Many technical communities are vigorously pursuing
research topics that contribute to the Internet of Things (IoT).
Nowadays, as sensing, actuation, communication, and control become
even more sophisticated and ubiquitous, there is a significant
overlap in these communities, sometimes from slightly different
perspectives. More cooperation between communities is encouraged.
To provide a basis for discussing open research problems in
IoT, a vision for how IoT could change the world in the
distant future is first presented. Then, eight key research topics
are enumerated and research problems within these topics are
discussed.
The document discusses various protocols and security aspects related to IoT. It provides details on protocols such as IEEE 802.15.4, BACnet, Modbus, KNX, Zigbee etc. It also outlines vulnerabilities in IoT like unauthorized access, information corruption, DoS attacks. Key elements of IoT security discussed are identity establishment, access control, data security, non-repudiation and availability. Security requirements and models for IoT are also mentioned.
Disease prediction using machine learningJinishaKG
Â
Github link :
https://github.com/jini-the-coder/Diseaseprediction
Blog link :
http://amigoscreation.blogspot.com/2020/07/disease-prediction-using-machine.html
Youtube link :
https://youtu.be/3YmAbta16yk
This document discusses devices, gateways, and their roles. A device is a hardware unit that can sense its environment and perform tasks using a microcontroller, memory, I/O capabilities and networking interfaces. Devices can be basic, providing only sensor readings and actuation, or advanced, hosting applications and providing user interfaces. Gateways translate between network layers, manage data from multiple devices, run local applications, and facilitate device management between devices and servers.
The document outlines a 10-step IoT design methodology that includes purpose and requirements specification, process specification, domain modeling, information modeling, service specifications, IoT level specification, functional view specification, operational view specification, device and component integration, and application development. It then provides an example application of this methodology to design a smart home automation system for controlling lights remotely. The example walks through each step for specifying the purpose, domain model, information model, services, functional views, and developing the application and native controller components.
This document discusses wireless sensor network applications and energy consumption. It provides examples of WSN applications including disaster relief, environment monitoring, healthcare, and more. It then discusses various factors that influence energy consumption in sensor nodes, including operation states, microcontroller usage, radio transceivers, memory, and the relationship between computation and communication. Specific power consumption numbers are given for different components like radios, sensors, and microprocessors. The goals of optimization for WSNs are discussed as quality of service, energy efficiency, scalability, and robustness.
This document discusses sources of IoT including popular IoT development boards, the role of RFID, and wireless sensor networks. RFID enables tracking and inventory control through identification. Wireless sensor networks allow sensors to monitor physical conditions from remote locations through wireless communication. Each wireless sensor node can perform computations and wireless networking to connect sensors autonomously in a wireless sensor network.
The document discusses wireless sensor networks and their applications. It describes wireless sensor networks as consisting of individual nodes that can interact with their environment by sensing or controlling physical parameters. It then discusses several applications of wireless sensor networks, including disaster relief, environment monitoring, intelligent buildings, facility management, machine maintenance, agriculture, healthcare, and logistics. Finally, it outlines some key requirements and mechanisms needed to implement wireless sensor networks, including communication, energy efficiency, self-configuration, collaboration, data-centric operation, and exploiting tradeoffs between different needs.
The document discusses various protocols and security aspects related to IoT. It provides details on protocols such as IEEE 802.15.4, BACnet, Modbus, KNX, Zigbee etc. It also outlines vulnerabilities in IoT like unauthorized access, information corruption, DoS attacks. Key elements of IoT security discussed are identity establishment, access control, data security, non-repudiation and availability. Security requirements and models for IoT are also mentioned.
Disease prediction using machine learningJinishaKG
Â
Github link :
https://github.com/jini-the-coder/Diseaseprediction
Blog link :
http://amigoscreation.blogspot.com/2020/07/disease-prediction-using-machine.html
Youtube link :
https://youtu.be/3YmAbta16yk
This document discusses devices, gateways, and their roles. A device is a hardware unit that can sense its environment and perform tasks using a microcontroller, memory, I/O capabilities and networking interfaces. Devices can be basic, providing only sensor readings and actuation, or advanced, hosting applications and providing user interfaces. Gateways translate between network layers, manage data from multiple devices, run local applications, and facilitate device management between devices and servers.
The document outlines a 10-step IoT design methodology that includes purpose and requirements specification, process specification, domain modeling, information modeling, service specifications, IoT level specification, functional view specification, operational view specification, device and component integration, and application development. It then provides an example application of this methodology to design a smart home automation system for controlling lights remotely. The example walks through each step for specifying the purpose, domain model, information model, services, functional views, and developing the application and native controller components.
This document discusses wireless sensor network applications and energy consumption. It provides examples of WSN applications including disaster relief, environment monitoring, healthcare, and more. It then discusses various factors that influence energy consumption in sensor nodes, including operation states, microcontroller usage, radio transceivers, memory, and the relationship between computation and communication. Specific power consumption numbers are given for different components like radios, sensors, and microprocessors. The goals of optimization for WSNs are discussed as quality of service, energy efficiency, scalability, and robustness.
This document discusses sources of IoT including popular IoT development boards, the role of RFID, and wireless sensor networks. RFID enables tracking and inventory control through identification. Wireless sensor networks allow sensors to monitor physical conditions from remote locations through wireless communication. Each wireless sensor node can perform computations and wireless networking to connect sensors autonomously in a wireless sensor network.
The document discusses wireless sensor networks and their applications. It describes wireless sensor networks as consisting of individual nodes that can interact with their environment by sensing or controlling physical parameters. It then discusses several applications of wireless sensor networks, including disaster relief, environment monitoring, intelligent buildings, facility management, machine maintenance, agriculture, healthcare, and logistics. Finally, it outlines some key requirements and mechanisms needed to implement wireless sensor networks, including communication, energy efficiency, self-configuration, collaboration, data-centric operation, and exploiting tradeoffs between different needs.
Fog Computing is a paradigm that extends Cloud computing and services to the edge of the network. Similar to Cloud, Fog provides data, compute, storage, and application services to end-users. The motivation of Fog computing lies in a series of real scenarios, such as Smart Grid, smart traffic lights in vehicular networks and software defined networks.
The document discusses the integration of fog computing with Internet of Things (IoT) applications. It introduces fog computing and how it extends cloud computing by providing data processing and storage locally at IoT devices to address challenges of latency and mobility. Benefits of fog computing include low latency, scalability, and flexibility to support various IoT applications like smart homes, healthcare, traffic lights, and connected cars. Challenges of integrating fog computing with IoT include security, privacy, resource estimation, and ensuring communication between fog servers and the cloud. The document reviews open issues and concludes by discussing future research directions for fog computing and IoT integration.
The slides defines IoT and show the differnce between M2M and IoT vision. It then describes the different layers that depicts the functional architecture of IoT, standard organizations and bodies and other IoT technology alliances, low power IoT protocols, IoT Platform components, and finally gives a short description to one of IoT low power application protocols (MQTT).
This document discusses power aware routing protocols for wireless sensor networks. It begins by describing wireless sensor networks and how they are used to monitor environmental conditions. It then classifies routing protocols for sensor networks based on their functioning, node participation style, and network structure. Specific examples are provided for different types of routing protocols, including LEACH, TEEN, APTEEN, SPIN, Rumor Routing, and PEGASIS. Chain-based and clustering routing protocols are also summarized.
