The slides defines IoT and show the differnce between M2M and IoT vision. It then describes the different layers that depicts the functional architecture of IoT, standard organizations and bodies and other IoT technology alliances, low power IoT protocols, IoT Platform components, and finally gives a short description to one of IoT low power application protocols (MQTT).
This is a technical presentation describing two protocols namely MQTT and CoAP for IoT communications. This explains the protocols in conjunction with OSI layers.
Authors: Arshdeep Bahga, Vijay Madisetti
Paperback: 446 pages
Publisher: VPT; 1 edition (August 9, 2014)
Language: English
ISBN-10: 0996025510
ISBN-13: 978-0996025515
Product Dimensions: 10 x 7 x 1 inches
Book Website: www.internet-of-things-book.com
Availabile on: www.amazon.com/dp/0996025510
Internet of Things (IoT) refers to physical and virtual objects that have unique identities and are connected to the internet to facilitate intelligent applications that make energy, logistics, industrial control, retail, agriculture and many other domains "smarter". Internet of Things is a new revolution of the Internet that is rapidly gathering momentum driven by the advancements in sensor networks, mobile devices, wireless communications, networking and cloud technologies. Experts forecast that by the year 2020 there will be a total of 50 billion devices/things connected to the internet.
This book is written as a textbook on Internet of Things for educational programs at colleges and universities, and also for IoT vendors and service providers who may be interested in offering a broader perspective of Internet of Things to accompany their own customer and developer training programs. The typical reader is expected to have completed a couple of courses in programming using traditional high-level languages at the college-level, and is either a senior or a beginning graduate student in one of the science, technology, engineering or mathematics (STEM) fields. Like our companion book on Cloud Computing, we have tried to write a comprehensive book that transfers knowledge through an immersive "hands on" approach, where the reader is provided the necessary guidance and knowledge to develop working code for real-world IoT applications.
The Internet of things describes physical objects that are embedded with sensors, processing ability, software, and other technologies that connect and exchange data with other devices and systems over the Internet or other communications networks.
Проекты Tibbo Systems в области индустриального Интернета вещейTibbo
Современные IoT платформы полностью заменяют и объединяют функционал самого различного ПО: SCADA, BMS, АСТУЭ, системы управления ИТ инфраструктурой, мониторинг сетей, CMMS/ITSM, M2M-платформы, системы мониторинга транспорта, СКУД и системы управления физической безопасностью, BI-системы и т.д.
Мы собрали для вас в одной презентации наши лучшие кейсы в области индустриального Интернета вещей на основе IoT платформы AggreGate
This is a technical presentation describing two protocols namely MQTT and CoAP for IoT communications. This explains the protocols in conjunction with OSI layers.
Authors: Arshdeep Bahga, Vijay Madisetti
Paperback: 446 pages
Publisher: VPT; 1 edition (August 9, 2014)
Language: English
ISBN-10: 0996025510
ISBN-13: 978-0996025515
Product Dimensions: 10 x 7 x 1 inches
Book Website: www.internet-of-things-book.com
Availabile on: www.amazon.com/dp/0996025510
Internet of Things (IoT) refers to physical and virtual objects that have unique identities and are connected to the internet to facilitate intelligent applications that make energy, logistics, industrial control, retail, agriculture and many other domains "smarter". Internet of Things is a new revolution of the Internet that is rapidly gathering momentum driven by the advancements in sensor networks, mobile devices, wireless communications, networking and cloud technologies. Experts forecast that by the year 2020 there will be a total of 50 billion devices/things connected to the internet.
This book is written as a textbook on Internet of Things for educational programs at colleges and universities, and also for IoT vendors and service providers who may be interested in offering a broader perspective of Internet of Things to accompany their own customer and developer training programs. The typical reader is expected to have completed a couple of courses in programming using traditional high-level languages at the college-level, and is either a senior or a beginning graduate student in one of the science, technology, engineering or mathematics (STEM) fields. Like our companion book on Cloud Computing, we have tried to write a comprehensive book that transfers knowledge through an immersive "hands on" approach, where the reader is provided the necessary guidance and knowledge to develop working code for real-world IoT applications.
The Internet of things describes physical objects that are embedded with sensors, processing ability, software, and other technologies that connect and exchange data with other devices and systems over the Internet or other communications networks.
Проекты Tibbo Systems в области индустриального Интернета вещейTibbo
Современные IoT платформы полностью заменяют и объединяют функционал самого различного ПО: SCADA, BMS, АСТУЭ, системы управления ИТ инфраструктурой, мониторинг сетей, CMMS/ITSM, M2M-платформы, системы мониторинга транспорта, СКУД и системы управления физической безопасностью, BI-системы и т.д.
Мы собрали для вас в одной презентации наши лучшие кейсы в области индустриального Интернета вещей на основе IoT платформы AggreGate
Applying M2M/IoT technology to enable Business EfficiencyRekaNext Capital
When Technologies are new and evolving, the risks for the customer are high as there are too many new technologies and some are relatively immature. To protect the customer, there is a need to adapt a new business model to help the customer to be comfortable with new technologies.
Now, IoT platforms replace and combine features of different software: SCADA and BMS, smart metering, IT infrastructure and network management systems, CMMS/ITSM, M2M platforms, fleet management, physical security and access control, BI systems, etc.
The M2M Journal is a magazine that focuses on M2M (Machine-to-Machine communication) and IoT (Internet of Things) worldwide. Our readers are businesses in the M2M/IoT community, such as wholesalers and users of M2M/IoT solutions. The content includes: theoretical foundations, new products and processes, reference projects and services, information from the M2M Alliance and the M2M/IoT community, corporate presentations, and opinions from M2M/IoT experts.
