You are on page 1of 49

From Internet of Things to Smart Cities:

Enabling Technologies 1st Edition


Hongjian Sun
Visit to download the full and correct content document:
https://textbookfull.com/product/from-internet-of-things-to-smart-cities-enabling-techn
ologies-1st-edition-hongjian-sun/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

Smart Cities and Homes Key Enabling Technologies 1st


Edition Mohammad S Obaidat

https://textbookfull.com/product/smart-cities-and-homes-key-
enabling-technologies-1st-edition-mohammad-s-obaidat/

Enabling the Internet of Things From Integrated


Circuits to Integrated Systems 1st Edition Massimo
Alioto (Eds.)

https://textbookfull.com/product/enabling-the-internet-of-things-
from-integrated-circuits-to-integrated-systems-1st-edition-
massimo-alioto-eds/

Internet of Things: Enabling Technologies, Security and


Social Implications (Services and Business Process
Reengineering) Santosh Kumar Pani

https://textbookfull.com/product/internet-of-things-enabling-
technologies-security-and-social-implications-services-and-
business-process-reengineering-santosh-kumar-pani/

Enabling the Internet of Things: Fundamentals, Design


and Applications 1st Edition Muhammad Azhar Iqbal

https://textbookfull.com/product/enabling-the-internet-of-things-
fundamentals-design-and-applications-1st-edition-muhammad-azhar-
iqbal/
Internet of Things and the Law Legal Strategies for
Consumer Centric Smart Technologies 1st Edition Noto La
Diega

https://textbookfull.com/product/internet-of-things-and-the-law-
legal-strategies-for-consumer-centric-smart-technologies-1st-
edition-noto-la-diega/

RFID Technologies for Internet of Things 1st Edition


Min Chen

https://textbookfull.com/product/rfid-technologies-for-internet-
of-things-1st-edition-min-chen/

Internet of Things for Healthcare Technologies Chinmay


Chakraborty

https://textbookfull.com/product/internet-of-things-for-
healthcare-technologies-chinmay-chakraborty/

Smart Device Recognition: Ubiquitous Electric Internet


of Things Hui Liu

https://textbookfull.com/product/smart-device-recognition-
ubiquitous-electric-internet-of-things-hui-liu/

Green and Smart Technologies for Smart Cities 1st


Edition Pradeep Tomar (Editor)

https://textbookfull.com/product/green-and-smart-technologies-
for-smart-cities-1st-edition-pradeep-tomar-editor/
From Internet of
Things to Smart Cities
Enabling Technologies
CHAPMAN & HALL/CRC
COMPUTER and INFORMATION SCIENCE SERIES
Series Editor: Sartaj Sahni

PUBLISHED TITLES
ADVERSARIAL REASONING: COMPUTATIONAL APPROACHES TO READING THE OPPONENT’S MIND
Alexander Kott and William M. McEneaney
COMPUTER-AIDED GRAPHING AND SIMULATION TOOLS FOR AUTOCAD USERS
P. A. Simionescu
DELAUNAY MESH GENERATION
Siu-Wing Cheng, Tamal Krishna Dey, and Jonathan Richard Shewchuk
DISTRIBUTED SENSOR NETWORKS, SECOND EDITION
S. Sitharama Iyengar and Richard R. Brooks
DISTRIBUTED SYSTEMS: AN ALGORITHMIC APPROACH, SECOND EDITION
Sukumar Ghosh
ENERGY-AWARE MEMORY MANAGEMENT FOR EMBEDDED MULTIMEDIA SYSTEMS:
A COMPUTER-AIDED DESIGN APPROACH
Florin Balasa and Dhiraj K. Pradhan
ENERGY EFFICIENT HARDWARE-SOFTWARE CO-SYNTHESIS USING RECONFIGURABLE HARDWARE
Jingzhao Ou and Viktor K. Prasanna
FROM ACTION SYSTEMS TO DISTRIBUTED SYSTEMS: THE REFINEMENT APPROACH
Luigia Petre and Emil Sekerinski
FROM INTERNET OF THINGS TO SMART CITIES: ENABLING TECHNOLOGIES
Hongjian Sun, Chao Wang, and Bashar I. Ahmad
FUNDAMENTALS OF NATURAL COMPUTING: BASIC CONCEPTS, ALGORITHMS, AND APPLICATIONS
Leandro Nunes de Castro
HANDBOOK OF ALGORITHMS FOR WIRELESS NETWORKING AND MOBILE COMPUTING
Azzedine Boukerche
HANDBOOK OF APPROXIMATION ALGORITHMS AND METAHEURISTICS
Teofilo F. Gonzalez
HANDBOOK OF BIOINSPIRED ALGORITHMS AND APPLICATIONS
Stephan Olariu and Albert Y. Zomaya
HANDBOOK OF COMPUTATIONAL MOLECULAR BIOLOGY
Srinivas Aluru
HANDBOOK OF DATA STRUCTURES AND APPLICATIONS
Dinesh P. Mehta and Sartaj Sahni
PUBLISHED TITLES CONTINUED

HANDBOOK OF DYNAMIC SYSTEM MODELING


Paul A. Fishwick
HANDBOOK OF ENERGY-AWARE AND GREEN COMPUTING
Ishfaq Ahmad and Sanjay Ranka
HANDBOOK OF GRAPH THEORY, COMBINATORIAL OPTIMIZATION, AND ALGORITHMS
Krishnaiyan “KT” Thulasiraman, Subramanian Arumugam, Andreas Brandstädt, and Takao Nishizeki
HANDBOOK OF PARALLEL COMPUTING: MODELS, ALGORITHMS AND APPLICATIONS
Sanguthevar Rajasekaran and John Reif
HANDBOOK OF REAL-TIME AND EMBEDDED SYSTEMS
Insup Lee, Joseph Y-T. Leung, and Sang H. Son
HANDBOOK OF SCHEDULING: ALGORITHMS, MODELS, AND PERFORMANCE ANALYSIS
Joseph Y.-T. Leung
HIGH PERFORMANCE COMPUTING IN REMOTE SENSING
Antonio J. Plaza and Chein-I Chang
HUMAN ACTIVITY RECOGNITION: USING WEARABLE SENSORS AND SMARTPHONES
Miguel A. Labrador and Oscar D. Lara Yejas
IMPROVING THE PERFORMANCE OF WIRELESS LANs: A PRACTICAL GUIDE
Nurul Sarkar
INTEGRATION OF SERVICES INTO WORKFLOW APPLICATIONS
Paweł Czarnul
INTRODUCTION TO NETWORK SECURITY
Douglas Jacobson
LOCATION-BASED INFORMATION SYSTEMS: DEVELOPING REAL-TIME TRACKING APPLICATIONS
Miguel A. Labrador, Alfredo J. Pérez, and Pedro M. Wightman
METHODS IN ALGORITHMIC ANALYSIS
Vladimir A. Dobrushkin
MULTICORE COMPUTING: ALGORITHMS, ARCHITECTURES, AND APPLICATIONS
Sanguthevar Rajasekaran, Lance Fiondella, Mohamed Ahmed, and Reda A. Ammar
PERFORMANCE ANALYSIS OF QUEUING AND COMPUTER NETWORKS
G. R. Dattatreya
THE PRACTICAL HANDBOOK OF INTERNET COMPUTING
Munindar P. Singh
SCALABLE AND SECURE INTERNET SERVICES AND ARCHITECTURE
Cheng-Zhong Xu
PUBLISHED TITLES CONTINUED

