Testing, interoperability and combating counterfeiting in era of IoT Andrey Koucheryavy, SUT/NIIR,

advertisement
Testing, interoperability and
combating counterfeiting in
era of IoT
Andrey Koucheryavy, SUT/NIIR,
Vice-chairmen of WP4/11 of ITU-T SG11
Network Changes in IoT Era (1)
1. Enormous number of Internet of Things
(up to trillion, limit value in accordance with book J.-B.
Waldner “Nano-computers and swarm intelligence” is 50
trillions)
2. Self-organized architecture
(instead of «heavy» existing networks)
3. Super-dense heterogeneous network
(5G includes mobile and sensor networks, VANET, medicine
networks, etc.)
4. Ultra-low latency networks
(Tactile Internet, some applications of medicine networks)
2
Network Changes in IoT Era (2)
4. IoT is a new reality and a new trend in ICT market
(Most of applications in near future will be based on IoT
technologies)
5. Flying networks coming soon
(Delay-Tolerant network with many special application)
6. Cloud networks, which became popular world wide, are the
basic tool to control/maintain IoT
3
New standardization activities on IoT
1. Secure and trustable IoT identification procedure
2. Testing of IoT identity
3. Combating counterfeiting using IoT and DoA
4. Remote testing of IoT devices
5. New model network to be used for IoT testing
6. Interoperability and benchmarking of IoT
4
IoT classification
1. Cost
2. Interface
3. Power
5
IoT Things classification (cost)
In terms of cost IoT are classified as follows:
 cheap
 average
 expensive
 exclusive
Note: the cost of IoT may specify the IoT identifier and
the complexity of the used test suites
6
IoT Things classification (interface)
 interfaces of low-power networks (ZigBee,
6LoWPAN, RPL, Bluetooth)
 interfaces of Wireless LAN (WiFi)
 interfaces of local wireless networks (WiMax)
 interface of cellular networks (3G, 4G, 5G)
 wire interfaces (Ethernet)
7
IoT Things classification (power)
 on basis of processor
microcomputers)
(computers,
 on the basis of microcontroller
 on the basis of microchip (RFID, NFC)
 other without the use of the ADC (SAW)
8
Secure and trustable IoT identification
procedure
ITU-T SG20 started a new work item Y.IoT-IoD-PT
“Identity of IoT devices based on secure procedures and ensures
privacy and trust of IoT systems” (Jan.2016)
Scope: the methods and scenarios of IoT identification procedure
to be used with simple IoT devices such as RFID, NFC, SAW and
complex IoT devices which are based on the microcontroller or
microprocessor
Work item
9
Testing of IoT identity
ITU-T SG11 started a new work item Q.39_FW_Test_ID_IoT
“The framework of testing of identification systems used in IoT”
(Dec.2015)
Scope: description and test suites of identification procedures
used in Internet of Things according to IoT identification
procedures specified in Y.IoT-IoD-PT
Work item
10
Combating counterfeiting using IoT and DoA
IoT+DoA chain is a good tool to combat counterfeiting:
• IoT interfaces have specific features which are complicated to
duplicate – it allows customer to be sure that the purchased
product which equipped with IoT module is a genuine (not
counterfeit)
• Using Digital Object Architecture (DoA) concept, each product
which equipped with IoT module/interface may have a unique
identity which purchaser of ICT product will be familiar with
Note: The application of IoT identity is not limited to ICT products
and it might be efficiently used in other industries (such as
pharmaceutical, automotive, avionic, etc.)
11
Procedures of verification of product’s
identifiers using IoT and DoA concept (1/2)
4. Comparing
product details
Product
Product details
- ….
- ….
Purchaser
3. Product details
2. Checking the
product identifier
Network
TE
Database of
product’s
identifiers
1. Checking the
hardware
identifier
IoT module
Purchaser can check the identity of the product using an
independent technical solution (e.g. scanning the bar code
by mobile phone, getting a code through RFID, etc.)
Note: the detailed information is available in C332 submitted by Russia to SG11 – proposal to advance a draft new
Recommendation ITU-T Q.FW_CCF "Framework for solution to combat counterfeit ICT Devices"
12
Procedures of verification of product’s
identifiers using IoT and DoA concept (2/2)
Authorized
service
4. Actions (e.g. limited functionality
of the product)
Database of
product’s
identifiers
Product
3. Product details
Purchaser
1. Checking the
hardware
identifier
Network
IoT module
2. Checking the
product identifier
Purchaser can check the identity of the product using the
facilities of this product (e.g. mobile phone, tablet, PC,
car’s media system, etc.)
