Zilong Ye, Ph.D. zye5@calstatela.edu Internet of things Zilong Ye, Ph.D. zye5@calstatela.edu.

Slides:



Advertisements
Similar presentations
Mobile Computing and Commerce And Pervasive Computing
Advertisements

Mobile Wireless Sensor Network (mWSN) at Nokia
UPM E.U.I.T. Diatel Xi Chen Internet of Things UPM E.U.I.T. Diatel Xi Chen
OneM2M Technical Requirements - Driven by EU BUTLER and IEEE PAC - Group Name: WG1 (REQ) Source: Friedbert Berens, FBConsulting Sarl,
Contextualized Information-Centric Home Networking (draft-ravindran-cibus-01.txt) IRTF/ICN-RG (IETF-89) Ravi Ravindran, Asit Chakraborti, G.Q.Wang.
Abstract Basically assuming the road traffic as a computer LAN. Our fuel saver system uses radio frequency transmitting and receiving technique to communicate.
Introduction to Cyber Physical Systems Yuping Dong Sep. 21, 2009.
Ch. 7. Architecture Standardization for WoT
Mobile Commerce and Ubiquitous Computing
Research Directions for the Internet of Things Supervised by: Dr. Nouh Sabry Presented by: Ahmed Mohamed Sayed.
Embedded XINU and Beyond B. Ramamurthy. Embedded XINU Platform WRT54GL Understand the various components CPU, different types of memory, its classification.
Smart Home Technologies CSE 4392 / CSE 5392 Spring 2006 Manfred Huber
Tufts Wireless Laboratory School Of Engineering Tufts University “Network QoS Management in Cyber-Physical Systems” Nicole Ng 9/16/20151 by Feng Xia, Longhua.
Gauteng Provincial Government
Advisor: Quincy Wu Speaker: Kuan-Ta Lu Date: Aug. 19, 2010
Presenter - Bob Kinicki Internet of Things Fall 2015
The Gator Tech Smart House: A Programmable Pervasive Space Real/Research Application In Pervasive Computing Lee Hae Dong, ICU CSE.
Internet of Things (Ref: Slideshare)
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Ubiquitous means ‘everywhere’
Source : 2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP) Auther : Nacer Khalil, Mohamed.
I I R R T T Internet Real Time Lab SECE SYSTEM SECE SERVER INTERNET ELECTRICAL APPLIANCES CONNECTED TO MICROCONTROLLER … … : register & download.
Security of the Internet of Things: perspectives and challenges
CloudMAC: Moving MAC frames processing of the Sink to Cloud.
Internet of Things – Getting Started
Wireless sensor networks: a survey
Introduction to Mobile-Cloud Computing. What is Mobile Cloud Computing? an infrastructure where both the data storage and processing happen outside of.
Communication Protocol Engineering Lab. VANET-cloud : a generic cloud computing model for vehicular ad hoc networks IEEE Wireless Communications February.
Project Proposal on “Internet of Things". submitted by D.Sasitharan M.Sangeetha IFET college of Engineering,Villupuram, Tamilnadu, India.
Intelligent parking system based on RFID
Authors: Christos Stergiou Andreas P. Plageras Kostas E. Psannis
Medium Access Control. MAC layer covers three functional areas: reliable data delivery access control security.
By Dr.G.K.D.Prasanna Venkatesan, Professor
Telematics Protocols and Technologies
Sensors Journal, IEEE, Issue Date: May 2013,
Lecture 7: Internet of Things
Providing Teleworker Services
A brief introduction to IoT gateway
Internet of Things.
Internet of Things 1.
University of Maryland College Park
Smart home introduction
Intelligent IVI with AI
UNIT II –Part 2.
Internet of Things and its applications
1st Draft for Defining IoT (1)
How SCADA Systems Work?.
Smart Car through IoT 라이 아샤리 리날디
Internet of Things: State of the Art
World-Leading Research with Real-World Impact!
Algorithms for Big Data Delivery over the Internet of Things
Use Case of LRLP Operation for IoT
Internet of Things
Presenter: Patrick N. zwane Advisor: Dr. Kai-Wei Kevin Ke 21/09/2018
The Web Sensor Gateway Architecture for ZIGBEE
Internet of Things (IoT)
Mobile Commerce and the Internet of Things
The Internet of Things Exploring Big Data’s Missing Soulmate
Internet of Things (IoT)
Smart University utilising the concept of the Internet of Things (IoT) Simon Downes BSc MBCS Carlene Campbell March 2018.
Lecture 4: Internet of Things
Internet of Things.
Smart Learning concepts to enhance SMART Universities in Africa
Wireless Ad Hoc Networks
Developing Vehicular Data Cloud Services in the IoT Environment
IoT Requirements for Networking Protocols Sadoon Azizi Department of Computer Engineering and IT.
Enabling the business-based Internet of Things and Services
Internet of Things (IoT)
Welcome to The World of Internet of Things
Mobile Commerce and Ubiquitous Computing
Presentation transcript:

