internet of things (iot) - technology and applications
DESCRIPTION
Keynote Presentation at UiTM WSN Seminar 2012TRANSCRIPT
Internet of Things (IOT) : Technology and Applica9ons
Dr. Mazlan Abbas MIMOS Berhad
Wireless Sensor Network (WSN) to IOT
© 2012 MIMOS Berhad. All Rights Reserved. 2
Internet of Things : Anytime, anywhere, by anyone and anything – ITU, November 2005
Characteris9cs of IoT
Internet of
Things
Compu9ng AnyAme
Any content
Content Anyone Anybody
Collec9on Any Service Any Business
Communica9on Any path
Any Network
Connec9vity Any place Anywhere
Convergence Anything Any device
“We are heading into a new era of ubiquity, where the users of the Internet will be counted in billions, and where humans may become the minority as generators and receivers of traffic. Changes brought about by the Internet will be dwarfed by those prompted by the networking of everyday objects “ – UN report
Internet of Things (IOT) DefiniAon
© 2012 MIMOS Berhad. All Rights Reserved.
Technology perspec9ve:
Things with idenAAes & virtual personaliAes operaAng in smart spaces using intelligent interfaces to connect and communicate within social, environmental, and user contexts.
Marke9ng perspec9ve : Enable communicaAon between devices to exchange useful informaAon that create new value for human needs.
Today’s Internet of Things “behaviour”
© 2012 MIMOS Berhad. All Rights Reserved.
Real-‐Ame locaAon-‐based info.
74% Weather apps 60%
Maps/NavigaAon/ Search
51% Health apps 29%
Want connected system in car
60%
Share more content
From more
resources
With more people
more o\en
more quickly
Mo9
vators
Payment apps 71%
User Experience with enriched services/products
Source: TrendsSpo./ng; IBM; Gartner; Ericsson
Rise of Machines
© 2012 MIMOS Berhad. All Rights Reserved.
Year 2020 scenario……
Internet connected devices 50B
UAlity meters
3B +
Mobile consumers 7.6 B
• People with chronic welfare diseases
• AutomoAve & transportaAon 1B +
Mobile CompuAng & M2M
US$77B Connected life spending
US$4.7T Annual mobile monitoring devices & services
US$43B RFID
US$20B
Source: TrendsSpo./ng; IBM; Gartner; Ericsson
Anatomy of Internet of Things
© 2012 MIMOS Berhad. All Rights Reserved.
EVENT
Any happening in the physical world that has been idenAfied to be observed
MINING
Thing detects events and measure a physical quality
LOGGING
Registering or recording of the data collected by the thing
UPLOAD
Logged data to store/save & share a. Local device b. Transfer to a center locaAon/ repository
ANALYSIS
Aggregated data is analysed, generate informaAon and knowledge
ACTION
Events triggered either by things or people
REPORT
Display processed informaAon for people to use
Devices with self-‐proper9es
Intelligence : Ambient intelligence & Distributed decision making
Network : Ubiquitous & Interoperability
Characteristics and Attributes
© 2012 MIMOS Berhad. All Rights Reserved.
