You are on page 1of 6

VISVESVARAYA TECHNOLOGICAL UNIVERSITY,BELGAUM.

KARNATAKA, INDIA

Project synopsis on
Energy Efficient Location and Activity-aware On-Demand
Mobile Distributed Sensing Platform for Sensing as a Service in
IoT Clouds

Submitted by:
Rahul M : 1AP15EC053
Rekha H C : 1AP15EC057
Srinithya Prakash S : 1AP15EC073

Submitted to:
Prof. Dr. Manoj Priyatham M
Professor, Dept.of ECE

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERING


APS COLLEGE OF ENGINEERING
BENGALURU-82
ABSTRACT

The Internet of Things (IoT) envisions billions of sensors deployed around us and connected
to the Internet, where the mobile crowd sensing technologies are widely used to collect data
in different contexts of the IoT paradigm. Due to the popularity of Big Data technologies,
processing and storing large volumes of data has become easier than ever. However, large
scale data management tasks still require significant amounts ofresources that can be
expensive regardless of whether they are purchased or rented (e.g. pay-as-you-go
infrastructure). Further, not everyone is interested in such large scale data collection and
analysis. More importantly, not everyone has the financial and computational resources to
deal with such large volumes of data.

Therefore, a timely need exists for a cloud-integrated mobile crowd sensing platform that is
capable of capturing sensors data, on-demand, based on conditions enforced by the data
consumers. In this paper, we propose a context-aware, specifically, location and activity-
aware mobile sensing platform called C- MOSDEN (Context-aware Mobile Sensor Data
ENgine) for the IoT domain.

INTRODUCTION

The Internet of Things (IoT) has become popular over the past decade. As part of the IoT
infrastructure, sensors are expected to be deployed all around us, from everyday objects we
use, to public infrastructure such as bridges and roads. As the prices of sensors diminish
rapidly, we can soon expect to see very large numbers of objects comprising of sensors and
actuators. In addition, the modern technology-savvy world is already full of devices
comprising of sensors, actuators, and data processors. The concentration of computational
resources will enable the sensing, capturing, collection and processing of real time data from
billions of connected devices , and can be envisaged to serve many different applications
including environmental monitoring, industrial applications, business and human-centric
pervasive applications.
The Internet of Things allows people and things to be connected any time, any place, with
anything and anyone, ideally using any path/network and any service. IoT is expected to
generate large volumes of sensors data. Due to the latest innovations in the computer
hardware sector and the reduction in hardware costs, large scale data processing is becoming
increasingly economical. Specially, with the popularity of utility-based cloud computing that
offers computational resources in a ’pay as you-go’ model, the tendency to collect a large
amount of data has been increasing over the last few years.

Fig 1 Fig 2

Fig2.: Usage case Scenario 2. Wearable sensors are attached to patients body. Doctors and
researchers are expected to collect data from the sensors based on context information.
BLOCK DIAGRAM :

Mems
Accelerometer

MCP
LM35 3008 GSM
RASPBERRY Pi

HR BUZZER

CLOUD SERVER
USB
l Key KEYBOARD
MOUSE
HARDWARE REQUIREMENT

 Raspberry Pi Module
 Accelerometer
 Temperature Sensor
 Heart Rate Sensor
 ADC chip
 Buzzer
 Key
 GSM
 USB keyboard and mouse
 VGA Monitor

SOFTWARE REQUIREMENT

 Raspberian OS
 Python Script
 Amazon Cloud Server (Web Page)
ADVANTAGES

 Low in cost compared to other machines.


 Can serve as a server for light traffic
 Low power consumption. It can be powered by portable batteries which can act as
UPS (uninterrupted power supply)
 The options are unlimited for notification and storage of the files depending on the
user's requirements

DISADVANTAGES

 The main limitation of Internet of things is that as the devices have limited computing
power the security aspects come in question as the transmitted and received data
cannot be encrypted and decrypted.

FUTURE SCOPE

Going further, changes can be implemented to enhance security to higher levels in order to
suit the needs relating to data security by using encryption and decryption algorithms.

You might also like