SlideShare uma empresa Scribd logo
1 de 20
By Gagninder Kaur
 Requirements of IoT
 Internet of Things Vision
 Challenges in IoT
 IoT strategic Research and Innovation directions
 Future Internet Technologies
 Security, Privacy and Trust
Five essential requirements for processes and practices that
should be part of every IoT implementation:
 Edge computing/analytics
 Data ingestion and stream processing.
 Device management
 Cold path and advanced analytics
 Enterprise integration with business systems
 The vision of the Internet of Things (IoT) can
be seen from two perspectives – “Internet-
centric” and “thing-centric.”
 The Internet-centric architecture involves
Internet services as the main focus, as data is
being generated by the “things.”
 In the thing-centric architecture, smart
devices take the center stage.
 The end goal is to have plug-n-play smart
objects that can be deployed in any
environment with an interoperable
interconnection backbone that allows them to
blend with other smart objects around them.
 Standardization of frequency bands and
protocols plays a pivotal role in
accomplishing this goal.
Source: Elsevier B.V. A., 2013, Internet of Things (IoT): A vision, architectural elements, and future
directions
 Selecting, implementing, customizing and
supporting new technologies across the IoT
continuum, from sensors and cloud platforms, to
analytics and AI.
 Understanding and implementing unfamiliar data
formats and proprietary communication
protocols.
 Integrating the IoT infrastructure with existing
systems without overloading corporate networks,
compromising security, exceeding budget or
falling behind competitive efforts
Three key security requirements:
 Authentication
 Confidentiality
 Access control
Authentication:-
Combines cross-platform communications
with encryption, signature, and
authentication, in order to improve IoT
applications development capabilities by
establishing a secure communication system
among different things
Confidentiality and Integrity :-
is analyzed how existing key management
systems could be applied to the IoT context.
It is possible to classify the Key Management
System (KMS) protocols in four major
categories: key pool framework,
mathematical framework, negotiation
framework, and public key framework
QUESTIONS RELATED TO CONFIDENTIALITY AND SECURITY:-
 Are the IoT proposals adaptable to the IoT environment, considering
both the heterogeneity of the involved devices and the different
application contexts?
 How and at which network layer to handle authentication?
 Is it feasible to reuse the traditional security mechanisms (e.g.,
encryption algorithms) or it is better to start from new solutions?
 How to handle the different keys?
 Which kind of key distribution mechanism is the most suitable?
 How to ensure an end-to-end integrity verification mechanism in
order to make the system more resilient to malicious attacks?
Major challenges related to access control in an IoT scenario which
emerge are:
 How to guarantee the access permission in an environment where
not only users, but also things could be authorized to interact with
the system?
 It is more effective to exploit a centralized or distributed approach
or a semi-distributed one in order to manage the scalable IoT
architecture?
 How to handle the huge amount of transmitted data (i.e., in the form
of stream data) in a common recognized representation?
 How to support the identification of entities
Some solutions used or proposed related to privacy in IoT systems:
 Data Tagging
 A user-controlled privacy-preserved access control protocol
 Continuously Anonymizing STreaming data via adaptive cLustEring
(CASTLE)
 Traditional privacy mechanisms are divided into two categories:
Discretionary Access and Limited Access
 Attribute-Based Encryption (ABE)
Trust in IoT:-
 A main problem with many approaches towards trust definition is
that they do not lend themselves to the establishment of metrics and
evaluation methodologies.
 The satisfaction of trust requirements are strictly related to the
identity management and access control issues.
Device Layer: includes all IoT devices and communication among these
devices.
Request Layer: is mainly responsible for collecting experience,
knowledge and recommendation information and calculating fuzzy
trust value.
Access Control Layer: is involved in decision making process and maps
the calculated fuzzy trust value to the access permissions, with the
principle of least privilege
Following issues are still open in IoT-trust management:
 The introduction of a well-defined trust negotiation language
supporting the semantic interoperability of IoT context.
 The definition of a proper object identity management system.
 The development of a trust negotiation mechanism in order to
handle data stream access control

