Page 167 - Unleashing the potenti al of the Internet of Things
P. 167

Unleashing the potential of the Internet of Things                         3


            Step 4:     If a healthcare application tries to connect to USN middleware, the USN middleware
                        needs to authenticate the connecting application.
            Step 5:     A  healthcare  application  can  utilize  a  sensor  network  metadata  directory  service  to
                        obtain the target sensor network metadata.

            Step 6:     A healthcare application registers appropriate rules to the USN middleware to obtain
                        emergency notifications based on the rules and sensed data.

            Step 7:     USN middleware collects sensed data from the appropriate sensor networks, based on
                        the requests of USN applications. USN middleware receives sensed data from sensor
                        networks without any requests, if they periodically send sensed data.

            Step 8:     USN middleware processes sensed data based on the rules for context awareness and
                        simultaneously provides sensed data to a healthcare application.

            Step 9:     A  healthcare  application  displays  current  locations  and  the  medical  status  of  the
                        residents  on  the  screen  using  processed  data  and/or  raw  sensed  data  from  USN
                        middleware. The user can select which of the target residents to monitor in detail, then
                        the healthcare application shows the detailed values on the screen.

            Step 10:    USN middleware generates an event to notify the application of an emergency if certain
                        abnormal  condition  is  detected.  The  application  then  alerts  related  parties  such  as  a
                        hospital and family.
            Step 11:    When  a  healthcare  application  is  about  to  stop  its  service,  it  may  request  the  USN
                        middleware to no longer collect data from the sensor networks.

            6.3.2   Cold chain management application
            A cold chain management application uses RFID tag data and sensed data to monitor the condition
            of  a  delivery  system.  RFID  tags  are  attached  to  each  palette  containing  products  to  identify  the
            objects on the palette. Sensor nodes and RFID readers are installed in delivery vehicles and storage
            buildings of distribution centres. Sensor nodes sense temperature, and send the data to a cold chain
            management  application  to  report  the  current  status  of  the  delivery  environment.  If  unusual
            conditions are detected, then a cold chain management application alerts operators to such unusual
            conditions. The steps are as follows:
            Step 1:     A  cold  chain  management  application  generates  appropriate  rules  based  on  each
                        product  management  information  to  determine  and  then  react  to  the  abnormal
                        conditions.
            Step 2:     Each sensor node equipped with sensors and RFID readers are attached to the delivery
                        vehicles  and  storage  buildings  to  sense  temperature  and  to  recognize  the  delivered
                        items.

            Step 3:     Sensor  networks/RFID  readers  are  connected  to  USN  middleware  to  provide  sensed
                        data/RFID tag data. When connected, USN middleware is required to authenticate the
                        connecting sensor networks/RFID readers.

            Step 4:     When the application requires connection to USN middleware,  the USN middleware
                        authenticates the connecting application to protect itself from unauthorized application.
            Step 5:     A  cold  chain  management  application  registers  the  context-aware  rules  in  the  USN
                        middleware.
            Step 6:     A cold chain management application can utilize a sensor network metadata directory
                        service to obtain the target sensor network metadata.







                                                                   Rec. ITU-T Y.4104/F.744 (12/2009)     153
   162   163   164   165   166   167   168   169   170   171   172