comparative analysis of iot architectures comparative analysis of iot architectures authors: ravi...
TRANSCRIPT
1
COMPARATIVE ANALYSIS OF
IoT ARCHITECTURES
Authors:
Ravi Teja Guthikonda
Sai Srikar Chitta
Shraddha Tekawade
Tripti Attavar
Advisor: Dr. Lijun Chen
TLEN 5710 Capstone
April 25, 2014
2 Abstract:
The Internet had been considered as a form of human-to-human communication. However, due
to recent developments in technology, intelligence is embedded in devices. These “smart” devices have
the ability to interact with humans and other smart devices, as well, which led to the development of
“Internet of Things” (IoT). This project explores the impacts of deployment of IoT on network
architecture: how will IoT change the Internet architecture and what would be the right architecture for
IoT. It focuses on a comparative analysis of the Internet architecture and a few application specific IoT
architectures that are currently proposed, based on a set of design goals and design principles. Based on
the results of a comparative study, we propose a new IoT architecture with elements borrowed from the
existing architectures and proposals, formulate a timeline for its deployment, and briefly discuss its
policy implications.
3
Table of Contents:
I. Introduction
i. Statement of Problem 4
ii. Research Question 4
II. Literature Review 5
III. Research Methodology 8
IV. Research Results 8
V. Discussion of Results 10
VI. Conclusion and Future Research 22
VII. References 24
4
I. Introduction:
i. Statement of the problem:
Internet of Things (IoT) will consist of billions of devices in the near future. There have
been predictions that, by the year 2020, about 8 billion devices will have connectivity to the
Internet. The deployment of this technology will need some changes to the current network
infrastructure, protocols, and services. Creation of compound applications that are part of
different industries can be facilitated using IoT. These applications will be part of everyday life
and the impact to our society is significant. The expectations for revenue opportunities are
around $2.7 trillion. Companies such as Cisco, Microsoft, Oracle are already investing heavily in
IoT. Many issues such as no standardized architecture, privacy and safety concerns, and
interoperability between vendors plague IoT. Our research aims to bridge the gap in several
architectures and propose a multi-industry and multi-vendor architecture that will be ubiquitous.
An ideal architecture makes the usage of IoT more desirable and easier to deploy [16].
ii. Research Questions:
• What are the defining features of IoT and how is it different from the current Internet?
The purpose is to identify the significant differences between the current Internet and IoT, in
particular, what the defining features of IoT are in terms of physical layer technologies and
applications, as well as the associated performance requirements in communications.
• What are the design goals for the IoT architecture and the design principles that allow the
IoT to achieve these goals?
5 Architecture is about the protocol stack that impedance matches the physical layer
technologies and the applications. Guided by this, the purpose is to identify a set of design goals
for the IoT architecture and the design principles that allow the system to achieve these goals.
• What are the different architectures of IoT currently being proposed/used, focusing on a
few use cases?
The purpose is to carry out a comparative analysis of the existing proposals for IoT
architecture and evaluate them according to the design goals and principles identified in the
above.
• What will be a good architecture, based on the existing proposals/Internet, as well as our
own recommendation?
Proposing or recommending architecture that can be standardized for universal use. A
timeline for adopting/deploying the proposed architecture and the associated cost, as well as its
impact on policy.
II. Literature Review
Internet of things is a term coined by Kevin Ashton in one of his presentations [13]. The term
describes a technology of the future based on the Internet and involves sharing of information [13]. IoT
is revolution in the world of technology and it is the next big thing in the world of computing and
communication. IoT allows the communication between all the things we see around us apart from the
human-machine interaction that already exists. Applications of IoT range from various fields from the
obvious IT to the surprising, saving energy using smart grids [11].
IoT can be considered as an extension of traditional wireless sensor networks (WSN) that makes
the object-to-object communication possible by use of technology called radio frequency identification
(RFID). RFID enables the object to identify other objects. RFID has long been used as a replacement to
6 barcode. The objects use this technology to identify other objects and so that they can connect to them.
This technology also detects objects in real time and provides important information such as location
and status [1]. IoT is enabled by a robust RFID system. IoT also uses sensors to link the physical and
information worlds) [4]. The sensors are used to collect data about the surroundings this data can be
analyzed according to different circumstances and factors to bridge the gap [11]. IoT also makes the use
of nanotechnology and miniaturization to place intelligence in various devices. These devices with
intelligence are called smart devices and have an important place in the architecture of IoT. These
devices can configure themselves and take a decision on their own. After which real object-to-object
communication will be accomplished [11].
