This document discusses Internet of Things (IoT) standards and provides information on the following:
1) It lists several standards bodies that are working on IoT standards, including ITU, IEEE, IETF, NIST and more.
2) It describes the key functional layers of an IoT solution including the asset layer, resource layer, communication layer, and more.
3) It provides an overview of common IoT applications like smart cities, smart homes, healthcare, transportation and more.
4) It discusses important IoT topics like data management, security, device management and functional reference models from ETSI and ITU.
Internet of Things with Cloud Computing and M2M CommunicationSherin C Abraham
The IoT is the network of physical objects with intelligence. It can be more secure with MQTT protocol for Machine to Machine Communication and more storage capability can be achieved by using cloud computing.
Internet of Things, Cloud and Big Data.
The role of M2M.
Good Reasons for IoT Solutions
Businesses and Organizations are looking for efficiency, agility, ability to scale,new business opportunities and improving product and services.
Internet of Things with Cloud Computing and M2M CommunicationSherin C Abraham
The IoT is the network of physical objects with intelligence. It can be more secure with MQTT protocol for Machine to Machine Communication and more storage capability can be achieved by using cloud computing.
Internet of Things, Cloud and Big Data.
The role of M2M.
Good Reasons for IoT Solutions
Businesses and Organizations are looking for efficiency, agility, ability to scale,new business opportunities and improving product and services.
Internet of things architecture perspective - IndicThreads ConferenceIndicThreads
Internet of Things is gaining unprecedented amount of traction across the globe. And the large organizations are making huge investments on IoT, which is going to change the shape of the 'Connected World'. Hence, it becomes necessarily important to understand the components, technologies and their interaction in the world of IoT.
The session would cover the Introduction of IoT, its components, the forces that have brought the ecosystem to mainstream and its adoption across industries. Then along with the Reference Architecture, I would discuss a few of industry implementations in IOT area with reference to the architecture. Next would be a comparative analysis of various IOT platforms available in the market and their architectures. And finally I would take up the challenges in making IOT as pervasive as it is believed to be.
A key take away would be the architectural appreciation of IOT landscape. As of now, any and every player in the market has begun to advertise their product as an IOT platform but a comprehensive review of fundamental design and architecture would bring this plethora of products (including open source ones) in the right purview. And that's the objective of this talk.
Session at the IndicThreads.com Confence held in Pune, India on 27-28 Feb 2015
http://www.indicthreads.com
http://pune15.indicthreads.com
Internet of things applications covering industrial domainDev Bhattacharya
Internet of things (IOT) applications covering industrial domain was presented at World congress on Industrial Automation on July 22 '15. This presentation provides an overview of IOT and industrial IOT including protocols, system architecture, industrial IOT key differences, industrial IOT system architecture and requirements, architectural components such as operational technology(OT) and informational technology components (IT), Edge processing device hardware and software.
Intelligent Internet of Things (IIoT): System Architectures and CommunicationsRaghu Nandy
Internet of Things (IoT) can be designed by various approaches with optimistic technology choices. This paper focuses on comparing recent studies on architectural choices and communication approaches for IoT Systems. Understanding Goals of an IoT system and inventing a general prototype for general IoT solutions is unique challenging. Existing research prototypes provide us information about IoT systems and their challenges. Existing architectures and communication approaches such as such as Service Oriented Architecture (SOA), Instant Messaging (XMPP) and Web- Sockets Service can be used to develop a general IoT System prototype. SOA provides centralized/decentralized IoT systems. Instant Message services such as XMPP can be used to build distributed and secure IoT platforms. Web-sockets also used to build scalable IoT systems. Over all the choice depends on IoT system Goal and limitations. Intelligent IoT (IIoT) Systems can be seen as decision making system. IoT systems can be built on Cloud infrastructures With Sensor Event as a Service (SEaaS) - Cloud Sensor networks can enable applications to access on demand real-time sensor data. A generic IoT platform can be built and extended to a newer applications and platforms.
This report describes how things get connected via internet.It also describes how actually iot architecture looks like.The Internet of Things (IoT) is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.In short, the Internet of Things refers to the rapidly growing network of connected objects that are able to collect and exchange data using embedded sensors. Thermostats, cars, lights, refrigerators, and more appliances can all be connected to the IoT.
