SlideShare una empresa de Scribd logo
1 de 17
Descargar para leer sin conexión
Sensor Discovery and Configuration Framework
for The Internet of Things Paradigm
Charith Perera, Prem Prakash Jayaraman, Arkady Zaslavsky, Peter Christen, Dimitrios Georgakopoulos

IEEE WORLD FORUM ON INTERNET OF THINGS 2014, SEOUL, KOREA 6-8 MARCH 2014.
Agenda
• Background and The Problem
• Challenges and Functional Requirements
• The Proposed Solution: CADDOT
• Design Decisions and Applications
• Implementation and Evaluation
• Experimentation Results and Discussion
• Conclusion and Future Work

Slide 2 of 20
Background and The Problem
• Internet of Things (IoT) will comprise billions of devices that can sense, communicate,
compute and potentially actuate.
• The data generated by the Internet of ‘Things’ are valuable and have the potential to
drive innovative and novel applications.
• The challenging task before collecting and processing data from these devices is for
systems to discover and configure the sensors and the associated data streams
(a) Big Data comprises six
categories of data
(b) Data generated from the
IoT will grow exponentially as the
number of connected nodes
increases.
Estimated numbers of connected nodes
based on different sectors are presented in
millions

Slide 3 of 20
Challenges and Functional Requirements

Large number of sensors

Heterogeneity: Communication
Sequences
Slide 4 of 20

Heterogeneity: Sensor Output
numerical, audio, video

Heterogeneity: Communication
Technology (Protocol)
Challenges and Functional Requirements

Heterogeneity: Sensing Capability (Measurements)

Data Acquisition Methods
Slide 5 of 20
Challenges and Functional Requirements
Dynamicity

Slide 6 of 20

Context
The Proposed Solution: CADDOT

• Phases in CADDOT model: The proposed model consists of eight phases: detect,
extract, identify, find, retrieve, register, reason, and configure.
• To support this model, we developed a tool called SmartLink
Slide 7 of 20
Design Decisions and Applications

• In strategy (a), a Raspberry Pi (raspberrypi.org) is
acting as the SmartLink tool. This strategy is mostly
suitable for smart home and office environments
where WiFi is available.
Wall-mounted Devices with a screen
powered by Android, capability
equals to a modern mobile phone

Slide 8 of 20

• The strategy (b) is more suitable for situations
where WiFi is not available or less dynamic. Smart
agriculture can be considered as an example.
Design Decisions and Applications

• A simple sensor-level program design (SPD) that sends and transmits data to the cloud.
• The main problem in this program design is that there is no way to configure (i.e.
sampling rate, communication frequency, data acquisition method) the sensor after
deployment other than by re-programming (e.g. Over the Air Programming).
• Such re-programming approaches are complex, labour-intensive and time consuming.

Slide 9 of 20
• We designed, Configurable Program Design
(CPD), a sensor-level program that supports a
comprehensive set of configuration
functionalities
• To standardize the communication, we also
defined a number of command formats.
• These messaging formats do not need to be
followed by the developers as long as they
share common standardised command formats
between their own sensor-level program and
the corresponding plugin.
• This program is designed into a tree structure
where we carefully manage the breath and
depth to minimize travel time through IF-ELSE
statements.

Slide 10 of 20
Design Decisions and Applications
• The first segment of every
command (Not the messages
sent out) contains only three
letters which makes it easy to
process. The commands can
be sent using frames or plain
strings.

•

For Details Please refer to Charith Perera, Prem Jayaraman, Arkady Zaslavsky, Peter Christen, and Dimitrios Georgakopoulos, Contextaware Dynamic Discovery and Configuration of `Things' in Smart Environments, In Book Big Data and Internet of Things: A Roadmap for
Smart Environments, Studies in Computational Intelligence book series, Springer Berlin Heidelberg, accepted, to be published in 2014

Slide 11 of 20
Design Decisions and Applications

• CADDOT uses a plugin architecture to address the challenge of different types of
heterogeneity.
• Plugins can be developed, distributed and installed separately to SmartLink.

