0% found this document useful (0 votes)
228 views19 pages

1.definition and Characteristics of Iot

The document defines IoT and describes its key characteristics, architectural overview, protocols, and logical design. Specifically: 1. IoT is a global network of devices with sensors that can communicate and exchange data over standard protocols. Devices are self-configuring and have unique identities. 2. The architectural overview describes the "things" or devices that make up IoT, as well as common protocols used at each layer including link, network, transport, and application. 3. The logical design abstractly represents the entities and processes in an IoT system including devices, communication systems, services, management functions, security, applications, and communication models like request-response.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
228 views19 pages

1.definition and Characteristics of Iot

The document defines IoT and describes its key characteristics, architectural overview, protocols, and logical design. Specifically: 1. IoT is a global network of devices with sensors that can communicate and exchange data over standard protocols. Devices are self-configuring and have unique identities. 2. The architectural overview describes the "things" or devices that make up IoT, as well as common protocols used at each layer including link, network, transport, and application. 3. The logical design abstractly represents the entities and processes in an IoT system including devices, communication systems, services, management functions, security, applications, and communication models like request-response.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 19

1.

Definition and characteristics of IoT:

Definition

A dynamic global network infrastructure with self – configuring based on standard and interoperable
communication protocols where physical and virtual “things” have identified, physical attributes, and
virtual personalities and use intelligent interfaces, often communicate data associated with users and
their environment

characteristics of IoT

 Dynamic and self-Adapting: Dynamic and self-Adapting: IoT devices and systems may have the
capability to dynamically adapt with the changing contexts and take actions based on their operating
condition.Ex: Surveillance cameras can adapt their modes based on whether it is day or night.

 Self – Configuring: IoT devices may have self-Configuring capability allowing a large number of
devices to work together to provide certain functionality . Ex: weather monitoring.

 Interoperable communication protocols: IoT Devices may support a number of interoperable


communication protocols and can communicate with other devices and also with the infrastructure. 
Unique Identity: Each IoT devices has a unique identity and a unique identifier.IPaddress, URI).IoT
systems may have intelligent interfaces which adapt based on the context, allow communication with
users and the environment contexts.

 Integrated into information network: IoT devices are usually integrated into the information
network that allows them to communicate and exchange data with other devices and systems.

2.Architectural Overview

Things of IoT

The “Things” in IoT usually refers to IoT devices which have unique identities and can perform
remote sensing, Actuating and monitoring capabilities.

An IoT device may consist of several interfaces connections to other devices, both wired and wireless.
These include I)IoT interfaces for sensors II) interfaces for internet connectivity III) memory and
storage interfaces IV) audio video interfaces.

IoT Protocol

Link Layer: Link Layer protocols determine how the data is physically sent over the networks
physical layer or medium(example copper wire, electrical cable, or radio wave).

802.3 Ethernet: 802.3 is a collections of wired Ethernet standards for the link layer.

802.1- WI-FI: IEEE 802.3 is a collections of wireless Local area network.(WLAN) communication
standards, including extensive descriptions of the link layer.

802.16 wiMAX: IEEE 802.16 is a collection of wirless broadband and Standards, including extensive
descriptions for the link layer also called WiMAX wimax standard provides a data rates from from 1.5
Mb/s to 1Gb/s the recent update provides data rates of hundred megabits per second for mobile station
802.15.4 LR-WPAN: IEEE 802.1 5.4 is a collections of standard for low rate wireless personal area
network(LRWPAN).These standard form the basis of specifications for high level communication
Zigbee. LR-WPAN standards provide data rates from 40 k b/ s. These standards provide low cost and
low speed Communications for power constrained devices.

2G / 3G / 4G mobile communications: These are the different generations of mobile communication


standards including second generation (2G including GSM and CDMA). 3rd Generation (3G
including UMTS and CDMA2000) and 4th generation 4G including LTE.

Network / internet layer : The network layer are responsible for sending of IP datagrams from the
source network to the destination network. This layer Performs the host addressing and packet
routing.

