SlideShare a Scribd company logo
Sharing and Controlling the
Internet of Things (IoT)
Kasun De ZoysaKasun De Zoysa
score.ucsc.lk
University of Colombo School of Computing
Sri Lanka
Technological Components
Identification (“sensing”):
●
(passive, active) RFID tags
●
sensor networks
Communication:
●
interface object/network
●
embed the TCP/IP stack into the devices (TinyTCP, mIP)?
Integration:
●
object and service discovery
●
object and service cataloging
●
service composition
Intelligence and Collaboration:
Security and Privacy:
Identification
Ultimate goal: unique/universal Id for naming and addressing
individual objects
Naming is difficult!
●
DNS: Domain Name Service
●
ONS: Object Name Service,
●
basically, RFID tag/EPC code → URI of a description file
(Object Code Mapping Service-Direct Search (OCMS-DS)
Addressing is difficult!
stupid but tricky issue: RFID addresses are different from IPv6
addresses (64-96 bits vs 128 bits)
Addressing moving objects is even more difficult
Communication
From host2host to object2object
TCP is not adapted
designed for long-lasting connections while objects (like tags
or sensors) exchange small pieces of data => handshake +
congestion control/retransmit/recovery + flow control +
buffering procedures too complex
Very heterogeneous networks and traffic
Scalability?
Quality of service?
Communication Protocols
●
6LoWPAN
●
CoAP
●
UPnP
●
LWM2M
●
MQTT
●
HTTP/REST
●
Websockets
6LoWPAN
•
IPv6 over Low-Power wireless Area Networks
•
Defined by IETF standards (RFC 4919, 4944)
•
Stateless header compression
•
Enables a standard socket API
•
Minimal use of code and memory
•
Direct end-to-end Internet integration
•
Multiple topology options
CoAP
The Constrained Application Protocol (CoAP) is a
specialized web transfer protocol for use with constrained
nodes and constrained networks in the Internet of Things.
The protocol is designed for machine-to-machine (M2M)
applications such as smart energy and building
automation.
UpnP
Universal Plug and Play (UPnP) is a set of networking
protocols that permits networked devices, such as personal
computers, printers, Internet gateways, Wi-Fi access
points and mobile devices to seamlessly discover each
other's presence on the network and establish functional
network services for data sharing, communications, and
entertainment. UPnP is intended primarily for residential
networks without enterprise-class devices.
LWM2M
Lightweight M2M is a protocol from the Open Mobile
Alliance for M2M or IoT device management. Lightweight
M2M enabler defines the application layer communication
protocol between a LWM2M Server and a LWM2M Client,
which is located in a LWM2M Device.
MQTT
MQTT is a machine-to-machine (M2M)/"Internet of
Things" connectivity protocol. It was designed as an
extremely lightweight publish/subscribe messaging
transport. It is useful for connections with remote
locations where a small code footprint is required and/or
network bandwidth is at a premium.
REST
REST stands for Representational State Transfer. (It
is sometimes spelled "ReST".) It relies on a stateless,
client-server, cacheable communications protocol --
and in virtually all cases, the HTTP protocol is used.
REST is an architecture style for designing
networked applications.
WebSocket
WebSocketis a web technology providing full-duplex
communications channels over a single TCP connection
The WebSocket API is being standardized by the W3C, and
the WebSocket protocol has been standardized by the IETF as
RFC 6455.
WebSocket is designed to be implemented in web browsers
and web servers, but it can be used by any client or server
application.
Sharing and Controlling the IoT
Publish and Subscribe
Security and Privacy
IoT Security is Hard
Complex, distributed systems
●
Many languages, and networks
●
Specialized hardware
Just developing applications is hard
Securing them is even harder
●
Enormous attack surface
●
Reasoning across hardware, software, languages, devices, etc.
●
What are the threats and attack models?
Valuable data: personal, location, presence
• Rush to development + hard ➔ avoid, deal later
Security Protocols
Standard IT security solutions are the core security
mechanisms for most of these protocols which offer