Slide 12 of 20
Implementation and Evaluation
• We deployed the SmartLink
application in a Google Nexus 4
mobile phone (Qualcomm
Snapdragon S4 Pro CPU and 2 GB
RAM), which runs the Android
platform 4.2.2 (Jelly Bean).
• Libelium Sensors are used for this
Experimentation.
• SmartLink supports sensor
discovery and configuration using
both WiFi and Bluetooth.
• In order to simulate the heterogeneity of the sensors (in terms of communication
sequence), we programmed each sensor to behave and respond differently.
• As a result, each sensor can only communicate with a plugin that supports the same
communication sequence.
Slide 13 of 20
Experimentation Results and Discussion
Time taken (y-axis) to
discover and
configure a sensor
step-by-step (x-axis).
The experiments
were conducted using
three protocols: TCP,
UDP, and Bluetooth.

Time taken to
(1) set up the sensor, (2) initiate connection between the sensor and SmartLink,
(3) initiate communication between sensor and SmartLink,
(4) extract sensor identification information, (5) retrieve the complete profile of the
sensor, (6) configure the sampling rate, (7) configure the communication frequency,
(8) configure the sensing schedule, (9) configure the network and authentication details
(10) connect to the secure network using the provided authentication details..

Slide 14 of 20
Experimentation Results and Discussion
• The actual configuration tasks take less that one second.
• There is a slight variation in completion time in configuration step (4) - (9). This is due to
storage access and differences in processing of configuration commands.
• Sensors takes comparatively longer time to connect to a network as well as to discover
and connect to SmartLink
• Bluetooth takes much longer to scan for devices in a given environment before it
discovers and connects to SmartLink.
• Configuration is slightly faster when using TCP in comparison to UDP and Bluetooth.
However, the time differences are negligible.
• FTP can take 15-25 seconds to retrieve a scheduling file.
• When using WiFi, a sensor may takes up to 4.5 seconds to connect to a secure network
(e.g. WPA2). Sensors can connect to open access point in less than 4 seconds.
• Despite the protocol we use, sensors take 5 to 15 seconds to boot and setup
themselves. The setup stage consists of activities such as reading default configuration from files, and switching necessary
modules and components (communication modules, real-time clock, SD card, sensor broads and so on).

Slide 15 of 20
Conclusion and Future Work
• We explored the barriers in deploying IoT solutions in order to build
smart environments and understood that sensor discovery
configuration is one of the major challenges.
• CADDOT also encourages non-technical users to adopt IoT solutions
with ease towards building their own smart environments.
• We proposed the CADDOT model by considering key factors such as
growing number of sensors, heterogeneity, on-demand schedules,
and sampling rates, data acquisition methods, and dynamicity.
• In the future, we will explore the possibilities of developing an
efficient technique to identify a given sensor using context
information and probabilistic techniques in circumstances where
information extracted in step 2 in CADDOT model is not adequate.
Slide 16 of 20
Thank You!
Charith Perera
The Australian National University
CSIRO Computational Informatics
t +61 2 6216 7135
e Charith.Perera@ieee.org
w www.charithperera.net

DECISION AND USER SCIENCE / INFORMATION ENGINEERING LAB

Más contenido relacionado

La actualidad más candente

WF-IOT-2014, Seoul, Korea, 06 March 2014
WF-IOT-2014, Seoul, Korea, 06 March 2014WF-IOT-2014, Seoul, Korea, 06 March 2014
WF-IOT-2014, Seoul, Korea, 06 March 2014Charith Perera
 
PIMRC-2012, Sydney, Australia, 28 July, 2012
PIMRC-2012, Sydney, Australia, 28 July, 2012PIMRC-2012, Sydney, Australia, 28 July, 2012
PIMRC-2012, Sydney, Australia, 28 July, 2012Charith Perera
 
MobiDE’2012, Phoenix, AZ, United States, 20 May, 2012
MobiDE’2012, Phoenix, AZ, United States, 20 May, 2012MobiDE’2012, Phoenix, AZ, United States, 20 May, 2012
MobiDE’2012, Phoenix, AZ, United States, 20 May, 2012Charith Perera
 
