Algorithms for Big Data Delivery over the Internet of Things

Slides:



Advertisements
Similar presentations
1 A Real-Time Communication Framework for Wireless Sensor-Actuator Networks Edith C.H. Ngai 1, Michael R. Lyu 1, and Jiangchuan Liu 2 1 Department of Computer.
Advertisements

Low-Power Interoperability for the IPv6 Internet of Things Presenter - Bob Kinicki Low-Power Interoperability for the IPv6 Internet of Things Adam Dunkels,
6LoWPAN Extending IP to Low-Power WPAN 1 By: Shadi Janansefat CS441 Dr. Kemal Akkaya Fall 2011.
1 of 7 Smart Networks round table Smart Networks round table Monique Becker, Institute Mines-Telecom A. Paventhan, ERNET India New Delhi 23 rd October.
1 3 rd SG13 Regional Workshop for Africa on “ITU-T Standardization Challenges for Developing Countries Working for a Connected Africa” (Livingstone, Zambia,
Wireless Video Sensor Networks Vijaya S Malla Harish Reddy Kottam Kirankumar Srilanka.
Undergraduate Poster Presentation Match 31, 2015 Department of CSE, BUET, Dhaka, Bangladesh Wireless Sensor Network Integretion With Cloud Computing H.M.A.
6LoWPAN Overview, Assumptions, Problem Statement & Goals (draft-kushalnagar-lowpan-goals-assumptions-00) Nandu Kushalnagar & Gabriel Montenegro.
Impact of the Internet of Things on Computer Networks James Byars December 12, 2013 IT422 – Computer Networks Professor Tim Johnson.
Cloud Computing 1. Outline  Introduction  Evolution  Cloud architecture  Map reduce operation  Platform 2.
Advisor: Quincy Wu Speaker: Kuan-Ta Lu Date: Aug. 19, 2010
Course ILT The OSI model Unit objectives Explain the significance of the OSI model, label the seven layers of the OSI model, and describe services provided.
The Grid System Design Liu Xiangrui Beijing Institute of Technology.
6LoWPAN (Introduction, Problem Statement & Goals) Nandakishore Kushalnagar Intel Corporation.
Multi-Resolution Spatial and Temporal Coding in a Wireless Sensor Network for Long-Term Monitoring Applications You-Chiun Wang, Member, IEEE, Yao-Yu Hsieh,
Lan F.Akyildiz,Weilian Su, Erdal Cayirci,and Yogesh sankarasubramaniam IEEE Communications Magazine 2002 Speaker:earl A Survey on Sensor Networks.
BZUPAGES.COM Presentation on TCP/IP Presented to: Sir Taimoor Presented by: Jamila BB Roll no Nudrat Rehman Roll no
Speaker: Chia-Wen Lu (Sally) Adviser: Dr. Quincy Wu Date:02/23/2012
IT 606 Computer Networks (CN). 1.Evolution of Computer Networks & Application Layer. 2.Transport Layer & Network Layer. 3.Routing & Data link Layer. 4.Physical.
Azam Supervisor : Prof. Raj Jain
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Internet of Things in Industries
ICACT 2012 Performance Study on SNMP and SIP over SCTP in Wireless Sensor Networks Advisor: Quincy Wu Speaker: Chia-Wen Lu (Sally) National Chi Nan University.
Internet of Things Fall 2015
1 The Features of the IoT and Some Extension Considerations China Communications Standards Association Subin Shen 21th meeting CJK.
Wikipedia Edit. Internet of Things It is the idea of enabling everyday objects with software, sensors and network connectivity. The connectivity would.
Integration of Wireless Sensor Networks to the Internet of Things using a 6LoWPAN Gateway Integration of Wireless Sensor Networks to the Internet of Things.
Security of the Internet of Things: perspectives and challenges
CloudMAC: Moving MAC frames processing of the Sink to Cloud.
ZigBee
Lightweight security protocols for the IoT
Low-Power Interoperability for the IPv6 Internet of Things Presenter - Bob Kinicki Low-Power Interoperability for the IPv6 Internet of Things Adam Dunkels,
Wireless Networks Projects Roberto Riggio, PhD CREATE-NET Via Alla Cascata 56/c 38123, Povo (TN)
Lecture 7: Internet of Things By D. Najla Al-Nabhan 1.
Leverage Big Data With Hadoop Analytics Presentation by Ravi Namboori Visit
Authors: Christos Stergiou Andreas P. Plageras Kostas E. Psannis
Medium Access Control. MAC layer covers three functional areas: reliable data delivery access control security.
In the name of God.
The Internet of Things for Health Care
Sensors Journal, IEEE, Issue Date: May 2013,
Lecture 7: Internet of Things
Security in Internet of Things Begins with the Data
COMPSCI 110 Operating Systems
“An Eye View On the Future Generation Of Phones”
Internet of Things 1.
IoT Integration Patterns, REST, and CoAP
Architecture for security monitoring in IoT environments
Distributed Network Traffic Feature Extraction for a Real-time IDS
«IoT-based Surveillance System for Ubiquitous Healthcare»
Trusted Routing in IoT Dr Ivana Tomić In collaboration with:
Peer-to-peer networking
World-Leading Research with Real-World Impact!
Chapter 24: Internet of Things (IoT): Growth, Challenges and Security
Introduction  An IoT is a network that connects uniquely identifiable things to the Internet.  The first word is “Internet” and the second word is “Things”.
TASK 4 Guideline.
Mobile edge computing Report by Weiqing huang.
Internet of Things (IoT)
Bluetooth Based Smart Sensor Network
Extending IP to Low-Power, Wireless Personal Area Networks
“RENEWABLE GENERATION PLANT COMMUNICATIONS”
Lecture 4: Internet of Things
Speaker:Chen-Yu Tseng Advisor : Dr. Ho-Ting, Wu
Wireless Sensor Network - course: Project to investigate requirements and applications using wireless sensor networks on a construction site Ykä Marjanen.
Internet of Things (IoT) for Industrial Development and Automation
An approach to the Internet of Things system containing nomadic units development Nataliia Gvozdetska Andrii Zakharchuk Volodymyr Prokopets Zvonarov Oleh.
Developing Vehicular Data Cloud Services in the IoT Environment
Hongchao Zhou, Xiaohong Guan, Chengjie Wu
An Efficient Routing Protocol for Energy Management in WSN-Assisted loT Sarah Ammar Rafea and Abdulkareem A. Kadhim.
An Overview of Security Issues in Sensor Network
Presentation transcript:

