0% found this document useful (0 votes)
18 views9 pages

IoT Unit - 1

The document provides an introduction to the Internet of Things (IoT), defining it as a network of physical objects that communicate via the Internet to enhance monitoring and control processes. It outlines key characteristics, applications, architecture, and challenges of IoT, emphasizing the importance of connectivity, security, and interoperability. Additionally, it discusses the various components and design challenges faced in IoT systems, including power management, data processing, and security concerns.

Uploaded by

priyabariya83
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views9 pages

IoT Unit - 1

The document provides an introduction to the Internet of Things (IoT), defining it as a network of physical objects that communicate via the Internet to enhance monitoring and control processes. It outlines key characteristics, applications, architecture, and challenges of IoT, emphasizing the importance of connectivity, security, and interoperability. Additionally, it discusses the various components and design challenges faced in IoT systems, including power management, data processing, and security concerns.

Uploaded by

priyabariya83
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

UNIT-1

Introduction to IoT
(internet of things)
Semester 6 term 231

Prepared by
PRERANA GUPTA, NEHA DALWADI
Lecturer in Computer Engineering
Shri K J Polytechnic Bharuch

Fundamentals of IOT
Unit-1
Introduction to IoT
1.1 IoT Definition
• The Internet of Things (IoT) refers to a network of physical objects that
communicate information through the Internet or other communication technologies.
This enables the monitoring, coordination, or control of processes across the Internet.

• Internet of Things is the network of physical objects or ‘things’ embedded with


electronics, software, sensors, and connectivity to enable it to achieve greater value
and service by exchanging data with the manufacturer, operator and/or other
connected devices. Each thing is uniquely identifiable through its embedded
computing system but can interoperate within the existing Internet infrastructure.

 Smart and Hyperconnected Devices.


Hyperconnectivity means use of multiple systems and devices to remain constantly
connected to social networks and streams of information. Smart devices are devices
with computing and communication capabilities that can constantly connect to
networks.

For example, a city network of streetlights which constantly connects to the


controlling station. Another example is hyperconnected RFIDs. An RFID or a smart
label is tagged to all consignments. This way many consignments sent from a place
can be constantly tracked.

1.2 IoT Characteristics


1. Connectivity:
Connectivity is a key aspect of IoT, enabling the linkage of various devices such as
mobile phones and laptops. IoT facilitates access to information from anywhere at
any time. It achieves connectivity through wireless devices like sensors and mobile
phones, eliminating the need to wait for an internet connection to operate a device.

2. Identity of Things:
Each IoT device has a unique identity. This identification is helpful in tracking the
equipment and at times for querying its status.Identity helps to differentiate between
various internet devices and select the device we want to send the command.

3. Dynamic:
We need to create IoT devices in a way that they can adapt to the environment. For
example, an AC should have a sensor that can send a signal to the cloud and adjust it
to the premises of the place. Similarly, the camera can easily click photographs by
adjusting to light situations, like day and night.
4. Intelligence:
The intelligence of IoT devices depends on the sensors' intelligence. The sensors
send the data to the user for further analysis. We need to update the IoT devices
regularly to get the smart work done. It adds to their features and makes them
smarter.

5. Scalability:
The number of elements connected to the IoT zone is increasing day by day. Hence,
an IoT setup should be capable of handling the massive expansion.The IoT has
created a setup to handle enormous data and generate useful analysis.

6. Security:
With the increasing number of IoT devices, issues regarding the security of personal
data have arisen. There might be a chance of data leakage as a large amount of data
is collected, exchanged, and generated.To overcome this challenge, IoT has created
networks, systems, and devices wherein privacy is well maintained.

7. Network:
With the increasing number of IoT devices in a network, it becomes difficult to
maintain communication for proper functioning. However, cloud service and
gateway are a few methods that can solve such problems.

8. Data:
The data gathered from IoT devices are analyzed for future prediction. For example,
a calorie meter. It helps to regulate the number of calories each day.

9. Architecture:
The architecture of IoT is designed in a way that it is capable of supporting various
devices, technologies, and protocols. Its main work is to confirm whether each
connected device does not interfere with the other. This way, the safety and security
of each device's data are maintained.

10. Interoperability:
IoT devices use standardized protocols and technologies to ensure they can
communicate with each other and other systems. Interoperability refers to the ability
of different IoT devices and systems to communicate and exchange data with each
other, regardless of the underlying technology or manufacturer.To achieve
interoperability, IoT devices, and systems use standardized communication protocols
and data formats.

