SlideShare uma empresa Scribd logo
1 de 18
Baixar para ler offline
Intelligent Energy Usage via M2M
          Communication
            Short version


          Rune Torbensen
           rto@cfsi.dk

         PhD, Aalborg University



      Copenhagen, 9.Oct, 2012
Outline


   PhD project work
     Home Automation
     Communication
     Cooperation
     Security


   M2M Project Ideas


   Conclusion


   References
PhD project work   Home Automation
                       M2M Project Ideas   Communication
                              Conclusion   Cooperation
                              References   Security


Outline


   PhD project work
     Home Automation
     Communication
     Cooperation
     Security

   M2M Project Ideas

   Conclusion

   References


                                                             3 / 18
PhD project work   Home Automation
                        M2M Project Ideas   Communication
                               Conclusion   Cooperation
                               References   Security


Current Home Automation

  Home automation has not become mainstream yet
  Few complete smart house installations
    ◮   Building automation in the residence
    ◮   Installed by experts
    ◮   Predominantly wired and centralized (control)
    ◮   Components are expensive and variety is limited
    ◮   No dominating standard in foreseeable future
  Subsystems are available
    ◮   Limited market share
    ◮   Islands of functionality
    ◮   Unable to interoperate with the outside
                                                              4 / 18
PhD project work   Home Automation
                       M2M Project Ideas   Communication
                              Conclusion   Cooperation
                              References   Security


Future Home Automation
  All electronic devices in the residence can cooperate as services
    ◮   Consumers may easily compose a system out of products
    ◮   Easy to install and use
    ◮   Remote access for smartphone
  Many vendors, No lock-in
    ◮   Product-by-product purchasing
    ◮   Product variety
    ◮   Possibility to compete on price, quality and functionality
  Distributed control scheme
    ◮   Many small controllers
    ◮   Ad hoc discovery of services
    ◮   Sensors reused for many controllers (applications)
                                                                      5 / 18
PhD project work   Home Automation
                      M2M Project Ideas   Communication
                             Conclusion   Cooperation
                             References   Security


Communication Challenges
   Based on taxonomy of protocols for home networks
   Communication methods
     ◮ Control wires are costly to install in existing houses
     ◮ Power line is immature and unreliable due to noise
     ◮ Low-power Short Range Wireless (SRW)
   Focus on SRW technology
     ◮ Flexibility and refitting to existing buildings
     ◮ Well suited for battery powered devices
     ◮ Many useful but incompatible technologies
     ◮ Physical: bandwidth, frequencies, modulation, etc.
     ◮ Reliability problems due to wall penetration
   Full home coverage
     ◮ Multi-hop routing are immature solutions
     ◮ Repeaters are impractical and often unsupported (disruptive)
                                                                      6 / 18
PhD project work   Home Automation
                          M2M Project Ideas   Communication
                                 Conclusion   Cooperation
                                 References   Security


Interoperable Home Automation Platform

   An architecture to connect different networks into one
   heterogeneous network covering the whole residence

  ◮   Using IP as common protocol                               Heat
                                                              Controller
                                                                                   Light
                                                                                 Controller
                                                                                                  Access
                                                                                                 Controller

  ◮   End-devices visible as IP devices
                                                                                IP Network
  ◮   Controllers on IP
  ◮   End-to-end communication                              Room
                                                            Bridge
                                                                                                 Room
                                                                                                 Bridge

  ◮   Generic distributed                        Subnetwork
                                                   Adapter
                                                                Subnetwork
                                                                  Adapter
                                                                                      Subnetwork
                                                                                        Adapter
                                                                                                      Subnetwork
                                                                                                        Adapter

      communication infrastructure                 ZigBee            Bluetooth           ZWave            Bluetooth

  ◮   IP room bridges
                                                   Sensor            Actuator           Sensor            Sensor
  ◮   Expandable via adapter modules
                                                       Living room                            Bed room




