Course – DAY 3_b

Transcription

Course – DAY 3_b
Toward a Definition of Internet of
Things
Roberto Minerva, IEEE IoT Initiative Chair – TIMLab
08 - 10 June 2016
BUT
2
How much Data Mining from IoT
?
http://www.ais.uni-bonn.de/images/Neural_Abstraction_Pyramid.png
http://www.limsi.fr/~jps/enseignement/examsma/2004/BHATTI/index.htm
IoT is instrumental to build Smart Environments. They are smart
because they can manipulate plenty of local data including
personal data.
Who is the owner of these data ? Who owns the inferred information ?
The Data Management and the Data
Ownership Challenges …
3
Identity of Things and User
Profiling
•
•
Each
Resource
addressable
Each
resource
CONNECTED
is
is
– Connectivity must be
guaranteed in a variety
of environments
•
•
Each Resource can be
associated to a User
(Identity)
The
relationship
between a User and an
Object
carries
information
Identity of objects and their relationships
with other objects and other identities
(Humans)
IoT Data and … Identity of Things
Things have Identities (and Owners)
People have Identities and use Things
Me
Identity Relation
Identity Relation
Functional Relations
(events and commands)
Sensors
“My” Smart Thing
Service Provider
Personal
Profiling
Who, Where, When, What, Why, …
What to do with data ?
?
Other
Service
Providers
Sell of contextual Info
Contextual information on
large group of people and
individual derived info
Capturing contextual
Info
Deriving info from and
relationship User – Things Services
Profile Engines
•
•
•
Based on https://securityledger.com/2014/04/will-ot-big-data-create-darwinianstruggle-for-insurance-carriers/
User Profiling
Community
Profiling
Service/App
Profiling
Aggregating Data per Identity …
“OUR” Smart Things
Events and commands
+
*
Raw data to be
transformed into
Info
Functiona
lProfiling
• Who is the Owner
of all these Data ?
• Who has the right
to extract info ?
=
Bigger
DATA
Personal
Profiling
Who, Where, When, What, Why, …
50 B Devices
*
~ 2MB/day
(Average Aggregated Traffic of M2M Devices)
=
~ 88.81 petabytes
/day
Dealing with Data in a Fair Way: Data
Anonimization, Contracts and
Contextualization - Help the User to take
control on his data
https://www.oasis-open.org/committees/xdi/faq.php
Anonymized Data
http://www.mad-mart.com/blog/the-bloomberg-data-privacy-fiasco-prevention-better-than-cure/
http://rsta.royalsocietypublishing.org/content/367/1898/2729
http://www.xerox.com/innovation/news-stories/networking/enus.html
Dealing with Replicable and Controlled Information
Van Jacobson (on a google video): 90 % of the data traffic is not related
to communications services, but to data retrieval
A new data network architecture is needed
Content Centric Networking
A Self-Organizing Network That Meets Information Needs
What Is It? A new approach to networking that enables networks to self-organize
and push relevant content where needed.
Content-centric networking enables communication to happen anywhere, anytime,
and with any device - using any available means.
Information centric networks
Source: http://www.surrey.ac.uk/ics/research/cognitivenetworks/
Module 25: More on Data mining
What are some issues related to
leverage the data produced by IoT
Can you describe issues related to
Privacy, Anonimization, and Ownership
of the data?
What is an Information centric
Network?
11
Context Awareness
The User Context is made
out of different components
of various networks in order
to create a single
environment that fits the
user requirements
http://www.lia.deis.unibo.it/research/MIDAS/
Context Definition
►Computing context:
►Physical context:
►network connectivity,
►lighting, noise,
►communication cost,
►traffic condition,
►communication bandwidth,
►temperature
►nearby resources
►Time Context:
►User context:
►time of a day,
►user profile,
►week,
►location,
►month,
►social situation
►season of a year
►
►
Emotional context:
►
Feeling
►
Psychology
►
...
Social Context
►
People
►
Conventions
►
Etiquette
►
...
Excerpt from: Context Aware Computing Survey Notes by Changqing Zhou available at
http://www-users.cs.umn.edu/~czhou/docs/ContextAware.ppt
A fast pace technological world
dominated by Software
Software Platforms
Protocol Availability
Data Usage and Privacy/Security
Processes and management of IoT
Reliability / Autonomics
A Changing World and some Technologies
= ICT Systems + Artificial Intelligence
Applicable to different scenarios:
–
–
–
–
–
Ambient Intelligence
E-Health
E-government
Social inclusion
...
http://www.infotech.oulu.fi/Annual/2001/MVIS.html
Evolutionary Neuron Migration was
used to evolve neural control
structures for a mobile robot. The
neural structures were able to solve
real problems in perception and
control.
http://ignoranceisfutile.wordpress.com/category/year/2006/
Intelligent Systems will emerge
Ambient Intelligence will be
common
http://www.limsi.fr/~jps/enseignement/examsma/2004/BHATTI/index.htm
Augmented Reality will be
integrated with IoT
http://www.se.rit.edu/~jrv/research/ar/introduction.html
Module 26: Context Awareness
and Ambience Intelligence
What is context awareness?
