IEEE Press
445 Hoes Lane
Piscataway, NJ 08854
IEEE Press Editorial Board
Ekram Hossain, Editor in Chief
Giancarlo Fortino | Andreas Molisch | Linda Shafer |
David Alan Grier | Saeid Nahavandi | Mohammad Shahidehpour |
Donald Heirman | Ray Perez | Sarah Spurgeon |
Xiaoou Li | Jeffrey Reed | Ahmet Murat Tekalp |
Copyright © 2018 by The Institute of Electrical and Electronics Engineers, Inc. All rights reserved.
Published by John Wiley & Sons, Inc., Hoboken, New Jersey.
Published simultaneously in Canada.
No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 750-4470, or on the web at www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permission.
Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives or written sales materials. The advice and strategies contained herein may not be suitable for your situation. You should consult with a professional where appropriate. Neither the publisher nor author shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages.
For general information on our other products and services or for technical support, please contact our Customer Care Department within the United States at (800) 762-2974, outside the United States at (317) 572-3993 or fax (317) 572-4002.
Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic formats. For more information about Wiley products, visit our web site at www.wiley.com.
Library of Congress Cataloging-in-Publication Data is available.
ISBN: 978-111-945674-2
Information and communication technology (ICT) has always been dynamic and evolutionary in nature, leading to the continuous emergence of new technologies and business models. The recent advances in terms of available computing resources, software systems and communication networks, and the continuing miniaturization of hardware components have made it possible to integrate ICT into virtually anything, thus leading to the rise of a new computing paradigm known as the Internet of Things (IoT). The IoT aims at realizing an old dream of turning everyday objects into smart ones that are interconnected via the Internet and able to collect and exchange data and to make decisions autonomously. This additional “smartness” covers both the communication infrastructure and applications, including monitoring systems, industrial automation, and ultimately smart cities. In a recent report, Gartner estimates that there will be 11.2 billion connected devices in use in 2018 and 20.1 billion in 2020. 1 This clearly demonstrates the great potential and importance of this model and is also the motivation behind this book.
The potential of IoT is great and the possible applications of this model are countless. Therefore, uncovering the ins and outs of the IoT is crucial to both technology and business communities. This book seeks to provide a holistic coverage of the IoT model by presenting its principles, enabling technologies, and some of its numerous application domains. Important aspects such as the need for standardization, as well as security issues are also highlighted. The book also presents two sample applications showcasing how the discussed concepts and technologies can be leveraged and put to practical use to solve some real-world problems.
The book is a cohesive material that is composed of 21 chapters authored by several internationally renowned researchers and industry experts. Each chapter focuses on a specific subject and also provides the reader with the necessary background information, thus improving understandability and encouraging the reader to think further.
The book may be used as a textbook for both undergraduate and graduate students. It also comes in handy as a reference for researchers and IT professionals who are interested in IoT concepts, technologies, and possible applications. I hope the readers will enjoy reading this book as much as I enjoyed reviewing and editing the submissions.
The book is organized in a way that helps the reader to first grasp the concepts and then learn about key enabling technologies before moving to some potential applications. Although I would advise to read the entire book, most chapters are self-contained allowing the reader to focus on the topics they are interested in. Cross references between chapters are provided to help the reader to navigate between them.
This book is divided into five parts, each of which is devoted to a distinctive area.
This part is composed of two chapters that cover the core concepts underlying the IoT, as well as its evolution and impacts.
Chapter 1 provides an introductory overview of the IoT, including its core conceptual ideas. The chapter also covers closely related concepts and paradigms, as well as a list of initiatives and organizations that contribute to their further development. In addition, the chapter structures the broad range of technical as well nontechnical aspects by presenting a four-layer framework that addresses the IoT's enabling technologies, derived qualities of modern ICT and how they are supporting the IoT, potential for new innovations based on the IoT ecosystem, and finally IoT implications and challenges.
Chapter 2 explores some very important aspects that are usually ignored or forgotten when talking about IoT. Specifically, the chapter addresses issues like the heterogeneity of objects utilized as well as the diversity of environments within which IoT systems run, how time is critical to IoT systems in terms of development and support, people involved in the IoT ecosystem, and new security challenges the IoT poses. It also looks at big data, and both the technical and the moral challenges that result from the adoption of such intelligent objects.
This part comprises five chapters about various IoT enabling technologies that range from hardware items and communication technologies to data processing and storage to the emerging standards.