                                                                                                                   7 / 18
PhD project work   Home Automation
                      M2M Project Ideas   Communication
                             Conclusion   Cooperation
                             References   Security


Cooperation Challenge
   Based on market actor and technology analysis
   Many different applications, controllers, end-devices
     ◮ Number of applications growing over time (unbounded set)
     ◮ Incompatible service frameworks, message representation
   Standard applications, profiles are predominant
     ◮ Considerable time and cost to introduce new ideas
     ◮ Standardization delay
     ◮ Alliance memberships and licensing costs
     ◮ Limit designs and innovations
   A centralized, translator box is not a usable solution
     ◮ Hard to realize in a resource limited system
     ◮ Constitutes a gatekeeper
     ◮ Creates unwanted dependency between actors
     ◮ Inconsistent with concept of a generic infrastructure
                                                                  8 / 18
PhD project work   Home Automation
                      M2M Project Ideas   Communication
                             Conclusion   Cooperation
                             References   Security


Open Device Service Description Language
   Enable cooperation between unfamiliar devices
   End-devices in IHAP provide a service descriptor
   Service description language:
     ◮ Description of any design

     ◮ Existing devices and profiles

     ◮ Legacy support allows bootstrapping the market

     ◮ New designs avoids standardization delay

     ◮ Supports fast-to-market and innovation in SME

   Simple application protocols of home automation end-devices
     ◮ Get value or device state

     ◮ Send command with a parameter

     ◮ Listen for event
                                                                 9 / 18
PhD project work   Home Automation
                       M2M Project Ideas   Communication
                              Conclusion   Cooperation
                              References   Security


Security Challenges

   Motivations for security in embedded systems
     ◮   Devices control the environment
     ◮   Capture and share personal data
   Threats from wireless and Internet
     ◮   Disruption - system unable to send alarm
     ◮   Eavesdropping - undetectable passive data-mining
     ◮   Unauthorized access
     ◮   Opening of door locks and stealing personal data
   Security must be user friendly
     ◮   Users often misunderstand difficult operations
     ◮   Misconfiguration can breach security

                                                             10 / 18
PhD project work   Home Automation
                        M2M Project Ideas   Communication
                               Conclusion   Cooperation
                               References   Security


Secure Embedded Exchange Protocol (SEEP)


  A secure end-to-end communication protocol
  SEEP design philosophy:
    ◮   Internet-grade security level
    ◮   Optimized for resource-constrained embedded platforms
    ◮   Low overhead, short messages, minimal network traffic
    ◮   Simple and therefore formally verifiable
  A formally verified alternative to SSL for embedded devices
  Not required but fully compatible with IHAP



                                                                11 / 18
PhD project work
                       M2M Project Ideas
                              Conclusion
                              References


Outline


   PhD project work
     Home Automation
     Communication
     Cooperation
     Security

   M2M Project Ideas

   Conclusion

   References


                                           12 / 18
PhD project work
                        M2M Project Ideas
                               Conclusion
                               References


M2M Project Ideas


   Intelligent energy usage via M2M communication
     ◮   The motivation is energy usage optimization in buildings
     ◮   Reduce or move energy consumption
   Development of new M2M communication technology
     ◮   Connecting systems both locally and remotely via the Internet
     ◮   Enable ad-hoc resource sharing and signal exchange
     ◮   Report energy usage and errors
     ◮   Security and privacy by design



                                                                         13 / 18
PhD project work
                     M2M Project Ideas
                            Conclusion
                            References


Analysis and Requirements
   Energy usage optimization strategies
     ◮ Avoiding or postponing energy consumption, store energy
     ◮ User involved or automated via M2M communication
     ◮ Systems log information and provide overview
     ◮ Smartphone interface, website access
     ◮ Control systems communicate with utility company server
     ◮ Great variety of subsystems by many different vendors