A new algorithm to enhance security against cyber threats for internet of thi...IJECEIAES
One major problem is detecting the unsuitability of traffic caused by a distributed denial of services (DDoS) attack produced by third party nodes, such as smart phones and other handheld Wi-Fi devices. During the transmission between the devices, there are rising in the number of cyber attacks on systems by using negligible packets, which lead to suspension of the services between source and destination, and can find the vulnerabilities on the network. These vulnerable issues have led to a reduction in the reliability of networks and a reduction in consumer confidence. In this paper, we will introduce a new algorithm called rout attack with detection algorithm (RAWD) to reduce the affect of any attack by checking the packet injection, and to avoid number of cyber attacks being received by the destination and transferred through a determined path or alternative path based on the problem. The proposed algorithm will forward the real time traffic to the required destination from a new alternative backup path which is computed by it before the attacked occurred. The results have showed an improvement when the attack occurred and the alternative path has used to make sure the continuity of receiving the data to the main destination without any affection.
Dissertations are among the most important pieces of work which students complete at university. And they allow you to work individually and on something that truly attracts you. Computer science is a hot field for researchers. Many topic ideas can be generated for a dissertation in this special branch of engineering.
Ph.D. Assistance serves as an external mentor to brainstorm your idea and translate that into a research model. Hiring a mentor or tutor is common and therefore let your research committee know about the same. We do not offer any writing services without the involvement of the researcher.
Learn More: https://bit.ly/3bWsGpz
Contact Us:
Website: https://www.phdassistance.com/
UK NO: +44–1143520021
India No: +91–4448137070
WhatsApp No: +91 91769 66446
Email: info@phdassistance.com
Automated diagnosis of attacks in internet of things using machine learning a...journalBEEI
The Internet of Things (IoT) is the interconnection of things around us to make our daily process more efficient by providing more comfort and productivity. However, these connections also reveal a lot of sensitive data. Therefore, thinking about the methods of information security and coding are important as the security approaches that rely heavily on coding are not a strong match for these restricted devices. Consequently, this research aims to contribute to filling this gap, which adopts machine learning techniques to enhance network-level security in the low-power devices that use the lightweight MQTT protocol for their work. This study used a set of tools tools and, through various techniques, trained the proposed system ranging from Ensemble methods to deep learning models. The system has come to know what type of attack has occurred, which helps protect IoT devices. The log loss of the Ensemble methods is 0.44, and the accuracy of multi-class classification is 98.72% after converting the table data into an image set. The work also uses a Convolution Neural Network, which has a log loss of 0.019 and an accuracy of 99.3%. It also aims to implement these functions in IDS.
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
The introduction of Internet of Things (IoT) applications into daily life has raised serious privacy concerns
among consumers, network service providers, device manufacturers, and other parties involved. This paper
gives a high-level overview of the three phases of data collecting, transmission, and storage in IoT systems
as well as current privacy-preserving technologies. The following elements were investigated during these
three phases:(1) Physical and data connection layer security mechanisms(2) Network remedies(3)
Techniques for distributing and storing data. Real-world systems frequently have multiple phases and
incorporate a variety of methods to guarantee privacy. Therefore, for IoT research, design, development,
and operation, having a thorough understanding of all phases and their technologies can be beneficial. In
this Study introduced two independent methodologies namely generic differential privacy (GenDP) and
Cluster-Based Differential privacy ( Cluster-based DP) algorithms for handling metadata as intents and
intent scope to maintain privacy and security of IoT data in cloud environments. With its help, we can
virtual and connect enormous numbers of devices, get a clearer understanding of the IoT architecture, and
store data eternally. However, due of the dynamic nature of the environment, the diversity of devices, the
ad hoc requirements of multiple stakeholders, and hardware or network failures, it is a very challenging
task to create security-, privacy-, safety-, and quality-aware Internet of Things apps. It is becoming more
and more important to improve data privacy and security through appropriate data acquisition. The
proposed approach resulted in reduced loss performance as compared to Support Vector Machine (SVM) ,
Random Forest (RF) .
Internet of things: review, architecture and applicationsCSITiaesprime
Devices linked to the internet of things (IoT) may communicate with one another in several settings. Furthermore, rather of relying on an existing centralized system, users may develop their own network by using wireless capabilities. This kind of network is known as a wireless mobile ad hoc network. The mobile ad-hoc network (MANET) enables IoT devices to connect with one another in an unstructured networked environment. IoT devices may connect, establish linkages, and share data on a continuous basis. In this system, the cloud's purpose is to store and analyze data acquired from IoT devices. One of the most significant challenges in cloud computing has been identified as information security, and its resolution will result in an even bigger increase in cloud computing usage and popularity in the future. Finally, the goal of this project is to create a framework for facilitating communication between IoT devices in a Cloud and MANET context. Our major contribution is a ground-breaking research initiative that combines cloud computing with the MANET and connects the internet of things. This research might be used to the IoT in the future.
Pervasive and ubiquitous computing has enabled people better integrate physical things into the digital world. The internet of things (IoT) has been considerably more widely used in business and everyday life in the last decade. Innovative healthcare information and communication technologies are a vast field of research and applications that need IoT benefits, including speed, security, and low cost. The proposed modified advanced encryption standard (AES)-cipher block chaining (CBC)-based blockchain technology offers a shared key to devices that need to communicate directly with or with entities outside the smart healthcare network to give users greater control over transactions. The experiments are carried out using a Raspberry Pi 3, whereas two different sensors are employed in this case. Blockchain technology encrypts data between doctor and patient with varied user numbers. The results from experiments revealed that the proposed modified AES-CBC based blockchain technology could provide the IoT application with security services (confidentiality, integrity, and access control) with efficient execution time.
