Iot 1

Download as pdf or txt
Download as pdf or txt
You are on page 1of 39

IoT Overview

IoT Overview
▪ The term “Internet of Things” was first coined by Kevin Ashton in a presentation at Procter &
Gamble in 1999.
Linking the new idea of RFID (Radio Frequency Identification) in Procter & Gamble's
supply chain to the then-red-hot topic of the Internet was more than just a good way to
get executive attention.
He has mentioned, “The Internet of Things has the potential to change the world, just as
the Internet did. Maybe even more so”.

▪ Afterwards, the MIT Auto-ID center presented their IoT vision in 2001. Later, IoT was
formally introduced by the International Telecommunication Union (ITU) Internet Report in
2005.
IoT Overview
▪ IoT is gaining significant momentum in academia and the industry with interest in capabilities that IoT
promises to offer.
All things around us are connected to the Internet and seamlessly communicate with each other to
operate intelligently.
Goal: enable objects in our environment to sense our surroundings, inexpensively communicate,
and ultimately create a better environment where everyday objects act based on what we need and
like without explicit instructions.
IoT’s promise for business is more ambitious: leveraging automatic sensing and fast analysis of
thousands of service related parameters and then automatically take action before a service
experience is impacted.
It also includes collecting and analyzing massive amounts of structured and unstructured data from
various sources for the purpose of gaining competitive advantage by offering better services and
improving business processes.
What is IoT?
▪ IoT may be considered as a network of physical elements
empowered by:
Sensors: to collect information.
Identifiers: to identify the source of data (e.g. sensors, devices).
Software: to analyze data.
Internet connectivity: to communicate and notify.
What is IoT?
▪ IoT connects anything / everything (e.g. sensors, devices, machines, people,
animals, trees) and processes, over the Internet for monitoring and/or control
functionality.
▪ Connections are not limited to information sites, they’re actual and physical
connections allowing users to reach “things” and take control when needed.

