139,99 €
The development of connected, communicating objects is showing no signs of slowing down. With an increasing number of objects available on the market, the evolution of the Internet of Things is leading to more and more fields being explored via information and communication sciences. This book analyzes the ecosystem of the Internet of Things by retracing the historical and technological context of the Internet's evolution from traditional to dynamic, social and semantic, and then towards this ecosystem of connected objects. The evolution of concepts surrounding the Internet of Things is explored via real-life examples of connected objects; both those used for specific functions and for more general everyday objects. Numerous issues associated with these new technological and digital transformations in a "hyperconnected" world, as well as the impact of the massive influx of connected objects, are discussed. The crucial questions of potential intrusion into the private lives of users as well that of security are then studied.
Sie lesen das E-Book in den Legimi-Apps auf:
Seitenzahl: 359
Veröffentlichungsjahr: 2017
Cover
Title
Copyright
Introduction
1 The IoT: Intrusive or Indispensable Objects?
1.1. Introduction
1.2. The age of miniaturization and technological progress
1.3. The history of a digital ecosystem
1.4. Internet of Things, which definition?
1.5. The security of connected objects: the risks and the challenges
1.6. Protocols, standards and compatibility: toward a technological convergence
1.7. Humanity, intelligence and technologies
1.8. Conclusion
1.9. Bibliography
2 The Ecosystem of the Internet of Things
2.1. Introduction
2.2. Context, convergences and definition
2.3. Conclusion
2.4. Bibliography
3 Introduction to the Technologies of the Ecosystem of the Internet of Things
3.1. Architectures recommended by the Internet Architecture Board
3.2. Three-tier architecture
3.3. Steps and technologies in the ecosystem of the IoT
3.4. Opportunities and threats in the IoT ecosystem
3.5. Conclusion
3.6. Bibliography
4 Toward a Methodology of IoT-a: Embedded Agents for the Internet of Things
4.1. Introduction
4.2. Multi-agent simulations, ambient intelligence and the Internet of Things
4.3. Triskell3S: an architecture of embedded agent-oriented interactions
4.4. Transposition of the formalization of agent-oriented interaction to connected objects
4.5. Formalization
4.6. Experimentation and perspectives
4.7. Bibliography
5 The Visualization of Information of the Internet of Things
5.1. Introduction
5.2. Internet of Things
5.3. InfoVis and DataVis in the Internet of Things
5.4. Analytical visualization in the context of the Internet of Things
5.5. Conclusion: the relevance of the use of visualization in the Internet of Things
5.6. Bibliography
6 The Quantified Self and Mobile Health Applications: From Information and Communication Sciences to Social Innovation by Design
6.1. Introduction
6.2. The evolution of interfaces and connected objects toward anthropotechnics
6.3. Factitive dimension and value system at the heart of Chris Dancy’s relationship with his information technology
6.4. Critical perspective and avenues for reflection for reconsidering the use of connected objects and mobile applications in the field of health
6.5. Conclusion
6.6. Bibliography
7 Tweets from Fukushima: Connected Sensors and Social Media for Dissemination after a Nuclear Accident
7.1. Introduction
7.2. The IoT: a shift in the development of digital services
7.3. Social media and the dissemination of information during a catastrophe
7.4. Context of the study
7.5. Goals of our study
7.6. Methodology
7.7. Results
7.8. Discussions
7.9. Conclusions
7.10. Acknowledgements
7.11. Bibliography
8 Connected Objects: Transparency Back in Play
8.1. Introduction
8.2. Sensitive objects
8.3. The myth of transparency
8.4. Transparency of interfaces and opacity of processes
8.5. Conclusion
8.6. Bibliography
9 Status of the Body within the Internet of Things: Revolution or Evolution?
9.1. Introduction
9.2. Presence and absence of the body in the field of sports and e-health
9.3. The traceability of the body or the integration of data by a digital coach
9.4. The IoT creates a flow of information around the body: a present, readable and traceable cluster
9.5. The body in interaction: sharing Clouds to inform the informational environment
9.6. Clouds, persistence and trust: a mapped body without the right to be forgotten
9.7. The body, an object communicating between hyper-control and non-control
9.8. Conclusion
9.9. Bibliography
List of Authors
Index
End User License Agreement
3 Introduction to the Technologies of the Ecosystem of the Internet of Things
Table 3.1. Steps and technologies to set up the IoT
Table 3.2. Range of each Bluetooth class
Table 3.3. Some of the changes in the 802.11 standard [IEE 16c, IEE 16d, WIF 14]
Table 3.4. Summary of mobile cellular networks [GUP 13]
