SlideShare a Scribd company logo
Davide Nardone
May, 2016
Internet of Things:
Research Directions
PARTHENOPE
UNIVERSITY
Research Directions for IoT
1. Introduction
2. IoT vision and contexts
3. The main IoT research directions:
A. Massive scaling
B. Architecture and Dependencies
C. Creating knowledge and Big Data
D. Robustness
E. Openness
F. Security
G. Privacy
H. Humans in the Loop
4. Conclusion
Outline
Research Directions for IoT
• Using the Internet as a global platform for communication, dialogue,
calculation and the interconnection of devices has been shaping a new
world: a combination of new methods and technologies which are the
basis of a variety of smart context.
• The creation of these scenarios has been investigated from different
and disjointed scientific communities as:
• Mobile Computing (MB);
• Pervasive Computing (PC);
• Wireless Sensor Networks (WSN);
• Cyber-Physical-Systems (CPS).
Introduction
Research Directions for IoT
• Since the technology progresses, the overlapping and the combination
of topics and research questions has increased to such a point that
there are no more specific definitions for the previous mentioned fields.
• Many researches in the fields of IoT, PC, MC, WSN and CPS often rely
on underlying technologies such as Machine Learning, Real-Time
Computing, Signal Processing, Security, etc.
It’s clear the need for cooperation between the several communities for the
improvement and the resolution of various interesting research problem
regarding these environments.
Introduction (cont.)
Machine
Learnig
Security Privacy
Research Directions for IoT
• For many people, the concept of Smart City is no longer a vision so far
away.
• Many infrastructures are already equipped with no sensor and actuator
able to:
• Monitoring entire system and
• Interact with each other, in order to exchange information and so to
improve the quality of one or more services.
IoT vision and contexts
Research Directions for IoT
• IoT: an essential and integrated infrastructure on which
many application and services can be run.
• System of systems that synergistically interact with each other to
create new and not predicable services.
IoT vision and contexts (cont.)
Research Directions for IoT
What is that vision?
Examples
• Global transport systems
• City without traffic lights and 3D transport vehicles
• Buildings that will control energy, health, comfort
• People with bionic fragments for detecting
physiologic parameters.
• etc
Examples
• Input: Biometric systems
• Output: Holographic display
Some examples
Research Directions for IoT
• The continuing growth of the sensors and the improving of the
related processes will produce continuous qualitative changes in
different contexts.
IoT benefits
Research Directions for IoT
• Given the massive amount of devices connected today (~ 24 billion),
the research [1] has reported that by 2020 the revenues achieved from
the sale of smart devices and the services offered to them will be
about $ 2,500 billion dollars.
Industry /use case Economic value
1. Smart car $ 600 billions
2. Clinical Remote Monitoring $ 350 billions
3. Assisted Life $ 270 billions
4. Home and Buildings Security $ 250 billions
5. Car insurance “Pay-As-You-Drive” $ 245 billions
6. New business models for car usage $ 225 billions
7. Smart meters $ 105 billions
8. Traffic management $ 100 billions
9. Electric vehicle charging $ 75 billions
10. Building automation systems $ 40 billions
IoT benefits (cont.)
Research Directions for IoT
IoT challenges and benefits
? Challenges âś“ Benefits
• People / Society • Better and faster information
• Security / Privacy • Improving education
• Authority • Regulation / Legislation
• Standard / Policies • Life quality
• Resource Efficiency • Greater awareness
• Technology Architecture / Infrastructure • Increased production
• Costs • Wider experiences
• Pollution / Prevention disasters • Better decision making
• Innovation Management • Resource optimization
• Energy / Power Consumption • Human error removal
• Growth Data and analysis • More services
Research Directions for IoT
• The research area required to obtain such IoT vision requires a
significant study into many directions.
Research
A. Massive scaling
B. Architecture and Dependencies
C. Creating knowledge and Big Data
D. Robustness
E. Openness
F. Security
G. Privacy
H. Humans in the Loop
Research Directions for IoT
• Recent studies [2] have estimated that ~50 billion devices will be
connected to the internet by 2020.
A. Massive Scaling
Research Directions for IoT
Massive Scaling (cont.)
• Some of the many questions that we ask are:
• Will be IPV6 enough?
• Will emerge new standards and protocols?
• How will the devices (including mobile devices) to be
discovered?
• How will the real-time and reliability issues to be supported?
• etc.
It’s almost unlikely that any solution will be immediately
become the norm!
Research Directions for IoT
Simulation of large-scale IoT systems (using particular operating system
[3][4]) for the evaluation and optimization of specific aspects:
• Application Layer
• Energy consumption
• Code reuse
• Network connection
• etc.
Among the different existing approaches, a hybrid simulation
environment based on a combination of framework with simulators at the
system-level:
• It would reduce the gap between the research and the
implementations;
• It also would strengthen the simulation studies in the IoT field.
Massive Scale Simulation
Research Directions for IoT
• Since billions of devices are connected to the internet, it’s necessary
to provide an appropriate architecture that easily allow: connectivity,
communication, control and useful applications.
MOBILE APPROACH
Advantages (+) Disadvantages (-)
• Unlimited application development. • Interference problems due the sharing of
sensors and systems implementation
among multiple applications.
• Automatic controls for the execution of an
application on a specific platform.
• Dependence of IT methodologies based
on the assumption about the environment,
the hardware platform, naming, control
and various semantic devices.
• How all these “objects” will interact with each other?
B. Architecture and Dependencies
Research Directions for IoT
Let’s suppose the integration of different systems responsible for the electricity
management (control thermostats, windows, doors, etc.) and the health care
(ECG measurement, temperature, sleep, activities, etc.).
Advantages
• Information sharing: this would allow the electricity management systems to
regulate the temperature of the rooms according to the physiological status of
the residents.
• Integration between systems: this would avoid unpleasant situations; for
instance the system will deactivate medical devices to save power while they
are used as suggested by the health care system.
• Sharing sensors and actuators: this would reduce the costs of
implementing/distribution, improving the aesthetics of the rooms and reducing
the flow of content.
Example: Architecture and Dependencies
Research Directions for IoT
Challenges
• Each system has its own assumptions and strategies for its control.
• A lack of knowledge about the other systems would cause many conflicts when
they are integrated without particular attention.
Example of interference
• The health care system could detect depression and decide to turn on all the
lights. On the other hand, the electricity management system may decide to
turn off the lights due to the absence of motion.
Example (cont.)
Research Directions for IoT
Research topics to be addressed
• Development of new approaches for the detection and
resolution of dependencies between applications.
• Autonomous decentralized architecture inspired by the
connection of sensor nodes.
• Introduction of cloud structures, architectures guided by
events, disconnected operation and synchronization.
IoT: Architecture and Dependencies
Research Directions for IoT
• IoT is the next technological revolution that is estimated to produce