connecting things together is not an objective by itself, but gathering


intelligence from such objects to enrich products and services is.
IoT Simple Definition
• IoT is the intersection of the Internet, Things and Data
IoT Definition
• A more complete definition, we believe, should also include “Standards” and
“Processes” allowing “Things” to be connected over the “Internet” to exchange
“Data” using industry “Standards” that guarantee interoperability and enabling
useful and mostly automated “Processes”
Who will monitor and control?
• Any person or any machine: a homeowner monitoring his own
home on a mobile device based on a security system s/he has
installed and configured. The homeowner may also control lights,
turn on the air conditioning, shut off the heater, etc.
How is Security Guaranteed?
▪ Securing IoT is perhaps the biggest opportunity for technology companies and will remain so
for some time in the future.
▪ Before IoT, information technology security professionals worked in a bubble as they owned
and controlled their entire networks and secured all devices behind firewalls.
▪ With IoT, data will be collected from external, often mobile, sensors that are placed in public
sites (e.g. city streets) allowing strangers to send harmful data to any network.
▪ Bring Your Own Device (BYOD) is another example where 3rd party devices and hence
non-corporate data sources are allowed to enter the network.
How is Security Guaranteed?
Most Vulnerable Areas
▪ Accessing data during transport:
▪ For example, from sensors to gateways and from gateways to data centers in
enterprises, or from sensors to gateways for residential services such as video
from home monitoring system to the homeowner’s smart phone while he’s in a
coffee shop.
▪ Having control of IoT devices (Control of the APIs) allows unauthorized
persons to take full control of entire networks:
▪ Examples include shutting down cameras at home, shutting down patient
monitoring systems.
▪ Having access to the IoT data itself.
▪ Is the data easily accessible? Is it stored encrypted? Shared storage in the cloud
is another problem where customer A may login as customer B and look at his
data. Another common problem is spoofing data via Bluetooth.
▪ Stealing official user or network identity:
▪ Many websites provide default passwords for vendors.
IoT Reference Framework Four Levels
▪ IoT Device Level includes all IoT sensors and actuators (i.e. the Things in
IoT).
▪ IoT Network Level includes all IoT network components including IoT
Gateways, Routers, Switches, etc.
▪ IoT Application Services Platform Level includes the key management
software functions to enables the overall management of IoT devices and
network. It also includes main functions connecting the device and network
levels with the application layer.
▪ IoT Application Level includes all applications operating in the IoT network.
IoT Reference Framework
Four Levels
Advantages IoT Reference Framework
▪ Reduced Complexity: It breaks IoT elements and communication processes into smaller and
simpler components, thereby helping IoT component development, design and troubleshooting.
▪ Standardized Components and Interfaces: the model standardizes the specific components
within each level (e.g. what are the key components for general IoT Services Platform) as well as
the interfaces between the various levels. This would allow different vendors to develop joint
solutions and common support models.
▪ Module Engineering: Allowing various types of IoT Hardware and Software systems to
communicate with each other.
▪ Interoperability between vendors by ensuring the various technology building blocks can
inter-work and interoperate.
▪ Accelerate Innovation: By allowing developers to focus on solving the main problem at hand
without worrying about basic functions that can be implemented once across different business
verticals.
▪ Simplified Education: It breaks down the overall complex IoT solution into smaller more
manageable components to make learning easier.
The 12 Factors for a Perfect Storm
1. IT and OT Convergence
▪ Operation Technology (OT) is the world of industrial plants,
industrial control and automation equipment including machines
and systems to run the business, controllers, sensors and
actuators.
▪ Information Technology (IT) is the world of end-to-end info
systems focusing on compute, data storage and networking to
support business operation in some context such as business
process automation systems, Customer Relation Management
(CRM) systems, supply chain management systems, logistics
systems and HR systems.
IT and OT Convergence
▪ Historically, IT and OT were always managed by two separate
organizations with different cultures, philosophies and set of technologies.
IT departments were originally created by companies to create efficient
and effective forms of telephony communication among various
departments.
Then they were extended to provide video and web conferences,
network internal communications, and secure external electronic
communications such as emails.
Often the final decision with selection of communication systems, web
site hosting and backup servers was the responsibility of the IT
department.
IT and OT Convergence
▪ IoT is having a major impact on OT and the traditional IT operational
model:
▪ With the fast introduction of business-specific technologies (e.g.
Internet-based oil rig monitoring systems), IT operations can no longer
scale, keep up with the fast evolving requirements nor provide the
required expertise.
▪ Traditional IT departments simply lack the required resources to
introduce IoT solutions in a timely fashion, effectively operate and
monitor such solutions or react to the massive amount of monitoring
data that is generated by IoT devices.
IT and OT Convergence
2. Introduction of Creative Internet-based
Businesses A. Uber
▪ Travis Kalanick and Garrett Camp were complaining about finding a Taxi especially while carrying
