0
Internet of Actuating Things
Balamuralidhar P, Arpan Pal
Innovation Labs, Tata Consultancy Services (TCS), India
1
Internet of Things & M2M
 Internet of Things
– Towards a vision of networking ‘Things’ on Internet
– Practically it signifies
o Sensing, Identifying, communicating between physical objects such as
home appliances, furniture, vehicles, buildings, components of
infrastructures such as roads, utilities and many more…
 Machine to Machine (M2M) communications is a part of the above
vision
2
Scope
Gateway
Service Platform
3
Internet of Actuating Things
Cognition
Computing
NetworkingEmbedded
Systems
Control
4
- 4 -
Intelligent Infrastructure
Sense
Extract
Analyze
Respond
Learn
Smartening the Infrastructure by
Real-Time Monitoring and
Management
Monitor
Operational Efficiency,
Safety & Security,
Information Services,
Convenience
5
Challenges in Actuating Things
 Actuation causes a change in the state of things (can be
catastrophic if in-appropriate)
 Actuation has associated responsibility
– Need authentication,
– Timeliness, robustness
– Security against un-intended actuations
 Action may be triggered by a software agent or human being.
Challenges in trusting a software agent.
 Energy saving and autonomic capabilities
 Cooperative Actuation further these challenges
6
Erasure coding for Robust Protocol
 Erasure Coding: k blocks are encoded to n blocks , introducing
(n-k) redundancy. If the number of blocks lost during the
transmission m <= (n-k), then original information can be
recovered.
 Mostly used technique to address packet losses is
retransmission. This creates un predictable delays and
reduced throughput.
 Erasure coding is an alternate way to
address this. An apriori estimate of the
channel condition can help in planning the
redundancy required.
 From an IoT perspective, this would be
impactful for multicast transmissions (
mass upgrade, mass configuration etc)
 Evaluation Robust CoAP is in progress
7
Identity based Encryption for Secure IoT
 Identity based Encryption system
– Here a public key is derived from Identity
– Unlike PKI there is no key exchange required during transactions
 In IOT/M2M the number of devices involved are too many. Key
management and exchange would be an issue
 IBE can be used in such cases. Private keys are embedded in
the device. Public key is derived from publicly known identities
such as IP address, MAC address, URI etc.
 Standardisation in progress - IEEE P1636.3/D1
Global ICT Standardization for India (GISFI)
9
GISFI
 Forum for addressing ICT standardization in India (www.gisfi.org )
 Working Groups
– Security and Privacy
– Future Radio Networks
– Internet of Things (IoT)
– Service Oriented Network (SEoN)
– Green ICT
10
Use Cases being considered in IoT WG
IoT WG
Healthcare
Home
Smart Grid
Agriculture
Food Supply Chain
Public Safety
Transportation
11
IoT Reference Architecture
Sensor / Devices
Gateway
Service Platform
Applications
IoT Core
Network
I1
I2
I3
Robots as Actuating Things in IoT
13
Market Projection
14
Some Social Applications of Robotics
 Public safety – Search & Rescue
– Detecting human under debris, water and fire
 Surveillance
– Campus security (mobile cameras and audio)
– Monitoring flora and fauna, forest fires
 Agriculture / farming
 Remote Infrastructure Monitoring & Management
 Remote Healthcare & Assisted Living
15
A Motivating Requirement
16
Robots as Mobile Gateways
 Mobile data collection
– Agriculture monitoring
– Mobile Agro-advisory System
– Real-time sending of Soil Temperature, Soil Moisture, Atmospheric
Temperature and Atmospheric Humidity
 Advantages of Robots as Mobile Gateways
– Energy saving through lower communication range
– Periodic Sensor auto calibration
17
Technology Challenges
 Wireless Networking
– Variable communication range
– Mobility: no to moderate (pedestrian) speeds
– Dynamic topology
– Reliability & robustness, security
– Real-time communication for actuation (downlink)
18
Summary
 “Actuating Things” have variety of important applications and
related challenges
 Robots are a popular category of actuators
 Wireless robotics need attention of researchers and
standardization bodies
– Machine to Actuating Machine communications
o Next M2M?
Note:- Some of the pictures are taken from publicly available internet and have been used for illustration purpose only
Thank You

Io t of actuating things

  • 1.
