State of the Art Related to M2mgrids Scope

State of the Art Related to M2mgrids Scope

Public A state of the art related to scope of M2MGrids project M2MGrids ITEA 2 13011 •••••••••••••••••••••••••••••••••••••••••••••••••••••• Edited by Juhani Latvakoski Including contributions from: all M2MGrids project partners This document will be treated as strictly confidential. It will not be disclosed to anybody not having signed the ITEA / ITEA 2 Declaration of Non-Disclosure. CONFIDENTIAL TABLE OF CONTENTS Abstract .................................................................................................................................. 6 List of Abbreviations .............................................................................................................. 7 1 Introduction .................................................................................................................. 10 2 Review of the Internet of Things architectures ............................................................. 10 References..................................................................................................................... 14 3 State of the Art Analysis on M2M Information systems ................................................ 15 3.1 Technologies ......................................................................................................... 15 3.1.1 Knowledge Representation........................................................................... 15 3.1.2 Multi-agent Systems .................................................................................... 16 3.1.3 Optimization techniques ............................................................................... 19 3.1.4 Knowledge Discovery................................................................................... 25 3.2 Domains of Application ........................................................................................... 32 3.2.1 Intelligent Power Systems ............................................................................ 32 3.2.2 Smart Mobile ............................................................................................... 49 References..................................................................................................................... 51 4 State-of-the-Art Analysis on M2M Service Platforms .................................................... 53 4.1 M2M service level existing solutions and architecture standards ............................... 53 4.1.1 OneM2M Service level architecture............................................................... 53 4.1.2 ETSI M2M service level ............................................................................... 57 4.1.3 Existing commercial solutions....................................................................... 59 4.2 Virtualization & container technologies .................................................................... 60 4.2.1 Abstraction Levels / Virtualization Types ....................................................... 61 4.2.2 Analysis and Comparison ............................................................................. 63 4.3 Complex event processing and other stream processing mechanisms/engines .......... 64 4.3.1 Complex Event Processing........................................................................... 65 4.3.2 Improvements and Evolution of Complex Event Processing............................ 69 4.3.3 Distributed Stream Processing Platforms ...................................................... 71 4.3.4 Business and Enterprise Platforms that offer Integrated CEP for IoT ............... 74 4.3.5 Message brokers for M2M and IoT................................................................ 75 4.4 Intelligent service resource allocation procedures .................................................... 76 4.4.1 Centralized, offline optimization methods ...................................................... 77 4.4.2 Distributed optimization through multi-agent systems ..................................... 78 4.4.3 Pattern matching and forecasting for very large datasets ............................... 84 4.5 M2MGrids Service Platform-relevant programming languages, frameworks and service modeling ........................................................................................................................ 86 4.5.1 Base Knowledge Representation Languages................................................. 86 4.5.2 Stream Processing Frameworks and Languages ........................................... 87 4.5.3 Standards for service specification ............................................................... 89 References..................................................................................................................... 90 5 State-of-the-art analysis on M2M Communication Technologies .................................. 95 5.1 General ................................................................................................................. 95 5.2 An Overview on Communication technologies .......................................................... 95 5.3 Communication Overlay.......................................................................................... 98 5.3.1 Communication with constrained embedded devices ..................................... 98 5.3.2 Constrained Application Protocol (CoAP) ...................................................... 99 5.3.3 Extensible Messaging and Presence Protocol (XMPP) ................................. 100 5.4 Cellular network ................................................................................................... 101 5.4.1 2G GSM/GPRS/EDGE ............................................................................... 102 5.4.2 3G WCDMA/HSPA .................................................................................... 103 5.4.3 4G LTE/ LTE Advanced ............................................................................. 103 5.4.4 5G Prospects ............................................................................................ 104 Page 2 of 121 CONFIDENTIAL 5.5 Access technologies............................................................................................. 105 5.5.1 IEEE802.3 (Ethernet) ................................................................................. 105 5.5.2 IEEE802.11 (Wi-Fi) .................................................................................... 106 5.5.3 Bluetooth low energy (BLE) ........................................................................ 107 5.5.4 IEEE802.15.4 (ZigBee) .............................................................................. 109 5.5.5 IEEE802.15.4g (SUN) ................................................................................ 111 References................................................................................................................... 112 6 A view to the State-of-the-Art on Security of M2M Systems ....................................... 113 6.1 Overview ............................................................................................................. 113 6.2 Security of communication .................................................................................... 113 6.3 Access control ..................................................................................................... 116 6.4 Challenges for Security Solutions .......................................................................... 117 References................................................................................................................... 119 7 Concluding Remarks .................................................................................................. 119 Page 3 of 121 CONFIDENTIAL TABLE OF FIGURES Figure 1. The related Standards & Industrial Forums for the Internet of Things standardization [AIOTI]. ......................................................................................................................................................... 10 Figure 2. A view to the edge system [IEC].......................................................................................... 11 Figure 3. ITU-T Y.2060 view to the IoT platform [IEC]. ....................................................................... 11 Figure 4. IoT Reference architecture model of Industry 4.0. ............................................................... 12 Figure 5. IoT-A project architecture reference model. ......................................................................... 12 Figure 6. AIOTI, Alliance for Internet of Things Innovation, view to the IoT architecture. ..................... 13 Figure 7. IoT reference architecture [IEC17]. ..................................................................................... 13 Figure 3.1Example PRM: (left) example schema, (right) inference from parent variables in a skeleton 16 Figure 3.2 Optimization techniques [33] ............................................................................................. 20 Figure 3.3 Fundamental components of an expert system [33] ........................................................... 22 Figure 3.4 Fuzzy logic approach diagram .......................................................................................... 22 Figure 3.5 GA cycle [40, 41] .............................................................................................................. 23 Figure 3.6 Adaptive dynamic programming structure [33] ..................................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    121 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us