0% found this document useful (0 votes)
3K views

Iii Bca and CS Iot Notes 2023 PDF

This document outlines the syllabus for a course on Internet of Things (IoT) and its applications. The syllabus covers 5 units: (1) IoT and web technology, including definitions and an overview of the IoT landscape, (2) M2M and IoT architecture, including value chains and design principles, (3) IoT architecture standards and reference models, (4) IoT applications and value creation across industries, and (5) IoT privacy, security and governance issues. The course aims to provide students a hands-on approach to understanding IoT concepts, technologies, and real-world applications.

Uploaded by

sp2392546
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3K views

Iii Bca and CS Iot Notes 2023 PDF

This document outlines the syllabus for a course on Internet of Things (IoT) and its applications. The syllabus covers 5 units: (1) IoT and web technology, including definitions and an overview of the IoT landscape, (2) M2M and IoT architecture, including value chains and design principles, (3) IoT architecture standards and reference models, (4) IoT applications and value creation across industries, and (5) IoT privacy, security and governance issues. The course aims to provide students a hands-on approach to understanding IoT concepts, technologies, and real-world applications.

Uploaded by

sp2392546
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 105

BHARATHIYAR ARTS AND SCIENCE COLLEGE

INTERNET OF THINGS (For B.Sc( Computer Science) BCA


Semester – VI)

Paper code: 21UCSE09 & 21UCAE09

SYLLABUS

INTERNET OF THINGS AND ITS


APPLICATIONS
UNIT –I

IoT& Web Technology, The Internet of Things Today,Time for Convergence, Towards
the IoT Universe,Internet of Things Vision, IoT Strategic Research andInnovation
Directions, IoT Applications, Future Internet Technologies, Infrastructure, Networks and
Communication, processes, Data Management, Security, Privacy & Trust, Device Level
Energy Issues,IoT Related Standardization, Recommendations on Research Topics.
UNIT – II

M2M to IoT – A Basic Perspective– Introduction,Some Definitions, M2M Value Chains,


IoT ValueChains, An emerging industrial structure for IoT, The international driven
global value chain and global information monopolies. M2M to IoT-An Architectural
Overview– Building an architecture, Main design principles and needed capabilities, An
IoT architecture outline, standards considerations

UNIT – III

IoT Architecture -State of the Art – Introduction, State of the art, Architecture. Reference
Model- Introduction, Reference Model and architecture, IoT reference Model, IoT
Reference Architecture- Introduction, Functional View, Information View, Deployment
and Operational View, Other Relevant architectural views.

UNIT-IV

1
BHARATHIYAR ARTS AND SCIENCE COLLEGE

IoT Applications for Value Creations Introduction, IoT applications for industry: Future
Factory Concepts, Brownfield IoT, Smart Objects, Smart Applications, Four Aspects in
your Business to Master IoT, Value Creation from Big Data and Serialization, IoT for
Retailing Industry, IoT For Oil and GasIndustry, Opinions on IoT Application and Value
for Industry, Home Management.

UNIT-V

Internet of Things Privacy, Security and Governance Introduction, Overview of


Governance, Privacy and Security Issues, Contribution from FP7 Projects, Security,
Privacy and Trust in IoT-Data-Platforms for Smart Cities, First Steps Towards a Secure
Platform, Smartie Approach. Data Aggregation for the IoT in Smart Cities, Security.

TEXT BOOK

1. Vijay Madisetti and ArshdeepBahga, ―Internet of Things: (A Hands-on Approach)‖,


Universities Press (INDIA) Private Limited 2014, 1st Edition.

REFERENCE BOOK

1. Michael Miller, ―The Internet of Things: How Smart TVs, Smart Cars, Smart Homes,
and Smart Cities Are Changing the World‖, kindle version.

2. Francis daCosta, ―Rethinking the Internet of Things: A Scalable Approach to


Connecting Everything‖, Apress Publications 2013, 1st Edition,.

3. WaltenegusDargie, ChristianPoellabauer, "Fundamentals of Wireless Sensor


Networks: Theory and Practice‖ 4..CunoPfister, ―Getting Started with the Internet of
Things‖, O‟Reilly Media 2011 W

2
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

UNIT- I

IOT AND WEB TECHNOLOGY

The Internet of Things refers to the rapidly growing network of connected objectsthat are able
to collect and exchange data in real time using embedded sensors.

Internet of Things refers to the collective network of connected devices and the
technology that facilitates communication between devices and the cloud, as well as between
the devices themselves.

The Internet of Things (IoT) is a name for the aggregate collection of network- enabled
devices, excluding traditional computers like laptops and servers. Types of network connections
can include Wi-Fi connections, Bluetooth connections.

1
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

THE INTERNET OF THINGS TODAY

IoT, is a network of interrelated devices that connect and exchange data with
other IoT devices and the cloud. IoT devices are typically embedded with technology
such as sensors and software and can include mechanical and digital machines and
consumer objects.

The Internet of Things (IoT) provides the ability to interconnect computing


devices, mechanical machines, objects, animals or unique identifiers and people to
transfer data across a network without the need for human-to-human or human-to-
computer is a system of conversation.

TIME FOR CONVERGENCE

Integrated environments that have been at the origin of the successful take up of
smartphone platforms and capable of running a multiplicity of user-driven applications
and connecting various sensors and objects are missing today. Such super-stack like
environments, bringing together a number of distinct constituencies, represent an
opportunity for Europe to develop Internet of Things ecosystems. As an

2
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

example this would include the definition of open APIs and hence offer a variety of
channels for the delivery of new applications and services.

Such open APIs are of particular importance at module range on any abstraction level
for application-specific data analysis and processing, thus allowing application
developers to leverage the underlying communication infrastructure and use and combine
information generated by various devices to produce added value across multiple
environments. As a quintessence the next big leap in the Internet of Things evolution will
be the coherence of efforts on all levels towards innovation.

In case of the IoT community this would mean that out of many possible “coherence
horizons” the following will likely provide the foundation for a step forward to the
Internet of Things:

Coherence of object capabilities and behaviour: the objects in the Internet of Things will
show a huge variety in sensing and actuation capabilities, in information processing
functionality and their time of existence.

Coherence of application interactivity: the applications will increase in complexity and


modularisation, and boundaries between applications and services will be blurred to a
high degree. Fixed programmed suites will evolve into dynamic and learning application
packages. Besides technical, semantic interoperability will become the key for context
aware information exchange and processing.

3
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

Coherence of corresponding technology approaches: larger concepts like Smart Cities,


Cloud computing, Future Internet, robotics and others will evolve in their own way, but
because of complementarity also partly merge with the Internet of Things. Here a
creative view on potential synergies can help to develop new ecosystems.

Coherence of real and virtual worlds: today real and virtual worlds are perceived as two
antagonistic conceptions. At the same time virtual worlds grow exponentially with the
amount of stored data and ever increasing network and information processing
capabilities. Understanding both paradigms as complementary and part of human
evolution could lead to new synergies and exploration of living worlds.

TOWARDS THE IOT UNIVERSE

In analogy to the definition that a universe is commonly defined as the totality of


existence, an Internet of Things universe might potentially connect everything. As a
further analogy to new theories about parallel universes, different Internet of Things
worlds might develop and exist in parallel, potentially overlap and possess spontaneous
or fixed transfer gates. These forward-looking considerations do certainly convey a slight
touch of science fiction, but are thought to stimulate the exploration of future living
worlds.

The overall scope is to create and foster ecosystems of platforms for connected smart
objects, integrating the future generation of devices, network technologies, software
technologies, interfaces and other evolving ICT innovations, both for the society and for
people to become pervasive at home, at work and while on the move. These
environments will embed effective and efficient security and privacy mechanisms into
devices, architectures, platforms, and protocols, including characteristics such as
openness, dynamic expandability, interoperability of objects, distributed intelligence, and
cost and energy-efficiency.

4
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

Whereas the forthcoming Internet of Things related research in the scope of Horizon
2020 and corresponding national research programs will address the above matters,
challenges from a societal and policy perspective remain equally important, in particular
the following:

 Fostering of a consistent, interoperable and accessible Internet of Things across


sectors, including standardisation.
 Directing effort and attention to important societal application areas such as
health and environment, including focus on low energy consumption.
 Offering orientation on security, privacy, trust and ethical aspects in the scope of
current legislation and development of robust and future-proof general data
protection rules.
 Providing resources like spectrum allowing pan-European service provision and
removal of barriers such as roaming.
 Maintaining the Internet of Things as an important subject for international
cooperation both for sharing best practises and developing coherent strategies.