SOFTWARE APPLICATION DEVELOPMENT: A VISUAL C++®, MFC, AND STL TUTORIAL


Bud Fox, Zhang Wenzu, and Tan May Ling
SPECULATIVE EXECUTION IN HIGH PERFORMANCE COMPUTER ARCHITECTURES
David Kaeli and Pen-Chung Yew
TRUSTWORTHY CYBER-PHYSICAL SYSTEMS ENGINEERING
Alexander Romanovsky and Fuyuki Ishikawa
VEHICULAR NETWORKS: FROM THEORY TO PRACTICE
Stephan Olariu and Michele C. Weigle
X-Machines for Agent-Based Modeling: FLAME Perspectives
Mariam Kiran
From Internet of
Things to Smart Cities
Enabling Technologies

Edited by
Hongjian Sun
Durham University, UK

Chao Wang
Tongji University, Shanghai, China

Bashar I. Ahmad
University of Cambridge, UK
CRC Press
Taylor & Francis Group
6000 Broken Sound Parkway NW, Suite 300
Boca Raton, FL 33487-2742

© 2018 by Taylor & Francis Group, LLC


CRC Press is an imprint of Taylor & Francis Group, an Informa business

No claim to original U.S. Government works

Printed on acid-free paper


Version Date: 20170720

International Standard Book Number-13: 978-1-4987-7378-2 (Hardback)

This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been
made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity
of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright
holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this
form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may
rectify in any future reprint.

Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized
in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying,
microfilming, and recording, or in any information storage or retrieval system, without written permission from the
publishers.

For permission to photocopy or use material electronically from this work, please access www.copyright.com (http://
www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923,
978-750-8400. CCC is a not-for-profit organization that provides licenses and registration for a variety of users. For
organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged.

Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for
identification and explanation without intent to infringe.
Visit the Taylor & Francis Web site at
http://www.taylorandfrancis.com
and the CRC Press Web site at
http://www.crcpress.com
This book is dedicated to my parents Mr Shan Sun and Ms Lijun
Chen, with love (actually they cannot read English).

This book is dedicated to my wife Jing, and my children Jessica


Sun and William Sun, with love, too (actually my children
cannot read books yet, just sometimes pretend to be reading
stories).

But let’s see how fast they can learn English and when they are
able to understand the technologies in this book.

Hongjian Sun
Durham, United Kingdom
27 October 2016

This book is dedicated to my family and especially my baby


daughter, Xiaoyun.

I would also like to acknowledge the support of the National


Natural Science Foundation of China (Grants 61401314 and
61331009), and the EU FP7 QUICK project
(PIRSES-GA-2013-612652).

Chao Wang
Contents

Preface xix

Section I From Machine-to-Machine Communications


to Internet of Things

Chapter 1  From Machine-to-Machine Communications to Internet of


Things: Enabling Communication Technologies 3
Hamidreza Shariatmadari, Sassan Iraji, and Riku Jäntti
1.1 INTRODUCTION 4
1.2 IoT APPLICATIONS AND THEIR REQUIREMENTS 4
1.3 IoT CONNECTIVITY LANDSCAPE 6
1.3.1 IEEE 802.15.4 7
1.3.2 WiFi 11
1.3.3 Bluetooth 12
1.3.4 RFID and Ambient Backscattering 14
1.3.5 Dedicated Short Range Communications 15
1.3.6 Low Power Wide Area Network 16
1.3.7 Cellular Systems 18
1.4 CHALLENGES AND SOLUTIONS FOR CONNECTIVITY IN 5G ERA 21
1.4.1 Low-power Consumption 21
1.4.2 Enhanced Coverage 22
1.4.3 Ultra-reliable Low-latency Communications 23
1.4.4 Massive Number of Devices 26
1.4.5 Handling Small Bursts of Data 27
1.5 CONCLUSIONS 28
BIBLIOGRAPHY 30

Chapter 2  Power Control for Reliable M2M Communication 35


Ling Wang and Hongwei Zhang
2.1 INTRODUCTION 36

ix
x  Contents

2.1.1 History of Power Control in Cellular Networks 36


2.1.2 Objectives 38
2.1.3 Organization 39
2.2 M2M COMMUNICATION SYSTEMS 39
2.2.1 Co-channel Interference and Network Architecture 39
2.2.2 SINR Model and Link Reliability 40
2.2.3 Channel Dynamics and Statistical Models 42
2.2.4 Multiscale and Instantaneous Characteristics 45
2.3 POWER CONTROL THEORY 47
2.3.1 Feasible and optimal power control 48
2.3.2 Infeasibility of power control 49
2.4 POWER CONTROL APPROACHES FOR CONSTANT AND FADING
CHANNELS 50
2.4.1 Conflict Graph-based Power Control for Constant Channels 50
2.4.2 Geometric Programming-based Power Control for Fading
Channels 51
2.5 DISCUSSION ON ADAPTIVE POWER CONTROL FOR M2M COM-
MUNICATION SYSTEMS 52
2.6 EXTENSIVE STUDIES ON POWER CONTROL 54
2.7 OPEN CHALLENGES AND EMERGING TRENDS 57
BIBLIOGRAPHY 58

Chapter 3  Enabling Geo-centric Communication Technologies in Oppor-


tunistic Networks 61
Yue Cao, De Mi, Tong Wang, and Lei Zhang
3.1 INTRODUCTION 62
3.2 BACKGROUND 63
3.2.1 Opportunistic Networks (ONs) 63
3.2.2 Applications of ONs in Smart Cities 63
3.2.2.1 Vehicular Ad Hoc NETworks (VANETs) 63
3.2.2.2 Airborne Networks (ANs) 65
3.2.2.3 Mobile Social Networks (MSNs) 65
3.2.2.4 UnderWater Sensor Networks (UWSNs) 65
3.3 MOTIVATION AND CHALLENGES FOR GEOGRAPHIC ROUTING IN
ONS 66
3.3.1 Geo-centric Technologies in Smart Cities 66
3.3.2 Introduction on Geographic Routing 66
Contents  xi

3.3.3 Motivation for Geographic Routing in ONs 66


3.3.4 Challenges for Geographic Routing in ONs 67
3.4 TAXONOMY AND REVIEW OF GEOGRAPHIC ROUTING IN ONS 70
3.4.1 Destination Unawareness Class 71
3.4.2 Destination Awareness Class 72
3.4.2.1 Stationary Destination 72
3.4.2.2 Considering Mobile Destination via Real-time Ge-
ographic Information 76
3.4.2.3 Considering Mobile Destination via Historical Ge-
ographic Information 76
3.4.3 Hybrid Class 78
3.5 COMPARISON AND ANALYSIS 79
3.6 FUTURE DIRECTIONS 81
3.7 CONCLUSION 83
BIBLIOGRAPHY 83

Chapter 4  Routing Protocol for Low Power and Lossy IoT Networks 89
Xiyuan Liu, Zhengguo Sheng, and Changchuan Yin
4.1 INTRODUCTION 90
4.2 RPL: AN OVERVIEW AND ITS KEY MECHANISMS 91
4.2.1 Routing Mechanism of RPL 91
4.2.2 Message Control Mechanism of RPL 92
4.2.3 RPL and Its Counterparts 94
4.3 RPL TOPOLOGY GENERATION METHODS 95
4.3.1 Objective Functions and Metrics 95
4.3.2 Multi-parents Consideration 97
4.4 RPL APPLICATIONS 98
4.4.1 RPL Application Overview 98
4.4.2 Application Scenarios 99
4.5 SECURITY ISSUES IN RPL 100
4.6 RPL PERFORMANCE EVALUATION IN LARGE-SCALE NETWORKS 103
4.6.1 Simulation Platforms 103
4.6.2 Framework Integration for OMNeT++ 103
4.6.3 Configuration Details 105
4.6.4 Simulation of Cross-layer RPL Routing 107
4.7 CHALLENGES AND PROSPECT 111
4.8 CONCLUSION 113
xii  Contents

