SlideShare ist ein Scribd-Unternehmen logo
1 von 57
IOE Internet of every Things
MSc Student – IT College
16 Apr 2017
Ali Faiq Ali
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
• What is IOT
• Element of IOE
• Big Data
• Storage Management
• Network Models
• Programming Facilitates the IoT
• Security Strategy
• Lightweight Cryptograph
• IOT lab
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
• The Internet has evolved in ways that we could never have imagined. In the beginning,
advancements occurred slowly. Today, innovation and communication are happening at
a remarkable rate.
• From its humble beginning as the Advanced Research Projects Agency Network
(ARPANET) in 1969, when it interconnected a few sites, it is now predicted that the
Internet will interconnect 50 billion things by 2020. The Internet now provides global
connections that make web surfing, social media, and smart mobile devices possible.
• The Internet: The Place to Go
normally, when people use the term Internet, they are not referring to the physical
connections in the real world. Rather, they tend to think of it as a formless collection of
connections. It is the “place” people go to find or share information. It is the 21st century
library, video store, and personal photo album.
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
• Governments are not immune to the change caused by rapid information exchange
through technology. Officials can respond quickly to emergencies through real-time data.
Citizens can connect through social media and gather support for change.
• Governments can embrace this technological change, and benefit from it, by
incorporating technology into the operation of a city. In 2011, the city council in
Barcelona, Spain launched the “Barcelona as a People City” project. This project uses
technical innovations to foster economic growth and the welfare of its citizens.
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
• Things
• For the IoE to function, all of the devices that are part of the intended IoE solution must
be connected together so that they can communicate. There are two ways in which
devices can be connected; either wired or wirelessly. Devices that are not traditionally
connected to the network require sensors, RFIDs, and controllers.
• Data
• Big Data refers to the vast amount of data generated every hour by billions of connected
devices. Big Data requires new products and techniques to manage, store, and analyze
it. Part of the solution to the problem of Big Data is virtualization and Cloud computing.
• Big Data refers to the way in which organizations collect and analyze vast stores of data
for insights that can help identify trends, predict behavior, and empower decision
makers.
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
• People
• Connected people make behavioral transformations based on their access to
information. Simultaneously, their changed behavior affects the information that is
generated. This is known as a feedback loop. Organizations use data generated by
connected people to refine and target their marketing strategies.
• Process
• Processes occur between people, things, and data. Today, the IoE brings them all
together by combining M2M, M2P, and P2P connections.
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
• In 2012, the number of connected devices on the Internet exceeded the world
population. This includes traditional computing devices and mobile devices, as well as
new industrial and consumer devices that we think of as “things”. Although, this may
seem like a lot of devices on the Internet, it represents less than 1% of the objects that
could be connected.
• Sensors are one way to collect data from non-computers. They convert physical aspects
of our environment into electrical signals that can be processed by computers. Some
examples are soil moisture sensors, air temperature sensors, radiation sensors, and
motion sensors. Sensors of all types will play an important role in connecting what has
traditionally been unconnected in the IoE
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
• A popular type of sensor uses radio frequency identification (RFID). RFID uses radio
frequency electromagnetic fields to communicate information between small coded tags
(RFID tags) and an RFID reader. Usually, RFID tags are used to identify and track what
they are embedded into, such as a pet. Because the tags are small, they can be
attached to virtually anything including clothing and cash. Some RFID tags carry no
batteries. The energy required by the tag to transmit information is obtained from the
electromagnetic signals that are sent by the RFID tag reader. The tag receives this signal
and uses part of its energy to power the response.
• he models shown in the figure have a transmission range of a few meters, while other
RFID tags are equipped with a battery and operate as a beacon that can broadcast
information at all times. This type of RFID tag usually has a range of a few hundred
meters
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
• Because of their flexibility and low power requirements, RFID tags are a great way to
connect a non-computer device to a network by providing information to an RFID reader
device. For example, it is now common to find car factories attaching RFID tags to the
car bodies. This allows for better tracking of that car throughout the assembly line.
• The first generation of RFID tags is “write once read many”. This means that they can be
programmed in the factory once, but cannot be modified out in the field. Newer RFID
tags are “write many read many”, with integrated circuits that can last 40 to 50 years and
be written to over 100,000 times. These tags can effectively store an entire history of the
asset to which they are attached, such as the date of manufacture, location tracking
history, multiple service cycle, and ownership.
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
• Sensors can be programmed to take measurements, translate that data into signals, and then send that data
to a main device called the controller. The controller is responsible for collecting data from sensors and
providing an Internet connection. Controllers may have the ability to make immediate decisions or they may
send data to a more powerful computer for analysis. This more powerful computer might be in the same LAN
as the controller or might only be accessible through an Internet connection.
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
• However, the IoT is only one of several market transitions that are enabling the full
potential of the IoE. For example, the following are transitions that are also enabling the
IoE’s full potential:
• Mobility - providing access to resources from any device, at any time, and from any
place
• Cloud Computing - providing distributed computing resources and services over a
network
• Big Data - as the volume of data being produced is accelerating, so too is our capacity
to analyze and process it
• IPv6 - expanding the current Internet address space by 3.4×10^38 addresses, easily
accommodating 50 billion devices by 2020, and billions upon billions more
• The amount of value an organization derives from the IoE depends on its ability to
capture transitions, such as cloud, mobility, and the IoT. For example, John mentions
Smart Grid. Smart Grid is a solution that realizes the benefit of the IoE by improving
energy efficiency.
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
•Kilobytes (KB) - Approximately one thousand (10^3)
bytes
•Megabytes (MB) - Approximately one million (10^6)
bytes
•Gigabytes (GB) - Approximately one billion (10^9) bytes
•Terabytes (TB) - Approximately one trillion (10^12) bytes
•Petabytes (PB) - Approximately one quadrillion (10^15)
bytes
•Exabytes (EB) - Approximately one quintillion (10^18)
bytes
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
• A driving factor of this growth of information is the number of devices connected to the
Internet, and the number of connections between those devices. But this is just the
beginning. New devices are being connected to the Internet daily, creating an abundance
of new data.
• With this amount of information, organizations must learn how to manage data and also,
how to manage “Big Data”.
• There are three primary dimensions of Big Data that must be accounted for: volume,
variety, and velocity. Volume describes the amount of data being transported and stored.
Variety describes the type of data it is. Velocity describes the rate at which this data is
moving. Data cannot move without infrastructure. The swiftness of infrastructure
(input/output, bandwidth, and latency) and the ability to rapidly enable optimal resources
(network, CPU, memory and storage) directly affects the velocity of data.
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
• Big Data applications receive information from a wide array of data sources, including PCs,