1 The IoT: Intrusive or Indispensable Objects?
Figure 1.1. The miniature version of the ENIAC
Figure 1.2. The evolution of mobile telephony
Figure 1.3. The Eyecatcher bracelet, display of notifications and messages in real time
Figure 1.4. The Eyecatcher in fashion mode
Figure 1.5. Architecture of the Green Watch
Figure 1.6. Map of the data from Green Watch sensors
Figure 1.7. A display panel participating in the Fictions d’Issy installation
33
Figure 1.8. Example of a fragment of the story displayed on an information panel in the town
34
Figure 1.9. The Kevo smart lock from the American company Kwikset
Figure 1.10. The Withings HD Home intelligent video surveillance
Figure 1.11. Chip implanted under the skin of the hand
40
Figure 1.12. Payment via a smart watch
2 The Ecosystem of the Internet of Things
Figure 2.1. Evolution of human-machine interaction (adapted from [KUN 16])
Figure 2.2. Convergence of services, devices, networks and policy (adapted from Joseph Sifakis [SIF 15])
Figure 2.3. Exponential evolution of components (from [RAN 14])
Figure 2.4. Advances in cognitive analysis (adapted from [BAT 14])
Figure 2.5. The “Hype Cycle” of emerging technologies offered by Gartner in 2016
Figure 2.6. Evolution of the number of connected devices in relation to the world’s population (from [EVA 11])
Figure 2.7. Components of connected objects
Figure 2.8. The steps of information (from [HOL 15])
Figure 2.9. Applications of the Internet of Things (adapted from [VER 15])
3 Introduction to the Technologies of the Ecosystem of the Internet of Things
Figure 3.1. Machine-to-machine communication (from The Internet of Things: an overview, Internet Society, 2015 [ROS 15])
Figure 3.2. Communication from devices to the Cloud (ibid.)
Figure 3.3. Object-portal communication (ibid.)
Figure 3.4. Architecture with back-end data sharing (ibid.)
Figure 3.5. Three-tier architecture
Figure 3.6. The different layers of the IoT (from Cisco [GRE 14])
Figure 3.7. Setting up the IoT
Figure 3.8. Communication between COs
Figure 3.9. Wireless communication technologies landscape
Figure 3.10. The different types of networks (adapted from Postscapes.com, 2016 [POS 16])
Figure 3.11. The four industrial revolutions (adapted from DiePress.com, 2014 [DIE 14])
4 Toward a Methodology of IoT-a: Embedded Agents for the Internet of Things
Figure 4.1. SOA architecture for the IoT
Figure 4.2. The embedded multi-agent architecture of the Triskell3S platform
Figure 4.3. Implementation of Triskell3S on a set of IoT-a collectively forming a screens wall
Figure 4.4. Directed tree of MQTT Topics
Figure 4.5. Matrix of IODA interactions in the context of IoT-a making up a wall of screens. An example of the distributed resolution of the N-puzzle problem
Figure 4.6. Distributed resolution of the N-puzzle on the wall of agentified screens. Each portion of the video represents a piece of data carried by a tile. The goal is to reconstruct the entirety of the video by displaying the numbers in the correct order
Figure 4.7. Distributed resolution of N-puzzle on the wall of screens of 3*3 IoT-a, each one manipulating videos. The right and lower peripheral screens display the reference video
5 The Visualization of Information of the Internet of Things
Figure 5.1. The Internet has changed daily life.
Figure 5.2. Oriented vision view of objects, the Internet and semantics.
Figure 5.3. Fields of application for the IoT andconnected applications.
Figure 5.4. Analytical system for data.
Figure 5.5. Diagram of scientific data. The Venn diagram of data is under Creative License as Derivative-Non-commercial license.
Figure 5.6. Example of visual analytics.
Figure 5.7. Fields related to visual analytics.
Figure 5.8. The LoRa Alliance® guarantees the interoperability and flexibility technique IoT applications.
Figure 5.9. Domains related to visual analytics.
Figure 5.10. The visual analytics process.
