SlideShare uma empresa Scribd logo
1 de 24
0
Internet of Actuating Things
Balamuralidhar P, Arpan Pal
Innovation Labs, Tata Consultancy Services (TCS), India
1
Internet of Things & M2M
 Internet of Things
– Towards a vision of networking ‘Things’ on Internet
– Practically it signifies
o Sensing, Identifying, communicating between physical objects such as
home appliances, furniture, vehicles, buildings, components of
infrastructures such as roads, utilities and many more…
 Machine to Machine (M2M) communications is a part of the above
vision
2
Scope
Gateway
Service Platform
3
Internet of Actuating Things
Cognition
Computing
NetworkingEmbedded
Systems
Control
4
- 4 -
Intelligent Infrastructure
Sense
Extract
Analyze
Respond
Learn
Smartening the Infrastructure by
Real-Time Monitoring and
Management
Monitor
Operational Efficiency,
Safety & Security,
Information Services,
Convenience
5
Challenges in Actuating Things
 Actuation causes a change in the state of things (can be
catastrophic if in-appropriate)
 Actuation has associated responsibility
– Need authentication,
– Timeliness, robustness
– Security against un-intended actuations
 Action may be triggered by a software agent or human being.
Challenges in trusting a software agent.
 Energy saving and autonomic capabilities
 Cooperative Actuation further these challenges
6
Erasure coding for Robust Protocol
 Erasure Coding: k blocks are encoded to n blocks , introducing
(n-k) redundancy. If the number of blocks lost during the
transmission m <= (n-k), then original information can be
recovered.
 Mostly used technique to address packet losses is
retransmission. This creates un predictable delays and
reduced throughput.
 Erasure coding is an alternate way to
address this. An apriori estimate of the
channel condition can help in planning the
redundancy required.
 From an IoT perspective, this would be
impactful for multicast transmissions (
mass upgrade, mass configuration etc)
 Evaluation Robust CoAP is in progress
7
Identity based Encryption for Secure IoT
 Identity based Encryption system
– Here a public key is derived from Identity
– Unlike PKI there is no key exchange required during transactions
 In IOT/M2M the number of devices involved are too many. Key
management and exchange would be an issue
 IBE can be used in such cases. Private keys are embedded in
the device. Public key is derived from publicly known identities
such as IP address, MAC address, URI etc.
 Standardisation in progress - IEEE P1636.3/D1
8
Identity Based Encryption Scheme
Encrypted Message
Public Key Generator(PKG)
Device 1
Device 2
1.Use User2 -ID to generate User2’s
Public Key.
2. Sign and Encrypt and send message
to the User2
1.Use User1-ID to generate User1’s
Public Key.
2. Sign and Encrypt and send message
to the User1.
Encrypted Message
SET UP
EXTRACT
Encrypt Decrypt
9
Some Emerging technologies for actuation
 shape memory alloy based actuation
– Example: intelligent locking devices
for advanced protection and remote
control of assets. of smart devices
with embedded intelligence, much
smaller form factors and less power
consumption (smart micro-protection
systems (ixp.tz.net))
Emergence of new applications through new actuation
technologies
10
Actuation through Bio-mimicry
 Ctenophores are small sea creatures that
achieve propulsion using thousands of locally
controlled ciliated paddles.
 electro-chemo-mechanical actuation. The
human heart is a flexible network of actuators
coordinated with electro-chemo-mechanical
waves of contraction.
 Stomata are self-controlling variable apertures
that work together to solve the gas exchange
problem for plants. It can be seen that flexible
networks of actuators coordinated using
distributed intelligence and sensing provide
robust and adaptable performance in the face
of complex and varied challenges.
Global ICT Standardization for India (GISFI)
12
GISFI
 Forum for addressing ICT standardization in India (www.gisfi.org )
 Working Groups
– Security and Privacy
– Future Radio Networks
– Internet of Things (IoT)
– Service Oriented Network (SEoN)
– Green ICT
13
Use Cases being considered in IoT WG
IoT WG
Healthcare
Home
Smart Grid
Agriculture
Food Supply Chain
Public Safety
Transportation
14
IoT Reference Architecture
Sensor / Devices
Gateway
Service Platform
Applications
IoT Core
Network
I1
I2
I3
Robots as Actuating Things in IoT
16
Market Projection
17
Some Social Applications of Robotics
 Public safety – Search & Rescue
– Detecting human under debris, water and fire
 Surveillance
– Campus security (mobile cameras and audio)
– Monitoring flora and fauna, forest fires
 Agriculture / farming
 Remote Infrastructure Monitoring & Management
 Remote Healthcare & Assisted Living
18
A Motivating Requirement
19
Some technologies for search & rescue
20
Robots as Mobile Gateways
 Mobile data collection
– Agriculture monitoring
– Mobile Agro-advisory System
– Real-time sending of Soil Temperature, Soil Moisture, Atmospheric
Temperature and Atmospheric Humidity
 Advantages of Robots as Mobile Gateways
– Energy saving through lower communication range
– Periodic Sensor auto calibration
21
Technology Challenges
 Wireless Networking
– Variable communication range
– Mobility: no to moderate (pedestrian) speeds
– Dynamic topology
– Reliability & robustness, security
– Real-time communication for actuation (downlink)
22
Summary
 “Actuating Things” have variety of important applications and
related challenges
 Robots are a popular category of actuators
 Wireless robotics need attention of researchers and
standardization bodies
– Machine to Actuating Machine communications
o Next M2M?
Thank You

