SlideShare a Scribd company logo
1
INTERNET OF THINGS
Module-1
18CS81
2
Topics
 What is IoT?
 Genesis of IoT
 IoT and Digitization
 IoT Impact
 Convergence of IT and OT
 IoT Challenges
 IoT Network Architecture and Design
09/12/2024
3
What is IoT?
 What is Internet?
 The Internet is the global system of interconnected computer networks
that use the Internet protocol suite (TCP/IP) to link devices worldwide. It
is a network of networks that consists of private, public, academic,
business, and government networks of local to global scope, linked by a
broad array of electronic, wireless, and optical networking
technologies. The Internet carries an extensive range of information
resources and services, such as the inter-linked hypertext documents and
applications of the World Wide Web (WWW), electronic mail,
telephony, and peer-to-peer networks for file sharing.
 What is things?
 Object like Computer, Mobile Phone, Sensor
4
IoT
 From self-driving drones delivering your grocery order to
sensors in your clothing monitoring your health, the world
you know is set to undergo a major technological shift
forward. This shift is known collectively as the Internet of
Things (IoT)
 Connect the unconnected
5
What is IOT?
09/12/2024
6
Genesis of IoT
 Started between the year 2008 and 2009.
 Creation of the term “Internet of Things” is by Kevin
Ashton. While working for Procter & Gamble
supply chain, linking to internet 1999,
 Kevin’s prediction –
 computers were brains without senses - computers are
sensing things for themselves
7
Evolution of Internet
09/12/2024
8
09/12/2024
9
IoT AND DIGITIZATION
 IoT focuses on connecting “things,” such as objects and
machines, to a computer network, such as the Internet.
Ex: Wi-Fi devices
 Digitization means “things” with the data they generate
and the business insights that results. Ex: Capturing
location and time through Wi-Fi devices
 conversion of information into a digital format
 Identify IoT and digitization in
 video rental industry
 transportation industry
09/12/2024
10
IoT IMPACT
 About 17 billion of “things” are connected to the
Internet today(end of 2018) out of which 7 billion
are IoT devices
 Cisco Systems predicts that by 2020, this number
will reach 50 billion
 Cisco further estimates that these new connections
will lead to $19 trillion in profits and cost saving
09/12/2024
11
09/12/2024
12
Connected Roadways
 self-driving car, or autonomous vehicle (Google’s
self-driving car) IoT is also a necessary component
for implementing a fully connected transportation
infrastructure.
09/12/2024
13
Connected Roadways
 Automobiles are equipped with thousands of sensors
 These sensors are becoming IP-enabled to allow easy
communication with other systems both inside and
outside the car.
 new sensors and communication technologies are being
developed to allow vehicles to “talk” to other vehicles,
traffic signals, school zones, and other elements of the
transportation infrastructure. We are now starting to
realize a truly connected transportation solution.
09/12/2024
14
Connected Roadways challenges
09/12/2024
15
Intersection Movement Assist (IMA)
09/12/2024
16
09/12/2024
17
Connected Factory
The main challenges facing manufacturing in a factory environment
today,
 Accelerating new product and service introductions to meet customer
and market opportunities
 Increasing plant production, quality, and uptime while decreasing cost
 Mitigating unplanned downtime (which wastes, on average, at least
5% of production)
 Securing factories from cyber threats
 Decreasing high cabling and re-cabling costs (up to 60% of
deployment costs)
 Improving worker productivity and safety
09/12/2024
18
Industrial enterprises around the world are retooling
their factories with advanced technologies and
architectures to resolve these problems and boost
manufacturing flexibility and speed. These
improvements help them achieve new levels of overall
equipment effectiveness, supply chain responsiveness,
and customer satisfaction. A convergence of factory-
based operational technologies and architectures with
global IT networks is starting to occur, and this is
referred to as the connected factory.
09/12/2024
19
Industrial Revolutions
20 Internet of Things Application Examples
21
Overview
 Related to IoT applications, proponents make the observation that (1)
 “ . . . there are so many applications that are possible because of IoT. For individual users,
IoT brings useful applications like home automation, security, automated devices
monitoring, and management of daily tasks. For professionals, automated applications
provide useful contextual information all the time to help on their works and decision
making. Industries, with sensors and actuators operations can be rapid, efficient and more
economic. Managers who need to keep eye on many things can automate tasks connection
digital and physical objects together. Every sectors energy, computing, management,
security, transportation are going to be benefitted with this new paradigm. Development
of several technologies made it possible to achieve the vision of Internet of things.
Identification technology such as RFID allows each object to represent uniquely by having
unique identifier. Identity reader can read any time the object allows real time
identification and tracking. Wireless sensor technology allows objects to provide real time
environmental condition and context. Smart technologies allow objects to become more
intelligent which can think and communicate. Nanotechnologies are helping to reduce the
size of the chip incorporating more processing power and communication capabilities in a
very small chip.
22
Overview
Taxonomy of Applications
23
Overview
Grouping of applications in the M2M context
24
Overview
 Some of the possible short-term applications include
the following:
 building automation and remote control (facilitating
efficient commercial spaces)
 smart energy (supporting office building/ home energy
management)
 healthcare (providing health and fitness monitoring)
 home automation (giving rise to smart homes)
 retail services (enabling smart shopping).
25
Overview
 A longer list of applications includes, but is not limited to, the
following:
 Public services and smart cities:
 Telemetry: for example, smart metering, parking metering, and
vending machines
 Intelligent transportation systems (ITSs) and traffic management
 Connecting consumer and citizens to public infrastructure (such as public
transportation)
 In-building automation, municipal, and regional infrastructure
 Metropolitan operations (traffic, automatic tolls, fire, and so on)
 Electrical grid management at a global level; smart grids (SGs)
 Electrical demand response (DR) at a global level
26
Overview
 A longer list of applications includes, but is not limited
to, the following:
 Automotive, fleet management, asset tracking:
 e-Vehicle: for example, navigation, road safety, and traffic
control
 Driver safety and emergency services
 Fleet management systems: hired-car monitoring, goods vehicle
management
 Back-seat infotainment device integration
 Next-generation global positioning system (GPS) services
 Tracking: asset tracking, cargo tracking, and order tracking
27
Overview
 A longer list of applications includes, but is not limited to, the following:
 Commercial markets:
 Industrial monitoring and control, for example, industrial machines, and elevator
monitoring
 Commercial building and control
 Process control
 Maintenance automation
 Home automation
 Wireless automated meter reading (AMR)/load management (LM)
 Homeland security applications: chemical, biological, radiological, and nuclear wireless
sensors
 Military sensors
 Environmental (land, air, sea) and agricultural wireless sensors
 Finance: Point-of-sale (POS) terminals, ticketing
 Security: Public surveillance, personal security
28
Overview
 A longer list of applications includes, but is not limited to,
the following:
 Embedded networking systems in the smart home and
smart office:
 Smart appliances: for example, AC-power control, lighting control,
heating control, and low power management
 Automated home: remote media control
 Smart meters and energy efficiency: efficiencies obtained by
exploiting the potential of the SG
 Telehealth (e-health): Assisted Living and in-home m-health services
(including remote monitoring, remote diagnostic)
 Security and emergency services: integrated remote services
29
Overview
 ETSI (European Telecommunications Standards Institute.) has published a number of use
cases for IoT (specifically for M2M) applications in the following documents:
 ETSI TR 102 691: “Machine-to-Machine Communications (M2M); Smart Metering Use Cases.”
 ETSI TR 102 732: “Machine-to-Machine Communications (M2M); Use Cases of M2M Applications
for eHealth.”
 ETSI TR 102 897: “Machine-to-Machine Communications (M2M); Use Cases of M2M Applications
for City Automation.”
 ETSI TR 102 875: “Access, Terminals, Transmission, and Multiplexing (ATTM); Study of European
Requirements for Virtual Noise for ADSL2, ADSL2plus, and VDSL2.”
 ETSI TR 102 898: “Machine-to-Machine Communications (M2M); Use Cases of Automotive
Applications in M2M Capable Networks.”
 ETSI TS 102 412: “Smart Cards; Smart Card Platform Requirements Stage 1 (Release 8).”
 The International Organization for Standardization (ISO) has published the following relevant
document, among others:
 ISO 16750: “Road Vehicles—Environmental Conditions and Testing for Electrical and Electronic
Equipment.”
30
Smart Metering/Advanced Metering Infrastructure
 The European Technology Platform for Electricity Networks for the
Future defines an SG as:
 “an electricity network that can intelligently integrate the actions of
all users connected to it—the consumers, the power generators, and
those that do both—in order to efficiently deliver sustainable,
economic, and secure electricity supplies.”
 A key element of an SG is a smart metering network that enables
automated metering capabilities on the customer side (downstream).
 On the upstream, the utility acquires the capability for real-time
grid monitoring and for information processing of significant network
events; this includes fault detection, isolation, and resolution.
31
Smart Metering/Advanced Metering Infrastructure
 Specifically, a smart metering network enables a utility
company to
 (i) remotely connect or disconnect power to individual customers,
 (ii) remotely or automatically update the grid configuration,
 (iii) collect power consumption data in variable time intervals
 (iv) modulate customer loads automatically during critical
demand periods.
 The SG is also able to automatically detect theft and is
able to notify the utility if a meter is tampered with.
32
Smart Metering/Advanced Metering Infrastructure
 The general goal is to monitor and control the consumption of
utilities-supplied consumable assets, such as electricity, gas, and
water.
 Utility companies deploy intelligent metering services by
incorporating M2M communication modules into metering devices
(“the thing”);
 These intelligent meters are able to send information
automatically (or on demand) to a server application that can
directly bill or control the metered resource.
 The ultimate objective is to improve energy distribution
performance and efficiency by utilizing accurate real-time
information on endpoint consumption.
33
Smart Metering/Advanced Metering Infrastructure
 Example of a smart flowmeter for a water utility
application
34
Smart Metering/Advanced Metering Infrastructure
 Advanced Metering Infrastructure (AMI)
35
Smart Metering/Advanced Metering Infrastructure
 AMI can utilize a number of methods and communication standards to
communicate between physical service layers, some combinations and/or
refinements of existing communication protocols are required.
 In previous slide a number of power line carrier (PLC)-based communication
approaches are
 Technically feasible, at the currently no such technologies and protocols that
have not reached the level of technical maturity and cost competitiveness.
 Industry and/or standards organizations such as the European Commission
(EC) has given support to the following initiatives for devices supporting :
 EC’s M/411 Smart Metering Mandate: The objective is to build standards for
European smart meters, allowing interoperability and consumer actual consumption
awareness.
 EC’s M/490 SG Mandate: The objective is to build standards for European SGs.
36
Smart Metering/Advanced Metering Infrastructure
 The advanced metering infrastructure (AMI) is the
electric information service infrastructure that is put
in place between the end-user (or end device) and
the power utility.
 AMI is a system for implementing the SG (Smart
Grid), and it is the principal means for realizing DR
(demand response).
 Shipments of smart meter units were expected to
continue to grow.
37
Smart Metering/Advanced Metering Infrastructure
 The combination of the AMI meter and an appropriate home area
network (HAN) enables consumers
 to become aware of electricity consumption costs on a near real-time basis
 to be able to monitor their energy usage;
 to manage their usage based on their financial metrics.
 To assist consumers manufacturers are designing products that contain built-in
communication systems that communicate with the HAN (and the AMI meter).
 System having knowledge of the cost of electricity and of the consumer
preferences, these smart devices are able to manage appliances to either
defer operation or adjust the operating condition to reduce peak energy
demand.
 Peak reduction can save utilities money by helping them avoid the
construction of new peaking power plants or upgrading infrastructure; that
exist only to handle peak loads.
38
Smart Metering/Advanced Metering Infrastructure
 AMI complex system and HAN communication network should preferably be based on a
network technology that
 (i) utilizes open standards,
 (ii) is low cost
 (iii) consumes a minimum amount of energy
 (iv) does not require extensive new infrastructure.
 Metering devices are typically monitored and controlled by a centralized entity outside or
inside the network operator system.
 The centralized not only to control also entity will inform or poll the metering device when it needs
measurement information rather than the metering device autonomously sending measurements.
 Depending on the nature of the metering application, low latency responses are sometimes
required (metering for high pressure pipelines, for example).
 To accomplish this, the centralized entity will need to inform the metering device when it needs a
measurement.
 Metering addressing is limitation of IPv4 address space and it is desirable to utilize IPv6.
39
e-Health/Body Area Networks
 e-Health applications include health and fitness.
 Mobile health monitoring systems
 These applications make use of one or more biosensors placed on, or in, the
human body, enabling the collection of a specified set of body’s parameters
to be transmitted and then monitored remotely.
 The on-body sensors are generally light and the links are wireless in nature,
allowing the patient to enjoy a high degree of mobility.
 These sensors make patients free from the set of wires that would otherwise
tie the patients to a specific site at home or to a hospital bed.
 Body sensor units, each containing a biosensor, a radio, an antenna and
some on-board control and computation.
 These on-body sensor systems—the sensors and the connectivity—are called
wireless body area networks (WBANs), or medical body area networks
(MBANs), or medical body area network system (MBANS).
40
e-Health/Body Area Networks
 Wireless body area network/Medical body area network
41
e-Health/Body Area Networks

MBAN technology consists of sensors which are
 small, low powered on the body that capture clinical information, such as temperature and
respiratory function. Sensors are used for monitoring and trending for disease detection,
progression, remission, and fitness.