   Technology requirements:
     ◮ Ad-hoc cooperation and resource sharing
     ◮ Retain autonomy of each system
     ◮ Heterogeneous network
     ◮ Internet access
     ◮ Secure communication
                                                                 14 / 18
PhD project work
                       M2M Project Ideas
                              Conclusion
                              References


Outline


   PhD project work
     Home Automation
     Communication
     Cooperation
     Security

   M2M Project Ideas

   Conclusion

   References


                                           15 / 18
PhD project work
                       M2M Project Ideas
                              Conclusion
                              References


Conclusion

   M2M communication technology
    ◮   Energy usage optimization in smaller buildings
    ◮   Embedded devices instead of server, lowers overall system cost
    ◮   Connecting heterogeneous environments to the Internet
    ◮   Existing products can connect without supporting IP
    ◮   Low entry barrier, low development cost for new vendors
    ◮   Cooperation is flexible, autonomy is retained
    ◮   Data sharing with privacy precautions
    ◮   Internet grade secure communication
    ◮   Usability, short setup time for installer/owner


                                                                         16 / 18
PhD project work
                       M2M Project Ideas
                              Conclusion
                              References


Outline


   PhD project work
     Home Automation
     Communication
     Cooperation
     Security

   M2M Project Ideas

   Conclusion

   References


                                           17 / 18
PhD project work
                          M2M Project Ideas
                                 Conclusion
                                 References


References

   Relevant published papers:
   Future home automation systems
     ◮ Rune Torbensen: ”OHAS: Open Home Automation System” IEEE, International
       Symposium on Consumer Electronics, Algarve, Portugal, 2008.

   Classification of wireless protocols
     ◮ Rune Torbensen, Klaus Marius Hansen and Theis Hjorth: ”My Home is my
       Bazaar - A Taxonomy and Classification of Current Wireless Home Network
       Protocols” IEEE, 2nd Eastern European Regional Conference on the Engineering
       of Computer Based Systems (ECBS-EERC), Bratislava, Slovakia, 2011.

   Secure embedded communication
     ◮ Theis Hjorth and Rune Torbensen: ”Secure Wireless Embedded Systems via
       Component-based Design” Proc. of the IEEE International Conference on
       Privacy, Security, Risk and Trust PASSAT 2010, Minneapolis, Minnesota, USA,
       Aug 2010.


                                                                                      18 / 18

Mais conteúdo relacionado

Mais procurados

Next Generation Network Architecture
Next Generation Network ArchitectureNext Generation Network Architecture
Next Generation Network ArchitectureAPNIC
 
ISI_Report_(Repaired) (4) (1)
ISI_Report_(Repaired) (4) (1)ISI_Report_(Repaired) (4) (1)
ISI_Report_(Repaired) (4) (1)Indranil Roy
 
Pstn Migration To Ngn
Pstn Migration To NgnPstn Migration To Ngn
Pstn Migration To NgnMike Fisher
 
An energy efficiency analysis of lightweight security protocols
An energy efficiency analysis of lightweight security protocolsAn energy efficiency analysis of lightweight security protocols
An energy efficiency analysis of lightweight security protocolsHamdamboy
 
Overview of Wireless Sensor Networks
Overview of Wireless Sensor NetworksOverview of Wireless Sensor Networks
Overview of Wireless Sensor NetworksDuncan Purves
 
Cloud computing (IT-703) UNIT 1 & 2
Cloud computing (IT-703) UNIT 1 & 2Cloud computing (IT-703) UNIT 1 & 2
Cloud computing (IT-703) UNIT 1 & 2Jitendra s Rathore
 
Embedded Systems Design and Programming & Internet of Things
Embedded Systems Design and Programming & Internet of ThingsEmbedded Systems Design and Programming & Internet of Things
Embedded Systems Design and Programming & Internet of ThingsVasundhara Sharma
 
Ngn Technologies Company Profile
Ngn Technologies Company ProfileNgn Technologies Company Profile
Ngn Technologies Company ProfileAnuradha Gupta
 
ngn overview , next generation network
ngn overview , next generation networkngn overview , next generation network
ngn overview , next generation networkTushar Kumar
 

