Module 1
Module 1
Introduction to loT - loT definition - Characteristics - Things in loT - loT complete architectural
stack – IoT, Functional components-loT enabling technologies - loT challenges -Industrial IoT
Vs Consumer IoT, loT levels, Machine-to-Machine (M2M) communications, Cyber-Physical-
Systems (CPS), Web-of-Things (WoT), Interoperability in IoT-User Vs device interoperability
Things or Devices
The key physical items being tracked are Things or Devices. Smart sensors are connected to
things/devices which further continues to collect data from the device and send it to the next layer,
which is the portal or also called as the gateway Small smart sensors for a variety of applications are
now possible because of new advancements in microelectronics.
Some commonly used sensors are:
Temperature sensors and thermostats
Pressure sensors
Humidity / Moisture level
Light intensity detectors
Moisture sensors
Proximity detection
RFID tags
User Interface
User interface also termed as UI is nothing but a user-facing program that allows the user to monitor
and manipulate data.
The user interface (UI) is the visible, tangible portion of the IoT device that people can interact with.
Developers must provide a well-designed user interface that requires the least amount of effort from
users and promotes additional interactions.
Cloud: Cloud storage is used to store the data which has been collected from different devices or
things. Cloud computing is simply a set of connected servers that operate continuously(24*7) over the
Internet.
IoT devices, applications, and users generate massive amounts of data, which must be managed
efficiently. Data collection, processing, management, and archiving are among the responsibilities of
IoT clouds. The data can be accessed remotely by industries and services, allowing them to take
critical decisions at any time.
In the simplest terms, an IoT cloud is a network of servers optimized to handle data at high speeds for
a large number of different devices, manage traffic, and analyze data with great accuracy. An IoT
cloud would not be complete without a distributed management database system.
Analytics
After receiving the data in the cloud, that data is processed. Data is analyzed here with the help of
various algorithms like machine learning and all.
Analytics is the conversion of analog information via connected sensors and devices into actionable
insights that can be processed, interpreted, and analyzed in depth. Analysis of raw data or information
for further processing is a prerequisite for the monitoring and enhancement of the Internet of things
(IoT).
Among the most significant benefits of a well-designed IoT system is real-time smart analysis, which
enables designers to spot anomalies in gathering information and respond quickly to avoid an
undesirable situation. If information is collected correctly and at the right moment, network operators
can plan for the next steps.
Network Interconnection
Over the past few years, the IoT has seen massive growth in devices controlled by the internet and
connected to it. Although IoT devices have a wide variety of uses, there are some common things
among them also along with the differences between them.
IoT is enabled by a variety of technologies. The network used to communicate with other devices in
an IoT deployment is critical to the field, a position that numerous wireless or wired technologies can
fill.
System Security
Security is a crucial component of IoT implementation, but this security point of view is too often
overlooked during the design process. Day after day weaknesses within IoT are being attacked with
evil intent – however, the majority of them that can be easily and inexpensively addressed.
A secure network begins with the elimination of weaknesses within IoT devices as well as the
provision of tools to withstand, recognize, and recoup from harmful attacks.
Central Control Hardware
The two or more data flow among multiple channels and interfaces is managed by a Control Panel.
The additional duty of a control panel is to convert various wireless interfaces and ensure that linked
sensors and devices are accessible.
1.7. Enabling Technologies
IoT(internet of things) enabling technologies are
Wireless Sensor Network
Cloud Computing
Big Data Analytics
Communications Protocols
Embedded System
1. Wireless Sensor Network(WSN) :
A WSN comprises distributed devices with sensors which are used to monitor the environmental and
physical conditions. A wireless sensor network consists of end nodes, routers and coordinators. End
nodes have several sensors attached to them where the data is passed to a coordinator with the help of
routers. The coordinator also acts as the gateway that connects WSN to the internet.
Example –
Weather monitoring system
Indoor air quality monitoring system
Soil moisture monitoring system
Surveillance system
Health monitoring system
2. Cloud Computing :
It provides us the means by which we can access applications as utilities over the internet. Cloud
means something which is present in remote locations.
