{"ID":78164,"post_author":"9208550","post_date":"2018-12-17 15:37:36","post_date_gmt":"0000-00-00 00:00:00","post_content":"","post_title":"I Dream of IoT","post_excerpt":"","post_status":"draft","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"","to_ping":"","pinged":"","post_modified":"2018-12-17 15:37:36","post_modified_gmt":"2018-12-17 20:37:36","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.limsforum.com\/?post_type=ebook&#038;p=78164","menu_order":0,"post_type":"ebook","post_mime_type":"","comment_count":"0","filter":"","_ebook_metadata":{"enabled":"on","private":"0","guid":"FDCC96E1-D85E-46CA-9CAF-9022026E1DDA","title":"I Dream of IoT","subtitle":"A Brief Introduction to the Internet of Things","cover_theme":"nico_4","cover_image":"https:\/\/www.limsforum.com\/wp-content\/plugins\/rdp-ebook-builder\/pl\/cover.php?cover_style=nico_4&subtitle=A+Brief+Introduction+to+the+Internet+of+Things&editor=John+Jones&title=I+Dream+of+IoT&title_image=https%3A%2F%2Fupload.wikimedia.org%2Fwikipedia%2Fcommons%2Fthumb%2Fb%2Fb5%2FCloud_computing.svg%2F600px-Cloud_computing.svg.png&publisher=Laboratory+Informatics+Institute","editor":"John Jones","publisher":"Laboratory Informatics Institute","author_id":"2","image_url":"","items":{"679280743843ff364bcfe359ca3aa76a_type":"article","679280743843ff364bcfe359ca3aa76a_title":"Chapter 9 : IoT and The Next 20 Internet Years","679280743843ff364bcfe359ca3aa76a_url":"https:\/\/www.limswiki.org\/index.php\/LII:I_Dream_of_IoT\/Chapter_9_:_IoT_and_The_Next_20_Internet_Years","679280743843ff364bcfe359ca3aa76a_plaintext":"\n\n\t\t\n\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\n\t\t\t\tLII:I Dream of IoT\/Chapter 9 : IoT and The Next 20 Internet Years\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\tFrom LIMSWiki\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\tJump to: navigation, search\n\n\t\t\t\t\t\n\t\t\t\t\tContents \n\n1 Internet of Things: The next 20 internet years \n\n1.1 Technology developments \n1.2 Internet for health \n\n\n2 Ten gadgets and apps of the future \n3 Investment in IoT in the next 20 years \n4 Conclusion \n5 References \n6 Authors and editors \n\n\nInternet of Things: The next 20 internet years \nThe next 20 years of the Internet of Things (IoT) will see an evolution of mobile, home and embedded devices that will be connected to the internet. We'll surely see huge improvements in internet communications and computing that will transform our businesses, lives, industries, and other aspects of our world in countless ways. The internet is creating new global technologies and creating integration opportunities for the rest of the world. Seeing the rapid growth from the old cellular grid to the rapid advancements in data-streaming over wireless cellular networks, one day maybe the internet will be a giant, invisible, omnipresent grid streaming data and information over the air. If today we need a WiFi signal to get online, within the next 20 years perhaps we'll see an improved network technology that will span from border to border, without limits.\n\nTechnology developments \nWe're already seeing technology paradigm changes, with streaming entertainment replacing traditional cable television. With broader adoption of high-speed wireless internet, why do we need cable television? Perhaps producers of TV content will realize that there is more ad profit if they stream directly to consumers.&#91;1&#93;\nWe'll see other changes as well, including the integration of biology and the computer. For example, a handful of companies today are already depending on biometrics such as thumbprints, facial and voice recognition, and retinal scans, but biometrics can be further enhanced due technological advances. More commonly today, companies are turning to small USB \"tokens\" with pin code, plus an additional pin code that has to be memorized in order to strengthen up their security. Unfortunately, it's hard to carry that token everywhere, plus it is easily stolen or lost. Thus, in 20 years, implanted biometrics might be done where security tokens will be embedded into the body and the presence of the token can be detect by a sensor. With the presence of a correctly implanted token combined with the remembered password, access can be gained. This is much more secure because an implant is much more difficult to steal.&#91;1&#93;\n\nInternet for health \nIn 20 years, the progress of internet applications and technology will transform the healthcare industry. Already medical implants are tapping into the concept of IoT by broadcasting information that can be collected outside the body. Such implants can help prevent disease by alerting medical professionals of vitamin deficiencies, abnormal cell counts, malfunctioning organs, or even cancer. Such devices will even be useful therapeutically, administering medications automatically, much in the same way a pacemaker stabilizes a heart.&#91;2&#93;\nApart from implantable devices, the healthcare industry is likely to be radically changed by hospice robots (health service), such as those characterized in futuristic movies like Robot &amp; Frank and Big Hero 6. An aging population is already putting great pressure on our healthcare system, increasing related costs. With robotic technology and improvements in internet communications and connectivity, we\u2019ll be able to improve how we care for the sick, disabled, and elderly. Every patient can have one-on-one care, and people can rest with their loved ones while they are receiving focused and inexpensive care. Certainly, human contact has been shown to be beneficial for the sick and elderly. If hospice robots become the norm, there\u2019s a risk that patients will go without any real human contact for long periods of time. The robots are coming, but it\u2019s the decisions we make about how to use them that will determine whether these robots will distance patients or instead facilitate more frequent interactions with distant friends and relatives.&#91;2&#93;\n\nTen gadgets and apps of the future \nHere are 10 examples of futuristic gadgets that utilize the IoT concept&#91;3&#93;:\n1. Smart Tennis Sensor\nBy attaching the Smart Tennis Sensor to the racket, all shot data is recorded and displayed in real time on a Bluetooth-connected smartphone. From the app screen, we can check the type of swing, swing speed, ball speed, ball spin and others for every shot. All data are recorded in the smartphone, and the play reports are created automatically so that we can look back and analyze our tennis game. The Smart Tennis Sensor can also work alone without the smartphone.\n\n<\/p>2. Moto 360\nMoto 360 is a smartwatch. It's just like linking up with the entire world through Android wear. It predicts and shows the weather or the upcoming events. You can also keep in touch through e-mails and chat like Facebook and Messenger directly without having to pull your mobile device from your pocket. Because it's powered by Android Wear, we can just use our voice to do all the things we do like send texts and more without even touching it.\n\n<\/p>3. Skybell\nWhen someone rings the bell of your front door, WiFi-enabled SkyBell sends a real-time alert and makes a video conversation with your visitor available over your Android or iOS device. The speaker and microphone are built in to allow a conversation without opening the door. It\u2019s also equipped with a motion sensor which will alert you when someone approaches and stands at your door for 10 seconds. It also has night vision and can save a screenshot of what you see.\n\n<\/p>4. Fitbit ZIP\nThe ZIP wireless activity tracker is able to track your path, your distance, and calories burned. Its silicon clip is comfortable for wearing throughout the day, everywhere. It\u2019s also sweat-proof and able to stand up to the rain and other splashes. ZIP also can automatically sync the data to PCs, MACs, iOS devices, and Android devices.\n\n<\/p>5. Trakdot\nThe Trakdot is a tracking device that can be paired with your cell phone and packed together in your suitcase. Once you arrive at a certain place, Trakdot will send an SMS or e-mail to your phone that notifies you of your bag\u2019s location. \n\n<\/p>6. Sen.se Mother\nMother connects to Motion cookies (four are included), a small sensor that had been programmed to measure or detect all the things around your home such as when your kids brushed their teeth. Mother sends the notifications by e-mail, text messages, or voice mails. It also has a storybook feature that tells you your own story, checking your activity and whether it's normal or deserves attention.\n\n<\/p>7. Delphi Connect\nThis module helps you monitor a vehicles from the smartphone or computer. It can to lock the door, engage the horn, and engage the remote car starter directly from your smartphone and computer. It also has a diagnostic tool that securely accesses your vehicle\u2019s driving data and the mechanical conditions that can be seen in your smartphone or computer. It also shows the vehicle\u2019s location and reviews driving skills. Set up an e-mail and text message to receive notifications if your vehicle exceeds a certain speed.\n\n<\/p>8. Withings Scale\nThis is a wireless scale that measures weight and calculates BMI. It also measures body fat percentage by uploading through WiFi. From the smartphone or computer, you can access the chart and graph personally. \n\n<\/p>9. Google Glass\nThese amazing internet-connected glasses have a camera, microphone, and much more. They're goal is to make hands-free technology a reality for people. By using voice commands, we can retrieve information from phones, participate in Google Hangout conversations, or get information from the internet. \n\n<\/p>10. LIFX light bulb\nLIFX is an energy-efficient LED light bulb that can be controled using smart devices. It has the ability to change the full color of light at your home or workplace using your smart phone. Improve your quality of sleep by slowing dimming lights and wake up in the morning with automatically increasing light.\n\n<\/p>\nInvestment in IoT in the next 20 years \nThe Internet of Things (IoT) will double the size of the connected internet over the next 20 years, and huge investments into that future are being made right now. The major internet power-brokers are already investing billions of dollars into IoT, and it is imperative that companies understand IoT now in order to benefit from trillions of dollars of pent-up value that will be released as 10 billion individuals, devices and services are connected together.\nIoT contains a considerable amount of groundbreaking thinking and deep-level market insight. As the number of humans grows in this world, there will be new problems to solve. Day by day the user expects more from the internet. But to meet the need of these higher expectations, increasing investment towards the internet has to be make every year. Just imagine what we could accomplish in the next 20 years with this great technology with a significant investment into it. \n\nConclusion \nIn conclusion, IoT and the next 20 internet years will see a variety of changes. Automation will certainly be a major player as an increasing number of devices is connected. Traditional work from offices as well as media, healthcare, and daily activities will change. However, to realize these imagined futures, a significant investment must be made.\n\nReferences \n\n\n\u2191 a b Dube, R.&#32;(7 March 2012).&#32;\"What Computer Technology &amp; The Internet Will Look Like In 20 Years [Opinion\"].&#32;MakeUseOf.&#32;MakeUseOf Limited.&#32;http:\/\/www.makeuseof.com\/tag\/computer-technology-internet-20-years\/ .&#32;Retrieved 8 June 2016 . &#160; \n\n\u2191 a b Lejuwaan, J.&#32;(25 March 2010).&#32;\"10 Ways the Next 10 Years Are Going To Be Mind-Blowing\".&#32;HighExistence.&#32;http:\/\/highexistence.com\/10-ways-the-next-10-years-are-going-to-be-mind-blowing\/ .&#32;Retrieved 8 June 2016 . &#160; \n\n\u2191 Marr, B.&#32;(22 July 2014).&#32;\"The 21 Coolest \u2018Internet of Things\u2019 Gadgets You Will Want Today\".&#32;LinkedIn.&#32;https:\/\/www.linkedin.com\/pulse\/20140722072521-64875646-the-21-coolest-internet-of-things-gadgets-you-will-want-today .&#32;Retrieved 8 June 2016 . &#160; \n\n\nAuthors and editors \nNarul Nooryani\nNadzirah Farah\nNorhana Maisarah\n\n\n\n<\/pre>\n\nNotes \nThis article is a direct transclusion of the Wikibooks article and therefore may not meet the same editing standards as LIMSwiki.\n\n\n\n\n\n\nSource: <a rel=\"external_link\" class=\"external\" href=\"https:\/\/www.limswiki.org\/index.php\/LII:I_Dream_of_IoT\/Chapter_9_:_IoT_and_The_Next_20_Internet_Years\">https:\/\/www.limswiki.org\/index.php\/LII:I_Dream_of_IoT\/Chapter_9_:_IoT_and_The_Next_20_Internet_Years<\/a>\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\n\t\t\n\t\t\n\t\t\tNavigation menu\n\t\t\t\t\t\n\t\t\tViews\n\n\t\t\t\n\t\t\t\t\n\t\t\t\tLII\n\t\t\t\tDiscussion\n\t\t\t\tView source\n\t\t\t\tHistory\n\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\n\t\t\t\tPersonal tools\n\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\tLog in\n\t\t\t\t\t\t\t\t\t\t\t\t\tRequest account\n\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\n\t\t\t\n\t\t\t\t\n\t\t\t\n\t\t\t\t\n\t\tNavigation\n\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\tMain page\n\t\t\t\t\t\t\t\t\t\t\tRecent changes\n\t\t\t\t\t\t\t\t\t\t\tRandom page\n\t\t\t\t\t\t\t\t\t\t\tHelp\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\n\t\t\t\n\t\t\tSearch\n\n\t\t\t\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t&#160;\n\t\t\t\t\t\t\n\t\t\t\t\n\n\t\t\t\t\t\t\t\n\t\t\n\t\t\t\n\t\t\tTools\n\n\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\tWhat links here\n\t\t\t\t\t\t\t\t\t\t\tRelated changes\n\t\t\t\t\t\t\t\t\t\t\tSpecial pages\n\t\t\t\t\t\t\t\t\t\t\tPermanent link\n\t\t\t\t\t\t\t\t\t\t\tPage information\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\n\t\t\n\t\tPrint\/export\n\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\tCreate a book\n\t\t\t\t\t\t\t\t\t\t\tDownload as PDF\n\t\t\t\t\t\t\t\t\t\t\tDownload as Plain text\n\t\t\t\t\t\t\t\t\t\t\tPrintable version\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\n\t\t\n\t\tSponsors\n\t\t\n\t\t\t \r\n\n\t\r\n\n\t\r\n\n\t\r\n\n\t\n\t\r\n\n \r\n\n\t\n\t\r\n\n \r\n\n\t\n\t\r\n\n\t\n\t\r\n\n\t\r\n\n\t\r\n\n\t\r\n\t\t\n\t\t\n\t\t\t\n\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t This page was last modified on 8 June 2016, at 20:31.\n\t\t\t\t\t\t\t\t\tThis page has been accessed 540 times.\n\t\t\t\t\t\t\t\t\tContent is available under a Creative Commons Attribution-ShareAlike 4.0 International License unless otherwise noted.\n\t\t\t\t\t\t\t\t\tPrivacy policy\n\t\t\t\t\t\t\t\t\tAbout LIMSWiki\n\t\t\t\t\t\t\t\t\tDisclaimers\n\t\t\t\t\t\t\t\n\t\t\n\t\t\n\t\t\n\n","679280743843ff364bcfe359ca3aa76a_html":"<body class=\"mediawiki ltr sitedir-ltr ns-202 ns-subject page-LII_I_Dream_of_IoT_Chapter_9_IoT_and_The_Next_20_Internet_Years skin-monobook action-view\">\n<div id=\"rdp-ebb-globalWrapper\">\n\t\t<div id=\"rdp-ebb-column-content\">\n\t\t\t<div id=\"rdp-ebb-content\" class=\"mw-body\" role=\"main\">\n\t\t\t\t<a id=\"rdp-ebb-top\"><\/a>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t<h1 id=\"rdp-ebb-firstHeading\" class=\"firstHeading\" lang=\"en\">LII:I Dream of IoT\/Chapter 9 : IoT and The Next 20 Internet Years<\/h1>\n\t\t\t\t\n\t\t\t\t<div id=\"rdp-ebb-bodyContent\" class=\"mw-body-content\">\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\n\n\t\t\t\t\t<!-- start content -->\n\t\t\t\t\t<div id=\"rdp-ebb-mw-content-text\" lang=\"en\" dir=\"ltr\" class=\"mw-content-ltr\"><div class=\"mw-parser-output\">\n<h2><span class=\"mw-headline\" id=\"Internet_of_Things:_The_next_20_internet_years\">Internet of Things: The next 20 internet years<\/span><\/h2>\n<p>The next 20 years of the Internet of Things (IoT) will see an evolution of mobile, home and embedded devices that will be connected to the internet. We'll surely see huge improvements in internet communications and computing that will transform our businesses, lives, industries, and other aspects of our world in countless ways. The internet is creating new global technologies and creating integration opportunities for the rest of the world. Seeing the rapid growth from the old cellular grid to the rapid advancements in data-streaming over wireless cellular networks, one day maybe the internet will be a giant, invisible, omnipresent grid streaming data and information over the air. If today we need a WiFi signal to get online, within the next 20 years perhaps we'll see an improved network technology that will span from border to border, without limits.\n<\/p>\n<h3><span class=\"mw-headline\" id=\"Technology_developments\">Technology developments<\/span><\/h3>\n<p>We're already seeing technology paradigm changes, with streaming entertainment replacing traditional cable television. With broader adoption of high-speed wireless internet, why do we need cable television? Perhaps producers of TV content will realize that there is more ad profit if they stream directly to consumers.<sup id=\"rdp-ebb-cite_ref-DubeWhat12_1-0\" class=\"reference\"><a href=\"#cite_note-DubeWhat12-1\" rel=\"external_link\">&#91;1&#93;<\/a><\/sup>\n<\/p><p>We'll see other changes as well, including the integration of biology and the computer. For example, a handful of companies today are already depending on biometrics such as thumbprints, facial and voice recognition, and retinal scans, but biometrics can be further enhanced due technological advances. More commonly today, companies are turning to small USB \"tokens\" with pin code, plus an additional pin code that has to be memorized in order to strengthen up their security. Unfortunately, it's hard to carry that token everywhere, plus it is easily stolen or lost. Thus, in 20 years, implanted biometrics might be done where security tokens will be embedded into the body and the presence of the token can be detect by a sensor. With the presence of a correctly implanted token combined with the remembered password, access can be gained. This is much more secure because an implant is much more difficult to steal.<sup id=\"rdp-ebb-cite_ref-DubeWhat12_1-1\" class=\"reference\"><a href=\"#cite_note-DubeWhat12-1\" rel=\"external_link\">&#91;1&#93;<\/a><\/sup>\n<\/p>\n<h3><span class=\"mw-headline\" id=\"Internet_for_health\">Internet for health<\/span><\/h3>\n<p>In 20 years, the progress of internet applications and technology will transform the healthcare industry. Already medical implants are tapping into the concept of IoT by broadcasting information that can be collected outside the body. Such implants can help prevent disease by alerting medical professionals of vitamin deficiencies, abnormal cell counts, malfunctioning organs, or even cancer. Such devices will even be useful therapeutically, administering medications automatically, much in the same way a pacemaker stabilizes a heart.