akintayo akinyoade
play

Akintayo Akinyoade 12/01/2017 Survey Roadmap Internet of Things - PowerPoint PPT Presentation

INTERNET OF THINGS (IoT) A SURVEY Akintayo Akinyoade 12/01/2017 Survey Roadmap Internet of Things (IoT)? Tech. Enablers for IoT IoT Applications Open Research Issues Internet of Things (IoT) Network Oriented Vision Things Oriented


  1. INTERNET OF THINGS (IoT) – A SURVEY Akintayo Akinyoade 12/01/2017

  2. Survey Roadmap Internet of Things (IoT)? Tech. Enablers for IoT IoT Applications Open Research Issues

  3. Internet of Things (IoT) Network Oriented Vision Things Oriented Vision IoT-one paradigm, many vision Semantic Oriented Vision Ref: Informationsecuritybuzz.com “ From anytime, anyplace connectivity for anyone, we will now have ITU Vision - connectivity to anything ”

  4. Internet of Things ( Cont’d ) Originates from the pervasive presence of variety of things or objects – such as RFID tags, sensors ,mobile phones , which through unique addressing are able to interact with each other to reach common goals. Semantically- It’s a world -wide network of interconnected objects that are uniquely addressable based on a standard communication protocol.

  5. IoT Referenced Framework Communication Protocols CoAP – Constrained Application Protocol LWM2M- Lightweight Machine 2 Machine UPnP – Universal Plug and Play MQTT – Message Queue Telemetry Transport HTTP/REST – Representational State Transfer TCP/IP Layers IoT Layers Websockets Source: Chapter 2 The Internet in IoT — OSI, TCP/IP, IPv4, IPv6 and Internet Routing

  6. Technology Enablers for IoT Identification & Sensing • A) Radio Frequency Identification Systems (RFID) - Frequency band LF (124-135KHz) to UHF (860-960MHz) - Monitors object in real-time without them being in line-of-sight - System comprises of Reader & Tags - RFID Tags = Microchip + Antenna (Used for transmitting tag ID and receiving the reader signal) Passive tags - Harvest energy from query signal generated by nearby reader System is characterized with low gain. Use Readers with highly directive antennas to improve gain. Active tags - Contains onboard power supply (i.e. batteries). Wider radio coverage but expensive RFID systems, when augmented with sensor network could help bridge the physical & digital world IEEE 802.15.4 standard defines the physical and MAC layer for low power WPAN

  7. Comparison between RFID systems, wireless sensor networks & RFID sensor networks B) Middleware & Communication - Follows Service Oriented Architecture (SOA) - Abstracts device functionalities and communication capabilities to provide a common set of services and environment for service composition

  8. IoT Applications

  9. Open Research Issues 1. Standards needs to be integrated into a comprehensive framework

  10. 2. Addressing and Networking Issues - Limited IPV4 address (32 bits) - IPV6 address to be adopted (128 bits)- large enough to identify any object worth identifying - Concatenate RFID tag identifier with network prefix segment of IPV6 IPV6 address = Gateway ID (64 bits) + Interface ID (64 bits) (Network prefix part) (RFID tag identifier) Pros : Effective for 64 bits Tags Cons: ineffective for 96 long bits Agents = Network element capable of mapping RFID identifier regardless of lengths into 64 bits field - Encapsulating RFID message and header into IPV6 packet payload

  11. 2. Addressing and Networking Issues (cont’d) - Need for Object Name Service (ONS) like Domain Name Service (DNS) ONS should be capable of resolving described objects to associated RFID tag identifier and vice versa - New reliable transport layer protocol other than TCP is needed: - Three way handshake wastes limited communication and energy resources - TCP congestion control is useless since amount of data exchanged in a session is small - Buffer management is costly considering the resulting energy consumption. - Little knowledge about Quality of Service (QoS) -Traffic transversed is unknown since deployment is new - Requires traffic characterization and modelling

  12. 3. Security and Privacy IoT deployment provides security risk because: - Components spend most times unattended to. Hence, easy to modify data stored at the nodes - Communication is wireless, making eavesdropping extremely simple - Cannot support complex security scheme such as authentication and data integrity due to low energy and computing resources - Proxy attack or man-in-the-middle attack (see figure below)

  13. Research issues at a glance

  14. References 1. The Internet of Things: A Survey, Luigi Atzori, Antonio Iera, Giacomo Morabito, 2010 2. M. Presser, A. Gluhak, The Internet of Things: Connecting the Real World with the Digital World, EURESCOM mess@ge – The Magazine for Telecom Insiders, vol. 2, 2009, <http://www.eurescom.eu/> 3. https://www.informationsecuritybuzz.com 4. https://www.accesseventsolutions.com/rfid-systems

  15. THANK YOU!!!

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend