IOT 1-3 Units NOTES
IOT 1-3 Units NOTES
ENGINEERING
INTERNET OF THINGS
NOTES
UNIT I FUNDAMENTALS OF IOT
Introduction - Definition and Characteristics of IoT - Physical design - IoT Protocols - Logical
design - IoT communication models, IoT Communication APIs - Enabling technologies - Wireless
Sensor Networks, Cloud Computing, Big data analytics, Communication protocols, Embedded
Systems, IoT Levels and Templates - Domain specific IoTs - IoT Architectural view.
1.1 Introduction
⚫ The Internet of Things represents the whole way from collecting data, processing it, taking an
action corresponding to the signification of this data to storing everything in the cloud. All this is
made possible by the internet
⚫ The Internet of things has become a very widely spread concept in the last few years. The reason for
this is mainly the need to computerize and control most of the surrounding objects and have access
to data in real time.
⚫ Example: Parking sensors, about phones which can check the weather and so on
A dynamic global n/w infrastructure with self configuring capabilities based on standard and
interoperable communication protocols where physical and virtual ―things‖ have
identities, physical attributes and virtual personalities and use intelligent interfaces, and are
seamlessly integrated into information n/w, often communicate data associated with users and
their environments.
Characteristics of IoT
i)Dynamic & Self Adapting:
IoT devices and systems may have the capability to dynamically adapt with the changing
contexts and take actions based on their operating conditions, user‘s context or sensed
environment.
Eg: The surveillance system comprising of a number of surveillance cameras. The
surveillance camera can adapt modes based on whether it is day or night. The surveillance
system is adapting itself based on context and changing conditions. ii)Self Configuring:
IOT devices have self configuring capability,allowing a large number of devices to work
together to provide certain functionality. These devices have the ability configure
themselves setup networking, and fetch latest software upgrades with minimal manual or
user interaction.
iii) Inter Operable Communication Protocols: support a number of interoperable
communication protocols and can communicate with other devices and also with
infrastructure.
iv) Unique Identity: Each IoT device has a unique identity and a
unique identifier(IP address).
v) Integrated into Information Network: that allow them to communicate and exchange
data with other devices and systems.
Applications of IoT:
1) Home
2) Cities
3) Environment
4) Energy
5) Retail
6) Logistics
7) Agriculture
8) Industry
9) Health &LifeStyle
The "Things" in IoT usually refers to IoT devices which have unique identities and can perform remote
sensing, actuating and monitoring capabilities.
IoT devices can:
Exchange data with other connected devices and applications (directly or indirectly), or
Collect data from other devices and process the data locally or
Send the data to centralized servers or cloud-based application back-ends for processing the data,
Perform some tasks locally and other tasks within the IoT infrastructure, based on temporal and
space constraints
Generic block diagram of an IoT Device
• An IoT device may consist of several interfaces for connections to other devices, both wired and wireless.
• I/O interfaces for sensors
• Interfaces for Internet connectivity
• Memory and storage interfaces
• Audio/video interfaces.
IoT Protocols:
a) Link Layer :
Protocols determine how data is physically sent over the network‘s physical layer or medium. Local
network connect to which host is attached. Hosts on the same link exchange data packets over the
link layer using link layer protocols. Link layer determines how packets are coded and signalled by
the h/w device over the medium to which the host is attached.
Protocols:
802.3-Ethernet: IEEE802.3 is collection of wired Ethernet standards for the link layer. Eg: 802.3 uses co-
axial cable; 802.3i uses copper twisted pair connection; 802.3j uses fiber optic connection; 802.3ae uses
Ethernet overfiber.
802.11-WiFi: IEEE802.11 is a collection of wireless LAN(WLAN) communication standards including
extensive description of link layer. Eg: 802.11a operates in 5GHz band, 802.11b and 802.11g operates in
2.4GHz band, 802.11n operates in 2.4/5GHz band, 802.11ac operates in 5GHz band, 802.11ad operates in
60Ghzband.
802.16 - WiMax: IEEE802.16 is a collection of wireless broadband standards including exclusive
description of link layer. WiMax provinde data rates from 1.5 Mb/s to 1Gb/s.
802.15.4-LR-WPAN: IEEE802.15.4 is a collection of standards for low rate wireless personal area
network(LR-WPAN). Basis for high level communication protocols such as Zigbee. Provirdes data rate from
40kb/s to250kb/s.
2G/3G/4G-Mobile Communication: Data rates from 9.6kb/s(2G) to up to100Mb/s(4G). B)
b) Network/Internet Layer:
Responsible for sending IP datagrams from source n/w to destination n/w. Performs the host
addressing and packet routing. Datagrams contains source and destination address.
Protocols:
IPv4: Internet Protocol version4 is used to identify the devices on a n/w using a hierarchical addressing
scheme. 32 bit address. Allows total of 2*32addresses.
IPv6: Internet Protocol version6 uses 128 bit address scheme and allows 2*128 addresses.
6LOWPAN:(IPv6 over Low power Wireless Personal Area Network) operates in 2.4 GHz frequency
range and data transfer 250 kb/s.
c) Transport Layer:
Provides end-to-end message transfer capability independent of the underlying n/w. Set up on
connection with ACK as in TCP and without ACK as in UDP. Provides functions such as error
control, segmentation, flow control and congestion control.
Protocols:
TCP: Transmission Control Protocol used by web browsers(along with HTTP and HTTPS), email(along
with SMTP, FTP). Connection oriented and stateless protocol. IP Protocol deals with sending packets, TCP
ensures reliable transmission of protocols in
order. Avoids n/w congestion and congestion collapse.
UDP: User Datagram Protocol is connectionless protocol. Useful in time sensitive
applications, very small data units to exchange. Transaction oriented and stateless
protocol. Does not provide guaranteed delivery.
d) Application Layer:
Defines how the applications interface with lower layer protocols to send data over the n/w. Enables
process-to-process communication using ports.
Protocols:
HTTP: Hyper Text Transfer Protocol that forms foundation of WWW. Follow requestresponse model
Stateless protocol.
CoAP: Constrained Application Protocol for machine-to-machine(M2M) applications with
constrained devices, constrained environment and constrained n/w. Uses client-server architecture.
WebSocket: allows full duplex communication over a single socket connection.
MQTT: Message Queue Telemetry Transport is light weight messaging protocol based on publish-
subscribe model. Uses client server architecture. Well suited for constrained environment.
XMPP: Extensible Message and Presence Protocol for real time communication and streaming XML
data between network entities. Support client-server and server-server communication.
DDS: Data Distribution Service is data centric middleware standards for device-to-device or
machine-to-machine communication. Uses publish-subscribe model.
AMQP: Advanced Message Queuing Protocol is open application layer protocol for business
messaging. Supports both point-to-point and publish-subscribe model.
Refers to an abstract represent of entities and processes without going into the low level specifies of
implementation.
1) IoT Functional Blocks
2) IoT Communication Models
3) IoT Comm. APIs
Provide the system the capabilities for identification, sensing, actuation, communication and management
Device: An IoT system comprises of devices that provide sensing, actuation, monitoring and control
functions.
Communication: handles the communication for IoT system.
Services: for device monitoring, device control services, data publishing services and services for
device discovery.
Management: Provides various functions to govern the IoT system.
Security: Secures IoT system and priority functions such as authentication, authorization, message
and context integrity and data security.
Application: IoT application provide an interface that the users can use to control and monitor
various aspects of IoT system.
A) Request-Response
B) Publish-Subscribe
C)Push-Pull
D) Exclusive Pair
A) Request-Response
Request-Response is a communication model in which the client sends requests to the server and the server
responds to the requests. When the server receives a request, it decides how to respond, fetches the data,
retrieves resource representations, prepares the response, and then sends the response to the client.
RESTful webservice is a collection of resources which are represented by URIs. RESTful web API has a
base URI(e.g: http://example.com/api/tasks/). The clients and requests to these URIs using the methods
defined by the HTTP protocol(e.g: GET, PUT, POST or DELETE). A RESTful web service can support
various internet media types.
b) WebSocket Based Communication APIs: WebSocket APIs allow bi-directional, full duplex
communication between clients and servers. WebSocket APIs follow the exclusive pair communication
model.
Cloud computing is a transformative computing paradigm that involves delivering applications and
services over the internet. Cloud computing involves provisioning of computing, networking and storage
resources on demand and providing these resources as metered services to the users, in a “pay as you go”.
Cloud computing resources can be provisioned on-demand by the users, without requiring interactions with
the cloud service provider. The process of provisioning resources is automated.
Cloud computing services are offered to users in different forms.
• Infrastructure-as-a-service(IaaS):Provides users the ability to provision computing and
storage resources. These resources are provided to the users as a virtual machine instances
and virtual storage.
• Platform-as-a-Service(PaaS): Provides users the ability to develop and deploy
application in cloud using the development tools, APIs, software libraries and services
provided by the cloud service provider.
• Software-as-a-Service(SaaS): Provides the user a complete software application or the
user interface to the application itself. The cloud service provider manages the underlying
cloud infrastructure including servers, network, operating systems, storage, and
application software.
1.4.3 Big data Analysis
Big data is defined as collections of data sets whose volume , velocity or variety is so large that it is
difficult to store, manage, process and analyze the data using traditional databases and data processing
tools.
Some examples of big data generated by IoT are Sensor
data generated by IoT systems.
• Machine sensor data collected from sensors established in industrial and energy systems.
• Health and fitness data generated IoT devices.
• Data generated by IoT systems for location and tracking vehicles.
• Data generated by retail inventory monitoring
systems. The underlying characteristics of Big Data are
Volume: There is no fixed threshold for the volume of data for big data. Big data is used for massive scale
data.
Velocity: Velocity is another important characteristics of Big Data and the primary reason for exponential
growth of data.
Variety: Variety refers to the form of data. Big data comes in different forms such as structured or
unstructured data including test data, image , audio, video and sensor data .
Embedded Systemsis a computer system that has computer hardware and software embedded to
perform specific tasks. Key components of embedded system include microprocessor or
micro controller, memory (RAM, ROM, Cache), networking units (Ethernet Wi-Fi
Adaptor), input/output units (Display, Keyboard, etc..,) and storage (Flash memory).
Embedded System range from low cost miniaturized devices such as digital watches to
devices such as digital cameras, POS terminals, vending machines, appliances etc.,
Level-1 IoT systems has a single node that performs sensing and/or actuation, stores data, performs
analysis and host the application. Suitable for modeling low cost and low complexity solutions where the
data involved is not big and analysis requirement are not computationally intensive. An e.g., of IoT Level1
is Homeautomation.The system consist of a single node that allows controlling the lights and appliances in
a home the device used in this system interfaces with the lights and appliances using electronic rely
switches. The status information of each light or appliances is maintained in a local database. REST
services deployed locally allow retrieving and updating the state of each lighter appliance in the status
database. The controller service continuously monitors the state of each light or appliance by retrieving the
light from the database.
1.5.2 IoT Level 2
IoT Level2 has a single node that performs sensing and/or actuating and local analysis as shown in fig. Data
is stored in cloud and application is usually cloud based. Level2 IoT systems are suitable for solutions where
data are involved is big, however, the primary analysis requirement is not computationally intensive and can
be done locally itself. An e,g., of Level2 IoT system for Smart Irrigation.
The system consists of a single node that monitors the soil moisture level and controls the irrigation system.
The device used system collects soil moisture data from sensors. The controller service continuously
monitors the moisture level. A cloud based REST web service is used for storing and retrieving moisture
data which is stored in a cloud database. A cloud based application is used for visualizing the moisture level
over a period of time which can help in making decision about irrigation schedule.
a) Smart Lighting: helps in saving energy by adapting the lighting to the ambient conditions and
switching on/off or diming the light when needed.
b) Smart Appliances: make the management easier and also provide status information to the users
remotely.
c) Intrusion Detection: use security cameras and sensors(PIR sensors and door sensors) to detect intrusion
and raise alerts. Alerts can be in the form of SMS or email sent to the user.
d) Smoke/Gas Detectors: Smoke detectors are installed in homes and buildings to detect smoke that is
typically an early sign of fire. Alerts raised by smoke detectors can be in the form of signals to a fire
alarm system. Gas detectors can detect the presence of harmful gases such as CO, LPGetc.,
2) Cities:
a) Smart Parking: make the search for parking space easier and convenient for drivers. Smart parking are
powered by IoT systems that detect the no. of empty parking slots and send information over internet to
smart application backends.
b) Smart Lighting: for roads, parks and buildings can help in saving energy.
c) Smart Roads: Equipped with sensors can provide information on driving condition, travel time
estimating and alert in case of poor driving conditions, traffic condition and accidents.
d) Structural Health Monitoring: uses a network of sensors to monitor the vibration levels in the
structures such as bridges and buildings.
e) Surveillance: The video feeds from surveillance cameras can be aggregated in cloud based scalable
storage solution.
f) Emergency Response: IoT systems for fire detection, gas and water leakage detection can help in
generating alerts and minimizing their effects on the critical infrastructures.
