IEEE Press
445 Hoes Lane
Piscataway, NJ 08854

IEEE Press Editorial Board

Ekram Hossain, Editor in Chief

Giancarlo Fortino Andreas Molisch Linda Shafer
David Alan Grier Saeid Nahavandi Mohammad Shahidehpour
Donald Heirman Ray Perez Sarah Spurgeon
Xiaoou Li Jeffrey Reed Ahmet Murat Tekalp

Internet of Things A to Z

Technologies and Applications

Edited by Qusay F. Hassan

Wiley Logo

Preface

Information and communication technology (ICT) has always been dynamic and evolutionary in nature, leading to the continuous emergence of new technologies and business models. The recent advances in terms of available computing resources, software systems and communication networks, and the continuing miniaturization of hardware components have made it possible to integrate ICT into virtually anything, thus leading to the rise of a new computing paradigm known as the Internet of Things (IoT). The IoT aims at realizing an old dream of turning everyday objects into smart ones that are interconnected via the Internet and able to collect and exchange data and to make decisions autonomously. This additional “smartness” covers both the communication infrastructure and applications, including monitoring systems, industrial automation, and ultimately smart cities. In a recent report, Gartner estimates that there will be 11.2 billion connected devices in use in 2018 and 20.1 billion in 2020. 1 This clearly demonstrates the great potential and importance of this model and is also the motivation behind this book.

The potential of IoT is great and the possible applications of this model are countless. Therefore, uncovering the ins and outs of the IoT is crucial to both technology and business communities. This book seeks to provide a holistic coverage of the IoT model by presenting its principles, enabling technologies, and some of its numerous application domains. Important aspects such as the need for standardization, as well as security issues are also highlighted. The book also presents two sample applications showcasing how the discussed concepts and technologies can be leveraged and put to practical use to solve some real-world problems.

The book is a cohesive material that is composed of 21 chapters authored by several internationally renowned researchers and industry experts. Each chapter focuses on a specific subject and also provides the reader with the necessary background information, thus improving understandability and encouraging the reader to think further.

The book may be used as a textbook for both undergraduate and graduate students. It also comes in handy as a reference for researchers and IT professionals who are interested in IoT concepts, technologies, and possible applications. I hope the readers will enjoy reading this book as much as I enjoyed reviewing and editing the submissions.

Organization of the Book

The book is organized in a way that helps the reader to first grasp the concepts and then learn about key enabling technologies before moving to some potential applications. Although I would advise to read the entire book, most chapters are self-contained allowing the reader to focus on the topics they are interested in. Cross references between chapters are provided to help the reader to navigate between them.

This book is divided into five parts, each of which is devoted to a distinctive area.

Part I: Concepts and Perspectives

This part is composed of two chapters that cover the core concepts underlying the IoT, as well as its evolution and impacts.

Chapter 1 provides an introductory overview of the IoT, including its core conceptual ideas. The chapter also covers closely related concepts and paradigms, as well as a list of initiatives and organizations that contribute to their further development. In addition, the chapter structures the broad range of technical as well nontechnical aspects by presenting a four-layer framework that addresses the IoT's enabling technologies, derived qualities of modern ICT and how they are supporting the IoT, potential for new innovations based on the IoT ecosystem, and finally IoT implications and challenges.

Chapter 2 explores some very important aspects that are usually ignored or forgotten when talking about IoT. Specifically, the chapter addresses issues like the heterogeneity of objects utilized as well as the diversity of environments within which IoT systems run, how time is critical to IoT systems in terms of development and support, people involved in the IoT ecosystem, and new security challenges the IoT poses. It also looks at big data, and both the technical and the moral challenges that result from the adoption of such intelligent objects.

Part II: Enablers

This part comprises five chapters about various IoT enabling technologies that range from hardware items and communication technologies to data processing and storage to the emerging standards.

Chapter 3 gives a general overview of various enabling technologies of the IoT. The discussion of these technologies is based on their application and functionality in the IoT five-layer model. This includes hardware components, network technologies, middleware technologies, application services, and business-related technologies. Moreover, the chapter provides a brief overview of some of the key platforms and operating systems that are widely used in IoT environments.

Chapter 4 provides an introduction to cloud computing and fog computing, two of the key back-end technologies in IoT systems. The chapter highlights the importance of these two models and shows how they complement each other and work together. The chapter presents their advantages and disadvantages, as well as some examples of IoT applications where they can be used.

