SlideShare a Scribd company logo
1 of 18
Download to read offline
Intelligent Energy Usage via M2M
          Communication
            Short version


          Rune Torbensen
           rto@cfsi.dk

         PhD, Aalborg University



      Copenhagen, 9.Oct, 2012
Outline


   PhD project work
     Home Automation
     Communication
     Cooperation
     Security


   M2M Project Ideas


   Conclusion


   References
PhD project work   Home Automation
                       M2M Project Ideas   Communication
                              Conclusion   Cooperation
                              References   Security


Outline


   PhD project work
     Home Automation
     Communication
     Cooperation
     Security

   M2M Project Ideas

   Conclusion

   References


                                                             3 / 18
PhD project work   Home Automation
                        M2M Project Ideas   Communication
                               Conclusion   Cooperation
                               References   Security


Current Home Automation

  Home automation has not become mainstream yet
  Few complete smart house installations
    ◮   Building automation in the residence
    ◮   Installed by experts
    ◮   Predominantly wired and centralized (control)
    ◮   Components are expensive and variety is limited
    ◮   No dominating standard in foreseeable future
  Subsystems are available
    ◮   Limited market share
    ◮   Islands of functionality
    ◮   Unable to interoperate with the outside
                                                              4 / 18
PhD project work   Home Automation
                       M2M Project Ideas   Communication
                              Conclusion   Cooperation
                              References   Security


Future Home Automation
  All electronic devices in the residence can cooperate as services
    ◮   Consumers may easily compose a system out of products
    ◮   Easy to install and use
    ◮   Remote access for smartphone
  Many vendors, No lock-in
    ◮   Product-by-product purchasing
    ◮   Product variety
    ◮   Possibility to compete on price, quality and functionality
  Distributed control scheme
    ◮   Many small controllers
    ◮   Ad hoc discovery of services
    ◮   Sensors reused for many controllers (applications)
                                                                      5 / 18
PhD project work   Home Automation
                      M2M Project Ideas   Communication
                             Conclusion   Cooperation
                             References   Security


Communication Challenges
   Based on taxonomy of protocols for home networks
   Communication methods
     ◮ Control wires are costly to install in existing houses
     ◮ Power line is immature and unreliable due to noise
     ◮ Low-power Short Range Wireless (SRW)
   Focus on SRW technology
     ◮ Flexibility and refitting to existing buildings
     ◮ Well suited for battery powered devices
     ◮ Many useful but incompatible technologies
     ◮ Physical: bandwidth, frequencies, modulation, etc.
     ◮ Reliability problems due to wall penetration
   Full home coverage
     ◮ Multi-hop routing are immature solutions
     ◮ Repeaters are impractical and often unsupported (disruptive)
                                                                      6 / 18
PhD project work   Home Automation
                          M2M Project Ideas   Communication
                                 Conclusion   Cooperation
                                 References   Security


Interoperable Home Automation Platform

   An architecture to connect different networks into one
   heterogeneous network covering the whole residence

  ◮   Using IP as common protocol                               Heat
                                                              Controller
                                                                                   Light
                                                                                 Controller
                                                                                                  Access
                                                                                                 Controller

  ◮   End-devices visible as IP devices
                                                                                IP Network
  ◮   Controllers on IP
  ◮   End-to-end communication                              Room
                                                            Bridge
                                                                                                 Room
                                                                                                 Bridge

  ◮   Generic distributed                        Subnetwork
                                                   Adapter
                                                                Subnetwork
                                                                  Adapter
                                                                                      Subnetwork
                                                                                        Adapter
                                                                                                      Subnetwork
                                                                                                        Adapter

      communication infrastructure                 ZigBee            Bluetooth           ZWave            Bluetooth

  ◮   IP room bridges
                                                   Sensor            Actuator           Sensor            Sensor
  ◮   Expandable via adapter modules
                                                       Living room                            Bed room




