efficient iot framework for industrial applications
play

Efficient IoT Framework for Industrial Applications Pablo Pual - PowerPoint PPT Presentation

DOCTORAL THESIS Efficient IoT Framework for Industrial Applications Pablo Pual Pereira Industrial Electronics Department of Computer Science, Electrical and Space Engineering Division of EISLAB Lule University of Technology, Lule,


  1. DOCTORAL THESIS Efficient IoT Framework for Industrial Applications Pablo Puñal Pereira Industrial Electronics

  2. Department of Computer Science, Electrical and Space Engineering Division of EISLAB Luleå University of Technology, Luleå, Sweden Supervisors: Jens Eliasson and Jerker Delsing

  3. C ONTENT • Introduction to IoT • Results • Research • Discussion - Access control • Conclusion - Efficient IoT Framework • Future work • Case studies 3

  4. I NTRODUCTION What is Internet of Things? 4

  5. I NTRODUCTION Internet of Things “An IoT device is a resource-constrained embedded system with the capability to perform a number of well-defined tasks, such as sensing, signal processing, and networking. It usually has wireless communication capabilities and is powered by batteries” 5

  6. I NTRODUCTION Resource-constrained embedded device ✓ Small size ๏ Low processing ✓ Low weight ๏ Low memory ✓ Low cost • Program memory ✓ Low power consumption • Working memory ✓ Multiple I/Os • Data storage ‣ Communications ๏ Battery lifetime restricted 
 ‣ Sensors & Actuators 6

  7. R ESEARCH Research questions 1.Is it feasible to use IoT-SOA technology in WSANs for industrial applications? 1.What are the benefits of adding IoT technology to industrial WSANs? 2.Is it possible to increase interoperability while mitigating performance impact? 2.How can access to exposed IoT nodes be protected and controlled while maintaining performance? 3.How can zero-configuration operation be achieved for an IoT node? 7

  8. R ESEARCH Baseline of the research Application protocols Stack Hardware compatibility Communication Semantics Services Standards Security Encryption Hardware Security Mechanisms Security level 8

  9. R ESEARCH Evolution - SOA - Access policies How to - Customized protect them? IP-based Enable Access Services Nodes resources control A B C F G A B C D F G Zero- Bootstrapping configuration Complex EG functionalities G Configuration Run-time reconfiguration E G G 9

  10. R ESEARCH Network architecture Clients External Servers Internal Servers N 1 N 4 G 1 G 2 N 2 N 5 G 3 N 3 N 8 N 7 N 6 Area to cover Industrial Network 10

  11. R ESEARCH Network architecture Application JSON/CBOR CoAP NTP UDP IP / IPsec 6LoWPAN IEEE 802.15.4 11

  12. R ESEARCH Access control Authentication Authorization 12

  13. R ESEARCH Access control - Standardized solutions RADIUS DIAMETER Kerberos • Complex processing - Low-power criteria - Latencies • Additional overhead - Communication - Computation • Extra communication - Low-power criteria - Network performance 13

  14. R ESEARCH Access control - Proposed solution Ticket-based access control • Reduced message overhead • Reduced extra-communications • Reduced processing overhead • Dual-Authentication 14

  15. R ESEARCH Access control - Proposed solution 69 bytes 20 bytes + 20 bytes + 8 bytes + 21 bytes IPsec header UDP header CoAP header Data IP header 20 bytes + 20 bytes + 8 bytes + (21+ 8 ) bytes 77 bytes 15

  16. R ESEARCH Access control - Proposed solution 300 RFC Access control Dual authentication 3.4% 225 Message size (bytes) 150 7.2% 8.2% 8.5% 8.5% 8.5% 8.0% 8.5% 8.5% 75 0 T T T E E K T e e E S U E r s T V C o n G O E S R P A c o L E E P / p n E R S w s D B e o O r n k - l l e w . 16

  17. R ESEARCH Access control - Authentication Client AAA Server Authentication Process Authentication Process Authentication Request Authenticator Challenge Request-Response Encrypt Password Ticket 17

  18. R ESEARCH Access control - CoAP CoAP Client CoAP Server AAA Server Standard Request without Access Control Standard Request without Access Control CoAP Request 18

