Вы находитесь на странице: 1из 52

PENCIL/LIGHTBULB: ©ISTOCKPHOTO.

COM/HSTRONGART
LAPTOP: ©ISTOCKPHOTO.COM/FAD1986,

Student Member or Graduate


Student Member to serve as the
Student Editor of IEEE Potentials.
If you’d like to apply, simply com-
plete and mail this application.
Be sure to include a copy of your
resume and your answers to the
essay questions. We look forward
to hearing from you.

REQUIREMENTS ESSAY QUESTIONS


■ IEEE Student Member or Graduate Student Please answer the following essay questions (in a separate document):
Member (graduate or undergraduate level) 1) In 50 words or fewer, explain why you would like to be the next Student Editor
for the time of service (two years). of IEEE Potentials.
■ Strong interest in the professional, social, 2) As Student Editor, what would your goals and objectives be?
and technical concerns of students. 3) List three areas of major concern to student engineers and technology professionals.
■ Desire to see those concerns addressed In approximately 200 words, explore one area in detail.
in IEEE Potentials in an objective, timely 4) List four editorial topics you would write about as IEEE Potentials Student Editor.
fashion.

BENEFITS Mail or e-mail to:


■ Communicate ideas to students. IEEE Potentials, 445 Hoes Lane, Piscataway, NJ 08854 USA
■ Work with other IEEE members from E-mail: potentials@ieee.org
academia and industry.
■ Show prospective employers your Name _______________________________________________________
professional involvement. Mailing address ________________________________________________
City ____________________________ State ________________ Zip _____
RESPONSIBILITIES Country ______________________________________________________
■ Provide input and feedback on the Permanent address _____________________________________________
editorial content of IEEE Potentials. City ____________________________ State ________________ Zip _____
■ Write an editorial for each issue. Country ______________________________________________________
■ Read and evaluate articles. Phone number _________________________________________________
■ Serve on the IEEE Student Activities E-mail _______________________________________________________
Committee (SAC), which oversees the I am an undergrad ________________ or a grad _________________ student
student programs and IEEE Student Institution ____________________________________________________
Branches established at leading universities Graduation date ________________________________________________
and colleges worldwide.
■ Attend two IEEE Potentials editorial board Don’t forget to submit this information and a resume with your application!
meetings and two SAC meetings each year. Apply by 24 December 2018
Digital Object Identifier 10.1109/MPOT.2018.2884178
The magazine for high-Tech innovaTors

January/February 2019
Vol. 38 No. 1

theme: smart Consumer


eleCtroniCs systems

6 Smart consumer electronics systems


saraju p. mohanty

8 Power supplies for consumer electronic devices


santanu mishra

14 S-CHIRP: Securing communications


in lightweight peer-to-peer networks in the IoT on the Cover:
Unboxing the technology
shaya Wolf, rafer cooley, and mike borowczak behind smart consumer
electronics systems.

20 A neighbor trust-based mechanism


boxes: ©istockphoto.com/bet_Noire
braiN: ©istockphoto.com/heNrik5000

to protect mobile networks


Gurveen Vaseer, Garima Ghai, Dhruva Ghai,
and pushpinder s. patheja

Departments
26 Proof of authentication:
IoT-friendly blockchains & Columns
Deepak puthal and saraju p. mohanty 3 editorial
4 the way ahead
5 gamesman solutions
30 Drones: Augmenting our quality of life
christos kyrkou, stelios timotheou, panayiotis kolios,
48 gamesman problems

theocharis theocharides, and christos panayiotou

37 A method for localizing the eye pupil


for point-of-gaze estimation MIssIon statEMEnt: IEEE Potentials
Narayan panigrahi, kiran Lavu, sai krishna Gorijala, is the magazine dedicated to undergraduate
and graduate students and young profes-
peter corcoran, and saraju p. mohanty sionals. IEEE Potentials explores career
strategies, the latest in research, and im-
portant technical developments. Through

43 E-marketing via augmented reality: A case its articles, it also relates theories to prac-
tical applications, highlights technology’s

study in the tourism and hospitality industry global impact, and generates international
forums that foster the sharing of diverse
ideas about the profession.
Neda shabani, arslan munir, and azizul hassan

Digital Object Identifier 10.1109/MPOT.2018.2850458

IEEE PotEntIals Januar y/Februar y 2019 ■ 1


IEEE PoTEnTIAlS—The magazine for high-Tech innovaTors

Sandra “Candy” Robison, President, Murty Polavarapu, Member Sebastian Corrado, Region 9
EDIToRIAl boARD IEEE-USA Development scorrado@ieee.org
editor-in-chief Forrest D. Wright, President, Standards Sergio Benedetto, Rajesh Ingle, Region 10
Vaughan Clarkson, University of Assoc. Member-at-Large ingle.rb@gmail.com
Queensland Martin Bastiaans, Member & Jill Gostin, Member-at-Large
student editor Geographic Activities Regional student
Cristian Quintero, Universidad Susan “Kathy” Land, Technical Activities Representatives
Distrital Fracisco José de Caldas
ADvISoRy CoMMITTEE Kayla Ho, Region 1
Division Directors Vaughan Clarkson, Chair (Potentials EIC) kho02@nyit.edu
associate editors Renuka P. Jindal (I) Mary Ellen Randall (MGA Past Chair)
John Benedict Boggala, Amazon Jacob Culleny, Region 2
F. Don Tan (II) J. Patrick Donohoe (SAC Chair)
Raymond E. Floyd, jacobculleny@comcast.net
Vijay K. Bhargava (III) Cecelia Jankowski (MGA Managing
IEEE Life Senior Member Jillian Johnson, Region 3
Jennifer T. Bernhard (IV) Director)
Zhijia Huang, Bank of America jjohns81@cbu.edu
John W. Walz (V)
Christopher James, John Y. Hung (VI) Benjamin Strandskov, Region 4
University of Warwick Bruno C. Meyer (VII)
MgA STuDEnT ACTIvITIES stran1b@cmich.edu
Jay Merja, MUVR Technology Dejan S. Milojicic (VIII)
CoMMITTEE Jessica Teeslink, Region 5
Sharad Sinha, Nanyang Technological Alejandro “Alex” Acero (IX) Elisa Barney Smith, Chair jessica.teeslink@mines.sdsmt.edu
University, Singapore Toshio Fukuda (X) ebarneysmith@boisestate.edu Mariella Saviola, Region 6
corresponding editors Elizabeth Johnston, Vice Chair msaviola@sandiego.edu
Region Directors lise.johnston@ieee.org Mohammad Jamiul Alam, Region 7
Cátia Bandeiras, Instituto Superior
Babak Beheshti, Region 1 Pablo Herrero, Past Chair jmjalam@gmail.com
Técnico
Katherine J. Duncan, Region 2 pablo.herrero@ieee.org Ana Inacio, Region 8
Syrine Ferjaoui, National Engineering
Gregg L. Vaughn, Region 3 Preeti Bajaj, Branch Chapter inesinacio@ieee.org
School of Sousse
Bernard T. Sander, Region 4 Representative, preetib123@yahoo.com
Athanasios Kakarountas, University Cristian Quintero, Region 9
Robert C. Shapiro, Region 5 Robert Burke, Branch Chapter Student
of Thessaly cristianquintero@ieee.org
Sachin Seth, Texas Instruments Kathleen A. Kramer, Region 6 Representative, Pasan Pethiyagode, Region 10
Sri Niwas Singh, Indian Institute Maike Luiken, Region 7 robert.burke@ieee.org
Margaretha Eriksson, Region 8 pasan.uom@gmail.com
of Technology Kanpur Dinko Jakovljevic, Young Professionals
Teofilo Ramos, Region 9 Representative,
IEEE PERIoDICAlS Kukjin Chun, Region 10 jakovljevic.dinko@windowslive.com
MEMbER & gEogRAPHIC
MAgAzInES DEPARTMEnT Vaughan Clarkson, Potentials EIC
ACTIvITIES DEPARTMEnT
445 Hoes Lane, HEADquARTERS STAff Cecelia Jankowski, Managing Director
v.clarkson@ieee.org
Piscataway, NJ 08854 USA Stephen Welby, Executive Director Cristian Quintero, Potentials John Day, Director, Member Products
Craig Causer, Managing Editor Michael Forster, Publications Student Editor, qcristianesteban and Programs
Geraldine Krolin-Taylor, Senior Jamie Moesch, Educational @hotmail.com Lisa Delventhal, Manager, Student
Managing Editor Activities Youmna El-Bitar, MGA/SAC/SPAA Chair and Young Professional Programs
Janet Dudar, Senior Art Director Konstantinos Karachalios, Standards youmna.elbitar@gmail.com Christine Eldridge, Administrative
Gail A. Schnitzer, Associate Art Activities Robert Vice, IEEE USA SPAC Chair Assistant, Student Services
Director Cecelia Jankowski, Member & robert.vice@gmail.com Shareyna Scott, Student Branch
Theresa L. Smith, Production Geographic Activities Liz Burd, TAB Representative, Development Specialist
Coordinator Cherif Amirat, Chief Information lizburd@newcastle.edu.au Kristen Mahan, Program Specialist
Mark David, Director, Business Officer Prasanth Mohan, IEEEXtreme Project Young Professionals
Development—Media & Advertising Donna Hourican, Staff Executive, Kelly Werth, Program Specialist
Lead, prasanthemy@gmail.com
+1 732 465 6473 Corporate Activities Student Activities
Felicia Spagnoli, Advertising Thomas Siegert, Business
Production Manager Administration & Chief Financial REgIonAl STuDEnT
Peter M. Tuohy, Production Director Officer ACTIvITIES CoMMITTEE CHAIRS IEEE HKn REPRESEnTATIvE
Kevin Lisankie, Editorial Services Director Charles Rubenstein, Region 1 Kathleen Lewis
Karen Hawkins, Chief Marketing
Dawn M. Melley, Staff Director, c.rubenstein@ieee.org kmlewis@mit.edu
Officer
Publishing Operations Mary Ward-Callan, Technical Activities Drew Lowery, Region 2
Chris Brantley, IEEE-USA dlowery@gmail.com InDuSTRy REPRESEnTATIvES
Victor Basantes, Region 3 R. Barnett Adler
IEEE boARD of IEEE MEMbER & gEogRAPHIC victor_basantes@hotmail.com b.adler@ieee.org
DIRECToRS ACTIvITIES boARD Nevrus Kaja, Region 4 Peter T. Mauzey
José M.F. Moura, President and CEO Martin Bastiaans, Chair nkaja@umich.edu p.mauzey@ieee.org
Toshio Fukuda, President-Elect Francis Grosz, Chair-Elect Anthony (Tony) Maciejewski, Region 5 Prijoe Philips Komattu
James A. Jeffries, Past President Mary Ellen Randall, Past Chair aam@colostate.edu prijoe.philips@gmail.com
William P. Walsh, Secretary Deborah Cooper, Treasurer Elizabeth Johnston, Region 6 John Paserba
Joseph V. Lillie, Treasurer Cecelia Jankowski, Secretary lise.johnston@ieee.org John.Paserba@meppi.com
Theodore W. Hissey, Director Emeritus Ron Jensen, Geographic Unit Mahsa Kiani, Region 7 Gowtham Prasad
Vice Presidents Operations mahsa.kiani@gmail.com smartgowtham@gmail.com
Witold M. Kinsner, Educational Activities Michael Lamoreux, Information Efthymia Arvaniti, Region 8 Robert Vice
Samir M. El-Ghazaly, Pub. Services & Prod. Management earvaniti@ieee.org robert.vice@gmail.com

IEEE prohibits discrimination, harassment, and bullying. Promoting Sustainable Forestry

For more information, visit http://www.ieee.org/web/aboutus/whatis/policies/p9-26.html. SFI-01681

IEEE Potentials (issN 0278-6648) (ieptDF) is published bimonthly by the institute of by the institute of electrical and electronics engineers, inc. printed in U.s.a. subscrip-
electrical and electronics engineers, inc. Headquarters address: 3 park avenue, 17th tions, orders, address changes: ieee operations center, 445 hoes Lane, piscataway,
Floor, New York, NY 10016-5997. phone: +1 212 705 7900. Change of address must be NJ 08854, phone: +1 732 981 0060. other publications: ieee also publishes more than 30
received by the first of a month to be effective for the following issue. please send to ieee specialized publications. advertising Representative: ieee potentials, 445 hoes Lane,
operations center, 445 hoes Lane, piscataway, NJ 08854. annual subscription, for ieee piscataway, NJ 08854, phone: +1 732 562 3946. IEEE Departments: ieee operations
student members, first subscription Us$5 included in dues for U.s. and canadian student center (for orders, subscriptions, address changes, and educational/technical/ standards/
members (optional for other student members). prices for members, nonmembers, and publishing/regional/section/branch services) 445 hoes Lane, piscataway, NJ 08854,
additional member subscriptions are available upon request. Editorial correspondence Usa. operations center +1 732 981 0060; Washington office/professional services +1 202
should be addressed to ieee potentials, 445 hoes Lane, piscataway, NJ 08854. respon- 785 0017. headquarters: telecopier +1 212 752 4929, telex 236-411.
sibility for contents of papers published rests upon authors, and not the ieee or its mem- periodicals postage paid at New York, NY, and at additional mailing offices. Postmaster:
bers. Unless otherwise specified, the ieee neither endorses or sanctions any positions send address changes to ieee potentials, ieee, 445 hoes Lane, piscataway, NJ 08854,
or actions espoused in IEEE Potentials. all republication rights including translations are Usa. canadian publications agreement Number 40030962. return Undeliverable cana-
reserved by the ieee. Copyright and Reprint Permissions: abstracting is permitted with dian addresses to: Fort erie, oN L2a 6c7 canada. canadian Gts #125634188.
credit to the source. Libraries are permitted to photocopy beyond the limits of U.s. copyright priNteD iN the U.s.a.
law, for private use of patrons, articles that carry a code at the bottom of the first page, pro-
vided the per-copy fee indicated in the code is paid through the copyright clearance cen-
ter, 222 rosewood Drive, Danvers, ma 01923. For other copying, reprint, or republication
permission, write to IEEE Potentials at piscataway, NJ. all rights reserved. copyright © 2019 Digital Object Identifier 10.1109/MPOT.2018.2850383

2 ■ J a n u a r y / F e b r u ar y 2019 IEEE PotEntIals


editorial

The Future Is Now


by Cristian Quintero

I
remember those childhood days during my vacations mechanisms and personal assistants ready to arrange
from school, when my mother would not let me go out our schedules.
to play with my friends if I did not first help with In this issue of IEEE Potentials, you will discover what
some of the housekeeping tasks. Sweeping and mop­ is coming in the world of smart consumer electronics de­
ping were the things that took most of my time, and I signed to make our lives easier. You can see the work of
had to do them at least twice every day. In those days, I hundreds of engineers who are thinking about what we
just wanted to complete my tasks as soon as possible will need in the next couple of years. This may be one of
so I could go out and play with my our most exciting issues because
friends. This is not as much of a you can find what is on the horizon
problem for the kids of today be­ In this issue of IEEE in terms of new technology.
cause they have vacuum cleaner Potentials, you will In a couple of months, I will leave
robots to do the work. discover what is coming in my parents’ house and carry out all
I was born in 1996, a year when of the necessary household chores
16 MB of random access memory the world of smart in my own apartment, but you know
was a big deal and Wi­Fi didn’t consumer electronics what? I am not worried at all. I have
exist; neither did Google and Net­ designed to make our my vacuum cleaner robot so I won’t
flix, companies that were founded have to sweep or mop, I own Internet
some years after I was born. The lives easier. Protocol cameras so wherever I am I
world has changed significantly can check that everything is OK in
in the last 20 years, which is nothing compared with the my apartment, and I have my Google Home to ask for any­
time the last couple of previous revolutions took. thing I need, whenever I need it. Of course, I will have to do
These past 20 years have been full of releases of dra­ some things, like cook, but this is fine, at least for now.
matic inventions conceived to make our lives easier, such What do you think? How much time will it take us until
as affordable personal computers for work, portable mu­ we live like they do in the animated sitcom The Jetsons and
sic players for fun, digital cameras to take more photos, be able to have our breakfast just by pushing a couple of
and, most recently, smartphones that are able to do all of buttons? How much time will pass until we have a cool as­
these things and more. This is just the beginning of an sistant like J.A.R.V.I.S. from Iron Man?
entire revolution, including voice commands to activate
about the author
Cristian Quintero (cristianquintero@ieee.org) is the stu­
Digital Object Identifier 10.1109/MPOT.2018.2876533
dent editor of IEEE Potentials.
Date of publication: 28 December 2018

IEEE PotEntIals Januar y/Februar y 2019 ■ 3


the way ahead

Opportunities for
Student Members
by Elisa H. Barney Smith

W
elcome 2019! What is your New Year’s reso- in vTools is more than just additional reporting require-
lution? Or maybe a better way of looking at ments; it will allow you to tell professionals about your
it is not through a single resolution, but Student Branch meetings. This is a great opportunity to
what opportunities lie ahead for 2019, and increase your interaction with local professionals. Ask
which will be your points of focus? There are many your Section leaders if they want to speak to your Stu-
opportunities for IEEE Student Members. The IEEE is dent Branch about the engineering work they are doing
rolling out some administrative changes. Officers in their job. Inquire about suggestions from other Section
likely have heard of these changes from multiple members to be speakers. The Student Branch at my uni-
channels already. While they most directly impact versity has been especially creative in the past couple of
Student Branches and Section officers, the goal is to years in utilizing the Internet, video cameras, and class-
open up opportunities to improve room projectors to invite speak-
the IEEE membership experience
for all Student Members.
Student Branches can ers from around the world to talk
about technical topics. As a result,
Do you know how the IEEE is always use more active we have seen an increase in pro-
structured? Your IEEE Student members, and by being fessionals attending branch meet-
Branch is more than a club; it is
part of the IEEE global structure.
more active, you will get ings. vTools events are showcased
in IEEE Collabratec and can be
The IEEE is divided by technical and more out of your promoted on websites and eNotic-
geographical areas. Geographically, membership in both es. IEEE Members and the public
there is a Section in which your uni-
versity resides (and all student lead-
professional development may see and register for upcoming
events entered in vTools. Training
ers should know what that Section and networking for vTools is available through the
is). The Student Branch is officially a opportunities with the Center for Leadership Excellence
subunit of that Section, just like sev-
eral other units, such as technical
professional IEEE Members (https://ieee-elearning.org/CLE/).
Sections run on a calendar-year
chapters and affinity groups (e.g., of your Section. operations schedule. You pay your
Women in Engineering and Young membership on a calendar year.
Professionals). Sections are now required to have a Section As part of the movement to tighten the relationship be-
Student Representative as a voting member of its Executive tween Student Branches and Sections, the annual Stu-
Committee. Students continue to be invited to attend Sec- dent Branch reporting due date has been changed to 1
tion planning meetings. February. This replaces the Annual Report that had been
Have you heard of vTools? As Student Members, you due yearly in November. By the time this article appears,
should have received invitations from your Section to at- that 1 February deadline will be rapidly approaching, so
tend meetings and events scheduled and targeted toward I hope you have started working on it. For students in
the professional IEEE Members in your Section. These the southern hemisphere, this should work great for you.
are organized through a tool called vTools (http://sites For those in the northern hemisphere, this might sound
.ieee.org/vtools/). What does this mean? Listing events strange, but it will work, especially after the first year.
For now, think and plan ahead. Report your spring 2019
Digital Object Identifier 10.1109/MPOT.2018.2877248
Date of publication: 28 December 2018 (Continued on page 48)

