Security Protocols Suite for Machine-To-Machine Systems

Total Page:16

File Type:pdf, Size:1020Kb

Security Protocols Suite for Machine-To-Machine Systems Security Protocols Suite for Machine-to-Machine Systems PhD Thesis By Andrea Bartoli Submitted to the Universitat Politècnica de Catalunya (UPC) DOCTOR OF PHILOSOPHY Co-advised by: Dr. Mischa Dohler Dr. Juan Hernández-Serrano Senior Research Associate Assistant Professor Centre Tecnològic de Universitat Politècnica Telecomunicacions de Catalunya de Catalunya (CTTC) (UPC) PhD program on Telematics Barcelona, April 2013 Dissertation Committee PRESIDENT: Dr. Josep Pegueroles Vallés Universitat Politècnica de Catalunya (UPC) Barcelona-Spain SECRETARY: Dr. Jesús Alonso Zárate Centre Tecnològic de Telecomunicaciones de Catalunya (CTTC) Barcelona-Spain MEMBER: Dr. José María Sierra Cámara Universidad Carlos III de Madrid (UC3M) Madrid-Spain ACTING MEMBER 1: Dr. Óscar Esparza Universitat Politècnica de Catalunya (UPC) Barcelona-Spain ACTING MEMBER 2: Prof. Francisco Javier López Muñoz Universidad de Málga (UMA) Málaga-Spain Dedicated to all those who believe in the magnificence of the human being, the prestige of the knowledge and the immense gift of the willpower: "Our greatest glory is not in never falling but in rising every time we fall", Confucius. Abstract Nowadays, the great diffusion of advanced devices, such as smart-phones, has shown that there is a growing trend to rely on new technologies to generate and/or support progress; the society is clearly ready to trust on next-generation communication systems to face today’s concerns on economic and social fields. The reason for this sociological change is represented by the fact that the technologies have been open to all users, even if the latter do not necessarily have a specific knowledge in this field, and therefore the introduction of new user-friendly applications has now appeared as a business opportunity and a key factor to increase the general cohesion among all citizens. Within the actors of this technological evolution, wireless machine-to-machine (M2M) networks are becoming of great importance. These wireless networks are made up of interconnected low-power devices that are able to provide a great variety of services with little or even no user intervention. Examples of these services can be fleet management, fire detection, utilities consumption (water and energy distribution, etc.) or patients monitoring. However, since any arising technology goes together with its security threats, which have to be faced, further studies are necessary to secure wireless M2M technology. In this context, main threats are those related to attacks to the services availability and to the privacy of both the subscribers’ and the services providers’ data. Taking into account the often limited resources of the M2M devices at the hardware level, ensuring the availability and privacy requirements in the range of M2M applications while minimizing the waste of valuable resources is even more challenging. Based on the above facts, this Ph. D. thesis is aimed at providing efficient security solutions for wireless M2M networks that effectively reduce energy consumption of the network while not affecting the overall security services of the system. With this goal, we first propose a coherent taxonomy of M2M network that allows us to identify which security topics deserve special attention and which entities or specific services are particularly threatened. Second, we define an efficient, secure-data aggregation scheme that is able to increase the network lifetime by optimizing the energy consumption of the devices. Third, we propose a novel physical authenticator or frame checker that minimizes the communication costs in wireless channels and that successfully faces exhaustion attacks. Fourth, we study specific aspects of typical key management schemes to provide a novel protocol which ensures the distribution of secret keys for all the cryptographic methods used in this system. Fifth, we describe the collaboration with the WAVE2M community in order to define a proper frame format actually able to support the necessary security services, including the ones that we have already proposed; WAVE2M was funded to promote the global use of an emerging wireless communication technology for ultra-low and long-range services. And finally sixth, we provide with an accurate analysis of privacy solutions that actually fit M2M-networks services’ requirements. All the analyses along this thesis are corroborated by simulations that confirm significant improvements in terms of efficiency while supporting the necessary security requirements for M2M networks. Resumen Hoy en día, el uso generalizado de dispositivos avanzados, como móviles inteligentes, muestra que hay una tendencia creciente hacia la adopción de tecnologías innovadoras para generar progreso; la sociedad está claramente dispuesta a confiar en los sistemas de comunicación de última generación para hacer