over 44 Zettabyte of data (4.4e+10 Terabyte) by 2020 [5].
• Almost all the “objects” or devices will have an IP address, and will
be connected to each other.
• Given the incredible amount of data generated, new mechanisms will
be needed for:
• Collecting and selecting data
• Data pre-processing
• Turn raw data into useful information
• Extracting information
• Data interpretation
C. Creating knowledge and Big Data
Research Directions for IoT
The main Big Data challenges in the IoT context are:
• Reliability
• Data security
• Big Data collection
• Identification of redundant data
• Data interpretation and creation of useful information that
includes noise
• Development of inference techniques that do not suffer of the
Bayesian and Dempster limitation
• Correct data binding
• Ect.
IoT & Big Data: Main challanges
Research Directions for IoT
• Reliability is one of the most important aspects of the use of Big
Data.
Development of new calibration techniques and transport protocols:
• Ensure that following inference do not operate on incorrect data
or data with too many missing data!
• Ensure “safe” operations of the actuators
• Draw up good decisions.
Possible solutions
• Associate a confidence level (in the form of probability) to the
information derived from the date.
• Using Fuzzy Logic [4].
• Minimizing the number of false negatives and false positives.
IoT & Big Data: Reliability
Research Directions for IoT
• IoT has launched new security challenges that cannot be addressed
by using traditional security mechanism.
• Addressing the security concerns of the IoT requires a paradigm
shift.
For example, how do you deal with the situation where the fridge and coffee
maker are equipped with hidden Wi-Fi access and spammers?
According to the experts, the problem of data security has two major
aspects:
1. Confidentiality
2. Protection
IoT & Big Data: Security
Research Directions for IoT
Companies need only to collect data related to their business, and this
requires:
• Filtering techniques on redundant data and protection data
techniques.
• Efficient mechanisms that include software and protocols.
Solutions
• One approach is to use devices with sensors for data collections, in
combination with transport protocols such as: Message Queue Telemetry
Transport (MQTT) and Data Distribution Service (DDS).
Example
One of the most important transportation companies in the world, UPS, uses
sensors in its vehicle to improve delivery performance and reduce coast.
• These data help UPS out in reducing fuel consumption, harmful emissions
and waste time.
IoT & Big Data: Big Data Collection
Research Directions for IoT
Problems in the collection of Big Data
By the statistic coming from [6], it’s shown the various challenges that
companies have faced with the data collection activities.
19%
13%
9%
22%
25%
12%
Big Data challenges Problems in data collection
Unreliable data collection
Slowness in data collection
Cumbersome amout of data to
analyze properly
Techniques for analysis and
data processing premature
Existing business processes
not flexible for the efficient
collection of data
Research Directions for IoT
• Not all device provide useful information.
• It’s not easy to filter data in real-time.
53%
47%
Rationale: Methods of inefficient
data collection.
Do not track their projects with quantifiable metrics
They do not measure the progress of their IoT
projects
13%
87%
96% of organizations have difficulties
to filter large amounts of redundant
data.
Able to collecting data efficiently
Recognize the benefits for their business
Survey conducted by Parstream [6]
IoT & Big Data: Identifying redundant data
Research Directions for IoT
IoT offers an exciting prospect from the point of view of Big Data, but
it’s necessary to:
• Optimize the entire setup for managing the IoT impact in the
context of the Big Data.
• Solve the problems concerning the security & the privacy and
the efficient data collection.
There’s hope that these issues may be efficiently solved since both IoT and the
infrastructure for its management are in the early stages.
IoT & Big Data: Summary
Research Directions for IoT
IoT vision: Application based on sensors, actuators and communication
distributed platforms connected to a network of “objects”.
In such distributions it is common for devices to know:
• their positions
• nearby devices cooperating having
• synchronized clocks
• Consistent parameter setting such as: sleep, wake, battery levels and security
key pairs.
Challenges
The deterioration of these conditions cause the break up of the clocks that:
• Causes the nodes to have different time shift, that leads to failures
within the system.
Solutions
Synchronization techniques are used in this context [7].
D. Robustness
Research Directions for IoT
• Although it is recognized that the synchronization of the clock is
necessary, this simple concept is too general.
• More serious problem is the physical relocation of the sensor nodes.
• (e.g., random-temporal displacement of one or more nodes)
The higher the entropy, the greater the disorder and less energy is available in the
system to do useful things.
Robustness (cont.)
Research Directions for IoT
- Goal: Create a robust system that can cope with changes in its
operations without suffering serious damage or loss of functions.
How can it possible to keep a persistent, dynamic and mobile IoT
system?
- Method: The consistency services required (entropy) must to be
combined with other approaches for producing a robust system,
ensuring:
• Persistence: Automatic operations for organization, monitoring,
diagnostic and repair.
• Dynamism and mobility: Methods for the development of
reliable code, online tolerance errors and locally debbuging.
Robustness: consideration
Research Directions for IoT
The majority of sensor-based systems were closed systems.
• (e.g., cars, planes, and ships have had network sensor systems
operating largely within the vehicle itself).
The capabilities of these systems are increasing rapidly.
Some example are:
• Cars transmitting information assistance.
• Airplanes sending technical real-time information.
• Cars communicating with each other and control each other to avoid
collisions.
• Doctors who interact in real-time with their patients analyzing
physiological data, automatically loaded.
In order to achieve such benefits, the systems requires openness, but…
What does it mean the Openness of such systems?
E. Openness
Research Directions for IoT
Research problems to the openness support
• Rethinking of the current composition techniques, analysis and the respective
tools.
• New communication interface to enable the efficient exchange on information
between the systems.
• Difficulties with security and privacy.
It’s necessary to provide a “fair balance” between:
Functionality, Security and Ease of Use.
Openness (cont.)
Research Directions for IoT
• Key issue which will become more and more intense every day.
• The greater the volume of sensitive data (Big Data’s V) that
moves in IoT, the higher is the risk of data theft and identity,
manipulation of devices, data faking, IP theft, etc.
F. Security
Problems
• IoT products are often sold with old
embedded operating systems and software
products.
• Many of these systems/software (designed
to be safe) are still vulnerable.
Research Directions for IoT
The vulnerabilities found in the IoT have drawn attention to the topic
of “security”. Some types of threats are:
• Failures of devices (disrupt services)
• Violation of the privacy (steal information)
• Control of devices (take control)
IoT: Vulnerability
Research Directions for IoT
Given the particular nature of these devices, IoT has the following
challenges to face:
1. Critical functions
2. Replication
3. Difficulty in repairing
4. Security assumptions
5. Long life cycle
6. etc.
What are the challenges to be addressed to ensure the security of
embedded devices and to secure IoT?
Security: IoT challenges
Solutions used for standard computer do not solve the IoT security