This document is a seminar report on edge computing submitted by Basavakumar Patil and Abhishek Yaligar to Visvesvaraya Technological University. It was conducted under the guidance of Prof. H P Rajini at KLE Dr. M. S. Sheshagiri College of Engineering and Technology in Belagavi, Karnataka, India. The report discusses the definition of edge computing, case studies on edge computing applications in areas such as cloud offloading, smart homes and cities. It also covers challenges and opportunities in edge computing such as programmability, naming, data abstraction, service management, privacy and security, and optimization metrics.
The document discusses several key aspects of Internet of Things (IoT) systems including:
1. IoT devices and networks have heterogeneous requirements for data representation, visualization, and interaction both locally and remotely.
2. IoT systems interface the physical world through physical entities, sensors, and actuators, and require consideration of the deployment context.
3. Design of IoT devices and networks requires addressing functional requirements like sensing, actuation, and communication as well as non-functional requirements including energy, cost, regulations, and ease of use.
The document discusses the functions of a gateway in an IoT/M2M system. The gateway performs data enrichment, consolidation, and device management. It has several key functions including transcoding data formats, ensuring privacy and security, gathering and enriching data from devices, aggregating and compacting data, and managing device identities, configurations, and faults.
The document summarizes a disease prediction system for rural health services presented by two students. The key points are:
1. The system aims to provide quick medical diagnosis to rural patients using machine learning algorithms like SVM, RF, DT, NB, ANN, KNN, and LR to recognize diseases from symptoms.
2. It seeks to enhance access to medical specialists for rural communities and improve quality of healthcare.
3. The expected outcomes are conducting experiments to evaluate the performance of using 7 machine learning algorithms to predict diseases from symptoms and having doctors select the correct diagnosis from the predictions.
This document discusses IoT protocols for data communication and connection models. It describes the key pillars of IoT protocols as being device, connectivity, data, and analytics. It also outlines various types of IoT data protocols like AMQP, DDS, XMPP, and WebSocket that establish end-to-end communication. Additionally, it covers IoT network protocols like Bluetooth, LPWANs, ZigBee, Z-Wave and others that facilitate secured communication between IoT devices over the internet.
How to put these nodes together to form a meaningful network.
How a network should function at high-level application scenarios .
On the basis of these scenarios and optimization goals, the design of networking protocols in wireless sensor networks are derived
A proper service interface is required and integration of WSNs into larger network contexts.
Mac protocols for ad hoc wireless networks Divya Tiwari
Â
The document discusses MAC protocols for ad hoc wireless networks. It addresses key issues in designing MAC protocols including limited bandwidth, quality of service support, synchronization, hidden and exposed terminal problems, error-prone shared channels, distributed coordination without centralized control, and node mobility. Common MAC protocol classifications and examples are also presented, such as contention-based protocols, sender-initiated versus receiver-initiated protocols, and protocols using techniques like reservation, scheduling, and directional antennas.
Mobile IP is a protocol that allows mobile devices like phones and laptops to change location between networks while maintaining the same IP address. When a mobile node changes to a foreign network, its home agent intercepts any data packets and tunnels them to the mobile node's care-of address at its new location. The foreign agent then decapsulates the tunneled packets and delivers them locally to the mobile node. This allows the mobile node to seamlessly change networks without disrupting communications.
This document provides an overview of Vehicular Ad-Hoc Networks (VANETs). It discusses how VANETs allow vehicle-to-vehicle and vehicle-to-infrastructure communication using technologies like Dedicated Short Range Communication. It describes the challenges of VANETs including routing delays and security issues. Finally, it outlines some of the safety, convenience and commercial applications that are possible with VANETs such as improved traffic management and navigation services.
Here's how big data and the Internet of Things work together: a vast network of sensors (IoT) collect a boatload of information (big data) that is then used to improve services and products in various industries, which in turn generate revenue.
This document discusses key enabling technologies for the Internet of Things (IoT). It describes wireless sensor networks that use distributed sensor nodes to monitor environmental conditions. It also discusses cloud computing which provides on-demand computing resources and services over the Internet. Additionally, it covers big data analytics which involves collecting, processing, and analyzing large, diverse datasets. Finally, it mentions communication protocols that allow devices to exchange data over networks and embedded systems which are specialized computer systems designed to perform specific tasks.
The document discusses key aspects of Internet of Things (IoT) architectures. It begins by explaining the differences between traditional IT systems and IoT, noting that IoT is focused on data generated by sensors. It then outlines the core functional stack of IoT including the things layer of physical devices, communication networks, and application/analytics layers. The document also describes two standardized IoT architectures from oneM2M and IoTWorld Forum. Finally, it discusses IoT data management using fog computing to distribute data processing close to the edge for reduced latency and network traffic.
Data aggregation in wireless sensor network , 11751 d5811praveen369
Â
The document discusses data aggregation in wireless sensor networks. It explains that sensor networks aim to gather and aggregate data in an energy efficient manner to extend network lifetime. It describes various data aggregation approaches like centralized, LEACH, and TAG. It also discusses cluster-based and tree-based aggregation where nodes aggregate and transmit data to parent nodes or cluster heads. The document outlines types of queries for sensor networks and benefits of data aggregation in reducing traffic and energy consumption while improving data accuracy.
The document discusses key concepts in Internet of Things (IoT) design including:
1) Defining IoT as physical objects connected to the internet via sensors and controllers.
2) The importance of usability (UI/UX design) and designing for both physical appearance and logical functionality.
3) Approaches like "calm technology" that engages users' peripheral attention in a subtle rather than obtrusive way.
Wireless sensor network and its applicationRoma Vyas
Â
The document discusses wireless sensor networks (WSN) and their applications. It defines a WSN as a collection of sensor nodes that communicate wirelessly and self-organize after deployment. Sensor nodes collect data at regular intervals, convert it to electrical signals, and send it to a base station. The document outlines the components of sensor nodes and describes how WSNs are used for applications like forest fire detection, air/water pollution monitoring, landslide detection, and military surveillance. It also discusses the TinyOS operating system commonly used for WSNs and its features for efficiently utilizing energy in sensor nodes.
This document discusses Internet of Things (IoT). It defines IoT and explains that IoT allows internet connectivity and computing capability to extend to various objects and devices. It describes key characteristics of IoT including use of sensors, connectivity models like device-to-device and device-to-cloud, applications across various domains like healthcare, transportation, utilities and more. It also outlines advantages and disadvantages of IoT as well as security and other challenges in deploying IoT solutions at scale.
This document discusses trends and challenges in the Internet of Things (IoT). It covers several topics: briefly defining IoT; challenges and opportunities for startups in areas like security, privacy, integration; key research directions including massive scaling, knowledge and big data, openness, and humans in the loop; and final thoughts on the potential of IoT and IoT startups to develop whole solutions and services.
Fog Computing is a paradigm that extends Cloud computing and services to the edge of the network. Similar to Cloud, Fog provides data, compute, storage, and application services to end-users. The motivation of Fog computing lies in a series of real scenarios, such as Smart Grid, smart traffic lights in vehicular networks and software defined networks.
The document discusses the integration of fog computing with Internet of Things (IoT) applications. It introduces fog computing and how it extends cloud computing by providing data processing and storage locally at IoT devices to address challenges of latency and mobility. Benefits of fog computing include low latency, scalability, and flexibility to support various IoT applications like smart homes, healthcare, traffic lights, and connected cars. Challenges of integrating fog computing with IoT include security, privacy, resource estimation, and ensuring communication between fog servers and the cloud. The document reviews open issues and concludes by discussing future research directions for fog computing and IoT integration.
The slides defines IoT and show the differnce between M2M and IoT vision. It then describes the different layers that depicts the functional architecture of IoT, standard organizations and bodies and other IoT technology alliances, low power IoT protocols, IoT Platform components, and finally gives a short description to one of IoT low power application protocols (MQTT).
