Internet of Things (IoT) Opportunities and challenges

Similar presentations


Presentation on theme: "Internet of Things (IoT) Opportunities and challenges"— Presentation transcript:

1 Internet of Things (IoT) Opportunities and challenges
Marjan Kuchaki Rafsanjani Department of Computer science, Faculty of Mathematics and Computer, Shahid Bahonar University of Kerman

2 Outline Introduction Definition of IoT History Influence of IoT
Dimensions in IoT IoT Applications Architecture of IoT IoT Challenges

3 Outline (Cont…) IoT Technologies Internet of Things R&D 5G-IOT
Radio frequency identification (RFID) Wireless sensor networks (WSNs) Mobile Ad Hoc Networks (MANETs) Cloud of Things (CoT) Internet of Things R&D 5G-IOT Key technologies in 5G-IoT Potential research challenges Conclusions

4 Introduction Through numerous technology advances, society is moving towards an “always connected” paradigm. Networks (both wired and wireless) are everywhere, open standards are defined and rolled out (e.g. IPv6) allowing for unique addressing schemes.

5 Introduction (Cont…) In recent years, Internet of Things (IoT) has become the new research focus for both industry and academia. The concept of IoT can be traced back to the pioneering work done by Kevin Ashton in 1999 and was initially linked to the new idea of using Radio Frequency Identification (RFID) in the supply chain.

6 Definition of IoT The definition of “things” in the IoT vision is very wide and includes a variety of physical elements. The IoT vision enhances connectivity from “any-time, any-place” for “any-one” into “any-time, any-place” for “any-thing”.

7 Definition of IoT (Cont…)
IoT provides networking to connect people, things, applications, and data through the Internet to enable remote control, management, and interactive integrated services. Predictions are made that there will be 50 billion 'things' connected to the Internet by  Therefore, Internet of Things is so important.

8 History The history of Internet goes back to the development of communication between two computers through a computer network in the late 1960s. Since then, the evolution of the Internet has passed three main phases: Internet of Computers, Internet of People (mainly via social networking), Internet of Things (including computers, people and any other physical/virtual objects)

9 History (Cont…)

10 History (Cont…) Technology advances are expanding the boundaries of the Internet. Device processing power and storage capacity are increasing while the technology is making the devices smaller. Devices are increasingly fitted with sensors and actuators.

11 Influence of IoT People: More things can be monitored and controlled  People will become more capable. Process: More users and machines can collaborate in real time  More complex tasks can be accomplished in lesser time. Data: Collect data more frequently and reliably  Results in more accurate decision making. Things: ‘Things’ become more controllable  mobile devices and things become more valuable.

12 Dimensions in IoT In a 2005 report the International Telecommunications Union (ITU) suggested that the “Internet of Things” will connect the world's objects in both a sensory and intelligent manner”. By combining various technological developments, the ITU has described four dimensions in IoT: Item identification (“tagging things”), Sensors and wireless sensor networks (“feeling things”), Embedded systems (“thinking things”), Nano-technology (“shrinking things”).

13 IoT Applications IoT concepts have been demonstrated in a variety of domains, ranging from logistics, transport and tracking, smart environments (homes, buildings, infrastructure), to energy, defence and agriculture. In essence, IoT impacts and certainly has the potential to significantly influence all facets of society.

14 IoT Applications (Cont…)
Security: surveillance applications, alarms, real-time object and people tracking and monitoring. Transportation: Fleet management, road safety, toll payment, real-time traffic monitoring, and many more intelligent transportation system applications. Healthcare: E-health, personal security, body- sensor based customized healthcare systems.

15 IoT Applications (Cont…)
Utilities: Measurement, provisioning, and billing of utilities (e. g. gas, water, electricity, and etc.) Manufacturing: Monitoring and automation of a product chain.  Facility management: home, building, and campus automation.