IPV4: Internet protocol versions for open parents close (IPV4) is there most deployed internet
protocol that is used to identify the device is on a network using a hierarchy latest schemes. It uses 32
bit addresses scheme that allows total of 2 32 address. As more and more devices got connected to the
internet. The Ipv4 has succeeded by IPv6. IPv6: It is the newest versions of internet protocol and
successor to IPv4.

IPv6 uses 128 bit address schemes that are lost total of 2 128 are 3.4* 10 38 address.

6LoWPAN: IPv6 over low power wireless personal area networks brings IP protocol to the low power
device which have limited processing capability it operate in the 2.4 GHz frequency range and
provide the data transfer rate off to 50 kb/s.

Transport layer : The Transport layer protocols provides end-to-end message transfer capability
independent of the underlying network.

TCP: Transmission control protocol is the most widely used to transport layer protocol that is used by
the web browsers along with HTTP , HTTPS application layer protocols email program (SMTP
application layer protocol) and file transfer protocol. TCP is a connection Oriented and stateful
protocol while IP protocol deals with sending packets, TCP ensures reliable transmissions of packets
in order.

UDP: unlike TCP, which requires carrying out an initial setup procedure, UDP is a connection less
protocol. UDP is useful for time sensitive application they have very small data units to exchange and
do not want the overhead of connection setup. UDP is a transactions oriented and stateless protocol.

Application layer : Application layer protocol define how the application interfaces with the lower
layer protocols to send the data over the network.

Http: Hypertext transfer protocol is the application layer protocol that forms the foundations of world
wide web http includes, ,commands such as GET, PUT, POST, DELETE, HEAD, TRACE,
OPTIONS etc. The protocol follows a requestresponse model where are client sends request to server
using the http, commands. Http is a stateless protocol and each http request is independent father
request and http client can be a browser or an application running on the client example and
application running on an IoT device ,mobile mobile applications or other software.

CoAP: Constrained application protocol is an application layer protocol for machine to machine
application M2M meant for constrained environment with constrained devices and constrained
networks. Like http CoAP is a web transfer protocol and uses a request- response model, however it
runs on the top of the UDP instead of TC CoAP uses a client –server architecture where client
communicate with server using connectionless datagrams.It is designed to easily interface with http
like http,CoAP supports method such as GET, PUT, DELETE .

Websocket:Websocket protocol allows full duplex communication over a single socket connections
for sending message between client and server. Websocket is based on TCP and Allows streams of
messages to be sent back and forth between the client and server while keeping the TCP connection
open. The client can be a browser, a mobile application and IoT device

MQTT :Message Queue Telemetry Transport it is a lightweight message protocol based on public -
subscribe model MQTT uses a client server Architecture by the clients such as an IoT device connect
to the server also called the MQTT broker and publishers message to topic on the server. The broker
forward the message to the clients subscribed to topic MQTT is well suited for constrained and
environments.

XMPP: Extensible Messaging and Presence Protocol it is a protocol for real-time communication and
streaming XML data between network entities XMPP powers wide range of applications including
messaging, presence, data syndication, gaming multiparty chat and voice / voice calls. XMPP Allows
sending small chunks of XML data from one network entity to another in real time. XMPP supports
both client to server and server –client communication path.

DDS: Data distribution service is the date centric middleware standard for deviceto-device machine to
machine communication DDS uses a publish subscribe model where publisher example device that
generate data create topics to which subscribers per can subscribe publisher is an object responsible
for data distributions and the subscriber responsible for receiving published data. DDS provide quality
of service (QoS) control and configurable reliability

AMQP: Advanced Message Queuing protocols. it is an open application layer protocol for business
messaging. AMQP support point to point and publish - subscribe model routing and queuing. AMQP
broker receive message from publishers example devices or applications that generate data and about
them over connections to consumers publishers publish the message to exchange which then distribute
message copies to queues.

