1403739

advertisement
1
INTERNET OF THINGS:
A REVIEW OF APPLICATIONS and TECHNOLOGIES
1
2
3
4
Suwimon Vongsingthong and Sucha Smanchat
5
6
King Mongkut’s University of Technology North Bangkok, 1518 Pracharat 1
7
Road,Wongsawang, Bangsue, Bangkok 10800, Thailand. Tel 0-2555-2000
8
Email : suwimonv@yahoo.com, {sucha.smanchat@acm.org,
9
suchas@kmutnb.ac.th}
10
Abstract
11
This paper presents the state-of-art of Internet of Things (IoT), an enabler of
12
new forms of communication between people and things, and between things.
13
The main strength of IoT concept is the high influence it has to everyday life
14
by creating new dimension to the world, resembling to what the Internet once
15
did.
16
enabling technologies. The content includes strengths and limitations of
17
applications based IoT in logistics, transportation, healthcare, and
18
environment and disaster. Finally, the open challenges of IoT are debated to
19
encourage more investigations into the domains.
This paper describes the definitions of IoT, summarizes its main
20
21
Keywords : Internet of Things, IoT, limitations, strengths
2
22
23
Introduction
24
The term “Internet of Things (IoT)” (Huang and Li, 2010; Uckelmann, Harrison,
25
and Michahelles, 2011) has been around since the past few years and gaining
26
recognition with the breakthrough of advanced wireless technology. Even though
27
there are heterogeneous definitions on the interpretation of “Internet of Things”
28
but it has a corresponding boundary related to the integration of the physical
29
world with the virtual world of the Internet. IoT can broadly be defined as a global
30
network infrastructure, linking uniquely identified physical and virtual objects,
31
things and devices through the intelligent objects, communication and actuation
32
capabilities. In other words, the paradigm of IoT is described as “any-time, any-
33
place and any-one connected” (Ryu, Kim, Lee, and Song, 2012). Its implication is
34
based on the technology that makes things and people getting closer than the old
35
days.
36
In the perspective of “things”, numerous devices and objects will be
37
connected to the Internet. Each individually provides data, information or even
38
services. The devices providing things can be personal objects we carry around
39
such as smart phones, tablets and digital cameras. Our daily environments, home,
40
vehicle or office connected through a gateway device can also provide “things”
41
(Coetzee and Eksteen, 2011). Although Radio-Frequency IDentification (RFID) is
42
precisely the first idea popped up, but indeed many more technologies such as
43
sensor technologies, smart things and actuators are also counted whereas the
44
Machine-to-Machine
Communication
(M2M)
and
Vehicular-to-Vehicular
3
45
communication (V2V) are the real applications in the markets trying to gain most
46
benefits of IoT (Atzori, Iera, and Morabito, 2010; Uckelmann et al., 2011).
47
The aim of this paper is to explore the development and the deployment of IoT in
48
significant application domains. The organization of paper is as follows, Section 2
49
describes the structure of IoT. Section 3 presents a review of the existing
50
application of IoT categorized into the areas of logistics, transportation,
51
healthcare, and environment and disaster. Section 4 is the discussion of IoT
52
applications based on its benefits and limitations. Section 5 is the challenge of
53
IoT in those application domains.
54
55
The Structure of Internet of Things
56
The Internet of Things can be viewed as a gigantic network consisting of
57
networks of devices and computers connected through a series of intermediate
58
technologies where numerous technologies such as RFID, barcodes, wired and
59
wireless connections may act as enablers of this connectivity. According to
60
International Telecommunications Union (ITU), the perception of IoT (Atzori et
61
al., 2010; Coetzee and Eksteen, 2011) can be depicted as the four dimensions
62
components in Figure 1.