The architecture of Internet was developed in late 70’s to use that architecture for IoT, which has
billions of devices sharing data with each other, will not be practical. The amount of data produced by
IoT cannot be handled by the current Internet architecture The new architecture of IoT should address
several issues such as reliability, quality of service (QoS), security, and interoperability. The new
architecture also needs to be universal i.e. it must be adopted by everyone so that it can be used for any
application. The architecture must also be flexible so that it can be modified to change according to the
future needs [11].
The fact that Internet of Things is the inevitable future of the Internet has led to extensive
research in trying to solve or minimize the challenges that could hinder its deployment. A number of
new network architectures have been proposed to manage the communication between the IP-speaking
devices [8]. Khan et.al. [6] proposed the generic architecture, existing development trends, and possible
applications of IoT. As the number of devices gets connected to the Internet, proposed IoT architecture
should address many concerns such as scalability, reliability, and QoS [6]. Miao Wu et.al. [13]has
explained the current 3-layer architecture of IoTand why is not enough, they also proposed a new 5-
7 layer architecture to perceive its essence. Miao Wu et.al.[13]explained the need for new IoT
architecture, which includes features of both Internet and Communications Network.
Increased traffic volume with deployment of IoT poses a serious threat to the security of IoT.
Multimedia applications are one among the many applications, which lead to increased traffic volume.
Liang Zhou, and Han-Chieh[9] proposed a Framework for Security architecture. Liang Zhou, and Han-
Chieh[9] also explained the study of different multimedia traffic in the interest of IoT. [16].Rolf H.
Weber [17] discussed the security challenges for architecture of IoT. Some of the concerns for security
in IoT include resilience to attacks, data authentication, and access control.
IoT generates a massive amount of data from various sensors. This data will be used to analyze
and provide the needed solutions. The amount of data generated by IoT provides an opportunity for data
storage and cloud computing companies like EMC, Microsoft, etc. Microsoft is investing heavily in IoT
for enterprises. Microsoft has created a cross-platform cloud based IoT managing service to enterprise
customers..This service also includes analytics part of the data. The cloud and data management services
of IoT are few of the glaring issues that can be addressed with an appropriate architecture [14].
The architecture is like the backbone of IoT if it is not robust and flexible, deploying IoT will
take more time than required. Thus, our research is prominent as it makes IoT easier to deploy.
Although a number of architectures are present, it is important that any architecture be accepted
universally addressing the several issues faced by IoT. Standardization has many benefits such as easy
deployment, manageability, troubleshooting, etc. Our research includes solutions to various issues such
as interoperability, performance and security issues. Security has also been one of the concerns of IoT.
By improving security within the architecture, IoT would be installed smoothly without any skepticism.
8 III. Research Methodology:
During this project, we planned to carry out detailed study of the available literature and current
research in order to propose a new architecture for IoT. We began by studying the differences between
the traditional Internet and the IoT. We identified the distinguishing features of IoT. After identifying
these features we defined the design requirements of IoT and identified a set of principles that will aid in
fulfilling these design requirements.
After identifying the design principles we studied various use cases for IoT applications and
determined the four most popular ones to use in our comparative analysis. We then studied the most
appropriate architecture used in these cases based on the set of design principles, which we identified. A
detailed study of these use cases helped us in identifying the advantages and the shortcomings of the
various architectures. After conducting a detailed comparative study of these architectures and the
current research in the industry, we have tried to propose a modular architecture for IoT that will
facilitate interoperability between various vendors and standards. The suggestions in this architecture
were confined to the set of design principles, which we identified.
IV. Research Results:
What’s special about IoT and how is it different from the current Internet?
The Internet now is no longer used as a communication between people using computers instead
it will be used in IoT to enable the communication between various devices [2]. The difference in the
number of devices connected now and when IoT is in use will be colossal. 8 billion devices are expected
to be connected by 2020 and the current Internet may not be able to handle it. IoT will be using the
existing infrastructure as part of its connectivity. Scalability is a significant difference between the two
but the current Internet will be able to handle them by a few protocol changes like using IPv6 instead of
IPv4. The other difference is the devices used in IoT will have intelligence embedded in them and may
9 not use the same protocols used now. The access technologies used are in IoT will be different from the
access technologies used in the current Internet. Short-range wireless technologies that consume low
power are popular with IoT. The applications in IoT will be more interactive, user friendly and require
less intervention from the user [2].