luggage and under the rain. They brainstormed next day and came up with three requirements:
Solution had to be Internet-based (i.e. request and track service from mobile device).
Solution had to provide the service fast.
Rides had to picked up from any location.
▪ The key component of Uber’s solution is the Internet-based platform connecting customers
(passengers) with the service providers (car drivers). Because consumers aren't Uber’s employees, and
because there's practically an infinite number of cars that could potentially join Uber, Uber has the
requirement to scale at an incredibly fast rate at zero marginal cost.
▪ Uber uses sensor technologies in driver’s smart phones to track their behaviors.
If your driver speeds, breaks too hard, or takes lengthy route, it is no longer your word against
theirs.
Using Gyrometer & GPS data to track the behavior of its drivers: Gyrometers in smart phones
measures small movements, while GPS combined with accelerometers show how often a vehicle
starts and stops and the overall speed.
▪ The idea is to gradually improve safety and customer satisfaction.
2. Introduction of Creative Internet-based Businesses
B. Airbnb
▪ Airbnb is an Internet-based service for people to list, find and rent lodging.
▪ It was founded in 2008 in San Francisco by Brian Check & Joe Gebbia shortly after
creating Air-Bed and Breakfast during a conference. The original site offered rooms,
breakfast and a business networking opportunity for the conference attendees who
were unable to find a hotel.
▪ In Feb 2008, technical architect Nathan Belcharczyk joined Airbnb as 3rd co-founder,
and created a company with focus on high-profile events.
▪ Similar to Uber model, Airbnb utilizes a platform business model to facilitate the
exchange between consumers (travelers) and service providers (homeowners).
▪ Platform scalability is also a major requirement for Airbnb to support large number of
customers during major events.
▪ Airbnb is partnering with Internet companies (e.g. Nest) to deliver remote keyless
solutions to customers by unlocking doors (with IoT digital keys) over the Internet.
▪ Like Uber, Airbnb found multi-billion dollar business based on Internet platform
connecting people & places together that competently disrupted the traditional hotel
business model. Linear businesses have to invest millions into building new hotels,
while Airbnb doesn't have to deal with that.
2. Introduction of Creative Internet-based
Businesses
C. Square
▪ Inspired by Jack Dorsey when his friend, Jim McKelvey was
unable to complete $2,000 sale because he could not accept
credit cards. They started a point-of-sale software financial
services company in 2010, allowing small business mobile
individuals (no access to traditional cash register) and merchants
to make secure payments using applications.
▪ The Internet-based software solution allows customers & small
business owners to swipe credit card via the Square Reader, a
small plastic device that plugs into the audio jack of supported
smart mobile devices.
▪ Square has also introduced an application that integrates its
reader with a smartphone’s motion sensor to determine if the card
reader is failing by analyzing the motion sensor data to detect
movements indicating multiple card swipes (If the reader did not
read any data during card swipes, the application can deduce that
the card reader is broken and allows Square to send a
replacement reader).
2. Introduction of Creative Internet-based Businesses
D. Amazon
• Largest Internet retailer Company in the world. It started, in 1994, as an
Internet-based book seller and swiftly expanded into music, movies,
electronics and household goods, Amazon utilized the Internet to break the
traditional retailer model. It did not need to stock many of the merchandises it
was selling on its website. Instead, it identified matching partner companies
and issued customer orders over a secure Internet-based platform.
• Retail is only part of Amazon.com business. It also offers cloud-based
services known as Amazon Web Services or AWS with SaaS, PaaS), and
IaaS) as well as other types of businesses such as Kindle. Amazon itself
defines its lines of business in terms of product sales, service sales, cloud
services, fulfillment, publishing, digital content subscriptions, advertising, and
co-branded credit cards.
• Amazon is perhaps one of the first companies to develop a set of businesses
based on an Internet platform connecting end customers (e.g. retail customer,
businesses) to products and services (e.g. merchandise, cloud services)
thereby disrupting traditional retail models.
2. Introduction of Creative Internet-based Businesses
E. Tesla
• Tesla Motors was founded in 2003 by a group of engineers in Silicon
Valley with a mission to develop a successful luxurious electrical car
and then invest the resulting profits to make a less expensive electric
car. With instant torque, incredible power, and zero emissions,
Tesla’s products would be cars without compromise.
• Tesla is considered as the best example yet of IoT
Traffic Safety Administration published two recall announcements in 2014, one
for Tesla Motors and one for GM.
Both were related to problems that could cause fires. Tesla’s fix was conducted
for 29,222 cars as an “over the air” software update without requiring owners to
bring their cars to the dealer.
2. Introduction of Creative Internet-based Businesses
F. Self Driving Cars
• Self-driving cars can be divided into two main
categories:
Semi-Autonomous: Performs certain self-driving tasks (e.g. fully brakes when it gets too close to
object, drives itself on the freeway).
Fully-Autonomous: drives itself from origin to destination without any driver interaction.
Fully-Autonomous cars are further divided into user-operated and driverless. Because of
regulatory and insurance questions, user-operated cars are expected to be available by 2019
(pending regulatory and insurance issues) while driverless fully autonomous cars will available
at a later date.