BIBLIOGRAPHY 113

Chapter 5  Resource Allocation for Wireless Communication Networks


with RF Energy Harvesting 119
Elena Boshkovska, Derrick Wing Kwan Ng, and Robert Schober
5.1 INTRODUCTION 120
5.2 RECEIVER STRUCTURE 122
5.3 SWIPT COMMUNICATION NETWORKS 123
5.3.1 Channel Model 123
5.3.2 Non-linear Energy Harvesting Model 124
5.3.3 Channel State Information 127
5.3.4 Achievable System Data Rate 128
5.3.5 Problem Formulation and Solution 128
5.3.6 Numerical Example 132
5.4 WIRELESS POWERED COMMUNICATION NETWORKS 133
5.4.1 Channel Model 134
5.4.2 Problem Formulation and Solution 136
5.4.3 Numerical Example 138
5.5 CONCLUSION 140
5.6 APPENDIX 141
5.6.1 Proof of Theorem 1 141
BIBLIOGRAPHY 143

Section II Data Era: Data Analytics and Security

Chapter 6  Distributed Machine Learning in Big Data Era for Smart City 151
Yuan Zuo, Yulei Wu, Geyong Min, Chengqiang Huang, and Xing Zhang
6.1 INTRODUCTION 152
6.2 THE STOCHASTIC GRADIENT DESCENT (SGD) IN PARALLELIZA-
TION 155
6.2.1 Parallelized SGD Based on MapReduce 157
6.2.2 Online SGD in Round-robin 157
6.2.3 HOGWILD! for “Lock-free” 158
6.2.4 AsySVRG for asynchronous SGD Variant 159
6.2.5 ASGD with Single-sided Communication 160
6.3 THE NEWTON METHOD IN PARALLELIZATION 160
6.3.1 A truncated Newton Method: The Trust Region Newton
Method (TRON) 162
Contents  xiii

6.3.2 The Distributed TRON Based on Spark and MPI 163


6.3.3 General Distributed Implementation of TRON 163
6.3.4 Matrix-vector Product Improvement for Inner Mechanism 164
6.4 THE PETUUM FRAMEWORK 164
6.5 THE CONVEX OPTIMIZATION DECOMPOSITION METHOD 166
6.5.1 An Implementation Example of ADMM 168
6.5.2 Other Work Relevant to Decomposition 169
6.6 SOME OTHER RESEARCH RELEVANT TO DISTRIBUTED APPLI-
CATION 170
6.6.1 Evaluation of Parallel Logistic Regression 170
6.6.2 Conjugate Gradient Optimization 171
6.7 A CASE STUDY 171
6.8 CONCLUSIONS 172
BIBLIOGRAPHY 172

Chapter 7  Security in Smart Grids 179


Julia Sánchez, Agustı́n Zaballos, Ramon Martin de Pozuelo, Guiomar Corral,
and Alan Briones
7.1 INTRODUCTION TO CYBERSECURITY 181
7.1.1 Key Security Aspects for Any System 181
7.1.2 Network Vulnerability Assessment 183
7.1.2.1 Security Vulnerabilities 183
7.1.2.2 Security Policies and Standards 184
7.1.2.3 Security Methodologies and Procedures 186
7.1.2.4 Security Assessments 187
7.1.2.5 Network Security Testing Tools 187
7.1.2.6 Summary 188
7.2 AUTOMATED SECURITY ASSESSMENT 189
7.2.1 Global Architecture of an Automated Security Assessment 189
7.2.1.1 Base System Module 190
7.2.1.2 Management Module 190
7.2.1.3 Analysis Module 191
7.2.1.4 Testing Modules 192
7.2.2 The Communications Protocol 192
7.2.3 Other Considerations 193
7.3 SECURITY CONCERNS, TRENDS AND REQUIREMENTS IN SMART
GRIDS 194
xiv  Contents

7.3.1 Requirements of the Smart Grid 196


7.3.2 Smart Grid Security Requirements Definition 197
7.4 SECURITY IN A CLOUD INFRASTRUCTURE AND SERVICES FOR
SMART GRIDS 200
7.4.1 Security Concerns and Requirements in a Cloud Environment 200
7.4.1.1 Security Threats 202
7.4.1.2 Security Issues 202
7.4.1.3 Security Requirements 204
7.4.2 Use Case Analysis—FINESCE Cloud for Smart Grid Distri-
bution 205
7.4.2.1 Use Case Description 205
7.4.2.2 Security Requirements Analysis 207
7.4.2.3 Security Audit 208
7.4.3 Summary 209
7.5 THE SMART GRID AS AN IoT 210
7.6 TOWARDS A SECURE AND SUSTAINABLE SMART
GRID MANAGEMENT 212
7.6.1 A Sustainable Smart Grid Management 212
7.6.2 Software-Defined Network 213
7.6.3 Service Composition Paradigm 213
7.6.4 The Proof of Concept: A First Approach to Orchestrate Se-
cured Smart Metering 214
7.7 CONCLUSIONS 218
7.8 ACKNOWLEDGEMENTS 219
BIBLIOGRAPHY 219

Chapter 8  Secret Key Generation under Active Attacks 227


Wenwen Tu and Lifeng Lai
8.1 INTRODUCTION 228
8.2 BASIC MODELS FOR KEY GENERATION WITH A
PASSIVE ADVERSARY 231
8.2.1 Key Generation with Side Information at the Adversary 231
8.2.2 Key Generation with a Helper 233
8.2.3 Basic Model for Key Generation in Wireless Setting 234
8.3 KEY GENERATION WITH PUBLIC DISCUSSION ATTACKED 235
8.3.1 Model Modification 235
8.3.2 All or Nothing Result 236
8.3.3 Efficiently Checking the Simulatability Condition 238
Contents  xv

8.4 KEY GENERATION WITH CONTAMINATED SOURCES 239


8.4.1 Two-Way Relay Channel Model 239
8.4.2 Efficiency of the Key Generation Algorithm 241
8.4.3 Attack Strategy and Power Allocation 243
8.4.3.1 Optimal Attack Strategy 243
8.4.3.2 Optimal Attack Power Allocation 245
8.5 KEY GENERATION WITH A BYZANTINE HELPER 247
8.5.1 System Model with a Byzantine Helper 247
8.5.2 Key Generation Scheme against the Byzantine Helper 248
8.5.2.1 A Key Generation Scheme Example 249
8.6 CONCLUSION 251
8.7 ACKNOWLEDGEMENT 251
BIBLIOGRAPHY 251

Section III Towards Smart World from Interfaces to Homes


to Cities

Chapter 9  Applying Human–Computer Interaction Practices


to IoT Prototyping 257
Salim Haniff, Markku Turunen, and Roope Raisamo
9.1 INTRODUCTION 258
9.1.1 Internet of Things 258
9.1.2 Human–Computer Interaction 259
9.2 HCI METHODOLOGY 265
9.3 USE CASES 267
9.3.1 Smart Energy Monitoring 267
9.3.1.1 User’s Requirements 267
9.3.1.2 Hardware Implementation 268
9.3.1.3 Software Implementation 270
9.3.1.4 Discussion 273
9.3.2 Smart Lighting 276
9.3.2.1 User’s Requirements 277
9.3.2.2 Hardware Implementation 277
9.3.2.3 Software Implementation 279
9.3.2.4 Discussion 283
9.3.3 Seamless Home Automation 284
9.3.3.1 User’s Requirements 285
xvi  Contents

