Sei sulla pagina 1di 57

The Internet of Things and The Web of Things

Emmanuel Baccelli, Dave Raggett

To cite this version:


Emmanuel Baccelli, Dave Raggett. The Internet of Things and The Web of Things. France.
ERCIM, 2015, ERCIM News Special Issue on The Internet of Things and The Web of Things.
<hal-01244735>

HAL Id: hal-01244735


https://hal.inria.fr/hal-01244735
Submitted on 16 Dec 2015

HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est


archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents
entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non,
lished or not. The documents may come from émanant des établissements d’enseignement et de
teaching and research institutions in France or recherche français ou étrangers, des laboratoires
abroad, or from public or private research centers. publics ou privés.
Number 101 April 2015

ERCIM
www.ercim.eu
NEWS

Special theme
The Internet
of Things
and
The Web
of Things
Also in this issue:
Keynote:
by Cees Links, Founder & CEO
GreenPeak Technologies

Research and Innovation:


Mesh Joinery:
A Method for Building Fabricable
Structures
Editorial Information

ERCIM News is the magazine of ERCIM. Published quarterly, it


reports on joint actions of the ERCIM partners, and aims to reflect
the contribution made by ERCIM to the European Community in
Information Technology and Applied Mathematics. Through short
articles and news items, it provides a forum for the exchange of infor-
mation between the institutes and also with the wider scientific com-
munity. This issue has a circulation of about 6,000 printed copies and
is also available online.

ERCIM News is published by ERCIM EEIG


BP 93, F-06902 Sophia Antipolis Cedex, France
Tel: +33 4 9238 5010, E-mail: contact@ercim.eu
Director: Jérôme Chailloux
ISSN 0926-4981

Editorial Board:
Central editor:
Peter Kunz, ERCIM office (peter.kunz@ercim.eu)
Local Editors:
Austria: Erwin Schoitsch, (erwin.schoitsch@ait.ac.at)
Belgium:Benoît Michel (benoit.michel@uclouvain.be)
Cyprus: Ioannis Krikidis (krikidis.ioannis@ucy.ac.cy)
Czech Republic:Michal Haindl (haindl@utia.cas.cz)
France: Thierry Priol (thierry.priol@inria.fr)
Germany: Michael Krapp (michael.krapp@scai.fraunhofer.de)
Greece: Eleni Orphanoudakis (eleni@ics.forth.gr),
Artemios Voyiatzis (bogart@isi.gr)
Hungary: Erzsébet Csuhaj-Varjú (csuhaj@inf.elte.hu)
Italy: Carol Peters (carol.peters@isti.cnr.it)
Luxembourg: Thomas Tamisier (thomas.tamisier@list.lu)
Norway: Poul Heegaard (poul.heegaard@item.ntnu.no)
Poland: Hung Son Nguyen (son@mimuw.edu.pl)
Portugal: Joaquim Jorge (jorgej@tecnico.ulisboa.pt)
Spain: Silvia Abrahão (sabrahao@dsic.upv.es)
Sweden: Kersti Hedman (kersti@sics.se)
Switzerland: Harry Rudin (hrudin@smile.ch)
The Netherlands: Annette Kik (Annette.Kik@cwi.nl)
W3C: Marie-Claire Forgue (mcf@w3.org)

Contributions
Contributions should be submitted to the local editor of your country

Copyright notice
All authors, as identified in each article, retain copyright of their work

Advertising
For current advertising rates and conditions, see
http://ercim-news.ercim.eu/ or contact peter.kunz@ercim.eu

ERCIM News online edition


The online edition is published at
http://ercim-news.ercim.eu/

Subscription
Subscribe to ERCIM News by sending an email to
en-subscriptions@ercim.eu or by filling out the form at the ERCIM
News website: http://ercim-news.ercim.eu/

Next issue
July 2015, Special theme: Trustworthy Systems of Systems

ERCIM NEWS 101 April 2015


Keynote

The Internet of Things


will Change our World
Everybody talks about the Internet of Things, the IoT… but how is the IoT
actually going to change our lives?

The Internet of Things is creating a new locks, the majority of which are not cur-
world, a quantifiable and measureable rently interconnected. They are con-
world, where people and businesses can nected – but not to each other. The Cees Links, Founder & CEO GreenPeak
manage their assets in better informed weather station does not provide infor- Technologies, www.greenpeak.com
ways, and can make more timely and mation to the thermostat about the cli-
better informed decisions about what mate outside. The security system is not
they want or need to do. This new con- connected to the indoor motion sensors, industry. Picture the first cars hitting the
nected world brings with it fundamental nor to the electronic door locks (it does road: there were no freeways, no road
changes to society and to consumers. By not automatically lock the forgotten back signs, no rules, no driving licences.
sensing our surrounding environment, door when the inhabitants go out). In the Pedestrians did not know to get out of the
the IoT will create many practical future, all these systems will be intercon- way. Drivers did not know how to take
improvements in our world, increasing nected, providing information to each turns at intersections. Neither drivers nor
our convenience, health and safety, while other, and reacting accordingly. We are pedestrians understood the risks and lia-
at the same time improving energy effi- currently in an emerging state of the IoT, bilities, giving no consideration to lia-
ciency and comfort. The IoT will be a with individual vertical applications that bility and insurance.
new source of wealth creation. operate as islands, and serve independent
applications (such as security alarms, We are currently at a similar stage with
IoT devices can be classified in three cate- door locking, etc.). However, the real the IoT. Just as it took decades before all
gories: (1) wearables, (2) smart home IoT will emerge when these applications required infrastructure was in place
devices, and (3) M2M devices. The first cooperate, working together, and begin around motor vehicles, it will take quite
two categories are the most important for to use each other’s ’awareness’. That is some time before it is in place around the
consumers. ‘Wearables’ are the devices when the true IoT avalanche will start. Internet. Once I led the engineering team
that people carry with them, which usu- that successfully brought WiFi to the
ally connect via Bluetooth to a smart The key component of the IoT - whether Mac laptop for Steve Jobs. After his team
phone, and from there to the Internet. wearables or smart home devices - is not had achieved this, all others followed.
This category includes devices such as the sensor, but the application. Connecting Now WiFi is everywhere - but this took
smart watches, fitness bands and devices the sensors is difficult, but extracting infor- time and work. Similarly, in the context
to help people to live more ’mindfully’ – mation from data is the essence. Useful of the Internet and Internet of Things,
increasing the wearer’s awareness of how information extracted from the data can there is a growing awareness that we
well they sleep, how much they move coach people by reaffirming when things need rules, training, legislation and
around, monitoring their vital signs, etc. go as planned or by alerting or taking enforcement. We are just starting to learn
action if something goes wrong; and data what might be needed.
Smart home devices are also part of the analytics can be used to compare situa-
IoT and usually connect to the Internet tions, to coach and to provide feedback to The IoT will change the world in an even
via ZigBee low power wireless commu- help make improvements. This is slowly more profound way than has the Internet.
nication and the home router. These starting to dawn on manufacturers and If we ask our children today how the
include all domestic devices, from lights service providers alike. People are inter- world existed before Internet, they are
and light switches to motion sensors, ested in the IoT if it helps them to improve speechless. They have no comprehen-
thermostats, door locks and automated aspects of their lives. Improvements are sion of how people could communicate
curtains. Via its WiFi connection to the not achieved by sensors alone: a com- or even live their lives without the
router, the smart phone also becomes an pletely different way of thinking is common place tools we have today. The
online dashboard and control device for required, and it will take some time for the same will happen with the IoT.
Smart Home applications. new paradigm to be fully embraced.
A decade from now, we will be
The third category, M2M (Machine to Privacy and security are key, together dependent on the knowledge derived
Machine) devices, comprises devices with data ownership. Note, these are not from the continuous stream of data from
that are directly connected to the cellular IoT issues, but general internet issues that our wearables and our smart home
network, such as cars that can report are amplified by the growth of new appli- devices, and we will have no idea how
their location (in case of an accident or cations. These issues already exist for the we managed the world and our lives
theft), or vending machines that can call internet of people, and industry and gov- before. We will be able to make better
in when their stocks are running low. ernment bodies are slowly starting to rec- informed, more accurate and more
ognize them and take action. timely decisions; and decisions that will
Many households and businesses have improve our lives, save us money, and
thermostats, weather stations, smart The growth of the IoT can be compared may even save our planet. The IoT will
lighting, security and electronic door with the growth of the automobile make the difference.

ERCIM NEWS 101 April 2015 3


Contents

KEYNOtE sPECIAL tHEME

3 The Internet of Things The special theme section “The Internet of Things and
Will Change our World the Web of Things” has been coordinated by Dave
by Cees Links, Founder & CEO GreenPeak Raggett, W3C and Emmanuel Baccelli, Inria.
Technologies
Introduction to the Special Theme
8 The Promise of the Internet of Things and the
JOINt ERCIM ACtIONs Web of Things
by Emmanuel Baccelli and Dave Raggett
6 ERCIM “Alain Bensoussan” Fellowship
Programme IoT Operating Systems & Network Stacks
11 Open{WSN|Mote}: Open-Source Industrial IoT
6 Cor Baayen Award 2015 by Thomas Watteyne, Xavier Vilajosana, and Pere
Tuset
6 W3C Europe@20 Anniversary Event
12 RIOT and the Evolution of IoT Operating
7 The Role of ERCIM EEIG Systems and Applications
by Antoine Petit by Emmanuel Baccelli, Oliver Hahm, Hauke
Petersen and Kaspar Schleiser

14 FIT IoT-LAB: The Largest IoT Open


Experimental Testbed
by Eric Fleury, Nathalie Mitton, Thomas Noël and
Cedric Adjih

15 OCARI: A Wireless Sensor Network for


Industrial Environments
by Tuan Dang, Pascale Minet and Erwan Livolant

IoT Security
17 Security and Privacy in the Internet of Things
by Ludwig Seitz

18 Secure and Efficient Wireless Sensor Networks


by Corinna Schmitt and Burkhard Stiller

Languages & Models


19 Creating Internet of Things Applications from
Building Blocks
by Frank Alexander Kraemer and Peter Herrmann

21 Interfaces to the Internet of Things with


XForms
by Steven Pemberton

22 Home Automation Devices Belong to the IoT


World
by Vittorio Miori and Dario Russo

Abstraction Layers & Programming Tools for IoT


23 Dioptase: Data Streaming Middleware for the
Internet of Things
by Benjamin Billet and Valérie Issarny

25 Programming Actors for the Internet of Things


by Raphael Hiesgen, Dominik Charousset, Thomas
C. Schmidt and Matthias Wählisch

4 ERCIM NEWS 101 April 2015


RESEARCH ANd INNOVATION

This section features news about research activities and


innovative developments from European research institutes

26 A Mobile End-User Development Environment 44 Mesh Joinery: A Method for Building Fabricable
for IoT Applications Exploiting the Puzzle Structures
Metaphor by Paolo Cignoni, Nico Pietroni, Luigi Malomo and
by Josè Danado and Fabio Paternò Roberto Scopigno

28 3D Web Visualization for Real-Time 46 Icing Detection and Protection for Small Unmanned
Maintenance of Smart Buildings Aircrafts
by Daniel Gaston, Christophe Joubert and Miguel by Andrea Cristofaro and Tor Arne Johansen
Montesinos
30 COMPOSE: An Open Source Cloud-Based 47 LEARNMINER – Advanced Analytics for eLearning
Scalable IoT Services Platform by Christian Bauckhage, Markus Ketterl and Ulrich Nütten
by Dave Raggett
48 Online Semantic Analysis over Big Network Data
IoT Architecture by Chengchen Hu and Yuming Jiang
31 An Integration Gateway for Sensing Devices in
Smart Environments 49 From Cooling Integrated Circuits to Efficient
by Michele Girolami, Francesco Furfari and Electrical Power Generation
Stefano Chessa by Stephan Paredes, Brian Burg, Patrick Ruch, Ingmar
Meijer and Bruno Michel
33 Fighting Networking Heterogeneity in the
Internet of Things 51 VAVID– Handling Big Data
by Elias Z. Tragos, Vangelis Angelakis and
Stefanos Papadakis
EVENTS, IN BRIEF
34 Tectons: Towards a Generalised Approach to
Programming Systems of Systems Announcements
by Geoff Coulson, Andreas Mauthe and Markus 52 AITA 2015 - Advanced Infrared Technology and
Tauber Applications

36 BETaaS: Building the Future Platform for 52 IC3K - 7th Joint Conference on Knowledge Discovery,
Development and Execution of Machine-to- Knowledge Engineering and Knowledge Management
Machine Applications
by Carlo Vallati, Enzo Mingozzi and Giacomo 52 Information Security Conference - ISC 2015
Tanganelli
53 ICEC 2015 - 14th International Conference on
IoT Use Cases Entertainment
37 Pro-IoT: Improving the Productivity of
Companies by Using the IoT 53 7th International Workshop on Software Engineering
by Heikki Ailisto, Nadine Pesonen, Pertti for Resilient Systems
Raatikainen and Jonathan Ouoba
54 PhD Positions Available in the BigStorage European
39 MusicBricks: Connecting Digital Creators to the Training Network
Internet of Music Things
by Thomas Lidy, Alexander Schindler and Michela 54 1955-2015: ITC Celebrates its 60th Anniversary!
Magas
54 SERENE 2015 - 7th International Workshop on
41 Deploying an NFC-based Inventory System: A Software Engineering for Resilient Systems
Case Study
by Patrick Poullie, Thomas Bocek and Burkhard In Brief
Stiller 55 25 Years of Python at CWI

42 TrakChain Estimates Costs for Track and Trace 55 MOOC on “Binaural Hearing for Robots”
in the Internet of (many) Things
by Miguel L. Pardal and José Alves Marques 55 Java Bug Fixed with Formal Methods

55 W3C Launches First HTML5 Course in New


Partnership with edX

ERCIM NEWS 101 April 2015 5


Joint ERCIM Actions

W3C Europe@20
Anniversary Event
W3C Europe will celebrate its twentieth anniversary with
a symposium on Tuesday, 5 May in the Paris town hall.

The Web was born in Europe and W3C is celebrating the


20th anniversary of the European branch of W3C in Paris.
Europe has played a fundamental role for the success of the
Web. First of all, the founding of the World Wide Web
Consortium (W3C) in 1994 became possible with the sup-
port by CERN, DARPA and the European Commission.
ERCIM Since 1995, when Inria hosted the European branch of W3C,
the European Commission funded W3C activities in Europe,
“Alain Bensoussan” as for example the development of Web accessibility rules,
enabling people with disabilities to participate equally on the
Fellowship Programme Web. Since 2003, W3C Europe is hosted by ERCIM EEIG.

ERCIM offers fellowships for PhD holders from all W3C will celebrate 20 years of work accomplished by
over the world. European stakeholders for the benefit of the Web with a
symposium on 5 May. Speakers will include, among others,
Topics cover most disciplines in Computer Science, representatives from Paris city council, the European
Information Technology, and Applied Mathematics. Commission and the French government. The closing talk
will be given by Tim Berners-Lee, Web Inventor and W3C
Fellowships are of 12-month duration, spent in one Director. About 250 invited guests - global strategists, busi-
ERCIM member institute. Fellowships are proposed ness leaders and developers - are expected to attend.
according to the needs of the member institutes and the
available funding. More information:
http://www.w3.org/20/Europe/
Conditions
Applicants must:
• have obtained a PhD degree during the last 8 years
(prior to the application deadline) or be in the last
year of the thesis work with an outstanding academic Call for Nominations
record
• be fluent in English Cor Baayen Award 2015
• be discharged or get deferment from military service
• have completed the PhD before starting the grant. The Cor Baayen Award is awarded each year to a promising
young researcher in computer science and applied mathe-
In order to encourage mobility: matics.
• a member institute will not be eligible to host a candi-
date of the same nationality. The award consists of 5000 Euro together with an award cer-
• a candidate cannot be hosted by a member institute, if tificate. The selected fellow will be invited to the ERCIM
by the start of the fellowship, he or she has already meetings in autumn. A short article on the winner, together
been working for this institute (including phd or post- with the list of all candidates nominated, will be published in
doc studies) for a total of 6 months or more, during ERCIM News.
the last 3 years.
Nominees must have carried out their work in one of the
The fellows are appointed for 12 months either by a 'ERCIM countries': Austria, Belgium, Cyprus, Czech
stipend (an agreement for a research training Republic, Finland, France, Germany, Greece, Hungary, Italy,
programme) or a working contract. The type of contract Luxembourg, Norway, Poland, Portugal, Spain, Sweden,
and the monthly allowance (for stipends) or salary (for Switzerland, The Netherlands and the United Kingdom.
working contracts) depend on the hosting institute. Nominees must have been awarded their PhD (or equivalent)
after 30 April 2011.
Application deadlines
30 April and 30 September The award was created in 1995 to honour the first ERCIM
President.
More information and application form:
http://fellowship.ercim.eu/ Detailed information and online nomination form:
http://www.ercim.eu/activity/cor-baayen-award

6 ERCIM NEWS 101 April 2015


© Inria / Photo C. Helsly
The Role of ERCIM EEIG
by Antoine Petit

Over the last 25 years, ERCIM has earned a reputation as one


of Europe’s leading expert groups in the areas of ICT and
Applied Mathematics. In 2012, the ERCIM community was
restructured and is now supported by two organizations, the
ERCIM Association (AISBL) and the ERCIM European Antoine Petit, Chairman and CEO of Inria, was
Economic Interest Group (EEIG). While the Association is nominated President of ERCIM EEIG by the ERCIM
carrying out and supervising all of ERCIM’s scientific activ- EEIG Board of Directors on 24 October 2014 in Pisa for
ities, the EEIG, composed of a subset of the Association's a two year term from January 2015 to December 2016.
members, is responsible for managing the ERCIM Office Antoine Petit succeeds Michel Cosnard, who took office
and the European branch of the World Wide Web Consortium as ERCIM President in January 2011.
(W3C).

The ERCIM Office, hosted by Inria in its Sophia Antipolis


Research Centre in Southern France, manages all administra-
tive and financial aspects of the ERCIM community with a
talented team of professionals.

Hosting and managing the European branch of W3C is a


major task of the ERCIM EEIG. The change of the W3C ERCIM has gained a leadership position for cooperating for
European host from Inria to ERCIM in 2003 aimed at excellence in research and is a recognized expert organiza-
strengthening research relationships throughout Europe to tion in Information and Communication Technologies in
better support Web technology development. ERCIM was a Europe. To maintain its position, and increase its impact on
natural candidate as host since many of the European W3C European strategy and policy, I’m convinced that ERCIM
Offices were already based at ERCIM member institutes. has to increase its membership by attracting the best
When Inria became the first W3C European host in 1995, research performing organizations and by developing new
W3C Europe had 50 members in four countries. Today, the strategically important activities such as the “ERCIM white
W3C Membership in Europe exceeds 140 organizations, papers series” started last year with support of Domenico
with representation in 20 countries in Europe. But more Laforenza, my fellow president of ERCIM AISBL. ERCIM
important, during the last twenty years we have witnessed groups of experts identify emerging grand challenges and
the Web revolution with tremendous advances in Web tech- strategic research topics in Information and Communication
nology, changing not only the world of research but also the Science and Technology (ICST). In 2014, the first two white
whole of society. The evolution of Web standards is a chal- papers were published on the topics “Big Data Analytics”
lenging task, yet is crucial to maintain an open Web and to and “Cyber-Security and Privacy” with recommendations
transform W3C into a more long-term international standard- for future research. A white paper on Massively Open
ization organization. This year, W3C Europe will celebrate Online Courses (MOOCs), another current hot topic, is cur-
its twentieth anniversary at an event on Tuesday, 5 May in rently in work.
Paris, in conjunction with the ERCIM Spring meetings, and
ERCIM representatives are cordially invited. I also support Domenico’s efforts in cooperating with
leading European organisations, in order to play a role in
The ERCIM Office is also providing assistance and services shaping Europe’s digital future through the platform of the
to the whole ERCIM community. An important activity is the European Societies in Information and Communication
management of European projects involving ERCIM mem- Sciences and Technologies (EFICST). I encourage ERCIM
bers or the W3C. Through ERCIM, our members have par- to strengthen relationships with organisations such as
ticipated in more than 80 projects funded by the European Informatics Europe and the ICT Lab, a Knowledge and
Commission by carrying out joint research activities while Innovation Communities (KICs) of the European Institute
the Office manages the complexity of the project administra- for Innovation and Technology (EIT).
tion, finances and outreach. The ERCIM Office also handles
ERCIM AISBL financial matters and supports the whole With our two organisations, ERCIM EEIG and ERCIM
ERCIM community in administrative tasks such as the man- AISBL, I believe that we have the potential to strengthen our
agement of the well established ERCIM Fellowship position as recognized leader in field of European research
Programme, and in communications, for example by hosting and innovation in ICST, to increase our impact on European
and maintaining web sites and by producing ERCIM News. strategy and policy, and to successfully continue our mission
of “Cooperating for Excellence in Research”.

ERCIM NEWS 101 April 2015 7


Special Theme: The Internet of Things & the Web of Things

Introduction to the Special Theme

The Promise of the


Internet of Things
and the Web of Things
by Emmanuel Baccelli and Dave Raggett

Improvements in electronics are enabling widespread


deployment of connected sensors and actuators (the Internet
of Things) with predictions of tens of billions of smart
objects by 2020 (Cisco 2011). This raises huge challenges for
security, privacy and data handling, along with great oppor-
tunities across many application domains, e.g., home and
building automation, retail, healthcare, electrical grids, trans-
port, logistics, manufacturing, and environmental moni-
toring (IERC 2014).

The Internet of Things started with work on radio frequency


identity tags (RFID) and expanded to connected sensors and
actuators, along with many communication technologies
designed for different purposes (e.g., ZigBee, NFC,
Bluetooth, ANT, DASH7, EnOcea). IPv6 has greatly
expanded the address space compared to IPv4 and makes it
feasible to give each device its own IP address. Considerable
effort has been made on supporting IP all the way to con-
strained devices, e.g., the 6LoWPAN and RPL protocols for
wireless (mesh) access, CoAP for lightweight message
exchange and easy bridges to HTTP, and MQTT as a light-
weight pub-sub protocol.

Today, however, product silos – a sign of market immaturity


- are prevalent for the Internet of Things. This is where open
standards and open platforms can play a major role in
enabling the growth of rich open ecosystems that can realise
the huge potential benefits for European countries. Can we
repeat the run away success of the World Wide Web and
build a Web of Things? Turning that around, what can we
learn from the Web in relation to encouraging an open
market of services?

Much of the work on the Internet of Things (IoT) has focused


on the technologies needed for constrained devices, long bat-
tery life, efficient use of wireless spectrum and so forth.
Relatively little work has focused on applications and services.

One challenge is to design appropriate abstractions that hide


details best left to platform developers. The first step in this
direction is the use of the IPv6 / 6LoWPAN network stack on
top of heterogeneous IoT hardware and link layers.

8 ERCIM NEWS 101 April 2015


Another challenge is to provide end-to-end security. IoT new breed of home hubs, and for device gateways that
devices are often very constrained, and this limits the options bridge the IoT and the Web.. However, further work is
for handling security. A related problem is software upgrad- needed to determine which APIs are needed to support a
ability: software upgrades are essential for addressing secu- broad range of use cases. For instance, the scalable cloud-
rity flaws, as well as for updating devices to match changes based COMPOSE platform addresses use cases involving
in standards. However, this is a challenge on the most con- event streams. New work is needed to support continuously
strained IoT devices, which, to date, are not field-upgrad- changing properties as opposed to discrete events, and to
able. This necessitates the use of better operating systems on address the rich requirements for complex cyber-physical
most IoT devices, and/or gateways that can proxy and systems. These are likely to involve different requirements
manage for other IoT devices that cannot afford a sophisti- at different levels of abstraction, e.g., tight requirements on
cated OS. timing at a low level, and perhaps transactional robustness at
a high level.
With the increasing number of sensors, we all need to be con-
fident that our privacy is safeguarded. This implies end-to- To enable open markets of services, we need a standard way
end encryption against eavesdroppers, strong mutual authen- to access the service descriptions, so that a search engine can
tication and support for access control and data handling cover services hosted in different clouds operated by dif-
according to the data owner’s policies. With the ability to ferent vendors. We then need a standard framework for rep-
combine data from different sources, it becomes necessary to resenting descriptions along with standard
track provenance so that the originating data owner's policies vocabularies/ontologies. This needs to cover the purpose of
can be applied to derived data. This in turn motivates work a service, the interfaces it exposes or depends upon, its secu-
on techniques for static analysis of service logic and dynamic rity and privacy related properties, and so forth.
enforcement of policies. Interoperability depends upon having compatible semantics
and data representations. What is needed to motivate the re-
Given the anticipated very large numbers of sensors and use of vocabularies? When existing vocabularies aren’t a
actuators, it will be inevitable that some will fail, either good fit to particular needs, what is needed to encourage the
through hardware faults, electrical noise or even botched registration of a new vocabulary along with the assumptions
upgrades. Services need to be designed to be resilient in the that motivate it?
face of such failures. This will need to happen at multiple
levels of abstraction. Resilience is also important for han- Where services have mismatching semantics or data for-
dling rapid changes in demand without overloading the plat- mats, there is an opportunity for intermediaries to bridge the
forms on which the services are running. Resilience is also gaps. Search services can formulate plans for assembling
key to handling cyber attacks. One approach to counter this services to fulfil the designated requirements. Such assem-
is in depth defence with successive security zones and auto- blies can be static or dynamic, e.g., all cars in this section of
matic trip wires for detecting intrusion and raising the alarm. a road. Plans can also be applied to managing tasks, e.g.,
Continuous monitoring can be combined with machine sequential tasks, concurrent tasks, and hierarchical arrange-
learning techniques for spotting signs of unusual behaviour. ments of tasks, where tasks are associated with precondi-
tions and postconditions. For the Web of Things, this corre-
Raw data often has limited value, only becoming valuable sponds to finding services that can perform these tasks, e.g.,
when it has been processed through multiple levels of inter- transforming data, identifying events that are implied by a
pretation that combines multiple sources of information, and combination of lower level events, or carrying out actions
provides results that are pertinent to a given context. This is with a combination of actuators.
where we can learn from nature by examining and mim-
icking the progressive processes involved in animal percep- The ‘things’ in the Web of Things are virtual objects. They
tion and recognition. The same is true for actuation, where can represent real world objects such as sensors and actua-
high level intents can be progressively transformed into tors, people and locations, or even abstract ideas like periods
lower level control over different subsystems. What is of time (e.g., the 70’s) or events (e.g., a football match, con-
needed to coordinate and synchronise distributed systems? cert or play). The ‘web’ in the Web of Things refers to the
As human beings, when we speak, our brains are able to idea that things’ are accessible via Web technologies, e.g.,
coordinate the movements of many components, each of HTTP at the protocol layer, or scripting APIs at the services
which have widely varying response times. The jaw bone is layer. Where ‘things’ represent real-world objects such as
massive and needs to be set in motion well before the tip of people, the things can be considered as avatars that know
our tongue, which can move much more quickly. about the person they represent, and can perform actions to
achieve the goals of that person. This is related to the con-
The Web places a strong emphasis on scripting, and the same cept of the Social Web of Things in which things have rela-
will apply for the Web of Things. Scripts (e.g., Node.js using tionships to you, to your ‘friends’ and to other things. The
Javascript) could be used to define service logic for scalable social network can provide a basis for routing notifications
cloud based platforms, for small scale platforms, e.g., as a and for sharing services.