How IoT relates to Context Awareness?
Can you give an example of a Context
awareness service/application?
What is Ambient Intelligence?
20
COMPLEXITY CHALLENGE
Are we ready to deal with
Billions of smart and
independent things?
Billions of smart
objects cannot be
managed in a
traditional manner
There is the need to
move towards zeroconfiguration and
autonomic systems
Dealing with Complexity at the edge:
Self-Organization of Networks
• Management of complex
and dynamic “Networks
of Networks” will be
critical
• No human intervention
possible
• Competition on resources
http://innovation.gsa.gov/blogs/OCIO.nsf/dx/ManagementInnovators-Bookshelf-Small-Pieces-Loosely-Joined-A-UnifiedTheory-of-the-Web-by-David-Weinberger-2002
Requires
• Self-organization
• Game theory techniques
for
highly
distributed
systems
► What
is it? (from wikipedia)
►IBM has defined the following four
functional areas:
► Self-Configuration
► Self-Healing
► Self-Optimization
► Self-Protection
► Autonomic
Networking follows the
concept of Autonomic Computing. Its
ultimate aim is to apply autonomic
concepts to Networks.
► Functions
of an Autonomic Network:
►Autognostic, Configuration
management, Policy management,
Autodefense, Security
►Connection Fabric (i.e., The connection
fabric supports the interaction with all
the elements and sub-systems of the
autonomic system)
► Principles
of Autonomic Networking
►Compartmentalization (how to
implement the operational rules
and administrative policies for a
given communication context)
►Function re-composition
►Atomization
►Closed control loop
Why? Millions of pervasive nodes!! There is the need of a new approach
Users should be “bothered” by such a cumbersome task!
http://www-03.ibm.com/servers/eserver/zseries/zos/sm/autonomic.html
Autonomic Computing
Autonomic Computing
www.research.ibm.com/journal/sj/421/chess.html
cont.
http://www.ibm.com/developerworks/autonomic/library/ac-edge6/
It defines a new type of architecture (not layered, but
compartmentalized)
Very similar to Autonomous Systems of the Internet
Some Findings
Software Platforms are important
(aggregator role)
Self-Organization of components and
networks is a must
Open and interoperable systems
Data Management Capabilities are
fundamental
Identity, Security and Privacy are a must
Role of Terminals is fundamental
Module 27: complexity
Do you think traditional management
methods will be applicable to large IoT
systems?
Is human intervention desirable ?
What is Autonomocs?
BUSINESS CHALLENGES
Connected Devices: WW forecast
According to HP, at the end of 2011 some 15 B devices were already connected to
a communication network; most of them come from the Consumer Electronics
world. Forecasts for the decade are different, but all follows fast growing curves
Source: ITU 2011
29
WW connectivity revenues in
The Bandwidth Challenge …
2016
Connectivity revenues are forecasted to be
about 10-15% of total revenues
WW connectivity revenues in Million $
Source:Forrester
«Per devices» effect
The Revenue Challenge …
Average revenue per devices changes
very much according to applicative area
Source: Forrester
31
A Twitter of Things: a Transactional
Complex Event Processing
The Data Valorization Challenge
Event
Event
Queue A
Sensor 2
Sensor 3
Security
Sensor n
Monitoring
R.T. Knowledge
extraction
Sensor n+1
Queue B
Sensor n+2
Aggregator a
Aggregator b
Aggregator c
Event
Aggregator d
Aggregator e
Aggregator f
Sensor n+3
Sensor
n+m
Event
Transaction Management
Sensor 1
•
•
•
•
Twitter is for Real Time Web Apps
Twitter is used (in an experimental fashion) for the distribution of alarms from smart
objects
The real time web (and in particular the PubSub models) could support new classes
of services and enabling new platforms and providers:
The twitter of things enables the Brokering role for info exchanged by smart objects
Applications and Data Brokering
The Data Valorization Challenge
33
Different Roles for a Distributed
Objects Ecosystem
Data Producers
Data Aggregator
Info Aggregator
Dispatcher
P
P
P
P
P
P
The Value Chain Challenge
Consumers
A long value chain opens up
opportunities for many Actors
The Ecosystem Challenge
Source: Nokia Siemens Networks
Traditional
Markets
«New»
Markets
Which Business Model For the
Internet of Things?
