SlideShare uma empresa Scribd logo
1 de 1
Web of Domotics (WoD): Towards a web of Smart EnvironmentsFaisal Razzak {faisal.razzak@polito.it}Elite Research Group (http://elite.polito.it), Politecnicodi Torino, Italy What is WoD?  Abstract Issues  ,[object Object]

Mais conteúdo relacionado

Mais procurados

Near field communication (nfc) technology
Near field communication (nfc) technologyNear field communication (nfc) technology
Near field communication (nfc) technologyAnkur Sharma
 
OpenID Foundation MODRNA WG
OpenID Foundation MODRNA WGOpenID Foundation MODRNA WG
OpenID Foundation MODRNA WGBjorn Hjelm
 
Harnessing Blockchain technology for Cybersecurity (Smart City, Smart Nation)
Harnessing Blockchain technology for Cybersecurity (Smart City, Smart Nation)Harnessing Blockchain technology for Cybersecurity (Smart City, Smart Nation)
Harnessing Blockchain technology for Cybersecurity (Smart City, Smart Nation)NUS-ISS
 
Mobile Money Business Track: understanding the Model and Market
Mobile Money Business Track: understanding the Model and MarketMobile Money Business Track: understanding the Model and Market
Mobile Money Business Track: understanding the Model and MarketArief Gunawan
 
US Security for Cyber Security
US Security for Cyber SecurityUS Security for Cyber Security
US Security for Cyber SecurityArtanContracting
 
e-wallet , The future of Cards and Money
e-wallet , The future of Cards and Moneye-wallet , The future of Cards and Money
e-wallet , The future of Cards and MoneyVikram Dahiya
 
NFC (Near Field Communication) presentation
NFC (Near Field Communication) presentationNFC (Near Field Communication) presentation
NFC (Near Field Communication) presentationAman Kumar Dutt
 
A Telco and End-user Perspective on the Authentication Journey
A Telco and End-user Perspective on the Authentication JourneyA Telco and End-user Perspective on the Authentication Journey
A Telco and End-user Perspective on the Authentication JourneyFIDO Alliance
 
OpenID Foundation MODRNA WG
OpenID Foundation MODRNA WGOpenID Foundation MODRNA WG
OpenID Foundation MODRNA WGBjorn Hjelm
 
Mobile_Security_En
Mobile_Security_EnMobile_Security_En
Mobile_Security_Ende77
 
Android HCE: An intro into the world of NFC
Android HCE: An intro into the world of NFCAndroid HCE: An intro into the world of NFC
Android HCE: An intro into the world of NFCNFC Forum
 
Identity for IoT: An Authentication Framework for the IoT
Identity for IoT: An Authentication Framework for the IoTIdentity for IoT: An Authentication Framework for the IoT
Identity for IoT: An Authentication Framework for the IoTAllSeen Alliance
 
NFC Presentation [Compatibility Mode]
NFC Presentation [Compatibility Mode]NFC Presentation [Compatibility Mode]
NFC Presentation [Compatibility Mode]Khaled Hasan
 
Iot security and Authentication solution
Iot security and Authentication solutionIot security and Authentication solution
Iot security and Authentication solutionPradeep Jeswani
 
Identive Group | Press Release | Identive Group's RFID and Near Field Communi...
Identive Group | Press Release | Identive Group's RFID and Near Field Communi...Identive Group | Press Release | Identive Group's RFID and Near Field Communi...
Identive Group | Press Release | Identive Group's RFID and Near Field Communi...Identive
 
Ravi i ot-enablingtechnologies
Ravi i ot-enablingtechnologiesRavi i ot-enablingtechnologies
Ravi i ot-enablingtechnologiesskumartarget
 
OpenID Foundation Workshop at EIC2017
OpenID Foundation Workshop at EIC2017OpenID Foundation Workshop at EIC2017
OpenID Foundation Workshop at EIC2017Bjorn Hjelm
 
electronic_payment_system_in_korea_eng
electronic_payment_system_in_korea_engelectronic_payment_system_in_korea_eng
electronic_payment_system_in_korea_engFrank Mercado
 