<sup id=\"rdp-ebb-cite_ref-Lejuwaan1010_2-0\" class=\"reference\"><a href=\"#cite_note-Lejuwaan1010-2\" rel=\"external_link\">&#91;2&#93;<\/a><\/sup>\n<\/p><p>Apart from implantable devices, the healthcare industry is likely to be radically changed by hospice robots (health service), such as those characterized in futuristic movies like <i>Robot &amp; Frank<\/i> and <i>Big Hero 6<\/i>. An aging population is already putting great pressure on our healthcare system, increasing related costs. With robotic technology and improvements in internet communications and connectivity, we\u2019ll be able to improve how we care for the sick, disabled, and elderly. Every patient can have one-on-one care, and people can rest with their loved ones while they are receiving focused and inexpensive care. Certainly, human contact has been shown to be beneficial for the sick and elderly. If hospice robots become the norm, there\u2019s a risk that patients will go without any real human contact for long periods of time. The robots are coming, but it\u2019s the decisions we make about how to use them that will determine whether these robots will distance patients or instead facilitate more frequent interactions with distant friends and relatives.<sup id=\"rdp-ebb-cite_ref-Lejuwaan1010_2-1\" class=\"reference\"><a href=\"#cite_note-Lejuwaan1010-2\" rel=\"external_link\">&#91;2&#93;<\/a><\/sup>\n<\/p>\n<h2><span class=\"mw-headline\" id=\"Ten_gadgets_and_apps_of_the_future\">Ten gadgets and apps of the future<\/span><\/h2>\n<p>Here are 10 examples of futuristic gadgets that utilize the IoT concept<sup id=\"rdp-ebb-cite_ref-MarrThe2114_3-0\" class=\"reference\"><a href=\"#cite_note-MarrThe2114-3\" rel=\"external_link\">&#91;3&#93;<\/a><\/sup>:\n<\/p><p>1. <b>Smart Tennis Sensor<\/b>\n<p>By attaching the Smart Tennis Sensor to the racket, all shot data is recorded and displayed in real time on a Bluetooth-connected smartphone. From the app screen, we can check the type of swing, swing speed, ball speed, ball spin and others for every shot. All data are recorded in the smartphone, and the play reports are created automatically so that we can look back and analyze our tennis game. The Smart Tennis Sensor can also work alone without the smartphone.\n<\/p>\n<\/p><p>2. <b>Moto 360<\/b>\n<p>Moto 360 is a smartwatch. It's just like linking up with the entire world through Android wear. It predicts and shows the weather or the upcoming events. You can also keep in touch through e-mails and chat like Facebook and Messenger directly without having to pull your mobile device from your pocket. Because it's powered by Android Wear, we can just use our voice to do all the things we do like send texts and more without even touching it.\n<\/p>\n<\/p><p>3. <b>Skybell<\/b>\n<p>When someone rings the bell of your front door, WiFi-enabled SkyBell sends a real-time alert and makes a video conversation with your visitor available over your Android or iOS device. The speaker and microphone are built in to allow a conversation without opening the door. It\u2019s also equipped with a motion sensor which will alert you when someone approaches and stands at your door for 10 seconds. It also has night vision and can save a screenshot of what you see.\n<\/p>\n<\/p><p>4. <b>Fitbit ZIP<\/b>\n<p>The ZIP wireless activity tracker is able to track your path, your distance, and calories burned. Its silicon clip is comfortable for wearing throughout the day, everywhere. It\u2019s also sweat-proof and able to stand up to the rain and other splashes. ZIP also can automatically sync the data to PCs, MACs, iOS devices, and Android devices.\n<\/p>\n<\/p><p>5. <b>Trakdot<\/b>\n<p>The Trakdot is a tracking device that can be paired with your cell phone and packed together in your suitcase. Once you arrive at a certain place, Trakdot will send an SMS or e-mail to your phone that notifies you of your bag\u2019s location. \n<\/p>\n<\/p><p>6. <b>Sen.se Mother<\/b>\n<p>Mother connects to Motion cookies (four are included), a small sensor that had been programmed to measure or detect all the things around your home such as when your kids brushed their teeth. Mother sends the notifications by e-mail, text messages, or voice mails. It also has a storybook feature that tells you your own story, checking your activity and whether it's normal or deserves attention.\n<\/p>\n<\/p><p>7. <b>Delphi Connect<\/b>\n<p>This module helps you monitor a vehicles from the smartphone or computer. It can to lock the door, engage the horn, and engage the remote car starter directly from your smartphone and computer. It also has a diagnostic tool that securely accesses your vehicle\u2019s driving data and the mechanical conditions that can be seen in your smartphone or computer. It also shows the vehicle\u2019s location and reviews driving skills. Set up an e-mail and text message to receive notifications if your vehicle exceeds a certain speed.\n<\/p>\n<\/p><p>8. <b>Withings Scale<\/b>\n<p>This is a wireless scale that measures weight and calculates BMI. It also measures body fat percentage by uploading through WiFi. From the smartphone or computer, you can access the chart and graph personally. \n<\/p>\n<\/p><p>9. <b>Google Glass<\/b>\n<p>These amazing internet-connected glasses have a camera, microphone, and much more. They're goal is to make hands-free technology a reality for people. By using voice commands, we can retrieve information from phones, participate in Google Hangout conversations, or get information from the internet. \n<\/p>\n<\/p><p>10. <b>LIFX light bulb<\/b>\n<p>LIFX is an energy-efficient LED light bulb that can be controled using smart devices. It has the ability to change the full color of light at your home or workplace using your smart phone. Improve your quality of sleep by slowing dimming lights and wake up in the morning with automatically increasing light.\n<\/p>\n<\/p>\n<h2><span class=\"mw-headline\" id=\"Investment_in_IoT_in_the_next_20_years\">Investment in IoT in the next 20 years<\/span><\/h2>\n<p>The Internet of Things (IoT) will double the size of the connected internet over the next 20 years, and huge investments into that future are being made right now. The major internet power-brokers are already investing billions of dollars into IoT, and it is imperative that companies understand IoT now in order to benefit from trillions of dollars of pent-up value that will be released as 10 billion individuals, devices and services are connected together.\n<\/p><p>IoT contains a considerable amount of groundbreaking thinking and deep-level market insight. As the number of humans grows in this world, there will be new problems to solve. Day by day the user expects more from the internet. But to meet the need of these higher expectations, increasing investment towards the internet has to be make every year. Just imagine what we could accomplish in the next 20 years with this great technology with a significant investment into it. \n<\/p>\n<h2><span class=\"mw-headline\" id=\"Conclusion\">Conclusion<\/span><\/h2>\n<p>In conclusion, IoT and the next 20 internet years will see a variety of changes. Automation will certainly be a major player as an increasing number of devices is connected. Traditional work from offices as well as media, healthcare, and daily activities will change. However, to realize these imagined futures, a significant investment must be made.\n<\/p>\n<h2><span class=\"mw-headline\" id=\"References\">References<\/span><\/h2>\n<div class=\"reflist references\" style=\"\">\n<ol class=\"references\">\n<li id=\"cite_note-DubeWhat12-1\"><span class=\"mw-cite-backlink\">\u2191 <sup><a href=\"#cite_ref-DubeWhat12_1-0\" rel=\"external_link\"><i><b>a<\/b><\/i><\/a><\/sup> <sup><a href=\"#cite_ref-DubeWhat12_1-1\" rel=\"external_link\"><i><b>b<\/b><\/i><\/a><\/sup><\/span> <span class=\"reference-text\"><span class=\"citation web\">Dube, R.&#32;(7 March 2012).&#32;<a rel=\"external_link\" class=\"external text\" href=\"http:\/\/www.makeuseof.com\/tag\/computer-technology-internet-20-years\/\" target=\"_blank\">\"What Computer Technology &amp; The Internet Will Look Like In 20 Years [Opinion<\/a>\"].&#32;<i>MakeUseOf<\/i>.&#32;MakeUseOf Limited<span class=\"printonly\">.&#32;<a rel=\"external_link\" class=\"external free\" href=\"http:\/\/www.makeuseof.com\/tag\/computer-technology-internet-20-years\/\" target=\"_blank\">http:\/\/www.makeuseof.com\/tag\/computer-technology-internet-20-years\/<\/a><\/span><span class=\"reference-accessdate\">.&#32;Retrieved 8 June 2016<\/span>.<\/span><span class=\"Z3988\" title=\"ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.btitle=What+Computer+Technology+%26+The+Internet+Will+Look+Like+In+20+Years+%5BOpinion%5D&amp;rft.atitle=MakeUseOf&amp;rft.aulast=Dube%2C+R.&amp;rft.au=Dube%2C+R.&amp;rft.date=7+March+2012&amp;rft.pub=MakeUseOf+Limited&amp;rft_id=http%3A%2F%2Fwww.makeuseof.com%2Ftag%2Fcomputer-technology-internet-20-years%2F&amp;rfr_id=info:sid\/en.wikibooks.org:I_Dream_of_IoT\/Chapter_9_:_IoT_and_The_Next_20_Internet_Years\"><span style=\"display: none;\">&#160;<\/span><\/span><\/span>\n<\/li>\n<li id=\"cite_note-Lejuwaan1010-2\"><span class=\"mw-cite-backlink\">\u2191 <sup><a href=\"#cite_ref-Lejuwaan1010_2-0\" rel=\"external_link\"><i><b>a<\/b><\/i><\/a><\/sup> <sup><a href=\"#cite_ref-Lejuwaan1010_2-1\" rel=\"external_link\"><i><b>b<\/b><\/i><\/a><\/sup><\/span> <span class=\"reference-text\"><span class=\"citation web\">Lejuwaan, J.&#32;(25 March 2010).&#32;<a rel=\"external_link\" class=\"external text\" href=\"http:\/\/highexistence.com\/10-ways-the-next-10-years-are-going-to-be-mind-blowing\/\" target=\"_blank\">\"10 Ways the Next 10 Years Are Going To Be Mind-Blowing\"<\/a>.&#32;<i>HighExistence<\/i><span class=\"printonly\">.&#32;<a rel=\"external_link\" class=\"external free\" href=\"http:\/\/highexistence.com\/10-ways-the-next-10-years-are-going-to-be-mind-blowing\/\" target=\"_blank\">http:\/\/highexistence.com\/10-ways-the-next-10-years-are-going-to-be-mind-blowing\/<\/a><\/span><span class=\"reference-accessdate\">.&#32;Retrieved 8 June 2016<\/span>.<\/span><span class=\"Z3988\" title=\"ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.btitle=10+Ways+the+Next+10+Years+Are+Going+To+Be+Mind-Blowing&amp;rft.atitle=HighExistence&amp;rft.aulast=Lejuwaan%2C+J.&amp;rft.au=Lejuwaan%2C+J.&amp;rft.date=25+March+2010&amp;rft_id=http%3A%2F%2Fhighexistence.com%2F10-ways-the-next-10-years-are-going-to-be-mind-blowing%2F&amp;rfr_id=info:sid\/en.wikibooks.org:I_Dream_of_IoT\/Chapter_9_:_IoT_and_The_Next_20_Internet_Years\"><span style=\"display: none;\">&#160;<\/span><\/span><\/span>\n<\/li>\n<li id=\"cite_note-MarrThe2114-3\"><span class=\"mw-cite-backlink\"><a href=\"#cite_ref-MarrThe2114_3-0\" rel=\"external_link\">\u2191<\/a><\/span> <span class=\"reference-text\"><span class=\"citation web\">Marr, B.&#32;(22 July 2014).&#32;<a rel=\"external_link\" class=\"external text\" href=\"https:\/\/www.linkedin.com\/pulse\/20140722072521-64875646-the-21-coolest-internet-of-things-gadgets-you-will-want-today\" target=\"_blank\">\"The 21 Coolest \u2018Internet of Things\u2019 Gadgets You Will Want Today\"<\/a>.&#32;<i>LinkedIn<\/i><span class=\"printonly\">.&#32;<a rel=\"external_link\" class=\"external free\" href=\"https:\/\/www.linkedin.com\/pulse\/20140722072521-64875646-the-21-coolest-internet-of-things-gadgets-you-will-want-today\" target=\"_blank\">https:\/\/www.linkedin.com\/pulse\/20140722072521-64875646-the-21-coolest-internet-of-things-gadgets-you-will-want-today<\/a><\/span><span class=\"reference-accessdate\">.&#32;Retrieved 8 June 2016<\/span>.<\/span><span class=\"Z3988\" title=\"ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.btitle=The+21+Coolest+%E2%80%98Internet+of+Things%E2%80%99+Gadgets+You+Will+Want+Today&amp;rft.atitle=LinkedIn&amp;rft.aulast=Marr%2C+B.&amp;rft.au=Marr%2C+B.&amp;rft.date=22+July+2014&amp;rft_id=https%3A%2F%2Fwww.linkedin.com%2Fpulse%2F20140722072521-64875646-the-21-coolest-internet-of-things-gadgets-you-will-want-today&amp;rfr_id=info:sid\/en.wikibooks.org:I_Dream_of_IoT\/Chapter_9_:_IoT_and_The_Next_20_Internet_Years\"><span style=\"display: none;\">&#160;<\/span><\/span><\/span>\n<\/li>\n<\/ol><\/div>\n<h2><span class=\"mw-headline\" id=\"Authors_and_editors\">Authors and editors<\/span><\/h2>\n<ul><li>Narul Nooryani<\/li>\n<li>Nadzirah Farah<\/li>\n<li>Norhana Maisarah<\/li><\/ul>\n<p><!-- \nNewPP limit report\nParsed by mw1321\nCached time: 20181125231242\nCache expiry: 1900800\nDynamic content: false\nCPU time usage: 0.084 seconds\nReal time usage: 0.108 seconds\nPreprocessor visited node count: 1631\/1000000\nPreprocessor generated node count: 0\/1500000\nPost\u2010expand include size: 14923\/2097152 bytes\nTemplate argument size: 6540\/2097152 bytes\nHighest expansion depth: 14\/40\nExpensive parser function count: 0\/500\nUnstrip recursion depth: 0\/20\nUnstrip post\u2010expand size: 5109\/5000000 bytes\nNumber of Wikibase entities loaded: 0\/400\nLua time usage: 0.017\/10.000 seconds\nLua memory usage: 819 KB\/50 MB\n-->\n<!--\nTransclusion expansion time report (%,ms,calls,template)\n100.00% 88.678 1 -total\n<\/p>\n<pre>53.57% 47.506 1 Template:Reflist\n46.32% 41.077 1 Template:BookCat\n42.88% 38.021 3 Template:Cite_web\n35.10% 31.129 3 Template:Citation\/core\n13.33% 11.825 1 Template:Evalx\n 6.09% 5.396 6 Template:Citation\/make_link\n 5.93% 5.255 1 Template:BOOKCATEGORY\n 3.13% 2.777 1 Template:NAIVEBOOKNAME\n<\/pre>\n<p>-->\n<\/p><p><!-- Saved in parser cache with key enwikibooks:pcache:idhash:307426-1!canonical and timestamp 20181125231242 and revision id 3106260\n<\/p>\n<pre>-->\n<\/pre>\n<\/div>\n<h2><span class=\"mw-headline\" id=\"Notes\">Notes<\/span><\/h2>\n<p>This article is a direct transclusion of <a rel=\"external_link\" class=\"external text\" href=\"https:\/\/en.wikibooks.org\/wiki\/I_Dream_of_IoT\/Chapter_9_:_IoT_and_The_Next_20_Internet_Years\" target=\"_blank\">the Wikibooks article<\/a> and therefore may not meet the same editing standards as LIMSwiki.\n<\/p>\n<!-- \nNewPP limit report\nCached time: 20181217203742\nCache expiry: 86400\nDynamic content: false\nCPU time usage: 0.011 seconds\nReal time usage: 0.152 seconds\nPreprocessor visited node count: 5\/1000000\nPreprocessor generated node count: 16\/1000000\nPost\u2010expand include size: 20\/2097152 bytes\nTemplate argument size: 0\/2097152 bytes\nHighest expansion depth: 2\/40\nExpensive parser function count: 0\/100\n-->\n\n<!-- \nTransclusion expansion time report (%,ms,calls,template)\n100.00% 147.392 1 - wikibooks:I_Dream_of_IoT\/Chapter_9_:_IoT_and_The_Next_20_Internet_Years\n100.00% 147.392 1 - -total\n-->\n\n<!-- Saved in parser cache with key limswiki:pcache:idhash:8789-0!*!*!*!*!*!* and timestamp 20181217203741 and revision id 25681\n -->\n<\/div><div class=\"printfooter\">Source: <a rel=\"external_link\" class=\"external\" href=\"https:\/\/www.limswiki.org\/index.php\/LII:I_Dream_of_IoT\/Chapter_9_:_IoT_and_The_Next_20_Internet_Years\">https:\/\/www.limswiki.org\/index.php\/LII:I_Dream_of_IoT\/Chapter_9_:_IoT_and_The_Next_20_Internet_Years<\/a><\/div>\n\t\t\t\t\t\t\t\t\t\t<!-- end content -->\n\t\t\t\t\t\t\t\t\t\t<div class=\"visualClear\"><\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t<!-- end of the left (by default at least) column -->\n\t\t<div class=\"visualClear\"><\/div>\n\t\t\t\t\t\n\t\t<\/div>\n\t\t\n\n<\/body>","679280743843ff364bcfe359ca3aa76a_images":[],"679280743843ff364bcfe359ca3aa76a_timestamp":1545079061,"f2027528b9167b7dd0f5e8789440a401_type":"article","f2027528b9167b7dd0f5e8789440a401_title":"Chapter 8 : IoT and Case Study","f2027528b9167b7dd0f5e8789440a401_url":"https:\/\/www.limswiki.org\/index.php\/LII:I_Dream_of_IoT\/Chapter_8_:_IoT_and_Case_Study","f2027528b9167b7dd0f5e8789440a401_plaintext":"\n\n\t\t\n\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\n\t\t\t\tLII:I Dream of IoT\/Chapter 8 : IoT and Case Study\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\tFrom LIMSWiki\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\tJump to: navigation, search\n\n\t\t\t\t\t\n\t\t\t\t\tContents \n\n1 Internet of Things: Case studies \n\n1.1 Case study: Smart Santander parking monitor project \n1.2 Case study: Smart lighting \n1.3 Case study: Smart roads \n1.4 Case study: Smart water system \n1.5 Case study: Using the Meshlium scanner for smartphone detection \n\n\n2 Conclusion \n3 References \n\n\nInternet of Things: Case studies \nThe Internet of Things (IoT) represents a changing method of communication between humans and their technology. Typically, IoT is expected to offer advanced connectivity of devices, systems, and services that goes beyond machine-to-machine communications (M2M) and covers a variety of protocols, domains, and applications. The interconnection of these embedded devices (including smart objects), is expected to usher in automation in nearly all fields, while also enabling advanced applications such as the smart grid. IoT can potentially contribute to many aspects of the human lifestyle, including in healthcare, education, transportation, and business. In buildings, IoT devices can be used to monitor and control the mechanical, electrical and electronic systems used in various homes and businesses (e.g., public and private, industrial, institutions, or residential). Home automation systems, like other building automation systems, are typically used to control lighting, heating, ventilation, air conditioning, appliances, communication systems, entertainment and home security devices to improve convenience, comfort, energy efficiency, and security. But to what degree have IoT systems been tested and used? Here are a few case studies.\n\nCase study: Smart Santander parking monitor project \nThe smart city is a city that uses IoT and other communication devices to manage its assets.&#91;1&#93; One such asset is the public parking area, which can be monitored for traffic and regulated for usage. The government of Santander, Spain tested such a smart parking system in 22 different zones of the city. This Smart Santander project was developed by several companies and institutions that aimed to design, deploy and valide a collection of sensors, actuators, cameras and screens that supply useful information to Santander\u2019s citizens.&#91;2&#93;\nEach zone was provided a Meshlium, an electronic system that gathers the data sensors and moves it to the cloud. Each zone had different network parameters, creating independent networks that work on different frequency channels so as to not interfere with the other networks. In this project, 375 Waspmotes were deployed in different locations within the city to measure the change in magnetic field above it (caused by a vehicle parked over it) to detect whether a parking slot is free. The magnetic field sensor was connected to the Waspmote through a Smart Parking Sensor Board. The sensor itself was buried under the surface of the road inside a waterproof casing. The hole was closed using a specific material and the sensor is barely detectable at a glance.