SlideShare a Scribd company logo
1 of 3
Download to read offline
Int. J. Advanced Networking and Applications
Volume: 6 Issue: 5 Pages: 2484-2486 (2015) ISSN: 0975-0290
2484
Internet of Things (IoT) Applicability in a
Metropolitan City
Dr. D Mohammed
Associate Professor with Saint Leo University in Florida
Email: dmohammed@lake.ollusa.edu
----------------------------------------------------------------------ABSTRACT-----------------------------------------------------------
Internet of Things (IoT)is defined here as a network of interconnected objects. These objects can include several
technological systems. This paper examines the wireless communication systems and IoT sensors. IoT is technically
feasible today, allowing people and things to be connected anytime, anyplace, with anything and anyone. IoT privacy is a
concern but security solutions exist today to solve these issues. A proposal is made to use secure IoT solutions in
supporting the metropolitan needs in San Antonio, Texas.
Key word: Internet of Things, Privacy, RFID, Sensors
--------------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: September 05, 2011 Date of Acceptance: October 20, 2011
--------------------------------------------------------------------------------------------------------------------------------------------------
1. Introduction
The Internet of Things (IoT) is a concept of globally
interconnected devices, objects and things. Generally it
is thought of as a wireless network of sensors whose
purpose is interconnecting all things. This technology
includes bar codes, sensors, smart cards, and voice
recognition. The IoT is not very known, and we need to
start where innovativeness and demand is common. The
place chosen is the progressive city government of San
Antonio, located in state of Texas. The San Antonio City
Council mandated that the metropolitan area has a
validated government need to provide cultural amenities
to the occupants of the city [1]. These amenities can be
provided by private and public organizations.
Additionally, these amenities should enhance the
downtown area through innovativetechnology. IoT is a
solution in thatthrough technology (anytime) it can
enhance downtown (anyplace)cultural
amenities(anything) for its occupants (anyone). So, our
object is clear, we have a stated need and we have a
solution that will incorporate IoT systems and concepts.
2. Architecture
The San Antonio Metropolitan IoT Architecture end goal
is to employ amesh network. This network could employ
various devices and networks as shown in Figure 1.
Figure 1 Mesh Network
Each entity, noted as a box in Figure 1, have a unique
characteristics and each entity can be anything within the
downtown San Antonio area. These entities can be
public or private entities. This architecture seems simple
enough but as of today IoT solutions has had limited
success. The major obstacles of IoT are: entity sensor
immature technology; limited internet addresses for all
the places or things; and the availability of the wired
internetin various cities [2]. Today’s RFID
IoTarchitecture as shown in Figure 2 is a simplistic
today. Several components and standards will be
required to insure privacy and implementation [3], [4],
[5].
Current RFID Architectures
Figure 2
RFID #1
RFID X
RFID #2
RFID
READER
Network
Interface
This architect entity requirement and their shortfalls
include the following:
Int. J. Advanced Networking and Applications
Volume: 6 Issue: 5 Pages: 2484-2486 (2015) ISSN: 0975-0290
2485
Discovery - Entity or subcomponents of the entity
can be discovered by any user. At a minimum, a
user can be a tourist or a resident. Discovery
shortfalls:
a. The sensor can be a Radio Frequency
Identifier Device (RFID) which has no
privacy.
b. Sensors can be cost prohibitive.
Any Object - Entity selected can be any object that
promotes the downtown area. At a minimum this is
any physical public or privately owned facility or
object in the Riverwalk downtown area. Any object
shortfalls:
a. The Internet Protocol 4 (IPv4) is the
existing standard that limits IP
addresses (232
) which will be a grave
systems issue forexpanding future
sensors with IP addresses.
b. Investments can be delayed if addresses
or objects are limited.
Communication - Entity must communicate with
any user. Communication shortfalls:
a. The wired internet is not available to all
citizens and has a direct impact in
completing our mesh network using the
network interface in Figure 1.
b. An unavailable internet limits the
“anytime” definition.
Privacy -Any user data shall maintain a high level
of privacy.The privacy shortfalladds more
complexity, which at times is added after the fact,
can be an overall architecture show stopper.
So if one look at an RIFD implementation issues and
requirements addressed above, it will require extensive
integration and design.
3.0 IoT Solutions
Below are the solutions for incorporating a future RFID
architecture.
3.1. RFID Solution/Discovery
RFID’s, also called tags can be active or passive. Passive
is a tag without power and an active tag has a power
source. The tag hardware consists if active, a battery, the
integrated chip (IC), the antenna, and the enclosure.
Since our application for the city includes pedestrians
walking the Riverwalk, the tag requires a potential
transmit range ofseveral feet. The passive tag hardware
is a few inches in length which is ideal since this can be
mounted in various cultural or commercial fixtures along
the Riverwalk. Our RFID network in the Riverwalk
downtown area would at a minimum consist of 100
RFID sites. The tag would require the maximum storage
