0% found this document useful (0 votes)
14 views12 pages

Unit 5 ICS

The document provides an overview of the Internet of Things (IoT), defining it as a network of interconnected devices that communicate and exchange data, with applications across various sectors such as healthcare and smart cities. It discusses the four pillars of IoT, including M2M communication, RFID, WSN, and SCADA, and emphasizes the importance of IoT security to protect against cyber threats. Additionally, it highlights the benefits of cloud computing as a cost-effective and flexible solution for managing IT resources.

Uploaded by

dedxd2004
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views12 pages

Unit 5 ICS

The document provides an overview of the Internet of Things (IoT), defining it as a network of interconnected devices that communicate and exchange data, with applications across various sectors such as healthcare and smart cities. It discusses the four pillars of IoT, including M2M communication, RFID, WSN, and SCADA, and emphasizes the importance of IoT security to protect against cyber threats. Additionally, it highlights the benefits of cloud computing as a cost-effective and flexible solution for managing IT resources.

Uploaded by

dedxd2004
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

Unit 5

Que. Explain overview of IOT

What Is an IoT Device?


IoT stands for Internet of Things. It refers to the interconnectedness of physical devices, such as
appliances and vehicles, that are embedded with software, sensors, and connectivity which enables
these objects to connect and exchange data. This technology allows for the collection and sharing of
data from a vast network of devices, creating opportunities for more efficient and automated
systems.
Internet of Things (IoT) is the networking of physical objects that contain electronics embedded
within their architecture in order to communicate and sense interactions amongst each other or with
respect to the external environment. In the upcoming years, IoT-based technology will offer
advanced levels of services and practically change the way people lead their daily lives.
Advancements in medicine, power, gene therapies, agriculture, smart cities, and smart homes are
just a very few of the categorical examples where IoT is strongly established.
IoT is network of interconnected computing devices which are embedded in everyday objects,
enabling them to send and receive data.
Over 9 billion ‘Things’ (physical objects) are currently connected to the Internet, as of now. In the
near future, this number is expected to rise to a whopping 20 billion.
Modern Applications:
1. Smart Grids and energy saving
2. Smart cities
3. Smart homes/Home automation
4. Healthcare
5. Earthquake detection
6. Radiation detection/hazardous gas detection
7. Smartphone detection
8. Water flow monitoring
9. Traffic monitoring
10. Wearables
11. Smart door lock protection system
12. Robots and Drones
13. Healthcare and Hospitals, Telemedicine applications
14. Security
15. Biochip Transponders (For animals in farms)
16. Heart monitoring implants (Example Pacemaker, ECG real time tracking)

Advantages of IoT:
1. Improved efficiency and automation of tasks.
2. Increased convenience and accessibility of information.
3. Better monitoring and control of devices and systems.
4. Greater ability to gather and analyze data.
5. Improved decision-making.
6. Cost savings.
7. Technology Optimization
8. Reduced Waste
9. Enhanced Data Collection
Que. Explain 4 pillars of IOT & how they are interconnected with each
other
Four Pillars of IoT

1. M2M: The Internet of Devices • Machine to machine refers to direct communication between
devices using any communications channel, including wired and wireless. Machine to machine
communication can include industrial instrumentation, enabling a sensor or meter to communicate the data it
records (such as temperature, inventory level, etc.) to application software that can use it. • Most of the
M2M market research reports assume M2M modules are simply just cellular modules.
Application Areas for Cellular M2M, p. 67 • There is overlap between M2M and the consumer electronics
applications. The consumer electronics offerings include the following: • Personal navigation devices •
eReaders • Digital picture frames • People-tracking devices • Pet-tracking devices • Home security monitors
• Personal medical devices Four Pillars of IoT
The typical architecture of an M2M system from BiTX. • Service S N 7 Asset-specific protocol 6 M2M
communication protocol N S Network adapter Gateway Manager Four Pillars of IoT

2. RFID: The Internet of Objects An RFID tag is a simplified, low-cost, disposable contactless
smartcard. RFID tags include a chip that stores a static number (ID) and attributes of the tagged object and
an antenna that enables the chip to transmit the store number to a reader. • An RFID system involves
hardware known as readers and tags, as well as RFID software or RFID middleware. Four Pillars of IoT

