Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
37 views59 pages

Lec1 Introduction

IOT PDF IN 7TH SEM

Uploaded by

shaktiprakash669
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views59 pages

Lec1 Introduction

IOT PDF IN 7TH SEM

Uploaded by

shaktiprakash669
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 59

INTERNET OF THINGS

(IOT)
By
Dr. Seemanti Saha
Associate Professor, ECE, NITP
OVERVIEW OF
IOT
• Introduction to IoT
• Enabling technologies
• Open problems and future challenges
• Applications

5
WHAT IS IOT?

• A phenomenon which connects a variety of things


– Everything that has the ability to communicate

6
CONNECTION OF MULTIPLE
VISIONS

7
Source: Atzori et al.
IOT
DEFINITIONS
• The Internet of Things, also called The Internet of Objects, refers to
a wireless network between objects, usually the network will be
wireless and self-­‐configuring, such as household appliances.
(Wikipedia)

• The term "Internet of Things" has come to describe a number of


technologies and research disciplines that enable the Internet to
reach out into the real world of physical objects. (IoT
2008)

• “Things having identities and virtual personalities operating in smart


spaces using intelligent interfaces to connect and communicate
within social, environmental, and user contexts”. (IoT in 2020)
Introduction
 The sixth generation (6G) wireless communication networks are
envisioned to revolutionize customer services and applications via the
Internet of Things (IoT) towards a future of fully intelligent and
autonomous systems.

 What is IoT?
A disruptive technology -“a network of items each of which is embedded with sensors
and
these is
6G sensors are connected
expected to the Internet”
to provide [6].
an entirely new service quality and
enhance user’s experience in current IoT systems due to its superior
features over the previous network generations, such as ultra low-
latency communications, extremely high throughput, satellite-based
customer services, massive and autonomous networks.
• Dinh C. Nguyen, Ming Ding, Pubudu N. Pathirana, Aruna Seneviratne, Jun Li, Dusit Niyato, Octavia
Dobre, and H. Vincent Poor, “6G Internet of Things: A Comprehensive Survey”, IEEE Internet of Things
Internet of Things :
Applications
Let us Watch This !!!!!
APPLICATIONS

• Several different domains • Implications


– Transportation and logistics – Industry practices
– Healthcare – IoT economics
– Smart environment (home, office)
– Human behavior/habits
– Personal and social domain 3
APPLICATION DOMAINS AND SCENARIOS

Source: Atzori et al.


3
INTERNET OF THINGS APPLICATIONS: SMART HOME

Source : TechTarget
Life Simplified with Connected Devices
INTERNET OF THINGS APPLICATIONS : SMART GRID

Source : Internet
Watch This : Smart Grids in India by TU Delft!
IoT - a pivotal role in the healthcare industry and healthcare
management . A new paradigm termed as Internet-of-Healthcare-
Things (IoHT) or Internet-of-Medical-Things (IoMT), has been coined.

A representative diagram of
an IoHT
INTERNET OF THINGS APPLICATIONS :
HEALTHCARE

Role of IoT in Healthcare Source : Internet Wearables


HEALTHCARE APPLICATIONS
• Various sensors for various
conditions

• Example ICP sensor: Short or long


term monitoring of pressure in the
brain cavity
• Implanted in the brain cavity and
senses the increase of pressure

• Sensor and associated electronics


encapsulated in safe and
biodegradable material
• External RF reader powers the unit
and receives the signal
• Stability over 30 days so far

Source: Qian Zhang. Lecture notes. • 33


HEALTHCARE APPLICATIONS
• Other applications:
– National Health Information Network
– Electronic Patient Record
– Home monitoring and control
• Pulse oximeters, blood glucose monitors,
infusion pumps, accelerometers
– Bioinformatics
• Gene/
protein
expression
• Systems
biology
Source: Qian Zhang. Lecture notes. 3
INTERNET OF THINGS APPLICATIONS :
INDUSTRY 4.0

Industrial Revolutions Source : Internet


INTERNET OF THINGS APPLICATIONS : AGRICULTURE

Source : Internet
Watch This : Smart Agriculture Solution by Infosys
INTERNET OF THINGS APPLICATIONS : SMART
CITY

Source : Internet of Things is a revolutionary approach for future technology enhancement: a review, Sachin Kumar et al. , Journal of
Big Data, Springer, 2019
INTERNET OF VEHICLES (IOV)
Qualcomm C-V2X Tech Enables Smart
Transportation
INTERNET OF THINGS APPLICATIONS : REVIEW

Source : IoT Analytics


History of Internet of Things
Evolution of Internet of Things
Progression in 1980’s : Cloud and Server Space ( Data moved to centralized server )
Progression in 1990’s : Machine to Machine interaction
1995 : First cellular module built, First GPS network ( version 1 ) complete
1998 : IPv6 adds 2^128 new IP addresses
1999 : Kevin Ashton of MIT coins a new term IoT