Logical design of IoT

Logical design of an IoT system refers to an abstract representation of the entities and process without
going into low level specification of the implementations .

IoT functional block

The function blocks are described as follows

Devices: An IoT system comprises of the devices that provide sensing, actuation, monitoring and
control function Communication: communication block handle the communication systems

Services : An IoT system uses various types of IoT services such as services for device
monitoring ,device control services ,data publishing services and services for device Discovery.

Management: Functional blocks provide various functions to govern the IoT system

Security: Security functional block security IoT system and by providing functions such as
application authorization message and content integrity and data security.
Application: IoT application provides and interface that the user can used to control and monitor
various aspects of the IoT system. Application also allow users to view the system status and view or
analyze the processed to data.

IoT communication model

Request response: Request-response is a Communications model in which the client sends request to
the server and the server responds to the requests. when the server receives a request it decides how to
respond, if it shows the data retrieved resources definitions for the response , and then send the
response to the client. Access to response model is a stateless communication model and each request
response per is independent of others the crime and server interactions in the request response model.

Publish - Subscribe: Respect is a communication model that involve Publishers brokers and
consumers. Publishers are the source of data. Publishers send the data to the topics which is managed
by the broker. Publishers are not aware of the consumer. Consumers Subscribe to the topic which are
managed by the broker. When the broker receives the data for a topic from the publisher, it send the
data to all the subscribed consumers.

Push pull: Push pull is communication model in which the data producers push the data to queues and
the consumers pull the data from the queues. Producers do not need to be aware of the consumer.
Queues help in decoupling the messaging between the Producers and Consumers .

Exclusive pair: Exclusive pair is a bi directional, fully duplex communication model that uses a
persistent connections between the client and the server. once the condition is setup it remains open
until the client sends a request to close the connection. client and server can send messages to each
other after connection setup. Exclusive pair is a stateful Communications model and the server is
aware of all the open connections.

IoT communication APIs

REST- based communication API:

 Client server: The principle behind the client-server conference separations of concerns for example
client should not be concerned with the storage of data which is their concern of the server. Similarly
the server should not be concerned about the user interface which is a concern of the client. separation
allows client and server to be independently deployed and updated.

 Stateless: Each request from client to server must contain all the information necessary to
understand the request , and cannot take advantage of any stored context on the server .

 Catchable: Catch constrain requires that the data within the response to a request be implicitly or
explicitly labeled as catchable or non-catchable. Then a client cache is given the right to reuse that
response data for later, equivalent requests. completely eliminate some attractions and improve
efficiency and scalability.

 Layered system: System constraint come off constraints, constrains the behavior of components
such that each component cannot see beyond the immediate layer with which they are interacting.

 Uniform interface: Uniform interface constraints requires that the method of communication
between client and server must be uniform. Resources are identified in the request and separate from
the representation of the resource that are returned to the client. When climbing holds a representation
of your resource it has all the information required to update or delete the resource  Code on
demand : Service can provide executable code script for clients to execute in their context.

WebSocket based communication API:

WebSocket API allow bi directional, full duplex communication between client and server. Unlike
request-response API allow full duplex communication and do not require new connection to be set
up for each message to be sent. Websocket communication begins with connection setup request send
by the client to the server. The request is sent over http and the server interprets it as an upgrade
request. If the server support protocol response to the website handshake response after the connection
setup the client and the server can send data or messages to each other in full duplex model.
WebSocket API reduce network traffic and latency as there is no overhead for connection setup and
determination records to each message.

3.Design principles and needed capabilities

Focus on value: (we will get proper value and qulity)

In the world of IoT, user research and service design are more crucial than ever. While early adopters
are eager to try out new technology, many others are reluctant to take new technology into use and
cautious about using it, due to not feeling confident with it. 

Take a holistic view: ( broder approach)

IoT solutions typically consist of multiple devices with different capabilities and both physical and
digital touchpoints. The solution may also be provided in co-operation with multiple different service
providers. It is not enough to design one of the touchpoints well, instead you need to take a holistic
look across the whole system, the role of each device and service, and the conceptual model of how
user understands and perceives the system. 