3. WSN is more for sensing and information-collecting purposes. Other networks include body sensor
network (BSN), visual or video sensor network (VSN), vehicular sensor networks, underwater (acoustic)
sensor networks, interplanetary sensor networks, fieldbus networks, and others. • The extended scope of
WSN is the USN, or ubiquitous sensor network, a network of intelligent sensors that could one day become
ubiquitous. Four Pillars of IoT
The architecture of a typical sensor network • Sensor node: sense target events, gather sensor readings,
manipulate information, send them to gateway via radio link • Base station/sink: communicate with sensor
nodes and user/operator • Operator/user: task manager, send query • Routing and energy saving are required.
Four Pillars of IoT
WSNs are meant to be deployed in large numbers in various environments, including remote and hostile
regions, with ad hoc communications as key. • For this reasons, algorithms and protocols need to address the
following issues. • Lifetime maximization • Robustness and fault tolerance • Self-configuration •
Middleware for WSN, the middle-level primitive between the software and the hardware, can help bridge
the gap and remove impediments. Four Pillars of IoT
Context-aware system based on WSN • Mobile sensor networks (MSNs) are WSNs in which nodes can
move under own control or under the control of the environment. Four Pillars of IoT

4.SCADA (supervisory control and data acquisition)is a type of industrial control


system (ICS). Industrial control systems are computer controlled systems that monitor and control industrial processes
that exist in the physical world • An existing SCADA system usually consists of the following subsystems: • HMI
(human-machine interface) • RTU (remote terminal units) • PLCs (programmable logic controllers) • DCSs (distributed
control systems) • M2M, WSN, smart systems, CPS, and others all have overlaps of scope with SCADA. Four Pillars of
IoT

Approaches IoT
Organizations across all industries are identifying ways to benefit from the Internet of Things. However,
building an IoT solution not only requires various components, but also a very diverse set of skills

The good news is, that selecting the right tools and technologies can help expedite the process. I wrote about
different approaches to making IoT solution development more efficient.

1. Developing IoT solutions that meet future requirements

The scope and requirements of an IoT solution regularly change as organizations are increasingly integrating
IoT into their business. Being able to efficiently evolve an IoT solution these changing requirements will
ultimately define the solution’s usefulness and value in the future. Therefore, picking an IoT technology that is
designed to easily integrate 3rd party systems and products as well as extend the functionality with additional
components at any time will enable organizations to not only meet the requirements of their current use case, but
also to scale in future projects as well.

2. Invest in security tools

IoT security can become an afterthought as IoT connectivity options expand to accommodate more devices and reach
more places. However, it’s crucial to remember that while technology gets smarter, so do cyber security
attacks. Some examples of cellular IoT attacks that need to be prevented are DDoS (distributed denial of service), fake
cell towers, location tracking, and SMS phishing.

These attacks cannot be prevented using outdated hardware and security tools.

3. Analyze and leverage data

IoT devices continuously generate and transmit data to a central location, so much vital data passes through the
network. Collecting and managing IoT data well is key to monitoring and managing remote systems in real-time. For
example, network congestion can be the bane of an IoT network.

Technologies like AI, machine learning, and computer vision can be used to extract and analyze IoT
data. Companies can then use this data to optimize and automate processes, perform predictive maintenance, automate
routing, and schedule security improvements.

4. Finding compatible technology that perfectly integrates with your IoT solution

Along the way while developing your IoT solution, you will eventually have to decide which technologies to
integrate into your solution. While cost and functionality are deciding factors that come to mind immediately,
you might also want to think about whether the technologies you are planning to use have been tested to work
with the IoT platform you are using and how easily they can be integrated.

5. Taking IoT technology for a test drive before making any purchase decisions

When adopting an IoT strategy, users typically have not had many opportunities to gain experience with any of
the IoT technology on the market. Before making any purchase decisions, you should try to get a real feel for
the IoT technology you are planning to purchase. Some technology vendors offer developer zones that give both novice
and experienced users a guided tutorial of the different aspects of the technology.
Definition of IoT Security
IoT security is based on a cybersecurity strategy to protect IoT devices and the vulnerable networks
they connect to from cyber attacks. IoT devices have no built-in security. IoT security is needed to
help prevent data breaches because IoT devices transfer data over the internet unencrypted and
operate undetected by standard cybersecurity systems.

Unfortunately, there is no way to install security software on most IoT devices. IoT devices may even
ship with malware on them that infects the network when they connect. This is why network security
is a priority for IoT security.