4 ■ J a n u a r y / F e b r u ar y 2019 IEEE PotEntIals


gamesman solutions

solution #1: Rock the Boat The speed of a body at any given point
When the man walks from one end of the in an elliptical orbit is given by the formula
lightweight boat to the other, the cen-
2 1
ter of gravity of the man-and-boat v = n a r - a k,
system remains fixed because no
external force acts on it. So, when w h e r e n = 3.986 # 10 14 m 3 /s 2 i s
the man moves one way, the boat the standard gravitational pa -
moves the other. When the man rameter. Due to the rotation of
stops, the boat stops. the elevator with the rotation of
the Earth, we also have v = ~r,
solution #2: Break the Chain where ~ = 7.292 # 10 -5 rad/s.
You should remove the fourth and Therefore, we want to solve the
11th paper clips from the chain. equation

solution #3: Pocket Change 2 2 2nR


na r - r + R k =
Numbers—© CaN stoCk Photo/123dartist,
~r = .
r ^r + R h
aNdroid—© CaN stoCk Photo/kirstyPargeter
The largest amount of change is US$1.19:
three quarters (or a half dollar and a quar-
ter), four dimes, and four pennies. Squaring both sides and rearranging terms, we have

solution #4: Juan For the Road 2nR


r 3 ^r + R h = .
Juan is the name of Pedro’s father. ~2

solution #5: space Elevator This is a quartic equation that is easily solved numerical-
A space elevator is usually conceived as extending up to ly. As a simple approximation, if we set r = t - _ 1 4 i R
geostationary orbit and beyond. If you were to catch the then r 3 ^r + R h . t 4, i.e., there is no t 3 term, so
elevator up to the geostationary level—an altitude of
35,786 km—and step off, you would appear to float near- 2nR 2nR R
by the elevator. The rotational speed of the elevator at t. 4
, which implies r . 4
- 4
~2 ~2
that level balances the gravitational pull so that you 2nR 5R
enter a circular orbit around the Earth that matches the and, therefore, altitude . 4
- 4 .
~2
rotation of the Earth. You have thrown yourself at the
ground and missed. But it’s possible to step off at a lower Substituting the values for n, R, and ~, we find an ap-
level and still miss the ground. At a lower level, you enter proximate altitude of only 23,299 km is necessary if you
an elliptical orbit with the center of the Earth at one want to throw yourself at the earth and miss by stepping
focus of the ellipse. Suppose your distance from the cen- off a space elevator. The numerical solution of the quartic
ter of the Earth is r when you step off the elevator, and equation gives the altitude as 23,412 km.
the semimajor axis of the ellipse is a. The point at which As a postscript, we note that what we have derived is
you step off the elevator is the vertex of the ellipse, i.e., a simplified version of the so-called Molniya orbit in the
the farthest point of the orbit from the Earth. At all equatorial plane. Molniya orbits are named for a constel-
points on the ellipse, you want to be farther from the lation of Russian telecommunication satellites whose or-
center of the Earth than the Earth radius, R, so that you bits are highly elliptical but, usefully, appear to hang over
miss the ground. We’ll assume a spherical Earth with a fixed point relative to an Earth observer for an extended
R = 6, 371 km. So we want r + R $ 2a. To find the period of time. This is just as you would appear to hang
smallest possible value of r, let’s set r + R = 2a. above an earthbound observer looking up from the foot of
the space elevator as you fell.
Digital Object Identifier 10.1109/MPOT.2018.2872280
Date of publication: 28 December 2018

IEEE PotEntIals Januar y/Februar y 2019 ■ 5


Smart Consumer Electronics Systems
©iStockPhoto.coM/lvcandy

Smart consumer
electronics systems
Saraju P. Mohanty

©iStockPhoto.coM/MF3d, Brain— ©iStockPhoto.coM/BuBaone

I
n 2017, I was invited by IEEE electronics (CE)-related s p e c i a l am the Steering Committee chair.
Managing Editor Craig Causer issue of IEEE Potentials. I started A fter much d i s cussion, we came
and IEEE Potentials then-Edi- thinking about a possible t heme. up with the idea to r en a me it the
tor-in-Chief (EIC) Sachin Seth During that sa me t ime period, I IEEE International Symposium on
to put t o g e t he r a consumer- was discussing renaming an IEEE Smart Electronic Systems.
conference, the IEEE International To convince people, I simplisti-
Digital Object Identifier 10.1109/MPOT.2018.2850539
Symposium on Nanoelectronic and cally explained that nanoelectron-
Date of publication: 28 December 2018 Information Systems, for which I i c a nd i n for mat ion systems a re

6 ■ J a n u a r y / F e b r u ar y 2019 IEEE PotEntIals 0278-6648/19©2019IEEE


essentially smart electronic systems. Optimal combinations of hardware and software
So, I thought, why not make the fo-
cus of this IEEE Potentials theme modules need to be explored for energy, security,
smart CE systems? and response smartness of electronic systems.
The idea become more concrete
when I was a panelist for the IEEE In-
ternational Conference on CE 2018 and care, and transport systems that are ■■“A Method for Localizing the Eye
presented on the theme of energy and combinations of cyberphysical sys- Pupil for Point-of-Gaze Estimation”
security tradeoffs in CE systems. tems (CPSs) realized using the IoT presents a method to estimate
The key message I delivered is that and working collectively to provide in- the point of gaze on a screen by
tradeoffs among security, energy telligence or smartness. As a result, implementing nonintrusive eye
consumption, latency, nonrecurring to pursue the efficient realization tracking that can be used for
design cost, and recurring operational of smart electronics, the IoT, CPSs, fatigue detection and attention
cost are needed for ef fective current and smart environments, there is a tracking. As a result, it has diverse
generation in Internet of Things (IoT)- need to research new hardware, firm- applications, such as in smart
enabled CE system design. This can ware, middleware, and software fac- cars and smart health care.
be achieved by the appropriate use ets that will interact with one other. ■■“E-Marketing via Augmented
of hardware and software compo- This IEEE Potentials special issue Reality: A Case Study in the
nents in CE systems. makes an effort to bring this con- Tourism and Hospitality Indus-
cept to the forefront. try,” focuses on the use of aug-
What are smart CE systems? mented reality in e-marketing
Smart CE systems (or, simplistically, scanning this issue with an emphasis on the hospital-
smart electronic systems) are envi- The articles in this issue were in- ity and tourism industry.
sioned to be energy, security, and vited from selected established re-
response smart. These three aspects searchers and reviewed for quality. looking forward
and the design tradeoffs among They include: I would like to sincerely thank IEEE
them are the key for next-generation ■■“Power Supplies for Consumer Managing Editor Craig Causer and
CE. Energy smart ensures minimal Electronic Devices” discusses the current IEEE Potentials EIC Vaughan
energy consumption that allows lon- power supplies that are needed Clarkson. I thank all of the contrib-
ger battery life and smaller energy in every power-driven CE system. uting authors, without whom this
bills. Security smart deals with the ■■“S-CHIRP: Securing Communica- issue could not have become possi-
security, privacy, or protection of CE tions in Lightweight Peer-To-Peer ble. I sincerely hope that this special
systems as well as that of the data Networks in the IoT” presents a issue of IEEE Potentials will be excel-
or media that these systems cap- protocol for secure communica- lent reading for many students and
ture, process, or store. Response smart tion for heterogeneous IoTs with researchers as well as general read-
refers to accurate sensing, intelligent round-robin protection. ers around the world.
processing to gather knowledge or ■■“A Neighbor Trust-Based Mech-
information from the data, and fast anism to Protect Mobile Networks” about the guest editor
actuation or response based on the introduces a neighbor trust-based Saraju P. Mohanty (saraju.mohanty@
information. Optimal combinations security scheme that prevents unt.edu) is a professor at the Uni-
of hardware and software modules malicious attacks in a mobile ad versity of Nor t h Te x a s, D e nt o n .
need to be explored for energy, secu- hoc network. His research in sma r t elect ron ic
rity, and response smartness of elec- ■■“Proof of Authentication: IoT- systems has been funded by the
tronic systems. Friendly Blockchains” presents a National Science Foundation, Semi-
From the hardware perspective, new consensus algorithm that conductor Cor porat ion, and the
a typical electronic system is an can make it possible for block- U.S. Air Force. He has authored 280
analog/mixed-signal system on a chains to run in the IoT with min- research articles and three books
chip (AMS-SoC) containing ana- imal computational requirements. and holds four U.S. patents. His
log, communications, digital, radio- ■■“Drones: Augmenting Our Quality Google Scholar h-index is 29 and
frequency, memory, sensors, and of Life,” discusses drone technol- i10-index is 90. He is the editor-in-
energy-source components as well as ogies in terms of research op- chief of IEEE Consumer Electronics
firmware, system software, middle- portunities, and the article dem- Magazine. He serves as the chair of
ware, and application software. We onstrates, through case studies, the Technical Committee on Very
are in an era of smart environments the implications of social, econom- Large Scale Integration of the IEEE
such as smart cities, homes, health ic, and scientific impacts. Computer Society.

IEEE PotEntIals Januar y/Februar y 2019 ■ 7


Smart Consumer Electronics Systems
©iStockphoto.com/lvcandy

Power supplies
for consumer
electronic devices
Santanu mishra

A
device used for noncom-
mercial purposes in enter-
tainment, communication,
and home offices is called
a consumer electronics de­
vice (CED), which incorporates elec-
tronic circuits for operation. By this
definition, computers, cell phones,
mobile devices, light-emitting diode
(LED) lights, TVs, cameras, gaming
stations/consoles, and various other
home elect ronics a re exa mples
of CEDs.
Most CEDs require dc power to
drive the electronic circuits. A utility-
connected house receives a single-
phase ac input. This supply can be
230 V/50 Hz or 110 V/60 Hz depend-
ing on geographical location. As
shown in Fig. 1, an ac/dc power sup-
ply is used to interface the ac grid
input to a CED (in this case, a moth-
erboard of an LED TV). Inside a CED,
there are various analog and digital
electronic circuits and integrated cir-
cuits (ICs) to process electronic infor-
©iStockphoto.com/Romanokopny

mation. These ICs require dedicated


power supplies because the volt-
age, current, and dynamic require-
ments are different. Therefore, there
are multiple dc/dc power supplies,
known as point­of­load converters on
the IC card or motherboard.
With renewable energy [e.g., roof-
top solar photovoltaic (PV)] becoming for use in homes. There is also an ef- multinational companies to stream-
popular, dc supply is directly available fort to standardize dc power distri- line this effort.
bution and CEDs that work with this In this article, a general overview
Digital Object Identifier 10.1109/MPOT.2018.2850478
standard. A consortium known as of power converters used in CEDs is
Date of publication: 28 December 2018 Emerge Alliance works with several discussed. Basic network theory and

8 ■ J a n u a r y / F e b r u ar y 2019 IEEE PotEntIals 0278-6648/19©2019IEEE


control engineering will be used to ex- a unipolar dc output. All types of or step-down ratio between the input
plain the fundamental operation of a ac adapters belong to this family and output. Figure 3(b) and (c) de-
converter and its application. of converters. picts the way an off-line isolated con-
From this classification, it is clear verter provides protection against in-
Power converter classification that, as far as block-level operation is sulation failure of equipment. In an
concerned, every converter is a non- isolated dc/dc converter, the trans-
Based on input/output profile linear block because its output con- former provides insulation against
A power converter or power supply tains a frequency component other direct short to ground [Fig. 3(b)]. In
is used to efficiently convert and than its input frequency. comparison, a nonisolated dc/dc
control power from one voltage/ converter [Fig. 3(c)] doesn’t provide
current/frequency level to another. Isolated versus nonisolated protection against insulation failure.
Based on the profiles of input and Sometimes in off-line applications, a
output voltages, a power converter converter is required to galvanically Power converter building blocks
can be classified into four types. isolate the utility grid input and the A power converter consists of two
1) dc/dc converter [Fig. 2(a)]: Its input dc output. This is generally achieved major building blocks: a power stage
and output voltages both are uni- by using an isolated dc/dc converter. and a control stage (see Fig. 4). The
polar in nature. Depending on the The basic structure of an isolated power stage is responsible for pro-
magnitude of voltages, they are dc/dc converter is shown in Fig. 3(a). cessing the power between the input
further divided into three types: It is realized by cascading a dc/ac and output. The control stage con-
a step-down, or buck type, where inverter, a high-frequency transformer trols the converter parameters, e.g.,
the magnitude of the output vol- (ferrite-core-type transformer), and maintains the fixed-output voltage if
tage is smaller than the input an ac/dc converter. High-frequency the input voltage varies. The control
voltage; a step-up, or boost type, transformers make the overall con- stage doesn’t have any power pro-
where the magnitude of the output verter design smaller by reducing cessing capability and is generally
voltage is higher than the input the transformer size. realized using low-power electronic
voltage; and an up-down, or buck- Isolated dc/dc converters are used circuits. Both mixed-signal ICs and
boost type, where the magnitude to improve safety, enhance noise im- fully digital ICs are common in the
of the output voltage can be either munity, and achieve a large step-up implementation of the control circuit.
smaller or higher than the input
voltage. Buck-type dc/dc convert-
ers are very common in CED ap-
dc/dc dc/dc
plications to power digital ICs ac/dc Converter 1 Converter 2
inside a CED. Boost-type dc/dc Supply 3.3-V
230 V, 50 Hz ac dc
converters find applications in 110 V, 60 Hz
universal serial bus charging ac/dc
ports, sensor power, and powering Supply 19.5-V
portable speakers, among others. dc
ac/dc
Similarly, buck-boost-type dc/dc
Supply 19.5-V
converters find applications in dc
smart devices, bias supplies, and
so on. FIG1 the several types of power supplies or power converters used to supply power to
2) dc/ac inverter [Fig. 2(b)]: It has the cEd.
a unipolar input voltage and a
bipolar periodic ac voltage. They
are quite common in uninter- vi, ii vo, io
dc/dc vi, ii vo, io, fo
dc/ac
rupted power supply design to Converter
vi vo vi Inverter
provide battery backup for grid vo 0
supply. Solar inverter to interface (a) (b)
PV source to grid also belongs to
this class of converters. vi, ii, fi vo, io, fo vi, ii, fi vo, io
ac/ac ac/dc
3) ac/ac converter [Fig. 2(c)]: Its input Converter vi Inverter
vi vo 0 0 vo
and output voltages are both bi- 0
(c) (d)
polar. In modern applications,
ac/ac converters can be realized
FIG2 the power converters are classified based on input and output voltage profile. (a)
by cascading an ac/dc converter
the dc/dc (green) has a unipolar input and a unipolar output. (b) the dc/ac (blue) has a
and a dc/ac converter. unipolar input and an ac output. (c) the ac/ac (yellow) has an ac input and an ac output
4) ac/dc rectifier [Fig. 2(d)]: It has a (the frequency and magnitude of the ac may be different). (d) the ac/dc (gray) has an ac
bipolar periodic ac input and input and a unipolar output.

IEEE PotEntIals Januar y/Februar y 2019 ■ 9


There are various sensors that feed pulsewidth modulated signal to drive and control implementation decides
the converter voltage/current in- the converter. the source type. If the output voltage
formation into the control circuit. From a terminal behavior point of of the converter is regulated, the con-
Based on this information, the con- view, a converter works like a volt- verter behaves like a voltage source.
trol stage generates a square-wave age or current source. The feedback This essentially means that, similar
to a voltage source, the output voltage
of the converter remains constant ir-
HF respective of variation in load current,
Transformer input voltage, and other parameters.
dc/ac ac/dc dc Similarly, if the output current of the
dc
Stage Stage converter is regulated, the converter
(a) behaves like a current source. In this
ac/dc case, the load resistance decides the
dc/ac
ac/dc
output voltage.
Figure 5 shows an example in which
Vgrid
a step-down dc/dc converter is used

Insulation
Failure
as a current source. In this case, the
inductor current is fed back to the
controller and regulated to a desired
Isolated dc/dc Converter reference value. Because of the pres-
(b) ence of a controller, it is possible to
dc/dc implement sources with square-wave
Vgrid > 50 V
output as well. When the converter is
+ operating as a source, it must follow
Insulation
Failure

Electric the rules of circuit theory, as depicted


Shock
in Fig. 6(a).
Nonisolated dc/dc Converter
some important design factors
(c)
Output power
FIG3 (a) an isolated dc/dc converter. (b) isolated converters provide protection against
The power rating of a converter de-
insulation-failure-based ground faults. (c) nonisolated dc/dc converters do not provide
protection against insulation-failure-based ground faults. hF: high frequency. pends on the load it is designed to
support. The overall objective is to
reduce cost and improve the efficiency
of the converter.
Power Stage When the load current is in the
Io order of tens to hundreds of milli-
Vin amperes, a simple linear regulator or
Load
switch capacitor circuit is preferred.
They are mainly used for bias appli-
cation. However, as the load current
Compensator level increases beyond a few amperes,
PWM Vo, Io, etc. a switching converter is the most op-
– timal solution because it provides the
+ Reference best tradeoff between efficiency and
Control Stage component count.
Here, another factor that affects the
(a)
power supply design choice is the ra-
Io tio of the input and output voltages. If
+ + + + the input-to-output ratio is high, even
if the load current is low, a switching
Vo Load Vo Load converter is the most optimal solution.
Io This is because, in a linear regulator,
– –
with a high input-to-output ratio, the
(b) voltage drop across the semiconduc-
tor device is very high, which leads to
FIG4 (a) the basic building blocks of a dc/dc converter. (b) the electrical equivalent higher power loss. When the load cur-
circuit of a converter. pWm: pulsewidth modulator. rent is very high, it is advantageous

10 ■ J a n u a r y / F e b r u ar y 2019 IEEE PotEntIals


to use multiple parallel modules, as ■■Circuit design, printed circuit board (MOSFETs) are mostly preferred as
shown in Fig. 6(b). This type of design layout, and electromagnetic in- switches in CED power processing
leads to better efficiency, energy den- terference become critical. circuits. Compared to silicon (Si)-
sity, and modularity to the power con- The selection of switching frequen- based MOSFETs, gallium nitride
version system. cy depends on switch type. Metal–oxide– (GaN)-based MOSFETs can operate at
semiconductor field-effect transistors a much higher switching frequency
Dynamics and control
As far as control function is concerned,
there are primarily two aspects of Power Stage vsw L /rL Vo
power converters used in CEDs that
are important: 1) control, in that the Ro
+
converter output follows a desired Vin
Gate
input reference signal, and 2) regula-
Driver
tion, in that the converter output (volt- Co
age or current) remains within desired
limits with change in input voltage,
load, or other parameters.
Vramp –
These concepts are depicted in Fig. 7. Vpwm
As shown in Fig. 7(a), the converter IL
+
output follows the variation in refer-
ence signal. Similarly, the response of
converter output voltage to a dynamic Iea Current Iref
change in load current for a server Compensator
power supply is shown in Fig. 7(b). Control Stage
The output regulation performance (a)
(<100  mV) during load change is evi-
dent. Here, control over the regulated
output as a function of current is dem- 100
onstrated. At higher current, the out-
put voltage is regulated at a smaller
value compared to the output voltage
(V)

at a lighter current. It helps in the 50


reduction of the size of the filter ca-
pacitor because the converter output
Iref
is now allowed to vary during dyna- IL
mic operation. 0
0 0.5 1 1.5 2 2.5 3 (ms)
High switching V (IL) V (IREF) Time
frequency operation (b)
The switching frequency is the rate
at which the switches of the convert- FIG5 an example of a controlled buck converter as a current source. (a) the schematic
and (b) response of the source to a given reference (l ref) .
er are turned on and off in a second.
In modern designs, the switches of
the converter are operated at 100 s of
kilohertz to several megahertz. The
I2
advantages of higher switching fre-
quency operation of a converter are Io Io Load
Vin Converter 1 Vo
the following. I1
■■It leads to smaller magnetic and
filter capacitor size. This results V2 Converter 2
in higher power processing den-
Load
sity of the converter. Vo Vo V1
■■The converter can be designed to
have faster dynamic response. (a) (b)
The drawbacks of increasing the
switching frequency are the following. FIG6 (a) the network theory rules need to be followed by a dc/dc converter operating
■■It leads to higher power loss in as an independent source. (b) the paralleling of dc/dc converters is a very common
the switches. technique to realize higher-power modules.

