Internet of things applications covering industrial domainDev Bhattacharya
Internet of things (IOT) applications covering industrial domain was presented at World congress on Industrial Automation on July 22 '15. This presentation provides an overview of IOT and industrial IOT including protocols, system architecture, industrial IOT key differences, industrial IOT system architecture and requirements, architectural components such as operational technology(OT) and informational technology components (IT), Edge processing device hardware and software.
Internet of things applications covering industrial domainDev Bhattacharya
Internet of things (IOT) applications covering industrial domain was presented at World congress on Industrial Automation on July 22 '15. This presentation provides an overview of IOT and industrial IOT including protocols, system architecture, industrial IOT key differences, industrial IOT system architecture and requirements, architectural components such as operational technology(OT) and informational technology components (IT), Edge processing device hardware and software.
Intelligent Internet of Things (IIoT): System Architectures and CommunicationsRaghu Nandy
Internet of Things (IoT) can be designed by various approaches with optimistic technology choices. This paper focuses on comparing recent studies on architectural choices and communication approaches for IoT Systems. Understanding Goals of an IoT system and inventing a general prototype for general IoT solutions is unique challenging. Existing research prototypes provide us information about IoT systems and their challenges. Existing architectures and communication approaches such as such as Service Oriented Architecture (SOA), Instant Messaging (XMPP) and Web- Sockets Service can be used to develop a general IoT System prototype. SOA provides centralized/decentralized IoT systems. Instant Message services such as XMPP can be used to build distributed and secure IoT platforms. Web-sockets also used to build scalable IoT systems. Over all the choice depends on IoT system Goal and limitations. Intelligent IoT (IIoT) Systems can be seen as decision making system. IoT systems can be built on Cloud infrastructures With Sensor Event as a Service (SEaaS) - Cloud Sensor networks can enable applications to access on demand real-time sensor data. A generic IoT platform can be built and extended to a newer applications and platforms.
This Introduction to the Architectural Reference Model (ARM) for the Internet of Things which is currently developed by the project partners of the European FP7 Research Project IoT-A.
Microsoft's view of the Internet of Things (IoT) by Imran ShafqatAllied Consultants
Credits to Imran Shafqat, an x-colleague who presented this in the Allied Consultants office and then in MIC in Lahore
More IoT blogs on http://www.alliedc.com/blog/core-services/application-integration/iot/
Embedded system & IoT Course | certification Program | Learn and BuildLearn and Build
Introduction to embedded systems and IoT, during this course you will learn how to create IoT web applications like flask ,analytics, google clouds etc. and have many opportunities to explore. Best industry expert will guide your path and become an IoT expert.
IoT is the buzzword today. Wherever you go, people talk about it and there is more hype than reality. In this situation as fresh engineers it is important for you to understand IoT by taking an "inside-out" approach. It means to build understanding about various building blocks of IoT (Sensor | Device | Cloud | App) and technologies associated with it. This talk also focus on these key aspects and also derive key skills that engineers require to build a career in IoT. It will even map with our current ECEP course and make a connect with IoT.
Big Data & IoT. Opportunities and challengesMediaTek Labs
The third webinar in the series, From concept to consumer – make your IoT idea a commercial reality – focussed on IoT security.
One of the major challenges facing the growth and adoption of IoT devices is security. The nature of the fragmented IoT market has led to some genuine security concerns and some novel yet unstandardized devices. With this uncertainty also comes opportunity, especially for solutions who identify security as a key function early in a project.
This webinar explored some of the security challenges facing the burgeoning IoT market: Implementation challenges; Safeguards against breaches; Integrating security standards from the outset.
These slides were used at the first Aarhus Follower Group meet-up for the EU-funded project IoTCrawler. They entail an introduction to the project aswell as a more in depth presentation of the difference between web search and Internet of Things (IoT) search an the development of Internet of Things. Furthermore some of the scenarios from the project are presented.
The Internet of things (IoT) is the extension of Internet connectivity into physical devices and everyday objects.
