Internet of Things Kim Jonatan Wessel Bjørneset LuLiu 26/02/2016

advertisement
Internet of Things
Kim Jonatan Wessel Bjørneset
kjbjorne@ifi.uio.no
LuLiu
lliu@ifi.uio.no
26/02/2016
1
Kim
Master student at 1st year
Norwegian
Bachelor in programming and networking at IFI, UiO
Thesis: Security and privacy in smart electric grids and IoT
LuLiu
Master student of 1st year
Chinese
Master in programming and networks
Thesis: Big Data Analytics for PV Systems Real-time Monitoring
2
Wi-Fi Enabled Sensors for Internet of Things:
A Practical Approach
Authors:
Serbulent Tozlu, Murat Senel, Wei Mao, and Abtin Keshavarzian, Robert Bosch LLC
Note:
All pictures used in these slides are from original article, and the Internet
3
Introduction
●
From home appliances and electronics to small battery powered devices
○
●
Low powered Wi-Fi technology
This article evaluates three typical sensor application scenarios:
○
○
○
Power consumption
Interference (and reliability)
Range performance
4
●
IEEE 802.15.4 with 6LoWPAN adaptation layer
○ 6LoWPAN was developed for taking IP for wireless sensors
○
●
Picture: wikipedia
Traditionally considered for sensor network applications:
■ ZigBee and other IEEE 802.15.4 based protocols
Low-power WiFi
○ Decreasing power consumption on transceivers
○
A Stronger candidate - power efficient Wi-Fi components
■ Existing infrastructure
■ Cost savings
■ Years of battery time
■ IT personell already familiar
5
System Model
●
Network of WiFi enabled sensors
○
Associated with an Access Point (AP)
●
Basic operations:
○
○
○
○
○
Initialization
Keep-alive Messages
Periodic Data Transmission
Event-triggered Data Transmission
Command Messages
6
●
Initialization
○
○
●
Keep-alive Messages
○
●
Device reads sensor data periodically
Transmits data to a control unit
Event-triggered Data Transmission
○
○
●
Communicates with the AP periodically
Periodic Data Transmission
○
○
●
Sensor is powered up
Authentication with an AP and acquires an IP
Monitors the environment
Transmits a message upon a certain event
Command Messages
○
Query, Configuration, Command or an action
7
Three application scenarios
●
1 Simple sensor device
○
●
2 Monitoring sensor device
○
●
Ex. thermostat in a heating system
Ex. smoke detector
3 Combination of 1 & 2
○
○
Configurable sensors and actuators
Ex. fire alarm system
8
A ZigBee based solution would give years of battery life
What about a low-power WiFi based solution?
9
Power Consumption
●
Power Save Mode
○
○
○
○
●
802.11 standard got mechanism for turning off transmitter and receiver to save power
AP buffers messages
Picture: tistory.com
■ mobile station wakes up periodically to receive
For broadcast or multicasting, AP sends message immediately
■ mobile station stays awake to receive
Unicast messages, mobile station sends a PS Poll message
■ receives the message accordingly
A Low-Power WiFi Module - G2M 5477
○
○
○
32bit CPU, real-time clock, HW encryption engine, sensor, 802.11b/g, PHY, MAC
eCos & lwIP TCP/IP stack
Cheaper and more power efficient than 802.11n
■
Also, the scenarios didn’t require high data rates
10
●
Sleep Current and Wake-Up Energy
○
○
●
Wake-Up Process
○
○
●
Sleep state regular WiFi devices: 150 to 250µA
Sleep state G2 chip: 4µA
Time and energy depends on the application size
G2 chip allows multiple images to boot from
■ based on the reason
Transmit/receive energy
○
○
○
○
IEEE 802.15.4
■ 250kb/s max data rate
IEEE 802.11b/g
■ 1Mb/s to 54Mb/s
WiFi enabled sensors have higher data rate, spends less time..