This presentation provides Internet of things architecture fundamentals, functional topology, system overview. Also it provides software architecture of IoT Devices, IoT Gateway, IoT Cloud. This presentation also provide internet of things issues and solutions for the same.
Data Privacy using IoTs in Smart Cities ProjectIndicThreads
Smart Cities is the next big IT thing that the Indian Government is planning. As it is lot of buzz and the draft policy is already made public, a better understanding of what has happened and what can be done with IoT in Smart Cities space will help to make adequately open but private Smart Cities. The session would look at learnings from previous government IT projects like UID, CSC etc. esp. from data privacy perspective and suggest recommendations for Internet of Things implementation in Smart Cities Project.
Session Outline
– Reading the Government’s Smart Cities and IoT Policy
– Smart Cities learnings from around the globe
– Data in previous government projects
– Challenges in Indian Smart Cities implementation
– Handling data in Smart Cities using IoT in India
Take Away
– Knowing typical IT operations in Government Projects
– Understanding details of IoT and Smart Cities plan of DEITY
– Data Handling for ensuring data privacy
– Recommendations for IoT implementation in Smart Cities Project
Session at the IndicThreads.com Confence held in Pune, India on 27-28 Feb 2015
http://www.indicthreads.com
http://pune15.indicthreads.com
Internet of things architecture perspective - IndicThreads ConferenceIndicThreads
Internet of Things is gaining unprecedented amount of traction across the globe. And the large organizations are making huge investments on IoT, which is going to change the shape of the 'Connected World'. Hence, it becomes necessarily important to understand the components, technologies and their interaction in the world of IoT.
The session would cover the Introduction of IoT, its components, the forces that have brought the ecosystem to mainstream and its adoption across industries. Then along with the Reference Architecture, I would discuss a few of industry implementations in IOT area with reference to the architecture. Next would be a comparative analysis of various IOT platforms available in the market and their architectures. And finally I would take up the challenges in making IOT as pervasive as it is believed to be.
A key take away would be the architectural appreciation of IOT landscape. As of now, any and every player in the market has begun to advertise their product as an IOT platform but a comprehensive review of fundamental design and architecture would bring this plethora of products (including open source ones) in the right purview. And that's the objective of this talk.
Session at the IndicThreads.com Confence held in Pune, India on 27-28 Feb 2015
http://www.indicthreads.com
http://pune15.indicthreads.com
Internet of things applications covering industrial domainDev Bhattacharya
Internet of things (IOT) applications covering industrial domain was presented at World congress on Industrial Automation on July 22 '15. This presentation provides an overview of IOT and industrial IOT including protocols, system architecture, industrial IOT key differences, industrial IOT system architecture and requirements, architectural components such as operational technology(OT) and informational technology components (IT), Edge processing device hardware and software.
Intelligent Internet of Things (IIoT): System Architectures and CommunicationsRaghu Nandy
Internet of Things (IoT) can be designed by various approaches with optimistic technology choices. This paper focuses on comparing recent studies on architectural choices and communication approaches for IoT Systems. Understanding Goals of an IoT system and inventing a general prototype for general IoT solutions is unique challenging. Existing research prototypes provide us information about IoT systems and their challenges. Existing architectures and communication approaches such as such as Service Oriented Architecture (SOA), Instant Messaging (XMPP) and Web- Sockets Service can be used to develop a general IoT System prototype. SOA provides centralized/decentralized IoT systems. Instant Message services such as XMPP can be used to build distributed and secure IoT platforms. Web-sockets also used to build scalable IoT systems. Over all the choice depends on IoT system Goal and limitations. Intelligent IoT (IIoT) Systems can be seen as decision making system. IoT systems can be built on Cloud infrastructures With Sensor Event as a Service (SEaaS) - Cloud Sensor networks can enable applications to access on demand real-time sensor data. A generic IoT platform can be built and extended to a newer applications and platforms.
This report describes how things get connected via internet.It also describes how actually iot architecture looks like.The Internet of Things (IoT) is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.In short, the Internet of Things refers to the rapidly growing network of connected objects that are able to collect and exchange data using embedded sensors. Thermostats, cars, lights, refrigerators, and more appliances can all be connected to the IoT.
This presentation provides Internet of things architecture fundamentals, functional topology, system overview. Also it provides software architecture of IoT Devices, IoT Gateway, IoT Cloud. This presentation also provide internet of things issues and solutions for the same.
