=Paper= {{Paper |id=Vol-2101/paper10 |storemode=property |title=An IoT Model for Coping with Trade-offs in Designing Smart Environments |pdfUrl=https://ceur-ws.org/Vol-2101/paper10.pdf |volume=Vol-2101 |authors=Fabio Cassano,Antonio Piccinno |dblpUrl=https://dblp.org/rec/conf/avi/CassanoP18 }} ==An IoT Model for Coping with Trade-offs in Designing Smart Environments== https://ceur-ws.org/Vol-2101/paper10.pdf
       An IoT Model for Coping with Trade-offs in
             Designing Smart Environments

                               Fabio Cassano, Antonio Piccinno

           Dipartimento di Informatica, Universitá di Bari Aldo Moro, Bari, Italy
                    {fabio.cassano1, antonio.piccinno}@uniba.it



          Abstract. The Internet of Things (IoT) world is composed by a huge
          number of different so called “smart devices” and every year new and
          different models are released on the mass market. Most of those devices
          are intended to be used by professional people or by companies. Thanks
          to the constant growth of the “smart objects”, end users and people with
          low or no-knowledge of the IT-world get in touch with these pieces of
          technology. Those people are expected to use the smart devices “out of
          the box” and in a very simple and easy way so, the human-device inter-
          action needs to be as easiest as possible. Despite of this need, end users
          are commonly faced with thousand of different technological standards
          which are hard to evaluate without a solid IT background. Thus, the com-
          parison to understand which IoT device performs better in a particular
          situation become complicated. In this paper we propose a comparison
          of two different IoT solutions using an IoT model. The model assesses
          the different technical specifications of the devices and then extracts a
          “score” for each technological aspect. The end user can use the score
          to better understand the points of strength and the weaknesses of the
          devices.


  Keywords: IoT, Smart Device, IoT model


  1     Introduction
  The mass market offers to expert and non-expert users thousands of different
  Internet of Things devices. Those devices are generally composed by sensors, elec-
  tronics boards and antennas that allows them to communicate with the “outside”
  world. Due to the enormous number of combinations of those three components,
  the number of the available devices gets higher and higher. Hardware, program-
  ming, security, protocols etc. are terms that often are not clear to the end user
  that has to face the choice among multiple IoT devices. Indeed, the complexity
  of the choice increases when multiple objects can be used in multiple application
  contexts. Often, specific devices that are built to work in certain domains, thanks
  to their characteristics, can be also used in more and different contexts. For ex-
  ample, a temperature monitoring device for the home environment can be also
  used in a pharmacy store to check and control the temperature of the medicine
  room, using a “sink” node to transmit the data over the Internet. To correctly

                                                  80


Proc. of Fifth International Workshop on Cultures of Participation in the Digital Age - CoPDA 2018
Castiglione della Pescaia, Italy, May 29, 2018 (published at http://ceur-ws.org).
Copyright © 2018 for the individual papers by the papers' authors. Copying permitted for
private and academic purposes. This volume is published and copyrighted by its editors.
  configure an ecosystem made by multiple different devices, end users need to un-
  derstand most of the device’s characteristics [3,15]. This is not an easy task even
  for experienced people, due to the high number of different technical variables
  that need to be considered during this process. Thus, finding the right “trade
  off” between the technological aspect of the ecosystem and the different devices
  may be long and challenging. In literature, examples of comparing physical de-
  vices that require skills in selecting the right devices, preparing the environment
  settings, selecting users, identifying the tasks, etc. are reported [2,3].
      In this paper we first propose a model to assess smart devices in order to give
  a way to assess the suitability of a specific smart device to a certain application
  domain. Each device characteristic can be assessed and compared in order to
  choose the one that best satisfies the end user needs. We also report a first
  validation of the model by comparing two different smart devices.


