Internet of Things (IOT) Standardization and Applications

Internet of Things (IOT) Standardization and Applications

Presented by: Saja Al-Dabet

Agenda

  • Introduction
  • IOT protocols
  • IOT standardization
  • IOT applications & recent trends

Introduction

Internet of Things (IoT) is the recent and growing which is inevitable in day-to-day activities in current life.

IOT is a network of physical objects (things) able to communicate (amongst themselves and with external entities) and to sense and interact with the real world.

The significant functionality of IoT deals with an enormous amount of data sensed from various heterogeneous IoT devices.

The implementation of IoT applications involves the consideration of various aspects like communication, security, privacy and standardization of IoT protocols.

IoT networking protocols are a set of standards and rules that allow two entities to understand each other and exchange information, facilitating Machine to Machine (M2M) communication.

IoT devices used in the IoT applications use sensors, wired and wireless interfaces for communication among sensors.

Categorization based IOT on Architecture

IoT Protocols and IoT Standards

IoT protocols and IoT standards are closely intertwined but serve different purposes in the IoT ecosystem.

Protocols dictate how data is transmitted and received, while standards define the broader framework for building interoperable and secure IoT solutions.

Perception Layer Protocols

ZigBee

IEEE 802.15.4 standard protocol in the network layer and top of the physical and MAC layer.

Reliable, low energy, cheap communication, and short-range communication of 10–100 m.

Includes pre-installed key for the security configuration of the devices.

E.g. smart light bulbs, door locks, thermostats, tracking and monitoring devices.

Threats: few of the common attacks on Zigbee technologies are replay, sniffing, physical attacks and Denial-of-service.

Wireless-Fidelity

Wifi is from IEEE 802.11 families, which is used to allow the user to connect the Internet without any physical connection and supports up to 100 m range.

E.g.: enabled devices are smart phones, tablets, smart TVs, cars and cameras.

Threats: security challenge arises when communication is without encryption.

Near Field Communication

NFC is a short range, low-speed communication protocol which can connect two devices which are less than 4 cm in distance.

E.g.: Card payments, authentication devices for biometrics and data exchange for shorter ranges.

Threats: data leakage, eavesdropping and data corruption.

Sigfox

Connects low power objects like smart watches, electricity meters, cover communication range of about 1000 km.

Instead of 4G networks, Sigfox is used for very long wave communication which can transmit 12 bytes per message.

E.g.: marine, emergency codes, geo-location, location tracking and medical applications.

Long Range WAN

LoRaWAN technology is specially designed for low power, low computational complexity, low cost and highly scalable platform for wide area network applications.

E.g.: s smart cities, agriculture, and asset tracking, where long-range connectivity and battery efficiency are crucial.

Security is provided using session key, nonce value, and frame counters.

Threat: this technology is vulnerable to some attacks like selective forwarding, Bit-ip, Denial-of-Service, eavesdrop and replay.

Cont.

Network Layer Protocols

Low-power Wireless Personal Area Network

6LowPAN used for optimizing the routing of IPv6 packets.

Provides the fragmentation and efficient header compression mechanism which reduces the IP overhead

Therefore, suitable for IoT resource constrained applications.

Threats: spoofing attacks, selective forwarding, sybil attacks, wormhole attacks and sinkhole attacks

Routing protocol

RPL creats a tree-like routing topology the Destination Oriented Directed Acyclic Graph (DODAG), rooted towards one or more nodes.

RPL enabled with features of low data rate and communication with high throughput.

Threats: there are possibilities of security challenges in certain situation of using RPL network when the sources of attacks are from external networks

Cognitive and Opportunistic RPL

CORPL is the extension of RPL and specifically designed for Cognitive radio networks can sense their environment and adapt their transmission parameters to avoid interference with other users.

CORPL includes two steps. First, each node forwards the packet by selecting multiple forwarders (forwarder set). Secondly, the best receiver node is selected by coordinating among the nodes in the forwarder set

Threats: weak security

6TiSCH

6TiSCH has been one of the main efforts to bring IPv6 to industrial low-power wireless, bridging Time Slotted Channel Hopping (TSCH) networks with 6LoWPAN networks.

Intended to provide reliable and delay bounded communication in multi-hop and scalable Industrial Internet of Things (IIoT).

Issues: security, link management for the Ipv6 network layer,

Application Layer Protocols

Lightweight Machine-to-Machine

LwM2M protocol builds on CoAP for a highly efficient low-power communication.

The protocol is ideal when people or devices are a long way from power and need to use battery-powered local devices.

lwM2M, has a standardized procedure to clarify which security mechanism is used and how device firmware is updated.

Its build on top of CoAP it can be used with UDP, TCP, and SMS for data transport.

Advanced Message Queuing Protocol

Designed for high-reliability applications. It is often used for financial trading and other mission-critical applications

Data Distribution Service

DDS used for real time application using peer-to- peer communication.

The DDS is broker-less and used for multicasting with high reliability for low latency IoT devices.