What are the design goals and the design principles that enable to achieve these goals?
The following are the design goals that we have identified for an ideal IoT architecture.
1. Manageability
Manageability describes the existence of intelligence in the architecture. The common types of
manageability include centralized and distributed based control.
2. Security and Privacy
Security and privacy deal with the ability of how immune the architecture would be to outside attacks. It
deals with various issues such as authentication, encryption, etc.
3. Mobility
Mobility should be considered in the architectures when the end nodes move from one place to another.
4. Cost-effectiveness
Cost-effectiveness determines the affordability of the architecture.
5. Efficiency
Efficiency is described in terms of power management of the different devices connected to the
architecture.
6. Quality of Service (QoS)
QoS is a performance management technique for the prioritization of different data traffic from devices.
10 The following are the design principles that we have identified for an ideal IoT architecture.
A layering approach in which one-layer implements the service offered by the layer below and provides
services to the layer above is identified.
The existence of intelligence in the network is identified. This can be achieved either by making the core
or the end-devices intelligent.
What are the different architectures of Internet of things currently being proposed/used, focusing
on a few use cases?
We have identified the popular use cases from Healthcare, Automotive, Home automation, and
Electrical Power industries. The use cases are remote healthcare monitoring, connected cars, smart home
and smart grids. We have also identified the architecture that best fits the each use case according to the
design goals. We determined that remote healthcare has a best fit with community health service
architecture based IoT. IBM’s smart grid architecture is best suited for the smart grids use case.
“Stratecast” architecture proposed by IBM is befitting the needs of smart home application. The ITS
connected vehicle's architecture is suitable for connected cars.
V. Discussion of Results:
Remote Healthcare:
One of the motives behind using IoT in healthcare industry is to provide remote health care. By
using IoT, doctors can monitor the health of patients remotely and in real-time to provide timely
assistance whenever required [18].
We found “A Community Health Service Architecture Based on the Internet of Things on
Health-Care ” by Wu-Zhao, Liu Lei-Hong, Huang Yue-shan and Wu Xiao-ming to be a strong
according our design goals. The community health service technical architecture consists of three layers
11 as shown. Information perception layer, network transmission layer, and application layer constitute the
architecture. Perception layer includes different types of sensors such as wearable sensors to detect the
physical condition of the various organs and special sensors to detect the position of the user [18].
Figure 1. A Community Health Service Architecture Based on the Internet of Things on
Health-Care [18].
Information collected from these sensors is sent to the wireless receiver and from there is
transferred to the computer. From the PC data is transferred to remote health care monitoring center via
the Internet. Application service layer combines the technology of IoT and medical health care center
12 resulting in remote health service. Remote monitoring health care service improves cost savings and
prevents overcrowding of hospital beds [18].
The general architecture for community health service as shown. Basic blocks of the architecture
include family client and community health care center. The physiological conditions of the patients are
collected by the wireless health sensors and then transmitted to the health care center. The health care
center doctors can analyze, test the collected data and provide medical service through
text/email/video/voice [18].
Figure 2. Health Care architecture [18].
The family client includes medical sensors, Zigbee wireless network, and Home Computer.
Wireless sensors monitor physiological, environment parameters of the patients continuously and then
transmit the information to the base stations/monitoring stations through Zigbee wireless network. Data
is transferred from the base station to the computer and data is transferred to the health care center via
Internet. Community Health Care center consists of doctors, pc machines database servers, and medical
works. Database servers consist of personal information, monitoring data and doctor’s information [18].
The patients can use the database servers to query the doctor information and choose the right
doctor for diagnosis. The patients can also input their daily life information, health reports, and disease
records into the database making it easy for the doctors to provide diagnosis. Doctors can also query for
13 patient’s records to check their health status. Apart from all these the users can consult doctor’s real time
through voice, video, and text [18].
The problem with this architecture is that there is no support for privacy and security of user
data, QoS support for time sensitive or critical, data and mobility of the user. All these parameters are
important for the timely and accurate response in case of emergencies.
Smart Grids:
The Smart Grid is termed as the ‘the central nerve system’ of the power system. Smart Grids can
improve energy efficiency, reduce the environmental impact, improve the safety and reliability of
electricity supply, and thus, reduce the electricity transmission of grid [8].