3) Environment:
a) Weather Monitoring: Systems collect data from a no. of sensors attached and send the data to cloud
based applications and storage back ends. The data collected in cloud can then be analyzed and
visualized by cloud based applications.
b) Air Pollution Monitoring: System can monitor emission of harmful gases(CO2, CO, NO, NO2 etc.,)
by factories and automobiles using gaseous and meteorological sensors. The collected data can be
analyzed to make informed decisions on pollutions control approaches.
c) Noise Pollution Monitoring: Due to growing urban development, noise levels in cities have increased
and even become alarmingly high in some cities. IoT based noise pollution monitoring systems use a
no. of noise monitoring systems that are deployed at different places in a city. The data on noise levels
from the station is collected on servers or in the cloud. The collected data is then aggregated to generate
noise maps.
d) Forest Fire Detection: Forest fire can cause damage to natural resources, property and human life.
Early detection of forest fire can help in minimizing damage.
e) River Flood Detection: River floods can cause damage to natural and human resources and human life.
Early warnings of floods can be given by monitoring the water level and flow rate. IoT based river flood
monitoring system uses a no. of sensor nodes that monitor the water level and flow rate sensors.
4) Energy:
a) Smart Grids: is a data communication network integrated with the electrical grids that collects and
analyze data captured in near-real-time about power transmission, distribution and consumption. Smart
grid technology provides predictive information and recommendations to utilities, their suppliers, and
their customers on how best to manage power. By using IoT based sensing and measurement
technologies, the health of equipment and integrity of the grid can be evaluated.
b) Renewable Energy Systems: IoT based systems integrated with the transformers at the point of
interconnection measure the electrical variables and how much power is fed into the grid. For wind
energy systems, closed-loop controls can be used to regulate the voltage at point of interconnection
which coordinate wind turbine outputs and provides power support.
c) Prognostics: In systems such as power grids, real-time information is collected using specialized
electrical sensors called Phosphor Measurement Units(PMUs) at the substations. The information
received from PMUs must be monitored in real-time for estimating the state of the system and for
predicting failures.
5) Retail:
a) Inventory Management: IoT systems enable remote monitoring of inventory using data collected by
RFIDreaders.
b) Smart Payments: Solutions such as contact-less payments powered by technologies such as Near Field
Communication(NFC) and Bluetooth.
c) Smart Vending Machines: Sensors in a smart vending machines monitors its operations and send the
data to cloud which can be used for predictive maintenance.
6) Logistics:
a) Route generation & scheduling: IoT based system backed by cloud can provide first response to the
route generation queries and can be scaled upto serve a large transportation network.
c) Shipment Monitoring: IoT based shipment monitoring systems use sensors such as temp, humidity, to
monitor the conditions and send data to cloud, where it can be analyzed to detect foods poilage.
d) Remote Vehicle Diagnostics: Systems use on-board IoT devices for collecting data on Vehicle
operations(speed, RPMetc.,) and status of various vehicle subsystems.
7) Agriculture:
8) Industry:
b) Wearable Electronics
The IoT system is defined in different levels called as tiers. A model enables the
conceptualisation of the framework.
A reference model can be used to depict the building blocks, successive interactions and
integration.
The diagram below depicts the CISCO presentation of a reference model comprising of 7 levels
and the functions of each level.
• The architecture serves as a reference in the applications of IoT in services and business
processes.
• A set of sensors which are smart, capture the data, perform necessary data element analysis
and transformation as per device application framework and connect directly to a
communication manager.
• The communication management subsystem consists of protocol handlers, message routers
and access management.
• Data routes from gateway through the Internet and data centre to the application server or
enterprise server which acquires that data.
• Organisation and analysis subsystems enable the services, business processes, enterprise
integration and complex processes.
M2M Communication
Traditionally, M2M focused on “industrial telematics,” which is a fancy way of explaining data
transfer for some commercial benefit. But many original uses of M2M still stand today, like smart meters.
Wireless M2M has been dominated by cellular since it came out in the mid-2000’s with 2G cell networks.
Because of this, the cellular market has tried to brand M2M as an inherently cellular thing by offering M2M
data plans. But cellular M2M is only one subsection of the market, and it shouldn’t be thought of as a
cellular-only area.
How M2M Works
As previously stated, machine-to-machine communication makes the Internet of Things possible. According
to Forbes, M2M is among the fastest-growing types of connected device technologies in the market right
now, largely because M2M technologies can connect millions of devices within a single network. The range
of connected devices includes anything from vending machines to medical equipment to vehicles to
buildings. Virtually anything that houses sensor or control technology can be connected to some sort of
wireless network.
This sounds complex, but the driving thought behind the idea is quite simple. Essentially, M2M networks
are very similar to LAN or WAN networks, but are exclusively used to allow machines, sensors, and
controls, to communicate. These devices feed information they collect back to other devices in the network.
This process allows a human (or an intelligent control unit) to assess what is going on across the whole
network and issue appropriate instructions to member devices.
M2M Applications
The possibilities in the realm of M2M can be seen in four major use cases, which we’ve detailed below:
1. MANUFACTURING
2. HOME APPLIANCES
IoT already affects home appliance connectivity through platforms like Nest. However, M2M is expected to
take home-based IoT to the next level. Manufacturers like LG and Samsung are already slowly unveiling
smart home appliances to help ensure a higher quality of life for occupants.
For example, an M2M-capable washing machine could send alerts to the owners’ smart devices once it
finishes washing or drying, and a smart refrigerator could automatically order groceries from Amazon once
its inventory is depleted. There are many more examples of home automation that can potentially improve
quality of life for residents, including systems that allow members of the household to remotely control
HVAC systems using their mobile devices. In situations where a homeowner decides to leave work early, he
or she could contact the home heating system before leaving work to make sure the temperature at home will
be comfortable upon arrival.
One of the biggest opportunities for M2M technology is in the realm of health care. With M2M technology,
hospitals can automate processes to ensure the highest levels of treatment. Using devices that can react faster
than a human healthcare professional in an emergency situation make this possible. For instance, when a
patient’s vital signs drop below normal, an M2M-connected life support device could automatically
administer oxygen and additional care until a healthcare professional arrives on the scene. M2M also allows
patients to be monitored in their own homes instead of in hospitals or care centers.
For example, devices that track a frail or elderly person’s normal movement can detect when he or she has
had a fall and alert a healthcare worker to the situation.
There are different M2M applications, environment monitoring, civil protection and public safety, supply
chain management, energy and utility distribution as in smart grid, smart grid separately common. we have
intelligent transportation systems, healthcare, automation of buildings, military applications, agriculture,
home networks all these are different applications of M2M.
M2M features:
M2M device connects to the network domain via direct connectivity or M2M gateway. In the first
case, the M2M device connects to the network domain via the access network, which performs the
procedures such as registration, authentication, authorization, management, and provisioning with
the network domain. In the second case, the M2M device connects to the M2M gateway using the
M2M area network.
M2M area network provides connectivity between M2M devices and M2M gateways.
M2M gateway acts as a proxy between M2M devices and the network domain. As an example, an
M2M gateway can run an application that collects and treats various information (e.g., contextual
parameters) from sensors and meters.
M2M communication network provides connection between the M2M gateways/devices and the
M2M servers. Usually it contains two parts: the access network and the Internet.
M2M server works as a middleware layer to pass data through various application services.
Difference Between IoT and M2M:
M2M technology could be present in our homes, offices, shopping malls and other places. Controlling
electrical appliances like bulbs and fans using RF or Bluetooth from your smartphone is a simple example of
M2M applications at home. Here, the electrical appliance and your smartphone are the two machines
interacting with each other.
The Internet of Things (IoT) is the network of physical devices embedded with sensors, software and
electronics, enabling these devices to communicate with each other and exchange data over a computer
network. The things in the IoT refer to hardware devices uniquely identifiable through a network platform
within the Internet infrastructure.
Some more differences like:
Communication Protocols:
• M2M and IoT can differ in how the communication between the machines ordevices happens.
• M2M uses either proprietary or non-IP based communication protocols for
communication within the M2M area networks. IoT uses IP bases communication protococls.
• The "Things" in IoT refers to physical objects that have unique identifiers and can sense and communicate
with their external environment (and user applications) or their internal physical states.
• M2M systems, in contrast to IoT, typically have homogeneous machine types within an M2M area
network.
Hardware vs Software Emphasis:
• While the emphasis of M2M is more on hardware with embedded modules, the
emphasis of IoT is more on software.
Applications:
• M2M data is collected in point solutions and can be accessed by on premises applications such as
diagnosis applications, service management applications, and on- premises enterprise applications.
• IoT data is collected in the cloud and can be accessed by cloud applications such as analytics applications,
enterprise applications, remote diagnosis and management applications, etc
Data plane:
All the activities involving as well as resulting from data packets sent by the end-user belong to this plane.
This includes:
Forwarding of packets.
Segmentation and reassembly of data.
Replication of packets for multicasting.
Control plane:
All activities necessary to perform data plane activities but do not involve end-user data packets belong to
this plane. In other words, this is the brain of the network. The activities of the control plane include:
Making routing tables.
Setting packet handling policies.
Why SDN is Important?
Better Network Connectivity: SDN provides very better network connectivity for sales,
services, and internal communications. SDN also helps in faster data sharing.
Better Deployment of Applications: Deployment of new applications, services, and many
business models can be speed up using Software Defined Networking.
Better Security: Software-defined network provides better visibility throughout the network.
Operators can create separate zones for devices that require different levels of security. SDN
networks give more freedom to operators.
Better Control with High Speed: Software-defined networking provides better speed than other
networking types by applying an open standard software-based controller.
In short, it can be said that- SDN acts as a “Bigger Umbrella or a HUB” where the rest of other networking
technologies come and sit under that umbrella and get merged with another platform to bring out the best of
the best outcome by decreasing the traffic rate and by increasing the efficiency of data flow.
Where is SDN Used?
Enterprises use SDN, the most widely used method for application deployment, to deploy
applications faster while lowering overall deployment and operating costs. SDN allows IT
administrators to manage and provision network services from a single location.
Cloud networking software-defined uses white-box systems. Cloud providers often use generic
hardware so that the Cloud data center can be changed and the cost of CAPEX and OPEX saved.
Components of Software Defining Networking (SDN)
SDN Architecture
In a traditional network, each switch has its own data plane as well as the control plane. The control plane of
various switches exchange topology information and hence construct a forwarding table that decides where
an incoming data packet has to be forwarded via the data plane. Software-defined networking (SDN) is an
approach via which we take the control plane away from the switch and assign it to a centralized unit called
the SDN controller. Hence, a network administrator can shape traffic via a centralized console without
having to touch the individual switches. The data plane still resides in the switch and when a packet enters a
switch, its forwarding activity is decided based on the entries of flow tables, which are pre-assigned by the
controller. A flow table consists of match fields (like input port number and packet header) and instructions.
The packet is first matched against the match fields of the flow table entries. Then the instructions of the
corresponding flow entry are executed. The instructions can be forwarding the packet via one or multiple
ports, dropping the packet, or adding headers to the packet. If a packet doesn’t find a corresponding match in
the flow table, the switch queries the controller which sends a new flow entry to the switch. The switch
forwards or drops the packet based on this flow entry.
Application layer: It contains the typical network applications like intrusion detection, firewall,
and load balancing
Control layer: It consists of the SDN controller which acts as the brain of the network. It also
allows hardware abstraction to the applications written on top of it.
Infrastructure layer: This consists of physical switches which form the data plane and carries
out the actual movement of data packets.
The layers communicate via a set of interfaces called the north-bound APIs(between the application and
control layer) and southbound APIs(between the control and infrastructure layer).
