Professional Documents
Culture Documents
Week1 Introduction
Week1 Introduction
CSE291
Baris
Aksanli
&
Tajana
Simunic
Rosing
CSE291:
Internet
of
Things
h@p://cseweb.ucsd.edu/classes/wi16/cse291-‐c/
3
Topics
to
be
covered
• Overview
of
IoT
• Hardware
– technologies,
novel
circuits,
plaaorms
and
communicaPon
systems
• So[ware
– formalisms,
programming
languages
and
tools,
middleware
• Big
data
and
IoT
• ApplicaPons
and
effects
on
human
behavior
• IoT
industry
– Industry
soluPons,
economic
implicaPons
• Security
and
privacy
Overview
of
IoT
• IntroducPon
to
IoT
• Enabling
technologies
• Open
problems
and
future
challenges
• ApplicaPons
5
What
is
IoT?
6
ConnecPon
of
MulPple
Visions
7
Source: Atzori et al. 2010
IoT
DefiniPons
• The
Internet
of
Things,
also
called
The
Internet
of
Objects,
refers
to
a
wireless
network
between
objects,
usually
the
network
will
be
wireless
and
self-‐configuring,
such
as
household
appliances.
(Wikipedia)
12
Source: ZTE
Networking
and
CommunicaPon
19
Middleware
• Middleware
is
a
so/ware
layer
that
stands
between
the
networked
opera4ng
system
and
the
applica4on
and
provides
well
known
reusable
solu4ons
to
frequently
encountered
problems
like
heterogeneity,
interoperability,
security,
dependability
[Issarny,
2008]
23
StandardizaPon
• Several
standardizaPon
efforts
but
not
integrated
in
a
comprehensive
framework
• Open
Interconnect
ConsorPum:
Atmell,
Dell,
Intel,
Samsung
and
Wind
River
• Industrial
Internet
ConsorPum:
Intel,
Cisco,
GE,
IBM
• AllSeen
Alliance:
Led
by
Qualcomm,
many
others
24
Scalability
Encapsulation of RFID
message into an IPv6
packet.
Source: Atzori et al. (2010)
26
New
Traffic
to
Handle
• The
characterisPcs
of
the
smart
objects
traffic
in
the
IoT
is
sPll
not
known
– Important
à
basis
for
the
design
of
the
network
infrastructures
and
protocols
• Wireless
sensor
networks
(WSNs)
traffic
characterizaPon
– Strongly
depend
on
the
applicaPon
scenario
– Problems
arise
when
WSNs
become
part
of
the
overall
Internet
– The
Internet
will
be
traversed
by
a
large
amount
of
data
generated
by
sensor
networks
deployed
for
heterogeneous
purposes
à
extremely
different
traffic
characterisPcs
– Required
to
devise
good
soluPons
for
supporPng
quality
of
service
27
Security
• The
components
spend
most
of
the
Pme
una@ended
– It
is
easy
to
physically
a@ack
them
• IoT
components
are
characterized
by
low
capabiliPes
in
terms
of
both
energy
and
compuPng
resources
– They
can’t
implement
complex
schemes
supporPng
security
• AuthenPcaPon
problem
– Proxy
a@ack,
a.k.a.
man
in
the
middle
a@ack
problem
• Data
integrity
– Data
should
not
be
modified
without
the
system
detecPng
it
– A@acks
on
the
node
• Memory
protecPon
– A@acks
over
the
network
• Keyed-‐Hash
Message
Auth.
Code
28
Man in the middle attack Source: Atzori et al. (2010)
Privacy
• How
is
it
different
than
tradiPonal
privacy?
– LegislaPve
issues
– Ethics
issues
• Easy
for
a
person
to
get
involved
in
IoT
even
if
he/she
does
not
know
• Data
can
be
stored
indefinitely
• Current
soluPons
are
not
enough
– EncrypPon,
pseudo-‐noise
signal,
privacy
broker
29
Putng
it
all
together
• Environmental applicaPon
• Electrochemical
sensors,
microcontroller
for
data
collecPon
and
transmission
to
an
Android
app
36
Example
TransportaPon
Scenarios
1. A
network
of
sensors
in
a
vehicle
can
interact
with
its
surroundings
to
provide
informaPon
– Local
roads,
weather
and
traffic
condiPons
to
the
car
driver
– AdapPve
drive
systems
to
respond
accordingly
2. AutomaPc
acPvaPon
of
braking
systems
or
speed
control
via
fuel
management
systems.
– CondiPon
and
event
detecPon
sensors
can
acPvate
systems
to
maintain
driver
and
passenger
comfort
and
safety
through
the
use
of
airbags
and
seatbelt
pre-‐tensioning
3. Sensors
for
faPgue
and
mood
monitoring
based
on
driving
condiPons,
driver
behavior
and
facial
indicators
– Ensuring
safe
driving
by
acPvaPng
warning
systems
or
directly
controlling
the
vehicle
Source: Qian Zhang. Lecture notes. 2013 37
Smart
Home
ApplicaPons
40