Put safty first:

While transferring information we have to takecare of data from leakage and we have to transfer safly.

As the IoT solutions are placed in the real world context, the consequences can be serious, when
something goes wrong. At the same time the users of the IoT solutions may be vary of using new
technology, so building trust should be one of your main design drivers. 

Cosider the context:

While designing principles we have to work in that context means we will not go out of context.

IoT solutions exist at the crossroads of the physical and digital worlds. Commands given through
digital interfaces may produce real world effects, but unlike digital commands, the actions happening
in the real-world cannot necessarily be undone.

Build a strong brand:

If all features are good then it will come up with good brand.

Due to the real world context of the IoT solutions, regardless of how carefully you design things and
aim to build trust, something unexpected will happen at some point and your solution is somehow
going to fail. 
Test prototype early and often:

New updates and features we have to check and take.

Typically HW and SW have quite different lifespans, but as successful IoT solution needs both the
HW and SW elements, the lifespans should be aligned.

Use data responsibly:

With securely and without misuse of data.

IoT solutions can easily generate tons of data. However, the idea is not to hoard as much data as
possible, but instead to identify the data points that are needed to make the solution functional and
useful .

4.IoT Applications

1. Smart Homes
One of the best and the most practical applications of IoT, smart homes really take both, convenience
and home security, to the next level. Though there are different levels at which IoT is applied for
smart homes, the best is the one that blends intelligent utility systems and entertainment together. For
instance, your electricity meter with an IoT device giving you insights into your everyday water
usage, your set-top box that allows you to record shows from remote, Automatic Illumination
Systems, 

2. Smart City
Not just internet access to people in a city but to the devices in it as well – that’s what smart cities are
supposed to be made of. And we can proudly say that we’re going towards realizing this dream.
Efforts are being made to incorporate connected technology into infrastructural requirements and
some vital concerns like Traffic Management, Waste Management, Water Distribution, Electricity
Management, and more. All these work towards eliminating some day-to-day challenges faced by
people and bring in added convenience.

3. Self-driven Cars
We’ve seen a lot about self-driven cars. Google tried it out, Tesla tested it, and even Uber came up
with a version of self-driven cars that it later shelved. Since it’s human lives on the roads that we’re
dealing with, we need to ensure the technology has all that it takes to ensure better safety for the
passenger and those on the roads.

4. IoT Retail Shops


If you haven’t already seen the video of Amazon Go – the concept store from the eCommerce giant,
you should check it out right away. Perhaps this is the best use of the technology in bridging the gap
between an online store and a retail store. The retail store allows you to go cashless by deducting
money from your Amazon wallet. It also adds items to your cart in real-time when you pick products
from the shelves.

If you change your mind and pick up another article, the previous one gets deleted and replaces your
cart with the new item. The best part of the concept store is that there is no cashier to bill your
products. You don’t have to stand in line but just step out after you pick up your products from
shelves.

5. Farming
Farming is one sector that will benefit the most from the Internet of Things. With so many
developments happening on tools farmers can use for agriculture, the future is sure promising. Tools
are being developed for Drip Irrigation, understanding crop patterns, Water Distribution, drones for
Farm Surveillance, and more.

6. Wearables
Wearables remain a hot topic in the market, even today. These devices serve a wide range of purposes
ranging from medical, wellness to fitness. Of all the IoT startups, Jawbone, a wearables maker, is
second to none in terms of funding.

7. Smart Grids
One of the many useful IoT examples, a smart grid, is a holistic solution that applies an extensive
range of Information Technology resources that enable existing and new gridlines to reduce electricity
waste and cost. A future smart grid improves the efficiency, reliability, and economics of electricity.

8. Industrial Internet
The Industrial Internet of Things consists of interconnected sensors, instruments, and other devices
connected with computers’ industrial applications like manufacturing, energy management, etc.

