Data-centric Networking For A Data-centric IoT: A User's Perspective

1y ago
4 Views
1 Downloads
2.86 MB
38 Pages
Last View : 1m ago
Last Download : 3m ago
Upload by : Wren Viola
Transcription

Data-centric Networking for a Data-centric IoT:A User’s PerspectiveEve M. SchoolerTechnology, Strategy, PathfindingInternet of Things Group (IoTG)May 31, 2016

Outline Context What makes IoT interesting.and disruptive? Why is ICN well-suited for IoT? IoT Use Cases – A Sampling of ICN benefits The Smart Grid – Smart Home, Smart Buildings, Smart Neighborhoods Trusted Analytics at the Network Edge - Critical Infrastructure, Remote Monitoringand Interactive Control (Manufacturing, Transportation, etc) Interoperability - Smart Objects and Trust Lessons learned, Gaps, Call to action!2

AcknowledgmentThis work is the result of many collaborators (where they were when thecollaboration began/where they are currently and if they are currently at Intel):Moreno Ambrosin (U. Padua/Intel IoTG), Andrew Brown (Intel IoTG), DavidCohen (Intel DCG), Mihaela Ion (U. Trento/Google), Sanjana Kamath (Intel IoTG),Sung Lee (Intel IoTG), Qinghua Li (Penn State/U. Arkansas), Hassnaa Moustafa(Intel IoTG), Adedamola Omotosho (Intel QSD), Sebastian Schoenberg (IntelIoTG), Matthias Schunter (Intel Labs), Jeff Sedayao (Intel SW & Services Group),Karen Sollins (MIT), Xinlei Wang (UC Davis/Facebook), Dave Zage (Purdue/IntelIoTG), Jianqing Zhang (Intel Labs/Vmware).3

Context On Research and Business UnitsIntel Labs, IoT Group (IoTG), Data CenterGroup (DCG) IoTG VerticalsIndustrial & Energy, Transportation,Healthcare, Digital Security & Surveillance,Smart Building & Home, Retail, . IoTG Horizontal(1) IoT Reference Architecture(2) Standards(3) Pathfinding/Proof of Concepts4

The IoT e212BDC/CloudIndustrialGatewaySENSORS1Home1. IDC2. MC/EDC: The DigitalUniverse of Opportunities3. Goldman Sachs4. IMS Research5. Cost per Gigabyte Update6. GartnerCOST OFSENSORSPAST10YEARS12XCOST OFBANDWIDTHPAST10YEARS240XCOST OFPROCESSINGPAST10YEARS360XCOST OFSTORAGEPAST10YEARS.changes our architectural thinking25X5,65

Attractive ICN Properties Name-based data routing Distributed data caching Self-contained data security6

IoT Use Cases – A Sampling of ICN BenefitsSmart Grid iHEMS: ICN-based Home Energy Management System (HEMS) iCity: ICN-based Neighborhood-Coordinated Electric Vehicle (EV) Charging Constrained (Mobile) Device OptimizationsTrusted Analytics at the Network Edge Updaticator: ICN-based SW updates to O(Billions) of devices Remote monitoring and interactive control Video use cases for IoT (Manufacturing, Transportation, etc) Fog Computing and Smart Data “Pipes”Interoperability Smart Objects7

Perspectives from the Smart Grid8

iHEMS: ICN-based Home Energy Management SystemChallenges Proliferation of smart “devices”, many mobile Many in unmanaged or self-managed nets Average users (vs. IT experts) “managing” them Tidal wave of data generated O(Petabytes) in Smart Grid data alone Security & Privacy increasingly critical IoT data can reveal personal identities, behaviors,location, health, etc. Scalable & flexible data encryption required9

Energy Data & Privacy3.5Electric Vehicle Charging (kW)3Whole-House Power Usage (kW)powerkiloWatts2.52a weekaway?1.5kiloWatts10.5dinner out?0Date/TimeTimeNocturnal Device Power Usage (kW)CPAP machinefor Sleep ApneaEntertainment Device Usage (kW)kiloWattswhere are the kids?Time10

iHEMS: ICN-based Home Energy Management SystemOpportunities Avoid replacing “thin waist” ofthe entire Internet, instead. Enable ICN-based Trusted LocalClouds for IoT at the Network Edge– akin to uGrids in the Smart Grid11

BuildDefine the Anatomy of the Trusted Data BusOpportunities Re-usable, interachangeableICNs and middleware Plug-in-play SW modulesVisualizationCollaborative AnalyticsComposable Security & Privacy LibraryICN pub-subPublish-Subscribe CoAP DDS PADRES MQTTNDN CCNxNetworking . IPInformationCentric(ICN) Composable uServicesData integrityData authenticityData confidentialitySubscription confidentialityScalable key managementEncrypted filteringPublisher/Subscriber anonymity.Smart Devices Platform12

Use-case Driven Requirements and APIsiHEMSAPIsEnhancedPub-SubICNAPIsPub (dn)PublishAdvertise (dn)Sub (dn, mode,[interval])TypeFeatureExampleInstantSubscribe onceDeliver once immediatelyQuick check ofpower usagePersistentSubscribe onceDeliver multiple times, uponeventPower eventsnotificationPeriodicSubscribe onceDeliver periodically atspecified intervalSampled dataliketemperature,voltage, etc.ConstrainedSubscribe onceDeliver multiple times, ifcondition metAlarms ontemperature,power, etc.SubscribeGet (dn)[7] SmartGridComm’1213

iCity: Neighborhood-Coordinated EV ChargingChallenges Not all EVs can charge at once Risk damage to transformers 100x to 1000x more devices and sensors Dynamics of mobility Wider geographic distributions Data flows across private-public boundaries Scalability of Data Privacy solution14

BuildiCity: Neighborhood-coordinated EV ChargingOpportunitySmart Home,Smart City, Smart Grid,Participatory Sensing, etc.Preserve data privacy,Maintain loosely coupledsenders and receivers,Scale with group dynamicsAbstract away details ofphysical topologyName-based routing,native caching in the net,self-securing data Revisit Trusted Data Bus - and extendwith Data-centric PrivacyIoT ApplicationPolicy & SubAttribute Based Encryption (ABE)Publish-Subscribe MiddlewareInformation Centric Networking (ICN)15

BuildABE Use Case:Electric Vehicle ChargingActors DevicesHouseholdsNeighborhood CoordinatorUtilitiesUtilityWhat info can I get?NeighborhoodCoordinator(NC)Mobile DeviceHouseholdEVEVSEHouseholdICN ABEPolicy : share finest-grain data withHousehold, fine-grain data with NC,coarse-grain data with Utility, and nodata with other Households16

iCity: Neighborhood-Coordinated EV ChargingOpportunity Attribute-based Policies are embedded.and stay with the Data Richer attribute-based pub-subinterface at the application layerVPublisherΛΛVRequester MobilephoneRequester EVSEDataType FinestgrainRequester HouseholdRequester NeighborhoodCoordinatoreveryminΛDataType FinegraineveryhourRequester UtilitymonthlytotalsDataType CoarsegrainBroker(app-layerrouter)Subscriber[6] ACM SIGCOMM ICN’1317

Toward Trusted Analytics at the Network Edge18

Updaticator: Updating Billions of IoT DevicesWhat?: Use untrusted NDN to Scale Secure UpdatesHow?: Attribute-based Encryption for Device GroupsSoftwareProviderThird-party untrusteddistribution network[4] ESORICS’1419

Remote Monitoring and Interactive Control:What if all Things always streamed real-time (video) data?Archive?Many Use Cases Manufacturing Smart Grid BuildingSurveillance Transportation Healthcare &EldercareSmart street lightsSurveillance cameras20

Data Inversion Problem: IoT data originates at the “Edge”Result: Cloud functionality migrating to be more proximate to the data“By 2018, 40% of IoTcreated data will be stored,processed, analyzed, andacted upon closest to, or atthe edge of the network.”Software-definedBack-End Cloud12/2014CityWearablesMobileIndustrialHome[3] IEEE ComSoc MMTC E-letter21

