<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="9788793237988.xsl"?>
<book id="home" xmlns:xlink="http://www.w3.org/1999/xlink">
<bookinfo>
<title>Building the Hyperconnected Society</title>
<subtitle>IoT Research and Innovation Value Chains, Ecosystems and Markets</subtitle>
<affiliation><emphasis role="strong">Editors</emphasis></affiliation>
<authorgroup>
<author><firstname>Dr. Ovidiu</firstname><surname>Vermesan</surname></author>
</authorgroup>
<affiliation>SINTEF, Norway</affiliation>
<authorgroup>
<author><firstname>Dr. Peter</firstname><surname>Friess</surname></author>
</authorgroup>
<affiliation>EU, Belgium</affiliation>
<publisher>
<publishername>River Publishers</publishername>
</publisher>
<isbn>9788793237988</isbn>
</bookinfo>
<preface class="preface" id="river1">
<title>River Publishers Series in Communications</title>
<para>Volume 43</para>
<emphasis>Series Editors</emphasis>
<para><emphasis role="strong">ABBAS JAMALIPOUR</emphasis><?lb?><emphasis>The University of Sydney</emphasis><?lb?><emphasis>Australia</emphasis></para>
<para><emphasis role="strong">HOMAYOUN NIKOOKAR</emphasis><?lb?><emphasis>Delft University of Technology</emphasis><?lb?><emphasis>The Netherlands</emphasis></para>
<para><emphasis role="strong">MARINA RUGGIERI</emphasis><?lb?><emphasis>University of Rome Tor Vergata</emphasis><?lb?><emphasis>Italy</emphasis></para>
<para>The &#x201C;River Publishers Series in Communications&#x201D; is a series of comprehensive academic and professional books which focus on communication and network systems. The series focuses on topics ranging from the theory and use of systems involving all terminals, computers, and information processors; wired and wireless networks; and network layouts, protocols, architectures, and implementations. Furthermore, developments toward new market demands in systems, products, and technologies such as personal communications services, multimedia systems, enterprise networks, and optical communications systems are also covered.</para>
<para>Books published in the series include research monographs, edited volumes, handbooks and textbooks. The books provide professionals, researchers, educators, and advanced students in the field with an invaluable insight into the latest research and developments.</para>
<para>Topics covered in the series include, but are by no means restricted to the following:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>Wireless Communications</para></listitem>
<listitem><para>Networks</para></listitem>
<listitem><para>Security</para></listitem>
<listitem><para>Antennas &#x0026; Propagation</para></listitem>
<listitem><para>Microwaves</para></listitem>
<listitem><para>Software Defined Radio</para></listitem>
</itemizedlist>
<para>For a list of other books in this series, visit www.riverpublishers.com<?lb?>
http://riverpublishers.com/series.php?msg=Communications</para>
</preface>
<preface class="preface" id="ded01">
<title>Dedication</title>
<blockquote>
<para>&#x201C;The greatest accomplishments of man have resulted from the transmission of ideas and enthusiasm.&#x201D;</para>
<attribution>&#8212; Thomas J. Watson</attribution>
</blockquote>
<blockquote>
<para>&#x201C;A rock pile ceases to be a rock pile the moment a single man contemplates it, bearing within him the image of a cathedral.&#x201D;</para>
<para>&#8212; Antoine de Saint-Exup&#x00E9;ry</para>
</blockquote>
</preface>
<preface class="preface" id="ack01">
<title>Acknowledgement</title>
<para>The editors would like to thank the European Commission for their support in the planning and preparation of this book. The recommendations and opinions expressed in the book are those of the editors and contributors, and do not necessarily represent those of the European Commission.</para>
<blockquote>
<attribution>Ovidiu Vermesan<?lb?>
Peter Friess</attribution>
</blockquote>
</preface>
<preface class="preface" id="preface01">
<title>Preface</title>
<section>
<title>Internet of Things beyond the Hype</title>
<para>IoT represents the convergence of advances in miniaturization, wireless connectivity, increased data storage capacity and data analytics. Intelligent edge devices detect and measure changes in environmental parameters and are necessary to turn billions of objects into &#x201C;smart data&#x201D; generating &#x201C;things&#x201D; that can report on their status, and interact with other &#x201C;things&#x201D; and their environment.</para>
<para>Universal connectivity and data access provides opportunities to monetise data sharing schemes for mobile network operators and other connectivity players.</para>
<para>The Internet of Things supports private and public-sector organizations to manage assets, optimize performance, and develop new business models, allowing a leap in productivity while reshaping the value chain, by changing product design, marketing, manufacturing, and after sale service and by creating the need for new activities such as product data analytics and security. This will drive yet another wave of value chain based productivity improvement.</para>
<para>The following chapters will provide insights on the state-of-the-art of research and innovation in IoT and will expose you to the progress towards building ecosystems and deploying Internet of Things technology for various applications.</para>
</section>
</preface>
<preface class="preface" id="preface02">
<title>Editors Biography</title>
<para><emphasis role="strong">Dr. Ovidiu Vermesan</emphasis> holds a Ph.D. degree in microelectronics and a Master of International Business (MIB) degree. He is Chief Scientist at SINTEF Information and Communication Technology, Oslo, Norway. His research interests are in the area of microelectronics/nanoelectronics, analog and mixed-signal design with applications in measurement, instrumentation, high-temperature applications, medical electronics, integrated intelligent sensors and computer-based electronic analysis/simulation. Dr. Vermesan received SINTEFs 2003 award for research excellence for his work on the implementation of a biometric sensor system. He is currently working with projects addressing nanoelectronics integrated systems, communication and embedded systems, wireless identifiable systems and cyber-physical systems for future Internet of Things architectures with applications in green automotive, internet of energy, healthcare, oil and gas and energy efficiency in buildings. He has authored or co-authored over 75 technical articles and conference papers. He is actively involved in the activities of the new Electronic Components and Systems for European Leadership (ECSEL) Joint Technology Initiative (JTI). He coordinated and managed various national and international/EU projects related to integrated electronics. Dr. Vermesan is the coordinator of the IoT European Research Cluster (IERC) of the European Commission, actively participated in projects related to Internet of Things.</para>
<para><emphasis role="strong">Dr. Peter Friess</emphasis> is a senior official of DG CONNECT of the European Commission, taking care for more than six years of the research and innovation policy for the Internet of Things. In his function he has shaped the on-going European research and innovation program on the Internet of Things and accompanied the European Commission's direct investment of over 100 Mill. Euro in this field. He also oversees the international cooperation on the Internet of Things, in particular with Asian countries. In previous engagements he was working as senior consultant for IBM, dealing with major automotive and utility companies in Germany and Europe. Prior to this engagement he worked as IT manager at Philips Semiconductors on with business process optimisation in complex manufacturing. Before this period he was active as researcher in European and national research projects on advanced telecommunications and business process reorganisation. He is a graduated engineer in Aeronautics and Space technology from the University of Munich and holds a Ph.D. in Systems Engineering including self-organising systems from the University of Bremen. He also published a number of articles and co-edits a yearly book of the European Internet of Things Research Cluster.</para>
</preface>
<chapter class="chapter" id="ch01" label="1" xreflabel="ch01">
<title>Introduction</title>
<para>Thibaut Kleiner<footnote id="fn1_1" label="1"><para>The views expressed in this article are purely those of the author and may not, in any circumstances, be interpreted as stating an official position of the European Commission.</para></footnote></para>
<para>European Commission</para>
<section class="lev1" id="sec1.1" label="1.1" xreflabel="sec1.1">
<title>Now Is the Time</title>
<para>In 1999, Kevin Ashton coined the term Internet of Things (IoT) to describe an evolution of the Internet whereby we &#x2018;<emphasis>empower computers with their own means of gathering information, so they can see, hear and smell the world for themselves, in all its random glory</emphasis>.&#x2019;<footnote id="fn1_2" label="2"><para>K. Ashton. That &#x2018;Internet of Things&#x2019; Thing. <emphasis>RFID Journal</emphasis>. <ulink url="http://www.rfidjournal.com">www.rfidjournal.com</ulink>. June 22, 2009.</para></footnote> At that time, it was already clear that IoT is more than a technology (and definitely more than RFID), and that it represents a paradigm, a new stage of evolution for the Internet. The EU embraced it in 2009 with a dedicated action plan, leading notably to the creation of the European Internet of Things Research Cluster (IERC).</para>
<para>Over the years, however, the very concept of IoT has seemed to lose traction and to become blurred, especially as a series of corporate actors have tried to develop new terminologies &#x2013; from Internet of Everything to Industrial Internet to Industrie 4.0- to explain how they would deliver better solutions on the basis of connected devices. Time has come to reclaim some ground, and to re-establish the Internet of Things where it belongs: as the leading paradigm to describe the digital transformation of our economies and societies.</para>
<para>The IoT is <emphasis>the</emphasis> key development to Building the Hyperconnected Society- the topic of this book. The European Commission has adopted on 6 May 2015 the Digital Single Market strategy and has opened the door for bold proposals to improve our future. Today, we can mobilise the important research work delivered notably by the IERC in terms of IoT technology and societal analysis, and apply it in the market and in our EU policies. The launch of the Alliance for IoT Innovation (AIOTI) should be seen as a signal in this direction. We are uniquely positioned to choose the right path so that the IoT can be mainstreamed, so that it leaves the labs and the drawing boards, conquers not only the techno-freaks and early adopters but can also be adopted by the masses in full confidence.</para>
</section>
<section class="lev1" id="sec1.2" label="1.2" xreflabel="sec1.2">
<title>The Digital Single Market and Internet of Things Transformative Technologies</title>
<para>The Internet of Things has long been characterised as hype. Already in 2009, the Commission explained that the scope of IoT applications is expected to greatly contribute to addressing today&#x2019;s societal challenges, from health monitoring systems to transport to environment, gradually resulting in a genuine paradigm shift. Progress has been constant but maybe slower than anticipated. This is however changing, as highlighted in a recent study completed for the Commission<footnote id="fn1_3" label="3"><para>IDC, TXT. <emphasis>Definition of a Research and Innovation Policy Leveraging Cloud Computing and IoT Combination.</emphasis> European Commission, SMART number 2013/0037. 2015.</para></footnote>, which forecasts the market value of the IoT in the EU to exceed one trillion euros in 2020.</para>
<para>The Digital Single Market (DSM), adopted in May 2015, offers an opportunity to accelerate and to fully develop the transformative potential of the IoT. It announces a series of initiatives that together can boost take up on a continental basis. First, a revamped telecom regulatory framework will provide improved rules on e.g. roaming, net neutrality and spectrum and help the deployment of connected devices and IoT services. The DSM also consolidates initiatives on trust and security and data protection, which are essential for the adoption of this technology. Most importantly, it announces an initiative on the Data economy (free flow of data, allocation of liability, ownership, interoperability, usability and access) and promises to tackle interoperability and standardisation.</para>
<para>Altogether, these measures offer a fantastic platform to establish the framework conditions for a vibrant development of the IoT in the EU. This comes at a fruitful moment, when powerful demand forces led by sociodemographic trends, government initiatives and the expanding consumer market are driving growth in the market.</para>
<para>As flagged by the DSM, the main emerging markets in the short-medium term will be characterised by a combination of IoT with Cloud Computing and Big Data. In sight is the emergence of &#x201C;smart environments&#x201D; where hyperconnectivity and data intelligence generate multiple new services (also with other technologies such as robotics) and improve not only efficiency but also spurs innovation, increasing quality of life and tackling societal challenges. Areas like smart cities, smart homes, smart grid and smart mobility are already witnessing the emergence of new ecosystems for IoT solutions, applications and services. The transformation power goes beyond new actors and is likely to touch the core activities of established players too, as highlighted by the European Round Table of Industrialists<footnote id="fn1_4" label="4"><para>Press statement on Digitisation by Beno&#x00EE;t Potier, chairman of the European Round Table of Industrialists (ERT) at the meeting with Chancellor Merkel, President Hollande and President Juncker, 1 June 2015.</para></footnote>. This is an opportunity but also a risk for incumbents if they do not adjust fast enough.</para>
</section>
<section class="lev1" id="sec1.3" label="1.3" xreflabel="sec1.3">
<title>Benefits and Challenges</title>
<para>Now that digitisation is progressing and IoT is affecting increasing numbers of companies in different areas, new questions are emerging for the ability of the EU to benefit from this process.</para>
<para>First, there are still some fundamental design questions, in terms of how the IoT technologies will be organised and structured. Admittedly, we may have all building blocks: smaller, lighter, more power-efficient, and cheaper hardware, more intelligent sensors and actuators, new platforms, ubiquitous wireless connectivity, available cloud services and data analytics tools. But the IoT is still characterised by vertical silos, which limits the creation of vibrant ecosystems. PWC identifies a series of obstacles in that context: market fragmentation, lack of unified standards and coexistence of open and proprietary solutions, vertical focus<footnote id="fn1_5" label="5"><para> PWC. <emphasis>IoT Benmark Study</emphasis>. European Commission. 2015</para></footnote>.</para>
<para>Another major challenge is the lack of an established horizontal platform<footnote id="fn1_6" label="6"><para>A platform can be defined as comprising the hardware (including computing and storage), software, communications, management (of the above and of intelligent and/or embedded systems), orchestration, and services (data, APIs, analytics, etc.).</para></footnote> that is pervasive enough to structure and nurture the IoT ecosystem. Whilst some IoT solutions will certainly remain vertically orientated (e.g. to address mobility or healthcare needs), the highest degree of innovation is expected to be across areas (ex: car and home and city). But it is unlikely that IoT solutions can be economically developed across different areas without horizontal platforms enabling core service elements to be managed across verticals and companies.</para>
<para>We will need to avoid the same result as what happened for the mobile ecosystems, where the leading platform providers are not headquartered in Europe. The DSM is launching an investigation process into platforms, which could also be relevant for the IoT, even though one should not confuse the regulatory oversight of platforms with the development of new ones. The challenge for the EU is to develop these platforms independently.</para>
<para>In that context, on-going efforts through Horizon2020 and dedicated research calls around open platforms for develop IoT ecosystems, and large scale IoT pilots for real-life experimentation, have the potential to help establishing the EU at the forefront of a massive deployment of the IoT, and one that is endorsed by EU citizens.</para>
</section>
<section class="lev1" id="sec1.4" label="1.4" xreflabel="sec1.4">
<title>Conclusion</title>
<para>For many years, debate around the IoT has evolved between technology explorations and philosophical and ethical conjectures, to the point that it could jeopardise the business appetite for engaging in this research agenda. Fortunately, this exploratory stage is being superseded by a new appetite for growing the IoT market. Past debates and research findings have not been lost. They should now be mobilised to speed up the market uptake and to address the important remaining issues that may hamper the mainstreaming of the IoT. The European Commission will support this agenda.</para>
</section>
</chapter>
<chapter class="chapter" id="ch02" label="2" xreflabel="ch02">
<title>New Horizons for the Internet of Things in Europe</title>
<authorgroup>
<author><firstname>Peter</firstname> <surname>Friess</surname></author> and <author><firstname>Rolf</firstname> <surname>Riemenschneider</surname></author>
</authorgroup>
<para>European Commission, Belgium</para>
<section class="lev1" id="sec2.1" label="2.1" xreflabel="2.1">
<title>Introduction</title>
<para>The Internet of Things (IoT) represents the next major economic and societal disruption enabled by the Internet, and any physical and virtual object can become connected to other objects and to the Internet, creating a fabric between things as well as between humans and things. The IoT offers to merge the physical and the virtual worlds into a new smart environment, which senses, analyses and adapts, and which makes our lives easier, safer, more efficient and user-friendly.</para>
<para>Originally, the Internet was conceived to interconnect computers and transmit messages with limited data exchange capability. With the advent of web technologies, a first revolution took place enabling the linking of documents and the creation of a world wide web of information (Web 1.0). In the early 2000, the Internet evolved towards a universal communication platform making it possible to carry all sorts of voice, video, or information content, with social media enabling user-generated content (Web 2.0). Based on existing communication platforms like the Internet but not limited to it, the IoT represents the next step towards digitisation where all objects and people are interconnected through communication networks, in and across private, public and industrial spaces, and report about their status and/or about the status of the surrounding environment.</para>
</section>
<section class="lev1" id="sec2.2" label="2.2" xreflabel="2.2">
<title>The IoT Is the New Age</title>
<para>The IoT can thus be defined as a new era of ubiquitous connectivity and intelligence, where a set of components, products, services and platforms connects, virtualises and integrates everything in a communication network for digital processing.</para>
<para>Although the IoT is based on various disciplines and technologies like e.g. sensors, embedded systems, various communications technologies, semantic and security technologies to name but a few, it requires a specific configuration for object identification and search, open/closed data sharing, lightweight communication protocols, trade-off between local and networked based information processing, and backend integration. It also requires specific considerations of data security (e.g. location-based profiling), liability (many service providers involved) and trust (&#x201C;disappearing objects&#x201D;).</para>
<fig id="F2-1" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 2.1</label>
<caption><para>Different sequential and parallel pathways towards the Internet of Things.</para></caption>
<graphic xlink:href="graphics/fig2_1.jpg"/>
</fig>
<para>However, the IoT will not develop without cross-cutting approaches. Focusing on vertical applications risk reinforcing silos and prevents innovation across areas. Only through the horizontal support and real-time awareness of the IoT can more powerful and disruptive innovation be delivered, and the corresponding benefits for these application areas fully leveraged. IoT promises to bring smart devices everywhere across boundaries, from the fridge to the car, from the home to the hospital to the city. Connected devices will be powered by intelligence (embedded or in the network) to deliver new services and applications that cut across verticals.</para>
<para>In short, the status quo is not enough. The aim should be that the whole economy and society adopt the IoT, like what happened for mobile communication, so that it can generate maximum benefits: i) addressing societal challenges (ex: environmental protection, resource optimization, security, ageing, inclusion); ii) industrial leadership in the ICT field through new IoT ecosystems and iii) growth, employment and innovation.</para>
</section>
<section class="lev1" id="sec2.3" label="2.3" xreflabel="2.3">
<title>The IoT Can Unleash a New Industrial and Innovation Era</title>
<para>IoT makes a significant reshaping of industry structures possible, with borders between products and services as well as borders between industrial sectors becoming much more blurred than today. This may materialise through:
<itemizedlist mark="bullet" spacing="normal">
<listitem><para><emphasis role="strong">Service enhanced products</emphasis>: a typical example would be a car, augmented by several hundreds of embedded sensors. With such a capacity, a car becomes the focal point of an entire ecosystem that may include remote maintenance, insurance, or geolocation services. This model is similar to the iphone model, which corresponds to a product (the terminal) whose attraction and market value is significantly enhanced by the set of services it gives access to (the app store). </para></listitem>
<listitem><para><emphasis role="strong">Increased efficiency and transformation in processes</emphasis> &#x2014; (&#x201C;smart manufacturing&#x201D;): the IoT makes it possible to track and integrate all production and distribution steps in the value and logistics chain and to reduce waste, increase timeliness, coordination and automation. This can vastly increase efficiency while facilitating more flexible and tailored/ personalised production. For instance, supermarkets could be able to provide a complete history of each product they sell in their shelves-room, thus guaranteeing quality and offering services on top (ex: responsible farming). Factories of the future could be fully connected and automated and deliveries, including through drones and other self-driving vehicles, optimised and personalised.</para></listitem>
<listitem><para><emphasis role="strong">Tighter relation supplier/buyer</emphasis>: Smart, connected products expand opportunities for product differentiation, moving competition away from price alone. Knowing how customers actually use their products enhances a company&#x2019;s ability to segment customers, customise products, set prices to better capture value, and extend personalised value-added services. Through capturing rich historical and product-usage data, buyers&#x2019; costs of switching to a new supplier may increase. The deeper relationship with the customer hence serves to improve differentiation with them while improving its offer towards other aircraft manufacturers.</para></listitem>
<listitem><para><emphasis role="strong">Increased buyer power</emphasis> by giving buyers a better understanding of true product performance, allowing them to play one provider against another. Having access to product usage data can decrease their reliance on the provider for advice and support. Finally, compared with ownership models, &#x201C;product as a service&#x201D; business models or product-sharing services can increase buyers&#x2019; power by reducing the cost of switching to a new provider.</para></listitem>
<listitem><para><emphasis role="strong">New business models</emphasis> enabled by smart, connected products can create a substitute for product ownership. Product-as-a-service business models, for example, allow users to have full access to a product but pay only for the amount of product they use. A variation of product-as-a-service is the shared-usage model. Companies like UBER or blablacar are examples that provide alternatives to car ownership. Equivalent substitutes for car ownership and has led traditional automakers to enter the car-sharing market with offerings such DriveNow from BMW, or Dash from Toyota.</para></listitem>
<listitem><para><emphasis role="strong">New innovative actors and start-ups</emphasis>: developments like the &#x201C;maker culture&#x201D;, an extension of the DIY culture stress new and unique applications of technologies and encourage invention and prototyping, having a strong focus on using and learning practical skills and applying them creatively. SMEs can take advantage of the availability of IoT open platforms and test-beds and open source hardware and software to reduce development costs and time-to-market, and to support collaboration among businesses of different areas such as software, sensors, devices, and user businesses.</para></listitem>
</itemizedlist>
</para>
</section>
<section class="lev1" id="sec2.4" label="2.4" xreflabel="2.4">
<title>Issues to Be Tackled</title>
<para>Although the horizontal character of the IoT is recognized the creation of IoT ecosystems is a pre-requisite for the development of innovation and take up in the EU, which is still in an emerging phase. The IoT requires alliances between multiple sectors and stakeholders to cover an increasingly complex value chain. It also requires open platforms that can integrate many different types of equipment and application.</para>
<para>Another important roadblock to build IoT ecosystems relates to the lack of employee skills/knowledge, reported as being an important obstacle facing organizations in using IoT. To quote a leading medical device company, &#x201C;Our sales force has been used to selling equipment, but now they need to sell IT solutions. They need to be able to convince customers on the value received by connecting their equipment&#x201D;.</para>
<para>Moreover, the IoT needs to be developed as an integral part of the Digital Single Market with a focus on creating an enabling environment for these technologies to be rolled out quickly and across the whole of Europe so as to reap economies of scale and productivity gains for our economies. This includes considering provisions to remove regulatory obstacles that prevent take up on a continental basis. In this context the European Union is willing to examine solutions to promote innovation and create a legal framework that encourages deployment.</para>
<para>The development of IoT may also raise privacy concerns since smart objects will collect more and new kinds of data, including personal data, and will exchange data automatically, which may lead to a perception of loss of control by citizens. IoT may further provoke ethical questions pertaining in particular to individuals&#x2019; autonomy, accountability for object behaviour, or the precautionary principle. Recent examples of hacking objects have shown that the development of IoT and its integration in systems enabling key economic and societal activities may raise security and resilience issues which may require further organizational measures.</para>
<para>Liability is also seen as an important issue to address, in situation where wrong decisions may be taken by smart devices and connected systems. These issues are critical to acceptability of the technology by citizens. Education is needed as well as legal guidance for proper deployment conditions to make sure that the IoT serves EU values and benefits citizens genuinely, and to avoid the perception that IoT could lead to a dehumanised society controlled by the machines and/or a reinforcing of the digital divide and of social exclusion. The EU level is particularly relevant to guarantee adherence to European values such as fundamental rights, protection of integrity, inclusion, as well as openness, fair competition and open innovation.</para>
<para>Finally, there is a need to move into testing and deployment of IoT technologies in real-life settings. Uncertainty about business models and uncertainty about standards is generating information asymmetries and market failures preventing investment and risk-taking. In this perspective Large Scale Pilots would support testing the deployment of large amounts of sensors, or the interoperability of applications in different areas. Large Scale Pilots could also be used to investigate acceptability by users and business models. This could play an important role to address security and trust issues in an integrated manner and could contribute to certification and validation in the IoT area, as well as to certification.</para>
</section>
<section class="lev1" id="sec2.5" label="2.5" xreflabel="2.1">
<title>Building IoT Innovation Ecosystems</title>
<para>IoT could become the innovation engine &#x201C;par excellence&#x201D;, and will bring to the market entire new classes of new devices, around which sustainable innovation could take shape. Innovation in this respect can be seen from different perspectives: i) open platforms, as outlined above, can be leveraged by innovators to create new products and services, possibly in partnership with larger players; ii) for small start-up players, it is important to benefit from an innovation ecosystem where new ideas can be nurtured and incubated, before being introduced to the market.</para>
<para>The creation of IoT innovation ecosystems is an opportunity for Europe. Although there is no single definition for ecosystems, it is certainly important to note that they coevolve their capabilities and roles, and tend to align themselves with the directions set by one or more central companies. Leadership roles may change over time, but the function of ecosystem leader is valued by the community because it enables members to move towards shared visions to align their investments, and to find mutually supportive roles.<footnote id="fn2_1" label="1"><para>Moore, James F. (1993). &#x201C;Predators and prey: A new ecology of competition&#x201D;. Harvard Business Review (May/June): 75&#x2013;86.</para></footnote> It also means that companies need to become proactive in developing mutually beneficial (&#x201C;symbiotic&#x201D;) relationships with customers, suppliers, and even competitors.</para>
<para>IoT innovation ecosystems could be created around specific solutions (ex: car, home, city, hospital, devices), and be based on open platforms to deliver for instance applications and services dedicated to families of connected devices. In this context a proliferation of IoT applications and services has to lend itself on a reliable and interoperable infrastructure for device communication, smart cooperation and edge intelligence. In addition, hardware developments and new IoT products could be developed around Fablabs and IoT factories, providing all the necessary support and infrastructure to develop connected objects.</para>
</section>
<section class="lev1" id="sec2.6" label="2.6" xreflabel="2.6">
<title>IoT Large Scale Pilots for Testing and Deployment</title>
<para>The deployment of IoT concerns complex systems and potentially addresses a large population of actors with different cultures and interests. Putting them together to realise a system that can operate at large scale under multiple operational constraints is still risky, and business models across complex value chains are not always well understood. The challenge is to foster the deployment of IoT solutions in Europe through integration of advanced IoT technologies across the value chain, demonstration of multiple IoT applications at scale and in a usage context, and as close as possible to operational conditions.</para>
<para>To move forward, the idea of deploying large scale pilots is gaining momentum globally. These pilots are designed not only to validate technological approaches from a scalability and operational perspective, but also to validate usability and user &#x201C;positive reaction&#x201D; to new service. From a public policy perspective, these pilots need to be driven by considerations of openness that lock-in situations and limited interoperability are avoided whilst the possibility to build open innovation on top is maximised.</para>
<para>Considering the important investments on IoT technologies which have already been taken at EU and Member States levels, it is evident to realize the next big step towards implementation of large scale pilots. Under Horizon 2020, the European Commission will launch a series of large scale pilots in promising domains cutting across the interest of multiple usage sectors, and cutting across different industrial sectors, both from supply and demand side perspectives. These use cases will be supported by open platforms. The pilots will not be designed as a pure technology exercise but in a way to deliver best practices in terms of technology and standards applicability, privacy and security, business models, and user acceptance. The pilots should also be used to derive methodologies to design Privacy and Security impact assessments in the IoT context.</para>
<para>The piloting activities will be complemented with support actions addressing challenges critically important for the take-up of IoT at the anticipated scale. These include ethics and privacy, trust and security, standards and interoperability, user acceptability, liability and sustainability, and new ways of creativity including the combination of ICT and Art. In addition the pilots will be complemented through international cooperation and specific IoT research and innovation efforts for ensuring the longer-term evolution of Internet of Things.</para>
</section>
<section class="lev1" id="sec2.7" label="2.7" xreflabel="2.7">
<title>Alliance for Internet of Things Innovation</title>
<para>In the past months it became obvious that no thorough and wide ranging innovation with happen without cooperation. In order to deliver comprehensive solutions, cooperation even with potential competitors or with new partners entering the field of IoT is pivotal for two reasons: 1) one single entity cannot provide all components of a solution, and 2) because of multiple possible technical combinations and implementations, co-development reduces the risk of failure and sub-optimal solutions and provides best practices.</para>
<fig id="F2-2" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 2.2</label>
<caption><para>The Alliance Momentum declaration.</para></caption>
<graphic xlink:href="graphics/fig2_2.jpg"/>
</fig>
<para>In order to support this process the Commission facilitated the creation of a new Alliance named AIOTI &#x2013; Alliance for Internet of Things Innovation, comprising in particular industry representatives from larger but also younger IoT innovators. This Alliance, which is open by nature, and their members strive together that Europe will have the most dynamic and agile IoT ecosystem and industry in the world, with the ultimate goal to transform people&#x2019;s lives, drive growth, create employment and address societal challenges.</para>
<para>The Alliance for Internet of Things Innovation (AIOTI) is also an important tool for supporting the policy and dialogue within the Internet of Things world and within the European Commission. It builds on the work of the IoT European Research Cluster (IERC) and expands activities towards innovation within and across industries. In light of the IoT Large Scale Pilots to be funded under the Horizon 2020 Research and Innovation Program, the Alliance allows all potential stakeholders to pre-structure potential approaches in the areas of but not limited to smart living environments, smart farming, wearables, smart cities, mobility and smart environment.</para>
<para>Not limited to IoT Large Scale Pilots as such, the Alliance has also set up workgroups in the fields of Innovation Ecosystems, IoT Standardisation and Policy issues (trust, security, liability, privacy). Overall the alliance will help to create the necessary links and to forge cross-sectorial synergies.</para>
</section>
<section class="lev1" id="sec2.8" label="2.8" xreflabel="2.8">
<title>Conclusions</title>
<para>The Internet of Things has entered the next stage and reached early adopters and the market. Yet a sound effort is necessary for providing interoperable and trustful IoT implementations. From emerging IoT Ecosystems towards IoT Large Scale Pilots, the European Commission attributes a great importance to IoT activities driven by end-user and citizen, and involving existing and new communities at an early stage.</para>
<para>It would be a strategic mistake not to take up the challenge for the EU to become one of the global leaders in the IoT field &#x2014; Europe has today a unique opportunity to use the IoT to rejuvenate its industry, deal with its ageing population and transform its cities into places to be.</para>
</section>
</chapter>
<chapter class="chapter" id="ch03" label="3" xreflabel="ch03">
<title>Internet of Things beyond the Hype: Research, Innovation and Deployment</title>
<authorgroup>
<emphasis role="strong"><author><firstname>Ovidiu</firstname> <surname>Vermesan</surname></author><superscript>1</superscript>, <author><firstname>Peter</firstname> <surname>Friess</surname></author><superscript>2</superscript>, <author><firstname>Patrick</firstname> <surname>Guillemin</surname></author><superscript>3</superscript>, <author><firstname>Raffaele</firstname> <surname>Giaffreda</surname></author><superscript>4</superscript>, <author><firstname>Hanne</firstname> <surname>Grindvoll</surname></author><superscript>1</superscript>, <author><firstname>Markus</firstname> <surname>Eisenhauer</surname></author><superscript>5</superscript>, <author><firstname>Martin</firstname> <surname>Serrano</surname></author><superscript>6</superscript>, <author><firstname>Klaus</firstname> <surname>Moessner</surname></author><superscript>7</superscript>, <author><firstname>Maurizio</firstname> <surname>Spirito</surname></author><superscript>8</superscript>, <author><firstname>Lars-Cyril</firstname> <surname>Blystad</surname></author><superscript>1</superscript> and <author><firstname>Elias Z.</firstname> <surname>Tragos</surname></author><superscript>9</superscript></emphasis>
</authorgroup>
<para><superscript>1</superscript>SINTEF, Norway</para>
<para><superscript>2</superscript>European Commission, Belgium</para>
<para><superscript>3</superscript>ETSI, France</para>
<para><superscript>4</superscript>CREATE-NET, Italy</para>
<para><superscript>5</superscript>Fraunhofer FIT, Germany </para>
<para><superscript>6</superscript>National University of Ireland Galway, Ireland</para>
<para><superscript>7</superscript>University of Surrey, UK</para>
<para><superscript>8</superscript>ISMB, Italy</para>
<para><superscript>9</superscript>FORTH, Greece</para>
<para><emphasis>&#x201C;There&#x2019;s a way to do it better. Find it.&#x201D; Thomas Edison</emphasis></para>
<section class="lev1" id="sec3.1" label="3.1" xreflabel="sec3.1">
<title>Internet of Things Vision</title>
<para>Internet of Things (IoT) is a concept and a paradigm that considers pervasive presence in the environment of a variety of things/objects that through wireless and wired connections and unique addressing schemes are able to interact with each other and cooperate with other things/objects to create new applications/services and reach common goals. In this context the research and development challenges to create a smart world are enormous. A world where the real, digital and the virtual are converging to create smart environments that make energy, transport, cities and many other areas more intelligent. The goal of the Internet of Things is to enable things to be connected anytime, anyplace, with anything and anyone ideally using any path/network and any service. Internet of Things is a new revolution of the Internet. Objects make themselves recognizable and they obtain intelligence by making or enabling context related decisions thanks to the fact that they can communicate information about themselves and they can access information that has been aggregated by other things, or they can be components of complex services <link linkend="B3-71">[71]</link>.</para>
<para>The various layers of the IoT value chain cover several distinct product or service categories. Sensors provide much of the data gathering, actuators act, radios/communications chips provide the underlying connectivity, microcontrollers provide the processing of that data, modules combine the radio, sensor and microcontroller, combine it with storage, and make it &#x201C;insertable&#x201D; into a device. Platform software provides the underlying management and billing capabilities of an IoT network, while application software presents all the information gathered in a usable and analysable format for end users. The underlying telecom infrastructure (usually wireless spectrum) provides the means of transporting the data while a service infrastructure needs to be created for the tasks of designing, installing, monitoring and servicing the IoT deployment. Companies will compete at one layer of the IoT value chain, while many will create solutions from multiple layers and functionally compete in a more vertically integrated fashion. <link linkend="B3-42">[42]</link>.</para>
<fig id="F3.1" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 3.1</label>
<caption><para>Internet of Things Integration.</para></caption>
<graphic xlink:href="graphics/fig3_1.jpg"/>
</fig>
<para>The Internet of Things makes use of synergies that are generated by the convergence of Consumer, Business and Industrial Internet. The convergence creates the open, global network connecting people, data, and things. This convergence leverages the cloud to connect intelligent things that sense and transmit a broad array of data, helping creating services that would not be obvious without this level of connectivity and analytical intelligence. The use of platforms is being driven by transformative technologies such as cloud, things, and mobile. The Internet of Things and Services makes it possible to create networks incorporating the entire manufacturing process that convert factories into a smart environment. The cloud enables a global infrastructure to generate new services, allowing anyone to create content and applications for global users. Networks of things connect things globally and maintain their identity online. Mobile networks allow connection to this global infrastructure anytime, anywhere. The result is a globally accessible network of things, users, and consumers, who are available to create businesses, contribute content, generate and purchase new services.</para>
<para>Platforms also rely on the power of network effects, as they allow more things, they become more valuable to the other things and to users that make use of the services generated. The success of a platform strategy for IoT can be determined by connection, attractiveness and knowledge/information/data flow.</para>
<para>The Alliance for Internet of Things Innovation (AIOTI) was recently initiated by the European Commission in order to develop and support the dialogue and interaction among the Internet of Things (IoT) various players. The overall goal of the establishment of the AIOTI is the creation of a dynamic European IoT ecosystem to unleash the potentials of the IoT.</para>
<para>The AIOTI will assist the European Commission in the preparation of future IoT research as well as innovation and standardisation policies. It is also going to play an essential role in the designing of IoT Large Scale Pilots, which will be funded by the Horizon 2020 Research and Innovation Programme. The members of AIOTI will jointly work on the creation of a dynamic European IoT ecosystem. This ecosystem is going to build on the work of the IoT Research Cluster (IERC) and spill over innovation across industries and business sectors of IoT transforming ideas to IoT solutions.</para>
<para>The European Commission (EC) considers that IoT will be pivotal in enabling the digital single market, through new products and services. The IoT, big data, cloud computing and their related business models will be the three most important drivers of the digital economy, and in this context it is fundamental for a fully functional single market in Europe to address aspects of ownership, access, privacy and data flow &#x2013; the new production factor.</para>
<para>New generations of networks, IoT and cloud computing are also vectors of industrial strategy. The IoT stakeholders are creating a new ecosystem that cuts across vertical areas, in convergence between the physical and digital words. It combines connectivity, data generation, processing and analytics, with actuation and new interfaces, resulting in new products and services based on platforms and software and apps.</para>
<para>Internet of Things developments implies that the environments, cities, buildings, vehicles, clothing, portable devices and other objects have more and more information associated with them and/or the ability to sense, communicate, network and produce new information. In addition the network technologies have to cope with the new challenges such as very high data rates, dense crowds of users, low latency, low energy, low cost and a massive number of devices. Wireless connectivity anywhere, anytime and between every-body and every-thing (smart houses, vehicles, cities, offices etc.) is gaining momentum, rendering our daily lives easier and more efficient. This momentum will continue to rise, resulting in the need to enable wireless connections between people, machines, communities, physical things, processes, content etc. anytime, in flexible, reliable and secure ways. The air interfaces for 2G, 3G, and 4G were all designed for specific use cases with certain KPIs in mind (throughput, capacity, dropped/blocked call rates etc.). However, the emerging trend of connecting everything to the Internet (IoT and Internet of Vehicles, IoV) brings up the need to go beyond such an approach. The inclusion of the above mentioned use cases pose new challenges due to the broader range of service and device classes, ranging from IoT to short range Mobile Broadband (MBB) communications (e.g. WiFi) and from high-end smartphone to low-end sensor. Furthermore, each service type/device class has more stringent requirements than ever (e.g. air interface latency in the order of 1ms) and some of these requirements are conflicting (e.g. to support very low latencies, energy and resource efficiency may not be optimal). So, the challenge is not only to increase the user rates or the capacity (as has always been so far) but also to master the heterogeneity and the trade-off between the conflicting requirements as presented in <link linkend="F3.2">Figure <xref linkend="F3.2" remap="3.2"/></link> <link linkend="B3-3">[3]</link>.</para>
<fig id="F3.2" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 3.2</label>
<caption><para>Design principles, services and related KPIs <link linkend="B3-3">[3]</link>.</para></caption>
<graphic xlink:href="graphics/fig3_2.jpg"/>
</fig>
<para>As the Internet of Things becomes established in smart factories, both the volume and the level of detail of the corporate data generated will increase. Moreover, business models will no longer involve just one company, but will instead comprise highly dynamic networks of companies and completely new value chains. Data will be generated and transmitted autonomously by smart machines and these data will inevitably cross company boundaries. A number of specific dangers are associated with this new context &#x2013; for example, data that were initially generated and exchanged in order to coordinate manufacturing and logistics activities between different companies could, if read in conjunction with other data, suddenly provide third parties with highly sensitive information about one of the partner companies that might, for example, give them an insight into its business strategies. New instruments will be required if companies wish to pursue the conventional strategy of keeping such knowledge secret in order to protect their competitive advantage. New, regulated business models will also be necessary &#x2013; the raw data that are generated may contain information that is valuable to third parties and companies may therefore wish to make a charge for sharing them. Innovative business models like this will also require legal safeguards (predominantly in the shape of contracts) in order to ensure that the value added created is shared out fairly, e.g. through the use of dynamic pricing models <link linkend="B3-56">[56]</link>.</para>
<section class="lev2" id="sec3.1.1" label="3.1.1" xreflabel="sec3.1.1">
<title>Internet of Things Common Definition</title>
<para>The IoT is a key enabling technology for digital businesses. Approximately 3.9 billion connected things were in use in 2014 and this figure is expected to rise to 25 billion by 2020. Gartner&#x2019;s top 10 strategy technology trends <link linkend="B3-55">[55]</link> cover three themes: the merging of the real and virtual worlds, the advent of intelligence everywhere, and the technology impact of the digital business shift.</para>
<fig id="F3.3" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 3.3</label>
<caption><para>Cyber-physical sytems as building blocks of IoT applications.</para></caption>
<graphic xlink:href="graphics/fig3_3.jpg"/>
</fig>
<para>The traditional distinction between network and device is starting to blur as the functionalities of the two become indistinguishable. Shifting the focus from the IoT network to the devices costs less, scales more gracefully, and leads to immediate revenues.</para>
<para>The systemic nature of innovation requires the need for coordination stakeholders, systems and services in interaction-intensive environments with a permanent and seamless mix of online and real-world experiences and offerings, as the IoT will consist of countless cyber-physical systems (CPS). The overlay of virtual and physical will be enabled by layered and augmented reality interfaces for interconnected things, smartphones, wearables, industrial equipment, which will exchange continuous data via edge sensor/actuator networks and context-aware applications using ubiquitous connectivity and computing by integrating technologies such as cloud edge cloud/fog and mobile. In this context the IoT applications will have real time access to intelligence about virtual and physical processes and events by open, linked and smart data.</para>
<para>Gartner [<link linkend="B3-54">54</link>, <link linkend="B3-55">55</link>] identifies that the combination of data streams and services created by digitizing everything creates four basic usage models:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>Manage</para></listitem>
<listitem><para>Monetize</para></listitem>
<listitem><para>Operate</para></listitem>
<listitem><para>Extend.</para></listitem>
</itemizedlist>
<para>These can be applied to people, things, information, and places, and therefore the so called &#x201C;Internet of Things&#x201D; will be succeeded by the &#x201C;Internet of Everything.&#x201D;</para>
<para>In this context the notion of network convergence using IP is fundamental and relies on the use of a common multi-service IP network supporting a wide range of applications and services.</para>
<fig id="F3.4" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 3.4</label>
<caption><para>The top 10 strategic technology trends for 2015 <link linkend="B3-55">[55]</link>.</para></caption>
<graphic xlink:href="graphics/fig3_4.jpg"/>
</fig>
<para>The Internet of Things is not a single technology, it&#x2019;s a concept in which most new things are connected and enabled such as street lights being networked and things like embedded sensors, image recognition functionality, augmented reality, near field communication are integrated into situational decision support, asset management and new services. These bring many business opportunities and add to the complexity of IT <link linkend="B3-52">[52]</link>.</para>
<para>To accommodate the diversity of the IoT, there is a heterogeneous mix of communication technologies, which need to be adapted in order to address the needs of IoT applications such as energy efficiency, security, and reliability. In this context, it is possible that the level of diversity will be scaled to a number a manageable connectivity technologies that address the needs of the IoT applications, are adopted by the market, they have already proved to be serviceable, supported by a strong technology alliance.</para>
<para>The Internet of Things provides solutions based on the integration of information technology, which refers to hardware and software used to store, retrieve, and process data and communications technology which includes electronic systems used for communication between individuals or groups. The rapid convergence of information and communications technology is taking place at three layers of technology innovation: the cloud, data and communication pipes/networks and device <link linkend="B3-44">[44]</link>.</para>
<para>IoT will rearrange the tech landscape, again. IoT has key attributes that distinguish it from the &#x201C;regular&#x201D; Internet, as captured by the S-E-N-S-E framework presented in <link linkend="F3.5">Figure <xref linkend="F3.5" remap="3.5"/></link> These attributes may tilt the direction of technology development and adoption, with significant implications for Tech companies, much like the transition from the fixed to the mobile Internet shifted the centre of gravity among the different actors in the value chain.</para>
<fig id="F3.5" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 3.5</label>
<caption><para>Making S-E-N-S-E of the Internet of Things (Source: Goldman Sachs Global Investment Research).</para></caption>
<graphic xlink:href="graphics/fig3_5.jpg"/>
</fig>
<para>The synergy of the access and potential data exchange opens huge new possibilities for IoT applications. Already over 50% of Internet connections are between or with things.</para>
<para>By 2020, over 30 billion connected things, with over 200 billion with intermittent connections are forecast. Key technologies here include embedded sensors, image recognition and NFC. By 2015, in more than 70% of enterprises, a single executable will oversee all Internet connected things. This becomes the Internet of Everything <link linkend="B3-53">[53]</link>.</para>
<para>As a result of this convergence, the IoT applications require that classical industries are adapting and the technology will create opportunities for new industries to emerge and to deliver enriched and new user experiences and services.</para>
<para>In addition, to be able to handle the sheer number of things and objects that will be connected in the IoT, cognitive technologies and contextual intelligence are crucial. This also applies for the development of context aware applications that need to be reaching to the edges of the network through smart devices that are incorporated into our everyday life.</para>
<para>The Internet is not only a network of computers, but it has evolved into a network of devices of all types and sizes, vehicles, smartphones, home appliances, toys, cameras, medical instruments and industrial systems, all connected, all communicating and sharing information all the time.</para>
<para>The Internet of Things had until recently different means at different levels of abstractions through the value chain, from lower level semiconductor through the service providers.</para>
<para>The Internet of Things is a &#x201C;global concept&#x201D; and requires a common definition. Considering the wide background and required technologies, from sensing device, communication subsystem, data aggregation and preprocessing to the object instantiation and finally service provision, generating an unambiguous definition of the &#x201C;Internet of Things&#x201D; is non-trivial.</para>
<para>The IERC is actively involved in ITU-T Study Group 13, which leads the work of the International Telecommunications Union (ITU) on standards for next generation networks (NGN) and future networks and has been part of the team which has formulated the following definition <link linkend="B3-67">[67]</link>: <emphasis>&#x201C;<emphasis role="strong">Internet of things (IoT)</emphasis>: A global infrastructure for the information society, enabling advanced services by interconnecting (physical and virtual) things based on existing and evolving interoperable information and communication technologies. NOTE 1 &#x2013; Through the exploitation of identification, data capture, processing and communication capabilities, the IoT makes full use of things to offer services to all kinds of applications, whilst ensuring that security and privacy requirements are fulfilled. NOTE 2 &#x2013; From a broader perspective, the IoT can be perceived as a vision with technological and societal implications.&#x201D;</emphasis></para>
<fig id="F3.6" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 3.6</label>
<caption><para>IoT Architectural View.</para></caption>
<graphic xlink:href="graphics/fig3_6.jpg"/>
</fig>
<fig id="F3.7" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 3.7</label>
<caption><para>IoT Definition <link linkend="B3-70">[70]</link>.</para></caption>
<graphic xlink:href="graphics/fig3_7.jpg"/>
</fig>
<para>The IERC definition <link linkend="B3-70"><link linkend="B3-70">[70]</link></link> states that IoT is <emphasis>&#x201C;A dynamic global network infrastructure with self-configuring capabilities based on standard and interoperable communication protocols where physical and virtual &#x201C;things&#x201D; have identities, physical attributes, and virtual personalities and use intelligent interfaces, and are seamlessly integrated into the information network.&#x201D;</emphasis>.</para>
</section>
</section>
<section class="lev1" id="sec3.2" label="3.2" xreflabel="sec3.2">
<title>IoT Strategic Research and Innovation Directions</title>
<para>The development of enabling technologies such as nanoelectronics, communications, sensors, smart phones, embedded systems, cloud networking, network virtualization and software will be essential to provide to things the capability to be connected all the time everywhere. This will also support important future IoT product innovations affecting many different industrial sectors. Some of these technologies such as embedded or cyber-physical systems form the edges of the &#x201C;Internet of Things&#x201D; bridging the gap between cyber space and the physical world of real &#x201C;things&#x201D;, and are crucial in enabling the &#x201C;Internet of Things&#x201D; to deliver on its vision and become part of bigger systems in a world of &#x201C;systems of systems&#x201D;.</para>
<para>The final report of the Key Enabling Technologies (KET), of the High-Level Expert Group <link linkend="B3-45">[45]</link> identified the enabling technologies, crucial to many of the existing and future value chains of the European economy:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>Nanotechnologies</para></listitem>
<listitem><para>Micro and Nano electronics</para></listitem>
<listitem><para>Photonics</para></listitem>
<listitem><para>Biotechnology</para></listitem>
<listitem><para>Advanced Materials</para></listitem>
<listitem><para>Advanced Manufacturing Systems</para></listitem>
</itemizedlist>
<para>As such, IoT creates intelligent applications that are based on the supporting KET&#x2019;s identified, as IoT applications address smart environments either physical or at cyber-space level, and in real time.</para>
<para>To this list of key enablers, we can add the global deployment of IPv6 across the World enabling a global and ubiquitous addressing of any communicating smart thing.</para>
<para>From a technology perspective, the continuous increase in the integration density proposed by Moore&#x2019;s Law was made possible by a dimensional scaling: in reducing the critical dimensions while keeping the electrical field constant, one obtained at the same time a higher speed and a reduced power consumption of a digital MOS circuit: these two parameters became driving forces of the microelectronics industry along with the integration density.</para>
<para>The International Technology Roadmap for Semiconductors has emphasized in its early editions the &#x201C;miniaturization&#x201D; and its associated benefits in terms of performances, the traditional parameters in Moore&#x2019;s Law. This trend for increased performances will continue, while performance can always be traded against power depending on the individual application, sustained by the incorporation into devices of new materials, and the application of new transistor concepts. This direction for further progress is labelled &#x201C;More Moore&#x201D;.</para>
<para>The second trend is characterized by functional diversification of semiconductor-based devices. These non-digital functionalities do contribute to the miniaturization of electronic systems, although they do not necessarily scale at the same rate as the one that describes the development of digital functionality. Consequently, in view of added functionality, this trend may be designated &#x201C;More-than-Moore&#x201D; <link linkend="B3-48">[48]</link>.</para>
<para>Mobile data traffic is projected to double each year between now and 2015 and mobile operators will find it increasingly difficult to provide the bandwidth requested by customers. In many countries there is no additional spectrum that can be assigned and the spectral efficiency of mobile networks is reaching its physical limits. Proposed solutions are the seamless integration of existing Wi-Fi networks into the mobile ecosystem. This will have a direct impact on Internet of Things ecosystems. The chips designed to accomplish this integration are known as &#x201C;multicom&#x201D; chips. Wi-Fi and baseband communications are expected to converge and the architecture of mobile devices is likely to change and the baseband chip is expected to take control of the routing so the connectivity components are connected to the baseband or integrated in a single silicon package. As a result of this architecture change, an increasing share of the integration work is likely done by baseband manufacturers (ultra -low power solutions) rather than by handset producers.</para>
<para>Today many European projects and initiatives address Internet of Things technologies and knowledge. Given the fact that these topics can be highly diverse and specialized, there is a strong need for integration of the individual results. Knowledge integration, in this context is conceptualized as the process through which disparate, specialized knowledge located in multiple projects across Europe is combined, applied and assimilated.</para>
<para>The Strategic Research and Innovation Agenda (SRIA) is the result of a discussion involving the projects and stakeholders involved in the IERC activities, which gather the major players of the European ICT landscape addressing IoT technology priorities that are crucial for the competitiveness of European industry.</para>
<para>IERC Strategic Research and Innovation Agenda covers the important issues and challenges for the Internet of Things technology. It provides the vision and the roadmap for coordinating and rationalizing current and future research and development efforts in this field, by addressing the different enabling technologies covered by the Internet of Things concept and paradigm.</para>
<para>Many other technologies are converging to support and enable IoT applications. These technologies are summarised as:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>IoT architecture</para></listitem>
<listitem><para>Identification</para></listitem>
<listitem><para>Communication</para></listitem>
<listitem><para>Networks technology</para></listitem>
<listitem><para>Network discovery</para></listitem>
<listitem><para>Software and algorithms</para></listitem>
<listitem><para>Hardware technology</para></listitem>
<listitem><para>Data and signal processing</para></listitem>
<listitem><para>Discovery and search engine</para></listitem>
<listitem><para>Network management</para></listitem>
<listitem><para>Power and energy storage</para></listitem>
<listitem><para>Security, trust, dependability and privacy</para></listitem>
<listitem><para>Interoperability</para></listitem>
<listitem><para>Standardization</para></listitem>
</itemizedlist>
<para>The Strategic Research and Innovation Agenda is developed with the support of a European-led community of interrelated projects and their stakeholders, dedicated to the innovation, creation, development and use of the Internet of Things technology.</para>
<para>Since the release of the first version of the Strategic Research and Innovation Agenda, we have witnessed active research on several IoT topics. On the one hand this research filled several of the gaps originally identified in the Strategic Research and Innovation Agenda, whilst on the other it created new challenges and research questions. Recent advances in areas such as cloud computing, cyber-physical systems, autonomic computing, and social networks have changed the scope of the Internet of Thing&#x2019;s convergence even more so. The Cluster has a goal to provide an updated document each year that records the relevant changes and illustrates emerging challenges. The updated release of this Strategic Research and Innovation Agenda builds incrementally on previous versions [<link linkend="B3-70">70</link>, <link linkend="B3-71">71</link>, <link linkend="B3-92">92</link>, <link linkend="B3-93">93</link>] and highlights the main research topics that are associated with the development of IoT enabling technologies, infrastructures and applications with an outlook towards 2020 <link linkend="B3-82">[82]</link>.</para>
<para>The research items introduced will pave the way for innovative applications and services that address the major economic and societal challenges underlined in the EU 2020 Digital Agenda <link linkend="B3-83">[83]</link>.</para>
<para>The IERC Strategic Research and Innovation Agenda is developed incrementally based on its previous versions and focus on the new challenges being identified in the last period.</para>
<para>The updated release of the Strategic Research and Innovation Agenda is highlighting the main research topics that are associated with the development of IoT infrastructures and applications, with an outlook towards 2020 <link linkend="B3-82">[82]</link>.</para>
<para>The timeline of the Internet of Things Strategic Research and Innovation Agenda covers the current decade with respect to research and the following years with respect to implementation of the research results. Of course, as the Internet and its current key applications show, we anticipate unexpected trends will emerge leading to unforeseen and unexpected development paths.</para>
<para>The Cluster has involved experts working in industry, research and academia to provide their vision on IoT research challenges, enabling technologies and the key applications, which are expected to arise from the current vision of the Internet of Things.</para>
<para>The IoT Strategic Research and Innovation Agenda covers in a logical manner the vision, the technological trends, the applications, the technology enablers, the research agenda, timelines, priorities, and finally summarises in two tables the future technological developments and research needs.</para>
<para>The field of the Internet of Things is based on the paradigm of supporting the IP protocol to all edges of the Internet and on the fact that at the edge of the network many (very) small devices are still unable to support IP protocol stacks. This means that solutions centred on minimum Internet of Things devices are considered as an additional Internet of Things paradigm <emphasis>without IP to all access edges</emphasis>, due to their importance for the development of the field.</para>
<section class="lev2" id="sec3.2.1" label="3.2.1" xreflabel="sec3.2.1">
<title>IoT Applications and Deployment Scenarios</title>
<para>The IERC vision is that &#x201C;the major objectives for IoT are the creation of smart environments/spaces and self-aware things (for example: smart transport, products, cities, buildings, rural areas, energy, health, living, etc.) for climate, food, energy, mobility, digital society and health applications&#x201D; <link linkend="B3-70">[70]</link>.</para>
<para>The outlook for the future is the emerging of a network of interconnected uniquely identifiable objects and their virtual representations in an Internet alike structure that is positioned over a network of interconnected computers allowing for the creation of a new platform for economic growth.</para>
<para>Smart is the new green as defined by Frost &#x0026; Sullivan <link linkend="B3-49">[49]</link> and the green products and services will be replaced by smart products and services. Smart products have a real business case, can typically provide energy and efficiency savings of up to 30 per cent, and generally deliver a two- to three-year return on investment. This trend will help the deployment of Internet of Things applications and the creation of smart environments and spaces.</para>
<para>At the city level, the integration of technology and quicker data analysis will lead to a more coordinated and effective civil response to security and safety (law enforcement and blue light services); higher demand for outsourcing security capabilities.</para>
<para>At the building level, security technology will be integrated into systems and deliver a return on investment to the end-user through leveraging the technology in multiple applications (HR and time and attendance, customer behaviour in retail applications etc.).</para>
<para>There will be an increase in the development of &#x201C;Smart&#x201D; vehicles which have low (and possibly zero) emissions. They will also be connected to infrastructure. Additionally, auto manufacturers will adopt more use of &#x201C;Smart&#x201D; materials.</para>
<para>The key focus will be to make the city smarter by optimizing resources, feeding its inhabitants by urban farming, reducing traffic congestion, providing more services to allow for faster travel between home and various destinations, and increasing accessibility for essential services. It will become essential to have intelligent security systems to be implemented at key junctions in the city. Various types of sensors will have to be used to make this a reality. Sensors are moving from &#x201C;smart&#x201D; to &#x201C;intelligent&#x201D;.</para>
<fig id="F3.8" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 3.8</label>
<caption><para>IoT applications for integration of different vertical sectors.</para></caption>
<graphic xlink:href="graphics/fig3_8.jpg"/>
</fig>
<para>Wastewater treatment plants will evolve into bio-refineries. New, innovative wastewater treatment processes will enable water recovery to help close the growing gap between water supply and demand.</para>
<para>Self-sensing controls and devices will mark new innovations in the Building Technologies space. Customers will demand more automated, selfcontrolled solutions with built in fault detection and diagnostic capabilities.</para>
<para>Development of smart implantable chips that can monitor and report individual health status periodically will see rapid growth.</para>
<para>Smart pumps and smart appliances/devices are expected to be significant contributors towards efficiency improvement. Process equipment with in built &#x201C;smartness&#x201D; to self-assess and generate reports on their performance, enabling efficient asset management, will be adopted.</para>
<para>The Industrial Internet starts with embedding sensors and other advanced instrumentation in an array of machines from the simple to the highly complex. This allows the collection and analysis of an enormous amount of data, which can be used to improve machine performance, and inevitably the efficiency of the systems and networks that link them. Even the data itself can become &#x201C;intelligent,&#x201D; instantly knowing which users it needs to reach.</para>
<para>Consumer IoT is essentially wireless, while the industrial IoT has to deal with an installed base of millions of devices that could potentially become part of this network (many legacy systems installed before IP deployment). These industrial objects are linked by wires that provides the reliable communications needed. The industrial IoT has to consider the legacy using specialised protocols, including Lonworks, DeviceNet, Profibus and CAN and they will be connected into this new network of networks through gateways.</para>
<para>The automation and management of asset-intensive enterprises will be transformed by the rise of the IoT, Industry 4.0, or simply Industrial Internet. Compared with the Internet revolution, many product and asset management solutions have laboured under high costs and poor connectivity and performance. This is now changing. New high-performance systems that can support both Internet and Cloud connectivity as well as predictive asset management are reaching the market. New cloud computing models, analytics, and aggregation technologies enable broader and low cost application of analytics across these much more transparent assets. These developments have the potential to radically transform products, channels, and company business models. This will create disruptions in the business and opportunities for all types of organizations &#x2013; OEMs, technology suppliers, system integrators, and global consultancies. There may be the opportunity to overturn established business models, with a view toward answering customer pain points and also growing the market in segments that cannot be served economically with today&#x2019;s offerings. Mobility, local diagnostics, and remote asset monitoring are important components of these new solutions, as all market participants need ubiquitous access to their assets, applications, and customers. Real-time mobile applications support EAM, MRO, inventory management, inspections, workforce management, shop floor interactions, facilities management, field service automation, fleet management, sales and marketing, machine-to-machine (M2M), and many others <link linkend="B3-57">[57]</link>.</para>
<para>In this context the concept of Internet of Energy requires web based architectures to readily guarantee information delivery on demand and to change the traditional power system into a networked Smart Grid that is largely automated, by applying greater intelligence to operate, enforce policies, monitor and self-heal when necessary. This requires the integration and interfacing of the power grid to the network of data represented by the Internet, embracing energy generation, transmission, delivery, substations, distribution control, metering and billing, diagnostics, and information systems to work seamlessly and consistently.</para>
<para>The concept enables the ability to produce, store and efficiently use energy, while balancing the supply/demand by using a cognitive Internet of Energy that harmonizes the energy grid by processing the data, information and knowledge via the Internet. The Internet of Energy concept leverages on the information highway provided by the Internet to link devices and services with the distributed smart energy grid that is the highway for renewable energy resources allowing stakeholders to use green technologies and sell excess energy back to the utility. The concept has the energy management element in the centre of the communication and exchange of data and energy.</para>
<para>The Smart-X environments are implemented using CPS building blocks integrated into Internet of X applications connected through the Internet and enabling seamless and secure interactions and cooperation of intelligent embedded systems over heterogeneous communication infrastructures.</para>
<para>It is expected that this &#x201C;development of smart entities will encourage development of the novel technologies needed to address the emerging challenges of public health, aging population, environmental protection and climate change, conservation of energy and scarce materials, enhancements to safety and security and the continuation and growth of economic prosperity.&#x201D; The IoT applications are further linked with Green ICT, as the IoT will drive energy-efficient applications such as smart grid, connected electric cars, energy-efficient buildings, thus eventually helping in building green intelligent cities.</para>
<fig id="F3.9" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 3.9</label>
<caption><para>CPS building blocks for Internet of X applications.</para></caption>
<graphic xlink:href="graphics/fig3_9.jpg"/>
</fig>
</section>
</section>
<section class="lev1" id="sec3.3" label="3.3" xreflabel="sec3.3">
<title>IoT Smart-X Applications</title>
<para>The IoT applications are addressing the societal needs and the advancements to enabling technologies such as nanoelectronics and cyber-physical systems continue to be challenged by a variety of technical (i.e., scientific and engineering), institutional, and economical issues.</para>
<para>The list is focusing to the applications chosen by the IERC as priorities for the next years and it provides the research challenges for these applications. While the applications themselves might be different, the research challenges are often the same or similar.</para>
<section class="lev2" id="sec3.3.1" label="3.3.1" xreflabel="sec3.3.1">
<title>Wearables</title>
<para>Wearables are integrating key technologies (e.g. nanoelectronics, organic electronics, sensing, actuating, communication, low power computing, visualisation and embedded software) into intelligent systems to bring new functionalities into clothes, fabrics, patches, watches and other body-mounted devices.</para>
<fig id="F3.10" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 3.10</label>
<caption><para>Smart wristbands and watches &#x2013; connected IoT devices.</para></caption>
<graphic xlink:href="graphics/fig3_10.jpg"/>
</fig>
<para>These intelligent edge devices are more and more part of integrated IoT solutions and assist humans in monitoring, situational awareness and decision making. They can provide actuating functions for fully automated closed-loop solutions that are used in healthcare, well-being, safety, security, infotainment applications and connected with smart buildings, energy, lighting, mobility or smart cities IoT applications. With more than 35 million connected wearable devices in use by the end of 2014, developers are pushing the technological integration into IoT applications looking for the innovation opportunities in different domains. Today, Over 75% of consumers with wearable devices stop using them within 6 months. The challenge for developers is to leverage actionable data to create apps that are seamlessly integrated into everyday life and integrate them with other IoT applications.</para>
<para>Creating a seamless user experience is essential for wearable application success. Leveraging tools to implement gesture-centric interfaces will allow users to make the most of limited surfaces of the wearables. The integration into common IoT platforms where developers can access data gathered from wearable devices is essential recombining datasets to develop applications for specific use cases. The industrial sector offers many opportunities for developers with the augmented reality headsets needed to be used to integrate wearables for solving real problems in the industrial sector.</para>
<para>The market for wearable computing is expected to grow six-fold, from 46 million units in 2014 to 285 million units in 2018 <link linkend="B3-51">[51]</link>. Wearable computing applications include everything from fitness trackers, health monitors, smart watches that provide new ways to interact with and utilize your smartphone, to augmented reality glasses wearable computing device.</para>
<para>Fitness tracking is the biggest application today and this opens the opportunities for watches that are capable of tracking blood pressure, glucose, temperature, pulse rate and other vital parameters measured every few seconds for a long period of time to be integrated in new kinds of healthcare applications. Glasses for augmented reality can be another future wearable application.</para>
</section>
<section class="lev2" id="sec3.1.2" label="3.1.2" xreflabel="sec3.1.2">
<title>Smart Health, Wellness and Ageing Well</title>
<para>The market for health monitoring devices is currently characterised by application-specific solutions that are mutually non-interoperable and are made up of diverse architectures. While individual products are designed to cost targets, the long-term goal of achieving lower technology costs across current and future sectors will inevitably be very challenging unless a more coherent approach is used. The IoT can be used in clinical care where hospitalized patients whose physiological status requires close attention can be constantly monitored using IoT -driven, non-invasive monitoring. This requires sensors to collect comprehensive physiological information and uses gateways and the cloud to analyse and store the information and then send the analysed data wirelessly to caregivers for further analysis and review. These techniques improve the quality of care through constant attention and lower the cost of care by eliminating the need for a caregiver to actively engage in data collection and analysis. In addition the technology can be used for remote monitoring using small, wireless solutions connected through the IoT. These solutions can be used to securely capture patient health data from a variety of sensors, apply complex algorithms to analyse the data and then share it through wireless connectivity with medical professionals who can make appropriate health recommendations.</para>
<para>The links between the many applications in health monitoring are:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>Applications require the gathering of data from sensors.</para></listitem>
<listitem><para>Applications must support user interfaces and displays.</para></listitem>
<listitem><para>Applications require network connectivity for access to infrastructural services.</para></listitem>
<listitem><para>Applications have in-use requirements such as low power, robustness, durability, accuracy and reliability.</para></listitem>
</itemizedlist>
<para>IoT applications are pushing the development of platforms for implementing ambient assisted living (AAL) systems that will offer services in the areas of assistance to carry out daily activities, health and activity monitoring, enhancing safety and security, getting access to medical and emergency systems, and facilitating rapid health support.</para>
<para>The main objective is to enhance life quality for people who need permanent support or monitoring, to decrease barriers for monitoring important health parameters, to avoid unnecessary healthcare costs and efforts, and to provide the right medical support at the right time.</para>
<para>The IoT plays an important role in healthcare applications, from managing chronic diseases at one end of the spectrum to preventing disease at the other.</para>
<para>Challenges exist in the overall cyber-physical infrastructure (e.g., hardware, connectivity, software development and communications), specialized processes at the intersection of control and sensing, sensor fusion and decision making, security, and the compositionality of cyber-physical systems. Proprietary medical devices in general were not designed for interoperation with other medical devices or computational systems, necessitating advancements in networking and distributed communication within cyber-physical architectures. Interoperability and closed loop systems appears to be the key for success. System security will be critical as communication of individual patient data is communicated over cyber-physical networks. In addition, validating data acquired from patients using new cyber-physical technologies against existing gold standard data acquisition methods will be a challenge. Cyber-physical technologies will also need to be designed to operate with minimal patient training or cooperation <link linkend="B3-91">[91]</link>.</para>
<para>New and innovative technologies are needed to cope with the trends on wired, wireless, high-speed interfaces, miniaturization and modular design approaches for products having multiple technologies integrated.</para>
<para>IoT applications have a market potential for electronic health services and connected telecommunication industry with the possibility of building ecosystems in different application areas. Medical expenditures are in the range of 10% of the European gross domestic product. The market segment of telemedicine, one of lead markets of the future will have growth rates of more than 19%.</para>
<para>The smart living environments at home, at work, in public spaces should be based upon integrated systems of a range of IoT-based technologies and services with user-friendly configuration and management of connected technologies for indoors and outdoors.</para>
<para>These systems can provide seamless services and handle flexible connectivity while users are switching contexts and moving in their living environments and be integrated with other application domains such as energy, transport, or smart cities. The advanced IoT technologies, using and extending available open service platforms, standardised ontologies and open standardised APIs can offer many of such smart environment developments.</para>
<fig id="F3.11" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 3.11</label>
<caption><para>Internet of Everything and the new economy of healthcare <link linkend="B3-81">[81]</link>.</para></caption>
<graphic xlink:href="graphics/fig3_11.jpg"/>
</fig>
<para>These IoT technologies can propose user-centric multi-disciplinary solutions that take into account the specific requirements for accessibility, usability, cost efficiency, personalisation and adaptation arising from the application requirements.</para>
</section>
<section class="lev2" id="sec3.3.3" label="3.3.3" xreflabel="sec3.3.3">
<title>Smart Homes and Buildings</title>
<para>The rise of Wi-Fi&#x2019;s role in home automation has primarily come about due to the networked nature of deployed electronics where electronic devices (TVs and AV receivers, mobile devices, etc.) have started becoming part of the home IP network and due the increasing rate of adoption of mobile computing devices (smartphones, tablets, etc.).</para>
<fig id="F3.12" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 3.12</label>
<caption><para>Home equipment and appliances <link linkend="B3-78">[78]</link>.</para></caption>
<graphic xlink:href="graphics/fig3_12.jpg"/>
</fig>
<para>Several organizations are working to equip homes with technology that enables the occupants to use a single device to control all electronic devices and appliances. The solutions focus primarily on environmental monitoring, energy management, assisted living, comfort, and convenience. The solutions are based on open platforms that employ a network of intelligent sensors to provide information about the state of the home. These sensors monitor systems such as energy generation and metering; heating, ventilation, and air conditioning (HVAC); lighting; security; and environmental key performance indicators. The information is processed and made available through a number of access methods such as touch screens, mobile phones, and 3&#x2013;D browsers <link linkend="B3-117">[117]</link>. The networking aspects are bringing online streaming services or network playback, while becoming a mean to control of the device functionality over the network. At the same time mobile devices ensure that consumers have access to a portable &#x2018;controller&#x2019; for the electronics connected to the network. Both types of devices can be used as gateways for IoT applications. In this context many companies are considering building platforms that integrate the building automation with entertainment, healthcare monitoring, energy monitoring and wireless sensor monitoring in the home and building environments.</para>
<para>IoT applications using sensors to collect information about operating conditions combined with cloud hosted analytics software that analyse disparate data points will help facility managers become far more proactive about managing buildings at peak efficiency.</para>
<para>Issues of building ownership (i.e., building owner, manager, or occupants) challenge integration with questions such as who pays initial system cost and who collects the benefits over time. A lack of collaboration between the subsectors of the building industry slows new technology adoption and can prevent new buildings from achieving energy, economic and environmental performance targets.</para>
<para>Integration of cyber physical systems both within the building and with external entities, such as the electrical grid, will require stakeholder cooperation to achieve true interoperability. As in all sectors, maintaining security will be a critical challenge to overcome <link linkend="B3-91">[91]</link>.</para>
<para>Within this field of research the exploitation of the potential of wireless sensor networks (WSNs) to facilitate intelligent energy management in buildings, which increases occupant comfort while reducing energy demand, is highly relevant. In addition to the obvious economic and environmental gains from the introduction of such intelligent energy management in buildings other positive effects will be achieved. Not least of which is the simplification of building control; as placing monitoring, information feedback equipment and control capabilities in a single location will make a buildings&#x2019; energy management system easier to handle for the building owners, building managers, maintenance crews and other users of the building.</para>
<para>Using the Internet together with energy management systems also offers an opportunity to access a buildings&#x2019; energy information and control systems from a laptop or a Smartphone placed anywhere in the world. This has a huge potential for providing the managers, owners and inhabitants of buildings with energy consumption feedback and the ability to act on that information.</para>
<para>The perceived evolution of building system architectures includes an adaptation level that will dynamically feed the automation level with control logic, i.e. rules. Further, in the IoT approach, the management level has also to be made available transversally as configuration; discovery and monitoring services must be made accessible to all levels. Algorithms and rules have also to be considered as Web resources in a similar way as for sensors and actuators. The repartition of roles for a classical building automation system to the new web of things enabled architecture is different and in this context, future works will have to be carried on to find solutions to minimize the transfer of data and the distribution of algorithms <link linkend="B3-46">[46]</link>.</para>
<para>In the context of the future &#x2018;Internet of Things&#x2019;, Intelligent Building Management Systems can be considered part of a much larger information system. This system is used by facilities managers in buildings to manage energy use and energy procurement and to maintain buildings systems. It is based on the infrastructure of the existing Intranets and the Internet, and therefore utilises the same standards as other IT devices. Within this context reductions in the cost and reliability of WSNs are transforming building automation, by making the maintenance of energy efficient healthy productive work spaces in buildings increasingly cost effective <link linkend="B3-80">[80]</link>.</para>
</section>
<section class="lev2" id="sec3.3.4" label="3.3.4" xreflabel="sec3.3.4">
<title>Smart Energy</title>
<para>There is increasing public awareness about the changing paradigm of our policy in energy supply, consumption and infrastructure. For several reasons our future energy supply should no longer be based on fossil resources. Neither is nuclear energy a future proof option. In consequence future energy supply needs to be based largely on various renewable resources. Increasingly focus must be directed to our energy consumption behaviour. Because of its volatile nature such supply demands an intelligent and flexible electrical grid which is able to react to power fluctuations by controlling electrical energy sources (generation, storage) and sinks (load, storage) and by suitable reconfiguration. Such functions will be based on networked intelligent devices (appliances, micro-generation equipment, infrastructure, consumer products) and grid infrastructure elements, largely based on IoT concepts. Although this ideally requires insight into the instantaneous energy consumption of individual loads (e.g. devices, appliances or industrial equipment) information about energy usage on a per-customer level is a suitable first approach.</para>
<para>Future energy grids are characterized by a high number of distributed small and medium sized energy sources and power plants which may be combined virtually ad hoc to virtual power plants; moreover in the case of energy outages or disasters certain areas may be isolated from the grid and supplied from within by internal energy sources such as photovoltaics on the roofs, block heat and power plants or energy storages of a residential area (&#x201C;islanding&#x201D;).</para>
<fig id="F3.13" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 3.13</label>
<caption><para>Smart Energy Concept <link linkend="B3-75">[75]</link>.</para></caption>
<graphic xlink:href="graphics/fig3_13.jpg"/>
</fig>
<para>A grand challenge for enabling technologies such as cyber-physical systems is the design and deployment of an energy system infrastructure that is able to provide blackout free electricity generation and distribution, is flexible enough to allow heterogeneous energy supply to or withdrawal from the grid, and is impervious to accidental or intentional manipulations. Integration of cyber-physical systems engineering and technology to the existing electric grid and other utility systems is a challenge. The increased system complexity poses technical challenges that must be considered as the system is operated in ways that were not intended when the infrastructure was originally built. As technologies and systems are incorporated, security remains a paramount concern to lower system vulnerability and protect stakeholder data <link linkend="B3-91">[91]</link>. These challenges will need to be address as well by the IoT applications that integrate heterogeneous cyber-physical systems.</para>
<para>The developing Smart Grid is expected to implement a new concept of transmission network which is able to efficiently route the energy which is produced from both concentrated and distributed plants to the final user with high security and quality of supply standards. Therefore the Smart Grid is expected to be the implementation of a kind of &#x201C;Internet&#x201D; in which the energy packet is managed similarly to the data packet &#x2013; across routers and gateways which autonomously can decide the best pathway for the packet to reach its destination with the best integrity levels. In this respect the &#x201C;Internet of Energy&#x201D; concept is defined as a network infrastructure based on standard and interoperable communication transceivers, gateways and protocols that will allow a real time balance between the local and the global generation and storage capability with the energy demand. This will also allow a high level of consumer awareness and involvement.</para>
<para>The Internet of Energy (IoE) provides an innovative concept for power distribution, energy storage, grid monitoring and communication. It will allow units of energy to be transferred when and where it is needed. Power consumption monitoring will be performed on all levels, from local individual devices up to national and international level <link linkend="B3-110">[110]</link>. In the long run electro mobility will become another important element of smart power grids. Electric vehicles (EVs) might act as a power load as well as moveable energy storage linked as IoT elements to the energy information grid (smart grid). IoT enabled smart grid control may need to consider energy demand and offerings in the residential areas and along the major roads based on traffic forecast. EVs will be able to act as sink or source of energy based on their charge status, usage schedule and energy price which again may depend on abundance of (renewable) energy in the grid. This is the touch point from where the following telematics IoT scenarios will merge with smart grid IoT.</para>
<para>Latencies are critical when talking about electrical control loops. Even though not being a critical feature, low energy dissipation should be mandatory. In order to facilitate interaction between different vendors&#x2019; products the technology should be based on a standardized communication protocol stack. When dealing with a critical part of the public infrastructure, data security is of the highest importance. In order to satisfy the extremely high requirements on reliability of energy grids, the components as well as their interaction must feature the highest reliability performance.</para>
<para>Many IoT applications will go beyond one industrial sector. Energy, mobility and home/buildings sectors will share data through energy gateways that will control the transfer of energy and information.</para>
<para>Sophisticated and flexible data filtering, data mining and processing procedures and systems will become necessary in order to handle the high amount of raw data provided by billions of data sources. System and data models need to support the design of flexible systems which guarantee a reliable and secure real-time operation.</para>
</section>
<section class="lev2" id="sec3.3.5" label="3.3.5" xreflabel="sec3.3.5">
<title>Smart Mobility and Transport</title>
<para>The connection of vehicles to the Internet gives rise to a wealth of new possibilities and applications which bring new functionalities to the individuals and/or the making of transport easier and safer. In this context the concept of Internet of Vehicles (IoV) <link linkend="B3-110">[110]</link> connected with the concept of Internet of Energy (IoE) represent future trends for smart transportation and mobility applications.</para>
<para>At the same time creating new mobile ecosystems based on trust, security and convenience to mobile/contactless services and transportation applications will ensure security, mobility and convenience to consumer-centric transactions and services.</para>
<para>Representing human behaviour in the design, development, and operation of cyber physical systems in autonomous vehicles is a challenge. Incorporating human-in-the-loop considerations is critical to safety, dependability, and predictability. There is currently limited understanding of how driver behaviour will be affected by adaptive traffic control cyber physical systems. In addition, it is difficult to account for the stochastic effects of the human driver in a mixed traffic environment (i.e., human and autonomous vehicle drivers) such as that found in traffic control cyber physical systems. Increasing integration calls for security measures that are not physical, but more logical while still ensuring there will be no security compromise. As cyber physical systems become more complex and interactions between components increases, safety and security will continue to be of paramount importance <link linkend="B3-91">[91]</link>. All these elements are of the paramount importance for the IoT ecosystems developed based on these enabling technologies.</para>
<para>Self-driving vehicles today are in the prototype phase and the idea is becoming just another technology on the computing industry&#x2019;s parts list. By using automotive vision chips that can be used to help vehicles understand the environment around them by detecting pedestrians, traffic lights, collisions, drowsy drivers, and road lane markings. Those tasks initially are more the sort of thing that would help a driver in unusual circumstances rather than take over full time. But they&#x2019;re a significant step in the gradual shift toward the computer-controlled vehicles that Google, Volvo, and other companies are working on <link linkend="B3-88">[88]</link>. The image below shows a footage of what the on-board Google Car&#x2019;s computer &#x201C;sees&#x201D; and how it detects other vehicles, pedestrians, and traffic lights <link linkend="B3-86">[86]</link>.</para>
<fig id="F3.14" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 3.14</label>
<caption><para>Google vehicle vision <link linkend="B3-86">[86]</link>.</para></caption>
<graphic xlink:href="graphics/fig3_14.jpg"/>
</fig>
<para>These scenarios are, not independent from each other and show their full potential when combined and used for different applications.</para>
<para>Technical elements of such systems are smart phones and smart vehicle on-board units which acquire information from the user (e.g. position, destination and schedule) and from on board systems (e.g. vehicle status, position, energy usage profile, driving profile). They interact with external systems (e.g. traffic control systems, parking management, vehicle sharing managements, electric vehicle charging infrastructure). Moreover they need to initiate and perform the related payment procedures.</para>
<para>The concept of Internet of Vehicles (IoV) is the next step for future smart transportation and mobility applications and requires creating new mobile ecosystems based on trust, security and convenience to mobile/contactless services and transportation applications in order to ensure security, mobility and convenience to consumer-centric transactions and services.</para>
<para>Smart sensors in the road and traffic control infrastructures need to collect information about road and traffic status, weather conditions, etc. This requires robust sensors (and actuators) which are able to reliably deliver information to the systems mentioned above. Such reliable communication needs to be based on M2M communication protocols which consider the timing, safety, and security constraints. The expected high amount of data will require sophisticated data mining strategies. Overall optimisation of traffic flow and energy usage may be achieved by collective organisation among the individual vehicles.</para>
<para>When dealing with information related to individuals&#x2019; positions, destinations, schedules, and user habits, privacy concerns gain highest priority. They even might become road blockers for such technologies. Consequently not only secure communication paths but also procedures which guarantee anonymity and de-personalization of sensible data are of interest.</para>
<para>Connectivity will revolutionize the environment and economics of vehicles in the future: first through connection among vehicles and intelligent infrastructures, second through the emergence of an ecosystem of services around smarter and more autonomous vehicles.</para>
<para>In this context the successful deployment of safe and autonomous vehicles (SAE <footnote id="fn3_1" label="1"><para>Society of Automotive Engineers, J3016 standard.</para></footnote> international level 5, full automation) in different use case scenarios, using local and distributed information and intelligence is an important achievement. This is based on real-time reliable platforms managing mixed mission and safety critical vehicle services, advanced sensors/actuators, navigation and cognitive decision-making technology, interconnectivity between vehicles (V2V) and vehicle to infrastructure (V2I) communication. There is a need to demonstrate in real life environments (i.e. highways, congested urban environment, and/or dedicated lanes), mixing autonomous connected vehicles and legacy vehicles the functionalities in order to evaluate and demonstrate dependability, robustness and resilience of the technology over longer period of time and under a large variety of conditions.</para>
<para>The introduction of the autonomous vehicles will enable the development of service ecosystems around vehicles and multi-modal mobility, considering that the vehicle includes multiple embedded information sources around which information services may be constructed. The information may be used for other services (i.e. maintenance, personalised insurance, vehicle behaviour monitoring and diagnostic, security and autonomous cruise, etc.).</para>
<para>The emergence of these services will be supported by open service platforms that communicate and exchange information with the vehicle embedded information sources and to vehicle surrounding information, with the goal of providing personalised services to drivers. Possible barriers to the deployment of autonomous vehicles and ecosystems are the robustness sensing/actuating the environment, overall user acceptance, the economic, ethical, legal and regulatory issues.</para>
</section>
<section class="lev2" id="sec3.3.6" label="3.3.6" xreflabel="sec3.3.6">
<title>Smart Manufacturing and Industrial Internet of Things</title>
<para>The role of the Internet of Things is becoming more prominent in enabling access to devices and machines, which in manufacturing systems, were hidden in well-designed silos. This evolution will allow the IT to penetrate further the digitized manufacturing systems. The IoT will connect the factory to a whole new range of applications, which run around the production. This could range from connecting the factory to the smart grid, sharing the production facility as a service or allowing more agility and flexibility within the production systems themselves. In this sense, the production system could be considered one of the many Internets of Things (IoT), where a new ecosystem for smarter and more efficient production could be defined.</para>
<para>The first evolutionary step towards a shared smart factory could be demonstrated by enabling access to today&#x2019;s external stakeholders in order to interact with an IoT-enabled manufacturing system. These stakeholders could include the suppliers of the productions tools (e.g. machines, robots), as well as the production logistics (e.g. material flow, supply chain management), and maintenance and re-tooling actors. An IoT-based architecture that challenges the hierarchical and closed factory automation pyramid, by allowing the above-mentioned stakeholders to run their services in multiple tier flat production system is proposed in <link linkend="B3-186">[186]</link>. This means that the services and applications of tomorrow do not need to be defined in an intertwined and strictly linked manner to the physical system, but rather run as services in a shared physical world. The room for innovation in the application space could be increased in the same degree of magnitude as this has been the case for embedded applications or Apps, which have exploded since the arrival of smart phones (i.e. the provision of a clear and well standardized interface to the embedded hardware of a mobile phone to be accessed by all types of Apps).</para>
<para>Enterprises are making use of the huge amount of data available, business analytics, cloud services, enterprise mobility and many others to improve the way businesses are being conducted. These technologies include big data and business analytics software, cloud services, embedded technology, sensor networks/sensing technology, RFID, GPS, M2M, mobility, security and ID recognition technology, wireless network and standardisation.</para>
<para>One key enabler to this ICT-driven smart and agile manufacturing lies in the way we manage and access the physical world, where the sensors, the actuators, and also the production unit should be accessed, and managed in the same or at least similar IoT standard interfaces and technologies. These devices are then providing their services in a well-structured manner, and can be managed and orchestrated for a multitude of applications running in parallel.</para>
<para>The convergence of microelectronics and micromechanical parts within a sensing device, the ubiquity of communications, the rise of micro-robotics, the customization made possible by software will significantly change the world of manufacturing. In addition, broader pervasiveness of telecommunications in many environments is one of the reasons why these environments take the shape of ecosystems.</para>
<para>Some of the main challenges associated with the implementation of cyber-physical systems in include affordability, network integration, and the interoperability of engineering systems.</para>
<para>Most companies have a difficult time justifying risky, expensive, and uncertain investments for smart manufacturing across the company and factory level. Changes to the structure, organization, and culture of manufacturing occur slowly, which hinders technology integration. Pre-digital age control systems are infrequently replaced because they are still serviceable. Retrofitting these existing plants with cyber-physical systems is difficult and expensive. The lack of a standard industry approach to production management results in customized software or use of a manual approach. There is also a need for a unifying theory of non-homogeneous control and communication systems <link linkend="B3-91">[91]</link>.</para>
</section>
<section class="lev2" id="sec3.3.7" label="3.3.7" xreflabel="sec3.3.7">
<title>Smart Cities</title>
<para>A smart city is defined as a city that monitors and integrates conditions of all of its critical infrastructures, including roads, bridges, tunnels, rail/subways, airports, seaports, communications, water, power, even major buildings, can better optimize its resources, plan its preventive maintenance activities, and monitor security aspects while maximizing services to its citizens. Emergency response management to both natural as well as man-made challenges to the system can be focused and rapid. With advanced monitoring systems and built-in smart sensors, data can be collected and evaluated in real time, enhancing city management&#x2019;s decision-making. For example, resources can be committed prior to a water main break, salt spreading crews dispatched only when a specific bridge has icing conditions, and use of inspectors reduced by knowing condition of life of all structures. In the long term Smart Cities vision, systems and structures will monitor their own conditions and carry out self-repair, as needed. The physical environment, air, water, and surrounding green spaces will be monitored in non-obtrusive ways for optimal quality, thus creating an enhanced living and working environment that is clean, efficient, and secure and that offers these advantages within the framework of the most effective use of all resources <link linkend="B3-89">[89]</link>.</para>
<para>There are a number of key elements needed to form a Smart City, and some of these are smart society, smart buildings, smart energy, smart lighting, smart mobility, smart water management etc. ICT forms the basic infrastructure; varying from sensors, actuators and electronic systems to software, Data, Internet and Cloud, Edge/fog and Mobile Edge computing. ICT is applied to improve these systems of systems building up a Smart City, making them autonomous and interoperable, secure and trusted. The interaction of the systems and the connectivity strongly depend on the communication gateway connecting the edge element data from sensors, actuators, and electronic systems to the Internet, managing- and control systems and decision programs. The communication gateway is a key enabler for the interconnection of systems in many applications such as Internet of Energy (IoE), Internet of Vehicles (IoV), Internet of Buildings (IoB) and Internet of Lighting (IoL). It is obvious with all the new systems and demand of interoperability that these communication gateways need more functionality, processing capacity, storage possibility, seamless connectivity, and more communication protocols embedded. At the same time the gateway must assure a higher level of security, interoperability and communication with devices across various verticals, such as energy, mobility and buildings.</para>