9.3.3.2 Hardware Implementation 286


9.3.3.3 Software Implementation 287
9.3.3.4 Discussion 289
9.4 CONCLUSION 290
BIBLIOGRAPHY 291

Chapter 10  Inclusive Product Interfaces for the Future: Automotive,


Aerospace, IoT and Inclusion Design 295
Patrick M. Langdon
10.1 THE BACKGROUND TO THE PROBLEMS 296
10.1.1 The Ubiquity of IoT Technology, and Importance of Inclusive
Design 297
10.1.2 What Is the Need for Inclusion? 298
10.1.3 The Inclusive Design Response 299
10.1.4 Health Induced and Situationally Induced Impairment 299
10.2 ADVANCED INTERACTION INTERFACES 300
10.2.1 The State of the Art 301
10.2.2 Solutions and Issues with User Modelling 301
10.3 THE INCLUSIVE ADAPTION APPROACH 302
10.4 CASE STUDY 1: FUTURE AUTOMOTIVE 303
10.4.1 Key Future HMI Design Elements 304
10.4.2 Visualisation of Key Concepts 307
10.5 CASE STUDY 2: FUTURE AEROSPACE 307
10.5.1 Need for Multimodal Solutions 308
10.5.2 Multimodal Interface Experiments 310
10.6 CASE STUDY 3: PREDICTIVE POINTING IN AUTOMOTIVE TOUCH
SCREENS 310
10.7 CASE STUDY 4: ADAPTIVE MOBILE APPLICATIONS 312
10.7.1 The IU-ATC Project 314
10.7.2 Mobile Interfaces 314
10.8 DISCUSSION 315
BIBLIOGRAPHY 317

Chapter 11  Low Power Wide Area (LPWA) Networks for IoT Applications 323
Kan Zheng, Zhe Yang, Xiong Xiong, and Wei Xiang
11.1 OVERVIEW ON 5G IoT 324
11.2 OVERVIEW ON LOW POWER WIDE AREA NETWORKS (LPWANS) 326
Contents  xvii

11.2.1 Application Scenarios of LPWANs 326


11.2.2 Classification of LPWANs 328
11.2.2.1 LPWAN Based on NB-IoT 329
11.2.2.2 LPWAN Based on IEEE 802.15.4k 335
11.3 IMPLEMENTATION OF LPWAN BASED ON IEEE 802.15.4K 339
11.3.1 Access Point (AP) 339
11.3.2 Devices 340
11.3.3 Experimental Results 342
11.4 LPWA-BASED AIR QUALITY MONITORING SYSTEM 343
11.4.1 System Architecture 345
11.4.1.1 Sensing Layer 345
11.4.1.2 Network Layer 347
11.4.1.3 Application Layer 347
11.4.2 Experimental Results and Analysis 348
11.4.2.1 Experimental Configurations 348
11.4.2.2 Results and Analysis 349
11.5 CONCLUSION AND OUTLOOK 351
BIBLIOGRAPHY 353

Chapter 12  A Data-centered Fog Platform for Smart Living 357


Jianhua Li, Jiong Jin, Dong Yuan, Marimuthu Palaniswami, and Klaus Moessner
12.1 INTRODUCTION 358
12.1.1 Smart City 358
12.1.2 Internet of Things 360
12.1.3 Smart Living 362
12.1.4 Ad Hoc IoT 362
12.1.5 Gateway or Proxy Based IoT 363
12.1.6 Cloud Computing Based IoT 364
12.1.7 Fog Computing 364
12.2 EHOPES ELEMENTS AND DATAFLOW 366
12.2.1 EHOPES and Dataflow 366
12.2.2 Summary 368
12.3 FOG PLATFORM FOR EHOPES 369
12.3.1 State of the Art 369
12.3.2 Fog Edge Node (FEN) 369
12.3.3 Fog Server (FS) 370
12.3.4 Foglet (Middleware) 371
xviii  Contents

12.4 CASE STUDY AND EVALUATION 371


12.4.1 The Scenario 371
12.4.2 The Simulation 373
12.4.3 Simulation Results 374
12.5 CONCLUSION 375
BIBLIOGRAPHY 375

Chapter 13  Resources and Practical Factors in Smart Home and City 379
Bo Tan, Lili Tao, and Ni Zhu
13.1 INTRODUCTION 380
13.2 NOVEL USAGE OF RADIO RESOURCES 380
13.2.1 Current Situation and Challenges 380
13.2.2 Use of Outdoor Radio Signals 381
13.2.3 Use of Indoor Signals 383
13.2.4 The Trend 385
13.3 VIDEO RESOURCES 386
13.3.1 Introduction 386
13.3.2 Applications and Current Systems 387
13.3.3 Future Trends 389
13.4 PRACTICAL CONSIDERATIONS 390
13.4.1 Pervasive Sensing 390
13.4.2 Smart Cities in Reality 391
BIBLIOGRAPHY 393

Index 399
Preface

Nowadays we are facing numerous environmental, technological, societal and eco-


nomic challenges, including climate change, limited energy resources, aging popula-
tions and economic restructuring. To address these challenges, it becomes of vital
importance to deploy information and communication technologies (ICT) through-
out our homes and cities for enabling real-time responses to these challenges, for
example, to reduce carbon emission, to improve resource utilization efficiency and to
promote active engagement of citizens. However, such an ambitious target will re-
quire sustained efforts from the Societies of Communications, Signal Processing and
Computing, etc., over the years to come.
This book aims to facilitate this sustained effort for introducing the latest ICT
enabling technologies and for promoting international collaborations across Societies
and sectors, and eventually demonstrating them to the general public. As such, this
book consists of three tightly coupled parts:

• Part I: From Machine-to-Machine Communications to Internet of Things. We


will introduce the evolvement of enabling technologies from basic machine-to-
machine communications to Internet of Things technologies;

• Part II: Data Era: Data Analytic and Security. We will focus on the state-of-
the-art data analytic and security techniques;

• Part III: Towards Smart World from Interfaces to Homes to Cities. We will
discuss the design of human-machine interface that facilitates the integration
of humans to smart homes and cities, either as decision–makers or as knowledge
feeders to networks.

DISCLAIMER
We sincerely thank all contributors, who are world-leading experts in their re-
search fields, for contributing chapters to this book. Due to the time limit, there
might be errors or typos in this book, but as editors we tried our best to correct
them. If you found any errors or typos, please feel free to contact one of our editors.

Editors:
Hongjian Sun, Email: hongjian.sun@durham.ac.uk;
Chao Wang, Email: chaowang@tongji.edu.cn;
Bashar Ahmad, Email: bia23@cam.ac.uk.

xix
I
From Machine-to-Machine Communications
to Internet of Things

1
CHAPTER 1

From Machine-to-Machine
Communications to Internet
of Things: Enabling
Communication
Technologies
Hamidreza Shariatmadari
Aalto University

Sassan Iraji
Aalto University, Klick Technologies Ltd.