SDN Architecture
Open SDN
2. SDN via APIs: In SDN via API, the functions in remote devices like switches are invoked using
conventional methods like SNMP or CLI or through newer methods like Rest API. Here, the devices are
provided with control points enabling the controller to manipulate the remote devices using APIs.
3. SDN via Hypervisor-based Overlay Network: In SDN via the hypervisor, the configuration of physical
devices is unchanged. Instead, Hypervisor based overlay networks are created over the physical network.
Only the devices at the edge of the physical network are connected to the virtualized networks, thereby
concealing the information of other devices in the physical network.
SDN via Hypervisor-based Overlay Network
Software Defined Network is a virtual networking A traditional network is the old conventional
approach. networking approach.
Software Defined Network is the open interface. A traditional network is a closed interface.
In Software Defined Network data plane and In a traditional network data plane and control
control, the plane is decoupled by software. plane are mounted on the same plane.
For more details you can refer differences between SDN and Traditional Networking article.
Advantages of SDN
The network is programmable and hence can easily be modified via the controller rather than
individual switches.
Switch hardware becomes cheaper since each switch only needs a data plane.
Hardware is abstracted, hence applications can be written on top of the controller independent of
the switch vendor.
Provides better security since the controller can monitor traffic and deploy security policies. For
example, if the controller detects suspicious activity in network traffic, it can reroute or drop the
packets.
Disadvantages of SDN
The central dependency of the network means a single point of failure, i.e. if the controller gets
corrupted, the entire network will be affected.
The use of SDN on large scale is not properly defined and explored.
With the help of NFV, it becomes possible to separate communication services from specialized hardware
like routers and firewalls. This eliminates the need for buying new hardware and network operations can
offer new services on demand. With this, it is possible to deploy network components in a matter of hours as
opposed to months as with conventional networking. Furthermore, the virtualized services can run on less
expensive generic servers.
Advantages:
Lower expenses as it follows Pay as you go which implies companies only pay for what they
require.
Less equipment as it works on virtual machines rather than actual machines which leads to fewer
appliances, which lowers operating expenses as well.
Scalability of network architecture is quite quick and simple using virtual functions in NFV. As a
result, it does not call for the purchase of more hardware.
Working:
Usage of software by virtual machines enables to carry out the same networking tasks as conventional
hardware. The software handles the task of load balancing, routing, and firewall security. Network engineers
can automate the provisioning of the virtual network and program all of its various components using a
hypervisor or software-defined networking controller.
Benefits of NFV:
Many service providers believe that advantages outweigh the issues of NFV.
Traditional hardware-based networks are time-consuming as these require network
administrators to buy specialized hardware units, manually configure them, then join them to
form a network. For this skilled or well-equipped worker is required.
It costs less as it works under the management of a hypervisor, which is significantly less
expensive than buying specialized hardware that serves the same purpose.
Easy to configure and administer the network because of a virtualized network. As a result,
network capabilities may be updated or added instantly.
Risks of NFV:
Security hazards do exist, though, and network functions virtualization security issues have shown to be a
barrier to widespread adoption among telecom companies. The following are some dangers associated with
implementing network function virtualization that service providers should take into account:
Physical security measures do not work: Comparing virtualized network components to
locked-down physical equipment in a data center enhances their susceptibility to new types of
assaults.
Malware is difficult to isolate and contain: Malware travels more easily among virtual
components running on the same virtual computer than between hardware components that can
be isolated or physically separated.
Network activity is less visible: Because traditional traffic monitoring tools struggle to detect
potentially malicious anomalies in network traffic going east-west between virtual machines,
NFV necessitates more fine-grained security solutions.
NFV Architecture:
An individual proprietary hardware component, such as a router, switch, gateway, firewall, load balancer, or
intrusion detection system, performs a specific networking function in a typical network architecture. A
virtualized network substitutes software programs that operate on virtual machines for these pieces of
hardware to carry out networking operations.
Three components make up an NFV architecture:
Centralized virtual network infrastructure: The foundation of an NFV infrastructure can be
either a platform for managing containers or a hypervisor that abstracts the resources for
computation, storage, and networking.
Applications: Software delivers many forms of network functionality by substituting for the
hardware elements of a conventional network design (virtualized network functions).
Framework: To manage the infrastructure and provide network functionality, a framework is
required (commonly abbreviated as MANO, meaning Management, Automation, and Network
Orchestration).
NeedforIoTSystems Management
Managingmultipledeviceswithinasinglesystem requiresadvancedmanagementcapabilitie.
1) AutomatingConfiguration:IoTsystemmanagementcapabilitiescanhelpin automating
the systemconfiguration.
2) Monitoring Operational & Statistical Data : Management systems can help in monitoring
opeartional and statistical data of a system. This data can be used for fault diagnosis orprognosis.
3) Improved Reliability: A management system that allows validating the system
configurationsbeforetheyareputinto effect canhelp inimprovingthe systemreliability.
4) System Wide Configurations : For IoT systems that consists of multiple devices or nodes,
ensuring system wide configuration can be critical for the correct functioning of thesystem.
5) Multiple System Configurations : For some systems it may be desirable to have
multiplevalidconfigurationswhichareappliedatdifferenttimesorin certainconditions.
6) Retrieving&ReusingConfigurations: Managementsystemswhichhavethecapability of retrieving
configurations from devices can help in reusing the configurations for other devices of the
sametype.
IoTSystemsManagementwithNETCONF-YANG
1) ManagementSystem
2) ManagementAPI
3) TransactionManager
4) RollbackManager
5) Data ModelManager
6) ConfigurationValidator
7) ConfigurationDatabase
8) ConfigurationAPI
9) Data ProviderAPI
1) Management System : The operator uses a management system to send NETCONF messages to
configure the IoT device and receives state information and notifications from the device as
NETCONFmessages.
2) ManagementAPI :allowsmanagementapplicationtostartNETCONFsessions.
3) Transaction Manager: executes all the NETCONF transactions and ensures that ACID properties
hold true for thetrasactions.
4) Rollback Manager : is responsible for generating all the transactions necessary to rollback a
current configuration to its original state.
6) Configuration Validator : checks if the resulting configuration after applying a transaction would
be a validconfiguration.
7) ConfigurationDatabase:containsbothconfigurationandoperastionaldata.
8) Configuration API : Using the configuration API the application on the IoT device can be read
configuration data from the configuration datastore and write opeartional data to the
opearationaldatastore.
StepsforIoTdeviceManagementwithNETCONF-YANG
1) Create a YANG model of the system that defines the configuration and state data of the system.
2) CompletetheYANGmodelwiththe‗Inctool‘whichcomeswithLibnetconf.
3) Fillinthe IoTdevicemangementcodeintheTransAPImodule.
4) BuildthecallbacksC filetogeneratethelibraryfile.
5) Load the YANG module and the TransAPImodule into the Netopeer server using
Netopeermanagertool.
6) The operator can now connect from the management system to the Netopeer server using the
NetopeerCLI.
7) Operator can issue NETCONF commands from the Netopeer CLI. Command can be issued to
changew the configuration dsta, get operational dat or execute an RPC on the IoTdevice.
The first step in IoT system design methodology is to define the purpose and requirements of the
system. In this step, the system purpose, behavior and requirements (such as data collection
requirements, data analysis requirements, system management requirements, data privacy and
security requirements, user interface requirements, ...) are captured.
The second step in the IoT design methodology is to define the process specification. In this step,
the use cases of the IoT system are formally described based on and derived from the purpose
and requirement specifications.
The third step in the IoT design methodology is to define the Domain Model. The domain model
describes the main concepts, entities and objects in the domain of IoT system to be designed.
Domain model defines the attributes of the objects and relationships between objects. Domain
model provides an abstract representation of the concepts, objects and entities in the IoT domain,
independent of any specific technology or platform. With the domain model, the IoT system
designers can get an understanding of the IoT domain for which the system is to be designed.
The fourth step in the IoT design methodology is to define the Information Model. Information
Model defines the structure of all the information in the IoT system, for example, attributes of
Virtual Entities, relations, etc. Information model does not describe the specifics of how the
information is represented or stored. To define the information model, we first list the Virtual
Entities defined in the Domain Model. Information model adds more details to the Virtual
Entities by defining their attributes and relations.
The fifth step in the IoT design methodology is to define the service specifications. Service
specifications define the services in the IoT system, service types, service inputs/output, service
endpoints, service schedules, service preconditions and service effects.
The sixth step in the IoT design methodology is to define the IoT level for the system.
The seventh step in the IoT design methodology is to define the Functional View. The Functional
View (FV) defines the functions of the IoT systems grouped into various Functional Groups
(FGs). Each Functional Group either provides functionalities for interacting with instances of
concepts defined in the Domain Model or provides information related to these concepts.
The eighth step in the IoT design methodology is to define the Operational View Specifications.
In this step, various options pertaining to the IoT system deployment and operation are defined,
such as, service hosting options, storage options, device options, application hosting options, etc
The final step in the IoT design methodology is to develop the IoT application.
Sensors:
• Generally speaking, a sensor is a device that is able to detect changes in an environment. By itself, a
sensor is useless, but when we use it in an electronic system, it plays a key role. A sensor is able to
measure a physical phenomenon (like temperature, pressure, and so on) and transform it into an
electric signal. These three features should be at the base of a good sensor:
• It should be sensitive to the phenomenon that it measures
• It should not be sensitive to other physical phenomena
• It should not modify the measured phenomenon during the measurement process
• There is a wide range of sensors we can exploit to measure almost all the physical properties around
us. A few common sensors that are widely adopted in everyday life include thermometers, pressure
sensors, light sensors, accelerometers, gyroscopes, motion sensors, gas sensors and many more.
A sensor can be described using several properties, the most important being:
• Range: The maximum and minimum values of the phenomenon that the sensor can measure.
• Sensitivity: The minimum change of the measured parameter that causes a detectable change in
output signal.
• Resolution: The minimum change in the phenomenon that the sensor can detect.
Sensor Classification:
Passive or Active: Passive sensors do not require an external power source to monitor an environment,
while Active sensors require such a source in order to work. A passive sensor is one which just ‘listens’ to
what is happening.
Examples include:
A light sensor which detects if a light is shining on it.
An infra-red sensor which detects the temperature of an object.
An active sensor is one which transmits a signal into the environment and then measures the response that
comes back.
One example is an ultrasonic system:
Another classification is based on the method used to detect and measure the property (mechanical,
chemical, etc.).
Analog and Digital: Analog sensors produce an analog, or continuous, signal while digital sensors produce
a discrete signal.
There are different types of sensors that produce continuous analog output signal and these sensors are
analog sensors. This continuous output signal produced by the analog sensors is proportional to the
measurand. Generally, There are various types of analog sensors; practical examples of various types of
analog sensors are as follows: accelerometers, pressure sensors, light sensors, sound sensors, temperature
sensors, and so on.
Unlike analog sensor, Digital Sensor produce discrete values (0 and 1’s). Discrete values often called digital
or binary signals in digital communication.
Electronic sensors or electrochemical sensors in which data conversion and data transmission take place
digitally are digital sensors. These digital sensors are replacing analog sensors as they are capable of
overcoming the drawbacks of analog sensors. The digital sensor consists of majorly three components such
as senor, cable, and transmitter. But, In digital sensors, the signal measured directly converted into digital
signal output inside the digital sensor itself. So, this digital signal transmitted through cable digitally. There
are different types of digital sensors that overcome the disadvantages of analog sensors.
Then, scaler sensors basically measure scalar variables which can measure only the changes in the
magnitude whereas, the vector senses not only the magnitude, but also the direction. So, scalar sensor
example would be temperature sensor is an example of scalar sensor because you know irrespective of
which orientation you put, the sensor temperature sensor or in which direction you are taking it, it is going to
give you the magnitude value. Only the changes in the magnitude of the temperature, on the contrary we
have the vector sensor. For example, the camera sensor or the accelerometer sensor whose values are
dependent on the orientation on the direction and so on direction in which the sensor is being put and the
weight is measuring. Scalar sensors measure only the magnitude physical quantities, such as temperature
colour, pressure, strain etcetera. These are scalar quantities and measurement of the change of magnitude is
sufficient to convey the information.
