Iotap Unit 1
Iotap Unit 1
Iotap Unit 1
Characteristics:
1) Dynamic & Self Adapting: IoT devices and systems may have the
capability to dynamically adapt with the changing contexts and take actions
based on their operating conditions, user‘s context or sensed environment.
Eg: the surveillance system is adapting itself based on context and changing
conditions.
4) Unique Identity: Each IoT device has a unique identity and a unique
identifier(IP address).
Applications of IoT:
It, therefore, creates extensive dependencies across domains, platforms and services.
Considering this interdependency between IoT devices and IoT systems, an
intelligent, connection-aware framework has become a necessity, this is where IoT
architecture comes into play! Imagine a variety of smart IoT systems from sensors
and actuators to internet getaways and Data Acquisition Systems all under the
centralized control of one “brain”!
The brain here can be referred to as the IoT architecture, whose effectiveness
and applicability directly correlate with the quality of its building blocks. The way a
system interacts and the different functions an IoT device performs are various
approaches to IoT architecture.
Since we can call the architecture the brain, it’s also possible to say that the
key causes of poor integration in IoT systems are the shortage of intelligent,
connection-aware architecture to support interaction in IoT systems. An IoT
architecture is the system of numerous elements that range from sensors, protocols,
actuators, to cloud services, and layers.
Besides, devices and sensors the Internet of Things (IoT) architecture layers
are distinguished to track the consistency of a system through protocols and
gateways.
This, in turn, allows the interconnection of IoT devices that share their
information to create new applications and services which can improve human lives.
Originally, the concept of the IoT was first introduced by Kevin Ashton, who
is the founder of MIT auto-identification centre in 1999. Ashton has said, “The
Internet of Things has the potential to change the world, just as the Internet did.
Maybe even more so”. Later, the IoT was officially presented by the International
Telecommunication Union (ITU) in 2005.
The IoT has many definitions suggested by many organizations and
researchers. However, the definition provided by ITU in 2012 is the most common.
It stated: “a global infrastructure for the information society, enabling advanced
services by interconnecting (physical and virtual) things based on, existing and
evolving, interoperable information and communication technologies”.
The huge technological development has expanded the idea of the IoT to
involve other technologies such as Cloud computing and Wireless Sensor Networks
(WSNs).
The IoT has become able to connect both humans and things anywhere, and
anytime, ideally using any path/network. The IoT has become one of the interesting
topics to many researchers. According to Google, the number of IoT journal and
conference papers has almost doubled from 2004 to 2010. From 2010, the IoT
articles are dramatically increased to reach about 985 articles in 2015.
IoT can be classified into a four or five-layered architecture which gives you a
complete overview of how it works in real life.
Perception layer: This layer comprises of wireless devices, sensors, and radio
frequency identification (RFID) tags that are used for collecting and transmitting raw
data such as the temperature, moisture, etc. which is passed on to the next layer.
Network layer: This layer is largely responsible for routing data to the next layer in
the hierarchy with the help of network protocols. It uses wired and wireless
technologies for data transmission.
Middleware layer: This layer comprises of databases that store the information
passed on by the lower layers where it performs information processing and uses the
results to make further decisions.
Service and application support layer: This layer involve business process
modeling and execution as well as IoT service monitoring and resolution.
Application layer: It consists of application user interface and deals with various
applications such as home automation, electronic health monitoring, etc.
Business layer: this layer determines the future or further actions required based on
the data provided by the lower layers.
Four things form basic building blocks of the IoT system –sensors, processors,
gateways, applications. Each of these nodes has to have its own characteristics in
order to form a useful IoT system.
Fig 2.3 Simplified block diagram of the basic building blocks of the IoT
Sensors: These form the front end of the IoT devices. These are the so-called
“Things” of the system. Their main purpose is to collect data from its surroundings
(sensors) or give out data to its surrounding (actuators).