16 Application domain of IoT

17 Architecture of IoT The architecture of IoT is usually considered to be 3-layer, with Perception layer Network layer Application layer but some add two more layers: Middleware layer Business layer

18 Internet of Things layers

19 IoT layers (cont…) Perception Layer:
Its purpose is to perceive the data from environment. Sensors, bar code labels, RFID tags, GPS, camera, lie in this layer. Network Layer: It collects the data from the lower layer and sends to the Internet. Gateway, one interface connected to the sensor network and another to the Internet. In some scenarios, it may include network management center or information processing center.

20 IoT layers (cont…) Middleware Layer:
Its purpose is service management and storage of data. It also performs information processing and takes decisions automatically based on results. Application Layer: This layer performs the final presentation of data. It provides global management of the application presenting based on the information processed by Middleware layer.

21 IoT layers (cont…) Business Layer:
This layer is all about making money from the service being provided. Data received at the application layer is molded into a meaningful service.

22 IOT architecture layers

23 IoT Challenges One significant aspect in IoT is the large number of things being connected to the Internet, each one providing data. Finding ways to reliably store and interpret the masses of data through scalable applications remain a major technological challenge: Privacy, Identity Management, Security and Access control,… Standardization and Interoperability Data deluge

24 IoT Technologies Radio frequency identification (RFID):
RFID chip holds information about the object. The RFID chip is attached and transfers data to the reader.  The antenna is used to receive energy that is used to operate the RFID device and transmit information back to the reader device.  RFID enables efficient management, tracking and monitoring processes and therefore it's important in logistics and supply chain applications. 

25 IoT Technologies (Cont…)
Wireless sensor networks (WSNs):  Efficient, low cost, low power devices for use in remote sensing applications.  A large number of intelligent sensors collect raw data and create valuable data by processing, analyzing, and spreading data.  Challenges are related to limited processing capability and storage, and sensor data sharing for multiple device/system cooperation.

26 IoT Technologies (Cont…)
Mobile Ad Hoc Networks (MANETs):  Self-configuring network of mobile hosts/routers. Lack of central management. Connected by wireless links. Autonomous and infrastructureless. Multi hop routing Mobility Connected to a wired LAN via an Access Point.

27 Mobile Ad Hoc Networks (MANETs)

28 IoT Technologies (Cont…)
Mobile Ad Hoc Networks issues:  They are Infrastructureless Dynamically Changing Network Topologies Routing Power constraint Data rate: Wireless bandwidth is lower than wired Security: Attacks (active, inactive), (internal, external) Prevention, detection,… Power is not available for complex security. No encryption , antivirus, etc.

29 IoT Technologies (Cont…)
Cloud of Things (CoT):   Since, number of connected devices is rapidly increasing, so there is going to be a lot of data as well. Storing that data locally and temporarily will not be possible any more. For advanced IoT services, IoT networks may need to collect, analyze and process segments of raw data and turn it into operational control information.  All this is possible with cloud computing. IoT and cloud computing working in integration makes a new paradigm, which we have termed here as Cloud of Things (CoT). 

30 IoT Technologies (Cont…)
Cloud of Things (CoT): (cont…)  Many IoT devices will not have a PC or smart phone level sufficient data processing capabilities. Or they won't have interoperability functions.  Therefore IoT applications will need support from a reliable, fast computing platform.  IoT devices can overcome lack of software, memory, hardware, data processing capability through cloud computing.

31 IoT Technologies (Cont…)
Issues in Cloud of Things: Protocol support Energy efficiency Resource allocation Identity management IPv6 deployment Location of data storage Security and privacy Unnecessary Communication of data

32 IoT R&D (Research & Development)
IoT services must guarantee the security, privacy and integrity of information and user confidentiality. Some of the key features are : ‘Thing’ Authentication &Authorization User Authentication & Authorization ‘Thing’ to ‘Thing’ Access Control IoT Public and Private Key Management IoT low Overhead Protocols

33 IoT R&D (cont…) Mobility support:
Mobility support increases the applicability of IoT to new areas.  Mobile platform based IoT enables an enormous range of applications, such as: Social networking  Environment monitoring and interaction   

34 IoT R&D (cont…) Energy and Resource management:
Energy issues are related to optimization of energy harvesting, conservation, and usage are essential to the development of IoT. It is important to consider resource constrictions, such as power consumption, and limited battery and also packet size. 

