Wireless Sensor Networks and the Internet of Things: Do We Need a Complete Integration?
|
|
- Lynne Fletcher
- 5 years ago
- Views:
Transcription
1 Wireless Sensor Networks and the of Things: Do We Need a Complete Integration? Cristina Alcaraz, Pablo Najera, Javier Lopez, Rodrigo Roman Universidad de Málaga Spain
2 2 IoT, Sensor Networks
3 3 Imagenes: Feli ( decoraciona.com, decorailumina.com, decoracion.in
4 FEATURES (Intelligence) ENVIRONMENT LOCATION Teddy Bear IDENTITY 4
5 FEATURES (Intelligence) Teddy Bear ENVIRONMENT LOCATION IDENTITY 5
6 6
7 7
8 8 Wireless Sensor Networks (and the IoT)
9 Sensor Nodes!... Living! Speaking! Feeling! Thinking! 9
10 10 WSN?...
11 WSN! Autonomy Not Expensive Lifetime Easy to deploy Self-* 11
12 12 Sensor Nodes Features?
13 Connecting WSN REMOTE LAN IPv6 6LoWPAN 13
14 Integration Strategies WSN (Tunneled) WSN-Specific WSN-Specific Solution Front-End Solution Stack-Based Approaches Gateway Solution Hybrid Solution Topology-Based Approaches Access Point Solution 14
15 When should we integrate WSN IoT? What we need to consider? 15
16 16 Factors to consider on the Integration WSN-IoT
17 Integration Strategies Security Factors Entity Authentication/Authorization And you are? Distributed? Efficient? (TLS? Kerberos?) Solution WSN WSN-Specific WWW/Other Trust the B.S. Front-End Solution 17
18 Integration Strategies Security Factors I DON T think so Access Control Reprogram Node Solution WSN WSN-Specific ACL, AC, Trust the B.S. Front-End Solution 18
19 Integration Strategies Security Factors Secure Communication Too little power TLS? IPsec? Solution WSN WSN-Specific TLS, IPsec Standards Front-End Solution 19
20 Integration Strategies Security Factors HW Capabilities I prefer a smaller one Manage protocols Solution WSN WSN-Specific Manage protocols Front-End Solution 20
21 Integration Strategies Security Factors Resilience!!!!!! Solution IDS Filtering IDS Filtering WSN WSN-Specific Front-End Solution IDS Filtering 21
22 Integration Strategies Security Factors Resilience (2) (Only one) Solution WSN WSN-Specific Front-End Solution 22
23 Integration Strategies Other Factors Accountability Doctor, this is what happened Memory Solution WSN WSN-Specific Memory Memory Front-End Solution 23
24 Integration Strategies Other Factors (SW) Maintainability So, it will hurt? All nodes Solution WSN WSN-Specific One node Front-End Solution 24
25 Integration Strategies Other Factors Maintainability (Availability) a time Solution WSN WSN-Specific (All WSN?) Front-End Solution 25
26 Integration Strategies Application Factors I want A from my door! Network Redundancy B C Door <= Decision Logic Solution WSN WSN-Specific Decision Logic Front-End Solution 26
27 Integration Strategies Application Factors A, door was Network Redundancy (2) A Door Solution <= Memory? Memory? WSN WSN-Specific Memory Memory Front-End Solution 27
28 Integration Strategies Application Factors Intelligence Can I talk with strangers? Push Solution WSN WSN-Specific Push <= Delegate Front-End Solution 28
29 Integration Strategies Application Factors Protocol Optimization IP. ROLL Solution WSN WSN-Specific Front-End Solution Network-specific Protocols 29
30 30 Scenarios and Analysis
31 31 SCADA/Industrial Systems
32 SCADA/Industrial Systems Louis Hippolyte Lafontaine Bridge-Tunnel ( Barco ) 32
33 First Responder (Emergency) Systems Photo by SkyWideDesign 33
34 Integration Strategies Analysis Robustness - SPoF Accountability / Mem DNP, Modbus Solution Maintainability SCADA Resilience / Others Protocol Opt. Resilience / Others Limited Overhead Emergencies Robustness - SPoF Push Model Decentralized Model 34
35 35 Conclusions
36 When? Where? How? depends on Application Requirements 36
37 37 The End
Featuring Trust and Reputation Management Systems for Constrained Hardware Devices*
Featuring Trust and Reputation Management Systems for Constrained Hardware Devices* Rodrigo Román, M. Carmen Fernández-Gago, Javier López University of Málaga, Spain *(Wireless Sensor Networks) Contents
More informationWireless Sensor Networks and the Internet of Things: Do We Need a Complete Integration?
