Standards for Constrained Iot Devices
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Compatible Drivers & Applications
UPDATED LIST framework® Compatible Drivers & Applications NIAGARA COMMUNITY HAS A DRIVER FOR EVERY NEED Niagara Framework® offers an open platform that developers all over the world are utilizing to create solutions to real-world problems. This fast growing collection of drivers is unmatched in the industry. In many cases, the right driver for your integration work is available off-the-shelf from one of our development partners. This document strives to list all drivers available for purchase or, in some cases, for free at the current time. Note that Tridium has not tested all listed drivers and does not certify conformance. We have compiled this list as a convenience to our customers and, as new offerings are introduced by Niagara Community developers all the time, it may not be comprehensive. If you don’t find the driver or application you are looking for on this list, the openness of the Niagara environment means you can relatively easily develop the solution you need. Moreover, Tridium ‘s developer support team and others in the Niagara Community are here to help. Driver Name System Detail Type of System Developer For More Information Connection Type Niagara Platform Niagara Version Accruent Alarm Driver Send configured alarms to the Any system that generates an Accruent IP JACE AX and N4 accruent server Alarm including HVAC, Refrig- eration and Lighting Accruent Configuration Driver To clone the JACE device to Any System that needs a col- Accruent N/A IP JACE AX and N4 the Accruent system for map- lection of Telemetry data or ping telemetry data values changing values on a JACE Accruent IOT Driver Works with the Accruent Con- Any System that needs values Accruent N/A IP JACE AX and N4 figuration Driver to change changed for a period of time the values on a JACE from the including Turning on/off Accruent System Lights, Temps on HVAC and Refrigeration Devices Mainly. -
Wireless Sensor Networks
WIRELESS SENSOR NETWORKS PRESENTED BY VIVEK KRISHNA KANNAN SIDDARTH RAM MOHAN ARUN OUTLINE • Wireless sensor networks • The Internet of Things and the role of WSN • TinyOS • Programming with Tinyos WIRELESS SENSOR NETWORKS • Comprises of spatially connected autonomous sensors • Typically used to measure temperature, pressure etc • Usually bi-directional allowing for control of sensor activity WIRELESS SENSOR NETWORKS MOTES/NODES • Sensors + supporting elements = Mote/Node • So, apart from the sensor, each mote typically consists of : • Radio transceiver with an internal antenna • A microcontroller • An interfacing element between the microcontroller and sensor • An energy source ( Battery or an energy harvesting element) GATEWAY • GATEWAY acts as a bridge between the WSN and other networks. This enables data to be stored and processed by devices with more resources, for example, in a remotely located server. RADIO TECHNOLOGIES AVAILABLE • Long range: 3G / GPRS • Medium range: ZigBee / 802.15.4 / WiFi • Short range: RFID / NFC / Bluetooth 4.0 ROUTING PROTOCOLS : CHALLENGES • No global IP addressing • This is due to the relatively large number of sensor nodes • Consequently overhead of ID maintenance is high • Thus IP based protocols don’t work ROUTING PROTOCOLS • The search for an ideal universal routing protocol for WSN’s is an ongoing process • A Technique is to have protocols based on the network structure • Common protocols for WSN: flat based and location based network structures ROUTING PROTOCOL : FLAT BASED NETWORK STRUCTURE • Here -
Network & Wireless
