0% found this document useful (0 votes)
43 views41 pages

Final Chapter - 1

The document provides an introduction to Internet of Things (IoT). It defines IoT as connecting everyday devices embedded with electronics, software and sensors to the internet, enabling them to collect and exchange data without human interaction. It describes IoT devices as anything that can be accessed or connected through the internet. Key aspects of IoT discussed include its architecture involving sensors, gateways, cloud-based management and applications, as well as common application domains and the roles of sensing and actuation.

Uploaded by

sahilahemad05
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views41 pages

Final Chapter - 1

The document provides an introduction to Internet of Things (IoT). It defines IoT as connecting everyday devices embedded with electronics, software and sensors to the internet, enabling them to collect and exchange data without human interaction. It describes IoT devices as anything that can be accessed or connected through the internet. Key aspects of IoT discussed include its architecture involving sensors, gateways, cloud-based management and applications, as well as common application domains and the roles of sensing and actuation.

Uploaded by

sahilahemad05
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 41

Chapter-1

IoT – Introduction
Review Topics
1.0. IoT - Introduction
1.1. Architectural Overview, Design principles and needed
Capabilities, IoT Applications, Sensing, Actuation.
1.2. Basics of Networking, M2M and IoT Technology.
1.3. Fundamentals- Devices and gateways, Data management.
1.4. Business processes in IoT, Everything as a Service (XaaS).
1.5. Role of Cloud in IoT, Security aspects in IoT.

Dr. Milind Godase, SIOM 2


What is an Internet of Things (IoT)?
• Let’s us look closely at our mobile device which contains
GPS Tracking, Mobile Gyroscope, Adaptive brightness,
Voice detection, Face detection etc. These components have
their own individual features, but what about if these all
communicate with each other to provide a better
environment? For example, the phone brightness is adjusted
based on my GPS location or my direction.
• Connecting everyday things embedded with electronics,
software and sensors to internet, enabling to collect and
exchange data without human interaction called as the
Internet of Things (IoT).
• The term “Things” in the IoT refers to anything and
everything in day to day life which is accessed or connected
through the internet.
Dr. Milind Godase, SIOM 3
What is an Internet of Things (IoT)?

Dr. Milind Godase, SIOM 4


What is an Internet of Things (IoT)?
• “An IoT system is a network of networks where, typically, a
massive number of objects, things, sensors or devices are
connected through communications and information
infrastructure to provide value-added services via intelligent
data processing and management for different applications
(e.g. smart cities, smart health, smart grid, smart home,
smart transportation, and smart shopping).” – (IEEE definition)
• Direct integration between the physical world and computer-
based systems which also improves efficiency, accuracy and
results in economic benefit.
• Device that connect to one another and interact using
internet.
• Internet of Things is a new revolution of the Internet.

Dr. Milind Godase, SIOM 5


What is an Internet of Things (IoT)?

Dr. Milind Godase, SIOM 6


IoT - Device
• Any stand-alone internet-connected device that can be
monitored and/or controlled from a remote location.

Dr. Milind Godase, SIOM 7


IoT - Device
• Any stand-alone internet-connected device that can be
monitored and/or controlled from a remote location.

Dr. Milind Godase, SIOM 8


How does Internet of Thing (IoT) Work?
• The working of IoT is different for different IoT echo system (architecture).
However, the key concept of there working are similar. The entire working
process of IoT starts with the device themselves, such as smartphones, digital
watches, electronic appliances, which securely communicate with the IoT
platform. The platforms collect and analyze the data from all multiple devices and
platforms and transfer the most valuable data with applications to devices.

Dr. Milind Godase, SIOM 9


Features of IoT
• The most important features of IoT on which it works are
connectivity, analyzing, integrating, active engagement, and many
more. Some of them are listed below:
• Connectivity: Connectivity refers to establish a proper connection
between all the things of IoT to IoT platform it may be server or
cloud. After connecting the IoT devices, it needs a high speed
messaging between the devices and cloud to enable reliable, secure
and bi-directional communication.
• Analyzing: After connecting all the relevant things, it comes to
real-time analyzing the data collected and use them to build
effective business intelligence. If we have a good insight into data
gathered from all these things, then we call our system has a smart
system.
• Integrating: IoT integrating the various models to improve the
user experience as well.

