SlideShare a Scribd company logo
Challenges for the Internet of 
Things 
Jeroen Hoebeke, 
www.ibcn.intec.ugent.be 
Internet Based Communication 
Networks and Services (IBCN) 
Department of Information Technology 
(INTEC) 
Ghent University - iMinds 
7/12/2014 1
MAKING IoT HAPPEN 
Key challenges (- enablers)
Ingredients: Cloud-based IoT system 
Source: white paper arm.com / freescale.com 
Cloud 
Big data 
analytics 
Connectivity: local + global (wireless) 
Embedded, 
low-power 
Services/user 
interactions 
Security, trust…
Interoperability?
TODAY 
Manu-factoring 
Health-care 
… 
Domain	 
specific 
	 
applica ons	 
Domain	 
specific 
devices	 
Proprietary	ver cal	solu ons:	 
proprietary	protocols	&	 
…	 
technologies		 
Manu-factoring 
Health-care 
IP connectivity 
… 
Application enablement 
Reconfigurable technologies 
…	 
TOMORROW 
Open standards 
From closed vertical solutions to open horizontal solutions 
Easy support of wide diversity of IoT applications
Example 
Open standards for 
constrained devices 
CoAP IETF 
UDP 
6LoWPAN 
802.15.4 
92KB flash 
8KB RAM 
CoRE 
IETF RPL 
IETF 6LoWPAN 
IEEE 
Web of Things 
/s/t 22.5°C 
SERVER 
CLIENT 
200 OK 
text/plain 
22.5°C 
GET /s/t
Example 
Open standards for 
constrained devices 
CoAP IETF 
UDP 
6LoWPAN 
802.15.4 
92KB flash 
8KB RAM 
CoRE 
IETF RPL 
IETF 6LoWPAN 
IEEE 
/s/t 22.5°C 
SERVER 
CLIENT 
200 OK 
text/plain 
22.5°C 
GET /s/t
50 
Billion 
“Smart Objects” 50 
Inflection 
point 
6.8 7.2 7.6 
Rapid Adoption 
rate of digital 
infrastructure: 
5X faster than 
electricity and 
telephony 
World 
Population 
2010 2015 2020 
40 
30 
20 
10 
0 
Billions of Devices 
25 
12.5 
Timeline 
©	2013	Cisco	and/or	its	affiliates.	All	rights	reserved.	 
©	2013	Cisco	and/or	its	affiliates.	All	rights	reserved.	 
Deployment & 
operation? 
Plug & play 
•Easy deployment (auto-configuration, assisted using e.g. wearable 
technologies…) 
•Self-management, self-diagnostics 
•Robustness at scale (e.g. reliable wireless connectivity) 
Distributed intelligence to handle huge amounts of traffic
Distributed intelligence 
Traditional Computing Model 
Infinite,bandwidth, 
0 delay 
© 2013 Cisco and/or its affiliates. All rights reserved. 
IoE Computing Model 
Datacenter/Cloud 
Assumes limited bandwidth, 
variable delay, and 
intermittent connectivity 
Fog 
Assumes limited bandwidth, 
variable delay, and intermittent 
connectivity 
Device 
Datacenter/Cloud 
Endpoint
Security
Security – privacy – data protection 
Technological aspect: 
security protocols exist / are being designed 
• E.g. IETF is very active on security for constrained devices 
• Open challenges: deal with limited capabilities, devices can 
be lost/stolen/sold/have finite life, scale, across systems 
Human/legal aspect 
• Apply security solutions 
(e.g. default router password) 
• How to control your data 
(e.g. Facebook data)
From data to 
knowledge
Turning data into knowledge 
CoAP-enabled 
sensors 
Tagging + semantics 
Reasoning on sensor 
and other data
IoT – Human interactions 
IoT: many constrained, 
embedded devices 
(sensors, actuators) 
without (graphical) user 
interface 
Wearables 
Interactive, embedded 
screens with content 
adapting to context 
Facilitate IoT interactions through vision
?
Jeroen Hoebeke 
jeroen.hoebeke@intec.ugent.be 
www.ibcn.intec.ugent.be 
www.iminds.be 
Join iMinds

