Wireless Sensor Networks

Total Page:16

File Type:pdf, Size:1020Kb

Wireless Sensor Networks WIRELESS SENSOR NETWORKS PRESENTED BY VIVEK KRISHNA KANNAN SIDDARTH RAM MOHAN ARUN OUTLINE • Wireless sensor networks • The Internet of Things and the role of WSN • TinyOS • Programming with Tinyos WIRELESS SENSOR NETWORKS • Comprises of spatially connected autonomous sensors • Typically used to measure temperature, pressure etc • Usually bi-directional allowing for control of sensor activity WIRELESS SENSOR NETWORKS MOTES/NODES • Sensors + supporting elements = Mote/Node • So, apart from the sensor, each mote typically consists of : • Radio transceiver with an internal antenna • A microcontroller • An interfacing element between the microcontroller and sensor • An energy source ( Battery or an energy harvesting element) GATEWAY • GATEWAY acts as a bridge between the WSN and other networks. This enables data to be stored and processed by devices with more resources, for example, in a remotely located server. RADIO TECHNOLOGIES AVAILABLE • Long range: 3G / GPRS • Medium range: ZigBee / 802.15.4 / WiFi • Short range: RFID / NFC / Bluetooth 4.0 ROUTING PROTOCOLS : CHALLENGES • No global IP addressing • This is due to the relatively large number of sensor nodes • Consequently overhead of ID maintenance is high • Thus IP based protocols don’t work ROUTING PROTOCOLS • The search for an ideal universal routing protocol for WSN’s is an ongoing process • A Technique is to have protocols based on the network structure • Common protocols for WSN: flat based and location based network structures ROUTING PROTOCOL : FLAT BASED NETWORK STRUCTURE • Here all the nodes are treated equally and have the same functionality • SPIN (Sensor Protocol for Information Negotiation) routing protocol can be used • Sends meta data to neighboring nodes instead of actual data • Thus the gateway can request for the desired data • Avoids redundant data transmission, saves energy and thus extends network lifetime ROUTING PROTOCOL : LOCATION BASED NETWORK STRUCTURE • Sensor nodes are addressed based on their location • Location is acquired either by GPS or by relative position wrt other nodes • Geographical Adaptive Fidelity (GAF) routing protocol can be used • Network is divided into zones • Only one node is awake in each zone • Conserves energy, thus increasing network lifetime REQUIREMENTS FOR A WSN DEPLOYMENT • QOS • Fault tolerance • Lifetime • Scalability • Density of nodes • Programmability SENSOR DEPLOYMENT OPTIONS • Random deployment: May be dropped from an aircraft. • Regular deployment: Well-planned sensors at fixed locations. • Mobile sensor nodes: Sensor nodes may move around. 1926: Nikola Tesla in an interview with Colliers magazine: "When wireless is perfectly applied the whole earth will be converted into a huge brain, which in fact it is, all things being particles of a real and rhythmic whole.........and the instruments through which we shall be able to do this will be amazingly simple compared with our present telephone. A man will be able to carry one in his vest pocket." THE INTERNET OF THINGS What is it? The Internet of Things (IoT) is the network of physical objects or "things" embedded with sensors and actuators that are connected to the internet. HISTORY • 1999: The term was first used by Kevin Ashton who cofounded the Auto-ID Center at the Massachusetts Institute of Technology (MIT). • 2008: A group of companies launched the IPSO Alliance which now boasts over 50 member companies, including Bosch, Cisco, Ericsson, Intel, SAP, Sun, Google and Fujitsu. • 2008-2009: The Internet of Things was "Born“. • 2011: IPV6 public launch - The new protocol allows for 2128 addresses. TRAFFIC MONITORING SENSORS CONNECTED TO THE INTERNET VOLCANO MONITORING PROJECT SENSING MODULE USED HOW I0T WORKS HOW WIRELESS SENSOR NETWORKS FEATURE IN THE INTERNET OF THINGS CHALLENGES IN WIRELESS SENSOR NETWORKS • Limited processing power • Limited program memory • Power consumption • Flexibility • Concurrency WHAT IS TINYOS? It is a free and open-source operating system designed for low- power wireless devices, such wireless sensor networks. Main goals: energy conservation optimal usage of