► Thesis 2: Sensor information should be
made available on an open platform to
allow everyone to offer higher level
services
► Thesis 8: The value of the IoT market grows
more than linearly with the number of
consumers
► Thesis 9: Intermediaries should consider
► Thesis 3: Intermediaries are needed as
coordinating central structures on the IoT
market
The Biz Model Challenge …
subsidizing micro providers to create an
additional incentive for service
provisioning and enable the
intermediaries' business in the first place
► Thesis 14: Incentives will be needed to
stimulate participation of a large number
of (micro) providers
Initial Observations on Economics, Pricing, and Penetration of the Internet of Things Market
Jens-Matthias Bohli, Christoph Sorge, and Dirk Westhoff
ACM SIGCOMM Computer Communication Review
Servitization as a viable Business Model
for IoT
The New Biz Models Challenge
Servitization is the capability of creating a link between a
(physical) product and a set of services and enriched
functionalities that extend, complement, and add value to
the product itself
IoT and the Operators’ Role:
some scenarios
Remotization
Consolidated Scenario pursued by
the Industry (proprietary openness)
Virtualization
Highly Distributed
Business Issues
Value Chain
Viable Business
Models
Prosumers and
Users
Module 28: Business Issues
What is the “per device” effect?
– Is it an alternative to charging for
connectivity?
Is brokering of data a potential
revenue source in the future?
Who are some possible actors of the ioT
value Chain?
What is servitization?
– Please provide an example
40
SOCIETAL CHALLENGES
Identity of Things
The Privacy, Trust, and Ownership
Challenges
• Things can collect user related actions
and data
• Things can be used for tracking Users
• Owners of Things can collect a lot of data
Big Brother Syndrome
42
A “user-centric personal data eco-system” (WEForum)
•
Volunteered data:
•
Observed data: captured by recording the actions of individuals
•
Inferred data: based on analysis
created and explicitly shared by individuals
of volunteered or observed information
Personal Data
should be properly
regulated and
managed
Excerpt form: “Personal Data - The Emergence of a New Asset Class” (WEF)
Source: Bain & Company
Fair Management of Personal
Data
IoT Usability
How Many Sensors !!
What a complicated
system
What useful Services ?
How to use them?
How to deploy them
How to maintain them?
www.bwired.nl
The Usability and Effectiveness Challenges
(Social) Cooperation is very
important
The Socialization Challenge of IoT
A fundamental aspect of all adaptive systems is cooperation.
Natural selection favors cooperation, if the benefit of the altruistic act, b,
divided by the cost, c, exceeds the average number of neighbors, k, which
means b/c > k.
It is necessary enforcing altruistic behaviors in IoT networks (social
aspects on it)
Hisashi Ohtsuki, “A simple rule for the evolution of cooperation
on graphs and social networks”, Nature, Letters, Vol 441|25 May 2006|doi:10.1038/nature04605
Fab Lab and the Doers … a social Impact on
IoT
fab lab (fabrication laboratory)
is a factory enabling the
“digital fabrication”
The fab lab program was initiated by Media Lab in Massachusetts Institute of
Technology (MIT), in cooperation with Grassroots Invention Group and the Center for
Bits and Atoms (CBA)
Business Models of the FabLab
http://www.openp2pdesign.org/2011/fabbing/business-models-for-fab-labs/
 The
Enabler business
model.
 the Education business
model.
 The Incubator business
mode.
 The Replicated /
Network business
model: provide a product, service or
curriculum that operates by utilizing the
infrastructure, staff and expertise of a
local Fab Lab.
How Much does it cost ?
CNN reported that the Center for Bits and Atoms was funded with
$14 million by the National Science Foundation in 2001. Anyway,
starting a Fab Lab should be much cheaper: Fab Lab Afghanistan
(in its wiki) and allbusiness.com reported that a full Fab Lab
currently costs about $50,000-$55,000 in equipment and
materials without MIT’s involvement. Other sources like
ideasexist.com and aps.org reported that a Fab Lab should costs
only about $20,000.
 In 2009, the Center for a Stateless Society proposed to organize a
Fab Lab using open-source tools such as the Fab@Home 3D
printer, with resulting costs between $2,000 and $5,000 total.
Bart Bakker of Utrecht, Netherlands built one for under € 3000.
Another initiative called Replab.org proposed the construction of
an open source Fab Lab that costs $12,500.

http://www.openp2pdesign.org/2011/fabbing/business-models-for-fab-labs/
Do It Yourself Culture
The DIY ethic refers to the ethic of self-sufficiency through completing tasks without the aid of a
paid expert. Literally meaning "do it yourself," the DIY ethic promotes the idea that anyone is
capable of performing a variety of tasks rather than relying on paid specialists. The DIY ethic
requires that the adherent seeks out the knowledge required to complete a given task. The term
can refer to a variety of disciplines, including home improvement, first aid or creative works.
