2. Technical Perspective:
IoT - not so easy to define
Simply put:
All devices that can be connected will be connected.
IEEE, an early definition:
A network of items - each embedded with sensors - which are connected to the
Internet.
▪ Not quite there - this description addresses just the physical aspect of IoT.
IoT = Identification + Sensing + Communication + Computation + Services + Semantics
4. IEEE P2413
Draft Standard for an Architectural Framework for the Internet ofThings (IoT)
Market and Shareholders
Applications
Networking and Data
Communications
Sensing
Architectural Framework
IoT
Architecture
framework
Media Healthcare
Home &
Building
EnergyManufacturing
Logistics
Retail
Mobility/
Transportation
Consumer Equipment Providers
Consumers
ICT Infrastructure Providers
Regulators
LogisticsCompanies
PublicTransport Companies
CityAuthorities
Manufacturing Industries
Hospitals
Doctors
Insurance Companies
Appliance
Providers
Facility
Management
Retail Stores
Application
Developers
Utilities
Automation Equipment Providers
Why:
To accelerate the growth of the IoT Market by enabling cross- domain interaction
and platform unification through increased system compatibility, interoperability
and functional exchangeability
5. Working on IoT Standards
Today, one of the prime frontiers of innovation for the IoT is standards.
▪ ETSI - EuropeanTelecommunications Standards Institute
▪ ITU - InternationalTelecommunication Union
▪ IEEE - Institute of Electrical and Electronics Engineers
▪ IETF - Internet EngineeringTask Force
▪ NIST - National Institute of Standards andTechnology
▪ OASIS - Organization forAdvancement of Structured Information Standards
▪ W3C -WorldWide Web Consortium
6. ITU
International Telecommunication Union
A Network that is
Available anywhere, anytime, by anything and anyone.
Technologies for:
• Tagging things
• Feeling things
• Making things think
• Shrinking things
7. IETF
Internet Engineering Task Force
IETF’s definition of “things”:
In the vision of IoT, ‘things’ are very various such as
computers, sensors, people, actuators, refrigerators,
TVs, vehicles, mobile phones, clothes, food, medicines,
books, etc.These things are classified as three scopes:
people, machine (for example, sensor, actuator,
etc.) and information (for example, clothes, food,
medicine, books, etc.).
8. IoT – It’s about us.
It’s not really about things.
It is about “connected person.”
At the center:
the human being,
making use of the
applications and services
that are enabled by the
devices - the things - and
their unprecedented
integration
provided in the IoT.
“Everyone asks me if everyone is going to be like
me in the future. It is important to remember
that everyone is like me NOW.”
Chris Dancy, the “World's Most Connected Man”
9. The Rise of Softwareization
Drivers:
▪ Commoditization of Hardware
▪ Commoditization of Communications
▪ Open Source
▪ Virtualization
▪ Autonomics and Self-Organization
▪ Availability ofAPI-s
▪ Large amounts of data
Manifestations:
▪ SDN, NFV in the Cloud
▪ Anything as a Service
▪ Pervasive Sensing and Actuating
▪ Augmented Reality
▪ Micro-manufacturing (3D)
▪ Real-Time DataAnalysis
▪ Algorithms
▪ Electronic Money
▪ Machine Learning
10. Enabling Technologies - Core Tech
CoreTech
▪ Device and Nanotech
▪ Cloud Computing
▪ Networking and Interconnectivity
▪ Programmability
11. Enabling Technologies, Core Tech:
Device and Nanotech
▪ Open-Source Hardware Platforms
– Arduino, Raspberry Pi, BeagleBone
▪ Open IP
▪ Universal Memory
▪ Sensors andActuators are getting smaller and more complex
– specialized Operating Systems
– on-device APIs
– 3D integrated circuits
▪ Micro-Electro-Mechanical Systems and Micromachines
– evolving into the nanotechnology field
12. Enabling Technologies, Core Tech:
Cloud Computing
▪ Virtualization
▪ Automatization of resources
▪ Forms:
– Infrastructure as a Service
– Platform as a Service
– Software as a Service
▪ Containers
▪ IEEE and IEEE Computer Society working on standards
– P2301 Cloud Portability
– P2302 Cloud-to-Cloud Interoperability
The real promise of cloud
computing is the way that it
changes the game for software
development.
