139,99 €
In this book, the authors focus on the concrete aspects of IoT (Internet of Things): the daily operation, on the ground, of this domain, including concrete and detailed discussion of the designs, applications and realizations of Secure Connected Things and IoT. As experts in the development of RFID and IoT technologies, the authors offer the reader a highly technical discussion of these topics, including the many approaches (technical, security, safety, ergonomic, economic, normative, regulations, etc.) involved in Secure Connected Objects projects. This book is written both for readers wishing to familiarize themselves with the complex issues surrounding networking objects and for those who design these connective "things".
Sie lesen das E-Book in den Legimi-Apps auf:
Seitenzahl: 364
Veröffentlichungsjahr: 2017
Cover
Title
Copyright
Foreword
Preface
Acknowledgements
Preamble
PART 1: Introduction – The Buzz about IoT and IoE
1 Introduction
1.1. Definition of communicating- or connected Things
2 The (Overly) Vast World of IoT
2.1. 2011–2016: the craze for the term “Connected Thing”
2.2. The true goal of this book
3 Why a Connectable Thing?
3.1. Examples of connectable things
PART 2: Constraints Surrounding an IoT Project
4 Aspects to be Taken into Consideration
4.1. Aspects pertaining to the concrete realization of Connected Things
5 Financial and Marketing Aspects
5.1. Economic aspects
5.2. Ergonomic aspects
6 Technical and Industrial Aspects
6.1. Technical aspects
6.2. Energy aspects
6.3. Industrial aspects
7 Regulatory and Normative Aspects
7.1. Regulatory aspects and recommendations
7.2. Health-related recommendations
7.3. Societal regulations and individual freedoms (privacy)
7.4. Environmental regulations and recycling
7.5. Normative aspects
8 Security Aspects
8.1. Security aspects
8.2. Judging the quality of security
8.3. Some thoughts about security, privacy and IoT
8.4. Vulnerabilities and attacks in the IoT chain
PART 3: Overall Architecture of the IoT Chain
9 Communication Models in IoT
9.1. Communication models in IoT
10 Overall Architecture of an IoT System
10.1. Overall architecture of a CT and IoT solution
10.2. From a more technological point of view
10.3. The very numerous protocols involved
PART 4: Detailed Description of the IoT Chain
PART 4A: From the User (The Outside World) to the Thing
11 From the Outside World to the Thing
11.1. Connection of the Thing to the outside world
12 The Secure Connected Thing
12.1. Physical constitution of the Thing
PART 4B: From the Thing to the Base Station
13 Means of Communication to Access a Base Station
13.1. Possible network connectivity technologies
13.2. Medium-range MR Wide-band (hundreds of meters)
13.3. Long-range (LR – tens of kilometers)
13.4. LTN – Low-Throughput Network
PART 4C: From the Base Station to the Server
14 Network Access Layer – IP
14.1. IPv4
14.2. IPv6
14.3. 6LoWPAN
15 The Server
15.1. Conventional functions of a server in IoT
16 Transport and Messaging Protocols
16.1. Transport
16.2. “IoT messaging” technologies
16.3. Protocols
16.4. HTTP – HyperText Transfer Protocol
16.5. HTTP/2
16.6. MQTT – Message Queuing Telemetry Transport
16.7. CoAP – Constrained Application Protocol
16.8. XMPP
16.9. DDS – Data Distribution Service
16.10. AMQP – Advanced Message Queuing Protocol
16.11. SMQ
16.12. JMS – Java Messaging Service
16.13. Other protocols
16.14. The broker
16.15. Programming languages
16.16. Operating systems
PART 4D: From the Cloud Server to the Various Users
17 Cloud and Fog Computing
17.1. Cloud computing?
17.2. Example: the PaaS platform AWS IoT
17.3. How security is managed
17.4. Fog computing?
17.5. Big data
17.6. Natural interfaces
PART 5: Concrete Realization of an IoT Solution Examples and Costs
18 Examples of the Concrete Realization of Connected Things
18.1. Subject/application taken as an example
19 Cost Aspects
19.1. CAPEX and OPEX are in the same boat…
Conclusion
Bibliography
Index
End User License Agreement
6 Technical and Industrial Aspects
Table 6.1. Example of the amounts of electricity consumed during the different phases of the Thing’s operation
8 Security Aspects
Table 8.1. Comparison of symmetric and asymmetric keys
Table 8.2. “Crypto Suites” standardized by the ISO
Table 8.3. Vulnerable points and attacks in IOT, in hardware and/or software
9 Communication Models in IoT
Table 9.1. Open System Interconnections (OSI) model
10 Overall Architecture of an IoT System
Table 10.1. Overall summary table
Table 10.2. Overview of the protocols frequently used in IoT