Mais conteúdo relacionado

Mais procurados

Iot Software-As-A-Service Implementation Framework
Iot Software-As-A-Service Implementation FrameworkIot Software-As-A-Service Implementation Framework
Iot Software-As-A-Service Implementation FrameworkChandrashekhar More
 
Introduction to IoT Technologies - The need to know basics
Introduction to IoT Technologies - The need to know basicsIntroduction to IoT Technologies - The need to know basics
Introduction to IoT Technologies - The need to know basicsJaco Bester
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...ClicTest
 
Security challenges in IoT
Security challenges in IoTSecurity challenges in IoT
Security challenges in IoTVishnupriya T H
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIntel® Software
 
TOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of ThingsTOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of ThingsChromeInfo Technologies
 
Introduction to IOT security
Introduction to IOT securityIntroduction to IOT security
Introduction to IOT securityPriyab Satoshi
 
Security of iot device
Security of iot deviceSecurity of iot device
Security of iot deviceMayank Pandey
 
Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)SecPod Technologies
 
IoT-The Internet of Things
IoT-The Internet of ThingsIoT-The Internet of Things
IoT-The Internet of ThingsTushar Sharma
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITYThe Avi Sharma
 

Mais procurados (20)

IoT, Careers, and Skills
IoT, Careers, and SkillsIoT, Careers, and Skills
IoT, Careers, and Skills
 
Nazmul haq abir
Nazmul haq abirNazmul haq abir
Nazmul haq abir
 
Iot Software-As-A-Service Implementation Framework
Iot Software-As-A-Service Implementation FrameworkIot Software-As-A-Service Implementation Framework
Iot Software-As-A-Service Implementation Framework
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
security and privacy-Internet of things
security and privacy-Internet of thingssecurity and privacy-Internet of things
security and privacy-Internet of things
 
Introduction to IoT Technologies - The need to know basics
Introduction to IoT Technologies - The need to know basicsIntroduction to IoT Technologies - The need to know basics
Introduction to IoT Technologies - The need to know basics
 
Questions in iot
Questions in iotQuestions in iot
Questions in iot
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
 
IoT security (Internet of Things)
IoT security (Internet of Things)IoT security (Internet of Things)
IoT security (Internet of Things)
 
Security challenges in IoT
Security challenges in IoTSecurity challenges in IoT
Security challenges in IoT
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
 
Lecture 16
Lecture 16Lecture 16
Lecture 16
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
TOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of ThingsTOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of Things
 