On the other hand, vector sensors produce output signal of the voltage which is generally proportional to the
magnitude as well as the direction and orientation of the quantity that is being measured. So, physical
quantities such as the sound, image, velocity, acceleration orientation, these are all vector quantities and
their measurement is not just dependent on the magnitude, but also on the direction. So, for example,
accelerometer sensor, they give outputs in three dimensions x, y and z coordinate axis.
1) Temperature Sensors
• Temperature sensors measure the amount of heat energy in a source, allowing them to detect
temperature changes and convert these changes to data. Machinery used in manufacturing often
requires environmental and device temperatures to be at specific levels. Similarly, within agriculture,
soil temperature is a key factor for crop growth.
2) Humidity Sensors
• These types of sensors measure the amount of water vapor in the atmosphere of air or other gases.
Humidity sensors are commonly found in heating, vents and air conditioning (HVAC) systems in
both industrial and residential domains. They can be found in many other areas including hospitals,
and meteorology stations to report and predict weather.
• A pressure sensor senses changes in gases and liquids. When the pressure changes, the sensor detects
these changes, and communicates them to connected systems. Common use cases include leak
testing which can be a result of decay. Pressure sensors are also useful in the manufacturing of water
systems as it is easy to detect fluctuations or drops in pressure.
5. Proximity Sensors
• Proximity sensors are used for non-contact detection of objects near the sensor. These types of
sensors often emit electromagnetic fields or beams of radiation such as infrared. Proximity sensors
have some interesting use cases. In retail, a proximity sensor can detect the motion between a
customer and a product in which he or she is interested. The user can be notified of any discounts or
special offers of products located near the sensor. Proximity sensors are also used in the parking lots
of malls, stadiums and airports to indicate parking availability. They can also be used on the
assembly lines of chemical, food and many other types of industries.
6. Level Sensors
• Level sensors are used to detect the level of substances including liquids, powders and granular
materials. Many industries including oil manufacturing, water treatment and beverage and food
manufacturing factories use level sensors. Waste management systems provide a common use case
as level sensors can detect the level of waste in a garbage can or dumpster.
7. Accelerometers
• Accelerometers detect an object’s acceleration i.e. the rate of change of the object’s velocity with
respect to time. Accelerometers can also detect changes to gravity. Use cases for accelerometers
include smart pedometers and monitoring driving fleets. They can also be used as anti-theft
protection alerting the system if an object that should be stationary is moved.
8. Gyroscope
• Gyroscope sensors measure the angular rate or velocity, often defined as a measurement of speed
and rotation around an axis. Use cases include automotive, such as car navigation and electronic
stability control (anti-skid) systems. Additional use cases include motion sensing for video games,
and camera-shake detection systems.
9. Gas Sensors
• These types of sensors monitor and detect changes in air quality, including the presence of toxic,
combustible or hazardous gasses. Industries using gas sensors include mining, oil and gas, chemical
research and manufacturing. A common consumer use case is the familiar carbon dioxide detectors
used in many homes.
• These types of sensors sense characteristics in their surroundings by either emitting or detecting
infrared radiation. They can also measure the heat emitted by objects. Infrared sensors are used in a
variety of different IoT projects including healthcare as they simplify the monitoring of blood flow
and blood pressure.
• Televisions use infrared sensors to interpret the signals sent from a remote control. Another
interesting application is that of art historians using infrared sensors to see hidden layers in paintings
to help determine whether a work of art is original or fake or has been altered by a restoration
process.
Optical sensors convert rays of light into electrical signals. There are many applications and use cases for
optical sensors. In the auto industry, vehicles use optical sensors to recognize signs, obstacles, and other
things that a driver would notice when driving or parking. Optical sensors play a big role in the development
of driverless cars. Optical sensors are very common in smart phones. For example, ambient light sensors can
extend battery life. Optical sensors are also used in the biomedical field including breath analysis and heart-
rate monitors.
Actuators:
• An IoT device is made up of a Physical object (“thing”) + Controller (“brain”) + Sensors + Actuators
+ Networks (Internet). An actuator is a machine component or system that moves or controls the
mechanism or the system. Sensors in the device sense the environment, then control signals are
generated for the actuators according to the actions needed to perform.
• A servo motor is an example of an actuator. They are linear or rotatory actuators, can move to a
given specified angular or linear position. We can use servo motors for IoT applications and make
the motor rotate to 90 degrees, 180 degrees, etc., as per our need.
• The following diagram shows what actuators do; the controller directs the actuator based on the
sensor data to do the work.
• The control system acts upon an environment through the actuator. It requires a source of energy and
a control signal. When it receives a control signal, it converts the source of energy to a mechanical
operation. On this basis, on which form of energy it uses, it has different types given below.
Types of Actuators:
Hydraulic Actuators –
A hydraulic actuator uses hydraulic power to perform a mechanical operation. They are actuated by a
cylinder or fluid motor. The mechanical motion is converted to rotary, linear, or oscillatory motion,
according to the need of the IoT device. Example- construction equipment uses hydraulic actuators
because hydraulic actuators can generate a large amount of force. So, this name suggests, these
hydraulic actuators consist of a cylinder or fluid motor that uses hydraulic power to facilitate
mechanical operation. The mechanical motion is converted to linear rotary or oscillatory motion.
Basically when some fluid passes through, then you know that motion is converted to some linear
motion or some oscillatory motion or rotary motion and since liquids are nearly impossible to
compress, most of the hydraulic actuators basically exert considerable force which is the reason why
liquid based actuators are typically used and these are quite popular because of this particular reason.
Pneumatic Actuators –
A pneumatic actuator uses energy formed by vacuum or compressed air at high pressure to convert
into either linear or rotary motion. Example- Used in robotics, use sensors that work like human
fingers by using compressed air. Pneumatic actuator, pneumatic means air based. A pneumatic
actuator basically converts the energy formed by vacuum or compressed air at high pressure into
either linear or rotatory motion. Pneumatic actuators basically exert a lot of force and for example,
the pneumatic brakes can be very responsive to small changes in pressure that are applied by the
driver.
Pneumatic brakes are quite common in different devices like trucks etc. They use pneumatic brakes.
So, hydraulic brakes are more common in cars, in trucks pneumatic brakes are quite common. The
advantage of pneumatic brakes, is that they are very responsive to small changes.
Electrical Actuators –
An electric actuator uses electrical energy, is usually actuated by a motor that converts electrical energy into
mechanical torque. An example of an electric actuator is a solenoid based electric bell. An electric actuator
is generally powered by a motor that converts electrical energy into mechanical torque. So, this electrical
energy is used to actuate the equipment, such as the solenoid valve which control the flow of water in pipes
in response to electrical signals.
Thermal /Magnetic Actuators –
• Actuators are simply devices used to transform energy into motion. A thermal actuator is a type of
non-electric motor made of components such as a piston and a thermal sensitive material capable of
producing linear motion in response to temperature changes.
• Magnetic Actuators: Magnetic Actuators use magnetic effects to generate forces which impact on the
motion of a part in the actuator.
Mechanical Actuators –
• A mechanical actuator executes movement by converting rotary motion into linear motion. It
involves pulleys, chains, gears, rails, and other devices to operate.
UNIT Iii BUILDING IoT WITH CLOUD AND DATA ANALYTICS
IoT platforms – Arduino – Raspberry Pi - Cloud Computing in IoT - Cloud Connectivity - Big
Data Analytics - Data Visualization
Iot Platform
Thus, an IoT platform can be wearing different hats depending on how you look at it. It is
commonly referred to as middleware when we talk about how it connects remote devices to user
applications (or other devices) and manages all the interactions between the hardware and the
application layers. It is also known as a cloud enablement platform or IoT enablement platform
to pinpoint its major business value, that is empowering standard devices with cloud-based
applications and services. Finally, under the name of the IoT application enablement platform, it
shifts the focus to being a key tool for IoT developers.
IoT platforms originated in the form of IoT middleware, which purpose was to function as a
mediator between the hardware and application layers. Its primary tasks included data collection
from the devices over different protocols and network topologies, remote device configuration
and control, device management, and over-the-air firmware updates.
In the four typical layers of the IoT stack, which are things, connectivity, core IoT features, and
applications & analytics, a top-of-the-range IoT platform should provide you with the majority of
IoT functionality needed for developing your connected devices and smart things.
Your devices connect to the platform, which sits in the cloud or in your on-premises data center,
either directly or by using an IoT gateway. A gateway comes useful whenever your endpoints
aren’t capable of direct cloud communication or, for example, you need some computing power
on edge. You can also use an IoT gateway to convert protocols, for example, when your
endpoints are in LoRaWan network but you need them to communicate with the cloud over
MQTT.
An IoT platform itself can be decomposed into several layers. At the bottom there is the
infrastructure level, which is something that enables the functioning of the platform. You can
find here components for container management, internal platform messaging, orchestration of
IoT solution clusters, and others.
The communication layer enables messaging for the devices; in other words, this is where
devices connect to the cloud to perform different operations.
The following layer represents core IoT features provided by the platform. Among the essential
ones are data collection, device management, configuration management, messaging, and OTA
software updates.
Sitting on top of core IoT features, there is another layer, which is less related to data exchange
between devices but rather to processing of this data in the platform. There is reporting, which
allows you to generate custom reports. There is visualization for data representation in user
applications. Then, there are a rule engine, analytics, and alerting for notifying you about any
anomalies detected in your IoT solution.
Importantly, the best IoT platforms allow you to add your own industry-specific components and
third-party applications. Without such flexibility adapting an IoT platform for a particular
business scenario could bear significant extra cost and delay the solution delivery indefinitely.
Advanced IoT platforms
There are some other important criteria that differentiate IoT platforms between each other, such
as scalability, customizability, ease of use, code control, integration with 3rd party software,
deployment options, and the data security level.
• Scalable (cloud native) – advanced IoT platforms ensure elastic scalability across
any number of endpoints that the client may require. This capability is taken for
granted for public cloud deployments but it should be specifically put to the test in
case of an on-premises deployment, including the platform’s load balancing
capabilities for maximized performance of the server cluster.
• Customizable – a crucial factor for the speed of delivery. It closely relates to
flexibility of integration APIs, louse coupling of the platform’s components, and
source code transparency. For small-scale, undemanding IoT solutions good APIs
may be enough to fly, while feature-rich, rapidly evolving IoT ecosystems usually
require developers to have a greater degree of control over the entire system, its
source code, integration interfaces, deployment options, data schemas,
connectivity and security mechanisms, etc.
• Secure – data security involves encryption, comprehensive identity management,
and flexible deployment. End-to-end data flow encryption, including data at rest,
device authentication, user access rights management, and private cloud
infrastructure for sensitive data – this is the basics of how to avoid potentially
compromising breaches in your IoT solution.
Cutting across these aspects, there are two different paradigms of IoT solution cluster
deployment offered by IoT platform providers: a public cloud IoT PaaS and a self-hosted private
IoT cloud.
An IoT cloud is a pinnacle of the IoT platforms evolution. Sometimes these two terms are used
interchangeably, in which case the system at hand is typically an IoT platform-as-aservice
(PaaS). This type of solution allows you to rent cloud infrastructure and an IoT platform all from
a single technology provider. Also, there might be ready-to-use IoT solutions (IoT cloud
services) offered by the provider, built and hosted on its infrastructure. However, one important
capability of a modern IoT platform consists in a private IoT cloud enablement. As opposed to
public PaaS solutions located at a provider’s cloud, a private IoT cloud can be hosted on any
cloud infrastructure, including a private data center. This type of deployment offers much greater
control over the new features development, customization, and third-party integrations. It is also
advocated for stringent data security and performance requirements.
Board Types
Various kinds of Arduino boards are available depending on different microcontrollers used.
However, all Arduino boards have one thing in common: they are programed through the
Arduino IDE.
The differences are based on the number of inputs and outputs (the number of sensors,
LEDs, and buttons you can use on a single board), speed, operating voltage, form factor etc.
Some boards are designed to be embedded and have no programming interface (hardware),
which you would need to buy separately. Some can run directly from a 3.7V battery, others need
at least 5V.
Here is a list of different Arduino boards available.
In this chapter, we will learn about the different components on the Arduino board. We will
study the Arduino UNO board because it is the most popular board in the Arduino board family.
In addition, it is the best board to get started with electronics and coding. Some boards look a bit
different from the one given below, but most Arduinos have majority of these components in
common.
Power USB
Arduino board can be powered by using the USB cable from your computer. All
you need to do is connect the USB cable to the USB connection (1).