limited resources HISTORY • TinyOS began as part of a project for the DARPA NEST (Network Embedded Systems Technology) program. • Born out of a collaboration between UCB, Intel and Crossbow technology. • Initial release was in 2000. • Currently maintained by the international working group, the TinyOS Alliance. • Last version was released on August 2012. WHAT TINYOS PROVIDES • Supports a wide range of sensor mote hardware platforms. • Compact (less than 400 bytes of program memory). • Supports concurrency using a split-phase execution model. • Handles power consumption and radio networking. • Intended to be incorporated into ‘smartdust’. SMART DUST • Revolutionary implementation of WSNs capitalising on advances in the IC fabrication processes. • Smart dust aims to populate the very air around us with motes, hence the name. SMART DUST • Implemented using MEMS (Micro Electro Mechanical Systems) technology. • MEMS allows us to encapsulate a battery, a nominal amount of RAM and a wireless transmitter onto dust sized particles. SMART DUST APPLICATIONS • Important to remember that smart dust is WSN’s at the micrometer range. • Thus applications which use WSN’s with conventional sized motes are suited to be replaced with Smart Dust. • Health care, forest fire detection, water quality monitoring, etc., • After all reduction in size has never been a problem. SMART DUST APPLICATIONS • Because of its uniquely smaller motes, smart dust can enter into hitherto unexplored applications. • Battlefield surveillance, with almost 0% chance of detection. • Virtual keyboards by affixing smart dust onto finger tips. • Fault detection in mechanical machinery. TINYOS AND SMART DUST • TinyOS runs code in very short snippets to perform a singular function as opposed to running long strings to perform more complex actions. • This makes it very good for the purpose of a Smart Dust mote’s capabilities of gathering and passing along data in high-frequency bursts but not powering an object like the base station that collects that data. NESC • Network embedded systems C • Sub dialect of C language, written specifically for TinyOS • Optimized for the limitations of sensor networks • Based on components "wired" together by interfaces to run applications on TinyOS PROGRAMMING MODEL Components: They offer three types of elements: • Command: Request for a component to do something • Event: Signals the completion of a command • Tasks: Functions that can be scheduled PROGRAMMING MODEL Interfaces can be provided or used by components PROGRAMMING MODEL Competitors: • Contiki • Nano-RK • LiteOS • Mantis Who uses TinyOS? R&D labs, startup companies, and commercial users such as Motorola, Intel, Arch Rock, Crossbow, and the People Power Company. TinyOS averages 35,000 downloads a year. For more information, visit www.tinyos.net .
Recommended publications
  • Towards a Smart City Based on Cloud of Things Riccardo Petrolo, Valeria Loscrì, Nathalie Mitton
    Towards a Smart City based on Cloud of Things Riccardo Petrolo, Valeria Loscrì, Nathalie Mitton To cite this version: Riccardo Petrolo, Valeria Loscrì, Nathalie Mitton. Towards a Smart City based on Cloud of Things. Proceedings of WiMobCity - International ACM MobiHoc Workshop on Wireless and Mobile Tech- nologies for Smart Cities, Aug 2014, Philadelphia, United States. hal-01004489v2 HAL Id: hal-01004489 https://hal.inria.fr/hal-01004489v2 Submitted on 18 Aug 2014 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Towards a Smart City based on Cloud of Things Riccardo Petrolo, Valeria Loscrì, Nathalie Mitton fi[email protected] - Inria Lille-Nord Europe, France ABSTRACT volved in the Cloud and solutions for the convergence and Smart City represents one of the most promising and promi- evolution of IoT and cloud computing infrastructures exist. nent Internet of Things (IoT) applications. In the last few Nevertheless, there are still some challenges to face such as: years, smart city concept has played an important role in 1) the interoperability among different ICT systems; 2) a academic and industry fields, with the development and de- huge amount of data to be processed provided in real-time ployment of various middleware platforms.