Algorithms for Big Data Delivery over the Internet of Things 19th IEEE Conference on Business Informatics Doctoral Consortium Algorithms for Big Data Delivery over the Internet of Things Andreas P. Plageras Kostas E. Psannis

Purpose & Goals Improve healthcare more accessible & faster Sensors, actuators, cameras, etc. Monitor patient’s health Provide appropriate care Aim: Propose suitable algorithms for efficient data delivery Solve management issues Analyze the IoT-health big data Provide security solutions

Contents Introduction Challenges & Issues Methodology (IoT, BD, CC, WSNs) Challenges & Issues Methodology Proposed Hybrid Network Topology Layers & Protocols used Contiki OS & Cooja Emulator

Introduction Enormous amounts of data are growing because of the continuous increasing use of smart devices. Connect, collect, exchange, & transfer. With the convergence of new technologies many sectors are benefited. IoT , Cloud, WSNs, technologies related to Big Data. By 2030 one trillion devices will be connected. There is urgent need for adoption of big data (big data) & IoT applications. These technologies are interdependent and should be developed jointly. The new trend: is accompanied by countless development & improvement expectations in all areas. comes along with concerns about security & violation of privacy.

Challenges & Issues Different types of data bring enormous challenges for: the acquisition, larger storage spaces, such as cloud, mining big data, the management, the data analysis of large amounts of data (big data analytics), speed and quality of data, integration of different data types. Issues: fundamental problems of large data (definitions and models), the standardization of large amounts of data, the development of computational methods of large data, protection of the personal data, privacy, the user interaction by using feedback/guidance allowed during data mining.

Hadoop, Map Reduce, HDFS Hadoop is a free framework in a distributed computing environment supports the processing of large data, increases the data transfer rate, & is fault-tolerant, scalable and flexible. The Hadoop reduction map (Hadoop map reduce) is a frame used for processing and generating large data sets with a parallel and distributed algorithm in a cluster. The HDFS (Hadoop Distributed File System) is a file system used by all nodes in a Hadoop cluster for storing data.

Methodology Mastery of Big Data technologies, IoT, CC, WSNs, etc. Aim: The healthcare sector can be benefited by these technologies in combination with other security mechanisms, protocols, and algorithms. Aim: a convergence of technologies, protocols, mechanisms, & algorithms, to provide better solutions. Contiki OS & Cooja emulator: The Contiki is designed to support IP networking in low-power network connections. It is implemented in C. In the Cooja emulator we can simulate WSNs. It is a flexible java simulator that supports C for application software development. With such tools we can simulate in real time our sensor networks.

Proposed Hybrid Network Topology

Technologies & Protocols Used Internet of Things (IoT): Communication between physical & cyber objects. Big Data (BD): IoT & BD are interdependent technologies & should be developed jointly. Cloud Computing (CC): Accuracy, Scalability, Flexibility, Efficiency, Reliability, Low-cost, Storage spaces. Wireless Sensor Networks (WSNs): The purpose of these networks is the production of big data. IPv6 over Low-power Wireless Personal Area Network (6LoWPAN): Reduces header overheads, not using DHCP, Supports multi-casting. IEEE 802.15.4 Standard: Lower data rate, Lower power, Lower cost. Constrained Application Protocol (CoAP): It supports devices that operate primarily on battery. Compresses the HTTP data to send less data through the wireless link. Provides strong security

Layers & Protocols Used The layers and the protocols can be used in each layer. Layers Sub-layers Protocols Physical - IEEE 802.15.4 Data Link MAC   6LoWPAN Network IPv6/HTTP Transport CoAP/UDP/TCP Application CoAP

Contiki OS & Cooja Emulator

Transmission in our network

The packets received & lost (time)

Conclusions Wide range of research in the field of IoT, CC, & other technologies of effective healthcare systems. Challenges & issues of the IoT-Big data. Technologies, communication protocols, security mechanisms, & other techniques involved in our research. Limitations of the research: Limited Energy Privacy Future Work: Investigate new communication protocols, algorithmic solutions for delivery of large amounts of e-health data, security solutions, & efficient systems. Develop new innovative ideas & applications.

Thanks for your attention!