Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
(IOT)
OUTLINE
Introduction
Definition of IoT
Characteristics of IoT
Challenges and Issues of IoT
Physical Design of IoT
Logical Design of IoT
IoT Functional Blocks
Security
INTRODUCTION
The IOT concept was coined by a member of the Radio
Frequency Identification (RFID) development community in
1999
And it has recently become more relevant to the practical
world largely because of the growth of mobile devices,
embedded and ubiquitous communication, cloud computing
and data analytics
The Internet of Things is a concept in which the virtual world of
information technology integrates seamlessly the real world of
things.
The real world becomes more accessible through
computers and networked devices in business as well
as everyday scenarios.
With access to fine-grained information,
management can start to move freely from macro to
micro levels and will be able to measure, plan and
act accordingly.
However, the Internet of Things is more than a
business tool for managing business processes more
efficiently and more effectively – it will also enable
a more convenient way of life.
A PHASED APPROACH FROM THE INTRANET OF THINGS TO A FUTURE
VISION ON THE INTERNET OF THINGS
IoT allows things to communicate and exchange data
(control & information, that could include associated with
user) while executing meaningful applications towards a
common user or machine goal
IoT network extract and create information from lower
level data by filtering, processing, categorizing,
condensing and contextualizing the data.
This information obtained is then organized and
structured to infer knowledge about the system and/or its
user, its environment, and its operations and progress
towards its objectives, allowing a smarter performance
INFERRING INFORMATION
AND KNOWLEDGE FROM
DATA
DEFINITION
AllSeen Alliance
Led by Qualcomm, many others
SAMPLE STANDARDS
IOT MATURITY MODEL- IOTMM
ADDRESSING ISSUES
Incredibly high number of nodes, each of which will produce content that
should be retrievable by any authorized user
This requires effective addressing policies
IPv4 protocol may already reached its limit. Alternatives?
IPv6 addressing has been proposed for low-‐power wireless
communication nodes within the 6LoWPAN context
IPv6 addresses are expressed by means of 128 bits 1038 addresses,
enough to iden1fy objects worth to be addressed
RFID tags use 64–96 bit identifiers, as standardized by EPCglobal,
solutions to enable the addressing of RFID tags into IPv6 networks
Encapsulation of RFID message into an IPv6 packet.
NEW NETWORK TRAffiC PATTERNS TO HANDLE
The characteristics of the smart objects traffic in the IoT is still not known
Important basis for the design of the network infrastructures and protocols
Authentication problem
Proxy attack, a.k.a. man in the middle attack problem
Data integrity
An IoT device can collect various types of data from the on-
board or attached sensors, such as temperature, humidity, light
intensity
Almost all IoT devices generate data in some form or the other
which when processes by data analytics systems leads to
useful information to guide further actions locally or remotely
IOT DEVICES
IOT PROTOCOL STACK
IoT Protocols
Link Layer
Link layer protocols determine how the data is physically sent over the
network’s physical layer or medium (e.g., copper wire, coaxial cable, or
a radio wave)
The scope of the link layer is the local network connection to which host is
attached
Hosts on the same link exchange data packets over the link layer using
link layer protocols
Link layer determines how the packets are coded and signaled by the
hardware device over the medium to which the host is attached (such as
a coaxial cable)
IEEE802.3-Ethiernet
IEEE802.11-Wi-Fi
IEEE802.16-WiMax
IEEE802.15.4-LR-WPAN
2G/3G/4G- Mobile Communication
IEEE802.3-ETHIERNET
IEEE802.3 is a collection of wired Ethernet standards for the
link layer
It is the standard for 10BASE5 Ethernet that uses coaxial cable
as a shared medium
802.3.i is the standard for 10BASE-T Ethernet over copper
twisted-pair cable connections
802.3.j is the standard for 10BASE-F Ethernet over fiber optic
connections
802.3ae is the standard for 10Gbit/s Ethernet over fiber, and
so on
These standards provide data rates from 10 Mb/s to 40
Gb/s and higher
The shared medium in Ethernet cam be a coaxial cable,
twisted-pair wire or an optical fiber
The shared medium carries the communication for all the
devices on the network, thus data sent by one device can be
received by all devices subject to propagation condition
conditions and transceiver capabilities
The specifications of the 802.3 standards are available on the
IEEE802.3 workgroup website
IEEE802.11-WI-FI
802.11 is a collection of Wireless Local Area Network(WLAN)
communication standards
It can be in different versions as follows:
802.11a operates in the 5 GHz band
802.11b and 802.11g operate in 2.4 GHz band
802.11n operates in the 2.4/5 GHz bands
802.11ac operates in the 5GHz band
802.11ad operates in the 60 GHz band
Data rates for these standards range from 9.6 Kb/s (for 2G)
up to 100 Mb/s (for 4G) and are available from the 3GPP
website
NETWORK/INTERNET LAYER
The network layers are responsible for sending of IP
datagrams from the source network to the destination
networks
This layer performs the host addressing and packet routing
The datagrams contain the source and destination addresses
which are used to route them from the source to destination
across multiple networks
Host identification is done using hierarchical IP addressing
schemes such as IPv4 or IPv6
IPv4
IPv6
6LoWPAN
IPV4
Internet Protocol versiuon4: Is the most deployed Internet
protocol that is used to identify the devices on a network using
hierarchical addressing scheme
IPv4 uses a 32-bit address scheme that allows total of 232
addresses
As more and more devices got connected to the Internet, these
addresses got exhausted in the year 2011
IPv4 has succeeded by IPv6.