Mais conteúdo relacionado

Mais procurados

Exciting it trends in 2015 why you should consider shifting and upgrading yo...
Exciting it trends in 2015  why you should consider shifting and upgrading yo...Exciting it trends in 2015  why you should consider shifting and upgrading yo...
Exciting it trends in 2015 why you should consider shifting and upgrading yo...lithanhall
 
apidays LIVE New York 2021 - 5 Pragmatic steps to unlock Open Finance with AP...
apidays LIVE New York 2021 - 5 Pragmatic steps to unlock Open Finance with AP...apidays LIVE New York 2021 - 5 Pragmatic steps to unlock Open Finance with AP...
apidays LIVE New York 2021 - 5 Pragmatic steps to unlock Open Finance with AP...apidays
 
Rethink! How Digital Transformation disrupts Enterprise Architecture
Rethink! How Digital Transformation disrupts Enterprise ArchitectureRethink! How Digital Transformation disrupts Enterprise Architecture
Rethink! How Digital Transformation disrupts Enterprise ArchitectureLeanIX GmbH
 
Digital Transformation, Enterprise Architecture, Big Data by Danairat
Digital Transformation, Enterprise Architecture, Big Data by DanairatDigital Transformation, Enterprise Architecture, Big Data by Danairat
Digital Transformation, Enterprise Architecture, Big Data by DanairatDanairat Thanabodithammachari
 
Affordable ERP solutions on low-code
Affordable ERP solutions on low-codeAffordable ERP solutions on low-code
Affordable ERP solutions on low-codeZoho Creator
 
About Transforma Insights (February 2021)
About Transforma Insights (February 2021)About Transforma Insights (February 2021)
About Transforma Insights (February 2021)Matt Hatton
 
Service now grc_strategy for growth
Service now grc_strategy for growthService now grc_strategy for growth
Service now grc_strategy for growthSubrat Kumar Dash
 
Idc datadog-expands-into-apm
Idc datadog-expands-into-apmIdc datadog-expands-into-apm
Idc datadog-expands-into-apmBrett Sheppard
 
Stepping into the Digital Future with IoT
Stepping into the Digital Future with IoTStepping into the Digital Future with IoT
Stepping into the Digital Future with IoTCognizant
 
Forrester Research: Total Economic Impact of the Dell Boomi Platform
Forrester Research: Total Economic Impact of the Dell Boomi PlatformForrester Research: Total Economic Impact of the Dell Boomi Platform
Forrester Research: Total Economic Impact of the Dell Boomi Platforme-SupplyLink
 
Constellation Labs - Business Whitepaper
Constellation Labs - Business WhitepaperConstellation Labs - Business Whitepaper
Constellation Labs - Business Whitepaperrun_frictionless
 
Accelerating hybrid-cloud adoption in banking and securities
Accelerating hybrid-cloud adoption in banking and securitiesAccelerating hybrid-cloud adoption in banking and securities
Accelerating hybrid-cloud adoption in banking and securitiesMcKinsey & Company
 
IBM Hybrid integration reference architecture for digital transformation
IBM Hybrid integration reference architecture for digital transformationIBM Hybrid integration reference architecture for digital transformation
IBM Hybrid integration reference architecture for digital transformationJawad Jari, Enterprise Architect
 
Mobile Suite Presentation English
Mobile Suite Presentation EnglishMobile Suite Presentation English
Mobile Suite Presentation EnglishITS SA
 
North America Strategic Modernization Exec Forum
North America Strategic Modernization Exec Forum North America Strategic Modernization Exec Forum
North America Strategic Modernization Exec Forum Micro Focus
 
Migite presents iLeap, the premier low code application development platform
Migite presents iLeap, the premier low code application development platformMigite presents iLeap, the premier low code application development platform
Migite presents iLeap, the premier low code application development platformGejamuganLatsoomanan2
 
Digital Transformation in Manufacturing - A Whitepaper by RapidValue Solutions
Digital Transformation in Manufacturing - A Whitepaper by RapidValue SolutionsDigital Transformation in Manufacturing - A Whitepaper by RapidValue Solutions
Digital Transformation in Manufacturing - A Whitepaper by RapidValue SolutionsRapidValue
 

Mais procurados (20)

Exciting it trends in 2015 why you should consider shifting and upgrading yo...
Exciting it trends in 2015  why you should consider shifting and upgrading yo...Exciting it trends in 2015  why you should consider shifting and upgrading yo...
Exciting it trends in 2015 why you should consider shifting and upgrading yo...
 