Arduino, one of the enablers of the Makers Movement
Social Issues
The Big Brother Syndrome
Fairness to Users
Easiness of usage
Security and Privacy
Disappearing Interfaces
Providers responsibility
Customers’ acceptance
Module 29: Social Issues
How would you define the big brother syndrome in the
context of IoT?
What different types of data can be defined as
“Personal” ?
Would social cooperation and altruistic behavior an
enabler for Edge Computing?
How are the makers? What is the Do it your self
movement? Are these relevant in the context of IoT?
52
Back to the challenges
IoT Challenges
54
IoT Challenges categories
Regulation
IoT
Challenges
Technical
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
Platform
Security
Signaling and Protocols
Data Management
Cloud
Large System Management
(autonomics)
Power Consumption
Connectivity
Programmability
Complexity
Standardization
Virtualization
Smart Objects
Communication Paradigms
(cooperation and gossiping)
…
•
•
•
•
•
•
•
•
Business
Market Value
New Business Models
New Ecosystem
Applications Domains
New Business
Processes
User Needs
Market and solutions
fragmentation
…
Societal
•
•
•
•
•
•
•
Security
Privacy
Trust
Usability
Effectiveness
Social Control
…
A Major Challenge of IoT
Global Cooperation !!!
Module 30: IoT Challenges
What is your perspective on IoT
challenges now?
What are the most relevant challenges
from your point of view?
56
Agenda – Internet of Things
The Context of IoT
A Definition of IoT
A few Challenges of IoT
What Things are …
Networks of Things
Technologies of
Communications
–
–
–
–
–
Access Technologies
Protocols
SW Platforms
Middleware
Standards
IoT Challenges
– Identity, Data, and
Ownership
– Complex System
– Business Issues
– Social Issues
Virtual Continuum
IOT Scenarios
The IEEE IoT Initiative
TOWARDS A VIRTUAL
CONTINUUM
Evolutionary roadmap for key
functional elements
M2M
Key elements:
Separated applications
Ad-hoc designed modules
Ubiquitous connectivity
SIM management
International agreements
Embedded SIM
IoT
Virtual
Continuum
Key elements:
Low-cost standard sensors
Short range communication
Capillary and macro netw.
Horizontal Services
Data aggregation in cloud
Third party development
Key elements:
“Virtual Objects”
Mirroring Things in cloud
Object Semantics
Data integration,
federation and portability
Cloud as developing platf.
The Virtual Continuum
Entanglement
Virtual Continuum is Virtualization of
Resources
Virtual Continuum
ICT Resources
Global
Services
Local
Services
Interface
Extended
Functions /Interface
Virtualization
in the “Net”
ICT
Resource
API
Resource
Global
Services
Physical/Logical
Resources
API
Extended
Functions /Interface
Virtualization
in the “Net”
Physical
Resource
API
API
Resource
•
Each Resource
is representable
•
Each resource is
programmable
•
Each Resource
can be
functionally
augmented
Virtualization and APIs as means to
enter into the Virtual Continuum
•
Cloud
Applications
Normalized
Interfaces
•
•
Decoupling of physical objects
and virtual ones (Virtual
Continuum)
Normalized applications can
be built on Virtual Objects
(having an impact on Physical
Objects)
Servitization
Virtual
Objects
Each Virtual Object will
have:
- A unique identifier
- A contract
- An API
- A communication
mechanism (PubSub)
Proprietary Protocols
Real World
Objects
Sensors
Things
Actuators
Terminals
The Context for Virtual
Continuum
mobile
devices
physical
world
Secure,
always best
connected
virtualized
channel
images of
terminals
and objects
(Proxying and Security
Functions)
Virtual
Environment
applications
& services
Computing Cloud
Brokering and
Aggregation Function
Virtualized
resources
smart
objects
network resources
processing resources
storage resources
Platform View
Terminal
to Cloud
Relationship
App Ecosystem
Service/Apps
Value
Mobile Device Platform
API
Middleware
Functions
Autonomics and Self
Organization
Communication Engine
(e.g., event based)
Brokering of Virtual
Objects
Data Management
Objects
management
Objects
Registry
API
API
Extensive Objects Virtualization
Native
Operating
System
Terminal
to Capillary
Relationship
Programmability
Value
API
Ecosystem Value
Comm
Value
Always Best
Connected Comm.
Processing
Things
Platform Value
Communications
T
a
g
Sensors
Tags
Storage
Others
Telco
Building
Blocks
Module 31: Virtual Continuum
What is the virtual continuum?