Problem: Legacy clouds fall short .or are unusableWhen the IoT data generated is Delay-sensitive High-volume Trust-sensitive (Intermittently) DisconnectedVideo AnalyticsCountless examples Both near term & further outSmartCamera(24.7 Mbps)20K Gwys(24x7)LegacyCloud( 1.6 Tbps)Augmented Reality Data heavyCompute intensiveResponse times 30msSmall form factorLow powerUse ICN to move the “compute” (executables) to the“data” (observations) at or nearer the network edge22

Remote Monitoring & Interactive ControlChallengesOpportunities Where to perform analytics? Tandem need for analytics on theanalytics? Timeliness. .of video data delivery? .of response and/or action? How timely is timely enough? Interactivity & control loops ICN for (near) real-time Fog Re-usable comms/storage ICN for generalized anomalydetection/normalcy baselining Trusted data bus evolution ICN for Real-time (WebRTC, TSN-aware) Smart Data “Pipe”? Reverse CDN and ICN Named data, tagged data (interestingevents, features)23

Musings on Interoperability24

Smart ObjectsBridging the Cyber-Physical Divide Every object has a unique DO identifier (DOI) Smart Objects (SOs) Self-describing Things Objects can be: devices, users, comms channels, data, meta-data,clouds, services, algorithms, etc.E.g., ITU/IETF Digital Object(DO) ArchitecutureEnable data interoperability, microservice composition, policymanagement, smart data pipes, etc.Widespread discussion OpenFog, OCF, IPSO, IETF, NIST, ITU, OPC, etc. Taxonomies, Registries, BridgesAction: Expose Data Plane meta-data to seed SOs[1] NDNComm’15How to relate upper-layer Objects with lower-layer ICN names?25

BuildToward an Attribute-based Trust Framework:Building Trust and Trust AnchorsTrust EvidenceReputation ServiceObject TypesDigital ObjectObject RegistriesT(context) Meta t,Tiered AnalyticsAttestable Observed ExpectedBehaviorGroupInputawa bwb cwc .Trust CalculusData, Device, Cloud“Trustworthiness”26

Visualize ReputationA Personal (Marauder’s) Map to: Organize the sea of data Map cyber data to physical spaces Make the invisible visible Visualize device relationships/reputations Establish easy-to-setup privacy policies Disallow “spoofing”Decide which of the 212B sensors, 50Bdevices, and 100K clouds to connect to to allow connections from27

A Call to Action:How to make ICN even more successful?! One voice in the standards community Privacy and Caching – friends or foe? Encryption everywhere, all the time Quantify/Qualify ICN benefits Up-the-stack and down-the-stack28

Questions?29

Back-upISG Business Enabling Team30

References1.Andrew Brown, Sebastian Schoenberg, Eve Schooler, “NDN and the Internet of Things: Analytics Everywhere”, poster,2nd Annual Named-Data Networking Community Meeting, NDNComm’15, LA, CA (Sept 2015).2.Andrew Brown et al, “Information Centric Networking for IoT Devices”, Intel Software Professionals Conference, demo& presentation (Aug 2015).3.David E. Cohen and Eve M. Schooler, “Data Inversion and SDN Peering: Harbingers of Edge Cloud Migration”, IEEEComSoc MMTC E-letter, Special issue on Big Data in 5G Networks, Vol.9, No.6 (Nov 2014).4.Moreno Ambrosin, Christoph Busold, Mauro Conti, Ahmad-Reza Sadeghi, Matthias Schunter, “Updaticator: UpdatingBillions of Devices by an Efficient, Scalable and Secure Software Update Distribution Over Untrusted Cache-enabledNetworks”, ESORICS’14 (Sept 2014).5.Xinlei Wang, Jianqing Zhang, Eve M. Schooler, “Performance Evaluation of Attribute-based Encryption: TowardPrivacy in the IoT”, IEEE ICC’14, Sydney, Australia (Jun 2014).6.Mihaela Ion, Jianqing Zhang, Eve M. Schooler, “Toward Content-Centric Privacy in ICN: Attribute-based Encryptionand Routing”, ACM SIGCOMM’13 and SIGCOMM ICN’13 workshop, extended abstract, Hong Kong (Aug 2013).7.Jianqing Zhang, Qinghua Li, Eve M. Schooler, “iHEMS: An Information-Centric Approach to Secure Home EnergyManagement”, IEEE 3rd International Conference on Smart Grid Communications, SmartGridComm’12, Tainan City,Taiwan (Nov 2012).ISG - Influencer Solutions Group

