Contribution Towards Intelligent Service Management in Wearable and Ubiquitous Devices

Contribution Towards Intelligent Service Management in Wearable and Ubiquitous Devices

Universidad Politécnica de Madrid Escuela Técnica Superior de Ingeniería y Sistemas de Telecomunicación CONTRIBUTION TOWARDS INTELLIGENT SERVICE MANAGEMENT IN WEARABLE AND UBIQUITOUS DEVICES DOCTORAL THESIS Pedro Castillejo Parrilla Master in Engineering Systems and Accessible Services for the Information Society 2015 Centro de Investigación en Tecnologías de Software y Sistemas Multimedia para la Sostenibilidad Escuela Técnica Superior de Ingeniería y Sistemas de Telecomunicación CONTRIBUTION TOWARDS INTELLIGENT SERVICE MANAGEMENT IN WEARABLE AND UBIQUITOUS DEVICES DOCTORAL THESIS Pedro Castillejo Parrilla Master in Engineering Systems and Accessible Services for the Information Society Supervisors: Prof. PhD. José-Fernán Martínez Ortega Prof. PhD. Lourdes López Santidrián Universidad Politécnica de Madrid 2015 ii Contents Contents iii List of Figures ix List of Tables xiii Acknowledgments xv Abstract xvii Resumen xix 1 Introduction 1 1.1. Motivation 3 1.2. Objectives 7 1.3. Thesis Framework and background 8 1.4. Document structure 10 2 State of the Art 11 2.1. State of the art in Wireless Sensor Networks 13 2.1.1. Wireless communication technologies 13 2.1.1.1. Bluetooth (IEEE 802.15.1) 13 2.1.1.2. Wi-Fi (IEEE 802.11.a.b.h.g.n) 15 2.1.1.3. WiMax (IEEE 802.15.16) 17 2.1.1.4. Wavenis 17 2.1.1.5. ZigBee (IEEE 802.15.4) 17 2.1.1.6. 6LoWPan 18 iii 2.1.1.7. Thread 18 2.1.2. Hardware platforms 21 2.1.2.1. IMote2 24 2.1.2.2. Tmote Sky 25 2.1.2.3. MicaZ 26 2.1.2.4. Mica2 27 2.1.2.5. Mica2DOT 28 2.1.2.6. TinyNode 29 2.1.2.7. Shimmer 30 2.1.2.8. Zolertia Z1 31 2.1.2.9. WaspMote 32 2.1.2.10. SunSPOT 33 2.1.3. IoT specific platforms 35 2.1.4. WSN software development architectures 36 2.1.4.1. Software architectures for WSNs 36 2.1.4.2. Operating Systems 37 2.2. WSN security solutions 40 2.3. ESB implementations 42 2.4. Wearable devices 45 2.4.1. Physiological monitoring 45 2.4.2. Smart wearable devices 48 2.4.2.1. Smartwatches 49 iv 2.4.2.2. Smartbands 50 2.4.2.3. Heart rate monitoring devices 51 2.5. Section summary 52 3 Dissertation 53 3.1. Introduction 55 3.2. Wearable Device Service Bus 57 3.2.1. Formalization of an ESB-based platform for wearable services and middleware interoperability 60 3.2.2. External ESB interfaces 67 3.3. Wearable InterDomain Protocols 68 3.3.1. Overview of technologies selected for the WIDP protocols 69 3.3.1.1. REST 69 3.3.1.2. JSON 69 3.3.1.3. CoAP 70 3.3.1.4. JMS 71 3.3.1.5. AMQP 72 3.3.2. UML diagrams for service requests 73 3.4. Service-oriented semantic middleware integration and services deployment definition 75 3.5. Security schema proposal 80 3.5.1. Securing high-level interface access 80 3.5.1.1. SSL Handshake Protocol 82 v 3.5.2. WSN security 84 3.5.2.1. Deploying trust domains to increase WSN security 85 3.5.2.1.1. Trust definition and trust domains 86 3.5.2.1.2. Validating trust domains and polling system 86 3.5.2.1.3. Actions to take when losing trust in a domain 87 3.5.3. Security schema definition 87 3.5.3.1. Architecture 89 3.5.3.2. Communications 91 3.5.3.3. Critical nodes federation schema 94 3.6. Section summary 95 4 Validation 97 4.1. Validation 99 4.1.1. Sportsman scenario: LifeWear project validation 99 4.1.2. Third-party application development 103 4.2. Test results 107 4.3. Security analysis 110 4.4. Section summary 114 5 Conclusions 115 5.1. Conclusions 117 5.2. Future works 119 5.3. Publications and projects 121 vi 5.3.1. SCI-indexed journals 121 5.3.2. International conferences 122 5.3.3. Research projects 122 6 Bibliography 123 6.1. References 125 6.2. Acronyms 139 vii viii List of Figures Figure 1 General overview of the thesis-related technologies ............................ 4 Figure 2 Thesis objectives .................................................................................. 8 Figure 3 Thesis framework boundaries ............................................................... 9 Figure 4 Bluetooth scatternet example ............................................................. 14 Figure 5 Thread stack. Source: Thread Group. ................................................ 19 Figure 6 A generic WSN node .......................................................................... 21 Figure 7 Generic WSN node components ........................................................ 23 Figure 8 IMote2 ................................................................................................. 24 Figure 9 Tmote Sky ........................................................................................... 25 Figure 10 MicaZ ................................................................................................ 26 Figure 11 Mica2 ................................................................................................ 