How does it relates to IoT?
Can physical objects be virtualized?
What are the advantages?
Virtual Continuum is supported by a
specific Business model. Can you name
it? (Servitization)
65
Agenda – Internet of Things
The Context of IoT
A Definition of IoT
A few Challenges of IoT
What Things are …
Networks of Things
Technologies of
Communications
–
–
–
–
–
Access Technologies
Protocols
SW Platforms
Middleware
Standards
IoT Challenges
– Identity, Data, and
Ownership
– Complex System
– Business Issues
– Social Issues
Virtual Continuum
IOT Scenarios
The IEEE IoT Initiative
A FEW SCENARIOS
IoT: Application Domains
The Vertical vs. Horizontal
markets challenge
Source: Beecham Research
CeNSE : The Central Nervous System for the Earth
Revolutionize human interaction with the earth as profoundly as the internet has revolutionized personal and business interactions
A irfra me in teg rity
P ass en ge r C om fort
Photovoltaics
Wil dl ife tra cki ng
Pe rso nal s en so r su bn et
One trillion nanoscale sensors and actuators
will need the equivalent of 1000 internets
Exascale
Mem ory
In form a tion Cons um e rs
La rge stru ctur e i nteg ri ty
We ather
Se rvi ce
N ano
C omputing
Au tom ake r
W il dli fe
R es ea rch
W ir ele ss
Ca rri e r
Sec uri ty
Se rvi ce
Oi l & Ga s
Ai rli ne
Nanowire
Chemical
Sen sor
D e pt. of
Tra ns po rtati on
Glo ba l
R etai l er
Ho me au tom ati on syste m
Ho me se curity sys te m
MEMS
Inertial
S ensor
Ts un am i w ar ni ng syste m
Re al ti m e tra ffi c co nd itio n s
Me rch an d ise trac kin g
Optical
Interconnect
Sei smi c oi l e xpl or ation
69
R. Minerva, Telecom
Italia / Future Centre
C li ma te m on ito rin g
Photonic
Sw itch
A new way of Shopping
Tags identify the person
and the objects
Tracking
«Invasive» tecnology
if not well managed
70
http://www.forbes.com/global/2002/0318/092chart.html
Shopping
IoT mid term Scenarios: Smart
Cities
The umbrella
for many
applications
• Local energy
production/renewables
• Smart grid
• Lower emissions
• Public lighting
• Water, gas, energy distribution
• Waste management
Urban
Sustainability
Sustainable
mobility
•Traffic management, ZTL
•Parkings
•Eco-transport
•Car sharing
•Teleworking
• Service monitoring
• Security
• Sensor Networks
• e-Tourism
• WiFi
• Dematerialization
Connected
Town
Intelligent
Building
•Security
•Energy management
•Heating/cooling
•Networks
71
IoT mid term techs: iper-sensorized Home
Monitoring and control in the Connected Home
Motorized
blind
control
Load &
energy
consumption
control
Videosurveillan
ce
alarms
Comfort
and
wellness
Movemen
t sensors
Light dimmer
and switch
on/off control
One by one
room
management
Cooling and
heating
control
Monitoring consumption utilities
(electricity, gas, water)
Supervision
from touch
panel
Alarm
panel
Remote
control and
manageme
nt
Motorized
access
control
• Set of services oriented to home devices management
(meters, appliances, detectors, alarms, etc..) provided
through connection to a Home Automation Network:
Energy management:
management of home energy
consumption (standby, overload,
optimization time zones ..)