Mais procurados (20)

Near field communication (nfc) technology
Near field communication (nfc) technologyNear field communication (nfc) technology
Near field communication (nfc) technology
 
OpenID Foundation MODRNA WG
OpenID Foundation MODRNA WGOpenID Foundation MODRNA WG
OpenID Foundation MODRNA WG
 
Harnessing Blockchain technology for Cybersecurity (Smart City, Smart Nation)
Harnessing Blockchain technology for Cybersecurity (Smart City, Smart Nation)Harnessing Blockchain technology for Cybersecurity (Smart City, Smart Nation)
Harnessing Blockchain technology for Cybersecurity (Smart City, Smart Nation)
 
shirsha
shirshashirsha
shirsha
 
Mobile Money Business Track: understanding the Model and Market
Mobile Money Business Track: understanding the Model and MarketMobile Money Business Track: understanding the Model and Market
Mobile Money Business Track: understanding the Model and Market
 
US Security for Cyber Security
US Security for Cyber SecurityUS Security for Cyber Security
US Security for Cyber Security
 
e-wallet , The future of Cards and Money
e-wallet , The future of Cards and Moneye-wallet , The future of Cards and Money
e-wallet , The future of Cards and Money
 
NFC (Near Field Communication) presentation
NFC (Near Field Communication) presentationNFC (Near Field Communication) presentation
NFC (Near Field Communication) presentation
 
A Telco and End-user Perspective on the Authentication Journey
A Telco and End-user Perspective on the Authentication JourneyA Telco and End-user Perspective on the Authentication Journey
A Telco and End-user Perspective on the Authentication Journey
 
OpenID Foundation MODRNA WG
OpenID Foundation MODRNA WGOpenID Foundation MODRNA WG
OpenID Foundation MODRNA WG
 
Mobile_Security_En
Mobile_Security_EnMobile_Security_En
Mobile_Security_En
 
Android HCE: An intro into the world of NFC
Android HCE: An intro into the world of NFCAndroid HCE: An intro into the world of NFC
Android HCE: An intro into the world of NFC
 
Identity for IoT: An Authentication Framework for the IoT
Identity for IoT: An Authentication Framework for the IoTIdentity for IoT: An Authentication Framework for the IoT
Identity for IoT: An Authentication Framework for the IoT
 
Near Field Communiation
Near Field CommuniationNear Field Communiation
Near Field Communiation
 
NFC Presentation [Compatibility Mode]
NFC Presentation [Compatibility Mode]NFC Presentation [Compatibility Mode]
NFC Presentation [Compatibility Mode]
 
Iot security and Authentication solution
Iot security and Authentication solutionIot security and Authentication solution
Iot security and Authentication solution
 
Identive Group | Press Release | Identive Group's RFID and Near Field Communi...
Identive Group | Press Release | Identive Group's RFID and Near Field Communi...Identive Group | Press Release | Identive Group's RFID and Near Field Communi...
Identive Group | Press Release | Identive Group's RFID and Near Field Communi...
 
Ravi i ot-enablingtechnologies
Ravi i ot-enablingtechnologiesRavi i ot-enablingtechnologies
Ravi i ot-enablingtechnologies
 
OpenID Foundation Workshop at EIC2017
OpenID Foundation Workshop at EIC2017OpenID Foundation Workshop at EIC2017
OpenID Foundation Workshop at EIC2017
 
electronic_payment_system_in_korea_eng
electronic_payment_system_in_korea_engelectronic_payment_system_in_korea_eng
electronic_payment_system_in_korea_eng
 

Semelhante a Web of Domotics Poster

Internet of things (IoT)- Introduction, Utilities, Applications
Internet of things (IoT)- Introduction, Utilities, ApplicationsInternet of things (IoT)- Introduction, Utilities, Applications
Internet of things (IoT)- Introduction, Utilities, ApplicationsTarika Verma
 
Definition of Internet of things and introduction
Definition of Internet of things and introductionDefinition of Internet of things and introduction
Definition of Internet of things and introductionsundeepsiddula
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Lifeijsrd.com
 