27 Figure 12 Mica2DOT ......................................................................................... 28 Figure 13 TinyNode ........................................................................................... 29 Figure 14 Shimmer ............................................................................................ 30 Figure 15 Zolertia Z1 ......................................................................................... 31 Figure 16 WaspMote ......................................................................................... 32 Figure 17 SunSPOT (main board—left—and stacks –right—) .......................... 33 Figure 18 Software architecture for WSNs ........................................................ 36 Figure 19 Holistic view of the proposal including the most relevant contributions ........ 56 Figure 20 Wearable Device Service Bus (WDSB) components and boundaries ......... 57 ix Figure 21 WDSB architecture ........................................................................... 58 Figure 22 An ESB for different consumers and middleware implementations (centre), with a smartwatch attached (left). The services can be consumed by a wide range of applications, e.g.: a mobile application (right) ............................ 60 Figure 23 UML subsystem diagram .................................................................. 61 Figure 24 UML package diagram ...................................................................... 62 Figure 25 UML component diagram .................................................................. 63 Figure 26 External interfaces for third party user applications (e.g.: a mobile application) ........................................................................................................ 67 Figure 27 A generic picture of the Wearable InterDomain Protocols (WIDP) ... 68 Figure 28 Fields inside a CoAP message. Mandatory fields are in red and optional in blue .................................................................................................. 71 Figure 29 AMQP entities and broker components ............................................ 72 Figure 30 UML sequence diagram describing the complete service request process .............................................................................................................. 73 Figure 31 UML sequence diagram: a mobile application retrieves the heart rate from a Bluetooth sensor connected to a WSN .................................................. 74 Figure 32 Example of the extended ontology .................................................... 78 Figure 33 Overview of the ontology extended with wearable classes ............... 79 Figure 34 Two-tier security proposal (PKI and Trust mechanisms) .................. 80 Figure 35 PKI components to secure high-level interfaces ............................... 81 Figure 36 SSL Handshake procedure messages ............................................. 82 Figure 37 Proposed model overview ................................................................. 89 Figure 38 Generic Trust Domain components .................................................. 90 x Figure 39 Sequence diagram describing a new node registration into a Trust Domain .............................................................................................................. 92 Figure 40 Sequence diagram describing how the Security Manager starts the renovation of a Domain Key .............................................................................. 93 Figure 41 Sequence diagram describing how the Security Manager designates a new Domain Key Server ................................................................................ 94 Figure 42 LifeWear requirements and testing scenario components (down) and service provided by the Zephyr body sensor (up) ........................................... 100 Figure 43 Detailed view of Sports scenario services semantically annotated . 102 Figure 44 External REST interfaces available for third-party application development .................................................................................................... 103 Figure 45 WADL describing the "get Real Time pulse" service ...................... 105 Figure 46 REST interface definition using JAVA-RS ...................................... 105 Figure 47 Third-party mobile application. Graphic User Interface screenshots. ........ 106 Figure 48 Network elements start-up time ...................................................... 107 Figure 49 Response time for different service queries: simple services (temperature1, 2 and 3 and body temperature) and composed service (injury prevention) ...................................................................................................... 108 Figure

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    162 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us