Internet of Things - Overview
-
Upload
thanuja-seneviratne -
Category
Internet
-
view
509 -
download
0
Transcript of Internet of Things - Overview
INTERNET OF THINGS
BY THANUJA SENEVIRATNECOURTESY OF CSAIL, MASSACHUSETTS INSTITUTE OF TECHNOLOGY COURSE
OVERVIEW
AGENDA• What is Internet of Things?• Architecture of IoT• Web of Things• RFID Story• Technology Landscape• Application Landscape• Dawn of IoT Era
WHAT IS INTERNET OF THINGS?• “WIRED: TESLA’S OVER-THE-AIR-FIX: BEST EXAMPLE YET ON
INTERNET-OF-THINGS?”
• “FORBES: GOOGLE BUYS NEST FOR 3.2 BILLION DOLLARS!”
• MARKET EXPECTATIONS IN NEAR FUTURE• WHAT IS IoT?• WHAT THINGS WILL BE AFFECTED?• WHAT INDUSTRIES WILL BE AFFECTED?• SIMPLIFY THE THINKING ON IoT
WHAT IS INTERNET OF THINGS?
ARCHITECTURE OF IOT• SIMPLE DESIGN METAPHOR IS THE BEST ARCHITECTURE NORM TO
TAKE-OFF AS THE DOMINANT ARCHITECTURE• NEED OF STANDARDIZATION• NEED TO ADDRESS THE SECURITY AND PRIVACY ISSUES• CLOUD COMPUTING AND FOG COMPUTING• HOUR-GLASS ARCHITECTURE• INTERNET• INTERNET OF THINGS
ARCHITECTURE OF IOT
WEB OF THINGS• CHALLENGES, TOO MANY:
• UNDERLYING INFRASTRUCTURE IS MORE HETEROGENOUS DUE TO LOCAIONS OF “THINGS” IN IOT – SPACE, OFFICE, UNDERWATER
• ALL THE “THINGS” NEED TO HAVE PROPER UPGRADEABLE SECURITY LIKE IN CURRENT WEB/INTERNET• SOME OF THE “THINGS” DERIVES “BIG DATA” AND CHALLENGE THE PROCESSING POWER• DIFFICULTY OF DATA PROCESSING ON “THINGS” - DISCUSS “BAG OF CHIPS” ANOLOGY• BUILD STANDARDS, BEST PRACTICES AND MANUFATURING PARTNERSHIPS FOR INTEROPERABILITY
• WEB OF THINGS IS HIGH-LEVEL OF PROTOCOLS TO TALK UNDERLYING LOW-LEVEL PROTOCOLS OF INTERNET OF THINGS• INVENTORY OF “THINGS”• CONSTRUCT STANDADIZED PROTOCOLS TO CONNECT THE “THINGS” IN THE INVENTORY• SECURITY AND PRIVACY OF DATA DERIVED FROM “THINGS” IN THE INVENTORY• HOW FEEDBACK LOOP WORKS CONNECTING ALL THE “THINGS” IN A LOOP – DISCUSS CLASSROOM
ANOLOGY
RFID STORY• Fidual sensing mechanism – dumb tags powered by RFID Sensors.
RFID sensors will collect data from powered tags
RFID STORY• Timeline of RFID technology
RFID STORY• RFID 3-tier Architecture
TECHNOLOGY LANDSCAPE• TECHNOLOGY CONVERGENCE• WIRELESS NETWORKS• EMBEDDED COMPUTING• SENSORS AND ACTUATORS (HARDWARE ENGINEERING)
• WIRELESS NETWORKS AND IOT’S FUTURE• APPLICATION DEPENDANCY - ARCHITECURAL DECESIONS BASED ON APPS NOT
COMMON ABSTRACT SCENARIO• MANY DIFFERENT STANDARDS• MANY DIFFERENT APPROACHES
• WIRED NETWORKS?
