IoT On National Sovereignty Professor Dr Abdullah Gani Dean Faculty of Computer Science & Information Technology University of Malaya
National Sovereignty as of having supreme power or authority in government as possessed or claimed by a state or community to manage internal institutions or processes. This includes independent government possess in various economic environment world and institution settings. Kyle Bagwell and Robert W. Staiger, (2003). National Sovereignty in an Independent Government Possess in Various Economic Environment and Institution Setting. page 2,.
#IoT ConnectingEverything Any TIME connection Any PLACE connection Any THING connection On the move On the move Between PCs Outdoors and indoors Night Outdoors Indoors (away from the PC) Human to Human (H2H), not using a PC Human to Thing (H2T), using generic equipment Day time At the PC Thing to Thing (T2T)
Architecture of IoT 4 Layers Model for IoT Information Application Integrated Application Layer Information Processing Management Layer Information Transmission Network Construction Layer Information Generation Sense and Identification Layer
More on 4 Layers Model Integrated Application Smart Logistic Smart Grid Green Building Smart Transport Env. Monitor Information Processing Data Center Search Engine Smart Decision Info. Security Data Mining Network Construction WWAN WMAN Internet WPAN WLAN Sensing and Identification GPS Smart Device RFID Sensor Sensor
Illegal Human Migration Financial Sovereignty Human Trafficking National Sovereignty
Financial Sovereignty For example: Currency Ringette to US Dollar 214-2015
Human Trafficking The overwhelming majority of trafficking victims are among the two million documented and 1.9 million undocumented foreign workers in Malaysia from various countries including Indonesia, Nepal, India, Thailand, China, the Philippines, Burma, Cambodia, Bangladesh, Pakistan, and Vietnam. Many victims migrate willingly to Malaysia seeking employment opportunities in plantations, construction sites, textile factories, and as domestic workers but subsequently encounter forced labor or debt bondage at the hands of their employers, employment agents, or informal labor recruiters. While many of Malaysia s trafficking offenders are individual business people, large organized crime syndicates are also behind trafficking. A significant number of young foreign women are recruited for work in Malaysian restaurants and hotels, some of whom migrate through the use of Guest Relations Officer visas, but subsequently are coerced into Malaysia s commercial sex trade. The acquittal rate of alleged trafficking offenders was 68 percent during 2010, a rate attributed by observers to the lack of adequate victim-witness protection, victim assistance incentives, and poor judicial training on human trafficking.
Illegal Human Migration Irregular Foreigners by Citizenship (2012)
IoT in Financial Sovereignty Trading Decision- Massive Data Available To whom we should trade Remote Data Capturing Remote cheque deposit ATM, Credit/Debit Cards Sensing & decision making Trading and Illegal Goods Supply Illegal supplier Smart IoT Enabled Shopping Applications Fast shopping Geo-tracking Enabled Marketing Alerts
IoT in Human Trafficking Software Solutions That Take Inputs From A Vast Global Network of Mobile Sensors and The IoT Rapid Report and Response IoT Disperse information (GPS coordinates, pictures) to related authorities/ servers Report any incidence related to Human trafficking (mobile app) Photo recognition detection of frequent violators/suspects on the cloud Crowdsource Resources for Reporting if Conventional Communication Links Are Down Mobile Application Can Help in Three Dimensions Report, Awareness and Analyse Different stages of trafficking in human beings, recruitment, exploitation, escape, recovery, social reintegration A barcode scanning app can analyze the country/company of origin and trace HT/slavery statistics in database Trafficking Hotline Available Through Internet Report abductions
IoT in Illegal Human Migration Technologies Sea - Underwater sensors Land - Mine sensors - Human Movement Tracking
IoT Framework for National Sovereignty WSAN nodes National Security Adviser server RFID nodes GPS satellite Common Gateway for wireless sensors, RFID nodes, GPS satellite, Security Surveillance Cameras from various flashpoints & locations in the country Secure Centralized database Secure central internet Custom server Police server Surveillance IP camera (night vision enable) Navy server
Q & A Email: abdullah@um.edu.my http://mobcc.fsktm.um.edu.my