅỲỳ–
different applications. We are now at the meeting point in smart places and environmental observations are very ÑÔÕâÒÓã à¥ÉäÜÝÚ€™−≤≥Þß
ĀĀĂĂĄĄĆĆĊĊČČĎĎĐĐĒĒĖĖĘĘĚĚĞĞĠĠĢĢĪĪĮĮİĶĶĹ
time where viable technologies are available at the same important for many applications. ĹĻĻĽĽŃŃŅŅŇŇŌŌŐŐŔŔŖŖŘŘŚŚŞŞŢŢŤŤŪŪŮŮŰŰ
ŲŲŴŴŶŶŹŹŻŻȘș
time as concrete needs from the different stakeholders The application space is very wide; improvements
ΆΈΉΊΌΎΏΐΑΒΓΕΖΗΘΙΚΛΜΝΞΟΠΡΣΤΥΦΧΨΪΫΆΈΉΊ
ΰαβγδεζηθικλνξορςΣΤΥΦΧΨΩΩΪΫΌΎΏ
ЁЂЃЄЅІЇЈЉЊЋЌЎЏАБВГДЕЖЗИЙКЛМНОПРСТУ
have emerged. in traffic safety and traffic management, for example. ФХЦЧШЩЪЫЬЭЮЯАБВГДЕЖЗИЙКЛМНОПРСТУ
ФХЦЧШЩЪЫЬЭЮЯЁЂЃЄЅІЇЈЉЊЋЌЎЏѢѢѲѲѴѴҐ
ҐәǽẀẁẂẃẄẅỲỳ№ Benefits
Transforming the electricity grid to a smart grid,
Pushing the limits of M2M and the intranet driven by new requirements like energy efficiency, cost efficient devices
of things microgeneration, electrical vehicles, and consumer energy large developer community
awareness is another. Agriculture, water management new roles in the value network
The Networked Society builds on personal communications and environmental monitoring are other less technology-
as well as communication embedded in real-world objects intensive usage areas.
6 or things, i.e. both M2M and the Internet of Things (IoT), Figure 2. Moving from silos to an Internet of Things 7
Standards for embedded devices in the Networked Society / Jari Arkko & Jan Höller
Slide title
minimum 32 pt
From a commercial standpoint, it is also important to also ease the integration to existing Internet services and (32 pt makes 2 rows
build on link layer communications that support multiple Enterprise systems. Variants of the Web Services model
applications. Deployment of new IoT devices on existing suitable for the tiniest devices have already been defined. Application and Service Integration
networking infrastructures is a natural requirement. For instance, Constrained Application Part (CoAP) Text and bullet level 1
Furthermore, we should turn to widely accepted [2,5] employs the REST paradigm but employs a more minimum 24 pt
development tools. Today, development is often done with lightweight solution than HTTP.
proprietary tools. Going mainstream means that we can It is also necessary to make simple profiles of the Bullets level 2-5
make use of the thousands of developers out there. To this sensor data and there are efforts in this direction from minimum 20 pt
end, open APIs are also important, and the prospect of both the research community and in standardization.
AppStores for IoT devices is attractive. CoRE link formats [3] combined with SenML [4] is Advanced processing Data&Info Management
!"#$%&'()*+,-./0123456789:;<=>?
one example. Examples of more heavy profiles that are @ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcd
efghijklmnopqrstuvwxyz{|}~Á¢£Û´¦§¨©ª«¬®¯°
- Query Resolution - Data&Event Store
dedicated include ZigBee Smart Energy Profile 2.0 [6], ±²³
´¶·¸¹º»¼½ÀÁÂÃÄÅÆÇÈËÌÍÎÏÐÑÒÓÔÕÖ×ØÙÚÛÜÝ - Data Analytics - Discovery
Federation - Autonomous Control - Resource Modelling
Þßàáâãäåæçèéêëìíîïðñòóôõö÷øùúûüýþÿĀ
which basically is a vertical application profile that does āĂăąĆćĊċČĎďĐđĒĖėĘęĚěĞğĠġĢģĪīĮįİõĶķĹĺĻļĽ
Figure 3. The Embedded IP Toolbox [6] “ZigBee Smart Energy Profile Specification,”
Version 2.0, ZigBee Alliance, to be published
Jari Arkko & Jan Höller
8 Ericsson Research 9
Oleksiy Mazhelis
S
tructurally, many mature business ecosystems When seen from the industry evolution perspective, examples. This can be contrasted with the situation a promising alternative to proprietary or prohibitively
can be described using a keystone model which the structure of an ecosystem often evolves over time, a few years ago when IoT technologies were mainly complex web protocols, they are just leaving the research
assumes that the ecosystem is dominated by a from a vertically integrated to a vertically disintegrated implemented as a part of industrial in-house solutions labs and making their way into the industrial products
major hub firm interacting with a large number of small or specialized structure. In the course of such vertical based on machine-to-machine communications and/or and solutions, while the protocol standardization has just
suppliers. The presence of the hubs makes the network disintegration/specialization, different stages of the embedded systems. been completed or is still being finalized. Therefore, the
robust to the removal of individual nodes, provided development, production, and marketing become the Second, the solutions available today rely on various competition is still upcoming between the traditional and
that the hubs are intact. By limiting and removing the responsibility of different firms, rather than being co-existing platforms, protocols, and interfaces, either proprietary solutions, on the one hand, and the new IETF-
number of players that would negatively affect the vertically integrated within the boundaries of a single firm. proprietary or standard. This indicates the lack of a de- based solutions, on the other hand, for the position of the
ecosystem, and by providing the remaining players with a In case of software ecosystems, this vertical facto standard, which makes inter-vendor interoperability new dominant design in future IoT applications.
foundation (software platforms, development tools, etc.) disintegration process iterates through five phases. In the challenging, and slows down the entry of new firms Certain factors may inhibit the evolution process.
to survive and succeed, the keystone player increases the first, the Innovation phase, the software development and new products in the IoT market. For instance, Among these are a small market size, a high degree of
stability, diversity, and productivity of the ecosystem as takes place in-house within the firms seeking competitive Z-Wave – a short-range wireless technology for home market regulation, a high degree of required customer-
a whole. advantage by automating core business processes. In the automation – represents a vertically integrated protocol specific tailoring, the need to coordinate innovation
Services and Applications presented on April 25 2013 at the 13th FRUCT conference
(www.fruct.org/conference13).
References
Another direction of the project work is development
Development Support: of services based on automatic detection of user’s
presence in the target IoT space. This is needed for broad [1] L. Xiao and Z. Wang, Internet of things: a
IoT applicability for mHealth deployment and acceptance by users of IoT solutions, as
all proactive services require information about user’s
new application for intelligent traffic monitoring
system, Journal of Networks, vol. 6, no. 6, pp.
