Chapter 4 IoT
Chapter 4 IoT
Introduction
Outline
1 What’s Internet of Things
(IoT)
2 State of the Art of IoT
4 Pervasive computing
3
What is the Internet of Things?
5
What’s the Internet of Things
Definition
(3)The term "Internet of Things" has come to describe a
number of technologies and research disciplines
that enable the Internet to reach out into the real
world of physical objects.
------IoT 2008
(4)“Things having identities and virtual personalities
operating in smart spaces using intelligent interfaces
to connect and communicate within social,
environmental, and user contexts”.
-------IoT in 2020
6
What is the Internet of Things (IoT)?
•
Interconnection of Things or Objects or
Machines, e.g., sensors, actuators, mobile
phones, electronic devices, home appliances,
any existing items and interact with each
other via Internet.
IoT Growth
7
Introduction
• IoT is simply the point in time when more “things or objects” were
connected to the Internet than people
• In 2003, there were approximately 6.3 billion people living on the
planet and 500 million devices connected to the Internet
• By dividing the number of connected devices by the world population,
we find that there was less than one (0.08) device for every person.
• Based on Cisco Internet Business Solutions Group (IBSG’s) definition,
IoT didn’t yet exist in 2003 because the number of connected things
was relatively small
• ubiquitous devices such as smartphones were just being introduced
8
Introduction
• Explosive growth of smartphones and tablet PCs brought the number
of devices connected to the Internet to 12.5 billion in 2010, while the
world’s human population increased to 6.8 billion, making the
number of connected devices per person more than 1 (1.84 to be
exact) for the first time in history
• The Internet of Things Was “Born” Between 2008 and 2009, (A report
of Cisco IBSG, April 2011)
• 1965 …. Main Frame
• 1980 …. PC
• 1995 …. Internet
• 2010 ?… IoT
9
Introd…
The comparison of connected devices with human population: Cisco Internet Business Solutions 10
Group (IBSG), 2011
IoT as a Network of Networks
• IoT is made up of a loose collection of disparate, purpose-built
networks.
• cars, for example, have multiple networks to control engine function,
safety features, communications systems, and so on.
• Commercial and residential buildings have various control systems for
heating, venting, and air conditioning
• “The Internet of Things’ means sensors connected to the Internet and
behaving in an Internet-like way by making open, ad hoc connections,
sharing data freely and allowing unexpected applications, so
computers can understand the world around them and become
humanity’s nervous system.” Kevin Ashton, from ‘Making Sense of IoT’
11
IoT as Network of Networks
• IoT can be viewed as Network of Networks
12
What is IoT?
• The Internet of Things (IoT) is the network of physical
objects—devices, vehicles, buildings and other items
embedded with electronics, software, sensors, and network
connectivity—that enables these objects to collect and
exchange data.
• Various names, one concept:
• M2M (Machine to Machine)
Information
Processing
Data Center Search Engine Smart Decision Info. Security Data Mining
Network WMAN
Construction
Internet
WPAN WLAN
Sensing and
Identificatio GPS Smart Device RFID Sensor Sensor
n 14
Internet of Underwater Things
15
Internet of Underground Things
16
Internet of Battlefield Things
17
Internet of Bio-NanoThings
•
Molecular
Motors Bacteria
Bio-Cyber Communication
Healthcar
Interface
e Provider
18
What’s the Internet of Things
• From any time ,any place connectivity for anyone, we will now have
connectivity for anything!
20
Where is IoT? It is everywhere Information Security
Office of Budget and Finance
Education – Partnership –
Solutions
Smart
Appliances
Wearabl
e Tech
Healthcar 21
e
Where is IoT? On your campus …
22
• Why be concerned about IoT?
23
Attacking IoT
• It may be more often to find default, weak, and hardcoded credentials (usernames, passwords)
within IoT devices
• Difficult to update firmware and OS
• The issue of upgrading firmware to counter vulnerabilities may be dependent both upon how devices are
designed during development; issues may occur that upgrading may break functionality.