35 9142 it s-execution evaluation of end-to-end edit septianIAESIJEECS
Remote Sensor Networks are bound to assume a crucial part in the cutting edge Internet, which will be described by the Machine-to-Machine worldview, as indicated by which; installed gadgets will effectively trade data, therefore empowering the improvement of creative applications. It will add to declare the idea of Internet of Things, where end to-end security speaks to a key issue. In such setting, it is essential to comprehend which conventions can give the correct level of security without loading the restricted assets of compelled systems. This paper displays an execution examination between two of the most broadly utilized security conventions: IPSec and DTLS. We give the investigation of their effect on the assets of gadgets.
Preprint-ICCSAI2022,Galgotias University,23-24 December 2022.pdfChristo Ananth
Call for Papers- Special Session: Applications of Artificial Intelligence in IoT Security, 1st International Conference On Communication, Security And Artificial Intelligence (ICCSAI-2022),Greater Noida, NCR, New Delhi, India, December 23 to 24, 2022
Christo Ananth, Akhatov Akmal Rustamovich
Professor, Samarkand State University, Uzbekistan
2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)ijdms
2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021) will act as a major forum for the presentation of innovative ideas, approaches, developments, and research projects in the areas of Cloud, Big Data and IoT. It will also serve to facilitate the exchange of information between researchers and industry professionals to discuss the latest issues and advancement in the area of Cloud, Big Data and IoT.
4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)IJMIT JOURNAL
4th International Conference on Cloud, Big Data and IoT (CBIoT 2023) will act as a major forum for the presentation of innovative ideas, approaches, developments, and research projects in the areas of Cloud, Big Data and IoT. It will also serve to facilitate the exchange of information between researchers and industry professionals to discuss the latest issues and advancement in the area of Cloud, Big Data and IoT.
Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in Cloud, Big Data and IoT.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Introduction to IoT Architectures and Protocols
1. Introduction to Internet of Things Architectures and
Protocols
Dr. Abdullah Alfadhly
KACST
National Center for Computer Technology and Applied Mathematics
(CTAM)
Riyadh, Saudi Arabia
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and Protocols July 31, 2017 1 / 57
2. Outline
1 IoT overview
2 From M2M to IoT
3 IoT Architecture
4 IoT Ecosystem
5 IoT Standards
6 IoT Protocols
7 IoT Platforms
8 An Example: MQTT
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and Protocols July 31, 2017 2 / 57
3. IoT overview
IoT Overview - Definition
The term ”Internet of Things” (IoT) denotes a trend where a large
number of embedded devices employ communication services offered
by the Internet protocols. Many of these devices, often called ”smart
objects, are not directly operated by humans, but exist as components
in buildings or vehicles, or are spread out in the environment. (The
Internet Architecture Board)
A global infrastructure for the information society, enabling advanced
services by interconnecting (physical and virtual) things based on
existing and evolving interoperable information and communication
technologies (ITU)
The Internet of things (noun): The interconnection via the Internet of
computing devices embedded in everyday objects, enabling them to
send and receive data (Oxford Dictionary)
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and Protocols July 31, 2017 3 / 57
4. IoT overview
IoT Overview - Enablers
Ubiquitous Connectivity: Low cost, high speed, and pervasive network
connectivity
Widespread adoption of IPbased networking.
Moores law continues to deliver greater computing power at lower
price points and lower power consumption. Manufacturing advances
allow cutting-edge computing and communications technology to be
incorporated into very small objects
Rise of Cloud Computing and big data analytics.
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and Protocols July 31, 2017 4 / 57
5. IoT overview
IoT Overview - Challenges
Security
Privacy
Interoperability / Standards
Legal, Regulatory and Rights
Emerging Economy and Development Issues
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and Protocols July 31, 2017 5 / 57
6. From M2M to IoT
From M2M to IoT
In the 1990s, advances in wireless technology allowed
machinetomachine (M2M) enterprise and industrial solutions to
become widespread.
Many of these early M2M solutions, however, were based on closed
purposebuilt networks and proprietary or industryspecific standards
The recent open M2M solutions are usually vertically centric which
mean it serves a particular domain application (Health, Home,
Industrial , etc.)
The concept of IoT is to build a horizontal layer that overlap all
domains creating one big platform.
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and Protocols July 31, 2017 6 / 57
7. From M2M to IoT
From M2M to IoT
The IoT Horizontal Layer
Source: Hller, Jan, Vlasios Tsiatsis, Catherine Mulligan, et al. 2014 - Chapter 2 - M2M to IoT The Vision.
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and Protocols July 31, 2017 7 / 57
8. From M2M to IoT
From M2M to IoT
A use case example: Stress measurement M2M solution
Source: Hller, Jan, Vlasios Tsiatsis, Catherine Mulligan, et al. 2014 - Chapter 2 - M2M to IoT The Vision.
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and Protocols July 31, 2017 8 / 57
9. From M2M to IoT
From M2M to IoT
A use case example: Stress measurement IoT solution
Source: Hller, Jan, Vlasios Tsiatsis, Catherine Mulligan, et al. 2014 - Chapter 2 - M2M to IoT The Vision.