Chapter 3 gives a general overview of various enabling technologies of the IoT. The discussion of these technologies is based on their application and functionality in the IoT five-layer model. This includes hardware components, network technologies, middleware technologies, application services, and business-related technologies. Moreover, the chapter provides a brief overview of some of the key platforms and operating systems that are widely used in IoT environments.
Chapter 4 provides an introduction to cloud computing and fog computing, two of the key back-end technologies in IoT systems. The chapter highlights the importance of these two models and shows how they complement each other and work together. The chapter presents their advantages and disadvantages, as well as some examples of IoT applications where they can be used.
Chapter 5 introduces RFID, one of the core technologies in IoT systems, and describes the important role it plays. The chapter gives a brief history of RFID showing how it is linked with the emergence of the IoT and highlights some of its possible applications and implementation challenges.
Chapter 6 provides a tutorial that explains the design and development of IoT prototypes using Arduino and Raspberry Pi platforms. The chapter offers a guide that covers both the hardware and software aspects of these platforms for beginners who wish to learn about developing IoT applications. Detailed examples are provided to demonstrate how to implement IoT projects using these two platforms.
Chapter 7 looks at the development over the past 20 years of the standardization efforts for the IoT and four of its applications (and their respective predecessor technologies, if any) and at the links between them. The chapter speculates about the future of standardization in those domains based on what has been accomplished so far.
This part provides three chapters about various security issues, technologies, and considerations in IoT environments.
Chapter 8 explores the main security protocols and technologies currently used in a typical IoT communication stack. This technically oriented chapter also discusses security issues in IoT environments and presents solutions enabled by research and standardization efforts to address them.
Chapter 9 introduces blockchain technology and how it can be leveraged to secure IoT systems and protect their data. The chapter provides some examples where blockchain-based solutions were proposed to secure IoT and gives an idea about integration challenges and current research efforts in this area.
Chapter 10 highlights the importance of IT auditing for organizations adopting the IoT. The chapter discusses the risks associated with the IoT and how routine and thorough IT auditing can prevent them. Risk identification and assessment, as well as audit considerations and policies are presented.
This part is composed of nine chapters presenting various application domains where IoT technologies can be utilized. These chapters present the concepts, underlying technologies, implementation details, and advantages and challenges of such integration.
Chapter 11 represents a foundational chapter for this part as it gives an introduction to the use of IoT in several domains with focus on the Industrial Internet of Things (IIoT) showing how IoT can be leveraged in industrial fields of application. Two of the main initiatives in the IIoT are highlighted, namely, the Industrial Internet Consortium (IIC) and the Plattform Industrie 4.0.
Chapter 12 provides an overview of IoT applications for smart cities and how it can help in improving resource management. The technical aspects and general requirements of such solutions as well as the challenges the broad adoption of IoT faces in smart cities are presented.
Chapter 13 provides a contemporary overview of the IoT applications in smart homes, or what is called in the chapter as smart connected homes. The chapter presents the underlying technologies and architectures of smart connected homes, as well as the services they offer to householders. Both the technical and social challenges are also highlighted.
Chapter 14 addresses the integration of the IoT in the energy domain. The chapter provides a broad discussion of the motivations, approaches, and challenges of this integration and presents some specific applications including smart grid, green IoT, and smart lighting.
Chapter 15 continues the discussion made in Chapter 14 by highlighting various essential developments that are required for deploying and managing smart grids and renewable generation sources using IoT. The technical requirements, industry standards, and security concerns are addressed in this chapter.
Chapter 16 provides a comprehensive discussion on the integration of the IoT in patient-focused health applications. The chapter first describes the key elements of IoT-based health care ecosystems, and then explores the different types of applications that utilize this model. Challenges and expectations of future developments are highlighted as well.
Chapter 17 discusses how paramedics can use the IoT for emergency support. The chapter starts with an overview of how IoT enables the realization of smart ambulance, and then it provides a case study that assesses the adoption of this model for diagnosis and prognosis of chronic obstructive pulmonary disease. Challenges for the global deployment of smart ambulance are highlighted.
Chapter 18 reviews the various applications the IoT offers for precision agriculture (PA). The chapter starts with an introduction to PA, and then illustrates how the integration of IoT technologies into its different sections can be revolutionary in terms of quantity, quality, efficiency, sustainability, and cost-effectiveness.
Chapter 19 provides a broad overview of the integration of the IoT into Unmanned Aerial Vehicles (UAVs; commonly known as drones). The chapter describes this new model and presents its underlying technologies as well as several applications where it can be utilized. The chapter also highlights the challenges of this model with special focus on the security and safety issues.