Mais procurados (12)

Next Generation Network Architecture
Next Generation Network ArchitectureNext Generation Network Architecture
Next Generation Network Architecture
 
ISI_Report_(Repaired) (4) (1)
ISI_Report_(Repaired) (4) (1)ISI_Report_(Repaired) (4) (1)
ISI_Report_(Repaired) (4) (1)
 
Pstn Migration To Ngn
Pstn Migration To NgnPstn Migration To Ngn
Pstn Migration To Ngn
 
An energy efficiency analysis of lightweight security protocols
An energy efficiency analysis of lightweight security protocolsAn energy efficiency analysis of lightweight security protocols
An energy efficiency analysis of lightweight security protocols
 
Overview of Wireless Sensor Networks
Overview of Wireless Sensor NetworksOverview of Wireless Sensor Networks
Overview of Wireless Sensor Networks
 
seminar
seminarseminar
seminar
 
Blug Talk
Blug TalkBlug Talk
Blug Talk
 
R43019698
R43019698R43019698
R43019698
 
Cloud computing (IT-703) UNIT 1 & 2
Cloud computing (IT-703) UNIT 1 & 2Cloud computing (IT-703) UNIT 1 & 2
Cloud computing (IT-703) UNIT 1 & 2
 
Embedded Systems Design and Programming & Internet of Things
Embedded Systems Design and Programming & Internet of ThingsEmbedded Systems Design and Programming & Internet of Things
Embedded Systems Design and Programming & Internet of Things
 
Ngn Technologies Company Profile
Ngn Technologies Company ProfileNgn Technologies Company Profile
Ngn Technologies Company Profile
 
ngn overview , next generation network
ngn overview , next generation networkngn overview , next generation network
ngn overview , next generation network
 

Semelhante a Intelligent Energy Usage via M2M Communication af Rune Torbensen, AAU

053744r00 Zb Mwg 2005 09 11 Zig Bee Alliance Tutorial
053744r00 Zb Mwg 2005 09 11 Zig Bee Alliance Tutorial 053744r00 Zb Mwg 2005 09 11 Zig Bee Alliance Tutorial
053744r00 Zb Mwg 2005 09 11 Zig Bee Alliance Tutorial voracle
 
Dynamic Communication of Wireless Sensor Network
Dynamic Communication of Wireless Sensor Network Dynamic Communication of Wireless Sensor Network
Dynamic Communication of Wireless Sensor Network IJERA Editor
 
Unveiling the Sydney IoT Landscape
Unveiling the Sydney IoT LandscapeUnveiling the Sydney IoT Landscape
Unveiling the Sydney IoT LandscapeAndrew Blades
 
ZIG BEE PRESENTATION..pptx
ZIG BEE PRESENTATION..pptxZIG BEE PRESENTATION..pptx
ZIG BEE PRESENTATION..pptxRayateAbhay
 
Introduction to zigbee
Introduction to zigbeeIntroduction to zigbee
Introduction to zigbeeAmit Dixit
 
IRJET- Multi Plug Control using Internet of Things
IRJET- Multi Plug Control using Internet of ThingsIRJET- Multi Plug Control using Internet of Things
IRJET- Multi Plug Control using Internet of ThingsIRJET Journal
 
“Thread - A New Wireless Networking Protocol for Internet of Things” - Ankith...
“Thread - A New Wireless Networking Protocol for Internet of Things” - Ankith...“Thread - A New Wireless Networking Protocol for Internet of Things” - Ankith...
“Thread - A New Wireless Networking Protocol for Internet of Things” - Ankith...EIT Digital Alumni
 
Choosing the Right Hardware for Prototyping
Choosing the Right Hardware for PrototypingChoosing the Right Hardware for Prototyping
Choosing the Right Hardware for PrototypingPhidgets Inc
 
