Fiot Unit - 5
Fiot Unit - 5
Cloud Computing
The term Cloud refers to a Network or Internet. In other words, we can say that
Cloud is something, which is present at remote location. Cloud can provide
services over public and private networks, i.e., WAN, LAN or VPN.
Applications such as e-mail, web conferencing, customer relationship
management (CRM) execute on cloud.
loud Computing refers to manipulating, configuring, and accessing the hardware
and software resources remotely. It offers online data storage, infrastructure, and
application.
Basic Concepts
There are certain services and models working behind the scene making the cloud
computing feasible and accessible to end users. Following are the working models
for cloud computing:
1
• Deployment Models
• Service Models
Deployment Models
Deployment models define the type of access to the cloud, i.e., how the cloud is
located? Cloud can have any of the four types of access: Public, Private, Hybrid,
and Community.
Public Cloud
The public cloud allows systems and services to be easily accessible to the
general public. Public cloud may be less secure because of its openness.
Private Cloud
Community Cloud
Hybrid Cloud
2
The hybrid cloud is a mixture of public and private cloud, in which the critical
activities are performed using private cloud while the non-critical activities are
performed using public cloud.
Service Models
Cloud computing is based on service models. These are categorized into three
basic service models which are -
• Infrastructure-as–a-Service (IaaS)
• Platform-as-a-Service (PaaS)
• Software-as-a-Service (SaaS)
Anything-as-a-Service (XaaS) is yet another service model, which includes
Network-as-a-Service, Business-as-a-Service, Identity-as-a-Service, Database-as-
a-Service or Strategy-as-a-Service.
The Infrastructure-as-a-Service (IaaS) is the most basic level of service. Each
of the service models inherit the security and management mechanism from the
underlying model, as shown in the following diagram:
Infrastructure-as-a-Service (IaaS)
3
IaaS provides access to fundamental resources such as physical machines, virtual
machines, virtual storage, etc.
Platform-as-a-Service (PaaS)
Software-as-a-Service (SaaS)
The concept of Cloud Computing came into existence in the year 1950 with
implementation of mainframe computers, accessible via thin/static clients. Since
then, cloud computing has been evolved from static clients to dynamic ones and
from software to services. The following diagram explains the evolution of cloud
computing:
Benefits
Cloud Computing has numerous advantages. Some of them are listed below -
• One can access applications as utilities, over the Internet.
• One can manipulate and configure the applications online at any time.
4
• It does not require to install a software to access or manipulate cloud
application.
• Cloud Computing offers online development and deployment tools,
programming runtime environment through PaaS model.
• Cloud resources are available over the network in a manner that provide
platform independent access to any type of clients.
• Cloud Computing offers on-demand self-service. The resources can be
used without interaction with cloud service provider.
• Cloud Computing is highly cost effective because it operates at high
efficiency with optimum utilization. It just requires an Internet connection
• Cloud Computing offers load balancing that makes it more reliable.
5
It is the biggest concern about cloud computing. Since data management and
infrastructure management in cloud is provided by third-party, it is always a risk
to handover the sensitive information to cloud service providers.
Although the cloud computing vendors ensure highly secured password protected
accounts, any sign of security breach may result in loss of customers and
businesses.
Lock In
It is very difficult for the customers to switch from one Cloud Service Provider
(CSP) to another. It results in dependency on a particular CSP for service.
Isolation Failure
This risk involves the failure of isolation mechanism that separates storage,
memory, and routing between the different tenants.
It is possible that the data requested for deletion may not get deleted. It happens
because either of the following reasons
• Extra copies of data are stored but are not available at the time of deletion
• Disk that stores data of multiple tenants is destroyed.
There are four key characteristics of cloud computing. They are shown in the
following diagram:
6
On Demand Self Service
Cloud Computing allows the users to use web services and resources on demand.
One can logon to a website at any time and use them.
Resource Pooling
Cloud computing allows multiple tenants to share a pool of resources. One can
share single physical instance of hardware, database and basic infrastructure.
Rapid Elasticity
It is very easy to scale the resources vertically or horizontally at any time. Scaling
of resources means the ability of resources to deal with increasing or decreasing
demand.
7
The resources being used by customers at any given point of time are
automatically monitored.
Measured Service
In this service cloud provider controls and monitors all the aspects of cloud
service. Resource optimization, billing, and capacity planning etc. depend on it.
Deployment Models
Benefits
There are many benefits of deploying cloud as public cloud model. The following
diagram shows some of those benefits:
8
Cost Effective
Since public cloud shares same resources with large number of customers it turns
out inexpensive.
Reliability
The public cloud employs large number of resources from different locations. If
any of the resources fails, public cloud can employ another one.
Flexibility
The public cloud can smoothly integrate with private cloud, which gives
customers a flexible approach.
Location Independence
9
Public cloud is also based on pay-per-use model and resources are accessible
whenever customer needs them.
High Scalability
Cloud resources are made available on demand from a pool of resources, i.e., they
can be scaled up or down according the requirement.
Disadvantages
Low Security
In public cloud model, data is hosted off-site and resources are shared publicly,
therefore does not ensure higher level of security.
Less Customizable
10
Benefits
There are many benefits of deploying cloud as private cloud model. The following
diagram shows some of those benefits:
11
Private cloud operations are not available to general public and resources are
shared from distinct pool of resources. Therefore, it ensures
high security and privacy.
More Control
The private cloud has more control on its resources and hardware than public
cloud because it is accessed only within an organization.
The private cloud resources are not as cost effective as resources in public clouds
but they offer more efficiency than public cloud resources.
Disadvantages
The private cloud is only accessible locally and is very difficult to deploy
globally.
High Priced
Limited Scalability
The private cloud can be scaled only within capacity of internal hosted resources.
Additional Skills
12
Benefits
There are many benefits of deploying cloud as hybrid cloud model. The following
diagram shows some of those benefits:
Scalability
It offers features of both, the public cloud scalability and the private cloud
scalability.
Flexibility
13
Cost Efficiency
Public clouds are more cost effective than private ones. Therefore, hybrid clouds
can be cost saving.
Security
Disadvantages
Networking Issues
Security Compliance
It is necessary to ensure that cloud services are compliant with security policies of
the organization.
Infrastructure Dependency
14
Benefits
Cost Effective
Community cloud offers same advantages as that of private cloud at low cost.
15
Sharing Among Organizations
Security
The community cloud is comparatively more secure than the public cloud but less
secured than the private cloud.
Issues
• Since all data is located at one place, one must be careful in storing data in
community cloud because it might be accessible to others.
• It is also challenging to allocate responsibilities of governance, security and
cost among organizations.
Cloud Service Models
16
Benefits
IaaS allows the cloud provider to freely locate the infrastructure over the Internet
in a cost-effective manner. Some of the key benefits of IaaS are listed below:
• Full control of the computing resources through administrative access to
VMs.
• Flexible and efficient renting of computer hardware.
• Portability, interoperability with legacy applications.
17
Flexible and efficient renting of computer hardware
Issues
IaaS shares issues with PaaS and SaaS, such as Network dependence and browser
based risks. It also has some specific issues, which are mentioned in the following
diagram:
18
Compatibility with legacy security vulnerabilities
The VM can become out-of-date with respect to security updates because IaaS
allows the customer to operate the virtual machines in running, suspended and off
state. However, the provider can automatically update such VMs, but this
mechanism is hard and complex.