IEEE PotEntIals Januar y/Februar y 2019 ■ 11


Tek Stop Tek Stop

Output Voltage Regulation Limit

Vo
Vo

2
Vref Load Step Up
1

Io 100 A

1 Reference Step Change


4
Load Step Down
Ch1 50 mVΩ M 200 µs A Ch4 320 mV
Ch1 200 mV Ch2 1.00 V M 100 µs A Ch1 512 mV 500 mV
Ch4

(a) (b)

FIG7 the examples of converter dynamics. (a) the control of the output voltage using a reference signal and (b) the regulation of a con-
verter output with a change in load current. the feedback loop forces the converter to maintain an output voltage within a specific limit.

hertz switching frequency range are


98 reported with GaN-based devices.
Figure 8 shows the comparison
97 Buck Converter with GaN of efficiency of a buck converter with
Devices (EPC2012)
96 Si- and GaN-based MOSFETs as a
function of switching frequency. At
Efficiency (%)

95
higher switching frequency, GaN-
94 based converters have a distinct effi-
Buck Converter with ciency advantage. Due to a very high
93
Si Devices (IRF7492) speed of operation, inherent to GaN-
92 based MOSFETs, their packaging
plays an important role in harness-
91
ing this feature.
90
100 200 300 400 500 600 700 800 900 1,000
Switching Frequency (kHz)
application examples

FIG8 a comparison of the efficiency of a synchronous buck converter with Si and LED dimming circuit
Gan moSFEts. The illumination of an LED string
can be boosted by increasing the
average current through it. The pow-
er converter driving the LED string
I1 (commonly known as an LED dri ­
Ia ver) works as a current source to
ipwm
LED String

achieve the dimming function in LED


0 lights. The LED driver is a controlled
dc/dc converter.
fpwm > 200 Hz dc/dc 1
Analog
As shown in Fig. 9, there are two
dc/dc 2 Dimmer ways to realize a variable current
PWM Dimmer source. In the first method, the aver-
age current through the LED string
is regulated, which is known as ana­
FIG9 the basic technique used in an lEd dimming circuit. log dimming. In the second method,
the average current is controlled
(in multimegahertz) due to low par- ing loss compared to Si-based MOS- by forcing a square-wave current
asitic capacitances in GaN devices for FETs, especially in the megahertz through the LED string. In this case,
the same on-resistance of the switch. switching frequency range. Efficient the pulsewidth of the square wave
GaN devices have a much lower switch- power converters in the multimega- determines the average current. The

12 ■ J a n u a r y / F e b r u ar y 2019 IEEE PotEntIals


CC Mode CV Mode
Vbat
14.5 Icrg 1.8
Vref
14 1.6

Feedback
Low SOC 1.4

Control
13.5
Icrg 1.2
+ 13

Vbat (V)

Ibat (V)
1
12.5 0.8
Vref High SOC 0.6
Battery 12
0.4
11.5 0.2
Optimal Charger 11 0
0 428 729 998 1,478
Time (min)
(a) (b)

FIG10 (a) the basic control of an optimal battery charger and (b) an experimental battery-charge profile of a 36-ah, 12-v lead
acid battery.

frequency of the square wave needs to er output voltage is feedback into the ISL99140 datasheets. [Online]. Avail-
be much higher than 200 Hz so that controller. An experimental plot of able: www.intersil.com
it can’t be recognized by the naked battery-charging behavior is shown • S. K. Mishra and K. D. T. Ngo,
eye. The second method is more pop- in Fig. 10(b). Between 0 and 900 min, “Dynamic characterization of the
ular in LED dimming applications. the converter charges the battery as synthetic ripple modulator in a tight-
a current source when battery SOC is ly reg u lated d ist r ibuted power
Battery chargers below 90%. After this, the converter application,” IEEE Trans. Ind. Elec­
The method of charging is an impor- works like a voltage source and its tron, vol. 56, no. 4, pp. 1164–1173,
tant factor that decides the life of a current output is controlled by the in- 2009.
battery. There are various charging ternal resistance of the battery. • R. R. Duarte, G. F. Ferreira, M A.
methods available, including constant Dalla Costal, and J. Marcos Alonso,
current (CC), constant voltage (CV), Read more about it “Performance comparison of Si and
boost charging, pulsed charging, trick- • S. Mishra and O. Ray, “Advanc- GaN transistors in a family of syn-
le charging, and float charging. es in nanogrid technology and its in- chronous buck converters for LED
Normally, to improve the life of a tegration into rural electrification in lighting applications,” in Proc. 2016
battery, it is charged with a CC when India,” in Proc. 2014 Int. Power Elec­ Industry Applications Society Annu.
the battery state of charge (SOC) is tronics Conf., Hiroshima, Japan, pp. Meeting, Portland, OR, pp. 1–7.
low and with a CV when the battery 2707–2713. • R. Rosen, “Dimming techni-
SOC is near 100%. In CV mode, the in- • N. Mohan, T. M. Undeland, and ques for switched-mode LED driv-
ternal resistance of the battery limits W. P. Robbins, Power Electronics: ers,” Texas Instruments, Dallas, TX,
the battery-charge current. There- Converters, Applications, and Design, Rep. SNVA605, 2011.
fore, the charger needs to work as a 3rd ed. Hoboken, NJ: Wiley, 2003. • R. Singh and S. Mishra, “A mag-
current source when battery SOC is • R. White, “The amazing server netically coupled feedback-clamped
low, and it should work as a voltage power supply,” IEEE Power Electron. optimal bi-directional battery char-
source when battery SOC is high. Mag., vol. 2, no. 3, pp. 62–64, 2015. ger,” IEEE Trans. Ind. Electron., vol.
Figure 10(a) depicts an optimal • C. Jain and B. Singh, “Solar 60, no. 2, pp. 422–432, 2013.
battery-charger circuit where the energy used for grid connection: A • S. Mishra, “Power converter sys-
same converter is made to operate detailed assessment including fre- tems for consumer electronics de-
like a voltage and current source. The quency response and algorithm com- vices,” in Proc. 2016 IEEE Int. Symp.
tracking of battery SOC is achieved parisons for an energy conversion Nanoelectronic and Information Sys­
by monitoring the battery terminal system,” IEEE Ind. Appl. Mag., vol. 23, tems, pp. 72–75.
voltage (V bat), using a feedback con- no. 2, pp. 37–50, 2017.
trol circuit as discussed in the “Power • R. W. Erickson and D. Maksi- about the author
Converter Classification” section. For movic, Fundamentals of Power Elec­ Santanu Mishra (santanum@iitk
current source operation, the con- tronics, 2nd ed. New York: Springer- .ac.in) is a professor at the Indian
verter is fed back with battery cur- Verlag, 2001. Institute of Technology, Kanpur, India.
rent, which is regulated to Icrg. For • Intersil Americas. (2018). Power
voltage source operation, the convert- Management ICs ISL8273M, ISL80113,

IEEE PotEntIals Januar y/Februar y 2019 ■ 13


©iStockphoto.com/lvcandy
Smart Consumer Electronics Systems

S-CHIRP: Securing
communications in
lightweight peer-to-peer
networks in the IoT
Shaya Wolf, Rafer cooley, and mike Borowczak

A
lthough you may think of
our technological world as
a giant web of elegantly
interconnected devi­
ces, the reality is
a collection of messy overlap­
ping networks, all commu­
nicating si mult a neously

_W
ky
on disparate infrastructural

eS
h
/c
backb o n e s. To communicate

m
o
.c
to
o
within the chaos today, speci f ic

h
kp
c
to
components may be forced to share

iS
©
t—
o
space on dedicated local networks,

,i
ve
ti
ea
or, in many cases, they must rely on

R
c
ee
/B
m
complex switching and routing meth­
o
.c
to
o

ods to transfer information.


h
kp
c
to

As more devices are added to


iS
©
i—
i-F

peer­to­peer (P2P) networks in highly


W

specialized, lightweight, and local­


ized environments, the security and
isolation of communication within a tors continues to per­ all together. Wang, Lee, and
network remains a major design chal­ meate the infrastruc­ Murray (2017) found that
lenge. By examining several commu­ ture of our 21st­century because network resources,
nication problems in specific domain civilization. Growing in standards, and communica­
applications, a secure communica­ popularity, the IoT requires tion patterns vary greatly between
tion protocol, secure communication lightweight communication devices, IoT platforms are limited
for heterogeneous Internet of Things protocols across a variety of different and have unfulfilled potential.
(IoT) with round­robin protection devices to enable its pervasive and As the number of IoT devices con­
(S­CHIRP), is used to explore and de­ extended reach. Without lightweight tinues to grow, human­to­machine
fine potential minimalistic solutions. protocols, users struggle to feasibly (H2M) interactions are quickly repla­
connect all of their devices together ced by machine­to­machine (M2M)
Iot overview without unintended communication interactions. Take, for example, an
An enormous network of simple hard­ overlap. People don’t want to acciden­ IoT sensor network that measures
ware sensors, controllers, and actua­ tally give control of all of their Web­ crop soil properties and communi­
connected light bulbs to a neighbor, cates directly with a set of IoT water
Digital Object Identifier 10.1109/MPOT.2018.2850600
but they also don’t want to spend a sprinklers and IoT fertilizer tanks
Date of publication: 28 December 2018 day figuring out how to connect them to alter the fertilizer­to­water ratio

14 ■ J a n u a r y / F e b r u ar y 2019 IEEE PotEntIals 0278-6648/19©2019IEEE


being supplied. Figure 1 shows a more Because network resources, standards,
consumer­level scenario related to
lawn­maintenance devices. To scale, and communication patterns vary greatly
M2M networks need to i mplement between devices, IoT platforms are limited
lightweight communication protocols and have unfulfilled potential.
that would still allow neighbors to
have their own individual networks
while potentially sharing a common protocols, such a s S ­ CH I R P, are interactions between different devic­
infrastructural backbone. seg mented into cycles. During one es, or communication rounds, form
With the immense volume of IoT complete cycle, every device needs to a complete cycle. With bidirectional
M2M communication, efficient solu­ communicate with every other device communication, each device com­
tions must be developed that ensure in an organized fashion that each de­ municates with exactly zero or one
privacy from potential intruders as vice agrees upon. The many unique other device during each round of
well as other nearby IoT networks.
The S­CHIRP protocol is one mecha­
nism for secure and efficient com­
munication within IoT networks. The
protocol enables organized pairwise
communication between IoT devices
using only a limited amount of in­
ternal data. S­CHIRP caters to M2M
device communication and group se­
paration, without the need of a cen­
tralized agent. H2
M

M2M communication in the Iot


S­CHIRP focuses on lightweight de­
vices that would constitute a mesh M2
M
or swa r m P 2P net work. T h is in­
cludes unmanned aerial vehicle
(UAV) swarm networks, blockchain
com putational nodes, sensor net­ FIG1 h2m versus m2m. on the left, a human interacts with one single lawn
works, ingestible biomedical sensors, maintenance device. on the right are five interconnected lawn maintenance devices.
smart home networks, file­sharing
structures, electric smart meter sys­
tems, field com mun icat ion net­
works, and similar platforms. With
enhanced security and the absence
of third­party interests, decentralized
networks are gaining traction among
users who are not willing to trade
privacy for convenience. The differ­
ence between centralized and decen­
tralized networks is visualized using
UAVs in Fig. 2.
After deployment, the communi­
cation within a decentralized network
is dominated by M2M interactions.
Without the need for a server to or­
ganize the clients, S­CHIRP enables
faster and more secured networks.
As multiple devices are added to
networks, they begin to form groups,
or cliques, based on logical or securi­
ty constraints. Network protocols dic­
tate how devices in a specific clique FIG2 the mission of four Uavs is coordinated through constant communication to and
send messages to each other without from a centralized base station on the left. on the right, the four Uavs are coordinated
interfering with others. Round­robin through decentralized communication and consensus.

IEEE PotEntIals Januar y/Februar y 2019 ■ 15


Efficient solutions must be developed that partner identifier, it might find that
there are multiple devices in the
ensure privacy from potential intruders as well vicinity with that same identifier.
as other nearby IoT networks. Invalid communications are a two­
way cross­clique communication and
occur when devices in two cliques
communication. The effectiveness suring efficiency. Four common compute the same targeted partner
of a protocol is determined by the issues encountered when networks identifier. Consider soil sensors, e.g.,
number of rounds per cycle required overlap are described in the follow­ that dictate to automatic sprinkler
to establish conversations between ing sections and illustrated in Fig. 3. systems when to water a lawn. An
all devices. S­CHIRP accomplishes invalid communication would be
this in N rounds, where N is the ma­ Inactive communications when two neighbors’ soil sensors both
ximum number of devices in a clique. Inactive communications arise in two communicate with the wrong sprin­
Each device only needs to know a ways. First, a device calculates a tar­ kler systems at the same time.
few things to communicate with­ geted communication partner who is
out a server: first, the current round out of reach. Second, a device calcu­ Cross-clique communication—
(R), second, their unique identifier lates a targeted communication part­ collisions
within their clique (I), and finally, ner for a device that does not current­ In contrast to invalid communica­
the maximum number of devices in ly exist in network. In both scenarios, tions, collisions are one­way cross­
their clique (N ). when a device attempts to communi­ clique communications, where two
With this information, a device can cate with an unavailable device, the devices from different cliques calcu­
quickly and easily obtain the identi­ resulting communication is inactive. late the same target communication
fier of its targeted communication Inactive communications are not partner. Consider the soil sensors
partner device (T). This lightweight security threats, but they reduce again. A collision occurs when two
communication is achieved by requir­ overall communication efficiency. neighbors’ soil sensors both simulta­
ing every device to compute a com­ neously communicate to one sprin­
municate target using a three­param­ Valid communications kler system. One sprinkler system
eter equation (Borowczak and Purdy A valid communication connects two has competing information, while the
2018). For S­CHIRP to be successful, devices in the same clique. Devices other has no information. Cross­
it must solve the major challenge in in the same clique must talk to each clique communications poses a secu­
the adoption and use of lightweight other through valid M2M communi­ rity threat by enabling attackers to
IoT devices. Specifically, it must en­ cations efficiently and securely. generate traffic within the same
able scalable, serverless M2M com­ There can be no interference with space as a target network and per­
munication between devices when the connection (intentional or not), form denial of service attacks. The
multiple distinct groups are present. and these connections must be reli­ objective of S­CHIRP is to minimize
able regardless of the number or dis­ the likelihood of these communica­
Problems and challenges in tribution of cliques within the same tion issues while maintaining a light­
M2M clique communication network backbone. weight M2M communication protocol.
When multiple groups, or cliques, of
IoT devices exist on the same net­ Cross-clique communication— a proposed solution for secure
work backbone, M2M communica­ invalid communications M2M communication in cliques
tion protocols must overcome several Cross­clique communications occur
issues. Overlapping networks create when a device communicates outside Exact per-clique device counts
issues in maintaining secure com­ of its clique. When a device calcu­ Consider the following method for an
munication within a clique and en­ lates its targeted communication individual device to calculate a com­
munication target. Let the target
equal the remainder of the current com­
munication round offset by the indi­
0 1 2 0 1 0 1 0 1 vidual’s identifier after being divided
the number of devices in the group.
Take, e.g., a room full of people where
0 1 0 1 0 1 0 1 0 1
two constraints are in place.
Inactive Inactive Valid Invalid Collision First, each person needs to talk
with every other person in the room,
and second, each person can only
Clique 1 Clique 2 Empty Node
talk to one other person at a time.
This communication must be done
FIG3 the several communication scenarios between collocated cliques in m2m networks. in rounds, where pairs of people talk

16 ■ J a n u a r y / F e b r u ar y 2019 IEEE PotEntIals


each round. Once everyone in the Decentralized networks are gaining traction
room has talked to each other per­
son once, there has been one cycle of among users who are not willing to trade privacy
communication. If everyone needed for convenience.
to talk with every other person mul­
tiple times, it stands to reason that
you could determine a way to get ev­ devices, in two different cliques, to to account for a desired population
eryone to talk to each other once, have the same identifier, thus allow­ and number of cliques, there will be
then repeat that process as many ing for a communication collision. In some cliques containing devices that
times as you need. Without any di­ the worst case, the current round is may not exist in that network. These
rection, it could be very clustered and the same across the network, and placeholders increase the number of
not very efficient. there are multiple nodes with the inactive communications as actual
Perhaps your first intuition is to same identifier, the only distinguish­ devices attempt to communicate with
have someone at the front of the room ing factor in calculating the targeted the nonexistent devices.
give instructions on who to com­ communication partner among the
municate with next. However, with cliques is the maximum clique size. Distinct prime device count
S­CHIRP, this same type of commu­ Devices can calculate the same By setting the device count of the
nication is organized without the target communication partner iden­ cliques seen in the earlier example to
need for a centralized controller. It tifier as a device in a neighboring the nearest unique prime number,
does this by having each node cycle clique, i.e., when the device counts of the network benefits from a decrease
through the rest of the nodes by using different cliques are multiples of each in communication overlap. To avoid
modular arithmetic. If applied to this other. A clique size of two, e.g., will the overlap seen in the exact per­
room full of people, S­CHIRP would overlap frequently with a clique of clique device count solution, choos­
facilitate one cycle of communication size four because they are communi­ ing a unique prime number device
in N rounds, where N is the number of cating in the same pattern. Figure 5 count can keep cycles from overlap­
people in the room. demonstrates these cliques. A mali­ ping because they will take different
However, the communication fol­ cious node, which can listen to com­ times to complete cycles, and smaller
lows the same pattern each cycle, munications to get the node count, cliques cannot be multiples of larger
much like the room where ever y can use this overlap to infiltrate the cliques. However, there is still a chance
person needs to talk to each other clique using a slightly stronger sig­ for overlap in later rounds, specifi­
person multiple times. Therefore the nal than one of the other members. cally at the least common multiple of
first communication pairs in each Because there might not be a perfect two clique counts. This concept is
cycle are the same. Specifically, ev­ distribution of prime clique sizes modeled in Figs. 6 and 7.
ery time a new cycle starts, the first
round of communication will have a
node with index 0 communicate with
a node of index 1. With overlapping Clique 2 1 1 2 2 3 3 4 4 5 5 6 6 7 7 8
cliques, nodes will be looking for a
Clique 1 1 1 1 1 2 2 2 2 3 3 3 3 4 4 4
nonunique node index and could
accidentally (or intentionally) com­ Round 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
municate to a device in a different
clique. This attack vector is greatest FIG4 clique 1 has four rounds per cycle (blue, green, orange, pink), one per node.
when clique sizes (N ) are common clique 2 has two rounds per cycle (blue and green). cycle numbers are shown in white.
multiples of each other. In these situ­ cycle overlaps occur in the first two rounds, recurring at a four-round offset.
ations, cycles begin at the same time
with similar communication pat­
terns. A representation of this over­
lap for two cliques of size four and 0 1
two is given in Fig. 4. 0 1 Rounds 1, 5, 9 0 1
Rounds 2, 6, 10 Rounds 1, 3, 5 1 0
S­CHIRP presumes that cliques
Rounds 3, 7, 11 Rounds 2, 4, 6
know nothing about each other. If 2 3 Rounds 4, 8, 12 2 3
(Inactive)
each device knows the total number
Rounds 1, 5, 9...
of devices within its clique, they can (Every Four)
communicate based on that count
Clique 1 Clique 2
and the round they are on. Because
the identifiers assigned to devices
are determined within each clique, FIG5 the exact per-clique device count model: normal behavior of isolated cliques (left
there exists the potential for two and center panels), and combined collocated behavior (far-right panel).

IEEE PotEntIals Januar y/Februar y 2019 ■ 17


Biosensors are proving to be the health-care tech with one another rises. According to
Atherton (2017), UAV swarms are
of the future, enabling ubiquitous monitoring gaining traction both in civilian and
systems no larger than a common pill. military domains. Drawing inspira­
tion from bird flight patterns and
insect swarm patterns, such bio­
selected case study Smart home networks morphic systems as UAV swarms
applications Mesh networks are rapidly taking a move and act in ways to avoid colli­
The dominance of a lightweight M2M foothold within the home appliance sions while achieving an end goal.
communication in P2P networks is market. Smart thermostats and other Their ability to share minimally sized
exemplified in a snapshot view of devices already operate in harmony messages is critical.
case study applications. Figure 7 to control everything from tempera­
captures a visual representation of ture to ambiance. Densely populated Sensor networks
several of the applications that are neighborhoods contain many vary­ Sensor networks, like crop­watering
also described in this section. Fur­ ing­sized cliques depending on how sensors, are generally deployed with
ther examples of M2M communica­ many devices have been installed a large number of computationally
tion in IoT networks can be explored within a particular household. constrained nodes. As stated by Shi
in the numerous works surrounding and Perrig (2004), sensor nodes are
smart cities (Mohanty, Choppali, and UAV swarms susceptible to physical capture, eaves­
Kougianos, 2016), edge computing As UAVs become cheaper to produce, dropping, and collusion. Without a
(Corcoran and Datta, 2016), and, of the potential for hundreds, if not secure, lightweight communication
course, wearables (Wei, 2014). thousands, of UAV agents to interact protocol like S­CHIRP, these networks
could easily be influenced by mali­
cious actors.

