An IoT-blockchain Architecture Based On Hyperledger Framework For .

1y ago
10 Views
2 Downloads
802.59 KB
9 Pages
Last View : 9d ago
Last Download : 3m ago
Upload by : Raelyn Goode
Transcription

An IoT-blockchain architecture based on hyperledgerframework for health care monitoring applicationOumaima Attia, Ines Khoufi, Anis Laouiti, Cédric AdjihTo cite this version:Oumaima Attia, Ines Khoufi, Anis Laouiti, Cédric Adjih. An IoT-blockchain architecture based onhyperledger framework for health care monitoring application. NTMS 2019 - 10th IFIP InternationalConference on New Technologies, Mobility and Security, Jun 2019, Canary islands, Spain. pp.1-5, 10.1109/NTMS.2019.8763849 . hal-02434834 HAL Id: tted on 10 Jan 2020HAL is a multi-disciplinary open accessarchive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come fromteaching and research institutions in France orabroad, or from public or private research centers.L’archive ouverte pluridisciplinaire HAL, estdestinée au dépôt et à la diffusion de documentsscientifiques de niveau recherche, publiés ou non,émanant des établissements d’enseignement et derecherche français ou étrangers, des laboratoirespublics ou privés.

An IoT-BlockChain Architecture Based onHyperledger Framework For Health CareMonitoring ApplicationOumaima AttiaInes Khoufi, Anis LaouitiCedric AdjihNational School of Computer ScienceUniversity of ManoubaManouba, Tunisiaoumaima.attia@ensi-uma.tnSAMOVAR, Télécom SudParisCNRS, Université Paris-Saclay9 rue Charles Fourier 91011 Evry, telecom-sudparis.euInria SaclayInfine TeamF91120 Palaiseau, Francecedric.adjih@inria.frAbstract—BlockChain a form of distributed ledger is gainingenormous attention in area beyond its cryptocurrency like theInternet of Things (IoT). Health care monitoring is one of IoTapplications where many devices are connected. These connectedthings carried data that needs to be stored in a secure way. Inthis context we focus on IoT-BlockChain architecture for healthcare monitoring application. We start our study by exploringboth IoT and BlockChain technologies. Fabric Hyperledger isa BlockChain framework that fits our need. In this paper, wepropose a security architecture based on the Fabric Hyperledgerframework. We validate our approach first at a design level byrunning examples, then by showing some implemented functionalities.Index Terms—IoT, Blockchain, Fabric Hyperledger, NDN.I. C ONTEXT AND M OTIVATIONThe evolution of Internet of Things (IoT) started a decadeago as part of the first phase of the digital transformation andit is evolving as a powerful and an attractive next generationservice infrastructure. Various applications and services exploiting sensors and producing data have been increasinglyemerging into markets in broad and different areas suchas health care, transportation, industrial automation, security,food safety, distant object control and emergency response totragic and serious incidents particularly natural disasters and soon. These applications therefore will impact people’s everydaylife and on the other side they will revolutionize the industryorganization which will increase the world’s economic growth.For example, smart-homes will enable their residents toautomatically open their garage when reaching home, preparetheir coffee and adjust climate control systems. The sameidea can be applied in hospitals and health care serviceswhere medical devices such as heart monitors, blood pressuremonitors, blood sugar sensors, and many other devices will beconnected to the Internet and thus will be enabled to delivermore valuable data. This intensive use will lessen the need fordirect patient-physician interaction.Nevertheless, it is necessary to mention that opening connectivity to the external world creates new challenges andraises worries and questions about data and IT infrastructuresecurity that need to be considered seriously in order to realizeits potential benefits especially in the medical domain wherethere is no place to errors.In our study we focus on health care application wheremedical connected objects collect relevant information abouta person’s health status to assist with medical follow-up andadherence. The data recorded in real time by connected sensorsprovides an indicator of the state of health of the user.The main problem appears when we take in considerationhundreds of millions of IoT devices that are designed to carryout measurements, process and communicate collected data.The threat rises if these devices themselves are becoming moreand more vulnerable to physical attacks that may lead them tonon-cooperative behavior or misbehavior with the rest of thenodes in the network and even become malicious nodes whichaim at damaging other nodes by causing network outage andby corrupting the basic functionalities of the related system.It will be scary then to imagine how devastating it wouldbe in medical domain, if these devices were spying on us orif the data in transit was intercepted by an unknown adversaryor even if the network itself was exposed to a potential harm.This is why security systems must offer adapted mechanisms to cope with these challenges and provide the availability, integrity and confidentiality of the systems.Popularized recently (notably through one of their originalapplication, the Bitcoin), BlockChains are a mean to exchange data, perform actions, and transactions in a distributedway, while maintaining a distributed ledger. As such, theBlockChains are ideally suited for the Internet of Things,which are associated to physical objects (even human users)and interacting with the physical world (smart watches, robots,mobile phones, automatons, cars, sensors& actuators) in anidentical distributed way. In addition to its distributed characteristic, the BlockChain technology is based on publickey cryptography and primitives such as digital signaturesand hash functions, which can give security. Also, throughpublic key infrastructure (PKI), the BlockChain enables theconfidentiality. In this context, a line of work has explored the