&#91;2&#93;\nThe information was sent periodically to repeaters and after that to the Meshlium that stored the data, updating a public message board every five minutes, allowing citizens to find a free parking spot in the shortest time. Not only that, parking status was also updated on an interactive online map so that citizens could check for a free parking slot before they got to the city center.&#91;2&#93;\n\nCase study: Smart lighting \nSmart lighting systems allow a smart city to intelligently provide just the right amount of light depending on variables such as time, day, season, and weather. By applying this form of IoT, users could potentially save up to 80 percent energy versus traditional lighting systems, at least according to Janne Aikio at Finland\u2019s VTT Technical Research Centre. \"Forecasts suggest that smart lighting will become one of the key trends in the context of the Internet of Things,\" Aikio told Engineering and Technology Magazine. \"Demand for smart lighting is expected to boom over the next 10 years: as much as \u20ac7.7bn in 2020. The comparable figure in 2011 was \u20ac1.8bn.\"&#91;3&#93;\nLighting systems utilizing the IoT concept are already available for commercial use, able to integrate with existing building automation systems. For the future, this smart lighting system could improve by integrating with wireless system so that it can be controlled via devices such as mobile phone. \"Smart lighting systems are becoming increasingly popular in both new builds and renovation projects. The next major step will be to integrate better sensors and new functions into lighting systems, which will allow the occupants of a room to adjust lighting with increasing accuracy and flexibility according to their movements and activities,\" explained Aikio.&#91;3&#93;\nFor even better results, this smart lighting system could be integrated with many more features such as enabling the direction, power, and color of the lighting to be automatically adjusted according to the function of the room or time of day, season, and weather. For example, the lamp could be directed to point towards people in the room, and lighting near a window could change color according to the weather or temperature outside. Additionally, a smart lighting system could perhaps even be self-updating, downloading light filters or \"plugins\" on demand from the web.\n\nCase study: Smart roads \nThe application of IoT varies greatly, thanks to its reliable nature and ability to contribute positively to safety in the home as well as within industry. Yet it even has the potential to positively contribute to our lives while on the road. In fact, IoT stands to positively improve that which is central to much of our existing infrastructure today: the roads that make up our vast transportation network.\nMonitoring systems will play an important role on our streets in the future, whether it's to better keep citizens informed or to prepare for the coming of automated vehicles. A series of sensors, circuit boxes, and other IoT technologies will integrate to each other using radio and satellite to enable communication between nodes. That said, there are eight common areas to cover in this monitoring system. These eight areas are based on European roads and weather, though they're still applicable to the network of roads worldwide.\n1. Pollution: The first area is setting up a sensor network to monitor traffic-related pollution. The Libelium company offers an example with its Waspmote, which provides a miniature enclosed system that has a solar panel, antenna, and sensors that can be programmed to each node. It's capable of covering large areas with a massive number of networks, thus making it easy for maintenance with the effortless attachment to nodes. As for pollution, the main contributor is from carbon dioxide and nitrogen dioxide from vehicles. To detect this, gas sensors are attached at strategic points throughout the city\u2019s traffic network.&#91;4&#93;\n2. Noise: Next up is monitoring noise and generating a noise map. Acoustic sensors can map the noise to those routes in the city, using similar technology as mentioned in the discussion on pollution detection. The microphone used in the system can capture the source of noise, which is turned into usable data that can be placed into a heat map that shows regions of noise with a specific value in decibels.\n3. Weather: Next is weather monitoring between points of risk. Aspects to be monitored include temperature, humidity, rainfall, and wind speed and direction. Mini sensor networks with attached pluviometers and anemometers act as cheap weather stations, providing real-time information that can be used to warn drivers in advance so they may opt for other safer routes.\n4. and 5. Flooding and icing: These represent the same point of monitoring, only differing in the temperature: the pavement. Flooding can be measured using ground-based liquid sensors. With these sensors, drivers can be alerted to areas with high-water level issues and be alerted to take precautions when choosing their route. As for the icy road, a prediction application can be used driven off of date from temperature and humidity sensors to record likely ice formation along the roads.\n6. Structural cracking: As for structural cracking, linear displacement sensors can be used in bridges or tunnels to monitor for any cracks. In addition to displacement monitoring, vibration sensors \u2014 similar to those deployed to buildings in earthquake-prone areas \u2014 would help in further monitoring and controlling structural cracking as a whole.&#91;1&#93;\n7. Parking: As previously discussed, a vehicle detection system can rely on magnetic field sensors to detect traffic jams and the presence of vehicles in parking areas. It is installed in the pavement itself, equipped with material to cope with communication interference and humidity. The information shared between sensors is similar in style to pollution and noise monitoring, with the data being gathered in the Meshlium being sent to the internet network. The deployment of smart parking nodes with monitored cameras can further increase security in parking areas.\n8. Traffic flow: Vehicle and pedestrian flow can be monitored using the Meshlium scanner with a Bluetooth and WiFi card to provide the estimation of the traffic and pedestrian flow. The framework is the same in terms of how information is being sent over the internet. In this system, both Bluetooth and WiFi will have its own databases that consist of IP addresses, ports, users, and their passwords. Additionally, it can be synchronized to an external database then shared throughout the network.\n\nCase study: Smart water system \nSmart cities must monitor water supply and distribution to ensure that there is sufficient access for citizen and industry use and also to save money. The goals of a smart water system is to manage water demand and ensure any losses from the water system are minimal. While demand is being better controlled, there are still huge losses to water supply from inefficient distribution and water leakage. Such a system could use wireless sensor networks to more accurately monitor their water systems and identify their greatest water loss risk. Libelium's Smart Metering Sensor Board includes a water flow sensor that can detect pipe flow rates ranging from 0.15 to 60 litres\/minute. The system can report pipe flow measurement data regularly, as well as send automatic alerts if water use is outside of an expected normal range. This allows a smart city to identify the location of leaking pipes and prioritize repairs based on the amount of water loss that could be prevented. The sensors on these boards can be used as part of a network that monitors and responds to water pipe leakages across an urban area. Strategic placement of sensors can ensure city-wide coverage. Data from the sensor boards can be collected at regular intervals and sent by wireless network to the city for analysis and for preventative action. Data can also be sent directly to the internet for sharing with the local community and industry, so that everyone can understand and contribute to a city\u2019s responsible water management.&#91;5&#93;\n\nCase study: Using the Meshlium scanner for smartphone detection \nMeshlium is a Linux router which contains five different radio interfaces: WiFi 2.4GHz, WiFi 5GHz, 3G\/GPRS, Bluetooth, and ZigBee. The Meshlium can also integrate a GPS module for mobile and vehicle applications and be solar and battery powered. These features along with an aluminium IP67 enclosure allows Meshlium to be placed anywhere outdoors. Meshlium comes with the Manager System, a web application which allows quick and easy control of WiFi, ZigBee, Bluetooth and 3G\/GPRS configurations as well as the storage options of the sensor data received. It can detect iPhone, Android, and other hands-free devices that broadcast on radio channels.&#91;6&#93;\nThis general idea of the technology is to measure the amount of vehicles and people present at a certain point and time, allowing the study of the evolution of traffic congestion. For this idea to work, users don\u2019t have to do anything to be detected or visible on a network. As long as the WiFi and Bluetooth radio integrated in their mobile device is active, the router can still detect their presence. A user is detected by the Meshlium router depending on the following&#91;6&#93;:\n\nthe MAC address of the wireless interface, which allows it to be identified uniquely;\nthe strength of the signal (RSSI), which gives the average distance of the device from the scanning point;\nthe vendor of the mobile device (Apple, Nokia, etc.), the access point the user is connected to (WiFi), and the Bluetooth-friendly name (users that are not connected to an access point will identify as a \"free user\"); and\nthe class of device (CoD), in the case of Bluetooth, which allows the system to differentiate the type of device, enhancing differentiation between vehicles and pedestrians.\nAdditionally, the coverage areas may be modified by changing the power transmission of the radio interfaces that is allowing the creation of different scanning zones from a few meters, enabling study of a specific point for dozens of meters (to study the whole street or even the entire floor of a shopping mall).\nThe Meshlium or other such scanner can focus on:\n1.Vehicle traffic detection: In this application, the system is able to...\n\nmonitor in real time the number of vehicles passing for a certain point in highways and roads.\ndetect average time of vehicle stance for traffic congestion prevention.\nmonitor average speed of vehicles on highways and roads.\nprovide travel times on alternate routes when congestion is detected.\ncalculate the average speed of the vehicles which transit over a roadway by tracking time at two different points.\n2. Shopping and street activities: Similar to monitoring car traffic, the efficient flow of pedestrians in an airport, stadium, or shopping centre can be monitored to improve user experiences, helping make the difference between a good and a bad visit.\n\nConclusion \nThese IoT case studies suggest ways in which IoT will make our life easier and well-arranged. The infrastructure of smart cities could potentially improve our environment for safer driving experiences. Smart cities may also introduce improvements in terms of public services that include parking spot monitoring, weather alerts, and management of waste typical to the modern city. When integrated with the city, IoT will allow citizen to enjoy their city more and utilize present technologies. The future of IoT may potentially offer even more advancements to basis infrastructure from its current radio technologies to enable each devices to share information with each other over a network for greater coordination and data analysis.\n\nReferences \n\n\n\u2191 a b As\u00edn, A.&#32;(20 June 2011).&#32;\"Smart Cities platform from Libelium allows system integrators to monitor noise, pollution, structural health and waste management\".&#32;Libelium.&#32;Libelium Comunicaciones Distribuidas S.L.&#32;http:\/\/www.libelium.com\/smart_cities\/ .&#32;Retrieved 8 June 2016 . &#160; \n\n\u2191 a b c Bielsa, A.&#32;(22 February 2013).&#32;\"Smart City project in Santander to monitor Parking Free Slots\".&#32;Libelium.&#32;Libelium Comunicaciones Distribuidas S.L.&#32;http:\/\/www.libelium.com\/smart_santander_parking_smart_city\/ .&#32;Retrieved 8 June 2016 . &#160; \n\n\u2191 a b Pye, A.&#32;(10 November 2014).&#32;\"Internet of things: Connecting the unconnected\".&#32;E&amp;T&#32;9&#32;(11).&#32;http:\/\/eandt.theiet.org\/magazine\/2014\/11\/internet-of-things.cfm .&#32;Retrieved 8 June 2016 . &#160; \n\n\u2191 As\u00edn, A.; Calahorra, M.&#32;(30 September 2010).&#32;\"Sensor networks to monitor air pollution in cities\".&#32;Libelium.&#32;Libelium Comunicaciones Distribuidas S.L.&#32;http:\/\/www.libelium.com\/smart_cities_wsn_air_pollution\/ .&#32;Retrieved 8 June 2016 . &#160; \n\n\u2191 As\u00edn, A.; Boyd, M.&#32;(3 August 2011).&#32;\"Smart Water: Pipe control to reduce water leakages in smart cities\".&#32;Libelium.&#32;Libelium Comunicaciones Distribuidas S.L.&#32;http:\/\/www.libelium.com\/smart_water_wsn_pipe_leakages\/ .&#32;Retrieved 8 June 2016 . &#160; \n\n\u2191 a b \"Meshlium scanner for smartphone detection\"&#32;(PDF).&#32;Libelium Comunicaciones Distribuidas S.L.&#32;http:\/\/www.m2mconnectivity.com.au\/sites\/default\/files\/brochures\/SMARTPHONE%20DETECTION.pdf .&#32;Retrieved 8 June 2016 . &#160; \n\n\n\n\n\n<\/pre>\n\nNotes \nThis article is a direct transclusion of the Wikibooks article and therefore may not meet the same editing standards as LIMSwiki.\n\n\n\n\n\n\nSource: <a rel=\"external_link\" class=\"external\" href=\"https:\/\/www.limswiki.org\/index.php\/LII:I_Dream_of_IoT\/Chapter_8_:_IoT_and_Case_Study\">https:\/\/www.limswiki.org\/index.php\/LII:I_Dream_of_IoT\/Chapter_8_:_IoT_and_Case_Study<\/a>\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\n\t\t\n\t\t\n\t\t\tNavigation menu\n\t\t\t\t\t\n\t\t\tViews\n\n\t\t\t\n\t\t\t\t\n\t\t\t\tLII\n\t\t\t\tDiscussion\n\t\t\t\tView source\n\t\t\t\tHistory\n\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\n\t\t\t\tPersonal tools\n\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\tLog in\n\t\t\t\t\t\t\t\t\t\t\t\t\tRequest account\n\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\n\t\t\t\n\t\t\t\t\n\t\t\t\n\t\t\t\t\n\t\tNavigation\n\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\tMain page\n\t\t\t\t\t\t\t\t\t\t\tRecent changes\n\t\t\t\t\t\t\t\t\t\t\tRandom page\n\t\t\t\t\t\t\t\t\t\t\tHelp\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\n\t\t\t\n\t\t\tSearch\n\n\t\t\t\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t&#160;\n\t\t\t\t\t\t\n\t\t\t\t\n\n\t\t\t\t\t\t\t\n\t\t\n\t\t\t\n\t\t\tTools\n\n\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\tWhat links here\n\t\t\t\t\t\t\t\t\t\t\tRelated changes\n\t\t\t\t\t\t\t\t\t\t\tSpecial pages\n\t\t\t\t\t\t\t\t\t\t\tPermanent link\n\t\t\t\t\t\t\t\t\t\t\tPage information\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\n\t\t\n\t\tPrint\/export\n\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\tCreate a book\n\t\t\t\t\t\t\t\t\t\t\tDownload as PDF\n\t\t\t\t\t\t\t\t\t\t\tDownload as Plain text\n\t\t\t\t\t\t\t\t\t\t\tPrintable version\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\n\t\t\n\t\tSponsors\n\t\t\n\t\t\t \r\n\n\t\r\n\n\t\r\n\n\t\r\n\n\t\n\t\r\n\n \r\n\n\t\n\t\r\n\n \r\n\n\t\n\t\r\n\n\t\n\t\r\n\n\t\r\n\n\t\r\n\n\t\r\n\t\t\n\t\t\n\t\t\t\n\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t This page was last modified on 8 June 2016, at 20:31.\n\t\t\t\t\t\t\t\t\tThis page has been accessed 483 times.\n\t\t\t\t\t\t\t\t\tContent is available under a Creative Commons Attribution-ShareAlike 4.0 International License unless otherwise noted.\n\t\t\t\t\t\t\t\t\tPrivacy policy\n\t\t\t\t\t\t\t\t\tAbout LIMSWiki\n\t\t\t\t\t\t\t\t\tDisclaimers\n\t\t\t\t\t\t\t\n\t\t\n\t\t\n\t\t\n\n","f2027528b9167b7dd0f5e8789440a401_html":"<body class=\"mediawiki ltr sitedir-ltr ns-202 ns-subject page-LII_I_Dream_of_IoT_Chapter_8_IoT_and_Case_Study skin-monobook action-view\">\n<div id=\"rdp-ebb-globalWrapper\">\n\t\t<div id=\"rdp-ebb-column-content\">\n\t\t\t<div id=\"rdp-ebb-content\" class=\"mw-body\" role=\"main\">\n\t\t\t\t<a id=\"rdp-ebb-top\"><\/a>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t<h1 id=\"rdp-ebb-firstHeading\" class=\"firstHeading\" lang=\"en\">LII:I Dream of IoT\/Chapter 8 : IoT and Case Study<\/h1>\n\t\t\t\t\n\t\t\t\t<div id=\"rdp-ebb-bodyContent\" class=\"mw-body-content\">\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\n\n\t\t\t\t\t<!-- start content -->\n\t\t\t\t\t<div id=\"rdp-ebb-mw-content-text\" lang=\"en\" dir=\"ltr\" class=\"mw-content-ltr\"><div class=\"mw-parser-output\">\n<h2><span class=\"mw-headline\" id=\"Internet_of_Things:_Case_studies\">Internet of Things: Case studies<\/span><\/h2>\n<p>The Internet of Things (IoT) represents a changing method of communication between humans and their technology. Typically, IoT is expected to offer advanced connectivity of devices, systems, and services that goes beyond machine-to-machine communications (M2M) and covers a variety of protocols, domains, and applications. The interconnection of these embedded devices (including smart objects), is expected to usher in automation in nearly all fields, while also enabling advanced applications such as the smart grid. IoT can potentially contribute to many aspects of the human lifestyle, including in healthcare, education, transportation, and business. In buildings, IoT devices can be used to monitor and control the mechanical, electrical and electronic systems used in various homes and businesses (e.g., public and private, industrial, institutions, or residential). Home automation systems, like other building automation systems, are typically used to control lighting, heating, ventilation, air conditioning, appliances, communication systems, entertainment and home security devices to improve convenience, comfort, energy efficiency, and security. But to what degree have IoT systems been tested and used? Here are a few case studies.\n<\/p>\n<h3><span class=\"mw-headline\" id=\"Case_study:_Smart_Santander_parking_monitor_project\">Case study: Smart Santander parking monitor project<\/span><\/h3>\n<p>The smart city is a city that uses IoT and other communication devices to manage its assets.<sup id=\"rdp-ebb-cite_ref-As\u00ednSmart11_1-0\" class=\"reference\"><a href=\"#cite_note-As\u00ednSmart11-1\" rel=\"external_link\">&#91;1&#93;<\/a><\/sup> One such asset is the public parking area, which can be monitored for traffic and regulated for usage. The government of Santander, Spain tested such a smart parking system in 22 different zones of the city. This Smart Santander project was developed by several companies and institutions that aimed to design, deploy and valide a collection of sensors, actuators, cameras and screens that supply useful information to Santander\u2019s citizens.