 As patients recover, MBANs allow them to move about the healthcare facility, while
still being monitored for any health issues that might develop.
 MBANs consist of two paired devices
 one that is worn on the body (sensor)
 another that is located either on the body or in close proximity to it (hub).
 Some of these devices are
 disposable and are similar to a band-aid in size and shape;
 the disposable sensors include a low power radio transmitter.
 Sensors typically register patient’s temperature, pulse, blood glucose level, blood
pressure (BP), and respiratory health
 The benefits include increased mobility, better care, and lower costs
42
e-Health/Body Area Networks
 Examples of health care related sensors device includes:
 Glucose meter: That measures the approximate concentration of
glucose in the blood; it is used by chronic disease (e.g., diabetes)
management applications.
 Pulse oximeter: That indirectly measures the amount of oxygen in a
patient’s blood (oxygen saturation (SpO2)).
 Electrocardiograph (ECG): That records and measures the electrical
activity of the heart over time.
 Social alarm devices: That allow individuals to raise an alarm and
communicate with a caretaker when an emergency situation occurs; the
caretaker may be a monitoring center, a medical care team, or a
family member; these include devices fall detector and panic
pendant/wrist transmitters.
43
e-Health/Body Area Networks
 A WBANs/MBANs/MBANSs should make formalization and
standardization of wireless on-body monitoring technology which
include low power radio system used for the transmission of non-voice
data to and from medical devices, especially in terms of frequency bands
and communications at the higher layers (PHY, MAC, IP).
 In WBANs/MBANs body wireless sensors work to collect multiple vital
sign parameters and/or medical actuator devices and that communicate
with a monitoring device placed on/around (up to 10 m from) the human
body.
 Today, existing technologies allow for wired solutions (bundle-of-wires) for
monitoring patient vital signs as well as controlling actuators such as
ventilators and infusion pumps. On-body sensors measuring vital signs of a
patient and actuators are typically wired up to a bedside patient monitor.
44
e-Health/Body Area Networks
 In Europe, introduced the first wireless patient monitoring solutions
operating in the generic short-range device (SRD) band from
2400 MHz to 2483.5 MHz with intensive use of this band by
other applications (such as WiFi R , Bluetooth R , and ISM
equipment), but it’s not reliability as increases the healthcare
facilities.
 Assistive technology (AT).
 AT can be defined as “any device or system that allows an individual
to perform a task that they would otherwise be unable to do, or
increases the ease and safety with which the task can be performed”
 Another definition is “any product or service designed to enable
independence for disabled or older people”
45
e-Health/Body Area Networks
 Benefits of (and/or motivations for) MBAN
technology
46
e-Health/Body Area Networks
47
e-Health/Body Area Networks
 Devices communicating with classic smartphones
using
 Near field communication (NFC)
 Bluetooth low energy (BLE),
 ZigBee
48
e-Health/Body Area Networks
 ZigBee
 Enabling the deployment of reliable, cost-effective, low power, wireless monitoring
and control products based on an open IEEE standard;
 it was designed with simplicity in mind and is efficient in the use of power, allowing
monitoring devices to operate on commonly available batteries for years.
 BLE (Bluetooth low energy )
 A low power version of Bluetooth capable of reporting data from a sensor for up
to a year from a small button battery; although the data rate and radio range is
lower than that of classic Bluetooth, also an IEEE standard, the low power and long
battery life make it suitable for short-range monitoring applications in medicine.
 NFC (Near field communication)
 A form of contactless communication between devices such as smartphones or
tablets and readers. Contactless communication allows a user to wave the
smartphone over an NFC-compatible device to send information without requiring
the devices to touch or to use a cable.
49
e-Health/Body Area Networks
 Mid-2012, the US Federal Communications
Commission (FCC) proposal to allocate spectrum
bandwidth in the United States for use of body
sensors to monitor wirelessly a variety of patient’s
vital signs using MBANSs.
50
e-Health/Body Area Networks
 The proposed new spectrum allocation can:
 Provide more reliable service and increased capacity for
the use of MBANs in hospital waiting rooms, elevator
lobbies, preparatory areas, and other high density settings.
 Greatly improve the quality of patient care with more
effective monitoring, catching patients before critical
stages, improving patient outcomes, and ultimately saving
lives.
 Decrease expenses while increasing competition and
innovation, easing entry for companies that are developing
new wireless medical devices.
51
e-Health/Body Area Networks
 Chronic disease monitoring encompasses the following:
 Episodic patient monitoring;
 This is utilized in noncritical patients to track specific indicators and
identify the progress of the disease or recovery. The patient’s vital signs
(e.g., heart rate, temperature) and disease-specific indicators (e.g., BP,
blood glucose level, EKG) are monitored to determine anomalies and
identify trends.
 The monitoring is done periodically, and all the information collected by
the medical sensors is time-stamped and then securely forwarded to a
gateway that functions as a patient monitoring system.
 Additionally, the gateway forwards the aggregated information in a
secure way to a database server.
 Medical personnel and family caregivers can access the information
stored in the database server to monitor the progress of the disease.
52
e-Health/Body Area Networks
 Chronic disease monitoring encompasses the following:
 Continuous patient monitoring;
 This is associated with acute conditions that require constant or frequent measurement of health
status.
 The vital signs (e.g., heart rate, temperature, pulse oximeter) are monitored on a constant basis
to allow continuous measurement of patients’ health status at rest or during mild exercise for
purpose of treatment adjustment, recovery, or diagnosis.
 The vital signs measurements waveforms (e.g., pulse pleth wave or heart rate) are securely
streamed to an on-body data collection unit for data fusion and/or sequential storage. The
data is securely forwarded from the data collection unit to an off-body gateway (e.g.,
PC/laptop, PDA or mobile phone) for storage and data analysis.
 The patient or the care provider remotely activates the on-body sensors via the off-body unit;
the measurement data from the body sensors is securely transmitted continuously to the on-body
unit, where it is temporarily stored.
 Subsequently, the recorded measurement data is securely sent to the off body unit via batch
transmission for persistent storage and further analysis by the healthcare provider.
 Optionally, an off-body unit can also be used for secure waveform viewing during the
measurement. The healthcare professional uses the captured data to provide the appropriate
diagnosis or to adjust the treatment level.
53
e-Health/Body Area Networks
 Chronic disease monitoring encompasses the following:
 Patient alarm monitoring:
 The triggering of alarms based on preset conditions that are specific to the
patient and the disease.
 The patient’s vital signs (e.g., heart rate, temperature) and disease-specific
indicators (e.g., BP, EKG, EEG) are monitored on a continuous basis. The data
collected by the sensors is time-stamped and securely forwarded to a
gateway that acts as a patient monitoring system. The gateway securely
forwards the aggregated information to a database server.
 Additionally, at predetermined settings, alarms are issued and
responses/actions could be triggered automatically.
 For example, if during the monitoring of a diabetic patient the blood glucose
level falls below a certain threshold, an alert can be sent to the patient,
physician(s), and/or medical personnel.
54
e-Health/Body Area Networks
 Personal wellness monitoring concerns a person’s activity and safety (especially for
the elderly) which indludes;
 Monitoring an elderly person’s daily activity
 Safety monitoring scenario deals
 Monitoring an elderly person’s daily activity.
 A wearable medical sensors/devices that monitor the vital signs (e.g., heartbeat, body
temperature), this application involves monitoring other nonmedical sensors such as environmental
sensors.
 Monitors a certain daily schedule, for example, taking a weight measurement in the morning,
obtaining glucose level readings at 11 AM and at 5 PM, and so on, the caregiver can monitor the
daily activity status of the person. If certain routine activities are not completed, the person can be
sent a reminder.
 Safety monitoring scenario deals
 with monitoring the safety of the home environment. The home environment is monitored for safety
hazards including toxic gases, water, and fire. Additionally, the vital signs (e.g., heartbeat,
temperature) of the persons in the home are also monitored.
55
e-Health/Body Area Networks
 Personal fitness monitoring includes
 (i) monitoring and tracking fitness level
 (ii) personalized fitness schedule scenario
 The monitoring and tracking fitness level
 Focuses on tracking the fitness level or progress made by an individual.
 A number of parameters that the individual wishes to monitor are recorded as
that individual performs his/her workout routine (e.g., while running on a
treadmill, the individual monitors his/her heart rate, temperature, and blood
oxygen level).
 This information, obtained from medical sensors and is securely streamed to a
gateway or a collection data unit and displayed on the treadmill’s console in
real time, along with other performance information provided by the treadmill.
 Additionally, the gateway sends the information to a database server for
recordkeeping.
56
e-Health/Body Area Networks
 The personalized fitness schedule
 Focuses on personalization of the fitness schedule of an
individual.
 The schedule to be followed by that individual can be
entered by a trainer or the individual.
 For example, training for a marathon could include
running on a treadmill and distance according to a
schedule designed by his/her trainer. Also can monitor the
pace and the maximum heart rate, respiration pattern by
wireless medical device worn by the individual.
57
e-Health/Body Area Networks
 Some demonstrations of MBAN technology included the following:
 Fetal telemetry: A small, lightweight, and noninvasive way to
continuously monitor a baby’s health, while allowing the mother to
move freely.
 LifeLine home care pendants: A device that collects health information
for the elderly or those with chronic diseases allowing them to live
independently with the security and peace of mind that they are
being monitored.
 Predictive and early warning systems: Provides continuous monitoring to
help prevent sudden and acute deterioration of a patient’s condition.
 A greatly abbreviated press time list of specific illustrative examples
in this arena includes the following.
58
e-Health/Body Area Networks
 Sierra Wireless has developed Positive ID secure
modules to provide support for diabetics through
monitoring levels of glucose in the blood.
 Cinterion/Gemalto has developed Aerotel, a
system capable of modulating in real time the flow
of air sent to people suffering from sleep apnea;
 The NFC technology based “tracking” the quality of
sleep developed by iMPack, United States.
59
e-Health/Body Area Networks
 Following are research issues in WBANs:
 Antenna design for in- and on-body networks
 Channel modeling radio propagation issues for WBAN
 Electromagnetic radiation and human tissues
 Interference management and mitigation
 Coexistence of WBAN with other wireless technologies
 Protocols and algorithms for the PHY, MAC, and network layer
 End-to-end quality of service (QoS) provision for WBAN
 Energy-efficient and low power consumption protocols
 Power management for WBAN
 Integration of WBAN with heterogeneous networks
 (Lightweight) security, authentication, and cryptography solutions for WBAN
 Standardization activities
60
City Automation
 Some applications in this domain include the
following:
 Traffic flow management system in combination with
dynamic traffic light control
 Street light control
 Passenger information system for public transportation
 Passive surveillance
61
City Automation
 Generic city sensors include environmental sensors and activity sensors.
 Environmental sensors include:
 – thermal
 – hygrometric
 – anemometric
 – sound
 – gas
 – particles
 – light, other EM spectrum
 – seismic
 Activity sensors include:
 – pavement/roadway pressure
 – vehicle and pedestrian detection
 – parking space occupancy
62
City Automation
 ETSI TR 102 897: “Machine-to-Machine
Communications (M2M); Use Cases of M2M
Applications for City Automation” provides the
following description of these applications:
 Use Case 1: Traffic Flow Management System in
Combination with Dynamic Traffic Light Control.
 Use Case 2: Street Light Control.
 Use Case 3: Passenger Information System for Public
Transportation.
63
CityAutomation
Use Case 1: Traffic Flow Management System in Combination with Dynamic Traffic Light Control.
 The flow of road traffic within cities depends on a number of factors
 such as the number of vehicles on the road, the time and the day, the current or expected
weather, current traffic issues and accidents, as well as road construction work.
 Traffic flow sensors provide key traffic flow information to a central traffic flow
management system; the traffic flow management system can develop a real time
 traffic optimization strategy and, thus, endeavor to control the traffic flow.
 The traffic control can be achieved by
 dynamic information displays informing the driver about traffic jams and congested roads
 traffic signs can direct the traffic to utilize less used roads.
 The traffic flow management system can also interact with controllable traffic lights to extend
or to reduce the green light period to increase the vehicle throughput on heavy used roads
 dynamically changeable traffic signs can lead to an environment where the vehicular traffic
is managed more efficiently,
 This enables cities to reduce fuel consumption, air pollution, congestions, and the time
spent on the road.
64
CityAutomation
Use Case 2: Street Light Control.
 Street lights are not required to shine at the same intensity to
accomplish the intended safety goal.
 The intensity of light
 depend on conditions such as moonlight or weather.
 Adjusting the intensity helps to reduce the energy consumption
and the expenditures incurred by a municipality.
 The street light controller of each street light segment is
connected (often wirelessly) with the central street light
managing and control system.
 The control system can dim the corresponding street lights of a
segment remotely or is able to switch street lights on and off.
65
CityAutomation
Use Case 3: Passenger Information System for Public Transportation
 Public transportation vehicles, such as busses, subways, and commuter trains,
operate on a schedule that may be impacted by external variables and, thus,
have a degree of variability compared with a baseline formal schedule.
 Passengers need to know when their next connection is available; this information
also allows passengers to select alternative connections in the case of longer delays.
 In this application, the current locations of the various public transport vehicles
are provided to the central system that is able to match the current location
with the forecasted location at each time or at specific checkpoints also
calculate the current delay and the expected arrival time at the upcoming
stops.
