Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 41

Internet of Things (IoT)

(Lecture 3)
Fundamentals of IoT

Nafaa Jabeur
(From several sources)
• How does the fridge know that its owner is leaving?

• How does the fridge know


that there is no milk?

• How does the fridge


make its decisions?

• How does the fridge


communicate with its owner?
Thanks to continuous progress on mobile and
ubiquitous computing as well as
miniaturization and networking capabilities:
Everything is connected
Everything generates data
Everything is programmable
Everything can be automated
Everything needs to be secured
Everything is Connected
Digital Transformation

Modern digital networks make all of this possible


Digital transformation is the application of digital
technology to provide the stage for business and industry
to innovate
Everything is Connected
Move from Internet of People to Internet of Things

Internet appears everywhere in the world  Internet of Things is a plan to connect things
 It is primarily connecting people also using the same medium
Everything is Connected
Drivers of Digital Transformation
Impact of Digital Transformation
Everything is Connected

ECG sensor

Internet
Motion sensor

Connecting People to Things


Motion sensor
Motion sensor
Everything is Connected
IoT: Things connecting with Things
Everything is Connected
Internet of Things - Definition
 A global infrastructure for the
information society, enabling
advanced services by interconnecting
(physical and virtual) things based on
existing and evolving interoperable
information and communication • The IoT is the connection of millions of smart devices and
technologies sensors connected to the Internet
• Previously inanimate objects such as doorknobs or light
bulbs can now be equipped with an intelligent sensors
that can collect and transfer data to a network
• Rapid expansion: An estimated 3 million new devices are
connected to the Internet each month
Everything is Connected
Internet of Things - Definition
Physical object (“thing”)
+
Controller (“brain”)
+
Sensors
+
Actuators
+
Networks (Internet)
Everything is Connected
Internet of Things evolution
Everything is Connected
Networking is the Foundation
 Fifty billion things provide trillions of gigabytes
of data
 Networks provide the foundation for the Internet
and the digitized world
 Networks can range from simple networks
consisting of two computers to networks connecting
millions of devices
 Types of networks: WAN, LAN, WSN, BSN, …

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
Everything Generates Data
Sources of Information  Data originates from sensors and anything that has
been scanned, entered, and released to the Internet
 Collected data can be categorized as structured or
unstructured
 Structured data is created by applications that use
“fixed” format input such as spreadsheets
 Unstructured data is generated in a “freeform” style
such as audio, video, web pages, and tweets
 Examples of tools to prepare unstructured data for
processing are:
Increasingly huge volumes • “Web scraping” tools automatically extract data from
of data … moving toward HTML pages
• RESTful application program interfaces (APIs)
Big Data
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
Everything Generates Data
What is Big Data?  Data is information that comes from a variety of sources,
such as people, pictures, text, sensors, web sites and
technology devices
 Three characteristics that indicate an organization may be
dealing with Big Data:
• A large amount of data that increasingly requires more storage
space (volume).
• An amount of data that is growing exponentially fast (velocity).
• Data that is generated in different formats (variety).
 Examples of data amounts collected by sensors:
• One autonomous car can generate 4,000 gigabits (Gb) of data
per day.
• One smart connected home can produce as much as 1
gigabyte (GB) of information a week.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Everything Generates Data
What are the Challenges of Big Data?
 IBM’s Big Data estimates conclude that
“each day we create 2.5 quintillion
bytes of data”.
 Five major storage problems with Big
Data:
• Management
• Security
• Redundancy
• Analytics
• Access

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
Everything is programmable
 Increasing storage space and processing capabilities
 Enhanced communication facilities
 Improved mobility
 Standardization
Everything can be Automated
What is Automation?  Automation is any process that is self-driven,
reduces, and eventually eliminates, the
need for human intervention
 The IoT opens up a new world in which tasks
previously requiring human intervention can
become automated.
 Automation
• Robots are used in dangerous conditions
such as mining, firefighting, and cleaning up
industrial accidents
• used in automated assembly lines.
• self-serve checkouts at stores
• automatic building environmental controls
• autonomous cars and planes
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Everything can be Automated
How is Automation being Used?
 Smart Home Automation

 Smart Buildings

 Industrial IoT and Smart Factories

 Smart Cities

 Smart Grid

 Smart Cars

 Stores and Services

 Medical Diagnosis and Surgery

 Aircraft Auto-Pilot

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Everything can be Automated/Smart
Can Smart Devices Think?
 If programmed appropriately, devices could be
able to evaluate data that is provided to them
and modify processes or settings on-the-fly
 If provided with sufficient data, device can learn
and modify their own code based on the new
parameters
 Smart Cities use sensors to control many of
their infrastructure systems such as traffic flow,
parking, and water utilization
 Self-driving cars are equipped with many
ultrasound sensors, cameras, precision GPSs,
and computers
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
Everything can be Automated/Smart