This document discusses power aware routing protocols for wireless sensor networks. It begins by describing wireless sensor networks and how they are used to monitor environmental conditions. It then classifies routing protocols for sensor networks based on their functioning, node participation style, and network structure. Specific examples are provided for different types of routing protocols, including LEACH, TEEN, APTEEN, SPIN, Rumor Routing, and PEGASIS. Chain-based and clustering routing protocols are also summarized.
This document is a seminar report on edge computing submitted by Basavakumar Patil and Abhishek Yaligar to Visvesvaraya Technological University. It was conducted under the guidance of Prof. H P Rajini at KLE Dr. M. S. Sheshagiri College of Engineering and Technology in Belagavi, Karnataka, India. The report discusses the definition of edge computing, case studies on edge computing applications in areas such as cloud offloading, smart homes and cities. It also covers challenges and opportunities in edge computing such as programmability, naming, data abstraction, service management, privacy and security, and optimization metrics.
The document discusses several key aspects of Internet of Things (IoT) systems including:
1. IoT devices and networks have heterogeneous requirements for data representation, visualization, and interaction both locally and remotely.
2. IoT systems interface the physical world through physical entities, sensors, and actuators, and require consideration of the deployment context.
3. Design of IoT devices and networks requires addressing functional requirements like sensing, actuation, and communication as well as non-functional requirements including energy, cost, regulations, and ease of use.
The document discusses the functions of a gateway in an IoT/M2M system. The gateway performs data enrichment, consolidation, and device management. It has several key functions including transcoding data formats, ensuring privacy and security, gathering and enriching data from devices, aggregating and compacting data, and managing device identities, configurations, and faults.
The document summarizes a disease prediction system for rural health services presented by two students. The key points are:
1. The system aims to provide quick medical diagnosis to rural patients using machine learning algorithms like SVM, RF, DT, NB, ANN, KNN, and LR to recognize diseases from symptoms.
2. It seeks to enhance access to medical specialists for rural communities and improve quality of healthcare.
3. The expected outcomes are conducting experiments to evaluate the performance of using 7 machine learning algorithms to predict diseases from symptoms and having doctors select the correct diagnosis from the predictions.
This document discusses IoT protocols for data communication and connection models. It describes the key pillars of IoT protocols as being device, connectivity, data, and analytics. It also outlines various types of IoT data protocols like AMQP, DDS, XMPP, and WebSocket that establish end-to-end communication. Additionally, it covers IoT network protocols like Bluetooth, LPWANs, ZigBee, Z-Wave and others that facilitate secured communication between IoT devices over the internet.
How to put these nodes together to form a meaningful network.
How a network should function at high-level application scenarios .
On the basis of these scenarios and optimization goals, the design of networking protocols in wireless sensor networks are derived
A proper service interface is required and integration of WSNs into larger network contexts.
Mac protocols for ad hoc wireless networks Divya Tiwari
Â
The document discusses MAC protocols for ad hoc wireless networks. It addresses key issues in designing MAC protocols including limited bandwidth, quality of service support, synchronization, hidden and exposed terminal problems, error-prone shared channels, distributed coordination without centralized control, and node mobility. Common MAC protocol classifications and examples are also presented, such as contention-based protocols, sender-initiated versus receiver-initiated protocols, and protocols using techniques like reservation, scheduling, and directional antennas.
Mobile IP is a protocol that allows mobile devices like phones and laptops to change location between networks while maintaining the same IP address. When a mobile node changes to a foreign network, its home agent intercepts any data packets and tunnels them to the mobile node's care-of address at its new location. The foreign agent then decapsulates the tunneled packets and delivers them locally to the mobile node. This allows the mobile node to seamlessly change networks without disrupting communications.
This document provides an overview of Vehicular Ad-Hoc Networks (VANETs). It discusses how VANETs allow vehicle-to-vehicle and vehicle-to-infrastructure communication using technologies like Dedicated Short Range Communication. It describes the challenges of VANETs including routing delays and security issues. Finally, it outlines some of the safety, convenience and commercial applications that are possible with VANETs such as improved traffic management and navigation services.
Here's how big data and the Internet of Things work together: a vast network of sensors (IoT) collect a boatload of information (big data) that is then used to improve services and products in various industries, which in turn generate revenue.
This document discusses key enabling technologies for the Internet of Things (IoT). It describes wireless sensor networks that use distributed sensor nodes to monitor environmental conditions. It also discusses cloud computing which provides on-demand computing resources and services over the Internet. Additionally, it covers big data analytics which involves collecting, processing, and analyzing large, diverse datasets. Finally, it mentions communication protocols that allow devices to exchange data over networks and embedded systems which are specialized computer systems designed to perform specific tasks.
The document discusses key aspects of Internet of Things (IoT) architectures. It begins by explaining the differences between traditional IT systems and IoT, noting that IoT is focused on data generated by sensors. It then outlines the core functional stack of IoT including the things layer of physical devices, communication networks, and application/analytics layers. The document also describes two standardized IoT architectures from oneM2M and IoTWorld Forum. Finally, it discusses IoT data management using fog computing to distribute data processing close to the edge for reduced latency and network traffic.
Data aggregation in wireless sensor network , 11751 d5811praveen369
Â
The document discusses data aggregation in wireless sensor networks. It explains that sensor networks aim to gather and aggregate data in an energy efficient manner to extend network lifetime. It describes various data aggregation approaches like centralized, LEACH, and TAG. It also discusses cluster-based and tree-based aggregation where nodes aggregate and transmit data to parent nodes or cluster heads. The document outlines types of queries for sensor networks and benefits of data aggregation in reducing traffic and energy consumption while improving data accuracy.
The document discusses key concepts in Internet of Things (IoT) design including:
1) Defining IoT as physical objects connected to the internet via sensors and controllers.
2) The importance of usability (UI/UX design) and designing for both physical appearance and logical functionality.
3) Approaches like "calm technology" that engages users' peripheral attention in a subtle rather than obtrusive way.
Wireless sensor network and its applicationRoma Vyas
Â
The document discusses wireless sensor networks (WSN) and their applications. It defines a WSN as a collection of sensor nodes that communicate wirelessly and self-organize after deployment. Sensor nodes collect data at regular intervals, convert it to electrical signals, and send it to a base station. The document outlines the components of sensor nodes and describes how WSNs are used for applications like forest fire detection, air/water pollution monitoring, landslide detection, and military surveillance. It also discusses the TinyOS operating system commonly used for WSNs and its features for efficiently utilizing energy in sensor nodes.
This document discusses Internet of Things (IoT). It defines IoT and explains that IoT allows internet connectivity and computing capability to extend to various objects and devices. It describes key characteristics of IoT including use of sensors, connectivity models like device-to-device and device-to-cloud, applications across various domains like healthcare, transportation, utilities and more. It also outlines advantages and disadvantages of IoT as well as security and other challenges in deploying IoT solutions at scale.
This document discusses trends and challenges in the Internet of Things (IoT). It covers several topics: briefly defining IoT; challenges and opportunities for startups in areas like security, privacy, integration; key research directions including massive scaling, knowledge and big data, openness, and humans in the loop; and final thoughts on the potential of IoT and IoT startups to develop whole solutions and services.
This document provides an overview of an Internet of Things course for the 2018-2019 academic year. It includes 5 units that will cover topics such as IOT protocols, the web of things, network dynamics applications, resource management, smart grids, and electrical vehicle charging. The course objectives are for students to understand IOT protocols, applications of the web of things, and network dynamics. The document lists 4 textbooks that will be used and provides descriptions of the topics that will be covered in each unit.