 The vehicle current location can be tracked via GPS/general packet radio
service (GPRS) tracking devices that provide the position information in
regular intervals.
66
CityAutomation
Use Case 3: Passenger Information System for Public Transportation
 Two approaches are possible:
 First is With a checkpoint-based approach
 The line number (of the bus or the street car) is captured at each station where the
vehicle stops regularly, or at defined checkpoint in between.
 Because of the fact that the sensor at a specific station is able to provide the data
to the central system, the expected delay can be calculated by comparing the
information of the scheduled arrival time and the actual arrival time. This change
can be added to the arrival time displayed at each following station.
 Each vehicle must be equipped with a transponder (variously based on infrared,
radio frequency identification (RFID), short-range communication, or optical
recognition).
 In addition, each station has to be equipped with one or more checkpoint systems
that are able to readout or to receive the line number information of the vehicle.
 In case of larger stations with several platforms, multiple systems are needed.
67
CityAutomation
Use Case 3: Passenger Information System for Public Transportation
 Two approaches are possible:
 Second is With a GPS/GPRS-based approach,
 Each vehicle has to be equipped with a GPS/GPRS tracking device
that provide, besides the current position, the information that can be
directly or indirectly matched to the serviced line number.
 Based on the “regular” position/time pattern, the system is able to
calculate the actual time difference and provide the expected time on
the passenger display.
 A combination of checkpoint- and GPS/GPRS-based solution can
be used to integrate railed vehicles (such as subways and street
cars) and road vehicles (such as busses).
68
Automotive Applications
 IoT/M2M automotive and transportation
applications
 focus on safety, security, connected navigation, and
other vehicle services such as insurance or road pricing,
emergency assistance, fleet management, electric car
charging management, and traffic optimization.
 These applications typically entail IoT/M2M
communication modules that are embedded into the
car or the transportation equipment.
69
Automotive Applications
 Some of the applications as follows:
 bCall (breakdown call)
 Stolen vehicle tracking (SVT)
 Remote diagnostics
 Fleet management
 Vehicle-to-infrastructure communications
 Insurance services
70
Automotive Applications
bCall (breakdown call)
 A bCall sends the current vehicle position to a
roadside assistance organization and initiates a
voice call.
 The bCall trigger is usually a switch that is manually
pushed by the user in order to activate the service.
 An “enhanced” bCall service allows current vehicle
diagnostic information to be transmitted in addition
to the vehicle position.
71
Automotive Applications
Stolen vehicle tracking (SVT)
 A basic application for automotive M2M communications is tracking of mobile assets either for
purposes of managing a fleet of vehicles or to determine the location of stolen property.
 The SVT service
 provider periodically requests location data from the Telematics Control Unit (TCU) in the vehicle
and interacts with the police.
 The TCU may also be capable of sending out automatic theft alerts based on vehicle intrusion or
illegal movement.
 The TCU may also be linked to the Engine Management System (EMS) to enable immobilization or
speed degradation by remote command.
 Vehicles contain embedded M2M devices that can interface with location-determination
technology (such as standalone GPS, or network-based mechanisms such as assisted GPS, Cell-
ID) and can communicate via a mobile cellular network to an entity (server) in the M2M core.
 For theft tracking applications, the M2M device is typically embedded in an inaccessible or
inconspicuous place so that it may not be easily disabled by a thief.
 The tracking server is an entity located in the M2M core and owned or operated by the asset
owner or service provider to receive, process, and render location and velocity information
provided by the deployed assets.
72
Automotive Applications
Remote diagnostics
 Remote diagnostic services are as following categories:
 Maintenance minder
 when the vehicle reaches a certain mileage (e.g., 90% of the manufacturer’s recommended
service interval since the previous service), the TCU sends a message to the owner or the
owner’s named dealership, advising the owner (or the dealership) that the vehicle is due for
service.
 Health check
 Either on a periodic basis or triggered by a request from the owner, the TCU compiles the
vehicle’s general status using inbuilt diagnostic reporting functions and transmits a diagnostic
report to the owner, the owner’s preferred dealership, or to the vehicle manufacturer.
 Fault triggered
 When a fault (a diagnostic trouble code [DTC]) is detected with one of the vehicle systems,
this triggers the TCU to send the DTC code and any related information to the owner’s
preferred dealer, or to the vehicle manufacturer.
 Enhanced bCall
 When a manual breakdown call is initiated by the owner, the TCU sends both position data
and DTC status information to the roadside assistance service or to the vehicle manufacturer.
73
Automotive Applications
Fleet management
74
Automotive Applications
Fleet management
 The fleet owner wishes to track the vehicles—that is, to know, over time, the location
and velocity of each vehicle—in order to plan and optimize business operations.
 A fleet of vehicles have been deployed with M2M devices installed that are able
to:
 Interface with sensors on the vehicle that measure velocity
 Interface with devices that can detect position
 Establish a link with a mobile telecommunication network using appropriate network access
credentials, such as a USIM (universal subscriber identity module)
 A server in the fleet owner’s employ receives, aggregates, and processes the
tracking data from the fleet and provides this information to the fleet owner.
 Devices could be configured to autonomously establish communication with the
server via a cellular network either at regular intervals, at prescheduled times, or
based on some event such as crossing a geographic threshold.
 Alternatively, the M2M devices could be commanded by the M2M server to report
their location/velocity data.
75
Automotive Applications
Vehicle-to-infrastructure communications
76
Automotive Applications
Vehicle-to-infrastructure communications
 A European Intelligent Transport Systems Directive seeks the implementation of eSafety
applications in vehicles.
 Some vehicle manufacturers have deployed the vehicle-to-vehicle communication,
 for example, in the context of wireless access in vehicular environments (WAVE). On the other hand,
vehicle to roadside applications are less well developed; in this case, vehicles have embedded M2M
devices that can interface with location-determination technology and can communicate via a mobile
telecommunication network to an entity (server).
 The vehicles have been deployed with M2M devices installed that are able to:
 Interface with sensors on the vehicle that measure velocity, external impacts
 Interface with devices that can detect position
 Establish a link with a mobile telecommunication network using appropriate network access credentials,
such as a USIM
 Upload or download traffic and safety information to a traffic information server
 Devices could be configured to establish communication along with event triggered by a
vehicle sensor such as external impact, motor failure, and so on.
 For example, the traffic information server pushes roadside or emergency information out to
vehicles based on location (cell location or actual location). Or, vehicle information is pushed to
the traffic information server based on external sensor information, internal sensor information,
or subscription basis.
77
Automotive Applications
Insurance services
 Pay-as-you-drive (PAYD) schemes offer insurers the opportunity to reduce
costs based on actual risk and provide more competitive products to the
end-user based on getting feedback from the vehicle as to when, where,
how, or how far the vehicle is being driven (or a combination of these
factors).
78
Home Automation
 Basic applications of the automated home include
 remote media control, heating control, lighting control
(including low power landscape lighting control), and
appliance control, smart space are seen as “next-
step/next generation” applications, smart meters and
energy efficiency (making use of the potential of SG),
telehealth (e.g., assisted living and in-home m-health
services), security and emergency services.
79
Home Automation
 M2M communications is expected to play a major role in residences, where
instrumentation of elements supporting daily living appliances.
 Home control applications includes:
 Lighting control
 Thermostat/HVAC
 White goods (large electrical goods e.g. refrigerators and washing)
 Appliance control
 In-home displays
 Home security applications include but are not limited to:
 Door access phone
 Window locks
 Motion detector
 Smoke/fire alert
 Baby monitors
 Medical pendant
80
Home Automation
81
Home Automation
 Energy efficiency at home is a key application of interest
because of the possibility of monetary saving for the consumer.
 Occupancy sensors
 Can be used to establish whether there is somebody in a room or not
and when the room becomes unoccupied the lights are automatically
switched off.
 The M2M system allows reducing energy consumption by
automatically adapting the use of the house equipment to
various short-term situations (people moving in and out of rooms,
people going to work and retuning later) or long-term situations
(people taking vacations or long weekends or managing a
second/vacation home).
82
Smart Cards
 Smart cards (SCs) in general, and M2M-based systems in
particular, enable wired and wireless communication for a
large set of commercial and industrial applications.
 The purpose of an SC is to safeguard user identities and
secret keys and to perform requisite cryptographic
computations (an SC is a tamper-resistant device).
 SC technology includes contact and contactless systems.
 A terminal is the entity with which the SC can establish a
secure channel.
 Examples include generic card acceptance devices (CADs), a
CAD on a mobile handset, a Set-top box, a laptop/PC/tablet.
83
Smart Cards
UICC (Universal Integrated Circuit Card) environment, including user interfaces
Smart Cards
 A more inclusive list of SC applications is
as follows:
 Monitoring
 vending machines
 security systems
 industrial machines
 Automotive
 traffic management
 speed cameras
 Medical equipment
 Biometrics
 Cybersecurity
 Enterprise ID
 Government ID
 ePassport
 FIPS 201
 Real ID
 Passport Card/WHTI
 Healthcare
 Identity
 Logical access
 Market research
 Mobile telecommunications
 Network security
 Payments
 POS
 Contactless payments
 EMV payments
 Mobile payments/NFC
 Transportation payments
 Physical access
 Privacy
 RF/RFID tags
 Security
 ePassport security
 Contactless payments security
 Transit fare payment system security
 Transportation (toll tags, speed-of-vehicle
readers)
84
85
Smart Cards
 These applications require advanced, durable USIM cards.
 SCs are resource-limited devices because they are
designed to be economic and portable (small and light).
 Now SC memory size increased from KB to MB.
 SC helps
 to authenticate a person’s identity,
 determine the appropriate level of access,
 admit the cardholder to a facility,
 all from data stored on the card;
 Other authentication factors (such as biometric templates)
86
Smart Cards
 Currently, most POS terminals are connected with a wired
connection; as a consequence, the terminals are placed at a
fixed position which is inconvenience or restrict commerce to user.
 In some cases (e.g., remotely located POS terminals, parking meters,
garage checkout booths, and so on), a wired connection is difficult
and costly to be installed.
 An option, to connect POS terminals via a secure wireless
connection.
 As M2M communication modules are installed into wireless POS
terminals, street parking, and ticketing machines, and so on to
provide communication for credit or debit card online
transactions, new commercial applications become a reality
87
Smart Cards
 There are three basic contactless technologies
considered for physical access control applications:
 125 kHz,
 ISO/IEC 14443
 ISO/IEC 15693 technologies.
88
Smart Cards
 125 kHz read-only technology
 In RFID access control systems and is based on de facto
industry standards rather than international standards.
 Also allows for a secure, uniquely coded number to be
transmitted and processed by a back-end system. The
back-end system then determines the rights and
privileges associated with that card.
89
Smart Cards
 ISO/IEC 14443 and ISO/IEC 15693 standards
 are intelligent, read/write devices capable of storing different
kinds of data and operating at different ranges.
 Contactless SCs operate at 13.56 MHz and are further divided
into proximity (ISO 14443) and vicinity (ISO 15693) devices with
nominal operating ranges of up to 10 cm and 1 m, respectively.
 ISO 14443 specifies A and B operation modes that use different
communication and card selection procedures.
 The ISO 14443A standard is used with most contactless cards and
is compatible with the lower layers of popular commercial products.
 (ISO 14443-2), anti-collision routines (ISO 14443-3), and
communication protocols (ISO 14443-4).
90
Smart Cards
 ISO/IEC 14443 and ISO/IEC 15693 standards
 are intelligent, read/write devices capable of storing different
kinds of data and operating at different ranges.
 Contactless SCs operate at 13.56 MHz and are further divided
into proximity (ISO 14443) and vicinity (ISO 15693) devices with
nominal operating ranges of up to 10 cm and 1 m, respectively.
 ISO 14443 specifies A and B operation modes that use different
communication and card selection procedures.
 The ISO 14443A standard is used with most contactless cards and
is compatible with the lower layers of popular commercial products.
 (ISO 14443-2), anti-collision routines (ISO 14443-3), and
communication protocols (ISO 14443-4).
91
Smart Cards
 NFC setups allow a device
 enables communication with another NFC compatible device or a small NFC tag
holding the information the reader wants.
 store information and communicate with the reader, but do not actively read other
devices
 Peer-to-peer communication through two active devices
 maintains interoperability between different wireless communication methods such as
Bluetooth and other NFC standards
 secure and remains easy to use with different versions of the technology
 able to communicate with other wireless technologies
 Applications of NFC
 by integrating credit cards, subway tickets, and paper coupons all into one device, a
customer can board a train, pay for groceries,
 redeem coupons or store loyalty points, and even exchange contact information all
with a smartphone.
92
Smart Cards
 SC use depends on the environment in which they are deployed.
 Banking
 user information includes identity, account information, and possibly
information on recent transactions made and secret keys used in security
functions
 There are no peripherals that allow user direct access, such as a keyboard or
a screen
 Mobile communications
 user information includes identity, personal information such as address book,
operator-related information, and again secret keys used in security functions.
 UICC (Universal Integrated Circuit Card)
 The SC used in mobile terminals in GSM and UMTS networks. The UICC SC
typically has a CPU, ROM, RAM, EEPROM, and I/O circuits.
93
Smart Cards
 SC for Medical/Hospital
 Health system is subject to extensive major fraud and where the costs of
conventional treatment of medical data are becoming difficult to manage.