I
n this study the IoT applications have been abstracted processing program and operational context allowing in 2010 IEEE Symposium on Computers and
by a dataflow network model. This model is well all other dependent agents and services to run without Communications (ISCC). IEEE, 2010, pp. 1041–
suited for obtaining meaningful information by downtime. We summarized a detailed description of the The presence detection is implemented using 1046.
efficient sensor data manipulation and refinement. For substitution mechanism and main scientific results in Innorange Footfall Technology (http://www.innorange.
simplicity we consider only unidirectional dataflows, i.e., paper [6] accepted for publication at ICC’13 WS–SCPA. fi/). The technology is based on the dedicated sensor (TP- [5] A. Vasilev, I. Paramonov, and S. Balandin,
where raw sensor data is refined into intermediate data, It is important to mention that the designed mechanism Link WDR3600 with the USB Bluetooth dongle), which Mechanism for robust dataflow operation on smart
which is passed over to the following levels and so on. As can be ported to other IoT platforms or even directly tracks MAC addresses of participants’ mobile devices. spaces, in Proceedings of the 12th Conference of
a result of orchestration of the sensor data, the model incorporated into the selected services. Every device produces mobile network traffic (within Open Innovations Association FRUCT and Seminar
is well suited for sensor data processing and creation of We prepared a demo case that illustrates the agent Wi-Fi or Bluetooth connection). Each traffic unit has on e-Travel. Oulu, Finland, November 5-9, 2012.
various adaptable services [1]. substitution mechanism. The first software demo system received signal strength indication (RSSI) value. The closer St.-Petersburg: SUAI, 2012, pp. 154–164.
Also the solution shall take into account that many controls the amount of light in a room. The system the device is located to the sensor the higher the RSSI
units of ubiquitous environment in IoT have limited consists of: value is. The traffic is continuously monitored. If the RSSI [6] Vasilev, I. Paramonov, S. Balandin, E.
power supply and use unreliable wireless channels. Thus value is greater than the threshold then the participant Dashkova, Y. Koucheryavy, Mechanism for Context-
a processing unit may become unavailable for a period of is treated as present in the room. The last presence time Aware Substitution of Smart-M3 Agents Based
time and temper the functionality of dependent services.
• Sensors that measure the amount of light inside is periodically recorded in the user profile (a part of the on Dataflow Network Model, IEEE International
and outside the room;
The architecture of IoT solutions and middleware should Smart Room space) and forms the user’s presence history Conference on Communications (ICC WS - SCPA),
Summary of the
Oulu Business School
merge at several levels. At the most profound level, the trends
affecting IoT businesses include, from the business perspective, Building networked IoT business
the digitalization of services and from the technical perspective,
State of the Art the cloudification of services. Broadly speaking, the analysis and
description of the business and physical domains, as well as the
model scenarios with a Delphi study
report, Extracts discussion of ecosystems and solutions, provides a background
for discussing business.
Business perspective > < Technical perspective The recent discourse on IoT has emphasized technology and different technology
• Ubiquitous – Moving –
layers. Currently, there is a pressing need for research of emerging IoT ecosystems
• Automotive – Health – Smart home –
Business Other
• Entertainment – Benefit – Utility –
Localized
• Real – Augmented – Virtual
Physical from a business perspective. Theoretical understanding and empirical research
domain • Energy dependent – Energy domain
Other
harvesting are needed on what IoT business models are and how they are connected to the
• Technology – Product – Solution
Ecosystem • Open - Closed
• Integrated - Disintegrated
System – Service
• Application – Infrastructure life-cycle
underlying ecosystem. We focus on this critical research gap by studying business
• Things – Smart phones – models in the IoT ecosystem context. We have constructed a framework for analyzing
Business • Value co-creation – Value co-capture Pads – Laptops – PCs – TVs Usage Figure 1.
model
Value co-opetition
• Business model conception
• Disposable - Updateable -
Durable model Business
different types of IoT business models. The research draws on service and business
• On-demand – Always on
Digitalization • Unidirectional – Bidirectional Cloudification perspective model literatures and an empirical research based on a Delphi study in the IoT
• Personal – Home/Company
p y–
of services
• Bundled
B dl d – Unbundled
U b dl d
• Commoditization - Diversification
Community – Public
of services and technical community. The Delphi method is a systematic, interactive method which relies on a
perspective panel of experts. The experts answer questionnaires in two or more rounds. Delphi is
based on an idea that forecasts or decisions from a structured group of individuals are
more accurate than those from unstructured groups.
New business models are
anticipated to be the main driving force
of an IoT ecosystem creation. The
objective of the business model analysis
is to gain insight into the processes that
have a role in the transformation of
existing IoT businesses and ecosystems
as well as in the emergence and creation
of new IoT businesses models and
ecosystems. The key to these processes
is in understanding the processes of
value creation and capture.
B
In order to analyze the business potential of the IoT
phenomenon within this project, business opportunities were ased on the literature review and the Delphi persuasions of the management related to economic,
approached via so-called Delphi study (see next article) and study we will look at our study results through competitive, and institutional logic of the firm. Boundary
interactive workshops in selected areas. theoretical frameworks classifying IoT business beliefs define the identity of the company with a certain
models developed by us [1, 2], and the managerial inter-organizational community. Product ontologies link
For instance, the workshops addressed three business cognition perspective towards business models developed product or service attributes, usage conditions, and buyer
14 15
Alex Shveykovskiy, University of Oulu
Building networked IoT... / Seppo Leminen, Mika Westerlund, Mervi Rajahonka and Riikka Siuruainen Pekka Eloranta
Table 1. Cases drawn from the 1st and 2nd Delphi rounds.
References
[1] Leminen, S., Westerlund, M., Rajahonka, M. & Siuruainen, R. Towards IOT ecosystems and business models. Figure 1.
S. Andreev et al. (Eds.): NEW2AN/ruSMART 2012, LNCS 7469, pp. 15--26. Springer-Verlag, Heidelberg (2012) The Pre-pilot User
The 5th conference on Internet of Things and Smart Spaces ruSMART 2012. August 27-28, 2012. St.-Petersburg, Interface
Russia http://rusmart.e-werest.org/2012.html (Conference proceedings) ISBN 978-3-642-32685 http://www.
springerlink.com/content/23005812265560x7/
T
[2] Leminen, S., Westerlund, M., Rajahonka, M & Siuruainen, R. Internet of Things – Opportunities for he ITS pilot corridor was originally planned to
Innovative Service Business Models. Abstract and presentation on 19th – 20th September 2012, Cambridge, be the "Hervannan valtaväylä"-road between the
Mika Westerlund
16 Carleton University, Sprott School of Business, Canada Pekka Eloranta, Mobisoft 17
Jarmo Salmela
O
wiki/Gamification ur work has focused on analyzing the health of
[4] Gartner Inc: Top Predictions for IT Organizations sensing platforms, which is crucial for realizing • In a multi-process system, when we know what
and Users, 2013 and Beyond: Balancing Economics, robust and efficient sensor data gathering and run-time or other information indicates suspicious
Risk, Opportunity and Innovation, Oct 2012 processing. or malicious activities but do not know what
F-Secure and the University of Helsinki have investigated applications are responsible for generating such
[5] Gartner Inc: Gartner Says by 2014, 80 Percent application of collaborative analysis techniques to device pieces of information, analysis of data collected
of Current Gamified Applications Will Fail to Meet health and security monitoring on smartphones. Such from multiple devices can be used to find that out.
Business Objectives Primarily Due to Poor Design, Nov methods of analysis can provide evidence that the platform A similar case is when relevant data values can not
2012 http://www.gartner.com/newsroom/id/2251015 and its processes are performing correctly or can help detect be obtained directly but can be efficiently computed
[6] Mikontalo tetris, 2007 http://www.youtube.com/ problems and threats. or estimated by correlating indirect observations.
watch?v=dS7TZ1RmJzE (video) The key idea is to transmit appropriate application and This is especially useful on closed platforms, where
context data from devices to a cloud platform for statistical information of many types can not be accessed
[7] Tierney, John: On a Hunt for What Makes Gamers analysis and data mining. The cloud backend can leverage without jailbreaking/unlocking of the devices. We are currently testing individual components and
Keep Gaming, NY Times, 6.12.2010. http://www. existing knowledge bases and information gathered from features of the prototype, and we expect to see it ready for
nytimes.com/2010/12/07/science/07tierney.html?_r=0 a large number of devices in order to identify suspicious or • When we do not have specific pointers to full-scale testing in the near future.