These have to be uniquely identifiable devices with a unique IP address so that they
can be easily identifiable over a large network. These have to be active in nature
which means that they should be able to collect real-time data.
These can either work on their own (autonomous in nature) or can be made to work
by the user depending on their needs (user-controlled).
Examples of sensors are gas sensor, water quality sensor, moisture sensor, etc.
Processors: Processors are the brain of the IoT system. Their main function is to
process the data captured by the sensors and process them so as to extract the valuable
data from the enormous amount of raw data collected. In a word, we can say that it
gives intelligence to the data. Processors mostly work on real-time basis and can be
easily controlled by applications. These are also responsible for securing the data –
that is performing encryption and decryption of data. Embedded hardware devices,
microcontroller, etc are the ones that process the data because they have processors
attached to it.
Gateways: Gateways are responsible for routing the processed data and send it to
proper locations for its (data) proper utilization. In other words, we can say that
gateway helps in to and fro communication of the data. It provides network
connectivity to the data. Network connectivity is essential for any IoT system to
communicate. LAN, WAN, PAN, etc are examples of network gateways.
1. Do your research
2. Concentrate on value
Early adopters are eager to try out new technologies. But the rest of your customer
base might be reluctant to put a new solution to use. They may not feel confident with
it and are likely to be cautious about using it. If you want your IoT solution to become
widely adopted, you need to focus on the actual tangible value it’s going to deliver to
your target audience. What is the real end-user value of your solution? What might be
the barriers to adopting new technology? How can your solution address them
specifically? Note that the features the early tech adopters might find valuable might
turn out to be completely uninteresting for the majority of users. That’s why you need
to carefully plan which features to include and in what order, always concentrating on
the actual value they provide.
One characteristic trait of IoT solutions is that they typically include multiple devices
that come with different capabilities and consist of both digital and physical
touchpoints. Your solution might also be delivered to users in cooperation with
service providers. That’s why it’s not enough to design a single touchpoint well.
Instead, you need to take the bigger picture into account and treat your IoT system
holistically. Delineate the role of every device and service. Develop a conceptual
model of how users will perceive and understand the system. All the parts of your
system need to work seamlessly together. Only then you’ll be able to create a
meaningful experience for your end-users.
Don’t forget that IoT solutions aren’t purely digital. They’re located in the real-world
context, and the consequences of their actions might be serious if something goes
wrong. At the same time, building trust in IoT solutions should be one of your main
design drivers. Make sure that every interaction with your product builds consumer
trust rather than breaking it. In practice, it means that you should understand all the
possible error situations that may be related to the context of its use. Then try to
design your product in a way to prevent them. If error situations occur, make sure that
the user is informed appropriately and provided with help. Also, consider data
security and privacy as a key aspect of your implementation. Users need to feel that
their data is safe, and objects located in their workspaces or home can’t be hacked.
That’s why quality assurance and testing the system in the real-world context are so
important.
And speaking of context, it pays to remember that IoT solutions are located at the
intersection of the physical and digital world. The commands you give through digital
interfaces produce real-world effects. Unlike digital commands, these actions may not
be easily undone. In a real-world context, many unexpected things may happen.
That’s why you need to make sure that the design of your solution enables users to
feel safe and in control at all times. The context itself is a crucial consideration during
IoT design. Depending on the physical context of your solution, you might have
different goals in mind. For example, you might want to minimize user distraction or
design devices that will be resistant to the changing weather conditions. The social
context is an important factor, as well. Don’t forget that the devices you design for
workspaces or homes will be used by multiple users.
IoT solutions are often difficult to upgrade. Once the user places the connected object
somewhere, it might be hard to replace it with a new version – especially if the user
would have to pay for the upgrade. Even the software within the object might be hard
to update because of security and privacy reasons. Make sure that your design
practices help to avoid costly hardware iterations. Get your solution right from the
start. From the design perspective, it means that prototyping and rapid iteration will
become critical in the early stages of the project.
