Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
100% found this document useful (1 vote)
33 views

Module 1

Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
33 views

Module 1

Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 65

Internet of Things

Module-1
What is The Internet of Things?
 Overview and Motivations
Examples of Applications,
IPV6 Role
 Areas of Development and Standardization
 Scope of the Present Investigation.
Internet of Things Definitions and frameworks-IoT Definitions
IoT Frameworks, Basic Nodal Capabilities.
Internet of Things Application Examples-Overview, Smart
Metering/Advanced Metering Infrastructure-Health/Body
Area Networks, City Automation, Automotive Applications,
Home Automation, Smart Cards, Tracking, Over The-Air-
Passive Surveillance/Ring of Steel, Control Application
Examples, Myriad Other Applications.
Overview and Motivations
IOT was coined by Kevin Ashton over a decade ago.

IOT is a new type of internet application that


endeavors to make the things information available on
global scale using the Internet as the underlying
connecting fabric.

The IOT has two attributes


Being an Internet application.
Dealing with things information.
TAXONOMY(grouping)
DIPP- Data Integration Point or Person- Point where
Administrative decisioning and/or accumulation takes place.

DEP- Data End Points- Devices where events are sensed ,


data are collected and/or actuation takes place.

Benefits of Standardization:
 Reduced Complexity of IOT deployments.
 Reduced Deployment time for new services.
 Lower Capital Requirements(CAPEX).
 Lower Operating Expenses(OPEX).
Applications of IOT
IPv6 Role
Some of the advantages of IPv6 include the following:

Scalability and expanded addressing capabilities

“Plug-and-play”

Security

Mobility
Some areas of active research include but are not limited
to the following

Standardization at all layers/domains


Architectures and middle wares for IoT integration
Protocols for smart things
 end-to-end/M2M protocols and standardization
Mobility management
 Cloud computing and things internetworking
Lightweight implementations of cryptographic stacks
End-to-end security capabilities for the things
Bootstrapping techniques
Routing protocols for the IoT
Global connectivity
Chapter -2
Internet of Things Definitions & Frameworks
Internet of Things is a twenty-first century
phenomenon in which physical consumer products
(meta products) connect to the web and start
communicating with each other by means of sensors
and actuators.

IoT spans a great range of applications. People bring


varied assumptions about what devices are ‘things’.
Most IoT devices have constraints but the nature of
constraints varies. IoT needs to be divided into
manageable topic areas.
ITU-T Views (International
Telecommunication Union)
View A: IoT is just a concept (conceptual aspects
of definition): the IoT does not refer to a network
infrastructure; the IoT is not a technical term but a
concept (or a phenomenon).

View B: IoT is an infrastructure: The IoT refers to


an infrastructure.
Working Definition
IOT is defined as broadly-deployed aggregate computing/communication
application and/or application-consumption system, that is deployed
over a local (L-IoT), metropolitan (M-IoT), regional (R-IoT), national
(N-IoT), or global (G-IoT) geography, consisting of:

 (i) dispersed instrumented objects (“things”) with embedded one or


two-way communications and some (or, at times, no) computing
capabilities,
 (ii) where objects are reachable over a variety of wireless or wired local
area and/or wide area networks, and,
 (iii) whose inbound data and/or outbound commands are pipelined to
or issued by a(n application) system with a (high) degree of (human or
computer-based) intelligence.
Sensors & Actuators
Sensors are active devices that measure some variable of the
natural or man-made environment (e.g., a building, an
assembly line, an industrial assemblage supporting a
process).

An actuator is a mechanized device of various sizes (from


ultra-small to very large) that accomplishes a specified
physical action, for example, controlling a mechanism or
system, opening or closing a valve, starting some kind or
rotary or linear motion, or initiating physical locomotion. An
actuator is the mechanism by which an entity acts upon an
environment.
Object
Objects have the following characteristics:
 have the ability to sense and/or actuate
 are generally small (but not always)
 have limited computing capabilities (but not always)
 are energy/power limited
 are connected to the physical world
 sometimes have intermittent connectivity
 are mobile (but not always)
 of interest to people
 managed by devices, not people (but not always)
Basic elements of M2M applications
IOT Frameworks
BASIC NODAL CAPABILITIES
Internet of Things Applications Examples
Grouping of Applications in M2M context
SMART METERING/ADVANCED METERING
INFRASTRUCTURE

Smart metering network enables a utility company to:


(i) Remotely connect or disconnect power to
individual customers.
(ii) remotely or automatically update the grid
configuration.
(iii) collect power consumption data in variable time
intervals, and
(iv) modulate customer loads automatically during
critical demand periods.
https://www.ceew.in/publications/what-smart-meters-c
an-tell-us
https://www.smartenergygb.org/en/about-smart-meters
BAN
https://www.popularmechanics.com/science/health/a26
801867/scientists-design-a-network-that-lives-inside-yo
ur-body/

https://www.youtube.com/watch?v=mlTuag3fPA0
To be effective and easily deployed, the HAN
communication network should preferably be based
on a network technology that:

(i) utilizes open standards


 (ii) is low cost
 (iii) consumes a minimum amount of energy
(iv) does not require extensive new infrastructure.
e-HEALTH/BODY AREA NETWORKS
Reduce the lag time between
the onset of medical symptoms
in an individual and the
diagnosis of the underlying
condition.