This document discusses key factors in optimizing smart hospital design using IoT technology. It begins with an introduction to smart hospitals and IoT. It then discusses challenges in healthcare like patient safety and costs that smart hospital design addresses. The benefits of smart hospital design are improved patient outcomes, staff efficiency, and cost-effectiveness. Key factors in design include patient-centered focus, flexibility, scalability, interoperability, and security. Optimizing the networking layer requires considering security, standardization, scalability, and privacy. Wearable and ambient sensors provide physiological and environmental data. The remote services layer must effectively manage connected devices through computational design, node placement, and parameters.
Internet of things (IOT) connects physical to digitalEslam Nader
Â
1) The document discusses the topic of Internet of Things (IoT). It defines IoT as a network of physical objects embedded with sensors that can collect and exchange data.
2) The document outlines some key characteristics of IoT including connectivity, data collection, communication, intelligence, and action. It also discusses how IoT works by collecting data via sensors, communicating data through networks, analyzing the data, and taking action.
3) Several potential research topics in IoT are proposed, including applying deep learning for intrusion detection in IoT networks, finding dead zones in large IoT networks, and developing governance models for machine learning algorithms within IoT.
IoT Standardization and Implementation ChallengesAhmed Banafa
Â
The rapid evolution of the IoT market has caused an explosion in the number and variety of IoT solutions.
Additionally, large amounts of funding are being deployed at IoT startups.
Consequently, the focus of the industry has been on manufacturing and producing the right types of hardware to enable those solutions.
For the IoT industry to thrive, there are three categories of challenges to overcome: technology, business, and society. The upcoming webinar will shed some on what issues to expect soon.
Key challenges facing the future of IoTAhmed Banafa
Â
The Internet of Things (#IoT) phenomenon—ubiquitous connected things providing key physical data and further processing of that data in the cloud to deliver business insights— presents a huge opportunity for many players in all businesses and industries. Many companies are organizing themselves to focus on IoT and the connectivity of their future products and services. For the IoT industry to thrive there are three categories of challenges to overcome and this is true for any new trend in technology not only IoT:
IoT Challenges
Technology
Business
Society
The Internet of Things (IoT) refers to a vast network of interconnected physical devices, objects, and systems that can collect and exchange data over the internet. These devices are equipped with sensors, actuators, and communication modules that allow them to interact with each other, as well as with centralized systems or cloud platforms.
The document discusses the Internet of Things (IoT) and some of the key challenges. It notes that IoT data is multi-modal, distributed, heterogeneous, noisy and incomplete. It raises issues around data management, actuation and feedback, service descriptions, real-time analysis, and privacy and security. The document outlines research challenges around transforming raw data to actionable information, machine learning for large datasets, making data accessible and discoverable, and energy efficient data collection and communication. It emphasizes that IoT data integration requires solutions across physical, cyber and social domains.
The document discusses Internet of Things (IoT) and its key aspects. It defines IoT as connecting physical objects through sensors and software to exchange data over the internet. IoT devices collect and share sensor data by connecting to gateways and the cloud to be analyzed with minimal human intervention. The document outlines technologies like sensors, connectivity, cloud computing and AI that enable IoT. It also discusses challenges of IoT like scalability, security, data analytics and interoperability.
The document discusses the evolution of the internet from static Web 1.0 pages to today's dynamic Web 2.0 and upcoming Web 3.0. It defines the Internet of Things (IoT) as connecting physical objects through sensors and internet connectivity. Examples discussed include connecting devices in homes, cities, healthcare, mining and law enforcement. Challenges of IoT include bandwidth, power consumption, security and data management. Standards organizations are working to address these issues and advance IoT technologies. The future may see an "Internet of Everything" connecting people, processes, data and physical things.
The document summarizes Mahdi Fahmideh's presentation on developing IoT based systems. It discusses key challenges in IoT development including security, interoperability, scalability, and data management. It emphasizes the importance of using information systems development methods to manage complexity when building IoT platforms. The presentation then outlines a generic IoT development method including phases, roles, and models. It provides recommendations for designing IoT methods and implications for research including tailoring methods based on scenarios and addressing requirements analysis and human aspects of IoT development.
In this presentation, Shail introduces IoT and associated trends. Shail has a lot of experience in Gesture Based Robot, Wireless Applications, Line follower Robot, Obstacle Avoider, Edge avoider etc. and his interest areas are also the same.
This document provides an overview of the Internet of Things (IoT) including:
1) A definition of IoT and discussion of its vision to create a network of billions of connected devices.
2) Descriptions of the key enablers that allow IoT to function such as smart devices, communication networks, cloud computing, and sensors.
3) An outline of some of the major challenges with IoT including handling big data, security, bandwidth issues, standardization, and power consumption.
4) Examples of applications of IoT in areas like healthcare, infrastructure, automotive, and connected vehicles.
The document provides an overview of a presentation on cyber physical systems and security challenges. It introduces the speaker, Nitin Garg, and the event location, ALTTC Ghaziabad. It then outlines topics that will be covered, including where technology currently stands, industry 4.0, cyber physical system classification and description, IoT/IIoT connectivity, security issues and challenges, and the impact of COVID-19 on industry 4.0.
Group 4 IT INfrastructure Group presentation Final [Auto-saved].pptxOdedeleIfeoluwa
Â
This document discusses big data, internet of things (IoT), and analytics in networks. It begins with an introduction to the rise of interconnected devices and vast amounts of data generated through IoT. It then outlines a plan to discuss big data characteristics, the concept of IoT, and different types of analytics in networks. Specific sections cover background on big data and IoT, performance, security, and predictive analytics, and case studies are provided on applying network monitoring in smart cities and industrial IoT. The document concludes that network analytics plays a critical role in IoT deployments by providing insights to improve decision-making, efficiency, and user experience.
This document provides an inventory and overview of slide sets related to IoT (Internet of Things) technologies presented by Bob Marcus. It includes links to slide sets on various topics like IoT interfaces, data processing in cyber-physical systems, and IoT use cases. It also lists additional resources like top IoT news sites, Gartner's top 10 IoT technologies for 2017-2018, and a link to an IEEE document discussing technological and social aspects of IoT.
Internet of Things(IoT):
Exploring The World of The Internet of Things.
Internet of Things, refers to a network of physical objects embedded with sensors, software, and connectivity capabilities, allowing them to collect and exchange data. These interconnected devices, ranging from everyday objects to industrial machinery, communicate with each other and with the internet, enabling automation, remote monitoring, and intelligent decision-making.
Similar to Internet of Things: Research Directions (20)
In this thesis, we propose a novel Feature Selection framework, called Sparse-Modeling Based Approach for Class Specific Feature Selection (SMBA-CSFS), that simultaneously exploits the idea of Sparse Modeling and Class-Specific Feature Selection. Feature selection plays a key role in several fields (e.g., computational biology), making it possible to treat models with fewer variables which, in turn, are easier to explain, by providing valuable insights on the importance of their role, and might speed the experimental validation up. Unfortunately, also corroborated by the no free lunch theorems, none of the approaches in literature is the most apt to detect the optimal feature subset for building a final model, thus it still represents a challenge. The proposed feature selection procedure conceives a two steps approach: (a) a sparse modeling-based learning technique is first used to find the best subset of features, for each class of a training set; (b) the discovered feature subsets are then fed to a class-specific feature selection scheme, in order to assess the effectiveness of the selected features in classification tasks. To this end, an ensemble of classifiers is built, where each classifier is trained on its own feature subset discovered in the previous phase, and a proper decision rule is adopted to compute the ensemble responses. In order to evaluate the performance of the proposed method, extensive experiments have been performed on publicly available datasets, in particular belonging to the computational biology field where feature selection is indispensable: the acute lymphoblastic leukemia and acute myeloid leukemia, the human carcinomas, the human lung carcinomas, the diffuse large B-cell lymphoma, and the malignant glioma. SMBA-CSFS is able to identify/retrieve the most representative features that maximize the classification accuracy. With top 20 and 80 features, SMBA-CSFS exhibits a promising performance when compared to its competitors from literature, on all considered datasets, especially those with a higher number of features. Experiments show that the proposed approach might outperform the state-of-the-art methods when the number of features is high. For this reason, the introduced approach proposes itself for selection and classification of data with a large number of features and classes.