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and Protocols July 31, 2017 9 / 57
10. IoT Architecture
IoT Architecture
Device Layer
Network Layer
Application Support
Layer
Application Layer
ManagementLayer
SecurityLayer
DC
GC
NC
TC
IOTA
GSC SSC
GMC
SMC
GSEC
SSEC
DC: Device Capabilities
GC: Gateway Capabilities
NC: Network Capabilities
TC: Transport Capabilities
GSC: Generic Support Capabilities
SSC: Specific Support Capabilities
IOTA: IOT Applications
GMC: Generic Management Capabilities
SMC: Specific Management Capabilities
GSEC: Generic Security Capabilities
SSEC: Specific Security Capabilities
Source: ITU (redrawn)
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and ProtocolsJuly 31, 2017 10 / 57
11. IoT Architecture
IoT Architecture
Device Layer
Network Layer
Application Support
Layer
Application Layer
ManagementLayer
SecurityLayer
DC
GC
NC
TC
IOTA
GSC SSC
GMC
SMC
GSEC
SSEC
DC: Device Capabilities
GC: Gateway Capabilities
NC: Network Capabilities
TC: Transport Capabilities
GSC: Generic Support Capabilities
SSC: Specific Support Capabilities
IOTA: IOT Applications
GMC: Generic Management Capabilities
SMC: Specific Management Capabilities
GSEC: Generic Security Capabilities
SSEC: Specific Security Capabilities
Device Capabilities: Sensing and actuating, sleeping and waking up,
ad-hoc networking, communicating directly or indirectly with upper layers
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and ProtocolsJuly 31, 2017 10 / 57
12. IoT Architecture
IoT Architecture
Device Layer
Network Layer
Application Support
Layer
Application Layer
ManagementLayer
SecurityLayer
DC
GC
NC
TC
IOTA
GSC SSC
GMC
SMC
GSEC
SSEC
DC: Device Capabilities
GC: Gateway Capabilities
NC: Network Capabilities
TC: Transport Capabilities
GSC: Generic Support Capabilities
SSC: Specific Support Capabilities
IOTA: IOT Applications
GMC: Generic Management Capabilities
SMC: Specific Management Capabilities
GSEC: Generic Security Capabilities
SSEC: Specific Security Capabilities
Gateway Capabilities: Multiple interfaces support, protocol conversion,
some of application logic, execution environment
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and ProtocolsJuly 31, 2017 10 / 57
13. IoT Architecture
IoT Architecture
Device Layer
Network Layer
Application Support
Layer
Application Layer
ManagementLayer
SecurityLayer
DC
GC
NC
TC
IOTA
GSC SSC
GMC
SMC
GSEC
SSEC
DC: Device Capabilities
GC: Gateway Capabilities
NC: Network Capabilities
TC: Transport Capabilities
GSC: Generic Support Capabilities
SSC: Specific Support Capabilities
IOTA: IOT Applications
GMC: Generic Management Capabilities
SMC: Specific Management Capabilities
GSEC: Generic Security Capabilities
SSEC: Specific Security Capabilities
Network Capabilities: Network connectivity, mobility management, AAA
(authentication, authorization, and accounting)
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and ProtocolsJuly 31, 2017 10 / 57
14. IoT Architecture
IoT Architecture
Device Layer
Network Layer
Application Support
Layer
Application Layer
ManagementLayer
SecurityLayer
DC
GC
NC
TC
IOTA
GSC SSC
GMC
SMC
GSEC
SSEC
DC: Device Capabilities
GC: Gateway Capabilities
NC: Network Capabilities
TC: Transport Capabilities
GSC: Generic Support Capabilities
SSC: Specific Support Capabilities
IOTA: IOT Applications
GMC: Generic Management Capabilities
SMC: Specific Management Capabilities
GSEC: Generic Security Capabilities
SSEC: Specific Security Capabilities
Transport Capabilities: Transport services for data and control
information
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and ProtocolsJuly 31, 2017 10 / 57
15. IoT Architecture
IoT Architecture
Device Layer
Network Layer
Application Support
Layer
Application Layer
ManagementLayer
SecurityLayer
DC
GC
NC
TC
IOTA
GSC SSC
GMC
SMC
GSEC
SSEC
DC: Device Capabilities
GC: Gateway Capabilities
NC: Network Capabilities
TC: Transport Capabilities
GSC: Generic Support Capabilities
SSC: Specific Support Capabilities
IOTA: IOT Applications
GMC: Generic Management Capabilities
SMC: Specific Management Capabilities
GSEC: Generic Security Capabilities
SSEC: Specific Security Capabilities
Generic Support Capabilities: Data processing, Data storage, etc.