issues of embedded devices, due to the their heterogeneity.
Research Directions for IoT
Security features Implementation on embedded devices
Secure boot Security standard that ensures that the device boots using only
secure software (software signature check).
Secure code updates Safe methods for updating the code, bugging fixes, security
patches, etc. (use the signed code).
Data security Prevent unauthorized access to the device, encrypting the data
storage and / or communication.
Authentication All communications with devices should be authenticated with
strong passwords.
Secure communication Communication to and from the devices must be secured using
encrypted protocols (SSH, SSL, etc.).
Protection against cyber attacks Integrated firewall to restrict communications to only trusted host,
blocking hackers before they can launch attacks.
Intrusion detection and security
monitoring
Detection and communication of disabled login attempts and other
potential malicious activity.
Tamper detection on device New processors / cards that have capacity of device tampering
detection.
Self Healing Methods for "healing" from cyber attacks (e.g., code updates).
Security requirements
Research Directions for IoT
• Significant hardware supports [8] encryption, authentication and key
tampering.
• Ensure the connection between the gateway devices and the
corporate network or factory.
• Greater effort to protect the IoT data, to ensure consumer privacy
and functionality of the company.
• Solid action plan for the installation of security updates.
What is left to do?
Research Directions for IoT
IoT may become the term most in vogue
of the day at the workplace.
87% of the customers do not know what
the IoT is [9], but they are aware of:
1. Granting of their personal (to retailers)
data by means of devices.
2. Annoyed in sharing their data.
Requirement for companies to develop
better criteria for communicating the
utilization and sharing data of its
customers.
G. Privacy
Research Directions for IoT
Solutions
1. Specific privacy policies for each domain / system and
2. Privacy reinforcement in the IoT infrastructure of the IoT
applications.
IoT paradigm
1. Expression of users' requests for accessing to the data and the
policies they have adopted.
2. Assessment of the requests to ensure whether or not their
permission.
• Advantages: The ubiquity and interaction involved in IoT will provide
many useful benefits and services.
• Disadvantages: It will create many circumstances for privacy
violation.
Privacy (cont.)
Research Directions for IoT
The current legislation does not properly express the privacy policies for
the following requirements:
1. Expression of different types of contexts (time, space, etc.).
2. Representation of different types of data owners (human and
non-human entities).
3. Representation of high-level aggregation requests by anonymous
functions.
4. The need to support not only adherence to privacy for queries of
data, but also privacy on request to set a system’s parameters.
5. Allow dynamic changes in policies
One of the main problem concerns the interaction between different
systems (each with its own privacy policies), which could give rise to
many inconsistencies.
Privacy problems
Research Directions for IoT
DEF: Human-in-the-loop (HITL) is defined as a model that requires
human interaction.
• Many IoT applications involves the interaction between objects and
humans.
Advantages: HITL offers exciting opportunities to a wide range of
applications (i.e. energy management, health care, etc.).
Disadvantages: Hard modeling of human behavior because of its
complex physiological, psychological and behavioral aspects.
New research is needed to:
1. Increase the control of HITL in designing systems;
2. Solve the following three challenges.
H. Human in the loop
Research Directions for IoT
First challenge
• The need for a comprehensive understanding of the complete
spectrum of types of human-in-the-loop controls..
The wide heterogeneity and the subtle differences of HITL generates
various problems in the creation of a single system.
The HITL applications can be classified into four categories:
1. Global system control by human being (e.g., surveillance
monitoring).
2. Passive monitoring of the human system, adopting appropriate
measures (e.g., eating habits).
3. Modeling of human physiological parameters.
4. Hybrids of 1, 2 and 3.
Main challenges of HITL (1)
Research Directions for IoT
Second challenge
• The need for extensions to system identification or other techniques to
derive models of human behaviors..
Advantages: The identification systems are very powerful tools for
creating models.
Disadvantages: Very difficult to apply to human behavior.
Example:
• If we were to use "identification techniques" to shape a human being who is
suffering from depressive illness, there would be many questions about:
• Type of inputs;
• Possible states;
• Change states according to different physiological, psychological and
environmental states.
The existence of a formal or estimated model of the "human behavior"
could help us to close the loop!
Main challenges of HITL (2)
Third challenge
• Determining how to incorporate human behavior models into the
formal methodology of feedback control.
Example:
• Optimization of human behavior based on reports of accidents and incidents
that occur during operation of an electric power system:
• Components Models of Emotion (CME) for observing, recording, and
analyzing the emotional component of the operator's behavior.
• Simulation of the dynamic behavior of an operator in performing
operations in a context that leads to an error.
If we could incorporate into the system such a behavioral model, we
would be able to analyze various security features of the entire system.
Research Directions for IoT
Main challenges of HITL (3)
Research Directions for IoT
• IoT is a chance to make our world smarter.
• IoT is a very profitable field of application for companies.
• IoT has a good implications in different application fields (health,
transport, etc.).
• The ongoing research needs to intensify to benefit from the above
mentioned points and to solve new problems that arise due to:
• Growing number of connected devices;
• Openness of the systems;
• Continuous privacy and security problems.
Expectations
It is hoped that there is more cooperation between the research
communities in order to:
• Solve the myriad of problems as soon as possible;
• Avoid reinventing the wheel when a particular community solves a problem.
Conclusion
Research Directions for IoT
[1] Gartner Says the Internet of Things Installed Base Will Grow to 26 Billion Units By
2020 (http://www.gartner.com/newsroom/id/2970017).
[2] http://www.cisco.com/c/dam/en_us/about/ac79/docs/innov IoT_IBSG_0411FINAL.pdf
[3] P. Levis, N. Lee, M. Welsh, and D. Culler. TOSSIM: Accurate and scalable simulation
of entire TinyOS applications. In SenSys'03: Proceedings of the First International
Conference on Embedded Networked Sensor Systems.
[4] K. Shang, Z. Hossen. Applying fuzzy logic to risk assessment and decision-making
[5] https://www.emc.com/leadership/digital-universe/2014iview/index.htm
[6] Internet of things (Iot) Meets Big Data anD analytIcs: a survey of Iot stakeholDers.
Sponsored by Parstream. December 12, 2013.
[7] M. Maroti, B. Kusy, G. Simon, and A. Ledeczi, “The flooding time synchronization
protocol,” in Proc. 2nd Int. Conf. Embedded Netw. Sens. Syst. (ACM SenSys’04), Nov.
2004.
[8] S. Ravi, A. Raghunathan, and S. Chakradhar, “Tamper resistance mechanisms for
secure, embedded systems,” in Proc. 17th Int. Conf. VLSI Des., 2004.
[9] http://go.pardot.com/l/69102/2015-07-12/pxzlm.
[10] http://www.globaltelecomsbusiness.com/article/2985699/Connected-devices-will-be-
worth-45t.html
[11] F. Osterlind, A. Dunkels, J. Eriksson, N. Finne, and T. Voigt. Cross-level sensor
network simulation with cooja. In Local Computer Networks, Proceedings 2006 31st IEEE
Conference.
References
THANKS FOR
YOUR ATTENTION

