Unit 3
Unit 3
To IoT – Unit 3
What is IoT
• IoT stands for Internet of Things.
• It refers to the interconnectedness of physical devices,
such as appliances and vehicles, that are embedded with
software, sensors, and connectivity which enables these
objects to connect and exchange data.
• This technology allows for the collection and sharing of
data from a vast network of devices, creating
opportunities for more efficient and automated systems.
IoT is network of interconnected computing devices which
are embedded in everyday objects, enabling them to send
and receive data.
What is IoT
• Connecting everyday things embedded with electronics,
software, and sensors to internet enabling to collect and
exchange data without human interaction called as the
Internet of Things (IoT).
Thing?
A “Thing” in the context of IOT, is a entity or physical object that has
unique identifier, an embedded system and ability to transfer data over the
network.
These devices collect useful data with the help of various existing
technologies and then autonomously flow the data between other devices
Embedded Systems in IoT
An embedded device system generally runs as a single application. these devices can
connect through the internet connection, and able communicate through other
network devices
Building Blocks of IoT
Four things form the basic building blocks of the IoT system
–sensors, processors, gateways, and applications.
• Sensors
• These form the front end of the IoT devices. These are
the so-called “Things” of the system. Their main
purpose is to collect data from its surroundings
(sensors) or give out data to their surroundings
(actuators).
• Gateways
• Gateways are responsible for routing the
processed data and sending it to proper
locations for its (data) proper utilization.
• In other words, we can say that the gateway
helps in to and fro communication of the data.
It provides network connectivity to the data.
Network connectivity is essential for any IoT
system to communicate.
• LAN, WAN, PAN, etc are examples of network
gateways.
Building Blocks of IoT
• Applications
• Applications form another end of an IoT
system. Applications are essential for the
proper utilization of all the data collected.
• These cloud-based applications are responsible
for rendering effective meaning to the data
collected. Applications are controlled by users
and are a delivery point of particular services.
• Examples of applications are home automation
apps, security systems, industrial control hubs,
etc.
Characteristics of IoT
1. Connectivity
Connectivity is an important requirement of the IoT infrastructure. Things of IoT should be connected to the
IoT infrastructure. Anyone, anywhere, anytime can connect, this should be guaranteed at all times. For
example, the connection between people through Internet devices like mobile phones, and other gadgets,
also a connection between Internet devices such as routers, gateways, sensors, etc.
2. Intelligence and Identity
The extraction of knowledge from the generated data is very important. For example, a sensor generates
data, but that data will only be useful if it is interpreted properly. Each IoT device has a unique identity.
This identification is helpful in tracking the equipment and at times for querying its status.
3. Scalability
The number of elements connected to the IoT zone is increasing day by day. Hence, an IoT setup should be
capable of handling the massive expansion. The data generated as an outcome is enormous, and it should be
handled appropriately.
4. Dynamic and Self-Adapting (Complexity)
IoT devices should dynamically adapt themselves to changing contexts and scenarios. Assume a camera
meant for surveillance. It should be adaptable to work in different conditions and different light situations
(morning, afternoon, and night).
Characteristics of IoT
5. Architecture
IoT Architecture cannot be homogeneous in nature. It should be hybrid, supporting different manufacturers
‘ products to function in the IoT network. IoT is not owned by anyone engineering branch. IoT is a reality
when multiple domains come together.
6. Safety
There is a danger of the sensitive personal details of the users getting compromised when all his/her devices
are connected to the internet. This can cause a loss to the user. Hence, data security is the major challenge.
Besides, the equipment involved is huge. IoT networks may also be at risk. Therefore, equipment safety is
also critical.
7. Self Configuring
This is one of the most important characteristics of IoT. IoT devices are able to upgrade their software in
accordance with requirements with a minimum of user participation. Additionally, they can set up the
network, allowing for the addition of new devices to an already-existing network.
8. Interoperability
IoT devices use standardized protocols and technologies to ensure they can communicate with each other
and other systems. Interoperability is one of the key characteristics of the Internet of Things (IoT). It refers
to the ability of different IoT devices and systems to communicate and exchange data with each other,
regardless of the underlying technology or manufacturer.
Case Studies and Applications
40
IOT Communication Protocols
Bluetooth Low
Bluetooth Zigbee Wi-Fi
Energy
Near Field
Ethernet Communication LPWAN LoRaWAN
(NFC)
41
IOT Communication Protocols
Bluetooth
• It’s effective for sending high-speed data for distances of up to 10 meters. Small amounts of
data from wearables or sensors can be transmitted effectively using Bluetooth.