use of BlockChains for IoT security.Our study fits within this context. It consists in designingand implementing a secured IoT architecture based on theBlockChain technology for the Health care sector. Our choiceis motivated by the fact that Health is an essential elementof the international sustainable development. As a matter offact, the aim of our architecture is to insure a secure remotemonitoring system by the use of IoT. More precisely, we willmonitor some patient connected devices and we will retrievetheir collected data in the BlockChain network. This data willbe fetched with its name instead of using the devices IP addresses. Thus, the Naming Data Networking (NDN) paradigmaccommodate well for intermittent connectivity and mobility,multicast, and broadcast are natively supported. Then, thework will focus on configuring a BlockChain network usingFabric framework provided by Hyperledger [1] and designinga Graphical User Interface (GUI) that allows a user withinthe network to display its ledger in clear visualizations anddashboards.The paper is organized as follows. In section II we propose a detailed state of the art about the IoT, BlockChaintechnology and NDN architecture. In Section III we presentour proposed architecture. In Section IV, we present thechosen tool to implement our approach, we illustrate howour medical BlockChain is configured using the HyperledgerFabric Framework and we validate it. Finally, Section Vincludes some conclusions and future developments.II. S TATE OF THE A RTIn this section we investigate the concept of BlockChaintechnology in the Internet of Things [2] and the NDNparadigm. .A. Internet of things IoTThe Internet of Things [3] enables physical objects to see,to hear, to interact, to communicate and to perform differenttasks and jobs by having them ”talk” together in order to shareinformation, to coordinate decisions and to collaborate towarda common goal. These connected things anytime soon willno longer be those traditional objects with limited capacities.Although, they will be transformed into smart objects withgreat computational and communication capabilities. Thanksto the fact of exploiting the Internet of Things’ underlyingtechnologies such as ubiquitous and pervasive computing,embedded devices and Internet protocols and applications. Theuse of the Internet to enable communication and collaborationbetween objects will offer new opportunities to the differentsystems but also will create new challenges that must beconsidered in order to realize its potential benefits. We distinguish 3 IoT Challenges : interoperability and standardization,identity management and security.Most IoT smart devices will be connected through a commoninterface in order to communicate. Then, the task of standardization needs to be considered and redressed to provideinteroperability among the various objects. Also, it is a meanto standardize the interaction and the communication amongthe network.Identity management is also an important challenge in theInternet of Things that must be taken into account as millionsof objects across the world are interconnected in variousapplications, thus the need for unique identification of eachobject arises. This calls for a naming and identity managementscheme to be in place in order to dynamically assign uniquenames and identities to all the objects deployed worldwide andhence the importance of a data naming architecture for IoTsystems such as Information Centric Networking Architecture(ICN) [4].Traditional security mechanisms cannot be directly applied toIoT technologies due to the different standards and communication patterns involved. Moreover, the existence of such alarge network of a high number of interconnected entities willdefinitely imply different scenarios of attacks. This will putall those devices at a high risk, thus harming the affiliatedusers. To cope with this challenge, cyber-security systemsmust offer adapted mechanisms to protect the collected datafrom the physical devices since it may store and managesensitive user information. This means that at any momentIoT systems need to provide data confidentiality, integrity, andavailability. This can be achieved by utilizing data encryptionand data redundancy as well as authentication, access controland authorization mechanisms in order to prevent unauthorizedusers to access the system. However, in many situations, wehave to protect ourselves as well as the whole system fromthe information providers since they can act deceitfully byproviding false or misleading information and here traditionalsecurity mechanisms are unable to protect users against thistype of threat. We need then to be sure that we are talking tothe right thing, that it is operating correctly, that we can trustthe information it provides and that no-one else can interferealong the way. Hence the importance of a secure distributedsolution for IoT systems.B. BlockChain technologyA BlockChain [5] [6] is a database that maintains the historyof all the exchanges made between its users since its creationwithout the need for a central authority. This database or globalledger is secure and distributed: it is shared by its differentusers, without intermediaries, which maintains records of allthe exchanges made between the nodes on a BlockChainnetwork. This exchange is called transaction. The BlockChainshared characteristic allows everyone to check the validity ofthe chain. Each digital record or transaction in the thread iscalled a block and each block is linked to a specific participantand timestamped. Once a block is created, it has a uniquehash, which presents its identity and all of its contents and itis always unique. Changing something inside a block wouldresult in a total change of not only the local hash, but itinfluences all the following blocks.1) Principles & Properties: The success and evolutionof the BlockChain technology rise from 5 main characteristics [7], which are:

Distributed Ledger: Distributed because there is no central certificate authority for transactions and the data isgeographically replicated across multiple participants.Decentralized network: Decentralized because the network runs on a peer-to-peer basis.Immutable: Immutable because no one can change thedata once it has been written to a BlockChain.Highly Secure: Highly Secure because if someone wantsto alter previous records, there is a very high cost tosucceed, as the ledger is shared among all nodes.Public: Public because everyone participating can access the contents of the registry without a request forpermission. This does not mean everyone can see theactual content of the data sent since it is protected by thesender’s private key.2) Basic concepts: Before using the BlockChain, we needto understand the basic concepts of this technology. Node: Computer connected to the network and using aprogram relaying transactions.Ledger: Registry in which transactions of a system arerecordedHash function: A hash function is a particular functionwhich, from a data provided in input, calculates an imprint used to quickly identify, although incompletely, theinitial data. The functions of hash are used in computerscience and cryptography.Hash: Result produced by a hash functionSmart contracts [8]: They are programs, accessible andauditable by all authorized parties, whose execution isthus controlled and verifiable; designed to execute theterms of a contract automatically when certain conditionsare met [9]. The rules governing the program may cover,for example, any verifiable event in a computerizedmanner. The digital and automated nature of the contracttherefore theoretically allows two partners to establish aconstraint without having to trust each other beforehand,without any central authority or intervention. It is indeedthe system itself, and not its agents, that guarantees thehonesty of the transaction.Mining [10]: The use of computing power to processtransactions, secure the network and allow all users ofthe system stay synchronized.Consensus mechanisms: They are used to ensure that allnodes in the network (pairs) have the same informationand that only valid transactions are recorded in thedistributed registers. In other words, this is the way tovalidate BlockChain blocks. The most known BlockChainconcensus are [11]: Proof of Work (PoW), Proof ofStake (PoS), Practical Byzantine Fault Tolerance (PBFT),Hashcash, Zero Knowledge Proof.3) BlockChain types: There are 3 types of BlockChains :public, private and consortium BlockChain. The public BlockChain is completely open where anyonecan join and participate to the network. Each transactionis verified and synced with every node affiliated with theBlockChain. In order to achieve consensus, each nodemust solve a proof of work so as to ensure that all nodesare in sync. As example of public BlockChains we cancite [12]: Bitcoin, Ethereum, Litecoin. In the private BlockChain, an access control layer is built.The network owner has control over who can join thenetwork, and who can participate in the consensus processof the BlockChain. The Bankchain [13] is an example ofa private BlockChain. The consortium BlockChain is partly private but operatesunder the leadership of a group instead of a singleentity. A consortium between a set of known entitiesis made to decide who has access to the BlockChainledger, which transactions can remain public, and whichmust be restricted to a smaller group of members. Someexample of Consortium BlockChain: Hyperledger [14],MultiChain [15], Openchain [16].4) BlockChain tools: Because of its great use in the world,several BlockChain tools have been created, to name a few: IOTA [17] is a new public distributed ledger that utilizesa novel invention called ”Tangle”. Tangle is a DirectedAcyclic Graph (DAG). Unlike the traditional BlockChain,it has no blocks, no chain and no minors. IOTA supportsnano-payments without transaction fees. MultiChain [18] is a private permissioned BlockChainthat provides direct interface with many parameters. Ituses a publish API to add a data stream. Then, eachnode can subscribe to those streams that is interestedin. Mutichain may be a preferred choice for the privateBlockChains especially because it has the advantage ofan easy-to-interact-with API. Hyperledger is an open source IBM BlockChain producthosted by the Linux foundation. It is the most completeprivate BlockChain on the market, but it is also one of themost complex [1] to deploy. The set of components thatmust be implemented for a single node to be operationalrequires a lot of engineering and configuration. Fabric,Sawtooth and Ihora are the frameworks proposed byHyperledgerC. IoT-BlockChainMany studies focused on the use and adaptation of theBlockChain in the IoT context [19]. Among them, those thatillustrate the use of this technology in the field of health care,whether for public health management, medical research basedon the personal data of patients or for quality assurance inthe production of drugs. Other researchers [20] presented anadaptation of the BlockChain for the smart home case. Byclustering devices and adding local BlockChains, which showthat it is possible to reduce the load on the network whileensuring the security of users’ data and the protection of theirprivate lives. Finally, smart contracts [21] can be interestingfor IoT because they allow the automation of long processeswhile ensuring their verifiability.The integration of the BlockChain into the IoT will lead tosignificant transformations in several sectors, leading to new