<para>An illustrative example is depicted in <link linkend="F3.15">Figure <xref linkend="F3.15" remap="3.15"/></link> <link linkend="B3-76">[76]</link>. The Smart City is not only the integration and interconnection of intelligent applications, but also a people-centric and sustainable innovation model that is using communication and information technology and takes advantage of the open innovation ecology of the city and the new technologies such as IoT, cloud computing, smart data, and man-machine interaction.</para>
<fig id="F3.15" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 3.15</label>
<caption><para>Smart City Concept <link linkend="B3-76">[76]</link>.</para></caption>
<graphic xlink:href="graphics/fig3_15.jpg"/>
</fig>
<para>A smart city is a developed urban area that creates sustainable economic development and high quality of life by excelling in multiple key areas: economy, mobility, environment, people, living, and government <link linkend="B3-105">[105]</link>.</para>
<section class="lev3" id="sec3.3.7.1" label="3.3.7.1" xreflabel="sec3.3.7.1">
<title>Large Scale Pilots and Ecosystem for Smart Cities</title>
<para>As main areas of application, smarter cities plays a relevant role, not only because the impact in re-using and re-purposing technology that is necessary (the number of deployed sensors) but also the increasing demand of new services (by citizens). IoT applications are currently based on multiple architectures, technology standards and seamless software platforms, which have led to a highly fragmented IoT landscape. This fragmentation impacts directly the area of smart cities, which typically comprise several technological silos (i.e. IoT systems that have been developed and deployed independently for smart homes, smart industrial automation, smart transport, and smart buildings etc.).</para>
<para>A radical shift in the development, deployment and operation of IoT applications for smart cities, through introducing an abstract virtualized digital layer that operate across multiple IoT architectures, platforms (e.g. FI-WARE) and business contexts is required. Smart cities soon will face up the need for an integrated solution(s) (SmartCity-OS) that globally can monitor, visualise and control the uncountable integrated number of operations executed by diverse (and every day increasing) services platforms using the sensor technology deployed in the cities. Eventually this OS will be a blueprint across cities providing adaptive tools and generating the integration of other IoT systems and business opportunities.</para>
<fig id="F3.16" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 3.16</label>
<caption><para>Smart City Multi-layered architecture.</para></caption>
<graphic xlink:href="graphics/fig3_16.jpg"/>
</fig>
<para>Additional pointers to highlight are the quality of IoT Data and the numerous IoT Data source provisioning and the inherent need to generate semantic-driven business platforms, the reason to emphasize them is to address the emergent need for enabling business-driven IoT ecosystems and the generation of functionalities for Operating across multiple IoT architectures, platforms and business contexts, enable re(use) of Data for Smart Applications, and enable a more connected/integrated approach to smart city applications development.</para>
<para>There is a large way in the run towards integrated Internet of Things technological support and scientific progression towards interoperable connected objects, linked sensor data, pay-as-you-go IoT services and utility-driven privacy. Likewise the main areas to focus from a research perspective are, but not limited to, IoT architecture, systems and applications. The developments of IoT data modelling and schema representations, intra-domain and CPS extensions allow more robustness and extensible software platforms with embedded software and applications enabling Systems of Systems, peer-to-peer systems and applications.</para>
<para>An IoT large Scale Pilot is a fully designed, implemented and deployed ecosystem, such that all the players are inter-related: Technology Designers and Manufacturing, Software Designers and Developers, Research Institutions and Universities, Large Industries alike SME&#x2019;s, Alliance and standardization organisations, City Councils and Policy Makers and Citizen Organisations, share the same common objective which is sustainability. IoT Sustainability implies to have all the technology elements and services connected in the form of data interactions producing results.</para>
</section>
<section class="lev3" id="sec3.3.7.2" label="3.3.7.2" xreflabel="sec3.3.7.2">
<title>Role of Institutions and Citizens in the Global IoT</title>
<para>The citizens play a protagonist role in the IoT Large Scale Pilot, particularly if the LSP is focused on Smart City applications. The role citizens can play are, but not limited to, Active elements in the system as data providers, Validation of the deployed infrastructure, Testers of the implemented solutions and services, Adaptability test about Robustness and Extensible software and last but not least Improvements and feedback on software solutions.</para>
<para>As main other areas of application, smart retail play a relevant role, not only because the impact in technology that is necessary (the number of deployed sensors) but also the increasing demand of new services (M2M and by citizens H2M). IoT applications are currently based on multiple architectures, technology standards and seamless software platforms, which have led to a highly fragmented IoT landscape. This fragmentation impacts directly the area of smart cities, which typically comprise several technological silos (i.e. IoT systems that have been developed and deployed independently for smart homes, smart industrial automation, smart transport, and smart buildings etc.).</para>
<para>Excelling in these key areas can be done so through strong human capital, social capital, and/or ICT infrastructure. With the introduction of IoT a city will act more like a living organism, a city that can respond to citizen&#x2019;s needs.</para>
<para>In this context there are numerous important research challenges for smarty city IoT applications:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>Overcoming traditional silo based organization of the cities, with each utility responsible for their own closed world. Although not technological this is one of the main barriers.</para></listitem>
<listitem><para>Creating algorithms and schemes to describe information created by sensors in different applications to enable useful exchange of information between different city services.</para></listitem>
<listitem><para>Mechanisms for cost efficient deployment and even more important maintenance of such installations, including energy scavenging.</para></listitem>
<listitem><para>Ensuring reliable readings from a plethora of sensors and efficient calibration of a large number of sensors deployed everywhere from lampposts to waste bins.</para></listitem>
<listitem><para>Low energy protocols and algorithms.</para></listitem>
<listitem><para>Algorithms for analysis and processing of data acquired in the city and making &#x201C;sense&#x201D; out of it.</para></listitem>
<listitem><para>IoT large scale deployment and integration.</para></listitem>
</itemizedlist>
</section>
</section>
<section class="lev2" id="sec3.3.8" label="3.3.8" xreflabel="sec3.3.8">
<title>Smart Farming and Food Security</title>
<para>Food and fresh water are the most important natural resources in the world. Organic food produced without addition of certain chemical substances and according to strict rules, or food produced in certain geographical areas will be particularly valued. Similarly, fresh water from mountain springs is already highly valued. Using IoT in such scenarios to secure tracking of food or water from the production place to the consumer is one of the important topics.</para>
<fig id="F3.17" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 3.17</label>
<caption><para>Different types of technologies involved in smart farming <link linkend="B3-85">[85]</link>.</para></caption>
<graphic xlink:href="graphics/fig3_17.jpg"/>
</fig>
<para>The development of sensors, robots and sensor networks combined with procedures to link variables to appropriate farming management actions has open the opportunities for IoT applications in agriculture. The wired/wireless sensors, integrated into a IoT system can gather all the individual data needed for monitoring, control and treatment on (large scale) farms located in a particular region. This provides a mechanism of exchanging information in efficient ways enabling the execution of autonomously interventions in different agriculture sub-sectors (e.g. arable crops, livestock and horticulture). IoT technology allows the monitoring and control of the plant and animal products during the whole life cycle from farm to fork. The challenge will be in the future to design architectures and implement algorithms that will support each object for optimal behaviour, according to its role in the Smart Farming system and in the food chain, lowering ecological footprint and economical costs and increasing food security.</para>
<para>The set of technologies used in smart farming is complex, to reflect the complexity of activities run by farmers, growers, and other sector stakeholders.</para>
<para>A recent report <link linkend="B3-85">[85]</link> on smart farming defines seven applications:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>Fleet management &#x2013; tracking of farm vehicles</para></listitem>
<listitem><para>Arable farming, large and small field farming</para></listitem>
<listitem><para>Livestock monitoring</para></listitem>
<listitem><para>Indoor farming &#x2013; greenhouses and stables</para></listitem>
<listitem><para>Fish farming</para></listitem>
<listitem><para>Forestry</para></listitem>
<listitem><para>Storage monitoring &#x2013; water tanks, fuel tanks</para></listitem>
</itemizedlist>
<para>The report says that smart farming will allow farmers and growers to improve productivity and reduce waste, ranging from the quantity of fertiliser used to the number of journeys made by farm vehicles.</para>
<para>However, the complexity of smart farming is also reflected into the ecosystem of players. They can be classified in the following way:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>Technology providers &#x2013; these include providers of wireless connectivity, sensors, M2M solutions, decision support systems at the back office, big data analytical systems, geo-mapping applications, smartphone apps.</para></listitem>
<listitem><para>Providers of agricultural equipment and machinery (combines, tractors, robots), farm buildings, as well as providers of specialist products (e.g. seeds, feeds) and expertise in crop management and animal husbandry.</para></listitem>
<listitem><para>Customers: farmers, farming associations and cooperatives.</para></listitem>
<listitem><para>Influencers &#x2013; those that set prices, influence the market into which farmers and growers sell their products.</para></listitem>
</itemizedlist>
<para>The range of stakeholders in agriculture is broad, ranging from big business, finance, engineering, chemical companies, food retailers to industry associations and groupings through small suppliers of expertise in all the specialist areas of farming.</para>
<para>The end users of precision farming solutions include not only the growers but also farm managers, users of back office IT systems. Not to be forgotten is the role of the veterinary in understanding animal health. Also to be considered are farmers co-operatives, which can help smaller farmers with advice and funding.</para>
<para>The report concludes that the farming industry must embrace the IoT if it is to feed the 9.6 billion global population expected by 2050.</para>
</section>
</section>
<section class="lev1" id="sec3.4" label="3.4" xreflabel="sec3.4">
<title>Future Internet Support for IoT</title>
<para>There are a number of challenges that the Future Internet community will need to address to adequately support the envisaged evolution of the Internet of Things. First we need to position these challenges within a 5&#x2013;10 year timeline, and then introduce the technology enablers required to support the vision for future IoT-based applications and services. The following sections are reflecting three macro-challenges. One dedicated to the implications of having billions of connected &#x201C;things&#x201D; by 2020. The next one looking at what it takes to duly manage these connected devices in order to ensure dependable and robust services. The last one, more longer term oriented, will shed some light on what is required to usefully interpret the wealth of IoT harvested data and produce meaningful knowledge.</para>
<section class="lev2" id="sec3.4.1" label="3.4.1" xreflabel="sec3.4.1">
<title>Macro-Challenges for Supporting IoT Evolution</title>
<para>As mentioned in the introduction, three macro-challenges have been identified as a suitable means to convey the main implications for the Future Internet, derived from the evolution of IoT.</para>
<para>The first one relates to the already ongoing trend of having more and more devices and more generically &#x201C;objects/things&#x201D; connected to the Internet. Forecasts vary in numbers according to who made the predictions and what those predictions entailed. There is however no disagreement on the fact that there will be billions of connected objects by 2020. The sheer scale of connected devices and the type of traffic these generate (compared to human&#x2019;s devices) will have substantial implications on the Internet as we know it today.</para>
<para>Managing objects, and ensuring that they can be seamlessly integrated in different application domains and ensuring that the data they produce can be reliably accessed to sustain dependable services is part of the second macro-challenge identified. There are currently many IoT services being used, though mostly perceived as &#x201C;best effort&#x201D; due to the nature of the resources involved (end devices that get out of coverage, out of battery, jammed through interference, need for human intervention for configuring, replacing, maintaining them etc.).</para>
<para>This second macro-challenge is concerned with supporting the &#x201C;tactile Internet&#x201D; which by many is already being hailed as the natural evolution of IoT. Sensing substrates and communication infrastructures are getting more tightly geared towards supporting more agile and reactive applications.</para>
<para>Getting billions of objects duly connected and managing these to create a reliable monitoring/actuating substrate only partially caters for the challenges ahead. These challenges cannot be complete without considering how to handle the huge amount of data produced and how to transform it into useful and actionable knowledge. This is indeed the most difficult of the macro-challenges ahead given it is related to intelligent reasoning over the data IoT will produce. The difficulty of this challenge lies in the lack of general purpose machine-learning based solutions that can be re-used to address the wide variety of situations in which similar IoT services and applications could be applied.</para>
<para>The figure below illustrates a visual map of these macro-challenges, together with the associated sub-challenges as illustrated in the next section. The letters S, M and L are there to indicate the Short, Medium or Long term nature of the sub-challenge.</para>
<fig id="F3.18" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 3.18</label>
<caption><para>Visual map for IoT-related implications of the Future Internet.</para></caption>
<graphic xlink:href="graphics/fig3_18.jpg"/>
</fig>
<section class="lev3" id="sec3.4.1.1" label="3.4.1.1" xreflabel="sec3.4.1.1">
<title>Billions of Devices</title>
<para><emphasis><emphasis role="strong">Scalable registration and discovery of IoT devices/services</emphasis></emphasis> &#x2013; As more and more devices get connected, the challenge becomes finding them in a context-aware way. Semantic enrichment of objects description is poised to play a role in facilitating the automated discovery of suitable objects for the purposes of the various applications.</para>
<para><emphasis><emphasis role="strong">Interoperability of IoT data and interoperability platforms</emphasis></emphasis> &#x2013; Besides the common aspects of underlying technologies that have enabled short-range connectivity and the miniaturization of devices that have paved the way towards the success of IoT, current applications have been evolving as a collection of vertical silos often deployed with different standards. To fully unlock the potential of having billions of connected objects, cross-use of data across application domains will be needed. Solutions that foster interoperability and reduce barriers between application silos will therefore have a strong role to play.</para>
<para><emphasis><emphasis role="strong">Virtualisation of sensing</emphasis></emphasis> &#x2013; Following on the need to foster interoperability, virtualization of objects will also be needed to separate real and resource-constrained objects from their virtual counterparts in order to minimising energy consumption, facilitate interaction with applications as well as address the challenges of scalability and those of empowering single objects with flexible added resources from the &#x201C;wired and resource intensive world&#x201D;.</para>
<para><emphasis><emphasis role="strong">M2M communication optimisation</emphasis></emphasis> &#x2013; Connected objects have communication requirements that can be substantially different from devices like computers or smart-phones. Short-lived communications in huge numbers and energy consideration will require redesign of communication protocols, especially for the wireless part to minimise the overheads associated with exchanging data between objects and their corresponding clients/gateways.</para>
<para><emphasis><emphasis role="strong">Energy consumption/harvesting</emphasis></emphasis> &#x2013; To ensure long duration and usefulness of connected objects, given also limitations of battery evolution compared to processing power and spectrum efficiency, it will be essential to design hardware and systems that can operate for long time without need for battery replacement/recharging. Integration of energy harvesting techniques also falls in this category.</para>
<para><emphasis><emphasis role="strong">Environmental friendliness</emphasis></emphasis> &#x2013; Billions of devices lasting up to 5&#x2013;10 years, but very often replaced much earlier, means a lot of waste produced after these devices are no longer operational. Choice of fully recyclable materials fostering sustainability of IoT will be more and more important. Especially after the many IoT deployments will produce sustained need of hardware and services and differentiation between vendors will start including these environmental friendliness factors.</para>
</section>
<section class="lev3" id="sec3.4.1.2" label="3.4.1.2" xreflabel="sec3.4.1.2">
<title>IoT Management for Robustness and Reliability</title>
<para><emphasis><emphasis role="strong">Security threats and anomaly detection</emphasis></emphasis> &#x2013; This is a cross-cutting issue as it relates not only to the security of radio communications, but also to the security of IoT-generated data to ensure good levels of trust and privacy. On this front not only solutions that address these issues are needed but also solutions that at a management level can detect attacks and contain them.</para>
<para><emphasis><emphasis role="strong">Orchestration of resources for reliability and dependability</emphasis></emphasis> &#x2013; This challenge relates to the ability of assessing dependencies between sensing, networking and computing resources and how these components contribute to the QoE and reliability of the end-to-end application being supported. Issue of dependability becomes important if one has to leverage on the advantages of the IoT also within mission critical systems and/or simply more dependable services.</para>
<para><emphasis><emphasis role="strong">IoT function virtualisation</emphasis></emphasis> &#x2013; The IoT functionality is currently solely supported by ad-hoc hardware (i.e. communication of sensed-data, domain/sensor specific gateways etc.). IoT function virtualisation will be opening up new opportunities where hardware ownership will not be necessarily a requirement for producing IoT services.</para>
<para><emphasis><emphasis role="strong">Common goal distributed/decentralised reasoning</emphasis></emphasis> &#x2013; As IoT functionality gets virtualised and distributed besides orchestrating the use of resources there will also be need to coordinate decision-making and achieve conflict resolution for the actuators that are involved in achieving a common goal.</para>
</section>
<section class="lev3" id="sec3.4.1.3" label="3.4.1.3" xreflabel="sec3.4.1.3">
<title>Intelligent Reasoning over IoT Data</title>
<para><emphasis><emphasis role="strong">Semantic modeling of data</emphasis></emphasis> &#x2013; As more and more data gets collected through IoT devices, to ensure a more automated selection of the appropriate end devices to be associated with IoT services and applications, IoT data will have to be modeled according to given structures and properly annotated. Semantics help in this respect; so this challenge is part of the broader data interoperability problem though it encompasses besides &#x201C;finding&#x201D; the right data also the ability of fostering automated translation between data structures in different ontology domains.</para>
<para><emphasis><emphasis role="strong">Avoid data deluge</emphasis></emphasis> &#x2013; This challenge is about the ability of processing data close to the place where it is generated or on its way to the requesting application. This will help avoid unnecessary use of network resources, as well as reduce the amount of data that have to be processed for analytics purposes. It includes challenges like data aggregation, stream processing, CEP etc.</para>
<para><emphasis><emphasis role="strong">Distributed/decentralised reasoning and data to knowledge conversion</emphasis></emphasis> &#x2013; While the previous challenge is about why we should avoid data deluge, this challenge is about how this can be achieved. IoT is becoming the underlying monitoring fabric of future smart-x applications. Trends suggests there will soon be more devices than we can dedicate attention to, thus getting data across to applications will have to be better managed on the end-to-end delivery path. This requires introduction of new ways for distributed data interpretation which accounts for the locality of data, the need to compress it to meet application requirements (i.e. latency, quality etc.) and network capacity.</para>
<para><emphasis><emphasis role="strong">Low latency reasoning cognitive loops</emphasis></emphasis> &#x2013; This challenge relates to the IoT evolving towards becoming able to support very low-latency reasoning loops. This involves the ability to instantiate data processing instances dynamically and close to data sources, besides addressing redesign of communication protocols for speed.</para>
<para><emphasis><emphasis role="strong">Humans in the loop and self-management of IoT</emphasis></emphasis> &#x2013; The rapidly increasing number of connected objects will not be met by a similarly progress in humans ability to set them up, configure them, manage them etc. This element of the roadmap relates to the need of solutions that will ensure that devices can be fully operational with simple and little involvement of the users, if need be.</para>
</section>
</section>
<section class="lev2" id="sec3.4.2" label="3.4.2" xreflabel="sec3.4.2">
<title>Roadmap and Technology for Addressing These Challenges</title>
<para>IoT is currently positioned at the top of the Gartner hype cycle (the so called &#x201C;peak of expectations&#x201D;). The challenge for all the businesses that plan to draw on the wide uptake of this technology, is to ensure that the &#x201C;through of disillusionment&#x201D; is somewhat reduced and that the market remains sustained. To achieve this objective one must certainly focus on adoption and user-friendliness. From a technology viewpoint, effort should go to ensuring that the right enablers that support this vision are developed.</para>
<section class="lev3" id="sec3.4.2.1" label="3.4.2.1" xreflabel="sec3.4.2.1">
<title>From Challenges to Technology Solutions</title>
<para>In previous section we split the future IoT challenges under three main categories, one related to dealing with billions of connected things, one related to having to manage these devices and a last one associated with making the most of data these things will produce in other words, how to create useful knowledge.</para>
<para>What is clear is that full mesh connectivity between billions of devices and associate applications will not be achievable, which brings us to the statement that IoT will need increased flexibility in the &#x201C;communication infrastructure substrate&#x201D;.</para>
<para>This translates into ensuring adequate evolution in the following technology domains: flexible networks for prioritized and M2M-specific communications, edge cloud computing and distributed big-data analytics. Besides these &#x201C;infrastructure oriented&#x201D; technologies, also progress in more &#x201C;IoT specific&#x201D; domains will be needed: this relates to progress on the &#x201C;hardware-related&#x201D; energy harvesting side to ensure more reliable and durable IoT services. Whereas on the &#x201C;software side&#x201D; semantic technologies as well as ensuring security and privacy protection solutions need to be reliable and usable to foster wide acceptance.</para>
<para>The remainder of this section sheds more light into the technologies (light boxes in the figures below) that support the highlighted challenges (dark boxes in the figures). As before, we keep the similar structure around the three earlier presented challenges.</para>
<para><emphasis><emphasis role="strong">Billions of connected devices, what technology enablers?</emphasis></emphasis> &#x2013; Addressing the challenge of billions of connected devices will certainly require some scale-proof technologies for enabling their automated registration, search and discovery, maintenance and management.</para>
<fig id="F3.19" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 3.19</label>
<caption><para>Billions of connected devices.</para></caption>
<graphic xlink:href="graphics/fig3_19.jpg"/>
</fig>
<para>This has a lot to do with progress on the semantic technologies front (and subsequent semantic annotation of objects). Through the use of semantics one can design how to automatically relate all devices that e.g. share a similar location, or that can produce a certain type of data, or that are owned by the same person. Moreover progress on the semantic technologies front is also needed to address IoT application silos interoperability problems. In particular this will enable the system&#x2019;s understanding of &#x201C;what&#x201D; needs to be done to achieve interoperability between data in separate domains. As far as the &#x201C;how&#x201D; is concerned, once it is clear what conversion needs to be applied to the sensed data to make it available for e.g. across application domains. Here comes the role of edge clouds where appropriate algorithms can be instantiated and run to address interoperability issues.</para>
<para>Looking at more &#x201C;hardware&#x201D; related issues, progress in the energy harvesting field has many implications on the achievement of the billions devices challenge. It certainly contributes to environmental friendliness as it relies upon renewable energy for the installation of sensing devices at zero energy impact i.e. without connection to power sources. Similarly, the relatively slow advances in battery technologies compared to evolution of computing capabilities, mean that wireless IoT devices will always be more resource constrained than their wired counterparts. Virtualisation (of sensing) techniques therefore empower wireless devices by adding &#x201C;always-on&#x201D; functionality on the &#x201C;wired side&#x201D; of the network and breaking functionality from hardware ownership which also contributes to achieving better environmental friendliness as it makes for more efficient (re-)use of hardware resources. This is aligned to leveraging on functionality to the edge of the network, therefore enabling a more sustainable evolution of virtual objects/IoT Virtual Gateway functionality.</para>
<para>With regards to achieving more efficient M2M communications, it is envisaged that progress on the low-latency wireless networks technologies and agile networks management will be needed. This is needed to ensure on the one hand low-overhead for short-lived communications to edge devices (through more agile network management schemes) while on the other hand achieving shorter cognitive loops for sensing-processing-actuating close to the edge, a &#x201C;must-have&#x201D; requirement for tactile internet future scenarios.</para>
<para><emphasis><emphasis role="strong">Management of IoT devices for robustness and reliability</emphasis></emphasis> &#x2013; The importance of this challenge stems from IoT becoming more mature and established enabling contextually also support for critical services, or more robust and dependable ones in general.</para>
<fig id="F3.20" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 3.20</label>
<caption><para>Management of IoT for robustness and reliability.</para></caption>
<graphic xlink:href="graphics/fig3_20.jpg"/>
</fig>
<para>From a technology viewpoint, there is need for more flexible &#x201C;infrastructure oriented&#x201D; technologies to mature. Edge clouds and software networks are there to support and complement the constrained nature of devices and have therefore implications on the sub-challenges of virtualizing IoT functionality and orchestrating the use of these &#x201C;infrastructure technologies&#x201D; for a more robust IoT. Virtual Objects and Virtual Gateways are also specific IoT technologies, building bricks of virtual IoT functions which can be more robust and resilient to connected objects hardware failures/limited coverage.</para>
<para>With an increase of the number of devices beyond what humans can successfully manage comes the need to rely on cognitive technologies for autonomic management of IoT platforms and for security threats and anomaly detection. Specifically, this is supported by progress in the big-data analytics and leverages on machine learning and decentralized reasoning technologies.</para>
<para><emphasis><emphasis role="strong">Intelligent reasoning over IoT data</emphasis></emphasis> &#x2013; While previous challenges were related to IoT hardware and more infrastructure oriented, this one is about how to best leverage on IoT harvested data, notably to produce the usable and useful knowledge for compelling IoT-based services and applications in many different domains.</para>
<fig id="F3.21" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 3.21</label>
<caption><para>Intelligent reasoning over IoT data.</para></caption>
<graphic xlink:href="graphics/fig3_21.jpg"/>
</fig>
<para>Semantic annotation of data is a must to be able to automatically draw &#x201C;relevance boundaries&#x201D; amongst available data. Hence, progress on semantic technologies underpins the development of data models that foster and support well-targeted data to knowledge conversions which is key in ensuring wide adoptions (i.e. cognitive systems that take the right decisions through predictive models).</para>
<para>Besides semantic technologies, techniques of cognitive computing are also required. Here we refer to the more and more reliable services that large computing machines such as e.g. IBM Watson will enable. The algorithms for data to knowledge manipulation and for predictive modelling contribute to better quality decisions and wide acceptance. This is also where big-data steps-in, as well as security and privacy by design which are also key to ensure wide acceptance.</para>
<para>On the &#x201C;data to knowledge conversion&#x201D; path we illustrated the importance of real-time big-data analytics applied to reduce in size the produced IoT data, and thus lowering IoT impact on communication networks. This is achieved through pre-processing done close to the edge, avoiding data deluge.</para>
<para>Edge clouds and low latency networks, together with well-targeted data to knowledge conversion are the key technologies for achieving fast reasoning loops, which underpin future Tactile Internet scenarios.</para>
</section>
</section>
</section>
<section class="lev1" id="sec3.5" label="3.5" xreflabel="sec3.5">
<title>Internet of Things and Related Future Internet Technologies</title>
<section class="lev2" id="sec3.5.1" label="3.5.1" xreflabel="sec3.5.1">
<title>Cloud and Edge/Fog Computing</title>
<para>Cloud computing has been established as one of the major building blocks of the Future Internet. New technology enablers have progressively fostered virtualisation at different levels and have allowed the various paradigms known as &#x201C;Applications as a Service&#x201D;, &#x201C;Platforms as a Service&#x201D; and &#x201C;Infrastructure and Networks as a Service&#x201D;. Such trends have greatly helped to reduce cost of ownership and management of associated virtualised resources, lowering the market entry threshold to new players and enabling provisioning of new services. With the virtualisation of objects being the next natural step in this trend, the convergence of cloud computing and Internet of Things will enable unprecedented opportunities in the IoT services arena <link linkend="B3-112">[112]</link>. Devices send and receive data interacting with the network where the data is transmitted, normalized, and filtered using edge computing/processing then is transferred in data storage units and databases accessible by applications and analytics tools, which process it and provide it to other things and people who will act and collaborate. The IoT layered architecture include the edge intelligence into the edge computing/processing where all the data capture, processing is done at the device level among all the physical sensor/actuators/devices that include controllers based on microprocessors/microcontrollers to compute/process and wireless modules to communicate. The intelligence at the edge supports devices to use their data sharing and decision-making capabilities to interact and cooperate in order to process the data at the edge, filter it and select/prioritize what is important. This intelligent processing at the edge select the &#x201C;smart data&#x201D; that is transferred to the central data stores for further processing in the cloud. This allows including the Edge Cloud for processing data and addressing the challenges of response-time, reliability and security. For real time fast processes, the sensor/actuator edge devices could generate data much faster than the cloud-based apps can process it.</para>
<para>The use of intelligent edge devices require to reduce the amount of data sent to the cloud through quality filtering and aggregation and the integration of more functions into intelligent devices and gateways closer to the edge reduces latency. By moving the intelligence to the edge, the local devices can generate value when there are challenges related to transferring data to the cloud. This will allow as well for protocol consolidation by controlling the various ways devices can communicate with each other.</para>
<fig id="F3.22" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 3.22</label>
<caption><para>Internet of Things Cloud (Source: IBM).</para></caption>
<graphic xlink:href="graphics/fig3_22.jpg"/>
</fig>
<para>As part of this convergence, IoT applications (such as sensor-based services) will be delivered on-demand through a cloud environment <link linkend="B3-113">[113]</link>. This extends beyond the need to virtualize sensor data stores in a scalable fashion. It asks for virtualization of Internet-connected objects and their ability to become orchestrated into on-demand services (such as Sensing-as-a-Service).</para>
<para>With the growth of IoT, we&#x2019;re shifting toward a cyber-physical paradigm, where we closely integrate computing and communication with the connected things, including the ability to control their operations. In such systems, many security vulnerabilities and threats come from the interactions between the cyber and physical domains. An approach to holistically integrate security vulnerability analysis and protections in both domains will become increasingly necessary. There is growing demand to secure the rapidly increasing population of connected, and often mobile, things. In contrast to today&#x2019;s networks, where assets under protection are typically inside firewalls and protected with access control devices, many things in the IoT arena will operate in unprotected or highly vulnerable environments (i.e. vehicles, sensors, and medical devices used in homes and embedded on patients). Protecting such things poses additional challenges beyond enterprise networks <link linkend="B3-60">[60]</link>.</para>
<para>Many Internet of Things applications require mobility support and geo-distribution in addition to location awareness and low latency, while the data need to be processed in &#x201C;real-time&#x201D; in micro clouds or fog. Micro cloud or Fog computing enables new applications and services applies a different data management and analytics and extends the Cloud Computing paradigm to the edge of the network. Similar to Cloud, Micro Cloud/Edge Cloud/Fog provides data, compute, storage, and application services to end-users.</para>
<para>The Micro Cloud or the Edge Cloud/Fog needs to have the following features in order to efficiently implement the required IoT applications:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>Low latency and location awareness</para></listitem>
<listitem><para>Wide-spread geographical distribution</para></listitem>
<listitem><para>Mobility</para></listitem>
<listitem><para>Very large number of nodes</para></listitem>
<listitem><para>Predominant role of wireless access</para></listitem>
<listitem><para>Strong presence of streaming and real time applications</para></listitem>
<listitem><para>Heterogeneity</para></listitem>
</itemizedlist>
<para>The worlds of IT and telecommunications networking are converging bringing with them new possibilities and capabilities that can be deployed into the network. A key transformation has been the ability to run IT based servers at network edge, applying the concepts of cloud computing. This is defined as Mobile Edge computing <link linkend="B3-69">[69]</link>. Mobile edge computing can be seen as a cloud server running at the edge of a mobile network and performing specific tasks that could not be achieved with traditional network infrastructure. IoT/M2M gateway and control functions are typical examples, but there are many others. Mobile edge computing is characterized by <link linkend="B3-69">[69]</link>:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>On-Premises: The Edge is local, meaning that it can run isolated from the rest of the network, while having access to local resources. This becomes particularly important for M2M scenarios, for example when dealing with security or safety systems that need high levels of resilience.</para></listitem>
<listitem><para>Proximity: Being close to the source of information, Edge Computing is particularly useful to capture key information for analytics and big data. Edge computing may also have direct access to the devices, which can easily be leveraged by business specific applications.</para></listitem>
<listitem><para>Lower latency: As Edge services run close to end devices it considerably reduces latency. This can be utilized to react faster, to improve user experience, or to minimize congestion in other parts of the network.</para></listitem>
<listitem><para>Location awareness: When a Network Edge is part of a wireless network, whether it is Wi-Fi or Cellular, a local service can leverage low-level signalling information to determine the location of each connected device. This gives birth to an entire family of business-oriented use cases, including Location Based Services, Analytics, and many more.</para></listitem>
<listitem><para>Network context information: Real-time network data (such as radio conditions, network statistics, etc.) can be used by applications and services to offer context-related services that can differentiate the mobile broadband experience and be monetized. New applications can be developed (which will benefit from this real-time network data) to connect mobile subscribers with local points-of-interest, businesses and events.</para></listitem>
</itemizedlist>
<para>Mobile Edge computing transforms base stations into intelligent service hubs that are capable of delivering highly personalized services directly from the very edge of the network while providing the best possible performance in mobile networks. Proximity, context, agility and speed can be translated into unique value and revenue generation, and can be exploited by operators and application service providers to create a new value chain <link linkend="B3-69">[69]</link>.</para>
<para>For the future IoT applications it is expected that more of the network intelligence to reside closer to the source. This will push for the rise of Edge Cloud/Fog, Mobile Edge computing architectures, as most data will be too noisy or latency-sensitive or expensive to be transfer to the cloud.</para>
</section>
<section class="lev2" id="sec3.5.2" label="3.5.2" xreflabel="sec3.5.2">
<title>Federated IoT Data Cloud and Orchestration of Large Scale Services</title>
<para>The rapid evolution of Sensor Technologies, the Semantic Web consolidation and the extensive deployment of Cloud Computing Systems provide a unique opportunity to unify the real and the virtual worlds (Internet of Things). The Internet of Things enables the building of very large infrastructures that for the first time facilitate the information-driven real-time integration of the physical world and computers (Cyber Physical Systems) on a global scale (connecting sensor with systems and systems with the web). At the same time IoT can be considered a flexible middleware technology that abstracts from heterogeneous sensor network technologies to higher-level functionalities to enable interconnected sensor networks and processing of sensor data (Sensor Internet). It is a cornerstone for enabling Semantic Reality.</para>
<para>Cloud computing comprises the computing capacity necessary to run background operations to facilitate the complex IoT data analytics. The vision towards a Global Internet of Things requires not only emergent technologies but heterogeneous IoT system of systems coordinated via Federated services platforms. The deployment of IoT Data Cloud management systems and the orchestration of Large Scale Services are also important to enable a &#x201C;global&#x201D; view of the services and IoT infrastructures. In a global Internet of Things, control of sensors or infrastructure became a secondary role as per the Internet of Things services creation mechanisms are focused on providing capabilities and functionality and repurposing services and data rather than configurations and infrastructure adaptation/changes.</para>
<para>The sheer size of global Internet of Things systems pose novel and unique challenges, as it can only be engineered and deployed if a large degree of self-organization and automation capabilities are offered (large-scale deployments). Global internet of Things are built into the system and its constituents, enabling simple deployment (plug-and-play), dynamic (re-)configuration, re-purposing of technology and flexible component and information integration alike tailored information delivery based on user context and needs in a service-oriented way. This requires semantic descriptions of the user needs and contexts, and of the system&#x2019;s constituents, the data streams they produce, their functionalities and their requirements to enable a machine-understandable information space of real-world entities and their dynamic communication processes on a scale that is beyond the current size of the Internet.</para>
<para>IoT is expanding rapidly and is changing the perception of our daily life, not only from a technological perspective but also our personal activities, professional career and also in the way we establish social interactions. IoT is already considered as crucial in the process for designing the Future Internet. It is expected IoT will revolution our perception of the world enabling more smartness to the different external aspects of the human being (cities, industries, agriculture, clothing, fashion, etc.)</para>
<para>Currently Internet of Things not only has planned the model for &#x201C;global&#x201D; distributed infrastructures worldwide interconnected but envisioned the creation of distributed applications that rely in non-proprietary technologies (e.g. Web of Things, Internet of Everything, and the Physical Web). The adoption of IoT technology and its immersion in the society is generating high demands for high volumes of data and the capacity for storing, processing and analysing it in real time.</para>
<para>Based on the evolution of sensor technologies and the semantic technologies to unify the real and the virtual worlds this global vision is becoming a reality. It is yet a need for investigating the convergence of systems and technology platforms (e.g. software systems, the semantic web technologies and the Internet). The main objective is for developing flexible IoT middleware solutions/technology which abstracts data from heterogeneous sensor networks and bring this to a higher application-level(s) for enabling extended systems&#x2019; functionalities and also enable interconnected sensor networks and sensor web data interoperability.</para>
<para>Extensive attention is necessary to focus on the deployment, maintenance and monitoring work on large-scale deployments, big sensor data collection and annotation and investigate data transformation and processing by means of advance stream processing techniques. To this end it is necessary to work on the design principles for device and infrastructure-related architectures, technologies and protocol frameworks for Internet connected heterogeneous devices.</para>
<section class="lev3" id="sec3.5.2.1" label="3.5.2.1" xreflabel="sec3.5.2.1">
<title>IoT Data Analytics</title>
<para>The need for efficient Methods and Algorithms for Big Data, Collection and Transformation following self-Organization and self-Management paradigms still remains as one of the main objectives in the evolution towards Global Internet of Things. Cloud Computing Infrastructures and Management Platforms have evolved but Privacy and Security-Enabled Middleware Platforms are expected research activities in relation to topics that are not limited to Cloud Infrastructures for Data Analytics, Security, Privacy and Trust, Recommender Systems and Clustering Mechanisms, Federation and Orchestration, Service Configuration and Control, Ontology Engineering and Applied Semantics alike Modelling and Reasoning Techniques.</para>
<para>A major effort on investigating the convergence of software systems, the semantic web and the Internet, heavily focused on the evolution of sensor technologies and the semantic technologies to unify the real and the virtual worlds. Development of flexible IoT middleware technology which abstracts data from heterogeneous sensor networks and bring this to a higher application-level(s) for enabling extended systems&#x2019; functionalities and also enable interconnected sensor networks and sensor web data interoperability by using the Internet. Extensive work on large-scale deployments, big sensor data collection and annotation is due to come and investigate data transformation and processing by means of advance stream processing techniques query languages and reasoning techniques for the amount of generated data in the city. Design efforts for defining principles for device and infrastructure-related architectures, technologies and protocol frameworks for Internet connected heterogeneous devices.</para>
<para>Based on the evolution of sensor technologies and the semantic technologies it is possible to unify the real and the virtual worlds. There is yet the need for investigating the convergence of systems and technology platforms (e.g. software systems, the semantic web technologies and the Internet). The main objective is for developing flexible IoT middleware solutions/technology which abstracts data from heterogeneous sensor networks and bring this to a higher application-level(s) for enabling extended systems&#x2019; functionalities and also enable interconnected sensor networks and sensor web data interoperability by using the Internet. Extensively is necessary to focus on the deployment, maintenance and monitoring work on large-scale deployments, big sensor data collection and annotation and investigate data transformation and processing by means of advance stream processing techniques. To this end it is necessary to work on the design principles for device and infrastructure-related architectures, technologies and protocol frameworks for Internet connected heterogeneous devices.</para>
</section>
</section>
<section class="lev2" id="sec3.5.3" label="3.5.3" xreflabel="sec3.5.3">
<title>IoT Interoperability and Semantic Technologies</title>
<para>The previous IERC SRIAs have identified the importance of interoperability semantic technologies towards discovering devices, as well as towards achieving semantic interoperability.</para>
<para>Interoperability is defined as the ability of two or more systems or components to exchange data and use information this provides many challenges on how to get the information, to exchange data, and to understand and process the information. There are four basic IoT interoperability layers to be thoroughly tested and validated: technical, syntactical, semantic, and organizational.</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>Technical Interoperability is usually associated with hardware/software components, systems and platforms that enable machine-to-machine communication to take place. This kind of interoperability is often centred on (communication) protocols and the infrastructure needed for those protocols to operate.</para></listitem>
<listitem><para>Syntactical Interoperability is usually associated with data formats. Certainly, the messages transferred by communication protocols need to have well-defined syntax and encoding, even if it is only in the form of bit-tables. However, many protocols carry data or content, and this can be represented using high-level transfer syntaxes such as HTML, XML or ASN.1.</para></listitem>
<listitem><para>Semantic Interoperability is usually associated with the meaning of content and concerns the human rather than machine interpretation of the content. Thus, interoperability on this level means that there is a common understanding between people of the meaning of the content (information) being exchanged.</para></listitem>
<listitem><para>Organizational Interoperability is the ability of organizations to effectively communicate and transfer (meaningful) data (information) even though they may be using a variety of different information systems over widely different infrastructures, possibly across different geographic regions and cultures.</para></listitem>
</itemizedlist>
<para>Organizational interoperability depends on the former three. Following the definitions and the trends on ICT sector about sensors and sensor data we can add two other dimensions: Static and dynamic interoperability.</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>Dynamic interoperability: Two products cannot interoperate if they do not implement the same set of options (&#x201C;services&#x201D;). Therefore when specifications are including a broad range of options, this aspect could lead to serious interoperability problem. Solutions to overcome these aspects consist of definition clearly in a clear document the full list options with all conditions (e.g. defined as PICS in ISO 9646 <link linkend="B3-77">[77]</link>) as well as to define set of profiles. In the latter case, defining profile would help to truly check interoperability between two products in the same family or from different family if the feature checked belongs to the two groups. We could consider this aspect as</para></listitem>
<listitem><para>Static interoperability using approach of the well-known OSI overall test methodology ISO 9646 <link linkend="B3-77">[77]</link>, where there is definition of static conformance review. Conformance testing consists of checking whether an Implementation Under Test (ITU) satisfies all static and dynamic conformance requirements. For the static conformance requirements this means a reviewing process of the options (PICS) delivered with the IUT. This is referred to as the static conformance review. This aspect could appear easy but that represent serious challenge in the IoT field due the broad range of applications.</para></listitem>
</itemizedlist>
<para>The solutions that use non-interoperable solutions lead to increase of complexity in communicating and interpreting their data and services. One interesting research is to accept differences and potential non-interoperability for instance between two different protocols but to adapt on the fly. We see also such features in intelligent gateways and middleware. This can be called dynamic interoperability and should be a continuous important research area in particular with the growing complexity and heterogeneity of IoT environments.</para>
<para>The challenges for IoT interoperability are many and there is a need for an interoperability framework to address them in a consistent manner under the IoT architectural model. These challenges require addressing a number of research topics as presented in <link linkend="T3.1">Table <xref linkend="T3.1" remap="3.1"/></link>.</para>
<table-wrap position="float" id="T3.1">
<label>Table 3.1</label>
<caption><para>IoT Interoperability research topics</para></caption>
<table cellspacing="5" cellpadding="5" frame="hsides" rules="all" border="1">
<thead>
<tr>
<th><para>Challenges</para></th>
<th><para>Research Topics</para></th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top"><para>Discovery of objects and Clustering</para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Algorithms for data selection and classification</para></listitem>
<listitem><para>Efficient clustering mechanisms</para></listitem>
<listitem><para>IoT service management systems</para></listitem></itemizedlist></para></td>
</tr>
<tr>
<td valign="top"><para>Privacy and Security at Technical and Semantic level</para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Access control algorithms and tools</para></listitem>
<listitem><para>Rules-based systems</para></listitem>
<listitem><para>IoT systems federation</para></listitem></itemizedlist></para></td>
</tr>
<tr>
<td valign="top"><para>Quality of Data</para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Data filtering and data selection</para></listitem>
<listitem><para>Data mining</para></listitem>
<listitem><para>Control and assurance</para></listitem></itemizedlist></para></td>
</tr>
<tr>
<td valign="top"><para>Reasoning and Analysis</para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Taxonomy, modelling,</para></listitem>
<listitem><para>Probabilistic modelling</para></listitem>
<listitem><para>Inference, Abstraction and Abduction</para></listitem></itemizedlist></para></td>
</tr>
<tr>
<td valign="top"><para>Data Management</para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Data fusion</para></listitem>
<listitem><para>Mash-ups processing</para></listitem>
<listitem><para>Stream processing</para></listitem></itemizedlist></para></td>
</tr>
</tbody>
</table>
</table-wrap>
<para>There are arguments against using semantics in constrained environments since ontologies and semantic data can add too much overhead in the case of devices with limited resources. However, ontologies are a way to share and agree on a common vocabulary and knowledge; at the same time there are machine-interpretable and represented in interoperable and re-usable forms. There is no need to add semantic metadata in the source, since this could be added to the data at a later stage (e.g. in a gateway that have mere functionalities). The legacy applications can ignore these ontologies or can be extended to work with it.</para>
<para>In IoT applications semantic technologies will have an important role in enabling sharing and re-use of virtual objects as a service through the cloud. The semantic enrichment of virtual object descriptions will realise for IoT what semantic annotation of web pages has enabled in the Semantic Web. Associated semantic-based reasoning will assist IoT users to more independently find the relevant proven virtual objects to improve the performance or the effectiveness of the IoT applications they intend to use.</para>
</section>
</section>
<section class="lev1" id="sec3.6" label="3.6" xreflabel="sec3.6">
<title>Networks and Communication</title>
<para>Present communication technologies span the globe in wireless and wired networks and support global communication by globally-accepted communication standards. The Internet of Things Strategic Research and Innovation Agenda (SRIA) intends to lay the foundations for the Internet of Things to be developed by research through to the end of this decade and for subsequent innovations to be realised even after this research period. Within this timeframe the number of connected devices, their features, their distribution and implied communication requirements will develop; as will the communication infrastructure and the networks being used. Everything will change significantly. Internet of Things devices will be contributing to and strongly driving this development.</para>
<para>Changes will first be embedded in given communication standards and networks and subsequently in the communication and network structures defined by these standards.</para>
<section class="lev2" id="sec3.6.1" label="3.6.1" xreflabel="sec3.6.1">
<title>Networking Technology</title>
<para>Mobile traffic today is driven by predictable activities such as making calls, receiving email, surfing the web, and watching videos. Over the next 5 to 10 years, billions of IoT devices with less predictable traffic patterns will join the network, including vehicles, machine-to-machine (M2M) modules, video surveillance that requires 24-7 bandwidth, or different types of sensors that send out tiny bits of data each day. The rise of cloud computing requires new network strategies for fifth evolution of mobile the 5G, which represents clearly a convergence of network access technologies. The architecture of such network has to integrate the needs for IoT applications and to offer seamless integration. To make the IoT and M2M communication possible there is a need for fast, high-capacity networks.</para>
<fig id="F3.23" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 3.23</label>
<caption><para>Global perspective &#x2013; 5G capabilities <link linkend="B3-157">[157]</link>.</para></caption>
<graphic xlink:href="graphics/fig3_23.jpg"/>
</fig>
<para>The capabilities depicted in <link linkend="F3.23">Figure <xref linkend="F3.23" remap="3.23"/></link> are the following <link linkend="B3-157">[157]</link>:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para><emphasis>Traffic capacity</emphasis> relates to the capability to manage a certain amount of offered traffic per area unit.</para></listitem>
<listitem><para><emphasis>Mobility/coverage</emphasis> refers to the capability to provide connectivity in any situation; on the move and when standing still, regardless of user location.</para></listitem>
<listitem><para><emphasis>Network and device energy efficiency</emphasis> relates to the energy consumption in both wireless devices and network infrastructure.</para></listitem>
<listitem><para><emphasis>Massive number of devices</emphasis> relates to the capability to handle a large number of connected devices per area unit, while preventing that the related control signalling overhead limits the user experience.</para></listitem>
<listitem><para><emphasis>Reliability</emphasis> relates to the capability to provide a given service level with very high probability. If reliability is high enough, mission-critical and safety-of-life applications can be supported.</para></listitem>
<listitem><para><emphasis>Latency</emphasis> refers to the time the system needs to transport data through its own domain of responsibility.</para></listitem>
<listitem><para><emphasis>Spectrum and bandwidth flexibility</emphasis> refers to the flexibility of the system design to handle different spectrum scenarios, and in particular to the capability to handle higher frequencies and wider bandwidths than today.</para></listitem>
<listitem><para><emphasis>Achievable end user data rate</emphasis> refers to the maximum data rate a user typically experiences (i.e. the &#x201C;perceived speed&#x201D; of the data connection).</para></listitem>
</itemizedlist>
<para>The capabilities relate to the use cases for future international mobile telecommunications, as shown through the arches at the edge of the figure.</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>Mobile Broadband is the human centric use case for non-limited access to services and data anytime and anywhere.</para></listitem>
<listitem><para>Mission-critical machine communication is a use case where communication between machines is required to have an exactly defined behaviour in terms of key KPIs such as guaranteed throughput, latency, etc. Examples are wireless control of industrial manufacturing or production processes, traffic safety applications, etc.</para></listitem>
<listitem><para>Massive Machine Communication is a use case mainly characterized by a very large number of connected devices which typically transmit relatively low volume of non-delay-sensitive data. Devices are required to be simple and cheap, and have a very long battery life.</para></listitem>
</itemizedlist>
<para>5G networks will deliver 1,000 to 5,000 times more capacity than 3G and 4G networks today and will be made up of cells that support peak rates of between 10 and 100 Gbps. They need to be ultra-low latency, meaning it will take data 1&#x2013;10 milliseconds to get from one designated point to another, compared to 40&#x2013;60 milliseconds today. Another goal is to separate communications infrastructure and allow mobile users to move seamlessly between 5G, 4G, and WiFi, which will be fully integrated with the cellular network. Networks will also increasingly become programmable, allowing operators to make changes to the network virtually, without touching the physical infrastructure. The capabilities of Future and previous future international mobile telecommunications systems are depicted in <link linkend="F3.24">Figure <xref linkend="F3.24" remap="3.24"/></link>. Future international mobile telecommunications will encompass all the capabilities of the previous systems. The performance requirements in some scenarios will increase significantly due to new services arising and spreading.</para>
<fig id="F3.24" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 3.24</label>
<caption><para>5G Capability cube (Source: Ericsson).</para></caption>
<graphic xlink:href="graphics/fig3_24.jpg"/>
</fig>
<para>The evolution and pervasiveness of present communication technologies has the potential to grow to unprecedented levels in the near future by including the world of things into the developing Internet of Things. Network users will be humans, machines, things and groups of them.</para>
</section>
<section class="lev2" id="sec3.6.2" label="3.6.2" xreflabel="sec3.6.2">
<title>Communication Technology</title>
<para>The growth in mobile device market is pushing the deployment of Internet of Things applications where these mobile devices (smart phones, tablets, etc. are seen as gateways for wireless sensors and actuators.</para>
<para>Communications technologies for the Future Internet and the Internet of Things will have to avoid such bottlenecks by construction not only for a given status of development, but for the whole path to fully developed and still growing nets.</para>
<para>Many types of Internet of Things devices will be connected to the energy grid all the time; on the other hand a significant subset of Internet of Things devices will have to rely on their own limited energy resources or energy harvesting throughout their lifetime.</para>
<para>The inherent trend to higher complexity of solutions on all levels will be seriously questioned &#x2013; at least with regard to minimum energy Internet of Things devices and services.</para>
<para>Their communication with the access edges of the Internet of Things network shall be optimized cross domain with their implementation space and it shall be compatible with the correctness of the construction approach.</para>
<fig id="F3.25" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 3.25</label>
<caption><para>Communication standards <link linkend="B3-158">[158]</link>.</para></caption>
<graphic xlink:href="graphics/fig3_25.jpg"/>
</fig>
<para>The next years&#x2019; M2M associated with the Internet of Things could be SIM-<emphasis>less</emphasis>, meaning &#x201C;wireless, long-range, low-power, low data-rate and without SIM-card&#x201D;. A deep revolution in the landscape of M2M wireless radio communication technologies is taking off. Until now, in the field of M2M, only GPRS, SMS, 3G technologies based on the SIM card principle allowed to pass information over long distances between an object and a remote information system. Once the SIM card is integrated in the sensor, the object becomes communicating. It can be fixed (drinks vending machine, tank, thermostat, energy box, smoke detector, parking meter) or mobile (wagons, containers, heavy vehicles, bicycles). A sensor then records data locally and transmits it automatically via the integrated GSM modem to the remote information system. Innovative wireless communication technologies create new perspectives for IoT applications. Companies such as Sigfox (French IoT operator using its own technology), Weightless (promoted mainly in UK), LoRa (french Cycleo technology acquired by the founder Semtech) are introducing these wireless communication technologies. This new technologies push for the emergence of new attractive and alternative business models for certain IoT applications with subscriptions ranging from 1 &#x20AC; to 20 &#x20AC; per year without cost of data. While these solutions can only transmit a small amount of data per message (dozens or even hundreds of kilobytes per message), they however cover well over 80% of M2M and IoT&#x2019;s needs. Some applications have already rejected the SIM-card GSM approach to precisely focus on SIM-<emphasis>less</emphasis>. This is the case for smart meters. Except for market&#x2019;s structural cause, over the next eight years, nearly 200 million residential meters (Water, Gas, Electricity) across the members of the Euro zone countries will be connected and half will be equipped with SIM-<emphasis>less</emphasis> technology (and the other half in PLC) <link linkend="B3-158">[158]</link>.</para>
</section>
</section>
<section class="lev1" id="sec3.7" label="3.7" xreflabel="sec3.7">
<title>Data Management</title>
<para>Data management is a crucial aspect in the Internet of Things. When considering a world of objects interconnected and constantly exchanging all types of information, the volume of the generated data and the processes involved in the handling of those data become critical.</para>
<para>In this context there are many technologies and factors involved in the &#x201C;data management&#x201D; within the IoT context.</para>
<para>Some of the most relevant concepts which enable us to understand the challenges and opportunities of data management are:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>Data Collection and Analysis</para></listitem>
<listitem><para>Big data</para></listitem>
<listitem><para>Semantic Sensor Networking</para></listitem>
<listitem><para>Virtual Sensors</para></listitem>
<listitem><para>Complex Event Processing</para></listitem>
</itemizedlist>
<para>Data Collection and Analysis modules or capabilities are the essential components of any IoT platform or system, and they are constantly evolving in order to support more features and provide more capacity to external components (either higher layer applications leveraging on the data stored by the DCA module or other external systems exchanging information for analysis or processing). The DCA module is part of the core layer of any IoT platform.</para>
<para>An example of data management framework for IoT is presented in <link linkend="B3-73">[73]</link> that incorporates a layered, data-centric, and federated paradigm to join the independent IoT subsystems in an adaptable, flexible, and seamless data network. In this framework, the &#x201C;Things&#x201D; layer is composed of all entities and subsystems that can generate data. Raw data, or simple aggregates, are then transported via a communications layer to data repositories. These data repositories are either owned by organizations or public, and they can be located at specialized servers or on the cloud. Organizations or individual users have access to these repositories via query and federation layers that process queries and analysis tasks, decide which repositories hold the needed data, and negotiate participation to acquire the data. In addition, real-time or context-aware queries are handled through the federation layer via a sources layer that seamlessly handles the discovery and engagement of data sources. The whole framework allows a two-way publishing and querying of data. This allows the system to respond to the immediate data and processing requests of the end users and provides archival capabilities for later long-term analysis and exploration of value-added trends.</para>
<para>In the context of IoT, data management systems must summarize data online while providing storage, logging, and auditing facilities for offline analysis. This expands the concept of data management from offline storage, query processing, and transaction management operations into online-offline communication/storage dual operations. The lifecycle of data within an IoT system is illustrated in <link linkend="F3.26">Figure <xref linkend="F3.26" remap="3.26"/></link>, proceeds from data production to aggregation, transfer, optional filtering and pre-processing, and finally to storage and archiving. Querying and analysis are the end points that initiate (request) and consume data production, but data production can be set to be &#x201C;pushed&#x201D; to the IoT consuming services. Production, collection, aggregation, filtering, and some basic querying and preliminary processing functionalities are considered online, communication-intensive operations. Intensive pre-processing, long-term storage and archival and in-depth processing/analysis are considered offline storage-intensive operations <link linkend="B3-73">[73]</link>.</para>
<fig id="F3.26" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 3.26</label>
<caption><para>IoT data lifecycle and data management <link linkend="B3-73">[73]</link>.</para></caption>
<graphic xlink:href="graphics/fig3_26.jpg"/>
</fig>
<para>The proposed IoT data management framework consists of six stacked layers, two of which include sub-layers and complementary or twin layers. The framework layers map closely to the phases of the IoT data lifecycle with lookup/orchestration considered to be an added process that is not strictly a part of the data lifecycle. The <emphasis>&#x201C;Things&#x201D; Layer</emphasis> encompasses IoT sensors and smart objects (data production objects), as well as modules for in-network processing and data collection/real-time aggregation (processing, aggregation). The <emphasis>Communication Layer</emphasis> provides support for transmission of requests, queries, data, and results (collection and delivery). The <emphasis>Data/Sources twin layers</emphasis> respectively handle the discovery and cataloguing of data sources and the storage and indexing of collected data (data storage/archival). The Data Layer also handles data and query processing for local, autonomous data repository sites (filtering, pre-processing, processing).</para>
<fig id="F3.27" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 3.27</label>
<caption><para>IoT data management framework <link linkend="B3-73">[73]</link>.</para></caption>
<graphic xlink:href="graphics/fig3_27.jpg"/>
</fig>
<para>The <emphasis>Federation Layer</emphasis> provides the abstraction and integration of data repositories that is necessary for global query/analysis requests, using metadata stored in the Data Sources layer to support real-time integration of sources as well as location-centric requests (pre-processing, integration, fusion). The <emphasis>Query Layer</emphasis> handles the details of query processing and optimization in cooperation with the <emphasis>Federation Layer</emphasis> as well as the complementary <emphasis>Transactions Layer</emphasis> (processing, delivery). The Query Layer includes the <emphasis>Aggregation Sub-Layer</emphasis>, which handles the aggregation and fusion queries that involve an array of data sources/sites (aggregation/fusion). The <emphasis>Application/Analysis Layer</emphasis> is the requester of data/analysis needs and the consumer of data and analysis results. The layers of the proposed IoT data management framework and their respective functional modules are illustrated in <link linkend="F3.27">Figure <xref linkend="F3.27" remap="3.27"/></link> <link linkend="B3-73">[73]</link>.</para>
<section class="lev2" id="sec3.7.1" label="3.7.1" xreflabel="sec3.7.1">
<title>Smart Data</title>
<para>Smart data is about the processing and analysis of large data repositories, so disproportionately large that it is impossible to treat them with the conventional tools of analytical databases. The machines generate data a lot faster than people can, and their production rates will grow exponentially with Moore&#x2019;s Law. Storing this data is cheap, and it can be mined for valuable information. Examples of this tendency include:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>Web logs</para></listitem>
<listitem><para>RFID</para></listitem>
<listitem><para>Sensor networks</para></listitem>
<listitem><para>Social networks</para></listitem>
<listitem><para>Social data (due to the Social data revolution)</para></listitem>
<listitem><para>Internet text and documents</para></listitem>
<listitem><para>Internet search indexing</para></listitem>
<listitem><para>Call detail records</para></listitem>
<listitem><para>Astronomy, atmospheric science, genomics, biogeochemical, biological, and other complex and/or interdisciplinary scientific research</para></listitem>
<listitem><para>Military surveillance</para></listitem>
<listitem><para>Medical records</para></listitem>
<listitem><para>Photography archives</para></listitem>
<listitem><para>Video archives</para></listitem>
<listitem><para>Large scale e-commerce</para></listitem>
</itemizedlist>
</section>
</section>
<section class="lev1" id="sec3.8" label="3.8" xreflabel="sec3.8">
<title>A QoS Security Framework for the IoT Architecture</title>
<para>A Quality of Service (QoS) security framework would first and foremost mean that security requirements are met and compliance can be documented.</para>
<para>Security problems inherent with the wireless technologies (Internet, mobile communication networks, and sensor networks) are known and many of them addressed largely so that solutions are on the way. IoT presents new challenges to network and security architects. Specific and more evolved security solutions are required in order to cope with these challenges, which if not addressed may become barriers for the IoT deployment on a broad scale.</para>
<para>This section presents essential security considerations when designing a security framework for the IoT architecture and research aspects to be addressed in the near future. The starting point is a generic IoT architecture integrating physical objects communicating with each other and structured in several layers, suitable for resources-constrained devices. Security aspects are addressed tailored to constraints of IoT scenarios and characteristics of IoT devices.</para>
<para>The basic components of a QoS security framework are identified, addressing both traditional security problems of communication networks and specific IoT threats. Larger space is dedicated to authentication and access control as important parts of any security chain, and vital for many scenarios in the IP-based IoT. They have their own specificity and have been the focus of recent standardization and certification efforts.</para>
<section class="lev2" id="sec3.8.1" label="3.8.1" xreflabel="sec3.8.1">
<title>End-to-End Security. The Decentralized Approach.</title>
<para>Large-scale applications and services based on the IoT are increasingly vulnerable to disruption from attack or information theft. Vulnerability is the opportunity for a threat to cause loss and a threat is any potential danger to a resource, originating from anything and/or anyone that has the potential to cause a threat. Common IoT threats are presented in <link linkend="B3-72">[72]</link> together with requirements to make the IoT secure, involving several technological areas. The thread that is common through all these is the need for end-to-end security.</para>
<fig id="F3.28" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 3.28</label>
<caption><para>Smart City &#x2013; Multi-layer security framework.</para></caption>
<graphic xlink:href="graphics/fig3_28.jpg"/>
</fig>
<para>In order to fulfil the end-to-end security principles and IoT inherent requirements, a distributed approach seems to be the most suitable. With this approach, objects are becoming more intelligent, capable of making their own authorization decisions. The adoption of fine-grained authorization mechanisms allows for more flexible resources control and enables tolerance when fronting unknown-risks. In addition, IP security protocol variants for the IoT with public-key-based cryptographic primitives in their protocol design, such as Datagram TLS (DTLS), the HIP Diet EXchange (DEX), and minimal IKEv2, can fulfil the requirements of IoT regarding scalability and interoperability. End-to-end authentication, integrity confidentiality and privacy, are essential.</para>
<para>Important to keep in mind is that all the technologies must be tailored to the constraints of IoT scenarios and characteristics of IoT devices, including limited memory, compute resources, local security, backup connectivity. Thus the employed technologies must reduce the need for expensive cryptographic operations, prevent DoS attacks targeting the security mechanism, improve tolerance to attacks, etc.</para>
</section>
<section class="lev2" id="sec3.8.2" label="3.8.2" xreflabel="sec3.8.2">
<title>Standardization. Certification. Interoperability.</title>
<para>Standardization and certification activities play an important role in securing the IoT, both in terms of enhancing interoperability of IoT devices and adoption of security solutions by the industry. Many of the security solutions are proprietary making it difficult for the IoT devices to communicate with each other in an interoperable manner and in formulation a common and sound security vision in order to standardize security solutions for the IoT. The efforts in the Internet Engineering Task Force (IETF) are making progress exactly in this direction.</para>
</section>
<section class="lev2" id="sec3.8.3" label="3.8.3" xreflabel="sec3.8.3">
<title>Components of a QoS Security Framework</title>
<para>A Quality of Service (QoS) security framework would first and foremost mean that security requirements are met and compliance can be documented.</para>
<para>The basic components of a QoS security framework are:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>Authentication. Implements authentication of users and devices, including identity management in order to ensure authentication, accountability and privacy.</para></listitem>
<listitem><para>Authorization. Implements access control on devices and services, in order to ensure data confidentiality and integrity.</para></listitem>
<listitem><para>Network. Implements protocols to route and transport control, management and traffic securely over the infrastructure, thus ensuring communication confidentiality and integrity.</para></listitem>
<listitem><para>Trust management. Implements remote control, over-the-air update, logging, analytics, in order to document compliance with security requirements and other security related regulations and standards.</para></listitem>
</itemizedlist>
<section class="lev3" id="sec3.8.3.1" label="3.8.3.1" xreflabel="sec3.8.3.1">
<title>Authentication</title>
<para>At the core of the security framework for IoT architecture is the authentication component, used to provide and verify the identify information of IoT objects.</para>
<para>According to ISO/IEC 27002, authentication is the act of establishing, or confirming something (or someone) as authentic, i.e., that claims made by, or about the thing are true. Thus, an authentication relationship is initiated based on the identity of the IoT device, whenever the device needs access to the IoT infrastructure.</para>
<para>Some of the traditional authentication technologies in wireless networks, including lightweight public key-based authentication technology, pre-shared key authentication technology, random key pre-distribution authentication technology, the certification based on auxiliary information, the certification based on one-way hash function, can be employed.</para>
<para>However, most of the traditional authentication mechanisms are based on human credentials, such as username and password, token or biometrics, roles in the organizations, etc. For the IoT objects the identity information is different, first and foremost because the process does not involve human intervention. Such information includes RFID, X.509 certificates, MAC address or any other unique hardware based information. However, many devices may have limited memory to store certificates or CPU power to execute the validation operations inherent to such certificates. Near future research much therefore address other credential types.</para>
<para>Another challenge deriving from the IoT devices being usually unattended, is the fact that the equipment is accessible to attacks, targeting exactly the security mechanisms. Accessing the IoT infrastructure with hacked/illegal equipment can create serious damages for the users, such as conflict of interests in addition to the network security issues.</para>
</section>
<section class="lev3" id="sec3.8.3.2" label="3.8.3.2" xreflabel="sec3.8.3.2">
<title>Authorization</title>
<para>Authorization is the next component in the security chain, building upon the information provided by the authentication component. Both authentication and authorization must be in place in order to establish a secure relationship between IoT devices to exchange appropriate information.</para>
<para>According to ISO/IEC 27002, authorization is the process of controlling access and rights to resources.</para>
<para>The state of art and practice for policy mechanisms to manage and control access to consumer and enterprise networks is well advanced so it would only be natural to adopt them for the IoT. The most common scenario is that for a user to have the privileges to access a resource, the user must satisfy certain conditions, such as being assigned certain roles, belonging to certain specific groups, etc.</para>
<para>However, it is clear based on the type of identity information delivered by the authentication component that the traditional role-based access control mechanism (RBAC) is no longer the focus. In the IoT world, the attributes of a node or an IoT object make more sense, so that a fine-grained mechanism such as the attribute-based access control (ABAC) is more suitable.</para>
<para>Although being standard technologies, RBAC and ABAC cannot be applied straightforward to IoT. The challenge with the IoT is that very often there are many different contexts around an IoT identity, so that a centralized solution would not be feasible. The decisions must be made by the IoT objects able to capture local information. Authorization within a central entity would also impact on the scalability of the solution.</para>
<para>A multi context-aware authorization mechanism is necessary. Environment conditions which are captured locally by IoT end-devices may also come into the picture. The authorization component becomes more complex because at any point in time during the authorization process it should be clear: who is requesting the access, who is granting the access, what specific access is being requested, what is the access scope, when is the access requested and granted/denied, what is the access&#x2019;s duration?</para>
<para>A key challenge is therefore the IoT devices capability to capture security-relevant contextual information, such as time, location, state of the environment, etc., and use it to make access decision, when the access requests are issued. More research is needed in this direction.</para>
</section>
<section class="lev3" id="sec3.8.3.3" label="3.8.3.3" xreflabel="sec3.8.3.3">
<title>Network</title>
<para>This component encompasses the elements that route and transport endpoint traffic securely over the infrastructure, whether control, management or actual data traffic. There are already established protocols and mechanisms to secure the network infrastructure and affect policy that are well suited to the IoT.</para>
</section>
<section class="lev3" id="sec3.8.3.4" label="3.8.3.4" xreflabel="sec3.8.3.4">
<title>Trust Management</title>
<para>This is the component responsible for remote control, over-the-air update, logging of all security-related activities in the IoT environment, producing statistics and document compliance with all security requirements.</para>
<para>As IoT-scale applications and services will scale over multiple administrative domains and involve multiple ownership regimes, there is a need for a trust framework to enable the users of the system to have confidence that the information and services being exchanged can indeed be relied upon. It needs to be able to deal with humans and machines as users, i.e. it needs to convey trust to humans and needs to be robust enough to be used by machines without denial of service.</para>
<para>Trust can only be achieved by building continuous compliance into the IoT infrastructure. By this we mean that embedding techniques into the IoT devices that allow at any point in time to prove (as opposed to only claiming) that the IoT environment complies with the security requirements, the ever-changing laws and regulations related to security and other interoperability requirements inherent to the modern, more complex IoT environments.</para>
</section>
</section>
</section>
<section class="lev1" id="sec3.9" label="3.9" xreflabel="sec3.9">
<title>Discussion</title>
<para>In the future the enterprises will make extensive use of IoT technology, and there will be a wide range of products sold into various markets, such as advanced medical devices; factory automation sensors and applications in industrial robotics; sensor motes for increased agricultural yield; and automotive sensors and infrastructure integrity monitoring systems for diverse areas, such as road and railway transportation, water distribution and electrical transmission. By 2020, component costs will have come down to the point that connectivity will become a standard feature, even for processors costing less than &#x0024;1. This opens up the possibility of connecting just about anything, from the very simple to the very complex, to offer remote control, monitoring and sensing and it is expected that the variety of devices offered to explode <link linkend="B3-84">[84]</link>.</para>
<para>The economic value added at the European and global level is significant across sectors in 2020. The IoT applications are still implemented by the different industrial verticals with a high adoption in manufacturing, healthcare and home/buildings.</para>
<para>IoT will also facilitate new business models based on the real-time data acquired by billions of sensor nodes. This will push for development of advances sensor, nanoelectronics, computing, and network and cloud technologies and will lead to value creation in utilities, energy, smart building technology, transportation and agriculture.</para>
<para>The IoT&#x2019;s paradigm is based around the idea of connecting things to each other, so it&#x2019;s essential create technology ecosystems and work with other companies that excel at creating IoT devices, gateways, communication/cloud computing platforms, services and applications. As the number of telecommunications providers, device manufacturers, consulting firms, and business software companies supplying IoT services grows, it&#x2019;s easier for enterprises to find the right providers with whom to partner. In order to address the totality of interrelated technologies the IoT technology ecosystem is essential and the enabling technologies will have different roles such as components, products/applications, and support and infrastructure in these ecosystems. The technologies will interact through these roles and impact the IoT technological deployment <link linkend="B3-50">[50]</link>.</para>
<para>IoT ecosystems offer solutions comprising a large system beyond a platform and solve important technical challenges in the different verticals and across verticals. These IoT technology ecosystems are instrumental for the deployment of large pilots and can easily be connected to or build upon the core IoT solutions for different applications in order to expand the system of use and allow new and even unanticipated IoT end uses.</para>
<para>The IoT architecture needs to consider key scenarios, to design for common problems, to appreciate the long term consequences of key decisions in such a way that builds a solid foundation for developing IoT applications, based on specific scenarios and requirements. This is essential for both developing the IoT ecosystems and deploying successfully large IoT application pilots.</para>
<para>If the IoT architecture is not good enough and the software developed is unstable, the development is unable to support existing or future business requirements, and it is difficult to deploy or manage it in a large IoT pilot environment.</para>
<para>One challenge is exchanging the data from and among the things/objects in an interoperable format. This requires creating systems that cross vertical silos and harvest the data across domains, which unleashes useful IoT applications that are user centric, context aware, and are able to create new services by communication across those verticals.</para>
<para>These exchange and processing capabilities are an intrinsic part of the IoT concept and they can be applied to applications in areas such as the Internet of Energy (IoE), the Internet of Lighting (IoL), the Internet of Buildings (IoB), and, in a city context, the Internet of Vehicles (IoV).</para>
<para>The final aim is to create a city-centric ecosystem comprising state-of-the-art and viable technologies which apply the IoT, IoE and IoV concepts to increase the city efficiency by enabling unobtrusive, adaptable and highly usable services at the network-edge, gateway and cloud levels. In this context stimulating the creation of IoT ecosystems (comprising of stakeholders representing the IoT application value-chain: components, chips, sensors, actuators, embedded processing and communication, system integration, middleware, architecture design, software, security, service provision, usage, test, etc.), integrating the future generations of applications, devices, embedded systems and network technologies and other evolving ICT advances, based on open platforms and standardised identifiers, protocols and architectures is of paramount importance. In addition the deployment of IoT Large Scale Pilots to promote the market emergence of IoT and overcome the fragmentation of vertically oriented closed systems, architectures and application areas that address challenges in different application areas by bringing together the technology supply and the application demand sides in real-life settings is the next important step to demonstrate and validate the technology in real environments <link linkend="B3-50">[50]</link>.</para>
</section>
<section class="lev1" id="sec3.10">
<title>Acknowledgments</title>
<para>The IoT European Research Cluster &#x2013; European Research Cluster on the Internet of Things (IERC) maintains its Strategic Research and Innovation Agenda (SRIA), taking into account its experiences and the results from the on-going exchange among European and international experts.</para>
<para>The present document builds on the 2010, 2011, 2012, 2013 and 2014 Strategic Research and Innovation Agendas and presents the research fields and an updated roadmap on future R&#x0026;D from 2015 to 2020 and beyond 2020.</para>
<para>The IoT European Research Cluster SRIA is part of a continuous IoT community dialogue supported by the European Commission (EC) DG Connect &#x2013; Communications Networks, Content and Technology, E1 &#x2013; Network technologies Unit for the European and international IoT stakeholders. The result is a lively document that is updated every year with expert feedback from on-going and future projects financed by the EC. Many colleagues have assisted over the last few years with their views on the Internet of Things Strategic Research and Innovation agenda document. Their contributions are gratefully acknowledged.</para>
<table-wrap position="float" id="T3.2">
<label>Table 3.2</label>
<caption><para>Future Technological Developments</para></caption>
<table cellspacing="5" cellpadding="5" frame="hsides" rules="all" border="1">
<thead>
<tr>
<th><para>Development</para></th>
<th><para>2015&#x2013;2020</para></th>
<th><para>Beyond 2020</para></th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top"><para>Identification Technology</para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Identity management</para></listitem>
<listitem><para>Open framework for the IoT</para></listitem>
<listitem><para>Soft Identities</para></listitem>
<listitem><para>Semantics</para></listitem>
<listitem><para>Privacy awareness</para></listitem>
</itemizedlist></para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>&#x201C;Thing/Object DNA&#x201D; identifier</para></listitem>
<listitem><para>Context aware identification</para></listitem></itemizedlist></para></td>
</tr>
<tr>
<td valign="top"><para>Internet of Things Architecture Technology</para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Network of networks architectures</para></listitem>
<listitem><para>IoT reference architecture developments</para></listitem>
<listitem><para>IoT reference architecture standardization</para></listitem>
<listitem><para>Adaptive, context based architectures</para></listitem>
<listitem><para>Self-<superscript>*</superscript> properties</para></listitem>
</itemizedlist></para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Cognitive architectures</para></listitem>
<listitem><para>Experimental architectures</para></listitem></itemizedlist>
</para></td>
</tr>
<tr>
<td valign="top"><para>Internet of Things Infrastructure</para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Cross domain application deployment</para></listitem>
<listitem><para>Integrated IoT infrastructures</para></listitem>
<listitem><para>Multi-application infrastructures</para></listitem>
<listitem><para>Multi provider infrastructures</para></listitem></itemizedlist>
</para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Global, general purpose IoT infrastructures</para></listitem>
<listitem><para>Global discovery mechanism</para></listitem></itemizedlist>
</para></td>
</tr>
<tr>
<td valign="top"><para>Internet of Things Applications</para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Configurable IoT devices</para></listitem>
<listitem><para>IoT in food/water production and tracing</para></listitem>
<listitem><para>IoT in manufacturing industry</para></listitem>
<listitem><para>IoT in industrial lifelong service and maintenance</para></listitem>
<listitem><para>IoT device with strong processing and analytics capabilities</para></listitem>
<listitem><para>Application capable of handling heterogeneous high capability data collection and processing infrastructures</para></listitem>
</itemizedlist></para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>IoT information open market</para></listitem>
<listitem><para>Autonomous Vehicles</para></listitem>
<listitem><para>Internet of Buildings</para></listitem>
<listitem><para>Internet of Energy</para></listitem>
<listitem><para>Internet of Vehicles</para></listitem>
<listitem><para>Internet of Lighting</para></listitem>
</itemizedlist></para></td>
</tr>
<tr>
<td valign="top"><para>Communication Technology</para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Wide spectrum and spectrum aware protocols</para></listitem>
<listitem><para>Ultra low power chip sets</para></listitem>
<listitem><para>On chip antennas</para></listitem>
<listitem><para>Millimetre wave single chips</para></listitem>
<listitem><para>Ultra low power single chip radios</para></listitem>
<listitem><para>Ultra low power system on chip</para></listitem>
</itemizedlist></para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Unified protocol over wide spectrum</para></listitem>
<listitem><para>Multi-functional reconfigurable chips</para></listitem>
</itemizedlist></para></td>
</tr>
<tr>
<td valign="top"><para>Network Technology</para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Network context awareness</para></listitem>
<listitem><para>Self-aware and self-organizing networks</para></listitem>
<listitem><para>Sensor network location transparency</para></listitem>
<listitem><para>IPv6- enabled scalability</para></listitem></itemizedlist></para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Network cognition</para></listitem>
<listitem><para> Self-learning, self-repairing networks</para></listitem>
<listitem><para>Ubiquitous IPv6-based IoT deployment</para></listitem>
</itemizedlist></para></td>
</tr>
<tr>
<td valign="top"><para>Software and algorithms</para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Goal oriented software</para></listitem>
<listitem><para>Distributed intelligence, problem solving</para></listitem>
<listitem><para> Things-to-Things collaboration environments</para></listitem>
<listitem><para>IoT complex data analysis</para></listitem>
<listitem><para>IoT intelligent data visualization</para></listitem>
<listitem><para>Hybrid IoT and industrial automation systems</para></listitem>
</itemizedlist></para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>User oriented software</para></listitem>
<listitem><para>The invisible IoT</para></listitem>
<listitem><para>Easy-to-deploy IoT SW</para></listitem>
<listitem><para>Things-to-Humans collaboration</para></listitem>
<listitem><para>IoT 4 All</para></listitem>
<listitem><para>User-centric IoT</para></listitem></itemizedlist></para></td>
</tr>
<tr>
<td valign="top"><para>Hardware</para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Smart sensors (bio-chemical)</para></listitem>
<listitem><para>More sensors and actuators (tiny sensors)</para></listitem>
<listitem><para>Sensor integration with NFC</para></listitem>
<listitem><para>Home printable RFID tags</para></listitem></itemizedlist></para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Nano-technology and new materials</para></listitem></itemizedlist></para></td>
</tr>
<tr>
<td valign="top"><para>Data and Signal Processing Technology</para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Context aware data processing and data responses</para></listitem>
<listitem><para>Energy, frequency spectrum aware data processing</para></listitem>
</itemizedlist></para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Cognitive processing and optimisation</para></listitem>
</itemizedlist></para></td>
</tr>
<tr>
<td valign="top"><para>Discovery and Search Engine Technologies</para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Automatic route tagging and identification management centres</para></listitem>
<listitem><para>Semantic discovery of sensors and sensor data</para></listitem></itemizedlist></para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Cognitive search engines</para></listitem>
<listitem><para>Autonomous search engines</para></listitem>
</itemizedlist></para></td>
</tr>
<tr>
<td valign="top"><para>Power and Energy Storage Technologies</para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Energy harvesting (biological, chemical, induction)</para></listitem>
<listitem><para>Power generation in harsh environments</para></listitem>
<listitem><para>Energy recycling</para></listitem>
<listitem><para>Long range wireless power</para></listitem>
<listitem><para>Wireless power</para></listitem></itemizedlist></para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Biodegradable batteries</para></listitem>
<listitem><para>Nano-power processing unit</para></listitem></itemizedlist></para></td>
</tr>
<tr>
<td valign="top"><para>Security, Privacy &#x0026; Trust Technologies</para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>User centric context-aware privacy and privacy policies</para></listitem>
<listitem><para>Privacy aware data processing</para></listitem>
<listitem><para>Security and privacy profiles selection based on security and privacy needs</para></listitem>
<listitem><para>Privacy needs automatic evaluation</para></listitem>
<listitem><para>Context centric security</para></listitem>
<listitem><para>Homomorphic Encryption</para></listitem>
<listitem><para>Searchable Encryption</para></listitem>
<listitem><para>Protection mechanisms for IoT DoS/DdoS attacks</para></listitem></itemizedlist></para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Self-adaptive security mechanisms and protocols</para></listitem>
<listitem><para>Self-managed secure IoT</para></listitem>
</itemizedlist></para></td>
</tr>
<tr>
<td valign="top"><para>Material Technology</para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>SiC, GaN</para></listitem>
<listitem><para>Improved/new semiconductor manufacturing processes/technologies for higher temperature ranges</para></listitem></itemizedlist></para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Diamond</para></listitem>
<listitem><para>Graphene</para></listitem>
</itemizedlist></para></td>
</tr>
<tr>
<td valign="top"><para>Interoperability</para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Optimized and market proof interoperability approaches used</para></listitem>
<listitem><para>Interoperability under stress as market grows</para></listitem>
<listitem><para>Cost of interoperability reduced</para></listitem>
<listitem><para>Several successful certification programmes in place</para></listitem></itemizedlist></para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Automated self-adaptable and agile interoperability</para></listitem></itemizedlist></para></td>
</tr>
<tr>
<td valign="top"><para>Standardisation</para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>IoT standardization refinement</para></listitem>
<listitem><para>M2M standardization as part of IoT standardisation</para></listitem>
<listitem><para>Standards for cross interoperability with heterogeneous networks</para></listitem>
<listitem><para>IoT data and information sharing</para></listitem></itemizedlist></para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Standards for autonomic communication protocols</para></listitem>
</itemizedlist></para></td>
</tr>
</tbody>
</table>
</table-wrap>
<table-wrap position="float" id="T3.3">
<label>Table 3.3</label>
<caption><para>Internet of Things Research Needs</para></caption>
<table cellspacing="5" cellpadding="5" frame="hsides" rules="all" border="1">
<thead>
<tr>
<th><para>Research Needs</para></th>
<th><para>2015&#x2013;2020</para></th>
<th><para>Beyond 2020</para></th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top"><para>Identification Technology</para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Convergence of IP and IDs and addressing scheme</para></listitem>
<listitem><para>Unique ID</para></listitem>
<listitem><para>Multiple IDs for specific cases</para></listitem>
<listitem><para>Extend the ID concept (more than ID number)</para></listitem>
<listitem><para>Electro Magnetic Identification &#x2013; EMID</para></listitem></itemizedlist></para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Multi methods &#x2013; one ID</para></listitem>
</itemizedlist></para></td>
</tr>
<tr>
<td valign="top"><para>IoT Architecture</para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Internet (Internet of Things) (global scale applications, global interoperability, many trillions of things)</para></listitem></itemizedlist></para></td>
<td/>
</tr>
<tr>
<td valign="top"><para>Internet of Things Infrastructure</para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Application domain-independent abstractions &#x2013; functionality</para></listitem>
<listitem><para>Cross-domain integration and management</para></listitem>
<listitem><para>Large-scale deployment of infrastructure</para></listitem>
<listitem><para>Context-aware adaptation of operation</para></listitem></itemizedlist></para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Self-management and configuration</para></listitem></itemizedlist></para></td>
</tr>
<tr>
<td valign="top"><para>Internet of Things Applications</para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>IoT information open market</para></listitem>
<listitem><para>Standardization of APIs</para></listitem>
<listitem><para>IoT device with strong processing and analytics capabilities</para></listitem>
<listitem><para>Ad-hoc deployable and configurable networks for industrial use</para></listitem>
<listitem><para>Mobile IoT applications for IoT industrial operation and service/maintenance</para></listitem>
<listitem><para>Fully integrated and interacting IoT applications for industrial use</para></listitem></itemizedlist></para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Building and deployment of public IoT infrastructure with open APIs and underlying business models</para></listitem>
<listitem><para>Mobile applications with bio-IoT-human interaction</para></listitem>
</itemizedlist></para></td>
</tr>
<tr>
<td valign="top"><para>SOA Software Services for IoT</para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Quality of Information and IoT service reliability</para></listitem>
<listitem><para>Highly distributed IoT processes</para></listitem>
<listitem><para>Semi-automatic process analysis and distribution</para></listitem></itemizedlist></para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Fully autonomous IoT devices</para></listitem></itemizedlist></para></td>
</tr>
<tr>
<td valign="top"><para>Internet of Things Architecture Technology</para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Code in tags to be executed in the tag or in trusted readers</para></listitem>
<listitem><para>Global applications Adaptive coverage</para></listitem>
<listitem><para>Universal authentication of objects</para></listitem>
<listitem><para>Graceful recovery of tags following power loss</para></listitem>
<listitem><para>More memory</para></listitem>
<listitem><para>Less energy consumption</para></listitem>
<listitem><para>3-D real time location/position embedded systems</para></listitem></itemizedlist></para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Intelligent and collaborative functions</para></listitem>
<listitem><para>Object intelligence</para></listitem>
<listitem><para>Context awareness</para></listitem>
<listitem><para>Cooperative position cyber-physical systems</para></listitem></itemizedlist></para></td>
</tr>
<tr>
<td valign="top"><para>Communication Technology</para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Longer range (higher frequencies &#x2013; tenths of GHz)</para></listitem>
<listitem><para>Protocols for interoperability</para></listitem>
<listitem><para>On chip networks and multi standard RF architectures</para></listitem>
<listitem><para>Multi-protocol chips</para></listitem>
<listitem><para>Gateway convergence</para></listitem>
<listitem><para>Hybrid network technologies convergence</para></listitem>
<listitem><para>5G developments</para></listitem>
<listitem><para>Collision-resistant algorithms</para></listitem>
<listitem><para>Plug and play tags</para></listitem>
<listitem><para>Self-repairing tags</para></listitem></itemizedlist></para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Self-configuring, protocol seamless networks</para></listitem></itemizedlist></para></td>
</tr>
<tr>
<td valign="top"><para>Network Technology</para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Grid/Cloud network</para></listitem>
<listitem><para>Software defined networks</para></listitem>
<listitem><para>Service based network</para></listitem>
<listitem><para>Multi authentication</para></listitem>
<listitem><para>Integrated/universal authentication</para></listitem>
<listitem><para>Brokering of data through market mechanisms</para></listitem>
<listitem><para>Scalability enablers</para></listitem>
<listitem><para>IPv6-based networks for smart cities</para></listitem></itemizedlist></para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Need based network</para></listitem>
<listitem><para>Internet of Everything</para></listitem>
<listitem><para>Robust security based on a combination of ID metrics</para></listitem>
<listitem><para>Autonomous systems for nonstop information technology service</para></listitem>
<listitem><para>Global European IPv6-based Internet of Everything</para></listitem></itemizedlist></para></td>
</tr>
<tr>
<td valign="top"><para>Software and algorithms</para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Self-management and control</para></listitem>
<listitem><para>Micro operating systems</para></listitem>
<listitem><para>Context aware business event generation</para></listitem>
<listitem><para>Interoperable ontologies of business events</para></listitem>
<listitem><para>Scalable autonomous software</para></listitem>
<listitem><para>Evolving software</para></listitem>
<listitem><para>Self-reusable software</para></listitem>
<listitem><para>Autonomous things:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>Self-configurable</para></listitem>
<listitem><para>Self-healing</para></listitem>
<listitem><para>Self-management</para></listitem></itemizedlist></listitem>
<listitem><para>Platform for object intelligence</para></listitem></itemizedlist></para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Self-generating &#x201C;molecular&#x201D; software</para></listitem>
<listitem><para>Context aware software</para></listitem></itemizedlist></para></td>
</tr>
<tr>
<td valign="top"><para>Hardware Devices</para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Polymer based memory</para></listitem>
<listitem><para>Ultra low power EPROM/FRAM</para></listitem>
<listitem><para>Molecular sensors</para></listitem>
<listitem><para>Autonomous circuits</para></listitem>
<listitem><para>Transparent displays</para></listitem>
<listitem><para>Interacting tags</para></listitem>
<listitem><para>Collaborative tags</para></listitem>
<listitem><para>Heterogeneous integration</para></listitem>
<listitem><para>Self-powering sensors</para></listitem>
<listitem><para>Low cost modular devices</para></listitem>
<listitem><para>Ultra low power circuits</para></listitem>
<listitem><para>Electronic paper</para></listitem>
<listitem><para>Nano power processing units</para></listitem>
<listitem><para>Silent Tags</para></listitem>
<listitem><para>Biodegradable antennae</para></listitem></itemizedlist></para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Biodegradable circuits</para></listitem>
<listitem><para>Autonomous &#x201C;bee&#x201D; type devices</para></listitem>
</itemizedlist></para></td>
</tr>
<tr>
<td valign="top"><para>Hardware Systems, Circuits and Architectures</para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Multi-protocol front ends</para></listitem>
<listitem><para>Ultra low cost chips with security</para></listitem>
<listitem><para>Collision free air to air protocol</para></listitem>
<listitem><para>Minimum energy protocols</para></listitem>
<listitem><para>Multi-band, multi-mode wireless sensor architectures implementations</para></listitem>
<listitem><para>Adaptive architectures</para></listitem>
<listitem><para>Reconfigurable wireless systems</para></listitem>
<listitem><para>Changing and adapting functionalities to the environments</para></listitem>
<listitem><para>Micro readers with multi standard protocols for reading sensor and actuator data</para></listitem>
<listitem><para>Distributed memory and processing</para></listitem>
<listitem><para>Low cost modular devices</para></listitem>
<listitem><para>Protocols correct by construction</para></listitem></itemizedlist></para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Heterogeneous architectures</para></listitem>
<listitem><para>&#x201C;Fluid&#x201D; systems, continuously changing and adapting</para></listitem></itemizedlist></para></td>
</tr>
<tr>
<td valign="top"><para>Data and Signal Processing Technology</para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Common sensor ontologies (cross domain)</para></listitem>
<listitem><para>Distributed energy efficient data processing</para></listitem>
<listitem><para>Autonomous computing</para></listitem>
<listitem><para>Tera scale computing</para></listitem>
<listitem><para>Micro servers</para></listitem>
<listitem><para>Multi-functional gateways</para></listitem></itemizedlist></para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Cognitive computing</para></listitem>
<listitem><para>Cognitive, software-defined gateways</para></listitem></itemizedlist></para></td>
</tr>
<tr>
<td valign="top"><para>Discovery and Search Engine Technologies</para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Scalable Discovery services for connecting things with services while respecting security, privacy and confidentiality</para></listitem>
<listitem><para>&#x201C;Search Engine&#x201D; for Things</para></listitem>
<listitem><para>IoT Browser</para></listitem>
<listitem><para>Multiple identities per object</para></listitem>
<listitem><para>On demand service discovery/integration</para></listitem>
<listitem><para>Universal authentication</para></listitem></itemizedlist></para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Cognitive registries</para></listitem></itemizedlist></para></td>
</tr>
<tr>
<td valign="top"><para>Power and Energy Storage Technologies</para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Paper based batteries</para></listitem>
<listitem><para>Wireless power everywhere, anytime</para></listitem>
<listitem><para>Photovoltaic cells everywhere</para></listitem>
<listitem><para>Energy harvesting</para></listitem>
<listitem><para>Power generation for harsh environments</para></listitem></itemizedlist></para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Biodegradable batteries</para></listitem></itemizedlist></para></td>
</tr>
<tr>
<td valign="top"><para>Interoperability</para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Dynamic and adaptable interoperability for technical and semantic areas</para></listitem>
<listitem><para>Open platform for IoT validation</para></listitem></itemizedlist></para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Self-adaptable and agile interoperability approaches</para></listitem></itemizedlist></para></td>
</tr>
<tr>
<td valign="top"><para>Security, Privacy &#x0026; Trust Technologies</para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Low cost, secure and high performance identification/authentication devices</para></listitem>
<listitem><para>Access control and accounting schemes for IoT</para></listitem>
<listitem><para>General attack detection and recovery/resilience for IoT</para></listitem>
<listitem><para>Cyber Security Situation Awareness for IoT</para></listitem>
<listitem><para>Context based security activation algorithms</para></listitem>
<listitem><para>Service triggered security</para></listitem>
<listitem><para>Context-aware devices</para></listitem>
<listitem><para>Object intelligence</para></listitem>
<listitem><para>Decentralised self-configuring methods for trust establishment</para></listitem>
<listitem><para>Novel methods to assess trust in people, devices and data</para></listitem>
<listitem><para>Location privacy preservation</para></listitem>
<listitem><para>Personal information protection from inference and observation</para></listitem>
<listitem><para>Trust Negotiation</para></listitem></itemizedlist></para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Cognitive security systems</para></listitem>
<listitem><para>Self-managed secure IoT</para></listitem>
<listitem><para>Decentralised approaches to privacy by information localisation</para></listitem>
</itemizedlist></para></td>
</tr>
<tr>
<td valign="top"><para>Governance (legal aspects)</para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Legal framework for transparency of IoT bodies and organizations</para></listitem>
<listitem><para>Privacy knowledge base and development privacy standards</para></listitem></itemizedlist></para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Adoption of clear European norms/standards regarding Privacy and Security for IoT</para></listitem></itemizedlist></para></td>
</tr>
<tr>
<td valign="top"><para>Economic</para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Business cases and value chains for IoT</para></listitem>
<listitem><para>Emergence of IoT in different industrial sectors</para></listitem></itemizedlist></para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Integrated platforms</para></listitem></itemizedlist></para></td>
</tr>
<tr>
<td valign="top"><para>Material Technology</para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Carbon nanotube</para></listitem>
<listitem><para>Conducting Polymers and semiconducting polymers and molecules</para></listitem>
<listitem><para>Modular manufacturing techniques</para></listitem></itemizedlist></para></td>
<td valign="top"><para><itemizedlist mark="bullet" spacing="normal">
<listitem><para>Graphene</para></listitem></itemizedlist></para></td>
</tr>
</tbody>
</table>
</table-wrap>
</section>
<section class="lev1" id="sec1">
<title>List of Contributors</title>
<para>Abdur Rahim Biswas, IT, create-net, iCore</para>
<para>Alessandro Bassi, FR, Bassi Consulting, IoT-A</para>
<para>Ali Rezafard, IE, Afilias, EPCglobal Data Discovery JRG</para>
<para>Amine Houyou, DE, SIEMENS, IoT@Work</para>
<para>Antonio Skarmeta, SP, University of Murcia, IoT6</para>
<para>Carlos Agostinho, PT, UNINOVA</para>
<para>Carlo Maria Medaglia, IT, University of Rome &#x2018;Sapienza&#x2019;, IoT-A</para>
<para>C&#x00E9;sar Viho, FR, Probe-IT</para>
<para>Claudio Pastrone, IT, ISMB, ebbits, ALMANAC</para>
<para>Daniel Thiemert, UK, University of Reading, HYDRA</para>
<para>David Simplot-Ryl, FR, INRIA/ERCIM, ASPIRE</para>
<para>Elias Tragos, GR, FORTH, RERUM</para>
<para>Eric Mercier, FR, CEA-Leti</para>
<para>Erik Berg, NO, Telenor, IoT-I</para>
<para>Francesco Sottile, IT, ISMB, BUTLER</para>
<para>Franck Le Gall, FR, Inno, PROBE-IT, BUTLER</para>
<para>Fran&#x00E7;ois Carrez, GB, IoT-I</para>
<para>Frederic Thiesse, CH, University of St. Gallen, Auto-ID Lab</para>
<para>Friedbert Berens, LU, FB Consulting S.&#x00E0; r.l, BUTLER</para>
<para>Gary Steri, IT, EC, JRC</para>
<para>Gianmarco Baldini, IT, EC, JRC</para>
<para>Giuseppe Abreu, DE, Jacobs University Bremen, BUTLER</para>
<para>Ghislain Despesse, FR, CEA-Leti</para>
<para>Harald Sundmaeker, DE, ATB GmbH, SmartAgriFood, CuteLoop</para>
<para>Henri Barthel, BE, GS1 Global</para>
<para>Igor Nai Fovino, IT, EC, JRC</para>
<para>Jan H&#x00F6;ller, SE, EAB</para>
<para>Jens-Matthias Bohli, DE, NEC</para>
<para>John Soldatos, GR, Athens Information Technology, ASPIRE, OpenIoT</para>
<para>Jose-Antonio, Jimenez Holgado, ES, TID</para>
<para>Klaus Moessner, UK, UNIS, IoT.est</para>
<para>Kostas Kalaboukas, GR, SingularLogic, EURIDICE</para>
<para>Latif Ladid, LU, UL, IPv6 Forum</para>
<para>Levent G&#x00FC;rgen, FR, CEA-Leti</para>
<para>Luis Mu&#x00F1;oz, ES, Universidad De Cantabria</para>
<para>Marco Carugi, IT, ITU-T, ZTE</para>
<para>Marilyn Arndt, FR, Orange</para>
<para>Mario Hoffmann, DE, Fraunhofer-Institute SIT, HYDRA</para>
<para>Markus Eisenhauer, DE, Fraunhofer-FIT, HYDRA, ebbits</para>
<para>Markus Gruber, DE, ALUD</para>
<para>Martin Bauer, DE, NEC, IoT-A</para>
<para>Martin Serrano, IE, OpenIoT, NUI Galway, Insight Centre, OpenIoT, VITAL</para>
<para>Maurizio Spirito, IT, Istituto Superiore Mario Boella, ebbits, ALMANAC</para>
<para>Maarten Botterman, NL, GNKS, SMART-ACTION</para>
<para>Nicolaie L. Fantana, DE, ABB AG</para>
<para>Nikos Kefalakis, GR, Athens Information Technology, OpenIoT</para>
<para>Paolo Medagliani, FR, Thales Communications &#x0026; Security, CALYPSO</para>
<para>Payam Barnaghi, UK, UNIS, IoT.est</para>
<para>Philippe Cousin, FR, easy global market, PROBE-IT</para>
<para>Raffaele Giaffreda, IT, CNET, iCore</para>
<para>Ricardo Neisse, IT, EC, JRC</para>
<para>Richard Egan, UK, TRT</para>
<para>Rolf Weber, CH, UZH</para>
<para>S&#x00E9;bastien Boissseau, FR, CEA-Leti</para>
<para>S&#x00E9;bastien Ziegler, CH, Mandat International, IoT6</para>
<para>Sergio Gusmeroli, IT, TXT e-solutions,</para>
<para>Stefan Fisher, DE, UZL</para>
<para>Stefano Severi, DE, Jacobs University Bremen, BUTLER</para>
<para>Srdjan Krco, RS, DunavNET, IoT-I, SOCIOTAL</para>
<para>S&#x00F6;nke Nommensen, DE, UZL, SmartSantander</para>
<para>Trevor Peirce, BE, CASAGRAS2</para>
<para>Veronica Gutierrez Polidura, ES, Universidad De Cantabria</para>
<para>Vincent Berg, FR, CEA-Leti</para>
<para>Vlasios Tsiatsis, SE, EAB</para>
<para>Wolfgang K&#x00F6;nig, DE, ALUD</para>
<para>Wolfgang Templ, DE, ALUD</para>
</section>
<section class="lev1" id="sec2">
<title>Contributing Projects and Initiatives</title>
<para>ASPIRE, BRIDGE, CASCADAS, CONFIDENCE, CuteLoop, DACAR, ebbits, ARTEMIS, ENIAC, EPoSS, EU-IFM, EURIDICE, GRIFS, HYDRA, IMS2020, Indisputable Key, iSURF, LEAPFROG, PEARS Feasibility, PrimeLife, RACE networkRFID, SMART, StoLPaN, SToP, TraSer, WALTER, IoT-A, IoT@Work, ELLIOT, SPRINT, NEFFICS, IoT-I, CASAGRAS2, eDiana, OpenIoT, IoT6, iCore PROBE-IT, BUTLER, IoT-est, SmartAgriFood, ALMANAC, CITYPULSE, COSMOS, CLOUT, RERUM, SMARTIE, SMART-ACTION, SOCIOTAL, VITAL.</para>
</section>
<section class="lev1" id="sec3">
<title>List of Abbreviations and Acronyms</title>
<table-wrap position="float">
<table cellspacing="5" cellpadding="5" frame="hsides" rules="all" border="1">
<thead>
<tr>
<th><para><emphasis role="strong">Acronym</emphasis></para></th>
<th><para><emphasis role="strong">Meaning</emphasis></para></th>
</tr>
</thead>
<tbody>
<tr>
<td><para>3GPP</para></td>
<td><para>3rd Generation Partnership Project</para></td>
</tr>
<tr>
<td><para>AAL</para></td>
<td><para>Ambient Assisted Living</para></td>
</tr>
<tr>
<td><para>ACID</para></td>
<td><para>Atomicity, Consistency, Isolation, Durability</para></td>
</tr>
<tr>
<td><para>ACL</para></td>
<td><para>Access Control List</para></td>
</tr>
<tr>
<td><para>AMR</para></td>
<td><para>Automatic Meter Reading Technology</para></td>
</tr>
<tr>
<td><para>API</para></td>
<td><para>Application Programming Interface</para></td>
</tr>
<tr>
<td><para>ARM</para></td>
<td><para>Architecture Reference Model</para></td>
</tr>
<tr>
<td><para>AWARENESS</para></td>
<td><para>EU FP7 coordination action</para></td>
</tr>
<tr>
<td/>
<td><para>Self-Awareness in Autonomic Systems</para></td>
</tr>
<tr>
<td><para>BACnet</para></td>
<td><para>Communications protocol for building automation and control networks</para></td>
</tr>
<tr>
<td><para>BAN</para></td>
<td><para>Body Area Network</para></td>
</tr>
<tr>
<td><para>BDI</para></td>
<td><para>Belief-Desire-Intention architecture or approach</para></td>
</tr>
<tr>
<td><para>Bluetooth</para></td>
<td><para>Proprietary short range open wireless technology standard</para></td>
</tr>
<tr>
<td><para>BPM</para></td>
<td><para>Business process modelling</para></td>
</tr>
<tr>
<td><para>BPMN</para></td>
<td><para>Business Process Model and Notation</para></td>
</tr>
<tr>
<td><para>BUTLER</para></td>
<td><para>EU FP7 research project</para></td>
</tr>
<tr>
<td/>
<td><para>uBiquitous, secUre inTernet of things with Location and contExt-awaReness</para></td>
</tr>
<tr>
<td><para>CAGR</para></td>
<td><para>Compound annual growth rate</para></td>
</tr>
<tr>
<td><para>CE</para></td>
<td><para>Council of Europe</para></td>
</tr>
<tr>
<td><para>CEN</para></td>
<td><para>Comit&#x00E9; Europ&#x00E9;en de Normalisation</para></td>
</tr>
<tr>
<td><para>CENELEC</para></td>
<td><para>Comit&#x00E9; Europ&#x00E9;en de Normalisation &#x00C9;lectrotechnique</para></td>
</tr>
<tr>
<td><para>CEO</para></td>
<td><para>Chief executive officer</para></td>
</tr>
<tr>
<td><para>CEP</para></td>
<td><para>Complex Event Processing</para></td>
</tr>
<tr>
<td><para>CSS</para></td>
<td><para>Chirp Spread Spectrum</para></td>
</tr>
<tr>
<td><para>D1.3</para></td>
<td><para>Deliverable 1.3</para></td>
</tr>
<tr>
<td><para>DATEX-II</para></td>
<td><para>Standard for data exchange involving traffic centres</para></td>
</tr>
<tr>
<td><para>DCA</para></td>
<td><para>Data Collection and Analysis</para></td>
</tr>
<tr>
<td><para>DNS</para></td>
<td><para>Domain Name System</para></td>
</tr>
<tr>
<td><para>DoS/DDOS</para></td>
<td><para>Denial of service attack</para></td>
</tr>
<tr>
<td/>
<td><para>Distributed denial of service attack</para></td>
</tr>
<tr>
<td><para>EC</para></td>
<td><para>European Commission</para></td>
</tr>
<tr>
<td><para>eCall</para></td>
<td><para>eCall &#x2013; eSafety Support</para></td>
</tr>
<tr>
<td/>
<td><para>A European Commission funded project, coordinated by ERTICO-ITS Europe</para></td>
</tr>
<tr>
<td><para>EDA</para></td>
<td><para>Event Driven Architecture</para></td>
</tr>
<tr>
<td><para>EH</para></td>
<td><para>Energy harvesting</para></td>
</tr>
<tr>
<td><para>EMF</para></td>
<td><para>Electromagnetic Field</para></td>
</tr>
<tr>
<td><para>ERTICO-ITS</para></td>
<td><para>Multi-sector, public/private partnership for intelligent transport systems and services for Europe</para></td>
</tr>
<tr>
<td><para>ESOs</para></td>
<td><para>European Standards Organisations</para></td>
</tr>
<tr>
<td><para>ESP</para></td>
<td><para>Event Stream Processing</para></td>
</tr>
<tr>
<td><para>ETSI</para></td>
<td><para>European Telecommunications Standards Institute</para></td>
</tr>
<tr>
<td><para>EU</para></td>
<td><para>European Union</para></td>
</tr>
<tr>
<td><para>Exabytes</para></td>
<td><para>10<superscript>18</superscript> bytes</para></td>
</tr>
<tr>
<td><para>FI</para></td>
<td><para>Future Internet</para></td>
</tr>
<tr>
<td><para>FI PPP</para></td>
<td><para>Future Internet Public Private Partnership programme</para></td>
</tr>
<tr>
<td><para>FIA</para></td>
<td><para>Future Internet Assembly</para></td>
</tr>
<tr>
<td><para>FIS 2008</para></td>
<td><para>Future Internet Symposium 2008</para></td>
</tr>
<tr>
<td><para>F-ONS</para></td>
<td><para>Federated Object Naming Service</para></td>
</tr>
<tr>
<td><para>FP7</para></td>
<td><para>Framework Programme 7</para></td>
</tr>
<tr>
<td><para>FTP</para></td>
<td><para>File Transfer Protocol</para></td>
</tr>
<tr>
<td><para>GFC</para></td>
<td><para>Global Certification Forum</para></td>
</tr>
<tr>
<td><para>GreenTouch</para></td>
<td><para>Consortium of ICT research experts</para></td>
</tr>
<tr>
<td><para>GS1</para></td>
<td><para>Global Standards Organization</para></td>
</tr>
<tr>
<td><para>Hadoop</para></td>
<td><para>Project developing open-source software for reliable, scalable, distributed computing</para></td>
</tr>
<tr>
<td><para>IAB</para></td>
<td><para>Internet Architecture Board</para></td>
</tr>
<tr>
<td><para>IBM</para></td>
<td><para>International Business Machines Corporation</para></td>
</tr>
<tr>
<td><para>ICAC</para></td>
<td><para>International Conference on Autonomic Computing</para></td>
</tr>
<tr>
<td><para>ICANN</para></td>
<td><para>Internet Corporation for Assigned Name and Numbers</para></td>
</tr>
<tr>
<td><para>ICT</para></td>
<td><para>Information and Communication Technologies</para></td>
</tr>
<tr>
<td><para>iCore</para></td>
<td><para>EU research project</para></td>
</tr>
<tr>
<td/>
<td><para>Empowering IoT through cognitive technologies</para></td>
</tr>
<tr>
<td><para>IERC</para></td>
<td><para>European Research Cluster for the Internet of Things</para></td>
</tr>
<tr>
<td><para>IETF</para></td>
<td><para>Internet Engineering Task Force</para></td>
</tr>
<tr>
<td><para>INSPIRE</para></td>
<td><para>Infrastructure for Spatial Information in the European Community</para></td>
</tr>
<tr>
<td><para>IIoT</para></td>
<td><para>Industrial Internet of Things</para></td>
</tr>
<tr>
<td><para>IoB</para></td>
<td><para>Internet of Buildings</para></td>
</tr>
<tr>
<td><para>IoC</para></td>
<td><para>Internet of Cities</para></td>
</tr>
<tr>
<td><para>IoE</para></td>
<td><para>Internet of Energy</para></td>
</tr>
<tr>
<td><para>IoE</para></td>
<td><para>Internet of Everything</para></td>
</tr>
<tr>
<td><para>IoL</para></td>
<td><para>Internet of Lighting</para></td>
</tr>
<tr>
<td><para>IoM</para></td>
<td><para>Internet of Media</para></td>
</tr>
<tr>
<td><para>IoP</para></td>
<td><para>Internet of Persons, Internet of People</para></td>
</tr>
<tr>
<td><para>IoS</para></td>
<td><para>Internet of Services</para></td>
</tr>
<tr>
<td><para>IoT</para></td>
<td><para>Internet of Things</para></td>
</tr>
<tr>
<td><para>IoT6</para></td>
<td><para>EU FP7 research project</para></td>
</tr>
<tr>
<td/>
<td><para>Universal integration of the Internet of Things through an IPv6-based service oriented architecture enabling heterogeneous components interoperability</para></td>
</tr>
<tr>
<td><para>IoT-A</para></td>
<td><para>Internet of Things Architecture</para></td>
</tr>
<tr>
<td><para>IoT-est</para></td>
<td><para>EU ICT FP7 research project</para></td>
</tr>
<tr>
<td/>
<td><para>Internet of Things environment for service creation and testing</para></td>
</tr>
<tr>
<td><para>IoT-I</para></td>
<td><para>Internet of Things Initiative</para></td>
</tr>
<tr>
<td><para>IoV</para></td>
<td><para>Internet of Vehicles</para></td>
</tr>
<tr>
<td><para>IP</para></td>
<td><para>Internet Protocol</para></td>
</tr>
<tr>
<td><para>IPSO Alliance</para></td>
<td><para>Organization promoting the Internet Protocol(IP) for Smart Object communications</para></td>
</tr>
<tr>
<td><para>IPv6</para></td>
<td><para>Internet Protocol version 6</para></td>
</tr>
<tr>
<td><para>ISO 19136</para></td>
<td><para>Geographic information, Geography Mark-up Language, ISO Standard</para></td>
</tr>
<tr>
<td><para>IST</para></td>
<td><para>Intelligent Transportation System</para></td>
</tr>
<tr>
<td><para>KNX</para></td>
<td><para>Standardized, OSI-based network communications protocol for intelligent buildings</para></td>
</tr>
<tr>
<td><para>LNCS</para></td>
<td><para>Lecture Notes in Computer Science</para></td>
</tr>
<tr>
<td><para>LOD</para></td>
<td><para>Linked Open Data Cloud</para></td>
</tr>
<tr>
<td><para>LTE</para></td>
<td><para>Long Term Evolution</para></td>
</tr>
<tr>
<td><para>M2M</para></td>
<td><para>Machine to Machine</para></td>
</tr>
<tr>
<td><para>MAC</para></td>
<td><para>Media Access Control</para></td>
</tr>
<tr>
<td/>
<td><para>data communication protocol sub-layer</para></td>
</tr>
<tr>
<td><para>MAPE-K</para></td>
<td><para>Model for autonomic systems:</para></td>
</tr>
<tr>
<td/>
<td><para>Monitor, Analyse, Plan, Execute in interaction with a Knowledge base</para></td>
</tr>
<tr>
<td><para>makeSense</para></td>
<td><para>EU FP7 research project on</para></td>
</tr>
<tr>
<td/>
<td><para>Easy Programming of Integrated Wireless Sensors</para></td>
</tr>
<tr>
<td><para>MB</para></td>
<td><para>Megabyte</para></td>
</tr>
<tr>
<td><para>MIT</para></td>
<td><para>Massachusetts Institute of Technology</para></td>
</tr>
<tr>
<td><para>MPP</para></td>
<td><para>Massively parallel processing</para></td>
</tr>
<tr>
<td><para>NIEHS</para></td>
<td><para>National Institute of Environmental Health Sciences</para></td>
</tr>
<tr>
<td><para>NFC</para></td>
<td><para>Near Field Communication</para></td>
</tr>
<tr>
<td><para>NoSQL</para></td>
<td><para>not only SQL &#x2013; a broad class of database management systems</para></td>
</tr>
<tr>
<td><para>OASIS</para></td>
<td><para>Organisation for the Advancement of Structured Information Standards</para></td>
</tr>
<tr>
<td><para>OEM</para></td>
<td><para>Original equipment manufacturer</para></td>
</tr>
<tr>
<td><para>OGC</para></td>
<td><para>Open Geospatial Consortium</para></td>
</tr>
<tr>
<td><para>OMG</para></td>
<td><para>Object Management Group</para></td>
</tr>
<tr>
<td><para>OpenIoT</para></td>
<td><para>EU FP7 research project</para></td>
</tr>
<tr>
<td/>
<td><para>Part of the Future Internet public private partnership</para></td>
</tr>
<tr>
<td/>
<td><para>Open source blueprint for large scale self-organizing</para></td>
</tr>
<tr>
<td/>
<td><para>cloud environments for IoT applications</para></td>
</tr>
<tr>
<td><para>Outsmart</para></td>
<td><para>EU project</para></td>
</tr>
<tr>
<td/>
<td><para>Provisioning of urban/regional smart services and business models enabled by the Future Internet</para></td>
</tr>
<tr>
<td><para>PAN</para></td>
<td><para>Personal Area Network</para></td>
</tr>
<tr>
<td><para>PET</para></td>
<td><para>Privacy Enhancing Technologies</para></td>
</tr>
<tr>
<td><para>Petabytes</para></td>
<td><para>10<superscript>15</superscript> byte</para></td>
</tr>
<tr>
<td><para>PHY</para></td>
<td><para>Physical layer of the OSI model</para></td>
</tr>
<tr>
<td><para>PIPES</para></td>
<td><para>Public infrastructure for processing and exploring streams</para></td>
</tr>
<tr>
<td><para>PKI</para></td>
<td><para>Public key infrastructure</para></td>
</tr>
<tr>
<td><para>PPP</para></td>
<td><para>Public-private partnership</para></td>
</tr>
<tr>
<td><para>Probe-IT</para></td>
<td><para>EU ICT-FP7 research project</para></td>
</tr>
<tr>
<td/>
<td><para>Pursuing roadmaps and benchmarks for the Internet of Things</para></td>
</tr>
<tr>
<td><para>PSI</para></td>
<td><para>Public Sector Information</para></td>
</tr>
<tr>
<td><para>PV</para></td>
<td><para>Photo Voltaic</para></td>
</tr>
<tr>
<td><para>QoI</para></td>
<td><para>Quality of Information</para></td>
</tr>
<tr>
<td><para>RFID</para></td>
<td><para>Radio-frequency identification</para></td>
</tr>
<tr>
<td><para>SASO</para></td>
<td><para>IEEE international conferences on Self-Adaptive and Self-Organizing Systems</para></td>
</tr>
<tr>
<td><para>SDO</para></td>
<td><para>Standard Developing Organization</para></td>
</tr>
<tr>
<td><para>SEAMS</para></td>
<td><para>International Symposium on Software Engineering for Adaptive and Self-Managing Systems</para></td>
</tr>
<tr>
<td><para>SENSEI</para></td>
<td><para>EU FP7 research project</para></td>
</tr>
<tr>
<td/>
<td><para>Integrating the physical with the digital world of the network of the future</para></td>
</tr>
<tr>
<td><para>SIG</para></td>
<td><para>Special Interest Group</para></td>
</tr>
<tr>
<td><para>SLA</para></td>
<td><para>Service-level agreement/Software license agreement</para></td>
</tr>
<tr>
<td><para>SmartAgriFood</para></td>
<td><para>EU ICT FP7 research project</para></td>
</tr>
<tr>
<td/>
<td><para>Smart Food and Agribusiness: Future Internet for safe and healthy food from farm to fork</para></td>
</tr>
<tr>
<td><para>SmartSantander</para></td>
<td><para>EU ICT FP7 research project</para></td>
</tr>
<tr>
<td/>
<td><para>Future Internet research and experimentation</para></td>
</tr>
<tr>
<td><para>SOA</para></td>
<td><para>Service Oriented Approach</para></td></tr>
<tr>
<td><para>SON</para></td>
<td><para>Self-Organising Networks</para></td>
</tr>
<tr>
<td><para>SSW</para></td>
<td><para>Semantic Sensor Web</para></td>
</tr>
<tr>
<td><para>SRA</para></td>
<td><para>Strategic Research Agenda</para></td>
</tr>
<tr>
<td><para>SRIA</para></td>
<td><para>Strategic Research and Innovation Agenda</para></td>
</tr>
<tr>
<td><para>SRA2010</para></td>
<td><para>Strategic Research Agenda 2010</para></td>
</tr>
<tr>
<td><para>SWE</para></td>
<td><para>Sensor Web Enablement</para></td>
</tr>
<tr>
<td><para>TC</para></td>
<td><para>Technical Committee</para></td>
</tr>
<tr>
<td><para>TTCN-3</para></td>
<td><para>Testing and Test Control Notation version 3</para></td>
</tr>
<tr>
<td><para>USDL</para></td>
<td><para>Unified Service Description Language</para></td>
</tr>
<tr>
<td><para>UWB</para></td>
<td><para>Ultra-wideband</para></td>
</tr>
<tr>
<td><para>W3C</para></td>
<td><para>World Wide Web Consortium</para></td>
</tr>
<tr>
<td><para>WS&#x0026; AN</para></td>
<td><para>Wireless sensor and actuator networks</para></td>
</tr>
<tr>
<td><para>WSN</para></td>
<td><para>Wireless sensor network</para></td>
</tr>
<tr>
<td><para>WS-BPEL</para></td>
<td><para>Web Services Business Process Execution Language</para></td>
</tr>
<tr>
<td><para>Zettabytes</para></td>
<td><para>10<superscript>21</superscript> byte</para></td>
</tr>
<tr>
<td><para>ZigBee</para></td>
<td><para>Low-cost, low-power wireless mesh network standardbased on IEEE 802.15.4</para></td>
</tr>
</tbody>
</table>
</table-wrap>
</section>
<bibliography class="biblio" id="bib01">
<title>Bibliography</title>
<bibliomixed id="B3-1">[1] <collab>NFC Forum</collab>, online at <ulink url="http://nfc-forum.org">http://nfc-forum.org</ulink></bibliomixed>
<bibliomixed id="B3-2">[2] <collab>METIS, Mobile and wireless communications Enablers for the Twenty-twenty (2020) Information Society</collab>, online at <ulink url="https://www.metis2020.com/">https://www.metis2020.com/</ulink></bibliomixed>
<bibliomixed id="B3-3">[3] <author><firstname>F.</firstname> <surname>Schaich</surname></author>, <author><firstname>B.</firstname> <surname>Sayrac</surname></author>, and <author><firstname>M.</firstname> <surname>Schubert</surname></author>. <article-title>On the Need for a New Air Interface for 5G</article-title>, <source>IEEE COMSOC MMTC E-Letter</source>, <volumenum>Vol. 9</volumenum>, <issue>No. 5</issue>, <month>September</month> <year>2014</year>, <ulink url="http://www.comsoc.org/mmc">http://www.comsoc.org/mmc</ulink> <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=On+the+Need+for+a+New+Air+Interface+for+5G+IEEE+COMSOC+MMTC+E-Letter+2014" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-4">[4] <author><surname>Wemme</surname>, <firstname>L.</firstname></author>, &#x201C;<article-title>NFC: Global Promise and Progress</article-title>&#x201D;, NFC Forum, <day>22</day>.<month>01</month>.<year>2014</year>, online at <ulink url="http://nfc-forum.org/wp-content/uploads/2014/01/Omnicard_Wemme_2014_website.pdf">http://nfc-forum.org/wp-content/uploads/2014/01/Omnicard_Wemme_2014_website.pdf</ulink> <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=NFC%3A+Global+Promise+and+Progress+2014" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-5">[5] <collab>Bluetooth Special Interest Group</collab>, online at <ulink url="https://www.bluetooth.org/en-us/members/about-sig">https://www.bluetooth.org/en-us/members/about-sig</ulink></bibliomixed>
<bibliomixed id="B3-6">[6] <collab>Bluetooth Developer Portal</collab>, online at <ulink url="https://developer.bluetooth.org/Pages/default.aspx">https://developer.bluetooth.org/Pages/default.aspx</ulink></bibliomixed>
<bibliomixed id="B3-7">[7] <collab>Bluetooth</collab>, online at <ulink url="http://www.bluetooth.com">http://www.bluetooth.com</ulink></bibliomixed>
<bibliomixed id="B3-8">[8] <collab>ANT+</collab>, online at <ulink url="http://www.thisisant.com/">http://www.thisisant.com/</ulink></bibliomixed>
<bibliomixed id="B3-9">[9] <collab>ANT</collab>, &#x201C;<article-title>Message Protocol and Usage rev.5.0</article-title>&#x201D;, online at <ulink url="http://www.thisisant.com/developer/resources/downloads#documents_tab">http://www.thisisant.com/developer/resources/downloads#documents_tab</ulink> <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Message+Protocol+and+Usage+rev%2E5%2E0+2014" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-10">[10] <collab>ANT</collab>, &#x201C;<article-title>FIT2 Fitness Module Datasheet</article-title>&#x201D;, online at <ulink url="http://www.thisisant.com/developer/resources/downloads#documents_tab">http://www.thisisant.com/developer/resources/downloads#documents_tab</ulink></bibliomixed>
<bibliomixed id="B3-11">[11] <collab>Wi-Fi Alliance</collab>, online at <ulink url="http://www.wi-fi.org/">http://www.wi-fi.org/</ulink></bibliomixed>
<bibliomixed id="B3-12">[12] <collab>Z-Wave alliance</collab>, online at <ulink url="http://www.z-wavealliance.org">http://www.z-wavealliance.org</ulink></bibliomixed>
<bibliomixed id="B3-13">[13] <author><surname>P&#x00E4;tz</surname>, <firstname>C.</firstname></author>, &#x201C;<article-title>Smart lighting. How to develop Z-Wave Devices</article-title>&#x201D;, EE|Times europe LEDLighting, <day>04</day>.<month>10</month>.<year>2012</year>, online at <ulink url="http://www.ledlighting-eetimes.com/en/how-to-develop-z-wave-devices.html?cmp_id=71&#x0026;news_id=222908151">http://www.ledlighting-eetimes.com/en/how-to-develop-z-wave-devices.html?cmp_id=71&#x0026;news_id=222908151</ulink> <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Smart+lighting%2E+How+to+develop+Z-Wave+Devices+2012" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-14">[14] <collab>KNX</collab>, online at <ulink url="http://www.knx.org/knx-en/knx/association">http://www.knx.org/knx-en/knx/association</ulink></bibliomixed>
<bibliomixed id="B3-15">[15] <collab>European Editors</collab>, &#x201C;<article-title>Using Ultra-Low-Power Sub-GHz Wireless for Self-Powered Smart-Home Networks</article-title>&#x201D;, <day>12</day>.<month>05</month>.<year>2013</year>, online at <ulink url="http://www.digikey.com/en-US/articles/techzone/2013/dec/using-ultra-low-power-sub-ghz-wireless-for-self-powered-smart-home-networks">http://www.digikey.com/en-US/articles/techzone/2013/dec/using-ultra-low-power-sub-ghz-wireless-for-self-powered-smart-home-networks</ulink> <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Using+Ultra-Low-Power+Sub-GHz+Wireless+for+Self-Powered+Smart-Home+Networks+2013" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-16">[16] <collab>HART Communication Foundation</collab>, online at <ulink url="http://www.hart comm.org">http://www.hart comm.org</ulink></bibliomixed>
<bibliomixed id="B3-17">[17] <collab>Mouser Electronics</collab>, &#x201C;<article-title>Wireless Mesh Networking &#x2013; Featured Wireless Mesh Networking Protocols</article-title>&#x201D;, online at <ulink url="http://no.mouser.com/applica tions/wireless_mesh_networking_protocols/">http://no.mouser.com/applica tions/wireless_mesh_networking_protocols/</ulink> <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Wireless+Mesh+Networking+-+Featured+Wireless+Mesh+Networking+Protocols+2013" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-18">[18] <collab>IETF</collab>, online at <ulink url="https://www.ietf.org">https://www.ietf.org</ulink></bibliomixed>
<bibliomixed id="B3-19">[19] <author><surname>Bormann</surname>, <firstname>C.</firstname></author>, &#x201C;<article-title>6LoWPAN Roadmap and Implementation Guide</article-title>&#x201D;, 6LoWPAN Working Group, <month>April</month> <year>2013</year>, <ulink url="http://tools.ietf.org/html/draft-bormann-6lowpan-roadmap-04">http://tools.ietf.org/html/draft-bormann-6lowpan-roadmap-04</ulink> <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=6LoWPAN+Roadmap+and+Implementation+Guide+2013" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-20">[20] <author><surname>Shelby</surname>, <firstname>Z.</firstname></author> and <author><surname>Bormann</surname>, <firstname>C.</firstname></author>, &#x201C;<article-title>6LoWPAN: The Wireless Embedded Internet</article-title>&#x201D;, <publisher-name>Wiley</publisher-name>, <publisher-loc>Great Britain</publisher-loc>, ISBN 9780470747995, <year>2009</year>, online at <ulink url="http://elektro.upi.edu/pustaka.elektro/Wireless%20Sensor%20Net work/6LoWPAN.pdf">http://elektro.upi.edu/pustaka.elektro/Wireless%20Sensor%20Net work/6LoWPAN.pdf</ulink> <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=6LoWPAN%3A+The+Wireless+Embedded+Internet+2009" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-21">[21] <collab>WiMAX Forum</collab>, online at <ulink url="http://www.wimaxforum.org">http://www.wimaxforum.org</ulink></bibliomixed>
<bibliomixed id="B3-22">[22] <author><firstname>A.</firstname> <surname>Passemard</surname></author>, &#x201C;<article-title>The Internet of Things Protocol stack &#x2013; from sensors to business value</article-title>&#x201D;, online at <ulink url="http://entrepreneurshiptalk.wordpress.com/2014/01/29/the-internet-of-thing-protocol-stack-from-sensors-to-business-value/">http://entrepreneurshiptalk.wordpress.com/2014/01/29/the-internet-of-thing-protocol-stack-from-sensors-to-business-value/</ulink> <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=The+Internet+of+Things+Protocol+stack+-+from+sensors+to+business+value+2009" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-23">[23] <collab>EnOcean Alliance</collab>, online at <ulink url="http://www.enocean-alliance.org/en/profile/">http://www.enocean-alliance.org/en/profile/</ulink></bibliomixed>
<bibliomixed id="B3-24">[24] <collab>EnOcean Wireless Standard</collab>, online at <ulink url="http://www.enocean.com">http://www.enocean.com</ulink></bibliomixed>
<bibliomixed id="B3-25">[25] <collab>EnOcean Alliance</collab>, &#x201C;<article-title>EnOcean Equipment Profiles (EEP)</article-title>&#x201D;, Ver. 2.6, <month>December</month> <year>2013</year>, online at <ulink url="http://www.enocean.com/en/home/">http://www.enocean.com/en/home/</ulink> <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=EnOcean+Equipment+Profiles+%28EEP%29+2013" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-26">[26] <collab>DASH7 Alliance</collab>, online at <ulink url="http://www.dash7.org">http://www.dash7.org</ulink></bibliomixed>
<bibliomixed id="B3-27">[27] <author><firstname>Maarten</firstname> <surname>Weyn</surname></author>, &#x201C;<article-title>Dash7 Alliance Protocol Technical Presentation</article-title>&#x201D;, <month>December</month> <year>2013</year>, online at <ulink url="http://www.slideshare.net/MaartenWeyn1/dash7-alliance-protocol-technical-presentation">http://www.slideshare.net/MaartenWeyn1/dash7-alliance-protocol-technical-presentation</ulink> <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Dash7+Alliance+Protocol+Technical+Presentation+2013" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-28">[28] <collab>Visible Assets, Inc</collab>., &#x201C;<article-title>Rubee Technology</article-title>&#x201D;, online at <ulink url="http://www.rubee.com/Techno/index.html">http://www.rubee.com/Techno/index.html</ulink> <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Rubee+Technology+2013" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-29">[29] <author><surname>Stevens</surname>, <firstname>J.</firstname></author>, <author><surname>Weich</surname>, <firstname>C.</firstname></author>, <author><surname>GilChrist</surname>, <firstname>R.</firstname></author>, &#x201C;<article-title>RuBee (IEEE 1902.1) &#x2013; The Physics Behind, Real-Time, High Security Wireless Asset Visibility Networks in Harsh Environments</article-title>&#x201D;, online at <ulink url="http://www.rubee.com/White-SEC/RuBee-Security-080610.pdf">http://www.rubee.com/White-SEC/RuBee-Security-080610.pdf</ulink> <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=RuBee+%28IEEE+1902%2E1%29+-+The+Physics+Behind%2C+Real-Time%2C+High+Security+Wireless+Asset+Visibility+Networks+in+Harsh+Environments+2013" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-30">[30] <collab>RuBee Hardware</collab>, online at <ulink url="http://www.rubee.com/page2/Hard/index.html">http://www.rubee.com/page2/Hard/index.html</ulink></bibliomixed>
<bibliomixed id="B3-31">[31] <author><surname>Foster</surname>, <firstname>A.</firstname></author>, &#x201C;<article-title>A Comparison Between DDS, AMQP, MQTT, JMS, REST and CoAP</article-title>&#x201D;, Version 1.4, <month>January</month> <year>2014</year>, online at <ulink url="http://www.prismtech.com/sites/default/files/documents/MessagingComparsionJan2014USROW_vfinal.pdf">http://www.prismtech.com/sites/default/files/documents/MessagingComparsionJan2014USROW_vfinal.pdf</ulink> <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=A+Comparison+Between+DDS%2C+AMQP%2C+MQTT%2C+JMS%2C+REST+and+CoAP+2014" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-32">[32] <author><surname>Elkstein</surname>, <firstname>M.</firstname></author>, &#x201C;<article-title>Learn REST: A tutorial</article-title>&#x201D;, online at <ulink url="http://rest.elkstein.org">http://rest.elkstein.org</ulink> <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Learn+REST%3A+A+tutorial+2014" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-33">[33] <author><surname>Jaffey</surname>, <firstname>T.</firstname></author>, &#x201C;<article-title>MQTT and CoAP IoT Protocols.pdf</article-title>&#x201D;, <month>September</month> <year>2013</year>, online at <ulink url="https://docs.google.com/document/d/1_kTNkl84o_yoC56dz FfkYHoHuepINP3nDNokycXINXI/edit?usp=sharing&#x0026;pli=1">https://docs.google.com/document/d/1_kTNkl84o_yoC56dz FfkYHoHuepINP3nDNokycXINXI/edit?usp=sharing&#x0026;pli=1</ulink></bibliomixed>
<bibliomixed id="B3-34">[34] <author><surname>Puzanov</surname>, <firstname>O.</firstname></author>, &#x201C;<article-title>IoT Protocol Wars: MQTT vs COAP vs XMPP</article-title>&#x201D;, online at <ulink url="http://www.iotprimer.com/2013/11/iot-protocol-wars-mqtt-vscoap-vs-xmpp.html">http://www.iotprimer.com/2013/11/iot-protocol-wars-mqtt-vscoap-vs-xmpp.html</ulink> <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=IoT+Protocol+Wars%3A+MQTT+vs+COAP+vs+XMPP+2013" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-35">[35] <collab>Home Gateway Initiative (HGI)</collab>, online at <ulink url="http://www.homegatewayinitiativ e.org">www.homegatewayinitiativ e.org</ulink></bibliomixed>
<bibliomixed id="B3-36">[36] <collab>Artemis IoE project</collab>, online at <ulink url="http://www.artemis-ioe.eu">www.artemis-ioe.eu</ulink></bibliomixed>
<bibliomixed id="B3-37">[37] <collab>Casaleggio Associati</collab>, &#x201C;<article-title>The Evolution of Internet of Things</article-title>&#x201D;, <month>February</month> <year>2011</year>, online at <ulink url="http://www.casaleggio.it/pubblicazioni/Focus_internet_of_things_v1.81%20-%20eng.pdf">http://www.casaleggio.it/pubblicazioni/Focus_internet_of_things_v1.81%20-%20eng.pdf</ulink> <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=The+Evolution+of+Internet+of+Things+2011" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-38">[38] <author><firstname>J. B.</firstname>, <surname>Kennedy</surname></author>, &#x201C;<article-title>When woman is boss, An interview with Nikola Tesla</article-title>&#x201D;, in Colliers, <month>January</month> <day>30</day>, <year>1926</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=When+woman+is+boss%2C+An+interview+with+Nikola+Tesla+1926" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-39">[39] <author><firstname>M.</firstname> <surname>Weiser</surname></author>, &#x201C;<article-title>The Computer for the 21st Century,</article-title>&#x201D; <source>Scientific Am.</source>, <month>Sept.</month>, <year>1991</year>, pp. <fpage>94</fpage>&#x2013;<lpage>104</lpage>; reprinted in <source>IEEE Pervasive Computing</source>, <month>Jan.&#x2013;Mar</month>. <year>2002</year>, pp. <fpage>19</fpage>&#x2013;<lpage>25</lpage>.&#x201D; <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=The+Computer+for+the+21st+Century%2C+Scientific+Am%2E%2C+Sept%2E%2C+1991%2C+pp%2E+94-104%3B+reprinted+in++IEEE+Pervasive+Computing+1991" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-40">[40] <author><firstname>K.</firstname> <surname>Ashton</surname></author>, &#x201C;<article-title>That &#x2018;Internet of Things&#x2019; Thing</article-title>&#x201D;, online at <ulink url="http://www.rfid journal.com/article/view/4986">http://www.rfid journal.com/article/view/4986</ulink>, <month>June</month> <year>2009</year> <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=That+%27Internet+of+Things%27+Thing+2009" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-41">[41] <author><firstname>N.</firstname> <surname>Gershenfeld</surname></author>, &#x201C;<article-title>When Things Start to Think</article-title>&#x201D;, <publisher-name>Holt Paperbacks</publisher-name>, <publisher-loc>New York</publisher-loc>, <year>2000</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=When+Things+Start+to+Think+2000" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-42">[42] <collab>Raymond James &#x0026; Associates</collab>, &#x201C;<article-title>The Internet of Things &#x2013; A Study in Hype, Reality, Disruption, and Growth</article-title>&#x201D;, online at <ulink url="http://sitic.org/wp-content/uploads/The-Internet-of-Things-A-Study-in-Hype-Reality-Disruption-and-Growth.pdf">http://sitic.org/wp-content/uploads/The-Internet-of-Things-A-Study-in-Hype-Reality-Disruption-and-Growth.pdf</ulink>, <month>January</month> <year>2014</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=The+Internet+of+Things+-+A+Study+in+Hype%2C+Reality%2C+Disruption%2C+and+Growth+2014" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-43">[43] <author><firstname>N.</firstname> <surname>Gershenfeld</surname></author>, <author><firstname>R.</firstname> <surname>Krikorian</surname></author> and <author><firstname>D.</firstname> <surname>Cohen</surname></author>, <source>Scientific Am.</source>, <month>Sept.</month>, <year>2004</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Scientific+Am%2E+2004" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-44">[44] <collab>World Economic Forum</collab>, &#x201C;<article-title>The Global Information Technology Report 2012 &#x2013; Living in a Hyperconnected World</article-title>&#x201D; online at <ulink url="http://www3.weforum.org/docs/Global_IT_Report_2012.pdf">http://www3.weforum.org/docs/Global_IT_Report_2012.pdf</ulink> <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=The+Global+Information+Technology+Report+2012+-+Living+in+a+Hyperconnected+World+2004" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-45">[45] &#x201C;<article-title>Key Enabling Technologies</article-title>&#x201D;, Final Report of the HLG-KET, <month>June</month> <year>2011</year>.  <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Key+Enabling+Technologies+2011" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-46">[46] <author><firstname>G.</firstname> <surname>Bovet</surname></author>, <author><firstname>A.</firstname> <surname>Ridi</surname></author> and <author><firstname>J.</firstname> <surname>Hennebert</surname></author>, &#x201C;<article-title>Toward Web Enhanced Building Automation System</article-title>&#x201D;, in <role>Eds.</role> <author><firstname>N.</firstname> <surname>Bessis</surname></author> and <author><firstname>C.</firstname> <surname>Dobre</surname></author> &#x2013; Big Data and Internet of Things: A Roadmap for Smart Environments, ISBN: 978-3-319-05028-7, Studies in Computational Intelligence, <volumenum>Volume 546</volumenum>, <year>2014</year> pp. <fpage>259</fpage>&#x2013;<lpage>283</lpage>, online at <ulink url="http://hal.archives-ouv ertes.fr/docs/00/97/35/10/PDF/BuildingsWoT.pdf">http://hal.archives-ouv ertes.fr/docs/00/97/35/10/PDF/BuildingsWoT.pdf</ulink> <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Toward+Web+Enhanced+Building+Automation+System+2014+259-283" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-47">[47] <collab>International Technology Roadmap for Semiconductors</collab>, ITRS <year>2012</year> Update, online at <ulink url="http://www.itrs.net/Links/2012ITRS/2012Chapters/2012Overview.pdf">http://www.itrs.net/Links/2012ITRS/2012Chapters/2012Overview.pdf</ulink></bibliomixed>
<bibliomixed id="B3-48">[48] <author><firstname>W.</firstname> <surname>Arden</surname></author>, <author><firstname>M.</firstname> <surname>Brillou&#x00EB;t</surname></author>, <author><firstname>P.</firstname> <surname>Cogez</surname></author>, <author><firstname>M.</firstname> <surname>Graef</surname></author>, et al., &#x201C;<article-title>More than Moore</article-title>&#x201D; White Paper, online at <ulink url="http://www.itrs.net/Links/2010ITRS/IRC-ITRS-MtM-v2%203.pdf">http://www.itrs.net/Links/2010ITRS/IRC-ITRS-MtM-v2%203.pdf</ulink> <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=More+than+Moore+2012" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-49">[49] <author><surname>Frost</surname></author> &#x0026; <author><surname>Sullivan</surname></author> &#x201C;<article-title>Mega Trends: Smart is the New Green</article-title>&#x201D; online at <ulink url="http://www.frost.com/prod/servlet/our-services-page.pag?mode=open&#x0026;sid=230169625">http://www.frost.com/prod/servlet/our-services-page.pag?mode=open&#x0026;sid=230169625</ulink> <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Mega+Trends%3A+Smart+is+the+New+Green+2012" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-50">[50] <author><firstname>O.</firstname> <surname>Vermesan</surname></author>. <article-title>The IoT: a concept, a paradigm, and an open global network</article-title>. <source>Telit2market International</source>, Issue <issue>10</issue>, <month>February</month> <year>2015</year>, pp. <fpage>120</fpage>&#x2013;<lpage>122</lpage>, online at <ulink url="http://www.telit2market.com/wp-content/uploads/2015/02/telit2market_10_15_anniversary_edition.pdf">http://www.telit2market.com/wp-content/uploads/2015/02/telit2market_10_15_anniversary_edition.pdf</ulink>, Accessed <day>29</day> <month>May</month> <year>2015</year>.</bibliomixed>
<bibliomixed id="B3-51">[51] <collab>Market research group Canalys</collab>, online at <ulink url="http://www.canalys.com/">http://www.canalys.com/</ulink></bibliomixed>
<bibliomixed id="B3-52">[52] <author><firstname>E.</firstname> <surname>Savitz</surname></author>, &#x201C;<article-title>Gartner: 10 Critical Tech Trends For The Next Five Years</article-title>&#x201D; online at <ulink url="http://www.forbes.com/sites/ericsavitz/2012/10/22/gartner-10-critical-tech-trends-for-the-next-five-years/">http://www.forbes.com/sites/ericsavitz/2012/10/22/gartner-10-critical-tech-trends-for-the-next-five-years/</ulink> <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Gartner%3A+10+Critical+Tech+Trends+For+The+Next+Five+Years+2015" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-53">[53] <author><firstname>E.</firstname> <surname>Savitz</surname></author>, &#x201C;<article-title>Gartner: Top 10 Strategic Technology Trends For 2013</article-title>&#x201D; online at <ulink url="http://www.forbes.com/sites/ericsavitz/2012/10/23/gartner-top-10-strategic-technology-trends-for-2013/">http://www.forbes.com/sites/ericsavitz/2012/10/23/gartner-top-10-strategic-technology-trends-for-2013/</ulink> <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Gartner%3A+Top+10+Strategic+Technology+Trends+For+2013+2015" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-54">[54] <author><firstname>P.</firstname> <surname>High</surname></author> &#x201C;<article-title>Gartner: Top 10 Strategic Technology Trends For 2014</article-title>&#x201D; online at <ulink url="http://www.forbes.com/sites/peterhigh/2013/10/14/gartner-top-10-strategic-technology-trends-for-2014/#">http://www.forbes.com/sites/peterhigh/2013/10/14/gartner-top-10-strategic-technology-trends-for-2014/#</ulink> <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Gartner%3A+Top+10+Strategic+Technology+Trends+For+2014+2015" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-55">[55] <collab>Gartner&#x2019;s Top 10 Strategic Technology Trends for 2015</collab>, online at <ulink url="http://www.gartner.com/smarterwithgartner/gartners-top-10-strateg ic-technology-trends-for-2015/">http://www.gartner.com/smarterwithgartner/gartners-top-10-strateg ic-technology-trends-for-2015/</ulink></bibliomixed>
<bibliomixed id="B3-56">[56] <collab>Platform INDUSTRIE 4.0 &#x2013; Recommendations for implementing the strategic initiative INDUSTRIE 4.0, Final report of the Industrie 4.0 Working Group</collab>, online at, <ulink url="http://www.acatech.de/fileadmin/user_upload/Baumstruktur_nach_Website/Acatech/root/de/Material_fuer_Sonderseiten/Industrie_4.0/Final_report__Industrie_4.0_accessible.pdf">http://www.acatech.de/fileadmin/user_upload/Baumstruktur_nach_Website/<br/>Acatech/root/de/Material_fuer_Sonderseiten/Industrie_4.0/Final_report__Industrie_4.0_accessible.pdf</ulink>, <year>2013</year></bibliomixed>
<bibliomixed id="B3-57">[57] <collab>Industrial Internet of Things (IoT) Advisory Service, ARC Advisory Group</collab>, online at, <ulink url="http://www.arcweb.com/services/pages/industrial-internet-of-things-service.aspx">http://www.arcweb.com/services/pages/industrial-internet-of-things-service.aspx</ulink></bibliomixed>
<bibliomixed id="B3-58">[58] <collab>rtSOA &#x2013; A Data Driven, Real Time Service Oriented Architecture for Industrial Manufacturing</collab>, online at <ulink url="http://www-db.in.tum.de/research/projects/rtSOA/">http://www-db.in.tum.de/research/projects/rtSOA/</ulink></bibliomixed>
<bibliomixed id="B3-59">[59] <author><firstname>P. C.</firstname> <surname>Evans</surname></author> and <author><firstname>M.</firstname> <surname>Annunziata</surname></author>, <article-title>Industrial Internet: Pushing the Boundaries of Minds and Machines, General Electric Co</article-title>., online at <ulink url="http://files.gereports.com/wp-content/uploads/2012/11/ge-industrial-internet-vision-paper.pdf">http://files.gereports.com/wp-content/uploads/2012/11/ge-industrial-internet-vision-paper.pdf</ulink> <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Industrial+Internet%3A+Pushing+the+Boundaries+of+Minds+and+Machines%2C+General+Electric+Co+2013" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-60">[60] <author><surname>Cisco</surname></author>, &#x201C;<article-title>Securely Integrating the Cyber and Physical Worlds</article-title>&#x201D;, online at <ulink url="http://www.cisco.com/web/solutions/trends/tech-radar/securing-the-iot.html">http://www.cisco.com/web/solutions/trends/tech-radar/securing-the-iot.html</ulink> <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Securely+Integrating+the+Cyber+and+Physical+Worlds+2013" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-61">[61] <collab>NXT Cities</collab>, online at <ulink url="http://www.communicasia.com/wp-content/themes/cmma2014/images/img-nxtcities-large.jpg">http://www.communicasia.com/wp-content/themes/cmma2014/images/img-nxtcities-large.jpg</ulink></bibliomixed>
<bibliomixed id="B3-62">[62] <collab>NXT Enterprises</collab>, online at <ulink url="http://www.communicasia.com/wp-content/themes/cmma2014/images/img-nxtenterprise-large.jpg">http://www.communicasia.com/wp-content/themes/cmma2014/images/img-nxtenterprise-large.jpg</ulink></bibliomixed>
<bibliomixed id="B3-63">[63] <collab>NXT Connect</collab>, online at <ulink url="http://www.communicasia.com/wp-content/themes/cmma2014/images/img-nxtconnect-large.jpg">http://www.communicasia.com/wp-content/themes/cmma2014/images/img-nxtconnect-large.jpg</ulink></bibliomixed>
<bibliomixed id="B3-64">[64] <author><firstname>H.</firstname> <surname>Bauer</surname></author>, <author><firstname>F.</firstname> <surname>Grawert</surname></author>, and <author><firstname>S.</firstname> <surname>Schink</surname></author>, <article-title>Semiconductors for wireless communications: Growth engine of the industry</article-title>, online at <ulink url="http://www.mckinsey.com/">www.mckinsey.com/</ulink> <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Semiconductors+for+wireless+communications%3A+Growth+engine+of+the+industry+2013" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-65">[65] <author><firstname>L.</firstname> <surname>Fretwell</surname></author> and <author><firstname>P.</firstname> <surname>Schottmiller</surname></author>, Cisco Presentation, online at <ulink url="http://www.cisco.com/assets/events/i/nrf-Internet_of_Everything_Whats_the_Art_of_the_Possible_in_Retail.pdf">http://www.cisco.com/assets/events/i/nrf-Internet_of_Everything_Whats_the_Art_of_the_Possible_in_Retail.pdf</ulink>, <month>January</month> <year>2014</year>.</bibliomixed>
<bibliomixed id="B3-66">[66] <collab>ITU-T, Internet of Things Global Standards Initiative</collab>, <ulink url="http://www.itu.int/en/ITU-T/gsi/iot/Pages/default.aspx">http://www.itu.int/en/ITU-T/gsi/iot/Pages/default.aspx</ulink></bibliomixed>
<bibliomixed id="B3-67">[67] <collab>International Telecommunication Union &#x2013; ITU-TY.2060 &#x2013; (06/2012) &#x2013; Next Generation Networks &#x2013; Frameworks and functional architecture models &#x2013; Overview of the Internet of things.</collab></bibliomixed>
<bibliomixed id="B3-68">[68] <collab>IEEE-SA &#x2013; Enabling Consumer Connectivity Through Consensus Building</collab>, online at <ulink url="http://standardsinsight.com/ieee_company_detail/consensus-building">http://standardsinsight.com/ieee_company_detail/consensus-building</ulink></bibliomixed>
<bibliomixed id="B3-69">[69] <collab>Mobile-Edge Computing &#x2013; Introductory Technical White Paper</collab>, <year>2014</year>, online at <ulink url="https://portal.etsi.org/Portals/0/TBpages/MEC/Docs/Mobile- edge_Computing_-_Introductory_Technical_White_Paper_V1%2018-0 9-14.pdf">https://portal.etsi.org/Portals/0/TBpages/MEC/Docs/Mobile- edge_Computing_-_Introductory_Technical_White_Paper_V1%2018-0 9-14.pdf</ulink></bibliomixed>
<bibliomixed id="B3-70">[70] <author><firstname>O.</firstname> <surname>Vermesan</surname></author>, <author><firstname>P.</firstname> <surname>Friess</surname></author>, <author><firstname>P.</firstname> <surname>Guillemin</surname></author>, <author><firstname>S.</firstname> <surname>Gusmeroli</surname></author>, et al., &#x201C;<article-title>Internet of Things Strategic Research Agenda</article-title>&#x201D;, <link linkend="ch02">Chapter <xref linkend="ch02" remap="2"/></link> in Internet of Things &#x2013; Global Technological and Societal Trends, <publisher-name>River Publishers</publisher-name>, <year>2011</year>, ISBN 978-87-92329-67-7. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Internet+of+Things+Strategic+Research+Agenda+2011" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-71">[71] <author><firstname>O.</firstname> <surname>Vermesan</surname></author>, <author><firstname>P.</firstname> <surname>Friess</surname></author>, <author><firstname>P.</firstname> <surname>Guillemin</surname></author>, <author><firstname>H.</firstname> <surname>Sundmaeker</surname></author>, et al., &#x201C;<article-title>Internet of Things Strategic Research and Innovation Agenda</article-title>&#x201D;, <link linkend="ch02">Chapter <xref linkend="ch02" remap="2"/></link> in Internet of Things &#x2013; Converging Technologies for Smart Environments and Integrated Ecosystems, <publisher-name>River Publishers</publisher-name>, <year>2013</year>, ISBN 978-87-92982-73-5. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Internet+of+Things+Strategic+Research+and+Innovation+Agenda+2013" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-72">[72] <author><firstname>O.</firstname> <surname>Vermesan</surname></author>, <author><firstname>P.</firstname> <surname>Friess</surname></author>, <author><firstname>P.</firstname> <surname>Guillemin</surname></author>, <author><firstname>H.</firstname> <surname>Sundmaeker</surname></author>, et al. Internet of Things Strategic Research and Innovation Agenda. <author><firstname>O.</firstname> <surname>Vermesan</surname></author> and <author><firstname>P.</firstname> <surname>Friess</surname></author>, <role>Eds.</role> <source>Internet of Things Applications &#x2013; From Research and Innovation to Market Deployment</source>. <publisher-loc>Alborg, Denmark</publisher-loc>: <publisher-name>The River Publishers</publisher-name>, ISBN: 978-87-93102-94-1, <year>2014</year>, pp. <fpage>7</fpage>&#x2013;<lpage>142</lpage>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Internet+of+Things+Applications+-+From+Research+and+Innovation+to+Market+Deployment+2014+7-142" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-73">[73] <author><firstname>M.</firstname> <surname>Abu-Elkheir</surname></author>, <author><firstname>M.</firstname> <surname>Hayajneh</surname></author> and <author><firstname>N.</firstname> <surname>Abu Ali</surname></author>. <article-title>Data Management for the Internet of Things: Design Primitives and Solution</article-title>. <source>Sensors</source>, <volumenum>13</volumenum>(<issue>11</issue>): 15582&#x2013;15612, <year>2013</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Data+Management+for+the+Internet+of+Things%3A+Design+Primitives+and+Solution+Sensors+2013+11" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-74">[74] <collab>SmartSantander, EU FP7 project, Future Internet Research and Experimentation</collab>, online at <ulink url="http://www.smartsantander.eu/">http://www.smartsantander.eu/</ulink></bibliomixed>
<bibliomixed id="B3-75">[75] <collab>Introducing Fujisawa SST &#x2013; A town sustainably evolving through living ideas, Panasonic</collab>, online at <ulink url="http://panasonic.net/es/fujisawasst/">http://panasonic.net/es/fujisawasst/</ulink></bibliomixed>
<bibliomixed id="B3-76">[76] <collab>Foundational Solution of Smart City</collab>, online at <ulink url="http://br.fiberhomegrou p.com/pt/Enterprise/324/2282.aspx#1">http://br.fiberhomegrou p.com/pt/Enterprise/324/2282.aspx#1</ulink></bibliomixed>
<bibliomixed id="B3-77">[77] <collab>ISO 9646</collab>: &#x201C;<article-title>Conformance Testing Methodology and Framework</article-title>&#x201D;. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Conformance+Testing+Methodology+and+Framework+2013" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-78">[78] <author><firstname>J.</firstname> <surname>Bloem</surname></author>. <article-title>InterOperability Testing in the Age of Cloud, Things and DevOps</article-title>, online at <ulink url="https://www.sogeti.nl/updates/blogs/interoperabilit y-testing-age-cloud-things-and-devops">https://www.sogeti.nl/updates/blogs/interoperabilit y-testing-age-cloud-things-and-devops</ulink> <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=InterOperability+Testing+in+the+Age+of+Cloud%2C+Things+and+DevOps+2013" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-79">[79] <collab>Internet of Things Concept</collab>, online at <ulink url="http://xarxamobal.diba.cat/XGM SV/imatges/actualitat/iot.jpg">http://xarxamobal.diba.cat/XGM SV/imatges/actualitat/iot.jpg</ulink></bibliomixed>
<bibliomixed id="B3-80">[80] <author><firstname>H.</firstname> <surname>Grindvoll</surname></author>, <author><firstname>O.</firstname> <surname>Vermesan</surname></author>, <author><firstname>T.</firstname> <surname>Crosbie</surname></author>, <author><firstname>R.</firstname> <surname>Bahr</surname></author>, et al., &#x201C;<article-title>A wireless sensor network for intelligent building energy management based on multi communication standards &#x2013; a case study</article-title>&#x201D;, ITcon <volumenum>Vol. 17</volumenum>, pg. <fpage>43</fpage>&#x2013;<lpage>62</lpage>, <ulink url="http://www.itcon.org/2012/3">http://www.itcon.org/2012/3</ulink> <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=A+wireless+sensor+network+for+intelligent+building+energy+management+based+on+multi+communication+standards+-+a+case+study+2013+43-62" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-81">[81] <author><firstname>S.</firstname> <surname>Toronidis</surname></author>. <article-title>Better Operations, Better Operating Rooms</article-title>, online at <ulink url="http://www.centrak.com/blog.aspx">http://www.centrak.com/blog.aspx</ulink> <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Better+Operations%2C+Better+Operating+Rooms+2013" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-82">[82] <collab>EU Research &#x0026; Innovation</collab>, &#x201C;<article-title>Horizon 2020</article-title>&#x201D;, The Framework Programme for Research and Innovation, online at <ulink url="http://ec.europa.eu/research/horizon2020/index_en.cfm">http://ec.europa.eu/research/horizon2020/index_en.cfm</ulink> <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Horizon+2020+2013" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-83">[83] <collab>Digital Agenda for Europe, European Commission, Digital Agenda 2010&#x2013;2020 for Europe</collab>, online at <ulink url="http://ec.europa.eu/information_socie ty/digital-agenda/index_en.htm">http://ec.europa.eu/information_socie ty/digital-agenda/index_en.htm</ulink></bibliomixed>
<bibliomixed id="B3-84">[84] <collab>Gartner</collab>, <year>2013</year>, online at <ulink url="http://www.gartner.com/newsroom/id/2636073">http://www.gartner.com/newsroom/id/2636073</ulink></bibliomixed>
<bibliomixed id="B3-85">[85] <collab>Beecham Research Limited. Towards Smart Farming: Agriculture Embracing the IoT Vision</collab>, online at <ulink url="http://www.beechamresearch.com/download.aspx?id=40">http://www.beechamresearch.com/download.aspx?id=40</ulink></bibliomixed>
<bibliomixed id="B3-86">[86] <author><firstname>E.</firstname> <surname>Guizzo</surname></author>. <collab>How Google&#x2019;s Self-Driving Car Works. IEEE Spectrum</collab>, online at <ulink url="http://spectrum.ieee.org/automaton/robotics/artificial-intelligence/how-google-self-driving-car-works">http://spectrum.ieee.org/automaton/robotics/artificial-intelligence/how-google-self-driving-car-works</ulink></bibliomixed>
<bibliomixed id="B3-87">[87] <author><firstname>K.</firstname> <surname>Karimi</surname></author> and <author><firstname>G.</firstname> <surname>Atkinson</surname></author>, &#x201C;<article-title>What the Internet of Things (IoT) Needs to Become a Reality</article-title>&#x201D;, White Paper, <year>2013</year>, online at <ulink url="http://www.freescale.com/files/32bit/doc/white_paper/INTOTHNGSWP.pdf">http://www.freescale.com/files/32bit/doc/white_paper/INTOTHNGSWP.pdf</ulink> <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=What+the+Internet+of+Things+%28IoT%29+Needs+to+Become+a+Reality+2013" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-88">[88] <collab>Freescale vision chip makes self-driving cars a bit more ordinary</collab>, online at <ulink url="http://www.cnet.com/news/freescale-vision-chip-makes-self-driving-cars-a-bit-more-ordinary/">http://www.cnet.com/news/freescale-vision-chip-makes-self-driving-cars-a-bit-more-ordinary/</ulink></bibliomixed>
<bibliomixed id="B3-89">[89] <author><firstname>R.</firstname> <surname>E</surname></author>. Hall, &#x201C;<article-title>The Vision of A Smart City</article-title>&#x201D; presented at the 2<superscript>nd</superscript> International Life Extension Technology Workshop Paris, France <month>September</month> <day>28</day>, <year>2000</year>, online at <ulink url="http://www.crisismanagement.com.cn/templates/blue/down_list/llzt_zhcs/The%20Vision%20of%20A%20Smart%20City.pdf">http://www.crisismanagement.com.cn/templates/blue/down_list/llzt_zhcs/The%20Vision%20of%20A%20Smart%20City.pdf</ulink> <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=The+Vision+of+A+Smart+City+2000" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-90">[90] <collab>EU 2012. The ARTEMIS Embedded Computing Systems Initiative</collab>, <month>October</month> <year>2012</year> online at <ulink url="http://www.artemis-ju.eu/">http://www.artemis-ju.eu/</ulink></bibliomixed>
<bibliomixed id="B3-91">[91] <collab>Foundations for Innovation in Cyber-Physical Systems, Workshop Report, NIST</collab>, <year>2013</year>, online at <ulink url="http://www.nist.gov/el/upload/CPS-WorkshopReport-1-30-13-Final.pdf">http://www.nist.gov/el/upload/CPS-WorkshopReport-1-30-13-Final.pdf</ulink></bibliomixed>
<bibliomixed id="B3-92">[92] <collab>IERC &#x2013; European Research Cluster on the Internet of Things</collab>, &#x201C;<article-title>Internet of Things &#x2013; Pan European Research and Innovation Vision</article-title>&#x201D;, <month>October</month>, <year>2011</year>, online at, <ulink url="http://www.theinternetofthings.eu/sites/default/files/Rob%20van%20Kranenburg/IERC_IoT-Pan%20European%20Research%20and%20Innovation%20Vision_2011.pdf">http://www.theinternetofthings.eu/sites/default/files/Rob%20van%20Kranenburg/IERC_IoT-Pan%20European%20Research%20and%20Innovation%20Vision_2011.pdf</ulink> <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Internet+of+Things+-+Pan+European+Research+and+Innovation+Vision+2011" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-93">[93] <author><firstname>O.</firstname> <surname>Vermesan</surname></author>, <author><firstname>P.</firstname> <surname>Friess</surname></author>, <author><firstname>G.</firstname> <surname>Woysch</surname></author>, <author><firstname>P.</firstname> <surname>Guillemin</surname></author>, <author><firstname>S.</firstname> <surname>Gusmeroli</surname></author>, et al., &#x201C;<article-title>Europe&#x2019;s IoT Stategic Research Agenda 2012</article-title>&#x201D;, <link linkend="ch02">Chapter <xref linkend="ch02" remap="2"/></link> in The Internet of Things 2012 New Horizons, <publisher-loc>Halifax, UK</publisher-loc>, <year>2012</year>, ISBN 978-0-9553707-9-3. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Europe%27s+IoT+Stategic+Research+Agenda+2012+2012" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-94">[94] <collab>SENSEI, EU FP7 project</collab>, <source>D1.4: Business models and Value Creation</source>, <year>2010</year>, online at: <ulink url="http://www.ict-sensei.org">http://www.ict-sensei.org</ulink> <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=D1%2E4%3A+Business+models+and+Value+Creation+2010" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-95">[95] <collab>IoT-I, Internet of Things Initiative, FP7 EU project</collab>, online at <ulink url="http://www.iot-i.eu">http://www.iot-i.eu</ulink></bibliomixed>
<bibliomixed id="B3-96">[96] <collab>Libelium</collab>, &#x201C;<article-title>50 Sensor Applications for a Smarter World</article-title>&#x201D;, online at <ulink url="http://www.libelium.com/top_50_iot_sensor_applications_ranking#">http://www.libelium.com/top_50_iot_sensor_applications_ranking#</ulink> <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=50+Sensor+Applications+for+a+Smarter+World+2010" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-97">[97] <collab>OUTSMART, FP7 EU project, part of the Future Internet Private Public Partnership</collab>, &#x201C;<article-title>OUTSMART &#x2013; Provisioning of urban/regional smart services and business models enabled by the Future Internet</article-title>&#x201D;, online at <ulink url="http://www.fi-ppp-outsmart.eu/en-uk/Pages/default.aspx">http://www.fi-ppp-outsmart.eu/en-uk/Pages/default.aspx</ulink> <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=OUTSMART+-+Provisioning+of+urban%2Fregional+smart+services+and+business+models+enabled+by+the+Future+Internet+2010" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-98">[98] <collab>BUTLER, FP7 EU project</collab>, online at <ulink url="http://www.iot-butler.eu/">http://www.iot-butler.eu/</ulink></bibliomixed>
<bibliomixed id="B3-99">[99] <collab>NXP Semiconductors N.V.</collab>, &#x201C;<article-title>What&#x2019;s Next for Internet-Enabled Smart Lighting?</article-title>&#x201D;, online at <ulink url="http://www.nxp.com/news/press-releases/2012/05/whats-next-for-internet-enabled-smart-lighting.html">http://www.nxp.com/news/press-releases/2012/05/whats-next-for-internet-enabled-smart-lighting.html</ulink> <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=What%27s+Next+for+Internet-Enabled+Smart+Lighting%B4+2010" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-100">[100] <author><firstname>J.</firstname> <surname>Formo</surname></author>, <author><firstname>M.</firstname> <surname>G&#x00E5;rdman</surname></author>, and <author><firstname>J.</firstname> <surname>Laaksolahti</surname></author>, &#x201C;<article-title>Internet of things marries social media</article-title>&#x201D;, in <source>Proceedings of the 13th International Conference on MobileHCI</source>, ACM, <publisher-loc>New York, NY, USA</publisher-loc>, pp. <fpage>753</fpage>&#x2013;<lpage>755</lpage>, 2011. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Internet+of+things+marries+social+media+Proceedings+of+the+13th+International+Conference+on+MobileHCI+2010+753-755" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-101">[101] <author><firstname>J. G.</firstname> <surname>Breslin</surname></author>, <author><firstname>S.</firstname> <surname>Decker</surname></author>, and <author><firstname>M.</firstname> <surname>Hauswirth</surname></author>, et. al., &#x201C;<article-title>Integrating Social Networks and Sensor Networks</article-title>&#x201D;, <source>W3C Workshop on the Future of Social Networking</source>, <publisher-loc>Barcelona</publisher-loc>, <fpage>15</fpage>&#x2013;<lpage>16</lpage> <month>January</month> <year>2009</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Integrating+Social+Networks+and+Sensor+Networks+W3C+Workshop+on+the+Future+of+Social+Networking+2009+15-16" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-102">[102] <author><firstname>M.</firstname> <surname>Kirkpatrick</surname></author>, &#x201C;<article-title>The Era of Location-as-Platform Has Arrived</article-title>&#x201D;, <source>ReadWriteWeb</source>, <month>January</month> <day>25</day>, <year>2010</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=The+Era+of+Location-as-Platform+Has+Arrived+ReadWriteWeb+2010" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-103">[103] <author><firstname>F.</firstname> <surname>Calabrese</surname></author>, <author><firstname>K.</firstname> <surname>Kloeckl</surname></author>, and <author><firstname>C.</firstname> <surname>Ratti</surname></author> (MIT), &#x201C;<article-title>WikiCity: Real-Time Location-Sensitive tools for the city</article-title>&#x201D;, in <source>IEEE Pervasive Computing</source>, <month>July&#x2013;September</month> <year>2007</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=WikiCity%3A+Real-Time+Location-Sensitive+tools+for+the+city+IEEE+Pervasive+Computing+2007" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-104">[104] <collab>Building smart communities</collab>, online at <ulink url="http://www.holyroodconnect.com/tag/smart-cities/">http://www.holyroodconnect.com/tag/smart-cities/</ulink></bibliomixed>
<bibliomixed id="B3-105">[105] <collab>Using Big Data to Create Smart Cities</collab>, online at <ulink url="http://informationstr ategyrsm.wordpress.com/2013/10/12/using-big-data-to-create-smart-cities/">http://informationstr ategyrsm.wordpress.com/2013/10/12/using-big-data-to-create-smart-cities/</ulink></bibliomixed>
<bibliomixed id="B3-106">[106] <author><firstname>N.</firstname> <surname>Maisonneuve</surname></author>, <author><firstname>M.</firstname> <surname>Stevens</surname></author>, <author><firstname>M. E.</firstname> <surname>Niessen</surname></author>, <author><firstname>L.</firstname> <surname>Steels</surname></author>, &#x201C;<article-title>NoiseTube: Measuring and mapping noise pollution with mobile phones</article-title>&#x201D;, in <source>Information Technologies in Environmental Engineering (ITEE 2009)</source>, Proceedings of the 4th International ICSC SymposiumThessaloniki, <publisher-loc>Greece</publisher-loc>, <month>May</month> <day>28&#x2013;29</day>, <year>2009</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=NoiseTube%3A+Measuring+and+mapping+noise+pollution+with+mobile+phones+Information+Technologies+in+Environmental+Engineering+%28ITEE+2009%29+2009" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-107">[107] <author><firstname>J-S.</firstname> <surname>Lee</surname></author>, <author><firstname>B.</firstname> <surname>Hoh</surname></author>, &#x201C;<article-title>Sell your experiences: a market mechanism based incentive for participatory sensing</article-title>&#x201D;, <source>2010 IEEE International Conference on Pervasive Computing and Communications (PerCom)</source>, pp. <fpage>60</fpage>&#x2013;<lpage>68</lpage>, <month>March</month> <day>29</day>, <year>2010</year>, &#x2013; <month>April</month> <day>2</day>, <year>2010</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Sell+your+experiences%3A+a+market+mechanism+based+incentive+for+participatory+sensing+2010+IEEE+International+Conference+on+Pervasive+Computing+and+Communications+%28PerCom%29+2010+60-68" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-108">[108] <author><firstname>R.</firstname> <surname>Herring</surname></author>, <author><firstname>A.</firstname> <surname>Hofleitner</surname></author>, <author><firstname>S.</firstname> <surname>Amin</surname></author>, <author><firstname>T.</firstname> <surname>Nasr</surname></author>, <author><firstname>A.</firstname> <surname>Khalek</surname></author>, <author><firstname>P.</firstname> <surname>Abbeel</surname></author>, and <author><firstname>A.</firstname> <surname>Bayen</surname></author>, &#x201C;<article-title>Using Mobile Phones to Forecast Arterial Traffic Through Statistical Learning</article-title>&#x201D;, <source>89th Transportation Research Board Annual Meeting</source>, <publisher-loc>Washington D.C.</publisher-loc>, <month>January</month> <day>10&#x2013;14</day>, <year>2010</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Using+Mobile+Phones+to+Forecast+Arterial+Traffic+Through+Statistical+Learning+89th+Transportation+Research+Board+Annual+Meeting+2010" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-109">[109] <author><firstname>M.</firstname> <surname>Kranz</surname></author>, <author><firstname>L.</firstname> <surname>Roalter</surname></author>, and <author><firstname>F.</firstname> <surname>Michahelles</surname></author>, &#x201C;<article-title>Things That Twitter: Social Networks and the Internet of Things</article-title>&#x201D;, in <source>What can the Internet of Things do for the Citizen (CIoT) Workshop</source> at <source>The Eighth International Conference on Pervasive Computing (Pervasive 2010)</source>, <publisher-name>Helsinki</publisher-name>, <publisher-loc>Finland</publisher-loc>, <month>May</month> <year>2010</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Things+That+Twitter%3A+Social+Networks+and+the+Internet+of+Things+What+can+the+Internet+of+Things+do+for+the+Citizen+%28CIoT%29+Workshop+at++The+Eighth+International+Conference+on+Pervasive+Computing+%28Pervasive+2010%29+2010" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-110">[110] <author><firstname>O.</firstname> <surname>Vermesan</surname></author>, et al., &#x201C;<article-title>Internet of Energy &#x2013; Connecting Energy Anywhere Anytime</article-title>&#x201D; in Advanced Microsystems for Automotive Applications 2011: Smart Systems for Electric, Safe and Networked Mobility, <publisher-loc>Springer</publisher-loc>, <publisher-name>Berlin</publisher-name>, <year>2011</year>, ISBN 978-36-42213-80-9. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Internet+of+Energy+-+Connecting+Energy+Anywhere+Anytime+2011" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-111">[111] <author><firstname>W.</firstname> <surname>Colitti</surname></author>, <author><firstname>K.</firstname> <surname>Steenhaut</surname></author>, and <author><firstname>N.</firstname> <surname>De Caro</surname></author>, &#x201C;<article-title>Integrating Wireless Sensor Networks with the Web,</article-title>&#x201D; Extending the Internet to Low Power and Lossy Networks (IP+ SN 2011), <year>2011</year> online at <ulink url="http://hinrg.cs.jhu.edu/joomla/images/stories/IPSN_2011_koliti.pdf">http://hinrg.cs.jhu.edu/joomla/images/stories/IPSN_2011_koliti.pdf</ulink> <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Integrating+Wireless+Sensor+Networks+with+the+Web%2C+2011" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-112">[112] <author><firstname>M. M.</firstname> <surname>Hassan</surname></author>, <author><firstname>B.</firstname> <surname>Song</surname></author>, and <author><firstname>E.</firstname> <surname>Huh</surname></author>, &#x201C;<article-title>A framework of sensor-cloud integration opportunities and challenges</article-title>&#x201D;, in <source>Proceedings of the 3<superscript>rd</superscript> International Conference on Ubiquitous Information Management and Communication</source>, ICUIMC 2009, <publisher-loc>Suwon, Korea</publisher-loc>, <month>January</month> <day>15&#x2013;16</day>, pp. <fpage>618</fpage>&#x2013;<lpage>626</lpage>, <year>2009</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=A+framework+of+sensor-cloud+integration+opportunities+and+challenges+Proceedings+of+the+3rd+International+Conference+on+Ubiquitous+Information+Management+and+Communication+2009+618-626" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-113">[113] <author><firstname>M.</firstname> <surname>Yuriyama</surname></author> and <author><firstname>T.</firstname> <surname>Kushida</surname></author>, &#x201C;<article-title>Sensor-Cloud Infrastructure &#x2013; Physical Sensor Management with Virtualized Sensors on Cloud Computing</article-title>&#x201D;, NBiS 2010: <fpage>1</fpage>&#x2013;<lpage>8</lpage>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Sensor-Cloud+Infrastructure+-+Physical+Sensor+Management+with+Virtualized+Sensors+on+Cloud+Computing+2009+1-8" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-114">[114] <author><firstname>C.</firstname> <surname>Bizer</surname></author>, <author><firstname>T.</firstname> <surname>Heath</surname></author>, <author><firstname>K.</firstname> <surname>Idehen</surname></author>, and <author><firstname>T.</firstname> <surname>Berners-Lee</surname></author>, &#x201C;<article-title>Linked Data on the Web</article-title>&#x201D;, <source>Proceedings of the 17th International Conference on World Wide Web (WWW&#x2019;08)</source>, <publisher-loc>New York, NY, USA, ACM</publisher-loc>, pp. <fpage>1265</fpage>&#x2013;<lpage>1266</lpage>, <year>2008</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Linked+Data+on+the+Web+Proceedings+of+the+17th+International+Conference+on+World+Wide+Web+%28WWW%2708%29+2008+1265-1266" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-115">[115] <author><firstname>T.</firstname> <surname>Heath</surname></author> and <author><firstname>C.</firstname> <surname>Bizer</surname></author>, &#x201C;<article-title>Linked Data: Evolving the Web into a Global Data Space</article-title>&#x201D;, <source>Synthesis Lectures on the Semantic Web: Theory and Technology</source>, <edition>1st edition</edition>. <publisher-name>Morgan &#x0026; Claypool</publisher-name>, <volumenum>1</volumenum>:<issue>1</issue>, <fpage>1</fpage>&#x2013;<lpage>136</lpage>, <year>2011</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Linked+Data%3A+Evolving+the+Web+into+a+Global+Data+Space+Synthesis+Lectures+on+the+Semantic+Web%3A+Theory+and+Technology+2011+1+1-136" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-116">[116] <collab>IBM</collab>, &#x201C;<article-title>An architectural blueprint for autonomic computing</article-title>&#x201D;, IBM White paper. <month>June</month> <year>2005</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=An+architectural+blueprint+for+autonomic+computing+2005" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-117">[117] <collab>Connected Devices for Smarter Home Environments, IBM Data Magazine</collab>, <year>2014</year>, online at <ulink url="http://ibmdatamag.com/2014/04/connected-devices-for-smarter-home-environments/">http://ibmdatamag.com/2014/04/connected-devices-for-smarter-home-environments/</ulink></bibliomixed>
<bibliomixed id="B3-118">[118] <collab>International Conference on Autonomic Computing</collab> <ulink url="http://www.auton omic-conference.org/">http://www.auton omic-conference.org/</ulink></bibliomixed>
<bibliomixed id="B3-119">[119] <collab>IEEE International Conferences on Self-Adaptive and Self-Organizing Systems</collab>, <ulink url="http://www.saso-conference.org/">http://www.saso-conference.org/</ulink></bibliomixed>
<bibliomixed id="B3-120">[120] <collab>International Symposium on Software Engineering for Adaptive and Self-Managing Systems</collab>, <ulink url="http://www.seams2012.cs.uvic.ca/">http://www.seams2012.cs.uvic.ca/</ulink></bibliomixed>
<bibliomixed id="B3-121">[121] <collab>Awareness project, Self-Awareness in Autonomic Systems</collab> <ulink url="http://www.aware-project.eu/">http://www.aware-project.eu/</ulink></bibliomixed>
<bibliomixed id="B3-122">[122] <author><firstname>M. C.</firstname> <surname>Huebscher</surname></author>, <author><firstname>J. A.</firstname> <surname>McCann</surname></author>, &#x201C;<article-title>A survey of autonomic computing &#x2013;- degrees, models, and applications</article-title>&#x201D;, <source>ACM Computing Surveys (CSUR)</source>, Volume <volumenum>40</volumenum> Issue <issue>3</issue>, <month>August</month> <year>2008</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=A+survey+of+autonomic+computing+--+degrees%2C+models%2C+and+applications+ACM+Computing+Surveys+%28CSUR%29+2008+3" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-123">[123] <author><firstname>A. S.</firstname> <surname>Rao</surname></author>, <author><firstname>M. P.</firstname> <surname>Georgeff</surname></author>, &#x201C;<article-title>BDI Agents: From Theory to Practice</article-title>&#x201D;, in <source>Proceedings of The First International Conference on Multi-agent Systems (ICMAS)</source>, <year>1995</year>. pp. <fpage>312</fpage>&#x2013;<lpage>319</lpage>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=BDI+Agents%3A+From+Theory+to+Practice+Proceedings+of+The+First+International+Conference+on+Multi-agent+Systems+%28ICMAS%29+1995+312-319" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-124">[124] <author><firstname>G.</firstname> <surname>Dimitrakopoulos</surname></author>, <author><firstname>P.</firstname> <surname>Demestichas</surname></author>, <author><firstname>W.</firstname> <surname>Koenig</surname></author>, <source>Future Network &#x0026; Mobile Summit 2010 Conference Proceedings.</source>  <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Future+Network+%26+Mobile+Summit+2010+Conference+Proceedings%2E+1995" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-125">[125] <collab>John Naisbit and Patricia Aburdene (1991)</collab>, <source>Megatrends 2000</source>, <publisher-name>Avon</publisher-name>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Megatrends+2000+1995" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-126">[126] <author><firstname>D. C.</firstname> <surname>Luckham</surname></author>, <article-title>Event Processing for Business: Organizing the Real-Time Enterprise</article-title>, <publisher-name>John Wiley &#x0026; Sons</publisher-name>, <year>2012</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Event+Processing+for+Business%3A+Organizing+the+Real-Time+Enterprise+2012" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-127">[127] <author><firstname>T.</firstname> <surname>Mitchell</surname></author>, <source>Machine Learning</source>, <publisher-name>McGraw Hill</publisher-name>, <year>1997</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Machine+Learning+1997" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-128">[128] <author><firstname>D.</firstname> <surname>Estrin</surname></author>, &#x201C;<article-title>Participatory Sensing: Applications and Architecture</article-title>, online at <ulink url="http://research.cens.ucla.edu/people/estrin/resources/conf erences/2010-Estrin-participatory-sensing-mobisys.pdf">http://research.cens.ucla.edu/people/estrin/resources/conf erences/2010-Estrin-participatory-sensing-mobisys.pdf</ulink> <author><firstname>O.</firstname> <surname>Etzion</surname></author>, <author><firstname>P.</firstname> <surname>Niblett</surname></author>, <source>Event Processing in Action</source>, <publisher-name>Manning</publisher-name>, <year>2011</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Participatory+Sensing%3A+Applications+and+Architecture+Event+Processing+in+Action+2011" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-129">[129] <author><firstname>V. J.</firstname> <surname>Hodgem</surname></author>, <author><firstname>J.</firstname> <surname>Austin</surname></author>, &#x201C;<article-title>A Survey of Outlier Detection Methodologies</article-title>&#x201D;, <source>Artificial Intelligence Review</source>, <volumenum>22</volumenum> (<issue>2</issue>), pages <fpage>85</fpage>&#x2013;<lpage>126</lpage>, <year>2004</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=A+Survey+of+Outlier+Detection+Methodologies+Artificial+Intelligence+Review+2004+2+85-126" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-130">[130] <author><firstname>F.</firstname> <surname>Angiulli</surname></author>, and <author><firstname>C.</firstname> <surname>Pizzuti</surname></author>, &#x201C;<article-title>Fast outlier detection in high dimensional spaces</article-title>&#x201D; in <source>Proc. European Conf. on Principles of Knowledge Discovery and Data Mining</source>, <year>2002</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Fast+outlier+detection+in+high+dimensional+spaces+Proc%2E+European+Conf%2E+on+Principles+of+Knowledge+Discovery+and+Data+Mining+2002" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-131">[131] <author><firstname>H.</firstname> <surname>Fan</surname></author>, <author><firstname>O.</firstname> <surname>Za&#x00EF;ane</surname></author>, <author><firstname>A.</firstname> <surname>Foss</surname></author>, and <author><firstname>J.</firstname> <surname>Wu</surname></author>, &#x201C;<article-title>Nonparametric outlier detection for efficiently discovering top-n outliers from engineering data</article-title>&#x201D;, in <source>Proc. Pacific-Asia Conf. on Knowledge Discovery and Data Mining (PAKDD)</source>, <publisher-loc>Singapore</publisher-loc>, <year>2006</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Nonparametric+outlier+detection+for+efficiently+discovering+top-n+outliers+from+engineering+data+Proc%2E+Pacific-Asia+Conf%2E+on+Knowledge+Discovery+and+Data+Mining+%28PAKDD%29+2006" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-132">[132] <author><firstname>A.</firstname> <surname>Ghoting</surname></author>, <author><firstname>S.</firstname> <surname>Parthasarathy</surname></author>, and <author><firstname>M.</firstname> <surname>Otey</surname></author>, &#x201C;<article-title>Fast mining of distance-based outliers in high dimensional spaces</article-title>&#x201D;, in <source>Proc. SIAM Int. Conf. on Data Mining (SDM)</source>, <publisher-loc>Bethesda, ML</publisher-loc>, <year>2006</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Fast+mining+of+distance-based+outliers+in+high+dimensional+spaces+Proc%2E+SIAM+Int%2E+Conf%2E+on+Data+Mining+%28SDM%29+2006" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-133">[133] <author><firstname>G.</firstname> <surname>Box</surname></author>, <author><firstname>G.</firstname> <surname>Jenkins</surname></author>, <source>Time series analysis: forecasting and control</source>, rev. <role>ed.</role>, <publisher-loc>Oakland, California</publisher-loc>: <publisher-name>Holden-Day</publisher-name>, <year>1976</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Time+series+analysis%3A+forecasting+and+control+1976" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-134">[134] <author><firstname>J.</firstname> <surname>Hamilton</surname></author>, <source>Time Series Analysis</source>, <publisher-name>Princeton Univ. Press</publisher-name>, <year>1994</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Time+Series+Analysis+1994" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-135">[135] <author><firstname>J.</firstname> <surname>Durbin</surname></author> and <author><firstname>S. J.</firstname> <surname>Koopman</surname></author>, <source>Time Series Analysis by State Space Methods</source>, <publisher-name>Oxford University Press</publisher-name>, <year>2001</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Time+Series+Analysis+by+State+Space+Methods+2001" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-136">[136] <author><firstname>R. O.</firstname> <surname>Duda</surname></author>, <author><firstname>P. E.</firstname> <surname>Hart</surname></author>, <author><firstname>D. G.</firstname> <surname>Stork</surname></author>, <source>Pattern Classification, 2nd Edition</source>, <publisher-name>Wiley</publisher-name>, <year>2000</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Pattern+Classification%2C+2nd+Edition+2000" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-137">[137] <author><firstname>C. M.</firstname> <surname>Bishop</surname></author>, <source>Neural Networks for Pattern Recognition</source>, <publisher-name>Oxford University Press</publisher-name>, <year>1995</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Neural+Networks+for+Pattern+Recognition+1995" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-138">[138] <author><firstname>C. M.</firstname> <surname>Bishop</surname></author>, <source>Pattern Recognition and Machine Learning</source>, <publisher-name>Springer</publisher-name>, <year>2006</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Pattern+Recognition+and+Machine+Learning+2006" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-139">[139] <author><firstname>M. J.</firstname> <surname>Zaki</surname></author>, &#x201C;<article-title>Generating non-redundant association rules</article-title>&#x201D;, <source>Proceedings of the sixth ACM SIGKDD international conference on Knowledge discovery and data mining</source>, <fpage>34</fpage>&#x2013;<lpage>43</lpage>, <year>2000</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Generating+non-redundant+association+rules+Proceedings+of+the+sixth+ACM+SIGKDD+international+conference+on+Knowledge+discovery+and+data+mining+2000+34-43" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-140">[140] <author><firstname>M. J.</firstname> <surname>Zaki</surname></author>, <author><firstname>M.</firstname> <surname>Ogihara</surname></author>, &#x201C;<article-title>Theoretical foundations of association rules</article-title>&#x201D;, <source>3rd ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery</source>, <year>1998</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Theoretical+foundations+of+association+rules+3rd+ACM+SIGMOD+Workshop+on+Research+Issues+in+Data+Mining+and+Knowledge+Discovery+1998" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-141">[141] <author><firstname>N.</firstname> <surname>Pasquier</surname></author>, <author><firstname>Y.</firstname> <surname>Bastide</surname></author>, <author><firstname>R.</firstname> <surname>Taouil</surname></author>, <author><firstname>L.</firstname> <surname>Lakhal</surname></author>, &#x201C;<article-title>Discovering Frequent Closed Itemsets for Association Rules</article-title>&#x201D;, <source>Proceedings of the 7th International Conference on Database Theory</source>, (<fpage>398</fpage>&#x2013;<lpage>416</lpage>), <year>1999</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Discovering+Frequent+Closed+Itemsets+for+Association+Rules+Proceedings+of+the+7th+International+Conference+on+Database+Theory+1999+398-416" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-142">[142] <author><firstname>C. M.</firstname> <surname>Kuok</surname></author>, <author><firstname>A.</firstname> <surname>Fu</surname></author>, <author><firstname>M. H.</firstname> <surname>Wong</surname></author>, &#x201C;<article-title>Mining fuzzy association rules in databases</article-title>&#x201D;, <source>SIGMOD Rec.</source> <volumenum>27</volumenum>, <issue>1</issue> (<month>March</month> <year>1998</year>), <fpage>41</fpage>&#x2013;<lpage>46</lpage>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Mining+fuzzy+association+rules+in+databases+SIGMOD+Rec%2E+1998+1+41-46" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-143">[143] <author><firstname>T.</firstname> <surname>Kohonen</surname></author>, <source>Self-Organizing Maps</source>, Springer, 2001. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Self-Organizing+Maps+1998" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-144">[144] <author><firstname>S.-H.</firstname> <surname>Hamed</surname></author>, <author><firstname>S.</firstname> <surname>Reza</surname></author>, &#x201C;<article-title>TASOM: A New Time Adaptive Self-Organizing Map</article-title>&#x201D;, <source>IEEE Transactions on Systems, Man, and Cybernetics&#x2013;-Part B: Cybernetics</source> <volumenum>33</volumenum> (<issue>2</issue>): <fpage>271</fpage>&#x2013;<lpage>282</lpage>, <year>2003</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=TASOM%3A+A+New+Time+Adaptive+Self-Organizing+Map+IEEE+Transactions+on+Systems%2C+Man%2C+and+Cybernetics--Part+B%3A+Cybernetics+2003+2+271-282" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-145">[145] <author><firstname>L.J.P.</firstname> <surname>van der Maaten</surname></author>, <author><firstname>G.E.</firstname> <surname>Hinton</surname></author>, &#x201C;<article-title>Visualizing High-Dimensional Data Using t-SNE</article-title>&#x201D;, <source>Journal of Machine Learning Research</source> <volumenum>9</volumenum>(<month>Nov</month>): <fpage>2579</fpage>&#x2013;<lpage>2605</lpage>, <year>2008</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Visualizing+High-Dimensional+Data+Using+t-SNE+Journal+of+Machine+Learning+Research+2008+2579-2605" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-146">[146] <author><firstname>I.</firstname> <surname>Guyon</surname></author>, <author><firstname>S.</firstname> <surname>Gunn</surname></author>, <author><firstname>M.</firstname> <surname>Nikravesh</surname></author>, and <author><firstname>L.</firstname> <surname>Zadeh</surname></author> (<role>Eds</role>), <source>Feature Extraction, Foundations and Applications</source>, <publisher-name>Springer</publisher-name>, <year>2006</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Feature+Extraction%2C+Foundations+and+Applications+2006" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-147">[147] <author><firstname>Y.</firstname> <surname>Bengio</surname></author>, &#x201C;<article-title>Learning deep architectures for AI</article-title>&#x201D;, <source>Foundations and Trends in Machine Learning</source>, <volumenum>2</volumenum>(<issue>1</issue>):<fpage>1</fpage>&#x2013;<lpage>12</lpage>, <year>2009</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Learning+deep+architectures+for+AI+Foundations+and+Trends+in+Machine+Learning+2009+1+1-12" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-148">[148] <author><firstname>Y.</firstname> <surname>Bengio</surname></author>, <author><firstname>Y.</firstname> <surname>LeCun</surname></author>, &#x201C;<article-title>Scaling learning algorithms towards AI</article-title>&#x201D;, <source>Large Scale Kernel Machines</source>, <publisher-name>MIT Press</publisher-name>, <year>2007</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Scaling+learning+algorithms+towards+AI+Large+Scale+Kernel+Machines+2007" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-149">[149] <author><firstname>B.</firstname> <surname>Hammer</surname></author>, <author><firstname>T.</firstname> <surname>Villmann</surname></author>, &#x201C;<article-title>How to process uncertainty in machine learning?</article-title>&#x201D;, <source>ESANN&#x2019;2007 proceedings &#x2013; European Symposium on Artificial Neural Networks</source>, <publisher-loc>Bruges (Belgium)</publisher-loc>, <year>2007</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=How+to+process+uncertainty+in+machine+learning%B4+ESANN%272007+proceedings+-+European+Symposium+on+Artificial+Neural+Networks+2007" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-150">[150] <author><firstname>J.</firstname> <surname>Quinonero-Candela</surname></author>, <author><firstname>C.</firstname> <surname>Rasmussen</surname></author>, <author><firstname>F.</firstname> <surname>Sinz</surname></author>, <author><firstname>O.</firstname> <surname>Bousquet</surname></author>, and <author><firstname>B.</firstname> <surname>Sch&#x00F6;lkopf</surname></author>, &#x201C;<article-title>Evaluating Predictive Uncertainty Challenge</article-title>&#x201D;, in <source>Machine Learning Challenges: Evaluating Predictive Uncertainty, Visual Object Classification, and Recognising Tectual Entailment</source>, First PASCAL Machine Learning Challenges Workshop (MLCW 2005), <publisher-name>Springer, Berlin</publisher-name>, <publisher-loc>Germany</publisher-loc>, <fpage>1</fpage>&#x2013;<lpage>27</lpage>, <year>2006</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Evaluating+Predictive+Uncertainty+Challenge+Machine+Learning+Challenges%3A+Evaluating+Predictive+Uncertainty%2C+Visual+Object+Classification%2C+and+Recognising+Tectual+Entailment+2006+1-27" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-151">[151] <author><firstname>D.</firstname> <surname>Koller</surname></author> and <author><firstname>N.</firstname> <surname>Friedman</surname></author>, <source>Probabilistic graphical models: principles and techniques</source>, <publisher-name>MIT press</publisher-name>, <year>2009</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Probabilistic+graphical+models%3A+principles+and+techniques+2009" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-152">[152] <author><firstname>M. R.</firstname> <surname>Endsley</surname></author>, &#x201C;<article-title>Measurement of situation awareness in dynamic systems</article-title>&#x201D;, <source>Human Factors</source>, <volumenum>37</volumenum>, <fpage>65</fpage>&#x2013;<lpage>84</lpage>, <year>1995</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Measurement+of+situation+awareness+in+dynamic+systems+Human+Factors+1995+65-84" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-153">[153] <author><firstname>R.</firstname> <surname>Fuller</surname></author>, <source>Neural Fuzzy System</source>, <publisher-name>&#x00C5;bo Akademi University</publisher-name>, ESF Series A: 443, 1995, <fpage>249</fpage> pages. [ISBN 951-650-624-0, ISSN 0358-5654]. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Neural+Fuzzy+System+1995" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-154">[154] <author><firstname>S.</firstname> <surname>Haykin</surname></author>, <source>Neural Networks: A Comprehensive Foundation, 2nd edn</source>., <publisher-loc>Prentice-Hall, New York</publisher-loc> (<year>1999</year>). <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Neural+Networks%3A+A+Comprehensive+Foundation%2C+2nd+edn+1999" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-155">[155] <author><firstname>L.</firstname> <surname>Rabiner</surname></author>, &#x201C;<article-title>A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition,</article-title>&#x201D; <source>Proceedings of the IEEE</source>, <volumenum>Vol. 77</volumenum>, no. <issue>2</issue>, <month>Feb</month>. <year>1989</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=A+Tutorial+on+Hidden+Markov+Models+and+Selected+Applications+in+Speech+Recognition%2C+Proceedings+of+the+IEEE+1989+2" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-156">[156] <author><firstname>S.K.</firstname> <surname>Murthy</surname></author>, &#x201C;<article-title>Automatic construction of decision trees from data: a multi-disciplinary survey</article-title>&#x201D;, <source>Data Mining Knowledge Discovery</source>, <year>1998</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Automatic+construction+of+decision+trees+from+data%3A+a+multi-disciplinary+survey+Data+Mining+Knowledge+Discovery+1998" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-157">[157] <collab>ITU</collab> towards &#x201C;<article-title>IMT for 2020 and beyond.</article-title>&#x201D; <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=IMT+for+2020+and+beyond%2E+1998" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-158">[158] <author><firstname>G.</firstname> <surname>Macaigne</surname></author>. <article-title>SIM-less networks, the new Eldorado of M2M and Internet of Things</article-title>, online at <ulink url="http://www.inov360.com/blog/sim-less-networks-the-new-eldorado-of-m2m-and-internet-of-things/">http://www.inov360.com/blog/sim-less-networks-the-new-eldorado-of-m2m-and-internet-of-things/</ulink></bibliomixed>
<bibliomixed id="B3-159">[159] <author><firstname>S.</firstname> <surname>Haller</surname></author> and <author><firstname>C.</firstname> <surname>Magerkurth</surname></author>, &#x201C;<article-title>The Real-time Enterprise: IoT-enabled Business Processes</article-title>&#x201D;, IETF IAB Workshop on Interconnecting Smart Objects with the Internet, <month>March</month> <year>2011</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=The+Real-time+Enterprise%3A+IoT-enabled+Business+Processes+2011" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-160">[160] <collab>Open Geospatial Consortium, Geospatial and location standards</collab>, <ulink url="http://www.opengeospatial.org">http://www.opengeospatial.org</ulink></bibliomixed>
<bibliomixed id="B3-161">[161] <author><firstname>M.</firstname> <surname>Botts</surname></author>, <author><firstname>G.</firstname> <surname>Percivall</surname></author>, <author><firstname>C.</firstname> <surname>Reed</surname></author>, and <author><firstname>J.</firstname> <surname>Davidson</surname></author>, &#x201C;<article-title>oGC Sensor Web Enablement: Overview and High Level Architecture</article-title>&#x201D;, <source>The Open Geospatial Consortium</source>, <year>2008</year>, online at <ulink url="http://portal.opengeospatial.org/files/?artifactid=25562">http://portal.opengeospatial.org/files/?artifactid=25562</ulink> <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=oGC+Sensor+Web+Enablement%3A+Overview+and+High+Level+Architecture+The+Open+Geospatial+Consortium+2008" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-162">[162] <collab>W3C Semantic Sensor Network Incubator Group, Incubator Activity</collab>, online at <ulink url="http://www.w3.org/2005/Incubator/ssn/">http://www.w3.org/2005/Incubator/ssn/</ulink></bibliomixed>
<bibliomixed id="B3-163">[163] <collab>Logical Neighborhoods, Virtual Sensors and Actuators</collab>, online at <ulink url="http://logicalneighbor.sourceforge.net/vs.html">http://logicalneighbor.sourceforge.net/vs.html</ulink></bibliomixed>
<bibliomixed id="B3-164">[164] <author><firstname>K. M.</firstname> <surname>Chandy</surname></author> and <author><firstname>W. R.</firstname> <surname>Schulte</surname></author>, &#x201C;<article-title>What is Event Driven Architecture (EDA) and Why Does it Matter?</article-title>&#x201D;, <year>2007</year>, online at <ulink url="http://complexevents.com/?p=212">http://complexevents.com/?p=212</ulink>, (accessed on: <day>25</day>.<month>02</month>.<year>2008</year>). <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=What+is+Event+Driven+Architecture+%28EDA%29+and+Why+Does+it+Matter%B4+2007" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-165">[165] <author><firstname>D.</firstname> <surname>Luckham</surname></author>, &#x201C;<article-title>What&#x2019;s the Difference Between ESP and CEP?</article-title>&#x201D;, <year>2006</year>, online at <ulink url="http://complexevents.com/?p=103">http://complexevents.com/?p=103</ulink>, accessed on <day>15</day>.<month>12</month>.<year>2008</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=What%27s+the+Difference+Between+ESP+and+CEP%B4+2006+2008" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-166">[166] <collab>The CEP Blog</collab>, <ulink url="http://www.thecepblog.com/">http://www.thecepblog.com/</ulink></bibliomixed>
<bibliomixed id="B3-167">[167] <collab>EnOcean &#x2013; the Energy Harvesting Wirless Standard for Building Automation and Industrial Automation</collab>, online at <ulink url="http://www.enocean.com/en/radio-technology/">http://www.enocean.com/en/radio-technology/</ulink></bibliomixed>
<bibliomixed id="B3-168">[168] <collab>IEEE Std 802.15.4<superscript>TM</superscript>-2006, Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs)</collab>, online at <ulink url="http://www.ieee802.org/15/pub/TG4.html">http://www.ieee802.org/15/pub/TG4.html</ulink></bibliomixed>
<bibliomixed id="B3-169">[169] <collab>Bluetooth Low Energy (LE) Technology Info Site</collab>, online at <ulink url="http://www.bluetooth.com/English/Products/Pages/low_energy.aspx">http://www.bluetooth.com/English/Products/Pages/low_energy.aspx</ulink></bibliomixed>
<bibliomixed id="B3-170">[170] <collab>The Official Bluetooth Technology Info Site</collab>, online at <ulink url="http://www.bluetooth.com/">http://www.bluetooth.com/</ulink></bibliomixed>
<bibliomixed id="B3-171">[171] <author><firstname>M-G.</firstname> <surname>Di Benedetto</surname></author> and <author><firstname>G.</firstname> <surname>Giancola</surname></author>, <source>Understanding Ultra Wide Band Radio Fundamentals</source>, <publisher-loc>Prentice Hall</publisher-loc>, <month>June</month> <day>27</day>, <year>2004</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Understanding+Ultra+Wide+Band+Radio+Fundamentals+2004" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-172">[172] <collab>ISO, International Organization for Standardization (ISO), Identification cards &#x2013; Contactless integrated circuit(s) cards &#x2013; Vicinity cards</collab>, ISO/IEC 14443, <year>2003</year>.</bibliomixed>
<bibliomixed id="B3-173">[173] <author><firstname>N.</firstname> <surname>Pletcher</surname></author>, <author><firstname>S.</firstname> <surname>Gambini</surname></author>, and <author><firstname>J.</firstname> <surname>Rabaey</surname></author>, &#x201C;<article-title>A 52 &#x00B5;W Wake-Up Receiver With 72 dBm Sensitivity Using an Uncertain-IF Architecture</article-title>&#x201D;, in <source>IEEE Journal of Solid-State Circuits</source>, <volumenum>Vol. 44</volumenum>, <issue>no1</issue>, <month>January</month>, pp. <fpage>269</fpage>&#x2013;<lpage>280</lpage>. <year>2009</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=A+52+%B5W+Wake-Up+Receiver+With+72+dBm+Sensitivity+Using+an+Uncertain-IF+Architecture+IEEE+Journal+of+Solid-State+Circuits+2009+1+269-280" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-174">[174] <author><firstname>A.</firstname> <surname>Vouilloz</surname></author>, <author><firstname>M.</firstname> <surname>Declercq</surname></author>, and <author><firstname>C.</firstname> <surname>Dehollain</surname></author>, &#x201C;<article-title>A Low-Power CMOS Super-Regenerative Receiver at 1 GHz</article-title>&#x201D;, in <source>IEEE Journal of Solid-State Circuits</source>, <volumenum>Vol. 36</volumenum>, <issue>no3</issue>, <month>March</month>, pp. <fpage>440</fpage>&#x2013;<lpage>451</lpage>, <year>2001</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=A+Low-Power+CMOS+Super-Regenerative+Receiver+at+1+GHz+IEEE+Journal+of+Solid-State+Circuits+2001+3+440-451" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-175">[175] <author><firstname>J.</firstname> <surname>Ryckaert</surname></author>, <author><firstname>A.</firstname> <surname>Geis</surname></author>, <author><firstname>L.</firstname> <surname>Bos</surname></author>, <author><firstname>G.</firstname> <surname>van der Plas</surname></author>, <author><firstname>J.</firstname> <surname>Craninckx</surname></author>, &#x201C;<article-title>A 6.1 GS/s 52.8 mW 43 dB DR 80 MHz Bandwidth 2.4 GHz RF Bandpass &#x03A3;-&#x0394; ADC in 40 nm CMOS</article-title>&#x201D;, in <source>IEEE Radio-Frequency Integrated Circuits Symposium</source>, <year>2010</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=A+6%2E1+GS%2Fs+52%2E8+mW+43+dB+DR+80+MHz+Bandwidth+2%2E4+GHz+RF+Bandpass+ADC+in+40+nm+CMOS+IEEE+Radio-Frequency+Integrated+Circuits+Symposium+2010" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-176">[176] <author><firstname>L.</firstname> <surname>Lolis</surname></author>, <author><firstname>C.</firstname> <surname>Bernier</surname></author>, <author><firstname>M.</firstname> <surname>Pelissier</surname></author>, <author><firstname>D.</firstname> <surname>Dallet</surname></author>, and <author><firstname>J.-B.</firstname> <surname>B&#x00E9;gueret</surname></author>, &#x201C;<article-title>Bandpass Sampling RX System Design Issues and Architecture Comparison for Low Power RF Standards</article-title>&#x201D;, <source>IEEE ISCAS 2010</source>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Bandpass+Sampling+RX+System+Design+Issues+and+Architecture+Comparison+for+Low+Power+RF+Standards+IEEE+ISCAS+2010+2010" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-177">[177] <author><firstname>D.</firstname> <surname>Lachartre</surname></author>, &#x201C;<article-title>A 550 &#x00B5;W inductorless bandpass quantizer in 65 nm CMOS for 1.4-to-3 GHz digital RF receivers</article-title>&#x201D;, <source>VLSI Circuits 2011</source>, pp. <fpage>166</fpage>&#x2013;<lpage>167</lpage>, <year>2011</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=A+550+%B5W+inductorless+bandpass+quantizer+in+65+nm+CMOS+for+1%2E4-to-3+GHz+digital+RF+receivers+VLSI+Circuits+2011+2011+166-167" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-178">[178] <author><firstname>S.</firstname> <surname>Boisseau</surname></author> and <author><firstname>G.</firstname> <surname>Despesse</surname></author>, &#x201C;<article-title>Energy Harvesting, Wireless Sensor Networks &#x0026; Opportunities for Industrial Applications</article-title>&#x201D;, in <source>EETimes</source>, <day>27th</day> <month>Feb</month> <year>2012</year>, online at <ulink url="http://www.eetimes.com">http://www.eetimes.com</ulink> <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Energy+Harvesting%2C+Wireless+Sensor+Networks+%26+Opportunities+for+Industrial+Applications+EETimes+2012" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-179">[179] <author><firstname>J.G.</firstname> <surname>Koomey</surname></author>, <author><firstname>S.</firstname> <surname>Berard</surname></author>, <author><firstname>M.</firstname> <surname>Sanchez</surname></author>, and <author><firstname>H.</firstname> <surname>Wong</surname></author>, &#x201C;<article-title>Implications of Historical Trends in the Electrical Efficiency of Computing</article-title>&#x201D;, in <source>IEEE Annals of the History of Computing</source>, <volumenum>Vol. 33</volumenum>, no. <issue>3</issue>, pp. <fpage>46</fpage>&#x2013;<lpage>54</lpage>, <month>March</month> <year>2011</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Implications+of+Historical+Trends+in+the+Electrical+Efficiency+of+Computing+IEEE+Annals+of+the+History+of+Computing+2011+3+46-54" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-180">[180] <collab>eCall &#x2013; eSafety Support</collab>, online at <ulink url="http://www.esafetysupport.org/en/ecall_toolbox/european_commission/index.html">http://www.esafetysupport.org/en/ecall_toolbox/european_commission/index.html</ulink></bibliomixed>
<bibliomixed id="B3-181">[181] <collab>European Commission</collab>, &#x201C;<article-title>Smart Grid Mandate, Standardization Mandate to European Standardisation Organisations (ESOs) to support European Smart Grid deployments</article-title>&#x201D;, M/490 EN, Brussels <day>1<superscript>st</superscript></day> <month>March</month>, <year>2011</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Smart+Grid+Mandate%2C+Standardization+Mandate+to+European+Standardisation+Organisations+%28ESOs%29+to+support+European+Smart+Grid+deployments+2011" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-182">[182] <collab>Global Certification Forum</collab>, online at <ulink url="http://www.globalcertificationfor um.org">http://www.globalcertificationfor um.org</ulink></bibliomixed>
<bibliomixed id="B3-183">[183] <collab>SENSEI, EU FP7 project</collab>, online at <ulink url="http://www.sensei-project.eu">http://www.sensei-project.eu</ulink></bibliomixed>
<bibliomixed id="B3-184">[184] <collab>IoT-A, EU FP7 project</collab>, online at <ulink url="http://www.iot-a.eu">http://www.iot-a.eu</ulink></bibliomixed>
<bibliomixed id="B3-185">[185] <collab>IoT6, EU FP7 project</collab>, online at <ulink url="http://www.iot6.eu">http://www.iot6.eu</ulink></bibliomixed>
<bibliomixed id="B3-186">[186] <collab>IoT@Work, EU FP7 project</collab>, online at <ulink url="https://www.iot-at-work.eu/">https://www.iot-at-work.eu/</ulink></bibliomixed>
<bibliomixed id="B3-187">[187] <collab>Federated Object Naming Service, GS1</collab>, online at <ulink url="http://www.gs1.org/gsmp/community/working_groups/gsmp#FONS">http://www.gs1.org/gsmp/community/working_groups/gsmp#FONS</ulink></bibliomixed>
<bibliomixed id="B3-188">[188] <collab>Directive 2003/98/EC of the European Parliament and of the Council on the reuse of public sector information</collab>, <day>17</day> <month>November</month> <year>2003</year>, online at <ulink url="http://ec.europa.eu/information_society/policy/psi/docs/pdfs/directive/psi_directive_en.pdf">http://ec.europa.eu/information_society/policy/psi/docs/pdfs/directive/psi_directive_en.pdf</ulink></bibliomixed>
<bibliomixed id="B3-189">[189] <collab>INSPIRE, EU FP7 project, &#x2013; Infrastructure for Spatial Information in Europe</collab>, online at <ulink url="http://inspire.jrc.ec.europa.eu/">http://inspire.jrc.ec.europa.eu/</ulink></bibliomixed>
<bibliomixed id="B3-190">[190] <author><firstname>H.</firstname> <surname>van der Veer</surname></author>, <author><firstname>A.</firstname> <surname>Wiles</surname></author>, &#x201C;<article-title>Achiveing Technical Interoperability &#x2013; the ETSI Approach</article-title>&#x201D;, ETSI White Paper No.<issue>3</issue>, <edition>3rd</edition> edition, <month>April</month> <year>2008</year>, <ulink url="http://www.etsi.org/images/files/ETSIWhitePapers/IOP%20whitepap er%20Edition%203%20final.pdf">http://www.etsi.org/images/files/ETSIWhitePapers/IOP%20whitepap er%20Edition%203%20final.pdf</ulink> <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Achiveing+Technical+Interoperability+-+the+ETSI+Approach+2008+3" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-191">[191] <collab>Ambient Assisted Living Roadmap, AALIANCE</collab>.</bibliomixed>
<bibliomixed id="B3-192">[192] <collab>Atmel AVR Xmega Micro Controllers</collab>, <ulink url="http://it.mouser.com/atmel_x mega/">http://it.mouser.com/atmel_x mega/</ulink></bibliomixed>