Table 10.3. Actors working together in an IoT chain
11 From the Outside World to the Thing
Table 11.1. Main properties of BLE in comparison to standard BT
13 Means of Communication to Access a Base Station
Table 13.1. Most common connectivity technologies
Table 13.2. ISM bands that can be used in accordance with ECC Rec. 70-03
Table 13.3. Main bands used without a license
Table 13.4. Reproduction of ERC 70 03 regulation
Table 13.5. Power – correspondence of Watts to dBmW
Table 13.6. Level of theoretical noise floor as a function of the bandwidth
Table 13.7. Examples of losses due to the environment
Table 13.8a. MAC frame on uplink
Table 13.8b. MAC frame on downlink
Table 13.14. Comparison of versions of LTE-M
14 Network Access Layer – IP
Table 14.1. Meaning of the fields in an IPv6 header
16 Transport and Messaging Protocols
Table 16.1. Structure of a TCP frame
Table 16.2. Main issuers of “IoT messaging” protocols
19 Cost Aspects
Table 19.1. Order of magnitude of pre-tax prices typically used in business
Table 19.2. Example of a schedule. Presented here solely for illustrative purposes in this book
Table 19.3. Example of development costs
Table 19.4. Initial estimation of industrial production price
Table 19.5. Example of cost price facilitating ROI over 1 to 3 years
Table 19.6. Example for SIGFOX (illustrative purposes only)
1 Introduction
Figure 1.1. Functional chain of IoT
2 The (Overly) Vast World of IoT
Figure 2.1. Is the IoT market a short-lived buzz, or will it endure?
Figure 2.2. Hype cycle
Figure 2.3. Hype cycle in mid-2015
3 Why a Connectable Thing?
Figure 3.1. Example of an IoT connected Thing: the Lysbox, made by Z#bre
Figure 3.2. Overall architecture of the system
6 Technical and Industrial Aspects
Figure 6.1. Operational sequences of an Internet of Things system
Figure 6.2. Electronic valve for measuring tire pressure. For a color version of this figure, see www.iste.co.uk/paret/connectedobjects.zip
7 Regulatory and Normative Aspects
Figure 7.1. The famous “Mandate 486”
Figure 7.2. Reproduction of text on the General Data Protection Regulation- GDPR
8 Security Aspects
Figure 8.1. Fears of app developers (Survey conducted in partnership with IEEE, Agile-IoT, Eclipse IoT)
Figure 8.2. Simplified educational example of security target
Figure 8.3. “Paper house” security
Figure 8.4. “Sandcastle” security
Figure 8.5. “Fortified castle” security
Figures 8.6 a, b, c. Depending on the physical implementations (Asynchronous CPU a), synchronous CPU b), and with the addition of a true SE c), it becomes impossible to identify the sensitive computational areas in the integrated circuit
Figure 8.6.d). Puzzling of Topology of transistors and integrated circuit functions
Figure 8.7. Batch of wafers
Figure 8.8. Example of an integrated circuit, highlighting the relative surface area necessary for cryptography
9 Communication Models in IoT
Figure 9.1. Functions of the OSI model
Figure 9.2. Encapsulation of the different frames
Figure 9.3. Comparison of the OSI and TCP/IP models
Figure 9.4. Usual protocols encountered in the OSI model and in Internet solutions (bold font indicates those most commonly used in IoT)
Figure 9.5. Simplified version of the TCP/IP layers
Figure 9.6. The famous two-layer simplified TCP/IP model
Figure 9.7a. Protocol landscape for IoT from devices to business process (Antony Passemard – V2 - 2014. For a color version of this figure, see www.iste.co.uk/paret/connectedobjects.zip
Figure 9.7b. Data flow of Internet Protocol Suite
10 Overall Architecture of an IoT System
Figure 10.1. Highly representative overview of the architecture of the standard IoT chain
Figure 10.2. Possibilities and possible choices of IoT solutions … and these are not the only ones – just the most commonly encountered
Figure 10.3. “Things” zone
Figure 10.4. Physical example of a Thing
Figure 10.5. “Base station/Gateway” zone
Figure 10.6. Physical example of base station/Gateway
Figure 10.7. Example of a function managed by a gateway (case of a UDP application)
Figure 10.8. “Cloud” zone
Figure 10.9. Example of a server
Figure 10.10. “User” zone
Figure 10.11. Main protocols employed in IoT
11 From the Outside World to the Thing
Figure 11.1. Example of IoT/NFC applications. For a color version of this figure, see www.iste.co.uk/paret/connectedobjects.zip
13 Means of Communication to Access a Base Station
Figure 13.1. “Data rate/distance” ratios for the most common connectivity technologies
Figure 13.2. Division of the world into Regions by the ITU