Presentation cover below topics
How IoT works ? IoT Key Components. Enabling technologies for IoT, IoT Connectivity , Technology Road Map. Iot architecture, How to Choose the Right IoT Platform,Benefits of IoT, IoT adoption barriers, Challenges for IoT security:
Other Challenges
Intelligent Internet of Things (IIoT): System Architectures and CommunicationsRaghu Nandy
Internet of Things (IoT) can be designed by various approaches with optimistic technology choices. This paper focuses on comparing recent studies on architectural choices and communication approaches for IoT Systems. Understanding Goals of an IoT system and inventing a general prototype for general IoT solutions is unique challenging. Existing research prototypes provide us information about IoT systems and their challenges. Existing architectures and communication approaches such as such as Service Oriented Architecture (SOA), Instant Messaging (XMPP) and Web- Sockets Service can be used to develop a general IoT System prototype. SOA provides centralized/decentralized IoT systems. Instant Message services such as XMPP can be used to build distributed and secure IoT platforms. Web-sockets also used to build scalable IoT systems. Over all the choice depends on IoT system Goal and limitations. Intelligent IoT (IIoT) Systems can be seen as decision making system. IoT systems can be built on Cloud infrastructures With Sensor Event as a Service (SEaaS) - Cloud Sensor networks can enable applications to access on demand real-time sensor data. A generic IoT platform can be built and extended to a newer applications and platforms.
This Introduction to the Architectural Reference Model (ARM) for the Internet of Things which is currently developed by the project partners of the European FP7 Research Project IoT-A.
Microsoft's view of the Internet of Things (IoT) by Imran ShafqatAllied Consultants
Credits to Imran Shafqat, an x-colleague who presented this in the Allied Consultants office and then in MIC in Lahore
More IoT blogs on http://www.alliedc.com/blog/core-services/application-integration/iot/
Embedded system & IoT Course | certification Program | Learn and BuildLearn and Build
Introduction to embedded systems and IoT, during this course you will learn how to create IoT web applications like flask ,analytics, google clouds etc. and have many opportunities to explore. Best industry expert will guide your path and become an IoT expert.
IoT is the buzzword today. Wherever you go, people talk about it and there is more hype than reality. In this situation as fresh engineers it is important for you to understand IoT by taking an "inside-out" approach. It means to build understanding about various building blocks of IoT (Sensor | Device | Cloud | App) and technologies associated with it. This talk also focus on these key aspects and also derive key skills that engineers require to build a career in IoT. It will even map with our current ECEP course and make a connect with IoT.
Big Data & IoT. Opportunities and challengesMediaTek Labs
The third webinar in the series, From concept to consumer – make your IoT idea a commercial reality – focussed on IoT security.
One of the major challenges facing the growth and adoption of IoT devices is security. The nature of the fragmented IoT market has led to some genuine security concerns and some novel yet unstandardized devices. With this uncertainty also comes opportunity, especially for solutions who identify security as a key function early in a project.
This webinar explored some of the security challenges facing the burgeoning IoT market: Implementation challenges; Safeguards against breaches; Integrating security standards from the outset.
These slides were used at the first Aarhus Follower Group meet-up for the EU-funded project IoTCrawler. They entail an introduction to the project aswell as a more in depth presentation of the difference between web search and Internet of Things (IoT) search an the development of Internet of Things. Furthermore some of the scenarios from the project are presented.
The Internet of things (IoT) is the extension of Internet connectivity into physical devices and everyday objects.
Presentation cover below topics
How IoT works ? IoT Key Components. Enabling technologies for IoT, IoT Connectivity , Technology Road Map. Iot architecture, How to Choose the Right IoT Platform,Benefits of IoT, IoT adoption barriers, Challenges for IoT security:
Other Challenges
IEEE Computer Society Phoenix Chapter - Internet of Things Innovations & Mega...Mark Goldstein
Mark Goldstein, President of International Research Center delivered his annual technology deep dive, this year into the Internet of Things Innovations & Megatrends to the IEEE Computer Society Phoenix Chapter (http://ewh.ieee.org/r6/phoenix/compsociety/) exploring the emergent Internet wave, the Internet of Things (IoT), on track to connect tens of billions of new sensors and devices in the coming years. Waves of change are rolling through home, business, government, industrial, medical, transportation, and other complex ecosystems. He examined how IoT will be implemented and monetized creating new business models from pervasive sensor deployments and data gathering as myriad wireless technologies will connect smart spaces at home, at work, and in public space including autonomous transportation accompanied by new privacy and security risks. View to explore IoT’s roadblocks and operational challenges, emerging standards and protocols, gateway and wireless integration, and big data strategies and opportunities bringing you the insight and strategies to leverage emerging IoT opportunities.