Why is IoT Security Important?

Companies are increasingly taking advantage of IoT and OT devices to improve


productivity and increase visibility into their operations. As a result, growing
numbers of networked devices deployed on corporate networks have access to
sensitive data and critical systems.

Often, these devices have security issues that make them vulnerable to attack and place the rest of the
organization at risk. For example, cyber threat actors commonly target unprotected printers, smart
lighting, IP cameras, and other networked devices to gain access to an organization’s network. From
there, they can move laterally through the network to access more critical devices and sensitive data
and create ransomware and/or double extortion cyberattacks that can render a business’ network
useless.

Securing the company against cyber threats requires securing all devices connected to the corporate
network. IoT security is a vital component of a corporate cybersecurity strategy because it limits the
risks posed by these insecure, networked devices.

Types of IoT Security

IoT security solutions can be implemented by both device customers and manufacturers. The three
types oF IoT security include:

Network Security: Users need to protect their devices against unauthorized access and potential
exploitation. IoT network security implements a zero-trust security strategy to minimize the corporate
attack surface.
Credential security :IoT device admin credentials should be updated if possible. It is best to avoid
reusing credentials across multiple devices and applications — each device should have a unique
password. This helps prevent credential-based attacks.

Device authentication: IoT devices connect to each other, to servers, and to various other
networked devices. Every connected device needs to be authenticated to ensure they do not accept
inputs or requests from unauthorized parties.For example, an attacker could pretend to be an IoT
device and request confidential data from a server, but if the server first requires them to present an
authentic TLS certificate (more on this concept below), then this attack will not be successful.For the
most part, this type of authentication needs to be configured by the device manufacturer.

Encryption: IoT device data exchanges are vulnerable to external parties and on-path attackers as
they pass over the network — unless encryption is used to protect the data. Think of encryption as
being like an envelope that protects a letter's contents as it travels through the postal
service.Encryption must be combined with authentication to fully prevent on-path attacks. Otherwise,
the attacker could set up separate encrypted connections between one IoT device and another, and
neither would be aware that their communications are being intercepted.

Turning off unneeded features:Most IoT devices come with multiple features, some of which
may go unused by the owner. But even when features are not used, they may keep
additional ports open on the device in case of use. The more ports an Internet-connected device leaves
open, the greater the attack surface — often attackers simply ping different ports on a device, looking
for an opening. Turning off unnecessary device features will close these extra ports.

DNS filtering: DNS filtering is the process of using the Domain Name System to block
malicious websites. Adding DNS filtering as a security measure to a network with IoT
devices prevents those devices from reaching out to places on the Internet they should not
(i.e. an attacker's domain).

Software and firmware updates


IoT devices need to be updated whenever the manufacturer issues a vulnerability patch or software
update. These updates eliminate vulnerabilities that attackers could exploit. Not having the latest
software can make a device more vulnerable to attack, even if it is outdated by only a few days. In
many cases IoT firmware updates are controlled by the manufacturer, not the device owner, and it is
the manufacturer's responsibility to ensure vulnerabilities are patched

IoT security issues and challenges


The IoT attack surface expands every day as more and more devices come online–from our smartwatches and
smart TVs, to our smart homes and smart cars, to the ever-growing industry IoT. In addition to consumer
goods, IoT sensors are widely used in healthcare, manufacturing, and supply chain operations, as well as for
green agriculture, the economy, and national defense.
Many network security solutions do not have the ability to detect connected IoT devices or show which devices
are communicating on the network. The following sections explore these and other big IoT security challenges
including:

The following IoT security challenges continue to threaten the financial safety of both individuals and
organizations:

Remote exposure: Unlike other technologies, IoT devices have a particularly large attack
surface due to their internet-supported connectivity. While this accessibility is extremely
valuable, it also gives hackers the opportunity to interact with devices remotely. This is why
hacking campaigns, such as phishing, are particularly effective..

Weak default passwords: IoT devices often come with weak passwords, and most consumers
might not be aware that they need to be replaced with more secure ones. If default passwords aren't
changed on IoT devices, it can leave them vulnerable to brute-force and other hacking attacks.

Multiple connected devices: Most households today have multiple interconnected devices. The
drawback of this convenience is that, if one device fails due to a security misconfiguration, the rest of
the connected devices in the same household go down as well.

Lack of encryption: Most network traffic originating from IoT devices is unencrypted, which
increases the possibility of security threats and data breaches. These threats can be avoided by
ensuring all the devices are secured and encrypted

Insecure Communications Protocols and Channels


IoT devices are often connected to the same network as other devices, which means that an attack on
one device can spread to others. Lack of network segmentation and oversight of the ways IoT devices
communicate makes them easier to intercept. For example, not long ago the automotive industry’s
adoption of Bluetooth technology in IoT devices resulted in a wave of data breaches that made the
news. As well, protocols like HTTP (Hypertext Transfer Protocol) and API–are all channels that IoT
devices rely on and cyber criminals exploit.

For example, in 2022, millions of Buetooth digital locks in smart cars could be remotely unlocked by
hackers exploiting a vulnerability in Bluetooth technology. As well, protocols like HTTP (Hypertext
Transfer Protocol) and API-are channels that IoT devices rely on and cyber criminals can exploit.

Difficulty in Patching and Updating Devices


IoT manufacturers don’t focus on building IoT security into their devices to make hardware tamper
proof and secure. Many IoT devices are not designed to receive regular IoT security updates, which
makes them vulnerable to attacks. Without built-in IoT security it’s difficult to ensure secure
upgrades, provide firmware updates and patches, and perform dynamic testing. Therefore, the onus is
on the organization to protect its IoT devices and network environment from cyber threats.
Cloud Computing
Cloud computing is the on-demand delivery of IT resources through the internet with pay-to-use
charges.

Instead of buying and maintaining computer products and services, you can pay to use a cloud
computing service. It saves you the time, effort, and cost of doing it all by yourself!

Simply put, cloud computing is the delivery of computing services—including servers, storage,
databases, networking, software, analytics, and intelligence—over the Internet (“the cloud”) to offer
faster innovation, flexible resources, and economies of scale.

Why Choose The Cloud?

Why would you not want to have your own computers, servers, staffers, and offices to run a
company? Cloud computing allows you to accomplish a lot more with a lot less!

1. It's on-demand, like Netflix!

Cloud services are on-demand, which means you can access the service anywhere and anytime. It isn't
limited by space or size.

2. It's cheaper

You don't need to purchase computers, rent office space or hire staff. Various models of cloud
services offer one or all of those options. This could mean huge savings as you only pay for what you
want.

3. It's flexible

Since you only pay for what you want and what you want is accessible anywhere, you can increase or
decrease the scope of your projects or the intensity of your work as needed.

 Ex.
 Amazon Web Services (AWS)
 Google Cloud Platform (GCP)
 Microsoft Azure
Benefits of cloud computing
Cloud computing is a big shift from the traditional way businesses think about IT resources. Here are
seven common reasons organizations are turning to cloud computing services:
Cost
 Moving to the cloud helps companies optimize IT costs. This is because cloud computing
eliminates the capital expense of buying hardware and software and setting up and running
onsite datacenters—the racks of servers, the round-the-clock electricity for power and
cooling, and the IT experts for managing the infrastructure. It adds up fast.
Speed
 Most cloud computing services are provided self service and on demand, so even vast
amounts of computing resources can be provisioned in minutes, typically with just a few
mouse clicks, giving businesses a lot of flexibility and taking the pressure off capacity
planning.
Global scale
 The benefits of cloud computing services include the ability to scale elastically. In cloud
speak, that means delivering the right amount of IT resources—for example, more or less
computing power, storage, bandwidth—right when they’re needed, and from the
right geographic location.
Productivity
 Onsite datacenters typically require a lot of “racking and stacking”—hardware setup, software
patching, and other time-consuming IT management chores. Cloud computing removes the
need for many of these tasks, so IT teams can spend time on achieving more important
business goals.
Performance
 The biggest cloud computing services run on a worldwide network of secure datacenters,
which are regularly upgraded to the latest generation of fast and efficient computing
hardware. This offers several benefits over a single corporate datacenter, including reduced
network latency for applications and greater economies of scale.
Reliability
 Cloud computing makes data backup, disaster recovery, and business continuity easier and
less expensive because data can be mirrored at multiple redundant sites on the cloud
provider’s network.
Security
 Many cloud providers offer a broad set of policies, technologies, and controls that strengthen
your security posture overall, helping protect your data, apps, and infrastructure from
potential threats.

Que. Classify the various types of cloud.