9. Telehealth
 Telehealth, or Telemedicine, hasn’t completely flourished yet. Nonetheless, it has great future
potential. IoT Examples of Telemedicine include the digital communication of Medical Imaging,
Remote Medical Diagnosis & Evaluations, Video Consultations with Specialists, etc.
10. Smart Supply-chain Management
Supply-chains have stuck around in the market for a while now. A common example can be Solutions
for tracking goods while they are on the road. Backed with IoT technology, they are sure to stay in the
market for the long run.

5.Basics of Networking

An IoT network refers to a collection of interconnected devices that communicate with other devices
without the need for human involvement, such as autonomous cars, smart appliances, and wearable
tech.

The network infrastructures most associated with IoT networks are 4G LTE and 5G which are built to
support the resource demands of the IoT.

IoT Networks: 5G
IoT is a central use case of 5G infrastructure. This is because the current mobile networks are already
struggling to keep up with the resource demands of the exploding IoT device market.

All three major usage scenarios for 5G networks as described by the International Telecommunication


Union (ITU) support IoT devices to some extent: enhanced mobile broadband (eMBB), massive
machine-type communications (mMTC), and ultra-reliable and low-latency communications
(URLLC).

IoT Networks: 4G LTE:

The internet of things is not waiting patiently for 5G networks to mature. According to Cisco, IoT
devices have been around since between 2008 and 2009, long before 5G network development. For
machine to machine (M2M) connections, LTE networks use the Cat-M1 chipset. M2M connections
are the basis of mMTC.

NB-IoT improves device power consumption, the capacity of the network system, and how efficiently
the available spectrum is used.

6.M2M

Machine-to-machine communication, or M2M, is exactly as it sounds: two machines


“communicating,” or exchanging data, without human interfacing or interaction. This includes serial
connection, powerline connection (PLC), or wireless communications in the industrial Internet of
Things (IoT). Switching over to wireless has made M2M communication much easier and enabled
more applications to be connected.

whereas M2M can refer to any two machines—wired or wireless—communicating with one another.

The range of connected devices includes anything from vending machines to medical equipment to
vehicles to buildings. Virtually anything that houses sensor or control technology can be connected to
some sort of wireless network.
This process allows a human (or an intelligent control unit) to assess what is going on across the
whole network and issue appropriate instructions to member devices.

M2M Applications

1. MANUFACTURING

2. HOME APPLIANCES

3. HEALTHCARE DEVICE MANAGEMENT

4. SMART UTILITY MANAGEMENT

7.IoT Technology Fundamentals-

Devices and gateways:

Anything that has a sensor attached to it and can transmit data from one object to another or to people
with the help of internet is known as data.
IoT devices include wireless sensors, software, actuators, and computer devices. They are attached to
a particular object that operates through the internet, enabling the transfer of data among objects or
people automatically without human intervention.
For example, IoT systems in your car identifies the traffic ahead and automatically sends out
messages to the person you are about to meet of your impending delay. Even a pacemakers can be an
IoT device that seamlessly communicates with other machines for a greater ease of life and
convenience.
Gateway provides bridge between different communication technologies which means we can say
that a Gateway acts as a medium to open up connection between cloud and controller(sensors /
devices) in Internet of Things (IoT) . By the help of gateways it is possible to establish device to
device or device to cloud communication. A gateway can be a typical hardware device or software
program.

Key functionalities of IoT Gateway :


 Establishing communication bridge
 Provides additional security.
 Performs data aggregation.
 Pre processing and filtering of data.
 Provides local storage as a cache/ buffer.
 Data computing at edge level.
 Ability to manage entire device.
 Device diagnostics.
 Adding more functional capability.
 Verifying protocols.
Working of IoT Gateway :
1. Receives data from sensor network.
2. Performs Pre processing, filtering and cleaning on unfiltered data.
3. Transports into standard protocols for communication.
4. Sends data to cloud.