35 IoT R&D (cont…) Identification technology:
IoT devices produce their own contents, and the contents are shared by any authorized user.  Identification and authentication technologies need to be converged and interoperated at a global scale.  Management of unique identity for thing and handling of multiple identifiers for people and locations is very important. 

36 5G-IoT The existing 4G networks have been widely used in the Internet of Things (IoT) and is continuously evolving to match the needs of the future Internet of Things (IoT) applications. The 5G networks are expected to massive expand today’s IoT that can boost cellular operations, IoT security, and network challenges.

37 5G-IoT (Cont…) New applications and business models in the future IoT require new performance criteria such as massive connectivity, security, trustworthy, coverage of wireless communication, ultra-low latency, throughput, ultra-reliable, et al. for huge number of IoT devices. The new requirements of applications in the future IoT and the evolving of 5G wireless technology are two significant trends are driving the 5G enabled IoT.

38 5G-IoT (Cont…) The current 4G can provide a transmission speed as 1Gbps, however the 4G signal could be easily disrupted by inferences, such as WiFi signals, buildings, microwaves, etc. The 5G networks can provide users with faster speed than 4G up to 10 Gbps, meanwhile the 5G can provides reliable connection up to thousands device at the same time.

39 Key technologies in 5G-IoT
The 5G enabled IoT includes a number of key enabling techniques from the physical communication to IoT applications.

40 A. 5G-IoT architecture The 5G-IoT is expected to provide applications with real-time, on demand, all online, reconfigurable, which requires the 5G-IoT architecture. The 5G-IoT will mainly base on the 5G wireless systems, so the architecture generally includes two plane: Data plane, focuses on the data sensing through networks. Control plane, consists of network management tools and reconfigurable services (applications) providers.

41 B. Wireless network function virtualisation (WNFV)
WNFV refer to network services and functions to wirelessly view network resources, such as databases, routers, links, and data, in a way that is separate from the general physical infrastructure, and to use these resources as service requirements as it needs. The WNFV separate a physical network into various virtual networks, therefore the devices can be reconfigured to organize various networks according to the requirements of applications.

42 B. Wireless network function virtualisation (WNFV) (Cont…)
As a complementary to the 5G networks, the WNFV will enable the virtualization of entire network functions to simplify the deployment of 5G-IoT, in which NFV will decouple flexible and scalable hardware and underlying network functions to enable 5G-IoT focus on generic cloud servers.

43 C. Heterogeneous Networks (HetNet)
Heterogeneous Networks (HetNet) is a novel networking paradigm proposed to satisfy the on-demand requirements of service-driving 5G IoT.

44 D. Direct Device to Device (D2D)
D2D for the short range communication between two devices is proposed as a new way for data transmission, which will benefits the 5G-IoT with low power consumption, load balancing and better QoS for users. In IoT, more than 60% of applications requires low power, long battery, and wide coverage of connectivity.

45 E. Advanced spectrum sharing and interference management
A massive number of 5G IoT devices will be densely deployed in many cases to guarantee the coverage and traffic load imbalance.

46 F. Other enabling techniques in 5G-IoT
Furthermore, Machine-Type Communications (MTC), millimeter Wave (mmWave), mobile edge computing, Software Defined Networking (SDN), Network Function Virtualization (NFV), and Narrowband IoT (NB-IoT) are all expected to play a fundamental role for the IoT in future 5G systems.

47 F. Other enabling techniques in 5G-IoT (Cont…)
Other key enabling techniques include: optimization methods in 5G IoT, which include convex optimization, heuristic methods, evolutionary algorithm (EAs), machine learning methods, and artificial neural networks (ANNs). These methods will make increasing impact to key enabling techniques.

48 Potential research challenges
The 5G provides features that can satisfy the requirements of the future IoT, however, it also opens new set of interesting research challenges on the architecture of 5G-IoT, trusted communications between devices, security issues, etc. The 5G-IoT integrates a number of technologies and is creating significant impact on applications in IoT. Technical challenges Security assurance and privacy concerns Standardization issues

49 A. Technical challenges
5G-IoT architecture is a big challenge: Scalability and network management, Interoperability and Heterogeneity, Security assurance and Privacy concerns. Wireless software defined network (SDN) To provide the core network with highly flexibility and scalability. The separation of control and data plane is difficult for most SDN.