The customer uses virtual machines that in turn use the common disk resources
provided by the cloud provider. When the customer releases the resource, the
cloud provider must ensure that next customer to rent the resource does not
observe data residue from previous customer.
Characteristics
19
has a feature of point-and-click tools that enables non-developers to create web
applications.
App Engine of Google and Force.com are examples of PaaS offering vendors.
Developer may log on to these websites and use the built-in API to create web-
based applications.
But the disadvantage of using PaaS is that, the developer locks-in with a
particular vendor. For example, an application written in Python against API of
Google, and using App Engine of Google is likely to work only in that
environment.
The following diagram shows how PaaS offers an API and development tools to
the developers and how it helps the end user to access business applications.
Benefits
20
Lower administrative overhead
Customer need not bother about the administration because it is the responsibility
of cloud provider.
Customer need not purchase expensive hardware, servers, power, and data
storage.
Scalable solutions
Issues
21
Like SaaS, PaaS also places significant burdens on customer's browsers to
maintain reliable and secure connections to the provider’s systems. Therefore,
PaaS shares many of the issues of SaaS. However, there are some specific issues
associated with PaaS as shown in the following diagram:
22
Since PaaS applications are dependent on network, they must explicitly use
cryptography and manage security exposures.
Characteristics
PaaS Types
Based on the functions, PaaS can be classified into four types as shown in the
following diagram:
23
The application delivery PaaS includes on-demand scaling and application
security.
Open PaaS offers an open source software that helps a PaaS provider to run
applications.
Characteristics
24
• SaaS offers shared data model. Therefore, multiple users can share single
instance of infrastructure. It is not required to hard code the functionality
for individual users.
• All users run the same version of the software.
Benefits
The customer can have single license for multiple computers running at different
locations which reduces the licensing cost. Also, there is no requirement for
license servers because the software runs in the provider's infrastructure.
The cloud provider stores data centrally. However, the cloud providers may store
data in a decentralized manner for the sake of redundancy and reliability.
25
All platform responsibilities such as backups, system maintenance, security,
hardware refresh, power management, etc. are performed by the cloud provider.
The customer does not need to bother about them.
Multitenant solutions
Issues
There are several issues associated with SaaS, some of them are listed below:
If the customer visits malicious website and browser becomes infected, the
subsequent access to SaaS application might compromise the customer's data.
To avoid such risks, the customer can use multiple browsers and dedicate a
specific browser to access SaaS applications or can use virtual desktop while
accessing the SaaS applications.
Network dependence
Transferring workloads from one SaaS cloud to another is not so easy because
work flow, business logics, user interfaces, support scripts can be provider
specific.
26
Open SaaS uses those SaaS applications, which are developed using open source
programming language. These SaaS applications can run on any open source
operating system and database. Open SaaS has several benefits listed below:
• No License Required
• Low Deployment Cost
• Less Vendor Lock-in
• More portable applications
• More Robust Solution
The following diagram shows the SaaS implementation based on SOA:
Introduction:
27
✓ Simulation tools provide reliable, scalable and repeatable
environment for performance evaluatio
✓ Testing at no cost
✓ Design of countermeasures
✓ CloudSim
✓ CloudAnalyst
✓ GreenCloud
✓ iCanCloud
✓ GroudSim
✓ DCSim
CloudSim:
✓ A simulation framework
28
▪ Allows to examine the performance of application services.
Advantages of CloudSim
▪ Minimum time
▪ Minimum effort
Features of CloudSim
✓ Message-passing applications
CloudSim Architecture
29
✓ CloudSim: Middle layer
▪ Event scheduling
▪ Entity creation
▪ Clock management
Basic entities:
▪ Users
▪ Physical Machines
▪ Virtual Machines
▪ Scheduling policies
30
Middle Layer:CloudSim:
CloudAnalyst:
31
✓ Simulation tool designed based on CloudSim
✓ Provides GUI
Features of CloudAnalyst:
✓ Repeatability of experiments
CloudAnalyst Design:
Main components
32
• CloudAppServiceBroker: Entities for routing between
GreenCloud:
✓ Why:
✓ What:
✓ How:
Features of GreenCloud:
33
Open Source and Commercial Clouds:
OpenStack:
✓ Ease of use: add new instances quickly to run other cloud components
Microsoft Azure:
34
✓ Supports extensive set of services to quickly create, deploy and manage
applications
✓ Low Cost
✓ Solves the issues related to most of the operating systems, servers and
networking.
35
✓ Supports pay-per-use billing rather than making large and expensive
hardware purchases
✓ Instance types
✓ Operating system:
✓ Persistent storage:
36
✓ Elastic IP address: Mapping between IP and any VM of user
Introduction to Openstack:
✓ Opensource
✓ Eg. IBM, CISCO, HP, Dell, Vmware, Redhat, suse, Rackspace hosting
✓ Versions:
37
Openstack Components:
❖
❖ Keystone
o Identity service
❖ Horizon
o Dashboard
❖ Nova
o Compute service
❖ Glance
o Image service
o Snapshots
38
❖ Swift
o Object storage
Neutron
❖ Cinder
o Block storage
❖ Heat
o Orchestration
❖ Ceilometer
o Billing
✓ Installation:
Can be installed manually or using scripts like Devstack
✓ Steps:
39
▪ Clone devstack ( git clone https://git.openstack.org/openstack‐
dev/devstack )
▪ Open local.conf file and paste the following and save the file
Sensor-Cloud
Introduction
✓ It is not mere integration of sensors and cloud computing
✓ It is not only “dumping the sensor data into cloud”
✓ Not only the mere integration of cloud computing and sensor
networks, but sensor‐cloud is more than that.
✓ Concept of virtualization of sensor node.
✓ Pay‐per‐use.
✓ One sensor node/network appears as many.
✓ A stratum between sensor nodes and end‐users.
Virtualization Concept
✓ One computer host appears as many computers‐concept of Virtual
Machine (VM).
40
✓ Improve IT throughput and costs by using physical resources as a
pool from which virtual resources can be allocated.
✓ Benefit
✓ Sharing of resources: Same resource can be shared, in turn
cost reduction.
✓ Encapsulation: A complete computing environment
✓ Independence: Runs independently of underlying hardware
✓ Portability: VM Migration
Difference with WSN
Actors in Sensor-cloud
✓ End‐users
41
✓ Enjoy SaaS through applications as per the requirements.
✓ Unknown about what and which physical sensor is/are
allocated to serve the application
✓ Sensor‐owner
✓ Plays a role from business perspective.
✓ They purchase physical sensor devices, deployed over
different geographical locations, and lend these devices to
the sensor‐cloud
✓ Sensor‐Cloud Service Provider (SCSP)
✓ A business actor.
✓ SCSP charges price from the end‐users as per their usage of
Se‐aaS.
Sensor-cloudArchitecture:
42
✓ End‐users: Registered themselves, selects templates, and request
for application(s)
✓ Sensor‐owner: Deploy heterogeneous/ homogeneous physical
sensor nodes over different geographical location
✓ SCSP: Plays managerial role
Management Issues in Sensor-Cloud:
✓ Optimal Composition of virtual sensor nodes
✓ Data Caching
✓ Optimal Pricing
Optimal Composition of Virtual Sensor:
✓ Efficient virtualization of the physical sensor nodes
✓ An optimal composition of VSs
✓ Consider same geographic region: CoV‐I
✓ Spanning across multiple regions: CoV‐II
Why Composition of Virtual Sensor?