• More than one third of IoT devices contain bluetooth connectivity.
• Bluetooth is a form of wireless technology used for device communication and to make
personal area networks(PANs).
• The latest version is the bluetooth5 and it has features such as high range, speed and data
broadcasting.
• It has some empowering features that support IoT devices. Bluetooth low energy (BLE)
supports devices that require less power and ideal for IoT enabled projects.
42
IOT Communication Protocols
Zigbee
• ZIgbee is a WLAN and a wireless technology that aims to support extremely low power
devices.
• It supports these kinds of devices and makes it possible to connect them to the internet.
• It is an open global standard and works on IEEE 802.15.4 physical radio standards.
• IoT devices do not require extra functionality and Zigbee is an ideal protocol for
transferring data from one communication point to another.
• Zigbee makes data flow easy. It is used to send small amounts of data using very less power
which is why it is used in machine to machine communication(M2M) and IoT.
43
IOT Communication Protocols
Bluetooth Low Energy (BLE)
• BLE is a bluetooth that uses less power.
• It is designed to support the internet of things.
• BLE is energy efficient and offers better connectivity compared
to other forms of technology such as Zigbee or LoRa.
• BLE fits the need of data transfers as they are the only function
that takes place in IoT sensors.
• BLE is used in the making of smartwatches, medical devices,
fitness trackers, beacons and home automation devices.
• BLE consumes less power and has less bandwidth.
44
IOT Communication Protocols
WiFi
• Wifi is a form of local area network for wireless communication.
• It is a better option for data transfers as it easily fits into a variety
of standards.
• It plays an important role in IoT communication and
intercommunication with other cellular networks such as
Bluetooth.
• Wifi supports high bandwidth and low latency.
• It’s common in households and workplaces due to its low
operating costs and works in the frequency of 2.4GHz and 5
GHz.
45
IOT Communication Protocols
Z-Wave
• Z-wave is a wireless messaging protocol to communicate between various IoT devices.
• It is useful especially in home automation to connect appliances in smart homes. Z-wave offers a two-
way mode of communication empowered with mesh networking and message received
acknowledgment.
• Z-wave is a low-cost technology that eliminates issues caused by Wifi and Bluetooth.
• The network of Z-wave includes the internet of things devices and control called the primary hub.
• When z-hub receives a message via a smartphone or tablet it sends this message to the relevant smart
home appliance.
46
IOT Communication Protocols
RFID
• Radio frequency identification system is a technology that supports the identification of
objects via radio waves.
• By connecting the RFID reader to the terminal of the internet, users can identify, monitor
and track the object with tags.
• RFID is fast, dependent and does not require physical interaction between the user and the
tagged item.
• It identifies IoT objects by tagging and labelling them. The tag or label replaces the object.
• RFID is useful to identify, track and monitor remote IoT objects with time and location.
47
IOT Communication Protocols
Cellular
• Cellular connects the devices to anything and everything without the need for smartphones or gateway.
• This means it connects devices directly to the base station without any intermediaries.
• These connections are always present even in remote areas.
• Cellular IoT makes it possible to construct less power-consuming devices that connect to the internet which
was not possible before.
• There are cellular communication subtypes like LTE-M and NB-IoT that offer more data capacity and less
power consumption. These subtypes are designed to enable IoT devices that require a long battery life or are
used in places where conventional 4G technology is challenging to access.
48
IOT Communication Protocols
Sigfox
• Sigfox was the first to introduce LPWAN technologies in the development of IoT projects. It
uses a low-power wide area network to intercommunicate between IoT devices via the
internet. It supports long-distance communication for sending and receiving small messages.
• For machine-to-machine (M2M) applications, Sigfox is the best long-range network since it
uses less power than other long-range networks. This makes it an excellent option for
connecting remote devices that must operate on batteries for extended periods without being
charged.
• Sigfox operates in the industrial, scientific and medical (ISM) bands using an ultra-narrow
band (UNB) technology, with a specialized infrastructure
49
IOT Communication Protocols
Ethernet
• Ethernet is a communication standard that was developed in the early 80s to network
between local devices and computers.
• The local environment is labeled as a local area network(LAN).
• LAN creates a common environment for devices to receive and share information among
one another.
• Ethernet however offers a wired form of communication. Since it does not offer wireless
communication the set becomes a bit costly and is not the ideal option for IoT
communication.
50
IOT Communication Protocols
Near Field Communication (NFC)
• NFC stands for near-field communication.
• It is a wireless technology for short-distance communication.