[8] Zichwerman and Cunningham: Gamification by harmful applications and activities. attacks and threats, we can try to detect those as To conclude, we will mention a number of challenges
design (O’Reilly 2011) The work has initially focused on smartphones as hubs anomalies. Since it is hard to know what normal and directions for future work.
and portals for the Internet of Things, but the models is if your view is restricted to a single device, Among the challenges, assessing the reliability of
[9] Wallace, Margaret, Rules of Engagement: 10 can be applied to other sensing systems such as smart collaborative analysis of data collected in a large the analysis results and the amount of data required for
Ways in Which Game Mechanics Are Changing watches and augmented reality devices. The techniques are number of devices comes to help. high-confidence decisions poses interesting mathematical
the World (Mindtrek conference, Tampere 2011), especially useful for sensing platforms that are capable of problems. On the data collecting side, ways of accessing
presentation http://www.margaretwallace.comhttp:// running multiple applications. Our first prototype, implemented by F-Secure Security and the quality of the data to be gathered may vary
www.margaretwallace.com , http://www.slideshare. The approach is inspired by the Carat project ( http:// Labs in collaboration with the NODES group of the significantly between releases and versions of the platform.
net/MargaretWallace/rules-of-engagement-how- carat.cs.berkeley.edu ), which debugs energy problems Department of Computer Science, University of Helsinki, When the gathered data are sparse or inaccurate, more
gamification-is-changing-the-world within a smartphone community. The Carat work showed demonstrates the first case above for the Android advanced analysis techniques will be required.
[11] Wikipedia, Gamification: http://en.wikipedia.org/ that it is feasible to detect anomalies in the energy platform. The high-level system architecture is simple, Thinking of possible future work, we can consider
wiki/Gamification consumption of individual applications in individual devices with the major components being: extending the technology to cover other popular mobile
through statistical analysis of data from multiple devices. platforms and to analyze various statistics of applications
Since the data about the energy consumption of • A light client that gathers and pre-processes for advising the user on their quality and reliability. More
A Risk-Driven Security Analysis and Metrics Security risks, objectives, and controls Security control 1:
1.1:
Confidentiality management
Encryption: Periodic dissemination of fresh keys
Development for WSN-MCN Router Table 1 lists some prioritized risks of the target system.
Risks with more probability and somewhat low severity
1.2
1.3
Tamper resistant nodes
Node concealment
were prioritized over risks with somewhat higher Security control 2: Integrity management
severity but low probability. The risk survey and analysis 2.1 Anomaly detection systems
This paper discusses security requirements and metrics development for a Wireless 2.2 Timeliness detection of data
is described in [1] in more detail. Figure 2 presents an 2.3 Originality of data
Sensor Networks (WSN) - Mobile Cellular Networks (MCN) based router used example of the deduction of Security Objectives (SOs) and
Security control 3: Access control
in IoT scenarios. A risk-driven security analysis is considered as a part of the Controls (SCs) from unauthorized access to system and/or 3.1 Identification and authentication
requirements analysis and security metrics development processes. data risk. The most important SOs and SCs in a large IoT 3.1.1 Pseudonym
network are listed in Table 2 and 3, respectively. 3.2 Authorization
3.3 Accountability
3.4 QoS classification
H
Prioritized risk 1: Unauthorized access to system and/or data 3.5 Host and network based intrusion detection
ere we consider an IoT system consisting of cases were divided into sequential steps in detail with the
1.1 Destruction of information or resources Security control 4: Congestion management
a Wireless Sensor Networks (WSN) - Mobile parallel and iterative definition of signal flow diagrams. 1.2 Corruption/ modification of information or resources 4.1 Congestion prevention
Cellular Networks (MCN) based router for a Each step identified the required generic and specific 1.3 Theft, loss or removal of information or resources 4.2 Congestion control
secure, energy efficient, and scalable wireless content functionalities that were grouped into main classes. All 1.4 Disclosure of information
1.5 Interruption of services Security control 5: Conceal the physical location of nodes
distribution and retrieval type communication. The the scenarios targeted massive-scale sensor networks. 5.1 Unvisibility/undetectability
network is composed of the MCN routers and a large Prioritized risk 2: DoS attacks 5.2 Secure location information
2.1 Congestions, crashes, radio jamming 5.3 Automatic and accurate location detection
amount of Central Processing Units (CPU), memory, and Network architecture 2.2 Traffic analysis attacks
energy-restricted sensor/actuator (S/A) devices, see Figure 2.3 Protocol deceive or violation attacks Security control 6: Secure routing
1. Mobile routers communicate with application servers It was noticed from our scenarios that very large-scale 2.4 Sybil attacks 6.1 Trust levels based on undirectional evidences
6.2 Data classification according to privacy levels
in the Internet and surrounding sensor network(s). Access sensor networks are characterized by correct content Prioritized risk 3: Exposure to physical attacks 6.3 Routing redundancy
to the sensor network opens up also an opportunity for distribution and delivery to external servers instead 3.1 Node capturing 6.4 Centralized update and delivery of routing tables
fraudulent misuse unless it is properly secured. Therefore, of end-to-end connections between sensor and server 3.2 Node injection 6.5 Location aware routing
3.3 Node tampering 6.6 Estimation of distances between nodes
a Risk Analysis (RA) was considered as a part of the hosts. In many cases information is location oriented 3.4 Location and/or topology changes 6.7 Random walk forwarding
requirements analysis and security metrics development but the required location information is usually given by 3.5 Generate a physical event monitored by the sensors 6.8 Fake packets
processes and it was carried out to identify security geographical or applications oriented coordinates instead Prioritized risk 4: Malicious resource consumption Security control 7: Tamper resistant nodes
threats, along with their severity and impact, and security of sensors addresses. Therefore, network architecture 7.1 Software version certification
Prioritized risk 5: System delays
objectives, and controls. should treat location dependent contents as a primitive 7.2 Digital rights management (DRM)
For the definition of requirements, different coupling of location and contents. However, it can, and Prioritized risk 6: Bogus denial of a transaction 7.3 Randomized clock signal for critical operations
application scenarios were formed. The scenarios it should, decouple location and identity, and retrieve Prioritized risk 7: Bogus transaction claims 7.4 Intrinsic self-test into the detector
7.5 Destruction of test circuitry
considered house automation, smart grid, environmental, contents, e.g., by location dependent name and apply Prioritized risk 8: High level of distribution
7.6 Restricted program counter
automotive, smart traffic, and eHealth applications. Each new approaches to routing named contents to improve 8.1 Remote management unable to see physical tampering
8.2 Remote management cause fragile network organization Security control 8: Secure computing
scenario was literally described as narrative descriptions scalability, security, and performance. In other words,
that were chopped to use cases and different actors, location dependent names enable us to use named data Security control 9: Chargeable connections
Table 1. Prioritized risks
preconditions and assumptions were identified. Use abstraction instead of named host abstraction. Security control 10: Network control message restrictions
Security control 11: Reputation information
11.1 Request reputation information
Security objective 1: Data protection; integrity, confidentiality, privacy 11.2 Provide reputation information
Security objective 2: Protection of network connections
2.1 Securing routing protocols Table 3. Security controls
Security objective 3: Authorized and fair access
• Activity A: RA phase 1 - RAphase 4 of RA and SO/SC specification. The fourth phase, RAphase 4, is done when the
Analysis, product is being verified.