                                                                                                                   7 / 18
PhD project work   Home Automation
                      M2M Project Ideas   Communication
                             Conclusion   Cooperation
                             References   Security


Cooperation Challenge
   Based on market actor and technology analysis
   Many different applications, controllers, end-devices
     ◮ Number of applications growing over time (unbounded set)
     ◮ Incompatible service frameworks, message representation
   Standard applications, profiles are predominant
     ◮ Considerable time and cost to introduce new ideas
     ◮ Standardization delay
     ◮ Alliance memberships and licensing costs
     ◮ Limit designs and innovations
   A centralized, translator box is not a usable solution
     ◮ Hard to realize in a resource limited system
     ◮ Constitutes a gatekeeper
     ◮ Creates unwanted dependency between actors
     ◮ Inconsistent with concept of a generic infrastructure
                                                                  8 / 18
PhD project work   Home Automation
                      M2M Project Ideas   Communication
                             Conclusion   Cooperation
                             References   Security


Open Device Service Description Language
   Enable cooperation between unfamiliar devices
   End-devices in IHAP provide a service descriptor
   Service description language:
     ◮ Description of any design

     ◮ Existing devices and profiles

     ◮ Legacy support allows bootstrapping the market

     ◮ New designs avoids standardization delay

     ◮ Supports fast-to-market and innovation in SME

   Simple application protocols of home automation end-devices
     ◮ Get value or device state

     ◮ Send command with a parameter

     ◮ Listen for event
                                                                 9 / 18
PhD project work   Home Automation
                       M2M Project Ideas   Communication
                              Conclusion   Cooperation
                              References   Security


Security Challenges

   Motivations for security in embedded systems
     ◮   Devices control the environment
     ◮   Capture and share personal data
   Threats from wireless and Internet
     ◮   Disruption - system unable to send alarm
     ◮   Eavesdropping - undetectable passive data-mining
     ◮   Unauthorized access
     ◮   Opening of door locks and stealing personal data
   Security must be user friendly
     ◮   Users often misunderstand difficult operations
     ◮   Misconfiguration can breach security

                                                             10 / 18
PhD project work   Home Automation
                        M2M Project Ideas   Communication
                               Conclusion   Cooperation
                               References   Security


Secure Embedded Exchange Protocol (SEEP)


  A secure end-to-end communication protocol
  SEEP design philosophy:
    ◮   Internet-grade security level
    ◮   Optimized for resource-constrained embedded platforms
    ◮   Low overhead, short messages, minimal network traffic
    ◮   Simple and therefore formally verifiable
  A formally verified alternative to SSL for embedded devices
  Not required but fully compatible with IHAP



                                                                11 / 18
PhD project work
                       M2M Project Ideas
                              Conclusion
                              References


Outline


   PhD project work
     Home Automation
     Communication
     Cooperation
     Security

   M2M Project Ideas

   Conclusion

   References


                                           12 / 18
PhD project work
                        M2M Project Ideas
                               Conclusion
                               References


M2M Project Ideas


   Intelligent energy usage via M2M communication
     ◮   The motivation is energy usage optimization in buildings
     ◮   Reduce or move energy consumption
   Development of new M2M communication technology
     ◮   Connecting systems both locally and remotely via the Internet
     ◮   Enable ad-hoc resource sharing and signal exchange
     ◮   Report energy usage and errors
     ◮   Security and privacy by design



                                                                         13 / 18
PhD project work
                     M2M Project Ideas
                            Conclusion
                            References


Analysis and Requirements
   Energy usage optimization strategies
     ◮ Avoiding or postponing energy consumption, store energy
     ◮ User involved or automated via M2M communication
     ◮ Systems log information and provide overview
     ◮ Smartphone interface, website access
     ◮ Control systems communicate with utility company server
     ◮ Great variety of subsystems by many different vendors