smartphones, tablets, machines, sensors, social media, and multimedia
applications. Much of this growth in data is due to mobile devices. Mobility enables
anytime, anywhere, any device, and any content-user engagement.
• Big Data refers to the way in which organizations collect and analyze vast stores of data
for insights that can help identify trends, predict behavior, and empower decision makers. It
considers:
• How much data is generated
• How this data is identified and managed as an asset to the organization
• How this data is turned into usable information
• How organizations use this data to make decisions
• Ask yourself, what happens when we share information or an opinion about a business on
a social network? How is this information propagated? Who gets this information? And
more importantly, how are businesses reacting and using this information to create new
customer connections?
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
• The exponential growth of data continues as the number of things connected to the
Internet increases. However, more data is not necessarily better if that data cannot be
accessed, analyzed, and applied in a usable manner. For data to be a true asset, it must
be used effectively. In addition, using old, inaccurate data wastes time, resources, and
money.
• Managing this increased amount of data creates many challenges, including:
• Bandwidth capacity on existing links connected to data centers
• Privacy concerns for user data
• Managing data for real-time communications
• Selecting and analyzing appropriate data
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
• As more and more things are connected to the Internet, the demand for bandwidth will
increase because of M2M communications in industrial, government, and home
applications.
• An essential characteristic of Cloud computing is broad network access. In Cloud
computing service models, enabling on-demand network access to shared computing
resources and services over the network results in increased requirements for network
bandwidth. In turn, higher bandwidth requirements demand infrastructure improvements.
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
• Historically, each computer has its own operating system, applications, and dedicated
hardware components. Now, using software emulation, several virtual computers can run
on a single physical computer. This means each virtual computer has its own operating
system, applications, and dedicated hardware components. This is known as
virtualization in computing. Each virtual machine, shown in the figure, operates
independently.
• In the corporate world, a single physical infrastructure can run multiple virtual
infrastructures. By virtualizing the servers and networks, companies can reduce
operational and administrative costs. The operational savings can come from the
reduction in power and cooling requirements and the number of physical machines. A
virtual server can be added to support additional applications.
• You can also use virtualization for your personal computing needs. You can try a new
operating system on your computer without damaging your current system. You can
browse the Internet safely with your virtual machine. The virtual machine can be deleted
if anything goes wrong.
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
• Cloud computing is another way to manage, store, and access data.
• Cloud computing involves large numbers of computers connected through a network.
Cloud computing providers rely heavily on virtualization to deliver their services. It can
also reduce the operational costs by using resources more efficiently. These companies
provide four distinct categories of services..
• Cloud computing allows the users to access their data anywhere and at any time. You
are probably already using some form of Cloud computing if you use web-based email
services.
• Cloud computing also enables organizations to streamline their IT operations by
subscribing only to needed services. By using Cloud computing, the organizations may
also eliminate the need for onsite IT equipment, maintenance, and management. Cloud
computing reduces costs for organizations. It reduces equipment costs, energy costs,
physical plant requirements, and support personnel training needs.
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
• Machine-to-Machine (M2M) connections occur when data is transferred from one machine or “thing” to
another over a network. These M2M connections are the most critical part of the Internet of Things.
• An example of M2M is a connected automobile that is signaling that a driver is almost home, which
prompts the home network to adjust the home temperature and lighting.
• M2P connections occur when information is transferred between a machine (such as a computer,
mobile device, or digital sign) and a person. Whether a person gets information from a database,
or conducts a complex analysis, this is an M2P connection. These M2P connections facilitate the
movement, manipulation, and reporting of data from machines to help people make informed
judgments.
• The actions that people take based on their informed judgments complete an IoE feedback loop.
For example, portable sensors and monitors can provide round-the-clock information on a
patient’s vital signs, but health care providers are ultimately responsible for using that information
to assess patients and provide treatment.
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
• People-to-People (P2P) connections occur when information is transferred from one
person to another. Increasingly, P2P connections happen through video, mobile devices,
and social networks. These P2P connections are often called Collaboration.
• As shown in the figure, the highest value of the IoE is realized when process facilitates
the integration of M2M, M2P, and P2P connections.
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
• We are embarking on a new wave of digitization by connecting the unconnected. To take
advantage of this wave of digitization, companies and cities are now increasingly
deploying IoT solutions. However, this rapid increase in growth has also introduced new
challenges including:
• How to integrate millions of things consisting of devices from different vendors each
using custom applications
• How to integrate new things to the existing network infrastructure
• How to secure these new devices, each configured with varying levels of security
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
• Client Server model – This is the most common model used in networks. Client devices request
services of servers. Servers are often located locally and managed by the organization. For
example, Microsoft Outlook is a client-server model where end users connect to the email server
using a locally installed email client.
• Cloud computing model – This is a newer model where servers and services are dispersed
globally in distributed data centers. Data is synchronized across multiple servers. Organizations
simply subscribe to different services within the Cloud. End users access applications from Cloud
servers without requiring an application-specific client. For instance, Gmail email is a cloud
service where end-users can access their email from anywhere without requiring a locally installed
application.
• Fog computing – This IoT network model identifies a distributed computing infrastructure closer
to the network edge. It enables edge devices to run applications locally and make immediate
decisions. This reduces the data burden on networks as raw data does not need to be sent over
network connections. It enhances resiliency by allowing IoT devices to operate when network
connections are lost. It also enhances security by keeping sensitive data from being transported
beyond the edge where it is needed.
• The Fog computing pillar basically extends cloud connectivity closer to the edge. It enables end
devices, such as smart meters, industrial sensors, robotic machines, and others, to connect to a
local integrated computing, networking, and storage system.
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40
• Wireless and wired connectivity
• Quality of service queuing (for example, voice data before video data)
• High availability
• Secure transfer
• Infrastructure devices connect the individual end devices to the network, and can
connect multiple individual networks to form an internetwork. The management of data
as it flows through the network is a primary role of the infrastructure, or intermediate,
devices. These devices use the destination end device address, in conjunction with
information about the network interconnections, to determine the path that messages
should take through the network.
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41
• As previously discussed, sensors and actuators are used abundantly in the IoT.