13. Enabling Technologies, Core Tech:
Networking and Connectivity
▪ EPC - Electronic Product Code
▪ IP v5, IP v6
▪ RFID, NFC
▪ Bluetooth, Bluetooth LE
(smart)
▪ Zigbee
▪ Wi-Fi
▪ 4G
▪ SDN – Software Defined
Networks
▪ NFV – Network Function
Virtualization
▪ 5G
14. Building Blocks and Technologies
WIFI/WIMAX Protocols
Bluetooth protocol
TCP/IP
SSH
HTTP/S
HTCPC
15. Enabling Tech:
Programmability
a programmable device is one that can take on a variety of
behaviors at a user’s command without requiring physical changes
Delay watering your garden
If it’s going to rain tomorrow
Receive an emergency call
If smoke is detected
Web ofThings
incorporate everyday physical objects into theWorldWide Web
by giving them an Application Programming Interface (API)
PhysicalWeb: EddyStone,Web Sockets
16. Enabling Technologies – Social Tech
▪ Big Data and Analytics
▪ Augmented Reality
▪ Crowdsourcing
▪ Algorithms
▪ Machine Learning
▪ Artificial Intelligence
17. Enabling Technologies, Social Tech:
Big Data
▪ 7 years ago: number of “things” > number of people
▪ 2016: 25 billion connected devices
▪ 2020: 50 billion connected devices
▪ 2020: 90% of consumer cars with Internet connection
▪ 2016: 3.5 billion sensors already in the marketplace
By 2020, globally (1):
monthly mobile data traffic will exceed
30.6 exabytes
1 exabyte (10^18) = 1 million terabytes
(50,000 years of DVD-quality video)
(1) Cisco
18. Challenges:
Privacy & Security
▪ Big Brother Watching syndrome
▪ Who owns the data?
▪ Willingness to provide private
information in exchange for a
perceived value: is there a line
that should not, or cannot be
crossed?
▪ US: laws based on vendor –
consumer relationship
▪ Europe: laws based on the
citizen’s rights
19. Enabling Technologies, Social Tech:
Augmented Reality
information that augments the real-life view
Already in use for a long time now.
Example:
▪ a yellow line that appears on the screen
during a football game
But also:
▪ connected virtual things that mimic or
augment things in real life
20. Enabling Technologies, Social Tech:
Crowdsourcing
Modern business term, coined in 2006:
the practice of obtaining needed services, ideas, or content by
soliciting contributions from a large group of people and especially
from the online community rather than from traditional
employees or suppliers
online community of connected people using Internet ofThings
23. Opportunities:
Data Analysis and Algorithms
1. Collected data allows better insights
2. Data Analysis; human interpretation; manual intervention
3. Pattern and Symptom Recognition
4. Predictions of the system behavior
5. Algorithms; automatic intervention, both corrective and
preventive
24. Enabling Technologies, Social Tech:
Algorithms
a set of steps that are followed in order to solve a mathematical
problem or to complete a computer process
This is the ‘smart’ part.
Examples:
▪ Driving Route Optimization
▪ Smart Grid
▪ High-Speed StockTrading
26. Opportunities:
Data Analysis and Machine Learning
1. Collected data allows better insights
2. Data Analysis; human interpretation; manual intervention
3. Pattern and Symptom Recognition
4. Predictions of the system behavior
5. Algorithms; automatic intervention, both corrective and preventive
6. Machine Learning, automatic algorithm improvements
27. Enabling Technologies, Social Tech:
Machine Learning
the ability of a computing system to learn from data
and modify pre-defined algorithms
Examples:
▪ Search Engine Results Ranking
▪ Online Shopping Product Recommendations
▪ Web and In-App Advertising
▪ Google Mail “Smart Reply”
28. Challenges:
Implications of ‘everything connected’
▪ 2014: remote manipulation of
medical devices, including drug
infusion pumps
– “Healthcare is 10 years behind
other industries in addressing
security” – Scott Erven DefCon
conference,April 2014
▪ 2015: remote car hacking
▪ Despite softwareization,
software cannot secure
hardware:
– Supply chain must be secured
29. P2413 Quadruple Trust
QuadrupleTrust includes:
▪ Protection
▪ Security
▪ Privacy
▪ Safety
Key principle: “security in depth”
The principle of defense-in-depth
is that layered security
mechanisms increase security of
the system as a whole.