Data Modelling and Knowledge Engineering for the Internet of Things
Data Modelling and Knowledge Engineering for the Internet of ThingsData Modelling and Knowledge Engineering for the Internet of Things
Data Modelling and Knowledge Engineering for the Internet of ThingsCory Andrew Henson
 
How to make data more usable on the Internet of Things
How to make data more usable on the Internet of ThingsHow to make data more usable on the Internet of Things
How to make data more usable on the Internet of ThingsPayamBarnaghi
 
Smart energy privacy tac tics2014
Smart energy privacy tac tics2014Smart energy privacy tac tics2014
Smart energy privacy tac tics2014Arpan Pal
 
15CS81- IoT Module-2
15CS81- IoT Module-215CS81- IoT Module-2
15CS81- IoT Module-2Syed Mustafa
 
Semantic Technologies for the Internet of Things: Challenges and Opportunities
Semantic Technologies for the Internet of Things: Challenges and Opportunities Semantic Technologies for the Internet of Things: Challenges and Opportunities
Semantic Technologies for the Internet of Things: Challenges and Opportunities PayamBarnaghi
 
COMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINO
COMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINOCOMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINO
COMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINOijccsa
 
Internet of Things: Concepts and Technologies
Internet of Things: Concepts and TechnologiesInternet of Things: Concepts and Technologies
Internet of Things: Concepts and TechnologiesPayamBarnaghi
 
Towards application development for the internet of things updated
Towards application development for the internet of things  updatedTowards application development for the internet of things  updated
Towards application development for the internet of things updatedPankesh Patel
 
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...AIRCC Publishing Corporation
 
Dynamic Data Analytics for the Internet of Things: Challenges and Opportunities
Dynamic Data Analytics for the Internet of Things: Challenges and OpportunitiesDynamic Data Analytics for the Internet of Things: Challenges and Opportunities
Dynamic Data Analytics for the Internet of Things: Challenges and OpportunitiesPayamBarnaghi
 
Integration of internet of things with wireless sensor network
Integration of internet of things with wireless sensor networkIntegration of internet of things with wireless sensor network
Integration of internet of things with wireless sensor networkIJECEIAES
 
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDY
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDYRPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDY
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDYijasuc
 
15CS81- IoT- VTU- module 3
15CS81- IoT- VTU- module 315CS81- IoT- VTU- module 3
15CS81- IoT- VTU- module 3Syed Mustafa
 
Internet of Things and Data Analytics for Smart Cities and eHealth
Internet of Things and Data Analytics for Smart Cities and eHealthInternet of Things and Data Analytics for Smart Cities and eHealth
Internet of Things and Data Analytics for Smart Cities and eHealthPayamBarnaghi
 

La actualidad más candente (18)

WF-IOT-2014, Seoul, Korea, 06 March 2014
WF-IOT-2014, Seoul, Korea, 06 March 2014WF-IOT-2014, Seoul, Korea, 06 March 2014
WF-IOT-2014, Seoul, Korea, 06 March 2014
 
PIMRC-2012, Sydney, Australia, 28 July, 2012
PIMRC-2012, Sydney, Australia, 28 July, 2012PIMRC-2012, Sydney, Australia, 28 July, 2012
PIMRC-2012, Sydney, Australia, 28 July, 2012
 
MobiDE’2012, Phoenix, AZ, United States, 20 May, 2012
MobiDE’2012, Phoenix, AZ, United States, 20 May, 2012MobiDE’2012, Phoenix, AZ, United States, 20 May, 2012
MobiDE’2012, Phoenix, AZ, United States, 20 May, 2012
 
Internet of Things: Trends and challenges for future
Internet of Things: Trends and challenges for futureInternet of Things: Trends and challenges for future
Internet of Things: Trends and challenges for future
 