Specifically, sensors measure a physical property and forward that information across
the network while actuators perform actions based on a received signal.
• So how do the sensors know what information to capture or which controller to
communicate with? And how does the actuator know which action to perform or which
signals are required to activate that action?
• Sensors must be told what to capture and where to send that data. A controller must be
programmed with a set of instructions to receive that data and decide if it should process
and relay that data to another device. For example, IoT end devices, such as the
computer installed in a car, must be programmed to react to different road conditions.
• All of the devices in the IoT must be programmed. Therefore, people with programming
skills are critical to the success of the IoT and the IoE.
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
• This architectural approach reflects the service models of the Cloud Computing model,
taking advantage of Software as a Service (SaaS), Platform as a Service (PaaS), and
Infrastructure as a Service (IaaS).
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45
• The larger and more integrated the IoE solution, the more decentralized the network
becomes. This allows for a greater number of access points into the network, which
introduces a greater number of vulnerabilities. A significant number of the devices
communicating across the IoE will be transmitting data from insecure locations, but those
transmissions must be secure. However, securing an IoE solution can be difficult due to
the large number of sensors, smart objects, and devices that are connected to the
network. The potential harm caused by allowing unsecured devices to access an
organization’s network is a significant challenge for security professionals.
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48
• Firewalls - A firewall creates a barrier between two networks. The firewall analyzes
network traffic to determine if that traffic should be allowed to travel between the two
networks based upon a set of rules that have been programmed into it, as shown in the
Figure 1 animation.
• Intrusion Prevention Systems (IPS) - The IPS monitors the activities on a network and
determines if they are malicious. An IPS will attempt to prevent the attack by dropping
traffic from the offending device or resetting a connection. Click the numbers in Figure 2
to learn more about how an IPS works.
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 50
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51
Lightweight cryptography is a branch of the modern cryptography, which covers
cryptographic algorithm sintended for use in devices with low or extremely low
resources. Lightweight cryptography does not determine strict criteria for
classifying a cryptographic algorithm as lightweight, but the common features of
lightweight algorithms are extremely low requirements to essential resources of
target.
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 52
Information technologies widely penetrate into people’s day-to-day activity. This is one of the main trends
of present-day society. An average man’s life cannot be imagined without various gadgets. A lot of
households use devices with an embedded operating system (besides usual personal computers), which
can be connected to the Internet and can even be united into a wireless network. Everywhere people are
surrounded by a variety of terminals, readers, sensors etc . Such expansion of smart technologies
crucially raises data security problems. However, now it is impossible to suggest a cryptographic
primitive that can be implemented in all types of target devices. We can tell that AES is a really strong
algorithm with good performance. It is absolutely advisable to use AES in high-end devices, in a large
variety of embedded systems or in some low-end devices (with several constraints). But it is impossible
to use common cryptographic algorithms in specific devices with extremely constrained resources The
examples of such devices include:
• RFIDs;
• low-end smart cards (including wireless);
• wireless sensors;
• indicators, measuring devices, custom controllers etc.
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 53
algorithms intended for use in devices with extremely low resources are slightly different from the design
criteria of commonly used cryptographic algorithms. This very specific field is covered by a branch of
modern cryptography – lightweight cryptography. Lightweight cryptography does not determine strict
criteria for classifying a cryptographic algorithm as lightweight, but the common features of lightweight
algorithms are extremely low requirements to essential resources of target devices, including the
following:
• size required for hardware implementation;
• computational power of microprocessors or
microcontrollers;
• random access memory (RAM);
• read-only memory (ROM) etc.
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54
• - Block and stream ciphers (PRESENT, Spongent)
• - Hash functions and MACs (Quark, Marvin)
DESL & DESXL:-
DESL was proposed in . DESL is based on the classical DES algorithm . Unlike DES, DESL
uses a single S-box instead of 8 S-boxes of DES. The design criteria of the single DESL S-box
make DESL resistant to most common cryptanalytic attacks . This allows to save a part of ROM
for tables storage.DESXL is a lightweight version of the DESX algorithm , which is one of
widely used variants of DES. In contrast to DES, DESX performs input and output data
whitening with the specific sub keys. Like DESL, DESXL uses the same single S-box instead of
8 DESX S-boxes. Relatively low resource requirements of DESL/DESXL are just the result of
eightfold reduction of ROM requirements for tables storage (since this is the only difference
between DESL/DESXL and the classical algorithms). The authors of DESL/DESXL asserted in
that such reduction in requirements is enough to use the proposed algorithms in devices with
constrained resources with an example of passive RFIDs.
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 55
• Smaller block sizes: To save memory, lightweight block ciphers may use smaller block sizes than
AES (e.g., 64 or 80 bits, rather than 128). It should also be noted that using small block sizes
reduces limits on the length of the plaintexts to be encrypted. For example, outputs of a 64-bit
block cipher can be distinguished from a random sequence using around 232 blocks for some of the
approved modes of operations. Depending on the algorithm, this may lead to plaintext recovery,
key recovery or authentication tag forgeries with non-negligible probabilities.
• - Smaller key sizes: Some lightweight block ciphers use small key sizes (less than 96 bits) for
efficiency (e.g., 80-bit PRESENT). At the time of this writing, the minimum key size required
• - Simpler rounds: The components and operations used in lightweight block ciphers are typically
simpler than those of conventional block ciphers. In lightweight designs using S-boxes, 4-bit S-
boxes are preferred over 8-bit S-boxes. This reduction in size results in significant area savings.
For example, the 4-bit S-box used in PRESENT required whereas AES S-box . For hardware-
oriented designs, bit permutations (such as those used in PRESENT), or recursive MDS matrices
(as in PHOTON [] and LED []) may be preferred over complex linear layers. When rounds are
simpler, they may need to be iterated more times to achieve security
• - Simpler key schedules: Complex key schedules increase the memory, latency and the power
consumption of implementations; therefore, most of the lightweight block ciphers use simple key
schedules that can generate sub-keys on the fly. This may enable attacks using related keys,
weak keys, known keys or even chosen keys. When this is the case, it is necessary to ensure that
all keys are generated independently using a secure key derivation function (KDF)
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 56
• We propose to adopt new advancing technology, “Lightweight Cryptography”, in the IoT.
We describe two reasons that support our proposal.
• 1. Efficiency of end-to-end communication In order to achieve end-to-end security, end
nodes have an implementation of a symmetric key algorithm. For the low resource-
devices, e.g. battery-powered devices, the cryptographic operation with a limited amount
of energy consumption is important. Application of the lightweight symmetric key
algorithm allows lower energy consumption for end devices.
• 2. Applicability to lower resource devices The footprint of the lightweight cryptographic
primitives is smaller than the conventional cryptographic ones. The lightweight
cryptographic primitives would open possibilities of more network connections with lower
resource devices.
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 57