1.3 IoT Applications


1. Smart Home
2. Smart Agricultural
3. Healthcare
4. Wearables
5. Smart Cities
6. Smart Grid
7. Smart Supply Chain
8. Smart Traffic Management
9. Smart Pollution Control

1.4 IoT Conceptual Framework


Physical Object + Controller, Sensor and Actuators + Internet = Internet of Things----
(1.1)

Equation 1.1 conceptually describes the Internet of umbrellas as consisting of an


umbrella, a controller, sensor and actuators, and the Internet for connectivity to a web
service and a mobile service provider.

Generally, IoT consists of an internetwork of devices and physical objects wherein a


number of objects can gather the data at remote locations and communicate to units
managing, acquiring, organising and analysing the data in the processes and services.

The working steps are as follows:


1. At level 1 data of the devices (things) using sensors or the things gather the pre data
from the internet.
2. A sensor connected to a gateway, functions as a smart sensor (smart sensor refers to a
sensor with computing and communication capacity). The data then enriches at level 2,
for example, by transcoding at the gateway. Transcoding means coding or decoding
before data transfer between two entities.
3. A communication management subsystem sends or receives data streams at level 3.
4. Device management, identity management and access management subsystems
receive the device’s data at level 4.
5. A data store or database acquires the data at level 5. Real time series analysis, data
analytics and intelligence subsystems are also at levels 4 and 5. A cloud infrastructure, a
data store or database acquires the data at level 5.
6. Data routed from the devices and things organizes and analyses at level 6. For
example, data is analysed for collecting business intelligence in business processes.

1.5 Key Components of IoT Systems


Major components of IoT devices are:
1. Physical object with embedded software into a hardware.
2. consisting of a microcontroller, firmware, sensors, control unit, actuatorsand
communication module.
3. Communication module: Software consisting of device APIs and device interfacefor
communication over the network and communication circuit/port(s), andmiddleware for
creating communication stacks using 6LowPAN, CoAP, LWM2M,IPv4, IPv6 and other
protocols.
4. For actions on messages, information, and commands which the devicesreceive and
then output to the actuators, which enable actions such as glowing LEDs,robotic hand
movement etc.
 Sensors and Control Units
Sensors are electronic devices that sense the physical environments. An industrial
automation system or robotic system has multiple smart sensors embedded in it.
Sensor-actuator pairs are used in control systems. A smart sensor includes computing
and communication circuits.

1.6 Architecture of IoT


The architecture of the Internet of Things (IoT) typically involves multiple layers, each
responsible for specific functions in the communication and data processing process.
Here's a high-level overview of an IoT architecture with a diagram:
Devices/Sensors Layer:
This layer consists of various IoT devices or sensors that collect data from the physical
environment. These devices can include temperature sensors, humidity sensors, cameras,
actuators, etc. Devices/sensors can be connected via various communication protocols
such as Wi-Fi, Bluetooth, Zigbee, LoRa, etc.

Connectivity Layer:
The connectivity layer facilitates communication between IoT devices/sensors and the
next layers of the architecture. It includes components like gateways, routers, and
protocols for data transmission and routing. Edge computing devices may also be
included in this layer for preprocessing data before sending it to the cloud.
Cloud/Edge Computing Layer:
This layer handles the storage, processing, and analysis of the data collected from IoT
devices.Cloud services or edge computing resources are utilized for scalability and
computational power. Data processing techniques such as stream processing, data
analytics, and machine learning may be applied here to derive insights from the data.
Applications Layer:

The applications layer includes the user-facing applications or services that interact with
the IoT system. These applications can range from web-based dashboards, mobile apps,
enterprise systems, to control interfaces for managing IoT devices and viewing insights
derived from data analysis. Here's a simplified diagram illustrating the IoT architecture:

In this diagram, data flows from the Devices/Sensors Layer to the Connectivity Layer,
then to the Cloud/Edge Computing Layer for processing and analysis. Finally, the results
are made available to users through Applications.
1.7 IoT Challenges
Design challenges
Designing IoT systems comes with various challenges, ranging from connectivity issues
to managing power requirements and handling complex data environments. Here's a
breakdown of some key design challenges:
Connectivity:
Interoperability: IoT devices often use different communication protocols, making
interoperability a challenge.
Reliability: Ensuring reliable connectivity, especially in environments with network
congestion or signal interference, is crucial.
Scalability: Designing a system that can handle a large number of devices while
maintaining efficient communication is essential.

