• Aucun résultat trouvé

Semantically Enriched IoT Gateway for Wearable Devices

N/A
N/A
Protected

Academic year: 2022

Partager "Semantically Enriched IoT Gateway for Wearable Devices"

Copied!
4
0
0

Texte intégral

(1)

adfa, p. 1, 2011.

© Springer-Verlag Berlin Heidelberg 2011

Semantically Enriched IoT gateway for Wearable Devices

Kangho Hur1,2, Sangjin Shin1, Sungkwang Eom1, Minjae Song1 and Kyong-Ho Lee1

1Department of Computer Science, Yonsei University, Seoul, Republic of Korea

2Software Center, Samsung Electronics

{khhur, sjshin, skeom, mjsong}@icl.yonsei.ac.kr, khlee@cs.yonsei.ac.kr

Abstract. With the advance of wearable devices, an IoT (Internet of Things) gateway should support the efficient forwarding, processing, and provisioning of the streaming data obtained from them. We propose a semantically enriched IoT gateway working on a smartphone for wearable devices. The proposed gateway supports (a) an efficient consolidation and compression of heterogene- ous streaming sensor data, (b) privacy preserving data processing by semantic reasoning, and (c) a selective data sharing through their social networks accord- ing to a degree of sensitivity. Experimental results with the prototype imple- mentation show the potential of the proposed IoT gateway for novel user expe- riences based on semantic web technologies.

Keywords: Internet of Things (IoT), IoT Gateway, Wearable Device, Semantic Reasoning

1 Introduction

In the landscape of the Internet of Things (IoT), various physical objects such as wearable devices may be involved with their owners’ social networks. Thus, wearable devices can be part of human social networks and even build their own social net- works. This brings a new paradigm called Social Internet of Things (SIoT) [4], which integrates IoT and Social Network Services (SNS). In SIoT, as a bridge between het- erogeneous objects and the Internet, an IoT gateway has a role of forwarding, pro- cessing, and provisioning the data streams generated by objects [2]. Especially, con- sidering emerging wearable devices that cannot usually be connected to the Web di- rectly, gateways are required to enhance the full potential of IoT/SIoT.

However, current IoT gateways don't provide semantic information related to sen- sor data which are distributed among various wearable devices. The data streams obtained from wearable devices containing privacy sensitive information such as heartbeat rate can be published and shared through the Web. They may cause an unin- tended exposure of private data. Thus, gateways should ensure the privacy- preservation of sensitive data [3]. In this paper, to overcome the limitations of existing gateways, we propose a semantically enriched IoT gateway working on a user’s smartphone. The traditional semantic approaches were mainly performed on a server side (or cloud based) to guarantee better performance and accuracy. However, they do not guarantee the privacy-preservation of sensitive data.

(2)

2 The Proposed Architecture

As shown in Fig. 1, the proposed architecture is divided into three main layers:

• Data collecting layer (DCL): collects raw sensor data from wearable devices and consolidates/integrates raw data.

• Data abstraction layer (DAL): transforms the collected raw data into semantic data based on a domain ontology.

• Data sharing layer (DSL): shares the inferred semantic data with SNS groups de- pending on the sensitivity degree of data and the social distance from the groups.

Smartphone

Wearable Device 1

Wearable Device n

...

Wearable Devices Personalized IoT Gateway

Collect &

consolidate sensor data

Semantic annotation

& reasoning Data sharing Domain

Ontology Triple

Store SNS

...

Raw sensor

data Inferred semantic data

Data collecting layer (DCL)

Data abstraction layer (DAL)

Data sharing layer (DSL)

Fig. 1. Overall system architecture

Type Value Time Loc Type Value Time Loc Type Value Time Loc Type Loc Min Max Mean From To T 21.1 12:11:01 A T 21.1 12:11:01 A T 21.1 12:11:01 A T A 21 21 21.2 12:11:01 12:12:10 H 65 12:11:02 A H 65 12:11:02 A T 21.3 12:12:10 A H A 63 65 64 12:11:02 12:11:48