Kura M2M IoT Gateway
Kura M2M IoT GatewayKura M2M IoT Gateway
Kura M2M IoT GatewayEurotech
 
Network Trends
Network TrendsNetwork Trends
Network TrendsArun ACE
 
Weaving the Future - Enable Networks to Be More Agile for Services
Weaving the Future - Enable Networks to Be More Agile for ServicesWeaving the Future - Enable Networks to Be More Agile for Services
Weaving the Future - Enable Networks to Be More Agile for ServicesHuawei Enterprise Hong Kong
 
Building a More Connected World
Building a More Connected WorldBuilding a More Connected World
Building a More Connected WorldSilicon Labs
 

Semelhante a Intelligent Energy Usage via M2M Communication af Rune Torbensen, AAU (20)

053744r00 Zb Mwg 2005 09 11 Zig Bee Alliance Tutorial
053744r00 Zb Mwg 2005 09 11 Zig Bee Alliance Tutorial 053744r00 Zb Mwg 2005 09 11 Zig Bee Alliance Tutorial
053744r00 Zb Mwg 2005 09 11 Zig Bee Alliance Tutorial
 
Zigbeepresentation
ZigbeepresentationZigbeepresentation
Zigbeepresentation
 
Zig Bee
Zig BeeZig Bee
Zig Bee
 
Dynamic Communication of Wireless Sensor Network
Dynamic Communication of Wireless Sensor Network Dynamic Communication of Wireless Sensor Network
Dynamic Communication of Wireless Sensor Network
 
Zigbee Technology
Zigbee TechnologyZigbee Technology
Zigbee Technology
 
Unveiling the Sydney IoT Landscape
Unveiling the Sydney IoT LandscapeUnveiling the Sydney IoT Landscape
Unveiling the Sydney IoT Landscape
 
ZIG BEE PRESENTATION..pptx
ZIG BEE PRESENTATION..pptxZIG BEE PRESENTATION..pptx
ZIG BEE PRESENTATION..pptx
 
WEBINAR - ZIGBEE
WEBINAR - ZIGBEE WEBINAR - ZIGBEE
WEBINAR - ZIGBEE
 
Introduction to zigbee
Introduction to zigbeeIntroduction to zigbee
Introduction to zigbee
 
IRJET- Multi Plug Control using Internet of Things
IRJET- Multi Plug Control using Internet of ThingsIRJET- Multi Plug Control using Internet of Things
IRJET- Multi Plug Control using Internet of Things
 
Unit 4
Unit 4Unit 4
Unit 4
 
“Thread - A New Wireless Networking Protocol for Internet of Things” - Ankith...
“Thread - A New Wireless Networking Protocol for Internet of Things” - Ankith...“Thread - A New Wireless Networking Protocol for Internet of Things” - Ankith...
“Thread - A New Wireless Networking Protocol for Internet of Things” - Ankith...
 
Choosing the Right Hardware for Prototyping
Choosing the Right Hardware for PrototypingChoosing the Right Hardware for Prototyping
Choosing the Right Hardware for Prototyping
 
Kura M2M IoT Gateway
Kura M2M IoT GatewayKura M2M IoT Gateway
Kura M2M IoT Gateway
 
Network Trends
Network TrendsNetwork Trends
Network Trends
 
Wireless notice board using zigbee
Wireless notice board using zigbeeWireless notice board using zigbee
Wireless notice board using zigbee
 
Weaving the Future - Enable Networks to Be More Agile for Services
Weaving the Future - Enable Networks to Be More Agile for ServicesWeaving the Future - Enable Networks to Be More Agile for Services
Weaving the Future - Enable Networks to Be More Agile for Services
 
Building a More Connected World
Building a More Connected WorldBuilding a More Connected World
Building a More Connected World
 