Voltage Regulator
The function of the voltage regulator is to control the voltage given to the
Arduino board and stabilize the DC voltages used by the processor and other
elements.
Crystal Oscillator
The crystal oscillator helps Arduino in dealing with time issues. How does
Arduino calculate time? The answer is, by using the crystal oscillator. The
number printed on top of the Arduino crystal is 16.000H9H. It tells us that the
frequency is 16,000,000 Hertz or 16 MHz.
Arduino Reset
You can reset your Arduino board, i.e., start your program from the beginning.
You can reset the UNO board in two ways. First, by using the reset button (17)
on the board. Second, you can connect an external reset button to the Arduino
pin labelled RESET (5).
Analog pins
The Arduino UNO board has six analog input pins A0 through A5. These pins
can read the signal from an analog sensor like the humidity sensor or
temperature sensor and convert it into a digital value that can be read by the
microprocessor.
Main microcontroller
Each Arduino board has its own microcontroller (11). You can assume it as the
brain of your board. The main IC (integrated circuit) on the Arduino is slightly
different from board to board. The microcontrollers are usually of the ATMEL
Company. You must know what IC your board has before loading up a new
program from the Arduino IDE. This information is available on the top of the
IC. For more details about the IC construction and functions, you can refer to
the data sheet.
ICSP pin
Mostly, ICSP (12) is an AVR, a tiny programming header for the Arduino
consisting of MOSI, MISO, SCK, RESET, VCC, and GND. It is often referred
to as an SPI (Serial Peripheral Interface), which could be considered as an
"expansion" of the output. Actually, you are slaving the output device to the
master of the SPI bus.
TX and RX LEDs
On your board, you will find two labels: TX (transmit) and RX (receive). They
appear in two places on the Arduino UNO board. First, at the digital pins 0 and
1, to indicate the pins responsible for serial communication. Second, the TX
and RX led (13). The TX led flashes with different speed while sending the
serial data. The speed of flashing depends on the baud rate used by the board.
RX flashes during the receiving process.
Digital I/O
The Arduino UNO board has 14 digital I/O pins (15) (of which 6 provide PWM
(Pulse Width Modulation) output. These pins can be configured to work as input
digital pins to read logic values (0 or 1) or as digital output pins to drive different
modules like LEDs, relays, etc. The pins labeled “~” can be used to generate PWM.
AREF
AREF stands for Analog Reference. It is sometimes, used to set an external
reference voltage (between 0 and 5 Volts) as the upper limit for the analog
input pins.
After learning about the main parts of the Arduino UNO board, we are ready to learn how to set
up the Arduino IDE. Once we learn this, we will be ready to upload our program on the Arduino
board.
In this section, we will learn in easy steps, how to set up the Arduino IDE on our computer and
prepare the board to receive the program via USB cable.
Step 1 − First you must have your Arduino board (you can choose your favorite board) and a
USB cable. In case you use Arduino UNO, Arduino Duemilanove, Nano, Arduino Mega 2560, or
Diecimila, you will need a standard USB cable (A plug to B plug), the kind you would connect to
a USB printer as shown in the following image.
In case you use Arduino Nano, you will need an A to Mini-B cable instead as shown in the
following image.
The IoT concepts imply a creation of network of various devices interacting with each other and
with their environment. Interoperability and connectivity wouldn’t be possible without hardware
platforms that help developers solve issues such as building autonomous interactive objects or
completing common infrastructure related tasks.
Let’s go through the most popular IoT platforms and see how they work and benefit IoT software
developers.
Arduino
The Arduino platform was created back in 2005 by the Arduino company and allows for open
source prototyping and flexible software development and back-end deployment while providing
significant ease of use to developers, even those with very little experience building IoT
solutions.
Arduino is sensible to literally every environment by receiving source data from different
external sensors and is capable to interact with other control elements over various devices,
engines and drives. Arduino has a built-in micro controller that operates on the Arduino software.
Projects based on this platform can be both standalone and collaborative, i.e. realized with use of
external tools and plugins. The integrated development environment (IDE) is composed of the
open source code and works equally good with Мac, Linux and Windows OS. Based on a
processing programming language, the Arduino platform seems to be created for new users and
for experiments. The processing language is dedicated to visualizing and building interactive
apps using animation and Java Virtual Machine (JVM) platform.
Let's note that this programming language was developed for the purpose of learning basic
computer programming in a visual context. It is an absolutely free project available to every
interested person. Normally, all the apps are programmed in C/C++, and are wrapped with avr-
gcc (WinAVR in OS Windows).
Arduino offers analogue-to-digital input with a possibility of connecting light, temperature or
sound sensor modules. Such sensors as SPI or I2C may also be used to cover up to 99% of these
apps’ market.
Arduino is a microcontroller (generally it is the 8-bit ATmega microcontroller), but not a mini-
computer, which makes Arduino somehow limited in its features for advanced users. Arduino
provides an excellent interactivity with external devices and offers a wide range of user manuals,
project samples as well as a large community of users to learn from / share knowledge with.
Raspberry Pi
This block diagram describes Model B and B+; Model A, A+, and the Pi Zero are similar, but
lack theEthernetandUSBhub components. The Ethernet adapter is internally connected to an
additional USB port. In Model A, A+, and the Pi Zero, the USB port is connected directly to
thesystem on a chip(SoC). On the Pi 1 Model B+ and later models the USB/Ethernet chip
contains a five-port USB hub, of which four ports are available, while the Pi 1 Model B only
provides two. On the Pi Zero, the USB port is also connected directly to the SoC, but it uses
amicro USB(OTG) port. Unlike all other Pi models, the 40 pin GPIO connector is omitted on the
Pi Zero, with solderable through-holes only in the pin locations. The Pi Zero WH remedies this.
Processor speed ranges from 700 MHz to 1.4 GHz for the Pi 3 Model B+ or 1.5 GHz for the Pi 4;
on-board memory ranges from 256MiBto 1GiBrandom-access memory(RAM), with up to 8 GiB
available on the Pi 4.SecureDigital(SD) cards in MicroSDHC form factor (SDHC on early
models) are used to store the operating system and program memory. The boards have one to
fiveUSBports. For video output,HDMIandcomposite videoare supported, with a standard 3.5
mmtip-ring-sleevejack for audio output. Lower-level output is provided by a number
ofGPIOpins, which support common protocols likeI²C. The B-models have an8P8CEthernetport
and the Pi 3, Pi 4 and Pi Zero W have on-boardWi-
Fi802.11nandBluetooth.
Raspberry Pi is a mono-board computing platform that's as tiny as a credit card. Initially it was
developed for computer science education with later on progress to wider functions.
Since the inception of Raspberry, the company sold out more than 8 million items. Raspberry Pi
3 is the latest version and it is the first 64-bit computing board that also comes with built-in Wi-
Fi and Bluetooth functions. According to Raspberry Pi Foundation CEO Eben Upton, "it's been a
year in the making". The Pi3 version is replaced with a quad-core 64-bit
1.2 GHz ARM Cortex A53 chip, 1GB of RAM, VideoCore IV graphics, Bluetooth 4.1 and
802.11n Wi-Fi. The developers claim the new architecture delivers an average 50% performance
improvement over the Pi 2.
Another peculiarity of Raspberry Pi is the GPIO (General Purpose Input-Output), which is a low-
level interface of self-operated control by input-output ports. Raspberry has it as a 40pin
connector.
Raspberry Pi uses Linux as its default operating system (OS). It’s also fully Android compatible.
Using the system on Windows OS is enabled through any virtualization system like XenDesktop.
If you want to develop an application for Raspberry Pi on your computer, it is necessary to
download a specific toolset comprised of ARM-compiler and some libraries complied down to
ARM-target platform like glibc.
Cloud Computing in IOT
One component that improves the success of the Internet of Things is Cloud Computing. Cloud computing
enables users to perform computing tasks using services provided over the Internet. The use of the Internet
of Things in conjunction with cloud technologies has become a kind of catalyst: the Internet of Things and
cloud computing are now related to each other. These are true technologies of the future that will bring
many benefits.
Due to the rapid growth of technology, the problem of storing, processing, and accessing large amounts of
data has arisen. Great innovation relates to the mutual use of the Internet of Things and cloud technologies.
In combination, it will be possible to use powerful processing of sensory data streams and new monitoring
services. As an example, sensor data can be uploaded and saved using cloud computing for later use as
intelligent monitoring and activation using other devices. The goal is to transform data into insights and thus
drive cost-effective and productive action.
Benefits And Functions of IoT Cloud:
Cloud is a centralized system helping to transfer and deliver data and files to data centers over the Internet.
A variety of data and programs are easy to access from a centralized cloud system.
The Internet of Things refers to devices connected to the Internet. In the IoT, data is stored in real-time, as
well as historical data. The IoT can analyze and instruct devices to make effective decisions, as well as track
how certain actions function.
Cloud computing encompasses the delivery of data to datacenters over the Internet. IBM divides cloud
computing into six different categories:
1. Platform as a Service (PaaS) –
The cloud contains everything you need to build and deliver cloud applications so there is no
need to maintain and buy equipment, software, etc.
In this case, applications run in the cloud and other companies operate devices that connect to
users’ computers through a web browser.
3. Infrastructure as a Service (IaaS) –
IaaS is an option providing companies with storage, servers, networks and hubs processing data
for each use.
4. Public cloud –
Companies manage spaces and provide users with quick access through the public network.
5. Private cloud –
The same as a public cloud, but only one person has access here, which can be an
organization, an individual company, or a user.
6. Hybrid cloud –
Data processing at the network edge or edge computing is used with IoT solutions and enables faster
processing and response times. To get a better understanding of how this works, consider a large factory
with many implemented IoT sensors. In this situation, it makes sense, before sending data to the cloud for
processing, to aggregate it close to the border to prevent cloud overload by reducing direct connections.
Data centers with this approach make data processing much faster. Yet, an approach that is only based on
the edge will never provide a complete view of business operations. If there is no cloud solution, then the
factory only controls each unit individually. Also, it has no way of imagining how these units work in
relation to each other. This is why only the combination of the edge and the cloud will enable businesses to
benefit from IoT developments.
The Role of Cloud Computing on the Internet of Things:
Cloud computing works to improve the efficiency of daily tasks in conjunction with the Internet of Things.
Cloud computing is about providing a path for data to reach its destination while the Internet of Things
generates a huge amount of data.
According to Amazon Web Services, there are four benefits of cloud computing:
1. No need to pre-guess infrastructure capacity needs
2. Saves money, because you only need to pay for those resources that you use, the larger the scale,
the more savings
3. In a few minutes, platforms can be deployed around the world
4. Flexibility and speed in providing resources to developers
Figure 1: A view of an IoT node-to-cloud connection showing the hardware and software building blocks
employed for an end-to-end IoT connection. (Image: STMicroelectronics)
Anatomy of cloud connection
But how does an IoT-to-cloud connection actually work? For a start, like every communication cannel, the
link between an IoT device and the cloud service is established via wired or wireless communication
networks such as Ethernet and Wi-Fi. Next, there are two common transport- and application-layer protocols
that help facilitate communication between an IoT device and a cloud service.
At the transport-layer level, the device-to-cloud communication usually takes place either via Transmission
Control Protocol (TCP) or User Datagram Protocol (UDP). Here, it’s important to note that though TCP
takes more network overhead, it’s favored in IoT applications for its reliability. UDP, on the other hand, is
more suitable for applications like video streaming that can afford some data packet loss.
Next, at the application-layer level, Hyper Text Transfer Protocol (HTTP) is the common standard to send
connection requests and return responses for TCP-based communications. Message Queuing Telemetry
Transport (MQTT) is another application-layer protocol; it’s lightweight with a small code footprint and is
becoming popular in resource-constrained IoT devices.
It’s a two-way data communication over the Internet between a device and a remote service. An IoT device
establishes a connection with the Internet Protocol (IP) network and is subsequently hooked to the cloud.
Here, support from MCU vendors ranges from the hardware level to the API stacks to facilitate IoT-to-cloud
development.
The APIs are well defined, and they include open-source client libraries, example codes, and protocol
stacks. Then there are third-party tools that make these APIs easier to use and deploy. So, all developers
need to learn is how to use IoT device interfaces effectively; embedded designers who know how to use or
leverage IoT device APIs are now in high demand.