Zilong Ye, Ph.D. zye5@calstatela.edu Internet of things Zilong Ye, Ph.D. zye5@calstatela.edu

What is Internet of things The Internet of Things (IoT) is the network of physical objects—devices, vehicles, buildings and other items embedded with electronics, software, sensors, and network connectivity—that enables these objects to collect and exchange data. The Internet of Things (IoT) definition.

Characteristics of iot Intelligence Knowledge extraction from a large dataset collected by billions of objects Complex system A diverse set of dynamically changing objects Size considerations Scalability Time considerations Billions of parallel and simultaneous events Space considerations Localization Everything as a service Consuming resources as a service

Enabling technologies RFID to smallest enabling technologies, such as chips, etc.

Composed of one or more readers and tags rfid The reduction in terms of size, weight, energy consumption, and cost of the radio takes us to a new era – This allows us to integrate radios in almost all objects and thus, to add the world ‘‘anything” to the above vision which leads to the IoT concept Composed of one or more readers and tags RFID tag is a small microchip attached to an antenna Can be seen as one of the main, smallest components of IoT, that collects data

Wireless Technologies Zigbee 6LoWPAN Bluetooth WiFi Data rate ~250Kbps ~200Kbps ~3Mbps ~500Mbps Range ~500m ~200m ~50m ~100m Power Low Medium High Nodes ~65536 ~100 ~7 2000 Zigbee A complex Gateway for Zigbee to non-Zigbee Range 6LoWPAN WiFi Bluetooth Data rate

Iot applications Smart Appliances Wearable Tech Healthcare

A classic IoT Architecture Server Smart Home Or smart eHealth Internet (IPv6) GW Remote User 6LoWPAN, Zigbee or Bluetooth IoT devices are resource constraint, unable to directly connect to IP networks, so Gateway is needed to connect these devices to the server; Server is needed for remote user to communicate with IoT devices behind Gateway, belongs to the category of hole punching technology;

Lack of standardization Scalability Open challenges in iot Lack of standardization Scalability Addressing issues Understanding the big data Support for mobility New network traffic pattern to handle Security/Privacy issues

standardization Several standardization efforts but not integrated in a comprehensive framework Open Interconnect Consortium: Atmell, Dell, Intel, Samsung and Wind River Industrial Internet Consortium: Intel, Cisco, GE, IBM AllSeen Alliance: Led by Qualcomm, many others 21

scalability Number of devices increasing exponentially How can they uniquely be tagged/named? How can the data generated by these devices be managed?

Addressing issues Incredibly high number of nodes, each of which will produce content that should be retrievable by any authorized user This requires effective addressing policies IPv4 protocol may already reached its limit. Alternatives? IPv6 addressing has been proposed for low power wireless communication on nodes within the 6LoWPAN context IPv6 addresses are expressed by means of 128 bits or10^38 addresses, enough to identify objects worth to be addressed RFID tags use 64–96 bit identifiers, as standardized by EPC global, solutions to enable the addressing of RFID tags into IPv6 networks Encapsulation of RFID message into an IPv6 packet. Source: Atzori et al. (2010)

New network traffic The characteristics of the smart objects traffic in the IoT is still not known Important basis for the design of the network infrastructures and protocols Wireless sensor networks (WSNs) traffic characterization Strongly depend on the application scenario Problems arise when WSNs become part of the overall Internet The Internet will be traversed by a large amount of data generated by sensor networks deployed for heterogeneous purposes extremely different traffic characteristics Required to devise good solutions for supporting quality of service

security The components spend most of the time unattended It is easy to physically attack them IoT components are characterized by low capabilities in terms of both energy and computing resources They can’t implement complex schemes supporting security Authentication problem Proxy attack, a.k.a. man in the middle attack problem Data integrity Data should not be modified without the system detecting it Attacks on the node Memory protec1on Attacks over the network Keyed-­‐Hash Message Auth. Code

privacy How is it different than traditional privacy? Legislative issues Ethics issues Easy for a person to get involved in IoT even if he/she does not know Data can be stored indefinitely Current solutions are not enough Encryption, pseudo noise signal, privacy broker

Iot applications Smart home Smart e-healthcare Cyber transportation system Environmental research Other applicatons