Zigbee
ZigbeeZigbee
Zigbee
 
ZIGBEE TECHNOLOGY ppt
ZIGBEE TECHNOLOGY pptZIGBEE TECHNOLOGY ppt
ZIGBEE TECHNOLOGY ppt
 

Mais de InfinIT - Innovationsnetværket for it

Mais de InfinIT - Innovationsnetværket for it (20)

Erfaringer med-c kurt-noermark
Erfaringer med-c kurt-noermarkErfaringer med-c kurt-noermark
Erfaringer med-c kurt-noermark
 
Object orientering, test driven development og c
Object orientering, test driven development og cObject orientering, test driven development og c
Object orientering, test driven development og c
 
Embedded softwaredevelopment hcs
Embedded softwaredevelopment hcsEmbedded softwaredevelopment hcs
Embedded softwaredevelopment hcs
 
C og c++-jens lund jensen
C og c++-jens lund jensenC og c++-jens lund jensen
C og c++-jens lund jensen
 
201811xx foredrag c_cpp
201811xx foredrag c_cpp201811xx foredrag c_cpp
201811xx foredrag c_cpp
 
C som-programmeringssprog-bt
C som-programmeringssprog-btC som-programmeringssprog-bt
C som-programmeringssprog-bt
 
Infinit seminar 060918
Infinit seminar 060918Infinit seminar 060918
Infinit seminar 060918
 
DCR solutions
DCR solutionsDCR solutions
DCR solutions
 
Not your grandfathers BPM
Not your grandfathers BPMNot your grandfathers BPM
Not your grandfathers BPM
 
Kmd workzone - an evolutionary approach to revolution
Kmd workzone - an evolutionary approach to revolutionKmd workzone - an evolutionary approach to revolution
Kmd workzone - an evolutionary approach to revolution
 
EcoKnow - oplæg
EcoKnow - oplægEcoKnow - oplæg
EcoKnow - oplæg
 
Martin Wickins Chatbots i fronten
Martin Wickins Chatbots i frontenMartin Wickins Chatbots i fronten
Martin Wickins Chatbots i fronten
 
Marie Fenger ai kundeservice
Marie Fenger ai kundeserviceMarie Fenger ai kundeservice
Marie Fenger ai kundeservice
 
Mads Kaysen SupWiz
Mads Kaysen SupWizMads Kaysen SupWiz
Mads Kaysen SupWiz
 
Leif Howalt NNIT Service Support Center
Leif Howalt NNIT Service Support CenterLeif Howalt NNIT Service Support Center
Leif Howalt NNIT Service Support Center
 
Jan Neerbek NLP og Chatbots
Jan Neerbek NLP og ChatbotsJan Neerbek NLP og Chatbots
Jan Neerbek NLP og Chatbots
 
Anders Soegaard NLP for Customer Support
Anders Soegaard NLP for Customer SupportAnders Soegaard NLP for Customer Support
Anders Soegaard NLP for Customer Support
 
Stephen Alstrup infinit august 2018
Stephen Alstrup infinit august 2018Stephen Alstrup infinit august 2018
Stephen Alstrup infinit august 2018
 
Innovation og værdiskabelse i it-projekter
Innovation og værdiskabelse i it-projekterInnovation og værdiskabelse i it-projekter
Innovation og værdiskabelse i it-projekter
 
Rokoko infin it presentation
Rokoko infin it presentation Rokoko infin it presentation
Rokoko infin it presentation
 