Resource Layer : Sensing, Actuation and Embedded Identities are the main
functionality of this layer. It has two types Primary Resources such as
Sensors, Actuator and RFID Tags, Readers etc and Secondary Resources such
as Gateways.
Data and Information Layers : Abstract services are provided in this layer.
Important goal is to capture knowledge and provide advanced Control Logic
and Support 244 Enhancement of IoT-Based Smart Hospital System Survey
Paper.
Smart objects produce large volumes of data. This data needs to be managed,
processed, transferred and stored securely. Standardization is key to achieving
universally accepted specifications and protocols for true interoperability
between devices and applications.
The fact that any of the electronic devices we are using these days is way
smarter than the devices used a decade back. On one side people had to leave
their sofa to change the TV channel or to press their AC button, on the other
side manually, they could speak to give instructions to their TV or AC on what
to do, and this is how technology has changed the way we are using the
devices.
To make the devices work more efficiently or to offer more functionality, the
concept of IoT has been introduced. The implementation of this technology has
changed the life of mankind. It is concerned with getting the devices together
with the other devices so that they can contribute to enhancing their
functionality. To manage this, of course, there exists some standard to make
sure everything is happening in a controlled way, and here we will be focusing
on those standards.
All of the standards for IoT are concerned about the way devices interact with
each other to create the network of the devices. The more things are connected,
the greater the security risk. So, security standards are also needed to protect
the individuals, businesses and governments which will use the IoT
M2M and IoT Technology Fundamentals
Devices and gateways :
A device is a hardware unit that can sense aspects of it’s environment and/or actuate,
i.e. perform tasks in its environment.
A device can be characterized as having several properties, including:
• Microcontroller: 8-, 16-, or 32-bit working memory and storage.
• Power Source: Fixed, battery, energy harvesting, or hybrid.
• Sensors and Actuators: Onboard sensors and actuators, or circuitry that allows them
to be connected, sampled, conditioned, and controlled.
• Communication: Cellular, wireless, or wired for LAN and WAN communication.
• Operating System (OS): Main-loop, event-based, real-time, or fullfeatured OS.
• Applications: Simple sensor sampling or more advanced applications.
• User Interface: Display, buttons, or other functions for user interaction.
• Device Management (DM): Provisioning, firmware, bootstrapping, and
monitoring.
• Execution Environment (EE): Application lifecycle management and Application
Programming Interface (API).
• For several reasons, one or more of these functions are often hosted on a gateway
instead.
• This can be to save battery power, for example, by letting the gateway handle heavy
functions such as WAN connectivity and application logic that requires a powerful
processor.
• This also leads to reduced costs because these are expensive components.
• Another reason is to reduce complexity by letting a central node (the (the gateway)
handle functionality such as device management and advanced applications, while
letting the devices focus on sensing and actuating.
Device types
There are no clear criteria today for categorizing devices, but instead there is more of
a sliding scale. we group devices into two categories.
• Basic Devices:
✓ Devices that only provide the basic services of sensor readings and/or actuation
tasks, and in some cases limited support for user interaction.
✓ LAN communication is supported via wired or wireless technology, thus a
gateway is needed to provide the WAN connection.
• Advanced Devices:
✓ In this case the devices also host the application logic and a WAN connection.
✓ They may also feature device management and an execution environment for
hosting multiple applications. Gateway devices are most likely to fall into this
category.
There are large varieties of IoT devices available based on IEEE 802.15.4
standard. These devices range from wireless motes, attachable sensor-boards to
interface-boards which are useful for researchers and developers.
• Home Alarms:
✓ Such devices typically include motion detectors, magnetic sensors, and smoke
detectors.
✓ A central unit takes care of the application logic that calls security and sounds an
alarm if a sensor is activated when the alarm is armed.
✓ The central unit also handles the WAN connection towards the alarm central.
These systems are currently often based on proprietary radio protocols. Smart Meters:
• The meters are installed in the households and measure consumption of, for
example, electricity and gas.