Data Modelling and Knowledge Engineering for the Internet of Things
Data Modelling and Knowledge Engineering for the Internet of ThingsData Modelling and Knowledge Engineering for the Internet of Things
Data Modelling and Knowledge Engineering for the Internet of Things
 
How to make data more usable on the Internet of Things
How to make data more usable on the Internet of ThingsHow to make data more usable on the Internet of Things
How to make data more usable on the Internet of Things
 
Smart energy privacy tac tics2014
Smart energy privacy tac tics2014Smart energy privacy tac tics2014
Smart energy privacy tac tics2014
 
15CS81- IoT Module-2
15CS81- IoT Module-215CS81- IoT Module-2
15CS81- IoT Module-2
 
Semantic Technologies for the Internet of Things: Challenges and Opportunities
Semantic Technologies for the Internet of Things: Challenges and Opportunities Semantic Technologies for the Internet of Things: Challenges and Opportunities
Semantic Technologies for the Internet of Things: Challenges and Opportunities
 
COMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINO
COMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINOCOMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINO
COMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINO
 
Internet of Things: Concepts and Technologies
Internet of Things: Concepts and TechnologiesInternet of Things: Concepts and Technologies
Internet of Things: Concepts and Technologies
 
Towards application development for the internet of things updated
Towards application development for the internet of things  updatedTowards application development for the internet of things  updated
Towards application development for the internet of things updated
 
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...
 
Dynamic Data Analytics for the Internet of Things: Challenges and Opportunities
Dynamic Data Analytics for the Internet of Things: Challenges and OpportunitiesDynamic Data Analytics for the Internet of Things: Challenges and Opportunities
Dynamic Data Analytics for the Internet of Things: Challenges and Opportunities
 
Integration of internet of things with wireless sensor network
Integration of internet of things with wireless sensor networkIntegration of internet of things with wireless sensor network
Integration of internet of things with wireless sensor network
 
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDY
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDYRPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDY
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDY
 
15CS81- IoT- VTU- module 3
15CS81- IoT- VTU- module 315CS81- IoT- VTU- module 3
15CS81- IoT- VTU- module 3
 
Internet of Things and Data Analytics for Smart Cities and eHealth
Internet of Things and Data Analytics for Smart Cities and eHealthInternet of Things and Data Analytics for Smart Cities and eHealth
Internet of Things and Data Analytics for Smart Cities and eHealth
 

Similar a WF-IOT-2014, Seoul, Korea, 06 March 2014

AccML, co-located with HiPEAC 2021_Pedro Trancoso presentation
AccML, co-located with HiPEAC 2021_Pedro Trancoso presentationAccML, co-located with HiPEAC 2021_Pedro Trancoso presentation
AccML, co-located with HiPEAC 2021_Pedro Trancoso presentationVEDLIoT Project
 
Final project report format
Final project report formatFinal project report format
Final project report formatMasud Sarkar
 
DAI Framework_CEII_2022.pptx
DAI Framework_CEII_2022.pptxDAI Framework_CEII_2022.pptx
DAI Framework_CEII_2022.pptxIakovosIoannou1
 
Front-End Intelligence
Front-End IntelligenceFront-End Intelligence
Front-End IntelligenceJudy T Raj
 
Introduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant KrishnaIntroduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant KrishnaCodeOps Technologies LLP
 
Certified Internet of Things Specialist ( CIoTS )
Certified Internet of Things Specialist ( CIoTS ) Certified Internet of Things Specialist ( CIoTS )
Certified Internet of Things Specialist ( CIoTS ) GICTTraining
 
CPaaS.io Y1 Review Meeting - Cloud & Edge Programming
CPaaS.io Y1 Review Meeting - Cloud & Edge ProgrammingCPaaS.io Y1 Review Meeting - Cloud & Edge Programming
CPaaS.io Y1 Review Meeting - Cloud & Edge ProgrammingStephan Haller
 
Software defined fog platform
Software defined fog platform Software defined fog platform
Software defined fog platform IJECEIAES
 