0 1 Ingestible biomedical sensors


0 1 0 1
Rounds 1, 6, 11 According to Bachmann et al. (2012),
Rounds 2, 7, 12 1 0 biosensors are proving to be the health­
2
Rounds 3, 8, 13 care tech of the future, enabling ubiq­
2 3 2 3
Rounds 4, 9, 14 Rounds 1, 4, 7
Rounds 2, 5, 8
uitous monitoring systems no larg­
Rounds 5, 10, 15 4 2
4 Rounds 3, 6, 9 er than a common pill. The sensors
Rounds 1, 16... are tiny and lightweight, requiring
(Every 15)
a communication mechanism to
match. Because each node requires
Clique 1 Clique 2 Empty Node
exceptional computation perfor­
mance with serious size constraints,
FIG6 the distinct prime device counts model with cliques sizes four and two, using there is little room left for a robust
device counts of five and three. communication protocol. Further, as
portions of the population begin in­
gesting these sensors, it becomes
extremely important to ensure that
their sensors do not have overlap­
ping communications.

Blockchain computational
nodes
Blockchain computational nodes
currently have access to a large amount
of computing power. However, as
blockchain technology grows in pop­
ularity, so does the desire to make
it lightweight and portable. Even
with large amounts of computational
power, nodes require reliable means
of communication. Given that block­
FIG7 the overlapping home-sensor networks become highly overlapping in densely chain relies on a serverless architec­
populated regions (far left), a decentralized Uav swarm (top center), sensor networks ture, a serverless communication
(bottom center), and ingestible biomedical sensors (far right). protocol, such as S­CHIRP, lends

18 ■ J a n u a r y / F e b r u ar y 2019 IEEE PotEntIals


itself to future advances in decen­ A serverless communication protocol lends itself
tralized autonomous organizations.
to future advances in decentralized
Conclusion autonomous organizations.
The dominance of M2M communica­
tion in IoT networks can be controlled
using a decentralized communication lightweight IoT networks that are ca­ future­air­force­fighters­leading­
solution, S­CHIRP, that scales to mul­ pable of maintaining secure clique drone­swarms
tiple cliques of devices while remain­ isolation while also minimizing com­ • E. Aljarrah, M. B. Yassein, and
ing lightweight and device agnostic. putational overhead. S. Aljawarneh, “Routing protocol of
In addition to providing a communi­ low­power and lossy network: Sur­
cation strategy for pairwise commu­ Read more about it vey and open issues,” in Proc. 2016
nication in single­clique worlds, a • M. Borowczak and G. Purdy, Int. Conf. Engineering MIS (ICEMIS),
solution for multiple cliques leverag­ “S­CHIRP: Secure communication 2016, pp. 1–6.
es the existing strategy by decreas­ for heterogeneous IoTs with round­ • A. Castiglione, P. D’Arco, A. De
ing the likelihood of cycle collision robi n protect ion,” i n Proc. 2018 Santis, and R. Russo. (2017, Sept.).
by increasing per­clique device counts IEEE Int. Conf. Consumer Electronics “ S e c u re g roup com mu n ic at ion
to distinct prime numbers. Several (ICCE), 2018, pp. 1–6. schemes for dy namic heteroge­
specific use cases highlight the benefit • W. Wang, K. Lee, and D. Mur­ neous distributed computing,” Fu-
and need for ultralightweight com­ ray, “A global generic architecture ture Gener. Comput. Syst. [Online].
munication protocols. for the future Internet of Things,” 74, pp. 313–324. Available: http://
There are limitations to S­CHIRP. Serv. Oriented Comput. Applicat., w w w.sciencedirect.com/science/
Networks generally change in ap­ vol. 11, pp. 329–344, Sept. 2017. article/pii/S0167739X15003830
pearance over time, and population • C. Bachmann, M. Ashouei, V. • S. Sattolo, “An algorithm to ge­
size and clique counts are likely to Pop, M. Vidojkovic, H. De Groot, and nerate a random cyclic permutation,”
vary over time. A complete long­term B. Gyselinckx, “Low­power wireless Inform. Processing Lett., vol. 22, no. 6,
solution must operate efficiently given sensor nodes for ubiquitous long­ pp. 315–317, 1986.
changes in both of these parameters. term biomedical signal monitoring,”
Finally, the security implications of IEEE Commun. Mag., vol. 50, no. 1, about the authors
a nonkeyed decentralized commu­ pp. 20–27, 2012. Shaya Wolf (swolf4@uw yo.edu)
nication protocol must be taken into • E. Shi and A. Perrig, “Design­ earned her B.S. degrees in computer
account. Although inactive commu­ ing secure sensor networks,” Wire- science and mathematics at the
nications cause a drop in efficiency, less Commun., vol. 11, pp. 38–43, University of Wyoming, Laramie, in
they do not pose a security threat like Dec. 2004. 2017. She is currently a student
invalid communications. • S. P. Mohanty, U. Choppali, pursuing her Ph.D. degree in com­
Many other problems exist across and E. Kougianos, “Everything you puter science at the University of
M2M communication. One in partic­ wanted to know about smart cities: Wyoming Cybersecurity Education
ular is the conflicts that occur when The Internet of Things is the back­ and Research Lab, Laramie.
a device attempts to communicate bone,” IEEE Consum. Electron. Mag., Rafer Cooley (rcooley2@uw yo
with another already active device. vol. 5, no. 3, pp. 60–70, 2016. .edu) earned his B.S. degree in com­
Achieving communications between • P. Corcoran and S. K. Datta, puter science at the University of
specific IoT devices requires a strat­ “Mobile­edge computing and the Wyoming, Laramie, in 2017, where
egy for protecting the network from Internet of Things for consumers: he is currently a student pursuing
connected devices of foreign intrud­ Extending cloud computing and his Ph.D. degree in computer science.
ers. Borowczak and Purdy (2018) services to the edge of the network,” He is a member of the University of
propose that S­CHIRP could provide IEEE Consum. Electron. Mag., vol. 5, Wyoming Cybersecurity Education
a layer of security for IoT swarm com­ no. 4, pp. 73–74, 2016. and Research lab.
munications by introducing a per­ • J. Wei, “How wearables inter­ Mike Borowczak (mike.borowc
mutation in round ordering. sect with the cloud and the Internet zak@uw yo.edu) earned his Ph.D.
Future experiments could also in­ of Things: Considerations for the degree in computer science and
clude the generation of new cliques developers of wearables,” IEEE Con- engineering from the University of
over time as new cliques of devices sum. Electron. Mag., vol. 3, no. 3, pp. Cincinnati, Ohio, in 2013. He is the
enter a transmission space. In a re­ 53–56, 2014. director of the Cybersecurity Edu­
al­world situation, cliques may also • K. D. Atherton. (2017, June). cation and Research Center and
merge or distance themselves from The future of the air force is fighter Lab and a faculty member in com­
each other. Ultimately, there remains pilots leading drone swarms into puter science at the University of
a significant amount of work in de­ batt le. Popular Science. [Online]. Wyoming, Laramie.
veloping minimal M2M protocols for Available: https://www.popsci.com/

IEEE PotEntIals Januar y/Februar y 2019 ■ 19


Smart Consumer Electronics Systems
©iStockphoto.com/lvcandy

A neighbor trust-based
mechanism to protect
mobile networks
Gurveen vaseer, Garima Ghai, dhruva Ghai, and pushpinder S. patheja

M
obile nodes in a mobile
ad hoc network (MANET)
form a tempora l l i n k
between a sender and
receiver due to their con­
tinuous movement in a limited area.
This network can be easily attack­
ed because there is no orga ni zed
identity. This article discusses the
MANET, its various associated chal­
lenges, and selected solutions. As a
case study, a neighbor trust­based
security scheme that can prevent
ma licious attacks in a MANET is
discussed in detail. The security
scheme identifies each node’s behav­
ior in the network in terms of pack­
ets received and forwarded. Nodes
are placed in a suspicious range, and
if the security scheme detects mali­
cious function continuously, then it
is confirmed that the particular node
is the attacker in the network.

ManEt: a brief overview


A MANET is a collection of indepen­
dent nodes that are mobile and able
to communicate with each other ©Stockphoto.com/SaSinparakSa

wirelessly without the presence of


any centralized coordinator. Each
node functions as a host as well as a ments through another independent bility of stand­alone electronic devic­
router. Figure 1 shows the composi­ node. MANETs are designed keeping es and enables their integration in
tion of a MANET where three differ­ in mind the arbitrary organization of advanced applications, such as the
ent, independent nodes communicate electronic devices, such as mobile Internet of Things. Several existing
with one another in varying environ­ phones and laptops, where the net­ security solutions for wired networks
work topology changes dynamically are ineffective and inefficient for a
Digital Object Identifier 10.1109/MPOT.2018.2850599
and unpredictably. This unique fea­ MANET environment because the
Date of publication: 28 December 2018 ture of MANETs enhances the capa­ transmission takes place in an open

20 ■ J a n u a r y / F e b r u ar y 2019 IEEE PotEntIals 0278-6648/19©2019IEEE


space, making the MANETs more
susceptible to security attacks.

the challenges of a ManEt


Figure 2 depicts the classification
of malicious attacks in a MANET. Node C
Node A
Attacks can broadly be of two types:
passive and active. Passive attacks
do not disrupt the normal operation
Node B
of the network but prey on impor­
tant data in the network mainly
through eavesdropping and the
analysis of traffic that f lows in
the network, so that the attackers
gather me a n i n g f u l data. Active
attacks are carried out by mali­ FIG1 a representation of a manEt.
cious nodes that reside inside/out­
side the network to gat her data
and modify it. These attacks are
carried out by malicious nodes on Malicious Attacks on Networks
va r ious net working layers, i.e.,
physical, data link, transport, and
network, wherein each attack has
specific characteristics and behav­ Passive Attacks Active Attacks
ior that causes harm to the vulnera­
ble network.
Figure 3 gives an overview of the
importance of an attack­free en­ Network Transport Data Link/
Traffic
vironment for safe phones, smart Eavesdropping Layer Layer Physical
Analysis
Attacks Attacks Layer Attacks
grids, and industrial control systems
showing intrusion detection systems
(IDSs) and intrusion prevention sys­
tems in place. There are four major Sybil U2R Blackhole IP Probe SYN Vampire DoS
types of active attacks: denial of Spoofing Flooding
service (DoS), probing, vampire, and
user­to­root (U2R). In a DoS attack, FIG2 the taxonomy of malicious attacks on networks. ip: internet protocol;
the system is flooded with illegiti­ Syn: synchronize.
mate requests and responses, mak­
ing it inaccessible to legitimate users
and, hence, crashing the server. In
a probe attack, a device or an ac­ Cyberattacks
tivity is maliciously introduced into Intruder
the system, allowing it to gain ac­
cess and damage the system. In a
Safe Phones
U2R attack, the attacker gains con­
trol of the victim’s machine, acquir­
ing super­user privileges. A vampire
attack is a type of DoS attack that Safe Smart
Public IDS + Attack-Free Grids
consumes the node’s energy and Network IPS Environment
decreases the network’s efficiency
and reliability.
Safe
The importance of cybersecurity Industrial
in today’s world and the complexity Control
of security mechanisms have been Systems
Knowledge
widely discussed in the existing lit­ Base
erature. A scheme in which two MA­
NETs were merged using a method
ca lled merging using monitoring, FIG3 the importance of an attack-free environment. ipS: intrusion prevention system.

IEEE PotEntIals Januar y/Februar y 2019 ■ 21


A MANET is a collection of independent nodes scheme that can detect probe, DoS,
vampire, and U2R attacks. The sec­
that are mobile and able to communicate urity mechanism checks its neigh­
with each other wirelessly. boring node for malicious activity,
i.e., whether the node deviates from
its specific behavior. The main aim
of the protocol is routing, which is
detection, and rehabilitation is avail­ trol systems has been presented. Fur­ designed to build and maintain a
able. An adaptive acknowledgment thermore, a comparison mechanism table of route information.
intrusion detection with node de­ for vampire attacks using routing The flow of a specific scheme is
tection techniques in MANETs has protocols on the network layer has shown in Figs. 4–6. A collection of
b e en proposed. A mu lt i l ayer de­ been performed. addresses of intermediate nodes be­
tection technique to identify DoS tween the sender and receiver is creat­
attacks by designing cross­layer a specific scheme ed. It is compared with receiver­nodes
architecture to control such attacks for secure ManEts addresses until there is a match.
is a lso available. Addit iona lly, a This section presents an intrusion The data are broadcasted from the
multiagent IDS in large switched prevention algorithm for a MANET sender to receiver using ad hoc on­
networks to protect industrial con­ that uses a neighbor trust­based demand distance vector (AODV) pro­
tocol. A preventer (watcher) node is a
special node that is capable of tracing
the established route, observing the
Start activity of nodes, and blocking the
malicious activity generator node
under the specified range. The pre­
M: Set of Nodes venter node uses two primitives: sus­
S: Sender Node P M, R: Receiver Node P M
picious and blocking. If the node’s be­
W: Watcher Node P M, I: Intermediate Node Addresses P M
havior is found to be abnormal (which
E: Energy of Node, C: Consumed Energy, eth: Energy Threshold
does not meet the functionality of
eth: Consumed Energy of All Nodes in Path/2
AODV: Routing Protocol, Rr: 550 Radio Range normal behavior), it is designated as
a suspicious node and under full sur­
veillance of the preventer node. Fur­
Execute Prevention Module thermore, if the activity of the node
W Watch Activity of Node in Rr is found to be malicious, that node is
blocked by the preventer node.
The preventer node plays an im­
Has
No portant role in watching all of the at­
I Updated ID
as R? tacks that have been mentioned. The
activity of a U2R attack is traced by
Yes
Step 2 data­forwarding criteria in which the
I Receive Data and Not intermediate node updates its self
Forward to Next Hop or Receiver identification (ID) as the receiver ID.
Data are not forwarded to the receiv­
er node, which drops by the LOOP
Is (a condition wherein the incoming
data drop No and outgoing node is the same, i.e.,
Yes
by loop? the node forwards itself to the next
node), implying that the preventer
node has identified the activity as a
Is U2R attack and, as a result, blocked
I Set as U2R Attack energy of current
No node > total energy
the attacker node.
Call (Block the Node,
consumed by previous A vampire attacker node con­
Record Time, Broadcast)
nodes in the sumes extra energy of the node. When
path? the preventer node finds that the re­
Stop Yes quired energy for the data transmis­
sion of a particular path is greater
Step 3
than the defined energy threshold,
it checks the energy consumption of
FIG4 a flowchart of the presented algorithm (step 1). each node in the path. W hen the

22 ■ J a n u a r y / F e b r u ar y 2019 IEEE PotEntIals


node runs extra threads other than t he overhead. T he prevent ion 3) NRL probe attack and prevention
for data for warding or consumes scheme reduces overhead as the case: The data packet loss is min­
higher energy than all other nodes preventer node repairs the local imized by identifying attacker
combined, it is classified as a vam­ route in which the attacker re­ nodes and blocking them and
pire attack and is blocked by the sides and generates a new route channelizing a new path for the
preventer node. to the destination node. remaining nodes.
A probe attacker node behaves
correctly while the routing mod­
ule executes but later drops or cap­
tures the data of the source node. Step 2
This activity is traced by the pre­
venter node, and it blocks the at­ S Established Route by I Node to R
tacker nodes. A DoS attacker floods Send (Data, S, R)
the network with a number of junk
Does
packets to overload t he system I not match
Is
so that legitimate requests are not TCP/UDP headers
there a data drop No
fulfilled. The preventer node checks and packet is not network
or data capture
the data packet, and if it does not packet type?
and node not
match standard Transmission Con­ forwarded?
trol Protocol (TCP)/User Datagram Yes
Yes
Protocol (UDP) headers, it further
I Set as Probe Attack I Under Suspicious
checks the data rate. If the data Call (Block the Node, Record Time, Broadcast) W (Store I Data, Data Rate,
rate is higher than normal, it iden­ Number of Receivers, Time)
tifies the node as a faulty node and No
Stop
blocks it.
Is
Response of a ManEt data unknown
No and data rate > normal data rate
under the specific
and receiving time > standard
security scheme time pattern?
This section de s c r ib e s the res ­ I Set as DoS Attack
Call (Block the Node, Record Time,
ponse of the si mu l ated net work
Broadcast)
under conditions of attack as well
Yes
as after applying the prevention
mechanism. The responses report­
ed are throughput, normal routing FIG5 a flowchart of the presented algorithm (step 2).
load (NRL), and end­to­end delay.
An AODV protocol is considered
for routing between t he sender
and receiver. Step 3
1) NRL DoS attack and prevention
case: NRL is the ratio between
the number of routing packets W Check the In Activity
to the total data received. Fig­
ure 7(a) shows the performan­
ce of the network under a DoS Is
attack w ith a nd w ithout the In executing extra
prevention scheme. The scheme threads not for
communication? No
stops the unwanted congestion
delay by sea rching for a new
path for the nodes, thereby re­ Yes
ducing overhead a nd remov­ I Set as Vampire Attack
i n g u nw a nted f lood i n g f rom Call (Block the Node, Record Time, Broadcast)
the network.
2) NRL U2R attack and prevention
case: Figure 7(b) shows the net­ Stop
work performance with and with­
out the prevention scheme. U2R
results in f looding, enhancing FIG6 a flowchart of the presented algorithm (step 3).

IEEE PotEntIals Januar y/Februar y 2019 ■ 23


The security scheme identifies attacker nodes tion scheme checks whether the
packet has updated itself as
through their malicious behavior and minimizes t he root node and, in spite of
packet dropping and routing overhead. being idle, is not forwarding the
data to the next hop. After ensur­
ing these conditions, if the data
4) NRL vampire attack and preven­ packets are tested for UDP/TCP packets are dropped, then that
tion case: For a vampire attack, behavior. If there is a delay in node is blocked and an alternate
the preventer node identifies the data rate, they are blocked path is devised.
the attacker node and blocks by the preventer node, and a new 7) Throughput analysis probe at ­
it. A new path is then detected in path for transmitting legal pack­ tack and prevention case: The
which resources do not consume ets is devised. Figure 7(c) shows performa nce of the a lgor it h m
increased energy, thereby reduc­ the performance of throughput against a probe attack is shown
ing NRL. in the DoS attack and preven­ in Fig. 8(b). Due to packet drop­
5) Throughput analysis DoS attack tion scenario. ping by the attacker, the receiver
and prevention case: The through­ 6) Throughput analysis U2R attack does not gain all of the data. The
put is measured in number of and prevention case: Figure 8(a) attacker wholly consumes the
packets transmitted per unit includes the throughput perfor­ data and also wastes the valu­
time. The throughput per for­ mance of the network under U2R able energ y resources of t he
mance is improved after apply­ att ack w it h a nd w it hout t he MANET. Packets are checked if
ing the prevention scheme, as secur it y scheme. The preven­ they are dropped or not forwarded.

30 7 2,000
25 6

Data Received (kb/s)


5 1,500
20
NRL (%)

NRL (%)

4
15 1,000
3
10
2 500
5 1
0 0 0
0 20 40 60 80 100 0 20 40 60 80 100 0 20 40 60 80 100
Simulation Time (s) Simulation Time (s) Simulation Time (s)
NRL-DoS NRL-U2R Throughput-DoS
NRL-DoS-Prevention NRL-U2R-Prevention Throughput-DoS-Prevention

(a) (b) (c)

FIG7 the nrl and throughput (doS). the (a) nrl for doS, (b) nrl for U2r, and (c) throughput for doS.

1,200 1,400 2,000


Data Received (kb/s)

Data Received (kb/s)

Data Received (kb/s)

1,000 1,200
1,000 1,500
800
800
600 1,000
600
400
400 500
200 200
0 0 0
0 20 40 60 80 100 0 20 40 60 80 100 0 20 40 60 80 100
Simulation Time (s) Simulation Time (s) Simulation Time (s)
Throughput-U2R Throughput-Probe Throughput-Vampire
Throughput-U2R-Prevention Throughput-Probe-Prevention Throughput-Vampire-Prevention
(a) (b) (c)

FIG8 the throughput (U2r, probe, vampire) analysis. the throughput for (a) U2r, (b) probe, and (c) vampire.