More Related Content

What's hot

FOG COMPUTING
FOG COMPUTINGFOG COMPUTING
FOG COMPUTING
Saisharan Amaravadhi
 
Fog Computing and the Internet of Things
Fog Computing and the Internet of ThingsFog Computing and the Internet of Things
Fog Computing and the Internet of Things
S.Mostafa Sayyedi
 
Introduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsIntroduction to IoT Architectures and Protocols
Introduction to IoT Architectures and Protocols
Abdullah Alfadhly
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
Darpan Dekivadiya
 
edge computing seminar report.pdf
edge computing seminar report.pdfedge computing seminar report.pdf
edge computing seminar report.pdf
firstlast467690
 
Data representation and visualization ppt
Data representation and visualization pptData representation and visualization ppt
Data representation and visualization ppt
SindhujaCSEngineerin
 
Data enrichment
Data enrichmentData enrichment
Data enrichment
FabMinds
 
Project on disease prediction
Project on disease predictionProject on disease prediction
Project on disease prediction
KOYELMAJUMDAR1
 
IOT PROTOCOLS.pptx
IOT PROTOCOLS.pptxIOT PROTOCOLS.pptx
IOT PROTOCOLS.pptx
DRREC
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
ArunChokkalingam
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
Divya Tiwari
 
Ip packet delivery
Ip packet deliveryIp packet delivery
Ip packet delivery
rajisri2
 
Vanet ppt
Vanet pptVanet ppt
Vanet ppt
Akash Raghunath
 
IOT DATA AND BIG DATA
IOT DATA AND BIG DATAIOT DATA AND BIG DATA
IoT Enabling Technologies
IoT Enabling TechnologiesIoT Enabling Technologies
IoT Enabling Technologies
Prakash Honnur
 
15CS81 Module1 IoT
15CS81 Module1 IoT15CS81 Module1 IoT
15CS81 Module1 IoT
Ganesh Awati
 
Data aggregation in wireless sensor network , 11751 d5811
Data aggregation in wireless sensor network , 11751 d5811Data aggregation in wireless sensor network , 11751 d5811
Data aggregation in wireless sensor network , 11751 d5811
praveen369
 
IOT - Design Principles of Connected Devices
IOT - Design Principles of Connected DevicesIOT - Design Principles of Connected Devices
IOT - Design Principles of Connected Devices
Devyani Vasistha
 
Wireless sensor network and its application
Wireless sensor network and its applicationWireless sensor network and its application
Wireless sensor network and its application
Roma Vyas
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
Pasquale Puzio
 

What's hot (20)

FOG COMPUTING
FOG COMPUTINGFOG COMPUTING
FOG COMPUTING
 
Fog Computing and the Internet of Things
Fog Computing and the Internet of ThingsFog Computing and the Internet of Things
Fog Computing and the Internet of Things
 
Introduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsIntroduction to IoT Architectures and Protocols
Introduction to IoT Architectures and Protocols
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
edge computing seminar report.pdf
edge computing seminar report.pdfedge computing seminar report.pdf
edge computing seminar report.pdf
 
Data representation and visualization ppt
Data representation and visualization pptData representation and visualization ppt
Data representation and visualization ppt
 
Data enrichment
Data enrichmentData enrichment
Data enrichment
 
Project on disease prediction
Project on disease predictionProject on disease prediction
Project on disease prediction
 
IOT PROTOCOLS.pptx
IOT PROTOCOLS.pptxIOT PROTOCOLS.pptx
IOT PROTOCOLS.pptx
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
 
Ip packet delivery
Ip packet deliveryIp packet delivery
Ip packet delivery
 
Vanet ppt
Vanet pptVanet ppt
Vanet ppt
 
IOT DATA AND BIG DATA
IOT DATA AND BIG DATAIOT DATA AND BIG DATA
IOT DATA AND BIG DATA
 
IoT Enabling Technologies
IoT Enabling TechnologiesIoT Enabling Technologies
IoT Enabling Technologies
 
15CS81 Module1 IoT
15CS81 Module1 IoT15CS81 Module1 IoT
15CS81 Module1 IoT
 
Data aggregation in wireless sensor network , 11751 d5811
Data aggregation in wireless sensor network , 11751 d5811Data aggregation in wireless sensor network , 11751 d5811
Data aggregation in wireless sensor network , 11751 d5811
 
IOT - Design Principles of Connected Devices
IOT - Design Principles of Connected DevicesIOT - Design Principles of Connected Devices
IOT - Design Principles of Connected Devices
 
Wireless sensor network and its application
Wireless sensor network and its applicationWireless sensor network and its application
Wireless sensor network and its application
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
 

Similar to Internet of Things: Research Directions

Unit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).pptUnit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).ppt
nadoje
 
Internet of Things: Trends and challenges for future
Internet of Things: Trends and challenges for futureInternet of Things: Trends and challenges for future
Internet of Things: Trends and challenges for future
Startup Europe IoT Accelerator
 
summaryg.pdffgdfgdfgfgfgfgfgffgfdfgfgffg
summaryg.pdffgdfgdfgfgfgfgfgffgfdfgfgffgsummaryg.pdffgdfgdfgfgfgfgfgffgfdfgfgffg
summaryg.pdffgdfgdfgfgfgfgfgffgfdfgfgffg
HakkemB
 
NANI PPT.pptx
NANI PPT.pptxNANI PPT.pptx
NANI PPT.pptx
MuraliLekkala
 
Internet of things (IOT) connects physical to digital
Internet of things (IOT) connects physical to digitalInternet of things (IOT) connects physical to digital
Internet of things (IOT) connects physical to digital
Eslam Nader
 
IoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesIoT Standardization and Implementation Challenges
IoT Standardization and Implementation Challenges
Ahmed Banafa
 
Future of IoT: Key Challenges to Face
Future of IoT: Key Challenges to FaceFuture of IoT: Key Challenges to Face
Future of IoT: Key Challenges to Face
Altoros
 
Key challenges facing the future of IoT
Key challenges facing the future of IoTKey challenges facing the future of IoT
Key challenges facing the future of IoT
Ahmed Banafa
 
Internet of Things And Its Components.pptx
Internet of Things And Its Components.pptxInternet of Things And Its Components.pptx
Internet of Things And Its Components.pptx
Softxai
 
IoT-CT internet of thing master séminaire cours.pdf
IoT-CT internet of thing master séminaire cours.pdfIoT-CT internet of thing master séminaire cours.pdf
IoT-CT internet of thing master séminaire cours.pdf
NadouShe
 
The Internet of Things: What's next?
The Internet of Things: What's next? The Internet of Things: What's next?
The Internet of Things: What's next?
PayamBarnaghi
 
IoT-Introduction.pptx
IoT-Introduction.pptxIoT-Introduction.pptx
IoT-Introduction.pptx
ImpanaR2
 
The Internet of Things (IoT) and its evolution
The Internet of Things (IoT) and its evolutionThe Internet of Things (IoT) and its evolution
The Internet of Things (IoT) and its evolution
Sathvik N Prasad
 
