Course – DAY 3_b
Transcription
Course – DAY 3_b
Toward a Definition of Internet of Things Roberto Minerva, IEEE IoT Initiative Chair – TIMLab 08 - 10 June 2016 BUT 2 How much Data Mining from IoT ? http://www.ais.uni-bonn.de/images/Neural_Abstraction_Pyramid.png http://www.limsi.fr/~jps/enseignement/examsma/2004/BHATTI/index.htm IoT is instrumental to build Smart Environments. They are smart because they can manipulate plenty of local data including personal data. Who is the owner of these data ? Who owns the inferred information ? The Data Management and the Data Ownership Challenges … 3 Identity of Things and User Profiling • • Each Resource addressable Each resource CONNECTED is is – Connectivity must be guaranteed in a variety of environments • • Each Resource can be associated to a User (Identity) The relationship between a User and an Object carries information Identity of objects and their relationships with other objects and other identities (Humans) IoT Data and … Identity of Things Things have Identities (and Owners) People have Identities and use Things Me Identity Relation Identity Relation Functional Relations (events and commands) Sensors “My” Smart Thing Service Provider Personal Profiling Who, Where, When, What, Why, … What to do with data ? ? Other Service Providers Sell of contextual Info Contextual information on large group of people and individual derived info Capturing contextual Info Deriving info from and relationship User – Things Services Profile Engines • • • Based on https://securityledger.com/2014/04/will-ot-big-data-create-darwinianstruggle-for-insurance-carriers/ User Profiling Community Profiling Service/App Profiling Aggregating Data per Identity … “OUR” Smart Things Events and commands + * Raw data to be transformed into Info Functiona lProfiling • Who is the Owner of all these Data ? • Who has the right to extract info ? = Bigger DATA Personal Profiling Who, Where, When, What, Why, … 50 B Devices * ~ 2MB/day (Average Aggregated Traffic of M2M Devices) = ~ 88.81 petabytes /day Dealing with Data in a Fair Way: Data Anonimization, Contracts and Contextualization - Help the User to take control on his data https://www.oasis-open.org/committees/xdi/faq.php Anonymized Data http://www.mad-mart.com/blog/the-bloomberg-data-privacy-fiasco-prevention-better-than-cure/ http://rsta.royalsocietypublishing.org/content/367/1898/2729 http://www.xerox.com/innovation/news-stories/networking/enus.html Dealing with Replicable and Controlled Information Van Jacobson (on a google video): 90 % of the data traffic is not related to communications services, but to data retrieval A new data network architecture is needed Content Centric Networking A Self-Organizing Network That Meets Information Needs What Is It? A new approach to networking that enables networks to self-organize and push relevant content where needed. Content-centric networking enables communication to happen anywhere, anytime, and with any device - using any available means. Information centric networks Source: http://www.surrey.ac.uk/ics/research/cognitivenetworks/ Module 25: More on Data mining What are some issues related to leverage the data produced by IoT Can you describe issues related to Privacy, Anonimization, and Ownership of the data? What is an Information centric Network? 11 Context Awareness The User Context is made out of different components of various networks in order to create a single environment that fits the user requirements http://www.lia.deis.unibo.it/research/MIDAS/ Context Definition ►Computing context: ►Physical context: ►network connectivity, ►lighting, noise, ►communication cost, ►traffic condition, ►communication bandwidth, ►temperature ►nearby resources ►Time Context: ►User context: ►time of a day, ►user profile, ►week, ►location, ►month, ►social situation ►season of a year ► ► Emotional context: ► Feeling ► Psychology ► ... Social Context ► People ► Conventions ► Etiquette ► ... Excerpt from: Context Aware Computing Survey Notes by Changqing Zhou available at http://www-users.cs.umn.edu/~czhou/docs/ContextAware.ppt A fast pace technological world dominated by Software Software Platforms Protocol Availability Data Usage and Privacy/Security Processes and management of IoT Reliability / Autonomics A Changing World and some Technologies = ICT Systems + Artificial Intelligence Applicable to different scenarios: – – – – – Ambient Intelligence E-Health E-government Social inclusion ... http://www.infotech.oulu.fi/Annual/2001/MVIS.html Evolutionary Neuron Migration was used to evolve neural control structures for a mobile robot. The neural structures were able to solve real problems in perception and control. http://ignoranceisfutile.wordpress.com/category/year/2006/ Intelligent Systems will emerge Ambient Intelligence will be common http://www.limsi.fr/~jps/enseignement/examsma/2004/BHATTI/index.htm Augmented Reality will be integrated with IoT http://www.se.rit.edu/~jrv/research/ar/introduction.html Module 26: Context Awareness and Ambience Intelligence What is context awareness? How IoT relates to Context Awareness? Can you give an example of a Context awareness service/application? What is Ambient Intelligence? 