The Internet of Things (IoT) is the network of physical objects or "things" embedded with electronics, software, sensors, and network connectivity, which enables these objects to collect and exchange data. .The Internet of Things allows objects to be sensed and controlled remotely across existing network infrastructure .
2. OVERVIEW
A Brief History of the Internet of Things (IoT)
Definition IoT
Features of IoT
Benefits of IoT
Issues (Challenges and Barriers ) to IoT
Technologies IoT
Top Applications IoT
The future of IoT
Conclusions
3. A BRIEF HISTORY OF THE INTERNET OF THINGS
The Internet of Things term is coined by Kevin Ashton in
1999.executive director of the Auto-ID Center
to describe a system where the Internet is
connected to the physical world via
ubiquitous sensors
4. The problem is, people have limited time, attention and
accuracy -- all of which means they are not very good at
capturing data about things in the real world. If we had
computers that knew everything there was to know about
things -- using data they gathered without any help from us --
we would be able to track and count everything and greatly
reduce waste, loss and cost. We would know when things
needed replacing, repairing or recalling and whether they were
fresh or past their best.”
A BRIEF HISTORY OF THE INTERNET OF THINGS
5. DEFINITION
The Internet of Things (IoT) is the network of physical objects or
"things" embedded with electronics, software, sensors, and
network connectivity, which enables these objects to collect and
exchange data. .The Internet of Things allows objects to be
sensed and controlled remotely across existing network
infrastructure
7. BENEFITS OF IOT
There are many advantages of incorporating IoT into our lives,
which can help individuals, businesses, and society on a daily
basis. For individuals this new concept can come in many
forms including health, safety, financially, and every day
planning.
Transportation
Inventory management
Promotions
Assessing web user intelligence
10. 3- Deployment of IPv6.
4- Sensor energy
5- Standards.
It is important to note that while barriers and challenges exist,
they are not insurmountable.
Given the benefits of IoT, these issues will get worked out. It is
only a matter of time.
ISSUES (CHALLENGES AND BARRIERS ) TO IOT
11. TECHNOLOGIES IOT
• RFID
• WiFi IEEE 802.11
• Barcode e QR Code
• ZigBee IEEE 802.15.4
• Sensors and smartphones
12. RFID stands for Radio-Frequency IDentification
TECHNOLOGIES IOT
13. WiFi IEEE 802.11
Very common
Widely used both in indoor
and outdoor environments
General purpose
Low cost
Highly interoperable
Maybe not a good solution
in some special conditions
TECHNOLOGIES IOT
14. Barcode e QR Code
combining the use of RFID tags with both barcodes
and QR codes allows the consumer to connect to
the IoT with the simple scan of a smartphone or
tablet.
• Low cost
• No technological difficulties
• Several devices can read a barcode
• Starting point for more complex systems
• Example: price comparison, credit card
TECHNOLOGIES IOT
16. ZigBee IEEE 802.15.4
• Low cost
• Very long battery life
• Easy to deploy
• Can be used globally
• Secure
• Ideal for WPAN and mesh networks
• Support for multiple network topologies
TECHNOLOGIES IOT
18. Sensors and smartphones
In the near future almost everybody will probably have a
smartphone
A smartphone isn't just a mobile phone that has access to the
Internet
The iPhone has a lot of different types of sensors
TECHNOLOGIES IOT
23. As often happens, history is repeating itself. Just as in the
early days when Cisco’s tagline was “The Science of
Networking Networks,” IoT is at a stage where disparate
networks and a multitude of sensors must come together and
interoperate under a common set of standards. This effort will
require businesses, governments, standards organizations,
and academia to work together toward a common goal.
Next, for IoT to gain acceptance among the general populace,
service providers and others must deliver applications that
bring tangible value to peoples’ lives. IoT must not represent
the advancement of technology for technology’s sake; the
industry needs to demonstrate value in human terms.
THE FUTURE OF IOT
24. THE FUTURE OF IOT
• World sensor networks
• Home automation and domotics
• Daily life (traffic monitoring, shopping, etc.)
• Tracking and shipping of goods
• Health
• Unpredictable developments...
25. CONCLUSIONS
1- The IoT links smart objects to the Internet. It can enable
an exchange of data never available before
2- Machine-to-machine (M2M) communication is at the
heart of what is identified as the “Internet of Things” (IoT)
3-Enablers of the IoT (Cheap sensors, Cheap bandwidth,
Cheap processing, Smartphones, Ubiquitous wireless
coverage , Big data,IPv6 )
26. REFERENCES
1- Learning Internet of Things
Peter Waher 2015
Published by Packt Publishing Ltd.