✓ Resource‐constrained sensor nodes
✓ Dynamic change in sensor conditions
✓ The composition of virtual sensors are non‐traditional
CoV-I: Formation of Virtual Sensor
Optimal formation of sensor nodes are homogeneous sensor nodes with
in samw geographical boundaries.
43
CoV-II: Formation of Virtual Sensor
Optimal formation of sensor nodes are heterogeneous sensor nodes with
in same geographical boundaries.
44
Dynamic and Adaptive Data Caching Mechanism:
✓ Due to the slow change in environment, the sensed data of physical sensors
unaltered
✓ Takes decision whether the data should be provided directly to the end
user or is it required to re‐cache the data from external cache
45
Dynamic Optimal Pricing for Sensor-Cloud Infrastructure:
46
Fog Computing:
✓ The idea of fog computing is to extend the cloud nearer to the IoT devices.
✓ The primary aim: solve the problems faced by cloud computing during IoT
data processing.
✓ 40% of the whole worlds data will come from sensors alone by 2020.
✓ 90% of the world’s data were generated only during the period of last two
years.
47
✓
✓ the total number of connected vehicles worldwide will be 250 millions by
2020.
✓ Issues are:
✓ Volume
✓ Latency
✓ Bandwidth
Data Volume:
48
✓ Device density is still increasing everyday.
Latency
✓ If edge devices send time sensitive data to cloud for analysis and wait for
the cloud to give a proper action, then it can lead to many unwanted results.
✓ Latency = T
fron device to cSoud + Tdata anaSycic
+T
fron cSoud to device
where T = Time
✓ When the action reaches the device, accident may have already occured
Bandwidth:
✓ If all the data generated by IoT devices are sent to cloud for storage
and analysis, then, the traffic generated by these devices will be
simply gigantic.
49
✓ consumes almost all the bandwidths.
✓ If all the devices become online even IPv6 will not be able to provide
facility to all the devices
✓ Data may be confidential which the firms do not want to share online
Requirements of IoT:
✓ Latency can be reduced by analyzing the data close to the data source
✓ Data security:
✓ Operation reliability:
✓ The data generated from IoT devices are used to solve real time
problem
50
✓ time sensitive data
✓ Extremely time sensitive data should be analyzed very near to the data
source
✓ Data which are not time sensitive will be analyzed in the cloud.
Architecture of Fog:
✓ Sensor data are processed in the fog before it is sent to the cloud
✓ Reduces latency, save bandwidth and save the storage of the cloud
51
Fog nodes:
✓ Computing facility
Working of Fog:
52
✓ Very time‐sensitive data
✓ The nearest fog node ingest the data from the devices.
53
✓ After analysis, the aggregate node send the decision or action to the
device through the nearest node
✓ The aggregate node sends the summary to cloud for storage and
future analysis.
✓ Non‐time‐sensitive data
Advantages of Fog:
✓ Security
54
✓ Reduces unwanted accidents
✓ Better privacy
✓ Business agility
✓ Support mobility
55
Applications of Fog:
✓ Stroke patients
✓ Power efficient
✓ For high speed train, sending the data in cloud for analysis is
inefficient
✓ Pipeline optimization
✓ Sending all this data to cloud for analysis and storage is not efficient
56
✓ Network latency is not acceptable
✓ Fog is a solution
Challenges of FOG:
✓ Fault tolerance
✓ Programming architecture
57
Smart Cities and Smart Homes:
Introduction:
▪ An urban system
Analogy:
58
Cognition Software
✓ Smart Homes
▪ Health monitoring.
✓ Smart Vehicles
▪ Self diagnostics.
✓ Smart Health
▪ Auto alert generation in case of emergency medical episodes (e.g. Heart attacks,
seizures).
✓ Smart Energy
59
▪ Smart metering systems.
✓ Smart Agriculture
60
▪ Device failures still significant
✓ Large scale
▪ Delay due to large scale deployments.
▪ Delay due to mobility of deployed nodes.
▪ Distribution of devices can affect monitoring tasks.
✓ Legal and Social aspects
▪ Services based on user provided information may be subject
to local or international laws.
▪ Individual and informed consent required for using humans
as data sources.
✓ Big data
▪ Transfer, storage and maintenance of huge volumes of data is
expensive.
▪ Data cleaning and purification is time consuming.
▪ Analytics on gigantic data volumes is processing intensive.
✓ Sensor Networks
▪ Choice of appropriate sensors for individual sensing tasks is
crucial.
▪ Energy planning is crucial.
▪ Device placement and network architecture is important for
reliable end-to-end IoT implementation.
▪ Communication medium and means play an important role in
61
seamless function of IoT in smart cities.
Smart Cities-Data Fusion:
✓ Enormous volume of data is produced periodically in a smart city
environment.
✓ Challenges include making the available/ incoming large data
volume precise and accurate.
✓ Quality of data precision and accuracy affects the quality of
decision making in IoT-enabled smart cities.
✓ Data fusion enables optimum utilization of massive data gathered
from multiple sources, and across multiple platforms.
✓ Combines information from multiple sensor sources.
✓ Enhances the ability of decision making systems to include a
multitude of variables prior to arriving at a decision.
✓ Inferences drawn from multiple sensor type data is qualitatively
superior to single sensor type data.
✓ Information fusion generated from multiple heterogeneous sensors
provides for better understanding of the operational surroundings.
✓ Combines information from multiple sensor sources.
✓ Enhances the ability of decision making systems to include a
multitude of variables prior to arriving at a decision.
✓ Inferences drawn from multiple sensor type data is qualitatively
superior to single sensor type data.
62
✓ Information fusion generated from multiple heterogeneous sensors
provides for better understanding of the operational surroundings.
Challenges:
63
Smart Home-Introduction:
✓ Smart home infrastructure consists of:
▪ Intelligent networking device infrastructure
▪ Seamless integration of various devices using wired/wireless
technologies
✓ Allows ease of use for household systems.
✓ Creates a highly personalized and safe home space
✓ Corporations seriously indulging in smart home systems include
GE, Cisco, Google, Microsoft, and others.
✓ Provides productive and cost-efficient environment.
✓ Maximizes the effectiveness of the occupants.
✓ Provides efficient management with minimum life-time costs of
hardware and facilities.
✓ Optimizes-
✓ Structures
✓ Systems
✓ Services and management
✓ Interrelationships between the above three.
Smart Home Aspects:
64
Home Area Networks (HANs)
✓ Network contained within a home.
✓ Enables remote access and control of devices and systems.
✓ Provides amalgamation of various systems within a home, such as
– security systems, home automation systems, personal media,
communication, etc.
HAN Elements:
Internet Protocol (IP)
✓ Multi-protocol gateway bridges non-IP network to IP network.
✓ Bridging between new technologies is limited.
✓ For new technologies or networks, a new mapping is required for
bridging to perform satisfactorily.
Wired HAN
▪ Easy integration with pre- existing house infrastructure.
65
▪ Low cost.
▪ Can use power lines, coaxial cables, telephone lines, optical fibers,
and other such technologies for communication.
Wireless HAN
▪ Can use popular home Wi-Fi, ZigBee, and even new
standards, such as 6LoWPAN.
▪ Wireless makes implementation easy.
HAN Medium Classification:
HAN Standards:
UPnP:
✓ Universal Plug and Play (UPnP).
✓ Application layer technology, mainly web-based.