20 COMPLEXITY CHALLENGE Are we ready to deal with Billions of smart and independent things? Billions of smart objects cannot be managed in a traditional manner There is the need to move towards zeroconfiguration and autonomic systems Dealing with Complexity at the edge: Self-Organization of Networks • Management of complex and dynamic “Networks of Networks” will be critical • No human intervention possible • Competition on resources http://innovation.gsa.gov/blogs/OCIO.nsf/dx/ManagementInnovators-Bookshelf-Small-Pieces-Loosely-Joined-A-UnifiedTheory-of-the-Web-by-David-Weinberger-2002 Requires • Self-organization • Game theory techniques for highly distributed systems ► What is it? (from wikipedia) ►IBM has defined the following four functional areas: ► Self-Configuration ► Self-Healing ► Self-Optimization ► Self-Protection ► Autonomic Networking follows the concept of Autonomic Computing. Its ultimate aim is to apply autonomic concepts to Networks. ► Functions of an Autonomic Network: ►Autognostic, Configuration management, Policy management, Autodefense, Security ►Connection Fabric (i.e., The connection fabric supports the interaction with all the elements and sub-systems of the autonomic system) ► Principles of Autonomic Networking ►Compartmentalization (how to implement the operational rules and administrative policies for a given communication context) ►Function re-composition ►Atomization ►Closed control loop Why? Millions of pervasive nodes!! There is the need of a new approach Users should be “bothered” by such a cumbersome task! http://www-03.ibm.com/servers/eserver/zseries/zos/sm/autonomic.html Autonomic Computing Autonomic Computing www.research.ibm.com/journal/sj/421/chess.html cont. http://www.ibm.com/developerworks/autonomic/library/ac-edge6/ It defines a new type of architecture (not layered, but compartmentalized) Very similar to Autonomous Systems of the Internet Some Findings Software Platforms are important (aggregator role) Self-Organization of components and networks is a must Open and interoperable systems Data Management Capabilities are fundamental Identity, Security and Privacy are a must Role of Terminals is fundamental Module 27: complexity Do you think traditional management methods will be applicable to large IoT systems? Is human intervention desirable ? What is Autonomocs? BUSINESS CHALLENGES Connected Devices: WW forecast According to HP, at the end of 2011 some 15 B devices were already connected to a communication network; most of them come from the Consumer Electronics world. Forecasts for the decade are different, but all follows fast growing curves Source: ITU 2011 29 WW connectivity revenues in The Bandwidth Challenge … 2016 Connectivity revenues are forecasted to be about 10-15% of total revenues WW connectivity revenues in Million $ Source:Forrester «Per devices» effect The Revenue Challenge … Average revenue per devices changes very much according to applicative area Source: Forrester 31 A Twitter of Things: a Transactional Complex Event Processing The Data Valorization Challenge Event Event Queue A Sensor 2 Sensor 3 Security Sensor n Monitoring R.T. Knowledge extraction Sensor n+1 Queue B Sensor n+2 Aggregator a Aggregator b Aggregator c Event Aggregator d Aggregator e Aggregator f Sensor n+3 Sensor n+m Event Transaction Management Sensor 1 • • • • Twitter is for Real Time Web Apps Twitter is used (in an experimental fashion) for the distribution of alarms from smart objects The real time web (and in particular the PubSub models) could support new classes of services and enabling new platforms and providers: The twitter of things enables the Brokering role for info exchanged by smart objects Applications and Data Brokering The Data Valorization Challenge 33 Different Roles for a Distributed Objects Ecosystem Data Producers Data Aggregator Info Aggregator Dispatcher P P P P P P The Value Chain Challenge Consumers A