Tekforce Corp is one of the fastest growing a nationwide IT Staffing/Consulting firm with corporate headquarters in San Ramon, CA, providing Professional call Zedrick Khan / VP at 510.258.9493
Developing Interoperable Components for an Open IoT Foundation Eurotech
In this presentation Eurotech and Red Hat present Kapua, a modular cloud platform that provides management for Internet of Things (IoT) gateways and smart edge devices. It represents a key milestone towards the development of a truly open, end-to-end foundation for IoT and its ecosystem of partners and solutions. Kapua provides a core integration framework with services for device registry, data and device management, message routing, and applications.
A presentation on IoT - Internet of Things. Helps in getting a overview about the technology, architecture, platforms & applications used. With one real life example of Philips Hue Lights
OSGi & Java in Industrial IoT - More than a Solid Trend - Essential to Scale ...mfrancis
OSGi Community Event 2016 Keynote Presentation by Robert Andres (Eurotech) & Walter Hofmann (Hitachi High Technologies)
With the promise of “real” IoT, the requirements for computational capabilities and agility at the edge demand IT-centric architectures and solutions that are based on open and industry standards. “IoT stacks” that are built on OSGi and Java’s solid foundation ensure effective modular software development and management on abstracted hardware.
Total cost of ownership in these IoT solutions matters a lot more than the simple combined hardware and software cost per edge node. Sophisticated software elements – including business intelligence tools, databases, and analytics packages – leverage data remotely and centrally to achieve the best results for customers. A perfect example of an analytics solution using such an approach is the predictive maintenance solution that Hitachi offers, leveraging Eurotech’s IoT hardware and software building blocks that heavily rely on OSGi.
Understand about the fundamentals of Internet of Things and its building blocks along with their
characteristics.
Understand the recent application domains of IoT in everyday life.
Gain insights about the current trends of Associated IOT technologoes and IOT Anlaytics.
Understand about the fundamentals of Internet of Things and its building blocks along with their
characteristics.
Understand the recent application domains of IoT in everyday life.
Gain insights about the current trends of Associated IOT technologoes and IOT Anlaytics.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
Maintaining high-quality standards in the production of TMT bars is crucial for ensuring structural integrity in construction. Addressing common defects through careful monitoring, standardized processes, and advanced technology can significantly improve the quality of TMT bars. Continuous training and adherence to quality control measures will also play a pivotal role in minimizing these defects.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Soldatos cluster-h2020-security-projects-etsi-nice-221018-v final
1. Overview and Accomplishment of the H2020 IoT
Security/Privacy Cluster Projects
John Soldatos, Athens Information Technology
E-Mail: jsol@ait.gr
Twitter: @jsoldatos
ETSI, IoT Week, Nice, France, 22.10.2018
All the presented projects have received funding from the
European Union’s Horizon 2020 research and innovation
programme
2. H2020 IoT Security & Privacy Cluster Projects
Brain-IoT
ENACT
CHARIOT
IoTCrawler
SecureIoT
SemIoTics
SerIoT
SOFIE
Eight (8) EC Funded Projects
Successful in the H2020 IoT-03-2017 Call for
Proposals “R&I on IoT integration and platforms”
Timeframe: 01/01/2018-31/12/2020 (36
months)
Focal Area: Solutions for Federation,
Interoperability, Security and Privacy
Total Budget ~ 37.000.000 EUR (IoT-03-2017 Call
Budget)
3. Common Innovation Drivers & Motivation
"Third Generation" of
IoT Systems
• From Distributed Sensing &
Massive IoT/Cloud Systems to
Smart Objects with
(Semi)Autonomous Behavior
• From Passive Data Analytics to
Field Actuation and Cyber-
Physical Systems (CPS)
IoT Platforms
Interoperability (incl.
Security
Interoperability)
• Cross-Platform
Interoperability Scenarios
(e.g., Supply Chain
Management)
Alignment to On-Going
Evolution and
Regulatory Compliance
• Artificial Intelligence,
Distributed Ledger
Technologies (DLT)
• GDPR into force as of May
2018
Foundation for Dynamic
Massively Scalable &
Autonomous IoT
Systems
• Supporting Industry 4.0
• Leveraging AI and Blockchain
Technologies
4. Brain-IoT: Model-Based Framework for Dependable Sensing & Actuation in
Intelligent Decentralized IoT Systems
Objectives, Scope, Validation
• Interoperability & Dynamic
Platforms Federations (Shared
Semantic Models linked
dynamically to IoT devices)
• Smart Cooperative Behaviours
based on AI features
• Dynamic AAA
• Embedded Privacy & Privacy
Control
• Dynamic Commissioning &
Reconfiguration (edge/cloud
deployment & balancing)
• Validation Settings: Robotics,
Critical Water Infrastructures,
H2020 LSP Projects (Smart Cities,
Healthcare, Wearables..)
www.brain-iot.eu
5. ENACT: Development, Operation, and Quality Assurance of Trustworthy
Smart IoT Systems
Objectives, Scope, Validation
• Enablers for continuous
development and operation of
trustworthy IoT systems
• Risk-driven and agile
development and delivery
• Continuous evolution to keep
the smart IoT system
trustworthy despite internal
threats
• Address security, privacy, safety,
resilience, and reliability.