63
64
Tagging Things :
65
Real-time item traceability and addressability of RFID is what make it
66
stands at the forefront in terms of the IoT vision. RFID is gaining strong support
67
from the business community due to its maturity, low cost, and low power. It acts
4
68
as an electronic barcode to help in the automatic identification of anything
69
attached. RFID tags are available in 2 types: active and passive. The active tags
70
embedded with battery on-board, are widely used in retail, healthcare, and
71
facilities management. The passive tags, containing no batteries, are powered by
72
the reader and are more likely to be used in bank cards and road toll tags
73
(Aggarwal, 2012).
74
75
Feeling Things :
76
Sensors act as primary devices to collect data from the environment.
77
Necessary data are provided via communications established between the physical
78
and the information worlds (Vermesan and Friess, 2013). Recent advances in
79
technologies make them consume less power with low cost and high efficiency.
80
81
Shrinking Things :
82
Miniaturization and nanotechnology has provoked the ability of smaller
83
things to interact and connect within the “things” or “smart devices”. A clear
84
advantage is the improvement in quality of life. For example the application of
85
nano-sensors in monitoring water quality at reduced cost, nano-membranes
86
assisting in the treatment of waste water (Vermesan and Friess, 2013). In
87
healthcare, its application can be seen in the diagnosis and treatment of disease,
88
including the diagnosis of HIV and AIDS and nano-drugs for other diseases
89
(Gubbia, Buyyab, Marusic, and Palaniswami, 2013).
90
5
91
Thinking Things :
92
Embedded intelligence in devices through sensors has formed the network
93
connection to the Internet. It can make the domestic electric appliances realizing
94
the intelligent control, for example refrigerators that can detect the quantities of
95
various items and the freshness of perishable items. Embedded smart sensors may
96
provide the means to communicate with users by sending alert via the Internet
97
connectivity. The connection can primarily be wireless or other available
98
communications such as DSL, GPRS, WiFi, LAN and 3G (Uckelmann et al.,
99
2011). Not only to communicate, smart things must also be able to “…process
100
information,
101
decisions, or even play an active role in their own disposal…” (Vermesan and
102
Friess, 2013) which will change the way information communicate from human-
103
human to human-thing and to thing-thing.
self-configure,
self-maintain,
self-repair,
make
independent
104
105
Applications Based IoT
106
One of the most important engines of the innovation and development of IoT is its
107
applications, otherwise public acceptance of IoT will never happen (Coetzee and
108
Eksteen, 2011). Based on the concept of IoT, information generated from daily
109
enabling objects in our environment can possibly communicate with each other.
110
This information can drive many applications possible. Applications directly
111
applicable or closer to our current living habitudes, can possibly be categorized
112
into four following domains (Q. Yang, Wang, and Yue, 2012).
6
113
Logistics and Supply Chain Management
114
Traditionally, most of the logistics enterprises require manifold reports
115
tracking along with specific time and location to control the movement of goods.
116
However, in the IoT society, the commodity logistics has tremendously changed
117
to an autonomous society by variety of applications available to support the needs.
118
The systems in (Li and Luo, 2010), (Wei, 2011), and (El-Baz, Bourgeois, Saadi,
119
and Bassi, 2013) are logistic applications implemented to track the movement of
120
goods in real-time. The information scanned from tags of barcode or RFID is
121
transmitted to the logistic center or RFID receivers. Data are then transmitted
122
through Wireless Sensor Networks (WSNs) (Li and Luo, 2010), GSM network
123
(Wei, 2011), 3G network or a new High Performance Computing (HPC)
124
infrastructure through broker (El-Baz et al., 2013) to process at the data center.
125
The solutions in this domain are very promising since they have adopted
126
comprehensive and diversified transmission protocols. Several devices such as
127
RFID, Near Field Communication (NFC), and mobile phone can also act as data
128
collectors. But they do have substantial limitations.
