1 / 54

Internet of Things (IOT) - Technology and Applications

Keynote Presentation at UiTM WSN Seminar 2012

mazlanabbas
Télécharger la présentation

Internet of Things (IOT) - Technology and Applications

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Internet of Things (IOT) : Technology and Applications Dr. Mazlan Abbas MIMOS Berhad

  2. Wireless Sensor Network (WSN) to IOT 2 © 2012 MIMOS Berhad. All Rights Reserved.

  3. Internet of Things : Anytime, anywhere, by anyone and anything – ITU, November 2005 Characteristics of IoT “We are heading into a new era of ubiquity, where the users of the Internet will be counted in billions, and where humans may become the minority as generators and receivers of traffic. Changes brought about by the Internet will be dwarfed by those prompted by the networking of everyday objects “ – UN report Computing Anytime Any content Convergence Anything Any device Content Anyone Anybody Internet of Things Connectivity Any place Anywhere Collection Any Service Any Business Communication Any path Any Network

  4. Internet of Things (IOT) Definition Marketingperspective : Enable exchange useful information that create new value for humanneeds. communication between devices to Technologyperspective: Things operating interfaces to connect and communicate within social,environmental,anduser contexts. with identities & virtual personalities in smart spaces using intelligent © 2012 MIMOS Berhad. All Rights Reserved.

  5. Today’s Internet of Things “behaviour” 74% Payment apps 60% 60% 71% Want connected system in car Weather apps Real-time location- based info. 51% 29% Maps/Navigation/ Search Health apps User Experience with enriched services/products Motivators From more resources With more people Share more content more quickly more often Source: TrendsSpottting; IBM; Gartner; Ericsson © 2012 MIMOS Berhad. All Rights Reserved.

  6. Rise of Machines Year 2020 scenario…… US$20B US$43B US$4.7T US$77B Connected life spending Annual mobile monitoring devices & services RFID Mobile Computing & M2M 3B + 50B Utility meters Internet connected devices 1B + Mobile consumers 7.6 B Automotive & transportation • People with chronic welfare diseases • Source: TrendsSpottting; IBM; Gartner; Ericsson © 2012 MIMOS Berhad. All Rights Reserved.

  7. Anatomy of Internet of Things UPLOAD ACTION MINING EVENT LOGGING ANALYSIS Events triggered either by things or people Thing detects events and measure a physical quality Any happening in the physical world that has been identified to be observed Registering or recording of the data collected by the thing Logged data to store/save & share a. Local device b. Transfer to a center location/ repository Aggregated data is analysed, generate information and knowledge REPORT Display processed information for people to use Devices with self-properties Network : Ubiquitous & Interoperability Intelligence : Ambient intelligence & Distributed decision making © 2012 MIMOS Berhad. All Rights Reserved.

  8. Characteristics and Attributes Level of Intelligence © 2012 MIMOS Berhad. All Rights Reserved.

  9. [Source: http://www.libelium.com/top_50_iot_sensor_applications_ranking/pdf][Source: http://www.libelium.com/top_50_iot_sensor_applications_ranking/pdf] 9 © 2012 MIMOS Berhad. All Rights Reserved.

  10. [Source: http://www.libelium.com/top_50_iot_sensor_applications_ranking/pdf][Source: http://www.libelium.com/top_50_iot_sensor_applications_ranking/pdf] 10 © 2012 MIMOS Berhad. All Rights Reserved.

  11. [Source: http://www.libelium.com/top_50_iot_sensor_applications_ranking/pdf][Source: http://www.libelium.com/top_50_iot_sensor_applications_ranking/pdf] 11 © 2012 MIMOS Berhad. All Rights Reserved.

  12. [Source: http://www.libelium.com/top_50_iot_sensor_applications_ranking/pdf][Source: http://www.libelium.com/top_50_iot_sensor_applications_ranking/pdf] 12 © 2012 MIMOS Berhad. All Rights Reserved.

  13. [Source: http://www.libelium.com/top_50_iot_sensor_applications_ranking/pdf][Source: http://www.libelium.com/top_50_iot_sensor_applications_ranking/pdf] 13 © 2012 MIMOS Berhad. All Rights Reserved.

  14. [Source: http://www.libelium.com/top_50_iot_sensor_applications_ranking/pdf][Source: http://www.libelium.com/top_50_iot_sensor_applications_ranking/pdf] 14 © 2012 MIMOS Berhad. All Rights Reserved.

  15. [Source: http://www.libelium.com/top_50_iot_sensor_applications_ranking/pdf][Source: http://www.libelium.com/top_50_iot_sensor_applications_ranking/pdf] 15 © 2012 MIMOS Berhad. All Rights Reserved.