INTERNET OF THINGS VISION

A vision where things (wearable,watch, alarm clock, homedevices, surrounding


objectswith) become smart and behavealive through sensing, computingand
communicating systems.

5
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

A vision where embeddeddevices interact with remoteobjects or persons through


connectivity, for examples, using Internet or Near Field Communication or other
technologies.
The internet-oriented vision sees the various physical devices interacting with each
other. The sensor-based objects can be determined uniquely and their whereabouts can be
regularly monitored. These smart embedded objects can be considered as microcomputers
with computing resources.

IOT STRATEGIC RESEARCH AND INNVOVATION DIRECTIONS

In the last few years the evolution of markets and applications, and there- fore
their economic potential and their impact in addressing societal trends and challenges for
the next decades has changed dramatically. Societal trends are grouped as: health and
wellness, transport and mobility, security and safety, energy and environment,
communication and e-society. These trends create significant opportunities in the
markets of consumer elec- tronics, automotive electronics, medical applications,
communication.

Potential applications of the IoT are numerous and diverse, permeating into
practically all areas of every-day life of individuals, enterprises, and society as a

6
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

whole. The IERC has identified and described the main Internet of Things applications,
which span numerous applications domains: smart energy, smart health, smart buildings,
smart transport, smart industry and smart city.

The vision of a pervasive IoT requires the integration of the various domains into
a single, unified, domain and addresses the enabling technologies needed for these
domains while taking into account the elements that form the third dimension like
security, privacy, trust, safety.

The applications areas include as well the domain of Industrial Internet where
intelligent devices, intelligent systems, and intelligent decision-making represent the
primary ways in which the physical world of machines, facilities, fleets and networks
can more deeply merge with the connectivity, big data and analytics of the digital world.

Manufacturing and industrial automation are under pressure from shortened


product life-cycles and the demand for a shorter time to market in many areas. The next
generation of manufacturing systems will therefore be built with flexibility and
reconfiguration as a fundamental objective.

The first priorities for IoT research and innovation in the next years are in the areas of
IoT distributed architectures, edge computing, end-to-end security, distributed ledger
technologies (DLTs), AI and the convergence of these technologies.

The applications areas include as well the domain of Industrial Internet where
intelligent devices, intelligent systems, and intelligent decision-making represent the
primary ways in which the physical world of machines, facilities, fleets and networks
can more deeply merge with the connectivity, big data and analytic.

7
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

IOT APPLICATIONS

The Internet of Things (IoT) provides the ability to interconnect computing


devices,mechanical machines, objects, animals or unique identifiers and people to
transfer data across a network without the need for human-to-human or human-to-
computer is a system of conversation. IoT applications bring a lot of value in our lives.

The Internet of Things provides objects, computing devices, or unique identifiers


and people's ability to transfer data across a network without the human- to-human or
human-to-computer interaction.

Some of the most explored applications of the Internet of Things are :

 Creating better enterprise solutions.


 Integrating smarter homes.

8
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

 Innovating agriculture.
 Building smarter cities.
 Upgrading supply chain management.
 Transforming healthcare. Installing smart grids. Revolutionizing wearables.
Wearles

Wearable technology is the hallmark of IoT applications and one of the earliest
industries to deploy IoT. We have fit bits, heart rate monitors and smartwatches these
days.
Guardian glucose monitoring device has been developed to help people with
diabetes. It detects glucose levels in our body, uses a small electrode called the glucose
sensor under the skin, and relates it to a radiofrequency monitoring device.
Smart Home Applications
The smart home is probably the first thing when we talk about the IoT
application. The example we see the AI home automation is employed by Mark
Zuckerberg. Alan Pan's home automation system, where a string of musical notes uses
in-house functions.
Health care
IoT applications can transform reactive medical-based systems into active
wellness-based systems. Resources that are used in current medical research lack
important real-world information. It uses controlled environments, leftover data, and
volunteers for clinical trials. The Internet of Things improves the device's power,
precision and availability. IoT focuses on building systems rather than just tools. Here's
how the IoT-enabled care device works.

Smart Cities
9
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

Most of you have heard about the term smart city. Smart city uses technology to
provide services. The smart city includes improving transportation and social services,
promoting stability and giving voice to their citizens.
Example of a smart city - Palo Alto.
Palo Alto, San Francisco, is the first city to acquire the traffic approach. He
realized that most cars roam around the same block on the streets in search of parking
spots. It is the primary cause of traffic congestion in the city. Thus, the sensors were
installed at all parking areas in the city. These sensors pass occupancy status to the cloud
of each spot.

Agriculture
By the year 2050, the world's growing population is estimated to have reached about
10 billion. To feed such a large population, agriculture needs to marry technology and get
the best results. There are many possibilities in this area. One of them is Smart Greenhouse.
Farming techniques grow crops by environmental parameters. However, manual
handling results in production losses, energy losses and labor costs, making it less
effective.The greenhouse makes it easy to monitor and enables to control the climate
inside it.

Industrial Automation

10
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

It is one of the areas where the quality of products is an essential factor for a more
significant investment return. Anyone can re-engineer products and their packaging to
provide superior performance in cost and customer experience with IoT applications.
IoT will prove as a game-changer. In industrial automation, IoT is used in the following
areas:
 Product flow monitoring
 Factory digitization
 Inventory management
 Safety and security
 Logistics and Supply Chain Optimization
 Quality control
 Packaging customization

Healthcare
Healthcare do real-time monitoring with the help of smart devices. It gathers and
transfers health data such as blood pressure, blood sugar levels, weight, oxygen, and
ECG. The patient can contact the doctor by the smart mobile application in case of any
emergency.

Smart Retail

11
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

IoT applications in retail give shoppers a new experience. Customers do not have
to stand in long queues as the checkout system can read the tags of the products and
deduct the total amount from the customer's payment app with IoT applications' help.
Smart Supply Chain
Customers automate the delivery and shipping with a smart supply chain. It also
provides details of real-time conditions and supply networks.
Smart Farming
Farmers can minimize waste and increase productivity. The system allows the
monitoring of fields with the help of sensors. Farmers can monitor the status of the area.
Internet-connected devices go from 5 million to billions in just one year. Business
Insider Intelligence estimates 24 billion IoT devices will install and generate more than 300
billion.
FUTURE INTERNET TECHNOLOGIES

Future of IoT has the potential to be limitless. Advances to the industrial internet
will be accelerated through increased network agility, integrated artificial intelligence
(AI) and the capacity to deploy, automate, orchestrate and secure diverse use cases at
hyperscale.

Future of the Internet of Things

Here are the top emerging IoT trends to look for in 2021:

Evolving IoT-enabled AI Applications

IoT applications are everywhere around us, like wearables, smart homes, industrial
settings, etc. IoT focuses on devices interacting using the internet while Artificial
Intelligence makes the devices learn from their data and experiences.
Combining AI and IoT can redefine the way industries, businesses, and economies
function. AI and IoT can be combined to create intelligent machines that simulate smart
behavior and offer support in decision-making.

12
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

IoT-enabled AI Applications can provide commercial solutions. Such applications


can assist businesses to integrate IoT and AI technologies into their future investment
decisions. IoT and Artificial Intelligence will reach more industries and business settings
as they can help automate processes, reduce downtime, reduce operating costs, and
increase efficiency.Some examples of AI and IoT include self- driving cars, robots in
manufacturing, and smart thermostat solutions.
Internet of Things fueled with 5G technology and Edge Computing
5G is the latest development in cellular technology. It brings improvement in
speed and has the ability to transmit data using medium and high-frequency signals over
the airwaves.5G will be a revolutionary technology for IoT. It will provide new
possibilities for centralizing data streams, real-time data processing, lower latency,
network slicing, and higher transmission speed.
Edge computing allows connected devices to share, analyze, and keep data
locally. It is a hybrid approach to data processing that’s reshaping the future of IoT. The
concept of edge computing promises the notion of distributed intelligence.
It will transform the way connected objects are designed, by adding the processing
power for a huge number of devices in the infrastructure around us.

13
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

The Future of the Internet of Things with Blockchain

A rise in the adoption of blockchain technology is one of the latest IoT trends. IoT
devices are considered an easy target for DDoS attacks. In 2021, blockchain will prove
to be the most reliable solution to ensure data protection. It will help address some of the
IoT security and scalability challenges by providing a way for information to be securely
recorded and shared by a community of users.