More Related Content

What's hot

Slideshared 27-3-2015- iucee- iot- webinar
Slideshared 27-3-2015- iucee- iot- webinarSlideshared 27-3-2015- iucee- iot- webinar
Slideshared 27-3-2015- iucee- iot- webinar
Ravindra Dastikop
 
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
CableLabs
 
Secure context-awareness in ubiquitous computing
Secure context-awareness in ubiquitous computingSecure context-awareness in ubiquitous computing
Secure context-awareness in ubiquitous computing
Ville Seppänen
 
Living life on the edge - Thingmonk 2016
Living life on the edge - Thingmonk 2016 Living life on the edge - Thingmonk 2016
Living life on the edge - Thingmonk 2016
martinjgale
 
Cloud of things (IoT + Cloud Computing)
Cloud of things (IoT + Cloud Computing)Cloud of things (IoT + Cloud Computing)
Cloud of things (IoT + Cloud Computing)
Zakaria Hossain
 
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoTINTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
Muhammad Ahad
 
Mainflux - Hyperscalable Unified IoT Platform
Mainflux - Hyperscalable Unified IoT PlatformMainflux - Hyperscalable Unified IoT Platform
Mainflux - Hyperscalable Unified IoT Platform
Sasa Klopanovic
 
Progress towards security in the Cloud-Héctor Sánchez, Microsoft
Progress towards security in the Cloud-Héctor Sánchez, MicrosoftProgress towards security in the Cloud-Héctor Sánchez, Microsoft
Progress towards security in the Cloud-Héctor Sánchez, MicrosoftMind the Byte
 
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"
Ahmed Mohamed Mahmoud
 
Michael Enescu - Cloud + IoT at IEEE
Michael Enescu - Cloud + IoT at IEEEMichael Enescu - Cloud + IoT at IEEE
Michael Enescu - Cloud + IoT at IEEE
Michael Enescu
 
Protecting IIoT Endpoints - an inside look at the Industrial Internet Securit...
Protecting IIoT Endpoints - an inside look at the Industrial Internet Securit...Protecting IIoT Endpoints - an inside look at the Industrial Internet Securit...
Protecting IIoT Endpoints - an inside look at the Industrial Internet Securit...
team-WIBU
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
Security Innovation
 
Internet of Things @ Purdue University
Internet of Things @ Purdue UniversityInternet of Things @ Purdue University
Internet of Things @ Purdue University
Ioannis Papapanagiotou
 
Sport && Wellness Hackathon
Sport && Wellness  HackathonSport && Wellness  Hackathon
Sport && Wellness Hackathon
NECST Lab @ Politecnico di Milano
 
Internet of Things (IoT): Readme
Internet of Things (IoT): ReadmeInternet of Things (IoT): Readme
Internet of Things (IoT): Readme
Istabraq M. Al-Joboury
 
Iot security problems and solutions
Iot security problems and solutionsIot security problems and solutions
Iot security problems and solutions
Purvesh kachhiya
 
Internet of things security challenges
Internet of things security challengesInternet of things security challenges
Internet of things security challenges
Hadi Fadlallah
 
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs FilatovsDSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
Andris Soroka
 
Toward a global data infrastructure
Toward a global data infrastructureToward a global data infrastructure
Toward a global data infrastructure
ieeechennai
 
Research proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.comResearch proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.com
PhD Assistance
 

What's hot (20)

Slideshared 27-3-2015- iucee- iot- webinar
Slideshared 27-3-2015- iucee- iot- webinarSlideshared 27-3-2015- iucee- iot- webinar
Slideshared 27-3-2015- iucee- iot- webinar
 
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
 
Secure context-awareness in ubiquitous computing
Secure context-awareness in ubiquitous computingSecure context-awareness in ubiquitous computing
Secure context-awareness in ubiquitous computing
 
Living life on the edge - Thingmonk 2016
Living life on the edge - Thingmonk 2016 Living life on the edge - Thingmonk 2016
Living life on the edge - Thingmonk 2016
 
Cloud of things (IoT + Cloud Computing)
Cloud of things (IoT + Cloud Computing)Cloud of things (IoT + Cloud Computing)
Cloud of things (IoT + Cloud Computing)
 
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoTINTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
 