long value chain opens up opportunities for many Actors The Ecosystem Challenge Source: Nokia Siemens Networks Traditional Markets «New» Markets Which Business Model For the Internet of Things? ► Thesis 2: Sensor information should be made available on an open platform to allow everyone to offer higher level services ► Thesis 8: The value of the IoT market grows more than linearly with the number of consumers ► Thesis 9: Intermediaries should consider ► Thesis 3: Intermediaries are needed as coordinating central structures on the IoT market The Biz Model Challenge … subsidizing micro providers to create an additional incentive for service provisioning and enable the intermediaries' business in the first place ► Thesis 14: Incentives will be needed to stimulate participation of a large number of (micro) providers Initial Observations on Economics, Pricing, and Penetration of the Internet of Things Market Jens-Matthias Bohli, Christoph Sorge, and Dirk Westhoff ACM SIGCOMM Computer Communication Review Servitization as a viable Business Model for IoT The New Biz Models Challenge Servitization is the capability of creating a link between a (physical) product and a set of services and enriched functionalities that extend, complement, and add value to the product itself IoT and the Operators’ Role: some scenarios Remotization Consolidated Scenario pursued by the Industry (proprietary openness) Virtualization Highly Distributed Business Issues Value Chain Viable Business Models Prosumers and Users Module 28: Business Issues What is the “per device” effect? – Is it an alternative to charging for connectivity? Is brokering of data a potential revenue source in the future? Who are some possible actors of the ioT value Chain? What is servitization? – Please provide an example 40 SOCIETAL CHALLENGES Identity of Things The Privacy, Trust, and Ownership Challenges • Things can collect user related actions and data • Things can be used for tracking Users • Owners of Things can collect a lot of data Big Brother Syndrome 42 A “user-centric personal data eco-system” (WEForum) • Volunteered data: • Observed data: captured by recording the actions of individuals • Inferred data: based on analysis created and explicitly shared by individuals of volunteered or observed information Personal Data should be properly regulated and managed Excerpt form: “Personal Data - The Emergence of a New Asset Class” (WEF) Source: Bain & Company Fair Management of Personal Data IoT Usability How Many Sensors !! What a complicated system What useful Services ? How to use them? How to deploy them How to maintain them? www.bwired.nl The Usability and Effectiveness Challenges (Social) Cooperation is very important The Socialization Challenge of IoT A fundamental aspect of all adaptive systems is cooperation. Natural selection favors cooperation, if the benefit of the altruistic act, b, divided by the cost, c, exceeds the average number of neighbors, k, which means b/c > k. It is necessary enforcing altruistic behaviors in IoT networks (social aspects on it) Hisashi Ohtsuki, “A simple rule for the evolution of cooperation on graphs and social networks”, Nature, Letters, Vol 441|25 May 2006|doi:10.1038/nature04605 Fab Lab and the Doers … a social Impact on IoT fab lab (fabrication laboratory) is a factory enabling the “digital fabrication” The fab lab program was initiated by Media Lab in Massachusetts Institute of Technology (MIT), in cooperation with Grassroots Invention Group and the Center for Bits and Atoms (CBA) Business Models of the FabLab http://www.openp2pdesign.org/2011/fabbing/business-models-for-fab-labs/ The Enabler business model. the Education business model. The Incubator business mode. The Replicated / Network business model: provide a product, service or curriculum that operates by utilizing the infrastructure, staff and expertise of a local Fab Lab. How Much does it cost ? CNN reported that the Center for Bits and Atoms was funded with $14 million by the National Science Foundation in 2001. Anyway, starting a Fab Lab should be much cheaper: Fab Lab Afghanistan (in its wiki) and allbusiness.com reported that a full Fab Lab currently costs about $50,000-$55,000 in equipment and materials without MIT’s involvement. Other sources like ideasexist.com and aps.org reported that a Fab Lab should costs only about $20,000. In 2009, the Center for a Stateless Society proposed to organize a Fab Lab using open-source tools such as the Fab@Home 3D printer, with resulting costs between $2,000 and $5,000 total. Bart Bakker of