which is 512 bits, this equates to about 64 characters
which can accommodate a short description of all current
commercial or public points of interest. If a larger
description is required then multiple tags can be daisy-
chained.
3.2. IP Solution/Any Object
IPv4 is the current IP standard that can handle 4.3
million IP addresses. But today the new emerging
standard is IPv6 which can handle approximately
295
addresses. This meets our IP gap for RFIDs for the
entire planet and as long as the RFID architect plans his
network with IPv6 compatible devices, RFID
employment should not be a problem.
3.3Wired InternetSolution
This addresses the Communication and
Privacyshortfalls.Thoughwireless internet is convenient,
for most robust locations wired internet is a solid
requirement. The RFID architecture requires some form
of data management central office. This is mainly for
configuration control of data and insures privacy
compliance standards are adhered. San Antonio is a hub
for AT&T and the wired internet is not a problem for the
city. If we say the city is wired for the internet and then
the city would need to take some form of RFID data
management responsibility.
4.0 IOT Components
For the RFID Component one can consider a current IC
is the MONZA 4® from the Impingcompany which is
apassive tag and transmits at 860 to 960 MHz (Class
0)which is defined by Electronic Product Code (EPC)
Global and International Standards Organization(ISO)
agencies. These tags transmit if it receives a magnetic
field, this transmission can be generated by a near-field
transmitter. A key issue here, a magnetic field decreases
quickly in respect to distance. This is a natural inherent
security deterrent since tags cannot be changed from a
distance. The tag transmission distance is approximately
6 feet if using a traveling wave antenna. This distance
meets our Riverwalk criteria since the side walk is rather
narrow. The traveling wave antenna is critical since it
can use the entire UHF frequency range, it does not have
to be tuned to the reader and from an IoT advantage can
be daisy chained.
The tag that is required to insure privacy is defined in
ISO 18000-6. This enables the owner to zerioze the tag
bits structure, called the kill feature and is stated in part
C of the ISO standard.A security issue for the San
Antonio Riverwalk is individuals spoofing the tag. The
countermeasure to this is killing the tag ifthe serial
number has changed. Each tag has unique serial number.
The tag owner would need to monitor the tag as needed
to insure tag is valid. Identity theft is a grave concern
these days with bad people doing bad things to other
people but in terms of the tag information description, all
this information is public information. So there is no risk
in identify theft if the IC data or tag was stolen.
For the Internet Component, the issue on IP addresses is
to make sure all devices connected to the RFID network
follow an IPv6 standard. The protocol for RFIDs needs
to be internet base which is defined by EPC
Global.Currently, the RFID at the Physical layer uses a
Int. J. Advanced Networking and Applications
Volume: 6 Issue: 5 Pages: 2484-2486 (2015) ISSN: 0975-0290
2486
similar standard as the bar code industry. The main
difference is that RFID’s associate an object to a serial
number and bar codes do not. At the datalink layer
RFID’s uses a tag protocol layer for HF or UHF Class 1
tags.
Considering the overall RFID components, figure 3
shows an RFID architecture that puts this in perspective.
Figure 3 shows how a typical near field readercould be
integrated with an IPhone. This particular reader works
with active tags, in our example we used a passive tag.
The IPhone would require an applet similar to Trapster.
This would allows users to vote on speed traps. In our
case, the user would click upon a tag intercept. The user
can now annotate on a Riverwalk map the location and
any other attributes defined by the applet.
San Antonio Riverwalk RFID Architecture
Figure 3
RFID #1
RFID X
RFID #2
RFID
READER
3G/4G
Phone
User
collaboration
(i.e. trapster like)
More Security and Privacy
RFID
Applet
5.0 Conclusion
Data privacy and security with the IoT will be an
ongoing challenge. However, based on the findings in
this paper, a recommendation for a Riverwalk RFID
Investment Plan should be drafted and presented to the
San Antonio Planning Commission. After which one
needs to obtain the City’s approval to conduct an RFID
demonstration along the Riverwalk in San Antonio,
Texas. Upon a successful demonstration,
recommendations should be made to consider the
adoption of a long term implementation plan throughout
theRiverwalk area in San Antonio, Texas.
References
[1]. San Antonio City Council, “San Antonio Master
Plan Polices”, City Council Minutes, May 1997.
[2]. Lamberth, L., “The Difference Engine: Chattering
Boxes”, The Economist, Aug 2010.
[3]. Gibbs, C., “Mobile Security and the Internet of
Things”, Gigaom, Aug 2010.
[4]. Webber, R., “Internet of Things – New security
and privacy challenges”, Computer Law & Security
Review, Vol 26, 2010, pp. 23-30.
[5]. Mayer, C.P., “Security and Privacy Challenges in
the Internet of Things”, Electronic
Communications of the EASST, Vol 17, 2009, pp.
1-17.
Author Biography
Dr. D Mohammed is currently employed as an
Associate Professor with Saint Leo University in Florida.
He currently teaches undergraduate and graduate level
courses in Network Design, Information security, and
Cyber security. He has worked extensively in both the
public and private sectors to improve the security of their
critical information systems. His research focuses on
improving the security of network systems.