• Activity B: Iterative decomposition of SOs/SCs,
• Activity C: Iterative planning, design, and use of the Activity B: SOs decomposition
measurement architecture,
• Activity D: Iterative feasibility survey, Activity B is divided into sub-activities:
• Activity E: Integration of QoS and performance • Actual SO decomposition,
metrics. • Association of the decomposition results with BMs,
DMs, infrastructure objects, and timing,
Anticipation of the effects of scalability requires special • Consideration of the effects of the scalabity on the
attention in the risk survey and analysis of IoT device frequency of the associated measurements,
metrics development and management process, see • Compensation of evidence gaps and biases.
Figure 3.
Base Measures (BMs) are abstract measurable properties
Activity A: Risk survey and risk analysis of the System under Investigation (SuI) whereas Derived
Measures (DMs) are a hierarchy of more detailed measures Figure 3.
The RA outcome is used to develop SOs, SCs, and to representing interpretation of the BM. IoT device metrics
choose between implementation alternatives. The choice Even though factors enabling security effectiveness development process.
of which issues are selected as main SOs depends on the (assurance that stated SOs are met) such as configuration
priority of risks and the criticality of other needs. Here, correctness and efficiency (assurance that adequate
the risk survey and analysis process consisted of iterative security effectiveness has been achieved) can be measured,
phases. The first phase, RAphase 1, is conducted during and it is not possible to achieve complete evidence of the Activity C: Measurement Architecture Acknowledgements
after the product usage scenarios and use cases definition. robustness of the solutions that are taken. In practice,
The second phase, RAphase 2, is performed during and after there are various gaps and biases between security Savola and Abie [2] define Measurement Architecture The research was conducted in the Internet of Things
the product functional requirements and device and effectiveness measurement objectives and the evidence (MA) as the collection of the technical and non-technical program of Tivit (Finnish Strategic Centre for Science,
network interfaces definitions whereas the third phase, offered by practical security correctness metrics which means to gather the data needed for security metrics use. Technology and Innovation in the field of ICT), funded by
RAphase 3, is performed during the product design and need to be compensated for MA planning should be started as early as possible during Tekes.
the metrics development. It can support various types of
measurement methods either automated or manual.
References
Activity D: Feasibility survey
[1] T.Frantti,H. Hietalahti and R.Savola,
Feasibility analysis is needed to answer especially the “Requirements of Secure WSN-MCN Edge Router”,
questions ‘Can I trust these security metrics?’ and ‘Does Proceedings of the IEEE International Conference
the use of these security metrics bring benefits?’. In on Information Networking (ICOIN 2013), pp. 210-
Savola, Frühwirth, Pietikäinen 2012, is introduced a 215, 28-30 January, Bangkok, 2013.
feasibility analysis method for security metrics, which is
based on the Feasibility Level (FL) requirements. [2] Savola and Abie 2010, “Development of
measurable security for a distributed messaging
Activity E: Integration of QoS and other system,” Int. Journal on Advances in Security, 2010,
metrics 2(4), 358–380.
E
stimates from different market analysts vary in Devices are connected to enterprise applications information and alarms is provided to the operator’s
terms of predicted figures - but they all agree through the EDCP and via the operator’s mobile network. network operation center.
that data usage will at least double every year For transparent IP connectivity, the GGSN supports
until 2015, when data will outweigh voice 30 times over. private IP networks, while the device access enabler grants Deployment architecture
These predictions are based on the concept that anything access to devices on the internet. The platform includes a
that benefits from being connected will be connected. service execution environment, which provides support Software as a service offered in a cloud style is a
Consumers are increasingly getting used to constantly functionality to enterprise applications, such as subscribe/ convenient and a cost-effective way to connect devices
connected devices, behavior patterns are changing and the notify communication scheme and location services. and applications. The cloud model uses pay-as-you-grow
value of connectivity for people, business and society is The policy and charging control block handles the characteristics, rapid elasticity of system resources and
becoming more and more evident. various settings for tailored subscriptions, such as ease of use. In the M2M arena there will be many different
More than 50 billion connected devices is a vision data capping and charging levels. Enforcement of the devices. Some will send and receive small amounts of data
where the convenience brought to people’s lives through parameters takes place in the GGSN and online charging infrequently, some will send small amounts often and
the use of mobile networks will be considered normal systems (OCS). The latter components also pre-rate others will send and receive large amounts of data often
and expected; a vast number of M2M interactions will and sort charging information – Call Detail Records or rarely. What M2M devices have in common, however,
constantly take place; and a myriad of new services (CDRs)- for each enterprise and operator. CDRs then are is that they could all benefit from the convenience of
will raise dependency on mobile networks and secure transferred to the operator’s billing system according to a re-using infrastructure nodes for M2M services such as
a massive number of connections. Devices will access Figure 1. desired control cycle. provisioning, connectivity, charging and policy.
mobile networks directly or through gateways. They will Device connectivity benefits people, business and society
communicate with each other, be part of an end-to-end
M2M system, as well as communicating with individuals Figure 2.
and central control systems. People will make use of Ericsson Device Connection
numerous everyday devices that benefit from M2M The fundamental features of such systems include: Platform architecture
connectivity at home, at work, on the move, remote
locations and elsewhere. The most obvious examples • support for IP connectivity over private networks,
include: washing machines, coffee makers, car keys, as well as over the internet;
ticket machines, fridges, window sensors, and utility
meters. In addition, mobile devices will be adapted to • efficient provisioning of a large number of
Figure 1.
Enabling Semantics for the Internet System
Architecture
of Things – Data representations and Fig. 1. System Architecture
energy consumptions
RDF N3 SenML EN the same data in a sensor system. As shown in Figure 1,
The development of Internet of Things (IoT) applications can be facilitated by encoding
this system consists of two sensors (based on Atmel's
the meaning of the data in the messages sent by IoT nodes, but the constrained Conceptual Graphs Y Y N Y
8-bit ATmega32 microcontroller) communicating with
resources of these nodes challenge the common Semantic Web solutions for doing this. Triplet Relations Y Y N Y Bluetooth and a knowledge processing component on a
Device Type Y Y Y Y PC. Sensor A encodes the different formats and sends
Data Types XSD XSD 4 types N them to Sensor B. Sensor B decodes these data formats
to formats compatible with a knowledge processing
I
External Semantics Y Y Y Y
nternet of Things (IoT) is expected to bring the measurement made by an IoT device with RDF, is denoting component. As a result, the knowledge system can reason
Internet truly into our everyday lives by connecting the IoT device as the subject, the measured quantity as additional knowledge and actions based on the data
Table 1. Data format comparison
a vast amount of devices and objects (the so-called the property, and the measured value as the object. For generated by IoT nodes.