frente a las crisis actuales en materia económica y social. La razón de este cambio sociológico es que las tecnologías se han abierto a todos los usuarios, incluidos los que no tienen un conocimiento tecnológico específico, y por lo tanto, el fácil uso de nuevas aplicaciones está generando nuevas oportunidades de negocio y es además un factor clave para el aumento de la cohesión global entre todos los ciudadanos. Dentro de los actores de esta evolución tecnológica, las redes inalámbricas machine-to- machine (M2M) son cada vez de mayor importancia. Estas redes inalámbricas se componen de dispositivos interconectados de baja potencia que son capaces de proporcionar una gran variedad de servicios con poca o ninguna intervención del usuario. Ejemplos de estos servicios pueden ser la gestión de flotas, de detección de incendios, el consumo de servicios públicos (distribución de agua, de energía, etc.) o la monitorización de los pacientes. Sin embargo, toda nueva tecnología conlleva un conjunto nuevo de amenazas de seguridad que deben ser atacadas y, por tanto, se necesita realizar un amplio estudio de estas amenazas para asegurar adecuadamente las redes M2M. En este contexto, las principales amenazas están relacionadas con los ataques a la disponibilidad de servicios y con la privacidad de los datos tanto de los consumidores como de los proveedores de servicios. En el caso de M2M, estas amenazas son muchos mayores debido a las limitaciones de hardware presentes en muchos de los dispositivos, lo que conduce a un nuevo reto: garantizar los requisitos de disponibilidad de los servicios y de privacidad de los datos en el abanico de aplicaciones M2M minimizando el desperdicio innecesario de recursos. Basándonos en las razones mencionadas anteriormente, esta tesis pretende proporcionar soluciones efectivas de seguridad para redes inalámbricas M2M que sean capaces de reducir el consumo de energía de la red sin prejuicio de una seguridad adecuada del sistema. Con este objetivo, en primer lugar proponemos una taxonomía coherente de las redes M2M que nos permita identificar los temas de seguridad que merecen especial atención y qué entidades o servicios específicos son particularmente amenazados. En segundo lugar, se define en modo eficiente, un esquema de agregación de datos seguro que es capaz de aumentar el tiempo de vida de la red mediante la optimización del consumo de energía de los dispositivos. En tercer lugar, se propone un nuevo test de autenticación a nivel físico que minimiza los costes de comunicación en canales inalámbricos y que se enfrenta con éxito a los ataques de agotamiento de las baterías. En cuarto lugar, se estudian los aspectos específicos de gestión de claves para proporcionar un nuevo protocolo que garantice la distribución de claves secretas para cada protocolo criptográfico utilizado en el sistema. En quinto lugar, se describe la colaboración con el estándar WAVE2M en la definición de un formato de trama adecuado y capaz de suportar los servicios de seguridad necesarios, incluidos los que se proponen en esta tesis; WAVE2M fue financiado para promover el uso global de una tecnología de comunicación inalámbrica emergente para servicios de ultra- bajo consumo y de largo alcance. Y finalmente sexto, proporcionamos un preciso análisis de las soluciones de privacidad que realmente se ajustan a los requisitos de las redes de servicios M2M. Todos los análisis a lo largo de esta tesis han sido corroborados por simulación confirmando mejoras significativas en términos de eficiencia. Este hecho, en conjunto con que se aportan niveles adecuados de seguridad, permite afirmar que los protocolos presentados en esta tesis son adecuados para las aplicaciones M2M. Riassunto Al giorno d’oggi, la grande diffusione di nuovi dispositivi, come gli smart-phone, dimostra che c’è una crescente tendenza ad affidarsi a nuove tecnologie per generare e/o sostenere il progresso; la società è chiaramente pronta ad affidarsi a sistemi di comunicazione di ultima generazione per affrontare le problematiche di oggi per quanto riguarda l’ambito economico e sociale. La ragione di questo cambiamento è rappresentato dal fatto che le tecnologie sono state aperte a tutti gli utenti, anche se quest’ultimi non hanno necessariamente un conoscimento specifico in questa materia, e quindi l’introduzione di nuove applicazioni di facile utilizzo può rappresentare un’opportunità di business e un fattore chiave per l’aumento della generale coesione fra tutti i cittadini. Tra gli attori di questa evoluzione tecnologica, le reti wireless machine-to-machine (M2M) stanno diventando di grande importanza. Tali reti inalambriche sono costituite da dispositivi interconessi a basso consumo che sono in grado di fornire una grande
Recommended publications
  • M2M Growth Necessitates a New Approach to Network Planning and Optimisation