Data Privacy using IoTs in Smart Cities ProjectIndicThreads
Smart Cities is the next big IT thing that the Indian Government is planning. As it is lot of buzz and the draft policy is already made public, a better understanding of what has happened and what can be done with IoT in Smart Cities space will help to make adequately open but private Smart Cities. The session would look at learnings from previous government IT projects like UID, CSC etc. esp. from data privacy perspective and suggest recommendations for Internet of Things implementation in Smart Cities Project.
Session Outline
– Reading the Government’s Smart Cities and IoT Policy
– Smart Cities learnings from around the globe
– Data in previous government projects
– Challenges in Indian Smart Cities implementation
– Handling data in Smart Cities using IoT in India
Take Away
– Knowing typical IT operations in Government Projects
– Understanding details of IoT and Smart Cities plan of DEITY
– Data Handling for ensuring data privacy
– Recommendations for IoT implementation in Smart Cities Project
Session at the IndicThreads.com Confence held in Pune, India on 27-28 Feb 2015
http://www.indicthreads.com
http://pune15.indicthreads.com
This is the presentation I use as a support to my 9 hour-long talk to postgraduate students of a French Telecom and Electronics Master. The idea is to provide them with a broad view, including some non-technical domains.
Redefining IoT with Innovation At Every Level - Prith Banerjee, Chief Technol...Schneider Electric
A sustainable future must become radically more efficient with the way we use energy. The Internet of Things (IoT) and the convergence of Operational Technology (OT) and Information Technology (IT) are enabling companies to deliver more innovation at every level, from connected products to edge control, from services to software, both on premise and in the cloud. Understanding the growth potential for infrastructure development and the related ecosystem is vital for societal, long-term investment.
IOT is connecting every physical object in the world using wireless technologies to track and control them from every where in the world...Every object is uniquely identified using ip addresses(IPv6)
Carla Zevnik-Seufzer • The Strategic Financial Alliance
- The problem with pie charts by Greg Gann
- Oil price surge troubling, but still within ranges
- Serving special needs (Russell Luce, Foresters Equity Services, Inc.)
Efficient decentralized iterative learning tracker for unknown sampled data i...ISA Interchange
In this paper, an efficient decentralized iterative learning tracker is proposed to improve the dynamic performance of the unknown controllable and observable sampled-data interconnected large-scale state-delay system, which consists of NN multi-input multi-output (MIMO) subsystems, with the closed-loop decoupling property. The off-line observer/Kalman filter identification (OKID) method is used to obtain the decentralized linear models for subsystems in the interconnected large-scale system. In order to get over the effect of modeling error on the identified linear model of each subsystem, an improved observer with the high-gain property based on the digital redesign approach is developed to replace the observer identified by OKID. Then, the iterative learning control (ILC) scheme is integrated with the high-gain tracker design for the decentralized models. To significantly reduce the iterative learning epochs, a digital-redesign linear quadratic digital tracker with the high-gain property is proposed as the initial control input of ILC. The high-gain property controllers can suppress uncertain errors such as modeling errors, nonlinear perturbations, and external disturbances (Guo et al., 2000) [18]. Thus, the system output can quickly and accurately track the desired reference in one short time interval after all drastically-changing points of the specified reference input with the closed-loop decoupling property.
Fairfax Sydney #mojo #mojocon Feb 2017 Meetup - 360 video production basicsJamie Andrei
Fairfax Sydney #mojo #mojocon Feb 2017 Meetup - 360 video production basics
An introduction to 360 video / VR basics, introducting the concept, several approach & technologies, through to 2x key 360 social platforms (fish where the fish are), through to a basic workflow & some hands on Google Cardboard demos.
For many, web-scale IT is an alien and drastic approach being met with fear and resistance. So the first question for any organization should be; what is it? Cameron Haight, Gartner’s chief of research for infrastructure and operations, coined the term “Web-scale IT” earlier 2014 as a way to describe the new ways organizations leverage technology to provide their customers with content quickly and at massive scale.
Windows 10 IoT Core on Raspberry Pi 2 Usine IOAlex Danvy
Discover what's Microsoft Windows 10 IoT Core and what does it brings to the Raspberry Pi. Other cool IoT initiatives are included like Arduino projects, Microsoft Band, HoloLens and Azure IoT.