Cooperative hierarchical based edge-computing approach for resources allocati...
Cooperative hierarchical based edge-computing approach for resources allocati...Cooperative hierarchical based edge-computing approach for resources allocati...
Cooperative hierarchical based edge-computing approach for resources allocati...IJECEIAES
 
STEAM++ AN EXTENSIBLE END-TO-END FRAMEWORK FOR DEVELOPING IOT DATA PROCESSING...
STEAM++ AN EXTENSIBLE END-TO-END FRAMEWORK FOR DEVELOPING IOT DATA PROCESSING...STEAM++ AN EXTENSIBLE END-TO-END FRAMEWORK FOR DEVELOPING IOT DATA PROCESSING...
STEAM++ AN EXTENSIBLE END-TO-END FRAMEWORK FOR DEVELOPING IOT DATA PROCESSING...ijcsit
 
The Wireless Remote Control Car Based On Arm9
The Wireless Remote Control Car Based On Arm9The Wireless Remote Control Car Based On Arm9
The Wireless Remote Control Car Based On Arm9IOSR Journals
 
A SOFTWARE DEFINED RADIO BASED
A SOFTWARE DEFINED RADIO BASEDA SOFTWARE DEFINED RADIO BASED
A SOFTWARE DEFINED RADIO BASEDANGELIN JOHN
 
Arpan pal uworld2013
Arpan pal uworld2013Arpan pal uworld2013
Arpan pal uworld2013Arpan Pal
 
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsMark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsStanford School of Engineering
 
Getting to the Edge – Exploring 4G/5G Cloud-RAN Deployable Solutions
Getting to the Edge – Exploring 4G/5G Cloud-RAN Deployable SolutionsGetting to the Edge – Exploring 4G/5G Cloud-RAN Deployable Solutions
Getting to the Edge – Exploring 4G/5G Cloud-RAN Deployable SolutionsRadisys Corporation
 

Similar a WF-IOT-2014, Seoul, Korea, 06 March 2014 (20)

INTERNET OF THINGS.pptx
INTERNET OF THINGS.pptxINTERNET OF THINGS.pptx
INTERNET OF THINGS.pptx
 
AccML, co-located with HiPEAC 2021_Pedro Trancoso presentation
AccML, co-located with HiPEAC 2021_Pedro Trancoso presentationAccML, co-located with HiPEAC 2021_Pedro Trancoso presentation
AccML, co-located with HiPEAC 2021_Pedro Trancoso presentation
 
Final project report format
Final project report formatFinal project report format
Final project report format
 
DAI Framework_CEII_2022.pptx
DAI Framework_CEII_2022.pptxDAI Framework_CEII_2022.pptx
DAI Framework_CEII_2022.pptx
 
Front-End Intelligence
Front-End IntelligenceFront-End Intelligence
Front-End Intelligence
 
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THINGCOMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
 
Introduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant KrishnaIntroduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant Krishna
 
Certified Internet of Things Specialist ( CIoTS )
Certified Internet of Things Specialist ( CIoTS ) Certified Internet of Things Specialist ( CIoTS )
Certified Internet of Things Specialist ( CIoTS )
 
Final_Report
Final_ReportFinal_Report
Final_Report
 
Unit - 1.pptx
Unit - 1.pptxUnit - 1.pptx
Unit - 1.pptx
 
CPaaS.io Y1 Review Meeting - Cloud & Edge Programming
CPaaS.io Y1 Review Meeting - Cloud & Edge ProgrammingCPaaS.io Y1 Review Meeting - Cloud & Edge Programming
CPaaS.io Y1 Review Meeting - Cloud & Edge Programming
 
Software defined fog platform
Software defined fog platform Software defined fog platform
Software defined fog platform
 
Cooperative hierarchical based edge-computing approach for resources allocati...
Cooperative hierarchical based edge-computing approach for resources allocati...Cooperative hierarchical based edge-computing approach for resources allocati...
Cooperative hierarchical based edge-computing approach for resources allocati...
 