    Machina Research White Paper M2M growth necessitates a new approach to network planning and optimisation May 2015 2 1 Executive Summary Growing numbers of machine-to-machine (M2M) connected devices, as part of the emergence of an Internet of Things, will create challenges for Mobile Network Operators. The absolute volume of devices and mobile network traffic will be ostensibly quite manageable, with M2M accounting for just 19% of connections and 4% of traffic. However, traditional handsets, tablets and mobile broadband connections are relatively homogenous in their demands, in terms of usage, geographical location, criticality, security and numerous other criteria. M2M devices are much more diverse. As a result, M2M devices have the potential to place completely different demands on the network. This White Paper provides a snapshot of the growth of M2M/IoT in terms of numbers of devices and traffic, examines the ways in which M2M can put different and unexpected strains on the network, with a particular focus on connected cars, and finally offers some perspectives on how this might necessitate some changes in network engineering and operations. The key findings are as followings: The growth in M2M devices will be substantial, with cellular connections increasing from 250 million to 2.3 billion in the next decade. Traffic will grow even more quickly from 200 petabytes in 2014 to 3.2 exabytes in 2024. However, M2M will account for only 4% of all cellular traffic in 2024. M2M devices do not behave in the same way as handsets, tablets and other more established mobile devices. This may result in less manageable traffic patterns at particular times and in particular locations.
    [Show full text]
  • “Smart” Stormwater Management
    “Smart” Stormwater Management Structural Practices: The Futuristic Solutions Debabrata Sahoo, PhD, PE, PH Senior Engineer, Woolpert Inc, Columbia, SC North Carolina-American Public Works Association, October 21, 2019 Introduction Current Practices History Future Technologies Case Studies Agenda • Introduction • 5 Ws of SMART Stormwater Management • Current Practices in Stormwater/Flood Control and Mitigation • Issues with water quantity and quality • Stormwater/Flooding: Quality and Quantity • Issues with Stormwater/Flooding • Historical Flooding in South Carolina/North Carolina • Economic Impacts • Technologies to Integrate water, data, sensing and control • Internet of Waters, IoT, Sensors, Wireless Platforms, Machine to Machine Communication, Artificial Intelligence, Machine Learning, Deep Learning, Real-Time Systems, Cloud Computing, Big Data and Analytics • Application of Future Technologies in Stormwater/Flood Mitigation • Smart Stormwater Systems • Flash Flood Forecasting • Storm Sewer Controls • Big Data Analytics • Challenges and Opportunities Introduction Current Practices History Future Technologies Case Studies Current Practices in Stormwater Control and Mitigation • Use of design storms • Design to lower peak flows • Design to empty within 72 Hours • Store runoff for a minimum of 24 hours to get the water quality benefits Introduction Current Practices History Future Technologies Case Studies Current Practices in Stormwater Control and Mitigation Introduction Current Practices History Future Technologies Case Studies Stormwater/Flooding:
    [Show full text]
  • A DASH7-Based Power Metering System
    A DASH7-based Power Metering System Oktay Cetinkaya Ozgur B. Akan Next-generation and Wireless Communications Laboratory Department of Electrical and Electronics Engineering Koc University, Istanbul, Turkey Email: fokcetinkaya13, [email protected] Abstract—Considering the inability of the existing energy non-embedded structure. When considering the cost of HEMS, resources to satisfy the current needs, the right and efficient use power meters can be defined as cheap and cost effective of the energy has become compulsory. To make energy sustain- products, undoubtedly. ability permanent, management and planning activities should be carried out by arranging the working hours and decreasing There are several wireless communication protocols in liter- the energy wasting. For all these, power metering, managing ature to actualize the remote control of plugged gadgets. The and controlling systems or plugs has been proposed in recent communication between ‘master and slave’ or equivalently efforts. Starting from this point, a new DASH7-based Smart Plug ‘user and device’ is realized over any of these wireless (D7SP) is designed and implemented to achieve a better structure communication protocols based modules. 2.4 GHz frequency compared to ZigBee equipped models and reduce the drawbacks of current applications. DASH7 technology reaches nearly 6 times is frequently preferred for this goal and ZigBee can be referred farther distances in comparison with 2.4 GHz based protocols and as the most popular member of this band. With a brief provides multi-year battery life as a result of using limited energy definition, ZigBee is a low cost and high reliable technology during transmission. Performing in the 433 MHz band prevents based on IEEE 802.15.4 [1].