Último

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 

Último (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 

Intelligent Energy Usage via M2M Communication af Rune Torbensen, AAU

  • 1. Intelligent Energy Usage via M2M Communication Short version Rune Torbensen rto@cfsi.dk PhD, Aalborg University Copenhagen, 9.Oct, 2012
  • 2. Outline PhD project work Home Automation Communication Cooperation Security M2M Project Ideas Conclusion References
  • 3. PhD project work Home Automation M2M Project Ideas Communication Conclusion Cooperation References Security Outline PhD project work Home Automation Communication Cooperation Security M2M Project Ideas Conclusion References 3 / 18
  • 4. PhD project work Home Automation M2M Project Ideas Communication Conclusion Cooperation References Security Current Home Automation Home automation has not become mainstream yet Few complete smart house installations ◮ Building automation in the residence ◮ Installed by experts ◮ Predominantly wired and centralized (control) ◮ Components are expensive and variety is limited ◮ No dominating standard in foreseeable future Subsystems are available ◮ Limited market share ◮ Islands of functionality ◮ Unable to interoperate with the outside 4 / 18
  • 5. PhD project work Home Automation M2M Project Ideas Communication Conclusion Cooperation References Security Future Home Automation All electronic devices in the residence can cooperate as services ◮ Consumers may easily compose a system out of products ◮ Easy to install and use ◮ Remote access for smartphone Many vendors, No lock-in ◮ Product-by-product purchasing ◮ Product variety ◮ Possibility to compete on price, quality and functionality Distributed control scheme ◮ Many small controllers ◮ Ad hoc discovery of services ◮ Sensors reused for many controllers (applications) 5 / 18
  • 6. PhD project work Home Automation M2M Project Ideas Communication Conclusion Cooperation References Security Communication Challenges Based on taxonomy of protocols for home networks Communication methods ◮ Control wires are costly to install in existing houses ◮ Power line is immature and unreliable due to noise ◮ Low-power Short Range Wireless (SRW) Focus on SRW technology ◮ Flexibility and refitting to existing buildings ◮ Well suited for battery powered devices ◮ Many useful but incompatible technologies ◮ Physical: bandwidth, frequencies, modulation, etc. ◮ Reliability problems due to wall penetration Full home coverage ◮ Multi-hop routing are immature solutions ◮ Repeaters are impractical and often unsupported (disruptive) 6 / 18
  • 7. PhD project work Home Automation M2M Project Ideas Communication Conclusion Cooperation References Security Interoperable Home Automation Platform An architecture to connect different networks into one heterogeneous network covering the whole residence ◮ Using IP as common protocol Heat Controller Light Controller Access Controller ◮ End-devices visible as IP devices IP Network ◮ Controllers on IP ◮ End-to-end communication Room Bridge Room Bridge ◮ Generic distributed Subnetwork Adapter Subnetwork Adapter Subnetwork Adapter Subnetwork Adapter communication infrastructure ZigBee Bluetooth ZWave Bluetooth ◮ IP room bridges Sensor Actuator Sensor Sensor ◮ Expandable via adapter modules Living room Bed room 7 / 18
  • 8. PhD project work Home Automation M2M Project Ideas Communication Conclusion Cooperation References Security Cooperation Challenge Based on market actor and technology analysis Many different applications, controllers, end-devices ◮ Number of applications growing over time (unbounded set) ◮ Incompatible service frameworks, message representation Standard applications, profiles are predominant ◮ Considerable time and cost to introduce new ideas ◮ Standardization delay ◮ Alliance memberships and licensing costs ◮ Limit designs and innovations A centralized, translator box is not a usable solution ◮ Hard to realize in a resource limited system ◮ Constitutes a gatekeeper ◮ Creates unwanted dependency between actors ◮ Inconsistent with concept of a generic infrastructure 8 / 18
  • 9. PhD project work Home Automation M2M Project Ideas Communication Conclusion Cooperation References Security Open Device Service Description Language Enable cooperation between unfamiliar devices End-devices in IHAP provide a service descriptor Service description language: ◮ Description of any design ◮ Existing devices and profiles ◮ Legacy support allows bootstrapping the market ◮ New designs avoids standardization delay ◮ Supports fast-to-market and innovation in SME Simple application protocols of home automation end-devices ◮ Get value or device state ◮ Send command with a parameter ◮ Listen for event 9 / 18