Connected appliances: usage
monitoring, remote management
and consumption of household
appliances
Comfort & Security: monitoring
remote environments through
sensors and intrusion detection
devices for home safety
e-Health/wellness to Ambient
Assisted Living: automated
remote monitoring of people
needing care or prevention
Remote Caring: remote assistance
to manage the overall home LAN
and related devices/sensors
72
http://www.google.com/powermeter/about/about.html
Smart Metering (by google)
http://www.mwpr.ca/articles/articles_8956/smart-meters.jpg
Smart Metering Scenarios
http://www.ppc-ag.de/3-1-Smart-Metering.html
https://www.arm.com/assets/images/tpl/smart-meter-infrastructureLG.png
TSP/MSC Communication Networks and Services (ComNETS)
IoT mid term techs: Body
Sensors for Health and wellness
A use case: Fitbit
A use case: Insulin Pumps
Remote control
PC
Sync
• reminde
rs
• alerts
Mobile App
3G/4G
Tracker
Interne
t
Fitbit.co
m
Access
Gateway
•
•
•
•
accelerometer
altimeter
wireless
rechargeable
Smart
Gateway
Internet
Web Data Access
Access
Gateway
PC
Insuli
n
Pump
s
Glucomete
r
• In May 2012 U.S. Federal Communications Commission approved spectrum for medical body area
networks (MBANs) allotting the frequencies between 2360 and 2400 MHz
• The sensors can monitor various vital signs, such as temperature, blood pressure or glucose levels,
and transmit the information to a control device over the 2,4GHz band
75
Intelligent Carpet
Applicazioni
strike
Schema tecnicoTM
I N T E L L I G E N T
Scheda di
elaborazione e
trasmissione dati
wireless
Sensori per il
rilevamento
Sistema di auto
alimentazione
strike
I N T E L L I G E N T
C A R P
Modulo 100 x 100
C A R
P E T
Elaboratore
remoto e ricevitore
dati wireless
Copertura in
gomma
Ignifuga
idrorepellente
E T
3
Lo “Stike Intelligent Carpet” si presta ad una molteplicità di possibili impieghi. Le applicazioni prevalenti
riguardano il monitoraggio degli accessi pedonali in un’area delimitata (ad esempio un locale) e il
monitoraggio dei flussi pedonali in un’area aperta (ad esempio una strada).
Monitoraggio accessi
Un unico “Stike Intelligent Carpet” posto
all’ingresso dell’area delimitata consente di
misurare quante persone entrano ed escono in
un determinato periodo di tempo dall’area e di
monitorare in tempo reale il grado di
affollamento dell’area medesima.
Check the
Number of
Tourists entering
in Venice
Monitoraggio flussi
Due “Stike Intelligent Carpet” posti all’inizio e
alla fine di una determinata area aperta
consentono di misurare il numero di persone
che transitano in un determinato periodo di
tempo nell’area medesima, di verificare il
percorso compiuto (entrano da un varco ed
escono da quello opposto oppure tornano
indietro ed escono da quello di ingresso) e di
monitorare in tempo reale il grado di
affollamento dell’area.
4
Module 32: Mid term scenario
Do you think IoT can change the
shopping patterns of users?
Are home related scenarios of interest
to the users?
– Security is a concern ? And privacy?
Do you see any scalability from home
and building monitoring to smart city
applications?
77
KALEIDOS – System Logical
Architecture
KALEIDOS – Example
Centrale Torino-Centro
79
Topologia della Rete di Sensori
installata
Augmented Reality
http://smallbizaffinity.com/WP/wp-content/uploads/2009/10/augmented-reality.jpg
Botanical
A Sensor Network Like This ?
www.botanicalls.com
A Chinese Example of IoT and Agriculture
http://dimsums.blogspot.it/2014/01/internet-of-things-for-chinas.html
TransHumanism
Invasive Technology ?
http://wiki.nectec.or.th/itswiki/pub/Forum/ISO-CALM-Seminar/20070514_ISO_CALM_short.pdf
An Example in Intelligent Systems: Automotive
Communication Scenarios (CALM)
1.GPS/GALILEO
1.Satellite
1.Broadcast
► CALM
(Communications,
Air-Interface Long and
Medium Range)
architecture is defined by
ERTICO
► What
1.Terrestrial
1.Broadcast
1.Portable1.Cellular
1.Internet
is it for ?
►Wireless Automotive
Communication
►Electronic Toll Collection
►„Advising“ Road Signs
►Internet in the Car
►Electronic Travel Guide
►Inter-Car Communication
(Safety!)
►More than 100 Applications
identified Calm Architecture from Ertico
1.Portable
1.Cellular
1.Internet
1.Hot-Spot
1.(Wireless
1.LAN)
1.RSE
1.RSE
1.RSE
1.CALM M5
1.RSE-to- 1.WAVE *
1.RSE *
1.RSE
1.vehicle-to-vehicle *
1.(CALM 5 or 60 GHz)
1.5.8GHz
1.DSRC
1.CALM 1.portable-to1.vehicle
1.IR *
ITS Infrastructure
Service Center
Adaptation Location
Service
Service
85
Profiling
Service
…
86
Module 33: other application
domains
What can IoT do for agriculture or plant
care?
Can you propose an application
scenario to be added to iot.ieee.org ?