• Lack of vendor support for repairing vulnerabilities
• vendors may be hesitate or refuse to render support in product lines and make adjustments during the next
design phase of projects.
• Vulnerable web interfaces (SQL injection)
• Coding errors (buffer overflow)
• Clear text protocols and unnecessary open ports
• DoS / DDoS
• DoS/DDoS attacks may be the results in hacking or hijacking IoT devices on network(s); it also possible that
through misconfigurations of IoT devices that such “attacks” may be false positives and cause business
disruption
• Physical theft and tampering
24
• may result in tampering to inject malicious code or make hardware modifications to IoT devices
Security in IoT
• All software can contain vulnerabilities
• When it comes to vulnerabilities with IoT, expect them! Vendors may not inform the public about critical
issues in their products.
• Awareness Training
• Risk Management
• Vulnerability Management
• Forensics: Forensic approach to IoT may require some retooling in the areas as to whether
local Security staffs are equipped and trained to deal with incidents when they occur 26
Why Is IoT Important?
• Differences between the Internet and the World Wide Web (or web):
27
Evolution of the Web Versus the Internet
• The web has gone through several distinct evolutionary stages:
• Stage 1. First was the research phase, when the web was called the
Advanced Research Projects Agency Network (ARPANET). During this
time, the web was primarily used by academia for research purposes.
• Stage 2. The second phase of the web can be coined “brochureware.”
Characterized by the domain name “gold rush,” this stage focused on
the need for almost every company to share information on the Internet
so that people could learn about products and services.
• Stage 3. The third evolution moved the web from static data to
transactional information, where products and services could be bought
and sold, and services could be delivered. During this phase, companies
like eBay and Amazon.com exploded on the scene. This phase also will
be infamously remembered as the “dot-com” boom and bust.
28
Cont’d…
• Stage 4. The fourth stage, where we are now, is the “social” or
“experience” web, where companies like Facebook, Twitter, and
Groupon have become immensely popular and profitable (a notable
distinction from the third stage of the web) by allowing people to
communicate, connect, and share information (text, photos, and
video) about themselves with friends, family, and colleagues.
• IoT dramatically improve the way people live, learn, work, and
entertain themselves.
• IoT has made the Internet sensory (temperature, pressure, vibration,
light, moisture, stress), allowing us to become more proactive and
less reactive
29
IoT Applications
• When the threshold of connecting more objects than people to the
Internet has been crossed:
• a huge window of opportunity opened for the creation of applications in the
areas of automation, sensing, and machine-to-machine communication.
• Holy Cow
• implants sensors in the ears of cattle
• This allows farmers to monitor cows’ health and track their movements, ensuring
a healthier, more plentiful supply of meat for people to consume.
• On average, each cow generates about
200 megabytes of information a year
30
The Application of IoT …
• Scenario: shopping
31
(3) When moving the goods, the
Cont’d…
• One of the areas where IoT can make a significant difference is in
closing the poverty gap
• Better Quality of Life for the Elderly:
• The world’s population is aging, approximately 1 billion people age 65
and older will be classified as having reached “non-working age” by
the middle of the century
• IoT can significantly improve quality of life for the surging number of
elderly people.
• For example, imagine a small, wearable device that can detect a person’s vital
signs and send an alert to a healthcare professional when a certain threshold
has been reached, or sense when a person has fallen down and can’t get up
32
… The Application of IoT
Scenario: Intelligent Home
34
… The Application of IoT
Scenario: Transportation
• A network of sensors set up throughout a vehicle can interact with its
surroundings to provide valuable feedback on local roads, weather
and traffic conditions to the car driver, enabling adaptive drive
systems to respond accordingly
• This may involve automatic activation of braking systems or speed
control via fuel management systems. Condition and event detection
sensors can activate systems to maintain driver and passenger comfort
and safety through the use of airbags and seatbelt pre-tensioning
• Sensors for fatigue and mood monitoring based on driving
conditions, driver behaviour and facial indicators can interact
to ensure safe driving by activating warning systems
or directly controlling the vehicle 35
… The Application of IoT
Scenario: Transportation
37
Sensor Technology
The ability to detect changes in the physical status of things is
essential for recording changes in the environment.