With Cloud computing, users can access any resources from anywhere like databases, webservers,
storage, any device, and any software over the internet.
Characteristics –
Broad network access
On demand self-services
Rapid scalability
Measured service
Pay-per-use
Provides different services, such as –
IaaS (Infrastructure as a service)
Infrastructure as a service provides online services such as physical machines, virtual machines,
servers, networking, storage and data center space on a pay per use basis. Major IaaS providers
are Google Compute Engine, Amazon Web Services and Microsoft Azure etc.
Ex : Web Hosting, Virtual Machine etc.
PaaS (Platform as a service)
Provides a cloud-based environment with a very thing required to support the complete life cycle
of building and delivering West web based (cloud) applications – without the cost and complexity
of buying and managing underlying hardware, software provisioning and hosting. Computing
platforms such as hardware, operating systems and libraries etc. Basically, it provides a platform
to develop applications.
Ex : App Cloud, Google app engine
SaaS (Software as a service)
It is a way of delivering applications over the internet as a service. Instead of installing and
maintaining software, you simply access it via the internet, freeing yourself from complex
software and hardware management.
SaaS Applications are sometimes called web-based software on demand software or hosted
software.
SaaS applications run on a SaaS provider’s service and they manage security availability and
performance.
Ex : Google Docs, Gmail, office etc.
3. Big Data Analytics :
It refers to the method of studying massive volumes of data or big data. Collection of data whose
volume, velocity or variety is simply too massive and tough to store, control, process and examine the
data using traditional databases.
Big data is gathered from a variety of sources including social network videos, digital images, sensors
and sales transaction records.
Several steps involved in analyzing big data –
Data cleaning
Munging
Processing
Visualization
Examples –
Bank transactions
Data generated by IoT systems for location and tracking of vehicles
E-commerce and in Big-Basket
Health and fitness data generated by IoT system such as a fitness bands
4. Communications Protocols :
They are the backbone of IoT systems and enable network connectivity and linking to applications.
Communication protocols allow devices to exchange data over the network. Multiple protocols often
describe different aspects of a single communication. A group of protocols designed to work together
is known as a protocol suite; when implemented in software they are a protocol stack.
They are used in
Data encoding
Addressing schemes
5. Embedded Systems :
It is a combination of hardware and software used to perform special tasks.
It includes microcontroller and microprocessor memory, networking units (Ethernet Wi-Fi adapters),
input output units (display keyword etc. ) and storage devices (flash memory).
It collects the data and sends it to the internet.
Embedded systems used in
Examples –
Digital camera
DVD player, music player
Industrial robots
Wireless Routers etc.
1.8 IoT Challenges
The Internet of Things (IoT) has fast grown to be a large part of how human beings live, communicate
and do business. All across the world, web-enabled devices are turning our global rights into a greater
switched-on area to live in.
There are various types of challenges in front of IoT.
Security challenges in IoT :
Lack of encryption – Although encryption is a great way to prevent hackers from accessing data, it is
also one of the leading IoT security challenges.
These drives like the storage and processing capabilities that would be found on a traditional
computer.
The result is an increase in attacks where hackers can easily manipulate the algorithms that were
designed for protection.
Insufficient testing and updating –With the increase in the number of IoT(internet of things)
devices, IoT manufacturers are more eager to produce and deliver their device as fast as they can
without giving security too much of although.
Most of these devices and IoT products do not get enough testing and updates and are prone to
hackers and other security issues.
Brute forcing and the risk of default passwords – Weak credentials and login details leave nearly
all IoT devices vulnerable to password hacking and brute force.
Any company that uses factory default credentials on their devices is placing both their business and
its assets and the customer and their valuable information at risk of being susceptible to a brute force
attack.
IoT Malware and ransomware – Increases with increase in devices. Ransomware uses encryption to
effectively lock out users from various devices and platforms and still use a user’s valuable data and
info.