NETWORK & WIRELESS HUMIDITY & WIRELESS Kele Has Doubled the Offering of Network and Wireless Solutions, NETWORK and Continues to Add to Our Options to Meet Your Needs. Babel Buster | p. 719 L-VIS Series | p. 721 BASRT-B | p. 727 Series 110A | p. 733 ValuPoint VP4-23 | p. 744 EKI Series | p. 738 Series NETWORK & WIRELESS Products manufactured MODEL/SERIES PAGE in the United States Network Display and Control Panels Wireless EnOcean and ZigBee Devices L-VIS Series — BACnet and LON Touch Panel . 721 and Systems (cont.) Products that are BBC-SD — BACnet Graphic Display . 724 E3T-SxE Series — EnOcean Wireless European new to the catalog WebOP Series — Touchscreen Operator Display Light Switches . 826 Panel . 725 E3T-S2H Series — EnOcean Wireless Handheld Remote . 827 Network Gateways EasySens Thanos — EnOcean Room Operating ETH-1000 — Provides connectivity between Ethernet Panel . .. 830 and RS-485 based networks . 713 EasySens Receiver Gateways — EnOcean Receiver XLTR-1000 — Provides Connectivity Between Two Gateways . 831 Rs-485 Based Networks . 714 EasySens SRC Receiver Controllers — EnOcean Raptor Protocol Converter — RLE Technologies Receiver Controllers . 832 Protocol Coverter . 715 EasySens Repeater — EnOcean Wireless LGATE-9xx Series — Lonworks/Bacnet And Repeater . 833 Universal Gateways . 717 EasySens Switches — EnOcean Lighting, Blinds Babel Buster Series — BACnet - Modbus - SNMP and Shutters Switches . 834 Gateways . 719 EasySens Specialty Wireless Transmitters — AddMe® Series — BACnet - Modbus Network I/O . 743 EnOcean Remote Control, Key Card Switch, Window/Door Contact . 835 Network I/O Modules EasySens Room Sensors — EnOcean Temperature, Humidity and CO2 Sensors . 836 L-IOB Series — BACnet and LON I/O Module . 739 EasySens Temperature Sensors — EnOcean i.CanDoIt Series — Embedded Network Servers 742 Surface, Duct, Remote and Outdoor AddMe® Series — BACnet - Modbus Network I/O . -
AIT Presentation
Distributed Sensors & Connectivity as the answer to future grid requirements Karl-Heinz Mayer Director Engineering Innovation & Program Management AIT Industry Day – September 11th, 2015 © 2015 Eaton Corporation. All rights reserved. Power business – status quo • Electricity is still the backbone and driver of mankind‘s productivity – this seems not to be changed soon 2 © 2015 Eaton Corporation. All rights reserved. 2 Power business – status quo • Electricity is still the backbone and driver of mankind‘s productivity – this seems not to be changed soon • Climate changes are requesting less CO2 emission despite the worldwide increase of power demand Green Energy; programs for ISO 50001, LEED,…certifications 3 © 2015 Eaton Corporation. All rights reserved. 3 Power business – status quo • Electricity is still the backbone and driver of mankind‘s productivity – this seems not to be changed soon • Climate changes are requesting less CO2 emission despite the worldwide increase of power demand Green Energy; programs for ISO 50001, LEED,…certifications • Consumer – Prosumer transformation requests new system approaches Virtual power plants 4 © 2015 Eaton Corporation. All rights reserved. 4 Technology trends are lowering the hurdles to develop and connect more intelligent devices • Semiconductor component costs continue to decline • Functionality and power management performance improving • Pervasiveness of communications increasing • Cloud services and development tools are being used more and more…and their costs are dropping dramatically with scale 5 © 2015 Eaton Corporation. All rights reserved. 5 Future challenges 1. Growing Electricity 2. Electricity Peak 3. Increasing Variable 4. Increasing Demand & Ageing Management Energy Generation Integration of Electric Infrastruture Vehicle World Energy Consumption by fuel type, 1990-2040 - Source : EIA (2013) 6 © 2015 Eaton Corporation. -
Connect-And-Protect: Building a Trust-Based Internet of Things for Business-Critical Applications Table of Contents
WHITE PAPER CONNECT-AND-PROTECT: BUILDING A TRUST-BASED INTERNET OF THINGS FOR BUSINESS-CRITICAL APPLICATIONS TABLE OF CONTENTS THE INTERNET OF WHATEVER 3 LET’S GET PHYSICAL 8 TALK THE TALK 11 PROTECTED INTEREST 14 PICTURE ME ROLLING 23 DATA: THE NEW BACON 25 CONCLUSION 29 SOURCES 29 ABOUT ARUBA NETWORKS, INC. 30 WHITE PAPER CONNECT-AND-PROTECT: INTERNET OF THINGS THE INTERNET OF WHATEVER Today it’s almost impossible to read a technical journal, sometimes a daily paper, without some reference to the Internet of Things (IoT). The term IoT is now bandied about in so many different contexts that its meaning, and the power of the insights it represents, are often lost in the noise. Enabling a device to communicate with the outside world isn’t by itself very interesting. The value of the IoT comes from applications that can make meaning of what securely connected devices have to say – directly and/or inferentially in combination with other