3. DEFINITION
• Internet of Things (IoT) is an integrated part of Future Internet and could be defined
as a dynamic global network infrastructure with self configuring capabilities based on
standard and interoperable communication protocols where physical and virtual
‘things’ have identities, physical attributes, and virtual personalities and use intelligent
interfaces, and are seamlessly integrated into the information network. In the IoT,
‘things’ are expected to become active participants in business, information and
social processes where they are enabled to interact and communicate among
themselves and with the environment by exchanging data and information ‘sensed’
about the environment, while reacting autonomously to the ‘real/physical world’
events and influencing it by running processes that trigger actions and create
services with or without direct human intervention.
4. FEATURES
• Univocally identifiable and addressable objects
• Artificial Intelligence
• Architecture
• Geo-Localization
• Size Considerations
5. TECHNOLOGIES
• RFID
• WiFi IEEE 802.11
• Barcode e QR Code
• ZigBee IEEE 802.15.4
• Sensors and smartphones
6. TRENDS
WiFi
Barcode e QR Code
Sensors and smartphones
Google Traffic
Transport and Logistics
7. WI-FI
• Widely used both in indoor and outdoor environments
• Low cost
• Highly interoperable
• Maybe not a good solution in some special conditions
8. BARCODE E QR CODE
• Low cost
• No technological difficulties
• Several devices can read a
barcode
• Starting point for more complex
systems
• Example: price comparison
9. SENSORS AND SMARTPHONES
In the near future almost everybody will probably have a smartphone
A smartphone isn't just a mobile phone that has access to the
Internet
The iPhone has a lot of different types of sensors
10. GOOGLE TRAFFIC
Not exactly a IoT application
Example of an application for
everyday usage.
Click on the globe to start
12. INSTANCE ABOUT MARKET GROWTH
• “According to a study conducted by Frost & Sullivan in 2011, the global RFID
market of $3 billion to $4 billion (in 2009) will grow by twelve percent per year
through 2016 and reach a volume of approximately $6.5 billion to almost $9
billion.”
• 80 percent of all households in the European Union are expected to have
intelligent power meters by 2020.
• A building’s energy management can then be monitored and administered
remotely via a smartphone or a PC. Market experts predict that this global
market, which represented $5.3 billion in 2010.
• In February 2012 the Chinese government therefore decided to set up a fund of
approximately $775 million to support this field in the next five years. It will grow
to $11 billion by 2015.
16. I CAN INNOVATE BY SECURITY, PRIVACY AND TRUST
• The Internet of Things presents security-related challenges that are
identified in the IERC 2010 Strategic Research and Innovation Roadmap.
While there are a number of specific security, privacy and trust challenges in
the IoT, they all share a number of transverse non-functional requirements:
• Lightweight and symmetric solutions, Support for resource constrained
devices
• Scalable to billions of devices/transactions Solutions will need to address
federation/administrative co-operation • Heterogeneity and multiplicity of
devices and platforms
• Intuitively usable solutions, seamlessly integrated into the real world
17. SECURITY FOR IOT
• IoT applications use sensors and actuators embedded in the environment
and they collect large volumes of data on room temperatures, humidity,
andlighting to optimize energy consumption and avoid operational failures
that have a real impact on the environment.
• General attack detection and recovery/ resilience to cope with IoT-specific
threats, such as compromised nodes, malicious code hacking attacks.
• The IoT needs to handle virtually all modes of operation by itself without
relying on human control. New techniques and approaches e.g. from
machine learning, are required to lead to a self-managed IoT.
18. TRUST FOR IOT
• The development of trust frameworks that address this requirement will
require advances in areas such as:
• Lightweight Public Key Infrastructures (PKI) as a basis for trust
management. Advances are expected in hierarchical and cross certification
concepts to enable solutions to address the scalability requirements.
• Quality of Information is a requirement for many IoT-based systems where
metadata can be used to provide an assessment of the reliability of IoT
data.
• Assurance methods for trusted platforms including hardware, software,
protocols, etc.
19. PRIVACY FOR IOT
• Cryptographic techniques that enable protected data to be stored processed
and shared, without the information content being accessible to other
parties. Technologies such as homomorphic and searchable encryption are
potential candidates for developing such approaches.
• Techniques to support Privacy by Design concepts, including data
minimization, identification, authentication and anonymity.
• Fine-grain and self-configuring access control mechanism emulating the
real world.
20. INNOVATING THE POMEGRANATE PHONE
• The Pomegranate is a mobile
phone created as a marketing
campaign on behalf of the Government
of Nova Scotia. The website
advertising the product has comical
features such as a harmonica, and
a coffee maker, features seen in fully
or partially later phones such as
a video projector, live
voice translator, and shaving
razor, among many other standard
features
21. WHAT I AM GOING TO DO IF I INTENDED TO WORK ON IOT
As Internet of Things covers a huge scope of industries and applications. I
would like to take a look at some of the technologies that are driving the topic,
from popular communication options to the different software and data
brokerage platforms managing the data exhaust from these systems as below:
• Communication
• Backbone
• Hardware
• Protocols
• Software
• Data Brokers / Cloud Platforms
• Machine Learning
22. THANK YOU..
That’s it from me, I am glad to have this wonderful opportunity to give you a
presentation on Iot.
Notes de l'éditeur
This template is in wide-screen format and demonstrates how transitions, animations, and multimedia choreography can be used to enrich a presentation.
This slide can be used as a background before the presentation begins.