Iot Notes 2
Iot Notes 2
UNIT I
By M.Parimala Assistant.Professor
Internet of Things III B.SC (CS) –VI SEM
By M.Parimala Assistant.Professor
Internet of Things III B.SC (CS) –VI SEM
Public safety, Energy & environmental protection, Agriculture and Tourism as part of a
future IoT Ecosystem (Figure 1.1) have acquired high attention.
In line with this development, the majority of the governments in Europe, in Asia, and in
the Americas consider now the Internet of Things as an area of innovation and growth.
Although larger players in some application areas still do not recognise the potential,
many of them pay high attention or even accelerate the pace by coining new terms for the
IoT and adding additional components to it.Moreover, end-users in the private and
business domain have nowadays acquired a significant competence in dealing with smart
devices and networked applications.
As the Internet of Things continues to develop, further potential is estimated by a
combination with related technology approaches and concepts such as Cloud computing,
Future Internet, Big Data, robotics and Semantic Internet of Things: Converging
Technologies for Smart Environments and Integrated Ecosystems.
Factors are
No clear approach for the utilisation of unique identifiers and numbering spaces for
various kinds of persistent and volatile objects at a global scale.
• No accelerated use and further development of IoT reference architectures like for example the
Architecture Reference Model (ARM) of the project IoT-A.
• Less rapid advance in semantic interoperability for exchanging sensor information in
heterogeneous environments.
• Difficulties in developing a clear approach for enabling innovation, trust and ownership of data
in the IoT while at the same time respecting security and privacy in a complex environment.
• Difficulties in developing business which embraces the full potential of the Internet of Things.
By M.Parimala Assistant.Professor
Internet of Things III B.SC (CS) –VI SEM
• Missing large-scale testing and learning environments, which both facilitate the
experimentation with complex sensor networks and stimulate innovation through reflection and
experience.
• Only partly deployed rich interfaces in light of a growing amount of data and the need for
context-integrated presentation.
• Coherence of object capabilities and behaviour: the objects in the Internet of Things will show
a huge variety in sensing and actuation capabilities, in information processing functionality and
their time of existence. In either case it will be necessary to generally apprehend object as
entities with a growing “intelligence” and patterns of autonomous behaviour.
• Coherence of application interactivity: the applications will increase in complexity and
modularization, and boundaries between applications and services will be blurred to a high
degree. Fixed programmed suites will evolve into dynamic and learning application packages.
Besides technical, semantic interoperability will become the key for context aware information
exchange and processing.
• Coherence of corresponding technology approaches: larger concepts like Smart Cities, Cloud
By M.Parimala Assistant.Professor
Internet of Things III B.SC (CS) –VI SEM
computing, Future Internet, robotics and others will evolve in their own way, but because of
complementarily also partly merge with the Internet of Things. Here a creative view on potential
synergies can help to develop new ecosystems.
• Coherence of real and virtual worlds: today real and virtual worlds are perceived as two
antagonistic conceptions. At the same time virtual worlds grow exponentially with the amount of
stored data and ever increasing network and information processing capabilities. Understanding
both paradigms as complementary and part of human evolution could lead to new synergies and
exploration of living worlds.
By M.Parimala Assistant.Professor
Internet of Things III B.SC (CS) –VI SEM
Wearables remains a hot topic too. As consumers await the release of Apple’s new smart watch
in April 2015, there are plenty of other wearable innovations to be excited about: like the Sony
Smart B Trainer, the Myo gesture control, or LookSee bracelet. Of all the IoT startups, wearables
maker Jawbone is probably the one with the biggest funding to date. It stands at more than half a
billion dollars!
3. Smart City
Smart city spans a wide variety of use cases, from traffic management to water
distribution, to waste management, urban security and environmental monitoring. Its
popularity is fueled by the fact that many Smart City solutions promise to alleviate real
pains of people living in cities these days. IoT solutions in the area of Smart City solve
traffic congestion problems, reduce noise and pollution and help make cities safer.
By 2023, there will be 30 mega cities globally, with 55 percent in developing economies
of India, China, Russia and Latin America.