Types of cloud computing
First, you need to determine the type of cloud deployment, or cloud computing architecture, that your
cloud services will be implemented on. There are three different ways to deploy cloud services: on a
public cloud, private cloud, or hybrid cloud.
Public cloud
Public clouds are owned and operated by third-party cloud service providers, which deliver
computing resources like servers and storage over the internet. Microsoft Azure is an example of a
public cloud. With a public cloud, all hardware, software, and other supporting infrastructure is
owned and managed by the cloud provider. You access these services and manage your account using
a web browser.

These resources might be accessible for free, or access might be sold according to
subscription-based or pay-per-usage pricing models.

The public cloud provider owns, manages, and assumes all responsibility for the data centers,
hardware, and infrastructure on which its customers’ workloads run, and it typically provides high-
bandwidth network connectivity to ensure high performance and rapid access to applications and data.

Public cloud is a multi-tenant environment—the cloud provider's data center infrastructure is shared
by all public cloud customers. In the leading public clouds—Amazon Web Services (AWS), Google
Cloud, IBM Cloud, Microsoft Azure, and Oracle Cloud—those customers can number in the millions.

Many enterprises are moving portions of their computing infrastructure to the public cloud because
public cloud services are elastic and readily scalable, flexibly adjusting to meet changing workload
demands. Others are attracted by the promise of greater efficiency and fewer wasted resources since
customers pay only for what they use. Still others seek to reduce spending on hardware and on-
premises infrastructures.

Private cloud
A private cloud refers to cloud computing resources used exclusively by a single business or
organization. accessible by, one customer only. A private cloud can be physically located on the
company’s onsite datacenter. Some companies also pay third-party service providers to host their
private cloud. A private cloud is one in which the services and infrastructure are maintained on a
private network.

benefits of private cloud computing—including elasticity, scalability, and ease of service delivery—
with the access control, security, and resource customization of on-premises infrastructure.

Many companies choose private cloud over public cloud because private cloud is an easier way (or
the only way) to meet their regulatory compliance requirements. Others choose private cloud because
their workloads deal with confidential documents, intellectual property, personally identifiable
information (PII), medical records, financial data, or other sensitive data.

By building private cloud architecture according to cloud native principles, an organization gives
itself the flexibility to easily move workloads to public cloud or run them within a hybrid cloud (see
below) environment whenever they’re ready.

Hybrid cloud
Hybrid clouds combine public and private clouds, bound together by technology that allows data and
applications to be shared between them. By allowing data and applications to move between private
and public clouds, a hybrid cloud gives your business greater flexibility and more deployment options
and helps optimize your existing infrastructure, security, and compliance.
Hybrid cloud is just combination of public and private cloud environments. Specifically, and ideally, a
hybrid cloud connects an organization's private cloud services and public clouds into a single, flexible
infrastructure for running the organization’s applications and workloads.

The goal of hybrid cloud is to establish a mix of public and private cloud resources—and with a level
of orchestration between them—that gives an organization the flexibility to choose the optimal cloud
for each application or workload and to move workloads freely between the two clouds as
circumstances change. This enables the organization to meet its technical and business objectives
more effectively and cost-efficiently than it could with public or private cloud alone.

Types of cloud services:

IaaS, PaaS, serverless, and SaaS


Most cloud computing services fall into four broad categories:
infrastructure as a service (IaaS), platform as a service (PaaS), serverless, and software as a service
(SaaS).

IaaS
The most basic category of cloud computing services. With infrastructure as a service (IaaS), you rent
IT infrastructure—servers and virtual machines (VMs), storage, networks, operating systems—from a
cloud provider on a pay-as-you-go basis.

PaaS
Platform as a service (PaaS) refers to cloud computing services that supply an on-demand
environment for developing, testing, delivering, and managing software applications. PaaS is designed
to make it easier for developers to quickly create web or mobile apps, without worrying about setting
up or managing the underlying infrastructure of servers, storage, network, and databases needed for
development.

SaaS
Software as a service (SaaS) is a method for delivering software applications over the internet, on
demand and typically on a subscription basis. With SaaS, cloud providers host and manage the
software application and underlying infrastructure, and handle any maintenance, like software
upgrades and security patching. Users connect to the application over the internet, usually with a web
browser on their phone, tablet, or PC.

Serverless computing
Overlapping with PaaS, serverless computing focuses on building app functionality without spending
time continually managing the servers and infrastructure required to do so. The cloud provider
handles the setup, capacity planning, and server management for you. Serverless architectures are
highly scalable and event-driven, only using resources when a specific function or trigger occurs.