Example –
A hacker can hijack a computer camera and take pictures. By using malware access points, the
hackers can demand ransom to unlock the device and return the data.
IoT botnet aiming at cryptocurrency – IoT botnet workers can manipulate data privacy, which
could be massive risks for an open Crypto market. The exact value and creation of cryptocurrencies
code face danger from mal-intentioned hackers.
The blockchain companies are trying to boost security. Blockchain technology itself is not particularly
vulnerable, but the app development process is.
Design challenge in IoT :
Battery life is a limitation – Issues in packaging and integration of small-sized chip with low weight
and less power consumption. If you’ve been following the mobile space, you’ve likely see how every
yr it looks like there’s no restriction in terms of display screen size. Take the upward thrust of
‘phablets’, for instance, which can be telephones nearly as huge as tablets. Although helpful, the
bigger monitors aren’t always only for convenience, rather, instead, display screen sizes are growing
to accommodate larger batteries. Computers have getting slimmer, but battery energy stays the same.
Increased cost and time to market – Embedded systems are lightly constrained by cost. The need
originates to drive better approaches when designing the IoT devices in order to handle the cost
modelling or cost optimally with digital electronic components.
Designers also need to solve the design time problem and bring the embedded device at the right time
to the market.
Security of the system – Systems have to be designed and implemented to be robust and reliable and
have to be secure with crypto-graphic algorithms and security procedures. It involves different
approaches to secure all the components of embedded systems from prototype to deployment.
Deployment challenges in IoT :
Connectivity – It is the foremost concern while connecting devices, applications and cloud platforms.
Connected devices that provide useful front and information are extremely valuable. But poor
connectivity becomes a challenge where IoT sensors are required to monitor process data and supply
information.
Cross platform capability – IoT applications must be developed, keeping in mind the technological
changes of the future. Its development requires a balance of hardware and software functions. It is a
challenge for IoT application developers to ensure that the device and IoT platform drivers the best
performance despite heavy device rates and fixings.
Data collection and processing – In IoT development, data plays an important role. What is more
critical here is the processing or usefulness of stored data. Along with security and privacy,
development teams need to ensure that they plan well for the way data is collected, stored or
processed within an environment.
Lack of skill set –
All of the development challenges above can only be handled if there is a proper skilled resource
working on the IoT application development. The right talent will always get you past the major
challenges and will be an important IoT application development asset.
IoT Levels
IoT level 1 : IoT systems have a single device that performs sensing or actuation, stores, analyses it
and hosts the application, IoT system-level-l is the best example for modeling low complexity and
low-cost solution where the analysis requirement is comprehensive and data involved is not big.
Example: We can understand with the help of an eg. let's look at the IoT device that monitors the
lights in a house. The lights are controlled through switches. The database has maintained the status of
each light and also REST services deployed locally allow retrieving and updating the state of each
light and trigger the switches accordingly. For controlling the lights and applications, the application
has an interface. The device is connected to the internet and hence the application can be accessed
remotely as well.
Example: Cloud-based application is used for monitoring and controlling the IoT system A single
node monitors the soil moisture in the field Which is sent to the database on the cloud using REST
APIS. The controller service continuously monitors moisture levels
IoT level 3
At this level, the application is cloud-based. A single node monitors the environment and stores data
in the cloud. This is suitable where data is comprehensive and analysis 1 computationally intensive.
Example: A node is monitoring a package using devices like an accelerometer and gyroscope. These
devices track vibration levels. controller service sends sensor data to the cloud in the rear time using
Web-Socket APL. Data is stored in the cloud and visualized using a cloud-based application. The
analysis component triggers an alert if vibration levels cross a threshold.
IoT level 4
At this level, Multiple nodes collect information and store it in the cloud. Local and rent server nodes
are used to grant and receive information collected in the cloud from various devices. Observer nodes
can process information and use it for applications but not perform control functions, This level is the
best solution where data involvement is big, requirement analysis is comprehensive and multiple
nodes are required,
Example: Analysis is done on the cloud and the entire IoT system has monitored the cloud using an
application. Noise monitoring of an area requires various nodes to function independently of each
other. Each has its own controller service. Data is stored in a cloud database.