<sup id=\"rdp-ebb-cite_ref-BielsaSmart13_2-0\" class=\"reference\"><a href=\"#cite_note-BielsaSmart13-2\" rel=\"external_link\">&#91;2&#93;<\/a><\/sup>\n<\/p><p>Each zone was provided a Meshlium, an electronic system that gathers the data sensors and moves it to the cloud. Each zone had different network parameters, creating independent networks that work on different frequency channels so as to not interfere with the other networks. In this project, 375 Waspmotes were deployed in different locations within the city to measure the change in magnetic field above it (caused by a vehicle parked over it) to detect whether a parking slot is free. The magnetic field sensor was connected to the Waspmote through a Smart Parking Sensor Board. The sensor itself was buried under the surface of the road inside a waterproof casing. The hole was closed using a specific material and the sensor is barely detectable at a glance.<sup id=\"rdp-ebb-cite_ref-BielsaSmart13_2-1\" class=\"reference\"><a href=\"#cite_note-BielsaSmart13-2\" rel=\"external_link\">&#91;2&#93;<\/a><\/sup>\n<\/p><p>The information was sent periodically to repeaters and after that to the Meshlium that stored the data, updating a public message board every five minutes, allowing citizens to find a free parking spot in the shortest time. Not only that, parking status was also updated on an interactive online map so that citizens could check for a free parking slot before they got to the city center.<sup id=\"rdp-ebb-cite_ref-BielsaSmart13_2-2\" class=\"reference\"><a href=\"#cite_note-BielsaSmart13-2\" rel=\"external_link\">&#91;2&#93;<\/a><\/sup>\n<\/p>\n<h3><span class=\"mw-headline\" id=\"Case_study:_Smart_lighting\">Case study: Smart lighting<\/span><\/h3>\n<p>Smart lighting systems allow a smart city to intelligently provide just the right amount of light depending on variables such as time, day, season, and weather. By applying this form of IoT, users could potentially save up to 80 percent energy versus traditional lighting systems, at least according to Janne Aikio at Finland\u2019s VTT Technical Research Centre. \"Forecasts suggest that smart lighting will become one of the key trends in the context of the Internet of Things,\" Aikio told Engineering and Technology Magazine. \"Demand for smart lighting is expected to boom over the next 10 years: as much as \u20ac7.7bn in 2020. The comparable figure in 2011 was \u20ac1.8bn.\"<sup id=\"rdp-ebb-cite_ref-PyeInternet14_3-0\" class=\"reference\"><a href=\"#cite_note-PyeInternet14-3\" rel=\"external_link\">&#91;3&#93;<\/a><\/sup>\n<\/p><p>Lighting systems utilizing the IoT concept are already available for commercial use, able to integrate with existing building automation systems. For the future, this smart lighting system could improve by integrating with wireless system so that it can be controlled via devices such as mobile phone. \"Smart lighting systems are becoming increasingly popular in both new builds and renovation projects. The next major step will be to integrate better sensors and new functions into lighting systems, which will allow the occupants of a room to adjust lighting with increasing accuracy and flexibility according to their movements and activities,\" explained Aikio.<sup id=\"rdp-ebb-cite_ref-PyeInternet14_3-1\" class=\"reference\"><a href=\"#cite_note-PyeInternet14-3\" rel=\"external_link\">&#91;3&#93;<\/a><\/sup>\n<\/p><p>For even better results, this smart lighting system could be integrated with many more features such as enabling the direction, power, and color of the lighting to be automatically adjusted according to the function of the room or time of day, season, and weather. For example, the lamp could be directed to point towards people in the room, and lighting near a window could change color according to the weather or temperature outside. Additionally, a smart lighting system could perhaps even be self-updating, downloading light filters or \"plugins\" on demand from the web.\n<\/p>\n<h3><span class=\"mw-headline\" id=\"Case_study:_Smart_roads\">Case study: Smart roads<\/span><\/h3>\n<p>The application of IoT varies greatly, thanks to its reliable nature and ability to contribute positively to safety in the home as well as within industry. Yet it even has the potential to positively contribute to our lives while on the road. In fact, IoT stands to positively improve that which is central to much of our existing infrastructure today: the roads that make up our vast transportation network.\n<\/p><p>Monitoring systems will play an important role on our streets in the future, whether it's to better keep citizens informed or to prepare for the coming of automated vehicles. A series of sensors, circuit boxes, and other IoT technologies will integrate to each other using radio and satellite to enable communication between nodes. That said, there are eight common areas to cover in this monitoring system. These eight areas are based on European roads and weather, though they're still applicable to the network of roads worldwide.\n<\/p><p><b>1. Pollution:<\/b> The first area is setting up a sensor network to monitor traffic-related pollution. The Libelium company offers an example with its Waspmote, which provides a miniature enclosed system that has a solar panel, antenna, and sensors that can be programmed to each node. It's capable of covering large areas with a massive number of networks, thus making it easy for maintenance with the effortless attachment to nodes. As for pollution, the main contributor is from carbon dioxide and nitrogen dioxide from vehicles. To detect this, gas sensors are attached at strategic points throughout the city\u2019s traffic network.<sup id=\"rdp-ebb-cite_ref-AsinSensor10_4-0\" class=\"reference\"><a href=\"#cite_note-AsinSensor10-4\" rel=\"external_link\">&#91;4&#93;<\/a><\/sup>\n<\/p><p><b>2. Noise:<\/b> Next up is monitoring noise and generating a noise map. Acoustic sensors can map the noise to those routes in the city, using similar technology as mentioned in the discussion on pollution detection. The microphone used in the system can capture the source of noise, which is turned into usable data that can be placed into a heat map that shows regions of noise with a specific value in decibels.\n<\/p><p><b>3. Weather:<\/b> Next is weather monitoring between points of risk. Aspects to be monitored include temperature, humidity, rainfall, and wind speed and direction. Mini sensor networks with attached pluviometers and anemometers act as cheap weather stations, providing real-time information that can be used to warn drivers in advance so they may opt for other safer routes.\n<\/p><p><b>4. and 5. Flooding and icing:<\/b> These represent the same point of monitoring, only differing in the temperature: the pavement. Flooding can be measured using ground-based liquid sensors. With these sensors, drivers can be alerted to areas with high-water level issues and be alerted to take precautions when choosing their route. As for the icy road, a prediction application can be used driven off of date from temperature and humidity sensors to record likely ice formation along the roads.\n<\/p><p><b>6. Structural cracking:<\/b> As for structural cracking, linear displacement sensors can be used in bridges or tunnels to monitor for any cracks. In addition to displacement monitoring, vibration sensors \u2014 similar to those deployed to buildings in earthquake-prone areas \u2014 would help in further monitoring and controlling structural cracking as a whole.<sup id=\"rdp-ebb-cite_ref-As\u00ednSmart11_1-1\" class=\"reference\"><a href=\"#cite_note-As\u00ednSmart11-1\" rel=\"external_link\">&#91;1&#93;<\/a><\/sup>\n<\/p><p><b>7. Parking:<\/b> As previously discussed, a vehicle detection system can rely on magnetic field sensors to detect traffic jams and the presence of vehicles in parking areas. It is installed in the pavement itself, equipped with material to cope with communication interference and humidity. The information shared between sensors is similar in style to pollution and noise monitoring, with the data being gathered in the Meshlium being sent to the internet network. The deployment of smart parking nodes with monitored cameras can further increase security in parking areas.\n<\/p><p><b>8. Traffic flow:<\/b> Vehicle and pedestrian flow can be monitored using the Meshlium scanner with a Bluetooth and WiFi card to provide the estimation of the traffic and pedestrian flow. The framework is the same in terms of how information is being sent over the internet. In this system, both Bluetooth and WiFi will have its own databases that consist of IP addresses, ports, users, and their passwords. Additionally, it can be synchronized to an external database then shared throughout the network.\n<\/p>\n<h3><span class=\"mw-headline\" id=\"Case_study:_Smart_water_system\">Case study: Smart water system<\/span><\/h3>\n<p>Smart cities must monitor water supply and distribution to ensure that there is sufficient access for citizen and industry use and also to save money. The goals of a smart water system is to manage water demand and ensure any losses from the water system are minimal. While demand is being better controlled, there are still huge losses to water supply from inefficient distribution and water leakage. Such a system could use wireless sensor networks to more accurately monitor their water systems and identify their greatest water loss risk. Libelium's Smart Metering Sensor Board includes a water flow sensor that can detect pipe flow rates ranging from 0.15 to 60 litres\/minute. The system can report pipe flow measurement data regularly, as well as send automatic alerts if water use is outside of an expected normal range. This allows a smart city to identify the location of leaking pipes and prioritize repairs based on the amount of water loss that could be prevented. The sensors on these boards can be used as part of a network that monitors and responds to water pipe leakages across an urban area. Strategic placement of sensors can ensure city-wide coverage. Data from the sensor boards can be collected at regular intervals and sent by wireless network to the city for analysis and for preventative action. Data can also be sent directly to the internet for sharing with the local community and industry, so that everyone can understand and contribute to a city\u2019s responsible water management.<sup id=\"rdp-ebb-cite_ref-As\u00ednSmartWater11_5-0\" class=\"reference\"><a href=\"#cite_note-As\u00ednSmartWater11-5\" rel=\"external_link\">&#91;5&#93;<\/a><\/sup>\n<\/p>\n<h3><span class=\"mw-headline\" id=\"Case_study:_Using_the_Meshlium_scanner_for_smartphone_detection\">Case study: Using the Meshlium scanner for smartphone detection<\/span><\/h3>\n<p>Meshlium is a Linux router which contains five different radio interfaces: WiFi 2.4GHz, WiFi 5GHz, 3G\/GPRS, Bluetooth, and ZigBee. The Meshlium can also integrate a GPS module for mobile and vehicle applications and be solar and battery powered. These features along with an aluminium IP67 enclosure allows Meshlium to be placed anywhere outdoors. Meshlium comes with the Manager System, a web application which allows quick and easy control of WiFi, ZigBee, Bluetooth and 3G\/GPRS configurations as well as the storage options of the sensor data received. It can detect iPhone, Android, and other hands-free devices that broadcast on radio channels.<sup id=\"rdp-ebb-cite_ref-LibeliumMesh_6-0\" class=\"reference\"><a href=\"#cite_note-LibeliumMesh-6\" rel=\"external_link\">&#91;6&#93;<\/a><\/sup>\n<\/p><p>This general idea of the technology is to measure the amount of vehicles and people present at a certain point and time, allowing the study of the evolution of traffic congestion. For this idea to work, users don\u2019t have to do anything to be detected or visible on a network. As long as the WiFi and Bluetooth radio integrated in their mobile device is active, the router can still detect their presence. A user is detected by the Meshlium router depending on the following<sup id=\"rdp-ebb-cite_ref-LibeliumMesh_6-1\" class=\"reference\"><a href=\"#cite_note-LibeliumMesh-6\" rel=\"external_link\">&#91;6&#93;<\/a><\/sup>:\n<\/p>\n<ul><li>the MAC address of the wireless interface, which allows it to be identified uniquely;<\/li>\n<li>the strength of the signal (RSSI), which gives the average distance of the device from the scanning point;<\/li>\n<li>the vendor of the mobile device (Apple, Nokia, etc.), the access point the user is connected to (WiFi), and the Bluetooth-friendly name (users that are not connected to an access point will identify as a \"free user\"); and<\/li>\n<li>the class of device (CoD), in the case of Bluetooth, which allows the system to differentiate the type of device, enhancing differentiation between vehicles and pedestrians.<\/li><\/ul>\n<p>Additionally, the coverage areas may be modified by changing the power transmission of the radio interfaces that is allowing the creation of different scanning zones from a few meters, enabling study of a specific point for dozens of meters (to study the whole street or even the entire floor of a shopping mall).\n<\/p><p>The Meshlium or other such scanner can focus on:\n<\/p><p>1.Vehicle traffic detection: In this application, the system is able to...\n<\/p>\n<ul><li>monitor in real time the number of vehicles passing for a certain point in highways and roads.<\/li>\n<li>detect average time of vehicle stance for traffic congestion prevention.<\/li>\n<li>monitor average speed of vehicles on highways and roads.<\/li>\n<li>provide travel times on alternate routes when congestion is detected.<\/li>\n<li>calculate the average speed of the vehicles which transit over a roadway by tracking time at two different points.<\/li><\/ul>\n<p>2. Shopping and street activities: Similar to monitoring car traffic, the efficient flow of pedestrians in an airport, stadium, or shopping centre can be monitored to improve user experiences, helping make the difference between a good and a bad visit.\n<\/p>\n<h2><span class=\"mw-headline\" id=\"Conclusion\">Conclusion<\/span><\/h2>\n<p>These IoT case studies suggest ways in which IoT will make our life easier and well-arranged. The infrastructure of smart cities could potentially improve our environment for safer driving experiences. Smart cities may also introduce improvements in terms of public services that include parking spot monitoring, weather alerts, and management of waste typical to the modern city. When integrated with the city, IoT will allow citizen to enjoy their city more and utilize present technologies. The future of IoT may potentially offer even more advancements to basis infrastructure from its current radio technologies to enable each devices to share information with each other over a network for greater coordination and data analysis.\n<\/p>\n<h2><span class=\"mw-headline\" id=\"References\">References<\/span><\/h2>\n<div class=\"reflist references\" style=\"\">\n<ol class=\"references\">\n<li id=\"cite_note-As\u00ednSmart11-1\"><span class=\"mw-cite-backlink\">\u2191 <sup><a href=\"#cite_ref-As\u00ednSmart11_1-0\" rel=\"external_link\"><i><b>a<\/b><\/i><\/a><\/sup> <sup><a href=\"#cite_ref-As\u00ednSmart11_1-1\" rel=\"external_link\"><i><b>b<\/b><\/i><\/a><\/sup><\/span> <span class=\"reference-text\"><span class=\"citation web\">As\u00edn, A.&#32;(20 June 2011).&#32;<a rel=\"external_link\" class=\"external text\" href=\"http:\/\/www.libelium.com\/smart_cities\/\" target=\"_blank\">\"Smart Cities platform from Libelium allows system integrators to monitor noise, pollution, structural health and waste management\"<\/a>.&#32;<i>Libelium<\/i>.&#32;Libelium Comunicaciones Distribuidas S.L<span class=\"printonly\">.&#32;<a rel=\"external_link\" class=\"external free\" href=\"http:\/\/www.libelium.com\/smart_cities\/\" target=\"_blank\">http:\/\/www.libelium.com\/smart_cities\/<\/a><\/span><span class=\"reference-accessdate\">.&#32;Retrieved 8 June 2016<\/span>.<\/span><span class=\"Z3988\" title=\"ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.btitle=Smart+Cities+platform+from+Libelium+allows+system+integrators+to+monitor+noise%2C+pollution%2C+structural+health+and+waste+management&amp;rft.atitle=Libelium&amp;rft.aulast=As%C3%ADn%2C+A.&amp;rft.au=As%C3%ADn%2C+A.&amp;rft.date=20+June+2011&amp;rft.pub=Libelium+Comunicaciones+Distribuidas+S.L&amp;rft_id=http%3A%2F%2Fwww.libelium.com%2Fsmart_cities%2F&amp;rfr_id=info:sid\/en.wikibooks.org:I_Dream_of_IoT\/Chapter_8_:_IoT_and_Case_Study\"><span style=\"display: none;\">&#160;<\/span><\/span><\/span>\n<\/li>\n<li id=\"cite_note-BielsaSmart13-2\"><span class=\"mw-cite-backlink\">\u2191 <sup><a href=\"#cite_ref-BielsaSmart13_2-0\" rel=\"external_link\"><i><b>a<\/b><\/i><\/a><\/sup> <sup><a href=\"#cite_ref-BielsaSmart13_2-1\" rel=\"external_link\"><i><b>b<\/b><\/i><\/a><\/sup> <sup><a href=\"#cite_ref-BielsaSmart13_2-2\" rel=\"external_link\"><i><b>c<\/b><\/i><\/a><\/sup><\/span> <span class=\"reference-text\"><span class=\"citation web\">Bielsa, A.&#32;(22 February 2013).&#32;<a rel=\"external_link\" class=\"external text\" href=\"http:\/\/www.libelium.com\/smart_santander_parking_smart_city\/\" target=\"_blank\">\"Smart City project in Santander to monitor Parking Free Slots\"<\/a>.&#32;<i>Libelium<\/i>.&#32;Libelium Comunicaciones Distribuidas S.L<span class=\"printonly\">.&#32;<a rel=\"external_link\" class=\"external free\" href=\"http:\/\/www.libelium.com\/smart_santander_parking_smart_city\/\" target=\"_blank\">http:\/\/www.libelium.com\/smart_santander_parking_smart_city\/<\/a><\/span><span class=\"reference-accessdate\">.&#32;Retrieved 8 June 2016<\/span>.<\/span><span class=\"Z3988\" title=\"ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.btitle=Smart+City+project+in+Santander+to+monitor+Parking+Free+Slots&amp;rft.atitle=Libelium&amp;rft.aulast=Bielsa%2C+A.&amp;rft.au=Bielsa%2C+A.&amp;rft.date=22+February+2013&amp;rft.pub=Libelium+Comunicaciones+Distribuidas+S.L&amp;rft_id=http%3A%2F%2Fwww.libelium.com%2Fsmart_santander_parking_smart_city%2F&amp;rfr_id=info:sid\/en.wikibooks.org:I_Dream_of_IoT\/Chapter_8_:_IoT_and_Case_Study\"><span style=\"display: none;\">&#160;<\/span><\/span><\/span>\n<\/li>\n<li id=\"cite_note-PyeInternet14-3\"><span class=\"mw-cite-backlink\">\u2191 <sup><a href=\"#cite_ref-PyeInternet14_3-0\" rel=\"external_link\"><i><b>a<\/b><\/i><\/a><\/sup> <sup><a href=\"#cite_ref-PyeInternet14_3-1\" rel=\"external_link\"><i><b>b<\/b><\/i><\/a><\/sup><\/span> <span class=\"reference-text\"><span class=\"citation Journal\">Pye, A.&#32;(10 November 2014).