    [Show full text]
  • Network Traffic Characteristics of the Iot Application Use Cases
    Network Traffic Characteristics of the IoT Application Use Cases Jozef Mocnej Adrian Pekar Winston K.G. Seah Iveta Zolotova Technical University Victoria University of Wellington Technical University of Kosice, Slovakia New Zealand of Kosice, Slovakia Email: [email protected] Email: adrian.pelar,winston.seah @ecs.vuw.ac.nz Email: [email protected] { } Abstract—The Internet of Things (IoT) is a highly discussed many cases, however, this benefit means the communication paradigm aimed at the connection of everyday objects to the of low power devices over lossy networks, which creates high Internet. The idea of enabling objects to communicate with demands on the used technologies. Consequently, we need to each other brings significant benefits, yet there are several challenges that have to be also addressed. In recent years, understand the requirements of IoT application use cases in researchers have developed many solutions to resolve IoT issues order to create more efficient IoT solutions. and enhance the overall evolution. New technologies have been The aim of this paper is to contribute to the highly discussed proposed and existing approaches redefined to meet the specific topic of IoT by looking at IoT application use cases and requirements of IoT. However, the complexity and diversity of describe them from a traffic characteristics perspective. Our the area make the process quite difficult. This paper describes the IoT paradigm and provides an overview of efforts expended objective is to identify as accurately as possible the demands to date. It discusses topics such as IoT definitions, categorisation on networks defined by IoT application scenarios, which of IoT application areas and the greatest IoT challenges.
    [Show full text]
  • Field Area Network
    IEEE IoT Vertical & Topical Summit for Agriculture Patrick Wetterwald, CTAO IOT Standards and Architecture ETSI IP6 Vice Chairman, IEC SEG8 Chair, IPSO Alliance Past President [email protected] May 21st , 2017 What Is the Internet of Things? “The Internet of Things is the intelligent connectivity of physical devices driving massive gains in efficiency, business growth, and quality of life.” © 2013-2014 Cisco and/or its affiliates. All rights reserved. 2 IoT Is Here Now – and Growing! 50 50 Billion 40 “Smart Objects” Rapid Adoption 30 Rate of Digital Infrastructure: 5X Faster Than 20 25 Electricity and InflectionThe New Essential InfrastructureTelephony Point BILLIONS OF DEVICES 12.5 10 World Population 6.8 7.2 7.6 0 TIMELINE 2010 2015 2020 Source: Cisco IBSG, 2011 © 2013-2014 Cisco and/or its affiliates. All rights reserved. 3 Smart Agriculture © 2013-2014 Cisco and/or its affiliates. All rights reserved. 4 IoT Transforms Data into Wisdom More Important Wisdom (Scenario Planning) Knowledge Information 01010100101010101010101010101 Data 01010101010001010100101010101 01110101010101010101 Less Important © 2013Big-2014 Cisco Data and/or its affiliates. becomes All rights reserved. Open Data for Customers, Consumers to Use 5 But It Also Adds Complexity NewAPPLICATION Business Models AND BUSINESSPartner INNOVATION Ecosystem Cloud-based Threat Analysis / Protection Data Control Application Big Data Analytics Integration Applications Systems Integration Network and Perimeter Application Interfaces Security Services IoT CONNECTIVITYUnified Platform
    [Show full text]
  • Demystifying Internet of Things Security Successful Iot Device/Edge and Platform Security Deployment — Sunil Cheruvu Anil Kumar Ned Smith David M
    Demystifying Internet of Things Security Successful IoT Device/Edge and Platform Security Deployment — Sunil Cheruvu Anil Kumar Ned Smith David M. Wheeler Demystifying Internet of Things Security Successful IoT Device/Edge and Platform Security Deployment Sunil Cheruvu Anil Kumar Ned Smith David M. Wheeler Demystifying Internet of Things Security: Successful IoT Device/Edge and Platform Security Deployment Sunil Cheruvu Anil Kumar Chandler, AZ, USA Chandler, AZ, USA Ned Smith David M. Wheeler Beaverton, OR, USA Gilbert, AZ, USA ISBN-13 (pbk): 978-1-4842-2895-1 ISBN-13 (electronic): 978-1-4842-2896-8 https://doi.org/10.1007/978-1-4842-2896-8 Copyright © 2020 by The Editor(s) (if applicable) and The Author(s) This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. Open Access This book is licensed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made. The images or other third party material in this book are included in the book’s Creative Commons license, unless indicated otherwise in a credit line to the material.
