IEEE 5th World Forum on Internet of Things
15-18 April 2019 – Limerick, Ireland

Tutorials

TUT1-Fog/Edge Computing and Networking

TUT2-Communication System Design and Challenges for the Implementation of IoT Context Aware Environments

TUT3-Emerging Low Power Wireless Technologies for IoT (ZigBee, LoRa and 6LoWPAN)

TUT4-Cryptography in a Trusted Blockchain World: Promise, Practice, and Applications


TUT1-Fog/Edge Computing and Networking

Presenters:
Douglas N. Zuckerman, IEEE ComSoc and Board Member of OpenFog Consortium, USA
Hung-Yu Wei, National Taiwan University, Taiwan
David Belanger, Senior Research Fellow, Stevens Institute of Technology, New Jersey, USA
Hanna Bogucka, Poznan University of Technology, Poznan, Poland
Russell Hsing, National Chiao Tung University, Hsinchu, Taiwan
Yang Yang, ShanghaiTech University, Shanghai, China
John Zao, National Chiao Tung University, Hsinchu, Taiwan

Abstract: Introduction and background on basic fog principles, including relationship to edge and cloud computing. Example use cases where fog is needed for desired functionalities and performance, e.g., autonomous cars, energy management, robotics, industrial IoT. The following topics will be considered in the tutorial:

  • Issues and applications of fog/edge computing to IoT.
  • Fog and edge reference architectures and road maps
  • Key organizations or consortia working on implementation agreements and standards for both fog and edge computing
  • Published and draft standards (e.g. IEEE P1934, OpenFog, ETSI MEC)
  • Test beds and potential ways these may be used for conformance and other types of interoperability testing
  • Data analytics in the fog/edge computing environment
  • Security and trust in fog/edge systems
  • Challenges and opportunities in Fognomics (including pricing, user incentives, and other economic aspects of fog/edge computing)
  • Summarize key future technologies that will depend on fog, e.g., 5G/6G Wireless.

TUT2-Communication System Design and Challenges for the Implementation of IoT Context Aware Environments

Presenter: Francisco Falcone, DIEEC and ISC, Universidad Pública de Navarra, Spain

Abstract: The implementation of Context Aware environments require intensive use of multiple communication systems, mainly wireless in the case of edge connectivity, in order to enable fully interactive operation. The progressive introduction of connected devices of multiple types, within an IoT framework imposes relevant restrictions owing to large device density, low form factors and inherent energy consumption restrictions. In this tutorial we will provide an overview of the trends, limitations and challenges in relation with communication system design, considering multiple system and Heterogeneous Network operation. Device characteristics (transceiver parameters and requirements in terms of Input/Output signal processing, transmission bit rate requirements and energy consumption profiles), network design/integration (cooperative network operation, Intra-Inter Radio Access Technology operation) and specific protocol description (CoopMAC schemes, lightweight protocols, energy efficient routing protocols) will be given in order to provide a comprehensive and holistic overview for Communication System requirements in IoT use cases. Coverage/capacity relations will also be introduced, in order to understand limitations given by interference in the particular case of high density, large scale transceiver networks expected in Context Aware environments.

TUT3-Emerging Low Power Wireless Technologies for IoT (ZigBee, LoRa and 6LoWPAN)

Presenter: Ata Elahi, Southern Connecticut State University, New Haven, Connecticut, USA

Abstract: Due to the fast growth of IoT applications, the ZigBee Wireless Sensor, and LoRa Wireless Technologies, have become the most widely used technologies for IoT devices. They are used in automation processing, chemical plants, refineries, Reading Meters (water, gas, electric), and commercial buildings as well as home automation. This pervasive integration of ZigBee and LoRa technologies into IoT implies that the use of wireless sensors is becoming more prominent and that control networks are rapidly growing. Furthermore, Forbes Magazine projects that the IoT market will be a $457 billion industry by the year 2020. To accommodate this burgeoning technology, numerous standards are being developed for wireless sensors and control networking such as SP100.11 (Wireless Systems for Automation) by the Industrial Standard for Automation (ISA), Wireless HART (Highway Addressable Remote Transducer) by the HART organization, IPv6 over Low Rate Wireless Personal Network (6LoWPAN) by IETF (the Internet Engineering Task Force), Thread Wireless Technology (Thread Group), LoRaWAN by LoRa alliance, and ZigBee by the ZigBee alliance. The following is a list of the more common applications for wireless sensors and control networks:

TUT4-Cryptography in a Trusted Blockchain World: Promise, Practice, and Applications

Presenter: Rameez Asif, Blockpass Identity Lab, Edinburgh Napier University, UK

Abstract: Contracts, financial transactions, and the records associated with them are among the elucidating structures in our economic, legal, and political systems. These interactions are not limited to the individuals but to the nations, organizations and communities. As the technology landscape is expanding, it is vital to have a knowledge of what the core digital technologies have to offer, especially with respect to the data-encryption and communication. Blockchain promises to solve this problem. The technology at the heart of crypto-currencies, is an open, distributed ledger that can record transactions in a verifiable way. In a trusted Blockchain world, we can envision the records are embedded in a digital code and stored in transparent, shared databases, where they are protected from deletion, tampering, and revision. While cryptography is used to preserve privacy, economic incentives are used to encourage desired behaviour of network actors who do not trust or know each other, nor have any legally binding agreements with each other. In this tutorial, we first survey the state of the art, focusing on private Blockchain (in which parties are authenticated). Furthermore, we analyze both in-production and research systems in four dimensions: distributed ledger, cryptography, consensus protocol, and smart contract.