devices – and then act on them. Combining sensors and device with analytics can reveal untapped operational efficiencies, create end-to-end process feedback loops, and help streamline and optimize processes. Action can take many forms, from more efficiently managing a building or factory, controlling energy grids, or managing traffic patterns across a city. IoT has the potential to facilitate beneficial decision making that no one device could spur on its own. But that potential can only be realized if the integrity of the information collected from the devices is beyond reproach. Put another way, regardless of how data gathered from IoT are used, they’re only of value if they come from trusted sources and the integrity of the data is assured. -
Field Area Network
IEEE IoT Vertical & Topical Summit for Agriculture Patrick Wetterwald, CTAO IOT Standards and Architecture ETSI IP6 Vice Chairman, IEC SEG8 Chair, IPSO Alliance Past President [email protected] May 21st , 2017 What Is the Internet of Things? “The Internet of Things is the intelligent connectivity of physical devices driving massive gains in efficiency, business growth, and quality of life.” © 2013-2014 Cisco and/or its affiliates. All rights reserved. 2 IoT Is Here Now – and Growing! 50 50 Billion 40 “Smart Objects” Rapid Adoption 30 Rate of Digital Infrastructure: 5X Faster Than 20 25 Electricity and InflectionThe New Essential InfrastructureTelephony Point BILLIONS OF DEVICES 12.5 10 World Population 6.8 7.2 7.6 0 TIMELINE 2010 2015 2020 Source: Cisco IBSG, 2011 © 2013-2014 Cisco and/or its affiliates. All rights reserved. 3 Smart Agriculture © 2013-2014 Cisco and/or its affiliates. All rights reserved. 4 IoT Transforms Data into Wisdom More Important Wisdom (Scenario Planning) Knowledge Information 01010100101010101010101010101 Data 01010101010001010100101010101 01110101010101010101 Less Important © 2013Big-2014 Cisco Data and/or its affiliates. becomes All rights reserved. Open Data for Customers, Consumers to Use 5 But It Also Adds Complexity NewAPPLICATION Business Models AND BUSINESSPartner INNOVATION Ecosystem Cloud-based Threat Analysis / Protection Data Control Application Big Data Analytics Integration Applications Systems Integration Network and Perimeter Application Interfaces Security Services IoT CONNECTIVITYUnified Platform -
Demystifying Internet of Things Security Successful Iot Device/Edge and Platform Security Deployment — Sunil Cheruvu Anil Kumar Ned Smith David M
Demystifying Internet of Things Security Successful IoT Device/Edge and Platform Security Deployment — Sunil Cheruvu Anil Kumar Ned Smith David M. Wheeler Demystifying Internet of Things Security Successful IoT Device/Edge and Platform Security Deployment Sunil Cheruvu Anil Kumar Ned Smith David M. Wheeler Demystifying Internet of Things Security: Successful IoT Device/Edge and Platform Security Deployment Sunil Cheruvu Anil Kumar Chandler, AZ, USA Chandler, AZ, USA Ned Smith David M. Wheeler Beaverton, OR, USA Gilbert, AZ, USA ISBN-13 (pbk): 978-1-4842-2895-1 ISBN-13 (electronic): 978-1-4842-2896-8 https://doi.org/10.1007/978-1-4842-2896-8 Copyright © 2020 by The Editor(s) (if applicable) and The Author(s) This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. Open Access This book is licensed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made. The images or other third party material in this book are included in the book’s Creative Commons license, unless indicated otherwise in a credit line to the material. -
Water -M Project
Water -M Project D1.3 IT State of the Art v2.2 History Date Version & Status Author Modifications 02/09/2015 v0.1 Kamal Singh (UJM) A Draft with state of the art on ICT 28/10/2015 V1.0 Berhane A draft with state of the art on ICT. Gebremedhin Merged the 2 drafts into a new one. (University of Oulu) Compiled the references 14/04/2016 V2.0 Kamal Singh (UJM), Added 2.4 OneM2M standard, added 2.5 Abderrahmen SoA on Data management analytics and Kammoun (City of 2.6 about IoT platforms and SOFIA2. Saint Etienne / UJM), Francois-Elie Calvier (UJM) 15/04/2016 V2.1 Francois-Elie Calvier Updated References (UJM) 08/05/2016 V2.2 Berhane Berhane did some modifications Gebremedhin (University of Oulu) Contents 1 Introduction ............................................................................................................................................... 