things) to the Internet. All these things will communicate example, "Sensor 1" is the subject, "Temperature" is the Figure 2 presents energy consumption comparison
with other peers and servers in the Internet. The resulting property, and "25" is the value. The unit of measurement on sensor A. Generating SenML/EXI messages requires
uniform access to things will introduce significant can be defined separately. more computing energy than other alternatives, but
Energy efficiency
possibilities for IoT applications. However, these formats are designed to be used by transmission energy consumption for SenML/EXI is
Even more can be achieved if semantics is included in Web applications; hence resource usage was not the main Energy consumption is a key issue for IoT nodes. Hence, among the lowest ones. When comparing overall energy
the information produced by the IoT nodes. Semantics issue in their development. SenML and Entity Notation when semantics is added into IoT, energy-efficiency is a consumption, SenML/EXI requires more energy than
enables machine-interpretable and self-descriptive (EN) [1] are targeted for resource-constrained devices. A key criterion for comparing alternative solutions. Energy the two times longer SenML/JSON and SenML/XML
data and facilitates information integration and share, SenML description carries a single base object consisting consumption together with other limited resources is one messages. The short EN format requires the least energy
and inference for new knowledge. However, since IoT of attributes and an array of entries. Each entry, in turn, of the key drivers in wireless sensor network research. and other alternatives consume at least double that
nodes are often small devices with modest computing, consists of attributes such as a unique identifier for the For example, it is reported in [2] that communication is amount. Generating short EN messages only consumes
communication, memory and energy resources, they sensor, the time the measurement was made, and the over 1,000 times more expensive in terms of energy than about 35% of generating RDF/XML messages, which
introduce challenges not present in the common scenarios current value. SenML can be represented in JSON, XML performing a trivial aggregation operation. However, consume the largest amount of energy. But on the other
of Semantic Web. Hence, the main challenge is to add and Efficient XML Interchange (EXI) formats. The SenML widely cited surveys [3, 4] do not have any explicit hand, the receiver of the short EN messages needs
semantics without breaking the constraints on resource format can be extended with further semantic custom discussion on adding semantics to the data. It seems one more step (on sensor B or PC) to extend the short
usage. In this article, we study how to enable richer attributes. For example, the Resource Type attribute can that integrating sensors into Semantic Web has not yet EN packet into a complete EN packet that is directly
semantics for IoT data, and evaluate different approaches be used to define the meaning of a resource. EN is another attracted the attention of researchers. comparable with RDF and N3.
with energy efficiency with a simple sensor system. Our lightweight data format that supports Semantic Web We measured the energy consumptions of encoding
sensor node measures acceleration and magnetic field, technologies. EN has been designed to be compatible with and decoding for different semantic data formats of
both in three dimensions, and temperature as well. This RDF and OWL and it has almost equal expressivity as RDF
kind of sensors could be widely deployed in the IoT and N3 on the data exchange level. Its compact format
smart environments. We focus on different data formats can only include a UUID and some variables (for example,
enabling semantics, rather than protocols, architectures or sensor measurements, etc. are variables in EN). 1800
ontologies in this paper. We compare the semantic expressivity of RDF, N3, Figure 2.
SenML and EN in Table 1. RDF, N3 and EN can be mapped 1600 Energy consumption
comparison on Sensor A
Data formats to conceptual graphs straightforwardly, as they all have
Discussion
Ontology Alignment for Interoperability on the Iot
We are studying the best ways to add semantics to IoT
data. Even this simple experiment illustrates how big a The Internet of Things is coming, but it needs a as the deployed applications. These descriptions are
difference a data format can make in energy consumption. semantic backbone to flourish. Some 50 billion based on an IoT ontology we developed, which is the
One interesting potential scenario for our future work devices are expected to be connected to the Internet extension of W3C Semantic Sensor Network (SSN)
is a gateway receiving data from several similar sensors, by 2020, making interoperability a major concern. ontology, which is, in turn, based on DUL (DOLCE
aggregating the data values, and sending the resulting data Ultra Light) upper ontology. The IoT ontology only
Most of these devices will be deployed for industrial
forward. provides vocabulary related to generic sensing/
and public infrastructure domains, where a need for
Many other factors have an effect on energy actuating, while for any domain-specific concepts
consumption, but we will mainly focus on data formats the emergence of standardized domain models, i.e. some custom classes are to be used and can be freely
supporting semantics; on their expressivity and resource ontologies, is well recognised. We believe, however, defined. For match-making of sensors/actuators
consumption. The other factors include the header lengths that in the customer segment of IoT that comprises and applications, an application’s requirements are
of the protocols, messaging patterns and architecture. In smart homes, smart offices, connected vehicles, and expressed as SPARQL query patterns. Similarly to
addition, the meaning encoded in the messages needs to be similar, creation of standard ontologies is much semantic descriptions of things and devices, these
shared by all entities producing and consuming the data. more challenging but also less beneficial. Therefore patterns are defined using our IoT ontology plus
That is, ontologies are needed. Moreover, as IoT systems will we investigate how IoT environments can function some custom classes for domain-specific concepts.
produce large amounts of data, reasoning techniques that with the help of ontology alignment solutions that An ontology alignment solution is then applied to
scale and infer useful information in a reasonable amount discover the mappings between the concepts from two find the mappings between the custom classes used
of time are called for. These reasoning techniques need to be in device descriptions and application patterns.
alternative domain models in an automated fashion.
deployable into devices with varying computing resources. The same ontology alignment solution is also
utilized for the second, a more complex, alignment
Acknowledgment task that is the automated transformation of data
O
ur work is motivated by a vision of the Internet formats used by an application and a sensor/actuator.
This work was funded by the Internet of Things (IoT) of Things where 3rd-party software application Figure 2 depicts the related workflow.
program funded by TIVIT and Tekes. We also would like to development for IoT environments like smart The semantic descriptions of both the device
thank HPY Research Foundation and Tauno Tönning Säätiö homes is as easy and as popular as the development of and the application have to include examples for all
for funding. The majority of Janne Haverinen's work was applications for smartphones nowadays. One barrier is a relevant query and response messages, which can be
done when he was working at University of Oulu. All of big number of various and non-interoperable IoT platforms, e.g. XML, JSON, or complex URIs. From an analysis
Johanna Nieminen's work was done when she was working and too small a market penetration of each. We aim at a of these example messages, OWL ontology models Figure 1. Deploying an application to two IoT platforms
at Nokia Research Center, Helsinki. solution, therefore, which enables developing applications for the device and the application are generated and
that are generic in the sense of being able to communicate heuristically refined. These ontology models are
with sensors and to control actuators connected to the then fed into the ontology alignment solution to discover for it, i.e. to extend the range of applications available to
References Internet through different platforms. This is in contrast to the concept mappings. Finally, these mappings are used in their customers. Alternatively, SSGF can be delivered by
the present restriction of always developing an application the run-time by the message translator component of the an independent party as a service, resulting in a novel
[1] X. Su, J. Riekki and J. Haverinen, Entity Notation: for a very particular IoT platform. smart proxy to provide two-way communication message “interoperability-as-a-service” paradigm. Practically, this
enabling knowledge representations for resource- Figure 1, depicting our prototype system setup, transformation between the application and the devices. means operating a scalable web portal where the end-users
constrained sensors, Personal and Ubiquitous exemplifies this concept. Assume one user has a ThereGate SSGF facilitates automated deployment of generic and can register their things and devices, as well as deploy
Computing, volume 16 issue 7, Oct. 2012 pp 819-834. gateway and a Z-wave contact sensor, while another legacy IoT software in environments where heterogeneous application descriptions from app stores. The data traffic
[2] V. Cantoni , L. Lombardi, P. Lombardi , Challenges user has a Texas Instruments USB dongle and a ZigBee devices also have been deployed. SSGF functionality can between applications and end-users’ devices will also go
for Data Mining in Distributed Sensor Networks, 18th contact sensor. Each platform defines its own format for be implemented by an IoT platform provider to enable through this web portal.