OpenWeb Application Security Project
(OWASP)
30. Challenges
Technological Challenges
▪ Availability
▪ Reliability
▪ Mobility
▪ Performance
▪ Management
▪ Scalability
▪ Interoperability
▪ Energy
Societal Challenges
▪ Privacy
▪ Ownership
▪ Security
▪ Easiness of Use
▪ Social Cooperation
▪ Trust
▪ Corporate Responsibility
31. Enabling Technologies, Social Tech:
Artificial Intelligence
Deep LearningTechnique
artificial neural networks mimicking behavior of human brain
• Increased interoperability with external systems
• Capability to communicate in human social networks
• Awareness of the environment
• Interactivity with the surrounding environment
• Pseudo-social behavior with neighbors
• Capability of building their own social network
• Proficiency in building added-value complex services
through collaboration in the social network of things
res sapiens
res agens
res socialis
34. IoT: technology and society mesh
Social Impacts
Business Models
and Ecosystems
Services and
Applications
Software
Architecture
EnablingCoreTech and
System Architecture
Enabling Social
Tech
Security and
Privacy
Management Impact and Acceptance of Users
Change in the societal organization
Democratization and control of infrastructure
New Business Models
New Value Chains
Creation of New Ecosystems
Application Domains
Trials
Specific Services
(Smart Cities, Social IoT, …)
Applications
Operating Systems
Middleware
Cloud Solutions
APIs and Interfaces
Data Management
Sensors
Actuators
Gateways
Microsystems
Protocols
Energy
Management
Networks
O-Touch Management
Autonomics and
Self-organization
New processes and
organizations
Personal Data
Management
Privacy and Security
Framework for IoT
Augmented Reality
Big Data and Analytics
Crowdsourcing
Algorithms
Machine Learning
Artificial Intelligence
35. What should a CIO watch for?
▪ Big Data: the volume of data generated by the IoT will require IT managers
to rethink how they collect, manage, and store data on multiple fronts.
– Minimize the data you collect and retain
▪ Security: consider implications of having everything connected
– Institutionalize Security by Design
– Conduct a privacy or security risk assessment
– Test security measures before launching products
– Train all employees about good security and ensure security is addressed at the
appropriate organizational level
▪ When risk is identified, implement a defense-in-depth approach
▪ Monitor products through the life-cycle, and patch known vulnerabilities
36. CIO - What next?
▪ Do think about a problem and a solution; don’t jump to technology to
solve it without thinking about alternative ways to solve it. IoT may
be a solution – or not.
▪ Think freely, out-of-the-box. Imagine something; then find the right
people to execute.Things are moving fast, it does not take a lot of
resources anymore to start.
▪ Get out there, dive in, get your hands dirty.
37. References and Trademarks
▪ IEEE (standards, reports)
▪ Chris Dancy (quote, page #6)
▪ Cisco (IoT predictions, page #16)
▪ From “Smart Objects” to “Social Objects”:The Next Evolutionary
Step of the Internet ofThings; Luigi Atzori, University of Cagliari;
Antonio Iera, University of Reggio Calabria; Giacomo Morabito,
University of Catania (evolution to “res socialis”, page #28)
▪ SmartSantander Project, www.smartsantander.eu (page #30)
38. References and Trademarks, continued
▪ IEEE
▪ Arduino LLC
▪ BeagleBoard.org Foundation
▪ Raspberry Pi Foundation
▪ Bluetooth SIG, Inc.
▪ ZigBee Alliance
▪ IFTTT, Inc.
▪ Google Inc.
▪ airqualityegg.com (Joseph
Saavedra)
▪ bwired.nl
▪ Waze Mobile Ltd.
▪ Aerotainment Labs GmbH
39. It’s a thing: the Aerotain Skye
CeBIT 2016:
Your Friendly Floating Camera Drone
ThankYou for Listening.
40. • Technology Strategy
• Cloud Services
• Project Management
• IT Security
• Internet ofThings
Davor Dokonal
Chair,
IEEE Computer Society
Long Island
davor@ieee.org