    [Show full text]
  • Water -M Project
    Water -M Project D1.3 IT State of the Art v2.2 History Date Version & Status Author Modifications 02/09/2015 v0.1 Kamal Singh (UJM) A Draft with state of the art on ICT 28/10/2015 V1.0 Berhane A draft with state of the art on ICT. Gebremedhin Merged the 2 drafts into a new one. (University of Oulu) Compiled the references 14/04/2016 V2.0 Kamal Singh (UJM), Added 2.4 OneM2M standard, added 2.5 Abderrahmen SoA on Data management analytics and Kammoun (City of 2.6 about IoT platforms and SOFIA2. Saint Etienne / UJM), Francois-Elie Calvier (UJM) 15/04/2016 V2.1 Francois-Elie Calvier Updated References (UJM) 08/05/2016 V2.2 Berhane Berhane did some modifications Gebremedhin (University of Oulu) Contents 1 Introduction ............................................................................................................................................... 4 1.1 Business Drivers ................................................................................................................................ 4 1.2 Required Technologies ...................................................................................................................... 4 1.3 Challenges ......................................................................................................................................... 4 1.4 Opportunities ..................................................................................................................................... 5 2 ICT technologies for Water management .................................................................................................
    [Show full text]
  • Standards for Constrained Iot Devices
    IoT Device Standards [email protected] – IoT Strategy 1 © 2014 ARM IoT is not a new idea THINGS around us become smart and connected . This is not a new idea .. it’s been going on for >20 years1 . 2010: Connected things > world population (6.8B) 1 Weiser, Mark (1991) “the Computer for the 21st Century” Ubiquitous computing: "The most profound technologies are those that disappear. They weave themselves into the fabric of everyday life until they are indistinguishable from it.” 2 © 2014 ARM Motorola pager watch – 17 years ago 3 © 2014 ARM Accelerating IoT Reach SILOS of Things Today Situation: • Application-specific connected devices • Closed supply chains, proprietary interconnects • Very limited plug-and-play Time 4 © 2014 ARM Accelerating IoT INTERNET of Things Analysts predictions for connected devices (2020): 30 billion? 50 billion? 75 billion? Current trends show strong growth Reach but analysts are more optimistic: SILOS of Things Today 17% .. 31% CAGR, 2012-2020 8.7B in 2012 (Cisco) http://newsroom.cisco.com/feature-content?articleId=1208342 Time 5 © 2014 ARM Accelerating IoT INTERNET of Things What will drive demand for many tens of billions more devices? Better IoT Platforms … that can “weave themselves into the fabric of everyday life” • Integrated wireless • Right-size processors, memory • Low cost, low power Applications • Secure, trustworthy • Easy software development Reach • Easy integration into “things” SILOS of Things Today Standards Internet-scale IoT ecosystems Bust the silos Devices • Standards-based connectivity • Standards-based provisioning • Open markets for devices, apps • End-to-end security Time 6 © 2014 ARM IoT SoC platform evolution . Wireless On-chip radios Optimized for IoT bandwidth, power .