66
✓ TCP/IP protocol stack provides support for the lower layers, and
enables seamless integration of various technologies.
✓ Provides transparent networking with support for zero-
configuration networking and automatic discovery of devices.
DLNA:
✓ Digital Living Network Alliance (DLNA)
✓ Trade organization created by Sony,
Intel, and Microsoft.
✓ Connects cable-based networks with wireless networks for
increased sharing of media, control and access.
✓ Domestically shares network media resources.
KNX:
✓ Konnex (KNX): an open important standard for home and
building networks.
✓ Utilizes the full range of home communication infrastructure –
Power lines, coaxial cables, twisted pair, RF, etc.
✓ Must be setup and configured via a software before its proper
usage.
LonWorks:
✓ Local Operation Networks (LonWorks).
✓ Every device includes a Neuron Chip, a transceiver and the
application electronics.
67
✓ Neuron chip is a SOC with multiple microprocessors, RAM, ROM
and IO interface ports.
✓ Splits device groups into intelligent elements, which can
communicate through a physical communication medium.
Zigbee:
✓ Zigbee consists of four layers – Physical, Medium Access Control,
Network, and Application.
✓ Physical and MAC layers are defined by IEEE802.15.4, whereas
Network and Application are defined by Zigbee.
✓ Aims at low-cost, low-energy devices.
✓ ZigBee Alliance is composed of Mitsubishi, Honeywell, Invensys,
Motorola and Philips.
X-10.
✓ X-10 enables remote control of compliant transmitters and
receivers over power lines and electrical wirings present in the
house.
✓ Adopted by GE and Philips.
✓ Standard defines procedures for transmission of bits over AC
carrier signals.
✓ Low-speed and low data rate.
✓ Mainly used for control of lighting, appliance networks and
security sensors.
68
HAN Architectures:
✓ Uses XML for description and web- services for control.
✓ Follows a Service oriented Architecture
(SOA).
✓ Not tied to any software, language or architecture.
✓ A central gateway connects different technologies.
✓ A tech Manager for each technology provides web services for
control and access.
✓ Connects various devices sharing their resources with auto-
configuration and auto-installation.
✓ Based on JAVA environment and pursued
by Sun Microsystems (Now, Oracle).
✓ Constructs an organized distribution system without a central node
(federation).
✓ Jini apps use bytecode to run JVM, and are portable.
✓ Follows Object Oriented Paradigm.
✓ Middleware for embedded intelligent systems.
✓ Connects a Service Oriented
Architecture Network.
✓ Connected devices may have limited resources, low processing
power, memory or energy consumption.
69
✓ Each device has an embedded HYDRA client which acts as a
proxy between the device and the middleware.
HYDRA Protocol:
HAN Initiatives:
▪ Ambient intelligent systems
▪ For networked home systems
▪ Features user-friendly interfaces, interoperability, and automatic
discovery of devices and services.
70
Smart Grid
Introduction:
✓ Advancement of traditional electrical grid
✓ Traditional electrical grid
✓ Energy generation is done in centralized power plants
✓ Energy distribution is one directional – from the power plant
to the homes or industries.
✓ Monitoring and restoration of grid is done manually
✓ Uni‐directional communication
✓ Smart Grid –
✓ Achieve high reliability in power systems
✓A cyber‐physical system equipped with sustainable
models of energy production, distribution,
and usage
✓ Smart grid is conceptualized as a planned nation wide network that
uses information technology to deliver electricity efficiently,
reliably, and securely.
✓ Smart grid is also named as –
✓ Electricity with a brain
✓ The energy internet
✓ The electronet
✓ According to the definition given by NIST, smart grid is – “a
modernized grid that enables bidirectional flows of energy and
71
uses two‐way communication and control capabilities that will
lead to an array of new functionalities and applications.”
Benefits of Smart Grid:
✓ Benefits associated with the Smart Grid include:
✓ More efficient transmission of electricity
✓ Quicker restoration of electricity after power disturbances
✓ Reduced operations and management costs for utilities, and
ultimately lower power costs for consumers
✓ Reduced peak demand, which will also help lower electricity
rates
✓ Increased integration of large‐scale renewable energy
systems
✓ Better integration of customer‐owner power generation
systems, including renewable energy systems
✓ Improved security
✓ Using smart grid, both the consumers and the energy service
providers or stakeholders get benefited.
Benefits of Customers:
✓ For consumers, the benefit of using smart grid are as follows:
✓ Updated information on their energy usage in real‐time
✓ Enabling electric cars, smart appliances, and other smart
devices to be charged
72
✓ Program the smart devices to run during off‐peak hours to
lower energy bills
✓ Different pricing options
Benefits to Stakeholders:
✓ For stakeholders, the benefit of using smart grid are as follows:
✓ Increase grid reliability
✓ Reduce the frequency of power blackouts and brownouts
✓ Provide infrastructure for monitoring, analysis, and
decision‐making
✓ Increase grid resiliency by providing detailed information
✓ Reduce inefficiencies in energy delivery
✓ Integrate the sustainable resources of wind and solar
alongside the main grid
✓ Improve management of distributed energy resources,
including micro‐grid operations and storage management.
Properties of Smart Grid:
✓ Power System Efficiency
✓ Power Monitoring
✓ Asset Management and optimal utilizations
✓ Distribution Automation and Protection
✓ Power Quality
✓ Self‐Healing
73
✓ Frequency Monitoring and Control
✓ Load Forecasting
✓ Anticipation of Disturbances
✓ Consumer Participation
✓ Real‐time monitoring of consumption
✓ Control of smart appliances
✓ Building Automation
✓ Real‐time Pricing
✓ Distributed Generation
✓ Integration of renewable energy resources
✓ Integration of micro‐grid
Components of Smart Grid:
74
Smart Home:
✓ Smart home uses emerging smart grid technologies to save energy,
seek out the lowest rates, and contribute to the smooth and
efficient functioning of our electric grid
✓ The interactive relationship between the grid operators, utilities,
and consumers helps in proper functioning of smart grid
technologies
✓ Computerized controls in smart homes helpseto minimiz
energy use at times when the power grid is under stress from
high demand, or even to shift some of their power use to times
when power is available at a lower cost, i.e., from on‐ peak hours
to off‐peak hours
✓ Smart home depends on –
✓ Smart meters and home energy management systems
✓ Smart appliances
✓ Home power generation
✓ Smart Meters
✓ Provide the Smart Grid interface between consumer and the
energy service provider
✓ Operate digitally
✓ Allow for automated and complex transfers of information
between consumer‐end and the energy service provider
✓ Help to reduce the energy costs of the consumers
75
✓ Provides information about usage of electricity in different
service areas to the energy service providers
✓ Home energy management systems
✓ Allows consumers to track energy usage in detail to better
save energy
✓ Allows consumers to monitor real‐time information and price
signals from the energy service provider
✓ Allows to create settings to automatically use power when
prices are lowest
✓ Avoids peak demand rates
✓ Helps to balance the energy load in edaifferent ar
✓ Prevents blackouts
✓ In return, the service provider also may choose to provide financial
incentives
✓ Smart Appliances
✓ Automated and robust in nature
✓ Response to signals from the energy service provider to avoid
using energy during times of peak demand
✓ Include consumer controls to override the automated controls
✓ By overriding, the consumer can consume energy as per their
requirement, while paying minimum is not ensured
✓ Home Power Generation
✓ Power generation system at consumers‐end
76
✓ Rooftop solar electric systems
✓ Small wind turbines
✓ Small hydropower System
✓ Home fuel cell systems – produce heat and power from
natural gas
✓ Surplus energy generated by the home power generation systems
can be fed back into the grid
✓ In case of “Islanding”, a home can have power from distributed
resources, i.e., home power generation systems
Renewable Energy:
✓ According to the International Energy Agency –
✓ “Renewable energy is derived from natural processes that
are replenished constantly. In its various forms, it derives
directly from the sun, or from heat generated deep within the
earth. Included in the definition is electricity and heat
generated from solar, wind, ocean, hydropower, biomass,
geothermal resources, and biofuels and hydrogen derived
from renewable resources.”