24 ■ J a n u a r y / F e b r u ar y 2019 IEEE PotEntIals


TABLE 1. A network performance summary.
DoS ATTACK/ VAMPIRE ATTACK/ PROBE ATTACK/ U2R ATTACK/
PARAMETERS PREVENTION PREVENTION PREVENTION PREVENTION NORMAL

pdF (% data received) 81.6/89.76 82.11/90.97 82.02/90.06 26.67/88.27 90.53


dropped data (number of packets) 946/763 698/503 855/828 1,163/739 780
average end-to-end delay (μs) 0.52/0.51 0.45/0.36 0.52/0.46 0.65/0.63 0.33

If no specific reason is provid­ after confirmation in the network. • A. A l­Roubaiey, T. Sheltami,


ed for these actions, the nodes For future research, this work will A. Mahmoud, E. Shakshuki, and
are blocked. be tested in different network sizes H. Mouftah, “A ACK: Adaptive ac­
8) Throughput analysis vampire at­ to check scalability. We will also look knowledgment intrusion detection
tack and prevention case: It is at preventing multiple attacks in the for M A NE T w ith node detection
checked that no extra threads network simultaneously. en hancement,” in Proc. IEEE Int.
are used for communication in Conf. Advanced Information Net­
the path. Also, the times of previ­ Read more about it working and Applications, 2010, pp.
ous and current nodes are calcu­ • M. H. Davis, U. Lang, and S. 634–640.
lated, and if it is found that the Shetye, “A cybermodel for privacy • R. Shrestha, K. H. Han, D. Y.
time taken by the node to move is by design: Building privacy pro­ Choi, and S. J. Han, “A novel cross
more than that of its threshold, tection into consumer electronics,” layer intrusion detection system
then it is identified as an attack­ IEEE Consum. Electron. Mag., vol. 4, i n M A N E T,” i n P ro c . I E E E In t .
er and blocked. Figure 8(c) de ­ no. 1, pp. 41–49, 2015. Conf. Advanced Information Net­
picts the throughput analysis • M. L. Rajaram, E. Kougianos, working and Applications, 2010,
in the vampire attack and pre­ S. P. Mohanty, and U. Choppali, pp. 647–654.
vention scenario. “Wireless sensor network simula­ • Y. Gong, Y. Fang, L. Liu, and
9) Average end­to­end delay analy­ tion frameworks: A tutorial review,” J. Li, “Multi­agent intrusion detec­
sis: Average end­to­end delay is IEEE Consum. Electron. Mag., vol. 6, tion system using feature selection
the average time taken to transmit no. 2, pp. 63–69, 2016. approach,” in Proc. IEEE Int. Conf.
packets from the sender to receiver • D. R. Raymond and S. F. Mid­ Intelligent Information Hiding and
nodes. End­to­end delay depends kiff, “Denial­of­service in wireless Multimedia Signal Processing, 2014,
on queue delay, bandwidth, pro­ sensor networks: Attacks and de­ pp. 528–531.
cessing, and contention. Table 1 fenses,” Pervasive Comput., vol. 7,
shows the average end­to­end no. 1, pp. 74–81, 2008. about the authors
delay in different attacks as well as • J. Pullagura and V. Rao, “Sim­ Gurveen Vaseer (gurveenv@oriental
the prevention scenario. The pre­ ulation­based comparison of vam­ university.in) is a research scholar
vention methodology minimizes pire attacks on traditional MANET at the Oriental University Indore,
delay by providing a secure and routing protocols,” Inform. Commun. India, who has been pursuing re ­
efficient path. The delay in the Technol. Sustainable Develop., vol. search on cybersecurity since 2016.
normal case is 0.33 μs. Table 1 9, pp. 501–509, Nov. 2017. Garima Ghai ( ga r imag ha i@
shows the network performance • A. Alsumayt, J. Haggerty, and orientaluniversity.in) is a professor
under various attacks and their A.Lotfi, “Detect DoS attack using with the Department of Computer
prevention schemes. MrDR method in merging two MA­ Science and Engineering at Oriental
NETs,” in Proc. IEEE Int. Conf. Ad­ University Indore, India.
Conclusion vanced Information Networking and Dhruva Ghai (d h r u v a g h a i@
We present an algorithm to prevent Applications Workshops, 2016, pp. orientaluniversity.in) is a professor
probing, DoS, vampire, and U2R 889–895. with the Department of Electronics
attacks. The security scheme identi­ • J. Vuorinen and P. Tetri, “Par­ and Communication Engineering at
fies attacker nodes through their adoxes in information security,” Oriental University Indore, India.
malicious behavior and minimizes IEEE Potentials, vol. 35, no. 5, pp. Pushpinder S. Patheja (pspatheja@
packet dropping and routing over­ 36–39, 2016. gmail.com) is a director of student
head. The security scheme first con­ • S. S. Roy, D. Puthal, S. Sharma, S. welfare, and associate professor in
siders nodes in the suspicious range. P. Mohanty, and A. Y. Zomaya, “Build­ the School of Computing Science
Nodes that demonstrate malicious ing a sustainable Internet of Things,” Engineering at the Vellore Institute
functions are defined as attackers. IEEE Consum. Electron. Mag., vol. 7, of Technology, Bhopal, India.
These attacker nodes are blocked no. 2, pp. 42–49, 2018.

IEEE PotEntIals Januar y/Februar y 2019 ■ 25


Smart Consumer Electronics Systems
©iStockphoto.com/lvcandy

Proof of authentication:
IoT-friendly blockchains
deepak puthal and Saraju p. mohanty

Blue chainS—©iStockphoto.com/cyBrain, White chain—©iStockphoto.com/3dSculptor

T
his article introduces the constrained infrastructures, such tion, communication, identification,
concept of proof of authen­ as the IoT. and semantics. A critical require­
tication (PoAh) for the light­ ment of the IoT is that the things in
weight implementation of Blockchain in the Iot: the network must be interconnected.
blockchains in the Inter­ the challenges Implement ing blockcha ins in
net of Things (IoT). The PoAh can The IoT is based on the vision to the IoT to secure the infrastructure
replace existing consensus algo­ connect physical devices to the In­ in a distributed ma nner is a big
rithms, such as proof of work (PoW), ternet and access remote data to challenge (Fig. 1). Consider ing the
proof of stake (PoS), and proof of ac­ control the distanced physical world. resource­constraining devices of the
tivity (PoA), for resource­ and energy­ The building blocks of the IoT are IoT, blockchain implementation looks
objects or embedded devices that impossible due to the energy re ­
Digital Object Identifier 10.1109/MPOT.2018.2850541
can be connected to the Internet. quirement for PoW. However, PoW is
Date of publication: 28 December 2018 The IoT includes sensing, computa­ the backbone for blockchains, and,

26 ■ J a n u a r y / F e b r u ar y 2019 IEEE PotEntIals 0278-6648/19©2019IEEE


without it, blockchains cannot have a
distributed form. As a result, the cur­
rent blockchain technology cannot be
applied to the IoT.
Due to the wide range of IoT ap­
plications in the modern world and
blockchains as the only distr ib­
uted security architecture, we can­
not ignore the intersection of these Da
Transition History Stored in a Block of Data
technologies. IoT applications focus
on energy­efficient computing and
1 2 3 n
real­time decision making. This mo­
tivates us to explore lightweight con­
sensus algorithms as a blockchain
transaction verification and valida­
tion method for the IoT. FIG1 the blockchain transactions network.

PoW
Miners within a bitcoin network must
maintain and record on the same dis­ Prev-Hash PoW Prev-Hash PoW
tributed ledger to secure bitcoins and
maintain consistency. However, with Trx-1 Trx-2 … Trx-n Trx-1 Trx-2 … Trx-p
millions of decentralized nodes and
no central server to maintain the net­ Block – i Block – i + 1
work, how can this be done? Bitcoin’s Proof Challenge
(Include Bits) (Prev-Hash)
solution to this problem is PoW. In
traditional transaction methods, a
trusted third party is always involved
to keep a transaction record to main­ Hash
tain the balance. However, the decen­
tralized trustless consensus main­
tains the transaction without the FIG2 the poW transactions. prev-hash: previous hash; trx: transaction.
help of third­party services. With the
concept of bitcoin or digital curren­ reward points, the miners compete only used for bitcoins but also for sev­
cies, individual users in the network with each other to solve the mathemat­ eral other applications, including ethe­
hold the distributed ledgers, i.e., the ical problem. After finding a solution, reum. One of the common terms for
blockchain (Fig. 2). The users can the miner broadcasts to the network the algorithm used by ethereum is PoS.
track the transaction information to update the blockchain and receive
without the help of a trusted third a reward, i.e., cryptocurrency. In a Pos
party. They do not need an authenti­ real­world problem, the mining pro­ The basic concept of PoS is proof of
cation by a third party to validate cess is essentially an inverse to a hash the ownership of digital currency
their transactions. function. In the standard blockchain, from PoW. Coinage does not play a
Distributed ledgers require an ex­ the parameters update fortnightly, and crucial role for bitcoins, whereas the
pensive computational calculation to new blocks generate every 10 min. PoS concept originated for bitcoins
solve mathematical puzzles to vali­ PoW works on a distributed con­ to help prioritize the transactions.
date the trustless transactions. The sensus basis, where a miner needs a PoS gives the same level of confiden­
expensive computational calculation is great deal of energy. In a single bitcoin tiality, the most critical requirement
also known as a miner, and the process transaction, electricity consumption is for monetary transactions.
of validating the transactions is called equivalent to the household electric­ The PoS transaction, also known
PoW. The miner has two important ity use of 1.5 households for one day as coinstake, introduces a new type of
roles: 1) validate the transactions by in the United States. By 2020, the bit­ block (Fig. 3). The term kernel is the
avoiding potential network threats coin transaction network will consume
and 2) calculate reward points. Blocks close to the amount of electricity used
Kernel Input Stake Output
contain a number of transactions, and in a country the size of Denmark. Due
Stake Input (Pay to Stake
miners apply PoW to evaluate in­ to the computational and economic Stake Input Owner)
dividual transactions, as shown in difficulties of PoW, several applications
Fig. 2. The miner that solves the block use a slight modification of PoW to use FIG3 the structure of poS (coinstake)
first gets a reward point. To achieve a blockchain. The concept of PoW is not transactions.

IEEE PotEntIals Januar y/Februar y 2019 ■ 27


first input of coinstake and required to creating a block as the coinage of their es the exchange of the coin, as each
meet the target hash protocol and ap­ currency increases. exchange would reset the coinage,
ply a stochastic process to generate leading to hoarding of the currency.
PoS blocks. Coinstake follows limit­ Poa PoA was designed to reduce the
ed search space to compute hash val­ In the PoS scheme, coins continue to impact of these problems. The idea
ue instead of unlimited search space grow in coinage even if the partici­ is to reward a fraction of the PoW re­
like PoW. As a result, PoS is energy pant is offline. This creates a prob­ ward to active peers, where having a
efficient compared to PoW. The hash lem where miners go online every higher stake in the currency increases
target that the PoS kernel must meet several weeks, create blocks, and the chances of winning the reward. A
is a target per unit coinage consumed then go offline afterward. This signif­ miner who solves a PoW puzzle broad­
in the kernel. This system ensures icantly reduces the number of con­ casts the solution to the network. Ev­
that miners who have not been able to currently online nodes, reducing the ery node receiving the block is able
provide a solution to the cryptograph­ security of the coin. Another problem to derive a number of ticket numbers
ic puzzle will have a higher chance of with this scheme is that it discourag­ from the solution. A peer who owns
the coin corresponding to the ticket
will put a signature onto the block and
be able to receive a part of the reward.
Prev-Hash PoAh Prev-Hash PoAh A peer who is offline will not be able to
sign the block and, therefore, will not
receive the reward. The PoA scheme
Trx-1 Trx-2 … Trx-n Trx-1 Trx-2 … Trx-p
aims to incentivize peers to remain
Block – i Block – i + 1 on the blockchain, thereby improv­
ing its security by using this award
FIG4 the poah in block transactions. mechanism. This scheme also makes
Cloud
Edge
Fog

Prev-Hash PoAh

Prev-Hash PoAh
Trx-1 Trx-2 … Trx-p

Hash PoAh Trx-1 Trx-2 … Trx-p


T1 T2 T3

Hash PoAh
Hash PoAh
T1 T2 T3
T1 T2 T3
IoT

Hash PoAh Hash PoAh


T1 T2 T3 Hash PoAh
T1 T2 T3 Hash PoAh
T1 T2 T3
Hash PoAh T1 T2 T3

T1 T2 T3 Hash PoAh
Hash PoAh
T1 T2 T3
T1 T2 T3

FIG5 the blockchain in fog computing.

28 ■ J a n u a r y / F e b r u ar y 2019 IEEE PotEntIals


spending of the currency less punish­
ing, as holding onto currency for long TABLE 1. A comparison of different consensus
algorithms of blockchain.
periods of time does not improve the
probability of receiving a reward. PoW PoS PoA PoAh
energy consumption high high high low
Poah for the Iot
computation requirements high high high low
The consensus algorithms, such as
PoW, PoS, and PoA for blockchains, latency high high high low
are introduced for bitcoin applica­ Search space high low na na
tions. The presented PoAh follows a
traditional blockchain working model evaluate PoAh (Fig. 5). The edge devices • S. Nakamoto. (2008). Bitcoin: A
with lightweight block verification. work as a partially trusted device. This peer­to­peer electronic cash system.
The initial step of the miner in a will maintain the decentralized secu­ www.bitcoin.org. [Online]. Available:
network is to validate the block, fol­ rity framework in the network. https://bitcoin.org/bitcoin.pdf
lowed by evaluation of the hash value, Traditional IoT device deployment • Investopedia. (2018). Proof of
whereas PoAh aims to authenticate can be followed to register devic­ stake. [Online]. Available: https://
the blocks following the same trans­ es with fully trusted parts, such as w w w.investopedia.com/terms/p/
action method as blockchains (Fig. 4). the cloud (Fig. 5). PoAh can also be proof­stake­pos.asp
The miners can be trusted nodes of integrated with these concepts for end­ • S. King and S. Nadal. (2012).
the network and used for authentica­ to­end secure infrastructure building. Ppcoin: Peer­to­peer crypto­currency
tion. All of the network nodes must A comparison classification of dif­ with proof­of­stake. [Online]. Avail­
maintain and record on the same ferent blockchain consensus algo­ able: https://peercoin.net/assets/
distributed ledger, and they can track rithms and their properties is pre­ paper/peercoin­paper.pdf
the transaction information. sented in Table 1. • F. Tschorsch and B. Scheuer­
The trusted nodes in the network mann, “Bitcoin and beyond: A tech­
authenticate the blocks to add into Conclusion nical survey on decentralized digital
the distributed ledger. This includes PoAh removes the reverse hash func­ currencies,” Commun. Surveys Tuts.,
two steps for authentication: 1) au­ tion from PoW to lightweight the vol. 18, no. 3, pp. 2084–2123, 2016.
thenticate the block and source of the process. As a result, blockchains can • N. N. Kshetri, “Can blockchain
block and 2) upon validating the au­ efficiently integrate with resource­ strengthen the Internet of Things?”
thenticated block by trusted nodes, constrained networks such as the IoT IEEE IT Prof., vol. 19, no. 4, pp. 68–
increase the trust value by one unit and related applications. This also 72, 2017.
for those who have authenticated the works efficiently in hierarchical net­ • A. Al­Fuqaha, M. Guizani, M.
block first. This is followed by all of work and fog computing scenarios. Mohammadi, M. Aledhari, and M.
the nodes in the network updating In the future, we aim to implement Ayyash, “Internet of Things: A sur­
the distributed ledger. In this pro­ PoAh into a real­time IoT and fog test vey on enabling technologies, proto­
cess, individual transitions are veri­ bed to measure the overall perfor­ cols, and applications,” IEEE Com-
fied from the block. Any miner who mance and efficiency of the network. mun. Surveys Tuts., vol. 17, no. 4, pp.
performs false authentication loses 2347–2376, 2015.
a unit of trust value and becomes Read more about it • D. Puthal, M. S. Obaidat, P. Nan­
a normal node in the network after • D. Puthal, N. Malik, S. P. Mohan­ da, M. Prasad, S. P. Mohanty, and A. Y.
a certain number of false authenti­ ty, E. Kougianos, and C. Yang, “The Zomaya, “Secure and sustainable load
cations. PoAh can avoid the inverse blockchain as a decentralized security balancing of edge data centers in fog
hash computation for energy­efficient framework,” IEEE Consum. Electron. computing,” IEEE Commun. Mag., vol.
distributed secure communications Mag., vol. 7, no. 2, pp. 18–21, 2018. 56, no. 5, pp. 60–65, 2018.
and computing in the IoT. • D. Puthal, N. Malik, S. P. Mohan­
Fog computing is integrated with ty, E. Kougianos, and G. Das, “Every­ about the authors
the IoT for scalable computing and thing you wanted to know about the Deepak Puthal (deepak.puthal@uts
communications. Fog computing inte­ blockchain,” IEEE Consum. Electron. .edu.au) is a lecturer (assistant pro­
grates clouds and edge infrastructure Mag., vol. 7, no. 4, pp. 6–14, 2018. fessor) in the faculty of engineering
with the IoT, where the cloud works as • C. Dwork and M. Naor, “Pric­ and information technologies at
the fully trusted infrastructure to store ing via processing or combatting the University of Technology Syd­
security properties. Blockchains in fog junk mail,” in Proc. Annu. Int. Cryp- ney, Australia.
computing can bring a novel architec­ tology Conf., 1992, pp. 139–147. Saraju P. Mohanty (s a r aju
ture for storing IoT device authentica­ • M. Jakobsson and A. Juels, .mohanty@unt.edu) is a professor at
tion properties in a trusted cloud and “Proofs of work and bread pudding the University of North Texas, Denton.
keeping their references on edge devic­ protocols,” in Proc. Secure Informa-
es to work as a miner in the network to tion Networks, 1999, pp. 258–272.