WoD: Application for Ageing Society
WoD: Application for Ageing SocietyWoD: Application for Ageing Society
WoD: Application for Ageing SocietyFaisal Razzak
 
Internet of things, and rise of ibeacons
Internet of things, and rise of ibeaconsInternet of things, and rise of ibeacons
Internet of things, and rise of ibeaconsJanusz Chudzynski
 
Public wifi architecture_12072017
Public wifi architecture_12072017Public wifi architecture_12072017
Public wifi architecture_12072017Saurabh Verma
 
Remote surveillance system for mobile application
Remote surveillance system for mobile applicationRemote surveillance system for mobile application
Remote surveillance system for mobile applicationAlexander Decker
 
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdfHOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdfKanagarajanSwamiappa
 
Emergence of IoT,Introduction, Evolution
Emergence of IoT,Introduction, EvolutionEmergence of IoT,Introduction, Evolution
Emergence of IoT,Introduction, EvolutionRoopaDNDandally
 
Emergence of IoT,Introduction, Evolution
Emergence of IoT,Introduction, EvolutionEmergence of IoT,Introduction, Evolution
Emergence of IoT,Introduction, EvolutionRoopaDNDandally
 
Unit_1_IOT_INTRO.pptx
Unit_1_IOT_INTRO.pptxUnit_1_IOT_INTRO.pptx
Unit_1_IOT_INTRO.pptxBharat Tank
 
ЄВГЕНІЙ ПАСЄКА «IoT як це тестувати» Lviv QA Day 2019
ЄВГЕНІЙ ПАСЄКА «IoT як це тестувати» Lviv QA Day 2019ЄВГЕНІЙ ПАСЄКА «IoT як це тестувати» Lviv QA Day 2019
ЄВГЕНІЙ ПАСЄКА «IoT як це тестувати» Lviv QA Day 2019GoQA
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICEEditor IJMTER
 
Functional requirements of intelligent object framework
Functional requirements of intelligent object frameworkFunctional requirements of intelligent object framework
Functional requirements of intelligent object frameworkijscai
 
A novel approach to Web of things: M2M and enhanced javascript technologies
A novel approach to Web of things: M2M and  enhanced javascript technologiesA novel approach to Web of things: M2M and  enhanced javascript technologies
A novel approach to Web of things: M2M and enhanced javascript technologiesGiuseppe La Torre
 
Challenges and application of Internet of Things
Challenges and application of Internet of ThingsChallenges and application of Internet of Things
Challenges and application of Internet of ThingsAshutosh Bhardwaj
 
Iot lecture notes_hyd
Iot lecture notes_hydIot lecture notes_hyd
Iot lecture notes_hydKishore5511
 
Browser-based Secure Remote Access for the Internet of Things
Browser-based Secure Remote Access for the Internet of ThingsBrowser-based Secure Remote Access for the Internet of Things
Browser-based Secure Remote Access for the Internet of ThingsGünter Obiltschnig
 

Semelhante a Web of Domotics Poster (20)

Internet of things (IoT)- Introduction, Utilities, Applications
Internet of things (IoT)- Introduction, Utilities, ApplicationsInternet of things (IoT)- Introduction, Utilities, Applications
Internet of things (IoT)- Introduction, Utilities, Applications
 
Definition of Internet of things and introduction
Definition of Internet of things and introductionDefinition of Internet of things and introduction
Definition of Internet of things and introduction
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
 
WoD: Application for Ageing Society
WoD: Application for Ageing SocietyWoD: Application for Ageing Society
WoD: Application for Ageing Society
 
Internet of things, and rise of ibeacons
Internet of things, and rise of ibeaconsInternet of things, and rise of ibeacons
Internet of things, and rise of ibeacons
 
Public wifi architecture_12072017
Public wifi architecture_12072017Public wifi architecture_12072017
Public wifi architecture_12072017
 
Remote surveillance system for mobile application
Remote surveillance system for mobile applicationRemote surveillance system for mobile application
Remote surveillance system for mobile application
 
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdfHOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
 