..and therefore also spends less energy per bit
11
MAC Retransmissions
●
●
●
●
802.11 uses acknowledgements to ensure reliability
Unacknowledged frames are retransmitted
Different MAC retransmission rates due to interference
Power consumption especially significant for low data rate operations
Security
●
●
●
●
A tradeoff exists between security and energy
WEP
○ Security: bad
Time: fast, low power usage
WPA/TKIP-PSK
○ Security: good Time: authentication takes more time, more power usage
WPA2/AES-PSK
○ Security: good Time: authentication takes more time, more power usage
○ Best tradeoff! Since re-authentication should be avoided
12
13
● Performance Evaluation
●
●
Initialization: 250mJ, ~3s
Keep-Alive messages
●
Periodic Data
○
Small packet size
○
High data rate
●
Event Triggered Messages
●
Command Messages
○
Infrequent
○
PS with 10 sec
○
5 ½ years with AA
14
● The bigger packet size the more power consumption
Power consumption on different packet size
15
● The higher data rates the lower power consumption
Packet size at low data
rates has a noticeable
impact on power
consumption
Packet size at high data
rates has a minor impact
on power consumption
Power consumption on different data rates
16
Interference and Reliability
●
Measure impact of interference on reliability and real-time capability of Wi-Fi
enabled sensors
receiver
sender
○
○
●
T1
Benchmark phase (only background Wi-Fi traffic)
○
●
PSR - Packet Success Rate
RTT - Round-Trip-Time = T2-T1
100 percent PSR and 95 percent RTT was around 15 ms
T2
Add extra Wi-Fi interferers
○
○
out-of-Network Interference
■ Wi-Fi enabled sensors and interferers are in the same channel but they are associated to
different APs.
In-Network Interference
■ Wi-Fi enabled sensors and interferers are associated to the same AP.
17
Experimental Result
Observations
●
Sensor network perform better in out-of-network than in-network scenario.
18
●
●
RTT is significant higher here, almost 125 ms
PSR is almost 100 percent
Conclusion: MAC - layer retransmission packets
make RTT increase significantly, but packets
are not lost
19
●
The higher data rates of the sensors decrease the RTT slightly.
20
●
Packet size of the sensors have limited effect on RTT
21
●
●
Uplink channel to the AP is perfect in terms of PSR
Downlink channel experiences significant losses
Conclusion:
●
AP becomes the bottleneck in this case.
(AP fills up quickly and starts dropping packets)
●
PSR decreases with bigger packets
(AP send out smaller packets faster)
22
Communication Range
●
●
●
AP →should placed in an optimal location to provide good coverage
Wi-Fi enabled sensors → possible deployed in all corners of the building
A measurement in a typical European house
○
○
placed the AP in different location
measure Wi-Fi signal
lower data rates → longer communication range → more coverage area
23
Measurement Results
●
With AP in basement
○
○
High data rate coverage for ground floor
low data rate for top floor(1 Mb/s)
24
●
With AP in the living area
○
○
good coverage at high data rate at most locations
data rate not so high in the basement ( 1-11 Mb/s )
25
Conclusion & Summary
●
Power consumption
○
○
○
○
○
At a high data rate, packets size have small impact on power consumption
At a low data rate, packets size have noticeable impact on power consumption
Retransmission have an impact on energy consumption
WPA2 gives best tradeoff in terms of security and battery lifetime overhead
Timely command messages plays an important role in overall energy consumption
26
●
Impact of interference
○
○
●
Interference have little affect on reliability
Except under heavy in-network traffic, the AP becomes the bottleneck
Communication range
○
AP even if not installed in an optimal location can provide full coverage for all potential sensor
locations
○
create a tradeoff between communication range and battery lifetime (data rate higher or
lower)
27
The Internet of Things: A survey
Authors:
Note:
All pictures used in this slide are from original article, and the internet
28
Introduction
●
IoT - could be things or objects
○
●
NIC predicts that by 2025, Internet nodes might reside in everyday things
○
●
such as RFID tags, sensors, actuators, mobile phones etc
food packages, furniture, paper documents and more
This article:
○ describes different visions of IoT
