Page 167 - Unleashing the potenti al of the Internet of Things
P. 167
Unleashing the potential of the Internet of Things 3
Step 4: If a healthcare application tries to connect to USN middleware, the USN middleware
needs to authenticate the connecting application.
Step 5: A healthcare application can utilize a sensor network metadata directory service to
obtain the target sensor network metadata.
Step 6: A healthcare application registers appropriate rules to the USN middleware to obtain
emergency notifications based on the rules and sensed data.
Step 7: USN middleware collects sensed data from the appropriate sensor networks, based on
the requests of USN applications. USN middleware receives sensed data from sensor
networks without any requests, if they periodically send sensed data.
Step 8: USN middleware processes sensed data based on the rules for context awareness and
simultaneously provides sensed data to a healthcare application.
Step 9: A healthcare application displays current locations and the medical status of the
residents on the screen using processed data and/or raw sensed data from USN
middleware. The user can select which of the target residents to monitor in detail, then
the healthcare application shows the detailed values on the screen.
Step 10: USN middleware generates an event to notify the application of an emergency if certain
abnormal condition is detected. The application then alerts related parties such as a
hospital and family.
Step 11: When a healthcare application is about to stop its service, it may request the USN
middleware to no longer collect data from the sensor networks.
6.3.2 Cold chain management application
A cold chain management application uses RFID tag data and sensed data to monitor the condition
of a delivery system. RFID tags are attached to each palette containing products to identify the
objects on the palette. Sensor nodes and RFID readers are installed in delivery vehicles and storage
buildings of distribution centres. Sensor nodes sense temperature, and send the data to a cold chain
management application to report the current status of the delivery environment. If unusual
conditions are detected, then a cold chain management application alerts operators to such unusual
conditions. The steps are as follows:
Step 1: A cold chain management application generates appropriate rules based on each
product management information to determine and then react to the abnormal
conditions.
Step 2: Each sensor node equipped with sensors and RFID readers are attached to the delivery
vehicles and storage buildings to sense temperature and to recognize the delivered
items.
Step 3: Sensor networks/RFID readers are connected to USN middleware to provide sensed
data/RFID tag data. When connected, USN middleware is required to authenticate the
connecting sensor networks/RFID readers.
Step 4: When the application requires connection to USN middleware, the USN middleware
authenticates the connecting application to protect itself from unauthorized application.
Step 5: A cold chain management application registers the context-aware rules in the USN
middleware.
Step 6: A cold chain management application can utilize a sensor network metadata directory
service to obtain the target sensor network metadata.
Rec. ITU-T Y.4104/F.744 (12/2009) 153