Utrecht, Netherlands built one for under € 3000. Another initiative called Replab.org proposed the construction of an open source Fab Lab that costs $12,500. http://www.openp2pdesign.org/2011/fabbing/business-models-for-fab-labs/ Do It Yourself Culture The DIY ethic refers to the ethic of self-sufficiency through completing tasks without the aid of a paid expert. Literally meaning "do it yourself," the DIY ethic promotes the idea that anyone is capable of performing a variety of tasks rather than relying on paid specialists. The DIY ethic requires that the adherent seeks out the knowledge required to complete a given task. The term can refer to a variety of disciplines, including home improvement, first aid or creative works. Arduino, one of the enablers of the Makers Movement Social Issues The Big Brother Syndrome Fairness to Users Easiness of usage Security and Privacy Disappearing Interfaces Providers responsibility Customers’ acceptance Module 29: Social Issues How would you define the big brother syndrome in the context of IoT? What different types of data can be defined as “Personal” ? Would social cooperation and altruistic behavior an enabler for Edge Computing? How are the makers? What is the Do it your self movement? Are these relevant in the context of IoT? 52 Back to the challenges IoT Challenges 54 IoT Challenges categories Regulation IoT Challenges Technical • • • • • • • • • • • • • • • Platform Security Signaling and Protocols Data Management Cloud Large System Management (autonomics) Power Consumption Connectivity Programmability Complexity Standardization Virtualization Smart Objects Communication Paradigms (cooperation and gossiping) … • • • • • • • • Business Market Value New Business Models New Ecosystem Applications Domains New Business Processes User Needs Market and solutions fragmentation … Societal • • • • • • • Security Privacy Trust Usability Effectiveness Social Control … A Major Challenge of IoT Global Cooperation !!! Module 30: IoT Challenges What is your perspective on IoT challenges now? What are the most relevant challenges from your point of view? 56 Agenda – Internet of Things The Context of IoT A Definition of IoT A few Challenges of IoT What Things are … Networks of Things Technologies of Communications – – – – – Access Technologies Protocols SW Platforms Middleware Standards IoT Challenges – Identity, Data, and Ownership – Complex System – Business Issues – Social Issues Virtual Continuum IOT Scenarios The IEEE IoT Initiative TOWARDS A VIRTUAL CONTINUUM Evolutionary roadmap for key functional elements M2M Key elements: Separated applications Ad-hoc designed modules Ubiquitous connectivity SIM management International agreements Embedded SIM IoT Virtual Continuum Key elements: Low-cost standard sensors Short range communication Capillary and macro netw. Horizontal Services Data aggregation in cloud Third party development Key elements: “Virtual Objects” Mirroring Things in cloud Object Semantics Data integration, federation and portability Cloud as developing platf. The Virtual Continuum Entanglement Virtual Continuum is Virtualization of Resources Virtual Continuum ICT Resources Global Services Local Services Interface Extended Functions /Interface Virtualization in the “Net” ICT Resource API Resource Global Services Physical/Logical Resources API Extended Functions /Interface Virtualization in the “Net” Physical Resource API API Resource • Each Resource is representable • Each resource is programmable • Each Resource can be functionally augmented Virtualization and APIs as means to enter into the Virtual Continuum • Cloud Applications Normalized Interfaces • • Decoupling of physical objects and virtual ones (Virtual Continuum) Normalized applications can be built on Virtual Objects (having an impact on Physical Objects) Servitization Virtual Objects Each Virtual Object will have: - A unique identifier - A contract - An API - A communication mechanism (PubSub) Proprietary Protocols Real World Objects Sensors Things Actuators Terminals The Context for Virtual Continuum mobile devices physical world Secure, always best connected virtualized channel images of terminals and objects (Proxying and Security Functions) Virtual Environment applications & services Computing Cloud Brokering and Aggregation Function Virtualized resources smart objects network resources processing resources storage resources Platform View Terminal to Cloud Relationship App Ecosystem Service/Apps Value Mobile Device Platform API Middleware Functions Autonomics and Self Organization