○ reviews enabling technology for IoT
○ description of the principal applications for IoT
○ analyzes major research issues to be faced
29
IoT - Many visions
● IoT - Internet oriented
● IoT - Things oriented
○
huge number of objects involved
● IoT - Semantic oriented
○
○
unique addressing, representation and storing
IoT semantically means “WordWide network of interconnected objects
uniquely addressable based on standard communication protocols”
30
●
Things
○
●
IPSO Alliance
○
○
●
RFID tags, uID, NFC, WSAN, WISP, Spimes, smart items
802.15.4
6LoWPAN
Internet Ø
○
Internet over anything
●
Web of Things
●
Idea behind the semantic oriented IoT visions:
○ Extremely large number of objects connected to the Internet
○ Represent, store, search, interconnect etc
31
Enabling Technologies
●
●
Reduced size, weight, energy consumption, and cost of radio
RFID systems: reader(s), unique tag as identifier
○
●
Picture: from the Internet
monitor objects in real time without the need to be in Line-Of-Sight
■ logistics, e-health, security
■ mapping real world -> virtual world
An RFID tag is a small chip with antenna
○
○
receiving signals, and transmitting the tag ID
■ induction, current
■ signal power received divided by power transmitted = ID
Passive, Semi-passive (battery) and active (battery)
32
● Sensor Networks
○
○
○
○
○
Can cooperate with RFID
Used in e-health, environmental monitoring, intelligent transportation
systems, military etc
A number of sensing nodes communication in a wireless multi-hop
network
■ Can be many nodes
■ Nodes reporting to a special node, a sink
Many problems at all layers of the protocol stack
Mostly based on 802.15.4
■ Many nodes, few IP addresses
■ largest phy layer 127 bytes, 102 octets at MAC layer
■ sleep mode - cannot communicate
33
●
The green node in the figure:
○
○
is a special node
a “sink”, collecting data from the other nodes
34
WISPs
● Wireless Identification and Sensing Platforms
○
○
○
●
RFID
○
●
Small size, low costs, no battery
WSN
○
○
○
●
powered by regular RFID readers
integration of sensing technology into passive RFID tags leads to new applications to IoT
RFID sensor networks
■ RFID readers will be the “sinks”
Reader not required
high radio coverage
peer to peer
RSN
○
sensing, computing and communication capabilites
35
Middleware
● Software layer between technological and application levels
○
○
○
Simplifying development of new services
Programmers doesn’t need to know about the sets of technology in the lower layers
Using a SOA approach
■
■
SOA makes it easier for software components on computers connected over a network to
cooperate
Allows for software and hardware reusing
● not a specific technology for service implementation
36
Applications
●
Applications are on top of the architecture
○
○
exporting all the system’s functionalities to the end user
exploits the features of the middleware layer
Service Composition
●
●
Provides functionalities to build the services for applications
Only services visible, all currently connected service instances visible in a
repository
37
●
Service Management
○
○
○
○
○
Main functions available for each object in the IoT scenario
■ object dynamic discovery
■ status monitoring
■ service configuration
Might expand set of functionalities to QoS and lock management
Might enable remote deployment of new services during run-time for application needs
Services associated to each object in the network can be shown in a repository
Upper layer composes complex services by joining these services provided at this layer
38
●
Object Abstraction
○
Wrapping layer for devices with undiscoverable web service
■ main sub layers:
● interface: web interface, in/out msg operations communicate external world
● communication: logic behind web service methods
translates these into device-specific commands to communicate with real-world
objects
Often provided through a proxy
● opens a communication socket with the device’s console
● translated into a web service language, reducing complexity to end-device
○
■
●
Privacy and Security
○
RFID tags in clothes, groceries trigger ID and info without knowing, like a surveillance
■ middleware must include functions to preserve security, trust and privacy
39
Applications
Application domains and relevant major scenarios
40