129
For example, the supermarket chain management (Li and Luo, 2010) was
130
developed based on standard relational database, which can lead to worrisome
131
situation when dealing with large volume of “thing”. Also the occurrence of
132
incomplete
133
communication distance of the mobile logistic information reader (Wei, 2011) as
134
well as the data collision during transmission may jeopardize the results.
information
or
missing
information
procreated
from
the
7
135
Not only the applications to support the front and back operation are
136
essential, the abilities to control and identify the next destination of goods/raw
137
material are also indispensable. The real time tracking of logistics entities using
138
the combination capabilities of RFID, mobile devices and the integrated browser
139
interface was conducted (Lin, 2011). The position of objects is derived from GPS,
140
WIFI, GSM, and GPRS. Even overall detection accuracy of geographical location
141
is over 97% for moving entities and roughly 100% for the action-less entities, its
142
remain drawbacks are 1) the detection of geographical position function needed to
143
support variety of browsers since difference logistics users may use different
144
mobile devices and 2) the browsers themselves should have the ability to
145
automatically detect and confirm on what positioning devices to be launched.
146
To increase the accuracy of the logistic process, not only the ability to
147
detect location of goods is desired, the reliability of RFIDs signals is also
148
essential. Particularly in the environment where there is limited accessibility to the
149
IoT infrastructure. A launch of AspireRFID (Soldatos et al., 2010) , a RFID
150
middleware with a range of tools to facilitate RFID deployment ("RFID Journal,"
151
2009) was a breakthrough. The integration of the EPCglobal based RFID
152
architecture with “Session Initiation Protocol (SIP)” (Anggorojati, Mahalle,
153
Prasad, and Prasad, 2013) to simultaneously detect locations and mobility
154
management of RFID tags has revealed outstanding performance in cost
155
consumption of tags registration and tracking.
156
In large logistic enterprises, the capability to automatically locate and
157
move assembly parts has incurred the adoption of robots. Basically, the infrared
8
158
motion capture system or computer vision system with complex machine learning
159
algorithms is used control the navigation and object manipulation of robots.
160
However, the proposed robot, that feature is handled by RF-Compass and RFID
161
(Wang, Adib, Knepper, Katabi, and Rus, 2013). Both the robots and the objects
162
the robot will work on are embedded with an ultra low-power RF-compass and a
163
low cost RFIDs in replacement of WiFi-nodes. When robots grasp objects, the
164
RF-Compass can pinpoint the center position and the orientation of objects with
165
the accuracy of 80-90%. Even though this study demonstrates low computation
166
time when compared with machine-learning architecture. It has a limited line-of-
167
sight detection and no proven evidence on handling small objects.
168
169
Transportation
170
The development in transportation is presumed to be one of the factors to
171
indicate the well-being of the country. That is why transportation problems are
172
very challenging in the field of IoT. A proposal on a road condition monitoring
173
and alert application was initiated (Ghose et al., 2012). The main idea is to apply
174
the principles of crowd sourcing and participatory sensing. User identifies the
175
route he wishes and marks some points as pothole in the smart phone's
176
application. When the vehicle runs over the defined route, accelerometer which
177
continuously captures data will send raw data via mobile network. Related
178
features are then extracted to generate a confidence score to indicate the
179
abnormalities of the routes by showing the plot of pothole information. The
180
adoption of user’s smart phone as a connector device has expressed distinct
9
181
advantage since there is no additional cost applying on the hardware. Nevertheless
182
some remaining issues are the upload and download process of route-map which
183
involved considerable network traffic may induce vulnerability to the system. In
184
addition, the road condition classification performed at the phone itself is very
185
time-consuming and may drain out the battery of the mobile phone.