Traditional users such as residential users, commercial and industrial users along with electric
vehicle charging systems, are using the smart grids for their applications. Smart grids with Internet of
Things (IoT) act as an upgrade to the existing electrical grids. The IoT architecture must include the four
major modules of transmission, distribution, smart substations and the efficient usage of electricity for
the smart grids [10].
General smart grid architecture should have characteristics such as centralized management, very
high privacy and security, high reliability, low latency, high scalability. The physical layer technologies
used in smart grids include Wi-Fi, Zigbee, RFID, etc. [10].
The basic and the most common network model for Smart Grid application is a three-layer
network architecture proposed by the authors Ling Zheng, Shuangbao Chen, Shuyue Xiang,
YanxiangHu from the North China Electric Power University. The architecture is divided into the
perceived extension layer, network layer and the application layer. This approach of architecture uses a
centralized control of the smart grids through the use of Information and Communication
Technology(ICT) platform [10].
14
Figure 3. Three layer architecture for Smart Grids [10].
The perception extension layer is similar to the physical layer of the OSI model in network
architecture. This layer provides all the meteorological environment information, the device status
information, and information related to the transmission, substation, distribution and usage of electricity.
It is composed of sensors working on Wi-Fi, Zigbee; smart terminals, RFID tags and other input and
output entities that are deployed in the actual monitoring environment. These sensing elements collect
the device status information, line status information, weather environmental information and
distribution of electricity-integrated information of the processes of electricity transmission, substation
and distribution [10].
The network layer consists of wireless sensor networks, gateway nodes, access networks and
core networks. The wireless sensor networks use the sensing elements in the perception extension layer
to collect information to deliver it to the gateway node. The gateway node transmits the collected data to
the access network, which is finally transmitted into the power communication core network. Access
15 networks include power fiber-optic access networks and broadband wireless access networks. The core
side of the network contains Ethernet, ADSL, 3G, xPON, etc. [10].
The application layer is built to satisfy the business needs of smart grid. This layer builds a
variety of power application platforms and serves as a management and control mechanism to the large
amounts of data received from the sensing networks [10].
This architecture also considers the existing electrical power communication network into
consideration for interoperability. Smart grids with this architecture have better interaction and
information processing capabilities. Security can be incorporated in it by using some of the existing
authentication and encryption techniques. Major companies such as Intel are heavily investing and
working with Austin-based energy consortium Pecan Street Inc. to test the future of energy with smart
grids and IoT [10].
The main shortcomings of this architecture are lack of security mechanisms and support for QoS.
Connected/Smart Home:
Smart homes consist of a number of day-to-day devices with embedded intelligence that can
communicate with other similar smart devices. There are a number of companies that are proposing their
own architectures for connecting these smart devices. The main problem with these current architectures
is interoperability between devices manufactured by different vendors. These architectures are more or
less similar in many aspects [15].
“Stratecast” is one such architecture proposed by IBM. What makes this architecture unique is
that it addresses the problem of integration and delivery of different services along with standardizing
the communication between various devices. This architecture uses the principle of integrating different
services in the cloud as against the traditional approach of integrating them at the edge device on the
user's network such as a wireless gateway. IBM refers this functionality as “home in the cloud” [15].
16 This architecture uses a common service platform to integrate various services accessed by the
users and to facilitate seamless communication between smart devices. Rather than having all the
devices try to communicate with each other directly, these devices can communicate with a single point/
platform that will take care of the communication between various devices and services. This platform
will accommodate all types of devices irrespective of the vendor. Instead of having the devices connect
to the cloud directly, a better approach is to have these devices communicate to a local device such as a
local router/gateway that will act a mediator between the end devices and the cloud. This gateway can be
managed and controlled from the cloud. It will just act a point of integration between the end devices
and the cloud [15].
The following diagram shows the common service integration platform:
Figure 4. IBM “Stratecast” architecture for Smart Home [15].
Using this architecture, the service providers deliver various services to the communication
service providers (CSP) who will then integrate these different services and deliver them to the end users
17 according to the user requirements. This architecture design will help in simplifying the effort on the
user side to a great extent [15].
IBM is working with CSPs such as Verizon and device vendors such as Philips to try and
implement this architecture. This architecture focuses on the needs of both machine to machine (M2M)
services and Over the Top (OTT) services such as online video streaming. Since the user can access all
these types of services without any additional efforts on the user side, it provides a perfect platform for
seamless integration of different technologies and standards. This is what the end user ultimately
demands [15].