<bibliomixed id="B3-193">[193] <collab>Worldwide Cellular M2M Modules Forecast</collab>, <publisher-name>Beecham Research Ltd</publisher-name>, <month>August</month> <year>2010</year>.</bibliomixed>
<bibliomixed id="B3-194">[194] <collab>Future Internet Assembly Research Roadmap</collab>, <publisher-name>FIA Research Roadmap Working Group</publisher-name>, <month>May</month> <year>2011</year>.</bibliomixed>
<bibliomixed id="B3-195">[195] <author><firstname>D.</firstname> <surname>Scholz-Reiter</surname></author>, <author><firstname>M.-A.</firstname> <surname>Isenberg</surname></author>, <author><firstname>M.</firstname> <surname>Teucke</surname></author>, <author><firstname>H.</firstname> <surname>Halfar</surname></author>, &#x201C;<article-title>An integrative approach on Autonomous Control and the Internet of Things</article-title>&#x201D;, <year>2010</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=An+integrative+approach+on+Autonomous+Control+and+the+Internet+of+Things+2010" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-196">[196] <collab>NIEHS on EMF</collab>, <ulink url="http://www.niehs.nih.gov/health/topics/agents/emf/">http://www.niehs.nih.gov/health/topics/agents/emf/</ulink></bibliomixed>
<bibliomixed id="B3-197">[197] <author><firstname>R.H.</firstname> <surname>Weber</surname></author>/<author><firstname>R.</firstname> <surname>Weber</surname></author>, &#x201C;<article-title>Internet of Things &#x2013; Legal Perspectives</article-title>&#x201D;, <publisher-name>Springer, Berlin</publisher-name> <year>2010</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Internet+of+Things+-+Legal+Perspectives+2010" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-198">[198] &#x201C;<article-title>The Global Wireless M2M Market</article-title>&#x201D;, <publisher-name>Berg Insight</publisher-name>, <year>2010</year>, <ulink url="http://www.berginsight.com/ReportPDF/ProductSheet/bi-gwm2m-ps.pdf">http://www.berginsight.com/ReportPDF/ProductSheet/bi-gwm2m-ps.pdf</ulink> <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=The+Global+Wireless+M2M+Market+2010" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-199">[199] <author><firstname>M.</firstname> <surname>Hatton</surname></author>, &#x201C;<article-title>Machine-to-Machine (M2M) communication in the Utilities Sector 2010&#x2013;2020</article-title>&#x201D;, <publisher-name>Machina Research</publisher-name>, <month>July</month> <year>2011</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Machine-to-Machine+%28M2M%29+communication+in+the+Utilities+Sector+2010-2020+2011" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B3-200">[200] <author><firstname>G.</firstname> <surname>Masson</surname></author>, <author><firstname>D.</firstname> <surname>Morche</surname></author>, <author><firstname>H.</firstname> <surname>Jacquinot</surname></author>, and <author><firstname>P.</firstname> <surname>Vincent</surname></author>, &#x201C;<article-title>A 1 nJ/b 3.2&#x2013;4.7 GHz UWB 50 Mpulses/s Double Quadrature Receiver for Communication and Localization</article-title>&#x201D;, in <source>ESSCIRC 2010.</source> <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=A+1+nJ%2Fb+3%2E2-4%2E7+GHz+UWB+50+Mpulses%2Fs+Double+Quadrature+Receiver+for+Communication+and+Localization+ESSCIRC+2010%2E+2011" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
</bibliography>
</chapter>
<chapter class="chapter" id="ch04" label="4" xreflabel="ch04">
<title>Internet of Things Application Scenarios, Pilots and Innovation</title>
<authorgroup>
<author><firstname>Maurizio A.</firstname> <surname>Spirito</surname></author> and <author><firstname>Maria T.</firstname> <surname>Delgado</surname></author>
</authorgroup>
<para>ISMB, Italy</para>
<section class="lev1" id="sec4.1" label="4.1" xreflabel="sec4.1">
<title>Introduction</title>
<para>One of the main challenges when developing a new technology or system is the understanding if and when they will be mature enough to reach the market. The field of the Internet of Things (IoT) is no exception; a lot of expectations have been generated regarding the uptake of IoT-based solutions due to the wide variety of applications domains in which IoT has the potential to change our lives <link linkend="B4-1">[1]</link>.</para>
<para>Within the context of the Horizon 2020 research framework, which puts a stronger emphasis on innovation and exploitation of research results, the European Commission has recently stimulated the creation of multi-stakeholder ecosystems that are believed to be the key for the success of IoT in Europe. Now, in order to guarantee market take-up of the IoT solutions developed by EU-funded projects and initiatives, the research community needs to identify market gaps and possible ways to bridge them at the same time ensuring the sustainability of project outcomes beyond the projects lifetime.</para>
<para>This chapter aims to provide an insight on some of the technologies, components, demonstrators and pilots that have been or will be delivered by a set of relevant EU-funded research projects in the area of Internet of Things. The information presented summarizes the assessment carried out within the Activity Chain 3 (AC3) &#x201C;Application scenarios, Pilots and Innovation&#x201D; of the Internet of Things European Research Cluster (IERC). The AC3 is a mean for collective exploitation that Projects participating in the IERC Cluster can use; in fact, its main objective of is to assess the innovation and impact of IERC projects with the goal of fostering considerable commercial and industrial opportunities for European IoT. Even though it cannot be exhaustive of the overall European situation the following overview presents a very comprehensive assessment of the maturity of the tangible outcomes delivered by eleven EU-funded; namely, ALMANAC <link linkend="B4-2">[2]</link>, ClouT <link linkend="B4-3">[3]</link>, OSMOSE <link linkend="B4-4">[4]</link>, RERUM [<link linkend="B4-5">5</link>, <link linkend="B4-6">6</link>], SMARTIE <link linkend="B4-7">[7]</link>, SocIoTal <link linkend="B4-8">[8]</link>, VITAL <link linkend="B4-9">[9]</link>, BUTLER <link linkend="B4-10">[10]</link>, iCore <link linkend="B4-11">[11]</link>, IoT.est <link linkend="B4-12">[12]</link> and OpenIoT <link linkend="B4-13">[13]</link> is presented. At the time of writing, most of these projects are still in progress.</para>
<para>This chapter is organized as follows: a brief overview of the selected Projects is presented in <link linkend="sec4.2">Section <xref linkend="sec4.2" remap="4.2"/></link>, including an overview of the application areas addressed by the considered IoT research projects and a consortium analysis by country and type of organization; then, in <link linkend="sec4.3">Section <xref linkend="sec4.3" remap="4.3"/></link> a summary of the projects&#x2019; pilots and demonstrators delivered by the projects is given.</para>
</section>
<section class="lev1" id="sec4.2" label="4.2" xreflabel="sec4.2">
<title>IoT Projects</title>
<para>In this section, the group of IoT projects being considered is presented. The remainder of this section presents an overall analysis on the ecosystems represented by the Projects and the application areas they address, followed by an overview of the demonstrators and pilots they deliver. Project-by-project detailed information is then reported in the subsections that complete this section.</para>
<para>In <link linkend="F4.1">Figure <xref linkend="F4.1" remap="4.1"/></link>, a map of the Organizations participating in the eleven Projects considered is depicted. As it is expected, the large majority of participants are from Europe. However, a strong collaboration with Japan can be seen. This is due to the fact that the ClouT project is part of a EU &#x2013; Japan collaboration and because Japanese partners are also present in two other projects; namely, iCore, IoT.est.</para>
<para>A more detailed view of the map, considering only the European countries is shown in <link linkend="F4.2">Figure <xref linkend="F4.2" remap="4.2"/></link>.</para>
<fig id="F4.1" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 4.1</label>
<caption><para>World countries participation in IoT EU-funded projects.</para></caption>
<graphic xlink:href="graphics/fig4_1.jpg"/>
</fig>
<fig id="F4.2" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 4.2</label>
<caption><para>European countries participation in IoT EU-funded projects.</para></caption>
<graphic xlink:href="graphics/fig4_2.jpg"/>
</fig>
<fig id="F4.3" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 4.3</label>
<caption><para>Consortium partners by continent.</para></caption>
<graphic xlink:href="graphics/fig4_3.jpg"/>
</fig>
<fig id="F4.4" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 4.4</label>
<caption><para>European countries in IoT EU-funded projects.</para></caption>
<graphic xlink:href="graphics/fig4_4.jpg"/>
</fig>
<para>The same data presented in <link linkend="F4.3">Figure <xref linkend="F4.3" remap="4.3"/></link> grouped by Continents is shown in <link linkend="F4.4">Figure <xref linkend="F4.4" remap="4.4"/></link>. In <link linkend="F4.3">Figure <xref linkend="F4.3" remap="4.3"/></link> a more detailed view of the European participation is shown. Spain, Italy and Germany are the Countries with highest involvement with 16%, 16% and 13% respectively, followed by France (7%), Greece (6%) and U.K. (5%).</para>
<para>In order to achieve successful results EU-funded projects&#x2019; consortia are built upon strong partnerships of leading European and extra-European Organizations, including industries, universities and research centers, as well as and Cities and Public Administrations.</para>
<para><link linkend="F4.5">Figure <xref linkend="F4.5" remap="4.5"/></link> shows the structure of the eleven projects&#x2019; consortia arranged by type of Organization. There is a rather balanced participation of Research Centers (25%), Large Industries (24%), SMEs (22%), and Universities (19%) with a minor presence of Cities and Public Administrations (10%).</para>
<fig id="F4.5" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 4.5</label>
<caption><para>Consortium composition by Partner type.</para></caption>
<graphic xlink:href="graphics/fig4_5.jpg"/>
</fig>
<para>IoT technologies are expected to foster innovation in a number of core European industrial sectors, including factory automation, sustainable energy, automotive and aerospace, food production and distribution, environmental monitoring. Furthermore, the future IoT will be a cornerstone for the development of smart cities with more conscious citizens living in a more efficient and sustainable fashion.</para>
<para>A tentative preview of which of the sectors will be impacted most can be seen from the data presented in <link linkend="F4.6">Figure <xref linkend="F4.6" remap="4.6"/></link>, where the application areas addressed by the eleven research projects considered in this chapter are shown (for the sake of clarity, it is worth mentioning that the majority of the projects considered were funded under a specific &#x201C;IoT for Smart City&#x201D; FP7 call).</para>
<fig id="F4.6" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 4.6</label>
<caption><para>Application areas addressed by IoT research projects.</para></caption>
<graphic xlink:href="graphics/fig4_6.jpg"/>
</fig>
<para>The remainder of this section details the relevant information on a project-by-project basis, enumerating the application areas targeted by each project together with a short description of the pilots and demonstrators deployed.</para>
<section class="lev2" id="sec4.2.1" label="4.2.1" xreflabel="sec4.2.1">
<title>ALMANAC</title>
<para>The ALMANAC project will develop an IoT platform that promotes integrated smarter city processes for green, citizen-centric and sustainable urban ecosystems.</para>
<para>The open software ALMANAC Smart City Platform (SCP) enables seamless integration of devices, services, and private and public data, as well as federation of existing services. This is achieved by using a set of basic building blocks that ease third-party application development.</para>
<para>The SCP also enables interoperation of different communication networks and heterogeneous IoT technologies. Experimentation of selected Smart City services and applications will be carried in the city of Turin, Italy.</para>
<section class="lev3" id="sec4.2.1.1" label="4.2.1.1" xreflabel="sec4.2.1.1">
<title>Application Areas</title>
<para>The applications areas covered by the projects are as following:
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>Smart City</para></listitem>
<listitem><para>Water Management</para></listitem>
<listitem><para>Waste Management</para></listitem>
<listitem><para>Citizen-Centric</para></listitem>
</itemizedlist></para>
</section>
<section class="lev3" id="sec4.2.1.2" label="4.2.1.2" xreflabel="sec4.2.1.2">
<title>Pilots and Demonstrators</title>
<section class="lev4" id="sec4.2.1.2.1" label="4.2.1.2.1" xreflabel="sec4.2.1.2.1">
<title>Smart Waste Collection Field Trial</title>
<para>ALMANAC is currently developing a field trial in Turin, Italy, implementing an innovative waste collection system. The initial deployment foresees the installation of: i) fill-level sensors in 2 Underground Ecological Islands (UEI), ii) controlled access modules for a subset of the monitored waste bins in the selected UEIs, and iii) weight sensors on-board of the waste collection trucks.</para>
<para>The smart waste collection field trial integrates information from an issue reporting and management application developed by the project using the ALMANAC SCP, which enables citizens to report issues and irregularities in the waste management service. The same application provides a feature that, based on information from sensors deployed in the field and feedback from citizens, allows waste collection routes modification and can be used by the service operator to optimize the waste collection service.</para>
<para>An extension of the field trial has been already evaluated and will be possibly deployed to include additional UEIs and a number of street level waste bins in different locations in the city of Turin.</para>
</section>
<section class="lev4" id="sec4.2.1.2.2" label="4.2.1.2.2" xreflabel="sec4.2.1.2.2">
<title>Smart Water Capillary Network</title>
<para>Proof of Concept demonstrator of the capillary network developed by ALMANAC for a water metering application. The Capillary Network provides the infrastructure to collect the data originated by different devices (sensors, meters, etc.) and ensures their collection in a ETSI M2M compliant service platform. The PoC consists of a smart water meter (flow meter and Ph sensor) sending data periodically using standard protocol &#x2013; through a concentrator with IP connection &#x2013; to the ALMANAC SCP, enabling both real-time and historical monitoring of water consumption data.</para>
</section>
<section class="lev4" id="sec4.2.1.2.3" label="4.2.1.2.3" xreflabel="sec4.2.1.2.3">
<title>Collaborative Citizen-centric application</title>
<para>ALMANAC is developing a citizen-centric application with the goal to demonstrate the SCP capabilities to provide access to open public data and integrate third-party services relevant to the citizens with other services provided by the platform. In order to achieve this, ALMANAC is implementing a co-design approach in which a selected group of citizens have been engaged to participate in the definition of the application and will test the application prototype providing relevant feedback to further refine it and assess its acceptance.</para>
</section>
</section>
</section>
<section class="lev2" id="sec4.2.2" label="4.2.2" xreflabel="sec4.2.2">
<title>ClouT</title>
<para>The overall concept of ClouT, a joint European-Japanese project, is leveraging the Cloud Computing as an enabler to bridge the Internet of Things with Internet of People via Internet of Services, to establish an efficient communication and collaboration platform exploiting all information sources to make the cities smarter and to help them facing the emerging challenges such as efficient energy management, economic growth and development.</para>
<section class="lev3" id="sec4.2.2.1" label="4.2.2.1" xreflabel="sec4.2.2.1">
<title>Application Areas</title>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>Smart City</para></listitem>
<listitem><para>Safety and Emergency Management</para></listitem>
<listitem><para>Smart Transport and Mobility</para></listitem>
<listitem><para>Citizen-centric</para></listitem>
<listitem><para>Smart Living</para></listitem>
</itemizedlist>
</section>
<section class="lev3" id="sec4.2.2.2" label="4.2.2.2" xreflabel="sec4.2.2.2">
<title>Pilots and Demonstrators</title>
<section class="lev4" id="sec4.2.2.2.1" label="4.2.2.2.1" xreflabel="sec4.2.2.2.1">
<title>Fujisawa field trial: Surfboard + Smile Coupon</title>
<para>The purpose of &#x201C;Eno-kama Info Surfboard&#x201D; and &#x201C;Smile Coupon&#x201D; field trial applications is to provide event information and traffic information in Fujisawa area to tourists in real time, in order to create a new route for tourists for sightseeing. These two applications are based on ClouT architecture and are deployed in Kamakura station in cooperation with Enoshima Electric Railway Co., Ltd. While &#x201C;Surfboard&#x201D; is providing city context information, &#x201C;Smile coupons&#x201D; is providing discounts at the local shops. The more you smile the greater the discount applied.</para>
</section>
<section class="lev4" id="sec4.2.2.2.2" label="4.2.2.2.2" xreflabel="sec4.2.2.2.2">
<title>Mitaka field trial: Paw collection</title>
<para>This application will help motivate elderly citizens to go out by providing interesting information such as event or city information provided by citizens, stores, event organizers and city. A Social Network Service (SNS) with integrated Sensor Data will motivate elderly people to go out more frequently and take longer walks, preventing them to need nursing care, by using an application called &#x201C;Paw Collection&#x201D;. Paw is a kind of People&#x2019;s experience that is posted as an article with sensor data on the SNS.</para>
</section>
<section class="lev4" id="sec4.2.2.2.3" label="4.2.2.2.3" xreflabel="sec4.2.2.2.3">
<title>Genova field trial: &#x201C;I don&#x2019;t risk&#x201D; (SEM<footnote id="fn4_1" label="1"><para>Safety and Emergency Management.</para></footnote> application context)</title>
<para>The purpose of this field trial is to inform citizens about good practices and general information about environmental risks and emergency situations, in order to reduce individual exposure to these risks. &#x201C;I don&#x2019;t risk&#x201D; application uses environmental and weather data from weather sensors, hydrometers, webcams, etc. and provides information to the citizens and the Civil Protection agency of Genova city.</para>
</section>
<section class="lev4" id="sec4.2.2.2.4" label="4.2.2.2.4" xreflabel="sec4.2.2.2.4">
<title>Santander field trial: Traffic Mobility Management</title>
<para>This field trial will enable citizens and visitors of Santander City to get access to enhanced urban mobility experience and to leverage city transportation resources efficiently. Vast amount of information generated in the city is processed in order to generate real time alerts and events about relevant city information.</para>
</section>
<section class="lev4" id="sec4.2.2.2.5" label="4.2.2.2.5" xreflabel="sec4.2.2.2.5">
<title>Sensorized garbage collection cars</title>
<para>Environmental sensors (CO, O<subscript>3</subscript>, NO<subscript>2</subscript>, pollen, luminance, humidity, UV, temperature and ambient noise) installed in garbage collection cars. By having garbage collection cars sensorized, the project is able to provide citywide information of the atmosphere to citizens and visitors in Fujisawa city.</para>
</section>
<section class="lev4" id="sec4.2.2.2.6" label="4.2.2.2.6" xreflabel="sec4.2.2.2.6">
<title>Pace of the city</title>
<para>Provide users with the capacity of utilizing their mobile phones to send in an anonymous way, physical sensing information, e.g. GPS coordinates, compass, environmental data such as noise, temperature. Users can also subscribe to services such as &#x201C;the pace of the city&#x201D;, where they can get alerts for specific types of events currently occurring in the city. Users can themselves also report the occurrence of such events, which will subsequently be propagated to other users that are subscribed to the corresponding types of events.</para>
</section>
</section>
</section>
<section class="lev2" id="sec4.2.3" label="4.2.3" xreflabel="sec4.2.3">
<title>OSMOSE</title>
<para>OSMOSE provides a roadmap and a technology platform that should support the transition and implementation of European SMEs of new business models and strategies in the digital world. The impact of OSMOSE is to provide already a middleware that is capable of addressing an increased asset connectivity to a digital enterprise. Through sensing enterprise capabilities OSMOSE should unlock new business models opportunities.</para>
<section class="lev3" id="sec4.2.3.1" label="4.2.3.1" xreflabel="sec4.2.3.1">
<title>Application Areas</title>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>Smart Manufacturing</para></listitem>
</itemizedlist>
</section>
<section class="lev3" id="sec4.2.3.2" label="4.2.3.2" xreflabel="sec4.2.3.2">
<title>Pilots and Demonstrators</title>
<section class="lev4" id="sec4.2.3.2.1" label="4.2.3.2.1" xreflabel="sec4.2.3.2.1">
<title>OSMOsis applications for Aerospace Domain</title>
<para>Proof of concept referred to a product operations monitoring and control use case using the flight simulators in AgustaWestland Italy.</para>
<para>The goal of this PoC is to assure the training continuity and continuously improve the system reliability focusing on software snags faster assessment and resolution and hardware faults prevention.</para>
</section>
<section class="lev4" id="sec4.2.3.2.2" label="4.2.3.2.2" xreflabel="sec4.2.3.2.2">
<title>OSMOsis applications for Automotive Domain</title>
<para>Engine Power Components (EPC) pilot in Spain is a proof of concept of OSMOSE. The proposed PoC is dedicated to manage the whole production process of camshafts, from its provisioning to its production, distribution and remanufacturing, if needed. The camshaft will be digitalized from its origin to its destination and all this information will be stored to keep the track of the whole life-cycle of a camshaft, reducing the risk of delivering camshaft with defects and having more data available to make decisions in real time about the changes in the process.</para>
</section>
</section>
</section>
<section class="lev2" id="sec4.2.4" label="4.2.4" xreflabel="sec4.2.4">
<title>RERUM</title>
<para>RERUM increases the trustworthiness of IoT providing an overall security, privacy and trust framework to address the citizens requirements for advanced, reliable, resilient and secure smart city applications that respect their privacy improving both devices and middleware functionalities.</para>
<section class="lev3" id="sec4.2.4.1" label="4.2.4.1" xreflabel="sec4.2.4.1">
<title>Application Areas</title>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>Smart City</para></listitem>
<listitem><para>Smart Transport and Mobility</para></listitem>
<listitem><para>Smart Environmental monitoring</para></listitem>
<listitem><para>Smart building/Smart Energy</para></listitem>
<listitem><para>Deployments, Pilots and Demonstrators</para></listitem>
</itemizedlist>
</section>
<section class="lev3" id="sec4.2.4.2" label="4.2.4.2" xreflabel="sec4.2.4.2">
<title>Pilots and Demonstrators</title>
<section class="lev4" id="sec4.2.4.2.1" label="4.2.4.2.1" xreflabel="sec4.2.4.2.1">
<title>RERUM Mote (ReMote<footnote id="fn4_2" label="2"><para><ulink url="http://zolertia.io/products">http://zolertia.io/products</ulink></para></footnote>)</title>
<para>ReMote is an innovative hardware IoT platform fully designed and developed based on the requirements set by the RERUM project. It is both powerful and low-power so that it can run the device-embedded security, privacy and reliability RERUM mechanisms, while consuming very low energy.</para>
</section>
<section class="lev4" id="sec4.2.4.2.2" label="4.2.4.2.2" xreflabel="sec4.2.4.2.2">
<title>Smart Transportation</title>
<para>This pilot utilizes mobile devices to gather traffic information throughout city areas in a privacy-preserving way, without disclosing any type of personal information of the users from their mobile phones. For the pilot, the devices will be installed on buses that traverse around the city area to measure the traffic at specific roads. Volunteer citizens will also be able to participate in the pilot by downloading the RERUM application and installing it on their devices as they move around the city.</para>
</section>
<section class="lev4" id="sec4.2.4.2.3" label="4.2.4.2.3" xreflabel="sec4.2.4.2.3">
<title>Smart Environmental monitoring</title>
<para>This pilot deals with the deployment of a secure and reliable system for gathering environmental monitoring measurements throughout city areas. This will be done in a secure and trustworthy way either by deploying sensor nodes at specific fixed locations or by installing sensors on top of buses and gathering the measurements at every bus stop. The goal is to ensure that no malicious users can intervene in the transmission of the measurements or gain unauthorized access to the system services.</para>
</section>
<section class="lev4" id="sec4.2.4.2.4" label="4.2.4.2.4" xreflabel="sec4.2.4.2.4">
<title>Home energy management</title>
<para>This pilot deals with the deployment of sensors for securely measuring the energy consumption of specific household appliances (e.g. air conditioning systems, PCs, lights, etc.) and extracting information and usage patterns so that guidelines for minimizing the energy consumption will be provided. At Heraklion the system will be installed in two buildings one old and one new &#x201C;green&#x201D; building. At Tarragona the system will be installed at municipal offices. This pilot deals with both improving the security of the system and preserving the privacy of the user data, ensuring that no external party can identify when the user is at home or usage patterns for the devices.</para>
</section>
<section class="lev4" id="sec4.2.4.2.5" label="4.2.4.2.5" xreflabel="sec4.2.4.2.5">
<title>Comfort quality monitoring</title>
<para>This pilot utilizes sensors for measuring securely the indoor air quality at buildings and extract information so that guidelines for improving the air quality will be provided. At Heraklion the system will be installed in the same two buildings as with the home energy management use case for comparing the results. At Tarragona the system will be installed at the municipal offices. Security of the system, privacy of the user data and trust in the system are key RERUM advances in such an application.</para>
</section>
</section>
</section>
<section class="lev2" id="sec4.2.5" label="4.2.5" xreflabel="sec4.2.5">
<title>SMARTIE</title>
<para>The SMARTIE project works on security, privacy and trust for data exchange between IoT devices and consumers of their information. Results are demonstrated in smart cities in Germany, Serbia and Spain. The vision of SMARTIE is to create a distributed framework to share large volumes of heterogeneous information for the use in smart-city applications, enabling end-to-end security and trust in information delivery for decision-making purposes following data owner&#x2019;s privacy requirements.</para>
<section class="lev3" id="sec4.2.5.1" label="4.2.5.1" xreflabel="sec4.2.5.1">
<title>Application Areas</title>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>Smart City</para></listitem>
<listitem><para>Smart Transport and Mobility</para></listitem>
</itemizedlist>
</section>
<section class="lev3" id="sec4.2.5.2" label="4.2.5.2" xreflabel="sec4.2.5.2">
<title>Pilots and Demonstrators</title>
<section class="lev4" id="sec4.2.5.2.1" label="4.2.5.2.1" xreflabel="sec4.2.5.2.1">
<title>Augmented Reality Based Smart Transport Service</title>
<para>Improving the management of the public transportation network in the city of Novi Sad to promote and encourage the use of sustainable transport modes and to provide time and cost benefits to travelers. Focusing initially on 2 routes within a city public bus transport network operated by a local transport company JGSP. Bus stops will be equipped with the Augmented Reality (AR) markers in the form of an image (e.g. logo or QR code). Devices to measure air pollution in the busses, an e-ticketing system and a mobile app providing touristic information and event suggestion, are also expected to be integrated to the pilot.</para>
</section>
</section>
</section>
<section class="lev2" id="sec4.2.6" label="4.2.6" xreflabel="sec4.2.6">
<title>SocIo Tal</title>
<para>SocIoTal designs key enablers for a reliable secure and trusted IoT environment facilitating the creation of a socially aware citizen-centric Internet of Things. It takes a citizen-centric approach towards creation of large-scale IoT solutions of interest to the society. SocIoTal provides secure and trusted tools that increase user confidence in the IoT environment.</para>
<section class="lev3" id="sec4.2.6.1" label="4.2.6.1" xreflabel="sec4.2.6.1">
<title>Application Areas</title>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>Smart City</para></listitem>
<listitem><para>Smart Living</para></listitem>
<listitem><para>Citizen-centric services</para></listitem>
</itemizedlist>
</section>
<section class="lev3" id="sec4.2.6.2" label="4.2.6.2" xreflabel="sec4.2.6.2">
<title>Pilots and Demonstrators</title>
<section class="lev4" id="sec4.2.6.2.1" label="4.2.6.2.1" xreflabel="sec4.2.6.2.1">
<title>Santander and Novisad trials</title>
<para>Enabling citizens and developers to develop new services using SocIoTal toolset. The initial set of trials is based on the output from co-creation workshops and the IoT meetups held in several cities. Examples are monitoring of lifts in the buildings, measuring happiness of a city as well as sharing data generated by citizen owned devices and navigating through the routes accessible to disabled people.</para>
</section>
</section>
</section>
<section class="lev2" id="sec4.2.7" label="4.2.7" xreflabel="sec4.2.7">
<title>VITAL</title>
<para>In the VITAL project, the future of Smart Cities, the project is developing a novel virtualization layer for the next generation of integrated and technology independent smart city operating systems in Europe.</para>
<section class="lev3" id="sec4.2.7.1" label="4.2.7.1" xreflabel="sec4.2.7.1">
<title>Application Areas</title>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>Smart City</para></listitem>
<listitem><para>Smart Transport and Mobility</para></listitem>
</itemizedlist>
</section>
<section class="lev3" id="sec4.2.7.2" label="4.2.7.2" xreflabel="sec4.2.7.2">
<title>Pilots and Demonstrators</title>
<section class="lev4" id="sec4.2.7.2.1" label="4.2.7.2.1" xreflabel="sec4.2.7.2.1">
<title>IoT-supported Urban Regeneration</title>
<para>Hosted in London&#x2019;s first Business Improvement District (B.I.D), namely CTU, in the Camden Borough of London. CTU will act as an Urban Regeneration Living Lab in order to develop and integrate regeneration-related services based on VITAL virtualization approach.</para>
</section>
<section class="lev4" id="sec4.2.7.2.2" label="4.2.7.2.2" xreflabel="sec4.2.7.2.2">
<title>IoT-enabled Smart Traffic Management</title>
<para>Development and validation in the city of Istanbul. Traffic management and analysis functionalities based on multi-source data sets. End-users include citizens and the city authorities</para>
</section>
</section>
</section>
<section class="lev2" id="sec4.2.8" label="4.2.8" xreflabel="sec4.2.8">
<title>BUTLER (Completed)</title>
<para>BUTLER aimed to design and demonstrate the first prototype of a comprehensive, pervasive and effective Context-Aware information system, operating transparently and seamlessly across various scenarios towards a unified smart urban environment.</para>
<section class="lev3" id="sec4.2.8.1" label="4.2.8.1" xreflabel="sec4.2.8.1">
<title>Application Areas</title>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>Smart City</para></listitem>
<listitem><para>Smart Health</para></listitem>
<listitem><para>Smart Transport</para></listitem>
<listitem><para>Smart Living</para></listitem>
</itemizedlist>
</section>
<section class="lev3" id="sec4.2.8.2" label="4.2.8.2" xreflabel="sec4.2.8.2">
<title>Pilots and Demonstrators</title>
<section class="lev4" id="sec4.2.8.2.1" label="4.2.8.2.1" xreflabel="sec4.2.8.2.1">
<title>SmartOffice Trial</title>
<para>Deployment of IoT technologies based on the BUTLER platform in three of the offices of the project partners. The three trials shared common functional requirements (information sharing, office wellbeing), all three sites participated in a common PoC of IoT information sharing: coffee consumption data shared between the offices</para>
</section>
<section class="lev4" id="sec4.2.8.2.2" label="4.2.8.2.2" xreflabel="sec4.2.8.2.2">
<title>SmartShopping Trial</title>
<para>Processing in real time of the city status for creating alerts for the merchants, to inform about potential presence of customers that fit with business profile.</para>
</section>
<section class="lev4" id="sec4.2.8.2.3" label="4.2.8.2.3" xreflabel="sec4.2.8.2.3">
<title>SmartParking Trial</title>
<para>Smart Parking Management System. A group of users tested during various days the SmartParking devices, the reservation system and the mobile app.</para>
</section>
<section class="lev4" id="sec4.2.8.2.4" label="4.2.8.2.4" xreflabel="sec4.2.8.2.4">
<title>SmartHealth Trial</title>
<para>Involving IoT technologies at home for health monitoring with the aim of helping people to control certain diseases. TECNALIA has developed different devices and has integrated them in the BUTLER platform (e.g. fall detector, emotion detector, medication intake assistant, telecare reporting service, videoconference for medical and risk prevention service).</para>
</section>
<section class="lev4" id="sec4.2.8.2.5" label="4.2.8.2.5" xreflabel="sec4.2.8.2.5">
<title>SmartTransport Trial</title>
<para>Enabling public transportation systems use without taking care of pricing or ticketing leveraging on IoT solutions (i.e. e-ticketing, save child group monitor and tags). Real field trial took place in collaboration with TU Dresden ITVS and Fraunhofer IVI at AutoTRAM Extra Grand in June to October 2014.</para>
</section>
</section>
</section>
<section class="lev2" id="sec4.2.9" label="4.2.9" xreflabel="sec4.2.9">
<title>iCore</title>
<para>iCore addressed two key issues in the context of the Internet of Things: abstraction of the technological heterogeneity deriving from the vast amounts of objects, while enhancing reliability; and considering the views of different users/stakeholders (owners of objects &#x0026; communication means) to ensure proper application provision, business integrity and, therefore, maximize exploitation opportunities. The iCore proposed solution is a cognitive framework reusable for various and diverse applications.</para>
<section class="lev3" id="sec4.2.9.1" label="4.2.9.1" xreflabel="sec4.2.9.1">
<title>Application Areas</title>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>Smart City</para></listitem>
<listitem><para>Smart Transport and Mobility</para></listitem>
<listitem><para>Smart Health</para></listitem>
<listitem><para>Smart Living</para></listitem>
<listitem><para>Smart Manufacturing</para></listitem>
<listitem><para>Smart Building</para></listitem>
</itemizedlist>
</section>
<section class="lev3" id="sec4.2.9.2" label="4.2.9.2" xreflabel="sec4.2.9.2">
<title>Pilots and Demonstrators</title>
<section class="lev4" id="sec4.2.9.2.1" label="4.2.9.2.1" xreflabel="sec4.2.9.2.1">
<title>Pilot at Trento Hospital</title>
<para>The pilot is setup at the department of neonatology of the central hospital of Trento, Italy. The pilot addresses tracking of portable medical equipment (in the range of few tens of items) inside the unit as well as from/to other relevant units, such as gynecology and emergency service. Information about usage and movement of devices will be used to produce predictive models about statistical usage and location of items to support both, end-users (doctors and nurses as well as hospital procuring and maintenance departments) as well as indoor location developers for reducing energy consumption of their tracking system.</para>
</section>
<section class="lev4" id="sec4.2.9.2.2" label="4.2.9.2.2" xreflabel="sec4.2.9.2.2">
<title>Smart Tour in the City</title>
<para>This trial aimed to apply aspects of cognitive management for IoT self-management in the scope of a Smart tour in the city application, involving actual, diverse users. Part of the trial took take place in Athens and involved users visiting different sites around the city. Another major part of the trial concerned the exploitation of the SmartSantander infrastructure for conducting experiments for the large scale evaluation and validation of the integrated iCore architecture and concepts.</para>
</section>
<section class="lev4" id="sec4.2.9.2.3" label="4.2.9.2.3" xreflabel="sec4.2.9.2.3">
<title>Smart Urban security</title>
<para>Urban Security and VIP protection Demonstrator. A surveillance system focused on VIP protection during a visit within a big and crowded exhibition area. Police Control and Command (C2) truck close to the area with dedicated surveillance applications is monitoring the VIP visit through a deployed wireless (video and chemical) sensors network also connected to exhibition area CCTV system and chemical sensors. When a dirty bomb explodes generating toxic cloud dispersal, VIP evacuation is triggered and managed up to a decided exit according to threats tracking (toxic cloud, crowds). iCore cognitive platform embedded in C2 truck manages in real time optimal selection of video streaming and use of available WSN bandwidth.</para>
</section>
<section class="lev4" id="sec4.2.9.2.4" label="4.2.9.2.4" xreflabel="sec4.2.9.2.4">
<title>Smart Home</title>
<para>IoT self-management aspects through cognitive functionalities in the scope of a Smart Home. The prototype comprises, apart from software components for the various functional components, Arduino platforms combined with various sensors and actuators such as temperature, humidity, luminosity, body pulse and motion detection sensors, accelerometer, lamp, fan/heating and buzzer. Software technologies used for the implementation include RESTful Web Services, JSON, RDF, SPARQL, Sesame API, etc.</para>
</section>
<section class="lev4" id="sec4.2.9.2.5" label="4.2.9.2.5" xreflabel="sec4.2.9.2.5">
<title>Task-based Smart IoT</title>
<para>Testbed environment that recommends appropriate tasks as a composition of IoT devices and their services. It is implemented in two rooms: a seminar room and a resting place. The seminar room has various smart objects like projector, screen, light, robot vacuum cleaner, flower pot, temperature/humidity/light sensor, and air conditioner (total 7 objects). The resting place includes smart board screen, smart fridge, and temperature/humidity/light sensor (total 3 objects). Basically the Task-based Smart IoT Prototype can interact with any user who has a smartphone installed with a client application. Based on scenarios including group tasks such as meeting, watching a movie, gaming, etc., the task-based Smart IoT Prototype properly supports up to 10 users.</para>
</section>
<section class="lev4" id="sec4.2.9.2.6" label="4.2.9.2.6" xreflabel="sec4.2.9.2.6">
<title>Smart City: Transportation</title>
<para>Demonstrates the virtualization and use of ICT objects in Automotive industry, to create, configure and use mobility functions and services while driving and, in a seamless way, also in pre-trip and post-trip services, linking to smart home and smart meeting. Although the focus is on a single driver, data provision from several cars will also be addressed, for the mobility management in a smart city. Major aspects and challenges are the availability of objects within the vehicle and from the outside world, considering the vehicle as a complex and autonomous eco-system and not an always connected environment. Another topic addressed is context awareness using cognitive technologies.</para>
</section>
<section class="lev4" id="sec4.2.9.2.7" label="4.2.9.2.7" xreflabel="sec4.2.9.2.7">
<title>Smart Office</title>
<para>Demonstrates the capability of managing the whole lifecycle of a meeting, from its organization to its execution and wrap-up, while re-using already existing IoT devices (smartphones, tablets, smart panels). This is achieved through the development of appropriate Virtual Object (VO) containers for these devices that enable them to become part of an iCore ecosystem, while appropriate Composite VOs at the back-end are able to monitor the meeting and provide the required functionalities for supporting a variety of service requests, ranging from sending out the meeting invitations to supporting the indoor navigation of participants to the meeting venue, the recording of the meeting and the &#x201C;attention-span&#x201D; management (smart break) to the eventual wrap-up of the meeting with the uploading of the meeting recordings to a designated area and the notification of the participants for their offline availability.</para>
</section>
<section class="lev4" id="sec4.2.9.2.8" label="4.2.9.2.8" xreflabel="sec4.2.9.2.8">
<title>Smart cold chain logistics</title>
<para>The domain implies high complexity and high risks because food and pharmaceutical goods are exposed to increasingly long and complex supply chains with many dangers of poor temperature control, delays and physical mishandling. The prototype improves the transportation process by monitoring the state of the products during transportation and by early warnings when the goods are not stored according to clients&#x2019; requirements.</para>
</section>
</section>
</section>
<section class="lev2" id="sec4.2.10" label="4.2.10" xreflabel="sec4.2.10">
<title>IoT.est (Completed)</title>
<para>The IoT.est project demonstrates the whole service creation life cycle for IoT services. IoT services can be regarded as being, in principle, similar to any classical service with the marked distinction that part of the service instantiations relies on information obtained from IoT devices (sensor or other sources as well as actuation). Generation of test cases, testing, service-redefinition as well as monitoring will be automated (or at least semi-automated). The four phases of the IoT service life cycle are therefore enhanced with testing and monitoring facilities at different stages of the cycle.</para>
<section class="lev3" id="sec4.2.10.1" label="4.2.10.1" xreflabel="sec4.2.10.1">
<title>Application Areas</title>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>IoT service creation, testing and deployment</para></listitem>
</itemizedlist>
</section>
<section class="lev3" id="sec4.2.10.2" label="4.2.10.2" xreflabel="sec4.2.10.2">
<title>Pilots and Demonstrators</title>
<section class="lev4" id="sec4.2.10.2.1" label="4.2.10.2.1" xreflabel="sec4.2.10.2.1">
<title>IoT Services Testing</title>
<para>The &#x201C;EEBuildingSim&#x201D; exposes four types of simulated IoT resources: temperature sensors, window actuators, AC units, as well as heaters, currently exposed as single atomic services. These services will be accompanied by a set of &#x201C;smarter&#x201D; atomic services which will include some form of embedded logic combining sensing and actuation into a single service: basic temperature regulator, advanced temperature regulator and follow the fire service.</para>
<para>Three scenarios considered for further PoC demonstrators:
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>Emergency &#x2013; Smart Events Scenario</para></listitem>
<listitem><para>Energy &#x2013; Energy Efficient Buildings Scenario</para></listitem>
<listitem><para>Healthcare &#x2013; Well Being Scenario</para></listitem>
</itemizedlist></para>
</section>
</section>
</section>
<section class="lev2" id="sec4.2.11" label="4.2.11" xreflabel="sec4.2.11">
<title>OpenIoT</title>
<para>OpenIoT is a open source platform supporting semantic interoperability between sensor data silos and also for enabling Internet of Things semantically-annotated services in the cloud.</para>
<section class="lev3" id="sec4.2.11.1" label="4.2.11.1" xreflabel="sec4.2.11.1">
<title>Application Areas</title>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>Smart City</para></listitem>
<listitem><para>Smart Transport and Mobility</para></listitem>
<listitem><para>Smart Health</para></listitem>
<listitem><para>Smart Living</para></listitem>
<listitem><para>Smart Manufacturing</para></listitem>
<listitem><para>Smart Building</para></listitem>
</itemizedlist>
</section>
<section class="lev3" id="sec4.2.11.2" label="4.2.11.2" xreflabel="sec4.2.11.2">
<title>Pilots and Demonstrators</title>
<section class="lev4" id="sec4.2.11.2.1" label="4.2.11.2.1" xreflabel="sec4.2.11.2.1">
<title>IoT-Smart City &#x2013; Crowdsensing Quality of Air Monitoring Trial</title>
<para>Realized through an opportunistic Mobile Crowdsensing application involving volunteers carrying smartphones and air quality sensors that contribute the sensed data to the OpenIoT platform.</para>
</section>
<section class="lev4" id="sec4.2.11.2.2" label="4.2.11.2.2" xreflabel="sec4.2.11.2.2">
<title>IoT-Intelligent Manufacturing &#x2013; Smart Industry Trial</title>
<para>Means for dynamically selecting production process monitoring sensor information, as well as for structuring this information on KPIs and make them available in form of customized and created on the fly. Validated in the paper/packaging industry in processes like printing, die-cutting and gluing/folding.</para>
</section>
<section class="lev4" id="sec4.2.11.2.3" label="4.2.11.2.3" xreflabel="sec4.2.11.2.3">
<title>IoT Enabled (Smart) Campus Guide</title>
<para>The University Smart Campus (synonymous with CampusGuide) is an application framework to support students, teachers and guest of a university. It offers features like information&#x2019;s about buildings and rooms, reservations of meetings rooms and workplaces, and collaboration between people.</para>
</section>
<section class="lev4" id="sec4.2.11.2.4" label="4.2.11.2.4" xreflabel="sec4.2.11.2.4">
<title>Silver Angel &#x2013; IoT Enabled Living and Communication in Smart Cities</title>
<para>The purpose of the Silver Angel application is to help ageing citizens live independently in their own homes, and to facilitate meeting more often with friends and relatives. It offers three Silver Angel services namely Smart Meeting, Issue Reporting and Alarms.</para>
</section>
<section class="lev4" id="sec4.2.11.2.5" label="4.2.11.2.5" xreflabel="sec4.2.11.2.5">
<title>IoT-Large Scale Deployments &#x2013; Phenonet Trial</title>
<para>&#x2018;Phenonet&#x2019; describes the network of wireless sensor nodes collecting information over a field of experimental crops. The term &#x201C;Phenomics&#x201D; describes the study of how the genetic makeup of an organism determines its appearance, function, growth and performance. Plant phenomics is a cross-disciplinary approach, studying the connection from cell to leaf to whole plant and from crop to canopy.</para>
</section>
<section class="lev4" id="sec4.2.11.2.6" label="4.2.11.2.6" xreflabel="sec4.2.11.2.6">
<title>OpenIot middleware platform and Virtual Development Kit</title>
<para>The OpenIoT middleware was released in May 2013. and from September 2013 was made fully available to the Open Source community for creating real time IoT services on demand and enable interoperability between vertical IoT solutions and interconnect data silos. The OpenIoT framework (BETA version v0.1.1) has been released via the github project management portal <ulink url="https://github.com/OpenIotOrg/openiot">https://github.com/OpenIotOrg/openiot</ulink>. Likewise the first version of the Virtual Development Kit &#x2013; OpenIoT-VDK (running Linux) with the complete OpenIoT platform pre-installed and preconfigured for use/development has been released. It can be downloaded from the OpenIoT github wiki: <ulink url="https://github.com/OpenIotOrg/openiot/wiki/Downloads">https://github.com/OpenIotOrg/openiot/wiki/Downloads</ulink>. The Virtual Development Kit (OpenIoT-VDK) developed and implemented, features the OpenIoT latest release i.e. v0.1.1 and it&#x2019;s size is 5, 7 GB. The OpenIoT-VDK facilitates the learning and use of the OpenIoT framework for an easy adoption and it is industry friendly under LGPL licence and totally open for academic purposes. The OpenIoT-VDK instance deploys the IoT service delivery model facilitating the validation of use cases by using the OpenIoT platform.</para>
</section>
</section>
</section>
</section>
<section class="lev1" id="sec4.3" label="4.3" xreflabel="sec4.3">
<title>IoT Projects&#x2019; Pilots and Demonstrators</title>
<para>In order to analyze the tangible outcomes of the group of IoT projects being considered, two subsets of outcomes will be presented demonstrators and pilots.</para>
<para>In this document, a demonstrator is intended as a system that attempts to emulate the full system or sub-system behavior, in order to test its main capabilities. A pilot instead, is understood as the deployment of the full-system, tested against a subset of the general intended end-users with the goal to better appreciate how the system will be used in the field in order to refine it, if necessary.</para>
<para>In this section, information regarding the demonstrators and pilots deployed by the group of IoT projects being following information is given:
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>Name of the deployment and project</para></listitem>
<listitem><para>Status of the deployment (P: planned, O: ongoing, F: finished)</para></listitem>
<listitem><para>Location (country)</para></listitem>
<listitem><para>Dimension (size of the deployment in number of users/devices/data set/area)</para></listitem>
<listitem><para>Notes including additional information regarding the dimension and devices deployed by the project</para></listitem>
</itemizedlist></para>
<para>In <link linkend="T4.1">Table <xref linkend="T4.1" remap="4.1"/></link> and <link linkend="T4.2">Table <xref linkend="T4.2" remap="4.2"/></link>, the demonstrators and pilots from the selected group of IoT projects are presented respectively.</para>
<table-wrap position="float" id="T4.1">
<label>Table 4.1</label>
<caption><para>Description of the Demonstrators of the considered IoT projects</para></caption>
<table cellspacing="5" cellpadding="5" frame="hsides" rules="all" border="1">
<thead>
<tr>
<th><para>Project</para></th>
<th><para>Demonstrator</para></th>
<th><para>Location</para></th>
<th><para>Notes</para></th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top"><para>ALMANAC</para></td>
<td valign="top"><para>Smart Water Capillary Network</para></td>
<td valign="top"><para>Italy</para></td>
<td valign="top"><para>Telecom Italia Labs</para></td>
</tr>
<tr>
<td/>
<td valign="top"><para>Collaborative Citizen-centric application</para></td>
<td valign="top"><para>Italy</para></td>
<td valign="top"><para>Co-designed and tested by the SHARING<footnote id="fn4_3" label="3"><para><ulink url="http://www.sharing.to.it/sharingHtml.html">http://www.sharing.to.it/sharingHtml.html</ulink></para></footnote> community</para></td></tr>
<tr>
<td valign="top"><para>RERUM</para></td>
<td valign="top"><para>ReMote</para></td>
<td valign="top"><para>n.a.</para></td>
<td valign="top"><para>Off-the-shelf IoT hardware platform</para></td>
</tr>
<tr>
<td valign="top"><para>OSMOSE</para></td>
<td valign="top"><para>Aviation PoC (AgustaWestland)</para></td>
<td valign="top"><para>Italy</para></td>
<td/>
</tr>
<tr>
<td/>
<td valign="top"><para>Automotive proof-of-concept scenario (EPC)</para></td>
<td valign="top"><para>Spain</para></td>
<td/>
</tr>
<tr>
<td valign="top"><para>iCore</para></td>
<td valign="top"><para>Smart Home</para></td>
<td valign="top"><para>Greece, Germany</para></td>
<td/>
</tr>
<tr>
<td/>
<td valign="top"><para>Task-based Smart IoT</para></td>
<td valign="top"><para>n.a.</para></td>
<td valign="top"><para>seminar room</para></td>
</tr>
<tr>
<td/>
<td valign="top"><para>Smart City: Transportation</para></td>
<td valign="top"><para>Italy</para></td>
<td/>
</tr>
<tr>
<td/>
<td valign="top"><para>Smart Office</para></td>
<td valign="top"><para>UK, Spain</para></td>
<td/>
</tr>
<tr>
<td/>
<td valign="top"><para>Smart cold chain logistics</para></td>
<td valign="top"><para>n.a.</para></td>
<td valign="top"><para>no specific location</para></td>
</tr>
<tr>
<td valign="top"><para>IoT.est</para></td>
<td valign="top"><para>IoT Services Testing</para></td>
<td valign="top"><para>virtual machines</para></td>
<td valign="top"><para>no specific location</para></td>
</tr>
<tr>
<td valign="top"><para>OpenIoT</para></td>
<td valign="top"><para>OpenIot middleware platform and Virtual Development Kit</para></td>
<td valign="top"><para>n.a.</para></td>
<td valign="top"><para><ulink url="https://github.com/ OpenIotOrg/openiot">https://github.com/ OpenIotOrg/openiot</ulink></para></td>
</tr>
</tbody>
</table>
</table-wrap>
<table-wrap position="float" id="T4.2">
<label>Table 4.2</label>
<caption><para>Description of the Pilots of the considered IoT projects</para></caption>
<table cellspacing="5" cellpadding="5" frame="hsides" rules="all" border="1">
<thead>
<tr>
<th><para>Project</para></th>
<th><para>Pilot</para></th>
<th><para>Status</para></th>
<th><para>Location</para></th>
<th><para>Dimension</para></th>
<th><para>Notes</para></th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top"><para>ALMANAC</para></td>
<td valign="top"><para>Smart Waste Collection Field Trial</para></td>
<td valign="top"><para>O</para></td>
<td valign="top"><para>Turin, Italy</para></td>
<td valign="top"><para>8</para></td>
<td valign="top"><para>8 waste bins equipped with fill-level sensors and controlled access<footnote id="fn4_4" label="4"><para>Only a subset of the waste bins will be initially equipped with controlled access modules.</para></footnote> modules, participants reporting issues using the mobile app</para></td>
</tr>
<tr>
<td valign="top"><para>ClouT</para></td>
<td valign="top"><para>Fujisawa field trial: Surfboard &#x0026; Smile Coupon</para></td>
<td valign="top"><para>O</para></td>
<td valign="top"><para>Fujisawa, Japan</para></td>
<td valign="top"><para>150</para></td>
<td valign="top"><para>150 users plus sensors, SNS and websites</para></td>
</tr>
<tr>
<td/>
<td valign="top"><para>Mitaka field trial: Paw collection</para></td>
<td valign="top"><para>F</para></td>
<td valign="top"><para>Mitaka, Japan</para></td>
<td valign="top"><para>60</para></td>
<td valign="top"><para>Users using the mobile app</para></td>
</tr>
<tr>
<td/>
<td valign="top"><para>Genova field trial: &#x201C;I don&#x2019;t risk&#x201D;</para></td>
<td valign="top"><para>F</para></td>
<td valign="top"><para>Genoa, Italy</para></td>
<td valign="top"><para>3000</para></td>
<td valign="top"><para>Users from the Genoa City</para></td>
</tr>
<tr>
<td/>
<td valign="top"><para>Santander field trial: Traffic Mobility Management</para></td>
<td valign="top"><para>O</para></td>
<td valign="top"><para>Santander, Spain</para></td>
<td valign="top"><para>&#x003E;1000</para></td>
<td valign="top"><para>Traffic, environmental, parking and noise sensors</para></td>
</tr>
<tr>
<td/>
<td valign="top"><para>Sensorise garbage collection cars</para></td>
<td valign="top"><para>O</para></td>
<td valign="top"><para>Fujisawa, Japan</para></td>
<td valign="top"><para>&#x003E;10</para></td>
<td valign="top"><para>Sensors and GPS systems installed in cars</para></td>
</tr>
<tr>
<td/>
<td valign="top"><para>Pace of the city</para></td>
<td valign="top"><para>F</para></td>
<td valign="top"><para>Santander, Spain</para></td>
<td valign="top"><para>&#x003E;100</para></td>
<td valign="top"><para>Users in the city</para></td>
</tr>
<tr>
<td valign="top"><para>RERUM</para></td>
<td valign="top"><para>Smart transportation</para></td>
<td valign="top"><para>P</para></td>
<td valign="top"><para>Greece, Spain</para></td>
<td valign="top"><para>40 + 30</para></td>
<td valign="top"><para>40 mobile devices in buses, 30 users devices</para></td>
</tr>
<tr>
<td/>
<td valign="top"><para>Environmental monitoring</para></td>
<td valign="top"><para>O + P</para></td>
<td valign="top"><para>Greece, Spain</para></td>
<td valign="top"><para>50 + 20</para></td>
<td valign="top"><para>Sensor nodes for environmental monitoring</para></td>
</tr>
<tr>
<td/>
<td valign="top"><para>Home energy management</para></td>
<td valign="top"><para>P</para></td>
<td valign="top"><para>Greece, Spain</para></td>
<td valign="top"><para>10 + 10</para></td>
<td valign="top"><para>Sensors for energy consumption</para></td>
</tr>
<tr>
<td/>
<td valign="top"><para>Comfort quality monitoring</para></td>
<td valign="top"><para>P</para></td>
<td valign="top"><para>Greece, Spain</para></td>
<td valign="top"><para>10 + 10</para></td>
<td valign="top"><para>Sensor nodes for environmental monitoring</para></td>
</tr>
<tr>
<td valign="top"><para>SMARTIE</para></td>
<td valign="top"><para>Augmented Reality Based Smart Transport Service</para></td>
<td valign="top"><para>n.a</para></td>
<td valign="top"><para>Serbia</para></td>
<td valign="top"><para>15</para></td>
<td valign="top"><para>Devices to measure air pollution, QR codes, mobile app</para></td>
</tr>
<tr>
<td valign="top"><para>SocIoTal</para></td>
<td valign="top"><para>Santander and Novisad trials</para></td>
<td valign="top"><para>O</para></td>
<td valign="top"><para>Spain, Serbia</para></td>
<td valign="top"><para>&#x003E;100</para></td>
<td valign="top"><para>Participants, data collected from their devices and behaviors</para></td>
</tr>
<tr>
<td valign="top"><para>VITAL</para></td>
<td valign="top"><para>IoT-supported Urban Regeneration</para></td>
<td valign="top"><para>P</para></td>
<td valign="top"><para>UK</para></td>
<td valign="top"><para>n.a.</para></td>
<td valign="top"><para>Mobile Phones, FootFall Systems, CCTV cameras, various open data sources</para></td>
</tr>
<tr>
<td/>
<td valign="top"><para>IoT-enabled Smart Traffic Management</para></td>
<td valign="top"><para>P</para></td>
<td valign="top"><para>Turkey</para></td>
<td valign="top"><para>500 + 500 + 250 + 35</para></td>
<td valign="top"><para>500 traffic cameras, 500 road sensors; 250 Bluetooth sensors; 35 weather sensors</para></td>
</tr>
<tr>
<td valign="top"><para>BUTLER</para></td>
<td valign="top"><para>SmartOffice Trial</para></td>
<td valign="top"><para>F</para></td>
<td valign="top"><para>France, Italy, Switzerland</para></td>
<td valign="top"><para>25 + 15 + 25</para></td>
<td valign="top"><para>Users in the three different locations</para></td>
</tr>
<tr>
<td/>
<td valign="top"><para>SmartShopping Trial</para></td>
<td valign="top"><para>F</para></td>
<td valign="top"><para>Spain</para></td>
<td valign="top"><para>100 + 150 + 100 + 400</para></td>
<td valign="top"><para>100 restaurants, bars and hotels, 150 shops</para></td>
</tr>
<tr>
<td/>
<td valign="top"><para>SmartParking Trial</para></td>
<td valign="top"><para>F</para></td>
<td valign="top"><para>Spain</para></td>
<td valign="top"><para>40 + 20</para></td>
<td valign="top"><para>100 merchants, 400 End-users</para></td>
</tr>
<tr>
<td/>
<td valign="top"><para>SmartHealth Trial</para></td>
<td valign="top"><para>F</para></td>
<td valign="top"><para>Spain</para></td>
<td valign="top"><para>50 + 1</para></td>
<td valign="top"><para>4 parking lots, with 10 parking spaces per lot under control, 3 trials of 20 people</para></td>
</tr>
<tr>
<td/>
<td valign="top"><para>SmartTransport Trial</para></td>
<td valign="top"><para>F</para></td>
<td valign="top"><para>Germany</para></td>
<td valign="top"><para>50</para></td>
<td valign="top"><para>50 final users, 1 Doctor</para></td>
</tr>
<tr>
<td valign="top"><para>iCore</para></td>
<td valign="top"><para>Pilot at Trento Hospital</para></td>
<td valign="top"><para>F</para></td>
<td valign="top"><para>Italy</para></td>
<td valign="top"><para>&#x003E;50</para></td>
<td valign="top"><para>50 tags have been deployed on as many portable devices inside the hospital</para></td>
</tr>
<tr>
<td/>
<td valign="top"><para>Smart Tour in the City</para></td>
<td valign="top"><para>F</para></td>
<td valign="top"><para>Greece</para></td>
<td valign="top"><para>75</para></td>
<td valign="top"><para>75 traffic and environment sensors</para></td>
</tr>
<tr>
<td/>
<td valign="top"><para>Smart Urban security</para></td>
<td valign="top"><para>F</para></td>
<td valign="top"><para>France</para></td>
<td valign="top"><para>25 + 25 + 4 + 10</para></td>
<td valign="top"><para>Simulated exhibition area CCTV system (25 cameras); Simulated exhibition area chemical sensors network (25 sensors), simulated portable video cameras and chemical sensors (4 undercover policemen); WSN with 10 nodes.</para></td>
</tr>
<tr>
<td valign="top"><para>OpenIoT</para></td>
<td valign="top"><para>IoT-Smart City &#x2013; Crowdsensing Quality of Air Monitoring Trial</para></td>
<td valign="top"><para>O</para></td>
<td valign="top"><para>Croatia</para></td>
<td valign="top"><para>16000</para></td>
<td valign="top"><para>Data set of 16.835 measurements, crossed in distance of 758.6km, covered area 144 km&#x005E;2</para></td>
</tr>
<tr>
<td/>
<td valign="top"><para>IoT-Intelligent Manufacturing &#x2013; Smart Industry Trial</para></td>
<td valign="top"><para>O</para></td>
<td valign="top"><para>Greece</para></td>
<td valign="top"><para>20</para></td>
<td valign="top"><para>20+ sensors in manufacturing plants (optical diffusion sensors, image sensors, laser barcode scanners temperature sensors, weight sensors and RFID sensors)</para></td>
</tr>
<tr>
<td/>
<td valign="top"><para>IoT Enabled (Smart) Campus Guide</para></td>
<td valign="top"><para>O</para></td>
<td valign="top"><para>Germany</para></td>
<td valign="top"><para>20</para></td>
<td valign="top"><para>20+ Mobile Phones, RFID tagged objects, data sources/streams</para></td>
</tr>
<tr>
<td/>
<td valign="top"><para>Silver Angel &#x2013; IoT Enabled Living and Communication in Smart Cities</para></td>
<td valign="top"><para>O</para></td>
<td valign="top"><para>Germany</para></td>
<td valign="top"><para>n.a.</para></td>
<td valign="top"><para>Mobile phones (for citizen reporting) used along with open data from public administration</para></td>
</tr>
<tr>
<td/>
<td valign="top"><para>IoT-Large Scale Deployments &#x2013; Phenonet Trial</para></td>
<td valign="top"><para>F</para></td>
<td valign="top"><para>Australia</para></td>
<td valign="top"><para>n.a.</para></td>
<td valign="top"><para>&#x2013;</para></td>
</tr>
</tbody>
</table>
</table-wrap>
</section>
<section class="lev1" id="sec4.4" label="4.4" xreflabel="sec4.4">
<title>Summary</title>
<para>A group of IoT research projects were presented in this chapter. An overall as well as a detailed analysis of the target application areas they address, their consortium structure (i.e. by country and type of organization) and the pilots, demonstrators and other tangible outcomes they intend to deliver by the date of completion was presented.</para>
</section>
<section class="lev1" id="sec4.5" label="4.5" xreflabel="sec4.5">
<title>List of Contributors</title>
<table-wrap position="float">
<table cellspacing="5" cellpadding="5" frame="hsides" rules="all" border="1">
<thead>
<tr>
<th><para>Project</para></th>
<th><para>Name</para></th>
<th><para>Organisation</para></th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top"><para>ALMANAC</para></td>
<td valign="top"><para>Claudio Pastrone</para></td>
<td valign="top"><para>ISMB</para></td>
</tr>
<tr>
<td valign="top"><para>ClouT</para></td>
<td valign="top"><para>Levent Gurgen</para></td>
<td valign="top"><para>CEA-LETI</para></td>
</tr>
<tr>
<td/>
<td valign="top"><para>Jose Antonio Galache</para></td>
<td valign="top"><para>Universidad de Cantabria</para></td>
</tr>
<tr>
<td valign="top"><para>OSMOSE</para></td>
<td valign="top"><para>Sergio Gusmeroli</para></td>
<td valign="top"><para>TXT e-solutions</para></td>
</tr>
<tr>
<td/>
<td valign="top"><para>Roberta Caso</para></td>
<td valign="top"><para>Reply</para></td>
</tr>
<tr>
<td/>
<td valign="top"><para>Gabriella Monteleone</para></td>
<td valign="top"><para>Piksel</para></td>
</tr>
<tr>
<td valign="top"><para>RERUM</para></td>
<td valign="top"><para>Elias Tragos</para></td>
<td valign="top"><para>ICS-FORTH</para></td>
</tr>
<tr>
<td valign="top"><para>SMARTIE</para></td>
<td valign="top"><para>Boris Pokric</para></td>
<td valign="top"><para>DunavNet</para></td>
</tr>
<tr>
<td valign="top"><para>SocIoTal</para></td>
<td valign="top"><para>Klaus Moessner</para></td>
<td valign="top"><para>Surrey University</para></td>
</tr>
<tr>
<td/>
<td valign="top"><para>Srdjan Krco</para></td>
<td valign="top"><para>DunavNet</para></td>
</tr>
<tr>
<td valign="top"><para>VITAL</para></td>
<td valign="top"><para>John Soldatos</para></td>
<td valign="top"><para>Athens Information Technology</para></td>
</tr>
<tr>
<td/>
<td valign="top"><para>Gregor Schiele</para></td>
<td valign="top"><para>INSIGHT Centre</para></td>
</tr>
<tr>
<td/>
<td valign="top"><para>Martin Serrano</para></td>
<td valign="top"><para>INSIGHT Centre</para></td>
</tr>
<tr>
<td valign="top"><para>BUTLER</para></td>
<td valign="top"><para>Bertrand Copigneaux</para></td>
<td valign="top"><para>Inno Group</para></td>
</tr>
<tr>
<td valign="top"><para>iCore</para></td>
<td valign="top"><para>Raffaele Giaffreda</para></td>
<td valign="top"><para>CREATE-NET</para></td>
</tr>
<tr>
<td/>
<td valign="top"><para>Vera Stavroulaki</para></td>
<td valign="top"><para>UPRC</para></td>
</tr>
<tr>
<td/>
<td valign="top"><para>Panagiotis Vlacheas</para></td>
<td valign="top"><para>UPRC</para></td>
</tr>
<tr>
<td/>
<td valign="top"><para>Dimitris Kelaidonis</para></td>
<td valign="top"><para>UPRC</para></td>
</tr>
<tr>
<td/>
<td valign="top"><para>Vasilis Foteinos</para></td>
<td valign="top"><para>UPRC</para></td>
</tr>
<tr>
<td/>
<td valign="top"><para>Panagiotis Demestichas</para></td>
<td valign="top"><para>UPRC</para></td>
</tr>
<tr>
<td/>
<td valign="top"><para>Stylianos Georgoulas</para></td>
<td valign="top"><para>UNIS</para></td>
</tr>
<tr>
<td/>
<td valign="top"><para>Klaus Moessner</para></td>
<td valign="top"><para>UNIS</para></td>
</tr>
<tr>
<td/>
<td valign="top"><para>Massimo Barozzi</para></td>
<td valign="top"><para>TRILOGIS</para></td>
</tr>
<tr>
<td/>
<td valign="top"><para>Giuseppe Conti</para></td>
<td valign="top"><para>TRILOGIS</para></td>
</tr>
<tr>
<td/>
<td valign="top"><para>Nicola Dorigatti</para></td>
<td valign="top"><para>TRILOGIS</para></td>
</tr>
<tr>
<td/>
<td valign="top"><para>Stefano Piffer</para></td>
<td valign="top"><para>TRILOGIS</para></td>
</tr>
<tr>
<td/>
<td valign="top"><para>Byoungoh Kim</para></td>
<td valign="top"><para>KAIST</para></td>
</tr>
<tr>
<td/>
<td valign="top"><para>Stephane Menoret</para></td>
<td valign="top"><para>THALES</para></td>
</tr>
<tr>
<td/>
<td valign="top"><para>Andrea Parodi</para></td>
<td valign="top"><para>M3S</para></td>
</tr>
<tr>
<td/>
<td valign="top"><para>Michele Stecca</para></td>
<td valign="top"><para>M3S</para></td>
</tr>
<tr>
<td/>
<td valign="top"><para>Michele Provera</para></td>
<td valign="top"><para>CRF</para></td>
</tr>
<tr>
<td/>
<td valign="top"><para>Septimiu Nechifor</para></td>
<td valign="top"><para>SIEMENS</para></td>
</tr>
<tr>
<td/>
<td valign="top"><para>Dan Puiu</para></td>
<td valign="top"><para>SIEMENS</para></td>
</tr>
<tr>
<td valign="top"><para>IoT.est</para></td>
<td valign="top"><para>Thomas Gilbert</para></td>
<td valign="top"><para>Alexandra Instituttet</para></td>
</tr>
<tr>
<td valign="top"><para>OpenIot</para></td>
<td valign="top"><para>Danh Le Phuoc</para></td>
<td valign="top"><para>INSIGHT Centre</para></td>
</tr>
<tr>
<td/>
<td valign="top"><para>Salma Abdulaziz</para></td>
<td valign="top"><para>INSIGHT Centre</para></td>
</tr>
<tr>
<td/>
<td valign="top"><para>John Soldatos</para></td>
<td valign="top"><para>Athens Information Technology</para></td>
</tr>
</tbody>
</table>
</table-wrap>
</section>
<bibliography class="biblio" id="bib02">
<title>Bibliography</title>
<bibliomixed id="B4-1">[1] <author><firstname>O.</firstname> <surname>Vermesan</surname></author> and <author><firstname>P.</firstname> <surname>Friess</surname></author>, <article-title>&#x201C;Internet of Things Applications &#x2013; From Research and Innovation to Market Deployment,&#x201D;</article-title> <publisher-name>River Publishers</publisher-name>, <year>2014</year>. [Online]. Available: <ulink url="http://www.internet-of-things-research.eu/pdf/IoT-From%20Research%20and%20Innovation%20to%20Market%20Deployment_IERC_Cluster_eBook_978-87-93102-95-8_P .pdf">http://www.internet-of-things-research.eu/pdf/IoT-From%20Research%20and%20Innovation%20to%20Market%20Deployment_IERC_Cluster_eBook_978-87-93102-95-8_P .pdf</ulink> <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=%22Internet+of+Things+Applications+-+From+Research+and+Innovation+to+Market+Deployment%2C%22+2014" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B4-2">[2] <collab>ALMANAC EU Project</collab>, <article-title>&#x201C;ALMANAC Project Website,&#x201D;</article-title> [Online]. Available: <ulink url="http://www.almanac-project.eu/news.php">http://www.almanac-project.eu/news.php</ulink></bibliomixed>
<bibliomixed id="B4-3">[3] <collab>ClouT EU Project</collab>, <article-title>&#x201C;ClouT project website,&#x201D;</article-title> [Online]. Available: <ulink url="http://clout-project.eu/">http://clout-project.eu/</ulink>. [Accessed <day>05</day> <year>2015</year>].</bibliomixed>
<bibliomixed id="B4-4">[4] <collab>OSMOSE EU Project</collab>, <article-title>&#x201C;OSMOSE Project Website,&#x201D;</article-title> [Online]. Available: <ulink url="http://www.osmose-project.eu/">http://www.osmose-project.eu/</ulink>. [Accessed <day>05</day> <year>2015</year>].</bibliomixed>
<bibliomixed id="B4-5">[5] <collab>RERUM EU Project</collab>, <article-title>&#x201C;RERUM Project Website,&#x201D;</article-title> [Online]. Available: <ulink url="https://ict-rerum.eu/">https://ict-rerum.eu/</ulink>. [Accessed <day>05</day> <year>2015</year>].</bibliomixed>
<bibliomixed id="B4-6">[6] <author><firstname>E. Z.</firstname> <surname>Tragos</surname></author>, <author><firstname>A.</firstname> <surname>Angelakis</surname></author>, <author><firstname>A.</firstname> <surname>Fragkiadakis</surname></author>, <author><firstname>D.</firstname> <surname>Gundlegard</surname></author>, <author><firstname>C.-S.</firstname> <surname>Nechifor</surname></author>, <author><firstname>G.</firstname> <surname>Oikonomou</surname></author>, <author><firstname>H. C.</firstname> <surname>Pohls</surname></author> and <author><firstname>A.</firstname> <surname>Gavras</surname></author>, <article-title>&#x201C;Enabling reliable and secure IoT-based smart city applications,&#x201D;</article-title> in <source>Pervasive Computing and Communications Workshops (PERCOM Workshops), 2014 IEEE International Conference on</source>, <day>24&#x2013;28</day> <month>March</month> <year>2014</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=%22Enabling+reliable+and+secure+IoT-based+smart+city+applications%2C%22+Pervasive+Computing+and+Communications+Workshops+%28PERCOM+Workshops%29%2C+2014+IEEE+International+Conference+on+2014" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B4-7">[7] <collab>SMARTIE EU Project</collab>, <article-title>&#x201C;SMARTIE Project Website,&#x201D;</article-title> [Online]. Available: <ulink url="http://www.smartie-project.eu/">http://www.smartie-project.eu/</ulink></bibliomixed>
<bibliomixed id="B4-8">[8] <collab>SocIoTal EU Project</collab>, <article-title>&#x201C;SocIoTal Project Website,&#x201D;</article-title> [Online]. Available: <ulink url="http://sociotal.eu/">http://sociotal.eu/</ulink>. [Accessed <day>05</day> <year>2015</year>].</bibliomixed>
<bibliomixed id="B4-9">[9] <collab>VITAL EU Project</collab>, <article-title>&#x201C;VITAL Project Website,&#x201D;</article-title> [Online]. Available: <ulink url="http://vital-iot.eu/">http://vital-iot.eu/</ulink>. [Accessed <day>05</day> <year>2015</year>]. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=%22VITAL+Project+Website%2C%22+2015" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B4-10">[10] <collab>BUTLER EU Project</collab>, <article-title>&#x201C;BUTLER Project Website,&#x201D;</article-title> [Online]. Available: <ulink url="http://www.iot-butler.eu/">http://www.iot-butler.eu/</ulink>. [Accessed <day>05</day> <year>2015</year>].</bibliomixed>
<bibliomixed id="B4-11">[11] <collab>iCore EU Project</collab>, <author>&#x201C;iCore Project Website,&#x201D;</author> [Online]. Available: <ulink url="http://www.iot-icore.eu/">http://www.iot-icore.eu/</ulink>. [Accessed <day>05</day> <year>2015</year>].</bibliomixed>
<bibliomixed id="B4-12">[12] <collab>IoT.est EU Project</collab>, <article-title>&#x201C;IoT.est Project Website,&#x201D;</article-title> [Online]. Available: <ulink url="http://ict-iotest.eu/iotest/">http://ict-iotest.eu/iotest/</ulink>. [Accessed <day>05</day> <year>2015</year>].</bibliomixed>
<bibliomixed id="B4-13">[13] <collab>OpenIoT EU Project</collab>, <article-title>&#x201C;OpenIoT Project Website,&#x201D;</article-title> [Online]. Available: <ulink url="http://cordis.europa.eu/project/rcn/101534_en.html">http://cordis.europa.eu/project/rcn/101534_en.html</ulink>. [Accessed <day>05</day> <year>2015</year>].</bibliomixed>
</bibliography>
</chapter>
<chapter class="chapter" id="ch05" label="5" xreflabel="ch05">
<title>Industrial Internet of Things and the Innovation Processes in Smart Manufacturing</title>
<authorgroup>
<emphasis role="strong"><author><firstname>Sergio</firstname> <surname>Gusmeroli</surname></author><superscript>1</superscript>, <author><firstname>Oscar</firstname> <surname>Lazaro</surname></author><superscript>2</superscript>, <author><firstname>&#x017D;eljko</firstname> <surname>Pazin</surname></author><superscript>3</superscript>, <author><firstname>Chris</firstname> <surname>Decubber</surname></author><superscript>3</superscript>, <author><firstname>Paolo</firstname> <surname>Pedrazzoli</surname></author><superscript>4</superscript>, <author><firstname>Didier</firstname> <surname>Vanden Abeele</surname></author><superscript>5</superscript>, <author><firstname>Sara</firstname><surname>Tucci-Piergiovanni</surname></author><superscript>5</superscript>, <author><firstname>Jacopo</firstname> <surname>Cassina</surname></author><superscript>6</superscript>,<author><firstname>Daniele</firstname> <surname>Cerri</surname></author><superscript>1</superscript>, <author><firstname>Sergio</firstname><surname>Terzi</surname></author><superscript>1</superscript>, <author><firstname>June</firstname> <surname>Sola</surname></author><superscript>2</superscript>, <author><firstname>Ignacio</firstname> <surname>Arconada</surname></author><superscript>7</superscript>, <author><firstname>Klaus</firstname> <surname>Fischer</surname></author><superscript>8</superscript>, <author><firstname>Artur</firstname> <surname>Felic</surname></author><superscript>9</superscript>, <author><firstname>Michele</firstname> <surname>Sesana</surname></author><superscript>10</superscript>, <author><firstname>Roberto</firstname> <surname>Sanguini</surname></author><superscript>11</superscript>, <author><firstname>Lina</firstname> <surname>Huertas</surname></author><superscript>12</superscript>, <author><firstname>Domenico</firstname> <surname>Rotondi</surname></author><superscript>13</superscript> and <author><firstname>Joe</firstname> <surname>Cecil</surname></author><superscript>14</superscript></emphasis>
</authorgroup>
<para><superscript>1</superscript>Politecnico di Milano, Italy</para>
<para><superscript>2</superscript>Asociacion De Empresas Tecnologicas Innovalia, Spain</para>
<para><superscript>3</superscript>European Factories of the Future Research Association EFFRA, Belgium</para>
<para><superscript>4</superscript>Scuola Universitaria Professionale della Svizzera Italiana SUPSI,Switzerland</para>
<para><superscript>5</superscript>CEA List, France</para>
<para><superscript>6</superscript>Holonix s.r.l., Italy</para>
<para><superscript>7</superscript>TRW Automotive, Spain</para>
<para><superscript>8</superscript>German Research Center For Artificial Intelligence &#x2013; DFKI, Germany</para>
<para><superscript>9</superscript>CAS Software AG, Germany</para>
<para><superscript>10</superscript>TXT e-Solutions SpA,Italy</para>
<para><superscript>11</superscript>AgustaWestland SpA, Italy</para>
<para><superscript>12</superscript>The Manufacturing Technology Centre MTC, UK</para>
<para><superscript>13</superscript>FINCONS SpA, Italy</para>
<para><superscript>14</superscript>Oklahoma State University, US</para>
<section class="lev1" id="sec5.1" label="5.1" xreflabel="sec5.1">
<title>IIoT for Manufacturing: Key Enabler for 4th Industrial Revolution</title>
<para>Manufacturing industry is the driving force for EU renaissance and recovery from the economic crisis. This chapter aims at investigating the enormous innovation potential of IoT technologies when fully adopted not just in the production of physical goods, but in all activities performed by Manufacturing Industries, both in the pre-production (ideation, design, prototyping, 3D printing) and in the post-production (sales, training, maintenance, recycling) phases (the SMILE challenge).</para>
<para>The first sub-chapter includes the Factories of the Future PPP perspective (EFFRA, European Factories of the Future Research Association) to IoT for Manufacturing.</para>
<para>The following four sub-chapters will proceed with short descriptions of four IoT for manufacturing FP7 research projects, each addressing different phases of the Product Lifecycle (design, manufacturing, operations, and maintenance) and the impact of IoT to their industrial cases.</para>
<para>Moreover, the importance to build and sustain a multi-disciplinary business ecosystem for IoT adoption in Manufacturing is described as well as the US perspective to IoT for Manufacturing provided by the IGNITE initiative.</para>
<para>Finally, a conclusive sub-chapter will report a synthesis of a recent EC- funded study identifying research-innovation-market challenges for IoT/Cloud combination in manufacturing. The resulting synthetic view of the study confirms that Smart Manufacturing is the most promising and disruptive sector for IoT adoption in the next few years, in combination with other KETs for manufacturing, such as 3D Printing and Cyber Physical Production Systems.</para>
</section>
<section class="lev1" id="sec5.2" label="5.2" xreflabel="sec5.2"><title>IoT in the Factories of the Future PPP and Digital Manufacturing: The EFFRA Perspective</title>
<para>The convergence of cloud and IoT technologies will facilitate the development of factories of the future and the realisation of digital manufacturing. These future manufacturing plants will comprise numerous devices, physical and virtual smart objects, internally and externally interconnected, by dynamically enabling configuration and monitoring of the operational capabilities of the plant, or networks of plants, quality control and efficiency improvement. Additionally, the traditional, fragmented processes of design, production and customer fulfilment will be replaced by a close-loop management of the end-to-end design-to-customer fulfil, where cycles are shorter and products are designed based on customer requirements (customer-focused manufacturing). Here, the processes do not finish with product delivery; the product-service provides information for the maintenance services and for continuous design of products and processes. The sensors in machinery and manufacturing services developed will facilitate the operational performance model for predictive maintenance of the machinery.</para>
<para>A global plant floor requires that the network of production facilities operates as a single virtual plant. Operations require individual plants&#x2019; centralization control capabilities based on real-time information, multi-plant manufacturing execution systems (MMES) and major integration and visibility on supply customer ecosystems based on enterprise manufacturing intelligence (EMI) platforms. Additionally, increased control and supervision requires the improvement and acceleration of decision-making capabilities based on real-time information, interoperability between systems and collaborative decision making. This environment requires adaptive and scalable architectures to support real-time data for operational management, supply-chain execution and collaborative decision-making. Scalable and multi-enterprise architectures are needed for: managing the operations of networks of organizations in the same supply chain; connecting MES and business processes in real time; establishing new business models based on secure cloud services.</para>
<para>As the IoT expands, cybersecurity will have to be considered at every point, and common, sector-specific threats will need to be identified. Security requirements that are unique to CPS will have to be determined. A risk management framework and methodology to enable, assess, and assure cybersecurity for adaptive and smart manufacturing systems will have to be established; adaptable computational and storage tools including methods for protection and security of intellectual property will have to be identified, developed, and deployed. Novel information security concepts and/or approaches, such as turning properly constructed interfaces from attack surfaces into cyber-defence surfaces, offering explicit and implicit design guarantees, and providing security as a class of interface guarantee, will have to be explored. It will be much more effective and ultimately cheaper to secure smart manufacturing systems at the engineering design phase, rather than later. The economic and technical viability of possible integration with legacy systems as well as existing open source applications and tools will also have to be assessed.</para>
<section class="lev2" id="sec5.2.1" label="5.2.1" xreflabel="sec5.2.1">
<title>IoT &#x0026; Cyber-Physical Production Systems</title>
<para>As illustrated in the previous section, the factories of the future is being subject to a profound transformation. Such transformation will not be limited to the physical world and the manufacturing line. A digital revolution will also take place in the digital domain. Factories will witness the prevalence of Internet technologies also at manufacturing level; the mass deployment of Cyber-Physical Systems for monitoring &#x0026; controlling will see the use of the Big Data capabilities everywhere (world, enterprise, shop-floor). The role of ICT will be instrumental addressing the increased complexity that manufacturing industries will have to face at many levels; e.g. increased product customization, largely dynamic delivery requirements, agile and rich collaboration patterns and networks of different technical disciplines and organizations. These requirements coupled with the advent of innovative manufacturing technologies such as additive manufacturing or high precision zero-defect manufacturing call for robust interoperability solutions that integrate the factory with the environment, i.e. the urban context, data integration standards amenable to IoT and linked tool chains that move away from vendor-lock-in, monolithic systems and envision mobile &#x0026; cloud native support. The development of such smart manufacturing environment is highly dependent on the development and integration of IoT capabilities in an industrial context. Recalling a recent road-mapping effort; i.e. Pathfinder, IoT-based manufacturing must abandon the current classical approach to industrial automation &#x2013; see figure below.</para>
<fig id="F5.1" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 5.1</label>
<caption><para>Traditional automation pyramid.</para></caption>
<graphic xlink:href="graphics/fig5_1.jpg"/>
</fig>
<para>The current approach is deemed by industrial key players and RTD experts to be inadequate to cope with current manufacturing trends and needs to consequently evolve. The intrinsic existence of smart interconnected devices defies the concept of rigid hierarchical levels, being each one of these devices capable of complex functions across all layers. Thus it should be introduced an updated version of the pyramid representation, where the field level features smart-objects capable of articulated functions (thus in contact with all the pyramid layers) while still the hierarchical structure is preserved. This leads towards the Industrial IoT automation pyramid that will be the basis for future Cyber-physical production systems (CPPS).</para>
</section>
<section class="lev2" id="sec5.2.2" label="5.2.2" xreflabel="sec5.2.2">
<title>CPPS Architectures Design Drivers for Scalable, Adaptive and Smart Manufacturing Systems</title>
<para>Future ICT tools and technologies will give companies multiple opportunities, such as increases in efficiency and quality throughout value chains, the exploitation of additional markets, and manufacturing that is highly responsive to changing market and customer demands. Smart manufacturing will exploit advances in wireless sensor technologies, machine-to-machine (M2M) communication and ubiquitous computing, that would allow track-and-trace and monitor each individual stage of the production.</para>
<fig id="F5.2" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 5.2</label>
<caption><para>Cyber-physical production system (CPPS) automation pyramid.</para></caption>
<graphic xlink:href="graphics/fig5_2.jpg"/>
</fig>
<para>Thus, CPS will provide a shared situational awareness to support network-centric production by closing the loop between the virtual world and the physical world. In order to exploit the full potential of CPS, various existing ICT systems have to be integrated, adapted to the industrial needs, and deployed on the shop floor:</para>
<fig id="F5.3" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 5.3</label>
<caption><para>Stages of development in CPS capability.</para></caption>
<graphic xlink:href="graphics/fig5_3.jpg"/>
</fig>
<para>The evolution and design of ICT architectures to meet the demands of future CPPS capable of delivering the manufacturing competitive advantages described above will be driven by the <emphasis role="strong">FISAR</emphasis> design principles (<emphasis role="strong">F</emphasis>lexible system-component integration, <emphasis role="strong">I</emphasis>nteroperable among systems and components, <emphasis role="strong">S</emphasis>calable, <emphasis role="strong">A</emphasis>daptable to varying governance structures, <emphasis role="strong">R</emphasis>eal-time capabilities).</para>
<para>The design and development of CPPS is intrinsically complex with characteristics unique to the deployment of IoT technologies in an industrial context. The advent of the CPPS requires developing the material and software components, middleware, operating systems beyond the existing technologies. Because these systems interact directly with the physical environment their hardware and software must be reliable, reconfigurable, and, for the most critical, be certified, from components to the whole system. These complex systems have to present one degree of reliability/confidence, which is lacking to most of the current infrastructures. The oversizing is at present the way the most used for the certification of safe system.</para>
<para>Research is nowadays organised by disciplines and the systems are developed with a large set of formalisms and modelling tools without links between them. Each part of a system highlights characteristics without considering the other components and the systems as a whole. Typically, a specific formalism will represent either a cyber-process or a physical process but not both. The expertise is split to the detriment of the productivity, the safety, the security and the efficiency of the system.Although this approach can be enough to support a vision of the CPS based on a set of individual components, it raises a problem for the verification, the safety and the security at system level as for the interactions between components. To allow a design and a fast deployment of the CPS, it is necessary to develop innovative approaches to define architectures, which make possible a transparent integration of the elements of control, communication and processing. Making manufacturing smart implies that on one hand all devices in factory have to become smart, or smarter, and furthermore that they cooperate in order to provide smart functionalities. But these new functionalities shall not come at the price of decreasing plant safety, and in a connected world, safety necessarily imply cyber-security. The biggest challenge is that flexibility, safety and security requirements are usually competing with each other and refraining many smart manufacturing ideas from becoming a reality. So, the challenges for the engineering of CPPS are significant and range from the actual complexity of modular systems of systems engineering but also deal with the performance and reliability of SOA-EDA architectures, which increasingly demand a better integration between IoT and cloud domain. Moreover, cyber-security and in some cases mix-criticality of the system impose additional constraints that cannot be left aside.</para>
</section>
</section>
<section class="lev1" id="sec5.3" label="5.3" xreflabel="sec5.3">
<title>Product Design and Engineering in the IoT Era: The LINKEDDESIGN Project</title>
<para>Over recent years, the context where companies operate has dramatically changed, forcing companies to revise their business models and to introduce new paradigms like sustainability. Sustainability is now considered a strategic must-have, because it enables profitability in the long run and a competitive differentiation <link linkend="B5-1">[1]</link>. Furthermore, companies now realize that sustainability improvements can have an immediate impact on the bottom line, not to mention propelling growth by spurring innovation and the creation of new products and services <link linkend="B5-2">[2]</link>. One way to pursue sustainability is to take a product life cycle approach, enabling a more efficient and effective use of limited financial and natural resources <link linkend="B5-3">[3]</link>.</para>
<para>A life cycle approach enables product designers, service providers, government agents and individuals to make choices for the longer term, and it avoids shifting problems from one life cycle stage to another. Furthermore, experts from industry, government and other organizations agree that making life cycle approach part of the way, de-signing products, developing services, making policies will help to reverse some world damaging trends <link linkend="B5-4">[4]</link>.</para>
<para>Companies are under pressure to create sustainable products, not only from consumers but also from governments, retailers and suppliers. As natural resources become scarce, companies must consider the long-term sustainability of their business models and broaden their approach to consider their total impact on the environment. Therefore, product life cycle approach can be a powerful growth engine <link linkend="B5-5">[5]</link>.</para>
<para>To summarize, product life cycle approach enables to pursue sustainability, considering the whole product life cycle and not only what companies/individuals realize in a single stage. Furthermore, sustainability is now considered by companies not an imposition, but a competitive and long-run profitable leverage. Different companies, mainly in the automotive sector, like for example Volkswagen <link linkend="B5-6">[6]</link>, BMW <link linkend="B5-7">[7]</link> and FCA Group <link linkend="B5-8">[8]</link>, are pushing sustainability. In this context, focal companies of supply chains, as the previously cited ones, are driving their suppliers, employees, retailers and users towards the sustainability, in order to reduce the impact along the whole product life cycle.</para>
<para>Focus of this chapter is to consider and analyse manufacturing systems and their suppliers. Production phase is one of the most critical phases, concerning sustainability. Indeed, companies that use both environmentally and economically sound manufacturing practices can gain significant competitive advantages <link linkend="B5-9">[9]</link>. Furthermore, the chapter mainly considers the design process, due to its high influence on costs and environmental impacts generated along the whole manufacturing systems life cycle. Different empirical studies [<link linkend="B5-10">10</link>-<link linkend="B5-1">13</link>] state that product design represents 5-10 of life cycle cost; however, product design influences up to 80 of life cycle cost. Rebitzer et al. <link linkend="B5-14">[14]</link>, instead, reports the same consideration about the environmental impacts.</para>
<para>In order to evaluate costs and environmental impacts generated during the whole life cycle, it is possible to use Life Cycle Costing (LCC) and Life Cycle Assessment (LCA) methodologies. Life Cycle Costing is described as the methodology that enables to evaluate the total cost of ownership of capital equipment, including its cost of acquisition, operation, maintenance, conversion and/or decommission <link linkend="B5-1">[15]</link>. Life Cycle Assessment, instead, is a methodology to assess environmental impacts associated with all the stages of a product&#x2019;s life from-cradle-to-grave <link linkend="B5-16">[16]</link>, described in the standard ISO 14040 <link linkend="B5-17">[17]</link>.</para>
<para>LCC and LCA methodologies are very good in comparison and estimation of few products or alternatives; however, when the number of alternatives increases, they are not able to support the decisions and the decision makers in a good way. In the case of manufacturing systems, composed by hundreds of different products or components, each with some alternatives, LCC and LCA are not able to support decision makers in the choice of the optimal system configuration, which minimize life cycle costs and environmental impacts.</para>
<para>Furthermore, LCC and LCA methodologies need to have real data from the system life cycle, in order to be more precise and accurate. Indeed, estimated or statistical data enable to reduce the time needed to perform a LCA study, losing accuracy.</para>
<para>Creating a tool able to collect data from the field and able to perform a LCA study with the same time, but a better accuracy, could be an interesting challenge to be faced. The aim of the chapter is to cover the gaps previously described, proposing a closed loop framework, completed by tools, for the improvement of industrial systems&#x2019; sustainability.</para>
<para>Next paragraph describes the generic life cycle of a system and the closed loop framework, explaining how to apply it and giving a brief overview of different tools. Last section, instead, concludes the chapter.</para>
<section class="lev2" id="sec5.3.1" label="5.3.1" xreflabel="sec5.3.1">
<title>IoT-Enabled Closed Loop Framework</title>
<para>In this section, the life cycle of a generic system life cycle is described, referring to Gera Model <link linkend="B5-18">[18]</link>. It identifies the following stages: identification, concept, requirements, preliminary design, detailed design, implementation, operation, possible redesign activities, and decommission.</para>
<para>Until requirements phase, customer and supplier must work together in order to establish system requirements. Then, supplier prepares a preliminary design of the industrial system, and usually this phase concludes with a proposal to the customer. Customer evaluates proposals of different suppliers; key drivers are the life cycle costs (and life cycle environmental impacts), and the best proposal gets the order. This is the most critical life cycle phase. If the order is won, the life cycle continues with the detailed design of the industrial system. Implementation phase represents the manufacturing and assembly of the industrial system at the customer plant and this phase concludes with the ramp up of the system. During Operation phase the system is fully operating. Furthermore, it is possible that supplier re-designs industrial system, in order to hit new customer needs. Finally, during Decommission, system&#x2019;s conditions are evaluated, in order to decide which is the best option (reuse as is, conversion to a new state, dismissal, etc.). The most critical phases are preliminary design and operation; indeed, it is important during the preliminary design to configure the optimal life cycle oriented solution, in order to get the customer order. Furthermore, it is important to collect information, returning valuable knowledge to keep under control the existing system and to improve the design of next systems. For these reasons, Gera Model is chosen, because it is more focused on design and operation rather than the other life cycle ones. The project has developed a reference framework for IoT-enabled closed loop design, completed by tools, along the whole life cycle of an industrial system.</para>
<para>The first tool is about the configuration of the suitable industrial system, in order to hit the customer&#x2019;s needs. In detail, the tool has to find the configuration that minimizes life cycle costs and environmental impacts and respects the customer&#x2019;s technical requirements.</para>
<fig id="F5.4" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 5.4</label>
<caption><para>Configuration Tool User Interface.</para></caption>
<graphic xlink:href="graphics/fig5_4.jpg"/>
</fig>
<para>The tool is based on NSGA-2 (Non dominated Sorting Genetic Algorithm) and implemented in a Java framework, in order to create a user interface and a back end engine. Back end engine is developed on JMetal <link linkend="B5-19">[19]</link>, a library containing meta-heuristic models, like NSGA-2, to solve multi-objective problems. User interface enables the definition of the objective functions (which objectives to con-sider, like LCC, or LCA, or LCC and LCA) and of the technical requirements. Furthermore, it is possible to define how many alternatives are possible for each component of the system, within the Design Space Definition.</para>
<para>The tool checks and validates data inserted by user, in order to avoid errors. Finally, the algorithm can run. Tool displays algorithm results in an output window, which reports: (i) the value of the objective functions and (ii) all the optimal configurations (which components are selected to realize the system.</para>
<para>The second tool is about the collection of data from the field, during the operation phase. It is possible to collect tons of data and information from the different sensors installed on the system&#x2019;s components, machines or stations. Furthermore, the tool is also able to collect information by the functional subgroups of the machine/station, enabling to understand which ones influence the overall performance.</para>
<para>The issue is how to return all the extracted information in a valuable and useful way for the decision makers. The tool is composed by user interface, where the decision makers can interrogate the database, in order to receive the desired information (output), and by back end logic, in order to answer to the interrogations from the user interface. The back end recovers data and information from the PLC databases, which collect information by different system&#x2019;s sensors.</para>
<para>The main benefits of this tool are: (i) the real time monitoring of the system, keeping costs and environmental impacts of the existing system under control, and (ii) valuable knowledge for the design improvement of the next systems, in terms of performance and sustainability dimensions.</para>
<para>The tools return valuable knowledge, useful for the design of the next system. It enables system improvements, in terms of reduction of costs and environmental impacts, understanding which are the most critical components/stations/machines.</para>
<para>The tools is able to summarize the main system&#x2019;s parameters in order to verify quickly the performances of the system. It is possible to set different indicators, according to the customer needs, like the average cycle time, the mean time between failures (MTBF) and the mean time to repair (MTTR), the availability and the overall equipment effectiveness (OEE).</para>
<para>Decision makers can visualize detailed information, visualizing different pages that recap the main performances in a numerical and graphical way. For example, the page about availability shows the following parameters: availability, mean time between two failures (MTBF) and the mean time to repair the problem (MTTR). Furthermore, it shows the machine states.</para>
</section>
<section class="lev2" id="sec5.3.2" label="5.3.2" xreflabel="sec5.3.2"><title>Discussion</title>
<para>The chapter aims to propose an IoT-enabled closed loop framework for the improvement of industrial systems&#x2019; sustainability, in terms of life cycle costs and environmental impacts. Introduction section describes the current context, where sustainability is now considered a must have and competitive leverage. Life cycle approach has been identified to pursue sustainability, considering the whole product life cycle and not only what companies/individuals realize in a single stage. Focus of this chapter is to consider and analyse manufacturing systems and their suppliers, because it is one of the most critical phases, concerning sustainability. Furthermore, LCC and LCA have been identified as the methodologies able to help decision makers in the improvement of industrial system&#x2019;s sustainability. However, the above methodologies have a series of limitations, which want to be covered by the closed loop framework proposed. Indeed, after the study and identification of the most critical phases within the industrial system life cycle, a closed loop framework, completed by tools, has been created and developed. Next step will regard the inclusion into the framework of the re-design and End of Life phase, in order to cover the whole life cycle for an efficient and effective management of industrial systems.</para>
</section>
</section>
<section class="lev1" id="sec5.4" label="5.4" xreflabel="sec5.4">
<title>Workplaces of the Future and IoT: The FITMAN Project</title>
<para>The mission of the FITMAN (Future Internet Technologies for MANufacturing industries <link linkend="B5-20">[20]</link>) project is to provide the Future Internet Public Private Partnership with 10 industry-led use case trials in the domains of Smart, Digital and Virtual Factories of the Future.</para>
<para>The project aims to test and assess the suitability, openness and flexibility of FIWARE <link linkend="B5-21">[21]</link> OSS generic components (GEs) and provide FITMAN OSS specific components for manufacturing (SEs). The interested reader is referred to [<link linkend="B5-22">22</link>, <link linkend="B5-23">23</link>] for a more detailed introduction to the FITMAN IoT approach.</para>
<para>The aim of this section is to provide a deeper insight about FITMAN project regarding the &#x201C;IoT for Manufacturing&#x201D; trials and requirements, exploitation plans and business opportunities.</para>
<section class="lev2" id="sec5.4.1" label="5.4.1" xreflabel="sec5.4.1"><title>FITMAN Smart Factory Platform (IoT)</title>
<para>FITMAN provides three Reference Platforms that conceptually describe the interconnection between the OS components on a specific Factory of the Future domain (smart, digital and virtual).</para>
<para>The concept of FITMAN Platform is a blueprint that allows the development of value added services in the smart-IoT, digital information management and collaboration areas.</para>
<para>More concretely, the Smart Factory Platform provides added functionalities to build innovative IoT services on top of FIWARE and FITMAN OSS components (see <link linkend="F5.5">Figure <xref linkend="F5.5" remap="5.5"/></link>).</para>
<fig id="F5.5" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 5.5</label>
<caption><para>FITMAN Smart Factory Platform for IoT Services.</para></caption>
<graphic xlink:href="graphics/fig5_5.jpg"/>
</fig>
<para>This Platform is focused on the collection and processing of real-time data collection for shop floor operations. It uses sensors and monitoring systems (Kinect sensor, RFID sensors, etc.) deployed in the production lines and services/applications for sending messages or warnings.</para>
<para>It aims to manage both tangible assets (energy, productivity, throughput, and wastes) and intangible assets (customer sentiments, workforce wellness, comfort and safety) to obtain more competitive and productive manufacturing environment.</para>
<para>As a result, more efficient knowledge-management strategies will be implemented, achieving the intelligent and smart factory.</para>
</section>
<section class="lev2" id="sec5.4.2" label="5.4.2" xreflabel="sec5.4.2"><title>Safe &#x0026; Healthy Workforce: TRW Use Case</title>
<para>Active and healthy ageing is one of the major societal concerns in the smart home, smart city and smart industry contexts. In fact, human and organisational factors are still involved in almost 90% of all workplace accidents and incidents. The European Commission estimates that Musculo-Skeletal Disorders (MSD) accounts for 50% of all absences from work lasting 3 days or longer and for 60% of permanent work incapacity. Furthermore, up to 80% of the adult population will be affected by an MSD at some time in their life. In the last few years, it has become apparent that this situation will even worsen with the emergence of a European aging workforce <link linkend="B5-24">[24]</link>, which may exhibit more limited physical and cognitive responses. According to the World Health Organisation, European workforce will be older than ever before, it will make up for 30% of the working-age population <link linkend="B5-25">[25]</link>.</para>
<para>For this reason, it becomes necessary to develop new solutions that, taking benefit from the IoT technologies, improve the quality and comfort of the workforce. Indeed, TRW trial (worldwide Tier 1 - automotive supplier) aims to develop a new generation of worker-centric safety management systems in order to reduce accidents and incidents in the production workplace through workers&#x2019; empowerment.</para>
<fig id="F5.6" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 5.6</label>
<caption><para>TRW trial real environment (a) and GUI (b).</para></caption>
<graphic xlink:href="graphics/fig5_6.jpg"/>
</fig>
<para>The TRW use case is focused on the monitoring and assessment of the ergonomic risk that can affect to the blue-collar workers on the production lines, in order to perform effective prevention strategies. The traditional prevention strategies are not capable of customizing specific plans and current human-based surveillance is not completely effective. Current procedures and systems are not customized to the limitations or characteristics of the workers, so the results are not trustworthy in all the cases. Thus, the trial specially provides the following functionalities: i) real-time data collection through Kinect sensors (see <link linkend="F5.6">Figure <xref linkend="F5.6" remap="5.6"/></link>a), ii) continuous data processing for ergonomic risks detection, iii) events management, and iv) web services and applications for corrective actions performance (e.g. web services for sending messages or warnings related to the risks detected; see <link linkend="F5.6">Figure <xref linkend="F5.6" remap="5.6"/></link>b).</para>
<fig id="F5.7" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 5.7</label>
<caption><para>Future Internet Platform for Safer and Healthier Workplace.</para></caption>
<graphic xlink:href="graphics/fig5_7.jpg"/>
</fig>
<para>The TRW Trial Platform (see <link linkend="F5.7">Figure <xref linkend="F5.7" remap="5.7"/></link>) is based on the Smart Factory Platform (GEs and SEs), as well as TRW legacy system, and new components and services developed for the trial (TSC). The TRW Trial Platform exploits the OSS components mainly related to IoT services, taking advantage of functionalities related to data gathering, complex event processing, context information management, and event information delivery, among others.</para>
<para>As a result, the system monitors and collects real-time data of the skeleton and movements of the workers in the production line through Kinect sensors. It processes the data in order to detect "unsafety" events based on the defined rules (e.g. angles of the body or frequency of movements higher than the threshold values). In case of event detection, the different services or actions previously set up are delivered, e.g. messages or warnings are sent to the blue-collar workers and prevention technicians.</para>
<para>Preliminary intermediate KPIs already demonstrate a reduction of 13% in the number of accidents and incidents in the factory, as well as a performance improvement of 80% in the number of risks detected and alarms activated.</para>
<para>TRW trial supports the introduction and acceptance of IoT technologies in the manufacturing industry in order to get the workplace of the future, providing the necessary balance between security concerns and privacy concerns. The implementation of monitoring technologies supports the innovative human-in-the-loop model, getting a participative approach for the workers&#x2019; empowerment solution.</para>
</section>
</section>
<section class="lev1" id="sec5.5" label="5.5" xreflabel="sec5.5"><title>Osmosis Membranes for IoT Real-Digital-Virtual Worlds Interconnection: The OSMOSE Project</title>
<para>According to the FInES Research Roadmap 2025, Sensing Enterprise and Liquid Enterprise are two Qualities of Being, which are considered strategic for any future enterprise.</para>
<para>The Sensing Enterprise will emerge with the evolution of the Internet of Things, when objects, equipment, and technological infrastructures will exhibit advanced networking and processing capabilities, actively cooperating to form a sort of &#x2019;nervous system&#x2019; within the enterprise nextgeneration.</para>
<para>Among the challenges for applying IoT to the manufacturing enterprises in several domains, the Predictive Maintenance and the Asset Management applications will increasingly rely on Big Data analysis, Trust and Security system hardening technologies and Global Service technologies. From all these events, it is quite clear that the take-up of the Sensing Enterprise concept will enable very advanced and promising new business models and applications thanks to the adoption of Future Internet technologies, but the depicted landscape seems characterized by single isolated business cases without any evident common scientific framework and technological base.</para>
<section class="lev2" id="sec5.5.1" label="5.5.1" xreflabel="sec5.5.1"><title>The IoT Data Gaps</title>
<para>IoT ecosystems generate literally tons of data &#x2013; data from mobile in-field applications, equipment, spare parts, vehicles, raw materials, process monitors and industrial appliances &#x2013; that can be captured, analyzed and transformed into actionable insights, in a secure manner.</para>
<para>However, while the real world data streams can be ingested and stored in fast-data enabled databases, not all information are immediately relevant to support decision making, or action optimization.</para>
<para>Due to the large size of data sets, even a sanity check ondata quality, coherency and reliability is a hard, time-consuming task. Furthermore, trends and deviations from expected systems&#x2019; behaviours require accurate model building and checking while refining the model itself in real time. A digital world is then superimposed to the real one containing the computed data (performance trends, quantitative process and product metrics, tooling configurations, validation test patterns and results, etc.) and the data-driven decisions are taken, impacting on both real and digital worlds.</para>
<para>Thanks to the simulators, we are now able to create virtual data from model themselves under a set of stimuli, and compare those virtual behaviours with the real ones. A new stream of data is now generated from the Virtual world by interaction with virtual smart objects, impacting again on both real and digital worlds. The present state of art reports the existence of IoT data gaps among those worlds, exposing an intrinsic weakness in building a common view crossing the three worlds due to lacking of unified representation and data management tools.</para>
</section>
<section class="lev2" id="sec5.5.2" label="5.5.2" xreflabel="sec5.5.2"><title>The Liquid Enterprise</title>
<para>The Liquid Enterprise is an enterprise having fuzzy boundaries, in terms of human resources, markets, products and processes. Its strategies and operational models will make it difficult to distinguish the &#x2018;inside&#x2019; and the &#x2018;outside&#x2019;. Every activity in the enterprise is enabled by IoT devices and it streams data.</para>
<para>The intuition of the OSMOSE project is to explain the sensing enterprise by means of a metaphor taken form physics and strongly supported by the Liquid Enterprise idea.</para>