• A concentrator gateway collects data from the meters, performs aggregation, and
periodically transmits the aggregated data to an application server over a cellular
connection.
• By using a capillary network technology e.g. 802.15.4), it’s possible to extend the
range of the concentrator gateway by allowing meters in the periphery to use other
meters as extenders, and interface with handheld devices on the Home Area Network
side.
• Onboard units in cars that perform remote monitoring and configuration over a
cellular connection.
• Robots and autonomous vehicles such as unmanned aerial vehicles that can work
both autonomously or by remote control using a cellular connection.
• Oil well monitoring and collection of data points from remote devices.
• The devices and gateways of today often use legacy technologies such as KNX,
ZWave, and ZigBee, but the vision for the future is that every device can have an IP
address and be (in)directly connected to the Internet.
• Some of the examples listed above (e.g. the BAS) require some form of
autonomous mode, where the system operates even without a WAN connection. Also,
in these cases it’s possible to use IoT technologies to form an “Intranet of Things.”
Basic devices
• These devices are often intended for a single purpose, such as measuring air
pressure or closing a valve. In some cases several functions are deployed on the same
device, such as monitoring humidity, temperature, and light level.
• The requirements on hardware are low, both in terms of processing power and
memory.
The microcontroller typically hosts a number of ports that allow integration with
sensors and actuators, such as General Purpose I/O (GPIO) and an analog-to-digital
converter (ADC) for supporting analog input.
• For certain actuators, such as motors, pulse-width modulation (PWM) can be used.
• Some devices even go as far as harvesting energy from their environment, e.g. in
the form of solar, thermal, and physical energy.
• To interact with peripherals such as storage or display, it’s common to use a serial
interface such as SPI, I2C, or UART.
• These interfaces can also be used to communicate with another microcontroller on
the device.
• This is common when the there is a need for offloading certain tasks, or when in
some cases the entire application logic is put on a separate host processor.
• It’s not unusual for the microcontroller to also contain a security processor, e.g. to
accelerate Advanced Encryption Standard (AES). This is necessary to allow
encrypted communication over the radio link without the need for a host processor.
• The microcontroller contains most of the radio functions needed for communicating
with the gateway and other devices in the same capillary network.
IoT Gateways: An IoT gateway acts as a network router, routing data between IoT
devices and the cloud.IoT gateway is a physical device or virtual platform that
connects sensors, IoT modules, and smart devices to the cloud. Gateways serve as a
wireless access portal to give IoT devices access to the Internet.
IoT gateways play a crucial role in enabling secure and reliable communication
between IoT devices and the cloud or other network infrastructures. The choice
of IoT gateway type depends on the specific application requirements, such as
data processing capabilities, connectivity options, and power consumption.
# Advantages of using IoT Gateway devices
High energy and cost efficiency: IoT gateways are enabled to manage data transfers,
reduce bandwidth consumption, and reduce latency for IoT devices, making them
ideal for deployment in any IoT ecosystem. In addition, the cost savings from one IoT
gateway are negligible, but you’ll notice a considerable reduction when deploying a
large number of gateways.
Security risk mitigation:With the explosion of IoT devices, the security risks against
them crop up here and there, making the communication bridge – IoT gateways attach
more importance than ever. As expected, IoT gateways are equipped with multiple
security options to ensure an extra security layer between the Internet and the devices.
Durable and Reliable: While a commercial IoT gateway has all the advantages
above, it is not exactly the same as an Industrial IoT gateway. They differ in that IIoT
gateways can withstand extremely hostile industrial conditions. IIoT gateways are
usually built with robust industrial materials that are more durable and reliable,
allowing them to endure wide-ranging temperatures, humidity, radiation, dust,
vibration, and even explosions.
A LAN can be set up using wired or wireless technologies and allows devices to
communicate and share resources, such as files, printers, and internet access.In a
LAN, devices are typically connected to a central device called a switch or router,
which manages the flow of data between devices.