IEEE PotEntIals Januar y/Februar y 2019 ■ 29


©iStockphoto.com/lvcandy
Smart Consumer Electronics Systems

Drones: Augmenting
our quality of life
christos kyrkou, Stelios timotheou, panayiotis kolios,
theocharis theocharides, and christos panayiotou

©iStockphoto.com/Jelena83

D
rone technology that has advances in mobile embedded com­ Droning on
the potential to disrupt and puting that allow for various sen­ The term drone is h a p h a z a r d l y
augment our quality of life sors and controllers to be integrat­ thrown around by many outlets and
is swiftly evolving. Drones ed into drone platforms, enabling ubiquitously appears in numerous
are rapidly growing in po­ them to sense and understand both conversations between consumers,
pularity and are used in various their internal state and the exter­ whether it is related to their holiday
applications, such as agriculture, nal environment. In this article, shopping lists, hobbies, jobs, or even
emergency response, border control, we showcase relevant drone tech­ when they discuss the news. In its
asset inspection, intelligent trans­ nologies, explore research opportu­ original context, a drone refers to
portation, and many more areas. nities, and demonstrate through an unmanned aircraft either pre­
This is primarily due to the rapid three use cases how research can programmed with a flight plan or
drive these disruptive systems for­ remotely controlled. The term, in
Digital Object Identifier 10.1109/MPOT.2018.2850386
ward within our social, economic, fact, originates from its two literal
Date of publication: 28 December 2018 and scientific activities. meanings: specifically, male bees or

30 ■ J a n u a r y / F e b r u ar y 2019 IEEE PotEntIals 0278-6648/19©2019IEEE


a m on ot onous bu z z i ng sou nd, Whether called unmanned aerial vehicles or
for which multirotor drones are
now famous. remotely piloted aircraft systems, their formal
More recently, drone has evolved name, drones are becoming more mainstream.
into a catch­all term that means any
unmanned robot. This includes ro­
bots designed for water, land, and as toys, tools, hobby items, entertain­ overview of the technology that pow­
air use. In the context of this article, ment, and gadgets and have long left ers these intelligent drones. We also
however, we strictly refer to aerial the photo and video industry as their attempt to propose a road map and
drones. Whether called unmanned primary commercial application. directions toward identifying current
aerial vehicles (UAVs) or remotely pi- The commercial usage of drones challenges and opportunities that re­
loted aircraft systems, their formal is gaining steady momentum, and search in intelligent drones is facing.
name, drones are becoming more multiple industries are w o r k i n g Furthermore, we showcase how our
mainstream. Although they are still with drones as part of their daily own work is currently developing in­
considered to be in their infancy regula r busi ness funct ions. It is telligent drones to be used as tools for
stage in terms of mass adoption and estimated that the market for com­ first responders in emergency situa­
usage, they have already surpassed mercial and civilian drones will ex­ tions, monitor power lines, and oper­
rigid traditional barriers in indus­ pand at a compound annual growth ate as a large­scale, real­time traffic­
tries that otherwise seemed impen­ rate of 19% between 2015 and 2020, monitoring tool.
etrable by similar technological in­ compared with a 5% growth on the
novations and advancements. military side, according to BI Intel­ technological considerations
Furthermore, during the past few ligence, Business Insider’s premium for drone applications
years, drones have become central research service. Sensor technologies have greatly
to the functions of various business­ Multirotor drones have dominated advanced through the years and are
es a nd gover n ment a l orga n i z a ­ the commercial market in the last few often the secret sauce inside drones
tions and managed to pierce through years, mainly due to their affordabil­ that enable their use in numerous
areas where certain industries were ity and ease of taking off and land­ remote­sensing applications (Fig. 1).
either stagnant or lagging. More im­ ing, whereas fixed­wing drones fea­ These sensor technologies provide
portantly, however, they are now ture different characteristics and, as drones with the ability to sense and
considered among the most disrup­ such, target specific high­end mar­ understand their environment and
tive technologies that are expected to kets beyond the military and come at become self­aware of their surround­
augment our quality of life. a hefty price. Multirotor drones fea­ ings and the context that they are
Typically, drones are classified as ture characteristics that are suitable flying in to potentially take evasive
fixed wing (with longer range, higher for a wider range of applications, such and reactive actions.
altitude flight capabilities, and less as mapping and surveying and asset A drone platform can carry a va­
power consumption) or multirotor inspection, due to their ability to hov­ riety of payload equipment consisting
(better hovering and maneuvering er, maneuver in narrow and difficult of relatively simple subsystems (such
abilities but lesser range and alti­ terrain conditions, and take off and as a fixed camera with fixed lenses
tude and more power consumption). land in very limited space. having a mass as little as 200 g) to
Just like other disrupting technolo­ Gradually, onboard sensors, such more advanced payloads (such as a
gies, the military has initially been as gyroscopes, accelerometers, mag­ video camera system with adaptive
the major benefactor of drones. netometers, and altimeters, have been zoom support and pan and tilt func­
However, once flight technologies integrated into the drone’s flight­con­ tions). Larger drone platforms can
advanced to the point where multiro­ trol computer. Drone flight capabili­ carry a combination of different types
tor drones became extremely easy to ties have, therefore, been augmented of sensors (e.g., thermal imagers and
operate, able to maintain strict safety to accommodate various application radar scanners, among others) to col­
standards, and equipped with sen­ needs. Coupled with customizable lect various data elements that can be
sors and other electronically assisted computing solutions that can run processed and analyzed in real time
safety features that warranted their various data analysis and pattern­ to provide enhanced capabilities.
safe passage over multiple environ­ recognition algorithms, a drone is now
mental conditions, the civilian sector an intelligent, partially autonomous, sensors that aid the
started adapting them. In fact, the and partially self­aware system that drone in flying
photo­ and video­producing indus­ can function either individually or as These sensors are primarily used to
tries were the first beneficiaries of part of a swarm. assist in the drone flight by measur­
this innovative technology. Further­ To showcase the potential of these ing the state of the drone and guiding
more, a gradual reduction in their systems and present the inherent its motion with respect to the environ­
price has only magnified this global research challenges and emerging ment, such as its position in space,
phenomenon. Drones are now listed opportunities, we provide a brief velocity, and orientation.

IEEE PotEntIals Januar y/Februar y 2019 ■ 31


A drone is now an intelligent, partially autonomous, tance of the objects detected by
the sensor. Thus, the drone can
and partially self-aware system that can function be enhanced with obstacle detec­
either individually or as part of a swarm. tion and avoidance for safe navi­
gation during both day and night.
Potential drawbacks include the
■■Accelerometer: Accelerometers cessing, and make decisions on how high cost and bulky form factor.
are used to determine the posi­ to navigate and act in missions. ■■Radar: Radar systems work by
tion and orientation of the drone ■■High-definition cameras: Most sending out radio waves and using
in flight. drones are equipped with camer­ the echoes that bounce back to
■■Gyroscope: The gyroscope detects as for providing intelligence create topographical maps or avoid
angular velocity in three axes, so about particular situations, espe­ obstacles. In contrast to lidar and
it can estimate the rate of change cially because drones can hover cameras, they can be designed to
of angle in pitch, roll, and yaw. over remote areas that are diffi­ rapidly scan large areas and are
■■Digital compass: The compass cult for people to access. Camera less affected by weather, smoke,
provides the drone with a sense resolution, frame rate, and field and dust. However, the data col­
of direction. It provides magnetic of view are important parameters lected by radar sensors are only
field data in three dimensions. for each application. Camera sen­ accurate up to a certain extent and
■■Barometer: The barometer helps sors can be used to provide com­ cannot distinguish between differ­
the drone with navigation and puter vision and scene analysis ent classes of objects.
measures the altitude. to the drone. ■■Telecommunication sensors:
■■Global Positioning System (GPS): ■■Thermal sensors: Thermal vision Drones equipped with telecommu­
The GPS sensors offer access to cameras construct images or video nication hardware such as Wi­Fi
location information from geosta­ from heat (infrared thermal radia­ antennas may provide clues about
tionary satellites. At least three tion), invisible light that is also someone’s position. In emergen­
satellites are needed to determine part of the electromagnetic spec­ cy situations, such equipment
longitude and latitude coordi­ trum. Most thermal cameras pro­ can also be used on the drone to
nates and one satellite to deter­ duce a video output in which color quickly re­establish cellular signal
mine the altitude of the UAV. encodes the temperature reading coverage over areas that experi­
Typically, satellite data is fused of the scene. Thermal energy is ence an outage.
with other readings to provide a radiated off nearly every material, ■■Electronic sniffers: Sniffers are
higher level of accuracy, precision, hence, thermal vision cameras can devices that sample air and provide
and stabilization. capture images and temperature information about nuclear, toxic, or
variations emitted from people and any kind of chemicals existing in
sensors for environment objects and are used for a wide the area to monitor pollution.
perception and data collection range of applications. The different drone payloads used
External sensors and payloads can ■■Lidar: Lidar is a sensing technolo­ for each application can have an
be integrated into a drone to enhance gy where the environment is usu­ impact on the drone characteristics
its understanding of the environ­ ally scanned with a pulsed laser and requirements. Drones can have
ment, collect data for offline pro­ beam to measure the relative dis­ a very limited payload capacity that

(a) (b) (c)

FIG1 examples of drone sensor technologies. (a) a high-definition camera equipped on a drone is the most standard payload used
today. (b) drone obstacle avoidance systems with ultrasonic sensors and cameras are becoming more widespread. (c) lidar sensors
with reduced cost will be a more frequently used payload in future drones.

32 ■ J a n u a r y / F e b r u ar y 2019 IEEE PotEntIals


largely depends on the power of the A drone platform can carry a variety of payload
motors and propeller combination,
as the weight of the payload can neg­ equipment consisting of relatively simple
atively affect the flight time. In addi­ subsystems to more advanced payloads.
tion, the capacity of the drone’s main
battery plays an important role when
the payload needs to be powered by system algorithms for remote sens­ ing missions consider the derivation
the drone itself, thus compromising ing, digital signal processing, and of accurate models of the underlying
the overall flight time. fault­tolerant control, all coupled dynamics and investigate strategies
Another choice to consider is the together to achieve good real­time that generally seek to minimize
drone’s level of autonomy, which can performance. the tracking error for all detected
vary from fully autonomous operation Furthermore, as cameras are now events/objects.
to fully controlled by a remote pilot. The standard equipment in most drones, Drone deliveries have the po­
fully autonomous operation requires a a large body of research is focused on tential to significantly reduce the
multitude of sensors to observe and utilizing advanced computer­vision cost and time of making last­minute
understand the environment as well algorithms to make drones fly auton­ goods shipments. Research in this
as a suite of algorithms to interpret omously, track a target through ob­ domain has focused on the manage­
the data from the sensors. The drone stacles, or deliver a payload to a cer­ ment of job allocations to minimize
would have to make decisions about tain location. These technologies have the overall cost subject to delivery
where to fly and how to classify objects matured to a level that has now made time constraints taking into con­
captured by its camera. it possible to investigate how complex sideration the limitations in battery
In addition, there needs to be suf­ missions can be achieved either by a and payload capacity. Drone deploy­
ficient computing power for real­time single drone or a swarm working in ments have also been considered to
processing on the edge on tiny, light collaboration. Coordinated teams of provide over­the­top services includ­
computers. Alternatively, process­ drones can attain significantly greater ing the setup of an aerial communi­
ing can be offloaded to the cloud. capabilities than what is possible by a cation platform, illuminate fields for
However, this presents a tremendous single agent, and, thus, this research night operations, and make voice
challenge on the communication links track has recently received consid­ announcements across the horizon.
both in terms of bandwidth and pri­ erable attention. Broadly speaking, To accomplish this, problems of node
vacy/security, limiting the application these missions can be classified into placement for coverage and topology
spectrum to nonlatency­critical tasks. the following four main categories control are being looked at to address
Although, when the flight and plan­ (Fig. 2): data collection and surveying, the communication and computation
ning are done by a human operator, monitoring and tracking, temporary challenges that arise.
the requirements can be relaxed and, infrastructure, and delivery of goods. In all mission types, the ability of
hence, the drone can be equipped A classic problem that arises in a drone to analyze visual data and
with only the necessary application­ surveying and collecting data over a determine its location and next ac­
specific sensors. As it becomes cheap­ spatial field of interest is how to cover tion can have tremendous benefits
er and easier to customize commercial the area faster with the least number and increase its capabilities. Be­
drones, by utilizing emerging innova­ of resources. Research challenges in­ yond the use of computer­vision
tive embedded and mobile sensing clude task assignment, scheduling, algorithms for object detection and
and computational solutions, new and path planning, considering the recognition tasks, another area of
opportunities will arise to facilitate re­ physical resource limitations of the focus is vision­based navigation and
search and innovation in a wide array drones including the total number of control. Systems that rely on the GPS
of niche applications. drones, their battery levels, and their can achieve little better than 3­m
communication ranges. Problems resolution, which is not adequate
Research opportunities that arise in monitoring and track­ for urban areas or indoor settings. In
and challenges
In these early stages, research has
focused on the low­level controls that Data Collection Monitoring and Temporary Delivery
could be applied by resource­con­ and Surveying Tracking Infrastructure of Goods
straint onboard computers for alti­
tude stabilization and the maneu­
vering of individual drones. Over
time, additional effort has been put
into more advanced tasks, including
indoor localization and navigation.
To achieve these tasks, research has
focused on optimizing embedded FIG2 the four main categories of drone-based mission types.

IEEE PotEntIals Januar y/Februar y 2019 ■ 33


extreme cases, drones could be sent that approach these problems in a theless, such technologies suffer from
into earthquake­damaged buildings holistic perspective. high installation time and cost and
to look for survivors, which would re­ The success of drone deployments capture only part of the spatiotempo­
sult in avoiding all sorts of obstacles across the aforementioned applica­ ral traffic evolution, whereas different
and moving into free space without tion categories has created safety technologies measure only a fraction
relying on external connectivity. To and security issues not just to the of the traffic parameters of interest
accomplish these feats, a drone re­ aviation sector but also every other (e.g., traffic flow, speed, vehicle density,
quires a complex system of cameras aspect of social life. There are great turning ratios at intersections).
as well as advanced algorithms to challenges in effectively addressing Drones are emerging as a prom­
figure out where it is, where the ob­ these issues, mainly due to the fast ising technology that can overcome
stacles are, and how to navigate this evolution of technology. Current ef­ t hese limitat ions because drone
area based on its understanding of forts focus mainly on regulating op­ technology is noninvasive, requires
the environment. eration through both legislative and no installation cost, and provides
In carrying out any of the main technological means. As part of the frequent spatiotemporal measure­
mission categories, recent research envisioned technology, which is our ments for the entire network. None­
has also demonstrated that swarms primary focus in this article, novel theless, using drones for traffic mon­
of drones can be more effective. Data air­traffic control solutions are be­ itoring leads to several challenges
collection and search­and­rescue ing researched to monitor and con­ that need to be dealt with regarding
missions are faster and more efficient trol flights, and various ground and their deployment, such as maintain­
with a team of drones to pool data and aerial systems are being considered ing the line of sight and developing
provide redundancy in case some ma­ for intercepting rogue drones. computer­vision algorithms for the
chines fail. But the use of more vehi­ detection of traffic entities (e.g., pe­
cles also adds complexity, and drones Case studies of destrians, vehicles, buses).
working together must be able to drone applications In this context, recent research
communicate with one another and We are currently working on several efforts have been geared toward cre­
make collective decisions. interesting projects using drones. ating software tools to address these
It should also be emphasized that Based on our work, we present three challenges by formulating and solv­
many of these problems are inter­ cases that illustrate the intrigu­ ing appropriate optimization prob­
related and, thus, need to be jointly ing and challenging applications of lems for the efficient deployment of
investigated to optimize mission ob­ drones in real­world problems: 1) road drones to ensure line of sight for all
jectives. Searching for and tracking transportation network monitoring, roads of the network and by develop­
objects across the field, e.g., could re­ 2) power­line inspection, and 3) civil­ ing accurate and real­time algorithms
sult in competing objectives that need defense protection. for the detection of vehicles using
to be resolved in an intelligent way. data from onboard cameras. Vehicle
Clearly, searching is necessary to de­ Road transportation detection is achieved by analyzing
tect events/objects before accurately network monitoring the v isual data through a n inte­
tracking them. At the same time, a Monitoring the state of road networks grated computer vision processing
drone may need to abort tracking a is fundamental for efficient traffic pipeline that dynamically extracts
particular object if exploration could management. Current sensing tech­ roads segments and robustly detects
reveal a new set of objects in the nologies provide different types of vehicles in the resulting network by
area. We focus our research effort on measurements, such as veh icle combining the results from two dif­
investigating problems that involve counts at a single point, traffic den­ ferent approaches (Fig. 3). The first
such complex mission objectives and sity over a road stretch, and speed and uses motion algorithms to find mov­
seek to devise intelligent solutions location from moving vehicles. None­ ing vehicles, whereas the second

(a) (b) (c)

FIG3 vehicle detection using drones. (a) vehicles detected using motion, (b) vehicles detected using still images, and (c) combined
detection of vehicles.

34 ■ J a n u a r y / F e b r u ar y 2019 IEEE PotEntIals


employs convolutional neural net­ cult to detect even with manual ex­ Civil-defense protection
works to detect still vehicles using pert inspection. Drones are considered to be future
deep­learning techniques. Finally, For this problem, part of our recent autonomous first responders for
postprocessing the results helps in work focuses on developing methods civil­defense protection. At their cur­
the derivation of individual vehicle and software tools for drone­based rent stage, drones support firefight­
trajectories and computation of traf­ power­line monitoring with minimum ing operations, enhance the capa­
fic parameters of interest. intervention from the operator to de­ bilities of civil­protection forces, and
tect and report cut power lines or improve the response of rescue teams.
Power-line inspection poles, broken insulators, vegetation, In this context, drones support sever­
Providing an uninterrupted supply or other items touching or near the al missions related to the early detec­
of electricity is an essential everyday lines (Fig. 4). Drones are programmed tion of abnormal situations, assist
commodity. Nonetheless, properly to autonomously take off, follow the disaster preparedness for various
inspecting and maintaining the vast, shortest path to go over each pole, and physical or manmade disasters (i.e.,
aging, and often inaccessible power­ then return and land in a safe and forest fires, floods, earthquakes, or
line network of a country to detect or timely manner. High­definition, infra­ landslides), and assist search­and­
prevent the occurrence of faults is a red, and thermal cameras are used to rescue operations.
difficult and costly task. Drones pro­ take closeup images and video, which Our recent work is geared toward
vide an attractive alternative to man­ are processed in real time to detect developing software and hardware
ual inspection that can increase pro­ and geotag faults using computer­ technologies to support a multitude
ductivity and reduce the inspection vision algorithms. Multiple sensing of civil­defense applications (Fig. 5).
time and cost. They help by patrol­ technologies and computer­vision al­ Using high­definition and thermal
ling the lines using visual equipment gorithms allow for the detection of dis­ cameras, drones locate disaster sur­
to detect issues that need to be fixed. tinct faults. The use of thermal cam­ vivors, such as trapped civ i lia ns
This is a very tricky task because eras, e.g., helps with the identification after an earthquake or shipwreck
power lines are too thin and not eas­ of overheated insulators, and different survivors in the sea. Search­and­
ily distinguishable in poor lighting computer­vision algorithms help with rescue operations also benefit from
and background conditions, obsta­ the detection of power lines and veg­ autonomous deliveries using cus­
cles may block the drone path, and etation in different backgrounds (e.g., tomized robotic arms to pick up and
faulty components may be diffi­ pavement or rough terrain). drop emergency response packa ges.

(a) (b) (c)

FIG4 a drone-based power line inspection. (a) the detection of an overheated insulator, (b) a destroyed insulator, and (c) power lines
as viewed by a thermal camera.

(a) (b) (c)

FIG5 a drone as a future first responder can (a) assist civil-protection units in organization and planning, (b) provide situational aware-
ness of disaster-stricken areas, and (c) locate disaster survivors with thermal cameras.