Quantum computers are incredibly powerful machines that take a new approach to processing information. Built on the principles of quantum mechanics, they exploit complex and fascinating laws of nature that are always there, but usually remain hidden from view. By harnessing such natural behavior, quantum computing can run new types of algorithms to process information more holistically. They may one day lead to revolutionary breakthroughs in materials and drug discovery, the optimization of complex manmade systems, and artificial intelligence. We expect them to open doors that we once thought would remain locked indefinitely. Acquaint yourself with the strange and exciting world of quantum computing.
A Sparse-Coding Based Approach for Class-Specific Feature SelectionDavide Nardone
Â
Feature selection (FS) plays a key role in several fields and in particular computational biology, making it possible to treat models with fewer variables, which in turn are easier to explain and might speed the experimental validation up, by providing valuable insight into the importance and their role. Here, we propose a novel procedure for FS conceiving a two-steps approach. Firstly, a sparse coding based learning technique is used to find the best subset of features for each class of the training data. In doing so, it is assumed that a class is represented by using a subset of features, called representatives, such that each sample, in a specific class, can be described as a linear combination of them. Secondly, the discovered feature subsets are fed to a class-specific feature selection scheme, to assess the effectiveness of the selected features in classification task. To this end, an ensemble of classifiers is built by training a classifier, one for each class on its own feature subset, i.e., the one discovered in the previous step and a proper decision rule is adopted to compute the ensemble responses.
To assess the effectiveness of the proposed FS approach, a number of experiments have been performed on benchmark microarray data sets, in order to compare the performance to several FS techniques from literature. In all cases, the proposed FS methodology exhibits convincing results, often overcoming its competitors.
A Biological Smart Platform for the Environmental Risk AssessmentDavide Nardone
Â
This document describes a biological smart platform for environmental risk assessment. It consists of sensors that collect data, a Web of Things platform, and a web application. The data is analyzed using fuzzy inference systems and machine learning techniques. The goals are to assess environmental risks both qualitatively and quantitatively and visualize the information for users. The platform uses a multi-tier architecture with things, connectivity layers, a global infrastructure cloud, and applications. Data is ingested using Apache Kafka and Spark Streaming and stored in the cloud. The web application provides a cross-platform interface for users to access the risk assessments.
Online Tweet Sentiment Analysis with Apache SparkDavide Nardone
Â
Sentiment Analysis (SA) relates to the use of: Natural Language Processing (NLP), analysis and computational linguistics text to extract and identify subjective information in the source material. A fundamental task of SA is to "classify" the polarity of a given document text, phrases or levels of functionality/appearance - whether the opinion expressed in a document or in a sentence is positive, negative or neutral. Usually, this analysis is performed "offline" using Machine Learning (ML) techniques. In this project two online tweet classification methods have been proposed, which exploits the well known framework "Apache Spark" for processing the data and the tool "Apache Zeppelin" for data visualization.
Blind Source Separation using Dictionary LearningDavide Nardone
Â
The sparse decomposition of images and signals found great use in the field of: Compression, Noise removal and also in the Sources separation. This implies the decomposition of signals in the form of linear combinations with some elements of a redundant dictionary. The dictionary may be either a fixed dictionary (Fourier, Wavelet, etc) or may be learned from a set of samples. The algorithms based on learning the dictionary can be applied to a broad class of signals and have a better compression performance than methods based on fixed dictionary. Here we present a Compressed Sensing (CS) approach with an adaptive dictionary for solving a Determined Blind Source Separation (DBSS). The proposed method has been developed by reformulating a DBSS as Sparse Coding (SC) problem. The algorithm consist of few steps: Mixing matrix estimation, Sparse source separation and Source reconstruction. A sparse mixture of the original source signals has been used for the estimating the mixing matrix which have been used for the reconstruction of the of the source signals. A 'block signal representation' is used for representing the mixture in order to greatly improve the computation efficiency of the 'mixing matrix estimation' and the 'signal recovery' processes without particularly lose separation accuracy. Some experimental results are provided to compare the computation and separation performance of the method by varying the type of the dictionary used, be it fixed or an adaptive one. Finally a real case of study in the field of the Wireless Sensor Network (WSN) is illustrated in which a set of sensor nodes relay data to a multi-receiver node. Since more nodes transmits messages simultaneously it's necessary to separate the mixture of information at the receiver, thus solving a BSS problem.
Accelerating Dynamic Time Warping Subsequence Search with GPUDavide Nardone
Â
Many time series data mining problems require
subsequence similarity search as a subroutine. While this can
be performed with any distance measure, and dozens of
distance measures have been proposed in the last decade, there
is increasing evidence that Dynamic Time Warping (DTW) is
the best measure across a wide range of domains. Given
DTW’s usefulness and ubiquity, there has been a large
community-wide effort to mitigate its relative lethargy.
Proposed speedup techniques include early abandoning
strategies, lower-bound based pruning, indexing and
embedding. In this work we argue that we are now close to
exhausting all possible speedup from software, and that we
must turn to hardware-based solutions if we are to tackle the
many problems that are currently untenable even with stateof-
the-art algorithms running on high-end desktops. With this
motivation, we investigate both GPU (Graphics Processing
Unit) and FPGA (Field Programmable Gate Array) based
acceleration of subsequence similarity search under the DTW
measure. As we shall show, our novel algorithms allow GPUs,
which are typically bundled with standard desktops, to achieve
two orders of magnitude speedup. For problem domains which
require even greater scale up, we show that FPGAs costing just
a few thousand dollars can be used to produce four orders of
magnitude speedup. We conduct detailed case studies on the
classification of astronomical observations and similarity
search in commercial agriculture, and demonstrate that our
ideas allow us to tackle problems that would be simply
untenable otherwise.
Lempel–Ziv–Welch (LZW) is a universal lossless data compression algorithm created by Abraham Lempel, Jacob Ziv, and Terry Welch. It was published by Welch in 1984 as an improved implementation of the LZ78 algorithm published by Lempel and Ziv in 1978. The algorithm is simple to implement, and has the potential for very high throughput in hardware implementations.
It is the algorithm of the widely used Unix file compression utility compress, and is used in the GIF image format.
This presentation provides valuable insights into effective cost-saving techniques on AWS. Learn how to optimize your AWS resources by rightsizing, increasing elasticity, picking the right storage class, and choosing the best pricing model. Additionally, discover essential governance mechanisms to ensure continuous cost efficiency. Whether you are new to AWS or an experienced user, this presentation provides clear and practical tips to help you reduce your cloud costs and get the most out of your budget.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Â
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
Â
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Dive into the realm of operating systems (OS) with Pravash Chandra Das, a seasoned Digital Forensic Analyst, as your guide. 🚀 This comprehensive presentation illuminates the core concepts, types, and evolution of OS, essential for understanding modern computing landscapes.