Figure 13.3. Main frequency bands that can be used in IoT (document from ARCEP)
Figure 13.4. Content of ERC 7003 – October 2016. For a color version of this figure, see www.iste.co.uk/paret/connectedobjects.zip
Figure 13.5. Relations between emitted power, data rate and range. For a color version of this figure, see www.iste.co.uk/paret/connectedobjects.zip
Figure 13.6. SIGFOX logo
Figure 13.7. SIGFOX footprint in terms of range/power/bandwidth. For a color version of this figure, see www.iste.co.uk/paret/connectedobjects.zip
Figure 13.8. Standard architecture of a SIGFOX structure
Figure 13.9. Narrow Band signal as a function of interference in Wide Band. For a color version of this figure, see www.iste.co.uk/paret/connectedobjects.zip
Figure 13.10. LoRA logo
Figure 13.11. Comparison between an NB-modulated signal and a signal having undergone spectrum spreading with DSSS
Figure 13.12. Representation of a “chip”
Figure 13.13. Representation of a “linear chirp”
Figure 13.14. OSSS physical frame
Figure 13.15. Format of the OSSS frame
Figure 13.16. Format of the LoRa packet
Figure 13.17. Demodulation of the LoRa Semtech preamble. For a color version of this figure, see www.iste.co.uk/paret/connectedobjects.zip
Figure 13.18. Demodulation of a LoRa message
Figure 13.19. Specifications of LoRa for the USA. For a color version of this figure, see www.iste.co.uk/paret/connectedobjects.zip
Figure 13.20. Logo and members of the LoRa Alliance
Figure 13.21. Standard architecture of a LoRA and LoRAWAN system
Figure 13.22. Content of the layers of the LoRaWAN™ standard
Figure 13.23. Overview of non-operated LR NB and LR WB networks (Source: Isaac Brown, from Lux Research)
Figure 13.24. Presentation of the different LTEs
Figure 13.25. Brief comparison of the performances of the different technologies
Figure 13.26. Brief chapter summary
14 Network Access Layer – IP
Figure 14.1. Details of an IPv4 message header. For a color version of this figure, see www.iste.co.uk/paret/connectedobjects.zip
Figure 14.2. Details of the header of an IPv6 packet. For a color version of this figure, see www.iste.co.uk/paret/connectedobjects.zip
Figure 14.3. Breakdown of an IEEE 802.15.4 frame
Figure 14.4. “Mesh-under” and “route-over” routing
15 The Server
Figure 15.1. Example of a room of servers
16 Transport and Messaging Protocols
Figure 16.1. Distribution of messaging protocols on the ground
Figure 16.2. Architecture of a broker
Figure 16.3. Examples of possibilities of certain broker programs
17 Cloud and Fog Computing
Figure 17.1. Histogram of platforms used in the Cloud. For a color version of this figure, see www.iste.co.uk/paret/connectedobjects.zip
Figure 17.2. AWS IoT solution. For a color version of this figure, see www.iste.co.uk/paret/connectedobjects.zip
Figure 17.3. Overview of services providing security for connected Things
18 Examples of the Concrete Realization of Connected Things
Figure 18.1. Concrete example of an IoT Thing
Figure 18.2. Overall hardware architecture of the Thing
Figure 18.3. More detailed illustration of the BASE
Figure 18.4. Illustration of the TAG
Figure 18.5. Simple architecture, secured with an external Secure Element
Figure 18.6. Simple architecture, secured with an internal Secure Element
Figure 18.7. Architecture secured by a Secure Element and equipped with a further microSD card
Figures 18.8. Examples of products (with integrated antenna)
Figure 18.9a. Screenshot of a management terminal
Figure 18.9b. Screenshot from a user’s mobile phone
19 Cost Aspects
Figure 19.1. Example of a LoRA Alliance compliance certificate
Figure 19.2. Examples of the three specific cases for LoRa applications
Cover
Table of Contents
Begin Reading
C1
iii
iv
v
xi
xii
xiii
xv
xvii
xviii
1
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
21
23
24
25
27
28
29
30
31
32
33
34
35
36
37
38
39
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
87
89
90
91
92
93
94
95
96
97
98
99
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
119
121
122
123
124
125
126
127
128
129
131
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
203
205
206
207
208
209
210
211
212
213
215
216
217
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
239
240
241
242
243
244
245
246
247
249
251
252
253
254
255
256
257
258
259
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
279
281
282
283
285
286
287
288
289
290
G1
G2
G3
G4
G5
e1
Dominique Paret
Jean-Paul Huon
First published 2017 in Great Britain and the United States by ISTE Ltd and John Wiley & Sons, Inc.