Emergence of IoT,Introduction, Evolution
Emergence of IoT,Introduction, EvolutionEmergence of IoT,Introduction, Evolution
Emergence of IoT,Introduction, Evolution
 
Emergence of IoT,Introduction, Evolution
Emergence of IoT,Introduction, EvolutionEmergence of IoT,Introduction, Evolution
Emergence of IoT,Introduction, Evolution
 
Unit_1_IOT_INTRO.pptx
Unit_1_IOT_INTRO.pptxUnit_1_IOT_INTRO.pptx
Unit_1_IOT_INTRO.pptx
 
IoT [Internet of Things]
IoT [Internet of Things]IoT [Internet of Things]
IoT [Internet of Things]
 
ЄВГЕНІЙ ПАСЄКА «IoT як це тестувати» Lviv QA Day 2019
ЄВГЕНІЙ ПАСЄКА «IoT як це тестувати» Lviv QA Day 2019ЄВГЕНІЙ ПАСЄКА «IoT як це тестувати» Lviv QA Day 2019
ЄВГЕНІЙ ПАСЄКА «IoT як це тестувати» Lviv QA Day 2019
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
 
Functional requirements of intelligent object framework
Functional requirements of intelligent object frameworkFunctional requirements of intelligent object framework
Functional requirements of intelligent object framework
 
A novel approach to Web of things: M2M and enhanced javascript technologies
A novel approach to Web of things: M2M and  enhanced javascript technologiesA novel approach to Web of things: M2M and  enhanced javascript technologies
A novel approach to Web of things: M2M and enhanced javascript technologies
 
Challenges and application of Internet of Things
Challenges and application of Internet of ThingsChallenges and application of Internet of Things
Challenges and application of Internet of Things
 
IOT.pdf
IOT.pdfIOT.pdf
IOT.pdf
 
Iot lecture notes_hyd
Iot lecture notes_hydIot lecture notes_hyd
Iot lecture notes_hyd
 
Browser-based Secure Remote Access for the Internet of Things
Browser-based Secure Remote Access for the Internet of ThingsBrowser-based Secure Remote Access for the Internet of Things
Browser-based Secure Remote Access for the Internet of Things
 

Web of Domotics Poster

  • 1.
  • 2.
  • 3.
  • 4.
  • 5. Authentication should be universal and independent of any network constraints.
  • 6. Allow mobile users to approach and operate physical devices in any smart environment empowered by a compatible environment gateway (Controller).
  • 7. It exploits several Internet and Web standard technologies to provide following features:
  • 9.
  • 10. Open data exchange, service/device description through Linked Open Data formats .
  • 11.
  • 12. The mobile application decodes the visual tag, provides interface to authenticate users and to control domotic devices.
  • 13. Every device is identified uniquely through a Universal Access ID (UAID). The UAID of a domotic device is encoded using visual tags like 2D Bar Codes.
  • 14.
  • 15.
  • 16. The user can request pure RDF description of a device or RDFa (XHTML) as a response user interface.
  • 17. Devices are described by reporting semantics-rich information including their name, type, functionalities, current location and by showing current state and available operations.
  • 18. The Controller offer information about devices by exploiting theincreasingly popularLinked Open Data format.
  • 19. The Controller is built by introducing 3 new units inside Dog to enhance its functionality.
  • 20. Dog is an ontology-powered DomoticOSGi Gateway that is able to expose different domotic networks as a single, technology neutral, home automation system.
  • 21. The three new units are: HTTP-Access, Authentication and Authorization Unit and UAID Mapping Unit..
  • 22. The mobile application provides a user with an interface to interact with the devices present in the environment. It communicates with the controller responsible for the devices on behalf of the user.
  • 23. User authentication is provided through Open ID. Open ID is a decentralized standard based on Single Sign-On (SSO) paradigm to authenticate the users.
  • 24. UAID is encoded through QR Code because the decoding process is quick and many modern mobile phones are by default equipped with software to decode QR Code
  • 25. During setup phase, MAP (Mobile Access Provider) registers the UAID associated with the device with the domain address of the Controller that controls the device.