Designing Middleware for Internet of Things by Ajit Singh
Author:Ajit Singh [Singh, Ajit]
Language: eng
Format: mobi, epub
Publisher: UNKNOWN
Published: 2020-11-15T16:00:00+00:00
Figure 4.3 Interactions with external entities to provide a Video monitoring application
4.4 Non-functional requirements
The VMS non-functional requirements that we have identified in our interviews have also been addressed in the literature. We identified the following non-functional requirements for the VMS:
.
1. Ease of configuration for admin-user [10] [2]
VMS should be able to connect to different types of cameras, which each can support specific communication protocols and standards. However, to facilitate the configuration of different types of camera, VMS should support a single GUI interface for admin-users to work with different cameras.
2. Facilitate monitoring[2]
VMS should facilitate monitoring by providing both configuration and location transparency for guard. For example, the guard can refer to a location that has to be monitored by using its video service name. For instance, to monitor Hall A, which is covered by camera 1 and camera 2, guard only needs to send the name of the location (Hall A ). VMS is in charge of finding the address and the configuration of the required cameras, which either has been set by an admin-user or already, has a default value in the system.
3. Supporting new types of cameras [13]
VMS has to be able to support different types of camera in different domains. Thus, VMS has to be extendable with minimum changes, and it also needs to allow new cameras to be added to the system.
4. Scalability [10], [13], [2], [35]
The security management platform has to be capable of supporting different numbers of camera. The company VMS as a main part of the security platform is in charge of supporting a large number (more than 1000) of cameras. To support a large scale system, VMS has to be able to integrate with the third-party camera service provider to distribute part of the necessary process.
5. Security and privacy The major security problem of IoT is related to authentication and data integration [34]. To do the authentication, we need data exchange between authentication servers and devices. This makes a problem when an application use passive RFID tags in an IoT-based system, because a passive RFID does not have the capability of handling many communications with an authentication server. This problem has not been solved yet [36].
4.5 Conclusion
In this chapter, we identified both functional and non-functional requirements that should be considered in the design and implementation of a VMS. In order to identify these requirements, we conducted interviews with the technical staff of a commercial company (Nedap). We interviewed the technical staff of the research and development department in order to have a general understanding about both the current and next generation of VMS. We also had interviews with the software architects and developers of the current VMS to collect more information of the system.
Furthermore, we reviewed the literature on middleware for IoT-based systems to identify those requirements that a VMS should be able to support.
In our project, we are going to answer to two of these non-functional requirements: (1) providing ease of configuration for admin-user; (2) providing ease of monitoring for a guard who is as an end-user in VMS.
Download
Designing Middleware for Internet of Things by Ajit Singh.epub
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7808)
Grails in Action by Glen Smith Peter Ledbrook(7719)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6820)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6819)
Running Windows Containers on AWS by Marcio Morales(6340)
Kotlin in Action by Dmitry Jemerov(5090)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5060)
Combating Crime on the Dark Web by Nearchos Nearchou(4634)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4592)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4437)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4325)
The Age of Surveillance Capitalism by Shoshana Zuboff(3979)
Python for Security and Networking - Third Edition by José Manuel Ortega(3885)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3544)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3528)
Learn Wireshark by Lisa Bock(3511)
Mastering Python for Networking and Security by José Manuel Ortega(3376)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3355)
Blockchain Basics by Daniel Drescher(3324)