    [Show full text]
  • Using TOSCA for Automating the Deployment of Iot Environments
    Internet of Things Out of the Box: Using TOSCA for Automating the Deployment of IoT Environments Ana C. Franco da Silva1, Uwe Breitenbücher2, Pascal Hirmer1, Kálmán Képes2, Oliver Kopp1, Frank Leymann2, Bernhard Mitschang1 and Ronald Steinke3 1Institute for Parallel and Distributed Systems, University of Stuttgart, Stuttgart, Germany 2Institute of Architecture of Application Systems, University of Stuttgart, Stuttgart, Germany 3Next Generation Network Infrastructures, Fraunhofer FOKUS, Berlin, Germany Keywords: Internet of Things, TOSCA, Application Deployment, Device Software. Abstract: The automated setup of Internet of Things environments is a major challenge due to the heterogeneous nature of the involved physical components (i.e., devices, sensors, actuators). In general, IoT environments consist of (i) physical hardware components, (ii) IoT middlewares that bind the hardware to the digital world, and (iii) IoT applications that interact with the physical devices through the middlewares (e.g., for monitoring). Setting up each of these requires sophisticated means for software deployment. In this paper, we enable such a means by introducing an approach for automated deployment of entire IoT environments using the Topology and Orchestration Specification for Cloud Applications standard. Based on topology models, all components involved in the IoT environment (devices, IoT middlewares, applications) can be set up automatically. Moreover, to enable interchangeability of IoT middlewares, we show how they can be used as a service to deploy them individually and on-demand for separate use cases. This enables provisioning whole IoT environments out-of- the-box. To evaluate the approach, we present three case studies giving insights in the technical details. 1 INTRODUCTION abstracting the complexity of the devices (Mineraud et al., 2016).
    [Show full text]
  • Internet of Things, Smart Cities, Machine-To-Machine Communication, Analytics, Open Data, Technology, International Use Cases, Business Technology
    International Journal of Internet of Things 2017, 6(4): 149-158 DOI: 10.5923/j.ijit.20170604.01 Analyzing the Role of the Intenet-of-Things in Business and Technologically-Smart Cities A. Shinn, K. Nakatani, W. Rodriguez* Florida Gulf Coast University, Fort Myers, Florida, USA Abstract This research analyzes and theorizes on the role that the Internet-of-Things will play in the expansion of business and technologically-smart cities. This study examines: a) the underlying technology, referred to as the Internet of Things that forms the foundation for smart cities; b) what businesses and government must do to successfully transition to a technologically-smart city; and c) how the proliferation of the Internet of Things through the emerging cities will affect local citizens. As machine-to-machine communication becomes increasingly common, new use cases are continually created, as is the case with the use of the Internet of Things in technologically-smart cities. Technology businesses are keeping a close pulse on end-users’ needs in order to identify and create technologies and systems to cater to new use cases. A number of the international smart city-specific use cases will be discussed in this paper along with the technology that aligns to those use cases. Keywords Internet of things, Smart cities, Machine-to-machine communication, Analytics, Open data, Technology, International use cases, Business technology 1. Introduction back to the 1800s in which centralized networks were designed to deliver energy and water and facilitate Since early humans settled to cultivate the land and trade transportation; however, “modern cities designed around with neighbours, forming larger and denser populations, it the private automobile, with single-function zoning, are has been mutually advantageous to organize in cities that becoming more congested, polluted, and unsafe” [1].