IoT system development.pdf
IoT system development.pdfIoT system development.pdf
IoT system development.pdf
Mahdi_Fahmideh
 
IoT
IoTIoT
IoT
Mphasis
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
milemadinah
 
cps_nitin_final.ppt
cps_nitin_final.pptcps_nitin_final.ppt
cps_nitin_final.ppt
nitin_009
 
Group 4 IT INfrastructure Group presentation Final [Auto-saved].pptx
Group 4 IT INfrastructure Group presentation Final  [Auto-saved].pptxGroup 4 IT INfrastructure Group presentation Final  [Auto-saved].pptx
Group 4 IT INfrastructure Group presentation Final [Auto-saved].pptx
OdedeleIfeoluwa
 
Inventory of IoT slide sets
Inventory of IoT slide setsInventory of IoT slide sets
Inventory of IoT slide sets
Bob Marcus
 
IoT(Internet of Things).pptx
IoT(Internet of Things).pptxIoT(Internet of Things).pptx
IoT(Internet of Things).pptx
AMS IoT
 

Similar to Internet of Things: Research Directions (20)

Unit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).pptUnit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).ppt
 
Internet of Things: Trends and challenges for future
Internet of Things: Trends and challenges for futureInternet of Things: Trends and challenges for future
Internet of Things: Trends and challenges for future
 
summaryg.pdffgdfgdfgfgfgfgfgffgfdfgfgffg
summaryg.pdffgdfgdfgfgfgfgfgffgfdfgfgffgsummaryg.pdffgdfgdfgfgfgfgfgffgfdfgfgffg
summaryg.pdffgdfgdfgfgfgfgfgffgfdfgfgffg
 
NANI PPT.pptx
NANI PPT.pptxNANI PPT.pptx
NANI PPT.pptx
 
Internet of things (IOT) connects physical to digital
Internet of things (IOT) connects physical to digitalInternet of things (IOT) connects physical to digital
Internet of things (IOT) connects physical to digital
 
IoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesIoT Standardization and Implementation Challenges
IoT Standardization and Implementation Challenges
 
Future of IoT: Key Challenges to Face
Future of IoT: Key Challenges to FaceFuture of IoT: Key Challenges to Face
Future of IoT: Key Challenges to Face
 
Key challenges facing the future of IoT
Key challenges facing the future of IoTKey challenges facing the future of IoT
Key challenges facing the future of IoT
 
Internet of Things And Its Components.pptx
Internet of Things And Its Components.pptxInternet of Things And Its Components.pptx
Internet of Things And Its Components.pptx
 
IoT-CT internet of thing master séminaire cours.pdf
IoT-CT internet of thing master séminaire cours.pdfIoT-CT internet of thing master séminaire cours.pdf
IoT-CT internet of thing master séminaire cours.pdf
 
The Internet of Things: What's next?
The Internet of Things: What's next? The Internet of Things: What's next?
The Internet of Things: What's next?
 
IoT-Introduction.pptx
IoT-Introduction.pptxIoT-Introduction.pptx
IoT-Introduction.pptx
 
The Internet of Things (IoT) and its evolution
The Internet of Things (IoT) and its evolutionThe Internet of Things (IoT) and its evolution
The Internet of Things (IoT) and its evolution
 
IoT system development.pdf
IoT system development.pdfIoT system development.pdf
IoT system development.pdf
 
IoT
IoTIoT
IoT
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 
cps_nitin_final.ppt
cps_nitin_final.pptcps_nitin_final.ppt
cps_nitin_final.ppt
 
Group 4 IT INfrastructure Group presentation Final [Auto-saved].pptx
Group 4 IT INfrastructure Group presentation Final  [Auto-saved].pptxGroup 4 IT INfrastructure Group presentation Final  [Auto-saved].pptx
Group 4 IT INfrastructure Group presentation Final [Auto-saved].pptx
 
Inventory of IoT slide sets
Inventory of IoT slide setsInventory of IoT slide sets
Inventory of IoT slide sets
 
IoT(Internet of Things).pptx
IoT(Internet of Things).pptxIoT(Internet of Things).pptx
IoT(Internet of Things).pptx
 

More from Davide Nardone

M.Sc thesis
M.Sc thesisM.Sc thesis
M.Sc thesis
Davide Nardone
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
Davide Nardone
 
A Sparse-Coding Based Approach for Class-Specific Feature Selection
A Sparse-Coding Based Approach for Class-Specific Feature SelectionA Sparse-Coding Based Approach for Class-Specific Feature Selection
A Sparse-Coding Based Approach for Class-Specific Feature Selection
Davide Nardone
 
A Biological Smart Platform for the Environmental Risk Assessment
A Biological Smart Platform for the Environmental Risk AssessmentA Biological Smart Platform for the Environmental Risk Assessment
A Biological Smart Platform for the Environmental Risk Assessment
Davide Nardone
 
Installing Apache tomcat with Netbeans
Installing Apache tomcat with NetbeansInstalling Apache tomcat with Netbeans
Installing Apache tomcat with Netbeans
Davide Nardone
 
Online Tweet Sentiment Analysis with Apache Spark
Online Tweet Sentiment Analysis with Apache SparkOnline Tweet Sentiment Analysis with Apache Spark
Online Tweet Sentiment Analysis with Apache Spark
Davide Nardone
 
Blind Source Separation using Dictionary Learning
Blind Source Separation using Dictionary LearningBlind Source Separation using Dictionary Learning
Blind Source Separation using Dictionary Learning
Davide Nardone
 
Accelerating Dynamic Time Warping Subsequence Search with GPU
Accelerating Dynamic Time Warping Subsequence Search with GPUAccelerating Dynamic Time Warping Subsequence Search with GPU
Accelerating Dynamic Time Warping Subsequence Search with GPU
Davide Nardone
 
LZ78
LZ78LZ78

More from Davide Nardone (9)

M.Sc thesis
M.Sc thesisM.Sc thesis
M.Sc thesis
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
A Sparse-Coding Based Approach for Class-Specific Feature Selection
A Sparse-Coding Based Approach for Class-Specific Feature SelectionA Sparse-Coding Based Approach for Class-Specific Feature Selection
A Sparse-Coding Based Approach for Class-Specific Feature Selection
 
A Biological Smart Platform for the Environmental Risk Assessment
A Biological Smart Platform for the Environmental Risk AssessmentA Biological Smart Platform for the Environmental Risk Assessment
A Biological Smart Platform for the Environmental Risk Assessment
 
Installing Apache tomcat with Netbeans
Installing Apache tomcat with NetbeansInstalling Apache tomcat with Netbeans
Installing Apache tomcat with Netbeans
 
Online Tweet Sentiment Analysis with Apache Spark
Online Tweet Sentiment Analysis with Apache SparkOnline Tweet Sentiment Analysis with Apache Spark
Online Tweet Sentiment Analysis with Apache Spark
 