  • 10. PhD project work Home Automation M2M Project Ideas Communication Conclusion Cooperation References Security Security Challenges Motivations for security in embedded systems ◮ Devices control the environment ◮ Capture and share personal data Threats from wireless and Internet ◮ Disruption - system unable to send alarm ◮ Eavesdropping - undetectable passive data-mining ◮ Unauthorized access ◮ Opening of door locks and stealing personal data Security must be user friendly ◮ Users often misunderstand difficult operations ◮ Misconfiguration can breach security 10 / 18
  • 11. PhD project work Home Automation M2M Project Ideas Communication Conclusion Cooperation References Security Secure Embedded Exchange Protocol (SEEP) A secure end-to-end communication protocol SEEP design philosophy: ◮ Internet-grade security level ◮ Optimized for resource-constrained embedded platforms ◮ Low overhead, short messages, minimal network traffic ◮ Simple and therefore formally verifiable A formally verified alternative to SSL for embedded devices Not required but fully compatible with IHAP 11 / 18
  • 12. PhD project work M2M Project Ideas Conclusion References Outline PhD project work Home Automation Communication Cooperation Security M2M Project Ideas Conclusion References 12 / 18
  • 13. PhD project work M2M Project Ideas Conclusion References M2M Project Ideas Intelligent energy usage via M2M communication ◮ The motivation is energy usage optimization in buildings ◮ Reduce or move energy consumption Development of new M2M communication technology ◮ Connecting systems both locally and remotely via the Internet ◮ Enable ad-hoc resource sharing and signal exchange ◮ Report energy usage and errors ◮ Security and privacy by design 13 / 18
  • 14. PhD project work M2M Project Ideas Conclusion References Analysis and Requirements Energy usage optimization strategies ◮ Avoiding or postponing energy consumption, store energy ◮ User involved or automated via M2M communication ◮ Systems log information and provide overview ◮ Smartphone interface, website access ◮ Control systems communicate with utility company server ◮ Great variety of subsystems by many different vendors Technology requirements: ◮ Ad-hoc cooperation and resource sharing ◮ Retain autonomy of each system ◮ Heterogeneous network ◮ Internet access ◮ Secure communication 14 / 18
  • 15. PhD project work M2M Project Ideas Conclusion References Outline PhD project work Home Automation Communication Cooperation Security M2M Project Ideas Conclusion References 15 / 18
  • 16. PhD project work M2M Project Ideas Conclusion References Conclusion M2M communication technology ◮ Energy usage optimization in smaller buildings ◮ Embedded devices instead of server, lowers overall system cost ◮ Connecting heterogeneous environments to the Internet ◮ Existing products can connect without supporting IP ◮ Low entry barrier, low development cost for new vendors ◮ Cooperation is flexible, autonomy is retained ◮ Data sharing with privacy precautions ◮ Internet grade secure communication ◮ Usability, short setup time for installer/owner 16 / 18
  • 17. PhD project work M2M Project Ideas Conclusion References Outline PhD project work Home Automation Communication Cooperation Security M2M Project Ideas Conclusion References 17 / 18
  • 18. PhD project work M2M Project Ideas Conclusion References References Relevant published papers: Future home automation systems ◮ Rune Torbensen: ”OHAS: Open Home Automation System” IEEE, International Symposium on Consumer Electronics, Algarve, Portugal, 2008. Classification of wireless protocols ◮ Rune Torbensen, Klaus Marius Hansen and Theis Hjorth: ”My Home is my Bazaar - A Taxonomy and Classification of Current Wireless Home Network Protocols” IEEE, 2nd Eastern European Regional Conference on the Engineering of Computer Based Systems (ECBS-EERC), Bratislava, Slovakia, 2011. Secure embedded communication ◮ Theis Hjorth and Rune Torbensen: ”Secure Wireless Embedded Systems via Component-based Design” Proc. of the IEEE International Conference on Privacy, Security, Risk and Trust PASSAT 2010, Minneapolis, Minnesota, USA, Aug 2010. 18 / 18