Riku Jäntti
Aalto University

CONTENTS
1.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.2 IoT applications and their requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.3 IoT connectivity landscape . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
1.3.1 IEEE 802.15.4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.3.2 WiFi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
1.3.3 Bluetooth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
1.3.4 RFID and Ambient Backscattering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
1.3.5 Dedicated Short Range Communications . . . . . . . . . . . . . . . . . . . . . . . . 15
1.3.6 Low Power Wide Area Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
1.3.7 Cellular Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
1.4 Challenges and solutions for connectivity in 5G Era . . . . . . . . . . . . . . . . . . . . 21
1.4.1 Low-power Consumption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
1.4.2 Enhanced Coverage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
1.4.3 Ultra-reliable Low-latency Communications . . . . . . . . . . . . . . . . . . . . . 23
1.4.4 Massive Number of Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
1.4.5 Handling Small Bursts of Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
1.5 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28

3
4  From Internet of Things to Smart Cities: Enabling Technologies

1.1 INTRODUCTION
The term Internet of Things (IoT) was first coined by Kevin Ashton in the late
90s, but in reality, IoT goes back a lot further than that. At the beginning it was only
a vision but today with the development of communication technologies, and in par-
ticular wireless communications, it is becoming rapidly a reality in different domains
and sectors [1]. IoT and its enabling services are revolutionizing the way we live and
creating huge growth in our economy. According to IoT paradigm, everything and ev-
eryone can be part of the Internet. This vision redefines the way people interact with
each other and objects they are surrounded by. With the development of communi-
cation technologies, billions of IoT devices are currently connected and it is expected
there will be a few tens of billions connected devices within the next five years [2]. At
the core of IoT, machine-to-machine (M2M) communications or machine-type com-
munications (MTC) plays the fundamental role by providing connectivity between
devices and servers. In that regard, it is concluded that IoT is a broader term, which
contains devices, M2M communications, and data processing [3]. Thus, IoT vision
cannot be materialized without providing efficient M2M communications.
IoT is constantly evolving by envisioning new services and applications in various
domains. The envisioned services are associated with a diverse range of communi-
cation requirements. This fact has resulted in the emergence of different wireless
communication solutions; generally, each solution satisfies a set of requirements. Al-
though the plethora of communication solutions gives the opportunity to choose a
proper solution according to the target application, it hinders the wide and fast
deployment of the application. In order to overcome such limitations, extensive ef-
forts are being undertaken to enhance the current solutions for supporting a wider
range of applications. Meanwhile, the cellular standardization forums are also try-
ing to consider the IoT vision in the development of the next generation of cellular
systems.
The goal of this chapter is to make the readers familiar with the most important
connectivity solutions for enabling M2M communications and supporting IoT appli-
cations. The remainder of the chapter is organized as follows. Section 1.2 discusses
some of the IoT services and applications, along with their requirements. Section 1.3
describes some of the existing M2M connectivity technologies and their potentials for
supporting IoT applications. Section 1.4 presents the future directions that enable a
better support of M2M communications in the cellular systems. Finally, the chapter
is concluded in Section 1.5.

1.2 IoT APPLICATIONS AND THEIR REQUIREMENTS


IoT has a wide range of applications in various sectors and domains [4], [5].
The applications can improve the ways people live, provide better interactions with
the environment and facilitate the growth in the economy. Some of the viable IoT
applications can be categorized as follows.
From Machine-to-Machine Communications to Internet of Things  5

• Transportation: There are applications for transportation systems that help


in monitoring the traffic, improving the road safety, and facilitating the as-
sisted driving. Indeed, public safety is becoming an important concern for the
increasing number of vehicles on the roads.

• Monitoring: Monitoring applications provide the real-time environmental ob-


servations enabled by deployed sensors.

• Wearables: The wearable devices can be utilized in game and leisure indus-
tries, also for the purposes of fitness, wellness, and health monitoring, which
are increasingly emerging domains.

• Smart environment: The considered applications improve the efficiency of


the environmental utilization from different perspectives, such as energy, re-
sources, and carbon footprint. Some of the applications are applicable for smart
homes, building automation, and smart cities.

• Security: The security applications are applicable to private residential, com-


mercial, and public locations. They can offer remote surveillance, remote alarm,
personal tracking, and public infrastructure protection.

• Utilities: There are applications that enable remote monitoring and control-
ling of user consumptions, such as water, gas, and electricity utilities. Other
important applications are related to smart grids, which can efficiently balance
between the production and consumption of electricity in large systems.

• Industrial Internet: Connecting industrial plants to the Internet facilitates


the process management and improves the production. These can be achieved
by support of logistics, business analytics, predictive maintenance, and factory
automation.

The IoT applications, including those mentioned above, have different charac-
teristics. The application characteristics imply constraints on the devices and un-
derlying communications, and also determine how the data should be gathered and
processed [3], [6], [7]. Some concerns related to the end devices are power consump-
tion, computational abilities, size, and cost. The parameters that entail constraints on
the communications include: the minimum transmission rate, transmission reliabil-
ity, the maximum tolerable latency, security, mobility, and the number of supported
devices. With increasing the number of IoT devices, the procedures of data gathering
and processing are becoming more complex. Relevant concerns are related to the level
of data processing locally, message routing, and information extraction. The system
design for IoT applications requires the joint considerations of different elements, i.e.,
device, communication technology, and data processing. For instance, the low power
consumption for the end device cannot be achieved unless the device consumes very
low energy for sensing, processing, and transmitting data.
6  From Internet of Things to Smart Cities: Enabling Technologies

The M2M communications, as the underlying infrastructure for IoT connectivity,


faces different data traffic types and deployment scenarios compared to other human-
centric communications. General applications that directly interact with human users
require transmitting high amounts of data only during the active periods. In addition,
a limited number of users are in active mode at a time. On the contrary, many IoT
applications are involved with short amounts of data, periodically generated by a
massive number of devices. Some other applications, such as mission-critical applica-
tions, require reliable data transmissions with very low-latency. Excessive coverage is
essential for those devices that are deployed in remote areas or in places with limited
accessibility.
The diverse range of application requirements has hindered the development of
a single solution for providing M2M communications. Thus, various wireless tech-
nologies have emerged, each one addressing a set of requirements, to support IoT
applications. The next section describes some of the existing connectivity solutions,
their features, and the supported applications.

1.3 IoT CONNECTIVITY LANDSCAPE


IoT systems are generally comprised of devices, or objects that need to exchange
data with each other, or with a central server. As shown in Figure 1.1, the intercon-
nection of the devices and the server can be provided by a local-based network or
a cloud-based network. In the local-based network, the server runs the applications
and interacts with the devices through the access points (APs). The server can pro-
vide Internet access for the devices in the network to make them remotely accessible.

Figure 1.1 Typical network topologies for IoT.


From Machine-to-Machine Communications to Internet of Things  7

The advantage of this topology is the high level of reliability as the applications can
run even if the Internet access fails. In the cloud-based network, the devices and the
server perform data exchange through the Internet, entailing all data flow is directed
to the Internet. Hence, the stable Internet connection is essential for running the
applications. This topology facilitates the scalability of application deployment as
the devices can be deployed anywhere as long as they have the Internet access. In
addition, the application can be run in a cloud server which eliminates the need of a
dedicated server.
Wireless technologies are preferred to provide connectivity for IoT devices due to
the ease of deployment, elimination of wiring cost, and mobility support. Initially,
many manufacturers developed IoT applications using their own proprietary wireless
systems. This approach has brought different technical issues, such as complexity
of system design, and lack of compatibility. For instance, products from different
manufacturers could not be easily integrated in a system. Those limitations could not
be eliminated without employing standardized wireless technologies. In part, some
standardization forums put effort to modify the existing wireless systems to support
IoT applications. In addition, several wireless solutions have emerged, optimized for
IoT applications. The rest of this section describes some of these technologies.