  2     The IoT Device Model

  The proposed model has been developed by analyzing the characteristics of a
  number of different devices. It is shaped as a star diagram (Figure 1). A first
  version has been proposed in [14,12]. The model is composed by four “macro”
  elements each describing a specific technological perspective of the device: Com-
  munication, Target, Data Manipulation and Development.
      The first one represents the device communication element and concerns how
  the data are transmitted by the device. The “Target” element considers the con-
  text of use of the device, and it is associated to the device hardware implemen-
  tation. The “Data Manipulation” element covers all the characteristics related
  to the data generated and managed by the device. Finally, the “Development”
  element analyses the programming characteristics of the device. “Target” and
  “Development” are detailed with a group of more sub-elements that help the
  assessment of the device.


  2.1     Communication

  The Communication element represents how the communication between the
  device and the external world occurs. It analyses the technical aspect of many
  device’s characteristics, such as: the Security, the communication Protocol, and
  the Destination of the communication.
      The Cryptography is an aspect related to the security of the communication.
  Cypher data allow them to be sent and received over the net, keeping the content
  safe from unauthorized users [22]. For example the elliptic cryptography is always
  preferred to a dictionary-based one, as reported in [18].
      The Protocol is related to the application protocol in the communication.
  All the application protocols generate some overhead in the communication, as
  they add more “control” information to be sure that the data reach the receiver
  uncorrupted. To receive a good assessment in this element, a low-overhead pro-
  tocol must be used. For example, COAP (COnstrained Application Protocol) is

                                                  81


Proc. of Fifth International Workshop on Cultures of Participation in the Digital Age - CoPDA 2018
Castiglione della Pescaia, Italy, May 29, 2018 (published at http://ceur-ws.org).
Copyright © 2018 for the individual papers by the papers' authors. Copying permitted for
private and academic purposes. This volume is published and copyrighted by its editors.
                                                                               User
                                                                            Engagement

                                                                          Functionatlities
                                                                             addition

                              Firmware /
                                                           API             Customization
                            Low level design

                              Professional               Domain
                                                                             End Users
                               Developer                 Experts




                                                      Development
           Cryptography                                                                       Data Privacy


                                                                                               Collection
                                                           IoT             Data
              Protocol          Communication
                                                          device        Manipulation
                                                                                              Visualization

                                                                                                  Data
            Destination
                                                                                             Transformation
                                                          Target




                               Personal                Professional            Mixed


                                          Hardware Communication type


                                                      Microcontroller


                                               Cost                          Accuracy

                                                        Standard             Remote
                                  Size
                                                        Compliant           Application


                                  Fig. 1: The IoT device model




                                                           82


Proc. of Fifth International Workshop on Cultures of Participation in the Digital Age - CoPDA 2018
Castiglione della Pescaia, Italy, May 29, 2018 (published at http://ceur-ws.org).
Copyright © 2018 for the individual papers by the papers' authors. Copying permitted for
private and academic purposes. This volume is published and copyrighted by its editors.
  preferred to HTTP (Hyper Text Transfer Protocol) since it generates a very low
  overhead [21].
      The Destination is related to “where” the data are sent. This is a critical
  aspect as it makes the difference in an IoT ecosystem when multiple similar
  device communicate each other at the same time. Sending the data directly to
  a remote server may generate excessive traffic and interference on the network,
  thus it is important that a coordination (such as the usage of a sink node) is
  present.


  2.2     Target

  The Target element represents the main usage of the device and is related to
  the hardware characteristics of the device. We have classified the Target use in
  three main area, according its use and/or deploy: Personal, Professional and
  Mixed. All those aspects consider, in the assessment process, the hardware char-
  acteristics, including the physical communication type. As a general guideline
  for the assessment process, an hardware that uses low energy to work, supports
  a communication type IoT-compliant (low transfer rate and low power) and is
  usually exploited in multiple contexts, performs better than the others [4].
      The Personal element considers some technological and commercial aspects
  of the device such as the cost and the size, two valuable aspects in the assess-
  ment process. The Mixed element considers the cost and the possibility to use
  a remote application combined to the device. The Professional element assesses
  the accuracy of the sensor used on the device and its “IoT standard compliant”.
      Each of the above elements of the target perspective, share one more sub-
  element: Hardware communication type, Microcontroller, Cost, Accuracy, Size,
  Remote Application and Standard compliant. While Hardware communication
  type sub-element refers to the low-level technology used by the device to com-
  municate, the Microcontroller assesses the type of the hardware used. The device
  cost is particularly important for personal and mixed usages, while for profession-
  als, the accuracy in its measures should be considered. Personal devices should
  be small in size in order to fit everywhere, while for a mixed usage, the possibility
  to have a remote application is an important factor. Finally, for professionals it
  is imperative to use standard-compliant devices.