Livery Place
35 Livery Street
Birmingham B3 2PB, UK.
ISBN 978-1-78355-353-2
2- Internet of Things Privacy & Security in a Connected World
FTC Staff Report
January 2015
3- The Internet of Things How the Next Evolution of the Internet Is
Changing Everything Author Dave Evans April 2011
Intelligent sensor takes some predefined action when it senses the appropriate input (light, heat, sound, motion, touch, etc.).
Machine to machine (M2M) is a broad label that can be used to describe any technology that enables networked devices to exchange information and perform actions without the manual assistance of humans.
M2M communication is often used for remote monitoring. In product restocking, for example, a vending machine can message the distributor when a particular item is running low. M2M communication is an important aspect of warehouse management, remote control, robotics, traffic control, logistic services, supply chain management, fleet management and telemedicine. It forms the basis for a concept known as the Internet of Things (IoT).
To be able to define IoT, let's first look at how the term was coined. Kevin Ashton noted that most data on the Internet was at the time originally entered or captured into the system by human beings. From a system point of view, a human is nothing more than a slow, error-prone, and inefficient router of data that puts limits on quality and quantity of data available and sometimes even dares to interpret data or correct it.
As an alternative, it would be more efficient if these systems could connect to sensors that measure these real-world events or properties directly.
A thing, in the Internet of Things, can be a person with a heart monitor implant, a farm animal with a biochip transponder, an automobile that has built-in sensors to alert the driver when tire pressure is low -- or any other natural or man-made object that can be assigned an IP address and provided with the ability to transfer data over a network. So far, the Internet of Things has been most closely associated with machine-to-machine (M2M) communication in manufacturing and power, oil and gas utilities. Products built with M2M communication capabilities are often referred to as being smart. (See: smart label, smart meter, smart grid sensor)
The Internet of Things can also assist people with their personal safety. ADT, which is a home security system, allows individuals to monitor their security systems at home through their phones, with the ability to control it. Also, another technology that has already been released is GM OnStar. This is a system that is embedded in GM cars that can detect if a crash has occurred and it automatically calls 9-1-1. It can also track the movement of the car.
Transportation: We have been using GPS to track movement of delivery trucks for years. IOT eases and simplifies the entire process by introducing a monitory sensor that helps to track distance and time locations and other contributing factors.
Inventory management: As managing fleet, inventory management and tracking is also a major task. IOT is used to tag radio frequency sensors to track the location of products in real time. It has been instrumental in tracking the level of inventory and to stock it in advance, making alerts for unforeseen stoppages, automatically placing orders, etc.
Promotions: Many businesses use IOT to send mobile promotions to frequent shoppers. This is done by keeping track of the shoppers history and shopping interests. It utilizes location-based tracking of the physical shoppers as well as those shopping over the internet.
Assessing web user intelligence: IOT is used by third party web data aggregators to have a better understanding of their customer by tracking them on social media networks. This is essential to identify the key customers and their preferences.
Why now? Enablers of the IoT
A number of significant technology changes have come together to enable the rise of the IoT. These include the following.
Cheap sensors – Sensor prices have dropped to an average 60 cents from $1.30 in the past 10 years.
Cheap bandwidth – The cost of bandwidth has also declined precipitously, by a factor of nearly 40X over the past 10 years.
Cheap processing – Similarly, processing costs have declined by nearly 60X over the past 10 years, enabling more devices
to be not just connected, but smart enough to know what to do with all the new data they are generating or receiving.
Smartphones – Smartphones are now becoming the personal gateway to the IoT, serving as a remote control or hub for the
connected home, connected car, or the health and fitness devices consumers are increasingly starting to wear.
Ubiquitous wireless coverage – With Wi-Fi coverage now ubiquitous, wireless connectivity is available for free or at a very
low cost, given Wi-Fi utilizes unlicensed spectrum and thus does not require monthly access fees to a carrier.
Big data – As the IoT will by definition generate voluminous amounts of unstructured data, the availability of big data
analytics is a key enabler.
IPv6 – Most networking equipment now supports IPv6, the newest version of the Internet Protocol (IP) standard that is
intended to replace IPv4. IPv4 supports 32-bit addresses, which translates to about 4.3 billion addresses – a number that has
become largely exhausted by all the connected devices globally. In contrast, IPv6 can support 128-bit addresses, translating
to approximately 3.4 x 1038 addresses – an almost limitless number that can amply handle all conceivable IoT devices.