   Technology requirements:
     ◮ Ad-hoc cooperation and resource sharing
     ◮ Retain autonomy of each system
     ◮ Heterogeneous network
     ◮ Internet access
     ◮ Secure communication
                                                                 14 / 18
PhD project work
                       M2M Project Ideas
                              Conclusion
                              References


Outline


   PhD project work
     Home Automation
     Communication
     Cooperation
     Security

   M2M Project Ideas

   Conclusion

   References


                                           15 / 18
PhD project work
                       M2M Project Ideas
                              Conclusion
                              References


Conclusion

   M2M communication technology
    ◮   Energy usage optimization in smaller buildings
    ◮   Embedded devices instead of server, lowers overall system cost
    ◮   Connecting heterogeneous environments to the Internet
    ◮   Existing products can connect without supporting IP
    ◮   Low entry barrier, low development cost for new vendors
    ◮   Cooperation is flexible, autonomy is retained
    ◮   Data sharing with privacy precautions
    ◮   Internet grade secure communication
    ◮   Usability, short setup time for installer/owner


                                                                         16 / 18
PhD project work
                       M2M Project Ideas
                              Conclusion
                              References


Outline


   PhD project work
     Home Automation
     Communication
     Cooperation
     Security

   M2M Project Ideas

   Conclusion

   References


                                           17 / 18
PhD project work
                          M2M Project Ideas
                                 Conclusion
                                 References


References

   Relevant published papers:
   Future home automation systems
     ◮ Rune Torbensen: ”OHAS: Open Home Automation System” IEEE, International
       Symposium on Consumer Electronics, Algarve, Portugal, 2008.

   Classification of wireless protocols
     ◮ Rune Torbensen, Klaus Marius Hansen and Theis Hjorth: ”My Home is my
       Bazaar - A Taxonomy and Classification of Current Wireless Home Network
       Protocols” IEEE, 2nd Eastern European Regional Conference on the Engineering
       of Computer Based Systems (ECBS-EERC), Bratislava, Slovakia, 2011.

   Secure embedded communication
     ◮ Theis Hjorth and Rune Torbensen: ”Secure Wireless Embedded Systems via
       Component-based Design” Proc. of the IEEE International Conference on
       Privacy, Security, Risk and Trust PASSAT 2010, Minneapolis, Minnesota, USA,
       Aug 2010.


                                                                                      18 / 18

More Related Content

What's hot

Next Generation Network Architecture
Next Generation Network ArchitectureNext Generation Network Architecture
Next Generation Network ArchitectureAPNIC
 
ISI_Report_(Repaired) (4) (1)
ISI_Report_(Repaired) (4) (1)ISI_Report_(Repaired) (4) (1)
ISI_Report_(Repaired) (4) (1)Indranil Roy
 
Pstn Migration To Ngn
Pstn Migration To NgnPstn Migration To Ngn
Pstn Migration To NgnMike Fisher
 
An energy efficiency analysis of lightweight security protocols
An energy efficiency analysis of lightweight security protocolsAn energy efficiency analysis of lightweight security protocols
An energy efficiency analysis of lightweight security protocolsHamdamboy
 
Overview of Wireless Sensor Networks
Overview of Wireless Sensor NetworksOverview of Wireless Sensor Networks
Overview of Wireless Sensor NetworksDuncan Purves
 
Cloud computing (IT-703) UNIT 1 & 2
Cloud computing (IT-703) UNIT 1 & 2Cloud computing (IT-703) UNIT 1 & 2
Cloud computing (IT-703) UNIT 1 & 2Jitendra s Rathore
 
Embedded Systems Design and Programming & Internet of Things
Embedded Systems Design and Programming & Internet of ThingsEmbedded Systems Design and Programming & Internet of Things
Embedded Systems Design and Programming & Internet of ThingsVasundhara Sharma
 