• However, the NFC-enabled devices must be in close proximity to each other so that they can
communicate via radio waves.
• One of the devices should be an active device such as a smartphone or tablet and the other
device can be passive such as an NFC tag.
• The active devices require an external power supply while the passive devices do not.
51
IOT Communication Protocols
LPWAN
• LPWAN stands for low power wide area network.
• It offers wireless communication between devices that consume less amounts of power.
• It connects these devices to the internet to send and receive messages from devices within
the same network.
• Some examples of LPWAN are sigfox and LoRa.
• LPWAN allows communication across a minimum of 500 meters, consumes little power and
enables long-distance connectivity.
52
IOT Communication Protocols
LoRaWAN
• Low range wide area network or LoRaWAN is a wide area network protocol.
• It was constructed to connect objects to the internet and to act as a mode of communication
between these objects.
• These objects could be home automation devices, smart cars, thermostats and so on.
• Millions of low-power, low-memory devices are used in smart cities, where this
communication protocol is mostly employed.
53
Cloud Computing
What is Cloud Computing?
• Cloud Computing means storing and accessing the data and programs on remote servers that are hosted on
the internet instead of the computer’s hard drive or local server.
• Cloud computing is also referred to as Internet-based computing, it is a technology where the resource is
provided as a service through the Internet to the user.
• The data that is stored can be files, images, documents, or any other storable document.
The following are some of the Operations that can be performed with Cloud Computing
• Storage, backup, and recovery of data
• Delivery of software on demand
• Development of new applications and services
• Streaming videos and audio
54
Cloud Computing
What is Cloud Computing?
• Cloud computing helps users in easily accessing computing resources like storage, and processing
over internet rather than local hardwares. How cloud computing works, explained as:
• Infrastructure: Cloud computing depends on remote network servers hosted on internet for
store, manage, and process the data.
• On-Demand Access: Users can access cloud services and resources based on-demand they can
scale up or down without having to invest for physical hardware.
• Types of Services: Cloud computing offers various benefits such as cost saving, scalability,
reliability and accessibility it reduces capital expenditures, improves efficiency.
55
Cloud Computing
Architecture of Cloud Computing
Cloud computing architecture refers to the components and sub-components required
for cloud computing. These components typically refer to:
⁖ Front end ( Fat client, Thin client)
⁖ Back-end platforms ( Servers, Storage )
⁖ Cloud-based delivery and a network ( Internet, Intranet, Intercloud )
56
Cloud Computing
Architecture of Cloud Computing
.
57
Cloud Computing
Architecture of Cloud Computing
1. Front End ( User Interaction Enhancement ):
The User Interface of Cloud Computing consists of 2 sections of clients. The Thin clients are the ones that use web browsers
facilitating portable and lightweight accessibilities and others are known as Fat Clients that use many functionalities for offering
a strong user experience.
2. Back-end Platforms (Cloud Computing Engine)
The core of cloud computing is made at back-end platforms with several servers for storage and processing computing.
Management of Applications logic is managed through servers and effective data handling is provided by storage. The
combination of these platforms at the backend offers the processing power, and capacity to manage and store data behind the
cloud.
3. Cloud-Based Delivery and Network
On-demand access to the computer and resources is provided over the Internet, Intranet, and Intercloud. The Internet comes with
global accessibility, the Intranet helps in internal communications of the services within the organization and the Intercloud
enables interoperability across various cloud services. This dynamic network connectivity ensures an essential component of
cloud computing architecture on guaranteeing easy access and data transfer.
58
Cloud Computing
Cloud Computing Services
1. Infrastructure as a Service (IaaS)
2. Platform as a Service (PaaS)
3. Software as a Service (SaaS)
4. Function as a Service (FaaS)
59
Cloud Computing
60
Cloud Computing
Cloud Computing Characteristics
The following are the characteristics of Cloud Computing:
Scalability: With Cloud hosting, it is easy to grow and shrink the number and size of servers based on the need. This is done
by either increasing or decreasing the resources in the cloud. This ability to alter plans due to fluctuations in business size and
needs is a superb benefit of cloud computing, especially when experiencing a sudden growth in demand.
Save Money: An advantage of cloud computing is the reduction in hardware costs. Instead of purchasing in-house equipment,
hardware needs are left to the vendor. For companies that are growing rapidly, new hardware can be large, expensive, and
inconvenient. Cloud computing alleviates these issues because resources can be acquired quickly and easily.