Dr. Milind Godase, SIOM 10


Features of IoT
• Artificial Intelligence: IoT makes things smart and enhances life through
the use of data. For example, if we have a coffee machine whose beans
have going to end, then the coffee machine itself order the coffee beans of
your choice from the retailer.
• Sensing: The sensor devices used in IoT technologies detect and measure
any change in the environment and report on their status. IoT technology
brings passive networks to active networks. Without sensors, there could
not hold an effective or true IoT environment.
• Active Engagement: IoT makes the connected technology, product, or
services to active engagement between each other.
• Endpoint Management: It is important to be the endpoint management
of all the IoT system otherwise, it makes the complete failure of the
system. For example, if a coffee machine itself order the coffee beans
when it goes to end but what happens when it orders the beans from a
retailer and we are not present at home for a few days, it leads to the
failure of the IoT system. So, there must be a need for endpoint
management.
Dr. Milind Godase, SIOM 11
IoT – Advantages
• Internet of things facilitates the several advantages in day-to-day
life in the business sector. Some of its benefits are given below:
• Efficient resource utilization: If we know the functionality and
the way that how each device work we definitely increase the
efficient resource utilization as well as monitor natural resources.
• Minimize human effort: As the devices of IoT interact and
communicate with each other and do lot of task for us, then they
minimize the human effort.
• Save time: As it reduces the human effort then it definitely saves
out time. Time is the primary factor which can save through IoT
platform.
• Enhance Data Collection:
• Improve security: Now, if we have a system that all these things
are interconnected then we can make the system more secure and
efficient.
Dr. Milind Godase, SIOM 12
IoT – Disadvantages
• As the Internet of things facilitates a set of benefits, it also creates
a significant set of challenges. Some of the IoT challenges are
given below:
• Security: As the IoT systems are interconnected and communicate
over networks. The system offers little control despite any security
measures, and it can be lead the various kinds of network attacks.
• Privacy: Even without the active participation of the user, the IoT
system provides substantial personal data in maximum detail.
• Complexity: The designing, developing, and maintaining and
enabling the large technology to IoT system is quite complicated.

Dr. Milind Godase, SIOM 13


IoT – Ecosystem
• In the IoT ecosystem, the user uses smart devices such as smartphones, tablet,
sensors, etc. to send the command or request to devices for information over the
networks. The device response and performs the command to send information
back to the user through networks after analyzed.

Dr. Milind Godase, SIOM 14


IoT – Architecture
• There is not such a unique or standard consensus on the Internet of Things (IoT)
architecture which is universally defined. The IoT architecture differs from their
functional area and their solutions. However, the IoT architecture technology
mainly consists of four major components:
1. Sensors/Devices
2. Gateways and Networks
3. Cloud/Management Service Layer
4. Application Layer

Dr. Milind Godase, SIOM 15


IoT – Architecture
• Sensors/Actuators: Sensors or Actuators are the devices that are able to emit,
accept and process data over the network. These sensors or actuators may be
connected either through wired or wireless. This contains GPS, Electrochemical,
Gyroscope, RFID, etc. Most of the sensors need connectivity through sensors
gateways. The connection of sensors or actuators can be through a Local Area
Network (LAN) or Personal Area Network.
• Gateways and Data Acquisition: As the large numbers of data are produced by
this sensors and actuators need the high-speed Gateways and Networks to transfer
the data. This network can be of type Local Area Network (LAN such as WiFi,
Ethernet, etc.), Wide Area Network (WAN such as GSM, 5G, etc.).
• Edge IT: Edge in the IoT Architecture is the hardware and software gateways that
analyze and pre-process the data before transferring it to the cloud. If the data read
from the sensors and gateways are not changed from its previous reading value
then it does not transfer over the cloud, this saves the data used.
• Data center/ Cloud: The Data Center or Cloud comes under the Management
Services which process the information through analytics, management of device
and security controls. Beside this security controls and device management the
cloud transfer the data to the end users application such as Retail, Healthcare,
Emergency, Environment, and Energy, etc.
Dr. Milind Godase, SIOM 16
IoT – Architecture

Dr. Milind Godase, SIOM 17


IoT – Application Domains

Dr. Milind Godase, SIOM 18


IoT – Sensing, Actuation
• Actuators and sensors are devices that enable interaction with the physical world.
• For example, Moti is an actuator. Moti creates smart motors and apps for robots. Attach the
smart motor to anything, add power, and Moti gives you the ability to control the item from
your desktop browser. Actuators are devices that are used to manipulate the physical
environment, such as the temperature control valves used in smart homes. Actuators take
electrical input and transforms the input into tangible action. These technologies collect a
high amount of data, which can be very valuable and useful to an enterprise once it has been
stored, organized, and processed.
• Simply put, IoT isn’t just one technology – but a combination of various deeply connected
technologies.