This part contains two chapters that offer two exemplary applications of IoT. Both chapters are implemented in lab scale using smart objects with the aim of tackling some real-life issues. Both technical and social details of these applications are discussed. The objective of providing these examples is to present the implementation details and show the reader how the IoT can actually be implemented.
Chapter 20 demonstrates the use of IoT technologies in the behavioral and psychological research field by capturing the emotions of children with autism spectrum disorder (ASD) using smart objects integrated into their play environment. First, ASD is explained and a literature review of related work is provided. Then, the technical details of the presented application are provided.
Chapter 21 presents a low-cost IoT framework for detecting and reporting landslides in landslide-prone areas. The chapter discusses the technical details of this framework, including the system design, used hardware components, and test results. The proposed framework has only been tested in lab, but it clearly shows how IoT technologies can be effectively integrated into such critical scenarios.
USAID | Qusay F. Hassan Cairo, Egypt |
I would like to express my gratitude to each and every individual who participated in this project. In particular, I would like to acknowledge the hard work of authors and their patience during the revisions of their chapters.
I also wish to thank Daniel Minoli, Marta Vos, Qiang Yang, Supriya Mitra, and Xiaojun Zhai for their comments that helped improve the quality and organization of this book.
Finally, I am very grateful to the editorial team at Wiley-IEEE Press for their support through the stages of preparation and production. Special thanks to my editor Mary Hatcher for her great support throughout the entire process. Thanks to Vishnu Narayanan for overseeing the editorial phase. Also, thanks to the anonymous reviewers provided by Wiley-IEEE Press whose comments helped improve the quality of the chapters.
Qusay F. Hassan
Abdullah Abuhussein
Department of Information Systems, St. Cloud State University, St. Cloud, MN, USA
Faisal Alsubaei
Computer Science Department, University of Memphis, Memphis, TN, USA
and
Faculty of Computing and Information Technology, University of Jeddah, Jeddah, Saudi Arabia
Kalinka Regina Lucas Jaquie Castelo Branco
Institute of Mathematics and Computer Sciences (ICMC), University of São Paulo (USP), São Carlos, São Paulo, Brazil
Willie L. Brown, Jr.
Department of Engineering and Aviation Sciences, University of Maryland Eastern Shore, Princess Anne, MD, USA
Joseph Bugeja,
Internet of Things and People Research Center and Department of Computer Science and Media Technology, Malmö University, Malmö, Sweden
Pratik Chaturvedi
Defence Terrain Research Laboratory, Defence Research and Development Organization, New Delhi, India
and
Applied Cognitive Science Laboratory, Indian Institute of Technology Mandi, Kamand, India
Ibibia K. Dabipi
Department of Engineering and Aviation Sciences, University of Maryland Eastern Shore, Princess Anne, MD, USA
Paul Davidsson
Internet of Things and People Research Center and Department of Computer Science and Media Technology, Malmö University, Malmö, Sweden
João Vitor de Carvalho Fontes
São Carlos School of Engineering (EESC), University of São Paulo (USP), São Carlos, São Paulo, Brazil
Varun Dutt
School of Computing and Electrical Engineering; School of Humanities and Social Sciences, Indian Institute of Technology Mandi, Himachal Pradesh, India
Jeanette Eriksson
Department of Computer Science and Media Technology, Internet of Things and People (IoTaP) Research Center, Malmö University, Malmö, Sweden
Akaa Agbaeze Eteng
Department of Electronic and Computer Engineering, University of Port Harcourt, Port Harcourt, Nigeria
Lucas Finco
Principal Consultant, Strategain, New York, NY, USA
Bernard Fong
School of Public Health, Auckland University of Technology, New Zealand
A. C. M. Fong
Department of Computer Science, Western Michigan University, Kalamazoo MI, USA
Virginia N. L. Franqueira
Department of Electronics, Computing & Mathematics, University of Derby, Derby, UK
Mário Marques Freire
Instituto de Telecomunicações and Department of Computer Science, Universidade da Beira Interior, Covilhã, Portugal
Daniel Happ
Technische Universität Berlin, Telecommunication Networks Group (TKN), Berlin, Germany