They can also be used in homes to connect multiple devices, such as computers,
smartphones, and smart home devices, to the internet and each other.
In local area networks, computers can exchange data and messages easily
and quickly. This saves time and gets things done faster. LAN allows any user
to share messages and data with any other user on the network. Users can
access the network from any computer and access the data stored on the
server.
The internet is the largest example of a WAN, connecting millions of devices across
the globe. Internet Service Providers (ISPs) provide connectivity to the internet via
various technologies such as cable, DSL, and fiber-optic connections. WANs also
support virtual private networks (VPNs), which allow remote users to securely access
resources on the network over the internet.
WANs provide organizations with the ability to communicate and collaborate across
large distances, making it possible for businesses to operate on a global scale and for
individuals to connect with people from all over the world.
WANs can facilitate communication, the sharing of information and much more
between devices from around the world through a WAN provider.
• Big Data: Huge amounts of data are generated, capturing detailed aspects of the
processes where devices are involved.
• Heterogeneous Data: The data is produced by a huge variety of devices and is itself
highly heterogeneous, differing on sampling rate, quality of captured values, etc.
• Real-World Data: The overwhelming majority of the M2M data relates to real-
world processes and is dependent on the environment they interact with.
• Spatial Data: Increasingly, the data generated by M2M interactions are not only
captured by mobile devices, but also coupled to interactions in specific locations, and
their assessment may dynamically vary depending on the location their assessment
may dynamically vary depending on the location
● Polymorphic Data: The data acquired and used by M2M processes may be
complex and involve various data, which can also obtain different meanings
depending on the semantics applied and the process they participate in.
● Proprietary Data: Up to now, due to monolithic application development, a
significant amount of M2M data is stored and captured in proprietary formats.
However, increasingly due to the interactions with heterogeneous devices and
stakeholders, open approaches for data storage and exchange are used.
● Security and Privacy Data Aspects: Due to the detailed capturing of
interactions by M2M, analysis of the obtained data has a high risk of leaking
private information and usage patterns, as well as compromising security.
Billions of devices interact and generate data at exponential growth rates, data
management is of critical importance as it sets the basis upon which any other
processes can rely and operate. Several aspects of data management need to be
addressed in order to fully take advantage of the M2M data and their business
relevance.
The data flow from the moment it is sensed (e.g. by a wireless sensor node) up
to the moment it reaches the backend system has been processed manifold
(and often redundantly), either to adjust its representation in order to be easily
integrated by the diverse applications, or to compute on it in order to extract
and associate it with respective business intelligence (e.g. business process
affected, etc.). We see a number of data processing network points between
the machine and the enterprise that act on the datastream (or simply
forwarding it) based on their end-application needs and existing context.
Dealing with M2M data may be decomposed into several stages, which we
briefly outline below. Not all of the stages are necessary in every solution, and
may be used in orders other than those described below.
Data generation: Data generation is the first stage within which data is
generated actively or passively from the device, system, or as a result of its
interactions. The sampling of data generation depends on the device and its
capabilities as well as potentially the application needs. Usually default
behaviors for data generation exist, which are usually further configurable to
strike a good benefit between involved costs, e.g. frequency of data collection.
Data acquisition: Data acquisition deals with the collection of data (actively
or passively) from the device, system, or as a result of its interactions .The
data acquisition systems usually communicate with distributed devices over
wired or wireless links to acquire the needed data, and need to respect
security, protocol, and application requirements. The nature of acquisition
varies, e.g. it could be continuous monitoring, interval-poll, event-based, etc.
Data processing Data processing enables working with the data that is either
at rest (already stored) or is in-motion (e.g. stream data). The scope of this
processing is to operate on the data at a low level and “enhance” them for
future needs. For example is the transformation of incoming data; for example,
a stream can be converted on the fly (e.g. temperature values are converted
from F to C), or repackaged in another data model, etc. Missing or invalid data
that is needed for the specific time-slot may be forecasted and used until, in a
future interaction, the actual data comes into the system.
