The document discusses several key challenges for the Internet of Things (IoT), including a lack of interoperability between current proprietary vertical solutions, issues around easy deployment and plug-and-play functionality at scale, and security concerns over privacy and data protection with networked devices. It also outlines some approaches to addressing these challenges through open standards, distributed intelligence, and turning sensor data into meaningful knowledge through tagging and semantics.
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...DESMOND YUEN
Internet of Things (IoT) is an innovative paradigm
envisioned to provide massive applications that are now part of
our daily lives. Millions of smart devices are deployed within
complex networks to provide vibrant functionalities including
communications, monitoring, and controlling of critical infrastructures. However, this massive growth of IoT devices and the corresponding huge data traffic generated at the edge of the network created additional burdens on the state-of-the-art
centralized cloud computing paradigm due to the bandwidth and
resources scarcity. Hence, edge computing (EC) is emerging as
an innovative strategy that brings data processing and storage
near to the end users, leading to what is called EC-assisted IoT.
Although this paradigm provides unique features and enhanced
quality of service (QoS), it also introduces huge risks in data security and privacy aspects. This paper conducts a comprehensive survey on security and privacy issues in the context of EC-assisted IoT. In particular, we first present an overview of EC-assisted IoT including definitions, applications, architecture, advantages, and challenges. Second, we define security and privacy in the context of EC-assisted IoT. Then, we extensively discuss the major classifications of attacks in EC-assisted IoT and provide possible solutions and countermeasures along with the related research efforts. After that, we further classify some security and privacy issues as discussed in the literature based on security services and based on security objectives and functions. Finally, several open challenges and future research directions for secure EC-assisted IoT paradigm are also extensively provided.
Fog computing, also known as fogging/edge computing, it is a model in which data, processing and applications are concentrated in devices at the network edge rather than existing almost entirely in the cloud.
The term "Fog Computing" was introduced by the Cisco Systems .
Its extended from cloud
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...DESMOND YUEN
Internet of Things (IoT) is an innovative paradigm
envisioned to provide massive applications that are now part of
our daily lives. Millions of smart devices are deployed within
complex networks to provide vibrant functionalities including
communications, monitoring, and controlling of critical infrastructures. However, this massive growth of IoT devices and the corresponding huge data traffic generated at the edge of the network created additional burdens on the state-of-the-art
centralized cloud computing paradigm due to the bandwidth and
resources scarcity. Hence, edge computing (EC) is emerging as
an innovative strategy that brings data processing and storage
near to the end users, leading to what is called EC-assisted IoT.
Although this paradigm provides unique features and enhanced
quality of service (QoS), it also introduces huge risks in data security and privacy aspects. This paper conducts a comprehensive survey on security and privacy issues in the context of EC-assisted IoT. In particular, we first present an overview of EC-assisted IoT including definitions, applications, architecture, advantages, and challenges. Second, we define security and privacy in the context of EC-assisted IoT. Then, we extensively discuss the major classifications of attacks in EC-assisted IoT and provide possible solutions and countermeasures along with the related research efforts. After that, we further classify some security and privacy issues as discussed in the literature based on security services and based on security objectives and functions. Finally, several open challenges and future research directions for secure EC-assisted IoT paradigm are also extensively provided.
Fog computing, also known as fogging/edge computing, it is a model in which data, processing and applications are concentrated in devices at the network edge rather than existing almost entirely in the cloud.
The term "Fog Computing" was introduced by the Cisco Systems .
Its extended from cloud
Internet of Things is a global phenomenon and like any other such phenomenon requires a robust architecture for its happening. This presentation covers a web based architecture for IOT called Web of Things
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...CableLabs
As IoT insecurity creates vulnerabilities, policymakers become concerned about the health of the Internet. How can public policy address these concerns in a smart way, targeting their efforts to improve IoT security without imposing unnecessary costs across the Internet ecosystem or creating unintended effects? What is the role of government versus industry?
Gerald Faulhaber
Professor Emeritus, Business Economics & Public Policy, Wharton School
https://www.cablelabs.com/informed/
Living life on the edge - Thingmonk 2016 martinjgale
Presentation given at Thingmonk 2016 (13th September) on the importance of the edge of network in the Internet of Things in the context of industrial and manufacturing.
Presentation of the Mainflulux team held In Portland at Embedded Linux Conference & OpenIoT Summit North America March 14 2018.