BaaS - Banking as a Service
BaaS - Banking as a ServiceBaaS - Banking as a Service
BaaS - Banking as a Service
 
apidays LIVE New York 2021 - 5 Pragmatic steps to unlock Open Finance with AP...
apidays LIVE New York 2021 - 5 Pragmatic steps to unlock Open Finance with AP...apidays LIVE New York 2021 - 5 Pragmatic steps to unlock Open Finance with AP...
apidays LIVE New York 2021 - 5 Pragmatic steps to unlock Open Finance with AP...
 
Rethink! How Digital Transformation disrupts Enterprise Architecture
Rethink! How Digital Transformation disrupts Enterprise ArchitectureRethink! How Digital Transformation disrupts Enterprise Architecture
Rethink! How Digital Transformation disrupts Enterprise Architecture
 
Digital Transformation, Enterprise Architecture, Big Data by Danairat
Digital Transformation, Enterprise Architecture, Big Data by DanairatDigital Transformation, Enterprise Architecture, Big Data by Danairat
Digital Transformation, Enterprise Architecture, Big Data by Danairat
 
Affordable ERP solutions on low-code
Affordable ERP solutions on low-codeAffordable ERP solutions on low-code
Affordable ERP solutions on low-code
 
About Transforma Insights (February 2021)
About Transforma Insights (February 2021)About Transforma Insights (February 2021)
About Transforma Insights (February 2021)
 
Service now grc_strategy for growth
Service now grc_strategy for growthService now grc_strategy for growth
Service now grc_strategy for growth
 
Idc datadog-expands-into-apm
Idc datadog-expands-into-apmIdc datadog-expands-into-apm
Idc datadog-expands-into-apm
 
Stepping into the Digital Future with IoT
Stepping into the Digital Future with IoTStepping into the Digital Future with IoT
Stepping into the Digital Future with IoT
 
Forrester Research: Total Economic Impact of the Dell Boomi Platform
Forrester Research: Total Economic Impact of the Dell Boomi PlatformForrester Research: Total Economic Impact of the Dell Boomi Platform
Forrester Research: Total Economic Impact of the Dell Boomi Platform
 
Constellation Labs - Business Whitepaper
Constellation Labs - Business WhitepaperConstellation Labs - Business Whitepaper
Constellation Labs - Business Whitepaper
 
Accelerating hybrid-cloud adoption in banking and securities
Accelerating hybrid-cloud adoption in banking and securitiesAccelerating hybrid-cloud adoption in banking and securities
Accelerating hybrid-cloud adoption in banking and securities
 
Value journal November_2019
Value journal November_2019Value journal November_2019
Value journal November_2019
 
IBM Hybrid integration reference architecture for digital transformation
IBM Hybrid integration reference architecture for digital transformationIBM Hybrid integration reference architecture for digital transformation
IBM Hybrid integration reference architecture for digital transformation
 
Mobile Suite Presentation English
Mobile Suite Presentation EnglishMobile Suite Presentation English
Mobile Suite Presentation English
 
Lbe investor deck 072315 slideshare
Lbe investor deck 072315 slideshareLbe investor deck 072315 slideshare
Lbe investor deck 072315 slideshare
 
North America Strategic Modernization Exec Forum
North America Strategic Modernization Exec Forum North America Strategic Modernization Exec Forum
North America Strategic Modernization Exec Forum
 
Migite presents iLeap, the premier low code application development platform
Migite presents iLeap, the premier low code application development platformMigite presents iLeap, the premier low code application development platform
Migite presents iLeap, the premier low code application development platform
 
Digital Transformation in Manufacturing - A Whitepaper by RapidValue Solutions
Digital Transformation in Manufacturing - A Whitepaper by RapidValue SolutionsDigital Transformation in Manufacturing - A Whitepaper by RapidValue Solutions
Digital Transformation in Manufacturing - A Whitepaper by RapidValue Solutions
 