This architecture takes care of most of the design goals except for the support for QoS, user data
privacy, and security requirements.
Connected Cars:
Figure 5. ITS architecture for connected cars [5].
18 Connected car is an application of Internet of things that are gaining vast popularity rapidly. As
the name suggests every car is connected to another and to the Internet through various wireless
technologies such as wireless local area networks (WLAN), Long term evolution (LTE), etc. There are
various sensors inside the car that provide data about the functionality of the car, communicate with
other cars and a centralized server, etc. The data can be used for road safety, improving traffic
efficiency, other trivial issues such as navigating, finding open parking spots, video content delivery, etc
[5].
There are various architectures proposed for this popular application. Companies like Cisco,
Oracle, Broadcom, and Volkswagen have proposed various architectures but architecture called
intelligent transport system (ITS) is more feasible universally as it is not vendor specific, it is more
functional as it supports more applications. The figure of the architecture is shown. It is based on the
OSI protocol stack. The access layer is concerned with both the physical and data link layers. The short-
range communication can use 802.11 technologies more specifically wireless access in a vehicular
environment and dedicated short-range communications. For long-range communication existing
infrastructure such as 3G, LTE and WiMAX can be used. The next layer combines both the networking
and transport layer of OSI model. IPv6 is used in the network layer for scalability, higher network
efficiency, and in built security features. The transport layer consists of either TCP or UDP [5].
Each networking protocol can have its own dedicated existing transport protocol such as TCP,
UDP or ITSC transport protocols. IPv6 over geonetworking can be used for more efficiency. It uses the
IPv6’s multicast according to the geographical region that makes the architecture more efficient as it
does not use the regular IP metrics such as hop, cost, etc. The facilities layer consists of application and
presentation support. The facilities layer also supports of the maintenance of various applications.
Service messages and requesting for repetition messages are also part of the facilities. The management
layer is a cross functional that supports all other layers. It has various uses as regulatory management,
19 application management, and station management. The security layer is also a cross functional layer
that is used for authentication, authorization, firewall, intrusion management, etc [5].
The ITSC architecture consists of a station that every vehicle can connect and exchange data. It
also consists of handheld subsystem, vehicle subsystem, a central hub and roadside subsystem. This
architecture is developed in collaboration between ITS Europe, ITS America and ITS Japan making the
ITS architecture universal without any interoperability issues [5].
The concerns about security and network management are taken care by cross-functional security
and management layers. However, this application has strict constraints on the timely delivery of data
irrespective of dynamic network conditions. This is one design goal that needs to be better addressed.
Proposed Architecture:
After studying the various IoT use cases and their architectures it is safe to say that IoT and the
traditional Internet architectures are similar in many aspects. So we do not need to propose an entirely
new architecture, but only need to suggest some improvements in the existing layered architecture to
address the needs of IoT applications.
• Provudes an API or understandable interface to the user User Interface
• Converts the user defined network parameters and provides them to transport layer
Performance Management
• TCP, UDP, QoS Transport
• Interpretation of different data, data forwarding, security Networking
• Data integrity, efficient point to point connection, interference management, channel managemnt
Enhanced Link Layer
• Connection of devices, collection of data from sensors, and authentication. Device Management
20 Figure 6. Enhanced Architecture for IoT applications.
The first module is the device management module. It performs various functions such as
connection of devices, collection of information from sensors, and the authentication and authorization
of different devices. We strongly suggest that all the devices support IPv6 with geonetworking for more
efficient addressing and security. The devices should also support short-range wireless technology such
as Zigbee, Wi-Fi and long-range communication such as Long Term Evolution (LTE).
The second module is the enhanced link layer. This layer carries out all the functions of the
traditional data link layer. This layer needs to address the issues related to reliability of point-to-points
links with greater detail for IoT applications. It also needs to implement a stronger solution for
interference avoidance and management. Efficient channel access mechanisms need to be implemented
that will prioritize devices in order of the critical data that they transmit.
The third module is the Network module. It performs the functions related to internetwork
communication. This module implements a translation between data formats of different vendors and
protocols. It also implements security practices such as data encryption and data filtering. It also
supports adaptive routing in accordance with the available network resources. This module executes
adaptive routing using software defined networking (SDN) [7].