IoT middleware platforms have become necessary building blocks of every complex vertical IoT solution. Traditionally, the platforms have been built to run in the cloud; wide availability and rich capabilities have driven the first wave of IoT adoption. As the scale and complexity of IoT projects have grown, however, the need to provide solutions that move to process to the network edge has also grown. Down-scaling cloud capabilities is complex in part because of the more modest capabilities of edge computing in typical deployment models. As a result, there are few open solutions that address this need.
We introduce Mainflux (https://github.com/Mainflux/mainflux) - a IoT Platform for cloud and edge that can simultaneously scale-out to hundreds of nodes in the cloud but can also scale down to a modest RaspberryPi computer without changing a single line of code. This scalability is achieved thanks to careful architecture, the effectiveness of the Go programming language, and technology choices used in the implementation.
We will discuss the platform, its use and application, and our work to bring core concepts from it to various open source projects including EdgeX.
Repository for Mainflux open source and royalty-free IoT platform published under Apache-2.0 license, free download https://github.com/mainflux/mainflux
Mainflux company official website: https://www.mainflux.com/
The Internet of Things (IoT) offers many industries significant new opportunities, but it also exposes them and their customers to a host of security issues. Securing the IoT requires new ways of thinking that can defend the enterprise and its customers against attackers and privacy abuses.
The Internet of Things arrived last decade when the number of devices (that can connect) outnumbered the world population. We have now entered a new age. The evolution from #virtualization to #cloud to #IoT and #BigData a consequence of the Moore Nielsen prediction and the rise of Fog Computing. The role of #OpenSource and #OpenStandards and the importance of the new trend: Open Data as the only way to keep sanity in Big Data. This is my presentation at the IEEE International Conference on Cloud Engineering in Boston on Pi Day 2014
Protecting IIoT Endpoints - an inside look at the Industrial Internet Securit...team-WIBU
An attack to an Industrial Internet of Things (IIoT) system typically starts with an attack on one or more endpoints.
As defined by the Industrial Internet Consortium (IIC), an endpoint is a component that has an interface for network communication and it can be of various types, including a device endpoint or an endpoint that provides cloud connectivity.
Endpoints are the only place in an IIoT system where execution code is stored, started and updated and data is stored, modified or applied. In many cases, an attacker will, therefore, try to access the execution code and attack the weakest point in the devices’ security implementation, then modify or replace the execution code with malicious intent.
The IIC has recently presented an endpoint protection/security model and policy in its Industry Internet Security Framework (IISF) document. The technical report is an in-depth cross-industry-focused security framework reflecting thousands of hours of knowledge and experiences from security experts, collected, researched and evaluated for the benefit of all IIoT system deployments.
IoT Security: Debunking the "We Aren't THAT Connected" MythSecurity Innovation
In a world where convenience is key, consumers are adopting every new connected device that hits the shelves - and doing so with the assumption that due diligence security has been considered. But recent IoT attacks suggest otherwise.
As organizations migrate from a primarily offline to online business model, they are failing to consider IoT’s unique threats which traditional solutions are unable to secure. As a result, steps must be taken to ensure that the device, connections and infrastructure are hardened, especially software which runs IoT devices and is the source of ~90% of attacks.
This webinar is ideal for risk, technology, and security professionals that want to understand why a hacker would want to attack their “harmless” IoT device and what the stealth risk to their organization and consumers is.
Topics covered include:
- IoT security – why it’s so different….and tough
- The IoT ecosystem and attack surface
- Managing liability - IoT risks to consumers and vendors
- Auditing IoT software development
This course provides an introduction in concepts, challenges, and recent developments around the IoT and M2M. The students will be exposed to the fundamental issues that arise in the operation, design and management of IoT networks.
Research proposal on Computing Security and Reliability - Phdassistance.comPhD Assistance
From introducing new international standards to having an important role to play in several industries, computer science is one of the powerful subjects right now. You cannot guess a single area that does not need computer systems or efficient networking options. Because Technology and Computer Science go together for any field.
Stating this, there are a few core subjects inside computer science that are unpredictable in its future use. One such case is with computing technologies.