IoT is a green field of new business opportunities. The ran has started…..
Everyware Device Cloud (EDC) is a full set of Operational Technologies available also as a service, which represent the fastest way to start an IoT business.
You can connect a Device to Cloud in 15 minutes.
With EDC A typical IoT project would take 2 to 6 months to go live and the ROI is really fast
.
IoT and the Oil & Gas industry at M2M Oil & Gas 2014 in LondonEurotech
How the Internet of Things is catching up with the Oil & Gas industry.
How Eurotech's IoT architecture had its roots in the oil & gas industry, and why it is still relevant today.
It consists of definition of iot,physical and logical design of iot,fundamental blocks of iot , communication model of iot ,what is things in internet of things means, communication APIs of iot.This are some of the main contents of this ppt
Comparative analysis of traditional scada systems and io t implemented scadaIJARIIT
SCADA system stands as an abbreviation of Supervisory Control and Data Acquisition. It focuses on the supervisory
level and is not a full control system. It is a computer system which gathers and analyses real time data. They are useful in
monitoring and controlling a plant or industrial equipment like telecommunications, water, waste control, energy, oil-gas
refining, and transportation. It gathers information about a mishap, transfers it back to a central site and alerts the home station
about the mishap, carries out necessary analysis and control, like determining if the mishap occurred is critical, and display the
information in a logical and organized fashion. They can be relatively as simple as a system which monitors environmental
conditions of a small office building, or as complex as a system that monitors all the activity in a nuclear power plant.
IOT acts as a complementary setup to SCADA. SCADA system generates information which acts as one of the data sources for
IOT. While the focus of SCADA on monitoring and control, the focus of IOT is firmly on analyzing machine data to improve
productivity.
The Internet of Things - Solutions to Drive Business Transformation - Sharath Hosagrahar, Lead Architect, Red Hat Global Partners & Alliances Organisation
It is an exciting time in computing with the sea-change happening both on the technology fronts and application fronts. Networked sensors and embedded platforms with significant computational capabilities with access to backend utility computing resources, offer a tremendous opportunity to realize large-scale cyber-physical systems (CPS) to address the many societal challenges including emergency response, disaster recovery, surveillance, and transportation. Referred to as Situation awareness applications, they are latency-sensitive, data intensive, involve heavy-duty processing, run 24x7, and result in actuation with possible retargeting of sensors. Examples include surveillance deploying large-scale distributed camera networks, and personalized traffic alerts in vehicular networks using road and traffic sensing. This talk covers ongoing research in Professor Ramachandran’s embedded pervasive lab to provide system support for Internet of Things.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
2. Standards bodies working on IoT
• ITU standards IoT Global Standards Initiative, IoT overview Y.2060, Y.2061
(Requirements for support of machine-oriented communication applications in the
NGN environment)
• Within IoT-GSI [numerous Recommendations completed]
SG11 - APIs and protocols for IoT (activity started 07/2014), IoT Testing
SG13 - Focus on Network Aspects of IoT
SG16 - Focus on IoT applications, including e-health
SG17 - Security and privacy protection aspects of IoT (already published
some specs related to USN and services using tag-based identification)
Other activities
SG15 -Smart Grids, Home Networks
Focus Group on Smart Sustainable Cities (FG SSC) (since 02/2013)
Focus Group on Smart Water Management (FG SWM) (since 06/2013)
Focus Group on M2M Service Layer (FG M2M) (closed 03/2014)
Collaboration on ITS Communication Standards (also some past FGs on Cars)
3. Standards bodies working on IoT
• IEEE P2413 – Standard for an Architectural Framework for the Internet of Things
• Industrial Internet Consortium
• OneM2M
• LoRA alliance
• IPSO alliance (IP for Smart Objects)
• IETF – 6LoWPAN working group, CoRE(Constrained Restful Environment) working group, ROLL (Routing over Low
Power and Low Noisy networks) working group
• NIST – Smart grid forum
• ETSI
• 3GPP standards – IMS
• 5G americas
• CENELEC – European Committee for ElectroTechnical standardization
• IoT-A
• ATIS
• TIA
• Open Mobile Alliance
• Broadband Forum
• OASIS
• OGC
• GS1
4. M2M communications
• Telematics – connected cars used for safety and
security; services and infotainment
• Metering – meters to report consumption mainly
electricity
• Remote monitoring – sensors connected to assets are
tracked and monitored in real-time
• Fleet management – Vehicles can be managed and
tracked through the path they go
• Security – connectivity used for home and small