Beginning with the foundational definition, Das clarifies the pivotal role of OS as system software orchestrating hardware resources, software applications, and user interactions. Through succinct descriptions, he delineates the diverse types of OS, from single-user, single-task environments like early MS-DOS iterations, to multi-user, multi-tasking systems exemplified by modern Linux distributions.
Crucial components like the kernel and shell are dissected, highlighting their indispensable functions in resource management and user interface interaction. Das elucidates how the kernel acts as the central nervous system, orchestrating process scheduling, memory allocation, and device management. Meanwhile, the shell serves as the gateway for user commands, bridging the gap between human input and machine execution. đź’»
The narrative then shifts to a captivating exploration of prominent desktop OSs, Windows, macOS, and Linux. Windows, with its globally ubiquitous presence and user-friendly interface, emerges as a cornerstone in personal computing history. macOS, lauded for its sleek design and seamless integration with Apple's ecosystem, stands as a beacon of stability and creativity. Linux, an open-source marvel, offers unparalleled flexibility and security, revolutionizing the computing landscape. 🖥️
Moving to the realm of mobile devices, Das unravels the dominance of Android and iOS. Android's open-source ethos fosters a vibrant ecosystem of customization and innovation, while iOS boasts a seamless user experience and robust security infrastructure. Meanwhile, discontinued platforms like Symbian and Palm OS evoke nostalgia for their pioneering roles in the smartphone revolution.
The journey concludes with a reflection on the ever-evolving landscape of OS, underscored by the emergence of real-time operating systems (RTOS) and the persistent quest for innovation and efficiency. As technology continues to shape our world, understanding the foundations and evolution of operating systems remains paramount. Join Pravash Chandra Das on this illuminating journey through the heart of computing. 🌟
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfflufftailshop
Â
When it comes to unit testing in the .NET ecosystem, developers have a wide range of options available. Among the most popular choices are NUnit, XUnit, and MSTest. These unit testing frameworks provide essential tools and features to help ensure the quality and reliability of code. However, understanding the differences between these frameworks is crucial for selecting the most suitable one for your projects.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
Â
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Â
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Â
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Â
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
Â
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Â
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
Â
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
2. Research Directions for IoT
1. Introduction
2. IoT vision and contexts
3. The main IoT research directions:
A. Massive scaling
B. Architecture and Dependencies
C. Creating knowledge and Big Data
D. Robustness
E. Openness
F. Security
G. Privacy
H. Humans in the Loop
4. Conclusion
Outline
3. Research Directions for IoT
• Using the Internet as a global platform for communication, dialogue,
calculation and the interconnection of devices has been shaping a new
world: a combination of new methods and technologies which are the
basis of a variety of smart context.
• The creation of these scenarios has been investigated from different
and disjointed scientific communities as:
• Mobile Computing (MB);
• Pervasive Computing (PC);
• Wireless Sensor Networks (WSN);
• Cyber-Physical-Systems (CPS).
Introduction
4. Research Directions for IoT
• Since the technology progresses, the overlapping and the combination
of topics and research questions has increased to such a point that
there are no more specific definitions for the previous mentioned fields.
• Many researches in the fields of IoT, PC, MC, WSN and CPS often rely
on underlying technologies such as Machine Learning, Real-Time
Computing, Signal Processing, Security, etc.
It’s clear the need for cooperation between the several communities for the
improvement and the resolution of various interesting research problem
regarding these environments.
Introduction (cont.)
Machine
Learnig
Security Privacy
5. Research Directions for IoT
• For many people, the concept of Smart City is no longer a vision so far
away.
• Many infrastructures are already equipped with no sensor and actuator
able to:
• Monitoring entire system and
• Interact with each other, in order to exchange information and so to
improve the quality of one or more services.
IoT vision and contexts
6. Research Directions for IoT
• IoT: an essential and integrated infrastructure on which
many application and services can be run.
• System of systems that synergistically interact with each other to
create new and not predicable services.
IoT vision and contexts (cont.)
7. Research Directions for IoT
What is that vision?
Examples
• Global transport systems
• City without traffic lights and 3D transport vehicles
• Buildings that will control energy, health, comfort
• People with bionic fragments for detecting
physiologic parameters.
• etc
Examples
• Input: Biometric systems
• Output: Holographic display
Some examples
8. Research Directions for IoT
• The continuing growth of the sensors and the improving of the
related processes will produce continuous qualitative changes in
different contexts.
IoT benefits
9. Research Directions for IoT
• Given the massive amount of devices connected today (~ 24 billion),
the research [1] has reported that by 2020 the revenues achieved from
the sale of smart devices and the services offered to them will be
about $ 2,500 billion dollars.
Industry /use case Economic value
1. Smart car $ 600 billions
2. Clinical Remote Monitoring $ 350 billions
3. Assisted Life $ 270 billions
4. Home and Buildings Security $ 250 billions
5. Car insurance “Pay-As-You-Drive” $ 245 billions
6. New business models for car usage $ 225 billions
7. Smart meters $ 105 billions
8. Traffic management $ 100 billions
9. Electric vehicle charging $ 75 billions
10. Building automation systems $ 40 billions
IoT benefits (cont.)
10. Research Directions for IoT
IoT challenges and benefits
? Challenges âś“ Benefits
• People / Society • Better and faster information
• Security / Privacy • Improving education
• Authority • Regulation / Legislation
• Standard / Policies • Life quality
• Resource Efficiency • Greater awareness
• Technology Architecture / Infrastructure • Increased production
• Costs • Wider experiences
• Pollution / Prevention disasters • Better decision making
• Innovation Management • Resource optimization
• Energy / Power Consumption • Human error removal
• Growth Data and analysis • More services
11. Research Directions for IoT
• The research area required to obtain such IoT vision requires a
significant study into many directions.
Research
A. Massive scaling
B. Architecture and Dependencies
C. Creating knowledge and Big Data
D. Robustness
E. Openness
F. Security
G. Privacy
H. Humans in the Loop
12. Research Directions for IoT
• Recent studies [2] have estimated that ~50 billion devices will be
connected to the internet by 2020.
A. Massive Scaling
13. Research Directions for IoT
Massive Scaling (cont.)
• Some of the many questions that we ask are:
• Will be IPV6 enough?
• Will emerge new standards and protocols?
• How will the devices (including mobile devices) to be
discovered?
• How will the real-time and reliability issues to be supported?
• etc.
It’s almost unlikely that any solution will be immediately
become the norm!
14. Research Directions for IoT
Simulation of large-scale IoT systems (using particular operating system
[3][4]) for the evaluation and optimization of specific aspects:
• Application Layer
• Energy consumption
• Code reuse
• Network connection
• etc.
Among the different existing approaches, a hybrid simulation
environment based on a combination of framework with simulators at the
system-level:
• It would reduce the gap between the research and the
implementations;
• It also would strengthen the simulation studies in the IoT field.
Massive Scale Simulation
15. Research Directions for IoT
• Since billions of devices are connected to the internet, it’s necessary
to provide an appropriate architecture that easily allow: connectivity,
communication, control and useful applications.
MOBILE APPROACH
Advantages (+) Disadvantages (-)
• Unlimited application development. • Interference problems due the sharing of
sensors and systems implementation
among multiple applications.
• Automatic controls for the execution of an
application on a specific platform.
• Dependence of IT methodologies based
on the assumption about the environment,
the hardware platform, naming, control
and various semantic devices.
• How all these “objects” will interact with each other?
B. Architecture and Dependencies
16. Research Directions for IoT
Let’s suppose the integration of different systems responsible for the electricity
management (control thermostats, windows, doors, etc.) and the health care
(ECG measurement, temperature, sleep, activities, etc.).