Wireless sensor technology play a pivotal role in bridging the gap between the
physical and virtual worlds, and enabling things to respond to changes in their
physical environment.
Sensors collect data from their environment, generating information and
raising awareness about context.
Example: sensors in an electronic jacket can collect information about changes in external
temperature and the parameters of the jacket can be adjusted accordingly
38
The Challenge of IoT
Total challenge of IoT
1. Technological Standardization in most areas are still remain fragmented.
2. managing and fostering rapid innovation is a challenge for governments
3. privacy and security
4. Absence of governance
39
IoT and Wireless Sensor Network (WSN)
• IoT is not WSN ….. IoT ≠ WSN
• IoT contains WSN …. IoT ≥ WSN
• WSN is like the eyes and ears of IoT
• WSN is the bridge that connects the real world to the digital world
• WSN is also responsible for passing on the sensed real world values to
the Internet
• IoT in a broad sense is like a brain
• It can store the real world data in cloud services or databases
• Can also be used to monitor the real world parameters
• Make meaningful interpretation and even make decisions based on the sensed
data
• Responsible for the data processing, manipulation and decision making
40
When WSN is Used
To Connect digital world and physical world
Sensed
data
Sense
ddata
Digital
World Sensed
Sensed
data
data
Sensed
data
Sensed
data
Physical
World
41
Pervasive computing vs IoT
• Pervasive computing, also called ubiquitous computing, is the growing
trend of embedding computational capability (generally in the form
of microprocessors) into everyday objects to make them effectively
communicate and perform useful tasks in a way that minimizes the
end user's need to interact with computers
• Pervasive computing devices are network-connected and constantly
available
• The goal of pervasive computing is to make devices "smart," thus
creating a sensor network capable of collecting, processing and
sending data, and, ultimately, communicating as a means to adapt to
the data's context and activity
• Ex.: an Apple Watch informing a user of a phone call and allowing him
to complete the call through the watch
42
… Pervasive computing vs IoT
• The internet of things (IoT) has largely evolved out of pervasive
computing
• IoT is likely more in line with pervasive computing
• Like pervasive computing, IoT-connected devices communicate and
provide notifications about usage
• The vision of pervasive computing is computing power widely
dispersed throughout daily life in everyday objects.
• The IoT is on its way to providing this vision and turning common
objects into connected devices
43
Pervasive Computing: Definitions
I.I. Pervasive
Pervasive computing
computing refersrefers to to the
the use
use ofof computers
computers in in
everyday
everyday life,
life, including
including PDAs,
PDAs, smart
smart phones
phones and
and other
other mobile
mobile
devices.
devices. It
It also
also refers
refers to
to computers
computers contained
contained inin commonplace
commonplace
objects
objects such
such as as cars
cars and
and appliances
appliances andand implies
implies that
that people
people
are
are unaware
unaware of of their
their presence.
presence.
II.
II. Pervasive
Pervasive computing
computing is is aa paradigm
paradigm shiftshift where
where technology
technology
becomes
becomes virtually
virtually invisible
invisible inin our
our lives.
lives. Instead
Instead of
of having
having aa
desk-top
desk-top oror lap-top
lap-top machine,
machine, the the technology
technology we we use
use will
will be
be
embedded
embedded in in our
our environment.
environment.
III.
III. Pervasive
Pervasive computing
computing is is the
the trend
trend towards
towards increasingly
increasingly
connected
connected computing
computing devices
devices in
in the
the environment,
environment, aa trend
trend
being
being brought
brought about
about byby aa convergence
convergence of of advanced
advanced
electronics,
electronics, wireless
wireless technologies
technologies and
and the
the Internet.
Internet.
…….
…….
Pervasive Computing: Why
now?
Computing
Computing devices
devices are
are becoming
becoming very
very tiny,
tiny, sometimes
sometimes
invisible,
invisible, either
either mobile
mobile or or embedded
embedded and
and exist
exist in
in almost
almost
any
any type
type of
of object
object imaginable.
imaginable.
Computing
Computing environment
environment isis becoming
becoming full
full of
of the
the
increasingly
increasingly ubiquitous
ubiquitous and
and interconnected
interconnected computing
computing
devices
devices
Enhanced
Enhanced by
by aa convergence
convergence of:
of:
Advanced
Advanced electronics
electronics (Moor’s
(Moor’s low),
low),
Wireless
Wireless technologies,
technologies,
And
And the
the Internet.
Internet.
Pervasive Computing:
Environment ...
Hospital Driving Office
Meeting Teaching
Characterized
Characterized by
by
Context
Context Awareness
Awareness
Invisibility
Invisibility
Ad-hoc
Ad-hoc Networks
Networks
Smart
Smart Spaces
Spaces and
and Devices
Devices
Pervasive Computing …
Context
Context Awareness
Awareness
Context-aware
Context-aware computing
computing is
is an
an
environment
environment in in which
which applications
applications can can
discover
discover andand taketake advantage
advantage of of users’
users’
contextual
contextual information.
information.
Users’
Users’ context consisting
context consisting of
of attributes
attributes such
such
as
as physical
physical location,
location, physiological
physiological state
state
(such
(such as
as body
body temperature
temperature andand heart
heart rate),
rate),
emotional
emotional state
state (such
(such as
as angry,
angry, distressed,
distressed,
or
or calm),
calm), personal
personal history,
history, daily
daily behavioral
behavioral
patterns,
patterns, and
and so
so on.
on.
Aims
Aims to to achieve
achieve aa distraction-free
distraction-free
pervasive
pervasive computing
computing environment.
environment.
Pervasive Computing …
Invisibility
Invisibility
“The
“The most
most profound
profound technologies
technologies are
are those
those that
that
disappear.
disappear. They
They weave
weave themselves
themselves into
into the
the
fabric
fabric ofof everyday
everyday lifelife until
until they
they areare
indistinguishable
indistinguishable from
from it.’’
it.’’ M.
M. Weiser
Weiser 1991
1991
According
According to to Weiser,
Weiser, itit is
is about
about aa complete
complete
disappearance
disappearance of of pervasive
pervasive computing
computing technology
technology
from
from aa user’s
user’s consciousness.
consciousness. In In practice,
practice, aa
reasonable
reasonable approximation
approximation to to this
this idea
idea is
is minimal
minimal
If
user
If
useraa pervasive computing
distraction.
pervasive
distraction.computing environment
environment continuously
continuously
meets
meets user
user expectations
expectations and
and present
present surprises
surprises rarely,
rarely,
it
it allows
allows the
the user
user toto interact
interact almost
almost at at aa
subconscious
subconscious level.
level.
Pervasive Computing …
Ad-hoc
Ad-hoc Networks
Networks
AA self-configuring
self-configuring (wireless)
(wireless) network
network of of (mobile)
(mobile)
nodes
nodes without
without the
the presence
presence of
of static
static
infrastructure.
infrastructure.
MANET
MANET (Mobile
(Mobile ad-hoc
ad-hoc network)
network) and and WSN
WSN
(Wireless
(Wireless sensor
sensor network)
network) are
are areas
areas of
of interest.
interest.
Bluetooth,
Bluetooth, WiFi,
WiFi, Jini,
Jini, Plug-and-Play
Plug-and-Play (PnP)(PnP) are
are
among
among thethe potential
potential protocols
protocols and
and tools.
tools.
Pervasive Computing …
Smart
Smart space
space
AA space
space may
may bebe an
an enclosed
enclosed area
area such
such as
as aa meeting
meeting
room
room oror corridor,
corridor, or
or it
it may
may be
be aa well-defined
well-defined open
open
area
area such
such as
as aa university
university campus,
campus, aa park,
park, aa stadium,
stadium,
etc.
etc.
By
By embedding
embedding computing
computing infrastructure
infrastructure into into aa
building
building infrastructure,
infrastructure, aa smartsmart space
space brings
brings
together
together two
two worlds
worlds that
that have
have been
been disjoint.
disjoint.