Figure 2: A step-by-step display of how an MCU-based IoT device can be connected to a cloud service like
AWS IoT Core. (Image: CNX Software)
Take the example of how MCU suppliers are integrating software platforms like Amazon FreeRTOS into
their microcontroller offerings (Figure 2). Amazon FreeRTOS is an open-source real-time operating system
(RTOS) for microcontrollers that includes kernel and software libraries to connect small, low-power MCUs
to Amazon’s cloud service AWS IoT Core.
The FreeRTOS-enabled microcontrollers can directly connect to a cloud service like AWS IoT Core, or they
can connect to a local edge device such as AWS Greengrass and sustain the communications even if the IoT
device loses connection to the cloud.
CHALLENGES IN IOT AND CASE STUDIES
Security Concerns and Challenges - Real time applications of IoT – Home automation – Automatic
lighting – Home intrusion detection – Cities – Smart parking – Environment – Weather monitoring
system – Agriculture – Smart irrigation.
IoT security is based on a cybersecurity strategy to protect IoT devices and the vulnerable networks
they connect to from cyber attacks. IoT devices have no built-in security. IoT security is needed to
help prevent data breaches because IoT devices transfer data over the internet unencrypted and
operate undetected by standard cybersecurity systems.
Along with the meaning of IoT Security, it is important to understand the many challenges facing
enterprises when dealing with IoT security issues. IoT devices were not built with security in mind.
The ongoing proliferation and diversity of IoT devices and communications channels increases the
potential for your organization to be exposed to cyber threats.
Unfortunately, there is no way to install security software on most IoT devices. IoT devices may
even ship with malware on them that infects the network when they connect. This is why network
security is a priority for IoT security.
Many network security solutions do not have the ability to detect connected IoT devices or show
which devices are communicating on the network.
The following sections explore these and other big IoT security challenges including:
IoT devices often rely on weak authentication and authorization practices, which makes them
vulnerable to threats. For example, many devices use default passwords making it easier for hackers
to gain access to IoT devices and the networks they use for communication. In addition, rogue IoT
devices (i.e., undetected) that are connected to the network can be used to steal data or launch
attacks.
Lack of Encryption
The overwhelming majority of IoT device network traffic is unencrypted making confidential and
personal data vulnerable to a malware attack such as ransomware or other form of data breach or
theft. This includes IoT devices used for medical imaging and patient monitoring, as well as security
cameras and printers.
The short development cycles and low price points of IoT devices limit the budget for developing
and testing secure firmware. Without this built-in IoT security, IoT devices are vulnerable to the
most rudimentary forms of attack. From firmware to software and third-party apps–millions of
devices are affected by vulnerabilities in standard components.
Plus, network environments can be compromised by vulnerable web apps and software for IoT
devices. Whether it is a new threat or old malware, without IoT security, all types of vulnerabilities
make IoT devices good targets for savvy bad actors to stage cyberattacks.
IoT devices are often connected to the same network as other devices, which means that an attack on
one device can spread to others. Lack of network segmentation and oversight of the ways IoT
devices communicate makes them easier to intercept. For example, not long ago the automotive
industry’s adoption of Bluetooth technology in IoT devices resulted in a wave of data breaches that
made the news. As well, protocols like HTTP (Hypertext Transfer Protocol) and API–are all
channels that IoT devices rely on and cyber criminals exploit.
For example, in 2022, millions of Buetooth digital locks in smart cars could be remotely unlocked by
hackers exploiting a vulnerability in Bluetooth technology. As well, protocols like HTTP (Hypertext
Transfer Protocol) and API-are channels that IoT devices rely on and cyber criminals can exploit.
IoT manufacturers don’t focus on building IoT security into their devices to make hardware tamper
proof and secure. Many IoT devices are not designed to receive regular IoT security updates, which
makes them vulnerable to attacks. Without built-in IoT security it’s difficult to ensure secure
upgrades, provide firmware updates and patches, and perform dynamic testing. Therefore, the onus
is on the organization to protect its IoT devices and network environment from cyber threats.
The IoT attack surface expands every day as more and more devices come online–from our
smartwatches and smart TVs, to our smart homes and smart cars, to the ever-growing industry IoT.
In addition to consumer goods, IoT sensors are widely used in healthcare, manufacturing, and supply
chain operations, as well as for green agriculture, the economy, and national defense.
Burgeoning IoT spans virtually any device or sensor that connects to the internet-from a large
container on an ocean barge to a small Tile Tracker for your phone. To underscore, the IEEE IoT
technology forecast of connected devices is expected to increase by about 300% from 8.7 billion
devices in 2020 to more than 25 billion IoT devices in 2030.
Given the expanded attack surface for security risks to availability, integrity and confidentiality, IoT
security is critical for organizations to protect their network environments from IoT device-borne
threats.
IoT and security requirements can only be accomplished with an integrated solution that delivers
visibility, segmentation, and protection throughout the entire network infrastructure, such as a
holistic security fabric approach.
Learn: With complete network visibility, security solutions can authenticate and classify IoT
devices to build a risk profile and assign them to IoT device groups.
Segment: Once the enterprise understands its IoT attack surface, IoT devices can be
segmented into policy-driven groups based on their risk profiles.
Protect: The policy-driven IoT groups and internal network segmentation enable monitoring,
inspection, and policy enforcement based on the activity at various points within the
infrastructure.
Understanding IoT Security Requirements
IoT security requirements support an IoT security strategy that is specific to the business, industry,
and network environment. There is a broad swath of protection to be considered in addition to the
rigor of practicing administrative oversight, conducting regular patches and updates, enforcing use of
strong passwords, and focusing on Wi-Fi security.
Monitoring network and device behavior to detect deviations is a best practice to detect malware
from an IoT device vulnerability. Another best practice is network segmentation of IoT devices
whereby they connect to a separate network to isolate vulnerable devices and threats to prevent
malware from spreading across the enterprise. Applying zero-trust network access provides an
additional layer of security.
With the limited configuration capabilities of many IoT devices, instead of trying to secure the IoT
firmware and software, you can protect your IoT environment with security solutions that provide
multiple layers of protection including endpoint encryption.
As the IoT and the cloud converge, consider securing the technologies with another layer of cloud-
based security solutions that also add processing capabilities to devices at the edge.
There are many different protocols used by IoT devices from internet protocols and network
protocols to Bluetooth and other communications protocols. Understanding the protocols your
devices use can help reduce security risks.
Industries that rely on GPS for critical operations should monitor their GPS connected devices for
potential security issues such as fake or jammed GPS signals.
Attackers prey on negligence. They take advantage of organizations that do not oversee IoT devices
that are connected to the corporate network. These devices can include anything from rogue devices
to overlooked routers with outdated firmware. Understanding the risk of each device that is
connected to your network and monitoring individual behavior is critical to prevent cyber attacks.
Also essential to IoT security is maintaining a full inventory of networked devices on the corporate
network. Finding a solution that can discover–in minutes–all the IoT connections within your
network should be a top priority.
Authentication is one of the most crucial security measures for an engineer to consider in an IoT
deployment. IT administrators can determine which IoT authentication and authorization type, such
as one-way, two-way, or three-way, will serve the organization best based on the mechanism’s
latency and data requirements.
As mentioned above (e.g., default passwords), most IoT devices come with poor authentication.
When deploying IoT devices, similar to websites and web apps, one of the best methods for IT
admins to secure IoT devices is to use digital certificates. IoT device certificates are integral to an
IoT security strategy.
The primary purpose of encryption is to protect the confidentiality of digital data stored on computer
systems or transmitted over the internet or any other computer network. IoT encryption is a key
player in securing many different types of IoT devices. By encrypting data communications from
IoT devices, an organization stands to gain confidentiality of contents, authentication of origin, data
integrity, and awareness of the sender.
Encryption is an effective way to secure data, but the cryptographic keys must be carefully managed
to ensure data remains protected, yet accessible when needed. While IoT devices often are not
targets themselves, without built-in security, they serve as attractive conduits for the distribution of
malware that could result in a data breach.
Data encryption is not a substitute for other information protection controls, such as physical access,
authentication and authorization, or network access controls. Data encryption is a method to reduce
risk as is the practice of using secure communications protocols and channels for sensitive data.
Although IoT devices are easy to deploy, their communication protocols must have the processing
power, range, and reliability to run on existing internet infrastructure as called out in the criteria for
IoT implementation (Wi-Fi 802.11 a/b/g/n/ac, etc.).
It is important to consider power consumption when designing an IoT network. Low power wireless
networks are best. For this reason, communication protocols created for IoT application
requirements generally fall into two groups:
Like other digital devices, IoT devices must be patched and updated to prevent threats from taking
advantage of vulnerabilities in software and firmware. Installing updates and patching vulnerabilities
is essential to IoT security as well as operational technology (OT). When devices cannot be patched
or taken offline to prevent exploitation, administrators can deploy intrusion prevention
systems (IPS).
Managing IoT security on your network could be overwhelming without the help of IoT detection
services and tools that discover IoT devices, block malicious traffic, and enable virtual patching.
Detection is based on a local (installed) library of IoT devices that is regularly expanded and updated
for the latest threats and vulnerabilities. Along with an IPS and network access control, detection
services are integral to an IT security strategy for effective risk management.
Which IoT Device Types Are Most Susceptible to Security Risks?
Cyber attacks are used to exploit unprotected IoT devices with tactics such as network scanning,
remote code execution, and command injection. The healthcare industry has the highest share of IoT
security issues from internet connected devices used for medical imaging systems, patient
monitoring systems, and medical device gateways. Another high-risk sector includes commonly used
IoT devices such as security cameras and printers. Consumer electronics, IP phones, and energy
management devices are also at higher risk.
Many industries have adopted IoT at the risk of higher exposure to cyber threats from vulnerabilities
in IoT devices. Some industries are more vulnerable than others due to the sensitive nature of their
data (e.g., medical records, autonomous vehicles, or intellectual property).
These include large organizations with complex networks, digital factories and plants that rely on
industrial operational technology (OT), and healthcare organizations that use medical IoT for patient
care such as networked scanners, monitoring tools, wearable devices, and other internet connected
systems.
IoT devices are not built to meet the business and regulatory requirements of critical industries. If
developers integrated security into IoT devices and software, it would go a long way to help protect
sensitive data and prevent exploitation when those devices go online.
IoT Applications:
IoT applications promise to bring immense value into our lives. With newer wireless networks,
superior sensors and revolutionary computing capabilities, the Internet of Things could be the
next frontier in the race for its share of the wallet. IoT applications are expected to equip billions
of everyday objects with connectivity and intelligence. It is already being deployed extensively,
few applications of IoT:
• Wearables
• Smart Home Applications
• Smart Buildings
• Smart Infrastructure
• Securities
• Health Care
• Smart Cities
• Agriculture
• Industrial Automation
Smart Cities:
The urbanization process has greatly improved people’s standard of living, providing water supplies
and sewerage systems, residential and office buildings, education and health services and convenient
transportation. The concentration of educated people in cities helps to improve the industrial structure and
promote production efficiency. However, urbanization also creates new challenges and problems. As a
representative developing country, the economic advantages of Indian cities are being offset by the perennial
urban curses of overcrowding, air and water pollution, environmental degradation, contagious diseases and
crime; the urban issues of reducing air pollution and providing clean water, safe neighborhoods and efficient
infrastructure desperately need to be addressed.
All these challenges and problems force citizens, governments and stakeholders to pay attention to the
environment and sustainable development of cities, and to try to find a set of technical solutions to reduce
these urban problems. The Information and Communication Technology (ICT) revolution has offered people
the opportunity to reduce the scale of and/or solve urbanization issues. During the past 10 years, city
systems have become more digital and information-based, and there has been a fundamental change in the
living environment of citizens and the governing mode of cities. The economy, culture, transport,
entertainment and all other aspects of cities have become closely combined with ICT, and the Internet has
become a major part of citizens’ daily lives. The abundant accomplishments of digitizing a city’s
information not only introduce daily convenience to the population, but also establish an infrastructure and
conglomeration of data as a basis for further evolution of modern cities. Over the last 10 years, innovative
information technologies such as cloud computing, ‘big data’, data vitalization, the ‘Internet of Things’ and
mobile computing have become widely adopted in a variety of different areas. Cloud computing enables,
developers to provide internet services without the need for a large capital outlay on hardware for
deployment or the staff to operate it. The amount of information published and processed both on- and
offline has given rise to an information explosion, and a new field dedicated to dealing with it—big data—
which has spawned the need for new, more scalable, techniques to derive answers from huge sets of data.