 The Health Information Technology for Economic and Clinical Health
(HITECH) Act, United States, encourages stakeholders (patients, doctors,
nurses, specialists, pharmacists, and so on) in the health ecosystem to work
toward the creation of a network (protected health infrastructure) for the
collection and exchange of standardized medical data (electronic health
record) using “certified technology” capable of simultaneously ensuring the
availability, sharing, security, accuracy, and confidentiality of such data.
 SC that stores personal medical information (allergies, blood type, current
treatment, and so on), especially in emergency situations.
 E.g. Life Nexus 4 launched a health card
94
Smart Cards
Examples of SC/UICC applications:
 Digital rights management (DRM) and distributed applications.
 DRM is used to secure media content owned by a service provider;
the end-user has a limited set of rights to use the content.
 Usually, media content is supposed to be rendered on any type of
compatible terminal (e.g., CD audio on any CD player) so that the user
can transport his/her content wherever he/she wants.
 When the user is a mobile network operator (MNO) subscriber, the
rights are bound to a device, not to a user.
 This implies that when the user needs to change the handset, the rights
have to be downloaded onto the new device and the certificates are to
be recalculated with the new terminal ID.
95
Smart Cards
Examples of SC/UICC applications:
 The UICC is a control point for device management (DM).
 DM aims to provide the protocols and mechanisms to achieve remote
management of devices.
 DM includes:
 (a) setting initial configuration information in devices;
 (b) subsequent installation and updates of persistent information in devices
(firmware update);
 (c) retrieval of management information from devices;
 (d) processing events and alarms generated by devices.
 In this application, the SC inserted in the device is expected to:
 (i) support dynamic provisioning of the device with up-to-date information
 (ii) handle a part of the security during the update of device firmware
(service access controlled by the operator, authentication of the origin, and
so on).
96
Smart Cards
Examples of SC/UICC applications:
 Multimedia file management.
 As the UICC will be able to store and encrypt/decrypt
multimedia files like MMS, pictures, MP3 files, video
clips customer’s usability and quality user experience
cannot be compromised by a too long wait for the data
download/upload.
 E.g. Display image or video when accessing
phonebook.
97
Smart Cards
Examples of SC/UICC applications:
 Man–machine interface (MMI) on UICC.
 Large-sized SCs offer the possibility to store card
issuer’s MMI in the UICC.
 During initialization process, the terminal can detect the
type of UICC (which operator, which service providers,
which features) and upload the whole MMI that the
card issuer has defined for its purposes and its services.
98
Smart Cards
Examples of SC/UICC applications:
 Real-time multimedia data encryption/decryption.
 Storage of terminal applications on the UICC
 Direct and indirect UICC connection to a PC.
99
Tracking
(Following And Monitoring Mobile Objects)
 Track and trace applications are
 Automotive environments, goods movement in
production environments, distribution, and retail, also
RFID tags are often utilized.
100
Tracking
(Following And Monitoring Mobile Objects)
101
Tracking
(Following And Monitoring Mobile Objects)
102
Tracking
(Following And Monitoring Mobile Objects)
 Tracking (such as vehicles of any kind, containers, people, pets, and so
on) is a common application implemented in conjunction with GPS; it
can also be implemented using cellular technology.
 GPS is based on a cluster of satellites that continually send out signals.
The satellites orbit the earth approximately every 12 h; the height of
the orbits is about 20,183 km in the MEO (medium earth orbit).
 GPS receivers can determine their position based on the time delay
between transmission and reception of the signals transmitted by the
satellites.
 The satellites are arranged on six planes, each of them containing at
least four slots where satellites can be arranged equidistantly.
 Typically more than 24 GPS satellites orbit the earth.
103
Tracking
(Following And Monitoring Mobile Objects)
104
Tracking
(Following And Monitoring Mobile Objects)
 A basic service arrangement:
 the DEP is comprised of a GPS sensor and a cellular
modem; the GPS sensor transfers the position data to
the cell modem and the modem transmits the position
data to the DIP via a cellular network.
 The positioning data is then manipulated, displayed
(e.g., using a map or GIS—geographic information
system), and/or stored as needed.
105
Tracking
(Following And Monitoring Mobile Objects)
106
Over-The-Air-Passive Surveillance/Ring of Steel
 Integrated open-air surveillance (IOS) technologies
 High resolution digital video surveillance (DVS), license
plate recognition technology, facial recognition systems,
traffic light cameras, gunshot detection systems (GDSs),
aerial surveillance with drones (UAVs—unmanned aerial
vehicles)
 Technologies that support public safety mandates at a
reduced surveillance/ interdiction costs for those
jurisdictions that deploy the infrastructure,
 While at the same time generating revenues for service
providers and system integrators.
107
Over-The-Air-Passive Surveillance/Ring of Steel
 Open air refers to the fact that the surveillance is done in
the public domain
 for example, with
 (i) high resolution (even low light level) digital video cameras
(which can be wired and/or wireless); (ii) license plate/face
recognition technology; (iii) GDSs; and (iv) other related
technologies or sensors.
 Integrated refers to the internetworking of multiple
geographically dispersed systems and multiple
technologies with database systems that may archive a
variety of pertinent background data or metadata.
108
Over-The-Air-Passive Surveillance/Ring of Steel
 IOS enables the collection, aggregation, and
analysis of factors in physical public view.
 There are legitimate legal law enforcement uses of
the technology, but also there are other uses of the
technology.
109
Over-The-Air-Passive Surveillance/Ring of Steel
 During the 1990s, the City of London, England, deployed for
a security and surveillance an electronic cordon surrounding
the city. The popular know as Ring of Steel. In 2005, the Ring
of Steel was widened to include more businesses in the City.
 In 2007, New York City announced plans to install an array
of cameras and roadblocks designed to detect, track, and
deter terrorists; this effort is known as the Lower Manhattan
Security Initiative,
 US, federal budget sought to increase the amount of money
spent on surveillance technology and programs, o install in
cities, colleges or public places.
110
Over-The-Air-Passive Surveillance/Ring of Steel
Generalized scenario of dispersed IOS equipment
111
Over-The-Air-Passive Surveillance/Ring of Steel
Generalized scenario of dispersed IOS equipment
 A generalized scenario of dispersed equipment
such as video cameras, triangularization devices,
and wireless sensors connected over a
(multitechnology) network to a control/operations
center.
 Connected with available wireless technology.
112
Over-The-Air-Passive Surveillance/Ring of
Steel
 IOS’ baseline objective is to create and maintain (through
a combination of technologies and analysis tools) a “crime-
free zone” within an urban or suburban environment by
securing a perimeter both physically and electronically.
 Face recognition technology will become widespread in the
future to find any crime suspect.
 IOS functionality, however, can go beyond routine law
enforcement to find bit of information gathered and can
do data mining.
113
Over-The-Air-Passive Surveillance/Ring of
Steel
 IOS approaches can be taxonomized as follows:
 Public space open-air surveillance:
 Methods of collecting (any type of) information about individuals when they
are in any public environment (whether indoors or outdoors). Examples are
people in a crowd, people in the street, cars with toll tags, and so on.
 Private space open-air surveillance:
 Methods of collecting (any type of) information about individuals when they
are in a private environment, typically indoors. Examples are people in a
doctor’s office, people at work, and so on.
 Hybrid public/private space open-air surveillance:
 Methods of collecting (any type of) information about individuals that
crosses both boundaries. Examples include using cell phones to track
movements.
114
Over-The-Air-Passive Surveillance/Ring of
Steel
 At the macro level, three drivers have been offered
for IOS services:
 Detection/prevention of crimes
 Anti-terrorism
 Increased municipal revenue collection via remote
monitoring of infractions
115
Over-The-Air-Passive Surveillance/Ring of
Steel
 Technologies that can be deployed in integrated open-air surveillance consist
of:
 High resolution (low light level) DVS (wired & wireless).
 Cameras can be indoor/outdoor, PTZ (pan, tilt, zoom) and configured in covert or
exposed modes depending upon deterrent philosophy, field conditions, and field of
view considerations.
 Outdoor cameras will be physically hardened, vandal–proof and pole, wall and
surface mountable.
 Transport media (copper, fiber, wireless) and camera power (wired, solar, battery)
will depend upon physical constraints. Dozens to hundreds of cameras will be
deployed in a scalable architecture.
 Recording can be selective or under all conditions at all times for a given view.
 These cameras can be remotely controlled by police to PTZ and rotate; have day
and night vision capabilities, and wireless technologies. The cost can be as high as
$60,000 per unit for some complex systems.
116
Over-The-Air-Passive Surveillance/Ring of
Steel
 Technologies that can be deployed in integrated open-air
surveillance consist of:
 Image processing systems (at the command center)
 To analyze the video streams in real time, alert law-enforcement
personnel, and detect aberrant behavior (individuals walking
erratically, lying prone), imagery of interest (e.g., crowd gathering,
individuals running, etc.) as well as simple motion detection and if
possible facial recognition of “persons of interest.”
 License plate recognition
 Of both parked and moving vehicles (within the field of view) at
speeds up to 60 MPH moving past certain checkpoints. This can be
augmented with UPC handheld scanners of registration stickers by
roving patrols.
117
Over-The-Air-Passive Surveillance/Ring of
Steel
 Technologies that can be deployed in integrated open-air surveillance consist of:
 GDSs
 Using acoustic triangulation technology (pioneered with great success in Iraq to ferret out
night snipers). GDS will be integrated with DVS so that after detecting gunfire, DVS will
“train” on specific areas viewing in zoom for low light conditions and initiating event
recording.
 Moveable barrier technology
 to inhibit selectively the movement of people and vehicle and/or people at designated
checkpoints.
 Real-time position reporting system
 For vehicles, personnel, assets (VPA) using a combination of GPS, radio triangulation, and
other automated vehicle locator (AVL) technologies (sign post transponders/checkpoints);
personnel can be equipped with either or both active transponders/vehicles also. The
tracking can start with inexpensive techniques (available from cell phone or other
portable radio systems) and evolve to military-style resolution (+/ 1 m).
−
118
Control Application Examples
 Controlling vending machines.
 Vending machines can be found in a variety of locations, for example inside
office or public buildings, outdoors in public places, and gas stations.
 The re-stocking and maintenance of vending machines is typically done
manually by staffers that visit the vending machines at regular intervals to
check the re-stock levels, re-stock the machines, and perform any requisite
maintenance functions.
 The introduction of M2M technology automates vending machine
management:
 By having access to a (mobile) telecommunication network, the built-in M2M
communication module provides information to the operator about the current
status of the vending machine (e.g., current fill-levels, maintenance status,
possible damages, malfunctions, and so on); as a consequence, the vending
machines need only to be visited when absolutely required.
119
Control Application Examples
 Controlling production machines.
 Various industrial processes make use of dispersed production
devices (including but not limited to construction machines,
manufacturing machines, food production machines, and so on). These
machines may be exposed to harsh environments driving repair and
maintenance requirements.
 This maintenance is typically done by dedicated personnel who have
to visit the production machines at regular intervals to repair,
perform maintenance, and identify damages or malfunction.
 M2M technologies improve the efficiency and optimization of the
operation by allowing access to a mobile telecommunication network
to forward information about the current status of the production
machine
120
Myriad Other Applications
 M2M and SCADA applications are now also being
extended to support over satellite links.
 Satellite service providers perceive M2M
communications as an approach the global demand
for uninterrupted and seamless data connectivity
across a mixture of urban, suburban, exurban, rural,
and oceanic environments: satellite-based M2M can
facilitate the delivery of small quantities of
information to and from anywhere in the world.
09/12/2024
121
CONVERGENCE OF IT AND OT
 IT supports connections
to the Internet along
with related data and
technology systems
and is focused on the
secure flow of data
across an organization.
 OT monitors and
controls devices and
processes on physical
operational systems.
Information Technology Operational Technology
09/12/2024
122
CONVERGENCE OF IT AND OT
 IT organization is
responsible for the
information systems of
a business, such as
email, file and print
services, databases,
and so on.
 OT is responsible for the
devices and processes acting
on industrial equipment, such
as factory machines, meters,
actuators, electrical
distribution automation
devices, SCADA (supervisory
control and data acquisition)
systems, and so on.
Information Technology Operational Technology
09/12/2024
123
CONVERGENCE OF IT AND OT
 OT has used dedicated
networks with specialized
communications protocols
to connect these devices,
and these networks have
run completely separately
from the IT networks.
Information Technology Operational Technology
09/12/2024
124
CONVERGENCE OF IT AND OT
 OT has used dedicated
networks with specialized
communications protocols
to connect these devices,
and these networks have
run completely separately
from the IT networks.