Remote Learning

Due to the outbreak of Covid-19, schools worldwide had to shut down. While
many countries have begun to move out of lockdown now, the focus is still on remote
learning. To help schools maintain healthy and safe environments, professionals are
considering IoT that can be integrated into the education system.

The focus will be on improving IoT devices like mics, webcams, and virtual
whiteboards. IoT will also be used in addressing other challenges faced while learning
from homes, like visual distractions and background noise.
14
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

Transition to Digital Healthcare with IoT

15
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

The Covid-19 pandemic has significantly aided IoT’s market expansion in the
healthcare industry. Due to the wide capabilities of IoT in healthcare, like tracking,
authentication, and data collection, its exponential growth is likely to rise.

There has been a surge in the adoption of digital health devices like wearable and
sensors that monitor the vitals of patients. As more people look for affordable and useful
digital health devices, the demand for IoT devices that can monitor patients remotely
will rise. These devices will become more advanced and will tell healthcare professionals
all the details about their patients in real-time.

The use of connected health care solutions has been recommended by


professionals to manage illnesses and monitor health as more and more people stay at
home to isolate themselves. IoT can help transition to digital healthcare by providing
connected healthcare solutions which can provide accurate diagnosis and treatment. It
can also help in emergency response, fitness assistance, and making testing and vaccines
more accessible.

IoT will enable Better Workforce Management

The coronavirus has lead to more employees working from home. Most of the remote
work requires internet-connected devices such as laptops, webcams, microphones, and
smartphones. Companies such as Microsoft (Teams) and Zoom

16
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

are capitalizing on the trend of moving away from physical work by allowing the
workforce to connect remotely.

In 2021, many companies will be adopting IoT devices to monitor the attendance and
tasks of employees. The data from these devices can be integrated into the cloud and be
used to monitor the safety of employees.

A rise in the demand for Smart Home devices

There has been significant adoption of smart home devices in recent years. These
smart home devices consist of a wide range of technologies and are interconnected by the
IoT, voice-first technology, AR (Augmented Reality), and VR (Virtual Reality). The demand
for smart home devices will continue as people want to make their homes more interactive,
safe, and secure. Energy consumption is another reason for the smart home devices market
growth.

Digital Twin Technology

A digital twin is a virtual representation of a real object or process. It can be used for
testing, monitoring, diagnosing, optimization, calculating, and analyzing asset
performance and utilization.

17
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

Digital twin technology will play a vital role in industrial IoT application
deployments. It will help in transforming manufacturing processes and provide different
ways to reduce costs, monitor assets, reduce downtime, increase consistency in the
production line, and enable the creation of connected products. In 2021, we can see
digital twins combined with IoT expand to more applications, use cases, and industries.

INFRASTRUCTURE

Iot applications in future Internet technology

Any physical device that can be connected to the internet and be used to share and
collect data can be termed under the 'Internet of Things (IoT)'. The future of IoT lies in
the possibility to transform something as small as a chip or even an entire city into a
working IoT device.

Infrastructure of IoT applications

Cloud infrastructure for IoT applications involves not only the traditional data
processing (app services, virtual machines, serverless functions, etc.) and storage
(databases, cache, etc.) services, but also gateway services to gather incoming data and
interact with the devices (HTTP/MQTT server, WebSocket server).

18
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

The Internet of Things will become part of the fabric of everyday life. It will become
part of our overall infrastructure just like water, electricity, telephone, TV and most
recently the Internet.

Plug and Play Integration:

Internet of Things becomes as simple as plugging it in and switching it on. Such


plug and play functionality requires an infrastructure that supports it, starting from the
networking level and going beyond it to the application level.

Infrastructure Functionality

The infrastructure needs to support applications in finding the things required. An


application may run anywhere, including on the things themselves.

Semantic Modelling of Things

semantic information regarding the things, the information they can provide or the
actuation they can perform need to be available.(e.g: temperature the sensor measures).

19
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

NETWORKS AND COMMUNICATION

IoT is the connection of devices over the internet, where these smart devices
communicate with each other , exchange data , perform some tasks without any human
involvement. These devices are embedded with electronics, software, network and
sensors which help in communication.

Networks Technology

Network users will be humans, machines, things and groups of them.

Complexity of the Networks of the Future:

The complexity of future networks and the expected growth of complexity due to
the growth of Internet of Things.

Growth of Wireless Networks:

Wireless networks especially will grow largely by adding vast amounts of small
Internet of Things devices with minimum hardware, software.

Mobile Networks:

The mobile phone of the future could provide mobile function.

Expanding Current Networks to Future Networks:

Expand current end user network nodes into networks of their own or even a
hierarchy of networks.

20
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

Overlay Networks:

In some locations even multiple networks overlaying one another physically and
logically.

Network Self-organization:

Self-organization principles will be applied to configuration by sensing.

IPv6, IoT and Scalability:

The current transition of the global Internet to IPv6 will provide a virtually
unlimited number of public IP addresses able to provide bidirectional and symmetric
(true M2M) access to Billions of smart things.

Green Networking Technology: GreenTouch

These network technologies have to be appropriate to realist the Internet of Things


and the Future Internet in their most expanded state to be anticipated by the imagination of
the experts.

Communication Technology

Unfolding the Potential of Communication Technologies:

Communications technologies for the Future Internet and the Internet of Things
will have to avoid such bottlenecks by construction not only for a given status of
development, but for the whole path to fully developed and still growing nets.

Correctness of Construction:

Correctness of construction of the whole system is a systematic process that starts


from the small systems running on the devices up to network and distributed
applications.

21
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

An Unified Theoretical Framework for Communication:

Communication between processes running within an operating system on a


single or multi-core processor communication between processes running in a distributed
computer system,

The communication between devices and structures in the Internet of Things and
the Future Internet using wired and wireless channels shall be merged into a unified
minimum theoretical framework covering and including formalized communication
within protocols.

PROCESSES

When talking about how does IoT works, the process begins with devices that
have built-in sensors. These devices are connected to IoT platforms which store data
from all the connected devices. The important data is then used to perform tasks that
fulfill the needs of people.

DATA MANAGEMENT

Data management is a broad concept referring to the architectures, practices, and


procedures for proper management of the data lifecycle needs of a certain system. In the
context of IoT, data management should act as a layer between the

22
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

objects and devices generating the data and the applications accessing the data for
analysis purposes and services. The devices themselves can be arranged into subsystems
or subspaces with autonomous governance and internal hierarchical management.

A data management framework for IoT is presented that incorporates a layered,


data-centric, and federated paradigm to join the independent IoT subsystems in an
adaptable, flexible, and seamless data network. In this framework, the “Things” layer is
composed of all entities and subsystems that can generate data. Raw data, or simple
aggregates, are then transported via a communications layer to data repositories. These
data repositories are either owned by organizations or public, and they can be located at
specialized servers or on the cloud.

Organizations or individual users have access to these repositories via query and
federation layers that process queries and analysis tasks, decide which repositories hold
the needed data, and negotiate participation to acquire the data. In addition, real-time or
context-aware queries are handled through the federation layer via a sources layer that
seamlessly handles the discovery and engagement of data sources. The whole framework
therefore allows a two-way publishing and querying of data. This allows the system to
respond to the immediate data and processing requests of the end users and provides
archival capabilities for later long- term analysis and exploration of value-added trends.

IoT Data Management

Traditional data management systems handle the storage, retrieval, and update of
elementary data items, records and files. In the context of IoT, data management systems
must summarize data online while providing storage, logging, and auditing facilities for
offline analysis. This expands the concept of data management from offline storage,
query processing, and transaction management operations into online-offline
communication/storage dual operations.

IoT Data Lifecycle

23
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

Storage operations aim at making data available on the long term for constant
access/updates, while archival is concerned with read-only data. Since some IoT systems
may generate, process, and store data in-network for real-time and localized services,
with no need to propagate this data further up to concentration points in the system,
“edges” that combine both processing and storage elements may exist as autonomous
units in the cycle.

Querying: Data-intensive systems rely on querying as the core process to access and
retrieve data. In the context of IoT, a query can be issued either to request real-time data
to be collected for temporal monitoring purposes or to retrieve a certain view of the data
stored within the system. The first case is typical when a (mostly localized) real-time
request for data is needed. The second case represents more globalized views of data and
in-depth analysis of trends and patterns.

Production: Data production involves sensing and transfer of data by the “Things”
within the IoT framework and reporting this data to interested parties periodically
pushing it up the network to aggregation points and subsequently to database servers, or
sending it as a response triggered by queries that request the data from sensors and smart
objects.