IEEE PotEntIals Januar y/Februar y 2019 ■ 35


Almost every aspect of our lives will be and Ph.D. degrees in computer engi­
neering from the University of Cyprus
impacted by the presence and usage in 2008, 2010, and 2014, respective­
of drones in one way or another. ly. He is a senior researcher at the
KIOS Research and Innovation Cen­
ter of Excellence at the University of
Another technology we are currently how drones can be used in many Cyprus, Nicosia.
working on is the establishment of consumer applications. Stelios Timotheou (timotheou
a temporary infrastructure to sup­ .stelios@ucy.ac.cy) earned his B.Sc.
port various functionalities, such as acknowledgment degree from the Electrical and Com­
communication connectivity, us­ This work was funded by the Euro­ puter Engineering School of the
ing a network of Internet­enabled pean Union’s Horizon 2020 research National Technical University of Ath­
drones or area illum i nat ion us­ and innovation program under ens, Greece, in 2005 and his M.Sc.
ing drones equipped with special grant agreement 739551 (KIOS CoE) and Ph.D. degrees from the Electri­
lighting equipment. Finally, con­ and from the Republic of Cyprus cal and Electronic Engineering De­
structing three­dimensional maps through the Directorate General for partment of Imperial College London
of a ter rain can help emergency European Programs, Coordination, in 2006 and 2010, respectively. He
managers assess the impact of a and Development. is an assistant professor in the
disaster on different regions and pri­ Department of Electrical and Com­
oritize operations. Read more about it puter Engineering and the KIOS
• D. Joshi. (2017, Aug. 8). Com­ Research and Innovation Center of
Conclusion mercial unmanned aerial vehicle Excellence at the University of Cy­
Drones and their underlying en­ (UAV) market analysis—Indust r y prus, Nicosia.
abling technologies are advancing at t rends, compa n ies a nd what you Panayiotis Kolios (pkolios@ucy
a rapid pace. In the not­too­distant should know. Business Insider. [On­ .ac.cy) earned his B.Eng. degree in
future, not only will your grocery line]. Available: http://www.business telecommunications engineering
shopping be delivered by a drone, you insider.com/commercial­uav­market­ from King’s College, London, in 2008.
will commute via a flying autonomous analysis­2017­8 He was awarded a Ph.D. degree from
vehicle. The development of hundreds • P. Petrides, P. Kolios, C. Kyrkou, King’s College in 2012. He is a mem­
of more uses of drones are under T. Theocharides, and C. Panayiotou, ber of the KIOS Research and Inno­
way due to the multiple investments “Needs assessment of un manned vation Center of Excellence at the
pouring into this promising indus­ aerial vehicles in emergency re­ University of Cyprus, Nicosia.
try. Almost every aspect of our lives sponse,” in Proc. Smart Blue City: Theocharis Theocharides (ttheo
will be impacted by the presence First Euro-Mediterranean Conf. and charides@ucy.ac.cy) earned his B.Sc.
a nd usage of drones in one way Exhibition, 2016, pp. 1–16. and Ph.D. degrees in computer engi­
or another. • P. Petrides, P. Kolios, C. Kyrkou, neering from Pennsylvania State
It is a ver y exciting time to be T. Theocharides, and C. Panayiotou, University, State College, in 2002 and
working in this area of research, “Disaster prevention and emergency 2005, respectively. He is an associate
with many real­world problems and response using unmanned aerial professor in the Department of Elec­
interesting applications that can systems,” in Smart Cities in the Medi- trical and Computer Engineering
be solved using innovative drone terranean. New York: Springer­Ver­ and the director of research at the
technolog y. Specifically, there is lag, 2017, pp. 379–403. KIOS Research and Innovation Cen­
great promise in developing novel • C. Kanellakis and G. Nikolako­ ter of Excellence at the University of
swarm optimization t e c h n ique s poulos, “Survey on computer vision Cyprus, Nicosia.
and autonomous­control algorithms for UAVs: Current developments and Christos Panayiotou (christosp@
so that a group of drones can col­ trends,” J. Intelligent Robot. Syst., vol. ucy.ac.cy) earned his B.Sc. and
laboratively execute a task much 87, no. 1, pp. 141–168, 2017. Ph.D. degrees in electrical and com­
more efficiently. • C. Kyrkou, S. Timotheou, P. Ko­ puter engineering from the Univer­
Also, there will be many oppor­ lios, T. Theocharides, and C. G. Pan­ sity of Massachusetts, Amherst, in
tunities to utilize machine learning ayiotou, “Optimized vision­directed 1994 and 1999, respectively. He is
for improving the drone perception deployment of UAVs for rapid traffic an associate professor with the
capabilities by taking advantage of monitoring,” in Proc. 2018 IEEE Int. Department of Electrical and Com­
large amounts of data that are be­ Conf. Consumer Electronics (ICCE), puter Engineering and deputy direc­
coming available for numerous ap­ Las Vegas, NV, pp. 1–6. tor of the KIOS Research and Inno­
plications. F i n a l l y, as drones are vation Center of Excellence at the
integrated more and more into our about the authors University of Cyprus, Nicosia.
society, security and safety aspects Christos Kyrkou (kyrkou.christos@
will take a central role in forming ucy.ac.cy) earned his B.Sc., M.Sc.,

36 ■ J a n u a r y / F e b r u ar y 2019 IEEE PotEntIals


Smart Consumer Electronics Systems
©iStockphoto.com/lVcandy

A method for localizing


the eye pupil for
point-of-gaze estimation
narayan panigrahi, kiran lavu, Sai krishna Gorijala, peter corcoran, and Saraju p. mohanty

©iStockphoto.com/Vladimir arndt

T
he estimation of the point estimation are depicted in Fig. 1. whereas others focus on electrical
of gaze in a scene present­ When estimating the point of gaze, potential measurements. Optical
ed on a digital screen has indentifying the visual focus of a tracking is a nonintrusive techni­
many applications, such as person within a scene is required. que that uses a sequence of image
fatigue detection and atten­ This is known as the eye fix or point frames of eyes that have been recorded
tion tracking. Some popular appli­ of fixation. Finding the point of gaze using video­capturing devices. This
cations of eye tracking through gaze involves tracking different features technique is popularly known as
of human eyes. Various methods video oculography.
Digital Object Identifier 10.1109/MPOT.2018.2850540
are available for eye tracking, some All of these techniques only work
Date of publication: 28 December 2018 of which use special contact lenses, successfully if two or more features

0278-6648/19©2019IEEE IEEE PotEntIals Januar y/Februar y 2019 ■ 37


a specific eye-tracking method
The first step in obtaining the point of
Attention gaze is to acquire the coordinates of
Tracking
the center of the pupil based on snap­
Fatigue Computer-Based shots of the eye of a subject. There are
Detection Gaming Simulation two popular ways of performing this:
Gaze-Point passive and active imaging.
Estimation Passive imaging uses the sur­
Applications Psychological
Pupillometry rounding visible light to capture im­
Studies ages of t he eyes, as depicted in
Fig. 2. These images are processed to
Measurement of detect various eye features, such as
Training Effectiveness
eye corners and the pupil.
Active imaging uses an illumina­
FIG1 the applications of gaze-point estimation. tion source along with the imaging
device. If the illumination source
emits light in the visible spectrum,
of the eyes are accurately detect­ state-of-the-art gaze estimation it causes discomfort to the user and
ed. This increases the computation­ Different eye­tracking algorithms, limits the duration for which the ex­
al complexity, thereby limiting the applications, and methods have been periment can be conducted. If the
speeds of eye­tracking systems. Some reported. Many interesting applica­ source is coaxial to the optical axis
commercial eye­tracking equipment tions of real­time eye­gaze tracking of the eye, infrared (IR) light gets re­
available on the market includes the for gaming designs and consumer flected from the retina and illumi­
Eyelink­1000, SensoMotoric Instru­ electronics systems are available. nates the pupil, leading to the bright­
ments, and Tobii glasses. The cost Eye tracking can be done using such pupil effect depicted in Fig. 3(a). If the
of these systems is quite high, and, methods as two­dimensional (2D) illumination source is offset from
therefore, they can only be used for regression and three­dimensional the optical path, the retro reflec­
research purposes. In this article, (3D) modeling of the eye. The 3D tion from the retina is directed away
a low­cost system is proposed that methods implement a geomet r ic from the camera, causing the dark­
uses a modified Web camera to ob­ model of the eye to estimate the point pupil effect depicted in Fig. 3(b).
tain fixation points using the center of visual axis and scene intersection. The bright­pupil effect is difficult to
of the pupil. The system is capable of These systems typically use a single obtain due to the requirement that
generating 25–30 frames/s which is camera, although models utilizing the illumination source needs to be
sufficient to compute the position and two or more cameras for fixation are coaxial to the optical path. This re­
size of a pupil in the pixels. also available. Artificial neural net­ quires a specialized IR illumination
works used for determining the source. However, the dark­pupil ef­
mapping function that converts the fect can be produced easily, and, as
pupil­glint vector into gaze points are a result, it is a widely used technique
Pupil also reported. for eye tracking.
A system that detects a human face
in an image and then detects the eyes Detection of pupil
Iris and estimates the center of the pupil The main feature required for any
based on the image has been pro­ eye tracker is to detect the coordi­
posed. We present a system that uses nates of the center of the pupil. How­
FIG2 an eye captured using passive only a single feature, the center of the ever, to identify the relative motion of
imaging. pupil, to estimate the point of gaze. the pupil, at least one other feature
that stays fixed during eye move­
ments is required. This feature can
be an eye corner or a glint formed by
the IR illumination source. The vec­
tor of the pupil­glint or pupil­eye
corner can be used to obtain a point
of regard on a screen, allowing the
user’s head some slightly free range
of movement. However, if the head
(a) (b) pose of the viewer is stabilized, coor­
dinates of the center of the pupil
FIG3 (a) the bright-pupil effect and (b) the dark-pupil effect. alone are sufficient to obtain the eye

38 ■ J a n u a r y / F e b r u ar y 2019 IEEE PotEntIals


fix. This reduces the computational Eye tracking can be done using such methods
complexity required to identify other
features of the eye, such as glints as two-dimensional regression and
and eye corners. three-dimensional modeling of the eye.
Detecting the pupil location is a
key feature of any eye­tracking mech­
anism. The accuracy of the system age that consists of dark regions other dark spots from lashes and
largely depends on the precise detec­ only. This is achieved by applying the eyebrows.
tion of the center of the pupil for all an intensity threshold transforma­ The next step is to find the largest
positions of the eyes. Detection of the tion to the image. A threshold value connected component, i.e., the pupil
pupil is easier when using the bright­ is chosen that represents the value in this image. One way is to process
or dark­pupil effect [Fig. 3(b)]. For of intensity of color in each pixel that the entire image to detect the largest
simplicity, this discussion is limited is to be considered as dark. If all of connected component. This method is
to the dark­pupil effect. the three values of any pixel, i.e., suitable when the head position is not
The first step is to acquire an im­ red, green, and blue (RGB) are less fixed. However, if the head position is
age of the eye using an IR camera. than that threshold value, then that stable, a small region can be chosen
The dark regions in this frame con­ pixel is considered as dark. Thus, all within which the pupil can be locat­
sist of eyelashes, a part of the eye­ of the pixels with RGB values above ed, and only that region will be pro­
brow, and the pupil. Of all these dark the threshold are painted in white, cessed in every frame. This reduces a
regions, the pupil has a well­defined and all of the pixels with RGB values significant amount of computational
shape and is the largest connected less than or equal to the threshold effort and the time required to detect
component in the entire image. The are painted in black. Now, the binary the pupil. To find the largest con­
second step is to obtain a binary im­ image contains the pupil and a few nected component, a unified scan and

Start

Adjust Camera

Obtain Snapshot of Eye, Apply Intensity Threshold Transformation, and Scan ROI

Find Largest Connected Component (Pupil) in ROI and Centroid of Pupil

Yes
Is System Calibrated?
No
Display Calibration Point

Yes No
Fixation?

Yes
Store Data More Points?

No
Obtain Mapping Function and Optimization Function

Display Random Point

Obtain Point of Fixation and Calculate Point of Gaze, Optimize to Reduce Error

Yes
Process More Points?

No
End

FIG4 the proposed method for pupil detection. roi: region of interest.

IEEE PotEntIals Januar y/Februar y 2019 ■ 39


To compute the actual coordinates for the tions are second­order polynomials
of the pupil center coordinates.
corresponding pupil coordinates, one must To compute the actual coordinates
calculate the value of the polynomial coefficients for the corresponding pupil coordi­
using regression techniques. nates, one must calculate the value
of the polynomial coefficients using
regression techniques. The two most
array­based search algorithm can be goal of detecting the pupil coordi­ popular are polynomial affine trans­
used. Once the pupil is detected, the nate is to calculate a point of gaze formation using matrix inversion
centroid of the pupil will give the coor­ from it. For this purpose, a personal and the least­squares technique.
dinates of its center. The bright­pupil calibration routine is run for every In polynomial affine transforma­
effect follows the same principle ex­ session. A calibration routine typi­ tion, four equations are obtained by
cept for the fact that the pupil appears cally displays a few points or dots substituting the recorded data by
bright, and, hence, the threshold ef­ in a particular order or a random displaying four different points on
fect is to be applied in such a way that manner. The users are instructed to the screen and the corresponding
only bright regions remain. The rest of fixate on those points, and, while pupil coordinates. These equations
the procedure is the same as that of the doing so, the corresponding pupil are solved using a matrix inversion
dark­pupil effect. The proposed method coordinates for each point is record­ method to obtain unknowns. The
is depicted in the flowchart in Fig. 4. ed. These data are used to obtain a other method is to display any num­
modeling function that gives the ber of screen coordinates and pupil
Obtaining the point of gaze relation between pupil coordinates coordinates and obtain the values of
from pupil coordinates and actual screen coordinates. The coefficients using the least­squares
The pupil coordinates will provide screen coordinates can be related to method. The actual exper imenta l
the location information of the pupil the pupil center coordinates using setup is shown in Fig. 5(a) and (b).
in any captured frame. However, the two separate functions. The func­
a case study
The experimental setup consists of a
screen displaying the scene in which
the fixation graph is to be identi­
Support for
Stabilizing
fied. A customized Web camera was
Head Movement mounted on a chin rest to obtain
50 cm snapshots of the eyes. The camera
Camera was modified to detect IR light by
removing the IR blocking filter from
its lens assembly. The chin rest acts
as a support to stabilize the subject’s
head movement. The screen is placed
at a distance of 50 cm from the sub­
ject’s eye, as in Fig. 5. The overall dis­
play resolution of the scene is 800 ×
600 pixels. The scene is 22 cm high
and 35 cm wide. This provides a visu­
(a) (b)
al cone with a 25° vertical and 39°
horizontal field of view, and the reso­
lution of the visual angle is 26 pixels
per degree vertically and 21 pixels per
degree horizontally. IR light­emitting
diodes (LEDs) were used to illuminate
the eyes of the subject.
The first step in calibration was to
match the coordinate system of the
eye with the coordinate system of the
screen. To achieve this, a crosshair is
(c) (d)
displayed on the screen. The subject is
instructed to fixate on the center of the
FIG5 the experimental setup for gaze estimation. (a) the actual experimental setup.
(b) the head fixated with camera. (c) the head fixated with the camera setup for eye- crosshair, and the camera is adjusted
gaze estimation. (d) the graphical user interface of the eye-gaze estimator with a map such that the center of the pupil is
on the screen. exactly at the center of the crosshair

40 ■ J a n u a r y / F e b r u ar y 2019 IEEE PotEntIals


0 0
2 3 1 2 2 3
1
12 100 1 10 10 11 12
100 10 11 11 3
12
200 8 9
200 8 1 10 2 11123 13 9 13 4

y Axis
17 4
y Axis

8 17 913 4 17
17
15 5 13 4
300 7 16 6 14 300 8
16 16 15 15 14
16 15 14
14
400 400
7 6 5 7 66 5
500 500 7
0 100 200 300 400 500 600 700 0 100 200 300 400 500 600 700
x Axis x Axis
(a) (b)

FIG6 (a) the first and (b) second phases in calibration.

displayed on the screen. Then, cali­


bration is done by repeating the fixa­ 35 cm
Eye
tion process using a set of 17 random
22 cm

points on the screen in two phases.


During the first phase, these points
are displayed on the screen as red­col­ 25°
ored dots. The subject is instructed to (a)
fixate on these points, and whenever
a fixation is detected, the correspond­
Eye
ing pupil position is recorded. The
red­colored dots in Fig. 6 represent
actual screen coordinates, and green
dots represent their corresponding
pupil coordinates. 39°
These coordinate pairs as recorded
in the first phase are used to establish
the polynomial affine transformation
22 cm

(PAT) by computing the coefficients


of the polynomial. These polynomial
coefficients are used to estimate a
35 cm
point of gaze on the screen. The sec­
(b)
ond phase is added to improve estima­
tion accuracy. During this phase, the FIG7 (a) a vertical visual cone and (b) horizontal visual cone.
estimated points of gaze and actual
screen coordinates computed using
the PAT are used in polynomial re­ TABLE 1. The error analysis of the pupil localization.
gression to obtain a function to opti­ PARAMETERS MATRIX INVERSION LEAST SQUARES
mize the estimated point of gaze.
horizontal error 2.8° (59 pixels) 1.81° (38 pixels)
The screen was placed 50 cm
away from the subject’s eye. The Vertical error 3.2° (77 pixels) 2.4° (58 pixels)
overall resolution for displaying the
mean error 3.0° (68 pixels) 2.10° (48 pixels)
scene was 800 × 600 pixels. The
scene was 22 cm high and 35 cm
wide. The angles subtended by the 24 pixels per degree vertically and sion was calculated. The experiment
eye vertically and horizontally with 21 pixels per degree horizontally. was performed using the matrix in­
the scene were measured (Fig. 7). The To test the system, five random version technique and least­squares
vertical angle was 25°, and the hori­ points were displayed, and their cor­ method to deduce the mapping func­
zontal angle was 39°. This provides responding points of gaze were calcu­ tion. The average errors in both cases
a visual cone with a resolution of lated. The average error for each ses­ are presented in Table 1. The overall

IEEE PotEntIals Januar y/Februar y 2019 ■ 41


TABLE 2. A comparative perspective of various eye-tracking algorithms.

METHODS USED HARDWARE SETUP FEATURES REQUIRED ACCURACY

3d geometrical model (meyer et al.) two ir lEds and one camera Glints and pupil center roughly 1°
3d geometrical model (hennessey, multiple ir illumination sources, one pupil contour using bright-pupil effect 0.90°
noureddin, and lawrence) camera and glints using dark-pupil effect
3d geometrical model two cameras and four ir lEds pupil contour and glints 1.18–1.43°
(lai, Shih, and hung)
3d geometrical model two cameras for face detection and one 3d facial orientation, glints, roughly 1°
(ohno and mukawa) camera on pan-and-tilt mechanism and pupil contour
2d regression of the current article modified Web camera with built-in ir pupil center only 2.10°
lEds and ir blocking filter removed

average error was found to be 48 pix­ field,” IEEE Trans. Biomed. Electron., tracking system that enables gaze­
els. This corresponds with 2.105° of vol. 10, no. 4, pp. 137–145, 1963. based interaction,” in Proc. 2004
the visual angle. The performance of • A. Bulling, “Eye movement anal­ Symp. Eye Tracking Research and
the proposed method is compared ysis for activity recognition using elec­ Applications, pp. 115–122.
with state­of­the­art methods pre­ trooculography,” IEEE Trans. Pattern • A. Kar and P. Corcoran, “A re­
sented in Table 2. Anal. Mach. Intell., vol. 33, no. 4, pp. view and analysis of eye­gaze es­
741–753, 2011. timation systems, algorithms and
Conclusion • A. T. Duchowski, “A breadth­first performance evaluation methods
The presented system uses only one survey of eye­tracking applications,” in consumer platforms,” IEEE Ac-
feature of the eye, i.e., the center of Behav. Res. Methods Instruments cess, vol. 5, pp. 16,495–16,519, Aug.
the subject’s pupil, to obtain the point Comput., vol. 34, no. 4, pp. 455–470, 2017.
of gaze on a screen. This reduces the 2002.
computational effort required for de­ • J. G. Wang and E. Sung, “Study about the authors
tecting other features, such as eye on eye gaze estimation,” IEEE Trans. Narayan Panigrahi (pani@cair
corners, corneal reflections, and glints, Syst., Man, Cybern. B, vol. 32, no. 3, .drdo.in) earned his Ph.D. degree
enabling high­speed gaze tracking. pp. 332–350, 2002. from the Indian Institute of Technol­
Also, noise in the detection of these • H. C. Lee, D. T. Luong, C. W. ogy, Bombay, and is a scientist at
additional features is eliminated, Cho, E. C. Lee, and K. R. Park, “Gaze the Center for Artificial Intelligence
thereby increasing the confidence and tracking system at a distance for con­ and Robotics, Bengaluru, India.
reliability of the data acquired from trolling IPTV,” IEEE Trans. Consum. Kiran Lavu (kiranlavu9@gmail
our system. As the proposed system Electron., vol. 56, no. 4, pp. 2577– .com) earned his B.E. degree in elec­
uses a simple Web camera, the cost 2583, 2010. tronics and communication engi­
of the system is lower than many • A. Meyer, M. Böhme, T. Marti­ neering from Vignan’s University,
other eye trackers and, at the same netz, and E. Barth, “A single­cam­ Vadlamudi, India, in 2017.
time, the system still achieves accu­ era remote eye tracker,” in Proc. Int. Sai Krishna Gorijala (saikrishna
racy levels similar to those of expen­ Tutorial and Research Workshop Per- gorijala@gmail.com) earned his B.E.
sive methods. ception and Interactive Technologies degree in electronics and communi­
There are multiple future direc­ for Speech-Based Systems, 2006, cation engineering from Vignan’s
tions of this research, including the pp. 208–211. University, Vadlamudi, India, in 2017.
integration of the proposed system • C. Hennessey, B. Noureddin, Peter Corcoran (dr.peter.corco
in a smart health­care framework. and P. Lawrence, “A single camera ran@ieee.org) is the founding editor­
The point of gaze on a screen can be eye­gaze tracking system with free in­chief of IEEE Consumer Electronics
fused with time intervals when the head motion,” Measurement, vol. 1, Magazine and holds a personal chair
subject’s electroencephalogram beta pp. 27–29, Mar. 2006. in electronic engineering at the Col­
wave is high to ascertain the point of • C. C. Lai, S. W. Shih, and Y. P. lege of Engineering and Informatics
fix on the screen. Hung, “Hybrid method for 3D gaze at the National University of Ireland
tracking using glint and contour fea­ Galway. He is a Fellow of the IEEE.
Read more about it tures,” IEEE Trans. Circuits Syst. Video Saraju P. Mohanty (s a r aju
• D. A. Robinson, “A method of Technol, vol. 25, no. 1, pp. 24–37, 2015. .mohanty@unt.edu) is a professor at
measuring eye movement using • T. Ohno and N. Mukawa, “A the University of North Texas, Denton.
a scleral search coil in a magnetic free­head, simple calibration, gaze