Information Technology Operational Technology
09/12/2024
125
09/12/2024
126
IOT CHALLENGES
09/12/2024
127
IOT CHALLENGES

More Related Content

PPTX
TheInternetofThings
PDF
An Internet of Things blueprint for a smarter world
PPTX
Internet of Things (IOT) - Lecture 1.pptx
PDF
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
PPTX
Case study.pptx
PPTX
Internet of Things (IOT) - Lecture 1.pptx
PPTX
Internet of Things (IOT) - Lecture 1.pptx
PPTX
Lecturegsdhgfjdffjhdfjdfdgjfhgfgfgjfhjdh 1.pptx
TheInternetofThings
An Internet of Things blueprint for a smarter world
Internet of Things (IOT) - Lecture 1.pptx
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
Case study.pptx
Internet of Things (IOT) - Lecture 1.pptx
Internet of Things (IOT) - Lecture 1.pptx
Lecturegsdhgfjdffjhdfjdfdgjfhgfgfgjfhjdh 1.pptx

Similar to Module 1_I.pptx Internet of Things applications (20)

PPTX
Next Decade of Internet of Things and its
PDF
Connecting the Everyday: How the Internet of Things is Reshaping our World
PDF
Iot Market Readiness
PPTX
MODULE 1_PPT in cloud computing in computer.pptx
PDF
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
PDF
Application and Usefulness of Internet of Things in Information Technology
PDF
New Trends in Internet of Things, Applications, Challenges, and Solutions
PPTX
Iot trends and technologies development in terms of Machine Learning
PPTX
Internet of Things
PDF
nptel-1.pdf
PDF
nptel 1, introduction to iot, By Prof. Sudip Misra
PPTX
Internet of Things (IOT)-midterm.pptx
PPTX
IOT Demystified
PDF
VET4SBO Level 1 module 3 - unit 1 - v1.0 en
PDF
IoT with 5G-Network
PDF
5G What it means for IoT
PPTX
Internet of things
DOCX
PDF
Livre blanc iot
PPT
IOT_BDA_Proposal_Draft (1).ppt
Next Decade of Internet of Things and its
Connecting the Everyday: How the Internet of Things is Reshaping our World
Iot Market Readiness
MODULE 1_PPT in cloud computing in computer.pptx
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
Application and Usefulness of Internet of Things in Information Technology
New Trends in Internet of Things, Applications, Challenges, and Solutions
Iot trends and technologies development in terms of Machine Learning
Internet of Things
nptel-1.pdf
nptel 1, introduction to iot, By Prof. Sudip Misra
Internet of Things (IOT)-midterm.pptx
IOT Demystified
VET4SBO Level 1 module 3 - unit 1 - v1.0 en
IoT with 5G-Network
5G What it means for IoT
Internet of things
Livre blanc iot
IOT_BDA_Proposal_Draft (1).ppt
Ad

Recently uploaded (20)

PPTX
additive manufacturing of ss316l using mig welding
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPT
Mechanical Engineering MATERIALS Selection
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PDF
Arduino robotics embedded978-1-4302-3184-4.pdf
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
composite construction of structures.pdf
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PDF
Well-logging-methods_new................
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
Sustainable Sites - Green Building Construction
PPTX
Geodesy 1.pptx...............................................
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
web development for engineering and engineering
additive manufacturing of ss316l using mig welding
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Mechanical Engineering MATERIALS Selection
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Model Code of Practice - Construction Work - 21102022 .pdf
Arduino robotics embedded978-1-4302-3184-4.pdf
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
composite construction of structures.pdf
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Well-logging-methods_new................
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Sustainable Sites - Green Building Construction
Geodesy 1.pptx...............................................
Foundation to blockchain - A guide to Blockchain Tech
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
web development for engineering and engineering
Ad

Module 1_I.pptx Internet of Things applications

  • 2. 2 Topics  What is IoT?  Genesis of IoT  IoT and Digitization  IoT Impact  Convergence of IT and OT  IoT Challenges  IoT Network Architecture and Design
  • 3. 09/12/2024 3 What is IoT?  What is Internet?  The Internet is the global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link devices worldwide. It is a network of networks that consists of private, public, academic, business, and government networks of local to global scope, linked by a broad array of electronic, wireless, and optical networking technologies. The Internet carries an extensive range of information resources and services, such as the inter-linked hypertext documents and applications of the World Wide Web (WWW), electronic mail, telephony, and peer-to-peer networks for file sharing.  What is things?  Object like Computer, Mobile Phone, Sensor
  • 4. 4 IoT  From self-driving drones delivering your grocery order to sensors in your clothing monitoring your health, the world you know is set to undergo a major technological shift forward. This shift is known collectively as the Internet of Things (IoT)  Connect the unconnected
  • 6. 09/12/2024 6 Genesis of IoT  Started between the year 2008 and 2009.  Creation of the term “Internet of Things” is by Kevin Ashton. While working for Procter & Gamble supply chain, linking to internet 1999,  Kevin’s prediction –  computers were brains without senses - computers are sensing things for themselves
  • 9. 09/12/2024 9 IoT AND DIGITIZATION  IoT focuses on connecting “things,” such as objects and machines, to a computer network, such as the Internet. Ex: Wi-Fi devices  Digitization means “things” with the data they generate and the business insights that results. Ex: Capturing location and time through Wi-Fi devices  conversion of information into a digital format  Identify IoT and digitization in  video rental industry  transportation industry
  • 10. 09/12/2024 10 IoT IMPACT  About 17 billion of “things” are connected to the Internet today(end of 2018) out of which 7 billion are IoT devices  Cisco Systems predicts that by 2020, this number will reach 50 billion  Cisco further estimates that these new connections will lead to $19 trillion in profits and cost saving
  • 12. 09/12/2024 12 Connected Roadways  self-driving car, or autonomous vehicle (Google’s self-driving car) IoT is also a necessary component for implementing a fully connected transportation infrastructure.
  • 13. 09/12/2024 13 Connected Roadways  Automobiles are equipped with thousands of sensors  These sensors are becoming IP-enabled to allow easy communication with other systems both inside and outside the car.  new sensors and communication technologies are being developed to allow vehicles to “talk” to other vehicles, traffic signals, school zones, and other elements of the transportation infrastructure. We are now starting to realize a truly connected transportation solution.
  • 17. 09/12/2024 17 Connected Factory The main challenges facing manufacturing in a factory environment today,  Accelerating new product and service introductions to meet customer and market opportunities  Increasing plant production, quality, and uptime while decreasing cost  Mitigating unplanned downtime (which wastes, on average, at least 5% of production)  Securing factories from cyber threats  Decreasing high cabling and re-cabling costs (up to 60% of deployment costs)  Improving worker productivity and safety
  • 18. 09/12/2024 18 Industrial enterprises around the world are retooling their factories with advanced technologies and architectures to resolve these problems and boost manufacturing flexibility and speed. These improvements help them achieve new levels of overall equipment effectiveness, supply chain responsiveness, and customer satisfaction. A convergence of factory- based operational technologies and architectures with global IT networks is starting to occur, and this is referred to as the connected factory.
  • 20. 20 Internet of Things Application Examples
  • 21. 21 Overview  Related to IoT applications, proponents make the observation that (1)  “ . . . there are so many applications that are possible because of IoT. For individual users, IoT brings useful applications like home automation, security, automated devices monitoring, and management of daily tasks. For professionals, automated applications provide useful contextual information all the time to help on their works and decision making. Industries, with sensors and actuators operations can be rapid, efficient and more economic. Managers who need to keep eye on many things can automate tasks connection digital and physical objects together. Every sectors energy, computing, management, security, transportation are going to be benefitted with this new paradigm. Development of several technologies made it possible to achieve the vision of Internet of things. Identification technology such as RFID allows each object to represent uniquely by having unique identifier. Identity reader can read any time the object allows real time identification and tracking. Wireless sensor technology allows objects to provide real time environmental condition and context. Smart technologies allow objects to become more intelligent which can think and communicate. Nanotechnologies are helping to reduce the size of the chip incorporating more processing power and communication capabilities in a very small chip.
  • 24. 24 Overview  Some of the possible short-term applications include the following:  building automation and remote control (facilitating efficient commercial spaces)  smart energy (supporting office building/ home energy management)  healthcare (providing health and fitness monitoring)  home automation (giving rise to smart homes)  retail services (enabling smart shopping).
  • 25. 25 Overview  A longer list of applications includes, but is not limited to, the following:  Public services and smart cities:  Telemetry: for example, smart metering, parking metering, and vending machines  Intelligent transportation systems (ITSs) and traffic management  Connecting consumer and citizens to public infrastructure (such as public transportation)  In-building automation, municipal, and regional infrastructure  Metropolitan operations (traffic, automatic tolls, fire, and so on)  Electrical grid management at a global level; smart grids (SGs)  Electrical demand response (DR) at a global level
  • 26. 26 Overview  A longer list of applications includes, but is not limited to, the following:  Automotive, fleet management, asset tracking:  e-Vehicle: for example, navigation, road safety, and traffic control  Driver safety and emergency services  Fleet management systems: hired-car monitoring, goods vehicle management  Back-seat infotainment device integration  Next-generation global positioning system (GPS) services  Tracking: asset tracking, cargo tracking, and order tracking
  • 27. 27 Overview  A longer list of applications includes, but is not limited to, the following:  Commercial markets:  Industrial monitoring and control, for example, industrial machines, and elevator monitoring  Commercial building and control  Process control  Maintenance automation  Home automation  Wireless automated meter reading (AMR)/load management (LM)  Homeland security applications: chemical, biological, radiological, and nuclear wireless sensors  Military sensors  Environmental (land, air, sea) and agricultural wireless sensors  Finance: Point-of-sale (POS) terminals, ticketing  Security: Public surveillance, personal security
  • 28. 28 Overview  A longer list of applications includes, but is not limited to, the following:  Embedded networking systems in the smart home and smart office:  Smart appliances: for example, AC-power control, lighting control, heating control, and low power management  Automated home: remote media control  Smart meters and energy efficiency: efficiencies obtained by exploiting the potential of the SG  Telehealth (e-health): Assisted Living and in-home m-health services (including remote monitoring, remote diagnostic)  Security and emergency services: integrated remote services
  • 29. 29 Overview  ETSI (European Telecommunications Standards Institute.) has published a number of use cases for IoT (specifically for M2M) applications in the following documents:  ETSI TR 102 691: “Machine-to-Machine Communications (M2M); Smart Metering Use Cases.”  ETSI TR 102 732: “Machine-to-Machine Communications (M2M); Use Cases of M2M Applications for eHealth.”  ETSI TR 102 897: “Machine-to-Machine Communications (M2M); Use Cases of M2M Applications for City Automation.”  ETSI TR 102 875: “Access, Terminals, Transmission, and Multiplexing (ATTM); Study of European Requirements for Virtual Noise for ADSL2, ADSL2plus, and VDSL2.”  ETSI TR 102 898: “Machine-to-Machine Communications (M2M); Use Cases of Automotive Applications in M2M Capable Networks.”  ETSI TS 102 412: “Smart Cards; Smart Card Platform Requirements Stage 1 (Release 8).”  The International Organization for Standardization (ISO) has published the following relevant document, among others:  ISO 16750: “Road Vehicles—Environmental Conditions and Testing for Electrical and Electronic Equipment.”
  • 30. 30 Smart Metering/Advanced Metering Infrastructure  The European Technology Platform for Electricity Networks for the Future defines an SG as:  “an electricity network that can intelligently integrate the actions of all users connected to it—the consumers, the power generators, and those that do both—in order to efficiently deliver sustainable, economic, and secure electricity supplies.”  A key element of an SG is a smart metering network that enables automated metering capabilities on the customer side (downstream).  On the upstream, the utility acquires the capability for real-time grid monitoring and for information processing of significant network events; this includes fault detection, isolation, and resolution.
  • 31. 31 Smart Metering/Advanced Metering Infrastructure  Specifically, a smart metering network enables a utility company to  (i) remotely connect or disconnect power to individual customers,  (ii) remotely or automatically update the grid configuration,  (iii) collect power consumption data in variable time intervals  (iv) modulate customer loads automatically during critical demand periods.  The SG is also able to automatically detect theft and is able to notify the utility if a meter is tampered with.
  • 32. 32 Smart Metering/Advanced Metering Infrastructure  The general goal is to monitor and control the consumption of utilities-supplied consumable assets, such as electricity, gas, and water.  Utility companies deploy intelligent metering services by incorporating M2M communication modules into metering devices (“the thing”);  These intelligent meters are able to send information automatically (or on demand) to a server application that can directly bill or control the metered resource.  The ultimate objective is to improve energy distribution performance and efficiency by utilizing accurate real-time information on endpoint consumption.
  • 33. 33 Smart Metering/Advanced Metering Infrastructure  Example of a smart flowmeter for a water utility application
  • 34. 34 Smart Metering/Advanced Metering Infrastructure  Advanced Metering Infrastructure (AMI)
  • 35. 35 Smart Metering/Advanced Metering Infrastructure  AMI can utilize a number of methods and communication standards to communicate between physical service layers, some combinations and/or refinements of existing communication protocols are required.  In previous slide a number of power line carrier (PLC)-based communication approaches are  Technically feasible, at the currently no such technologies and protocols that have not reached the level of technical maturity and cost competitiveness.  Industry and/or standards organizations such as the European Commission (EC) has given support to the following initiatives for devices supporting :  EC’s M/411 Smart Metering Mandate: The objective is to build standards for European smart meters, allowing interoperability and consumer actual consumption awareness.  EC’s M/490 SG Mandate: The objective is to build standards for European SGs.
  • 36. 36 Smart Metering/Advanced Metering Infrastructure  The advanced metering infrastructure (AMI) is the electric information service infrastructure that is put in place between the end-user (or end device) and the power utility.  AMI is a system for implementing the SG (Smart Grid), and it is the principal means for realizing DR (demand response).  Shipments of smart meter units were expected to continue to grow.