Data remanence: M2M data may reveal critical business aspects, and hence
their lifecycle management should include not only the acquisition and usage,
but also the end-of-life of data. However, even if the data is erased or
removed, residues may still remain in electronic media, and may be easily
recovered by third parties often referred to as data remanence. Several
techniques have been developed to deal with this, such as overwriting,
degaussing, encryption, and physical destruction.
IoT (Internet of Things) refers to the network of physical devices, vehicles, home
appliances, and other items embedded with sensors, software, and connectivity to
enable the exchange of data between them and other internet-enabled devices.
The business processes in IoT typically involve collecting, analyzing, and
utilizing the data generated by these devices to improve business operations and
enhance customer experiences. Some of the common business processes in IoT
include:
1. Data Collection: IoT devices generate a large amount of data, and the
first step in utilizing this data is to collect it. This can be done using
various sensors and devices that are connected to the IoT network.
2. Data Analytics: Once the data is collected, it needs to be analyzed to
extract meaningful insights. This involves using analytics tools and
techniques to identify patterns, trends, and anomalies in the data.
3. Predictive Maintenance: IoT devices can be used to monitor the
performance of equipment and predict when maintenance is needed. This
can help to prevent costly breakdowns and downtime.
4. Inventory Management: IoT sensors can be used to monitor inventory
levels in real-time, allowing businesses to optimize their inventory
management processes and reduce waste.
5. Supply Chain Management: IoT devices can be used to track shipments
and monitor the condition of goods in transit. This can help businesses to
optimize their supply chain processes and reduce costs.
6. Customer Experience: IoT devices can be used to collect data on customer
behavior and preferences, allowing businesses to personalize their
products and services to meet customer needs.
7. Security: IoT devices can be vulnerable to security threats, and businesses
need to have processes in place to secure their IoT networks and protect
against cyber-attacks.
Overall, the use of IoT devices and data can help businesses to optimize their
operations, reduce costs, and improve customer experiences. However, it is
important to have robust business processes in place to effectively manage the
data generated by these devices and utilize it to drive business outcomes.
Resource Pooling.
• The provider’s computing resources are pooled to serve multiple consumers using a
multi-tenant model, with different physical and virtual resources dynamically
assigned and reassigned according to consumer demand.
• Measured Service. Cloud systems automatically control and optimize resource use
by leveraging a metering capability, at some level of abstraction, appropriate to the
type of service (e.g. storage, processing, bandwidth, and active user accounts).
Resource usage can be monitored, controlled, and reported, providing transparency
for both the provider and consumer of the utilized service.
• Cloud computing comes in several different service models and deployment options
for enterprises wishing to use it. The three main servicemodels may be defined as
(NIST 2011):
✓ M2M data for advanced analytics and business intelligence are very promising. By
transforming raw data into actionable intelligence, it’s possible to improve many
areas, such as enhancement of existing products, cost-savings, service quality, as well
as operational efficiency.
✓ By applying technologies from the Big Data domain, it is possible to store more
data, such as contextual and situational information, and given a more open approach
to data, such as the open-data government initiatives (e.g. Data.gov and Data.gov.uk),
even more understanding can be derived, which can be used to improve everything
from Demand/Response in a power grid to wastewater treatment in a city
✓ Descriptive statistics can take you a long way from raw data to actionable
intelligence. Other opportunities are provided by data mining and machine learning,
with no clear distinction between the three, although data mining can be described as
the automatic or semiautomatic task of extracting previously unknown information
from a large quantity of data, while machine learning is focused on finding models for
specific tasks, e.g. separate spam from non-spam email.
✓ Big Data technologies such as MapReduce for massively parallel analytics, as well
as analytics on online streaming data where the individual data item is not necessarily
stored, will play an important role in the management and analysis of large-scale
M2M data. ✓ Apart from the software and services provided for analytics, a major
uptake in professional services for consultancy within M2M analytics is expected
(Figure).