• Smart features,
o Smart Economy,
o Smart Buildings,
o Smart Mobility,
o Smart Energy
o Smart Information Communication and Technology,
o Smart Planning,
o Smart Citizen and Smart Governance.
4. Smart grids
Smart grids is a special one. A future smart grid promises to use information about the
behaviors of electricity suppliers and consumers in an automated fashion to improve the
efficiency, reliability, and economics of electricity. 41,000 monthly Google searches
highlights the concept’s popularity.
The basic idea behind the smart grids is to collect data in an automated fashion and
analyze the behavior or electricity consumers and suppliers for improving efficiency as
well as economics of electricity use.
By M.Parimala Assistant.Professor
Internet of Things III B.SC (CS) –VI SEM
Smart Grids will also be able to detect sources of power outages more quickly and at
individual household levels like near by solar panel, making possible distributed energy
system.
5. Industrial internet
The industrial internet is also one of the special Internet of Things applications. While
many market researches such as Gartner or Cisco see the industrial internet as the IoT
concept with the highest overall potential, its popularity currently doesn’t reach the
masses like smart home or wearables do.
The industrial internet however has a lot going for it. The industrial internet gets the
biggest push of people on Twitter (~1,700 tweets per month) compared to other
nonconsumer- oriented IoT concepts.
6. Connected car
The connected car is coming up slowly. Owing to the fact that the development cycles in
the automotive industry typically take 2-4 years, we haven’t seen much buzz around the
connected car yet. But it seems we are getting there. Most large auto makers as well as
some brave startups are working on connected car solutions. And if the BMWs and Fords
of this world don’t present the next generation internet connected car soon, other well-
known giants will: Google, Microsoft, and Apple have all announced connected car
platforms.
7. Connected Health (Digital health/Telehealth/Telemedicine)
Connected health remains the sleeping giant of the Internet of Things applications. The
concept of a connected health care system and smart medical devices bears enormous
potential (see our analysis of market segments), not just for companies also for the well-
being of people in general.
Yet, Connected Health has not reached the masses yet. Prominent use cases and large-
scale startup successes are still to be seen. Might 2015 bring the breakthrough?
8. Smart Transportation and Mobility
Internet of Vehicles (IoV) connected with the concept of Internet of Energy (IoE)
represent future trends for smart transportation.
By M.Parimala Assistant.Professor
Internet of Things III B.SC (CS) –VI SEM
By M.Parimala Assistant.Professor
Internet of Things III B.SC (CS) –VI SEM
By M.Parimala Assistant.Professor
Internet of Things III B.SC (CS) –VI SEM
communication technology to be undertaken in the coming decade will have to develop and
unfold all potential communication profiles of Internet of Things devices.
• Communications technologies for the Future Internet and the Internet of Things will have to
avoid such bottlenecks by construction not only for a given status of development, but for the
whole path to fully developed and still growing nets.
• Correctness of Construction:
Correctness of construction of the whole system is a systematic process that starts from the small
systems running on the devices up to network and distributed applications.
• An Unified Theoretical Framework for Communication:
– Communication between processes running within an operating system on a single or
multicore processor – communication between processes running in a distributed computer
system, – the communication between devices and structures in the Internet of Things and the
Future Internet using wired and wireless channels shall be merged into a unified minimum
theoretical framework covering and including formalized communication within protocols.
Data Management
• Data management is a crucial aspect in the Internet of Things. When considering a world of
objects interconnected and constantly exchanging all types of information, the volume of the
generated data and the processes involved in the handling of those data become critical.
• challenges and opportunities of data management
– Data Collection and Analysis
– Big Data
– Semantic Sensor Networking
– Virtual Sensors
– Complex Event Processing
Q-7 Explain Data Collection and Analysis (DCA)
The DCA module is part of the core layer of any IoT platform.
functions of a DCA module
– User/customer data storing:
Provides storage of the customer’s information collected by sensors
– User data & operation modelling:
By M.Parimala Assistant.Professor
Internet of Things III B.SC (CS) –VI SEM
Allows the customer to create new sensor data models to accommodate collected
information and the modelling of the supported operations.