Introduction to IOT security
Introduction to IOT securityIntroduction to IOT security
Introduction to IOT security
 
Security of iot device
Security of iot deviceSecurity of iot device
Security of iot device
 
Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)
 
IoT-The Internet of Things
IoT-The Internet of ThingsIoT-The Internet of Things
IoT-The Internet of Things
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITY
 
eMsecure
eMsecureeMsecure
eMsecure
 

Semelhante a Io t of actuating things

IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET Journal
 
Internet of things(iot)
Internet of things(iot)Internet of things(iot)
Internet of things(iot)SimiAttri
 
Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...
Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...
Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...Amazon Web Services
 
Definition of Internet of things and introduction
Definition of Internet of things and introductionDefinition of Internet of things and introduction
Definition of Internet of things and introductionsundeepsiddula
 
What if Things Start to Think - Artificial Intelligence in IoT
What if Things Start to Think - Artificial Intelligence in IoTWhat if Things Start to Think - Artificial Intelligence in IoT
What if Things Start to Think - Artificial Intelligence in IoTMuralidhar Somisetty
 
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET -  	  A Study on Smart Way for Securing IoT DevicesIRJET -  	  A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT DevicesIRJET Journal
 
IoT and IIoT - Security Challenges and Innovative Approaches
IoT and IIoT - Security Challenges and Innovative ApproachesIoT and IIoT - Security Challenges and Innovative Approaches
IoT and IIoT - Security Challenges and Innovative ApproachesShashi Kiran
 
IOT_UNIT-1_Presentation which is basic presentation level
IOT_UNIT-1_Presentation which is basic presentation levelIOT_UNIT-1_Presentation which is basic presentation level
IOT_UNIT-1_Presentation which is basic presentation levelGovadaDhana
 
Data Privacy using IoTs in Smart Cities Project
 Data Privacy using IoTs in Smart Cities Project Data Privacy using IoTs in Smart Cities Project
Data Privacy using IoTs in Smart Cities ProjectIndicThreads
 
Internet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless HibernationInternet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless HibernationIRJET Journal
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
Io t research_arpanpal_iem
Io t research_arpanpal_iemIo t research_arpanpal_iem
Io t research_arpanpal_iemArpan Pal
 
An Analysis of the Architecture of the Internet of Things.pdf
An Analysis of the Architecture of the Internet of Things.pdfAn Analysis of the Architecture of the Internet of Things.pdf
An Analysis of the Architecture of the Internet of Things.pdfCIOWomenMagazine
 
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdfHOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdfKanagarajanSwamiappa
 
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperKSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperMartin Ruubel
 
1_IoT and Its Interfacing Techniques.pdf
1_IoT and Its Interfacing Techniques.pdf1_IoT and Its Interfacing Techniques.pdf
1_IoT and Its Interfacing Techniques.pdfdrputtanr
 

Semelhante a Io t of actuating things (20)

IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
 
Internet of things(iot)
Internet of things(iot)Internet of things(iot)
Internet of things(iot)
 
Internet of Things building blocks
Internet of Things building blocksInternet of Things building blocks
Internet of Things building blocks
 
Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...
Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...
Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...
 
Definition of Internet of things and introduction
Definition of Internet of things and introductionDefinition of Internet of things and introduction
Definition of Internet of things and introduction
 
What if Things Start to Think - Artificial Intelligence in IoT
What if Things Start to Think - Artificial Intelligence in IoTWhat if Things Start to Think - Artificial Intelligence in IoT
What if Things Start to Think - Artificial Intelligence in IoT
 
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET -  	  A Study on Smart Way for Securing IoT DevicesIRJET -  	  A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT Devices
 
IOT_UNIT-1.pptx
IOT_UNIT-1.pptxIOT_UNIT-1.pptx
IOT_UNIT-1.pptx
 
IoT and IIoT - Security Challenges and Innovative Approaches
IoT and IIoT - Security Challenges and Innovative ApproachesIoT and IIoT - Security Challenges and Innovative Approaches
IoT and IIoT - Security Challenges and Innovative Approaches
 