The fourth module is the transport module. Similar to the traditional transport layer this layer
supports TCP or UDP for different applications. It also has support for Integrated Services and
Differentiated services. However, for many IoT applications Differentiated Services may be
implemented for certain applications or certain devices within an application whereas some applications
or devices may require Integrated Services. There are certain applications that may require both the
applications. Thus a new hybrid model that will support both integrated as well as differentiated services
21 for the same application is required. This module implements appropriate QoS policies to fulfill the
desired network performance restrictions such as latency, jitter, throughput, etc.
The fifth module is the performance management module. It acts as an interpreter between the
user-interface module and the transport module. The primary function of this module is to convert the
user defined network performance parameters to appropriate QoS policies. It relays these policies to the
transport layer for implementation. This module also monitors the network performance to determine the
best QoS policies for a particular application. If the network conditions are not favorable to support the
minimum performance requirements this layer informs and negotiates with the user. Implementation of
this module will also require capabilities similar to SDN [7].
The sixth and final module is the user-interface module. It acts a mediator between the user
application and lower modules. It provides performance parameters to the lower module and presents
the data to the user in an understandable format.
The distinguishing features of this architecture are flexibility using modular approach and also
efficient network performance management using SDN.
Policy Considerations for IoT: -
Large-scale deployment of IoT will require certain regulatory changes. First, policies will be
required to regulate the spectrum sharing between existing IoT devices. Second, the limits need to be
defined to protect the devices from interference with each other. Third, if reallocation of the existing
spectrum or new spectrum range allocation is needed to accommodate the large number of devices in
IoT.
Sub 1Ghz channels are being expanded in the new IEEE 802.15.4 standard to be utilized by key
technologies of IoT such as ZigBee, 6LoWPAN, etc. Wireless controlled devices and home automation
applications use the 2.4Ghz band that come under 802.15.4 standard. Devices from Wi-Fi routers to
22 microwave ovens also use the 2.4Ghz spectrum overcrowding the spectrum completely. The 802.15.4
standard evolved in 2003 comes with 16 channels in the 2.4Ghz band termed as ISM (Industrial,
Scientific, and Medical) band. The number of Sub 1Ghz channels was then increased to 3 in Europe and
30 in North America. The latest version of the 802.15.4 standard provides support for countries such as
China and Japan in the new Sub 1Ghz bands. These include the ranges of 779-787MHz for China and
915-930MHz for Japan that provide reliable and higher throughputs inside buildings and homes [12].
VI. Conclusions and future research:
In conclusion, it is safe for that IoT is the inevitable future of the Internet. IoT connects billions
of devices and enables machine-to-machine communication. It can transform daily life with everyday
objects connected to each other and the Internet. We have identified the design principles for an ideal
architecture from the shortcomings of other architectures. Various issues such as interoperability,
performance and security issues currently plague IoT. Our research tries to provide solutions to all these
issues by a flexible semi-flat architecture. Comparative analysis of the proposed architectures is the
basis of our architecture. Our architecture is based around the design principles that were identified
earlier. We also address certain policy issues related to IoT and suggest certain steps for cost analysis of
IoT deployment.
Despite providing substantial potential, the business, technology and policy challenges need to
be addressed. The business challenges need to be addressed by including the costs of implementing IoT.
It should also include the cost analysis of the smart devices, technologies implemented etc. The policy
foundations should be created so that the spectrum can be shared without any harmful interference and
acquire further spectrum for IoT. A collaborative effort from different industries such as Internet service
providers, device vendors, software providers, and cloud providers is required for efficient
implementation of IoT. The future research should focus on standardized protocol stack and networking
23 technologies used for a seamless flow of data between different devices. Streamlined data analytics for
the massive amounts of data generated by IoT must also be an area of emphasis.