Figure 5.11. Generation of visual analytics with Qlik® Sense Desktop.
6 The Quantified Self and Mobile Health Applications: From Information and Communication Sciences to Social Innovation by Design
Figure 6.1. Distinction between Telehealth, e-health, m-health and Telemedicine (Connected health. Livre blanc du Conseil national de l’ordre des médecins, 2015, p. 9)
Figure 6.2. The devices
1
worn every day by Chris Dancy. Photograph published in Paris Match, July 2014. http://www.parismatch.com/Vivre/High-Tech/L-homme-le-plus-connecte-du-monde-577862
Figure 6.3. Chris Dancy in his office: cultural and technological hybridization. Photograph published on the website of the magazine Mashable in August 2014, http://mashable.com/2014/08/21/most-connected-man/#0TM6VmdLGkq1
Figure 6.4. Dramatization of Chris Dancy’s metamorphosis on Facebook (profile photo)
Figure 6.5. “Diagram of the workflow” created by Teemu Arina for Chris Dancy’s blog. http://www.servicesphere.com/blog/2013/12/5/explaining-my-quantified-self-or-coming-out-of-my-data-close.html
Figure 6.7. “The mindful cyborg”: the hybrid body and science-fiction imagery. Screen capture of a post by Chris Dancy on Facebook
Figure 6.8. “The real you”: portrait created by Aaron Jasinski. Screen capture of a post by Chris Dancy on Facebook
7 Tweets from Fukushima: Connected Sensors and Social Media for Dissemination after a Nuclear Accident
Figure 7.1. A connected radiation detector (Poket Geiger™ type 4)
Figure 7.2. Social media and the Internet of Things
Figure 7.3. Tweets from the @twrbrdg_itself account
Figure 7.4. Phases of a radiological accident
Figure 7.5. Collaborative chart of the contamination
Figure 7.6. A bot’s user profile
16
Figure 7.7. Distribution of the popularity of bots
Figure 7.8. Popularity (average) of bots according to their date of creation (per semester)
Figure 7.9. Screen capture of the Radidas software
23
Cover
Table of Contents
Begin Reading
C1
iii
iv
v
xi
xii
xiii
xiv
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
211
212
213
214
215
216
217
218
219
221
222
223
224
G1
G2
G3
G4
G5
G6
G7
G8
e1
Digital Tools and Uses Set
coordinated by
Imad Saleh
Volume 4
Edited by
Nasreddine Bouhaï
Imad Saleh
First published 2017 in Great Britain and the United States by ISTE Ltd and John Wiley & Sons, Inc.
Apart from any fair dealing for the purposes of research or private study, or criticism or review, as permitted under the Copyright, Designs and Patents Act 1988, this publication may only be reproduced, stored or transmitted, in any form or by any means, with the prior permission in writing of the publishers, or in the case of reprographic reproduction in accordance with the terms and licenses issued by the CLA. Enquiries concerning reproduction outside these terms should be sent to the publishers at the undermentioned address:
ISTE Ltd27-37 St George's RoadLondon SW19 4EUUK
www.iste.co.uk
John Wiley & Sons, Inc.111 River StreetHoboken, NJ 07030USA
www.wiley.com
© ISTE Ltd 2017The rights of Nasreddine Bouhaï and Imad Saleh to be identified as the authors of this work have been asserted by them in accordance with the Copyright, Designs and Patents Act 1988.
Library of Congress Control Number: 2017951079
British Library Cataloguing-in-Publication DataA CIP record for this book is available from the British LibraryISBN 978-1-78630-151-2
The development of connected and communicating objects has not stopped progressing as more and more objects are available in the market. This evolution of the Internet of Things (IoT) is creating more fields to be explored by the information and communication sciences, and renewing the risks of these new technological and digital changes in a “hyperconnected” world, via various connected objects (hyperobjects), which often have a dual capability: being connected and/or communicating while all the while carrying the expectation that they respond to user needs that are more and more demanding regarding services, communication and information.
The Internet of Things refers to these new objects/services, which are only a logical extension of the physical world into the digital world (hyperobject), and which generate a large amount of information, just as they receive it.
This work will present a collection of analyses, reflections and products/prototypes of connected/communicating objects (hyperobjects) as well as the prospect of studies and experimentation that these objects offer in the area of information and communication sciences. The data generated by these objects falls within the domain of Big Data, another related topic. Some texts are expanded and updated versions of texts from the International H2PTM Conference.