&#32;<a rel=\"external_link\" class=\"external text\" href=\"http:\/\/eandt.theiet.org\/magazine\/2014\/11\/internet-of-things.cfm\" target=\"_blank\">\"Internet of things: Connecting the unconnected\"<\/a>.&#32;<i>E&amp;T<\/i>&#32;<b>9<\/b>&#32;(11)<span class=\"printonly\">.&#32;<a rel=\"external_link\" class=\"external free\" href=\"http:\/\/eandt.theiet.org\/magazine\/2014\/11\/internet-of-things.cfm\" target=\"_blank\">http:\/\/eandt.theiet.org\/magazine\/2014\/11\/internet-of-things.cfm<\/a><\/span><span class=\"reference-accessdate\">.&#32;Retrieved 8 June 2016<\/span>.<\/span><span class=\"Z3988\" title=\"ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.atitle=Internet+of+things%3A+Connecting+the+unconnected&amp;rft.jtitle=E%26T&amp;rft.aulast=Pye%2C+A.&amp;rft.au=Pye%2C+A.&amp;rft.date=10+November+2014&amp;rft.volume=9&amp;rft.issue=11&amp;rft_id=http%3A%2F%2Feandt.theiet.org%2Fmagazine%2F2014%2F11%2Finternet-of-things.cfm&amp;rfr_id=info:sid\/en.wikibooks.org:I_Dream_of_IoT\/Chapter_8_:_IoT_and_Case_Study\"><span style=\"display: none;\">&#160;<\/span><\/span><\/span>\n<\/li>\n<li id=\"cite_note-AsinSensor10-4\"><span class=\"mw-cite-backlink\"><a href=\"#cite_ref-AsinSensor10_4-0\" rel=\"external_link\">\u2191<\/a><\/span> <span class=\"reference-text\"><span class=\"citation web\">As\u00edn, A.; Calahorra, M.&#32;(30 September 2010).&#32;<a rel=\"external_link\" class=\"external text\" href=\"http:\/\/www.libelium.com\/smart_cities_wsn_air_pollution\/\" target=\"_blank\">\"Sensor networks to monitor air pollution in cities\"<\/a>.&#32;<i>Libelium<\/i>.&#32;Libelium Comunicaciones Distribuidas S.L<span class=\"printonly\">.&#32;<a rel=\"external_link\" class=\"external free\" href=\"http:\/\/www.libelium.com\/smart_cities_wsn_air_pollution\/\" target=\"_blank\">http:\/\/www.libelium.com\/smart_cities_wsn_air_pollution\/<\/a><\/span><span class=\"reference-accessdate\">.&#32;Retrieved 8 June 2016<\/span>.<\/span><span class=\"Z3988\" title=\"ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.btitle=Sensor+networks+to+monitor+air+pollution+in+cities&amp;rft.atitle=Libelium&amp;rft.aulast=As%C3%ADn%2C+A.%3B+Calahorra%2C+M.&amp;rft.au=As%C3%ADn%2C+A.%3B+Calahorra%2C+M.&amp;rft.date=30+September+2010&amp;rft.pub=Libelium+Comunicaciones+Distribuidas+S.L&amp;rft_id=http%3A%2F%2Fwww.libelium.com%2Fsmart_cities_wsn_air_pollution%2F&amp;rfr_id=info:sid\/en.wikibooks.org:I_Dream_of_IoT\/Chapter_8_:_IoT_and_Case_Study\"><span style=\"display: none;\">&#160;<\/span><\/span><\/span>\n<\/li>\n<li id=\"cite_note-As\u00ednSmartWater11-5\"><span class=\"mw-cite-backlink\"><a href=\"#cite_ref-As\u00ednSmartWater11_5-0\" rel=\"external_link\">\u2191<\/a><\/span> <span class=\"reference-text\"><span class=\"citation web\">As\u00edn, A.; Boyd, M.&#32;(3 August 2011).&#32;<a rel=\"external_link\" class=\"external text\" href=\"http:\/\/www.libelium.com\/smart_water_wsn_pipe_leakages\/\" target=\"_blank\">\"Smart Water: Pipe control to reduce water leakages in smart cities\"<\/a>.&#32;<i>Libelium<\/i>.&#32;Libelium Comunicaciones Distribuidas S.L<span class=\"printonly\">.&#32;<a rel=\"external_link\" class=\"external free\" href=\"http:\/\/www.libelium.com\/smart_water_wsn_pipe_leakages\/\" target=\"_blank\">http:\/\/www.libelium.com\/smart_water_wsn_pipe_leakages\/<\/a><\/span><span class=\"reference-accessdate\">.&#32;Retrieved 8 June 2016<\/span>.<\/span><span class=\"Z3988\" title=\"ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.btitle=Smart+Water%3A+Pipe+control+to+reduce+water+leakages+in+smart+cities&amp;rft.atitle=Libelium&amp;rft.aulast=As%C3%ADn%2C+A.%3B+Boyd%2C+M.&amp;rft.au=As%C3%ADn%2C+A.%3B+Boyd%2C+M.&amp;rft.date=3+August+2011&amp;rft.pub=Libelium+Comunicaciones+Distribuidas+S.L&amp;rft_id=http%3A%2F%2Fwww.libelium.com%2Fsmart_water_wsn_pipe_leakages%2F&amp;rfr_id=info:sid\/en.wikibooks.org:I_Dream_of_IoT\/Chapter_8_:_IoT_and_Case_Study\"><span style=\"display: none;\">&#160;<\/span><\/span><\/span>\n<\/li>\n<li id=\"cite_note-LibeliumMesh-6\"><span class=\"mw-cite-backlink\">\u2191 <sup><a href=\"#cite_ref-LibeliumMesh_6-0\" rel=\"external_link\"><i><b>a<\/b><\/i><\/a><\/sup> <sup><a href=\"#cite_ref-LibeliumMesh_6-1\" rel=\"external_link\"><i><b>b<\/b><\/i><\/a><\/sup><\/span> <span class=\"reference-text\"><span class=\"citation web\"><a rel=\"external_link\" class=\"external text\" href=\"http:\/\/www.m2mconnectivity.com.au\/sites\/default\/files\/brochures\/SMARTPHONE%20DETECTION.pdf\" target=\"_blank\">\"Meshlium scanner for smartphone detection\"<\/a>&#32;(PDF).&#32;Libelium Comunicaciones Distribuidas S.L<span class=\"printonly\">.&#32;<a rel=\"external_link\" class=\"external free\" href=\"http:\/\/www.m2mconnectivity.com.au\/sites\/default\/files\/brochures\/SMARTPHONE%20DETECTION.pdf\" target=\"_blank\">http:\/\/www.m2mconnectivity.com.au\/sites\/default\/files\/brochures\/SMARTPHONE%20DETECTION.pdf<\/a><\/span><span class=\"reference-accessdate\">.&#32;Retrieved 8 June 2016<\/span>.<\/span><span class=\"Z3988\" title=\"ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.btitle=Meshlium+scanner+for+smartphone+detection&amp;rft.atitle=&amp;rft.pub=Libelium+Comunicaciones+Distribuidas+S.L&amp;rft_id=http%3A%2F%2Fwww.m2mconnectivity.com.au%2Fsites%2Fdefault%2Ffiles%2Fbrochures%2FSMARTPHONE%2520DETECTION.pdf&amp;rfr_id=info:sid\/en.wikibooks.org:I_Dream_of_IoT\/Chapter_8_:_IoT_and_Case_Study\"><span style=\"display: none;\">&#160;<\/span><\/span><\/span>\n<\/li>\n<\/ol><\/div>\n<p><!-- \nNewPP limit report\nParsed by mw1257\nCached time: 20181217010154\nCache expiry: 1900800\nDynamic content: false\nCPU time usage: 0.124 seconds\nReal time usage: 0.152 seconds\nPreprocessor visited node count: 3130\/1000000\nPreprocessor generated node count: 0\/1500000\nPost\u2010expand include size: 26776\/2097152 bytes\nTemplate argument size: 10861\/2097152 bytes\nHighest expansion depth: 14\/40\nExpensive parser function count: 0\/500\nUnstrip recursion depth: 0\/20\nUnstrip post\u2010expand size: 10071\/5000000 bytes\nNumber of Wikibase entities loaded: 0\/400\nLua time usage: 0.020\/10.000 seconds\nLua memory usage: 819 KB\/50 MB\n-->\n<!--\nTransclusion expansion time report (%,ms,calls,template)\n100.00% 123.193 1 -total\n<\/p>\n<pre>62.11% 76.519 1 Template:Reflist\n40.97% 50.469 5 Template:Cite_web\n39.92% 49.173 6 Template:Citation\/core\n37.79% 46.560 1 Template:BookCat\n10.60% 13.063 1 Template:Evalx\n 9.76% 12.018 1 Template:Cite_journal\n 5.03% 6.199 10 Template:Citation\/make_link\n 4.84% 5.957 1 Template:BOOKCATEGORY\n 2.56% 3.157 1 Template:NAIVEBOOKNAME\n<\/pre>\n<p>-->\n<\/p><p><!-- Saved in parser cache with key enwikibooks:pcache:idhash:307438-1!canonical and timestamp 20181217010154 and revision id 3106259\n<\/p>\n<pre>-->\n<\/pre>\n<\/div>\n<h2><span class=\"mw-headline\" id=\"Notes\">Notes<\/span><\/h2>\n<p>This article is a direct transclusion of <a rel=\"external_link\" class=\"external text\" href=\"https:\/\/en.wikibooks.org\/wiki\/I_Dream_of_IoT\/Chapter_8_:_IoT_and_Case_Study\" target=\"_blank\">the Wikibooks article<\/a> and therefore may not meet the same editing standards as LIMSwiki.\n<\/p>\n<!-- \nNewPP limit report\nCached time: 20181217203741\nCache expiry: 86400\nDynamic content: false\nCPU time usage: 0.011 seconds\nReal time usage: 0.130 seconds\nPreprocessor visited node count: 5\/1000000\nPreprocessor generated node count: 16\/1000000\nPost\u2010expand include size: 20\/2097152 bytes\nTemplate argument size: 0\/2097152 bytes\nHighest expansion depth: 2\/40\nExpensive parser function count: 0\/100\n-->\n\n<!-- \nTransclusion expansion time report (%,ms,calls,template)\n100.00% 124.787 1 - wikibooks:I_Dream_of_IoT\/Chapter_8_:_IoT_and_Case_Study\n100.00% 124.787 1 - -total\n-->\n\n<!-- Saved in parser cache with key limswiki:pcache:idhash:8788-0!*!*!*!*!*!* and timestamp 20181217203741 and revision id 25680\n -->\n<\/div><div class=\"printfooter\">Source: <a rel=\"external_link\" class=\"external\" href=\"https:\/\/www.limswiki.org\/index.php\/LII:I_Dream_of_IoT\/Chapter_8_:_IoT_and_Case_Study\">https:\/\/www.limswiki.org\/index.php\/LII:I_Dream_of_IoT\/Chapter_8_:_IoT_and_Case_Study<\/a><\/div>\n\t\t\t\t\t\t\t\t\t\t<!-- end content -->\n\t\t\t\t\t\t\t\t\t\t<div class=\"visualClear\"><\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t<!-- end of the left (by default at least) column -->\n\t\t<div class=\"visualClear\"><\/div>\n\t\t\t\t\t\n\t\t<\/div>\n\t\t\n\n<\/body>","f2027528b9167b7dd0f5e8789440a401_images":[],"f2027528b9167b7dd0f5e8789440a401_timestamp":1545079061,"a692129c313080b36a68b1d3d31bc6de_type":"article","a692129c313080b36a68b1d3d31bc6de_title":"Chapter 7 : IoT and Security","a692129c313080b36a68b1d3d31bc6de_url":"https:\/\/www.limswiki.org\/index.php\/LII:I_Dream_of_IoT\/Chapter_7_:_IoT_and_Security","a692129c313080b36a68b1d3d31bc6de_plaintext":"\n\n\t\t\n\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\n\t\t\t\tLII:I Dream of IoT\/Chapter 7 : IoT and Security\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\tFrom LIMSWiki\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\tJump to: navigation, search\n\n\t\t\t\t\t\n\t\t\t\t\tContents \n\n1 Introduction to IoT security \n2 Network-layer security \n3 Securing TCP connections \n\n3.1 Use packet rules to secure TCP\/IP traffic \n3.2 SSL and TCP\/IP \n\n\n4 WLAN Security \n\n4.1 Wired Equivalent Privacy \n\n4.1.1 How WEP works \n\n\n4.2 Tools for protecting WLAN \n\n\n5 Firewalls and intrusion detection systems \n6 Conclusion \n7 References \n\n\nIntroduction to IoT security \nThe Internet of Things (IoT) can be describe as the interconnection between various uniquely identified stand-alone and embedded computing devices that can automatically transfer data over a network. IoT has the potential to make people\u2019s lives easier by allowing virtual environments, objects and data to be connected with each other and leting people to live with greater efficiency. However, with the increase in number of IoT-enabled devices, there are increasing challenges for these systems to provide a high level of security for users. IoT networks are managed with different priorities in mind, and each has distinct security needs. The priority of the IT network is to protect data confidentiality. The focus of the IoT network is on physical security and secure access to ensure proper and safe operation. As such, several security issues must be addressed when it comes to living the \"smart\" life.\n\nNetwork-layer security \nGenerally, network-layer security with IoT typically involves security mechanisms for resource-constrained sensing applications and devices that provide an important contribution via its integration with the internet. In this context we target the design and experimental evaluation of security mechanisms for communications at the network layer with sensing devices (smart objects) using the standard IPv6 protocol. Although it is certain that not all smart objects on the IoT will have the capability or will be required to support IPv6, the availability of secure end-to-end communications at the network layer with other sensing devices or with internet hosts may enable a much richer integration of sensing applications with the internet. It may also enable new types of sensing applications where smart objects are able to cooperate remotely and securely using internet communications.&#91;1&#93;\nThere are differences between security at the network level and security at the transport level. Both are general-purpose which means they function independent of the layer. At the network layer, the IPsec is not specific to TCP, UDP and other protocols above IP. This makes IPsec more flexible and able to operate at a higher layer because it is transparent to the end user and application via what is called \"blanket coverage.\" As such, we do not need to change software on a user or server system when IPsec is implemented on a firewall or router. We also do not need to train users, issue keying material on a per-user basis or revoke keying material when users leave the organization. On the transport layer, the TLS (Transport Layer Security) works for its application of HTTP, FTP and SMTP, but not for TCP.&#91;2&#93;\n\nSecuring TCP connections \nTCP\/IP (Transmission Control Protocol\/Internet Protocol) is a common way that computers of all types communicate with each other. TCP\/IP applications are well-known and widely used throughout the \"information highway.\" TCP works with the Internet Protocol (IP), which defines how computers send packets of data to each other. Together, TCP and IP make up the basic rules defining the Internet.\n\n Use packet rules to secure TCP\/IP traffic \nPacket rules, which represent the combination of IP filtering and network address translation (NAT), act like a firewall to protect an internal network from intruders. IP filtering controls what IP traffic to allow into and out of the network. Basically, it protects a network by filtering packets according to rules that it defines. NAT, on the other hand, was allowed to hide unregistered private IP addresses behind a set of registered IP addresses. This helps to protect internal networks from outside networks. NAT also helps to alleviate the IP address depletion problem, since many private addresses can be represented by a small set of registered addresses.&#91;3&#93;\n\n SSL and TCP\/IP \nSecure Socket Layer (SSL) and Transport Layer Security (TLS) is the most widely deployed security protocol used today. It is essentially a protocol that provides a secure channel between two machines operating over the internet or an internal network. In today\u2019s internet-focused world, the SSL protocol is typically used when a web browser needs to securely connect to a web server over the inherently insecure internet.\nTechnically, SSL is a transparent protocol which requires little interaction from the end user when establishing a secure session. In the case of a browser, for instance, users are alerted to the presence of SSL when the browser displays a padlock, or, in the case of Extended Validation SSL, when the address bar displays both a padlock and a green bar. This is the key to the success of SSL since it is an incredibly simple experience for end users.&#91;4&#93;\nExample application with SSL: \"Toy SSL,\" a simple secure channel principle\n\nHandshake: Alice and Bob use their certificates and private keys to authenticate each other and exchange shared secret\nKey Derivation: Alice and Bob use shared secret to derive set of keys\nData Transfer: Data to be transferred is broken up into a series of records\nConnection Closure: Special messages to securely close connection\nWLAN Security \nA wireless local area network (WLAN) is used in many sectors. WLAN remains popular because of its many advantages, including: \n\ninstallation flexibility;\nmobility;\nreduced cost of ownership;\nscalability; and\nease of installation.\nHowever, regardless of the benefits, WLAN has its share of security issues. To protect a WLAN from threats like denial of service (DoS), spoofing, and session hijacking and eavesdropping, Wired Equivalent Privacy should be used.&#91;5&#93;&#91;6&#93;\n\nWired Equivalent Privacy \nWired Equivalent Privacy (WEP) is a standard encryption type for wireless networking. It is a user authentication and data encryption system from IEEE 802.11 used to eliminate security threats. Basically, WEP provides security to WLAN by encrypting the transmitted information over the air, so that only the receiver who possesses the correct encryption key can decrypt the information.\n\nHow WEP works \nWEP utilizes a secret key called the \u201cbase key\u201d that includes the RC4 encryption algorithm and the CRC-32 (Cyclic Redundancy Code) checksum algorithm as its basic building blocks.&#91;7&#93; WEP tries to achieve its security in a very simple way: it operates on MAC Protocol Data Units (MPDUs), the 802.11 packet fragments. To provide the security of the data in an MPDU, WEP first calculates an integrity check value (ICV) over the MPDU data. This value is the CRC-32 of the data. WEP adds the ICV to the end of the data, growing this field by four bytes. With the help of the ICV, the receiver is able to detect the data of outright forgery and changes during the broadcast. Next, WEP selects a base key and an initialization vector (IV), which is a 24-bit value. WEP determine a per-packet RC4 key by combining the IV value and the selected base key. WEP then uses the per-packet key to RC4, and encrypt the data and the ICV.&#91;8&#93;\n\nTools for protecting WLAN \nAirDefense: This is a WLAN intrusion protection and management system that detects network vulnerabilities, detects and protects a WLAN from intruders and attacks, and supports in the management of a WLAN.\nIsomair Wireless Sentry: This observes the air space to identify insecure access points (AP), security threats and wireless network problems. Isomair Wireless Sentry is using an Intelligent Conveyor Engine (ICE) to passively observe wireless networks for threats and inform the security managers when these occur. It is a completely automated system and is centrally managed.&#91;9&#93;\n\nFirewalls and intrusion detection systems \nIoT is a representation of the globalization in our life. From smart refrigerators to smart clothes, IoT devices promise to make our daily lives more practical, though operational security is of the utmost concern. Operational security involves the analytical part of a process and differentiates the information asset. It also controls the assets or data that go through their respective journey in a networked world. There are two types of operational security that are very well known: the firewall and the intrusion detection system. Both are designed to prevent unauthorized access between computer networks.\nIn this task, the firewall provides a simple and effective security layer for smart devices. The engineer builds this security system in to prevent our data from being corrupted or lost by unauthorized access. The floodgate design is often used to protect the smart device through firewalls. It carries with it a small footprint and low CPU processing. It provides static filtering, threshold-based filtering, and SPI to protect embedded devices from internet threats. Even though the smart device is secured with encryption and authentication, there are still exposed by external attack since they use a wireless system.&#91;10&#93;\nThe intrusion detection system (IDS) is necessary for smart device to prevent intrusion from inside 6lowPAN networks (IPV6 over low power wireless personal area network) or from the internet. For example, Raza et al. disucss SVELTE, designed to protect an IoT system from being attacked, routing attacks of those using spoofed or altered information, sinkholes and selective forwarding. Their prototype doesn't function at 100 percent but shows promise. This product is small and can benefit notes with limited energy supply and memory capacity.