Dr. Milind Godase, SIOM 19


IoT – Sensing, Actuation
• The 3 – Layer Architecture of an IoT-System: L1 consists of wireless sensors and
actuators. L2 includes the addition of sensor data aggregation systems and analog-
to-digital data conversion. L3, the data is fed to or used to improve an
application.
• Layer 1: Physical: Sensors collect data from the environment or object under
measurement and turn it into useful data. This stage of the IoT is expanding
rapidly, with robotic camera systems, water level detectors, home voice
controllers, air quality sensor, smart baby monitoring devices, etc. All of these
devices will collect user data, including sign-on times, level and hours of usage,
location statistics, etc. As these devices produce an avalanche of data, it will be
important to your organization to choose which data is useful to you and which
can be ignored.
• Layer 2: Network: Data collected from the sensors or actuators is very raw. This
data has to be aggregated and converted into digital streams for further data
processing. To carry out this data processing, it is imperative to use a data
acquisition system (DAS or DAQ).
• Layer 3: Application: This layer is responsible for delivering application specific
services to the user. Once data has been aggregated, cleaned, and surveyed, the
information can be fed to the server to be analyzed and applied to new products
and services.
Dr. Milind Godase, SIOM 20
M2M and IoT Technology
• M2M, or machine-to-machine, is a direct communication between devices using
wired or wireless communication channels. M2M refers to the interaction of two
or more devices/machines that are connected to each other. These devices capture
data and share with other connected devices, creating an intelligent network of
things or systems. Devices could be sensors, actuators, embedded systems or
other connected elements.
• M2M technology could be present in our homes, offices, shopping malls and
other places. Controlling electrical appliances like bulbs and fans using RF
or Bluetooth from your smartphone is a simple example of M2M applications at
home. Here, the electrical appliance and your smartphone are the two machines
interacting with each other.
• IoT is the network of physical devices embedded with sensors, software and
electronics, enabling these devices to communicate with each other and exchange
data over a computer network. The things in the IoT refer to hardware devices
uniquely identifiable through a network platform within the Internet
infrastructure.
• However, there is a lot of confusion between the IoT and M2M, as both refer to
communicating and sharing data. M2M is about machines, smartphones and
appliances, whereas the IoT is about sensors, cyber-based physical systems,
Internet and so on. Some of the differences between M2M and the IoT are listed
in the table. Dr. Milind Godase, SIOM 21
M2M and IoT Technology
• However, there is a lot of confusion between the IoT and M2M, as both refer to
communicating and sharing data. M2M is about machines, smartphones and
appliances, whereas the IoT is about sensors, cyber-based physical systems,
Internet and so on. Some of the differences between M2M and the IoT are listed
in the table.

Dr. Milind Godase, SIOM 22


What are Smarts Objects in IoT
• The concept of smart in IoT is used for physical objects that are active, digital,
networked, can operate to some extent autonomously, reconfigurable and has
local control of the resources. The smart objects need energy, data storage, etc.
• A smart object is an object that enhances the interaction with other smart objects
as well as with people also. The world of IoT is the network of interconnected
heterogeneous objects (such as smart devices, smart objects, sensors, actuators,
RFID, embedded computers, etc.) uniquely addressable and based on standard
communication protocols.
• In a day to day life, people have a lot of object with internet or wireless or wired
connection. Such as:
– Smartphone
– Tablets
– TV computer
• These objects can be interconnected among them and facilitate our daily life
(smart home, smart cities) no matter the situation, localization, accessibility to a
sensor, size, scenario or the risk of danger.
• Smart objects are utilized widely to transform the physical environment around us
to a digital world using the Internet of things (IoT) technologies.