In the first chapter, the author Nasreddine Bouhaï defines the subject of the Internet of Things (IoT) and presents an overview of concrete examples of connected objects, whether they are intended for people’s daily lives or for the world of art and culture. This non-exhaustive overview focuses on the massive influx of these new objects on the market. The question of intrusion into the private life of users is posed, as well as the question of security as a crucial point for the future of this ecosystem to come.
In Chapter 2, Ioan Roxin and Aymeric Bouchereau begin by presenting the historical and technological context of the evolution from the traditional web to the dynamic, social and semantic web and toward connected objects (CO). Secondly, they explain the definitions and concepts of the IoT based on examples of the IoT that are present in daily life.
In Chapter 3, Ioan Roxin and Aymeric Bouchereau focus more on the technological aspect of the IoT by presenting the elements related to context, architecture and protocols in the world of CO. They point out the major scientific problems to be resolved: the precise identification of each object in a network, standardization and finally, the normalization of data transfer protocols, machine-to-machine (M2M) communication, encryption and safety, the legal system and the architecture of the IoT.
The authors of Chapter 4, Florent Carlier and Valérie Renault, for their part, call on different paradigms of the IoT and the links that have been established in the literature between the IoT and multi-agent systems. In order to present a multi-embedded agent platform called Triskell3S, the authors demonstrate how the different paradigms and norms of the two areas can be respected and can coexist, in particular the MQTT protocol, the D-bus protocol and the FIPA-ACL specifications. Experimentation with this platform within a real context is done by an application of the IoT-a through a group of connected “screen-bricks” allowing the reconstruction of a wall of interactive and reconfigurable screens. We illustrate this application by revisiting the distributed eco-resolution N-Puzzle type (Taquin) algorithm and by taking it to the resolution of a Taquin video.
The visualization of information for the IoT is the subject of Chapter 5. The authors Adilson Luiz Pinto et al. return to the importance and the relevance of the use of visualization in the Internet of Things. The visualization and exploitation of the data coming from the IoT would increasingly interest users and companies. The integration of technology and the optimization of visualization of data is making it possible to display key information through graphics, tables, maps, etc. It has become possible to draw conclusions in a simple and visual manner, which is essential for businesses in order to be able to make decisions in real time, improve their performances, discover areas and anticipate problems so that they don’t constitute a real risk for the company.
Chapter 6, by Marie-Julie Catoir-Brisson, focuses on the theme of the Quantified Self through the experience of Chris Dancy. The chapter is an analytical study for understanding what is involved in the integration of information technologies into people’s everyday lives and how connected objects transform the relationship between the individual and his body and its representation and the human-machine relationship that this creates which accordingly increases the frequency of social interaction online. In order to grasp the multiple risks that this problem creates, an interdisciplinary approach is offered, an intersection of the analysis tools of semiotics, design and the anthropology of communication.
The authors of Chapter 7, entitled “Tweets from Fukushima: Connected Sensors and Social Media for Dissemination after a Nuclear Accident”, Antonin Segault, Federico Tajariol and Ioan Roxin, are interested, through the study, in the dissemination of information via social media after a nuclear accident. This work is part of a research project on the use of social media in a post-nuclear accident situation, SCOPANUM (Strategies of Communication during the Post-Accident phase of a nuclear disaster through social Media). After having introduced the IoT (section 7.2) and recalling the elements of the role of social media in a crisis situation caused by a disaster (section 7.3), they describe the context, method and results of this study (sections 7.4 to 7.9).
In Chapter 8, Florent Di Bartolo examines modes of existence and operation in terms of the opacity and transparency of communicating objects. The author first tackles the sensitivity of connected objects to their associated environment and defines the type of relations that they establish with their users. He has then analyzed the illusion on which the Internet of Things is constructed: an illusion of transparency that presents communicating objects as enchanted objects and which artists and designers deconstruct to “open up” digital technologies and the data that they capture, disseminate and transform, to new forms of visibility.
In the ninth and final chapter of this work, Evelyne Lombardo and Christophe Guion reflect on the status of the body within the Internet of Things. To do this, they begin by analyzing how the IoT transforms our relationship to the body in the context of e-health, then they pose the question of the traceability of the body through the integration of data. They then return to the concept of cloud data surrounding the body, to the interaction of this body within the network in order to study the body as a monitored body does not have the right to be forgotten. In the final section, they address the body as a communicating object between hyper-control and self-control.