24 VII. References:
[1] Castellani, A.P.; Bui, N.; Casari, P.; Rossi, M.; Shelby, Z.; Zorzi, M., "Architecture and protocols for
the Internet of Things: A case study," Pervasive Computing and Communications Workshops
(PERCOM Workshops), 2010 8th IEEE International Conference, pp.678-683, March 29 2010-April 2
2010
doi: 10.1109/PERCOMW.2010.5470520
[2] Daniel Castro, Jordan Misra, "the internet of things,"Internet: http://www2.datainnovation.org/2013-
internet-of-things.pdf, November 2013 [Apr. 25, 2014]
[3] Dieter Uckelmann, Mark Harrison, Florian Michahelles (Ed.), "Integrated Billing Solutions in the
Internet of Things" in Architecting the Internet of Things, Heidelberg, Germany: Springer-Verlag, May
2011, pp.231-236
[4] HuanshengNing; Ziou Wang, "Future Internet of Things Architecture: Like Mankind Neural System
or Social Organization Framework?," Communications Letters, IEEE, vol.15, no.4, pp.461-463, April
2011
doi: 10.1109/LCOMM.2011.022411.110120
[5] "Intelligent Transport Systems (ITS); Communications Architecture." Retrieved March 2014,
Internet:
http://www.etsi.org/deliver/etsi_en/302600_302699/302665/01.01.01_60/en_302665v010101p.pdf
[6] Khan, R.; Khan, S.U.; Zaheer, R.; Khan, S., "Future Internet: The Internet of Things Architecture,
Possible Applications and Key Challenges," Frontiers of Information Technology (FIT), 2012 10th
International Conference, pp.257-260, 17-19 Dec. 2012
25 doi: 10.1109/FIT.2012.53
[7] KwangtaeJeong; Jinwook Kim; Young-Tak Kim, "QoS-aware Network Operating System for
software defined networking with Generalized OpenFlows," Network Operations and Management
Symposium (NOMS), 2012 IEEE, pp.1167-1174, 16-20 April 2012
doi: 10.1109/NOMS.2012.6212044
[8] Li Li; Hu Xiaoguang; Chen Ke; He Ketai, "The applications of WiFi-based Wireless Sensor
Network in Internet of Things and Smart Grid," Industrial Electronics and Applications (ICIEA), 2011
6th IEEE Conference, pp.789-793, 21-23 June 2011
doi: 10.1109/ICIEA.2011.5975693
[9] Liang Zhou; Han-Chieh Chao, "Multimedia traffic security architecture for the internet of
things," Network, IEEE, vol.25, no.3, pp.35-40, May-June 2011
doi: 10.1109/MNET.2011.5772059
[10] Ling Zheng; Shuangbao Chen; Shuyue Xiang; Yanxiang Hu, "Research of Architecture and
Application of Internet of Things for Smart Grid," Computer Science & Service System (CSSS), 2012
International Conference, pp.938-941, 11-13 Aug. 2012
doi: 10.1109/CSSS.2012.238
26 [11]Lu Tan; Neng Wang, "Future internet: The Internet of Things," Advanced Computer Theory and
Engineering (ICACTE), 2010 3rd International Conference, vol.5, pp.V5-376,V5-380, 20-22 Aug. 2010
doi: 10.1109/ICACTE.2010.5579543
[12] Magnus Pedersen, "Utilizing the sub-1GHz spectrum for the Internet of Things," Internet:
http://www.embedded.com/design/real-world-applications/4415110/1/Utilizing-the-sub-1GHz-
spectrum-for-the-Internet-of-Things, May 25, 2013 [Apr. 25, 2014]
[13] Miao Wu; Ting-Jie Lu; Fei-Yang Ling; Jing Sun; Hui-Ying Du, "Research on the architecture of
Internet of Things," Advanced Computer Theory and Engineering (ICACTE), 2010 3rd International
Conference, vol.5, pp.V5-484,V5-487, 20-22 Aug. 2010
doi: 10.1109/ICACTE.2010.5579493
[14] Michael Endler, "Microsoft Azure Intelligent Systems: 4 Facts," Internet:
http://www.informationweek.com/big-data/software-platforms/microsoft-azure-intelligent-systems-4-
facts/d/d-id/1204521, [Apr. 25, 2014]
[15] Mike Jude, "IBM: Working Towards a Smarter Connected Home". Retrieved March 2014 Internet:
http://docs.caba.org/documents/IBM-Smart-Cloud-Home-SPIE2012.pdf
[16] "What Exactly Is The "Internet of Things"?" Internet: http://postscapes.com/what-exactly-is-the-
internet-of-things-infographic, [Apr. 25, 2014]
27 [17] Rolf H. Weber, "Internet of Things – New security and privacy challenges," Computer Law &
Security Review, vol. 26, no. 1, pp.23-30, January 2010,
http://dx.doi.org/10.1016/j.clsr.2009.11.008.
[18] Wu-Zhao, Liu Lei-hong , Huang Yue-shan and Wu Xiao-ming, “A Community Health Service
Architecture Based on the Internet of Things on Health-Care,” World Congress on Medical Physics and
Biomedical Engineering, vol 39, pp.1317-1320