models and requiring us to reconsider how existing systemsand processes are implemented. The BlockChain can also offera way of ensuring the security of user data as well as theprotection of privacy, thus allowing for a greater adoption ofIoT.The adoption of BlockChain in IoT is not simple and leadsto the following defects: Power and processing time: IoT networks are formed bydevices that have different computing capabilities and notall of them able to run the same encryption algorithm atthe desired speed. Indeed, the mining requires a computing capacity and the majority of the equipments will notbe able to manage it. In addition, it takes a lot of timeand IoT applications may require short response time. Storage: The BlockChain register must be stored on thenodes themselves. The needed storage space will increasein size as time goes on. This is beyond the capabilitiesof a wide range of intelligent devices such as sensors,which have a very low storage capacity. Traffic Overhead: The underlying BlockChain protocolscreate significant network traffic that may be undesirablefor IoT devices with limited bandwidth. Scalability: BlockChain fails badly as the number ofnodes in the network increases. Whereas, IoT networkscan contain a large number of nodes. Thus, BlockChainis a promising technology for IoT but not straightforwardand have to be adapted. We will present in the nextparagraph the architecture proposed for IoT-BlockChaincalled smart home architecture.Authors in [20] [22] proposed a smart home architecturethat combines IoT and BlockChain technologies. This solutionis a new instantiation of BlockChain that eliminates theconcept of PoW and the need for rewards. The frameworkrelies on the hierarchical structure and distributed trust tomaintain the security and confidentiality of BlockChain whilemaking it more specific to IoT requirements. However, theIoT-BlockChain architecture has not yet been implemented andit does not propose the most suitable BlockChain tool to itsrealization. Also, the existing architecture does not promotemobility. Hence the need for a paradigm to manage all thedata in a secure way which can be supported by IoT devices.Thus the need for the NDN architecture.D. The NDN architectureThe Information Centric Networking Architecture(ICN) [4] [23] has been recently proposed as an alternativeto the TCP/IP communication model for a future Internet.ICN focuses on the data and no longer on the location of thehosts and the contents can be stored in memory of each nodeof the path.In ICN, a node broadcasts its interest in content / information by using the name of that content. Each nodeof the network can respond to this interest if it has therequested content, which makes the content independent ofa specific address in the network. Thus, the ICN separatesthe identifier and locator roles, which highlights the fact thateach data object will be identified using a unique name calledNamed Data Object (NDO) without being mapped to a specificlocation. This will lead to one of the main features of the ICNwhich is content independent caching, where network elementssuch as routers can cache recent contents and send them backto the request of other users, called seekers.The Named Data Networking (NDN) [24] is an ICN architecture that is an evolution of Content-Centric-Networking(CCN) [25] and can be used in IoT. In NDN, names arehierarchical and can be read by a human. The NDN’s datacentric enables developers to work with things and their datadirectly, and for IoT networks to be deployed and configuredeasily to promote mobility.In this architecture, there are two types of packets [26]:Interest packets and Data packets. The browser of a user whois looking for a piece of music on the Net will generate anInterest packet. This packet will be broadcast according to aprotocol that we can, as a first approach, describe as verysimilar to peer-to-peer protocols that we know.Thenameoftherequestedthing(ContentName) has a hierarchical structure that resembles to domain names, such as : /[group name]/[hospital]/[division]/[domain]/[personal id]/[data]. This is why NDN offers easy, robust and scalabledata retrieval. In fact, a data packet ”satisfies” an Interestpacket if the Content Name of the Interest packet is a prefixof that Data packet.Moreover, an Interest packet can be received for a documentthat does not exist yet, but that the server can create it on thefly.III. P ROPOSED A PPROACH : H EALTH C ARE M ONITORINGA RCHITECTUREIn our model we focus on a scenario of a remote healthcare monitoring of patients out of hospitals, that are followedremotely by a medical staff. For this end, we assume thateach patient is equipped with some wearable sensors, ableto measure continuously a predefined set of parameters ofa health status of a person (like blood pressure and oxygensaturation, heart rate, body temperature, etc .). Other sensorscan also be installed at the patient’s home to monitor itsimmediate environments and allow the detection of the activityof a person and events like falls for instance. The data issuedby these wearable devices and the other sensors located athome is permanently uploaded to a remote database system.At this stage a live monitoring system takes over to analyzethis data in order to detect anomalies and raises alarms ifneeded to clinicians who may take some actions remotely.This data is also stored to keep a track of all the raisedevents, and may serve as well to doctors that follows thehealth status evolution of the patients. All the transactionsbetween the different parts of our scenario are made onvery sensitive personal data. It is obvious that these medicalreports should be confidential and have limited access in aglobal system that insure the non repudiation. To satisfy allthese requirements we designed an architecture based on the

