IoT Chapter 2
IoT Chapter 2
Presented by:
Ma Yoon Pann Eain
ME.EC-2(16th Batch)
3.8.2023
1
Automation Application Engineering in Local Clouds
2
The local cloud provides some features like
Each of these features can be used to build the desired application services and the
auxiliary support systems needed by the control application, thus reducing the
complexity of the local cloud design.
3
Latency in Local Clouds
4
The payload and protocol size is the other factor that will determine latency over a
network link.
The payloads are most often encoded in XML or JSON. EXI is a standardized approach
to compress XML or JSON encoded payloads. Compression rates of about 30 can be
expected. This will clearly help to reduce the network link latency for a service
transfer.
The minimum latencies achievable will be dependent on number of nodes, type of
MAC, type of transport protocol, payload compression, etc.
Network simulation tools like NS-3 enable the prediction of latency in a specific local
cloud setting.
5
Security in Local Clouds
To secure in local clouds, the possibility is to provide a local security “fencing” around
the local cloud and appropriate authenticating, authorization, and encryption of
services within the local cloud.
Fencing needs ways of keeping non-internal network activity outside the local cloud.
A secure local cloud have should have firewalls at the interface to other clouds which
support blocking of “external” traffic to come into the local cloud.
Such security fencing is dependent on control and minimizing of
communication in and out of the local cloud.
6
Service Authentication and Authorisation
IPSec is an end-to-end security scheme operating in the Internet Layer of the Internet
Protocol Suite. IPSec protects all application traffic over an IP network. Applications
can be automatically secured by IPSec at the IP layer.
Other Internet security systems such as Transport Layer Security (TLS) and Secure Shell
(SSH), operate in the upper layers at the Application layer. Some SOA protocols like
CoAP or MQTT use TLS or DTLS within the protocol, thus protecting the payload during
transport.
8
System of Systems Scalability
9
Inter-cloud Service Exchange Security
For the inter-cloud service exchange there are two processes that will punch holes in
the local cloud security fence. These processes are
Orchestration of an inter-cloud service exchange
The service exchange data path
10
Thank You So Much!!
11