Ngn Technologies Company Profile
Ngn Technologies Company ProfileNgn Technologies Company Profile
Ngn Technologies Company ProfileAnuradha Gupta
 
ngn overview , next generation network
ngn overview , next generation networkngn overview , next generation network
ngn overview , next generation networkTushar Kumar
 

What's hot (12)

Next Generation Network Architecture
Next Generation Network ArchitectureNext Generation Network Architecture
Next Generation Network Architecture
 
ISI_Report_(Repaired) (4) (1)
ISI_Report_(Repaired) (4) (1)ISI_Report_(Repaired) (4) (1)
ISI_Report_(Repaired) (4) (1)
 
Pstn Migration To Ngn
Pstn Migration To NgnPstn Migration To Ngn
Pstn Migration To Ngn
 
An energy efficiency analysis of lightweight security protocols
An energy efficiency analysis of lightweight security protocolsAn energy efficiency analysis of lightweight security protocols
An energy efficiency analysis of lightweight security protocols
 
Overview of Wireless Sensor Networks
Overview of Wireless Sensor NetworksOverview of Wireless Sensor Networks
Overview of Wireless Sensor Networks
 
seminar
seminarseminar
seminar
 
Blug Talk
Blug TalkBlug Talk
Blug Talk
 
R43019698
R43019698R43019698
R43019698
 
Cloud computing (IT-703) UNIT 1 & 2
Cloud computing (IT-703) UNIT 1 & 2Cloud computing (IT-703) UNIT 1 & 2
Cloud computing (IT-703) UNIT 1 & 2
 
Embedded Systems Design and Programming & Internet of Things
Embedded Systems Design and Programming & Internet of ThingsEmbedded Systems Design and Programming & Internet of Things
Embedded Systems Design and Programming & Internet of Things
 
Ngn Technologies Company Profile
Ngn Technologies Company ProfileNgn Technologies Company Profile
Ngn Technologies Company Profile
 
ngn overview , next generation network
ngn overview , next generation networkngn overview , next generation network
ngn overview , next generation network
 

Similar to Intelligent Energy Usage via M2M Communication

053744r00 Zb Mwg 2005 09 11 Zig Bee Alliance Tutorial
053744r00 Zb Mwg 2005 09 11 Zig Bee Alliance Tutorial 053744r00 Zb Mwg 2005 09 11 Zig Bee Alliance Tutorial
053744r00 Zb Mwg 2005 09 11 Zig Bee Alliance Tutorial voracle
 
Dynamic Communication of Wireless Sensor Network
Dynamic Communication of Wireless Sensor Network Dynamic Communication of Wireless Sensor Network
Dynamic Communication of Wireless Sensor Network IJERA Editor
 
Unveiling the Sydney IoT Landscape
Unveiling the Sydney IoT LandscapeUnveiling the Sydney IoT Landscape
Unveiling the Sydney IoT LandscapeAndrew Blades
 
ZIG BEE PRESENTATION..pptx
ZIG BEE PRESENTATION..pptxZIG BEE PRESENTATION..pptx
ZIG BEE PRESENTATION..pptxRayateAbhay
 
Introduction to zigbee
Introduction to zigbeeIntroduction to zigbee
Introduction to zigbeeAmit Dixit
 
IRJET- Multi Plug Control using Internet of Things
IRJET- Multi Plug Control using Internet of ThingsIRJET- Multi Plug Control using Internet of Things
IRJET- Multi Plug Control using Internet of ThingsIRJET Journal
 
“Thread - A New Wireless Networking Protocol for Internet of Things” - Ankith...
“Thread - A New Wireless Networking Protocol for Internet of Things” - Ankith...“Thread - A New Wireless Networking Protocol for Internet of Things” - Ankith...
“Thread - A New Wireless Networking Protocol for Internet of Things” - Ankith...EIT Digital Alumni
 
Choosing the Right Hardware for Prototyping
Choosing the Right Hardware for PrototypingChoosing the Right Hardware for Prototyping
Choosing the Right Hardware for PrototypingPhidgets Inc
 