Chapter 5 introduces RFID, one of the core technologies in IoT systems, and describes the important role it plays. The chapter gives a brief history of RFID showing how it is linked with the emergence of the IoT and highlights some of its possible applications and implementation challenges.

Chapter 6 provides a tutorial that explains the design and development of IoT prototypes using Arduino and Raspberry Pi platforms. The chapter offers a guide that covers both the hardware and software aspects of these platforms for beginners who wish to learn about developing IoT applications. Detailed examples are provided to demonstrate how to implement IoT projects using these two platforms.

Chapter 7 looks at the development over the past 20 years of the standardization efforts for the IoT and four of its applications (and their respective predecessor technologies, if any) and at the links between them. The chapter speculates about the future of standardization in those domains based on what has been accomplished so far.

Part III: Security Issues and Solutions

This part provides three chapters about various security issues, technologies, and considerations in IoT environments.

Chapter 8 explores the main security protocols and technologies currently used in a typical IoT communication stack. This technically oriented chapter also discusses security issues in IoT environments and presents solutions enabled by research and standardization efforts to address them.

Chapter 9 introduces blockchain technology and how it can be leveraged to secure IoT systems and protect their data. The chapter provides some examples where blockchain-based solutions were proposed to secure IoT and gives an idea about integration challenges and current research efforts in this area.

Chapter 10 highlights the importance of IT auditing for organizations adopting the IoT. The chapter discusses the risks associated with the IoT and how routine and thorough IT auditing can prevent them. Risk identification and assessment, as well as audit considerations and policies are presented.

Part IV: Domains

This part is composed of nine chapters presenting various application domains where IoT technologies can be utilized. These chapters present the concepts, underlying technologies, implementation details, and advantages and challenges of such integration.

Chapter 11 represents a foundational chapter for this part as it gives an introduction to the use of IoT in several domains with focus on the Industrial Internet of Things (IIoT) showing how IoT can be leveraged in industrial fields of application. Two of the main initiatives in the IIoT are highlighted, namely, the Industrial Internet Consortium (IIC) and the Plattform Industrie 4.0.

Chapter 12 provides an overview of IoT applications for smart cities and how it can help in improving resource management. The technical aspects and general requirements of such solutions as well as the challenges the broad adoption of IoT faces in smart cities are presented.

Chapter 13 provides a contemporary overview of the IoT applications in smart homes, or what is called in the chapter as smart connected homes. The chapter presents the underlying technologies and architectures of smart connected homes, as well as the services they offer to householders. Both the technical and social challenges are also highlighted.

Chapter 14 addresses the integration of the IoT in the energy domain. The chapter provides a broad discussion of the motivations, approaches, and challenges of this integration and presents some specific applications including smart grid, green IoT, and smart lighting.

Chapter 15 continues the discussion made in Chapter 14 by highlighting various essential developments that are required for deploying and managing smart grids and renewable generation sources using IoT. The technical requirements, industry standards, and security concerns are addressed in this chapter.

Chapter 16 provides a comprehensive discussion on the integration of the IoT in patient-focused health applications. The chapter first describes the key elements of IoT-based health care ecosystems, and then explores the different types of applications that utilize this model. Challenges and expectations of future developments are highlighted as well.

Chapter 17 discusses how paramedics can use the IoT for emergency support. The chapter starts with an overview of how IoT enables the realization of smart ambulance, and then it provides a case study that assesses the adoption of this model for diagnosis and prognosis of chronic obstructive pulmonary disease. Challenges for the global deployment of smart ambulance are highlighted.

Chapter 18 reviews the various applications the IoT offers for precision agriculture (PA). The chapter starts with an introduction to PA, and then illustrates how the integration of IoT technologies into its different sections can be revolutionary in terms of quantity, quality, efficiency, sustainability, and cost-effectiveness.

Chapter 19 provides a broad overview of the integration of the IoT into Unmanned Aerial Vehicles (UAVs; commonly known as drones). The chapter describes this new model and presents its underlying technologies as well as several applications where it can be utilized. The chapter also highlights the challenges of this model with special focus on the security and safety issues.

Part V: Relevant Sample Applications

This part contains two chapters that offer two exemplary applications of IoT. Both chapters are implemented in lab scale using smart objects with the aim of tackling some real-life issues. Both technical and social details of these applications are discussed. The objective of providing these examples is to present the implementation details and show the reader how the IoT can actually be implemented.