AA simple
simple example
example of of this
this isis the
the automatic
automatic
adjustment
adjustment ofof heating,
heating, cooling
cooling and
and lighting
lighting levels
levels in
in
aa room
room based
based onon occupant’s
occupant’s profile.
profile.
Pervasive Computing …
Example
Example Scenarios
Scenarios
What
What would
would it
it be
be like
like to
to live
live in
in aa world
world
with
with pervasive
pervasive computing?
computing? Let Let us
us look
look at
at
two
two scenarios
scenarios taken
taken from
from Aura,
Aura, aa
pervasive
pervasive computing
computing system
system of of the
the Aura
Aura
project
project !!
Pervasive Computing …
Scenario
Scenario 1:
1: Jane
Jane at
at the
the airport
airport
Jane
Jane isis at
at Gate
Gate 23 23 inin the
the Pittsburgh
Pittsburgh airport,
airport, waiting
waiting for for her
her
connecting
connecting flight.
flight. She
She has
has edited
edited many
many large
large documents,
documents, andand would
would
like
liketo
touse
useher
herwireless
wirelessconnection
connectionto toe-mail
e-mailthem.
them.
Unfortunately,
Unfortunately, bandwidth
bandwidth isis miserable
miserable because
because manymany passengers
passengers at at
Gates
Gates22 22and
and23 23are
aresurfing
surfingthetheweb.
web.
Aura
Aura observes
observes that
that at
at the
the current
current bandwidth
bandwidth Jane Jane won’t
won’t be
be able
able to
to
finish
finishsending
sendingher herdocuments
documentsbefore
beforeher herflight
flightdeparts.
departs.
Consulting
Consultingthe the airport’s
airport’s network
networkservice
serviceandandflight
flightschedule
scheduleservice,
service,
Aura
Aura discovers
discovers that
that wireless
wireless bandwidth
bandwidth isis excellent
excellent at
at Gate
Gate 15,15, and
and
that
that there
there are
are nono departing
departing or or arriving
arriving flights
flights at
at nearby
nearby gates
gates for
for
half
halfan
anhour.
hour.
AAdialog
dialogbox
boxpops
popsupupononJane’s
Jane’sscreen
screensuggesting
suggestingthatthatshe
shegogoto toGate
Gate
15,
15,which
whichisisonly
onlythree
threeminutes
minutesaway.
away.
Jane accepts Aura’s
Jane accepts Aura’sadvice
advice andandwalks
walksto toGate
Gate 15.
15. She
She watches
watchesCNN CNN
on
onaaTVTVuntil
untilAura
Aurainforms
informsher herthat
thatititis
isclose
closeto tobeing
beingdone
donewithwithher
her
messages,
messages,and andthat
thatshe
shecancanstart
startwalking
walkingback.
back.
The
The last
last message
message isis transmitted
transmitted during
during herher walk,
walk, and
and she
she isis back
back at
at
Gate 23 in time for her boarding call.
Pervasive Computing …
Key
Key elements:
elements: Scenario
Scenario 11 –– Jane
Jane at
at the
the
airport
airport
User
User location
location sensors
sensors
Network
Network traffic
traffic (at
(at different
different gates)
gates)
Flight
Flight schedule
schedule
Map/distance
Map/distance (among
(among the the gates)
gates)
Monitoring
Monitoring (message
(message transfer)
transfer)
Communication
Communication among
among devices
devices
Prediction/
Prediction/ Inference
Inference
Decision
Decision Support
Support
Pervasive Computing …
Scenario
Scenario 22 -- Fred
Fred preparing
preparing for
for aa meeting
meeting
Fred
Fred is is in
in his
his office,
office, preparing
preparing for for aa meeting
meeting at at which
which hehe will
will give
give aa
presentation.
presentation. The The meeting
meeting roomroom isis atat aa ten-minutes
ten-minutes walkwalk across
across the
the
campus.
campus.ItItisistime timeto toleave,
leave,butbutFred
Fredisisnot
notquite
quiteready.
ready.