business security alarms
• ATM/Point of Sales – ATM and POS devices are
connected to a centralized secure environment
5. IoT –Internet of Things
Applications
Application Enablement
Internet connectivity
Automo
tive
Transpo
rt
Utility
Smart
City
Agricult
ure
Health
People Vehicle Building Assets
Industri
al
Resourc
es
Spaces
Devices
7. Functional layers and capabilities of an
IoT solution
Asset Layer
Resource Layer
Communication Layer
Service Support Layer
Data and Information layer
Application layer
Business Layer
SECURITY
Management
IoTDataandServices
8. Functional layers and capabilities of an
IoT solution
Assets Layer- The assets of interest are the realworld objects and entities that are subject to being monitored and controlled,as
well as having digital representations and identities. The typical examples include vehicles and machinery, fixed
infrastructures such as buildings and utility systems, homes, and people themselves. Identification of assets using RFID or
optical bar codes
Resource Layer - provides the main functional capabilities of sensing, actuation, and embedded identities. Sensors and actuators
in various devices that may be smartphones or Wireless Sensor Actuator Networks (WSANs), M2M devices like smart
meters, or other sensor/actuator nodes,deliver these functions.
Communication Layer – LAN and WAN networks using wired and wireless networking technologies. Wireless LAN technologies like
ieee 802.11, ieee802.15.4 (Low rate WPAN), Bluetooth, Bluetooth Low energy, Zigbee networks
Service Support Layer – done from data centers for tasks like remote device management that can do remote software upgrades,
remote diagnostics or recovery, and dynamically reconfigure application processing such as setting event filters.
Data and Information Layer - main purposes are to capture knowledge and provide advanced control logic support
Application Layer - provides the specific IoT applications
Business Layer - This is where any integration of the IoT applications into business processes and enterprise systems takes place.
The enterprise systems can, for example, be Customer Relationship Management (CRM), Enterprise Resource Planning
(ERP), or other Business Support Systems (BSS).
Management - management of various parts of the system solution related to its operation, maintenance, administration, and
provisioning. This includes management of devices, communications networks, and the general Information Technology (IT)
infrastructure as well as configuration and provisioning data, performance of services delivered, etc.
Security – Information and Communication Security. Trust, Identity management, authentication and authorization are key
capabilites.
Data and Services – Data mining and data analytics done here and transfer of data into knowledge is done here
9. IoT devices and gateways
• A device can be characterized as having several properties, including:
• Microcontroller: 8-, 16-, or 32-bit working memory and storage.
• Power Source: Fixed, battery, energy harvesting, or hybrid.
• Sensors and Actuators: Onboard sensors and actuators, or circuitry
that allows them to be connected, sampled, conditioned, and
controlled.
• Communication: Cellular, wireless, or wired for LAN and WAN
communication.
• Operating System (OS): Main-loop, event-based, real-time, or fullfeatured
OS with low foot print TCP/IP stack Contiki, TinyOS, FreeRTOS, uIP stack open source
• Applications: Simple sensor sampling or more advanced applications.
• User Interface: Display, buttons, or other functions for user
interaction.
• Device Management (DM): Provisioning, firmware, bootstrapping,
and monitoring.
• Execution Environment (EE): Application lifecycle management and
Application Programming Interface (API).
10. Device management
Device management (DM) is an essential part of the IoT and provides
efficient means to perform many of the management tasks for
devices:
• Provisioning: Initialization (or activation) of devices in regards to
configuration and features to be enabled.
• Device Configuration: Management of device settings and
parameters.
• Software Upgrades: Installation of firmware, system software, and
applications on the device.
• Fault Management: Enables error reporting and access to device
status.
Examples of device management standards include TR-069 and OMA-
DM.
11. Data Management
• Data generation
• Data acquisition – continuous monitoring, interval-poll,
event based
• Data validation – Failure to validate data leads to security
breaches, database corruption, Denial of service
• Data storage – massive parallel processing DB’s, distributed
file systems, cloud computing platforms needed
• Data processing – working with data at rest (already stored)
or in motion( stream data), F to C conversion of data in
temp reading
• Data remanance – even if data is erased or
removed/deleted, it can be retrieved/data recovery
• Data analysis – data mining, machine learning, statistics
12. Data Analytics
• Hadoop’s MapReduce
• HBase: A column-oriented data store that provides real-time
read/write access to very large tables distributed over HDFS.