50 A. Technical challenges (Cont…)
The NFV is highly complementary to the SDN, but not dependent on it. D2D communication are expected to provide high throughput for 5G-IoT. Deployment of IoT applications is challenging due to its large scale, resource limited devices and heterogeneous environment.

51 B. Security assurance and privacy concerns
In the next 5G-IoT, critical new security capabilities will be needed at the device and network levels to address complex applications including smart city, smart networks, etc. In the diverse 5G-IoT system, the security is very complicated. The designer must consider not just software intrusion from afar, but also local intrusion at the device itself. Meanwhile, the security assurance must consider avoid weak security links.

52 C. Standardization issues
Due to the diverse nature of networks and devices in 5G-IoT, there is a lack of consistency and standardization for both IoT systems and applications. There are still many hurdles and challenges in implementation of these solutions. The hurdles facing 5G enabled IoT standardization can be grouped into following four categories:

53 C. Standardization issues (Cont…)
IoT devices, namely platform, include the form and design of IoT products, big data analytic tools, etc. Connectivity, includes communication networks and protocols that connect IoT devices. Business models, which are expected to satisfy the requirements of e-commerce, vertical, horizontal, and consumable markets. Applications, include control function, data collection and analysis functions.

54 Conclusions The “Internet of Things” describes a vision where objects become part of the Internet: where every object is uniquely identified, and accessible to the network, its position and status known, where services and intelligence are added to this expanded Internet, fusing the digital and physical world, ultimately impacting on our professional, personal and social environments.

55 Conclusions (Cont…) IoT enables people and objects in the physical world as well as data and virtual environments to interact with each other, hence realizing smart environments such as smart transport systems, smart cities, smart healthcare, and smart energy. IoT assumes uploading and storing all the raw data generated by IoT devices to the cloud, which will be processed by the cloud servers to extract useful knowledge by using data analysis methods. IoT databases will need Cloud Computing support.  IoT data analysis will need Big Data support. 

56 References M. Soliman, T. Abiodun, T. Hamouda, J. Zhou, C.-H. Lung, Smart Home: Integrating Internet of Things with Web Services and Cloud Computing, Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2013. A. Sheth, Internet of Things to Smart IoT Through Semantic, Cognitive, and Perceptual Computing, Ieee Intelligent Systems, 2016. F. Behmann, K. Wu, Collaborative Internet of Things (C-IoT) for Future Smart Connected Life and Business, John Wiley & Sons Ltd O. Vermesan, P. Friess, Internet of Things: Converging Technologies for Smart Environments and Integrated Ecosystems, River Publishers, 2013. C. Perera, A. Zaslavsky, P. Christen, D. Georgakopoulos, Context Aware Computing for The Internet of Things: A Survey, IEEE Communications Surveys & Tutorials, Vol. 16, No. 1, 2014. Z. Sheng, S. Yang, Y. Yu, A.V. Vasilakos, J.A. Mccann, K.K. Leung, A Survey on the IETF Protocol Suite for the Internet of Things: Standards, Challenges, and Opportunities, IEEE Wireless Communications, 2013. M. Aazam, I. Khan, A. . Alsaffar, E.-N. Huh, Cloud of Things: Integrating Internet of Things and Cloud Computing and the Issues Involved, Proceedings of the 11th International Bhurban Conference on Applied Sciences & Technology (IBCAST), 2014.