Level of Intelligen
ce
© 2012 MIMOS Berhad. All Rights Reserved. 9
[Source: hdp://www.libelium.com/top_50_iot_sensor_applicaAons_ranking ]
© 2012 MIMOS Berhad. All Rights Reserved. 10
© 2012 MIMOS Berhad. All Rights Reserved. 11
© 2012 MIMOS Berhad. All Rights Reserved. 12
© 2012 MIMOS Berhad. All Rights Reserved. 13
© 2012 MIMOS Berhad. All Rights Reserved. 14
© 2012 MIMOS Berhad. All Rights Reserved. 15
© 2012 MIMOS Berhad. All Rights Reserved. 16
© 2012 MIMOS Berhad. All Rights Reserved. 17
© 2012 MIMOS Berhad. All Rights Reserved. 18
© 2012 MIMOS Berhad. All Rights Reserved. 19
© 2012 MIMOS Berhad. All Rights Reserved. 20
MIMOS IOT APPLICATIONS
Ethernet ADSL Fiber HSDPA
Deployment Scenario (WSN)
HSDPA/WiMAX/LTE
6LoWPAN Network
MIMOS MSCAN
2.4GHz 2.4GHz
PAM Server
MIMOS MSCAN - IOT
Benefits: • Enabling end-to-end connectivity • Less processing and overhead = Less power consumption • Cheaper solution
Livestock Monitoring – Cow that “Tweets”
WiWi Gateway
Collar • Sensor Platform
• Wireless Transmission
Alert: SMS, custom application, twitter, etc
Livestock Management System
Handheld Device: local interrogation by farmer
Office Personnel Tracking
Wireless Cluster Office
Display
Relay
Gateway
Sensor
IOT RESEARCH 6LOWPAN and DTN
IoT Technological Developments Development Areas Before 2010 2010-‐2015 >2015
IdenAficaAon Technologies
• Different Schemes • Domain specific IDs • ISO, GS1, u-‐code, IPv6, etc
• Unified framework for unique idenAfiers • Open framework for IoT • URIs
• IdenAty Management • SemanAcs • Privacy-‐awareness • “Things DNA” idenAfier
IoT Architecture Technology
• IoT architecture specificaAon • Context-‐sensiAve middleware • Intelligent reasoning plaporms
• IoT architecture developments • Network of networks architecture • Plaporms interoperability
• AdapAve, context based architectures • Self-‐* properAes • CogniAve architectures • ExperienAal architecture
CommunicaAon Technology
• RFID, UWB, Wi-‐Fi, WiMax, Bluetooth, ZigBee, ISA100, 6LoWPAN
• Ultra low power chipsets, system on chip • On chip antennas • Millimeter wave single chips • Ultra low power single chip radios • Ultra low power system on chip • Mobility • Heterogeneity
• Wide spectrum and spectrum aware protocol • Unified protocol over wide spectrum
Network Technology • Sensor networks • Self aware & self organizing network • Delay tolerant networks • Storage networks and power networks • Hybrid networking technologies • Sensor network locaAon transparency
• Network context awareness • Network cogniAon • Self learning, self repairing network
Source: FP7 -‐ Cluster of European Research Projects on the Internet of Things (CERP-‐IoT) -‐ Strategic Research Agenda
IoT Technological Developments Development Areas Before 2010 2010-‐2015 >2015
So\ware and Algorithm
• RelaAonal database integraAon • IoT oriented RDBMS • Event-‐based plaporms • Sensor middleware • Sensor network middleware • Proximity / localizaAon algorithms
• Large scale, open semanAc so\ware modules • Composable algorithms • Next generaAon IoT-‐based social so\ware • Next generaAon IoT-‐based enterprise applicaAons
• Goal oriented so\ware • Distributed intelligence, problem solving • T-‐to-‐T collaboraAon environments • User oriented so\ware • The invisible IoT • Easy to deploy IoT so\ware • Things to Human collaboraAons • IoT for all
Hardware • RFID tags and sensors • Sensors build in mobile devices • NFC in mobile phones • Smaller and cheaper • MEMs technology
• MulA protocol, mulA standards reader • More sensors and actuators • Secure, low cost tags, sensors
• Smart sensors (Bio-‐chem) • More sensors and actuators (Any sensors) • Nano-‐technology and new materials
Data & Signal Processing Technology
• Serial data processing • Parallel data processing • Quality of services
• Energy, frequency spectrum aware data processing, • Data processing context adaptable
• Context aware data processing and • data responses • CogniAve processing and • opAmisaAon
Discovery and Search Engine Technology
• Sensor network ontologies • Domain specific name services
• Distributed registries, search and • discovery mechanisms • SemanAc discovery of sensors and sensor data