• Mahout: A distributed and scalable library of machine learning
algorithms that can make use of MapReduce.
• Pig: A tool for converting relational algebra scripts into MapReduce
jobs that can read data from HDFS and HBase.
• Hive: Similar to Pig, but offers an SQL-like scripting language called
HiveQL instead.
• Impala: Offers low-latency queries using HiveQL for interactive
exploratory analytics, as compared to Hive, which is better suited for
long running batch-oriented tasks.
13. ETSI M2M Functional Architecture
M2M Applications
M2M service capabilities
Core Network
Access Network
M2M Applications
M2M service capabilities
M2M device
M2M Applications
M2M Service Capabilities
M2M
Management
function
Network
Management
Function
M2M Gateway
M2M Area
Network M2M device
Network
Domain
Device and
Gateway
Domain
14. ETSI M2M Architecture
• M2M Device: This is the device of interest for an M2M scenario, for example, a device with a temperature sensor. An M2M
Device contains M2M Applications and M2M Service Capabilities. An M2M device connects to the Network Domain either
directly or through an M2M Gateway:
• Direct connection: The M2M Device is capable of performing registration, authentication, authorization, management, and
provisioning to the Network Domain. Direct connection also means
that the M2M device contains the appropriate physical layer to be able to communicate with the Access Network.
• Through one or more M2M Gateway: This is the case when the M2M device does not have the appropriate physical layer,
compatible with the Access Network technology, and therefore it needs a network domain proxy. Moreover, a number of
M2M devices may form their own local M2M Area Network that typically employs a different networking technology from
the Access Network. The M2M Gateway acts as a proxy for the Network Domain and performs the procedures of
authentication, authorization, management, and provisioning. An M2M Device could connect through multiple M2M
Gateways.
• M2M Area Network: This is typically a local area network (LAN) or a Personal Area Network (PAN) and provides connectivity
between M2M Devices and M2M Gateways. Typical networking technologies are IEEE 802.15.1 (Bluetooth), IEEE 802.15.4
(ZigBee, IETF 6LoWPAN/ROLL/CoRE), MBUS, KNX (wired or wireless) PLC, etc.
• M2M Gateway: The device that provides connectivity for M2M Devices in an M2M Area Network towards the Network Domain.
The M2M Gateway contains M2M Applications and M2M Service Capabilities. The M2M Gateway may also provide services
to other legacy devices that are not visible to the Network Domain.
The Network Domain contains the following functional/topological
entities:
• Access Network: this is the network that allows the devices in the Device and Gateway Domain to communicate with the Core
Network.Example Access Network Technologies are fixed (xDSL, HFC) and wireless (Satellite, GERAN, UTRAN, E-UTRAN W-
LAN, WiMAX).
15. ETSI M2M Architecture
• Core Network: Examples of Core Networks are 3GPP Core Network and ETSI TISPAN Core Network. It provides the
following functions:
• IP connectivity.
• Service and Network control.
• Interconnection with other networks.
• Roaming.
• M2M Service Capabilities: These are functions exposed to different M2M Applications through a set of open
interfaces. These functions use underlying Core Network functions, and their objective is to abstract the network
functions for the sake of simpler applications.
• M2M Applications: These are the specific M2M applications (e.g. smart metering) that utilize the M2M Service
Capabilities through the open interfaces.
• Network Management Functions: These are all the necessary functions to manage the Access and Core Network (e.g.
Provisioning, Fault Management, etc.).
• M2M Management Functions: These are the necessary functions required to manage the M2M Service Capabilities
on the Network Domain while the management of an M2M Device or Gateway is performed by specific M2M
Service Capabilities. There are two M2M Management functions:
• M2M Service Bootstrap Function (MSBF): The MSBF facilitates the bootstrapping of permanent M2M service layer
security credentials in the M2M Device or Gateway and the M2M Service Capabilities in the Network Domain. In
the Network Service Capabilities Layer, the Bootstrap procedures perform, among other procedures, provisioning
of an M2M Root Key (secret key) to the M2M Device or Gateway and the M2M Authentication Server (MAS).