186
For large cities, problems such as finding parking spaces, waiting in line
187
for toll-way payment can be cumbersome which has urged the idea of applying
188
the license plate as a unique identity of driver (Ren, Jiang, Wu, Yang, and Liu,
189
2012). The license plate is captured by the recognition equipment whereas sensors
190
embedded in license plate will collect the information of road surface. The data is
191
then forwarded for the process of calculating the optimal path and guiding passage
192
of vehicles. The system not only can invoke the traffic scheduling, vehicle
193
positioning and vehicle query for passenger, it also can locate the parking spaces
194
in nearby location. This design provides variety of benefits to driver in terms of
195
managing highway automatic toll collection, avoiding busy traffic induction,
196
locating parking space and adding more security to the vehicle. A clear drawback
197
however is this design is trying to support too many functions which invokes high
198
cost and difficulties for implementation.
199
Electric vehicles, an important means to reduce both the fuel cost and the
200
impact of global warming have also gained considerable attention from drivers.
201
However the underlying issue is the battery life. Therefore government in many
202
countries has supported researches on systems to monitor performance of
203
Lithium-ion (Li-on) battery for electric vehicle as explored in (Haiying et al.,
10
204
2012) . The system is designed to detect the functions of Li-on power battery by
205
deriving the driving situation from the realistic working conditions for driver so
206
that the driver can get the idea of the route status. This solution is embedded with
207
many essential functions such as dynamic performance test of the Li-on battery,
208
remote monitoring with on-line debugging and error correction that can
209
significantly reduce the maintenance cost. It can be more valuable if the function
210
of age-tracking and end-of-life predictions of battery is included so that the fading
211
battery can be tracked to assure of the readiness, reliability, and security of the
212
electric buses.
213
The safety supervision in the distribution of hazardous or valuable goods
214
is imperative for shipping companies as well. A study to master the operation of
215
the entire fleet from the command center in real time was conducted
216
(Shengguang, Lin, Yuanshuo, and Rucai). Each vehicle is embedded with GPS to
217
form a multi-hop network for the command center to share the perception of
218
drivers. A combination of RFID reader and 3G video surveillance is used to
219
monitor status of goods whereas temperature and humidity sensors in the vehicle
220
are used to detect a quality of transport goods. If indicators exceed the limit, the
221
alarm will be raised. Other unpredicted events such as driver fatigue or
222
unauthorized access are also detected and forwarded to command center. This
223
design has achieved the effectiveness in road traffic safety and travel reliability.
224
The limitations disengaged are the adoption of several technologies in this design
225
will raise the cost of deployment as well as the requirement to support massive
11
226
data. Moreover the location of vehicles can be inaccurate when vehicles are
227
moving in high speed or approaching blind spots for GPS.
228
229
Healthcare
230
Improvement in human health and well-being is the ultimate goal of any
231
economic, technological and social development. The rapid rising and aging of
232
population is one of the macro powers causing great pressure to healthcare
233
systems. A solution to solve the difficulties in accessing to healthcare of people in
234
rural area of developing countries (Rohokale, Prasad, and Prasad, 2011) was
235
implemented. In an environment without the Internet, the mobile network facility
236
can be utilized to convey the information. A person registered with the rural
237
healthcare center (RHC) is requested to wear an active RFID sensor to detect any
238
change on the normal parameters. If those parameters exceed certain values,
239
information will be cooperatively routed to the RHC doctor. This approach has
240
proven to be a reliable critical healthcare application that continuously monitors
241
and controls health parameters of human.
242
The other approach is the integration of clinical devices in the patient’s
243
environment (Jara, Zamora, and Skarmeta, 2012) which allows user to use a
244
mobile phone to transmit health data to medical centers. A home gateway is
245
located at the patient’s house to connect to the Internet while the mobile personal
246
health device acts as an integration of medical devices from different vendors.
247
The system continuously analyses the vital signs from the patient to detect
248
anomalies. The noticeable flaw of the system is the security threats and attacks in
12
249
the mobile network, although GSM has adopted an encryption as protection
250
mechanism but as it is wide-spread in nature, interception of information
251
transmitted is possible.