Progression in 2000-2010 : Fog oriented architectures ( Central Server to


Regional Server located closer to Data Server subnetwork )
2000 : LG announces first smart fridge
2007 : First iPhone released
2008 : First International Conference on IoT held
2009 : Google started testing self driving cars
Progression in 2010-onwards : High Processing
power and Edge computing
2013 : Google glass is released
2014 : Amazon releases Echo ( smart home market opens )
2015 : GM, Uber, Tesla are testing self driving cars
Any-­‐ X Point of View

Source: Perera et al. 2014

• The Internet of Things allows people and things to be connected Anytime, Anyplace,
with Anything and Anyone, ideally using Any path/ network and Any service.
1
0
CHARACTERISTICS OF IOT
1. Intelligence
– Knowledge extraction from the generated data
2. Architecture
– A hybrid architecture supporting many others
3. Complex system
– A diverse set of dynamically changing objects
4. Size considerations
– Scalability
5. Time considerations
– Billions of parallel and simultaneous events
6. Space considerations
– Localization
7. Everything-­as-­a-­service
‐ ‐ ‐
– Consuming resources as a service 1
1
IOT – BASIC IDEA
IOT
ECOSYSTEM
IOT LAYERED ARCHITECTURE

SW: Middleware and Applications

HW: Sensing And Communication

1
Source: ZTE 2
THE FOUR LAYERED IOT ARCHITECTURE
Source : ITU-T
WHY IOT NOW?

Improved VLSI Technology –
Miniaturization, MEMS Technology for
Sensing Accelerometer Gyroscope


Widespread Adoption of
Intellectual Properties


Computing Economics -
Availability of System-on-Chips

Data Analytics – Descriptive,
Diagnostic, Predictive,
Prescriptive

Fast connectivity

Rise of Cloud Computing –
Provides scalability to the Big
Data generated by IoT Devices
NETWORKING AND COMMUNICATION

• RFID to smallest enabling technologies, such as chips, etc.


• Mobile platforms, such as sensors, phones, etc.
1
Source: Qian Zhang. Lecture notes. 2013 3
RFIDs

• The reduction in terms of size, weight, energy consumption, and cost of the
radio takes us to a new era
– This allows us to integrate radios in almost all objects and thus, to add the world
‘‘anything” to the above vision which leads to the IoT concept
• Composed of one or more readers and tags
• RFID tag is a small microchip attached to an antenna
• Can be seen as one of the main, smallest
components of IoT, that collects data

1
4
WIRELESS TECHNOLOGIES
• Telecommunication systems
– Initial/primary service: mobile voice telephony
– Large coverage per access point (100s of meters – 10s of
kilometers)
– Low/moderate data rate (10s of kbit/s – 10s of Mbits/s)
– Examples: GSM, UMTS, LTE
• WLAN
– Initial service: Wireless Ethernet extension
– Moderate coverage per access point (10s – 100s meters)
– Moderate/high data rate (Mbits/s – 100s)
– Examples: IEEE 802.11(a-­‐g), Wimax

1
Source: Geert Heijenk. Mobile and Wireless Networking. Lecture 5
WIRELESS TECHNOLOGIES
• Short range:
– Direct connection between devices – sensor networks
– Typical low power usage
– Examples: Bluetooth, Zigbee, Z-­‐wave (house products)
• Other examples:
– Satellite systems
• Global coverage
• Applications:
audio/TV
broadcast,
positioning,
personal
communicatio
ns
– Broadcast systems 1
Source: Geert
• Heijenk. Mobile and Wireless Networking. Lecture 6
WIRELESS SENSOR NETWORKS (WSN)
• Consist of a certain number (which can be very high) of sensing nodes
(generally wireless) communicating in a wireless multi-­‐hop fashion

Source: Perera et al. 1


WIRELESS SENSOR NETWORKS (WSN)

• WSNs generally exist without IoT but IoT cannot exist without
WSNs
• WSNs have been designed, developed, and used for specific
application purposes
– Environmental monitoring, agriculture, medical care, event
detection etc.
• For IoT purposes, WSNs need to have a middleware
addressing these issues:
– Abstraction support, data fusion, resource constraints, dynamic
topology, application knowledge, programming paradigm, adaptability,
scalability, security, and QoS support

1
8
MIDDLEWA
RE
• Middleware is a software layer that stands
between the networked operating system and
the application and provides well known
reusable solutions to frequently encountered
problems like heterogeneity, interoperability,
security, dependability [Issarny, 2008]

• IoT requires stable and scalable middleware


solutions to process the data coming from the
networking layers
20
SERVICE ORIENTED ARCHITECTURE (SOA)

• Middleware solutions for IoT


usually follow SOA
approaches
• Allows SW/HW reuse
– Doesn’t impose specific
technology
• A layered system model
addressing previous issues
– Abstraction, common
Source: Atzori et al.
2
2010 1
OTHER MIDDLEWARE EXAMPLES
• Fosstrak Project
– Data dissemination/aggregation/filtering/interpretation
– Fault and configuration management, lookup and directory service,
tag ID management, privacy
• Welbourne et al.
– Tag an object/create-­‐edit location info/combine events collected by
antennas
• e-­‐ S e n s e P roject
– Middleware only collects data in a distributed fashion and transmits
to actuators
• UbiSec&Sens Project
– Focuses on security, secure data collection, data store in memory, etc.