TECHNOLOGY LANDSCAPE• WIRELESS NETWORK SOUP
TECHNOLOGY LANDSCAPE• WIRELESS NETWORK ARCHITECURE
TECHNOLOGY LANDSCAPE• CELLULAR AND WI-FI ADVANTAGES• WIDELY AVAILABLE – 2G, 3G, 4G/LTE, 5G, WI-FI• HIGH BANDWIDTH
• CELLULAR AND WI-FI DRAWBACKS• NOT SUITABLE FOR BATTERY-POWERED SCENARIOS DUE TO HIGH POWER
CONSUMPTION• HIGH COST IN CELLULAR AND SHORT-RANGE (WIHTIN BUILDINGS) FOR WI-FI
TECHNOLOGY LANDSCAPE• WIRELESS DESIGN SPACE
TECHNOLOGY LANDSCAPE• THREE B’S OF IOT• BATTERY – HOW TO POWER YOUR SOLUTIONS. POWER CONSUMPTIONS LIMITS WHAT
YOU CAN COLLECT AND TRANSMIT (eg. BATTERY LIFE REQUIRED IN INDUSTRAIL IOT SCENARIOS)• BANDWIDTH – WHAT IS THE RANGE YOU CAN COLLECT AND TRANSFER DATA IN
YOUR SOLUTIONS. ALSO LIMITS WHAT YOU CAN COLLECT AND TRANSFER IF LOW-RATE TECH USED (eg. BLE) OR INTERMITTENT. RESUTLS LATENCY• BTYES – HOW MUCH DATA YOU CAN COLLECT AND TRANSFER IN YOUR SOLUTIONS.
ALSO LIMITS THE VOLUME YOU CAN COLLECT AND TRANSFER IN BIG DATA SCENARIOS WHICH INCREASINGLY COMMON. ALSO NOISY DATA AND MISSIN DATA CAUSE ISSUES
• IOT DESGINS SHOULD COME UP WITH TRADE-OFFS TO COMPONSATE THE LIMITATIONS OF ABOVE PROPERTIES
TECHNOLOGY LANDSCAPE• MISSSING AND NOISY DATA EXAMPLES – GPS, VEHICLE
ACCESSELERATION
TECHNOLOGY LANDSCAPE• MISSSING AND NOISY DATA EXAMPLES – GPS, VEHICLE
ACCESSELERATION
TECHNOLOGY LANDSCAPE• CASE OF TARGET HACK 2013 – HOW BAD?• PREVENTION• RESILIENCE UNDER ATTACK• DETECTION
• HUMAN-COMPUTER INTERFACE (HCI)• ROBOTICS
TECHNOLOGY LANDSCAPE
•SECURITY• PREVENTION – INCREASING THE DIFFUCULTY FOR ATTACKS• RESILIENCE UNDER ATTACK – ALLOWING SYSTEM TO FUNCTION DESPITE BEING ATTACKED• DETECTION & RECOVERY
• SECUIRTY IS A NEGATIVE GOAL – WANT TO ACHIEVE SOMETHING DESPITE WHATVER ADVERSARY MAY DO; HARDEST GOAL TO ACHIEVE; ALWAYS WILL HAVE TO MAKE ASSUMPTIONS AND CREATE A MODEL; CANNOT FORSEE ALL THREATS• CYBERSECURITY – A FIELD IN ENGINEERING TO ADDRESS SECURITY THREATS OF
ALL KIND. EMERGING TECHNOLOGIES MAKE IT DIFFICULT• HUMAN-COMPUTER INTERFACE (HCI)• ROBOTICS
APPLICATION LANDSCAPE• UBIQUITOES COMPUTING
APPLICATION LANDSCAPE• SENSORS & ACTUATORS
APPLICATION LANDSCAPE• VISUALIZATION
APPLICATION LANDSCAPE• WEARABLES
APPLICATION LANDSCAPE• SENSOR-ENABLED LIGHTNING
APPLICATION LANDSCAPE• EXPRESSIVE FOOTWEAR• SMART WRISTBANDS• TOUCHPAD FINGERNAILS• BEAUTY TECHNOLOGY• SMART TOOLS• SMART 3D PRINTERS• SENSATE SURFACES• SENSATE LININGS• SENSOR TAPES• SENSOR STICKERS
• VR & AR• SMART VEHICLES• SMART BUILDINGS• SMART CITIES• SMART EARTH
APPLICATION LANDSCAPE
DAWN OF IOT ERA• PROMISING MARKET• UBIQUITOS COMPUTING/IOT GOING MAINSTREAM• IOT IS IN OUR FUTURE, AND IOT LITERACY IS ESSENTIAL• WHAT WE SHOULD DO?• WHAT IS THE END?