&#91;11&#93;\n\nConclusion \nIoT has great potential for the populace as well as business, but it doesn't come without risk, requiring a great deal of thought, planning and action. Information security organizations must begin preparations to transition from securing PCs, servers, mobile devices and traditional IT infrastructure, to managing a much broader set of interconnected items incorporating wearable devices, sensors and technology. Therefore, network security teams should take the initiative to look for the best practices to secure these emerging devices and be prepared to update risk issue and security policies as these devices make their way onto enterprise networks.\n\nReferences \n\n\n\u2191 Granjal, J.; Monteiro, E.; Silva, J.S.&#32;(2014).&#32;\"Network-layer security for the Internet of Things using TinyOS and BLIP\".&#32;International Journal of Communication Systems&#32;27&#32;(10): 1938\u20131963.&#32;doi:10.1002\/dac.2444. &#160; \n\n\u2191 Grau, A.&#32;(21 March 2013).&#32;\"The Internet Of Things Needs Firewalls Too\".&#32;Electronic Design.&#32;Penton.&#32;http:\/\/electronicdesign.com\/communications\/internet-things-needs-firewalls-too .&#32;Retrieved 7 June 2016 . &#160; \n\n\u2191 Rashid, F.Y.&#32;(5 November 2014).&#32;\"How to Secure Your Internet of Things\".&#32;PC Magazine.&#32;Ziff Davis, LLC.&#32;http:\/\/www.pcmag.com\/article2\/0,2817,2471675,00.asp .&#32;Retrieved 7 June 2016 . &#160; \n\n\u2191 Division of Communication and External Relations&#32;(4 June 2013).&#32;\"Enables secure communication in the Internet of Things\".&#32;M\u00e4lardalen University.&#32;http:\/\/www.mdh.se\/mojliggor-saker-kommunikation-for-framtidens-internet-1.40888?l=en_UK .&#32;Retrieved 7 June 2016 . &#160; \n\n\u2191 Kurose, J.F.; Ross, K.W.&#32;(2012).&#32;Computer Networking: A Top-Down Approach&#32;(6th ed.).&#32;Pearson.&#32;pp.&#160;864.&#32;ISBN&#160;9780132856201. &#160; \n\n\u2191 Leduc, G.&#32;(2016).&#32;\"Chapter 5: Network Layer Security\"&#32;(PDF).&#32;Managing and Securing Computer Networks.&#32;Universit\u00e9 de Li\u00e8ge.&#32;pp.&#160;62.&#32;http:\/\/www.montefiore.ulg.ac.be\/~leduc\/cours\/ISIR\/GSRI-ch5.pdf . &#160; \n\n\u2191 Reno, J.&#32;(2013).&#32;\"Security and the Internet of Things\".&#32;CA Technologies.&#32;http:\/\/www.ca.com\/us\/lpg\/ca-technology-exchange\/security-and-the-internet-of-things.aspx .&#32;Retrieved 7 June 2016 . &#160; \n\n\u2191 Happich, J.&#32;(22 September 2013).&#32;\"Low footprint software firewall protects IoT devices\".&#32;EDN Network.&#32;UBM.&#32;http:\/\/www.edn.com\/electronics-products\/other\/4421446\/Low-footprint-software-firewall-protects-IoT-devices .&#32;Retrieved 7 June 2016 . &#160; \n\n\u2191 Biskup, J.&#32;(2009).&#32;Security in Computing Systems: Challenges, Approaches and Solutions.&#32;Springer-Verlag Berlin Heidelberg.&#32;pp.&#160;694.&#32;ISBN&#160;9783642097195. &#160; \n\n\u2191 \"Firewall (computing)\".&#32;Wikimedia Foundation.&#32;http:\/\/en.wikipedia.org\/wiki\/Firewall_(computing) .&#32;Retrieved 7 June 2016 . &#160; \n\n\u2191 Raza, S.; Wallgren, L.; Voigt, T.&#32;(2013).&#32;\"SVELTE: Real-time intrusion detection in the Internet of Things\".&#32;As Hoc Networks&#32;11&#32;(8).&#32;doi:10.1016\/j.adhoc.2013.04.014. &#160; \n\n\n\n\n\n<\/pre>\n\nNotes \nThis article is a direct transclusion of the Wikibooks article and therefore may not meet the same editing standards as LIMSwiki.\n\n\n\n\n\n\nSource: <a rel=\"external_link\" class=\"external\" href=\"https:\/\/www.limswiki.org\/index.php\/LII:I_Dream_of_IoT\/Chapter_7_:_IoT_and_Security\">https:\/\/www.limswiki.org\/index.php\/LII:I_Dream_of_IoT\/Chapter_7_:_IoT_and_Security<\/a>\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\n\t\t\n\t\t\n\t\t\tNavigation menu\n\t\t\t\t\t\n\t\t\tViews\n\n\t\t\t\n\t\t\t\t\n\t\t\t\tLII\n\t\t\t\tDiscussion\n\t\t\t\tView source\n\t\t\t\tHistory\n\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\n\t\t\t\tPersonal tools\n\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\tLog in\n\t\t\t\t\t\t\t\t\t\t\t\t\tRequest account\n\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\n\t\t\t\n\t\t\t\t\n\t\t\t\n\t\t\t\t\n\t\tNavigation\n\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\tMain page\n\t\t\t\t\t\t\t\t\t\t\tRecent changes\n\t\t\t\t\t\t\t\t\t\t\tRandom page\n\t\t\t\t\t\t\t\t\t\t\tHelp\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\n\t\t\t\n\t\t\tSearch\n\n\t\t\t\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t&#160;\n\t\t\t\t\t\t\n\t\t\t\t\n\n\t\t\t\t\t\t\t\n\t\t\n\t\t\t\n\t\t\tTools\n\n\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\tWhat links here\n\t\t\t\t\t\t\t\t\t\t\tRelated changes\n\t\t\t\t\t\t\t\t\t\t\tSpecial pages\n\t\t\t\t\t\t\t\t\t\t\tPermanent link\n\t\t\t\t\t\t\t\t\t\t\tPage information\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\n\t\t\n\t\tPrint\/export\n\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\tCreate a book\n\t\t\t\t\t\t\t\t\t\t\tDownload as PDF\n\t\t\t\t\t\t\t\t\t\t\tDownload as Plain text\n\t\t\t\t\t\t\t\t\t\t\tPrintable version\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\n\t\t\n\t\tSponsors\n\t\t\n\t\t\t \r\n\n\t\r\n\n\t\r\n\n\t\r\n\n\t\n\t\r\n\n \r\n\n\t\n\t\r\n\n \r\n\n\t\n\t\r\n\n\t\n\t\r\n\n\t\r\n\n\t\r\n\n\t\r\n\t\t\n\t\t\n\t\t\t\n\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t This page was last modified on 8 June 2016, at 20:29.\n\t\t\t\t\t\t\t\t\tThis page has been accessed 447 times.\n\t\t\t\t\t\t\t\t\tContent is available under a Creative Commons Attribution-ShareAlike 4.0 International License unless otherwise noted.\n\t\t\t\t\t\t\t\t\tPrivacy policy\n\t\t\t\t\t\t\t\t\tAbout LIMSWiki\n\t\t\t\t\t\t\t\t\tDisclaimers\n\t\t\t\t\t\t\t\n\t\t\n\t\t\n\t\t\n\n","a692129c313080b36a68b1d3d31bc6de_html":"<body class=\"mediawiki ltr sitedir-ltr ns-202 ns-subject page-LII_I_Dream_of_IoT_Chapter_7_IoT_and_Security skin-monobook action-view\">\n<div id=\"rdp-ebb-globalWrapper\">\n\t\t<div id=\"rdp-ebb-column-content\">\n\t\t\t<div id=\"rdp-ebb-content\" class=\"mw-body\" role=\"main\">\n\t\t\t\t<a id=\"rdp-ebb-top\"><\/a>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t<h1 id=\"rdp-ebb-firstHeading\" class=\"firstHeading\" lang=\"en\">LII:I Dream of IoT\/Chapter 7 : IoT and Security<\/h1>\n\t\t\t\t\n\t\t\t\t<div id=\"rdp-ebb-bodyContent\" class=\"mw-body-content\">\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\n\n\t\t\t\t\t<!-- start content -->\n\t\t\t\t\t<div id=\"rdp-ebb-mw-content-text\" lang=\"en\" dir=\"ltr\" class=\"mw-content-ltr\"><div class=\"mw-parser-output\">\n<h2><span class=\"mw-headline\" id=\"Introduction_to_IoT_security\">Introduction to IoT security<\/span><\/h2>\n<p>The Internet of Things (IoT) can be describe as the interconnection between various uniquely identified stand-alone and embedded computing devices that can automatically transfer data over a network. IoT has the potential to make people\u2019s lives easier by allowing virtual environments, objects and data to be connected with each other and leting people to live with greater efficiency. However, with the increase in number of IoT-enabled devices, there are increasing challenges for these systems to provide a high level of security for users. IoT networks are managed with different priorities in mind, and each has distinct security needs. The priority of the IT network is to protect data confidentiality. The focus of the IoT network is on physical security and secure access to ensure proper and safe operation. As such, several security issues must be addressed when it comes to living the \"smart\" life.\n<\/p>\n<h2><span class=\"mw-headline\" id=\"Network-layer_security\">Network-layer security<\/span><\/h2>\n<p>Generally, network-layer security with IoT typically involves security mechanisms for resource-constrained sensing applications and devices that provide an important contribution via its integration with the internet. In this context we target the design and experimental evaluation of security mechanisms for communications at the network layer with sensing devices (smart objects) using the standard IPv6 protocol. Although it is certain that not all smart objects on the IoT will have the capability or will be required to support IPv6, the availability of secure end-to-end communications at the network layer with other sensing devices or with internet hosts may enable a much richer integration of sensing applications with the internet. It may also enable new types of sensing applications where smart objects are able to cooperate remotely and securely using internet communications.<sup id=\"rdp-ebb-cite_ref-GranjalNet14_1-0\" class=\"reference\"><a href=\"#cite_note-GranjalNet14-1\" rel=\"external_link\">&#91;1&#93;<\/a><\/sup>\n<\/p><p>There are differences between security at the network level and security at the transport level. Both are general-purpose which means they function independent of the layer. At the network layer, the IPsec is not specific to TCP, UDP and other protocols above IP. This makes IPsec more flexible and able to operate at a higher layer because it is transparent to the end user and application via what is called \"blanket coverage.\" As such, we do not need to change software on a user or server system when IPsec is implemented on a firewall or router. We also do not need to train users, issue keying material on a per-user basis or revoke keying material when users leave the organization. On the transport layer, the TLS (Transport Layer Security) works for its application of HTTP, FTP and SMTP, but not for TCP.<sup id=\"rdp-ebb-cite_ref-GrauTheInt13_2-0\" class=\"reference\"><a href=\"#cite_note-GrauTheInt13-2\" rel=\"external_link\">&#91;2&#93;<\/a><\/sup>\n<\/p>\n<h2><span class=\"mw-headline\" id=\"Securing_TCP_connections\">Securing TCP connections<\/span><\/h2>\n<p>TCP\/IP (Transmission Control Protocol\/Internet Protocol) is a common way that computers of all types communicate with each other. TCP\/IP applications are well-known and widely used throughout the \"information highway.\" TCP works with the Internet Protocol (IP), which defines how computers send packets of data to each other. Together, TCP and IP make up the basic rules defining the Internet.\n<\/p>\n<h3><span id=\"rdp-ebb-Use_packet_rules_to_secure_TCP.2FIP_traffic\"><\/span><span class=\"mw-headline\" id=\"Use_packet_rules_to_secure_TCP\/IP_traffic\">Use packet rules to secure TCP\/IP traffic<\/span><\/h3>\n<p>Packet rules, which represent the combination of IP filtering and network address translation (NAT), act like a firewall to protect an internal network from intruders. IP filtering controls what IP traffic to allow into and out of the network. Basically, it protects a network by filtering packets according to rules that it defines. NAT, on the other hand, was allowed to hide unregistered private IP addresses behind a set of registered IP addresses. This helps to protect internal networks from outside networks. NAT also helps to alleviate the IP address depletion problem, since many private addresses can be represented by a small set of registered addresses.<sup id=\"rdp-ebb-cite_ref-RashidHowTo14_3-0\" class=\"reference\"><a href=\"#cite_note-RashidHowTo14-3\" rel=\"external_link\">&#91;3&#93;<\/a><\/sup>\n<\/p>\n<h3><span id=\"rdp-ebb-SSL_and_TCP.2FIP\"><\/span><span class=\"mw-headline\" id=\"SSL_and_TCP\/IP\">SSL and TCP\/IP<\/span><\/h3>\n<p>Secure Socket Layer (SSL) and Transport Layer Security (TLS) is the most widely deployed security protocol used today. It is essentially a protocol that provides a secure channel between two machines operating over the internet or an internal network. In today\u2019s internet-focused world, the SSL protocol is typically used when a web browser needs to securely connect to a web server over the inherently insecure internet.\n<\/p><p>Technically, SSL is a transparent protocol which requires little interaction from the end user when establishing a secure session. In the case of a browser, for instance, users are alerted to the presence of SSL when the browser displays a padlock, or, in the case of Extended Validation SSL, when the address bar displays both a padlock and a green bar. This is the key to the success of SSL since it is an incredibly simple experience for end users.<sup id=\"rdp-ebb-cite_ref-DivisionEnables13_4-0\" class=\"reference\"><a href=\"#cite_note-DivisionEnables13-4\" rel=\"external_link\">&#91;4&#93;<\/a><\/sup>\n<\/p><p>Example application with SSL: \"Toy SSL,\" a simple secure channel principle\n<\/p>\n<ul><li>Handshake: Alice and Bob use their certificates and private keys to authenticate each other and exchange shared secret<\/li>\n<li>Key Derivation: Alice and Bob use shared secret to derive set of keys<\/li>\n<li>Data Transfer: Data to be transferred is broken up into a series of records<\/li>\n<li>Connection Closure: Special messages to securely close connection<\/li><\/ul>\n<h2><span class=\"mw-headline\" id=\"WLAN_Security\">WLAN Security<\/span><\/h2>\n<p>A wireless local area network (WLAN) is used in many sectors. WLAN remains popular because of its many advantages, including: \n<\/p>\n<ul><li>installation flexibility;<\/li>\n<li>mobility;<\/li>\n<li>reduced cost of ownership;<\/li>\n<li>scalability; and<\/li>\n<li>ease of installation.<\/li><\/ul>\n<p>However, regardless of the benefits, WLAN has its share of security issues. To protect a WLAN from threats like denial of service (DoS), spoofing, and session hijacking and eavesdropping, Wired Equivalent Privacy should be used.<sup id=\"rdp-ebb-cite_ref-KuroseComp12_5-0\" class=\"reference\"><a href=\"#cite_note-KuroseComp12-5\" rel=\"external_link\">&#91;5&#93;<\/a><\/sup><sup id=\"rdp-ebb-cite_ref-LeducNet16_6-0\" class=\"reference\"><a href=\"#cite_note-LeducNet16-6\" rel=\"external_link\">&#91;6&#93;<\/a><\/sup>\n<\/p>\n<h3><span class=\"mw-headline\" id=\"Wired_Equivalent_Privacy\">Wired Equivalent Privacy<\/span><\/h3>\n<p>Wired Equivalent Privacy (WEP) is a standard encryption type for wireless networking. It is a user authentication and data encryption system from IEEE 802.11 used to eliminate security threats. Basically, WEP provides security to WLAN by encrypting the transmitted information over the air, so that only the receiver who possesses the correct encryption key can decrypt the information.\n<\/p>\n<h4><span class=\"mw-headline\" id=\"How_WEP_works\">How WEP works<\/span><\/h4>\n<p>WEP utilizes a secret key called the \u201cbase key\u201d that includes the RC4 encryption algorithm and the CRC-32 (Cyclic Redundancy Code) checksum algorithm as its basic building blocks.<sup id=\"rdp-ebb-cite_ref-RenoSec13_7-0\" class=\"reference\"><a href=\"#cite_note-RenoSec13-7\" rel=\"external_link\">&#91;7&#93;<\/a><\/sup> WEP tries to achieve its security in a very simple way: it operates on MAC Protocol Data Units (MPDUs), the 802.11 packet fragments. To provide the security of the data in an MPDU, WEP first calculates an integrity check value (ICV) over the MPDU data. This value is the CRC-32 of the data. WEP adds the ICV to the end of the data, growing this field by four bytes. With the help of the ICV, the receiver is able to detect the data of outright forgery and changes during the broadcast. Next, WEP selects a base key and an initialization vector (IV), which is a 24-bit value. WEP determine a per-packet RC4 key by combining the IV value and the selected base key. WEP then uses the per-packet key to RC4, and encrypt the data and the ICV.<sup id=\"rdp-ebb-cite_ref-HappichLow13_8-0\" class=\"reference\"><a href=\"#cite_note-HappichLow13-8\" rel=\"external_link\">&#91;8&#93;<\/a><\/sup>\n<\/p>\n<h3><span class=\"mw-headline\" id=\"Tools_for_protecting_WLAN\">Tools for protecting WLAN<\/span><\/h3>\n<p>AirDefense: This is a WLAN intrusion protection and management system that detects network vulnerabilities, detects and protects a WLAN from intruders and attacks, and supports in the management of a WLAN.\n<\/p><p>Isomair Wireless Sentry: This observes the air space to identify insecure access points (AP), security threats and wireless network problems. Isomair Wireless Sentry is using an Intelligent Conveyor Engine (ICE) to passively observe wireless networks for threats and inform the security managers when these occur. It is a completely automated system and is centrally managed.<sup id=\"rdp-ebb-cite_ref-BiskupSec09_9-0\" class=\"reference\"><a href=\"#cite_note-BiskupSec09-9\" rel=\"external_link\">&#91;9&#93;<\/a><\/sup>\n<\/p>\n<h2><span class=\"mw-headline\" id=\"Firewalls_and_intrusion_detection_systems\">Firewalls and intrusion detection systems<\/span><\/h2>\n<p>IoT is a representation of the globalization in our life. From smart refrigerators to smart clothes, IoT devices promise to make our daily lives more practical, though operational security is of the utmost concern. Operational security involves the analytical part of a process and differentiates the information asset. It also controls the assets or data that go through their respective journey in a networked world. There are two types of operational security that are very well known: the firewall and the intrusion detection system. Both are designed to prevent unauthorized access between computer networks.\n<\/p><p>In this task, the firewall provides a simple and effective security layer for smart devices. The engineer builds this security system in to prevent our data from being corrupted or lost by unauthorized access. The floodgate design is often used to protect the smart device through firewalls. It carries with it a small footprint and low CPU processing. It provides static filtering, threshold-based filtering, and SPI to protect embedded devices from internet threats. Even though the smart device is secured with encryption and authentication, there are still exposed by external attack since they use a wireless system.<sup id=\"rdp-ebb-cite_ref-WPFirewall_10-0\" class=\"reference\"><a href=\"#cite_note-WPFirewall-10\" rel=\"external_link\">&#91;10&#93;<\/a><\/sup>\n<\/p><p>The intrusion detection system (IDS) is necessary for smart device to prevent intrusion from inside 6lowPAN networks (IPV6 over low power wireless personal area network) or from the internet. For example, Raza <i>et al.<\/i> disucss SVELTE, designed to protect an IoT system from being attacked, routing attacks of those using spoofed or altered information, sinkholes and selective forwarding. Their prototype doesn't function at 100 percent but shows promise. This product is small and can benefit notes with limited energy supply and memory capacity.