Que. Explain the importance of cloud computing for the investigation of


cyber crime
Cloud forensics is a field of digital forensics that deals with crimes involving cloud
computing services..“The application of computer forensic principles and procedures in a
cloud computing environment” . Cloud forensics experts use various techniques to collect,
preserve, and analyze data stored in a cloud environment. The goal of cloud forensics is
to obtain evidence that can be used in a court of law
Cyber Forensics deals with forensic analysis of cyber crimes with the objectives of 
Identifying digital evidence  Acquiring digital evidence  Authenticating digital evidence
 Reporting digital evidence

we must evaluate what logs the forensics investigator needs in order to find our who was
behind the attack. A means of systematically gathering digital evidence, analyzing it to make
credible evidence, authentically presenting it to the court of law.

Cloud forensics refers to the use of forensic techniques to investigate cloud environments.
When unlawful or criminal behavior has occurred using the cloud as a medium, cloud
forensics experts use their skills and knowledge to detect the individuals or groups
responsible. Cloud forensics encompasses users of the cloud, both victims and perpetrators.
For example, a company using cloud servers might be the victim of a data breach or denial of
the service incident. Criminals themselves might also use the cloud to launch an attack.

A cloud server is easier to replace and keep services running while you investigate

Cloud computing brings opportunities for network forensics tracing Internet criminals in the
distributed environment. We may use the new “pay-as-you-go” model of the cloud computing to
deploy the on-demand cyber surveillance sentinels and conduct distributed trace back in complicated
cyber crime scene investigations. To trace criminals abusing anonymous communication networks
such as Tor, law enforcement can deploy high-bandwidth Amazon EC2 sentinels into the Tor network.
Some sentinels are configured as Tor entry guards and others work as Tor exits nodes. With the high
bandwidth and appropriate number of such sentinels, we can achieve a required probability that a Tor
circuit passes through an entry sentinel and an exit sentinel in order to capture the suspects. The
proposed “pay-as-you-go” traceback model is cost-effective since the investigation may last for just
hours with effective traceback techniques.

Different IoT testing approaches


Connectivity testing:

This process of connectivity testing primarily checks the device and application behavior while the
network is subjected through a load, or with intermittent failures, or also checked for their
performance when there has been a loss of connectivity. These real-time scenarios build robustness of
these IoT devices and their underlying platforms as a whole to ensure these IoT apps are checked for
various connectivity issues to ensure they perform well.
Functionality testing:
Functionality testing is critical for the success of IoT applications which is essential for them to work
seamlessly. This type of functionality testing is needed for sensors and the IoT apps connected and
might not be required for the network and backend data center connections. Automated functionality
testing consumes less time and ensures quality results while testing these IoT applications and should
be leveraged.

Security testing:
The IoT environment involves numerous users and massive amounts of data transfer at various
connections. It is therefore essential to validate the users through effective user authentication and
ensure highest safety, and security of the IoT ecosystem. In addition, as there are a lot of
interconnected devices involved and connected, there is every chance for cyber threats and
vulnerabilities to attack the networks and systems. Hence, it is essential to adopt security testing
services to get safe and secure IoT interconnected systems.
Usability testing:
Today’s fast paced customers prefer only such IoT apps which perform seamlessly and are easy to
use. Some of the most commonly used IoT apps such as smart homes, smart wearables, smart grids,
connected car, telemedicine, telehealth, etc. have all been successful only due to their ease of usage
and due to their seamless performance. Hence, primarily usability testing is critical and essential for
these IoT apps performance.

Performance testing:
End-users prefer those IoT apps which perform seamlessly and deliver great user experience.
Automated performance testing is preferred as test scripts are executed without any human
intervention. While adopting this method of testing, testers should also consider various other
performance factors such as network bandwidth, latency, packet loss, balance with a number of
concurrent users, etc. Therefore, performance testing should be done for the IoT application, networks
and also for the backend connections involved within these IoT apps. Thus, it is also preferred to run
these performance tests with various types of networks and data streams to achieve great IoT app
performance results.

Scalability testing:
This form of scalability testing is essential for building an IoT test environment as it involves
simulation of sensors by using various virtualization tools and technologies. The scalability of these
apps within the IoT ecosystem is important to get the desired IoT apps.

You might also like