More Related Content

What's hot

Elements of IoT connectivity technologies
Elements of IoT connectivity technologiesElements of IoT connectivity technologies
Elements of IoT connectivity technologiesusman sarwar
 
A Review on Wireless Home Automation Systems based on Zigbee Technology
A Review on Wireless Home Automation Systems based on Zigbee TechnologyA Review on Wireless Home Automation Systems based on Zigbee Technology
A Review on Wireless Home Automation Systems based on Zigbee Technologyrahulmonikasharma
 
Radio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutionsRadio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutionsAhmad Sharifi
 
Presentation for IoT workshop at Sinhagad University (Feb 4, 2016) - 1/2
Presentation for IoT workshop at Sinhagad University (Feb 4, 2016) - 1/2Presentation for IoT workshop at Sinhagad University (Feb 4, 2016) - 1/2
Presentation for IoT workshop at Sinhagad University (Feb 4, 2016) - 1/2Bhavin Chandarana
 
IoT and Low Power WANs Can Enable Smart Cities and Smart Health 4-8-17
IoT and Low Power WANs Can Enable Smart Cities and Smart Health 4-8-17IoT and Low Power WANs Can Enable Smart Cities and Smart Health 4-8-17
IoT and Low Power WANs Can Enable Smart Cities and Smart Health 4-8-17Ed Hightower
 
V2 i10 ijertv2is100048
V2 i10 ijertv2is100048V2 i10 ijertv2is100048
V2 i10 ijertv2is100048Thaniga Vel
 
SURVEY ON CARD LESS TRANSACTION USING EMERGING TECHNOLOGIES
SURVEY ON CARD LESS TRANSACTION USING EMERGING TECHNOLOGIESSURVEY ON CARD LESS TRANSACTION USING EMERGING TECHNOLOGIES
SURVEY ON CARD LESS TRANSACTION USING EMERGING TECHNOLOGIESvivatechijri
 
NB-IoT incorporated into 5G international standards
NB-IoT incorporated into 5G international standardsNB-IoT incorporated into 5G international standards
NB-IoT incorporated into 5G international standardsAntenna Manufacturer Coco
 