He
He grabs
grabs hishis PDA,
PDA, aa wireless
wireless handheld
handheld computer,
computer, and and walks
walks out
out of
of
the door. Aura
the door. Aura transfers
transfers all all his
his work
work fromfrom his his desktop
desktop to to his
his
handheld,
handheld, and and allows
allows himhim to to make
make his his final
final edits
edits using
using voice
voice
commands
commandsduring duringhishiswalk.
walk.
Aura
Aura infers
infers where
where FredFred isis going
going from
from hishis calendar
calendar andand the
the campus
campus
location
location tracking
tracking service.
service. ItIt downloads
downloads the the presentation
presentation to to the
the
projection computer, and warms up
projection computer, and warms up the projector. the projector.
Fred
Fred finishes
finishes hishis edits
edits just
just before
before he he enters
enters thethe meeting
meeting room.
room. AsAs he
he
walks
walksin, in,Aura
Auratransfers
transfershis hisfinal
finalchanges
changesto tothe
theprojection
projectioncomputer.
computer.
As
As thethe presentation
presentation proceeds,
proceeds, Fred Fred isis about
about to to display
display aa slide
slide with
with
highly
highlysensitive
sensitivebudget
budgetinformation.
information.Aura Aurasenses
sensesthatthatthis
thismight
mightbe beaa
mistake:
mistake: the the room’s
room’s faceface detection
detection and and recognition
recognition capability
capability
indicates
indicatesthat thatthere
therearearesome
someunfamiliar
unfamiliarfaces facespresent.
present.
ItIt therefore
therefore warns
warns Fred.
Fred. Realizing
Realizing thatthat Aura
Aura isis right,
right, Fred
Fred skips
skips the
the
Pervasive Computing …
Key
Key elements:
elements: Scenario
Scenario 22 –– Fred
Fred preparing
preparing
for
for aa meeting
meeting
User
User location
location sensors
sensors
User
User schedule/calendar
schedule/calendar
Multimodal
Multimodal user
user interface
interface
Ad-hoc
Ad-hoc communication
communication
Knowledge
Knowledge aboutabout thethe content
content (data
(data
semantics)
semantics)
Face
Face detection
detection service
service (sensors)
(sensors)
Communication among devices
Communication among devices
Prediction/Inferencing
Prediction/Inferencing
Decision
Decision Support
Support
Internet of Things vs. Cloud Properties
57
Internet of Things, Cloud and
Services
•
Internet of Things enables
• High-resolution management
• Real-world control
• Adaptive processes
IoT Issue Possible Solution
Heterogeneity Services as abstraction layer
Application Development Mash-up of services
Solution Deployment Support through XaaS models
Producing a lot of data Processing of large data quantities in the cloud
XaaS: the X refers to anything or everything as a service. XaaS has frequently been used as an
umbrella term to encompass SaaS, PaaS and IaaS
IoT, Cloud, and Services are complementary aspects of a Real World Internet
58
Challenges and Barriers to IoT
• Several barriers have the potential to slow the development of IoT.
• The three largest are the deployment of IPv6, power for sensors, and
agreement on standards.
• Deployment of IPv6:
• The world ran out of IPv4 addresses in February 2010.
• It will slow IoT’s progress since the potentially billions of new sensors will
require unique IP addresses.
• IPv6 makes the management of networks easier due to auto
configuration capabilities and offers improved security features.
59
The Importance of IPv6 on IoT
• IPv4 uses 32 bits while IPv6 uses 128 bits per IP address
• IPv6 addresses can be created automatically from the local system’s MAC
address
• there will be 30 billion connected “things” by 2020
• the IPv4 address space only accommodates ≈ 4 billion and change.
• Even with network address translation (NAT) and private address space, the
IoT’s appetite for addresses will overcome IPv4’s ability
• With IPv6 the address space is expanded to 340 undecillion, or 3.4×1038 , which
can allocate 4, 000 addresses to each person on the planet
• IPv6 has almost already inhabited your systems, hosts will autoconfigure one,
typically by using its MAC address.
