Download Introduction and Overview of Advanced Computer Networks

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Airborne Networking wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Deep packet inspection wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Computer security wikipedia , lookup

Zigbee wikipedia , lookup

Network tap wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

IEEE 1355 wikipedia , lookup

UniPro protocol stack wikipedia , lookup

Transcript
INTERNET OF THINGS
ZILONG YE, PH.D.
[email protected]
WHAT IS INTERNET OF THINGS
 The Internet of Things (IoT) is the
network of physical objects—devices,
vehicles, buildings and other items
embedded with electronics, software,
sensors, and network connectivity—that
enables these objects to collect and
exchange data.
CHARACTERISTICS OF IOT
 Intelligence

Knowledge extraction from a large dataset collected by billions of objects
 Complex system

A diverse set of dynamically changing objects
 Size considerations

Scalability
 Time considerations

Billions of parallel and simultaneous events
 Space considerations

Localization
 Everything as a service

Consuming resources as a service
ENABLING TECHNOLOGIES
• RFID to smallest enabling technologies, such as chips, etc.
RFID
• The reduction in terms of size, weight, energy
consumption, and cost of the radio takes us to a new era
– This allows us to integrate radios in almost all objects and thus,
to add the world ‘‘anything” to the above vision which leads to
the IoT concept
• Composed of one or more readers and tags
• RFID tag is a small microchip attached to
an antenna
• Can be seen as one of the main, smallest
components of IoT, that collects data
WIRELESS TECHNOLOGIES
Zigbee
6LoWPAN
Bluetooth
WiFi
Data rate
~250Kbps
~200Kbps
~3Mbps
~500Mbps
Range
~500m
~200m
~50m
~100m
Power
Low
Low
Medium
High
Nodes
~65536
~100
~7
2000
A complex Gateway for Zigbee to non-Zigbee
Range
Zigbee
6LoWPAN
Bluetooth
Data rate
WiFi
IOT APPLICATIONS
Smart Appliances
Wearable
Tech
Healthcare
A CLASSIC IOT ARCHITECTURE
Server
Smart Home
Or smart eHealth
GW
Internet
(IPv6)
Remote User
6LoWPAN, Zigbee or Bluetooth
 IoT devices are resource constraint, unable to directly connect to IP
networks, so Gateway is needed to connect these devices to the server;
 Server is needed for remote user to communicate with IoT devices behind
Gateway, belongs to the category of hole punching technology;
OPEN CHALLENGES IN IOT
• Lack of standardization
• Scalability
– Addressing issues
– Understanding the big data
• Support for mobility
• New network traffic pattern to handle
• Security/Privacy issues
STANDARDIZATION
• Several standardization efforts but not integrated in a comprehensive
framework
• Open Interconnect Consortium:Atmell, Dell, Intel, Samsung and Wind River
• Industrial Internet Consortium: Intel, Cisco, GE, IBM
• AllSeen Alliance: Led by Qualcomm, many others
21
SCALABILITY
• Number of devices increasing exponentially
– How can they uniquely be tagged/named?
– How can the data generated by these devices be managed?
ADDRESSING ISSUES
•
•
•
Incredibly high number of nodes, each of which will produce content that should be
retrievable by any authorized user
– This requires effective addressing policies
– IPv4 protocol may already reached its limit. Alternatives?
– IPv6 addressing has been proposed for low power wireless
communication on nodes within the 6LoWPAN context
IPv6 addresses are expressed by means of 128 bits or10^38 addresses, enough to
identify objects worth to be addressed
RFID tags use 64–96 bit identifiers, as standardized by EPC global, solutions to enable the
addressing of RFID tags into IPv6 networks
Encapsulation of RFID
message into an IPv6
packet.
Source:Atzori et al. (2010)
NEW NETWORK TRAFFIC
• The characteristics of the smart objects traffic in the IoT is still not
known
– Important basis for the design of the network infrastructures and
protocols
• Wireless sensor networks (WSNs) traffic characterization
– Strongly depend on the application scenario
– Problems arise when WSNs become part of the overall Internet
– The Internet will be traversed by a large amount of data generated by
sensor networks deployed for heterogeneous purposes extremely
different traffic characteristics
– Required to devise good solutions for supporting quality of service
SECURITY
• The components spend most of the time unattended
– It is easy to physically attack them
• IoT components are characterized by low capabilities in terms
of both energy and computing resources
– They can’t implement complex schemes supporting security
• Authentication problem
– Proxy attack, a.k.a. man in the middle attack problem
• Data integrity
– Data should not be modified without
the system detecting it
– Attacks on the node
• Memory protec1on
– Attacks over the network
• Keyed-‐Hash Message Auth. Code
PRIVACY
• How is it different than
traditional privacy?
– Legislative issues
– Ethics issues
• Easy for a person to get involved in
IoT even if he/she does not know
• Data can be stored indefinitely
• Current solutions are not enough
– Encryption, pseudo noise signal,
privacy broker
IOT APPLICATIONS
 Smart home
 Smart e-healthcare
 Cyber transportation system
 Environmental research
 Other applicatons
SMART HOME
 Temperature
monitoring and
control;
 Smart metering,
including reading
and control;
 Light or heat
control;
 Smoke or water
leakage detection;
 Windows, doors;
SMART HOME APPLICATION 1
 The sensor realize that
the
temperature
outside is much higher
than the room, it will
trigger to close the
window and put on the
curtain so that the
room could be cool.
(inside smart home
M2M)
SMART HOME APPLICATION 2
 The sensor realize that it is getting dark outside, it will trigger to put on the curtain in
order to provide the privacy. (inside smart home M2M)
SMART HOME APPLICATION 3
 When go to bed, the user can turn off the light, lock the door, and wake up the
security alarm using their smart phone (inside home control);
SMART HOME APPLICATION 4
 When raining, the user can remotely close the window and turn off the scheduled
watering at yard, using their smart phone. (remote control)
SMART HOME APPLICATION PROTOTYPE
Collector, e.g., light sensor
Smart Phone