BlockChain technology to monitor the patient state remotely.Our architecture illustrated in Figure1 is mainly composed oftwo BlockChains, a monitoring system and medical devices. BlockChain and He can either visualize or add data tothe Consultation BlockChain.Patient: He is also a node (e.g. computer) of the MedicalDevices BlockChain. He receives data from the Medical Devices and send them to the Medical DevicesBlockChain to be stored in the ledger. The implementation of our architecture will be explained in details inthe the next section.IV. A PPROACH IMPLEMENTATION AND VALIDATIONFig. 1. Health Care Monitoring Architecture. Medical Devices BlockChain: In our architecture, eachpatient is monitored by a set of medical devices. Thismedical devices are in charge of collecting data that willbe stored in the medical devices BlockChain. Hence, foreach patient one medical devices blockChain is configured. The Smart Contract presents a part of the MedicalDevices BlockChain. The use of the Smart Contract isexplained in the next section.Consultation BlockChain: Unlike Medical DevicesBlockChain, The Consultation BlockChain shown in ourarchitecture is unique and it contains all the history ofthe patients records. This BlockChain is distributed between hospitals and include the patients records. Thus, itbecomes easier and more secure to exchange the medicalreports between hospitals and health workers. In our case,we choose to separate those two BlockChains becauseeach one has its own purpose. The data received from thesensors needs to be maintained in the period of treatment.After, it will be not important to store it. However, patientrecords must be always available throughout the patient’slife.Live Monitoring System: It is the entity that manipulatesdata continuously and analyzes the various information.It is basically used to make an alert (if necessary) to thedoctor in case of emergency.Medical Devices: The data stored in the Medical Devices BlockChain is retrieved from the patient sensorswith the NDN paradigm. That is to say that we definean hierarchy to enable communication between medicaldevices. In our case, the NDN naming convention isHospital/HospitalID/P atientID/DataN ame.Health Worker: He can be a doctor, a nurse, an anesthetist.etc. He represents a node (e.g. computer) in both Medical Devices BlockChain and Consultation BlockChain.He can visualize data through the Live Monitoring System based on the data stored in the Medical DevicesIn order to implement our architecture we choose Hyperledger Fabric since it respects the criteria of our requirements.In fact, neither IOTA nor MultiChain satisfies our needs. Onthe one hand, IOTA is a public, permissionless BlockChainthat uses cryptocurrency, however, in our case we manipulatesimple data messages. On the other hand, the MultiChain doesnot support the implementation of smart contracts. AlthoughMultiChain follows the approach in which data is embeddedimmutably in a BlockChain, the Hyperledger Fabric frameworks is more suitable to our requirements since it adds a levelof security and data privacy and offers a modular architecture.1) Hyperledger Fabric: Fabric is an Hyperledger framework based on a modular architecture that offers high levelsof privacy, resilience, flexibility and scalability. It is designedto support plug-in implementations of different componentsand adapt to the complexity and subtleties that exist in theeconomic ecosystem.Among the fundamental concepts of Fabric technology, wecan expose: Chaincodes: is a self-executing program (the equivalentof a Smart-contract) currently written in Go language. Channels: is a private ”subnet” of communication between two or more specific members of the network,with the aim of carrying out private and confidentialtransactions. Ordering service: ensures the consistency and schedulingof transactions. Endorsement policies: are rules used to allow a node todecide whether a transaction is approved or not. Application SDK: is a software development kit thatallows the interaction of the peers in the network. Endorsing peers: endorse a transaction before being committed according to endorsement policies specified in thechaincodes. Committing peers: receive blocks from the ordering service to validate them and update the state of data intoState DB and the ledger.2) Medical Devices BlockChain Configuration with Hyperledger Fabric Framework: Figure 2 shows how we configurethe Medical Devices BlockChain illustrated in our approachusing the Hyperledger Fabric Framework.The Patient entity in our architecture corresponds to theApplication SDK of the Fabric framework. It provides APIs tofacilitate the interaction with the Medical Devices BlockChain.A peer is a node which acts, in our case, as both anendorsing peer and a committing peer. It is a part of one or