The emergence of the Internet of Things makes it possible to access remote sensor data and to control the
physical world from a distance, meaning that cities can effectively sense and manage essential elements such
as the water supply, building operations, and road and transport networks. Data vitalization proposes a new
paradigm for large-scale dataset analysis and offers ubiquitous data support for top-level applications for
smart cities. With the help of mobile computing, users can access and process information anywhere, and
anytime, on all aspects of life. The urbanization, growth and associated problems of modern cities, coupled
with the rapid development of new ICT, has enabled us to first envisage the ‘smart cities’ concept, and now
to begin to build smart cities, which is seen as the future form for cities. Figure 1 shows how a smart city is
formed. Smart city includes smart business, smart living, smart education, smart community, smart
government, smart infrastructure, smart utility, smart mobility and smart environment.
The new Internet of Things (IoT) applications are enabling Smart City initiatives worldwide. It
provides the ability to remotely monitor, manage and control devices, and to create new insights and
actionable information from massive streams of real-time data. The main features of a smart city include a
high degree of information technology integration and a comprehensive application of information
resources. The essential components of urban development for a smart city should include smart technology,
smart industry, smart services, smart management and smart life. The Internet of Things is about installing
sensors (RFID, IR, GPS, laser scanners, etc.) for everything, and connecting them to the internet through
specific protocols for information exchange and communications, in order to achieve intelligent recognition,
location, tracking, monitoring and management. With the technical support from IoT, smart city need to
have three features of being instrumented, interconnected and intelligent. Only then a Smart City can be
formed by integrating all these intelligent features at its advanced stage of IOT development. The explosive
growth of Smart City and Internet of Things applications creates many scientific and engineering challenges
that call for ingenious research efforts from both academia and industry, especially for the development of
efficient, scalable, and reliable Smart City based on IoT. New protocols, architectures, and services are in
dire needs to respond for these challenges. The goal of the special issue is to bring together scholars,
professors, researchers, engineers and administrators resorting to the state-of-the-art technologies and ideas
to significantly improve the field of Smart City based on IoT.
So, when we talked about smart cities; what is it. So, in addition to the regular infrastructure that is
there in any city for example, the urban infrastructure consisting of office buildings residential areas
hospitals schools transportation police and so on you also need something in addition to make the cities
smart. So, what is this in addition let us talk about. So, smart means what smart means that it is in terms of
the services that are given to the respective stake holders of these cities. So, citizens are able to do things in
a better manner in an improved manner then usual and how is that made possible that is made possible with
the help of nothing, but the ICT technologies information and communication technologies which also
includes electronics embedded electronics different other advanced topologies in electrical in a electrical
sciences and so on. So, computers electronics put together can make these cities smart.So, definitely will
have to take help of sensors ,sensor networks sensor networks then actuators then the different other
communication technologies RFID, NFC, ZWAVE and so and so forth.
Modern urban spaces are hotbeds of new ideas and world-shaking innovations. As for urban
adoption of connected tech: all things considered, it really makes practical sense. Densely populated areas
stand to gain the most from improved surroundings, and depending on the city, they might already come
equipped with the fundamental IT infrastructures, which makes the further adaption easier. Meanwhile, the
IoT might also offer some solutions to ease the huge burden that the urban explosion has meant for the
existing infrastructures.
Connected City
A common definition for a smart city is using ICT to make a city (administration, education,
transportation, etc.) more intelligent and efficient. The definitions and concepts of smart cities are still
emerging, and there is currently no clear and consistent definition of a smart city among the different
stakeholders. In order to implement and assess smart cities in practice, a deeper understanding of the ‘smart
city’ still needs to be defined. Many countries and cities have launched their own smart city projects to
resolve urbanization issues and challenges. The USA was one of the first countries to launch a smart city
project with a high compliment of smarter planet notions from President Barack Obama. In particular, for
developing countries, the speed of urbanization is considerably faster and, as a consequence, the
infrastructure problems faced are much greater. In 2014, India declared an intention to build more than 100
smart cities, with high-technology communication capabilities, throughout the country. ICT plays an
important role in smart city construction. Top-level architecture research plays a considerable role in guiding
technology development in every domain of a smart city and improving research into resource
configuration. Now let’s extrapolate the potential use cases to an entire city in which we have many objects
that are capable of capturing information and interacting with other objects. The street lamp can now not
only communicate with the devices that are closest but with other objects that are connected to the Internet
and process this information to make decisions, for example, about the intensity of the light that is the most
appropriate. The objects can also send information about what is happening in their environment or process
different information. If the information from the street lamp is processed alongside with information from a
nearby traffic light, we can start talking about the IoT use cases in the smart city environment.
When it comes to smart cities and the management of public space, the scope of possibilities, that
IoT offers, is infinite. In other words, the IoT comes with considerable possibilities and room for
manoeuvre within the field of smart cities. It is one of the aspects that we will touch in the Master’s in
Global Smart City Manager. IoT is a technology that is already there, that has been developed for a long
time, but whose implantation in the public space will prevail in the years to come.
And depending on the way we approach our smart city project or the implementation of this
technology in public space, smart city projects will be developed in one way, or another, they will be able to
achieve common objectives in one way or another.
Possible IoT Use Cases for Smart Cities
Smart parking
An IoT solution will permit monitoring the availability of parking spots in the city. With the GPS data from
drivers’ smartphones (or road-surface sensors in the ground), smart parking solutions let the user know
when the closest parking spot becomes free to find a parking spot faster and easier instead of blindly driving
around.
Smart cities can be described as cities capable of using information technology to create efficiencies and
create sustainability, and improve the quality of life of it’s residents. A smart city is basically a living entity,
capable of extraordinary adaptations that we once thought were not possible. This post will be discussing
smart cities, including what makes a smart city, it’s benefits, it’s effects on the environment, and what
negative effects, if any it might have on it’s citizens and the world as a whole.
Smart Home:
The Internet of Things (IoT) is a system that allows devices to be connected and remotely monitored
across the Internet. In the last years, the IoT concept has had a strong evolution, being currently used in
various domains such as smart homes, telemedicine, industrial environments, etc. Wireless sensor network
technologies integrated into the IoT enable a global interconnection of smart devices with advanced
functionalities. A wireless home automation network, composed of sensors and actuators that share
resources and are interconnected to each other, is the key technology to making intelligent homes.
A “smart home” is a part of the IoT paradigm and aims to integrate home automation. Allowing
objects and devices in a home to be connected to the Internet enables users to remotely monitor and control
them. These include light switches that can be turned on and off by using a smartphone or by voice
command, thermostats that will adjust the indoor temperatures and generate reports about energy usage, or
smart irrigation systems that will start at a specific time of a day, on a custom monthly schedule, and thus
will control water waste. Smart home solutions have become very popular in the last years. Figure 1 shows
an example of a smart home that uses different IoT-connected utilities.
One of the greatest advantages of home automation systems is their easy management and control
using different devices, including smartphones, laptops and desktops, tablets, smart watches, or voice
assistants. Home automation systems offer a series of benefits; they add safety through appliance and
lighting control, secure the home through automated door locks, increase awareness through security
cameras, increase convenience through temperature adjustment, save precious time, give control, and save
money.
Several home automation systems involved with IoT have been proposed by academic researchers in
the literature in the last decade. In wireless-based home automation systems, different technologies have
been used, each of them with their pros and cons. For example, Bluetooth-based automation is low cost, fast,
and easy to be installed, but it is limited to short distances. GSM and ZigBee are widely used wireless
technologies as well. GSM provides long-range communication at the cost of a mobile plan of the service
provider that operates in the area. Zigbee is a wireless mesh network standard that is designed to be low-cost
and with low power consumption, targeted at battery-powered devices in wireless control and monitoring
applications. However, it has a low data speed, low transmission, as well as low network stability, and has a
high maintenance cost. The advantages of Wi-Fi technology over ZigBee or Z-Wave are related to price,
complexity (meaning simplicity), and accessibility. First, Wi-Fi-enabled smart devices are usually cheap. In
addition, it is easier to find do-it-yourself devices that use Wi-Fi, resulting a less expensive option. Second,
Wi-Fi is already a necessity and it is in most homes, so it is easier to buy devices that are already Wi-Fi-
enabled. Finally, Wi-Fi is characterized by simplicity, meaning that a user must connect only a minimal
number of devices for a home automation setup. Since it is very common, the investment on extra hardware
is avoided; a user only needs the basic setup for a home automation system. However, Wi-Fi is not designed
to create mesh networks, it consumes ten times more energy than similar devices using ZigBee
, Z-Wave, or Bluetooth for example, and many Wi-Fi routers can only allow up to thirty devices
connected at once. As compared to Ethernet, Wi-Fi brings several advantages, including the easy connection
and access of multiple devices, the expandability (adding new devices without the hassle of additional
wiring), lower cost, or single access point requirement.
The basic architecture enables measuring home conditions, process instrumented data, utilizing
microcontroller-enabled sensors for measuring home conditions and actuators for monitoring home
embedded devices.The popularity and penetration of the smart home concept is growing in a good pace, as it
became part of the modernization and reduction of cost trends. This is achieved by embedding the capability
to maintain a centralized event log, execute machine learning processes to provide main cost elements,
saving recommendations and other useful reports.
Smart home services
Measuring home conditions
A typical smart home is equipped with a set of sensors for measuring home conditions, such as: temperature,
humidity, light and proximity. Each sensor is dedicated to capture one or more measurement. Temperature
and humidity may be measured by one sensor, other sensors calculate the light ratio for a given area and the
distance from it to each object exposed to it. All sensors allow storing the data and visualizing it so that the
user can view it anywhere and anytime. To do so, it includes a signal processer, a communication interface
and a host on a cloud infrastructure.
Cloud computing and its contribution to IoT and smart home: Cloud computing is a shared pool of
computing resources ready to provide a variety of computing services in different levels, from basic
infrastructure to most sophisticated application services, easily allocated and released with minimal
efforts or service provider interaction. In practice, it manages computing, storage, and
communication resources that are shared by multiple users in a virtualized and isolated environment.
IoT and smart home can benefit from the wide resources and functionalities of cloud to compensate
its limitation in storage, processing, communication, support in pick demand, backup and recovery.
For example, cloud can support IoT service management and fulfillment and execute complementary
applications using the data produced by it. Smart home can be condensed and focus just on the basic
and critical functions and so minimize the local home resources and rely on the cloud capabilities
and resources. Smart home and IoT will focus on data collection, basic processing, and transmission
to the cloud for further processing. To cope with security challenges, cloud may be private for highly
secured data and public for the rest.
Infrastructure
Smart Cities utilize sensor technology to gather and analyze information in an effort to improve the quality
of life for residents. Sensors collect data on everything from rush hour stats to crime rates to overall air
quality. Complicated and costly infrastructure is involved in installing and maintaining these sensors. How
will they be powered? Will it involve hard-wiring, solar energy, or battery operation? Or, in case of power
failure, perhaps a combination of all three? Funding for new infrastructure projects is limited and approval
processes can take years. Installing new sensors and other improvements cause temporary – though still
frustrating – problems for people living in these cities.
Security and Hackers
As IoT and sensor technology use expands, so does the threat level to security. This begs the question…is
technology really considered “smart” if hackers can break into it and shut down an entire city? Recent
discussion involving cyber-terror threats to vulnerable and outdated power grids has everyone a bit more
concerned and skeptical about technology and security. Smart Cities are investing more money and
resources into security, while tech companies are creating solutions with new built-in mechanisms to protect
against hacking and cyber-crimes.
Privacy Concerns
In any major city, there’s a balance between quality of life and invasion of privacy. While everyone wants to
enjoy a more convenient, peaceful, and healthy environment, nobody wants to feel like they are constantly
being monitored by “Big Brother.”
Cameras installed on every street corner may help deter crime, but they can also install fear and
paranoia in law-abiding citizens. Another valid concern is the amount of data being collected from all the
smart sensors residents come into contact with each day.