  2.3     Data Manipulation

  The Data Manipulation element is related to the data, from the Data Collection
  and Data Transformation, to the Visualization involving also the Data Privacy.
  This part is critical as it is the connection between the device low level sensor
  and the “outside world” represented by mobile applications, servers, services etc.
  [5].
       The Data Collection is an important aspect related to how the data are
  temporary stored into the device. There are two different approaches to this
  aspect: the buffering (which is the temporary store of multiple data instances)

                                                  83


Proc. of Fifth International Workshop on Cultures of Participation in the Digital Age - CoPDA 2018
Castiglione della Pescaia, Italy, May 29, 2018 (published at http://ceur-ws.org).
Copyright © 2018 for the individual papers by the papers' authors. Copying permitted for
private and academic purposes. This volume is published and copyrighted by its editors.
  or the “immediate send”, which involve the transmission of the data as soon as
  it has been produced. The first one is less energy consuming [19].
      The Data Transformation involves the conversion or the enrichment of the
  data. These kind of operations are supposed to be made on an external server
  rather than on the device itself.
      The Data Visualization analyses the aspect of the representation of infor-
  mation on the device. To save energy, the device should not show anything on
  it, but it should send the data to a remote service. An example of visualization
  available on a web server is CBP, that shows home energy consumption detected
  by IoT devices [6,7]. CBP was also used to show collaboration among distributed
  team member that can be detected by IoT devices or software [8,9].
      The aspect of the Data Privacy is related to the type of the data collected
  by the device [17]. Data integrity (the assurance of accuracy and consistency of
  the data) and privacy level of the people using the device are two of the most
  critical aspects in this element.

  2.4     Development
  The Development element involves the possibility of the device to be programmed
  by people. It has three target users: the Professional Developers, Domain Expert
  and End Users.
      Professional Developers are computer-literate people that are familiar with
  programming languages, low-level programming and model driven testing [20].
  They can read and understand the project specifications and they are able to
  modify it according to their needs.
      Domain expert users are people familiar with the IT world. They know how
  to program, thus they can use the API to develop a small piece of software that
  is able to perform the required need.
      End users are not familiar with the computer or (in general) with the technol-
  ogy. They are not able to program, thus they need to be supported by possibly
  visual paradigms (such as ATOOMA, IFTTT, Tasker or EFESTO)[16,10]. They
  may also have the need to collaborate each other to reach together a shared
  result [1].
      This element has multiple sub-elements: Firmware/Low level design, API,
  Customization, Functionalities addition and User engagement. The former be-
  longs to the world of Professional Developers: as their ability to program with
  low level languages, the source of the project and the possibility to edit the
  “core” of the system is essential. Domain experts, can use the API to program
  their solution to their own needs. End Users need to Customize and add or re-
  move some functionalities on their own. The user engagement is important as
  well [11].