Apart from any fair dealing for the purposes of research or private study, or criticism or review, as permitted under the Copyright, Designs and Patents Act 1988, this publication may only be reproduced, stored or transmitted, in any form or by any means, with the prior permission in writing of the publishers, or in the case of reprographic reproduction in accordance with the terms and licenses issued by the CLA. Enquiries concerning reproduction outside these terms should be sent to the publishers at the undermentioned address:
ISTE Ltd27-37 St George’s RoadLondon SW19 4EUUK
www.iste.co.uk
John Wiley & Sons, Inc.111 River StreetHoboken, NJ 07030USA
www.wiley.com
© ISTE Ltd 2017
The rights of Dominique Paret and Jean-Paul Huon to be identified as the authors of this work have been asserted by them in accordance with the Copyright, Designs and Patents Act 1988.
Library of Congress Control Number: 2017932154
British Library Cataloguing-in-Publication Data A CIP record for this book is available from the British Library ISBN 978-1-78630-059-1
To begin with, I must applaud Dominique Paret and Jean-Paul Huon for this excellent initiative to write a book on the Internet of Things (IoT). There is a wealth of literature on this topic, but not a day goes by when we do not see numerous successful cyberattacks, which could endanger the large-scale rollout of IoT technologies if we are not conscious and cautious of the danger they pose. As Europe is projected to become the second biggest IoT market in the world by 2030, this represents an unmissable opportunity!
This very thorough book is written both for readers wishing to familiarize themselves with the complex issues surrounding networking objects and for those who design these connective “things”.
This book sets itself apart from the rest by: restating the fundamental elements, both software and hardware, of the technological building blocks, to describe service architectures; teaching the reader about the different protocols; making designers aware of the legal issues and the processing of sensitive data; and finally, discussing end-to-end security using an excellent technical basis.
Other points are highlighted in the discussion of numerous elements in the overall design of the IoT chain and the technical-economic realization of the so-called secure connected object.
Dominique and Jean-Paul have, for years, been recognized experts in the development of RFID technologies, contactless chip cards, NFC, IoT and software. The highly technical nature of the topics discussed herein must attest to their expertise.
EESTEL is proud to welcome these authors as members, to participate in the work of training, dissemination and security assessments, without which the electronic transaction market, and that of IoT in particular, could never develop.
Once again, bravo!
I hope that you, the reader, will enjoy this book and reap the benefits it has to offer.
Pierre CRÉGO
After a great deal of discussion on how to construct this essentially technical book, built around the concrete realization of secure connected Things in applications for the IoT (Internet of Things), we chose the following layout for the presentation:
–a general introduction to the world of IoT;
– a detailed description of the numerous aspects and problems connected to this discipline, which must be taken into account in undertaking any IoT project;
– a brick-by-brick description of the overall architecture of IoT solutions;
–the lengthy, detailed technical description of the various elements of the architecture is divided into four sub-parts:
- from the outside world to the Thing, inclusive,
- from the Thing to the base station, inclusive (the physical layer),
- from the base station to the server, inclusive (the IP/TCP layer and application layer),
- from the server to the outside world (the application layer);
– the concrete illustration of an IoT solution, using detailed examples and the true costs they bring with them.
Dominique PARET Jean-Paul HUON March 2017
As per usual, there are many people to whom thanks are due for their goodwill, for listening, for their remarks and constructive comments. Thus, to all those people, who know beyond a doubt who they are: a huge, warm and heartfelt thank you!
Now a few more specific acknowledgements and hat-tips to certain very longstanding friends:
– firstly to Jean-Yves Cadorel and Eric Devoyon (formerly of CRESITT, and then 3ZA) and Jean-Marc Vauguier co-founder of Z#BRE;
– secondly to Pierre Crégo, head of Mercury Technologies, founder and head of education at EESTEL, amongst other roles;
– and to a number of friends: Maître Nathalie Damiano, Jean-Claude Paillier, Claude Meggle, François Brion, Jean-Luc Garnier, members of the Association EESTEL, Christophe Huguet who is a networking expert from Exaprobe, Antony Passemard, Michael Garcia from AWS and many more.