Wireless Sensor Networks and the Internet of Things: Do We Need a Complete Integration? Cristina Alcaraz, Pablo Najera, Javier Lopez, Rodrigo Roman Computer Science Department University of Malaga Malaga,
More informationKey Management Systems for Sensor Networks in the Context of the Internet of Things
Key Management Systems for Sensor Networks in the Context of the Internet of Things Rodrigo Roman a, Cristina Alcaraz a, Javier Lopez a, Nicolas Sklavos b a Computer Science Department, University of Malaga,
More informationDeploying ISA100 Wireless Distributed Networks. YC Cheng NEXCOM 2016/09/27
Deploying ISA100 Wireless Distributed Networks YC Cheng NEXCOM 2016/09/27 Go Industrial Wireless for IIOT Industrial IoT Industrial Wireless Sensor Network Industrial Wi-Fi Backbone Industrial Network
More informationRobust Networking with IPv6
Robust Networking with IPv6 Phil Edholm, CTO, Enterprise Networks December 10, 2003 Nortel Networks Restricted PG 1 Nortel Networks Solutions for Mission-critical Government Networks Credentials for Network
More informationWhy do we really want an ID/locator split anyway?
Why do we really want an ID/locator split anyway? Dave Thaler dthaler@microsoft.com MobiArch 2008 1 Starting from basics Users deal with names, not addresses (esp. in IPv6) Humans need friendly identifiers
More informationInteroperability. Luca Mottola slides partly by Simon Duquennoy. Politecnico di Milano, Italy and Swedish Institute of Computer Science
Interoperability Luca Mottola slides partly by Simon Duquennoy Politecnico di Milano, Italy and Swedish Institute of Computer Science 2 Not just stand-alone systems 3 NES in business processes! Motivation
More informationLecture 04 Introduction: IoT Networking - Part I
Introduction to Industry 4.0 and Industrial Internet of Things Prof. Sudip Misra Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 04 Introduction: IoT Networking
More informationConfiguration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Fortinet Firewall. Overview
Configuration Guide How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Fortinet Firewall Overview This document describes how to implement IPsec with pre-shared secrets establishing
More informationCSC8223 Wireless Sensor Networks. Chapter 3 Network Architecture
CSC8223 Wireless Sensor Networks Chapter 3 Network Architecture Goals of this chapter General principles and architectures: how to put the nodes together to form a meaningful network Design approaches:
More informationAd hoc and Sensor Networks Chapter 3: Network architecture
Ad hoc and Sensor Networks Chapter 3: Network architecture Holger Karl, Andreas Willig, "Protocols and Architectures for Wireless Sensor Networks," Wiley 2005 Goals of this chapter Having looked at the
More informationAd hoc and Sensor Networks Chapter 3: Network architecture
Ad hoc and Sensor Networks Chapter 3: Network architecture Holger Karl Computer Networks Group Universität Paderborn Goals of this chapter Having looked at the individual nodes in the previous chapter,
More informationB-Scada and Security
+1 352.564.9610 info@b-scada.com www.scada.com B-Scada and Security How B-Scada s Status Products Keep Your Data Secure B-Scada and Security There are four communication relationships in the system that
More informationAd hoc and Sensor Networks Chapter 3: Network architecture
Ad hoc and Sensor Networks Chapter 3: Network architecture Goals of this chapter Having looked at the individual nodes in the previous chapter, we look at general principles and architectures how to put
More informationConfiguration Guide. For Managing EAPs via EAP Controller
Guide For Managing EAPs via EAP Controller 1910012313 REV1.0.0 December 2017 CONTENTS 1 Overview... 1 2 Configuration... 2 2.1 Managing EAPs in the Same Subnet... 2 2.2 Managing EAPs in Different Subnets...