Smart Home Temperature monitoring and control; Smart metering, including reading and control; Light or heat control; Smoke or water leakage detection; Windows, doors;

Smart Home Application 1 The sensor realize that the temperature outside is much higher than the room, it will trigger to close the window and put on the curtain so that the room could be cool. (inside smart home M2M)

Smart Home Application 2 The sensor realize that it is getting dark outside, it will trigger to put on the curtain in order to provide the privacy. (inside smart home M2M)

Smart Home Application 3 When go to bed, the user can turn off the light, lock the door, and wake up the security alarm using their smart phone (inside home control);

Smart Home Application 4 When raining, the user can remotely close the window and turn off the scheduled watering at yard, using their smart phone. (remote control)

Smart Home Application Prototype Collector, e.g., light sensor Actuator, e.g., lamp Smart Phone Gateway Router Main components: Remote user: smart phone or pc; Collector: collect data, such as temperature, light, electricity, power, smoke or water; Actuator: control devices, such as AC, heater, lamp, alarm or other on/off operation; Main workflows: Remote reading: smart phone can read light value from multiple (mobile) sensor; Remote control: smart phone can lighten the lamp; M2M communication: if the sensed data is below some threshold, the light sensor can trigger the lamp to be on;

Smart Home Challenges Security; Interoperability; User’s information and privacy is the most important concern; Interoperability; Heterogeneous device; Device to device; Device to outside world; Unreliable wireless communication;

Biomedical Data Learning & Analysis smart e-healthcare Emergency Contact Emergency Physician Client Biomedical Data Learning & Analysis Police

Smart eHealth Prototype Doctors and family Patient with wearable devices Gateway router Monitoring system IoT computing server Alert system Main components: Patient: use fitbit or other body sensors; Monitor system: 1) collect data; 2) send alert to patients and doctors and family when necessary; Doctors and family: read data from monitoring system, and provide prescription or assistance to the patient; Main workflows: Monitor read data from mobile fitbit device; Monitor send alert to doctors, family and patient; Doctor and family read data from monitor or directly from patient; Doctor and family send prescription to patient;

Smart e-Health Characteristic: Benefits: Challenges: Both pull and push traffic; Benefits: Route on name rather than IP, which can easily bind smart devices of a given client; Multiple access to the same data; Caching can help save bandwidth; Challenges: Privacy; Real-time; (patients may not have time or energy to call the emergency by themselves)

Cyber Transport System

Cyber Transport System Applications: Real-time traffic monitoring; On-road video delivery; Safe driving; (alert to the appropriate vehicle cluster) Benefits: Names can be easily aggregated based on location information; Caches can be used for multiple access to the same data (traffic data or video);

Cyber Transportation system Vehicle control: Airplanes, automobiles, autonomous vehicles All kinds of sensors to provide accurate, redundant view of the world Several processors in cars (Engine control, break system, airbag deployment system, windshield wiper, door locks, entertainment system, etc.) Actuation is maintaining control of the vehicle Very light timing constraints and requirements enforced by the platforms

Cyber transportation system A network of sensors in a vehicle can interact with its surroundings to provide informa1on Local roads, weather and traffic conditions to the car driver Adaptive drive systems to respond accordingly Automatic activation of braking systems or speed control via fuel management systems. Condition and event detection sensors can activate systems to maintain driver and passenger comfort and safety through the use of airbags and seatbelt Sensors for fatigue and mood monitoring based on driving conditions, driver behavior and facial indicators Ensuring safe driving by activating warning systems or directly controlling the vehicle

RFID Track and Trace I want: amazon/computers/ipad/#1/ I want: amazon/books/Harry Porter #1/lego/toys/amazon Harry Porter/books/amazon #1/ipad/computers/amazon I want: amazon/toys/lego/#1

RFID Track and Trace Characteristic: Benefits: Both pull and push (publish/subscribe) traffic; Benefits: Handle billions of RFID tags Suitable for resource-constrained devices, e.g., RFID tags, because of (1) routing based on name instead of complicated routing protocol; (2) cached data can be reused so that RFID do not need to respond frequently; Cache enables an easy way for multiple access to the trace data by both provider and user, so it can help save bandwidth; Other IoT use cases: library management, lost-found, market map and other RFID positioning;

Air Condition (pm2.5) Monitor

Air Condition (pm2.5) Monitor Benefits: Handle billions of small sensors; One Interest retrieves multiple Data for calculating average value; Routing based on names; Cache can be used for other institutes to access the same data, so that save bandwidth; Suitable for energy-constraint devices, because (1) caching allows the sensors to reply only a few Interest request; (2) do not need complicated protocol;

Google Wallet or Apple Watch