Communication Engine (e.g., event based) Brokering of Virtual Objects Data Management Objects management Objects Registry API API Extensive Objects Virtualization Native Operating System Terminal to Capillary Relationship Programmability Value API Ecosystem Value Comm Value Always Best Connected Comm. Processing Things Platform Value Communications T a g Sensors Tags Storage Others Telco Building Blocks Module 31: Virtual Continuum What is the virtual continuum? How does it relates to IoT? Can physical objects be virtualized? What are the advantages? Virtual Continuum is supported by a specific Business model. Can you name it? (Servitization) 65 Agenda – Internet of Things The Context of IoT A Definition of IoT A few Challenges of IoT What Things are … Networks of Things Technologies of Communications – – – – – Access Technologies Protocols SW Platforms Middleware Standards IoT Challenges – Identity, Data, and Ownership – Complex System – Business Issues – Social Issues Virtual Continuum IOT Scenarios The IEEE IoT Initiative A FEW SCENARIOS IoT: Application Domains The Vertical vs. Horizontal markets challenge Source: Beecham Research CeNSE : The Central Nervous System for the Earth Revolutionize human interaction with the earth as profoundly as the internet has revolutionized personal and business interactions A irfra me in teg rity P ass en ge r C om fort Photovoltaics Wil dl ife tra cki ng Pe rso nal s en so r su bn et One trillion nanoscale sensors and actuators will need the equivalent of 1000 internets Exascale Mem ory In form a tion Cons um e rs La rge stru ctur e i nteg ri ty We ather Se rvi ce N ano C omputing Au tom ake r W il dli fe R es ea rch W ir ele ss Ca rri e r Sec uri ty Se rvi ce Oi l & Ga s Ai rli ne Nanowire Chemical Sen sor D e pt. of Tra ns po rtati on Glo ba l R etai l er Ho me au tom ati on syste m Ho me se curity sys te m MEMS Inertial S ensor Ts un am i w ar ni ng syste m Re al ti m e tra ffi c co nd itio n s Me rch an d ise trac kin g Optical Interconnect Sei smi c oi l e xpl or ation 69 R. Minerva, Telecom Italia / Future Centre C li ma te m on ito rin g Photonic Sw itch A new way of Shopping Tags identify the person and the objects Tracking «Invasive» tecnology if not well managed 70 http://www.forbes.com/global/2002/0318/092chart.html Shopping IoT mid term Scenarios: Smart Cities The umbrella for many applications • Local energy production/renewables • Smart grid • Lower emissions • Public lighting • Water, gas, energy distribution • Waste management Urban Sustainability Sustainable mobility •Traffic management, ZTL •Parkings •Eco-transport •Car sharing •Teleworking • Service monitoring • Security • Sensor Networks • e-Tourism • WiFi • Dematerialization Connected Town Intelligent Building •Security •Energy management •Heating/cooling •Networks 71 IoT mid term techs: iper-sensorized Home Monitoring and control in the Connected Home Motorized blind control Load & energy consumption control Videosurveillan ce alarms Comfort and wellness Movemen t sensors Light dimmer and switch on/off control One by one room management Cooling and heating control Monitoring consumption utilities (electricity, gas, water) Supervision from touch panel Alarm panel Remote control and manageme nt Motorized access control • Set of services oriented to home devices management (meters, appliances, detectors, alarms, etc..) provided through connection to a Home Automation Network: Energy management: management of home energy consumption (standby, overload, optimization time zones ..) Connected appliances: usage monitoring, remote management and consumption of household appliances Comfort & Security: monitoring remote environments through sensors and intrusion detection devices for home safety e-Health/wellness to Ambient Assisted Living: automated remote monitoring of people needing care or prevention Remote Caring: remote assistance to manage the overall home LAN and related devices/sensors 72 http://www.google.com/powermeter/about/about.html Smart Metering (by google) http://www.mwpr.ca/articles/articles_8956/smart-meters.jpg Smart Metering Scenarios http://www.ppc-ag.de/3-1-Smart-Metering.html https://www.arm.com/assets/images/tpl/smart-meter-infrastructureLG.png TSP/MSC Communication Networks and Services (ComNETS) IoT mid term techs: Body Sensors for Health and wellness A use case: Fitbit A use case: Insulin Pumps Remote control PC Sync • reminde rs • alerts Mobile App 3G/4G Tracker Interne t Fitbit.co m Access Gateway • • • • accelerometer altimeter wireless rechargeable