The IP protocols establish connections on packet networks, but
do not guarantee delivery of packets
Guaranteed delivery and data integrity are handled by the
upper layer protocols (such as TCP)
IPv4 is formally described in RFC 791
IPv6 & 6LoWPAN
Internet Protocol version 6 (IPv6) is the newest version of
Internet protocol and succor to IPv4
It uses 128-bit address scheme that allow total of 2128
It is formally described in RFC 2460
Request
Response
Client Server
REQUEST AND STATUS LINES
Transport Layer Protocols
HTTP
Request and Status
METHODS
Transport Layer Protocols
HTTP
Request and Status
Methods
ADVANTAGES & DISADVANTAGES
Transport Layer Protocols
HTTP Advantages Disadvantages
Request and Status
Methods
Status Codes
• Platform Independent • No reliable exchange of
Adv. & Dis. Adv. data
• Not connection oriented hence
Less Overhead
• Too complicated and too
much overhead even for less
• Stateless protocol payload
Identification
Sensing
Actuation
Communication and Management
Application
Services
Management Security
Communication
Device
FUNCTIONAL BLOCKS OF IOT
GENERIC BLOCK DIAGRAM OF AN IOT DEVICE
Device: An IoT system comprises of devices that provide
sensing, actuating, monitoring and control functions
Communication: The communication block handles the
communication for the IoT system (using various protocols)
Services: An IoT system uses various types of IoT services such
as :
Services for Device monitoring
Device control Services
Data publishing Services and
Services for Device discovery
Management: Management functional block provides various
functions to govern the IoT system
Security: Security functional block secures the IoT system and
by providing functions such as:
Authentication
Authorization
Message and Content integrity
Data security
Application: IoT applications provide an interface that the
users can use to control and monitor various aspects of the IoT
system
Applications also allow users to view the system status and
view or analyze the processed data
IOT COMMUNICATION MODELS
The following types of communication models were
incorporated in IoT communication process namely:
Request-Response
Publish-Subscribe
Push-pull
Exclusive Pair
REQUEST-RESPONSE MODEL
In this model the client sends request to the server and the server responds
to the requests
When the server receives a request, it decides how to respond, fetches the
data, retrieves resource representations, prepares the response, and then
sends the response to the client
Request-response model is a stateless communication model and each
request-response pair is independent of others
PUBLISH-SUBSCRIBE MODEL
Messages Messages
pushed to Pulled
queues from
Send messages to queues
Queue Consumer-2
Push-Pull is a communication model in which the data producers push the data to
queues and the consumers pull the data from the queues
Producers do not need to be aware of the consumers
Queues help in decoupling the messaging between the producers and consumers
Queues also act as a buffer which helps in situations when there is a mismatch
between the rate at which the producers push data and the rate at which the
consumers pull data
EXCLUSIVE PAIR MODEL
There are two major communication APIs were used in IoT such
ae follows:
Active Attacks
Message modification
Node capture
Denial-of-Service (DoS) attacks
Eavesdropping
an attacker intercepts packets transmitted over the air for further cryptanalysis or traffic
analysis.
Traffic analysis
allows an attacker to determine that there is activity in the network, the location of
the BSs, and the type of protocols being used.
Message injection
an adversary injects bogus control information into the data stream.
Message modification
a previously captured message is modified before being retransmitted
Node capture
An embedded device is considered being compromised when an attacker, through
various means, gains control to the node itself.