1.3.1 IEEE 802.15.4


IEEE 802.15.4 defines the physical (PHY) layer and medium access control (MAC)
layer specifications for low-rate wireless personal area networks (LR-WPANs) [8]. It
is designed to provide local connectivity for devices with low power consumption and
over relatively short distances. The IEEE 802.15 working group released the first edi-
tion of the standard in 2003 and maintained it by providing additional amendments.
The standard is based on the open system interconnection (OSI) model, without
specifying the higher layers. The specifications of PHY and MAC layers enable inter-
operability between devices developed by different manufacturers. The upper layers
can be designed and optimized according to the specific application. Indeed, various
network protocols have been designed on top of IEEE 802.15.4 to support a wide
range of applications, such as IPv6 over low power wireless personal area networks
(6LoWPAN), ZigBee, WirelessHART, and ISA100.11a [9], [10], [11].
IEEE 802.15.4-2003 specifies the PHY layer over three different unlicensed indus-
trial, scientific, and medical (ISM) frequency bands. The offered data rates depend
on the operating frequency band, corresponding to 20 kbps in 868 MHz, 40 kbps in
915 MHz, and 250 kbps in 2.4 GHz. The higher data rates are offered in the later
revisions of the standard. In most of the countries, the 2.4 GHz radio is utilized dom-
inantly due to the higher data rate and the availability of the frequency band. In this
frequency band, the total of 16 channels is available for network operation, each with
2 MHz bandwidth. The IEEE 802.15.4 transmits data with low power, i.e., less than
1 dBm. The low transmission power limits the communication range, typically less
than 100 m, and also makes the data transmission susceptible to radio interference
from other competing technologies operating in this frequency band, such as WiFi
and Bluetooth [12].
8  From Internet of Things to Smart Cities: Enabling Technologies

Figure 1.2 Network topologies in IEEE 802.15.4.

The MAC layer in IEEE 802.15.4 handles the access to the radio channel and
provides an interface between the service specific convergence sublayer (SSCS) and
PHY layer. It is also responsible for network synchronization, supporting device se-
curity, and providing a reliable link between two peer MAC entities. Two different
device types are defined for the IEEE 802.15.4 network: a full-function device (FFD)
that supports all network functionalities, and reduced function device (RFD) with
reduced network functionalities [8], [13]. The network can utilize star or peer-to-peer
topologies, as illustrated in Figure 1.2. In the star topology, devices can only exchange
information with a single central controller unit in the network, known as the personal
area network (PAN) coordinator. The PAN coordinator is responsible for managing
the entire network. In the peer-to-peer topology, FFD devices have additional ability
to communicate directly with each other.
The IEEE 802.15.4-2003 standard is complemented with amendments to further
enhance the performance and offer additional functionalities that are required for
some specific IoT applications. Some of these amendments are as follows.

• IEEE 802.15.4a: This amendment specifies two additional PHY layers, using
ultra-wide band (UWB) and chirp spread spectrum (CSS) [13]. The UWB PHY
enables precision ranging that can be utilized for positioning purpose. The CSS
PHY provides robust data transmission over a large distance for devices moving
at high speed, applicable for vehicular communications.

• IEEE 802.15.4b: This amendment offers the higher data rates, 200 kbps in
868 MHz and 500 kbps in 915 MHz bands.
Another random document with
no related content on Scribd:
niin on lopulta kaikki muuttuva. Työläisten voittoa ei voi ehkäistä
mikään sorto eikä väkivalta. Ei siis tarvitse toivottomaksi — tämä on
vain…

POLIISI keskeyttää ankaran virallisesti.

Vaiti! Lopettakaa vihdoinkin kiihoituksenne, sillä te joudutte


vastaamaan siitä, mitä nyt olette saaneet aikaan! Tiedättekö mikä
rangaistus seuraa murhaan yllyttämisestä?

KORPI tolkuttomasti.

Murhaan yllyttämisestä?

POLIISI

Niin juuri 1 Siitä tulee kuritushuonetta! Sentähden minä kiellän


teitä poistumasta, kunnes saan lähempiä ohjeita.

ANNI tuskallisen hämmästyksen valtaamana.

Isä kuritushuoneeseen 1 Isä on syytön!

KAARLO katkeran masentuneesti.

Korpi? Yllytyksestä? Mitä, mitä te puhutte? Ei, älkää enää — se on


liikaa.

EMIL kuohahtaen voimattomasta vihasta.

No, viekää sitten minutkin! Ja pian! Parempi on istua raudoissa,


kuin elää tällaista elämää! Miksette tapa heti? Kuolema ainakin
lapsille tulee, jos ne yksin jätetään.
POLIISI

Vaiti, sanon minä! Ei täällä rähistä!

KAARLO kääntyy mestarin huonetta kohden, katseessaan


epämääräinen toivottomuus ja tuska.

Eikö jo voida lähteä täältä? Minne tahansa!

POLIISI röyhkeästi.

Ei täältä lähdetä ennenkuin patruuna tulee!

(Tarttuu Kaarlon hihaan aivankuin peläten tämän pakenevan.)

ANNI on aivankuin kauhun ja hämmästyksen lamauttamana. Nyt


hän tulee Kaarlon luokse, tarttuu vapisevin sonnin vuoroin käsiin ja
rautoihin ikäänkuin irroittaakseen ne, sitten lysähtää polvilleen kuin
kuolettavan kuulan satuttamana parahtaen särkyneesti.

Kaarlo…

KAARLO hätkähtää, kuin pahasta unesta havahtuessa ja änkyttää


katkonaisesti:

Voi Anni — mitä tämä on? Onko kaikki totta, Anni parka? Olenko
minä murhaaja jonka elämä hukkuu hämärään vankikoppiin… —
(Katsahtaa kuin tuskasta sekopäisenä ympärilleen.) — Voi Anni…
eikö mitään… Sinnekö meidän pikku kotimme häipyi…? Ja me
puhuimme puutarhasta… missä leikkivät pienokaiset… Ei, kyllä
kuolema on parempi… — (Ääni katkeaa kuin tukehtuneena.)

KORPI
Kyllä tämä raskaalta tuntuu… sinäkin, poikaparka… — (Vaikenee
tietämättä, mitä sanoisi, miten lohduttaisi. Mutta yhtäkkiä hänen
kasvonsa kirkastuvat ja hänen matalassa, hillityssä äänessään ja
laihoilla kasvoillaan kuvastuu väkevä sisäinen innostus ja voima.)

Ei pojat… ei niin! Tiedättekö, minä tunnen tällä hetkellä jotain


sellaista, etten koskaan ennen, niinkuin pimeässä kurjuudessamme
olisi leimahtanut outo väkevä valo.

Mutta ei sittenkään tarvitse masentua. Tunnen sen tällä hetkellä


omituisen selvästi — aivankuin salaperäinen kirkas valo olisi
valaissut pimeän kurjuutemme, paljastaen läheltämme jotain niin
suuremmeistä ja lohduttavaa, ettei työläisten enää koskaan tarvitse
masentua, muistin ne kauhistavat kärsimykset, mitä työläiset halki
vuosisatojen ovat kestäneet — turhaan; kun miljoonat ovat
heittäneet henkensä hirsipuissa, vankikomeroissa ja katusuluilla tai
sortuneet sortajien puolesta heidän sodissaan, niin
masentuisimmeko me nyt, kun tiedämme kärsivämme rakkaittemme
puolesta, oman luokkamme ja onnellisemman tulevaisuuden hyväksi
varmoina voitostamme. Ja jos toisinaan tuntuukin raskaalta, niin on
hyvä muistaa, että me olemme kuin etujoukot sodassa joiden on
aina täytynyt kestää enemmän. Siksi emme nytkään saa kun
toisetkin ovat kestäneet - sillä tämä juuri on nyt etuvartiotaistelua.

(Juuri silloin avautuu ovi ja Korven pikku Antti työntyy sisään


kalpeana, laihana ja repaleisena. Hän huohottaa raskaasti ja vapisee
vilusta voimatta sanoa mitään. Kaikki kääntyvät, tuijottaen häntä
jännittyneenä.)

EMIL hätäisesti.

Mitä, Antti, mitä?


ANTTI Katkonaisesti, vapisevin huulin.