Smart Gateway Internet Web Data Access Access Gateway PC Insuli n Pump s Glucomete r • In May 2012 U.S. Federal Communications Commission approved spectrum for medical body area networks (MBANs) allotting the frequencies between 2360 and 2400 MHz • The sensors can monitor various vital signs, such as temperature, blood pressure or glucose levels, and transmit the information to a control device over the 2,4GHz band 75 Intelligent Carpet Applicazioni strike Schema tecnicoTM I N T E L L I G E N T Scheda di elaborazione e trasmissione dati wireless Sensori per il rilevamento Sistema di auto alimentazione strike I N T E L L I G E N T C A R P Modulo 100 x 100 C A R P E T Elaboratore remoto e ricevitore dati wireless Copertura in gomma Ignifuga idrorepellente E T 3 Lo “Stike Intelligent Carpet” si presta ad una molteplicità di possibili impieghi. Le applicazioni prevalenti riguardano il monitoraggio degli accessi pedonali in un’area delimitata (ad esempio un locale) e il monitoraggio dei flussi pedonali in un’area aperta (ad esempio una strada). Monitoraggio accessi Un unico “Stike Intelligent Carpet” posto all’ingresso dell’area delimitata consente di misurare quante persone entrano ed escono in un determinato periodo di tempo dall’area e di monitorare in tempo reale il grado di affollamento dell’area medesima. Check the Number of Tourists entering in Venice Monitoraggio flussi Due “Stike Intelligent Carpet” posti all’inizio e alla fine di una determinata area aperta consentono di misurare il numero di persone che transitano in un determinato periodo di tempo nell’area medesima, di verificare il percorso compiuto (entrano da un varco ed escono da quello opposto oppure tornano indietro ed escono da quello di ingresso) e di monitorare in tempo reale il grado di affollamento dell’area. 4 Module 32: Mid term scenario Do you think IoT can change the shopping patterns of users? Are home related scenarios of interest to the users? – Security is a concern ? And privacy? Do you see any scalability from home and building monitoring to smart city applications? 77 KALEIDOS – System Logical Architecture KALEIDOS – Example Centrale Torino-Centro 79 Topologia della Rete di Sensori installata Augmented Reality http://smallbizaffinity.com/WP/wp-content/uploads/2009/10/augmented-reality.jpg Botanical A Sensor Network Like This ? www.botanicalls.com A Chinese Example of IoT and Agriculture http://dimsums.blogspot.it/2014/01/internet-of-things-for-chinas.html TransHumanism Invasive Technology ? http://wiki.nectec.or.th/itswiki/pub/Forum/ISO-CALM-Seminar/20070514_ISO_CALM_short.pdf An Example in Intelligent Systems: Automotive Communication Scenarios (CALM) 1.GPS/GALILEO 1.Satellite 1.Broadcast ► CALM (Communications, Air-Interface Long and Medium Range) architecture is defined by ERTICO ► What 1.Terrestrial 1.Broadcast 1.Portable1.Cellular 1.Internet is it for ? ►Wireless Automotive Communication ►Electronic Toll Collection ►„Advising“ Road Signs ►Internet in the Car ►Electronic Travel Guide ►Inter-Car Communication (Safety!) ►More than 100 Applications identified Calm Architecture from Ertico 1.Portable 1.Cellular 1.Internet 1.Hot-Spot 1.(Wireless 1.LAN) 1.RSE 1.RSE 1.RSE 1.CALM M5 1.RSE-to- 1.WAVE * 1.RSE * 1.RSE 1.vehicle-to-vehicle * 1.(CALM 5 or 60 GHz) 1.5.8GHz 1.DSRC 1.CALM 1.portable-to1.vehicle 1.IR * ITS Infrastructure Service Center Adaptation Location Service Service 85 Profiling Service … 86 Module 33: other application domains What can IoT do for agriculture or plant care? Can you propose an application scenario to be added to iot.ieee.org ? 87 Expenditure on E-Health as a percentage of GPD A Challenge: how to use technologies to cut costs and improve quality in the health environment E-Health: a complex scenario Actuators WSN Sensors Adapted from https://tspace.library.utoronto.ca/html/1807/4743/jmir_v7i1e9_fig6.png A “ Usual” Medical Application http://www.infotech.oulu.fi/Annual/2007/pics/opme_19.jpg E-Health: context related applications http://www.ctit.utwente.nl/research/sro/old/ehealth/ http://www.acl.icnet.uk/lab/research.html Sensors: some Examples in EHealth Source: http://postscapes.com/internet-of-things-award/project/libelium-open-source-e-health-sensor-platform/ Low Cost Sensors https://www.cooking-hacks.com/ehealth-sensors-complete-kitbiometric-medical-arduino-raspberry-pi An Example: BedSores http://medtecheurope.blogactiv.eu /2014/04/02/when-design-meetsmedtech-three-ideas-inpreventing-and-managingpressure-ulcers/ http://www.sokasleep.com/blog/ Progress will be determined by the