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and ProtocolsJuly 31, 2017 10 / 57
16. IoT Architecture
IoT Architecture
Device Layer
Network Layer
Application Support
Layer
Application Layer
ManagementLayer
SecurityLayer
DC
GC
NC
TC
IOTA
GSC SSC
GMC
SMC
GSEC
SSEC
DC: Device Capabilities
GC: Gateway Capabilities
NC: Network Capabilities
TC: Transport Capabilities
GSC: Generic Support Capabilities
SSC: Specific Support Capabilities
IOTA: IOT Applications
GMC: Generic Management Capabilities
SMC: Specific Management Capabilities
GSEC: Generic Security Capabilities
SSEC: Specific Security Capabilities
Specific Support Capabilities: Provide different support functions for
different IoT applications
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and ProtocolsJuly 31, 2017 10 / 57
17. IoT Architecture
IoT Architecture
Device Layer
Network Layer
Application Support
Layer
Application Layer
ManagementLayer
SecurityLayer
DC
GC
NC
TC
IOTA
GSC SSC
GMC
SMC
GSEC
SSEC
DC: Device Capabilities
GC: Gateway Capabilities
NC: Network Capabilities
TC: Transport Capabilities
GSC: Generic Support Capabilities
SSC: Specific Support Capabilities
IOTA: IOT Applications
GMC: Generic Management Capabilities
SMC: Specific Management Capabilities
GSEC: Generic Security Capabilities
SSEC: Specific Security Capabilities
IoT Application: The Internet of things application written by an IoT
developer and executed by the user
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and ProtocolsJuly 31, 2017 10 / 57
18. IoT Architecture
IoT Architecture
Device Layer
Network Layer
Application Support
Layer
Application Layer
ManagementLayer
SecurityLayer
DC
GC
NC
TC
IOTA
GSC SSC
GMC
SMC
GSEC
SSEC
DC: Device Capabilities
GC: Gateway Capabilities
NC: Network Capabilities
TC: Transport Capabilities
GSC: Generic Support Capabilities
SSC: Specific Support Capabilities
IOTA: IOT Applications
GMC: Generic Management Capabilities
SMC: Specific Management Capabilities
GSEC: Generic Security Capabilities
SSEC: Specific Security Capabilities
Generic Management Capabilities: Device management such as
activation/deactivation and firmware/software upgrades, Network topology
and congestion management
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and ProtocolsJuly 31, 2017 10 / 57
19. IoT Architecture
IoT Architecture
Device Layer
Network Layer
Application Support
Layer
Application Layer
ManagementLayer
SecurityLayer
DC
GC
NC
TC
IOTA
GSC SSC
GMC
SMC
GSEC
SSEC
DC: Device Capabilities
GC: Gateway Capabilities
NC: Network Capabilities
TC: Transport Capabilities
GSC: Generic Support Capabilities
SSC: Specific Support Capabilities
IOTA: IOT Applications
GMC: Generic Management Capabilities
SMC: Specific Management Capabilities
GSEC: Generic Security Capabilities
SSEC: Specific Security Capabilities
Specific Management Capabilities: coupled with application-specific
requirements
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and ProtocolsJuly 31, 2017 10 / 57
20. IoT Architecture
IoT Architecture
Device Layer
Network Layer
Application Support
Layer
Application Layer
ManagementLayer
SecurityLayer
DC
GC
NC
TC
IOTA
GSC SSC
GMC
SMC
GSEC
SSEC
DC: Device Capabilities
GC: Gateway Capabilities
NC: Network Capabilities
TC: Transport Capabilities
GSC: Generic Support Capabilities
SSC: Specific Support Capabilities
IOTA: IOT Applications
GMC: Generic Management Capabilities
SMC: Specific Management Capabilities
GSEC: Generic Security Capabilities
SSEC: Specific Security Capabilities
Generic Security Capabilities: authorization, authentication, data
confidentiality and integrity protection, privacy protection
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and ProtocolsJuly 31, 2017 10 / 57
21. IoT Architecture
IoT Architecture
Device Layer
Network Layer
Application Support
Layer
Application Layer
ManagementLayer
SecurityLayer
DC
GC
NC
TC
IOTA
GSC SSC
GMC
SMC
GSEC
SSEC
DC: Device Capabilities
GC: Gateway Capabilities
NC: Network Capabilities
TC: Transport Capabilities
GSC: Generic Support Capabilities
SSC: Specific Support Capabilities
IOTA: IOT Applications
GMC: Generic Management Capabilities
SMC: Specific Management Capabilities
GSEC: Generic Security Capabilities
SSEC: Specific Security Capabilities
Specific Security Capabilities: coupled with application-specific
requirements
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and ProtocolsJuly 31, 2017 10 / 57
22. IoT Architecture
IoT Architecture - Communication Models
1-Device to Device Model
2-Device to Cloud Model
Source: Internet Society
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and ProtocolsJuly 31, 2017 11 / 57
23. IoT Architecture
IoT Architecture - Communication Models
3-Device to Gateway Model
Source: Internet Society
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and ProtocolsJuly 31, 2017 12 / 57
24. IoT Architecture
IoT Architecture - Communication Models
4-Back End Data Sharing Model
Source: Internet Society
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and ProtocolsJuly 31, 2017 13 / 57
25. IoT Ecosystem
IoT Ecosystem - Overview
The IoT ecosystem is composed of a variety of business players. Each
business player plays at least one business role, but more roles are possible
Application Provider
Application Customer
Platform Provider
Network Provider
Device Provider
Source: ITU (redrawn)
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and ProtocolsJuly 31, 2017 14 / 57
26. IoT Ecosystem
IoT Ecosystem - Business Models
Platform
Provider
Device
Provider
Network
Provider
Application
Provider
Application
Customer
Player A
Model-1
Platform
Provider
Device
Provider
Network
Provider
Application
Provider
Application
Customer
Player A
Model-2
Player B
Source: ITU (redrawn)
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and ProtocolsJuly 31, 2017 15 / 57
27. IoT Ecosystem
IoT Ecosystem - Business Models
Platform
Provider
Device
Provider
Network
Provider
Application
Provider
Application
Customer
Player A Player BPlayer B
Platform
Provider
Device
Provider
Network
Provider
Application
Provider
Application
Customer
Player A Player BPlayer B
Model-3
Model-4
Source: ITU (redrawn)
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and ProtocolsJuly 31, 2017 16 / 57
28. IoT Ecosystem
IoT Ecosystem - Business Models
Platform
Provider
Device
Provider
Network
Provider
Application
Provider
Application
Customer
Player A Player BPlayer C Player C
Model-5
Source: ITU (redrawn)
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and ProtocolsJuly 31, 2017 17 / 57
29. IoT Standards
IoT Standards - Benefits
Reduced deployment and operation costs
Costeffective products thanks to focused R&D efforts
Easier application development
Easier integration between solution components
Ability to share and reuse infrastructure and field devices
Sustainable investments
No vendor lockin
Ability to benefit from further evolutions of the standard as it grows
Improved opportunities
Ability to share and reuse data across vertical applications
Ability to interconnect with other IoT/M2M systems
Fostering of new applications and new business models
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and ProtocolsJuly 31, 2017 18 / 57
30. IoT Standards
IoT Standards - Overview
Source: Intel
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and ProtocolsJuly 31, 2017 19 / 57
31. IoT Standards
IoT Standards - Organizations
Internet Engineering Task Force (IETF)
Constrained RESTful Environments Working Group (CoRE)
IPv6 over Low power WPAN Working Group (6lowpan)
Routing Over Low power and Lossy networks Working Group (ROLL)
OneM2M : The purpose and goal of oneM2M is to develop technical
specifications which address the need for a common M2M Service
Layer that can be readily embedded within various hardware and
software.