Kura M2M IoT Gateway
Kura M2M IoT GatewayKura M2M IoT Gateway
Kura M2M IoT GatewayEurotech
 
Network Trends
Network TrendsNetwork Trends
Network TrendsArun ACE
 
Weaving the Future - Enable Networks to Be More Agile for Services
Weaving the Future - Enable Networks to Be More Agile for ServicesWeaving the Future - Enable Networks to Be More Agile for Services
Weaving the Future - Enable Networks to Be More Agile for ServicesHuawei Enterprise Hong Kong
 
Building a More Connected World
Building a More Connected WorldBuilding a More Connected World
Building a More Connected WorldSilicon Labs
 

Similar to Intelligent Energy Usage via M2M Communication (20)

053744r00 Zb Mwg 2005 09 11 Zig Bee Alliance Tutorial
053744r00 Zb Mwg 2005 09 11 Zig Bee Alliance Tutorial 053744r00 Zb Mwg 2005 09 11 Zig Bee Alliance Tutorial
053744r00 Zb Mwg 2005 09 11 Zig Bee Alliance Tutorial
 
Zigbeepresentation
ZigbeepresentationZigbeepresentation
Zigbeepresentation
 
Zig Bee
Zig BeeZig Bee
Zig Bee
 
Dynamic Communication of Wireless Sensor Network
Dynamic Communication of Wireless Sensor Network Dynamic Communication of Wireless Sensor Network
Dynamic Communication of Wireless Sensor Network
 
Zigbee Technology
Zigbee TechnologyZigbee Technology
Zigbee Technology
 
Unveiling the Sydney IoT Landscape
Unveiling the Sydney IoT LandscapeUnveiling the Sydney IoT Landscape
Unveiling the Sydney IoT Landscape
 
ZIG BEE PRESENTATION..pptx
ZIG BEE PRESENTATION..pptxZIG BEE PRESENTATION..pptx
ZIG BEE PRESENTATION..pptx
 
WEBINAR - ZIGBEE
WEBINAR - ZIGBEE WEBINAR - ZIGBEE
WEBINAR - ZIGBEE
 
Introduction to zigbee
Introduction to zigbeeIntroduction to zigbee
Introduction to zigbee
 
IRJET- Multi Plug Control using Internet of Things
IRJET- Multi Plug Control using Internet of ThingsIRJET- Multi Plug Control using Internet of Things
IRJET- Multi Plug Control using Internet of Things
 
Unit 4
Unit 4Unit 4
Unit 4
 
“Thread - A New Wireless Networking Protocol for Internet of Things” - Ankith...
“Thread - A New Wireless Networking Protocol for Internet of Things” - Ankith...“Thread - A New Wireless Networking Protocol for Internet of Things” - Ankith...
“Thread - A New Wireless Networking Protocol for Internet of Things” - Ankith...
 
Choosing the Right Hardware for Prototyping
Choosing the Right Hardware for PrototypingChoosing the Right Hardware for Prototyping
Choosing the Right Hardware for Prototyping
 
Kura M2M IoT Gateway
Kura M2M IoT GatewayKura M2M IoT Gateway
Kura M2M IoT Gateway
 
Network Trends
Network TrendsNetwork Trends
Network Trends
 
Wireless notice board using zigbee
Wireless notice board using zigbeeWireless notice board using zigbee
Wireless notice board using zigbee
 
Weaving the Future - Enable Networks to Be More Agile for Services
Weaving the Future - Enable Networks to Be More Agile for ServicesWeaving the Future - Enable Networks to Be More Agile for Services
Weaving the Future - Enable Networks to Be More Agile for Services
 
Building a More Connected World
Building a More Connected WorldBuilding a More Connected World
Building a More Connected World
 