integration of different fields of expertise Big Data and e-Health http://www.mitforumcambridge.org/news/auto-id-labs-big-data-start-upchallenge/attachment/omnichanneldatasources/ Some observation on (e-health) Data E-Health Data will contribute to the Data Surge • Many data from health related sources • Integration with wellness systems • Multimedia data Privacy of data and fair usage • There is the need to protect the final user/ patient • New ownership of data are to be defined (Bank of user data) IoT and Big Data analysis will go hand in hand • Exploitation and monetization of data sets • Collection of data and new applications fields is essentially undiscovered http://www.ece.gatech.edu/research/labs/msl/research/ http://medicalxpress.com/news/2015-06-patients-recoverarm-virtual-reality.html A rehabilitation scenario Module 34: e-health Can you explain the differences between the e-health application domain and the wellness one? – Do you see any regulation or legislation constraints? How would you use the e-health data? Can you provide examples? Do you think the sensor and the equipment market is ready for applications with strong availability constraints and reliability requirements? 98 Agenda – Internet of Things The Context of IoT A Definition of IoT A few Challenges of IoT What Things are … Networks of Things Technologies of Communications – – – – – Access Technologies Protocols SW Platforms Middleware Standards IoT Challenges – Identity, Data, and Ownership – Complex System – Business Issues – Social Issues Virtual Continuum IOT Scenarios The IEEE IoT Initiative A FEW WORDS ABOUT IEEE INITIATIVE ON IOT An IEEE Initiative on IoT: Goal and Objectives 101 IEEE IoT will be a cross-disciplinary initiative fostering collaboration and connecting technical & business communities to IEEE experts and resources Establish IEEE as a Thought Leader and essential to the IoT community IEEE to be recognized as the go-to resource for: – engineering and technology professionals in industry, academia and government working on IoT; – broad education of the public (including consumers) and governmental bodies desiring non-biased and balanced understanding of IoT developments, including its related technologies, products, implementation and its ongoing evolution. Develop and promote valued programs, products and services for the IoT community. To establish: – The IEEE World Forum on IoT as the principal conference devoted to IoT – The IEEE IoT Journal as the principal journal devoted to IoT – IEEE IoT standards as the principal standards in IoT – IEEE’s IoT tutorials, review articles, workshops, short courses and similar activities as the principal IoT educational activities. IOT Initiative Organization Program Director (H.Tepper) Education Track Publications Track (A. Pears) (Y.K. Chen) Education Working Group Publications Working Group Industry Engagement Track (O. Logvinov) Ind. Engag. Working Group Chair (R. Minerva) FDC Director (W. Tonti) Conferences Track Standards Track (V. Piuri) (C. Adams) Conferences Working Group Standards Working Group Content / Community Dev. Track (L. Stogner) Content / Cmmty Dev. Working Group Scenarios Track (H. Berndt) Scenarios Working Group Seeking Volunteers for Scenarios, Application Designs, Reference Implementations. Join the Technical Community at http://iot.ieee.org/ Grazie Roberto Telecom Italia Lab – IEEE IoT Initiative roberto.minerva@telecomitalia.it WhatA are the Things of Measure «Internet of Things» ? An action Flex Sensor [source:sparkfun] A Sensor A sensor is an object whose purpose is to detect events or changes in its environment, and then provide a corresponding output [Wikipedia] Properties • it is sensitive to the measured property, • it is insensitive to any other property likely to be encountered in its application, and • it does not influence the measured property. An Actuator A device capable of executing an action An actuator is the mechanism by which a control system acts upon an environment. The control system can be simple (a fixed mechanical or electronic system), software-based (e.g. a printer driver, robot control system), a human, or any other input. Towards a practical definition of Middleware Goal: to allow the remote communication between software programs RPC Appl. Appl. I/F Appl. Appl. I/F Marshalling Stub OS Net Driver Stub OS Communication Protocol Net Driver Network HW App HW App OS OS HW HW An Hybrid solution: XML + RPC From Wikipedia: “XML-RPC is a remote procedure call protocol which uses XML to encode its calls and HTTP as