• AutomaAc route tagging and • IdenAficaAon • AutomaAc route tagging and • idenAficaAon management centres • CogniAve search engines • Autonomous search engines
IoT Technological Developments Development Areas Before 2010 2010-‐2015 >2015
Power and Energy Storage Technologies
• Thin baderies • Li-‐Ion • Flat baderies • Power opAmized systems • (energy management) • Energy harvesAng (electrostaAc, • piezoelectric) • Short and medium range • wireless power
• Energy harvesAng (energy conversion, • photovoltaic) • Printed baderies • Long range wireless power
• Energy harvesAng (biological, • chemical, inducAon) • Power generaAon in harsh • environments • Energy recycling • Wireless power • Biodegradable baderies • Nano-‐power processing unit
Security and Privacy Technologies
• Security mechanism and protocol defined (RFID & WSN) • Security mechanisms and protocols for RFID and WSN • devices
• User centric context-‐aware privacy and policy • Privacy aware data processing • VirtualisaAon and anonymisaAon
• Security & Privacy profiles based on needs • Privacy needs automaAc evaluaAon • Context centric security • Self adapAve security mechanisms and protocols
Material Technology • Silicon, Cu, Al MetallizaAon • 3D processes
• SiC, GaN • Silicon • Improved/new semiconductor manufacturing processes / technologies for • higher temperature ranges
• Diamond
StandardizaAon • RFID security • Passive RFID with expanded memory and read/write capability
• IoT standardizaAon • M2M • Interoperability
• Standards for cross interoperability with heterogeneous networks
Source: FP7 -‐ Cluster of European Research Projects on the Internet of Things (CERP-‐IoT) -‐ Strategic Research Agenda
6LOWPAN
IEEE 802.15.4
• Specifies a wireless link for low-‐power personal area networks (LoWPANs)
• 802.15.4 is widely used in embedded applicaAons, such as environmental monitoring
• These applicaAons generally require numerous low-‐cost nodes communicaAng over mulAple hops to cover a large geographical area, and they must operate unadended for years on modest baderies
802.11a
802.11g
WPAN
Com
plex
ity
802.15.4
802.15.1 BluetoothTMPow
er C
onsu
mpt
ion
Data Rate
802.11b
802.11
LoWPAN
802.15.3
IEEE 802.15.4 Standard
IEEE 802.15.4 and IPv6
• EnAre 802.15.4 MTU is 127 bytes • Low Bandwidth (250 kbps), low power (1 mW) radio • Small Packets to keep packet error rate low and permit media sharing
• O\en data payload is small • Standard IPv6 header is 40 bytes [RFC 2460] • IPv6 requires all links support 1280 byte packets [RFC 2460]
32
Benefits of 6LoWPAN Technology
• Low-power RF + IPv6 = The Wireless Embedded Internet
• 6LoWPAN makes this possible • The benefits of 6LoWPAN include:
– Open, long-lived, reliable standards – Easy learning-curve – Transparent Internet integration – Network maintainability – Global scalability – End-to-end data flows
Why We Need It?
• Open system based interoperability between devices • Leverage exisAng standards, rather than “reinvenAng the wheel”
• Ability to work within the resource constraint of low-‐power, low-‐bandwidth and low-‐memory
Challenges in 6LoWPAN Deployment
• No method exists to run IPv6 over IEEE 802.15.4 • Using IPv6 and other headers as it is may not fit
– 40 bytes of IPv6, 20 bytes of TCP, 8 bytes of UDP + other headers • Existing routing protocol unsuitable • Current service discovery method too bulky • Fragmentation and reassembly layer • Limited configuration & management on sensors • Security issues • Network management
– Memory, processor and packet size constraint of sensor, further investigation required on using existing network management protocol
Delay Tolerant Network
Internet of Things
36
Research Motivation • Interplanetary Internet (IPN) is a NASA research project led by Vint Cerf in 1998. • The basic idea is to try to make data communications in space/ between planets. • E.g. Communication between Earth and Mars
– Communication is greatly delayed • The delay in sending or receiving data from Mars takes between
three-and-a-half to 20 minutes at the speed of light. – Intermittent connectivity
• Planetary movement • TCP is not suitable in space missions. • A new set of protocol is needed to tolerate large delay
– IPN architecture was designed.