Reliability: Rather than being hosted on one single instance of a physical server, hosting is delivered on a virtual partition that
draws its resource, such as disk space, from an extensive network of underlying physical servers. If one server goes offline it
will have no effect on availability, as the virtual servers will continue to pull resources from the remaining network of servers.
Physical Security: The underlying physical servers are still housed within data centers and so benefit from the
security measures that those facilities implement to prevent people from accessing or disrupting them on-site.
61
Cloud Computing
Advantages Disadvantages
• Cost Efficiency • Security Concerns
• Flexibility and Scalability • Server Down Problems
• Collaboration and Accessibility • Dependency on Internet Connectivity
• Automatic Maintenance and Updates • Cost Management Complexity
62
Big Data
Big Data
• Big data refers to the data which is huge in size and also increasing rapidly with respect to time.
• Big data includes structured data, unstructured data as well as semi-structured data. Big data can
not be stored and processed in traditional data management tools it needs specialized big data
management tools.
• It refers to complex and large data sets having 5 V’s volume, velocity, Veracity, Value and variety
information assets. It includes data storage, data analysis, data mining and data visualization.
Examples of the sources where big data is generated includes social media data, e-commerce data,
weather station data, IoT Sensor data etc.
63
Big Data
Big Data
Characteristics of Big Data :
• Variety of Big data – Structured, unstructured, and semi structured data
• Velocity of Big data – Speed of data generation
• Volume of Big data – Huge volumes of data that is being generated
• Value of Big data – Extracting useful information and making it valuable
• Variability of Big data – Inconsistency which can be shown by the data at times.
64
Big Data
Types of Big Data
1. Structured
Structured data are defined as the data which can be stored, processed and accessed in a fixed format. Structured
data has a fixed schema and thus can be processed easily. We can use SQL to manage structured data.
Example of Structured Data: Data stored in RDBMS.
2. Semi-Structured
Semi-Structured data are the data that do not have any formal structure like table definition in RDBMS, but they
have some organizational properties like markers and tags to separate semantic elements thus, making it easier for
analysis.
Example of Semi-Structured Data: XML files or JSON documents.
3. Unstructured:
Unstructured data have unknown form or structure and cannot be stored in RDBMS. We cannot analyze
unstructured data until they are transformed into a structured format. 80 % of the data generated by the
organizations are unstructured.
Example of Unstructured Data: Text files, multimedia contents like audio, video, images, etc.
Big Data
Big Data Examples
• The New York Stock Exchange (NYSE) produces one terabyte of new trade data every day.
• Each day 500 million tweets are sent.
• Amazon, in order to recommend products, on average, handles more than 15 million+ customer clickstreams
per day.
• Walmart an American Multinational Retail Corporation handle about 1 million+ customer transactions per
hour.
• 65 billion+ messages are sent on Whatsapp every day.
• A single Jet engine generates more than 10 terabytes of data in-flight time of 30 minutes.
• On average, everyday 294 billion+ emails are sent.
• Modern cars have close to 100 sensors for monitoring tire pressure, fuel level, etc. , thus generating a lot of
sensor data.
• Facebook stores and analyzes more than 30 Petabytes of data generated by the users each day.
• YouTube users upload about 48 hours of video every minute of the day.
Big Data
Big Data Applications
Big Data finds applications in many domains in various industries. The article enlisted some of the
applications in brief.
1. Bank and Finance: In the banking and Finance sectors, it helps in detecting frauds, managing risks,
and analyzing abnormal trading.
2. Agriculture: In agriculture sectors, it is used to increase crop efficiency. It can be done by planting
test crops to store and record the data about crops’ reaction to different environmental changes and then
using that stored data for planning crop plantation accordingly.
3. Advertising and Marketing: Advertising agencies use Big Data to understand the pattern of user
behavior and collect information about customers’ interests.
4. Media and Entertainment: Media and Entertainment industries are using big data analysis to target
the interested audience. They now understand the kind of advertisements that attract a customer as well
as the most appropriate time for broadcasting the advertisements to seek maximum attention.
IoT threats and vulnerabilities in IoT systems- Network layer challenges
1.Unsecured Communication Channels:
–Threat: Many IoT devices transmit data over unencrypted or weakly encrypted networks.
–Vulnerability: Lack of encryption can expose data to interception and tampering.
2.IP Spoofing:
–Threat: Attackers can forge IP addresses to impersonate legitimate devices.
–Vulnerability: Spoofed IP addresses can bypass authentication mechanisms.
5.Routing Attacks:
–Threat: Manipulation of routing protocols or tables to alter data paths.