Collection: The sensors and smart objects within the IoT may store the data for a certain
time interval or report it to governing components. Data may be collected at
24
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

concentration points or gateways within the network where it is further filtered and
processed, and possibly fused into compact forms for efficient transmission. Wireless
communication technologies such as Zigbee, Wi-Fi and cellular are used by objects to
send data to collection points.

Aggregation/Fusion: Transmitting all the raw data out of the network in real-time is often
prohibitively expensive given the increasing data streaming rates and the limited
bandwidth. Aggregation and fusion techniques deploy summarization and merging operations
in real-time to compress the volume of data to be stored and transmitted.

Delivery: As data is filtered, aggregated, and possibly processed either at the


concentration points or at the autonomous virtual units within the IoT, the results of these
processes may need to be sent further up the system, either as final responses, or for
storage and in-depth analysis. Wired or wireless broadband communications may be used
there to transfer data to permanent data stores.

Preprocessing: IoT data will come from different sources with varying formats and
structures. Data may need to be preprocessed to handle missing data, remove
redundancies and integrate data from different sources into a unified schema before
being committed to storage. This preprocessing is a known procedure in data mining
called data cleaning.

Storage/Update—Archiving: This phase handles the efficient storage and organization of


data as well as the continuous update of data with new information as it becomes
available. Archiving refers to the offline long-term storage of data that is not immediately
needed for the system's ongoing operations.

Processing/Analysis: This phase involves the ongoing retrieval and analysis operations
performed and stored and archived data in order to gain insights into historical data and
predict future trends, or to detect abnormalities in the data that may trigger further
investigation or action. Task-specific preprocessing may be needed to filter and clean data
before meaningful operations take place. When an

25
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

IoT subsystem is autonomous and does not require permanent storage of its data, but
rather keeps the processing and storage in the network, then in-network processing may
be performed in response to real-time or localized queries.

SECURITY

IoT security (internet of things security) is the technology segment focused on


safeguarding connected devices and networks in IoT. IoT involves adding internet
connectivity to a system of interrelated computing devices, mechanical and digital
machines, objects, animals and people.

Due to the unconventional manufacturing of IoT devices and the vast amount of
data they handle, there's a constant threat of cyber attacks. Several high-profile incidents
where a common IoT device was used to infiltrate and attack the larger network have
drawn attention to the need for IoT security.

The ever-looming possibility of vulnerabilities, data breaches and other risks


associated with IoT device usage underscores the urgent need for strong IoT security.
IoT security is vital for enterprises, as it includes a wide range of techniques, strategies,
protocols and actions that aim to mitigate the increasing IoT vulnerabilities of modern
businesses.

26
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

27
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

IoT security issues and challenges

The more ways there are for devices to connect to each other, the more opportunities
there are for threat actors to intercept them. Hypertext Transfer Protocol and APIs are just
two of the channels that IoT devices rely on that hackers can intercept.

The following IoT security challenges continue to threaten the financial safety of both
individuals and organizations:

Remote exposure: Unlike other technologies, IoT devices have a particularly large attack
surface due to their internet-supported connectivity. While this accessibility is extremely
valuable, it also gives hackers the opportunity to interact with devices remotely.

Lack of industry foresight: As organizations continue with digital transformations, so


too have certain industries and their products. The automotive and healthcare industries
have expanded their selection of IoT devices to become more productive and cost-
efficient.

Resource constraints: Not all IoT devices have the computing power to integrate
sophisticated firewalls or antivirus software. In fact, some devices can barely connect to
other devices.

Weak default passwords: IoT devices often come with weak passwords, and most
consumers might not be aware that they need to be replaced with more secure ones.

Multiple connected devices: Most households today have multiple interconnected


devices. The drawback of this convenience is that, if one device fails due to a security
misconfiguration, the rest of the connected devices in the same household go down as
well.

28
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

Lack of encryption: Most network traffic originating from IoT devices is unencrypted,
which increases the possibility of security threats and data breaches. These threats can be
avoided by ensuring all the devices are secured and encrypted.

PRIVACY& TRUST

Security plays an important role in terms of usability,efficiency, and reliability


in IoT.

The need for privacy is the core property ofself-actualization in IoT. There are
several applicationsworking in many different grounds like patientmonitoring system,
traffic control, energy consumptioninventory management, smart parking, civil
protection any many others. Privacy should be guaranteed to the end user.

29
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

30
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

DEVICE LEVEL ENERGY ISSUES

IoT Energy Domain

The Internet of Things plays a vital role in the field of energy management and
regulation. The term used for that is Smart Energy System. IoT applications monitor a
wide variety of energy control function to residential and commercial use.

Residential Energy

As technology is increasing day by day, it also raises the cost of energy.


Consumers search the way through which they can reduce and control the energy cost.
IoT provides a mature way to analyze and optimize the use of the device as well as the
entire system of a home. It may be changing the device setting, simply switching on/off
or dimming lights to optimize energy use.

Commercial Energy

Wastage of energy widely impacts any business enterprises in their cost of


production. IoT provides a specific way for monitoring and maintaining a low cost and
high level of care. IoT system provides a strong means of managing the consumption
cost of energy and optimize the output of enterprises. It discovers

31
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

energy issues in the same way as functional issues in a complex business network and
provides solutions.

IOT RELATED STANDARDIZATION

Standardization is key to achieving universally accepted specifications and


protocols for true interoperability between devices and applications.

The use of standards:

 ensures interoperable and cost-effective solutions


 opens up opportunities in new areas
 allows the market to reach its full potential

To make the devices work more efficiently or to offer more functionality, the concept
of IoT has been introduced. The implementation of this technology has changed the life
of mankind. It is concerned with getting the devices together with the other devices so
that they can contribute to enhancing their functionality. To manage this, off course,
there exists some standard to make sure everything is happening in a controlled way, and
here we will be focusing on those standards.

32
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

some of the important standards for IoT that helps to ensure the common standards
that the IoT enabled devices are supposed to be complied with.

Bluetooth Smart : Bluetooth smart is one of the most important standards of IoT. This
standard provides the devices to work using Bluetooth connectivity. Moreover, it makes it
possible for the device and the users to communicate or share the instructions using
Bluetooth’s simple connection.

ULE : ULE stands for Ultra-low emission. The amount of power involved in this is
way too less, as stated by its name. The common telephone network we use at our
homework using this standard and the embedded devices leverages it wherever possible
in order to facilitate communication with other devices.

EEE 802.11ah : These standards are concerned with the wifi connectivity that runs on low
power. In the internet of things, the devices preferably work with low power
consumption mechanism involvement. Though Wifi doesn’t fall under the low power
consumption part, this standard is concerned with the lower power consumption of
devices. This standard has been considered as the most effective one as the availability
of wifi is very common.

Thread : Thread may be considered the best standard that provides the opportunity to
leverage IPV6 to make communication over the internet. The ownership of this standard
is held by Alpha that is the parent company of Google. It makes the interaction between
devices very convenient and smooth. Being handled by Alpha,

33
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

this standard consists of most of the parts that are concerned with the secure and efficient
working of the IoT enabled devices.

ZigBee : This is the other standard that helps to take the IoT to the next level. It has been
developed by an organization called the ZigBee industry. The main purpose of this standard
is to offer a network of devices that consume less power to function. The common devices
that are being used in houses leverage this standard in order to communicate with low power
requirements.

Z-Wave : Z-Wave is the most commonly used standard. Similar to the other standards, it
is also concerned with working devices that use less power to work well in the network.
Sigma Designs own this standard, and the changes or improvements in this standard are
taken by this organization only. The outcome of this standard is the low power mesh
technology of networking. In almost all smart devices or IoT enabled devices in the
USA, this standard is de facto.

6LoWPAN : This is another standard influenced by IEEE. It is concerned with creating


the IoT system that consists of devices that are connected to the internet and use less
power to facilitate communication. IPV6 has been used in this standard when it comes to
connecting the devices that are available on the internet. All of the standards for IoT are
concerned about the way devices interact with each other to create the network of the
devices.

RECOMMENDATIONS ON RESEARCH TOPICS

Accommodate IoT with existing practices:

 Policies, Procedures, & Standards


 Awareness Training
 Risk Management
 Vulnerability Management

34
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

 Forensics

Plan for IoT growth:

 Additional types of logging, log storage: Can you find the needle in the
haystack?
 Increased network traffic: will your firewall / IDS / IPS be compatible and
keep up?
 Increased demand for IP addresses both IPv4 and IPv6
 Increased network complexity – should these devices be isolated or segmented.
 Strengthen partnerships with researchers, vendors, and procurement
department

35
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

UNIT – II

M2M TO IOT –A BASIC PERSPECTIVE

Based on M2M's concept of connectivity, IoT technology expands from simple


machine-to-machine communication to a broader cloud-based network with an
adaptation of various devices.

