1. 0
Internet of Actuating Things
Balamuralidhar P, Arpan Pal
Innovation Labs, Tata Consultancy Services (TCS), India
2. 1
Internet of Things & M2M
Internet of Things
– Towards a vision of networking ‘Things’ on Internet
– Practically it signifies
o Sensing, Identifying, communicating between physical objects such as
home appliances, furniture, vehicles, buildings, components of
infrastructures such as roads, utilities and many more…
Machine to Machine (M2M) communications is a part of the above
vision
5. 4
- 4 -
Intelligent Infrastructure
Sense
Extract
Analyze
Respond
Learn
Smartening the Infrastructure by
Real-Time Monitoring and
Management
Monitor
Operational Efficiency,
Safety & Security,
Information Services,
Convenience
6. 5
Challenges in Actuating Things
Actuation causes a change in the state of things (can be
catastrophic if in-appropriate)
Actuation has associated responsibility
– Need authentication,
– Timeliness, robustness
– Security against un-intended actuations
Action may be triggered by a software agent or human being.
Challenges in trusting a software agent.
Energy saving and autonomic capabilities
Cooperative Actuation further these challenges
7. 6
Erasure coding for Robust Protocol
Erasure Coding: k blocks are encoded to n blocks , introducing
(n-k) redundancy. If the number of blocks lost during the
transmission m <= (n-k), then original information can be
recovered.
Mostly used technique to address packet losses is
retransmission. This creates un predictable delays and
reduced throughput.
Erasure coding is an alternate way to
address this. An apriori estimate of the
channel condition can help in planning the
redundancy required.
From an IoT perspective, this would be
impactful for multicast transmissions (
mass upgrade, mass configuration etc)
Evaluation Robust CoAP is in progress
8. 7
Identity based Encryption for Secure IoT
Identity based Encryption system
– Here a public key is derived from Identity
– Unlike PKI there is no key exchange required during transactions
In IOT/M2M the number of devices involved are too many. Key
management and exchange would be an issue
IBE can be used in such cases. Private keys are embedded in
the device. Public key is derived from publicly known identities
such as IP address, MAC address, URI etc.
Standardisation in progress - IEEE P1636.3/D1
9. 8
Identity Based Encryption Scheme
Encrypted Message
Public Key Generator(PKG)
Device 1
Device 2
1.Use User2 -ID to generate User2’s
Public Key.
2. Sign and Encrypt and send message
to the User2
1.Use User1-ID to generate User1’s
Public Key.
2. Sign and Encrypt and send message
to the User1.
Encrypted Message
SET UP
EXTRACT
Encrypt Decrypt
10. 9
Some Emerging technologies for actuation
shape memory alloy based actuation
– Example: intelligent locking devices
for advanced protection and remote
control of assets. of smart devices
with embedded intelligence, much
smaller form factors and less power
consumption (smart micro-protection
systems (ixp.tz.net))
Emergence of new applications through new actuation
technologies
11. 10
Actuation through Bio-mimicry
Ctenophores are small sea creatures that
achieve propulsion using thousands of locally
controlled ciliated paddles.
electro-chemo-mechanical actuation. The
human heart is a flexible network of actuators
coordinated with electro-chemo-mechanical
waves of contraction.
Stomata are self-controlling variable apertures
that work together to solve the gas exchange
problem for plants. It can be seen that flexible
networks of actuators coordinated using
distributed intelligence and sensing provide
robust and adaptable performance in the face
of complex and varied challenges.
13. 12
GISFI
Forum for addressing ICT standardization in India (www.gisfi.org )
Working Groups
– Security and Privacy
– Future Radio Networks
– Internet of Things (IoT)
– Service Oriented Network (SEoN)
– Green ICT
14. 13
Use Cases being considered in IoT WG
IoT WG
Healthcare
Home
Smart Grid
Agriculture
Food Supply Chain
Public Safety
Transportation
18. 17
Some Social Applications of Robotics
Public safety – Search & Rescue
– Detecting human under debris, water and fire
Surveillance
– Campus security (mobile cameras and audio)
– Monitoring flora and fauna, forest fires
Agriculture / farming
Remote Infrastructure Monitoring & Management
Remote Healthcare & Assisted Living
21. 20
Robots as Mobile Gateways
Mobile data collection
– Agriculture monitoring
– Mobile Agro-advisory System
– Real-time sending of Soil Temperature, Soil Moisture, Atmospheric
Temperature and Atmospheric Humidity
Advantages of Robots as Mobile Gateways
– Energy saving through lower communication range
– Periodic Sensor auto calibration
22. 21
Technology Challenges
Wireless Networking
– Variable communication range
– Mobility: no to moderate (pedestrian) speeds
– Dynamic topology
– Reliability & robustness, security
– Real-time communication for actuation (downlink)
23. 22
Summary
“Actuating Things” have variety of important applications and
related challenges
Robots are a popular category of actuators
Wireless robotics need attention of researchers and
standardization bodies
– Machine to Actuating Machine communications
o Next M2M?