✓ Reduced environmental pollution
✓ Consumers capable of generating energy from renewable energy
resources are less dependent on the micro‐grid or main grid
✓ In addition to that, they can supply surplus amount of energy from
the renewable resources and can make profit out of it
Consumer Engagement:
77
✓ Consumers can –
✓ Save energy with proper scheduling of smart home
appliances
✓ Pay less for consuming energy in off‐peak hours
✓ Energy service provider gives incentives based on the energy
consumption of the consumer and they can save money
✓ Consumers’ involvement in following ways:
✓ Time‐of‐Use pricing
✓ Net metering
✓ Financial incentives
✓ In Time‐of‐Use pricing
✓ The consumers are encouraged to consume energy in
off‐peak hours when the energy load is less
✓ Throughout the day, the energy load on the grids are dynamic
✓ In on‐peak hours, if the requested amount of energy is higher, it
leads to –
✓ Less‐efficient energy distribution
✓ More pollution – it depends on the non‐renewable energy
resource to meet the peak requirement
✓ Home energy management system tries to schedule the smart
appliances in off‐ peak hours
✓ To ensure efficient service
✓ To pay less
78
✓ Net metering
✓ It is feasible with the installation of smart meters
✓ Consumers are paid high, if they are supplying excess
amount of generated energy to the grid in on‐peak hours
✓ The price is less in case of off‐peak hours
✓ Final bills to be paid by the consumers depends on
✓ The in‐flow of energy (from the grid to the consumers‐end)
✓ The out‐flow of energy (from the consumers‐end to the grid)
✓ The consumer may get incentives from the energy service
provider at the end of the year based on the net metering
value
✓ Financial Incentives
✓ Energy service provider offers some financial incentives for
the consumers’ participation
✓ Incentives for shifting operation of appliances to the off‐peak
hours
✓ Incentives for using stored energy at the battery installed at
the consumers‐end or at the plug‐in hybrid electric vehicles
(PHEVs)
✓ Smart grid enables consumers engagement to a large extend
✓ Consumers get financial incentives by different means from the
energy service providers
✓ Energy service providers maintain efficient and load balancing
energy distribution
79
Operation Centers:
✓ Drawbacks of traditional operation centers
✓ Tries to make sure the amount of generated energy is getting
used
✓ The grid is unstable, if the grid voltage drops due to excess
energy generation
✓ Limited control capabilities
✓ No means to detect oscillation which leads to blackout
✓ Limited information about the energy flow through the grid
✓ Smart grid
✓ Provides information and control on the transmission system
✓ Makes the energy grid more reliable
Minimize the possibility of widespread blackouts
✓ For monitoring and controlling the transmission System in smart
grid, phasor measurement unit (PMU) is used
✓ PMU samples voltage and current with a fixed sample rate at the
installed location
✓ It provides a snapshot of the active power system at that location
✓ By increasing the sampling rate, PMU provides the dynamic
scenario of the energy distribution system
✓ PMU helps to identify the possibility of blackout in advance
✓ Multiple PMUs form a phasor network
80
✓ Collected information by the phasor network is analyzed at
centralized system, i.e., Supervisory Control And Data
Acquisition (SCADA) system
✓ Self‐healing of grid
✓ Dampen unwanted power oscillations
✓ Avoid unwanted flows of current through the grid
✓ Reroute power flows in order to avoid overloading in a
transmission line
✓ This is part of distribution intelligence
✓ Demand side energy distribution
✓ Energy supply is done based on the requirement of the
consumers
✓ The consumers pay according the consumed energy and price
decide by the energy service provider at that time
✓ In smart grid, the energy distributors can form coalition and serve
the energy requirement in a specific geographic location
Distribution Intelligence:
✓ Distribution intelligence means the energy distribution systems
equipped with smart IoT devices
✓ Along with smart meters, distribution intelligence can –
✓ Identify the source of a power outage
✓ Ensure power flow automatically by combining automated
switching
81
✓ Optimize the balance between real and reactive power
✓ Reactive power:
✓ Devices that store and release energy
✓ Cause increased electrical currents without consuming real
power
✓ Intelligent distribution System
✓ Maintains the proper level of reactive power in the System
✓ Protect and control the feeder lines
Plug-In Electric Vehicles:
✓ Smart Grids have the infrastructure needed to enable the efficient
use of plug‐in electric vehicle (PEVs)
✓ Using PEVs –
✓ Reduce dependency on oil
✓ No pollution when running on electricity
✓ PEVs rely on power plants to charge their batteries .
✓ Energy service provider encourages the consumers to charge
batteries of PEVs in off‐peak hours.
✓ PEVs also can be used as an energy source in on‐peak hours.
✓ PEVs get incentives from energy service provider for providing
energy to the grid through discharging .