87
Expenditure on E-Health as a percentage of GPD
A Challenge: how to use technologies to cut costs and
improve quality in the health environment
E-Health: a complex scenario
Actuators
WSN
Sensors
Adapted from https://tspace.library.utoronto.ca/html/1807/4743/jmir_v7i1e9_fig6.png
A “ Usual” Medical Application
http://www.infotech.oulu.fi/Annual/2007/pics/opme_19.jpg
E-Health: context related
applications
http://www.ctit.utwente.nl/research/sro/old/ehealth/
http://www.acl.icnet.uk/lab/research.html
Sensors: some Examples in EHealth
Source: http://postscapes.com/internet-of-things-award/project/libelium-open-source-e-health-sensor-platform/
Low Cost Sensors
https://www.cooking-hacks.com/ehealth-sensors-complete-kitbiometric-medical-arduino-raspberry-pi
An Example: BedSores
http://medtecheurope.blogactiv.eu
/2014/04/02/when-design-meetsmedtech-three-ideas-inpreventing-and-managingpressure-ulcers/
http://www.sokasleep.com/blog/
Progress will be
determined by the
integration of different
fields of expertise
Big Data and e-Health
http://www.mitforumcambridge.org/news/auto-id-labs-big-data-start-upchallenge/attachment/omnichanneldatasources/
Some observation on (e-health)
Data
E-Health Data will contribute to the Data
Surge
• Many data from health related sources
• Integration with wellness systems
• Multimedia data
Privacy of data and fair usage
• There is the need to protect the final user/ patient
• New ownership of data are to be defined (Bank of user
data)
IoT and Big Data analysis will go hand in
hand
• Exploitation and monetization of data sets
• Collection of data and new applications fields is essentially
undiscovered
http://www.ece.gatech.edu/research/labs/msl/research/
http://medicalxpress.com/news/2015-06-patients-recoverarm-virtual-reality.html
A rehabilitation scenario
Module 34: e-health
Can you explain the differences between the e-health
application domain and the wellness one?
– Do you see any regulation or legislation constraints?
How would you use the e-health data? Can you provide
examples?
Do you think the sensor and the equipment market is
ready for applications with strong availability constraints
and reliability requirements?
98
Agenda – Internet of Things
The Context of IoT
A Definition of IoT
A few Challenges of IoT
What Things are …
Networks of Things
Technologies of
Communications
–
–
–
–
–
Access Technologies
Protocols
SW Platforms
Middleware
Standards
IoT Challenges
– Identity, Data, and
Ownership
– Complex System
– Business Issues
– Social Issues
Virtual Continuum
IOT Scenarios
The IEEE IoT Initiative
A FEW WORDS ABOUT
IEEE INITIATIVE ON IOT
An IEEE Initiative on IoT: Goal and
Objectives
101
IEEE IoT will be a cross-disciplinary initiative fostering collaboration and connecting
technical & business communities to IEEE experts and resources
Establish IEEE as a Thought Leader and essential to the IoT community
IEEE to be recognized as the go-to resource for:
– engineering and technology professionals in industry, academia and government
working on IoT;
– broad education of the public (including consumers) and governmental bodies
desiring non-biased and balanced understanding of IoT developments, including
its related technologies, products, implementation and its ongoing evolution.
Develop and promote valued programs, products and services for the IoT community.
To establish:
– The IEEE World Forum on IoT as the principal conference devoted to IoT
– The IEEE IoT Journal as the principal journal devoted to IoT
– IEEE IoT standards as the principal standards in IoT
– IEEE’s IoT tutorials, review articles, workshops, short courses and similar
activities as the principal IoT educational activities.
IOT Initiative Organization
Program
Director
(H.Tepper)
Education
Track
Publications
Track
(A. Pears)
(Y.K. Chen)
Education
Working
Group
Publications
Working
Group
Industry
Engagement
Track
(O. Logvinov)
Ind. Engag.
Working
Group
Chair
(R. Minerva)
FDC
Director
(W. Tonti)
Conferences
Track
Standards
Track
(V. Piuri)
(C. Adams)
Conferences
Working
Group
Standards
Working
Group
Content /
Community
Dev. Track
(L. Stogner)
Content /
Cmmty Dev.
Working
Group
Scenarios
Track
(H. Berndt)
Scenarios
Working
Group
Seeking Volunteers for Scenarios, Application Designs, Reference Implementations.
Join the Technical Community at http://iot.ieee.org/
Grazie
Roberto Telecom Italia Lab – IEEE IoT Initiative
roberto.minerva@telecomitalia.it
WhatA are
the Things of
Measure
«Internet of Things» ?
An action
Flex Sensor [source:sparkfun]
A Sensor
A sensor is an object whose purpose
is to detect events or changes in its
environment, and then provide a
corresponding output [Wikipedia]
Properties
• it is sensitive to the measured property,
• it is insensitive to any other property
likely to be encountered in its
application, and
• it does not influence the measured
property.
An Actuator
A device capable of
executing
an action
An actuator is the mechanism by which a
control system acts upon an environment.
The control system can be simple (a fixed
mechanical or electronic system),
software-based (e.g. a printer driver, robot
control system), a human, or any other
input.