∙ Safety is considered one of the biggest


advantages of self-driving cars. In 6 years Google
has had self-driving cars on the road with over 1.5
million miles, only 17 minor incidents have been
reported, and none of those, prior to the February
2016 incident, were the self-driving car fault.
2. Introduction of Creative Internet-based Businesses
F. Self Driving Cars
∙ Self-driving cars are equipped with a large number of sensors including
Laser rangefinders sensors: to measure a subject’s distance and take photos that are in sharp
focus
Radars
Video cameras collecting information from the road
Actuators: to control steering and braking.
▪ The collected data (from sensors, radars and video) is promptly processed with the positional
information from the car’s GPS unit and the navigation system to determine its position and to build
a 3-dimensional model of its surroundings.
▪ The resulting model is then processed by the car’s control system to make navigation decisions.
▪ The “control system” typically use stored maps to find optimal path to destination, avoid obstacles,
and send decisions to the car’s actuators. IoT applies to interactions and communications between
self-driving care components, between the car and road-side infrastructure as well as among
self-driving cars.
3. Mobile Device Explosion
∙ Mobile data traffic is expected to grow 18 fold in the next five years:
The increase in mobile data traffic is driven by two factors: The increase in
the number of users as well as data consumption per user.
∙ Growth is fueled by IoT connecting things with people and more importantly
allowing people to monitor and control things from anywhere in real time.
4. Social Network Explosion
∙ Social networks (e.g. Facebook, Instagram, Twitter and YouTube)
and the adoption of cloud-based services (e.g. Amazon’s AWS
and SaleForce.com) are all examples of the large-scale migration
to the cloud across virtually every industry.
∙ Two thirds of all data center traffic will be from the cloud by 2018.
∙ All of this leads to data explosion, where already, the data being
created on the Internet each day is equal to half of all the data that
has been accumulated since the dawn of humanity.
5. Analysis at the Edge
5. Analysis at the Edge
6. Cloud Computing and Virtualization
• Up until recently, enterprises were forced to deploy and manage
their own computing infrastructures.

• Cloud computing, which was introduced in 2008, allows


enterprises to outsources their computing infrastructure fully or
partially to public cloud provides
6. Cloud Computing and Virtualization
• Public Cloud providers deliver cloud services, on-demand, over the
Internet. Enterprises pay only for the CPU cycles, storage or bandwidth they
consume.
• Enterprises also have the choice to deploy Private Cloud solutions in their
own data centers and deliver computing services to their internal
sub-businesses. Such model offers flexibility and convenience, while
preserving management, control and security to their IT departments.
• Cloud Computing may be also offered in a Hybrid Cloud model that
consists of a combination of public and private clouds allowing enterprises to
create a scalable solution by utilizing the public cloud infrastructure while still
preserving full control over critical data.
• Cloud Computing has been classified into three main service categories:
Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and
Software as Service (SaaS). PaaS for instance, allows enterprises to utilize
a third party platform, and permits them to focus on developing and
managing their own software applications without the complexity of building
and maintaining the required infrastructure.
Cloud Computing and Virtualization
• Rather than dedicating distinct IT infrastructure (e.g. servers, storage, networking nodes) to a single business
entity, virtualization allows cloud providers to divide a physical machine into multiple virtual entities. This created
isolated virtual servers, storage devices and network resources for each enterprise, all running over the same
shared physical IT infrastructure.
• VMs are one form of virtualization that allows running multiple operating systems over the same physical server
hardware.
• Containers are another form of virtualization, where virtualization layer runs as a service on top of common
operating system kernel.
The operating system's kernel runs on the hardware node with several isolated guest process groups
installed on top of it.
The isolated guest process groups are called containers. They share the same operating system kernel but
are completely isolated at the application level.
Containers are intended to run separate applications. Examples of containers include Linux Containers and
open-source Docker.
• Could may be divided into:
Cloud 1.0: SaaS, PaaS, and IaaS.
Cloud 2.0: cloud 1.0 with Machine Learning to extract business intelligence from the data using algorithms
that learn from data pattern.
7. Technology Explosion
• IoT hardware (e.g. sensors, inexpensive computers such as
Raspberry Pi, open source micro-controllers such as Arduino)
and software technologies are not only being developed faster
than ever before, but with much lower prices. Such devices are
already transforming user behaviors and creating new business
opportunities.
• Business leaders are realizing that unless their organizations
quickly adapt to such changes, their businesses will soon
become irrelevant or inefficient to survive in an increasingly
competitive marketplace.
8. Digital Convergence
• Digital convergence has initially started with a limited scope: Move to
“paperless” operation and save trees. Now, it is transforming the
future in profound ways.
• Digital convergence is being adopted by key industries with extended
goals to move to digital operation, extract data from various sources
including devices and processes that are enabled by digitization, and
then analyze the extracted data and correlate it with other data
sources to extract intelligence that improves products, customer
experience, security, sales, etc.
• Many healthcare organizations (e.g. Kaiser Permanente) have been
using digital convergence with extended goals of improving the
patient experience, improving population health, and reducing
healthcare costs.
9. Enhanced User Experience
• UX is essential for IoT. UX principle: meet basic needs for the usage of a product without aggravation or difficulty.
• Including too much intelligence in products can backfire and lead to customer dissatisfaction.
E.g. A toaster exists to make toasts. But if we over-engineer with too much information, switches and options, we risk
building products that are so annoying that our customers won't want to use them.
• There is now a wealth of technology and markup languages (e.g. HTML 5) that allow software engineers to adapt key UX
principles and meet the so called KISS principle (Keep It Short and Simple).
• KISS states that most systems work best if they are kept simple. Top UX principles include:
Simple & Easy Principle: Best UX system is a system without UI. Simplicity should be a key goal in design and unnecessary
complexity should be avoided. Make sure you reduce the user’s cognitive workload whenever possible. Make sure the UI is
consistent stable, intuitive, and establish a clear visual hierarchy.
Contextual Principle: Make sure that users are contextually aware of where they are within a system.
Human Principle: Make sure the UI provides human interactions above the machine-like interactions.
Engagement Principle: Make sure that the UI fully engages the user, delivers value, and provides a strong information
sense.
Beauty and Delight Principle: Make sure the UX is enjoyable and make the user wants to use the system or service.
10. Fast Rate of IoT Technology Adoption