More informationWireless Sensor Architecture GENERAL PRINCIPLES AND ARCHITECTURES FOR PUTTING SENSOR NODES TOGETHER TO
Wireless Sensor Architecture 1 GENERAL PRINCIPLES AND ARCHITECTURES FOR PUTTING SENSOR NODES TOGETHER TO FORM A MEANINGFUL NETWORK Mobile ad hoc networks Nodes talking to each other Nodes talking to some
More informationAd hoc and Sensor Networks Chapter 3: Network architecture
Ad hoc and Sensor Networks Chapter 3: Network architecture Holger Karl Computer Networks Group Universität Paderborn Computer Networks Group Universität Paderborn Outline Design principles (skipped) Basic
More informationAn IoT-Aware Architecture for Smart
An IoT-Aware Architecture for Smart Healthcare System Presented By: Amnah Allboani Abstract Smart hospital system (SHS) relies on complementary technologies specifically RFID, WSN, and smart mobile, interoperating
More informationAn Implementation of Fog Computing Attributes in an IoT Environment
An Implementation of Fog Computing Attributes in an IoT Environment Ranjit Deshpande CTO K2 Inc. Introduction Ranjit Deshpande CTO K2 Inc. K2 Inc. s end-to-end IoT platform Transforms Sensor Data into
More informationUbiquitous Sensor Network KIM, YONG-WOON ETRI
Ubiquitous Sensor Network 2007. 7. 10. KIM, YONG-WOON ETRI Table of Contents USN Definition USN Applications USN Problem Domains USN Service Requirements USN Technical Issues USN Technology Layer Model
More informationProposed Node and Network Models for M2M Internet
2009-2012 NTT CORPORATION. All Rights Reserved. Proposed Node and Network Models for M2M Internet Yuminobu Igarashi NTT Information Sharing Platform Laboratories 2012 NTT Information Sharing Platform Laboratories
More informationFuture-Proof Infrastructure: Planning & Executing Technology Transition. Andras Varadi Research Program Director
Future-Proof Infrastructure: Planning & Executing Technology Transition Andras Varadi Research Program Director 1 Who we are? Whats C-V2X s impact on product range? How to upgrade existing equipment? How
More informationRouting protocols in WSN
Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can
More informationDiet-ESP: A flexible and compressed format for IPsec/ESP
unrestricted Diet-ESP: A flexible and compressed format for IPsec/ESP draft-mglt-ipsecme-diet-esp-01.txt D. Migault, T. Guggemos 25/02/2014- IETF89- London Table of Contents Securing IoT communications
More informationPortable Wireless Mesh Networks: Competitive Differentiation
Portable Wireless Mesh Networks: Competitive Differentiation Rajant Corporation s kinetic mesh networking solutions combine specialized command and control software with ruggedized, high-performance hardware.
More informationHardware Support for a Wireless Sensor Network Virtual Machine
Hardware Support for a Wireless Sensor Network Virtual Machine Hitoshi Oi The University of Aizu February 13, 2008 Mobilware 2008, Innsbruck, Austria Outline Introduction to the Wireless Sensor Network
More informationLesson 13 Smart Street-lighting Services And Monitoring. Chapter-12 L13: "Internet of Things ", Raj Kamal, Publs.: McGraw-Hill Education
Lesson 13 Smart Street-lighting Services And Monitoring 1 Smart street-lightings and smart-lighting solutions Developed by Synapse Wireless partnering with ThingWorx Enables the development, control, and
More informationIPv6 Market Drivers. Opening The Door For Wireless Peer-Peer Device Revenue Generation in the Home
IPv6 Market Drivers Opening The Door For Wireless Peer-Peer Device Revenue Generation in the Home Gary Hemminger Vice President of Marketing IP Infusion January 9, 2004 IPv6 Advantages Massive address
More informationThread in Commercial Backgrounder
Thread in Commercial Backgrounder September 2018 An introduction to Thread, its Network Topology and Application Support 1 What is Thread Thread is an open standard for wireless communication providing
More informationHIP Host Identity Protocol. October 2007 Patrik Salmela Ericsson
HIP Host Identity Protocol October 2007 Patrik Salmela Ericsson Agenda What is the Host Identity Protocol (HIP) What does HIP try to solve HIP basics Architecture The HIP base exchange HIP basic features
More informationRouting for IoT and Sensor Systems
Facoltà di Ingegneria dell Informazione, Informatica e Statistica Internet of Things A.Y. 2017/18 Routing for IoT and Sensor Systems Federico Ceccarelli PhD Student 1 The Collection Tree Protocol (CTP)
More informationRab Nawaz Jadoon DCS. Assistant Professor. Department of Computer Science. COMSATS Institute of Information Technology. Mobile Communication
