California Cyberhub Support Portal

Internet of Things: Roadmap to a Connected World

By 2020, there will be 50 billion devices connected to the Internet. How will you and your organization capitalize on this tremendous opportunity? Join this new evolution in hardware, software, and data by registering for this six-week online offering.

While the promise of the Internet of Things (IoT) brings many new business prospects, it also presents significant challenges ranging from technology architectural choices to security concerns. MIT Professional Education’s... See More

What you'll learn

Discover key IoT concepts including identification, sensors, localization, wireless protocols, data storage and security; Explore IoT technologies, architectures, standards, and regulation

Explore IoT technologies, architectures, standards, and regulation

Realize the value created by collecting, communicating, coordinating, and leveraging the data from connected devices

Examine technological developments that will likely shape the industrial landscape in the future

Understand how to develop and implement your own IoT technologies, solutions, and applications

Cost: $450.00

Course Outline

Module 1:

Section A: Architectures

Introduction: What is IoT and the connected world?Case study on RFIDArchitecture of IoTSecurity issuesOpportunities for IoT

Section B: The Web of Things

Linked data – value is greatest when linkedEnterprise data – shared vs. public vs. privateImportance of security, privacy, and authenticityIndustry standardsWeb of Things layer as the driver for IoT systems

Section C: Lessons from the Internet

Is the Internet the right technology to hook together a network of things?The key lessons that our experience with the Internet teaches us about a future of thingsA focus on network management, security, mobility and longevityThe desirable features of a distributed architecture for a system of things

Module 2: Technologies

Section A: Wireless protocols

One size does not fit all: why are there dozens of connectivity options?Three key dimensions: application duty cycle and data rate, battery consumption, and communication rangeThree case studies: low-power design (Bluetooth Low Energy), range extension techniques (data mining and mesh networking), and data-intensive IoT for continuous recognition applicationsPredictions for the next few years

Section B: Data storage and analysis

Managing high rate sensor dataProcessing data streamsData consistency in an intermittently connected or disconnected environmentIdentifying outliers and anomalies

Section C: Localization

Localization algorithmsIndoor localizationLocalization for mobile systemsApplications

Section D: Security in IOT

Why is security for IoT so hard?Threat modelsDefensive strategies and examples

Section E: HCI and IoT World

Theory and applications of spoken dialogue for human-computer interactionCombining speech with other modalities for natural interactionConsiderations for multilingual interactionsParalinguistic information from speech for enhanced HCIFuture challenges for ubiquitous speech interfaces

Section F: Robotics and Autonomous Vehicles

Potential benefits of self-driving vehicles and service robotsSensing and data processingSimultaneous mapping and localizationLevels of autonomyFuture research challenges

Module 3: Applications

Section A: Smart Buildings

Emerging descriptive data standards for IoT and sensorsImmersive visualization of diverse sensor data using game enginesWearable sensing for IoT featuring new ways to control and interact with your environmentSensors and paradigms for seamless interaction with the built environmentSmart tools for IoTSmart, sensate materials

Section B: Wireless Technologies for Indoor Localization, Smart Homes, and Smart Health

Smart healthHome automationLocation tracking

Section C: Smart Cities

The city as a cyber physical systemPrinciples of cybernetics such as sensing and actuatingCollection of information including opportunistic sensing, crowd sensing, and ad hoc sensingResponse of the system including analytics and optimization, distributed action, people as intelligent actuatorsPrice of anarchyHacking the city: the risk for cyberattacks in centralized and distributed systemsSmart city equals smart citizens

Conclusion: Roadmap of the Internet of Things (IoT)

Utilizing sensors to gain greater visibility and real-time situational awarenessWays to act on the information collected, thereby controlling the real worldFormulating an architecture that enables a macro picture of systems, an accessible design paradigm, and a set of interfaces which can be standardizedA security paradigm, which considers setup, maintenance, and updatingVertical applications that provide a clear business case and a pressing opportunityEmerging technologies to address IoT challenges

MULTIPLE MIT PROFESSORS

EMAIL ENROLLMENT

ENROLLMENT FORM

Did you find it helpful? Yes No

Send feedback
Sorry we couldn't be helpful. Help us improve this article with your feedback.