Zigbee
ZigbeeZigbee
Zigbee
 
ZIGBEE TECHNOLOGY ppt
ZIGBEE TECHNOLOGY pptZIGBEE TECHNOLOGY ppt
ZIGBEE TECHNOLOGY ppt
 

More from InfinIT - Innovationsnetværket for it

More from InfinIT - Innovationsnetværket for it (20)

Erfaringer med-c kurt-noermark
Erfaringer med-c kurt-noermarkErfaringer med-c kurt-noermark
Erfaringer med-c kurt-noermark
 
Object orientering, test driven development og c
Object orientering, test driven development og cObject orientering, test driven development og c
Object orientering, test driven development og c
 
Embedded softwaredevelopment hcs
Embedded softwaredevelopment hcsEmbedded softwaredevelopment hcs
Embedded softwaredevelopment hcs
 
C og c++-jens lund jensen
C og c++-jens lund jensenC og c++-jens lund jensen
C og c++-jens lund jensen
 
201811xx foredrag c_cpp
201811xx foredrag c_cpp201811xx foredrag c_cpp
201811xx foredrag c_cpp
 
C som-programmeringssprog-bt
C som-programmeringssprog-btC som-programmeringssprog-bt
C som-programmeringssprog-bt
 
Infinit seminar 060918
Infinit seminar 060918Infinit seminar 060918
Infinit seminar 060918
 
DCR solutions
DCR solutionsDCR solutions
DCR solutions
 
Not your grandfathers BPM
Not your grandfathers BPMNot your grandfathers BPM
Not your grandfathers BPM
 
Kmd workzone - an evolutionary approach to revolution
Kmd workzone - an evolutionary approach to revolutionKmd workzone - an evolutionary approach to revolution
Kmd workzone - an evolutionary approach to revolution
 
EcoKnow - oplæg
EcoKnow - oplægEcoKnow - oplæg
EcoKnow - oplæg
 
Martin Wickins Chatbots i fronten
Martin Wickins Chatbots i frontenMartin Wickins Chatbots i fronten
Martin Wickins Chatbots i fronten
 
Marie Fenger ai kundeservice
Marie Fenger ai kundeserviceMarie Fenger ai kundeservice
Marie Fenger ai kundeservice
 
Mads Kaysen SupWiz
Mads Kaysen SupWizMads Kaysen SupWiz
Mads Kaysen SupWiz
 
Leif Howalt NNIT Service Support Center
Leif Howalt NNIT Service Support CenterLeif Howalt NNIT Service Support Center
Leif Howalt NNIT Service Support Center
 
Jan Neerbek NLP og Chatbots
Jan Neerbek NLP og ChatbotsJan Neerbek NLP og Chatbots
Jan Neerbek NLP og Chatbots
 
Anders Soegaard NLP for Customer Support
Anders Soegaard NLP for Customer SupportAnders Soegaard NLP for Customer Support
Anders Soegaard NLP for Customer Support
 
Stephen Alstrup infinit august 2018
Stephen Alstrup infinit august 2018Stephen Alstrup infinit august 2018
Stephen Alstrup infinit august 2018
 
Innovation og værdiskabelse i it-projekter
Innovation og værdiskabelse i it-projekterInnovation og værdiskabelse i it-projekter
Innovation og værdiskabelse i it-projekter
 
Rokoko infin it presentation
Rokoko infin it presentation Rokoko infin it presentation
Rokoko infin it presentation
 

Recently uploaded

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Recently uploaded (20)

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Intelligent Energy Usage via M2M Communication