a transport mechanism. It is a very simple protocol, defining only a handful of data types and commands, and the entire description can be printed on two pages of paper. This is in stark contrast to most RPC systems, where the standards documents often run into the hundreds of pages and require considerable software support in order to be used.” http://www-128.ibm.com/developerworks/webservices/library/ws-xml-rpc/ XML-RPC Data Representation Tag Type Example <i4> or <int> four-byte signed integer -12 <boolean> 0 (false) or 1 (true) 1 <string> string hello world <double> double-precision signed floating point number -12.214 <dateTime.iso8601> date/time 19980717T14:08:55 <base64> base64-encoded binary eW91IGNhbid0IHJlYW QgdGhpcyE= REST: http example http://vaassudevan.blogspot.it/p/rest-architectural-style-for-web.html REST Principles [RP1] The key abstraction of information is a resource, named by an URL. Any information that can be named can be a resource. [RP2] The representation of a resource is a sequence of bytes, plus representation metadata to describe those bytes. The particular form of the representation can be negotiated between REST components. [RP3] All interactions are context-free: each interaction contains all of the information necessary to understand the request, independent of any requests that may have preceded it. [RP4] Components perform only a small set of well-defined methods on a resource producing a representation to capture the current or intended state of that resource and transfer that representation between components. These methods are global to the specific architectural instantiation of REST; for instance, all resources exposed via HTTP are expected to support each operation identically. [RP5] Idempotent operations and representation metadata are encouraged in support of caching and representation reuse. [RP6] The presence of intermediaries is promoted. Filtering or redirection intermediaries may also use both the metadata and the representations within requests or responses to augment, restrict, or modify requests and responses in a manner that is transparent to both the user agent and the origin server. http://www.softwarearchitecturebook.com/svn/main/slides/ppt/ Interface Uniformity All resources are accessed with a generic interface (e.g., HTTP: GET,POST,PUT,DELETE,HEAD,OPTION,TRACERESTfull, CONNECT) CREATE - PUT,POST READ - GET,HEAD or OPTIONS UPDATE- PUT DELETE - DELETE (or) GET read POST create,update,delete PUT create,update REST DELETE delete ELEMENTS http://www.cs.colorado.edu/~kena/classes/7818/f06/lectures/19/index.html REST — Data Elements and interface 1.Resource Structure and URI Graph 2.Representation of each node type/resource 3.Defined Operation on each resource http://vaassudevan.blogspot.it/p/rest-architectural-style-for-web.html http://www.softwarearchitecturebook.com/svn/main/slides/ppt/ Middleware (cont.) Definition: a simple layer aiming at simplifying the RPC programming Marshaling (parameter “translation”) Definition of Interfaces Mapping to Native Specific Operating System I/F Stub App App Middleware Middleware OS OS HW HW Homogeneous Operating Systems http://image.slidesharecdn.c scottamyxcasestudybuildingiotproductswithopen ceiotworld-150515172451 app6892/95/wearables strategy-18638.jpg?cb=1431710792 112 Contiki OS http://jeremyudit.blogspot.it/2012_08_01_archive.html Smart Metering Configuration http://www.leonardo-energy.org/webfm_send/435 Functional Elements of Open M2M Architecture Application (A) Application is a software program which provides users with useful data based on devices resources and enables them to control devices. Application runs on end-point, gateway, or server. Resource Service Entity (RSE) Resource Service Entity is a functional module located in a device. It is responsible for device resource management and offers service functions such as network, security, registration/discovery, subscription, billing, etc. for an application, another resource entity, a directory manager, or an application repository. Application Repository (AR) Application Repository is a storage designed to be able to upload and download applications. It manages application descriptions and registers its application descriptions to Application Directory Manager. Directory Manager (DM) Directory Manager includes Device Directory Manager, Topic Directory Manager, and Application Directory Manager. Each directory manager provides device-, topic-, application-based registration/discovery and topic-based publish/subscribe functions. 115