IoT Unit - 1
IoT Unit - 1
Introduction to IoT
(internet of things)
Semester 6 term 231
Prepared by
PRERANA GUPTA, NEHA DALWADI
Lecturer in Computer Engineering
Shri K J Polytechnic Bharuch
Fundamentals of IOT
Unit-1
Introduction to IoT
1.1 IoT Definition
• The Internet of Things (IoT) refers to a network of physical objects that
communicate information through the Internet or other communication technologies.
This enables the monitoring, coordination, or control of processes across the Internet.
2. Identity of Things:
Each IoT device has a unique identity. This identification is helpful in tracking the
equipment and at times for querying its status.Identity helps to differentiate between
various internet devices and select the device we want to send the command.
3. Dynamic:
We need to create IoT devices in a way that they can adapt to the environment. For
example, an AC should have a sensor that can send a signal to the cloud and adjust it
to the premises of the place. Similarly, the camera can easily click photographs by
adjusting to light situations, like day and night.
4. Intelligence:
The intelligence of IoT devices depends on the sensors' intelligence. The sensors
send the data to the user for further analysis. We need to update the IoT devices
regularly to get the smart work done. It adds to their features and makes them
smarter.
5. Scalability:
The number of elements connected to the IoT zone is increasing day by day. Hence,
an IoT setup should be capable of handling the massive expansion.The IoT has
created a setup to handle enormous data and generate useful analysis.
6. Security:
With the increasing number of IoT devices, issues regarding the security of personal
data have arisen. There might be a chance of data leakage as a large amount of data
is collected, exchanged, and generated.To overcome this challenge, IoT has created
networks, systems, and devices wherein privacy is well maintained.
7. Network:
With the increasing number of IoT devices in a network, it becomes difficult to
maintain communication for proper functioning. However, cloud service and
gateway are a few methods that can solve such problems.
8. Data:
The data gathered from IoT devices are analyzed for future prediction. For example,
a calorie meter. It helps to regulate the number of calories each day.
9. Architecture:
The architecture of IoT is designed in a way that it is capable of supporting various
devices, technologies, and protocols. Its main work is to confirm whether each
connected device does not interfere with the other. This way, the safety and security
of each device's data are maintained.
10. Interoperability:
IoT devices use standardized protocols and technologies to ensure they can
communicate with each other and other systems. Interoperability refers to the ability
of different IoT devices and systems to communicate and exchange data with each
other, regardless of the underlying technology or manufacturer.To achieve
interoperability, IoT devices, and systems use standardized communication protocols
and data formats.
Connectivity Layer:
The connectivity layer facilitates communication between IoT devices/sensors and the
next layers of the architecture. It includes components like gateways, routers, and
protocols for data transmission and routing. Edge computing devices may also be
included in this layer for preprocessing data before sending it to the cloud.
Cloud/Edge Computing Layer:
This layer handles the storage, processing, and analysis of the data collected from IoT
devices.Cloud services or edge computing resources are utilized for scalability and
computational power. Data processing techniques such as stream processing, data
analytics, and machine learning may be applied here to derive insights from the data.
Applications Layer:
The applications layer includes the user-facing applications or services that interact with
the IoT system. These applications can range from web-based dashboards, mobile apps,
enterprise systems, to control interfaces for managing IoT devices and viewing insights
derived from data analysis. Here's a simplified diagram illustrating the IoT architecture:
In this diagram, data flows from the Devices/Sensors Layer to the Connectivity Layer,
then to the Cloud/Edge Computing Layer for processing and analysis. Finally, the results
are made available to users through Applications.
1.7 IoT Challenges
Design challenges
Designing IoT systems comes with various challenges, ranging from connectivity issues
to managing power requirements and handling complex data environments. Here's a
breakdown of some key design challenges:
Connectivity:
Interoperability: IoT devices often use different communication protocols, making
interoperability a challenge.
Reliability: Ensuring reliable connectivity, especially in environments with network
congestion or signal interference, is crucial.
Scalability: Designing a system that can handle a large number of devices while
maintaining efficient communication is essential.
Power Requirements:
Energy Efficiency: IoT devices are often deployed in remote or inaccessible locations,
making battery life critical. Designing energy-efficient protocols and optimizing device
power consumption is vital.
Harvesting and Management: Exploring energy harvesting techniques (solar, kinetic,
etc.) and efficient energy management strategies can extend device lifespans.
Complexity:
System Integration: Integrating diverse hardware and software components from
different vendors introduces complexity in system design and maintenance.
Security: Addressing security concerns, including authentication, encryption, and secure
data transfer, adds complexity to IoT system design.
Standards and Regulations: Compliance with various standards and regulations across
different regions further complicates IoT design.
Security challenges:
Security and privacy are paramount concerns in IoT systems due to the vast amount of
sensitive data collected and the potential risks associated with interconnected devices.
Here are the main security challenges in IoT:
Device Authentication and Authorization:
Ensuring that only authorized devices can access the network and communicate with
other devices or the cloud.
Implementing robust authentication mechanisms such as cryptographic keys, certificates,
and biometrics to prevent unauthorized access.
Data Encryption:
Encrypting data both at rest and in transit to protect it from unauthorized interception or
tampering.
Using strong encryption algorithms and key management practices to safeguard sensitive
information.
Network Security:
Securing communication channels between devices, gateways, and cloud services to
prevent eavesdropping, man-in-the-middle attacks, and data spoofing.
Implementing protocols like Transport Layer Security (TLS) and Virtual Private
Networks (VPNs) to establish secure connections.
Firmware and Software Security:
Ensuring the integrity and authenticity of firmware and software updates to prevent
malicious tampering or unauthorized modifications.
Implementing secure boot mechanisms, code signing, and integrity checks to verify the
authenticity of software components.
Privacy Concerns:
Protecting user privacy by limiting the collection and storage of personally identifiable
information (PII) and sensitive data.
Implementing anonymization and pseudonymization techniques to anonymize data
wherever possible.
Providing users with transparency and control over their data through privacy policies
and consent mechanisms.
Physical Security:
Protecting IoT devices and infrastructure from physical tampering, theft, or unauthorized
access.
Implementing physical security measures such as tamper-evident seals, locks, and secure
enclosures to prevent physical attacks.
Denial of Service (DoS) Attacks:
Mitigating the risk of DoS attacks that can disrupt IoT services by overwhelming devices
or network infrastructure with excessive traffic.
Implementing traffic filtering, rate limiting, and anomaly detection mechanisms to detect
and mitigate DoS attacks.
Supply Chain Security:
Ensuring the security of the entire supply chain, including device manufacturing,
distribution, and deployment, to prevent the insertion of malicious hardware or software.
Performing security audits and due diligence on vendors and suppliers to verify the
integrity of components and firmware.
Addressing these security challenges requires a multi-layered approach, incorporating
both technical measures and best practices in design, development, deployment, and
maintenance. Collaboration among stakeholders, including IoT manufacturers,
developers, service providers, regulators, and end-users, is essential to build trust and
confidence in IoT systems while safeguarding security and privacy.