Blind Source Separation using Dictionary Learning
Blind Source Separation using Dictionary LearningBlind Source Separation using Dictionary Learning
Blind Source Separation using Dictionary Learning
 
Accelerating Dynamic Time Warping Subsequence Search with GPU
Accelerating Dynamic Time Warping Subsequence Search with GPUAccelerating Dynamic Time Warping Subsequence Search with GPU
Accelerating Dynamic Time Warping Subsequence Search with GPU
 
LZ78
LZ78LZ78
LZ78
 

Recently uploaded

AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
Pravash Chandra Das
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
flufftailshop
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
GDSC PJATK
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 

Recently uploaded (20)

AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 

Internet of Things: Research Directions

  • 1. Davide Nardone May, 2016 Internet of Things: Research Directions PARTHENOPE UNIVERSITY
  • 2. Research Directions for IoT 1. Introduction 2. IoT vision and contexts 3. The main IoT research directions: A. Massive scaling B. Architecture and Dependencies C. Creating knowledge and Big Data D. Robustness E. Openness F. Security G. Privacy H. Humans in the Loop 4. Conclusion Outline
  • 3. Research Directions for IoT • Using the Internet as a global platform for communication, dialogue, calculation and the interconnection of devices has been shaping a new world: a combination of new methods and technologies which are the basis of a variety of smart context. • The creation of these scenarios has been investigated from different and disjointed scientific communities as: • Mobile Computing (MB); • Pervasive Computing (PC); • Wireless Sensor Networks (WSN); • Cyber-Physical-Systems (CPS). Introduction
  • 4. Research Directions for IoT • Since the technology progresses, the overlapping and the combination of topics and research questions has increased to such a point that there are no more specific definitions for the previous mentioned fields. • Many researches in the fields of IoT, PC, MC, WSN and CPS often rely on underlying technologies such as Machine Learning, Real-Time Computing, Signal Processing, Security, etc. It’s clear the need for cooperation between the several communities for the improvement and the resolution of various interesting research problem regarding these environments. Introduction (cont.) Machine Learnig Security Privacy
  • 5. Research Directions for IoT • For many people, the concept of Smart City is no longer a vision so far away. • Many infrastructures are already equipped with no sensor and actuator able to: • Monitoring entire system and • Interact with each other, in order to exchange information and so to improve the quality of one or more services. IoT vision and contexts
  • 6. Research Directions for IoT • IoT: an essential and integrated infrastructure on which many application and services can be run. • System of systems that synergistically interact with each other to create new and not predicable services. IoT vision and contexts (cont.)
  • 7. Research Directions for IoT What is that vision? Examples • Global transport systems • City without traffic lights and 3D transport vehicles • Buildings that will control energy, health, comfort • People with bionic fragments for detecting physiologic parameters. • etc Examples • Input: Biometric systems • Output: Holographic display Some examples
  • 8. Research Directions for IoT • The continuing growth of the sensors and the improving of the related processes will produce continuous qualitative changes in different contexts. IoT benefits
  • 9. Research Directions for IoT • Given the massive amount of devices connected today (~ 24 billion), the research [1] has reported that by 2020 the revenues achieved from the sale of smart devices and the services offered to them will be about $ 2,500 billion dollars. Industry /use case Economic value 1. Smart car $ 600 billions 2. Clinical Remote Monitoring $ 350 billions 3. Assisted Life $ 270 billions 4. Home and Buildings Security $ 250 billions 5. Car insurance “Pay-As-You-Drive” $ 245 billions 6. New business models for car usage $ 225 billions 7. Smart meters $ 105 billions 8. Traffic management $ 100 billions 9. Electric vehicle charging $ 75 billions 10. Building automation systems $ 40 billions IoT benefits (cont.)
  • 10. Research Directions for IoT IoT challenges and benefits ? Challenges âś“ Benefits • People / Society • Better and faster information • Security / Privacy • Improving education • Authority • Regulation / Legislation • Standard / Policies • Life quality • Resource Efficiency • Greater awareness • Technology Architecture / Infrastructure • Increased production • Costs • Wider experiences • Pollution / Prevention disasters • Better decision making • Innovation Management • Resource optimization • Energy / Power Consumption • Human error removal • Growth Data and analysis • More services
  • 11. Research Directions for IoT • The research area required to obtain such IoT vision requires a significant study into many directions. Research A. Massive scaling B. Architecture and Dependencies C. Creating knowledge and Big Data D. Robustness E. Openness F. Security G. Privacy H. Humans in the Loop
  • 12. Research Directions for IoT • Recent studies [2] have estimated that ~50 billion devices will be connected to the internet by 2020. A. Massive Scaling
  • 13. Research Directions for IoT Massive Scaling (cont.) • Some of the many questions that we ask are: • Will be IPV6 enough? • Will emerge new standards and protocols? • How will the devices (including mobile devices) to be discovered? • How will the real-time and reliability issues to be supported? • etc. It’s almost unlikely that any solution will be immediately become the norm!
  • 14. Research Directions for IoT Simulation of large-scale IoT systems (using particular operating system [3][4]) for the evaluation and optimization of specific aspects: • Application Layer • Energy consumption • Code reuse • Network connection • etc. Among the different existing approaches, a hybrid simulation environment based on a combination of framework with simulators at the system-level: • It would reduce the gap between the research and the implementations; • It also would strengthen the simulation studies in the IoT field. Massive Scale Simulation
  • 15. Research Directions for IoT • Since billions of devices are connected to the internet, it’s necessary to provide an appropriate architecture that easily allow: connectivity, communication, control and useful applications. MOBILE APPROACH Advantages (+) Disadvantages (-) • Unlimited application development. • Interference problems due the sharing of sensors and systems implementation among multiple applications. • Automatic controls for the execution of an application on a specific platform. • Dependence of IT methodologies based on the assumption about the environment, the hardware platform, naming, control and various semantic devices. • How all these “objects” will interact with each other? B. Architecture and Dependencies
  • 16. Research Directions for IoT Let’s suppose the integration of different systems responsible for the electricity management (control thermostats, windows, doors, etc.) and the health care (ECG measurement, temperature, sleep, activities, etc.). Advantages • Information sharing: this would allow the electricity management systems to regulate the temperature of the rooms according to the physiological status of the residents. • Integration between systems: this would avoid unpleasant situations; for instance the system will deactivate medical devices to save power while they are used as suggested by the health care system. • Sharing sensors and actuators: this would reduce the costs of implementing/distribution, improving the aesthetics of the rooms and reducing the flow of content. Example: Architecture and Dependencies
  • 17. Research Directions for IoT Challenges • Each system has its own assumptions and strategies for its control. • A lack of knowledge about the other systems would cause many conflicts when they are integrated without particular attention. Example of interference • The health care system could detect depression and decide to turn on all the lights. On the other hand, the electricity management system may decide to turn off the lights due to the absence of motion. Example (cont.)