• This is known as a link-local address and is restricted to IPv6 communication between
systems on your local network (disable IPv6 if your enterprise doesn’t use it)
60
Cont’d…
• Sensor energy:
• For IoT to reach its full potential, sensors will need to be self-sustaining.
• Imagine changing batteries in billions of devices deployed across the
planet and even into space. Obviously, this isn’t possible.
• What’s needed is a way for sensors to generate electricity from
environmental elements such as vibrations, light, and airflow
• Standards:
• While much progress has been made in the area of standards, more is
needed,
• especially in the areas of security, privacy, architecture, and communications.
• IEEE is just one of the organizations working to solve these challenges by
ensuring that IPv6 packets can be routed across different network types
61
IoT Key Features
• The most important features of IoT include:
• Artificial intelligence
• Connectivity
• Sensors
• Active engagement
• Small device use
• AI:
• IoT essentially makes virtually anything “smart”, meaning it enhances every
aspect of life with the power of data collection, artificial intelligence
algorithms, and networks.
• Example: enhancing your refrigerator and cabinets to detect when milk and
your favorite cereal run low, and to then place an order with your preferred
grocer.
62
Key features of IoT
• Connectivity
• New enabling technologies for networking, and specifically IoT networking,
• networks are no longer exclusively tied to major providers.
• Networks can exist on a much smaller and cheaper scale while still being
practical.
• IoT creates these small networks between its system devices.
• Sensors
• IoT loses its distinction without sensors.
• They act as defining instruments which transform IoT from a standard passive
network of devices into an active system capable of real-world integration.
• Small Devices
• Devices have become smaller, cheaper, and more powerful over time.
• IoT exploits purpose-built small devices to deliver its precision, scalability, and
versatility. 63
IoT Advantages
• The advantages of IoT span across every area of lifestyle. Here is a list
of some of the advantages:
• Improved Customer Engagement
• IoT completely transforms passive engagements to achieve richer and more
effective engagement with audiences.
• Technology Optimization: IoT unlocks a world of critical functional
and field data.
• Reduced Waste: IoT provides real-world information leading to more
effective management of resources
• Enhanced Data Collection: Modern data collection suffers from its
limitations and its design for passive use. IoT allows an accurate
picture of everything
64
IoT − Disadvantages
• Security
• IoT creates an ecosystem of constantly connected devices communicating
over networks.
• The system offers little control despite any security measures.
• This leaves users exposed to various kinds of attackers.
• Privacy
• The sophistication of IoT provides substantial personal data in extreme detail
without the user's active participation
• Complexity
• Some find IoT systems complicated in terms of design, deployment, and
maintenance given their use of multiple technologies and a large set of new
enabling technologies
65
… IoT − Disadvantages
• Flexibility
• Difficulty of flexibility of an IoT system to integrate easily with another
• Difficulties with several conflicting or locked systems
• Compliance
• IoT, like any other technology in the realm of business, must comply with
regulations.
• Its complexity makes the issue of compliance seem incredibly challenging
66
Some facets of IoT today
• Networking
• How do we connect IoT devices to the Internet?
• Networking in IoT can take many diverse forms
• If there are no power or form factor or cost constraints, the simplest solution is to use
a WiFi/cellular network to connect the “thing" to the Internet.
• many “things" are small and/or limited by power constraints (e.g., a watch or Fitbit)
• these devices use a low-power, low-range technology such as Bluetooth Low Energy
to connect to a nearby phone or laptop.
• The phone or laptop has a specific application to view sensor readings from the
device
• This has the disadvantage that the “thing" cannot directly connect to the Internet,
but it keeps the “things" themselves simple
• Bluetooth Low Energy handles the requirement of low-power, low-latency, low-range,
and low-capacity networking of IoT
• This constrains for example tracking a factory's inventory as it moves across the
county in a cargo train 67
… Some facets of IoT
• Security
• It concerns with both the potential for exporting private information
about a user and the potential for the “things" themselves to be
compromised.
• many IoT “things" reveal user-specific private information such as the
user's zip code; temperature, light, or humidity readings; or even
entire video streams.