STEAM++ AN EXTENSIBLE END-TO-END FRAMEWORK FOR DEVELOPING IOT DATA PROCESSING...
STEAM++ AN EXTENSIBLE END-TO-END FRAMEWORK FOR DEVELOPING IOT DATA PROCESSING...STEAM++ AN EXTENSIBLE END-TO-END FRAMEWORK FOR DEVELOPING IOT DATA PROCESSING...
STEAM++ AN EXTENSIBLE END-TO-END FRAMEWORK FOR DEVELOPING IOT DATA PROCESSING...
 
The Wireless Remote Control Car Based On Arm9
The Wireless Remote Control Car Based On Arm9The Wireless Remote Control Car Based On Arm9
The Wireless Remote Control Car Based On Arm9
 
A SOFTWARE DEFINED RADIO BASED
A SOFTWARE DEFINED RADIO BASEDA SOFTWARE DEFINED RADIO BASED
A SOFTWARE DEFINED RADIO BASED
 
Arpan pal uworld2013
Arpan pal uworld2013Arpan pal uworld2013
Arpan pal uworld2013
 
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsMark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
 
Getting to the Edge – Exploring 4G/5G Cloud-RAN Deployable Solutions
Getting to the Edge – Exploring 4G/5G Cloud-RAN Deployable SolutionsGetting to the Edge – Exploring 4G/5G Cloud-RAN Deployable Solutions
Getting to the Edge – Exploring 4G/5G Cloud-RAN Deployable Solutions
 
chapter 5.docx
chapter 5.docxchapter 5.docx
chapter 5.docx
 

Más de Charith Perera

SL2College: Undergraduate Research and higher Education, March 2017, Peradeni...
SL2College: Undergraduate Research and higher Education, March 2017, Peradeni...SL2College: Undergraduate Research and higher Education, March 2017, Peradeni...
SL2College: Undergraduate Research and higher Education, March 2017, Peradeni...Charith Perera
 
UCC-2016, 6-9 May December, Shanghai, China
UCC-2016, 6-9 May December, Shanghai, ChinaUCC-2016, 6-9 May December, Shanghai, China
UCC-2016, 6-9 May December, Shanghai, ChinaCharith Perera
 
AAMAS-2017 8-12 May, 2017, Sao Paulo, Brazil
AAMAS-2017 8-12 May, 2017, Sao Paulo, BrazilAAMAS-2017 8-12 May, 2017, Sao Paulo, Brazil
AAMAS-2017 8-12 May, 2017, Sao Paulo, BrazilCharith Perera
 
Building Open Data Markets Using Sensing as a Service Model
Building Open Data Markets Using Sensing as a Service ModelBuilding Open Data Markets Using Sensing as a Service Model
Building Open Data Markets Using Sensing as a Service ModelCharith Perera
 
SEAMS-2016, 16-17 May, 2016, Austin, Texas, United States
SEAMS-2016, 16-17 May, 2016, Austin, Texas, United StatesSEAMS-2016, 16-17 May, 2016, Austin, Texas, United States
SEAMS-2016, 16-17 May, 2016, Austin, Texas, United StatesCharith Perera
 
IS-EUD-2015, Madrid, Spain, 27 May 2015
IS-EUD-2015, Madrid, Spain, 27 May 2015IS-EUD-2015, Madrid, Spain, 27 May 2015
IS-EUD-2015, Madrid, Spain, 27 May 2015Charith Perera
 

Más de Charith Perera (6)

SL2College: Undergraduate Research and higher Education, March 2017, Peradeni...
SL2College: Undergraduate Research and higher Education, March 2017, Peradeni...SL2College: Undergraduate Research and higher Education, March 2017, Peradeni...
SL2College: Undergraduate Research and higher Education, March 2017, Peradeni...
 