Following Bill Gates’ famous statement in the 1970s, “A computer on every desk and in every home,” the world entered the era of computer science during the 1980s. This democratization became reality in developed countries, although not as much in third-world countries, which is a state of affairs identified by a digital and technological divide. New technological advances (computer science, telecommunications, miniaturization of electronics, etc.), led to the emergence of other solutions, new chips and electronic circuits, new computer systems and communication protocols, whose successful realization is the spread of mobile telephony and access to new compact and portable products. The smartphone is the prime example of this change; it now integrates all of the functions and services of a computer, making exchanges and communication accessible to a very large number of people. Moreover, with the connected watches that have appeared in the last few years, we are truly in the middle of the era of connected and portable devices.
Contrary to the development of computers and mobiles, whose concepts do not differ very much from one manufacturer to another (Apple, Windows, IBM, Dell, HP, etc.), the concept of the Internet of Things is broader and refers to a new way of living and managing current and professional affairs via the Internet. The environment is now more open for businesses and start-ups to innovate and offer new services and technologies. Nevertheless, the major players already have a head start in the area: like Cisco for networks, Google for the management of big data, Microsoft for Cloud Computing, Intel for micro-processors, etc. It is clear that development and investment in the IoT, the businesses mentioned above, promising a future that is radiant but which remains nevertheless to be discovered and which will reveal whether this was a revolution or a passing technological fad. One of the goals of these objects is the transformation of uses or even creating new ones.
The development of computers and mobile telephony has been the technological duo of choice for several years. This has allowed the arrival in the markets of innovative projects, amazing and increasingly spectacular miniatureization. The ENIAC1 was the first electronic computer, occupying an area of a hundred square meters made to imitate a mechanical calculator2. An ultra-miniature version of the ENIAC computer, which is the size of a single integrated circuit chip, was developed by a research team from the University of Pennsylvania (Figure 1.1).
Figure 1.1.The miniature version of the ENIAC
The appearance of smartphones has been accompanied by enormous technological progress in the last decades, from the testing of the first mobile telephone, the Motorola DynaTAC 8000X3 in 1973, to Samsung’s most recent ultra-comprehensive and light smartphone4, progress is exponential at different levels (Figure 1.2), computation power, design and ergonomics, energy consumption, etc. These advances have brought about a considerably profound change in the nature of the relationship humanity has with the objects and environment that surround it and a change to every person’s everyday life and lifestyle.
Figure 1.2.The evolution of mobile telephony
The history of the Internet is enthralling and rich through its path of developing as an open system that is in perpetual motion. Despite its young age (it has been 25 years since the web was launched), the network has not stopped surprising us, thanks primarily to the work of communities of engineers and developers coming from different areas of study such as computer science, telecommunications and above all electronics. These are communities that connect to innovate and to respond to user needs in a collaborative and participatory spirit. Even if the origins and ideas of this network date back more than 50 years, a real enthusiasm was witnessed with the arrival of its best-known service, the web, which was put into operation back in the beginning of the 1990s. The revolution was provided by a multimedia navigation system with the development of the HTML language5 that could integrate text, images and above all links between documents and fragments of documents. This extension of the Internet has taken on a new dimension, offering new experiences and new uses, as well as new difficulties, for navigation and tracking in a space of very dynamic and occasionally extensible links [BAL 96].
Since its conception, several layers have been added to the first version of the web. We can distinguish three essential steps in its development:
– the web 1.0: represented by the debut of the static and above all passive web of the 1990s, it offered basic navigation between pages of information whose purpose was documentary reference. This step was marked by the simplicity of the language used: HTML
6
;
– the web 2.0, called the collaborative web, of the 2000s was the web of blogs, forums and CMS, with the web passing into active mode, with the users becoming actors and producers of content they played a contributing role and took forceful ownership of its new digital tools;
– the web 3.0: represents the current web of which semantics and connected objects are the two principle technologies.
