Challenges of the io t v1
-
Upload
incubation-entrepreneurship-iminds -
Category
Internet
-
view
98 -
download
0
Transcript of Challenges of the io t v1
![Page 1: Challenges of the io t v1](https://reader033.fdocuments.in/reader033/viewer/2022042817/55a791b61a28ab3f478b483b/html5/thumbnails/1.jpg)
Challenges for the Internet of
Things
Jeroen Hoebeke, www.ibcn.intec.ugent.be
Internet Based Communication Networks and Services (IBCN)
Department of Information Technology (INTEC)
Ghent University - iMinds
7/12/2014 1
![Page 2: Challenges of the io t v1](https://reader033.fdocuments.in/reader033/viewer/2022042817/55a791b61a28ab3f478b483b/html5/thumbnails/2.jpg)
MAKING IoT HAPPENKey challenges (- enablers)
![Page 3: Challenges of the io t v1](https://reader033.fdocuments.in/reader033/viewer/2022042817/55a791b61a28ab3f478b483b/html5/thumbnails/3.jpg)
Source: white paper arm.com / freescale.com
CloudBig data
analytics
Connectivity: local + global (wireless)
Ingredients: Cloud-based IoT system
Embedded,
low-power
Services/user
interactions
Security, trust…
![Page 4: Challenges of the io t v1](https://reader033.fdocuments.in/reader033/viewer/2022042817/55a791b61a28ab3f478b483b/html5/thumbnails/4.jpg)
Interoperability?
![Page 5: Challenges of the io t v1](https://reader033.fdocuments.in/reader033/viewer/2022042817/55a791b61a28ab3f478b483b/html5/thumbnails/5.jpg)
Manu-factoring
Health-care
…
Domainspecific
applica ons
Domainspecific
devices
…
Proprietaryver calsolu ons:proprietaryprotocols&
technologies
TODAY
IP connectivity
Manu-factoring
Health-care
…
Application enablement
Reconfigurable technologies
…
TOMORROW
Open standards
From closed vertical solutions to open horizontal solutions
Easy support of wide diversity of IoT applications
![Page 6: Challenges of the io t v1](https://reader033.fdocuments.in/reader033/viewer/2022042817/55a791b61a28ab3f478b483b/html5/thumbnails/6.jpg)
Example
Open standards for
constrained devices
92KB flash
8KB RAM
802.15.4
6LoWPAN
UDP
CoAP IETF
CoRE
IETF RPL
IETF 6LoWPAN
IEEECLIENT
SERVER
/s/t 22.5°C
200 OK
text/plain
22.5°CGET /s/t
Web of Things
![Page 7: Challenges of the io t v1](https://reader033.fdocuments.in/reader033/viewer/2022042817/55a791b61a28ab3f478b483b/html5/thumbnails/7.jpg)
Example
Open standards for
constrained devices
92KB flash
8KB RAM
802.15.4
6LoWPAN
UDP
CoAP IETF
CoRE
IETF RPL
IETF 6LoWPAN
IEEECLIENT
SERVER
/s/t 22.5°C
200 OK
text/plain
22.5°CGET /s/t
![Page 8: Challenges of the io t v1](https://reader033.fdocuments.in/reader033/viewer/2022042817/55a791b61a28ab3f478b483b/html5/thumbnails/8.jpg)
7.2 6.8 7.6
World Population
Rapid Adoption rate of digital
infrastructure:
5X faster than electricity and
telephony
50 Billion “Smart Objects”
50
2010 2015 2020
0
40
30
20
10
Billi
on
s o
f D
ev
ice
s
25
12.5
Inflection point
Timeline
©2013Ciscoand/oritsaffiliates.Allrightsreserved.
©2013Ciscoand/oritsaffiliates.Allrightsreserved.
Deployment &
operation?
Plug & play•Easy deployment (auto-configuration, assisted using e.g. wearable
technologies…)
•Self-management, self-diagnostics
•Robustness at scale (e.g. reliable wireless connectivity)
Distributed intelligence to handle huge amounts of traffic
![Page 9: Challenges of the io t v1](https://reader033.fdocuments.in/reader033/viewer/2022042817/55a791b61a28ab3f478b483b/html5/thumbnails/9.jpg)
© 2013 Cisco and/or its affiliates. All rights reserved.
Traditional Computing Model
Infinite,bandwidth,
0 delay
Device
Fog
Datacenter/Cloud
Assumes limited bandwidth,
variable delay, and intermittent
connectivity
Assumes limited bandwidth,
variable delay, and
intermittent connectivity
IoE Computing Model
Distributed intelligence
Datacenter/Cloud
Endpoint
![Page 10: Challenges of the io t v1](https://reader033.fdocuments.in/reader033/viewer/2022042817/55a791b61a28ab3f478b483b/html5/thumbnails/10.jpg)
Security
![Page 11: Challenges of the io t v1](https://reader033.fdocuments.in/reader033/viewer/2022042817/55a791b61a28ab3f478b483b/html5/thumbnails/11.jpg)
Security – privacy – data protection
Technological aspect:
security protocols exist / are being designed• E.g. IETF is very active on security for constrained devices
• Open challenges: deal with limited capabilities, devices can
be lost/stolen/sold/have finite life, scale, across systems
Human/legal aspect• Apply security solutions
(e.g. default router password)
• How to control your data
(e.g. Facebook data)
![Page 12: Challenges of the io t v1](https://reader033.fdocuments.in/reader033/viewer/2022042817/55a791b61a28ab3f478b483b/html5/thumbnails/12.jpg)
From data to
knowledge
![Page 13: Challenges of the io t v1](https://reader033.fdocuments.in/reader033/viewer/2022042817/55a791b61a28ab3f478b483b/html5/thumbnails/13.jpg)
Turning data into knowledge
CoAP-enabled sensors
Tagging + semantics
Reasoning on sensor and other data
![Page 14: Challenges of the io t v1](https://reader033.fdocuments.in/reader033/viewer/2022042817/55a791b61a28ab3f478b483b/html5/thumbnails/14.jpg)
IoT – Human interactions
IoT: many constrained,
embedded devices
(sensors, actuators)
without (graphical) user
interface
Facilitate IoT interactions through vision
WearablesInteractive, embedded
screens with content
adapting to context
![Page 15: Challenges of the io t v1](https://reader033.fdocuments.in/reader033/viewer/2022042817/55a791b61a28ab3f478b483b/html5/thumbnails/15.jpg)
?