Mainflux - Hyperscalable Unified IoT Platform
Mainflux - Hyperscalable Unified IoT PlatformMainflux - Hyperscalable Unified IoT Platform
Mainflux - Hyperscalable Unified IoT Platform
 
Progress towards security in the Cloud-Héctor Sánchez, Microsoft
Progress towards security in the Cloud-Héctor Sánchez, MicrosoftProgress towards security in the Cloud-Héctor Sánchez, Microsoft
Progress towards security in the Cloud-Héctor Sánchez, Microsoft
 
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"
 
Michael Enescu - Cloud + IoT at IEEE
Michael Enescu - Cloud + IoT at IEEEMichael Enescu - Cloud + IoT at IEEE
Michael Enescu - Cloud + IoT at IEEE
 
Protecting IIoT Endpoints - an inside look at the Industrial Internet Securit...
Protecting IIoT Endpoints - an inside look at the Industrial Internet Securit...Protecting IIoT Endpoints - an inside look at the Industrial Internet Securit...
Protecting IIoT Endpoints - an inside look at the Industrial Internet Securit...
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
 
Internet of Things @ Purdue University
Internet of Things @ Purdue UniversityInternet of Things @ Purdue University
Internet of Things @ Purdue University
 
Sport && Wellness Hackathon
Sport && Wellness  HackathonSport && Wellness  Hackathon
Sport && Wellness Hackathon
 
Internet of Things (IoT): Readme
Internet of Things (IoT): ReadmeInternet of Things (IoT): Readme
Internet of Things (IoT): Readme
 
Iot security problems and solutions
Iot security problems and solutionsIot security problems and solutions
Iot security problems and solutions
 
Internet of things security challenges
Internet of things security challengesInternet of things security challenges
Internet of things security challenges
 
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs FilatovsDSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
 
Toward a global data infrastructure
Toward a global data infrastructureToward a global data infrastructure
Toward a global data infrastructure
 
Research proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.comResearch proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.com
 

Similar to Challenges of the io t v1

What is the internet of things v3
What is the internet of things v3What is the internet of things v3
What is the internet of things v3
Incubation & Industry
 
Walking through the fog (computing) - Keynote talk at Italian Networking Work...
Walking through the fog (computing) - Keynote talk at Italian Networking Work...Walking through the fog (computing) - Keynote talk at Italian Networking Work...
Walking through the fog (computing) - Keynote talk at Italian Networking Work...
FBK CREATE-NET
 
Introduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant KrishnaIntroduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant Krishna
CodeOps Technologies LLP
 
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsMark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Stanford School of Engineering
 
Dynamic Software Defined Network Infrastructure Test Bed at Marist College
Dynamic Software Defined Network Infrastructure Test Bed at Marist CollegeDynamic Software Defined Network Infrastructure Test Bed at Marist College
Dynamic Software Defined Network Infrastructure Test Bed at Marist College
ADVA
 
Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation
Eurotech
 
5G and edge computing - CORAL perspective
5G and edge computing - CORAL perspective5G and edge computing - CORAL perspective
5G and edge computing - CORAL perspective
Richard Scott
 
Devising a practical approach to the Internet of Things
Devising a practical approach to the Internet of ThingsDevising a practical approach to the Internet of Things
Devising a practical approach to the Internet of ThingsGordon Haff
 
Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...
SubmissionResearchpa
 
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
IJCSIS Research Publications
 
Internet of things chapter2.pdf
Internet of things chapter2.pdfInternet of things chapter2.pdf
Internet of things chapter2.pdf
Rupesh930637
 
Hac IT 4. Emerging Technologies (1).pdf
Hac IT 4. Emerging Technologies  (1).pdfHac IT 4. Emerging Technologies  (1).pdf
Hac IT 4. Emerging Technologies (1).pdf
AAFREEN SHAIKH
 
How to bootstrap your IoT project
How to bootstrap  your IoT projectHow to bootstrap  your IoT project
How to bootstrap your IoT project
Eurotech
 
Design challenges in IoT
Design challenges in IoT Design challenges in IoT
Design challenges in IoT
Emertxe Information Technologies Pvt Ltd
 