<sup id=\"rdp-ebb-cite_ref-RazaSVELTE13_11-0\" class=\"reference\"><a href=\"#cite_note-RazaSVELTE13-11\" rel=\"external_link\">&#91;11&#93;<\/a><\/sup>\n<\/p>\n<h2><span class=\"mw-headline\" id=\"Conclusion\">Conclusion<\/span><\/h2>\n<p>IoT has great potential for the populace as well as business, but it doesn't come without risk, requiring a great deal of thought, planning and action. Information security organizations must begin preparations to transition from securing PCs, servers, mobile devices and traditional IT infrastructure, to managing a much broader set of interconnected items incorporating wearable devices, sensors and technology. Therefore, network security teams should take the initiative to look for the best practices to secure these emerging devices and be prepared to update risk issue and security policies as these devices make their way onto enterprise networks.\n<\/p>\n<h2><span class=\"mw-headline\" id=\"References\">References<\/span><\/h2>\n<div class=\"reflist references\" style=\"\">\n<ol class=\"references\">\n<li id=\"cite_note-GranjalNet14-1\"><span class=\"mw-cite-backlink\"><a href=\"#cite_ref-GranjalNet14_1-0\" rel=\"external_link\">\u2191<\/a><\/span> <span class=\"reference-text\"><span class=\"citation Journal\">Granjal, J.; Monteiro, E.; Silva, J.S.&#32;(2014).&#32;\"Network-layer security for the Internet of Things using TinyOS and BLIP\".&#32;<i>International Journal of Communication Systems<\/i>&#32;<b>27<\/b>&#32;(10): 1938\u20131963.&#32;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Digital_object_identifier\" class=\"extiw\" title=\"w:Digital object identifier\" rel=\"external_link\" target=\"_blank\">doi<\/a>:<a rel=\"external_link\" class=\"external text\" href=\"http:\/\/dx.doi.org\/10.1002%2Fdac.2444\" target=\"_blank\">10.1002\/dac.2444<\/a>.<\/span><span class=\"Z3988\" title=\"ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.atitle=Network-layer+security+for+the+Internet+of+Things+using+TinyOS+and+BLIP&amp;rft.jtitle=International+Journal+of+Communication+Systems&amp;rft.aulast=Granjal%2C+J.%3B+Monteiro%2C+E.%3B+Silva%2C+J.S.&amp;rft.au=Granjal%2C+J.%3B+Monteiro%2C+E.%3B+Silva%2C+J.S.&amp;rft.date=2014&amp;rft.volume=27&amp;rft.issue=10&amp;rft.pages=1938%E2%80%931963&amp;rft_id=info:doi\/10.1002%2Fdac.2444&amp;rfr_id=info:sid\/en.wikibooks.org:I_Dream_of_IoT\/Chapter_7_:_IoT_and_Security\"><span style=\"display: none;\">&#160;<\/span><\/span><\/span>\n<\/li>\n<li id=\"cite_note-GrauTheInt13-2\"><span class=\"mw-cite-backlink\"><a href=\"#cite_ref-GrauTheInt13_2-0\" rel=\"external_link\">\u2191<\/a><\/span> <span class=\"reference-text\"><span class=\"citation web\">Grau, A.&#32;(21 March 2013).&#32;<a rel=\"external_link\" class=\"external text\" href=\"http:\/\/electronicdesign.com\/communications\/internet-things-needs-firewalls-too\" target=\"_blank\">\"The Internet Of Things Needs Firewalls Too\"<\/a>.&#32;<i>Electronic Design<\/i>.&#32;Penton<span class=\"printonly\">.&#32;<a rel=\"external_link\" class=\"external free\" href=\"http:\/\/electronicdesign.com\/communications\/internet-things-needs-firewalls-too\" target=\"_blank\">http:\/\/electronicdesign.com\/communications\/internet-things-needs-firewalls-too<\/a><\/span><span class=\"reference-accessdate\">.&#32;Retrieved 7 June 2016<\/span>.<\/span><span class=\"Z3988\" title=\"ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.btitle=The+Internet+Of+Things+Needs+Firewalls+Too&amp;rft.atitle=Electronic+Design&amp;rft.aulast=Grau%2C+A.&amp;rft.au=Grau%2C+A.&amp;rft.date=21+March+2013&amp;rft.pub=Penton&amp;rft_id=http%3A%2F%2Felectronicdesign.com%2Fcommunications%2Finternet-things-needs-firewalls-too&amp;rfr_id=info:sid\/en.wikibooks.org:I_Dream_of_IoT\/Chapter_7_:_IoT_and_Security\"><span style=\"display: none;\">&#160;<\/span><\/span><\/span>\n<\/li>\n<li id=\"cite_note-RashidHowTo14-3\"><span class=\"mw-cite-backlink\"><a href=\"#cite_ref-RashidHowTo14_3-0\" rel=\"external_link\">\u2191<\/a><\/span> <span class=\"reference-text\"><span class=\"citation web\">Rashid, F.Y.&#32;(5 November 2014).&#32;<a rel=\"external_link\" class=\"external text\" href=\"http:\/\/www.pcmag.com\/article2\/0,2817,2471675,00.asp\" target=\"_blank\">\"How to Secure Your Internet of Things\"<\/a>.&#32;<i>PC Magazine<\/i>.&#32;Ziff Davis, LLC<span class=\"printonly\">.&#32;<a rel=\"external_link\" class=\"external free\" href=\"http:\/\/www.pcmag.com\/article2\/0,2817,2471675,00.asp\" target=\"_blank\">http:\/\/www.pcmag.com\/article2\/0,2817,2471675,00.asp<\/a><\/span><span class=\"reference-accessdate\">.&#32;Retrieved 7 June 2016<\/span>.<\/span><span class=\"Z3988\" title=\"ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.btitle=How+to+Secure+Your+Internet+of+Things&amp;rft.atitle=PC+Magazine&amp;rft.aulast=Rashid%2C+F.Y.&amp;rft.au=Rashid%2C+F.Y.&amp;rft.date=5+November+2014&amp;rft.pub=Ziff+Davis%2C+LLC&amp;rft_id=http%3A%2F%2Fwww.pcmag.com%2Farticle2%2F0%2C2817%2C2471675%2C00.asp&amp;rfr_id=info:sid\/en.wikibooks.org:I_Dream_of_IoT\/Chapter_7_:_IoT_and_Security\"><span style=\"display: none;\">&#160;<\/span><\/span><\/span>\n<\/li>\n<li id=\"cite_note-DivisionEnables13-4\"><span class=\"mw-cite-backlink\"><a href=\"#cite_ref-DivisionEnables13_4-0\" rel=\"external_link\">\u2191<\/a><\/span> <span class=\"reference-text\"><span class=\"citation web\">Division of Communication and External Relations&#32;(4 June 2013).&#32;<a rel=\"external_link\" class=\"external text\" href=\"http:\/\/www.mdh.se\/mojliggor-saker-kommunikation-for-framtidens-internet-1.40888?l=en_UK\" target=\"_blank\">\"Enables secure communication in the Internet of Things\"<\/a>.&#32;M\u00e4lardalen University<span class=\"printonly\">.&#32;<a rel=\"external_link\" class=\"external free\" href=\"http:\/\/www.mdh.se\/mojliggor-saker-kommunikation-for-framtidens-internet-1.40888?l=en_UK\" target=\"_blank\">http:\/\/www.mdh.se\/mojliggor-saker-kommunikation-for-framtidens-internet-1.40888?l=en_UK<\/a><\/span><span class=\"reference-accessdate\">.&#32;Retrieved 7 June 2016<\/span>.<\/span><span class=\"Z3988\" title=\"ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.btitle=Enables+secure+communication+in+the+Internet+of+Things&amp;rft.atitle=&amp;rft.aulast=Division+of+Communication+and+External+Relations&amp;rft.au=Division+of+Communication+and+External+Relations&amp;rft.date=4+June+2013&amp;rft.pub=M%C3%A4lardalen+University&amp;rft_id=http%3A%2F%2Fwww.mdh.se%2Fmojliggor-saker-kommunikation-for-framtidens-internet-1.40888%3Fl%3Den_UK&amp;rfr_id=info:sid\/en.wikibooks.org:I_Dream_of_IoT\/Chapter_7_:_IoT_and_Security\"><span style=\"display: none;\">&#160;<\/span><\/span><\/span>\n<\/li>\n<li id=\"cite_note-KuroseComp12-5\"><span class=\"mw-cite-backlink\"><a href=\"#cite_ref-KuroseComp12_5-0\" rel=\"external_link\">\u2191<\/a><\/span> <span class=\"reference-text\"><span class=\"citation book\">Kurose, J.F.; Ross, K.W.&#32;(2012).&#32;<i>Computer Networking: A Top-Down Approach<\/i>&#32;(6th ed.).&#32;Pearson.&#32;pp.&#160;864.&#32;<a href=\"https:\/\/en.wikipedia.org\/wiki\/International_Standard_Book_Number\" class=\"extiw\" title=\"w:International Standard Book Number\" rel=\"external_link\" target=\"_blank\">ISBN<\/a>&#160;9780132856201.<\/span><span class=\"Z3988\" title=\"ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Computer+Networking%3A+A+Top-Down+Approach&amp;rft.aulast=Kurose%2C+J.F.%3B+Ross%2C+K.W.&amp;rft.au=Kurose%2C+J.F.%3B+Ross%2C+K.W.&amp;rft.date=2012&amp;rft.pages=pp.%26nbsp%3B864&amp;rft.edition=6th&amp;rft.pub=Pearson&amp;rft.isbn=9780132856201&amp;rfr_id=info:sid\/en.wikibooks.org:I_Dream_of_IoT\/Chapter_7_:_IoT_and_Security\"><span style=\"display: none;\">&#160;<\/span><\/span><\/span>\n<\/li>\n<li id=\"cite_note-LeducNet16-6\"><span class=\"mw-cite-backlink\"><a href=\"#cite_ref-LeducNet16_6-0\" rel=\"external_link\">\u2191<\/a><\/span> <span class=\"reference-text\"><span class=\"citation book\">Leduc, G.&#32;(2016).&#32;<a rel=\"external_link\" class=\"external text\" href=\"http:\/\/www.montefiore.ulg.ac.be\/~leduc\/cours\/ISIR\/GSRI-ch5.pdf\" target=\"_blank\">\"Chapter 5: Network Layer Security\"<\/a>&#32;(PDF).&#32;<i>Managing and Securing Computer Networks<\/i>.&#32;Universit\u00e9 de Li\u00e8ge.&#32;pp.&#160;62<span class=\"printonly\">.&#32;<a rel=\"external_link\" class=\"external free\" href=\"http:\/\/www.montefiore.ulg.ac.be\/~leduc\/cours\/ISIR\/GSRI-ch5.pdf\" target=\"_blank\">http:\/\/www.montefiore.ulg.ac.be\/~leduc\/cours\/ISIR\/GSRI-ch5.pdf<\/a><\/span>.<\/span><span class=\"Z3988\" title=\"ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.btitle=Chapter+5%3A+Network+Layer+Security&amp;rft.atitle=Managing+and+Securing+Computer+Networks&amp;rft.aulast=Leduc%2C+G.&amp;rft.au=Leduc%2C+G.&amp;rft.date=2016&amp;rft.pages=pp.%26nbsp%3B62&amp;rft.pub=Universit%C3%A9+de+Li%C3%A8ge&amp;rft_id=http%3A%2F%2Fwww.montefiore.ulg.ac.be%2F%7Eleduc%2Fcours%2FISIR%2FGSRI-ch5.pdf&amp;rfr_id=info:sid\/en.wikibooks.org:I_Dream_of_IoT\/Chapter_7_:_IoT_and_Security\"><span style=\"display: none;\">&#160;<\/span><\/span><\/span>\n<\/li>\n<li id=\"cite_note-RenoSec13-7\"><span class=\"mw-cite-backlink\"><a href=\"#cite_ref-RenoSec13_7-0\" rel=\"external_link\">\u2191<\/a><\/span> <span class=\"reference-text\"><span class=\"citation web\">Reno, J.&#32;(2013).&#32;<a rel=\"external_link\" class=\"external text\" href=\"http:\/\/www.ca.com\/us\/lpg\/ca-technology-exchange\/security-and-the-internet-of-things.aspx\" target=\"_blank\">\"Security and the Internet of Things\"<\/a>.&#32;CA Technologies<span class=\"printonly\">.&#32;<a rel=\"external_link\" class=\"external free\" href=\"http:\/\/www.ca.com\/us\/lpg\/ca-technology-exchange\/security-and-the-internet-of-things.aspx\" target=\"_blank\">http:\/\/www.ca.com\/us\/lpg\/ca-technology-exchange\/security-and-the-internet-of-things.aspx<\/a><\/span><span class=\"reference-accessdate\">.&#32;Retrieved 7 June 2016<\/span>.<\/span><span class=\"Z3988\" title=\"ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.btitle=Security+and+the+Internet+of+Things&amp;rft.atitle=&amp;rft.aulast=Reno%2C+J.&amp;rft.au=Reno%2C+J.&amp;rft.date=2013&amp;rft.pub=CA+Technologies&amp;rft_id=http%3A%2F%2Fwww.ca.com%2Fus%2Flpg%2Fca-technology-exchange%2Fsecurity-and-the-internet-of-things.aspx&amp;rfr_id=info:sid\/en.wikibooks.org:I_Dream_of_IoT\/Chapter_7_:_IoT_and_Security\"><span style=\"display: none;\">&#160;<\/span><\/span><\/span>\n<\/li>\n<li id=\"cite_note-HappichLow13-8\"><span class=\"mw-cite-backlink\"><a href=\"#cite_ref-HappichLow13_8-0\" rel=\"external_link\">\u2191<\/a><\/span> <span class=\"reference-text\"><span class=\"citation web\">Happich, J.&#32;(22 September 2013).&#32;<a rel=\"external_link\" class=\"external text\" href=\"http:\/\/www.edn.com\/electronics-products\/other\/4421446\/Low-footprint-software-firewall-protects-IoT-devices\" target=\"_blank\">\"Low footprint software firewall protects IoT devices\"<\/a>.&#32;<i>EDN Network<\/i>.&#32;UBM<span class=\"printonly\">.&#32;<a rel=\"external_link\" class=\"external free\" href=\"http:\/\/www.edn.com\/electronics-products\/other\/4421446\/Low-footprint-software-firewall-protects-IoT-devices\" target=\"_blank\">http:\/\/www.edn.com\/electronics-products\/other\/4421446\/Low-footprint-software-firewall-protects-IoT-devices<\/a><\/span><span class=\"reference-accessdate\">.&#32;Retrieved 7 June 2016<\/span>.<\/span><span class=\"Z3988\" title=\"ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.btitle=Low+footprint+software+firewall+protects+IoT+devices&amp;rft.atitle=EDN+Network&amp;rft.aulast=Happich%2C+J.&amp;rft.au=Happich%2C+J.&amp;rft.date=22+September+2013&amp;rft.pub=UBM&amp;rft_id=http%3A%2F%2Fwww.edn.com%2Felectronics-products%2Fother%2F4421446%2FLow-footprint-software-firewall-protects-IoT-devices&amp;rfr_id=info:sid\/en.wikibooks.org:I_Dream_of_IoT\/Chapter_7_:_IoT_and_Security\"><span style=\"display: none;\">&#160;<\/span><\/span><\/span>\n<\/li>\n<li id=\"cite_note-BiskupSec09-9\"><span class=\"mw-cite-backlink\"><a href=\"#cite_ref-BiskupSec09_9-0\" rel=\"external_link\">\u2191<\/a><\/span> <span class=\"reference-text\"><span class=\"citation book\">Biskup, J.&#32;(2009).&#32;<i>Security in Computing Systems: Challenges, Approaches and Solutions<\/i>.&#32;Springer-Verlag Berlin Heidelberg.&#32;pp.&#160;694.&#32;<a href=\"https:\/\/en.wikipedia.org\/wiki\/International_Standard_Book_Number\" class=\"extiw\" title=\"w:International Standard Book Number\" rel=\"external_link\" target=\"_blank\">ISBN<\/a>&#160;9783642097195.<\/span><span class=\"Z3988\" title=\"ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Security+in+Computing+Systems%3A+Challenges%2C+Approaches+and+Solutions&amp;rft.aulast=Biskup%2C+J.&amp;rft.au=Biskup%2C+J.&amp;rft.date=2009&amp;rft.pages=pp.%26nbsp%3B694&amp;rft.pub=Springer-Verlag+Berlin+Heidelberg&amp;rft.isbn=9783642097195&amp;rfr_id=info:sid\/en.wikibooks.org:I_Dream_of_IoT\/Chapter_7_:_IoT_and_Security\"><span style=\"display: none;\">&#160;<\/span><\/span><\/span>\n<\/li>\n<li id=\"cite_note-WPFirewall-10\"><span class=\"mw-cite-backlink\"><a href=\"#cite_ref-WPFirewall_10-0\" rel=\"external_link\">\u2191<\/a><\/span> <span class=\"reference-text\"><span class=\"citation web\"><a class=\"external text\" href=\"http:\/\/en.wikipedia.org\/wiki\/Firewall_(computing)\" rel=\"external_link\" target=\"_blank\">\"Firewall (computing)\"<\/a>.&#32;Wikimedia Foundation<span class=\"printonly\">.&#32;<a class=\"external free\" href=\"http:\/\/en.wikipedia.org\/wiki\/Firewall_(computing)\" rel=\"external_link\" target=\"_blank\">http:\/\/en.wikipedia.org\/wiki\/Firewall_(computing)<\/a><\/span><span class=\"reference-accessdate\">.&#32;Retrieved 7 June 2016<\/span>.<\/span><span class=\"Z3988\" title=\"ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.btitle=Firewall+%28computing%29&amp;rft.atitle=&amp;rft.pub=Wikimedia+Foundation&amp;rft_id=http%3A%2F%2Fen.wikipedia.org%2Fwiki%2FFirewall_%28computing%29&amp;rfr_id=info:sid\/en.wikibooks.org:I_Dream_of_IoT\/Chapter_7_:_IoT_and_Security\"><span style=\"display: none;\">&#160;<\/span><\/span><\/span>\n<\/li>\n<li id=\"cite_note-RazaSVELTE13-11\"><span class=\"mw-cite-backlink\"><a href=\"#cite_ref-RazaSVELTE13_11-0\" rel=\"external_link\">\u2191<\/a><\/span> <span class=\"reference-text\"><span class=\"citation Journal\">Raza, S.; Wallgren, L.; Voigt, T.&#32;(2013).&#32;\"SVELTE: Real-time intrusion detection in the Internet of Things\".&#32;<i>As Hoc Networks<\/i>&#32;<b>11<\/b>&#32;(8).&#32;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Digital_object_identifier\" class=\"extiw\" title=\"w:Digital object identifier\" rel=\"external_link\" target=\"_blank\">doi<\/a>:<a rel=\"external_link\" class=\"external text\" href=\"http:\/\/dx.doi.org\/10.1016%2Fj.adhoc.2013.04.014\" target=\"_blank\">10.1016\/j.adhoc.2013.04.014<\/a>.<\/span><span class=\"Z3988\" title=\"ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.atitle=SVELTE%3A+Real-time+intrusion+detection+in+the+Internet+of+Things&amp;rft.jtitle=As+Hoc+Networks&amp;rft.aulast=Raza%2C+S.%3B+Wallgren%2C+L.%3B+Voigt%2C+T.&amp;rft.au=Raza%2C+S.%3B+Wallgren%2C+L.%3B+Voigt%2C+T.&amp;rft.date=2013&amp;rft.volume=11&amp;rft.issue=8&amp;rft_id=info:doi\/10.1016%2Fj.adhoc.2013.04.014&amp;rfr_id=info:sid\/en.wikibooks.org:I_Dream_of_IoT\/Chapter_7_:_IoT_and_Security\"><span style=\"display: none;\">&#160;<\/span><\/span><\/span>\n<\/li>\n<\/ol><\/div>\n<p><!-- \nNewPP limit report\nParsed by mw1322\nCached time: 20181125231218\nCache expiry: 1900800\nDynamic content: false\nCPU time usage: 0.160 seconds\nReal time usage: 0.195 seconds\nPreprocessor visited node count: 5777\/1000000\nPreprocessor generated node count: 0\/1500000\nPost\u2010expand include size: 43683\/2097152 bytes\nTemplate argument size: 15721\/2097152 bytes\nHighest expansion depth: 14\/40\nExpensive parser function count: 0\/500\nUnstrip recursion depth: 0\/20\nUnstrip post\u2010expand size: 15226\/5000000 bytes\nNumber of Wikibase entities loaded: 0\/400\nLua time usage: 0.016\/10.000 seconds\nLua memory usage: 819 KB\/50 MB\n-->\n<!--\nTransclusion expansion time report (%,ms,calls,template)\n100.00% 165.285 1 -total\n<\/p>\n<pre>75.26% 124.391 1 Template:Reflist\n49.64% 82.039 11 Template:Citation\/core\n33.42% 55.231 2 Template:Cite_journal\n24.70% 40.818 1 Template:BookCat\n18.94% 31.306 6 Template:Cite_web\n12.51% 20.675 3 Template:Cite_book\n 7.36% 12.173 1 Template:Evalx\n 6.67% 11.031 4 Template:Citation\/identifier\n 4.75% 7.849 15 Template:Citation\/make_link\n<\/pre>\n<p>-->\n<\/p><p><!-- Saved in parser cache with key enwikibooks:pcache:idhash:307439-1!canonical and timestamp 20181125231218 and revision id 3106258\n<\/p>\n<pre>-->\n<\/pre>\n<\/div>\n<h2><span class=\"mw-headline\" id=\"Notes\">Notes<\/span><\/h2>\n<p>This article is a direct transclusion of <a rel=\"external_link\" class=\"external text\" href=\"https:\/\/en.wikibooks.org\/wiki\/I_Dream_of_IoT\/Chapter_7_:_IoT_and_Security\" target=\"_blank\">the Wikibooks article<\/a> and therefore may not meet the same editing standards as LIMSwiki.\n<\/p>\n<!-- \nNewPP limit report\nCached time: 20181217203741\nCache expiry: 86400\nDynamic content: false\nCPU time usage: 0.012 seconds\nReal time usage: 0.182 seconds\nPreprocessor visited node count: 5\/1000000\nPreprocessor generated node count: 16\/1000000\nPost\u2010expand include size: 20\/2097152 bytes\nTemplate argument size: 0\/2097152 bytes\nHighest expansion depth: 2\/40\nExpensive parser function count: 0\/100\n-->\n\n<!-- \nTransclusion expansion time report (%,ms,calls,template)\n100.00% 175.685 1 - wikibooks:I_Dream_of_IoT\/Chapter_7_:_IoT_and_Security\n100.00% 175.685 1 - -total\n-->\n\n<!-- Saved in parser cache with key limswiki:pcache:idhash:8787-0!*!*!*!*!*!* and timestamp 20181217203741 and revision id 25679\n -->\n<\/div><div class=\"printfooter\">Source: <a rel=\"external_link\" class=\"external\" href=\"https:\/\/www.limswiki.org\/index.php\/LII:I_Dream_of_IoT\/Chapter_7_:_IoT_and_Security\">https:\/\/www.limswiki.org\/index.php\/LII:I_Dream_of_IoT\/Chapter_7_:_IoT_and_Security<\/a><\/div>\n\t\t\t\t\t\t\t\t\t\t<!-- end content -->\n\t\t\t\t\t\t\t\t\t\t<div class=\"visualClear\"><\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t<!-- end of the left (by default at least) column -->\n\t\t<div class=\"visualClear\"><\/div>\n\t\t\t\t\t\n\t\t<\/div>\n\t\t\n\n<\/body>","a692129c313080b36a68b1d3d31bc6de_images":[],"a692129c313080b36a68b1d3d31bc6de_timestamp":1545079061,"069e3581b80f30da72bb6af94e173a47_type":"article","069e3581b80f30da72bb6af94e173a47_title":"Chapter 6 : IoT and Machine-to-Machine (M2M)","069e3581b80f30da72bb6af94e173a47_url":"https:\/\/www.limswiki.org\/index.php\/LII:I_Dream_of_IoT\/Chapter_6_:_IoT_and_Machine-to-Machine_(M2M)","069e3581b80f30da72bb6af94e173a47_plaintext":"\n\n\t\t\n\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\n\t\t\t\tLII:I Dream of IoT\/Chapter 6 : IoT and Machine-to-Machine (M2M)\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\tFrom LIMSWiki\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\tJump to: navigation, search\n\n\t\t\t\t\t\n\t\t\t\t\tContents \n\n1 Introduction to machine-to-machine communication \n2 The anatomy of M2M \n3 System monitoring \n\n3.1 Real-world examples \n3.2 M2M and the mobile environment \n\n\n4 M2M and its impact on the telecommunication industry \n5 Conclusion \n6 References \n\n\nIntroduction to machine-to-machine communication \nThe Internet of Things (IoT) is the interconnection of uniquely identified stand-alone and embedded computing devices within the existing internet infrastructure. Usually, IoT is expected to offer advanced connectivity of devices, systems, and services that goes beyond machine-to-machine (M2M) communications and covers a variety of protocols, domains, and applications.