H 63 12:11:48 A H 63 12:11:48 A T B 7.1 7.3 7.2 12:13:25 12:16:11

T 21.3 12:12:10 A T 21.3 12:12:10 A H 65 12:11:02 A T A 20 20 19.7 20:05:35 20:10:12

T 7.3 12:13:25 B H 63 12:11:48 A … … … … …

T 7.1 12:16:11 B H 7.3 12:13:25 B

T 19.8 20:05:35 A H 7.1 12:16:11 B T 7.3 12:13:25 B

T 19.6 20:10:12 A T 7.1 12:16:11 B

… … T 19.8 20:05:35 A

T 19.6 20:10:12 A T 19.8 20:05:35 A T 19.6 20:10:12 A

… …

… …

Fig. 2. Process of data archiving 2.1 Data collecting/consolidating layer (DCL)

Since wearable devices collect heterogeneous sensor data continuously in real-time, an efficient mechanism of storing and processing streaming data is very important;

especially considering resource-constrained characteristics of mobile devices. To avoid processing a large amount of data on a smartphone itself, the proposed gateway transforms and merges the raw data in consideration of the time, location and sensor type, as shown in Fig. 2. In the first phase, we split streaming data into subsets with the same location (e.g., latitude and longitude). In the second phase once again, the streaming data is split into groups based on sensor types. Finally, we merge subsets into a single record that contains statistics information such as min, max, and avg. As a large volume of streaming sensor data is accumulated continuously, an efficient data compression is an essential for resource-constrained mobile devices.

2.2 Data abstraction layer (DAL)

Through DCL, the amount of data to be processed is reduced. However, the data rep- resentations should be more machine-interpretable. Thus, semantic annotation and reasoning on the raw data based on the proposed domain ontology (as depicted in Fig. 3) are required to draw an upper-level knowledge, in which privacy sensitive part is cut out. When semantic annotation is finished, rule-based reasoning is applied to the newly generated semantic data. We use AndroJena1 as a reasoning engine. To perform rule-based reasoning, rules are defined in advance. Decision rules are defined in order to make upper-level conclusions, as shown in Table 1.

1 https://code.google.com/p/androjena/

(3)

Data Thing

determine

Time

Location hasTime

xsd:time from to

Value hasValue

xsd:double minVal maxVal averageVal hasLoc

geo:long geo:lat

latitude longitude xsd:string dataType

Status

xsd:boolean isEmergency isNormality isIrregular

Account hasOwner

xsd:string id

rdf:ID

owl:Class owl:ObjectProperty owl:DataTypePropertyowl:subClassOf

rdf:ID rdf:ID

Fig. 3. A part of domain ontology

Table 1. A part of decision rules

Decision rules [emergency:

(?h datatype heartBeatRate), (?h hasValue ?val),

lessThan(?val, 10) [heartbeatIncreasing: (?h datatype heatBeatRate), (?h hasValue ?val), greaterThan(?val,

getLatestValue(heartBeatRate)) [needExcercise: lessThan(getTodayTotalValue (steps), 5000),greaterThan(getTo dayTotalValue(steps),2500)

Table 2. Data type and classification

Lv. Description Data type L1 Cannot be used

to track a user’s status

temperatu re, humid ity, illumi nance L2

Can be used to track a user’s status

time, location

L3 May indicate a user’s heath status indirectly

steps (calories)

L4 May indicate a user's health status directly

heartbeat rate

2.3 Data sharing layer (DSL)

In DSL, the upper-level knowledge is shared with SNS groups depending on the sen- sitivity degree in terms of privacy and social distance. The social distance is the de- gree to which users are willing to associate with whom have different social charac- teristics. Much research about the correlation between the social distance and the data sensitivity reveal that they are in inverse proportion [1]. For instance, in case of less sensitive data such as air temperature or humidity, they may be shared with the pub- lic. In case of more sensitive data such as calorie consumption, only friends may get access to them. For highly sensitive data such as heartbeat rate, the allowed audiences are limited to special groups (e.g., family members and practitioners), which are con- nected to the owner with stronger relation. Thus, we use the inverse proportionality between social distance and data sensitivity as the data sharing strategy.

3 Experimental Results

In order to evaluate the performance, scalability and feasibility, we have implemented the proposed IoT gateway on a smartphone. All experiments were conducted on Sam- sung Galaxy Note3 and Samsung Gear2. The actual data sets are provided by a smartphone and a wearable device. To enable selective data sharing, we classified the sensed data according to the sensitivity in terms of privacy. Table 2 shows the data type and classification (L1, L2, L3 and L4) used in our experiments.

3.1 Evaluation of streaming data processing

In order to evaluate the proposed method of processing streaming data, we collected more than 1,500 KB of data during 5 hours (18,000 records per each sensor type).