  • 18. Research Directions for IoT Research topics to be addressed • Development of new approaches for the detection and resolution of dependencies between applications. • Autonomous decentralized architecture inspired by the connection of sensor nodes. • Introduction of cloud structures, architectures guided by events, disconnected operation and synchronization. IoT: Architecture and Dependencies
  • 19. Research Directions for IoT • IoT is the next technological revolution that is estimated to produce over 44 Zettabyte of data (4.4e+10 Terabyte) by 2020 [5]. • Almost all the “objects” or devices will have an IP address, and will be connected to each other. • Given the incredible amount of data generated, new mechanisms will be needed for: • Collecting and selecting data • Data pre-processing • Turn raw data into useful information • Extracting information • Data interpretation C. Creating knowledge and Big Data
  • 20. Research Directions for IoT The main Big Data challenges in the IoT context are: • Reliability • Data security • Big Data collection • Identification of redundant data • Data interpretation and creation of useful information that includes noise • Development of inference techniques that do not suffer of the Bayesian and Dempster limitation • Correct data binding • Ect. IoT & Big Data: Main challanges
  • 21. Research Directions for IoT • Reliability is one of the most important aspects of the use of Big Data. Development of new calibration techniques and transport protocols: • Ensure that following inference do not operate on incorrect data or data with too many missing data! • Ensure “safe” operations of the actuators • Draw up good decisions. Possible solutions • Associate a confidence level (in the form of probability) to the information derived from the date. • Using Fuzzy Logic [4]. • Minimizing the number of false negatives and false positives. IoT & Big Data: Reliability
  • 22. Research Directions for IoT • IoT has launched new security challenges that cannot be addressed by using traditional security mechanism. • Addressing the security concerns of the IoT requires a paradigm shift. For example, how do you deal with the situation where the fridge and coffee maker are equipped with hidden Wi-Fi access and spammers? According to the experts, the problem of data security has two major aspects: 1. Confidentiality 2. Protection IoT & Big Data: Security
  • 23. Research Directions for IoT Companies need only to collect data related to their business, and this requires: • Filtering techniques on redundant data and protection data techniques. • Efficient mechanisms that include software and protocols. Solutions • One approach is to use devices with sensors for data collections, in combination with transport protocols such as: Message Queue Telemetry Transport (MQTT) and Data Distribution Service (DDS). Example One of the most important transportation companies in the world, UPS, uses sensors in its vehicle to improve delivery performance and reduce coast. • These data help UPS out in reducing fuel consumption, harmful emissions and waste time. IoT & Big Data: Big Data Collection
  • 24. Research Directions for IoT Problems in the collection of Big Data By the statistic coming from [6], it’s shown the various challenges that companies have faced with the data collection activities. 19% 13% 9% 22% 25% 12% Big Data challenges Problems in data collection Unreliable data collection Slowness in data collection Cumbersome amout of data to analyze properly Techniques for analysis and data processing premature Existing business processes not flexible for the efficient collection of data
  • 25. Research Directions for IoT • Not all device provide useful information. • It’s not easy to filter data in real-time. 53% 47% Rationale: Methods of inefficient data collection. Do not track their projects with quantifiable metrics They do not measure the progress of their IoT projects 13% 87% 96% of organizations have difficulties to filter large amounts of redundant data. Able to collecting data efficiently Recognize the benefits for their business Survey conducted by Parstream [6] IoT & Big Data: Identifying redundant data
  • 26. Research Directions for IoT IoT offers an exciting prospect from the point of view of Big Data, but it’s necessary to: • Optimize the entire setup for managing the IoT impact in the context of the Big Data. • Solve the problems concerning the security & the privacy and the efficient data collection. There’s hope that these issues may be efficiently solved since both IoT and the infrastructure for its management are in the early stages. IoT & Big Data: Summary
  • 27. Research Directions for IoT IoT vision: Application based on sensors, actuators and communication distributed platforms connected to a network of “objects”. In such distributions it is common for devices to know: • their positions • nearby devices cooperating having • synchronized clocks • Consistent parameter setting such as: sleep, wake, battery levels and security key pairs. Challenges The deterioration of these conditions cause the break up of the clocks that: • Causes the nodes to have different time shift, that leads to failures within the system. Solutions Synchronization techniques are used in this context [7]. D. Robustness
  • 28. Research Directions for IoT • Although it is recognized that the synchronization of the clock is necessary, this simple concept is too general. • More serious problem is the physical relocation of the sensor nodes. • (e.g., random-temporal displacement of one or more nodes) The higher the entropy, the greater the disorder and less energy is available in the system to do useful things. Robustness (cont.)
  • 29. Research Directions for IoT - Goal: Create a robust system that can cope with changes in its operations without suffering serious damage or loss of functions. How can it possible to keep a persistent, dynamic and mobile IoT system? - Method: The consistency services required (entropy) must to be combined with other approaches for producing a robust system, ensuring: • Persistence: Automatic operations for organization, monitoring, diagnostic and repair. • Dynamism and mobility: Methods for the development of reliable code, online tolerance errors and locally debbuging. Robustness: consideration
  • 30. Research Directions for IoT The majority of sensor-based systems were closed systems. • (e.g., cars, planes, and ships have had network sensor systems operating largely within the vehicle itself). The capabilities of these systems are increasing rapidly. Some example are: • Cars transmitting information assistance. • Airplanes sending technical real-time information. • Cars communicating with each other and control each other to avoid collisions. • Doctors who interact in real-time with their patients analyzing physiological data, automatically loaded. In order to achieve such benefits, the systems requires openness, but… What does it mean the Openness of such systems? E. Openness
  • 31. Research Directions for IoT Research problems to the openness support • Rethinking of the current composition techniques, analysis and the respective tools. • New communication interface to enable the efficient exchange on information between the systems. • Difficulties with security and privacy. It’s necessary to provide a “fair balance” between: Functionality, Security and Ease of Use. Openness (cont.)
  • 32. Research Directions for IoT • Key issue which will become more and more intense every day. • The greater the volume of sensitive data (Big Data’s V) that moves in IoT, the higher is the risk of data theft and identity, manipulation of devices, data faking, IP theft, etc. F. Security Problems • IoT products are often sold with old embedded operating systems and software products. • Many of these systems/software (designed to be safe) are still vulnerable.
  • 33. Research Directions for IoT The vulnerabilities found in the IoT have drawn attention to the topic of “security”. Some types of threats are: • Failures of devices (disrupt services) • Violation of the privacy (steal information) • Control of devices (take control) IoT: Vulnerability