International Conference on Pattern Recognition queries and its own way of describing door open/close their platform to run applications not originally designed
S
ensor networks are able to perform persistent a ubiquitous application connectivity. Therefore, in favor can remotely switch the application from one to another By combining three types of physical measurement, a
environmental, structural and object monitoring of its common XML data representation and pervasive by sending a specific message “app = app id”. There is button user interface, eight tricolor LEDs and three types
which greatly enhances our situational awareness instant messaging and presence service, we selected XMPP no hassle to reprogram the sensor node or the gateway. of comparator, we can define several event triggers for a
in real time. By combining sensor networks with social as the basis to develop an end-to-end (E2E) solution To create a new application, the user just needs to add few useful applications.
networks, we can build a strong link between the enabling twoway communication between wireless sensor new processing logics with associated measurements
environment and public. As a result, a tight integration nodes and XMPP instant messaging clients. Driven by in the rulebook and re-launch the XMPP sensor bot at Demos
of physical world and virtual cyberspace will improve our large-scale application scenarios, existing works e.g., the gateway. Our solution simplifies sensor application
daily activities and reduce the negative impact on the [5] on applying XMPP on sensor networks are rather development and exhibits flexibility in application Figure 2 presents four use cases to demonstrate the
environment. complicated. Moreover, most sensor applications require deployment. Our contribution makes it easier to integrate functionality of our prototype and flexibility of the design.
There are a number of methods to bridge the gap re-programming of the sensor nodes for different use application knowledge on a generic sensor device without These demos are door bell, coffee maker monitor, toilet
between sensor networks and social networks, such as cases. These two drawbacks limit the flexibility of sensor demanding programming skills. status monitor, and senior fall detector.
the Internet of Things (IoT) [1] and the Web of Things application development, especially for stand-alone use The first demo door bell implements two-way wireless
(WoT) [2]. An extensive study on the integration of cases which do not require large scalability. For daily use, Flexible XMPP Sensor Bot communication between a visitor and the host. When
sensors and social networks is provided in [3]. In our people may switch multiple applications through versatile the visitor presses the left button, the SunSPOT sensor
research paper [4], we identified two critical elements functionality of a generic sensor platform, similar to the Figure 1 illustrates our XMPP-based architecture node transmits an event signal to the XMPP sensor bot
to boost the integration of sensor networks into the way we use many apps on our smartphones. integrated with sensor networks. On the right side of the program which sends a notification message to the host
Internet, namely a uniform communication language and figure, our solution extensively leverages existing XMPP Jabber client via instant messaging service. The host could
networks and services. On the left side, we implemented reply his status in three options: busy, free, or wait. A busy
two Java programs for data acquisition and measurement reply blinks all LEDs on the SunSPOT in red. A free reply
processing logics. One program is a sensor client on the sets LEDs to green and a wait reply sets LEDs to orange.
wireless sensor node (SunSPOT) and the other program This interaction improves the host responsiveness and
is a host (XMPP sensor bot) running on a gateway which also shows the number of visitors within a certain time.
is connected to other XMPP servers on the Internet. The second demo uses light and temperature sensors
All messages are encoded in a uniform XML format. To on SunSPOT to infer if there is a fresh pot of coffee on the
save energy and memory space on the wireless sensor coffee maker. The measurement processing logic defined
T
Software. Springer, 2012.
he connectivity to Internet architecture is one also be in “sleep” mode even long periods to save battery,
Our prototype with four demos exhibits great flexibility [5] A. Rowe, M. E. Berges, G. Bhatia, E. Goldman, of the key elements for the Internet of Things. which makes especially the real-time communication and
to combine sensor networks with social networks by using R. Rajkumar, J. H. Garrett, J. M. F. Moura, and L. The Things are usually small and very restricted system management challenging.
XMPP. We believe the sensor technology would benefit Soibelman, “Sensor andrew: Largescale campus-wide devices, having constraints in communication, energy and These different restrictions also dictate what kind
our daily life in a variety of applications. For future work, sensing and actuation,” IBM Journal of Research processing. From the connectivity point of view the devices of functionalities can be implemented for devices and
we plan to measure energy consumption and information and Development, vol. 55, 2011. may also form different kinds of network topologies from system. One of the key components of the network
throughput of each demo case for performance evaluation. ad hoc communication to centralized star-like network system is a gateway, which enables the interconnection
topologies depending on for what purpose the devices between different networks using different communication
are used and on possible environmental restrictions. For protocols. In order to provide end-to-end connectivity in
example, in wireless sensor network (WSN) the radio IoT, i.e., the information delivery from sensors up to the
technology used can restrict the coverage area and in order users, gateways are often needed. One of the challenges is
Pin Nie, Patrik Nisen and Jukka K. Nurminen to provide the connectivity for all the devices, some of to find the basic/minimum set of functionalities for the
Aalto University, School of Science Department of them need to route and forward information from others, gateway device based on the application scenario where it
34 Computer Science and Engineering thus forming a mesh network topology. The devices may is used, and to be able to further enhance the system with 35
Networking small devices... / Huusko, Majanen, Melen, Keränen, Sonntag, Khattak, Silverajan
way to integrate different standard and non-standard to improve the available bandwidth and the coverage was
information sources and to enable system-wide decision studied. Early analysis shows that it is possible to raise
making. The DDE consists of 3 functional entities coverage and thus availability in a cellular network with
communicating in a publish-subscribe manner: Producers multipath. However, the bandwidth seems not to increase
that produce the data, Consumers that do something with as well as one could assume. Two radio interfaces that
the data, and EventCaches that manage the data and the generally give 10 Mbps each rarely gave more than 15
communication between Producers and Consumers. The Mbps aggregated, with the averages only little bit over 10
EventCaches can be further cascaded and communicate Mbps. However, the multipath increased the time when a
with each other through the network, acting as a decision several megabits connection was achieved.
making agent in the network. In the demonstration DDE
was used as a proxy/gateway, transforming the analog Conclusions
sensor data to IP/UDP/CoAP packets. The temperature
and illumination sensors were used as data Producers and One of the major challenges for IoT and machine-to-
DDE EventCache on the sensor proxy node (see Figure machine communication is the connectivity of constrained
2 lower left corner) collected the data from the sensors. devices to IP networks. In this article we gave an overview
Finally the Consumer forwarded the data to the CoAP of the networking research done in the TiViT Internet of
Figure 2. gateway/server using the CoAP protocol. Things SHOK program during the first year for tackling
Demonstration scheme Using a multipath protocol for connecting the this challenge. The work was focused on Representational
gateway to the Internet service was also studied and State Transfer (REST) based Constrained Application
demonstrated (see Figure 2 right-hand side). As seen in Protocol (CoAP) web transfer protocol to arrange the
new functionalities in a modular way if the application functionality development. The main components other implementations, the sensor devices are assumed end-to-end connectivity of constrained sensor nodes and
and the use of the device changes. In Figure 1 we illustrate which were developed and demonstrated were the to connect with a low energy protocol to the gateway services. Since the majority of current sensor devices does
some of the basic functionalities for the gateway. gateway and proxy solutions enabling the seamless and then the connection from the gateway is made with not support networking protocols such as IP (Internet
Due to the fact that nowadays almost all the end-user integration of sensor devices with web, 6LowPAN multi- multipath TCP (MPTCP). The benefits of multipath are Protocol) and UDP (User Datagram Protocol), the project
services and network communications are IP-based, the hop capabilities, IPv6 to IPv4 interoperability in CoAP increased availability, bandwidth and mobility. Many IoT also defined, developed and demonstrated solutions for a
raw sensor data needs to be encapsulated into IPv4/IPv6 communications, Complex Event Processing and event devices are deployed in a mobile fashion, e.g. with users, CoAP gateway to be used with energy-optimized protocols
and either UDP or TCP protocol format to be effectively management support, and multipath connectivity. The trucks, ships, containers and automobiles. Most of these and sleepy devices as well as improved the communication
used in Internet and e.g. with web services. In addition, Figure 2 illustrates our demonstration scheme, including devices will connect to the Internet through a cellular between the CoAP gateway and end-user applications.