All of these, in their own way, have provided us with many excellent examples as technical explanations, … and also with many shared golden moments.
As a preamble to this book, let us start as we mean to go on, and show the “color” of the coming discussion.
First of all, this book is not intended to be (and is not) an encyclopedia of connected Things and IoT/IoE. There are thousands of articles about the subject online (some better than others), providing a framework for wild and wonderful flights of theoretical fancy, enormous and varied future markets of all kinds, stupendous commercial figures, etc. For our part, as we are not keen on unproductive redundancies, we have focused only on those subjects about which far fewer articles are available: that is, the daily operation, on the ground, of this domain, between concrete discussion of the Designs, Applications and Realization of secure connected Things – IoT/IoE. Even so, the discussion will be plenty extensive!
As each word of the title has been considered at length, it is worth giving a brief explanation of each term.
IoT/IoE – Today, there is a great deal of talk about the “IoT” – the Internet of Things. For our part, we wished to skip over the (immense but) restricted field of IoT (“Things, Objects”) and move up to the level of the IoE – the Internet of Everything – i.e. absolutely everything, including animals, individuals, groups of individuals, and so on.
Things – This term serves as our starting point for the whole string of explanations… Thus, a “Thing” as meant here could also be called a “terminal”! In this book, when we speak of “Things”, with a capital “T”, the term includes everything that is found in everyday literature referred to as “devices”, “elements”, “nodes”, “end devices”, “endpoints”, “terminals”, etc. – in short, any “thing”, be it large or small, which serves as a point of origin for data which we have to or wish to exploit.
Connected – Connected, certainly… but connected to what? How? Why? At what cost? Furthermore, Things may be simply connected to one another by any type of connection, and we speak of “Connected Things”; or else they may be connected via a specific type of link – e.g. via the Internet (which complicates matters somewhat), in which case we speak of “IoT or IoE”… but this is not a goal in its own right. Beware of confusion between styles! We must not mix up cabbage and carrots… but we have not precisely defined what is a cabbage and what is a carrot! Please, dear reader, take care to avoid unwarranted confusion of the terminology.
Secured – Here, there is no doubt; there is no alternative. A connected Thing must be secure, and that security must be rigorously established from end to end of the chain, including in Cloud storage if such a service is used; otherwise it is all for naught. (Be careful: that one sentence encapsulates 35 years of security of banking transactions and high-level industrial exchanges). Security is not a luxury, but an absolute necessity, in terms of the operation of the whole system and in terms of individuals’ private lives, in today’s world and tomorrow’s, because there is too great a risk of piracy, hacking, phishing, etc. to which we are exposed.
Applications – Obviously, we cannot forget the vast domain of all kinds of applications.
Design – The aim of this book is to serve as a guide so readers forget nothing and avoid the pitfalls that could emerge in the process of designing secure connected Things.
Concrete realization – This is the true purpose and the very core of this book. It is all very well to speak about the Internet of Things; to discourse articulately on the subject (how many times have we seen and heard such speeches…?) but to concretely, physically create a connected Thing for commercial ends and successfully sell it in large quantities, at a reasoned and reasonable price is far better… Otherwise we may as well do nothing, without a lot of noise!
Here, then, is the express purpose of this book.
This first part is divided into a number of introductory chapters, always having a direct or semi-direct link to the Internet of Things – IoT.
By way of introduction to this book, Chapter 1 offers a brief overview of the relevant vocabulary, with a view to avoiding the misunderstandings which occur all too often in the field, and resolving the confusion between the terms “connected things”, “communicating things” and devices which do actually form part of the “Internet of Things” per se.
For its part, Chapter 2 touches on the (overly) vast mode of IoT, the catchall surrounding the IoT, the “buzz” in the media, in the specialized or general press, etc., and the concrete reality, which consists of defining, designing, manufacturing, perfecting and industrializing a product, and in particular, successfully selling it!
To conclude this first part, Chapter 3 employs a concrete example to present a view of the technical-economic situation, with the “why” leading to the conception and design of a communicating thing that uses the Internet.
This first part recaps fundamental and classic concepts of theories… but first, in order to clarify our approach, let us look at a little vocabulary and examine a few definitions of the “Who is Who” in the “IoX”.
What a marvellous term “Connected Thing” is, which conveys absolutely anything… and its opposite! How many people will delight in that name!
“Thing” is easy: it is easy to imagine that the term covers everything from an extremely miniature Thing to an enormous ocean liner!
“Connected” to what? How? Why? … etc. In this aspect, we are often still left searching for meaning!