• Deal with software updates,
new security strategies, new
user profiles, policies changes.
• Validation: Rail, Healthcare,
Smart Building
CODE
BUILD TEST
RELEASE &
DEPLOY
OPERATE
Risk-Driven
Design Planning
Language to specify
Devicesbehavior
& securitybehavior
Automated deployment
of Smart IoT systems
and securitymechanisms
Simulation and Test environment for
Smart IoT applications.
Simulate and test securitymechanisms.
Security, robustnessand context monitoring
and root-cause analysis
Dynamicadaptation
in open contexts
& actuation conflicts
handling
Secure and context-
aware orchestration
of sensors, actuators
and software services.
Actuation conflict
identification
https://www.enact-project.eu
6. CHARIOT: Cognitive Heterogeneous Architecture for Industrial IoT
www.chariotproject.eu
Objectives, Scope, Validation
• Methodological Framework for the Design
and Operation of Safety Critical Systems
(safety as cross-cutting concern)
• Open Cognitive IoT Architecture and
Platform for safety critical systems and IoT
systems interaction in a secure manner
• Runtime IoT Privacy, Security and Safety
Supervision Engine (IPSE)
• Privacy Engine based on PKI and
Blockchain technologies
• Firmware Security integrity checking
• IoT Safety Supervision Engine (ISSE)
• Analytics Prediction and Dashboard
• Validation: Trenitalia (Italy) & Athens
International Airport (Greece), IBM Campus
(Ireland)
7. IoTCrawler: Search Engine for the Internet of Things
Objectives, Scope, Validation
• Search engines that support crawling,
discovery and integration of IoT data.
• Adaptive and dynamic solutions for
resource ranking and selection.
• Distributed crawling and indexing
mechanisms to enable near real-time
discovery and search of massive real
world (IoT) data streams in a secure and
privacy- and trust-aware framework.
• Enablers for security-, privacy and trust-
aware discovery and access to IoT
resources in constrained IoT
environments
• New applications and services that rely
on ad-hoc and dynamic data/service
query and access.
• Validation: Smart City, Social IoT, Smart
Energy, Industry 4.0
https://iotcrawler.eu/
Security,Privacy&Trust
IoT Resources: sensors and actuators
Use cases
Machine initiated semantic sear ch
IoT discovery
Context management
Monitoring & fault recovery
Multi-criteria ranking
Adaptive indexing
Edge
broker
Edge
broker
Edge
broker
Cloud
broker
Distributed
IoT framework
Dynamic
crawling
Search
Dataanalysis
API
Smart city Social IoT
Smart
energy
Industry
4.0
8. SecureIoT: Predictive Security for IoT Platforms and Networks of
Smart Objects
Objectives, Scope, Validation
• End-to-End Security
Monitoring for Predictive
(AI-based Security)
• Security Interoperability
across IoT Platforms
• Cross-Platform & Cross-
Vertical
• Validation: Socially
Assistive Robots, Smart
Manufacturing, Connected
Car & Self-Driving
https://secureiot.eu/
IoT Systems
(Platforms &
Devices)
Field
Network
Field
Device
Edge
Cloud
App Intelligent
(Context-
Aware)
Data
Collection
Actuation &
Automation
Open APIs
IoT Security
Template
Extraction
(Analytics)
Template
Execution
Engine
(e.g., Rule
Engine)
Global Storage
(Cloud)
SecureIoT
Database+ Assets
Registry
IoT Security Templates
Database
Templates
Contextualization
Engine
IoT Security
Knowledge Base
Security Policy
Enforcement Point
Risk
Assessment
Compliance
Auditing
Developers’
Support
Developers’
Support
WP4
Open APIs
WP5
WP3
9. SemIoTics: Smart End-to-end Massive IoT Interoperability,
Connectivity and Security
Objectives, Scope, Validation
• Patterns for security, privacy,
dependability and interoperability
• Semantic interoperability
mechanisms
• Dynamically and self-adaptable
monitoring
• Embedded intelligence and
adaptation
• Programmable networking with
SDN/NFV
• SEMIoTICS open architecture
prototype