Weitere ähnliche Inhalte

Was ist angesagt?

Eclipse M2M Industry Working Group
Eclipse M2M Industry Working GroupEclipse M2M Industry Working Group
Eclipse M2M Industry Working Group
Benjamin Cabé
 

Was ist angesagt? (20)

Cisco io t for vietnam cio community 2 apr 2015 - split
Cisco io t for vietnam cio community   2 apr 2015 - splitCisco io t for vietnam cio community   2 apr 2015 - split
Cisco io t for vietnam cio community 2 apr 2015 - split
 
An introduction to the Internet of things
An introduction to the Internet of thingsAn introduction to the Internet of things
An introduction to the Internet of things
 
The power of orchestration - Inside Cisco IT - DC Cloud from IaaS to Fast IT
The power of orchestration - Inside Cisco IT - DC Cloud from IaaS to Fast ITThe power of orchestration - Inside Cisco IT - DC Cloud from IaaS to Fast IT
The power of orchestration - Inside Cisco IT - DC Cloud from IaaS to Fast IT
 
Addressing Global Chanllenges Through IoT
Addressing Global Chanllenges Through IoTAddressing Global Chanllenges Through IoT
Addressing Global Chanllenges Through IoT
 
1. How will the IoT help your business - cisco
1. How will the IoT help your business - cisco1. How will the IoT help your business - cisco
1. How will the IoT help your business - cisco
 
Ethical issues in internet of things
Ethical issues in internet of thingsEthical issues in internet of things
Ethical issues in internet of things
 
Future of Networking (5G) and The Impact on Smart Manufacturing and I.R 5.0
Future of Networking (5G) and The Impact on Smart Manufacturing and I.R 5.0Future of Networking (5G) and The Impact on Smart Manufacturing and I.R 5.0
Future of Networking (5G) and The Impact on Smart Manufacturing and I.R 5.0
 
Internet Of Things(IOT) | IOT Project | IOT Products | IOT Examples | IOT PPT
Internet Of Things(IOT) | IOT Project |  IOT Products | IOT Examples | IOT PPTInternet Of Things(IOT) | IOT Project |  IOT Products | IOT Examples | IOT PPT
Internet Of Things(IOT) | IOT Project | IOT Products | IOT Examples | IOT PPT
 
Views and myths of IoT
Views and myths of IoTViews and myths of IoT
Views and myths of IoT
 
Eclipse M2M Industry Working Group
Eclipse M2M Industry Working GroupEclipse M2M Industry Working Group
Eclipse M2M Industry Working Group
 
LTE World Summit 2010 Amsterdam
LTE World Summit 2010 AmsterdamLTE World Summit 2010 Amsterdam
LTE World Summit 2010 Amsterdam
 
IoT
IoTIoT
IoT
 
IoT and WoT (Internet of Things and Web of Things)
IoT and WoT (Internet of Things and Web of Things)IoT and WoT (Internet of Things and Web of Things)
IoT and WoT (Internet of Things and Web of Things)
 
The Internet Of Things
The Internet Of ThingsThe Internet Of Things
The Internet Of Things
 
6G: Potential Use Cases and Enabling Technologies
6G: Potential Use Cases and Enabling Technologies6G: Potential Use Cases and Enabling Technologies
6G: Potential Use Cases and Enabling Technologies
 
Internet of things enabling tech - challenges - opportunities (2016)
Internet of things   enabling tech - challenges - opportunities (2016)Internet of things   enabling tech - challenges - opportunities (2016)
Internet of things enabling tech - challenges - opportunities (2016)
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 
The Evolution of Internet of Things
The Evolution of Internet of ThingsThe Evolution of Internet of Things
The Evolution of Internet of Things
 
Li-Fi Security Issues and its Measures
Li-Fi Security Issues and its MeasuresLi-Fi Security Issues and its Measures
Li-Fi Security Issues and its Measures
 
Internet of Things Challenges and Solutions
Internet of Things Challenges and SolutionsInternet of Things Challenges and Solutions
Internet of Things Challenges and Solutions
 

Ähnlich wie Internet Of EveryThing

Cisco IoT for Vietnam CIO Community - 2 Apr 2015 - split
Cisco IoT for Vietnam CIO Community - 2 Apr 2015 - splitCisco IoT for Vietnam CIO Community - 2 Apr 2015 - split
Cisco IoT for Vietnam CIO Community - 2 Apr 2015 - split
Son Phan
 
NI Trend Watch 2015
NI Trend Watch 2015NI Trend Watch 2015
NI Trend Watch 2015
Hank Lydick
 
INTERNET OF THINGS (TEAM YMCA)
INTERNET OF THINGS (TEAM YMCA)INTERNET OF THINGS (TEAM YMCA)
INTERNET OF THINGS (TEAM YMCA)
Abhishek kr. Singh
 
iotunitpptsfor jntuh1-221211033603-33147820.pdf
iotunitpptsfor jntuh1-221211033603-33147820.pdfiotunitpptsfor jntuh1-221211033603-33147820.pdf
iotunitpptsfor jntuh1-221211033603-33147820.pdf
HODECE18
 
SPHER NET full presentation - v1.1 Final
SPHER NET full presentation - v1.1 FinalSPHER NET full presentation - v1.1 Final
SPHER NET full presentation - v1.1 Final
Elliot Charles Willcox
 

Ähnlich wie Internet Of EveryThing (20)

IoT
IoTIoT
IoT
 
Cisco IoT for Vietnam CIO Community - 2 Apr 2015 - split
Cisco IoT for Vietnam CIO Community - 2 Apr 2015 - splitCisco IoT for Vietnam CIO Community - 2 Apr 2015 - split
Cisco IoT for Vietnam CIO Community - 2 Apr 2015 - split
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference )
 
9 IoT predictions for 2019
9 IoT predictions for 20199 IoT predictions for 2019
9 IoT predictions for 2019
 
Michael Enescu - Cloud + IoT at IEEE
Michael Enescu - Cloud + IoT at IEEEMichael Enescu - Cloud + IoT at IEEE
Michael Enescu - Cloud + IoT at IEEE
 
8 trends of IoT in 2018
8 trends of IoT in 20188 trends of IoT in 2018
8 trends of IoT in 2018
 
Unit 1 IoT Fundamentals.pdf
Unit 1 IoT Fundamentals.pdfUnit 1 IoT Fundamentals.pdf
Unit 1 IoT Fundamentals.pdf
 
Module - 1_IOT PPT_ 18CS81.pdf
Module - 1_IOT PPT_ 18CS81.pdfModule - 1_IOT PPT_ 18CS81.pdf
Module - 1_IOT PPT_ 18CS81.pdf
 
Module - 1_IOT PPT_.pdf
Module - 1_IOT PPT_.pdfModule - 1_IOT PPT_.pdf
Module - 1_IOT PPT_.pdf
 
NI Trend Watch 2015
NI Trend Watch 2015NI Trend Watch 2015
NI Trend Watch 2015
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 
INTERNET OF THINGS (TEAM YMCA)
INTERNET OF THINGS (TEAM YMCA)INTERNET OF THINGS (TEAM YMCA)
INTERNET OF THINGS (TEAM YMCA)
 
IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014
 
IOT Unit 1.pptx
IOT Unit 1.pptxIOT Unit 1.pptx
IOT Unit 1.pptx
 
iotunitpptsfor jntuh1-221211033603-33147820.pdf
iotunitpptsfor jntuh1-221211033603-33147820.pdfiotunitpptsfor jntuh1-221211033603-33147820.pdf
iotunitpptsfor jntuh1-221211033603-33147820.pdf
 
SPHER NET full presentation - v1.1 Final
SPHER NET full presentation - v1.1 FinalSPHER NET full presentation - v1.1 Final
SPHER NET full presentation - v1.1 Final
 