Study of ZIGBEE Technology and its Application in Wireless Automation System
Study of ZIGBEE Technology and its Application in Wireless Automation SystemStudy of ZIGBEE Technology and its Application in Wireless Automation System
Study of ZIGBEE Technology and its Application in Wireless Automation Systemijtsrd
 
NB-IoT and LoRa of LPWAN Market Analysis in 2021
NB-IoT and LoRa of LPWAN Market Analysis in 2021NB-IoT and LoRa of LPWAN Market Analysis in 2021
NB-IoT and LoRa of LPWAN Market Analysis in 2021Antenna Manufacturer Coco
 
Internet of things a survey on enabling technologies, protocols and applicat...
Internet of things  a survey on enabling technologies, protocols and applicat...Internet of things  a survey on enabling technologies, protocols and applicat...
Internet of things a survey on enabling technologies, protocols and applicat...Mustafa Sadiq
 
Io t standard_bis_arpanpal
Io t standard_bis_arpanpalIo t standard_bis_arpanpal
Io t standard_bis_arpanpalArpan Pal
 
M2M Communication
M2M CommunicationM2M Communication
M2M CommunicationFabMinds
 
A Review of Low Power Wide Area Technology in Licensed and Unlicensed Spectru...
A Review of Low Power Wide Area Technology in Licensed and Unlicensed Spectru...A Review of Low Power Wide Area Technology in Licensed and Unlicensed Spectru...
A Review of Low Power Wide Area Technology in Licensed and Unlicensed Spectru...journalBEEI
 
Co-located RFID Systems Unite!
Co-located RFID Systems Unite!Co-located RFID Systems Unite!
Co-located RFID Systems Unite!reelyActive
 
LoRaWAN Deployment Models
LoRaWAN Deployment ModelsLoRaWAN Deployment Models
LoRaWAN Deployment ModelsJohan Stokking
 
Latest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityLatest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityIOSR Journals
 
What's wrong with Lora? -- C&T RF Antennas Inc
What's wrong with Lora? -- C&T RF Antennas IncWhat's wrong with Lora? -- C&T RF Antennas Inc
What's wrong with Lora? -- C&T RF Antennas IncAntenna Manufacturer Coco
 

What's hot (20)

Characteristics of the 6 wireless protocols
Characteristics of the 6 wireless protocolsCharacteristics of the 6 wireless protocols
Characteristics of the 6 wireless protocols
 
Elements of IoT connectivity technologies
Elements of IoT connectivity technologiesElements of IoT connectivity technologies
Elements of IoT connectivity technologies
 
A Review on Wireless Home Automation Systems based on Zigbee Technology
A Review on Wireless Home Automation Systems based on Zigbee TechnologyA Review on Wireless Home Automation Systems based on Zigbee Technology
A Review on Wireless Home Automation Systems based on Zigbee Technology
 
Radio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutionsRadio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutions
 
IOT Networks
IOT NetworksIOT Networks
IOT Networks
 
Presentation for IoT workshop at Sinhagad University (Feb 4, 2016) - 1/2
Presentation for IoT workshop at Sinhagad University (Feb 4, 2016) - 1/2Presentation for IoT workshop at Sinhagad University (Feb 4, 2016) - 1/2
Presentation for IoT workshop at Sinhagad University (Feb 4, 2016) - 1/2
 
IoT and Low Power WANs Can Enable Smart Cities and Smart Health 4-8-17
IoT and Low Power WANs Can Enable Smart Cities and Smart Health 4-8-17IoT and Low Power WANs Can Enable Smart Cities and Smart Health 4-8-17
IoT and Low Power WANs Can Enable Smart Cities and Smart Health 4-8-17
 
V2 i10 ijertv2is100048
V2 i10 ijertv2is100048V2 i10 ijertv2is100048
V2 i10 ijertv2is100048
 
SURVEY ON CARD LESS TRANSACTION USING EMERGING TECHNOLOGIES
SURVEY ON CARD LESS TRANSACTION USING EMERGING TECHNOLOGIESSURVEY ON CARD LESS TRANSACTION USING EMERGING TECHNOLOGIES
SURVEY ON CARD LESS TRANSACTION USING EMERGING TECHNOLOGIES
 
NB-IoT incorporated into 5G international standards
NB-IoT incorporated into 5G international standardsNB-IoT incorporated into 5G international standards
NB-IoT incorporated into 5G international standards
 
Study of ZIGBEE Technology and its Application in Wireless Automation System
Study of ZIGBEE Technology and its Application in Wireless Automation SystemStudy of ZIGBEE Technology and its Application in Wireless Automation System
Study of ZIGBEE Technology and its Application in Wireless Automation System
 
NB-IoT and LoRa of LPWAN Market Analysis in 2021
NB-IoT and LoRa of LPWAN Market Analysis in 2021NB-IoT and LoRa of LPWAN Market Analysis in 2021
NB-IoT and LoRa of LPWAN Market Analysis in 2021
 
Internet of things a survey on enabling technologies, protocols and applicat...
Internet of things  a survey on enabling technologies, protocols and applicat...Internet of things  a survey on enabling technologies, protocols and applicat...
Internet of things a survey on enabling technologies, protocols and applicat...
 
Io t standard_bis_arpanpal
Io t standard_bis_arpanpalIo t standard_bis_arpanpal
Io t standard_bis_arpanpal
 
M2M Communication
M2M CommunicationM2M Communication
M2M Communication
 
A Review of Low Power Wide Area Technology in Licensed and Unlicensed Spectru...
A Review of Low Power Wide Area Technology in Licensed and Unlicensed Spectru...A Review of Low Power Wide Area Technology in Licensed and Unlicensed Spectru...
A Review of Low Power Wide Area Technology in Licensed and Unlicensed Spectru...
 
Co-located RFID Systems Unite!
Co-located RFID Systems Unite!Co-located RFID Systems Unite!
Co-located RFID Systems Unite!
 
LoRaWAN Deployment Models
LoRaWAN Deployment ModelsLoRaWAN Deployment Models
LoRaWAN Deployment Models
 
Latest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityLatest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless Security
 
What's wrong with Lora? -- C&T RF Antennas Inc
What's wrong with Lora? -- C&T RF Antennas IncWhat's wrong with Lora? -- C&T RF Antennas Inc
What's wrong with Lora? -- C&T RF Antennas Inc
 

Similar to IoT Applicability in Metropolitan Cities Examined

IOT and its communication models and protocols.pdf
IOT and its communication models and protocols.pdfIOT and its communication models and protocols.pdf
IOT and its communication models and protocols.pdfMD.ANISUR RAHMAN
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoTIRJET Journal
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoTIRJET Journal
 
IRJET- A Review Paper on Internet of Things(IoT) and its Applications
IRJET- A Review Paper on Internet of Things(IoT) and its ApplicationsIRJET- A Review Paper on Internet of Things(IoT) and its Applications
IRJET- A Review Paper on Internet of Things(IoT) and its ApplicationsIRJET Journal
 
Internet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless HibernationInternet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless HibernationIRJET Journal
 
Evolution of Mobile Communication(1G-6G) and IoT
Evolution of Mobile Communication(1G-6G) and IoTEvolution of Mobile Communication(1G-6G) and IoT
Evolution of Mobile Communication(1G-6G) and IoTMd.Imtiaz Ahmed
 
IRJET- Design and Implementation of Smart City using IoT
IRJET- Design and Implementation of Smart City using IoTIRJET- Design and Implementation of Smart City using IoT
IRJET- Design and Implementation of Smart City using IoTIRJET Journal
 

Similar to IoT Applicability in Metropolitan Cities Examined (20)

IoT - Introduction
IoT - IntroductionIoT - Introduction
IoT - Introduction
 
IOT and its communication models and protocols.pdf
IOT and its communication models and protocols.pdfIOT and its communication models and protocols.pdf
IOT and its communication models and protocols.pdf
 
IOT-Monograph .docx
IOT-Monograph .docxIOT-Monograph .docx
IOT-Monograph .docx
 
Questions in iot
Questions in iotQuestions in iot
Questions in iot
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
 
Iot
IotIot
Iot
 
7CS4_IOT_Unit-1.pdf
7CS4_IOT_Unit-1.pdf7CS4_IOT_Unit-1.pdf
7CS4_IOT_Unit-1.pdf
 
Iot
IotIot
Iot
 
IOT ajay binay.pdf
IOT ajay binay.pdfIOT ajay binay.pdf
IOT ajay binay.pdf
 
Internet Of Things
 Internet Of Things Internet Of Things
Internet Of Things
 
Lec2.pptx
Lec2.pptxLec2.pptx
Lec2.pptx
 
Lec2.pptx
Lec2.pptxLec2.pptx
Lec2.pptx
 
IoT _protocols.ppt
IoT _protocols.pptIoT _protocols.ppt
IoT _protocols.ppt
 
Iot
IotIot
Iot
 
IRJET- A Review Paper on Internet of Things(IoT) and its Applications
IRJET- A Review Paper on Internet of Things(IoT) and its ApplicationsIRJET- A Review Paper on Internet of Things(IoT) and its Applications
IRJET- A Review Paper on Internet of Things(IoT) and its Applications
 
IOT_PPT.pptx
IOT_PPT.pptxIOT_PPT.pptx
IOT_PPT.pptx
 
Internet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless HibernationInternet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless Hibernation
 
Evolution of Mobile Communication(1G-6G) and IoT
Evolution of Mobile Communication(1G-6G) and IoTEvolution of Mobile Communication(1G-6G) and IoT
Evolution of Mobile Communication(1G-6G) and IoT
 
IRJET- Design and Implementation of Smart City using IoT
IRJET- Design and Implementation of Smart City using IoTIRJET- Design and Implementation of Smart City using IoT
IRJET- Design and Implementation of Smart City using IoT
 

More from Eswar Publications

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyEswar Publications
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickEswar Publications
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Eswar Publications
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerEswar Publications
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Eswar Publications
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersEswar Publications
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...Eswar Publications
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemEswar Publications
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudyEswar Publications
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Eswar Publications
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Eswar Publications
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkEswar Publications
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)Eswar Publications
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemEswar Publications
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelEswar Publications
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesEswar Publications
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Eswar Publications
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Eswar Publications
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmEswar Publications
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasEswar Publications
 

More from Eswar Publications (20)

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A Survey
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s Click
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using Microcontroller
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality Parameters
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case Study
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon Perspectives
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC Algorithm
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed Antennas
 

Recently uploaded

Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 

Recently uploaded (20)

Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 

IoT Applicability in Metropolitan Cities Examined

  • 1. Int. J. Advanced Networking and Applications Volume: 6 Issue: 5 Pages: 2484-2486 (2015) ISSN: 0975-0290 2484 Internet of Things (IoT) Applicability in a Metropolitan City Dr. D Mohammed Associate Professor with Saint Leo University in Florida Email: dmohammed@lake.ollusa.edu ----------------------------------------------------------------------ABSTRACT----------------------------------------------------------- Internet of Things (IoT)is defined here as a network of interconnected objects. These objects can include several technological systems. This paper examines the wireless communication systems and IoT sensors. IoT is technically feasible today, allowing people and things to be connected anytime, anyplace, with anything and anyone. IoT privacy is a concern but security solutions exist today to solve these issues. A proposal is made to use secure IoT solutions in supporting the metropolitan needs in San Antonio, Texas. Key word: Internet of Things, Privacy, RFID, Sensors -------------------------------------------------------------------------------------------------------------------------------------------------- Date of Submission: September 05, 2011 Date of Acceptance: October 20, 2011 -------------------------------------------------------------------------------------------------------------------------------------------------- 1. Introduction The Internet of Things (IoT) is a concept of globally interconnected devices, objects and things. Generally it is thought of as a wireless network of sensors whose purpose is interconnecting all things. This technology includes bar codes, sensors, smart cards, and voice recognition. The IoT is not very known, and we need to start where innovativeness and demand is common. The place chosen is the progressive city government of San Antonio, located in state of Texas. The San Antonio City Council mandated that the metropolitan area has a validated government need to provide cultural amenities to the occupants of the city [1]. These amenities can be provided by private and public organizations. Additionally, these amenities should enhance the downtown area through innovativetechnology. IoT is a solution in thatthrough technology (anytime) it can enhance downtown (anyplace)cultural amenities(anything) for its occupants (anyone). So, our object is clear, we have a stated need and we have a solution that will incorporate IoT systems and concepts. 2. Architecture The San Antonio Metropolitan IoT Architecture end goal is to employ amesh network. This network could employ various devices and networks as shown in Figure 1. Figure 1 Mesh Network Each entity, noted as a box in Figure 1, have a unique characteristics and each entity can be anything within the downtown San Antonio area. These entities can be public or private entities. This architecture seems simple enough but as of today IoT solutions has had limited success. The major obstacles of IoT are: entity sensor immature technology; limited internet addresses for all the places or things; and the availability of the wired internetin various cities [2]. Today’s RFID IoTarchitecture as shown in Figure 2 is a simplistic today. Several components and standards will be required to insure privacy and implementation [3], [4], [5]. Current RFID Architectures Figure 2 RFID #1 RFID X RFID #2 RFID READER Network Interface This architect entity requirement and their shortfalls include the following:
  • 2. Int. J. Advanced Networking and Applications Volume: 6 Issue: 5 Pages: 2484-2486 (2015) ISSN: 0975-0290 2485 Discovery - Entity or subcomponents of the entity can be discovered by any user. At a minimum, a user can be a tourist or a resident. Discovery shortfalls: a. The sensor can be a Radio Frequency Identifier Device (RFID) which has no privacy. b. Sensors can be cost prohibitive. Any Object - Entity selected can be any object that promotes the downtown area. At a minimum this is any physical public or privately owned facility or object in the Riverwalk downtown area. Any object shortfalls: a. The Internet Protocol 4 (IPv4) is the existing standard that limits IP addresses (232 ) which will be a grave systems issue forexpanding future sensors with IP addresses. b. Investments can be delayed if addresses or objects are limited. Communication - Entity must communicate with any user. Communication shortfalls: a. The wired internet is not available to all citizens and has a direct impact in completing our mesh network using the network interface in Figure 1. b. An unavailable internet limits the “anytime” definition. Privacy -Any user data shall maintain a high level of privacy.The privacy shortfalladds more complexity, which at times is added after the fact, can be an overall architecture show stopper. So if one look at an RIFD implementation issues and requirements addressed above, it will require extensive integration and design. 3.0 IoT Solutions Below are the solutions for incorporating a future RFID architecture. 3.1. RFID Solution/Discovery RFID’s, also called tags can be active or passive. Passive is a tag without power and an active tag has a power source. The tag hardware consists if active, a battery, the integrated chip (IC), the antenna, and the enclosure. Since our application for the city includes pedestrians walking the Riverwalk, the tag requires a potential transmit range ofseveral feet. The passive tag hardware is a few inches in length which is ideal since this can be mounted in various cultural or commercial fixtures along the Riverwalk. Our RFID network in the Riverwalk downtown area would at a minimum consist of 100 RFID sites. The tag would require the maximum storage which is 512 bits, this equates to about 64 characters which can accommodate a short description of all current commercial or public points of interest. If a larger description is required then multiple tags can be daisy- chained. 