Note: the detailed information is available in C332 submitted by Russia to SG11 – proposal to advance a draft new
Recommendation ITU-T Q.FW_CCF "Framework for solution to combat counterfeit ICT Devices"
13
Identification system based on DoA/IoT
Automotive
industry domain
ICT industry
domain
GRI
Pharmacy industry
domain
GRI
GRI
High level
domain
Local level
domain
LRI
Tire’s vendor
LRI
Vendor of spare
parts
LRI
LRI
Phone’s vendor
Tablet’s vendor
LRI
Vendor of medical
equipment
Global Registry of Identifiers (GRI) – belong to the industries
Note: located in countries
Local Registry of Identifiers (LRI) – belong to the particular vendor
Note: located at the site of particular vendor
Note: the detailed information is available in C332 submitted by Russia to SG11 – proposal to advance a draft new
Recommendation ITU-T Q.FW_CCF "Framework for solution to combat counterfeit ICT Devices"
14
LRI
Vendor of
medicine
The architecture of the ICT identification
system, aiming to combat counterfeit goods
based on DoA/IoT
Purchaser
Store
Vendor
1
Internet
UPI
TE
Product’s Identifier
Database
(PID)
Portal
Industry
LRI
GRI
LRI
Product
Vendor
2
The detailed architecture was submitted by Russia to SG11 meeting in April
and December 2015 (as an input to ITU-T Q.FW_CCF "Framework for
solution to combat counterfeit ICT Devices”, C332)
All interested parties are invited to join this discussion at the next SG11
meeting in June 2016
15
New Testing Standardization Activity
in the IoT Era. Remote Testing
IoT-device
under test
Router
Remote
cloud server
Router
Remote
testing server
INTERNET
Wireless
Access Point
Notebook testing device
16
IoT Model Network architecture
17
Benchmarking Testing for Ultra-low
latency network (Tactile Internet)
10 Gb/s
10 Gb/s
IoT - server
SDN - switch
SDN - switch
T8
T8
DWDM-system "Volga"
SDN - client
SDN - client
SDN - controller
Internet of Things
Controller
SDN - client
Controller
Delay 1 ms
Sensors of tactile sensations
Actuators of tactile sensations
18
Augmented Reality + IoT
Inclusion of the switch
Sending temperature
19
Switching relay
Output of the temperature information (MQTT)
New Interoperability Activity in the
IoT Era
IoT
Cloud Server
Router
INTERNET
User of
Augmented Reality
Router
Cloud Server of
Augmented Reality
20
Interoperability for VANET with
UAV’s using
Group of vehicles
Group of vehicles
21
Advanced Interoperability  Suitability
• Sensor networks (sensor fields), FUSN, swarm
UAV’s and so on: two much routing protocols.
• The suitability routing protocols selection is
needed.
Empirical distributions of steps for 10
nodes for routing protocols RPL and
AODV
Empirical distributions of steps for 100
nodes for routing protocols RPL and
AODV
22
Conclusion (1)
1. IoT era demands new types of testing, including
interoperability and benchmarking of IoT
2. IoT/DoA can be used for combating
counterfeiting
Note: the relevant works should continue in
SG11
3. The series of ITU-T recommendations on the
remote testing need to be developed
Note: the relevant question is needed in SG11
23
Conclusion (2)
4. The identification procedure is very important and
sensitive issue in terms of customer’s trust.
The series of ITU-T Recommendations on the
identification procedure and testing have to be
developed
Note: the relevant question is needed in SG11
5. As far as a cloud computing is used for managing
IoT solutions, the interoperability is needed. The
series of ITU-T Recommendations on the cloud
interoperability in terms of IoT have to be
developed
Note: the relevant question is needed in SG11
24
Conclusion (3)
6.
The flying networks are widely used for collecting data.
The series of ITU-T Recommendations on testing of the
flying networks need to be developed
Note: the relevant question is needed in SG11
7.
The augmented reality (AR) plus IoT features will be new
world wide network service in the near future. The
series of ITU-T Recommendations on the AR+IoT testing
need to be developed
Note: the relevant question is needed in SG11
25
Conclusion (4)
8. The network with ultra-low delays and super-dense network
requests the delay estimations in the overload conditions. The
series of ITU-T Recommendations on the benchmarking testing
for ultra-low delays and super-dense networks can be developed
Note: the relevant question on benchmarking needs to be
established in SG11
9. The are too many signaling protocols used in IoT networks. The
choice of the efficient protocol to be used on the particular IoT
solution depends on the various factors. The creation of the ITUT Recommendation which provides the guidelines on using IoT
signaling/routing protocols is needed for the ICT market
26
Thank you!
Andrey Koucheryavy, SUT/NIIR,
Vice-chairmen of WP4/11 of ITU-T SG11
Email: akouch@mail.ru
Download