security.
These security approaches are based on:
●
TLS
●
IPSec / VPN
●
SSH
●
SFTP
●
Encryption and decryption
●
DTLS (for UDP only security)
Data Security
What do IoT applications need to do?
●
Generate data samples
●
Process/filter these samples
●
Analytics on streams of data, combined with historical
data
●
Produce results for end applications to view
Goal: end-to-end security
●
Embedded devices generate encrypted data
●
Only end applications can fully decrypt and view data
●
Gateways and cloud operate on data without knowing
what it is
Homomorphic Encryption
Can we compute statistics on secrets?
●
You’re in the 85th percentile for saving water today!
●
Your house consumed 120% of its average energy
today
Can we securely compute complex analytics?
Need new cryptographic computation models
Sharing and Controlling the IoT
Sharing and Controlling the IoT
Sharing and Controlling the IoT
Sharing and Controlling the IoT
Sharing and Controlling the IoT
PubNub
Azure IoT Hub
AWS IoT Hub
Can we do better?
●
Keep data on IoT device and share it if necessary
●
Secure communication directly from each device
●
Secure computation on the trusted device
●
Can do that for small set of devices belong to a
person.
Claim: many IoT cloud computations can be done as
a distributed protocol among clients!
SenZ PlatformSenZ Platform
➢ Introduction of low cost devices such as Android mobile phones and
Raspberry-pi have made Internet of Things (IoT) a bit closer to life.
➢ We developed a social network like platform called SenZ
(www.mysensors.info) to share and control IoT.
➢ SenZ platform strengthens the protection of the user's privacy with
its cryptographic protocol and new Senz language.
➢ SenZ: Human to Machine (H2M) and M2M Protocol
Senze Language – Simple Example 1
The device D1 which belongs to Kasun says
SHARE #tp @kasun
SenZ delivers to the senze to Kasun as:
SHARE #tp @kasun #time <t1> ^D1 <Digital Signature>
Then Kasun sends a message
GET #tp @D1 FOR 5day SAMPLE 5s
The device receives the message and execute the Senze
GET #tp @D1 FOR 5day SAMPLE 5s #time <t2> ^kasun <Digital
Signature>
Then device D sends the data to Kasun for 5 days in very 5 seconds
DATA #tp 30 @kasun
So that Kasun receives
DATA #tp 30 #time <t2> ^DA <Digital Signature>
Senze Language – Simple Example 2
The Raspberry-pi device (rpi) belongs to kasun says
SHARE #gpio1 @kasun
Kasun receives the message:
SHARE #gpio1 @kasun #time <t1> ^rpi <Signature>
Then Kasun sends a message
PUT #gpio1 ON @rpi OR PUT #gpio1 OFF @kasun.rpi
The device receives the message
PUT #gpio1 ON #time <t2> ^kasun <Signature> OR
PUT #gpio1 OFF #time <t2> ^kasun <Signature>
It turns on/off the switch
The device sends the data
DATA #gpio1 ON @kasun OR DATA #gpio1 OFF @kasun
So that Kasun receives
DATA #gpio1 ON #time <t3> ^rpi <Signature> OR
DATA #gpio1 OFF #time <t3> ^rpi <Signature>
Senze Language – Simple Example 3
The Kasun would like to share his location with his wife (Shanika).
So Kasun's smart phone says:
SHARE #lat #lon @shanika
Shanika receives the message:
SHARE #lat #lan @kasun #time <t1> ^kasun <Signature>
Then Shanika sends a message
GET $lat $lon @kasun
The Kasun receives the message
GET $lat $lon @kasun $key <encrypted key> #time <t1> ^shanika <Signature>
The Kasun's smart phone sends the data
DATA $lat <encrypted data> $lon <encrypted data> @shanika
Shanika receives the data, decrypts it and displays on the map.
Human Elephant Conflict
Human Elephant Conflict
Infrasonic Localization
Smart Electric Fence
HomeZ: Smart Home Application
Rahasak: Social Network AppRahasak: Social Network App
(www.rahasak.com)(www.rahasak.com)
➢ Typical social network applications saves data at central
servers/clouds
➢ Users may not have the total control of their data.
➢ Therefore, present mobile applications with location sharing create
serious privacy issues.
➢ An application which use SenZ platform to securely share
secrets information such as location and camera among
friends.
➢ Can be installed in your android phone freely.
➢ Share your secrets only with people you trust.
➢ Even SenZ platform or anyone else cannot see it.
https://github.com/SenZProjects
www.mysensors.info