• There was a point of inflexion between 2009 and 2010, where


the number of connected devices began outnumbering the
planet’s human population.
• Adoption rate of such technology is five times faster than that of
electricity and telephony growth.
• Traditionally the adoption of technology was always proportional
to population growth. Hence, IoT adoption gap is expected to
widen exponentially over the next several years, with the
number of sensors, objects, and other “things”.
11. The Rise of Security Requirements
• With the commercialization of the Internet, security concerns expanded to cover personal
privacy, financial transactions, and the threat of cyber robbery. Today, security of the network is
being expanded to include safety or physical security.
• Many of us are deploying smart gadgets all over our homes. Examples include smart cameras
that notify our smart phones during business hours when movement is detected, smart doors
that open remotely, and the smart fridges that notify us when we are short of milk.
• Imagine now the level of control that an attacker can gain by hacking those smart gadgets if the
security of those devices were to be overlooked. The damage caused by cyber-attacks in the
IoT era will have a direct impact on all the physical objects we use in out daily life.
• The same applies to smart cars as the number of integrated sensors continues to grow rapidly
and as the wireless control capabilities increase significantly over time, giving an attacker who
hacks a car the ability to control the windshield wipers, the radio, the door lock, and even the
brakes and the steering wheel of the vehicle.
• Researchers have shown that an attacker can control remotely implantable and wearable
health devices (e.g. Insulin pumps and heart pacemakers) by hacking the communication link
that connects them to the control and monitoring system
12. None Stop Moore’s Law
• Over the history of computing hardware, computer power has been
doubling approximately every 18 months. This relates to the fact that the
number of transistors in a dense integrated circuit has been growing by
two-fold every 18 months since the transistor was invented in 1947 by
John Bardeen, Walter Brattain, and William Shockley in Bell Labs.
• Silicon transistor storage technology size has continued to shrink over
the years and is approaching atomic level. For years now, we've been
putting more power and more storage on the same size device. To
illustrate this idea, the number of all transistors in all PCs in 1995, a
peak year for Microsoft, was about 800 trillion transistors. Today, 800
trillion transistors are included in one weekend’s sales of Apple’s
iPhones.
• The price of the transistor is being reduced by more than 50% every
year. In 1958 Fairchild Semiconductor procured its first order, for 100
transistors at $150 apiece from IBM's Federal Systems Division. Today,
you can buy over one million transistors for 8 cents
12. None Stop Moore’s Law

You might also like