    [Show full text]
  • Nodemcu and Lora Based Temperature Monitoring with Oled
    Turkish Journal of Physiotherapy and Rehabilitation; 32(2) ISSN 2651-4451 | e-ISSN 2651-446X NODEMCU AND LORA BASED TEMPERATURE MONITORING WITH OLED NAMGIRI SURESH, K UDAY KIRAN, P POORNA PRIYA, M ANIL KUMAR, B AKSHITHA, GOVINDA RAO, M SIVA KRISHNA Department of ECE,KLEF deemed to be University, Vaddeswaram, Andhra Pradesh,522502, India [email protected],[email protected],[email protected],anilkumar [email protected],[email protected], [email protected], [email protected] ABSTRACT In this day and age, the IoT is picking up incredible fame. Installed gadgets have become huge part of our lives. Individuals can screen, track, and do significantly more from Distance from a good ways. Various correspondence innovations have been accessible for collaboration between IoT gadgets over the most recent few years. The most mainstream are the Bluetooth Module and Wi-Fi Technology. Be that as it may, they have not many limitations, for example, restricted reach, restricted passages and high force utilization. So, Semtech is actualizing LoRa innovation to take care of every one of these issues. The gadget runs for longer than a year utilizing a solitary battery. Utilizing Lora Module SX1278 and ESP32 Wifi Module, we can make a Lora Transmitter and Receiver. The strategy for correspondence is highlight point and information is sent from one end (transmitter) to another end remotely (receiver). Keywords: Iot, LoRa, Bluetooth Module, Wi-fi Technology, Esp32 Wifi Module, Transmitter, Reciever. 1. INTRODUCTION The period of associated antiques is currently. IoT (Internet of Things) are of incredible criticalness in pretty much every region of this kind.As organizations, producing, purchaser hardware, car and significantly more.
    [Show full text]
  • State of the Art in LP-WAN Solutions for Industrial Iot Services
    sensors Review State of the Art in LP-WAN Solutions for Industrial IoT Services Ramon Sanchez-Iborra * and Maria-Dolores Cano Departamento de Tecnologías de la Información y las Comunicaciones, Universidad Politécnica de Cartagena, Cartagena 30202, Spain; [email protected] * Correspondence: [email protected]; Tel.: +34-968-325-953 Academic Editor: Gonzalo Pajares Martinsanz Received: 25 February 2016; Accepted: 9 May 2016; Published: 17 May 2016 Abstract: The emergence of low-cost connected devices is enabling a new wave of sensorization services. These services can be highly leveraged in industrial applications. However, the technologies employed so far for managing this kind of system do not fully cover the strict requirements of industrial networks, especially those regarding energy efficiency. In this article a novel paradigm, called Low-Power Wide Area Networking (LP-WAN), is explored. By means of a cellular-type architecture, LP-WAN–based solutions aim at fulfilling the reliability and efficiency challenges posed by long-term industrial networks. Thus, the most prominent LP-WAN solutions are reviewed, identifying and discussing the pros and cons of each of them. The focus is also on examining the current deployment state of these platforms in Spain. Although LP-WAN systems are at early stages of development, they represent a promising alternative for boosting future industrial IIoT (Industrial Internet of Things) networks and services. Keywords: Low-Power Wide Area Networks (LP-WAN); Machine-to-Machine (M2M) communications; Industrial Internet of Things (IIoT); Internet of Things (IoT); wireless sensor networks 1. Introduction Machine-to-Machine (M2M) networks and Industrial Internet of Things (IIoT) services are two key enabling approaches for future industrial networking [1].