• M2M Authentication Server (MAS): This is the safe execution environment where permanent security credentials
such as the M2M Root Key are stored. Any security credentials established on the M2M Device or Gateway are
stored in a secure environment such as a trusted platform module.
16. ITU-T IoT Reference Model
Application
Layer
IoT Applications
Service &
Application
support Layer
Generic
Support
Capabilities
Specific
Support
Capabilities
Network
Layer
Networking Capabilities
Transport Capabilities
Device
Layer
Device
Capabilities
Gateway
Capabilities
Security
Capabilities
Management
Capabilities
GenericManagementCapabilities
GenericManagementCapabilities
SpecificManagementCapabilities
SpecificManagementCapabilities
Remote patient monitoring
Data storage and Data processing
Mobility Mgmt and AAA
FCAPS,
device
mgmt,
traffic
mgmt,
network
topology
mgmt
17. IETF CoRE HTTP Proxy
HTTP-CoAP
Proxy
CoAP-HTTP
Proxy
HTTP Client
HTTP Server
CoAP Server
CoAP Client
HTTP Proxy
18. Request from HTTP client to CoAP
server through HTTP proxy
802802.15.4
8026LoWPAN
802IPv6
UDP ROLL
CoAP
CoAP
Server
App
802802.15.4
8026LoWPAN
802IPv6
UDP ROLL
CoAP
8802.11.3
8IP v4
8TCP
8HTTP
8802.11.3
8IP v4
8TCP
8HTTP
Cross Proxy
Device Sensor Area
Network SAN
Internet
SAN
Gateway
Internet Cloud
Application
19. Application level protocols in IoT
• COAP (Constrained Application Protocol)/UDP
• RESTful HTTP/HTTP
• IBM’s MQTT (Message Queue Telemetry Transport)/TCP
• XMPP (Extensible Messaging and Presence protocol)/TCP
• AMQP ( Advanced message queing protocol)/TCP
• Websockets/TCP
• JMS – Java message service API
• DDS – Data Distribution Service open source middleware
20. IoT Security
• DOS/DDOS attacks
• Protection from Hacking
• Cybersecurity attacks
• Access control mechanisms
• Authentication and authorization
• Protection of Automation using machine learning
• Privacy of data
• Identity management – digital identity with biometrics
• Network Security – Nessus Scan
• Internet Security – browser vulnerabilities, operating system vulnerabilities, data base vulnerabilities, Eavesdropping/wiretap, Forge, Replay, Delay
and Rush, Reorder, Delete transit packets Defense : Key generate, Encryption and Decryption
• Botnet/Keylogger/Hypervisors/rootkits – Identity theft, Denial of service attacks, spam, click fraud Defense : Signature based detection using
antivirus
• Intranet Security – Access control and NAC, Risk Audit, physical securiity, Application level firewall to connet outside vendors to intranet called XML
firewall
• LAN Security – NDS attacks like ip address spoofing, mac address spoofing, arp cache poisoning,dns name corruption, Firewall, IDS/IPS, signature
analysis using pattern matching of the content in the data packets, network scanner nmap, port scanning tools Superscan, network sniffer ethereal,
Ethersnoop light
• Network Intrusion and Detection SNORT
• Intrusion Prevention Systems
• Wireless networks security – WEP( Wireless Equivalent Privacy), WPA and WPA2 (Wi-fi protected access), SPINS ( Security Protocol for sensor
networks)
• Cellular network security
• RFID security
• Storage networks security
• Physical security – smart card reader, biometric card readers
• Disaster recovery from natural disasters
• Firewalls
• Forensics
21. Emerging IoT applications
Consumer Electronics
• Connected gadgets
• Wearables
• Robotics
• Participatory sensing
• Social Web of Things
Automotive transport
• Autonomous Vehicles
• Multimodal transport
Retail Banking
• Micro Payments
• Retail logistics
• Product life-cycle info
• Shopping assistance
Environmental
• Pollution
• Air,Water,Soil
• Weather, climate
• Noise
Infrastructures
• Buildings and Homes
• Roads and rails
Utilities
• Smart grid
• Water management
• Gas,oil and renewables
• Waste management
• Heating and cooling
Health well-being
• Remote monitoring
• Assisted living
• Behavioral change
• Treatment compliance
• Sports and Fitness