* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Introduction and Overview of Advanced Computer Networks
Survey
Document related concepts
Airborne Networking wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Deep packet inspection wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Computer security wikipedia , lookup
Network tap wikipedia , lookup
Transcript
INTERNET OF THINGS ZILONG YE, PH.D. [email protected] WHAT IS INTERNET OF THINGS The Internet of Things (IoT) is the network of physical objects—devices, vehicles, buildings and other items embedded with electronics, software, sensors, and network connectivity—that enables these objects to collect and exchange data. CHARACTERISTICS OF IOT Intelligence Knowledge extraction from a large dataset collected by billions of objects Complex system A diverse set of dynamically changing objects Size considerations Scalability Time considerations Billions of parallel and simultaneous events Space considerations Localization Everything as a service Consuming resources as a service ENABLING TECHNOLOGIES • RFID to smallest enabling technologies, such as chips, etc. RFID • The reduction in terms of size, weight, energy consumption, and cost of the radio takes us to a new era – This allows us to integrate radios in almost all objects and thus, to add the world ‘‘anything” to the above vision which leads to the IoT concept • Composed of one or more readers and tags • RFID tag is a small microchip attached to an antenna • Can be seen as one of the main, smallest components of IoT, that collects data WIRELESS TECHNOLOGIES Zigbee 6LoWPAN Bluetooth WiFi Data rate ~250Kbps ~200Kbps ~3Mbps ~500Mbps Range ~500m ~200m ~50m ~100m Power Low Low Medium High Nodes ~65536 ~100 ~7 2000 A complex Gateway for Zigbee to non-Zigbee Range Zigbee 6LoWPAN Bluetooth Data rate WiFi IOT APPLICATIONS Smart Appliances Wearable Tech Healthcare A CLASSIC IOT ARCHITECTURE Server Smart Home Or smart eHealth GW Internet (IPv6) Remote User 6LoWPAN, Zigbee or Bluetooth IoT devices are resource constraint, unable to directly connect to IP networks, so Gateway is needed to connect these devices to the server; Server is needed for remote user to communicate with IoT devices behind Gateway, belongs to the category of hole punching technology; OPEN CHALLENGES IN IOT • Lack of standardization • Scalability – Addressing issues – Understanding the big data • Support for mobility • New network traffic pattern to handle • Security/Privacy issues STANDARDIZATION • Several standardization efforts but not integrated in a comprehensive framework • Open Interconnect Consortium:Atmell, Dell, Intel, Samsung and Wind River • Industrial Internet Consortium: Intel, Cisco, GE, IBM • AllSeen Alliance: Led by Qualcomm, many others 21 SCALABILITY • Number of devices increasing exponentially – How can they uniquely be tagged/named? – How can the data generated by these devices be managed? ADDRESSING ISSUES • • • Incredibly high number of nodes, each of which will produce content that should be retrievable by any authorized user – This requires effective addressing policies – IPv4 protocol may already reached its limit. Alternatives? – IPv6 addressing has been proposed for low power wireless communication on nodes within the 6LoWPAN context IPv6 addresses are expressed by means of 128 bits or10^38 addresses, enough to identify objects worth to be addressed RFID tags use 64–96 bit identifiers, as standardized by EPC global, solutions to enable the addressing of RFID tags into IPv6 networks Encapsulation of RFID message into an IPv6 packet. Source:Atzori et al. (2010) NEW NETWORK TRAFFIC • The characteristics of the smart objects traffic in the IoT is still not known – Important basis for the design of the network infrastructures and protocols • Wireless sensor networks (WSNs) traffic characterization – Strongly depend on the application scenario – Problems arise when WSNs become part of the overall Internet – The Internet will be traversed by a large amount of data generated by sensor networks deployed for heterogeneous purposes extremely different traffic characteristics – Required to devise good solutions for supporting quality of service SECURITY • The components spend most of the time unattended – It is easy to physically attack them • IoT components are characterized by low capabilities in terms of both energy and computing resources – They can’t implement complex schemes supporting security • Authentication problem – Proxy attack, a.k.a. man in the middle attack problem • Data integrity – Data should not be modified without the system detecting it – Attacks on the node • Memory protec1on – Attacks over the network • Keyed-‐Hash Message Auth. Code PRIVACY • How is it different than traditional privacy? – Legislative issues – Ethics issues • Easy for a person to get involved in IoT even if he/she does not know • Data can be stored indefinitely • Current solutions are not enough – Encryption, pseudo noise signal, privacy broker IOT APPLICATIONS Smart home Smart e-healthcare Cyber transportation system Environmental research Other applicatons SMART HOME Temperature monitoring and control; Smart metering, including reading and control; Light or heat control; Smoke or water leakage