  16. [Source: http://www.libelium.com/top_50_iot_sensor_applications_ranking/pdf][Source: http://www.libelium.com/top_50_iot_sensor_applications_ranking/pdf] 16 © 2012 MIMOS Berhad. All Rights Reserved.

  17. [Source: http://www.libelium.com/top_50_iot_sensor_applications_ranking/pdf][Source: http://www.libelium.com/top_50_iot_sensor_applications_ranking/pdf] 17 © 2012 MIMOS Berhad. All Rights Reserved.

  18. [Source: http://www.libelium.com/top_50_iot_sensor_applications_ranking/pdf][Source: http://www.libelium.com/top_50_iot_sensor_applications_ranking/pdf] 18 © 2012 MIMOS Berhad. All Rights Reserved.

  19. [Source: http://www.libelium.com/top_50_iot_sensor_applications_ranking/pdf][Source: http://www.libelium.com/top_50_iot_sensor_applications_ranking/pdf] 19 © 2012 MIMOS Berhad. All Rights Reserved.

  20. [Source: http://www.libelium.com/top_50_iot_sensor_applications_ranking/pdf][Source: http://www.libelium.com/top_50_iot_sensor_applications_ranking/pdf] 20 © 2012 MIMOS Berhad. All Rights Reserved.

  21. MIMOS IOT APPLICATIONS

  22. Deployment Scenario (WSN) MIMOS MSCAN - IOT Ethernet ADSL Fiber HSDPA HSDPA/ WiMAX/ LTE Benefits: •Enabling end-to-end connectivity •Less processing and overhead = Less power consumption •Cheaper solution PAM Server 2.4GHz 2.4GHz MIMOS MSCAN 6LoWPAN Network

  23. Livestock Monitoring – Cow that “Tweets” WiWi Gateway Livestock Management System Alert: SMS, custom application, twitter, etc Collar •Sensor Platform •Wireless Transmission Handheld Device: local interrogation by farmer

  24. Office Personnel Tracking Relay Gateway Display Sensor Wireless Cluster Office

  25. 6LOWPAN and DTN IOT RESEARCH

  26. IoT Technological Developments Development Areas Before 2010 2010-2015 >2015 Identification Technologies •Different Schemes •Domain specific IDs •ISO, GS1, u-code, IPv6, etc •Unified framework for unique identifiers •Open framework for IoT •URIs •Identity Management •Semantics •Privacy-awareness •“Things DNA” identifier IoT Architecture Technology •IoT architecture specification •Context-sensitive middleware •Intelligent reasoning platforms •IoT architecture developments •Network of networks architecture •Platforms interoperability •Adaptive, context based architectures •Self-* properties •Cognitive architectures •Experiential architecture Communication Technology •RFID, UWB, Wi-Fi, WiMax, Bluetooth, ZigBee, ISA100, 6LoWPAN •Ultra low power chipsets, system on chip •On chip antennas •Millimeter wave single chips •Ultra low power single chip radios •Ultra low power system on chip •Mobility •Heterogeneity •Wide spectrum and spectrum aware protocol •Unified protocol over wide spectrum Network Technology •Sensor networks •Self aware & self organizing network •Delay tolerant networks •Storage networks and power networks •Hybrid networking technologies •Sensor network location transparency •Network context awareness •Network cognition •Self learning, self repairing network Source: FP7 -Cluster of European Research Projects on the Internet of Things (CERP-IoT) -Strategic Research Agenda

  27. IoT Technological Developments Development Areas Before 2010 2010-2015 >2015 Software and Algorithm •Relational database integration •IoT oriented RDBMS •Event-based platforms •Sensor middleware •Sensor network middleware •Proximity / localization algorithms •Large scale, open semantic software modules •Composable algorithms •Next generation IoT-based social software •Next generation IoT-based enterprise applications •Goal oriented software •Distributed intelligence, problem solving •T-to-T collaboration environments •User oriented software •The invisible IoT •Easy to deploy IoT software •Things to Human collaborations •IoT for all Hardware •RFID tags and sensors •Sensors build in mobile devices •NFC in mobile phones •Smaller and cheaper •MEMs technology •Multi protocol, multi standards reader •More sensors and actuators •Secure, low cost tags, sensors •Smart sensors (Bio-chem) •More sensors and actuators (tiny sensors) •Nano-technology and new materials Data & Signal Processing Technology •Serial data processing •Parallel data processing •Quality of services •Energy, frequency spectrum aware data processing, •Data processing context adaptable •Context aware data processing and •data responses •Cognitive processing and •optimisation Discovery and Search Engine Technology •Sensor network ontologies •Domain specific name services •Distributed registries, search and •discovery mechanisms •Semantic discovery of sensors and sensor data •Automatic route tagging and •Identification •Automatic route tagging and •identification management centres •Cognitive search engines •Autonomous search engines