57 M. MILLER, The Internet of Things (How Smart TVs, Smart Cars, Smart Homes, and Smart Cities Are Changing the World), Pearson Education, Inc., 2015. R.H. WeberInternet of Things – New security and privacy challenges, Computer Law & Security Report, 2010. L. Coetzee, J. Eksteen, The Internet of Things – Promise for the Future? An Introduction, Proceedings of the IST-Africa, S. R. Moosavia, T. N. Gia, E. Nigussie, A.M. Rahmania,.S. Virtanen, H. Tenhunen, J. Isoaho, End-to-end security scheme for mobility enabled healthcare Internet of Things, Future Generation Computer Systems, Vol. 64, 2016. J. Mineraud, O. Mazhelis, X. Su, S. Tarkoma, A gap analysis of Internet-of-Things platforms, Computer Communications, Vol , A. Karkouch, H. Mousannif, H. AlMoatassime, T. Noel, Data quality in internet of things: A state-of-the-art survey, Journal of Network and Computer Applications, Vol. 73, 2016. P.P. Ray, A survey on Internet of Things architectures, Journal of King Saud University –Computer and Information Sciences, 2016. A. Ouaddah, H. Mousannif, A.A. Elkalam, A.A. Ouahman, Access control in The Internet of Things: Big challenges and new opportunities, Computer Networks, 2016. O. Hersent, D. Boswarthick, O. Elloumi, The Internet of Things: Key Applications and protocols, John Wiley & Sons, 2011.

58 17) J. Gubbia, R. Buyyab, S. Marcusica, M
17) J. Gubbia, R. Buyyab, S. Marcusica, M. Palaniswamia, Internt of Things (IoT): A vision, architecture elements, and future directions, Future Generation Computer Systems, Vol. 29, No. 7, 2013. L. Atzori, A. Iera, G. Morabito, Internet of Things: A survey, Computer Networks, Vol. 54, No. 15, 2010. S. Li, L.D. Xu, S. Zhao, The Internet of Things: A survey, Information systems Frontiers, Vol. 17, No. 2, 2015. G. Montenegro , N. Kushalnagar, J. Hui, D. Culler, Transmission of IPV6 packets over IEEE networks, IEFT RFC 4944, 2007. I.F. Akyildiz, S. Nie, S.-C. Lin, M. Chandrasekaran, 5G roadmap: 10 key enabling technologies, Computer Networks, Vol. 106, pp. 17–48, 2016. I.F. Akyildiz, A. Lee, P. Wang, M. Luo, W. Chou, A roadmap for traffic engineering in SDN-openflow networks, Computer Networks, Vol. 71, pp. 1–30, 2014. I.F. Akyildiz, P. Wang, S.C. Lin, Softair: a software defined networking architecture for 5g wireless systems, Computer Networks, Vol. 85, pp. 1–18, 2015. Project CONTENT FP, 2012–2015, [Available on line July 2018], G.A. Akpakwu, et al., A survey on 5g networks for the internet of things: communication technologies and challenges, IEEE Access (2017).

59 26) I.J. Hosek, Enabling technologies and user perception with integrated 5g-iot ecosystem, 2016.
27) L. Xu, R. Collier, G.M.P. OHare, A survey of clustering techniques in WSNs and consideration of the challenges of applying such to 5G IOT scenarios, IEEE Internet of Things Journal, Vol. 4, No. 5, PP. 1229–1249, 2017. 28) S. Li, L.D. Xu, S. Zhao, 5G Internet of Things: A survey, Journal of Industrial Information Integration, Vol. 10, PP. 1–9, 2018. 29) D. Zhang, Z. Zhou, S. Mumtaz, J. Rodriguez, T. Sato, One integrated energy efficiency proposal for 5G IOT communications, IEEE Internet of Things Journal, Vol. 3, No. 6, pp. 1346–1354, 2016. 30) A. Gudipati, D. Perry, L.E. Li, S. Katti, SoftRAN: software defined radio access network, Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, ACM, pp. 25–30, 2013. 31) P. Schulz, M. Matthe, et al., Latency critical iot applications in 5g: perspective on the design of radio interface and network architecture, IEEE Communivation Magazin, Vol. 55, No. 2, pp. 70–78, 2017. 32) F. Al-Turjman, 5G-enabled devices and smart-spaces in social-IoT: An overview, Future Generation Computer Systems, Vol. 92, pp. 732–744, 2019.

60 Thank you for your attention…


Download ppt "Internet of Things (IoT) Opportunities and challenges"

Similar presentations


Ads by Google