0% found this document useful (0 votes)
32 views33 pages

Unit-1: Internet of Things (Iot)

Uploaded by

Abhishek Rawat
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views33 pages

Unit-1: Internet of Things (Iot)

Uploaded by

Abhishek Rawat
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 33

UNIT-1

1. IoT:
Introduction: IoT stands for Internet of Things. It refers to the interconnectedness of physical
devices, such as appliances and vehicles, that are embedded with software, sensors, and
connectivity which enables these objects to connect and exchange data. This technology
allows for the collection and sharing of data from a vast network of devices, creating
opportunities for more efficient and automated systems.
Internet of Things (IoT) is the networking of physical objects that contain electronics
embedded within their architecture in order to communicate and sense interactions amongst
each other or with respect to the external environment. In the upcoming years, IoT-based
technology will offer advanced levels of services and practically change the way people lead
their daily lives. Advancements in medicine, power, gene therapies, agriculture, smart cities,
and smart homes are just a few of the categorical examples where IoT is strongly established.
IOT is a system of interrelated things, computing devices, mechanical and digital machines,
objects, animals, or people that are provided with unique identifiers. And the ability to transfer
the data over a network requiring human-to-human or human-to-computer interaction.
Characteristics:

 Massive Scalability and Efficiency: IoT is designed to handle a huge number of


devices efficiently, far more than traditional systems.
 IP Address Limitations: Traditional IP-based addressing (like assigning unique
numbers to devices) won’t work for the enormous number of devices in IoT. New
methods are needed.
 Non-IP Devices: Many physical objects don’t rely on IP addresses to connect, and
IoT makes it possible to link them in smart ways.
 Low Power Consumption: IoT devices use minimal energy. When they aren’t
needed, they can automatically enter "sleep mode" to save power.
 Dynamic Connectivity: Devices might not stay connected to each other all the
time. They can connect and disconnect as needed.
 Intermittent Connectivity: IoT devices often turn off or disconnect periodically to
save battery and reduce data usage. This means they’re not always online, which
helps keep them efficient and reliable.

Application:

1. Smart Homes

 Smart thermostats, lighting, smart locks, and home security systems.


 Benefits: Energy efficiency, automation, and convenience.

2. Healthcare

 Wearable devices (fitness trackers, ECG monitors), remote patient monitoring,


and smart pill dispensers.
 Benefits: Real-time health data, improved patient care, and early detection.

3. Agriculture
 Smart irrigation systems, soil sensors, and drones for crop monitoring.
 Benefits: Better resource management, higher crop yields, and reduced waste.

4. Transportation

 GPS-enabled fleet tracking, smart traffic management systems, and autonomous


vehicles.
 Benefits: Reduced congestion, real-time tracking, and improved logistics.

5. Industrial Automation (IIoT)

 Sensors for machinery health monitoring, robotics, and predictive maintenance


systems.
 Benefits: Reduced downtime, increased efficiency, and lower operational costs.

6. Retail

 Smart shelves, automated checkout systems, and personalized in-store


experiences.
 Benefits: Better inventory management and enhanced customer satisfaction.

7. Smart Cities

 Smart streetlights, waste management systems, and environmental monitoring.


 Benefits: Improved urban living, energy savings, and pollution control.

8. Energy Management

 Smart meters, grid monitoring devices, and renewable energy integration


systems.
 Benefits: Energy conservation and optimized power distribution.

9. Education

 Smart classrooms, connected whiteboards, and IoT-enabled learning devices.


 Benefits: Interactive learning and better access to resources.

10. Logistics and Supply Chain

 IoT-enabled tracking of goods, warehouse automation, and cold chain


monitoring for perishables.
 Benefits: Enhanced visibility, reduced losses, and faster delivery times.

2. Role of "Things" in IoT

The "things" in IoT refer to the physical devices, objects, or entities connected to the network.
They are responsible for:
1. Data Generation

 Devices like sensors, cameras, and trackers collect data from their environment
(e.g., temperature, humidity, motion).
 Example: A thermostat measures room temperature.

2. Actuation

 Actuators in devices respond to commands by performing physical actions.


 Example: A smart light turning on/off based on user input.

3. Communication

 Devices transmit collected data to other devices, gateways, or servers.


 Example: A smart refrigerator notifying the user when food is running low.

4. Autonomy

 Many IoT devices can make decisions locally without needing constant internet
access.
 Example: A robot vacuum cleaning based on a pre-set schedule.

5. Resource Constraints

 IoT devices are often designed to be energy-efficient and lightweight for specific
tasks.

3. Role of the "Internet" in IoT

The "internet" enables connectivity, communication, and collaboration between devices and
systems. It plays a key role in:

1. Data Transmission

 Provides the medium for devices to send and receive data, either to a local hub, the
cloud, or another device.
 Example: A wearable fitness tracker syncing health data to a smartphone app.

2. Remote Access

 Enables users to interact with and control devices from anywhere.


 Example: Turning on home lights via a smartphone app while away.

3. Data Processing and Analytics

 Allows data to be processed in the cloud or on edge devices for actionable insights.
 Example: Analyzing sensor data to predict equipment failures.
4. Interoperability

 Facilitates communication between devices, systems, and protocols regardless of


location.
 Example: Smart home devices from different manufacturers working together.

5. Scalability

 The internet supports large-scale deployment, allowing millions of devices to be


connected and managed.

6. Integration with Other Systems

 IoT systems can integrate with external platforms like AI, machine learning, and
big data through the internet.
 Example: Smart city systems using AI to analyze traffic data collected via IoT.

4. Privacy and Trust in IoT Devices

In the context of IoT, privacy refers to the protection of personal data collected by IoT
devices from unauthorized access, use, or disclosure. Trust, on the other hand, pertains
to the confidence that users have in the IoT devices and the ecosystem to function
reliably, securely, and ethically.

1. Privacy in IoT

IoT devices collect a wide variety of sensitive information, such as location data, health
records, and daily habits. Privacy challenges arise because:

 Devices often operate continuously, collecting data without explicit user


awareness.
 Data is frequently transmitted to remote servers (cloud storage), where it can be
vulnerable to breaches or unauthorized use.
 Many IoT devices lack robust mechanisms to inform users about what data is
being collected and how it is used.

Examples of Privacy Concerns

 Smart Cameras: A home security camera stores footage in the cloud. If the
cloud service is hacked, personal videos may be leaked.
 Wearable Health Devices: A fitness tracker monitors your heart rate and
location. If this data is sold to advertisers without consent, it compromises
privacy.

Mitigating Privacy Risks


 Implementing data encryption during transmission and storage.
 Providing clear privacy policies and user consent mechanisms.
 Limiting data collection to only what is necessary for the device to function.

2. Trust in IoT

Trust involves user confidence that:

 The IoT device will work as advertised.


 Data collected will not be misused.
 The device will maintain robust security protocols to protect user data.

Examples of Trust Issues

 Smart Thermostats: If a smart thermostat fails to regulate temperature during a


winter night due to server downtime, it undermines user trust.
 Data Misuse by Manufacturers: If a manufacturer sells personal data collected
from devices without informing users, it damages trust.

Building Trust

 Ensuring device reliability through rigorous testing and updates.


 Adopting transparent policies about data collection, sharing, and retention.
 Implementing certification standards (e.g., ISO, GDPR compliance).

Illustrative Example

A smart speaker (e.g., Amazon Echo or Google Home) is a good example for discussing
privacy and trust.

1. Privacy Issue:

o The device listens for wake words and sometimes records conversations
unintentionally. These recordings may be uploaded to servers, where
they can be accessed by employees for quality control, risking sensitive
information exposure.
o Mitigation: Allow users to delete recordings and turn off voice activation
when not in use.

2. Trust Issue:

o If the speaker fails to recognize commands or activates erroneously,


users may lose confidence in its functionality.
o Mitigation: Regular software updates and clear communication about
known issues and fixes.
Conclusion

Privacy and trust are critical for the widespread adoption of IoT. Users must be assured
that their data is protected, and devices are reliable. Manufacturers need to prioritize
transparency, security, and ethical data handling to address these concerns effectively.

5. Web Of Things

Definition: The Web of Things (WoT) is a framework that leverages existing web technologies
(like HTTP, WebSockets, and REST APIs) to integrate IoT devices into a unified, interoperable
system. It aims to simplify the development and management of IoT systems by providing
standardized web-based interfaces for devices, services, and platforms.

Instead of reinventing protocols for IoT, WoT builds on widely used web standards to ensure
compatibility and scalability. It is developed under the guidance of organizations like the World
Wide Web Consortium (W3C).

# Core Components of WoT

1. Thing Description (TD)

Defines the metadata, properties, actions, and events of a "thing" (IoT device).

Example: A smart lightbulb's TD might specify its brightness level and on/off state.

2. Binding Templates

Maps WoT interfaces to underlying IoT protocols like MQTT, CoAP, or Bluetooth.

Ensures compatibility across diverse communication methods.

3. Scripting API

Provides developers with web APIs to interact with devices and build applications.

Example: A JavaScript API for controlling smart home devices via a browser.

Security Mechanisms

# Applications of WoT
1. Smart Homes

WoT enables seamless integration of devices like smart thermostats, lighting systems, and
security cameras, allowing centralized control through a single web interface.

Example: Using a web browser to turn off all lights and lock doors.

2. Healthcare

Remote monitoring of patient vitals through connected devices that communicate securely over
the web.

Example: Real-time tracking of heart rate using wearables integrated into a hospital's system.

3. Industrial Automation

WoT supports monitoring and controlling factory equipment through web-based dashboards.

Example: Tracking machine performance and scheduling maintenance remotely.

4.Smart Cities

Integrating public infrastructure like traffic lights, waste management systems, and air quality
monitors into web-accessible platforms.

Example: Adjusting streetlights dynamically based on traffic patterns.

4. Agriculture

Monitoring soil moisture, weather conditions, and crop health using web-based analytics.

Example: Automated irrigation systems triggered based on real-time data from sensors.

#Benefits of WoT

Interoperability: Works across different devices and protocols.

Scalability: Easily integrates more devices as needed.

Ease of Development: Utilizes familiar web technologies.

Flexibility: Adaptable to various domains like healthcare, agriculture, and smart cities.
# Standarization in IOT:

Definition: Standardization in IoT refers to the establishment of globally recognized protocols,


frameworks, and guidelines that ensure the seamless interoperability, security, and functionality
of IoT systems. As the IoT ecosystem involves a wide range of interconnected devices, sensors,
networks, and platforms from multiple manufacturers, standardization ensures that these devices
can communicate, interact, and function together efficiently and securely.

Importance/role of Standardization in IoT /iot architecture:

1. Interoperability:

 Standardization ensures that devices from different manufacturers, using different


technologies, can work together within the same IoT ecosystem. It eliminates
compatibility issues, allowing devices to communicate and exchange data smoothly.
 For example, if a user installs a smart thermostat, standardization ensures it can
integrate seamlessly with other smart devices like lights, cameras, or locks from
different manufacturers.
2. Security and Privacy:

 IoT devices often handle sensitive personal data (e.g., health information, location
data), which makes security and privacy essential. Standards define security
protocols, data encryption methods, and authentication mechanisms, ensuring that
IoT systems are secure and that user privacy is protected.
 Examples include TLS (Transport Layer Security) for secure communication and
OAuth for user authentication.

3. Global Adoption:

 Standardization ensures that IoT solutions can be implemented globally, across


different countries and industries. A common set of standards allows IoT devices to
work in various regions without compatibility or regulatory issues.
 Global standards ensure that IoT systems work internationally, enabling businesses
to deploy devices and services worldwide without worrying about region-specific
protocols or technical barriers.

4. Compatibility

 Ensuring Device and Platform Integration: IoT standards ensure that different
devices, regardless of the manufacturer, can operate together in a system. This
includes both hardware compatibility (sensors, devices) and software
compatibility (protocols, APIs).
 Example: A smart home system might have various components—like smart locks,
lighting systems, and voice assistants—manufactured by different companies. With
standardized communication protocols (like Wi-Fi or Z-Wave), these components
can all integrate into a single, cohesive system, ensuring compatibility.
UNIT-2

1. M2M (Machine to Machine):

Definition: Machine-to-Machine (M2M) refers to the direct communication between devices


or machines without human intervention. This communication occurs through networks,
enabling machines to share data and perform tasks autonomously. M2M is commonly used in
industrial applications where devices need to collect, transmit, and process data for automation
or monitoring purposes.

M2M Value Chain:

Definition: The M2M value chain describes the various components and stages involved in an
M2M system, from device creation to the final use of data. It involves multiple players and
processes, and each stage adds value to the overall solution.

 Devices/Sensors: The machines or devices equipped with sensors that collect data.
These could include temperature sensors, meters, actuators, or any equipment that
generates data for monitoring or control purposes.

 Connectivity: This layer connects the devices to the network. It can involve
cellular, Wi-Fi, Bluetooth, Zigbee, or other wireless communication technologies.
The connectivity enables the devices to transmit the data to other systems or
platforms.
 Network Infrastructure: This includes the hardware and software systems (e.g.,
cellular networks, routers) that ensure secure and reliable transmission of data
between devices and cloud platforms or servers.
 Data Processing/Management: Once the data is collected and transmitted, it is
processed, analyzed, and managed. This involves cloud platforms, data storage,
analytics tools, or edge computing devices that handle the incoming data.
 Applications: These are the end-user applications or systems that interpret the
processed data and provide actionable insights. For example, a remote monitoring
system that alerts a user to take action when a threshold is exceeded.
 End Users/Decision Makers: The final step involves using the data for decision-
making, either by human users or automated systems. For example, a business
might use M2M data to manage inventory or predict equipment maintenance.

2. IOT Value Chain:

Definition: The IoT value chain is similar to the M2M value chain but is more comprehensive,
covering a wide range of devices, applications, and services across various industries. It
integrates devices, networks, data platforms, analytics, and applications into an interconnected
system.

 Devices/Sensors: Just like in M2M, IoT systems rely on devices and sensors to
collect data. These could be anything from wearables, smart appliances, industrial
machines, to health-monitoring devices.
 Connectivity: Connectivity in IoT involves not only traditional networks (cellular,
Wi-Fi, etc.) but also emerging technologies like 5G, LPWAN (Low Power Wide
Area Networks), and satellite networks. Connectivity ensures the data flows
between devices, cloud servers, and other platforms.
 Edge Computing: In IoT, there is often an additional layer of edge computing.
Edge computing involves processing data closer to where it is generated (at the
device or local gateway), which reduces latency and bandwidth usage and enables
real-time decision-making.
 Data Storage and Cloud Platforms: The cloud is often used in IoT to store large
volumes of data, provide computing resources, and offer the infrastructure needed
for processing and analytics. Cloud platforms such as AWS, Microsoft Azure, and
Google Cloud are popular for IoT solutions.
 Data Analytics and Artificial Intelligence (AI): After the data is collected and
stored, analytics tools and AI algorithms process this data to derive insights.
These could include predictive analytics (e.g., for equipment failure), optimization
algorithms, or machine learning models for pattern recognition.
 Applications: These are software solutions or services that use the processed data
to provide value to users. IoT applications could be found in many sectors,
including smart homes (controlling lighting, HVAC), healthcare (remote patient
monitoring), smart cities (traffic management), and industrial IoT (predictive
maintenance).
 End Users/Decision Makers: Ultimately, human users or automated systems take
actions based on the insights generated by the IoT solution. These actions could
range from changing environmental settings (e.g., adjusting a thermostat), sending
maintenance alerts, or generating reports for management decisions

3. Architecture of IOT:
4. Architecture of M2M:

Here's a comparison of M2M (Machine-to-Machine) and IoT (Internet of Things)


in tabular form:

Aspect M2M (Machine-to-Machine) IoT (Internet of Things)


Devices communicating A network of interconnected devices
Definition directly with each other without communicating with each other and
human involvement. the internet.
Limited to machine-to-machine
Broader ecosystem including devices,
Scope communication, often in
cloud, humans, and analytics.
industrial settings.
Uses private networks (cellular, Uses the internet, with multiple
Connectivity Wi-Fi, wired) for communication protocols (Wi-Fi, 5G,
communication. LPWAN, etc.).
Processed in the cloud, with possible
Data Processed locally (on-site) or in
edge computing and advanced
Processing a centralized server.
analytics.
Simpler systems focused on More complex systems involving
Complexity machine communication and cloud computing, analytics, and
data transmission. human-device interaction.
Primarily in industries like
Includes smart homes, healthcare,
Applications manufacturing, logistics, and
agriculture, smart cities, and more.
utilities.
User Typically involves operators or Includes human interaction through
Aspect M2M (Machine-to-Machine) IoT (Internet of Things)
Involvement technicians managing apps, smart assistants, and more.
machines.
Devices, cloud platforms, and humans
Data Machines exchange data with
interact to provide insights and
Interaction minimal human involvement.
actions.
Focuses on securing devices, data,
Security and Focused on securing devices
and networks, with emphasis on
Privacy and networks.
privacy (especially for personal data).
A smart home system with connected
A vending machine sending
Example devices (thermostats, lights)
data when it needs refilling.
controlled via an app.
5. Elaborate the role of international driven global value chains and global information

monopolies in shaping the development of IoT technologies

Role of International-Driven Global Value Chains (GVCs) in IoT


Development:

1. Fragmentation of Production and Specialization:


Global value chains (GVCs) allow the division of labor across countries,
enabling firms to specialize in different stages of IoT development, such as
hardware manufacturing, software development, and systems integration.
2. Cost Optimization and Innovation:
By leveraging GVCs, IoT developers can source components and expertise from
regions with comparative advantages, reducing costs and fostering innovation.
For instance, hardware may be sourced from East Asia, while software
development and data analytics occur in Silicon Valley.
3. Access to Global Markets:
GVCs ensure that IoT technologies, once developed, can penetrate global
markets efficiently. Companies like Apple and Samsung use their extensive
GVC networks to distribute IoT-enabled products worldwide.
4. Collaboration and Technology Transfer:
Cross-border collaboration within GVCs facilitates the transfer of technologies
and best practices. Multinational corporations (MNCs) play a pivotal role in
enabling local firms in developing countries to adopt and improve IoT
technologies.
5. Standardization Efforts:
GVCs promote the establishment of global standards for IoT devices and
protocols, ensuring interoperability and fostering widespread adoption.

Role of Global Information Monopolies in IoT Development:

1. Data Control and Monetization:


Major technology companies, such as Google, Amazon, and Microsoft, hold vast
amounts of data that serve as the backbone for IoT solutions. Their control over
information infrastructure and platforms shapes the direction of IoT innovation.
2. Infrastructure Dominance:
These monopolies provide critical infrastructure such as cloud computing, edge
computing, and AI tools, which are integral to IoT deployment. For example,
Amazon Web Services (AWS) powers numerous IoT applications.
3. Platform Ecosystems:
Global monopolies create IoT ecosystems (e.g., Google's Nest or Amazon's
Alexa) that lock users into their platforms, influencing device compatibility and
user experience standards.
4. Research and Development Leadership:
With their vast financial resources, global monopolies lead in IoT research and
development, often setting the agenda for technological progress and application
areas.
5. Market Concentration and Barriers to Entry:
These firms consolidate control over key aspects of IoT, such as proprietary
software and patents, which can stifle competition and limit innovation from
smaller players.
1. State Of Arts in IoT:

The state of the art in Internet of Things (IoT) architecture includes the following:
 Components: Sensors, actuators, devices, gateways, and cloud number
 Stages: The main stages of IoT architecture are sensors and actuators, internet and
gateways, and edge analytics
 Layers: IoT architecture is laid out across four layers: physical, network,
middleware, and application
 Application layer: This layer provides user interfaces like mobile apps and
dashboards that allow users to interact with the system
 Network layer: This layer is responsible for data forwarding, routing, and
addressing
 Number of connected devices: The number of connected IoT devices is growing
rapidly. IoT Analytics expects the number of connected IoT devices to grow from
16.6 billion at the end of 2023 to 18.8 billion by the end of 2024
 Applications: IoT-based technology is being used in many applications, including
smart homes, autonomous vehicles, medicine, power, gene therapies, agriculture,
and smart cities

2. IOT Reference Model:

1. Perception Layer (Physical Layer)

 Purpose: This is where the physical world is sensed. It involves the sensors,
actuators, and devices that gather information from the environment. The data
generated here is critical for any IoT system, as it provides the foundation for all
subsequent operations.
 Examples: Sensors (temperature, humidity, motion), RFID, GPS, cameras, and
other devices collecting data from the environment.

2. Network Layer (Transport Layer)

 Purpose: The network layer is responsible for transferring the collected data
from the perception layer to other layers, such as the processing or application
layer. It uses various communication protocols and infrastructure to transmit
data.
 Examples: Communication technologies such as Wi-Fi, Bluetooth, LoRaWAN,
Zigbee, 5G, Ethernet, and cellular networks.

3. Edge Layer (Edge Computing Layer)

 Purpose: This layer is about processing data closer to where it is generated,


reducing latency, and optimizing bandwidth. Edge computing is becoming
critical for time-sensitive IoT applications like autonomous vehicles, industrial
automation, and smart homes.
 Examples: Local devices (e.g., gateways), edge servers, and processing units
that enable real-time data analysis and decision-making without needing to send
data to the cloud.

4. Processing Layer (Data Processing Layer)

 Purpose: This layer handles data management, processing, and storage. It is


where most of the data analytics take place, either in the cloud or centralized
servers. It handles large-scale data processing (big data) and analytics using
cloud-based services or on-premise servers.
 Examples: Cloud platforms (AWS IoT, Microsoft Azure, Google Cloud IoT),
big data technologies, databases, and real-time analytics tools.

5. Application Layer

 Purpose: This layer is the interface between the end-user and the IoT system. It
provides the domain-specific services and applications that leverage the data
processed in previous layers. The application layer is responsible for the
functionality that users experience.
 Examples: Applications for smart homes, healthcare monitoring, industrial
automation, agriculture, and smart cities.

6. Business Layer

 Purpose: The business layer manages and ensures that the IoT system aligns
with business objectives. It is responsible for business logic, data management,
and system-level decisions such as service management, analytics, and
enterprise integration.
 Examples: Business models, analytics, service-level agreements (SLAs), and
integration with enterprise systems.

7. Management Layer

 Purpose: This layer is focused on the overall management and governance of


the IoT system. It covers device management, security, data governance, and
ensuring system operations meet performance requirements. It provides the
necessary administrative functions to monitor, control, and optimize the IoT
system.
 Examples: Device management platforms, security protocols (authentication,
encryption), network monitoring, firmware updates, and patch management.
3. ISO stack:

The ISO stack refers to a layered architecture model developed by the International
Organization for Standardization (ISO) for communication protocols and network
design. It is typically associated with the OSI (Open Systems Interconnection) model,
which standardizes the communication functions of computer networks.

Key Points about the ISO Stack (OSI Model):

Purpose: The ISO stack, specifically the OSI model, standardizes and describes
the layers involved in computer network communication, ensuring
interoperability between different systems and technologies.

7 Layers: The OSI model divides network communication into 7 layers, from
physical transmission to user-level application support:

1. Layer 1: Physical Layer – Deals with the hardware and transmission medium (e.g.,
cables, switches).
2. Layer 2: Data Link Layer – Handles error detection, and framing (e.g., Ethernet).
3. Layer 3: Network Layer – Manages routing and IP addressing (e.g., IP).
4. Layer 4: Transport Layer – Ensures reliable data transfer (e.g., TCP/UDP).
5. Layer 5: Session Layer – Manages sessions and connections (e.g., API calls).
6. Layer 6: Presentation Layer – Handles data translation, encryption, and compression
(e.g., JPEG, SSL).
7. Layer 7: Application Layer – Provides end-user services and interfaces (e.g., HTTP,
FTP).

Relation to IoT: While the OSI model is foundational in network


communication, IoT architecture (such as the 7-layer IoT reference model)
can be considered an evolution of layered models, applying similar principles to
the unique requirements of IoT systems
4. Functional View

 Purpose: Focuses on the functions or capabilities of the system and how these
functions interact.
 Key Elements:
o Defines system components and their roles.
o Describes how services are delivered.
o Explains interaction patterns between components or subsystems.
 Use in IoT:

o Specifies device functions (e.g., sensing, actuating).


o Details data processing workflows.
o Covers communication protocols for interaction.

 Example: In a smart home IoT system, the functional view describes:

o Sensors detecting temperature.


o Actuators controlling HVAC systems.
o Communication between devices via Zigbee or Wi-Fi.

5. Information View

 Purpose: Deals with the data handled by the system, including how it is
generated, stored, processed, and exchanged.
 Key Elements:

o Data flow: How data moves between system components.


o Data storage: Where and how data is stored.
o Data formats and standards: Ensuring consistency and interoperability.
o Security: Addressing data privacy and integrity.

 Use in IoT:

o Defines the structure of sensor-generated data.


o Specifies how data is processed at edge or cloud levels.
o Identifies security measures for data encryption.

 Example: In a smart agriculture IoT system:

o Sensors collect soil moisture and send data to the cloud.


o The cloud processes the data and sends watering schedules to actuators.

6. Deployment View

 Purpose: Focuses on the physical deployment of system components,


including hardware, networks, and software.
 Key Elements:

o Specifies the location of devices, servers, and infrastructure.


o Describes the communication topology (e.g., centralized, distributed).
o Outlines the physical constraints, such as power supply and
connectivity.

 Use in IoT:

o Details where IoT devices (e.g., sensors, gateways) are placed.


o Identifies cloud or on-premises servers for data processing.
o Describes network architecture (e.g., LoRaWAN for rural areas).

 Example: In a smart city IoT system:

o Cameras are deployed at traffic intersections.


o Data is sent to edge servers for quick processing.
o Cloud storage is used for historical data analysis.

7. Operational View

 Purpose: Concentrates on the ongoing operation and management of the


system, including monitoring, maintenance, and lifecycle management.
 Key Elements:

o Defines how the system is monitored and managed.


o Covers maintenance tasks, such as firmware updates.
o Explains scalability and fault-tolerance strategies.

 Use in IoT:

o Details device management (e.g., provisioning, health monitoring).


o Describes how the system responds to failures.
o Specifies real-time operational monitoring tools and alerts.

 Example: In an industrial IoT system:

o Sensors monitor machine vibrations for predictive maintenance.


o Anomalies trigger alerts in a dashboard for technicians.
o Automated scripts update device firmware during off-peak hours.
Functional View vs. Information View

Aspect Functional View Information View


How the system handles
Focus What the system does (functions or tasks).
data.
Describes the roles, interactions, and
Details data generation,
Purpose workflows between system components to
flow, storage, and security.
deliver specific capabilities.
- What data is being
- What are the system's core functions?
Key generated?
- How do components interact to achieve
Questions - How is data processed,
them?
stored, and exchanged?
Data management,
Primary System capabilities, services, and
exchange standards, and
Concern workflows.
security.
- Sensors send raw data to
- Sensors collect temperature data. cloud.
Example in
- Actuators control HVAC based on - Data is encrypted,
IoT
thresholds. processed, and stored in
databases.

Deployment View vs. Operational View

Aspect Deployment View Operational View


How the system is monitored,
Where and how system components are
Focus maintained, and operated over
physically deployed and connected.
time.
Specifies the physical and network
Ensures reliable operation, fault
Purpose architecture, including devices, servers,
tolerance, and system updates.
and connectivity.
- How is the system monitored?
- Where are the devices placed? - How are faults detected and
Key
- What network architecture is used? resolved?
Questions
- How are the devices connected? - How is performance
optimized?
System uptime, fault
Primary Physical placement, communication
management, scalability, and
Concern topology, and infrastructure.
lifecycle maintenance.
- Cameras are monitored for
- Smart cameras are placed at traffic
functionality.
Example in intersections.
- Alerts are triggered if a camera
IoT - Data is sent to edge servers for real-
fails or requires a firmware
time processing.
update.
UNIT-4
1. IoT Applications for Value Creation:

Definition: The Internet of Things (IoT) creates value across various sectors by
enabling real-time data collection, automation, and improved decision-making. The
value IoT brings can be categorized into efficiency gains, cost reduction, enhanced
customer experiences, and new business models.

A. Industrial IoT (IIoT):

Industrial IoT (IIoT) applies IoT technologies to industrial environments like


manufacturing, energy, and logistics. It focuses on improving operational efficiency,
reducing costs, and ensuring workplace safety.

Applications in Industrial IoT

Predictive Maintenance:

1. Sensors on machinery monitor performance metrics like vibration,


temperature, and wear.
2. Alerts are sent before failures occur, minimizing downtime.

Process Automation:

1. Robots and automated systems streamline production processes.


2. IoT devices coordinate activities, improving efficiency and consistency.

Asset Tracking:

1. RFID tags and IoT sensors track assets in warehouses and supply chains.
2. Improves inventory management and reduces loss or theft.

Energy Management:

1. Smart meters and energy monitoring systems optimize power usage in


factories.
2. Helps cut energy costs and reduce carbon footprints.

Worker Safety:

1. Wearable IoT devices monitor workers' health (e.g., heart rate, exposure
to toxic gases).
2. IoT systems trigger alarms during unsafe conditions or accidents.

Benefits of IoT

 Improved Efficiency: Automation and real-time monitoring reduce errors and


increase throughput.
 Cost Reduction: Predictive maintenance minimizes repair costs and downtime.
 Enhanced Safety: IoT-enabled systems ensure safer working environments.
 Data-Driven Decisions: Analytics from IoT devices improve operational
strategies.

Example:

In automotive manufacturing, IoT sensors monitor assembly lines to detect bottlenecks


or faults, ensuring seamless production flow and product quality.

B. IoT in Agriculture (Smart Farming)

IoT in agriculture, also called smart farming, leverages IoT technology to improve
farming efficiency, crop yield, and resource management.

Applications in Smart Farming

Precision Agriculture:

1. IoT devices like soil sensors and drones monitor soil quality, moisture
levels, and crop health.
2. Farmers receive actionable insights to apply water, fertilizers, or
pesticides only where needed, reducing waste.

Smart Irrigation:

1. IoT-enabled irrigation systems optimize water usage by activating only


when soil moisture drops below a certain threshold.
2. Saves water and ensures better crop hydration.

Livestock Management:

1. Sensors on animals track health metrics, movement, and feeding patterns.


2. Prevents diseases and optimizes breeding cycles.

Environmental Monitoring:

1. IoT devices monitor weather conditions, predicting frost, rainfall, or


droughts.
2. Helps farmers make proactive decisions.

Benefits of IoT in Agriculture

 Increased Productivity: Real-time data and analytics lead to better decision-


making.
 Resource Optimization: Minimizes water, fertilizer, and pesticide usage.
 Sustainability: Reduces environmental impact with precise resource
management.
 Cost Savings: Automation reduces labor and material costs.
Example:

In vineyards, smart sensors monitor soil moisture, temperature, and sunlight to


determine the best times to water or harvest crops, improving wine quality.

C. Smart Objects in IoT

Smart objects are IoT-enabled devices embedded with sensors, actuators, and
communication capabilities. These objects can perceive their environment, process data,
and interact with other devices or systems, enabling autonomous or semi-autonomous
decision-making.

Characteristics of Smart Objects

1. Embedded Intelligence: Equipped with sensors and processors to gather and


analyze data.
2. Communication Ability: Use protocols like Wi-Fi, Bluetooth, Zigbee, or
LoRaWAN to share data with networks or other devices.
3. Autonomy: Can perform specific tasks with minimal human intervention.
4. Interactivity: Respond to external commands or environmental stimuli.

Examples of Smart Objects

 Smart Home Devices: Smart thermostats, lights, and security cameras.


 Wearable Devices: Fitness trackers and health monitors.
 Industrial Tools: Predictive maintenance tools and connected machinery.
 Smart Farming Equipment: Soil sensors and automated irrigation systems.

D. IoT in Retail and Supply Chain: Applications in Detail

The retail and supply chain industry benefits greatly from IoT by improving efficiency,
enhancing customer experience, and enabling real-time decision-making. Below are
detailed applications:

1. Retail Applications

IoT helps retailers create a seamless shopping experience, optimize inventory, and
improve customer satisfaction.

Key Applications:

Smart Shelves:

1. Use RFID tags and weight sensors to monitor product availability in real time.
2. Notify staff when items need restocking.
3. Reduce inventory errors and prevent stockouts.
Personalized Shopping Experience:

1. IoT devices track customer movements and preferences in-store using beacons.
2. Provide personalized offers or recommendations based on browsing history or
location.
3. Example: A beacon sends a discount notification for an item a customer is viewing.

Automated Checkouts:

1. IoT-enabled sensors and cameras allow customers to pick items and leave, with
payments processed automatically (e.g., Amazon Go stores).
2. Eliminates the need for traditional checkout lines.

Energy Management:

1. IoT-enabled smart lighting and HVAC systems optimize energy usage in retail stores.
2. Reduce operational costs while maintaining comfort for customers.

Theft Prevention:

1. IoT-connected surveillance systems and RFID tags improve loss prevention.


2. Alerts are generated in real time if unauthorized removal of products is detected.

2. Supply Chain Applications

IoT transforms supply chains by providing visibility, traceability, and automation.

Key Applications:

Asset Tracking:

1. IoT sensors and GPS trackers monitor the location of goods in transit.
2. Provide real-time updates, ensuring on-time delivery and reducing lost shipments.
3. Example: A logistics company tracks refrigerated goods to ensure temperature
compliance.

Inventory Management:

1. RFID and IoT sensors provide real-time data on stock levels in warehouses.
2. Automates reordering processes to prevent overstocking or understocking.
3. Reduces waste and optimizes storage space.

Predictive Maintenance:

1. IoT sensors monitor the health of transport vehicles and equipment.


2. Predict and prevent breakdowns, ensuring smooth logistics operations.

Cold Chain Monitoring:


1. Sensors in refrigerated trucks track temperature, humidity, and other conditions.
2. Alerts are sent if the environment deviates from acceptable ranges, preventing
spoilage.
3. Example: Ensuring pharmaceuticals or perishable food are transported under ideal
conditions.

Dynamic Routing:

1. IoT systems use real-time traffic and weather data to optimize delivery routes.
2. Reduces fuel consumption, delivery times, and costs.

Blockchain Integration:

1. IoT devices feed real-time data into blockchain systems for traceability.
2. Ensures transparency and authenticity of goods, especially in industries like food and
pharmaceuticals.

E. IoT in eHealth: Applications in Detail

The Internet of Things (IoT) in healthcare, also referred to as the Internet of Medical
Things (IoMT), is transforming patient care by enabling remote monitoring, early
diagnosis, and data-driven insights.

Key Applications of IoT in eHealth

Remote Patient Monitoring (RPM):

1. IoT devices like wearable sensors track vital signs (heart rate, blood pressure, glucose
levels) and send data to healthcare providers.
2. Enables doctors to monitor chronic conditions without requiring hospital visits.
3. Example: A diabetic patient uses a connected glucometer to send real-time glucose
readings to their doctor.

Telemedicine:

1. IoT devices support telehealth consultations by providing real-time patient data during
virtual visits.
2. Enables diagnosis and treatment without physical proximity.

Smart Medical Devices:

1. IoT-enabled devices like connected inhalers, smart insulin pens, and cardiac monitors
help patients manage their conditions.
2. Example: A smart asthma inhaler tracks usage patterns and environmental conditions
to alert patients about potential triggers.

Hospital Asset Management:

1. IoT tags track medical equipment like wheelchairs, defibrillators, and infusion pumps.
2. Ensures timely availability and reduces equipment misplacement.

Medication Adherence:

1. Smart pill dispensers remind patients to take medications at prescribed times.


2. Tracks adherence and sends alerts to caregivers or doctors in case of missed doses.

Emergency Response

1. Wearable IoT devices detect falls, abnormal heart rhythms, or other emergencies and
notify emergency services.
2. Saves lives by reducing response times.

Real-Time Health Data Analysis:

1. IoT sensors collect large volumes of patient data, enabling AI-driven analysis for early
detection of diseases.
2. Example: Wearables detect early signs of cardiac events, allowing preventive measures.

2.Brownfield IoT

Brownfield IoT refers to the integration of IoT technologies into existing systems,
equipment, or infrastructure that were not originally designed with IoT capabilities.
Unlike greenfield IoT, which involves building IoT systems from scratch, brownfield
IoT focuses on retrofitting and upgrading legacy systems to make them IoT-enabled.

Key Characteristics of Brownfield IoT:

Retrofitting Existing Systems:

1. Enhances functionality without replacing the existing infrastructure.


2. Achieved by adding IoT sensors, gateways, and communication modules.

Interoperability:

1. Ensures seamless communication between old systems and new IoT


components.
2. Often requires adapters or middleware to bridge the technology gap.

Cost-Effective:
1. Saves costs compared to full system replacements.
2. Maximizes the value of existing investments.

Incremental Deployment:

1. Allows gradual adoption of IoT capabilities.


2. Minimizes disruptions to ongoing operations.

Applications of Brownfield IoT

Manufacturing:

1. Retrofitting legacy machines with IoT sensors for predictive maintenance


and real-time monitoring.
2. Example: Adding vibration and temperature sensors to old CNC
machines to track performance.

Utilities:

1. Upgrading traditional electric grids with IoT sensors for smart grid
capabilities.
2. Example: Installing smart meters on existing power infrastructure for
real-time energy usage tracking.

Transportation:

1. Equipping older vehicles or fleets with GPS trackers and IoT


connectivity for fleet management.
2. Example: Retrofitting buses with IoT systems to enable real-time
location tracking for passengers.

Healthcare:

1. Adding IoT capabilities to legacy medical devices for remote monitoring.


2. Example: Retrofitting traditional hospital beds with IoT sensors to track
patient movements and vital signs.

Buildings:

1. Transforming existing buildings into smart buildings by integrating IoT-


enabled lighting, HVAC, and security systems.
2. Example: Retrofitting HVAC systems with IoT sensors for energy-
efficient operation.

Challenges of Brownfield IoT


Compatibility Issues:

1. Legacy systems often lack standard interfaces or protocols for IoT


integration.

Security Risks:

1. Retrofitted systems may have vulnerabilities due to outdated software or


hardware.

Complexity:

1. Integrating IoT into diverse legacy systems can be technically


challenging.

Cost of Retrofitting:

1. While cheaper than full replacement, the cost of retrofitting multiple


systems can still be significant.