More Related Content

PDF
An introduction into ip networking
PPT
Design of a Virtual Private Network
DOCX
Profile_Prateek
PDF
Digital Certified Mail
PPTX
Digital Certified Mail (PPT)
PDF
VPN Theory
PPT
Vpn networks kami
PDF
VPN - Virtual Private Network
An introduction into ip networking
Design of a Virtual Private Network
Profile_Prateek
Digital Certified Mail
Digital Certified Mail (PPT)
VPN Theory
Vpn networks kami
VPN - Virtual Private Network

What's hot (20)

PPTX
Types of VPN
PPTX
Virtual Private Network (VPN)
PPT
Virtual Private Network main
PPTX
Virtual private network(vpn)
PPT
Vpn Virtual Private Network
PPTX
Virtual Private Network
PPT
Mobile IP 1
PDF
Payment Sockets - Interledger Community Group Presentation
PPTX
Vpn-Virtual Private Network
PPTX
Mpls based vpn connectivity
PPTX
VPN presentation
DOC
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
PPTX
Virtual private network
PPTX
Virtual Private Network- VPN
DOC
PPT
Vpn " Virtual Private Network "
PPTX
Mobile IP - pavankumar_912
PDF
Securing tesla broadcast protocol with diffie hellman key exchange
PDF
Implementation of a Virtual Private Network - VPN
Types of VPN
Virtual Private Network (VPN)
Virtual Private Network main
Virtual private network(vpn)
Vpn Virtual Private Network
Virtual Private Network
Mobile IP 1
Payment Sockets - Interledger Community Group Presentation
Vpn-Virtual Private Network
Mpls based vpn connectivity
VPN presentation
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
Virtual private network
Virtual Private Network- VPN
Vpn " Virtual Private Network "
Mobile IP - pavankumar_912
Securing tesla broadcast protocol with diffie hellman key exchange
Implementation of a Virtual Private Network - VPN
Ad

Viewers also liked (20)

PDF
Starting the DevOps Train
PDF
Open Networking Revolution
PPT
Presentación Xulia Definitiva
DOC
Kalek ko allah. mëranaw
PDF
Kim Johns Feature Story
PDF
the-mind-trust-daniels-peterson-event-6-11-15
DOCX
Curso de word
PPTX
Presentation
PPTX
Material multimedia guiomar varga y consuelo trujillo
PPT
Accidente mortal marsa 26 abril 2013
DOCX
Kelsi Pergram resume
DOC
Soneto xxiii comentario literario
PPTX
Teenagers' eating habits
PDF
Ejercicio para el curso básico de microsoft project
PPT
Autopresentación Xulia
PDF
Open Service Containers: a virtual machine hosting environment directly into ...
PDF
IPv6 - delegations, deployment and trends, SANOG 29
PPTX
The State of IPv6, PTC17
PPT
Agua y electrolitos
PPT
079 Network Programming
Starting the DevOps Train
Open Networking Revolution
Presentación Xulia Definitiva
Kalek ko allah. mëranaw
Kim Johns Feature Story
the-mind-trust-daniels-peterson-event-6-11-15
Curso de word
Presentation
Material multimedia guiomar varga y consuelo trujillo
Accidente mortal marsa 26 abril 2013
Kelsi Pergram resume
Soneto xxiii comentario literario
Teenagers' eating habits
Ejercicio para el curso básico de microsoft project
Autopresentación Xulia
Open Service Containers: a virtual machine hosting environment directly into ...
IPv6 - delegations, deployment and trends, SANOG 29
The State of IPv6, PTC17
Agua y electrolitos
079 Network Programming
Ad

Similar to Sharing and Controlling the IoT (20)