ERCIM NEWS 101 April 2015 9


Special Theme: The Internet of Things & the Web of Things

Google’s ‘Physical Web’ (Google, 2014) is about beacons consumers can be sure of the other party’s identity. Identity
that broadcast web addresses to devices in their neighbour- verification is about linking identities to real world proper-
hood. This can be compared to walking down a crowded ties, e.g., the physical location of a sensor, or the full name
market street with all the store holders shouting out their and postal address of a human. There is a need for trusted
wares and special offers. This calls for personal agents or agents that provide identity verification services. Trust is
avatars that are aware of your current interests and are able to also important in relation to decisions about whether to use
recognise which beacons are relevant and which can be services: are they safe, do they come from a bone fide
safely ignored. The agent could notify you directly or could source, will they safeguard my privacy and so forth. This
perform tasks on your behalf. provides opportunities for agents that perform security and
privacy audits of services. This can be complemented by
Avatars are also related to the concept of personal zones as crowd sourced reputations and reviews. Recommendation
explored in the EU FP7 webinos project. Your personal zone systems can further provide suggestions based upon what
is an abstraction that groups all of your personal devices and other people have looked at in similar contexts.
services. It provides an overlay model for secure messaging
between your devices as well as offering zone wide services We have a lot to do. The papers in this special issue of
to trusted applications running on your devices. Your per- ERCIM News provide a small sample of the research work
sonal zone also acts as an avatar on your behalf offering serv- that is helping to realise the potential for connected sensors
ices to your friends based upon the access control policies and actuators, and the services that this enables.
you set. For the Web of Things, personal zones offers a uni-
fied means for people to manage the data they own. Links:
IERC 2104: European Research Cluster on the Internet of
Another consideration is the lifecycle of services, their provi- Things, 2014: Internet of Things From Research and
sioning, and packaging as products for sale to consumers. As Innovation to Market Deployment:
an example, consider a security camera purchased for use at http://www.internet-of-things-research.eu/pdf/IoT-
home. The camera may be bundled with the software and From%20Research%20and%20Innovation%20to%20Mark
services, or this could be purchased separately from a Web of et%20Deployment_IERC_Cluster_eBook_978-87-93102-
Things marketplace. Either way, the user needs a really 95-8_P.pdf
simple approach to installing the hardware and setting up the
associated services. How is the camera ‘discovered’ and COMPOSE: EU FP7 project 2012-2015,
‘paired’ with a service? How does the user provide additional http://www.compose-project.eu
metadata, e.g., giving it a name, describing its location, and
setting its access control policy? The package could include Webinos: EU FP7 project 2010-2013,
an application that the user runs to set this up, and to install http://webinos.org
any required device drivers. The package could include other
applications that enable the user to manage the device and Cisco, 2011: The Internet of Things — How the Next
service, and as a user interface for the service when it is up Evolution of the Internet Is Changing Everything:
and running. In the context of a smart city, there may be a http://www.cisco.com/web/about/ac79/docs/innov/IoT_IBS
need to install and set up large numbers of sensors. This too G_0411FINAL.pdf
should be as simple and painless as possible. The same
should be true for managing software upgrades and for taking IoT2014: David Clark — Not making the same mistakes
devices and services out of service as needed. again:
http://www.iot-conference.org/iot2014/keynote-speakers/
Suppliers and consumers of services need to reach agree-
ments, and this can be formalised as contracts that cover pay- Google, 2014: The Physical Web
ments, data handling policies and so forth. For open markets https://google.github.io/physical-web/
of services such contracts should be legally binding on the
parties involved. Whilst data may be provided free, in other
cases, some form of payment will be required, for instance, Please contact:
one off payments, per usage payments and subscription based Emmanuel Baccelli, Inria, France
payments. To enable open markets to operate across borders, E-mail: Emmanuel.Baccelli@inria.fr
there is a need for international standards around payments.
Even if services are provided free of charge, they may be Dave Raggett, W3C
restricted to consumers in certain groups. Access control may E-mail: dsr@w3.org
be based on rules, e.g., as with the XACML XML access con-
trol language, or based upon the possession of tokens as with
capability based systems.

Access control is related to identity management. Mutual


authentication is needed to ensure that both suppliers and

10 ERCIM NEWS 101 April 2015


Open{WSN|Mote}: Open-Source Industrial IoT
by Thomas Watteyne, Xavier Vilajosana, and Pere Tuset

The OpenWSN project is an open-source implementation of a fully standards-based protocol stack


for capillary networks, rooted in the new IEEE802.15.4e Time Synchronized Channel Hopping
standard. IEEE802.15.4e, coupled with Internet of Things standards, such as 6LoWPAN, 6TiSCH, RPL
and CoAP, enables ultra-low-power and highly reliable mesh networks, which are fully integrated into
the Internet. OpenMote is an open-hardware platform designed to facilitate the prototyping and
technology adoption of IEEE802.15.4e TSCH networks, and is fully supported by OpenWSN.

Time Synchronized Channel Hopping networking solutions for Low-Power allows TSCH to fit under an IPv6-
(TSCH) was designed to allow and Lossy Networks (LLNs). The enabled protocol stack for LLNs, run-
IEEE802.15.4 devices (i.e., low power memo RFC5673 (Industrial Routing ning IPv6 packet delivery in Low
wireless mesh network devices) to sup- Requirements in Low-Power and Lossy Power Wireless Personal Area
port a wide range of applications Networks) (Link 2) discusses industrial Networks (6LoWPANs) (Link 3), IPv6
including, but not limited to, industrial applications, and highlights the harsh Routing Protocol for LLN (RPL) (Link
automation and process monitoring. It is operating conditions as well as the strin- 4) and the Constrained Application
based on a medium access technique gent reliability, availability, and security Protocol (CoAP) (Link 5). All of this
which uses time synchronization to requirements for an LLN to operate in complemented with the management
achieve ultra low-power operation and an industrial environment. In these sce- interface and network operation specifi-
channel hopping to enable high relia- narios, vast deployment areas with large cation currently being developed by the
bility. Synchronization accuracy directly (metallic) equipment cause multi-path IETF 6TiSCH working group.
relates to power consumption, and can fading and interference to thwart any
vary from microseconds to milliseconds, attempt of a single-channel solution to The OpenWSN project (Link 6) (see
depending on the hardware and imple- be reliable; the channel agility of TSCH Figure 1) is an open-source implemen-
mentation. is the key to its ultra high reliability. tation of the aforementioned protocol
stack designed for capillary networks,
The IEEE802.15.4e standard is the latest IEEE802.15.4e TSCH focuses on the rooted in the new IEEE802.15.4e TSCH
generation of ultra-low power reliable MAC layer only. This clean layering standard, and providing IPv6 connec-
tivity to ultra-reliable low power indus-
trial mesh networks [1].
Figure 1: OpenMote
CC2538 main OpenWSN was founded in 2010 in the
board. Composed by Berkeley Sensor & Actuator Center at
a ARM Cortex M3 UC Berkeley as an open-source project
SoC TI CC2538 to implement, promote and contribute
Microcontroller. to the Industrial Internet of Things
Open-Hardware (IIoT), the next wave of innovation
design. impacting the way the world connects.
With a community of academic and
industrial contributors, the OpenWSN
protocol stack now runs on most pop-
ular low-power wireless platforms, and
features a simulator and an ecosystem
of cloud-based collaboration and con-
tinuous integration tools. OpenWSN
has become the de-facto open-source
implementation of IEEE802.15.4e-
2012 Time Synchronized Channel
Hopping (TSCH), the standard at the
heart of the IIoT which enables ultra
high reliability and low-power opera-
tion.

In 2013, work from the OpenWSN


project contributed to the creation of
IETF 6TiSCH (Link 7) Working Group,
Figure 2: OpenWSN protocol stack diagram. At the MAC Layer features the new amendment of standardizing how to combine the ease-
the IEEE 802.15.4 standard, namely the IEEE802.15.4e TSCH. On top the IETF standards of-use of IPv6 with the performance of
suite provide IPv6 connectivity to low power mesh networked devices. OpenWSN is OpenSource industrial low-power wireless tech-
and supports multiple commercial and open hardware platforms including OpenMote. nology. With over 290 members, IETF

ERCIM NEWS 101 April 2015 11


Special Theme: The Internet of Things & the Web of Things

6TiSCH is spearheading the develop- viral nor restrictive, enabling industrial 6. OpenWSN Project:
ment of the Industrial IoT. users to take advantage of the platform http://openwsn.org/
without jeopardizing their develop- 7. http://tools.ietf.org/wg/6tisch/charters
In 2014, members of the OpenWSN ments or intellectual property. 8. OpenMote Technologies
team founded OpenMote (Link 8), a OpenWSN is in constant evolution, http://www.openmote.com/
startup company developing an being updated with the latest standards
ecosystem of hardware for the IoT, in the field and becoming a central pro- Reference:
including the popular OpenMote (see totyping platform for future amend- [1] T. Watteyne et al.: “OpenWSN: A
Figure 2), the OpenBase/OpenUSB ments and improvements to already Standards-Based Low-Power Wireless
board to program it, and the existing standards and protocols. Development Environment”,
OpenBattery to power it. Inheriting from Transactions on Emerging
previous ‘Berkeley Motes’, the Links: Telecommunications Technologies,
OpenMote is widely considered the new 1. http://www.openmote.com/ vol. 23, issue 5, 480-493, 2012.
generation of low-power wireless exper- 2. Industrial Routing Requirements in
imental platforms. Low-Power and Lossy Networks: Please contact:
https://tools.ietf.org/html/rfc5673 Thomas Watteyne
The OpenWSN ecosystem is devoted to 3. Compression Format for IPv6 Inria, HiPERCOM2 team
accelerating the standardization and Datagrams over IEEE 802.15.4-Based E-mail: thomas.watteyne@inria.fr
transfer of low power wireless technolo- Networks:
gies to the industry, enabling and pro- https://tools.ietf.org/html/rfc6282 Xavier Vilajosana
moting the adoption of low power wire- 4. RPL: IPv6 Routing Protocol for Universitat Oberta de Catalunya
less for industrial applications. Low-Power and Lossy Networks: E-mail: xvilajosana@uoc.edu
OpenWSN is licensed under the BSD https://tools.ietf.org/html/rfc6550
license; OpenMote Hardware is 5. The Constrained Application Pere Tuset
licensed under CERN OHL 1.2 hard- Protocol (CoAP): OpenMote Technologies
ware license. Both licences are neither https://tools.ietf.org/html/rfc7252 E-mail: peretuset@openmote.com

RIOT and the Evolution of IoT


Operating Systems and Applications
by Emmanuel Baccelli, Oliver Hahm, Hauke Petersen and Kaspar Schleiser

The Internet of Things (IoT) is expected to be the next ‘big thing’. To date, however, there is no de
facto standard software platform to program memory and energy-constrained IoT devices [1]. We
expect an evolution of IoT software platforms that can be roughly compared to the recent evolution
of software platforms powering smartphones.

Over the course of a few years, there has installed/upgraded billions of times on lacking enough openness. In contrast,
been an acceleration in the evolution of smartphones and tablets. Arguably, the prominent examples have achieved
software platforms powering smart attribute of (re)programmability has high impact in the domain of computer
handheld devices - from a state where had the most significant impact in this networks, while remaining open, and
dozens of closed-source, slow-progress, field, even more so than the evolution of therefore more trustworthy: for
rudimentary proprietary solutions where handheld hardware. instance, community-driven efforts
used, to a state where just two major such as Linux, or the IETF [2], each
players (iOS and Android) have imposed On the dark side, companies pushing fundamental to the emergence of the
new de facto standards in terms of soft- iOS and Android use such software Internet as we know it today. While
ware platform interoperability, program- platforms as tools to achieve question- Linux demonstrated the power of open
mability and automatic updating. able goals e.g., more or less covertly source software development and
accumulating and monetizing personal- became the go-to operating system for
The up side of this evolution is quicker- ized information. Furthermore, the true Internet hosts, the IETF is an out-
paced progress and the development of level of openness of iOS or Android is standing example of the positive impact
innumerable applications built on top of debatable, and their not being fully open of open standards, transparent standard-
these platforms, which interact in inno- facilitates the task of covertly accumu- ization processes, and open discussion
vative ways with one another, and with lating personal information. The public forums.
the cloud. It has become so easy to is increasingly aware of this pitfall in
develop such applications (the infamous terms of security and privacy, and it is Until recently, IoT software platforms
‘Apps’) that hundreds of thousands of therefore unlikely that people will were in a comparable state to that of
developers have been able to produce accept IoT software platforms intrinsi- smartphone software platforms before
millions of Apps, which have been cally tied to such monetization, or Android and iOS. It is likely, however,

12 ERCIM NEWS 101 April 2015


Figure 1: Typical device
memory characteristics, and
matching operating systems
available on traditional
Internet hosts vs IoT devices

that new standards will be set in the near with no learning curve (assuming prior cations are expected to leverage sponta-
future, in terms of IoT software plat- experience with POSIX and Linux). On neous wireless networks, Internet con-
form openness, API, automated soft- a wide variety of IoT hardware, RIOT nectivity, the cloud and a dense, inter-
ware updates and other characteristics enables the use of the standard coding connected environment of communi-
that are necessary to enable a modern, languages (ANSI C and C++), well- cating devices. In the mid and long
large scale, secure ecosystem. Such an known debugging tools (gdb, Valgrind term, such IoT applications are
evolution will be game-changing for the etc.), and standard programming para- expected to not only enable optimiza-
IoT, and will fuel a new world of dis- digms (such as full multi-threading), tion of existing processes, but also
tributed applications developed by a while being energy efficient and real- entirely new processes and the emer-
large variety of actors, on top of the time capable. One way to gauge this gence of an enhanced reality, in which
dominant open software platform(s). As effort is to make a parallel with IETF our interface with the Internet will no
yet it is unclear which IoT software protocols such as 6LoWPAN or CoAP, longer be predominantly a screen, but
platforms will emerge as dominant. which adapt IP to memory and energy- rather the objects of the cyber-physical
constrained IoT devices, without losing system embodied by the Internet of
In practice, IoT software platforms face interoperability with the rest of the Things itself.
conflicting requirements: interoper- Internet. Similarly, a modern IoT oper-
ability with the Internet, memory-con- ating system such as RIOT enables a Link:
strained embedded programming, and full-fledged operating system on IoT The SAFEST Project, co-funded by
portable, open-source code. Over the devices with resources that are too lim- ANR and BMBF,
last decade, significant progress has ited for Linux to run on, without losing http://safest.realmv6.org
been made in order to accommodate interoperability with state-of-the-art
such requirements. Pioneer open source development tools and programmers. References:
software platforms such as Contiki or [1] C. Bormann et al.: “Terminology
TinyOS provided first attempts at RIOT is developed by an international for Constrained node Networks", RFC
accommodating these requirements, by community of open source developers 7228, Internet Engineering Task Force,
exploiting non-standard coding para- (co-founded in 2013 by Inria, Freie 2014.
digms, or by limiting code portability Universität Berlin, and Hamburg [2] The Internet Engineering Task
and the set of functionalities offered by University of Applied Sciences in the Force (IETF), http://www.ietf.org
the software platform (for instance, context of the SAFEST project), using [3] RIOT: The Friendly Operating
Arduino environment). Recently, more transparent decision processes based on System for the Internet of Things.
powerful but comparably low memory- rough consensus, open discussion http://www.riot-os.org
footprint software platforms became forums, open-source code, and open
available. standards. The near-future goal of RIOT Please contact:
is to power a modern, large scale, evolu- Emmanuel Baccelli
A prominent example is RIOT [3], an tionary, and secure cyber-physical Inria, France.
open source IoT operating system ecosystem, comprising heterogeneous E-mail: emmanuel.baccelli@inria.fr
which enables programmers to develop IoT devices, distributed processes and
applications on typical IoT devices, applications (see Figure 1). Such appli-

ERCIM NEWS 101 April 2015 13


Special Theme: The Internet of Things & the Web of Things

FIT IoT-LAB:
The Largest IoT Open Experimental Testbed
by Eric Fleury, Nathalie Mitton, Thomas Noël and Cedric Adjih

The universal proliferation of intelligent objects is making Internet of Things (IoT) a reality; to operate on a
large scale it will critically rely on new, seamless, forms of communications. But how can innovations be
validated in a controlled environment, before being massively deployed into the real world? FIT IoT-LAB
addresses this challenge by offering a unique open first class service to all IoT developers, researchers,
integrators and developers: a large-scale experimental testbed allowing design, development, deployment
and testing of innovative IoT applications, in order to test the future and make it safe.

IoT is not simply emerging as a major development, tuning, and experimenta- respect to different features, such as
technology trend: it is already a reality tion related to IoT. microcontroller (TI MSP430, ARM
with billions of existing devices. The Cortex M3 and ARM Cortex A8), radio
Internet of Things represents a tremen- IoT-LAB is part of the FIT (Future chip (2.4GHz or 800MHz) and addi-
dous paradigm shift since Internet was Internet of Things) project which tional functionalities (mobility / robots,
designed; an evolution from pure end- develops experimental facilities within a accelerometer, magnetometer and
to-end communication between an end- federated and competitive infrastructure gyrometer). Resources can be reserved
user device and a server in the Internet, with international visibility and a broad on one or several sites at once. Services
to an Internet interconnecting physical panel of customers. All facilities come offered by IoT-LAB include:
objects that are freely able to communi- with complementary components that • Total remote access to nodes
cate with each other and with humans. enable experimentation on innovative reserved, e.g., allowing users to flash
IoT builds on three pillars [1], related to services for academic and industrial any firmware, without any condition
the ability of smart objects to: (i) com- users. FIT has received 5.8 million Euros or constraint. Any language or OS
pute, (ii) communicate, and (iii) sense in funding from the Equipex research can be used to design, build, and
and interact with their environment. grant program. The FIT consortium is compile applications;
coordinated by University Pierre et • Direct access to a debugger server on
Although IoT is already a reality, it is Marie Curie and composed of Inria, each node so that all debugging can
still maturing and waiting for its ‘iPhone ICube laboratory from University of be performed remotely on the node
moment’. Several challenges remain, in Strasbourg, Institut Mines-Télécom and (such as step by step code execution)
particular relating to the standardization CNRS. FIT is a platform federation. • Access to the serial ports of all nodes
of efficient and universal protocols, and Such a federation of independent net- for a real-time interaction, with
to the design and testing of IoT services work experimental facilities is arguably optional aggregation;
and applications. Owing to their mas- the only meaningful way to achieve the • Each node could be visible from
sively distributed nature, their design, required scale and representativeness for Internet with end-to-end IP connec-
implementation, and evaluation are supporting Future Internet research. IoT- tion using IPv6 and 6LoWPAN for
inherently complex and tend to be LAB testbeds are dispersed among six example;
daunting, time-consuming tasks. different locations across France offering • A very accurate power consumption
Required to overcome this hurdle is a access, for the first time, to 2728 wireless monitoring of every node.
representative, large scale, platform IoT fixed and mobile nodes equipped • Packet sniffer and analyzer on each
allowing researchers, IoT designers, with various sensors (see Table 1). node;
developers and engineers to construct, • A GPS module for some A8 nodes
benchmark and optimize their protocols, Users can select and reserve the number allowing a very precise end-to-end
applications and services. and type of nodes they wish with time synchronization, accurate moni-

The FIT IoT-LAB testbed is our answer


to these challenges. It offers a first class Institut
Grenoble Lille Paris Rennes Strasbourg Total
facility with thousands of wireless Télécom
nodes to evaluate and experiment very WSN430
256 256 512
large scale wireless IoT technologies (800MhZ)
ranging from low level protocols to WSN430
256 120 256 632
advanced services integrated with (2.4GhZ)
Internet, accelerating the advent of M3 384 320 24 90 120 938
groundbreaking networking technolo-
gies. IoT-LAB also provides dozen of A8 256 200 70 24 550
robots to test and improve the impact of
Host Node 32 64 96
the mobility of IoT devices. FIT IoT-
LAB’s main and most important goal is Total 928 640 344 256 160 400 2728
to offer an accurate open access multi-
user scientific tool to support design, Table 1: IoT-LAB testbeds.

14 ERCIM NEWS 101 April 2015


Figure 1: FIT-IoT LAB platform. Left: Strasbourg, centre: Grenoble, right: Lille.

toring and performance evaluation of plug their own hardware devices, Reference:
communication protocols; while benefiting from the IoT-LAB [1] D. Miorandi, S. Sicari, F. D.
• A set of useful detailed tutorials, OS services and monitoring tools (a fea- Pellegrini, I. Chlamtac: “Internet of
supports (Contiki, FreeRTOS, TinyOS, ture frequently required by both aca- things: Vision, applications and
and RIOT) including full protocol demic and industrial users). research challenges”, Ad Hoc
stacks and communication libraries Networks, 10(7):1497 – 1516, 2012.
such as OpenWSN providing open- Overall, FIT-IoT LAB testbed is a
source implementations of IoT proto- unique pioneer in the domain of IoT test- Please contact:
col standards; beds. Eric Fleury
• A unique fleet of mobile robots ENS de Lyon / Inria, France
(WifiBot and TurtleBot); Links: Tel: +33 672 162 974
• Strong extensibility through the IoT-LAB: https://www.iot-lab.info E-mail: Eric.Fleury@inria.fr
availability of more than 100 empty FIT: https://www.fit-equipex.fr
slots on which users can physically OpenWSN: https://openwsn.atlassian.net/

OCARI: A Wireless Sensor Network


for Industrial Environments
by Tuan Dang, Pascale Minet and Erwan Livolant

OCARI is a wireless sensor network designed to operate in industrial environments [1]. It is easy to
deploy (i.e. ‘plug-and-play’), and is energy-efficient to support battery-operated nodes. OCARI nodes
use commercial off-the shelf components. OCARI provides bounded medium access delays and the
energy consumption of an OCARI network is predictable. In addition, the network is scalable (up to
hundreds of sensor nodes) and able to support micro-mobility of nodes.

OCARI can be distinguished from Furthermore, OCARI has the advantage includes OPERA (OPtimized Energy
WirelessHart and ZigBee by the fol- of being open source. efficient Routing and node Activity
lowing three characteristics: scheduling) that consists of:
• It relies on a mesh topology (see Fig- The OCARI stack comprises the • EOLSR, an energy-efficient routing
ure 1), improving robustness and Physical, MAC, Network and including neighbourhood discovery
bandwidth use. Application layers. It was first devel- and building of the routing tree root-
• It is self-configuring thanks to a oped in the ANR OCARI project lead ed at the sink in charge of data gath-
dynamic multihop routing taking by EDF with Inria, LIMOS, LATTIS, ering.
energy into account. LRI, Telit and DCNS. Today, it is • OSERENA, [2] a colouring node pro-
• It saves energy thanks to a determinis- actively developed by EDF, Inria, in tocol allowing a conflict-free sched-
tic medium access and sleeping peri- collaboration with ADWAVE and other ule of node medium accesses to be
ods for nodes. research labs. The network layer built. Each node knows the time slots

ERCIM NEWS 101 April 2015 15


Special Theme: The Internet of Things & the Web of Things

in which it is allowed to transmit or it the 2.4GHz band and a 32 bits Cortex • Demonstration during the Inria-
may receive from a neighbour. In the M3 microcontroller. OCARI is presently Industry Telecom day: routing and
remaining slots it sleeps to save energy. available on two platforms: Dresden colouring, fire detection on a DCNS
deRFsam3-23T09-3 and ADWAVE ship construction site using
OCARI takes advantage of cross-lay- ADWRF24-LRS (see Figure 2). ADWAVE hardware (see
ering [3] to optimize its performance. http://www.inria.fr/en/innovation/
From the hardware point of view, an OCARI has been demonstrated many calendar/telecoms-du-futur).
OCARI node consists of a radio fre- times, the most recent two demonstra- • Demonstration for the steering com-
quency transceiver compliant with the tions in November 2014: mittee of the Connexion Cluster proj-
IEEEE 802.15.4 standard operating in ect (https://www.cluster-connexion.fr):
integration of sensors of various
types in the OCARI network and
interconnection of the OCARI net-
work to the facility backbone by
Figure 1: OCARI topology. means of a OCARI/OPC-UA gate-
way built with Telecom ParisTech on
a Raspberry Pi (see Figure 3).