  • 34. Research Directions for IoT Given the particular nature of these devices, IoT has the following challenges to face: 1. Critical functions 2. Replication 3. Difficulty in repairing 4. Security assumptions 5. Long life cycle 6. etc. What are the challenges to be addressed to ensure the security of embedded devices and to secure IoT? Security: IoT challenges Solutions used for standard computer do not solve the IoT security issues of embedded devices, due to the their heterogeneity.
  • 35. Research Directions for IoT Security features Implementation on embedded devices Secure boot Security standard that ensures that the device boots using only secure software (software signature check). Secure code updates Safe methods for updating the code, bugging fixes, security patches, etc. (use the signed code). Data security Prevent unauthorized access to the device, encrypting the data storage and / or communication. Authentication All communications with devices should be authenticated with strong passwords. Secure communication Communication to and from the devices must be secured using encrypted protocols (SSH, SSL, etc.). Protection against cyber attacks Integrated firewall to restrict communications to only trusted host, blocking hackers before they can launch attacks. Intrusion detection and security monitoring Detection and communication of disabled login attempts and other potential malicious activity. Tamper detection on device New processors / cards that have capacity of device tampering detection. Self Healing Methods for "healing" from cyber attacks (e.g., code updates). Security requirements
  • 36. Research Directions for IoT • Significant hardware supports [8] encryption, authentication and key tampering. • Ensure the connection between the gateway devices and the corporate network or factory. • Greater effort to protect the IoT data, to ensure consumer privacy and functionality of the company. • Solid action plan for the installation of security updates. What is left to do?
  • 37. Research Directions for IoT IoT may become the term most in vogue of the day at the workplace. 87% of the customers do not know what the IoT is [9], but they are aware of: 1. Granting of their personal (to retailers) data by means of devices. 2. Annoyed in sharing their data. Requirement for companies to develop better criteria for communicating the utilization and sharing data of its customers. G. Privacy
  • 38. Research Directions for IoT Solutions 1. Specific privacy policies for each domain / system and 2. Privacy reinforcement in the IoT infrastructure of the IoT applications. IoT paradigm 1. Expression of users' requests for accessing to the data and the policies they have adopted. 2. Assessment of the requests to ensure whether or not their permission. • Advantages: The ubiquity and interaction involved in IoT will provide many useful benefits and services. • Disadvantages: It will create many circumstances for privacy violation. Privacy (cont.)
  • 39. Research Directions for IoT The current legislation does not properly express the privacy policies for the following requirements: 1. Expression of different types of contexts (time, space, etc.). 2. Representation of different types of data owners (human and non-human entities). 3. Representation of high-level aggregation requests by anonymous functions. 4. The need to support not only adherence to privacy for queries of data, but also privacy on request to set a system’s parameters. 5. Allow dynamic changes in policies One of the main problem concerns the interaction between different systems (each with its own privacy policies), which could give rise to many inconsistencies. Privacy problems
  • 40. Research Directions for IoT DEF: Human-in-the-loop (HITL) is defined as a model that requires human interaction. • Many IoT applications involves the interaction between objects and humans. Advantages: HITL offers exciting opportunities to a wide range of applications (i.e. energy management, health care, etc.). Disadvantages: Hard modeling of human behavior because of its complex physiological, psychological and behavioral aspects. New research is needed to: 1. Increase the control of HITL in designing systems; 2. Solve the following three challenges. H. Human in the loop
  • 41. Research Directions for IoT First challenge • The need for a comprehensive understanding of the complete spectrum of types of human-in-the-loop controls.. The wide heterogeneity and the subtle differences of HITL generates various problems in the creation of a single system. The HITL applications can be classified into four categories: 1. Global system control by human being (e.g., surveillance monitoring). 2. Passive monitoring of the human system, adopting appropriate measures (e.g., eating habits). 3. Modeling of human physiological parameters. 4. Hybrids of 1, 2 and 3. Main challenges of HITL (1)
  • 42. Research Directions for IoT Second challenge • The need for extensions to system identification or other techniques to derive models of human behaviors.. Advantages: The identification systems are very powerful tools for creating models. Disadvantages: Very difficult to apply to human behavior. Example: • If we were to use "identification techniques" to shape a human being who is suffering from depressive illness, there would be many questions about: • Type of inputs; • Possible states; • Change states according to different physiological, psychological and environmental states. The existence of a formal or estimated model of the "human behavior" could help us to close the loop! Main challenges of HITL (2)
  • 43. Third challenge • Determining how to incorporate human behavior models into the formal methodology of feedback control. Example: • Optimization of human behavior based on reports of accidents and incidents that occur during operation of an electric power system: • Components Models of Emotion (CME) for observing, recording, and analyzing the emotional component of the operator's behavior. • Simulation of the dynamic behavior of an operator in performing operations in a context that leads to an error. If we could incorporate into the system such a behavioral model, we would be able to analyze various security features of the entire system. Research Directions for IoT Main challenges of HITL (3)
  • 44. Research Directions for IoT • IoT is a chance to make our world smarter. • IoT is a very profitable field of application for companies. • IoT has a good implications in different application fields (health, transport, etc.). • The ongoing research needs to intensify to benefit from the above mentioned points and to solve new problems that arise due to: • Growing number of connected devices; • Openness of the systems; • Continuous privacy and security problems. Expectations It is hoped that there is more cooperation between the research communities in order to: • Solve the myriad of problems as soon as possible; • Avoid reinventing the wheel when a particular community solves a problem. Conclusion
  • 45. Research Directions for IoT [1] Gartner Says the Internet of Things Installed Base Will Grow to 26 Billion Units By 2020 (http://www.gartner.com/newsroom/id/2970017). [2] http://www.cisco.com/c/dam/en_us/about/ac79/docs/innov IoT_IBSG_0411FINAL.pdf [3] P. Levis, N. Lee, M. Welsh, and D. Culler. TOSSIM: Accurate and scalable simulation of entire TinyOS applications. In SenSys'03: Proceedings of the First International Conference on Embedded Networked Sensor Systems. [4] K. Shang, Z. Hossen. Applying fuzzy logic to risk assessment and decision-making [5] https://www.emc.com/leadership/digital-universe/2014iview/index.htm [6] Internet of things (Iot) Meets Big Data anD analytIcs: a survey of Iot stakeholDers. Sponsored by Parstream. December 12, 2013. [7] M. Maroti, B. Kusy, G. Simon, and A. Ledeczi, “The flooding time synchronization protocol,” in Proc. 2nd Int. Conf. Embedded Netw. Sens. Syst. (ACM SenSys’04), Nov. 2004. [8] S. Ravi, A. Raghunathan, and S. Chakradhar, “Tamper resistance mechanisms for secure, embedded systems,” in Proc. 17th Int. Conf. VLSI Des., 2004. [9] http://go.pardot.com/l/69102/2015-07-12/pxzlm. [10] http://www.globaltelecomsbusiness.com/article/2985699/Connected-devices-will-be- worth-45t.html [11] F. Osterlind, A. Dunkels, J. Eriksson, N. Finne, and T. Voigt. Cross-level sensor network simulation with cooja. In Local Computer Networks, Proceedings 2006 31st IEEE Conference. References

Editor's Notes

  1. La ragioni principali per cui le aziende non sono state in grado di utilizzare metodi