From the web 1.0 to the web 3.0, to hypermedia [BAL 96] to the hyperobject7, the Internet has gone from being based on information to being based on objects, from an Internet of links between documents, to one linking physical or digital objects (documents and information). It is a communicating and autonomous ecosystem, whose different objects are easily identified, and secure exchanges according to standardized protocols. These networks of objects8 already pose the problem of traces of data generated by the activities and exchanges of connected objects. Data to be exploited from the perspective of digital processing, according to approaches of knowledge engineering, another area concerned with the large masses of data otherwise known as Big Data.
The term Internet of Things (IoT) refers to a network that is more and more spread out, one of material objects connected to the Internet, identified and recognized, like all other traditional devices that we use every day, such as computers, tablets, smartphones, etc. Perceived these days as a new technological revolution, the Internet of Things is defined, according to Weil and Souissi [WEI 10], simply as:
“The extension of the current Internet to all objects able to communicate, directly or indirectly, with electronic devices that are themselves connected to the Internet.”
An official definition of the IoT remains to be found, a job for the actors in the domain, even if the overall concept and its components are wellknown, such as the communication of data streams and associated protocols which remain a large open workshop.
Recently, tech giant Google has developed “Brillo”, a platform for peripheral devices which handle the Internet of Things. It will be able to work with a very large optimization of the memory and processer, Wi-Fi and Bluetooth, it is derived from the “Android” operating system. Other companies have invested in the area, with Samsung’s Artik, the Agile IoT platform from the manufacturer Huawei, intended for the IoT. Microsoft is not excluded, with a new version of its Windows 10. This shows the interest that large technology companies have in this new extension of the Internet.
Data security is a crucial point and one of the greatest obstacles to the development of the IoT on a large scale. As with the Internet, security is a workshop in perpetual evolution, the problem is posed and is transposed logically onto the protection of data sent and/or received by a connected object and becomes a great technological challenge for the different actors in this new ecosystem.
We regularly see that digital insecurity is a recurring question, especially on the Internet network, affecting the hacking of websites, message servers, e-mail accounts and this is often done with a remote takeover of machines. This insecurity logically extends to the IoT. Like a connected computer, any connected object could be subject to hacking, a takeover, the installation of spyware, etc. With the impossibility of controlling and limiting the development of this ecosystem, it is necessary to look for and suggest security strategies for protecting the networks of these objects and to fill in the gaps in security detected.
The role of the telecommunications sector was and remains primordial for safeguarding the communication of these objects (object-object or object-person), as for the Internet, it is their responsibility to make as big an effort as possible to put in place solutions in the areas of security. A role that is just as important as that of software developers.
In this emerging market, a long-awaited consensus between the industrial actors in the domain is yet to arrive. It would make many products compatible with each other for the purposes of communication and the exchange of data. Currently each business uses its own technological solutions, a product manufactured by Samsung cannot exchange with one from LG, such as the automatic display of information from a television of one brand to a television from another brand. Task forces from several manufacturers9 have recently discussed standards for objects connected to the Internet, to allow devices to mutually understand each other and determine the requirements regarding connectivity and interoperability between multiple devices. The question of norms and standards is central in the case of a need for technological convergence:
“Normalization (and/or standardization) are notions which have become unavoidable with cultural, industrial, economic and especially digital globalization” [FAB 13].
The notions of norms and standards are present in Europe, and in America under the same name. It is understood that a norm is a frame of reference published by an official international organization for standardization such as the ISO10, ECS11, AFNOR12 or the IEEE13. A standard can be described as a group of recommendations advocated by a group of representatives and informed users that is widely disseminated and used. HTML (W3C) format14 for the web is the prime example of this type of procedure.
Because the world of the IoT is obscured by a multitude of protocols, it is difficult to make an exhaustive list of them. A significant number of diverse solutions are ready to be developed quickly once norms or standards are integrated into future projects on a large scale. There are still many hypotheses to be confirmed in this rapidly expanding market. Some solutions are already on the market and others are in the process of development and validation, with the goal of standing out with their effectiveness and how simple they are to implement, an important point for small businesses and start-ups joining the IoT market, looking for communications solutions at the lowest cost until an agreement at this level has been reached. The goal will be to show the interest and usefulness of their products and to create a place and a name within the booming market15.