How to apply the IPN architecture to other situations in which communications were
subject to delays and disruptions? -IPN researchers-
Ø In 2002 - “Delay Tolerant Network Architecture: The
Evolving Interplanetary Internet” was introduced for application on earth
Delay Tolerant Network (DTN) • DTN is a set of protocols that act together to enable a standardized method of performing store-‐carry-‐and-‐forward communicaAons.
• CharacterisAcs of DTN: i. Intermident connecAvity
– No end-‐to-‐end path between source and desAnaAon
ii. Long variable delay – Long propagaAon delays between nodes
A
B
B
C
C D
Source
Store
Carry
Forward
Store
Carry
Forward
DesAnaAon
Applications of DTNs
Wildlife monitoring
CommunicaAon in rural area
Military
Interplanetary internet
Wildlife Monitoring
• ZebraNet – Goal: Track mobility patterns of zebras in Kenya, Africa. – Custom tracking collar with GPS (node) is put on the neck of the zebra. – Nodes record zebra’s location and stores in memory. – Nodes carry the data until meet another node. – Exchanges data with another zebra when in communication range. – Mobile base station (MBS) collects data from collars when researchers are in the field.
- MBS is not fixed, rather it moves and is only intermittently available
41
P. Juang, H. Oki, Y. Wang, et al. Energy-‐Efficient CompuAng for Wildlife Tracking: Design Tradeos and Early Experiences with ZebraNet. In Proceedings of ASPLOS-‐X, Oct. 2002.
Physical presence of the researchers is no longer required at the deployment site in order to collect and publish zebra mobility padern data.
Ø Network connecAvity is intermident and opportunisAc
Communications in Rural Areas
• DakNet Goal: Provide low cost internet connectivity to poor rural areas in India
A bus carrying a 802.11b access point
Kiosks are built up in villages and are equipped with digital storage and short-‐range wireless communicaAons.
MAP transport data among public kiosks and a hub Ø non-‐real Ame(asynchronous)internet access
Pentland, A., Fletcher, R. and Hasson, A. “DakNet: Rethinking ConnecAvity in Developing NaAons”. IEEE Computer, vol. 37, no. 1 Jan. 2004, pp. 78–83.
Military
When M1 and M2 are both connected, data is transferred directly.
When the link between M2 and satellite is disconnected, data is transferred to HQ for storage and later delivery to M2.
Ziyi Lu and Jianhua Fan. Delay/DisrupAon Tolerant Network and its ApplicaAon in Military CommunicaAons, InternaAonal Conference On Computer Design And ApplicaAons (ICCDA 2010), 2010.
When M2 is reconnected, data stored at HQ is delivered, even if M1 is disconnected.
Soldiers need to be able to communicate with each other in the badlefield
DTN technology can be used to achieve the communicaAon even though the end-‐to-‐end connecAon does not exist.
Give it to me, I have 1G bytes phone flash.
I have 100M bytes of data, who can carry for me?
I can also carry for you!
Thank you but you are in the opposite direction!
Don’t give to me! I am running out of storage.
Reach an access point.
Internet
Finally, it arrive…
Search La Bonheme.mp3 for me
Search La Bonheme.mp3 for me
Search La Bonheme.mp3 for me
There is one in my pocket…
In 2006, Lilien, Kamal, and Gupta have developed a similar paradigm as DTNs with the name of Opportunistic Networks
(OppNets)
L. Lilien, Z.H. Kamal and A. Gupta (in cooperaAon with V. Bhuse and Z Yang), "OpportunisAc Networks: The Concept and Research Challenges," Department of Computer Science, Western Michigan University, Kalamazoo, Michigan, February 9, 2006.