Visite : https://www.phdassistance.com/blog/
Contact Us:
UK NO: +44-1143520021
India No: +91-8754446690
Email: info@phdassistance.com
Walking through the fog (computing) - Keynote talk at Italian Networking Work...FBK CREATE-NET
"Walking through the fog (computing): trends, use-cases and open issues"
Despite its huge success in many IT-enabled application scenarios, cloud computing has demonstrated some intrinsic limitations that may severely limit its adoption in several contexts where constraints like e.g. preserving data locally, ensuring real-time reactivity or guaranteeing operation continuity despite lack of Internet connectivity (or a combination of them) are mandatory. These distinguishing requirements fostered an increased interest toward computing approaches that inherit the flexibility and adaptability of the cloud paradigm, while acting in proximity of a specific scenario. As a consequence, the emergence of this “proximity computing” approach has exploded into a plethora of architectural solutions (and novel terms) like fog computing, edge computing, dew computing, mist computing but also cloudlets, mobile cloud computing, mobile edge computing (and probably few others I may not be aware of…). The talk will initially make an attempt to introduce some clarity among these “foggy” definitions by proposing a taxonomy whose aim is to help identifying their peculiarities as well as their overlaps. Afterwards, the most important components of a generalized proximity computing architecture will be explained, followed by the description of few research works and use cases investigated within our Center and based on this emerging paradigm. An overview of open issues and interesting research directions will conclude the talk.
Internet of Things is a global phenomenon and like any other such phenomenon requires a robust architecture for its happening. This presentation covers a web based architecture for IOT called Web of Things
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...CableLabs
As IoT insecurity creates vulnerabilities, policymakers become concerned about the health of the Internet. How can public policy address these concerns in a smart way, targeting their efforts to improve IoT security without imposing unnecessary costs across the Internet ecosystem or creating unintended effects? What is the role of government versus industry?
Gerald Faulhaber
Professor Emeritus, Business Economics & Public Policy, Wharton School
https://www.cablelabs.com/informed/
Living life on the edge - Thingmonk 2016 martinjgale
Presentation given at Thingmonk 2016 (13th September) on the importance of the edge of network in the Internet of Things in the context of industrial and manufacturing.
Presentation of the Mainflulux team held In Portland at Embedded Linux Conference & OpenIoT Summit North America March 14 2018.
IoT middleware platforms have become necessary building blocks of every complex vertical IoT solution. Traditionally, the platforms have been built to run in the cloud; wide availability and rich capabilities have driven the first wave of IoT adoption. As the scale and complexity of IoT projects have grown, however, the need to provide solutions that move to process to the network edge has also grown. Down-scaling cloud capabilities is complex in part because of the more modest capabilities of edge computing in typical deployment models. As a result, there are few open solutions that address this need.
We introduce Mainflux (https://github.com/Mainflux/mainflux) - a IoT Platform for cloud and edge that can simultaneously scale-out to hundreds of nodes in the cloud but can also scale down to a modest RaspberryPi computer without changing a single line of code. This scalability is achieved thanks to careful architecture, the effectiveness of the Go programming language, and technology choices used in the implementation.
We will discuss the platform, its use and application, and our work to bring core concepts from it to various open source projects including EdgeX.
Repository for Mainflux open source and royalty-free IoT platform published under Apache-2.0 license, free download https://github.com/mainflux/mainflux
Mainflux company official website: https://www.mainflux.com/
The Internet of Things (IoT) offers many industries significant new opportunities, but it also exposes them and their customers to a host of security issues. Securing the IoT requires new ways of thinking that can defend the enterprise and its customers against attackers and privacy abuses.
The Internet of Things arrived last decade when the number of devices (that can connect) outnumbered the world population. We have now entered a new age. The evolution from #virtualization to #cloud to #IoT and #BigData a consequence of the Moore Nielsen prediction and the rise of Fog Computing. The role of #OpenSource and #OpenStandards and the importance of the new trend: Open Data as the only way to keep sanity in Big Data. This is my presentation at the IEEE International Conference on Cloud Engineering in Boston on Pi Day 2014
Protecting IIoT Endpoints - an inside look at the Industrial Internet Securit...team-WIBU
An attack to an Industrial Internet of Things (IIoT) system typically starts with an attack on one or more endpoints.
As defined by the Industrial Internet Consortium (IIC), an endpoint is a component that has an interface for network communication and it can be of various types, including a device endpoint or an endpoint that provides cloud connectivity.
Endpoints are the only place in an IIoT system where execution code is stored, started and updated and data is stored, modified or applied. In many cases, an attacker will, therefore, try to access the execution code and attack the weakest point in the devices’ security implementation, then modify or replace the execution code with malicious intent.
The IIC has recently presented an endpoint protection/security model and policy in its Industry Internet Security Framework (IISF) document. The technical report is an in-depth cross-industry-focused security framework reflecting thousands of hours of knowledge and experiences from security experts, collected, researched and evaluated for the benefit of all IIoT system deployments.