World Wide Web Consortium (W3C)
Web of thing Community Group
Semantic Sensor Net Ontology
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and ProtocolsJuly 31, 2017 20 / 57
32. IoT Standards
IoT Standards - Organizations
Organization for the Advancement of Structured Information
Standards (OASIS)
MQTT Technical Committee
Eclipse Paho Project: The scope of the Paho project is to provide
open source implementations of open and standard messaging
protocols that support current and emerging requirements of IoT
International Telecommunication Union (ITU-T)
Internet of Things Global Standards Initiative (IoT-GSI)
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and ProtocolsJuly 31, 2017 21 / 57
33. IoT Standards
IoT Standards - Alliances
Allseen Alliance : The AllSeen Alliance is dedicated to the widespread
adoption of products, systems and services that support the Internet
of Things
AllJoyn Framework: A universal IoT Development Framework
Open Connectivity Foundation (OCF)
The successor to Open Interconnect Consortium (OIC)
Provides IoTivity Framework and data models based on RESTful API
Modeling Language (RAML)
Allseen alliance has recently merged in one alliance with OCF
Open Mobile Alliance (OMA): OMA is the Leading Industry Forum
for Developing Market Driven Interoperable Mobile Service Enablers
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and ProtocolsJuly 31, 2017 22 / 57
34. IoT Standards
IoT Standards - Alliances
IP Smart Object Alliance (IPSO): A global non-profit organization
serving the various communities seeking to establish the Internet
Protocol as the network for the connection of Smart Objects by
providing coordinated marketing efforts available to the general public
Industrial Internet Consortium: Founded in 2014 to further
development, adoption and wide-spread use of interconnected
machines, intelligent analytics and people at work
Internet of Things Global Standards Initiative (IoT-GSI)
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and ProtocolsJuly 31, 2017 23 / 57
35. IoT Standards
IoT Standards - Semantics
Industry specific groups are in best position to define metadata for each
vertical.
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and ProtocolsJuly 31, 2017 24 / 57
36. IoT Standards
IoT Standards - OneM2M
Source: OneM2M
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and ProtocolsJuly 31, 2017 25 / 57
37. IoT Protocols
IoT Protocols - Overview
Low Power communication protocols : COAP, MQTT, RPL, 6LoWPAN,
802.15.4, Low Power Wide Area Network (3GPP and others)
Source: OneM2M
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and ProtocolsJuly 31, 2017 26 / 57
38. IoT Protocols
IoT Protocols - Data Communication
Constrained Application Protocol (COAP)
RESTful protocol design minimizing the complexity of mapping with
HTTP
Low header overhead and parsing complexity
URI and content-type support
Support for the discovery of resources provided by known CoAP services
Simple subscription for a resource, and resulting push notifications
Message Queuing Telemetry Transport (MQTT)
invented by IBM in 2000 for telemetry applications using low power
data rates
enables a publish/subscribe messaging model in an extremely
lightweight way
requires Small Code footprint and low bandwidth
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and ProtocolsJuly 31, 2017 27 / 57
39. IoT Protocols
IoT Protocols - Local Network Communication
IEEE 802.15.4
IEEE 802.15.4 is a standard which specifies the physical layer and
media access control for low-rate wireless personal area networks
(LR-WPANs).
It is maintained by the IEEE 802.15 working group
It is the basis for the ZigBee,ISA100.11a, WirelessHART, and MiWi
specifications, each of which further extends the standard by
developing the upper layers which are not defined in IEEE 802.15.4
it is used with 6LoWPAN and standard Internet protocols to build a
wireless embedded Internet.
Zigbee
Uses the 802.15.4 standard and operates in the 2.4 GHz frequency
range with 250 kbps
The maximum number of nodes in the network is 1024 with a range up
to 200 meter. ZigBee can use 128 bit AES encryption.
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and ProtocolsJuly 31, 2017 28 / 57
40. IoT Protocols
IoT Protocols - Local Network Communication
Bluetooth Low Energy
designed and marketed by the Bluetooth Special Interest Group
Different Profiles for Different applications
Provide the same range as classic bluetooth with considerable low
energy consumption
the technology used in beacons used to send contextual information
based on locations (Google beacon platform , Google Physical web,
Apple ibeacon)
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and ProtocolsJuly 31, 2017 29 / 57
41. IoT Protocols
IoT Protocols - Low Power Wide Area Network (LPWAN)
Weightless is a proposed proprietary open wireless technology
standard for exchanging data between a base station and thousands
of machines around it (using wavelength radio transmissions in
unoccupied TV transmission channels) with high levels of security.