Gateway Router
Actuator, e.g., lamp
Main components:

Remote user: smart phone or pc;

Collector: collect data, such as temperature, light, electricity, power, smoke or water;

Actuator: control devices, such as AC, heater, lamp, alarm or other on/off operation;
Main workflows:

Remote reading: smart phone can read light value from multiple (mobile) sensor;

Remote control: smart phone can lighten the lamp;

M2M communication: if the sensed data is below some threshold, the light sensor can
trigger the lamp to be on;
SMART HOME CHALLENGES
 Security;

User’s information and privacy is the most important concern;
 Interoperability;

Heterogeneous device;

Device to device;

Device to outside world;
 Unreliable wireless communication;
SMART E-HEALTHCARE
Emergency
Emergency
Contact
Client
Physician
Biomedical Data
Learning & Analysis
Police
SMART EHEALTH PROTOTYPE
Doctors and family
Patient with
wearable devices
Gateway router
IoT computing
server


Main components:
Monitoring system
Alert system

Patient: use fitbit or other body sensors;

Monitor system: 1) collect data; 2) send alert to patients and doctors and family when necessary;

Doctors and family: read data from monitoring system, and provide prescription or assistance to the patient;
Main workflows:

Monitor read data from mobile fitbit device;

Monitor send alert to doctors, family and patient;

Doctor and family read data from monitor or directly from patient;

Doctor and family send prescription to patient;
SMART E-HEALTH
 Characteristic:

Both pull and push traffic;
 Benefits:

Route on name rather than IP, which can easily bind smart devices of a given client;

Multiple access to the same data;

Caching can help save bandwidth;
 Challenges:

Privacy;

Real-time; (patients may not have time or energy to call the emergency by themselves)
CYBER TRANSPORT SYSTEM
CYBER TRANSPORT SYSTEM
 Applications:

Real-time traffic monitoring;

On-road video delivery;

Safe driving; (alert to the appropriate vehicle cluster)
 Benefits:

Names can be easily aggregated based on location information;

Caches can be used for multiple access to the same data (traffic data or video);
CYBER TRANSPORTATION SYSTEM
• Vehicle control: Airplanes, automobiles, autonomous
vehicles
– All kinds of sensors to provide accurate, redundant view of the world
– Several processors in cars (Engine control, break system, airbag
deployment system, windshield wiper, door locks, entertainment
system, etc.)
– Actuation is maintaining control of the vehicle
– Very light timing constraints and requirements enforced by the
pla t f orms
CYBER TRANSPORTATION SYSTEM
1. A network of sensors in a vehicle can interact with its
surroundings to provide informa1on
–
–
Local roads, weather and traffic conditions to the car driver
Adaptive drive systems to respond accordingly
2. Automatic activation of braking systems or speed control
via fuel management systems.
–
Condition and event detection sensors can activate systems
to maintain driver and passenger comfort and safety through
the use of airbags and seatbelt
3. Sensors for fatigue and mood monitoring based on
driving conditions, driver behavior and facial indicators
–
Ensuring safe driving by activating warning systems or directly
controlling the vehicle
RFID TRACK AND TRACE
I want: amazon/computers/ipad/#1/
I want: amazon/books/H
Porter
#1/lego/to
ys/amazon
#1/ipad/comput
ers/amazon
Harry
Porter/books/a
mazon
I want: amazon/toys/lego/#1
RFID TRACK AND TRACE
 Characteristic:

Both pull and push (publish/subscribe) traffic;
 Benefits:

Handle billions of RFID tags

Suitable for resource-constrained devices, e.g., RFID tags, because of (1) routing based on
name instead of complicated routing protocol; (2) cached data can be reused so that
RFID do not need to respond frequently;

Cache enables an easy way for multiple access to the trace data by both provider and
user, so it can help save bandwidth;
 Other IoT use cases: library management, lost-found, market map and other RFID
positioning;
AIR CONDITION (PM2.5) MONITOR
AIR CONDITION (PM2.5) MONITOR
 Benefits:

Handle billions of small sensors;

One Interest retrieves multiple Data for calculating average value;

Routing based on names;

Cache can be used for other institutes to access the same data, so that save
bandwidth;

Suitable for energy-constraint devices, because (1) caching allows the sensors to reply
only a few Interest request; (2) do not need complicated protocol;
GOOGLE WALLET OR APPLE WATCH