GartnerHypeCurveJuly 20153232

Attractive ICN Properties Name-based data routing Distributed data caching Self-contained data securityICN Challenges Data & Interest confidentiality without secret key sharing Enforce fine-grained data access control policies in adistributed mannerISG - Influencer Solutions Group

Approach: Content-Centric Privacy Enrich ICN with pub-sub layerPublisher data described by attributes vs strictly name Support fine-grain constraints on attributes to describe data access control policies– e.g., who/what has access to the datawhat conditionsunderBroker(app-layerrouter) to express Interests Attach access control mechanisms to the data & decryption keysSubscriber

IoT Data Infographic:Data Tidal WaveSource DataFloq35

Why Critical to Solve?2020 Expectations :Video from huge #s of connected cameras: Forecast for a total of 129 yottabytes generated by2020, of which 41% will come from sensors and 59%from cameras(ABI Research, April 2015) 180/360-degree IP network cameras are the fastestgrowing product segment in video surveillance and IPpanoramic network cameras are forecast to increaseglobal unit shipments by more than 60% YoY(IHS, 2015)ABI Research37

Why Critical to Solve?2020 Expectations:Storage & Compute at the Edge By 2020, 40% of all data will come fromIoT devices and sensors - nearly reaching90% of the world’s data created in last 2years (Cisco Consulting Services, 2014) Edge computing ensures that the rightprocessing takes place at the right time &the right placeABI Research38

Information Centric Networking (ICN) IoT Application 15 Smart Home, Smart City, Smart Grid, Participatory Sensing, etc. Preserve data privacy, Maintain loosely coupled senders and receivers, Scale with group dynamics Abstract away details of physical topology Name-based routing, native caching in the net, self-securing data Build

Related Documents:

Bruksanvisning för bilstereo . Bruksanvisning for bilstereo . Instrukcja obsługi samochodowego odtwarzacza stereo . Operating Instructions for Car Stereo . 610-104 . SV . Bruksanvisning i original

Content-based networking, publish/subscribe, information-centric networking, content-centric networking, named-data networking Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies

Information-Centric Networking (ICN) research direction raised by Van Jacobson. ICN represents a general trend of future Internet architecture that evolves from the today's host centric, end-to-end, IP focused architecture to a content centric and distributed one. CCN and Named Date Networking(NDN) [24] are the typical instances of the broad

Pro:Centric Direct interactive features are available with IP connectivity. Easy Code Editing with HCAP API Customized UI & Interactive Service Pro:Centric Smart TV API SI Application IP Pro:Centric (Middleware Platform) Pro:Centric Hotel Management Solution The WU960H is the latest in the line of Pro:Centric TVs that provide a unique and .

10 tips och tricks för att lyckas med ert sap-projekt 20 SAPSANYTT 2/2015 De flesta projektledare känner säkert till Cobb’s paradox. Martin Cobb verkade som CIO för sekretariatet för Treasury Board of Canada 1995 då han ställde frågan

service i Norge och Finland drivs inom ramen för ett enskilt företag (NRK. 1 och Yleisradio), fin ns det i Sverige tre: Ett för tv (Sveriges Television , SVT ), ett för radio (Sveriges Radio , SR ) och ett för utbildnings program (Sveriges Utbildningsradio, UR, vilket till följd av sin begränsade storlek inte återfinns bland de 25 största

Hotell För hotell anges de tre klasserna A/B, C och D. Det betyder att den "normala" standarden C är acceptabel men att motiven för en högre standard är starka. Ljudklass C motsvarar de tidigare normkraven för hotell, ljudklass A/B motsvarar kraven för moderna hotell med hög standard och ljudklass D kan användas vid

LÄS NOGGRANT FÖLJANDE VILLKOR FÖR APPLE DEVELOPER PROGRAM LICENCE . Apple Developer Program License Agreement Syfte Du vill använda Apple-mjukvara (enligt definitionen nedan) för att utveckla en eller flera Applikationer (enligt definitionen nedan) för Apple-märkta produkter. . Applikationer som utvecklas för iOS-produkter, Apple .