Educating & Engaging the Community
For a Smart City to truly exist and thrive, it needs “smart” citizens who are engaged and actively taking
advantage of new technologies. With any new city-wide tech project, part of the implementation process
must involve educating the community on its benefits. This can be done through a series of in-person town
hall-style meetings and email campaigns with voter registration, as well as an online education platform that
keeps citizens engaged and up-to-date. When a community feels like it’s playing a part in the overall
decisions that affect daily life, and is being communicated to in a clear and thoughtful manner, it’s more apt
to use the technology and encourage others to use it as well. This is key to a Smart City’s success.
Connected vehicles:
Connected vehicle technology can change our transportation system as we know it by enabling safe,
interoperable networked wireless communications among vehicles, the infrastructure, and passengers’
personal communications devices. Connected vehicle technology will enable cars, trucks, buses, and other
vehicles to “talk” to each other with in-vehicle or aftermarket devices that continuously share important
safety and mobility information. Connected vehicles can also use wireless communication to “talk” to traffic
signals, work zones, toll booths, school zones, and other types of infrastructure.
Different communications technologies (satellite, cellular, dedicated short range communications) may be
utilized depending on the performance requirements of the connected vehicle applications. Cars, trucks,
buses, and other vehicles can “talk” to each other with in-vehicle or aftermarket devices that continuously
share important safety and mobility information. Connected vehicles can also use wireless communication to
“talk” to traffic signals, work zones, toll booths, school zones, and other types of infrastructure. The vehicle
information communicated does not identify the driver or vehicle, and technical controls have been put in
place to help prevent vehicle tracking and tampering with the system. The vision for connected vehicle
technologies is to transform surface transportation systems to create a future where:
• Highway crashes and their tragic consequences are significantly reduced
• Traffic managers have data to accurately assess transportation system performance and actively manage
the system in real time, for optimal performance
• Travelers have continual access to accurate travel time information about mode choice and route options,
and the potential environmental impacts of their choices
• Vehicles can talk to traffic signals to eliminate unnecessary stops and help drivers operate vehicles for
optimal fuel efficiency.
Challenges:
Security
Privacy
Scalability
Reliability
Quality of service
Lack of Global Standards
Vehicle to Everything (V2X) is a vehicular communication system that supports the transfer of information
from a vehicle to moving parts of the traffic system that may affect the vehicle. The main purpose of V2X
technology is to improve road safety, energy savings, and traffic efficiency on the roads.
The key components of V2X technology include V2V (vehicle-to-vehicle) and V2I (vehicle-to-
infrastructure). V2V allows vehicles to communicate with other vehicles on the road, while V2I allows
vehicles to communicate with external entities, such as traffic lights, parking spaces, cyclists, and
pedestrians. The technologies help improve road safety, reduce fuel consumption, and enhance the
experience between drivers and other road users, such as cyclists and pedestrians. When V2X systems are
integrated into traditional vehicles, drivers can receive important information about the weather patterns,
nearby accidents, road conditions, road works warning, emergency vehicle approaching, and activities of
other drivers using the same road. Autonomous vehicles equipped with V2X systems may provide more
information to the existing navigation system of the vehicle. The systems also make it possible for
autonomous vehicles to scan the surrounding environment and make immediate decisions based on the
information received.
Smart Grid:
The “grid” is the electrical network serving every resident, business and infrastructure service in a city. The
“smart grid” is the next generation of those energy systems, which have been updated with communications
technology and connectivity to drive smarter resource use.
The technologies that make today’s IoT-enabled energy grid “smart” include wireless devices such as
sensors, radio modules, gateways and routers. These devices provide the sophisticated connectivity and
communications that empower consumers to make better energy usage decisions, allow cities to save
electricity and expense, and enables power authorities to more quickly restore power after a blackout.
The Smart Grid is critical to building a secure, clean, and more efficient future, according to the
International Energy Agency (IEA). The Smart Grid is part of an IoT framework, which can be used to
remotely monitor and manage everything from lighting, traffic signs, traffic congestion, parking spaces, road
warnings, and early detection of things like power influxes as the result of earthquakes and extreme weather.
The Smart Grid does this through a network of transmission lines, smart meters, distribution automation,
substations, transformers, sensors, software and more that are distributed to businesses and homes across the
city.
Smart Grid technologies all contribute to efficient IoT energy management solutions that are currently
lacking in the existing framework. What makes the IoT Smart Grid better is two-way communication
between connected devices and hardware that can sense and respond to user demands. These technologies
mean that a Smart Grid is more resilient and less costly than the current power infrastructure.
One of the advantages of smart grids is that they can tell us the consumption at an energy meter at any time,
so users are better informed of their real consumption. Moreover, with better consumption monitoring,
contracted power can be adjusted to meet the real need of each consumer. These two factors result in users
reducing their consumption and tailoring their contracted power to their real needs.
Better customer service and more accurate bills
Another key advantage offered by tele-management systems is that bills are more accurate. They always
reflect the real consumption of each month instead of estimates, reducing the cost of the old system of
manual energy meter readings. In addition to being able to access information about the installation
remotely, problems become easier to diagnose and solutions can therefore be implemented faster, improving
customer service. Now a days customers have to notify companies for them to take action. But with remote
management the system itself automatically reports all incidents to the electric company so it can respond
faster to users.
Smart Grids can collect much more data than the manual energy meter reading system. This permits the use
of data analysis techniques and the preparation of highly realistic consumption forecasts as many more
variables are taken into account. Utilities can then better tailor their production to consumption (balances)
and reduce energy surpluses.
All the benefits above involve reducing consumption, which entails a reduction in CO2 emissions. We can
thus say that Smart Grids lead to a more sustainable future. All this will directly contribute to the future
integration of electric vehicle charging systems on the mains. The deployment of renewable energy systems
is also made easier as utilities gain greater control of their grids.
Traditional energy grids are designed to transmit electricity from a large, centralized power station to a wide
network of homes and businesses in the area. At this stage, the electric grid is not designed to accept inputs
from homes and businesses that are generating power via solar panels or windmills. A smart grid is designed
to accept power from renewable resources. Crucially, the smart grid in conjunction with wirelessly enabled
smart meters can keep track of how much energy a net-positive establishment is generating and reimburse
them accordingly. The smart grid also allows for monitoring of solar panels and equipment as well. We
mentioned earlier that a smart grid can mitigate the effects of a disaster such as a terrorist attack or natural
disaster on a power station, a feat that’s possible due to decentralized energy generation. Under the
traditional model, a small number of power plants powered a city. This left these services vulnerable to
threats that would result in widespread blackouts and energy shortages. With a decentralized model, even if
the centralized power plant is taken offline, multiple alternative sources, including wind and solar, can
supplant the resources in the grid. This decentralized system is much harder to take offline and can provide a
robustness that’s not possible when one plant is powering an entire city.
Smart grid technology can be expressed in a single sentence: a new electric grid with two-way
communication. For the first time, businesses and consumers can get real time billing information while
utility companies can better meet the needs of their customers as they react to demand spikes and fix or
manage blackouts and other challenges. Smart grid is resilient, efficient and green which is good for the
consumer, the utility company and the environment. Wireless technology will replace thousands of miles of
cable that would have been needed to advance the smart grid to where it is today.
Challenges:
High Investment
Cyber attacks
Industrial IoT:
The Industrial Internet of Things (IIoT), which is considered as the main future IoT-application
area, is defined by the Industrial Internet Consortium as machines, computers and people enabling intelligent
industrial operations using advanced data analytics for transformational business outcomes” (“Industrial
Internet Consortium,” 2017). Generally, IioT is one basis of Industry 4.0 and the digital transformation. The
IioT is the connection between IT (information technology) and OT (operational technology). IioT is the
most important segment in IoT, much more than consumer applications. The Industrial Internet of Things is
related to the Industry 4.0: all IoT applications in Industry 4.0 are forms of IioT but not all IioT use cases are
about the industries which are categorized as Industry 4.0. Typical use cases of the Industrial Internet of
Things include intelligent machine applications, industrial control applications, factory floor use cases,
condition monitoring, use cases in agriculture or smart grid applications. It is important to know that the
IioT is not just about saving costs and optimizing efficiency though. Companies also have the possibility to
realize important transformations and can find new opportunities, e.g., entirely new business models in
Industry 4.0.
According to TechTarget, IioT can be formally defined as “the use of smart sensors and actuators to enhance
manufacturing and industrial processes. Also known as the industrial internet or Industry 4.0, IioT leverages
the power of smart machines and real-time analytics to take advantage of the data that dumb machines have
produced in industrial settings for years.”
Industrial IoT capabilities require widespread digitization of manufacturing operations. Organizations must
include four primary pillars to be considered a fully IioT-enabled operation:
Smart machines equipped with sensors and software that can track and log data.
Robust cloud computer systems that can store and process the data.
Advanced data analytics systems that make sense of and leverage data collected from systems,
informing manufacturing improvements and operations.
Valued employees, who put these insights to work and ensure proper manufacturing function.
Benefits of IioT
These are 5 of the biggest benefits of adopting a fully connected IIoT manufacturing operation.
Increase efficiency
The biggest benefit of IIoT is that it gives manufacturers the ability to automate, and therefore optimize their
operating efficiency. Robotics and automated machinery can work more efficiently and accurately, boosting
productivity and helping manufacturers streamline their functions.
Additionally, physical machinery can be connected to software via sensors that monitor performance on a
constant basis. This enables manufacturers to have better insights into the operational performance of
individual pieces of equipment as well as entire fleets.
IIoT-enabled data systems empower manufacturers to improve operating efficiencies by:
Bypassing manual tasks and functions and implementing automated, digital ones
Making data-driven decisions regarding all manufacturing functions
Monitoring performance from anywhere – on the manufacturing floor or from thousands of miles
away
Reduce Errors
Industrial IoT empowers manufacturers to digitize nearly every part of their business. By reducing manual
process and entries, manufacturers are able to reduce the biggest risk associated with manual labor – human
error.
This goes beyond just operational and manufacturing errors. IIoT solutions also can reduce the risk of cyber
and data breaches caused by human error. A Cyber Security Trend report cited people as the biggest cause
of cyber security breaches, with human error being the culprit 37% of the time. AI and machine learning-
enabled programs and machinery can do much of the required computing themselves, eliminating the
potential for someone to make a simple mistake, and put the manufacturer’s data at risk.
Predictive Maintenance
Nothing negatively impacts a manufacturing operation more than machine downtime. When maintenance in
the manufacturing world is reactive rather than proactive, manufacturers are stuck trying to identify what the
issue is, how it can be repaired, and what it will cost. With predictive maintenance powered by industrial
IoT solutions, all of those issues are alleviated.
When machinery performance and function is monitored consistently, manufacturers can create a baseline.
This baseline and the corresponding data empowers companies with the information they need to see any
issue before it occurs. They can then schedule maintenance prior to downtime, which benefits them in that
they:
Improve Safety
All of the data and sensors required of a fully functioning IIoT manufacturing operation are also helping to
bolster workplace safety. “Smart manufacturing” is turning into “smart security” when all of the IIoT
sensors work together to monitor workplace and employee safety.
Integrated safety systems are protecting workers on the floor, on the line, and in distribution. If an accident
occurs, everyone in the facility can be alerted, operations can cease, and company leadership can intervene
and make sure the accident and incident is resolved. This incident can also generate valuable data that can
help prevent a repeat occurrence in the future.
A newer option some manufacturers are utilizing is the use of wearable technology among their employees.
Wearables have been part of IoT since its infancy, and it are just now being utilized in industrial IoT
operations.
Wearables help leadership keep tabs on things like employee posture and the surrounding noise levels, and
they can then improve work conditions and potentially improve performance. They can also alert employees
when they aren’t following proper workplace safety procedures, so they can correct their actions and stay
safe on the job.
Reduce Costs
Knowledge is power, and the knowledge provided to manufacturers via IIoT solutions is giving them the
tools they need to reduce costs and generate more revenue. Data-driven insights into operations, production,
marketing, sales, and more can steer businesses in a profitable direction.
All of the aforementioned benefits of IIoT – predictive maintenance, fewer errors, improved quality control,
and maximized efficiencies – will all boost profits for a manufacturer. Industrial IoT also offers arguably the
most valuable tool for leaders of a manufacturing company – insights from anywhere, anytime.
Remote monitoring of manufacturing operations is now possible 365 days a year, 24/7, from anywhere in
the world. This 360-degree view into the entire manufacturing process, and the follow-up service provided
to customers in their buying journey, is an invaluable asset.