252
A “non-contact health monitoring system (NCHMS)” (N. Yang, Zhao, and
253
Zhang, 2012) is another choice of IoT healthcare service which is more
254
convenient to users. The system monitors the user’s facial expressions, postures,
255
and sounds. The monitoring system collected users’ data through digital cameras,
256
microphones, and other equipment .The feature extraction, expression recognition,
257
and classification are performed at the server. The variations in user’s facial
258
expressions, postures, and sounds are used as identifications to classify if users are
259
in danger or having diseases. If any of these parameters changes, the system
260
determines the necessary treatment, reminds the user and notifies the hospital and
261
related persons. The system has demonstrated promising strength in term of ease-
262
of-use. But the adoption of camera as collector device can cause difficulties in
263
actively synthesizing images for transmission as well as the angle of images
264
captured. As for microphone, the recognition of voice could also be suffered from
265
the clamor in the environment. Another serious drawback is the machine learning
266
technique, normally involved with time-complexity in the analysis of the large
267
volume of learning data set.
268
269
Environment and Disaster
270
At the present time, natural and accidental disasters are taking place more
271
frequent. To lessen the effects of natural disasters, technologies in IoT could play
13
272
a crucial role in alerting before disasters happen, and in disaster recovery after
273
they end.
274
A heritage site monitoring system, namely “Health Monitoring and Risk
275
Evaluation of Earthen Sites (HMRE2S)” model (Xiao et al., 2013) was conducted
276
to monitor the environmental information of cultural sites. The environment
277
information such as temperature, humidity, and light are collected via intelligent
278
monitoring system. This experiment was claimed to provide accurate results but
279
generalization for other sites may not be applicable since it was explored on a
280
small heritage land. Thus for larger cultural sites, the accuracy remains
281
questionable.
282
Another contribution to global warming is the smart environment which
283
increasingly attracted interest from the society. A smart heat and electricity
284
management system (Kyriazis, Varvarigou, Rossi, White, and Cooper, 2013) was
285
presented to monitor real-time electricity usage of the buildings and individual
286
appliances where smart meters are used as data recorders. If the power
287
consumption of those objects is above the limit, users will be promptly informed.
288
Considering disaster, a waste from oil depot can cause terrible disaster to the
289
environment because it is easy to get ablaze and burst. A surveillance system for
290
safety management of oil depot was introduced in China (Du, Mao, and Lu, 2012
291
). The sensing layer of the system consists of RFID tags and non-explosive PDAs
292
to identify and interact with the key facilities in the oil depot. 3G is used as the
293
communication layer to forward the data from the worksite to the Internet, where
294
users can access the safety management information via enterprise intranet. This
14
295
IoT based safety management information system is proven to be stable since it
296
was actually deployed in 2 oil depots with 24 PDAs and 100 RFID tags.
297
298
Discussion on IoT in Applications
299
Under the vision of IoT, applications can be fully automated by configuring
300
themselves when exposed to a new environment. The intelligence behavior driven
301
by the system can autonomously be triggered to seamlessly cope with unforeseen
302
situations. However the applications in the above domains can deliver more
303
analytical results if the following hindrances are properly taken care of.
304
Apparently, the major players of collector in the above application
305
domains are RFIDs and GPS. RFID is one of the most convenient devices to
306
transmit and receive data via radio frequency without wires at the lowest cost.
307
Some RFID devices can only be used within the industry due to the range of
308
electromagnetic spectrum (Coetzee and Eksteen, 2011). A clear disadvantage of
309
its technology is the reader collision which may occur when the signals from two
310
or more readers overlap or many tags are present in a small area. Although many
311
systems use an anti-collision protocol to enable the tags to take turns in
312
transmitting to a reader, this problem remains. An additional strong barricade is
313
the global standards of RFIDs are not yet established (Haiying et al., 2012).
