Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Intenet of things

812 views

Published on

Published in: Technology
  • Be the first to comment

Intenet of things

  1. 1. Internet of Things Academic Year : 2009/2010
  2. 2. Imagine 2
  3. 3. OutlineIntroduction 1. What is Internet of Things ? 2. IoT components 3. IoT protocols 4. Security in the IoT 5. DemonstrationConclusion 3
  4. 4. Introduction 4
  5. 5. What is Internet of things?1. Network of objects .2. A system to identify any kind of object.3. From a network of interconnected computers to a network of interconnected objects 5
  6. 6. What is Internet of things?… from communicating people (Internet)... to communicating items … ... from 3-5 computers per person … ... to 10-25 communicating items per person … 6
  7. 7. Internet of ThingsCharacteristics  Pervasive  Ubiquitous  Emerging  Global 7
  8. 8. Internet of Things: pervasive… ubiquitous… Define: pervasive Define: ubiquitous Technology that will be all around us andtherefore “invisible” 8
  9. 9. IoT : emergingDefine: emerging 9
  10. 10. IoT : global 10
  11. 11. IoT: components 11
  12. 12. How to identify an object? : RFID example ProducerSupermarket Query process in ONS 12
  13. 13. IoT :IP BasedThanks to IP:• IP is versatile• IP is scalable Internet of Things• IP is ubiquitous 13
  14. 14. The layered IP architecture 14
  15. 15. IoT : Standard 1% of 802.11 power easier to embed, as easy to useIEEE 802.15.4 – The New IP Link 15
  16. 16. IoT : middleware system solution Application TCP/UDP 802.15.4 has a maximum frame size of 128 bytes. 6lowpan compresses the standard 48 bytes of the IPv6 and UDP IP/ICMP headers down to 6 bytes. Adaptation Layer 6LOWPANMAC layer& 802.15.4Physic layerThe position of 6LoWPAN in the network architecture 16
  17. 17. IoT network example 17
  18. 18. Challenges of LoWPAN 18
  19. 19. Security in the IoTWhat do we need?authentication of tags proof of origin ofproductsauthentication of readers … access control totag’s data/configurationencryption … privacysecure point to point connection – data integritysignatures by tags/objects … mobile readersand static tags 19
  20. 20. Demonstration 20
  21. 21. Conclusion 21
  22. 22. Thank you for yourattention !

×