M2M communication is crucial in IoT because it enables real-time operation and


remote interaction of devices. Moreover, it enhances remote control, robotics, security,
traffic, logistics, fleet management, and automotive functions.
Machine-to-machine, or M2M, is a broad label that can be used to describe any
technology that enables networked devices to exchange information and perform actions
without the manual assistance of humans.

INTRODUCTION

Machine-to-machine (M2M) communication is essentially composed of three key


ingredients:

 a wireless end device,

36
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

 an infrastructure-based or infrastructureless wireless carrier network,


 the back end server network.

SOME DEFINTIONS

Machine to machine, or M2M, is the combination of information and


communications technology (ICT) and smart, connected devices that allows these
devices to interact without human intervention.

Machine to machine refers to technology that allowed both wireless and wired
systems tocommunicate with other devices of the same type.

Machine-to-machine, or M2M, is a broad label that can be used to describe any


technology that enables networked devices to exchange information and perform actions
without the manual assistance of humans.

M2M VALUE CHAINS

37
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

38
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

IOT VALUE CHAINS

IoT Value Chains are about the use and reuse of data across value chains and
across solutions. M2M value chains are internal to one company and cover one solution.

39
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

AN EMERGING INDUSTRIAL STRUCTURE FOR IOT

Here are four trends tech leaders might want to consider when architecting their next
wirelessinfrastructure.
Hardware Rapid Prototyping

In the industrial world, the challenge of IoT hardware design lies in the
bewildering array ofuse case requirements. Take temperature sensors as a simple
example. Depending on criterialike accuracy, temperature range, response time and
stability, there could be hundreds ofavailable sensors to choose from. Hardware
prototyping standards like mikroBUS allow you to build a customized IoT device
prototype in a matter of a few hours and with efficient resources.

Retrofit Wireless Connectivity

An average factory operates with legacy industrial systems that are nowhere near
beingconnected. While these systems employ a number of proprietary communication
protocols forautomation purposes, data is captive within discrete control loops, creating
numerous datasilos on the factory floor.

40
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

The lack of interoperability among these protocols further hindersthe


implementation of a factory-wide monitoring and control network. Emerging
retrofitwireless connectivity now enables manufacturers to connect and acquire data from
theirlegacy assets and systems in a simple and cost-effective manner – without costly
productiondowntime and invasive hardware changes.

Software-Defined Radio

As no wireless solution is use-case agnostic, a typical IIoT architecture is likely


toincorporate multiple radio protocols and standards. Plus, many industrial facilities
today havealready implemented wireless networks (e.g. Wi-Fi, WirelessHART…) to a
certain extent,and look to deploy new types of connectivity to tap into other high-value
use cases.

SDR refers to a radio communication methodwhere the majority of signal


processing is done using software, as opposed to the traditionalhardware-driven
approach. IoT gateways leveraging SDR can incorporate and decodedifferent protocols
concurrently to reduce infrastructure cost and complexity. What’s more,adjustments or
additions of new wireless solutions to the architecture can be achieved withsimple
software updates. This allows companies to dynamically adapt to future operationaland
technological changes while continuing to support legacy wireless devices in the field.

Portable, Container-Based IIoT Platform Design

Depending on criteria like security, reliability, data ownership and costs,


companies need to choose among an on-premise, public or private cloud deployment, or
even a hybrid approach.

An IIoT platform, typically a device management platform, that comes with a


portable,container-based design renders industrial users with full flexibility in selecting
their preferredbackend environment. At the same time, it enables a simple migration to
another server asneeded without compromising the consistency or functionality of the
application.

41
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

The idea of a container-based design is that individual applications are packaged


and delivered withindiscrete, standardized containers called Docker. With this modular
architecture, users can decide which specific platform functions/ applications they want
to use and where to deploy them.

THE INTERNATIONAL DRIVEN GLOBAL VALUE CHAIN AND


GLOBAL INFORMATION MONOPOLICIES

GVCs make a significant contribution to international development. Value- added


trade contributes about 30% to the GDP of developing countries, significantly more than
it does in developed countries (18%) furthermore the level of participation in GVCs is
associated with stronger levels of GDP per capital growth.

GVCs thus have a direct impact on the economy, employment and income and
create opportunities for development. They can also be an important mechanism for
developing countries to enhance productive capacity, by increasing the rate of adoption
of technology and through workforce skill development, thus building the foundations
for long-term industrial upgrading.

Countries need to carefully assess the pros and cons of GVC participation and the
costs andbenefits of proactive policies to promote GVCs or GVC-led development
strategies.Promoting GVC participation implies targeting specific GVC segments and
GVCparticipation can only form one part of a country's overall development strategy.

Before promoting GVC participation, policymakers should evaluate their


countries’ trade profiles and industrial capabilities in order to select strategic GVC
development paths.

Achieving upgrading opportunities through CVCs requires a structured approach that


includes:

 embedding GVCs in industrial development policies (e.g. targeting GVC tasks


and activities);

42
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

 enabling GVC growth by providing the right framework conditions for trade and
FDI and by putting in place the needed infrastructure;
 developing firm capabilities and training the local workforce.

M2M TO IOT –AN ARCHITECTURAL OVERVIEW

IoT Architecture Overview

IoT can be classified into a four or five-layered architecture which gives you a
complete overview of how it works in real life.

The various components of the architecture include the following:

Four-layered architecture: this includes media/device layer, network layer, service


andapplication support layer, and application layer.

Five-layered architecture: this includes perception layer, network layer, middleware


layer,application layer, and business layer.

Functions of Each Layer

Sensor/Perception layer: This layer comprises of wireless devices, sensors, and


radiofrequency identification (RFID) tags that are used for collecting and transmitting raw
datasuch as the temperature, moisture, etc. which is passed on to the next layer.

Network layer: This layer is largely responsible for routing data to the next layer in
thehierarchy with the help of network protocols. It uses wired and wireless technologies for
datatransmission.

Middleware layer: This layer comprises of databases that store the information passed on
bythe lower layers where it performs information processing and uses the results to
makefurther decisions.

Service and application support layer: This layer involve business process modeling
andexecution as well as IoT service monitoring and resolution.

43
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

Application layer: It consists of application user interface and deals with various
applicationssuch as home automation, electronic health monitoring, etc.

Business layer: this layer determines the future or further actions required based on the data
provided by the lower layers.

BUILDING AN ARCHITECTURE

Architecture refers to the description of the main conceptual elements, the actual
elements of a target system, how they relate to each other, and principles for the design of
the architecture. The applied architecture is then the blueprint used to develop the actual
system solution.

MAIN DESIGN PRINCIPLES AND NEEDED CAPABILITIES

 The architecture relies on the separation of resources providing sensing and actuation
from the actual devices, a set of contextual and real world entity- centric services, and
the users of the services.

44
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

 SENSEI further relies on an open-ended constellation of providers and users, and


also provides a reference model for different business roles.
 A number of design principles and guidelines are identified, and so is a set of
requirements.
 Finally, the architecture itself contains a set of key functional capabilities.
 IoT-A refers to as the Architectural Reference Model (ARM).
 The vision of IoT-A is, via the ARM, to establish a means to achieve a high
degree of interoperability between different IoT solutions at the different system
levels of communication, service, and information.
 IoT-A provides a set of different architectural views, establishes a proposed
terminology and a set of Unified Requirements.
 The overall design objective of IoT architecture shall be to target a horizontal
system of real-world services that are open, service-oriented, secure, and offer
trust.
 Design for reuse of deployed IoT resources across application domains.
 Design for a set of support services that provide open service-oriented capabilities
and can be used for application development and execution.
 Design for different abstraction levels that hide underlying complexities and
heterogeneities.
 Design for sensing and actors taking on different roles of providing and using
services across different business domains and value chains.
 Design for ensuring trust, security, and privacy.
 Design for scalability, performance, and effectiveness.
 Design for simplicity of management.
 Design for different service delivery models.
 Design for lifecycle support.

AN IOT ARCHITECTURE OUTLINE

Asset Layers

45
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

First Layer in IoT - This layer comprises basic element or objects which are used for
Monitoring and Controlling. This layer has various digital representation and Identifiers.
Exp: Building, Utility Systems, Home and People.

