国产日韩欧美一区二区三区三州_亚洲少妇熟女av_久久久久亚洲av国产精品_波多野结衣网站一区二区_亚洲欧美色片在线91_国产亚洲精品精品国产优播av_日本一区二区三区波多野结衣 _久久国产av不卡

?

The Internet of Things and Ubiquitous Intelligence(1)

2011-12-30 01:43:59
ZTE Communications 2011年1期

(State Key Laboratory of Networking and Switching Technology,Beijing University of Posts and Telecommunications)

1 Introduction

1.1 Technical Characteristics of the Internet of Things and Sensor Networks

I nspired by new technologies in computing,microelectronics,communications networking,and man-machine interaction,society has shifted its focus from network connection services to ubiquitous information services.With this shift,the Internet of Things has developed rapidly.However,as its technical connotations and denotations are continuously evolving,there is currently no uniform,integral,or accurate definition.People are defining the Internet of Things differently during its different stages of development.On November 17,2005,the ITU releasedITU Internet Report 2005:The Internet of Things[1],where the Internet of Things was defined as Radio Frequency Identification(RFID)-based thing-to-thing and thing-to-person Internet.But as sensor networks have matured and modern service technologies and new services have emerged,traditional definitions of the Internet of Things no longer satisfy technical and application requirements.

The Internet of Things is generally thought to be a network integrating information collection(using wireless sensor networks),information transmission(using the Internet and telecom,radio,and TV networks),new services and applications based on information service networks are also part of the Internet of Things.Generally speaking,the Internet of Things has typical characteristics:

(1)Ubiquitous information capturing.The sensor network is the engine of the Internet of Things and is at the tip of information sensing and processing.What makes sensor networks distinct from other networks is their capacity to collect massive amounts of diverse information on environment and events in close proximity.This information is obtained from various perspectives and for multiple parameters.The diversity of information,mass quantity of information,and complexity of relationships between information is unprecedented.With node identification,sensor devices can assign specific locations and identifications to a piece of information,which allows the information to be used in future applications.

(2)Reliable information transmission.In the Internet of Things,information categories become much richer and differentiation in Quality of Service(QoS)becomes more complicated than in existing networks.Information service rather than connection service will be a basic operation feature of the Internet of Things.As an infrastructure and support environment for a ubiquitous information society,ubiquitous networks will be an important objective in developing information communication networks.Reliable and effective transmission technologies are required in existing networks for providing ubiquitous and intelligent services and providing people with rich real-world information.

(3)Efficient information applications.The major difference between the Internet of Things and existing networks is ubiquitous intelligence.The richness that comes with masses of sensing information and reliable information transmission is essential for providing diverse services using the Internet of Things.Processing and utilizing mass sensing information can provide enterprises and the general public with new service modes and experiences—especially ubiquitous services,business operation modes,and management systems that can adapt to context.

This lecture discusses three important components of the Internet of Things:Sensor network collection of information,ubiquitous network-based information transmission,and new service technologies and businesses using collected information.This part focuses on the sensor network.

1.2 Development Background of the Sensor Network

Since the middle of the 20th century,computing technologies and network technologies have together given rise to many new application modes and technical means.But all these fall into the category of traditional person-to-person or person-to-machine interaction.With the rapid development of communication technologies,embedded computing technologies,and microelectronic technologies,the manufacturing costs of electronic products has been steadily decreasing,as predicted by Moore’s Law.In the 1990s,the first microintelligent sensor was put into use that had sensing,computing,and communication capabilities and was suitable for different environments.Using the microsensor as the network node—Wireless Sensor Network(WSN)technology—completely changed the way information is acquired[2].

WSN is a potential network.Many simple nodes can be randomly deployed in remote locations and under adverse conditions.In a self-organizing network,all nodes work cooperatively to monitor,sense,and collect information in complicated environments or to monitor objects within the network’s distribution area and process the information.In this way,nodes obtain detailed and accurate information and then send it to interested observers.Because it is a bridge between the objective physical world and subjective sensing world,WSN is a new information acquisition and processing technology,a revolution in information sensing and collection.

