Communication Protocol for a Cyber-Physical System
Total Page:16
File Type:pdf, Size:1020Kb
DEGREE PROJECT, IN INFORMATION AND COMMUNICATION TECHNOLOGY , FIRST LEVEL STOCKHOLM, SWEDEN 2015 Communication Protocol for a Cyber-Physical System USING BLUETOOTH, NFC AND CLOUD COMPUTING MATHIAS PERSSON KTH ROYAL INSTITUTE OF TECHNOLOGY INFORMATION AND COMMUNICATION TECHNOLOGY Abstract The focus of this thesis is to utilize many of today’s current technologies to design a communication protocol that allows different devices to be incorporated into a system that can facilitate the flow of information between a user and a world of digital data. The protocol will take advantage of individual benefits from NFC, Bluetooth and cloud computing in its design to make the underlying complexity as transparent to the user as possible. Some of the main problems, such as security and reliability, are discussed and how they are incorporated into the core design of the protocol. The protocol is then applied to a case study to see how it can be utilized to create an integrity preserving system for managing medical records in a healthcare environment. The results from the case study gives merit to guidelines provided by the protocol specifications, making a system implementation based on the protocol theoretically possible. A real system implementation is required to verify the results extracted from the case study. Keywords Cyber-Physical Systems, Cloud Computing, Communication Protocol, Healthcare, Medical Records, Bluetooth, NFC Abstract Denna uppsats fokuserar på att använda många av dagens teknologier för att konstruera ett kommunikationsprotokoll som möjliggör för olika enheter att inkorporeras i ett system som underlättar informationsflödet mellan en användare och en värld av digital data. Protokollet utnyttjar olika individuella fördelar hos NFC, Bluetooth and molntjänster i dess design för att göra den underliggande komplexiteten så transparant som möjligt för användaren. Några av de främsta problemen, så som säkerhet och tillförlitlighet, diskuteras och hur de inkorporeras i hjärtat av protokollet. Protokollet appliceras sedan i en fallstudie för att se hur det kan användas för att skapa ett system för sjukjournaler som bevarar integriteten hos patienter. Resultatet från fallstudien pekar mot att de riktlinjer som gavs av protokollspecifikationerna fungerar för att göra en systemimplementation på en teoretisk nivå. En verklig systemimplementation skulle behövas för att verifiera de resultat som framgår ur fallstudien. Nyckelord Cyberfysiska System, Molntjänster, Kommunikationsprotokoll, Sjukvård, Sjukjournaler, Bluetooth, NFC Table of Contents 1 Introduction ................................................................................................................. 3 1.1 Background ..................................................................................................................... 4 1.2 Problem............................................................................................................................. 4 1.3 Purpose ............................................................................................................................. 6 1.4 Goal ..................................................................................................................................... 6 1.4.1 Benefits, Ethics and Sustainability .................................................................................. 6 1.5 Methodology / Methods .............................................................................................. 8 1.5.1 Philosophical assumptions ................................................................................................. 9 1.5.2 Research methods ................................................................................................................10 1.5.3 Research approaches ..........................................................................................................11 1.5.4 Literature Study ....................................................................................................................12 1.6 Delimitations ................................................................................................................ 13 1.7 Outline ............................................................................................................................. 14 2 Theoretic Background .......................................................................................... 16 2.1 Cyber-Physical systems ............................................................................................. 16 2.2 Related work ................................................................................................................. 17 2.3 Communication protocols ........................................................................................ 19 2.4 Bluetooth ........................................................................................................................ 20 2.5 Near Field Communication ...................................................................................... 21 2.6 Infrastructure ............................................................................................................... 22 3 Methods ...................................................................................................................... 24 3.1 Research strategies .................................................................................................... 24 3.2 Data collection .............................................................................................................. 25 3.3 Data analysis ................................................................................................................. 26 3.4 Quality assurance ........................................................................................................ 27 3.4.1 Quantitative research .........................................................................................................27 3.4.2 Qualitative research ............................................................................................................27 4 The Protocol .............................................................................................................. 29 4.1 Structure ......................................................................................................................... 29 4.2 Protocol Specifications .............................................................................................. 30 1 4.3 Reliability and Quality of Service .......................................................................... 32 4.4 Security ........................................................................................................................... 33 5 Communication Details ......................................................................................... 37 5.1 Connection Establishment ....................................................................................... 37 5.2 Information Transaction .......................................................................................... 40 6 Case Study in a Healthcare Environment ....................................................... 43 6.1 Management of Medical Records in Sweden ..................................................... 43 6.2 An Integrity Preserving System for Medical Records ..................................... 44 6.3 Results ............................................................................................................................. 48 7 Conclusions ............................................................................................................... 50 7.1 Evaluation ...................................................................................................................... 50 7.2 Discussions .................................................................................................................... 51 7.3 Future Work .................................................................................................................. 56 References .......................................................................................................................... 58 2 1 Introduction The world is moving towards a time where more and more objects are connected to the Internet, the so called “Internet of Things” [1]. In an environment where these objects transmit information, tools are needed to enable us to access it. In our modern society, the number of people using a cellphone in 2014 is about 4.5 billion and out of these there are around 1.75 billion smartphones [2]. Of course, a majority of these smartphones are located in developed countries because of the economical factor [3] and, therefore, it can assumed that it is more likely that someone in a developed country is carrying a smartphone instead of a regular phone. This trend is only going to continue [2], making the smartphone an excellent tool to help the general population gather information from sources in the surrounding environment. By using the wireless communication features of a modern smartphone, such as Bluetooth [4], Near Field Communication (NFC) [5] and Wi-Fi [6], a solid ground to transmit and receive information to and from various sources can be established. There is however an obstacle that needs to be solved before any information transaction can occur, namely a communication protocol telling the different devices how to transmit the information, what data the transaction should