    [Show full text]
  • W3c-Web-Of-Things-Intro.Pdf
    Web of Things Countering Fragmentation to unlock the potential of the IoT Dave Raggett <[email protected]> W3C Staff Champion for the Web of Things Internet of Things (IoT) • “IoT” coined by Kevin Ashton in 1999 • Generally used for sensors and actuators that are connected in some way to the Internet • Sensing and controlling physical things in conjunction with other data • Enabling collection of vast amounts of data 2 IoT Applications Smart Homes Wearables Healthcare Power & Environment Smart Cities Manufacturing 3 And many many more application areas Some IoT Benefits – Predictive maintenance, e.g. for railway networks, power stations, manufacturers, etc. • Reduced down time, enabling massive savings • Reduced maintenance costs compared to fixed schedule • Also valuable for consumers, e.g. cars, washing machines, etc. – Analytics for cost savings and enhanced customer experience • Design improvements based upon statistics of use – Better asset utilization for manufacturing lines • Purchasing and investment tied to accurate data measurements • Switching from mass production to mass customization – Assistive living for people with physical or cognitive impairments 4 Data = Improvements in Wellbeing • As people live longer, IoT sensors can help to improve their quality of live, and reduce costs of healthcare, freeing money for other purposes • Anonymous datamining of healthcare records can improve effectiveness of medication and enable the development of new treatments 5 Data = Money • Good quality data can be monetized – Everyone carries location
    [Show full text]
  • The Web of Things, Nov'15
    The Web of Things Dave Raggett <[email protected]> Presentation to OIC Thursday, 5 Nov 2015 1/59 IoT still at the top of the hype cycle* *From Gartner's hype cycle for emerging technologies – August 2014 2/59 IoT – over-hyped and fragmented ● The IoT is still very immature, but has huge potential ● There is currently a lot of fragmentation, which – drives up development costs – increases the risk for investors – reduces the market size for solutions ● There are many Industry Alliances and SDO's – W3C is seeking to establish collaboration agreements and work together to realise the potential and unlock the network effect 3/59 The World Wide Web Consortium ● W3C is a member funded international organisation focusing on developing standards for Web & semantic technologies – e.g. HTML, scripting APIs, the Semantic Web and Linked Data ● We are addressing the fragmentation for the IoT with an abstraction layer that spans devices, platforms and application domains ● A focus on simplifying application development by decoupling services from the underlying protocols 4/59 Interoperability implies . ● Exchange of meaningful, actionable information between two or more systems across organizational boundaries ● A shared understanding of the exchanged information ● An agreed expectation for the response to the information exchange A requisite quality of service: reliability, fidelity, and security. ● From: GridWise Architecture Council, March 2008 “Interoperability Context-Setting Framework” – See: http://www.gridwiseac.org/pdfs/ 5/59 Interoperability Framework
    [Show full text]
  • Future-Proofing the Connected World: 13 Steps to Developing Secure Iot Products
    Future-proofing the Connected World: 13 Steps to Developing Secure IoT Products Presented by the IoT Working Group Table of Contents Forward Introduction Document Scope The Need for IoT Security IoT Products Can Compromise Privacy IoT products can lend their computing power to launch DDoS Attacks Medical Devices and Medical Standard Protocols are Vulnerable to Attack Drones Are Approaching Mainstream Status and Being Used as a Platform for Reconnaissance Critical national infrastructure can rely on the IoT ecosystem Cars are becoming connected and autonomous Moving Forward Why Development Organizations Should Care About Securing IoT Products IoT Device Security Challenges IoT products may be deployed in insecure or physically exposed environments Security is new to many manufacturers and there is limited security planning in development methodologies Security is not a business driver and there is limited security sponsorship and management support in development of IoT products There is a lack of defined standards and reference architecture for secure IoT development There are difficulties recruiting and retaining requisite skills for IoT development teams including architects, secure software engineers, hardware security engineers, and security testing staff The low price point increases the potential adversary pool Resource constraints in embedded systems limit security options IoT Security Survey Guidance for Secure IoT Development 1. Start with a Secure Development Methodology Security Requirements Security Processes Perform Safety Impact Assessment Perform Threat Modeling 2. Implement a Secure Development and Integration Environment Evaluate Programming Languages OWASP Python Security Project Link Integrated Development Environments Continuous Integration Plugins Testing and Code Quality Processes 3. Identify Framework and Platform Security Features Selecting an Integration Framework Evaluate Platform Security Features 4.