2
2
OPEN PROBLEMS AND
CHALLENGES
• Lack of standardization
• Scalability
– Addressing issues
– Understanding the big data
• Support for mobility
• Address acquisition
• New network traffic patterns to handle
• Security/Privacy issues

2
3
STANDARDIZAT
ION
• Several standardization efforts but not integrated in a comprehensive
framework
• Open Interconnect Consortium: Atmell, Dell, Intel, Samsung and Wind
River
• Industrial Internet Consortium: Intel, Cisco, GE, IBM
• AllSeen Alliance: Led by Qualcomm, many others

2
SCALABILITY

• Number of devices increasing exponentially


– How can they uniquely be tagged/named?
– How can the data generated by these devices be managed?
2
ADDRESSING
ISSUES
• Incredibly high number of nodes, each of which will produce
content that should be retrievable by any authorized user
– This requires effective addressing policies
– IPv4 protocol may already reached its limit. Alternatives?
– IPv6 addressing has been proposed for low-­power
‐ wireless
communication nodes within the 6LoWPAN context
• IPv6 addresses are expressed by means of 128 bits 1038
addresses, enough to identify objects worth to be addressed
• RFID tags use 64–96 bit identifiers, as standardized by EPCglobal,
solutions to enable the addressing of RFID tags into IPv6 networks

Encapsulation of
RFID message into
an IPv6 packet.
Source: Atzori et al.
(2010)
2
6
NEW TRAFFIC TO
HANDLE
• The characteristics of the smart objects traffic in the IoT is still
not known
– Important  basis for the design of the network infrastructures and
protocols
• Wireless sensor networks (WSNs) traffic characterization
– Strongly depend on the application scenario
– Problems arise when WSNs become part of the overall Internet
– The Internet will be traversed by a large amount of data generated by
sensor networks deployed for heterogeneous purposes  extremely
different traffic characteristics
– Required to devise good solutions for supporting quality of service

2
SECURI
TY
• The components spend most of the time unattended
– It is easy to physically attack them
• IoT components are characterized by low capabilities in terms of
both energy and computing resources
– They can’t implement complex schemes supporting security
• Authentication problem
– Proxy attack, a.k.a. man in the middle attack problem
• Data integrity
– Data should not be modified
without the system detecting it
– Attacks on the node
• Memory protection
– Attacks over the network
• Keyed-­‐Hash Message Auth. Code
2
Man in the middle attack Source: Atzori et al.
PUTTING IT ALL
TOGETHER

Source: “What the Internet of Things (IoT) Needs to Become a


Reality,” White Paper, by K. Karimi and G. Atkinson 3
ENVIRONMENTAL
APPLICATION: CITISENSE
• Air quality monitoring project in UCSD CSE

• Environmental application

• Electrochemical sensors,
microcontroller for data collection
and transmission to an Android app

• Actuation: air quality is immediately


reported, as well as retransmitted
to a backend for larger-­scale
‐ analysis
3
TRANSPORTATION
APPLICATIONS
• Vehicle control: Airplanes, automobiles, autonomous
vehicles
– All kinds of sensors to provide accurate, redundant view of
the world
– Several processors in cars (Engine control, break system,
airbag deployment system, windshield wiper, door locks,
entertainment system, etc.)
– Actuation is maintaining control of the vehicle
– Very tight timing constraints and requirements enforced by
the platforms

3
EXAMPLE TRANSPORTATION
SCENARIOS
1. A network of sensors in a vehicle can interact with its
surroundings to provide information
– Local roads, weather and traffic conditions to the car
driver
– Adaptive drive systems to respond accordingly
2. Automatic activation of braking systems or speed control
via fuel management systems.
– Condition and event detection sensors can activate systems
to maintain driver and passenger comfort and safety through
the use of airbags and seatbelt pre-­tensioning

3. Sensors for fatigue and mood monitoring based on
driving conditions, driver behavior and facial indicators
– Ensuring safe driving by activating warning systems or directly
controlling
Source: Qian the vehicle
Zhang. Lecture notes. 3
SMART HOME
APPLICATIONS

• Smart meters, heating/cooling, motion/temperature/


lighting sensors, smart appliances, security, etc. 3
A FUTURISTIC APPLICATION:
SHOPPING
• When entering the doors,
scanners will identify the
tags on her clothing.
• When shopping in the
market, the goods
will introduce
themselves.
• When paying for the goods,
the microchip of the credit
card will communicate with
checkout reader.
• When moving the goods, the
reader will tell the staff to
put a new one.

Source: Qian Zhang. Lecture notes. 3


AN EXCITING
FUTURE!

4
0

You might also like