314
As for GPS, it is recognized as an excellent tool for data collection in
315
many environments where users can generally see the sky and are able to get close
316
to the objects to be mapped. GPS requires a clear line-of-sight between the
317
receiver’s antenna and several orbiting satellites. Anything hedging the antenna
15
318
from a satellite can potentially weaken the signal to such a degree that it becomes
319
too difficult to achieve reliable positioning. An obstruction like buildings, trees,
320
crossways, and other obstructions that block sunlight can effectively block GPS
321
signals where its potentiality could be seriously reduced (Guo, Poling, and Poppe;
322
Vermesan and Friess, 2013).
323
Since the communication infrastructure of IoT can be any network
324
available within the range. Hence mobile ad-hoc network, which allows people
325
and devices to seamlessly form network in areas without pre-existing
326
communication infrastructure seems to be a better choice (Bakht). The more
327
convenience, the more applications and the more network services it supports, the
328
more opportunities for active attackers as well as malicious or misbehaving nodes
329
to create hostile attacks. These types of attack can seriously damage basic
330
functions of security, such as integrity, confidentiality and privacy of the node.
331
Currently, the security goal in mobile ad-hoc networks can only be achieved
332
through cryptographic mechanisms. These mechanisms are generally more fragile
333
to physical security threats than fixed wired networks. Besides, standardized
334
communication interfaces and distributed control intelligence within an industry
335
network remains disorganized (Lo´pez, Ranasinghe, Harrison, and McFarlane,
336
2012).
337
As far as IoT dealing with more objects, the volume of the data generated
338
and the processes involved in the handling of those data become critical. The
339
ability to extract content from the data becomes even more crucial and complex,
340
especially when dealing with big data. Variety of technologies and factors
16
341
involved in the data management of IoT such as data collection and analysis, data
342
migration and integrity, sensor networks, and complex event processing are not
343
yet convinced (Vermesan and Friess, 2013).
344
345
Forwarding IoT
346
For the sake of IoT to achieve its vision, a number of challenges need to be
347
overcome. These challenges range from standardization, communication, and
348
security to data volume (Coetzee and Eksteen, 2011; Vermesan and Friess, 2013).
349
1.
350
solutions, using their own technologies and inaccessible services. Standards need
351
to be defined to change this “Intranet of Things” (Vermesan and Friess, 2013) into
352
the more complete “Internet of Things”.
353
2.
354
networks and facilitate peer-to-peer communication for specialized purposes.
355
They can increase robustness of communications channels and networks by
356
forming ad-hoc peer-to-peer networks in disaster situations to keep the flow of
357
imperative information going in case of telecommunication infrastructure failures.
358
Therefore, the integrity and stability of the infrastructure is crucial to provide
359
reliable services.
360
3.
361
machine but also from machine to machine where the guarantee on the access
362
control, authorization, privacy, and protection from malicious is a prime
363
requirement for IoT acknowledgement.
Standardization: Currently, many manufacturers are creating vertical
Communication Infrastructure: Things generated by devices can join
Security: In IoT, the communication channel is not only from human to
17
364
4.
365
identification and tracking systems are very crucial for real time processing. There
366
remain several complexities of process involving as well as doubts in standards
367
and filtering techniques.
368
5.
369
connected to the Internet, each one providing data. Mechanisms to store and
370
assure the validity through scalable applications remain a major technological
371
challenge.
Data
collection
and
acquisition:
Data
collection
from
sensors,
Big data: One significant aspect in IoT is the large number of things being
372
373
Although IoT has to overcome huge barriers in order to gain trust from the
374
societies, it has illustrated the distinguished potential to add a new dimension to
375
the application in logistics, transportation, healthcare, and environment and
376
disaster by enabling communication between smart objects. Therefore IoT should
377
be considered as a part of future internet that everything can connect in a network
378
where objects can interact with each others. The development towards several
379
issues will make IoT a complete solution. Hence more researches in the
380
application IoT are essential. Once successfully implemented, the reduction of
381
human efforts shall benefit the quality of life as well as business.