Resource Layer

Sensing, Actuation and Embedded Identities are main functionality ofthis layer. It
has two types Primary Resources such as Sensors, Actuatorand RFID Tags, Readers etc
and Secondary Resources such as Gateways.

Communication Layer

This is Second Layer mainly used for communication among theinterconnected


different objects to provide specific services. Generally,the IoT nodes are operated using
LLN(Low Power Lossy NetworkCommunication) which are used for Resource
Constraint applications. Forexample WiFi, Bluetooth, IEEE 802.15.4, Z-wave, and LTE-
Advanced.

Apart from this new identity technologies also used in IoT like RFID,Near Field
Communication (NFC) and ultra-wide bandwidth (UWB).RFID –Radio Frequency
Identification is new technology used to identifyObject using unique
identity in M2M technology. The RFID technologyhas Tags, Readers components.
46
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

Tags are small chip, attached to provideobject’s identity which is normally assigned with
Unique ID. The RFIDreader is another component which is used to transmit a query
signal tothe tag and receives reflected signal from the tag. This signal is passed tothe
database for further processing.

Service Support Layer


This layer typically executing in Data Center or Servers inside anOrganization or
Cloud Environment. This layer can provide numerous functions such as Remote Device
Management, Remote Diagnostics orRecovery, Setting Event Filters and
Communication related Functionssuch as LBS (Location Based Services) and
GIS(Geographic InformationServices).

Data and Information Layers


Abstract services are provided in this layer. Important goal is to capture
knowledge and provide advanced Control Logic and Support.

Application Layer
Customers request variety of services which are provided by this layer. It is present
above the Data and Information Layer. This application layer can provide Blood
Pressure, temperature and air humidity measurements of the patient who asks for
analysization using machine learning concepts.The main aim of this layer is to provide
High Quality Services to satisfy Customer requirements and their needs. Smart home,
Smart building, Transportation, Industrial automation and Smart healthcare are numerous
application field which are covered by Application Layer.

Business Layer
Last layer is business (management) layer which is mainly useful for different types
of System activity and Services. They received data from thisapplication layer which is
used to build a business model, graphs, flowcharts, etc which is the unique Functions of
this layer. This layer is responsible for Designing, analyzing, implementing, evaluation
and Monitoring process.

47
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

Management, Security and Data Services


Management, Security and Data Services IoT Management Layer is
responsible for Various Operations, Maintenance, Administration and Provisioning. IoT
Security Layer is responsible for Communication and Information Security, Identity
Management and Authentication, Authorization and used to protect from threats and
Harms. Finally Data and Services layer is responsible for Event filtering, Data
aggregation, Data Averaging and Contextual Meta Data.

STANDARDS AND CONSIDERATIONS

Standardization is key to achieving universally accepted specifications and


protocols for true interoperability between devices and applications.

Alliances have been formed by many domestic and multinational companies to


agree on common standards and technology for the IoT. However, no universal body has
been formed yet.

While organizations such as IEEE, Internet Engineering Task Force (IETF), ITU-
T,OneM2M, 3GPP, etc., are active at international level, Telecommunication Standards
Development Society, India (TSDSI), Global ICT Standardization Forum for India
(GISFI), Bureau of Indian Standards (BIS), Korean Agency for Technology and
Standards (KATS), and so on, are active at national level and European
Telecommunications Standards Institute (ETSI) in the regional level for standardization.

UNIT – III

48
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

IOT ARCHITECTURE – STATE OF ART

The architecture of IoT depends upon its functionality and implementation in


different sectors. Still, there is a basic process flow based on which IoT is built. we will
discuss basic fundamental architecture of IoT i.e., 4 Stage IoT architecture

There is 4 layers are present that can be divided as follows: Sensing Layer, Network
Layer, Data processing Layer, and Application Layer.

Sensing Layer
The sensing layer is the first layer of the IoT architecture and is responsible for
collecting data from different sources. This layer includes sensors and actuators that are
placed in the environment to gather information about temperature, humidity, light,
sound, and other physical parameters. These devices are connected to the network layer
through wired or wireless communication protocols.

Network Layer
The network layer of an IoT architecture is responsible for providing
communication and connectivity between devices in the IoT system. It includes
protocols and technologies that enable devices to connect and communicate with each
other and with the wider internet. Examples of network technologies that are commonly
used in IoT include WiFi, Bluetooth, Zigbee, and cellular networks such
49
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

as 4G and 5G. Additionally, the network layer may include gateways and routers that act
as intermediaries between devices and the wider internet, and may also include security
features such as encryption and authentication to protect against unauthorized access.

Data processing Layer


The data processing layer of IoT architecture refers to the software and hardware
components that are responsible for collecting, analyzing, and interpreting data from IoT
devices. This layer is responsible for receiving raw data from the devices, processing it,
and making it available for further analysis or action.
The data processing layer includes a variety of technologies and tools, such as
data management systems, analytics platforms, and machine learning algorithms. These
tools are used to extract meaningful insights from the data and make decisions based on
that data.Example of a technology used in the data processing layer is a data lake, which
is a centralized repository for storing raw data from IoT devices.
Application Layer
The application layer of IoT architecture is the topmost layer that interacts
directly with the end-user. It is responsible for providing user-friendly interfaces and
functionalities that enable users to access and control IoT devices.This layer includes
various software and applications such as mobile apps, web portals, and other user
interfaces that are designed to interact with the underlying IoT infrastructure.

It also includes middleware services that allow different IoT devices and systems
to communicate and share data seamlessly.The application layer also includes analytics
and processing capabilities that allow data to be analyzed and transformed into
meaningful insights. This can include machine learning algorithms, data visualization
tools, and other advanced analytics capabilities.

50
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

The European Telecommunications Standards Institute (ETSI) in 2009 formed a


Technical Committee (TC) on M2M topics aimed at producing a set of standards for
communication among machines from an end-to-end viewpoint.

ETSI M2M high-level architecture

M2M Device:
An M2M device connects to the Network Domain either directly or through an
M2M Gateway

Direct connection:
 The M2M Device is capable of performing registration, authentication,
authorization, management, and provisioning to the Network Domain.
 Direct connection also means that the M2M device contains the appropriate
physical layer to be able to communicate with the Access Network

M2M Gateway:
This is the case when the M2M device does not have the appropriate physical
layer, compatible with the Access Network technology, and therefore it needs a network
domain proxy.

51
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

The M2M Gateway acts as a proxy for the Network Domain and performs the
procedures of authentication, authorization, management, and provisioning. An M2M
Device could connect through multiple M2M Gateways.

M2M Area Network:


This is typically a local area network (LAN) or a Personal Area Network (PAN)
and provides connectivity between M2M Devices and M2M Gateways.

M2M Gateway:

 The M2M Gateway contains M2M Applications and M2M Service


Capabilities.
 The M2M Gateway may also provide services to other legacy devices that are not
visible to the Network Domain.
 The device that provides connectivity for M2M Devices in an M2M Area
Network towards the Network Domain.

Access Network:
The network that allows the devices in the Device and Gateway Domain to
communicate with the Core Network.

Core Network:
IP connectivity
 Service and Network control.
 Interconnection with other networks.
 Roaming.
M2M Applications:
M2M applications (e.g. smart metering) that utilize the M2M Service Capabilities
through the open interfaces.
Network Management Functions:
 functions to manage the Access and Core Network

52
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

M2M Management Functions:


Functions required to manage the M2M Service Capabilities on the Network
Domain while the management of an M2M Device or Gateway is performed by specific
M2M Service Capabilities.

There are two M2M Management functions:


M2M Service Bootstrap Function (MSBF):
The MSBF facilitates the bootstrapping of permanent M2M service layer security
credentials in the M2M Device or Gateway and the M2M Service Capabilities in the
Network Domain.
M2M Authentication Server (MAS):
safe execution environment where permanent security credentials such as the
M2M Root Key are stored.Any security credentials established on the M2M Device or
Gateway are stored in a secure environment such as a trusted platform module.

M2M Service Capabilities, M2M Nodes and Open Interfaces

53
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

ETSI M2M service capabilities

INTRODUCTION,STATE OF THE ART,ARCHITECTURE

A reference model is a model that describes the main conceptual entities and how
they are related to each other, while the reference architecture aims at describing the
main functional components of a system as well as how the system works, how the
system is deployed, what information the system processes, etc.

