The document provides an overview of the Internet of Things (IoT). It discusses the evolution of IoT from local networks to today's interconnected world and envisions a future where everything is connected. The key characteristics of IoT including connectivity, intelligence, scalability and heterogeneous environments are described. Two reference models for IoT architecture are presented - the ITU-T model with four layers and the IWF model with seven layers. The main components of IoT like identification, sensing, actuation, communication and computation are explained. Popular applications of IoT across various industries like transportation, smart cities, manufacturing, retail and more are listed. Finally, the challenges of IoT especially around security, privacy and complexity are covered.
3. Introduction
• Internet of Things(IoT)
• global infrastructure
• connects physical and virtual things around
us
• provides seamless communication and
contextual services
• solves many business problems
• Heterogeneous Devices from different
manufacturers
• Diverse protocols
• M2M, M2P, P2M, P2P
4. Evolution: Before IoT
Local Network Internet
https://en.wikipedia.org/wiki/Local_area_network http://www.blakeleyllp.com/
5. Evolution: IoT Today
• Internet of Things
• Internet of Vehicles
• Industrial IoT
• Web of Things
• Etc.
https://www.ssh.com/iot/
8. Evolution: Current Scenario
Human Centric Applications
Picture: Poikola, Antti, Kai Kuikkaniemi, and Harri Honko. 2015. “MyData – A Nordic Model for human-centered personal data management
andprocessing.” Ministry of Transport and Communications.
12. ITU-T IoT Reference Model
• Four Layers
• Application layer
• Service and Application support layer
• Network layer
• Device layer
• Two Capabilities
• Management
• Security
13. ITU-T IoT Reference Model
• Application layer contains all IoT applications that
interact with IoT devices
• Service support and Application support layer
consists of the two capability groupings
• Generic support capabilities: common
capabilities used by different IoT applications,
such as data processing or data storage
• Specific support capabilities: specific
capabilities for the requirements of diversified
applications
14. ITU-T IoT Reference Model
• Network layer consists of the two capabilities:
• Networking capabilities provide relevant control
functions of network connectivity between devices
and gateways.
• Transport capabilities focus on providing
connectivity for the transport of IoT service and
application specific data information, as well as the
transport of IoT-related control and management
information.
15. ITU-T IoT Reference Model
• Device layer capabilities are categorized into
two kinds of capabilities
• Device Capabilities:
• Direct interaction with the communication
network (without gateways)
• Indirect interaction with the communication
network (through gateways)
• Ad-hoc networking
• Sleeping and waking-up
16. ITU-T IoT Reference Model
• Gateway capabilities:
• Multiple interfaces support – At device layer
through wired or wireless technologies (CAN bus,
ZigBee, Bluetooth or Wi-Fi) and At network layer
through PSTN, 2G or 3G networks, LTE, or DSL
• Protocol conversion when communications at the
device layer use different device layer protocols
and when communications involving both the
device layer and network layer use different
protocols
17. ITU-T IoT Reference Model
• Management capabilities
• Generic capabilities
• device management such as activation & de-
activation, diagnostics, firmware updating
• local network topology management
• traffic and congestion management such as
detection of network overflow conditions,
implementation of resource reservation
• Specific Capabilities are closely coupled with
application-specific requirements
18. ITU-T IoT Reference Model
• Security capabilities
• Generic capabilities
• application layer: authorization, authentication,
confidentiality and integrity protection, privacy
protection, security audit
• network layer: authorization, authentication,
confidentiality, and signalling integrity protection
• device layer: authentication, authorization, device
integrity validation, access control, data confidentiality
and integrity protection.
• Specific Capabilities are closely coupled with
application-specific requirements
21. Physical Devices and Controllers
• “Things” in IoT
• Endpoint devices to send and receive information
• Controllers to control multiple devices
• IoT “devices” are capable of:
• Analog to digital
conversion,
as required
• Generating data
• Being queried
or controlled over
internet
22. Connectivity
• Facilitates reliable, timely transmission
• Between devices (Level 1) and the network
• Across networks (east-west)
• Between the network (Level 2) and low-level
information processing occurring at Level 3
• Capabilities include
• Implementation of
various protocols
• Switching and routing
• Translation between protocols
• Security at the network level
• (Self Learning) Networking Analytics
23. Edge (Fog) Computing
• Focuses on North-South Communications
• Converts network data flows into information
• Data filtering, cleanup, aggregation
• Packet content inspection
• Combination of network and data level analytics
• Thresholding and Event generation
24. Data Accumulation
• Data in motion is converted to data at rest
• Converts network packets to database relational tables
• Achieves transition from ‘Event based’ to ‘Query based’
computing
• Reduces data through filtering and selective storing
• Capabilities Include
• Event filtering/sampling
• Event comparison
• Event joining for CEP
• Event based rule evaluation
• Event aggregation
• Northbound/southbound alerting
• Event persistence in storage
25. Data Abstraction
• Abstracts the data interface for applications
• Creates schemas and views of data as applications
need
• Combines data from multiple sources
• Filtering, selecting, projecting, and reformatting the
data to serve the client applications
• Reconciles differences in data shape, format,
semantics, access protocol, and security
26. Application
• Reporting, Analytics, and Control
• Mission-critical business applications, such as generalized ERP or
specialized industry solutions
• Mobile applications that handle simple interactions
• Business intelligence reports, where the application is the BI server
• Analytic applications that interpret data for business decisions
• System management/control center applications that control the IoT
system itself and don’t act on the data produced by it
27. Collaboration and Processes
• Involves people and business processes
• Applications execute business logic to empower people
• People use applications and associated data for their
specific needs.