Fig. 3. Visualize Last Data Sequence Diagram.Fig. 2. Medical Devices BlockChain With Hyperledger Fabric Framework.many channels. It contains one or many smart contracts (i.e.Chaincodes in the Fabric Framework) and a specific ledger foreach channel.The transaction proposal, which corresponds to the datareceived from the Medical Devices, is sent to endorsing peersto approve the proposal. It executes the Chaincode, to accessto the ledger. Then, according to the endorsement policies, theendorsing peer decides whether a transaction is valid or not.If it is valid, the endorsing peer signs the proposal and sendsa response to the Application SDK. Once the ApplicationSDK receives enough approval for the same transaction usingPractical Byzantine Fault Tolerance algorithm, this transactionwill be sent to the Ordering service.The Ordering service takes the validated transactions fromthe Application SDK, creates the blocks and send them to thecommitting peers. This committing peer takes the block andupdates the ledger.A. Running examplesWe validate our approach at a design level by running twoexamples. The first example illustrates how to visualize thelast data of each sensor and the second one present two usecases that illustrate the data processing.1) Sequence Diagrams:a) Visualize Last Data Sequence Diagram: The sequencediagram in Figure 3 provides a detailed scenario description ofvisualizing last data of each sensor. The user must request thenewest available data located on the page ”index.html”. Thiscomponent sends this request to the controller which calls thefactory to retrieve data. We use nodeJs and expressJs in theserver s

