Professional Documents
Culture Documents
IOT Notes
IOT Notes
IOT: Network of physical objects (clearly identified elements) embedded with sensors,
actuators & software to sense, communicate & interact with each other and with the
external environment through ubiquitous computing to achieve some object
1. Networked sensors/actuactors
2. Internet gateways, A/D and data aggregation & filteration
3. Edge computing for analytics, preprocessing and critical actions
4. Data center for big data and archive
Lecture 2: Overview of Ref. Model: 5 Layers, the 6 Elements & 8
QOS criteria
A vertical market is a market in which businesses specialize in serving a specific industry or
group of customers with specialized needs.
A horizontal market, on the other hand, is a market in which businesses provide products or
services that can be used by a wide variety of industries or customers.
o Smart objects (Sensors/actuators) are the vertical market (domain specific)
o Analytics & ubiquity (big data, cloud) are horizontal market (independent services)
o communication between active readers and passive tags or two active readers can
occur.
6. Semantic: use data to make right and senseful decisions to provide right service
QOS criteria (how we measure how good is the IOT service?)
ARM PM SIS
1. Availability
2. Reliability: refers to the proper working of the system based on its specification. (related to
availability)
3. Mobility
4. Performance
5. Management Must have methods and protocols I place to be able to manage exp. growth in IOT
devices
6. Scalability
7. Interoperability: heterogenous devices and protocols
8. Security & Privacy
Lecture 3: Perception/Object Layer: Sensors & Actuators
Two main requirements for sensors: Sensing & Addressing
“Things” in IoT are sensing and addressing.
Sensing is essential to identify and collect key parameters for analysis,
addressing is necessary to uniquely identify things over the Internet.
A sensor is a device (typically electronic) that detects events or changes in its physical environment
and provides a corresponding output.
Simple (collect-transmit)
smart (IOT Sensing device need sensor, mc, connectivity)
Proprietary (closed system)
Nonproprietary (ip-based)
Autonomous (self-directed) work on their own and learn
Non autonomous (user controlled) programed by user
Characteristics
Must be small
low power
long battery
fast processing
sensitive
accurate
reliable
To understand this, imagine a simple temperature sensor that measures the temperature of
a room. If the temperature is slowly rising, the sensor will detect this and produce an
output that corresponds to the current temperature. However, if the temperature starts to
drop again, the sensor will continue to produce the same output for a short time, before
eventually adjusting to the new lower temperature
They take in analog inputs as electrical signals, so must need ADC to convert to digital signals
Sensors
1. There are four types of temperature sensors:
Thermocouple Sensors :
o aging because of harsh environment.
Thermistors
o general purpose
Semiconductor Sensors Modern semiconductor temperature sensors offer high accuracy and
high sensitivity
5. Flow sensor
Used to detect rate of fluid flow in system
Detect flow leaks & blockages
Measure flow of heat
o Can be encrypted
Disadvantages
o Can be jammed
Uses
o Tracking
o healthcare
o access control
o identification
14. LIDAR Light Detection and Ranging
used to measure space or time
Emit laser and reflect back (roundtrip) (time of flight)
Very long range: used in exploring earth
An actuator is a type of motor that takes action in a system. It takes a data or energy and converts
the data/energy to motion to control a system.
2) Credential Management
low weight security credentials management
Current credentials management (manual pre configuration) mechanisms are not viable in IOT,
why?
o many devices
o limitations in UI of constrained devices
o cannot use pre-shared keys anymore not lightweight
3) Control Plane
Uses protocols to maintain state of nodes.
When number of nodes increase, the amount of state data increases and the messages required
for keeping state table synced becomes very big
Trying to adapt/scale protocol leads to worse network response
for IOT we need more flexible and elastic control plane
4) Wireless Spectrum
We need wireless connection for IOT devices
increasing number of devices whilst the wireless band spectrum is finite and scarce
3. Determinism
Given system state, event happens, we can predict output system state
Prediction of network performance (latency, reliability)
we can give SLAs and guarantee QOS if we have determinism
Important for IOT because of critical use cases
Reasonable model: suffice for the target use case of networking
5. Application Interoperability
We cannot have expensive closed nature
All application entities
o must be abstract
o have APIs to support semantic interoperability
Semantic interoperability all data can be accessed & be interpreted by all devices/application
entities unambiguously
o It is basis of IOT in sharing data
At base of semantic interoperability is format/structure of data exchange (syntactic/structure
interoperability)
Lecture 4 Part 2: IOT Protocol Stack
Link Layer (DTAS)
We have 4 challenges
1. Device characteristics
heterogeneous nodes need low power consumption
80% energy wasted in retransmission of MAC layer
2. Traffic characteristics
relaxed requirements vs tight requirements (packet loss, availability, latency)
short burst vs long-tailed
3. Access Characteristic
Wireless vs wired
Long vs short range
4. Scalability
We said we have 4 main concerns for scalability:
Addressing, Wireless Spectrum, Control Plane, Credential Mgmt.