Now,WSN is a hot research topic in network communications and information processing in the U.S.,and efforts to develop it are being stepped up.In its Information and Communication Technologies(ICT)Seventh Framework Programme(FP7)started in 2007,the European Union lists WSN as an important research area in network embedded control systems.In South Korea,the IT839 strategy makes ubiquitous sensor networking one of the three key infrastructures.In Japan,both e-JAPAN and U-JAPAN strategies have sensor networking as a goal for creating a next-generation Information and Communication Technology(ICT)society by 2010.

2 Key Technologies of the Sensor Networks

2.1 Nodes

Nodes are the basis for WSN research and application.All protocols,mechanisms,and algorithms related to WSN must be implemented via nodes.Therefore,node design and implementation determine functions,performance,and investment across the entire network.Most WSNs use general embedded platforms as their nodes;for example,Crossbow’s Mica-and Telos-series nodes.These platforms use common CPUs to connect peripheral devices—such as sensors and RF chips—in order to form sensor nodes.Node functions are developed mainly by software.On the one hand,node functions,supported by TinyOS and other operating systems,are relatively easy to develop.On the other,node development is limited because of fixed hardware and node size,and cost.Also,power consumption cannot be reduced through physical design.Nodes have limited processing capability and it is difficult to develop sophisticated programs to counter this.

Most WSN applications rely on critical performance indexes for achieving low power consumption,low cost,small size,easy deployment,and reliability.One practical approach to meeting these demands is to employ System on Chip(SoC)nodes.Highly integrated technology and good physical design can reduce size,cost,and power consumption of nodes,and architecture designed especially for WSN improves its computing efficiency and capability.This is a trend for future node technologies.

2.2 Network Protocol and Networking

In WSN,the protocol stack design determines the self-organization mode and communication performance of network nodes.It also determines interconnection and access methods of heterogeneous networks.Protocol stack design ensures effective energy,scalability and reliable transmission in WSN when there are limited network resources.WSN protocol stack and working technologies fall roughly into two categories:Non IP-based protocol stack and IP-based protocol stack.

Two examples of non IP-based protocol stacks are Zigbee and Sensor-Net.Zigbee is a low consumption,low power,reliable wireless network standard from the Zigbee Alliance[3].Sensor-Net is an architecture especially designed for the sensor network[4].It adopts cross-layer design for energy management,system management,time synchronization,discovery,and security.Inter-layer cooperation allows better management and control.

At present,there are only a few IP-based protocol stacks,including NanoStack,PhyNet,and IPv6 micro sensor router.NanoStack is an embedded sensor network software project based on IPv6 over Low power Wireless Personal Area Networks(6LoWPAN)[5].This protocol stack contains User Datagram Protocol/Internet Control Message Protocol(UDP/ICMP),6LoWPAN IPv6 protocol,and IEEE 802.15.4 Media Access Control(MAC)protocol.Because IPv6 allows for much larger packet capacity than the maximum frame capacity specified in IEEE 802.15.4,an adaptation layer is added between the network and data link layers to splice and reorganize IP packets.In this way,low-rate transmission requirements of Wireless Personal Area Networks(WPAN)can be met.PhyNet protocol stack is an industrial solution based on the IETF’s 6LoWPAN.It is used for implementing IP-based communication in WPAN.This protocol stack takes the 6LoWPAN standard as its core and supports IEEE 802.15.4 physical layer and MAC layer protocols.

In addition,WSN must support interconnection with other networks for sharing and processing information.Further study into the architecture and self networking technologies of WSN is required.

