Iot Or Ubiquitous Computing ■A Sudden Surge of Interest in Iot, Or Ubiquitous Computing Around the Year 2000 in Japan

Iot Or Ubiquitous Computing ■A Sudden Surge of Interest in Iot, Or Ubiquitous Computing Around the Year 2000 in Japan

Japppan’s Perspective on IoT and Ubiquitous Computing International Experience Session. The Internet of Things Europe 2010 Ken Sakamura Professor, the University of Tokyo Director/CEO of YRP Ubiquitous Networking Laboratory Chair, TT--EngineEngine Forum, and uID Center TRON Project (since 1984) ■“…most machines in our surrounding environment including pieces of furniture will use computers. It is conceivable that 100 computers for a man will exist.” … ● Ken Sakamura: “The Objectives of the TRON Project”, in TRON Project 1987, Springer-Verlag, 1987, pp. 3-16. 2 Copyright © 2010 by Ken Sakamura 1 Year 2000: IoT or Ubiquitous Computing ■A sudden surge of interest in IoT, or Ubiquitous Computing around the year 2000 in Japan. ■Why? ● New generation of very small passive RFID tags. ━Internet had become popular. ━Small, powerful embedded computer systems used in mobile phones, sensors, etc.. ● The expectation of new application area using new devices. 3 New Generation of Passive RFID Chips ■ RFID technology has been around for a long time. ● But they had been large hardware. ━ Card-like shape. ━ Bulky tag like UHF tag. ■ Hitachi‘s mu-chip tag (2.45 GHz) changed the perception. ━ Small (0 .4mm ×04mm0.4mm) ━ Inexpensive (now 10-20 cents / unit). ■ People began to think really seriously about putting these tag chips to objects like individual goods finally. 4 Copyright © 2010 by Ken Sakamura 2 How to Use the New RFID Chips? ■Very s mall amou nt o f me mo ry. A doze n bytes or so at most. ■The concept of “uID Architecture” using Ubiquitous Communicator. ● Store only the short identifier inside the tag chip. ● The information associated with the ID is stored on remote servers on the network, and is fetched by applications when they need it. 5 ■Is such approach tenable? ● Supporting Technology ━The network : The Internet had become popular. ━The mobile user device: powerful mobile phones had become popular in Japan. We can embed R/W is such a device. 6 Copyright © 2010 by Ken Sakamura 3 The Vision of Ubiquitous Communicator Terminal ■“UC” for short ■A mobile communication terminal with reader/writer device of RFID tag and networking capability. 7 uID architecture as General Framework for Many Applications ■Everyyybody circa the y ear 2000 claimed that RID tag chips were too expensive. ■In order to lower the cost, we needed an application architecture that is ● as general as possible ● TbTo be use did in many appli litications. ■This also led to the development of uID architecture as a simple and general architecture applicable to many applications. 8 Copyright © 2010 by Ken Sakamura 4 uID Architecture uID Architecture: Principle of Operations 10 Copyright © 2010 by Ken Sakamura 5 Features of uID Architecture ■ A Computer Application Framework ■ Major features ● Tag-agnostics : any tags can be used (including barcode, passive RFID tags, etc.) ● Tags carry only an identifier, ucode, a simple number. ● Objects and places are marked with tags for identification. ● Information about objects and places are stored in remote servers, and are fetched from remote servers after “Resolution”. ● Simple ■ A bridge between the real world (tagged objects and places) and the virtual world (information about the objects and locations). 11 Some Merits of uID Architecture ■ucode, the identifier is 128 bits (only 16 octets). IitbdtthiInexpensive tags can be used store this identifier. ■uID architecture doesn’t impose any meaning to the bit fields of ucode. ucode is a plain number without any meaning. (Non-semantic code) ■It is easy to embed existing legacy product code systems within ucode since there is no a priori meaning to the bit-fields, and 128bits are wide enough. 12 Copyright © 2010 by Ken Sakamura 6 Ubiquitous Networking: One Assumption behind uID Architecture ■The use of network is mandatory for the resolution process in uID architecture. ■Comment ● In 2010, network access is ubiquitous. 3G, WiFi, Wi-Max, and other broadband network technology. ● Not storing information inside tags, and storing it in the information server has an advantage: less powerful tags can be used, and network security practice to control access to information can be employed. 13 Open Architecture ■uID Architecture is “Open” ● Technical specifications will be made freely available to the public. ● Technology for social infrastructure should be under the control of the masses. ● It should not be under the control of single or a few parties. ■Thus the “Open Architecture” 14 Copyright © 2010 by Ken Sakamura 7 YRP UNL an d its R&D Agenda Back to the history from 2000 15 Establishing YRP UNL to Codify Well- understood Application Practices ■People began asking then how and for what the uID architecture can be used ■YRP Ubiquitous Networking Laboratory (UNL for short). ■I serve as the director/CEO since its inception in FY 2001. ■A laboratory for R&D on Ubiquitous Computing (IoT in other words) with researchers from both industry and academia. 