    [Show full text]
  • Enabling the Internet of Things for Australia Measure, Analyse, Connect, Act
    COMMUNICATIONS ALLIANCE LTD Enabling the Internet of Things for Australia Measure, Analyse, Connect, Act Written by Geof Heydon and Frank Zeichner October 2015 Communications Alliance Internet of Things Think Tank An Industry Report commissioned by the Communications Alliance Internet of Things Think Tank Executive Council First published: October 2015 The Communications Alliance Internet of Things Think Tank was formed in May 2015. The Think Tank’s vision is to be a leading ICT industry initiative under a broad industry framework shaping the regulatory framework to harness for Australian industry the opportunities generated by the internet of Things. The Think Tank aims to define the IoT eco-system, inform and enable Australian companies to exploit the business opportunities afforded by IoT technology and services. Disclaimers 1) Notwithstanding anything contained in this Industry Report, Communications Alliance disclaims responsibility (including where Communications Alliance or any of its officers, employees, agents or contractors has been negligent) for any direct or indirect loss, damage, claim, or liability any person may incur as a result. 2) The above disclaimers will not apply to the extent they are inconsistent with any relevant legislation. Copyright © Communications Alliance Ltd 2015 This document is copyright and must not be used except as permitted below or under the Copyright Act 1968. You may reproduce and publish this document in whole or in part for your or your organisation’s own personal or internal compliance, educational or non-commercial purposes. You must not alter or amend this document in any way. You must not reproduce or publish this document for commercial gain without the prior written consent of Communications Alliance.
    [Show full text]
  • Connecting Physical Things to a Smartcity-OS Riccardo Petrolo, Aikaterini Roukounaki, Valeria Loscrì, Nathalie Mitton, John Soldatos
    Connecting physical things to a SmartCity-OS Riccardo Petrolo, Aikaterini Roukounaki, Valeria Loscrì, Nathalie Mitton, John Soldatos To cite this version: Riccardo Petrolo, Aikaterini Roukounaki, Valeria Loscrì, Nathalie Mitton, John Soldatos. Connecting physical things to a SmartCity-OS. Proceedings of CoWPER - International IEEE SECON Workshop on Toward a city-wide pervasive environment, Jun 2016, London, United Kingdom. hal-01309638 HAL Id: hal-01309638 https://hal.inria.fr/hal-01309638 Submitted on 28 Jun 2016 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Connecting physical things to a SmartCity-OS Riccardo Petrolo∗, Aikaterini Roukounakiy, Valeria Loscr´ı∗, Nathalie Mitton∗, and John Soldatosy ∗Inria Lille - Nord Europe, France. e-mail: [email protected] yAthens Information Technology, Greece. e-mail: [email protected], [email protected] Abstract—A Smart City can be seen as a system in which Smart Cities, thereby turning VITAL into an operating system different Internet of Things (IoT) solutions coexist and cooperate. that can monitor, visualize, and control all the operations of a According with this vision, the number of IoT deployments is, city [5]. nowadays, in continuous expansion and it involves disparate scenarios, from street lighting, waste management, etc.
    [Show full text]
  • Advancing the Industrial Internet of Things
    Advancing the Industrial Internet of Things An Industrial Internet Consortium and oneM2M™ Joint Whitepaper Authors Amar Deol (Huawei), Ken Figueredo (InterDigital Inc.), Shi-Wan Lin (Yo-i), Brett Murphy (RTI), Dale Seed (Convida Wireless), Jason Yin (Huawei) Editors Shi-Wan Lin (Yo-i) and Ken Figueredo (InterDigital Inc.) Contributors1 Josef Blanz (Qualcomm), Omar Elloumi (Nokia), Rajive Joshi (RTI), Peter Klement (XMPro), Sam Bhattarai (Toshiba), Atte Lansisalmi (Nokia) and Chuck Byers (IIC) 2019-12-12 1 Individuals who have provided valuable comments and inputs that have substantially improved the quality of this whitepaper. - i - 1 Context for Collaboration .................................................................................................. 1 2 Organizational Overviews ................................................................................................. 2 2.1 Overview of the IIC .............................................................................................................. 2 2.2 Overview of oneM2MTM....................................................................................................... 3 3 Alignment Between IIRA and oneM2M Architecture Frameworks ...................................... 6 3.1 IIC’s IIRA .............................................................................................................................. 7 3.2 oneM2M Architecture and Common Services Layer .............................................................. 9 3.2.1 Common Service Layer Functions
    [Show full text]