E.g.: applications such as smart grid management, medical applications, robotics, power generation, simulation, testing and so on.

IOT standardization

The success of IoT depends strongly on standardization, which provides interoperability, compatibility, reliability, and effective operations on a global scale.

The IEEE and IETF are two of the leading institutions involved in IoT standardization efforts.

Internet Engineering Task Force (IETF)

IEEE Standards Association

IETF RFC 7428- for specifies the frame format for transmitting IPv6 packets on data link.

IETF RFC 7668 - specifies the format of IPv6 over Bluetooth low energy.

IETF RFC 8576 - Internet of Things (IoT) Security

IETF RFC 9000 - A UDP-Based Multiplexed and Secure Transport

IETF RFC 8949 - Concise Binary Object Representation (CBOR)

IEEE has a number of existing standards (current and under development), activities, and events that are directly related to creating the environment needed for a vibrant IoT.

  • IEEE P2413 Architectural framework.
  • IEEE 1451 Harmonization and security.
  • IEEE 2700 Sensor Performance and Quality.
  • IEEE Std 1285.2005 Scalable Storage Interface
  • IEEE Std 2030 series on the Smart Grid, including electric vehicle infrastructure
  • IEEE Std 2040 series on connected, automated, and intelligent vehicles

IOT IEEE standardization

Some key standards activities are:

Architectural framework

Sensor Performance and Quality

Harmonization and security of IoT

  • IEEE P2413-2019
  • Includes descriptions of : various IoT domains, definitions of IoT domain abstractions, and identification of commonalities between different IoT domain.

IEEE 2700 framework for sensor performance specification terminology, units, conditions and limits.

IEEE P2510 defines quality measures, controls, parameters and definitions for sensor data related to IoT implementations.

  • IEEE 1451-99.
  • defines a method for: data sharing, interoperability, and security of messages over a network, where sensors, actuators and other devices can interoperate, regardless of underlying communication technology.

IOT standardization Cont.

Scalable Storage Interface

IEEE Standard for Edge/Fog Manageability and Orchestration

  • IEEE P1935
  • Specifies : The operations of resource management for Edge/Fog systems to enable more convenient and efficient deployment.
  • IEEE 1285-2005
  • Includes The interface has been optimized for low-latency interconnects, assuming that the proces-sor/controller and the storage device can often be co-located on the same printed-circuit board

IOT Applications and Recent Trends

Intelligent Healthcare Systems

Smart Healthcare

Remote Patient Monitoring (RPM): allows the monitoring of patients regardless of their location, and their caregivers and families are engaged remotely.

  • Implantable Glucose Monitoring Systems.
  • Heart-rate monitoring
  • Activity Trackers During Cancer Treatment
  • Hand hygiene monitoring
  • Depression and mood monitoring
  • Parkinson’s disease monitoring
  • Robotic surgery

Smart Cities

Smart Traffic Management - IoT sensors can be installed on traffic lights, roadways, and vehicles to collect data on traffic patterns, congestion, and accidents.

Public Safety - IoT-enabled cameras and sensors can be installed in public spaces to monitor potential security threats, such as suspicious activity or unattended bags.

Waste Management - Waste collection operators use IoT-powered solutions to optimize collection schedules & routes with real-time tracking of waste levels, fuel consumption, and use of waste containers.

Smart Grids - Electrical grids that involve IoT devices that can communicate with each other and with the consumers.

Smart Cities

Blockchain

Supply Chain Management - Use sensors to track shipment status like temperature sensors, motion sensors, connected devices, GPS, and Vehicle information

Pharmacy - Focus on addressing critical issues such as counterfeit medicines. The pharmaceutical industry takes care of the development, manufacturing, and distribution of drugs. Utilizing IOT to track operational milstones (Wholesalers, Manufacturers, Distributors, End customers).

Blockchain

Retail

Digital Twin

Digital Twin

Predictive maintenance: allows businesses to schedule maintenance and avoid machine downtime. The digital twin can be used to simulate the performance of the equipment in a variety of different scenarios. This can help to identify and predict potential problems with the equipment before they occur.

  • Product development
  • Process optimization

References

  • Asghari, P., Rahmani, A. M., & Javadi, H. H. S. (2019). Internet of Things applications: A systematic review. Computer Networks, 148, 241-261.
  • Yugha, R., & Chithra, S. (2020). A survey on technologies and security protocols: Reference for future generation IoT. Journal of Network and Computer Applications, 169, 102763.
  • Petrellis, N., Birbas, M., & Gioulekas, F. (2019). On the design of low-cost IoT sensor node for e-health environments. Electronics, 8(2), 178.
  • Nancy, A. A., Ravindran, D., Raj Vincent, P. D., Srinivasan, K., & Gutierrez Reina, D. (2022). Iot-cloud-based smart healthcare monitoring system for heart disease prediction via deep learning. Electronics, 11(15), 2292.
Tin liên quan