Industrial IoT Mayhem? Java IoT Gateways to the Rescue
Industrial IoT Mayhem? Java IoT Gateways to the RescueIndustrial IoT Mayhem? Java IoT Gateways to the Rescue
Industrial IoT Mayhem? Java IoT Gateways to the Rescue
Eurotech
 
Eurotech and Red Hat collaboration simplifies Internet of Things integration ...
Eurotech and Red Hat collaboration simplifies Internet of Things integration ...Eurotech and Red Hat collaboration simplifies Internet of Things integration ...
Eurotech and Red Hat collaboration simplifies Internet of Things integration ...
Eurotech
 
ASDF WSS 2014 Keynote Speech 1
ASDF WSS 2014 Keynote Speech 1ASDF WSS 2014 Keynote Speech 1
connecting smart object in IoT.pptx
connecting smart object in IoT.pptxconnecting smart object in IoT.pptx
connecting smart object in IoT.pptx
AnisZahirahAzman
 
HiPEAC2023-DL4IoT Workshop_Jean Hagemeyer presentation
HiPEAC2023-DL4IoT Workshop_Jean Hagemeyer presentationHiPEAC2023-DL4IoT Workshop_Jean Hagemeyer presentation
HiPEAC2023-DL4IoT Workshop_Jean Hagemeyer presentation
VEDLIoT Project
 
Lab introduction
Lab introductionLab introduction
Lab introduction
frankding2005
 

Similar to Challenges of the io t v1 (20)

What is the internet of things v3
What is the internet of things v3What is the internet of things v3
What is the internet of things v3
 
Walking through the fog (computing) - Keynote talk at Italian Networking Work...
Walking through the fog (computing) - Keynote talk at Italian Networking Work...Walking through the fog (computing) - Keynote talk at Italian Networking Work...
Walking through the fog (computing) - Keynote talk at Italian Networking Work...
 
Introduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant KrishnaIntroduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant Krishna
 
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsMark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
 
Dynamic Software Defined Network Infrastructure Test Bed at Marist College
Dynamic Software Defined Network Infrastructure Test Bed at Marist CollegeDynamic Software Defined Network Infrastructure Test Bed at Marist College
Dynamic Software Defined Network Infrastructure Test Bed at Marist College
 
Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation
 
5G and edge computing - CORAL perspective
5G and edge computing - CORAL perspective5G and edge computing - CORAL perspective
5G and edge computing - CORAL perspective
 
Devising a practical approach to the Internet of Things
Devising a practical approach to the Internet of ThingsDevising a practical approach to the Internet of Things
Devising a practical approach to the Internet of Things
 
Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...
 
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
 
Internet of things chapter2.pdf
Internet of things chapter2.pdfInternet of things chapter2.pdf
Internet of things chapter2.pdf
 
Hac IT 4. Emerging Technologies (1).pdf
Hac IT 4. Emerging Technologies  (1).pdfHac IT 4. Emerging Technologies  (1).pdf
Hac IT 4. Emerging Technologies (1).pdf
 
How to bootstrap your IoT project
How to bootstrap  your IoT projectHow to bootstrap  your IoT project
How to bootstrap your IoT project
 
Design challenges in IoT
Design challenges in IoT Design challenges in IoT
Design challenges in IoT
 
Industrial IoT Mayhem? Java IoT Gateways to the Rescue
Industrial IoT Mayhem? Java IoT Gateways to the RescueIndustrial IoT Mayhem? Java IoT Gateways to the Rescue
Industrial IoT Mayhem? Java IoT Gateways to the Rescue
 
Eurotech and Red Hat collaboration simplifies Internet of Things integration ...
Eurotech and Red Hat collaboration simplifies Internet of Things integration ...Eurotech and Red Hat collaboration simplifies Internet of Things integration ...
Eurotech and Red Hat collaboration simplifies Internet of Things integration ...
 
