Download presentation
Presentation is loading. Please wait.
Published byLorena Blankenship Modified over 6 years ago
1
Zilong Ye, Ph.D. zye5@calstatela.edu
Internet of things Zilong Ye, Ph.D.
2
What is Internet of things
The Internet of Things (IoT) is the network of physical objects—devices, vehicles, buildings and other items embedded with electronics, software, sensors, and network connectivity—that enables these objects to collect and exchange data. The Internet of Things (IoT) definition.
3
Characteristics of iot
Intelligence Knowledge extraction from a large dataset collected by billions of objects Complex system A diverse set of dynamically changing objects Size considerations Scalability Time considerations Billions of parallel and simultaneous events Space considerations Localization Everything as a service Consuming resources as a service
4
Enabling technologies
RFID to smallest enabling technologies, such as chips, etc.
5
Composed of one or more readers and tags
rfid The reduction in terms of size, weight, energy consumption, and cost of the radio takes us to a new era – This allows us to integrate radios in almost all objects and thus, to add the world ‘‘anything” to the above vision which leads to the IoT concept Composed of one or more readers and tags RFID tag is a small microchip attached to an antenna Can be seen as one of the main, smallest components of IoT, that collects data
6
Wireless Technologies
Zigbee 6LoWPAN Bluetooth WiFi Data rate ~250Kbps ~200Kbps ~3Mbps ~500Mbps Range ~500m ~200m ~50m ~100m Power Low Medium High Nodes ~65536 ~100 ~7 2000 Zigbee A complex Gateway for Zigbee to non-Zigbee Range 6LoWPAN WiFi Bluetooth Data rate
7
Iot applications Smart Appliances Wearable Tech Healthcare
8
A classic IoT Architecture
Server Smart Home Or smart eHealth Internet (IPv6) GW Remote User 6LoWPAN, Zigbee or Bluetooth IoT devices are resource constraint, unable to directly connect to IP networks, so Gateway is needed to connect these devices to the server; Server is needed for remote user to communicate with IoT devices behind Gateway, belongs to the category of hole punching technology;
9
Lack of standardization Scalability
Open challenges in iot Lack of standardization Scalability Addressing issues Understanding the big data Support for mobility New network traffic pattern to handle Security/Privacy issues
10
standardization Several standardization efforts but not integrated in a comprehensive framework Open Interconnect Consortium: Atmell, Dell, Intel, Samsung and Wind River Industrial Internet Consortium: Intel, Cisco, GE, IBM AllSeen Alliance: Led by Qualcomm, many others 21
11
scalability Number of devices increasing exponentially
How can they uniquely be tagged/named? How can the data generated by these devices be managed?
12
Addressing issues Incredibly high number of nodes, each of which will produce content that should be retrievable by any authorized user This requires effective addressing policies IPv4 protocol may already reached its limit. Alternatives? IPv6 addressing has been proposed for low power wireless communication on nodes within the 6LoWPAN context IPv6 addresses are expressed by means of 128 bits or10^38 addresses, enough to identify objects worth to be addressed RFID tags use 64–96 bit identifiers, as standardized by EPC global, solutions to enable the addressing of RFID tags into IPv6 networks Encapsulation of RFID message into an IPv6 packet. Source: Atzori et al. (2010)
13
New network traffic The characteristics of the smart objects traffic in the IoT is still not known Important basis for the design of the network infrastructures and protocols Wireless sensor networks (WSNs) traffic characterization Strongly depend on the application scenario Problems arise when WSNs become part of the overall Internet The Internet will be traversed by a large amount of data generated by sensor networks deployed for heterogeneous purposes extremely different traffic characteristics Required to devise good solutions for supporting quality of service
14
security The components spend most of the time unattended
It is easy to physically attack them IoT components are characterized by low capabilities in terms of both energy and computing resources They can’t implement complex schemes supporting security Authentication problem Proxy attack, a.k.a. man in the middle attack problem Data integrity Data should not be modified without the system detecting it Attacks on the node Memory protec1on Attacks over the network Keyed-‐Hash Message Auth. Code
15
privacy How is it different than traditional privacy?