382
383
References
384
Aggarwal, C. C. (2012). Managing And Mining Sensor Data: IBM T. J. Watson
385
Research Center.
18
386
Anggorojati, B., Mahalle, P. N., Prasad, N. R., and Prasad, R. (2013). Efficient
387
and scalable location and mobility management of EPCglobal RFID
388
system IEEE, 2013 16th International Symposium on Wireless Personal
389
Multimedia Communications (WPMC), 1-6.
390
391
392
393
Atzori, L., Iera, A., and Morabito, G. (2010). The Internet of Things: A survey.
Computer Networks, 2787-2805.
Bakht, H. Mobile ad hoc networks Various problems and some solutions.
Retrieved 15/12/2013, 2013
394
Coetzee, L., and Eksteen, J. (2011). The Internet of Things – Promise for the
395
Future? An Introduction. IIMC International Information Management
396
Corporation(IST-Africa 2011 Conference Proceedings), 1-9.
397
Du, Z., Mao, Y., and Lu, M. (2012 ). Design and Implementation of Safety
398
Management System for Oil Depot Based on Internet of Things 2012
399
IEEE International Conference on Green Computing and Communications
400
(GreenCom), 249 - 252
401
El-Baz, D., Bourgeois, J., Saadi, T., and Bassi, A. (2013). ALMA, A Logistic
402
Mobile Application based on Internet of Things. IEEE(International
403
Conference on and IEEE Cyber, Physical and Social Computing IEEE and
404
Internet
405
Communications (GreenCom)), 355-358.
of
Things
(iThings/CPSCom),
Green
Computing
and
406
Ghose, A., Biswas, P., Bhaumik, C., Sharma, M., Pal, A., and Jha, A. (2012).
407
Road condition monitoring and alert application: Using in-vehicle
408
Smartphone as Internet-connected sensor 2012 IEEE International
19
409
Conference Pervasive Computing and Communications Workshops
410
(PERCOM Workshops), 489 - 491
411
Gubbia, J., Buyyab, R., Marusic, S., and Palaniswami, M. (2013). Internet of
412
Things (IoT): A vision, architectural elements, and future directions.
413
Future Generation Computer Systems, 1645–1660.
414
415
Guo, B., Poling, A. D., and Poppe, M. J. GIS/GPS in Transportation, Real World
Experiences. Retrieved 4/12/2013, 2013
416
Haiying, W., Long, H., Xin, Q., Hongbo, W., Gechen, L., and Xianqing, D.
417
(2012). Simulation system of the performance of power battery for
418
electrical vehicle based on Internet of things IEEE(2012 International
419
Conference on Measurement, Information and Control (MIC)), 681 - 684
420
Huang, Y., and Li, G. (2010). A Semantic Analysis for Internet of Things.
421
IEEE(2010
422
Technology and Automation), 336-339.
423
International
Conference
on
Intelligent
Computation
Jara, A. J., Zamora, M. A., and Skarmeta, A. F. (2012). Knowledge acquisition
424
and
425
environments based on the Internet of Things. IEEE(2012 IEEE 11th
426
International Conference on Trust, Security and Privacy in Computing and
427
Communications), 1811-1818.
management
architecture
for
mobile
and
personal
Health
428
Kyriazis, D., Varvarigou, T., Rossi, A., White, D., and Cooper, J. (2013).
429
Sustainable smart city IoT applications: Heat and electricity management
430
and Eco-conscious cruise control for public transportation. IEEE(2013
20
431
IEEE 14th International Symposium and Workshops on a World of
432
Wireless, Mobile and Multimedia Networks (WoWMoM)), 1-5.
433
Li, R., and Luo, H. (2010). Based on the Internet of Things the Supermarket
434
Chain Management Information System Development and Safety Stock
435
Research. IEEE(2010 2nd International Conference on Education
436
Technology and Computer (ICETC)), V2-368-371.