Towards a practical definition of
Middleware
Goal: to allow the remote communication between software programs
RPC
Appl.
Appl.
I/F
Appl.
Appl.
I/F
Marshalling
Stub
OS
Net Driver
Stub
OS
Communication
Protocol
Net Driver
Network
HW
App
HW
App
OS
OS
HW
HW
An Hybrid solution: XML + RPC
From Wikipedia: “XML-RPC is a
remote procedure call protocol
which uses XML to encode its
calls and HTTP as a transport
mechanism. It is a very simple
protocol, defining only a
handful of data types and
commands, and the entire
description can be printed on
two pages of paper. This is in
stark contrast to most RPC
systems, where the standards
documents often run into the
hundreds of pages and require
considerable software support
in order to be used.”
http://www-128.ibm.com/developerworks/webservices/library/ws-xml-rpc/
XML-RPC Data Representation
Tag
Type
Example
<i4> or <int>
four-byte signed integer
-12
<boolean>
0 (false) or 1 (true)
1
<string>
string
hello world
<double>
double-precision signed floating
point number
-12.214
<dateTime.iso8601>
date/time
19980717T14:08:55
<base64>
base64-encoded binary
eW91IGNhbid0IHJlYW
QgdGhpcyE=
REST: http example
http://vaassudevan.blogspot.it/p/rest-architectural-style-for-web.html
REST Principles
[RP1] The key abstraction of information is a resource, named by an URL. Any
information that can be named can be a resource.
[RP2] The representation of a resource is a sequence of bytes, plus representation
metadata to describe those bytes. The particular form of the representation can be
negotiated between REST components.
[RP3] All interactions are context-free: each interaction contains all of the
information necessary to understand the request, independent of any requests that
may have preceded it.
[RP4] Components perform only a small set of well-defined methods on a
resource producing a representation to capture the current or intended state of that
resource and transfer that representation between components. These methods are
global to the specific architectural instantiation of REST; for instance, all resources
exposed via HTTP are expected to support each operation identically.
[RP5] Idempotent operations and representation metadata are encouraged in
support of caching and representation reuse.
[RP6] The presence of intermediaries is promoted. Filtering or redirection
intermediaries may also use both the metadata and the representations within
requests or responses to augment, restrict, or modify requests and responses in a
manner that is transparent to both the user agent and the origin server.
http://www.softwarearchitecturebook.com/svn/main/slides/ppt/
Interface Uniformity
All resources are accessed with a generic interface (e.g., HTTP:
GET,POST,PUT,DELETE,HEAD,OPTION,TRACERESTfull,
CONNECT)
CREATE - PUT,POST
READ
- GET,HEAD or OPTIONS
UPDATE- PUT
DELETE - DELETE
(or)
GET
read
POST
create,update,delete
PUT
create,update
REST
DELETE delete
ELEMENTS
http://www.cs.colorado.edu/~kena/classes/7818/f06/lectures/19/index.html
REST — Data Elements and
interface
1.Resource Structure and URI Graph
2.Representation of each node type/resource
3.Defined Operation on each resource
http://vaassudevan.blogspot.it/p/rest-architectural-style-for-web.html
http://www.softwarearchitecturebook.com/svn/main/slides/ppt/
Middleware
(cont.)
Definition: a simple layer aiming at simplifying the RPC programming
Marshaling (parameter “translation”)
Definition of Interfaces
Mapping to Native Specific Operating System
I/F
Stub
App
App
Middleware
Middleware
OS
OS
HW
HW
Homogeneous Operating Systems
http://image.slidesharecdn.c
scottamyxcasestudybuildingiotproductswithopen
ceiotworld-150515172451
app6892/95/wearables
strategy-18638.jpg?cb=1431710792
112
Contiki OS
http://jeremyudit.blogspot.it/2012_08_01_archive.html
Smart Metering Configuration
http://www.leonardo-energy.org/webfm_send/435
Functional Elements of Open
M2M Architecture
Application (A)
Application is a software program which provides users with useful data based on devices resources and enables them to control devices.
Application runs on end-point, gateway, or server.
Resource Service Entity (RSE)
Resource Service Entity is a functional module located in a device. It is responsible for device resource management and offers service functions
such as network, security, registration/discovery, subscription, billing, etc. for an application, another resource entity, a directory manager, or an
application repository.
Application Repository (AR)
Application Repository is a storage designed to be able to upload and download applications. It manages application descriptions and registers its
application descriptions to Application Directory Manager.
Directory Manager (DM)
Directory Manager includes Device Directory Manager, Topic Directory Manager, and Application Directory Manager. Each directory manager
provides device-, topic-, application-based
registration/discovery and topic-based publish/subscribe functions.
115