IOT_BDA_Proposal_Draft (1).ppt
IOT_BDA_Proposal_Draft (1).pptIOT_BDA_Proposal_Draft (1).ppt
IOT_BDA_Proposal_Draft (1).ppt
 
IOT_UNIT-1_Presentation which is basic presentation level
IOT_UNIT-1_Presentation which is basic presentation levelIOT_UNIT-1_Presentation which is basic presentation level
IOT_UNIT-1_Presentation which is basic presentation level
 
Data Privacy using IoTs in Smart Cities Project
 Data Privacy using IoTs in Smart Cities Project Data Privacy using IoTs in Smart Cities Project
Data Privacy using IoTs in Smart Cities Project
 
Internet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless HibernationInternet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless Hibernation
 
123456.pptx
123456.pptx123456.pptx
123456.pptx
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Io t research_arpanpal_iem
Io t research_arpanpal_iemIo t research_arpanpal_iem
Io t research_arpanpal_iem
 
An Analysis of the Architecture of the Internet of Things.pdf
An Analysis of the Architecture of the Internet of Things.pdfAn Analysis of the Architecture of the Internet of Things.pdf
An Analysis of the Architecture of the Internet of Things.pdf
 
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdfHOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
 
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperKSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
 
1_IoT and Its Interfacing Techniques.pdf
1_IoT and Its Interfacing Techniques.pdf1_IoT and Its Interfacing Techniques.pdf
1_IoT and Its Interfacing Techniques.pdf
 

Mais de Arpan Pal

Mobisys io t_health_arpanpal
Mobisys io t_health_arpanpalMobisys io t_health_arpanpal
Mobisys io t_health_arpanpalArpan Pal
 
Tcs tele rehab-hod-0.4
Tcs tele rehab-hod-0.4Tcs tele rehab-hod-0.4
Tcs tele rehab-hod-0.4Arpan Pal
 
Io t standard_bis_arpanpal
Io t standard_bis_arpanpalIo t standard_bis_arpanpal
Io t standard_bis_arpanpalArpan Pal
 
Healthcare arpan pal gws
Healthcare arpan pal gwsHealthcare arpan pal gws
Healthcare arpan pal gwsArpan Pal
 
Arpan pal u-world
Arpan pal   u-worldArpan pal   u-world
Arpan pal u-worldArpan Pal
 
Arpan pal csi2012
Arpan pal csi2012Arpan pal csi2012
Arpan pal csi2012Arpan Pal
 
Arpan pal ncccs
Arpan pal ncccsArpan pal ncccs
Arpan pal ncccsArpan Pal
 
Arpan pal tac tics2012
Arpan pal tac tics2012Arpan pal tac tics2012
Arpan pal tac tics2012Arpan Pal
 
Arpan pal u world2012
Arpan pal u world2012Arpan pal u world2012
Arpan pal u world2012Arpan Pal
 
Arpan pal gridcomputing_iot_uworld2013
Arpan pal gridcomputing_iot_uworld2013Arpan pal gridcomputing_iot_uworld2013
Arpan pal gridcomputing_iot_uworld2013Arpan Pal
 
Arpan pal besu
Arpan pal besuArpan pal besu
Arpan pal besuArpan Pal
 
Bitm2003 802.11g
Bitm2003 802.11gBitm2003 802.11g
Bitm2003 802.11gArpan Pal
 
Contest presentation ocr
Contest presentation ocrContest presentation ocr
Contest presentation ocrArpan Pal
 
Contest presentation epg
Contest presentation epgContest presentation epg
Contest presentation epgArpan Pal
 
Grid computing iot_sci_bbsr
Grid computing iot_sci_bbsrGrid computing iot_sci_bbsr
Grid computing iot_sci_bbsrArpan Pal
 
Euro india2006 wirelessradioembeddedchallenges
Euro india2006 wirelessradioembeddedchallengesEuro india2006 wirelessradioembeddedchallenges
Euro india2006 wirelessradioembeddedchallengesArpan Pal
 