UCC-2016, 6-9 May December, Shanghai, China
UCC-2016, 6-9 May December, Shanghai, ChinaUCC-2016, 6-9 May December, Shanghai, China
UCC-2016, 6-9 May December, Shanghai, China
 
AAMAS-2017 8-12 May, 2017, Sao Paulo, Brazil
AAMAS-2017 8-12 May, 2017, Sao Paulo, BrazilAAMAS-2017 8-12 May, 2017, Sao Paulo, Brazil
AAMAS-2017 8-12 May, 2017, Sao Paulo, Brazil
 
Building Open Data Markets Using Sensing as a Service Model
Building Open Data Markets Using Sensing as a Service ModelBuilding Open Data Markets Using Sensing as a Service Model
Building Open Data Markets Using Sensing as a Service Model
 
SEAMS-2016, 16-17 May, 2016, Austin, Texas, United States
SEAMS-2016, 16-17 May, 2016, Austin, Texas, United StatesSEAMS-2016, 16-17 May, 2016, Austin, Texas, United States
SEAMS-2016, 16-17 May, 2016, Austin, Texas, United States
 
IS-EUD-2015, Madrid, Spain, 27 May 2015
IS-EUD-2015, Madrid, Spain, 27 May 2015IS-EUD-2015, Madrid, Spain, 27 May 2015
IS-EUD-2015, Madrid, Spain, 27 May 2015
 

Último

Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 

Último (20)

Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 

WF-IOT-2014, Seoul, Korea, 06 March 2014

  • 1. Sensor Discovery and Configuration Framework for The Internet of Things Paradigm Charith Perera, Prem Prakash Jayaraman, Arkady Zaslavsky, Peter Christen, Dimitrios Georgakopoulos IEEE WORLD FORUM ON INTERNET OF THINGS 2014, SEOUL, KOREA 6-8 MARCH 2014.
  • 2. Agenda • Background and The Problem • Challenges and Functional Requirements • The Proposed Solution: CADDOT • Design Decisions and Applications • Implementation and Evaluation • Experimentation Results and Discussion • Conclusion and Future Work Slide 2 of 20
  • 3. Background and The Problem • Internet of Things (IoT) will comprise billions of devices that can sense, communicate, compute and potentially actuate. • The data generated by the Internet of ‘Things’ are valuable and have the potential to drive innovative and novel applications. • The challenging task before collecting and processing data from these devices is for systems to discover and configure the sensors and the associated data streams (a) Big Data comprises six categories of data (b) Data generated from the IoT will grow exponentially as the number of connected nodes increases. Estimated numbers of connected nodes based on different sectors are presented in millions Slide 3 of 20
  • 4. Challenges and Functional Requirements Large number of sensors Heterogeneity: Communication Sequences Slide 4 of 20 Heterogeneity: Sensor Output numerical, audio, video Heterogeneity: Communication Technology (Protocol)
  • 5. Challenges and Functional Requirements Heterogeneity: Sensing Capability (Measurements) Data Acquisition Methods Slide 5 of 20
  • 6. Challenges and Functional Requirements Dynamicity Slide 6 of 20 Context
  • 7. The Proposed Solution: CADDOT • Phases in CADDOT model: The proposed model consists of eight phases: detect, extract, identify, find, retrieve, register, reason, and configure. • To support this model, we developed a tool called SmartLink Slide 7 of 20
  • 8. Design Decisions and Applications • In strategy (a), a Raspberry Pi (raspberrypi.org) is acting as the SmartLink tool. This strategy is mostly suitable for smart home and office environments where WiFi is available. Wall-mounted Devices with a screen powered by Android, capability equals to a modern mobile phone Slide 8 of 20 • The strategy (b) is more suitable for situations where WiFi is not available or less dynamic. Smart agriculture can be considered as an example.
  • 9. Design Decisions and Applications • A simple sensor-level program design (SPD) that sends and transmits data to the cloud. • The main problem in this program design is that there is no way to configure (i.e. sampling rate, communication frequency, data acquisition method) the sensor after deployment other than by re-programming (e.g. Over the Air Programming). • Such re-programming approaches are complex, labour-intensive and time consuming. Slide 9 of 20
  • 10. • We designed, Configurable Program Design (CPD), a sensor-level program that supports a comprehensive set of configuration functionalities • To standardize the communication, we also defined a number of command formats. • These messaging formats do not need to be followed by the developers as long as they share common standardised command formats between their own sensor-level program and the corresponding plugin. • This program is designed into a tree structure where we carefully manage the breath and depth to minimize travel time through IF-ELSE statements. Slide 10 of 20
  • 11. Design Decisions and Applications • The first segment of every command (Not the messages sent out) contains only three letters which makes it easy to process. The commands can be sent using frames or plain strings. • For Details Please refer to Charith Perera, Prem Jayaraman, Arkady Zaslavsky, Peter Christen, and Dimitrios Georgakopoulos, Contextaware Dynamic Discovery and Configuration of `Things' in Smart Environments, In Book Big Data and Internet of Things: A Roadmap for Smart Environments, Studies in Computational Intelligence book series, Springer Berlin Heidelberg, accepted, to be published in 2014 Slide 11 of 20
  • 12. Design Decisions and Applications • CADDOT uses a plugin architecture to address the challenge of different types of heterogeneity. • Plugins can be developed, distributed and installed separately to SmartLink. Slide 12 of 20
  • 13. Implementation and Evaluation • We deployed the SmartLink application in a Google Nexus 4 mobile phone (Qualcomm Snapdragon S4 Pro CPU and 2 GB RAM), which runs the Android platform 4.2.2 (Jelly Bean). • Libelium Sensors are used for this Experimentation. • SmartLink supports sensor discovery and configuration using both WiFi and Bluetooth. • In order to simulate the heterogeneity of the sensors (in terms of communication sequence), we programmed each sensor to behave and respond differently. • As a result, each sensor can only communicate with a plugin that supports the same communication sequence. Slide 13 of 20
  • 14. Experimentation Results and Discussion Time taken (y-axis) to discover and configure a sensor step-by-step (x-axis). The experiments were conducted using three protocols: TCP, UDP, and Bluetooth. Time taken to (1) set up the sensor, (2) initiate connection between the sensor and SmartLink, (3) initiate communication between sensor and SmartLink, (4) extract sensor identification information, (5) retrieve the complete profile of the sensor, (6) configure the sampling rate, (7) configure the communication frequency, (8) configure the sensing schedule, (9) configure the network and authentication details (10) connect to the secure network using the provided authentication details.. Slide 14 of 20
  • 15. Experimentation Results and Discussion • The actual configuration tasks take less that one second. • There is a slight variation in completion time in configuration step (4) - (9). This is due to storage access and differences in processing of configuration commands. • Sensors takes comparatively longer time to connect to a network as well as to discover and connect to SmartLink • Bluetooth takes much longer to scan for devices in a given environment before it discovers and connects to SmartLink. • Configuration is slightly faster when using TCP in comparison to UDP and Bluetooth. However, the time differences are negligible. • FTP can take 15-25 seconds to retrieve a scheduling file. • When using WiFi, a sensor may takes up to 4.5 seconds to connect to a secure network (e.g. WPA2). Sensors can connect to open access point in less than 4 seconds. • Despite the protocol we use, sensors take 5 to 15 seconds to boot and setup themselves. The setup stage consists of activities such as reading default configuration from files, and switching necessary modules and components (communication modules, real-time clock, SD card, sensor broads and so on). Slide 15 of 20
  • 16. Conclusion and Future Work • We explored the barriers in deploying IoT solutions in order to build smart environments and understood that sensor discovery configuration is one of the major challenges. • CADDOT also encourages non-technical users to adopt IoT solutions with ease towards building their own smart environments. • We proposed the CADDOT model by considering key factors such as growing number of sensors, heterogeneity, on-demand schedules, and sampling rates, data acquisition methods, and dynamicity. • In the future, we will explore the possibilities of developing an efficient technique to identify a given sensor using context information and probabilistic techniques in circumstances where information extracted in step 2 in CADDOT model is not adequate. Slide 16 of 20
  • 17. Thank You! Charith Perera The Australian National University CSIRO Computational Informatics t +61 2 6216 7135 e Charith.Perera@ieee.org w www.charithperera.net DECISION AND USER SCIENCE / INFORMATION ENGINEERING LAB