IoT Security: Debunking the "We Aren't THAT Connected" MythSecurity Innovation
In a world where convenience is key, consumers are adopting every new connected device that hits the shelves - and doing so with the assumption that due diligence security has been considered. But recent IoT attacks suggest otherwise.
As organizations migrate from a primarily offline to online business model, they are failing to consider IoT’s unique threats which traditional solutions are unable to secure. As a result, steps must be taken to ensure that the device, connections and infrastructure are hardened, especially software which runs IoT devices and is the source of ~90% of attacks.
This webinar is ideal for risk, technology, and security professionals that want to understand why a hacker would want to attack their “harmless” IoT device and what the stealth risk to their organization and consumers is.
Topics covered include:
- IoT security – why it’s so different….and tough
- The IoT ecosystem and attack surface
- Managing liability - IoT risks to consumers and vendors
- Auditing IoT software development
This course provides an introduction in concepts, challenges, and recent developments around the IoT and M2M. The students will be exposed to the fundamental issues that arise in the operation, design and management of IoT networks.
Research proposal on Computing Security and Reliability - Phdassistance.comPhD Assistance
From introducing new international standards to having an important role to play in several industries, computer science is one of the powerful subjects right now. You cannot guess a single area that does not need computer systems or efficient networking options. Because Technology and Computer Science go together for any field.
Stating this, there are a few core subjects inside computer science that are unpredictable in its future use. One such case is with computing technologies.
Visite : https://www.phdassistance.com/blog/
Contact Us:
UK NO: +44-1143520021
India No: +91-8754446690
Email: info@phdassistance.com
Walking through the fog (computing) - Keynote talk at Italian Networking Work...FBK CREATE-NET
"Walking through the fog (computing): trends, use-cases and open issues"
Despite its huge success in many IT-enabled application scenarios, cloud computing has demonstrated some intrinsic limitations that may severely limit its adoption in several contexts where constraints like e.g. preserving data locally, ensuring real-time reactivity or guaranteeing operation continuity despite lack of Internet connectivity (or a combination of them) are mandatory. These distinguishing requirements fostered an increased interest toward computing approaches that inherit the flexibility and adaptability of the cloud paradigm, while acting in proximity of a specific scenario. As a consequence, the emergence of this “proximity computing” approach has exploded into a plethora of architectural solutions (and novel terms) like fog computing, edge computing, dew computing, mist computing but also cloudlets, mobile cloud computing, mobile edge computing (and probably few others I may not be aware of…). The talk will initially make an attempt to introduce some clarity among these “foggy” definitions by proposing a taxonomy whose aim is to help identifying their peculiarities as well as their overlaps. Afterwards, the most important components of a generalized proximity computing architecture will be explained, followed by the description of few research works and use cases investigated within our Center and based on this emerging paradigm. An overview of open issues and interesting research directions will conclude the talk.
Embedded computing is everywhere. It is in our car engines, refrigerators, and even in the singing greeting cards we send. With improvements in wireless technology, these systems are starting to talk with each other, and they are appearing in places like our shoes and wrists to monitor our athletic activity or health. This emerging Internet of Everything (IoE) has tremendous potential to improve our lives. But like any powerful technology, it also has a dark side: it will observe and implement many of our actions. Security in the IoE is likely to be even more critical than general Internet security. After reviewing some of the challenges in creating a secure IoE, Horowitz will describe a new research program at Stanford to address this issue.
Developing Interoperable Components for an Open IoT Foundation Eurotech
In this presentation Eurotech and Red Hat present Kapua, a modular cloud platform that provides management for Internet of Things (IoT) gateways and smart edge devices. It represents a key milestone towards the development of a truly open, end-to-end foundation for IoT and its ecosystem of partners and solutions. Kapua provides a core integration framework with services for device registry, data and device management, message routing, and applications.
5G and edge computing - CORAL perspectiveRichard Scott
Charles Turyagyenda from InterDigital Europe Ltd presented an overview of the opportunities and technical aspects of 5G edge computing at the first of Digital Catapult Centre Brighton's 5G workshops. These workshops were designed to raised awareness of the opportunities and features of 5G within small digital businesses, as well as identifying potential use cases to be take forward to be explored within the National 5G testbed for digital businesses in Brighton.