  28. IoT Technological Developments Development Areas Before 2010 2010-2015 >2015 Power and Energy Storage Technologies •Thin batteries •Li-Ion •Flat batteries •Power optimized systems •(energy management) •Energy harvesting (electrostatic, •piezoelectric) •Short and medium range •wireless power •Energy harvesting (energy conversion, •photovoltaic) •Printed batteries •Long range wireless power •Energy harvesting (biological, •chemical, induction) •Power generation in harsh •environments •Energy recycling •Wireless power •Biodegradable batteries •Nano-power processing unit Security and Privacy Technologies •Security mechanism and protocol defined (RFID & WSN) •Security mechanisms and protocols for RFID and WSN •devices •User centric context-aware privacy and policy •Privacy aware data processing •Virtualisation and anonymisation •Security & Privacy profiles based on needs •Privacy needs automatic evaluation •Context centric security •Self adaptive security mechanisms and protocols Material Technology •Silicon, Cu, Al Metallization •3D processes •SiC, GaN •Silicon •Improved/new semiconductor manufacturing processes / technologies for •higher temperature ranges •Diamond Standardization •RFID security •Passive RFID with expanded memory and read/write capability •IoT standardization •M2M •Interoperability •Standards for cross interoperability with heterogeneous networks Source: FP7 -Cluster of European Research Projects on the Internet of Things (CERP-IoT) -Strategic Research Agenda

  29. 6LOWPAN

  30. IEEE 802.15.4 • Specifies a wireless link for low-power personal area networks (LoWPANs) • 802.15.4 is widely used in embedded applications, such as environmental monitoring • These applications generally require numerous low-cost nodes communicating over multiple hops to cover a large geographical area, and they must operate unattended for years on modest batteries

  31. IEEE 802.15.4 Standard 802.11a Power Consumption 802.11g Complexity 802.11b 802.11 802.15.3 802.15.1 BluetoothTM WPAN 802.15.4 Data Rate LoWPAN

  32. IEEE 802.15.4 and IPv6 • Entire 802.15.4 MTU is 127 bytes • Low Bandwidth (250 kbps), low power (1 mW) radio • Small Packets to keep packet error rate low and permit media sharing • Often data payload is small • Standard IPv6 header is 40 bytes [RFC 2460] • IPv6 requires all links support 1280 byte packets [RFC 2460] 32

  33. Benefits of 6LoWPAN Technology • Low-power RF + IPv6 = The Wireless Embedded Internet • 6LoWPAN makes this possible • The benefits of 6LoWPAN include: – Open, long-lived, reliable standards – Easy learning-curve – Transparent Internet integration – Network maintainability – Global scalability – End-to-end data flows

  34. Why We Need It? • Open system based interoperability between devices • Leverage existing standards, rather than “reinventing the wheel” • Ability to work within the resource constraint of low- power, low-bandwidth and low-memory

  35. Challenges in 6LoWPAN Deployment • No method exists to run IPv6 over IEEE 802.15.4 • Using IPv6 and other headers as it is may not fit – 40 bytes of IPv6, 20 bytes of TCP, 8 bytes of UDP + other headers • Existing routing protocol unsuitable • Current service discovery method too bulky • Fragmentation and reassembly layer • Limited configuration & management on sensors • Security issues • Network management – Memory, processor and packet size constraint of sensor, further investigation required on using existing network management protocol

  36. Delay Tolerant Network Internet of Things 36

  37. Research Motivation • • • Interplanetary Internet (IPN) is a NASA research project led by Vint Cerf in 1998. The basic idea is to try to make data communications in space/ between planets. E.g. Communication between Earth and Mars – Communication is greatly delayed • The delay in sending or receiving data from Mars takes between three-and-a-half to 20 minutes at the speed of light. – Intermittent connectivity • Planetary movement TCP is not suitable in space missions. A new set of protocol is needed to tolerate large delay – IPN architecture was designed. • •

  38. How to apply the IPN architecture to other situations in which communications were subject to delays and disruptions? -IPN researchers- ØIn 2002 - “Delay Tolerant Network Architecture: The Evolving Interplanetary Internet” was introduced for application on earth

  39. Delay Tolerant Network (DTN) • DTN is a set of protocols that act together to enable a standardized method of performing store-carry-and- forward communications. Source A B Store • Characteristics of DTN: i. Intermittent connectivity – No end-to-end path between source and destination ii. Long variable delay – Long propagation delays between nodes Carry B Forward C Store Destination Carry C Forward D