IoT level 5
In this level Nodes present locally are of two types end odes and coordinator nodes End nodes collect
data and perform sensing or actuation or both. Coordinator nodes collect data from end nodes and
send it to the cloud. Data is stored and analyzed in the cloud. This level is best for WSN, where the
data involved is big and the requirement analysis is comprehensive.
Example: A monitoring system has various components: end nodes collect various data from the
environment and send it to the coordinator node. The coordinator node acts as a gateway and allows
the data to be transferred to cloud storage using REST API. The controller service on the coordinator
node sends data to the cloud.
IoT Level-6
At this level, the application is also cloud-based and data is stored in the cloud-like of levels. Multiple
independent end nodes perform sensing and actuation and send d to the cloud. The analytics
components analyze the data and store the results in the cloud database. The results are visualized
with a cloud-based application. The centralized controller is aware of the status of all the end nodes
and sends control commands to the nodes.
Example: Weather monitoring consists of sensors that monitor different aspects of the system. The
end nodes send data to cloud storage. Analysis of components, applications, and storage areas in the
cloud. The centralized controller controls all nodes and provides inputs
1.11. Machine-to-Machine (M2M) Communications
Machine to machine (M2M) refers to networking of Machines for the purpose of remote monitoring
and control and data exchange. The end-to-end architecture for M2M systems comprising of M2M
area networks, Communications Network and application domain. An M2M area network comprises
of machines which have embedded hardware module for sensing actuation and communication.
Various Communication protocols can be used for M2M local area network such as Zigbee ,
Bluetooth , Modbus M –bus, wireless, power LINE Communication ,6LoWPAN. These
Communications protocols provide connectivity between M2M nodes within and M2M area network.
The Communications Network provides connectivity to remote m2m area network. communication
network can use wired or wireless network. The M2M area network use either proprietary or non IP
based protocol, the communication network uses IP-based networks. Since non IP based protocols are
used within M2M area networks, the M2M nodes within one network cannot communicate with
nodes in an external networks. To enable the communication between remote M2M area networksm
M2M gateway are used.
The communication between the M2M nodes and the M2M Gateway is based on the
communication protocol. M2M Gateway protocol translation to enable IP connectivity for M2M .
M2M Gateway act as a proxy performing translation from / to native protocol to M2M area network.
M2M data is gathered into point solution such as enterprise applications, service management
application for remote monitoring applications. M2M has various application domain such as smart
metering, Home Automation , industrial Automation, smart grid
1.12. Cyber Physical System(CPS)
A Cyber Physical System (CPS) is a platform consisting of a mechanical system managed by
computer algorithms and tightly connected with the Internet and its networked users.
The platform's physical-mechanical components, represented by smart sensors and actuators, and
software components, represented by computer and networking devices, are inextricably linked. In
other words, CPS refers to a collection of physical devices ('hardware') that are controlled by
computer-based algorithms, most of which are software.
According to that definition, personal computers are CPS devices, and any physical device controlled
by an algorithm might be considered a computer. In this situation, CPS would represent all digital
computers in the world, not just 'standard' PCs, but everything that comes with an electronic system
that employs digital algorithms – or can be an extension of such systems.
Physical (or 'hardware') and software components are inextricably connected in Cyber-Physical
Systems, with the potential to function in a variety of spatial and temporal modes. They can exhibit a
variety of behaviors that alter dynamically with the setting.
Cyber- Physical Systems (CPSs) are based on the seamless integration of computer algorithms and
physical components. These systems connect digital and analog devices, interfaces, sensors, networks,
actuators, and computers to the natural environment as well as to man-made objects and buildings.
Just as the Internet changed the way people interacted with information, cyber-physical systems are
changing how people engage with the real environment. Simultaneously, the size and intrinsic variety
of these systems provide enormous technical hurdles.