<para>Let us in fact imagine the Sensing-Liquid Enterprise as a pot internally subdivided into three sectors by means of three membranes and forming the Real-Digital-Virtual sectors. A blue liquid is poured into the first sector (Real World population), a red liquid into the second sector (Digital World population) and a green liquid into the third sector (Virtual World population).</para>
<para>If the membranes are semi-permeable, by following the rules of osmosis which characterizes each of the three membranes, the liquid particles could pass through them and influence the neighbouring world, so that in reality in the blue Real World we could also have red-green shadow ambassadors of the Digital/Virtual World and similarly for the other Worlds.</para>
<para>An entity (a person, a sensor network, an intelligent object) in the blue Real World could have control of their shadow images in the red Digital World (digital twin) and in the green Virtual World, keep them consistent and pass them just the needed information under pre-defined but flexible privacy and security policies.</para>
<para>The liquid enterprise paradigm has been considered so far just as a provocation, with very scarce understanding and adoption by industry and manufacturing enterprises in particular.</para>
</section>
<section class="lev2" id="sec5.5.3" label="5.5.3" xreflabel="sec5.5.3"><title>Osmotic Context Management</title>
<para>In Sensing/Liquid Enterprises, shadow images of entities are present in the real, virtual and digital world. Semi-permeable membranes manage the data flow between the worlds and thus keep background consistency. Thus, context awareness and understanding the meaning behind data is a major challenge. Context is concerned with relevant characteristics that describe an entity&#x2019;s situation <link linkend="B5-13">[13]</link>. In Sensing/Liquid Enterprises, these characteristics are spread between the worlds, posing new challenges for context management.</para>
<fig id="F5.8" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 5.8</label>
<caption><para>OSMOSE Ontology Approach.</para></caption>
<graphic xlink:href="graphics/fig5_8.jpg"/>
</fig>
<para>Knowledge need to be structured and linked appropriately. Ontologies enable machine-readable knowledge structures shared by the three worlds. Ontology modularization <link linkend="B5-14">[14]</link> allows detachment of horizontal (entities, processes, services, etc.) or vertical (entities in the real, digital or virtual world) domain ontology modules. Upper-Ontology modules provide generic knowledge structures that domain ontology modules have to obey. Knowledge Links [<link linkend="B5-11">11</link>, <link linkend="B5-21">12</link>] describe interrelations between ontology modules.</para>
<para><link linkend="F5.8">Figure <xref linkend="F5.8" remap="5.8"/></link> illustrates the modular ontology approach of the OSMOSE Project, where entities, processes, services and events as well as platform specific terms (e.g. osmotic process) are defined and horizontally detached in the OSMOSE Upper Ontology, inherited by the three worlds and further specified by each of the world inside the vertical detached world ontology module.</para>
</section>
</section>
<section class="lev1" id="sec5.6" label="5.6" xreflabel="sec5.6"><title>IoT Enhanced Learning for Complex Systems Maintenance: The TELLME Project</title>
<para>The TELLME project (www.tellme-ip.eu) aims at providing a new methodology and an ICT technical architecture to provide personalized learning to technicians at the time they are working on complex systems. The training is continuously tailored on the activities that the worker have to accomplish (the daily schedule), the worker profile (ability on certain required operation) and the context in which he is immersed. Starting from those information the core of the TELLME system is able to support the execution of a job (usually described in a jobcard or workcard) providing to the worker a personalized and contextualized training. It is based on briefing (learning to be done before to the job), support (learning by doing and contextual learning contents) and debriefing (training to be done after the work to optimize the training). By its nature TELLME system should be fully aware of the context in which the user is immersed, the advancements status of the work, the respect of the rules of the workplace and, of course the safety. The usage of Internet of Things is essential for TELLME in order to tune the training for the worker.</para>
<para>Here below the need for IoT enhanced Learning is detailed for a specific complex system: helicopters maintenance. After that, two scenarios of IOT enhanced learning are provided. In the first one, the worker and the optimization of the training uses the IOT to monitor the compliance of worker activities with safety rules detecting and correcting potential dangerous behavior. The second scenario monitors the environmental conditions in order to keep the worker aware of them and providing specific learning about how to fine tune the activities to react to non-standard conditions.</para>
<section class="lev2" id="sec5.6.1" label="5.6.1" xreflabel="sec5.6.1">
<title>The Need for IoT Enhanced Learning in Aerospace</title>
<para>People who perform aviation maintenance are unique. While all maintenance technicians learn their job skills through a combination of education, formal training, and &#x201C;hands on&#x201D; experience, aviation maintenance training has a special focus and unique challenges. This is due to stringent safety and quality requirements, complex equipment with sophisticated systems and a wide range of working conditions.</para>
<para>However aeronautical accidents and incidents are more likely to be caused by the actions of humans than by mechanical failure. Industry statistics show that human error contributes to nearly 80% of airline accidents and incidents, as illustrated below. This figure includes all aspects of human factors including operations, maintenance, and air traffic control. Because aviation systems are continually improving, the aircraft is seldom the cause of an accident and incident. Humans, rather than equipment, are more likely to be at the root cause of an accident or incident. Therefore, the best opportunity for safety improvement is to understand and manage the human factors that pose safety risks.</para>
<fig id="F5.9" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 5.9</label>
<caption><para>Accidents and incidents related to human errors vs. other failures.</para></caption>
<graphic xlink:href="graphics/fig5_9.jpg"/>
</fig>
<para>The investigation highlights a variety of maintenance factors that contributed to the incident, many of which were rooted in human factors. The factors also included the following:
<orderedlist numeration="arabic" continuation="restarts" spacing="normal">
<listitem><para>inadequate training of technicians;</para></listitem>
<listitem><para>inadequate environment condition in the maintenance workplace conducing to error;</para></listitem>
<listitem><para>lack in the management of FOD-Foreign Object Debris.</para></listitem>
</orderedlist></para>
<para>In order to face these issues, over the past several year, a greater focus is placed on how human factors for improving aviation safety. First of all human factor training for aviation maintenance organizations is a mandatory requirement by international civil aviation authorities by means of &#x201C;formal courses&#x201D; in which technicians must attend to obtain certification that allows them to work as well as with continuous training (refresh courses) and at the workplace support. With regard to points 2 and 3 of the above list, the technology and the Internet of Things can effectively contribute to the reduction of risks.</para>
</section>
<section class="lev2" id="sec5.6.2" label="5.6.2" xreflabel="sec5.6.2"><title>IoT Enhanced Learning for Avoidance of Foreign Object Debris (FOD)</title>
<para>Foreign Objects are a major cause of aircraft damage and unscheduled maintenance. Damage can result in minor repairs or catastrophic events. Preventing FOD is everyone&#x2019;s responsibility. FOD includes hardware, tools, parts, metal shavings, broken hardware parts, pavement fragments, rocks, badges, hats, paper clips, rags, trash, paperwork and even wildlife. Any foreign object that can find its way into an aircraft or engine can contribute to FOD. FOD prevention is an essential element in all maintenance activities and is the responsibility of every company technician. About tools monitoring there are numerous methods to facilitate accountability of tools (screwdriver, torque wrench, rivet gun, air hammer, clecos, etc.). These include but are not limited to the use of tool inventory lists, shadow boards, shadowboxing, bar coding, special canvas layouts with tool pockets, tool counters, chit system, tool tags, or consolidated tool kits. In the last years the main manufacturers of aeronautical tools started developing electronic tool control based on smart tool box which records exactly who enters the box and when using an electronic badge, keyless entry and which tools have been removed or returned, and then confirm which tools are being issued and/or returned.</para>
<fig id="F5.10" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 5.10</label>
<caption><para>Human involvement in assembly process.</para></caption>
<graphic xlink:href="graphics/fig5_10.jpg"/>
</fig>
<para>Inside the AgustaWestland organization, the workers involve in helicopter final assembly or maintenance activities are properly committed in FOD prevention best practices. Moreover specific processes and procedures have been put in place to prevent potential risk situations and to encourage workers to a positive attitude towards safety and to discourage wrong behaviour.</para>
<para>The standards achieved in FOD prevention by AW are at the highest levels; nevertheless it is important to maintain a high level of attention and put in place every resource that can contribute to reduce risks of FOD. For this reason AgustaWestland is experimenting with TELLME a new Internet of Things based monitoring of workers behaviour and FOD learning. First of all AgustaWestland is equipping its workers with smart tool boxes able to trace when the tools are taken and when they returned and those data are exported and used by the system to infers the workers behaviour and start corrections is necessary.</para>
<para>By this approach after the usual training workers, during daily worker, are monitored to detect potential FOD BEFORE they happen, in case of FOD identify the causes (motivation, knowledge or structure) and in case of no behaviour changing personalized (optimized) training based on B-BS (Behavior-Based Safety) methodology.</para>
<para>The architecture of the application is reported in the picture below. The IOT based solution is implemented by components providing events about what is happening, a second layer of components managing events and detecting potential behaviour and a third level managing learning contents to correct behaviour.</para>
<para>In the workplace layer, during the daily work, the worker should respect a specific pattern in all maintenance activities: start maintenance activity, get tools, return tools and close maintenance activity, not respecting it means that a tools could have been left in the helicopter. The Platform monitors the environment in order to discriminate which BCW (if any) needs to refresh their tool management to improve the performances. Events about tools (get and return) from the smart toolbox (SnapOn) and maintenance activities (start-close) from the mobile electronic work-card are gathered by the adapters and published to a queue of the event broker.</para>
<para>In the event management layer events aggregation is realised by a set of adapters developed specifically for the different event sources and sending them in AMQP (Advanced Message Queuing Protocol) protocol. Events are managed by an event Broker implemented by RabbitMQ aggregating them and collaborating, for the control of the pattern, with the Complex Event Processor implemented with Esper. In case of non-respect for the pattern an additional event (learning need) is generated triggering a BPEL (Business Process Execution Language) process in the interoperability infrastructure to assign a focused lesson to fill the skill gap of the worker. If the information about the worker are enough to take an automatic decision about which learning contents to provide to him a learning mix (set of learning contents) is created and the reference of it is notified to the user mobile device. In case the automatic decision cannot be taken (eg: there are contradictions) the manager of the technicians is notified and a human observation required. It is essential, in fact, to understand if the wrong behaviours is due to a problem of knowledge (the worker didn&#x2019;t know to do something) or a problem of motivation (he knows but was not willing to) or a problem of structure (someone stole him the tools for another job). The observation and the interview the manager has to do provides more information that makes the system able to take a decision and provide the right mix of learning contents to modify the behaviour.</para>
<fig id="F5.11" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 5.11</label>
<caption><para>TELLME Approach.</para></caption>
<graphic xlink:href="graphics/fig5_11.jpg"/>
</fig>
</section>
<section class="lev2" id="sec5.6.3" label="5.6.3" xreflabel="sec5.6.3"><title>IoT Enhanced Learning for Non-Standard Workplace Environmental Condition</title>
<para>Workplace environmental conditions can impact the quality of work performance and technician fatigue as well as changing a bit processes for some specific steps. However, each day aviation maintenance workers are sometimes faced with sub-optimal work conditions which contribute to fatigue. When these conditions can be controlled they must be. In 1989, the National Transportation Safety Board issued recommendations urging all modes of transportation to conduct research on fatigue and on the workplace environmental condition can affect it. As results of these researches in 1999 the FAA (Federal Aviation Administration) issued a CD-ROM titled Human Factors in Aviation Maintenance and Inspection (HFAMI) collecting various types of documents such as conference proceedings, research reports, and the &#x201C;Human Factors Guide for Aviation Maintenance.&#x201D; In which the &#x201C;Chapter 3 &#x2013; Workplace Safety&#x201D; states how a hangar floor should be organized.</para>
<fig id="F5.12" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 5.12</label>
<caption><para>Environmental condition for comfort.</para></caption>
<graphic xlink:href="graphics/fig5_12.jpg"/>
</fig>
<para>In particular, a rage of humidity, temperature and light has been fixed to create a &#x201C;comfortable area&#x201D; of work; adequate light is ensured by the large glazed areas of the hangar roof and complemented by fluorescent tubes up to 300 lux illumination. Even manual operations, in case must be done even if outside the comfortable area should beadapted like in the case of using grease, under a certain temperature should be managed in a slightly different way with more care than normal.</para>
<para>The goal of TELLME pilot is twofold: make the worker perfectly aware of conditions in order to avoid any problems and provide tailored training contents to train maintenance technicians in working on borderline conditions (e.g., how to manage grease). The solution implemented is of course leveraging on the Internet of Things; the workplace has been equipped with sensors for continuous monitoring of the environmental and able to notify a warning to the worker if the conditions (being out of comfortable area) could lead to safety risks for the worker and for the helicopter. Technically, the prototype has been implemented by a RaspberryPI on which humidity, light and temperature sensors are integrated and the final box positioned close to the workers. Different kind of messages (e.g., &#x201C;over threshold&#x201D;, &#x201C;still over threshold&#x201D;) are sent to the worker by its own mobile devices used to run interactive jobcards. Messages are sent from raspberry by AMQP protocol, received by RabbitMQ as broker a managed by a complex event processor implemented by Esper controlling whether or not the comfortable zone is respected and which are the implication with the current work-card describing the maintenance to be executed. To make the worker aware about the working conditions, warnings are sent by a web service as push messages and visualized by an Android native application on worker&#x2019;s smartphone. At the same time the warning are matched with the work card by the system that retrieves the right learning contents for the specific environmental conditions and push them to the workers by a specific GUI on the mobile device of the worker.</para>
</section>
<section class="lev2" id="sec5.6.4" label="5.6.4" xreflabel="sec5.6.4"><title>Future Work</title>
<para>The two scenarios are just few of the IoT enhanced Learning for complex systems maintenance that can be realized. TELLME is running the second iteration of the pilot in order to validate the solution. Firsts feedbacks proven the feasibility of the solutions and the positive impact especially in terms of worker stress; especially the FOD is a very important and stressful element of the daily work in aerospace and the IoT system designed is well seen by workers and an important support.</para>
</section>
</section>
<section class="lev1" id="sec5.7" label="5.7" xreflabel="sec5.7"><title>IoT-Driven Manufacturing Innovation Ecosystems</title>
<para>Innovation is one of the factors underpinning the success of manufacturing in current global markets. In a world where customer demands change at an accelerated pace and competition is ever growing in numbers and intensity, innovation is essential for business to remain productive and successful. This applies not only for New Product Introduction (NPI) activities but also to innovation in processes, equipment, ICT and other enabling aspects of manufacturing. In spite of its importance, innovation is still seen as a major challenge in manufacturing. Even though innovation usually requires information and support coming from an interactive ecosystem, the process still seems to be lineal, uninformed, slow and segregated. Given the nature of the limitations, the Internet of Things (IoT) has huge potential to <emphasis role="strong"><emphasis>drive innovation by connecting manufacturing ecosystems</emphasis></emphasis>.</para>
<para>The key to the potential role of IoT as a driver for manufacturing innovation is in the nature, extension and diversity of innovation cycles in manufacturing. Innovation cycles usually start with a new idea for a manufacturing entity, whether is a product, a process or a machine. This is followed by definition, prototyping and test stages, after which the final version is generated. Finally, there are steps to manage the in-life and end-of-life for the entity.</para>
<para>In manufacturing, several lifecycles coexist and converge during operation (Constantinescu, Landherr, &#x0026; Neumann, 2013). The most important lifecycles are for product and operations. However, other dominant lifecycles are for factories, ICT services and equipment (an example of the convergence of these cycles, adapted from Constantinescu, et. at. (2013), is shown in the following picture <link linkend="F5.13">Figure <xref linkend="F5.13" remap="5.13"/></link>.</para>
<para>Innovation cycles rely on key feedback loops and interactions with internal and external actors. For example, a new automotive engine would be designed taking into consideration warranty information from previous models to avoid known issues and customer dissatisfaction. Historic information may be pulled from internal databases to understand the causes of the most significant issues, enabling design decisions for optimized products. This kind of feedback loop requires interactions and information exchanges between different actors and objects in the product lifecycle. In this case, the engine in service and the customer would interact with the designer and the design being generated. This is a typical example of an interaction that would accelerate and optimize product innovation. Other interactions occur between different lifecycles. One such example would be the interaction between an equipment designer and an organization that uses the equipment to manufacture consumer products. In this case, the equipment designer may use performance and maintenance records to generate and improve design. Finally, there are interactions between producers and supporting actors such as government or R&#x0026;D organizations.</para>
<fig id="F5.13" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 5.13</label>
<caption><para>Convergence of lifecycles.</para></caption>
<graphic xlink:href="graphics/fig5_13.jpg"/>
</fig>
<para>Several solutions have been developed in the past to support these interactions. In the case of interactions within the product lifecycle, Product Lifecycle Management (PLM) systems and associated tools have offered substantial support during the past decades. As for cross cycle interactions, organizations have moved towards remote monitoring of their products and a Product Service System (PSS) approach (Mont, 2002). However, interactions are not always straightforward, effective or even possible due to connectivity issues.</para>
<para>The Internet of Things (IoT) is the concept of internet-enabled &#x201C;things&#x201D; (e.g. machines, sensors and mobile devices) to facilitate exchange of relevant information that can be ultimately used to create benefits for an individual or an organization. The concept has already been developed successfully in the consumer world. In the industrial context, it is already starting to show potential to drive smart manufacturing by facilitating, for example, the exchange of information between products and machines to enable self-adaptive processes and operations. As an enabler of connectivity, <emphasis role="strong"><emphasis>IoT also holds huge potential to drive innovation in manufacturing by forming real manufacturing innovation ecosystems</emphasis></emphasis>, facilitating interactions between the relevant actors and lifecycles.</para>
<para>The idea of seamless acquisition and transfer of the right information, to the right place, at the right time to drive innovation and the possibility to link the information to applications and people to draw further support, is a powerful one. IoT can enable the involvement of a diverse and heterogeneous ecosystem of organizations to exchange information and ideas for innovation. The support can be provided mainly at three levels, as listed below.</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para><emphasis role="strong">Single innovation cycle connectivity</emphasis>: This is where IoT is used to create connectivity between &#x201C;things&#x201D; within a single innovation cycle. The most representative example of this level would be the product lifecycle. In that case, IoT would enable products to be tracked throughout their whole life, absorbing relevant information and feeding it to design actors at the beginning of the cycle, involving the whole supply chain.</para></listitem>
<listitem><para><emphasis role="strong">Cross-cycle connectivity</emphasis>: At this level, the word &#x201C;ecosystem&#x201D; become more meaningful, as it brings up collaboration between diverse actors in a manufacturing environment. For example, an Original Equipment Manufacturers (OEM) could perform design based on information from their own equipment in the equipment lifecycle, but also include the impact of the equipment on product quality by adding connectivity to &#x201C;things&#x201D; in the product lifecycle. At this level, interactions become complex and security and privacy become prime concerns.</para></listitem>
<listitem><para><emphasis role="strong">External connectivity</emphasis>: Interactions between organizations that are not necessarily part of a manufacturing ecosystem or even the manufacturing sector may be valuable. The main interactions in this area are with organizations in the innovation chain (e.g. universities, research institutes, startups) and support networks (e.g. government and trade associations). Seamless connectivity with this kind of partner would bring additional knowledge and services to further accelerate innovation.</para></listitem>
</itemizedlist>
<para>In summary, the vision of IoT-driven Manufacturing Innovation Ecosystems is one where all &#x201C;things&#x201D; (products, machines, tools, sensors, mobile devices) are connected through the internet; where design-relevant information is captured and transferred to the right actors or applications; where applications that orchestrate the right interactions to drive innovation are enabled through an IoT network; where supporting organizations can provide information and services to accelerate innovation; and where transparency, collaboration and ownership are managed appropriately.</para>
<para>Such a vision can lead to Manufacturing Innovation Ecosystems that can anticipate new design requirements and react in an agile way to deliver novel solutions seamlessly. Ultimately, such ecosystems would thrive to capture market share by providing the best products produced by the most advanced manufacturing systems.</para>
<para>This section illustrates the potential of IoT to drive manufacturing innovation ecosystems and highlights the importance of adopting the approach. Furthermore, IoT as a driver of innovation in manufacturing opens the field for new opportunities that could lead to significant business benefits for the sector. Some of the most significant opportunities are:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>Servitization of innovation lifecycle management systems (such as PLM and asset management systems) and creation of information driven innovation networks around them;</para></listitem>
<listitem><para>Creation of functional and support partnerships to create strong pathways for accelerated innovation driven by IoT and the mechanisms required for smooth operation (e.g. security, privacy, legislation, contractual agreements);</para></listitem>
<listitem><para>Active co-creation or collaborative innovation, where partnerships, networks or communities connect to create a new solution jointly based on the best information, knowledge and skills available;</para></listitem>
<listitem><para>Enabling open innovation (Chesbrough, 2003) by facilitating authorized and agreed exchange of knowledge between organizations for the purpose of innovation, increasing levels of collaboration, opportunities for disruptive innovation and new business models.</para></listitem>
</itemizedlist>
<fig id="F5.14" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 5.14</label>
<caption><para>Innovation lifecycles interactions.</para></caption>
<graphic xlink:href="graphics/fig5_14.jpg"/>
</fig>
</section>
<section class="lev1" id="sec5.8" label="5.8" xreflabel="sec5.8"><title>Industrial Internet of Things: The US IGNITE Perspective</title>
<para>This section provides an overview of technologies, tools and practices pertaining to Internet of Things (IoT) in context of the US Ignite initiative. An introduction to IoT is first provided along with the objectives and aims of the US Ignite initiative. This is followed by a discussion of cyber physical approaches and frameworks and their impact on IoT. Finally, a discussion of a broad framework for collaboration using IoT and cyber physical frameworks is outlined.</para>
<para>The emphasis on adoption of IoT principles can also set in motion the realization of advanced next generation Cyber Physical relationships and frameworks which can enable software tools to control and accomplish various mundane as well as advanced physical activities; these applications can be a software entity on a smart phone controlling a robot helping a disabled person to drink a cup of water or it can be an advanced simulator being used as an interface to perform life saving medical surgeries in a hospital.</para>
<para>In an IoT context, one of the core benefits is from the cyber physical interactions which help facilitate changes in the physical world. The plethora of smart devices emerging in the market serves as a catalyst for this next revolution which will greatly impact manufacturing and manufacturing practices globally. Imagine being able to design, simulate and build a customized cell phone from a beach thousands of kilometers away from an engineering organization. Today, using cloud technologies and thin clients such as smart phones and smart watches, the potential of using such IoT principles and technologies for advanced manufacturing is very high.</para>
<para>Such cyber physical approaches also support an agile strategy which can enable organizations functioning as Virtual Enterprise partners to respond to changing customer requirements and produce a range of manufactured goods. With the help of advanced computer networks, such cyber (or software) resources and tools can be integrated with physical resources including manufacturing equipment. When customer requirements change, such an approach can also help interfacing and integrating with a variety of distributed physical equipment whose capabilities can meet the engineering requirements based on the changing product design. Against this backdrop, it is important to also underscore recent efforts to develop the next generation of Internets.</para>
<section class="lev2" id="sec5.8.1" label="5.8.1" xreflabel="sec5.8.1">
<title>Background on US IGNITE and the GENI/FIRE Initiatives</title>
<para>In the US, the Global Environment for Network Innovations (GENI) is a National Science Foundation led initiative focused on the design of the next generation of Internets including the deployment of software designed networks (SDN) and cloud based technologies. GENI can also be viewed as a virtual laboratory at the frontiers of network science and engineering for exploring Future Internet architectures and applications at-scale.</para>
<para>In the context of advanced manufacturing (such as micro assembly), such networks will enable distributed VE partners to exchange high bandwidth graphic rich data (such as the simulation of assembly alternatives, design of process layouts, analysis of potential assembly problems as well as monitoring the physical accomplishment of target assembly plans).</para>
<para>In the European Union (EU) and Japan (as well as other countries), similar initiatives have also been initiated; in the EU, the Future Internet Research and Experimentation Initiative (FIRE) is investigating and experimentally validating highly innovative ideas for new networking and service paradigms (http://www.ict-fire.eu/home.html).</para>
<para>Another important initiative is the US Ignite (http://us-ignite.org/) which seeks to foster the creation of next-generation Internet applications that provide transformative public benefit using ultrafast high gigabit networks. The six US national priority areas are the following:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>Health</para></listitem>
<listitem><para>Advanced manufacturing</para></listitem>
<listitem><para>Public Safety</para></listitem>
<listitem><para>Education &#x0026; Workforce</para></listitem>
<listitem><para>Energy</para></listitem>
<listitem><para>Transportation</para></listitem>
</itemizedlist>
<para>Both these initiatives herald the emergence of the next generation computing frameworks which in turn have set in motion the next Information Centric revolution in a wide range of industrial domains from engineering to public transport. These applications along with the cyber technologies are expected to impact global practices in a phenomenal manner. As research in the design of the next generation Internets evolves, such cyber physical frameworks will become more commonplace. Initiatives such as GENI and US Ignite are beginning to focus on such next generation computer networking technologies which hold the potential to radically change the face of advanced manufacturing and engineering (among other domains).</para>
</section>
<section class="lev2" id="sec5.8.2" label="5.8.2" xreflabel="sec5.8.2">
<title>Cyber Physical Tools and Frameworks</title>
<para>IoT entities and devices will greatly benefit from the evolution of Cyber Physical approaches, systems and technologies. The term &#x2018;cyber&#x2019; can refers to a software entity embedded in a thin client or smart device. A cyber physical system can be viewed as an advanced collaborative collection of both software and physical entities which share data, information and knowledge to achieve a function (which can be technical, service or social in nature). In a process engineering context, such cyber physical systems can be viewed as an emerging trend where software tools can interface or interact with physical devices to accomplish a variety of activities ranging from sensing, monitoring to advanced assembly and manufacturing.</para>
<para>In today&#x2019;s network oriented technology context, such software tools and resources can interact with physical components through local area networks or through the ubiquitous Word Wide Web (or the Internet). With the advent of the Next Generation Internet(s), the potential of adopting cyber physical technologies and frameworks for a range of process has increased phenomenally.</para>
<para>In the context of manufacturing, collaborations within an IoT context can be realized using various networking technologies including cloud based computing. According to the National Institute of Science and Technology (NIST), Cloud computing can be viewed as a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (including networks, storage, services and servers) <link linkend="B5-29">[29]</link>; the computing resources can be rapidly provisioned with reduced or minimal management effort or interaction with service providers. Some of the benefits for cloud based manufacturing include reducing up-front investments and lower entry cost (for small businesses), reduced infrastructure costs, and reduced maintenance and upgrade costs <link linkend="B5-28">[28]</link>. In <link linkend="B5-27">[27]</link>, Tao et al discussed the context of Internet of Things (IoT) and Cloud Computing (CC) which hold the potential to providing new methods for intelligent connections and efficient sharing of resources. The authors propose a service system which consists of CC and IOT based Cloud Manufacturing.</para>
<para>One of the US Ignite projects dealing with advanced manufacturing involves the creation of a GENI based cyber physical framework for advanced manufacturing <link linkend="B5-30">[30]</link>. The manufacturing domain is the assembly of extremely tiny micron sized devices. This is the first research project involving Digital Manufacturing, cyber physical frameworks and the emerging Next Generation Internet (being built as part of the GENI initiatives). A cyber physical test bed is under development to enable globally distributed software and manufacturing resources to be accessed from different locations and used to accomplish a complex set of life cycle activities including design analysis, assembly planning, simulation and finally assembly of micro devices. The presence of ultra-fast high gigabit networks enables the exchange of high definition graphics (in the Virtual Reality based simulation environments) and the camera monitoring data (of the various complex micro manipulation and assembly tasks by advanced robots and controllers). Engineers from different locations interact more effectively when using such Virtual Assembly Analysis environments and comparing assembly and gripping alternatives prior to physical assembly. GENI and FIRE Next Generation technologies also embrace software defined networking (SDN) principles, which not only reduces the complexity seen in today&#x2019;s networks, but also helps Cloud service providers host millions of virtual networks without the need for common separation isolation methods such as VLAN <link linkend="B5-31">[31]</link>. SDN also enables the management of network services from a central management tool by virtualizing physical network connectivity into logical network connectivity <link linkend="B5-31">[31]</link>.</para>
<para>The US Ignite initiative focuses on the creation and fostering of &#x2018;transformative, next-generation applications&#x2019; <link linkend="B5-32">[32]</link>; it seeks to create new business opportunities that will accelerate U.S. leadership in the adoption of ultra-fast broadband and software-defined networks both within and outside the US. These applications will range from how doctors get trained as well as provide medical services to how to build products faster and at a lower cost.</para>
</section>
</section>
<section class="lev1" id="sec5.9" label="5.9" xreflabel="sec5.9">
<title>Research, Innovation Challenges for IoT Adoption in Manufacturing: The SMART 2013/37 EC Study</title>
<para>The SMART 2013/37 EC study, entrusted by the EC DG CONNECT to IDC EMEA and TXT e-solutions, investigates the enabling factors for the European industry in the market emerging from the combination of IoT, Cloud Computing and Big Data, and provides a set of recommendations to foster European research activities and its capability to catch new market opportunities.</para>
<para>The study initially provides an overview of the IoT ecosystem in Europe and sketches possible evolutions of this ecosystem in 2020. Afterwards it tries to identify emerging markets and new business opportunities the mixing of IoT and Cloud Computing can offer within in the coming years. Finally, the study identifies the related research and innovation challenges and devises a coherent strategy and actions to address the identified challenges and foster the take-up of the IoT market in Europe and strengthen European actors&#x2019; position on this market. Even if the study was not specifically focused on the Industrial IoT, due to the relevance of manufacturing in the European market and the leading position of Europe in the manufacturing area, the study provides useful elements to frame IoT within manufacturing.</para>
<section class="lev2" id="sec5.9.1" label="5.9.1" xreflabel="sec5.9.1">
<title>The Study IoT and Cloud Research and Innovation Strategy</title>
<para>The disruptive nature of IoT, Cloud Computing and Big data, which is further enhanced by their combination, require a suitable methodology able to combine the traditional technology push and demand pull forces and to take into account the various relations and the potential stakeholders. The adopted guiding methodology to devise a Research and Innovation Strategy is depicted in <link linkend="F5.5">Figure <xref linkend="F5.15" remap="5.15"/></link>.</para>
<para>As clear from the figure, the methodology combines a forward analysis path (the upper red arrow) with a backward analysis one (the lower red arrow). The forward path is in line with the traditional technology-driven approach where research challenges spur the development of new technologies that bring out new business models and new market opportunities.</para>
<fig id="F5.15" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 5.15</label>
<caption><para>Conceptual Model of the development of the R&#x0026;I strategy.</para></caption>
<graphic xlink:href="graphics/fig5_15.jpg"/>
</fig>
<para>The backward analysis stream, instead, starts from the identification of new potential market scenarios and key factors to identify the main demand needs and requirements in the research area. The objective of the study research and innovation analysis methodology is to match requirements to research challenges, align the demand needs with the innovation challenges and foster the take-up of the most promising scenarios.</para>
</section>
<section class="lev2" id="sec5.9.2" label="5.9.2" xreflabel="sec5.9.2">
<title>The Main Market Trends</title>
<para>The market analysis moved from framing the IoT Ecosystem (see <link linkend="F5.16">Figure <xref linkend="F5.16" remap="5.16"/></link>) and the identification of the main interaction patterns.</para>
<fig id="F5.16" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 5.16</label>
<caption><para>The IoT ecosystem.</para></caption>
<graphic xlink:href="graphics/fig5_16.jpg"/>
</fig>
<para>The IoT ecosystem is heavily dynamic and is still evolving. For example, currently there is still a relevance of vertical markets, but the deployment of open standards and horizontal platforms will quickly change this aspect.</para>
<para>The main stakeholders&#x2019; categories identified for the IoT ecosystem can be summarised as follows:
<itemizedlist mark="bullet" spacing="normal">
<listitem><para><emphasis role="strong">Vendors</emphasis> that supply components to the solution providers. This category encompasses a large variety of enterprises for dimensions and specializations, ranging from large global multinationals to SMEs;</para></listitem>
<listitem><para><emphasis role="strong">Suppliers</emphasis> who develop IoT solutions or provide IoT related services;</para></listitem>
<listitem><para><emphasis role="strong">Customers/end-users</emphasis> who use IoT solutions or services.</para></listitem>
</itemizedlist></para>
<para>On the main trends side the study splits them according to the analysis methodology described above into:
<itemizedlist mark="bullet" spacing="normal">
<listitem><para><emphasis role="strong">Technology push trends</emphasis>:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para><emphasis>Enhanced connectivity infrastructure</emphasis>: the availability of suitable network connectivity is, on the one hand, a pre-requisite for IoT take-up, and, on the other hand, the increasing anything, anywhere and anytime connectivity is boosting IoT;</para></listitem>
<listitem><para><emphasis>Cloud computing</emphasis>: the availability of scalable and easily accessible virtualised resources is another key factor element;</para></listitem>
<listitem><para><emphasis>Big Data</emphasis>: also identified as <emphasis>analytics</emphasis> is another technological trend that is already characterizing the IoT market but will further characterize it in the near future. <emphasis>Analytics</emphasis> will span from the edge (i.e., <emphasis>Fog/Edge Computing</emphasis>) to the platforms on the cloud;</para></listitem>
<listitem><para><emphasis>Increasing role of smart devices</emphasis>: local sensing, computing and communication features will characterize all products in the coming years;</para></listitem>
<listitem><para><emphasis>Horizontal Platforms</emphasis>: service providers will push the market to adopt horizontal platforms therefore favouring economies of scale and the development of core services spanning different market segments.</para></listitem>
</itemizedlist></listitem>
<listitem><para><emphasis role="strong">Demand pull trends</emphasis>:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para><emphasis>Demographic trends</emphasis>: the aging population in Europe and Western World drives the need of IoT solutions especially in the healthcare and wellness market segments;</para></listitem>
<listitem><para><emphasis>Environmental consciousness</emphasis>: the development of a culture of eco-consciousness will create a demand for IoT solutions able to support the reduction of the environmental footprint of our societies;</para></listitem>
<listitem><para><emphasis>Public Sector driving role</emphasis>: the public sector will still play a role in asking for solutions able to improve their capabilities and efficiency in managing cities, transportation, health, tourism, etc.;</para></listitem>
<listitem><para><emphasis>Business demand/Consumers demand</emphasis>: the business environment will ask for solutions able to improve their efficiency, expand their products&#x2019; offering, increase the synergies and merging between products and services (servitization), while consumers will ask for more intelligent appliances (e.g., smart home, smart cars) and anywhere, anytime accessibility.</para></listitem>
</itemizedlist></listitem>
</itemizedlist></para>
<para>The vision of IoT in 2020 as identified by the IDC-TXT study is summarized in <link linkend="F5.17">Figure <xref linkend="F5.17" remap="5.17"/></link>.</para>
<fig id="F5.17" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 5.17</label>
<caption><para>The Vision of IoT in 2020.</para></caption>
<graphic xlink:href="graphics/fig5_17.jpg"/>
</fig>
<para>The vision can be summarized by the following figures:
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>expectation is to have across the EU 28 an excess of 6 billion IoT devices generating revenues for more than 1.81 billion Euro;</para></listitem>
<listitem><para>the IoT ecosystem will encompass not only the traditional supply-side actors but also an increasing number of businesses and organizations serving and using the IoT;</para></listitem>
<listitem><para>the hyper-connected society will be an established reality by 2020.</para></listitem>
</itemizedlist></para>
</section>
<section class="lev2" id="sec5.9.3" label="5.9.3" xreflabel="sec5.9.3">
<title>The IoT and Cloud Research and Innovation Challenges</title>
<para>Moving from the analysis of the current IoT scenario and challenges, and taking into account innovations related to the Cloud Computing, Big Data and other Future Internet technologies, the study identified a set of <emphasis role="strong">Grand Challenges</emphasis> and their most relevant research topics to be addressed in the next research actions of the Horizon 2020 Programme. The <emphasis>Grand Challenges</emphasis> are:
<itemizedlist mark="bullet" spacing="normal">
<listitem><para><emphasis role="strong">Open Integrated Architecture</emphasis>: the evolution is directed towards a 3rd generation platform concept and towards the integration and networking of platforms in a consistent and coherent integrated event driven and service oriented architecture. The most relevant research topics for this challenge are:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para><emphasis>From Networks of Things to the Internet of Things</emphasis>: promote the development of standardized interfaces, protocols and architecture to move from a "network of things" (e.g., siloed solutions, gateway-oriented approaches) to a solution where all things are directly accessible from any other point in the Internet;</para></listitem>
<listitem><para><emphasis>IoT Integrated Development and Runtime Environment</emphasis>: promote the development of new programming paradigms and run-time environments able to support the development of more responsive, distributed, dynamic and resilient systems;</para></listitem>
<listitem><para><emphasis>IoT Systems Lifecycle Management</emphasis>: promote the development of standardized management features able to face the IoT devices and services complexity, dynamics and heterogeneity.</para></listitem></itemizedlist></listitem>
<listitem><para><emphasis role="strong">End-to-End Connectivity</emphasis>: support the development of, and deploy, protocols and solutions able to assure end-to-end connectivity of heterogeneous IoT related systems (e.g., move to IPv6, meta-information and knowledge representation and exchange so that systems can expose in a more meaningful way their characteristics and more efficiently locate and use data or services provided by other systems, new architectural approaches like: "fog computing", Named Data Networking, cognitive networks). Related research topics are:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para><emphasis>Systems-of-Systems Networking</emphasis>: IoT requires new network approaches that permit easy connectivity, control and communications, and address IoT specific issues (e.g., scalability, manageability, resource usage, etc.);</para></listitem>
<listitem><para><emphasis>Knowledge-based IoT Networking</emphasis>: upper layers interfaces and protocols able to use knowledge to address the IoT connectivity and interoperability issues;</para></listitem>
<listitem><para>IoT Systems self-configuration: features to support (auto) configuration and reconfiguration of entities and systems.</para></listitem>
</itemizedlist></listitem>
<listitem><para><emphasis role="strong">Security by Design</emphasis>: assuring security and protection of the whole IoT system in a consistent and holistic approach along its whole life cycle. This challenge also accounts privacy management. Scalability of security (and privacy) solutions is also one of the issues to be addressed. The related research are:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para><emphasis>IoT Compatible Security Techniques</emphasis>: develop new encryption and security techniques (including secure identification, secure configuration, etc.) that can be usable on resource-constrained devices, and be scalable;</para></listitem>
<listitem><para><emphasis>IoT systems Trust Management</emphasis>: investigate and develop new scalable and usable solutions for privacy and security, including protocols and mechanisms able to represent and manage trust and trust;</para></listitem>
<listitem><para><emphasis>Security and Privacy by Design</emphasis>: introduce security and privacy by design approaches to make security and privacy an integral part of the systems.</para></listitem>
</itemizedlist></listitem>
<listitem><para><emphasis role="strong">Semantic-driven Analytics</emphasis>: the advent of new technologies for Big (stream and historical) Data analysis, knowledge-based reasoning and advanced (including distributed and real time) decision making. The impacts IoT will have on network architecture and &#x201C;consciousness&#x201D; of entities requires the development of more advanced, reliable and privacy aware approaches and technologies to make possible for entities to learn, think, and understand both physical and social worlds. Related research Topics are:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para><emphasis>Knowledge Extraction</emphasis>: develop techniques that convert raw data into usable knowledge; </para></listitem>
<listitem><para><emphasis>Semantic-based Data Quality</emphasis>: develop techniques that improve the trust/confidence level of acquired;</para></listitem>
<listitem><para><emphasis>Distributed and autonomous reasoning</emphasis>: develop protocols and platforms that support knowledge dissemination and distributed, autonomous reasoning.</para></listitem>
</itemizedlist></listitem>
</itemizedlist></para>
</section>
<section class="lev2" id="sec5.9.4" label="5.9.4" xreflabel="sec5.9.4">
<title>Study Conclusions and EC Policy Recommendations</title>
<para>The study outcomes were articulated in a set of strategic actions and recommendations. The strategic actions are structured in three main pillars:
<itemizedlist mark="bullet" spacing="normal">
<listitem><para><emphasis role="strong">Europe needs to invest in the development of technologies</emphasis> for the IoT, Cloud, and Big Data combination, able to manage complexity, provide scalability, guarantee usability and preserve privacy;</para></listitem>
<listitem><para><emphasis role="strong">Europe must develop the supply ecosystem</emphasis> and bridge the gap between research and market;</para></listitem>
<listitem><para><emphasis role="strong">Europe must promote and support the take-up of IoT by user industries</emphasis>, building the critical mass of users needed to encourage the investments needed for massive adoption; </para></listitem>
<listitem><para><emphasis role="strong">Europe must create favourable framework conditions for the development of the IoT ecosystem </emphasis>giving priority to the following main areas of action: developing the necessary skills, building trust in the emerging IoT economy, removing the regulatory barriers, and encouraging international cooperation.</para></listitem>
</itemizedlist></para>
<para>The recommendation were split into different categories (e.g., Policy Recommendations to the EC, Recommendations to National Governments, Recommendation to Large Enterprises).</para>
<para>In the following only the most relevant ones for the IERC cluster book are reported:</para>
<para><emphasis role="strong">Recommendation 1</emphasis>: raise the priority of IoT research in the H2020 Programme and prioritize the investment in the development of technologies for the IoT, Cloud, and Big Data combination, identified as the main priority to meet demand requirements in the period 2016&#x2013;2018;</para>
<para><emphasis role="strong">Recommendation 2</emphasis>: increase investments in the IoT and Cloud research and innovation area to support more innovation and take-up actions and accelerate the market and ecosystem development;</para>
<para><emphasis role="strong">Recommendation 3</emphasis>: promote the development of broad-based, open horizontal platforms, in order to overcome the potential fragmentation of the EU market and to support the development of a competitive supply industry and a balanced ecosystem;</para>
<para><emphasis role="strong">Recommendation 4</emphasis>: the EC should pay specific attention to the inclusion of innovative SMEs and start-ups in the research and innovation actions, incentivizing their active participation and making sure that they can access the necessary technology platforms to develop applications and services;</para>
<para><emphasis role="strong">Recommendation 5</emphasis>: the EC should implement Large Scale Pilot (LSPs), or other innovation actions, in the most relevant emerging IoT markets (Smart Energy, Smart Transport, Smart Manufacturing, Smart Government, Smart Health);</para>
<para><emphasis role="strong">Recommendation 6</emphasis>: the EC should promote the development of e-leadership skills for IoT;</para>
<para><emphasis role="strong">Recommendation 7</emphasis>: the EC should contribute to the promotion of IoT readiness, by assessing the main techno-economic and network infrastructure requirements and the potential risks of digital divide across Europe;</para>
<para><emphasis role="strong">Recommendation 8</emphasis>: the EC should promote IoT take-up and adoption by 1) promoting &#x201C;leading by example&#x201D; small innovation projects focused on proving the business case or developing innovative business models for the emerging IoT service economy 2) promoting the aggregation of demand and the use of pre-commercial procurement mechanisms in the public sector;</para>
<para><emphasis role="strong">Recommendation 9</emphasis>: the EC should promote the development of communities of stakeholders;</para>
<para><emphasis role="strong">Recommendation 10</emphasis>: the EC should ensure interoperability and security within Europe&#x2019;s major initiatives working closely with the Connecting Europe Facility (CEF) programme;</para>
<para><emphasis role="strong">Recommendation 11</emphasis>: the EC should evaluate the possibility to launch an IoT and Cloud Public-Private Partnership (PPP) to manage more effectively innovation and take-up actions, and specifically an Accelerator programme to fund innovative start-ups and SMEs bringing to market new IoT-based products and services;</para>
<para><emphasis role="strong">Recommendation 12</emphasis>: the EC should contribute to building trust and confidence in IoT by making sure that the research and innovation actions take into account psychological, social and pragmatic issues potentially affecting the trust and confidence of the potential users in IoT, Cloud, and Big Data solutions and services;</para>
<para><emphasis role="strong">Recommendation 13</emphasis>: the EC should help developing the internal single market for IoT services and applications, by promoting the adoption of open standards and interoperable solutions across Europe.</para>
</section>
</section>
<bibliography class="biblio" id="bib03">
<title>Bibliography</title>
<bibliomixed id="B5-1">[1] <ulink url="http://www.grantthornton.com/issues/library/survey-reports/food-and-beverage2014/09-Why-sustainability-makes-business-sense-in-6-survey-findings.aspx">http://www.grantthornton.com/issues/library/survey-reports/food-and-beverage2014/09-Why-sustainability-makes-business-sense-in-6-survey-findings.aspx</ulink> (<day>31</day>-<month>03</month>-<year>2015</year>).</bibliomixed>
<bibliomixed id="B5-2">[2] <ulink url="http://thebuildnetwork.com/leadership/sustainability/">http://thebuildnetwork.com/leadership/sustainability/</ulink> (<day>27</day>-<month>04</month>-<year>2015</year>).</bibliomixed>
<bibliomixed id="B5-3">[3] <ulink url="http://www.unep.org/pdf/UNEP_LifecycleInit_Dec_FINAL.pdf ">http://www.unep.org/pdf/UNEP_LifecycleInit_Dec_FINAL.pdf </ulink>(<day>31</day>-<month>03</month>-<year>2015</year>).</bibliomixed>
<bibliomixed id="B5-4">[4] <ulink url="http//www.lifecycleinitiative.org/starting-life-cycle-thinking/benefits/">http//www.lifecycleinitiative.org/starting-life-cycle-thinking/benefits/</ulink>(<day>27</day>-<month>04</month>-<year>2015</year>).</bibliomixed>
<bibliomixed id="B5-5">[5] <ulink url="http://www.atkearney.com/paper/-/asset_publisher/dVxv4Hz2h8bS/content/sustainability-a-product-life-cycle-approach/10192">http://www.atkearney.com/paper/-/asset_publisher/dVxv4Hz2h8bS/content/sustainability-a-product-life-cycle-approach/10192</ulink> (<day>27</day>-<month>04</month>-<year>2015</year>).</bibliomixed>
<bibliomixed id="B5-6">[6] <ulink url="http://www.volkswagenag.com/content/vwcorp/content/en/the_group/strategy.html ">http://www.volkswagenag.com/content/vwcorp/content/en/the_group/strategy.html </ulink>(<day>27</day>-<month>04</month>-<year>2015</year>).</bibliomixed>
<bibliomixed id="B5-7">[7] <ulink url="http://www.bmwgroup.com/e/0_0_www_bmwgroup_com/verantwortung /kennzahlen_und_fakten/sustainable_value_report_2010/einzelne_kapite l_englisch/11670_SVR_2010_engl_Sustainable_Operations.pdf">http://www.bmwgroup.com/e/0_0_www_bmwgroup_com/verantwortung /kennzahlen_und_fakten/sustainable_value_report_2010/einzelne_kapite l_englisch/11670_SVR_2010_engl_Sustainable_Operations.pdf</ulink>(<day>27</day>-<month>04</month>-<year>2015</year>).</bibliomixed>
<bibliomixed id="B5-8">[8] <ulink url="http//www.fcagroup.com/en-US/investor_relations/financial_information_reports/annual_report/2014/FCA_2014_Annual_Report.pdf ">http//www.fcagroup.com/en-US/investor_relations/financial_information_reports/annual_report/2014/FCA_2014_Annual_Report.pdf </ulink>(<day>27</day>-<month>04</month>-<year>2015</year>).</bibliomixed>
<bibliomixed id="B5-9">[9] <ulink url="http://www.trade.gov/press/publications/newsletters/ita_1008/sustainabl e-mfg_1008.asp ">http://www.trade.gov/press/publications/newsletters/ita_1008/sustainabl e-mfg_1008.asp </ulink>(<day>28</day>-<month>04</month>-<year>2015</year>).</bibliomixed>
<bibliomixed id="B5-10">[10]  <author><firstname>B.S</firstname>. <surname>Blanchard</surname></author>. <source>Design To Cost</source>, Life-Cycle Cost. <year>1991</year> Tutorial Notes Annual Reliability and Maintainability Symposium, available from Evans Associates, <publisher-loc>804 Vickers Avenue, Durham</publisher-loc>, NC 27701. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Design+To+Cost+1991" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B5-11">[11]  <author><firstname>S.</firstname> <surname>Dowlatshahi</surname></author>. The role of logistics in concurrent engineering. <source>Journal of Production Economics</source>, <volumenum>44</volumenum> <issue>(3)</issue>:<fpage>189</fpage>&#x2013;<fpage>199</fpage>, 1996. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Journal+of+Production+Economics+1991+3" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B5-12">[12]  <author><firstname>A. S.</firstname> <surname>Munro</surname></author>. Let&#x2019;s roast engineering sacred cows. <source>Machine Design</source>, <volumenum>67</volumenum><issue>(3)</issue>:<fpage>41</fpage>, <year>1995</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Machine+Design+1995+3" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B5-13">[13]  <author><firstname>A.</firstname> <surname>Sanders</surname></author>, and <author><firstname>J</firstname>. <surname>Klein</surname></author>. Systems Engineering Framework for Integrated Product and Industrial Design Including Trade Study Optimization. <source>Procedia Computer Science</source>,<volumenum> 8</volumenum><issue>(1)</issue>:<fpage>413</fpage>&#x2013;<fpage>419</fpage>, <year>2012</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Procedia+Computer+Science+2012+1" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B5-14">[14]  <author><firstname>G.</firstname> <surname>Rebitzer</surname></author>, <author><firstname>T.</firstname> <surname>Ekvall</surname></author>, <author><firstname>R.</firstname> <surname> Frischknecht</surname></author>,<author><firstname> D.</firstname> <surname> Hunkeler</surname></author>, <author><firstname>G.</firstname> <surname>Norris</surname></author>, <author><firstname>T.</firstname> <surname>Rydberg</surname></author>, <author><firstname>W.P.</firstname> <surname> Schmidt</surname></author>, <author><firstname>S.</firstname> <surname>Suh</surname></author>, <author><firstname>B.P.</firstname> <surname>Weidema</surname></author>, <author><firstname>D.W.</firstname> <surname>Pennington</surname></author>. Life cycle assessment Part 1:Framework, goal and scope definition, inventory analysis, and applications<source>. Environment International</source>, <volumenum>30</volumenum><issue>(5)</issue>:<fpage>701</fpage>&#x2013;<fpage>720</fpage>, <year>2004</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=%2E+Environment+International+2004+5" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B5-15">[15]  <collab>Society of Automotive Engineers</collab> (SAE). <source>Reliability and Maintainability: Guideline for Manufacturing Machinery and Equipment</source>. Available from M-110.2, Warrendale, PA, <year>1999</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Reliability+and+Maintainability%3A+Guideline+for+Manufacturing+Machinery+and+Equipment+1999" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B5-16">[16]  <collab>Scientific Applications International Corporation (SAIC)</collab>. <source>Life Cycle Assessment: Principles and Practice</source>. Available from 11251 Roger Bacon Drive, Reston, VA 20190, <year>2006</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Life+Cycle+Assessment%3A+Principles+and+Practice+2006" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B5-17">[17]  <collab>International Organization for Standardization (ISO)</collab>. <source>ISO 14040 Environmental Management &#x2013; Life Cycle Assessment &#x2013; Principles and Framework</source>. <volume>19971</volume>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=ISO+14040+Environmental+Management+-+Life+Cycle+Assessment+-+Principles+and+Framework+19971" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B5-18">[18]  <collab>IFIP-IPAC Task Force</collab>. <source>GERAM Generalised Enterprise Reference Architecture and Methodology</source>, Version <volumenum>1</volumenum>.<issue>6.1</issue>.<year> 1998</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=GERAM+Generalised+Enterprise+Reference+Architecture+and+Methodology+1998+6.1" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B5-19">[19]  <author><firstname>A. J.</firstname>, <surname>Nebro</surname></author>, and <author><firstname>J. J.</firstname>, <surname>Durillo</surname></author>. <source>jMetal 4.3 User Manual</source>. Available from Computer Science Department of the University of Malaga. <year>2013</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=jMetal+4%2E3+User+Manual+2013" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B5-20">[20]  <article-title>&#x201C;FITMAN,&#x201D;</article-title> [Online]. Available: <ulink url="http://www.fitman-fi.eu/">http://www.fitman-fi.eu/</ulink> <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=%22FITMAN%2C%22+2013" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B5-21">[21]  <article-title>&#x201C;FIWARE,&#x201D;</article-title> [Online]. Available: <ulink url="http://www.fi-ware.org/">http://www.fi-ware.org/</ulink> <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=%22FIWARE%2C%22+2013" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B5-22">[22]  <author><firstname>M.</firstname> <surname> Spirito </surname>European</author>and <author><firstname>J. </firstname> <surname>Sola</surname></author>, in <source>Internet of Things Applications &#x2013; From Research and Innovation to Market Deployment</source>, River Publishers Series in Communications, <year>2014</year>, pp. <fpage>243</fpage>&#x2013;<fpage>281</fpage>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Internet+of+Things+Applications+-+From+Research+and+Innovation+to+Market+Deployment+2014" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B5-23">[23]  <author><firstname>O.</firstname> <surname> Lazaro</surname></author>,<author><firstname> S.</firstname> <surname>Gusmeroli</surname></author> and <author><firstname>M.</firstname> <surname>Isaja</surname></author>, &#x201C;FITMAN Future Internet Enablers for the Sensing Enterp  rise: A FIWARE Approach &#x0026; Industrial Trialling,&#x201D; in <source>IWEI</source>,<year> 2015</year>  <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=IWEI+2015" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B5-24">[24] <author><firstname>J.</firstname> <surname>Ilmarinen</surname></author>, &#x00AB;Promoting active ageing in the workplace&#x00BB;, <source>European Agency for Safety </source>and Health at Work (OSHA), <year>2012</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=European+Agency+for+Safety++2012" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B5-25">[25] <collab>European Commission</collab>, [En l&#x00ED;nea]. Available:<ulink url="http://ec.europ a.eu/ economy_finance/articles/structural_reforms/2012-05-15_ageing_report_ en.htm">http://ec.europa.eu/ economy_finance/articles/structural_reforms/2012-05-15_ageing_report_ en.htm</ulink></bibliomixed>
<bibliomixed id="B5-26">[26] <ulink url="http://en.wikipedia.org/wiki/Internet_of_Things">http://en.wikipedia.org/wiki/Internet_of_Things</ulink></bibliomixed>
<bibliomixed id="B5-27">[27] <collab>Fei Tao, Ying Cheng, Li Da Xu, Lin Zhang, and Bo Hu Li</collab>. &#x201C;<article-title>CCIoT-CMfg: cloud computing and Internet of Things based cloud manufacturing service system</article-title>.&#x201D; <year>(2014)</year>: <fpage>1</fpage>-<fpage>1</fpage>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=CCIoT-CMfg%3A+cloud+computing+and+Internet+of+Things+based+cloud+manufacturing+service+system+2014" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B5-28">[28] <collab>Benefits of cloud computing</collab>, <ulink url="http://www.mbtmag.com/articles/2013/05/how-manufacturers-can-benefit-cloud-computing">http://www.mbtmag.com/articles/2013/05/how-manufacturers-can-benefit-cloud-computing</ulink></bibliomixed>
<bibliomixed id="B5-29">[29] <ulink url="http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf">http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf</ulink></bibliomixed>
<bibliomixed id="B5-30">[30]  <author><firstname>Cecil</firstname>,<surname> J.</surname></author>,<ulink url="https://vrice.okstate.edu/content/gigabit-network-and-cyber-ph ysical-framework">https://vrice.okstate.edu/content/gigabit-network-and-cyber-ph ysical-framework</ulink></bibliomixed>
<bibliomixed id="B5-31">[31] <ulink url="http//www.serverwatch.com/server-tutorials/eight-big-benefits-of-software-defined-networking.html">http//www.serverwatch.com/server-tutorials/eight-big-benefits-of-software-defined-networking.html</ulink></bibliomixed>
<bibliomixed id="B5-32">[32] <ulink url="https://www.us-ignite.org/about/what-is-us-ignite/">https://www.us-ignite.org/about/what-is-us-ignite/</ulink></bibliomixed>
<bibliomixed id="B5-33">[33] The study is available at:<ulink url="http://ec.europa.eu/digital-agenda/en/news/ definition-research-and-innovation-policy-leveraging-cloud-computing-and-iot-combination">http://ec.europa.eu/digital-agenda/en/news/ definition-research-and-innovation-policy-leveraging-cloud-computing-and-iot-combination</ulink></bibliomixed>
</bibliography>
</chapter>
<chapter class="chapter" id="ch06" label="6" xreflabel="ch06">
<title>Securing the Internet of Things &#x2013; Security and Privacy in a Hyperconnected World</title>
<authorgroup>
<emphasis role="strong"><author><firstname>Elias Z.</firstname> <surname>Tragos</surname></author><superscript>1</superscript>, <author><firstname>Henrich C.</firstname> <surname>P&#x00F6;hls</surname></author><superscript>2</superscript>, <author><firstname>Ralf C.</firstname> <surname>Staudemeyer</surname></author><superscript>2</superscript> <author><firstname>Daniel</firstname> <surname>Slamanig</surname></author><superscript>3</superscript>, <author><firstname>Adam</firstname> <surname>Kapovits</surname></author><superscript>4</superscript>, <author><firstname>Santiago</firstname> <surname>Suppan</surname></author><superscript>5</superscript>, <author><firstname>Alexandros</firstname> <surname>Fragkiadakis</surname></author><superscript>1</superscript>, <author><firstname>Gianmarco</firstname> <surname>Baldini</surname></author><superscript>6</superscript>, <author><firstname>Ricardo</firstname> <surname>Neisse</surname></author><superscript>6</superscript>, <author><firstname>Peter</firstname> <surname>Langend&#x00F6;rfer</surname></author><superscript>7</superscript>, <author><firstname>Zoya</firstname> <surname>Dyka</surname></author><superscript>7</superscript> and <author><firstname>Christian</firstname> <surname>Wittke</surname></author><superscript>7</superscript></emphasis>
</authorgroup>
<para><superscript>1</superscript>FORTH, Greece</para>
<para><superscript>2</superscript>University of Passau, Germany</para>
<para><superscript>3</superscript>Technical University of Graz, Austria</para>
<para><superscript>4</superscript>Eurescom, Germany</para>
<para><superscript>5</superscript>Siemens AG, Germany</para>
<para><superscript>6</superscript>European Commission, Joint Research Centre (JRC), Italy</para>
<para><superscript>7</superscript>IHP, Germany</para>
<section class="lev1" id="sec6.1" label="6.1" xreflabel="sec6.1">
<title>Introduction</title>
<para>The Internet of Things (IoT) introduces itself as a basic set of technological enablers to support the provision of innovative applications that can improve the quality of life of people and industrial productivity. IoT is increasingly supported by various stakeholders and market players that see clear business opportunities in this field. Cities have also identified the potential of IoT both for providing smart services to their citizens and for boosting the local economy by providing opportunities for new jobs and new businesses. Industry is considering IoT&#x2019;s adoption to drive Industry 4.0. All these are key reasons why IoT has attracted so much attention lately in both the research and the industrial world.</para>
<para>Main research areas in the IoT world until now included the development of technologies to efficiently interconnect large numbers of devices. Mobile phones and &#x201C;dumb&#x201D; devices (sensors and actuators) are being increasingly equipped with intelligence so that they are becoming able to act autonomously for supporting new and advanced applications for healthcare, transportation, business control, and security, as well as energy and environmental monitoring.</para>
<para>Several estimations have been made for the number of devices that will be interconnected in the next few years and it looks like that billions of devices will be connected to the global Internet by 2020. In such a hyperconnected world, where all these devices are continuously monitoring their environment including the activities and everyday lives of citizens new threats arise regarding security and privacy. Providing a holistic security framework for IoT systems is not an easy task to do, because it requires cross-layer mechanisms <link linkend="B6-1">[1]</link> and systems needs to be designed to be secure and privacy preserving. Retrofitting security mechanisms in non-secure IoT systems can provide only a very limited level of security.</para>
<para>The aim of this chapter is to discuss the challenges for security and privacy in a hyperconnected world where humans are assisted by machines and technology, but not watched by or through them. Starting from the need to adopt the essence of &#x201C;security and privacy by design&#x201D;, we discuss why there is a need to embed security mechanisms in a system from the conceptual phase through the design process to ensure a maximum level of data protection and to guarantee end-to-end security. </para>
<para>Firstly, we put the focus on the devices discussing two different research areas: (i) physical IoT security, namely what are the threats to IoT when someone has access to the physical device and how can we protect them and (ii) embedded security and privacy on the constrained devices and why a system cannot be fully secure without securing the devices that generate the data first. This latter part discusses several techniques, e.g. for lightweight encryption, data minimization, integrity protection and usage of gateways to enforce security policies close to the constrained devices.</para>
<para>Secondly, this chapter discusses the importance of protecting not only the data, but the metadata as well to ensure that the communication stays unobservable, providing also countermeasures regarding how to be protected from network traffic analysis. Access control based on trust policies is also an important research area in the IoT and is briefly discussed next, aiming to show the importance of context information in the decisions regarding access control.</para>
<para>Finally, we conclude with a discussion on enforcing security and privacy in the &#x201C;Cloud&#x201D;, as more and more IoT systems are utilizing the cloud both for storage and processing of the IoT data. What type of security and (mainly) privacy mechanisms need to be applied in the cloud to protect the data is currently an area which only lately started to receive attention and so far has not been properly explored, so we try to provide here an overview and suggest a way forward.</para>
</section>
<section class="lev1" id="sec6.2" label="6.2" xreflabel="sec6.2">
<title>End-to-End Security and Privacy by Design</title>
<para>End-to-end security is a term that has quite distinct meanings depending on the OSI layer it refers to. In a hyperconnected IoT world, a multitude of networks and heterogeneous systems are bridged including a wide range of middleware systems that are all gathering, storing, and processing data. Then, from these huge amounts of data, information has to be generated to extract context for making smart decisions. Hence, end-to-end security between the devices and the applications is of paramount importance for protecting the privacy of people&#x2019;s personal data across the different systems and technologies that are involved. This requires strong data protection not limited to transit over wireless and intermediate Internet links, but also in all intermediate storage and processing points, till the data finally reaches solely its intended recipient.</para>
<para>The amount of acquired and processed data that will be ubiquitously provided in IoT becomes a huge concern for the people who are directly or indirectly monitored through their physical surroundings. Collection of personal information, starting even from their own devices and the surroundings they interact with, is high in quantity, quality and sensitivity. All this motivates the need for privacy in IoT <link linkend="B6-2">[2]</link>.</para>
<para>The ubiquitous data collection in IoT is massive, even higher in comparison to other intrusive systems, such as online social networks and search engines <link linkend="B6-3">[3]</link>. While these generally trade privacy for commodity, their data collection depends on user interaction.</para>
<para>The ubiquity and pervasiveness of sensors to measure the status and context of an environment bring new types of privacy threats for the persons acting in that environment, regardless of them being users of the system or not. Thus, protecting the privacy of system participants as well as casual users and non-involved subjects in a future IoT is one of the main challenges for privacy-related research.</para>
<para>With the extensive data collection in mind it is clear that much of the business value lies in offering services that process and analyse the huge amounts of data collected [<link linkend="B6-2">2</link>, <link linkend="B6-4">4</link>]. Nevertheless, these services should be as well privacy-enhanced, respecting and protecting the privacy of people&#x2019;s personal information. As a prerequisite for this the IoT systems must be built based on the concept of &#x201C;privacy by design&#x201D;, which means that privacy enhancing mechanisms must be deeply rooted inside the IoT architecture. Furthermore, the solution should be such that every data subject should be able to give consent to the collection, storage and processing of their personal data for the particular known in advance purpose (consent and purpose). These are the challenges of, &#x201C;Privacy by Design&#x201D; in IoT, see [<link linkend="B6-5">5</link>, <link linkend="B6-6">6</link>].</para>
<para>Tackling these challenges is one of the most important business factors of the future IoT. As stated in the Opinion 8/2014 of the Article 29 Data Protection Working Party: &#x201C;Organisations which place privacy and data protection at the forefront of product development will be well placed to ensure that their goods and services respect the principles of privacy by design and are equipped with the privacy friendly defaults expected by EU citizens.&#x201D;</para>
</section>
<section class="lev1" id="sec6.3" label="6.3" xreflabel="sec6.3">
<title>Physical IoT Security</title>
<para>The major concern when implementing cryptographic functions on constrained devices is efficiency, due to the fact that devices are battery driven and shall be working for years. Unfortunately, this focus may lead to a vulnerable network even though cryptographic functions may be supported by those devices. The issue here is that implementations of cryptographic algorithms may be insecure even if the algorithm is considered to be secure. An implementation may indirectly provide information on the keys used for example by its timing or energy consumption. This is especially dangerous in the IoT context since here at least for some applications we need to consider that devices can be stolen, analysed in a well-equipped lab and brought back. Due to the wireless communication and the fact that the devices can be unreachable for some time such attacks might go fully undetected. Next, we provide examples of such attacks and their countermeasures.</para>
<section class="lev2" id="sec6.3.1" label="6.3.1" xreflabel="sec6.3.1">
<title>Selected Low-Cost Attacks</title>
<para>The strength of cryptographic algorithms according to the definition of Kerckhoff <link linkend="B6-7">[7]</link> is based only on the used key that is kept secret. This means a potential attacker may know the algorithm itself, plain text, encrypted text and even the length of the key. From this point of view cryptographic approaches are secure if the time for brute forcing is long, that is if length of the key is sufficient.</para>
<para>The main assumption here is that the cryptographic device is a black box for an attacker, assuming he knows the cryptographic function but cannot get any details about how it is calculated. But in the IoT environments this assumption does no longer hold, due to the fact that devices may be stolen.</para>
<para>Even simple measurements like the ones of the current flowing through the chip or its electromagnetic radiation while a cryptographic function is calculated provide sufficient details to extract the key successfully. Such attacks &#x2013; denoted as Side Channel Analysis (SCA) attacks &#x2013; are often low-cost, easy and powerful. Even a single measurement can be sufficient to extract the cryptographic key in a few minutes for algorithms that are considered to be mathematically secure.</para>
<fig id="F6.1" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 6.1</label>
<caption><para>Implementation of cryptographic function &#x2013; here the elliptic curve point multiplication &#x2013; without paying attention to the SCA i.e. the shape of PT depends on the contents of the processed bit. This allows extracting the cryptographic key directly from the measured trace.</para></caption>
<graphic xlink:href="graphics/fig6_1.jpg"/>
</fig>
<fig id="F6.2" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 6.2</label>
<caption><para>Implementation of the same cryptographic function taking SCA into account: the shape of the PT is always the same always, i.e. different key bits can no longer be distinguished in the PT. The cryptographic key cannot be extracted directly from measured trace.</para></caption>
<graphic xlink:href="graphics/fig6_2.jpg"/>
</fig>
<para><link linkend="F6.1">Figure <xref linkend="F6.1" remap="6.1"/></link> and <link linkend="F6.2">Figure <xref linkend="F6.2" remap="6.2"/></link> show the same part of a measured PTs corresponding to processing the first 15 bits of the same cryptographic key using the same input on two different accelerators. It&#x2019;s a power trace of the elliptic curve point multiplication denoted as kP.</para>
<para>The calculations executed by two different IHP hardware accelerators of the kP operation of the standardized B-233 curve <link linkend="B6-8">[8]</link>. The shape of the measured traces is influenced by the private key, i.e. the shape of PTs while processing a &#x2018;1&#x2019; key bit differs from the shape of a &#x2018;0&#x2019;.</para>
<para>If the cryptographic function is implemented without considering SCA this influence can be strong and the attacker can directly extract the key from a measured PT.</para>
<para>For example in <link linkend="F6.1">Figure <xref linkend="F6.1" remap="6.1"/></link> two different kinds of the shapes are observable: time slots that have a &#x201C;big white tooth&#x201D; at its end and those without it. Using the assumption that the big white tooth at the end of the timeslots corresponds to the processing of a &#x2018;1&#x2019; key bit and other kind of slots corresponds to &#x2018;0&#x2019; key bit the used key can be correctly extracted.</para>
<para>Cryptographic algorithms implemented without considering SCA attacks can be called &#x201C;weak&#x201D; implementations. Knowledge about the details of such attacks &#x2013; their main assumptions and the exploited characteristics &#x2013; can help to implement the cryptographic algorithms in a way to be more resistant to such known attacks.</para>
<para>Figure shows the same part of the power trace of the same kP operation but executed on an improved version of our hardware accelerator, now all key bits are processed in the same way, i.e. simple power analysis attacks do not succeed.</para>
<para>Differential power analysis attacks are more powerful using statistical methods for analysis of measured traces. A very efficient, low-cost, fast and relatively easy attack on an elliptic curve cryptography (ECC) implementation is the horizontal power analysis using a difference of means test.</para>
<para>Each time slot can be observed as an independent curve. The mean curve of all slots can be calculated. After this the mean curve can be compared point wise with each slot.</para>
<para>If the power value of the mean curve is higher than the value of the current slot, it was assumed, this slot corresponds to the key bit value &#x2018;1&#x2019;, otherwise to &#x2018;0&#x2019;. Thus, the first key candidate was obtained. Repeat this for all other points of the mean curve and you obtain the remaining key candidates.</para>
<para>We performed a horizontal power analysis attack using the difference of means test as described above for two simulated power traces. The power consumption of the IHP ECC design while processing the given EC point P using two different 232 bit long keys &#x2013; k1 and k2 &#x2013; was simulated using Synopsis Tools PrimeTime <link linkend="B6-9">[9]</link>.</para>
<para>It obtained 57 key candidates for each of the investigated keys and we calculated the correctness of the extraction for each key. From a security point of view the ideal case is if the correctness of the key extraction is 50% for all key candidates. The green line in <link linkend="F6.3">Figure <xref linkend="F6.3" remap="6.3"/></link> corresponds to this case.</para>
<para><link linkend="F6.3">Figure <xref linkend="F6.3" remap="6.3"/></link> demonstrates how powerful a difference of means based attack can be. In the case investigated here 225 bits of the 232 bit long 1st key candidate were extracted correctly, i.e. the correctness is about 97% in both keys. The correctness of the next probable 4 key candidates is also high from 70% up to 90%.</para>
<fig id="F6.3" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 6.3</label>
<caption><para>Relative correctness of the extraction of the key for each of the key candidates as a curve.</para></caption>
<graphic xlink:href="graphics/fig6_3.jpg"/>
</fig>
<fig id="F6.4" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 6.4</label>
<caption><para>Difference of the traces of kP and of key candidate&#x00B7;P. The first quarter of the trace is equivalent to the noise, i.e. the quarter of the most significant bits of the key_candidate is the same as the quarter of the most significant bits of k while all remaining bits differ.</para></caption>
<graphic xlink:href="graphics/fig6_4.jpg"/>
</fig>
<para>The next power analysis attack (<link linkend="F6.4">Figure <xref linkend="F6.4" remap="6.4"/></link>) that we performed based on direct comparison of two traces is similar to the one first introduced in <link linkend="B6-10">[10]</link>. The main assumption here is that an attacker can run the device with a key candidate.</para>
<para>The idea is that the difference of two power traces is close to zero, i.e. is comparable to the noise, if the kP operation with the same EC point and with the same scalar k is performed. This means the key can be extracted serially, bit by bit.</para>
<para>Using the attack sketched above only about 100 measurements without any statistical processing of the measured data are necessary to extract a 232 bit long key k correctly. So the mathematically strong secure 232 bits long cryptographic key can be extracted correctly in a few hours only.</para>
</section>
<section class="lev2" id="sec6.3.2" label="6.3.2" xreflabel="sec6.3.2">
<title>Key Extraction Attacks and Countermeasures</title>
<fig id="F6.5" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 6.5</label>
<caption><para>Key extraction attacks and countermeasures.</para></caption>
<graphic xlink:href="graphics/fig6_5.jpg"/>
</fig>
<para><link linkend="F6.5">Figure <xref linkend="F6.5" remap="6.5"/></link> represents all types of attacks and countermeasures for public key cryptography. The diagram reflects that most of the attacks and counter- measures are based on a never expressed assumption i.e. the fact that the implementation of the cryptographic function is constant i.e. it cannot change during the attacks. This assumption is displayed as a rectangle connecting the attack and the countermeasure part.</para>
<para>The columns in the figure display:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>attacks in which the attacker can read out the key directly (left most column).</para></listitem>
<listitem><para>changes in the output data (middle column).</para></listitem>
<listitem><para>changes in the measured traces (right most column).</para></listitem>
</itemizedlist>
<para>The rows represent all parameters that can be manipulated by the attacker i.e. the key candidate, other input data as well as the environmental parameter are given as rows.</para>
<para>The part of the <link linkend="F6.5">Figure <xref linkend="F6.5" remap="6.5"/></link> representing the countermeasures is similarly structured as the attack part. The columns represent the same type of attacks as in the upper part of the diagram. The rows show countermeasures that (i) reduce the information that is contained in measurement results or that avoid access to faulty intermediate results, and (ii) avoid attacks by detecting the attack before it has any effect on the cryptographic implementation.</para>
<para>All countermeasures displayed in <link linkend="F6.5">Figure <xref linkend="F6.5" remap="6.5"/></link> can help avoid attacks or at least hamper the potential success. Thus, they provide reasonable means to increase the security of the IoT. They come with some cost with respect to area and/or energy. Since cost of the devices and/or energy efficiency are paramount in IoT applications the use of countermeasures needs to be considered carefully. But in case physical access to IoT devices cannot be avoided and security is essential countermeasures need to be included in the implementations in order to ensure security.</para>
</section>
</section>
<section class="lev1" id="sec6.4" label="6.4" xreflabel="sec6.4">
<title>On Device Security and Privacy</title>
<para>Designing a secure IoT system requires the embedding of security and privacy enhancing mechanisms locally on the devices near the physical entity of interest, whenever possible. Of course, this is much harder and more costly to maintain, e.g. it requires doing software updates for each smart device, which in turn requires reprogramming the actual device over the air, restarting it without needing human intervention and without configuring it again. Hardware must be capable of supporting advanced or even basic security mechanisms, as an insecure or non-private system design is hard to be turned later on into a privacy preserving or secure system.</para>
<para>The RERUM project tackles this with an &#x201C;On-Device First&#x201D; approach. RERUM&#x2019;s devices are made capable to run algorithms that enable the protection of security and privacy locally, by supporting advanced on-device security and privacy preserving mechanisms and over the air updating of the on-device software, while maintaining their energy consumption at very low levels.</para>
<section class="lev2" id="sec6.4.1" label="6.4.1" xreflabel="sec6.4.1">
<title>Mediated Device Access for Security and Privacy</title>
<para>Security and privacy threats are continuously becoming more intelligent and they require more sophisticated countermeasures than IoT devices are capable of. Hence, we need an IoT gateway or IoT router to shield it. This is known as mediated device access. This gateway enables to hot-fix or firewall a large number of IoT devices from emerging threats, without the need to exchange every hardware device. Of course, if the local hardware device&#x2019;s privacy and security capabilities are outdated, the local threat level increases regardless of a gateway firewalling them from global threats. Thus, if one wants to secure the hotel building&#x2019;s management from the attacking hotel guest, each local device&#x2019;s security must be kept up-to-date.</para>
<para>Additionally to security, a gateway could be the local point of control and enforcement for privacy, as it has far more processing capabilities and gathers far more information from the environment than a single device. We assume that to apply privacy enhancing technologies (PET) the gateway would be trusted to act in the data subject&#x2019;s interest. Moreover, the gateway can use the diverse information it has from fusing other data from the data subject&#x2019;s devices as some form of ground truth or guidance, e.g., apply the PET differently when the data subject is at home or not. Mediated access to the lower end IoT devices, and hence some IoT gateway, is a necessity to ensure security and privacy.</para>
</section>
<section class="lev2" id="sec6.4.2" label="6.4.2" xreflabel="sec6.4.2">
<title>Encryption</title>
<para>IoT mainly consists of severely resource constrained devices that are not capable of running complex encryption mechanisms like standard PCs. Thus, lightweight encryption mechanisms are of paramount importance for increasing the security of IoT. Lightweight cryptography normally provides adequate security but does not always consider energy efficiency. Symmetric key cryptography using Advanced Encryption Standard (AES) <link linkend="B6-48">[48]</link> is widely used in practical implementation of encryption based on block ciphers on constrained devices. Hash functions (e.g. SHA-3 <link linkend="B6-49">[49]</link>) are also widely used but they are not lightweight, and only lately there are some research steps towards lightweight hash functions. Elliptic Curve Cryptography (ECC) <link linkend="B6-50">[50]</link> is used in IoT due to the fact that it uses keys of much smaller size than standard public key cryptography mechanisms. However, its execution time might still not be fast enough for some devices.</para>
<para>The majority of existing encryption algorithms do not fully fulfil the requirements for energy efficiency. Furthermore, key distribution schemes are necessary for their proper operation, making the network vulnerable to adversaries that manage to capture the keys during key exchange. Basic requirements for efficient lightweight IoT encryption can be assumed to be the following:
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>Encryption mechanisms have to be optimized for their energy efficiency. This is critical as sensors are resource constrained devices in terms of memory, CPU, and processing;</para></listitem>
<listitem><para>Key distribution schemes should be avoided or their usage should be minimized. These consume valuable energy, and there is also the risk of information hijacking (by an adversary) during the key exchange and</para></listitem>
<listitem><para>Keys should not be pre-stored on the sensor device (currently this is done usually during manufacturing). This poses a significant security threat as sensors can be easily compromised when placed in outdoor environments.</para></listitem>
</itemizedlist>
</para>
<para>In Wireless Sensor Networks (WSNs) the Compressive Sensing (CS) technique has been widely used for compressing the data that are gathered by sensors. CS is a very useful technique because it applies at the same step both data compression and lightweight lossy encryption <link linkend="B6-50">[51]</link>. The reconstruction error is directly related with the level of compression and encryption and the nature of the signal that is captured by the sensor. For example, a slow varying temperature signal has very low reconstruction error, while another signal that has rapid changes will result to a very high reconstruction error.</para>
<para>Within RERUM, a technique for extracting the encryption keys for CS at real-time has been proposed, supporting the requirement for not hardware-coding the keys on the IoT devices <link linkend="B6-52">[52]</link>. Key extraction is performed using channel measurements, thus there is no need for any key distribution mechanism. The derived keys are used for encryption/decryption using the primitives of CS. Evaluation results have shown that legitimate nodes experience a very low reconstruction (decryption) error, while adversaries located at a distance greater than half of the carrier frequency&#x2019;s wavelength, experience a higher error, thus being unable to capture and decode sensitive information.</para>
</section>
<section class="lev2" id="sec6.4.3" label="6.4.3" xreflabel="sec6.4.3">
<title>Integrity</title>
<para>Integrity is the &#x201C;property that data has not been altered [&#x2026;] in an unauthorised manner&#x201D;<footnote id="fn6_1" label="1"><para>ETSI TS 133 105 V10.0.0 (2011-04)</para></footnote>. In a hyperconnected world, the IoT&#x2019;s flow of communication is highly loosely coupled, meaning that data that are transmitted over a secure channel are then stored and processed or transmitted further later. Protecting the integrity for those type of loosely connected data can be achieved by message-level protection mechanisms. Using a cryptographically secure signature scheme, based on asymmetric keys, allows verifying that data has not been modified in unauthorised ways. Additionally, you gain origin-authentication, i.e., verifying which entities&#x2019; public key signed the data. Adding a message authentication code (MAC), with a shared key between sender and receiver, also allows ensuring that the message&#x2019;s integrity cannot be violated without being detected by the receiver.</para>
</section>
<section class="lev2" id="sec6.4.4" label="6.4.4" xreflabel="sec6.4.4">
<title>Data Minimisation</title>
<para>In <link linkend="B6-53">[53]</link>, the authors underline that the very foundation of privacy by design is data minimization, which is defined as the property to limit as much as possible the release of personal data and, for those released, preserve as much unlinkability as possible <link linkend="B6-54">[54]</link>. To exemplify how data minimization is related to privacy by design, the reader is referred to the popular Privacy By Design framework <link linkend="B6-55">[55]</link>.</para>
<para>If personal data collection is minimized from the very beginning, much less effort will be needed to further define and implement appropriate privacy enhancing mechanisms. The application of adequate technologies for data minimization requires expertise in the services that the IoT system provides. The engineer must decide if it is possible to render the same (or comparable) functionality with less amount of personal information. In some cases, unlinkability might not always be desirable, for instance if devices and data must be needed to be linked to a user, for billing, authentication or otherwise.</para>
<para>The best place to achieve data minimization is on the devices where the data are sensed, as the amount of personal information can be minimized before the data are transmitted from the devices to the backbone system. This can be enforced with hard privacy mechanisms, such as malleable signatures and group signatures <link linkend="B6-56">[56]</link>, which can be implemented on devices to ensure integrity and create unlinkability for data. Location privacy technologies <link linkend="B6-57">[57]</link> can be applied on devices e.g. to measure traffic data and compute averages of speed and distance, while anonymizing a participant&#x2019;s real location in the geolocation system.</para>
<para>In addition to privacy preserving technologies for sensed data, further privacy mechanisms are needed for quasi-identifiers such as metadata and IP-addresses can provide sensitive information. Traffic analysis, as one example, is frequently used to identify the sources of data and thus de-anonymize the information. Mechanisms to ensure communication observability can further enhance privacy protection for the IoT, which are discussed in the following section.</para>
</section>
</section>
<section class="lev1" id="sec6.5" label="6.5" xreflabel="sec6.5">
<title>Unobservable Communication</title>
<para>Even if the protection of user data is addressed by means of end-to-end encryption in the future, we still need to look into information loss caused by leaking protocol metadata. This leakage can go up to the point, which may render end-to-end encryption obsolete. To reduce it, at least the following properties <link linkend="B6-58">[58]</link> shall be preserved by the network of IoT devices:
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>Coding &#x2013; All messages with the same encoding can be traced.</para></listitem>
<listitem><para>Size &#x2013; Messages with the same size can be correlated.</para></listitem>
<listitem><para>Timing &#x2013; By observing the duration of a communication and considering average round-trip times between the communication partners patterns of network participation can be extracted.</para></listitem>
<listitem><para>Counting &#x2013; The number of messages exchanged between the communicating parties can be observed.</para></listitem>
<listitem><para>Volume &#x2013; Volume combines information gained from message size and count. The volume of data transmitted can be observed.</para></listitem>
<listitem><para>Pattern &#x2013; By observing communication activity, patterns of sending and receiving can be observed.</para></listitem>
</itemizedlist></para>
<para>Furthermore, message frequencies and flow can be analysed. The message flow between parties includes both the traffic volume and communication pattern. Communication partners have a unique distinguished behaviour that can be fingerprinted. An observer can perform a brute force analysis of the network by observing all possible paths of communication and generating a list of all possible recipients.</para>
<para>Finally the observer can also perform a long term intersection/disclosure analysis of the network by observing devices and the network for long time and reducing the set of possible communication paths and recipients by analysing online and offline periods. Characteristic usage patterns, such as an IoT device connecting every minute, may appear and can be used to further reduce the number of possible paths.</para>
<para>The following Table summarises the message properties and how they can be addressed.</para>
<table-wrap position="float" id="T6.1">
<label>Table 6.1</label>
<caption><para>Message properties</para></caption>
<table cellspacing="5" cellpadding="5" frame="hsides" rules="all" border="1">
<thead>
<tr>
<th><para>Attacks Based on</para></th>
<th><para>Proposed Solutions</para></th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top"><para>Message Coding</para></td>
<td valign="top"><para>Change coding during transmission e.g. with k-nested encryption</para></td>
</tr>
<tr>
<td valign="top"><para>Message Timing</para></td>
<td valign="top"><para><orderedlist numeration="arabic" continuation="restarts" spacing="normal">
<listitem><para>batched forwarding of messages</para></listitem>
<listitem><para>random delay of messages</para></listitem></orderedlist></para></td>
</tr>
<tr>
<td/>
<td valign="top"><para>(delay<subscript>min</subscript> &#x2265; latency<subscript>max</subscript>)</para></td>
</tr>
<tr>
<td valign="top"><para>Message Size</para></td>
<td valign="top"><para>Use a predefined message size and padding small messages</para></td>
</tr>
<tr>
<td valign="top"><para>Message Counting</para></td>
<td valign="top"><para>Receive and forward a standard number of messages and use dummy traffic</para></td>
</tr>
<tr>
<td valign="top"><para>Communication Volume</para></td>
<td valign="top"><para>Protect message size and communication volume</para></td>
</tr>
<tr>
<td valign="top"><para>Communication Pattern</para></td>
<td valign="top"><para>Continuous network participation</para></td>
</tr>
<tr>
<td valign="top"><para>Message Frequency</para></td>
<td valign="top"><para>Use a standardized message exchange pattern</para></td>
</tr>
<tr>
<td valign="top"><para>Brute Force</para></td>
<td valign="top"><para>No clear protection dummy traffic helps</para></td>
</tr>
<tr>
<td valign="top"><para>Long Term Intersection</para></td>
<td valign="top"><para>Long Term Intersection &#x0026; No clear protection continuous connectivity and dummy traffic help</para></td>
</tr>
</tbody>
</table>
</table-wrap>
<section class="lev2" id="sec6.5.1" label="6.5.1" xreflabel="sec6.5.1">
<title>Resisting Network Traffic Analysis</title>
<para>Leakage of metadata can be reduced by providing protection against network traffic analysis. This includes endpoints, timing and location information. Traffic analysis can be addressed by ensuring unobservable communication as implemented by anonymising networks using generally proxy chains. Anonymising proxy networks have started with the implementation of Chaum&#x2019;s Mix in 1981 <link linkend="B6-59">[59]</link>. The system tunnels encrypted traffic through a number of low-latency proxies, as depicted in <link linkend="F6.6">Figure <xref linkend="F6.6" remap="6.6"/></link>.</para>
<para>Initially, interest in this field was primarily theoretical but in the last 30 years a lot of research in this field has looked at developing practical and usable systems for preserving anonymity [<link linkend="B6-60">60</link>, <link linkend="B6-61">61</link>]. Such systems cover Email, Web browsing and other services like peer-to-peer networks and IRC chat. Systems like The Onion Router (TOR) and the Invisible Internet Project (I2P) allow generic layer 3 transmission. While TOR was primarily developed to allow anonymous web browsing in close to real-time the general concept is applicable to prevent traffic analysis in the IoT network.</para>
<fig id="F6.6" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 6.6</label>
<caption><para>Chaum&#x2019;s MIX</para></caption>
<graphic xlink:href="graphics/fig6_6.jpg"/>
</fig>
<para>Once traffic leaves the TOR network it can be observed, therefore end-to-end encryption is needed and is the responsibility of the end nodes. Apart from TOR, there is I2P, an anonymous/pseudonymous network layer. Like TOR, I2P can be extended for many services. I2P is neither as secure nor as fast as TOR, but can handle large volumes of traffic, like those foreseen for the IoT.</para>
</section>
</section>
<section class="lev1" id="sec6.6" label="6.6" xreflabel="sec6.6">
<title>Access Control Based on Policy Management</title>
<para>A policy management framework (as developed in the iCORE project) supports IoT-specific access control requirements like the hyperconnected-ness and distributed-ness of the IoT and the need of applications to share resources and even data. The Security Toolkit (SecKit) <link linkend="B6-62">[62]</link> models the IoT system for security specification purposes. The system design is divided into an entity domain and a behaviour domain, with an assignment relationship between entities and behaviours.</para>
<fig id="F6.7" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 6.7</label>
<caption><para>SecKit metamodels and dependencies.</para></caption>
<graphic xlink:href="graphics/fig6_7.jpg"/>
</fig>
<para>In the entity domain, the entities and the communication mechanisms allowing the entities to exchange information are specified. In the behaviour domain the behaviour of each entity is detailed including actions, interactions, causality relations, and information attributes. It is also possible to specify the data, identity, context, trust, role, risk, and security rules in so called metamodels. <link linkend="F6.7">Figure <xref linkend="F6.7" remap="6.7"/></link> illustrates their dependencies.</para>
<para>The context metamodel specifies Context Information and Context Situation types. Context Information is a simple type of information about an entity that is acquired at a particular moment in time, and Context Situations are a complex type that models a specific condition that begins and finishes at specific moments in time <link linkend="B6-3">[63]</link>. For example, the &#x201C;Body Temperature&#x201D; is a Context Information type, while &#x201C;Fever&#x201D; is a situation where a target patient has a temperature above 37 degrees Celsius. Entities are associated to context situations using roles (e.g. patient).</para>
<para>A Context Manager component monitors and registers events when situations begin and end. These events contain references to the entities that participate in the situation and can be used to support the specification of the policy rules. Policy rules can be specified to represent authorizations to be granted when a situation begins and data protection obligations that should be fulfilled when the situation ends. For example, access to the patient data can be allowed when an emergency situation starts with the obligation that all data is deleted when the emergency ends. A security policy may be specified to allow access to data when the situation starts and to trigger the deletion of the data when the situation ends.</para>
<para>The security policies have to be disseminated to the device that is gathering the data under consideration in a secure >way. Depending on the security policy, the device has to trigger and apply the appropriate mechanism for transmitting the data in the exact format needed by the application. This includes a two-step process; (i) at first the device has to map the policies for the application to specific data gathering policies and (ii) then it should identify the encryption/security level of the data to identify the proper transmission mechanisms, considering also the energy efficiency requirements of the devices (using i.e. an adaptive encryption scheme). For example, in a traffic monitoring scenario, users in cars may be sending information regarding traffic to an application, which should know only how much traffic there is at every street segment. The users&#x2019; phone has the ability to send various types of traffic related data, i.e. exact location every second, speed every second, direction of movement, etc. If the application wants to estimate the traffic, the related policies should be considered by the devices of the users, so only an average speed per time period and street segment is sent, in order to avoid disclosing the exact location of the user at each point of time (ensuring privacy by design). Actually, intermediate nodes (i.e. the gateway) should also consider these policies and send to the application server only aggregated/average data so that the location of the users will be hidden from the application point of view. Other applications that need to know the exact location of the user (depending on their access control policies) will indeed be identified as such by the devices, which will transmit the exact location (i.e. for a person to track his car if it is stolen). It is evident, thus, that the transmission of the security policies to the devices is of crucial importance for ensuring the security and privacy of the overall system. The system should be able to identify the integrity of the policies that are sent to the devices, so that unauthorized applications will not gain access to privacy-sensitive data.</para>
<para>The security rules model supports the specification of rule templates (a.k.a. policies) to be enforced and the configuration rules to instantiate these templates. Templates can be specified considering the security and privacy non-functional requirements of confidentiality, data protection, integrity, authorization, and non-repudiation. The security rule templates are Event-Condition-Action rules, with the Action part being an enforcement action of Allowing, Denying, Modifying, or Delaying an activity carried out by an IoT device or application. Furthermore, the Action part may also trigger the execution of additional actions to be enforced, or to specify trust management policies to increase/decrease the trust evidence for a specific trust aspect.</para>
<para>From a trust management perspective, the SecKit supports the specification of aspect-specific trust relationships and exchange of trust recommendations. For example, trust relationships can be defined for identity provisioning aspect, privacy protection, data provisioning, and so on. A trust relationship also includes a trust degree, which is mapped to a Subjective Logic (SL) opinion considering the amount of belief, disbelief, and uncertainty <link linkend="B6-64">[64]</link>. The aspect-specific approach considering uncertainty is more realistic from a human perspective since people usually trust others for specific purposes (e.g., a mechanic to fix your car) and most of the time cannot be absolutely certain about the amount of trust they may place.</para>
<para>The security policy rules can be delegated from one administrative domain to another when the domains interact and exchange data. For example, when a smart home exchanges data with a smart vehicle, the smart home can exchange the policies that regulate the authorizations and obligations associated to the exchanged data that should be enforced by the smart vehicle. This delegation of sticky flow policies must be supported by trust management mechanisms <link linkend="B6-63">[63]</link> in order to guarantee or increase the level of assurance with respect to the enforcement of the policy rules by the smart vehicle.</para>
</section>
<section class="lev1" id="sec6.7" label="6.7" xreflabel="sec6.7">
<title>Security and Privacy in the IoT Cloud</title>