Internet Layer
Use Low-power Lossy Network (LLNs): thousands of constrained devices
5 challenges:
1. minimize amount of state needed (control plane)
2. optimize energy (sleep-wake cycle)
3. Restrict frame size
4. Reliability
5. traffic patterns (p2p p2m m2p unicast multicast)
Application protocol
used to handle communication
Communication paradigm
can be (
1. request-response: 2-way (reliable with ACK)
2. publish-subscribe: 1-way
3. block-non-block
QOS (RTAU)
1. reliable
2. available
3. timely
4. utilize
RESTFul
Lecture 5: Edge Computing
Edge Computing: distributed computing in a location that is close or at source where the data is
generated by the IoT (i.e., sensors) without having to send data to cloud
Near-edge: This is the layer closer to the cloud. Includes edge servers that provide data processing and
analytics at the local level without needing to resort to the WAN. (e.g., physical factory local server)
Far-edge: The layer farthest from the cloud. Includes the edge devices (sensors) that have some
processing and data storage/caching capabilities.
1. Reduced latency: when critical actions and low latency is needed by avoiding network hops
2. Reduced Cost: no need to bother cloud with trivial data processing
3. Reduced Security & privacy concerns: comply with regulations & less chance for attacks with
less data in transit
4. Resilient Computing: can work even in worse conditions where network performance is bad
(can use local caching)
1. Automation
2. AR/VR
3. PAN aggregation (non-IP devices)
4. Data processing
5. Resilient Fleet Management
Ambient Computing: Computing environment where edge, IOT, AI, AR, etc. are used to simulate natural
computing that is seamless without actual usage of a computer (Google Home, CityTouch, Synth Sensors) (IEFI)
Multi-access Edge Computing (MEC)/Mobile Edge computing: It is like FOG Computing, where the
nodes exist at the edge of local network and the WAN and connect them in low latency (like 5G and
RAN) and act as a gateway between local and WAN
Cloudlets: small-scale cloud data center. Can lower latency and overall pressure on centralized cloud.
Fog Computing: architecture of distributed cloud services/Layer that exist between edge layer and cloud
layer. They can be abstracted as a set of graphically distributed cloud servers that act as one cloud
server
Lecture 6: Fog Computing
Cloud Computing: A model that provides shared pool of compute, network and storage resources with
on-demand access using networks & virtualization (can be provisioned and released quickly)
Fog Computing: architecture of distributed cloud services/Layer that exist between edge layer and cloud
layer. They can be abstracted as a set of graphically distributed cloud servers that act as one cloud
server
1. Data Deluge: More data is generated that can be managed & analyzed
2. Rapid Mobility: Edge nodes are moving through space causing worse network conditions (Resiliency)
a. Physical mobility: embed resources in the edge node
b. Virtual mobility: allow close proximity to fog servers by following the node and connecting
to closest fog server
3. Reliable Control: Constraint devices offload highly intensive computations for control decisions but
with low latency
4. Data Management & Analytics: High footprint applications require real-time analytics within
context
1) Mapping target VM
a. Cluster > zone/pod > servers
b. Know external IP maps to which cluster, then rent VM and query DNS for internal IP to
find server
2) Malicious VM placement
a. trace route to server of VM, until no hops and on same server
3) Cross-VM data leakage
2- VM migration attack
1) Control plane attacks: attack migration module
a. Migration flooding DOS
b. False Resource advertising
2) Data plane attacks: attack network links
a. Sniffing
b. Man-in-the-middle
4- VM escape attack
Can get to hardware layer and execute commands on any VM in hypervisor layer
5- Insider attack
Homomorphic Encryption: performing operations on encrypted data yields same results when
decrypted as performing on unencrypted data
Fog Domain Attacks & Countermeasures
Same as previous PLUS +
5. Privacy Issues
Tracking of users and their edge devices (obfuscator)
Sensing Domain Attacks & Countermeasures
1. Jamming: Service disruption
Types
Ways of jamming
Ways of stopping
4. Sinkhole: all edge objects forward packets THROUGH one malicious obj
Fix by intrusion detection system
Future?
Lightweight crypto & networking
Digital forensics (invade privacy)
Focus on fog
Collaborate with all domains
Lecture 8: Blockchain
Blockchain: A distributed, decentralized & immutable ledger among all users (uses hashes & time
stamps)
Characteristics of Blockchain
1. Decentralized
2. Immutable
3. Works on consensus
4. Trustless
5. History
Terminologies of Blockchain
1. Node
2. Ledger
3. Mining: process of generating new block using proof-of-work
4. Consensus: algorithm to trust or distrust a new block in order to sync all users
5. Cryptocurrency
6. Decentralized Application
7. Secure Hash Function: one-way hash function
8. Merkle Tree Root: result of all leaves hashed together
1. Version
2. Previous block hash
3. Merke root hash To calculate the hash, three inputs are used:
4. Timestamp 1. previous block hash,
2. the Merkle root hash,
5. Bits
3. and the nonce.
6. Nonce: random number
7. Transaction Count