Isä, tulkaa kotiin — Aune kuoli…

KORPI katsahtaa tuskallisesti, tyrmistyneenä ympärilleen ja hänen


vartalonsa painuu kuin musertavan kivilohkareen alla. Känsäinn,
vapiseva käsi kohoaa kasvoille ja hänen äänessään värisee viiltävä
suru, tuska ja hellyys.

Pieni, pieni tyttöseni…

(Mutta valtavalla tahdonponnistuksella hän pakottaa kasvonsa


tyyniksi, pyyhkäisee otsaansa kuin poistaisi jonkun näkymättömän
häiritsevän verhon. Ja sitten hän lausuu rohkaisten.)

Niin meidän täytyy kestää, sillä niinkuin sanoin, tämä on


etuvartiotaistelua.

Esirippu.
*** END OF THE PROJECT GUTENBERG EBOOK
ETUVARTIOTAISTELU ***

Updated editions will replace the previous one—the old editions will
be renamed.

Creating the works from print editions not protected by U.S.


copyright law means that no one owns a United States copyright in
these works, so the Foundation (and you!) can copy and distribute it
in the United States without permission and without paying copyright
royalties. Special rules, set forth in the General Terms of Use part of
this license, apply to copying and distributing Project Gutenberg™
electronic works to protect the PROJECT GUTENBERG™ concept
and trademark. Project Gutenberg is a registered trademark, and
may not be used if you charge for an eBook, except by following the
terms of the trademark license, including paying royalties for use of
the Project Gutenberg trademark. If you do not charge anything for
copies of this eBook, complying with the trademark license is very
easy. You may use this eBook for nearly any purpose such as
creation of derivative works, reports, performances and research.
Project Gutenberg eBooks may be modified and printed and given
away—you may do practically ANYTHING in the United States with
eBooks not protected by U.S. copyright law. Redistribution is subject
to the trademark license, especially commercial redistribution.

START: FULL LICENSE


THE FULL PROJECT GUTENBERG LICENSE
PLEASE READ THIS BEFORE YOU DISTRIBUTE OR USE THIS WORK

To protect the Project Gutenberg™ mission of promoting the free


distribution of electronic works, by using or distributing this work (or
any other work associated in any way with the phrase “Project
Gutenberg”), you agree to comply with all the terms of the Full
Project Gutenberg™ License available with this file or online at
www.gutenberg.org/license.

Section 1. General Terms of Use and


Redistributing Project Gutenberg™
electronic works
1.A. By reading or using any part of this Project Gutenberg™
electronic work, you indicate that you have read, understand, agree
to and accept all the terms of this license and intellectual property
(trademark/copyright) agreement. If you do not agree to abide by all
the terms of this agreement, you must cease using and return or
destroy all copies of Project Gutenberg™ electronic works in your
possession. If you paid a fee for obtaining a copy of or access to a
Project Gutenberg™ electronic work and you do not agree to be
bound by the terms of this agreement, you may obtain a refund from
the person or entity to whom you paid the fee as set forth in
paragraph 1.E.8.

1.B. “Project Gutenberg” is a registered trademark. It may only be


used on or associated in any way with an electronic work by people
who agree to be bound by the terms of this agreement. There are a
few things that you can do with most Project Gutenberg™ electronic
works even without complying with the full terms of this agreement.
See paragraph 1.C below. There are a lot of things you can do with
Project Gutenberg™ electronic works if you follow the terms of this
agreement and help preserve free future access to Project
Gutenberg™ electronic works. See paragraph 1.E below.
1.C. The Project Gutenberg Literary Archive Foundation (“the
Foundation” or PGLAF), owns a compilation copyright in the
collection of Project Gutenberg™ electronic works. Nearly all the
individual works in the collection are in the public domain in the
United States. If an individual work is unprotected by copyright law in
the United States and you are located in the United States, we do
not claim a right to prevent you from copying, distributing,
performing, displaying or creating derivative works based on the
work as long as all references to Project Gutenberg are removed. Of
course, we hope that you will support the Project Gutenberg™
mission of promoting free access to electronic works by freely
sharing Project Gutenberg™ works in compliance with the terms of
this agreement for keeping the Project Gutenberg™ name
associated with the work. You can easily comply with the terms of
this agreement by keeping this work in the same format with its
attached full Project Gutenberg™ License when you share it without
charge with others.

1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside the
United States, check the laws of your country in addition to the terms
of this agreement before downloading, copying, displaying,
performing, distributing or creating derivative works based on this
work or any other Project Gutenberg™ work. The Foundation makes
no representations concerning the copyright status of any work in
any country other than the United States.

1.E. Unless you have removed all references to Project Gutenberg:

1.E.1. The following sentence, with active links to, or other


immediate access to, the full Project Gutenberg™ License must
appear prominently whenever any copy of a Project Gutenberg™
work (any work on which the phrase “Project Gutenberg” appears, or
with which the phrase “Project Gutenberg” is associated) is
accessed, displayed, performed, viewed, copied or distributed:
This eBook is for the use of anyone anywhere in the United
States and most other parts of the world at no cost and with
almost no restrictions whatsoever. You may copy it, give it away
or re-use it under the terms of the Project Gutenberg License
included with this eBook or online at www.gutenberg.org. If you
are not located in the United States, you will have to check the
laws of the country where you are located before using this
eBook.

1.E.2. If an individual Project Gutenberg™ electronic work is derived


from texts not protected by U.S. copyright law (does not contain a
notice indicating that it is posted with permission of the copyright
holder), the work can be copied and distributed to anyone in the
United States without paying any fees or charges. If you are
redistributing or providing access to a work with the phrase “Project
Gutenberg” associated with or appearing on the work, you must
comply either with the requirements of paragraphs 1.E.1 through
1.E.7 or obtain permission for the use of the work and the Project
Gutenberg™ trademark as set forth in paragraphs 1.E.8 or 1.E.9.

1.E.3. If an individual Project Gutenberg™ electronic work is posted


with the permission of the copyright holder, your use and distribution
must comply with both paragraphs 1.E.1 through 1.E.7 and any
additional terms imposed by the copyright holder. Additional terms
will be linked to the Project Gutenberg™ License for all works posted
with the permission of the copyright holder found at the beginning of
this work.

1.E.4. Do not unlink or detach or remove the full Project


Gutenberg™ License terms from this work, or any files containing a
part of this work or any other work associated with Project
Gutenberg™.

1.E.5. Do not copy, display, perform, distribute or redistribute this


electronic work, or any part of this electronic work, without
prominently displaying the sentence set forth in paragraph 1.E.1 with
active links or immediate access to the full terms of the Project
Gutenberg™ License.
1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if you
provide access to or distribute copies of a Project Gutenberg™ work
in a format other than “Plain Vanilla ASCII” or other format used in
the official version posted on the official Project Gutenberg™ website
(www.gutenberg.org), you must, at no additional cost, fee or expense
to the user, provide a copy, a means of exporting a copy, or a means
of obtaining a copy upon request, of the work in its original “Plain
Vanilla ASCII” or other form. Any alternate format must include the
full Project Gutenberg™ License as specified in paragraph 1.E.1.

1.E.7. Do not charge a fee for access to, viewing, displaying,


performing, copying or distributing any Project Gutenberg™ works
unless you comply with paragraph 1.E.8 or 1.E.9.

1.E.8. You may charge a reasonable fee for copies of or providing


access to or distributing Project Gutenberg™ electronic works
provided that:

• You pay a royalty fee of 20% of the gross profits you derive from
the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”

• You provide a full refund of any money paid by a user who


notifies you in writing (or by e-mail) within 30 days of receipt that
s/he does not agree to the terms of the full Project Gutenberg™
License. You must require such a user to return or destroy all
copies of the works possessed in a physical medium and
discontinue all use of and all access to other copies of Project
Gutenberg™ works.