<para>The &#x201C;Cloud&#x201D; complements quite well the IoT supporting the storage and processing of the large amounts of data that are gathered by constrained devices. However, the Cloud introduces new threats for security, but especially with respect to information privacy. When IoT data are moved to the cloud for storage we could use encryption to protect it. However, if the application turning that data into information is running in the cloud, then the cloud provider becomes yet another third party that needs to process the stored data gathered from the physical world. Hence, the provider inherits all the privacy problems of the data. In fact, the third party becomes part of the IoT application provider&#x2019;s own computation and storage infrastructure. However, the cloud provider is technically not under its full control. This situation has shown to be problematic and incidents recently showed that economic incentives and legal tools used to increase trust in the service provider, e.g. Service Level Agreements, are by far not sufficient to guard personal data and trade secrets against illegal interceptions, insider threats, or vulnerabilities exposing data in the cloud to unauthorized parties. While being processed by a cloud provider, data are typically neither adequately protected against unauthorized read access, nor against unwanted modification, or loss of authenticity. Consequently, in the most prominent cloud deployment model today &#x2013; the public cloud &#x2013; the cloud service provider (CSP) necessarily needs to be trusted. Next, we will provide some selected areas from PRISMACLOUD&#x2019;s cryptographic research and highlight their foreseen suitability for IoT data.</para>
<section class="lev2" id="sec6.7.1" label="6.7.1" xreflabel="sec6.7.1">
<title>Verifiable and Authenticity Preserving Data Processing</title>
<para>Verifiable computing allows checking the result of a computation for its validity, even if the computation itself was done by one or more untrusted processing units. While respective systems have already been implemented, they have not yet seen real-world deployment. Besides general purpose systems <link linkend="B6-65">[65]</link> there are various approaches that are optimized for specific (limited) classes of computations or particular settings <link linkend="B6-66">[66]</link>. A cloud user can facilitate those mechanisms to check if collected measurements have been processed correctly, and, if not so, they can identify (maliciously) incorrect calculations.</para>
<para>When data are subject to computations executed by the cloud provider, it is extremely helpful if the processing allows preserving the authenticity of data that are manipulated by computations. The most generic tool for preserving authenticity under admissible modifications are (fully) homomorphic signatures (or message authentication codes) <link linkend="B6-67">[67]</link>. Signatures with more restricted capabilities, like redactable signatures introduced in [<link linkend="B6-68">68</link>, <link linkend="B6-69">69</link>], offer a restricted set of capabilities, but with better performance [<link linkend="B6-70">70</link>, <link linkend="B6-71">71</link>]. Redactable and sanitizable signatures have been proven to strongly preserve the privacy <link linkend="B6-72">[72]</link> of the original values when they have been updated/changed or redacted <link linkend="B6-73">[73]</link>. They allow preserving the authenticity on data introduced by an IoT device&#x2019;s signature, which vouches for the data&#x2019;s origin, even after processing. Thus, the cloud user after authorized processing can still verify the involved data&#x2019;s authenticity.</para>
</section>
<section class="lev2" id="sec6.7.2" label="6.7.2" xreflabel="sec6.7.2">
<title>Structural Integrity and Certification of Virtualized Infrastructure</title>
<para>Structural integrity and certification of virtualized infrastructures connects attestation of component integrity, i.e., proving the trustworthiness of claims about the infrastructure, and security assurance of cloud topologies, i.e., guaranteeing that a cloud topology provides certain security guarantees (e.g., network isolation). This is a clear benefit for cloud infrastructure consumers as their confidence in infrastructure properties can be increased and the cloud provider can be held accountable. The recent concept of graph signatures <link linkend="B6-74">[74]</link> is a promising candidate to connect the two aforementioned areas. They allow a trusted third-party auditor to digitally sign a graph and prove in zero-knowledge properties of the graph, such as connectivity or isolation. Graph signatures can be a handy tool for a cloud provider to convince a certain customer in a multi-tenant environment that the granted infrastructure fulfils certain security properties, but at the same time to not disclose the confidential blueprint of the virtualized infrastructure. For instance, the cloud may prove that a customer&#x2019;s part of the infrastructure is isolated from other tenants without revealing how their part of the infrastructure looks like. A first implementation of a system that allows certification of and proofs about a certified infrastructure as well as other relevant and interesting use-cases has already been outlined in <link linkend="B6-75">[75]</link>. This allows to attest an IoT&#x2019;s infrastructure in a way to ensure that certain security properties are satisfied and improves accountability.</para>
</section>
<section class="lev2" id="sec6.7.3" label="6.7.3" xreflabel="sec6.7.3">
<title>Privacy Preserving Service Usage and Data Handling</title>
<para>Privacy-preserving service usage essentially means to realize 1) data minimisation, i.e., to only reveal information that is essential for service delivery, and 2) avoid (behavioural) tracking of service users. This is especially important in cloud based applications, as such information may, among others, reveal confidential business information <link linkend="B6-76">[76]</link>. Attribute-based anonymous credential (ABC) systems and related concepts such as group signature schemes <link linkend="B6-77">[77]</link> are important concepts for realizing such privacy-preserving applications. They allow users to authenticate in an anonymous way, i.e., without revealing their identity, but allow to prove claims that enable a service provider to still make access decisions. Although they are quite mature in the research community, they still lack practical adoption, which, however, needs to be considered as a very important topic for future cloud IoT applications.</para>
<para>Another issue is privacy in context of data handling. In contrast to achieving data privacy by means of encryption, which realizes an all-or-nothing mechanisms for the access to the data, we thereby mean scenarios which are often encounter when processing of data by third parties in the cloud is required. Essentially, this covers mechanisms for data anonymisation such that a provable level of anonymity can be achieved, i.e., k-anonymity <link linkend="B6-78">[78]</link> or differential privacy <link linkend="B6-79">[79]</link>. In particular, one requires a guarantee that when (large amounts of) structured data are given away or are dynamically queried, it can be ensured that a targeted degree of privacy is guaranteed, i.e., data collected from many individuals does not allow to uniquely identify single individuals but still allows to compute meaningful statistical parameters. Techniques for privacy-preserving service usage allow IoT devices to anonymously authenticate to services and prevent linking of transactions conducted by IoT devices. Data anonymisation can help to protect privacy of individuals if IoT devices send sensitive information (e.g., health data) to the cloud and the data is later released for further processing.</para>
</section>
<section class="lev2" id="sec6.7.4" label="6.7.4" xreflabel="sec6.7.4">
<title>Confidentiality of (Un-)structured Data</title>
<para>Confidentiality of data when outsourced to the cloud for the purpose of storage and/or processing is considered to be sine qua non, since cloud providers can neither be considered as fully trustworthy nor are resistant to attacks. Encryption is a classical tool to provide confidentiality. Unfortunately, encryption clearly limits the functionality (how to operate on data), adding encryption to legacy applications may cause serious problems and the management of the involved cryptographic keys soon becomes highly complex. Within the last years, significant research has been put into cloud storage solutions that distribute the data to multiple clouds (aka cloud-of-cloud approach) <link linkend="B6-80">[80]</link>. They allow providing confidentiality for data at rest with strong security in a key-less manner under some non-collusion assumption and thus solve the key management problem (at least partially). An interesting challenge is to design such a distributed architecture using active nodes to fully delegate secure multi-user storage to the cloud. Thereby, the use of efficient Byzantine protocols helps to improve robustness and various types of secret sharing protocols can help to cope with different adversary settings. Furthermore, for a multi-user setting a trustworthy distributed access control mechanism is required and it is interesting to extend it with access privacy features. Another issue, as mentioned above, is the integration of encryption into legacy (e.g., database) applications, as they may be unable to use or store encrypted data, causing them to crash or alternatively, to output incorrect values. Techniques like format-preserving encryption (FPE) <link linkend="B6-81">[81]</link>, order-preserving encryption (OPE) <link linkend="B6-82">[82]</link> and tokenization schemes have emerged as very useful tools as they can be directly applied without adapting the application itself.</para>
</section>
<section class="lev2" id="sec6.7.5" label="6.7.5" xreflabel="sec6.7.5">
<title>Long Term Security and Everlasting Privacy</title>
<para>Classical cryptographic primitives such as digital signature schemes and encryption schemes are valuable tools to achieve integrity, authenticity, and confidentiality. If these properties, however, need to hold in the long-term, e.g., for some decades or even indefinitely, these tools often fail. Cryptanalytic progress and advances in computing power can reduce their security or may even make them entirely worthless. There are only few approaches that consider long-term confidentiality, integrity and authenticity. Moreover, many of the existing solutions lack in providing these properties [<link linkend="B6-83">83</link>, <link linkend="B6-84">84</link>].</para>
</section>
<section class="lev2" id="sec6.7.6" label="6.7.6" xreflabel="sec6.7.6">
<title>Conclusion</title>
<para>At the moment privacy guarantees with respect to user&#x2019;s IoT gathered data in the cloud can only be given on a contractual basis and rest to a considerable extent on organizational (besides technical) precautions. Companies or individuals alike are in the end a cloud user, and they themselves are responsible for their data&#x2019;s privacy, whether processing gets outsourced to the cloud or not.</para>
<para>Therefore, the H2020 project PRISMACLOUD is looking into novel security and privacy preserving methods, such that cloud usage can be facilitated even by organizations that deal with highly sensitive data such as health data and maintaining security critical services. PRISMACLOUD only just started in the first quarter of 2015. But the vision is that only a new generation of cryptographically secured cloud services with security and privacy built in by design can lead the way to achieving the required privacy properties for outsourced data storage and processing at the upper end of the IoT &#x2013; privacy in the cloud.</para>
</section>
</section>
<section class="lev1" id="sec6.8" label="6.8" xreflabel="sec6.8">
<title>Outlook</title>
<para>Security and privacy in the IoT world are research areas that only lately have attracted the attention of both the research and the industrial world. Up until now, the focus was limited on creating efficient middleware platforms to enable the services to gather data from the devices. This resulted in existing IoT deployments that are not secure and gather all types of personal information. Fortunately, recently the significant focus on security and privacy has resulted in important achievements not only in the technology domain, but also on the way the world sees the IoT. Security and privacy are now basically seen as the key points for the wider adoption of the IoT applications by the general public. If the citizens can be reassured that the IoT will not harm them, will not steal their private information and will not affect their lives in a negative way, only then they will gladly accept and embrace IoT and the full potential of IoT can unfold to improve their &#x2013; and everyone&#x2019;s &#x2013; quality of life.</para>
<para>This chapter presented a cross-layer approach on improving the security and the privacy of IoT systems, allowing them to work for the benefit of the people, without leaking information, presenting a risk or damaging people&#x2019;s privacy. Designing a system so complex as the IoT whilst guaranteeing that a certain level of security is achieved is an extremely complex and tedious task, and can not be retrofitted, so we must already design the IoT with privacy and security in mind. It is widely acknowledged that the security of an IoT system depends heavily on the devices, so we need to physically secure the IoT devices, as every system&#x2019;s level of security is as good/high as the one of its weakest part.</para>
<para>Although encryption can really contribute to protecting the data that are being exchanged in an IoT system, this is not quite enough. Even with encryption deployed end-to-end, the IoT still leaks information by communication metadata. If the volume and quality of the information collected is sufficiently large, even encrypted information can be extracted without breaking the encryption of the communication channel.</para>
<para>From what was previously described, it is also quite important to design the system to be privacy preserving, starting from embedding in the devices mechanisms for both data minimization and for enhancing privacy. These are quite important to ensure that the services will only get the exact data they need and nothing more, to avoid the possibility of linking data.</para>
<para>But we need to think even broader, the problem of privacy &#x2013; and of security &#x2013; well extends into the cloud. The society has to be able to trust the whole IoT value chain all the way up to the cloud. Thus, new cryptographically proven security and privacy mechanisms must be developed to allow provably using cloud services securely and privately.</para>
<para>In general, there is a lot of work done in the IoT world towards enhancing the security and the privacy of IoT systems. However, making significant progress in this area through research is not enough. The industrial world and the businesses need to put more focus on embracing and adopting security and privacy solutions. To complete the picture, regulations for protecting IoT data need to be put into place, to ensure the adherence of every player to the socially accepted norms of privacy in the EU. Only then the hyperconnected world of the IoT becomes not a threat to the citizens, but a useful tool to improve not only our&#x2019;s &#x2013; but everyone&#x2019;s &#x2013; everyday lives.</para>
</section>
<section class="lev1" id="sec6.9">
<title>Acknowledgment</title>
<para>This work is partially funded by the EU FP7 projects RERUM (GA no 609094), SMARTIE (GA no 609062), iCore (GA no 287708) and the H2020 project PRISMACLOUD (GA no 644962).</para>
</section>
<bibliography class="biblio" id="bib04">
<title>Bibliography</title>
<bibliomixed id="B6-1">[1] <author><surname>Henrich</surname> <firstname>C. Pohls</firstname></author>, et al. <article-title>RERUM: Building a reliable IoT upon privacy-and security-enabled smart objects</article-title>. <source>Wireless Communications and Networking Conference Workshops (WCNCW)</source>, <publisher-name>IEEE</publisher-name>, <year>2014</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=RERUM%3A+Building+a+reliable+IoT+upon+privacy-and+security-enabled+smart+objects+Wireless+Communications+and+Networking+Conference+Workshops+%28WCNCW%29+2014" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-2">[2] <author><surname>Jacob</surname> <firstname>Kohnstamm</firstname></author>, <author><surname>Drudeisha</surname> <firstname>Madhub</firstname></author>: <article-title>Mauritius Declaration on the Internet of Things</article-title>. <source>In: 36th International Conference of Data Protection and Privacy Comissioners</source>, <year>2014</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Mauritius+Declaration+on+the+Internet+of+Things+In%3A+36th+International+Conference+of+Data+Protection+and+Privacy+Comissioners+2014" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-3">[3] <author><surname>Ralph</surname> <firstname>Gross</firstname></author>, and <author><surname>Alessandro</surname> <firstname>Acquisti</firstname></author>. <article-title>Information revelation and privacy in online social networks</article-title>. <source>Proceedings of the 2005 ACM workshop on Privacy in the electronic society</source>. <publisher-name>ACM</publisher-name>, <year>2005</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Information+revelation+and+privacy+in+online+social+networks+Proceedings+of+the+2005+ACM+workshop+on+Privacy+in+the+electronic+society+2005" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-4">[4] <author><surname>Elgar</surname> <firstname>Fleisch</firstname></author>: <article-title>What is the Internet of Things? An Economic Perspective</article-title>. <source>In: Economics, Management, and Financial Markets 2</source> (<year>2010</year>), S. <fpage>125</fpage>&#x2013;<lpage>157</lpage>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=What+is+the+Internet+of+Things%B4+An+Economic+Perspective+In%3A+Economics%2C+Management%2C+and+Financial+Markets+2+2010+125-157" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-5">[5] <author><surname>Rodrigo</surname> <firstname>Roman</firstname></author>, <author><surname>Jianying</surname> <firstname>Zhou</firstname></author>, <author><surname>Javier</surname> <firstname>Lopez</firstname></author>: <article-title>On the features and challenges of security and privacy in distributed internet of things</article-title>. <source>In: Computer Networks 57 Nr. 10, 2266&#x2013;2279. Towards a Science of Cyber Security Security and Identity Architecture for the Future Internet</source>, <year>2013</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=On+the+features+and+challenges+of+security+and+privacy+in+distributed+internet+of+things+In%3A+Computer+Networks+57+Nr%2E+10%2C+2266-2279%2E+Towards+a+Science+of+Cyber+Security+Security+and+Identity+Architecture+for+the+Future+Internet+2013" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-6">[6] <author><surname>Marc</surname> <firstname>Langheinrich</firstname></author>: <article-title>Privacy by Design &#x2014; Principles of Privacy-Aware Ubiquitous Systems</article-title>. Version: <year>2001</year>. <ulink url="http://dx.doi.org/10.1007/3-540-45427-6_23">http://dx.doi.org/10.1007/3-540-45427-6_23</ulink>. In: ABOWD, GregoryD. (Hrsg.); BRUMITT, Barry (Hrsg.); SHAFER, Steven (Hrsg.): Ubicomp 2001: <source>Ubiquitous Computing Bd</source>. <volume>2201</volume>. <publisher-loc>Springer Berlin Heidelberg</publisher-loc>, <year>2001</year>. &#x2013; ISBN 978-3-540-42614-1, <fpage>273</fpage>&#x2013;<lpage>291</lpage>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Privacy+by+Design+-+Principles+of+Privacy-Aware+Ubiquitous+Systems+Ubiquitous+Computing+Bd+2001+273-291" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-7">[7] <author><firstname>D.</firstname> <surname>Hankerson</surname></author>, <author><firstname>A.</firstname> <surname>Menezes</surname></author>, <author><firstname>S.</firstname> <surname>Vanstone</surname></author>: <source>Guide to Elliptic Curve Cryptography</source>. <publisher-loc>Springer-Verlag New York, Inc</publisher-loc>. (<year>2004</year>). <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Guide+to+Elliptic+Curve+Cryptography+2004" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-8">[8] <collab>National Institute of Standards and Technology: Digital Signature Standard (DSS)</collab>, FIPS PUB 186-4, <month>July</month> <year>2013</year>, <ulink url="http://nvlpubs.nist.gov/ nistpubs/FIPS/NIST.FIPS.186-4.pdf">http://nvlpubs.nist.gov/ nistpubs/FIPS/NIST.FIPS.186-4.pdf</ulink></bibliomixed>
<bibliomixed id="B6-9">[9] <collab>Synopsis &#x2013; PrimeTime</collab>, <ulink url="http://www.synopsys.com/Tools/Implementat ion/SignOff/Pages/PrimeTime.aspx">http://www.synopsys.com/Tools/Implementat ion/SignOff/Pages/PrimeTime.aspx</ulink></bibliomixed>
<bibliomixed id="B6-10">[10] <author><firstname>T. S.</firstname> <surname>Messerges</surname></author>, <author><firstname>E. A.</firstname> <surname>Dabbish</surname></author>, <author><firstname>R. H.</firstname> <surname>Sloan</surname></author>: <article-title>Power Analysis Attacks of Modular Exponentiation in Smartcards</article-title>. <source>Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems</source> &#x2013; CHES 1999, LNCS Volume <volumenum>1717</volumenum>, pp. <fpage>144</fpage>&#x2013;<lpage>157</lpage>, <publisher-name>Springer Berlin Heidelberg</publisher-name>, <year>1999</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Power+Analysis+Attacks+of+Modular+Exponentiation+in+Smartcards+Proceedings+of+the+Workshop+on+Cryptographic+Hardware+and+Embedded+Systems+1999+144-157" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-11">[11] <author><firstname>Z.</firstname> <surname>Dyka</surname></author>, <author><firstname>P.</firstname> <surname>Langend&#x00F6;rfer</surname></author>: <article-title>Improving the Security of Wireless Sensor Networks by Protecting the Sensor Nodes against Side Channel Attacks</article-title>. <source>Wireless Networks and Security, Signals and Communication Technology</source> <year>2013</year>, pp. <fpage>303</fpage>&#x2013;<lpage>328</lpage>, <publisher-loc>Springer Berlin Heidelberg</publisher-loc>, <year>2013</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Improving+the+Security+of+Wireless+Sensor+Networks+by+Protecting+the+Sensor+Nodes+against+Side+Channel+Attacks+Wireless+Networks+and+Security%2C+Signals+and+Communication+Technology+2013+303-328" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-12">[12] <collab>Hitachi: Nano-Probing System</collab>, <ulink url="http://www.hitachi-hitec.com/global/em/nan/nan_index.html">http://www.hitachi-hitec.com/global/em/nan/nan_index.html</ulink></bibliomixed>
<bibliomixed id="B6-13">[13] <author><firstname>C.</firstname> <surname>Helfmeier</surname></author>, <author><firstname>D.</firstname> <surname>Nedospasov</surname></author>, <author><firstname>C.</firstname> <surname>Tarnovsky</surname></author>, <author><firstname>J. S.</firstname> <surname>Krissler</surname></author>, <author><firstname>C.</firstname> <surname>Boit</surname></author>, <author><firstname>J.-P.</firstname> <surname>Seifert</surname></author>: <article-title>Breaking and Entering through the Silicon</article-title>. <source>Proceedings of the 2013 ACM SIGSAC Conference on Computer &#x0026; Communications Security</source> &#x2013; CCS 2013, <month>November</month> <day>4&#x2013;8</day>, <year>2013</year>, <publisher-loc>Berlin, Germany</publisher-loc>, pp. <fpage>733</fpage>&#x2013;<lpage>744</lpage>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Breaking+and+Entering+through+the+Silicon+Proceedings+of+the+2013+ACM+SIGSAC+Conference+on+Computer+%26+Communications+Security+2013+733-744" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-14">[14] <author><firstname>Ch.</firstname> <surname>De Nardi</surname></author>, <author><firstname>R.</firstname> <surname>Desplats</surname></author>, <author><firstname>Ph.</firstname> <surname>Perdu</surname></author>, <author><firstname>F.</firstname> <surname>Beaudoin</surname></author>, <author><firstname>J. L.</firstname> <surname>Gauffier</surname></author>: <article-title>EEPROM Failure Analysis Methodology: Can Programmed Charges Be Measured Directly by Electrical Techniques of Scanning Probe Microscopy?</article-title> <source>Proceedings of the 31st International Symposium for Testing and Failure Analysis</source> &#x2013; ISTFA 2005, <month>November</month> <day>6&#x2013;10</day>, <year>2005</year>, <publisher-loc>San Jose, CA, USA.</publisher-loc> <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=EEPROM+Failure+Analysis+Methodology%3A+Can+Programmed+Charges+Be+Measured+Directly+by+Electrical+Techniques+of+Scanning+Probe+Microscopy%B4+Proceedings+of+the+31st+International+Symposium+for+Testing+and+Failure+Analysis+2005" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-15">[15] <author><firstname>Ch.</firstname> <surname>De Nardi</surname></author>, <author><firstname>R.</firstname> <surname>Desplats</surname></author>, <author><firstname>Ph.</firstname> <surname>Perdu</surname></author>, <author><firstname>Ch.</firstname> <surname>Gu&#x00E9;rin</surname></author>, <author><firstname>J. L.</firstname> <surname>Gauffier</surname></author>, <author><firstname>Th. B.</firstname> <surname>Amundsen</surname></author>: <article-title>Direct Measurements of Charge in Floating Gate Transistor Channels of Flash Memories Using Scanning Capacitance Microscopy</article-title>. <source>Proceedings of the 32nd International Symposium for Testing and Failure Analysis</source> &#x2013; ISTFA 2006, <month>November</month> <day>12&#x2013;16</day>, <year>2006</year>, <publisher-name>Austin</publisher-name>, <publisher-loc>Texas, USA</publisher-loc>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Direct+Measurements+of+Charge+in+Floating+Gate+Transistor+Channels+of+Flash+Memories+Using+Scanning+Capacitance+Microscopy+Proceedings+of+the+32nd+International+Symposium+for+Testing+and+Failure+Analysis+2006" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-16">[16] <author><firstname>S. A.</firstname> <surname>Kadir</surname></author>, <author><firstname>A.</firstname> <surname>Sasongko</surname></author>: <article-title>Simple power analysis attack against elliptic curve cryptography processor on FPGA implementation</article-title>, <source>Proceedings of International Conference on Electrical Engineering and Informatics</source>, pp. <fpage>1</fpage>&#x2013;<lpage>4</lpage>, <fpage>17</fpage>&#x2013;<lpage>19</lpage> <month>July</month> <year>2011</year>, IEEE. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Simple+power+analysis+attack+against+elliptic+curve+cryptography+processor+on+FPGA+implementation+Proceedings+of+International+Conference+on+Electrical+Engineering+and+Informatics+2011+1-4" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-17">[17] <author><firstname>E.</firstname> <surname>De Mulder</surname></author>, <author><firstname>P.</firstname> <surname>Buysschaert</surname></author>, <author><firstname>S. B.</firstname> <surname>Ors</surname></author>, <author><firstname>P.</firstname> <surname>Delmotte</surname></author>, <author><firstname>B.</firstname> <surname>Preneel</surname></author>, <author><firstname>G.</firstname> <surname>Vandenbosch</surname></author>, <author><firstname>I.</firstname> <surname>Verbauwhede</surname></author>: <article-title>Electromagnetic Analysis Attack on an FPGA Implementation of an Elliptic Curve Cryptosystem</article-title>. <source>EUROCON 2005&#x2013;-International Conference on Computer as a Tool</source>, <month>November</month> <day>21&#x2013;24</day>, <year>2005</year>, <publisher-loc>Belgrade, Serbia and Montenegro</publisher-loc>, pp. <fpage>1879</fpage>&#x2013;<lpage>1882</lpage>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Electromagnetic+Analysis+Attack+on+an+FPGA+Implementation+of+an+Elliptic+Curve+Cryptosystem+EUROCON+2005--International+Conference+on+Computer+as+a+Tool+2005+1879-1882" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-18">[18] <author><firstname>C.</firstname> <surname>Clavier</surname></author>, <author><firstname>B.</firstname> <surname>Feix</surname></author>, <author><firstname>G.</firstname> <surname>Gagnerot</surname></author>, <author><firstname>M.</firstname> <surname>Roussellet</surname></author>, <author><firstname>V.</firstname> <surname>Verneuil</surname></author>: <article-title>Horizontal Correlation Analysis on Exponentiation</article-title>. <source>Proceedings of the 12th International Conference on Information and Communications Security &#x2013; ICICS 2010</source>, <month>December</month> <day>15&#x2013;17</day>, <year>2010</year>, <publisher-loc>Barcelona, Spain</publisher-loc>, LNCS Volume <volumenum>6476</volumenum>, pp. <fpage>46</fpage>&#x2013;<lpage>61</lpage>, <publisher-loc>Springer Berlin Heidelberg</publisher-loc>, <year>2010</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Horizontal+Correlation+Analysis+on+Exponentiation+Proceedings+of+the+12th+International+Conference+on+Information+and+Communications+Security+-+ICICS+2010+2010+46-61" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-19">[19] <author><firstname>E.</firstname> <surname>De Mulder</surname></author>, <author><firstname>S. B.</firstname> <surname>Ors</surname></author>, <author><firstname>B.</firstname> <surname>Preneel</surname></author>, <author><firstname>I.</firstname> <surname>Verbauwhede</surname></author>: <article-title>Differential Electromagnetic Attack on an FPGA Implementation of Elliptic Curve Cryptosystems.</article-title> <source>World Automation Congress &#x2013; WAC</source>, <month>July</month> <day>24&#x2013;26</day>, <year>2006</year>, <publisher-loc>Budapest, Hungary</publisher-loc>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Differential+Electromagnetic+Attack+on+an+FPGA+Implementation+of+Elliptic+Curve+Cryptosystems%2E+World+Automation+Congress+-+WAC+2006" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-20">[20] <author><firstname>M.</firstname> <surname>Hutter</surname></author>, <author><firstname>M.</firstname> <surname>Kirschbaum</surname></author>, <author><firstname>T.</firstname> <surname>Plos</surname></author>, <author><firstname>J.</firstname> <surname>M</surname></author>. Schmidt, <author><firstname>S.</firstname> <surname>Mangard</surname></author>: <article-title>Exploiting the Difference of Side-Channel Leakages</article-title>. <source>Proceedings of the Third International Workshop on Constructive Side-Channel Analysis and Secure Design &#x2013; COSADE 2012</source>, <month>May</month> <day>3&#x2013;4</day>, <year>2012</year>, <publisher-loc>Darmstadt, Germany</publisher-loc>, LNCS Volume <volumenum>7275</volumenum>, pp. <fpage>1</fpage>&#x2013;<lpage>16</lpage>, <publisher-loc>Springer Berlin Heidelberg</publisher-loc>, <year>2012</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Exploiting+the+Difference+of+Side-Channel+Leakages+Proceedings+of+the+Third+International+Workshop+on+Constructive+Side-Channel+Analysis+and+Secure+Design+-+COSADE+2012+2012+1-16" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-21">[21] <author><firstname>Z.</firstname> <surname>Dyka</surname></author>, <author><firstname>Th.</firstname> <surname>Basmer</surname></author>, <author><firstname>Ch.</firstname> <surname>Wittke</surname></author>, <author><firstname>P.</firstname> <surname>Langendoerfer</surname></author>: <source>Individualizing Electrical Circuits of Cryptographic Devices as a Means to Hinder Tampering Attacks</source>, Cryptology ePrint Archive 2015/442. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Individualizing+Electrical+Circuits+of+Cryptographic+Devices+as+a+Means+to+Hinder+Tampering+Attacks+2012" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-22">[22] <author><firstname>T. S.</firstname> <surname>Messerges</surname></author>, <author><firstname>E. A.</firstname> <surname>Dabbish</surname></author>, <author><firstname>R. H.</firstname> <surname>Sloan</surname></author>: <article-title>Power Analysis Attacks of Modular Exponentiation in Smartcards.</article-title> <source>Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems &#x2013; CHES 1999</source>, LNCS Volume <volumenum>1717</volumenum>, pp. <fpage>144</fpage>&#x2013;<lpage>157</lpage>, <publisher-loc>Springer Berlin Heidelberg</publisher-loc>, <year>1999</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Power+Analysis+Attacks+of+Modular+Exponentiation+in+Smartcards%2E+Proceedings+of+the+Workshop+on+Cryptographic+Hardware+and+Embedded+Systems+-+CHES+1999+1999+144-157" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-23">[23] <author><firstname>J.</firstname> <surname>Heyszl</surname></author>, <author><firstname>S.</firstname> <surname>Mangard</surname></author>, <author><firstname>B.</firstname> <surname>Heinz</surname></author>, <author><firstname>F.</firstname> <surname>Stumpf</surname></author>, <author><firstname>G.</firstname> <surname>Sigl</surname></author>: <article-title>Localized Electromagnetic Analysis of Cryptographic Implementations</article-title>. <source>Proceedings of the Cryptographers&#x2019; Track at the RSA Conference &#x2013; CT-RSA 2012</source>, <publisher-loc>San Francisco, CA, USA,</publisher-loc> <month>February</month> <day>27</day>&#x2013;<month>March</month> <day>2</day>, <year>2012</year>, LNCS Volume <volumenum>7178</volumenum>, pp. <fpage>231</fpage>&#x2013;<lpage>244</lpage>, <publisher-loc>Springer Berlin Heidelberg</publisher-loc>, <year>2012</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Localized+Electromagnetic+Analysis+of+Cryptographic+Implementations+Proceedings+of+the+Cryptographers%27+Track+at+the+RSA+Conference+-+CT-RSA+2012+2012+231-244" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-24">[24] <author><firstname>A.</firstname> <surname>Schl&#x00F6;sser</surname></author>, <author><firstname>D.</firstname> <surname>Nedospasov</surname></author>, <author><firstname>J.</firstname> <surname>Kr&#x00E4;mer</surname></author>, <author><firstname>S.</firstname> <surname>Orlic</surname></author>, <author><firstname>J. P.</firstname> <surname>Seifert</surname></author>: <article-title>Simple Photonic Emission Analysis of AES</article-title>. <source>Proceeding of Cryptographic Hardware and Embedded Systems &#x2013; CHES 2012</source>, LNCS Volume <volumenum>7428</volumenum>, pp. <fpage>41</fpage>&#x2013;<lpage>57</lpage>, <publisher-loc>Springer Berlin Heidelberg</publisher-loc>, <year>2012</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Simple+Photonic+Emission+Analysis+of+AES+Proceeding+of+Cryptographic+Hardware+and+Embedded+Systems+-+CHES+2012+2012+41-57" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-25">[25] <author><firstname>J.</firstname> <surname>Kr&#x00E4;mer</surname></author>, <author><firstname>D.</firstname> <surname>Nedospasov</surname></author>, <author><firstname>A.</firstname> <surname>Schl&#x00F6;sser</surname></author>, <author><firstname>J.-P.</firstname> <surname>Seifert</surname></author>: <article-title>Differential Photonic Emission Analysis</article-title>. <source>Constructive Side-Channel Analysis and Secure Design &#x2013; COSADE 2013</source>, LNCS Volume <volumenum>7864</volumenum>, <year>2013</year>, pp. <fpage>1</fpage>&#x2013;<lpage>16</lpage>, <publisher-loc>Springer Berlin Heidelberg</publisher-loc>, <year>2013</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Differential+Photonic+Emission+Analysis+Constructive+Side-Channel+Analysis+and+Secure+Design+-+COSADE+2013+2013+1-16" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-26">[26] <author><firstname>P.-A.</firstname> <surname>Fouque</surname></author>, <author><firstname>F.</firstname> <surname>Valette</surname></author>: <article-title>The Doubling Attack &#x2013; Why Upwards Is Better than Downwards</article-title>. <source>Cryptographic Hardware and Embedded Systems &#x2013; CHES 2003</source>, LNCS Volume <volumenum>2779</volumenum>, pp. <fpage>269</fpage>&#x2013;<lpage>280</lpage>, <publisher-loc>Springer Berlin Heidelberg</publisher-loc>, <year>2003</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=The+Doubling+Attack+-+Why+Upwards+Is+Better+than+Downwards+Cryptographic+Hardware+and+Embedded+Systems+-+CHES+2003+2003+269-280" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-27">[27] <author><firstname>S.</firstname> <surname>Skorobogatov</surname></author>: <article-title>Optically Enhanced Position-Locked Power Analysis</article-title>. Proceedings of 8th International Workshop <source>Cryptographic Hardware and Embedded Systems &#x2013; CHES 2006</source>, <publisher-loc>Yokohama, Japan</publisher-loc>, <month>October</month> <day>10&#x2013;13</day>, <year>2006</year>, LNCS Volume <volumenum>4249</volumenum>, <publisher-loc>Springer Berlin Heidelberg</publisher-loc>, <year>2006</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Optically+Enhanced+Position-Locked+Power+Analysis+Cryptographic+Hardware+and+Embedded+Systems+-+CHES+2006+2006" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-28">[28] <author><firstname>Cl.</firstname> <surname>Helfmeier</surname></author>, <author><firstname>Chr.</firstname> <surname>Boit</surname></author>, <author><firstname>U.</firstname> <surname>Kerst</surname></author>: <article-title>On Charge Sensors for FIB Attack Detection</article-title>. <source>Proceedings of the IEEE International Symposium on Hardware-Oriented Security and Trust &#x2013; HOST 2012</source>, <publisher-loc>San Francisco, CA, USA</publisher-loc>, <month>Jun</month>. <year>2012</year>, pp. <fpage>128</fpage>&#x2013;<lpage>133</lpage>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=On+Charge+Sensors+for+FIB+Attack+Detection+Proceedings+of+the+IEEE+International+Symposium+on+Hardware-Oriented+Security+and+Trust+-+HOST+2012+2012+128-133" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-29">[29] <author><firstname>H.</firstname> <surname>Sakamoto</surname></author>, <author><firstname>Y.</firstname> <surname>Li</surname></author>, <author><firstname>K.</firstname> <surname>Ohta</surname></author>, <author><firstname>K.</firstname> <surname>Sakiyama</surname></author>: <article-title>Fault Sensitivity Analysis against Elliptic Curve Cryptosystem</article-title>. <source>Proceedings of the 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography</source> &#x2013; FDTC <year>2011</year>, pp. <fpage>11</fpage>&#x2013;<lpage>20</lpage>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Fault+Sensitivity+Analysis+against+Elliptic+Curve+Cryptosystem+Proceedings+of+the+2011+Workshop+on+Fault+Diagnosis+and+Tolerance+in+Cryptography+2011+11-20" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-30">[30] <author><firstname>S. P.</firstname> <surname>Skorobogatov</surname></author>: <source>Semi-invasive attacks &#x2013; a new approach to hardware security analysis.</source> Technical Report UCAM-CL-TR-630, <publisher-loc>University of Cambridge, Computer Laboratory</publisher-loc>, <month>April</month> <year>2005</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Semi-invasive+attacks+-+a+new+approach+to+hardware+security+analysis%2E+2005" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-31">[31] <author><firstname>S.</firstname> <surname>Moore</surname></author>, <author><firstname>R.</firstname> <surname>Anderson</surname></author>, <author><firstname>P.</firstname> <surname>Cunningham</surname></author>, <author><firstname>R.</firstname> <surname>Mullins</surname></author>, <author><firstname>G.</firstname> <surname>Taylor</surname></author>: <article-title>Improving Smart Card Security using Self-timed Circuits</article-title>, <source>Proceedings of the International Symposium on Advanced Research in Asynchronous Circuits and Systems</source> &#x2013; ASYNC <year>2002</year>, pp. <fpage>211</fpage>&#x2013;<lpage>218</lpage>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Improving+Smart+Card+Security+using+Self-timed+Circuits+Proceedings+of+the+International+Symposium+on+Advanced+Research+in+Asynchronous+Circuits+and+Systems+2002+211-218" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-32">[32] <author><firstname>P.</firstname> <surname>Fouque</surname></author>, <author><firstname>R.</firstname> <surname>Lercier</surname></author>, <author><firstname>D.</firstname> <surname>Real</surname></author>, <author><firstname>F.</firstname> <surname>Valette</surname></author>: <article-title>Fault Attack on Elliptic Curve with Montgomery Ladder Implementation</article-title>. <source>Proceedings of the 5th Workshop on Fault Diagnosis and Tolerance in Cryptography &#x2013; FDTC 2008</source>, <month>August</month> <day>10</day>, <year>2008</year>, <publisher-loc>Washington, DC, USA</publisher-loc>, pp. <fpage>92</fpage>&#x2013;<lpage>98</lpage>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Fault+Attack+on+Elliptic+Curve+with+Montgomery+Ladder+Implementation+Proceedings+of+the+5th+Workshop+on+Fault+Diagnosis+and+Tolerance+in+Cryptography+-+FDTC+2008+2008+92-98" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-33">[33] <author><firstname>I.</firstname> <surname>Biehl</surname></author>, <author><firstname>B.</firstname> <surname>Meyer</surname></author>, <author><firstname>V.</firstname> <surname>M&#x00FC;ller</surname></author>: <article-title>Differential Fault Attacks on Elliptic Curve Cryptosystems</article-title>. <source>Proceedings of the 20th Annual International Cryptology Conference &#x2013; CRYPTO 2000</source>, <publisher-loc>Santa Barbara, CA, USA</publisher-loc>, <month>August</month> <day>20&#x2013;24</day>, <year>2000</year>, pp. <fpage>131</fpage>&#x2013;<lpage>146</lpage>, <publisher-loc>Springer Berlin Heidelberg</publisher-loc>, <year>2000</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Differential+Fault+Attacks+on+Elliptic+Curve+Cryptosystems+Proceedings+of+the+20th+Annual+International+Cryptology+Conference+-+CRYPTO+2000+2000+2000+131-146" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-34">[34] <author><firstname>S.</firstname> <surname>Skorobogatov</surname></author>: <source>Low temperature data remanence in static RAM</source>. Technical Report UCAM-CL-TR-536, <publisher-loc>University of Cambridge, Computer Laboratory</publisher-loc>, <month>June</month> <year>2002</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Low+temperature+data+remanence+in+static+RAM+2002" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-35">[35] <author><firstname>N.</firstname> <surname>Homma</surname></author>, <author><firstname>Atsushi</firstname> <surname>Miyamoto</surname></author>, <author><firstname>Takafumi</firstname> <surname>Aoki</surname></author>, <author><firstname>Akashi</firstname> <surname>Satoh</surname></author>, <author><firstname>Adi</firstname> <surname>Shamir</surname></author>: <article-title>Collision-based Power Analysis of Modular Exponentiation Using Chosen-message</article-title>. <source>Proceedings of the 10th International Workshop &#x2013; CHES 2008</source>, LNCS Volume <volumenum>5154</volumenum>, pp. <fpage>15</fpage>&#x2013;<lpage>29</lpage>, <publisher-loc>Springer Berlin Heidelberg</publisher-loc>, <year>2008</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Collision-based+Power+Analysis+of+Modular+Exponentiation+Using+Chosen-message+Proceedings+of+the+10th+International+Workshop+-+CHES+2008+2008+15-29" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-36">[36] <author><firstname>S.</firstname> <surname>Briais</surname></author>, <author><firstname>J.-M.</firstname> <surname>Cioranesco</surname></author>, <author><firstname>J.-L.</firstname> <surname>Danger</surname></author>, <author><firstname>S.</firstname> <surname>Guilley</surname></author>, <author><firstname>D.</firstname> <surname>Nacchache</surname></author>, <author><firstname>Th.</firstname> <surname>Porteboeuf</surname></author>: <article-title>Random Active Shield</article-title>. <source>Proceedings of the Workshop on Fault Diagnosis and Tolerance in Cryptography &#x2013; FDTC 2012</source>, <month>September</month> <day>9</day>, <year>2012</year>, <publisher-loc>Leuven, Belgium</publisher-loc>, pp. <fpage>103</fpage>&#x2013;<lpage>113</lpage>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Random+Active+Shield+Proceedings+of+the+Workshop+on+Fault+Diagnosis+and+Tolerance+in+Cryptography+-+FDTC+2012+2012+103-113" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-37">[37] <author><firstname>J.</firstname> <surname>Coron</surname></author>: <article-title>Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems</article-title>. <source>Proceedings of the First International Workshop &#x2013; CHES 1999</source>, <month>August</month> <day>12&#x2013;13</day>, <year>1999</year>, <publisher-loc>Worcester, MA, USA</publisher-loc>, LNCS Volume <volumenum>1717</volumenum>, pp. <fpage>292</fpage>&#x2013;<lpage>302</lpage>, <publisher-loc>Springer Berlin Heidelberg</publisher-loc>, <year>1999</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Resistance+against+Differential+Power+Analysis+for+Elliptic+Curve+Cryptosystems+Proceedings+of+the+First+International+Workshop+-+CHES+1999+1999+292-302" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-38">[38] <author><firstname>E.</firstname> <surname>Oswald</surname></author>, <author><firstname>M.</firstname> <surname>Aigner</surname></author>: <article-title>Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks</article-title>. <source>Proceedings of the Third International Workshop &#x2013; CHES 2001</source>, <month>May</month> <day>14&#x2013;16</day>, <year>2001</year>, <publisher-loc>Paris, France</publisher-loc>, LNCS Volume <volumenum>2162</volumenum>, pp. <fpage>39</fpage>&#x2013;<lpage>50</lpage>, <publisher-loc>Springer Berlin Heidelberg</publisher-loc>, <year>2001</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Randomized+Addition-Subtraction+Chains+as+a+Countermeasure+against+Power+Attacks+Proceedings+of+the+Third+International+Workshop+-+CHES+2001+2001+39-50" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-39">[39] <author><firstname>K.</firstname> <surname>Itoh</surname></author>, <author><firstname>T.</firstname> <surname>Izu</surname></author>, and <author><firstname>M.</firstname> <surname>Takenaka</surname></author>: <article-title>A Practical Countermeasure against Address-Bit Differential Power Analysis</article-title>. <source>Cryptographic Hardware and Embedded Systems &#x2013; CHES 2003, Proceedings of the 5th International Workshop</source>, <publisher-loc>Cologne, Germany</publisher-loc>, <month>September</month> <day>8&#x2013;10</day>, <year>2003</year>, LNCS Volume <volumenum>2779</volumenum>, pp. <fpage>382</fpage>&#x2013;<lpage>396</lpage>, <publisher-loc>Springer Berlin Heidelberg</publisher-loc>, <year>2003</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=A+Practical+Countermeasure+against+Address-Bit+Differential+Power+Analysis+Cryptographic+Hardware+and+Embedded+Systems+-+CHES+2003%2C+Proceedings+of+the+5th+International+Workshop+2003+382-396" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-40">[40] <author><firstname>J.</firstname> <surname>Heyszl</surname></author>: <source>Impact of Localized Electromagnetic Field Measurements on Implementations of Asymmetric Cryptography</source>. <article-title>Technische Universit&#x00E4;t M&#x00FC;nchen, Lehrstuel fuer Sicherheit in der Informationstechnik an der Fakultaet fuer Elektrotechnik und Informationstechnik</article-title>, Dissertation, <year>2013</year>.</bibliomixed>
<bibliomixed id="B6-41">[41] <author><firstname>J.-S.</firstname> <surname>Coron</surname></author>, <author><firstname>L.</firstname> <surname>Goubin</surname></author>: <article-title>On Boolean and Arithmetic Masking against Differential Power Analysis</article-title>. <source>Proceedings of the Second International Workshop &#x2013; CHES 2000</source>, <publisher-loc>Worcester, MA, USA</publisher-loc>, <month>August</month> <day>17&#x2013;18</day>, <year>2000</year>, LNCS Volume <volumenum>1965</volumenum>, pp. <fpage>231</fpage>&#x2013;<lpage>237</lpage>, <publisher-loc>Springer Berlin Heidelberg</publisher-loc>, <year>2000</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=On+Boolean+and+Arithmetic+Masking+against+Differential+Power+Analysis+Proceedings+of+the+Second+International+Workshop+-+CHES+2000+2000+231-237" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-42">[42] <author><firstname>A.</firstname> <surname>Shamir</surname></author> US 5991415.</bibliomixed>
<bibliomixed id="B6-43">[43] <author><firstname>K.</firstname> <surname>Tiri</surname></author>, <author><firstname>M.</firstname> <surname>Akmal</surname></author>, <author><firstname>I.</firstname> <surname>Verbauwhede</surname></author>: <article-title>A Dynamic and Differential CMOS Logic with Signal Independent Power Consumption to Withstand Differential Power Analysis on Smart Cards</article-title>. <source>Proceedings of the 28th European Solid-State Circuits Conference &#x2013; ESSCIRC 2002</source>, <month>September</month> <day>24&#x2013;26</day>, <year>2002</year>, pp. <fpage>403</fpage>&#x2013;<lpage>406</lpage>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=A+Dynamic+and+Differential+CMOS+Logic+with+Signal+Independent+Power+Consumption+to+Withstand+Differential+Power+Analysis+on+Smart+Cards+Proceedings+of+the+28th+European+Solid-State+Circuits+Conference+-+ESSCIRC+2002+2002+403-406" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-44">[44] <author><firstname>L.</firstname> <surname>Goubin</surname></author>: <article-title>A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems</article-title>. <source>Proceedings of the 6th International Workshop on Practice and Theory in Public Key Cryptography &#x2013; PKC 2003</source>, <publisher-loc>Miami, FL, USA</publisher-loc>, <month>January</month> <day>6&#x2013;8</day>, <year>2003</year>, LNCS Volume <volumenum>2567</volumenum>, pp. <fpage>199</fpage>&#x2013;<lpage>211</lpage>, <publisher-loc>Springer Berlin Heidelberg</publisher-loc>, <year>2002</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=A+Refined+Power-Analysis+Attack+on+Elliptic+Curve+Cryptosystems+Proceedings+of+the+6th+International+Workshop+on+Practice+and+Theory+in+Public+Key+Cryptography+-+PKC+2003+2003+199-211" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-45">[45] <author><firstname>E.</firstname> <surname>Brier</surname></author>, <author><firstname>M.</firstname> <surname>Joye</surname></author>: <article-title>Weierstra&#x00DF; Elliptic Curves and Side-Channel Attacks</article-title>. <source>Proceedings of the 5th International Workshop on Practice and Theory in Pubic Key Cryptosystems &#x2013; PKC 2002</source>, <publisher-loc>Paris, France</publisher-loc>, <month>February</month> <day>12&#x2013;14</day>, <year>2002</year>, LNCS Volume <volumenum>2274</volumenum>, pp. <fpage>335</fpage>&#x2013;<lpage>345</lpage>, <publisher-loc>Springer Berlin Heidelberg</publisher-loc>, 2002. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Weierstra%DF+Elliptic+Curves+and+Side-Channel+Attacks+Proceedings+of+the+5th+International+Workshop+on+Practice+and+Theory+in+Pubic+Key+Cryptosystems+-+PKC+2002+2002+335-345" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-46">[46] <author><firstname>J.-S.</firstname> <surname>Coron</surname></author>, <author><firstname>I.</firstname> <surname>Kizhvatov</surname></author>: <article-title>An Efficient Method for Random Delay Generation in Embedded Software</article-title>. <source>Proceedings of the 11th International Workshop &#x2013; CHES 2009</source>, <publisher-loc>Lausanne, Switzerland</publisher-loc>, <month>September</month> <day>6&#x2013;9</day>, <year>2009</year>, pp. <fpage>156</fpage>&#x2013;<lpage>170</lpage>, <publisher-loc>Springer Berlin Heidelberg</publisher-loc>, <year>2009</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=An+Efficient+Method+for+Random+Delay+Generation+in+Embedded+Software+Proceedings+of+the+11th+International+Workshop+-+CHES+2009+2009+156-170" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-47">[47] <author><firstname>J.</firstname> <surname>Goodman</surname></author>, <author><firstname>A. P.</firstname> <surname>Chandrakasan</surname></author>: <article-title>An Energy Efficient Reconfigurable Public-Key Cryptography Processor Architecture</article-title>. <source>Proceedings of the Second International Workshop &#x2013; CHES 2000</source>, <publisher-loc>Worcester, MA, USA</publisher-loc>, <month>August</month> <day>17&#x2013;18</day>, <year>2000</year>, LNCS Volume <volumenum>1965</volumenum>, pp. <fpage>175</fpage>&#x2013;<lpage>190</lpage>, <publisher-loc>Springer Berlin Heidelberg</publisher-loc>, <year>2000</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=An+Energy+Efficient+Reconfigurable+Public-Key+Cryptography+Processor+Architecture+Proceedings+of+the+Second+International+Workshop+-+CHES+2000+2000+175-190" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-48">[48] <author><firstname>J.</firstname> <surname>Daemen</surname></author>, <author><firstname>V.</firstname> <surname>Rijmen</surname></author>, <source>The Design of Rijndael: AES &#x2013; The Advanced Encryption Standard</source>. <publisher-loc>Springer</publisher-loc>, <year>2002</year>. ISBN 3-540-42580-2. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=The+Design+of+Rijndael%3A+AES+-+The+Advanced+Encryption+Standard+2002" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-49">[49] <collab>NIST Computer Security Division (CSD)</collab>. <source>SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions</source> (PDF). NIST. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=SHA-3+Standard%3A+Permutation-Based+Hash+and+Extendable-Output+Functions+2002" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-50">[50] <author><firstname>D.</firstname> <surname>Hankerson</surname></author>, <author><firstname>A.</firstname> <surname>Menezes</surname></author>, and <author><firstname>S.A.</firstname> <surname>Vanstone</surname></author>, <source>Guide to Elliptic Curve Cryptography</source>, <publisher-loc>Springer-Verlag</publisher-loc>, <year>2004</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Guide+to+Elliptic+Curve+Cryptography+2004" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-51">[51] <author><firstname>E.</firstname> <surname>Candes</surname></author> and <author><firstname>M.</firstname> <surname>Wakin</surname></author>, <source>An introduction to compressive sampling</source>, <article-title>IEEE Signal Processing Magazine</article-title>, vol. <volumenum>25</volumenum>, no. <issue>2</issue>, pp. <fpage>21</fpage>&#x2013;<lpage>30</lpage>, <year>2008</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=IEEE+Signal+Processing+Magazine+An+introduction+to+compressive+sampling+2008+2+21-30" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-52">[52] <author><firstname>A.</firstname> <surname>Fragkiadakis</surname></author>, <author><firstname>E.</firstname> <surname>Tragos</surname></author>, and <author><firstname>A.</firstname> <surname>Traganitis</surname></author>. <article-title>Lightweight and secure encryption using channel measurements</article-title>. <source>Wireless Communications, Vehicular Technology, Information Theory and Aerospace &#x0026; Electronic Systems (VITAE), 2014 4th International Conference on</source>. <publisher-name>IEEE</publisher-name>, <year>2014</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Lightweight+and+secure+encryption+using+channel+measurements+Wireless+Communications%2C+Vehicular+Technology%2C+Information+Theory+and+Aerospace+%26+Electronic+Systems+%28VITAE%29%2C+2014+4th+International+Conference+on+2014" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-53">[53] <author><firstname>S.</firstname> <surname>G</surname></author>&#x00FC;rses, <author><firstname>C.</firstname> <surname>Troncoso</surname></author>, and <author><firstname>C.</firstname> <surname>Diaz</surname></author>. <source>Engineering privacy by design</source>. Computers, Privacy &#x0026; Data Protection <volumenum>14</volumenum> (<year>2011</year>). <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Engineering+privacy+by+design+2011" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-54">[54] <author><firstname>A.</firstname> <surname>Pfitzmann</surname></author>, and <author><firstname>M.</firstname> <surname>Hansen</surname></author>. <article-title>A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management</article-title>. (<year>2010</year>): <volumenum>34</volumenum>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=A+terminology+for+talking+about+privacy+by+data+minimization%3A+Anonymity%2C+unlinkability%2C+undetectability%2C+unobservability%2C+pseudonymity%2C+and+identity+management+2010" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-55">[55] <author><firstname>A.</firstname> <surname>Cavoukian</surname></author>, <article-title>Evolving FIPPs: Proactive Approaches to Privacy, Not Privacy Paternalism</article-title>. <source>Reforming European Data Protection Law</source>. <publisher-loc>Springer Netherlands</publisher-loc>, <year>2015</year>. <fpage>293</fpage>&#x2013;<lpage>309</lpage>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Evolving+FIPPs%3A+Proactive+Approaches+to+Privacy%2C+Not+Privacy+Paternalism+Reforming+European+Data+Protection+Law+2015+293-309" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-56">[56] <author><firstname>D.</firstname> <surname>Chaum</surname></author>, and <author><firstname>E.</firstname> <surname>Van Heyst</surname></author>. <article-title>Group signatures</article-title>. <source>Advances in Cryptology&#x2013;-EUROCRYPT&#x2019;91</source>. <publisher-loc>Springer Berlin Heidelberg</publisher-loc>, <year>1991</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Group+signatures+Advances+in+Cryptology--EUROCRYPT%2791+1991" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-57">[57] <author><firstname>H.</firstname> <surname>Tschofenig</surname></author>, et al. <article-title>The IETF Geopriv and presence architecture focusing on location privacy</article-title>. <source>Position paper at W3C Workshop on Languages for Privacy Policy Negotiation and Semantics-Driven Enforcement</source>, <publisher-loc>Ispra, Italy</publisher-loc>. <year>2006</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=The+IETF+Geopriv+and+presence+architecture+focusing+on+location+privacy+Position+paper+at+W3C+Workshop+on+Languages+for+Privacy+Policy+Negotiation+and+Semantics-Driven+Enforcement+2006" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-58">[58] <author><firstname>J.</firstname> <surname>Raymond</surname></author>, <source>Traffic analysis: Protocols, attacks, design issues, and open problems</source>. Designing Privacy Enhancing Technologies, <fpage>10</fpage>&#x2013;<lpage>29</lpage>, <year>2001</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Traffic+analysis%3A+Protocols%2C+attacks%2C+design+issues%2C+and+open+problems+2001+10-29" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-59">[59] <author><firstname>D. L.</firstname> <surname>Chaum</surname></author>, Untraceable electronic mail, return addresses, and digital pseudonyms. <source>Communications of the ACM</source>, <volumenum>24</volumenum>(<issue>2</issue>), <fpage>84</fpage>&#x2013;<lpage>90</lpage>, <year>1981</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Communications+of+the+ACM+1981+2+84-90" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-60">[60] <author><firstname>A.</firstname> <surname>Ruiz-Mart&#x00ED;nez</surname></author>, <article-title>A survey on solutions and main free tools for privacy enhancing Web communications</article-title>. <source>Journal of Network and Computer Applications</source>, <volumenum>35</volumenum>(<issue>5</issue>), <fpage>1473</fpage>&#x2013;<lpage>1492</lpage>, <year>2012</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=A+survey+on+solutions+and+main+free+tools+for+privacy+enhancing+Web+communications+Journal+of+Network+and+Computer+Applications+2012+5+1473-1492" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-61">[61] <author><firstname>G.</firstname> <surname>Danezis</surname></author>, &#x0026; <author><firstname>R.</firstname> <surname>Clayton</surname></author>, <article-title>Introducing traffic analysis</article-title>. <source>In Digital Privacy: Theory, Technologies, and Practices</source> (pp. <fpage>1</fpage>&#x2013;<lpage>24</lpage>), <year>2007</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Introducing+traffic+analysis+In+Digital+Privacy%3A+Theory%2C+Technologies%2C+and+Practices+2007+1-24" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-62">[62] <author><firstname>R.</firstname> <surname>Neisse</surname></author>, <author><firstname>I.</firstname> <surname>Nai Fovino</surname></author>, <author><firstname>G.</firstname> <surname>Baldini</surname></author>, et al. <article-title>A Model-based Security Toolkit for the Internet of Things</article-title>. <source>International Conference on Availability, Reliability and Security (ARES)</source>, <publisher-name>University of Fribourg</publisher-name>, <publisher-loc>Switzerland</publisher-loc>, <year>2014</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=A+Model-based+Security+Toolkit+for+the+Internet+of+Things+International+Conference+on+Availability%2C+Reliability+and+Security+%28ARES%29+2014" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-63">[63] <author><firstname>R.</firstname> <surname>Neisse</surname></author>, <author><firstname>D.</firstname> <surname>Holling</surname></author>, <author><firstname>A.</firstname> <surname>Pretschner</surname></author>, <article-title>Implementing Trust in Cloud Infrastructures</article-title>. <source>11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID)</source>, <publisher-loc>Newport Beach, USA</publisher-loc>, <month>May</month> <year>2011</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Implementing+Trust+in+Cloud+Infrastructures+11th+IEEE%2FACM+International+Symposium+on+Cluster%2C+Cloud+and+Grid+Computing+%28CCGRID%29+2011" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-64">[64] <author><firstname>A.</firstname> <surname>J&#x00F8;sang</surname></author>, <article-title>Evidential reasoning with subjective logic</article-title>, <source>in: 13th International Conference on Information Fusion</source>, <year>2010</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Evidential+reasoning+with+subjective+logic+in%3A+13th+International+Conference+on+Information+Fusion+2010" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-65">[65] <author><firstname>M.</firstname> <surname>Walfish</surname></author>, <author><firstname>A. J.</firstname> <surname>Blumberg</surname></author>,: <article-title>Verifying Computations without Reexecuting Them</article-title>. Commun. ACM <volumenum>58</volumenum>(<issue>2</issue>), <fpage>74</fpage>&#x2013;<lpage>84</lpage> (<year>2015</year>). <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Verifying+Computations+without+Reexecuting+Them+2015+2+74-84" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-66">[66] <author><firstname>M.</firstname> <surname>Backes</surname></author>, <author><firstname>D.</firstname> <surname>Fiore</surname></author>, <author><firstname>R. M.</firstname> <surname>Reischuk</surname></author>, <article-title>Verifiable delegation of computation on outsourced data</article-title>. In: <source>ACM CCS</source>. pp. <fpage>863</fpage>&#x2013;<lpage>874</lpage>. ACM (<year>2013</year>). <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Verifiable+delegation+of+computation+on+outsourced+data+ACM+CCS+2013+863-874" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-67">[67] <author><firstname>D.</firstname> <surname>Catalano</surname></author>, <article-title>Homomorphic Signatures and Message Authentication Codes</article-title>. <source>In: SCN. LNCS</source>, vol. <volumenum>8642</volumenum>, pp. <fpage>514</fpage>&#x2013;<lpage>519</lpage>. <publisher-loc>Springer</publisher-loc> (<year>2014</year>). <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Homomorphic+Signatures+and+Message+Authentication+Codes+In%3A+SCN%2E+LNCS+2014+514-519" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-68">[68] <author><firstname>R.</firstname> <surname>Johnson</surname></author>, <author><firstname>D.</firstname> <surname>Molnar</surname></author>, <author><firstname>D.</firstname> <surname>Song</surname></author>, <author><firstname>D.</firstname> <surname>Wagner</surname></author>, <article-title>Homomorphic Signature Schemes</article-title>. In: <source>CT-RSA</source>. pp. <fpage>244</fpage>&#x2013;<lpage>262</lpage>. LNCS, <publisher-loc>Springer</publisher-loc> (<year>2002</year>). <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Homomorphic+Signature+Schemes+CT-RSA+2002+244-262" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-69">[69] <author><firstname>R.</firstname> <surname>Steinfeld</surname></author>, <author><firstname>L.</firstname> <surname>Bull</surname></author>, <article-title>Content Extraction Signatures</article-title>. In: <source>ICISC</source>. <publisher-loc>Springer</publisher-loc> (<year>2002</year>). <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Content+Extraction+Signatures+ICISC+2002" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-70">[70] <author><firstname>H. C.</firstname> <surname>P&#x00F6;hls</surname></author>, <author><firstname>K.</firstname> <surname>Samelin</surname></author>, <article-title>On updatable redactable signatures</article-title>. In: <source>ACNS</source>. pp. <fpage>457</fpage>&#x2013;<lpage>475</lpage>. LNCS, <publisher-loc>Springer</publisher-loc> (<year>2014</year>). <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=On+updatable+redactable+signatures+ACNS+2014+457-475" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-71">[71] <author><firstname>C.</firstname> <surname>Brzuska</surname></author>, <author><firstname>H.</firstname> <surname>C</surname></author>. P&#x00F6;hls and <author><firstname>K.</firstname> <surname>Samelin</surname></author>. <article-title>Efficient and Perfectly Unlinkable Sanitizable Signatures without Group Signatures</article-title>. In <source>Proc. of the 10th European Workshop: Public Key Infrastructures, Services and Applications (EuroPKI 2013)</source>, pages <fpage>12</fpage>&#x2013;<lpage>30</lpage>, <publisher-loc>Springer Berlin Heidelberg</publisher-loc>, <year>2013</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Efficient+and+Perfectly+Unlinkable+Sanitizable+Signatures+without+Group+Signatures+Proc%2E+of+the+10th+European+Workshop%3A+Public+Key+Infrastructures%2C+Services+and+Applications+%28EuroPKI+2013%29+2013+12-30" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-72">[72] <author><firstname>H. C.</firstname> <surname>P&#x00F6;hls</surname></author> and <author><firstname>K.</firstname> <surname>Samelin</surname></author>. <article-title>On Updatable Redactable Signatures</article-title>. <source>In Proc. of the 12th International Conference on Applied Cryptography and Network Security (ACNS 2014)</source>, <publisher-loc>Springer</publisher-loc>, <year>2014</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=On+Updatable+Redactable+Signatures+In+Proc%2E+of+the+12th+International+Conference+on+Applied+Cryptography+and+Network+Security+%28ACNS+2014%29+2014" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-73">[73] <author><firstname>C.</firstname> <surname>Brzuska</surname></author>, <author><firstname>H. C.</firstname> <surname>P&#x00F6;hls</surname></author> and <author><firstname>K.</firstname> <surname>Samelin</surname></author>. <article-title>Efficient and Perfectly Unlinkable Sanitizable Signatures without Group Signatures</article-title>. <source>In Proc. of the 10th European Workshop: Public Key Infrastructures, Services and Applications (EuroPKI 2013)</source>, pages <fpage>12</fpage>&#x2013;<lpage>30</lpage>, <publisher-loc>Springer Berlin Heidelberg</publisher-loc>, <year>2013</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Efficient+and+Perfectly+Unlinkable+Sanitizable+Signatures+without+Group+Signatures+In+Proc%2E+of+the+10th+European+Workshop%3A+Public+Key+Infrastructures%2C+Services+and+Applications+%28EuroPKI+2013%29+2013+12-30" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-74">[74] <author><firstname>T.</firstname> <surname>Gro&#x00DF;</surname></author>, <article-title>Certification and efficient proofs of committed topology graphs.</article-title> In: <source>CCSW</source>. ACM (<year>2014</year>). <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Certification+and+efficient+proofs+of+committed+topology+graphs%2E+CCSW+2014" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-75">[75] <author><firstname>T.</firstname> <surname>Gro&#x00DF;</surname></author>, <article-title>Signatures and Efficient Proofs on Committed Graphs and NP-Statements</article-title>. <source>In: Financial Cryptography and Data Security. LNCS</source>, <publisher-loc>Springer</publisher-loc> (<year>2015</year>). <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Signatures+and+Efficient+Proofs+on+Committed+Graphs+and+NP-Statements+In%3A+Financial+Cryptography+and+Data+Security%2E+LNCS+2015" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-76">[76] <author><firstname>Y.</firstname> <surname>Chen</surname></author>, <author><firstname>V.</firstname> <surname>Paxson</surname></author>, <author><firstname>R. H.</firstname> <surname>Katz</surname></author>, <article-title>What&#x2019;s New About Cloud Computing Security?</article-title> <publisher-loc>University of California, Berkeley</publisher-loc>, Tech. Rep. UCB/EECS-2010-5. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=What%27s+New+About+Cloud+Computing+Security%B4+2015" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-77">[77] <author><firstname>J.</firstname> <surname>Camenisch</surname></author>, <author><firstname>A.</firstname> <surname>Lehmann</surname></author>, <author><firstname>G.</firstname> <surname>Neven</surname></author>, <article-title>Electronic Identities Need Private Credentials</article-title>. IEEE Security &#x0026; Privacy <volumenum>10</volumenum>(<issue>1</issue>): <fpage>80</fpage>&#x2013;<lpage>83</lpage> (<year>2012</year>). <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Electronic+Identities+Need+Private+Credentials+2012+1+80-83" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-78">[78] <author><firstname>P.</firstname> <surname>Samarati</surname></author>, <article-title>k-Anonymity. Encyclopedia of Cryptography and Security</article-title> (<edition>2nd Ed.</edition>) <year>2011</year>: <fpage>663</fpage>&#x2013;<lpage>666</lpage>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=k-Anonymity%2E+Encyclopedia+of+Cryptography+and+Security+2011+663-666" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-79">[79] <author><firstname>C.</firstname> <surname>Dwork</surname></author>, <article-title>Differential Privacy. Encyclopedia of Cryptography and Security</article-title> (<edition>2nd Ed.</edition>) <year>2011</year>: <fpage>338</fpage>&#x2013;<lpage>340</lpage>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Differential+Privacy%2E+Encyclopedia+of+Cryptography+and+Security+2011+338-340" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-80">[80] <author><firstname>D.</firstname> <surname>Slamanig</surname></author>, <author><firstname>C.</firstname> <surname>Hanser</surname></author>,. <article-title>On cloud storage and the cloud of clouds approach</article-title>. <source>ICITST 2012</source>, <publisher-name>IEEE</publisher-name> (<year>2012</year>). <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=On+cloud+storage+and+the+cloud+of+clouds+approach+ICITST+2012+2012" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-81">[81] <author><firstname>J.</firstname> <surname>Black</surname></author>, <author><firstname>P.</firstname> <surname>Rogaway</surname></author>, <article-title>Ciphers with Arbitrary Finite Domains</article-title>. <source>CT-RSA 2002</source>, <publisher-loc>LNCS, Springer</publisher-loc> (<year>2002</year>). <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Ciphers+with+Arbitrary+Finite+Domains+CT-RSA+2002+2002" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-82">[82] <author><firstname>R.</firstname> <surname>Agrawal</surname></author>, <author><firstname>J.</firstname> <surname>Kiernan</surname></author>, <author><firstname>R.</firstname> <surname>Srikant</surname></author>, <author><firstname>Y.</firstname> <surname>Xu</surname></author>, <article-title>Order-Preserving Encryption for Numeric Data</article-title>. <source>SIGMOD Conference 2004</source>, ACM (<year>2004</year>). <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Order-Preserving+Encryption+for+Numeric+Data+SIGMOD+Conference+2004+2004" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-83">[83] <author><firstname>J.</firstname> <surname>Braun</surname></author>, <author><firstname>J. A.</firstname> <surname>Buchmann</surname></author>, <author><firstname>C.</firstname> <surname>Mullan</surname></author>, <author><firstname>A.</firstname> <surname>Wiesmaier</surname></author>, <article-title>Long term confidentiality: a survey. Des. Codes Cryptography</article-title> <volumenum>71</volumenum>(<issue>3</issue>): <fpage>459</fpage>&#x2013;<lpage>478</lpage> (<year>2014</year>). <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Long+term+confidentiality%3A+a+survey%2E+Des%2E+Codes+Cryptography+2014+3+459-478" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B6-84">[84] <author><firstname>V.</firstname> <surname>Gagliotti</surname></author>, <author><firstname>M. A.</firstname></author>, <author><surname>Buchmann</surname>, <firstname>J. A.</firstname></author>, <author><surname>Cabarcas</surname>, <firstname>D.</firstname></author>, <author><surname>Weinert</surname>, <firstname>C.</firstname></author>, <author><surname>Wiesmaier</surname>, <firstname>A.</firstname></author> <article-title>Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: A survey</article-title>. Computers &#x0026; Security 50: <fpage>16</fpage>&#x2013;<lpage>32</lpage> (<year>2015</year>). <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Integrity%2C+authenticity%2C+non-repudiation%2C+and+proof+of+existence+for+long-term+archiving%3A+A+survey+2015+16-32" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
</bibliography>
</chapter>

<chapter class="chapter" id="ch07" label="7" xreflabel="ch07">
<title>IoT Analytics: Collect, Process, Analyze, and Present Massive Amounts of Operational Data &#x2013; Research and Innovation Challenges</title>
<authorgroup>
<emphasis role="strong"><author><firstname>Payam</firstname> <surname>Barnaghi</surname></author><superscript>2</superscript>, <author><firstname>Martin</firstname> <surname>Bauer</surname></author><superscript>8</superscript>, <author><firstname>Abdur Rahim</firstname> <surname>Biswas</surname></author><superscript>3</superscript>, <author><firstname>Maarten</firstname> <surname>Botterman</surname></author><superscript>9</superscript>, <author><firstname>Bin</firstname> <surname>Cheng</surname></author><superscript>8</superscript>, <author><firstname>Flavio</firstname> <surname>Cirillo</surname></author><superscript>8</superscript>, <author><firstname>Markus</firstname> <surname>Dillinger</surname></author><superscript>7</superscript>, <author><firstname>Hans</firstname> <surname>Graux</surname></author><superscript>10</superscript>, <author><firstname>Seyed Amir</firstname> <surname>Hoseinitabatabaie</surname></author><superscript>2</superscript>, <author><firstname>Ern&#x00F6;</firstname> <surname>Kovacs</surname></author><superscript>8</superscript>, <author><firstname>Salvatore</firstname> <surname>Longo</surname></author><superscript>8</superscript>, <author><firstname>Swaroop</firstname> <surname>Nunna</surname></author><superscript>7</superscript>, <author><firstname>Alois</firstname> <surname>Paulin</surname></author><superscript>5</superscript>, <author><firstname>R. R. Venkatesha</firstname> <surname>Prasad</surname></author><superscript>4</superscript>, <author><firstname>John</firstname> <surname>Soldatos</surname></author><superscript>1</superscript>, <author><firstname>Christoph</firstname> <surname>Thuemmler</surname></author><superscript>5</superscript> and <author><firstname>Mojca</firstname> <surname>Volk</surname></author><superscript>6</superscript></emphasis>
</authorgroup>
<para><superscript>1</superscript>GR, Athens Information Technology, Greece</para>
<para><superscript>2</superscript>University of Surrey, UK</para>
<para><superscript>3</superscript>CREATE-NET, Italy</para>
<para><superscript>4</superscript>TU Delft, Netherlands</para>
<para><superscript>5</superscript>Edinburgh Napier University, UK</para>
<para><superscript>6</superscript>University of Ljubljana, Slovenia</para>
<para><superscript>7</superscript>Huawei, Germany</para>
<para><superscript>8</superscript>NEC, Germany</para>
<para><superscript>9</superscript>GNKS Consult BV, Netherlands</para>
<para><superscript>10</superscript>Timelex, Belgium</para>
<section class="lev1" id="sec7.1" label="7.1" xreflabel="sec7.1">
<title>Introduction</title>
<para>Internet-of-Things (IoT) Analytics refers to the process of transforming vast amounts of information from heterogeneous internet-connected objects, data sources and devices (e.g., sensors, appliances, cyber-physical systems, Machine-to-Machine systems) to business and application intelligence. Several tools and techniques for IoT analytics have their roots in conventional web analytics, which process and combine data streams from web-connected computers, cell phones and web databases. However, IoT analytics broaden the scope of web analytics on the basis of the collection, processing and analysis of information produced by internet-connected devices, thus enhancing the scope and functionalities of related applications.</para>
<para>Nowadays, IoT analytics have a growing momentum, which is highly due to the proliferation of IoT devices and the overall momentum of IoT technologies and services. IoT analytics hold the promise to enable a wide range of novel applications that are not currently possible, which could revolutionize applications areas with significant socio-economic impact such as healthcare, energy management, public safety and more. The IoT analytics vision, while fantastic, is associated with several challenges spanning both technical and policy issues. For example, at the technical and scientific forefront, IoT devices tend to produce high-velocity streams, which challenge the capabilities of state-of-the-art BigData systems (such as MapReduce). Furthermore, the heterogeneity and diversity of IoT devices is a serious set-back to the collection, consolidation and unified processing of IoT data streams. Other challenges relate to the selection, refinement and deployment of effective data analytics algorithms that can respond to the stringent QoS (Quality of Service) requirements of IoT applications. Likewise, at the policy forefront, there is a need for addressing security, privacy and data protection challenges in-line with existing regulations, but also in a way that encourages user participation.</para>
<para>The present chapter of the 2015 IERC Book aims at presenting the above-listed challenges of IoT analytics, while at the same time providing insights in possible solutions, notably solutions that are being developed in the scope of the IERC community. The second section of the chapter (following this introductory one), is titled &#x201C;Deep Internet of Things Data Analytics&#x201D;. It presents challenges and solutions associated with the collection and semantic unification of diverse data streams, which is one of the first prerequisite steps for analyzing IoT data sources. Likewise, the third section of the chapter presents the challenges of IoT/BigData convergence and illustrates techniques for integrating IoT with cloud and BigData infrastructures. The fourth section of the chapter provides insights associated with the practical application of IoT analytics in healthcare and social care, while the fifth section presents an IoT analytics case for public safety. Finally, the sixth section of the chapter deals with the ever important policy issues, through presenting challenges and providing a perspective for solutions that are in-line with existing and emerging EU directives. It also identifies gaps of these directives and proposes relevant remedies. Overall, this chapter provides the reader with a nice overview of the technical and policy issues associated with the wider deployment of advanced IoT analytics, along with some solutions introduced and advanced by the IERC community.</para>
</section>
<section class="lev1" id="sec7.2" label="7.2" xreflabel="sec7.2">
<title>Deep Internet of Things Data Analytics</title>
<section class="lev2" id="sec7.2.1" label="7.2.1" xreflabel="sec7.2.1">
<title>Introduction</title>
<para>Computers in their early days were not designed for personal use and individual applications. They were usually large machines and mainframes that specialists worked with. Rapid hardware and software innovations and advancements and the emergence of global networks and the Internet made computers widely available for everyone to use. Mobile devices and wireless technologies made it potentially possible to connect to communication networks and the Internet anytime and anywhere. We now live in an era in which physical objects (i.e. &#x201C;Things&#x201D;) can be embedded with their own computing devices and with networking capabilities. The Internet of Things (IoT) is an umbrella term that refers to technologies that enable communication and interaction between various devices and real world objects and human users. IoT is mainly enabled by advancements in manufacturing low-cost sensors and actuators, smart phones, embedded devices, and communication and networking technologies. These advancements have resulted in rapid growth and the deployment of networked-enabled devices and sensing and actuation systems that interconnect the physical word with the cyber-world. The number of devices connected to the Internet has already exceeded the number of people on earth and is estimated to grow to 50 billion devices by 2020 <link linkend="B7-39">[39]</link>.</para>
<para>Data collected by different devices are of various types (e.g. temperature, light, humidity, video) and are inherently diverse and dynamic (i.e. the quality and validity of data can vary with different devices over time; data is also mostly location and time dependent). Sensory devices can be ubiquitous and are often constrained in power, memory, processing and communication capabilities. As the scale of interactions between devices and the load of communications rapidly increase, real world data and service traffic become voluminous; the current Internet/Web architecture will not be suited to delivering reliable, efficient and time-sensitive data and services for large volumes of networked devices <link linkend="B7-1">[1]</link>.</para>
<para>In following paragraphs we discuss that IoT data analytics cannot be separated from data collection, device and network conditions and limitations. The ability of the resources to effectively publish, discover and access the data in large-scale distributed environments will have an impact on the efficiency of the data analytics methods. Effective data analytics solutions in the IoT need to consider the dynamicity and constraints of data collection devices and communication networks and should be able to optimise the processes for different purposes and requirements, such as latency, accuracy, data and sampling rates, and energy efficiency. We discuss data analytics in the IoT domain and describe some of the key issues to provide integrated and end-to-end solutions for large-scale and efficient data analytics. The integration of device and network parameters and their characteristics in the IoT data analytics in this work is referred to as <emphasis>Deep IoT data analytics</emphasis>.</para>
</section>
<section class="lev2" id="sec7.2.2" label="7.2.2" xreflabel="sec7.2.2">
<title>Designing for Real World Problems</title>
<para>IoT research covers a broad range of technologies and solutions that aim to tackle the challenges in networking and communications, interoperability, services and stream processing and data analytics. IoT is an integration of different systems and technologies. Industry based solutions and services in this domain are often under development or do not interoperate on a global and large scale, due to a lack of standardisation. Data processing and analytics solutions in the IoT are mainly based on conventional data mining and machine learning techniques. There are also several solutions and de-facto standards for annotation and semantic integration of IoT data.</para>
<para>However, IoT data is inherently different from other types of data on the Web and database systems. Uncertainty, incompleteness, sporadic data distributions, scale and energy and resource constraints of the data provider devices are among the key issues that make processing IoT data different and more challenging than the usual data on the Web and database systems.</para>
<para>Data analytics solutions in the IoT, in contrast to many existing BigData analysis works, cannot be separated from data collection, selection, network status and issues such as energy efficiency. Efficient and intelligent data analysis methods for the IoT domain should consider end-to-end and integrated solutions and should be adaptable and flexible enough to work with incomplete and uncertain data and should also be able to adjust themselves to concept drifts (i.e. changes in the data or the objectives of data processing) <link linkend="B7-2">[2]</link> and requirement changes. The IoT is an online network of resources and data analytics solutions and should be able to process and analyse dynamic data in real-time.</para>
<fig id="F7.1" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 7.1</label>
<caption><para>Key dimensions in production and deployment of IoT data.</para></caption>
<graphic xlink:href="graphics/fig7_1.jpg"/>
</fig>
<para><link linkend="F7.1">Figure <xref linkend="F7.1" remap="7.1"/></link> (adapted from <link linkend="B7-3">[3]</link>) shows some of the key dimensions that need to be taken into account when designing data analytics methods for the IoT. As shown in the figure, the connectivity and data publication can potentially be at any time, from any place and can be related to any-thing. The volume of data is a key issue and the networks and communication technologies have an impact on various aspects of data access and use, such as latency, quality and availability. IoT data can be related to people, personal spaces and living environments; so reliability, security and privacy are among key issues in designing any solutions, including data analytics for the IoT. Having access to new types of data and connectivity and interaction with the real world provides an opportunity to design new services and applications that rely on ambient intelligence. However, data analytics methods for extracting this ambient intelligence have to deal with time and location dependency and dynamicity of data and the solutions should be able to handle uncertainty and quality issues often in a real-time manner. IoT services and applications will have an impact on people&#x2019;s lives and the way that personal and public spaces and services are planned and designed (e.g. smart homes and smart cities). Industrial IoT applications and services require the processing of large volumes of data to make autonomous decisions to control and operate various systems and machines.</para>
<para>Wireless communication is the dominant component in overall energy consumption of the remote IoT devices (i.e. in the current systems the computation usually consumes less energy than the communication <link linkend="B7-4">[4]</link>). In this regard, careful considerations should be made to minimise the communication load in IoT networks. IoT resources are usually programmed to collect and forward data based on a given data acquisition frequency and are often ignorant of information within the data packets. This could lead to the creation of redundant and unnecessary communication load when data is noisy and unreliable or when it does not contain any significant or new information.</para>
<para>The other important issue is the scalability of the data processing and computation. Recent efforts in distributing processing tasks among different resources (e.g. using software defined solutions <link linkend="B7-5">[5]</link>), have mitigated the problems associated with conventional centralised processing architectures to some extent. However, with the scale of the IoT resources, problems such as effective use of computational resources on devices and distribution of data analytics processes between IoT devices and Cloud based resources are challenging issues.</para>
</section>
<section class="lev2" id="sec7.2.3" label="7.2.3" xreflabel="sec7.2.3">
<title>Real World Data</title>
<para>To better understand the requirements of data analytics we first need to look at the data sources and the type of devices and networks that produce and handle this data. Access to live real world data and connected worlds of physical objects, people and devices are rapidly changing the way we work and interact with our surroundings and have had a profound impact on different domains, such as healthcare, environmental monitoring, urban systems, industry, and control and management applications and decision support systems.</para>
<para>IoT data is usually collected via sensing devices that are connected to wireless or wired networks (e.g. wireless sensor and actuator networks), smart phones and other embedded and network-enabled devices. The devices can be directly connected to the core network and data analysis components or gateway components can provide data communication between IoT devices and higher-level services and applications, including the data analytics components in the core networks.</para>
<fig id="F7.2" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 7.2</label>
<caption><para>A generic framework for IoT data publication and communication.</para></caption>
<graphic xlink:href="graphics/fig7_2.jpg"/>
</fig>
<para><link linkend="F7.2">Figure <xref linkend="F7.2" remap="7.2"/></link> shows a generic framework for IoT data communication where some nodes can use Internet and Web based protocols and some are connected via gateway components. There are also platforms and solutions that enable crowd sourcing of IoT data collection and publication using smart phone and network-enabled devices and sensing technologies. Quality, trust and reliability, together with the availability and delays in accessing the data are key issues in crowd sourced data collection and publication use-cases.</para>
<para>IoT data is often published as streaming data with multiple streams that can provide similar data (but can have different quality or parameters) or other relevant data that need to be integrated and processed together. Extracting patterns and finding correlations between different parts of the data is an important task in data analytics for IoT data streams. However, there are two key issues: causation vs. co-occurrence requires further analysis and often background knowledge is required to interpret and separate the causations; time lag between different pattern occurrences and spatial dependencies should also be considered when analysing the patterns in the streams. For example, an occurrence in a data stream (i.e. an event) can cause a related pattern in a different stream (and in a different location) after a period of time. So the spatio-temporal interdependencies should also be considered in the analysis. The streaming data can sometimes have missing values due to communication and device errors or different sampling rates. Different interpolation techniques (e.g. Gaussian process or multivariate interpolation techniques) or machine learning methods can be employed to compensate for the missing values in the data streams.</para>
</section>
<section class="lev2" id="sec7.2.4" label="7.2.4" xreflabel="sec7.2.4">
<title>Data Interoperability</title>
<para>Data collection and publication is the initial step for accessing and processing IoT data. As discussed, there are several issues regarding the device, network and end-user application and service state and requirements that need to be taken into consideration when collecting and publishing the IoT data.</para>
<para>Data is usually published in various forms and via distributed devices and sources. There are several existing metadata models and description frameworks that are designed and proposed by academia and industry to provide interoperable resource and data descriptions in the IoT domain. For example, the W3C Incubator Group on Semantic Sensor Networks developed a higher-level model for describing sensors and their capabilities called SSN Ontology <link linkend="B7-6">[6]</link>.</para>
<para>These semantic and metadata models and description frameworks are designed to improve the interoperability of the data and resource descriptions. Machine-readable and automatically interpretable data descriptions and data engineering solutions to enhance the structure and representation of data will strongly improve the analytics and integration methods, especially in the IoT world, where multi-modality and heterogeneity are among the key issues. However, the semantic annotation requirements and the complexity of providing structured information with several attributes often hinders the effective use of the semantic models that are proposed for real world data. Some of the parameters, such as quality of data, are also dynamic variables. Most of the current semantic annotation models construct a semantic description model and annotate the data according to that model without providing an end-to-end set of tools and solutions to add and update more attributes and metadata to the annotation after the data is published. However, the dynamicity and changes in the annotated values (e.g. the meaning of quality for a data item can change after the time of measurement; provenance of data can change as more processing methods are applied to the data) is not captured in the models and annotation methods.</para>
<para>Many of the current semantic annotation frameworks for the IoT are static and the provenance and changes to the data and metadata updates are not directly supported. Providing &#x201C;dynamic semantics&#x201D; in the IoT domain and developing tools, APIs and methods that can publish, update and extend the semantics as the data is processed and integrated with other sources, or as more information is collected and analysed from the environment will help to resolve this issue. This will not only address the interoperability issues but will also create more enhanced and flexible annotations that reflect the actual and up-to-date attributes of the data. The dynamic semantic methods should also use linked-data descriptions to link between different resources and also use common vocabularies to describe the concepts and content of the annotations. Using common vocabularies and topical ontologies for describing events and occurrences and other common attributes of the data, such as units of measurement, will significantly improve the interoperability and effectiveness of data analytics operations.</para>
</section>
<section class="lev2" id="sec7.2.5" label="7.2.5" xreflabel="sec7.2.5">
<title>Deep Data Analytics Methods</title>
<para>Edge-level pre-processing, filtering the noise and removing the corrupted data and data aggregation mechanisms on the IoT device could help to minimise the use of communication resources at source level. Pre-processing and data aggregation at device level is a remedy for the congestion problem that often occurs in centralised and hierarchical architectures and will lead to a more scalable design.</para>
<para>In the IoT, data analysis algorithms should be able to automatically make adjustments and adapt the overall solutions to different information extraction and optimisation goals. For example, in an emergency response scenario the algorithms need to be optimised for reducing latency; in an elderly care scenario increasing the quality of the extracted information would be the main priority; in an environmental monitoring framework using a large number of wireless sensors and increasing the life-time of the network can be one of the main goals of the overall application and consequently the data analytics method should also be adjusted and optimised to meet these goals and requirements. Obviously IoT devices in large deployments will not run for just one application and will not respond to a single demand, so cross-application optimisation is also an essential task in developing large-scale and multi-purpose IoT frameworks. To perform such optimisation and integrated data processing efficient data discovery and selection algorithms for choosing the best set of resources at the given time, and adaptable and customisable data analytics methods that can push the processing to the edges of the IoT networks, are required.</para>
<para>Most of the conventional machine learning and data analytics methods are also designed based on the assumption of having normalised distribution and reliable datasets. For example, processing techniques, such as the Symbolic Aggregate approXimation (SAX) <link linkend="B7-7">[7]</link> algorithm for constricting patterns from streaming data, assume that the data distribution are normalised. SAX divides the normalised probability distributions to equi-probable segments and assigns a symbolic representation for each segment. These symbolic representations are then used to create representative patterns of the streaming data. While SAX or other similar methods have been used effectively in the data analysis and stream processing fields, using them in the IoT has some limitations. SAX patterns can still be constructed from the IoT data streams but the distribution of the IoT data in short-time windows, which is often the key focus of the (near) real-time data analytics methods, is not normalised and can be a sporadic and multivariate distribution. This will require pre-processing and analysis of the data at source level and determining the distribution and other attributes of the data before constructing the symbolic representation and constructing the patterns.</para>
<para>Data analytics for dynamic environments such as IoT requires resource-aware analysis techniques that focus on both the data and also the resources that provide the data. Optimisation for different objectives such as latency, accuracy, energy efficiency, and network traffic should be supported and the algorithms should be able to adjust and adapt to these objectives dynamically. The key target of data analytics in the IoT is to create situation-awareness and ambient intelligence and to extract actionable information that can be used in decision support systems and higher-level applications and services. The results of the data analytics can also be used to visualise and demonstrate different patterns, occurrences and events in the physical environments. Most of these are online applications and services that require (near) real-time learning and feedback mechanisms.</para>
<fig id="F7.3" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 7.3</label>
<caption><para>A view of data analytics levels in an IoT framework.</para></caption>
<graphic xlink:href="graphics/fig7_3.jpg"/>
</fig>
<para><link linkend="F7.3">Figure <xref linkend="F7.3" remap="7.3"/></link> shows a multi-level view of data analytics in an IoT framework. The device and resources are the edge-level and their parameters at any given time will have an impact on real-time data collection and other parameters, such as quality and granularity of the data. The analytics methods need to take into account these parameters and to also try to control and adjust these using software defined and adjustable solutions to provide more resource-aware solutions. The middle layer is the core network and Cloud based services that can provide back-end support for discovery, integration, publication and storage, and large-scale distributed analytics methods. The functions at this level will be adapted according to requirements, concept drifts at the end-user and application/service layer and also condition and priorities at the device level.</para>
<para>In the machine learning domain and the Big Data world there are deep learning methods that attempt to learn representations and model abstractions of data <link linkend="B7-8">[8]</link>. The deep learning methods often also improve the performance of the learning methods by analysing and processing large volumes of data. In the IoT domain, the use of deep learning and other conventional and novel data analytics and stream processing methods can be very beneficial. However, the deep analytics, as described in the paper, mainly describes the adaptability and adjustability of the methods towards various optimisation objectives and concept drifts and is an attempt to develop analytics and machine learning techniques that can take device and network parameters into account and can work efficiently with multivariate and sporadic data provided by multiple sources and by various qualities.</para>
<para>The data analytics solutions in this IoT domain also rely on semantic annotations and descriptions of the resources. The more expressive the attributes of the data and their provider resource are, the better the interpretation and analysis that can be provided. However, expressive semantic annotations and metadata will require a higher communication and computation load (and consequently will consume more energy in constrained environments). The update, query and processing of complex semantics can also their hinder efficient utilisation. So a trade-off between semantic descriptions, efficient publication, query and discovery methods and adaptable and flexible learning and analytics solutions are required in the IoT framework.</para>
</section>
<section class="lev2" id="sec7.2.6" label="7.2.6" xreflabel="sec7.2.6">
<title>Conclusions</title>
<para>Increased interest in using the IoT in different domains, such as smart cities, healthcare and industry, plays a key role in the production of massive amounts of real world data. This data is mainly collected in order to extract actionable information, create ambient intelligence and provide situation awareness for different higher-level applications and services <link linkend="B7-9">[9]</link>. IoT is a dynamic environment with various devices that are often resource constrained and deployed on a large scale. Consequently, IoT data is also dynamic and heterogeneous. In contrast to many Web and database systems, data analytics methods depend on the context of the data production source and network and device parameters.</para>
<para>Efficient IoT data analytics methods require end-to-end techniques and solutions for collection and publication, discovery and selection, and adaptable and adjustable data analysis mechanisms and techniques. Drifts and changes, both in the end-user targets and operational environments and optimisation goals and network and device parameters, should be monitored and captured and should be fed back to control mechanisms that can adapt and control the data analytics methods. Key challenges for the future generation of IoT data analytics, in addition to overcoming the scale, computation and multi-modality issues, is to provide software controlled and adaptable solutions that can monitor the changes deep in the networks and physical environments and optimise their functions and goals based on end-user requirements, network and platform context, and changes in the surrounding environment.</para>
</section>
</section>
<section class="lev1" id="sec7.3" label="7.3" xreflabel="sec7.3">
<title>Cloud-Based IoT Big Data Platform</title>
<section class="lev2" id="sec7.3.1" label="7.3.1" xreflabel="sec7.3.1">
<title>Introduction</title>
<para>The third generation Internet of Things (IoT) comprises millions of applications, billions of users and trillions of devices. Over the last years, IoT has moved from being a futuristic vision to market reality. It is not any more a question that whether IoT will exist surpassing the hype, but it is already there and <emphasis>IoT industry</emphasis> race has already begun. Trillions of connected devices are the enablers; however the value of IoT is in the data and advanced processing of the collected data. IoT data is more dynamic &#x0026; heterogeneous, imperfect &#x0026; unstructured and, unprocessed &#x0026; real-time than typical business data. It demands more sophisticated IoT-specific analytics to make a meaningful inference. The exploitation of the real-time big data obtained from sensors/actuators in IoT context by processing in sophisticated cloud is very much a necessity. This data processing leads to advanced, proactive and intelligent applications and services. The colligation of IoT and Big data can offer: i) deep understanding of the context and situation, ii) real-time actionable insight &#x2013; detect and reacted to in real-time, iii) performance optimization, and iv) proactive and predictive advanced knowledge. Cloud technologies offer decentralized and scalable information processing and analytics, and data management capabilities.</para>
<para>Following paragraphs address the cloud based IoT and Big data platform concept and their emerging requirements on the convergence of sensors and devices, big data analytics, cloud data management, edge-heavy computing, machine learning and virtualization. Initial results from iKaaS (Intelligent Knowledge as a Service) an EU-Japan project on IoT/Cloud/Big data are also discussed.</para>
</section>
<section class="lev2" id="sec7.3.2" label="7.3.2" xreflabel="sec7.3.2">
<title>Big Data in the Context of IoT</title>
<para>Big data is defined by 4Vs (<link linkend="F7.4">Figure <xref linkend="F7.4" remap="7.4"/></link>), these are Volume-, Velocity, Variety, Veracity. Volume means large data size in 100s of terabytes. Velocity means the real-time and/or stream of data. Variety means the heterogeneous data (e.g., structure and unstructured, diverse data models and query languages, and diverse data sources). Veracity means data uncertainty due to data inconsistency, incompleteness, ambiguities, latency, model approximations, etc.</para>
<fig id="F7.4" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 7.4</label>
<caption><para>Big Data Properties.</para></caption>
<graphic xlink:href="graphics/fig7_4.jpg"/>
</fig>
<para>IoT faces all 4Vs of the Big Data challenges. However the velocity is the main IoT Big data challenge because of real-time and stream of data coming from diverse IoT devices and sensors. Real-Time Big Data terminology is often replaced by the term IoT Big Data. The data coming from the IoT devices have to be processed in real-time to arrive at reliable and intelligent decision. For example, healthcare wearables (like ECG (Electrocardiogram) devices) produce up to 1000 events per second which is a challenge for real-time processing considering miniaturized devices and number of such devices. Next is the volume, for example, large scale IoT deployments gather and process millions pieces of data from millions of sensors per day. Likewise, a wearable sensor produces about 55 million data points per day.</para>
</section>
<section class="lev2" id="sec7.3.3" label="7.3.3" xreflabel="sec7.3.3">
<title>Applications of IoT Big Data Analytics</title>
<para>The applications of IoT Big Data analytics can be classified into five main categories which are depicted in <link linkend="F7.5">Figure <xref linkend="F7.5" remap="7.5"/></link> and include:
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>Predictive analytics,</para></listitem>
<listitem><para>Prescriptive analytics,</para></listitem>
<listitem><para>Descriptive analytics,</para></listitem>
<listitem><para>Monitoring and</para></listitem>
<listitem><para>Control and optimization.</para></listitem>
</itemizedlist></para>
<para>All these require a deep understanding of the domains, situation and the requirements of services by users.</para>
<para>Gaining insights and knowledge in real time and actionable insights can lead to performance optimization. All the above five applications are inter-related and requires multiple tools like machine learning, reasoning, optimization, etc.</para>
<fig id="F7.5" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 7.5</label>
<caption><para>IoT-Big Data Applications.</para></caption>
<graphic xlink:href="graphics/fig7_5.jpg"/>
</fig>
<para>Predictive analytics is used in many applications where users require services that can foresee the situation and act on it. Prescriptive analytics can provide many possible actionable decisions and also can provide the trade-off between them.</para>
<para>Descriptive analytics offers the insights into the situation and helps in deep understanding. Monitoring, control and optimization are legacy applications, but with big data analytics they can be improved immensely.</para>
<para>Thus, analytics can indeed offer multiple services such as observing behaviour of things, gaining important insights and processing in real time for immediate actions. For example, in healthcare services IoT analytics can be used for understanding the cause of diseases, as well as for identifying emergency situations.</para>
<para>This vision boils down to solving multiple challenges: to store all the events (velocity &#x0026; volume); to run queries over the stored events; (velocity &#x0026; volume) to perform analytics (data mining and machine learning) over the data to gain insights. Examples include real-time fall detection and potential reactions for aging population. Real-time detection and action represent multiple challenges.</para>
</section>
<section class="lev2" id="sec7.3.4" label="7.3.4" xreflabel="sec7.3.4">
<title>Requirements of IoT Big Data Analytic Platform</title>
<para>An IoT BigData Analytics Platform is a real-time online platform that dynamically manages IoT data/objects but it also provides connectivity to the diverse heterogeneous objects, considering the interoperability issues. Next is deriving useful information and knowledge from this connection and large volume of IoT data. The platform needs to offer ubiquitous accessibility and connectivity in facilitation of maximum accessibility as well as connectivity of the diverse heterogeneous objects/services and various volumes of users including mobility. Dynamic management/orchestration of users, billions of devices as well as massive amount of data produced by those connected devices, maximum resource utilization, and sharing of IoT resources (objects, applications, platforms) are all necessary. Personalized, secure, and privacy by design services based on preferences of users and requirements including real-world context are the important requirements. Some of the requirements are briefly discussed in following paragraphs.</para>
<section class="lev3" id="sec7.3.4.1" label="7.3.4.1" xreflabel="sec7.3.4.1">
<title>Intelligent and dynamic</title>
<para>The platform should include intelligent and autonomic features in order to dynamically mange the platform functions, components and applications. The platform should also be capable of making a proactive decision, dynamic deployment, and intelligent decision to understand the context of the environment, users and application requirements, etc. Considering performance targets/constraints, offloading from clients/hosts to cloud is necessary but the performance should be guaranteed. Dynamic resource sharing and service migration is a must for large scale IoT applications. Dynamic metering may be also necessary when IoT devices are shared.</para>
</section>
<section class="lev3" id="sec7.3.4.2" label="7.3.4.2" xreflabel="sec7.3.4.2">
<title>Distributed</title>
<para>The platform should include distributed information processing and computing capabilities, distributed storage, distributed intelligence, and distributed data management capabilities. This need to be distributed across smart devices, gateway/server and multiple cloud environments. More distributed processing and storage of the massive data as well as cloud functionalities is a must. Decentralized (and infrastructure-less) clouds will be the order of the day through processing capabilities and positioning data closer to users.</para>
</section>
<section class="lev3" id="sec7.3.4.3" label="7.3.4.3" xreflabel="sec7.3.4.3">
<title>Scalable and elastic</title>
<para>The platform has to be scalable to address the connectivity from small to large number of the devices, manage the different scale of the data and services, as well as users. Cloud and edge data management, storage and processing, need to be scalable and at the same time elastic.</para>
</section>
<section class="lev3" id="sec7.3.4.4" label="7.3.4.4" xreflabel="sec7.3.4.4">
<title>Real-time</title>
<para>Real-time data processing and service provisioning of &#x201C;Big data&#x201D;, is necessary. Un-structured and semi-structured data coming from distributed sources should be processed to provide real-time/near real-time services.</para>
</section>
<section class="lev3" id="sec7.3.4.5" label="7.3.4.5" xreflabel="sec7.3.4.5">
<title>Heterogeneous (unified)</title>
<para>Interoperability between cloud/IoT services and infrastructure, and federation between cloud, Big data and IoT devices has to be in place to realize full potential. Standard APIs to deal with heterogeneity need to evolve. Open software components, standard data structure and modeling and abstraction of heterogeneous IoT devices and the data is necessary. Data always raise heterogeneity problems: many data formats, many metadata schema descriptions, mix of various levels of complexity, etc., are the cases in point. The target is to deliver a data model and the specification of required mechanisms for exploiting both structured and unstructured data, for moving from raw data to linked data, enabling the adoption of a common understanding, the recognition of similar data, and unambiguous description of relevant information for multimodal and cross-domain smart space applications.</para>