Power Requirements:
Energy Efficiency: IoT devices are often deployed in remote or inaccessible locations,
making battery life critical. Designing energy-efficient protocols and optimizing device
power consumption is vital.
Harvesting and Management: Exploring energy harvesting techniques (solar, kinetic,
etc.) and efficient energy management strategies can extend device lifespans.

Complexity:
System Integration: Integrating diverse hardware and software components from
different vendors introduces complexity in system design and maintenance.
Security: Addressing security concerns, including authentication, encryption, and secure
data transfer, adds complexity to IoT system design.
Standards and Regulations: Compliance with various standards and regulations across
different regions further complicates IoT design.

Storage and Computational Capability:


Edge vs. Cloud Computing: Deciding where to perform data processing and analysis
(at the edge or in the cloud) based on factors such as latency requirements, bandwidth
constraints, and privacy concerns.
Resource Constraints: IoT devices often have limited storage and computational
capabilities. Optimizing algorithms and data compression techniques for constrained
environments is essential.

Data Extraction from Complex Environments:


Data Variety: IoT systems generate vast amounts of heterogeneous data (structured and
unstructured) from diverse sources. Extracting meaningful insights from this data
requires sophisticated data processing techniques.
Real-time Processing: In scenarios where real-time insights are critical, designing
systems capable of processing and analyzing data streams in real-time presents a
significant challenge.
Contextual Understanding: Understanding the context in which data is generated
(environmental conditions, user behavior, etc.) is essential for accurate analysis and
decision-making.
Addressing these challenges requires a holistic approach that considers various factors
such as hardware capabilities, communication protocols, data processing techniques, and
user requirements. Collaboration among stakeholders, including engineers, data
scientists, and domain experts, is essential for successful IoT system design and
deployment.

Security challenges:
Security and privacy are paramount concerns in IoT systems due to the vast amount of
sensitive data collected and the potential risks associated with interconnected devices.
Here are the main security challenges in IoT:
Device Authentication and Authorization:
Ensuring that only authorized devices can access the network and communicate with
other devices or the cloud.
Implementing robust authentication mechanisms such as cryptographic keys, certificates,
and biometrics to prevent unauthorized access.
Data Encryption:
Encrypting data both at rest and in transit to protect it from unauthorized interception or
tampering.
Using strong encryption algorithms and key management practices to safeguard sensitive
information.
Network Security:
Securing communication channels between devices, gateways, and cloud services to
prevent eavesdropping, man-in-the-middle attacks, and data spoofing.
Implementing protocols like Transport Layer Security (TLS) and Virtual Private
Networks (VPNs) to establish secure connections.
Firmware and Software Security:
Ensuring the integrity and authenticity of firmware and software updates to prevent
malicious tampering or unauthorized modifications.
Implementing secure boot mechanisms, code signing, and integrity checks to verify the
authenticity of software components.
Privacy Concerns:
Protecting user privacy by limiting the collection and storage of personally identifiable
information (PII) and sensitive data.
Implementing anonymization and pseudonymization techniques to anonymize data
wherever possible.
Providing users with transparency and control over their data through privacy policies
and consent mechanisms.
Physical Security:
Protecting IoT devices and infrastructure from physical tampering, theft, or unauthorized
access.
Implementing physical security measures such as tamper-evident seals, locks, and secure
enclosures to prevent physical attacks.
Denial of Service (DoS) Attacks:
Mitigating the risk of DoS attacks that can disrupt IoT services by overwhelming devices
or network infrastructure with excessive traffic.
Implementing traffic filtering, rate limiting, and anomaly detection mechanisms to detect
and mitigate DoS attacks.
Supply Chain Security:
Ensuring the security of the entire supply chain, including device manufacturing,
distribution, and deployment, to prevent the insertion of malicious hardware or software.
Performing security audits and due diligence on vendors and suppliers to verify the
integrity of components and firmware.
Addressing these security challenges requires a multi-layered approach, incorporating
both technical measures and best practices in design, development, deployment, and
maintenance. Collaboration among stakeholders, including IoT manufacturers,
developers, service providers, regulators, and end-users, is essential to build trust and
confidence in IoT systems while safeguarding security and privacy.

You might also like