ASDF WSS 2014 Keynote Speech 1
ASDF WSS 2014 Keynote Speech 1ASDF WSS 2014 Keynote Speech 1
ASDF WSS 2014 Keynote Speech 1
 
connecting smart object in IoT.pptx
connecting smart object in IoT.pptxconnecting smart object in IoT.pptx
connecting smart object in IoT.pptx
 
HiPEAC2023-DL4IoT Workshop_Jean Hagemeyer presentation
HiPEAC2023-DL4IoT Workshop_Jean Hagemeyer presentationHiPEAC2023-DL4IoT Workshop_Jean Hagemeyer presentation
HiPEAC2023-DL4IoT Workshop_Jean Hagemeyer presentation
 
Lab introduction
Lab introductionLab introduction
Lab introduction
 

More from Incubation & Industry

Business model theory part 2
Business model theory part 2Business model theory part 2
Business model theory part 2
Incubation & Industry
 
Business model theory part 1
Business model theory part 1Business model theory part 1
Business model theory part 1
Incubation & Industry
 
Market segmentation Target Market - Workbook
 Market segmentation Target Market - Workbook Market segmentation Target Market - Workbook
Market segmentation Target Market - Workbook
Incubation & Industry
 
Target segmentation theory
Target segmentation   theoryTarget segmentation   theory
Target segmentation theory
Incubation & Industry
 
The value proposition builder workbook
The value proposition builder workbookThe value proposition builder workbook
The value proposition builder workbook
Incubation & Industry
 
The value proposition builder
The value proposition builderThe value proposition builder
The value proposition builder
Incubation & Industry
 
Growth engine istart-june-2016
Growth engine istart-june-2016Growth engine istart-june-2016
Growth engine istart-june-2016
Incubation & Industry
 
9 things I learned at the 2016 Coursera Conference
9 things I learned at the 2016 Coursera Conference9 things I learned at the 2016 Coursera Conference
9 things I learned at the 2016 Coursera Conference
Incubation & Industry
 
Science com in a formula
Science com in a formulaScience com in a formula
Science com in a formula
Incubation & Industry
 
Intro to scientific presentations 2010
Intro to scientific presentations 2010Intro to scientific presentations 2010
Intro to scientific presentations 2010
Incubation & Industry
 
Guide to succeding in iot v1
Guide to succeding in iot v1Guide to succeding in iot v1
Guide to succeding in iot v1
Incubation & Industry
 
Emergence of io t
Emergence of io tEmergence of io t
Emergence of io t
Incubation & Industry
 
Do’s and don’ts of presenting research
Do’s and don’ts of presenting researchDo’s and don’ts of presenting research
Do’s and don’ts of presenting research
Incubation & Industry
 
Presentation about Presentations
Presentation about PresentationsPresentation about Presentations
Presentation about Presentations
Incubation & Industry
 
Intro the starting point
Intro  the starting pointIntro  the starting point
Intro the starting point
Incubation & Industry
 
Value Proposition Designer - eXia case
Value Proposition Designer - eXia caseValue Proposition Designer - eXia case
Value Proposition Designer - eXia caseIncubation & Industry
 

More from Incubation & Industry (20)

Business model theory part 2
Business model theory part 2Business model theory part 2
Business model theory part 2
 
Business model theory part 1
Business model theory part 1Business model theory part 1
Business model theory part 1
 
Market segmentation Target Market - Workbook
 Market segmentation Target Market - Workbook Market segmentation Target Market - Workbook
Market segmentation Target Market - Workbook
 
Target segmentation theory
Target segmentation   theoryTarget segmentation   theory
Target segmentation theory
 
The value proposition builder workbook
The value proposition builder workbookThe value proposition builder workbook
The value proposition builder workbook
 
The value proposition builder
The value proposition builderThe value proposition builder
The value proposition builder
 
Growth engine istart-june-2016
Growth engine istart-june-2016Growth engine istart-june-2016
Growth engine istart-june-2016
 
9 things I learned at the 2016 Coursera Conference
9 things I learned at the 2016 Coursera Conference9 things I learned at the 2016 Coursera Conference
9 things I learned at the 2016 Coursera Conference
 
Science com in a formula
Science com in a formulaScience com in a formula
Science com in a formula
 
Intro to scientific presentations 2010
Intro to scientific presentations 2010Intro to scientific presentations 2010
Intro to scientific presentations 2010
 
Guide to succeding in iot v1
Guide to succeding in iot v1Guide to succeding in iot v1
Guide to succeding in iot v1
 