Transportation and logistics domain
●
Logistics
○
●
Assisted driving
○
○
●
Posters equipped with NFC tags or visual markers
Monitoring environment parameters
○
●
provide better navigation and safety
find right path according to information about jam and incident
Mobile ticketing
○
●
Real-time monitoring supply chain(shorten supply time)
improve the efficiency of the food supply chain
Augmented maps
○
Tourist maps equipped with tags
41
Healthcare domain
●
Tracking
○
●
Identification and authentication
○
●
Reduce incidents harmful to patience
Data collection
○
●
Identification of a person or object in motion
Reduce form processing time
Sensing
○
○
Diagnose patient condition
provide real-time information on patient health indicator
42
Smart environment domain
●
Comfortable homes and offices
○
○
○
●
Industrial plants
○
○
●
room heating adapted
domestic incidents avoided
energy saved
quality control
emergency event react
Smart gym
○
recognize trainee through RFID tag
43
Personal and social domain
●
Social networking
○
○
●
Historical queries
○
○
●
record and display events
extremly useful for applications support long-term activities
Losses
○
○
●
real-time updates in social networks
control friend lists
view the last recorded location
leverages user-defined event to notify users
Thefts
○
objects are removed from a restricted area without authorization
44
Futuristic applications domain
●
Robot taxi
○
○
●
City information model
○
●
automatically track user’s location via GPS
users can request taxi at certain location and time on a detailed map
sharing energy in the most cost-effective and resource-efficient fashion
Enhanced game room
○
○
measure excitement and energy levels of players
controllers recognize RFID tags on objects
45
Addressing issues
●
●
●
IPv4 & IPv6
RFID tags use 64-96 bit identifiers
Proposed approach A
○
integrate RFID identifiers and IPv6 addresses
■
use 64 bits of the interface identifier of the IPv6 address to report the RFID tag
indentifier
other 64 bits of the network prefix to address the gateway between the RFID system and
the internet
if the RFID tag identifier is 96 bits long
■
○
■
■
“agent”will be used, maps the RFID identifier into a 64 bits field used as interface ID of
the IPv6 address
“agent”must keep updated the mapping
46
●
Proposed approach B
○
RFID message and headers are included into the IPv6 package payload
47
Networking issues
●
Domain Name Service(DNS) → Object Name Service(ONS)
○
○
●
TCP is not appropriate
○
○
○
●
DNS provides IP address of a host from a certain input name
ONS associates specific object and the related RFID tag identifier
Connection setup is unnecessary
Congestion control is useless
Data buffer is too costly for battery-less devices
Traffic in IoT is unknown
○
Traffic characteristics strongly depend on application scenario
48
Security issues
●
Why IoT is vulnerable to attacks?
○
○
○
●
Why authentication is difficult?
○
●
Physical attack easily (most time unattended)
Eavesdropping is simple(most communication are wireless)
Cannot implement complex security schemes(resource limited)
cannot exchange too many messages with the authentication servers
Limitation of existing solutions
○
taking some sensor nodes role as gateway
49
Example of attack
●
●
●
●
A is the node to authenticate other system elements
an attacker wants to steal the identity of B
A’ and B’ are two transceivers
This attack can happen regardless the signal is encrypted or not
50
Privacy issues
●
Ensuring individuals can control the data collected
○
●
Restrict network ability to gather data detail level
○
○
●
example for comfortable homes and offices
■ information collected not linkable with identity
■ The scope and the way tracked should be informed
■ Data collected should be processed for basic purpose and then deleted
sensor network report approximate location
cameras for video surveillance blur people’s image
Periodically delete information after use for the purpose
51
Conclusions
●
●
●
●
●
IoT should be considered as part of the overall internet in the future
host-to-host communication is a limitation factor for now
Data-centric networks(self-addressable and self- routable)
Assigning an IPv6 address to reach IoT element
Internet evolution will require a change
52
Thank you for your attention!
26/02/2016
53
Download