detection; Windows, doors; SMART HOME APPLICATION 1 The sensor realize that the temperature outside is much higher than the room, it will trigger to close the window and put on the curtain so that the room could be cool. (inside smart home M2M) SMART HOME APPLICATION 2 The sensor realize that it is getting dark outside, it will trigger to put on the curtain in order to provide the privacy. (inside smart home M2M) SMART HOME APPLICATION 3 When go to bed, the user can turn off the light, lock the door, and wake up the security alarm using their smart phone (inside home control); SMART HOME APPLICATION 4 When raining, the user can remotely close the window and turn off the scheduled watering at yard, using their smart phone. (remote control) SMART HOME APPLICATION PROTOTYPE Collector, e.g., light sensor Smart Phone Gateway Router Actuator, e.g., lamp Main components: Remote user: smart phone or pc; Collector: collect data, such as temperature, light, electricity, power, smoke or water; Actuator: control devices, such as AC, heater, lamp, alarm or other on/off operation; Main workflows: Remote reading: smart phone can read light value from multiple (mobile) sensor; Remote control: smart phone can lighten the lamp; M2M communication: if the sensed data is below some threshold, the light sensor can trigger the lamp to be on; SMART HOME CHALLENGES Security; User’s information and privacy is the most important concern; Interoperability; Heterogeneous device; Device to device; Device to outside world; Unreliable wireless communication; SMART E-HEALTHCARE Emergency Emergency Contact Client Physician Biomedical Data Learning & Analysis Police SMART EHEALTH PROTOTYPE Doctors and family Patient with wearable devices Gateway router IoT computing server Main components: Monitoring system Alert system Patient: use fitbit or other body sensors; Monitor system: 1) collect data; 2) send alert to patients and doctors and family when necessary; Doctors and family: read data from monitoring system, and provide prescription or assistance to the patient; Main workflows: Monitor read data from mobile fitbit device; Monitor send alert to doctors, family and patient; Doctor and family read data from monitor or directly from patient; Doctor and family send prescription to patient; SMART E-HEALTH Characteristic: Both pull and push traffic; Benefits: Route on name rather than IP, which can easily bind smart devices of a given client; Multiple access to the same data; Caching can help save bandwidth; Challenges: Privacy; Real-time; (patients may not have time or energy to call the emergency by themselves) CYBER TRANSPORT SYSTEM CYBER TRANSPORT SYSTEM Applications: Real-time traffic monitoring; On-road video delivery; Safe driving; (alert to the appropriate vehicle cluster) Benefits: Names can be easily aggregated based on location information; Caches can be used for multiple access to the same data (traffic data or video); CYBER TRANSPORTATION SYSTEM • Vehicle control: Airplanes, automobiles, autonomous vehicles – All kinds of sensors to provide accurate, redundant view of the world – Several processors in cars (Engine control, break system, airbag deployment system, windshield wiper, door locks, entertainment system, etc.) – Actuation is maintaining control of the vehicle – Very light timing constraints and requirements enforced by the pla t f orms CYBER TRANSPORTATION SYSTEM 1. A network of sensors in a vehicle can interact with its surroundings to provide informa1on – – Local roads, weather and traffic conditions to the car driver Adaptive drive systems to respond accordingly 2. Automatic activation of braking systems or speed control via fuel management systems. – Condition and event detection sensors can activate systems to maintain driver and passenger comfort and safety through the use of airbags and seatbelt 3. Sensors for fatigue and mood monitoring based on driving conditions, driver behavior and facial indicators – Ensuring safe driving by activating warning systems or directly controlling the vehicle RFID TRACK AND TRACE I want: amazon/computers/ipad/#1/ I want: amazon/books/H Porter #1/lego/to ys/amazon #1/ipad/comput ers/amazon Harry Porter/books/a mazon I want: amazon/toys/lego/#1 RFID TRACK AND TRACE Characteristic: Both pull and push (publish/subscribe) traffic; Benefits: Handle billions of RFID tags Suitable for resource-constrained devices, e.g., RFID tags, because of (1) routing based on name instead of complicated routing protocol; (2) cached data can be reused so that RFID do not need to respond frequently; Cache enables an easy way for multiple access to the trace data by both provider and user, so it can help save bandwidth; Other IoT use cases: library management, lost-found, market map and other RFID positioning; AIR CONDITION (PM2.5) MONITOR AIR CONDITION (PM2.5) MONITOR Benefits: Handle billions of small sensors; One Interest retrieves multiple Data for calculating average value; Routing based on names; Cache can be used for other institutes to access the same data, so that save bandwidth; Suitable for energy-constraint devices, because (1) caching allows the sensors to reply only a few Interest request; (2) do not need complicated protocol; GOOGLE WALLET OR APPLE WATCH