  • 1. Intelligent Energy Usage via M2M Communication Short version Rune Torbensen rto@cfsi.dk PhD, Aalborg University Copenhagen, 9.Oct, 2012
  • 2. Outline PhD project work Home Automation Communication Cooperation Security M2M Project Ideas Conclusion References
  • 3. PhD project work Home Automation M2M Project Ideas Communication Conclusion Cooperation References Security Outline PhD project work Home Automation Communication Cooperation Security M2M Project Ideas Conclusion References 3 / 18
  • 4. PhD project work Home Automation M2M Project Ideas Communication Conclusion Cooperation References Security Current Home Automation Home automation has not become mainstream yet Few complete smart house installations ◮ Building automation in the residence ◮ Installed by experts ◮ Predominantly wired and centralized (control) ◮ Components are expensive and variety is limited ◮ No dominating standard in foreseeable future Subsystems are available ◮ Limited market share ◮ Islands of functionality ◮ Unable to interoperate with the outside 4 / 18
  • 5. PhD project work Home Automation M2M Project Ideas Communication Conclusion Cooperation References Security Future Home Automation All electronic devices in the residence can cooperate as services ◮ Consumers may easily compose a system out of products ◮ Easy to install and use ◮ Remote access for smartphone Many vendors, No lock-in ◮ Product-by-product purchasing ◮ Product variety ◮ Possibility to compete on price, quality and functionality Distributed control scheme ◮ Many small controllers ◮ Ad hoc discovery of services ◮ Sensors reused for many controllers (applications) 5 / 18
  • 6. PhD project work Home Automation M2M Project Ideas Communication Conclusion Cooperation References Security Communication Challenges Based on taxonomy of protocols for home networks Communication methods ◮ Control wires are costly to install in existing houses ◮ Power line is immature and unreliable due to noise ◮ Low-power Short Range Wireless (SRW) Focus on SRW technology ◮ Flexibility and refitting to existing buildings ◮ Well suited for battery powered devices ◮ Many useful but incompatible technologies ◮ Physical: bandwidth, frequencies, modulation, etc. ◮ Reliability problems due to wall penetration Full home coverage ◮ Multi-hop routing are immature solutions ◮ Repeaters are impractical and often unsupported (disruptive) 6 / 18
  • 7. PhD project work Home Automation M2M Project Ideas Communication Conclusion Cooperation References Security Interoperable Home Automation Platform An architecture to connect different networks into one heterogeneous network covering the whole residence ◮ Using IP as common protocol Heat Controller Light Controller Access Controller ◮ End-devices visible as IP devices IP Network ◮ Controllers on IP ◮ End-to-end communication Room Bridge Room Bridge ◮ Generic distributed Subnetwork Adapter Subnetwork Adapter Subnetwork Adapter Subnetwork Adapter communication infrastructure ZigBee Bluetooth ZWave Bluetooth ◮ IP room bridges Sensor Actuator Sensor Sensor ◮ Expandable via adapter modules Living room Bed room 7 / 18
  • 8. PhD project work Home Automation M2M Project Ideas Communication Conclusion Cooperation References Security Cooperation Challenge Based on market actor and technology analysis Many different applications, controllers, end-devices ◮ Number of applications growing over time (unbounded set) ◮ Incompatible service frameworks, message representation Standard applications, profiles are predominant ◮ Considerable time and cost to introduce new ideas ◮ Standardization delay ◮ Alliance memberships and licensing costs ◮ Limit designs and innovations A centralized, translator box is not a usable solution ◮ Hard to realize in a resource limited system ◮ Constitutes a gatekeeper ◮ Creates unwanted dependency between actors ◮ Inconsistent with concept of a generic infrastructure 8 / 18
  • 9. PhD project work Home Automation M2M Project Ideas Communication Conclusion Cooperation References Security Open Device Service Description Language Enable cooperation between unfamiliar devices End-devices in IHAP provide a service descriptor Service description language: ◮ Description of any design ◮ Existing devices and profiles ◮ Legacy support allows bootstrapping the market ◮ New designs avoids standardization delay ◮ Supports fast-to-market and innovation in SME Simple application protocols of home automation end-devices ◮ Get value or device state ◮ Send command with a parameter ◮ Listen for event 9 / 18