Legislative issues Ethics issues Easy for a person to get involved in IoT even if he/she does not know Data can be stored indefinitely Current solutions are not enough Encryption, pseudo noise signal, privacy broker
16
Iot applications Smart home Smart e-healthcare
Cyber transportation system Environmental research Other applicatons
17
Smart Home Temperature monitoring and control;
Smart metering, including reading and control; Light or heat control; Smoke or water leakage detection; Windows, doors;
18
Smart Home Application 1
The sensor realize that the temperature outside is much higher than the room, it will trigger to close the window and put on the curtain so that the room could be cool. (inside smart home M2M)
19
Smart Home Application 2
The sensor realize that it is getting dark outside, it will trigger to put on the curtain in order to provide the privacy. (inside smart home M2M)
20
Smart Home Application 3
When go to bed, the user can turn off the light, lock the door, and wake up the security alarm using their smart phone (inside home control);
21
Smart Home Application 4
When raining, the user can remotely close the window and turn off the scheduled watering at yard, using their smart phone. (remote control)
22
Smart Home Application Prototype
Collector, e.g., light sensor Actuator, e.g., lamp Smart Phone Gateway Router Main components: Remote user: smart phone or pc; Collector: collect data, such as temperature, light, electricity, power, smoke or water; Actuator: control devices, such as AC, heater, lamp, alarm or other on/off operation; Main workflows: Remote reading: smart phone can read light value from multiple (mobile) sensor; Remote control: smart phone can lighten the lamp; M2M communication: if the sensed data is below some threshold, the light sensor can trigger the lamp to be on;
23
Smart Home Challenges Security; Interoperability;
User’s information and privacy is the most important concern; Interoperability; Heterogeneous device; Device to device; Device to outside world; Unreliable wireless communication;
24
Biomedical Data Learning & Analysis
smart e-healthcare Emergency Contact Emergency Physician Client Biomedical Data Learning & Analysis Police
25
Smart eHealth Prototype
Doctors and family Patient with wearable devices Gateway router Monitoring system IoT computing server Alert system Main components: Patient: use fitbit or other body sensors; Monitor system: 1) collect data; 2) send alert to patients and doctors and family when necessary; Doctors and family: read data from monitoring system, and provide prescription or assistance to the patient; Main workflows: Monitor read data from mobile fitbit device; Monitor send alert to doctors, family and patient; Doctor and family read data from monitor or directly from patient; Doctor and family send prescription to patient;
26
Smart e-Health Characteristic: Benefits: Challenges:
Both pull and push traffic; Benefits: Route on name rather than IP, which can easily bind smart devices of a given client; Multiple access to the same data; Caching can help save bandwidth; Challenges: Privacy; Real-time; (patients may not have time or energy to call the emergency by themselves)
27
Cyber Transport System
28
Cyber Transport System
Applications: Real-time traffic monitoring; On-road video delivery; Safe driving; (alert to the appropriate vehicle cluster) Benefits: Names can be easily aggregated based on location information; Caches can be used for multiple access to the same data (traffic data or video);
29
Cyber Transportation system
Vehicle control: Airplanes, automobiles, autonomous vehicles All kinds of sensors to provide accurate, redundant view of the world Several processors in cars (Engine control, break system, airbag deployment system, windshield wiper, door locks, entertainment system, etc.) Actuation is maintaining control of the vehicle Very light timing constraints and requirements enforced by the platforms
30
Cyber transportation system
A network of sensors in a vehicle can interact with its surroundings to provide informa1on Local roads, weather and traffic conditions to the car driver Adaptive drive systems to respond accordingly Automatic activation of braking systems or speed control via fuel management systems. Condition and event detection sensors can activate systems to maintain driver and passenger comfort and safety through the use of airbags and seatbelt Sensors for fatigue and mood monitoring based on driving conditions, driver behavior and facial indicators Ensuring safe driving by activating warning systems or directly controlling the vehicle
31
RFID Track and Trace I want: amazon/computers/ipad/#1/
I want: amazon/books/Harry Porter #1/lego/toys/amazon Harry Porter/books/amazon #1/ipad/computers/amazon I want: amazon/toys/lego/#1
32
RFID Track and Trace Characteristic: Benefits:
Both pull and push (publish/subscribe) traffic; Benefits: Handle billions of RFID tags Suitable for resource-constrained devices, e.g., RFID tags, because of (1) routing based on name instead of complicated routing protocol; (2) cached data can be reused so that RFID do not need to respond frequently; Cache enables an easy way for multiple access to the trace data by both provider and user, so it can help save bandwidth; Other IoT use cases: library management, lost-found, market map and other RFID positioning;
33
Air Condition (pm2.5) Monitor
34
Air Condition (pm2.5) Monitor
Benefits: Handle billions of small sensors; One Interest retrieves multiple Data for calculating average value; Routing based on names; Cache can be used for other institutes to access the same data, so that save bandwidth; Suitable for energy-constraint devices, because (1) caching allows the sensors to reply only a few Interest request; (2) do not need complicated protocol;
35
Google Wallet or Apple Watch
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.