Rab Nawaz Jadoon DCS Assistant Professor COMSATS IIT, Abbottabad Pakistan COMSATS Institute of Information Technology Mobile Communication WSN Wireless sensor networks consist of large number of sensor
More informationDeployments and Network Topologies
TECHNICAL GUIDE Deployments and Network Topologies A technical guide to deploying Family Zone School in different network topologies. Contents Introduction...........................................3 Transparent
More informationIPv6 Stack. 6LoWPAN makes this possible. IPv6 over Low-Power wireless Area Networks (IEEE )
Reference: 6LoWPAN: The Wireless Embedded Internet, Shelby & Bormann What is 6LoWPAN? 6LoWPAN makes this possible - Low-power RF + IPv6 = The Wireless Embedded Internet IPv6 over Low-Power wireless Area
More informationAn Overview of the User Services Platform (USP) (Broadband Forum TR-369)
An Overview of the User Services Platform (USP) (Broadband Forum TR-369) Prepared especially for technical people - most meaningless marketing terms have been removed What we re going to talk about TR-069
More informationCommunication and Networking in the IoT
Communication and Networking in the IoT Alper Sinan Akyurek System Energy Efficiency Lab seelab.ucsd.edu 1 Internet of Things l Networking l link (machines, especially computers) to operate interactively
More informationReal-time IoT networking on the Internet
Real-time IoT networking on the Internet Where the physical world meets the virtual world Tom Herbert This talk is... Not about XDP Not about BBR Not about netfilter or tc Not about
More informationTinyOS meets IP -- finally
TinyOS meets IP -- finally David E. Culler THE Question If Wireless Sensor Networks represent a future of billions of information devices embedded in the physical world, why don t they run THE standard
More informationSecure Architecure for the Integration of RFID and Sensors in Personal Networks
P. Najera, R. Roman, and J. Lopez, Secure architecure for the integration of RFID and sensors in personal networks, 7th International Workshop on Security and Trust Management (STM11), LNCS vol. 7170,
More informationEuropean Conference on Nanoelectronics and Embedded Systems for Electric Mobility. An OCPP Energy Service Platform based on IoT
European Conference on Nanoelectronics and Embedded Systems for Electric Mobility ecocity emotion 24-25 th September 2014, Erlangen, Germany An OCPP Energy Service Platform based on IoT Ángeles Rodríguez
More informationHow to Configure a Hybrid WAN in Parallel to An Existing Traditional Wan Infrastructure
Table of Contents Introducing Hybrid WAN The WAN Evolution What is a Traditional Private WAN? Example IP Addressing What is a Hybrid WAN? SD-WAN - Centrally Managed Hybrid WAN Hybrid WAN Example Hybrid
More informationWP-PD Wirepas Mesh Overview
WP-PD-123 - Wirepas Mesh Overview Product Description Version: v1.0a Wirepas Mesh is a de-centralized radio communications protocol for devices. The Wirepas Mesh protocol software can be used in any device,
More informationPRACTICAL ROUTERS and SWITCHES for ENGINEERS and TECHNICIANS
PRACTICAL ROUTERS and SWITCHES for ENGINEERS and TECHNICIANS Objectives At the end of this workshop participants will: Be able to configure, maintain and manage routers have a clear practical understanding
More informationKey establishment in sensor networks
Key establishment in sensor networks -- introduction to wireless sensor networks -- needed key types -- LEAP -- random key pre-distribution (c) Levente Buttyán (buttyan@crysys.hu) Wireless sensor networks
More informationFeasibility of Gateway-less IoT e-health Applications
Feasibility of Gateway-less IoT e-health Applications C. PEREIRA, D. GUIMARÃES, J. MESQUITA, F. SANTOS, L. ALMEIDA, A. AGUIAR W O R K I N T H E S C O P E O F T H E N A N O S T I M A P R O J E C T ( N O
More informationDistributed Systems 26. Mobile Ad Hoc Mesh Networks
Distributed Systems 26. Mobile Ad Hoc Mesh Networks Paul Krzyzanowski pxk@cs.rutgers.edu 12/16/2011 1 Mesh Networks Mobile Ad-hoc networks, sensor networks, Decentralized networking No need for routers
More informationJason Bomar, CCIE #9316 Chief Network Architect
Jason Bomar, CCIE #9316 Chief Network Architect Topics We will cover a number of topics, at a high level they are: Hierarchy Resiliency/Redundancy Routing Switching Documentation Management PLEASE feel
More informationConfiguration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the SonicWall Firewall.