    0 Internet of ActuatingThings Balamuralidhar P, Arpan Pal Innovation Labs, Tata Consultancy Services (TCS), India
  • 2.
    1 Internet of Things& M2M  Internet of Things – Towards a vision of networking ‘Things’ on Internet – Practically it signifies o Sensing, Identifying, communicating between physical objects such as home appliances, furniture, vehicles, buildings, components of infrastructures such as roads, utilities and many more…  Machine to Machine (M2M) communications is a part of the above vision
  • 3.
  • 4.
    3 Internet of ActuatingThings Cognition Computing NetworkingEmbedded Systems Control
  • 5.
    4 - 4 - IntelligentInfrastructure Sense Extract Analyze Respond Learn Smartening the Infrastructure by Real-Time Monitoring and Management Monitor Operational Efficiency, Safety & Security, Information Services, Convenience
  • 6.
    5 Challenges in ActuatingThings  Actuation causes a change in the state of things (can be catastrophic if in-appropriate)  Actuation has associated responsibility – Need authentication, – Timeliness, robustness – Security against un-intended actuations  Action may be triggered by a software agent or human being. Challenges in trusting a software agent.  Energy saving and autonomic capabilities  Cooperative Actuation further these challenges
  • 7.
    6 Erasure coding forRobust Protocol  Erasure Coding: k blocks are encoded to n blocks , introducing (n-k) redundancy. If the number of blocks lost during the transmission m <= (n-k), then original information can be recovered.  Mostly used technique to address packet losses is retransmission. This creates un predictable delays and reduced throughput.  Erasure coding is an alternate way to address this. An apriori estimate of the channel condition can help in planning the redundancy required.  From an IoT perspective, this would be impactful for multicast transmissions ( mass upgrade, mass configuration etc)  Evaluation Robust CoAP is in progress
  • 8.
    7 Identity based Encryptionfor Secure IoT  Identity based Encryption system – Here a public key is derived from Identity – Unlike PKI there is no key exchange required during transactions  In IOT/M2M the number of devices involved are too many. Key management and exchange would be an issue  IBE can be used in such cases. Private keys are embedded in the device. Public key is derived from publicly known identities such as IP address, MAC address, URI etc.  Standardisation in progress - IEEE P1636.3/D1
  • 9.
    Global ICT Standardizationfor India (GISFI)
  • 10.
    9 GISFI  Forum foraddressing ICT standardization in India (www.gisfi.org )  Working Groups – Security and Privacy – Future Radio Networks – Internet of Things (IoT) – Service Oriented Network (SEoN) – Green ICT
  • 11.
    10 Use Cases beingconsidered in IoT WG IoT WG Healthcare Home Smart Grid Agriculture Food Supply Chain Public Safety Transportation
  • 12.
    11 IoT Reference Architecture Sensor/ Devices Gateway Service Platform Applications IoT Core Network I1 I2 I3
  • 13.
    Robots as ActuatingThings in IoT
  • 14.
  • 15.
    14 Some Social Applicationsof Robotics  Public safety – Search & Rescue – Detecting human under debris, water and fire  Surveillance – Campus security (mobile cameras and audio) – Monitoring flora and fauna, forest fires  Agriculture / farming  Remote Infrastructure Monitoring & Management  Remote Healthcare & Assisted Living
  • 16.
  • 17.
    16 Robots as MobileGateways  Mobile data collection – Agriculture monitoring – Mobile Agro-advisory System – Real-time sending of Soil Temperature, Soil Moisture, Atmospheric Temperature and Atmospheric Humidity  Advantages of Robots as Mobile Gateways – Energy saving through lower communication range – Periodic Sensor auto calibration
  • 18.
    17 Technology Challenges  WirelessNetworking – Variable communication range – Mobility: no to moderate (pedestrian) speeds – Dynamic topology – Reliability & robustness, security – Real-time communication for actuation (downlink)
  • 19.
    18 Summary  “Actuating Things”have variety of important applications and related challenges  Robots are a popular category of actuators  Wireless robotics need attention of researchers and standardization bodies – Machine to Actuating Machine communications o Next M2M? Note:- Some of the pictures are taken from publicly available internet and have been used for illustration purpose only
  • 20.