– On demand data access:
Provides APIs to access the collected data.
– Device event publish/subscribe/forwarding/notification:
Provides APIs to access the collected data in real time conditions
– Customer rules/filtering:
Allows the customer to establish its own filters and rules to correlate events.
– Customer task automation:
Provides the customer with the ability to manage his automatic processes.
– Customer workflows:
Allows the customer to create his own work flow to process the incoming events from a device
– Multitenant structure:
Provides the structure to support multiple organizations and reseller schemes.
Features Data Collection and Analysis platform:
– Multi-protocol: DCA platforms should be capable of handling or understanding different
input (and output) protocols and formats.
– De-centralization: Sensors and measurements/ observations captured by them should be
stored in systems that can be de-centralised from a single platform.
– Data mining features: DCA systems should also integrate capacities for the processing of the
stored info, making it easier to extract useful data from the huge amount of contents that may be
recorded.
– Security: DCA platforms should increase the level of data protection and security, from the
transmission of messages from devices (sensors, actuators, etc.) to the data stored in the
platform.
Advantages of IoT
Internet of things facilitates the several advantages in day-to-day life in the business sector.
Some of its benefits are given below:
By M.Parimala Assistant.Professor
Internet of Things III B.SC (CS) –VI SEM
o Efficient resource utilization: If we know the functionality and the way that how each
device work we definitely increase the efficient resource utilization as well as monitor
natural resources.
o Minimize human effort: As the devices of IoT interact and communicate with each
other and do lot of task for us, then they minimize the human effort.
o Save time: As it reduces the human effort then it definitely saves out time. Time is the
primary factor which can save through IoT platform.
o Enhance Data Collection:
o Improve security: Now, if we have a system that all these things are interconnected then
we can make the system more secure and efficient.
Disadvantages of IoT
As the Internet of things facilitates a set of benefits, it also creates a significant set of challenges.
Some of the IoT challenges are given below:
o Security: As the IoT systems are interconnected and communicate over networks. The
system offers little control despite any security measures, and it can be lead the various
kinds of network attacks.
o Privacy: Even without the active participation on the user, the IoT system provides
substantial personal data in maximum detail.
o Complexity: The designing, developing, and maintaining and enabling the large
technology to IoT system is quite complicated.
By M.Parimala Assistant.Professor
Internet of Things III B.SC (CS) –VI SEM
By M.Parimala Assistant.Professor
Internet of Things III B.SC (CS) –VI SEM
• General attack detection and recovery/resilience to cope with IoT specific threats, such as
compromised nodes, malicious code hacking attacks.
• Cyber situation tools/techniques will need to be developed to enable IoT-based infrastructures
to be monitored.
• The IoT requires a variety of access control and associated accounting schemes to support the
various authorization and usage models that are required by users.
• New techniques and approaches e.g. from machine learning, are required to lead to a self-
managed IoT.
2.9.3 Privacy for IoT
As much of the information in an IoT system may be personal data, there
is a requirement to support anonymity and restrictive handling of personal
information.
There are a number of areas where advances are required:
• Cryptographic techniques that enable protected data to be stored processed and shared, without
the information content being accessible to other parties. Technologies such as homomorphic
and searchable encryption are potential candidates for developing such
approaches.
• Techniques to support Privacy by Design concepts, including data minimization, identification,
authentication and anonymity.
• Fine-grain and self-configuring access control mechanism emulating the real world.
There are a number of privacy implications arising IoT devices where further research is
required, including:
• Preserving location privacy, where location can be inferred from things associated with people.
• Prevention of personal information inference, that individuals would wish to keep private,
through the observation of IoT-related exchanges.
• Keeping information as local as possible using decentralized computing and key management.
• Use of soft identities, where the real identity of the user can be used to generate various soft
identities for specific applications.
Each soft identity can be designed for a specific context or application without revealing
unnecessary information, which can lead to privacy breaches.
By M.Parimala Assistant.Professor