We are inviting small digital businesses to get in contact to discuss how they might exploit the 5G testbed. If you are interested in how you might do so please email digicatbrighton@wiredsussex.com
Cloud technology to ensure the protection of fundamental methods and use of i...SubmissionResearchpa
A comparative analysis of attacks carried out in cloud technologies, the main methods and methods of information protection, the possibilities of using hardware and software, and methods to combat threats when eliminating them, ensuring data protection were carried out by Mamarajabov Odil Elmurzayevich 2020. Cloud technology to ensure the protection of fundamental methods and use of information. International Journal on Integrated Education. 3, 10 (Oct. 2020), 313-315. DOI:https://doi.org/10.31149/ijie.v3i10.780 https://journals.researchparks.org/index.php/IJIE/article/view/780/750 https://journals.researchparks.org/index.php/IJIE/article/view/780
Internet of Things (IoT) plays a vital role in our
day to day life and normally used in our houses, in industry,
schools and in hospitals which implemented outside to manage
and control for taking report the changes in location prevent
from dangers and many more favorable things. Moreover all
other advantages can approach of big risks of privacy loss and
security issues. To protect the IoT devices, so many research
works have been measure to find those problems and locate a
best way to eradicate those risks or at least to reduce their effect
on the security and privacy requirement. Formation the concept
of device to device (D2D) communication technology, IoT plays
the information transfer from one end to another end as node of
interconnection. This paper examines the constraints and
security challenges posed by IoT connected devices and the
ability to connect, communicate with, and remotely manage an
incalculable number of networked, automated devices via the
Internet is becoming pervasive.
IoT is a green field of new business opportunities. The ran has started…..
Everyware Device Cloud (EDC) is a full set of Operational Technologies available also as a service, which represent the fastest way to start an IoT business.
You can connect a Device to Cloud in 15 minutes.
With EDC A typical IoT project would take 2 to 6 months to go live and the ROI is really fast
.
The Internet-of-Things (IoT) is a upcoming field which aims to provided any time, any place, anywhere connectivity by seamlessly integrating devices with solutions. In this presentation we have shared some of the real time product design challenges with IoT. The presentation was done in the Electronics Rocks conference held at NIMHANS convention center, Bengaluru, India
Industrial IoT Mayhem? Java IoT Gateways to the RescueEurotech
Industrial IoT comes with great expectations for operational efficiency, promising improved asset utilization and productivity gains. IIoT challenges include reliability, security, low maintenance, long lifecycle, and integration into heterogeneous and fragmented systems. This session proposes some architectural patterns that can be leveraged to overcome these challenges. It introduces, at the center of the solution, Java-powered IoT gateways and modular IoT application frameworks such as the open source Eclipse Kura. Incorporating a live demonstration, the presentation highlights some of the latest Eclipse Kura features such as a pluggable device model for fieldbus protocols, visual data flow, and connectivity across various IoT cloud service providers.
JavaOne 2016 - Presentation by Dave Woodard and Walt Bowers
VEDLIOT – Accelerated AIoT. Jens Hagemeyer. 2nd Workshop on Deep Learning for IoT (DL4IoT), co-located with HiPEAC 2023, Toulouse, France, January 2023
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
1. Challenges for the Internet of
Things
Jeroen Hoebeke,
www.ibcn.intec.ugent.be
Internet Based Communication
Networks and Services (IBCN)
Department of Information Technology
(INTEC)
Ghent University - iMinds
7/12/2014 1
3. Ingredients: Cloud-based IoT system
Source: white paper arm.com / freescale.com
Cloud
Big data
analytics
Connectivity: local + global (wireless)
Embedded,
low-power
Services/user
interactions
Security, trust…
5. TODAY
Manu-factoring
Health-care
…
Domain
specific
applica ons
Domain
specific
devices
Proprietary ver cal solu ons:
proprietary protocols &
…
technologies
Manu-factoring
Health-care
IP connectivity
…
Application enablement
Reconfigurable technologies
…
TOMORROW
Open standards
From closed vertical solutions to open horizontal solutions
Easy support of wide diversity of IoT applications
6. Example
Open standards for
constrained devices
CoAP IETF
UDP
6LoWPAN
802.15.4
92KB flash
8KB RAM
CoRE
IETF RPL
IETF 6LoWPAN
IEEE
Web of Things
/s/t 22.5°C
SERVER
CLIENT
200 OK
text/plain
22.5°C
GET /s/t
7. Example
Open standards for
constrained devices
CoAP IETF
UDP
6LoWPAN
802.15.4
92KB flash
8KB RAM
CoRE
IETF RPL
IETF 6LoWPAN
IEEE
/s/t 22.5°C
SERVER
CLIENT
200 OK
text/plain
22.5°C
GET /s/t
11. Security – privacy – data protection
Technological aspect:
security protocols exist / are being designed
• E.g. IETF is very active on security for constrained devices
• Open challenges: deal with limited capabilities, devices can
be lost/stolen/sold/have finite life, scale, across systems
Human/legal aspect
• Apply security solutions
(e.g. default router password)
• How to control your data
(e.g. Facebook data)
13. Turning data into knowledge
CoAP-enabled
sensors
Tagging + semantics
Reasoning on sensor
and other data
14. IoT – Human interactions
IoT: many constrained,
embedded devices
(sensors, actuators)
without (graphical) user
interface
Wearables
Interactive, embedded
screens with content
adapting to context
Facilitate IoT interactions through vision
Happy to be here and talk to you about the Internet of Things, one of the research domains iMinds is very active in.