4 1.1 Business Drivers ................................................................................................................................ 4 1.2 Required Technologies ...................................................................................................................... 4 1.3 Challenges ......................................................................................................................................... 4 1.4 Opportunities ..................................................................................................................................... 5 2 ICT technologies for Water management ................................................................................................. -
Smartstruxure Lite Solution MPM Series Installation Instructions
SmartStruxure Lite Solution MPM Series Installation Instructions Site and zone managers providing wired and wireless integrated control solutions for HVAC, lighting, and metering, as well as remote management via StruxureWare™ Building Expert. MPM - UN Multipurpose Manager MPM - VA VAV Manager MPM - GW Wireless Manager Get Control. Get Efficient. Get Value Installation Instructions MPM Series 2 Who Should Read this Guide This guide is for integrators of SmartStruxureTM Lite solutions. It provides important information for getting you started with the set-up and configuration of your building efficiency management system. Ensure you follow the instructions to ensure a successful and trouble-free installation at the client’s site. Plan and Prepare Read this entire guide The information contained in this guide helps you work effectively and minimizes the likelihood of any critical issues occurring during installation. Keep this document handy when doing your installation. Prepare your equipment before going to customer site Commission and configure the equipment before you arrive at the customers site. Successful installation of your SmartStruxure Lite system requires proper preparation and planning. Planning in advance saves resources, prevents wasted effort, and saves time and money for you and your customer. About this Guide This guide provides instructions for the physical installation of the hardware components of your SmartStruxure Lite system. It also provides overviews of creating a network of Multi-purpose Manager (MPM) devices for the following: • MPM-UN Multi-purpose Manager • MPM-VA VAV Manager • MPM-GW Wireless Manager For more information visit our website at: www.documentation.smartstruxurelite.com Schneider Electric Americas: Boston ONE Campus, Andover, MA 1-800-225-0962 Europe: Malmö, Sweden +46 40 38 68 50 Asia Pacific: Hong Kong +852 2565 0621 II-SSL-MPM-EN.A4.09.2014.v3 www.schneider-electric.com/buildings September2014 Installation Instructions MPM Series 3 Overview Multi-Purpose Management Devices are flexible lines of site and zone Managers. -
The Web of Things, Nov'15
The Web of Things Dave Raggett <[email protected]> Presentation to OIC Thursday, 5 Nov 2015 1/59 IoT still at the top of the hype cycle* *From Gartner's hype cycle for emerging technologies – August 2014 2/59 IoT – over-hyped and fragmented ● The IoT is still very immature, but has huge potential ● There is currently a lot of fragmentation, which – drives up development costs – increases the risk for investors – reduces the market size for solutions ● There are many Industry Alliances and SDO's – W3C is seeking to establish collaboration agreements and work together to realise the potential and unlock the network effect 3/59 The World Wide Web Consortium ● W3C is a member funded international organisation focusing on developing standards for Web & semantic technologies – e.g. HTML, scripting APIs, the Semantic Web and Linked Data ● We are addressing the fragmentation for the IoT with an abstraction layer that spans devices, platforms and application domains ● A focus on simplifying application development by decoupling services from the underlying protocols 4/59 Interoperability implies . ● Exchange of meaningful, actionable information between two or more systems across organizational boundaries ● A shared understanding of the exchanged information ● An agreed expectation for the response to the information exchange A requisite quality of service: reliability, fidelity, and security. ● From: GridWise Architecture Council, March 2008 “Interoperability Context-Setting Framework” – See: http://www.gridwiseac.org/pdfs/ 5/59 Interoperability Framework -