In the future, we plan to create an


alliance, bringing together industrial
end users (e.g., EDF, DCNS), sensor
providers (e.g., DEF, Carmelec),
research labs (e.g., Inria, Telecom
ParisTech), integrators of network solu-
tions (e.g., ADWAVE), SMEs and engi-
neering service companies using wire-
less sensor networks (e.g., ATOS, PRE-
DICT). The objectives of the OCARI
Alliance are to create a sustainable
ecosystem, gather feedback on real
OCARI deployments and fund func-
tional evolutions of OCARI.

Link: http://www.ocari.org

Figure 2: OCARI on Dresden References:


platform (left) and on [1] T. Dang et al.: “Which wireless
ADWAVE platform (right). technology for industrial wireless sensor
network? The development of OCARI
technology”, IEEE Transactions on
Industrial Electronics, 2009.
Figure 3: Gateway OCARI/OPC-UA. [2] I. Amdouni, P. Minet, C. Adjih
“OSERENA: a coloring algorithm
optimized for dense wireless networks",
the International Journal of Networked
and Distributed Computing (IJNDC),
vol. 1, issue 1, November 2012.
[3] K. Al Agha, et al.: “Cross-layering
in an industrial wireless sensor
network: case study of OCARI”, JNW,
Journal of NetWorks, special issue on
Wireless sensor network: theory and
practice, Academy Publisher, 2009.

Please contact:
Tuan Dang
EDF, STEP department, France
E-mail: tuan.dang@edf.fr

Pascale Minet, Erwan Livolant


Inria, France
E-mail: pascale.minet@inria.fr,
erwan.livolant@inria.fr

16 ERCIM NEWS 101 April 2015


Security and Privacy in the Internet of Things
by Ludwig Seitz

The Internet of Things (IoT) has particular security and privacy problems. The Internet Engineering
Task Force is designing authentication and authorization mechanisms for the most constrained
devices which are part of the Internet of Things.

In many of the applications of Internet TLS protocol) have a size of at least 2


of Things (IoT), sensors measure vari- KB, and would therefore require a siz-
ables such as speed, pressure, consump- able part of the small device's memory,
tion, temperature or heart rate, and actu- making normal operation difficult.
ators control physical systems, such as
brakes, valves, lights, power circuits, or While DICE’s work will result in a pro-
automated drug dispensers. tocol that allows these tiny devices to
establish secure connections, the next
What makes these scenarios interesting security and privacy relevant question is
from a security and privacy perspective, what a device is allowed to do when it
is that they all affect the physical world, has successfully and securely connected
sometimes controlling critical infra- to another. In traditional web services,
structure, and sometimes gathering very these questions are answered by access
private information about individuals. The author with a sensor node. control systems that usually query a
database of authorization policies,
Clearly, there is a need for security and defining who may access what under
privacy protection in the IoT. Some of Privacy protection, on the other hand, which circumstances.
the devices used in the IoT have depends largely on individual users to
extremely limited memory, processing understand and configure security set- It is obvious that the access control
capacity and battery power; conse- tings. This often requires a high level of mechanisms designed for powerful
quently, classical IT security mecha- IT security competence, and is therefore servers cannot be applied for IoT
nisms are often inadequate to cope with likely to fail more often than not. without adapting them to the resource
the unique security situations that arise. Addressing this issue is likely to greatly constraints described above. To this
Many such devices operate on wireless improve public acceptance of IoT con- end, ACE is examining mechanisms
networks, which only offer low band- sumer end products. where, for example, the burden of
width and which are prone to losing making access control decisions is
data-packets in transfer. Currently the Internet Engineering Task shifted to a more powerful trusted third
Force (IETF) is working on various party and the device just has to enforce
One would think that Moore's Law security topics related to the IoT. IETF these access control decisions.
would fix these problems over time, by is a large, international standardization
giving us more powerful processors, and organization, with a wide range of Thus the work on securing the IoT is
cheaper memory modules. However, Internet related working groups. IETF ongoing, and the repercussions of the
advances in this area go largely towards has developed a number of protocols decisions that are made now will be
reducing the cost per unit, as well as aimed at IoT applications, such as affecting us for many years to come.
power consumption, and not towards 6LoWPan, CoAP, and DTLS, and it cur-
increasing performance. rently has two working groups active in Links:
IoT security. The first, DICE, deals (1) DICE WG:
We therefore need adapted security and with adapting the DTLS [1] protocol to http://datatracker.ietf.org/wg/dice
privacy mechanisms that allow us to constrained environments, while the (2) ACE WG:
reap the potential benefits of the IoT, second, ACE, addresses authentication http://datatracker.ietf.org/wg/ace
without endangering critical infrastruc- and authorization in constrained envi-
ture or individual privacy. ronments [2]. References:
[1] E. Rescorla, N. Modadugu,
Another problem is fragmentation, since An example of the limitations that affect “Datagram Transport Layer Security
security solutions are either not stan- constrained devices is memory: it is Version 1.2", RFC 6347, January 2012,
dardized, or are standardized only for assumed that the smallest devices http://www.rfc-editor.org/info/rfc6347.
one application area. This affects IT capable of implementing some mean- [2] L.Seitz, G. Selander, C. Gehrmann:
security in general, but IoT is particu- ingful security measures would have “Authorization Framework for the
larly affected owing to the need for around 10 KB of RAM memory and Internet-of-Things”, D-SPAN 2013.
interoperability between devices pro- roughly 100 KB of persistent memory
duced by different vendors (otherwise (e.g. flash-memory). As a comparison, Please contact:
we'd lose the 'Internet' from Internet of the certificates that are sent over the net- Ludwig Seitz, SICS Swedish ICT
Things) and the rapid development of work and processed as part of the Tel: +46 703 49 9251
new technologies in that sector. HTTPS protocol (and the underlying E-mail: ludwig@sics.se

ERCIM NEWS 101 April 2015 17


Special Theme: The Internet of Things & the Web of Things

Secure and Efficient Wireless Sensor Networks


by Corinna Schmitt and Burkhard Stiller

There exists a multitude of implemented, as well as envisioned, use cases for the Internet of Things
(IoT) and Wireless Sensor Networks (WSN). Some of these use cases would benefit from the
collected data being globally accessible to: (a) authorized users only; and (b) data processing units
through the Internet. Much of the data collected, such as location or personal identifiers, are of a
highly sensitive nature. Even seemingly innocuous data (e.g., energy consumption) can lead to
potential infringements of user privacy.

The infrastructure of the Internet of resources of these devices, the goal of SecureWSN tackles this challenge by
Things (IoT) with its diversity of devices secure WSNs is to support end-to-end developing three solutions for different
and applications, as well as the trend security by a two-way authentication, types of resources.
towards a separation of sensor network an efficient data transport solution for
infrastructure and applications exacer- the data, and a controlled data access, TinyDTLS protects data from its source
bates security risks. A true end-to-end supporting the mobility of today’s to the sink supporting confidentiality,
security solution is therefore required to users. Thus, different components were integrity, and authenticity. RSA-capable
achieve an adequate level of security for developed in the construction of (Rivest-Shamir-Adleman) devices are
IoT. Protecting data once they leave the SecureWSN and are illustrated in authenticated via X.509 certificates
boundaries of a local network is not suf- Figure 1. All components support hard- during the key-exchange in a two-way
ficient, especially when private and high- ware from different vendors with dif- authentication handshake. Constrained
risk information are effected. ferent resources. Different security devices perform a variant of the
solutions (TinySAM, TinyDTLS [2], or Transport Layer Security (TLS) pre-
However, IoT is no longer limited to TinyTO [3]) were developed that are shared key algorithm. The data sink
servers, routers, and computers with based on known algorithms from IP net- authenticates via certificate either
manifold resources. It also includes con- works, like DTLS and BCK, and directly with the mote or with an Access
strained devices – motes –, which are required adaptation (e.g., complexity) Control Server (ACS). ACS grants
very limited in memory (approximately to fit these resources whilst supporting a tickets to authenticated devices with suf-
10-50 KByte RAM and 100-256 KByte heterogonous network structure. ficient rights. Motes request connection
ROM), computational capacity, and from their communication partner where
power (supported by just a few AA bat- End-to-end Security key establishment is based on DTLS [2].
teries). These limited resources do not Today, with so much personal informa-
reduce the need to support end-to-end tion online, end-to-end security is In comparison, TinyTO uses a Bellare-
security and secure communications, but essential in many situations. This repre- Canetti-Krawcyk (BCK) handshake
they make it much harder to meet these sents the challenge for constrained with pre-shared keys. For the key gener-
requirements. Depending on the specific devices usually used in WSNs. ation, key exchange, signatures, and

Figure 1: Architecture and


Components of SecureWSN.

18 ERCIM NEWS 101 April 2015


encryption, the Elliptic Curve special template records for motes and ECC optimizations. Parts of SecureWSN
Cryptography (ECC) is used [3]. Thus, supports aggregation. Necessary header were developed within EU projects
this solution saves resources and does compression options were developed to SmartenIT and FLAMINGO and are part
not require a Certificate Authority reduce the overhead by required IPFIX of the standardization process.
(CA). It was shown that 192-bit ECC headers [2].
keys are as secure as 1024-bit to 2048- Links:
bit RSA keys, which makes TinyTO a Additionally, the SecureWSN approach http://www.csg.uzh.ch/research/Secure
suitable alternative to TinyDTLS, sup- includes the WSN configuration, man- WSN.html
porting the same security functionality. agement, and data handling of the http://tools.ietf.org/html/draft-schmitt-
WNS’s owner by ‘clicking buttons’, all ace-twowayauth-for-iot-01
As sufficient resources are not always termed CoMaDa. CoMaDa works with
available to support the end-to-end a virtual representation of the real WSN References:
security requirement, TinySAM was network, displaying in real-time: (1) [1] M. Keller: “Design and
developed to support a one-way authen- data collected and (2) the network Implementation of a Mobile App to
tication. TinySAM uses the Otway- status, as well as allowing for (3) mote Access and Manage Wireless Sensor
Rees key establishment protocol modi- updates (e.g., the degree of aggrega- Networks”, Master Thesis, Universität
fied by the Abadi and Needham algo- tion). The dedicated WebMaDa compo- Zürich, Communication Systems
rithm, where all nodes have an AES nent [1] publishes the WSN data in the Group, Department of Informatics,
(Advanced Encryption Standard) key Internet and allows anyone who is Zürich, Switzerland, November 2014.
pair known by the key server. Two authorized and has the appropriate cre- [2] T. Kothmayr, et al.: “DTLS Based
nodes build an individual session key dentials and rights, to view the WSNs. Security and Two-way Authentication
pair for secure data exchange. for the Internet of Things”, Ad Hoc
Conclusions Networks, Elsevier, Vol. 11, No. 8,
Owing to the diversity of applications SecureWSN consists of different mod- November 2013, pp 2710-2723.
and the amount of collected data, all these ules supporting different end-to-end [3] M. Noack: “Optimization of Two-
solutions also support aggregation in security modes, efficient data transport, way Authentication Protocol in
order to use the limited bandwidth (102 aggregation, and controlled data access Internet of Things”, Master Thesis,
byte on MAC layer in IEEE 802.15.4) functionality. These solutions, which Universität Zürich, Communication
and energy as efficient as possible. are currently available, are highly flex- Systems Group, Department of
ible, since each mechanism that is Informatics, Zürich, Switzerland,
Data collected in WSNs consists of implemented can be selected depending August 2014.
stable meta-information and sensor on the requirements of the applications
readings periodically measured and sent and hardware. As such, the approach of Please contact:
out in one message resulting in redun- SecureWSN benefits any kind of IoT Corinna Schmitt, Burkhard Stiller
dancy. Thus, the push-based Internet application that demands secure end-to- Universität Zürich, Switzerland,
Protocol Flow Information Export end support. Tel: +41 44 635 7585,
(IPFIX) protocol serves optimization by +41 44 635 6710
dividing data into two small messages Continued work in this area will include E-mail: schmitt@ifi.uzh.ch,
(template record and data record). The further module developments and stiller@ifi.uzh.ch
resulting TinyIPFIX protocol includes enhancements, such as pull requests and

Creating Internet of Things Applications


from Building Blocks
by Frank Alexander Kraemer and Peter Herrmann

Reactive Blocks is a toolkit to create, analyse and implement reactive applications. It helps
developers to get concurrency issues right, reuse existing solutions, and brings model checking
to the common programmer.

Internet of Things (IoT) applications Model-driven development and model often fail to cover details in code in a
connect hardware to communicate checking provide solutions to these suitable way.
within a network, often with constrained problems. However, these solutions are
resources. Therefore, even simple use barely used by programmers. Reasons With these concerns in mind, we devel-
cases quickly become very complex. In for this are that model checking oped the Reactive Blocks tool for event-
addition, IoT applications often combine requires deep knowledge in formal driven and concurrent applications. It
several technologies, and only few pro- methods to produce an appropriate has its origins at the Department of
grammers have the skill set to cover input model that can be analysed. In Telematics at the Norwegian University
them all. addition, model-driven approaches of Science and Technology (NTNU),

ERCIM NEWS 101 April 2015 19


Special Theme: The Internet of Things & the Web of Things

1 start
start
Config
Config Listener
Listener 2 3
initConfig
initConfig

start updatedConfig
updatedConfig
init
CloudClient
Kura Clo udClient
Modbus
Modbus
publish
publish ready
d
executedReadIn
executedReadIn iinitOk
nitOk

deviceId
deviceId rreadDone
eadDone waiting
waiting
failed
e xecutedWrite
executedWrite
readFailed

stop
stop writeDone
writeDone stop
stop stopped

e xecuteReadHold
executeReadHold
playing msgArrived init
rregisterId
egisterId
writeFailed
writeFailed CoAP Resource
d
stopped
start ok
initFailed
init
Config
Config Listener
Listen
MQTT Core get
start
Config Listener
ener
subscribe
sub scribe iinitOk
nitOk initConfig
initCo
initConfig
Config
post
publishOk
publishOk updatedConfig
Config
unsubscribe
unsub scribe
updatedConfig
updatedCo getResponse
error
publish
publish failed
message
me ssage init initPS
RPi G
RPi PIO Di
GPIO Digital n
gital IIn
stop
stop disconnected
d isconnected
stop
stop value
value

initFailed stopped initOk


initOk
read
isHigh
isHigh

isLow

initError stopped

Figure 1: The Reactive Blocks workflow. Blocks from libraries are combined to applications. Blocks are model-checked, and the application built
via code generation.

and has been further developed by the is usually the kind of code that is cum- system is informed about the arrival of
spin-off company Bitreactive. bersome and error-prone to write manu- freight. In case of deviations, alerts via
ally. email and SMS are sent. The system
Building IoT Applications with was created by programmers without
Reactive Blocks Compositional Analysis specific knowledge in formal methods.
To appeal to the common programmer, A model checker is built into the editor. Due to the built-in analysis, all interac-
the tool combines programming and The building blocks have a formal tions work correctly. Using building
modelling with an automatic composi- semantics and correspond to temporal blocks, about 60% of the functionality
tional analysis, as shown in Figure 1: A logic formulas, so that the model could be taken from reusable libraries.
developer creates a system from checker can take the UML model as
building blocks. Many of the blocks do input. Developers can start model Link:
not need to be developed from scratch checking with a single click. The encap- http://bitreactive.com
but can be selected from libraries (1) sulation of building blocks by contracts
The blocks are connected with each enables a compositional analysis, in References:
other (2) This is facilitated by behav- which each block can be analysed sepa- [1] L.A. Gunawan, P. Herrmann:
ioural contracts enabling the developer rately. This minimises the problem of ”Compositional Verification of
to understand the interface behaviour of state space explosion. An error is shown Application-Level Security Properties,
a block without having to understand its to the developer as animation in the in proc. of ESSoS 2013, LNCS 7781,
inner details. Applications consist of a editor such that can be easily under- February/March 2013.
hierarchy of blocks. The applications stood and fixed. Examples of errors are
are then analysed by automatic model deadlocks or violations of protocols, [2] Han F., P. Herrmann: ”Modeling
checking. Once consistent, code is auto- which are detected because the UML Real-Time System Performance with
matically generated and can be model of the building blocks do not Respect to Scheduling Analysis”, in
deployed as OSGi bundles or stand- reach their final state, or because the proc. of UMEDIA 2013, Aizu-
alone Java applications (3). external contract of a block is violated. Wakamatsu, IEEE Computer Society
In addition, the tool detects if an appli- Press, September 2013.
To balance the benefits of generating cation does not honour the life cycle
code with that of manual programming, contract of a component when it runs in [3] P. Herrmann, J.O. Blech, F. Han, H.
Reactive Blocks uses a combination of a framework like OSGi. Such errors are Schmidt. A Model-based Toolchain to
Unified Modelling Language (UML) hard, if not impossible, to detect by Verify Spatial Behavior of Cyber-
with Java. UML describes the concur- testing. The mathematical basis of the Physical Systems. In 2014 Asia-Pacific
rent behaviour of building blocks with building blocks in temporal logic for- Services Computing Conference
activity diagrams or state machines. mulas makes it possible to reason about (APSCC), IEEE Computer.
State machines are also used to describe other properties, such as reliability,
the contract of a block. The UML security [1], real-time properties [2], or Please contact:
models only coordinate concurrent spatial constraints [3]. Frank Alexander Kraemer, Peter
behaviour, and refer to Java methods for Herrmann
detailed operations on application pro- Fleet Monitoring Case Study NTNU, Norway,
gramming interfaces (APIs) or other A case study was developed within the E-mail: kraemer@item.ntnu.no,
data. The Java methods are edited in the IMSIS project funded by the Norwegian herrmann@item.ntnu.no
Java tools within Eclipse. Existing code Research Council. It consists of a
can also be integrated, by encapsulating system that monitors a fleet of trucks
it into operations and building blocks. while they deliver goods. Their position
The code related to concurrency, i.e., relative to defined geo-fences is con-
code that decides when the operations stantly monitored and compared to
are called, is generated from UML. This expected arrival times. The backend

20 ERCIM NEWS 101 April 2015


Interfaces to the Internet of Things with XForms
by Steven Pemberton

XForms is a language for describing interfaces to data, designed at W3C by researchers from
industry and academia. It is a declarative language, meaning it describes what has to be done, but
largely not how. The interface it describes does not have to run locally on the machine producing the
data, but can be run remotely over the network. Since Internet of Things (IoT) computers typically
have little memory and are low-powered, this makes XForms ideally suited for the task.

One of the unexpected successes of XForms has already been used for a administrative programming needed.
HTML was its adoption for controlling number of years to control devices in Several implementations of XForms are
devices with embedded computers, such this way at many petrol stations in the available, at least three of which are
as home Wi-Fi routers. To make an USA. Each device, storage tanks, petrol open-source. It is also part of the Open
adjustment to such a device, the user pumps, cash registers, and so on, con- Document Format, implemented by
directs the browser to the IP address tains a simple server that delivers its Open Office and Libre Office. There is
from which it is running and a small web data as XML instances. XForms inter- also a tutorial [3].
server on the device serves up web faces are then used to read and combine
pages that allow the user to fill in and these values, and update control values Link:
submit values to change the working of (for instance the price of fuel being dis- Nest API Reference:
the device. played on pumps). https://developer.nest.com/documentation/
api-reference
However, the tiny embedded computers As an example of how it could be used,
that form part of the IoT typically have Nest, a well-known producer of internet References:
memory in kilobytes, not megabytes, thermostats, has published the data- [1] J. M Boyer (ed.), XForms 1.1,
and lack the power to run a web server model interface to its devices. A simple W3C, 2009,
that can serve and interpret web pages. interface to this could look like this: http://www.w3.org/TR/2009/REC-
This calls for a different approach. xforms-20091020/
<instance src=”http://thermostat.local/”/> [2] J. M. Boyer et al. (eds.), XForms
One approach is for the devices to serve <bind ref="ambient_temperature_c" 2.0, W3C, 2015,
up only the data of the parameters, so type="decimal" readonly="true()"/> http://www.w3.org/MarkUp/Forms/wiki/
that those values can then be injected <bind ref="target_temperature_c" XForms_2.0
into an interface served from elsewhere. type="decimal"/> [3] Steven Pemberton, XForms for
XForms [1], a standard that we have <bind ref="target_temperature_f" HTML Authors, W3C, 2010,
helped develop at W3C, is designed for type="decimal" calculate= http://www.w3.org/MarkUp/Forms/2010/
exactly this type of scenario: although it "../target_temperature_c*9/5+32"/> xforms11-for-html-authors
is a technology originally designed for <submission resource=
improving the handling of forms on the "http://thermostat.local/data" Please contact:
web, it has since been generalised to method="put" replace="instance"/> Steven Pemberton
more general applications; version 2.0 is Chair of the W3C XForms WG, CWI,
currently in preparation [2]. The following device-independent user The Netherlands
interface control specifies that a single E-mail: steven.pemberton@cwi.nl
XForms has two essential parts: the first value is to be selected from the list of
part is the model that specifies details of items, without specifying how that is to
the data being collected, where it comes be achieved (using radio buttons, drop-
from, its structure, and constraints. It downs or whatever):
allows data from several sources to be
combined, and data to be submitted to <select1 ref="temperature_scale"
different places. It also ensures that as label="Scale">
data is changed, that relationships <item value="f" label="°F"/>
between the data are kept up to date. The <item value="c" label="°C"/>
second part is the user interface that dis- </select1>
plays values and specifies controls for
changing the values. These controls are Experience with XForms has shown
specified in a device-independent that using it can reduce production time
manner that only describes what they are and costs by a factor of ten. As an
meant to achieve, not how to do it. This example, one very large pilot project
makes it easier to adapt the interface to reduced production time from five years
different devices, screen sizes, etc., with thirty people to a single year with
while still allowing the use of specific ten people. These remarkable savings
interfaces, such as radio buttons, via are due largely to the declarative nature
style sheets. of XForms, which greatly reduces the

ERCIM NEWS 101 April 2015 21


Special Theme: The Internet of Things & the Web of Things

Home Automation devices Belong to the IoT World


by Vittorio Miori and Dario Russo

We present a practical and scalable solution that aims to achieve the Internet of Things (IoT) paradigm in
complex contexts, such as the home automation market, in which problems are caused by the presence of
proprietary and closed systems with no compatibility with Internet protocols.

Home automation is an appealing con- A software module has been developed


text for the Internet of Things (IoT). We to enable any home automation device
envisage future home environments with to interface and interact via the IPv6 [2]
self configured embedded sensors and network protocol. All home automation
actuators (e.g., in consumer electronic devices can thereby interact actively
products and systems) that can be con- with the surrounding world, through
trolled remotely through the Internet, their own IPv6 address that identifies
enabling a variety of monitoring and them uniquely on the Internet. The
control applications. Manufacturers will system thus increases the user’s ability
produce their own IP gateways so that to take full advantage of the benefits
proprietary domotic systems can be Figure 1: Home Remote Control. offered by the new IoT vision of the
interfaced with an IPv4 enabled Ethernet Source: Home Care Reviews. world.
socket.
When a device signals its entrance into
By connecting the IP gateway directly to DomoML, for the semantic abstraction the DomoNet network (Figure 3), its
the Internet or through a home/residen- of heterogeneous systems in order to associated TechManager creates the cor-
tial gateway, the domotic system can be describe device functions, data types, responding DomoDevice. The formal
managed remotely using a PC, messages and models of the interactions representation of the DomoDevice is
Smartphone or Tablet (Figure 1). and communications among framework sent to the DomoNet server, which
entities. assigns it both a DomoNet and an IPv6
Unlike the IoT paradigm, a solution of address, thereby providing a dual identi-
this kind provides the home with a By exploiting the DomoML language, fication. In doing so, the DomoNet
unique Internet access point (and a DomoNet has a uniform view of all the server compiles a bi-directional map in
unique public IP address that can be devices and their relative functions order to enable identification of address
assigned to the IP gateway or to the available on its network. In this context, correspondences. The provision of this
home/residential gateway in relation to all the differences between domotic sys- dual representation ensures backward
the home network configuration) to con- tems are flattened out so that DomoNet compatibility with the applications and
trol all the devices. In this scenario, the can interact with each device using only services previously created for the
assigned public IP address does not this single high-level language. To phys- DomoNet ecosystem.
identify a single device or function, but ically execute operations on devices,
identifies the entire domotic network, DomoNet implements special entities To process the request, the DomoNet
and a customized software manager named TechManagers. TechManagers server forwards it to the appropriate
application able to locate devices and to are gateways that, on the one hand, TechManager, which then translates the
activate their functions inside the interface DomoNet and the DomoML request into a formalism that the device
domotic network is required. language, and, on the other, manage can process and queries the device
events on the specific domotic bus. involved. The device’s response is
One of the major problems in the home
automation area is that different systems
are neither interoperable nor intercon-
nected. To tackle this issue, our labora-
tory has created a framework called
DomoNet (Figure 2).

