www.thalesgroup.comOPEN
Information Fusion & Reasoning in IoT
Gregor Pavlin, Thomas QuillinanThales Research and Technology, Netherlands.
This document may not be reproduced, modified, adapted, published,
translated, in any way, in whole or in part or disclosed to a third party
without the prior written consent of Thales - © Thales 2014 All rights reserved.2
OPEN
What is the “Internet of Things”
▌ “The Internet of Things, refers to the growing range of Internet-connected
devices that capture or generate an enormous amount of information
every day.”
- IBM Watson
▌ “The vast network of devices connected to the Internet, including smart
phones and tablets and almost anything with a sensor on it… These
“things” collect and exchange data.”
- SAP
This document may not be reproduced, modified, adapted, published,
translated, in any way, in whole or in part or disclosed to a third party
without the prior written consent of Thales - © Thales 2014 All rights reserved.3
OPEN
This document may not be reproduced, modified, adapted, published,
translated, in any way, in whole or in part or disclosed to a third party
without the prior written consent of Thales - © Thales 2014 All rights reserved.4
OPEN
State of the art: Examples
This document may not be reproduced, modified, adapted, published,
translated, in any way, in whole or in part or disclosed to a third party
without the prior written consent of Thales - © Thales 2014 All rights reserved.5
OPEN
Nest
stovepipeOther
stovepipes
Information stovepipes: Limited use
Belkin Wemo
stovepipeNetatmo
stovepipe
Philips Hue
stovepipeHomeWizard
stovepipe
This document may not be reproduced, modified, adapted, published,
translated, in any way, in whole or in part or disclosed to a third party
without the prior written consent of Thales - © Thales 2014 All rights reserved.6
OPEN
Security Concerns (from User Perspective)
▌ Information Leakage
When is my house empty?
How many IoT devices are in that house?
▌ Data Security:
How can I use my data?
Who owns the information?
Where is my data stored?
- The “Cloud”!
- … and probably “backed up” somewhere on the darknet
This document may not be reproduced, modified, adapted, published,
translated, in any way, in whole or in part or disclosed to a third party
without the prior written consent of Thales - © Thales 2014 All rights reserved.7
OPEN
Next step: Smart IoT
▌ Incorporate non-trivial algorithms into IoT environments
Exploit correlated data from disparate sensors.
Centralized data collection and processing are not acceptable.
▌ Data needs to be available on a need-to-share basis
▌ Data security is vital
▌ Going beyond single-vendor platforms to multi-vendor ecosystems
Tools that support developer ecosystems.
Efficient creation of smart services and new applications.
Simplified interoperability and information management.
This document may not be reproduced, modified, adapted, published,
translated, in any way, in whole or in part or disclosed to a third party
without the prior written consent of Thales - © Thales 2014 All rights reserved.8
OPEN
Next-generation IoT: Exploit correlated sources
Information management
and processing layer
Other
stovepipes
Belkin Wemo
stovepipeNetatmo
stovepipe
Philips Hue
stovepipeHomeWizard
stovepipeNest
stovepipe
eHealth SurveillanceHome
automationEnergy manag.
This document may not be reproduced, modified, adapted, published,
translated, in any way, in whole or in part or disclosed to a third party
without the prior written consent of Thales - © Thales 2014 All rights reserved.9
OPEN
Example: Tracking in Urban Environments
Estimate whereabouts of a vehicle/person produce a heat-map indicating
possible locations (the warmer the color, the more likely is the presence of the target.
Challenges: Rely on cameras (LPR), intelligence from police officers, GSM, etc.
This document may not be reproduced, modified, adapted, published,
translated, in any way, in whole or in part or disclosed to a third party
without the prior written consent of Thales - © Thales 2014 All rights reserved.10
OPEN
Example: Tracking in Urban Environments
Telecom company provides GSM localization
Video analytics on a big-data system (simple cams, advanced back-end):
• License plate recognition in video streams
• Car recognition in video streams
Embedded video analytics (smart cam):
• License plate recognition• Car recognition
Police agent reports the sighting of a car via his tablet (geo-localized message)
This document may not be reproduced, modified, adapted, published,
translated, in any way, in whole or in part or disclosed to a third party
without the prior written consent of Thales - © Thales 2014 All rights reserved.11
OPEN
Example: Tracking in Urban Environments
Tracking
app
▌ The dedicated tracker process looks
for all data sources that are relevant for the tracking of the car.
▌ Track retrospectively indicate the
relevant sources.
This document may not be reproduced, modified, adapted, published,
translated, in any way, in whole or in part or disclosed to a third party
without the prior written consent of Thales - © Thales 2014 All rights reserved.12
OPEN
Source Interfaces
Source Interfaces
Example: Multiple Processing Components
Context Bank
Reports about traffic jams
Obstacles
Actions
GIS Roads database
Tracker Runtime
Environment
Cam 1
Database
Tracking
Process
Radar 1
Cam 2
HUMINT
Mobility Vehicle type
X
Mobility Vehicle type
Y
This document may not be reproduced, modified, adapted, published,
translated, in any way, in whole or in part or disclosed to a third party
without the prior written consent of Thales - © Thales 2014 All rights reserved.13
OPEN
Source Interfaces
Thales Approach: A Secure Lightweight Info Management Layer
Secure Process Integration Environment: Service Proxies
Context Bank
Reports about traffic jams
Obstacles
Actions
GIS Roads database
Tracker Runtime Environment
Source Interfaces
Cam 2
Database
Tracking
Process
Radar 1
Cam 1
HUMINT
Mobility Vehicle type X
Mobility Vehicle type Y
Fusion/analysis/sensing functions as services
• Compact representation of services
• Capability + context
• Info flow control
• Interoperability
• Non intrusive w.r.t. legacy systems
This document may not be reproduced, modified, adapted, published,
translated, in any way, in whole or in part or disclosed to a third party
without the prior written consent of Thales - © Thales 2014 All rights reserved.14
OPEN
Preventing Poaching in South Africa (with CSIR & Uni of Pretoria)
This document may not be reproduced, modified, adapted, published,
translated, in any way, in whole or in part or disclosed to a third party
without the prior written consent of Thales - © Thales 2014 All rights reserved.15
OPEN
Switch
Smart
Lock
Security
Home Automation
Elderly Care
Smart Energy
Smart
Lock
Switch
Switch
This document may not be reproduced, modified, adapted, published,
translated, in any way, in whole or in part or disclosed to a third party
without the prior written consent of Thales - © Thales 2014 All rights reserved.16
OPEN
Summary
▌ Next Gen IOT applications
Incorporate non-trivial algorithms into IoT environments.
Decentralized processing.
Interoperability.
Data security is vital.
▌ Thales Secure Integration Framework
Simplified interoperability and information management.
Security is in the DNA.
Lightweight, non-intrusive w.r.t. legacy systems.
Tools that support developer ecosystems.
This document may not be reproduced, modified, adapted, published,
translated, in any way, in whole or in part or disclosed to a third party
without the prior written consent of Thales - © Thales 2014 All rights reserved.17
OPEN