NB-IoT (Narrow-Band IoT) A technology being standardized by
the 3GPP standards body
LTE-MTC (LTE-Machine Type Communication) -
Standards-based family of technologies supports several technology
categories, such as Cat-1 and CatM1, suitable for the IoT.
EC-GSM-IoT (Extended Coverage-GSM-IoT) - Enables new
capabilities of existing cellular networks for LPWA (Low Power Wide
Area) IoT applications. EC-GSM-IoT can be activated through new
software deployed over a very large GSM footprint, adding even more
coverage to serve IoT devices.
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and ProtocolsJuly 31, 2017 30 / 57
42. IoT Protocols
IoT Protocols - Low Power Wide Area Network (LPWAN)
Sigfox is a French company that build Low Power wide network for
connected devices using its proprietary protocol.
LoRaWAN - Network protocol intended for wireless battery operated
Things in regional, national or global network. It is managed by Lora
Alliance.
RPMA (Random phase multiple access) A technology
communication system employing direct-sequence spread spectrum
(DSSS) with multiple access.
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and ProtocolsJuly 31, 2017 31 / 57
43. IoT Protocols
IoT Protocols - Low Power Wide Area Network (LPWAN)
Source: indigoo.com
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and ProtocolsJuly 31, 2017 32 / 57
44. IoT Protocols
IoT Protocols - Low Power Wide Area Network (LPWAN)
Source: indigoo.com
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and ProtocolsJuly 31, 2017 33 / 57
45. IoT Protocols
IoT Protocols - Routing Protocols
IPv6 over Low power
Wireless Personal Area
Networks (6LoWPAN)
An adaption layer for IPv6
over IEEE802.15.4 links
Operates only in the 2.4
GHz frequency range with
250 kbps transfer rate
Routing Protocol for low
Power and Lossy Networks
(RPL)
Developed by IETF ROLL
Working Group
Ideal for N to 1 links
(meters reading)
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and ProtocolsJuly 31, 2017 34 / 57
46. IoT Protocols
IoT Protocols - Discovery
Search around me: This
category of discovery
includes technologies that
allow to discover things
around me (in a spatial
sense)
NFC
UriBeacon (Formerly
known as Physical Web
from Google)
iBeacon (from Apple)
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and ProtocolsJuly 31, 2017 35 / 57
47. IoT Protocols
IoT Protocols - Discovery
Search on my network: It covers technologies enabling discovery of
things on the network.
mDNS
SSDP
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and ProtocolsJuly 31, 2017 36 / 57
48. IoT Protocols
IoT Protocols - Discovery
Searching in a directory:
A central directory is used
for discovery of things and
resources
Discovery requests are
sent to the directory
CoRE Resource
Directory
XMPP IoT Discovery
SPARQL Endpoints
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and ProtocolsJuly 31, 2017 37 / 57
49. IoT Protocols
IoT Protocols - Discovery
Search Across Peers:
In P2P style discovery, the directory is essentially distributed across the
peers
Distributed hash tables (DHT) is often used to map the search space
into a numeric range and then allocates servers to parts of that range
Observation: the technique works well for scale free networks
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and ProtocolsJuly 31, 2017 38 / 57
50. IoT Protocols
IoT Protocols - Discovery
Search for Thing Metadata:
Once a thing” has been
discovered with
mentioned mechanisms
next ”resources”
(thing metadata)
access at thing level
needs to be performed
Examples
CoAP + CoRE Link
Format (for thing
metadata)
Sensor Observation
Service (SOS): it is a
web service which
allows querying sensor
metadata.
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and ProtocolsJuly 31, 2017 39 / 57
51. IoT Platforms
IoT Platforms - Overview
IoT platforms are the central piece in the Internet of Things
architecture that connect the real and the virtual worlds and enable
communication between objects
It is The backbone system to manage IoT business cases. The real
value of IoT is done there (Analytics)
There are hundreds of them and number is growing.
Platforms Types:
Based on Technological depth: The connectivity Platform, The action
Platform, and The scale Platform
Based on the segment focus: Smart Home, Connected card, Smart city,
Smart retail, Industrial, and other.
Based on Integration approach : One stop-shop platform and
customizable white-label platforms
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and ProtocolsJuly 31, 2017 40 / 57
52. IoT Platforms
IoT Platform - Components
Source: IoT Analytics
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and ProtocolsJuly 31, 2017 41 / 57
53. An Example: MQTT
MQTT - Overview
MQTT was invented by IBM back in 1999.
The goal is to create a protocol for minimal battery loss and minimal
bandwidth connecting oil pipelines over satellite connection
After MQTT had been used by IBM internally for quite some times,
version 3.1 was released royalty free in 2010
The protocol hand-overed to OASIS organization for The
standardization process which took around 1 year and on October
29th 2014 MQTT was officially approved as OASIS Standard.
MQTT 3.1.1 is now the newest version of the protocol.