Dr. Milind Godase, SIOM 23


What are Smarts Objects in IoT

Dr. Milind Godase, SIOM 24


IoT - Devices
• Internet of Things Devices is non-standard devices that connect
wirelessly to a network with each other and able to transfer the
data. IoT devices are enlarging the internet connectivity beyond
standard devices such as smartphones, laptops, tablets, and
desktops. Embedding these devices with technology enable us to
communicate and interact over the networks and they can be
remotely monitored and controlled.
• There are large varieties of IoT devices available based on IEEE
802.15.4 standard. These devices range from wireless motes,
attachable sensor-boards to interface-board which are useful for
researchers and developers.
• IoT devices include computer devices, software, wireless sensors,
and actuators. These IoT devices are connected over the internet
and enabling the data transfer among objects or people
automatically without human intervention.
• Some of the common and popular IoT devices are given below:
Dr. Milind Godase, SIOM 25
IoT - Devices

Dr. Milind Godase, SIOM 26


IoT - Devices
• Arduino Device: Arduino devices are the microcontrollers and microcontroller
kit for building digital devices that can be sense and control objects in the
physical and digital world. Arduino boards are furnished with a set of digital and
analog input/output pins that may be interfaced to various other circuits. Some
Arduino boards include USB (Universal Serial Bus) used for loading programs
from the personal computer.
• Intel Galileo: The Intel Galileo Gen 2 Board includes the parts such as Intel
Quark SoC processor, 256 MB RAM, multiple ports and supports for Arduino
device.

Dr. Milind Godase, SIOM 27


IoT - Devices
• Raspberry Pi: It is a much popular device used in building IoT project. The
recently launched Raspberry Pi 3 includes built-in WiFi and Bluetooth making the
most compact and standalone computer. It provides a powerful environment to
install a variety of programming packages such as Python, Node.js, LAMP stack,
Java and much more. Using 40 GPIO pins, and four USB ports you can connect
many peripherals and accessories to the Pi.
• Samsung Gear Fit: A Samsung Gear Fit device is a dustproof, water-resistant
with fitness tracker features, a curved display, and long-lasting battery. This
device receives alerts about emails and text messages, and it integrates with
Samsung’s S Health app.

Dr. Milind Godase, SIOM 28


IoT - Devices
• Sensor:
• A sensor is a device that reads the surrounding temperature, humidity, light, air
quality control etc. There are different types of sensors available that reads
different types of data. The sensors transmit these data over the networks or
through which it is connected. Following are some examples

Dr. Milind Godase, SIOM 29


Cloud Computing
• Why Cloud Computing is required?
• Answer is in the same way as water is a utility, electricity as a utility people
thought about can we have computing as utility
• What does it mean computing as utility?
• Computing means hardware resources like servers, workstations which again
include processors which can do certain computations etc. memory, storage and so
on. So, these computational resources hardware plus software resources plus
development platforms; so, all these things offered as utility.
• Why do we need, because that will have some business value that will save some
cost and it also has certain advantages. So, first let us have a quick glance through
how computing evolved over the years.
• Cluster computing is basically having some kind of computing nodes connected
together in the form of a cluster.
• So, the cluster as a whole which can be loosely or tightly connected would be
accomplishing some computational job.
• Grid computing is sort of like a wide area kind of heterogeneous computing
platform which will be performing large volumes of tasks. Then we have the
utility computing.

Dr. Milind Godase, SIOM 30


Cloud Computing
• Utility computing where this Computational resources are packaged for
delivering as utility for use by consumers as utility. So, this is the whole premise
of how utility computing evolved and then we have this cloud computing.
• Cloud Computing which was basically sort of like an integration of the concepts
from all these cluster computing, grid computing and utility computing their
advantages put together in order to have this new model of computing which is
known as the Cloud Computing.
• So, in Cloud Computing we have shared pool of configurable computing
resources and whenever it is required dynamically these resources will be offered
to the users as service on payment. So, this is like a scalable kind of model that
has been conceptualized over all these cluster, grid and utility computing models.

Dr. Milind Godase, SIOM 31


Evolution of Cloud Computing
• In the late or mid 1990s onwards cloud computing came into being popularity has
been more in the last couple of years of cloud computing different platforms
offering software you as utility, platform as utility and infrastructure as utility.
• As utility are offered by different companies such as sales force dot com, Amazon
web services, Amazon EC2, Google app engine and so on.
• So, these are the different companies which are basically daily offering these
different services as utility.

Dr. Milind Godase, SIOM 32


NIST - Cloud Computing
• NIST - National Institute of Standard and Technology defined
• Cloud Computing is a model for enabling convenient, on demand network access
to a shared pool of configurable computing resources (for example - network
infrastructure, servers, storage, applications etc.)

Dr. Milind Godase, SIOM 33


NIST Visual Model of Cloud Computing
• Broad Network Access: cloud resources should be available over the network and it
should support the standard mechanisms for information retrieval using traditional
interfaces.
• Cloud resource allocations should be rapid, elastic and dynamic allocation and release of
facility for scaling in and scaling out of resources should be made possible.
• It is a measured service, resources and their uses would be recorded and monitored.
• On demand Self service, means whenever required the user should be able to get access to
this resources through a self service manner.
• Resources should be pooled from all these available sources and the resources should be
allocated according to the users demand.