  19. R ESEARCH Access control - CoAP CoAP Client CoAP Server AAA Server Access Control - Access Allowed - First Request Access Control - Access Allowed - First Request CoAP Request Get Ticket Check Ticket Valid Ticket Access Control - Access Allowed - Non-First Request Access Control - Access Allowed - Non-First Request CoAP Request Get Ticket and check 19

  20. R ESEARCH Access control - AAA Server Architecture Ticket Ticket CoAP Validation Generation MQTT RADIUS RADIUS XMPP Client Server HTTP Per Per ... Access Time Accepted Protocols Accounting AAA Server 20

  21. R ESEARCH Access control - Custom services example Non-authorized Administrator Authorized 21

  22. R ESEARCH Efficient IoT framework Industrial IoT requirements Scalability Security Interoperability Companies/Alliances on IoT Intel, IPSO, OMA, IETF, Microsoft, ZigBee-Alliance, IBM, Cisco, Motivity, IIC… 22

  23. R ESEARCH Efficient IoT framework Bootstrapping Device Manager Efficient IoT Framework Access control Configuration 23

  24. R ESEARCH Efficient IoT framework - Bootstrapping • Primary Service (before deployment) • Preconfigured endpoint / discoverable • Provides routes to other basic services - Access control - Configuration - Device manager • Accept service replication [robustness and scalability] 24

  25. R ESEARCH Efficient IoT framework - Device manager • OMA LWM2M-based • Provide relevant information of the Nodes: - Serial number - Endpoints - Model number - Firmware version 25

  26. R ESEARCH Efficient IoT framework - Configuration • Service-Producer - Services configuration - Actuators configuration - Sensors configuration • Service-Consumer - Services to use - How to use the services (type of access, semantics,…) 26

  27. R ESEARCH Efficient IoT framework - Security • The framework is not dependent of one specific technology: - IPsec + IKEv2 - Standard - Custom • An energy consumption profile is needed 27

  28. C ASE STUDIES Characteristics • Condition monitoring: - Wheel-loader - Rock bolts • The use of wires is problematic: - Wireless communication - Batteries 28

  29. C ASE STUDIES Mobile Machinery Monitoring 29

  30. C ASE STUDIES Mobile Machinery Monitoring ) Period)covered:)) ) ) From)month)13)))))))))))))))))))))to))month)24) ) Task)leader:)))PerNErik)Larsson,)SKF))))))))))))))))))))))))) per-erik.larsson@skf.com ! 30

  31. C ASE STUDIES Smart rock bolt Standard rock bolt • 1900s technology • Reinforce critical structures 31

  32. C ASE STUDIES Smart rock bolt 32

  33. R ESULTS Energy consumption by service 2000 @ 96 MHz @ 48 MHz 1500 1000 Energy consumption (mJ) 500 35 30 25 20 15 10 5 0 IKE_INIT IKE_AUTH Bootstrapping Configuration Authentication Authorization Manager Services 33

  34. R ESULTS Delay by service @ 96 MHz 12000 @ 48 MHz 10000 8000 6000 4000 2000 Delay (ms) 200 150 100 50 0 IKE_INIT IKE_AUTH Bootstrapping Configuration Authentication Authorization Manager Services 34

  35. D ISCUSSION Limitations • Use of long timeouts to reduce the power consumption • Standard technologies - OMA LWM2M - IPSO Smart Objects - 6LoWPAN - Key negotiation mechanisms 35

  36. D ISCUSSION Limitations • Use of big timeouts to reduce the power consumption • Standard technologies - OMA LWM2M - IPSO Smart Objects - 6LoWPAN - Key negotiation mechanisms 36

  37. C ONCLUSIONS Research questions 1.Is it feasible to use IoT-SOA technology in WSANs for industrial applications? 1.What are the benefits of adding IoT technology to industrial WSANs? 2.Is it possible to increase interoperability while mitigating performance impact? 2.How can access to exposed IoT nodes be protected and controlled while maintaining performance? 3.How can zero-configuration operation be achieved for an IoT node? 37

  38. F UTURE WORK Access control • Accounting • Robust ticket generation (COSE-like) • CoAP-RADIUS reliability • Scalability analysis 38

  39. F UTURE WORK Efficient IoT framework • Efficiency - Security - Key negotiations - Run-time reconfiguration • Scalability • Quality of Service 39

  40. T HANKS TO

  41. DOCTORAL THESIS Efficient IoT Framework for Industrial Applications Pablo Puñal Pereira Industrial Electronics

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend