IoT Note Module 5

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

Department of Computer Science and

Engineering Programme: B.Tech in


Computer Science and
Engineering (AI)
Semester III
Course Name: Internet of Things
(ESCM301)

Module- 5: From the internet of things to the web


of things

1. The Future Web of Things


2. Set up cloud environment
3. Cloud access from sensors
4. Data Analytics for IOT
5. Rest Architectures- The web of Things, Resource Identification and
Identifier-
6. Richardson Maturity Model
Future Web of Things:

Connecting every thing to the Internet and giving them each an IP addresses is only the first step
toward realizing the Internet of Things. Things might easily exchange data with one another, but
they won’t necessarily understand what that data means. This is what Web protocols like HTTP
brought to the Internet: a universal way to describe images, text, and other media elements so that
machines could “understand” each. The Web of Things—or WoT—is simply the next stage in this
evolution: using and adapting Web protocols to connect anything in the physical world and give it a
presence on the World Wide Web.

The idea of the Web as an application layer for the IoT started to emerge in 2007. Web of Things
(WoT) describes a set of standards by the World Wide Web Consortium (W3C) for the
interoperability of different Internet of things platforms and application domains. The term "Web of
Things" (WoT) describes an idea in which physical objects are linked to the internet so they can
interact with other internet-enabled devices and with each other. By incorporating actual items into
the online world, it essentially expands upon the concepts of the Internet of Things (IoT).
In contrast to conventional Internet of Things solutions, which frequently depend on exclusive
protocols and communication techniques, the Web of Things makes use of common web technologies
like HTTP, WebSocket, and RESTful APIs. No matter what the underlying hardware or software of
various devices and platforms is, this standardization enables smooth compatibility between them.
The Web of Things facilitates the development, deployment, and integration of IoT solutions by
enabling devices to publish and consume data using web standards. By enabling devices to
communicate with one another independently, this method creates a more transparent and
decentralized environment that opens new avenues for automation, data sharing, and wise decision-
making.
The Web of Things promises to create a smarter and more connected world in which everyday
devices can easily interact with digital services to create a more responsive and effective
environment.

IoT vs Web of Things:

Aspect Internet of Things (IoT) Web of Things (WoT)


Extension of IoT that adds web technologies
Network of interconnected
Definition for enhanced connectivity and
physical devices
interoperability
Utilizes web protocols (HTTP,
Device-to-device communication
Communication WebSocket) for device communication
using various protocols
and data
exchange
Often relies on proprietary or
Built on open, standardized web
Architecture specialized protocols and
protocols and architectures
architectures
Data access and control may be
Facilitates data access and control
Data Access limited to proprietary platforms
through standardized web interfaces and
or protocols
APIs
Development may require
Utilizes familiar web development tools
Development specialized IoT platforms and
and technologies for application
frameworks
development
Security vulnerabilities due to Emphasizes security through
Security
diverse devices and protocols established web security mechanisms
and standards
Smart home devices (thermostats, Integration of smart home devices
Example
cameras, etc.) accessible via web browsers or
apps

Setting up a cloud environment for IoT

Setting up a cloud environment for IoT involves several key steps:

1. Choose a Cloud Platform: Select a cloud service provider such as AWS, Google Cloud, or
Microsoft Azure, which offers IoT-specific services like AWS IoT Core or Azure IoT Hub.
2. Set Up IoT Gateways: Install gateways that collect, filter, and transmit data from IoT devices
to the cloud. These gateways often use protocols like MQTT or HTTP.
3. Connect Devices: Register IoT devices on the cloud platform and configure them to
communicate with the cloud. This may require secure credentials or certificates to ensure
encrypted communication.
4. Develop APIs: Create APIs for device communication, enabling data collection, monitoring,
and control of devices remotely.
5. Establish Data Storage: Set up data storage solutions (such as databases or data lakes) to
store IoT-generated data for processing and analytics.
6. Set up Analytics and Monitoring: Use cloud-based analytics tools to process IoT data and
provide real-time insights. Monitoring tools are used to keep track of device health, uptime,
and performance.

Benefits of using cloud services for IoT applications

The benefits of using cloud services for IoT include:

 Scalability: Cloud platforms allow IoT applications to scale easily by handling increased
device connections and larger data volumes without the need for physical infrastructure
changes.
 Cost-Effectiveness: With pay-as-you-go models, organizations can avoid large upfront
infrastructure costs and pay only for the resources they use.
 Accessibility: Cloud environments make IoT data and devices accessible from anywhere with
internet access, enabling real-time monitoring and control.
 Data Processing and Analytics: Cloud platforms provide powerful data processing and
analytics tools, making it easier to analyze large datasets generated by IoT devices.
 Security and Compliance: Cloud providers offer built-in security features such as encryption,
identity management, and compliance certifications, making it easier to secure IoT
environments.

Handling sensor generated data in Cloud


Cloud platforms use a combination of scalable storage solutions, such as data lakes and distributed
databases, to manage the vast amounts of data generated by IoT devices. Data can be stored in
different formats depending on the use case, such as structured databases (SQL) or unstructured
storage (NoSQL or object storage). To process large datasets efficiently, cloud platforms often utilize
stream processing frameworks like Apache Kafka, AWS Kinesis, or Azure Stream Analytics. These
tools enable real-time analysis and decision-making, allowing organizations to act on data insights
quickly. Additionally, cloud platforms often support big data analytics, machine learning, and AI to
extract meaningful insights from IoT data.

Application of machine learning for advanced analytics IoT data

Machine learning (ML) can be applied to IoT data for a variety of advanced analytics tasks, such as:

 Anomaly Detection: ML algorithms can identify patterns in sensor data and detect
deviations that may indicate equipment malfunctions, security breaches, or unusual
environmental conditions.
 Predictive Modeling: ML models can predict future outcomes, such as when a device is
likely to fail (predictive maintenance) or how energy consumption will change based on
historical data.
 Classification: In smart homes or healthcare IoT, ML models can classify behaviors or
events, such as identifying normal vs. abnormal patient vital signs.
 Personalization: In consumer IoT, ML can personalize services based on user preferences
and behavior patterns, such as recommending actions or adjusting settings in a smart home
environment.

Challenges in analysing data from IoT devices and their remedies.

The key challenges in analysing data from IoT devices include:

Data Volume: IoT devices generate massive amounts of data, which can be overwhelming to store,
process, and analyze. Cloud platforms with scalable storage and processing capabilities, such as data
lakes and distributed computing frameworks, can help manage this volume.
Data Variety: IoT data can be highly diverse, including structured, semi-structured, and unstructured
data (e.g., sensor readings, images, logs). Using a combination of databases (SQL for structured,
NoSQL for unstructured) helps in managing data variety.
Data Velocity: The continuous flow of real-time data from IoT devices requires immediate
processing. Stream processing frameworks can help handle this fast-paced data flow.
Data Quality: IoT data can be noisy, incomplete, or inaccurate. Techniques like data cleaning,
filtering, and preprocessing are essential to ensure the quality and reliability of the data.
Security and Privacy: IoT devices are often vulnerable to security breaches, and the data they collect
may be sensitive. Implementing encryption, anonymization, and secure data transmission protocols
can help protect data privacy.

Difficulties faced by IoT devices in accessing cloud environments from remote locations.
IoT devices in remote locations face several challenges in accessing cloud environments:

 Network Connectivity: Remote areas may have unreliable or limited access to high-
speed internet, making continuous cloud connectivity difficult.
 Power Consumption: Maintaining network communication can be power-intensive, which
is problematic for battery-operated devices in remote areas.
 Latency: Sending data to distant cloud servers can result in high latency, making real-
time decision-making challenging.
 Security Risks: Remote devices may be more vulnerable to cyberattacks, particularly if
they use unsecured communication channels. Solutions like satellite communication, low-
power wide-area networks (LPWANs), and edge computing help mitigate these challenges
by
enabling local processing and intermittent cloud synchronization.

Security for cloud access from IoT sensors

Security is a major concern when IoT sensors access cloud environments, as these devices often
operate in remote or unsecured locations. Key security considerations include:
Encryption: Data should be encrypted both in transit (using TLS/SSL) and at rest to prevent
unauthorized access.
Authentication and Authorization: Each device must be securely authenticated using certificates or
tokens, ensuring that only authorized devices can communicate with the cloud.
Firmware Updates: Regular firmware updates are necessary to patch vulnerabilities and ensure that
devices remain secure.
Data Integrity: Mechanisms such as hashing and checksums should be employed to verify that data
has not been tampered with during transmission.
Anomaly Detection: Cloud-based analytics can help detect unusual behavior in IoT devices, potentially
signaling a security breach.

Edge computing

Edge computing plays a critical role in cloud-based IoT environments by processing data closer to the
source—at the “edge” of the network, near the IoT devices themselves. This reduces latency,
conserves bandwidth, and ensures that critical operations can continue even if cloud connectivity is
temporarily lost. In scenarios requiring real-time decision-making, such as autonomous vehicles or
industrial automation, edge computing can process and analyze data locally, sending only
important results or summaries to the cloud for further analysis. This hybrid approach balances the
benefits of local and cloud processing.

An example of edge computing:


A security camera in a remote warehouse uses AI to identify suspicious activity and only sends that
specific data to the main datacenter for immediate processing. So, rather than the camera burdening
the network 24 hours per day by constantly transmitting all of its footage, it only sends relevant
video clips. This frees up the company's network bandwidth and compute processing resources for
other uses.

Impact of 5G and future wireless technologies on the Future Web of Things

5G will significantly enhance the Future Web of Things by providing faster data transfer speeds,
lower latency, and more reliable connectivity, especially in high-density environments like smart
cities. This
will enable real-time data processing and decision-making, critical for applications like autonomous
vehicles, industrial automation, and augmented reality (AR). 5G’s massive machine-type
communication (mMTC) capabilities will support billions of connected IoT devices, while ultra-
reliable low-latency communication (URLLC) will enable mission-critical applications requiring real-
time responsiveness.

Method by which MQTT support low-power IoT devices in cloud communication.

MQTT (Message Queuing Telemetry Transport) is designed to support low-power IoT devices by
minimizing the overhead required for communication. It uses a lightweight publish-subscribe model
where devices send data to an MQTT broker, which then forwards the data to subscribed clients
(often the cloud). MQTT reduces network traffic by only transmitting data when necessary (event-
driven communication), and its small packet size lowers power consumption. Additionally, MQTT’s
ability to operate in environments with unreliable networks (thanks to its Quality of Service (QoS)
levels) makes it ideal for IoT devices that rely on low-power or intermittent network connections.

Security challenges in Future Web of Things

The Future Web of Things faces several security challenges, including vulnerabilities in connected
devices, data privacy concerns, and the potential for large-scale cyberattacks. Many IoT devices lack
robust security mechanisms due to resource constraints. Addressing these challenges requires the
adoption of encryption protocols (e.g., TLS), secure firmware updates, and identity management
frameworks like OAuth for device authentication. Blockchain technology can also play a role in
enhancing security by providing decentralized, tamper-proof transaction records for device
communications and access logs.

Digital twins

Digital twins are virtual models of physical objects or systems that replicate real-world processes. In
the Future Web of Things, digital twins will allow for real-time monitoring, simulation, and
optimization of connected devices and systems. For example, a digital twin of a smart city could
simulate traffic flow, energy consumption, and environmental conditions to improve urban planning.
By integrating IoT data with AI and machine learning, digital twins can predict potential failures or
inefficiencies, enabling more effective predictive maintenance and resource management.

You might also like