Dr. Milind Godase, SIOM 34


Components of Cloud Computing
• Different service models include the Software as a Service, Platform as a Service and
Infrastructure as a Service, these service models have been very popular.
• Since, the last few years cloud computing became very popular these service models are
core service models of cloud computing, but mind you that at present people are also talking
about different other types of service.
• So, not just software, platform and infrastructure as a service, but also something like x as a
service where x could be anything, some people are talking about hardware as a service,
some people are talking about sensors as a service like that database as a service, security as
a service, people are talking about all different types of service models made available
through cloud.

Dr. Milind Godase, SIOM 35


Complementary between IoT & Cloud

Dr. Milind Godase, SIOM 36


Everything (X) as a Service (XaaS)
XaaS X Description
(acronym)
TaaS Things as a Aggregating and abstracting heterogeneous
service resources according to tailored thing-like
semantics.
SNaaS or Sensing as a Providing ubiquitous access to sensor data.
S2aaS service

SAaaS Sensing and Enabling automatic control logics


Actuation as a implemented in the Cloud.
service

SEaaS Sensor Event Dispatching messaging services triggered by


as a service sensor events.

SENaaS Sensor as a Enabling ubiquitous management of remote


service sensors.

Dr. Milind Godase, SIOM 37


CoT = Internet of Everything (X) + XaaS

Dr. Milind Godase, SIOM 38


Security aspects in IoT
• IoT market is booming and use of IoT devices have become need of everyday life for human
being. As we know IoT stands for Internet of Things. This means in order to utilize services
of IoT network; each of the devices need to be IP compliant i.e. all the devices should have
IP addresses in order to connect with internet backbone to co-exist in the IoT system.
• IoT devices are emerging very fast for various applications and people have started using
them without bothering any of the security aspects. This has lead to serious security threats
as there are many loop-holes which are vulnerable for possible cyber attack by the hackers
in the IoT system.

Dr. Milind Godase, SIOM 39


Security aspects in IoT
• As most of the systems are using existing wireless networks such as wifi, zigbee, zwave,
GSM etc.; IoT systems can be hacked using wireless devices. In order to have safe and
secure use of IoT devices and IoT network, following precautions are advisable. These
are very useful as IoT security aspects for both the user as well as IoT network service
provider.
• Do not store any critical business or personal data in internet cloud.
• Do not store any password in your IoT device or anywhere in internet cloud.
• Do not install any malware without verifying its authenticity.
• Always install third-party software from authentic and genuine websites.
• Do not be hurry in start using the IoT device, first secure your newly purchased IoT device
with anti-malware and anti-virus software.
• If possible, regularly change the password of IoT device in order to improve the security.
• Do not bring any sensitive business material for re-work at home if home network is less
secured compare to office network. Do not store such material in easily hackable storage
devices or public storage locations. Moreover avoid using Wi-Fi network for such work.
• Switch off unused IoT devices as they are vulnerable for potential attack by hackers in a
home network. For example, switch off IoT compliant thermostats when not needed.
• Switch off Wi-Fi in your smartphone when you do not require internet access. This is
because it has been found that smartphone based fitness applications are vulnerable to leak
passwords as well as location information easily over public Wi-Fi networks.

Dr. Milind Godase, SIOM 40


Security aspects in IoT
• As most of the systems are using existing wireless networks such as wifi, zigbee, zwave,
GSM etc.; IoT systems can be hacked using wireless devices. In order to have safe and
secure use of IoT devices and IoT network, following precautions are advisable. These
are very useful as IoT security aspects for both the user as well as IoT network service
provider.
• Business, finance and banking related companies should store the data and retain them till
they are needed. Once they are no longer required, they should be deleted to minimize the
possible hacking.
• House owner should be cautious enough so that no unclaimed IoT device get installed or
placed in their premises without their notice. As later these devices can be utilized by
hackers for their bad intention.
• IoT Service provider should provide regular software patches for smart watch, IoT sensors,
IoT gadgets, healthcare applications used in smartphone etc. This helps IoT devices to be
more secure. These patches should be robust enough to take care of modern and latest
malwares and viruses.
• Individually wireless networks based on various technologies are already been secured,
which also helps avoid any possible security threats

Dr. Milind Godase, SIOM 41

You might also like