  40. Applications of DTNs Interplanetary internet Communication in rural area Wildlife monitoring Military

  41. Wildlife Monitoring • ZebraNet – Goal: Track mobility patterns of zebras in Kenya, Africa. – Custom tracking collar with GPS (node) is put on the neck of the zebra. – Nodes record zebra’s location and stores in memory. – Nodes carry the data until meet another node. – Exchanges data with another zebra when in communication range. – Mobile base station (MBS) collects data from collars when researchers are in the field. - MBS is not fixed, rather it moves and is only intermittently available Physical presence of the researchers is no longer required at the deployment site in order to collect and publish zebra mobility pattern data. ØNetwork connectivity is intermittent and opportunistic P. Juang, H. Oki, Y. Wang, et al. Energy-Efficient Computing for Wildlife Tracking: Design Tradeos and Early Experiences with ZebraNet. In Proceedings of ASPLOS-X, Oct. 2002. 41

  42. Communications in Rural Areas • DakNet Goal: Provide low cost internet connectivity to poor rural areas in India A bus carrying a 802.11b Kiosks are built up in villages and are equipped with digital storage and short-range wireless communications. access point MAP transport data among public kiosks and a hub Ønon-real time(asynchronous)internet access Pentland, A., Fletcher, R. and Hasson, A. “DakNet: Rethinking Connectivity in Developing Nations”. IEEE Computer, vol. 37, no. 1 Jan. 2004, pp. 78–83.

  43. Military Soldiers need to be able to communicate with each other in the battlefield When M1 and M2 are both connected, data is transferred directly. When the link between M2 and satellite is disconnected, data is transferred to HQ for storage and later delivery to M2. When M2 is reconnected, data stored at HQ is delivered, even if M1 is disconnected. DTN technology can be used to achieve the communication even though the end-to-end connection does not exist. Ziyi Lu and Jianhua Fan. Delay/Disruption Tolerant Network and its Application in Military Communications, International Conference On Computer Design And Applications (ICCDA 2010), 2010.

  44. Thank you but you are in the opposite direction! I can also carry for you! I have 100M bytes of data, who can carry for me? Give it to me, I have 1G bytes phone flash. Don’t give to me! I am running out of storage. Reach an access point. Internet Search La Bonheme.mp3 for me There is one in my pocket… Finally, it arrive… Search La Bonheme.mp3 for me Search La Bonheme.mp3 for me

  45. In 2006, Lilien, Kamal, and Gupta have developed a similar paradigm as DTNs with the name of Opportunistic Networks (OppNets) L. Lilien, Z.H. Kamal and A. Gupta (in cooperation with V. Bhuse and Z Yang), "Opportunistic Networks: The Concept and Research Challenges," Department of Computer Science, Western Michigan University, Kalamazoo, Michigan, February 9, 2006.

  46. Issues in DTN • Mobility Model – Network highly mobile and dynamic in nature • What is the mobility pattern? • Mobility patterns of assigned "carrier nodes” • Routing – The most challenging problem therefore lies in finding the route between two disconnected devices. • Trust – Finding “carriers nodes" network that trust • Most of the time we assume that the nodes cooperate with each other (i.e. hosts do not refuse to deliver messages) 46

  47. Mobility model Random Movement Random movement Map-constrained random movement Human behavior based movement Random Walk Random Waypoint -each mobile nodes starts at a random location and then move to a new location by randomly choosing a direction and speed. -each mobile nodes starts at a random location and staying there for a certain period of time (pause time) and at the end of the pause time, the nodes select a random destination and move to the selected destination at a random speed.

  48. Mobility model Map-Constrained Random Movement Random movement Map-constrained random movement e.g. KLCC (A) to KL Pavilion (B) Human behavior based movement Random Map-Based Movement Shortest Path Map-Based Movement Routed Map-Based Movement 1 2 -move from stop to stop using shortest paths -nodes follow certain route (e.g. bus)

  49. Mobility model Human Behavior Based Movement Random movement Map-constrained random movement Working Day Movement Model (WDM) Human behavior based movement -bring more reality of human movement patterns during a working day - It produces similar Inter-contact times and contact durations as real world traces - All nodes move on a real world map - There are three major activities: 1) Staying at home –node wake up in the morning 2) Working at the office -go to the office and works 8 hours 3) Doing some activity with friends in the evening - Use different transportation between activities (bus, car or walking) EKMAN, F., KER¨A NEN, A., KARVO, J., AND OTT, J. Working Day Movement Model. In Proc. 1st ACM/SIGMOBILE Workshop on Mobility Models for Networking Research (May 2008).

  50. Routing protocol Epidemic: Epidemic Routing for Partially Connected Ad Hoc Networks Epidemic Prophet Spray and Wait Spray and Focus Mrs. Wilson This is for Mrs. Wilson Concept: Floods messages into the network Goal: Maximize message delivery rate Disadvantages: - High resources usage (buffer) - High overhead I will give the copy to everyone I meet, and hopefully it will reach her A. Vahdat and D. Becker. Epidemic Routing for Partially Connected Ad Hoc Networks. Technical Report CS-2000-06, CS. Dept. Duke Univ., 2000. 50

More Related