• You provide, in accordance with paragraph 1.F.3, a full refund of


any money paid for a work or a replacement copy, if a defect in
the electronic work is discovered and reported to you within 90
days of receipt of the work.

• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.

1.E.9. If you wish to charge a fee or distribute a Project Gutenberg™


electronic work or group of works on different terms than are set
forth in this agreement, you must obtain permission in writing from
the Project Gutenberg Literary Archive Foundation, the manager of
the Project Gutenberg™ trademark. Contact the Foundation as set
forth in Section 3 below.

1.F.

1.F.1. Project Gutenberg volunteers and employees expend


considerable effort to identify, do copyright research on, transcribe
and proofread works not protected by U.S. copyright law in creating
the Project Gutenberg™ collection. Despite these efforts, Project
Gutenberg™ electronic works, and the medium on which they may
be stored, may contain “Defects,” such as, but not limited to,
incomplete, inaccurate or corrupt data, transcription errors, a
copyright or other intellectual property infringement, a defective or
damaged disk or other medium, a computer virus, or computer
codes that damage or cannot be read by your equipment.

1.F.2. LIMITED WARRANTY, DISCLAIMER OF DAMAGES - Except


for the “Right of Replacement or Refund” described in paragraph
1.F.3, the Project Gutenberg Literary Archive Foundation, the owner
of the Project Gutenberg™ trademark, and any other party
distributing a Project Gutenberg™ electronic work under this
agreement, disclaim all liability to you for damages, costs and
expenses, including legal fees. YOU AGREE THAT YOU HAVE NO
REMEDIES FOR NEGLIGENCE, STRICT LIABILITY, BREACH OF
WARRANTY OR BREACH OF CONTRACT EXCEPT THOSE
PROVIDED IN PARAGRAPH 1.F.3. YOU AGREE THAT THE
FOUNDATION, THE TRADEMARK OWNER, AND ANY
DISTRIBUTOR UNDER THIS AGREEMENT WILL NOT BE LIABLE
TO YOU FOR ACTUAL, DIRECT, INDIRECT, CONSEQUENTIAL,
PUNITIVE OR INCIDENTAL DAMAGES EVEN IF YOU GIVE
NOTICE OF THE POSSIBILITY OF SUCH DAMAGE.

1.F.3. LIMITED RIGHT OF REPLACEMENT OR REFUND - If you


discover a defect in this electronic work within 90 days of receiving it,
you can receive a refund of the money (if any) you paid for it by
sending a written explanation to the person you received the work
from. If you received the work on a physical medium, you must
return the medium with your written explanation. The person or entity
that provided you with the defective work may elect to provide a
replacement copy in lieu of a refund. If you received the work
electronically, the person or entity providing it to you may choose to
give you a second opportunity to receive the work electronically in
lieu of a refund. If the second copy is also defective, you may
demand a refund in writing without further opportunities to fix the
problem.

1.F.4. Except for the limited right of replacement or refund set forth in
paragraph 1.F.3, this work is provided to you ‘AS-IS’, WITH NO
OTHER WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR ANY PURPOSE.

1.F.5. Some states do not allow disclaimers of certain implied


warranties or the exclusion or limitation of certain types of damages.
If any disclaimer or limitation set forth in this agreement violates the
law of the state applicable to this agreement, the agreement shall be
interpreted to make the maximum disclaimer or limitation permitted
by the applicable state law. The invalidity or unenforceability of any
provision of this agreement shall not void the remaining provisions.

1.F.6. INDEMNITY - You agree to indemnify and hold the


Foundation, the trademark owner, any agent or employee of the
Foundation, anyone providing copies of Project Gutenberg™
electronic works in accordance with this agreement, and any
volunteers associated with the production, promotion and distribution
of Project Gutenberg™ electronic works, harmless from all liability,
costs and expenses, including legal fees, that arise directly or
indirectly from any of the following which you do or cause to occur:
(a) distribution of this or any Project Gutenberg™ work, (b)
alteration, modification, or additions or deletions to any Project
Gutenberg™ work, and (c) any Defect you cause.

Section 2. Information about the Mission of


Project Gutenberg™
Project Gutenberg™ is synonymous with the free distribution of
electronic works in formats readable by the widest variety of
computers including obsolete, old, middle-aged and new computers.
It exists because of the efforts of hundreds of volunteers and
donations from people in all walks of life.

Volunteers and financial support to provide volunteers with the


assistance they need are critical to reaching Project Gutenberg™’s
goals and ensuring that the Project Gutenberg™ collection will
remain freely available for generations to come. In 2001, the Project
Gutenberg Literary Archive Foundation was created to provide a
secure and permanent future for Project Gutenberg™ and future
generations. To learn more about the Project Gutenberg Literary
Archive Foundation and how your efforts and donations can help,
see Sections 3 and 4 and the Foundation information page at
www.gutenberg.org.
Section 3. Information about the Project
Gutenberg Literary Archive Foundation
The Project Gutenberg Literary Archive Foundation is a non-profit
501(c)(3) educational corporation organized under the laws of the
state of Mississippi and granted tax exempt status by the Internal
Revenue Service. The Foundation’s EIN or federal tax identification
number is 64-6221541. Contributions to the Project Gutenberg
Literary Archive Foundation are tax deductible to the full extent
permitted by U.S. federal laws and your state’s laws.

The Foundation’s business office is located at 809 North 1500 West,


Salt Lake City, UT 84116, (801) 596-1887. Email contact links and up
to date contact information can be found at the Foundation’s website
and official page at www.gutenberg.org/contact

Section 4. Information about Donations to


the Project Gutenberg Literary Archive
Foundation
Project Gutenberg™ depends upon and cannot survive without
widespread public support and donations to carry out its mission of
increasing the number of public domain and licensed works that can
be freely distributed in machine-readable form accessible by the
widest array of equipment including outdated equipment. Many small
donations ($1 to $5,000) are particularly important to maintaining tax
exempt status with the IRS.

The Foundation is committed to complying with the laws regulating


charities and charitable donations in all 50 states of the United
States. Compliance requirements are not uniform and it takes a
considerable effort, much paperwork and many fees to meet and
keep up with these requirements. We do not solicit donations in
locations where we have not received written confirmation of
compliance. To SEND DONATIONS or determine the status of
compliance for any particular state visit www.gutenberg.org/donate.

While we cannot and do not solicit contributions from states where


we have not met the solicitation requirements, we know of no
prohibition against accepting unsolicited donations from donors in
such states who approach us with offers to donate.

International donations are gratefully accepted, but we cannot make


any statements concerning tax treatment of donations received from
outside the United States. U.S. laws alone swamp our small staff.

Please check the Project Gutenberg web pages for current donation
methods and addresses. Donations are accepted in a number of
other ways including checks, online payments and credit card
donations. To donate, please visit: www.gutenberg.org/donate.

Section 5. General Information About Project


Gutenberg™ electronic works
Professor Michael S. Hart was the originator of the Project
Gutenberg™ concept of a library of electronic works that could be
freely shared with anyone. For forty years, he produced and
distributed Project Gutenberg™ eBooks with only a loose network of
volunteer support.

Project Gutenberg™ eBooks are often created from several printed


editions, all of which are confirmed as not protected by copyright in
the U.S. unless a copyright notice is included. Thus, we do not
necessarily keep eBooks in compliance with any particular paper
edition.

Most people start at our website which has the main PG search
facility: www.gutenberg.org.

This website includes information about Project Gutenberg™,


including how to make donations to the Project Gutenberg Literary
Archive Foundation, how to help produce our new eBooks, and how
to subscribe to our email newsletter to hear about new eBooks.

You might also like