Advantages
• Information sharing: this would allow the electricity management systems to
regulate the temperature of the rooms according to the physiological status of
the residents.
• Integration between systems: this would avoid unpleasant situations; for
instance the system will deactivate medical devices to save power while they
are used as suggested by the health care system.
• Sharing sensors and actuators: this would reduce the costs of
implementing/distribution, improving the aesthetics of the rooms and reducing
the flow of content.
Example: Architecture and Dependencies
17. Research Directions for IoT
Challenges
• Each system has its own assumptions and strategies for its control.
• A lack of knowledge about the other systems would cause many conflicts when
they are integrated without particular attention.
Example of interference
• The health care system could detect depression and decide to turn on all the
lights. On the other hand, the electricity management system may decide to
turn off the lights due to the absence of motion.
Example (cont.)
18. Research Directions for IoT
Research topics to be addressed
• Development of new approaches for the detection and
resolution of dependencies between applications.
• Autonomous decentralized architecture inspired by the
connection of sensor nodes.
• Introduction of cloud structures, architectures guided by
events, disconnected operation and synchronization.
IoT: Architecture and Dependencies
19. Research Directions for IoT
• IoT is the next technological revolution that is estimated to produce
over 44 Zettabyte of data (4.4e+10 Terabyte) by 2020 [5].
• Almost all the “objects” or devices will have an IP address, and will
be connected to each other.
• Given the incredible amount of data generated, new mechanisms will
be needed for:
• Collecting and selecting data
• Data pre-processing
• Turn raw data into useful information
• Extracting information
• Data interpretation
C. Creating knowledge and Big Data
20. Research Directions for IoT
The main Big Data challenges in the IoT context are:
• Reliability
• Data security
• Big Data collection
• Identification of redundant data
• Data interpretation and creation of useful information that
includes noise
• Development of inference techniques that do not suffer of the
Bayesian and Dempster limitation
• Correct data binding
• Ect.
IoT & Big Data: Main challanges
21. Research Directions for IoT
• Reliability is one of the most important aspects of the use of Big
Data.
Development of new calibration techniques and transport protocols:
• Ensure that following inference do not operate on incorrect data
or data with too many missing data!
• Ensure “safe” operations of the actuators
• Draw up good decisions.
Possible solutions
• Associate a confidence level (in the form of probability) to the
information derived from the date.
• Using Fuzzy Logic [4].
• Minimizing the number of false negatives and false positives.
IoT & Big Data: Reliability
22. Research Directions for IoT
• IoT has launched new security challenges that cannot be addressed
by using traditional security mechanism.
• Addressing the security concerns of the IoT requires a paradigm
shift.
For example, how do you deal with the situation where the fridge and coffee
maker are equipped with hidden Wi-Fi access and spammers?
According to the experts, the problem of data security has two major
aspects:
1. Confidentiality
2. Protection
IoT & Big Data: Security
23. Research Directions for IoT
Companies need only to collect data related to their business, and this
requires:
• Filtering techniques on redundant data and protection data
techniques.
• Efficient mechanisms that include software and protocols.
Solutions
• One approach is to use devices with sensors for data collections, in
combination with transport protocols such as: Message Queue Telemetry
Transport (MQTT) and Data Distribution Service (DDS).
Example
One of the most important transportation companies in the world, UPS, uses
sensors in its vehicle to improve delivery performance and reduce coast.
• These data help UPS out in reducing fuel consumption, harmful emissions
and waste time.
IoT & Big Data: Big Data Collection
24. Research Directions for IoT
Problems in the collection of Big Data
By the statistic coming from [6], it’s shown the various challenges that
companies have faced with the data collection activities.
19%
13%
9%
22%
25%
12%
Big Data challenges Problems in data collection
Unreliable data collection
Slowness in data collection
Cumbersome amout of data to
analyze properly
Techniques for analysis and
data processing premature
Existing business processes
not flexible for the efficient
collection of data
25. Research Directions for IoT
• Not all device provide useful information.
• It’s not easy to filter data in real-time.
53%
47%
Rationale: Methods of inefficient
data collection.
Do not track their projects with quantifiable metrics
They do not measure the progress of their IoT
projects
13%
87%
96% of organizations have difficulties
to filter large amounts of redundant
data.
Able to collecting data efficiently
Recognize the benefits for their business
Survey conducted by Parstream [6]
IoT & Big Data: Identifying redundant data
26. Research Directions for IoT
IoT offers an exciting prospect from the point of view of Big Data, but
it’s necessary to:
• Optimize the entire setup for managing the IoT impact in the
context of the Big Data.
• Solve the problems concerning the security & the privacy and
the efficient data collection.
There’s hope that these issues may be efficiently solved since both IoT and the
infrastructure for its management are in the early stages.
IoT & Big Data: Summary
27. Research Directions for IoT
IoT vision: Application based on sensors, actuators and communication
distributed platforms connected to a network of “objects”.
In such distributions it is common for devices to know:
• their positions
• nearby devices cooperating having
• synchronized clocks
• Consistent parameter setting such as: sleep, wake, battery levels and security
key pairs.
Challenges
The deterioration of these conditions cause the break up of the clocks that:
• Causes the nodes to have different time shift, that leads to failures
within the system.
Solutions
Synchronization techniques are used in this context [7].
D. Robustness
28. Research Directions for IoT
• Although it is recognized that the synchronization of the clock is
necessary, this simple concept is too general.
• More serious problem is the physical relocation of the sensor nodes.
• (e.g., random-temporal displacement of one or more nodes)
The higher the entropy, the greater the disorder and less energy is available in the
system to do useful things.
Robustness (cont.)
29. Research Directions for IoT
- Goal: Create a robust system that can cope with changes in its
operations without suffering serious damage or loss of functions.
How can it possible to keep a persistent, dynamic and mobile IoT
system?
- Method: The consistency services required (entropy) must to be
combined with other approaches for producing a robust system,
ensuring:
• Persistence: Automatic operations for organization, monitoring,
diagnostic and repair.
• Dynamism and mobility: Methods for the development of
reliable code, online tolerance errors and locally debbuging.
Robustness: consideration
30. Research Directions for IoT
The majority of sensor-based systems were closed systems.
• (e.g., cars, planes, and ships have had network sensor systems
operating largely within the vehicle itself).
The capabilities of these systems are increasing rapidly.
Some example are:
• Cars transmitting information assistance.
• Airplanes sending technical real-time information.
• Cars communicating with each other and control each other to avoid
collisions.
• Doctors who interact in real-time with their patients analyzing
physiological data, automatically loaded.
In order to achieve such benefits, the systems requires openness, but…
What does it mean the Openness of such systems?
E. Openness
31. Research Directions for IoT
Research problems to the openness support
• Rethinking of the current composition techniques, analysis and the respective
tools.
• New communication interface to enable the efficient exchange on information
between the systems.
• Difficulties with security and privacy.
It’s necessary to provide a “fair balance” between:
Functionality, Security and Ease of Use.
Openness (cont.)
32. Research Directions for IoT
• Key issue which will become more and more intense every day.
• The greater the volume of sensitive data (Big Data’s V) that
moves in IoT, the higher is the risk of data theft and identity,
manipulation of devices, data faking, IP theft, etc.
F. Security
Problems
• IoT products are often sold with old
embedded operating systems and software
products.
• Many of these systems/software (designed
to be safe) are still vulnerable.