</section>
<section class="lev3" id="sec7.3.4.6" label="7.3.4.6" xreflabel="sec7.3.4.6">
<title>Security and privacy</title>
<para>Security and privacy by design is also needed including different privacy and security features like data integrity, localization, confidentiality, SLA (Service Level Agreements), security and privacy-preserving data management modules. Holistic approaches are required to address privacy &#x0026; security issues across value chains including privacy by design aspects, software algorithms and new data management models.</para>
<fig id="F7.6" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 7.6</label>
<caption><para>iKaaS Platform.</para></caption>
<graphic xlink:href="graphics/fig7_6.jpg"/>
</fig>
</section>
</section>
<section class="lev2" id="sec7.3.5" label="7.3.5" xreflabel="sec7.3.5">
<title>Cloud-Based IoT Analytic Platform</title>
<para>The cloud-based platform is dynamic in nature and offers flexible resources sharing and service provisioning. It also offers a scalable and elastic service/ resources management platform. The platform also offers reliable and easy access to the services using large amount of computing and storage resources. The cloud-based platform is also homogeneous (unified) which reduces the technological heterogeneity. On the other hand, IoT depends on massive resources available when needed and scaled back when not needed. This can only be achieved using cloud paradigm. For IoT, cloud computing functionalities enable the realization of the IoT vision. For Cloud, IoT provides huge opportunities for cloud services. There are two basic approaches for the convergence of IoT-Big data and Cloud. These are (i) Cloud-centric IoT (bringing IoT functionalities into Cloud) and (ii) IoT-Centric Cloud (bringing Cloud functionalities into IoT).</para>
<para>In the following, we provide an overview of the iKaaS platform that has been developed as an example and which is illustrated in <link linkend="F7.6">Figure <xref linkend="F7.6" remap="7.6"/></link>. It combines ubiquitous and heterogeneous sensing, along with big data and cloud computing technologies. iKaaS enables IoT processing consisting of continuous iterations on data ingestion, data storage, analytics, knowledge generation and knowledge sharing phases, while at the same time providing a foundation for service provisioning. The iKaaS platform comprises of the cloud ecosystem that consists of<emphasis> Local Clouds</emphasis> and a <emphasis>Global Cloud</emphasis>. More specifically:
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>A local cloud is created on-demand; it comprises of sufficient/appropriate computing/storage/networking capabilities, and provides requested services to users in a certain geographical area and time period as well as offers additional processing and storage capability to services.</para></listitem>
<listitem><para>The global cloud is seen in the &#x201C;traditional&#x201D; sense, as a construct with on-demand/elastic processing power and storage capability. It is a &#x201C;backbone infrastructure&#x201D;, which increases the business opportunities for service providers, and the ubiquity/reliability/scalability of service provisioning. It offers more opportunities for offering services, more options on which service features are based in case of context changes, more resources for deriving meaningful decisions, and elastic provision of resources on demand.</para></listitem>
</itemizedlist></para>
<para>Local clouds can involve an arbitrarily large number of nodes (sensors, actuators, smart-phones, etc.). The aggregation of resources comprises sufficient processing power and storage space. The goal is to serve users in a certain area. In this respect, a local cloud is the virtualised processing, storage and networking environment, which comprise IoT devices in the vicinity of the users; users will exploit the various services composed of the devices in local clouds and their capabilities e.g., a sensor and its gateway equipped with the iKaaS platform.</para>
<para>The global cloud can enable, as a special (yet important) case, the existence of IoT service providers capable of providing larger scale services without owning actual IoT infrastructure.</para>
<para>The Cloud ecosystem comprises the following essential functionalities:
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>Consolidated service-logic/resource
descriptions/registries as part of the Global Cloud enabling the reuse of services. Practically, a set of registries will be developed enabling the pooling of service logic and resources.</para></listitem>
<listitem><para>Autonomic service management, first the global cloud and then, in the local cloud. This functionality will be in charge of (i) dynamically understanding the requirements, decomposing the service (finding the components that are needed); (ii) finding the best service configuration and migration (service component deployment) pattern; (iii) during the service execution, reconfiguring the service, i.e., conducting dynamic additions, cessations, substitutions of components.</para></listitem>
<listitem><para>Distributed data storage and processing is anticipated for global and local clouds. This means capabilities for efficiently communicating, processing and storing massive amounts of, quickly-emerging, versatile data (i.e., &#x201C;big data&#x201D;), produced by a huge number of diverse IoT devices.</para></listitem>
<listitem><para>Derivation of information and knowledge (e.g., on device behaviour, service provision, user aspects, etc.), while ensuring security and privacy as a top concern.</para></listitem>
<listitem><para>Knowledge as a service (KaaS) will be primarily part of the Global Cloud. This area covers: (i) device behaviour aspects; (ii) the way services have been provided (e.g., through which IoTresources) and the respective quality levels; and (iii) user preferences.</para></listitem>
</itemizedlist></para>
<para>Thus the iKaaS functionality will determine the optimal way to offer a service. For instance service components may need to be migrated as close as possible to the required (IoT) data sources. IoT services may need generic service support functionality that is offered within the cloud, and, at the same time, they do rely on local information (e.g., streams of data collected by sensors in a given geographic area), therefore, the migration of components close to the data sources will help in reduction of data traffic.</para>
</section>
</section>
<section class="lev1" id="sec7.4" label="7.4" xreflabel="sec7.4">
<title>IoT Analytics in Health and Social Care</title>
<section class="lev2" id="sec7.4.1" label="7.4.1" xreflabel="sec7.4.1">
<title>Introduction</title>
<para>Following a protracted start back in the early 2000, IoT is nowadays an undeniable force, which will dictate our (virtual) reality in years to come. According to figures by Cisco the global amount of mobile data will grow dramatically to an annual run rate up from 30 exabytes in 2014 to 249 exabytes by 2019 <link linkend="B7-10">[10]</link>. While a significant share of this data, almost 79% will account for IP video streaming by 2018 it is reasonable to assume that by then 5&#x2013;10% of the overall traffic will be generated by smart devices, sensors, attenuators, embedded &#x2013; and cyber-physical systems. Although these developments are currently driven in the first instance by industrial domains such as automotive, retail and logistics there is evidence for massive utilization of IoT strategies in the health and social care domains in the near future.</para>
<para>It has become increasingly clear that the way health and social care will be delivered in the future is undergoing substantive changes. These changes are driven by the demographic and socio-economic developments in our societies and also the technological and bio-medical progress. As a general trend the availability of smart IoT capable devices has dramatically improved. Wearables are everywhere, from smart glucometers for blood-glucose measurement, insulin-pumps and highly complex brain-pacemakers for the treatment of Parkinson&#x2019;s disease to the &#x201C;iWatch&#x201D; or similar products. Portability has increased since storage capacity of smart phones has reached hundreds of Gigabytes and the battery capacity is significantly improved.</para>
<para>Governments in Europe are now publically debating the utilization of IoT technology to control health and social care costs by enabling and empowering patients and their informal carers <link linkend="B7-11">[11]</link>. However, while the focus of IoT research has so far been placed on creating reference architectures and conduct design- and feasibility studies in order to interlink devices and capture and collect information the issues around analytics and the creation of value are now taking center stage <link linkend="B7-12">[12]</link>.</para>
<para>Even though the focus of this section is clearly on analytics and enabling architectural designs it is certainly important to underline that in sensitive areas (such as healthcare), the discussed technologies and their possibilities have to always be set into perspective with the relevant ethical and legal considerations <link linkend="B7-13">[13]</link>. For further information on this topic the interested reader may wish to consult the ethics, science and technology section at the European Political Strategy Centre <link linkend="B7-14">[14]</link>.</para>
</section>
<section class="lev2" id="sec7.4.2" label="7.4.2" xreflabel="sec7.4.2">
<title>Architectural Approach to Data Analytics</title>
<para>Essential to the health &#x2013; and social care domains is the understanding that architecture should be scalable and able to cater for the analysis of big and small data whereby the topology is becoming more and more relevant [<link linkend="B7-15">15</link>, <link linkend="B7-16">16</link>]. Conventional cloud computing has long been regarded as the holy grail of big data analysis and is certainly a powerful method. The ability to share computing resources and balance the load according to the need of the task at hand makes cloud infrastructures clearly a formidable approach. Typical examples include the analysis of pre-existing large databases such as censuses or genetic information (genomics) databases.</para>
<para>However, standard cloud approaches seem to struggle with some requirements of the health and care domains, especially with regards to time critical processes. Although cloud approaches are powerful strategies, the bottle-neck seems to be the network and the relatively high latencies associated with it. Furthermore, there are continuous privacy and security concerns associated with public clouds for the use in health and care.</para>
<para>The biggest challenge seems to be the fact that the predicted growth of network traffic, especially mobile traffic, will outperform the network capacity by 2019 <link linkend="B7-10">[10]</link>. At the same time there is clear evidence for a significant increase in sensors, attenuators, embedded and cyber-physical systems, which on the one hand clearly drives the utilization of IoT technology in e-Health but also drives the increase in data, which further widens the gap between traffic demand and network capacity. This dilemma has caused a paradigm shift towards a distributed analytics approach, which might be the way forward in the health and care domains, which are set to generate very large amount of data with the potential to jam up existing infrastructures.</para>
<para>While hybrid-cloud models were early manifestations of the attempt to solve the privacy problem in sensitive areas such as health and care, most recently this has been developed further into more sophisticated strategies involving mobile edge cloud computing and lately the so called &#x201C;fogging&#x201D; [<link linkend="B7-16">16</link>&#x2013;<link linkend="B7-18">18</link>]. Fog computing in a way merges the benefits of cloud computing and grid computing as it on the one hand integrates peripheral smart devices in one distributed approach while on the other hand allows for local problems to be solved locally. This has implications with regards to latency, privacy, precision, autonomy and liability [<link linkend="B7-19">19</link>, <link linkend="B7-20">20</link>].</para>
<para>While politicians and administrators still push for electronic patient files or electronic health records there is an urgent demand to clarify the terminology. As it is unlikely that a homogeneous data base system ideal for the assessment through classic cloud strategies can be achieved in most European countries in the foreseeable future hyper-distributed models where patients will be using their own smart devices to collect and manage their own data will become the norm. Fogging, supported through mobile edge clouds might be far superior to conventional clouds in such a scenario. New hyper-distributed architectures could also protect clinical infrastructures from being over-loaded with irrelevant information while it allows for patients and informal carers to be in full control of their information. It will also protect health care providers from the risk of loss or theft of information and reduce their exposure to litigation.</para>
</section>
<section class="lev2" id="sec7.4.3" label="7.4.3" xreflabel="sec7.4.3">
<title>IoT Data Analytics</title>
<para>Big data analytics in healthcare is considered a transformational science, which has gained much attention in recent years. Doubtlessly, this can be attributed to unsustainable costs in healthcare, which calls for IT-assisted solutions. Growing adoption of patient-centred mobile digital health applications, availability of advanced cloud and connectivity options, and the rise of the wearables allowing for continuous observation of health-related events have already massively increased the amount of health-related information. Known as mobile or pervasive healthcare, remote collection of personal health and environmental data through sensor networks and mobile devices is well underway. This creates opportunity to track healthy behaviours, understand diseases at a granular level and provide true patient-centred care, and might fundamentally alter healthcare services as the industry moves to value-based models.</para>
<para>In order to exploit and fully leverage this long-term potential in the context of healthcare, advanced big data analytics are needed to enable extraction of valuable and actionable insights and establish sustainable value chains [<link linkend="B7-21">21</link>, <link linkend="B7-22">22</link>]. The use of analytics solutions in healthcare is being increasingly recognized for its value in delivering quality care and gaining competitive edge. Most importantly, tools are needed to cope with the 4Vs [<link linkend="B7-23">23</link>] of Big Data in healthcare (i.e. Volume, Velocity, Variety and Veracity) and to translate &#x201C;noisy masses of data&#x201D; into unambiguous, quality and meaningful insights that can be safely applied with confidence to practice on both patients&#x2019; and experts&#x2019; sides. In turn, the healthcare analytics market is growing at a rapid pace, and there are several good practice examples of use resulting for example in lower hospital readmissions and shorter hospital stays, and successful monitoring and prevention of chronic diseases. According to MarketsAndMarkets <link linkend="B7-24">[24]</link>, the healthcare analytics market is experiencing substantial growth at a Compound Annual Growth Rate (CAGR) of 25.2% and is expected to reach &#x0024;21,346.4 Million in 2020. However, obviously the potential comes with a price &#x2013; expectations are high and requirements are strict around security, privacy and protection of sensitive information and establishment of trust is necessary throughout the value chains. If not addressed appropriately, these might present the biggest barriers for adoption.</para>
<para>In terms of research and science, Big Data is a well-developed field when it comes to principles, algorithms, methods and tools for data collection, cleaning, description and interpretation. The presently established descriptive analytics in healthcare are giving way to predictive and prescriptive techniques to process volumes of heterogeneous messy data harvested from various sources and integrated across distributed infrastructures. Semantic science, machine learning and classification mechanisms provide for powerful interpretation and translation techniques, for example to integrate and quantify sources with insights into patients&#x2019; personal point of view, such as Twitter or self-reporting mobile apps, and translate subjective observations into objective medical terms. Other recognized techniques are also statistical analytics, fact clustering, and natural language processing. However, regardless of such advanced techniques, data analysis is frequently the application&#x2019;s bottleneck, both due to insufficient scalability of the underlying algorithms and due to the increasing volume and complexity of the source data, which is continuously challenging current approaches. This, in addition to data processing and interpretation science, opens also a whole new avenue of research related to capabilities, capacities and coping strategies when transmitting masses of healthcare data. In this respect, the rise of cloud computing has introduced dramatic shifts in how data is processed flexibly, efficiently and in a scalable way over distributed architectures and shared resources. The cloud computing market for healthcare itself is expected to reach &#x0024;5.4 billion by 2017, according to MarketsAndMarkets <link linkend="B7-25">[25]</link>, whereas the concepts of Data as a Service (DaaS), Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) are examples of already highly adopted cloud services for bioinformatics data processing. This drives further research in various areas, which is now looking for example into declarative approaches for expressing programs to achieve transparency and optimizations of large and heterogeneous cloud clusters on a global scale. Another research direction focuses on new communication technologies, such as Software Defined Networking (SDN) and Software Design Data Centres (SDDC) intended to support the massive increases in Internet bandwidth and complexities introduced by IoT, which extend beyond bandwidth requirements and device count, such as lower latency, greater determinism and processing closer to the edge of the network <link linkend="B7-26">[26]</link>. The latter, known as fog or edge computing, is a step further towards coping with bandwidth and latency constraints as well as to support scalable distributed big data analysis using context-aware localized computing.</para>
<para>In essence, fog computing capitalizes on the proliferation of smart devices with increasingly powerful processing capacities and moves some of the transactions and resources from the centre of the cloud to its edge and inventively reuses processing capacities of existing devices rather than establishing channels for cloud storage and utilization <link linkend="B7-27">[27]</link>. This aggregates selected data at a certain access point and localizes selected processes, hereby reducing the need for large bandwidth capacities on the cloud channels, processing delays and enormous data management capacities at central locations, and finally leading to improved efficiency and reduced costs. This approach is highly promising for IoT in general and including healthcare, and seems to be particularly well-suited for applications for which cloud-based approaches might be either less suitable or less feasible, for example applications that are latency-sensitive, highly distributed in geographic terms or fast-operating in near-real time, especially in Health 4.0 applications <link linkend="B7-16">[16]</link>. In addition, fog computing keeps the data at its source without sending it into global networks, which presents another crucial benefits for healthcare, namely facilitating the software-to-data paradigm, which is recognized as the approach to be taken in healthcare to better cope with the security, privacy and data protection requirements as well as to reinsure the users about where their privacy-sensitive data is located <link linkend="B7-17">[17]</link>. Current approaches suggest the use of machine learning models to support the training process taking place on a fraction of data in the cloud, followed by localized and highly optimized data processing on a resource-constrained smart device, for example smartphone or embedded device, using techniques such as decision trees, fuzzy logic or deep belief network <link linkend="B7-28">[28]</link>. These new avenues of research, hand in hand with the rising 5th generation of telecommunications networks (5G), represent promising advancements towards transformational patient-centred and quality-driven healthcare for the future.</para>
</section>
<section class="lev2" id="sec7.4.4" label="7.4.4" xreflabel="sec7.4.4">
<title>IoT Data Governance and Privacy Implications</title>
<para>Along with increasing computerization tendencies towards &#x201C;informated healthcare&#x201D;, focus shifts on novel issues such as the governance of data ownership, data access control, accountability, security, and privacy. In a nutshell, challenges arise on questions such as who has access to the collected and stored data, how is it anonymised and/or de-personalized, and how non-repudiation of data exchange, possession and creation can be assured, which is a crucial prerequisite for the integrity and trust in the data at stake.</para>
<para>Healthcare data is very specific data &#x2013; unlike data which is collected for traditional purposes of e.g. commerce, transport, logistics, or control over manufacturing processes, healthcare data is a special kind of personal data, which is subject to detailed legal regulations, policies and jural decisions. Data used in the healthcare domain is often so-called personal data, which is a legal term denoting (1) any information, which is (2) relating to (3) an identified or identifiable (4) natural person. This legal concept is deliberately kept rather broad and lacks clear and direct applicability for information systems developers. There is a however a need to separately clarify whether or not a piece of data has to be considered personal data under the respective regulations. A good and substantiated overview on what constitutes personal data with regard to the EC Directive 95/46/EC (Data Protection Directive) and Directive 2002/58/EC (E-Privacy Directive) is provided by Opinion 4/2007 of the Data Protection Working Party <link linkend="B7-29">[29]</link>, nevertheless, legal assistance might be advisable in order to determine how to treat data properly.</para>
<para>Aside from the particularities emerging from legal data, system designers and developers must take into consideration that access to the thus collected and stored data might be requested by multiple heterogeneous stakeholders. The data subject, i.e. the person, who the data is about, is entitled to know which data is collected and to receive access to the collected data, to demand its rectification, and in certain cases, its destruction. Aside from the data subject, access to the data in the healthcare domain can be requested by third parties for reasons of research, disease prevention/control, and for other purposes of governance bodies. Access to the collected personal data thus can be requested by a set of stakeholders with justified interest, which cannot be fully foreseen at design time of the information system. A further level of complexity is introduced, as the data subject is eligible to know with whom the data has been shared and who is in possession of its data, in order to demand deletion/rectification of the data. The resulting constraints imply new demands to information system designers and developers, who need to take into account complex requirements, which might unforeseeably change in the future due to interventions by law <link linkend="B7-30">[30]</link>.</para>
<para>In order to accommodate for these constraints, new principles of data governance have been introduced in the past years, most importantly the concept of fine grained access control (FGAC), and fair non-repudiable message exchange (FNR). FGAC refers to the ability of databases to govern access to core data based on access policies, which take into account the contents of the data query, the context of the request, and the identity of the requester. Unlike with traditional approaches, which categorize access permissions based on the pre-assigned role of the requester, FNR does not rely on roles, but rather on the complex context. Technologies for FNR have been described e.g., in <link linkend="B7-31">[31]</link> and <link linkend="B7-32">[32]</link> which focus on FNR technologies that utilize SQL query rewriting for governing access to the data. Standardization efforts have been conducted by OASIS, which provides the eXtensible Access Control Markup Language (XACML), while IBM introduced the Enterprise Privacy Authorization Language (EPAL). XACML plays an important role also in the European Future Internet landscape, where a dedicated FIWARE Generic Enabler module aims to provide XACML to the IoT domain.</para>
<para>Fair non-repudiation (FNR) reveals its utility when personal data between two entities must be exchanged in such way, that the exchange cannot be refuted by any of the participating parties. This way, a non-repudiable trace chain is coined, which then can be accessed by parties with a vested interest. A state-of-the-art summary on FNR has been provided in <link linkend="B7-33">[33]</link>, where an internet-based approach is described for the direct message exchange between two technical systems.</para>
<para>Combining FGAC and FNR enables the creation of sustainable technology for the governance of data in domains of healthcare, public governance, or public education, i.e. in domains, where governance of access to personal data is subject to public domain policies and influenced by the legal domain.</para>
</section>
</section>
<section class="lev1" id="sec7.5" label="7.5" xreflabel="sec7.5">
<title>IoT Analytics for Public Safety</title>
<section class="lev2" id="sec7.5.1" label="7.5.1" xreflabel="sec7.5.1">
<title>Introduction</title>
<para>Today Internet of Things (IoT) technologies are transforming our living space into intelligent Smart Environments (Smart City, Smart Home, Smart Building etc.). Smart Environments are equipped with a variety of sensors for capturing information and analysing data in a &#x2018;Smart Way&#x2019;, extracting actionable insights and adapting their behaviour to the needs of the users. With the number of connected IoT devices growing into the billions &#x2013; e.g., Cisco forecasts 50 billion devices connected by 2020 <link linkend="B7-39">[39]</link> &#x2013; IoT analytics start to become more and more popular because only raw sensor data are not sufficient to deliver the right QoS to the users. Only if we can give a meaning to IoT data and extract the relevant information on the right abstraction level, the Internet of Things vision can become reality.</para>
<section class="lev3" id="sec7.5.1.1" label="7.5.1.1" xreflabel="sec7.5.1.1">
<title>IoT analytics</title>
<para>Under the constraints of IoT system and the requirements from IoT applications, analytics are playing an important role in the information lifecycle of IoT. Ultimately, IoT analytics enables to find the relevant piece of information in the flood of IoT data, identifying the anomalies that require attention, extracting the unknown patterns and helping to predict what is going to happen next.</para>
<para>IoT analytics need to deal with the IoT system characteristics where the data are highly heterogeneous, dimensional, and unstructured, coming from various data sources even in different business domains. This creates new challenges in the analytics area where problems like data distribution, data reliability, real-time data processing and many others need to be addressed. In addition to that, IoT applications are also expecting a certain quality in the provided data, ranging from insightful statistic results and meaningful patterns for making planning and optimization to real-time predictions and suggestions for making timely or even automated decisions.</para>
<para>Smart cities are a good example of large-scale IoT systems where IoT analytics is highly demanded with great potential to make benefits. For example, there are about 12,000 sensors deployed in the city of Santander <link linkend="B7-34">[34]</link> that provides information about environmental conditions, parking availability, traffic density, weather and irrigation information. Therefore, in today&#x2019;s Smart Cities, there is already a large quantity of information, but by applying more advanced IoT analytics, more relevant information can be extracted.</para>
</section>
<section class="lev3" id="sec7.5.1.2" label="7.5.1.2" xreflabel="sec7.5.1.2">
<title>IoT analytics for public safety</title>
<para>In following paragraphs, we explain the challenges of IoT analytics using Public Safety as the application domain, which is one of the most important aspects of a Smart City. Based on the results delivered by advanced IoT data analytics, we cannot only make city planning and operation smarter, but we can also improve and ensure the safety of citizens <link linkend="B7-35">[35]</link>. As the sensors deployed in Smart Cities monitor the city pulse and report various situations all around our cities in an 24 &#x00D7; 7 basis, potential safety problems can be identified early and be localized better, therefore effective actions can be taken in time to improve the safety and well-being of the citizens. Many studies show that, even with cheap but widely deployed sensors, important safety issues can be identified early and swiftly addressed, e.g. the formation of a crowd of people, the breakout of a fire <link linkend="B7-40">[40]</link>, a burst pipe <link linkend="B7-41">[41]</link> or a blocked street.</para>
<para>One of the challenges for IoT analytics to enable Public Safety is to be able to sense and react to critical situations and mine raw sensor data in real-time. This is mainly because the raw sensor data are very noisy, heterogeneous, and high dimensional, which introduce many complexity and computation difficulties to extract high quality results in real-time. To address this challenge, the following technical problems have been taken into account in our IoT analytics solutions for Public Safety.</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para><emphasis role="strong"><emphasis>Establishing dynamic communication channels</emphasis></emphasis>: in a typical IoT system like Smart Cities, IoT data flow from sensors to various analytics applications and then actionable results are derived. Automated actions are requested from deployed actuators. The first problem to be solved for IoT analytics is to establish communication channels among sensors, analytics applications, and actuators, in a dynamic, flexible, and scalable way, so that information flow between different components can be easily ensured.</para></listitem>
<listitem><para><emphasis role="strong"><emphasis>Dealing with big data in real time</emphasis></emphasis>: Real-time is a very important aspect regarding Public Safety, because critical situations need to be detected immediately or to be predicted early enough. In this case, authorities will have enough time to take
actions to avoid potential safety problems. For example, an algorithm of Crowd Detection must be fast enough to identify an emerging crowd situation and then trigger an alarm to inform authorities. To reduce the latency from generating raw data to taking actions, the following issues must be considered by IoT analytics: 1) how to control the frequency of data generation; 2) where to do data pre-processing; 3) how to design algorithms for parallelized real-time data stream processing; 4) how to orchestrate resources in the cloud and at the edge to do scalable data processing.</para></listitem>
<listitem><para><emphasis role="strong"><emphasis>Achieving actionable insights with good accuracy</emphasis></emphasis>: results derived from IoT data must be actionable, meaning that the results are understandable, accurate and timely enough to allow authorities to make effective actions. If the results of Crowd Detection come one hour after the crowd event happens or most of the detected crowds are false positive, this type of analytics is not usable for enhancing the Public Safety. Therefore, efficient and advanced machine learning or prediction algorithms must be used by IoT analytics to provide real-time feedback to the authorities.</para></listitem>
<listitem><para><emphasis role="strong"><emphasis>Preserving user privacy</emphasis></emphasis>: as data are collected from different sources, one obvious issue is the user privacy. Privacy protection and governance must be seriously taken into account from the start. This will affect the choice of our solutions.</para></listitem>
</itemizedlist>
<para>Of course, data and system security is another technical issue for IoT analytics, but it is not regarded as a key focuses of this paper. In the remainder of this paper, two specific solutions are introduced to explain how we improved Public Safety via IoT analytics for outdoor and indoor use cases.</para>
</section>
</section>
<section class="lev2" id="sec7.5.2" label="7.5.2" xreflabel="sec7.5.2">
<title>Crowd Detection Solution for a Safer City</title>
<para>Efficient emergency systems require a number of different technologies to monitor and detect dangerous events in real-time. Several problems arise in the design, implementation and development of such systems. One of the main problems that affect such systems is human behaviour in critical situations. Being able to detect dangerous situations and act in real-time is a need for enhancing people&#x2019;s safety but is not an easy task due to the variety of the human behaviours. In this case, IoT analytics can help to fuse and mine sensor data from various installations to produce actionable insights. One example of IoT analytics&#x2019; solution is the privacy preserving Crowd Detection component from NEC.</para>
<para>Concretely, the Crowd Detection core functionality is on understanding the dynamics of crowd. This requires in-depth understanding of how humans move in an indoor space over time. Most state of the art approaches are using video based crowd analysis. They face deployability issues on account of privacy regulations and the public&#x2019;s perception of surveillance. Our approach is based on privacy preserving sensors, guaranteeing that no collected information can be used to identify an individual.</para>
<para>In addition to the citizens&#x2019; safety, our crowd analysis can provide relevant information for the design of public spaces, e.g., making shopping malls more comfortable for customers, enhancing their safety, or coordinating evacuation plans based on the real-time crowd behaviour. The Crowd Detection solution can also be used for automated detection of anomalies and alarms and is a prerequisite for assisting people during crowd emergencies.</para>
<section class="lev3" id="sec7.5.2.1" label="7.5.2.1" xreflabel="sec7.5.2.1">
<title>The privacy preserving approach</title>
<para>The goal of our Crowd Detection solution is to provide real-time estimation regarding the crowd density in the target area. We focused on a solution for estimating crowd of people in an indoor scenario, taking into account privacy related issues and deployment costs. Using the sensor fusion approach, we are able to estimate the crowd density by sampling the area with carefully positioned sensors in the indoor environment, which will be used to measure the human activities and correlate them to the density of the crowd present on the scene. In addition, using more traditional sensors such as sound, pressure or CO<subscript>2</subscript> sensors, inexpensive and privacy preserving infrared proximity sensors is a core part of our approach.</para>
<para>Our solution has the advantage that it estimates the crowd levels with low cost sensors and without infringing any individual&#x2019;s privacy rights. In fact, as Chan et al. describe in <link linkend="B7-36">[36]</link>, there are various Crowd Detection solutions based on computer vision on the market, however privacy is a well-known problem for computer vision technologies for two reasons: first, the perception of compromised privacy is particularly strong for technologies which record the people&#x2019;s actions; second, current vision-based monitoring is usually based on object tracking or image primitives, both of which imply the identification of the individuals.</para>
<para>The NEC Crowd Detection solution has been deployed and tested for a trial in a Singapore shopping mall, where our system has been running for a period of two months and proving the feasibility of such solution. During the trial 23 sensors were deployed using a similar sensor installation plan as described in <link linkend="F7.7">Figure <xref linkend="F7.7" remap="7.7"/></link> for estimating the crowd levels.</para>
<fig id="F7.7" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 7.7</label>
<caption><para>Example of sensor installation in a shopping mall.</para></caption>
<graphic xlink:href="graphics/fig7_7.jpg"/>
</fig>
</section>
</section>
<section class="lev2" id="sec7.5.3" label="7.5.3" xreflabel="sec7.5.3">
<title>Mobile Operation Centres (MOC)</title>
<para>The Crowd Detection solution shows how IoT can be used to enhance people safety for indoor environments. However, for big public events like the Football World Cup or the Olympics, IoT analytics is also required to preserve people safety. During such events, many agencies are collaborating to ensure the people safety. As more and more sensors are deployed in urban area by different city service departments like police, fire department, homeland security etc., it is extremely important to share sensor information and derived situations across different agencies in order to improve the safety of such big events.</para>
<para>Typically, a Central Control Centre is designed to deal with normal tasks but has limited amount of resource to handle big events. To overcome such a problem, the capabilities of the control centres can be enhanced by deploying mobile operation centres (MOC), which can be easily setup in a fixed location. Traditionally, MOCs are equipped with voice communication and video cameras to capture critical situations. With the help of the IoT systems, we are able to capture more information about the real world using sensors that have been built into wearables devices, attached to the normal tools of a law enforcement officers, or built into devices like cars, riot control barriers, entrance gates, etc. Still, human intelligence is needed to understand the situations and react to them even with the assistance of derived information from IoT analytics. In this context, ensuring dynamic information flow between the physical world and different authorities is important for enhancing the people&#x2019;s safety.</para>
<para>NEC developed a Mobile Operational Centre (MOC) solution for inter-agency collaboration in a Smart City, which enables the dynamic data exchange of real-time sensor data streams between different agencies. The MOC is realized combining a dynamic and federated IoT system with an IoT discovery component <link linkend="B7-38">[38]</link>, which is able to handle presence registration of resources with their locations, types etc., and an IoT broker <link linkend="B7-37">[37]</link>, which is able to fetch data by querying/subscribing to the IoT discovery component and requesting data from the underlying data sources. In such system IoT analytics play a role of mining and visualizing the sensor data in real-time to be used within a dashboard shown in <link linkend="F7.8">Figure <xref linkend="F7.8" remap="7.8"/></link>.</para>
<fig id="F7.8" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 7.8</label>
<caption><para>Mobile Operation Center Dashboard.</para></caption>
<graphic xlink:href="graphics/fig7_8.jpg"/>
</fig>
</section>
<section class="lev2" id="sec7.5.4" label="7.5.4" xreflabel="sec7.5.4">
<title>Conclusions and Outlook</title>
<para>As sensors and actuators are becoming cheap and being widely deployed in modern cities like Santander in Spain and Chicago in US, the Internet of Things is now providing us great potential to improve our society in terms of safety, security, efficiency and equality by leveraging collected data. Our research goal in IoT analytics is turn collected data into actionable insights to improve and ensure Public Safety in various business domains. For Public Safety, the main challenge to be addressed is to sense critical situations and act on them in real-time. This paper introduced the major technical issues that we are trying to solve in the IoT analytics area, in terms of privacy-preserving, sensor data fusion, anomaly detection, and dynamic data exchange.</para>
<para>Two concrete solutions have been presented in detail to explain how we improve Public Safety using IoT analytics techniques at different levels. Regarding the Crowd Detection system, additional advantages compared to the existing solutions are: the approach is privacy preserving, the amount of sensors required scales better with the area to be monitored and the cost of the individual sensors and computing nodes is considerably lower than the hardware commonly used in the state-of-the art. In addition to that, our solution estimate crowd levels in real-time and this is also an advantage for trigger quick actions and preserve the people safety without compromise their privacy.</para>
<para>The second is the Mobile Operational Centre solution, enabling dynamic data exchange of real-time sensor data streams between different agencies. This can be used by city authorities like police offices to quickly enable inter-agency collaboration. Both solutions have been deployed and tested in Singapore as part of the Safer City solution.</para>
<para>As future work, we intend to complement the current approaches by addressing additional challenges in the IoT analytics for Public Safety. In the case of Crowd Detection, we are exploring how reinforcement learning can improve the current solution in real-time without losing in system performance or how to distinguish the crowd estimation from other type of emergency without a human interaction. In addition to that, we are extending the Crowd Detection solution to outdoor areas exploring new techniques like Bluetooth and Wi-Fi monitoring.</para>
</section>
</section>
<section class="lev1" id="sec7.6" label="7.6" xreflabel="sec7.6">
<title>Towards a Positive Approach in Dealing with Privacy in IoT Data Analytics</title>
<section class="lev2" id="sec7.6.1" label="7.6.1" xreflabel="sec7.6.1">
<title>Introduction</title>
<para>Businesses are looking for guidance on how to deal with big data in a responsible/legal way as they see the opportunities offered by big data, big data generation, collection, and analytics. IoT is a major driver in this, as &#x201C;connected things&#x201D; will generated endless streams of data that will be captured and used. According to the European Data Protection Supervisor Peter Hustinx (December 2014): &#x201C;If big data operators want to be successful, they should invest in good privacy and data protection, preferably at the design stages of their projects&#x201D;.</para>
<para>While we want to benefit from the value that IoT and its data have to offer, the key outcome should be &#x201C;trust&#x201D; by citizens and consumers. This requires that privacy and data protection are taken into account in every step of the development cycle of IoT technologies and services.</para>
</section>
<section class="lev2" id="sec7.6.2" label="7.6.2" xreflabel="sec7.6.2">
<title>IoT and Privacy</title>
<para>It is clear: in terms of pervasiveness, IoT has already contributed to the emergence of a society in which almost everything is or can be monitored, well beyond the des	criptions as used by George Orwell in his book &#x201C;1984&#x201D; <link linkend="B7-42">[42]</link>. The novel is set in Airstrip One (formerly known as Great Britain), a province of the super state Oceania in a world of perpetual war, omnipresent government surveillance, and public manipulation, dictated by a political system euphemistically named English Socialism (or Ingsoc in the government&#x2019;s invented language, Newspeak) under the control of a privileged Inner Party elite that persecutes all individualism and independent thinking as &#x201C;thought crime&#x201D;. &#x201C;Big Brother is watching you&#x201D;, and trust in society and freedom is sketched as very low (<link linkend="F7.9">Figure <xref linkend="F7.9" remap="7.9"/></link>). This book had a great influence of the thinking of a generation that grew up after World War 2 and reflects some of the thinking that is fundamental in the discussions about privacy.</para>
<para>Now: whereas the levels of monitoring are very high and well beyond the imagination of Orwell in terms of what technically is possible, in Europe trust in government and society has remained at a relatively high level. When Snowden revealed, starting in June 2013, some evidence reflecting the pervasiveness of monitoring through numerous global surveillance programs, many of them run by the NSA and the Five Eyes<footnote id="fn7_1" label="1"><para>&#x201C;Five Eyes&#x201D;, often abbreviated as &#x201C;FVEY&#x201D;, refer to an intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom, and the United States that was formed. These countries are bound by the multilateral Agreement, a treaty for joint cooperation in signals intelligence.</para></footnote> with the cooperation of telecommunication companies and European governments, this resulted in widely expressed concern and even outrage by the general public, civil society and politicians.</para>
<fig id="F7.9" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 7.9</label>
<caption><para>1984, a society in which you can trust nobody &#x2013; and &#x201C;Big brother&#x201D; sees it all, and a reality of pervasive monitoring by security forces in 2013 <link linkend="B7-43">[43]</link>.</para></caption>
<graphic xlink:href="graphics/fig7_9.jpg"/>
</fig>
<para>This led to a global discussion making clear that monitoring is a necessity, yet should not take place at all costs, and a balance is yet to be found. This results in a discussion that will continue to stretch over the decades to come.</para>
</section>
<section class="lev2" id="sec7.6.3" label="7.6.3" xreflabel="sec7.6.3">
<title>European Way Forward</title>
<para>Within this setting, the discussion in Europe about privacy and data protection is finding its way, moving from a Directive on Data protection and privacy towards an anticipated General Data Protection Regulation. The reform aims to strengthen individual rights and tackle the challenges of globalisation and new technologies. It furthermore attempts to &#x201C;simplify&#x201D; compliance as the Regulation would become directly applicable law in all EU member states, whereas the Directive was implemented through national Privacy Acts in similar but not always identical ways.</para>
<para>When the original Data Protection Directive was developed and agreed in 1995, the Internet was by far not as important as today, and nobody had even mentioned the term &#x201C;Internet of Things&#x201D; yet. The current reform has been under way since 2011 and culminated in a Proposal to Council and Parliament by the European Commission on 25 January 2012. This proposal was approved by the European Parliament in March 2014, and, assuming that a compromise can be reached in the course of this year, is expected to come into force in 2017. It should be noted however that significant differences still exist between the Commission, Council and Parliament, so that a consensus text in 2015 is not yet a certainty.</para>
</section>
<section class="lev2" id="sec7.6.4" label="7.6.4" xreflabel="sec7.6.4">
<title>Challenges Ahead</title>
<para>Yet, when the Regulation was first being discussed in 2011, &#x201C;big data&#x201D; was not yet a widely recognised issue. Today, we know that big data, and big data analytics, fundamentally challenge the concept of &#x201C;personal data&#x201D;. Big data analytics allows seemingly anonymous data to be linked together and correlated in order to allow individual persons to be identified. A recent Opinion from the Article 29 Working Party &#x2013; Europe&#x2019;s pre-eminent data protection body &#x2013; recognises the value of IoT, but also the potential intrusions it can generate to privacy. In this Opinion, statements are made that alarmed businesses around the world, as what is suggested may put a lock on many current developments in the field.</para>
<para>Legal uncertainty remains on many issues, even if it is clear that current law also applies to IoT applications used to collect or analyse personal data. Business are looking for guidance on this, as big data is a subject of interest to many, and companies around the world are looking into the opportunities offered by big data, big data generation, collection, and analytics.</para>
<para>As already noted above, the European Data Protection Supervisor Peter Hustinx has stressed the importance of investment in solid privacy and data protection, and recognizes the role of &#x201C;soft law&#x201D; on this point. These investments can drive the innovation, development and deployment of IoT, and are a pre-condition for European (co-)sponsored research.</para>
</section>
<section class="lev2" id="sec7.6.5" label="7.6.5" xreflabel="sec7.6.5">
<title>Way Forward</title>
<para>A way forward could include the habit/obligation of a Privacy Impact Assessment in the design stage of new IoT products and services, and conscious implementation of Privacy Enhancing Technologies and Methods from the outset when thinking of which (and how) data to collect, store, and share. This approach would ensure that new ideas are not hamstrung by regulation, but rather that a culture of privacy awareness and advance consideration is promoted: the impact of any new IoT solution on individuals should be considered prior to deployment, rather than as an issue that may require fixing afterwards.</para>
<para>We need IoT to deal with certain societal challenges. As IoT in combination with big data analytics brings a paradigm shift in ways that data can be related to people, it will take a number of years to come to a better understanding on how to deal with this.</para>
<para>Legislation related to consumer protection, ranging from product safety, to product reliability, product information reliability and personal data protection, tends to be static and oblivious to rapid technology shifts. We need to ensure that the application of the law reflects an understanding of the sensitivity of data in a big data and big data analytics context.</para>
<para>From an innovation and deployment perspective, it will be important to design products and services in such a way that they can continue to serve (local?) society even if values and choices are different in different markets, and/or change over time.</para>
<para>This requires transparency (what data are collected, in what way, how are they stored and unlocked, and who has access to it), accountability (if someone is not using the data in a correct, authorized way &#x2013; who is accountable for taking action), and choice (can I adapt the settings related to IoT in my environment to my specific legal and cultural preferences?). This goes beyond mere regulatory actions, and requires greater awareness of where sensitive issues may emerge, and the implementation of robust and flexible technological solutions that can be tailored to reflect these changes in society.</para>
</section>
<section class="lev2" id="sec7.6.6" label="7.6.6" xreflabel="sec7.6.6">
<title>Conclusions and Outlook</title>
<para>It is highly important to ensure that our European privacy approach does not prevent the use of data, but rather that it prevents abuse of data &#x2013; simply because:
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>Increasingly almost all data will be relatable to persons, from the outset, and we need to find a way to deal with that responsibly;</para></listitem>
<listitem><para>We cannot afford not using data at large scale, both from societal perspective, and as there is clear commercial (thus economic) value;</para></listitem>
</itemizedlist></para>
<para>If Europe wants to benefit from the emerging opportunities arising with IoT &#x2013; and it is the opinion of the authors that this is a boat Europe cannot afford to miss &#x2013; we will need to use data in a responsible way (both collecting, storage and sharing &#x2013; and actively fight abuse).</para>
<para>&#x201C;Going ethical&#x201D; when building IoT products and services can bring us new growth and innovation and helps us to create a world we want our children to live in, respecting European values, including privacy but also and perhaps more importantly transparency and choice. The law cannot do it all for us. It is our own standards and ethics that will transform the world. Hence, legislation enabling, supporting and promoting these priorities is required.</para>
<para><emphasis role="strong">Ethical behavior</emphasis> is a cultural thing: it needs to be embraced, lived, in every aspect of the business. It needs to be talked about and to be an explicit value. Ethics is a living thing and can only thrive when welcomed and constantly encouraged.</para>
</section>
</section>
<section class="lev2" id="sec7.6.6">
<title>Acknowledgment</title>
<para>Part of the work described in <link linkend="sec7.3">Section <xref linkend="sec7.3" remap="7.3"/></link> <emphasis>Cloud-Based IoT Big Data Platform</emphasis> has been carried out in the scope of the Horizon 2020 iKaaS project (iKaaS.com) (Grant Agreement number 643262).</para>
</section>
<bibliography class="biblio" id="bib05">
<title>Bibliography</title>
<bibliomixed id="B7-1">[1] <author><firstname>P.</firstname> <surname>Barnaghi</surname></author>, <author><firstname>A.</firstname> <surname>Sheth</surname></author>, and <author><firstname>C.</firstname> <surname>Henson</surname></author>. &#x201C;<article-title>From Data to Actionable Knowledge: Big Data Challenges in the Web of Things</article-title>&#x201D;, <source>IEEE Intelligent Systems</source>, <volumenum>vol. 28</volumenum>, <issue>no. 6</issue>, pp. <fpage>6</fpage>&#x2013;<lpage>11</lpage>, <month>Nov/Dec</month>. <year>2013</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=From+Data+to+Actionable+Knowledge%3A+Big+Data+Challenges+in+the+Web+of+Things+IEEE+Intelligent+Systems+2013+6+6-11" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B7-2">[2] <author><firstname>J.</firstname> <surname>Gama</surname></author>, <author><firstname>I.</firstname> <surname>Zliobaite</surname></author>, <author><firstname>A.</firstname> <surname>Bifet</surname></author>, <author><firstname>M.</firstname> <surname>Pechenizkiy</surname></author>, <author><firstname>A.</firstname> <surname>Bouchachia</surname></author>. &#x201C;<article-title>A survey on concept drift adaptation</article-title>&#x201D;, <source>ACM Computer Surveys</source> <volumenum>46</volumenum>, <issue>4</issue>, article 44, <year>2014</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=A+survey+on+concept+drift+adaptation+ACM+Computer+Surveys+2014+4" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B7-3">[3] <author><firstname>P.</firstname> <surname>Barnaghi</surname></author> et al. <author><firstname>I.</firstname> <surname>Borthwick.</surname></author> (editor), &#x201C;<article-title>Digital Technology Adoption in the Smart Built Environment</article-title>&#x201D;, <source>IET Sector Technical Briefing, The Institution of Engineering and Technology (IET)</source>, Technical report, <month>March</month> <year>2015</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Digital+Technology+Adoption+in+the+Smart+Built+Environment+IET+Sector+Technical+Briefing%2C+The+Institution+of+Engineering+and+Technology+%28IET%29+2015" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B7-4">[4] <author><firstname>H.</firstname> <surname>Karl</surname></author> and <author><firstname>A.</firstname> <surname>Willig</surname></author>. &#x201C;<article-title>Protocols and Architectures for Wireless Sensor Networks</article-title>&#x201D;, <publisher-name>Wiley-Blackwell</publisher-name>, <year>2007</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Protocols+and+Architectures+for+Wireless+Sensor+Networks+2007" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B7-5">[5] <author><firstname>S.</firstname> <surname>Nastic</surname></author>, <author><firstname>S.</firstname> <surname>Sehic</surname></author>, <author><firstname>H.</firstname> <surname>L</surname></author>. Truong, S. Dustdar. &#x201C;<article-title>Provisioning Software-defined IoT Cloud Systems</article-title>&#x201D;, <source>The 2nd Int. Conf. on Future Internet of Things and Cloud (FiCloud-2014)</source>, <year>2014</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Provisioning+Software-defined+IoT+Cloud+Systems+The+2nd+Int%2E+Conf%2E+on+Future+Internet+of+Things+and+Cloud+%28FiCloud-2014%29+2014" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B7-6">[6] <author><firstname>M.</firstname> <surname>Compton</surname></author> et al, &#x201C;<article-title>The SSN ontology of the W3C semantic sensor network incubator group</article-title>&#x201D;, <source>Web Semantics: Science, Services and Agents on the World Wide Web</source>, <volumenum>vol. 17</volumenum>, pp. <fpage>25</fpage>&#x2013;<lpage>32</lpage>, <year>2012</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=The+SSN+ontology+of+the+W3C+semantic+sensor+network+incubator+group+Web+Semantics%3A+Science%2C+Services+and+Agents+on+the+World+Wide+Web+2012+25-32" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B7-7">[7] <author><firstname>J.</firstname> <surname>Lin</surname></author>, <author><firstname>E.</firstname> <surname>Keogh</surname></author>, <author><firstname>S.</firstname> <surname>Lonardi</surname></author>. et al., &#x201C;<article-title>A Symbolic Representation of Time Series, with Implications for Streaming Algorithms</article-title>&#x201D;, <source>Proceedings of the 8th ACM SIGMOD workshop on Research issues in data mining and knowledge</source>, <year>2003</year>, pp. <fpage>2</fpage>&#x2013;<lpage>11</lpage>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=A+Symbolic+Representation+of+Time+Series%2C+with+Implications+for+Streaming+Algorithms+Proceedings+of+the+8th+ACM+SIGMOD+workshop+on+Research+issues+in+data+mining+and+knowledge+2003+2-11" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B7-8">[8] <author><firstname>Y.</firstname> <surname>Bengio</surname></author>, <author><firstname>A.</firstname> <surname>Courville</surname></author>, <author><firstname>P.</firstname> <surname>Vincent</surname></author>. &#x201C;<article-title>Representation Learning: A Review and New Perspectives</article-title>&#x201D;, <source>IEEE Trans. PAMI, special issue Learning Deep Architectures</source>, <year>2013</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Representation+Learning%3A+A+Review+and+New+Perspectives+IEEE+Trans%2E+PAMI%2C+special+issue+Learning+Deep+Architectures+2013" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B7-9">[9] <author><firstname>P.</firstname> <surname>Barnaghi</surname></author>, <author><firstname>A.</firstname> <surname>Sheth</surname></author>, <author><firstname>A.</firstname> <surname>Singh</surname></author>, <author><firstname>M.</firstname> <surname>Hauswirth</surname></author>. &#x201C;<article-title>Physical-Cyber-Social Computing: Looking Back, Looking Forward</article-title>&#x201D;, Guest Editors Introduction, <source>IEEE Internet Computing</source>, <month>May/June</month>,<year> 2015</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Physical-Cyber-Social+Computing%3A+Looking+Back%2C+Looking+Forward+IEEE+Internet+Computing+2015" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B7-10">[10] Cisco, &#x201C;<article-title>Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update <year>2014&#x2013;2019</year> White Paper,</article-title>&#x201D; <day>03</day>-<month>Feb</month>-<year>-2015</year>. [Online]. Available:<ulink url="http://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/white_paper_c11-520862.html.">http://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/white_paper_c11-520862.html.</ulink> [Accessed: <day>23</day>-<month>May</month>-<year>2015</year>]. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Cisco+Visual+Networking+Index%3A+Global+Mobile+Data+Traffic+Forecast+Update+2014-2019+White+Paper%2C+2014&#x2013;2019" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B7-11">[11] HM Government, &#x201C;<article-title>Personalised health and care 2020: a framework for action,</article-title>&#x201D; <day>13</day>-<month>Nov</month>-<year>2014</year>. [Online]. Available: <ulink url="https://www.gov.uk/government/publications/personalised-health-and-care-2020/using-data-and-technology-to-transform-outcomes-for-patients-and-citizens">https://www.gov.uk/government/publications/personalised-health-and-care-2020/using-data-and-technology-to-transform-outcomes-for-patients-and-citizens</ulink>. [Accessed: <day>23</day>-<month>May</month>-<year>2015</year>]. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Personalised+health+and+care+2020%3A+a+framework+for+action%2C+2014" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B7-12">[12] <author><firstname>A.</firstname> <surname>Bassi</surname></author>, <author><firstname>M.</firstname> <surname>Bauer</surname></author>, <author><firstname>M.</firstname> <surname>Fiedler</surname></author>, <author><firstname>T.</firstname> <surname>Kramp</surname></author>, <author><firstname>R.</firstname> <surname>van Kranenburg</surname></author>, <author><firstname>S.</firstname> <surname>Lange</surname></author>, and <author><firstname>S.</firstname> <surname>Meissner</surname></author>, <role>Eds.</role>, <article-title>Enabling things to talk: designing IoT solutions with the IoT architectural reference model</article-title>; [Iot-A, Internet of things &#x2013; architecture]. <publisher-loc>Heidelberg</publisher-loc>: <publisher-name>Springer</publisher-name>, <year>2013</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Enabling+things+to+talk%3A+designing+IoT+solutions+with+the+IoT+architectural+reference+model+2013" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B7-13">[13] <author><firstname>H.R.</firstname><surname>Schindler</surname></author>, <author><firstname> J. </firstname> <surname>Cave</surname></author>, <author><firstname>N.</firstname> <surname>Robinson,</surname></author>, <author><firstname> V.</firstname> <surname>Horvath</surname></author>, <author><firstname>P.</firstname> <surname>Hackett</surname></author>, <author><firstname>S.</firstname> <surname>Gunashekar</surname></author>, <author><firstname>M.</firstname> <surname>Botterman</surname></author>, <author><firstname>S.</firstname> <surname>Forge</surname></author>, and <author><firstname>H.</firstname> <surname>Graux</surname></author>, <article-title>Europe&#x2019;s policy options for a dynamic and trustworthy development of the Internet of Things</article-title>: SMART 2012/0053. <publisher-loc>Santa Monica, CA</publisher-loc>: <publisher-name>RAND Corporation</publisher-name>, <year>2013</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Europe%27s+policy+options+for+a+dynamic+and+trustworthy+development+of+the+Internet+of+Things+2013" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B7-14">[14] <publisher-loc>EC: European Political Strategy Centre</publisher-loc>, &#x201C;<article-title>Ethics, science and technology,</article-title>&#x201D; <day>25</day>-<month>Mar</month>-<year>2015</year>. [Online]. Available: <ulink url="http://ec.europa.eu/epsc/ege_en.htm.">http://ec.europa.eu/epsc/ege_en.htm.</ulink> [Accessed: <day>23</day>-<month>May</month>-<year>2015</year>]. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Ethics%2C+science+and+technology%2C+2015" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B7-15">[15] <author><firstname>E.</firstname> <surname>Niehaus</surname></author>, <author><firstname>M.</firstname> <surname>Herselman</surname></author>, and <author><firstname>A.N.</firstname> <surname>Babu</surname></author>. , &#x201C;<article-title>Principles of Neuroempiricism and generalization of network topology for health service delivery,</article-title>&#x201D; Indian J. Med. Inform., <volumenum>vol. 4</volumenum>, <issue>no. 1</issue>, <year>2009</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Principles+of+Neuroempiricism+and+generalization+of+network+topology+for+health+service+delivery%2C+2009+1" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B7-16">[16] <author><firstname>O.</firstname> <surname>Ferrer-Roca</surname></author>,<author><firstname> R.</firstname> <surname>Tous</surname></author>, and <author><firstname>R. </firstname><surname>Milito</surname></author>, &#x201C;<article-title>Big and Small Data: The Fog,</article-title>&#x201D; <year>2014</year>, pp. <fpage>260</fpage>&#x2013;<lpage>261</lpage>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Big+and+Small+Data%3A+The+Fog%2C+2014+260-261" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B7-17">[17] <author><firstname>C.</firstname> <surname>Thuemmler</surname></author>, <author><firstname>J.</firstname> <surname>Mueller</surname></author>, <author><firstname>S.</firstname> <surname>Covaci</surname></author>, <author><firstname>T.</firstname> <surname>Magedanz</surname></author>, <author><firstname>S.</firstname> <surname>de Panfilis</surname></author>, <author><firstname>T.</firstname> <surname>Jell</surname></author>, and <author><firstname>A.</firstname> <surname>Gavras</surname></author>, &#x201C;<article-title>Applying the Software-to-Data Paradigm in Next Generation E-Health Hybrid Clouds,</article-title>&#x201D; in Proceedings of the <year>2013</year> 10th International Conference on Information Technology: <publisher-loc>New Generations, Washington, DC, USA</publisher-loc>, <year>2013</year>, pp. <fpage>459</fpage>&#x2013;<lpage>463</lpage>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Applying+the+Software-to-Data+Paradigm+in+Next+Generation+E-Health+Hybrid+Clouds%2C+2013+459-463" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B7-18">[18] <author><firstname>S.</firstname> <surname>Nunna</surname></author>, <author><firstname>A.</firstname> <surname>Kousarida</surname></author>, <author><firstname>M.</firstname> <surname>Ibrahim</surname></author>, <author><firstname>M.</firstname> <surname>Dillinger</surname></author>, <author><firstname>C.</firstname> <surname>Thuemmler</surname></author>, <author><firstname>H.</firstname> <surname>Feussner</surname></author>, and <author><firstname>A.</firstname> <surname>Schneider</surname></author>, &#x201C;<article-title>Enabling Real-Time Context-Aware Collaboration through 5G and Mobile Edge Computing,</article-title>&#x201D; in Proceedings of Information Technology New Generations <year>2015, 2015</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Enabling+Real-Time+Context-Aware+Collaboration+through+5G+and+Mobile+Edge+Computing%2C+2015" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B7-19">[19] <author><firstname>R.</firstname> <surname>Vargheese</surname></author> and <author><firstname>H.</firstname> <surname>Dahir</surname></author>, &#x201C;<article-title>An IoT/IoE enabled architecture framework for precision on shelf availability: Enhancing proactive shopper experience,</article-title>&#x201D; <year>2014</year>, pp. <fpage>21</fpage>&#x2013;<lpage>26</lpage>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=An+IoT%2FIoE+enabled+architecture+framework+for+precision+on+shelf+availability%3A+Enhancing+proactive+shopper+experience%2C+2014+21-26" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B7-20">[20] <author><firstname>N.</firstname> <surname>Khan</surname></author>, &#x201C;<article-title>Fog Computing: Better Solutions for IT,</article-title>&#x201D; Int. J. Eng. Tech. Res., <volumenum>vol. 3</volumenum>, <issue>no. 2</issue>, <month>Feb</month>. <year>2015</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Fog+Computing%3A+Better+Solutions+for+IT%2C+2015+2" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B7-21">[21] <author><firstname>R.</firstname> <surname>Bond</surname></author>, &#x201C;<article-title>Big Data and Healthcare,</article-title>&#x201D; Charles Russell Speachlys. [Online]. Available: <ulink url="http://www.charlesrussellspeechlys.com/updates/publications/commercial-new/big-data-and-healthcare/?UTM_SOURCE=MONDAQ&#x0026;UTM_MEDIUM=SYNDICATION&#x0026;UTM_CAMPAIGN=VIEW-ORIGINAL.">http://www.charlesrussellspeechlys.com/updates/publications/commercial-new/big-data-and-healthcare/?UTM_SOURCE=MONDAQ&#x0026;UTM_MEDIUM=SYNDICATION&#x0026;UTM_CAMPAIGN=VIEW-ORIGINAL.</ulink> [Accessed: <day>23</day>-<month>May</month>-<year>2015</year>]. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Big+Data+and+Healthcare%2C+2015" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B7-22">[22] Deloitte, &#x201C;<article-title>Big data revolution: six trends unlocking the power of health care analytics,</article-title>&#x201D; A view from the Center, <day>10</day>-<month>Feb</month>-<year>2014</year>. [Online]. Available: <ulink url="http://blogs.deloitte.com/centerforhealthsolutions/2014/02/big-data-revolution-six-trends-unlocking-the-power-of-health-care-analytics.html#.VWB75HuJgb4">http://blogs.deloitte.com/centerforhealthsolutions/2014/02/big-data-revolution-six-trends-unlocking-the-power-of-health-care-analytics.html#.VWB75HuJgb4</ulink>. [Accessed: <day>23</day>-<month>May</month>-<year>2015</year>]. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Big+data+revolution%3A+six+trends+unlocking+the+power+of+health+care+analytics%2C+2014" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B7-23">[23] <author><firstname>C.</firstname> <surname>Tan</surname></author>, <author><firstname>L.</firstname> <surname>Sun</surname></author>, and <author><firstname>K.</firstname> <surname>Liu</surname></author>, &#x201C;<article-title>Big Data Architecture for Pervasive Healthcare: A Literature Review,</article-title>&#x201D; presented at the 23rd European Conference on Information Systems, <publisher-loc>Muenster</publisher-loc>, <year>2015</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Big+Data+Architecture+for+Pervasive+Healthcare%3A+A+Literature+Review%2C+2015" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B7-24">[24] MarketsAndMarkets, &#x201C;<article-title>Healthcare Mobility Solutions Market by Products &#x0026; Services (Mobile Devices, Mobile Apps, Enterprise Platforms), Application (Patient Care, Operations, Workforce Management), End Users (Payers, Providers, Patients) &#x2013; Global Forecast to 2020,</article-title>&#x201D; <month>May</month> <year>2015</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Healthcare+Mobility+Solutions+Market+by+Products+%26+Services+%28Mobile+Devices%2C+Mobile+Apps%2C+Enterprise+Platforms%29%2C+Application+%28Patient+Care%2C+Operations%2C+Workforce+Management%29%2C+End+Users+%28Payers%2C+Providers%2C+Patients%29+-+Global+Forecast+to+2020%2C+2015" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B7-25">[25] MarketsAndMarkets, &#x201C;<article-title>Global Healthcare Cloud Computing Market worth $5.4 Billion by 2017.</article-title>&#x201D; [Online]. Available: <ulink url="http://www.marketsandmarkets.com/PressReleases/cloud-computing-healthcare.asp">http://www.marketsandmarkets.com/PressReleases/cloud-computing-healthcare.asp</ulink> <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Global+Healthcare+Cloud+Computing+Market+worth+%245%2E4+Billion+by+2017%2E+2015" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B7-26">[26] <author><firstname>F.</firstname> <surname>Fernandez</surname></author> and <author><firstname>G.C.</firstname> <surname> Pallis</surname></author>.&#x201C;<article-title>Opportunities and challenges of the Internet of Things for healthcare: Systems engineering perspective,</article-title>&#x201D; in Wireless Mobile Communication and Healthcare (Mobihealth), <year>2014</year> EAI 4th International Conference on, <year>2014</year>, pp. <fpage>263</fpage>&#x2013;<lpage>266</lpage>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Opportunities+and+challenges+of+the+Internet+of+Things+for+healthcare%3A+Systems+engineering+perspective%2C+2014+263-266" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B7-27">[27] <author><firstname>A.</firstname> <surname>Banafa</surname></author>, &#x201C;<article-title>Fog Computing: From the Center to the Edge of the Cloud,</article-title>&#x201D; <publisher-loc>New Trends in Hi Tech</publisher-loc>, <day>22</day>-<month>Aug</month>-<year>2014</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Fog+Computing%3A+From+the+Center+to+the+Edge+of+the+Cloud%2C+2014" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B7-28">[28] <author><firstname>M.</firstname> <surname>Ectors</surname></author>, &#x201C;<article-title>Fog Computing Might Save Operators From an IoT Data Tsunami,</article-title>&#x201D; DZone: Smart Content for Tech Professionals, <day>07</day>-<month>Feb</month>-<year>2014</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Fog+Computing+Might+Save+Operators+From+an+IoT+Data+Tsunami%2C+2014" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B7-29">[29] Data Protection Working Party, &#x201C;<article-title>Opinion 4/2007 on the concept of personal data.</article-title>&#x201D; <day>20</day>-<month>Jun</month>-<year>2007</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Opinion+4%2F2007+on+the+concept+of+personal+data%2E+2007" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B7-30">[30] <author><firstname>A.</firstname> <surname>Paulin</surname></author>. &#x201C;<article-title>Towards Self-Service Government &#x2013; A Study on the Computability of Legal Eligibilities,</article-title>&#x201D; J. Univers. Comput. Sci., <volumenum>vol. 19</volumenum>, <issue>no. 12</issue>, pp. <fpage>1761</fpage>&#x2013;<lpage>1791</lpage>, <month>Jun</month>. <year>2013</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Towards+Self-Service+Government+-+A+Study+on+the+Computability+of+Legal+Eligibilities%2C+2013+12+1761-1791" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B7-31">[31] <author><firstname>E.</firstname> <surname>Bertino</surname></author>, <author><firstname>G.</firstname> <surname>Ghinita</surname></author>, and <author><firstname>A.</firstname> <surname>Kamra</surname></author>. <article-title>Access control for databases concepts and systems. Boston</article-title>: Now, <year>2011</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Access+control+for+databases+concepts+and+systems%2E+Boston+2011" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B7-32">[32] <author><firstname>A.</firstname> <surname>Paulin</surname></author>, &#x201C;<article-title>Towards the Foundation for Read-Write Governance of Civilizations,</article-title>&#x201D; in Third International Conference on Software, Services and Semantic Technologies S3T 2011, <volumenum>vol. 101</volumenum>, <author><firstname>D.</firstname> <surname>Dicheva</surname></author>, <author><firstname>Z.</firstname> <surname>Markov</surname></author>, and <author><firstname>E.</firstname> <surname>Stefanova</surname></author>, <role>Eds.</role> <publisher-loc>Berlin, Heidelberg: Springer</publisher-loc>, <year>2011</year>, pp. <fpage>95</fpage>&#x2013;<lpage>102</lpage>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Towards+the+Foundation+for+Read-Write+Governance+of+Civilizations%2C+2011+95-102" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B7-33">[33] <author><firstname>A.</firstname> <surname>Paulin</surname></author> and <author><firstname>T.</firstname> <surname>Welzer</surname></author>. &#x201C;<article-title>A Universal System for Fair Non-Repudiable Certified e-Mail without a Trusted Third Party,</article-title>&#x201D; Comput. Secur., <year>2013</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=A+Universal+System+for+Fair+Non-Repudiable+Certified+e-Mail+without+a+Trusted+Third+Party%2C+2013" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B7-34">[34] <author><firstname>L.</firstname> <surname>Sanchez</surname></author>, <author><firstname>R.</firstname> <surname>Ramdhany</surname></author>, <author><firstname>A.</firstname> <surname>Gluhak</surname></author>, <author><firstname>S.</firstname> <surname>Krco</surname></author>, <author><firstname>E.</firstname> <surname>Theodoridis</surname></author>, <author><firstname>D.</firstname> <surname>Pfisterer</surname></author>, <author><firstname>L.</firstname> <surname>Mu&#x00F1;oz;</surname></author> <author><firstname>J. A.</firstname> <surname>Galache</surname></author>, <author><firstname>P.</firstname> <surname>Sotres</surname></author>, <author><firstname>J. R.</firstname> <surname>Santana</surname></author>, <author><firstname>V.</firstname> <surname>Gutierrez</surname></author>. <publisher-loc>SmartSantander</publisher-loc>: IoT Experimentation over a Smart City Testbed. </bibliomixed>
<bibliomixed id="B7-35">[35] NEC public safety whitepaper [Online]: <ulink url="http://www.nec.com/en/global/solutions/safety/pdf/Safer_Cities_WP.pdf">http://www.nec.com/en/global/solutions/safety/pdf/Safer_Cities_WP.pdf</ulink></bibliomixed>
<bibliomixed id="B7-36">[36] <author><surname>Chan</surname></author>, <surname>Antoni</surname> <author><firstname>B.</firstname></author>, <author><firstname>Z-SJ</firstname> <surname>Liang</surname></author>, and <author><firstname>Nuno</firstname> <surname>Vasconcelos</surname></author>. &#x201C;<article-title><source>Privacy preserving crowd monitoring: Counting people without people models or tracking.</source></article-title>&#x201D; <source>IEEE Conference on Computer Vision and Pattern Recognition (CVPR)</source>, <year>2008</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Privacy+preserving+crowd+monitoring%3A+Counting+people+without+people+models+or+tracking%2E+Privacy+preserving+crowd+monitoring%3A+Counting+people+without+people+models+or+tracking%2E%22++IEEE+Conference+on+Computer+Vision+and+Pattern+Recognition+%28CVPR%29+2008" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B7-37">[37] NEC IoT Broker component [Online]: <ulink url="https://github.com/Aeronbroker/Aeron">https://github.com/Aeronbroker/Aeron</ulink></bibliomixed>
<bibliomixed id="B7-38">[38] <author><firstname>M.</firstname> <surname>Bauer</surname></author> and <author><firstname>S.</firstname> <surname>Longo</surname></author>. &#x201C;<article-title>Geographic Service Discovery for the Internet of Things.</article-title>&#x201D; Ubiquitous Computing and Ambient Intelligence. Personalisation and User Adapted Services. Springer International Publishing, <year>2014</year>. <fpage>424</fpage>&#x2013;<fpage>431</fpage>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Geographic+Service+Discovery+for+the+Internet+of+Things%2E+2014" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B7-39">[39] Cisco IoT Forecast [Online]: <ulink url="http://share.cisco.com/internet-ofthings.html">http://share.cisco.com/internet-ofthings.html</ulink></bibliomixed>
<bibliomixed id="B7-40">[40] <author><firstname>H.</firstname> <surname>Soliman</surname></author>, <author><firstname>K.</firstname> <surname>Sudan</surname></author>, <author><firstname>A.</firstname> <surname>Mishra</surname></author>. <source>A smart forest-fire early detection sensory system: Another approach of utilizing wireless sensor and neural networks</source>, <source>IEEE Sensors</source>, <volumenum>vol.</volumenum>, <issue>no.</issue>, <fpage>pp. 1900</fpage>, <fpage>1904</fpage>, 1&#x2013;4 <month>Nov</month>. <year>2010</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=A+smart+forest-fire+early+detection+sensory+system%3A+Another+approach+of+utilizing+wireless+sensor+and+neural+networks%2C++IEEE+Sensors+2010" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B7-41">[41] NEC water leak detection service [Online]: <ulink url="http://www.nec.com/en/global]/solutions/waterloss-management/">http://www.nec.com/en/global]/solutions/waterloss-management/</ulink></bibliomixed>
<bibliomixed id="B7-42">[42] <author><firstname>G.</firstname> <surname>Orwell</surname></author>. <source>Nineteen Eighty-Four. A novel. London</source>: Secker &#x0026; Warburg, <year>1949</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Nineteen+Eighty-Four%2E+A+novel%2E+London+1949" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B7-43">[43] <author><firstname>G.</firstname> <surname>Farvell</surname></author>., <ulink url="http://www.csmonitor.com/Commentary/Monitor-Political-Cartoons, retrieved">http://www.csmonitor.com/Commentary/Monitor-Political-Cartoons, retrieved</ulink> <day>10</day> <month>Jan</month>. <year>2015</year>.</bibliomixed>
</bibliography>
</chapter>
<chapter class="chapter" id="ch08" label="8" xreflabel="ch08">
<title>Internet of Things Experimentation: Linked-Data, Sensing-as-a-Service, Ecosystems and IoT Data Stores</title>
<authorgroup>
<emphasis role="strong"><author><firstname>Martin</firstname> <surname>Serrano</surname></author><superscript>1</superscript>, <author><firstname>John</firstname> <surname>Soldatos</surname></author><superscript>2</superscript>, <author><firstname>Philippe</firstname> <surname>Cousin</surname></author><superscript>3</superscript> and <author><firstname>Pedro</firstname> <surname>Mal&#x00F3;</surname></author><superscript>4</superscript></emphasis></authorgroup>
<para><superscript>1</superscript>National University of Ireland &#x2013; Insight Centre for Data Analytics, Galway, Ireland</para>
<para><superscript>2</superscript>Athens Information Technology, Athens, Greece</para>
<para><superscript>3</superscript>e-Global Market &#x2013; Sophia Antipolis, Nice, France</para>
<para><superscript>4</superscript>Faculdade de Ci&#x00EA;ncias e Tecnologia da Universidade Nova de Lisboa, UNINOVA, Lisbon, Portugal</para>
<section class="lev1" id="sec8.1" label="8.1" xreflabel="sec8.1">
<title>Introduction</title>
<para>The vision of integrating IoT platforms, testbeds and their associated silo applications is related with several scientific challenges, such as the need to aggregate and ensure the interoperability of data streams stemming from different IoT platforms or testbeds, as well as the need to provide tools and techniques for building applications that horizontally integrate diverse IoT Solutions. The convergence of IoT with cloud computing is a key enabler for this integration and interoperability, since it allows the aggregation of multiple IoT data streams towards the development and deployment of scalable, elastic and reliable applications that are delivered on-demand according to a pay-as-you-go model. During the last years we have witnessed several efforts towards IoT/cloud integration (e.g., [<link linkend="B8-1">1</link>, <link linkend="B8-2">2</link>]), including open source implementations of middleware frameworks for IoT/cloud integration [<link linkend="B8-3">3</link>, <link linkend="B8-4">4</link>] and a wide range of commercial systems (e.g., Xively (<ulink url="http://xively.com">xively.com</ulink>), ThingsWorx (<ulink url="http://www.thingsworx.com">www.thingsworx.com</ulink>), ThingsSpeak (<ulink url="http://www.thingspeak.com">www.thingspeak.com</ulink>), Sensor-Cloud (<ulink url="http://www.sensor-cloud.com">www.sensor-cloud.com</ulink>)). While these cloud infrastructures provide the means for aggregating data streams and services from multiple IoT systems, they are not fully sufficient for alleviating the fragmentation of IoT platforms, facilities and testbeds, this is because they emphasize on the syntactic interoperability (i.e. homogenizing data sources and formats) rather on the semantic interoperability of diverse IoT platforms, provided services and data streams.</para>
<para>Advances in the Internet of Things (IoT) area have progressively moved in different directions (i.e. designing technology, deploying the systems into the cloud, increasing the number of inter-connected entities, improving the collection of information in real-time and not less important the security aspects in IoT). IoT Advances have drawn a common big challenge that focuses on the integration of the IoT generated data. The key challenge is to provide a common sharing model or a set of models organizing the information coming from the connected IoT systems, and most important is that the coming generation of IoT technology and systems are prepared to support the common model(s). Solutions to the problem of formulating and managing Internet of Things data from heterogeneous systems and environments (i.e. environments comprising cities, industry, agriculture, etc.) and entity resources (such as smart devices, sensors, actuators, etc.) in cloud infrastructures remains as a key challenge.</para>
<para>Several IoT projects <link linkend="B8-5">[5]</link> have started work on the semantic interoperability of diverse IoT platforms, services and data streams. To this end, they leverage IoT semantic models (such as the W3C Semantic Sensor Networks (SSN) ontology [<link linkend="B8-6">6</link>, <link linkend="B8-7">7</link>]) as a means of achieving interoperable modelling and semantics of the various IoT platforms. A prominent example is the FP7 OpenIoT project, an awarded by BlackDuck Software Co. winner of the open source project for 2013. OpenIoT has developed and released an open source blueprint infrastructure <link linkend="B8-8">[8]</link> for the semantic interoperability of diverse sensor networks at a large scale, the source code and the documentation of the project are available at <ulink url="https://github.com/OpenIotOrg/openiot">https://github.com/OpenIotOrg/openiot</ulink>.</para>
<para>The semantic interoperability of diverse sensor clusters and IoT networks is based on the virtualization of sensors in the cloud. At the heart of these virtualization mechanisms is the modelling of heterogeneous sensors and sensor networks according to a common ontology, which serves as harmonization mechanism of their semantics, but also as a mechanism for linking related data streams as part of the linked sensor data vision. This virtualization can accordingly enable the dynamic discovery of resources and their data across different/diverse IoT platforms, thereby enabling the dynamic on-demand formulation of cloud-based IoT services (such as Sensing-as-a-Service services). Relevant semantic interoperability techniques are studied in depth as part of the fourth activity chain of the IERC cluster (IERC-AC4) (see for example <link linkend="B8-9">[9]</link>). Similar techniques could serve as a basis for unifying and integrating/linking geographically and administratively dispersed IoT testbeds, including those that have been established as part of Future Internet Research and Experimentation platform projects (FIRE). Such integration holds the promise of adding significant value to all of the existing IoT testbeds, through enabling the specification and conduction of large-scale on-demand experiments that involve multiple heterogeneous sensors, Internet Connected Objects (ICOs) and data sources stemming from different IoT testbeds.</para>
<para>In this paper the design principles for IoT Linked-Data with a vision towards IoT data sharing are introduced and the design principles for a framework and set of common models for using the generated IoT information in the context of utility-driven cloud-based Experimentation are described. This paper also presents the main building blocks of a federated environment towards building an Ecosystem of IoT shared data, which emphasizes on-demand establishment of IoT Experimentation services based on the federated formulation of information and data sets. The presented federated framework called FIESTA-IoT leverages well-known IoT technologies and standards in the form of IoT data stores from IoT data testbeds. The structure of the paper is as follows: <link linkend="sec8.2">Section <xref linkend="sec8.2" remap="8.2"/></link> presents the main characteristics of Experimentation as a Service in the form of design principles. <link linkend="sec8.3">Section <xref linkend="sec8.3" remap="8.3"/></link>, delves into more details about Linked Data, Global Information Systems and IoT Infrastructures and the specification of experimentation services to the common models to facilitate common information services. <link linkend="sec8.4">Section <xref linkend="sec8.4" remap="8.4"/></link> describes federation in the context of ecosystems and data stores by means of federated IoT services. <link linkend="sec8.5">Section <xref linkend="sec8.5" remap="8.5"/></link> describes FIESTA-IoT and the IoT data streams and IoT-experimentation models enabling experimentation as a service (EaaS) by means of available data sets from IoT testbeds and describes some sample applications that will be integrated towards the validation of the federated framework. Finally, <link linkend="sec8.6">Section <xref linkend="sec8.6" remap="8.6"/></link> concludes the paper with the most relevant references.</para>
</section>
<section class="lev1" id="sec8.2" label="8.2" xreflabel="sec8.2">
<title>Experimentation as a Service</title>
<para>Based on the Sensing-as-a-Service paradigm, dynamic virtualized discovery capabilities for IoT resources could give rise to a more general class of Experiment-as-a-Service (EaaS) applications for the IoT domain. EaaS services are executed over converged IoT/cloud platforms, which additional developments are required on the basis of adapting technologies for exchanging data and interacting each other for mutual sharing of available resources. EaaS services are not confined to combinations of sensor queries (such as Sensing-as-a-Service), but they would rather enable the execution of fully-fledged experimental data workflows comprising actuating and configuration actions over the diverse IoT devices and testbeds when offered as services. The benefits resulting from the establishment and implementation of an EaaS paradigm for the IoT domain include:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>The expansion of the scope of the potential applications/experiments that will be designed and executed. Specifically, the integration of diverse testbeds will offer European experimenters/researchers with the possibility of executing IoT experiments that are nowadays not possible. Some possible examples in the areas of pollution management, crisis management and commercial applications are described in <link linkend="B8-10">[10]</link>.</para></listitem>
<listitem><para>The ability to repurpose IoT infrastructures, devices and data streams in order to support multiple (rather than a single) applications. This will increase the ROI associated with the investment in the testbeds infrastructure and software. For testbeds built based on EC co-funding, this will also maximize value for EC money (invested on testbeds).</para></listitem>
<listitem><para>Possibility for sharing IoT data (stemming from one or more heterogeneous IoT testbeds) across multiple researchers. This can be a valuable asset for setting up and conducting added value IoT experiments, since it will enable researchers to access data in a testbed agnostic way i.e. similar to accessing a conventional large scale IoT database.</para></listitem>
<listitem><para>The emergence of opportunities for innovative IoT applications, notably large scale applications that transcend multiple application platforms and domains and which are not nowadays possible.</para></listitem>
<listitem><para>The avoidance of vendor lock-in, when it comes to executing IoT services over a provider&#x2019;s infrastructure, given that an EaaS model could boost data and applications portability across diverse testbeds.</para></listitem>
</itemizedlist>
<para>Beyond the interconnection and interoperability of IoT testbeds, semantic interoperability tools and techniques could also enable the wider interoperability of IoT platforms, which is a significant step towards a global IoT ecosystem. <link linkend="F8.1">Figure <xref linkend="F8.1" remap="8.1"/></link> depicts the experimentation as a service scenario where the data sources available for IoT silos are made available to third party experimenters (users) by means of accessibility to the data in programmable way with capacity for resource allocation. The involvement of third parties will therefore play an instrumental role for the large-scale validation of the EaaS infrastructures, but also for the take-up of the global market confidence building IoT interoperability solutions.</para>
<fig id="F8.1" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 8.1</label>
<caption><para>An &#x201C;Experimentation-as-a-Service&#x201D; Scenario representation.</para></caption>
<graphic xlink:href="graphics/fig8_1.jpg"/>
</fig>
</section>
<section class="lev1" id="sec8.3" label="8.3" xreflabel="sec8.3">
<title>Linked Data, Global Information Systems and IoT Infrastructures</title>
<para>According with the last report from Gartner on emerging technologies and particularly on IoT <link linkend="B8-11">[11]</link>, we are heading towards a world of billions of things, IoT devices are expected to generate enormous amount of (dynamically distributed) data streams, which can no longer be processed in real-time by the traditional centralized solutions. IoT needs a distributed data management infrastructure to deal with heterogeneous data stream sources that autonomously generates data at high rates <link linkend="B8-12">[12]</link>. An early system designed to envision a worldwide sensor web <link linkend="B8-13">[13]</link> is IrisNet, which supports distributed XML processing over a worldwide collection of multimedia sensor nodes, and addresses a number of fault-tolerance and resource-sharing issues. A long the same line, HiFi <link linkend="B8-14">[14]</link> also supports integrated push-based and pull-based queries over a hierarchy where the leaves are the sensor feeds and the internal nodes are arbitrary fusion, aggregator, or cleaning operators.</para>
<para>A series of complementary database approaches aimed to provide low-latency continuous processing of data streams on a distributed infrastructure. The Aurora/Medusa <link linkend="B8-15">[15]</link>, Borealis <link linkend="B8-16">[16]</link>, and TelegraphCQ <link linkend="B8-17">[17]</link>, StreamGlobe <link linkend="B8-18">[18]</link>, StreamCloud <link linkend="B8-19">[19]</link> are well-known examples of this kind. These engines provide sophisticated fault-tolerance, load-management, revision processing, and federated-operation features for distributed data streams. A significant portion of the stream processing research merit of these systems has already made its way from university prototypes into industry products such as TIBCO Stream Base, IBM Stream Info Sphere, and Microsoft Streamlight. However, such commercial products are out of reach of most IoT stream applications and there have not been any comprehensive evaluation in terms of cost effectiveness, performance and scalability. Due to this reason, there have emerged open source stream processing platforms from Apache Storm <link linkend="B8-20">[20]</link>, S4 <link linkend="B8-21">[21]</link> and Spark <link linkend="B8-22">[22]</link> which were primarily built for some ad-hoc applications: Twitter, Yahoo!. While these platforms aim to support elasticity and fault-tolerance, they only offer simple generic stream processing primitives that require significant effort to build scalable stream-based applications.</para>
<para>The above systems provide steps in the right direction for managing IoT data streams in distributed settings. However, they have several federation restrictions in terms of systems of systems and system data organization. For system organization, most of distributed stream processing engines are extended from a centralized stream-processing engine to distributed system architectures. Thus, in order to enable the federation among stream processing sites, they have to follow strictly predefined configurations. However, in IoT settings, heterogeneous data stream sources are provided by autonomous infrastructures operated on different independent entities, which usually do not have any prior knowledge about federation requirements. In particular, a useful continuous federated query might need to compare or combine data from many heterogeneous data stream sources maintained by independent entities. For example, a tourist guide application might need to combine different data stream relevant to the GPS location of users, e.g., weather, bus, train location, flight updates, tourist events. Also, they might then correlate these streams with similar information from other users who have social relationships with the user via social networks such as Twitter, Facebook and also with back ground information like OpenStreetMap, Wikipedia. In such examples, stream data providers did not only agree how their systems will be used to process those federated queries but also they did not agree on data schema/format to make the data accessible via queries for the federated query processing engine.</para>
<para>The need of having uniform and predefined data schema and formats poses various difficulties for query federation on IoT applications using heterogeneous stream data sources. In this sense Linked data for information sharing is widely an accepted best practice to exchange information in an interoperable and reusable fashion way <link linkend="B8-23">[23]</link>, over the Internet different communities use the semantic web standards to enable interoperability and exchange information. Recently linked sensor data has been explored in order to enable the interconnection of multiple new mobile services demand by the rapid development of smart technological devices. Taking a broad view about the state of the art on linked data and its applications in WSN, many of the current problems in WSN still remain in the basic notion of exchanging pieces of information. Data exchanges at sensor level result almost impossible due the capacity for processing information is limited and the stream data processing is very complex.</para>
<para>In global IoT information systems linked sensor data can be exploited in order to facilitate the linking of sensors and ICO related processes at a higher semantic level (within the OpenIoT middleware), where data exchange operations can be conducted. In order to facilitate this process has been necessary to identify the persistent problems as listed below, in order to be addressed and provide alternative solutions.</para>
<orderedlist numeration="arabic" continuation="restarts" spacing="normal">
<listitem><para>In WSN only a small numbers of services can be offered, which cannot be personalized to meet dynamic wireless sensor configurations.</para></listitem>
<listitem><para>The offered services in WSN are typically technology-driven and static, designed to maximise usage of capabilities of the sensor network rather as individual services and not to satisfy user requirements.</para></listitem>
<listitem><para>The information from sensors cannot be readily adapted to their changing operational context, so sensors cannot communicate their surrounding sensors for configuration purposes, within the objective of changing service usage patterns and rapid new services deployment.</para></listitem>
</orderedlist>
<para>In summary, sensors can only be optimized, on an individual basis, to meet specific low-level objectives, often resulting in sub-optimal operation. By addressing linked data issues, sensor systems can be able to exchange information and thus facilitate customization of sensor networks services. An example of the way how to cope with these requirements and by establishing a WSN design practice is OpenIoT, where it is necessary the composition of data models to generate aggregated data streams. The creation of a data model implies sensor data to be endowed with certain level of information flexibility, operability and management control and most important provide the control platform for interconnected sensors <link linkend="B8-24">[24]</link>. This every day more popular activity focuses in the semantic enrichment task of the information to generate sensor data models with ontological data to provide an extensible, reusable, common and manageable linked data plane i.e. a plane where aggregate sensor data could be manipulated and operated.</para>
<para>Currently there is a tendency to avoid high-level semantics i.e. ontologies and thus simplified versions of semantics have been generated, i.e. JSON descriptions and its version for linked data JSON-LD. This design approach is more lightweight but as every constraint language, it lacks of enough expressiveness to be used for providing res-usable services and re-programmable application tools. However if well is true JSON-LD is simpler and easy to adopt but not necessarily to adapt into the multiple IoT domains. JSON-LD is focused into the integration of sensor data within the service operations, and offers a more complete understanding of WSN contents based on their continuous data acquisition.</para>
<para>Linked data have demonstrated to be the mechanism to include additional information that facilitates service deployments by means of re-using information, however still lacks in offering re-purposing of technology. Still by using Linked Data in Internet of Things it is expected a more inclusive governance of the management of information and control on devices, likewise facilitates networks (WSN), systems and more adaptive services. Some other major expectations about Linked data in IoT are as follow:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>By linking sensor data information exchange of information within different devices is pursued.</para></listitem>
<listitem><para>By supporting the use of data graphs and potentially specialized ontologies in WSN (i.e. W3C SSN) as the mechanism to generate formal descriptions it is possible to represents the collection and formal modelling for sensor networks.</para></listitem>
<listitem><para>By using a formal methodology the user&#x2019;s contents represent values used in various service management operations, and thus a knowledge-based approach can be build as part of an inference plane <link linkend="B8-25">[25]</link>.</para></listitem>
</itemizedlist>
<para>Semantic annotation aims to be a solution that uses otologies to support interoperability and extensibility required in the systems handling end-user contents for more interoperable applications <link linkend="B8-27">[27]</link>. Beyond of the formal description of ontology such models need the necessary semantic richness and formalisms to represent different types of information and integrated also service operations.</para>
</section>
<section class="lev1" id="sec8.4" label="8.4" xreflabel="sec8.4">
<title>Ecosystems and Data Stores by Means of Federated IoT Services</title>
<para>Federation is understood to be: &#x201C;an organization within which smaller divisions have some internal autonomy&#x201D; <link linkend="B8-27">[27]</link>. In the context of the Internet of Things and testbeds, a federation considers that each testbed operates both individually and as part of a larger federation in order to gain value (i.e. larger user base, potential combinations with other testbeds to support richer experimentation, etc.). Represented in <link linkend="F8.2">Figure <xref linkend="F8.2" remap="8.2"/></link> the typical testbed federation functions are included: resource discovery (finding the required resources for an experiment); resource provisioning (management or resources such that they are available when required); resource monitoring (monitor operation in order to collect experimental results); and finally security (ensuring authorised users can access resources, and the federation provides a trusted base to keep experiment information secure).</para>
<para>Different federation models can then be applied to implement the federation; for example the FedSM project defines a number of models including lightweight federation where there is little if any central control of these functions (by the federation) through to a fully integrated model where a central federation authority implements and provides the functions.</para>
<fig id="F8.2" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 8.2</label>
<caption><para>Federation Model for the Internet of Things Experimentation.</para></caption>
<graphic xlink:href="graphics/fig8_2.jpg"/>
</fig>
<para>The FIRE programme has a long-standing history in developing cutting edge testbed federations. In the field of networking research: OpenLab provides access to tools and testbeds including PlanetLab Europe, the NITOS wireless testbed, and other federated testbeds to support networking experimentation across heterogeneous facilities. OFELIA is an OpenFlow switching testbed in Europe federating a number of OpenFlow islands supporting research in the Software Defined Networking field. CONFINE co-ordinates unified access to a set of real-world community IP networks (wired, wireless, ad-hoc, etc.) to openly allow research into service, protocols and applications across these edge networks. CREW federates five wireless testbeds to support experimentation with advanced spectrum sensing and cognitive radio. Finally, FLEX is a new FIRE project that will provide testbeds for LTE experimentation. In the field of software services, the Bonfire project created a federation of cloud facilities to support experimentation with new cloud technologies. Importantly, in terms of Internet of Things testbeds, SmartSantander provides a set of Smart City facilities through large-scale deployments of sensor networks atop which applications and services can be developed. Also, Sunrise is a federation of sensor network testbeds providing monitoring and exploration of the marine environments and in particular supporting experimentation in terms of the underwater Internet of Things. While each project typically performs federation within its own domain, the Fed4FIRE project is an initiative to bring together heterogeneous facilities across Europe so as to target experimentation across the whole Future Internet field i.e. networks, software, services, and IoT.</para>
<para>Many of the projects (crucially Fed4FIRE) employ OMF <link linkend="B8-28">[28]</link> and SFA <link linkend="B8-29">[29]</link> federation technologies. OMF is a control, measurement and management framework for testbeds. From an experimenter&#x2019;s point of view, OMF provides a set of tools to describe and instrument an experiment, execute it and collect its results. From a testbed operator&#x2019;s point of view, OMF provides a set of services to efficiently manage and operate the testbed resources (e.g. resetting nodes, retrieving their status information, installing new OS image). The OMF architecture is based upon Experiment Controllers that steer experiments defined in OEDL (OMF experiment Description Language), which is a declarative domain-specific language describing required resources and how they should be configured and connected. It also defines the orchestration of the experiment itself.</para>
<para>Outside FIRE, there have been a number of federation initiatives to support the wider Future Internet community. Two relevant ones are Helix Nebula and XIFI. XIFI is a federation of data centres connected to resources such as wireless testbeds and sensor networks; its goal is to support large-scale Future Internet trials before transfer to market. XIFI employs a federation architecture based around web technologies (e.g. OAUTH, OCCI, and open Web APIs). On the other hand, Helix Nebula &#x2013; the Science Cloud is an initiative to build federated cloud services across Europe in order to underpin IT-intense scientific research while also allowing the inclusion of other stakeholders&#x2019; needs (governments, businesses and citizens).</para>
</section>
<section class="lev1" id="sec8.5" label="8.5" xreflabel="sec8.5">
<title>FIESTA-IoT: IoT Data Streams and IoT-Experimentation Services</title>
<para>Experimentation as a Service is executed over converged IoT/cloud platforms, Thus additional developments that are required on the basis of adapting technologies for exchanging resources and interacting each other for mutual sharing of available resources. EaaS services are not confined to combinations of sensor queries (such as Sensing-as-a-Service), but they would rather enable the execution of fully-fledged experimental data workflows comprising actuating and configuration actions over the diverse IoT devices and testbeds when offered as services.</para>
<para>The main goal of the FIESTA-IoT project is to open new horizons in the development and deployment of IoT applications and experiments at the EU (and global) scale and based on the interconnection and interoperability of diverse IoT platforms and testbeds. To this end, FIESTA aims for providing a blueprint experimental infrastructure, tools, techniques, processes and best practices enabling IoT testbed/platforms operators to interconnect their IoT Data in an interoperable way, while at the same time facilitating researchers and solution providers in designing and deploying large scale integrated applications (experiments) that transcend the (silo) boundaries of individual IoT platforms or testbeds based o IoT data streams.</para>
<para>FIESTA aims for enabling researchers and experimenters to share and reuse data from diverse IoT testbeds in a seamless and flexible way, which will open up new opportunities in the development and deployment of experiments that exploit data and capabilities from multiple testbeds. Depicted in <link linkend="F8.3">Figure <xref linkend="F8.3" remap="8.3"/></link>, the blueprint experimental infrastructure to be provided by FIESTA will include middleware for semantic interoperability, tools for developing/deploying and managing interoperable applications, processes for ensuring the operation of interoperable applications, as well as best practices for adapting existing IoT facilities to the FIESTA interoperability infrastructure.</para>
<fig id="F8.3" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 8.3</label>
<caption><para>FIESTA-IoT Functional Blocks Architecture.</para></caption>
<graphic xlink:href="graphics/fig8_3.jpg"/>
</fig>
<para>In FIESTA we will look at the lack of standards as the major difficulty leading to these restrictions, and the wide (and changing) variety of application requirements. Existing IoT Stream processing engines vary widely in data and query models, APIs, functionality, and optimization capabilities. This has led to some federated queries that can be executed on several IoT stream providers based on their application needs. Semantic Web addresses many of the technical challenges of enabling interoperability among data from different sources. Likewise, Linked Stream Data <link linkend="B8-30">[30]</link> enables information exchange among stream processing entities, i.e, stream providers, stream-processing engines, stream consumer with computer-processable meaning (semantics) of IoT stream data. There have been a lot of efforts towards building stand-alone stream processing engine for Linked Stream Data such as C-SPARQL <link linkend="B8-31">[31]</link>, SPARQL stream <link linkend="B8-31">[31]</link>, CQELS <link linkend="B8-32">[32]</link>, EP-SPARQL <link linkend="B8-33">[33]</link>. The data and query-processing model of Linked Stream data has been standard by W3C <link linkend="B8-34">[34]</link>. However, there are only few on-going efforts of building scalable Linked Stream Data processing engines for the cloud like Storm and S4 respectively, i.e., CQELS Cloud <link linkend="B8-35">[35]</link> and <link linkend="B8-36">[36]</link>. None of them supports federation among different/autonomous stream data providers.</para>
</section>
<section class="lev1" id="sec8.6" label="8.6" xreflabel="sec8.6">
<title>FIESTA-IoT for Smart Cities &#x2013; Semantic Interoperability</title>
<para>A Smart City in conjunction with an ICT expert can use the OpenIoT platform to setup a public cloud infrastructure, which could support multiple (rather than a single) services based on internet-connect objects (e.g., smart phones, sensors). Citizens could then use the provided services through submitting requests to the OpenIoT infrastructure and accordingly having them executed by the middleware. Requests will target information that could be provided on the basis of urban sensors, such as meteorological information, traffic information, parking occupancy information, in conjunction with city maps. OpenIoT will offer the ability to automatically define and formulate such requests, while at the same time providing services in a utility-based fashion.</para>