The Security Risks with IoT DevicesAs with any Internet-connected device, IoT appliances and gadgets have potential security vulnerabilities. Here are a few incidents:
In a January 2014 global IoT cyber-attack, hackers compromised more than 100,000 everyday consumer smart devices and used the devices to launch more than 750,000 malicious email communications in an attempt to expand the size of their botnet. Some of these IoT devices include smart TVs, wireless speaker systems, network routers, and even refrigerators.
Earlier this year, U.K. researchers demonstrated how security vulnerabilities in WiFi connected light bulbs could be exploited to control all the connected bulbs on a home network—and to expose the user’s network configurations.
More recently, an August 2014 study from Hewlett-Packard found that 70 percent of all IoT devices are vulnerable to being hacked or compromised. The study examined 10 smart devices such as thermostats, webcams, and smart TVs and found that each had about 25 potential vulnerabilities.
What You Can Do• Examine the privacy policies and security features of any new smart gadget or appliance before you buy it. If you don’t understand the privacy or security features, contact the manufacturer. Many device makers offer Web chat with tech support or customer service reps.
• Look for software tools designed to protect your personal data and privacy across the Internet. One tool is MyPermissions, which offers free Android and iOS apps as well as a browser toolbar. MyPermissions alerts you when an app gains access to your personal information and will prompt you to revoke or accept the permission.
• Keep your devices updated with the latest software, as the updates may include new security patches.
• Consider putting your home’s connected devices behind a Virtual Private Network (VPN). This can require a home network router with custom firmware, so the job may be best configured by someone with advanced networking skills.
• It’s also important to secure your PC with adequate firewall and antivirus protection. In the event your IoT device is compromised by malware, your PC could be infected since it is on the same network.
>>>>>>>>>>.
new smart televisions enable consumers to surf the Internet, make
purchases, and share photos, similar to a laptop or desktop computer. 42 Like a computer, any
security vulnerabilities in these televisions could put the information stored on or transmitted
through the television at risk. If smart televisions or other devices store sensitive financial
account information, passwords, and other types of information, unauthorized persons could
exploit vulnerabilities to facilitate identity theft or fraud.43 Thus, as consumers install more smart
devices in their homes, they may increase the number of vulnerabilities an intruder could use to
compromise personal information
Deployment of IPv6:
The world ran out of IPv4 addresses in February 2010. While no real
impact has been seen by the general public, this situation has the potential to slow IoT’s
progress since the potentially billions of new sensors will require unique IP addresses. In
addition, IPv6 makes the management of networks easier due to auto configuration
capabilities and offers improved security features.
>
Sensor energy:
For IoT to reach its full potential, sensors will need to be self-sustaining.
Imagine changing batteries in billions of devices deployed across the planet and even into
space. Obviously, this isn’t possible. What’s needed is a way for sensors to generate
electricity from environmental elements such as vibrations, light, and airflow.
>
Standards. While much progress has been made in the area of standards, more is needed,
especially in the areas of security, privacy, architecture, and communications. IEEE is just one
of the organizations working to solve these challenges by ensuring that IPv6 packets can be
routed across different network types.
It is important to note that while barriers and challenges exist, they are not insurmountable.
Given the benefits of IoT, these issues will get worked out. It is only a matter of time.
Additional:
3G
4G LTE
ANT
Dash7
Ethernet
GPRS
PLC / Powerline
QR Codes, EPC
WiMax
X-10
802.15.4
Z-Wave
Zigbee
RFID stands for Radio-Frequency IDentification. The acronym refers to small electronic devices that consist of a small chip and an antenna. The chip typically is capable of carrying 2,000 bytes of data or less.
The RFID device serves the same purpose as a bar code or a magnetic strip on the back of a credit card or ATM card; it provides a unique identifier for that object. And, just as a bar code or magnetic strip must be scanned to get the information, the RFID device must be scanned to retrieve the identifying information.
>>>>
Health
Some uses of healthcare IoT are mobile medical applications that allow patients to capture their health data. Hospitals use IoT to keep tabs on the location of medical devices, personnel and patients.
internet-connected devices have been introduced to patients in various forms. Whether data comes from fetal monitors, electrocardiograms, temperature monitors or blood glucose levels, tracking health information is vital for some patients. Many of these measures require follow-up interaction with a healthcare professional. This creates an opening for smarter devices to deliver more valuable data, lessening the need for direct patient-physician interaction.
>
Transport and Logistics
One of the first business sectors interested in IoT technologies
Currently two systems are already available and deployed: ConLock and ContainerSafe
Integration of light sensors, GPS and GSM
>>>>>>>>>>
Daily Life and Domotics
Many possible developments to Domotics
There are no standard and widely accepted solutions yet for Domotics
A framework has been developed for Home Automation applications: FreeDom
>>>>>>>>>>>>