8.Data management, Business processes in IoT,

Data management:

The Internet of Things (IoT) device management enables users to track, monitor and manage the
devices to ensure these work properly and securely after deployment. Billions of sensors interact with
people, homes, cities, farms, factories, workplaces, vehicles, wearables and medical devices, and
beyond. The Internet of Things (IoT) is changing our lives from managing home appliances to
vehicles.

Data management is the process of taking the overall available data and refining it down to important
information. Different devices from different applications send large volumes and varieties of
information. Managing all this IoT data means developing and executing architectures, policies,
practices and procedures that can meet the full data lifecycle needs.

Things are controlled by smart devices to automate tasks, so we can save our time. Intelligent things
can collect, transmit and understand information, but a tool will be required to aggregate data and
draw out inferences, trends and patterns.

Business processes

A business process is a series of repeatable steps designed to achieve a goal. Repetition is the key
aspect of business processes. They should be performed regularly and done in a similar way each
time. Some examples of business processes are:

 New employee onboarding


 Code release
 Handling a customer complaint
 Product assembly
 Finance application

Business Process Management Life Cycle

The six phases are:

1. Analyze
2. Design
3. Model
4. Implement
5. Monitor and Control
6. Refine and Improve

Analyze

analyse each business process for its effectiveness and optimization. Start by ensuring that the process
is aligned with the goals and objectives of the organization. Then you can take a closer look at each
step in the process to see what is working and what isn’t.

Design

identified some opportunities for improvement you can begin to develop some ideas for how to
improve and optimize the process. This could be as complicated as implementing automation to
remove a manual step, or it could be as simple as removing a redundant step.

Model

now put your designs in to action or simulate how the changes would impact the process and the
entire organization. Modelling techniques can vary depending on the process that is being refined.
However, running test-cases and prototypes are good ways to see how the proposed changes perform.

Implement

Once the modelling has proven that the proposed changes have a positive impact on the process and
the organization at large, it’s time to implement your modifications.

Monitor and Control

Once your process has been implemented you will need to monitor and control it to ensure that it is
working properly.

Refine and Improve

Once your implementation has been completed successfully it’s time to start from the beginning
again. A key part of BPM is to constantly look for ways to improve. Businesses stagnate when they
stand still, and properly executed BPM pushes organizations towards new horizons.
9.Everything as a Service(XaaS)

An extensive number of modern digital services, products and tools are ordered over the Internet and
delivered to users on demand, rather than provided via local channels within enterprises or specialized
organizations.

some practical -aaS cases (apart from SaaS, PaaS and IaaS) that are gaining popularity.

Everything-as-a-Service (XaaS): Definition and Examples

An extensive number of modern digital services, products and tools are ordered over the Internet and
delivered to users on demand, rather than provided via local channels within enterprises or specialized
organizations. To describe this phenomenon, a special term was invented: Everything-as-a-Service
(XaaS). What is Everything-as-a-Service and does it have anything to do with popular  cloud
computing models — SaaS, PaaS and IaaS? Read our article for an explanation.

What Is XaaS?

Everything-as-a-Service is a term for services and applications that users can access on the Internet
upon request.

The Everything-as-a-Service definition may seem unclear at first sight, but actually, it is not difficult
to understand. It all started with the cloud computing terms: SaaS (Software-as-a-
Service), PaaS (Platform-as-a-Service) and IaaS (Infrastructure-as-a-Service), meaning that ready-
made software, a platform for its development, or a comprehensive computing infrastructure could be
provided via networks. Gradually, other offerings appeared and now, the designation as-a-Service is
associated with various digital components, e.g. data, security, communication, etc.

What’s more, Anything-as-a-Service (another name for XaaS) is not confined to digital products. You
can get practically everything, from food to medical consultations, without leaving your home or
office, by utilizing certain online services. Hence the “Everything” is in the name.