82
Plug-In Electric Vehicles:
✓ Smart Grids have the infrastructure needed to enable the efficient
use of plug‐in electric vehicle (PEVs)
✓ Using PEVs –
✓ Reduce dependency on oil
✓ No pollution when running on electricity
✓ PEVs rely on power plants to charge their batteries
✓ Energy service provider encourages the consumers to charge
batteries of PEVs in off‐peak hours
✓ PEVs also can be used as an energy source in on‐peak hours
✓ PEVs get incentives from energy service provider for providing
energy to the grid through discharging
Smart Grid Communic ation:
83
✓ Smart Home Appliances
✓ Smart Meters
✓ Gateways
✓ Data Aggregator Units (DAUs)
✓ Meter Data Management Systems (MDMSs)
✓ Different networks associated with smart grid communication
✓ Home Area Networks (HANs)
✓ Neighborhood Area Networks (NANs)
✓ Wide Area Networks (WANs)
✓ IP Networks
✓ Sensors and Actuators Networks (SANETs)
✓ For Smart Home Appliances, the available protocol are as follows:
✓ C‐Bus:
✓ Data Rate: 3500 bits/sec
✓ Able to handle cable lengths upto 1000 m
✓ DECT
✓ Data rate: 64000 bits/sec
✓ Operates in 1880 – 1930 MHz
✓ EnOcean
✓ Data rate: 9600 bits/sec
✓ Operates in 902 MHz in North America
84
✓ Universal Power line Bus
✓ Data rate: 480 bits/sec
✓ Enable two‐way communication protocol
✓ Thread
✓ Data Rate: 20‐250 Kbits/sec
✓ IPv6 addressing based 6LowPAN networking protocol
✓ Zigbee
✓ Data Rate: 20‐250 Kbits/sec
✓ Operates in 2.4 GHz band
✓ IEEE 802.15.4 protocol
✓ Communication range ~100 m
✓ Simplified Cable Solution (SCS)
✓ Data rate: 9.6 Kbits/sec
✓ Works on twisted pair
✓ Developed based on OpenWebNet
✓ Smart Meters and Gateways
✓ Each gateway connects few closely located smart meters
✓ Gateways communicate mostly based on WiFi, i.e., IEEE
802.11
✓ Gateways helps in two‐way communication
✓ Smart meters
85
✓ Forward the energy consumption information fro the home
appliances to the gateways
✓ Forward the billing amount and the control information from
the gateways to the home appliances
✓ Gateway acts as link between the smart meters and the data
aggregator units (DAUs)
✓ Data Aggregator Units (DAUs)
✓ Aggregate the energy consumption or energy request of
certain geographical area
✓ Forward the energy consumption information to the
centralized coordinator – meter data management system
(MDMS)
✓ Maintains a buffer to queue the energy consumption
information of the consumers
✓ Meter Data Management Systems (MDMSs)
✓ Act as the centralized coordinator for smart grid
communication
✓ Handled by the energy service providers
✓ Part of operation center
✓ Decide the price per unit energy to be paid by the consumers
Smart Grid Security:
✓ Smart grid is a cyber physical system
✓ Following vulnerabilities are there in smart grid
86
✓ Integrity – credibility of the data collected and transferred
over the grid
✓ Availability – accessibility to every grid component as well
as to the information transmitted and collected
✓ Dynamic system attacks – based on the previous information
same type of request can be replicated by the attacker
✓ Physical threats – physical attack to the smart
mgrpidocnoents
✓ Coordinated attacks – cascading failure of systems in smart
grid
✓ Integrity
✓ Data injection attacks (DIAs)
✓ Manipulation of exchanged data such as sensor
readings, feedback control signals, and electricity price
signals
✓ Performed by compromising the hardware components
(as in the case of Stuxnet), or intercepting the
communication links
✓ System Damage
✓ An attacker can manipulate system measurements so
that a congested transmission line falsely seems to not
have reached its thermal transmission limit
✓ Induce large fluctuations in system dynamics that can
lead to tripping additional lines, disconnecting
generators, load shedding, or even a system blackout
87
✓ Integrity
✓ Financial benefit
✓ Manipulating the electricity prices
✓ Doing this one can buy energy with lesser price from a
service provider and make high profit
✓ Time synchronization attacks
✓ An adversary can manipulate the time reference of the
time stamped measured phasors to create a false
visualization of the actual system conditions thus
yielding inaccurate control and protection actions
✓ Attacks that target PMU time synchronization are
known as time synchronization attacks (TSAs)
✓ Availability
✓ Accessibility unavailable to every grid component as well as
to the information transmitted and collected, whenever
needed
✓ Attacks compromising this availability are known as denial
of service (DoS) attacks
✓ Block key signals to compromise the stability of the grid and
observability of its states
✓ Manipulating generation‐load balance
✓ Dynamic System Attacks
✓ Replay attacks (RAs)
88
✓ Injects input data in the system without causing changes
to the measurable outputs
✓ In RAs –
✓ Compromises sensors, monitors their outputs
✓ Learns the outputs and repeats them while injecting its
attack signal
✓ Dynamic data injection attacks (D‐DIA)
✓ Uses knowledge of the grid’s dynamic model to inject
data that causes unobservability of unstable poles
✓ Can lead to a system collapse
✓ Covert attack
✓ Closed loop version of replay attacks
✓ Physical Threats
✓ Attacks a physical component such as a generator, substation,
or transmission line is prominent
✓ Physical manipulation of smart meters for energy theft
purposes
✓ Coordinated Attacks
✓ Power system typically incorporates robustness measures
✓ An attack leading to the failure of one or few components
✓ Exploit the dense interconnections between grid components
to launch simultaneous attacks of different types targeting
various components
89
✓ In smart grid, cloud applications take a lead in several aspects
✓ Energy management
✓ Information management
✓ Security
Energy Management and Cloud Application
✓ The energy management in smart grid can be more efficient by
using cloud applications
✓ Cloud‐Based Demand Response for fast response times in
large scale deployment
✓ Two cloud‐based demand response models are proposed as
follows:
✓ Data‐centric communication and
✓ Topic‐based group communication
✓ With the integration of cloud, requests from customers are
scheduled which are to be executed depending on the available
resources, priority, and other applicable constraints
✓ Incoming jobs from users are scheduled according to their priority,
available resources, and applicable constraints
✓ Integrating cloud computing applications for micro‐grid
management in the form of different modules such as
infrastructure, power management, and service
✓ The number of supported customers increases
90
✓ With cloud application, integrate and analyze information
streaming from multiple smart meters simultaneously can be done,
in order to balance the real‐ time demand and supply curves
✓ Real‐time energy usage and pricing information can be shared
✓ Mobile agent can be used to monitor power system using cloud
computing platform due to the smart grid’s heterogeneous
architecture
Information Management and Cloud Application:
✓ Information processing in smart grid fit well with the computing
and storage mechanisms available for cloud applications
✓ Information from different components, and the supply and
demand state conditions can be shared with the help of cloud
computing
✓ Real‐time distributed data management and parallel processing of
information can be utilized using smart grid data cloud
application
✓ With the flexibility of cloud computing, information is retrieved
from the data cloud more conveniently in smart grid
✓ Dynamic pricing mechanism in smart grid is feasible with the use
of cloud application
✓ Cloud computing services are used as a dynamic data centers to
store the real‐ time information from the smart meter.
✓ Use of multi‐mobile agent combined with cloud computing for
profitable smart grid operation
91
✓ Interactive cooperation using cloud services to support multiple
customers and multiple energy sources for large‐scale
development of smart grid for energy management
Security in Smart Grid and Cloud Application:
✓ An electric power information security and protection system can
be developed using based on cloud security
✓ Private cloud platforms are suitable for scaling out and processing
millions of data from users
✓ Using the cloud computing platform, the electrical utilities can
quickly and effectively deal with malicious software
✓ Security and protection system for electrical power
✓ Servers act as cloud and take decision according to the
clients’ data
✓ Privacy issue in smart grid
✓ Quickly and effectively deal with malicious software with the
implementation of cloud computing applications
✓ Data storage security for distributed verification in smart grid
using cloud application
✓ Real‐time data can be analyzed and estimated using cloud in smart
grid.
✓ Cloud‐based information privacy scheme can be used for smart
grid data privacy.
92
Connected Vehicles:
Introduction:
✓ Vehicles equipped with
▪ Sensors
▪ Networking and communicating devices
✓ Capable of :
▪ Communicating with other devices within the vehicle
▪ Communicating with other similar vehicles
▪ Communicating with fixed infrastructure
Challenges:
✓ Security
✓ Privacy
✓ Scalability
✓ Reliability
✓ Quality of service
✓ Lack of global standards
Vehicle-to-Everything (V2X) Paradigm:
✓ Main component of future Intelligent Transportation System
(ITS).
✓ Enables vehicles to wirelessly share a
diverse range of information.
93
✓ Information sharing may be with other vehicles, pedestrians, or
fixed infrastructures (mobile towers, parking meters, etc.)
✓ Allows for traffic management, ensuring on-road and off-road
safety, mobility for traveling.
94
✓ Designed mainly for handling information exchange between a
single pair of entities.
✓ Information exchange dependent on the location of data.
✓ Can only identify the addresses of endpoints, which alone is not
useful for content distribution.
✓ Increase in number of wireless devices, restricts the mobility of
the nodes.