PPTX
Talk To Your Things
PDF
Notes e commerce
 
PDF
imp iot12334566777889900--oiiu8uy75r.pdf
PDF
COMP8045 - Project Report v.1.3
PDF
Physical Design of IoT.pdf
PDF
Internet of things
PDF
IoT Meets Security
PDF
Computer networks - CBSE New Syllabus (083) Class - XII
PDF
Fundamental components of the Internet of Things unit 1.pdf
PPTX
WebRTC Introduction & Basics
PPT
07 - TCP_IP and the DoD Model.ppt
PPT
Introduction-All 'bout IOT
PPT
IOT introduction
PPTX
Introduction to OSI and QUIC
PDF
Internet census 2012
PPTX
Internet of things
PPTX
BASIC TO ADVANCED NETWORKING TUTORIALS
PDF
A Survey: DDOS Attack on Internet of Things
Talk To Your Things
Notes e commerce
 
imp iot12334566777889900--oiiu8uy75r.pdf
COMP8045 - Project Report v.1.3
Physical Design of IoT.pdf
Internet of things
IoT Meets Security
Computer networks - CBSE New Syllabus (083) Class - XII
Fundamental components of the Internet of Things unit 1.pdf
WebRTC Introduction & Basics
07 - TCP_IP and the DoD Model.ppt
Introduction-All 'bout IOT
IOT introduction
Introduction to OSI and QUIC
Internet census 2012
Internet of things
BASIC TO ADVANCED NETWORKING TUTORIALS
A Survey: DDOS Attack on Internet of Things

More from APNIC (20)

PPTX
APNIC Report, presented at APAN 60 by Thy Boskovic
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
PDF
The Internet -By the Numbers, Sri Lanka Edition
PDF
Triggering QUIC, presented by Geoff Huston at IETF 123
PDF
DNSSEC Made Easy, presented at PHNOG 2025
PDF
BGP Security Best Practices that Matter, presented at PHNOG 2025
PDF
APNIC's Role in the Pacific Islands, presented at Pacific IGF 2205
PDF
IPv6 Deployment and Best Practices, presented by Makito Lay
PDF
Cleaning up your RPKI invalids, presented at PacNOG 35
PDF
The Internet - By the numbers, presented at npNOG 11
PDF
Transmission Control Protocol (TCP) and Starlink
PDF
DDoS in India, presented at INNOG 8 by Dave Phelan
PDF
Global Networking Trends, presented at the India ISP Conclave 2025
PDF
Make DDoS expensive for the threat actors
PDF
Fast Reroute in SR-MPLS, presented at bdNOG 19
PDF
DDos Mitigation Strategie, presented at bdNOG 19
PDF
ICP -2 Review – What It Is, and How to Participate and Provide Your Feedback
PDF
APNIC Update - Global Synergy among the RIRs: Connecting the Regions
PDF
Measuring Starlink Protocol Performance, presented at LACNIC 43
APNIC Report, presented at APAN 60 by Thy Boskovic
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
RPKI Status Update, presented by Makito Lay at IDNOG 10
The Internet -By the Numbers, Sri Lanka Edition
Triggering QUIC, presented by Geoff Huston at IETF 123
DNSSEC Made Easy, presented at PHNOG 2025
BGP Security Best Practices that Matter, presented at PHNOG 2025
APNIC's Role in the Pacific Islands, presented at Pacific IGF 2205
IPv6 Deployment and Best Practices, presented by Makito Lay
Cleaning up your RPKI invalids, presented at PacNOG 35
The Internet - By the numbers, presented at npNOG 11
Transmission Control Protocol (TCP) and Starlink
DDoS in India, presented at INNOG 8 by Dave Phelan
Global Networking Trends, presented at the India ISP Conclave 2025
Make DDoS expensive for the threat actors
Fast Reroute in SR-MPLS, presented at bdNOG 19
DDos Mitigation Strategie, presented at bdNOG 19
ICP -2 Review – What It Is, and How to Participate and Provide Your Feedback
APNIC Update - Global Synergy among the RIRs: Connecting the Regions
Measuring Starlink Protocol Performance, presented at LACNIC 43

Recently uploaded (20)