<para>FIESTA-IoT works on semantic interoperability for IoT and Cloud resources, FIESTA-IoT focuses on developing common annotation models for describing the resources and IoT data and providing validation and testing tools for semantic interoperability evaluation. The core models will be constructed by investigating the existing IoT architectural approaches from OMA Alliance, OneM2M, IPSO Alliance and the IoT-A information models (i.e. resources, service and entity models developed in the FP7 EU IoT-A project, <ulink url="http://epubs.surrey.ac.uk/127271/">http://epubs.surrey.ac.uk/127271/</ulink>), and the semantic and ontology models including W3C Semantic Sensor Network Ontology (SSN Ontology) (<ulink url="http://www.w3.org/2005/Incubator/ssn/XGR-ssn-20110628/">http://www.w3.org/2005/Incubator/ssn/XGR-ssn-20110628/</ulink>), EF7 IoT.est and OpenIoT Ontology models. In FIESTA-IoT existing concepts, namespaces and semantic models will be used and a set of core models to describe IoT resources (e.g. sensor devices, gateways, actuators) and their capabilities and features and will also provide semantic models to describe Cloud services and Cloud based components will be adopted and/or created. The existing semantic models such as W3 SSN, IoT-A models are usually developed for specific purposes and in the domain of the projects. These semantic models are also often complex and come with the size and computation overhead especially for annotating large-scale IoT/Cloud resources <link linkend="B8-37">[37]</link>. Variety of models and annotation schemes also cause the heterogeneity among the semantic descriptions while different namespaces and concepts are used to describe similar resources <link linkend="B8-38">[38]</link>.</para>
</section>
<section class="lev1" id="sec8.7" label="8.7" xreflabel="sec8.7">
<title>Conclusions</title>
<para>The model of Experimentation as a Service is a new paradigm that follows the model where services are executed over converged IoT/cloud platforms and where additional developments are required on the basis of adapting technologies for exchanging data and interacting each other for mutual sharing of available resources.</para>
<para>EaaS services are not confined to combinations of sensor queries (such as Sensing-as-a-Service), rather they enable the execution of fully-fledged experimental data workflows comprising actuating and configuration actions over the diverse IoT devices and testbeds when offered as services.</para>
<para>The challenges for IoT Experimentation and the main functional blocks for the FIESTA-IoT federated architecture have been presented in this paper and as reference for further developments in IoT federation systems.</para>
<para>The FIESTA-IoT federated architecture has as main objective providing support in the convergence of internet-of-things experimentation platforms by means of federation and facilitating IoT Cloud data in the form of streams for IoT Cloud data experimentation.</para>
</section>
<section class="lev1" id="sec8.8">
<title>Acknowledgements</title>
<para>Part of this work has been carried out in the scope of the project H2020-FIESTA-IoT Project (Federated Interoperable Semantic IoT/Cloud Testbeds and Applications), which is co-funded by the European Commission under Horizons 2020, contract number H2020-ICT-2014-1-643943-FIESTA.</para>
</section>
<bibliography class="biblio" id="bib06">
<title>Bibliography</title>
<bibliomixed id="B8-1">[1] <author><firstname>H.M.</firstname> <surname>Mehedi</surname></author> and <author><firstname>B.</firstname> <surname>Song</surname></author>. <article-title>Eui-nam Huh: A framework of sensor-cloud integration opportunities and challenges</article-title>. <source>In Proceedings of ICUIMC.</source> <fpage>618</fpage>&#x2013;<lpage>626</lpage>. <year>2009</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Eui-nam+Huh%3A+A+framework+of+sensor-cloud+integration+opportunities+and+challenges+In+Proceedings+of+ICUIMC%2E+2009+618-626" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B8-2">[2] <author><firstname>K.</firstname> <surname>Lee</surname></author>. <article-title>Extending Sensor Networks into the Cloud using Amazon Web Services</article-title>, <source>In Proceedings of IEEE International Conference on Networked Embedded Systems for Enterprise Applications 2010</source>, <day>25th</day> <month>November</month>, <year>2010</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Extending+Sensor+Networks+into+the+Cloud+using+Amazon+Web+Services+In+Proceedings+of+IEEE+International+Conference+on+Networked+Embedded+Systems+for+Enterprise+Applications+2010+2010" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B8-3">[3] <author><firstname>C.G.</firstname> <surname>Fox</surname></author>, <author><firstname>S.</firstname> <surname>Kamburugamuve</surname></author> and <author><firstname>R.</firstname> <surname>Hartman</surname></author>. <article-title>Architecture and Measured Characteristics of a Cloud Based Internet of Things API</article-title>, <source>In Proceedings of Workshop 13-IoT Internet of Things, Machine to Machine and Smart Services Applications</source> (IoT 2012) at The 2012 International Conference on Collaboration Technologies and Systems (CTS 2012) May <fpage>21</fpage>&#x2013;<lpage>25</lpage>, <year>2012</year> <publisher-loc>Denver, Co, USA</publisher-loc>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Architecture+and+Measured+Characteristics+of+a+Cloud+Based+Internet+of+Things+API+In+Proceedings+of+Workshop+13-IoT+Internet+of+Things%2C+Machine+to+Machine+and+Smart+Services+Applications+2012+21-25" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B8-4">[4] <author><firstname>J.</firstname> <surname>Soldatos</surname></author>, <author><firstname>M.</firstname> <surname>Serrano</surname></author> and <author><firstname>M.</firstname> <surname>Hauswirth</surname></author>. <article-title>Convergence of Utility Computing with the Internet-of-Things</article-title>, <source>In proceedings of International Workshop on Extending Seamlessly to the Internet of Things (esIoT)</source>, collocated at the IMIS-2012 International Conference, <day>4th6th</day> <month>July</month>, <year>2012</year>, <publisher-loc>Palermo, Italy</publisher-loc>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Convergence+of+Utility+Computing+with+the+Internet-of-Things+In+proceedings+of+International+Workshop+on+Extending+Seamlessly+to+the+Internet+of+Things+%28esIoT%29+2012" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B8-5">[5] <author><firstname>M.</firstname> <surname>Bauer</surname></author>, <author><firstname>P.</firstname> <surname>Chartier</surname></author>, <author><firstname>K.</firstname> <surname>Moessner</surname></author>, <author><firstname>N.S.</firstname> <surname>Cosmin</surname></author>, <author><firstname>C.</firstname> <surname>Pastrone</surname></author>, <author><firstname>J.X.</firstname> <surname>Parreira</surname></author> and <author><firstname>R.</firstname> <surname>Rees.</surname></author> <source>IERC-AC2-Deliverable 1</source>. <volume>2011</volume>.</bibliomixed>
<bibliomixed id="B8-6">[6] <author><firstname>K.</firstname> <surname>Taylor</surname></author>, <article-title>Semantic Sensor Networks: The W3C SSN-XG Ontology and How to Semantically Enable Real Time Sensor Feeds</article-title>, <source>In proceedings of 2011 Semantic Technology Conference</source>, <month>June</month> <fpage>5</fpage>&#x2013;<lpage>9</lpage>, <publisher-loc>San Francisco CA, USA</publisher-loc>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Semantic+Sensor+Networks%3A+The+W3C+SSN-XG+Ontology+and+How+to+Semantically+Enable+Real+Time+Sensor+Feeds+In+proceedings+of+2011+Semantic+Technology+Conference+2011+5-9" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B8-7">[7] <author><firstname>M.</firstname> <surname>Compton</surname></author>, <author><firstname>P.</firstname> <surname>Barnaghi</surname></author>, <author><firstname>L.</firstname> <surname>Bermudez</surname></author>, <author><firstname>R.G.</firstname> <surname>Castro</surname></author>, <author><firstname>O.</firstname> <surname>Corcho</surname></author>, <author><firstname>S.</firstname> <surname>Cox</surname></author>, et. al. <article-title>The SSN Ontology of the Semantic Sensor Networks Incubator Group</article-title>, <source>Journal of Web Semantics: Science, Services and Agents on the World Wide Web</source>, <publisher-loc>Elsevier</publisher-loc>, <year>2012</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=The+SSN+Ontology+of+the+Semantic+Sensor+Networks+Incubator+Group+Journal+of+Web+Semantics%3A+Science%2C+Services+and+Agents+on+the+World+Wide+Web+2012" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B8-8">[8] <author><firstname>M.</firstname> <surname>Serrano</surname></author>, <author><firstname>H.</firstname> <surname>Nguyen</surname></author>, <author><firstname>D.</firstname> <surname>LePhuoc</surname></author>, <author><firstname>M.</firstname> <surname>Hauswirth</surname></author>, <author><firstname>J.</firstname> <surname>Soldatos</surname></author>, <author><firstname>N.</firstname> <surname>Kefalakis</surname></author>, <author><firstname>P.</firstname> <surname>Jayaraman</surname></author> and <author><firstname>A.</firstname> <surname>Zaslavsky</surname></author>. <article-title>Defining the stack for service delivery models and interoperability in the Internet of Things: A practical case with OpenIoT-VDK</article-title>. <source>IEEE Journal on Selected Areas in Telecommunications</source> <year>2014</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Defining+the+stack+for+service+delivery+models+and+interoperability+in+the+Internet+of+Things%3A+A+practical+case+with+OpenIoT-VDK+IEEE+Journal+on+Selected+Areas+in+Telecommunications+2014" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B8-9">[9] <author><firstname>P.</firstname> <surname>Cousin</surname></author>, <author><firstname>M.</firstname> <surname>Serrano</surname></author> and <author><firstname>J.</firstname> <surname>Soldatos</surname></author>. <article-title>Internet of Things Research on Semantic Interoperability to address Manufacturing Challenges</article-title>, <source>In Proceedings of the 7th International Conference on Interoperability for Enterprise Systems and Applications, I-ESA 2014</source>, <publisher-loc>Albi, France</publisher-loc>, <month>March</month>, <fpage>24</fpage>&#x2013;<lpage>28</lpage>, <year>2014</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Internet+of+Things+Research+on+Semantic+Interoperability+to+address+Manufacturing+Challenges+In+Proceedings+of+the+7th+International+Conference+on+Interoperability+for+Enterprise+Systems+and+Applications%2C+I-ESA+2014+2014+24-28" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B8-10">[10] <author><firstname>S.</firstname> <surname>Kirkpatrick</surname></author>, <author><firstname>M.</firstname> <surname>Boniface</surname></author> et. al. <article-title>Future Internet Research and Experimentation: Vision and Scenarios 2020</article-title>, <source>AmpliFIRE Support Action (Grant Agreement: 318550) Deliverable D1.1</source>, <month>June</month> <year>2013</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Future+Internet+Research+and+Experimentation%3A+Vision+and+Scenarios+2020+AmpliFIRE+Support+Action+%28Grant+Agreement%3A+318550%29+Deliverable+D1%2E1+2013" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B8-11">[11] <collab>Forecast: The Internet of Things, Worldwide</collab>, <year>2014</year>. <source>Gartner report</source> <ulink url="http://www.gartner.com/document/2625419">http://www.gartner.com/document/2625419?</ulink> <year>2014</year>. sthkw=G00259115 <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Gartner+report+2014" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B8-12">[12] <author><firstname>M.</firstname> <surname>Balazinska</surname></author>, <author><firstname>A.</firstname> <surname>Deshpande</surname></author>, <author><firstname>M.J.</firstname> <surname>Franklin</surname></author>, <author><firstname>P.B.</firstname> <surname>Gibbons</surname></author>, <author><firstname>J.</firstname> <surname>Gray</surname></author>, <author><firstname>M.</firstname> <surname>Hansen</surname></author>, <author><firstname>M.</firstname> <surname>Liebhold</surname></author>, <author><firstname>S.</firstname> <surname>Nath</surname></author>, <author><firstname>A.</firstname> <surname>Szalay</surname></author>, and <author><firstname>V.</firstname> <surname>Tao</surname></author>. <year>2007</year>. <article-title>Data Management in the Worldwide Sensor Web</article-title>. <source>IEEE Pervasive Computing</source> <volumenum>6</volumenum>, <issue>2</issue> (<month>April</month> <year>2007</year>), <fpage>30</fpage>&#x2013;<lpage>40</lpage>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Data+Management+in+the+Worldwide+Sensor+Web+IEEE+Pervasive+Computing+2007+2+30-40" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B8-13">[13] <author><firstname>J.</firstname> <surname>Campbell</surname></author>, <author><firstname>P.B.</firstname> <surname>Gibbons</surname></author>, <author><firstname>S.</firstname> <surname>Nath</surname></author>, <author><firstname>P.</firstname> <surname>Pillai</surname></author>, <author><firstname>S.</firstname> <surname>Seshan</surname></author>, and <author><firstname>R.</firstname> <surname>Sukthankar</surname></author>. <year>2005</year> <article-title>IrisNet: an Internet-scale architecture for multimedia sensors</article-title>. <source>In Proceedings of the 13th annual ACM international conference on Multimedia (MULTIMEDIA &#x2019;05)</source>. <publisher-loc>ACM, New York, NY, USA</publisher-loc>, <fpage>81</fpage>&#x2013;<lpage>88</lpage>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=IrisNet%3A+an+Internet-scale+architecture+for+multimedia+sensors+In+Proceedings+of+the+13th+annual+ACM+international+conference+on+Multimedia+%28MULTIMEDIA+%2705%29+2005+81-88" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B8-14">[14] <author><firstname>M.J.</firstname> <surname>Franklin</surname></author>, <author><firstname>S.R.</firstname> <surname>Jeffery</surname></author>, <author><firstname>S.</firstname> <surname>Krishnamurthy</surname></author>, <author><firstname>F.</firstname> <surname>Reiss</surname></author>, <author><firstname>S.</firstname> <surname>Rizvi</surname></author>, <author><firstname>E.</firstname> <surname>Wu</surname></author>, <author><firstname>O.</firstname> <surname>Cooper</surname></author> and <author><firstname>A.</firstname> <surname>Edakkunni</surname></author>. <article-title>Wei Hong: Design Considerations for High Fan-In Systems: The HiFi Approach</article-title>. CIDR <year>2005</year>: <fpage>290</fpage>&#x2013;<lpage>304</lpage>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Wei+Hong%3A+Design+Considerations+for+High+Fan-In+Systems%3A+The+HiFi+Approach+2005+290-304" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B8-15">[15] <author><firstname>M.</firstname> <surname>Cherniack</surname></author>, <author><firstname>H.</firstname> <surname>Balakrishnan</surname></author>, <author><firstname>M.</firstname> <surname>Balazinska</surname></author>, <author><firstname>D.</firstname> <surname>Carney</surname></author>, <author><firstname>U.</firstname> <surname>Cetintemel</surname></author>, <author><firstname>Y.</firstname> <surname>Xing</surname></author>, and <author><firstname>S.</firstname> <surname>Zdonik</surname></author>. <article-title>Scalable Distributed Stream Processing</article-title>, <source>In proceedings of 1st Biennial Conf. Innovative Data Systems Research (CIDR)</source>, <fpage>257</fpage>&#x2013;<lpage>268</lpage>. <year>2003</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Scalable+Distributed+Stream+Processing+In+proceedings+of+1st+Biennial+Conf%2E+Innovative+Data+Systems+Research+%28CIDR%29+2003+257-268" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B8-16">[16] <author><firstname>D.J.</firstname> <surname>Abadi</surname></author>, <author><firstname>Y.</firstname> <surname>Ahmad</surname></author>, <author><firstname>M.</firstname> <surname>Balazinska</surname></author>, <author><firstname>U.</firstname> <surname>Cetintemel</surname></author>, <author><firstname>M.</firstname> <surname>Cherniack</surname></author>, <author><firstname>J.H.</firstname> <surname>Hwang</surname></author>, <author><firstname>W.</firstname> <surname>Lindner</surname></author>, <author><firstname>A.S.</firstname> <surname>Maskey</surname></author>, <author><firstname>A.</firstname> <surname>Rasin</surname></author>, <author><firstname>E.</firstname> <surname>Ryvkina</surname></author>, <author><firstname>N.</firstname> <surname>Tatbul</surname></author>, <author><firstname>Y.</firstname> <surname>Xing</surname></author>, and <author><firstname>S.</firstname> <surname>Zdonik</surname></author>. <article-title>The Design of the Borealis Stream Processing Engine</article-title>, <source>In proceedings of 2nd Biennial Conf. Innovative Data Systems Research (CIDR 05)</source>, <year>2005</year>. <ulink url="http://www-db.cs.wisc.edu/cidr">http://www-db.cs.wisc.edu/cidr</ulink> <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=The+Design+of+the+Borealis+Stream+Processing+Engine+In+proceedings+of+2nd+Biennial+Conf%2E+Innovative+Data+Systems+Research+%28CIDR+05%29+2005" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B8-17">[17] <author><firstname>S.</firstname> <surname>Chandrasekaran</surname></author>, <author><firstname>O.</firstname> <surname>Cooper</surname></author>, <author><firstname>A.</firstname> <surname>Deshpande</surname></author>, <author><firstname>M.J.</firstname> <surname>Franklin</surname></author>, <author><firstname>J.M.</firstname> <surname>Hellerstein</surname></author>, <author><firstname>W.</firstname> <surname>Hong</surname></author>, <author><firstname>S.</firstname> <surname>Krishnamurthy</surname></author>, <author><firstname>S.R.</firstname> <surname>Madden</surname></author>, <author><firstname>F.</firstname> <surname>Reiss</surname></author>, and <author><firstname>M.A.</firstname> <surname>Shah</surname></author>. <year>2003</year>. <article-title>TelegraphCQ: continuous dataflow processing</article-title>. <source>In Proceedings of the 2003 ACM SIGMOD international conference on Management of data (SIGMOD &#x2019;03)</source>. <publisher-loc>ACM, New York, NY, USA</publisher-loc>, <fpage>668</fpage>&#x2013;<lpage>668</lpage>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=TelegraphCQ%3A+continuous+dataflow+processing+In+Proceedings+of+the+2003+ACM+SIGMOD+international+conference+on+Management+of+data+%28SIGMOD+%2703%29+2003+668-668" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B8-18">[18] <author><firstname>B.</firstname> <surname>Stegmaier</surname></author>, <author><firstname>R.</firstname> <surname>Kuntschke</surname></author>, and <author><firstname>A.</firstname> <surname>Kemper</surname></author>. <article-title>StreamGlobe: adaptive query processing and optimization in streaming P2P environments</article-title>. <source>In Proceedings of the 1st international workshop on Data management for sensor networks</source> in conjunction with VLDB 2004 (DMSN &#x2019;04). <publisher-loc>ACM, NY, USA</publisher-loc>, <fpage>88</fpage>&#x2013;<lpage>97</lpage>. 2004. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=StreamGlobe%3A+adaptive+query+processing+and+optimization+in+streaming+P2P+environments+In+Proceedings+of+the+1st+international+workshop+on+Data+management+for+sensor+networks+2003+88-97" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B8-19">[19] <author><firstname>V.</firstname> <surname>Gulisano</surname></author>, <author><firstname>R.</firstname> <surname>Jimenez</surname></author>-Peris, <author><firstname>M.P.</firstname> <surname>Martinez</surname></author>, <author><firstname>C.</firstname> <surname>Soriente</surname></author>, and <author><firstname>P.</firstname> <surname>Valduriez</surname></author>. <article-title>StreamCloud: An Elastic and Scalable Data Streaming System</article-title>. <source>IEEE Transations of Parallel Distributed Systems</source>, <volumenum>12</volumenum> (<month>December</month> <year>2012</year>), <fpage>2351</fpage>&#x2013;<lpage>2365</lpage>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=StreamCloud%3A+An+Elastic+and+Scalable+Data+Streaming+System+IEEE+Transations+of+Parallel+Distributed+Systems+2012+2351-2365" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B8-20">[20] <collab>Storm: Distributed and fault-tolerant realtime computation</collab>. <ulink url="http://storm.incubator.apache.org/">http://storm.incubator.apache.org/</ulink></bibliomixed>
<bibliomixed id="B8-21">[21] <collab>S4: Distributed Stream Computing Platform</collab>. <ulink url="http://incubator.apache.org/s4/">http://incubator.apache.org/s4/</ulink></bibliomixed>
<bibliomixed id="B8-22">[22] <collab>Spark: Lightning-fast cluster computing</collab>. <ulink url="http://spark.apache.org/">http://spark.apache.org/</ulink></bibliomixed>
<bibliomixed id="B8-23">[23] <author><firstname>L.</firstname> <surname>Kalinichenko</surname></author>, <author><firstname>M.</firstname> <surname>Missikoff</surname></author>, <author><firstname>F.</firstname> <surname>Schiappelli</surname></author>, <author><firstname>N.</firstname> <surname>Skvortsov</surname></author>. <article-title>Ontological Modeling</article-title> <source>In proceedings of the 5th Russian Conference on Digital libraries</source>, <publisher-loc>St. Petesburgo, Russia</publisher-loc>, <year>2003</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Ontological+Modeling+In+proceedings+of+the+5th+Russian+Conference+on+Digital+libraries+2003" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B8-24">[24] <author><firstname>M.</firstname> <surname>Hauswirth</surname></author>, <author><surname>Manfred</surname></author>, <author><firstname>D.</firstname> <surname>Pfisterer</surname></author> and <author><firstname>S.</firstname> <surname>Decker</surname></author>, <article-title>Making Internet-Connected Objects readily useful</article-title>&#x201D;. <source>In Interconnecting Smart Objects with the Internet Workshop</source>, <publisher-loc>Prague</publisher-loc>, <year>2011</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Making+Internet-Connected+Objects+readily+useful+In+Interconnecting+Smart+Objects+with+the+Internet+Workshop+2011" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B8-25">[25] <author><firstname>J.M.</firstname> <surname>Serrano</surname></author>, <author><firstname>J.C.</firstname> <surname>Strassner</surname></author> and <author><firstname>M.</firstname> <surname>&#x00D3;Foghl&#x00FA;</surname></author>, <article-title>A Formal Approach for the Inference Plane Supporting Integrated Management Tasks in the Future Internet</article-title> <source>1st IFIP/IEEE ManFI International Workshop</source>, In conjunction with 11th IFIP/IEEE IM2009, <fpage>1</fpage>&#x2013;<lpage>5</lpage> <month>June</month> <year>2009</year>, at <publisher-loc>Long Island, NY, USA</publisher-loc>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=A+Formal+Approach+for+the+Inference+Plane+Supporting+Integrated+Management+Tasks+in+the+Future+Internet+1st+IFIP%2FIEEE+ManFI+International+Workshop+2009+1-5" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B8-26">[26] <author><firstname>M.</firstname> <surname>Serrano</surname></author>, <author><firstname>M.</firstname> <surname>Hauswirth</surname></author> and <author><firstname>J.</firstname> <surname>Soldatos</surname></author>, <article-title>Design Principles for Utility-Driven Services and Cloud-Based Computing Modelling for the Internet of Things</article-title>, <source>International Journal of Web and Grid Services</source>, <year>2014</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Design+Principles+for+Utility-Driven+Services+and+Cloud-Based+Computing+Modelling+for+the+Internet+of+Things+International+Journal+of+Web+and+Grid+Services+2014" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B8-27">[27] <collab>OED</collab>, <source>federation n</source>. <article-title>OED Online</article-title>. <month>March</month> <year>2014</year>. <publisher-name>Oxford University Press</publisher-name>. <ulink url="http://www.oed.com/view/Entry/68930?redirectedFrom=federation">http://www.oed.com/view/Entry/68930?redirectedFrom=federation</ulink>. Access on (<month>March</month> <day>28</day>, <year>2014</year>). <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=OED+Online+federation+n+2014" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B8-28">[28] <author><firstname>T.</firstname> <surname>Rakotoarivelo</surname></author>, <author><firstname>M.</firstname> <surname>Ott</surname></author>, <author><firstname>G.</firstname> <surname>Jourjon</surname></author> and <author><firstname>I.</firstname> <surname>Seskar</surname></author>. <article-title>OMF: a control and management framework for networking testbeds</article-title>, <source>in proceedings of ACM SIGOPS Operating Systems Review</source> <volumenum>43</volumenum> (<issue>4</issue>), <fpage>54</fpage>&#x2013;<lpage>59</lpage>, <month>Jan</month>. <year>2010</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=OMF%3A+a+control+and+management+framework+for+networking+testbeds+in+proceedings+of+ACM+SIGOPS+Operating+Systems+Review+2010+4+54-59" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B8-29">[29] <author><firstname>J.</firstname> <surname>Aug</surname></author>&#x00E9; and <author><firstname>T.</firstname> <surname>Friedman</surname></author> (<year>2012</year>) <source>The Open Slice-based Facility Architecture</source> available at <ulink url="http://opensfa.info/doc/opensfa.html">http://opensfa.info/doc/opensfa.html</ulink> <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=The+Open+Slice-based+Facility+Architecture+2012" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B8-30">[30] <author><firstname>D.</firstname> <surname>Le-Phuoc</surname></author>, <author><firstname>M.</firstname> <surname>Dao-Tran</surname></author>, <author><firstname>M.D.</firstname> <surname>Pham</surname></author>, <author><firstname>P.</firstname> <surname>Boncz</surname></author>, <author><firstname>T.</firstname> <surname>Eiter</surname></author>, and <author><firstname>M.</firstname> <surname>Fink</surname></author>. <article-title>Linked Stream Data Processing Engines: Facts and Figures</article-title>. <source>In proceedings of the Semantic Web&#x2013;ISWC 2012</source>, <fpage>300</fpage>&#x2013;<lpage>312</lpage>. <year>2012</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Linked+Stream+Data+Processing+Engines%3A+Facts+and+Figures+In+proceedings+of+the+Semantic+Web-ISWC+2012+2012+300-312" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B8-31">[31] <author><firstname>D.F.</firstname> <surname>Barbieri</surname></author>, <author><firstname>D.</firstname> <surname>Braga</surname></author>, <author><firstname>S.</firstname> <surname>Ceri</surname></author>, and <author><firstname>M.</firstname> <surname>Grossniklaus</surname></author>. <article-title>An execution environment for C-SPARQL queries</article-title>. <source>In Proceedings of the 13th International Conference on Extending Database Technology (EDBT &#x2019;10).</source> <publisher-loc>ACM, New York, NY, USA</publisher-loc>, <fpage>441</fpage>&#x2013;<lpage>452</lpage>. DOI=10.1145/1739041.1739095. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=An+execution+environment+for+C-SPARQL+queries+In+Proceedings+of+the+13th+International+Conference+on+Extending+Database+Technology+%28EDBT+%2710%29%2E+2012+441-452" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B8-32">[32] <author><firstname>D.</firstname> <surname>Le-Phuoc</surname></author>, <author><firstname>M.</firstname> <surname>Dao-Tran</surname></author>, <author><firstname>J.X.</firstname> <surname>Parreira</surname></author> and <author><firstname>M.</firstname> <surname>Hauswirth</surname></author>. <article-title>A native and adaptive approach for unified processing of linked streams and linked data</article-title>. <source>The Semantic Web&#x2013;ISWC 2011</source>, <fpage>370</fpage>&#x2013;<lpage>388</lpage>. <year>2011</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=A+native+and+adaptive+approach+for+unified+processing+of+linked+streams+and+linked+data+The+Semantic+Web-ISWC+2011+2011+370-388" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B8-33">[33] <author><firstname>D.</firstname> <surname>Anicic</surname></author>, <author><firstname>P.</firstname> <surname>Fodor</surname></author>, <author><firstname>S.</firstname> <surname>Rudolph</surname></author>, and <author><firstname>N.</firstname> <surname>Stojanovic</surname></author>. <article-title>EP-SPARQL: a unified language for event processing and stream reasoning</article-title>. <source>In Proceedings of the 20th International World-Wide Web Conference</source>, pages <fpage>635</fpage>&#x2013;<lpage>644</lpage>. <publisher-loc>ACM</publisher-loc>, <year>2011</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=EP-SPARQL%3A+a+unified+language+for+event+processing+and+stream+reasoning+In+Proceedings+of+the+20th+International+World-Wide+Web+Conference+2011+635-644" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B8-34">[34] <collab>RDF Stream Processing Community Group</collab>, (online access <month>may</month> <year>2015</year>) <ulink url="http://www.w3.org/community/rsp/">http://www.w3.org/community/rsp/</ulink></bibliomixed>
<bibliomixed id="B8-35">[35] <author><firstname>D.</firstname> <surname>Le-Phuoc</surname></author>, <author><firstname>H.N.</firstname> <surname>Mau-Quoc</surname></author>, <author><firstname>C.</firstname> <surname>Le-Van</surname></author> and <author><firstname>M.</firstname> <surname>Hauswirth</surname></author>. <article-title>Elastic and Scalable Processing of Linked Stream Data in the Cloud.</article-title> <source>In proceedings of International Semantic Web Conference</source> (<issue>1</issue>) <year>2013</year>: <fpage>280</fpage>&#x2013;<lpage>297</lpage>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Elastic+and+Scalable+Processing+of+Linked+Stream+Data+in+the+Cloud%2E+In+proceedings+of+International+Semantic+Web+Conference+2013+1+280-297" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B8-36">[36] <author><firstname>J.</firstname> <surname>Hoeksema</surname></author> and <author><firstname>S.</firstname> <surname>Kotoulas</surname></author>. <article-title>High-performance Distributed Stream Reasoning using S4</article-title>, <source>In proceedings of Ordering workshop of ISWC2011</source>. <year>2011</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=High-performance+Distributed+Stream+Reasoning+using+S4+In+proceedings+of+Ordering+workshop+of+ISWC2011+2011" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B8-37">[37] <author><firstname>P.</firstname> <surname>Barnaghi</surname></author>, <author><firstname>W.</firstname> <surname>Wang</surname></author>, <author><firstname>C.</firstname> <surname>Henson</surname></author>, <author><firstname>K.</firstname> <surname>Taylor</surname></author>, <article-title>Semantics for the Internet of Things: early progress and back to the future</article-title>&#x201D;, <source>International Journal on Semantic Web and Information Systems (special issue on sensor networks, Internet of Things and smart devices)</source>, <month>September</month> <year>2012</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Semantics+for+the+Internet+of+Things%3A+early+progress+and+back+to+the+future+International+Journal+on+Semantic+Web+and+Information+Systems+%28special+issue+on+sensor+networks%2C+Internet+of+Things+and+smart+devices%29+2012" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B8-38">[38] <author><firstname>P.</firstname> <surname>Barnaghi</surname></author>, <author><firstname>P.</firstname> <surname>Cousin</surname></author>, <author><firstname>P.</firstname> <surname>Malo</surname></author>, <author><firstname>M.</firstname> <surname>Serrano</surname></author> and <author><firstname>C.</firstname> <surname>Viho</surname></author>, <article-title>Simpler IoT word(s) of tomorrow, more interoperability challenges to cope today</article-title>, <source>Book chapter in 2013 European Research Cluster for the Internet of Things Book, Internet of Things Converging Technologies for Smart Environments and Integrated Ecosystems</source>, <publisher-name>River Publishers</publisher-name>, <year>2013</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Simpler+IoT+word%28s%29+of+tomorrow%2C+more+interoperability+challenges+to+cope+today+Book+chapter+in+2013+European+Research+Cluster+for+the+Internet+of+Things+Book%2C+Internet+of+Things+Converging+Technologies+for+Smart+Environments+and+Integrated+Ecosystems+2013" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
</bibliography>
</chapter>
<chapter class="chapter" id="ch09" label="9" xreflabel="ch09">
<title>Driving Innovation through the Internet of Things &#x2013; Disruptive Technology Trends</title>
<authorgroup>
<emphasis role="strong"><author><firstname>Ovidiu</firstname> <surname>Vermesan</surname></author><superscript>1</superscript>, <author><firstname>Mario Diaz</firstname> <surname>Nava</surname></author><superscript>2</superscript> and <author><firstname>Hanne</firstname> <surname>Grindvoll</surname></author><superscript>1</superscript></emphasis>
</authorgroup>
<para><superscript>1</superscript>SINTEF, Norway</para>
<para><superscript>2</superscript>STMicroelectronics, France</para>
<para>&#x201C;Chance favors the connected mind.&#x201D; Steven Johnson</para>
<section class="lev1" id="sec9.1" label="9.1" xreflabel="sec9.1">
<title>Introduction</title>
<para>The development of enabling technologies such as nanoelectronics, communications technologies, sensors/actuators, embedded systems, cloud networking, network virtualization and software will be essential to provide things (medical equipment, vehicles, home appliances, equipment for health- and well-being, monitoring of e.g. assets, pollution, water, wildlife, just to mention a few examples) with the capability to be connected at anytime, anywhere. This development provides a bright future for Internet of Things (IoT) and Industrial Internet of Things (IIoT) product innovations that can influence many different sectors (consumer, industrial, business, etc.). Some of these technologies, such as embedded or cyber-physical systems (CPS), see <link linkend="F9.1">Figure <xref linkend="F9.1" remap="9.1"/></link>, bridge the gap between cyber space and the physical world of real things, and they are crucial in enabling the IoT to deliver its vision and become part of bigger systems in a world of &#x201C;systems of systems&#x201D;.</para>
<fig id="F9.1" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 9.1</label>
<caption><para>Complexity of Systems.</para></caption>
<graphic xlink:href="graphics/fig9_1.jpg"/>
</fig>
<para>Electronic Components and Systems are a pervasive key enabling technology for IoT and CPS, impacting all industrial branches. The cyber-physical systems are defined as &#x201C;the next generation embedded intelligent ICT systems that are interconnected, interdependent, collaborative, autonomous, and provide computing and communication, monitoring/control of physical components/processes in various applications.&#x201D;</para>
<para>Future CPS need to be scalable, distributed, and decentralized allowing interaction with humans, environment and machines while being connected to the Internet or other networks. Adaptability, reactivity, optimality and security are features to be embedded in such systems, as CPS are now forming an invisible `neural network' of society. CPS leverage cloud computing and IoT capabilities in embedded system's context, while focusing on the various system functions including smart systems integration and a &#x201C;system of systems&#x201D; convergence. Cyber-physical systems are one of the most complex systems that form IoT applications.</para>
<para>IIoT adds tougher requirements to the networks for latency, determinism, and bandwidth, while bringing increased complexity considering thousands of connected complex industrial systems that communicate and coordinate the data analytics and actions to improve performance and efficiency and reduce or eliminate downtime. In addition IIoT systems must be adaptive and scalable through software or added functionality that integrates with the overall application solution. In this context, governments will need to make an even bigger investment in digital infrastructure if they are to facilitate the IIoT, as its success is heavily dependent on the presence of robust infrastructures, such as ubiquitous broadband connectivity and sensors.</para>
</section>
<section class="lev1" id="sec9.2" label="9.2" xreflabel="sec9.2">
<title>Intelligent Edge and Web-Enabled Devices</title>
<para>The IoT development will be realized by creating plug and play, web-enabled, sensing/actuating/communicating devices, by providing common hardware/software/cloud platforms on which they can communicate and exchange information, and by developing new tools and applications.</para>
<para>Enablers are the intelligent edge devices (sensor/actuators, multi communication protocols integrated with processing units/microcontrollers and having features like low-power, low cost, embedded security) and the developed hardware/embedded software platforms including development tools.</para>
<para>The different embodiments of the Internet such as IoT and IIoT will be followed by the emergence of the Tactile Internet which is another paradigm shift, in which responsive, reliable network connectivity will enable it to deliver physical, tactile experiences remotely. The requirements will be very high reliability, very low latency and short end-to-end delays (milliseconds) and high network capacity to allow large numbers of devices to communicate with each other simultaneously and autonomously.</para>
<para>For the deployment of IoT technology and applications there is a need for infrastructure development in order to accelerate the IoT adoption. Advancements are needed for integrated sensors/actuators with communication capabilities, sensor interfaces, sensor-specific micro controllers, data management, communication protocols and targeted application tools, platforms and interfaces.</para>
<para>Ubiquitous connectivity is emerging and standards for IoT are used in many applications. Connectivity components, networking hardware, gateways will continue to be profitable and considering the various requirements will be able to differentiate themselves and make money with toolsets for deployment and development, analogous to the offerings of companies in the open source space.</para>
<para>Cloud/Fog computing enables the connection with the edge and provides devices with all the intelligence processed in the cloud. The data captured from the edge devices can be processed and data analytics and data mining algorithms will generate the &#x201C;smart data&#x201D; needed for various IoT applications.</para>
<para>The semiconductor stakeholders that focus primarily on the intelligent edge and Web-enabled devices are supporting the development of broader IoT ecosystems and identify roles as both enablers and creators of value for their customers and their customers' customers. This creates partnerships with stakeholders further downstream, such as companies that are building and providing gateways, connectivity, middleware, cloud-based products, services and IoT applications.</para>
<para>A challenge for these IoT ecosystems is that different industries are at different levels of maturity and complexity with respect to the Internet of Things, so the roles that components manufacturers can have in application development in certain industries will vary, as will the timing of growth opportunities. In this context few markets (building/home automation, lighting) have established a number of common APIs (Application Programming Interfaces) and the open question remains related to competing standards. Other markets (monitoring and control systems in manufacturing, IoT technologies in retail) are fragmented and will require longer time to develop. In the case of markets where the standards are under development or missing, semiconductor companies are forming alliances with hardware companies, systems players, and customers to support and assist the development of standards. The smart manufacturing IoT applications are much more complex with most of the hardware platforms that are still proprietary and the data is not accessible outside the close system. In these cases the challenge is to create common standards and keep the compatibility and interoperability with legacy systems. Industry 4.0 and the Industrial Internet Consortium initiatives are aiming to develop such standards in order to fill the gap. The semiconductor stakeholders designing intelligent edge and Web-enabled devices are involved in alliances and standard-setting activities in order to play a role in defining best practices in IoT privacy, security, and authentication, issues that are critical in markets, such as healthcare and wearables, which are dealing with sensitive consumer data.</para>
<para>In this context the strategy for IoT applications is to support a hardware platform by designing a family of devices that are sufficiently flexible to address the needs of multiple industries, that can be used in industrial IoT and consumer IoT applications that have similar characteristics. These devices are covering the application requirements, at one end, high-power, high-performance, application-processing IoT devices, and, at the other end, low-cost, ultralow-power integrated sensors that support sufficient (optimised) functionality and autonomous device operation. These requirements push the semiconductor companies to come with new approaches for product and application development in order to achieve a higher level of design flexibility and to address the IoT applications opportunity.</para>
<para>Many industry research firms, including ABI, Gartner, IDC and IHS, forecast the number of connected devices to be in the range of 20 to 30 billion by 2020. Looking at the semiconductor industry, alone, the
growth potential is huge. IoT-related semiconductor sales is expected to grow 19 percent, reaching &#x0024;5.6 billion in 2015, according to the 2015 IC Insights IC Market Drivers report <link linkend="B9-5">[5]</link>. The market research firm projects the market will reach &#x0024;11.5 billion in 2018, see <link linkend="F9.2">Figure <xref linkend="F9.2" remap="9.2"/></link>, translating into a compound annual growth rate of 24.3 percent over the forecast period of 2013 to 2018. The largest IoT semiconductor market segment will continue to be connected cities, including &#x201C;smart&#x201D; electric grids, roads and streetlights, and other public infrastructure applications <link linkend="B9-4">[4]</link>. Sales for this segment is projected to reach &#x0024;4.2 billion with a CAGR of 15 percent over the forecast period. Industrial Internet follows with a projected &#x0024;4.1 billion in sales. Industrial Internet is expected to nearly catch up with connected cities primarily due to high growth in factories, logistics, and medical systems applications.</para>
<fig id="F9.2" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 9.2</label>
<caption><para>IoT Semiconductor sales by systems segments.</para></caption>
<graphic xlink:href="graphics/fig9_2.jpg"/>
</fig>
<para>Semiconductor revenues for the connected homes is expected to surpass the &#x0024;1 billion mark in 2018 with a CAGR of 32.8 percent, up from &#x0024;275 million in 2013. Connected automotive systems-mainly in passenger vehicles-offers a high growth potential between 2013 and 2018 with a CAGR of 43.8 percent, reaching &#x0024;1.5 billion in 2018. Semiconductor sales for wearable systems that connect to the Internet are forecasted to reach &#x0024;528 million in 2018 with a CAGR of 46.9 percent over the forecast period.</para>
<para>In 2018, IoT-related ICs will account for about three percent of the total &#x0024;348.1 billion IC market. Beyond embedded IoT subsystems in connected applications, the proliferation of the Internet of Things will expand the use of cloud computing and web servers as well as require upgrades to the overall Internet infrastructure in order to handle growing amounts of data coming from attached systems and things by 2020 <link linkend="B9-5">[5]</link>.</para>
<para>IC Insights forecasts that web-connected things will account for 85 percent of nearly 29.5 billion Internet connections worldwide by 2020 as long as &#x201C;missing IoT standards&#x201D; are developed over the next several years, adding to the more than half-dozen existing initiatives for IoT around availability, ease of connection, and compatibility across platforms in different industry sectors. That is up from about 74 percent of the 7.7 billion Internet connections to things in 2010. IC Insights estimates that sales generated by the IoT portion of systems (i.e., the functions for Internet communications and sensor subsystems) will total &#x0024;48.3 billion in 2014 and grow 19 percent to &#x0024;57.7 billion in 2015. By 2018, IoT subsystems in equipment and Internet-connected things is forecasted to reach &#x0024;103.6 billion worldwide, up from &#x0024;39.8 billion in 2013, translating into a CAGR of 21 percent over the forecast period <link linkend="B9-4">[4]</link>.</para>
<para>The IoT, as defined by McKinsey and the GSA <link linkend="B9-6">[6]</link>, refers to sensors that communicate over the Internet without human intervention. That definition includes wearables and smartphones, both of which communicate autonomously if allowed. It also includes smart devices for vehicles, homes, and cities, and for healthcare and industrial equipment. The report identifies several challenges that can delay the IoT deployment and the McKinsey/GSA survey sees six significant obstacles <link linkend="B9-6">[6]</link>.</para>
<para><emphasis role="strong">Security and privacy of user data</emphasis>. Security is an important requirement for growth in IoT applications. The report noted that the real challenge lies in using available technology to implement end-to-end security solutions for the entire IoT stack-cloud, servers, and devices.</para>
<para><emphasis role="strong">Difficulty building customer demand in a fragmented market</emphasis>. Demand for IoT applications is in its early stages, and its future growth is expected to result from a string of attractive but small opportunities that use a common hardware and software platform, rather than a single &#x201C;killer application&#x201D; Semiconductor companies can indirectly play a role in boosting consumer demand by helping developers create innovative applications or by providing assistance to businesses that want to use IoT products and services, including non-traditional clients like start-ups and businesses outside the technology sector-for instance, retailers or hospitals. Users of IoT devices need to be able to derive real, repeatable benefits and ROI from the technology and new business models have to be proposed.</para>
<para><emphasis role="strong">Lack of consistent standards</emphasis>. Some levels of the IoT stack have widely accepted, well-defined standards, but others have none. In still others, there are multiple, competing standards with no obvious winner. <link linkend="F9.3">Figure <xref linkend="F9.3" remap="9.3"/></link> shows the multiple standards for connectivity. Given the current uncertainty, semiconductor players should pursue a hedging strategy &#x2013; in other words, focusing on selected standards that are likely to gain widespread acceptance but planning for alternative scenarios. In parallel, semiconductor companies should actively engage with industry associations or other groups that are trying to develop IoT standards, with the goal of supporting the best ones. Such collaboration is important even when companies are trying to help create marketplace standards. This lack of standards is particularly the case among emerging protocols with low-power consumption like LTE Cat.0, 802.11ah, Sigfox, and OnRamp.</para>
<fig id="F9.3" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 9.3</label>
<caption><para>IoT Standards <link linkend="B9-6">[6]</link>.</para></caption>
<graphic xlink:href="graphics/fig9_3.jpg"/>
</fig>
<para><emphasis role="strong">A fragmented marketplace with many niche products</emphasis>. Most IoT applications do not generate enough sales to justify design of a single chip specifically targeted at them. The fragmentation represents a concern because it limits economies of scale, thus raising production costs.</para>
<para>Semiconductor companies may be able to achieve the necessary sales volume by classifying IoT devices into archetypes based on their specifications. The companies can then create a single platform to cover each archetype, which will have more widespread appeal than a chip tailored to a niche application.</para>
<para><emphasis role="strong">The challenge of extracting more value from each application</emphasis>. Many semiconductor companies would not extract full value from the IoT if they focused solely on silicon, so they were determined to deliver complete solutions that cover multiple layers of the technology stack. The opportunities include software, security, systems integration and many companies are looking to add value at multiple layers of the technology stack, through software, security, and systems integration, as can be seen in <link linkend="F9.4">Figure <xref linkend="F9.4" remap="9.4"/></link>.</para>
<para><emphasis role="strong">Technological issues that affect the IoT's functionality</emphasis>. Many companies look very confident that they solved the technological needed for the success of the IoT. However, there are companies that consider that technical issues can be a major challenge. Lower power consumption is mentioned as the key improvement that could substantially stimulate demand.</para>
<fig id="F9.4" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 9.4</label>
<caption><para>Value beyond silicon and software <link linkend="B9-6">[6]</link>.</para></caption>
<graphic xlink:href="graphics/fig9_4.jpg"/>
</fig>
</section>
<section class="lev1" id="sec9.3" label="9.3" xreflabel="sec9.3">
<title>IoT Ecosystems</title>
<para>The IoT technology developments have resulted in the creation of many interfaces, devices, operating systems, and applications while the data generated and the security have to be integrated and managed. In this context the success of IoT applications and deployments depends on the involvement of various stakeholders in the value chain that form an ecosystem around various technology platforms. The ecosystems provide efficiencies of scale to develop for customers. In this context the further IoT developments require the use of platform-based approaches that includes flexible hardware architecture deployed across many applications by removing significant amount of the hardware complexity and transform each new problem primarily into a communication and software defined challenge. The same principle needs to be applied to software tools to form powerful hardware-communication-software-analytics platform that creates a unified solution. An effective platform-based approach does not focus on one technology or hardware/software but instead on the innovation within the application itself.</para>
</section>
<section class="lev1" id="sec9.4" label="9.4" xreflabel="sec9.4">
<title>IoT Platforms</title>
<para>IoT platforms are the highest, most generalized layer of intelligence and user interface, that ties together connected devices and web-based services. They collectively define a reference architecture model for the IoT, taking into consideration a wide range of technologies, communication protocols and standards.</para>
<para>An IoT platform must allow external users and devices to connect to it, based on a governance model, which is the basis to decide &#x201C;who gets what&#x201D;. IoT platforms must be able to coordinate and manage connectivity issues, and to guarantee the security and privacy of the data exchanged, by a large number of networked devices while overcoming interoperability issues. Agreeing upon a pre-defined set of protocols to share certain services, a federation of platforms will allow optimizing the use of the resources, improving service quality and most likely reducing costs.</para>
<para>Architectural decisions to define IoT platforms must ensure that the developed solution implements a horizontal approach to overcome the existent vertical fragmentation. Furthermore, IoT platforms should address both technological and semantic interoperability issues among heterogeneous IoT devices. Additionally, platforms should be able to minimize the complexity of collecting and processing massive amounts of data generated in IoT scenarios; address scalability and security issues; and guarantee that the developed solution is built upon open-source software, to allow portability and reduce product development costs -while encouraging creativity and collaboration among the various IoT stakeholders.</para>
<para>IoT platforms need to provide solutions to assimilate data from multiple vendors and support open API interfaces across platforms. This requires taking into consideration issues such as: openness, participation, accountability, effectiveness, coherence, etc., while offering innovative solutions that enable self-governance, self-management, and context aware scalability. Following this approach, IoT platforms should include the following elements:
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>Abstraction Layer &#x2013; abstracting physical IoT devices and resources into virtual entities and representations, enabling interoperability through uniform access to heterogeneous devices and resources over multiple communication protocols such as MQTT, Restful, etc.</para></listitem>
<listitem><para>Virtualization Layer &#x2013; providing service look-up mechanisms that bridge physical network boundaries and offer a set of consumable services.</para></listitem>
<listitem><para>Data management Framework &#x2013; enabling storage, caching and querying of collected data as well as data fusion and event management, while considering scalability aspects.</para></listitem>
<listitem><para>Semantic Representation Framework &#x2013; for modelling and management of semantic knowledge.</para></listitem>
<listitem><para>Security and Policy Framework &#x2013; implementing Access Control mechanisms and Federation Identity management responsible for authentication and authorization policies and for enabling federation among several IoT platforms respectively.</para></listitem>
<listitem><para>Networking Framework &#x2013; enabling communication within and across platforms, providing means for self-management (configuration, healing and optimization) through cognitive algorithms.</para></listitem>
<listitem><para>Open Interfaces &#x2013; set of open APIs (possibly cloud-based) to support IoT applications, and ease platform extension by enabling easy interaction and quick development of tools on top of the platform.</para></listitem>
<listitem><para>Data Analytics services &#x2013; providing &#x201C;real time&#x201D; event processing, a self-service rule engine to allow users to define simple and complex rules, and querying, reporting and data visualization capabilities.</para></listitem>
<listitem><para>Machine learning data analytics &#x2013; a set of complex machine learning algorithms, for providing real-time decision capabilities.</para></listitem>
<listitem><para>Development tools and standardized toolkits &#x2013; for fast development of (possibly cloud-based) IoT applications that can be integrated by different companies.</para></listitem>
</itemizedlist></para>
<para>Developments of IoT platforms involves an entire ecosystem of stakeholders covering the whole value chain of the IoT that together coordinate and deliver the functionalities and the services required by the various supported IoT applications.</para>
<para>The lack of skills at the application level to capitalize on the IoT, requires a loosely coupled, modular software environment based on APIs to enable endpoint data collection and interaction. The Web platforms using APIs can be used to simplify programming, deliver event-driven processes in real time, provide a common set of patterns and abstractions and enable scale. In this context new tools, search engines and APIs are needed to facilitate rapid prototyping and development of IoT applications. <link linkend="F9.5">Figure <xref linkend="F9.5" remap="9.5"/></link> shows an example of an IoT device platform developed by ARM.</para>
<fig id="F9.5" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 9.5</label>
<caption><para>ARM mbed IoT Device Platform <link linkend="B9-10">[10]</link>.</para></caption>
<graphic xlink:href="graphics/fig9_5.jpg"/>
</fig>
<para>As IoT applications are being developed and more devices and things are gaining connectivity, platforms for new businesses are expected to emerge in the field of IoT. Following this approach, recent interest areas for emerging platforms include sectors where connectivity is coming in such as smart cities, health care, education and electricity grids sectors. The biggest challenge in these areas concern the governance models, which in its majority are still missing. Additionally, private and public companies from these sectors lack motivation to share already available data and thus it is not possible to extract any value from it. To overcome this, building economic incentives around the openness of data becomes of main importance.</para>
<para>The traditional value chain of the technology sector, where technology companies primarily sold to each other, is not a valid approach for the IoT ecosystem. The deployment of new dynamic networks in the IoT domain is needed, where connected products and people are in charge of driving the new information values expected from intelligent device networking. IoT ecosystems will be driven by companies able to identify and &#x2013;innovatively- eliminate barriers to adoption, rather than creating solutions for use cases found within the &#x201C;empty&#x201D; spaces.</para>
<para>IoT is a disruptive technology that attracted the interest of many companies in the last few years and as result there are many IoT platforms available for developers to build applications and interconnect devices. An example is the Intel IoT Platform shown in <link linkend="F9.6">Figure <xref linkend="F9.6" remap="9.6"/></link>. These IoT platforms provide hardware components, communication/transport layer, ability to host data in the cloud and the ability to analyze the generated data. The IoT platforms available are platforms that are backed by large companies and consortia such as Allseen Alliance, Homekit, Open Interconnect Consortium, and IBM Internet of Things Ecosystem, ARM, Intel or niche platforms either vertical or use case specific: Litmus automation, Xively, Electric imp, Ayla networks etc. The nature of these platforms has contributed to fragmentation of IoT and IIoT infrastructure and contributed to a race between these companies to own the vertical stack rather than develop products or services that benefit all users and developers. There are few open source platforms in the Internet of Things that can reduce product development costs and encourage creativity and collaboration. Today IoT devices in many cases are installed in their platform and ecosystem.</para>
<para>An overview of existing commercial IoT platforms is given in the following paragraphs.</para>
<para><emphasis role="strong">Axeda</emphasis> <link linkend="B9-1">[1]</link> &#x2013; Axeda provides a cloud-based platform for managing connected products and machines and implementing IoT and M2M (machine-to-machine) applications. The platform is used to transform machine data into valuable insights, build and run applications and integrate machine data with other applications and systems to optimize business processes. Axeda's platform encompasses the area of developing and deploying applications and integrating M2M learning into business processes, from preventative data security measures all the way to device provisioning and configuration.</para>
<para><emphasis role="strong">ThingWorx</emphasis> <link linkend="B9-2">[2]</link> &#x2013; ThingWorx facilitates the streamlined creation of end-to-end smart applications for agriculture, cities, grid, water, building and telematics. Traditional industries are transformed and equipped with modern-day connectivity and smarter solutions through connected devices that provide comprehensive data collection and analysis for data-driven decision-making. ThingWorx reduces the time, cost and risks of building M2M and IoT applications. Users can build comprehensive mobile interfaces with zero coding, take advantage of ThingWorx Composer for application modeling, as well as real-time dashboards and collaborative workspaces &#x2013; all with the scalability to support millions of devices.</para>
<fig id="F9.6" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 9.6</label>
<caption><para>Intel&#x00AE; IoT Platform <link linkend="B9-11">[11]</link>.</para></caption>
<graphic xlink:href="graphics/fig9_6.jpg"/>
</fig>
<para><emphasis role="strong">SAP Internet of Things Solutions</emphasis> <link linkend="B9-3">[3]</link> &#x2013; SAP's IoT solutions facilitate connectivity and multi-directional communication to enable users to interact with their devices in new ways. Transforming operations in field service and remote asset management, providing supply chain visibility and predicting and remedying logistics bottlenecks are just some of the challenges solved by SAP's remote maintenance and service, connected logistics and connected retail solutions for the IoT.</para>
<para><emphasis role="strong">Microsoft Azure IoT Suite</emphasis> <link linkend="B9-7">[7]</link> &#x2013; Azure is Microsoft's cloud-computing platform that provides the infrastructure to build and manage apps in the cloud. Azure Internet of Things Suite is an integrated service that makes use of all the relevant Azure capabilities to connect devices. The suite captures the varied data these devices generate. The Azure Internet of Things Suite integrates and organizes the flow of this data, manages it, analyses it and presents it in a format that helps humans to take appropriate decisions. This highly analyzed and managed data also helps in automation of various processes and operations.</para>
<para><emphasis role="strong">Ayla Networks</emphasis> <link linkend="B9-8">[8]</link> &#x2013; Ayla Networks is a cloud-based application enablement platform that offers a cost-effective solution for OEMs to connect any device to the Internet. With an adaptive element for building innovative applications that bridge communications between device, cloud and application, Ayla Networks provides software agents embedded in both connected devices and mobile device applications for end-to-end support. Ayla Networks platform can integrate secure connectivity and data intelligence into products without significant design or business model modifications.</para>
<para><emphasis role="strong">Xively</emphasis> <link linkend="B9-9">[9]</link> &#x2013; Xively is a LogMeIn product built on the Gravity Cloud that integrate physical devices and associated data with existing CRM, ERP or other business systems. Xively streamlines development with a PaaS model with searchable libraries of objects and permissions for dozens of languages and platforms, and Xively's RESTful API supports multiple data formats, including JSON, XML and CSV. The open source libraries provide a range of options and integrations with automation platforms such as Salesforce.com and SAP.</para>
<para><emphasis role="strong">ARM</emphasis> <link linkend="B9-10">[10]</link> &#x2013; ARM creates sensors, controllers, microprocessors and other types of embedded intelligence for the IoT, enabling objects to sense variables in the environment communicate with other devices and objects and interact with cloud-based applications and other networks. ARM licenses technology to various partners, enabling organizations to add value and differentiate themselves from competitors.</para>
<para><emphasis role="strong">Intel</emphasis> <link linkend="B9-11">[11]</link> &#x2013; The Intel&#x00AE; IoT Platform provides an end-to-end platform for connecting the unconnected, allowing data from billions of devices, sensors, and databases to be securely gathered, exchanged, stored, and analyzed across multiple industries. The key benefits are security, interoperability, scalability and manageability by using advanced data management and analytics from sensor to datacenter.</para>
<para><emphasis role="strong">Jasper</emphasis> <link linkend="B9-12">[12]</link> &#x2013; Jasper provides features to launch, manage and monetize connected devices and IoT applications. The configurable Jasper Control Board Platform is customizable to suit specific operational needs, business models and requirements across industries and across different geographical locations. Jasper serves IoT needs such as connected cars and enterprise mobility, offering network visibility across devices and real-time monitoring for precise control and deeper insights to drive decision-making.</para>
<para><emphasis role="strong">AllJoyn</emphasis> <link linkend="B9-13">[13]</link> &#x2013; AllJoyn enables compatible devices within proximity to recognize one another, communicate and share data across brands, networks and operating systems. AllJoyn is an open-source project of the AllSeen Alliance, providing a common central language to support the Internet of Things and empowering developers and manufacturers with the tools and technologies they need for forward-thinking IoT innovation.</para>
<para><emphasis role="strong">Bosch Software Innovations Suite</emphasis> <link linkend="B9-14">[14]</link> &#x2013; The Bosch Software Innovations Suite is modular for advanced flexibility, enabling device management, business process management, and business rules management for the IoT. It integrates seamlessly with existing IT infrastructures for streamlined connectivity and enhanced data analytics. The Bosch Software Innovations Suite is powering the IoT by connecting the four key elements of the ecosystem: People (Users), Things, Enterprises and Partners.</para>
<para><emphasis role="strong">IBM Bluemix<superscript>TM</superscript> and Bluemix IoT Foundations<superscript>TM</superscript></emphasis> <link linkend="B9-15">[15]</link> &#x2013; IBM Bluemix<superscript>TM</superscript> is a PaaS platform for public, private, and hybrid Cloud deployments. Bluemix IoT Foundations is a component of IBM Bluemix that allows to easily integrate IoT devices within the offered PaaS services and to rapidly build new IoT applications. IoT Foundations enables device-to-Cloud registration and security, and scalable communication through transparent MQTT-based services. IoT data flows can be easily combined with other Bluemix services through rich APIs or interactive flow based GUIs.</para>
<para><emphasis role="strong">OpenRemote</emphasis> <link linkend="B9-32">[32]</link> &#x2013; OpenRemote is an open-source middleware solution for the Internet of Things, allowing you to integrate any device, regardless of brand or protocol, and design any user interface for iOS, Android or web browsers. Using OpenRemotes cloud-based design tools for developing completely customized solutions, upgrades are streamlined, meaning your devices are literally future-proof.</para>
<para><emphasis role="strong">Arrayent</emphasis> <link linkend="B9-33">[33]</link> &#x2013; Arrayent is an IoT platform for connected objects, enabling major brands like Whirlpool, Maytag and First Alert to bring smart, connected devices to consumers. The platform addresses both ends of the product spectrum with both enterprise and consumer apps, coupled with data analytics and a mobile framework for a complete plug-and-play installation at a reasonable cost. The platform scales to support millions of devices.</para>
<para><emphasis role="strong">Echelon</emphasis> <link linkend="B9-34">[34]</link> &#x2013; Echelon is an Industrial Internet of Things (IIoT) platform with a full suite of chips, stacks, modules, interfaces and management software for developing devices, peer-to-peer communities and applications delivered via the IzoT Device Stack, IzoT Server Stack and FT 6000 EVK. Echelon is distinct from a consumer IoT platform by addressing the core requirements for the IIoT, including autonomous control, industrial-strength reliability, support for legacy evolution and exceptional security.</para>
<para><emphasis role="strong">Wind River</emphasis> <link linkend="B9-35">[35]</link> &#x2013; Wind River has been providing connected intelligence of the IoT-caliber for decades. Wind River provides a foundation for the reliable and efficient operation of IoT networks and connected devices for highly-regulated industries and mission-critical applications. Wind Rivers connects legacy devices to the IoT, Manages sensor data, provide real-time monitoring and analysis, powers sophisticated applications for automotive, aerospace and more, and converge siloed systems.</para>
<para><emphasis role="strong">Contiki</emphasis> <link linkend="B9-36">[36]</link> &#x2013; Contiki is an open-source operating system for the Internet of Things, connecting low-cost, low-power microcontrollers to the Internet and enabling rapid, streamlined development. Instant Contiki provides an entire development environment in a single download, and applications are written in standard C. With the Cooja simulator Contiki networks can be emulated before burned into hardware; Contiki runs on a range of low-power wireless devices &#x2013;- most of which can be purchased easily via the Internet. There are a variety of hardware platforms available for free within the Contiki code.</para>
<para><emphasis role="strong">SensorCloud</emphasis> <link linkend="B9-37">[37]</link> &#x2013; SensorCloud is a solution from LORD MicroStrain, a company that produces smart, embedded transducers, sensors and sensor networks. SensorCloud provides integrated Big Data analytics, automated alerts and actionable reports for predictive maintenance and streamlined monitoring of connected devices. It includes a unique data storage, virtualization and remote management platform, and SensorCloud supports any device, sensor or sensor network through an OpenData API.</para>
<para>There are a lot of developments of IoT platforms which makes it impossible to cover them all in this section, but some are referred in [<link linkend="B9-38">38</link>&#x2013;<link linkend="B9-70">70</link>].</para>
</section>
<section class="lev1" id="sec9.5" label="9.5" xreflabel="sec9.5">
<title>IoT Alliances</title>
<para>The Internet of Things applications will be built using complex structures of hardware, sensors/actuators, applications and intelligent devices that need to be able to communicate locally, globally and across industrial verticals.</para>
<para><emphasis role="strong">Alliance for Internet of Things Innovation (AIOTI)</emphasis> <link linkend="B9-18">[18]</link> &#x2013; brings together different industries, different sectors (energy, utilities, automotive, mobility, lighting, buildings, manufacturing, well-being, supply chains, cities etc.) and some of Europe's largest tech and digital companies. The AIOTI is an important tool for supporting the policy and dialogue within the IoT ecosystem and with the European Commission and expands activities towards innovation within and across industries. The alliance concentrates on the definition and design of IoT Large Scale Pilots to be funded under the Horizon 2020 Research and Innovation Programme, and will help to build the links and forge the cross-sectorial synergies required for this, as cooperation is crucial for the development of the IoT. The initiative cuts across several technological areas such as smart systems integration, cyber-physical systems, smart networks, and Big Data; and targets SME and IoT innovators to create an open IoT environment. The AIOTI brings together different industries: nanoelectronics/semiconductor companies, Telecom companies, network operators, platform providers (IoT/Cloud), security, service providers and different sectors: energy, utilities, automotive, mobility, lighting, buildings, manufacturing, healthcare, supply chains, cities, etc.</para>
<para><emphasis role="strong">Industrial Internet Consortium (IIC)</emphasis> <link linkend="B9-19">[19]</link> &#x2013; brings together the organizations and technologies necessary to accelerate growth of the Industrial Internet by identifying, assembling and promoting best practices. Membership includes small and large technology innovators, vertical market leaders, researchers, universities and governments. This goal of the IIC is to drive innovation through the creation of new industry use cases and test beds for real-world applications; define and develop the reference architecture and frameworks necessary for interoperability; influence the global development standards process for internet and industrial systems; facilitate open forums to share and exchange real-world ideas, practices, lessons, and insights and build confidence around new and innovative approaches to security.</para>
<para><emphasis role="strong">AllSeen Alliance</emphasis> <link linkend="B9-13">[13]</link> &#x2013; is a nonprofit consortium dedicated to enabling and driving the widespread adoption of products, systems and services that support the Internet of Everything with an open, universal development framework supported by a vibrant ecosystem and thriving technical community.</para>
<para>The AllSeen Alliance framework is initially based on the AllJoyn<superscript>TM</superscript> open source project, and will be expanded with contributions from member companies and the open source community.</para>
<para><emphasis role="strong">Open Interconnect Consortium</emphasis> <link linkend="B9-20">[20]</link> &#x2013; is focused on delivering a specification, an open source implementation, and a certification program for wirelessly connecting devices. Membership is currently over 50 members.</para>
<para><emphasis role="strong">Thread Group</emphasis> <link linkend="B9-21">[21]</link> &#x2013; has a goal to create the very best way to connect and control products in the home. Thread it's a mesh network designed to securely and reliably connect hundreds of</para>
<para><emphasis role="strong">IPSO Alliance</emphasis> <link linkend="B9-22">[22]</link> &#x2013; The Internet Protocol for Smart Objects Alliance is a global forum including many Fortune 500 high tech companies and noted industry leaders. IPSO serves as a thought leader across the board for communities seeking to establish the Internet Protocol (IP) as the network for the connection of Smart Objects.</para>
<para><emphasis role="strong">Eclipse Foundation</emphasis> <link linkend="B9-23">[23]</link> &#x2013; Eclipse is a community for individuals and organizations who wish to collaborate on commercially-friendly open source software. Its projects are focused on building an open development platform comprised of extensible frameworks, tools and runtimes for building, deploying and managing software across the lifecycle.</para>
<para><emphasis role="strong">OASIS</emphasis> <link linkend="B9-24">[24]</link> &#x2013; is a non-profit consortium that drives the development, convergence and adoption of open standards for the global information society. OASIS promotes industry consensus and produces worldwide standards for security, Internet of Things, cloud computing, energy, content technologies, emergency management, and other areas.</para>
<para><emphasis role="strong">OneM2M</emphasis> <link linkend="B9-25">[25]</link> &#x2013; The purpose and goal of oneM2M is to develop technical specifications which address the need for a common M2M Service Layer that can be readily embedded within various hardware and software, and relied upon to connect the myriad of devices in the field with M2M application servers worldwide.</para>
<para><emphasis role="strong">Internet of Things Consortium</emphasis> <link linkend="B9-26">[26]</link> &#x2013; Driving adoption of IoT products and services through consumer research and market education.</para>
<para><emphasis role="strong">UPnP Forum</emphasis> <link linkend="B9-27">[27]</link> &#x2013; Industry initiative of 1000+ members working to enable device-to-device interoperability and facilitate easier and better home networking.</para>
<para><emphasis role="strong">Bluetooth SIG</emphasis> <link linkend="B9-30">[30]</link> &#x2013; Bluetooth Special Interest Group is the body that oversees the development of Bluetooth standards and the licensing of the Bluetooth technologies and trademarks to manufacturers.</para>
<para><emphasis role="strong">Industrial IP Advantage</emphasis> <link linkend="B9-29">[29]</link> &#x2013; the goal is to make the most of networking technologies &#x2013; existing and emerging &#x2013; that allow integration and the flow of information effortless. This community follows the latest trends, developments, implementation advice and opinions on the use of IP in industrial applications.</para>
<para><emphasis role="strong">ZigBee Alliance</emphasis> <link linkend="B9-28">[28]</link> &#x2013; is an open, non-profit association of approximately 400 members driving development of innovative, reliable and easy-to-use ZigBee standards. The Alliance promotes worldwide adoption of ZigBee as the leading wirelessly networked, sensing and control standard for use in consumer, commercial and industrial areas.</para>
</section>
<section class="lev1" id="sec9.6" label="9.6" xreflabel="sec9.6">
<title>Business Models</title>
<para>Success in the Internet of Things will come for the companies searching beyond the disruptive technology. The Internet of Things technology developments require focusing on complete solutions and integrate the advances in nanoelectronics, cyber-physical systems, and communications with software services, apps, and APIs combined with business models disruption.</para>
<para>For IoT technologies the value will be realized by the alignment of embedded systems technologies, intelligent device communications, network services and IoT infrastructure and application services. The established knowledgeable players in the field and all the newcomers will have to commune and align themselves in ways that will change all the player's business models.</para>
<para>As IoT proliferates, the value creation and value capture is changing and the implications for business model innovation are very important and the well-known frameworks and streamlining established business models are not enough.</para>
<para>Value creation involves performing activities that increase the value of a company's offering and encourages customer willingness to pay. The traditional product companies' business model is creating value by identifying enduring customer needs and manufacturing well-engineered solutions. Competition is based on performance/specifications vs. performance/specifications proposition.</para>
<para>For IoT applications where the devices are connected products are no longer passive participants in the value creation. Over the air updates can create new features and functionality can be provided to the customer on demand or automatically. The ability to track products in use offers the possibility to respond to customer behavior or based on the context. The products are being connected with other products, leading to new analytics and new services for more effective forecasting, process optimization, and customer service experiences.</para>
<para>Though the business models are intermingling today, all major players have operated within established business models that reflected the distinctive competencies at the core of each group. The advent of IoT applications is pushing the boarders between these legacy business models and all the existing emergent players and start-ups as well as the larger IT, software/hardware and network players will have to re-think their strategies.</para>
</section>
<section class="lev1" id="sec9.7" label="9.7" xreflabel="sec9.7">
<title>Standardization</title>
<para>The IERC previous SRIA addresses the topic of standardization and is focused on the actual needs of producing specific standards. This chapter examines further standardization considerations. Standards are needed for interoperability both within and between domains. Within a domain, standards can provide cost efficient realizations of solutions, and a domain here can mean even a specific organization or enterprise realizing an IoT. Between domains, the interoperability ensures cooperation between the engaged domains, and is more oriented towards a proper &#x201C;Internet of Things&#x201D;. There is a need to consider the life-cycle process in which standardization is one activity. Significant attention is given to the &#x201C;pre-selection&#x201D; of standards through collaborative research, but focus should also be given to regulation, legislation, interoperability and certification as other activities in the same life-cycle. For IoT, this is of particular importance.</para>
<para>Standardization (data standards, wireless protocols, technologies) is still a challenge to more-rapid adoption of the IoT. A wide number of consortiums, standards bodies, associations and government/region policies around the globe are tackling the standards issues.</para>
<para>IoT applications are using wireless protocols and technologies such as wireless MBus, Lora, Weigtless, Sigfox, ZigBee, 6LowPan, DLMS Cosem, COAP, DECT, EnOcean, Bluetooth Low Energy, Hanadu, ULE, X10, Wibree, IPV6, etc. The terms are part of the connected objects' landscape. These technologies are used to cover long and short distances and can be used as wireless radio technologies for M2M and IoT. Some of these technologies are low-data rate, long or short range, undergoing standardization for some or already standards for the others, even being adopted by the market for the most promising ones. Some are suitable for a precise vertical business (Wireless M-Bus for smart meters, KNX for building, ZigBee or EnOcean for the Smart Home), others are more universal (LoRa, Sigfox, Weightless, DECT, ULE, etc.).</para>
<para>A complexity with IoT comes from the fact that IoT intends to support a number of different applications covering a wide array of disciplines that are not part of the ICT domain. Requirements in these different disciplines can often come from legislation or regulatory activities. As a result, such policy making can have a direct requirement for supporting IoT standards to be developed. It would therefore be beneficial to develop a wider approach to standardization and include anticipation of emerging or on-going policy making in target application areas, and thus be prepared for its potential impact on IoT-related standardization.</para>
<para>The sharing of data between a large numbers of devices presents a huge challenge in using and analyse the data. The lack of universally accepted standards for the interchange can affect significantly the deployment of effective IoT solutions. IoT application and solution designers that create IoT platforms may have to make hard choices in choosing between unproven interoperability standards and the legacy ones. The future IoT platforms need to provide federation mechanisms and solutions to assimilate data from multiple vendors and support open API interfaces across platforms.</para>
<para>Today many IoT devices cannot be managed as part of the enterprise network/infrastructure. The enterprise-class network management needs to extend into the IoT-connected endpoints to detect basic availability/uptime of the devices as well as manage software and security updates.</para>
<para>There are many interests from legacy companies to protect their proprietary systems advantages and from open systems supporters trying to set new standards. Multiple standards could evolve that are based on different requirements determined by device class, power requirements, capabilities and uses. This could be an opportunity for platform providers and open source advocates to contribute and influence future standards and can be a threat for interoperability, rapid deployment as many communications and IoT standards already exit.</para>
<para>The development of IoT and IIoT technologies and applications requires increased efforts of governments, organisations and academia to catalyse, coordinate and manage programs that will lead to the use or and development of the effective and general common standards for manufactures.</para>
</section>
<section class="lev1" id="sec9.8" label="9.8" xreflabel="sec9.8">
<title>Large Scale Deployments and Test Beds</title>
<para>Internet of Things technology and applications are likely to be major drivers of investment and innovation in the communications sector, over the next years, delivering significant benefits to citizens, consumers and industrial end users. These will lead to the introduction of many new and innovative services, e.g. it will be possible to transmit data between many different types of devices, to improve the safety of transportation, reduce the consumption of energy and improve our health. These technological advancements and convergence within the IoT related technologies shape dynamically the emergence of new business models and IoT ecosystems<footnote id="fn9_1" label="1"><para>Comprising all stakeholders representing the IoT application value-chain: components, chips, sensors, actuators, embedded processing and communication, system integration, middleware, architecture design, software, security, service provision, usage, test, etc.</para></footnote>, integrating the future generations of applications, devices, embedded systems and network technologies and other evolving ICT advances based on open platforms and standardised identifiers, protocols and architectures.</para>
<para>In this context the next important step to demonstrate and validate the technology in real environments is the deployment of Large Scale IoT Pilots (LSPs).</para>
<para>By bringing together the technology supply and the application demand sides in real-life settings large Scale Pilots will allow promoting the emergent market of IoT and overcoming the fragmentation of vertically oriented closed systems, architectures and application areas that address challenges in different application areas.</para>
<para>While human social and economic activities continue to gravitate towards urban centres, Smart Cities deploy digital and telecommunication technologies to increase administration efficiency and improve the quality of life of their inhabitants.</para>
<para>Cross-domain city challenges in public safety, mobility, lighting and energy efficiency can be addressed by city-centric ecosystems of inter-operable vertical sub-systems. The integration and compatibility of sensors and actuators of connected sub-systems that are often complementary in the public space, in turn, stimulates the development of novel data-driven value-added city services. Due to their high density and ubiquitous nature, connected lighting systems in particular offer the prospect of evolving into platforms acquiring street-level contextual information and delivering city management functions to diverse city stakeholders.</para>
<para>Smart City LSPs need to address challenges in the fields of standardization, cyber-security, open data governance and privacy, and validate the novel business models underlying the services provisioned by future city infrastructures.</para>
<para>These IoT Large Scale Pilots have to address technology challenges across the industrial sector verticals and go beyond the M2M, IoT vertical applications developed in recent years, in order to break the silos and to evaluate the real impact of IoT technology across industrial domains.</para>
<para>The definition of themes needs to have a broader perspective and go beyond the narrower use cases proposed until now since in the future that cross-vertical collaboration and integration will be among the primary benefits of IoT.</para>
<para>In order to evaluate and test the IoT technology Large Scale Pilots themes such as the ones described below should be considered for implementation:</para>
<orderedlist numeration="arabic" continuation="restarts" spacing="normal">
<listitem><para>Sustainable multi-modal mobility, smart transport infrastructures and energy integration. (Focus on multi-modal mobility including emerging electric mobility, vehicle sharing, autonomous driving/intercon- nected vehicle/autonomous parking, road infrastructure, and energy integration).</para></listitem>
<listitem><para>Smart Living Environment for Digital Healthcare, general active well-being and healthy ageing. (Focus on IoT enriched citizen-centric indoor and outdoor living environments through wearables and seamlessly integrated IoT in smart buildings and homes, supporting Focus on citizen-centric IoT for creating age-friendly environments, buildings, mobility, cities to foster independent living and active ageing that enables seniors to lead an active life and healthy life not only in cities, but also in rural and remote places &#x2013; social benefit could be to reduce the pressure to move into the cities, as life in rural areas could be similarly complete and satisfying).</para></listitem>
<listitem><para>Smart Seamless Integrated City Infrastructure. (Focus on citizen-centric IoT services seamless integrated into city infrastructure implemented by city-centric ecosystems of inter-operable vertical sub-systems addressing cross-domain city challenges in public safety, mobility, lighting and energy efficiency).</para></listitem>
<listitem><para>Smart Farming, Agriculture, Food Safety and Security. (Focus on the life cycle of sustainable production of food and the interaction with environment monitoring and health maintenance).</para></listitem>
<listitem><para>Industrial Internet of Things. (Focus on smart production-centric IoT and the automation on the production floor, logistics, autonomous production lines, industrial robots and energy efficiency including the technology to be embedded in manufacturing facilities, production lines, and industrial environments).</para></listitem>
<listitem><para>Environmental Monitoring, Water and Waste Management. (Focus on quality of living and sustainability. IoT services and water, wastewater, environmental parameters monitoring, climate change management and monitoring and integrated services for water resource availability, monitoring of water level variations in rivers, dams the quality of air, water and monitoring of various chemical substances that can affect the health of humans, animals and plants, but also including the monitoring of other human activity induced pollution such as noise pollution. Incorporation/inclusion of satellite based Earth observation data &#x2013; as an extreme form of IoT &#x2013; would be welcome, in particular in combination with data obtained through ground based observation).</para></listitem>
<listitem><para>IoT for critical infrastructure protection, natural disaster prediction and mitigation.</para></listitem>
</orderedlist>
</section>
<section class="lev1" id="sec9.9" label="9.9" xreflabel="sec9.9">
<title>IoT Innovation Challenges</title>
<para>The report entitled &#x201C;The Internet of Things Business Index: A quiet revolution gathers pace,&#x201D; <link linkend="B9-16">[16]</link> found that 30% of business leaders feel that the IoT will unlock new revenue opportunities, while 29% believe it will inspire new working practices, and 23% believe it will eventually change the model of how they operate. The study found that European businesses are ahead of their global counterparts in the research and planning phases of implementing IoT <link linkend="B9-17">[17]</link>. Manufacturing is the leading sector when it comes to research and implementation of IoT technologies, driven in part by the need for real-time information to optimize productivity <link linkend="B9-17">[17]</link>.</para>
<para>According to the report, the top five concerns that companies have around the IoT are: a lack of employee skills/knowledge; a lack of senior management knowledge and commitment; products or services that do not have an obvious IoT element to them; immaturity of industry standards around IoT; and high costs of required investment in IoT infrastructure. The report suggests that data silos need to be removed and common standards need to be established in order to allow the IoT to scale to a size that will allow it to operate across all markets successfully.</para>
<para>One of the biggest obstacles of using the IoT is the perception that certain products or services do not have any obvious IoT application. The full potential of the IoT will be unlocked when small networks of connected things, from vehicles to employee IDs, become one big network of connected things extending across industries and organizations <link linkend="B9-16">[16]</link>. Many of the business models to emerge from the IoT will involve the exchange of data; an important element of this will be the flow of information across the networks.</para>
<para>In this context one of the main challenges for innovation in IoT is the complexity of the IoT ecosystem and the vast knowledge required from various fields in order to bring IoT solutions to the market.</para>
<para>Obstacles to innovation (see <link linkend="F9.7">Figure <xref linkend="F9.7" remap="9.7"/></link>) in the IoT field are related to:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>Power management in connected devices, running IoT applications, aimed at reducing their overall energy consumption. Currently, the majority of connected devices run on batteries which have limited shelf life.</para></listitem>
<listitem><para>Heterogeneity of technologies, communication protocols and standards used in IoT (wired and wireless).</para></listitem>
<listitem><para>Lack of a shared infrastructure, few open platforms based on open-source software, while in contrast, plenty of proprietary technologies/solutions integrated in a silo-based manner.</para></listitem>
<listitem><para>Scalable data management, needed to deal with the huge amount of data generated by the increasing number of connected sensors, actuators and &#x201C;things&#x201D; in general. Data needs to be gathered and processed in a proper way in order to be able to extract the &#x201C;smart data&#x201D; and actually obtain a business value from it.</para></listitem>
<listitem><para>Privacy and security in the IoT, guaranteeing secure communications and controlling and deciding who has access to the data is crucial for IoT innovation.</para></listitem>
<listitem><para>Data sharing, new alliances and relationships within the IoT ecosystem are necessary to develop a vision in which sharing available data, while preserving its privacy, will drive innovation in IoT.</para></listitem>
</itemizedlist>
<para>These obstacles for innovation in the IoT field, as can be seen in <link linkend="F9.7">Figure <xref linkend="F9.7" remap="9.7"/></link>, call for a new concept of federation of IoT platforms. A system of systems that allows enabling the connectivity of a large number of various IoT heterogeneous devices, and is able to collect and aggregate the huge quantities of data generated -while guaranteeing the privacy of the information exchanged-, to support a variety of IoT applications.</para>
<fig id="F9.7" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 9.7</label>
<caption><para>Obstacles for innovation in IoT.</para></caption>
<graphic xlink:href="graphics/fig9_7.jpg"/>
</fig>
<para>Overcoming innovation obstacles to reach the expected impact and potential market for IoT, will require IoT stakeholders to work together within the IoT ecosystem to develop solutions that have greater potential to drive significant business value for both public and private sectors.</para>
<para>Collaboration across the complex IoT ecosystem will bring together a wide range of expertise and capabilities required to create an innovative value chain, including the deployment and implementation of new IoT technology and applications. Much of the potential value will come from moving beyond the proprietary technology silos that largely exist today, and new revenue may come from product and service innovations that could enable growth beyond current products and market segments.</para>
<para>Generating new alliances and relationships within the IoT ecosystem is a must to drive innovation together with the availability of an IoT platform, that will allow organizing value creation and help reduce the investment and effort needed to develop new IoT applications and offer novel IoT services.</para>
</section>
<section class="lev1" id="sec9.10" label="9.10" xreflabel="sec9.10">
<title>Further Developments</title>
<para>The IoT is a disruptive technology in the early stages of market development characterized by innovation, fragmentation, competitive and involving existing and emerging standards. The established technology companies react and adjust to the market developments.</para>
<para>The IoT will leverage, integrate, extend and enhance cloud, smart data, and mobile devices to provide intelligent sensing/actuating devices at the edge. This will generate new applications and use cases that push for new business models and revenue opportunities, while threatening existing industries, markets and products impacting adjacent disrupting trends.</para>
<para>The IoT evolution will generate a shift of the value from devices and components into complete and complex solutions and services embedding opportunities for new value chains, value creation, new business models and new revenue streams and monetizing mechanisms for market participants.</para>
</section>
<bibliography class="biblio" id="bib07">
<title>Bibliography</title>
<bibliomixed id="B9-1">[1] <author><surname>Axeda</surname></author>, <ulink url="http://www.ptc.com/axeda">http://www.ptc.com/axeda</ulink>, Accessed <day>29</day> <month>May</month> <year>2015</year>.</bibliomixed>
<bibliomixed id="B9-2">[2] <author><surname>ThingWorx</surname></author>, <ulink url="http://www.thingworx.com/">http://www.thingworx.com/</ulink>, Accessed <day>29</day> <month>May</month> <year>2015</year>.</bibliomixed>
<bibliomixed id="B9-3">[3] <collab>SAP Internet of Things Solutions</collab>, <ulink url="http://go.sap.com/solution/internet-of-things.html">http://go.sap.com/solution/internet-of-things.html</ulink>, Accessed <day>29</day> <month>May</month> <year>2015</year>.</bibliomixed>
<bibliomixed id="B9-4">[4] <collab>IoT to Drive Double-Digit IC Sales</collab>, <year>2014</year>, <ulink url="http://electronicspurchasingstrategies.com/2014/12/15/iot-drive-double-digit-ic-sales/">http://electronicspurchasingstrategies.com/2014/12/15/iot-drive-double-digit-ic-sales/</ulink>, Accessed <day>15</day> <month>May</month> <year>2015</year>.</bibliomixed>
<bibliomixed id="B9-5">[5] <collab>IC Market Drivers&#x2014;A Study of Emerging and Major End-Use Applications Fueling Demand for Integrated Circuits</collab>, <year>2014</year>, <ulink url="http://www.icinsights.com/services/ic-market-drivers/">http://www.icinsights.com/services/ic-market-drivers/</ulink></bibliomixed>
<bibliomixed id="B9-6">[6] <collab>McKinsey &#x0026; Company and the Global Semiconductor Alliance (GSA)</collab>, <month>May 2015</month>. <article-title>The Internet of Things: Opportunities and challenges for semiconductor companies</article-title>. <ulink url="http://www.gsaglobal.org/wp-content/uploads/2015/05/1.-GSA-McK_Report-IoT_Text_Executive-Summary.pdf">http://www.gsaglobal.org/wp-content/uploads/2015/05/1.-GSA-McK_Report-IoT_Text_Executive-Summary.pdf</ulink>, Accessed <day>29</day> <month>May</month> <year>2015</year>. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=The+Internet+of+Things%3A+Opportunities+and+challenges+for+semiconductor+companies+2015" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B9-7">[7] <author><firstname>Microsoft</firstname> <surname>Azure</surname></author>, <ulink url="http://azure.microsoft.com/en-us/">http://azure.microsoft.com/en-us/</ulink>, Accessed <day>29</day> <month>May</month> <year>2015</year>.</bibliomixed>
<bibliomixed id="B9-8">[8] <author><firstname>Ayla</firstname> <surname>Networks</surname></author>, <ulink url="http://www.aylanetworks.com/platform/aylas-iot-cloud-fabric">http://www.aylanetworks.com/platform/aylas-iot-cloud-fabric</ulink>, Accessed <day>29</day> <month>May</month> <year>2015</year>.</bibliomixed>
<bibliomixed id="B9-9">[9] <author><surname>Xively</surname></author>, <ulink url="https://xively.com/">https://xively.com/</ulink>, Accessed <day>29</day> <month>May</month> <year>2015</year>.</bibliomixed>
<bibliomixed id="B9-10">[10] <collab>ARM</collab>, <ulink url="http://www.arm.com/markets/internet-of-things-iot.php">http://www.arm.com/markets/internet-of-things-iot.php</ulink>, Accessed <day>29</day> <month>May</month> <year>2015</year>.</bibliomixed>
<bibliomixed id="B9-11">[11] <collab>Intel</collab>, <ulink url="http://www.intel.com/content/www/us/en/internet-of-things/iot-platform.html">http://www.intel.com/content/www/us/en/internet-of-things/iot-platform.html</ulink>, Accessed <day>29</day> <month>May</month> <year>2015</year>.</bibliomixed>
<bibliomixed id="B9-12">[12] <author><surname>Jasper</surname></author>, <ulink url="http://www.jasper.com/">http://www.jasper.com/</ulink>, Accessed <day>29</day> <month>May</month> <year>2015</year>.</bibliomixed>
<bibliomixed id="B9-13">[13] <author><surname>AllJoyn</surname></author>, <author><firstname>AllSeen</firstname> <surname>Alliance</surname></author>, <ulink url="https://allseenalliance.org/">https://allseenalliance.org/</ulink>, Accessed <day>29</day> <month>May</month> <year>2015</year>.</bibliomixed>
<bibliomixed id="B9-14">[14] <collab>Bosch IoT Suite</collab>, <ulink url="https://www.bosch-si.com/products/bosch-iot-suite/benefits.html">https://www.bosch-si.com/products/bosch-iot-suite/benefits.html</ulink>, Accessed <day>29</day> <month>May</month> <year>2015</year>.</bibliomixed>
<bibliomixed id="B9-15">[15] <collab>IBM Bluemix</collab>, <ulink url="https://console.ng.bluemix.net/">https://console.ng.bluemix.net/</ulink>, Accessed <day>29</day> <month>May</month> <year>2015</year>.</bibliomixed>
<bibliomixed id="B9-16">[16] <ulink url="http://www.arm.com/files/pdf/EIU_Internet_Business_Index_WEB.PDF">http://www.arm.com/files/pdf/EIU_Internet_Business_Index_WEB.PDF</ulink>, Accessed <day>15</day> <month>May</month> <year>2015</year>.</bibliomixed>
<bibliomixed id="B9-17">[17] <ulink url="http://news.techworld.com/networking/3476043/arm-report-businesses-look-make-money-through-internet-of-things-revolution/">http://news.techworld.com/networking/3476043/arm-report-businesses-look-make-money-through-internet-of-things-revolution/</ulink> Accessed <day>15</day> <month>May</month> <year>2015</year>. </bibliomixed>
<bibliomixed id="B9-18">[18] <collab>The Alliance for Internet of Things Innovation (AIOTI)</collab>, <ulink url="http://www.aioti.eu/">http://www.aioti.eu/</ulink>, Accessed <day>29</day> <month>May</month> <year>2015</year>.</bibliomixed>
<bibliomixed id="B9-19">[19] <collab>Industrial Internet Consortium (IIT)</collab>, <ulink url="http://www.iiconsortium.org/about-us.htm">http://www.iiconsortium.org/about-us.htm</ulink>, Accessed <day>29</day> <month>May</month> <year>2015</year>.</bibliomixed>
<bibliomixed id="B9-20">[20] <collab>Open Interconnect Consortium</collab>, <ulink url="http://openinterconnect.org/">http://openinterconnect.org/</ulink>, Accessed <day>29</day> <month>May</month> <year>2015</year>.</bibliomixed>
<bibliomixed id="B9-21">[21] <collab>Thread Group</collab>, <ulink url="http://threadgroup.org/">http://threadgroup.org/</ulink>, Accessed <day>29</day> <month>May</month> <year>2015</year>.</bibliomixed>
<bibliomixed id="B9-22">[22] <collab>IPSO Alliance</collab>, <ulink url="http://www.ipso-alliance.org/">http://www.ipso-alliance.org/</ulink>, Accessed <day>29</day> <month>May</month> <year>2015</year>.</bibliomixed>
<bibliomixed id="B9-23">[23] <collab>Eclipse Foundation</collab>, <ulink url="http://www.eclipse.org/">http://www.eclipse.org/</ulink>, Accessed <day>29</day> <month>May</month> <year>2015</year>.</bibliomixed>
<bibliomixed id="B9-24">[24] <collab>OASIS</collab>, <ulink url="https://www.oasis-open.org/">https://www.oasis-open.org/</ulink>, Accessed <day>29</day> <month>May</month> <year>2015</year>. </bibliomixed>
<bibliomixed id="B9-25">[25] <collab>OneM2M</collab>, <ulink url="http://www.onem2m.org/">http://www.onem2m.org/</ulink>, Accessed <day>29</day> <month>May</month> <year>2015</year>. </bibliomixed>
<bibliomixed id="B9-26">[26] <collab>Internet of Things Consortium</collab>, <ulink url="http://iofthings.org/#home">http://iofthings.org/#home</ulink>, Accessed <day>29</day> <month>May</month> <year>2015</year>.</bibliomixed>
<bibliomixed id="B9-27">[27] <collab>UPnP Forum</collab>, <ulink url="http://www.upnp.org/">http://www.upnp.org/</ulink>, Accessed <day>29</day> <month>May</month> <year>2015</year>.</bibliomixed>
<bibliomixed id="B9-28">[28] <author><firstname>ZigBee</firstname> <surname>Alliance</surname></author>, <ulink url="http://www.zigbee.org/">http://www.zigbee.org/</ulink>, Accessed <day>29</day> <month>May</month> <year>2015</year>.</bibliomixed>
<bibliomixed id="B9-29">[29] <collab>Industrial IP Advantage</collab>, <ulink url="http://www.industrial-ip.org/">http://www.industrial-ip.org/</ulink>, Accessed <day>29</day> <month>May</month> <year>2015</year>.</bibliomixed>
<bibliomixed id="B9-30">[30] <collab>Bluetooth SIG</collab>, <ulink url="http://www.bluetooth.com/Pages/about-bluetooth-sig.aspx">http://www.bluetooth.com/Pages/about-bluetooth-sig.aspx</ulink>, Accessed <day>29</day> <month>May</month> <year>2015</year>.</bibliomixed>
<bibliomixed id="B9-31">[31] <author><firstname>O.</firstname> <surname>Vermesan</surname></author>, <author><firstname>P.</firstname> <surname>Friess</surname></author>, <author><firstname>P.</firstname> <surname>Guillemin</surname></author>, <author><firstname>H.</firstname> <surname>Sundmaeker</surname></author>, et al., <author>Internet of Things Strategic Research and Innovation Agenda</author>, Chapter 3 in <source>Internet of Things &#x2013; From Research and innovation to Market Deployment</source>, <publisher-name>River Publishers</publisher-name>, <year>2014</year>, ISBN 978-87-93102-94-1. <bibliomisc><ulink url="http://scholar.google.com/scholar?&#x0026;q=Internet+of+Things+-+From+Research+and+innovation+to+Market+Deployment+2014" target="_blank">Google Scholar</ulink></bibliomisc></bibliomixed>
<bibliomixed id="B9-32">[32] <collab>OpenRemote</collab>, accessed online at <ulink url="http://www.openremote.com/">http://www.openremote.com/</ulink></bibliomixed>
<bibliomixed id="B9-33">[33] <collab>Arrayent</collab>, accessed online at <ulink url="http://www.arrayent.com/">http://www.arrayent.com/</ulink></bibliomixed>
<bibliomixed id="B9-34">[34] <collab>Echelon</collab>, accessed online at <ulink url="http://www.echelon.com/izot-platform">http://www.echelon.com/izot-platform</ulink></bibliomixed>
<bibliomixed id="B9-35">[35] <collab>Wind River</collab>, accessed online at <ulink url="http://iot.windriver.com/#!/iot/">http://iot.windriver.com/#!/iot/</ulink></bibliomixed>
<bibliomixed id="B9-36">[36] <author><surname>Contiki</surname></author>, accessed online at <ulink url="http://www.contiki-os.org/">http://www.contiki-os.org/</ulink></bibliomixed>
<bibliomixed id="B9-37">[37] <collab>SensorCloud</collab>, accessed online at <ulink url="http://www.sensorcloud.com/">http://www.sensorcloud.com/</ulink></bibliomixed>
<bibliomixed id="B9-38">[38] <collab>mnubo</collab>, accessed online at <ulink url="http://mnubo.com/">http://mnubo.com/</ulink></bibliomixed>
<bibliomixed id="B9-39">[39] <collab>Oracle Internet of Things</collab>, accessed online at <ulink url="http://www.oracle.com/us/solutions/internetofthings/overview/index.html?ssSourceSiteId=ocomcn">http://www.oracle.com/us/solutions/internetofthings/overview/index.html?ssSourceSiteId=ocomcn</ulink></bibliomixed>
<bibliomixed id="B9-40">[40] <collab>Swarm</collab>, accessed online at <ulink url="http://buglabs.net/products/swarm">http://buglabs.net/products/swarm</ulink></bibliomixed>
<bibliomixed id="B9-41">[41] <collab>Etherios</collab>, accessed online at <ulink url="http://www.etherios.com/">http://www.etherios.com/</ulink></bibliomixed>
<bibliomixed id="B9-42">[42] <collab>ioBridge</collab>, accessed online at <ulink url="https://www.iobridge.com/">https://www.iobridge.com/</ulink></bibliomixed>
<bibliomixed id="B9-43">[43] <collab>Zatar</collab>, accessed online at <ulink url="http://www.zatar.com/">http://www.zatar.com/</ulink></bibliomixed>
<bibliomixed id="B9-44">[44] <collab>Sine-Wave</collab>, accessed online at <ulink url="http://www.sine-wave.com/platform">http://www.sine-wave.com/platform</ulink></bibliomixed>
<bibliomixed id="B9-45">[45] <collab>EVRYTHNG</collab>, accessed online at <ulink url="https://evrythng.com/">https://evrythng.com/</ulink></bibliomixed>
<bibliomixed id="B9-46">[46] <collab>Exosite</collab>, accessed online at <ulink url="http://exosite.com/">http://exosite.com/</ulink></bibliomixed>
<bibliomixed id="B9-47">[47] <collab>Marvell</collab>, accessed online at <ulink url="http://www.marvell.com/solutions/internet-of-things/">http://www.marvell.com/solutions/internet-of-things/</ulink></bibliomixed>
<bibliomixed id="B9-48">[48] <collab>Carriots</collab>, accessed online at <ulink url="https://www.carriots.com/">https://www.carriots.com/</ulink></bibliomixed>
<bibliomixed id="B9-49">[49] <collab>Arkessa</collab>, accessed online at <ulink url="http://www.arkessa.com/">http://www.arkessa.com/</ulink></bibliomixed>
<bibliomixed id="B9-50">[50] <collab>GroveStreams</collab>, accessed online at <ulink url="https://grovestreams.com/">https://grovestreams.com/</ulink></bibliomixed>
<bibliomixed id="B9-51">[51] <collab>CeNSE by HP</collab>, accessed online at <ulink url="http://www8.hp.com/us/en/hp-information/environment/cense.html#.VWw2EkYw-uF">http://www8.hp.com/us/en/hp-information/environment/cense.html#.VWw2EkYw-uF</ulink></bibliomixed>
<bibliomixed id="B9-52">[52] <collab>Nimbits</collab>, accessed online at <ulink url="http://www.nimbits.com/index.jsp">http://www.nimbits.com/index.jsp</ulink></bibliomixed>
<bibliomixed id="B9-53">[53] <collab>Open.Sen.se</collab>, accessed online at <ulink url="http://open.sen.se/">http://open.sen.se/</ulink></bibliomixed>
<bibliomixed id="B9-54">[54] <collab>Paraimpu</collab>, accessed online at <ulink url="https://www.paraimpu.com/">https://www.paraimpu.com/</ulink></bibliomixed>
<bibliomixed id="B9-55">[55] <collab>NewAer</collab>, accessed online at <ulink url="http://newaer.com/">http://newaer.com/</ulink></bibliomixed>
<bibliomixed id="B9-56">[56] <collab>ThingSpeak</collab>, accessed online at <ulink url="https://thingspeak.com/">https://thingspeak.com/</ulink></bibliomixed>
<bibliomixed id="B9-57">[57] <collab>Yaler</collab>, accessed online at <ulink url="https://yaler.net/">https://yaler.net/</ulink></bibliomixed>
<bibliomixed id="B9-58">[58] <collab>XobXob</collab>, accessed online at <ulink url="http://www.xobxob.com/">http://www.xobxob.com/</ulink></bibliomixed>
<bibliomixed id="B9-59">[59] <collab>Linkafy</collab>, accessed online at <ulink url="http://www.linkafy.com/">http://www.linkafy.com/</ulink></bibliomixed>
<bibliomixed id="B9-60">[60] <collab>Revolv</collab>, accessed online at <ulink url="http://revolv.com/">http://revolv.com/</ulink></bibliomixed>
<bibliomixed id="B9-61">[61] <collab>Wovyn</collab>, accessed online at <ulink url="http://www.wovyn.com/">http://www.wovyn.com/</ulink></bibliomixed>
<bibliomixed id="B9-62">[62] <collab>Microsoft Research Lab of Things</collab>, accessed online at <ulink url="http://www.lab-of-things.com/">http://www.lab-of-things.com/</ulink></bibliomixed>
<bibliomixed id="B9-63">[63] <collab>InfoBright</collab>, accessed online at <ulink url="https://www.infobright.com/index.php/internet-of-things/">https://www.infobright.com/index.php/internet-of-things/</ulink></bibliomixed>
<bibliomixed id="B9-64">[64] <collab>2lemetry</collab>, accessed online at <ulink url="http://2lemetry.com/">http://2lemetry.com/</ulink></bibliomixed>
<bibliomixed id="B9-65">[65] <collab>InterDigital</collab>, accessed online at <ulink url="http://www.interdigital.com/iot#.U4fvQ_ldXy0">http://www.interdigital.com/iot#.U4fvQ_ldXy0</ulink></bibliomixed>
<bibliomixed id="B9-66">[66] <collab>Superflux Internet of Things Academy (IoTA)</collab>, accessed online at <ulink url="http://www.superflux.in/work/iota-phase2">http://www.superflux.in/work/iota-phase2</ulink></bibliomixed>
<bibliomixed id="B9-67">[67] <collab>HarvestGeek</collab>, accessed online at <ulink url="http://www.harvestgeek.com/">http://www.harvestgeek.com/</ulink></bibliomixed>
<bibliomixed id="B9-68">[68] <collab>MediaTek Labs</collab>, accessed online at <ulink url="http://www.harvestgeek.com/">http://www.harvestgeek.com/</ulink></bibliomixed>
<bibliomixed id="B9-69">[69] <collab>StreamliteLTE</collab>, accessed online at <ulink url="http://www.sequans.com/products-solutions/streamlitelte/">http://www.sequans.com/products-solutions/streamlitelte/</ulink></bibliomixed>
<bibliomixed id="B9-70">[70] <collab>RIoTboard</collab>, accessed online at <ulink url="http://www.riotboard.org/">http://www.riotboard.org/</ulink></bibliomixed>
</bibliography>
</chapter>
</book>