Pedro Ricardo Morais Inácio
Instituto de Telecomunicações and Department of Computer Science, Universidade da Beira Interior, Covilhã, Portugal
Andreas Jacobsson
Internet of Things and People Research Center and Department of Computer Science and Media Technology, Malmö University, Malmö, Sweden
Kai Jakobs
Computer Science Department, RWTH Aachen University, Aachen, Germany
Venkata Uday Kala
School of Engineering, Indian Institute of Technology Mandi, Himachal Pradesh, India
Jonny Karlsson
Department of Business Management and Analytics, Arcada University of Applied Sciences, Helsinki, Finland
Sudhakar Kumar
School of Computing and Electrical Engineering, Indian Institute of Technology Mandi, Himachal Pradesh, India
Chee Yen Leow
Wireless Communication Centre, Universiti Teknologi Malaysia, Johor, Malaysia
C. K. Li
Add-Care Ltd., Hong Kong
Naresh Mali
School of Engineering, Indian Institute of Technology Mandi, Himachal Pradesh, India
Manuel Meruje
Instituto de Telecomunicações and Department of Computer Science, Universidade da Beira Interior, Covilhã, Portugal
Daniel Minoli
IoT Division, DVI Communications, New York, NY, USA
Benedict Occhiogrosso
Intellectual Property Division, DVI Communications, New York, NY, USA
Daniel Fernando Pigatto
Graduate Program in Electrical and Computer Engineering (CPGEI), Federal University of Technology Paraná (UTFPR), Curitiba, Paraná, Brazil
Alex Sandro Roschildt Pinto
Federal University of Santa Catarina (UFSC), Blumenau, Santa Catarina, Brazil
Göran Pulkkis
Department of Business Management and Analytics, Arcada University of Applied Sciences, Helsinki, Finland
Sharul Kamal Abdul Rahim
Wireless Communication Centre, Universiti Teknologi Malaysia, Johor, Malaysia
Hejamadi Raghav Rao
Department of Information Systems and Cyber Security, University of Texas San Antonio, San Antonio, TX, USA
Shahid Raza
RISE SICS Security Lab, Kista, Stockholm, Sweden
Mariana Rodrigues
Institute of Mathematics and Computer Sciences (ICMC), University of São Paulo (USP), São Carlos, São Paulo, Brazil
Jason M. Rosenberg
University at Buffalo School of Management, The State University of New York at Buffalo, Buffalo, NY, USA
Nancy L. Russo
Department of Computer Science and Media Technology, Internet of Things and People (IoTaP) Research Center, Malmö University, Malmö, Sweden
Musa Gwani Samaila
Instituto de Telecomunicações and Department of Computer Science, Universidade da Beira Interior, Covilhã, Portugal
and
Centre for Geodesy and Geodynamics, National Space Research and Development Agency, Toro, Bauchi State, Nigeria
Detlef Schoder
Department of Information Systems and Information Management, University of Cologne, Köln, Germany
Sajjan Shiva
Computer Science Department, The University of Memphis, Memphis, TN, USA
John Shu
Department of Information Systems and Cyber Security, University of Texas San Antonio, San Antonio, TX, USA
Jan Sliwa
Department of Engineering and Information Technology, Bern University of Applied Sciences, Bern, Switzerland
James Smith
Computer Science and Creative Technologies (FET), University of the West of England (UWE), Bristol, England, United Kingdom
Tiffany Y. Tang
Wenzhou-Kean Autism Research Network, Assistive Technology Research and Development Center, Department of Computer Science, Wenzhou-Kean University, Zhejiang Province, China
Kamal Kishore Thakur
Computer Science and Engineering Department, Thapar Institute of Engineering and Technology, Patiala, India
Marco Tiloca
RISE SICS Security Lab, Kista, Stockholm, Sweden
Shambhu Upadhyaya
University at Buffalo, The State University of New YorkDepartment of Computer Science and Engineering, Buffalo, NY, USA
Magnus Westerlund
Department of Business Management and Analytics, Arcada University of Applied Sciences, Helsinki, Finland
Alexander Willner
Fraunhofer FOKUS, Software-based Networks (NGNI), Berlin, Germany
and
Technische Universität Berlin, Next Generation Networks (AV), Berlin, Germany
Pinata Winoto
Wenzhou-Kean Autism Research Network, Assistive Technology Research and Development Center, Department of Computer Science, Wenzhou-Kean University, Zhejiang Province, China
Srishti Yadav
School of Computing and Electrical Engineering, Indian Institute of Technology Mandi, Himachal Pradesh, India
Lei Zhang
Department of Engineering and Aviation Sciences, University of Maryland Eastern Shore, Princess Anne, MD, USA