3.2. IP Solution/Any Object IPv4 is the current IP standard that can handle 4.3 million IP addresses. But today the new emerging standard is IPv6 which can handle approximately 295 addresses. This meets our IP gap for RFIDs for the entire planet and as long as the RFID architect plans his network with IPv6 compatible devices, RFID employment should not be a problem. 3.3Wired InternetSolution This addresses the Communication and Privacyshortfalls.Thoughwireless internet is convenient, for most robust locations wired internet is a solid requirement. The RFID architecture requires some form of data management central office. This is mainly for configuration control of data and insures privacy compliance standards are adhered. San Antonio is a hub for AT&T and the wired internet is not a problem for the city. If we say the city is wired for the internet and then the city would need to take some form of RFID data management responsibility. 4.0 IOT Components For the RFID Component one can consider a current IC is the MONZA 4® from the Impingcompany which is apassive tag and transmits at 860 to 960 MHz (Class 0)which is defined by Electronic Product Code (EPC) Global and International Standards Organization(ISO) agencies. These tags transmit if it receives a magnetic field, this transmission can be generated by a near-field transmitter. A key issue here, a magnetic field decreases quickly in respect to distance. This is a natural inherent security deterrent since tags cannot be changed from a distance. The tag transmission distance is approximately 6 feet if using a traveling wave antenna. This distance meets our Riverwalk criteria since the side walk is rather narrow. The traveling wave antenna is critical since it can use the entire UHF frequency range, it does not have to be tuned to the reader and from an IoT advantage can be daisy chained. The tag that is required to insure privacy is defined in ISO 18000-6. This enables the owner to zerioze the tag bits structure, called the kill feature and is stated in part C of the ISO standard.A security issue for the San Antonio Riverwalk is individuals spoofing the tag. The countermeasure to this is killing the tag ifthe serial number has changed. Each tag has unique serial number. The tag owner would need to monitor the tag as needed to insure tag is valid. Identity theft is a grave concern these days with bad people doing bad things to other people but in terms of the tag information description, all this information is public information. So there is no risk in identify theft if the IC data or tag was stolen. For the Internet Component, the issue on IP addresses is to make sure all devices connected to the RFID network follow an IPv6 standard. The protocol for RFIDs needs to be internet base which is defined by EPC Global.Currently, the RFID at the Physical layer uses a
  • 3. Int. J. Advanced Networking and Applications Volume: 6 Issue: 5 Pages: 2484-2486 (2015) ISSN: 0975-0290 2486 similar standard as the bar code industry. The main difference is that RFID’s associate an object to a serial number and bar codes do not. At the datalink layer RFID’s uses a tag protocol layer for HF or UHF Class 1 tags. Considering the overall RFID components, figure 3 shows an RFID architecture that puts this in perspective. Figure 3 shows how a typical near field readercould be integrated with an IPhone. This particular reader works with active tags, in our example we used a passive tag. The IPhone would require an applet similar to Trapster. This would allows users to vote on speed traps. In our case, the user would click upon a tag intercept. The user can now annotate on a Riverwalk map the location and any other attributes defined by the applet. San Antonio Riverwalk RFID Architecture Figure 3 RFID #1 RFID X RFID #2 RFID READER 3G/4G Phone User collaboration (i.e. trapster like) More Security and Privacy RFID Applet 5.0 Conclusion Data privacy and security with the IoT will be an ongoing challenge. However, based on the findings in this paper, a recommendation for a Riverwalk RFID Investment Plan should be drafted and presented to the San Antonio Planning Commission. After which one needs to obtain the City’s approval to conduct an RFID demonstration along the Riverwalk in San Antonio, Texas. Upon a successful demonstration, recommendations should be made to consider the adoption of a long term implementation plan throughout theRiverwalk area in San Antonio, Texas. References [1]. San Antonio City Council, “San Antonio Master Plan Polices”, City Council Minutes, May 1997. [2]. Lamberth, L., “The Difference Engine: Chattering Boxes”, The Economist, Aug 2010. [3]. Gibbs, C., “Mobile Security and the Internet of Things”, Gigaom, Aug 2010. [4]. Webber, R., “Internet of Things – New security and privacy challenges”, Computer Law & Security Review, Vol 26, 2010, pp. 23-30. [5]. Mayer, C.P., “Security and Privacy Challenges in the Internet of Things”, Electronic Communications of the EASST, Vol 17, 2009, pp. 1-17. Author Biography Dr. D Mohammed is currently employed as an Associate Professor with Saint Leo University in Florida. He currently teaches undergraduate and graduate level courses in Network Design, Information security, and Cyber security. He has worked extensively in both the public and private sectors to improve the security of their critical information systems. His research focuses on improving the security of network systems.