Fabric Hyperledger is a BlockChain framework that fits our need. In this paper, we propose a security architecture based on the Fabric Hyperledger framework. We validate our approach first at a design level by running examples, then by showing some implemented function-alities. Index Terms—IoT, Blockchain, Fabric Hyperledger, NDN.

Related Documents:

BLOCKCHAIN SECURITY FOR IOT The Distributed character of IOT networks makes it a good candidate for Blockchaintechnology Blockchain, which is most familiar for bitcoin and Ethereum, offers an intriguing solution for IoT security. Blockchain contains strong protections against data tampering, locking access to Internet of Things devices, and

Open Data Application Programming Interface (API) for IoT Data in Smart Cities and Communities Y.FW.IC.MDSC Framework of identification and connectivity of Moving Devices in Smart City Y.IoT-DA-Counterfeit Information Management Digital Architecture to combat counterfeiting in IoT Y.IoT-Interop An architecture for IoT interoperability Y.IoT-IoD-PT

SAP Cloud Platform Internet of Things Device Management Your Gateway System Environment Cloud Platform PaaSeg., HANA, Kafka, PostgreSQL App User Admin IoT Core Service IoT Message Management Service Your IoT Data IoT service IoT Gateway Edge Devices Device 1 Device 2 Device 3 IoT Gateway Cloud IoT Service Cockpit Send and receive

MINOR DEGREE IN INTERNET OF THINGS (IoT) (DRAFT SYLLABUS) Course Structure Sr. No. Semester Temp. Course Code Course Title L T P Credits 1. 3 IoT-1 Introduction to Internet of Things 3 0 2 4 2. 4 IoT-2 IoT Protocols 3 0 2 4 3. 5 IoT-3 IoT System Design 3 0 2 4 4. 6 IoT-4 Industry 4.0 and IIoT 3 0 2 4 5.

AIOTI WG03 IoT Reference Architecture Consolidation of IoT reference architecture from many sources, i.e. IoT-A, IEEE P2413, OneM2M, ITU, JTC1 Architectural views based on ISO/IEC/IEEE 42010 Interacts with 10 A consolidated high level IoT Reference Architecture ³7KLQJV IoT Device User invokes IoT Service exposes associated Virtual Entity Legend

Blockchain Technology in Industrial Internet of Things Applications John Soldatos Head of IoT Group, Athens Information Technology jsol@ait.gr. IoT Week, Aarhus, Denmark, June, 20th, 2019 Dispelling the Hype: When (not) to use Blockchain in IIoT When to use blockchain technology

The fundamentals of an IoT architecture are quite similar to that of traditional IT architecture with multiple endpoints. The main difference is the scale and diversity of the IoT endpoints. Enterprises cannot always guarantee the security of the IoT device, and therefore, understanding and properly setting up each of the four layers in the IoT .

ALEX RIDER SERIES POINT BLANK GOING DOWN MICHAEL J. ROSCOE was a careful man. The car that drove him to work at quarter past seven each morning was a custom-made Mercedes with reinforced steel plates and bulletproof windows. His driver, a retired FBI agent, carried a Beretta subcompact automatic pistol and knew how to use it. There were just .