PDF
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
PPTX
newyork.pptxirantrafgshenepalchinachinane
PPTX
Power Point - Lesson 3_2.pptx grad school presentation
PPT
Ethics in Information System - Management Information System
DOC
Rose毕业证学历认证,利物浦约翰摩尔斯大学毕业证国外本科毕业证
PPTX
Digital Literacy And Online Safety on internet
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PPTX
presentation_pfe-universite-molay-seltan.pptx
PDF
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
DOCX
Unit-3 cyber security network security of internet system
PPTX
artificialintelligenceai1-copy-210604123353.pptx
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PPT
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
PPTX
Introduction to Information and Communication Technology
PPT
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
newyork.pptxirantrafgshenepalchinachinane
Power Point - Lesson 3_2.pptx grad school presentation
Ethics in Information System - Management Information System
Rose毕业证学历认证,利物浦约翰摩尔斯大学毕业证国外本科毕业证
Digital Literacy And Online Safety on internet
Tenda Login Guide: Access Your Router in 5 Easy Steps
Slides PPTX World Game (s) Eco Economic Epochs.pptx
presentation_pfe-universite-molay-seltan.pptx
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
Design_with_Watersergyerge45hrbgre4top (1).ppt
Unit-3 cyber security network security of internet system
artificialintelligenceai1-copy-210604123353.pptx
INTERNET------BASICS-------UPDATED PPT PRESENTATION
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
Job_Card_System_Styled_lorem_ipsum_.pptx
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
Introduction to Information and Communication Technology
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt

Sharing and Controlling the IoT

  • 1. Sharing and Controlling the Internet of Things (IoT) Kasun De ZoysaKasun De Zoysa score.ucsc.lk University of Colombo School of Computing Sri Lanka
  • 2. Technological Components Identification (“sensing”): ● (passive, active) RFID tags ● sensor networks Communication: ● interface object/network ● embed the TCP/IP stack into the devices (TinyTCP, mIP)? Integration: ● object and service discovery ● object and service cataloging ● service composition Intelligence and Collaboration: Security and Privacy:
  • 3. Identification Ultimate goal: unique/universal Id for naming and addressing individual objects Naming is difficult! ● DNS: Domain Name Service ● ONS: Object Name Service, ● basically, RFID tag/EPC code → URI of a description file (Object Code Mapping Service-Direct Search (OCMS-DS) Addressing is difficult! stupid but tricky issue: RFID addresses are different from IPv6 addresses (64-96 bits vs 128 bits) Addressing moving objects is even more difficult
  • 4. Communication From host2host to object2object TCP is not adapted designed for long-lasting connections while objects (like tags or sensors) exchange small pieces of data => handshake + congestion control/retransmit/recovery + flow control + buffering procedures too complex Very heterogeneous networks and traffic Scalability? Quality of service?
  • 6. 6LoWPAN • IPv6 over Low-Power wireless Area Networks • Defined by IETF standards (RFC 4919, 4944) • Stateless header compression • Enables a standard socket API • Minimal use of code and memory • Direct end-to-end Internet integration • Multiple topology options
  • 7. CoAP The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained networks in the Internet of Things. The protocol is designed for machine-to-machine (M2M) applications such as smart energy and building automation.
  • 8. UpnP Universal Plug and Play (UPnP) is a set of networking protocols that permits networked devices, such as personal computers, printers, Internet gateways, Wi-Fi access points and mobile devices to seamlessly discover each other's presence on the network and establish functional network services for data sharing, communications, and entertainment. UPnP is intended primarily for residential networks without enterprise-class devices.
  • 9. LWM2M Lightweight M2M is a protocol from the Open Mobile Alliance for M2M or IoT device management. Lightweight M2M enabler defines the application layer communication protocol between a LWM2M Server and a LWM2M Client, which is located in a LWM2M Device.
  • 10. MQTT MQTT is a machine-to-machine (M2M)/"Internet of Things" connectivity protocol. It was designed as an extremely lightweight publish/subscribe messaging transport. It is useful for connections with remote locations where a small code footprint is required and/or network bandwidth is at a premium.
  • 11. REST REST stands for Representational State Transfer. (It is sometimes spelled "ReST".) It relies on a stateless, client-server, cacheable communications protocol -- and in virtually all cases, the HTTP protocol is used. REST is an architecture style for designing networked applications.
  • 12. WebSocket WebSocketis a web technology providing full-duplex communications channels over a single TCP connection The WebSocket API is being standardized by the W3C, and the WebSocket protocol has been standardized by the IETF as RFC 6455. WebSocket is designed to be implemented in web browsers and web servers, but it can be used by any client or server application.
  • 16. IoT Security is Hard Complex, distributed systems ● Many languages, and networks ● Specialized hardware Just developing applications is hard Securing them is even harder ● Enormous attack surface ● Reasoning across hardware, software, languages, devices, etc. ● What are the threats and attack models? Valuable data: personal, location, presence • Rush to development + hard ➔ avoid, deal later
  • 17. Security Protocols Standard IT security solutions are the core security mechanisms for most of these protocols which offer security. These security approaches are based on: ● TLS ● IPSec / VPN ● SSH ● SFTP ● Encryption and decryption ● DTLS (for UDP only security)
  • 18. Data Security What do IoT applications need to do? ● Generate data samples ● Process/filter these samples ● Analytics on streams of data, combined with historical data ● Produce results for end applications to view Goal: end-to-end security ● Embedded devices generate encrypted data ● Only end applications can fully decrypt and view data ● Gateways and cloud operate on data without knowing what it is
  • 19. Homomorphic Encryption Can we compute statistics on secrets? ● You’re in the 85th percentile for saving water today! ● Your house consumed 120% of its average energy today Can we securely compute complex analytics? Need new cryptographic computation models
  • 28. Can we do better? ● Keep data on IoT device and share it if necessary ● Secure communication directly from each device ● Secure computation on the trusted device ● Can do that for small set of devices belong to a person. Claim: many IoT cloud computations can be done as a distributed protocol among clients!
  • 29. SenZ PlatformSenZ Platform ➢ Introduction of low cost devices such as Android mobile phones and Raspberry-pi have made Internet of Things (IoT) a bit closer to life. ➢ We developed a social network like platform called SenZ (www.mysensors.info) to share and control IoT. ➢ SenZ platform strengthens the protection of the user's privacy with its cryptographic protocol and new Senz language. ➢ SenZ: Human to Machine (H2M) and M2M Protocol
  • 30. Senze Language – Simple Example 1 The device D1 which belongs to Kasun says SHARE #tp @kasun SenZ delivers to the senze to Kasun as: SHARE #tp @kasun #time <t1> ^D1 <Digital Signature> Then Kasun sends a message GET #tp @D1 FOR 5day SAMPLE 5s The device receives the message and execute the Senze GET #tp @D1 FOR 5day SAMPLE 5s #time <t2> ^kasun <Digital Signature> Then device D sends the data to Kasun for 5 days in very 5 seconds DATA #tp 30 @kasun So that Kasun receives DATA #tp 30 #time <t2> ^DA <Digital Signature>
  • 31. Senze Language – Simple Example 2 The Raspberry-pi device (rpi) belongs to kasun says SHARE #gpio1 @kasun Kasun receives the message: SHARE #gpio1 @kasun #time <t1> ^rpi <Signature> Then Kasun sends a message PUT #gpio1 ON @rpi OR PUT #gpio1 OFF @kasun.rpi The device receives the message PUT #gpio1 ON #time <t2> ^kasun <Signature> OR PUT #gpio1 OFF #time <t2> ^kasun <Signature> It turns on/off the switch The device sends the data DATA #gpio1 ON @kasun OR DATA #gpio1 OFF @kasun So that Kasun receives DATA #gpio1 ON #time <t3> ^rpi <Signature> OR DATA #gpio1 OFF #time <t3> ^rpi <Signature>
  • 32. Senze Language – Simple Example 3 The Kasun would like to share his location with his wife (Shanika). So Kasun's smart phone says: SHARE #lat #lon @shanika Shanika receives the message: SHARE #lat #lan @kasun #time <t1> ^kasun <Signature> Then Shanika sends a message GET $lat $lon @kasun The Kasun receives the message GET $lat $lon @kasun $key <encrypted key> #time <t1> ^shanika <Signature> The Kasun's smart phone sends the data DATA $lat <encrypted data> $lon <encrypted data> @shanika Shanika receives the data, decrypts it and displays on the map.
  • 34. Human Elephant Conflict Infrasonic Localization Smart Electric Fence
  • 35. HomeZ: Smart Home Application
  • 36. Rahasak: Social Network AppRahasak: Social Network App (www.rahasak.com)(www.rahasak.com) ➢ Typical social network applications saves data at central servers/clouds ➢ Users may not have the total control of their data. ➢ Therefore, present mobile applications with location sharing create serious privacy issues. ➢ An application which use SenZ platform to securely share secrets information such as location and camera among friends. ➢ Can be installed in your android phone freely. ➢ Share your secrets only with people you trust. ➢ Even SenZ platform or anyone else cannot see it.