42 ■ J a n u a r y / F e b r u ar y 2019 IEEE PotEntIals


Smart Consumer Electronics Systems
©iStockphoto.com/lvcandy

E-marketing via
augmented reality: A case
study in the tourism and
hospitality industry
neda Shabani, arslan munir, and azizul hassan

M
a rket i ng pl ay s a n
extremely significant
role in the success of
any business. In the
hospitality and tour­
ism industr y, marketing is a key
tool to introduce various desti na­
tions to customers and attract them
to visit a place or stay in a particu­
lar hotel. The forms of marketing
have considerably evolved during
the past decades owing to enhance­
ments in technology.
E­marketing is a recent product
of this evolution that has revolu­
tionized the world of marketing. It

©iStockphoto/Bet_noire
has created a huge impact on dif­
ferent businesses and sectors, in­
cluding the hospitality and tourism
industry, in many ways, such as
customer satisfaction and revenue
growth. In recent years, augment­
ed reality (AR) has been used as a
tool to boost e­marketing in many
ways due to its unique features AR in e­marketing for these indus­ from conventional to nonconven­
and capabilities. tries with a few real­life examples tional and then to online composi­
In this article, we discuss how and use cases. tion. All of these transformations
AR has revolutionized e­marketing are aimed at improving effectiveness
in the context of the hospitality What is e-marketing? and efficiency.
and tourism industry. We further Marketing has been in existence Among the different types of mar­
review the successful integration of for centuries, since humans began keting strategies, e­marketing is the
trading to address human­centered one that has recently received the
demands. However, the form of mar­ most attention for a multitude of rea­
Digital Object Identifier 10.1109/MPOT.2018.2850598
keting has transformed over time. sons. However, before we mention the
Date of publication: 28 December 2018 In recent decades, it has revamped reasons for e­marketing’s eminence,

0278-6648/19©2019IEEE IEEE PotEntIals Januar y/Februar y 2019 ■ 43


E-marketing is entirely technology focused perspective, AR is a direct or indi­
rect real­time (live) view of a physi­
and has replaced centuries-old marketing cal/real environment whose elements
principles and tactics. through computer­generated percep­
tual information are augmented or
superimposed across a potential
let us first define the term. E-market- cation with consumers must be more multitude of sensor modalities, in­
ing, in its simplest manner, can be focused due to the specific nature of cluding but not limited to visual,
defined as enacting the techniques the industry. We would like to em­ auditory, and haptic. Vivian Rosen­
and principles of marketing through phasize that the tourism and hospi­ thal, the founder of GoldRun, a New
the use of electronic media and, more tality industry is one that is service York City­based AR start­up, has
often, the Internet. It is the outcome based. To market any service in­ defined AR as “a digital layer over
of modern and developed communi­ dustry, the first thing to consider is the real world that you can’t see
cation systems, where the Internet is the uniqueness, along with the per­ with the naked eye, but you can see
the key platform. E­marketing is en­ sonalization and customization, of with the camera on your smartphone
tirely technology focused and has re­ all services. Some of the distinctive or computer.”
placed centuries­old marketing prin­ characteristics of the tourism and AR technology is a shift from the
ciples and tactics. Furthermore, it hospitality industry services that earlier technology version of virtual
embraces newer routes for marketing distinguish its marketing methods reality (VR). Both VR and AR are
communications that do not neces­ from other industries are anticipated to be disruptive tech­
sarily exist in conventional market­ ■■perishability nologies with applications not only
ing systems. ■■inseparability in entertainment but also business
E­marketing can play a vital role ■■intangibility and education. AR differs from VR
in the success of a business, prod­ ■■heterogeneity in that VR is an artificial, computer­
uct, or service. One of the main re­ ■■seasonality generated simulation that creates
quirements for running a successful ■■agreeability a virtual environment very similar
business is to deeply understand the ■■inconsistency to real life and makes it difficult for
customers’ needs, demands, prefer­ ■■imitability users to recognize that the environ­
ences, responses, and attitudes to­ ■■inflexibility. ment/experience is not real, whereas
ward a particular product or service. Besides of all of these unique char­ AR is a mixture of real life and VR.
In marketing, the measurement of acteristics, the consumer­oriented VR enables users to interact with it
postpurchase consumer responses nature of the tourism and hospitality by wearing a VR helmet or goggles.
and behavior is extremely significant industry plays a significant role in AR developers create images and
for businesses to enhance the qual­ choosing the most appropriate and computer­generated enhancements
ity of their products and/or servic­ effective marketing strategy. In many in applications that enable the us­
es. These behaviors and responses cases, e­marketing has become an ers to combine those with real life,
can appear in many forms, such as essential ingredient to an existing or thus permitting interaction with
feedback, replies, reactions, or com­ potential business enterprise related VR in real life. In AR, the augmen­
ments. Because the interaction be­ to the tourism and hospitality indus­ tation techniques are often per­
tween product or service providers try. Selecting an effective technology formed in real time when integrat­
and consumers are fundamental in for e­marketing and making proper ing the digital information with the
creating and maintaining functional use of it are critical to helping those in user’s environment.
relationships, e­marketing provides the tourism and hospitality industry Characteristically, AR technology
businesses, products, and services to achieve their objectives and goals. is a reality simulation by computer­
the opportunity to communicate and generated visuals where a user can
interact with both existing and po­ aR for e-marketing experience a reality in a virtually
tential customers. Boeing researcher Thomas Caudell created environment. AR brings two
By adopting e­marketing, busi­ coined the term AR in 1990, when he widely diverse dynamics: personal
nesses can ensure efficiency, better invented the technology to help air­ exclusivity perception and a sensory
return on investment, and enhanced craft workers in assembling long experience that is commonly mul­
profitability that leads to increased bundles of wires for the new 777 jet­ tidimensional. AR has numerous
cost effectiveness. Furthermore, liner as an alternative to costly dia­ applications in consumer electron­
cam paigns in e­marketing boost grams and marking devices. AR has ics, entertainment, marketing, and
online sales by attracting potential gained more traction in recent years business. Even without realizing it,
consumer bases and by minimizing due to further advances in sensors, almost all consumers are more or
negative risks. optics, computer vision, image pro­ less familiar with the experience that
In the context of tourism and hos­ cessing, audio processing, and com­ AR can generate. The revenue gen­
pitality, the interaction and communi­ puting. From the computer­science erated from AR was US$2.39 billion

44 ■ J a n u a r y / F e b r u ar y 2019 IEEE PotEntIals


in 2016 and is projected to reach Both VR and AR are anticipated to be disruptive
US$120 billion in 2020.
The use of AR technology in mar­ technologies with applications not only in
keting is seemingly less expensive entertainment but also business and education.
than conventional marketing ap­
proaches. Print­based advertising and
marketing campaigns are relatively sions regarding these destinations. marketing program with an innova­
more expensive and require con­ In particular, tourism and hospitality tive AR technology application.
tinuous investment of resources. AR marketers can leverage AR to miti­ In the tourism and hospitality
as a computer­based technology gate the tourists’ concerns by various industry, which solely relies on of­
is less expensive because it can be means, such as providing real­time fering services, word of mouth has a
used in digital platforms or online. travel assistance and augmented special place. Word of mouth is di­
Although the development cost to set maps with markers and informa­ rectly related to expressing human
up AR­based marketing campaigns tion regarding shops, grocery stores, feelings and emotions toward dif­
might be higher, the lifetime operat­ tourist attractions, gas stations, hos­ ferent experiences. AR applications
ing cost mostly remains stationary. pitals, emergency help, banks, post can bolster the emotional connec­
This claim is evident from Rosen­ offices, cafés, gyms, cinemas, and so tion of tourists to destinations that,
thal’s statement that “It honestly forth, as illustrated in Fig. 1. in turn, lead to repeated sales and
depends on the scope of the project, In the tourism and hospitality business. The establishment of this
but AR campaigns can be as inex­ industry, AR provides significant connection between service provid­
pensive as US$5,000 and as high as advantages over conventional broad­ ers and consumers is also supported
US$100,000. That’s nothing com­ cast or print advertising in terms of by Rosenthal:
pared to print, and in many ways, application and usability. A basic It’s not just a matter of tak­
it’s worth the risk in my eyes.” feature of AR that warrants its inte­ ing photos and sharing, which
gration in tourism destination mar­ is what we’re building. But
aR in tourism and keting is its simplicity. AR technology what really matters to us is the
hospitality e-marketing is viewed as simplistic but with the ability to take photos with vir­
People who travel to different destina­ ability to connect closely with target tual characters, products and
tions are the main drivers behind the consumer bases. The content and environments, which is where
tourism and hospitality industry, features of a tourism destination can it will resonate most and devel­
and they do so for a variety of rea­ be viewed more congenially by super­ op that deep brand connection.
sons, such as visiting a destination imposing a virtual environment with Tourism destination marketing
for recreational, medical, or business reality. The St. Petersburg/Clearwa­ or advertising based on AR applica­
purposes; a pilgrimage; meeting ter, Florida, Convention and Visitors tions can grab the attention of par­
relatives; and many other reasons. Bureau, e.g., has augmented their ticular customers. One of the goals
Thus, the tourism and
hospitality industry pro­
vides substantial reve­
nue for a country.
However, tourism in
particular countries/
places is often restrict­
ed for many reasons,
i ncludi ng consumer
distr ust of ava ilable
tourism services, insuf­
ficient security mea­
sures, and travel scams
and frauds in tourism
spots. It is v it a l for
t o u r i s m a n d hospi­
tality marketers to in­
troduce and market a
destination in the best
possible way to attract
the largest number of
travelers and alleviate
the tourists’ apprehen­ FIG1 an ar application in tourism.

IEEE PotEntIals Januar y/Februar y 2019 ■ 45


AR brings two widely diverse dynamics: personal AR’s ability to offer personal and
customized feelings to the target con­
exclusivity perception and a sensory experience sumers plays a central role in the
that is commonly multidimensional. success of AR in the hospitality and
tourism industry. This customization
allows wider interconnectivity and in­
of AR in the hospitality and tourism ■■reliving his toric places and teractivity in both the sales and pur­
industry is to reach millennials. AR events chasing processes. Hence, AR can cre­
can be purposefully applied to ap­ ■■AR browsers incorporated into ate a bridge between the offered and
peal to and attract younger tourists destinations purchased products and services.
that often have a common interest ■■museum interactivity. Although AR is a revolutionizing
in innovative technology use. Some The growth of social media connects technology for e­marketing with a va­
of the AR applications that have en­ consumers (including millennials) by riety of benefits, its integration with
hanced the experience of consum­ creating a network of like­minded tourism destination marketing is
ers include people that allows further capitaliza­ a relatively complex process that re­
■■interactive travel guides tion of such innovative technologies quires expertise and resources. At an
■■social travel gamification as AR. early stage, the demand for an AR ap­
■■city tours The incorporation of AR in market­ plication needs to be recognized and
■■real­time navigation and direction ing and advertising campaigns can of­ established. Hospitality and tourism
■■aug mented hotel environment fer a variety of benefits to tourism des­ marketers must explain the added
and room booking tination marketers. The AR campaign benefits that AR provides, such as
■■interactive hotel rooms offers relatively long­lasting targets to combining real and virtual images in
■■augmented language translation consumer bases. AR enables greater real time and the ability to interact
■■augmented access to dining and involvement of both marketers and with virtual content.
entertainment centers consumers with brands by increasing It is often better to consider AR as
■■participative destination manage­ their ability to make positive sale and an addition to the existing market­
ment purchase decisions, respectively. AR ing and advertising tools to make the
■■augmented transportation provides memorable interactive con­ most efficient use of AR technology. In
■■augmented services in restau­ sumption experiences in the before­, other words, AR needs to be an add­
rants during­, and after­purchase stages. ed, but not the only, strategy to serve

FIG2 an ar museum.

46 ■ J a n u a r y / F e b r u ar y 2019 IEEE PotEntIals


specific objectives. Because AR tech­ AR can be purposefully applied to appeal
nology is rather innovative and new,
it is advantageous to capitalize the to and attract younger tourists that often
maximum benefits in unique ways have a common interest in innovative
to pull it off effectively. technology use.
Use cases and examples
There are many use cases of AR in with the central server system. The Conclusion
the tourism and hospitality indus­ central server incorporates various Innovative technologies have been
try. The following are examples that tools, including business logic, which consistently making significant im­
successfully incorporate AR in busi­ define the restaurant’s operational provements in tourism and hospitality
ness marketing and have resulted aspects. Furthermore, the central business services. AR is a booming
in both increased profitability and server drives the printers in the bar innovative technology that has helped
customer satisfaction. and kitchen. the e­marketers in tourism and hos­
To get a better understanding of pitality industry to enhance their
AR museum the customer perspective on the use service quality and create value for
The AR museum is a strategy em­ of AR in the hospitality and tourism their consumers.
ployed by some museums to super­ industry, we interviewed a few cus­ The use of AR in the hospitality
impose the virtual world over the tomers of Inamo restaurant. After and tourism industry has exceeded
real world to provide visitors with a asking a couple of semistructured consumer expectation and satisfac­
vivid view and understanding of the interview questions, we heard some tion by creating a memorable experi­
origins, history, and details of vari­ interesting opinions from those cus­ ence. Because AR is a new technol­
ous exhibits and artifacts. The AR tomers regarding AR. ogy and limited research on it has
museum integrates and/or blends ■■According to the first respondent, been done so far, especially in the
digital information with live video “The hospitality industry market­ context of the tourism and hospital­
or the user’s environment in real ers in London mostly retain a set ity industry, future research and in­
time using special three­dimen­ level of technological standard novation in AR technology have the
sional AR software programs. Fig­ that actually makes their con­ potential to make a huge impact in
ure 2 illustrates the use of AR in sumers to become capable to use this industry and generate tremen­
an AR museum. a new technology.” dous revenue.
■■The second respondent reported:
Inamo restaurant in London “Augmented reality draws the line acknowledgment
Inamo is identified as a restaurant that tends to exist between the real We would like to thank Prasanna
t hat offers a di n i ng ex per ience and the digital by using an ap ­ Kansakar for his help with the figures.
with a unique combination of a Far propriate technology.”
Eastern feeling in a Western locale. ■■The third respondent viewed AR about the authors
The virtual environment furnished as entertaining and commented: Neda Shabani (nshabani@ksu.edu)
by the E­Table chef’s camera, puz­ “Gastronomy is mostly about ex­ is a graduate student in the College
zles, Battleship game, information periences where AR technology is of Business Administration, De­
browsing on the local areas, and seemingly also very interesting partment of Accounting at Kan­
even booking a taxi are all rela­ with the involvement of entertain­ sas State University, Manhattan.
tively new in the hospitality indus­ ing features.” He earned his M.S. degree in hos­
t r y not only in L ondon but also ■■According to the fourth respon­ pitality and tourism management
the world. dent, “In a technology­induced hos­ from the University of South Florida,
At Inamo, customers can order pitality business market, there are Sarasota­Manatee.
food and drinks by using AR tech­ many websites, blogs, or online Arslan Munir (amunir@ksu.edu)
nology­enabled menus placed on media allowing customers to get is an assistant professor in the De­
custom­designed customer serving involved, get attached, and ex­ partment of Computer Science at
tables. These tables work as electron­ press new ideas. The customers in Kansas State University, Manhattan.
ic display boards as well as electronic Inamo have competitive operational Azizul Hassan (m.hassan15@
point­of­sale terminals. The tables knowledge of a technology. This outlook.cardiffmet.ac.uk) is a mem­
incorporate a waterproof touch panel customer group normally reads ber of the Tourism Consultants Net­
operated by Bluetooth wireless tech­ online reviews of early customers in work of the U.K. Tourism Society
nology. Each table is equipped with Inamo. Also, they follow videos and and is currently working toward a
a high­quality projector and a com­ reviews on popular online stream­ Ph.D. degree at Cardiff Metropolitan
puter that steers the interactive AR ing media such as YouTube and University, Wales.
applications and also communicates many others.”

IEEE PotEntIals Januar y/Februar y 2019 ■ 47


gamesman problems

Problem #1: Problem #4: Juan For


Rock the Boat the Road
A lightweight boat is float- Fill in the blank: Pedro is
ing in calm water. A man the son of Juan. Juan is
walks from one end of the the ______ of Pedro’s father.
boat to the other. Does the
boat move while he is walk- Problem #5: space
ing and then stop, continue Elevator
moving, or not move at all? Thank you to Vaughan Clark-
son and Ian Clarkson for submit-
Problem #2: Break the Chain Numbers—© CaN stoCk Photo/agsaNdrew,
ting this problem.
There is a chain that contains 23 paper aNdroid—© CaN stoCk Photo/kirstyPargeter Douglas Adams writes in The Hitch-
clips. If you remove two of the paper hiker’s Guide to the Galaxy, “There is an
clips, you can make a chain of any length, art to flying, or rather a knack. The knack
from one to 23, out of the five pieces. Which two paper lies in learning how to throw yourself at the ground and
clips should you remove? miss.” Actually, all you need is a space elevator. At what
height could you step off such a structure at the equator
Problem #3: Pocket Change and miss the ground?
What is the largest amount of change in U.S. coins you
can have in your pocket and still not be able to make
change for a dollar bill?
If you have a problem for the Gamesman,
please submit it along with the solution
to potentials@ieee.org.
Digital Object Identifier 10.1109/MPOT.2018.2872279 solutions are on page 5.
Date of publication: 28 December 2018

the way ahead (Continued from page 4)

plans and estimate regarding fall 2019. If you change of- velopment and networking opportunities with the profes-
ficers in the fall, they can submit their academic year sional IEEE Members of your Section.
plan in October/November 2019, and it will count for the By the way, consider attending some of the meetings
February 2020 deadline. I know some northern hemi- held by your local Section. All IEEE Student Members
sphere Student Branches that elect officers in December/ are members of the local IEEE Section and are always
January to assure a greater transition overlap and re- invited, even if the event notice doesn’t explicitly target
lieve graduating seniors from having IEEE duties in their Student Members. What a great way to start a new year!
busy final semester.
If you are a Student Member but not a student officer, about the author
contact your officers to provide input. Don’t wait for an Elisa H. Barney Smith (SACchair@ieee.org) is the IEEE
engraved invitation. Student Branches can always use Member and Geographic Activities—Student Activities
more active members, and by being more active, you will Committee chair. She is a professor of electrical and com-
get more out of your membership in both professional de- puter engineering at Boise State University, Idaho.

48 ■ J a n u a r y / F e b r u ar y 2019 IEEE PotEntIals


Introducing IEEE Collabratec™
The premier networking and collaboration site for technology
professionals around the world.

IEEE Collabratec is a new, integrated online community where IEEE members,


Network.
researchers, authors, and technology professionals with similar fields of interest
can network and collaborate, as well as create and manage content. Collaborate.
Featuring a suite of powerful online networking and collaboration tools, Create.
IEEE Collabratec allows you to connect according to geographic location,
technical interests, or career pursuits.

You can also create and share a professional identity that showcases key
accomplishments and participate in groups focused around mutual interests,
actively learning from and contributing to knowledgeable communities.
All in one place!

Learn about IEEE Collabratec at


ieee-collabratec.ieee.org
ILLUMINATE EDUCATE ENGAGE ENERGIZE
the possibilities of the next generation a wider audience innovation by
technology by using of innovators and in appreciating the celebrating
it to address global engineers value and importance technological
challenges of engineering and excellence
technology

The world’s most daunting challenges The IEEE Foundation is leading a special
require innovations in engineering, and campaign to raise awareness, create
IEEE is committed to finding the solutions. partnerships, and generate financial resources
needed to combat these global challenges.

Our goal is to raise $30 million by 2020.

DONATE NOW
ieeefoundation.org

Вам также может понравиться