• Applications give the right data, at the right time to do the
right thing.
• People must be able to communicate and collaborate
28. ITU-T vs IWF (IoT World Forum)
• Both models are complimentary
• ITU-T focusses on the device and gateway level
• It is concerned with developing standards for
interaction with IoT devices
• The IWF is concerned with broader issues of
developing the applications, middleware and
support functions.
• IWF reference model is seven layered
32. Sensing
• Employs various sensors
• Specialized sensors for various applications
• Smart Sensors
• Wearable Sensing Devices
• Embedded Sensors
• Sense the data
• Transmit to the gateways
33. Actuation
• Sensor and data analytics technologies from
the IoT are used to send commands to smart
devices
• Decisions are taken on edge/cloud and passed
on to the devices to act upon
• Artificial Intelligence may be used to act
according to the context and environment
Ex: Water Level Sensor & Smart Electric Motor
34. Communication
Multiple radio access technology
• Connects intelligent devices at the edge
• facilitates machine to machine communication
Scope Connectivity
Cellular 3G, 4G, LTE, 5G
(In Near Future)
Short Range Wi-Fi, Bluetooth,
6LoWPAN, NGC
Medium Long Range WiMAX, Z-Wave,
ZigBee
35. Communication
Internet is the primary medium
• To connect to the cloud
Moving towards next generation IoT
Ex: 5G
Layer Protocols
Network Layer IPv4, IPv6, IPSec, NanoIP,
6LoWPAN
Transport Layer TCP, UDP, DTLS
Application Layer CoAP, MQTT, XMPP, HTTP,
AMQP
40. IoT: Communication Features
• Different underlying networks:
abstraction of the different underlying networks
(e.g., wired, wireless, cellular), support for different
communication modes (e.g., access point-based,
p2p fashion
• Addressing modes
support of any cast/unicast/multicast/broadcast
transmissions, dynamic replacing of broadcast with
multicast/anycast to reduce network load
41. IoT: Communication Features
• Massive device transmission:
handling simultaneous or nearly simultaneous
transmissions from huge number of devices (i.e.,
efficient MAC protocols)
• High reliability:
guarantee of connectivity/reliable transmissions based
on different solutions (e.g., link adaptation protocols,
modulation/coding schemes, multi-path
establishment)
42. IoT: Communication Features
• Enhanced access priority:
management of priority levels of services and
communications services (e.g., preemption
Mechanisms)
• Path Selection:
optimization of communication paths based on
different policies (e.g., network cost, delay,
transmission failures), dynamic metric selection
43. IoT: Communication Features
• Mobility:
seamless roaming and mobility, communication
management towards stationary and low-mobile
devices
• Sleeping Device:
managing communication towards sleeping devices.
• Low power consumption:
include mechanisms for reducing energy consumption
44. IoT: Communication Features
• Notification and interaction:
functions for supporting data acknowledgment,
failure notifications, and interaction mode
• Traffic Profile:
management of data traffic with different traffic
profiles (e.g., continuous transmissions, long
periods between two data transmissions, small
amount of transmitted data, burst of data,
bidirectional/unidirectional transmissions)
45. IoT: Communication Features
• Time dependent traffic:
support of data traffic with different time requirements
(e.g., time-controlled traffic, delay-tolerant traffic,
extremely low-latency traffic)
• Location reporting support:
report the device/gateway location to other
devices/applications continuously/upon request
• Secure connections:
integrity of communications and timestamps, anonymity of
identity and location, detection of abnormal events
46. Computation
• Hardware:
• Smart-Things
• Arduino
• Intel Galileo
• Raspberry Pi
• Beagle Bone
• Smart Phones
• Phidgets
• Data is processed both locally and on cloud
• Wider horizon in terms of space, time and type of
information for intelligent processing
52. Applications: Smart City
• Residential E-meters
• Smart street lights
• Pipeline leak detection
• Traffic control
• Surveillance cameras
• Centralized and integrated system control
57. Applications: Food Processing
• Control geographical origin
• Food production
management
• Nutrition calculations
• Prevent overproduction and
shortage
• Control food quality, health
and safety.
58. Applications: Education
• School Administration
• Attendance Management
• Voting System
• Automatic Feedback
• Instructional Technology
• Media
• Information management
• Foreign language learning
60. Security
• Key issue in any system
• Keep the things from unauthorized access
• Security in physical access
• Network and Communications Security
• Data Security
• Application Security
• Reprogrammable chips improves security and
flexibility, and enables downstream
configuration