View
97
Download
0
Tags:
Embed Size (px)
Citation preview
Challenges for the Internet of
Things
Jeroen Hoebeke, www.ibcn.intec.ugent.be
Internet Based Communication Networks and Services (IBCN)
Department of Information Technology (INTEC)
Ghent University - iMinds
7/12/2014 1
MAKING IoT HAPPENKey challenges (- enablers)
Source: white paper arm.com / freescale.com
CloudBig data
analytics
Connectivity: local + global (wireless)
Ingredients: Cloud-based IoT system
Embedded,
low-power
Services/user
interactions
Security, trust…
Interoperability?
Manu-factoring
Health-care
…
Domainspecific
applica ons
Domainspecific
devices
…
Proprietaryver calsolu ons:proprietaryprotocols&
technologies
TODAY
IP connectivity
Manu-factoring
Health-care
…
Application enablement
Reconfigurable technologies
…
TOMORROW
Open standards
From closed vertical solutions to open horizontal solutions
Easy support of wide diversity of IoT applications
Example
Open standards for
constrained devices
92KB flash
8KB RAM
802.15.4
6LoWPAN
UDP
CoAP IETF
CoRE
IETF RPL
IETF 6LoWPAN
IEEECLIENT
SERVER
/s/t 22.5°C
200 OK
text/plain
22.5°CGET /s/t
Web of Things
Example
Open standards for
constrained devices
92KB flash
8KB RAM
802.15.4
6LoWPAN
UDP
CoAP IETF
CoRE
IETF RPL
IETF 6LoWPAN
IEEECLIENT
SERVER
/s/t 22.5°C
200 OK
text/plain
22.5°CGET /s/t
7.2 6.8 7.6
World Population
Rapid Adoption rate of digital
infrastructure:
5X faster than electricity and
telephony
50 Billion “Smart Objects”
50
2010 2015 2020
0
40
30
20
10
Billi
on
s o
f D
ev
ice
s
25
12.5
Inflection point
Timeline
©2013Ciscoand/oritsaffiliates.Allrightsreserved.
©2013Ciscoand/oritsaffiliates.Allrightsreserved.
Deployment &
operation?
Plug & play•Easy deployment (auto-configuration, assisted using e.g. wearable
technologies…)
•Self-management, self-diagnostics
•Robustness at scale (e.g. reliable wireless connectivity)
Distributed intelligence to handle huge amounts of traffic
© 2013 Cisco and/or its affiliates. All rights reserved.
Traditional Computing Model
Infinite,bandwidth,
0 delay
Device
Fog
Datacenter/Cloud
Assumes limited bandwidth,
variable delay, and intermittent
connectivity
Assumes limited bandwidth,
variable delay, and
intermittent connectivity
IoE Computing Model
Distributed intelligence
Datacenter/Cloud
Endpoint
Security
Security – privacy – data protection
Technological aspect:
security protocols exist / are being designed• E.g. IETF is very active on security for constrained devices
• Open challenges: deal with limited capabilities, devices can
be lost/stolen/sold/have finite life, scale, across systems
Human/legal aspect• Apply security solutions
(e.g. default router password)
• How to control your data
(e.g. Facebook data)
From data to
knowledge
Turning data into knowledge
CoAP-enabled sensors
Tagging + semantics
Reasoning on sensor and other data
IoT – Human interactions
IoT: many constrained,
embedded devices
(sensors, actuators)
without (graphical) user
interface
Facilitate IoT interactions through vision
WearablesInteractive, embedded
screens with content
adapting to context
?