An ARM is useful as a tool that establishes a common language of an M2M or IoT


system.

IoT architecture refers to the tangle of components such as sensors, actuators, cloud
services, Protocols, and layers that make up IoT networking systems. In general, it is
divided into layers that allow administrators to evaluate, monitor, and maintain the integrity
of the system. The architecture of IoT is a four-step process through which data flows from
devices connected to sensors, through a network, and then through the cloud for
processing, analysis, and storage.

54
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

REFERENCE MODEL

INTRODUCTION REFERENCE MODEL AND ARCHITECTURE

55
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

Reference Model and Architecture


An ARM consists of two main parts: a Reference model and a Reference
Architecture.
 A reference model describes the domain using a number of sub-models

From Reference to concrete architecture and actual system

A reference model is a model that describes the main conceptual entities and how
they are related to each other, while the reference architecture aims at describing the
main functional components of a system as well as how the system works, how the
system is deployed, what information thesystem processes, etc.

IOT Reference architecture and reference model dependency


56
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

IOT REFERENCE MODEL

IoT domain model

The domain model captures the basic attributes of the main concepts and the
relationship between these concepts. A domain model also serves as a tool for human
communication between people working in the domain in question and between people
who work across different domains.
Model notation and semantics

57
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

Main concepts

The IoT is a support infrastructure for enabling objects and places in the physical
world to have a corresponding representation in the digital world.

Physical vs. Virtual World

The Devices are physical artefacts with which the physical and virtual worlds
interact. Devices as mentioned before can also be Physical Entities for certain types of
applications, such as management applications when the interesting entities of a system
are the Devices themselves and not the surrounding environment.
For the IoT Domain Model, three kinds of Device types are the most important:

Sensors:
 These are simple or complex Devices that typically involve a transducer that converts
physical properties such as temperature into electrical signals.
 These Devices include the necessary conversion of analog electrical signals into
digital signals, e.g. a voltage level to a 16-bit number, processing for simple
calculations, potential storage for intermediate results, and potentially
communication capabilities to transmit the digital representation of the physical
property as well receive commands.
 A video camera can be another example of a complex sensor that could detect and
recognise people.

58
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

Actuators:

 These are also simple or complex Devices that involve a transducer that converts
electrical signals to a change in a physical property (e.g. turn on a switch or move a
motor).
 These Devices also include potential communication capabilities, storage of
intermediate commands, processing, and conversion of digital signals to analog
electrical signals.
Tags:

 Tags in general identify the Physical Entity that they are attached to. In reality,
tags can be Devices or Physical Entities but not both, as the domain model shows.
 An example of a Tag as a Device is a Radio Frequency Identification (RFID) tag,
while a tag as a Physical Entity is a paper-printed immutable barcode or Quick
Response (QR) code.
 Either electronic Devices or a paper-printed entity tag contains a unique
identification that can be read by optical means (bar codes or QR codes) or radio
signals (RFID tags).
 The reader Device operating on a tag is typically a sensor, and sometimes a sensor
and an actuator combined in the case of writable RFID tags.

IOT REFERENCE ARCHITECTURE

An IoT reference architecture serves as a foundational blueprint that outlines the


essential components and interactions within an IoT system. It provides a solid starting
point for designing and implementing IoT solutions.
Purpose and Benefits of Using a Reference

A reference architecture serves as a standardized blueprint that provides a clear


structure and guidelines for designing and implementing an IoT system. It enables
consistency, promotes best practices, and facilitates communication and collaboration
among stakeholders.

59
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

By leveraging a reference architecture, developers can reduce design complexity,


ensure interoperability, and accelerate the development process, ultimately leading to
more efficient and reliable IoT solutions.
Layers of IoT Reference Architecture
IoT reference architectures typically consist of multiple layers that work together to
enable the functioning of an IoT system.
A commonly used layered structure includes the following:
Perception Layer: This layer comprises the physical devices or sensors that collect data
from the environment or interact with the physical world. These devices can include
temperature sensors, motion detectors, cameras, and other IoT−enabled devices.
Network Layer: The network layer facilitates the connectivity and communication between
the IoT devices and the cloud or other data processing components. It includes protocols,
gateways, routers, and other networking infrastructure to ensure seamless data transfer and
reliable connections.
Data Processing Layer: This layer involves processing and analyzing the data collected
from IoT devices. It may include edge computing devices or cloud−based platforms
where data is aggregated, filtered, transformed, and analyzed to derive valuable insights.
Application Layer: The application layer encompasses the software applications or
services that utilize the processed IoT data to provide specific functionalities or address
specific use cases. These applications can range from real−time monitoring and control
systems to predictive analytics, machine learning algorithms, and automation.
The key components of an IoT reference architecture include:
Devices: These physical objects, ranging from sensors to smart appliances, play a crucial
role in collecting data and transmitting it to the cloud.
Network: The network infrastructure, which can be wired or wireless, connects the devices
to the cloud, enabling seamless data transfer and communication.

60
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

Cloud: The cloud serves as the centralized storage and processing hub for the data
collected by the devices. It can be a public, private, or hybrid cloud, depending on
specific requirements.
Applications: Software applications leverage the data collected by devices to deliver
insights and value. These applications can be tailored for various purposes, including
monitoring, control, and automation.
Security: Security measures are essential to protect the data collected by devices from
unauthorized access. Techniques like encryption, authentication, and authorization
ensure data security.
Privacy: Privacy measures safeguard personal data collected by devices from
unauthorized access. Anonymization, pseudonymization, and data minimization
techniques contribute to maintaining privacy.
Governance: Governance policies ensure responsible and ethical use of the IoT system.
These policies address aspects such as data ownership, data sharing, and appropriate data
usage.
Benefits of Using IoT Reference Architecture
 Common Framework
 Security and Scalability
 Cost Efficiency
 Faster Time to Market
INTRODUCTION

 The Reference Architecture is a starting point for generating concrete architectures


and actual systems.
 A concrete architecture addresses the concerns of multiple stakeholders of the actual
system, and it is typically presented as a series of views that address different stake-
holder concerns.
 Views are useful for reducing the complexity of the Reference Architecture
blueprints by addressing groups the concerns of one group at a time.

61
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

FUNCTIONAL VIEW
In order to address the concerns of mainly the concrete IoT architect, and secondly
the concerns of most of the above stakeholders, the Reference Architecture is presented
as a set of architectural views

Functional View: Description of what the system does, and its main functions.

INFORMATION VIEW
 Description of the data and information that the system handles.

The information view consists of

 The description of the information handled in the IoT System


 The way this information is handled in the system; in other words, the
information lifecycle and flow (how information is created, processed, and
deleted), and the information handling components.
The pieces of information handled by an IoT system

 Virtual Entity context information, i.e. the attributes (simple or complex) as


represented by parts of the IoT Information model.
 IoT Service output itself is another important part of information generated by an
IoT system. For example, this is the information generated by interrogating a
Sensor or a Tag Service.

62
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

 Virtual Entity descriptions in general, which contain not only the attributes
coming from IoT Devices (e.g. ownership information).
 Associations between Virtual Entities and related IoT Services.
Information flow and lifecycle

 On a high level, the flow of information in an IoT system follows two main
directions.
 From devices that produce information such as sensors and tags, information follows
a context-enrichment process until it reaches the consumer application or part of
the larger system, and from the application or part of a larger system information it
follows a context- reduction process until it reaches the consumer types of devices.
 Devices equipped with sensors transform changes in the physical properties of the
Physical Entities of Interest into electrical signals.
 These electrical signals are transformed in one or multiple values on the device
level.
 These values are then enriched with metadata information such as units of
measurement, timestamp, and possibly location information .
 These enriched values are offered by a software component (Resource) either on the
device or the network. The Resource exposes certain IoT Services to formalize access
to this enriched information.

63
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

At this point, the information is annotated with simple attributes such as location
and time, and often this type of metadata is sufficient for certain IoT applications or for
the use in certain larger systems.

This enriched information becomes context information as soon as it is further


associated with certain Physical Entities in the form of Virtual Entity attributes (simple or
complex, static or dynamic).

Further support information such as Associations between certain attributes and


IoT Services further enriches the context information of the Virtual Entity.

 enrichment occurs in applications or larger systems that employ.


 for example, data analytics, machine learning, and knowledge management,
which produces actionable information.
 Parts of the context and actionable information may be stored to an information
store for future use.
 Actionable information flows into business processes that implement an action
plan.
 Action plans push context information about Virtual Entities to associated IoT
Services, to corresponding Actuation Resources, and finally to the real actuators
that perform the changes in the physical world

64
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

DEPLOYMENT AND OPERATIONAL VIEW

Description of the main real world components of the system such as devices,
network routers, servers, etc.