    [Show full text]
  • DDS – the Proven Data Connectivity Standard for Iot TM WELCOME to the OBJECT MANAGEMENT GROUP® (OMG®)
    TM DDS – The Proven Data Connectivity Standard for IoT TM WELCOME TO THE OBJECT MANAGEMENT GROUP® (OMG®) As an international, open membership, not-for-pro t tech- nology stan dards consortium, OMG Task Forces develop enterprise integra tion standards for a wide range of technol- ogies and an even wider range of industries. OMG’s roots are in middleware, and one of our most widely deployed standards is the Data-Distribution Service™ standard (DDS™). DDS has already been successfully de- ployed in private, hybrid and public cloud systems (includ- WELCOME TO TO OMG® WELCOME ing so-called “fog architectures”); in mobile systems and of course general web solutions. But today’s computing infrastructure is changing dramatically to support new requirements in design and structure. This is no where more evident than in the Internet of Things (IoT), where new types of machines driven by vast, complex industrial, distributed systems, can’t operate without connectivity. These new machines will transform our infrastructure into smart freeways, distributed power generation and autonomous driving cars, etc., revolutionizing the workplace and our lives for years to come. These new IoT systems need a technology like DDS because it directly addresses real-time systems. It explicitly manages the communications “data model.” Consequently, it’s a “data-centric” technol- ogy. No matter what application—from nancial trading platforms, to medical devices, to smart electrical grids, to exploration and production and to transportation—DDS nds the right data and then communicates it to its intended destination in a reliable, exible, fast, and secure manner. IoT will not only fuel innovative business strategies; it will also disrupt markets that have not been disrupted by the Internet before, bringing huge economic impacts in e ciency and competition.
    [Show full text]
  • Is India Ready to Seize a USD 4.5 Trillion M2M Opportunity?
    Machine-to-Machine: Vision 2020 Is India ready to seize a USD 4.5 trillion M2M opportunity? TeleTech 2013 www.deloitte.com/in Contents Foreword 3 Message from Industry Mentor 4 Overview 5 M2M from the Telecom Operators Perspective 9 M2M in Automobile 14 M2M in Agriculture 24 M2M in Home Appliances 29 M2M in Industrial Products Manufacturing 35 M2M in Energy & Utilities 40 M2M in Healthcare Sector 48 M2M in Retail Sector 53 About Deloitte 57 About CII 58 About MIT School of Telecom Management 59 2 Foreword Machine-to-machine (M2M) would make those things However, for M2M to gain acceptance among the possible and affordable, which are currently not feasible general populace, service providers and others players in to be delivered, in a vast country like India. Technologies the value chain are required to deliver applications that that enable M2M communication such as GPS unit, bring tangible value to peoples’ lives. RFID, GPRS modules, etc. have much to offer to the developing world towards improving quality of life. In Several barriers, however, have the potential to fact, these next-generation communication technologies slowdown the development and adoption of M2M may well originate in the larger growth markets of the applications. Deployment of IPv6, sensor energy, developing world, particularly – China and India. standards in terms of security, privacy and architecture, current low-cost business models, network upgrades M2M can help in achieving many Millennium and regulatory compliances will pose challenges for all Development Goals of the United Nations through players in the M2M ecosystem. Since M2M technologies useful applications for medical diagnosis and treatment, would cater to several industries such as healthcare, cleaner water, improved sanitation, energy conservation, education, automotive, agriculture, telecom networks the export of commodities and food security.