Furthermore, experiments were conducted 6 times by changing range from 2m to 60m to evaluate our approach with different conditions. It means that the moving range can be used as a threshold value to split data set into groups based on locations. We meas- ured the sizes of compressed data and compared them with those of original data.

Fig. 4 shows the sizes of consolidated data. From the result, we confirmed that a us- er's low-mobility pattern leads to a better data compression performance. However, in case where the moving range is too short (2~5m), the consolidated data size is similar to the original one. The reason for this is that sensors generate data every second with different locations. As a result, records are not merged.

(4)

3.2 Performance evaluation of reasoning

We performed two kinds of experiments in the process of reasoning: 1) the memory consumption and 2) the processing time for different amount of input data. Fig. 5 shows the results in terms of 1) and 2). By increasing the amount of data step by step, we checked the changes of the memory usage. We found that there was no relation between the memory usage and the amount of data set. This is because the memory usage is mainly influenced by Android OS, which manages memory itself such as garbage collection. Also we measured the execution time for semantic annotation and reasoning. As shown in the result, for all the data sets, the processing times consumed by reasoning tasks were yielded as 47.2s, 77.9s, 172.6s and 449.9s, respectively.

3.3 Evaluation of selective data sharing

We also demonstrated the use of the proposed gateway through a real SNS scenario on Facebook. As shown in Fig. 6, a user’s privacy information (as shown in the red box), which may indicate a user’s health status indirectly, was allowed only to her friends. Non-private information (as shown in the blue box) was allowed to the pub- lic. The experimental result shows that 1) raw stream data were integrated and trans- lated correctly into our semantic model 2) the target audience of the post was selec- tively determined by the degree of sensitivity as we defined.

0 200 400 600 800 1000 1200 1400 1600

2 5 10 20 40 60

data size (KB)

moving range (meter) Original Consolidated

Fig. 4. Consolidated data size

0 50 100 150 200 250 300 350 400 450 500

0 10 20 30 40 50 60 70 80

598 900 1800 3600

processing time (sec)

used memory (MB)

number of records used memory (MB) time (s)

Fig. 5. Performance of semantic annotation/reasoning

Fig. 6. Screenshot of publishing data on Facebook

Acknowledgement

This research was supported by the National Research Foundation of Korea (NRF) funded by Korea government (2013R1A2A2A01016327) and Samsung Electronics Co., Ltd.

References

1. Bilogrevic, I., Huguenin, K., Agir, B., Jadliwala, M., and Hubaux, J. P., Adaptive infor- mation-sharing for privacy-aware mobile social networks, Int’l Conference on Ubiquitous computing (UbiComp), pp. 657-666, 2013.

2. Carlson, D., Altakrouri, B., and Schrader, A. An Ad-Hoc Smart Gateway Platform for the Web of Things, IEEE Int’l Conference on Cyber, Physical and Social Computing (CPSCom), pp. 619-625, 2013.

3. Grzegorz J. Nalepa and Szymon Bobek, Rule-Based Solution for Context-Aware Reason- ing on Mobile devices, Computer Science and Information Systems (ComSIS), 11(1), pp.

171-193, 2014.

4. Atzori, L., Carboni, D., and Iera, A., Smart things in the social loop: Paradigms, technolo- gies, and potentials. Ad Hoc Networks, 18, 121-132. 2014.

Références

Documents relatifs

We also propose the design of new query language that enables parallel and distributed pattern matching, and stream reasoning by employing query rewriting.. The event data

This feature brings additional security possibilities to the home/enterprise networks (e.g. through network isolation), and a field of exploration around new paradigms of sharing

Our proposition is an approach to enable communication between a oneM2M node with an other one using a tier protocol with end-to-end ciphering of the data exchanged.. As

In iPDA, each sensor node hides its individual data by slicing the data and sending en- crypted data slices to different neighboring nodes, then the aggregators aggregate the

Searchable encryption schemes allow a client to query from an untrusted server to search within encrypted data without having the encryption key and without learning information

During value transfers, for patients, there is an outflow of data carrying personal sensitive info of the patient to the domain specific healthcare provider such as

The key contributions of this paper consist of an automated approach for extracting task-relevant schema from RDF data sources for the formulation of data selection and

– The BT SPARQL Endpoint queries internally available SPARQL to SQL endpoints and combines SPARQL results, using Apache Jena 4.. – Federated querying is enabled by providing a