Hip case study tcs iitb
Hip case study tcs iitbHip case study tcs iitb
Hip case study tcs iitbArpan Pal
 

Mais de Arpan Pal (20)

Mobisys io t_health_arpanpal
Mobisys io t_health_arpanpalMobisys io t_health_arpanpal
Mobisys io t_health_arpanpal
 
Tcs tele rehab-hod-0.4
Tcs tele rehab-hod-0.4Tcs tele rehab-hod-0.4
Tcs tele rehab-hod-0.4
 
Io t standard_bis_arpanpal
Io t standard_bis_arpanpalIo t standard_bis_arpanpal
Io t standard_bis_arpanpal
 
Healthcare arpan pal gws
Healthcare arpan pal gwsHealthcare arpan pal gws
Healthcare arpan pal gws
 
Arpan pal u-world
Arpan pal   u-worldArpan pal   u-world
Arpan pal u-world
 
Arpan pal csi2012
Arpan pal csi2012Arpan pal csi2012
Arpan pal csi2012
 
Arpan pal ncccs
Arpan pal ncccsArpan pal ncccs
Arpan pal ncccs
 
Arpan pal tac tics2012
Arpan pal tac tics2012Arpan pal tac tics2012
Arpan pal tac tics2012
 
Arpan pal u world2012
Arpan pal u world2012Arpan pal u world2012
Arpan pal u world2012
 
Arpan pal gridcomputing_iot_uworld2013
Arpan pal gridcomputing_iot_uworld2013Arpan pal gridcomputing_iot_uworld2013
Arpan pal gridcomputing_iot_uworld2013
 
Arpan pal besu
Arpan pal besuArpan pal besu
Arpan pal besu
 
Bitm2003 802.11g
Bitm2003 802.11gBitm2003 802.11g
Bitm2003 802.11g
 
Contest presentation ocr
Contest presentation ocrContest presentation ocr
Contest presentation ocr
 
Contest presentation epg
Contest presentation epgContest presentation epg
Contest presentation epg
 
Embedded
EmbeddedEmbedded
Embedded
 
Grid computing iot_sci_bbsr
Grid computing iot_sci_bbsrGrid computing iot_sci_bbsr
Grid computing iot_sci_bbsr
 
Euro india2006 wirelessradioembeddedchallenges
Euro india2006 wirelessradioembeddedchallengesEuro india2006 wirelessradioembeddedchallenges
Euro india2006 wirelessradioembeddedchallenges
 
Generic mac
Generic macGeneric mac
Generic mac
 
Heig tcs
Heig tcsHeig tcs
Heig tcs
 
Hip case study tcs iitb
Hip case study tcs iitbHip case study tcs iitb
Hip case study tcs iitb
 

Último

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 

Último (20)