    [Show full text]
  • Testbeds for Reliable Smart City Machine-To-Machine Communication
    Testbeds for Reliable Smart City Machine-to-Machine Communication Joyce Mwangama1, Alexander Willner2, Neco Ventura1, Asma Elmangosh2, Tom Pfeifer2 and Thomas Magedanz2 1 Centre for Broadband Networks, Department of Electrical Engineering University of Cape Town, Private Bag X3, Rondebosch, South Africa 2 Department of Next Generation Networks (AV), Technische Universität Berlin, Germany Email: {joycebm, neco}@crg.ee.uct.ac.za; [email protected] Abstract - With a large majority of the world’s common and significant breakdowns in the generation of population moving towards living in urban energy. In addition, not all power generation utilities are environments in the foreseeable future, the notion of running at full capacity as the provision of fossil fuels is Smart cities is emerging globally as an important impacted by adverse weather conditions as well as damage research topic. A particular challenge is the unstable to road infrastructure. power supply of cities in underdeveloped countries, thus Another challenge in that regard involve smart sensors, creating a need for smart energy management systems. deployed e.g. for energy consumption, waste bin levels, air By installing small smart and affordable devices at pollution or traffic congestion with no permanent the end-user’s location, information about the state of connectivity due to insufficient network coverage or limited the power grid can be collected and transmitted (over power supply. different network technologies) to a central controller. In such scenarios data is either sent by wired and wireless This can be the future technique for South Africa’s grid networks or collected in a delay tolerant fashion by mobile overload management, which operates in a demand- nodes equipped with a cellular interface.
    [Show full text]
  • A Survey on Optical Technologies for Iot, Smart Industry, and Smart Infrastructures
    Journal of Sensor and Actuator Networks Review A Survey on Optical Technologies for IoT, Smart Industry, and Smart Infrastructures Slavisa Aleksic Institute of Communications Engineering, Leipzig University of Telecommunications (HfTL), 04277 Leipzig, Germany; [email protected]; Tel.: +49-341-3062-212 Received: 1 July 2019; Accepted: 7 September 2019; Published: 17 September 2019 Abstract: In the Internet of Things (IoT), a huge number of sensors, actuators and other equipment for data acquisition and processing will be interconnected by means of an omnipresent communication network able to efficiently support heterogeneous transmission technologies and applications. On the one hand, advanced optical communication systems, which already play a significant role in modern networks, are currently evolving to meet very high requirements of modern applications. On the other hand, there are already many ways to utilize optical components and effects for building precise, efficient, and reliable sensors. Thus, optical technologies have the potential to greatly help in realizing future smart infrastructures and systems. This paper gives an overview of currently available and emerging optical technologies for sensing and communication applications and reviews their possible application in the context of the IoT for realizing smart systems and infrastructures. Keywords: optical technology; Internet of Things (IoT); optical sensors; optical communication systems and networks 1. Introduction The main prerequisite for implementing future smart city applications and systems is the existence of an efficient and reliable smart infrastructure. Such an infrastructure integrates in an efficient and reliable manner various basic infrastructures such as (i) water distribution systems, (ii) electricity grids, and (iii) transport infrastructure (roads, railways, trams, and metro) together with information technologies, distributed smart sensing systems, and communication networks.
    [Show full text]
  • Introduction to Iot – Part I
    Introduction to IoT – Part I Dr. Sudip Misra Associate Professor Department of Computer Science and Engineering IIT KHARAGPUR Email: [email protected] Website: http://cse.iitkgp.ac.in/~smisra/ Introduction to Internet of Things 1 IoT Internet technology connecting devices, machines and tools to the internet by means of wireless technologies. Over 9 billion ‘Things’ connected to the Internet, as of now. ‘Things’ connected to the Internet are projected to cross 20 billion in the near future. Unification of technologies such as low-power embedded systems, cloud computing, big-data, machine learning, and networking. Introduction to Internet of Things 2 Origin of Terminology In the 2000s, we are heading into a new era of ubiquity, where the “users” of the Internet will be counted in billions and where humans may become the minority as generators and receivers of traffic. Instead, most of the traffic will flow between devices and all kinds of “things”, thereby creating a much wider and more complex Internet of Things. (“The Internet of Things”, ITU Internet Report 2005) Introduction to Internet of Things 3 The title of the report was “Internet of Things” Discussed the possibility of internet connected M2M connectivity networks, extending to common household devices. Some areas identified as IoT enablers: . RFID, . Nanotechnology, . Sensors, . Smart Networks. Reference: International Telecommunications Union (ITU). (2005). The Internet of Things. Executive Summary [Online] Introduction to Internet of Things 4 Alternate Definition The Internet of Things (IoT) is the network of physical objects that contain embedded technology to communicate and sense or interact with their internal states or the external environment.
    [Show full text]