since the sensor devices are usually resource restricted the gateways, decision making and end-user connectivity network. The multipath using several cellular connections
and cannot include the same functionalities as more enhancements.
powerful devices, the CoAP protocol was introduced to For providing sensor information from the
enable web integration for sensors. CoAP is based on constrained devices to the web, an implementation of
the REST architecture model similar to for example the the CoAP protocol and necessary functionality to read
current World Wide Web. It operates on top of a UDP/ and send values on embedded devices was developed.
IP protocol stack, utilizes the request/respond model and The implementation can be run with just a few kilobytes
HTTP-like messaging methods, and follows a server-client of memory so it is suitable for even many of the most
architecture including definitions for e.g. different types constrained devices. A less constrained implementation
of proxies. of the CoAP protocol was used on the gateway side (see
In the CoAP system especially for machine-to- Figure 2 top middle). The gateway works as a resource
machine and IoT communications, the so-called resource directory and a mirror proxy that is capable of storing
directories and proxies have a central role. The resource both pointers to the resources and also the values when
directory is an entity that is able to store the location of needed. The gateway implementation can provide the
resources, such as temperature data provided by a sensor, information both with CoAP and HTTP for simple
and further provide it e.g. for end-user or web services. integration with web services.
Internet of Things
transport due to the following reasons.
As TCP [4, 1] is still the dominant transport protocol
in the Internet, an IoT device with TCP/IP stack can
easily be connected to the Internet. Most of the transport
While traditional networks like the Internet and cellular networks are engineered protocols for WSN are specifically designed for a particular
networks, Internet of Things (IoT) are self-engineered networks in the sense that
nodes that are randomly scattered in a given geographical region function as a
kind of data or reliability mechanism needed, cannot be
directly connected to the Internet without a protocol
TCP based solutions
computer network in cooperating to solve a particular task. IoT typically have converter or a proxy on an intermediary gateway. The are viable for
deployment of proxies always brings scaling problems.
limited resources in terms of computation, communication, radio and battery life. Most of the transport protocols for WSN in some transport in IoT.
As off-the-shelf items they are inexpensive, small in size and prone to failures in way or other implement many features of TCP protocol,
their operating environment. As IoT are deployed in a range of applications from for example, many WSN transport protocols use TCP
real-time tracking to ubiquitous computing, they need to perform increasingly mechanisms such as initial handshake, ACKs, congestion
detection by dupacks or timeout, AIMD rate adaptation
complex tasks in a reliable and efficient manner. A key to the operation of the IoT etc. So instead of reinventing the wheel, adapting TCP to
is the protocols designed for their use which should be simple, scalable, robust and the IoT environment may be a better design choice for the
efficient in making near-optimal use of resources, energy efficient, easy to maintain IoT transport.
and deploy and also customizable to the need of the applications. To have a low memory footprint, it is possible to
simplify/remove parts of the TCP implementation that are
not essential based on the requirements of the transport References
and the data type used in a specific IoT environment.
I
n this article, we focus on the analysis of transport The other data transfer scenarios include continuous TCP implementations with a low memory foot print
[1] Allman, M., Paxson, V., and Blanton, E. (2009).
protocols for IoT. A transport protocol is needed in data flow from the sensors to the sink, large data such as uIP, lwIP [2] are already available as open source
TCP Congestion Control. Internet RFCs, ISSN
IoT/ wireless sensor networks (WSN) for reliable files are being transferred in a bursty manner, and and are implemented and tested in operating systems
2070-1721, RFC 5681.
data delivery that applications may require and to reprogramming the sensor nodes or software updates. In like Contiki [3] which is an operating system for many
provide congestion control to regulate the data flow that the above scenarios TCP-like reliability and congestion microcontrollers and low-power embedded devices.
[2] Dunkels, A. (2003). Full tcp/ip for 8-bit
applications may send to the network and also to achieve control mechanisms are needed. It is preferred to have The proposed TCP for IoT may have the following
architectures. In Proceedings of the 1st
some sort of fairness in sharing the scarce network modifications only on the sender side (in IoT) than at the features. As the IoT packets are quite small, including TCP
international conference on Mobile systems,
resources. sink node. header compression could reduce the overhead due to the
applications and services, MobiSys ’03, pages
Cross-layer assisted transport: The IoT transport TCP header.
85–98.
Requirements for the Transport Protocol would be able to use the crosslayer information regarding In IoT scenarios where data transfer is either push
for IoT the link layer / physical layer status to enhance the mode or request-reply, we configure TCP similar to
[3] Dunkels, A., Grönvall, B., and Voigt, T. (2004).
congestion control mechanisms. the stop and wait protocol. Packet loss can be detected
Contiki - a Lightweight and Flexible Operating
Broadly speaking, IoT can be regarded as WSN that is Energy efficient: The IoT transport should be energy by retransmission timeout and we go for the simplest
System for Tiny Networked Sensors. In Proceedings
connected to the Internet. The transport protocol design efficient as the IoT devices usually run on batteries congestion control mechanism of retransmission timeout
of the First IEEE Workshop on Embedded
for WSN is an active area of research and there is a vast Scalability: The IoT transport protocol should scale and back-off. In bulk transfer of data between IoT and
Networked Sensors (Emnets-I).
literature on the topic. Based on our study on transport as the number of IoT connected to the Internet can be sink, standard TCP sliding window mechanisms and
protocols for the WSN, we came up with the following very large, congestion control can be used. Other minor changes such
[4] Postel, J. (1981). Transmission Control
requirements for the IoT transport. Low memory footprint: As the IoT have limited as TCP SACK-related adjustments, RTO adjustments, etc
Protocol. Internet RFCs, ISSN 2070-1721, RFC 793.