In terms of communication, wireless is the best adapted to connected, and often portable, products. WiFi16 and its variants are technologies that are increasingly popular at the moment, for short-/medium-distance communication17 indoors and, with Bluetooth, as a short-distance18 communication technology. Numerous protocols19 supplement these two technologies, or even compete with them. Some have advantages such as a reduction in energy consumption20:
– WiFi direct
21
: unlike WiFi, which makes it possible to connect objects via an access point (an Internet box, for example), WiFi direct provides direct connectivity between two objects;
– Bluetooth LE/Smart
22
: considered complementary in relation to Bluetooth, it has low energy consumption, reduced coverage and a lower output. It is a solution for some types of connected objects;
– the Bluetooth aptx: a means of communication intended for audio broadcast by transcoding flows at a rate higher than 350 Kbit/s. A codec is used for the compression and diffusion of sound where the transmitter and the receiver must be compatible;
– the ZigBee
23
: this solution
24
offers connectivity with low energy consumption that is easy to embed within various connectable products, with a low bit rate that goes up to 250 Kbit, and a short coverage of around 100 meters;
– Near Field Communication (NFC)
25
: a solution for proximity communication (for a distance of a few centimeters). This protocol has its advantages: a miniature chip and the possibility of securing exchanges via an embedded encryption. Numerous uses, contactless payment, etc.;
– the Z-Wave
26
: this wireless protocol solution makes it possible to link several devices, it goes both ways, sending and receiving data. Its use is adequate for home automation, with a coverage of 30 meters inside, to 100 meters outside;
– the Thread: established by Samsung and Nest Labs, is a competitor of the technologies mentioned previously, and consumes very little energy. It is a solution for home automation connectivity, to link different objects and devices in a network and to Internet. An alliance of several partners including Silicon Labs and Google gives it significant weight in the creation of future norms and standards.
Securing funding for making an innovative project a reality, especially for a young business without a history of activity and the multiplication of ideas and projects in the era of globalization, is not an easy thing. With the arrival of the IoT, the enthusiasm for this type of financing is without precedent27. Crowdfunding is an original principle (and an innovative approach), a fashionable solution for launching innovative projects with strong technological potential and for raising funds without too many constraints. The start-up Looksee28, for example, is working on the Eyecatcher project, a smart bracelet that combines design, fashion and technological innovation (Figures 1.3 and 1.4).
Figure 1.3.The Eyecatcher bracelet, display of notifications and messages in real time
Figure 1.4.The Eyecatcher in fashion mode
The project’s originality and innovation have already attracted more than 400 participants on the participatory platform Kickstarter, who have supported the project by raising hundreds of thousands of dollars, even though the creators of the project asked for only two thirds of this amount. Innovation lies at the level of low energy consumption thanks to its e-ink (digital ink) screen. Communication is done via Bluetooth with a smartphone application and makes it possible to send photos, designs and above all be programmed to send notifications such as e-mail, scheduling, etc.
The Green Watch Project is a pioneering project in the field of connected objects and the result of research and development between an academic institution and industrialists. This project, of which the Paragraphe laboratory was one of the key elements for its realization, can be summarized as a group of participatory citizen sensors to measure the levels of ozone and noise in an urban environment. This project is part of an effort in the participatory and experimental sciences to rethink the relationship of the individual with his or her environment.
The technological and experimental aspect of the Green Watch Project consists of using two sensors: one for ozone and the second for noise. Geographic localization, necessary for getting the user’s coordinates, is done with a GPS chip. The data is communicated via a mobile terminal (a telephone) with a Bluetooth chip.
Figure 1.5.Architecture of the Green Watch
Figure 1.6.Map of the data from Green Watch sensors
This architecture29 (Figure 1.5) provides the possibility of measuring, recording and communicating the data to an online processing and visualization mapping platform (Figure 1.6)30.
Connected objects for the environment have shown their effectiveness in many contexts, the automation of sampling in high-risk places, such as during nuclear disasters, as was the case in Fukushima. This was an example where citizens searched on the Internet and social networks in order to understand the dangers of the situation and act accordingly. Radiometers had been installed in the area of the accident to measure radiation in real time and were connected to the Internet network, and the results were published on social media [SEG 15].
Fictions d’Issy31 is a generative and interactive novel developed at Paragraphe and presented during the Cube Festival, which was dedicated to digital creation, in 2005. The originality of the project’s approach consisted of combining communication tools by connecting a text generator [BAL 06] to readers by means of a mobile telephone and displaying the texts generated on electronic information signs in the urban space of the town of Issy-les-Moulineaux (Figure 1.7), a first for this type of digital installation. This connected artistic work project was a pioneer in the field of living art32. The love story it tells is generated continuously by fragments of text of two characters who are evolving in the town’s urban landscape.