Chapter 20 demonstrates the use of IoT technologies in the behavioral and psychological research field by capturing the emotions of children with autism spectrum disorder (ASD) using smart objects integrated into their play environment. First, ASD is explained and a literature review of related work is provided. Then, the technical details of the presented application are provided.

Chapter 21 presents a low-cost IoT framework for detecting and reporting landslides in landslide-prone areas. The chapter discusses the technical details of this framework, including the system design, used hardware components, and test results. The proposed framework has only been tested in lab, but it clearly shows how IoT technologies can be effectively integrated into such critical scenarios.

USAID Qusay F. Hassan
Cairo, Egypt

Note

Acknowledgments

I would like to express my gratitude to each and every individual who participated in this project. In particular, I would like to acknowledge the hard work of authors and their patience during the revisions of their chapters.

I also wish to thank Daniel Minoli, Marta Vos, Qiang Yang, Supriya Mitra, and Xiaojun Zhai for their comments that helped improve the quality and organization of this book.

Finally, I am very grateful to the editorial team at Wiley-IEEE Press for their support through the stages of preparation and production. Special thanks to my editor Mary Hatcher for her great support throughout the entire process. Thanks to Vishnu Narayanan for overseeing the editorial phase. Also, thanks to the anonymous reviewers provided by Wiley-IEEE Press whose comments helped improve the quality of the chapters.

Qusay F. Hassan

Contributors

Abdullah Abuhussein

Department of Information Systems, St. Cloud State University, St. Cloud, MN, USA

Faisal Alsubaei

Computer Science Department, University of Memphis, Memphis, TN, USA

and

Faculty of Computing and Information Technology, University of Jeddah, Jeddah, Saudi Arabia

Kalinka Regina Lucas Jaquie Castelo Branco

Institute of Mathematics and Computer Sciences (ICMC), University of São Paulo (USP), São Carlos, São Paulo, Brazil

Willie L. Brown, Jr.

Department of Engineering and Aviation Sciences, University of Maryland Eastern Shore, Princess Anne, MD, USA

Joseph Bugeja,

Internet of Things and People Research Center and Department of Computer Science and Media Technology, Malmö University, Malmö, Sweden

Pratik Chaturvedi

Defence Terrain Research Laboratory, Defence Research and Development Organization, New Delhi, India

and

Applied Cognitive Science Laboratory, Indian Institute of Technology Mandi, Kamand, India

Ibibia K. Dabipi

Department of Engineering and Aviation Sciences, University of Maryland Eastern Shore, Princess Anne, MD, USA

Paul Davidsson

Internet of Things and People Research Center and Department of Computer Science and Media Technology, Malmö University, Malmö, Sweden

João Vitor de Carvalho Fontes

São Carlos School of Engineering (EESC), University of São Paulo (USP), São Carlos, São Paulo, Brazil

Varun Dutt

School of Computing and Electrical Engineering; School of Humanities and Social Sciences, Indian Institute of Technology Mandi, Himachal Pradesh, India

Jeanette Eriksson

Department of Computer Science and Media Technology, Internet of Things and People (IoTaP) Research Center, Malmö University, Malmö, Sweden

Akaa Agbaeze Eteng

Department of Electronic and Computer Engineering, University of Port Harcourt, Port Harcourt, Nigeria

Lucas Finco

Principal Consultant, Strategain, New York, NY, USA

Bernard Fong

School of Public Health, Auckland University of Technology, New Zealand

A. C. M. Fong

Department of Computer Science, Western Michigan University, Kalamazoo MI, USA

Virginia N. L. Franqueira

Department of Electronics, Computing & Mathematics, University of Derby, Derby, UK

Mário Marques Freire

Instituto de Telecomunicações and Department of Computer Science, Universidade da Beira Interior, Covilhã, Portugal

Daniel Happ

Technische Universität Berlin, Telecommunication Networks Group (TKN), Berlin, Germany

Pedro Ricardo Morais Inácio

Instituto de Telecomunicações and Department of Computer Science, Universidade da Beira Interior, Covilhã, Portugal

Andreas Jacobsson

Internet of Things and People Research Center and Department of Computer Science and Media Technology, Malmö University, Malmö, Sweden