C V
ontent-Centric Networking (CCN) is a new isions of a future with billions of connected Longer cycles mean fewer cycles in total and less time when 3GPP working groups are discussing the possible future
networking architecture that addresses content devices have been made and this connectivity will the receiver chain needs to be on, ultimately resulting in alternatives at the moment.
by name instead of location. It has no notion of be provided by a variety of current and future lower energy consumption.
hostnames and data is published with names describing communication technologies. The different traffic patterns Thus, by giving up on the responsiveness of M2M Security
the data. The essence of named content is that data and different requirements of various M2M applications devices, the energy consumption can be reduced
is requested based on the actual content instead of will pose some challenges for these technologies, including significantly. Our results indicate that extending the Generic Bootstrapping Architecture (GBA) is a security
where the content is stored. CCN also provides in- LTE. In the Finnish IoT SRA we have been studying some maximum DRX cycle to around two minutes would yield solution standardized by 3GPP. It extends the security
network short-term storage for content while it is being of the issues and solutions for supporting wide-scale notable gains, after which the relative gain is not as large infrastructure of cellular networks to the Internet.
disseminated in the network. For long-term storage, adoption of LTE for M2M applications. when compared to the current maximum. Further, just GBA provides a secure and flexible user authentication
separate repositories can be deployed in the network. As a cellular technology, LTE has desirable extending the data sending periodicity does not give mechanism for application services. The cellular operator
We see that the Internet of things field can characteristics for M2M communications. The deployment notable benefits after a certain point. Instead, the energy is responsible for establishing a shared secret between the
benefit from the Content-Centric architecture of new devices using LTE radio is easy from a connectivity consumption during sleeping times, in our model consisting user Subscriber Identity Module (SIM) and the network
because of various reasons. First of all, it provides a point-of-view and the coverage and deployment of base power consumption and the coarse granularity service (such as Google, Facebook etc.) being accessed by
higher abstraction level between the sensors and the possibilities are superior compared to those of short- clock, is a key parameter whose optimization would yield the user. It essentially provides a login service to network
user application. It is irrelevant to know where the range technologies. Also, 3GPP has an established even greater savings. services with SIM cards. This authentication mechanism
requested sensor data comes from as long as it can be security architecture which can be used to secure the From a radio resource point-of-view, the device can be has the additional advantage of not requiring any user
addressed with a unique name and we can verify its communication between the M2M entities. either in idle or connected state. DRX can be used in both enrollment phase.
authenticity and freshness. Secondly, sensor devices Some future challenges include making the LTE radio of these states, thus the cycle length in both could also be In the past, we had implemented a GBA prototype for
can benefit from the in-network storage. Short- technology and procedures energy efficient from the user increased for longer energy saving opportunities. Keeping browsers in iPhones and iPads. The prototype allowed a
term storage is similar to caching, which reduces equipment (UE) point-of-view and how to enable efficient the M2M device in the connected state would have the cloud administrator to log into the cloud framework for
workload on sensor devices that are used by several usage of resources in scenarios with a large number of benefit of a reduced number of signaling messages needed management and administrative tasks. This login was
user applications. On the other hand the repositories M2M devices. Based on the above, our work in the IoT for transmitting the data. However, in the current networks secured with strong SIM credentials stored in the iPhone/
designed for long-term storage can be used to store the SRA so far has focused on LTE radio energy consumption, and implementations, the UEs are dropped to the idle state iPad SIM card.
historical data of a sensor. signaling reduction and on 3GPP security mechanisms. when they are not actively participating in data transmission. In the IoT SRA project, our goal was to investigate if
Finally, the content naming scheme can be 3GPP is studying the possible implications of extended the same technologies and standards can be reused "as
IEEE 802.11ah: Promising Technology spaced by 31.25 kHz. The modulations supported include
BPSK, QPSK and 16/64/256 QAM. It will support multi-user
MIMO and single-user beam forming. The STAs will support
for IoT and M2M Applications the reception of 1 MHz and 2 MHz PHY transmissions
modes. The channelization (i.e. operating frequency)
The rapid developments of the Internet-of- depends on the region. In Europe, for example, it will be
within 863-868 MHz, allowing either five 1 MHz channels or
Things (IoT) and Machine-to-Machine (M2M) two 2 MHz channels [2].
applications stimulate for the design of a new The baseline of the MAC layer in IEEE 802.11ah is using
radio interface that can satisfy the conflicting the conventional contention scheme based on carrier sense
requirements of these applications, including multiple access with collision avoidance mechanism (CSMA/
small-size, infrequent traffic, energy efficiency, CA) which is the basic access mechanism in WLAN systems.
large device populations and long transmission Some improvements of the MAC layer are also expected.
Improvement of the IEEE 802.11ah MAC will allow longer
ranges. Our aim here is to show the feasibility
sleeping time. In IEEE 802.11ah, as we target higher energy
of IEEE 802.11ah technology for M2M and IoT efficient applications, the time that STA can take in sleeping Figure 2. IEEE 802.11ah maximum achievable data rate for
applications and identify the main challenges. Figure 1. mode is more flexible and can be relatively long, up to variable range in outdoor channels and 4096 bytes packet size case
IEEE 802.11ah many days. Enhancements to the power save poll (PS-Poll) for a different link reliability.
main use cases.
Introduction scheme are investigated. Additionally, new Traffic Indication
Map (TIM) coding to support a large number of devices is
An emerging technology based on the IEEE 802.11 standard To address these challenges, the emerging IEEE considered. Furthermore, a grouping scheme will be used,
family is currently being developed and standardized, under 802.11ah specifications are proposing a number of where a limited set of STAs will be allowed to contend at
the IEEE 802.11ah group, and aims to define improved PHY improvements and new features. the same time, hence reducing the collision probability.
and MAC layers that are properly adapted to M2M and IoT Additional MAC features are also being considered as the
application scenarios. Why IEEE 802.11ah technology? specification is evolving.
One of the main targets of this standard is to ensure
transmission ranges up to 1 km and data rates per user Recently, a new amendment, IEEE 802.11ah [2] has been IEEE 802.11ah feasibility study
larger than100 kbps. The standard is currently being developed with the aim to fulfill the stringent M2M and
drafted, but some essential details are already available. IoT requirements, while at the same time not significantly In the following we show the performance of the IEEE
The MAC layer, for example, will include a power saving degrading user experience when coexisting with older 802.11ah technology and investigate how it will impact the
mechanism and an enhanced approach to perform channel IEEE 802.11 releases at sub-1-GHz. The development of M2M deployments by studying the achievable data rate,
access, which will allow the access point to support this emerging technology is still at its early stages and energy efficiency and device population. Further details can
thousands of stations. The technology is very promising the respective standardization committee is currently in be found in [4].
and can be deployed in many use cases like sensor the process of collecting system design proposals. The In Fig. 2 we show the maximum achievable data rate for
networks and smart grid applications. Additional use cases complete standard is expected to be finalized by the year variable range in outdoor channels and 4096 bytes packet size
considered by IEEE 802.11ah are shown in Fig.1. 2014. Meanwhile, the motivating goal is to enhance the case for variable link reliability when BPSK and 2 MHz mode
In the following we will discuss the main challenges and design of the PHY and MAC layers of the state-of-the-art are used. As can be seen the target data rate of 100 kbps can Figure 3. Energy consumption and time distribution of STA power
requirements of M2M and IoT applications. Then, we study IEEE 802.11ac [3] technology such that it could efficiently be served at a range of 1 km for a link reliability of 60%. states for 256 bits and 1000 bits packet size cases with a traffic
the IEEE 802.11ah features and show how this technology operate at the unlicensed sub-1-GHz bands. In Fig. 3 we show the Energy consumption and time model of a mean message inter-arrival time of 30s.
can be used efficiently to satisfy the above challenges and Due to lower center frequencies, the lower path loss at distribution of STA power states for 256 bits and 1000 bits
requirements. sub-1-GHz provides longer distances when compared to packet size cases with a traffic model of a mean message
typical WLAN frequencies around 2.4 GHz and 5 GHz. Also, inter-arrival time of 30s with exponential distribution (the References
Laturi
Latu
Laturi 2
Laturi
Laturi
LaturiLaturi
Laturi
Laturi Laturi
Laturi
L
Laturi
Laturi 2
2 2
Laturi
Laturi
Laturi 2 Laturi
Laturi
22 Laturi
i 2
2 2
Laturi
www.iot.fi