Iot report
Iot reportIot report
Iot report
 
Future Proof Your Network Today To Support IOT Tomorrow
Future Proof Your Network Today To Support IOT TomorrowFuture Proof Your Network Today To Support IOT Tomorrow
Future Proof Your Network Today To Support IOT Tomorrow
 
2 - Iot-Internet-of-Things.pptx
2 - Iot-Internet-of-Things.pptx2 - Iot-Internet-of-Things.pptx
2 - Iot-Internet-of-Things.pptx
 
IoT
IoTIoT
IoT
 

Kürzlich hochgeladen

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

Internet Of EveryThing

  • 1. IOE Internet of every Things MSc Student – IT College 16 Apr 2017 Ali Faiq Ali
  • 2. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 • What is IOT • Element of IOE • Big Data • Storage Management • Network Models • Programming Facilitates the IoT • Security Strategy • Lightweight Cryptograph • IOT lab
  • 3. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
  • 4. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4 • The Internet has evolved in ways that we could never have imagined. In the beginning, advancements occurred slowly. Today, innovation and communication are happening at a remarkable rate. • From its humble beginning as the Advanced Research Projects Agency Network (ARPANET) in 1969, when it interconnected a few sites, it is now predicted that the Internet will interconnect 50 billion things by 2020. The Internet now provides global connections that make web surfing, social media, and smart mobile devices possible. • The Internet: The Place to Go normally, when people use the term Internet, they are not referring to the physical connections in the real world. Rather, they tend to think of it as a formless collection of connections. It is the “place” people go to find or share information. It is the 21st century library, video store, and personal photo album.
  • 5. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
  • 6. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
  • 7. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
  • 8. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 • Governments are not immune to the change caused by rapid information exchange through technology. Officials can respond quickly to emergencies through real-time data. Citizens can connect through social media and gather support for change. • Governments can embrace this technological change, and benefit from it, by incorporating technology into the operation of a city. In 2011, the city council in Barcelona, Spain launched the “Barcelona as a People City” project. This project uses technical innovations to foster economic growth and the welfare of its citizens.
  • 9. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
  • 10. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
  • 11. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
  • 12. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
  • 13. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13 • Things • For the IoE to function, all of the devices that are part of the intended IoE solution must be connected together so that they can communicate. There are two ways in which devices can be connected; either wired or wirelessly. Devices that are not traditionally connected to the network require sensors, RFIDs, and controllers. • Data • Big Data refers to the vast amount of data generated every hour by billions of connected devices. Big Data requires new products and techniques to manage, store, and analyze it. Part of the solution to the problem of Big Data is virtualization and Cloud computing. • Big Data refers to the way in which organizations collect and analyze vast stores of data for insights that can help identify trends, predict behavior, and empower decision makers.
  • 14. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14 • People • Connected people make behavioral transformations based on their access to information. Simultaneously, their changed behavior affects the information that is generated. This is known as a feedback loop. Organizations use data generated by connected people to refine and target their marketing strategies. • Process • Processes occur between people, things, and data. Today, the IoE brings them all together by combining M2M, M2P, and P2P connections.
  • 15. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15 • In 2012, the number of connected devices on the Internet exceeded the world population. This includes traditional computing devices and mobile devices, as well as new industrial and consumer devices that we think of as “things”. Although, this may seem like a lot of devices on the Internet, it represents less than 1% of the objects that could be connected. • Sensors are one way to collect data from non-computers. They convert physical aspects of our environment into electrical signals that can be processed by computers. Some examples are soil moisture sensors, air temperature sensors, radiation sensors, and motion sensors. Sensors of all types will play an important role in connecting what has traditionally been unconnected in the IoE
  • 16. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16 • A popular type of sensor uses radio frequency identification (RFID). RFID uses radio frequency electromagnetic fields to communicate information between small coded tags (RFID tags) and an RFID reader. Usually, RFID tags are used to identify and track what they are embedded into, such as a pet. Because the tags are small, they can be attached to virtually anything including clothing and cash. Some RFID tags carry no batteries. The energy required by the tag to transmit information is obtained from the electromagnetic signals that are sent by the RFID tag reader. The tag receives this signal and uses part of its energy to power the response. • he models shown in the figure have a transmission range of a few meters, while other RFID tags are equipped with a battery and operate as a beacon that can broadcast information at all times. This type of RFID tag usually has a range of a few hundred meters
  • 17. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17 • Because of their flexibility and low power requirements, RFID tags are a great way to connect a non-computer device to a network by providing information to an RFID reader device. For example, it is now common to find car factories attaching RFID tags to the car bodies. This allows for better tracking of that car throughout the assembly line. • The first generation of RFID tags is “write once read many”. This means that they can be programmed in the factory once, but cannot be modified out in the field. Newer RFID tags are “write many read many”, with integrated circuits that can last 40 to 50 years and be written to over 100,000 times. These tags can effectively store an entire history of the asset to which they are attached, such as the date of manufacture, location tracking history, multiple service cycle, and ownership.
  • 18. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
  • 19. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
  • 20. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20 • Sensors can be programmed to take measurements, translate that data into signals, and then send that data to a main device called the controller. The controller is responsible for collecting data from sensors and providing an Internet connection. Controllers may have the ability to make immediate decisions or they may send data to a more powerful computer for analysis. This more powerful computer might be in the same LAN as the controller or might only be accessible through an Internet connection.
  • 21. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21 • However, the IoT is only one of several market transitions that are enabling the full potential of the IoE. For example, the following are transitions that are also enabling the IoE’s full potential: • Mobility - providing access to resources from any device, at any time, and from any place • Cloud Computing - providing distributed computing resources and services over a network • Big Data - as the volume of data being produced is accelerating, so too is our capacity to analyze and process it • IPv6 - expanding the current Internet address space by 3.4×10^38 addresses, easily accommodating 50 billion devices by 2020, and billions upon billions more • The amount of value an organization derives from the IoE depends on its ability to capture transitions, such as cloud, mobility, and the IoT. For example, John mentions Smart Grid. Smart Grid is a solution that realizes the benefit of the IoE by improving energy efficiency.
  • 22. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22 •Kilobytes (KB) - Approximately one thousand (10^3) bytes •Megabytes (MB) - Approximately one million (10^6) bytes •Gigabytes (GB) - Approximately one billion (10^9) bytes •Terabytes (TB) - Approximately one trillion (10^12) bytes •Petabytes (PB) - Approximately one quadrillion (10^15) bytes •Exabytes (EB) - Approximately one quintillion (10^18) bytes
  • 23. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
  • 24. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24 • A driving factor of this growth of information is the number of devices connected to the Internet, and the number of connections between those devices. But this is just the beginning. New devices are being connected to the Internet daily, creating an abundance of new data. • With this amount of information, organizations must learn how to manage data and also, how to manage “Big Data”. • There are three primary dimensions of Big Data that must be accounted for: volume, variety, and velocity. Volume describes the amount of data being transported and stored. Variety describes the type of data it is. Velocity describes the rate at which this data is moving. Data cannot move without infrastructure. The swiftness of infrastructure (input/output, bandwidth, and latency) and the ability to rapidly enable optimal resources (network, CPU, memory and storage) directly affects the velocity of data.