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 

Io t of actuating things

  • 1. 0 Internet of Actuating Things Balamuralidhar P, Arpan Pal Innovation Labs, Tata Consultancy Services (TCS), India
  • 2. 1 Internet of Things & M2M  Internet of Things – Towards a vision of networking ‘Things’ on Internet – Practically it signifies o Sensing, Identifying, communicating between physical objects such as home appliances, furniture, vehicles, buildings, components of infrastructures such as roads, utilities and many more…  Machine to Machine (M2M) communications is a part of the above vision
  • 4. 3 Internet of Actuating Things Cognition Computing NetworkingEmbedded Systems Control
  • 5. 4 - 4 - Intelligent Infrastructure Sense Extract Analyze Respond Learn Smartening the Infrastructure by Real-Time Monitoring and Management Monitor Operational Efficiency, Safety & Security, Information Services, Convenience
  • 6. 5 Challenges in Actuating Things  Actuation causes a change in the state of things (can be catastrophic if in-appropriate)  Actuation has associated responsibility – Need authentication, – Timeliness, robustness – Security against un-intended actuations  Action may be triggered by a software agent or human being. Challenges in trusting a software agent.  Energy saving and autonomic capabilities  Cooperative Actuation further these challenges
  • 7. 6 Erasure coding for Robust Protocol  Erasure Coding: k blocks are encoded to n blocks , introducing (n-k) redundancy. If the number of blocks lost during the transmission m <= (n-k), then original information can be recovered.  Mostly used technique to address packet losses is retransmission. This creates un predictable delays and reduced throughput.  Erasure coding is an alternate way to address this. An apriori estimate of the channel condition can help in planning the redundancy required.  From an IoT perspective, this would be impactful for multicast transmissions ( mass upgrade, mass configuration etc)  Evaluation Robust CoAP is in progress
  • 8. 7 Identity based Encryption for Secure IoT  Identity based Encryption system – Here a public key is derived from Identity – Unlike PKI there is no key exchange required during transactions  In IOT/M2M the number of devices involved are too many. Key management and exchange would be an issue  IBE can be used in such cases. Private keys are embedded in the device. Public key is derived from publicly known identities such as IP address, MAC address, URI etc.  Standardisation in progress - IEEE P1636.3/D1
  • 9. 8 Identity Based Encryption Scheme Encrypted Message Public Key Generator(PKG) Device 1 Device 2 1.Use User2 -ID to generate User2’s Public Key. 2. Sign and Encrypt and send message to the User2 1.Use User1-ID to generate User1’s Public Key. 2. Sign and Encrypt and send message to the User1. Encrypted Message SET UP EXTRACT Encrypt Decrypt
  • 10. 9 Some Emerging technologies for actuation  shape memory alloy based actuation – Example: intelligent locking devices for advanced protection and remote control of assets. of smart devices with embedded intelligence, much smaller form factors and less power consumption (smart micro-protection systems (ixp.tz.net)) Emergence of new applications through new actuation technologies
  • 11. 10 Actuation through Bio-mimicry  Ctenophores are small sea creatures that achieve propulsion using thousands of locally controlled ciliated paddles.  electro-chemo-mechanical actuation. The human heart is a flexible network of actuators coordinated with electro-chemo-mechanical waves of contraction.  Stomata are self-controlling variable apertures that work together to solve the gas exchange problem for plants. It can be seen that flexible networks of actuators coordinated using distributed intelligence and sensing provide robust and adaptable performance in the face of complex and varied challenges.
  • 12. Global ICT Standardization for India (GISFI)
  • 13. 12 GISFI  Forum for addressing ICT standardization in India (www.gisfi.org )  Working Groups – Security and Privacy – Future Radio Networks – Internet of Things (IoT) – Service Oriented Network (SEoN) – Green ICT
  • 14. 13 Use Cases being considered in IoT WG IoT WG Healthcare Home Smart Grid Agriculture Food Supply Chain Public Safety Transportation
  • 15. 14 IoT Reference Architecture Sensor / Devices Gateway Service Platform Applications IoT Core Network I1 I2 I3
  • 16. Robots as Actuating Things in IoT
  • 18. 17 Some Social Applications of Robotics  Public safety – Search & Rescue – Detecting human under debris, water and fire  Surveillance – Campus security (mobile cameras and audio) – Monitoring flora and fauna, forest fires  Agriculture / farming  Remote Infrastructure Monitoring & Management  Remote Healthcare & Assisted Living
  • 20. 19 Some technologies for search & rescue
  • 21. 20 Robots as Mobile Gateways  Mobile data collection – Agriculture monitoring – Mobile Agro-advisory System – Real-time sending of Soil Temperature, Soil Moisture, Atmospheric Temperature and Atmospheric Humidity  Advantages of Robots as Mobile Gateways – Energy saving through lower communication range – Periodic Sensor auto calibration
  • 22. 21 Technology Challenges  Wireless Networking – Variable communication range – Mobility: no to moderate (pedestrian) speeds – Dynamic topology – Reliability & robustness, security – Real-time communication for actuation (downlink)
  • 23. 22 Summary  “Actuating Things” have variety of important applications and related challenges  Robots are a popular category of actuators  Wireless robotics need attention of researchers and standardization bodies – Machine to Actuating Machine communications o Next M2M?