&#91;1&#93;\nThe M2M communication of the IoT is a very useful and effective aspect of the system. For example, IoT at the workplace \u2014 particularly in the factory \u2014 has already taken over the mundane tasks of monitoring industrial processes, managing fleets of vehicles and assets, and securing the facility. Additionally, it's also used in our own homes to control home security, adjust energy consumption, etc. In the future, our home will likely be called the smart home because of all the components that will use the technology.&#91;2&#93; \nM2M refers to technologies that allow both wireless and wired systems to communicate with other devices. The history of M2M has existed in different forms since the advent of computer networking automation and predates cellular communication. The expansion of IP networks across the world has made it far easier for M2M communication to take place and has lessened the amount of power and time necessary for information to be communicated between machines. These networks also allow an array of new business opportunities and connections between consumers and producers in terms of the products being sold. Originally M2M was used for automation and instrumentation, but more recently it has also been used in telecommunications applications.\n\nThe anatomy of M2M \nAny developing field comes with its own concepts and jargon, so it's useful to map these out as clearly as possible. Our taxonomy is outlined below&#91;3&#93;:\n\n1. Things\nThe \"things\" in the IoT, or the \"machines\" in M2M, are physical entities whose identity and state are being relayed to an internet-connected IT infrastructure. Almost anything to which you can attach a sensor \u2014 a cow in a field, a container on a cargo vessel, the air-conditioning unit in your office, or a lamppost in the street \u2014 can become a node in the Internet of Things.\n2. Sensors\nThese are the components of \"things\" that gather and\/or broadcast data, be it location, altitude, velocity, temperature, illumination, motion, power, humidity, blood sugar, air quality, soil moisture... you name it. These devices are rarely computers as we generally understand them, although they may contain many or all of the same elements (processor, memory, storage, inputs and outputs, OS, software). The key point is that they are increasingly cheap, plentiful and can communicate, either directly with the internet or with internet-connected devices.\n3. Comms (local-area)\nAll IoT sensors need some means of relaying data to the outside world. There's a plethora of short-range or local area wireless technologies available, including: RFID, NFC, Wi-Fi, Bluetooth (including Bluetooth Low Energy), XBee, Zigbee, Z-Wave, and Wireless M-Bus. There's no shortage of wired links either, including Ethernet, HomePlug, HomePNA, HomeGrid\/G.hn, and LonWorks\n4. Comms (wide-area)\nFor long range or wide-area links there are available mobile networks (using GSM, GPRS, 4G, LTE, or WiMAX for example) and satellite connections. New wireless networks such as the ultra-narrowband SIGFOX and the TV white-space NeulNET are also emerging to cater specifically for M2M connectivity. Fixed \"things\" in convenient locations could use wired Ethernet or phone lines for wide-area connections. Some modular sensor platforms, such as Libelium's WaspMote, can be configured with multiple local- and wide-area connectivity options (ZigBee, Wi-Fi, Bluetooth, GSM\/GPRS, RFID\/NFC, GPS, Ethernet). Along with the ability to connect many different kinds of sensors, this allows devices to be configured for a wide range of vertical markets.\n5. Server (on premises)\nSome types of M2M installation, such as a smart home or office, will use a local server to collect and analyse data \u2014 both in real time and incoherent \u2014 from assets on the local area network. These on-premise servers or simpler gateways will usually also connect to cloud-based storage and services.\n6. Local scanning device\n\"Things\" with short-range sensors will often be located in a exclusive area but not permanently connected to a local area network (RFID-tagged livestock on a farm, or credit-card-toting shoppers in a mall, for example). In this case, local scanning devices will be required to extract data and transmit it onward for processing.\n7. Storage and analytics\nIf you think today's internet creates a lot of data, IoT will be another matter entirely. It will require massive, scalable storage and processing capacity, which will almost invariably reside in the cloud, except for specific localised or security-sensitive cases. Service providers will obviously have access here, not only to curate the data and tweak the analytics, but also for line-of-business processes such as customer relations, billing, technical support, and so on.\n8. User-facing services\nSubsets of the data and analyses from the IoT will be available to users or subscribers, presented (hopefully) via easily attainable and navigable interfaces on a full spectrum of secure client devices. M2M and the Internet of Things has huge potential, but they currently comprise a heterogeneous collection of established and emerging, often competing, technologies and standards (although moves are afoot here). This is because the concept applies to, and has grown from, a wide range of market sectors.\nSystem monitoring \nIn systems engineering, a system monitor (SM) is a process within a distributed system for collecting and storing state data. This is a fundamental principle supporting application performance management.&#91;4&#93; M2M communication is used in system monitoring applications such as&#91;5&#93;:\n\nwater level measurement\nair quality measurement\nmonitoring of gas and pollutant levels in the air\nmonitoring system and component temperatures and pressures\nReal-world examples \nWater management systems, using M2M wireless technology devices, can monitor irrigation schedules in order to provide the right amount of water to farmland using weather data and water evaporation level. The installed device can record the run time cycles and other needed data to maintain the system and the irrigation schedule. The State of California regulates their water usage levels and irrigation schedules using M2M. The ability to monitor electrical power systems, waste-water treatment, and oil and gas production provides an effective system for maintaining and improving efficiency, thusly saving time, money, and resources while reducing maintenance costs. It also allows companies to make immediate decisions based on accurate, real-time data from near and far-flung portions of their infrastructure.\n\nM2M and the mobile environment \nM2M communications \u2014 or the broader category of the Internet of Things \u2014 is changing the way many industries go to market and operate. Pretty much everything these days is being connected.&#91;6&#93; There are many things that can be accomplished by upgrading communication methods, especially in relation to the mobile environment. Mobile network operators (MNOs) need to upgrade their system to become more reliable in every field for the future. \nFor instance in the realm of vehicles, the cars of the future are going to communicate with each other to reduce necessary human intervention, which can lead to fewer accidents and improved traffic. Vehicles can be controlled autonomously without the full need of a driver to do all the work. These always- or almost always-connected services include transmitting information between vehicles and traffic lights or bridges as well as applications to tell mass transit users when the next bus will arrive.&#91;7&#93; There are many advantages to implementing this technology such as helping people navigate through remote areas, reducing the time of people waiting for public transport, and avoiding traffic jams.\n\nM2M and its impact on the telecommunication industry \nM2M communication is something that involves a large number of intelligent machines that share information and make collaborative decisions without direct human intervention. This potentially leads to achieving improved cost efficiency. \nM2M offers the telecommunication industry a great opportunity as it needs a lot of communication systems via various technology families, such as IP, RFID, sensor networks, smart metering, etc. According to Galeti\u0107 et al., its communication principles are present in many different industry verticals.&#91;8&#93; Some of the most prominent M2M supported application areas are:\n\nSecurity \u2013 surveillance applications, alarms, object\/human tracking, etc.;\nTransportation \u2013 fleet management, emission control, toll payment, road safety, etc.; remarkably interwoven with Intelligent Transport Systems (ITS) concepts;\ne-Health \u2013 remote patient monitoring, Mobile Health, telecare;\nManufacturing \u2013 production chain monitoring and automation;\nUtilities \u2013 measurement, provisioning and billing of utilities such as oil, water, electricity, heat, etc.;\nIndustrial supply and provisioning \u2013 freight supply and distribution monitoring, vending machines, etc.; and\nFacility management \u2013 informatisation and automation of various home\/building\/campus-related resources management.\nAll of the above examples represent fields where associated equipment must be connected to telecommunication devices that can alert for out-of-range and dangerous scenarios. Members of the telecommunication industry such as Ericsson, Nokia, Siemens, and Motorola have taken the opportunity to seize on the idea and plan for the Internet of Things and the important concept of machine-to-machine interaction. \n\nConclusion \nThe internet isn't just for communicating with people; it is now also used to intelligently connect devices which must be able to communicate and interact with speeds, scales, and capabilities far beyond what people originally needed or used. The Internet of Things (IoT) is slowly making the world more agile and functional via M2M and other protocols.&#91;9&#93; M2M represents a developing field with its own concepts that include sensors, communications in local-area and wide-area, server on premises, local scanning devices, user-facing services, and storage and analytics. Additionally, the tech has developed into the mobile environment to further improve people and machine communication, including in monitoring systems that collect data and drive decisions. M2M is also having an impact on the telecommunication industry, helping change how we interact with our devices.\n\nReferences \n\n\n\u2191 \"Internet of Things\".&#32;Wikipedia.&#32;Wikimedia Foundation.&#32;http:\/\/en.wikipedia.org\/wiki\/Internet_of_Things .&#32;Retrieved 4 June 2016 . &#160; \n\n\u2191 Donovan, F.&#32;(23 July 2014).&#32;\"A brief history of the Internet of Things\".&#32;FierceMobileIT.&#32;Questex, LLC.&#32;http:\/\/www.fiercemobileit.com\/story\/brief-history-internet-things\/2014-07-23 .&#32;Retrieved 4 June 2016 . &#160; \n\n\u2191 McLellan, C.&#32;(10 January 2013).&#32;\"M2M and the Internet of Things: A guide\".&#32;ZDNet.&#32;CBS Interactive.&#32;http:\/\/www.zdnet.com\/article\/m2m-and-the-internet-of-things-a-guide\/ .&#32;Retrieved 4 June 2016 . &#160; \n\n\u2191 \"System monitor\".&#32;Wikipedia.&#32;Wikimedia Foundation.&#32;http:\/\/en.wikipedia.org\/wiki\/System_monitor .&#32;Retrieved 4 June 2016 . &#160; \n\n\u2191 Brisbourne, A.&#32;(April 2009).&#32;\"Machine-to-Machine Communications Monitor Environmental Impact\".&#32;RTC Magazine.&#32;RTC Group, Inc.&#32;http:\/\/rtcmagazine.com\/articles\/view\/101107 .&#32;Retrieved 4 June 2016 . &#160; \n\n\u2191 Krishna, S.; Kranz, M.&#32;(December 2013).&#32;\"The Internet of Things: How Machine-to-Machine (M2M) communication is changing the mobile environment\".&#32;Research: The Mobile Evolution.&#32;KPMG International.&#32;Archived&#32;from the original&#32;on 21 December 2013.&#32;https:\/\/web.archive.org\/web\/20131221004601\/http:\/\/www.kpmg.com\/Global\/en\/IssuesAndInsights\/ArticlesPublications\/mobile-evolution\/Pages\/internet-of-things.aspx .&#32;Retrieved 4 June 2016 . &#160; \n\n\u2191 Kuchinskas, S.&#32;(12 August 2011).&#32;\"Telematics and M2M: New business models\".&#32;TU Automotive.&#32;Penton.&#32;http:\/\/analysis.tu-auto.com\/infotainment\/telematics-and-m2m-new-business-models .&#32;Retrieved 4 June 2016 . &#160; \n\n\u2191 Galeti\u0107, V.; Boji\u0107, I.; Ku\u0161ek, M. et al.&#32;(2011).&#32;\"Basic principles of Machine-to-Machine communication and its impact on telecommunications industry\"&#32;(PDF).&#32;MIPRO, 2011 Proceedings of the 34th International Convention: 380\u2013385.&#32;ISBN&#160;9781457709968.&#32;http:\/\/agents.usluge.tel.fer.hr\/webfm_send\/115 .&#32;Retrieved 4 June 2016 . &#160; \n\n\u2191 Schneider, S.&#32;(9 October 2013).&#32;\"Understanding The Protocols Behind The Internet Of Things\".&#32;Electronic Design.&#32;Penton.&#32;http:\/\/electronicdesign.com\/iot\/understanding-protocols-behind-internet-things .&#32;Retrieved 4 June 2016 . &#160; \n\n\n\n\n\n<\/pre>\n\nNotes \nThis article is a direct transclusion of the Wikibooks article and therefore may not meet the same editing standards as LIMSwiki.\n\n\n\n\n\n\nSource: <a rel=\"external_link\" class=\"external\" href=\"https:\/\/www.limswiki.org\/index.php\/LII:I_Dream_of_IoT\/Chapter_6_:_IoT_and_Machine-to-Machine_(M2M)\">https:\/\/www.limswiki.org\/index.php\/LII:I_Dream_of_IoT\/Chapter_6_:_IoT_and_Machine-to-Machine_(M2M)<\/a>\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\n\t\t\n\t\t\n\t\t\tNavigation menu\n\t\t\t\t\t\n\t\t\tViews\n\n\t\t\t\n\t\t\t\t\n\t\t\t\tLII\n\t\t\t\tDiscussion\n\t\t\t\tView source\n\t\t\t\tHistory\n\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\n\t\t\t\t\n\t\t\t\tPersonal tools\n\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\tLog in\n\t\t\t\t\t\t\t\t\t\t\t\t\tRequest account\n\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\n\t\t\t\n\t\t\t\t\n\t\t\t\n\t\t\t\t\n\t\tNavigation\n\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\tMain page\n\t\t\t\t\t\t\t\t\t\t\tRecent changes\n\t\t\t\t\t\t\t\t\t\t\tRandom page\n\t\t\t\t\t\t\t\t\t\t\tHelp\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\n\t\t\t\n\t\t\tSearch\n\n\t\t\t\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t&#160;\n\t\t\t\t\t\t\n\t\t\t\t\n\n\t\t\t\t\t\t\t\n\t\t\n\t\t\t\n\t\t\tTools\n\n\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\tWhat links here\n\t\t\t\t\t\t\t\t\t\t\tRelated changes\n\t\t\t\t\t\t\t\t\t\t\tSpecial pages\n\t\t\t\t\t\t\t\t\t\t\tPermanent link\n\t\t\t\t\t\t\t\t\t\t\tPage information\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\n\t\t\n\t\tPrint\/export\n\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\tCreate a book\n\t\t\t\t\t\t\t\t\t\t\tDownload as PDF\n\t\t\t\t\t\t\t\t\t\t\tDownload as Plain text\n\t\t\t\t\t\t\t\t\t\t\tPrintable version\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\n\t\t\n\t\tSponsors\n\t\t\n\t\t\t \r\n\n\t\r\n\n\t\r\n\n\t\r\n\n\t\n\t\r\n\n \r\n\n\t\n\t\r\n\n \r\n\n\t\n\t\r\n\n\t\n\t\r\n\n\t\r\n\n\t\r\n\n\t\r\n\t\t\n\t\t\n\t\t\t\n\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t This page was last modified on 8 June 2016, at 20:28.\n\t\t\t\t\t\t\t\t\tThis page has been accessed 458 times.\n\t\t\t\t\t\t\t\t\tContent is available under a Creative Commons Attribution-ShareAlike 4.0 International License unless otherwise noted.\n\t\t\t\t\t\t\t\t\tPrivacy policy\n\t\t\t\t\t\t\t\t\tAbout LIMSWiki\n\t\t\t\t\t\t\t\t\tDisclaimers\n\t\t\t\t\t\t\t\n\t\t\n\t\t\n\t\t\n\n","069e3581b80f30da72bb6af94e173a47_html":"<body class=\"mediawiki ltr sitedir-ltr ns-202 ns-subject page-LII_I_Dream_of_IoT_Chapter_6_IoT_and_Machine-to-Machine_M2M skin-monobook action-view\">\n<div id=\"rdp-ebb-globalWrapper\">\n\t\t<div id=\"rdp-ebb-column-content\">\n\t\t\t<div id=\"rdp-ebb-content\" class=\"mw-body\" role=\"main\">\n\t\t\t\t<a id=\"rdp-ebb-top\"><\/a>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t<h1 id=\"rdp-ebb-firstHeading\" class=\"firstHeading\" lang=\"en\">LII:I Dream of IoT\/Chapter 6 : IoT and Machine-to-Machine (M2M)<\/h1>\n\t\t\t\t\n\t\t\t\t<div id=\"rdp-ebb-bodyContent\" class=\"mw-body-content\">\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\n\n\t\t\t\t\t<!-- start content -->\n\t\t\t\t\t<div id=\"rdp-ebb-mw-content-text\" lang=\"en\" dir=\"ltr\" class=\"mw-content-ltr\"><div class=\"mw-parser-output\">\n<h2><span class=\"mw-headline\" id=\"Introduction_to_machine-to-machine_communication\">Introduction to machine-to-machine communication<\/span><\/h2>\n<p>The Internet of Things (IoT) is the interconnection of uniquely identified stand-alone and embedded computing devices within the existing internet infrastructure. Usually, IoT is expected to offer advanced connectivity of devices, systems, and services that goes beyond machine-to-machine (M2M) communications and covers a variety of protocols, domains, and applications.<sup id=\"rdp-ebb-cite_ref-WP_IoT_1-0\" class=\"reference\"><a href=\"#cite_note-WP_IoT-1\" rel=\"external_link\">&#91;1&#93;<\/a><\/sup>\n<\/p><p>The M2M communication of the IoT is a very useful and effective aspect of the system. For example, IoT at the workplace \u2014 particularly in the factory \u2014 has already taken over the mundane tasks of monitoring industrial processes, managing fleets of vehicles and assets, and securing the facility. Additionally, it's also used in our own homes to control home security, adjust energy consumption, etc. In the future, our home will likely be called the smart home because of all the components that will use the technology.<sup id=\"rdp-ebb-cite_ref-DonovanABrief14_2-0\" class=\"reference\"><a href=\"#cite_note-DonovanABrief14-2\" rel=\"external_link\">&#91;2&#93;<\/a><\/sup> \n<\/p><p>M2M refers to technologies that allow both wireless and wired systems to communicate with other devices. The history of M2M has existed in different forms since the advent of computer networking automation and predates cellular communication. The expansion of IP networks across the world has made it far easier for M2M communication to take place and has lessened the amount of power and time necessary for information to be communicated between machines. These networks also allow an array of new business opportunities and connections between consumers and producers in terms of the products being sold. Originally M2M was used for automation and instrumentation, but more recently it has also been used in telecommunications applications.\n<\/p>\