Everything-as-a-Service Model Examples

Now that we’ve covered the XaaS definition, it’s time to demonstrate some practical -aaS cases (apart
from SaaS, PaaS and IaaS) that are gaining popularity.

Hardware-as-a-Service (HaaS)

Managed service providers (MSP) own some hardware and install it on customers’ sites on demand.

Communication-as-a-Service (CaaS)
This model includes different communication solutions such as VoIP (voice over IP or Internet
telephony), IM (instant messaging), video conference applications that are hosted in the vendor’s
cloud. 

Desktop-as-a-Service (DaaS)

Desktops are delivered as virtual services along with the apps needed for use.

Security-as-a-Service (SECaaS)

This is the model of outsourced security management. A provider integrates their security services
into your company’s infrastructure and, as a rule, delivers them over the Internet.

Healthcare-as-a-Service (HaaS)

With electronic medical records (EMR) and hospital information systems (HIS), the healthcare
industry is transforming into Healthcare-as-a-Service.

the following services are available:

 Online consultations with doctors


 Health monitoring 24/7
 Medicine delivery at your doorstep
 Lab samples collection even at home and delivery of results as soon as they are ready
 Access to your medical records 24/7

Transportation-as-a-Service (TaaS)

 Important trends of modern society are mobility and freedom of transportation at different
distances. 

The most vivid examples are:

 Carsharing (you can rent a car at any place via a special app and drive anywhere you need, paying
for the time you use a car, or for the distance you cover)
 Uber taxi services (you order a taxi via an app, which calculates the cost of the rout in advance).
Uber is planning to test flying taxis and self-driving planes in the near future.
Benefits of XaaS
The biggest benefits are:

 Scalability (outsourcing provides access to unlimited computing capacities, storage space, RAM,


etc; a company can quickly and seamlessly scale its processes up and down depending on
requirements and doesn’t have to worry about additional deployments or downtimes)
 Cost- and time-effectiveness (a company doesn’t purchase its personal equipment and doesn’t
need to deploy it, saving much time and money; a pay-as-you-go model is also beneficial)
 Focus on core competencies (there’s no need to set up apps and programs or conduct training for
employees; consequently, they can concentrate on their direct duties and achieve better
performance)
 The high quality of services (since professionals support and maintain your infrastructure and
systems, they provide the latest updates and all the emerging technologies, guaranteeing the quality
of services)
 Better customer experience (the above-mentioned pros lead to customer satisfaction and increase
customer loyalty)

10.Security aspects in IoT

1) Lack of Compliance on the Part of IoT Manufacturers

The primary source of most IoT security issues is that manufacturers do not spend enough
time and resources on security.

2) Lack of User Knowledge & Awareness

Tricking a human is, most of the time, the easiest way to gain access to a network. A type of
IoT security risk that is often overlooked is social engineering attacks. Instead of targeting
devices, a hacker targets a human, using the IoT.

3) IoT Security Problems in Device Update Management

Updates are critical for maintaining security on IoT devices. They should be updated right
after new vulnerabilities are discovered. Still, as compared with smartphones or computers
that get automatic updates, some IoT devices continue being used without the necessary
updates.

4) Lack of Physical Hardening

The lack of physical hardening can also cause IoT security issues. Although some IoT devices
should be able to operate autonomously without any intervention from a user, they need to be
physically secured from outer threats. 
Sometimes, these devices can be located in remote locations for long stretches of
time, and they could be physically tampered with, for example, using a USB flash drive with
Malware.

5) Botnet Attacks

A single IoT device infected with malware does not pose any real threat; it is a collection of
them that can bring down anything. To perform a botnet attack, a hacker creates an army of
bots by infecting them with malware and directs them to send thousands of requests per
second to bring down the target.

8) Data Integrity Risks of IoT Security in Healthcare

Most IoT devices extract and collect information from the external environment.
9) Rogue IoT Devices

One of the most significant IoT security risks and challenges is being able to manage all our
devices and close the perimeter.

11.Role of Cloud in IoT

You might also like