Content Centric Networking (CCN):
✓ CCN is derived from Information Centric Networking (ICN)
architecture.
✓ Focuses more on the data than its actual location.
✓ Hierarchically named data.
✓ Hierarchical data is transmitted directly instead of being part of a
conversation.
✓ Enables scalable and efficient data dissemination.
✓ In-network caching allows for low data traffic.
✓ Works well in highly mobile environments.
Vehicular Ad-hoc Networks (VANETs)
✓ Based on:
▪ Dedicated Short-Range Communication (DSRC)
▪ Wireless Access in Vehicular Environment (WAVE)
✓ Routing protocols derived from MANETs.
95
✓ High throughput achievable in mobile environments.
✓ Guaranteed low-latency in mobile
environments.
96
▪ Communication does not depend on speed or direction of
nodes.
✓ Scalability
▪ An in-network caching mechanism at each router.
▪ Uniquely identifiable (named) data chunks are stored in
Content Store (CS), which acts as a cache.
▪ Subsequent requests for a stored data chunk can be made to a
CS.
▪ The naming system in the CS enables a data to be used
multiple times, unlike normal IP-based routers.
▪ Reduced network load during increased network size, as a
result of the caching mechanism.
Body and Brain Architecture:
✓ An in-vehicle networking architecture.
✓ Three layered architecture.
✓ The body consists of intelligent networking nodes (INN) which
constantly collect information from the vehicle.
✓ The brain manages central coordination.
Sense and Execution Layer:
97
Classification of INN:
98
Network and Transmission Layer
For communication
99
Intelligent Connected Vehicles (ICVs):
100
✓ The US Department of Transport and Federal Communications
Commission allocated 75MHz (5850-5925MHz) as the dedicated
spectrum for ICVs.
✓ It is based on Dedicated Short Range Communication (DSRC)
technology.
✓ IEEE developed IEEE 802.11p and IEEE 1609 as DSRC
standards.
✓ Society of Automotive Engineers (SAE) came up with SAE J2735
and J2945 as DSRC standards.
IEEE 1609 Family
✓ IEEE P1609.0 Draft Standard for Wireless Access in Vehicular
Environments (WAVE) -
Architecture
✓ IEEE 1609.1-2006 - Trial Use Standard for Wireless Access in
Vehicular Environments (WAVE) - Resource Manager
✓ IEEE 1609.2 -2006- Trial Use Standard for Wireless Access in
Vehicular Environments
(WAVE) - Security Services for Applications and Management
Messages
✓ IEEE 1609.3 -2007 - Trial Use Standard for Wireless Access in
Vehicular Environments
(WAVE) - Networking Services
✓ IEEE 1609.4 -2006- Trial Use Standard for Wireless Access in
Vehicular Environments
101
(WAVE) - Multi-Channel Operations
✓ IEEE P1609.11 Over-the-Air Data Exchange Protocol for
Intelligent Transportation Systems (ITS).
Ad-hoc Domain:
✓ Composed of vehicles and road-side units.
✓ The vehicles (OBUs) are mobile.
✓ The road-side units (RSUs) are static.
✓ Communication mode may be either V2V or V2I.
✓ Communication through DSRC stack (IEEE 802.11p)
102
✓ RSUs connected to Internet by means of Gateways.
✓ In the presence of RSUs, the vehicles may communicate to the
Internet via V2I interfaces.
✓ In the absence of RSUs, the vehicles may communicate with each
other or the Internet through cellular networks such as 3G/4G,
LTE, etc.
103
104
V2X Communication Advantages:
✓ Increased traffic safety.
✓ Increased driver safety.
✓ Optimized time of travel.
✓ Efficiency of fuel consumption.
✓ Secure travel.
105
✓ Easier drive in low-visibility or unfavorable weather conditions.
V2X Communication Disadvantages:
✓ Violation of privacy.
✓ Loss of data control.
✓ Collection of personal data.
✓ Second use of data.
✓ Data use by unauthorized entities.
✓ Tracking of movements.
✓ Localization of position.
IIoT: Industrial Internet of Things
Introduction:
✓ The main aim of Internet of Things (IoT) is
✓ to globally connect smart ‘things’ or ‘objects’ .
✓ objects are uniquely identified.
✓ interoperability among the objects.
✓ The Industrial Internet of Things (IIoT) is an application of IoT in
industries to modify the various existing industrial systems. IIoT
links the automation ,,planning and product lifecycle.
106
Automation and data exchange in manufacturing technologies
‐ Cyber‐physical systems, the Internet of things and cloud
computing Smart factory.
‐ IIoT includes –
‐ machine learning
‐ big data technology
‐ machine ‐ to ‐ machine interaction (M‐2‐M)
‐ automation.
‐ IIoT is supported by huge amount of data collected from sensors. It
is based on “wrap & re‐use” approach, rather than “rip & replace”
approach.
‐ 1st Industrial Revolution : Mechanized production
‐ 2nd Industrial Revolution : Mass production
✓ 3rd Industrial Revolution : Internet evolution and automation
✓ 4th Industrial Revolution : IIoT
107
✓ IIoT is a network of
✓ physical objects
✓ systems
✓ platforms
✓ applications
✓ These networks can communicate with each other, external
environment and other people.
✓ The acquisition of IIoT has led to availability and affordability of
sensors, processors, and other technologies which facilitates
capture and access to real‐time information
✓ IIoT is a network of
✓ physical objects
✓ systems
✓ platforms
✓ applications
108
✓ These networks can communicate with each other, external
environment and other people.
✓ The acquisition of IIoT has led to availability and affordability of
sensors, processors, and other technologies which facilitates
capture and access to real‐time information
IIoT Requirements:
109
Service Management in IIoT:
✓ Service management refers to the implementation and management
of the quality of services which meets the end‐users demand”
✓ “Service is a collection of data and associated behaviors to
accomplish a particular function or feature of a device or portions
of a device”.
✓ Service can be of two types, which are ‐
110
✓ Primary service ‐ The basic services which are responsible
for the primary node functions are termed as primary
service.
✓ Secondary service ‐ The auxiliary functions which provide
services to the primary service or secondary services are
termed as secondary service.
Applications of IIoT:
Manufacturing Industry:
✓ The devices, equipment, workforce, supply chain, work platform
are integrated and connected to achieve smart production. This
will led to –
✓ reduction in operational costs
✓ improvement in the productivity of the worker
✓ reduction in the injuries at the workplace
✓ resource optimization and waste reduction
✓ end‐to‐end automation.
Health care Service Industry:
✓ Patients can be continuously monitored due to the implanted
on‐body sensors. This has led to –
✓ improved treatment outcome
✓ costs has reduced
✓ improved disease detection
✓ improved accuracy in the collection of data
111
✓ improved drugs management.
Transportation & logistics:
✓ To improve safety, efficiency of transportation, Intelligent
Transportation system (ITS) is developed which consists of
connected vehicles. ITS provides –
✓ Vehicle – to – sensor connectivity
✓ Vehicle – to – vehicle connectivity
✓ Vehicle – to – internet connectivity
✓ Vehicle – to – road infrastructure
✓ Dedicated short‐range communications (DSRC) is the key
enabling technology for V2V and V2R communications.
✓ In IIoT scenario the physical objects are provided with
✓ bar codes
✓ RFID tags
hence, real‐time monitoring of the status and location of the physical
objects from destination to the origin, across the supply chain is
possible.