Issues in DTN • Mobility Model
– Network highly mobile and dynamic in nature • What is the mobility pattern? • Mobility patterns of assigned "carrier nodes”
• Routing – The most challenging problem therefore lies in finding the route
between two disconnected devices.
• Trust – Finding “carriers nodes" network that trust
• Most of the time we assume that the nodes cooperate with each other (i.e. hosts do not refuse to deliver messages)
46
Random Movement
Random Walk Random Waypoint
Mobility model
Random movement
Human behavior based movement
Map-‐constrained random movement
-‐ each mobile nodes starts at a random locaAon and staying there for a certain period of Ame (pause Ame) and at the end of the pause Ame, the nodes select a random desAnaAon and move to the selected desAnaAon at a random speed.
-‐ each mobile nodes starts at a random locaAon and then move to a new locaAon by randomly choosing a direcAon and speed.
Map-Constrained Random Movement
e.g. KLCC (A) to KL Pavilion (B)
Random Map-‐Based Movement Shortest Path Map-‐Based Movement Routed Map-‐Based Movement
-‐ move from stop to stop using shortest paths -‐ nodes follow certain route (e.g. bus)
Mobility model
Random movement
Human behavior based movement
Map-‐constrained random movement
1
2
Mobility model
Random movement
Human behavior based movement
Map-‐constrained random movement
EKMAN, F., KER¨A NEN, A., KARVO, J., AND OTT, J. Working Day Movement Model. In Proc. 1st ACM/SIGMOBILE Workshop on Mobility Models for Networking Research (May 2008).
-‐ bring more reality of human movement paderns during a working day -‐ It produces similar Inter-‐contact Ames and contact duraAons as real world traces -‐ All nodes move on a real world map -‐ There are three major acAviAes: 1) Staying at home – node wake up in the morning 2) Working at the office -‐ go to the office and works 8 hours 3) Doing some acAvity with friends in the evening -‐ Use different transportaAon between acAviAes (bus, car or walking)
Working Day Movement Model (WDM)
Human Behavior Based Movement
This is for Mrs. Wilson
I will give the copy to
everyone I meet, and hopefully it will reach her
Concept: Floods messages into the network Goal: Maximize message delivery rate Disadvantages: -‐ High resources usage (buffer) -‐ High overhead
Epidemic: Epidemic RouAng for ParAally Connected Ad Hoc Networks
A. Vahdat and D. Becker. Epidemic RouAng for ParAally Connected Ad Hoc Networks. Technical Report CS-‐2000-‐06, CS. Dept. Duke Univ., 2000.
Epidemic
Spray and Wait
Rou9ng protocol
Spray and Focus
Prophet
50
Mrs. Wilson
3G
WiFi
WiFi
WiFi
3G
3G 3G Base staAon
Emergency Response Scenario
3G
WiFi
WiFi
WiFi
3G
3G Base
StaAon down
WiFi WiFi
Emergency Response Scenario
Security & Privacy
Opportunity Gaps
© 2012 MIMOS Berhad. All Rights Reserved. Source : SRI Consul/ng Business Intelligence
Intelligent
Thing vs. Human
Busine
ss im
pact
Innova9on opportuni9es
High
Low
High Low
• Context awareness • Human-‐like inferences & decisions
• Act on behalf of people
Thing/Device
• MiniaturizaAon • Energy efficiency • Tagging & idenAficaAon • System-‐in-‐package • Edge processing
Network
Encourage vs. discourage interacAon and automaAon
Governance policy
• Market demand rely on affordability & adracAveness
• Conversion cost : IoT investment vs. low-‐cost source of human labour
• AdapAve network • Interoperability • Ad-‐hoc network mgmt.
© 2012 MIMOS Berhad. All Rights Reserved. 54