Challenges of the io t v1

Post on 16-Jul-2015

97 views 0 download

Tags:

transcript

Challenges for the Internet of

Things

Jeroen Hoebeke, www.ibcn.intec.ugent.be

Internet Based Communication Networks and Services (IBCN)

Department of Information Technology (INTEC)

Ghent University - iMinds

7/12/2014 1

MAKING IoT HAPPENKey challenges (- enablers)

Source: white paper arm.com / freescale.com

CloudBig data

analytics

Connectivity: local + global (wireless)

Ingredients: Cloud-based IoT system

Embedded,

low-power

Services/user

interactions

Security, trust…

Interoperability?

Manu-factoring

Health-care

Domainspecific

applica ons

Domainspecific

devices

Proprietaryver calsolu ons:proprietaryprotocols&

technologies

TODAY

IP connectivity

Manu-factoring

Health-care

Application enablement

Reconfigurable technologies

TOMORROW

Open standards

From closed vertical solutions to open horizontal solutions

Easy support of wide diversity of IoT applications

Example

Open standards for

constrained devices

92KB flash

8KB RAM

802.15.4

6LoWPAN

UDP

CoAP IETF

CoRE

IETF RPL

IETF 6LoWPAN

IEEECLIENT

SERVER

/s/t 22.5°C

200 OK

text/plain

22.5°CGET /s/t

Web of Things

Example

Open standards for

constrained devices

92KB flash

8KB RAM

802.15.4

6LoWPAN

UDP

CoAP IETF

CoRE

IETF RPL

IETF 6LoWPAN

IEEECLIENT

SERVER

/s/t 22.5°C

200 OK

text/plain

22.5°CGET /s/t

7.2 6.8 7.6

World Population

Rapid Adoption rate of digital

infrastructure:

5X faster than electricity and

telephony

50 Billion “Smart Objects”

50

2010 2015 2020

0

40

30

20

10

Billi

on

s o

f D

ev

ice

s

25

12.5

Inflection point

Timeline

©2013Ciscoand/oritsaffiliates.Allrightsreserved.

©2013Ciscoand/oritsaffiliates.Allrightsreserved.

Deployment &

operation?

Plug & play•Easy deployment (auto-configuration, assisted using e.g. wearable

technologies…)

•Self-management, self-diagnostics

•Robustness at scale (e.g. reliable wireless connectivity)

Distributed intelligence to handle huge amounts of traffic

© 2013 Cisco and/or its affiliates. All rights reserved.

Traditional Computing Model

Infinite,bandwidth,

0 delay

Device

Fog

Datacenter/Cloud

Assumes limited bandwidth,

variable delay, and intermittent

connectivity

Assumes limited bandwidth,

variable delay, and

intermittent connectivity

IoE Computing Model

Distributed intelligence

Datacenter/Cloud

Endpoint

Security

Security – privacy – data protection

Technological aspect:

security protocols exist / are being designed• E.g. IETF is very active on security for constrained devices

• Open challenges: deal with limited capabilities, devices can

be lost/stolen/sold/have finite life, scale, across systems

Human/legal aspect• Apply security solutions

(e.g. default router password)

• How to control your data

(e.g. Facebook data)

From data to

knowledge

Turning data into knowledge

CoAP-enabled sensors

Tagging + semantics

Reasoning on sensor and other data

IoT – Human interactions

IoT: many constrained,

embedded devices

(sensors, actuators)

without (graphical) user

interface

Facilitate IoT interactions through vision

WearablesInteractive, embedded

screens with content

adapting to context

?

Jeroen Hoebeke

jeroen.hoebeke@intec.ugent.be

www.ibcn.intec.ugent.be

www.iminds.be

Join iMinds