D2.1 Requirements Specification and State of the Art V1.2

Total Page:16

File Type:pdf, Size:1020Kb

D2.1 Requirements Specification and State of the Art V1.2 Do-it-Yourself Smart Experiences ITEA 2 project 08005 Requirements specification and state-of-the-art D2.1 Editor: Universidad Politécnica de Madrid, Spain Contributors: Vicente Hernández Díaz, UPM Mario Lopez-Ramos, Thales Guillermo Miranda Álamo, I&IMS Diego Cansado Mansilla, UAH María Ángeles Sanguino González, ATOS Origin Yacine Gharmi-Doudane, ENSIIE Claudio Forliviesi, ALU Marisa Escalante, ESI Security: Public Version: 1.2 Date: December 22, 2009 Number of pages: 81 D2.1 Requirements specification & state of the art V1.2 History Version Date Person, Partner Comment 0.1 07.10.2009 Vicente Hernandez, UPM TOC for WSN. 0.2 12.11.2009 Mario Lopez-Ramos, Thales Global TOC, first iteration. 0.3 13.11.2009 Marisa Escalante, ESI TOC Modification 0.4 13.11.2009 Miguel S. Familiar, UPM TOC Modification and Abstract 0.5 16.11.2009 Diego Casado Mansilla, UAH TOC Modification and UAH contributions 0.6 26.11.2009 Yacine Gharmi-Doudane, ENSIIE TOC Modification 1.0 22.12.2009 Vicente Hernández, UPM 1st Draft for reviewing 1.1 24.04.2010 Vicente Hernández, UPM 2nd Draft for reviewing 1.2 03.06.2010 Mario Lopez-Ramos, Thales Formatting updates Abstract This is the SoA of devices and actuators technologies, capabilities, drawbacks, innovative approaches and challenges that are closely related to DiYSE. Smart environment systems, for achieving its goals, must gather information about objects surroundings by means of sensors and must also be able to make such surroundings evolve to the desired conditions by means of actuators. This document shows present sensors and actuators technologies capabilities related to DiYSE as well as the challenges and requirement specification that DiYSE must meet. © DiYSE Consortium 2/81 D2.1 Requirements specification & state of the art V1.2 TABLE OF CONTENTS 1 INTRODUCTION................................................................................................. 6 1.1 Scope of this document and link with other deliverables .......................... 6 1.2 Objectives of work package 2 within the DiYSE project ............................ 7 1.3 Objectives and structure of this document ................................................. 7 2 DIYSE DEVICES AND USAGES ........................................................................ 8 2.1 Inventory of existing classes of devices ..................................................... 8 2.2 Types of device usages and interactions .................................................... 9 2.2.1 Data acquisition ........................................................................................ 9 2.2.2 Actuation................................................................................................... 9 2.2.3 Localization..............................................................................................10 2.2.4 Identification ............................................................................................10 2.3 References ....................................................................................................10 3 INTEGRATING DEVICES IN THE DIYSE PLATFORM.....................................12 3.1 Device connectivity ......................................................................................12 3.1.1 Wireless Sensor Networks Communication Standards............................13 3.1.2 Comparison of Communication Standards ..............................................18 3.1.3 Wireless Sensor Networks.......................................................................19 3.2 Device identification and addressing..........................................................23 3.2.1 IP Networking ..........................................................................................23 3.2.2 Non IP Networks......................................................................................24 3.3 Device discovery, presence and lifecycle ..................................................24 3.4 Device description and modeling................................................................25 3.5 Device data acquisition and control............................................................30 3.5.1 Device-specific networking ......................................................................30 3.5.2 IP-based data acquisition and device control ..........................................31 3.6 Device authentication and authorization ....................................................31 3.6.1 Authentication and authorization in a IP network.....................................31 3.6.2 Non-IP networks and security..................................................................32 3.7 Device interoperability .................................................................................32 3.8 References ....................................................................................................34 4 PROCESSING DATA FROM DEVICES ............................................................38 © DiYSE Consortium 3/81 4.1 Virtual sensors..............................................................................................38 4.2 In-door localization .......................................................................................39 4.2.1 Estimation Distance Techniques..............................................................40 4.3 Identification .................................................................................................45 4.3.1 RFID Systems..........................................................................................46 4.3.2 WLAN ......................................................................................................46 4.3.3 Bluetooth .................................................................................................46 4.3.4 Zigbee......................................................................................................46 4.3.5 Artificial Vision .........................................................................................46 4.4 Information Exposition to Application Layer .............................................46 4.5 References ....................................................................................................48 5 WIRELESS SENSOR AND ACTUATOR NETWORKS FOR DIYSE.................53 5.1 Middleware for wireless sensor networks (UPM).......................................53 5.1.1 Distributed Systems and Middleware.......................................................53 5.1.2 Middleware approaches for Sensor Networks .........................................53 5.1.3 Context-Aware Middleware Approaches..................................................55 5.2 In-network reasoning and data fusion ........................................................56 5.3 Services Management in Wireless Sensor Networks (UPM).....................57 5.3.1 Service Provisioning in Sensor Networks ................................................58 5.3.2 Execution Environments ..........................................................................59 5.4 Wireless Sensor Networks Management ....................................................60 5.4.1 Management protocols ............................................................................61 5.4.2 Management frameworks ........................................................................61 5.5 Multimedia Wireless Sensor Networks (ENSIIE) ........................................62 5.6 Event-Centric Wireless Sensor Networks...................................................63 5.7 Security in Wireless Sensor Networks........................................................63 5.7.1 Vulnerabilities and Security Requirements in WSN .................................63 5.7.2 Security approaches ................................................................................64 5.7.3 Security Services Infrastructure...............................................................66 5.8 References ....................................................................................................67 6 DO-IT-YOURSELF DEVICES ............................................................................74 6.1 Existing hardware platforms........................................................................74 6.1.1 Phidgets kits ............................................................................................74 6.1.2 Arduino microcontroller kits .....................................................................74 6.1.3 Embedded GNU/Linux-based devices.....................................................76 6.2 Challenges for the ease of integration........................................................77 6.2.1 IP devices ................................................................................................77 6.2.2 Computer peripherals ..............................................................................78 6.2.3 Networked non-IP devices.......................................................................79 6.3 References ....................................................................................................80 1 Introduction 1.1 Scope of this document and link with other deliverables The DiYSE project has three State of the Art (SOTA) documents covering the different tools, techniques, methods and environments that may be used to provide a DiYSE platform. These documents present the same pool of elements from different points of view. Due to this SOTA partition, it will be needed to link some of the sections from one of
Recommended publications
  • Afcai Systems: a Ective Computing with Context Awareness For
    AfCAI systems: Aective Computing with Context Awareness for Ambient Intelligence. Research proposal. Grzegorz J. Nalepa, Krzysztof Kutt, Szymon Bobek, and Mateusz Z. ¦picki AGH University of Science and Technology Al. Mickiewicza 30, 30-059 Krakow, Poland {gjn,kkutt,sbobek,mzl}@agh.edu.pl Keywords: context-aware systems, emotions, mobile devices. 1 Introduction Context-aware systems gained huge popularity over the last decade. Rapid evo- lution of personal mobile devices such as smartphones, tablets, smartwatches and other types of wearables forced researchers and developers to work on ecient methods for modelling, and processing contextual information. The most recent research in the area of mobile context-aware systems identies four challenges that should be met by the every context-aware system. These are [1]: intelligi- bility, eciency, privacy and robustness. Assuring these requirements is a major challenge for systems that operate in dynamic environment, where contextual information is constantly delivered in a streaming manner. To address the four challenges, in our previous work we proposed a human-readable rule-language that is capable of modeling and processing uncertain knowledge with an ecient rule-engine under the soft real-time constraints. Moreover, knowledge discovery methods from uncertain streaming data were proposed [1]. Context in context-aware systems can be described as any information that can be used to characterize the situation of an entity [4]. Such a broad denition allows us to consider a variety of factors as the context: (a) physical, collected using a device's sensors, e.g. ambient light luminance and user location, (b) environmental, obtained via software services, e.g.
    [Show full text]
  • Voice Controlled Home Automation Akshay Mewada, Ayush Mishra, Manoj Gupta, Rahul Dash, Prof
    Volume 6, Issue 3, March 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Special Issue on 3rd International Conference on Electronics & Computing Technologies-2016 Conference Held at K.C. College of Engineering & Management Studies & Research, Maharashtra, India Voice Controlled Home Automation Akshay Mewada, Ayush Mishra, Manoj Gupta, Rahul Dash, Prof. Nilofer Mulla BE EXTC, Department of Electronics and Telecommunication Engineering, K.C. College of Engineering & Management Studies & Research, Kopri, Thane (E), Maharashtra, India Abstract— Voice Controlled Home Automation is a very useful project for the adults and physically disabled persons, who are not able to do various activities efficiently when they are at home and need one’s assistant to perform those tasks. With the Voice Recognition the complication of wiring in case of wired automation is prevented. With the use of Bluetooth Home Automation considerable amount of power saving is possible and it is flexible and compatible with future technologies so it can be easily customized for individual requirements. Voice recognition system provides secure access to home. In the recent years, the Home Automation systems have seen rapid changes due to introduction of various wireless technologies. Home Automation industry is growing rapidly, this is fuelled by the need to provide supporting systems that are made to ease our life. Automation systems is supposed to be implemented in existing home environments, without any changes in the infrastructure. The automation is based on recognition of voice commands and uses Bluetooth modules along with microcontroller. This paper presents the overall design of ‘Voice Controlled Home Automation’, which we are currently developing.
    [Show full text]
  • Design and Implementation of Internet of Things for Home Environment
    Copyright is owned by the Author of the thesis. Permission is given for a copy to be downloaded by an individual for the purpose of research and private study only. The thesis may not be reproduced elsewhere without the permission of the Author. Design and Implementation of Internet of Things for Home Environment A thesis presented in partial fulfilment of the requirements for the degree of Master of Engineering in Electronics and Computer Systems Engineering at Massey University, Manawatu, New Zealand. Sean Kelly 2013 Abstract An integrated framework for smart home monitoring towards internet of things based on ZigBee and 6LoWPAN wireless sensor networks is presented. The system was developed to retrofit existing sub systems of wireless technologies in order to reduce cost, and complexity. The practical internetworking architecture and the connection procedures for reliable measurement of smart sensors parameters and transmission of sensing data via internet are presented. A ZigBee based sensing system was designed and developed to see the feasibility of the system in home automation for contextual environmental monitoring. The ubiquitous sensing system is based on combination of pervasive distributed sensing units and an information system for data aggregation and analysis. Results related to the home automation parameters and execution of the system running continuously for long durations is encouraging. The prototype system (ZigBee based) was tested to generate real-time graphical information rather than using a simulator or a test bed scenario. A trail has also been performed with 6LoWPAN technology to provide functionality as the ZigBee based system. The overall internetworking architecture describes the integration of a low power consumption wireless sensor network with the internet.
    [Show full text]
  • Wireless Temperature Monitoring System Using Wireless Sensor Networks
    ISSN: 2278 – 909X International Journal of Advanced Research in Electronics and Communication Engineering (IJARECE) Volume 1, Issue 4, October 2012 WIRELESS TEMPERATURE MONITORING SYSTEM USING WIRELESS SENSOR NETWORKS Author -Prof.S.S.Sarade Prof.A.C.Joshi Prof. SACHIN S. PATIL Prof.A.N.Shinde R.I.T Rajaramnagar ADCET, ASHTA A.D.C.E.T ASHTA ADCET, ASHTA [email protected] Abstract - In today’s world we are facing with and networking possibilities with a variety of many different types of emergencies in networks such as CISCO messaging client or a the indoor environment. Response to such desktop program in order to make messaging emergencies is critical in order to protect easily integrated with existing systems. Using resources including human life and also we can wireless sensor networks it is possible to inform save property from damage. In this Paper, we appropriate user in timely manner. It emergency present wireless sensor network for Temperature detection and it is possible to save life of people, monitoring. Which can report the emergency to it will avoid damage of property. [1] the users in various forms, such as pop-ups on a The advancement of science and Computer screen, SMS on their cell phones and technology are dependent on parallel progress in so on. Due to this flexibility of reporting low sensing and measurement techniques. The cost wireless sensor network prepared for reason for this is obvious. As science and emergency response system of future. In this technology move ahead new phenomena and paper we are going to develop three wireless relationships are discovered and these advances sensor nodes and we have to place in different make new types of imperative.