  3     Discussion
  The aim of this model is to give users a way to assess one or more different IoT
  devices. By the assessment the end user can detect the right trade off between

                                                  84


Proc. of Fifth International Workshop on Cultures of Participation in the Digital Age - CoPDA 2018
Castiglione della Pescaia, Italy, May 29, 2018 (published at http://ceur-ws.org).
Copyright © 2018 for the individual papers by the papers' authors. Copying permitted for
private and academic purposes. This volume is published and copyrighted by its editors.
       Level 1              Level 2                      Level 3Technology Assessment
                            Protocol                              HTTP          1
   Communication           Destination                             Server       1
                          Cryptography                              N/A         0
                                     Hardware Communication        Wi-Fi        1
                                          Microcontroller         Arduino       1
                       Personal
                                               Cost                 50e         1
                                               Size                Small        1
      Target
                                     Hardware Communication        Wi-Fi        1
                                          Microcontroller         Arduino       1
                        Mixed
                                               Cost                 50e         1
                                        Remote Application      Mobile App      2
                      Collection                                   Buffer       2
       Data      Data Transformation                                N/A         2
    Manipulation    Visualization                                   No          2
                    Data privacy                               Ambient Data     1
                  Professional Dev.s     Firmware Design            N/A         0
                   Domain Experts              API                  N/A         0
    Development                           Customization             N/A         0
                      End Users       Functionalities Addition Graphic Design   2
                                         User Engagement            N/A         0
                          Table 1: The Sonoff SC assessment table



       Level 1              Level 2                      Level 3Technology Assessment
                            Protocol                              HTTP          1
   Communication           Destination                             Sink         2
                          Cryptography                             None         0
                                     Hardware Communication Bluetooth 4         2
                                          Microcontroller         Arduino       1
                       Personal
                                               Cost                 30e         1
                                               Size                Small        1
      Target
                                     Hardware Communication Bluetooth 4         2
                                          Microcontroller         Arduino       1
                        Mixed
                                               Cost                 30e         1
                                        Remote Application         N/A          2
                      Collection                               Immediate Send   1
       Data      Data Transformation                               N/A          2
    Manipulation    Visualization                                  LED          1
                    Data privacy                                Ambient Data    1
                  Professional Dev.s     Firmware Design           N/A          0
                   Domain Experts              API                 N/A          0
    Development                           Customization            N/A          0
                      End Users       Functionalities Addition     N/A          0
                                         User Engagement           N/A          0
                     Table 2: The Home-made device assessment table



                                                  85


Proc. of Fifth International Workshop on Cultures of Participation in the Digital Age - CoPDA 2018
Castiglione della Pescaia, Italy, May 29, 2018 (published at http://ceur-ws.org).
Copyright © 2018 for the individual papers by the papers' authors. Copying permitted for
private and academic purposes. This volume is published and copyrighted by its editors.
  all the characteristics of the devices and chose which one suits better to his/her
  needs. The domain experts take advantage of the model by having under control
  all the devices characteristics at a glance, even if they are not technical experts.
  This is an evolution of the work of presented in [13,14,12].
      In this section we propose a comparison between two devices: the Sonoff SC
  ambient analyzer and an home-made air and light analyzer. The first one is an
  all-in-one device, which has all the required components inside the plastic case.
  It has an external power supply (an USB power plug) and a slot for a memory
  card to store all the data collected by the sensors.
      The home-made air and light analyzer is composed by two parts: a Rasp-
  berry PI 3 and an Arduino board with many sensors (such as humidity, CO2,
  light sensors) connected to it. The communication between the Raspberry and
  the Arduino uses the Bluetooth 4 technology. The Raspberry can formally be
  connected with other Arduino boards and act as an external “sink”, where all
  the data get collected and then sent to the external web server.
      To assess all the device characteristics, we propose a score (s) from 0 to n
  (with n > 0) to assess the elements and the (optional) sub-elements of the model
  as follows:

    – s = 0: the characteristic is not supported by the device;
    – [0 < s < n]: the device partially supports the characteristic (e.g.: it adopts
      a technology, but a new and more performing technology is available);
    – s = n: the device fully supports the characteristic in terms of both function-
      alities and recent technology.