To formalize their design, manage and regulate them in a scalable, efficient, and secure manner, and
assure their use, new technical techniques are required.
When we look from a distance, the purpose served by both IoT and WoT is very similar. Their motive
is to connect smart devices to the internet. There are some minor differences on paper, but they play a
significant role when you know the critical meaning behind them. When trying to elaborate their
differences, the purpose each serves is the same, but the implementation is where the difference
becomes apparent.
When you compare the internet of things with cooking, it is the utensil of a dish. It does not get
affected by what is being put into it or the result. It is just serving its purpose as a medium for the
ingredients to be mixed. It connects all the ingredients but does not confirm whether the outcome will
be delicious or sour.
Whereas, when we talk about the web of things, all the other necessary things build the entire recipe -
ingredients, spices, herbs, or stove. Everything combines to become the web of things.
IoT is the resolved networking layer between all the devices. That means every individual device
needs a medium to communicate with one another. IoT development services serve the purpose of
providing every device with a medium to transport information from point A to point B.
However, it has nothing to do with how the data transfers, what the information is, or the purpose of
reaching the desired destination. This is a huge limitation that becomes quite noticeable.
Without such standards, it doesn’t make sense to call it the “internet” of things. WoT bridges this gap
as it works as an application layer. WoT fixes the rules of the road. The pure existence of WoT is to set
systematic paths for the information to transfer between points and ensure compatibility with source
and destination.
WoT is not a competition or a substitute for IoT but rather a subset of it. The purpose of WoT is to
enhance the features of IoT. It fulfills the purpose by curating the standard definitions and models on
how the devices will be represented on the internet.
The Web of Things (WoT) Architecture:
The WoT is composed of many different progressing architectural standards. Many organizations
proposed the standards prompted by W3C. This complete standardization by the world wide web
consortium is the foundation of various building blocks. These are:
Layer 1 - Accessibility / Access
Layer 2 - Findability / Find
Layer 3 - Sharing / Share
Layer 4 - Composition / Compose
Let’s dive into these to gain a better understanding.
Layer 1- Accessibility:
This layer converts anything into a web thing. This will enable us to interact with the converted web
thing with HTTP requests. To put it more simply, a web thing is a REST API that permits us to
communicate with anything in the actual world.
HTML
REST API
URL / URI
Gateway
HTTP
Layer 2 - Find-ability:
It is one thing to make the data more accessible, but it is wholly different than the applications can
understand what the data is or the purpose. For this purpose, the second layer comes into action.
It ensures that other HTTP users can use your device, and it is easily discover-able and workable by
different WoT applications. It is done by resting the semantic web standards to explain the things and
their purpose of existing.
REST Crawler
Linked Data
Link Header
Search Engines
JSON
Layer 3 - Sharing:
Just like you secure your piggy bank away from your sibling’s reach, this layer does the same work
for WoT. This layer’s job is to find a safe way to transfer the data across services securely. Different
protocols are used at this level, such as TLS, OAuth, etc.
Social Networks
OAuth
RDFa
Encryption
Authentication
Layer 4 - Composition:
The fourth step is to find a way and tools to build an application for the web of things. At the
Composition layer, web tools span from web toolkits (JavaScript SDKs) that provide a higher-level
abstraction to dashboards with programmable widgets, and lastly, physical mashup tools like Node-
RED.
Systems Integration
Node-RED
Automated UI generation
Web Application
IFTTT
An Example of Web of Things (WoT) Application:
Let’s say you are trying to build a smart home, and you buy many IoT-enabled appliances such as
Smart TV, refrigerator, door, CCTV cameras, etc. To manage these things from your smartphone, you
will need to have different applications for different devices. Plus, you will need to ensure that these
devices communicate to put them in use.
Let’s understand this with a practical example. In case of a burglary, you want your CCTV camera to
give a signal to your security alarm system and warn you. This can be made possible by WoT as it
establishes communication protocols and standards to create a ‘web’ of things.