DomoNet [1] is an open source software


released under the GPL license, fol-
lowing W3C recommended web stan-
dard technologies such as Web Services,
SOA and XML. It constructs a unique
view of the system that includes all the
devices belonging to the different
domotic systems available, through a set
of modules that work as gateways. To
implement interoperability, DomoNet
defines a standard language, called Figure 2: DomoNet architecture.

22 ERCIM NEWS 101 April 2015


Figure 3: The Test Links:
Architecture. Domotics Lab Home Page:
http://www.isti.cnr.it/research/unit.php?
unit=HA
DomoNet Home Page:
http://sourceforge.net/projects/domonet/

References:
[1] V. Miori, D. Russo, M. Aliberti:
“Domotic technologies incompatibility
becomes user transparent”,
Communications of the ACM, vol. 53
(1) pp. 153 - 157. ACM, 2010.
[2] M. Jung et al.: “Heterogeneous
device interaction using an IPv6
enabled service-oriented architecture
for building automation systems”, in
proc. of SAC’13, ACM, 1939-1941,
2013, DOI=10.1145/2480362.2480722
delivered to the TechManager and, after A future development will be to decen- [3] G. Briscoe, P. De Wilde: “Digital
the DomoML translation process, is for- tralize the entire DomoNet architecture ecosystems: evolving service-
warded to the DomoNet server, which in order to create virtual independent orientated architectures”, in proc. of
then sends it to the requester. devices that act as agents capable of BIONETICS’06, ACM, , Article 17,
cooperating with each other according 2006. DOI=10.1145/1315843.1315864
We are working on the development of to the Digital Ecosystem architecture http://doi.acm.org/10.1145/1315843.13
a web server running inside the same paradigm [3]. This approach would fur- 15864
computer that hosts the DomoNet ther the realization of the concepts
server, in order to simulate a direct web underlying the IoT paradigm and pro- Please contact:
interaction with the device identified by mote a new model for thinking about Vittorio Miori
its IPv6 address. The Tomcat web server the environment surrounding us and the Domotics Lab, ISTI CNR, Italy
was used in the test architecture. objects contained therein. E-mail: vittorio.miori@isti.cnr.it

dioptase: data Streaming Middleware


for the Internet of Things
by Benjamin Billet and Valérie Issarny

The Dioptase middleware provides developers with new methods for writing distributed
applications for the Internet of Things (IoT). Dioptase leverages data streams as data model and
continuous in-network processing as computation model, in order to deal with the challenging
volume of data being continuously produced by the ‘Things’.

The Internet of Things (IoT) is currently devices, mobile versus fixed devices, lems emerge from these approaches,
characterized by an ever-growing continuously-powered versus battery- related to energy consumption (due to
number of networked ‘Things’, i.e., powered devices, etc.). These chal- intense wireless communications) and
devices that have their own identity lenges require new systems and tech- device lifetime, network overload and
together with advanced computation and niques for developing applications that privacy preservation. The challenge is
networking capabilities: smartphones, are able to: (i) collect and process data then to allow Things to be much more
smart watches, smart home appliances, from the numerous data sources of the autonomous and use third-party serv-
etc. These Things are being equipped IoT and (ii) interact both with the envi- ices only when required, such as in
with increasing numbers of sensors and ronment using the actuators, and with wireless sensor networks, but at a much
actuators that enable them to sense and the users using dedicated GUIs. larger scale.
act on their environment, linking the
physical and virtual worlds. Specifically, Solutions for the IoT currently rely To this end, the Dioptase [1] solution
the IoT raises many challenges related to heavily on third-party services and aims at providing a common middle-
its very large scale and high dynamicity, infrastructures, such as the cloud of ware layer that runs directly on the
as well as the great heterogeneity of the Things where each device sends its Things, enabling them to manage the
data and systems involved (e.g., pow- measurements to centralized collection huge volume of data continuously being
erful versus resource-constrained and computation points. Several prob- produced (measurements, events, logs,

ERCIM NEWS 101 April 2015 23


Special Theme: The Internet of Things & the Web of Things

etc.) in a collaborative way. In this con- expressed by the developers and the gate, adapt and split their own tasks
text, we consider data streams and con- characteristics of the available Things. according to their environment, their
tinuous processing as the reference data load, their available resources and their
and computation models for developing Dioptase features a customizable mid- capabilities in a decentralized collabo-
IoT applications. Continuous pro- dleware architecture that is versatile rative manner, taking the role of DiDS.
cessing is indeed a very suitable para- enough to be deployed on a large class As a benefit, the network of Things
digm for processing each piece of data of Things that vary significantly in would adapt itself to minor and major
one by one, without having to store the terms of resource availability (e.g., changes over time.
entire dataset.

Dioptase leverages a service-oriented


architecture (SOA) revisited for sup-
porting continuous processing. This
SOA introduces the concept of stream Security infrastructures
Offloading infrastructures (authentication servers, public-key
services that produce and consume infi- (clusters, cloud, etc.) infrastructures, privacy proxys, etc.)
nite data streams, in contrast to regular Discovery infrastructures
(registries)
services that manage finite datasets. interact with
interact with
Stream services are classified into four Knowledge providers
u se
(ontology servers, interact with interact with
families, depending on their roles: knowledge bases, etc.)
express
• producers, which generate new data deploy tasks
deploy sub-
tasks
tasks
streams (e.g., from sensors); directly

• processors, which produce new data Runs directly onto Things and abstracts them
Developers
Developers Deployment and
streams by continuously processing or as generic pool of sensing, actuation, orchestration servers
or
Users
computing and storage resources
existing ones; Users

• storages, which store persistently or produce and consume


temporarily the data extracted from data streams

data streams and can serve them as


new data streams when required; Gateway/proxy
• consumers, which acquire data to the Internet
streams for driving actuators or
updating GUIs. Things directly connected Wireless sensor and
actuator networks
to the Internet

Once Dioptase is deployed onto a Figure 1: Dioptase, a data streaming middleware for the IoT.
Thing, it enables developers to manage
the Thing as an abstracted and homoge-
neous pool of resources that can execute embedded systems, smartphones or
stream services provided over time. plug computers), provided that these
These stream services can be developed Things are able to communicate directly
by using the native languages of the through the Internet infrastructure. As
device or a new lightweight stream pro- illustrated in Figure 1, Dioptase embeds
cessing language, called DiSPL, various modules for interacting with
directly interpretable by Dioptase. existing components being used as part Link:
of the IoT infrastructure: discovery sys- https://mimove.inria.fr/dioptase
By composing these stream services, tems and registries, computation and
developers build their IoT applications offloading infrastructure, legacy sensor References:
as a set of tasks that are executed con- and actuator networks, etc. [1] B. Billet, V. Issarny: “Dioptase: A
tinuously by the hosting Things in a distributed data streaming middleware
purely distributed manner. Developers This work was part of the larger for the future Web of Things”, Journal
are provided with dedicated tools for CHOReOS project effort, which revisits of Internet Services and Applications,
designing tasks graphically before the concept of choreography-centric vol. 5, no. 13, 2014.
injecting them into the network of service-oriented systems to introduce a [2] B. Billet, V. Issarny: “From task
Things at any time, using deployment dynamic development process and graphs to concrete actions: A new task
Web services or through the Dioptase associated methods, tools, and middle- mapping algorithm for the future
deployment server (DiDS). DiDS auto- ware for the services in the Ultra Large Internet of Things”, in proc. of the
matically computes where to deploy the Scale (ULS) Future Internet. Beyond 11th IEEE International Conference on
stream services and then manages their CHOReOS, Dioptase represents a sig- Mobile Ad hoc and Sensor Systems
execution over time. DiDS relies on a nificant step towards an IoT where (MASS), 2014.
state-of-the-art task allocation algo- every Thing can be assigned tasks and
rithm [2], which guarantees the lifetime complete them autonomously. As an Please contact:
of each task, by minimizing the overall ongoing area of research, Dioptase will Benjamin Billet, Valérie Issarny
energy consumption or maximizing the be released soon as an open source Inria, France
fair allocation of tasks among the project. For the near future, we plan to E-mail: Benjamin.Billet@inria.fr,
Things, according to the constraints enable Things to automatically dele- valerie.issarny@inria.fr

24 ERCIM NEWS 101 April 2015


Programming Actors for the Internet of Things
by Raphael Hiesgen, Dominik Charousset, Thomas C. Schmidt and Matthias Wählisch

The Internet of Things (IoT) enables a large number of devices to cooperate to achieve a common
task. Each individual device is small and executes a confined software core. Collective intelligence is
gained from distributed collaboration and Internet communication. Corresponding IoT solutions form
large distributed software systems that pose professional requirements: scalability, reliability,
security, portability and maintainability. The C++ Actor Framework CAF [1] contributes such a
professional open source software layer for the IoT. Based on the actor model of Hewitt et al. [2], it
aids programmers at a good level of abstraction without sacrificing performance.

The Internet of Things (IoT) is com- from the community. CAF enables aim at avoiding intermediate state in the
posed of many nodes, often with limited asynchronous communication between network. Letting a runtime environment
capabilities. Small software components nodes by a reliable message passing handle low-level functionality gives
that communicate via Internet protocol facility. Following the 'shared nothing' developers more time to focus on the
standards typically form a highly distrib- paradigm of actors, it provides synchro- application logic.
uted work flow among machines with nization primitives as well as error han-
minimal human interaction. Traditional dling capabilities at very low overhead.
application scenarios include sensor net- CAF runs on RIOT [3], the friendly Our C++ Actor Framework has elabo-
works that monitor data such as environ- operating system for the IoT. rated this model to allow for develop-
mental or cyber-physical conditions. In ment of native software at a high
addition to sensors, IoT networks As early as 1973, Hewitt et al. [2] pro- abstraction layer without sacrificing
include actuators that influence the envi- posed the (abstract) actor model to performance. We provide exchangeable
ronment. Complex applications are built address the problems of concurrency implementations of the runtime envi-
from these nodes, for example: home and distribution. This model defines ronment to make optimized use of
automation, and tracking of health data.
These systems enable machines to
upload data to Internet servers, a task
that originally required human interac-
tion. Thus, they allow the tracking of
data everywhere and anytime.

The main challenge for developers is to


ensure an appropriate service quality
even in unstable IoT environments.
While working on a network of con-
strained machines, they need to supply
synchronization primitives as well as
mechanisms for error detection and
propagation. To address these chal-
lenges, many developers fall back to
low-level coding that requires special-
ized knowledge and is hard to maintain.
As a result, code is barely portable, and Figure 1: The CAF distributed software layer adds transactional message passing to IoT nodes.
often hand-crafted, which introduces
high complexity, many sources of errors
and little generality. entities called actors, which are concur- system resources. This allows CAF to
rent, isolated and solely interact via net- scale up to large performance-critical
A distributed software layer as part of an work-transparent message passing applications and down to small
operating system (OS) for embedded based on unique identifiers. As a result, embedded devices. Its flexibility
devices can resolve these challenges. actors cannot corrupt the state of other enables developers to test and verify
While the OS eases portability and pro- actors. Furthermore, an actor can create their code on desktop machines before
vides a standardized API for low-level new actors by an operation called re-compiling and deploying the soft-
functionality, the software layer uses spawn. This is often used to distribute ware on low-end devices. Hence, CAF
these interfaces to provide a high workload, e.g., in a divide and conquer provides a seamless development cycle,
abstraction for the application devel- approach where actors divide problems aiding developers to ship only well-
oper. For this purpose, we contribute the and spawn new actors to handle the sub- tested components to the IoT. CAF can
C++ Actor Framework (CAF) [1]. It is problems concurrently. Furthermore, fill the gap between the high level of
developed as an open source project at the actor model specifies error handling abstraction offered by the actor model
the Hamburg University of Applied capabilities for distributed systems that and an efficient, native runtime environ-
Sciences and is open for contributions allow for monitoring of subsystems and ment.

ERCIM NEWS 101 April 2015 25


Special Theme: The Internet of Things & the Web of Things

IoT environments introduce specific cannot be delivered after multiple Links:


constraints such as lossy networks, low- retries. http://www.actor-framework.org
powered nodes, and communication http://riot-os.org
capabilities limited to small packet sizes A major focus in our adaption is a new
and intermittent connectivity. The orig- network stack. The default implementa- References:
inal actor model was built on a strong tion of CAF focuses on locally distrib- [1] D. Charousset, R. Hiesgen, T.C.
coupling between components and uted hardware with many cores. As Schmidt: “CAF - The C++ Actor
cannot directly be transferred to the IoT. such, the network stack is built on Framework for Scalable and Resource-
For example, the distributed error han- TCP/IP in a straight-forward manner. In efficient Applications”, in proc. of the
dling capabilities were not designed contrast, for the IoT, our transactional 5th ACM SIGPLAN SPLASH '14,
with constraints in mind and require network stack targets IEEE 802.15.4 or Workshop AGERE!, ACM, 2014.
adjustment. Furthermore, security Bluetooth LE. The IP layer deploys [2] C. Hewitt, P. Bishop, R. Steiger: “A
mechanisms are not included and left to 6LoWPAN to sustain IPv6 compati- Universal Modular ACTOR Formalism
the runtime environment. However, IoT bility, while UDP is used at the transport for Artificial Intelligence”, in proc. of
devices often carry private or critical layer. With regard to security we rely on the 3rd IJCAI, San Francisco, CA,
data, require reliably and should remain DTLS for encryption. Further, we are USA, 1973, Morgan Kaufmann
resilient against node tampering. working on an authentication concept Publishers Inc., pp. 235-245.
Hence, it is critical to provide encrypted for IoT environments based on ID- [3] E. Baccelli, et al.: “RIOT OS:
communication as well as an authenti- based cryptography. Corresponding Towards an OS for the Internet of
cation and authorization scheme for message exchanges will use the request- Things”, in proc. of the 32nd IEEE
nodes. response model of CoAP. INFOCOM, Poster (Piscataway, NJ,
USA, 2013), IEEE Press.
We adapted CAF to the IoT environ- As the number of devices connected to
ment by a new, loosely coupled commu- the IoT is expected to rise significantly Please contact:
nication layer as depicted in Figure 1. in the coming years, we anticipate a Dominik Charousset, Raphael Hiesgen,
Part of its design is a transactional mes- severe demand for professionalizing Thomas C. Schmidt
sage-passing based on the request- application development in this domain. Hamburg University of Applied
response model offered by CoAP. This Consequently, a programming environ- Sciences, Hamburg, Germany
protocol offers the option of reliable ment that offers a high level of abstrac- E-mail:
message exchange as well as duplicate tion on native code is needed to build {dominik.charousset,raphael.hiesgen,t.
message detection. Each message robust and scalable applications of schmidt}@haw-hamburg.de
exchange is independent and less vul- appropriate robustness and perform-
nerable to connection failures than a ance. We believe that CAF presents a Matthias Wählisch
coherent data stream. Our runtime envi- promising advancement towards Freie Universität Berlin, Germany
ronment can provide error propagation 'Programming the IoT' - conjointly with E-mail: waehlisch@ieee.org
and mitigation in cases where messages the embedded operating system RIOT.

A Mobile End-User development Environment


for IoT Applications Exploiting the Puzzle Metaphor
by Josè Danado and Fabio Paternò

‘Puzzle’, a mobile end user development framework, allows the end user to opportunistically create, modify
and execute applications for interacting with smart things, phone functions and web services. The
framework simplifies development of such applications through an intuitive jigsaw metaphor that allows
easy composition on touch-based devices. Users immediately identified the utility of this feature, and found
it easy to envisage using the framework in various scenarios in their daily lives.

The main purpose of this work is to the object; and more generally, to proto- seamlessly support IoT users to develop
allow users to do more with their existing type new Internet of Things (IoT) appli- applications that meet individual needs,
devices and things within their homes or cations through a user-centred design and how to create a flexible platform
at work. This can be achieved by cre- approach in which users create and which supports customisation and inter-
ating applications customized for indi- develop personalized applications. operability of IoT applications. The
vidual needs on personal mobile devices. mobile authoring environment has been
The Puzzle framework allows users to In order to allow end users to create designed taking into account how users
visualize the current status of intelligent their own IoT applications and support can foresee the functions to compose
objects, such as home appliances; how to their extensibility, the main challenges and understand how the flow of their
operate them– for instance, through a addressed in Puzzle [1] are twofold : applications progresses, adopting a
voice command; apply the commands to how to create a User Interface (UI) that metaphor that is close to users’ real life

26 ERCIM NEWS 101 April 2015


types match and manage the use of
unpredicted values during application
execution n. This is important as the IoT
is a heterogeneous environment; thus
failure of one device needs to be miti-
gated by the environment.

Due to the heterogeneity of the environ-


ment, standard web-based technologies
– e.g., HTML, CSS, Javascript and
JSON – are used to support execution of
Puzzle applications, wireless networks
Figure 1: Authoring and Execution of Puzzle Applications. are used to support communication
between IoT devices – e.g., Bluetooth
or IEEE 802.15.4, and open hardware is
experiences, thus reducing their Supported interaction techniques were used to foster contributions by a com-
learning effort and increasing accept- developed in collaboration with end munity of users – e.g., Arduino. Open
ance. On the other end, the platform users, and their feedback was consid- hardware can be used to interface
needs to seamlessly control execution ered both to design and develop the UI between proprietary devices and
and communication through a plethora and scenarios of use. The approach Puzzle, allow Puzzle to control IoT
of objects and devices – e.g., light, enabled us to avoid putting technology devices and be an incentive for a com-
heating, alarm systems, TVs, mobile before the needs of the end user; conse- munity of users –i.e., tinkering with cur-
devices. Consequently, it is important to quently, allowing end-users to voice rent hardware - to increase hardware
be able to support interaction and com- their requirements during the design supported, and even create new solu-
munication between IoT devices and/or and development of Puzzle, resulting in tions able to exploit Puzzle connection
with the environment to exchange data a user-friendly application able to to existing hardware.
and information ‘sensed’ about the interact with the physical environment.
environment, while reacting Links:
autonomously to events in the At the framework level, end-users tin- HIIS Lab: http://giove.isti.cnr.it
‘real/physical world’, and influencing it kering with IoT devices can stimulate Framework information at:
by running processes that trigger creating and adding jigsaws as new http://giove.isti.cnr.it/tools/Puzzle/home
actions and create services [2]. building blocks to Puzzle, e.g. adding Documentation:
support to communicate with the lights http://hiis.isti.cnr.it:8080/AuthoringTool/
In the HIIS lab at CNR-ISTI, with sup- in the house. New building blocks are v2/docs/
port from an ERCIM post-doc fellow- created in Javascript; including their Video:
ship, we have created Puzzle – a mobile logic – i.e., inputs, outputs and func- https://www.youtube.com/watch?feature
end user development tool and a web- tions, according to the Puzzle building =player_embedded&v=Asbqv7-QqqM
based platform to create applications block description. Once the building
including web services, phone functions block is developed, it is added to a data- References:
and smart things. The mobile end-user base storing its description to be com- [1] J. Danado, F. Paternò: “Puzzle: A
development tool and related user inter- bined and used in the authoring tool by mobile application development
face (UI) considered current research in end-users; thus enabling its execution environment using a jigsaw metaphor”,
end-user development tools, limitations management in Puzzle applications. in J. Vis. Lang. Comput. 25, Elsevier,
of mobile devices and focus on a user- During execution, building blocks 2014, 297-315.
centred design approach for IoT [3]. follow top-down and left-to-right exe- [2] S. Holloway, C. Julien: “The case
Puzzle is based on the metaphor con- cution flow, where data outputted from for end-user programming of
veyed by jigsaw pieces to stimulate end the building block corresponding to a ubiquitous computing environments”,
users to combine existing functions in previous jigsaw is the input of a in proc. of FoSER '10, ACM, New
ways that make sense to them. The deci- building block associated with the fol- York, NY, USA, 2010, 167-172
sion to adopt that metaphor was based lowing jigsaw. [3] I.P. Cvijikj, F. Michahelles: “The
on its usage on other EUD environ- Toolkit Approach for End-User
ments, e.g., Scratch. In contrast to other Use of IoT devices is triggered, during Participation in the Internet of Things”,
visual languages, Puzzle adopts a higher execution, inside a building block and in: D. Uckelmann et. al. (Eds.)
level approach not just mimicking a tra- through the use of web-services. Use of Architecting the Internet of Things,
ditional language through a graphical web-services provides a standard access Springer, 2011, 65-93.
metaphor, but providing jigsaw pieces to functionalities, hides platform
ready to be combined on the go, thus dependent implementation and, conse- Please contact:
decreasing the learning curve and moti- quently, provides the required interop- Josè Danado, Fabio Paternò
vating users to explore and use it. erability in an IoT environment. CNR-ISTI, Italy.
Furthermore, jigsaw pieces were Interoperability is also enforced E-mail: danado@isti.cnr.it,
designed to facilitate users to combine through the Puzzle building block fabio.paterno@isti.cnr.it
them, and to solve errors and conflicts descriptions, which are used to check
made during their combination. whether input and output jigsaw data

ERCIM NEWS 101 April 2015 27


Special Theme: The Internet of Things & the Web of Things

3d Web Visualization for Real-Time Maintenance


of Smart Buildings
by Daniel Gaston, Christophe Joubert and Miguel Montesinos

Modern buildings are equipped with a variety of building automation technologies and sensors which are
controlled, monitored and managed through heterogeneous information systems. To date, these systems
show limited interoperability and tend to operate in isolation. The future will require a more
comprehensive and efficient operation of buildings facilitated by way of integrated and smart cooperative
management and automation systems. Web-based open-source technologies can create 3D virtual
representations of the real-time geolocated activities within a building. Such a system can simplify both
the maintenance and operation by facility managers and application services to building occupants.

The European project Building as a effective and flexible manner. Figure 1 time sensing BaaS platform. Such fea-
Service – BaaS (ITEA2 – 12011, describes the integration of value-added tures facilitate complex user-created
November 2013-October 2016) aims to visualization services on top of the ref- domain oriented applications that can
create a reference architecture and erence BaaS architecture. be used both indoors and outdoors with
service framework for future building a georeferenced environment and effi-
automation (BA) systems with extensive One of the biggest challenges for cient XML interchange [1].
integration capabilities. Based on open building automation is the collaboration
IT standards and open-source technolo- of new components and systems with This feature has been specified as a
gies, the BaaS framework enables easy existing devices and infrastructures. We functional requirement for the operation
creation of new cross-domain BA serv- contributed to this technical challenge phase of the BaaS architecture. This
ices and the largely automated integra- by creating 3D building smart objects requirement states that the architecture
tion of existing BA components in a cost with web capabilities out of the real- shall support the development of serv-
ices that use building data models
(building geometry, location and data of
rooms, floors, sensors).

Based on this requirement, a set of vir-


tual data points were defined in order
to provide data to value-added serv-
ices. Table 1 presents an overview of
the different virtual data points that
were implemented in the BaaS frame-
work to give support for visualization
web services.

Data points were defined based on a


semantic meta-information that was
specified for all phases of the BA
service life-cycle in order to improve
extensibility and reduce engineering
Figure 1: BaaS framework instantiated with value-added 3D visualization services. effort of the BaaS platform. More
specifically, the defined virtual data
points used a location ontology
describing the relation between
building elements such Building, Floor,
and Room. This ontology made use of
the extended SSN ontology (for sensors
and actuators) and OWL-S (for serv-
ices) proposed in [2].

On top of the virtual data points, we


provided a service layer implemented as
REST services in order to enable real-
time visualization of the building ele-
ments and sensor information through a
web browser. The 3D visualization is
served by an open-source WebGL
Figure 2: 3D graphical and data relation view of Patraix Building’s 4th floor. Globe (Cesium) that enables the

28 ERCIM NEWS 101 April 2015


Table 1: Virtual BaaS data Building location data point that provides location data of a building within
points for value-added a group of buildings. It provides a unique identifier, a building name, an
visualization web services.
es.buildingLocation
icon URL, a tooltip text, a location (lat, lon, alt) in double precision, and a
number of building floors.

Floor model data point that provides a model data of a floor within a group
es.floorModel of floors. It provides a unique identifier, a floor name, a building identifica-
tion number, a floor level, and a geometry file identification number.