–Vulnerability: Some IoT networks use dynamic routing protocols that can be exploited.
2.Session Hijacking:
•Threat: Attackers take over a valid communication session between devices.
•Vulnerability: Inadequate session management and authentication.
• An internet of things (IoT) gateway is a physical device or software program that serves as the
connection point between the cloud and IoT devices, such as controllers, sensors and smart
devices. IoT gateways act as a central hub, connecting IoT devices to the cloud. Organizations
can use gateways to connect IoT devices for data processing as well as to monitor and
manage IoT devices.
• All data moving between IoT-connected devices and the cloud passes through an IoT gateway,
which can be either a dedicated hardware appliance or an application. An IoT gateway might
also be referred to as an intelligent gateway or a control tier.
• An IoT gateway acts as a network router, routing data between IoT devices and the cloud.
Early on, most gateway devices only sent traffic in one direction: from the IoT device to the
cloud. Now it's common for gateway devices to handle both inbound and outbound traffic.
Outbound traffic streams are used to send IoT data to the cloud, while inbound traffic is used
for device management tasks, such as updating firmware.
IoT GATEWAYS AND SECURITY
•Some IoT gateways do more than just route traffic, they can also preprocess data locally at the edge before sending it
to the cloud. In doing so, the device might deduplicate, summarize or aggregate data as a way of reducing the volume
of data that must be forwarded to the cloud. This can improve response times and reduce network transmission costs.
•A simple IoT gateway functions similarly to a Wi-Fi router. An IoT system connects to the gateway using a Wi-Fi
connection and the gateway routes the IoT device data to the cloud.
•Authorization in the Internet of Things (IoT) refers to the process of granting or denying access to
resources and services based on the identity of the requesting entity. This mechanism ensures that only
authorized devices, users, or applications can access specific data or perform certain actions within an IoT
ecosystem.
d) OAuth:
A widely used authorization framework that allows third-party applications to access user data without
exposing credentials.
Example: A fitness app accessing data from a user’s wearable device using OAuth tokens.
Symmetric-Key LWC Algorithms
Tiny Encryption Algorithm (TEA)
◼ block cipher
◼ renowned for its simplicity of description and implementaton,
typically a few lines of code
◼ uses a large number of iterations, rather than a complicated
program, in order to avoid preset tables and long setup times
◼ uses 128-bit key
◼ TEA family: XTEA (extended TEA), XXTEA, Block TEA,
Speed TEA, and Tiny TEA
◼ uses very simple operations (addition, XORing, shifts), and has
a very small code size; ideal candidate for small objects and
wireless sensors
Symmetric-Key LWC Algorithms
HIGHT
◼ HIGh security and light weigHT encryption algorithm
is a generalized Feistel network
◼ uses very simple operations such as XORing, addition,
and bitwise rotation
Symmetric-Key LWC Algorithms
❒ LWC algorithms are applicable to those scenarios such as
🔾a moderate security level is required
🔾 encryption should not be applied to large
amounts of data
🔾 hardware area needed for implementation and
the power consumption are considered harder
requirements than speed
❒ For smart objects, need to focus on
🔾 efficient
software implementation
🔾 performing well in hardware in terms of speed
and energy consumption
Asymmetric LWC Algorithms
◼ TPublic-key (asymmetric) cryptography requires the use of a public-key
and a private key. Public keys can be associated with the identity of a node
by including them into a public certificate, signed by a Certification
Authority (CA) that can be requested to verify the certificate. Public-key
cryptography requires the significant effort of deploying a PKI. Moreover,
asymmetric cryptography requires higher processing and long keys (at
least 1024 bits for RSA ) to be used.
◼ Alternative public-key cryptographic schemes, such as ECC, might require
shorter keys to be used in order to achieve the same security than RSA
keys. However, because of these reasons, symmetric cryptography is
preferred in terms of processing speed, computational effort, and size of
transmitted messages. Public key can be used to setup symmetric keys to
be used in subsequent communications.
◼ Lightweight cryptography algorithms are suitable for environments that do
not have stringent security requirements and where the constraints on
available hardware and power budget cannot be relaxed.
Asymmetric LWC Algorithms
Elliptic Curve Cryptography (ECC)
◼ provides higher security and a better performance than the
first generation public-key techniques (RSA and Diffie-
Hellman).
◼ the most interesting public-key cryptographic family for
embedded environments
◼ can reach the same security level as RSA with much shorter
keys
◼ computationally lighter operations, like addition and
multiplication, rather than exponentiation
◼ accepted commercially, adopted by standardizing