16 Copyright © 2010 by Ken Sakamura 8 UNL’s Goals: New Applications ■We set out to codify how uID architecture can be applied to various application issues. ■We eventually found two important classes of applications of uID architecture . ● Applications for Objects ● Applications for Places 17 Application for Objects ■Ttthdt“Objt”Tags are attached to “Objects”. ● Traceability (Food, Medical Drug, etc.) ● Maintenance ● Inventory Control ■Observ ation: ● In Japan, SCM is shadowed by maintenance and inventory control (in warehouses, and such) in terms of interest shown. 18 Copyright © 2010 by Ken Sakamura 9 Food Traceability Systems ■ Food packaged are marked for identifi cat ion by tags, barcodes, etc. ■ People with suitable terminal can identify the packages and learn ● When the package was made, ● By whom , ● Where, and ● And other info such as before which date the package should be consumed. ■ Application of tags on objects 19 Examples of Application for Objects 20 Copyright © 2010 by Ken Sakamura 10 Application for Places ■There a re ma ny feas ib ility study experiments conducted all over Japan. ■We assign ucode to places, and embed ucode tags (passive and active RFID tags, infrared markers,,)p etc.) in places. ■Users obtain location-based (i.e., location- specific) information such as route guidance, public facility help, etc. 21 uID-based IoT Applications in Japan Copyright © 2010 by Ken Sakamura 11 Privacy and Security ■Alreadyyjp a major topic ● CASPIAN formed in 1999. ■Major issues had been already identified and discussed by the time UNL was established. ■We set out to evaluate various issues in the real-world feasibility experiments. ● Also, looked for oversights or unexpected issues in uID architecture framework. 23 ■Public (or government) ilinvolvemen ttt to identification issues of individuals is mandatory. ■When identification of individuals are beneficial ((punder a watchful public scrutiny!). ● Accident victims who can’t speak for themselves. ● Disaster refugees in the case of earthquakes. Disaster Relief 24 Copyright © 2010 by Ken Sakamura 12 Wide Deployment in Japan ■Many deployment examples based on uID architecture. ■These are led by ● Private Industry ● Government (regional and national) ● Our Laboratory (YRP UNL) itself. 25 Concluding Remarks (1) ■Why we designed uID architecture. ● To use low-cost tags with limited amount of memory. ━Optical barcode (such as two-D code can be used.) ■The basic principle of uID architecture ● Network Access Control ━Security and Privacy: With uID architecture, the network security practice is applicable to the protection of data related to objects and places. 26 Copyright © 2010 by Ken Sakamura 13 Concluding Remarks (2) ■Application of uID architecture in Japan. ● Many feasibility study experiments which paved the way for useful future services in Japan. ● Many government offices (local and national) and commercial entities are interested in using the uID architecture in the future in Japan. ■What about the use of uID architecture in fooegreign cou coutntries? ● What is the governance of uID architecture? ● “Who issues ucodes?” ● “Do we have to get in contact with Japan's uID center each time we need ucodes?” ● Please don’t worry because … 27 Governance of uID Architecture ■Distributed Governance ● Such an arrangement is necessary and a minimum requirement to satisfy international user needs. ■Our policy: set up regional uID centers and let them handle local issue of ucodes. ● Large ucode subspaces is handed over to these regional uID centers to manage the issuance for the users nearby. ● Issuance to each regional customer doesn't have to be reported back to Japan's uID center. ■We hope to see a uID center in EU region which services users nearby. 28 Copyright © 2010 by Ken Sakamura 14 Development Outside Japan ■ CASAGRAS-2 (EU FP7) ● YRP UNL is a member and plans to contribute to resolution concept and design. ■ uID Center / Taipei ■ T-Engine Forum China ● a nickname of a government office ● Supported by ━ Institute of Computing Technology (ICT) of Chinese Academy of Sciences (CAS) ━ China Household Electric Appliance Research Institute (CHEARI) ■ Other activies in other places, too. ■ You are welcome to join the activities! 29 Than k you. http://www.t-engine.org http://www.uidcenter.org 30 Copyright © 2010 by Ken Sakamura 15.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    15 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us