Floor geometry data point that provides the geometry and additional values
es.floorGeometry of a floor. It provides a unique identifier, a floor geometry file name, a floor
geometry file size, geometry data, and the creation timestamp.

description of dynamic scenarios in vir- nance application), and interact with the
tual globes and maps. Basic architec- facility manager if the room configura- Link:
tural elements, as well as location and tion fit or not their activities and prefer- http://www.baas-itea2.eu
typology of sensors are represented in a ences (feedback application). As a
geographical context. A specific JSON result, this work enabled to increase the References:
schema was described in the Cesium usability of the smart building (increase [1] M. Jung, J. Weidinger, W. Kastner,
Language (CZML) to describe property room availability by 50%) and enhance A. Olivieri: “Building Automation and
values changing over time, such as the user experience for IoT services Smart Cities: An Integration Approach
status and information of sensors that (with a move from manual management Based on a Service-Oriented
can be provided as a stream to web to a digital system by Internet on Architecture, pp. 1361-1367, IEEE
clients to view dynamic values of building actuators). Figure 2 illustrates Computer Society (2013).
building elements. Other values trans- the 3D graphical and data visualization [2] J. Fons, D. Gaston, C. Joubert, M.
mitted from the BaaS platform to the interface part of the facility manager’s Montesinos: “Internet of Things
visualization component are the vertex maintenance application on the Patraix Applications for Neighbourhood
positions in cartographic degrees of all public building. Embedded Devices”, ERCIM News
floor rooms as well as the navigational 2014(98) (2014).
model between building, floor and We plan to deploy and test the results of [3] C. Joubert, M. Montesinos, J. Sanz:
rooms based on the location ontology. this project in the maritime sector [3] “A Comprehensive Port Operations
Among the functionalities provided to for global situational awareness in Management System”, ERCIM News
the facility manager is the dynamic link rescue, calamity and inspection opera- 2014(97) (2014)
between the status and information of tions in port infrastructures, and in the
the 3D scene with the information Smart Cities platform to scale the visu- Please contact:
panel. Hence, navigation can be done alization capabilities to more public Christophe Joubert
either through the panel’s elements, buildings. Prodevelop, Spain
such as the list of sensors, or through E-mail: cjoubert@prodevelop.es
the 3D scene billboards anywhere on In our research, we collaborated with
the building. several SMEs, Universities and
Research Centres, including: Siemens
The results to date are very promising: AG; Materna; Kieback&Peter; TWT;
we integrated the previous visualization Fraunhofer; TUM; TU Dortmund;
services with many partners in order to Universität Rostock (Germany); Everis;
compose various demonstration sce- UPV (Spain); KoçSistem; BOR; Defne;
narios on top of the Building as a Smartsoft (Turkey); X.com; Masaryk
Service platform, namely Smart University; and MDS (Czech Republic).
Booking Room, Maintenance applica-
tion, and Feedback application. Trials This research is also part of a horizontal
were carried out with end-users in a real task force with other ICT Future
environment, the Social Building of the Internet projects - such as FIWARE, in
Valencia City Council at Patraix. The particular FI-CONTENT 2 - that deals
facility manager, the room booking with building new innovative applica-
manager, teachers and citizens booking tions and services for every-day
and using the rooms for their own needs working and living environments, by
(foreign language classes, expositions, making ‘physical world information’
movies, presentations, yoga, etc.) were easily available for smart services. Our
given the chance to use the 3D web user work is partially supported by the
interface to visualize directly the con- Spanish MEC INNCORPORA-PTQ
figuration and sensing information of a 2011, MiTYC TSI-020400-2011-29,
room (smart booking room and mainte- and FEDER programs.

ERCIM NEWS 101 April 2015 29


Special Theme: The Internet of Things & the Web of Things

COMPOSE: An Open Source Cloud-Based Scalable


IoT Services Platform
by Dave Raggett

Advances in electronics and communication technologies are stimulating the growth of low cost connected
sensors and actuators. There are many potential application areas, for instance: home automation, security,
healthcare, smart grids, integrated transport systems, and next generation manufacturing. To date,
research in the area of the Internet of Things (IoT) has largely focused on the sensors, actuators and the
communication technologies needed for long battery life and efficient use of spectrum etc. rather than on
what’s needed to encourage applications and services. Current IoT products exist in isolated silos. To fully
realise the benefits, we will need scalable solutions for managing the vast of amounts of data, and open
standards that enable open markets of connected services.

The COMPOSE project is developing a obtained from the sensors, or passed to programming language and executed
open source cloud-based platform for the actuators associated with a given using the Chrome V8 engine.
IoT services. The run-time is highly scal- service object.
able and implemented on top of COMPOSE services are cloud-based.
CloudFoundry and Couchbase. This is Services can define composite streams Each service object is associated with a
complemented by the developer portal in terms of dynamic queries over other ‘web object’ at the network edge. The web
which supports discovery, registration, streams, for example, all temperature object provides an abstraction of the phys-
composition and deployment of services. sensors within 1.5 Km of a given loca- ical sensor or actuator, hiding the details
tion. Services can also define new of how these devices are connected. Web
COMPOSE models services in terms of streams as a transformation from objects communicate with the COM-
message streams, where each message another message stream, for example, to POSE platform using structured data rep-
corresponds to either a sensor reading or transform the physical units for the data resented with the JavaScript object nota-
an actuator update, and is structured as samples, or to smooth data samples. tion (JSON). There is a choice between
one or more data channels. Sensors and These mappings can be defined as using HTTP or WebSockets. The latter is
actuators are virtualised in the COM- simple expressions or more generally appropriate when the web object is behind
POSE platform as ‘service objects’. with scripts written in the JavaScript a firewall that prevents the COMPOSE
These define the message streams platform from opening HTTP connec-

30 ERCIM NEWS 101 April 2015


tions with the web object. Here is an with the access control polices for the tion of shopping trolleys as customers
example illustrating how to push data to a originating data owners. To make this move about the store, and which can
service object: static analysis practical, constraints are later be combined with information on
placed on the use of JavaScript language purchases. This data can be used to
PUT http://testbed.compose- features. The analysis yields ’contracts’ assist product positioning on super-
project.eu/thngs/<ServiceObjectID>/stream that are designed for use by the COM- market shelves. The smart city pilot
s/<Strea... POSE run-time system. focuses on tracking free parking spaces
{ at the Rovira i Virgili University in
"lastUpdate": 194896802, COMPOSE applications are able to Catalonia. The smart territory pilot
"channels": [ access message streams via a RESTful focuses on supporting skiers in the
{ interface over HTTP or WebSockets. Trentino region of Italy. It combines
"unit": "degrees", This gives developers a choice of sensor data with crowd sourced infor-
"type": "numeric", implementation technologies, e.g. mation covering the length of lift
"name": "longitude", HTML5 for the Open Web Platform, or queues, the quality of ski centre facili-
"current-value": 24.428239 as native applications on iOS or ties, and points of interest. Users can see
}, Android. OAuth2 provides the basis for their friends’ locations and exchange
{ application users to grant access to their notifications with friends, which facili-
"unit": "degrees", data on the COMPOSE platform. tates social interaction.
"type": "numeric",
"name": "latitude", The COMPOSE developer portal sup- Links:
"current-value": 1.3428239 ports a graphical authoring tool based http://www.compose-project.eu/
} upon an extended version of Node-RED http://www.cloudfoundry.com/
], The portal enables developers to search http://www.couchbase.com
"customFields": {} for services and streams matching the Chrome V8:
} query provided by the developer. https://developers.google.com/v8/intro
Developers can also solicit recommen- JSON: http://json.org/
Careful attention has been paid to secu- dations based upon rankings provided WebSockets protocol:
rity. COMPOSE uses encrypted sessions by other developers. https://tools.ietf.org/html/rfc6455
for protecting data exchanges. Data OAuth2: http://oauth.net/2/
owners can set access control polices that The COMPOSE project is conducting a Node-RED: http://nodered.org/
limit who can access their data. Static number of pilots to evaluate the utility
analysis of service stream mappings is of the framework in real world settings. Please contact:
used to determine the provenance of The smart retail pilot features sensors Dave Raggett, W3C
derived data streams in order to comply within a supermarket that track the loca- E-mail: dsr@w3.org

An Integration Gateway for Sensing Devices


in Smart Environments
by Michele Girolami, Francesco Furfari and Stefano Chessa

Smart Environments, and in particular Smart Homes, have recently attracted the attention of many
researchers and industrial vendors. The proliferation of low-power sensing devices requires
integration gateways hiding the complexity of heterogeneous technologies. We propose a ZigBee
integration gateway to access and integrate low-power ZigBee devices.

Smart Environments, and in particular ZigBee offers a service-oriented Platform. ZB4O faces the problem of
Smart Homes, have recently gained the approach for low-power devices, with providing an easy access to low-power
attention of many researchers and hard- the unique feature of defining a variety sensing devices based on the ZigBee
ware vendors. An increasing number of of profiles that standardize the function- stack. It relies on the OSGi execution
sensing devices, whose price is rapidly alities of several classes of device (e.g., environment and it meets three basic
decreasing, are available on the market. home automation, health care, smart requirements: (i) it provides a rich and
Although such devices are becoming energy). OSGi offers a component- flexible gateway for the ZigBee net-
familiar in Smart Homes, user accept- based execution platform facilitating work, (ii) it extends the OSGi frame-
ance is limited by the fragmentation of the deployment and management of work with an open mechanism to inte-
the market. Heterogeneous technologies software units. grate ZigBee standard with a service-
do not integrate seamlessly into a Smart oriented approach and (iii) it defines an
Home; rather, each vendor offers its pri- The Wireless Network Laboratory at integration layer in order to access the
vate vertical solution. ZigBee and OSGi ISTI-CNR funds the ZB4O project [1], ZigBee network by using other tech-
play a predominant role in this scenario. ZigBee API for OSGi Service nologies.

ERCIM NEWS 101 April 2015 31


Special Theme: The Internet of Things & the Web of Things

node. In this way ZB4O fully supports


the profile approach followed by the
ZigBee Alliance. The Integration layer
exports the ZigBee functionalities to
one or more target networks. Notable
examples of exporters are the UPnP net-
work, the REST paradigm or a suc-
cessful experience of robotic ecologies
such as the GiraffPlus robot [2].

WNLab has developed an integration


layer for two core enabling and widely
accepted technologies: UPnP and REST
as well as the integration with two EU
projects: the universAAL project and
the GiraffPlus project. In Figure 2 we
show the integration layer for the UPnP
network. The Access Layer recognizes
an OnOff Binary Light device installed
Figure 1: The ZB4O architecture. at home. The Abstraction layer refines
the device by adding the functionalities
defined by the Home Automation
adapter (for example, ZigBee USB Profile. Finally the UPnP Integration
ZB4O is designed by considering a typ- dongle). The Access layer interacts with Layer maps the OnOff Light as a UPnP
ical use-case of Smart Homes. A new the network in order to detect new Binary Light. In this way, an UPnP
ZigBee device is installed at home, for nodes, removal of nodes, and to detect client can discover and interact with the
instance a standard smart plug for moni- relevant events concerning changes in ZigBee Light from the UPnP network.
toring energy consumption. A user can the network topology. The Access layer
discover the ZigBee device as soon as it is designed to be vendor independent. In ZB4O has attracted the attention of sev-
is plugged in, without the installation of fact, it does not constrain the end-user eral ICT companies as well as several
any specific custom driver; rather, all to adopt a specific ZigBee network research centres. ZB4O is an active
ZigBee equipment is recognized and adapter to interact with the network; open-source project with a growing
integrated autonomously. rather the Access Layer implements a community of users and developers.
general-purpose solution. The
ZB4O is based on three layers, namely: Abstraction layer is designed with the Link:
the Access, Abstraction and Integration goal of adding more functionalities to http://zb4osgi.aaloa.org
layers as shown in Figure 1. The Access the nodes detected. In particular, this
layer directly communicates with the layer refines the nodes discovered by References:
ZigBee network by means of a network the Access Layer with a profile-based [1] F. Furfari F et al.: “A Service-
Oriented ZigBee Gateway for Smart
Environments”, to appear in Journal of
Ambient Intelligence and Smart
Environments, JAISE Vol.6: 691-705,
2014.
[2] M. Girolami et al.: “The
Integration of ZigBee with the
GiraffPlus Robotic Framework”,
Evolving Ambient Intelligence
Vol.413:86-101, 2013.

Please contact:
Francesco Furfari and Michele
Girolami
ISTI-CNR, Italy
E-mail: {francesco.furfari,
michele.girolami}@isti.cnr.it

Figure 2: The UPnP Exporter.

32 ERCIM NEWS 101 April 2015


Fighting Networking Heterogeneity
in the Internet of Things
by Elias Z. Tragos, Vangelis Angelakis and Stefanos Papadakis

The Internet of Things (IoT) aims to interconnect large numbers of heterogeneous devices to provide
advanced applications that can improve our quality of life. The efficient interconnectivity of IoT
devices can be achieved with a hybrid Cloud Radio Access Network (Cloud-RAN) and Software
Defined Radio (SDR) framework that can overcome the heterogeneity of devices by seamlessly
adapting to their communication technology.

The Internet of Things (IoT) presents ronments where the ISM bands are ized server units that manage a pool of
itself as a promising set of technologies already overcrowded the interference base station resources, (ii) the distrib-
that enable the efficient and seamless from external sources (other wireless uted radio units (RUs) or SDR-based
interconnectivity of large numbers of networks) can severely impact network RUs (SRUs) that are located at remote
devices, allowing them to be discovered performance, since WSANs are very sites and create wireless cells providing
and accessed by the services in an susceptible to other wireless transmis- access to heterogeneous users and (iii) a
abstracted way. The IoT is considered to sions. But how can we allow the devices high bandwidth low-latency link
be one of the key technologies for 5G
communications and a basic technolog-
ical enabler towards the realization of
‘Smart Cities’. Smart Cities is a rela-
tively new term for a new generation of
cities that use new technology to drive
competitiveness, sustainability, eco-
nomic growth, energy efficiency and
improving Quality of Life (QoL).

The successful deployment of Smart


Cities calls for a unified ICT infrastruc-
ture to support the diverse set of applica-
tions for urban development. Up until
now, most of these devices used stan-
dard Wireless Sensor and Actuator
Networking (WSAN) technology based
on IEEE 802.15.4. Recently, however,
the particular demands of IoT applica-
tions have prompted the adoption of
more advanced communication tech-
nologies, e.g., IEEE 802.11 or 4G/LTE
which are capable of providing a higher
quality of service. A networking archi-
tecture capable of allowing the efficient Figure 1: Example of SDR-based heterogeneous C-RAN architecture.
and secure interworking of a large
number of heterogeneous devices,
avoiding the interference between them to really ‘talk to each other’ (the basic between the centralized unit and the
is a quite challenging research topic. motto of the IoT) without increased sig- remote sites. The advantage of this
One has to consider the differences nalling in the network and long delays? architecture compared with the standard
between the various communication How can we be sure that when an alarm C-RAN architectures that are proposed
technologies and protocols, in terms of is raised by an IoT device, this informa- for LTE is the use of SDR-based radio
carrier frequency, bandwidth, modula- tion will be prioritized and sent immedi- units at remote sites that are able to
tion and coding schemes, packet struc- ately to the respective target device handle simultaneous connections of
tures, packet sizes, etc. For example, a without being lost due to collisions or various communication technologies. In
smart phone with a 3G network access interference? this respect, only one SRU at each site
can only exchange information with a has to be installed, avoiding the costs of
ZigBee sensor via a third device that A reliable architecture interconnecting installing multiple units for each com-
translates all necessary protocols and heterogeneous IoT networks can be munication technology. In such an
sends back the sensed data. realized by integrating the benefits of architecture, the network management
Cloud-RAN [1] and Cognitive Radio decisions (i.e., spectrum assignment,
Furthermore, when large numbers of [2] approaches. The Cloud-RAN archi- routing, scheduling, etc.) can be taken
IoT devices are deployed in urban envi- tecture consists of (i) a cloud of central- both locally at each SRU when they

ERCIM NEWS 101 April 2015 33


Special Theme: The Internet of Things & the Web of Things

relate with the users on each cell or cen- change frequencies when there is ture could greatly help mitigate the het-
trally by the centralized server units increased interference. The architecture erogeneity of the involved devices and
when interaction with the neighbour can also easily adapt to non-uniform their efficient coexistence. Since the
cells are required or for optimizing local traffic via the load balancing capability architecture is partly centralized, it can
decisions. An example of this architec- of the distributed pool of base stations. easily be integrated with existing IoT
ture is shown in Figure 1, where the dif- This pool can also share signalling, middleware platforms, playing the role
ferent colours of the SRU cells denote traffic and channel occupancy informa- of ‘communication manager’ - a func-
different communication technologies tion of the active users in order to opti- tional entity proposed in many IoT
and frequencies. mize the radio resource management architectures [3].
decisions. Spectral efficiency is
The software re-programmability of improved via the cognitive radio mech- This work has received funding from
SRUs enables any updates regarding the anisms for intelligent management of the European Union’s Seventh
communication protocols, installation spectrum resources that can be applied Framework Programme (FP7/2007-
of additional technologies, implementa- on the SRUs together with joint pro- 2013) under grant agreements no
tion of new networking standards, etc. cessing and scheduling. 609094 and 612361.
to be done easily, saving significant
costs associated with adding new hard- This architecture can have many advan- References:
ware at each remote site. The ability of tages for IoT, owing to its ability to opti- [1] “C-RAN The Road Towards Green
SDR to simultaneously handle different mize spectrum access for the multiple RAN”, China Mobile Research
communication technologies can facili- heterogeneous devices, prioritizing Institute White Paper Version 2.5, Oct
tate the virtualization of the remote access to network resources according 2011.
units in a way that each unit will be seen to the service request in both a central- [2] E.Z. Tragos, V. Angelakis:
as different Virtual Base Stations ized and a distributed manner. For “Cognitive radio inspired M2M
(VBS), each handling different commu- example, if two devices are in the same communications”, 16th International
nication technologies, e.g., VBS1 will area, even if they use different commu- Symposium on Wireless Personal
handle IEEE 802.11, VBS2 will handle nication technologies, they will Multimedia Communications
3G, while VBS3 will handle IEEE exchange their data directly through the (WPMC), pp.1,5, 2013.
802.15.4 – based IoT devices. local remote unit reducing unnecessary [3] A. Bassi, et. al: “Enabling Things
signalling. Another advantage is the to Talk”, Springer, ISBN: 978-3-642-
The centralized server unit is able to cost-efficient deployment of such an 40402-3 (Print) 978-3-642-40403-0
perform an optimized management of architecture, which only requires cen- (Online).
the available network resources since it tralized management and operation,
has a global view of the available while the installation of new remote Please contact:
resources at each SRU, and can recon- units can be done with a simple SDR Elias Z. Tragos
figure them easily at run-time to per- device and the required software. On FORTH-ICS, Greece
form, for instance, traffic offloading the road to 5G, where IoT is a basic E-mail: etragos@ics.forth.gr
when one unit is overloaded or to technological pillar, such an architec-

Tectons: Towards a Generalised Approach


to Programming Systems of Systems
by Geoff Coulson, Andreas Mauthe and Markus Tauber

The world’s computing infrastructure is becoming increasingly differentiated into autonomous sub-
systems (e.g., IoT installations, clouds, VANETs), and these are often composed to generate value-added
functionality (systems of systems). But today, system composition is carried out in an ad-hoc, system-
specific, manner, with many associated disadvantages. We need a generalized system-of-systems-
oriented programming model that allows systems to be composed by application-domain ex-perts, not
just systems programmers. Furthermore, composition should occur in a principled way that generates
well-understood compositional semantics and behaviour.

Today’s distributed computing envi- tures such as smart cities and build- increasingly need to interact with and
ronment is becoming increasingly ings; environmental sensor and actu- respond to each other, typically in a
diverse and differentiated in nature, to ator networks using non-IP protocols; dynamic on-demand manner. For
the extent that the world’s computing cloud systems based on clusters; ad- example, WSNs need back-end clouds
infrastructure is now far removed from hoc networks such as MANETs and to process sense data, VANETs need to
the traditional picture of desktop PCs VANETs; and virtualized systems sup- interact with smart cities when upon
connected via fixed IP networks. The ported by network overlays. entry to the city, and overlay-based
picture today includes: IoT infrastruc- Furthermore, these various ‘systems’ systems need to maintain resilience

34 ERCIM NEWS 101 April 2015


properties when their underlying IP dynamic, low-level/high-level – e.g., domains of application dictate that the
environment changes. user groups, MANETs, clusters, clouds, basic information concepts of interest to
overlays, VPNs, sensor networks, or the programmer will vary according to
This is all leading to a world-view in even (on a more ‘micro’ scale) devices the domain of application. Our
which we need to be increasingly con- that can plug-and-play with other approach here is to employ ontologies
cerned with composing systems to build devices. to structure these concepts.
systems of systems [1]. Although this
fact is becoming recognised in many The purpose of the tecton abstraction is The distributed tecton runtime offers an
research communities, surprisingly to manage opportunistic interaction. API that enables client code to carry out
little work has been done on program- This is achieved by providing tectons fundamental operations such as cre-
ming environments to facilitate system- with programmatic condition-action ating/destroying tectons, managing
of-systems composition. Instead, rules that trigger when the tectons (or, their node membership, setting the cri-
system composition is carried out using more precisely, some of their nodes) teria for inter-tecton “contact”, and
ad-hoc interfaces, and relies on detailed come into contact, and determine under coordinating the consequent action (e.g.
knowledge of the internals of the sys- what circumstances and in what manner interaction, composition, etc.). For
tems being composed. We argue that a an interaction or composition should example, setting the criteria for “con-
generalised programming and model- occur. This applies in both a horizontal tact” is achieved by providing the run-
ling approach is urgently needed to and a vertical sense, involving (respec- time with a predicate over ontology-
enable the full fruition of the emerging tively) interactions between peer sys- derived <name, value> pairs. The run-
system-of-systems world. tems, and cross-layer interactions. time monitors these values in its distrib-
uted environment and triggers the corre-
We are currently developing such a As an example, we might program a sponding action when the predicate
system-of-systems-oriented program- MANET tecton by (essentially) saying “fires”.
ming model. A key aspect of our “IF any of the nodes in this MANET
approach is to assume that systems are tecton come into contact with an 802.11 We are at the beginning stage of the
self-contained, and that they interact network tecton, THEN all its nodes development of the tecton concept, but
and compose opportunistically. In this should reconnect to their email servers are currently applying it in a CHIST-
way, we see systems of systems via this node”. By extrapolating from ERA project that investigates interoper-
emerging spontaneously as a result of this example of vertical composition, it able overlay networks and also in an
opportunistically-arising, mutually- can be seen that condition-action rules IoT-based en-vironment involving both
beneficial, time-bounded alliances enable the tecton programmer to WSNs and cloud infrastructures.
between systems that dynamically dis- specify, in a very general way, what
cover potential partner systems in their should be done when one system
environment. Examples of such oppor- encounters another. In summary, we Link:
tunistic interactions/compositions envisage the whole process of devel- CHIST-ERA:
include: i) exchange of traffic informa- oping, deploying and managing systems http://www.chistera.eu/projects/dionasys
tion between passing vehicles; ii) iso- of systems as amounting to a process of
lated islands of connectivity discov- defining horizontally- and vertically- Reference:
ering a delay-tolerant overlay network composable tectons along with their [1] M. Maier: “Architecting Principles
through which they can interact; iii) associated condition-action rules. for System of Systems”, Systems
opportunistic cross-layer optimization Engineering 1 (4): pp 267–284, 1998.
involving layers on different systems In supporting the tecton abstraction, we
that happen to come in range of each have defined a layered architecture con- Please contact:
other; and iv) a networked team of sisting of a Domain Specific Language/ Geoff Coulson, Andreas Mauthe
rescue workers dynamically interfacing Ontology layer over a distributed tecton Lancaster University, UK
with a local hospital’s systems. The runtime layer. The upper layer is moti- E-mail: geoff@comp.lancs.ac.uk,
general pattern is one of loosely-cou- vated by the fact that a single set of pro- a.mauthe@lancaster.ac.uk
pled interaction between autonomous gramming language concepts is
systems triggered by relevant events unlikely to be acceptable, given the Markus Tauber
(e.g., proximity). intended generality of the tecton AIT Austrian Institute of Technology,
approach. Instead, we look to support Austria
Our programming and modelling multiple programming tools that cap- E-mail: markus.tauber@ait.ac.at
approach is based on a first-class pro- ture concepts of relevance to the
grammatic abstraction of a ‘system’, domain of application. For example, a
which we refer to as a tecton. systems programmer working with net-
Essentially, a tecton is a distributed work-level tectons might expect a DSL
abstraction/representation of a self-con- based on library calls embedded in C;
tained, potentially-opportunistically- whereas a building manager working
interacting, multi-node distributed with tectons that represent things like
system. It is intended that tectons are “all the windows on this floor” or “the
used uniformly to abstract the full range group of today’s visitors” may prefer a
of ‘systems’, whether wired/wireless, scripting or graphical approach.
fixed/mobile, large/small, static/ Similarly, the extreme variance in

ERCIM NEWS 101 April 2015 35


Special Theme: The Internet of Things & the Web of Things

BETaaS: Building the Future Platform


for development and Execution
of Machine-to-Machine Applications
by Carlo Vallati, Enzo Mingozzi and Giacomo Tanganelli

Recently proposed IoT platforms are typically based on centralized and cloud-centric
infrastructures. The BETaaS project aims at designing a platform for the execution of M2M
applications in a distributed runtime environment running close to the physical environment
where sensors and actuators are deployed. The main goal is to move the intelligence to the edge
in order to allow localized, content-centric, and timely processing of smart objects data. The
platform facilitates the integration of existing IoT systems, while providing software developers
with a high-level, content-centric abstraction to access smart objects’ resources.

Recent technology advances are cloud is generally inefficient in these use through the design and development of a
evolving the objects we use in our daily cases, and may be even unfeasible if the horizontal platform that leverages a dis-
lives into smart objects, i.e., regular case requires stringent latency guarantees tributed architecture to move the intelli-
objects empowered with communication to process and react to collected sensor gence to the edge, i.e., close to the phys-
and computational capabilities. Smart data [2]. ical environment where sensors and
home automation solutions (e.g., smart actuators reside, in order to ensure
thermostats, smart lights) and smart BETaaS, Building the Environment for timely application processing. The
health products (e.g., wearable sensors) the Things-as-a-Service, is a European BETaaS platform, is designed to run on
commercialized today are only a few project co-funded by the European heterogeneous devices, called gateways,
examples representing the dawn of the Commission under the 7th Framework such as home routers or set-top boxes.
forthcoming Internet of Things (IoT) Programme, which aims to overcome The execution of M2M applications is
revolution [1]. the limitations of cloud-centric IoT then supported through a tight interac-
architectures. This is accomplished tion among multiple gateways that form
Interoperability among heterogeneous
IoT systems is considered a key issue in
this scenario. Current IoT solutions are
typically vertical systems that are
designed to serve a specific application
acting in isolation with no or limited
cooperation. Instead, a horizontal
approach is needed to design future IoT
platforms in order to facilitate the cre-
ation of a converged infrastructure pro-
viding diverse applications a seamless
access to heterogeneous smart. This is
the clear trend also followed by ongoing
standardization activities related to IoT,
e.g. oneM2M.