Domains of io t v1
Domains of io t v1Domains of io t v1
Domains of io t v1
 
Emergence of io t
Emergence of io tEmergence of io t
Emergence of io t
 
Do’s and don’ts of presenting research
Do’s and don’ts of presenting researchDo’s and don’ts of presenting research
Do’s and don’ts of presenting research
 
Presentation about Presentations
Presentation about PresentationsPresentation about Presentations
Presentation about Presentations
 
News story template
News story templateNews story template
News story template
 
Example news story
Example news storyExample news story
Example news story
 
Intro the starting point
Intro  the starting pointIntro  the starting point
Intro the starting point
 
ORW introduction and welcome
ORW introduction and welcomeORW introduction and welcome
ORW introduction and welcome
 
Value Proposition Designer - eXia case
Value Proposition Designer - eXia caseValue Proposition Designer - eXia case
Value Proposition Designer - eXia case
 

Recently uploaded

BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
VivekSinghShekhawat2
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 

Recently uploaded (20)

BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 

Challenges of the io t v1

  • 1. Challenges for the Internet of Things Jeroen Hoebeke, www.ibcn.intec.ugent.be Internet Based Communication Networks and Services (IBCN) Department of Information Technology (INTEC) Ghent University - iMinds 7/12/2014 1
  • 2. MAKING IoT HAPPEN Key challenges (- enablers)
  • 3. Ingredients: Cloud-based IoT system Source: white paper arm.com / freescale.com Cloud Big data analytics Connectivity: local + global (wireless) Embedded, low-power Services/user interactions Security, trust…
  • 5. TODAY Manu-factoring Health-care … Domain specific applica ons Domain specific devices Proprietary ver cal solu ons: proprietary protocols & … technologies Manu-factoring Health-care IP connectivity … Application enablement Reconfigurable technologies … TOMORROW Open standards From closed vertical solutions to open horizontal solutions Easy support of wide diversity of IoT applications
  • 6. Example Open standards for constrained devices CoAP IETF UDP 6LoWPAN 802.15.4 92KB flash 8KB RAM CoRE IETF RPL IETF 6LoWPAN IEEE Web of Things /s/t 22.5°C SERVER CLIENT 200 OK text/plain 22.5°C GET /s/t
  • 7. Example Open standards for constrained devices CoAP IETF UDP 6LoWPAN 802.15.4 92KB flash 8KB RAM CoRE IETF RPL IETF 6LoWPAN IEEE /s/t 22.5°C SERVER CLIENT 200 OK text/plain 22.5°C GET /s/t
  • 8. 50 Billion “Smart Objects” 50 Inflection point 6.8 7.2 7.6 Rapid Adoption rate of digital infrastructure: 5X faster than electricity and telephony World Population 2010 2015 2020 40 30 20 10 0 Billions of Devices 25 12.5 Timeline © 2013 Cisco and/or its affiliates. All rights reserved. © 2013 Cisco and/or its affiliates. All rights reserved. Deployment & operation? Plug & play •Easy deployment (auto-configuration, assisted using e.g. wearable technologies…) •Self-management, self-diagnostics •Robustness at scale (e.g. reliable wireless connectivity) Distributed intelligence to handle huge amounts of traffic
  • 9. Distributed intelligence Traditional Computing Model Infinite,bandwidth, 0 delay © 2013 Cisco and/or its affiliates. All rights reserved. IoE Computing Model Datacenter/Cloud Assumes limited bandwidth, variable delay, and intermittent connectivity Fog Assumes limited bandwidth, variable delay, and intermittent connectivity Device Datacenter/Cloud Endpoint
  • 11. Security – privacy – data protection Technological aspect: security protocols exist / are being designed • E.g. IETF is very active on security for constrained devices • Open challenges: deal with limited capabilities, devices can be lost/stolen/sold/have finite life, scale, across systems Human/legal aspect • Apply security solutions (e.g. default router password) • How to control your data (e.g. Facebook data)
  • 12. From data to knowledge
  • 13. Turning data into knowledge CoAP-enabled sensors Tagging + semantics Reasoning on sensor and other data
  • 14. IoT – Human interactions IoT: many constrained, embedded devices (sensors, actuators) without (graphical) user interface Wearables Interactive, embedded screens with content adapting to context Facilitate IoT interactions through vision
  • 15. ?
  • 16. Jeroen Hoebeke jeroen.hoebeke@intec.ugent.be www.ibcn.intec.ugent.be www.iminds.be Join iMinds