  • 25. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25 • Big Data applications receive information from a wide array of data sources, including PCs, smartphones, tablets, machines, sensors, social media, and multimedia applications. Much of this growth in data is due to mobile devices. Mobility enables anytime, anywhere, any device, and any content-user engagement. • Big Data refers to the way in which organizations collect and analyze vast stores of data for insights that can help identify trends, predict behavior, and empower decision makers. It considers: • How much data is generated • How this data is identified and managed as an asset to the organization • How this data is turned into usable information • How organizations use this data to make decisions • Ask yourself, what happens when we share information or an opinion about a business on a social network? How is this information propagated? Who gets this information? And more importantly, how are businesses reacting and using this information to create new customer connections?
  • 26. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
  • 27. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27 • The exponential growth of data continues as the number of things connected to the Internet increases. However, more data is not necessarily better if that data cannot be accessed, analyzed, and applied in a usable manner. For data to be a true asset, it must be used effectively. In addition, using old, inaccurate data wastes time, resources, and money. • Managing this increased amount of data creates many challenges, including: • Bandwidth capacity on existing links connected to data centers • Privacy concerns for user data • Managing data for real-time communications • Selecting and analyzing appropriate data
  • 28. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28 • As more and more things are connected to the Internet, the demand for bandwidth will increase because of M2M communications in industrial, government, and home applications. • An essential characteristic of Cloud computing is broad network access. In Cloud computing service models, enabling on-demand network access to shared computing resources and services over the network results in increased requirements for network bandwidth. In turn, higher bandwidth requirements demand infrastructure improvements.
  • 29. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29 • Historically, each computer has its own operating system, applications, and dedicated hardware components. Now, using software emulation, several virtual computers can run on a single physical computer. This means each virtual computer has its own operating system, applications, and dedicated hardware components. This is known as virtualization in computing. Each virtual machine, shown in the figure, operates independently. • In the corporate world, a single physical infrastructure can run multiple virtual infrastructures. By virtualizing the servers and networks, companies can reduce operational and administrative costs. The operational savings can come from the reduction in power and cooling requirements and the number of physical machines. A virtual server can be added to support additional applications. • You can also use virtualization for your personal computing needs. You can try a new operating system on your computer without damaging your current system. You can browse the Internet safely with your virtual machine. The virtual machine can be deleted if anything goes wrong.
  • 30. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
  • 31. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31 • Cloud computing is another way to manage, store, and access data. • Cloud computing involves large numbers of computers connected through a network. Cloud computing providers rely heavily on virtualization to deliver their services. It can also reduce the operational costs by using resources more efficiently. These companies provide four distinct categories of services.. • Cloud computing allows the users to access their data anywhere and at any time. You are probably already using some form of Cloud computing if you use web-based email services. • Cloud computing also enables organizations to streamline their IT operations by subscribing only to needed services. By using Cloud computing, the organizations may also eliminate the need for onsite IT equipment, maintenance, and management. Cloud computing reduces costs for organizations. It reduces equipment costs, energy costs, physical plant requirements, and support personnel training needs.
  • 32. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
  • 33. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33 • Machine-to-Machine (M2M) connections occur when data is transferred from one machine or “thing” to another over a network. These M2M connections are the most critical part of the Internet of Things. • An example of M2M is a connected automobile that is signaling that a driver is almost home, which prompts the home network to adjust the home temperature and lighting. • M2P connections occur when information is transferred between a machine (such as a computer, mobile device, or digital sign) and a person. Whether a person gets information from a database, or conducts a complex analysis, this is an M2P connection. These M2P connections facilitate the movement, manipulation, and reporting of data from machines to help people make informed judgments. • The actions that people take based on their informed judgments complete an IoE feedback loop. For example, portable sensors and monitors can provide round-the-clock information on a patient’s vital signs, but health care providers are ultimately responsible for using that information to assess patients and provide treatment.
  • 34. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34 • People-to-People (P2P) connections occur when information is transferred from one person to another. Increasingly, P2P connections happen through video, mobile devices, and social networks. These P2P connections are often called Collaboration. • As shown in the figure, the highest value of the IoE is realized when process facilitates the integration of M2M, M2P, and P2P connections.
  • 35. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35 • We are embarking on a new wave of digitization by connecting the unconnected. To take advantage of this wave of digitization, companies and cities are now increasingly deploying IoT solutions. However, this rapid increase in growth has also introduced new challenges including: • How to integrate millions of things consisting of devices from different vendors each using custom applications • How to integrate new things to the existing network infrastructure • How to secure these new devices, each configured with varying levels of security
  • 36. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
  • 37. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37 • Client Server model – This is the most common model used in networks. Client devices request services of servers. Servers are often located locally and managed by the organization. For example, Microsoft Outlook is a client-server model where end users connect to the email server using a locally installed email client. • Cloud computing model – This is a newer model where servers and services are dispersed globally in distributed data centers. Data is synchronized across multiple servers. Organizations simply subscribe to different services within the Cloud. End users access applications from Cloud servers without requiring an application-specific client. For instance, Gmail email is a cloud service where end-users can access their email from anywhere without requiring a locally installed application. • Fog computing – This IoT network model identifies a distributed computing infrastructure closer to the network edge. It enables edge devices to run applications locally and make immediate decisions. This reduces the data burden on networks as raw data does not need to be sent over network connections. It enhances resiliency by allowing IoT devices to operate when network connections are lost. It also enhances security by keeping sensitive data from being transported beyond the edge where it is needed. • The Fog computing pillar basically extends cloud connectivity closer to the edge. It enables end devices, such as smart meters, industrial sensors, robotic machines, and others, to connect to a local integrated computing, networking, and storage system.
  • 38. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
  • 39. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
  • 40. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40 • Wireless and wired connectivity • Quality of service queuing (for example, voice data before video data) • High availability • Secure transfer • Infrastructure devices connect the individual end devices to the network, and can connect multiple individual networks to form an internetwork. The management of data as it flows through the network is a primary role of the infrastructure, or intermediate, devices. These devices use the destination end device address, in conjunction with information about the network interconnections, to determine the path that messages should take through the network.