However, recently proposed horizontal


solutions are typically based on central-
ized architectures where the intelligence
to process and harmonize the data to/from
heterogeneous IoT infrastructures is con-
centrated in the cloud. Although such
solutions inherit the benefits of a cloud-
based infrastructure, as a matter of facts
they are not the best choice for many
classes of IoT applications. Machine-to-
Machine (M2M) applications, for
example, are characterized by a limited
scope in time and space (data needs to be
processed only when and where gener-
ated) as they require simple and repetitive,
closed-loop, but often highly time-sensi-
tive interactions. Processing all data in the Figure 1: BETaaS use case example.

36 ERCIM NEWS 101 April 2015


a distributed runtime environment called devices to interact with smart objects and The BETaaS platform achieves full sep-
a local cloud. On top of the local cloud, extended services. In addition to basic aration between applications and the
the platform offers M2M application functionalities, the platform offers built- sensing and actuating infrastructure,
developers a content-centric service-ori- in support for several non-functional allowing the development of applica-
ented interface, named Things-as-a- requirements aimed at supporting devel- tions by third-party developers. Generic
Service (TaaS), exposed to access smart opment of M2M applications and applications ready to run in any BETaaS
objects connected to the platform extended services: Context Awareness, instance can be developed. This key
regardless of their location and tech- Quality of Service, Security, Big Data feature can be exploited to trigger the
nology, cutting software development Management and Virtualization. For an creation of an M2M application market,
time and enabling code reusability. exhaustive description of these platform from which end users can download and
functionalities, the interested reader can install applications on their private
The BETaaS platform, released as open- refer to [3]. deployments.
source software, is based on Java OSGi,
a framework specifically designed to As an example of use case, consider a Links:
build modular platforms with a highly smart home environment with a set of BETaaS website:
dynamic structure. The BETaaS archi- already deployed vertical M2M sys- http://www.betaas.com/
tecture is based on a layered structure to tems: an alarm system equipped with BETaaS project website:
ease the integration of existing systems presence sensors for surveillance, an http://www.betaas.eu/
and platform expandability. At the environmental control system including BETaaS github repository:
bottom, an Adaptation Layer allows inte- temperature sensors for heating and https://github.com/BETaaS/
gration of existing M2M systems cooling control as well as light switch BETaaS_Platform-Tools
through the implementation of plug-ins actuators, and a garden watering system
that provide a common interface to with humidity sensors. In this scenario, References:
access the functionalities of the physical the BETaaS platform can be deployed [1] Atzori, Luigi, Antonio Iera, and
system. At the core, the TaaS layer on four gateways that cooperates to Giacomo Morabito: “The internet of
implements the functionalities that allow implement an all-in-one horizontal IoT things: A survey”, Computer networks,
gateways to cooperatively share system that enables the development of 2010.
resources, thus realizing the concept of applications leveraging on smart [2] Abdelwahab, at al.: “Enabling
local cloud. The result is the TaaS inter- objects working in isolation in the orig- Smart Cloud Services Through Remote
face exposed to software developers to inal design. For instance, an extended Sensing: An Internet of Everything
implement new services and external service that enhances the environmental Enabler”, IEEE In-ternet of Things
applications. To this aim, an additional control system can be installed to Journal, 2014.
Service Layer is included to host exploit humidity and presence informa-
extended services, i.e., services that can tion, e.g., turning down the air-condi- Please contact:
run natively on the platform to imple- tioning when a window is opened as Carlo Vallati, Enzo Mingozzi,
ment custom control logic and can be evidenced by the magnetic sensor part Giacomo Tanganelli
installed at run-time exploiting the mod- of the alarm system. External applica- Department of Information
ular structure offered by OSGi. tions interacting with the platform and Engineering, University of Pisa
Eventually, the Service Layer exposes a running on external devices can be {c.vallati, e.mingozzi,
unified RESTful interface, exploited by deployed on a smartphone to expose a g.tanganelli}@iet.unipi.it
external applications running on external uniform control interface to end users.

Pro-IoT: Improving the Productivity


of Companies by Using the IoT
by Heikki Ailisto, Nadine Pesonen, Pertti Raatikainen and Jonathan Ouoba

Internet of things (IoT) and the related Industrial Internet are recognized as one of the most
significant technology-driven disruptions of the coming ten years. VTT Technical Research Centre
of Finland has chosen IoT as a strategic area for research, development and innovation projects.

The Pro-IoT spearhead programme research centre. Each area is delineated to point out the relevance of the pro-
focuses on three technology areas, in three domains that represent chal- posed solutions for companies. The
namely sensing technology, connec- lenges for our societies: industrial asset complete structure of the programme is
tivity, and data-analysis with data secu- management, connected health and dig- presented Figure 1.
rity. These areas emanate from the needs ital society. In addition to the technolog-
expressed by European and especially ical perspectives, the business aspects In order to sustain living standards in
Finnish companies, as well as on the are also investigated, through a dedi- Europe, an increase in the productivity
strong competencies found in our cated module, hence making it possible of companies appears to be vital. As

ERCIM NEWS 101 April 2015 37


Special Theme: The Internet of Things & the Web of Things

such, the structure of the Pro-IoT pro-


gramme is intended to provide the
appropriate framework to initiate and
maintain a productivity leap correspon-
ding to the potential of IoT-based sys-
tems.

Research Highlights
The development of the Pro-IoT pro-
gramme has resulted in many research
projects. These projects have yielded
significant achievements in various
domains. A notable example, in the
field of sensing, concerns wireless and
battery-less devices, which represent a
kind of Holy Grail. Such a paradigm Figure 1: VTT productivity with IOT program structure.
would enable measurements in
demanding conditions with low main-
tenance cost and without hindering pro- manage the multi-technology context. intensified research effort involving the
duction. VTT has developed a solution Therefore, a platform has been devel- key stakeholders. We need to further
for measuring temperature, inclination, oped for energy-efficient communica- address technological questions such as
humidity, strain and other characteris- tions between mobile devices that the need of more energy-efficient com-
tics from machines and inside struc- identifies the most appropriate combi- munication, the congestion of the
tures (e.g. walls) at distances up to 10 nation of technologies for different Internet with the deployment of tens of
m, without batteries in the sensor. The exchanges [1]. billions of new nodes (sensors and
principle is based on powering the smart objects). In addition, we have to
sensor with radio frequency energy Impact on Industry and Society find sustainable answers to the recurrent
waves and using the return transmis- The disruption caused by Industrial questions of information security and
sion to read out the resulting data (see Internet is comparable to earlier indus- privacy in this new context. The safety
Link ‘Zero Power Sensor’). The IPR trial revolutions initiated by steam, aspect of the operations regarding
protected technology allows for several electricity and computers. Indeed, autonomous machines, the issues of
individually identifiable sensors to be General Electric predicts extra growth data ownership, as well as plausible and
operated in the same space. globally worth 10 to 15 trillion US dol- fair business models also represent
lars during the next 15 years. This will major concerns.
Another relevant example concerns depend largely on being able to
autonomous vehicles and machines leverage industrial internet technology Links:
with communication needs. A solution to the full [2]. As such, the Pro-IoT pro- The Pro-IoT spearhead project:
for communication in demanding con- gramme contributes to this evolution http://www.vttresearch.com/impact/new
ditions, namely a cluttered harbour by providing companies with appro- -innovations-are-here/innovation-
environment, has been developed for priate tools to improve the performance programmes/productivity-with-
and tested in Port of Singapore. The key of their industrial processes. As shown internet-of-things
issue was how to ensure reliable com- by the examples in the previous sec- Zero Power Sensor:
munication with predictable maximum tion, the emphasis is on realistic solu- http://knowledge.vtt.fi/ZeroPowerSensor
delay between moving machines for tions adapted to a challenging environ-
their safe operation. The solution ment, safe autonomous systems while References:
involved using two or more communi- targeting a reduction in the operating [1] S. Chaumette and J. Ouoba: “A
cation networks seamlessly to secure costs. Multilevel Platform for Secure
communication between piles of con- Communications in a Fleet of Mobile
tainers and other ‘non-radio-friendly’ The Industrial Internet will not only Phones”, in proc. of MobiCASE 2014
objects. increase productivity in industry and [2] P. Evans and M. Annunziata:
firms. By adapting its models to urban “Industrial Internet: Pushing the
At a more conceptual level, other areas, it will also affect public services Boundaries of Minds and Machines”,
research activities were intended to with the emergence and the consolida- 2012, http://www.ge.com/docs/
address the issues related to the multi- tion of smart cities. The everyday lives chapters/Industrial_Internet.pdf
technology environment of mobile of all of us as employees, consumers
devices. Indeed, many of these devices and citizens will benefit from it with Please contact:
(mobile phones, sensors, wearable more personalized and efficient end- Ailisto Heikki
objects) are endowed with multiple user services. VTT Technical Research Centre of
wireless technologies. This offers Finland
opportunities in terms of services and Challenges Ahead E-mail heikki.ailisto@vtt.fi
applications to deploy, provided that The Industrial Internet is not happening
solutions are designed to effectively by itself; it requires coordinated and

38 ERCIM NEWS 101 April 2015


MusicBricks: Connecting digital Creators
to the Internet of Music Things
by Thomas Lidy, Alexander Schindler and Michela Magas

A new Horizon 2020 Innovation Action project fosters the uptake of music technology research and
acts as an accelerator for bringing creative music tech ideas to market, while providing a mesh of
technological ‘bricks’ to create an ‘Internet of Music Things’.

Music is arguably the most pervasive of and little connectivity hinder the cre- bass transcription from Fraunhofer,
the performing arts. It has the power to ation of larger systems that operate as a melody curve extraction and API access
enlighten us, cheer us up, bring us down mesh of technological bricks con- to the freesound.org sample collection
and most importantly - bring us together. necting physical and tangible hardware by Universitat Pompeu Fabra. On top of
Substantial resources and personal and available music technology soft- these APIs, graphical interfaces (GUIs)
energy have been invested into music ware. Yet this interoperability between such as PlaySOM and Sonarflow offer
technology research in recent decades. tangible and wearable devices and the semi-automated grouping and clus-
Despite the global success of European well-researched software components tering of music while other visual fron-
music tech companies such as Spotify, for music analysis and processing is tends shall be easily used as well in con-
Deezer, Soundcloud and last.fm, the heavily needed to make the ‘Internet of junction with the tools and APIs. The
value chain from academic research to Music Things’ a reality [1]. third category of bricks is a new genera-
SMEs and large music industry corpora- tion of Tangible User Interface (TUI)
tions remains fragmented, preventing The MusicBricks Project such as a wireless micro platform for
successful application of the results of MusicBricks responds to these prob- motion sensing provided by IRCAM [2]
innovative research. Yet, creative SMEs lems, acting as a connector between This is complemented by portable com-
have been identified as the primary cata- research and industry, by identifying, puting platforms such as the Arduino,
lysts for innovation, and they can benefit wrapping and making existing tools the Raspberry Pi and the Axoloti, a
vastly from innovative music tech- available in easily usable formats. microcontroller specifically designed to
nology research. These tools, or ‘bricks’, shall require create free-form digital audio instru-
little learning, offer themselves for ments of a new kind.
The Horizon 2020 Innovation Action mash-ups, and are easily adopted and
‘MusicBricks’ has been initiated with deployable by the creative SME digital The Internet of Music Things
the aim of capitalizing on the current makers and content creators. The All these technological ‘bricks’ form the
European leadership in successful music project will foster interoperability by foundation for a co-creational space
technology companies and secure a providing state-of-the art connectors where people - musicians, hackers, dig-
direct route from ICT academic research and interfaces to these technological ital makers, creative SMEs - build
to the application and exploitation by building blocks. The resulting plethora entirely new applications. By intercon-
SMEs and major industry players world- of components - software endpoints, necting individual nodes - the provided
wide. The mission of the project is to Web APIs, physical, tangible and wear- API endpoints, network-enabled
foster an exchange between the music able devices - are connected through devices, sensors, microcomputers etc. -
ICT experts from academic and national and live on the Internet, realizing an these bricks communicate with each
research organizations, and digital ‘Internet of Music Things’, where many other and start creating something
makers and content creators from cre- different kinds of analysis, processing, bigger: a mesh of connected ‘musical
ative industries SMEs. sensing, actuating or synthesis are components’ which eventually manifests
taking place on different machines. as an ‘Internet of Music Things’.
Despite the remarkable progress in
music information research, technolo- The consortium consists of the design Events such as Hack days and Music
gies provided by various projects are research and innovation lab Tech Fests fuel the creation of new
often difficult to apply owing to poor Stromatolite, the Institut de Recherche mash-ups, hacks, audio tools, music
communication. Research results are et Coordination Acoustique/Musique instruments combined with unthought-
typically scattered among institution (IRCAM), the Music Technology of forms of application which has been
Web pages and documentation is often Group of the Universitat Pompeu Fabra, demonstrated impressively in the past
neglected. Less user-friendly interfaces the Fraunhofer IDMT Institute, the by innovations such as Siftables [3],
and steep learning curves hinder uptake Vienna University of Technology, and is compact devices with sensing, graph-
by industry (even more so for SMEs led by Sigma Orionis. ical display, and wireless communica-
and, in particular, one-person enterprises tion that can be physically manipulated,
such as the typical music maker or app In the first step the project will provide recognize gestures and sense other
developer). In addition, corresponding the ‘bricks’ for creative makers: soft- nearby devices while able to interac-
technologies are frequently lacking ware tools and APIs, such as rhythm tively create audio; or performances
proper engineering to facilitate interop- feature analysis and music similarity by such as the Brainwave Quartet in which
erability with other technological com- Vienna University of Technology, key music is performed live through the col-
ponents. Thus, complicated workflows and tempo detection and melody and lective brainwaves of an ensemble

ERCIM NEWS 101 April 2015 39


Special Theme: The Internet of Things & the Web of Things

Figure 1: Music market feedback both for deployment of


hackers interconnecting sustainable applications and to ensure
music technology to long term impact on future research
create interactive directions.
performances, new
music interfaces or The next MusicBricks events will be
instruments. Music Tech Fest Scandinavia May 29-
31, 2015 in Umeå, Sweden, and a Music
Hack Day at Sónar Festival Barcelona
June 17-19, 2015. Until June 2016
MusicBricks will host a set of further
events and support ideas through the
incubation phase throughout this
period. In order to ensure sustainability,
the consortium is planning to set up a
Music Tech Fund in conjunction with
investment company Par Equity to fur-
ther support and incubate the best proto-
types and help take them to market.

Links:
Music Bricks Website:
http://musictechfest.org/MusicBricks
Music Tech Fest:
http://musictechfest.org
Results of previous Music Tech Fests:
http://musictechfest.tumblr.com
Videos from Music Tech Fests:
https://www.youtube.com/user/Music
TechFest

Reference:
[1] Music’s Internet of Things:
wearing brain caps. Another great Through this interdisciplinarity it Heartbeats, Accelerometers...
example is the “Wearable Axoloti enables a new dimension of creativity, Brainwaves?
Music Human Synthesizer”, a multi- leading to entirely novel ideas and http://evolver.fm/2013/03/15/musics-
user synthesizer where one user modu- applications. In past events creative internet-of-things-heartbeats-
lates the sound of another through hacker ideas have led to physical prod- accelerometers-brainwaves/
touching, created with wearable elec- ucts and performances featuring new [2] Jules Françoise, Norbert Schnell,
tronics, conductive surfaces on T-shirts musical innovations such as a ‘Music Riccardo Borghesi, and Frédéric
and Axoloti boards. It was awarded the Hat’ which converts brainwaves and Bevilacqua.Probabilistic Models for
‘Internet of Music Things Hack Award’ head movements to music and various Designing Motion and Sound
at the Paris Music Tech Fest. effects. Relationships. In Proceedings of the
2014 International Conference on New
Events The most promising ideas and demon- Interfaces for Musical Expression,
MusicBricks both hosts and cooperates strators generated at these events - NIME’14, London, UK, 2014.
with a series of events, specifically the whether a piece of software, a device, a [3] D. Merrill, J. Kalanithi and P.
Music Tech Fest geared towards the cre- new musical instrument, a performance Maes. Siftables: Towards Sensor
ative developer community to actively or installation - will be supported by the Network User Interfaces. In the
test and utilize these tools, alongside MusicBricks Incubation Programme, Proceedings of the First International
others, to generate new ideas and create which provides funding for residencies Conference on Tangible and Embedded
novel applications. The Music Tech that enable creative makers to further Interaction (TEI'07). February 15-17 in
Fest (Figure 1) has seen successful past develop their demonstrators to robust Baton Rouge, Louisiana, USA.
events around the world and is a free, and market-ready prototypes and assists
weekend-long event that provides an them through virtual and face-to-face Please contact:
experimental and improvisational space collaboration. Feedback gathered Thomas Lidy, Alexander Schindler
where ideas are showcased, performed, during idea generation and incubation Vienna University of Technology
demonstrated and discussed, while will assist in the consolidation and lidy@ifs.tuwien.ac.at,
offering immediate assistance with the refinement of the available tools and schindler@ifs.tuwien.ac.at
tools provided. It has a particular focus interfaces. By exposing the resulting
on interdisciplinarity: musicians meet prototypes directly to big industry Michela Magas
hackers, researchers meet industry, players and investors the project aims to Stromatolite
artists and technologists come together. reach the global market and gather michela@stromatolite.com

40 ERCIM NEWS 101 April 2015


deploying an NFC-based Inventory System:
A Case Study
by Patrick Poullie, Thomas Bocek and Burkhard Stiller

NFC tags and transceivers are ubiquitous and well supported. Like many academic research groups,
the Communication Systems Group CSG of the University of Zürich owns many physical devices,
which are required for research and teaching. Traditionally, a printed, human-readable inventory and
attached labels have been used to keep track of these devices. A new inventory approach was
developed with the aim of simplifying the data acquisition using an NFC tag-based system supported
by an Android application. This approach was implemented, tested, and used productively. However,
due to technical difficulties - namely, a poor response of NFC tags on metallic material - the NFC-
based inventory system did not simplify data acquisition and consequently, the NFC-based inventory
system was changed back to the label-based system.

Near Field Communication (NFC) To avoid not only the need for a special- Here, NFC tags qualified as the only
defines a communication channel for ized printer but to also allow every option, as other RFID tags would
devices in close proximity (up to 10 cm) group member to conveniently retrieve require extra hardware for reading and
[1]. NFC has a wide range of applica- and change inventory information, a writing tags. This would not only
tions as it can be used to transmit data new tag-based inventory system was increase costs of the new approach but
between devices or between a device and envisioned. Barcodes, QR-codes, and also reduce user convenience. Thus,
an NFC tag. These tags are standardized RFID tags were evaluated to label items. since NFC is already supported by many
– though some differences exist – and the Bar- and QR-codes were not followed smartphones and tablets, the NFC tags
data is stored in the standardized format up for two reasons: first, creating determined a valuable path.
NDEF (NFC Data Exchange Format) human-readable tags would again imply
[2]. Depending on the type of tag, data the need for a specialized label printer, Thus, the human readable inventory
from 48 Bytes (Ultralight) to 888 Bytes which would prohibit “decentralized” labels were replaced with NFC tags, to
(NTAG216) can be stored. The very pop- allow receipt and updating of inventory
ular tag NTAG203 and its successor information upon scanning the tag with
NTAG213 can store 144 Bytes of data. an NFC-enabled smartphone. To add a
Most Android-based smartphones are new device a database entry is created
equipped with an NFC transceiver, and via the newly developed inventory
the software support for NFC has been smartphone app or via the inventory
present since the Android version 2.3, Web site. An NFC NTAG203 tag is
which was released in December 2010. placed on the device and an NFC-
Apple also integrated the NFC tech- capable device used to store this entry’s
nology into iPhone 6 and bases its identifier and other essential informa-
mobile payment system on this tech- tion in those tags 144 Byte storage.
nology, although not providing an open Updating entries is simple: an NFC tag
API. Thus, NFC reading and writing is scanned with the inventory app and all
capable devices are widespread and available information about this item is
ubiquitous. displayed immediately. This informa-
tion (including location, room, and
Inventory System holder) can be updated within the app,
The label-based Communication and written to the tag and the database.
Systems Group CSG [3] inventory
system for hardware acquisitions above a Figure 1: App-based inventory system. The smartphone inventory app was
certain commercial value used a human implemented in Java, while the backend
readable, four character and four digit was implemented in PHP communi-
label. The label had to be printed with a tagging of devices. Second, once these cating via HTTPS requests to the smart-
specialized label printer and was tags are created, information they store phone app. Authentication is done with
attached to the device. The four digit is static. This was a major drawback, LDAP, while all other data is stored in a
number was used to identify a database because the new inventory system has to MySQL database. Updating of device
entry, which contained information, such be able to operate offline, i.e., even holders is the most frequently performed
as device name, vendor, purchase date, without a database connection retrieving action, and the app’s starting screen (cf.
and current holder. Retrieving inventory or updating inventory information of a Figure 1) offers two buttons for this pur-
information about a device involved device in physical reach had to be pos- pose. Upon selecting ‘Lend item’, the
manually entering its number into a Web sible. Therefore, change of information name of the new item holder is
browser. on a tag and its synchronization later requested. Once entered, an NFC chip
with the database was essential. can be scanned, which, like the
Consequently, RFID tags had to be used. according data base entry, is updated

ERCIM NEWS 101 April 2015 41


Special Theme: The Internet of Things & the Web of Things

accordingly. The ‘Return’ button deletes shielded tags ranging in price from a Once metal-cased devices work well
the ‘current holder’ field of the subse- few cents to a few dollars. The cheap with a new type of metal-shielded tags,
quently scanned item (in the data base metal shielded tags performed as poorly the inventory system will be switched
and on the NFC chip). ‘Manipulate as non-shielded tags, whilst the more back to an NFC-based inventory
item’ allows a database entry to be dis- expensive ones generally performed system. In conclusion, when planning
played and modified when the corre- better than the low-cost tags. However, an introduction of an NFC-based
sponding item is scanned. Thus, items the evaluations have shown that even system, it is important to ensure that
can also be added or deleted here. With a the most expensive and metal-shielded NFC tags on metallic items can be used
‘More’ click, additional information and tags failed to work on a large set of by verifying NFC tags operations on
a search function are displayed. metallic items. metallic items.

Evaluation Conclusions and Future Steps References:


After the NFC-based inventory system Due to these problems with using the [1] NFC and Contactless Technologies,
was introduced, problems with using NFC system at metal objects, it was NFC Forum, URL: http://nfc-
this approach in a practical environment decided that an NFC tag-based forum.org/what-is-nfc/about-the-
soon became apparent. These problems approach was unacceptably unreliable, technology/, last access January 2015.
were caused by the poor response of and the human-readable label system [2] NFC Data Exchange Format
NFC tags, when any metal object was in was reinstantiated. However, the smart- (NDEF) Technical Specification, NFC
their vicinity. As even some smart- phone app developed is still in use and Forum, URL: http://members.nfc-
phones have metal cases, this resulted in determines a step forward in the entire forum.org/specs/spec_list/, last access
a poor NFC communication reception. inventory process, as it not only allows January 2015.
Thus, the evaluation recommends that for an active identification of items – [3] Communication Systems Group
smartphones with metal case are not originally planned for by scanning their CSG, University of Zürich,
used with an NFC-based inventory NFC tag –, but also allows for entering Switzerland, URL:
system. All following evaluations were an identifier and all device-related http://www.csg.uzh.ch, last access
performed with non-metallic smart- information in a mobile manner, January 2015.
phones. without the need for a Web-based
inventory interface. Please contact:
The project identified a smartphone Patrick Poullie, Thomas Bocek,
with a good NFC reception, a non- As very many metallic items were iden- Burkhard Stiller
metallic case, and it was also expected tified as difficult to read, even with cur- Universität Zürich, Switzerland
to find suitable ‘metal-compatible’ NFC rent metal-shielded tags, the technology E-mail: poullie@ifi.uzh.ch,
tags. In particular, explicit metal- progress of new metal-shielded tags bocek@ifi.uzh.ch, stiller@ifi.uzh.ch
shielded tags are expected to work on will be tracked in the near future for a
any surface. The tests utilized metal- possible return to the NFC technology.

TrakChain Estimates Costs for Track and Trace


in the Internet of (many) Things
by Miguel L. Pardal and José Alves Marques

The TrakChain assessment tools take a description of a physical supply chain – relevant locations, how
many goods are received, how often, etc. – and estimate the performance of track and trace queries in
a modelled traceability system, providing predictions of how much processing and storage will be
required for the working system. The tools were developed at Instituto Superior Técnico, Universidade de
Lisboa, Portugal and were evaluated using a Pharmaceuticals supply chain case study.