Configuration Guide How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the SonicWall Firewall Overview This document describes how to implement IPsec with pre-shared secrets
More informationQVPN Virtual Private Network. Secure network experience
QVPN Virtual Private Network Secure network experience What is VPN? (Virtual Private Network) The general Internet style Internet What is VPN? UNENCRYPTED ENCRYPTED ANONYMOUS When you connect through the
More informationMobile Security Fall 2011
Mobile Security 14-829 Fall 2011 Patrick Tague Class #9 Smartphones, PANs, and the IoT Announcements HW #2 will be posted this week Project group meetings: I'd like to schedule a meeting with each group
More informationConfiguration Guide. How to connect to an IPSec VPN using an iphone in ios. Overview
Configuration Guide How to connect to an IPSec VPN using an iphone in ios Overview Currently, users can conveniently use the built-in IPSec client on an iphone to connect to a VPN server. IPSec VPN can
More informationCloud Based IoT Application Provisioning (The Case of Wireless Sensor Applications)
Cloud Based IoT Application Provisioning (The Case of Wireless Sensor Applications) (ENCS 691K Chapter 7) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/
More informationLesson 10. Circuit Boards and Devices Ethernet and Wi-Wi Connectivity with the Internet
Lesson 10 Circuit Boards and Devices Ethernet and Wi-Wi Connectivity with the Internet 1 Connecting Arduino USB to Internet Arduino board IDE supports USB. USB port connects to a mobile or computer or
More informationClient Data Tunneling
Ethernet over GRE Tunnels, on page 1 Proxy Mobile IPv6, on page 9 Ethernet over GRE Tunnels Ethernet over GRE (EoGRE) is a new aggregation solution for aggregating Wi-Fi traffic from hotspots. This solution
More informationPOWER-ONE ITALY, 5 TH JUNE 2018 Cloud, Big Data & Cyber Security. Business, Opportunities and Risks
POWER-ONE ITALY, 5 TH JUNE 2018 Cloud, Big Data & Cyber Security Business, Opportunities and Risks Overview Cloud, Big Data & Cyber Security Summary Cloud: scalable, adaptable, cost effective but not under
More informationThe Y-Comm Framework. A new way
The Y-Comm Framework A new way Mobility within Domains Mobile IP is good for moving between large defined domains But we also have to consider mobility issues within a domain which may have a number of
More informationINTERNET OF THINGS FOR SMART CITIES BY ZANELLA ET AL.
INTERNET OF THINGS FOR SMART CITIES BY ZANELLA ET AL. From IEEE INTERNET OF THINGS JOURNAL, VOL. 1, NO. 1, FEBRUARY 2014 Presented by: Abid Contents Objective Introduction Smart City Concept & Services
More informationNetPro. from Wireless Logic. Available on a per SIM license basis. No CAPEX. Retain your Airtime Contracts with your existing providers
NetPro from Available on a per SIM license basis Real-time usage monitoring of Data SIMs Retain your Airtime Contracts with your existing providers No CAPEX Secure and resilient connectivity via VPN Be
More informationWHITE PAPER ARUBA SD-BRANCH OVERVIEW
WHITE PAPER ARUBA SD-BRANCH OVERVIEW June 2018 Table of Contents Overview of the Traditional Branch...1 Adoption of Cloud Services...1 Shift to the Internet as a Business Transport Medium...1 Increasing
More informationOneWireless Network Overview
OneWireless Network Overview Manufacturers are turning to innovative wireless applications and services to help meet higher productivity goals and respond to stricter security and environmental regulations.
