Internet of Things (IoT): A vision, architectural elements, and future directions



Similar documents
A Framework of Smart Internet of Things based Cloud Computing

On the features and challenges of security and privacy in distributed internet of things. C. Anurag Varma CpE /24/2016

Horizontal IoT Application Development using Semantic Web Technologies

Internet of Things (IoT): A vision, architectural elements, and future directions

IoT R&I on IoT integration and platforms INTERNET OF THINGS FOCUS AREA

Siemens Future HANNOVER MESSE Internet of Things and Services Guido Stephan

Internet of Things: Architecture and Security

A Systems of Systems. The Internet of Things. perspective on. Johan Lukkien. Eindhoven University

Smart City Australia

An Information Framework for Creation Smart City through Internet of Things

Index Terms: Internet of Things (IoT), IPv6, IPv4, RFID, Machine to Machine Communication, WSN Network.

Performance Evaluation of Large-Scale Wireless Sensor Networks Communication Protocols that can be Integrated in a Smart City

The 5G Infrastructure Public-Private Partnership

Participatory Cloud Computing and the Privacy and Security of Medical Information Applied to A Wireless Smart Board Network

AT&T. ip vpn portfolio. integrated. IP VPN solutions. for the enterprise. Communication Systems International Incorporated

Security for Ad Hoc Networks. Hang Zhao

Service Engineering for the Internet of Things

INTERNET OF THINGS EUROPE

Internet of Things 2015/2016

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

( Increased usage of IP addresses )

Overview of the Internet of things

IoT Prospects of Worldwide Development and Current Global Circumstances

Wireless Sensor Network: Challenges, Issues and Research

Security Infrastructure for Trusted Offloading in Mobile Cloud Computing

IEEE Standards Activities in the Smart Grid Space (ICT Focus)

How To Understand The Power Of The Internet Of Things

How can the Future Internet enable Smart Energy?

MAX DOLGICER THE INTERNET OF THINGS NAVIGATING THE FUTURE OF INFORMATION TECHNOLOGY

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

RIOT CONTROL The Art of Managing Risk for Internet of Things

End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt University of Zurich

CHAPTER 1 INTRODUCTION

An Advanced Performance Architecture for Salesforce Native Applications

Growth through partnerships and licensing technologies

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

The Internet of Things... Hype or not?

Current and Future Research into Network Security Prof. Madjid Merabti

Workprogramme 2013 objective 1.2. Sandro D Elia. Software & Service Architectures and Infrastructures

Principle Elements and Framework of Internet of Things

BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective

Internet of Things Value Proposition for Europe

Vortex White Paper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems

Internet of Things. Reply Platform

IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper

The SIA Standards Roadmap describes the strategies for achieving the mission and enhancing stakeholder participation.

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

IoT/M2M standardization activities in ITU T. Yoshinori Goto, NTT

Connect for new business opportunities

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Internet of Things (IoT): A Vision, Architectural Elements, and Future Directions

Learning Management Redefined. Acadox Infrastructure & Architecture

Internet of Things: Consumerisation of Technology.

This Conference brought to you by

M2M Communications and Internet of Things for Smart Cities. Soumya Kanti Datta Mobile Communications Dept.

Marko Hännikäinen Tampere University of Technology IoT week CLOUD-BASED SERVICE PLATFORM FOR WIRELESS SENSOR NETWORKS

Introduction Chapter 1. Uses of Computer Networks

Development and Outlook of Internet of Things in China. CATR of MIIT June 5, 2012

Master of Science in Information Systems & Security Management. Courses Descriptions

Seminar: Security Metrics in Cloud Computing ( se)

Standard for an Architectural Framework for the Internet of Things IEEE P2413. IEEE GlobeCom Austin, Texas December, 2014

A Cloud-Assisted Internet of Things Framework for Pervasive Healthcare in Smart City Environment

The Internet of Things (IoT) is one of the most important technological trends of recent years.

Autonomic computing system for selfmanagement of Machine-to-Machine networks

CONDIS. IT Service Management and CMDB

Architectural Reference Model (ARM) Presenter: Martin Bauer (NEC Europe)

Short range low power wireless devices and Internet of Things (IoT)

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis,

Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security

Security Threats on National Defense ICT based on IoT

Wireless Sensor Networks Chapter 14: Security in WSNs

Demystifying Wireless for Real-World Measurement Applications

IOT & Applications of Big Data

Security of smart grid communication protocols

GOVERNMENT AND THE INTERNET OF THINGS (IOT) FINDINGS AND RECOMMENDATION OF ATARC S INTERNET OF THINGS INNOVATION LAB NOVEMBER, 2015

Management of Security Information and Events in Future Internet

An Implementation of Public Key Infrastructure Using Wireless Communication Networks

Enterprise Application Enablement for the Internet of Things

PKI: THE SECURITY SOLUTION FOR THE INTERNET OF THINGS

Enabling the SmartGrid through Cloud Computing

IOT ARCHITECTURE: A SURVEY

IBM QRadar Security Intelligence April 2013

An Implementation of Active Data Technology

SECURITY IN THE INTERNET OF THINGS

Short-range Low Power Wireless Devices and Internet of Things (IoT)

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice

DoS Attack and Its Countermeasure in Energy-Constrained Wireless Networks

addressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from

Security in Internet of Things using Delegation of Trust to a Provisioning Server

1.1.1 Introduction to Cloud Computing

Transcription:

SeoulTech UCS Lab 2014-2 st Internet of Things (IoT): A vision, architectural elements, and future directions 2014. 11. 18 Won Min Kang Email: wkaqhsk0@seoultech.ac.kr

Table of contents Open challenges and future directions Architecture Energy efficient sensing Secure reprogrammable networks and privacy Quality of service New protocols Participatory sensing Data mining GIS based visualization Cloud computing International activities 2

Open challenges and future directions Open challenges : privacy, participatory sensing, data analytics, GIS based visualization and Cloud computing apart from the standard WSN challenges including architecture, energy efficiency, security, protocols, and Quality of Service. The end goal is to have Plug n Play smart objects and blend with other smart objects 3

Architecture Most of the works relating to IoT architecture have been from the wireless sensor networks The user is at the center and will enable the use of data and infrastructure to develop new applications Sometime, An architecture based on cloud computing is changed 4

Energy efficient sensing Efficient heterogeneous sensing of the urban environment needs to simultaneously meet competing demands of multiple sensing modalities A generalized framework is required for data collection and modeling that effectively exploits spatial and temporal characteristics of the data Compressive sensing enables reduced signal measurements without impacting accurate reconstruction of the signal 5

Secure reprogrammable networks and privacy There can be many ways the system could be attacked disabling the network availability (e.g. DoS, DDoS) pushing erroneous data into the network (injection attacks) accessing personal information(steal information) The three physical components of IoT RFID, WSN and cloud are vulnerable to such attacks RFID (particularly passive) seems to be the most vulnerable as it allows person tracking as well as the objects that can be provided using cryptographic methods Against outsider attackers, encryption ensures data confidentiality, whereas message authentication codes ensure data integrity and authenticity 6

Secure reprogrammable networks and privacy But, Encryption, however, does not protect against insider malicious attacks to address which non-cryptographic means are needed in WSNs, new sensor applications need to be installed, or existing ones need to be updated Traditional network reprogramming consists solely of a data dissemination protocol(자료수집 프로토콜) that distributes code to all the nodes in the network without authentication This is security threat But, A secure reprogramming protocol allows the nodes to authenticate every code update and prevent malicious installation. 7

Secure reprogrammable networks and privacy Many privacy issues as the data collected in cloud and WSN Digital forgetting(= Right to be Forgotten) could emerge as one of the key areas of research to address the concerns and the development of an appropriate framework to protect personal data Right to be Forgotten is Human right to demand the removal of involved information myself on website and SNS 8

New protocols The protocols form the backbone for the data tunnel between sensors and the outer world Efficient MAC protocol and appropriate routing protocol are critical the network must be self-adapting and allow for multipath routing Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs In the case of IoT, the number of hops in the multi-hop scenario will be limited. 9

Participatory sensing People centric sensing offers the possibility of low cost sensing of the environment localized to the user It can therefore give the closest indication of environmental parameters experienced by the user It is the opportunity for the user to provide feedback on their experience of a given environmental parameter that offers valuable information in the form of context associated with a given event Smart phones become critical IoT nodes which are connected to the cloud on one end and several sensors at the other end 10

Data mining Extracting useful information from a complex sensing environment at different spatial and temporal resolutions is a challenging research problem in artificial intelligence An emerging focus in machine learning research has been the field of deep learning, which aims to learn multiple layers of abstraction that can be used to interpret given data 11

GIS based visualization The evolution from CRT to Plasma, LCD, LED, and AMOLED displays has given rise to highly efficient data representation (using touch interface) with the user being able to navigate the data better than ever before With emerging 3D displays, the data that comes out of ubiquitous computing is not always ready for direct consumption using visualization platforms and requires further processing New visualization schemes for the representation of heterogeneous sensors in a 3D landscape that varies temporally have to be developed 12

Cloud computing Integrated IoT and Cloud computing applications enabling the creation of smart environments They need to be able operate in both wired and wireless network environments and deal with constraints such as access devices or data sources with limited power and unreliable connectivity. The Cloud resource management and scheduling system should be able to dynamically prioritize requests and provision resources 13

International activities In Europe, to consolidate the cross-domain activities of research groups and organizations, spanning M2M, WSN and RFID into a unified IoT framework European Commission 7th Framework program (EU-FP7): to establish a cooperation platform and research vision for IoT activities in Europe and become a contact point for IoT research around the world Internet of Things European Research Cluster (IERC): Internet of Things Architecture (IoT-A) project established to determine an architectural reference model for the interoperability of Internet-of-Things systems and key building blocks to achieve this 14

International activities in Japan, Korea, the USA and Australia, smart city initiatives, smart grid programs incorporating smart metering technologies and roll-out of high speed broadband infrastructure A continuing development of RFID related technologies by industry : Auto-ID lab - dedicated to creating the Internet of Things using RFID and Wireless Sensor Networks are being pursued Specifying IoT investment and development to be focused on: smart grid; intelligent transportation; smart logistics; smart home; environment and safety testing; industrial control and automation; 15

Summary and conclusions IoT is an ideal emerging technology to influence this domain by providing new evolving data and the required computational resources for creating revolutionary apps we propose a framework - allows networking, computation, storage and visualization themes separate thereby allowing independent growth in every sector but complementing each other in a shared environment 16

Reference Jayavardhana Gubbi, Rajkumar Buyya, Slaven Marusic, Marimuthu Palaniswami, Internet of Things (IoT): A vision, architectural elements, and future directions, Future Generation Computer Systems, Vol. 29, pp. 1645-1660, 2013 17

Q & A 18

Thank You! 19