The Internet of Things (IoT) promises However, to achieve further improve- locations generate event data, as illus-
benefits from a deeper connection ments, more up-to-date and precise trated in Figure 1.
between the virtual and physical worlds. information about the supply chain is
One specific application area is logis- required. A practical RFID traceability system
tics. The global economy depends on a should perform adequately for the large
wide range of supply chains that transfer RFID is an IoT technology that allows number of physical objects flowing in
goods from producers to consumers. detailed and automated data capture in the supply chain [1]; and it should pro-
The combined use of Enterprise the supply chain, as specified by the tect the sensitive business data from
Resources Planning (ERP) and Supply EPCglobal standards [2]. Tags are unauthorized access providing the
Chain Management (SCM) information attached to the objects of interest and desired data visibility [2]. The
systems has greatly improved the overall readers placed along the supply chain TrakChain project was proposed to
operational efficiency of supply chains. evaluate both these aspects. It provides

42 ERCIM NEWS 101 April 2015


data access control, otherwise they will
Figure 1: Data about a not share their data [3].
physical object of interest,
EPC IS Factory
tagged with RFID, is TrakChain implemented visibility
captured along the supply restriction mechanisms that can be used
chain. EPC IS is a standard to define and enforce access control
for capturing and sharing policies using RDF and SPARQL. The
event data. policies can be converted to a standard
EPC IS Distributor format, XACML, to reuse existing
enforcement infrastructures with certi-
fied management and audit tools.

The expressiveness of the policies was


evaluated against a set of requirements
for a real-world pharmaceutical trace-
ability system, and it was shown to be
EPC IS Retailer expressive enough to satisfy the busi-
ness requirements. For example, it can
specify dynamic conditions to allow the
sharing of data with business partners
downstream in the supply chain that are
not known in advance.
Object of interest
EPC x
(tagged) Future Work
More data attributes, such as expiry
dates and temperature readings, can also
be made available and controlled by the
tools to estimate and measure the com- Should the system be centralized or traceability system. The increase in the
putational and communicational costs; decentralized? Should data be copied to safety and quality of products is a good
and also security tools. The project was specific locations or referenced? example of how the Internet of Things
developed at Instituto Superior Técnico, can help change the world for the better.
Universidade de Lisboa, Portugal; in The data flow of the assessment tool is
collaboration with researchers from the illustrated in Figure 2: given a supply Link:
University of Cambridge, UK; and the chain characterization and system http://trakchain.net
Massachusetts Institute of Technology, workflow specifications, the cost model
USA; and was aligned with normaliza- can estimate processing times and data References:
tion efforts by GS1 for ’RFID data dis- storage needs. The tool was validated [1] M. L. Pardal, M. Harrison, and J. A.
covery services’ and ‘event-based trace- with a case study in the Pharmaceuticals Marques: “Assessment of Visibility
ability’. industry that compared solutions being Restriction Mechanisms for Discovery
proposed to ensure the authenticity of Services”, IEEE International
Traceability Cost Models drugs [2]. Conference on RFID, 2012.
The cost models can compare trace- [2] M. L. Pardal, M. Harrison, S.
ability systems for different supply Traceability Data Access Control Sarma, and J. A. Marques: “Expressive
chains, so that the best architecture for a The supply chain participants need to RFID data access policies for the
given setting can be found. It helps to trust that the traceability system will Pharmaceuticals supply chain”, IEEE
find answers for questions such as: manage their data properly and enforce International Conference on RFID,
2013.
[3] M. Eurich, N. Oertel, and R.
Boutellier: “The impact of perceived
Capture privacy risks on organizations’
Functional schema & Query willingness to share item-level event
workflows data across the supply chain”, Journal
of Electronic Commerce Research
10(3-4), 423–440, 2010. ISSN: 1572-
define
9362.

parameterise
Please contact:
Supply chain compute
Miguel L. Pardal
schema Cost model Estimates Instituto Superior Técnico, Portugal
Email:
Figure 2: Data flow of the TrakChain cost assessment tool. Miguel.Pardal@tecnico.ulisboa.pt

ERCIM NEWS 101 April 2015 43


Research and Innovation

Mesh Joinery:
A Method for Building
Fabricable Structures
by Paolo Cignoni, Nico Pietroni, Luigi Malomo
and Roberto Scopigno

Mesh joinery is an innovative method to produce

European illustrative shape approximations suitable for


fabrication. Mesh joinery is capable of producing
complex fabricable structures in an efficient and

Research and visually pleasing manner. We represent an input


geometry as a set of planar pieces arranged to
compose a rigid structure by exploiting an efficient slit

Innovation mechanism. Since slices are planar, a standard 2D


cutting system is sufficient to fabricate them.

Over the last decade, a variety of rapid prototyping technolo-


gies have been developed to support the manufacturing
process, especially for the fabrication of production-quality
parts in relatively small numbers. However, while the
printing resolution has improved substantially - and conse-
quently, the accuracy in terms of reproduction has reached
high standards - rapid prototyping is still perceived as being
too expensive for the mass market. This is particularly true
for large scale reproduction: only a few techniques can pro-
duce, even approximated, large scale actual copy within rea-
sonable cost and time bounds.

We have introduced mesh joinery [1], a novel and practical


approach to fabricate illustrative shape approximations made
up of several interlocked planar pieces, called ‘slices’. Slices
can be easily fabricated even in large scale (both numbers
and dimensions) using any 2D cutting device and then manu-
ally assembled through a sequence of simple well defined
operations to obtain a rigid structure that resembles an input
3D model.

Our approach offers a truly low-cost solution owing to the


simple cutting technologies employed and the relatively
inexpensive material used (such as cardboard). Although the
proposed slice structure approximates the original geometry
and it cannot be considered as a ‘exact physical copy’, nev-
ertheless, we believe that our method is attractive in many
markets, such as in artistic or illustrative contexts, large scale
approximate reproductions, free form scaffolding, and even
in puzzles or toys, and where assembly is a key part of user
experience.

Our approach is based on building interlocking arrangements


composed of shallow flat ribbon-shaped pieces that follow a
cross-field defined on the surface. We provide a novel for-
malism to automatically design a slice-to-slice interlocking
system. This formalism provides enough degrees of freedom
to follow complex cross-fields and, consequently, to effi-
ciently approximate the global structure that characterizes
the input shape. We also redesigned the traditional slit inter-
locking mechanism that is used to connect pieces in order to
approximate generic 3D surfaces with greater flexibility.
Additionally, we ensure a sufficient degree of physical sta-

44 ERCIM NEWS 101 April 2015


bility of the final structure and provide the sequence of orthogonal to slices. In addition, we formulated non-orthog-
manual operations required for the assembly procedure. onal slice placement in a novel, structurally sound perspec-
tive. This new, more flexible, interlocking mechanism
Specifically, Mesh Joinery makes three major contributions allows different slices to be connected without the tradi-
that make it a significant advance in the field of large scale tional very limiting orthogonality constraints. These addi-
fabrication technologies. tional joinery degrees of freedom can be effectively
exploited to represent complex models with few ribbon
First, we have extended the classical slit interlocking mecha- shaped slices that can run in the best way to approximate the
nism by providing additional structural degrees of freedom. original shape, far better arrangements to be generated than
In particular, we allow insertion movements that are not the current state of the art [2].

Second, we have introduced an efficient automatic strategy


to approximate a surface with a set of slices. Slice placement
is driven by an input cross-field [3] that represents in a com-
pact, intuitive way the curvature flow over the surface. Our
approach provides a set of appealing, uniformly distributed
polylines lying on the surface of a mesh and agreeing with
the given cross field. This curvature driven placement is very
important to catch, with just a few pieces, the overall shape
of the input object. In addition, the method takes into account
slice insertion constraints and, while it does not theoretically
guarantee that the mounting sequence is collision free, it
yields arrangements that are practically assemblable and that
exhibit a sufficiently robust slice structure. Our method may
also take advantage of field symmetrization techniques for a
better perception of the global structure of the object.

Finally, mesh joinery exploits an automatic procedure to


ensure that the slice structure is physically achievable. First,
it improves the final rigidity, acting upon the slit interlocking
mechanism. Second, it ensures that the slice structure con-
forms to the physical constraints required by the manual
assembling procedure. This procedure is specifically
designed to deal with our extended slit mechanism.
Figure 1: Starting from a 3D model with a cross field the Mesh
Joinery approach allows to automatically generate flat cut The Mesh Joinery approach has been patented and it has
arrangments that well approximate the original shape. been used in practice to build a number of real large models
that have been shown at international conferences and work-
shops.

Link:
http://vcg.isti.cnr.it/Publications/2014/CPMS14/

References:
[1] P. Cignoni, N. Pietroni, L. Malomo, R. Scopigno:
“Field-aligned mesh joinery”,. ACM Trans. Graph, 33, 1,
(February 2014).
[2] Y. Schwartzburg , M. Pauly: “Design and optimization
of orthogonally intersecting planar surfaces”, Computation-
al Design Modelling, 2012.
[3] D. Panozzo, Y. Lipman, E. Puppo, D. Zorin: “Fields on
symmetric surfaces”, ACM Trans. Graph. 31, 4 (July), 2012.

Please contact:
Paolo Cignoni
ISTI-CNR, Italy
E-mail: paolo.cignoni@isti.cnr.it

Figure 2: Mesh Joinery is based on a novel slit based interlocking


system that allows to connect flat pieces in a much more flexible way
and that retains robustness through global relationships.

ERCIM NEWS 101 April 2015 45


Research and Innovation

Icing detection and mechanism. Very promising results come from carbon nan-
otechnology that can be used to make thin films of coating
Protection for Small material to be painted on aircraft wings. Using the electricity
onboard, the film can be heated to melt the ice. Such devices,
Unmanned Aircrafts however, are very energy demanding, thus it is vital to have
an optimal scheme for the activation of the de-icing system
by Andrea Cristofaro and Tor Arne Johansen to maintain aircraft stability. The combination of the aircraft
dynamical model and the model describing the accretion of
In unmanned aerial vehicles, it is vital to be able to icing is the ‘Stefan problem’, which consists of a set of four
detect and accommodate ice adhesion on wings, partial differential equations: two heat equations, one mass
control surfaces and airspeed sensors, since ice balance equation and one energy balance equation.
accretion modifies the shape of the aircraft and alters
its measurements, thus changing the aerodynamic Finally, in order to test and validate the efficiency and robust-
forces and reducing manoeuvring capability. ness of the icing detection algorithms as well as the icing
protection module, field experiments in Svalbard are planned
The use of unmanned aerial vehicles (UAVs) for civil appli- for the near future using the X8 UAV (Skywalker
cations – largely surveillance and monitoring - has increased Technology Co, Ltd.).
markedly in recent years. UAVs are very often suited for
harsh conditions that are unsafe for humans, such as those The research at NTNU is a fruitful collaboration with other
typically encountered in Arctic operations. Reliable, appro- two ERCIM partner institutes, namely University of Porto
priate, and efficient UAV operations are needed in such con- (UPT) and University of Cyprus (UCY). In particular, we are
ditions. currently working jointly with Prof. Pedro Aguiar (UPT) and
Prof. Marios Polycarpou (UCY) who have made outstanding
The phenomenon of ice accretion on aircraft wings and con- contributions to the project with their expertise in multiple
trol surfaces is a well recognized problem in aerospace engi- model adaptive estimation and nonlinear fault detection,
neering: the modified shape of the leading edge due to ice, respectively.
changes the lift, drag and pitch moment characteristics of the
wing. For instance, an ice-covered airfoil may experience a
40% reduction in lift coefficient, while the drag may be
increased by as much as 200%. A decrease in lift requires
more engine power and implies a premature airfoil stall
angle.

Large aeroplanes are commonly equipped with efficient anti-


icing and de-icing devices; however, these are largely unsuit-
able for small aircraft, owing to their simple architecture and
limited payload. Ice formations on aircraft surfaces during
flight are typically caused by supercooled water droplets
(SWD). When a water droplet cools, it does not freeze until it Figure 1: Ice accretion effects on airfoils.
reaches a very low temperature; however, a droplet will
freeze instantly, releasing latent and accreting ice, when it
interacts with an external agent such as an aircraft,. Both rate
and amount of ice depend on the shape of the surface, its References:
roughness, travelling body speed, temperature and droplet [1] A. Cristofaro, T. A. Johansen: “Fault-tolerant Control
size. Allocation: An Unknown Input Observer based approach
with constrained output fault directions”, in proc. of the
A first challenge is the in-flight detection of icing, i.e., recog- 52nd IEEE Conf. on Decision and Control, Florence, Italy,
nizing the accretion of ice layers using data provided by 2013, pp. 3818-3824.
onboard sensors. This problem can be addressed by applying [2] A. Cristofaro, T. A. Johansen: “Fault-tolerant control
the results of a recent study by our research team [1],[2], in allocation using Unknown Input Observers”, Automatica,
which we proposed a scheme for fault detection and isolation 50(7), 2014, pp. 1891-1897.
in overactuated systems based on Unknown Input Observers [3] A. Cristofaro, T. A. Johansen: “An Unknown Input
and Control Allocation methods. Unknown Input Observers Observer approach to icing detection for unmanned aerial
are deterministic estimators that can be made insensitive to vehicles”, accepted for publication in proc. of IEEE Ameri-
unmeasured inputs, while Control Allocation is very well can Control Conference 2015.
suited to handle constraints and to readily reconfigure the
control action in spite of actuator failures. Combining these Please contact:
two methods, a procedure has been designed to keep icing Andrea Cristofaro
effects decoupled from mechanical faults and external distur- ERCIM post-doc fellow at NTNU, Norway
bances such as wind gusts [3]. E-mail: andrea.cristofaro@itk.ntnu.no

A second step towards achieving icing protection for UAVs, Tor Arne Johansen, NTNU, Norway
is the implementation of an efficient anti-icing and de-icing E-mail: tor.arne.johansen@itk.ntnu.no

46 ERCIM NEWS 101 April 2015


LEARNMINER – Advanced Figure 1: Learn path
visualization of a LEARNMINER
Analytics for eLearning knowledge graph.

by Christian Bauckhage, Markus Ketterl and Ulrich Nütten

LEARNMINER is an interactive social eLearning platform


that integrates advanced analytics and linked data
processing to assist users in structuring course material.
Tools for analyzing crowd behaviour allow instructors to
identify overly simple or difficult material and provide
means for planning deadlines or tests. LEARNMINER
allows for mobile access and provides interactive
visualization of learning material and progress.

The interdisciplinary field of Web science studies technical


and sociological aspects of the Web. Given that the Web is the
largest human information construct in history whose rate of
adoption and impact on society are unparalleled, Web science
aims to understand the Web in order to engineer its future and document of a subject area is displayed as the central node of a
to ensure its social benefit [1]. The research project subgraph. Node sizes are used to express document sizes (e.g.,
SoFWIReD (Southampton Fraunhofer Web Science, Internet measured in text length); the bigger a node, the more time
Research & Development), funded by the Fraunhofer ICON users are expected to devote to the corresponding document.
initiative, is a collaboration between the University of
Southampton and Fraunhofer FOKUS and Fraunhofer IAIS. When displayed as a difficulty graph, the knowledge graph is
It involves web and data scientists with expertise in devel- organized according to how the overall user population per-
oping web platforms for data and knowledge driven pro- forms on tests created for each document. The more difficult
cessing that incorporate aspects of collective intelligence. a document the farther away it is from the cluster centre. The
time graph display organizes the knowledge graph such that
One of the platforms developed in SoFWIReD is LERAN- it reflects the time that the user has spent working with a doc-
MINER, an eLearning solution that aims to simplify and ument. Documents close to the centre of the graph indicate
optimize the process of learning and training on the job. It material a user has (almost) completed, for example, by
integrates social media features, linked Open Data pro- reading (almost) all pages of a document and taking corre-
cessing, document analysis, and predictive analytics. sponding tests. Documents farther from the centre indicate
material which still requires more time to completion.
Confronted with large repositories of learning material, users Finally, the learn path display provides suggestions about
may struggle to decide which item to work with next since how to continue studies by drawing a personalized path
this decision requires knowledge as to the content of the through the space of available resources. That is, this repre-
whole repository. LEARNMINER assists users by automati- sentation guides users based on their experience, background
cally determining document semantics and interrelations. It knowledge, and learning progress. While users are working
structures learning resources and displays them as a dynamic LEARNIMER, their learn paths will adapt and individual
document graph which evolves with the progress of indi- and collective progress and success (e.g., measured in terms
vidual users as well as crowds of users. The knowledge of grades obtained) are parameters used to compute sugges-
graph thus helps users to prioritize study according to their tions for further reading.
own needs as well taking into account the experience of the
overall population. In other words, the wisdom of the crowd LEARNMINER is currently employed in a corporate training
is harnessed to facilitate the task of the individual. Analytics environment, and users report that they especially appreciate its
tools help instructors to track user progress or to predict social features (e.g., support for study groups). By design, the
when learning tasks will be accomplished. This in turn facili- platform is interoperable and can efficiently index and structure
tates properly defined deadlines, homework, and tests. learning repositories for a wide range of subject areas.

LEARNMINER provides a semantic search engine for users References:


to navigate through a repository of documents. Using [1] J. Hendler, et al.: “Web science: an interdisciplinary
semantic text mining [2], queries are matched to semantic approach to understanding the Web,” Communications of
categories extracted from a given repository. Search results the ACM, vol. 51, no. 7, pp. 60-69, 2008.
are ranked according to their semantic similarity to a query [2] F. Metze, C. Bauckhage, and T. Alpcan: “Social and
and displayed together with the knowledge graph to allow Expert Research in Online Communities”, in Semantic
users to contextualize material. Computing , P. Sheu, et al. (eds), Wiley, 2010.

When displaying the knowledge graph, users have different Please contact:
options. In the basic view, documents are structured Ulrich Nütten, Fraunhofer IAIS, Germany
according semantic similarities and shown as interlinked Tel: +49-2241-142915
nodes. Node colours reflect subject areas and the most general E-mail: ulrich.nuetten@iais.fraunhofer.de

ERCIM NEWS 101 April 2015 47


Research and Innovation

Online Semantic Analysis Finally, the third goal of our approach is that the method
should operate at (close to) wire speed. Even when real-time
over Big Network data analysis is not strictly needed, the off-line method is limited
by storage because the analysis capacity and capabilities
by Chengchen Hu and Yuming Jiang cannot keep up with the rate at which data is produced.
Extracting and storing only useful information is a viable
Mobile applications, web services and social media approach that needs to be explored further.
generate huge data traffic from many sources. This is
described as ‘big network data’ with the ‘4V- In order to achieve the above goals, we apply Deep Semantic
characteristics’ - that is, variety, velocity, volume and Inspection (DSI), which contains a standard description to
veracity. Analysis on such big network data can discover unify the various formats of different applications and finally
problems, reveal opportunities and provide advice for obtain user semantics. Our basic idea is to extract a minimum
the service and network providers for fine-grained but complete semantic for each user behaviour at wire speed,
traffic engineering with close to real-time adjustment or and then apply data analysis and data mining on the small
application acceleration [1]. sized semantic data instead of the raw traffic data. This
process purifies the raw traffic and reduces the data volume
Different applications tend to integrate several functionali- by several orders of magnitude. Our preliminary experiment
ties with various data formats. For example, the Twitter shows that the compression ratio between the raw traffic
application produces network traffic such as tweeting, volume and our approach is in three orders of magnitude. As
posting pictures, embedding video. Classical methods are a result, the data volume for further user-defined high-level
limited to protocol or application identification [2]. We need analyses can be significantly reduced to handle big, and
to go beyond the packet and application analysis, when increasing, network data.
semantic information is the target [3]. Therefore, the first
goal is for our method to exhibit fine-grained awareness, We have designed and implemented a cross-platform system,
which analyzes user behaviour instead of traffic only related named Semantic On-Line Intent Detection (SOLID) to
to a certain application. This implies that we need to use a realize our DSI approach. As shown in Figure 1, SOLID
general grammar to associate the unstructured data with user builds a processing pipeline in its kernel space, where a
behaviour. semantic parser translates the segments into the application
semantic. A matching engine compares the application
The second goal is to develop a flexible and uniform specifi- semantic with predefined specifications to output the user
cation of the user semantic from network traffic. In previous sketches. The kernel design allows simultaneous processing
work, heterogeneous and unstructured big network data in of multiple application specifications and multiple PDUs.
different formats are studied separately. It is a challenge to Our implementation has demonstrated that on a real traffic
normalize the independent data structures and describe user trace, the SOLID-system achieves 17.6Gbps throughput with
behaviour in a unified framework to conduct a comprehen- the cost of 709MB memory consummations in x86 platform.
sive analysis in a fine-grained semantic manner. To make the SOLID-system flexible so that it supports var-

Figure 1: An example and processing pipeline of DSI/SOLID.

48 ERCIM NEWS 101 April 2015


ious analyses in the user space, we are now trying to improve From Cooling Integrated
the interface abstraction between the kernel and user space.
Circuits to Efficient
A few practical cases have been used to demonstrate the flex-
ibility of SOLID, but more cases need to be investigated. Electrical Power
This is necessary in order to acquire a thorough under-
standing of big network data with real traffic to analyze var- Generation
ious factors, such as the application performance, user pro-
filing, CP competition and application correlations. by Stephan Paredes, Brian Burg, Patrick Ruch, Ingmar
Meijer and Bruno Michel
The authors would like to appreciate Poul Heegaard of
NTNU for his valuable suggestions on this article. An earlier article in ERCIM News described a system for
cooling integrated circuits with re-usable hot water. The
References: result is a sharp increase in energy efficiency and a
[1] T. Benson et al.: “Fine grained traffic engineering for sharp reduction in the carbon footprint of data centers.
data centers”, in proc. of CoNEXT ’11 (New York, NY, The same technique is being applied to photovoltaic
USA, 2011), ACM, pp. 8:1–8:12. electrical energy production, again with a huge gain in
[2] F. Yu et al.: “Fast and memory-efficient regular expres- system efficiency due to the parallel recovery of waste
sion matching for deep packet inspection”, in ANCS 2006. heat. In hot climates heat from datacenters as well as
(Dec. 2006), pp. 93 –102. solar systems is converted into cooling by means of
[3] H. Li, C. Hu: “ROOM: Rule organized optimal match- adsorption heat pumps.
ing for fine-grained traffic identification”, in proc. of
INFOCOM, 2013, IEEE (2013), pp. 65–69. The techniques described in the earlier article [1] involve
using a network of microfluidic channels etched into the
Please contact: back side of the individual integrated circuit chips. The
Chengchen Hu branched system is patterned after the cooling system of the
ERCIM Fellow at NTNU, Norway mammalian brain that serves us all so well. Because water is
E-mail: chengchen.hu@item.ntnu.no, huc@ieee.org so much more capable of heat transportation than air, the tra-
ditional air-conditioning system for a data center is unneces-
Yuming Jiang sary and the use of costly air-conditioning units and fans can
NTNU, Norway be minimized. The integrated circuit chips are so designed
E-mail: jiang@item.ntnu.no that the “cooling” water can be so hot that the exiting hot
water can be used for various purposes, heating a building or
water desalination for examples, before being returned to the
system for cooling.

One of the systems using a water-cooling infrastructure with


heat recovery is the supercomputer SuperMUC at the
Leibniz Rechenzentrum in Garching, Germany. The system
has a peak performance of three Petaflops. At the time of its
installation in May, 2012, it was the fastest computer in
Europe and ranked number four in the TOP500 list of the
world's fastest computers. The system runs successfully and
problem-free since then and is currently being expanded with
new hardware to double its performance to 6 Petaflops. This
phase II expansion will become operative in June 2015.

The microfluidic cooling innovation has now also been


applied to specially designed photovoltaic chips. The overall
efficiency of this new approach to conversion of sunlight to
electrical power was so high in an experimental system that a
commercial system is being developed. High-efficiency
multi-junction photovoltaic cells reach efficiencies for pho-
tovoltaic energy conversion in excess of 40%, but the sun’s
energy needs to be concentrated for their use to be cost-effec-
tive. This is being done through a system of parabolic mir-
rors which focus the solar energy more than 1500-fold on a
dense array of multi-junction photovoltaic chips. At such
concentration ratios, the heat flux at the photovoltaic cells is
around 150 W/cm2, which calls for high-performance
cooling to avoid failure of the cells. Relying on the microflu-
idic cooling approach developed for the thermal manage-
ment of microprocessors, the photovoltaic cells can be safely

ERCIM NEWS 101 April 2015 49


Research and Innovation

cient than their air-cooled counterparts due to the minimiza-


© IBM Research
tion in air-conditioning and air-handling infrastructure.
However, the recovered heat does not provide an added value
and needs to be discarded. On the other hand, there is a con-
tinuous demand for cooling of power supplies, storage
servers and other non-water-cooled datacenter infrastructure.
Therefore, thermally driven heat pumps offer a solution to
utilize low-grade heat recovered from hot-water cooled
servers in order to provide the cooling for other air-cooled
datacenter components. In this scenario, heat recovery com-
bined with sorption cooling technology therefore enables
further improvements in datacenter efficiency even in hot
climates.