More informationMicroPnP The Zero-Configuration Platform for Wireless Sensing & Actuation
MicroPnP The Zero-Configuration Platform for Wireless Sensing & Actuation Nelson Matthys VersaSense NV, Kroegberg 3, B-3000 Leuven, Belgium nelson@versasense.com Jackie Rutter Linear Technology Corporation,
More informationConnectivity 101 for Remote Monitoring Systems
Connectivity 101 for Remote Monitoring Systems Paul Wacker Moxa, Inc. Manager - Edge Connectivity Ariana Drivdahl Moxa, Inc. Product Marketing Manager Pain Points of Remote Monitoring Pressure to enhance
More informationENTERPRISE CONNECTIVITY
ENTERPRISE CONNECTIVITY Elevating Enterprise Private Networks with Cost-effective Satellite Services The success of today s organizations and enterprises highly depends on reliable and secure connectivity.
More informationDeployment of flow-sensors in Internet of Things virtualization via OpenFlow
Deployment of flow-sensors in Internet of Things virtualization via OpenFlow Arif Mahmud, Rahim Rahmani and Theo Kanter Department of Computer and Systems Sciences Stockholm University Sweden {arifm, rahim,
More informationDelegation of the European Union to Bosnia and Herzegovina
EUROPEAN UNION Delegation of the European Union to Bosnia and Herzegovina Sarajevo, 11.10.2018 CLARIFICATION No. 2 to the Tender Dossier "Supply of IT equipment for four tax administrations in BiH" Publication
More informationNetwork Security - ISA 656 IPsec IPsec Key Management (IKE)
Network Security - ISA 656 IPsec IPsec (IKE) Angelos Stavrou September 28, 2008 What is IPsec, and Why? What is IPsec, and Why? History IPsec Structure Packet Layout Header (AH) AH Layout Encapsulating
More information\ \ IQRF is a mature wireless technology, which can be easily integrated into any electronic product by ready-to-use transceiver modules, dramatically shortening time-to-market. Devices talking by the
More informationAccelerating IoT with ARM mbed
Accelerating IoT with ARM mbed Paul Bakker Product Strategy, IoT BU ARM Tech Symposia China 2015 November 2015 Productivity Security Connectivity Management Efficiency 2 Since TechCon Last Year 60K 2014
More informationIP Mobility vs. Session Mobility
IP Mobility vs. Session Mobility Securing wireless communication is a formidable task, something that many companies are rapidly learning the hard way. IP level solutions become extremely cumbersome when
More informationSecure Technology Alliance Response: NIST IoT Security and Privacy Risk Considerations Questions
Secure Technology Alliance Response: NIST IoT Security and Privacy Risk Considerations Questions April 26, 2018 The Secure Technology Alliance IoT Security Council is pleased to submit our response to
More informationAdaptive Dispatching of Incidences based on Reputation for SCADA Systems
C. Alcaraz, et al., Adaptive Dispatching of Incidences Based on Reputation for SCADA Systems, 6th International Conference on Trust, Privacy and Security in Digital Business (TrustBus09), LNCS, pp. 86-94,
More informationFrom IoT to Digitised Production Automation. Professor Jerker Delsing EISLAB Luleå University of Technology
From IoT to Digitised Production Automation Professor Jerker Delsing EISLAB Luleå University of Technology From enterprise to multi stakeholder operation Business Stakeholder collaboration domain Support
More informationAccelerating IoT with ARM mbed
Accelerating IoT with ARM mbed Dr.Krisztián Flautner General Manager / ARM Internet of Things Business Unit ARM Holdings Ltd mbed Sponsored Session / ARM TechCon 2015 11 th Nov 2015 Productivity Security
More informationQuestion: 1 An engineer is using the policy trace tool to troubleshoot a WSA. Which behavior is used?