Future-Proofing the Connected World: 13 Steps to Developing Secure Iot Products
Future-proofing the Connected World: 13 Steps to Developing Secure IoT Products Presented by the IoT Working Group Table of Contents Forward Introduction Document Scope The Need for IoT Security IoT Products Can Compromise Privacy IoT products can lend their computing power to launch DDoS Attacks Medical Devices and Medical Standard Protocols are Vulnerable to Attack Drones Are Approaching Mainstream Status and Being Used as a Platform for Reconnaissance Critical national infrastructure can rely on the IoT ecosystem Cars are becoming connected and autonomous Moving Forward Why Development Organizations Should Care About Securing IoT Products IoT Device Security Challenges IoT products may be deployed in insecure or physically exposed environments Security is new to many manufacturers and there is limited security planning in development methodologies Security is not a business driver and there is limited security sponsorship and management support in development of IoT products There is a lack of defined standards and reference architecture for secure IoT development There are difficulties recruiting and retaining requisite skills for IoT development teams including architects, secure software engineers, hardware security engineers, and security testing staff The low price point increases the potential adversary pool Resource constraints in embedded systems limit security options IoT Security Survey Guidance for Secure IoT Development 1. Start with a Secure Development Methodology Security Requirements Security Processes Perform Safety Impact Assessment Perform Threat Modeling 2. Implement a Secure Development and Integration Environment Evaluate Programming Languages OWASP Python Security Project Link Integrated Development Environments Continuous Integration Plugins Testing and Code Quality Processes 3. Identify Framework and Platform Security Features Selecting an Integration Framework Evaluate Platform Security Features 4. -
Enabling the Internet of Things for Australia Measure, Analyse, Connect, Act
COMMUNICATIONS ALLIANCE LTD Enabling the Internet of Things for Australia Measure, Analyse, Connect, Act Written by Geof Heydon and Frank Zeichner October 2015 Communications Alliance Internet of Things Think Tank An Industry Report commissioned by the Communications Alliance Internet of Things Think Tank Executive Council First published: October 2015 The Communications Alliance Internet of Things Think Tank was formed in May 2015. The Think Tank’s vision is to be a leading ICT industry initiative under a broad industry framework shaping the regulatory framework to harness for Australian industry the opportunities generated by the internet of Things. The Think Tank aims to define the IoT eco-system, inform and enable Australian companies to exploit the business opportunities afforded by IoT technology and services. Disclaimers 1) Notwithstanding anything contained in this Industry Report, Communications Alliance disclaims responsibility (including where Communications Alliance or any of its officers, employees, agents or contractors has been negligent) for any direct or indirect loss, damage, claim, or liability any person may incur as a result. 2) The above disclaimers will not apply to the extent they are inconsistent with any relevant legislation. Copyright © Communications Alliance Ltd 2015 This document is copyright and must not be used except as permitted below or under the Copyright Act 1968. You may reproduce and publish this document in whole or in part for your or your organisation’s own personal or internal compliance, educational or non-commercial purposes. You must not alter or amend this document in any way. You must not reproduce or publish this document for commercial gain without the prior written consent of Communications Alliance.