Over the ages, connections have been established in different ways: in smoke signals, …, over wired connections, but today, all of this now seems somewhat retro to some people. The uni-directional or bi-directional, “wireless” or “contactless”, connection is much more in fashion.
That said, let us keep things simple and open our eyes. Radio-frequency identification (RFID) has been in use for a number of years (decades, even); so too have contactless chip cards, NFC, Zigbee, Bluetooth BT & BLE, Wi-Fi, etc. and, much like Mr Jourdain in Molière’s The Bourgeois Gentleman speaking prose all his life without even knowing it, we have been making “wireless” “Connected Things” –secure ones, even, and even highly secure!
An example from the public “automobile” market:
For 15 years, an electronic valve for cars has been a “Connected Thing” (using UHF), connected to the electronics of the car, but this is not an example of the IoT!
Thus, this current fashion is not truly groundbreaking, except for a certain faction of the press and avid “followers” of new words… even if those new words express the same things as the old ones!
What exactly does the IoT consist of, and what is the IoE (i.e. the Internet of Everything)?
It is a physical network of Things (or “devices/objects”) incorporating sensors, electronics, software and connectivity, enabling these Things to exchange data with an operator, a manufacturer, a service provider or other connected devices. Thus, it is based on a number of different things.
The IoT works under the auspices of the “ITU – the International Telecommunications Union – Global Standards Initiative (IoT-GSI)”. For information, IoT-GSI covers connected devices and Things (e.g. personal computerized devices, portable or office computers, tablets and smartphones, etc.) via multiples communication protocols connecting the elements to one another, such as Bluetooth, ZigBee, Long-Range Wide-Area Networks such as LoRa, SIGFOX, etc.
IoT devices (elements) or indeed what we define generally as Things, often function without a human interface, generally using the energy supplied by a battery, and are usually devoted to a single task. They are generally described as “smart objects”, or as “connected devices”. As it is, there is a whole host of such devices! For example:
– electrodomestic networks which can be remotely monitored or controlled;
– sensors, industrial equipment and other integrated elements which are connected in networks;
– “Smart home” elements such as lighting, heating or ventilation units with remote management/control, access, etc.
– “wearables”, fashion accessories or connected clothing, etc.
– etc.
This typically means that an IoT device falls into one or several of the following functional domains:
– Surveillance: teledetection and notification of operating conditions and use of other external environmental factors;
– Control: means that certain functions of the Thing can be remotely managed or customized;
– Automation: devices which can operate independently, capable of adapting to environmental or operation factors with minimal human interaction;
– Optimization: monitoring- and control functions meaning that the manufacturers of the Things can optimize their performances and effectiveness in real time, based on the history and/or instantaneous operational data;
– Preventative maintenance or diagnostics: these can also be carried out remotely.
Having barely had the time to gain familiarity with the Internet of Things, suddenly we are talking about the Internet of Everything – IoE. What is the difference between these two concepts? We shall answer this excellent question shortly, but first, let us take something of a purist stance, and call a spade a spade. To begin with, in order for there to be an “Internet of x”, the “Internet” (and its structure) must be involved in the story – otherwise there could not be an IoT and certainly not an IoE; however, there are many, many Connected Things which operate with links other than the Internet… thus, it is important not to confuse cabbages and carrots*!!!
IoT, as the name indicates, implies that sooner or later we must use an Internet connection… but that is not always the case!
NOTE.–. We shall refrain from defining what cabbages and carrots respectively are in this story!
The “Internet of Things” is often defined as being the network of physical Things containing “embedded” technology (integrated, onboard), so as to communicate, detect or interact with their internal states and/or the external environment. Figure 1.1 shows a non-exhaustive example of the functional chain of such a structure.
Figure 1.1. Functional chain of IoT
Often, by default, in the eyes of many, the Internet of Things is all so-called connected products, monitored by mobile applications: watches, weighing scales, bracelets, toothbrushes, refrigerators, etc., which often do not use the Internet at all, instead using other means of communication such as NFC, BLE or Wi-Fi, for example.
