Implementation of Middleware for Internet of Things in Asset Tracking Applications: In-Lining Approach
Total Page:16
File Type:pdf, Size:1020Kb
Implementation of Middleware for Internet of Things in Asset Tracking Applications: In-lining Approach Masters Dissertation by Admire Mhlaba Supervised by Dr. Muthoni Masinde This dissertation was conducted and submitted in fulfilment of the requirements of degree Magister Technologiae: Information Technology, at the Central University of Technology, Free State, South Africa (CUT) © Central University of Technology, Free State Declaration i Declaration I, Admire Mhlaba, student number , declare that the work in this dissertation is a presentation of my original research work and has been submitted for the award of Magister Technologiae: Information Technology at the Central University of Technology, Free State. Wherever contributions of other people are involved, every effort has been made to indicate this clearly, with due reference to the literature and acknowledgement. Further, this work was done under the guidance of Dr Muthoni Masinde, Department of Information Technology, at the Central University of Technology, Free State. Admire Mhlaba Date: 25 June 2015 Signature: In my capacity as supervisor of this dissertation, I certify that the above statements are true to the best of my knowledge. Dr Muthoni Masinde Date: 25 June 2015 Signature: © Central University of Technology, Free State Abstract ii Abstract Internet of Things (IoT) is a concept that involves giving objects a digital identity and limited artificial intelligence, which helps the objects to be interactive, process data, make decisions, communicate and react to events virtually with minimum human intervention. IoT is intensified by advancements in hardware and software engineering and promises to close the gap that exists between the physical and digital worlds. IoT is paving ways to address complex phenomena, through designing and implementation of intelligent systems that can monitor phenomena, perform real-time data interpretation, react to events, and swiftly communicate observations. The primary goal of IoT is ubiquitous computing using wireless sensors and communication protocols such as Bluetooth, Wireless Fidelity (Wi-Fi), ZigBee and General Packet Radio Service (GPRS). Insecurity, of assets and lives, is a problem around the world. One application area of IoT is tracking and monitoring; it could therefore be used to solve asset insecurity. A preliminary investigation revealed that security systems in place at Central University of Technology, Free State (CUT) are disjointed; they do not instantaneously and intelligently conscientize security personnel about security breaches using real time messages. As a result, many assets have been stolen, particularly laptops. The main objective of this research was to prove that a real-life application built over a generic IoT architecture that innovatively and intelligently integrates: (1) wireless sensors; (2) radio frequency identification (RFID) tags and readers; (3) fingerprint readers; and (4) mobile phones, can be used to dispel laptop theft. To achieve this, the researcher developed a system, using the heterogeneous devices mentioned above and a middleware that harnessed their unique capabilities to bring out the full potential of IoT in intelligently curbing laptop theft. The resulting system has the ability to: (1) monitor the presence of a laptop using RFID reader that pro-actively interrogates a passive tag attached to the laptop; (2) detect unauthorized removal of a laptop under monitoring; (3) instantly communicate security violations via cell phones; and (4) use Windows location sensors to track the position of a laptop using Google- maps. The system also manages administrative tasks such as laptop registration, assignment and © Central University of Technology, Free State Abstract iii withdrawal which used to be handled manually. Experiments conducted using the resulting system prototype proved the hypothesis outlined for this research. © Central University of Technology, Free State Acknowledgements iv Acknowledgements Firstly, I thank GOD for blessing me with the strength, wisdom and courage to undertake this arduous task, since a great deal of effort and determination was needed to complete this dissertation. It has unquestionably been by far one of the most challenging and exciting learning experiences in my academic career so far. It would have been hard to complete this research without the help and support of my family, friends, girlfriend and other kind-hearted people around me, who have in many ways contributed in different ways in the preparation and completion of this Master’s dissertation. Secondly, I would like to extend warm words of gratitude to my supervisor, Dr. Muthoni Masinde. Throughout the research process, she has given motherly support, guidance, insightful comments and help through her extensive knowledge from both her rich academic background and experience from working with other students. I am grateful for her huge personal and professional sacrifices, availability whenever I needed her to discuss or ask questions. I am far more grateful for her perpetual counselling, whenever I was down in spirit and feeling discouraged. Moreover, I would like to express special thanks to my mentor, Professor Thandwa Mthembu, for opening doors for me throughout my academic life and for his dedication to lending a helping hand whenever it was needed most. Furthermore, I am supremely grateful for the financial support I received from CUT and all the people who openly met with me for interviews, guidance and contributions regarding the work in this dissertation. They all have undoubtedly contributed significantly towards the completion of this dissertation. Final thanks go to my mother, aunt, grandmother and late great grandmother who raised me, kept me in their prayers, supported me and most importantly, believed in me, GOD bless you all. I also humbly ask GOD to shower his divine blessings upon these gentle and kind-hearted souls, Botle Malebo, Nomasonto Hlewayo, Victor Litabe, Zolisa Thungatha, Adedayo Adedeji and Boiki Mphore for standing by me through thick and thin and for their brotherly and sacrificial type of love towards me. © Central University of Technology, Free State Table of Contents v Table of Contents Declaration ....................................................................................................................................... i Abstract ........................................................................................................................................... ii Acknowledgements ........................................................................................................................ iv Table of Contents ............................................................................................................................ v List of Figures ................................................................................................................................ ix List of Tables ................................................................................................................................. xi List of Appendices ........................................................................................................................ xii List of Abbreviations ................................................................................................................... xiii 1. Chapter 1: Introduction ............................................................................................................ 1 1.1. Background ...................................................................................................................... 1 1.2. IoT Technologies.............................................................................................................. 3 1.2.1. Wireless Sensors Networks....................................................................................... 3 1.2.2. Radio Frequency Identifiers ...................................................................................... 4 1.2.3. Security Technology ................................................................................................. 4 1.2.4. IoT Communication and Controlling Technologies ................................................. 5 1.2.5. IoT Middleware Technologies .................................................................................. 6 1.3. Problem Statement ........................................................................................................... 6 1.4. Research Questions .......................................................................................................... 8 1.5. Objectives and Justification ............................................................................................. 8 1.6. Scope and Contribution .................................................................................................... 9 1.7. Research Methodology ................................................................................................... 10 1.8. Structure of Dissertation................................................................................................. 11 2. Chapter 2: Literature Review ................................................................................................ 13 2.1. Introduction .................................................................................................................... 13 2.2. An Overview of Internet of Things (IoT)......................................................................