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and ProtocolsJuly 31, 2017 42 / 57
54. An Example: MQTT
MQTT - Features
Client Server publish/subscribe messaging transport protocol
Simple to implement
Lightweight and Bandwidth Efficient
small code footprint
Provide a Quality of Service Data Delivery
Data Agnostic
Continuous Session Awareness
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and ProtocolsJuly 31, 2017 43 / 57
55. An Example: MQTT
MQTT - Publish and Subscribe Model
Source: HiveMQ.com
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and ProtocolsJuly 31, 2017 44 / 57
56. An Example: MQTT
MQTT - Publish and Subscribe Model
The Pub/Sub model decouples the sender (Publisher) from the
receiver (Subscriber) by a third party called the broker
Space decoupling: Publisher and subscriber do not need to know
each other (by ip address and port for example)
Time decoupling: Publisher and subscriber do not need to run at the
same time
Synchronization decoupling: Operations on both components are
not halted during publish or receiving
The broker filters all incoming messages coming from publishers and
distributes them to subscribers accordingly
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and ProtocolsJuly 31, 2017 45 / 57
57. An Example: MQTT
MQTT - Publish and Subscribe Model
Pub/Sub also provides a greater scalability than the traditional
client-server approach because operations on the broker can be highly
parallelized and processed event-driven
To scale publish/subscribe to millions of connections, cluster of
brokers are used .
The broker filter then forward messages to subscribers based on three
criteria :
Subject-based filtering
Content-based filtering
Type-based filtering
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and ProtocolsJuly 31, 2017 46 / 57
58. An Example: MQTT
MQTT Connection
Source: HiveMQ.com
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and ProtocolsJuly 31, 2017 47 / 57
59. An Example: MQTT
MQTT Publish and Subscribe
Source: HiveMQ.com
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and ProtocolsJuly 31, 2017 48 / 57
60. An Example: MQTT
MQTT Topics
Source: HiveMQ.com
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and ProtocolsJuly 31, 2017 49 / 57
61. An Example: MQTT
MQTT Quality of Service (QoS)
Qos is a major feature of MQTT because it handles retransmission
and guarantees the delivery of the message
Mostly used for unreliable networks.
Three levels: 0, 1, and 2.
QoS 0 at most once: A
message wont be acknowledged
by the receiver or stored and
redelivered by the sender. This
is often called fire and forget
and provides the same
guarantee as the underlying
TCP protocol.
Source: HiveMQ.com
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and ProtocolsJuly 31, 2017 50 / 57
62. An Example: MQTT
MQTT Quality of Service (QoS)
QoS 1 at least once
When using QoS level 1, it is
guaranteed that a message will be
delivered at least once to the
receiver. But the message can also
be delivered more than once.
The sender will store the message
until it gets an acknowledgement in
form of a PUBACK command
message from the receiver.
If the PUBACK isnt received in a
reasonable amount of time the sender
will resend the PUBLISH message
Source: HiveMQ.com
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and ProtocolsJuly 31, 2017 51 / 57
63. An Example: MQTT
MQTT Quality of Service (QoS)
It is the lowest level
If a receiver gets a QoS 2 PUBLISH it will process the message and
send PUBREC message.
When the sender receives the PUBREC it can safely discard the initial
publish, then store the PUBREC and respond with a PUBREL.
After the receiver gets the PUBREL it can discard every stored state
and answer with a PUBCOMP. The same is true when the sender
receives the PUBCOMP.
Source: HiveMQ.com
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and ProtocolsJuly 31, 2017 52 / 57
64. An Example: MQTT
MQTT - Simple Expirment
We will use two applications running on your mobile phones. One
acts as a publisher and the other as a subscriber. You can also work
in pairs.
For Android use mymqtt (publisher) and MQTT Dash (subscriber)
applications. Download them from Google play and install them in
your phone
For iphone, go to the website service
http://www.hivemq.com/demos/websocket-client/
First configure the clients with the following minimal parameters :
Address : iot.eclipse.org Port : 1884
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and ProtocolsJuly 31, 2017 53 / 57
65. An Example: MQTT
MQTT - Simple Expirment
Use one client to subscribe to the following topic:
kacst/b36/xxxx/temp (xxxx is a random number)
Use the other client to publish a message using the same topic
Publish a different value and make sure it is received by the subscriber
You could also try the wild-card feature
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and ProtocolsJuly 31, 2017 54 / 57
66. An Example: MQTT
Summary
The IoT vision is to build a horizontal layer across different vertical
domains to facilitate data sharing and enable innovative applications
The IoT functional architecture includes from top to bottom
application, application support, network, and device layers.
Management and security span all layers.
Four IoT communication models: Device to device , Device to cloud,
Device to gateway , and Back end sharing data models
The IoT ecosystem has four Business roles : Device provider, Network
provider, Platform provider, and application providers. One player
could have more than one business roles.
The IoT standardization is paramount for cost reduction and
interoperability among different devices and applications. The efforts
happen everywhere
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and ProtocolsJuly 31, 2017 55 / 57
67. An Example: MQTT
Summary
New protocols are designed in each functional layer.
OneM2M works to standardize the horizontal layer of the IoT
Rich metadata is needed to describe things and their actions, events,
and relations
IoT platform is the back end system where the real work is done. It is
composed of different components that facilitate device management,
data storage and processing , events handling, data analysis,
visualization, and API to connect to devices or other platforms or
systems
Finally we describe the publish and subscribe communication model
and how MQTT protocol and why it is suitable for IoT applications
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and ProtocolsJuly 31, 2017 56 / 57
68. An Example: MQTT
Thank you
Thank you
Q & A
Dr. Abdullah Alfadhly KACST National Center for Computer Technology and Applied Mathematics (CTAM) Riyadh, Saudi ArabiaIntroduction to Internet of Things Architectures and ProtocolsJuly 31, 2017 57 / 57