  • 10. PhD project work Home Automation M2M Project Ideas Communication Conclusion Cooperation References Security Security Challenges Motivations for security in embedded systems ◮ Devices control the environment ◮ Capture and share personal data Threats from wireless and Internet ◮ Disruption - system unable to send alarm ◮ Eavesdropping - undetectable passive data-mining ◮ Unauthorized access ◮ Opening of door locks and stealing personal data Security must be user friendly ◮ Users often misunderstand difficult operations ◮ Misconfiguration can breach security 10 / 18
  • 11. PhD project work Home Automation M2M Project Ideas Communication Conclusion Cooperation References Security Secure Embedded Exchange Protocol (SEEP) A secure end-to-end communication protocol SEEP design philosophy: ◮ Internet-grade security level ◮ Optimized for resource-constrained embedded platforms ◮ Low overhead, short messages, minimal network traffic ◮ Simple and therefore formally verifiable A formally verified alternative to SSL for embedded devices Not required but fully compatible with IHAP 11 / 18
  • 12. PhD project work M2M Project Ideas Conclusion References Outline PhD project work Home Automation Communication Cooperation Security M2M Project Ideas Conclusion References 12 / 18
  • 13. PhD project work M2M Project Ideas Conclusion References M2M Project Ideas Intelligent energy usage via M2M communication ◮ The motivation is energy usage optimization in buildings ◮ Reduce or move energy consumption Development of new M2M communication technology ◮ Connecting systems both locally and remotely via the Internet ◮ Enable ad-hoc resource sharing and signal exchange ◮ Report energy usage and errors ◮ Security and privacy by design 13 / 18
  • 14. PhD project work M2M Project Ideas Conclusion References Analysis and Requirements Energy usage optimization strategies ◮ Avoiding or postponing energy consumption, store energy ◮ User involved or automated via M2M communication ◮ Systems log information and provide overview ◮ Smartphone interface, website access ◮ Control systems communicate with utility company server ◮ Great variety of subsystems by many different vendors Technology requirements: ◮ Ad-hoc cooperation and resource sharing ◮ Retain autonomy of each system ◮ Heterogeneous network ◮ Internet access ◮ Secure communication 14 / 18
  • 15. PhD project work M2M Project Ideas Conclusion References Outline PhD project work Home Automation Communication Cooperation Security M2M Project Ideas Conclusion References 15 / 18
  • 16. PhD project work M2M Project Ideas Conclusion References Conclusion M2M communication technology ◮ Energy usage optimization in smaller buildings ◮ Embedded devices instead of server, lowers overall system cost ◮ Connecting heterogeneous environments to the Internet ◮ Existing products can connect without supporting IP ◮ Low entry barrier, low development cost for new vendors ◮ Cooperation is flexible, autonomy is retained ◮ Data sharing with privacy precautions ◮ Internet grade secure communication ◮ Usability, short setup time for installer/owner 16 / 18
  • 17. PhD project work M2M Project Ideas Conclusion References Outline PhD project work Home Automation Communication Cooperation Security M2M Project Ideas Conclusion References 17 / 18
  • 18. PhD project work M2M Project Ideas Conclusion References References Relevant published papers: Future home automation systems ◮ Rune Torbensen: ”OHAS: Open Home Automation System” IEEE, International Symposium on Consumer Electronics, Algarve, Portugal, 2008. Classification of wireless protocols ◮ Rune Torbensen, Klaus Marius Hansen and Theis Hjorth: ”My Home is my Bazaar - A Taxonomy and Classification of Current Wireless Home Network Protocols” IEEE, 2nd Eastern European Regional Conference on the Engineering of Computer Based Systems (ECBS-EERC), Bratislava, Slovakia, 2011. Secure embedded communication ◮ Theis Hjorth and Rune Torbensen: ”Secure Wireless Embedded Systems via Component-based Design” Proc. of the IEEE International Conference on Privacy, Security, Risk and Trust PASSAT 2010, Minneapolis, Minnesota, USA, Aug 2010. 18 / 18