The Internet of Everything – IoE, for short – goes far beyond “Things” (Connected Things). In fact, this is an expression invented in 2015 and promulgated by Cisco – one of the world leaders in network infrastructure. There is every chance that in tomorrow’s world, the Internet of Everything will become a reality, encapsulating not only the world of the Internet of Things, but also that of data, processes… and people (through their smartphones and social networks)! More broadly still, the Internet of Everything is based on the harvesting of the information that we share individually and collectively – that is, it operates at a much higher level than with simples Things in the Internet of Things. That data mining will be organized by private companies capable of processing enormous streams of data – known as “Big Data” (via the Internet) – and charged with turning those data to profit, selling them on either to advertising agencies or marketing networks, or to public-sector organizations wishing to optimize their services and territories, or indeed to public-interest private companies (transport operators, energy providers, works contractors, waste-management companies, etc.), and so on. In other words, the raw material used by this new industry will be our personal information, freely given, without us having any control over the use made of it… Of course, we must not neglect to mention the flip side of the coin: the danger of the servers hosting all these data being hacked!
The admirable goal of the Internet of Everything is to support numerous developments and improvements, such as smart homes, optimized control of energy consumption and natural-resource consumption, smart parking, more appropriate road tolls, etc. and also help improve administrative performances by enhancing agents’ productivity and reducing operating expenditure. That, at least, is the dream…
The Internet of Everything makes it possible for cities to ultimately become “Smart Cities”, and for public administrations to hinge their efforts on the following three axes:
– budget savings:
EXAMPLE.– sensors built into trash cans send a message to indicate that they need to be emptied. Such a system in Finland has already delivered a 40% saving on the waste collection budget.
– new revenues:
EXAMPLE.– in New York, urban screens operating 24/7 are used for surveillance in the city, dissemination of information, offering means of communication (e.g. Wi-Fi), but also generating revenue through advertising.
– advantages for citizens:
EXAMPLE.– “smart parking” employs an intelligent system to inform drivers of the number of free spaces left in the different parking lots in the city.
In Nice, this system has reduced traffic jams by 30%, increased parking revenue and reduced CO2 emissions.
Having come to the end of these few introductory remarks about our near future, let us now turn our attention to the enormous world of IoT.
Over the past five years, the media has been inundating us with news of Connected Things, in enormous tidal waves of hype for each and every successive one! What does this represent, and where are we to situate this book and its content within this quagmire of information?
Anything and everything! It is true that the dawn of connected Things and the generalized use of digital technology have led to the production of vast quantities of data, creating new opportunities to improve operational efficiency, to reinvent the customer experience and to create new services. Therefore, in all major fields of activity, IoT plans are being announced with a great deal of fanfare, with enticing slogans:
– Aeronautics: “air travel and airport security 2.0”
– Automobile: “when intelligence rhymes with performance”
– Energy: “draw value from the grid and rationalize your consumption”
– Commerce and large-scale distribution: “enhance supply-chain reliability whilst also improving customer service”
– Luxury: “new services for a demanding clientele”
– Health: “the beginnings of a revolution”
– Cities and collectives: “when the environment can communicate”
– Rail travel: “new opportunities”
– Sea travel: more modest, a sector only just coming to terms with the technology
– and all sorts of other industries, services, smart cities, insurance companies, distribution firms and transport operators have their own projects!
Is this market for Connected Things a bubble, as we saw only a few years ago in other areas (e.g. property, dot-com businesses, and so on)? Can it last? What does our crystal ball say (see Figure 2.1)?
Figure 2.1.Is the IoT market a short-lived buzz, or will it endure?
Taking, as a starting point, the hypotheses of Cisco and Ericsson, and in the knowledge that between 2015 and 2021, the number of IoT-connected devices is projected to grow by 23% annually, peaking at almost 16 billion units out of a total of 28 billion connected products (taking account of PCs, portable computers, tablets, mobile telephones and landline phones), here are a few nuggets of information.
– in 2018, the number of IoT Things connected by non-cellular radio protocols should rise from 4.2 billion to 14.2 billion units;
– it is also predicted that the cellular IoT (with Things connected
via
mobile telephone technologies (2G, 3G, 4G, LTE-M, NB-IoT, 5G, etc.) will develop spectacularly, with 1.5 billion units in 2021, compared to 400 million in 2015 (as the peak throughput of the descending radio channels of the LTE networks run by mobile operators will surpass a gigabit per second and this will lead to the development of compatible mobile terminals and IoT Things, first in Japan, the United States, South Korea and China).
– One final point: in terms of the number of Things and IoT connections, Western Europe will lead the way, with 400% progression by 2021. This phenomenon will be due, notably, to the recent evolutions in legislation in the field of communicating energy meters, and to the EC’s demand regarding the eCall initiative (distress call) for connected vehicles.
As our crystal ball has offered us the point of view elucidated above – which is merely one more projection amongst others – wisdom leads us to point out that the concept of the hype cycle has a well-known shape, which, whilst it is unequivocal, is not always too close to the mark, though not too far wide of it either!
