The document provides an introduction to the Internet of Things (IoT). It discusses the history and growth of IoT, including forecasts of 20-50 billion connected devices by 2020. Key enabling technologies for IoT are described, such as sensors, actuators, embedded systems, connectivity standards, and cloud computing. Example applications of IoT are highlighted in areas like smart cities, homes, cars, and industrial settings. However, security and privacy challenges are also noted as areas that must be addressed for IoT to reach its full potential.
4. IoT: Some historical facts
1999
The term “Internet of Things” is used.
By Kevin Ashton (MIT) during a presentation about on RFID technology made to
Procter & Gamble (P&G).The phrase referred to a future world where all types of
electronic devices link to each other via the Internet.
2004
The number of active mobile-connected devices surpasses the number of people
in the world
2000 LG announces it's first Internet refrigerator plans.
4
2017
Amazon’s Alexa stole the show at CES in a bid to become the Internet of Things
operating system. Amazon Alexa present in a lot of devices and products including
Ford cars, LG's new refrigerator, and Huawei's Mate 9 smartphone.
13. IoT and Digital Agenda For Europe
Internet of Things seeks to merge physical and virtual
worlds creating 'smart environments' to improve
citizens lives.The European Commission supports IoT
innovation and future deployment.
https://www.youtube.com/watch?v=kq8wcjQYW90&list=PLD4B1B7AB8011CFB7&index=2
http://ec.europa.eu/digital-agenda/en/internet-things 13
14. What is the Internet of Things?
The Internet of Things (IoT) is the network of
physical objects that contain embedded technology
to communicate and sense or interact with their
internal states or the external environment.*
*Source: Gartner 14
15. Some IoT tagline
Intelligent Systems
Smarter Planet
Industrial Internet
Networked Society Internet of Everything
Internet of Things
and Services
15
16. IoT Enablers 1/2
Sensor
– measures physical parameters, such as temperature, sound, and
light
– maps a physical quantity into an electrical signal
Actuator
– modifies physical parameters
– maps an electrical signal into a physical quantity
16
19. Sensor: From Low Power to No Power
Energy harvesting is the process of capturing and converting
ambient energy – light, vibration, thermal and radio waves –
into electricity for a wide range of applications.
19
27. From Intranet of Things…
M2M Solution
Vertical solutions implemented in silos
Dedicated Networks /Protocols (case of
proprietary communication stacks)
27
28. …Towards the Internet of Things 1/2
The emergence of horizontal platforms will be a
key component of the future IoT ecosystem.
This will allow a transition to a true Internet of
Things, where all “things” can be directly
accessible from any other point in the Internet
Advanteges:
– Any Application to any device
– Cost efficiency
– Large Developer Community
– New services
28
31. The IPv6 IoT protocols
31
Constraint-based
routing
6LoWPAN (IETF RFC)
– IPv6 over Low power Wireless Personal Area Networks
RPL (IETF RFC)
– Routing Protocol for Low Power and Lossy Networks
CoAP
– Constrained Application Protocol
32. IoT – Some Technology push
The increasing role of smart devices
– Driven in-part by a sensible price decline, sensors and actuators are
being embedded in engineered equipment that are deployed in
several sectors.
Enhanced communication infrastructure
– The ability to connect anything anytime is helping make IoT a reality.
32
34. Cost of Computing Power Equal to an iPad2
If the typical worker in 1982 wanted to purchase something
with computing power of an iPad2, it would have cost more
than the 360 years worth of wages.
34
35. Cloud Computing
“Cloud computing is a model for
enabling ubiquitous, convenient, on-
demand network access to a shared pool
of configurable resources (e.g.,
networks, servers, storage, applications,
and services) that can be rapidly
provisioned and released with minimal
management effort or service provider
interaction“
NIST Definition
35
36. Cloud Services & associated “users”
Software as a Service
(SaaS)
Platform as a Service
(PaaS)
Infrastructure as a Service
(IaaS)
Developers
End Users
System Admin
36
39. Some Benefits of a Cloud Service
Eliminate many of the complex constraints of traditional
computing enviroment including space, time of
deployment….
Follow the model of «Pay as you go»: convert capital cost
(Capex) to operational expences (Opex)
Avoid the risk of under-utilization and saturation of the
resources
39
41. Case: Animoto peaks using AWS
From 40 to 5000 server in 3 days
41
https://aws.amazon.com/it/solutions/case-studies/start-ups/
42. Amazon AWS is only for start-up?
http://aws.amazon.com/solutions/case-studies/
Some companies using AWS
42
43. IoT Applications: Consumer & Industrial
Consumer IoT
Industrial IoT
• may ultimately dwarf the consumer side
in potential business and socioeconomic
impacts.
• Will transform many industries:
manufacturing, oil and gas, agriculture,
transportation and healthcare. …
such as smart homes, connected cars and
consumer wearables like wristband activity
trackers.
The IoT opens up many players to create new business opportunities in
the consumer and Industrial markets
43
44. IoT Applications and Cloud Computing
Some IoT applications
probably are not
compatible with
the assumptions
of Cloud Centric
Architectures
44
51. Fog Computing
Fog is like Cloud Computing but closer to the Things
Geographical distribution and proximity to end-users
and devices allows for improved service quality and
speed at the network edge.
Needed for applications that demand real-time and
predictable latency Industrial automation, sensor
network management, real-time actuation
51
52. Internet of Things - Applications
52
SMARTCITY
SMART HOME & BUILDING
SMART CAR
…….
54. Some Smart Devices for home automation
Netatmo Welcome
Connected security
camera. Face recognition
to allow you to know who
is in your house.
Honeywell Evohome
is an intelligent heating
system with ‘Smart Zoning’
that allows for room by room
temperature control..
Philips HUE
connected bulbs and bridge
let you to take full control of
your lighting.
Wi-Fi Smart Plug
allows you to turn your
devices on or off, wherever
you are
54
55. Integrate services of multiple vendor
Services are the apps and devices we use every day
IFTTT Applets bring our services together to create
new experiences
55
56. Vehicle-to-Everything (V2X)
56
V2X, is a wireless technologies aimed at increasing road safety
and improve traffic management, introducing a new concept of
intelligent transport system (ITS), capable to reduce
environmental impact.
57. More Smarts, More Risk
If every IoT device has some sort of operating system and
memory, it becomes a potential subject for hacking or
inadvertent misconfiguration.
57
58. 2014: Receive an email from a Fridge ???
100,000 devices used to take part in the spam campaign.
The attack is believed to be one of the first to exploit the lax
security on devices that are part of the "internet of things".
58
60. 2016: Mirai Botnet: IoT DDoS attack
Bringed down sites/services including Twitter, Paypal,
Netflix, CNN… and many others in Europe and the US.
Orchestrated using the Mirai botnet, a network of devices
infected with self-propagating malware
Estimated 100,000 malicious endpoints: mainly IoT
Devices!
60
62. Discover Insecure IoT Devises
Using Shodan to Find Devices Exposed on the Internet
Shodan is of particular use for security research
around the Internet of Things, since there will soon
be billions of devices online that:
– have specific vulnerabilities that need to be fixed
http://www.shodan.io 62
64. 1. IoT: very huge market and interest
2. Technology: there isn’t a unique solution
3. IoT Challanges: Must be addressed
IoT Introduction
Key Messages
64