  • 41. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41 • As previously discussed, sensors and actuators are used abundantly in the IoT. Specifically, sensors measure a physical property and forward that information across the network while actuators perform actions based on a received signal. • So how do the sensors know what information to capture or which controller to communicate with? And how does the actuator know which action to perform or which signals are required to activate that action? • Sensors must be told what to capture and where to send that data. A controller must be programmed with a set of instructions to receive that data and decide if it should process and relay that data to another device. For example, IoT end devices, such as the computer installed in a car, must be programmed to react to different road conditions. • All of the devices in the IoT must be programmed. Therefore, people with programming skills are critical to the success of the IoT and the IoE.
  • 42. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
  • 43. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43 • This architectural approach reflects the service models of the Cloud Computing model, taking advantage of Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS).
  • 44. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44
  • 45. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45 • The larger and more integrated the IoE solution, the more decentralized the network becomes. This allows for a greater number of access points into the network, which introduces a greater number of vulnerabilities. A significant number of the devices communicating across the IoE will be transmitting data from insecure locations, but those transmissions must be secure. However, securing an IoE solution can be difficult due to the large number of sensors, smart objects, and devices that are connected to the network. The potential harm caused by allowing unsecured devices to access an organization’s network is a significant challenge for security professionals.
  • 46. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46
  • 47. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47
  • 48. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48 • Firewalls - A firewall creates a barrier between two networks. The firewall analyzes network traffic to determine if that traffic should be allowed to travel between the two networks based upon a set of rules that have been programmed into it, as shown in the Figure 1 animation. • Intrusion Prevention Systems (IPS) - The IPS monitors the activities on a network and determines if they are malicious. An IPS will attempt to prevent the attack by dropping traffic from the offending device or resetting a connection. Click the numbers in Figure 2 to learn more about how an IPS works.
  • 49. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49
  • 50. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 50
  • 51. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51 Lightweight cryptography is a branch of the modern cryptography, which covers cryptographic algorithm sintended for use in devices with low or extremely low resources. Lightweight cryptography does not determine strict criteria for classifying a cryptographic algorithm as lightweight, but the common features of lightweight algorithms are extremely low requirements to essential resources of target.
  • 52. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 52 Information technologies widely penetrate into people’s day-to-day activity. This is one of the main trends of present-day society. An average man’s life cannot be imagined without various gadgets. A lot of households use devices with an embedded operating system (besides usual personal computers), which can be connected to the Internet and can even be united into a wireless network. Everywhere people are surrounded by a variety of terminals, readers, sensors etc . Such expansion of smart technologies crucially raises data security problems. However, now it is impossible to suggest a cryptographic primitive that can be implemented in all types of target devices. We can tell that AES is a really strong algorithm with good performance. It is absolutely advisable to use AES in high-end devices, in a large variety of embedded systems or in some low-end devices (with several constraints). But it is impossible to use common cryptographic algorithms in specific devices with extremely constrained resources The examples of such devices include: • RFIDs; • low-end smart cards (including wireless); • wireless sensors; • indicators, measuring devices, custom controllers etc.
  • 53. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 53 algorithms intended for use in devices with extremely low resources are slightly different from the design criteria of commonly used cryptographic algorithms. This very specific field is covered by a branch of modern cryptography – lightweight cryptography. Lightweight cryptography does not determine strict criteria for classifying a cryptographic algorithm as lightweight, but the common features of lightweight algorithms are extremely low requirements to essential resources of target devices, including the following: • size required for hardware implementation; • computational power of microprocessors or microcontrollers; • random access memory (RAM); • read-only memory (ROM) etc.
  • 54. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54 • - Block and stream ciphers (PRESENT, Spongent) • - Hash functions and MACs (Quark, Marvin) DESL & DESXL:- DESL was proposed in . DESL is based on the classical DES algorithm . Unlike DES, DESL uses a single S-box instead of 8 S-boxes of DES. The design criteria of the single DESL S-box make DESL resistant to most common cryptanalytic attacks . This allows to save a part of ROM for tables storage.DESXL is a lightweight version of the DESX algorithm , which is one of widely used variants of DES. In contrast to DES, DESX performs input and output data whitening with the specific sub keys. Like DESL, DESXL uses the same single S-box instead of 8 DESX S-boxes. Relatively low resource requirements of DESL/DESXL are just the result of eightfold reduction of ROM requirements for tables storage (since this is the only difference between DESL/DESXL and the classical algorithms). The authors of DESL/DESXL asserted in that such reduction in requirements is enough to use the proposed algorithms in devices with constrained resources with an example of passive RFIDs.
  • 55. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 55 • Smaller block sizes: To save memory, lightweight block ciphers may use smaller block sizes than AES (e.g., 64 or 80 bits, rather than 128). It should also be noted that using small block sizes reduces limits on the length of the plaintexts to be encrypted. For example, outputs of a 64-bit block cipher can be distinguished from a random sequence using around 232 blocks for some of the approved modes of operations. Depending on the algorithm, this may lead to plaintext recovery, key recovery or authentication tag forgeries with non-negligible probabilities. • - Smaller key sizes: Some lightweight block ciphers use small key sizes (less than 96 bits) for efficiency (e.g., 80-bit PRESENT). At the time of this writing, the minimum key size required • - Simpler rounds: The components and operations used in lightweight block ciphers are typically simpler than those of conventional block ciphers. In lightweight designs using S-boxes, 4-bit S- boxes are preferred over 8-bit S-boxes. This reduction in size results in significant area savings. For example, the 4-bit S-box used in PRESENT required whereas AES S-box . For hardware- oriented designs, bit permutations (such as those used in PRESENT), or recursive MDS matrices (as in PHOTON [] and LED []) may be preferred over complex linear layers. When rounds are simpler, they may need to be iterated more times to achieve security • - Simpler key schedules: Complex key schedules increase the memory, latency and the power consumption of implementations; therefore, most of the lightweight block ciphers use simple key schedules that can generate sub-keys on the fly. This may enable attacks using related keys, weak keys, known keys or even chosen keys. When this is the case, it is necessary to ensure that all keys are generated independently using a secure key derivation function (KDF)
  • 56. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 56 • We propose to adopt new advancing technology, “Lightweight Cryptography”, in the IoT. We describe two reasons that support our proposal. • 1. Efficiency of end-to-end communication In order to achieve end-to-end security, end nodes have an implementation of a symmetric key algorithm. For the low resource- devices, e.g. battery-powered devices, the cryptographic operation with a limited amount of energy consumption is important. Application of the lightweight symmetric key algorithm allows lower energy consumption for end devices. • 2. Applicability to lower resource devices The footprint of the lightweight cryptographic primitives is smaller than the conventional cryptographic ones. The lightweight cryptographic primitives would open possibilities of more network connections with lower resource devices.
  • 57. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 57

