0% found this document useful (0 votes)
7 views62 pages

Lecture 7- Internet of Things

The document provides an overview of the Internet of Things (IoT), describing it as a wireless network connecting various physical objects and enabling communication between them. It outlines the characteristics, components, and functional aspects of IoT, including protocols like MQTT and CoAP, and discusses the challenges and applications of IoT technology. The document emphasizes the importance of understanding and securing IoT to leverage its potential benefits while mitigating risks.

Uploaded by

agonafer ayele
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views62 pages

Lecture 7- Internet of Things

The document provides an overview of the Internet of Things (IoT), describing it as a wireless network connecting various physical objects and enabling communication between them. It outlines the characteristics, components, and functional aspects of IoT, including protocols like MQTT and CoAP, and discusses the challenges and applications of IoT technology. The document emphasizes the importance of understanding and securing IoT to leverage its potential benefits while mitigating risks.

Uploaded by

agonafer ayele
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 62

CSE6314: Special Topics in Systems

and Networks

Internet of thIngs

1
What is IoT?

q Internet connects all people, so it is


called “the Internet of People”
q IoT connects all things, so it is called
“the Internet of Things”

2
What is IoT?

3
What is IoT?

q The Internet of Things, also called


The Internet of Objects, refers to a
wireless network between objects,
usually the network will be wireless
and self-configuring, such as
household appliances.

4
What is IoT?

q By embedding short-range mobile


transceivers into a wide array of
additional gadgets and everyday
items, enabling new forms of
communication between people and
things, and between things
themselves.
5
What is IoT?

q The term "Internet of Things" has


come to describe a number of
technologies and research
disciplines that enable the Internet
to reach out into the real world of
physical objects.

6
What is IoT?

qFrom any time ,any place


connectivity for anyone, we will now
have connectivity for anything!

7
Characteristics of IoT

q Efficient, scalable & associated


architecture.
q Unambiguous naming & addressing
q Abundance of sleeping nodes,
mobile & non-IP devices
q Intermittent connectivity

8
IoT Components

Device (The Thing)

Local Network

Internet

Backend Services

Applications

9
Functional Components of IoT

qComponent for interaction &


communication with other IoT
devices.
q Component for processing & analysis
of operation
q Component for Internet interaction

10
Functional Components of IoT

q Component for handling Web


services of application
q Component to integrate application
services
q User interface to access IoT.

11
IoT Interdependency
Embedded Devices

Application
Virtual
Real-time Kernel Machine
Power Management

Actuators
Radios HTTP
Sensors

Client

6LowPAN Bluetooth Zigbee


MQTT

Web
Client

WiFi Ethernet LOR WiFi CoAP


Client
12
IoT Service Oriented Architecture
Application Application
Contract Interface
front end API
Interface Layer
Service Bus

Service Service Service


Division Integration Integration Service
S
Service Layer Repository
Service Bus E
C
Business Logic U
R
I
Social Network WLAN
T
Network Layer Mobile Network
Internet Y
Database
WSN

Data sensing/acquistion protocol


Sensing Layer
RFID tags Intelligent Sensors RFID reader BLE device WSN
13
IoT Gateways
Software

Switching
Wired/wireless connections

Wired/wireless connections
Routing
Protocol Conversion

Local Firewall & VPN Global


Network Security Network

Processor

14
Technical deviation from Regular
Web
IoT Stack Web Stack

Application Management Application


Binary, CBOR HTMP, XML
MQTT, CoAP, XMPP HTTP, DNS, TLS/SSL

UDP, DTLS UDP, TCP

IPv6
IPv4, IPv6, IPSec
6LoWWPAN

IEEE 802.15.4 MAC Ethernet, DSL, Wireless


IEEE 802.15.4 PHY LAN, Wi-Fi
15
Functionality-based IoT
protocols

q Connectivity (6LowPAN)
q Identification (IPv6, URLs)
q Communication/transport (WiFi,
Bluetooth, LPWAN)

16
Functionality-based IoT
protocols

q Data protocols (MQTT, CoAP)


q Semantic (JSON-LD, Web Thing
Model)

17
MQTT

q Message Queue Telemetry Transport


q It is a published-subscribe-based
lightweight messaging protocol for
use in conjunction with TCP/IP
q Designed to provide connectivity

18
MQTT

q A message broker controls the


publish-subscribe messaging pattern
qA topic to which a client is
subscribed is updated in the form of
message & distributed by the
message broker.

19
MQTT Components

Publisher • Lightweight sensors

• Applications Interested in sensor


Subscriber
data

• Connect publisher & subscriber


Broker • Classify sensor data into topic

20
MQTT Methods

q Connect
q Disconnect
q Subscribe
q Unsubscribe
q Publish

21
MQTT Methods
Laptop

e
rib
c
bs
MQTT Broker Su 0c
30
h
Publish l is
b
300c Pu
Pu
b li
sh
Temperature Sensor 30 0
Su c
bs
cri
be

Mobile Device
22
Communication

qT h e p r o t o c o l u s e s a
publish/subscribe architecture (like
HTTP request/respond).
qMQTT broker is in charge of
dispatching all messages b/n sender
& the rightful receiver.

23
Communication

q Each client that publishes a message


to a broker, includes a topic into the
message.
q Each client that wants to receive
message subscribe to a certain topic
& the broker delivers all messages
with the matching topic to client.
24
MQTT Topics

q A topic is a simple string that can


have more hierarchy levels, which
are separated by a slash
qA sample topic for sending
temperature of the living room could
be house/living-room/temperature.