33. Research Directions for IoT
The vulnerabilities found in the IoT have drawn attention to the topic
of “security”. Some types of threats are:
• Failures of devices (disrupt services)
• Violation of the privacy (steal information)
• Control of devices (take control)
IoT: Vulnerability
34. Research Directions for IoT
Given the particular nature of these devices, IoT has the following
challenges to face:
1. Critical functions
2. Replication
3. Difficulty in repairing
4. Security assumptions
5. Long life cycle
6. etc.
What are the challenges to be addressed to ensure the security of
embedded devices and to secure IoT?
Security: IoT challenges
Solutions used for standard computer do not solve the IoT security
issues of embedded devices, due to the their heterogeneity.
35. Research Directions for IoT
Security features Implementation on embedded devices
Secure boot Security standard that ensures that the device boots using only
secure software (software signature check).
Secure code updates Safe methods for updating the code, bugging fixes, security
patches, etc. (use the signed code).
Data security Prevent unauthorized access to the device, encrypting the data
storage and / or communication.
Authentication All communications with devices should be authenticated with
strong passwords.
Secure communication Communication to and from the devices must be secured using
encrypted protocols (SSH, SSL, etc.).
Protection against cyber attacks Integrated firewall to restrict communications to only trusted host,
blocking hackers before they can launch attacks.
Intrusion detection and security
monitoring
Detection and communication of disabled login attempts and other
potential malicious activity.
Tamper detection on device New processors / cards that have capacity of device tampering
detection.
Self Healing Methods for "healing" from cyber attacks (e.g., code updates).
Security requirements
36. Research Directions for IoT
• Significant hardware supports [8] encryption, authentication and key
tampering.
• Ensure the connection between the gateway devices and the
corporate network or factory.
• Greater effort to protect the IoT data, to ensure consumer privacy
and functionality of the company.
• Solid action plan for the installation of security updates.
What is left to do?
37. Research Directions for IoT
IoT may become the term most in vogue
of the day at the workplace.
87% of the customers do not know what
the IoT is [9], but they are aware of:
1. Granting of their personal (to retailers)
data by means of devices.
2. Annoyed in sharing their data.
Requirement for companies to develop
better criteria for communicating the
utilization and sharing data of its
customers.
G. Privacy
38. Research Directions for IoT
Solutions
1. Specific privacy policies for each domain / system and
2. Privacy reinforcement in the IoT infrastructure of the IoT
applications.
IoT paradigm
1. Expression of users' requests for accessing to the data and the
policies they have adopted.
2. Assessment of the requests to ensure whether or not their
permission.
• Advantages: The ubiquity and interaction involved in IoT will provide
many useful benefits and services.
• Disadvantages: It will create many circumstances for privacy
violation.
Privacy (cont.)
39. Research Directions for IoT
The current legislation does not properly express the privacy policies for
the following requirements:
1. Expression of different types of contexts (time, space, etc.).
2. Representation of different types of data owners (human and
non-human entities).
3. Representation of high-level aggregation requests by anonymous
functions.
4. The need to support not only adherence to privacy for queries of
data, but also privacy on request to set a system’s parameters.
5. Allow dynamic changes in policies
One of the main problem concerns the interaction between different
systems (each with its own privacy policies), which could give rise to
many inconsistencies.
Privacy problems
40. Research Directions for IoT
DEF: Human-in-the-loop (HITL) is defined as a model that requires
human interaction.
• Many IoT applications involves the interaction between objects and
humans.
Advantages: HITL offers exciting opportunities to a wide range of
applications (i.e. energy management, health care, etc.).
Disadvantages: Hard modeling of human behavior because of its
complex physiological, psychological and behavioral aspects.
New research is needed to:
1. Increase the control of HITL in designing systems;
2. Solve the following three challenges.
H. Human in the loop
41. Research Directions for IoT
First challenge
• The need for a comprehensive understanding of the complete
spectrum of types of human-in-the-loop controls..
The wide heterogeneity and the subtle differences of HITL generates
various problems in the creation of a single system.
The HITL applications can be classified into four categories:
1. Global system control by human being (e.g., surveillance
monitoring).
2. Passive monitoring of the human system, adopting appropriate
measures (e.g., eating habits).
3. Modeling of human physiological parameters.
4. Hybrids of 1, 2 and 3.
Main challenges of HITL (1)
42. Research Directions for IoT
Second challenge
• The need for extensions to system identification or other techniques to
derive models of human behaviors..
Advantages: The identification systems are very powerful tools for
creating models.
Disadvantages: Very difficult to apply to human behavior.
Example:
• If we were to use "identification techniques" to shape a human being who is
suffering from depressive illness, there would be many questions about:
• Type of inputs;
• Possible states;
• Change states according to different physiological, psychological and
environmental states.
The existence of a formal or estimated model of the "human behavior"
could help us to close the loop!
Main challenges of HITL (2)
43. Third challenge
• Determining how to incorporate human behavior models into the
formal methodology of feedback control.
Example:
• Optimization of human behavior based on reports of accidents and incidents
that occur during operation of an electric power system:
• Components Models of Emotion (CME) for observing, recording, and
analyzing the emotional component of the operator's behavior.
• Simulation of the dynamic behavior of an operator in performing
operations in a context that leads to an error.
If we could incorporate into the system such a behavioral model, we
would be able to analyze various security features of the entire system.
Research Directions for IoT
Main challenges of HITL (3)
44. Research Directions for IoT
• IoT is a chance to make our world smarter.
• IoT is a very profitable field of application for companies.
• IoT has a good implications in different application fields (health,
transport, etc.).
• The ongoing research needs to intensify to benefit from the above
mentioned points and to solve new problems that arise due to:
• Growing number of connected devices;
• Openness of the systems;
• Continuous privacy and security problems.
Expectations
It is hoped that there is more cooperation between the research
communities in order to:
• Solve the myriad of problems as soon as possible;
• Avoid reinventing the wheel when a particular community solves a problem.
Conclusion
45. Research Directions for IoT
[1] Gartner Says the Internet of Things Installed Base Will Grow to 26 Billion Units By
2020 (http://www.gartner.com/newsroom/id/2970017).
[2] http://www.cisco.com/c/dam/en_us/about/ac79/docs/innov IoT_IBSG_0411FINAL.pdf
[3] P. Levis, N. Lee, M. Welsh, and D. Culler. TOSSIM: Accurate and scalable simulation
of entire TinyOS applications. In SenSys'03: Proceedings of the First International
Conference on Embedded Networked Sensor Systems.
[4] K. Shang, Z. Hossen. Applying fuzzy logic to risk assessment and decision-making
[5] https://www.emc.com/leadership/digital-universe/2014iview/index.htm
[6] Internet of things (Iot) Meets Big Data anD analytIcs: a survey of Iot stakeholDers.
Sponsored by Parstream. December 12, 2013.
[7] M. Maroti, B. Kusy, G. Simon, and A. Ledeczi, “The flooding time synchronization
protocol,” in Proc. 2nd Int. Conf. Embedded Netw. Sens. Syst. (ACM SenSys’04), Nov.
2004.
[8] S. Ravi, A. Raghunathan, and S. Chakradhar, “Tamper resistance mechanisms for
secure, embedded systems,” in Proc. 17th Int. Conf. VLSI Des., 2004.
[9] http://go.pardot.com/l/69102/2015-07-12/pxzlm.
[10] http://www.globaltelecomsbusiness.com/article/2985699/Connected-devices-will-be-
worth-45t.html
[11] F. Osterlind, A. Dunkels, J. Eriksson, N. Finne, and T. Voigt. Cross-level sensor
network simulation with cooja. In Local Computer Networks, Proceedings 2006 31st IEEE
Conference.
References