  In this assessment, for the sake of simplicity, we set n = 2.
      Table 1 shows the assessment for the Sonoff SC ambient analyzer, while
  Table shows 2 the assessment of the home-made air and light analyzer has been
  shown. For the sake of simplicity, each element and sub-element has been named
  according to a “level”, which is the distance from the center of the star. At
  a first sight, the two devices are very similar in terms of performances, price
  and technology. Both of them can be used in a personal and semi-professional
  environmental setting.
      The assessment of the Communication element is similar. The home-made
  device, supporting the sink node, performs slightly better than the Sonoff and the
  assessment of the Target element is almost the same as the previous one. Thanks
  to the Bluetooth 4 technology, the home-made device has a better assessment
  than the Sonoff.
      The Data Manipulation is performed better by the Sonoff device, thanks to
  the possibility to bufferize the data and the absence of any LED or display that
  shows the data sent. Similarly, the Sonoff device allows a little bit of personal-
  ization of the behavior of the IoT device: thanks to the graphical programming
  application, it is possible to define rules and send alerts to the users, if needed.
      The overall results from the assessment of those two devices shows that they
  are almost equivalent in all the fields. The home-made device is more industry
  oriented, while the Sonoff is better to be used in an home environment. They

                                                  86


Proc. of Fifth International Workshop on Cultures of Participation in the Digital Age - CoPDA 2018
Castiglione della Pescaia, Italy, May 29, 2018 (published at http://ceur-ws.org).
Copyright © 2018 for the individual papers by the papers' authors. Copying permitted for
private and academic purposes. This volume is published and copyrighted by its editors.
  resides in the End Users element because the Sonoff SC device gives users the
  possibility to program alerts and functionalities.


  4     Conclusion and Future Works

  In this paper we have presented a model to support the assessment of a smart
  devices according to different dimensions. The model, has four “macro” elements:
  Communication, Target, Data Manipulation and Development. Each of them is
  then further specified. By ranking (using a discrete scale) each element, it is
  possible to get an overall assessment of a given IoT device. Its suitability for a
  specific domain is then evaluated comparing its assessed characteristics to the
  domain needs. We provided an example that assesses and compares two similar
  IoT devices that can be used at home.
      In order to formally evaluate the model we are currently planning a test
  study with speech-therapist physicians and IoT devices.


  References
    1. Carmelo Ardito, Barbara Rita Barricelli, Paolo Buono, Maria Francesca Costabile,
       Antonio Piccinno, Stefano Valtolina, and Li Zhu. Visual mediation mechanisms for
       collaborative design and development. In International Conference on Universal
       Access in Human-Computer Interaction, pages 3–11. Springer, 2011.
    2. Carmelo Ardito, Paolo Buono, Maria Francesca Costabile, Rosa Lanzilotti, and
       Adalberto Lafcadio Simeone. Comparing low cost input devices for interacting
       with 3d virtual environments. In Human System Interactions, 2009. HSI’09. 2nd
       Conference on, pages 292–297. IEEE, 2009.
    3. Barbara Rita Barricelli and Stefano Valtolina. Designing for end-user development
       in the internet of things. In International Symposium on End User Development,
       pages 9–24. Springer, 2015.
    4. Andrea Bartoli, Mischa Dohler, Juan Hernández-Serrano, Apostolos Kountouris,
       and Dominique Barthel. Low-power low-rate goes long-range: The case for secure
       and cooperative machine-to-machine communications. In International Conference
       on Research in Networking, pages 219–230. Springer, 2011.
    5. Alessando Bianchi, Danilo Caivano, and Giuseppe Visaggio. Method and process
       for iterative reengineering of data in a legacy system. In In Proceedings of Working
       Conference on Reverse Engineering, pages 86–96. IEEE, 2000.
    6. Paolo Buono. A low cost system for home energy consumption awareness. In AmI
       (Workshops/Posters), 2015.
    7. Paolo Buono. A circular visualization technique for collaboration and quantifying
       self. In Proceedings of the International Working Conference on Advanced Visual
       Interfaces, pages 348–349. ACM, 2016.
    8. Paolo Buono, Maria Francesca Costabile, and Rosa Lanzilotti. A circular visual-
       ization of people s activities in distributed teams. Journal of Visual Languages &
       Computing, 25(6):903–911, 2014.
    9. Paolo Buono and Giuseppe Desolda. Visualizing collaborative traces in distributed
       teams. In Proceedings of the 2014 International Working Conference on Advanced
       Visual Interfaces, pages 343–344. ACM, 2014.