Volume: 418 Questions Question: 1 An engineer is using the policy trace tool to troubleshoot a WSA. Which behavior is used? A. External DLP policies are evaluated by tool B. Socks policies are evaluated
More informationImplementation of Gradient Routing in WSNs
Implementation of Gradient Routing in WSNs Thomas Watteyne, Kris Pister, Dominique Barthel, Mischa Dohler, Isabelle Auge-Blum BSAC, UC Berkeley, USA Orange Labs, Meylan, France CTTC, Castelldefels, Barcelona,
More informationEnhancement of CoAP Packet Delivery Performance for Internet of Things. Hang Liu
Enhancement of CoAP Packet Delivery Performance for Internet of Things Hang Liu Outline Motivation and Industrial Relevance Project Objectives Approach and Previous Results Future Work Outcome and Impact
More informationA WSN middleware for security and localization services
1st Italian Workshop on Embedded Systems A WSN middleware for security and localization services Speaker Marco Santic Center of Excellence DEWS University of L'Aquila Italy Overview Introduction Concept
More informationOneWireless Network Overview
OneWireless Network Overview Manufacturers are turning to innovative wireless applications and services to help meet higher productivity goals and respond to stricter security and environmental regulations.
More informationQuestion No : 1 Which three options are basic design principles of the Cisco Nexus 7000 Series for data center virtualization? (Choose three.
Volume: 162 Questions Question No : 1 Which three options are basic design principles of the Cisco Nexus 7000 Series for data center virtualization? (Choose three.) A. easy management B. infrastructure
More informationJMobile. The X Platform Software
JMobile The X Platform Software ...Our Word Counts Highlights High User Interface Experience Create IIoT ecosystems with reduced risk From Shop Floor to Cloud / Big Data Deterministic Communication via
More informationPassTorrent. Pass your actual test with our latest and valid practice torrent at once
PassTorrent http://www.passtorrent.com Pass your actual test with our latest and valid practice torrent at once Exam : 352-011 Title : Cisco Certified Design Expert Practical Exam Vendor : Cisco Version
More informationSecure routing in IoT networks with SISLOF
Secure routing in IoT networks with SISLOF Ayman El Hajjar 1,, George Roussos 1, Maura Paterson 2 1 Department of Computer science and Information systems 2 Department of Economics, Mathematics and Statistics
More informationYOUR INDUSTRIAL IOT PARTNER Expertises and solutions
YOUR INDUSTRIAL IOT PARTNER Expertises and solutions October 2017 SUMMARY 1. Wireless IoT gateway 2. IoT VPN Software 3. 4G / LTE Routers 4. Vehicle grade routers 5. 3G Routers / Modems 6. Lora Technology
More informationSemainaire Objects connectés industriels, M2M, réseaux June 12th, 2014 IoT et Smart Cities: comment passer à l échelle
Semainaire Objects connectés industriels, M2M, réseaux June 12th, 2014 IoT et Smart Cities: comment passer à l échelle Paolo Medagliani (paolo.medagliani@thalesgroup.com) Agenda IRIS and smart cities Overview
More informationFlexible Dynamic Mesh VPN draft-detienne-dmvpn-00
Flexible Dynamic Mesh VPN draft-detienne-dmvpn-00 Fred Detienne, Cisco Systems Manish Kumar, Cisco Systems Mike Sullenberger, Cisco Systems What is Dynamic Mesh VPN? DMVPN is a solution for building VPNs
More informationTime Synchronization in Wireless Sensor Networks: CCTS
Time Synchronization in Wireless Sensor Networks: CCTS 1 Nerin Thomas, 2 Smita C Thomas 1, 2 M.G University, Mount Zion College of Engineering, Pathanamthitta, India Abstract: A time synchronization algorithm
More informationAccelerating IoT with ARM mbed
Accelerating IoT with ARM mbed Zach Shelby VP Marketing Internet of Things Business Unit mbed Connect / Shenzhen, China 15 th Dec 2015 Productivity Security Connectivity Management Efficiency 2 Since TechCon
More informationMOBILE COMPUTING (Common to Computer Science & Engineering and Information Technology)
Code No: R41054 R10 Set No. 1 1 a) Explain functional architecture of GSM. [8] b) Write and explain novel applications of Mobile Computing. [7] 2 a) Explain in detail about IEEE 802.11 MAC Data frames.