When Things Start to Think


 Many devices now incorporate smart
technology to alter their behavior under
certain circumstances
 Whenever a decision or course of
action is taken by a device based on
an outside piece of information, then
that device is referred to as a smart
device

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
Everything can be Automated/Smart
What Is Artificial Intelligence and  Artificial Intelligence (AI) is the
intelligence demonstrated by machines.
Machine Learning?
• AI uses intelligent agents that can perceive
their environment and make decisions.
• AI refers to systems that mimic cognitive
functions normally associated with human
minds such as learning and problem
solving.
 Machine Learning (ML) is a subset of AI
that uses statistical techniques to give
computers the ability to “learn” from their
environment.
• This enables computers to improve on a
particular task without being specifically
programmed for that task.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
Everything can be Automated/Smart
ML and the IoT
 Common uses of ML technology include:
• Speech Recognition – used in digital assistants.
• Product Recommendation - Systems build up a
customer profile and recommend products or
services based on previous patterns.
• Shape Recognition - Programs exist that allow
crude hand-drawn diagrams and notes to be
converted to more formal diagrams and text.
• Credit Card Fraud Detection - A profile is
constructed about the purchasing patterns of a
client.
• Facial Recognition

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
IoT – Technical Setup
IoT – Technical Setup
IoT – 4 Layers Model
Related Areas/Terminology
 Embedded systems: not necessarily connected
 Sensor networks: collection of sensor devices connected through
wireless channels
 Cyber-physical systems: focus on interaction between physical and cyber
systems
 Real-time systems: focus on time constraints
 Pervasive/ubiquitous computing: focus on anytime/anywhere
computing
 Machine-to-machine (M2M) communications
 Internet of Everything (Cisco Systems)
Everything needs to be Secured
Why is Security so Important? Who Wants our Data?
 The Good Guys

• Legitimate companies that have an agreement in place to use the collected data about you.
• We agree to this in “Terms and Conditions” or “Terms of Service and Agreements”
• White hat hackers who test security to help protect data.
 The Bad Guys

• Black hat hackers, want access to collected data for many nefarious reasons:
• To access user IDs and passwords to steal identities
• To access data to commit a crime.
• To sell the information to a third party.
• To modify the data or disable functionality on a device.
• To disrupt or to damage the image of a legitimate company.
• To create political unrest or to make a political statement.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
Everything needs to be Secured
Data in the Wrong Hands
 Login credentials and other personal data for more
than one Million Yahoo and Gmail accounts are
reportedly being offered for sale on the dark web.
 Cybercriminals penetrated Equifax (EFX), one of the
largest credit bureaus, in July 2017 and stole the
personal data of 145 million people
 A breach of MyFitnessPal affected 150 million users.

 Ransomware attackers stole 57 million drivers and


rider accounts from Uber.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
Everything needs to be Secured
Challenges of Securing IoT Devices  Increasing Number of Devices -
The number of interconnected
sensors and smart devices is growing
exponentially, increasing the
opportunity for attacks.
 Non-Traditional Location of
Devices - Some connected IoT
devices are able to interact with the
physical world.
 Lack of Upgradeability - IoT sensor-
enabled devices may be located in
remote and/or inaccessible locations
where human intervention or
configuration is almost impossible.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
Internet of Underground Things

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
Internet of Underwater Things

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
Internet of Battlefield Things

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
Smart Creatures

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
Smart Grids

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
Smart Homes

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
Internet of Nanothings

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
Internet of Bio-Nanothings

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
IoT Enablers
Portability
 Reducing the size of hardware to enable the creation of computers that could be
physically moved around relatively easily
Miniaturization
 Creating new and significantly smaller mobile form factors that allowed the use of
personal mobile devices while on the move

Low Power and Low Heat


 Low power architectures
 Low power radios
 Sleep modes
 Energy harvesting
IoT Enablers
Connectivity
 Developing devices and applications that allowed users
to be online and communicate via wireless data networks
while on the move

Convergence
Integrating emerging types of digital mobile devices, such
as Personal Digital Assistants (PDAs), mobile phones,
music players, cameras, games, etc., into hybrid devices
IoT Enablers
Divergence
 Opposite approach to interaction design by
promoting information appliances with specialized
functionality rather than generalized ones

Ecosystems
 The emerging wave of digital ecosystems is about
the larger wholes of pervasive and interrelated
technologies that interactive mobile systems are
increasingly becoming a part of

You might also like