  • 37. 37 Smart Metering/Advanced Metering Infrastructure  The combination of the AMI meter and an appropriate home area network (HAN) enables consumers  to become aware of electricity consumption costs on a near real-time basis  to be able to monitor their energy usage;  to manage their usage based on their financial metrics.  To assist consumers manufacturers are designing products that contain built-in communication systems that communicate with the HAN (and the AMI meter).  System having knowledge of the cost of electricity and of the consumer preferences, these smart devices are able to manage appliances to either defer operation or adjust the operating condition to reduce peak energy demand.  Peak reduction can save utilities money by helping them avoid the construction of new peaking power plants or upgrading infrastructure; that exist only to handle peak loads.
  • 38. 38 Smart Metering/Advanced Metering Infrastructure  AMI complex system and HAN communication network should preferably be based on a network technology that  (i) utilizes open standards,  (ii) is low cost  (iii) consumes a minimum amount of energy  (iv) does not require extensive new infrastructure.  Metering devices are typically monitored and controlled by a centralized entity outside or inside the network operator system.  The centralized not only to control also entity will inform or poll the metering device when it needs measurement information rather than the metering device autonomously sending measurements.  Depending on the nature of the metering application, low latency responses are sometimes required (metering for high pressure pipelines, for example).  To accomplish this, the centralized entity will need to inform the metering device when it needs a measurement.  Metering addressing is limitation of IPv4 address space and it is desirable to utilize IPv6.
  • 39. 39 e-Health/Body Area Networks  e-Health applications include health and fitness.  Mobile health monitoring systems  These applications make use of one or more biosensors placed on, or in, the human body, enabling the collection of a specified set of body’s parameters to be transmitted and then monitored remotely.  The on-body sensors are generally light and the links are wireless in nature, allowing the patient to enjoy a high degree of mobility.  These sensors make patients free from the set of wires that would otherwise tie the patients to a specific site at home or to a hospital bed.  Body sensor units, each containing a biosensor, a radio, an antenna and some on-board control and computation.  These on-body sensor systems—the sensors and the connectivity—are called wireless body area networks (WBANs), or medical body area networks (MBANs), or medical body area network system (MBANS).
  • 40. 40 e-Health/Body Area Networks  Wireless body area network/Medical body area network
  • 41. 41 e-Health/Body Area Networks  MBAN technology consists of sensors which are  small, low powered on the body that capture clinical information, such as temperature and respiratory function. Sensors are used for monitoring and trending for disease detection, progression, remission, and fitness.  As patients recover, MBANs allow them to move about the healthcare facility, while still being monitored for any health issues that might develop.  MBANs consist of two paired devices  one that is worn on the body (sensor)  another that is located either on the body or in close proximity to it (hub).  Some of these devices are  disposable and are similar to a band-aid in size and shape;  the disposable sensors include a low power radio transmitter.  Sensors typically register patient’s temperature, pulse, blood glucose level, blood pressure (BP), and respiratory health  The benefits include increased mobility, better care, and lower costs
  • 42. 42 e-Health/Body Area Networks  Examples of health care related sensors device includes:  Glucose meter: That measures the approximate concentration of glucose in the blood; it is used by chronic disease (e.g., diabetes) management applications.  Pulse oximeter: That indirectly measures the amount of oxygen in a patient’s blood (oxygen saturation (SpO2)).  Electrocardiograph (ECG): That records and measures the electrical activity of the heart over time.  Social alarm devices: That allow individuals to raise an alarm and communicate with a caretaker when an emergency situation occurs; the caretaker may be a monitoring center, a medical care team, or a family member; these include devices fall detector and panic pendant/wrist transmitters.
  • 43. 43 e-Health/Body Area Networks  A WBANs/MBANs/MBANSs should make formalization and standardization of wireless on-body monitoring technology which include low power radio system used for the transmission of non-voice data to and from medical devices, especially in terms of frequency bands and communications at the higher layers (PHY, MAC, IP).  In WBANs/MBANs body wireless sensors work to collect multiple vital sign parameters and/or medical actuator devices and that communicate with a monitoring device placed on/around (up to 10 m from) the human body.  Today, existing technologies allow for wired solutions (bundle-of-wires) for monitoring patient vital signs as well as controlling actuators such as ventilators and infusion pumps. On-body sensors measuring vital signs of a patient and actuators are typically wired up to a bedside patient monitor.
  • 44. 44 e-Health/Body Area Networks  In Europe, introduced the first wireless patient monitoring solutions operating in the generic short-range device (SRD) band from 2400 MHz to 2483.5 MHz with intensive use of this band by other applications (such as WiFi R , Bluetooth R , and ISM equipment), but it’s not reliability as increases the healthcare facilities.  Assistive technology (AT).  AT can be defined as “any device or system that allows an individual to perform a task that they would otherwise be unable to do, or increases the ease and safety with which the task can be performed”  Another definition is “any product or service designed to enable independence for disabled or older people”
  • 45. 45 e-Health/Body Area Networks  Benefits of (and/or motivations for) MBAN technology
  • 47. 47 e-Health/Body Area Networks  Devices communicating with classic smartphones using  Near field communication (NFC)  Bluetooth low energy (BLE),  ZigBee
  • 48. 48 e-Health/Body Area Networks  ZigBee  Enabling the deployment of reliable, cost-effective, low power, wireless monitoring and control products based on an open IEEE standard;  it was designed with simplicity in mind and is efficient in the use of power, allowing monitoring devices to operate on commonly available batteries for years.  BLE (Bluetooth low energy )  A low power version of Bluetooth capable of reporting data from a sensor for up to a year from a small button battery; although the data rate and radio range is lower than that of classic Bluetooth, also an IEEE standard, the low power and long battery life make it suitable for short-range monitoring applications in medicine.  NFC (Near field communication)  A form of contactless communication between devices such as smartphones or tablets and readers. Contactless communication allows a user to wave the smartphone over an NFC-compatible device to send information without requiring the devices to touch or to use a cable.
  • 49. 49 e-Health/Body Area Networks  Mid-2012, the US Federal Communications Commission (FCC) proposal to allocate spectrum bandwidth in the United States for use of body sensors to monitor wirelessly a variety of patient’s vital signs using MBANSs.
  • 50. 50 e-Health/Body Area Networks  The proposed new spectrum allocation can:  Provide more reliable service and increased capacity for the use of MBANs in hospital waiting rooms, elevator lobbies, preparatory areas, and other high density settings.  Greatly improve the quality of patient care with more effective monitoring, catching patients before critical stages, improving patient outcomes, and ultimately saving lives.  Decrease expenses while increasing competition and innovation, easing entry for companies that are developing new wireless medical devices.
  • 51. 51 e-Health/Body Area Networks  Chronic disease monitoring encompasses the following:  Episodic patient monitoring;  This is utilized in noncritical patients to track specific indicators and identify the progress of the disease or recovery. The patient’s vital signs (e.g., heart rate, temperature) and disease-specific indicators (e.g., BP, blood glucose level, EKG) are monitored to determine anomalies and identify trends.  The monitoring is done periodically, and all the information collected by the medical sensors is time-stamped and then securely forwarded to a gateway that functions as a patient monitoring system.  Additionally, the gateway forwards the aggregated information in a secure way to a database server.  Medical personnel and family caregivers can access the information stored in the database server to monitor the progress of the disease.
  • 52. 52 e-Health/Body Area Networks  Chronic disease monitoring encompasses the following:  Continuous patient monitoring;  This is associated with acute conditions that require constant or frequent measurement of health status.  The vital signs (e.g., heart rate, temperature, pulse oximeter) are monitored on a constant basis to allow continuous measurement of patients’ health status at rest or during mild exercise for purpose of treatment adjustment, recovery, or diagnosis.  The vital signs measurements waveforms (e.g., pulse pleth wave or heart rate) are securely streamed to an on-body data collection unit for data fusion and/or sequential storage. The data is securely forwarded from the data collection unit to an off-body gateway (e.g., PC/laptop, PDA or mobile phone) for storage and data analysis.  The patient or the care provider remotely activates the on-body sensors via the off-body unit; the measurement data from the body sensors is securely transmitted continuously to the on-body unit, where it is temporarily stored.  Subsequently, the recorded measurement data is securely sent to the off body unit via batch transmission for persistent storage and further analysis by the healthcare provider.  Optionally, an off-body unit can also be used for secure waveform viewing during the measurement. The healthcare professional uses the captured data to provide the appropriate diagnosis or to adjust the treatment level.
  • 53. 53 e-Health/Body Area Networks  Chronic disease monitoring encompasses the following:  Patient alarm monitoring:  The triggering of alarms based on preset conditions that are specific to the patient and the disease.  The patient’s vital signs (e.g., heart rate, temperature) and disease-specific indicators (e.g., BP, EKG, EEG) are monitored on a continuous basis. The data collected by the sensors is time-stamped and securely forwarded to a gateway that acts as a patient monitoring system. The gateway securely forwards the aggregated information to a database server.  Additionally, at predetermined settings, alarms are issued and responses/actions could be triggered automatically.  For example, if during the monitoring of a diabetic patient the blood glucose level falls below a certain threshold, an alert can be sent to the patient, physician(s), and/or medical personnel.
  • 54. 54 e-Health/Body Area Networks  Personal wellness monitoring concerns a person’s activity and safety (especially for the elderly) which indludes;  Monitoring an elderly person’s daily activity  Safety monitoring scenario deals  Monitoring an elderly person’s daily activity.  A wearable medical sensors/devices that monitor the vital signs (e.g., heartbeat, body temperature), this application involves monitoring other nonmedical sensors such as environmental sensors.  Monitors a certain daily schedule, for example, taking a weight measurement in the morning, obtaining glucose level readings at 11 AM and at 5 PM, and so on, the caregiver can monitor the daily activity status of the person. If certain routine activities are not completed, the person can be sent a reminder.  Safety monitoring scenario deals  with monitoring the safety of the home environment. The home environment is monitored for safety hazards including toxic gases, water, and fire. Additionally, the vital signs (e.g., heartbeat, temperature) of the persons in the home are also monitored.
  • 55. 55 e-Health/Body Area Networks  Personal fitness monitoring includes  (i) monitoring and tracking fitness level  (ii) personalized fitness schedule scenario  The monitoring and tracking fitness level  Focuses on tracking the fitness level or progress made by an individual.  A number of parameters that the individual wishes to monitor are recorded as that individual performs his/her workout routine (e.g., while running on a treadmill, the individual monitors his/her heart rate, temperature, and blood oxygen level).  This information, obtained from medical sensors and is securely streamed to a gateway or a collection data unit and displayed on the treadmill’s console in real time, along with other performance information provided by the treadmill.  Additionally, the gateway sends the information to a database server for recordkeeping.
  • 56. 56 e-Health/Body Area Networks  The personalized fitness schedule  Focuses on personalization of the fitness schedule of an individual.  The schedule to be followed by that individual can be entered by a trainer or the individual.  For example, training for a marathon could include running on a treadmill and distance according to a schedule designed by his/her trainer. Also can monitor the pace and the maximum heart rate, respiration pattern by wireless medical device worn by the individual.
  • 57. 57 e-Health/Body Area Networks  Some demonstrations of MBAN technology included the following:  Fetal telemetry: A small, lightweight, and noninvasive way to continuously monitor a baby’s health, while allowing the mother to move freely.  LifeLine home care pendants: A device that collects health information for the elderly or those with chronic diseases allowing them to live independently with the security and peace of mind that they are being monitored.  Predictive and early warning systems: Provides continuous monitoring to help prevent sudden and acute deterioration of a patient’s condition.  A greatly abbreviated press time list of specific illustrative examples in this arena includes the following.
  • 58. 58 e-Health/Body Area Networks  Sierra Wireless has developed Positive ID secure modules to provide support for diabetics through monitoring levels of glucose in the blood.  Cinterion/Gemalto has developed Aerotel, a system capable of modulating in real time the flow of air sent to people suffering from sleep apnea;  The NFC technology based “tracking” the quality of sleep developed by iMPack, United States.
  • 59. 59 e-Health/Body Area Networks  Following are research issues in WBANs:  Antenna design for in- and on-body networks  Channel modeling radio propagation issues for WBAN  Electromagnetic radiation and human tissues  Interference management and mitigation  Coexistence of WBAN with other wireless technologies  Protocols and algorithms for the PHY, MAC, and network layer  End-to-end quality of service (QoS) provision for WBAN  Energy-efficient and low power consumption protocols  Power management for WBAN  Integration of WBAN with heterogeneous networks  (Lightweight) security, authentication, and cryptography solutions for WBAN  Standardization activities
  • 60. 60 City Automation  Some applications in this domain include the following:  Traffic flow management system in combination with dynamic traffic light control  Street light control  Passenger information system for public transportation  Passive surveillance
  • 61. 61 City Automation  Generic city sensors include environmental sensors and activity sensors.  Environmental sensors include:  – thermal  – hygrometric  – anemometric  – sound  – gas  – particles  – light, other EM spectrum  – seismic  Activity sensors include:  – pavement/roadway pressure  – vehicle and pedestrian detection  – parking space occupancy
  • 62. 62 City Automation  ETSI TR 102 897: “Machine-to-Machine Communications (M2M); Use Cases of M2M Applications for City Automation” provides the following description of these applications:  Use Case 1: Traffic Flow Management System in Combination with Dynamic Traffic Light Control.  Use Case 2: Street Light Control.  Use Case 3: Passenger Information System for Public Transportation.
  • 63. 63 CityAutomation Use Case 1: Traffic Flow Management System in Combination with Dynamic Traffic Light Control.  The flow of road traffic within cities depends on a number of factors  such as the number of vehicles on the road, the time and the day, the current or expected weather, current traffic issues and accidents, as well as road construction work.  Traffic flow sensors provide key traffic flow information to a central traffic flow management system; the traffic flow management system can develop a real time  traffic optimization strategy and, thus, endeavor to control the traffic flow.  The traffic control can be achieved by  dynamic information displays informing the driver about traffic jams and congested roads  traffic signs can direct the traffic to utilize less used roads.  The traffic flow management system can also interact with controllable traffic lights to extend or to reduce the green light period to increase the vehicle throughput on heavy used roads  dynamically changeable traffic signs can lead to an environment where the vehicular traffic is managed more efficiently,  This enables cities to reduce fuel consumption, air pollution, congestions, and the time spent on the road.
  • 64. 64 CityAutomation Use Case 2: Street Light Control.  Street lights are not required to shine at the same intensity to accomplish the intended safety goal.  The intensity of light  depend on conditions such as moonlight or weather.  Adjusting the intensity helps to reduce the energy consumption and the expenditures incurred by a municipality.  The street light controller of each street light segment is connected (often wirelessly) with the central street light managing and control system.  The control system can dim the corresponding street lights of a segment remotely or is able to switch street lights on and off.
  • 65. 65 CityAutomation Use Case 3: Passenger Information System for Public Transportation  Public transportation vehicles, such as busses, subways, and commuter trains, operate on a schedule that may be impacted by external variables and, thus, have a degree of variability compared with a baseline formal schedule.  Passengers need to know when their next connection is available; this information also allows passengers to select alternative connections in the case of longer delays.  In this application, the current locations of the various public transport vehicles are provided to the central system that is able to match the current location with the forecasted location at each time or at specific checkpoints also calculate the current delay and the expected arrival time at the upcoming stops.  The vehicle current location can be tracked via GPS/general packet radio service (GPRS) tracking devices that provide the position information in regular intervals.
  • 66. 66 CityAutomation Use Case 3: Passenger Information System for Public Transportation  Two approaches are possible:  First is With a checkpoint-based approach  The line number (of the bus or the street car) is captured at each station where the vehicle stops regularly, or at defined checkpoint in between.  Because of the fact that the sensor at a specific station is able to provide the data to the central system, the expected delay can be calculated by comparing the information of the scheduled arrival time and the actual arrival time. This change can be added to the arrival time displayed at each following station.  Each vehicle must be equipped with a transponder (variously based on infrared, radio frequency identification (RFID), short-range communication, or optical recognition).  In addition, each station has to be equipped with one or more checkpoint systems that are able to readout or to receive the line number information of the vehicle.  In case of larger stations with several platforms, multiple systems are needed.
  • 67. 67 CityAutomation Use Case 3: Passenger Information System for Public Transportation  Two approaches are possible:  Second is With a GPS/GPRS-based approach,  Each vehicle has to be equipped with a GPS/GPRS tracking device that provide, besides the current position, the information that can be directly or indirectly matched to the serviced line number.  Based on the “regular” position/time pattern, the system is able to calculate the actual time difference and provide the expected time on the passenger display.  A combination of checkpoint- and GPS/GPRS-based solution can be used to integrate railed vehicles (such as subways and street cars) and road vehicles (such as busses).
  • 68. 68 Automotive Applications  IoT/M2M automotive and transportation applications  focus on safety, security, connected navigation, and other vehicle services such as insurance or road pricing, emergency assistance, fleet management, electric car charging management, and traffic optimization.  These applications typically entail IoT/M2M communication modules that are embedded into the car or the transportation equipment.
  • 69. 69 Automotive Applications  Some of the applications as follows:  bCall (breakdown call)  Stolen vehicle tracking (SVT)  Remote diagnostics  Fleet management  Vehicle-to-infrastructure communications  Insurance services
  • 70. 70 Automotive Applications bCall (breakdown call)  A bCall sends the current vehicle position to a roadside assistance organization and initiates a voice call.  The bCall trigger is usually a switch that is manually pushed by the user in order to activate the service.  An “enhanced” bCall service allows current vehicle diagnostic information to be transmitted in addition to the vehicle position.
  • 71. 71 Automotive Applications Stolen vehicle tracking (SVT)  A basic application for automotive M2M communications is tracking of mobile assets either for purposes of managing a fleet of vehicles or to determine the location of stolen property.  The SVT service  provider periodically requests location data from the Telematics Control Unit (TCU) in the vehicle and interacts with the police.  The TCU may also be capable of sending out automatic theft alerts based on vehicle intrusion or illegal movement.  The TCU may also be linked to the Engine Management System (EMS) to enable immobilization or speed degradation by remote command.  Vehicles contain embedded M2M devices that can interface with location-determination technology (such as standalone GPS, or network-based mechanisms such as assisted GPS, Cell- ID) and can communicate via a mobile cellular network to an entity (server) in the M2M core.  For theft tracking applications, the M2M device is typically embedded in an inaccessible or inconspicuous place so that it may not be easily disabled by a thief.  The tracking server is an entity located in the M2M core and owned or operated by the asset owner or service provider to receive, process, and render location and velocity information provided by the deployed assets.
  • 72. 72 Automotive Applications Remote diagnostics  Remote diagnostic services are as following categories:  Maintenance minder  when the vehicle reaches a certain mileage (e.g., 90% of the manufacturer’s recommended service interval since the previous service), the TCU sends a message to the owner or the owner’s named dealership, advising the owner (or the dealership) that the vehicle is due for service.  Health check  Either on a periodic basis or triggered by a request from the owner, the TCU compiles the vehicle’s general status using inbuilt diagnostic reporting functions and transmits a diagnostic report to the owner, the owner’s preferred dealership, or to the vehicle manufacturer.  Fault triggered  When a fault (a diagnostic trouble code [DTC]) is detected with one of the vehicle systems, this triggers the TCU to send the DTC code and any related information to the owner’s preferred dealer, or to the vehicle manufacturer.  Enhanced bCall  When a manual breakdown call is initiated by the owner, the TCU sends both position data and DTC status information to the roadside assistance service or to the vehicle manufacturer.
  • 74. 74 Automotive Applications Fleet management  The fleet owner wishes to track the vehicles—that is, to know, over time, the location and velocity of each vehicle—in order to plan and optimize business operations.  A fleet of vehicles have been deployed with M2M devices installed that are able to:  Interface with sensors on the vehicle that measure velocity  Interface with devices that can detect position  Establish a link with a mobile telecommunication network using appropriate network access credentials, such as a USIM (universal subscriber identity module)  A server in the fleet owner’s employ receives, aggregates, and processes the tracking data from the fleet and provides this information to the fleet owner.  Devices could be configured to autonomously establish communication with the server via a cellular network either at regular intervals, at prescheduled times, or based on some event such as crossing a geographic threshold.  Alternatively, the M2M devices could be commanded by the M2M server to report their location/velocity data.
  • 76. 76 Automotive Applications Vehicle-to-infrastructure communications  A European Intelligent Transport Systems Directive seeks the implementation of eSafety applications in vehicles.  Some vehicle manufacturers have deployed the vehicle-to-vehicle communication,  for example, in the context of wireless access in vehicular environments (WAVE). On the other hand, vehicle to roadside applications are less well developed; in this case, vehicles have embedded M2M devices that can interface with location-determination technology and can communicate via a mobile telecommunication network to an entity (server).  The vehicles have been deployed with M2M devices installed that are able to:  Interface with sensors on the vehicle that measure velocity, external impacts  Interface with devices that can detect position  Establish a link with a mobile telecommunication network using appropriate network access credentials, such as a USIM  Upload or download traffic and safety information to a traffic information server  Devices could be configured to establish communication along with event triggered by a vehicle sensor such as external impact, motor failure, and so on.  For example, the traffic information server pushes roadside or emergency information out to vehicles based on location (cell location or actual location). Or, vehicle information is pushed to the traffic information server based on external sensor information, internal sensor information, or subscription basis.
  • 77. 77 Automotive Applications Insurance services  Pay-as-you-drive (PAYD) schemes offer insurers the opportunity to reduce costs based on actual risk and provide more competitive products to the end-user based on getting feedback from the vehicle as to when, where, how, or how far the vehicle is being driven (or a combination of these factors).
  • 78. 78 Home Automation  Basic applications of the automated home include  remote media control, heating control, lighting control (including low power landscape lighting control), and appliance control, smart space are seen as “next- step/next generation” applications, smart meters and energy efficiency (making use of the potential of SG), telehealth (e.g., assisted living and in-home m-health services), security and emergency services.
  • 79. 79 Home Automation  M2M communications is expected to play a major role in residences, where instrumentation of elements supporting daily living appliances.  Home control applications includes:  Lighting control  Thermostat/HVAC  White goods (large electrical goods e.g. refrigerators and washing)  Appliance control  In-home displays  Home security applications include but are not limited to:  Door access phone  Window locks  Motion detector  Smoke/fire alert  Baby monitors  Medical pendant
  • 81. 81 Home Automation  Energy efficiency at home is a key application of interest because of the possibility of monetary saving for the consumer.  Occupancy sensors  Can be used to establish whether there is somebody in a room or not and when the room becomes unoccupied the lights are automatically switched off.  The M2M system allows reducing energy consumption by automatically adapting the use of the house equipment to various short-term situations (people moving in and out of rooms, people going to work and retuning later) or long-term situations (people taking vacations or long weekends or managing a second/vacation home).
  • 82. 82 Smart Cards  Smart cards (SCs) in general, and M2M-based systems in particular, enable wired and wireless communication for a large set of commercial and industrial applications.  The purpose of an SC is to safeguard user identities and secret keys and to perform requisite cryptographic computations (an SC is a tamper-resistant device).  SC technology includes contact and contactless systems.  A terminal is the entity with which the SC can establish a secure channel.  Examples include generic card acceptance devices (CADs), a CAD on a mobile handset, a Set-top box, a laptop/PC/tablet.
  • 83. 83 Smart Cards UICC (Universal Integrated Circuit Card) environment, including user interfaces
  • 84. Smart Cards  A more inclusive list of SC applications is as follows:  Monitoring  vending machines  security systems  industrial machines  Automotive  traffic management  speed cameras  Medical equipment  Biometrics  Cybersecurity  Enterprise ID  Government ID  ePassport  FIPS 201  Real ID  Passport Card/WHTI  Healthcare  Identity  Logical access  Market research  Mobile telecommunications  Network security  Payments  POS  Contactless payments  EMV payments  Mobile payments/NFC  Transportation payments  Physical access  Privacy  RF/RFID tags  Security  ePassport security  Contactless payments security  Transit fare payment system security  Transportation (toll tags, speed-of-vehicle readers) 84
  • 85. 85 Smart Cards  These applications require advanced, durable USIM cards.  SCs are resource-limited devices because they are designed to be economic and portable (small and light).  Now SC memory size increased from KB to MB.  SC helps  to authenticate a person’s identity,  determine the appropriate level of access,  admit the cardholder to a facility,  all from data stored on the card;  Other authentication factors (such as biometric templates)
  • 86. 86 Smart Cards  Currently, most POS terminals are connected with a wired connection; as a consequence, the terminals are placed at a fixed position which is inconvenience or restrict commerce to user.  In some cases (e.g., remotely located POS terminals, parking meters, garage checkout booths, and so on), a wired connection is difficult and costly to be installed.  An option, to connect POS terminals via a secure wireless connection.  As M2M communication modules are installed into wireless POS terminals, street parking, and ticketing machines, and so on to provide communication for credit or debit card online transactions, new commercial applications become a reality
  • 87. 87 Smart Cards  There are three basic contactless technologies considered for physical access control applications:  125 kHz,  ISO/IEC 14443  ISO/IEC 15693 technologies.
  • 88. 88 Smart Cards  125 kHz read-only technology  In RFID access control systems and is based on de facto industry standards rather than international standards.  Also allows for a secure, uniquely coded number to be transmitted and processed by a back-end system. The back-end system then determines the rights and privileges associated with that card.
  • 89. 89 Smart Cards  ISO/IEC 14443 and ISO/IEC 15693 standards  are intelligent, read/write devices capable of storing different kinds of data and operating at different ranges.  Contactless SCs operate at 13.56 MHz and are further divided into proximity (ISO 14443) and vicinity (ISO 15693) devices with nominal operating ranges of up to 10 cm and 1 m, respectively.  ISO 14443 specifies A and B operation modes that use different communication and card selection procedures.  The ISO 14443A standard is used with most contactless cards and is compatible with the lower layers of popular commercial products.  (ISO 14443-2), anti-collision routines (ISO 14443-3), and communication protocols (ISO 14443-4).
  • 90. 90 Smart Cards  ISO/IEC 14443 and ISO/IEC 15693 standards  are intelligent, read/write devices capable of storing different kinds of data and operating at different ranges.  Contactless SCs operate at 13.56 MHz and are further divided into proximity (ISO 14443) and vicinity (ISO 15693) devices with nominal operating ranges of up to 10 cm and 1 m, respectively.  ISO 14443 specifies A and B operation modes that use different communication and card selection procedures.  The ISO 14443A standard is used with most contactless cards and is compatible with the lower layers of popular commercial products.  (ISO 14443-2), anti-collision routines (ISO 14443-3), and communication protocols (ISO 14443-4).
  • 91. 91 Smart Cards  NFC setups allow a device  enables communication with another NFC compatible device or a small NFC tag holding the information the reader wants.  store information and communicate with the reader, but do not actively read other devices  Peer-to-peer communication through two active devices  maintains interoperability between different wireless communication methods such as Bluetooth and other NFC standards  secure and remains easy to use with different versions of the technology  able to communicate with other wireless technologies  Applications of NFC  by integrating credit cards, subway tickets, and paper coupons all into one device, a customer can board a train, pay for groceries,  redeem coupons or store loyalty points, and even exchange contact information all with a smartphone.
  • 92. 92 Smart Cards  SC use depends on the environment in which they are deployed.  Banking  user information includes identity, account information, and possibly information on recent transactions made and secret keys used in security functions  There are no peripherals that allow user direct access, such as a keyboard or a screen  Mobile communications  user information includes identity, personal information such as address book, operator-related information, and again secret keys used in security functions.  UICC (Universal Integrated Circuit Card)  The SC used in mobile terminals in GSM and UMTS networks. The UICC SC typically has a CPU, ROM, RAM, EEPROM, and I/O circuits.
  • 93. 93 Smart Cards  SC for Medical/Hospital  Health system is subject to extensive major fraud and where the costs of conventional treatment of medical data are becoming difficult to manage.  The Health Information Technology for Economic and Clinical Health (HITECH) Act, United States, encourages stakeholders (patients, doctors, nurses, specialists, pharmacists, and so on) in the health ecosystem to work toward the creation of a network (protected health infrastructure) for the collection and exchange of standardized medical data (electronic health record) using “certified technology” capable of simultaneously ensuring the availability, sharing, security, accuracy, and confidentiality of such data.  SC that stores personal medical information (allergies, blood type, current treatment, and so on), especially in emergency situations.  E.g. Life Nexus 4 launched a health card
  • 94. 94 Smart Cards Examples of SC/UICC applications:  Digital rights management (DRM) and distributed applications.  DRM is used to secure media content owned by a service provider; the end-user has a limited set of rights to use the content.  Usually, media content is supposed to be rendered on any type of compatible terminal (e.g., CD audio on any CD player) so that the user can transport his/her content wherever he/she wants.  When the user is a mobile network operator (MNO) subscriber, the rights are bound to a device, not to a user.  This implies that when the user needs to change the handset, the rights have to be downloaded onto the new device and the certificates are to be recalculated with the new terminal ID.
  • 95. 95 Smart Cards Examples of SC/UICC applications:  The UICC is a control point for device management (DM).  DM aims to provide the protocols and mechanisms to achieve remote management of devices.  DM includes:  (a) setting initial configuration information in devices;  (b) subsequent installation and updates of persistent information in devices (firmware update);  (c) retrieval of management information from devices;  (d) processing events and alarms generated by devices.  In this application, the SC inserted in the device is expected to:  (i) support dynamic provisioning of the device with up-to-date information  (ii) handle a part of the security during the update of device firmware (service access controlled by the operator, authentication of the origin, and so on).
  • 96. 96 Smart Cards Examples of SC/UICC applications:  Multimedia file management.  As the UICC will be able to store and encrypt/decrypt multimedia files like MMS, pictures, MP3 files, video clips customer’s usability and quality user experience cannot be compromised by a too long wait for the data download/upload.  E.g. Display image or video when accessing phonebook.
  • 97. 97 Smart Cards Examples of SC/UICC applications:  Man–machine interface (MMI) on UICC.  Large-sized SCs offer the possibility to store card issuer’s MMI in the UICC.  During initialization process, the terminal can detect the type of UICC (which operator, which service providers, which features) and upload the whole MMI that the card issuer has defined for its purposes and its services.
  • 98. 98 Smart Cards Examples of SC/UICC applications:  Real-time multimedia data encryption/decryption.  Storage of terminal applications on the UICC  Direct and indirect UICC connection to a PC.
  • 99. 99 Tracking (Following And Monitoring Mobile Objects)  Track and trace applications are  Automotive environments, goods movement in production environments, distribution, and retail, also RFID tags are often utilized.
  • 102. 102 Tracking (Following And Monitoring Mobile Objects)  Tracking (such as vehicles of any kind, containers, people, pets, and so on) is a common application implemented in conjunction with GPS; it can also be implemented using cellular technology.  GPS is based on a cluster of satellites that continually send out signals. The satellites orbit the earth approximately every 12 h; the height of the orbits is about 20,183 km in the MEO (medium earth orbit).  GPS receivers can determine their position based on the time delay between transmission and reception of the signals transmitted by the satellites.  The satellites are arranged on six planes, each of them containing at least four slots where satellites can be arranged equidistantly.  Typically more than 24 GPS satellites orbit the earth.
  • 104. 104 Tracking (Following And Monitoring Mobile Objects)  A basic service arrangement:  the DEP is comprised of a GPS sensor and a cellular modem; the GPS sensor transfers the position data to the cell modem and the modem transmits the position data to the DIP via a cellular network.  The positioning data is then manipulated, displayed (e.g., using a map or GIS—geographic information system), and/or stored as needed.
  • 106. 106 Over-The-Air-Passive Surveillance/Ring of Steel  Integrated open-air surveillance (IOS) technologies  High resolution digital video surveillance (DVS), license plate recognition technology, facial recognition systems, traffic light cameras, gunshot detection systems (GDSs), aerial surveillance with drones (UAVs—unmanned aerial vehicles)  Technologies that support public safety mandates at a reduced surveillance/ interdiction costs for those jurisdictions that deploy the infrastructure,  While at the same time generating revenues for service providers and system integrators.
  • 107. 107 Over-The-Air-Passive Surveillance/Ring of Steel  Open air refers to the fact that the surveillance is done in the public domain  for example, with  (i) high resolution (even low light level) digital video cameras (which can be wired and/or wireless); (ii) license plate/face recognition technology; (iii) GDSs; and (iv) other related technologies or sensors.  Integrated refers to the internetworking of multiple geographically dispersed systems and multiple technologies with database systems that may archive a variety of pertinent background data or metadata.
  • 108. 108 Over-The-Air-Passive Surveillance/Ring of Steel  IOS enables the collection, aggregation, and analysis of factors in physical public view.  There are legitimate legal law enforcement uses of the technology, but also there are other uses of the technology.
  • 109. 109 Over-The-Air-Passive Surveillance/Ring of Steel  During the 1990s, the City of London, England, deployed for a security and surveillance an electronic cordon surrounding the city. The popular know as Ring of Steel. In 2005, the Ring of Steel was widened to include more businesses in the City.  In 2007, New York City announced plans to install an array of cameras and roadblocks designed to detect, track, and deter terrorists; this effort is known as the Lower Manhattan Security Initiative,  US, federal budget sought to increase the amount of money spent on surveillance technology and programs, o install in cities, colleges or public places.
  • 110. 110 Over-The-Air-Passive Surveillance/Ring of Steel Generalized scenario of dispersed IOS equipment
  • 111. 111 Over-The-Air-Passive Surveillance/Ring of Steel Generalized scenario of dispersed IOS equipment  A generalized scenario of dispersed equipment such as video cameras, triangularization devices, and wireless sensors connected over a (multitechnology) network to a control/operations center.  Connected with available wireless technology.
  • 112. 112 Over-The-Air-Passive Surveillance/Ring of Steel  IOS’ baseline objective is to create and maintain (through a combination of technologies and analysis tools) a “crime- free zone” within an urban or suburban environment by securing a perimeter both physically and electronically.  Face recognition technology will become widespread in the future to find any crime suspect.  IOS functionality, however, can go beyond routine law enforcement to find bit of information gathered and can do data mining.
  • 113. 113 Over-The-Air-Passive Surveillance/Ring of Steel  IOS approaches can be taxonomized as follows:  Public space open-air surveillance:  Methods of collecting (any type of) information about individuals when they are in any public environment (whether indoors or outdoors). Examples are people in a crowd, people in the street, cars with toll tags, and so on.  Private space open-air surveillance:  Methods of collecting (any type of) information about individuals when they are in a private environment, typically indoors. Examples are people in a doctor’s office, people at work, and so on.  Hybrid public/private space open-air surveillance:  Methods of collecting (any type of) information about individuals that crosses both boundaries. Examples include using cell phones to track movements.
  • 114. 114 Over-The-Air-Passive Surveillance/Ring of Steel  At the macro level, three drivers have been offered for IOS services:  Detection/prevention of crimes  Anti-terrorism  Increased municipal revenue collection via remote monitoring of infractions
  • 115. 115 Over-The-Air-Passive Surveillance/Ring of Steel  Technologies that can be deployed in integrated open-air surveillance consist of:  High resolution (low light level) DVS (wired & wireless).  Cameras can be indoor/outdoor, PTZ (pan, tilt, zoom) and configured in covert or exposed modes depending upon deterrent philosophy, field conditions, and field of view considerations.  Outdoor cameras will be physically hardened, vandal–proof and pole, wall and surface mountable.  Transport media (copper, fiber, wireless) and camera power (wired, solar, battery) will depend upon physical constraints. Dozens to hundreds of cameras will be deployed in a scalable architecture.  Recording can be selective or under all conditions at all times for a given view.  These cameras can be remotely controlled by police to PTZ and rotate; have day and night vision capabilities, and wireless technologies. The cost can be as high as $60,000 per unit for some complex systems.
  • 116. 116 Over-The-Air-Passive Surveillance/Ring of Steel  Technologies that can be deployed in integrated open-air surveillance consist of:  Image processing systems (at the command center)  To analyze the video streams in real time, alert law-enforcement personnel, and detect aberrant behavior (individuals walking erratically, lying prone), imagery of interest (e.g., crowd gathering, individuals running, etc.) as well as simple motion detection and if possible facial recognition of “persons of interest.”  License plate recognition  Of both parked and moving vehicles (within the field of view) at speeds up to 60 MPH moving past certain checkpoints. This can be augmented with UPC handheld scanners of registration stickers by roving patrols.
  • 117. 117 Over-The-Air-Passive Surveillance/Ring of Steel  Technologies that can be deployed in integrated open-air surveillance consist of:  GDSs  Using acoustic triangulation technology (pioneered with great success in Iraq to ferret out night snipers). GDS will be integrated with DVS so that after detecting gunfire, DVS will “train” on specific areas viewing in zoom for low light conditions and initiating event recording.  Moveable barrier technology  to inhibit selectively the movement of people and vehicle and/or people at designated checkpoints.  Real-time position reporting system  For vehicles, personnel, assets (VPA) using a combination of GPS, radio triangulation, and other automated vehicle locator (AVL) technologies (sign post transponders/checkpoints); personnel can be equipped with either or both active transponders/vehicles also. The tracking can start with inexpensive techniques (available from cell phone or other portable radio systems) and evolve to military-style resolution (+/ 1 m). −
  • 118. 118 Control Application Examples  Controlling vending machines.  Vending machines can be found in a variety of locations, for example inside office or public buildings, outdoors in public places, and gas stations.  The re-stocking and maintenance of vending machines is typically done manually by staffers that visit the vending machines at regular intervals to check the re-stock levels, re-stock the machines, and perform any requisite maintenance functions.  The introduction of M2M technology automates vending machine management:  By having access to a (mobile) telecommunication network, the built-in M2M communication module provides information to the operator about the current status of the vending machine (e.g., current fill-levels, maintenance status, possible damages, malfunctions, and so on); as a consequence, the vending machines need only to be visited when absolutely required.
  • 119. 119 Control Application Examples  Controlling production machines.  Various industrial processes make use of dispersed production devices (including but not limited to construction machines, manufacturing machines, food production machines, and so on). These machines may be exposed to harsh environments driving repair and maintenance requirements.  This maintenance is typically done by dedicated personnel who have to visit the production machines at regular intervals to repair, perform maintenance, and identify damages or malfunction.  M2M technologies improve the efficiency and optimization of the operation by allowing access to a mobile telecommunication network to forward information about the current status of the production machine
  • 120. 120 Myriad Other Applications  M2M and SCADA applications are now also being extended to support over satellite links.  Satellite service providers perceive M2M communications as an approach the global demand for uninterrupted and seamless data connectivity across a mixture of urban, suburban, exurban, rural, and oceanic environments: satellite-based M2M can facilitate the delivery of small quantities of information to and from anywhere in the world.
  • 121. 09/12/2024 121 CONVERGENCE OF IT AND OT  IT supports connections to the Internet along with related data and technology systems and is focused on the secure flow of data across an organization.  OT monitors and controls devices and processes on physical operational systems. Information Technology Operational Technology
  • 122. 09/12/2024 122 CONVERGENCE OF IT AND OT  IT organization is responsible for the information systems of a business, such as email, file and print services, databases, and so on.  OT is responsible for the devices and processes acting on industrial equipment, such as factory machines, meters, actuators, electrical distribution automation devices, SCADA (supervisory control and data acquisition) systems, and so on. Information Technology Operational Technology
  • 123. 09/12/2024 123 CONVERGENCE OF IT AND OT  OT has used dedicated networks with specialized communications protocols to connect these devices, and these networks have run completely separately from the IT networks. Information Technology Operational Technology
  • 124. 09/12/2024 124 CONVERGENCE OF IT AND OT  OT has used dedicated networks with specialized communications protocols to connect these devices, and these networks have run completely separately from the IT networks. Information Technology Operational Technology