More informationCradlepoint to Palo Alto VPN Example. Summary. Standard IPSec VPN Topology. Global Leader in 4G LTE Network Solutions
Cradlepoint to Palo Alto VPN Example Summary This configuration covers an IPSec VPN tunnel setup between a Cradlepoint Series 3 router and a Palo Alto firewall. IPSec is customizable on both the Cradlepoint
More informationUse Shrew Soft VPN Client to Connect with IPSec VPN Server on RV130 and RV130W
Use Shrew Soft VPN Client to Connect with IPSec VPN Server on RV130 and RV130W Objective IPSec VPN (Virtual Private Network) enables you to securely obtain remote resources by establishing an encrypted
More informationLoosely Coupled Actor Systems
Loosely Coupled Actor Systems for the Internet of Things Raphael Hiesgen Internet Technologies Group Hamburg University of Applied Sciences Agenda Introduction Where We Are Next Steps Risks and Conclusion
More informationDesign and development of embedded systems for the Internet of Things (IoT) Fabio Angeletti Fabrizio Gattuso
Design and development of embedded systems for the Internet of Things (IoT) Fabio Angeletti Fabrizio Gattuso Network stack Application Transport Network Data Link Physical Level 802.15.4 Bluetooth Lora
More informationUpcoming EC Systems Research Perspectives
Upcoming EC Systems Research Perspectives Neeraj Suri Dept. of Computer Science TU Darmstadt, Germany Dependable Embedded Systems & SW Group www.deeds.informatik.tu-darmstadt.de EU Computing Systems Strategy
More informationInternational Journal of Modern Trends in Engineering and Research e-issn No.: , Date: April, 2016
International Journal of Modern Trends in Engineering and Research www.ijmter.com e-issn No.:2349-9745, Date: 28-30 April, 2016 Internet of Things for Healthcare Thakur Pranit S. 1, Thakur Srushti R. 2,
More informationAdvantage TLS Why IpTL TLS versus IPSec Technology Reference Guide
IpTL s Expert Edition Networking Simplified Advantage TLS Why IpTL TLS versus IPSec Technology Reference Guide The World s Longest Ethernet Cable Take control and get the network you want with the network
More informationIPv6 implementation in a multi-vendor network.
IPv6 implementation in a multi-vendor network. Roque Gagliano www.antel.com.uy Agenda motivation. first experience. backbone deployment. addressing. routing. multi-vendor environment. conclusion / next
More informationSplit DNS. Finding Feature Information
The feature enables a Cisco device to respond to Domain Name System (DNS) queries using a specific configuration and associated host table cache that are selected based on certain characteristics of the
More informationDEPENDABLE CONNECTION. UNPARALLELED SERVICE. DIGI NETWORK FAILOVER SOLUTIONS
DEPENDABLE CONNECTION. UNPARALLELED SERVICE. DIGI NETWORK FAILOVER SOLUTIONS COSTS TO ORGANIZATION Without a secure connection, loss of productivity and an increase in unexpected, unnecessary costs add
More informationBest Practices for Extending the WAN into AWS (IaaS) with SD-WAN
Best Practices for Extending the WAN into AWS (IaaS) with SD-WAN Ariful Huq Product Management @arifulhuq & Rob McBride Marketing @digitalmcb Industry trends impacting networking Cloud Mobile Social 2
More informationCisco IOS IPv6. Cisco IOS IPv6 IPv6 IPv6 service provider IPv6. IPv6. data link IPv6 Cisco IOS IPv6. IPv6
IP6FD v6 Fundamentals, Design, and Deployment v3.0 Cisco IOS IPv6 Cisco IOS IPv6 IPv6 IPv6 service provider IPv6 IP IPv6 IPv6 data link IPv6 Cisco IOS IPv6 IPv6 IPv6 DHCP DNS DHCP DNS IPv6 IPv4 IPv6 multicast
More information