As IoT is a multifaceted domain, this presentation mainly aims to give you a high-level introduction to the IoT and the role it can play for you or your company.
IoT has a lot of potential, but to make it happen several challenges need to be tackled
Functional view of Cloud-based system
Alternative systems:
Local systems: users directly interact with IoT devices
Mixed systems: direct + via Cloud
Brokerage solutions integrating various systems
Illustration of complex IoT landscape, listing companies that provide several of these ingredients.
Most solutions are vertical proprietary solutions
There is a clear lack of interoperability, which is a bottleneck for realizing the IoT
Open horizontal solutions:
Devices that can be used in different application domains using reconfigurable technologies
Connectivity using standards such as IP and web service technology
Application enablers in order to support any domain specific application
This is exactly what is happening within the IETF, where they are defining standards to connect constrained devices to the IP-based Internet and to easily integrate them with web services.
Another major challenge is the deployment and operation, taking into account the huge number of devices that will become part of the IoT
What you need is plug & play functionality, meaning
solutions to easily (automatically) deploy and configure large numbers of devices
smart components for self-management, self-diagnosis
communication solutions that remain robust at scale
On top of that, in order to handle the huge amounts of traffic, you need distributed intelligence.
traditionally: endpoint - network - server (cloud) -> all data to the cloud, assuming infinite bandwidth and no delay => will not be feasible anymore
IoE: distributed intelligence or Fog: take the intelligence from server/cloud down as close as possible where the data is generated (limited BW and CPU -> smaller pipe is needed)
Security is also a major challenge
On January 17, an article appeared that reported on a connected fridge being used for sending SPAM
You can imagine that, as more and more devices are being connected, security will become a bigger and bigger problem.
Spamming is relatively innocent, but it in the future it can be your door lock, your heating system, the power grid of a city, etc.
+ systems that were previously closed are being connected to the Internet (e.g. smart grid, control and automation systems): many of them have not been designed with security in mind (design from abuse point of view
There are two aspects to security:
First there is the technological aspect: many security protocols exists and e.g. The IETF is very active in designing protocols that are suited for constrained devices. However, there are still open challenges, for instance how to deal wil stolen, list, sold devices
Then there is also a human/legal aspect:
It is not because security is there, that it is being used in the correct way -> e.g. changing default router password
Next to this, there is also the privacy aspect: how to maintain control over your data. Facebook is a good example of how data can become (accidentally) too public
A final challenge I will briefly touch upon is how to turn data into knowledge
Here you see an example of an ongoing healthcare project, where sensor data is being tagged at the gateway. Next, the tagged data is sent to the Cloud, where it is mapped to a concept from an ontology. Next, the Cloud system is able to reason upon this data and the resulting knowledge can then be used in services.
Next to this, you also have other approaches. For instance, the open source Apache Storm system allows distributed processing of in real-time data streams. This framework is for instance used by Twitter. Apache Storm is a free and open source distributed realtime computation system. Storm makes it easy to reliably process unbounded streams of data, doing for realtime processing what Hadoop did for batch processing. Storm is simple, can be used with any programming language, and is a lot of fun to use!
Finally, I would also like to say something about human interactions with IoT devices.
The IoT will involve many constrained devices without graphical user interface. So there is really a need to facilitate IoT interactions through vision.
For example, wearable displays can be use to directly interaction with IoT devices.
Alternatively, interactive screens embedded in the environment can show IoT-related content, adapted to context, such as the presence of a particular user. For instance, if I am in the bathroom, I should not see the weight of my wife in the mirror (or at least my wife would not want me to see this)…
This brings me to the end of the talk. As IoT is a very broad domain, I have only touched the tip of the ice berg. Nevertheless, I hope I was able to give you some insights in what IoT is and what it can mean for you and your company…