25
Applications

q Facebook Messenger uses MQTT for


online chat.
q Amazon Web Service uses Amazon
IoT with MQTT.
q Microsoft Azure IoT Hub uses MQTT
as its main protocol for telemetry
messages.
26
SMQTT

q Secure MQTT is an extension of


MQTT which uses encryption.
q The protocol consists of four stages
§ Setup
§ Encryption
§ Publish
§ Decrypt
27
SMQTT

q In the setup phase, the subscribers


register themselves to broker & get
a master secret key
q When the data is published, it is
encrypted & published by the
broker.

28
SMQTT

q Then the broker sends it to the


subscriber.
q The subscriber finally decrypt it
using the same master secret key.

29
CoAP

q Constrained Application Protocols


q Web transfer protocol for use with
constrained nodes & network.
q Designed for Machine-to-Machine
(M2M) application such as
§ Smart energy
§ Building automation
30
CoAP

q Based on Request-Response model


b/n end points
qClient-Server interaction is
asynchronous over a datagram
oriented transport protocol

31
CoAP

q Built over UDP, instead of TCP & has


a light mechanism to provide
reliability.
q CoAP architecture is divided into two
main sub-layers:
§ Messaging
§ Request/response
32
CoAP

qThe messaging sub-layer is


responsible for reliability &
duplication of message
q The request/response dub-layer is
responsible for communication

33
CoAP

q CoAP has four messaging modes:


§ Confirmable
§ Non-confirmable
§ Piggyback
§ Separate

34
CoAP Position

Application

Request
CoAP
Messages

UDP

35
CoAP Request-Response model

Client Server Client Server

CON Non-message

ACK

Confirmable message Non-Confirmable message

36
CoAP Request-Response model

Client Server Client Server

CON CON

ACK+Data ACK

CON
CON (Data)
ACK+Data
ACK

Piggyback message Separate message

37
CoAP Messaging

q Piggyback is used for client/server


direct communication where the
server sends its response directly
after messaging, i.e. within the
acknowledgment message.

38
CoAP Messaging

q The separate mode is used when the


server response comes in message
separate from the acknowledgment.

39
XMPP

q XMPP – Extensible Messaging and


Presence Protocol.
q A communication protocol for
message-oriented middleware based
on XML.
q Real-time exchange of structured
data.
40
XMPP

q It is an open standard protocol


qXMPP uses a client-server
architecture.
q XMPP provides for the discovery of
services residing locally or across a
network.

41
XMPP

qSecurity – Authentication,
encryption, etc.
qF l e x i b i l i t y – S u p p o r t s
interoperability.

42
Core XMPP Technologies

q Core
§ Information about the core XMPP
technologies for XML streaming

q Jingle
§ Multimedia signaling for voice, videos, file
transfer

43
Core XMPP Technologies

q Multi-user chat
§ Flexible, multi-party communication

q pubsub
§ Alert & notification for data syndication.

q BOSH
§ HTTP binding for XMPP.

44
Weaknesses of XMPP

q Does not support QoS.


q Text based communications induces
higher network overheads.
q Binary data must be first encoded to
base64 before transmission.

45
Challenges

q New network traffic patterns to


handle
q Interoperability
q Energy Efficiency
q Interfacing
q Security/Privacy issues
q Lack of standardization
46
Complexity

q Growth of networks
q Interoperability among devices
q Network management
q Heterogeneity in networks
q Protocol standardization within
networks.

47
Scalability

q Flexible within Internet


q IoT integration
q Large scale deployment
q Real-Time connectivity of billions of
devices.

48
Applications

q Business – Shopping scenario


§ When entering the doors, scanners will
identify the tags on her clothing.
§ When shopping in the market, the goods will
introduce themselves.

49
Applications

§ When moving the goods, the reader will tell


the staff to put a new one.
§ When paying for the goods, the microchip of
the credit card will communicate with
checkout reader.

50
Applications

q Intelligent house
§ Remote monitor for smart house
§ Remote control for smart appliance

51
Applications

q Transportation
§ A network of sensors set up throughout a
vehicle can interact with its surroundings to
provide valuable feedback on local roads,
weather and traffic conditions to the car
driver, enabling adaptive drive systems to
respond accordingly

52
IoT application
You name it, and you will have it in IoT
Information Security
Office of Budget and Finance
Education – Partnership – Solutions
How IoT Works?
Enabling
Technologies

RFID Sensor Smart Tech Nano Tech

To collect
To identify To enhance To make
and
and track the power the smaller
process
the data of of the and
the data to
things network by smaller
detect the
devolving things
changes in
processing have the
the
capabilities ability to
physical
to different connect
status of
part of the and
things
network. interact.
Convergence of domains

q IoT breakthrough Innovation


§ E.g. Semantic Interoperability, Energy
Harvesting

q IoT Basic Research


§ E.g. Nano-Tech, Quantum Teleportation

q IoT Sustaining Innovations


§ E.g. Integration of Cloud Technologies
56
TECHNOLOGICAL CHALLENGES OF IoT
• At present IoT is faced with many challenges, such as:
Ø Scalability
Ø Technological Standardization
Ø Inter operability
Ø Discovery
Ø Software complexity
Ø Data volumes and interpretation
Ø Power Supply
Ø Interaction and short range communication
Ø Wireless communication
Ø Fault tolerance
Why be concerned about IoT?
• It’s just another computer, right?
Ø All of the same issues we have with access
control, vulnerability management,
patching, monitoring, etc.
Ø Imagine your network with 1,000,000
more devices
Ø Any compromised device is a foothold on
the network
Threat vs. Opportunity
• If misunderstood and misconfigured, IoT poses
risk to our data, privacy, and safety

• If understood and secured, IoT will enhance


communications, lifestyle, and delivery of services
Recommendations
• Strengthen partnerships with researchers, vendors,
and procurement department
THANK YOU!!

Q&A?
61
END

62

You might also like