• Promote the adoption of EU
technology offerings internationally
• Validation: Wind Energy, Healthcare,
Smart Sensing
https://www.semiotics-project.eu/
IoT/IIoT Gateway
IIoT
Edge instance
SDN/NFV based industrial networks
SDN
Controller 1
SDN
switch
SDN
switch
SDN
switch
Sensor /
Actuator
SDN
Controller N
Industrial Private Cloud
FieldNetworkBackend/Cloud
IIoT Applications
Logical ViewDeployment View
IIoT
Backend instance
Cloud App1 Cloud AppN
Public Cloud
Cloud App1 Cloud AppN
End-to-endSecurityMechanisms
Sensor /
Actuator
Sensor /
Actuator
IIoT Enhanced SDN &
NFV Networks
IIoT Application & Smart Object Management
Discovery and
Semantic
Interoperability
Monitoring
Management and
Analytics
Control
and
Adaptation
Learning
and
Evolution
Smart Objects Manager
IoT Platforms
Local. IIoT Application & Smart Object Management
Local Analytics Control and Adaptation
IIoT Components (Smart Objects)
Semi-autonomous IoT devices
IoT/IIoT Gateway
Sensors Actuators
Open IoT Plarforms
(FIWARE)
Domain Specific IoT
Platforms (e.g. MindSphere)
IIoT
SPDI Patterns
Things
Events
10. SerIoT: Secure & Safe Internet of Things
Objectives, Scope, Validation
• Design a Cognitive Packet Network
that interconnects distributed IoT
subsystems based on SDN
technology
• Use “Smart Packets” (SP) to search
for secure multi-hop routes having
good quality of service & energy
efficiency.
• Use Random Neural Networks for
routing decisions and overall
network performance
improvements – “Security Aware”
routing
• Validation: ITS & Smart Cities,
Surveillance, Flexible
Manufacturing, Food Chain
https://seriot-project.eu
11. Objectives & Scope
• Secure open federation to enable
interoperability between existing
IoT platforms
• Utilizes multiple distributed
ledger technologies (DLTs) in
parallel
• Creation of IoT business
platforms Enables open data
markets
Validation
• Energy - Electrical vehicle
charging, allows optimizing
electricity generation and grid
load
• Energy - laboratory pilot with
smart meter data
• Food chain - from field to fork,
precise tracking of the whole
agricultural supply chain
• Mixed-reality mobile gaming,
allows gamers to interact with
real-world
IoT Network
Stored Data
Abstraction
Services/API
Federation
Adapter
IoT Network
Stored Data
Abstraction
Services/API
Federation
Adapter
Existing “closed”
IoT Platforms
IoT Network
Stored Data
Abstraction
Services/API
Federation
Adapter
Federation
Adapter
Existing “open”
IoT Platforms (e.g. FIWARE)
Inter-ledger transactions Layer
Guardtime
KSI
Ethereum
Hyper-Ledger
Fabric
. . .Semantic
Representation
Secure
Actuation
SOFIE Federation Framework
Legacy
IoT Application
SOFIE
IoT Application
Hybrid
IoT Application
. . .
Hybrid
IoT Application
SOFIE Component Existing DLT Existing IoT Platform
SOFIE: Secure Open Federation for Internet Everywhere
https://www.sofie-iot.eu/
12. Cross Cutting Activities & Joint Results
Joint Standardization
Efforts
• Specify/Standardize Common
Tools for risk assessment and
threat analysis
• Explore existing standards in
lifecycle management for
security and trust
Knowledge &
Experience Sharing
• Blockchain & DLT Deployment,
Operation and Use
• Joint “Thematic” workshops
on Blockchain
IoT Platforms
Interoperability and
Integration
• Emphasis on Data-Driven
Security Monitoring
• Streamlining with other EU
Efforts (e.g., IoT-EPI)
Joint Dissemination and
Policy Contributions
• Common workshops and
conferences – Joint
participation in exhibitions
• Collaborative contributions to
policies (e.g., GDPR
compliance, inputs to ECSO)
13. Tentative Release Roadmap & Outlook
Sep ‘18
Architectures
& Use Cases
Detailed
Mar ’19
Initial Platform
Releases
June ’19 First
Results of Joint
Standardization
&
Dissemination
Efforts
Dec ’19
Results
Validated
(Technical
Validation) –
Planning of
Business
Validation