Semelhante a Iot 7-12-2021

An efficient lightweight key exchange algorithm for internet of things appli...
An efficient lightweight key exchange algorithm for internet of  things appli...An efficient lightweight key exchange algorithm for internet of  things appli...
An efficient lightweight key exchange algorithm for internet of things appli...IJECEIAES
 
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET-  	  An Approach to Authenticating Devise in IoT using BlockchainIRJET-  	  An Approach to Authenticating Devise in IoT using Blockchain
IRJET- An Approach to Authenticating Devise in IoT using BlockchainIRJET Journal
 
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...IRJET Journal
 
Zero Trust 20211105
Zero Trust 20211105 Zero Trust 20211105
Zero Trust 20211105 Thomas Treml
 
Understanding the Information Architecture, Data Management, and Analysis Cha...
Understanding the Information Architecture, Data Management, and Analysis Cha...Understanding the Information Architecture, Data Management, and Analysis Cha...
Understanding the Information Architecture, Data Management, and Analysis Cha...Cognizant
 
Trust management techniques_for_the_internet_of_things_a_survey-converted
Trust management techniques_for_the_internet_of_things_a_survey-convertedTrust management techniques_for_the_internet_of_things_a_survey-converted
Trust management techniques_for_the_internet_of_things_a_survey-convertedtanvir616
 
Io t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsIo t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsShyam Goyal
 
Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Asiri Hewage
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityIRJET Journal
 
University of Borås-full talk-2023-12-09.pptx
University of Borås-full talk-2023-12-09.pptxUniversity of Borås-full talk-2023-12-09.pptx
University of Borås-full talk-2023-12-09.pptxMahdi_Fahmideh
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET Journal
 
76 s201918
76 s20191876 s201918
76 s201918IJRAT
 
Security Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A ReviewSecurity Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A ReviewIJERA Editor
 
A signature-based data security and authentication framework for internet of...
A signature-based data security and authentication framework  for internet of...A signature-based data security and authentication framework  for internet of...
A signature-based data security and authentication framework for internet of...IJECEIAES
 
How blockchain will defend iot
How blockchain will defend iotHow blockchain will defend iot
How blockchain will defend iotHitesh Malviya
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
 

Semelhante a Iot 7-12-2021 (20)

An efficient lightweight key exchange algorithm for internet of things appli...
An efficient lightweight key exchange algorithm for internet of  things appli...An efficient lightweight key exchange algorithm for internet of  things appli...
An efficient lightweight key exchange algorithm for internet of things appli...
 
security and privacy-Internet of things
security and privacy-Internet of thingssecurity and privacy-Internet of things
security and privacy-Internet of things
 
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET-  	  An Approach to Authenticating Devise in IoT using BlockchainIRJET-  	  An Approach to Authenticating Devise in IoT using Blockchain
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
 
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
 
Zero Trust 20211105
Zero Trust 20211105 Zero Trust 20211105
Zero Trust 20211105
 
Understanding the Information Architecture, Data Management, and Analysis Cha...
Understanding the Information Architecture, Data Management, and Analysis Cha...Understanding the Information Architecture, Data Management, and Analysis Cha...
Understanding the Information Architecture, Data Management, and Analysis Cha...
 
Trust management techniques_for_the_internet_of_things_a_survey-converted
Trust management techniques_for_the_internet_of_things_a_survey-convertedTrust management techniques_for_the_internet_of_things_a_survey-converted
Trust management techniques_for_the_internet_of_things_a_survey-converted
 
Io t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsIo t security_review_blockchain_solutions
Io t security_review_blockchain_solutions
 
Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Security Aspects in IoT - A Review
Security Aspects in IoT - A Review
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
 
Io t first(1)
Io t first(1)Io t first(1)
Io t first(1)
 
University of Borås-full talk-2023-12-09.pptx
University of Borås-full talk-2023-12-09.pptxUniversity of Borås-full talk-2023-12-09.pptx
University of Borås-full talk-2023-12-09.pptx
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
 
76 s201918
76 s20191876 s201918
76 s201918
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
 
Security Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A ReviewSecurity Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A Review
 
A signature-based data security and authentication framework for internet of...
A signature-based data security and authentication framework  for internet of...A signature-based data security and authentication framework  for internet of...
A signature-based data security and authentication framework for internet of...
 
Cybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - SkillmineCybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - Skillmine
 
How blockchain will defend iot
How blockchain will defend iotHow blockchain will defend iot
How blockchain will defend iot
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
 

Último

ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 

Último (20)

ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 

Iot 7-12-2021

  • 2.  Requirements of IoT  Internet of Things Vision  Challenges in IoT  IoT strategic Research and Innovation directions  Future Internet Technologies  Security, Privacy and Trust
  • 3. Five essential requirements for processes and practices that should be part of every IoT implementation:  Edge computing/analytics  Data ingestion and stream processing.  Device management  Cold path and advanced analytics  Enterprise integration with business systems
  • 4.  The vision of the Internet of Things (IoT) can be seen from two perspectives – “Internet- centric” and “thing-centric.”  The Internet-centric architecture involves Internet services as the main focus, as data is being generated by the “things.”  In the thing-centric architecture, smart devices take the center stage.
  • 5.  The end goal is to have plug-n-play smart objects that can be deployed in any environment with an interoperable interconnection backbone that allows them to blend with other smart objects around them.  Standardization of frequency bands and protocols plays a pivotal role in accomplishing this goal.
  • 6. Source: Elsevier B.V. A., 2013, Internet of Things (IoT): A vision, architectural elements, and future directions
  • 7.  Selecting, implementing, customizing and supporting new technologies across the IoT continuum, from sensors and cloud platforms, to analytics and AI.  Understanding and implementing unfamiliar data formats and proprietary communication protocols.  Integrating the IoT infrastructure with existing systems without overloading corporate networks, compromising security, exceeding budget or falling behind competitive efforts
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13. Three key security requirements:  Authentication  Confidentiality  Access control
  • 14. Authentication:- Combines cross-platform communications with encryption, signature, and authentication, in order to improve IoT applications development capabilities by establishing a secure communication system among different things
  • 15. Confidentiality and Integrity :- is analyzed how existing key management systems could be applied to the IoT context. It is possible to classify the Key Management System (KMS) protocols in four major categories: key pool framework, mathematical framework, negotiation framework, and public key framework
  • 16. QUESTIONS RELATED TO CONFIDENTIALITY AND SECURITY:-  Are the IoT proposals adaptable to the IoT environment, considering both the heterogeneity of the involved devices and the different application contexts?  How and at which network layer to handle authentication?  Is it feasible to reuse the traditional security mechanisms (e.g., encryption algorithms) or it is better to start from new solutions?  How to handle the different keys?  Which kind of key distribution mechanism is the most suitable?  How to ensure an end-to-end integrity verification mechanism in order to make the system more resilient to malicious attacks?
  • 17. Major challenges related to access control in an IoT scenario which emerge are:  How to guarantee the access permission in an environment where not only users, but also things could be authorized to interact with the system?  It is more effective to exploit a centralized or distributed approach or a semi-distributed one in order to manage the scalable IoT architecture?  How to handle the huge amount of transmitted data (i.e., in the form of stream data) in a common recognized representation?  How to support the identification of entities
  • 18. Some solutions used or proposed related to privacy in IoT systems:  Data Tagging  A user-controlled privacy-preserved access control protocol  Continuously Anonymizing STreaming data via adaptive cLustEring (CASTLE)  Traditional privacy mechanisms are divided into two categories: Discretionary Access and Limited Access  Attribute-Based Encryption (ABE)
  • 19. Trust in IoT:-  A main problem with many approaches towards trust definition is that they do not lend themselves to the establishment of metrics and evaluation methodologies.  The satisfaction of trust requirements are strictly related to the identity management and access control issues. Device Layer: includes all IoT devices and communication among these devices. Request Layer: is mainly responsible for collecting experience, knowledge and recommendation information and calculating fuzzy trust value. Access Control Layer: is involved in decision making process and maps the calculated fuzzy trust value to the access permissions, with the principle of least privilege
  • 20. Following issues are still open in IoT-trust management:  The introduction of a well-defined trust negotiation language supporting the semantic interoperability of IoT context.  The definition of a proper object identity management system.  The development of a trust negotiation mechanism in order to handle data stream access control