Hinweis der Redaktion

  1. Transitioning to the IoT
  2. والحكومات ليست في مأمن من التغيير الناجم عن التبادل السريع للمعلومات من خلال التكنولوجيا. يمكن للمسؤولين الاستجابة بسرعة لحالات الطوارئ من خلال البيانات في الوقت الحقيقي. يمكن للمواطنين الاتصال من خلال وسائل الاعلام الاجتماعية وجمع الدعم للتغيي ويمكن للحكومات أن تتبنى هذا التغيير التكنولوجي، وأن تستفيد منه، من خلال دمج التكنولوجيا في تشغيل المدينة. وفي عام 2011، أطلق مجلس المدينة في برشلونة، إسبانيا مشروع "برشلونة كمدينة شعبية". ويستخدم هذا المشروع الابتكارات التقنية لتعزيز النمو الاقتصادي ورعاية مواطنيها
  3. وتشير البيانات الكبيرة إلى كمية هائلة من البيانات ولدت كل ساعة من قبل المليارات من الأجهزة المتصلة. تتطلب البيانات الكبيرة منتجات وتقنيات جديدة لإدارة وتخزين وتحليلها. جزء من الحل لمشكلة البيانات الكبيرة هو الافتراضية والحوسبة السحابية. تشير البيانات الكبيرة إلى الطريقة التي تقوم بها المنظمات بجمع وتحليل المخازن الضخمة من البيانات للحصول على رؤى يمكن أن تساعد في تحديد الاتجاهات، والتنبؤ بالسلوك، وتمكين صانعي القرار
  4. يقوم الأشخاص المرتبطون بإجراء تحولات سلوكية على أساس وصولهم إلى المعلومات. وفي الوقت نفسه، يؤثر سلوكهم المتغير على المعلومات التي يتم إنشاؤها. ويعرف هذا باسم حلقة التغذية المرتدة. تستخدم المنظمات البيانات التي يتم إنشاؤها بواسطة الأشخاص المتصلين لتحسين استراتيجيات التسويق واستهدافها
  5. وفي عام 2012، تجاوز عدد الأجهزة المتصلة بالإنترنت عدد سكان العالم. وهذا يشمل أجهزة الحوسبة التقليدية والأجهزة النقالة، فضلا عن الأجهزة الصناعية والمستهلكة الجديدة التي نفكر في أنها "أشياء". على الرغم من أن هذا قد يبدو مثل الكثير من الأجهزة على شبكة الإنترنت، فإنه يمثل أقل من 1٪ من الكائنات التي يمكن توصيلها. أجهزة الاستشعار هي طريقة واحدة لجمع البيانات من غير أجهزة الكمبيوتر. أنها تحويل الجوانب المادية لبيئتنا إلى الإشارات الكهربائية التي يمكن معالجتها بواسطة أجهزة الكمبيوتر. بعض الأمثلة هي أجهزة استشعار رطوبة التربة، وأجهزة استشعار درجة حرارة الهواء، وأجهزة استشعار الإشعاع، وأجهزة استشعار الحركة. وسوف تلعب مجسات من جميع الأنواع دورا هاما في ربط ما كان تقليديا غير متصل في مكتب التقييم المستقل
  6. يمكن برمجة أجهزة الاستشعار لإجراء القياسات، وترجمة تلك البيانات إلى إشارات، ثم إرسال تلك البيانات إلى جهاز رئيسي يسمى وحدة التحكم. وحدة التحكم هي المسؤولة عن جمع البيانات من أجهزة الاستشعار وتوفير اتصال بالإنترنت. قد يكون لدى وحدات التحكم القدرة على اتخاذ قرارات فورية أو أنها قد ترسل البيانات إلى جهاز كمبيوتر أكثر قوة للتحليل. قد يكون هذا الكمبيوتر أكثر قوة في نفس الشبكة المحلية وحدة تحكم أو قد لا يمكن الوصول إليها إلا من خلال اتصال بالإنترنت.
  7. اصبح الاسم اكثر شموليه بعد ربط كل شي اصبح الاسم IOE
  8. تتلقى تطبيقات البيانات الكبيرة معلومات من مجموعة واسعة من مصادر البيانات، بما في ذلك أجهزة الكمبيوتر والهواتف الذكية والأجهزة اللوحية والآلات وأجهزة الاستشعار ووسائل الإعلام الاجتماعية وتطبيقات الوسائط المتعددة. ويرجع معظم هذا النمو في البيانات إلى الأجهزة النقالة. التنقل يتيح في أي وقت وفي أي مكان، أي جهاز، وأي مشاركة المستخدم المحتوى. تشير البيانات الكبيرة إلى الطريقة التي تقوم بها المنظمات بجمع وتحليل المخازن الضخمة من البيانات للحصول على رؤى يمكن أن تساعد في تحديد الاتجاهات، والتنبؤ بالسلوك، وتمكين صناع القرار مقدار البيانات التي يتم إنشاؤها كيف يتم تحديد هذه البيانات وإدارتها كأصل للمنظمة كيفية تحويل هذه البيانات إلى معلومات قابلة للاستخدام كيف تستخدم المنظمات هذه البيانات لاتخاذ القرارات اسأل نفسك، ماذا يحدث عندما نشارك المعلومات أو رأي حول عمل تجاري على شبكة اجتماعية؟ كيف يتم نشر هذه المعلومات؟ من يحصل على هذه المعلومات؟ والأهم من ذلك، كيف تتفاعل الشركات وتستخدم هذه المعلومات لإنشاء اتصالات جديدة مع العملاء
  9. والإجراءات التي يتخذها الناس استنادا إلى أحكامهم المستنيرة تكمل حلقة التغذية المرتدة لمنظمة أصحاب العمل. على سبيل المثال، يمكن أن توفر أجهزة الاستشعار المحمولة والشاشات معلومات على مدار الساعة حول العلامات الحيوية للمريض، ولكن مقدمي الرعاية الصحية هم المسؤولون في نهاية المطاف عن استخدام تلك المعلومات لتقييم المرضى وتوفير العلاج
  10. كيفية دمج الملايين من الأشياء التي تتألف من أجهزة من مختلف البائعين باستخدام كل التطبيقات المخصصة كيفية دمج أشياء جديدة للبنية التحتية للشبكة القائمة كيفية تأمين هذه الأجهزة الجديدة، كل تكوين مع مستويات متفاوتة من الأمن
  11. أصبحت الشبكة أكثر لامركزية. وهذا يسمح بعدد أكبر من نقاط الوصول إلى الشبكة، مما يقدم عددا أكبر من نقاط الضعف. وسوف یقوم عدد کبیر من الأجھزة التي تتواصل عبر مکتب التقییم المستقل بنقل البیانات من المواقع غیر الآمنة، ولکن یجب أن تکون ھذه الإرسالات آمنة. ومع ذلك، قد يكون تأمين حل إيو صعبا بسبب العدد الكبير من أجهزة االستشعار، واألشياء الذكية، واألجهزة المتصلة بالشبكة. ويمثل الضرر المحتمل الناجم عن السماح للأجهزة غير المضمونة بالوصول إلى شبكة المنظمة تحديا كبيرا بالنسبة لمهنيي الأمن.