Figure 1.7.A display panel participating in the Fictions d’Issy installation33
The principle of this connected work consists of the successive demands for the generation of fragments of texts (Figure 1.8) by readers via mobile phone calls using the keys on the keypad, with each one of the keys chosen influencing how the story unfolds and transforming the reader into an active participant in the story.
Figure 1.8.Example of a fragment of the story displayed on an information panel in the town34
In the past, the costs of constructing smart urban places were too high, and only accessible to a minority. The solution required the intervention of a specialized company, with a cumbersome process of integration and adaptation of devices. With the emergence of the IoT, home automation has made huge progress and has now become easy and inexpensive. You simply choose a central control device (Home Hub) compatible with a maximum of home automation objects35. Home automation is the field which has put the most items on the market, and it has not stopped developing since the first days of the Internet, the evolution of networks and video surveillance. We now have a connected and communicating habitat, if not to say intelligent without exaggeration, because several areas36 are involved in this revolution: security, energy, lighting, health, etc.
The smartphone has become the interface and the means of access and control for home automation. It is a simple and easy application interface available for the management of components. One pertinent example would be controlling entrance to and exit from the house, without the need for door keys, after the emergence of smart locks, such as the “Kevo” lock from the American company Kwikset37 which makes it possible to order the opening or closing of a door remotely and without a key (Figure 1.9). The contribution of this type of object to everyday life is undeniable. If someone rings the doorbell, you are alerted via smartphone and it is no longer necessary to stay at home to let in a visitor (or a repairman, for example). Combined with a connected camera, it will be possible to hear and speak to him remotely.
Figure 1.9.The Kevo smart lock from the American company Kwikset
Smart cameras are part of the array of connected objects created in order to address the undeniable security needs of private individuals as well as professionals. They take up the torch of traditional video surveillance which consisted of setting up an IP camera and accessing it remotely. The new generation is clearly evolving: the HD Home from Withings38 is a camera that integrates video recognition algorithms and night vision (Figure 1.10). Another function is audio analysis, which makes it possible to understand specific sounds such as the crying of children.
Figure 1.10.The Withings HD Home intelligent video surveillance
The interaction of these connected objects with the user allows object ↔ user communication via a smartphone, and an exchange of the data issued from the objects’ environment by sensors, such as temperature, humidity, continuous measurement of the ambient air quality, and possibly allows other actions via communication with other objects.
In Sweden, the use of local currency for payment has become almost obsolete. Donating to the church during mass or paying for a baguette or coffee is now done with ultra-modern methods, a smartphone in most cases, and, surprisingly, contactless payment by chips implanted under the skin of the hand (Figure 1.11). To make a payment, you just have to present your hand at payment terminal. Solutions are being tested by businesses for payments limited to cafeterias. A Canadian sports club now allows its members to be implanted with a chip with limited data to access the stadium39, an experiment which says a lot about the concept of the augmented individual and which provides a glimpse of a future that is closer than we think. Other possibilities are being considered, since personal, financial and other data is loaded onto the electronic chip.
Figure 1.11.Chip implanted under the skin of the hand40
With the connected bracelets, activity sensors and the implant of a micro-chip for (auto-)surveillance, human beings are increasingly hyperconnected. The field of the “Quantified-Self” and the example of Chris Dancy41 say a lot. This individu-Data [MER 13] shows the complexity that humanity could maintain with the masses of data that come from connected objects, and the way to interpret and use them in a healthy way.
This raises myriad questions about the connected human and questions about this way of life: security, private life, embedded personal data, etc. Social divisions are omnipresent when speaking about technological innovation, since older people who do not follow these technological changes very closely often find themselves on the fringes of these new uses and in difficulties socially, simply due to the fact that that societal evolution follows the majority and not the minority, which is the case in the digital society in which we have been living for some time now.
Another possibility for connected objects is to become a method of payment like any other. The company MasterCard, is working on ways to transform different fashion or other objects such as bracelets, rings, and smart watches42 (Figure 1.12).
Figure 1.12.Payment via a smart watch