✓ Security and privacy of the data should be maintained.
Mining:
✓ To prevent accidents inside the mines ‐ RFID, Wi‐Fi and other
wireless technologies are used, which
✓ provides early warning of any disaster
✓ monitors air‐quality
112
✓ detects the presence of poisonous gases inside the mines
✓ oxygen level inside the mines.
Firefighting:
✓ Sensor networks, RFID tags are used to perform
✓ automatic diagnosis
✓ early warning of disaster
✓ emergency rescue
✓ provides real‐time monitoring Hence, improves public
security.
Examples of IIoT:
✓ Examples of IIoT are ‐
✓ unmanned aerial vehicles (UAVs) to inspect oil pipelines.
✓ monitoring food safety using sensors.
✓ minimizing workers’ exposure to noise, chemicals and other
hazardous gases.
✓ unmanned marine vehicle which can collect data up to a year
without fuel or crew.
Examples of IIoT:
✓ Examples of IIoT are ‐
✓ unmanned aerial vehicles (UAVs) to inspect oil pipelines.
✓ monitoring food safety using sensors.
113
✓ minimizing workers’ exposure to noise, chemicals and other
hazardous gases.
✓ unmanned marine vehicle which can collect data up to a year
without fuel or crew.
Challenges in IIoT:
Standardization
✓ Standardization plays an important role in the development of the
system.
✓ Goal: To improve the interoperability of the different systems/
applications and allow the products/services to perform better.
✓ The problems related to standardization are:
✓ Interoperability
✓ Semantic interoperability (data sematics)
✓ Security and privacy
✓ Radio access level issues.
Privacy and security issues
✓ The two most important concerns related with IIoT are ‐
✓ information security
✓ data privacy protection
✓ The devices/things can be tracked, monitored and connected. So
there are chances of attack on the personal and private data.
Risks associated with IIoT in Manufacturing:
114
✓ Though IIoT provides new opportunities, but few factors may
cause hindrance in the path to success, which are :
✓ lack of vision and leadership
✓ lack of understanding of values among management
employees
✓ costly sensors
✓ inadequate infrastructure.
Meet the challenges : Manufacturing
✓ Manufacturers use software capabilities to improve operational
efficiency through –
✓ predictive maintenance
✓ savings on scheduled repairs
✓ reduced maintenance costs
✓ reduced number of breakdowns.
115
✓ To create smart objects with larger memory, processing
capabilities.
Case Study: Agriculture
Future of IoT application in agriculture:
✓ Soil moisture and water level monitoring
✓ Automated irrigation system
✓ Automation in Recycling of Organic Waste and
Vermicomposting
✓ Automated sowing and weeding system .
Smart Water Management Using IoT:
✓ Objectives
▪ More yields with less water
▪ Save limited water resource in a country
▪ Automatic irrigation
▪ Dynamic irrigation treatments in the different phases of a
crop’s life cycle
Remote monitoring and controlling.
✓ Proposed architecture
▪ Sensing and actuating layer.
▪ Processing, storage, and service layer.
▪ Application layer.
✓ Design
116
▪ Integrated design for sensors
▪ Integrated design for sensor node
▪ Integrated design for remote server
✓ Integrated design for sensors
117
✓ Integrated design for remote server
▪ Repository data server: Communicates with the deployed IoT
gateway in the field by using GPRS technology
▪ Web server: To access field data remotely
▪ Multi users server: Sends field information to farmer’s cell
using SMS technology and also executes farmer’s query and
controlling messages
✓ Implementation
▪ Field demo
▪ Website demo
▪ Project details from website
118
Case study: Healthcare
Emergence of IoT Healthcare:
✓ Advances in sensor and connectivity
▪ Collect patient data over time
▪ Enable preventive care
▪ Understanding of effects of therapy on a patient
✓ Ability of devices to collect data on their own
▪ Automatically obtain data when and where needed by
doctors
▪ Automation reduces risk of error
▪ Lower error implies increased efficiency and reduced cost
Components of IoT Healthc are
✓ Components of IoT is organized in 4 layers
▪ Sensing layer: Consists of all sensor, RFIDs and wireless
sensor networks (WSN). E.g: Google glass, Fitbit tracker
▪ Aggregated layer: Consists of different types of aggregators
based on the sensors of sensing layer. E.g: Smartphones,
Tablets
▪ Processing layer: It consists of servers for processing
information coming from aggregated layer.
▪ Cloud platform: All processed data are uploaded in cloud
platform, which can be accessed by large no. of users
IoT Healthc are : Remote Healthc are
119
▪ Many people without ready access to effective healthcare
▪ Wireless IoT driven solutions bring healthcare to patients rather
than bring patients to healthcare
▪ Securely capture a variety of medical data through IoT based
sensors, analyze data with smart algorithms
▪ Wirelessly share data with health professionals for appropriate
health recommendations
▪ IoT‐driven non‐invasive monitoring
▪ Sensors to collect comprehensive physiological information
▪ Gateways and cloud‐based analytics and storage of data
▪ Wirelessly send data to caregivers
▪ Lowers cost of healthcare
▪ Fall detection for seniors
▪ Emergency situation detection and alert to family members
▪ Machine learning for health trend tracking and early anomaly
detection
AmbuSens: Use-c ase of Healthc are system using IoT:
✓ Telemedicine and Remote Healthcare:
▪ Problem ‐ Physical presence necessary
▪ Solution ‐ Wireless sensors
✓ Emergency Response Time:
▪ Problem – Not equipped to deal with complications.
120
▪ Solution
▪ Instant remote monitoring
▪ Feedback by the skilled medical professionals
✓ Real Time Patient Status Monitoring:
▪ Problem – Lack of collaboration.
▪ Solution ‐ Real‐time monitoring.
✓ Digitized Medical History:
▪ Problem
▪ Inconsistent
▪ Physical records vulnerable to wear and tear and loss.
▪ Solution ‐ Consistent cloud‐based digital record‐keeping
system
✓ Single hop wireless body area network (WBAN)
✓ Communication protocol used is Bluetooth i.e. IEEE 802.15.1
✓ Power management and data‐rate tuning
✓ Calibration of data
✓ Filtering and noise removal
✓ Health‐cloud framework
✓ The developed system is strictly privacy‐aware
✓ Patient‐identity masking involves hashing and reverse hashing of
patient ID
121
✓ Scalable architecture
✓ URL: ambusens.iitkgp.ac.in
✓ Paramedic and Doctor portals for ease of use.
✓ Provision for recording medical history and sending feedback.
✓ Allows sensor initialization and
data streaming.
✓ Includes data visualization
tools for better understanding.
Activity Monitoring
Introduction:
✓ Wearable sensors have become very popular for different purposes
such as:
▪ Medical
▪ Child‐care
▪ Elderly‐care
▪ Entertainment
▪ Security
✓ These sensors help in monitoring the physical activities of humans
Advantages:
✓ Continuous monitoring of activity results in daily observation of
human behavior and repetitive patterns in their activities.
122
✓ Easy integration and fast equipping
✓ Long term monitoring
✓ Utilization of sensors of handheld devices
▪ Accelerometer
▪ Gyroscope
▪ GPS
▪ Others
Data Analysis Tools:
✓ Statistical
▪ Sensor data
✓ Machine Learning Based
▪ Sensor data
✓ Deep Learning Based
▪ Sensor data
▪ Images
▪ Videos
123