• Many of these “things" do not encrypt their data before sending it
over the network
• Compromised devices included Internet-enabled video cameras,
DVRs, and routers
• these compromised devices are used to DDoS
68
RFID
• Radio Frequency IDentification (RFID) has a long history and is part of the
technological revolution
• RFID enables quick payment of tolls and quick identification of items
• RFID provides benefits, such as tracking assets, monitoring conditions for
safety, and helping to prevent counterfeiting
• RFID plays an integral part in the technological revolution along with the
Internet and mobile devices, which are connecting the world together
• RFID uses radio waves, which are one form of electromagnetic waves
69
What is RFID?
• RFID = Radio Frequency IDentification
• An ADC (Automated Data Collection) technology that:
• Uses radio-frequency waves to transfer data between a reader and a movable
item to identify, categorize, track
• Is fast and does not require physical sight or contact between
reader/scanner and the tagged item
• Performs the operation using low cost components
• Attempts to provide unique identification and backend integration that allows
for wide range of applications
• Other ADC technologies: Bar codes, OCR
70
RFID System Components
Ethernet
RFID
Reader
71
RFID Systems: Logical
View 11 ONS
Server 12
Product
Information
Internet
(PML Format)
Antenna
RF
Write data Items with Read Trans- Application
Reader
to RF tags RF Tags Manager action Systems
Data Store
Antenna
Trading
Partner
EDI / Systems
1 2 3 4 5 6 7 8 XML
Tag/Item 10
Relationship
Database 9
an antenna,
printed,
etched or
stamped ...
… and a … on a
chip substrate
attached e.g. a
to it plastic
foil ...
73
Some RFID Tags
74
RFID Tags
•Tags can be attached to almost anything:
• Items, cases or pallets of products, high value goods
• Vehicles, assets, livestock or personnel
•Passive Tags
• Do not require power – Draws from Interrogator Field
• Lower storage capacities (few bits to 1 KB)
• Shorter read ranges (4 inches to 15 feet)
• Usually Write-Once-Read-Many/Read-Only tags
• Cost around 25 cents to few dollars
•Active Tags
• Battery powered
• Higher storage capacities (512 KB)
• Longer read range (300 feet)
• Typically can be re-written by RF Interrogators
• Cost around 50 to 250 dollars
75
Tag Block Diagram
Antenna
Power Supply Memory
Control Logic
Cells
(Finite State
Tx Modulator machine)
Rx
Demodulator
76
RFID Tag Memory
• Read-only tags
• Tag ID is assigned at the factory during manufacturing
• Can never be changed
• No additional data can be assigned to the tag
• Write once, read many (WORM) tags
• Data written once, e.g., during packing or
manufacturing
• Tag is locked once data is written
• Similar to a compact disc or DVD
• Read/Write
• Tag data can be changed over time
• Part or all of the data section can be locked
77
RFID Readers
• Reader functions:
• Remotely power tags
• Establish a bidirectional data link
• Inventory tags, filter results
• Communicate with networked server(s)
• Can read 100-300 tags per second
• Readers (interrogators) can be at a fixed point such
as
• Entrance/exit
• Point of sale
• Readers can also be mobile/hand-held
78
Some RFID Readers
79
Reader Anatomy
Digital Signal
Processor
(DSP)
Network
Power
Processor
Supply
915MHz 13.56MHz
Radio Radio 80
RFID Application Points
Assembly Line
Wireless
Handheld
Applications
83
Smart Cabinet 1. Tagged item is removed from
Reader antennas placed under each shelf
or placed in “Smart Cabinet”
3. Server/Database is updated to
reflect item’s disposition
85
Smart Groceries Enhanced
• Track products
through their entire
lifetime
86
Some More Smart
Applications
• “Smart” appliances:
• Closets that advice on style depending on clothes available
• Ovens that know recipes to cook pre-packaged food
• “Smart” products:
• Clothing, appliances, CDs, etc. tagged for store returns
• “Smart” paper:
• Airline tickets that indicate your location in the airport
• “Smart” currency:
• Anti-counterfeiting and tracking
• “Smart” people ??
87