2.3 Information Processing

Information processing technologies of the sensor network are diverse,ranging from embedded,lightweight information processing technology within a node to distributed network information processing technology between nodes.On the one hand,WSN is cheap,has high observation precision,and can integrate heterogeneous sensor information.These advantages lay the foundation for implementing an ideal information processing technology.On the other hand,with low power consumption,heterogeneous interconnection,ubiquitous cooperation,and limited nodes,WSN has some technical drawbacks for information processing.The progress of research on core information processing technologies for the sensor network is as follows:

·Signal processing,information identification,and information extract technologies within a node:These technologies are used to guarantee the accuracy of signal collection and sensing.Especially for sensor networks with limited nodes,embedded and lightweight signal processing,information identification,and extract technologies are necessary.Node signal processing technology and information identification,information extraction,and application of technology are closely related.These technologies need to tune the node degree of intelligence and lightweight signal processing algorithms constrained by the node resource.

·Distributed cooperative processing technologies between the nodes:The goal of these technologies is to improve a node’s intelligence in estimating its surroundings and identifying attributes.Such technologies include cooperative technology among distributed nodes and multisensor information integration technology.With limited resources,a node in the sensor network can only sense local information.Hence,all nodes in the network must cooperate with each other to obtain global information.In a multisensor system,information is extremely diverse,the quantity of information is massive,and relationships between information are complex.Therefore,multisensor information integration technology is the key for information processing in WSN.

·Information compression and coding technologies.These can greatly improve the transmission performance of a multihop link and bring about effective,reliable signal transmission.Packet compression is an effective low consumption communication technology that reduces the length of a packet by information redundancy.It can shorten end-to-end transmission delay of a data packet and reduce conflict in accessing shared channels.

2.4 Security

Due to resource limits,WSN has more security challenges than traditional networks.A low consumption security solution designed for WSN should take into account optimal loads for communication and computing,distribution and update of secure keys,security authentication and anticapture of nodes,and scalability in secure key management.The goal of WSN security technologies is to ensure information security during node communication.

Key management is a basic but important step in security management.To improve security and antiattack performance of the network,a key management mechanism needs to be implemented.Current research into attacks against sensor networks focuses mainly on secure routing technologies.In China,researchers have been studying specific key management protocols—which are still theoretical models—rather than studying sensor network security from a systematic perspective.Moreover,research on secure routing technologies is concentrated on stability and simulation of routing algorithms.Although some security models and objectives have been proposed,there is still no secure routing approach that is feasible for sensor networks.

In China,research into security models for sensor networks has been focused on particular scenarios rather than on a general security solution.Therefore,one area that requires systematic study is general security models for sensor networks,including secure communication protocols,secure key management,secure routing,and access control.

(To be continued)

[1]International Telecommunication Union(2005)ITU Internet Report 2005:The Internet of Things.Geneva:ITU.[Online].Available:http://www.itu.int/pub/S-POL-IR.IT-2005/e

[2]I.F.Akyildiz,W.Su,Y.Sankarasubramaniam,and E.Cayirci,“A survey on sensor networks,”IEEE Communications Magazine,no.8,Aug.2002.

[3]ZigBee Alliance.[Online].Available:http://www.zigbee.org/

[4]J.Polastre,J.Hui,P.Levis et al.,“A unifying link abstraction for wireless sensor networks,”inProc.3rd ACM Conf.Embedded Networked Sensor System(Sensys05),San Diego,CA,2005,pp.

[5]“IPv6 over low power WPAN,”datatracker.ietf.org.[Online].Available:http://datatracker.ietf.org/wg/6lowpan/charter/

栾城县| 刚察县| 富民县| 望都县| 棋牌| 彩票| 平乡县| 湘阴县| 正安县| 江西省| 金塔县| 常宁市| 南充市| 永清县| 清新县| 昆明市| 石泉县| 苏尼特右旗| 华容县| 西峡县| 江永县| 无棣县| 濮阳市| 浠水县| 武安市| 施秉县| 蓬莱市| 曲沃县| 陇南市| 株洲市| 大安市| 水城县| 阜新市| 四会市| 山阴县| 松滋市| 玛多县| 霍邱县| 平南县| 筠连县| 威远县|