Scalability Constraints:

1. Legacy systems may limit the scalability of IoT solutions.

Benefits of Brownfield IoT

Cost Savings:

1. Avoids the high costs associated with replacing existing infrastructure.

Faster Implementation:

1. Integration is quicker compared to building new systems from scratch.

Preserves Investments:

1. Extends the life and value of legacy systems.

Improved Efficiency:

1. Enhances existing operations with IoT-driven insights and automation.

Minimized Disruption:

1. Allows businesses to continue operations while upgrading gradually.


2. Four aspects in Your Business to master IOT:

Here’s a table summarizing the four aspects to master IoT in your business:

Aspect Focus Area Key Actions Examples


- Define
objectives for
IoT use. - Predictive
- Conduct market maintenance in
Align IoT with
analysis to manufacturing.
1. Strategy and business goals and
identify - IoT-enabled
Vision define clear
opportunities. customer
objectives.
- Create a personalization
roadmap for in retail.
phased
implementation.
- Invest in IoT
hardware
(sensors, edge - RFID tags for
Establish a robust
devices). inventory.
2. Technology tech foundation
- Ensure reliable - LoRaWAN for
Infrastructure for IoT
connectivity (Wi- remote monitoring
implementation.
Fi, 5G, LPWAN). in agriculture.
- Strengthen IoT
cybersecurity.
- Set up data
collection - Predicting
systems. equipment
3. Data Extract actionable
- Leverage AI/ML failures in IIoT.
Analytics and insights from IoT-
for analytics. - Supply chain
Insights generated data.
- Use dashboards monitoring with
for real-time IoT analytics.
decision-making.
- Train employees
- IoT-enabled
in IoT and data
worker safety in
Ensure IoT is analysis.
industrial
4. seamlessly - Foster cross-
settings.
Organizational integrated into department
- Employee
Integration processes and collaboration.
training on IoT
culture. - Manage change
tools in
and ensure
healthcare.
compliance.
UNIT-5
1. Introduction

The Internet of Things (IoT) has transformed various industries by interconnecting


devices and enabling data-driven decision-making. However, the rapid adoption of IoT
has introduced significant challenges related to privacy, security, and governance.
Proper frameworks are essential to mitigate risks and maintain trust among users and
stakeholders.

2. Overview of Governance

Governance ensures the responsible and ethical management of IoT systems.

Key Aspects:

Establishment of Policies:

1. Define rules for IoT operation, data collection, and usage.


2. Ensure compliance with international and local regulations like GDPR
and HIPAA.

Stakeholder Roles:

1. Manufacturers: Design secure and compliant devices.


2. Users: Use devices responsibly and follow best practices.
3. Regulatory Bodies: Oversee compliance and enforce standards.

Interoperability Standards:

1. Enable seamless integration between diverse IoT devices and platforms.


2. Promote adoption of global standards like IEEE 802.15.4, MQTT, and
LoRaWAN.

Sustainability:

1. Ensure IoT deployments are energy-efficient and environmentally


friendly.

3. Privacy and Security Issues

IoT systems face unique challenges due to their distributed and resource-constrained
nature.

Privacy Challenges:
 Data Collection:

o IoT devices often collect sensitive information without user awareness.

 User Profiling:

o Data aggregation across platforms can lead to invasive profiling.

 Anonymity:

o Lack of robust anonymization techniques exposes user identities.

Security Challenges:

 Weak Authentication:

o Many devices lack strong password protocols.

 Vulnerable Firmware:

o Outdated software and firmware increase attack surfaces.

 DDoS Attacks:

o IoT botnets, like Mirai, exploit unsecured devices to launch attacks.

Example Scenarios:

 Smart Home: Unauthorized access to cameras or smart locks.


 Wearables: Breaches exposing health data.
 Smart Cities: Hacking of critical infrastructure systems.

4. Contribution from FP7 Projects

The European Union's Seventh Framework Programme (FP7) supported various


initiatives to enhance IoT privacy, security, and governance.

Key Contributions:

IoT-A (IoT Architecture):

o Developed a unified reference architecture for IoT systems.


o Focused on privacy-by-design principles.

IoT@Work
o Enhanced IoT solutions for industrial environments.
o Addressed interoperability and safety requirements.

SmartSantander:

o Created large-scale IoT testbeds in urban environments.


o Explored secure deployment models for smart cities.

5. Security, Privacy, and Trust in IoT Data-Platforms for Smart Cities

Smart cities rely heavily on IoT to manage resources and infrastructure efficiently.
However, this also raises concerns about the security and privacy of citizen data.

Key Considerations:

1. Data Lifecycle Management:

o Secure collection, storage, and deletion of data.

2. Trust Frameworks:

o Build trust among citizens by ensuring transparency in data use.

3. Secure Platforms:

o Use blockchain or distributed ledgers to ensure data integrity.

Challenges:

 Balancing data accessibility for city management with privacy concerns.


 Protecting critical infrastructure from cyber threats.

Solutions:

 Employ strong encryption for communication channels.


 Implement access controls for sensitive data.

6. First Steps Towards a Secure Platform

Building a secure IoT platform involves adopting a systematic approach:

Steps:

1. Threat Assessment:

o Identify potential vulnerabilities and risks in the system.


2. Secure Design:

o Implement security-by-design principles from the outset.

3. Authentication and Authorization:

o Use multi-factor authentication and role-based access controls.

4. Regular Updates:

o Ensure timely software and firmware patches.

5. Monitoring and Incident Response:

o Deploy intrusion detection systems (IDS) and define clear response


protocols.

Example Tools:

 Firewalls for IoT: Palo Alto, Cisco IoT Threat Defense.


 Intrusion Detection: Snort, Zeek.

7. Smartie Approach

The Smartie Project (Secure and Context-Aware Data Management in IoT) provides a
framework for managing IoT data securely.

Features:

 Data Ownership:

o Empower users with control over their data.

 Policy Enforcement:

o Ensure compliance with privacy policies.

 End-to-End Security:

o Secure data from device to cloud.

Use Case:

In smart cities, Smartie enables secure sharing of sensor data between citizens,
government, and private entities without compromising privacy.
Conclusion

IoT governance, security, and privacy are crucial to addressing the risks and ethical
concerns associated with interconnected systems. Leveraging frameworks like FP7
projects and Smartie, and implementing best practices, ensures the sustainable growth
of IoT in applications like smart cities and industrial automation.

You might also like