New technologies offer numerous admirable, wonderful ideas, but how are we to know whether or not they will achieve real commercial success? In addition, it is very difficult to estimate the financial risk that a company will have to endure (often over the course of several years of R&D) for the commercial launch of a new product on a market with no point of reference, as the product is a so-called disruptive innovation – a technological breakthrough.
Each year, the Gartner group, made up of specialist consultants in the prospective development of emerging technologies, offers its clients a view of the life cycles of their innovations, the different phases of adoption and maturity, to try and project when the product should (finally) become profitable!
Every summer, Gartner polishes off its crystal ball, and for the coming year, publishes its “Hype cycle” (registered trademark of Gartner) for the technological products currently in fashion. This helps everyone to gain an idea of how to position their product and glimpse its evolution over time, and thus enable companies to estimate the kind of sales effort they will need to implement alongside the development, with a view to planning the product’s rollout.
Every innovation/technological product is believed to obey a hype cycle, made up of five key phases in terms of visibility and maturity (see Figure 2.2).
Figure 2.2.Hype cycle
(source: Gartner)
– Phase 1: emergence of the idea: “Technology Trigger”
As at the start of any branch of activity, there are many innovative ideas around: good ones, bad ones, ones which are idealistic but not particularly constructive, etc. This creates a “buzz” and draws interest from the media. This is the stage where teams of future engineering students doing their final-year projects are itching to create their future “start-ups”.
In general, at this stage, all we have are models/prototypes (POC – Proof of Concept), and the commercial viability of the products has not yet been proven.
– Phase 2: “Peak of Inflated Expectations”
The publicity created when the idea was launched has given rise to numerous emulating products. There are many new entrants to the race and numerous startups, SO/HOs, SMEs, SMIs, and this is the stage when a few “success stories” begin to flourish… but there is also a certain amount of “bad buzz”.
It is at this moment when innovators need to take concrete action, and move on to real production to make the product available, because the public’s expectations are high.
– Phase 3: “Trough of Disillusionment”
After this significant phase of hope in the market, we see a phase of depression, stemming from the fact that the products are not always available or do not live up to the expectations people had of them, or indeed because there are far too many disparate offers and solutions, the price is still a little too high and, because of the lack of norms for the market, there are too many protocols and standards and/or proprietary standards, little or no interoperability, etc.
At this stage, public interest takes a nosedive, and companies have to decide whether they are willing/able to invest to truly adapt the product to the demands of the “early adopters” of the market.
It is often at this stage when numerous start-ups fail, through lack of liquidity, funding, aid, a solid financial position. Thus, there are “crashes” and a few/many decomposed bodies of companies wash up on the shoreline.
– Phase 4: “Slope of Enlightenment”
The project begins to reach its final development phase. Companies come to have an increasingly good understanding of the market they are dealing with. It is a time when groups of complementary interests come together to form joint ventures; the best start-ups are bought up by larger companies/groups, either to develop and help these SMIs grow, or to bring their own products up to speed in the domain… or indeed to better be able to smother them in the longer term (this approach is deeply unkind, but it is done, and it is a very effective strategy!).
This is when the second or third generations of the product are released.
– Phase 5: “Plateau of Productivity”
Finally, a genuine market emerges; the technology begins to be more widely used, and it is finally adopted by the “cautious majority” (Rodgers’ model states that the number of people adopting a new product obeys a Gaussian curve. Once the cautious majority has been won over, the product has reached half its level of salability).
Viability criteria begin to become clearer; the relevance of the innovation is more convincing, and profitability comes shining through. Hurrah! We are saved!
These five phases have different durations and amplitudes depending on the technologies and the markets in which they arise. Some products may reach the plateau of productivity in two years; others in ten; others still may become obsolete before ever reaching it!
With experience, Gartner has managed to define around a hundred reference curves for the technology sector: e-commerce, telemedicine, transport, software, etc. For instance, as regards the subject of interest to us here, Figure 2.3 shows the results of Gartner’s crystal ball for 2015.
Figure 2.3.Hype cycle in mid-2015
(source: Gartner - july 2015)
In short, we see here the well-known industrial and economic projection, which overlaps with the hype cycle! Consider yourselves warned!
Let us return now to our initial question: What does this represent, and where are we to situate this book and its content within this quagmire of information? Elementary, my dear readers… allow me to explain!
The next part of this book describes the steps to be taken and respected so that your project avoids the trough of disillusionment (parts 2 and 3 of the hype cycle), so you can skip over that part and go directly from the phase of reflection on innovation (or innovation trigger, part 1