These applications make use of


one or more biosensors placed
on, or in, the human body,
enabling the collection of a
specified set of body’s
parameters to be transmitted
and then monitored remotely.
Examples of health care related sensors include, but are not limited to:

1. Glucose meter: A device that measures the approximate concentration of


glucose in the blood; it is used by chronic disease (e.g., diabetes) management
applications.

2. Pulse oximeter: A device that indirectly measures the amount of oxygen in a


patient’s blood (oxygen saturation (SpO2)).

3. Electrocardiograph (ECG): A device that records and measures the electrical


activity of the heart over time.

4. Social alarm devices: Devices that allow individuals to raise an alarm and
communicate with a caretaker when an emergency situation occurs; the caretaker
may be a monitoring center, a medical care team, or a family member; these
include devices fall detector and panic pendant/wrist transmitters.
Spectrum band (2360–2400 MHz) by allowing distinct
but compatible users to share. The proposed new
spectrum allocation can:

Provide more reliable service and increased capacity for


the use of MBANs in hospital waiting rooms, elevator
lobbies, preparatory areas, and other high density
settings.
 Greatly improve the quality of patient care with more
effective monitoring, catching patients before critical
stages, improving patient outcomes, and ultimately
saving lives.
Decrease expenses while increasing competition and
innovation, easing entry for companies that are
developing new wireless medical devices.
Chronic diseases typically require some kind of health
monitoring, especially in advanced stages of the
disease progression. Chronic disease monitoring
encompasses the following:

Episodic patient monitoring.


Continuous patient monitoring.
Patient alarm monitoring.
Personal fitness monitoring includes

 Monitoring and tracking fitness level and


 Personalized fitness schedule scenario:

Personal wellness monitoring includes the


following:

Senior activity monitoring scenario.


Safety monitoring scenario.
CITY AUTOMATION
Some applications in this domain include but are not
limited to the following:

 Traffic flow management system in combination with


dynamic traffic light control
 Street light control
 Passenger information system for public transportation
 Passive surveillance
AUTOMOTIVE APPLICATIONS
bCall (breakdown call).
Stolen vehicle tracking (SVT).
Fleet management
Remote diagnostics:
Maintenance minder
Health check
Fault triggered
Enhanced bCall
bCall (breakdown call).
https://www.youtube.com/watch?v=mNjbgeYRpfg

bCall is short for breakdown call, which will allow


drivers to call for 24-hour roadside assistance in the
event that the car breaks down. iCall, short for
information call, will provide artificial intelligence
based support, such as driving routes and restaurant
locations.
Stolen vehicle tracking (SVT).
 https://www.youtube.com/watch?v=UXKrQH35SUw

 The goal of a SVT system is to facilitate the recovery of a vehicle in case of theft.
The SVT service provider periodically requests location data from the Telematics
Control Unit (TCU) in the vehicle and interacts with the police.

 The TCU may also be capable of sending out automatic theft alerts based on
vehicle intrusion or illegal movement. The TCU may also be linked to the Engine
Management System (EMS) to enable immobilization or speed degradation by
remote command.

 Vehicles contain embedded M2M devices that can interface with location-
determination technology and can communicate via a mobile cellular network to
an entity (server) in the M2M core.

 The M2M devices will communicate directly with the telecommunication network;
the M2M devices will interface with location-determination technology such as
standalone GPS, or network-based mechanisms such as assisted GPS, Cell-ID, and
so on
Fleet management
Fleet management is the processes that fleet
managers utilise to manage all fleet and asset
information, from acquisition through to disposal.
This enables companies to reduce costs, improve
efficiency and ensure compliance across an
entire fleet operation.
https://www.mikealbert.com/blog/what-is-vehicle-fle
et-management
Vehicle-to-infrastructure communications
HOME AUTOMATION
Biometrics

SMART CARDS Cybersecurity


Enterprise ID
Government ID
ePassport
FIPS 201
Real ID
Passport Card/WHTI
Healthcare
Identity
Logical access
Market research
Mobile telecommunications
Network security
Payments
POS
Contactless payments
EMV payments
Mobile payments/NFC
Transportation payments
3 Basic technologies considered for
Physical Access Control
125kHZ read only technology-RFID

Contactless SC Technology ISO/IEC 14443

Contactless SC Technology ISO/IEC 15693– 13.56 MHZ


SC/UICC universal integrated circuit card
Device Management
Digital Rights Management and Distributed Applications–
Media rights content.
Multimedia File Management.
Man Machine Interface.
Real time Multimedia data encryption/decryption.
Storage of Terminal Applications.
Direct and indirect UICC connection.
Web Server on SC.
High Price Ticketing Scenario.
Payment Application.
Loyalty Application.
Health care Application
Tracking
Emergency call
Fleet Management.
Theft Tracking.
Person/Animal Protection Tracking.
Object Protection /Tracking
OVER THE AIR PASSIVE
SURVEILLANCE/RING OF STEEL
High Resolution digital video surveillance.
License Plate Recognition technology.
Facial Recognition
Traffic light cameras
Gunshot Detection Systems.
Air Surveillance with drones.

Surveillance cameras are video cameras used for the purpose of observing an area.
They are often connected to a recording device or IP network, and may be watched by
a security guard or law enforcement officer.

Open Air- Public Domain


CONTROL APPLICATION EXAMPLES
Vending Machines.

Production Machines.
END OF MODULE

You might also like