    [Show full text]
  • Wolfbot: a Distributed Mobile Sensing Platform for Research and Education
    Proceedings of 2014 Zone 1 Conference of the American Society for Engineering Education (ASEE Zone 1) WolfBot: A Distributed Mobile Sensing Platform for Research and Education Joseph Betthauser, Daniel Benavides, Jeff Schornick, Neal O’Hara, Jimit Patel, Jeremy Cole, Edgar Lobaton Abstract— Mobile sensor networks are often composed of agents with weak processing capabilities and some means of mobility. However, recent developments in embedded systems have enabled more powerful and portable processing units capable of analyzing complex data streams in real time. Systems with such capabilities are able to perform tasks such as 3D visual localization and tracking of targets. They are also well-suited for environmental monitoring using a combination of cameras, microphones, and sensors for temperature, air-quality, and pressure. Still there are few compact platforms that combine state of the art hardware with accessible software, an open source design, and an affordable price. In this paper, we present an in- depth comparison of several mobile distributed sensor network platforms, and we introduce the WolfBot platform which offers a balance between capabilities, accessibility, cost and an open- design. Experiments analyzing its computer-vision capabilities, power consumption, and system integration are provided. Index Terms— Distributed sensing platform, Swarm robotics, Open design platform. I. INTRODUCTION ireless sensor networks have been used in a variety of Wapplications including surveillance for security purposes [30], monitoring of wildlife [36], [25], [23], Fig 1.WolfBot mobile sensing platform and some of its features. and measuring pollutant concentrations in an environment [37] [24]. Initially, compact platforms were deployed in order to As the number of mobile devices increases, tools for perform low-bandwidth sensing (e.g., detecting motion or distributed control and motion planning for swarm robotic recording temperature) and simple computations.
    [Show full text]
  • Long-Range Wireless Radio Technologies: a Survey
    future internet Review Long-Range Wireless Radio Technologies: A Survey Brandon Foubert * and Nathalie Mitton Inria Lille - Nord Europe, 59650 Villeneuve d’Ascq, France; [email protected] * Correspondence: [email protected] Received: 19 December 2019; Accepted: 11 January 2020; Published: 14 January 2020 Abstract: Wireless networks are now a part of the everyday life of many people and are used for many applications. Recently, new technologies that enable low-power and long-range communications have emerged. These technologies, in opposition to more traditional communication technologies rather defined as "short range", allow kilometer-wide wireless communications. Long-range technologies are used to form Low-Power Wide-Area Networks (LPWAN). Many LPWAN technologies are available, and they offer different performances, business models etc., answering different applications’ needs. This makes it hard to find the right tool for a specific use case. In this article, we present a survey about the long-range technologies available presently as well as the technical characteristics they offer. Then we propose a discussion about the energy consumption of each alternative and which one may be most adapted depending on the use case requirements and expectations, as well as guidelines to choose the best suited technology. Keywords: long-range; wireless; IoT; LPWAN; mobile; cellular; LoRa; Sigfox; LTE-M; NB-IoT 1. Introduction Wireless radio technologies, such as Wi-Fi, are used daily to enable inter-device communications. In the last few years, new kinds of wireless technologies have emerged. In opposition to standard wireless technologies referred to as “short-range”, long-range radio technologies allow devices to communicate over kilometers-wide distances at a low energy cost, but at the expense of a low data rate.
    [Show full text]
  • Imageman.Net Getting Started
    ImageMan.Net Getting Started 1 ImageMan.Net Version 3 The ImageMan.Net product includes fully managed .Net components providing an easy to use, yet rich imaging toolkit. Fully Managed Assemblies support X-Copy deployment and do not use COM Support for reading/writing many image formats including TIFF, BMP, DIB, RLE, PCX, DCX, TGA, PCX, DCX, JPG, JPEG 2000, PNG, GIF, EMF, WMF, PDF(with optional PDF Export/Import Addon Options), even plug in your own image codecs Object oriented architecture simplifies development. High level functionality allows for quick development while low level classes provide ultimate control Works with the ImageMan.Net Twain controls to easily scan from Twain compatible scanners, cameras and frame grabbers Winforms Viewer, File Open, Thumbnail Viewer, Annotation and Annotation Toolstrip controls Barcode creation and recognition support for 1-d and 2-d barcodes symbologies including QR, Datamatrix, 3 of 9, Codabar, PDF417, Code 3 of 9, Code 3 of 9 Extended, Code 93, EAN-8, EAN-13, UPC-A, UPC-E, Aztec, Interleaved 2 of 5, Codabar and more Document Edition includes royalty free OCR, Annotations and document processing commands including despeckle, border removal, border cleanup and more Supports building client side Winforms and ASP.Net server side applications 32 & 64 bit assemblies for .Net 2.0, .Net 3.x and 4.x Support for Visual Studio 2005, 2008, 2010, 2012 and 2013 Context Sensitive Online Help and Documentation Backed up by Data Techniques professional support staff 1 ImageMan.Net Getting Started ImageMan.Net Getting Started 2 What's New in Version 3 What's new in the Summer Release PDFEncoder & OCR Engine Enhanced the Searchable PDF Support by assuring that the searchable text lines up with the raster image content.
    [Show full text]
  • New Developments in Marketing
    18 New developments in marketing The application of the Internet is leading to new developments in marketing, in relation to both suppliers and customers. A major development is the change from supply driven to demand driven. No longer is the major focus to make a transaction (deal), but to create an individual relationship. Part of the changed focus is the involvement of supplier and buyer in the buying process as described earlier, the different forms of relationship in the supply chain and with suppliers, and finally the interaction and communication with customers. 18.1 Changes in the role of suppliers The relationship with suppliers will change in a business-to-business environment (Figure 18.1). The dependency on each other will grow, but will also make the relationship closer. The market is agile and dynamic, market changes are rapid and the loyalty of customers is Internet strategy Reach Information Stock, sales conditions Communication Product information, delivery time, EDI, email Transaction EDI, VMI, Development/time service contract Infrastructure VPN, concept sharing, collaborating Figure 18.1 Relationship with suppliers Technology enables change communication drives change Taylor & Francis proofs - not for distribution 218 Marketing strategy in a dynamic world diminishing. This will lead to a more flexible approach to the market. The standard supply chain will lead to inflexibility because of the different roles of supplier, wholesaler, logistic service supplier and retailer, but also because of the ‘buffer stock’ in the supply chain. There will be a need for less stock in the total chain, which will lead to a ‘single stock location’ approach.
    [Show full text]
  • Location Based Service in Indoor Environment Using Quick Response Code Technology
    LOCATION BASED SERVICE IN INDOOR ENVIRONMENT USING QUICK RESPONSE CODE TECHNOLOGY a,* a Farshad Hakimpour , Ali Zare Zardiny a Department of Geomatics Engineering, Faculty of Engineering, University of Tehran, (fhakimpour, zare_zardiny)@ut.ac.ir KEYWORDS: Location Based Service, QR Code, Indoor Positioning, NFC, RFID, WiFi ABSTRACT: Today by extensive use of intelligent mobile phones, increased size of screens and enriching the mobile phones by Global Positioning System (GPS) technology use of location based services have been considered by public users more than ever.. Based on the position of users, they can receive the desired information from different LBS providers. Any LBS system generally includes five main parts: mobile devices, communication network, positioning system, service provider and data provider. By now many advances have been gained in relation to any of these parts; however the users positioning especially in indoor environments is propounded as an essential and critical issue in LBS. It is well known that GPS performs too poorly inside buildings to provide usable indoor positioning. On the other hand, current indoor positioning technologies such as using RFID or WiFi network need different hardware and software infrastructures. In this paper, we propose a new method to overcome these challenges. This method is using the Quick Response (QR) Code Technology. QR Code is a 2D encrypted barcode with a matrix structure which consists of black modules arranged in a square grid. Scanning and data retrieving process from QR Code is possible by use of different camera-enabled mobile phones only by installing the barcode reader software. This paper reviews the capabilities of QR Code technology and then discusses the advantages of using QR Code in Indoor LBS (ILBS) system in comparison to other technologies.
    [Show full text]
  • Event and Map Content Personalisation in a Mobile and Context-Aware Environment
    EVENT AND MAP CONTENT PERSONALISATION IN A MOBILE AND CONTEXT-AWARE ENVIRONMENT RALF BIERIG A thesis submitted in partial fulfilment of the requirements of the Robert Gordon University for the degree of Doctor of Philosophy This research programme was carried out in collaboration with SINTEF Telecom and Informatics April 2008 It takes an awful long time to not write a book. Douglas Adams Abstract Effective methods for information access are of the greatest importance for our modern lives – particularly with respect to handheld devices. Personalisation is one such method which models a user’s characteristics to deliver content more focused to the user’s needs. The emerging area of sophisticated mobile computing devices has started to inspire new forms of personalised systems that include aspects of the person’s contextual environment. This thesis seeks to understand the role of personalisation and context, to evaluate the effectiveness of context for content personalisation and to investigate the event and map content domain for mobile usage. The work presented in this thesis has three parts: The first part is a user experiment on context that investigated the contextual attributes of time, location and interest, with respect to participants’ perception of their usefulness. Results show highly dynamic and interconnected effects of context on participants’ usefulness ratings. In the second part, these results were applied to create a predictive model of context that was related to attribution theory and then combined with an information retrieval score to create a weighted personalisation model. In the third part of this work, the personalisation model was applied in a mobile experiment.
    [Show full text]
  • Human-Computer Interaction 10Th International Conference Jointly With
    Human-Computer Interaction th 10 International Conference jointly with: Symposium on Human Interface (Japan) 2003 5th International Conference on Engineering Psychology and Cognitive Ergonomics 2nd International Conference on Universal Access in Human-Computer Interaction 2003 Final Program 22-27 June 2003 • Crete, Greece In cooperation with: Conference Centre, Creta Maris Hotel Chinese Academy of Sciences Japan Management Association Japan Ergonomics Society Human Interface Society (Japan) Swedish Interdisciplinary Interest Group for Human-Computer Interaction - STIMDI Associación Interacción Persona Ordenador - AIPO (Spain) InternationalGesellschaft für Informatik e.V. - GI (Germany) European Research Consortium for Information and Mathematics - ERCIM HCI www.hcii2003.gr Under the auspices of a distinguished international board of 114 members from 24 countries Conference Sponsors Contacts Table of Contents HCI International 2003 HCI International 2003 HCI International 2003 Welcome Note 2 Institute of Computer Science (ICS) Foundation for Research and Technology - Hellas (FORTH) Conference Registration - Secretariat Foundation for Research Thematic Areas & Program Boards 3 Science and Technology Park of Crete Conference Registration takes place at the Conference Secretariat, located at and Technology - Hellas Heraklion, Crete, GR-71110 the Olympus Hall, Conference Centre Level 0, during the following hours: GREECE Institute of Computer Science Saturday, June 21 14:00 – 20:00 http://www.ics.forth.gr Opening Plenary Session FORTH Tel.:
    [Show full text]
  • Learning Environment Using Smart Phones
    Paper ID #11759 Learning Environment Using Smart Phones Dr. Pavan Meadati, Southern Polytechnic State University Pavan Meadati, Ph.D., LEED AP, is an associate professor in Construction Management Department. He received Doctorate in Engineering from University of Nebraska –Lincoln. He is a recipient of Con- struction Excellence in Teaching Award for Region II in 2013 presented by the Associated Schools of Construction. Dr. Meadati serves as a Graduate Program Coordinator and played vital role in obtain- ing the initial accreditation for Construction Management Masters’ Program. He received outstanding dissertation award from University of Nebraska-Lincoln in 2008. Dr. Meadati’s research interests in- clude Building Information Model (BIM), BIM applications in Architecture Engineering and Construc- tion (AEC) education, 3D laser scanning, Radio frequency Identification (RFID) and integration of mobile technology with BIM. Dr. Parminder Juneja, Southern Polytechnic State University (ENG) Dr. Parminder Juneja is an Assistant Professor in the College of Architecture and Construction Manage- ment at the Kennesaw State University. Her educational background includes PhD in Integrated Facility Management from Georgia Institute of Technology; Masters of Technology in Building Science and Con- struction Management from Indian Institute of Technology (IIT) Delhi; and Bachelors of Architecture from Chandigarh College of Architecture, India. Before joining Southern Polytechnic State University (now known as Kennesaw State University) in Fall 2014, she possessed 15 years of multi-industry, multi- disciplinary, and international professional experience. As a result, she brings a holistic and integrative perspective to approaching and solving problems, which is a key to success in today’s complex and trans- forming education, work environment.
    [Show full text]