Kai Jakobs

Computer Science Department, RWTH Aachen University, Aachen, Germany

Venkata Uday Kala

School of Engineering, Indian Institute of Technology Mandi, Himachal Pradesh, India

Jonny Karlsson

Department of Business Management and Analytics, Arcada University of Applied Sciences, Helsinki, Finland

Sudhakar Kumar

School of Computing and Electrical Engineering, Indian Institute of Technology Mandi, Himachal Pradesh, India

Chee Yen Leow

Wireless Communication Centre, Universiti Teknologi Malaysia, Johor, Malaysia

C. K. Li

Add-Care Ltd., Hong Kong

Naresh Mali

School of Engineering, Indian Institute of Technology Mandi, Himachal Pradesh, India

Manuel Meruje

Instituto de Telecomunicações and Department of Computer Science, Universidade da Beira Interior, Covilhã, Portugal

Daniel Minoli

IoT Division, DVI Communications, New York, NY, USA

Benedict Occhiogrosso

Intellectual Property Division, DVI Communications, New York, NY, USA

Daniel Fernando Pigatto

Graduate Program in Electrical and Computer Engineering (CPGEI), Federal University of Technology Paraná (UTFPR), Curitiba, Paraná, Brazil

Alex Sandro Roschildt Pinto

Federal University of Santa Catarina (UFSC), Blumenau, Santa Catarina, Brazil

Göran Pulkkis

Department of Business Management and Analytics, Arcada University of Applied Sciences, Helsinki, Finland

Sharul Kamal Abdul Rahim

Wireless Communication Centre, Universiti Teknologi Malaysia, Johor, Malaysia

Hejamadi Raghav Rao

Department of Information Systems and Cyber Security, University of Texas San Antonio, San Antonio, TX, USA

Shahid Raza

RISE SICS Security Lab, Kista, Stockholm, Sweden

Mariana Rodrigues

Institute of Mathematics and Computer Sciences (ICMC), University of São Paulo (USP), São Carlos, São Paulo, Brazil

Jason M. Rosenberg

University at Buffalo School of Management, The State University of New York at Buffalo, Buffalo, NY, USA

Nancy L. Russo

Department of Computer Science and Media Technology, Internet of Things and People (IoTaP) Research Center, Malmö University, Malmö, Sweden

Musa Gwani Samaila

Instituto de Telecomunicações and Department of Computer Science, Universidade da Beira Interior, Covilhã, Portugal

and

Centre for Geodesy and Geodynamics, National Space Research and Development Agency, Toro, Bauchi State, Nigeria

Detlef Schoder

Department of Information Systems and Information Management, University of Cologne, Köln, Germany

Sajjan Shiva

Computer Science Department, The University of Memphis, Memphis, TN, USA

John Shu

Department of Information Systems and Cyber Security, University of Texas San Antonio, San Antonio, TX, USA

Jan Sliwa

Department of Engineering and Information Technology, Bern University of Applied Sciences, Bern, Switzerland

James Smith

Computer Science and Creative Technologies (FET), University of the West of England (UWE), Bristol, England, United Kingdom

Tiffany Y. Tang

Wenzhou-Kean Autism Research Network, Assistive Technology Research and Development Center, Department of Computer Science, Wenzhou-Kean University, Zhejiang Province, China

Kamal Kishore Thakur

Computer Science and Engineering Department, Thapar Institute of Engineering and Technology, Patiala, India

Marco Tiloca

RISE SICS Security Lab, Kista, Stockholm, Sweden

Shambhu Upadhyaya

University at Buffalo, The State University of New YorkDepartment of Computer Science and Engineering, Buffalo, NY, USA

Magnus Westerlund

Department of Business Management and Analytics, Arcada University of Applied Sciences, Helsinki, Finland

Alexander Willner

Fraunhofer FOKUS, Software-based Networks (NGNI), Berlin, Germany

and

Technische Universität Berlin, Next Generation Networks (AV), Berlin, Germany

Pinata Winoto

Wenzhou-Kean Autism Research Network, Assistive Technology Research and Development Center, Department of Computer Science, Wenzhou-Kean University, Zhejiang Province, China

Srishti Yadav

School of Computing and Electrical Engineering, Indian Institute of Technology Mandi, Himachal Pradesh, India

Lei Zhang

Department of Engineering and Aviation Sciences, University of Maryland Eastern Shore, Princess Anne, MD, USA

Part I
Concepts and Perspectives