Editor's Notes

  1. Happy to be here and talk to you about the Internet of Things, one of the research domains iMinds is very active in. As IoT is a multifaceted domain, this presentation mainly aims to give you a high-level introduction to the IoT and the role it can play for you or your company.
  2. IoT has a lot of potential, but to make it happen several challenges need to be tackled
  3. Functional view of Cloud-based system Alternative systems: Local systems: users directly interact with IoT devices Mixed systems: direct + via Cloud Brokerage solutions integrating various systems
  4. Illustration of complex IoT landscape, listing companies that provide several of these ingredients. Most solutions are vertical proprietary solutions There is a clear lack of interoperability, which is a bottleneck for realizing the IoT
  5. Open horizontal solutions: Devices that can be used in different application domains using reconfigurable technologies Connectivity using standards such as IP and web service technology Application enablers in order to support any domain specific application
  6. This is exactly what is happening within the IETF, where they are defining standards to connect constrained devices to the IP-based Internet and to easily integrate them with web services.
  7. Another major challenge is the deployment and operation, taking into account the huge number of devices that will become part of the IoT What you need is plug & play functionality, meaning solutions to easily (automatically) deploy and configure large numbers of devices smart components for self-management, self-diagnosis communication solutions that remain robust at scale On top of that, in order to handle the huge amounts of traffic, you need distributed intelligence.
  8. traditionally: endpoint - network - server (cloud) -> all data to the cloud, assuming infinite bandwidth and no delay => will not be feasible anymore IoE: distributed intelligence or Fog: take the intelligence from server/cloud down as close as possible where the data is generated (limited BW and CPU -> smaller pipe is needed)
  9. Security is also a major challenge On January 17, an article appeared that reported on a connected fridge being used for sending SPAM You can imagine that, as more and more devices are being connected, security will become a bigger and bigger problem. Spamming is relatively innocent, but it in the future it can be your door lock, your heating system, the power grid of a city, etc. + systems that were previously closed are being connected to the Internet (e.g. smart grid, control and automation systems): many of them have not been designed with security in mind (design from abuse point of view
  10. There are two aspects to security: First there is the technological aspect: many security protocols exists and e.g. The IETF is very active in designing protocols that are suited for constrained devices. However, there are still open challenges, for instance how to deal wil stolen, list, sold devices Then there is also a human/legal aspect: It is not because security is there, that it is being used in the correct way -> e.g. changing default router password Next to this, there is also the privacy aspect: how to maintain control over your data. Facebook is a good example of how data can become (accidentally) too public
  11. A final challenge I will briefly touch upon is how to turn data into knowledge
  12. Here you see an example of an ongoing healthcare project, where sensor data is being tagged at the gateway. Next, the tagged data is sent to the Cloud, where it is mapped to a concept from an ontology. Next, the Cloud system is able to reason upon this data and the resulting knowledge can then be used in services. Next to this, you also have other approaches. For instance, the open source Apache Storm system allows distributed processing of in real-time data streams. This framework is for instance used by Twitter. Apache Storm is a free and open source distributed realtime computation system. Storm makes it easy to reliably process unbounded streams of data, doing for realtime processing what Hadoop did for batch processing. Storm is simple, can be used with any programming language, and is a lot of fun to use!
  13. Finally, I would also like to say something about human interactions with IoT devices. The IoT will involve many constrained devices without graphical user interface. So there is really a need to facilitate IoT interactions through vision. For example, wearable displays can be use to directly interaction with IoT devices. Alternatively, interactive screens embedded in the environment can show IoT-related content, adapted to context, such as the presence of a particular user. For instance, if I am in the bathroom, I should not see the weight of my wife in the mirror (or at least my wife would not want me to see this)…
  14. This brings me to the end of the talk. As IoT is a very broad domain, I have only touched the tip of the ice berg. Nevertheless, I hope I was able to give you some insights in what IoT is and what it can mean for you and your company…