437
Lin, X. (2011). Logistic Geographical Information Detecting Unified Information
438
System Based on Internet of Things. IEEE(3rd International Conference
439
on Communication Software and Networks (ICCSN)), 303-307.
440
Lo´pez, T. s. S. n., Ranasinghe, D. C., Harrison, M., and McFarlane, D. (2012).
441
Adding sense to the Internet of Things, An architecture framework for
442
Smart Object systems. Pers Ubiquit Comput, 16:291–308.
443
Ren, X., Jiang, H., Wu, Y., Yang, X., and Liu, K. (2012). The Internet of things in
444
the license plate recognition technology application and design.
445
IEEE(2012 Second International Conference on Business Computing and
446
Global Informatization), 969-972.
447
RFID Journal. (2009). Retrieved 15/12/2013, 2013
448
Rohokale, V. M., Prasad, N. R., and Prasad, R. (2011). A cooperative Internet of
449
Things (IoT) for rural healthcare monitoring and control 2011 2nd
450
International
451
Technology, Information Theory and Aerospace and Electronic Systems
452
Technology (Wireless VITAE), 1 - 6.
Conference
on
Wireless
Communication,
Vehicular
21
453
Ryu, M.-W., Kim, J., Lee, S.-S., and Song, M.-H. (2012). Survey on Internet of
454
Things: Toward Case Study. Smart Computing Review, vol. 2, no. 3, June
455
2012. doi: DOI: 10.6029/smartcr.2012.03.002
456
Shengguang, L., Lin, T., Yuanshuo, Z., and Rucai, Z. Internet of Things for
457
Special Materials Transportation Vehicles. IEEE(2013 IEEE International
458
Conference on Green Computing and Communications and IEEE Internet
459
of Things and IEEE Cyber), 1891-1894.
460
Soldatos, J., Kefalakis, N., Leontiadis, N., Konstantinou, N., Mitton, N., Schmidt,
461
L., . . . Gama, K. (2010). D-3.4b: Core aspire middleware infrastructure.
462
Technical Report.
463
464
Uckelmann, D., Harrison, M., and Michahelles, F. (2011). Architecting the
Internet of Things. Springer Heidelberg Dordrecht London New York.
465
Vermesan, O., and Friess, P. (2013). Internet of Things: Converging Technologies
466
for Smart Environments and Integrated Ecosystems. River Publishers
467
Series In Communications.
468
Wang, J., Adib, F., Knepper, R., Katabi, D., and Rus, D. (2013). RF-compass:
469
robot object manipulation using RFIDs MobiCom '13: Proceedings of the
470
19th annual international conference on Mobile computing and
471
networking(September 2013).
472
Wei, Y. (2011). Design and Realization of Mobile Information Collection Module
473
in Logistic Internet of Things Unified Information System. IEEE(3rd
474
International Conference on Communication Software and Networks
475
(ICCSN)), 263 - 266
22
476
Xiao, Y., Li, W., Chen, X.-j., Liu, B.-y., Wang, L., and Fang, D.-y. (2013). An
477
Immune Theory Based Health Monitoring and Risk Evaluation of Earthen
478
Sites with Internet of Things. IEEE(2013 IEEE International Conference
479
on Green Computing and Communications and IEEE Internet of Things
480
and IEEE Cyber), 378-382.
481
Yang, N., Zhao, X., and Zhang, H. (2012). A Non-contact Health Monitoring
482
Model Based on the Internet of Things. IEEE(2012 8th International
483
Conference on Natural Computation), 506-510.
484
485
486
487
488
Yang, Q., Wang, Z., and Yue, Y. (2012). Summarize The Technology of The
Things of Internet. IEEE, 1357-1360.
23
489
• Item
identification
490
491
492
493
494
495
• Embedded
System
• Sensor
• Wireless
Sensor
Networks
tagging
things
feeling
things
thinking
Things
shrinking
Things
• NanoTechnology
Figure 1 Four dimensions for IoT (ITU)
Download