                                                  87


Proc. of Fifth International Workshop on Cultures of Participation in the Digital Age - CoPDA 2018
Castiglione della Pescaia, Italy, May 29, 2018 (published at http://ceur-ws.org).
Copyright © 2018 for the individual papers by the papers' authors. Copying permitted for
private and academic purposes. This volume is published and copyrighted by its editors.
  10. Federico Cabitza, Daniela Fogli, Rosa Lanzilotti, and Antonio Piccinno. Rule-
      based tools for the configuration of ambient intelligence systems: a comparative
      user study. Multimedia Tools and Applications, 76(4):5221–5241, 2017.
  11. Danilo Caivano, Fabio Cassano, Daniela Fogli, Rosa Lanzilotti, and Antonio Pic-
      cinno. We@ home: A gamified application for collaboratively managing a smart
      home. In International Symposium on Ambient Intelligence, pages 79–86. Springer,
      2017.
  12. Danilo Caivano, Fabio Cassano, Rosa Lanzillotti, and Antonio Piccinno. Towards
      an iot model for the assessment of smart devices. In Advanced Visual Interface
      (Workshops/Posters). Springer, In print.
  13. Danilo Caivano, Fabio Cassano, and Antonio Piccinno. Eud4sh: A eud model for
      the smart home. In International Symposium on Ambient Intelligence. Springer,
      In print.
  14. Danilo Caivano, Fabio Cassano, and Antonio Piccinno. Wip: a model for assessing
      iot devices. In 4th International Conference on Smart Computing. Springer, In
      print.
  15. Danilo Caivano, Daniela Fogli, Rosa Lanzilotti, Antonio Piccinno, and Fabio Cas-
      sano. Supporting end users to control their smart home: design implications from a
      literature review and an empirical investigation. Journal of System and Software,
      In print.
  16. Giuseppe Desolda, Carmelo Ardito, and Maristella Matera. Efesto: a platform for
      the end-user development of interactive workspaces for data exploration. In Rapid
      Mashup Development Tools, pages 63–81. Springer, 2016.
  17. Wenbo He, Xue Liu, Hoang Nguyen, Klara Nahrstedt, and Tarek Abdelzaher. Pda:
      Privacy-preserving data aggregation in wireless sensor networks. In INFOCOM
      2007. 26th IEEE International Conference on Computer Communications. IEEE,
      pages 2045–2053. IEEE, 2007.
  18. Vivek Kapoor, Vivek Sonny Abraham, and Ramesh Singh. Elliptic curve cryptog-
      raphy. Ubiquity, 2008(May):7, 2008.
  19. Joongheon Kim. Energy-efficient dynamic packet downloading for medical iot
      platforms. IEEE Transactions on Industrial Informatics, 11(6):1653–1659, 2015.
  20. Beatriz Pérez Lamancha, Macario Polo, Danilo Caivano, Mario Piattini, and
      Giuseppe Visaggio. Automated generation of test oracles using a model-driven
      approach. Information and Software Technology, 55(2):301–319, 2013.
  21. Tapio Levä, Oleksiy Mazhelis, and Henna Suomi. Comparing the cost-efficiency of
      coap and http in web of things applications. Decision Support Systems, 63:23–38,
      2014.
  22. Kai Zhao and Lina Ge. A survey on the internet of things security. In Com-
      putational Intelligence and Security (CIS), 2013 9th International Conference on,
      pages 663–667. IEEE, 2013.




                                                  88


Proc. of Fifth International Workshop on Cultures of Participation in the Digital Age - CoPDA 2018
Castiglione della Pescaia, Italy, May 29, 2018 (published at http://ceur-ws.org).
Copyright © 2018 for the individual papers by the papers' authors. Copying permitted for
private and academic purposes. This volume is published and copyrighted by its editors.