The synergies between the thermal management of servers


and photovoltaic cells have led to the definition of high-effi-
ciency systems in the fields of datacenters and energy gener-
ation. The design of the photovoltaic receiver modules with
Figure 1: Lab demonstration of a nine-cell, water-cooled integrated cooling was done at the IBM Zurich Research Lab
photovoltaic receiver module. and the overall Sunflower is being built by a new company,
Dsolar. Dsolar is part of Airlight Energy which specializes in
operated under this extreme illumination and, at the same solar power technology. Their contribution is an inexpensive
time, a large fraction of the incoming sunlight which is not implementation of the array of mirrors in each of which a
converted to electricity can be captured as heat. reflecting plastic film is shaped by a pressure difference in a
lightweight concrete casing. The sunflower has a tracking
In the “Sunflower” implementation, 36 elliptic mirrors cov- mechanism to follow the path of the sun in the course of a
ering a 40 square-meter area achieve this focusing in a ten- day. The innovative implementation is inexpensive to the
meter high “sunflower”. The rated capacity of the system is point where the hope is that the power generation will be two
10 kW electrical power output at a solar-to-electrical effi- or three times less expensive than standard technology.
ciency of 25% and 22 kW thermal output at a solar-to-
thermal efficiency of at least 55%. Overall this is an 80% Links:
usage of the sun’s energy. The hot water can be used to pro- http://ercim-news.ercim.eu/en79/special/using-waste-heat-
duce additional electrical power, heating (or even cooling) from-data-centres-to-minimize-carbon-dioxide-emission
buildings or water desalination. In hot countries, the demand Press release:
for heating is dwarfed by the demand for cooling. In the http://www.zurich.ibm.com/news/14/dsolar.html
Middle East, for example, 90% of all electricity is consumed
for air-conditioning in the summer months. The thermal TED talk:
output of the Sunflower system can be used to provide valu- https://www.youtube.com/watch?v=j5Bh0AfuiUg&fea-
able cooling by means of thermally driven heat pumps, such ture=youtu.be
as adsorption or absorption chillers [3]. The ability to drive a
refrigeration cycle using heat from the concentrated photo- References:
voltaic system is a key value proposition in hot climates. [1] G. I. Meijer, T. Brunschwiler, S. Paredes, B. Michel,
“Using Waste Heat from Data Centres to Minimize Carbon
In fact, thermally driven heat pumps represent a promising Dioxide Emission”, ERCIM News, No. 79, October, 2009.
technology to utilize even low-grade heat in scenarios where
there is little or no demand for heating. Hot-water cooled dat- [2] P. Ruch, et al.: “Toward 5-Dimensional Scaling: How
acenters in warm climates, for example, are still more effi- Density Improves Efficiency in Future Computers”, IBM J.
Res. Develop., vol. 55 (5), 15:1-15:13, October 2011.

[3] P. Ruch, et al.: “Heat-driven adsorption chiller systems


© Dsolar

for sustainable cooling applications”, in proc. of the 11th


International Energy Agency Heat Pump Conference, Mon-
tréal, Canada, 2014.

Please contact:
Bruno Michel
IBM Zurich Research Lab, Switzerland
E-mail: bmi@zurich.ibm.com

Figure 2: Three energy-harvesting “sunflowers” in a field of


conventional sunflowers.

50 ERCIM NEWS 101 April 2015


carried by data is frequently not recognized because the com-
VAVId– Handling Big data pany does not have the necessary data extraction methods at
its disposal. This is precisely where the VAVID project has
The German VAVID project develops improved set its sights. VAVID is the German acronym for
techniques for data compression as well as new "Vergleichende Analyse von ingenieurrelevanten Mess- und
methods of data analysis, data management and Simulationsdaten" or “Comparative Analysis of Engineering
interactive data visualization. Measurements and Simulation Data.”

VAVID allows technology firms to get a better grip on the The data being studied by the project are numerical simula-
massive amount of data they need to handle. The partners in tion results data from the automotive and wind industries as
this project are developing methods to tackle the enormous well as measurement data taken from wind turbine moni-
volumes of data that accumulate at engineering departments. toring systems. By performing joint and comparative
Examples of such data include simulation results and the analysis of data from different industries, the partners are in
sensor data received from machines and installations. VAVID the first project phase developing a methodology for efficient
works by using comparative analysis and data compression to data analysis. These methods and techniques are going into
reduce data to its relevant core. This saves on the costs of data the creation of a high-performance data management system
storage and creates the transparency needed by engineers to that will allow centralized data storage as well as efficient
optimize both production and products. VAVID is being coor- data access and retrieval.
dinated by the Fraunhofer Institute for Algorithms and
Scientific Computing (SCAI) and is receiving 2.2 million € in The second phase will focus on the end user by developing
support from the German Ministry of Education and Research innovative, universally applicable software components that
(BMBF) under its Big Data program. can later be deployed in other industries. Examples of note
here include the fields of aviation and mechanical and plant
engineering (industrial plant).

The eight partners participating in the project reflect the


cooperative effort being made to transfer academic knowl-
edge to industrial practice and to orient research to the needs
of industry: Fraunhofer SCAI , Bosch Rexroth Monitoring
Systems GmbH in Dresden, GE Global Research in
Garching, GNS mbH in Braunschweig, SCALE GmbH in
Dresden, SIDACT GmbH in Sankt Augustin, Center for
Information Services and High Performance Computing
(ZIH) at TU Dresden and the Faculty of Computer Science,
Databases department at TU Dresden. The project further-
more cooperates with associated partners AUDI AG in
Ingolstadt, ParStream GmbH in Cologne and Volkswagen
AG in Wolfsburg. The associated partners from the automo-
tive industry contribute to the joint project by describing the
The VAVID project is developing methods to tackle the enormous real-world requirements of industry and by supplying rele-
volumes of data that accumulate at engineering departments, such as vant sample data for use in the project.
data from simulation results.
One aim of the VAVID project is to concentrate research and
development efforts and point them toward Big Data tech-
nologies that can be used in many sectors of industry. A fur-
In today's production environment, numerical simulation has ther objective is to generally strengthen the German informa-
become an indispensable part of product development. tion and communications technology industry and to boost
Before fabrication begins, it is essential to computationally the competitiveness of German companies. The VAVID
analyze the product's characteristics in a way that mirrors project started in September 2014 and is set to run through
reality as faithfully as possible. The computations and high- August 2017.
performance computer (HPC) systems required for this task
are generating an ever growing mountain of data. An expo- Link:
nential rise in data volumes is also being seen due to the http://www.vavid.de
acquisition of sensor data during the operation of machines
and plant. These measurement data allow engineers to draw Please contact:
important conclusions on how well control systems are Jochen Garcke, Fraunhofer SCAI
working and how they can further optimize production. E-mail: jochen.garcke@scai.fraunhofer.de

The huge amount of data poses great challenges to tech-


nology companies. Moving large data packets around the
company or to external partners, and archiving all this data,
requires a powerful IT infrastructure, something that is often
extremely cost-intensive. Moreover, important information

ERCIM NEWS 101 April 2015 51


Events

Call for Papers Call for Papers Call for Participation

Information Security IC3K - 7th Joint AITA 2015 -


Conference - ISC 2015 Conference on Advanced Infrared
Trondheim, Norway, Knowledge discovery, Technology and
9-11 September 2015
Knowledge Engineering Applications
The Information Security Conference
(ISC), which started as a workshop and Knowledge Pisa, Italy, 29 September - 2 October
(ISW) in 1997, is a well-established and 2015
highly reputable international confer- Management
ence that is held yearly. It has been held The 13th International Workshop on
in five different continents. ISC 2015 is Lisbon, 12-14 November 2015 Advanced Infrared Technology and
organized by the Department of Applications will assess the state of the
Telematics at the Norwegian University The purpose of the IC3K is to bring art of the technology in the Infrared
of Science and Technology (NTNU). together researchers, engineers and bands and to present its most interesting
practitioners on the areas of Knowledge applications. In the 13th AITA edition,
Topics: Discovery, Knowledge Engineering and special emphasis will be given to the
The conference seeks submissions on Knowledge Management. IC3K is com- following topics:
novel theoretical and practical results in: posed of three co-located conferences: • Advanced technology and materials
access control, accountability, • KDIR - 7th International Conference • Smart and fiber-optic sensors
anonymity and pseudonymity, applied on Knowledge Discovery and Infor- • Thermo-fluid dynamics
cryptography, authentication, biomet- mation Retrieval • Biomedical applications
rics, computer forensics, critical infra- • KEOD - 7th International Conference • Environmental monitoring
structure security, cryptographic proto- on Knowledge Engineering and • Aerospace and industrial applications
cols, database security, data protection, Ontology Development • Nanophotonics and Nanotechnologies
data/system integrity, digital right man- • KMIS - 7th International Conference • Astronomy and Earth observation
agement, economics of security and pri- on Knowledge Management and • Non-destructive tests and evaluation
vacy, electronic frauds, embedded secu- Information Sharing. • Systems and applications for the cul-
rity, formal methods in security, identity tural heritage
management, information dissemination Deadlines: • Image processing and data analysis
control, information hiding & water- • Regular paper submission: 2 June • Near-, mid-, and far infrared systems.
marking, intrusion detection, network 2015
security, peer-to-peer security, privacy, • Regular paper authors notification: Considering the importance of cultural
secure group communications, security September 1, 2015 heritage in Italy and the excellence
in information flow, security for Internet • Regular paper camera ready and reg- achieved by Italian researchers and
of Things, security for mobile code, istration: September 30, 2015. operators in this domain, a technical
secure cloud computing, security in seminar entitled “Techniques for
location services, security modeling & More information: infrared diagnostics and documentation
architectures, security and privacy in http://www.ic3k.org/Home.aspx in the field of cultural heritage” will
social networks, security and privacy in also be organized.
pervasive and ubiquitous computing,
security of eCommerce, eBusiness and Important dates:
eGovernment, security models for • 30 April 2015: Extended abstract sub-
ambient intelligence environments, trust mission
models and trust policies. • 31 May 2015: Notification of accept-
ance
Important dates: • 30 June 2015: Revised extended
• Paper submission deadline: April 27, abstract submission.
2015
• Acceptance notification: June 12, The workshop is organized by the
2015 Fondazione "Giorgio Ronchi", the
• Proceedings version: July 1, 2015 Istituto di Fisica Applicata "Nello
Carrara" (CNR-IFAC), the Istituto per
More information: le Tecnologie delle Costruzioni (CNR-
http://isc2015.item.ntnu.no/index.php ITC), the Istituto di Scienza e
Tecnologie dell'Informazione
"Alessandro Faedo" (CNR-ISTI).

More information:
http://ronchi.isti.cnr.it/AITA2015/

52 ERCIM NEWS 101 April 2015


Call for Participation Verification, validation and evaluation Call for Participation
of resilience:
7th International • 3Modelling and model based analysis ICEC 2015 -
of resilience properties;
Workshop on • 3Formal and semi-formal techniques 14th International
for verification and validation;
Software Engineering • 3Experimental evaluations of resilient Conference
systems;
for Resilient Systems • 3Quantitative approaches to ensuring on Entertainment
resilience;
Paris, 7-8 September 2015 • 3Resilience prediction. Computing
The way software is developed is Case studies & applications Trondheim, Norway, 30. September -
changing. It must take into account mul- • 3Empirical studies in the domain of 2 October 2015
tifaceted constraints like unpredictable resilient systems;
markets, evolving customer require- • 3Methodologies adopted in industrial The IFIP International Conference on
ments, pressures of shorter time-to- contexts; Entertainment Computing is the pri-
market, etc. At the same time, software • 3Cloud computing and resilient serv- mary forum for disseminating and
is controlling critical functionalities in ice provisioning; showcasing research results relating to
several domains like transportation, • 3Resilient cyber-physical systems and the creation, development and use of
health care, manufacturing, and IT infrastructures; digital entertainment. The conference
infrastructures. As a result, modern soft- • 3Global aspects of resilience engi- brings together practitioners, aca-
ware systems require on one side neering: education, training and coop- demics, artists and researchers inter-
adding frequently (daily or weakly) new eration. ested in design, practice, implementa-
features, functionalities, or new ver- tion, application and theoretical founda-
sions of software artifacts according to Contributions tions of digital entertainment.
changing contexts, business opportuni- We welcome relevant contributions in
ties, or customer’s feedbacks, on the the following forms: Fun, joy and excitement have been
other side ensuring their resilience – an • 3Technical papers describing original strong driving forces for human devel-
ability of the system to persistently theoretical or practical work; opment through history. Kids play and
deliver its services in a dependable way • 3Experience/Industry papers describ- grow. Today we experience how tools,
even when facing changes, unforeseen ing practitioner experience or field technology, methods and theory devel-
failures and intrusions. study, addressing an application oped for the entertainment of people are
domain and the lessons learned; taken into use for other purposes. A two
From this year SERENE is becoming • 3PhD Forum papers describing objec- way interaction is growing and we like
part of EDCC, the European tives, methodology, and results at an to nurture it.
Dependable Computing Conference. early stage in research;
• 3Project papers describing goals and Authors with background in domains
Topics results of ongoing projects; such as health, education, media, sport,
The SERENE 2015 workshop provides • 3Tool papers presenting new tools or are invited to contribute and participate,
a forum for researchers and practi- new versions of existing tools that of course in addition to people working
tioners to exchange ideas on advances support the development of resilient in the core areas of entertainment com-
in all areas relevant to software engi- systems. puting. We solicit paper, poster and
neering for resilient systems, including, demonstration submissions, as well as
but not limited to: Important Dates proposals for workshops and tutorials.
• Submission due: 24 April 2015 IFIP International Conference on
Development of resilient systems • 3Authors notification: June 19, 2015 Entertainment Computing is the longest
• 3Incremental development processes • 3Camera ready papers: July 1, 2015. established and most prestigious con-
for resilient systems; ference in the field of entertainment
• 3Requirements engineering & re- The workshop is organised by the computing. The conference is the pri-
engineering for resilience; ERCIM Working Group SERENE. mary forum for disseminating and
• 3Frameworks, patterns and software showcasing research results relating to
architectures for resilience; More information: the creation, development and use of
• 3Engineering of self-healing auto- http://serene.disim.univaq.it/2015/ digital entertainment. The conference
nomic systems; brings together practitioners, aca-
• 3Design of trustworthy and intrusion- demics, artists and researchers inter-
safe systems; ested in design, practice, implementa-
• 3Resilience at run-time (mechanisms, tion, application and theoretical founda-
reasoning and adaptation). tions of digital entertainment.

More information:
http://icec2015.idi.ntnu.no/

ERCIM NEWS 101 April 2015 53


Events

1955-2015: Call for Papers • Verification, validation and evalua-


tion of resilience (Modelling and
ITC Celebrates its SERENE 2015 - model based analysis of resilience
properties; Formal and semi-formal
60th Anniversary! 7th International techniques for verification and vali-
dation; Experimental evaluations of
Ghent, Belgium, 8-10 September 2015 Workshop on resilient systems; Quantitative
approaches to ensuring resilience;
It is a pleasure to announce that the Software Engineering Resilience prediction);
International Teletraffic Congress (ITC) • Case studies & applications (Empiri-
will celebrate its 60th anniversary. Over for Resilient Systems cal studies in the domain of resilient
the past 60 years, ITC has provided a systems; Methodologies adopted in
forum for leading researchers from aca- Paris, France, 7-8 September 2015 industrial contexts; Cloud computing
demia and industry to present and dis- and resilient service provisioning;
cuss key technological and methodolog- The SERENE 2015 workshop provides Resilient cyber-physical systems and
ical advances in the design, performance a forum for researchers and practi- infrastructures; Global aspects of
evaluation and control of communication tioners to exchange ideas on advances resilience engineering: education,
networks, protocols and applications and in all areas relevant to software engi- training and cooperation).
in traffic measurement and management. neering for resilient systems. It is co-
located with the 11th European Important dates:
This year the 27th ITC congress takes Dependable Computing Conference • Submission due: 24 April 2015
place in Ghent, Belgium. The theme of (EDCC) 2015. • Authors notification: 19 June 2015
ITC 2015 is “Traffic, Performance and • Camera ready papers: 1 July 2015
Big Data” reflecting today’s networking Major topics of interest include, but are
challenges. not limited to: The SERENE Workshop is organised
• Development of resilient systems by the ERCIM Working on Software
With the emergence of the Internet of (Incremental development processes Engineering for Resilient Systems.
Things, the number of devices being for resilient systems; Requirements
connected to the Internet is steadily engineering & re-engineering for More information:
growing and huge amounts of data are resilience; Frameworks, patterns and http://serene.disim.univaq.it/2015
being generated worldwide. Big data software architectures for resilience; https://www.linkedin.com/groups?hom
brings new traffic and performance Engineering of self-healing autonom- e=&gid=4365850&trk=my_groups-
related challenges and calls for a deep ic systems; Design of trustworthy and tile-grp
revisit to the methodological tools that intrusion-safe systems; Resilience at http://slideshare.net/SERENEWorkshop
were traditionally used for performance run-time (mechanisms, reasoning and http://edcc2015.lip6.fr
evaluation and traffic engineering. New adaptation);
models and approaches are needed to
investigate big data characteristics in
terms of volume, velocity and variability
and their impact on network perform-
ance; new solutions have to be designed
to efficiently and securely manage infor-
mation; new techniques are needed to PhD Positions Available
support all phases of network planning,
design and optimization. in the BigStorage European Training Network
ITC represents a wide and lively com- BigStorage is an European Training Network (ETN) whose main goal is to train
munity of researchers and practitioners future data scientists in order to enable them and us to apply holistic and interdisci-
dedicated to push back the limits of plinary approaches for taking advantage of a data-overwhelmed world, which
knowledge in the area of networking. As requires HPC and Cloud infrastructures with a redefinition of storage architectures
such, ITC regularly organizes events underpinning them – focusing on meeting highly ambitious performance and energy
like Congresses, Specialist Seminars usage objectives.
and Workshops in order to discuss the
latest changes in the modelling, design The network is looking for 15 PhD students to fill exciting opportunities to gain in
and performance of communication sys- depth skills cross cutting the interesting topics of BigStorage. Positions are available
tems, networks and services. As a recog- based in both Academic and Industrial partner institutions in Spain, Germany,
nized forum, ITC events attract partici- France, UK and Greece and they have a duration of 36 months. PhD students will
pants from all over the world. take advantage of several training activities, such as Summer Schools, Seminars,
Secondments and Internships.
Join the ITC community to celebrate this
significant anniversary and prepare the More information:
future of ICT in the attractive city of A detailed description of the available positions can be found at
Ghent, Belgium! http://www.itc27.org/ http://bigstorage.oeg-upm.net/jobs.html

54 ERCIM NEWS 101 April 2015


In Brief

25 Years of Java Bug Fixed with Formal


Python at CWI Methods
In February an interview with Researchers from the Formal Methods group at CWI fixed a
Guido van Rossum was pub- bug in programming language Java in February 2015. They
lished on the ACM website, cel- found an error in a broadly applied sorting algorithm,
ebrating 25 years of Python. TimSort, which could crash programs and threaten security.
This popular programming lan- The bug had already been known from 2013 but was never
guage originates from CWI in correctly resolved. When researcher Stijn de Gouw
Amsterdam, where Van Rossum attempted to prove the correctness of TimSort, he encoun-
designed Python in December 1989 and finished the first tered the bug. His bug report with an improved version has
working version in the first months of 1990. He named the now been accepted. This version of TimSort is used by
language after his favourite British comedy series Monty Android.
Python's Flying Circus.
Java is broadly used because it provides a lot of support in
Science journalist Bennie Mols, author of the ACM article, the form of libraries. TimSort is part of the ‘java.util.Arrays’
writes: “For many years, Python has appeared on the list of and ‘java.util.Collections’ libraries. When a bug occurs
the ten most-utilized computer languages in the world. there, it will appear on many places. Frank de Boer, head of
Companies like Dropbox, Google, Mozilla, and Walt Disney the Formal Methods group says: “So far, it was one of the
Animation Studios are large users of Python, as are banks, hardest correctness proofs ever of an existing Java library. It
universities and institutions such as NASA and CERN.” On required more than two million rules of inference and thou-
Python’s success Van Rossum told Mols: “Python is easy to sands of manual steps. With such an important language like
learn and easy to use. It’s also a great tool for scientists who Java, it is important that software does not crash. This result
work interactively with data. Python has been available illustrates the importance of formal methods for society.”
according to the open source philosophy, even before the The study was co-funded by the EU project Envisage.
term ‘open source’ was invented. Python users feel part of a
community and are very active in making improvements.” More information:
http://www.cwi.nl/news/2015/java-bug-fixed-formal-
More information: methods-cwi
http://cacm.acm.org/news/183638-python-at-25/fulltext

MOOC on “Binaural Hearing


for Robots”
W3C Launches First HTML5
A Massive Open Online Course (MOOC) “Binaural Hearing
for Robots” will be available on the platform France Course in New Partnership
Université Numérique from 11 May to 12 June 2015. It will
be taught by Radu Horaud, research director at Inria with edX
Grenoble Rhône-Alpes.
In support of its on-going commitment to developer training
This course addresses fundamental issues in robot hearing programs, the W3C today announced a new member partner-
and describes methodologies requiring two or more micro- ship with edX on its Massive Open Online Course (MOOC)
phones embedded into a robot head thus enabling sound- platform under the name W3Cx. The W3Cx courses mean
source localization, sound-source separation, and fusion of that thousands of developers around the world will have
auditory and visual information. The course is intended for greater access to high quality training programs developed
students with good background in signal processing and by W3C.
machine learning. It is also valuable to PhD students,
researchers and practitioners who work in signal and image The first W3Cx course, HTML5-part 1, will focus on Web
processing, machine learning, robotics, or human-machine design fundamentals at an intermediate level. It is widely
interaction and who wish to acquire novel competence in recognized that HTML5 is and will be the essential tech-
binaural hearing methodologies. The course material will nology for organizations delivering applications across mul-
allow the attendants to design and develop robot and tiple platforms. HTML5-part 1 will be taught by Michel
machine hearing algorithms. Buffa Professor at the University of Côte d’Azur (UFR
Sciences). The W3Cx course HTML5-part 1 starts 1 June
The course is provided by Inria through the project IDEFI 2015.
uTOP (Open MultiPartner University of Technology).
More information:
More information: https://www.w3.org/2015/03/w3cx-launch.html.en
https://www.france-universite-numerique- https://www.edx.org/course/learn-html5-w3c-w3cx-html5-1x
mooc.fr/courses/inria/41004/session01/about

ERCIM NEWS 101 April 2015 55


ERCIM - the European Research Consortium for Informatics and Mathematics is an organisa-
tion dedicated to the advancement of European research and development, in information
technology and applied mathematics. Its member institutions aim to foster collaborative work
within the European research community and to increase co-operation with European industry.

ERCIM is the European Host of the World Wide Web Consortium.

Consiglio Nazionale delle Ricerche Norwegian University of Science and Technology


Area della Ricerca CNR di Pisa Faculty of Information Technology, Mathematics and Electri-
Via G. Moruzzi 1, 56124 Pisa, Italy cal Engineering, N 7491 Trondheim, Norway
http://www.iit.cnr.it/ http://www.ntnu.no/

SBA Research gGmbH


Czech Research Consortium Favoritenstraße 16, 1040 Wien
for Informatics and Mathematics http://www.sba-research.org
FI MU, Botanicka 68a, CZ-602 00 Brno, Czech Republic
http://www.utia.cas.cz/CRCIM/home.html

SICS Swedish ICT


Box 1263,
SE-164 29 Kista, Sweden
Centrum Wiskunde & Informatica http://www.sics.se/
Science Park 123,
NL-1098 XG Amsterdam, The Netherlands
http://www.cwi.nl/
Spanish Research Consortium for Informatics and Mathematics
D3301, Facultad de Informática, Universidad Politécnica de Madrid
28660 Boadilla del Monte, Madrid, Spain,
http://www.sparcim.es/

Fonds National de la Recherche


6, rue Antoine de Saint-Exupéry, B.P. 1777
L-1017 Luxembourg-Kirchberg
Science and Technology Facilities Council
http://www.fnr.lu/
Rutherford Appleton Laboratory
Chilton, Didcot, Oxfordshire OX11 0QX, United Kingdom
http://www.scitech.ac.uk/

FWO F.R.S.-FNRS
Egmontstraat 5 rue d’Egmont 5 Magyar Tudományos Akadémia
B-1000 Brussels, Belgium B-1000 Brussels, Belgium Számítástechnikai és Automatizálási Kutató Intézet
http://www.fwo.be/ http://www.fnrs.be/ P.O. Box 63, H-1518 Budapest, Hungary
http://www.sztaki.hu/

University of Cyprus
Foundation for Research and Technology - Hellas P.O. Box 20537
Institute of Computer Science 1678 Nicosia, Cyprus
P.O. Box 1385, GR-71110 Heraklion, Crete, Greece http://www.cs.ucy.ac.cy/
FORTH http://www.ics.forth.gr/

University of Geneva
Centre Universitaire d’Informatique
Battelle Bat. A, 7 rte de Drize, CH-1227 Carouge
Fraunhofer ICT Group
http://cui.unige.ch
Anna-Louisa-Karsch-Str. 2
10178 Berlin, Germany
http://www.iuk.fraunhofer.de/

University of Southampton
University Road
Southampton SO17 1BJ, United Kingdom
http://www.southampton.ac.uk/
INESC
c/o INESC Porto, Campus da FEUP,
Rua Dr. Roberto Frias, nº 378,
4200-465 Porto, Portugal Universty of Warsaw
Faculty of Mathematics, Informatics and Mechanics
Banacha 2, 02-097 Warsaw, Poland
http://www.mimuw.edu.pl/

Institut National de Recherche en Informatique


et en Automatique
B.P. 105, F-78153 Le Chesnay, France Universty of Wroclaw
http://www.inria.fr/ Institute of Computer Science
Joliot-Curie 15, 50–383 Wroclaw, Poland
http://www.ii.uni.wroc.pl/

I.S.I. - Industrial Systems Institute Technical Research Centre of Finland


Patras Science Park building PO Box 1000
Platani, Patras, Greece, GR-26504 FIN-02044 VTT, Finland
http://www.isi.gr/ http://www.vtt.fi/

Subscribe to ERCIM News and order back copies at http://ercim-news.ercim.eu/

Potrebbero piacerti anche