 The Deployment View defines how to transition the system to live operation.
 The Operational View defines how to keep the system alive in the field.
Supporting design, development, and testing of complex systems requires the
right environment

65
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

UNIT – IV

IOT APPLICATIONS FOR VALUE CREATIONS

INTRODUCTION

Within the context of industrial production IoT projects andapplications are


developing in manufacturing, supply chain,supervision and servicing.

IOT APPLICATIONS FOR INDUSTRY

IoT Applications

 IoT technologies capable to improve and easy adapt


 Industrial manufacturing processes
 enable new and efficient ways to do operate and interact in production plants
 create new service or supervision means for industrial installations offer an
optimized infrastructure,
 reduce operational cost and energy consumption or improve human safety in
industrial areas.

Value and Benefit

 Value from visibility identification, location tracking


 Value form IoT-supported safety in hard industrial environments
 Value from right information providing or collecting
 Value form improved industrial operation and flows in industry
 Value from reduced production losses
 Value from reduced energy consumption
 Value from new type of processes made possible by IoT applications

66
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

 Value form new type of maintenance and lifetime approaches


 Value enabled by smart objects, connected aspects
 Value from sustainability.
IoT applications requirements and capabilities

 Reliability
 Robustness
 Reasonable cost
 Security and safety
 Simple use
 Optimal and adaptive set of features
 Low/No maintenance
 Standardization
 Integration capabilities
 Reach sensing and data capabilities
 Industry grade support and services
Challenges faced by IoT industry applications

 IoT device technical challenges


 Lifetime and energy challenge
 Data and information challenge
 Humans and business

FUTURE FACTORY CONCEPTS


 Smart products
 Smart equipment and smart infrastructure
 The augmented operator

Smart Factory production facility

67
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

Digital product memories in open-loop processes

BROWNFIELD IOT

Technologies for Retrofitting

 High value use cases for IoT retrofitting.


 These “brownfield” use cases are all targeted towards optimizing existing
processes by decreasing the gap between the real world and the virtual world.
 They are thus examples for an evolutionary approach towards an “Industry 4.0”
that builds upon IoT Technology.

68
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

Iot supported interactions as part of a complex Cyber-Physical-System

 They reflect their physical interdependencies also by communicationlink and data


exchange.
 Technologies like sensor networks and RFID often builds the missing link in such
an environment. IoT technology delivers “smartness” and context awareness to
otherwise “dumb” objects and environments.

Cost-effective Technical Integration of IoT Devices:

 A developer of IoT technology has to take various technical requirements into


account such as energy, communication bandwidth, communication topology,or
processing resources of different IoT systems.
69
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

 Additionally the interoperability is crucial to the value of the system.


Cost-effective Process Integration of IoT Devices:

 Opportunistic data collection through local infrastructures and adhoc mobile


access.
 Context-aware interlinking of heterogeneous datastarting from existing
processes.
 Human agility and expertise supported by a human-centered information design.

SMART OBJECTS,SMART APPLICATIONS

Smart Object is a bi-directional communicating object which-observes its


environment and-is able to make decisions depending on the application and based onthe
information extracted from the physical world.

One approach to Smart Objects is based on the technology of wireless sensor


networks, as they already provide the communicationplatform and the sensors.

The ISO/IEC JTC1/WG7 Working Group on Sensor Networks has


designed reference architecture Figure, which separates the sensornode functionality
into three layers:-

Communication Layer : describes the communication protocol forthe interaction of a smart


object with other smart objects, aninfrastructure or backbone networks.-

Service Layer : represents a set of functions commonly required,such as sensor


information gathering, filtering by various policies andrules, data comparison and
analysis, data mining etc.

Application Layer : realizes the use case of a smart object by a set of functions to users to
meet defined requirements.

Architecture overview of interconnected smart objects.

70
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

 From the users prospect the smartness of a smart object is realized within the service
and the application layers.
 Smart objects are designed as miniaturized, low powermicroelectronic systems
based on micro controllers, transceivers,sensors and energy supply.
 As these microelectronic systems provide very limited resources (i.e.,processing
power, memory) reconfigurable software implementationsfor smart objects
become a challenge.
 Especially when reconfiguration requires: easy programming, minimum code
size.
 Reconfiguration is done by adding or changing components or bychanging the
functionality behind the interfaces.This is done by code programming of the
components and bysoftware update on the smart object.
 Code Programming and data-intensive software update can beavoided by the new
approach of smart applications.Service oriented approach vs Smart applications
approach (consist ofsoftware components).

Service oriented approach :left and Smart application approach right.

71
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

Smart applications work flow from a jigsaw puzzle to theapplication on the node

FOUR ASPECTS IN YOUR BUSINESS TO MASTER IOT

1.Internet Conquering Product Business

Impressive is the growth that is seen in internet access

72
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

By 2015 expected IP-ready devices, connected to the internet,6,593 billion

2.Strategic Business Aspects

Four Aspects of the Internet of Things & Services

Technology

The internet and its technology are offering an established platform for
interconnecting billion things —from tiny sensors, smart phones, PCs, to high performance
computers.

73
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

Business Innovation
The spirit of internet business models is turning up in traditional product
business.
Market
Different industries meet the first time as the Internet of Things & Services crosscuts
some of today’s separate markets.
Competencies
Software and system competencies linked to deep domain knowledge and
enlightened with creativity are the core for innovation in technology and business.

3.Vertical Business Domains for IoT

The value of the Internet of Things & Services technology is delivered in


vertical application domains.

74
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

4. Reference Architecture and the Core Competence for Business

 The business success in one vertical domain is the key entry point,
butsuccessful architectures will reach out to other verticals later.
 Only architectures that can cover multiple domains will be successfulin the
long run.

VALUE CREATION FROM BIG DATA AND SERIALIZATION

It explores IoT technology as a value creation capability rather than as a cost


optimization strategy, specifically exploring thevalue of data that is collected from
multiple infrastructures across a product lifecycle andwhere the Auto-ID serialized
identifier may serve as a key to linkingrelevant data to individual products, processes and
related outcomes.

Serialization Role in an ‘Internet of Things’

 Big data in the pharmaceutical industry


 Tracking serialized products
 The value of supply chain data
 Quality by design
 Legal information flows
75
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

 Finance flows
 Regulatory oversight
 Product lifecycle management data
 Keeping better track of things
IOT FOR RETAILING INDUSTRY

IoT in Retail Industry : Use Cases, Benefits, Trends


Retailers are under increasing pressure to keep up with consumer demands,
quality services, on-time deliveries & competitive pricing. These factors and the lack of
technical know-how restrict them in a market where they would otherwise thrive. From
business process optimization to cost reduction and service automation, the application
of the internet of things in retail can address significant challenges & drive
unprecedented benefits.

The Role of IoT in the Retail Market


IoT refers to a network of physical devices, objects & spaces embedded with
Bluetooth beacons, sensors, Global Positioning System (GPS) & Radio-frequency
identification (RFID) technologies. It helps brands track the location, condition &
movement of their assets & inventory anytime, anywhere. Retailers get 360-degree
visibility by connecting and exchanging data with systems & devices over the internet.
Listed below are two of the most common IoT applications in the retail industry:

Data collection & sharing: Devices embedded with sensors help track product and
shopping lifecycle. It would include tracking various forms of data, including
environmental & equipment, asset performance, stock levels & more. This information
can be stored, transformed & analyzed using algorithms to extract meaningful insights to
optimize operations.

Process automation: IoT-enabled connected stores and devices can be partially or fully
automated to bring efficiency, sustainability & resilience to retail operations and
processes. Further, retail automation helps increase the pace, precision &

76
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

efficiency of supply chain operations, inventory management, order fulfillment &


checkout.
Internet of Things in Retail: Market Trends According

to Research & Markets Analysis;

 Due to the seismic shift in demand for IoT in retail, its market size is expected to
hit $177.90 billion by 2031.
 Factors include effective store space monitoring, inventory management, supply
chain management, and customer behavior monitoring. It will drive demand for
IoT in the retail market.
 Optimization and automation of the supply chain is identified as the main factor
for IoT adoption
 Further, connectivity technologies, including digital signage, top-of-the-shelf
displays, beacons, and price displays, will allow brands to access large volumes
of data on customer activity during in-store shopping.
Benefits of IoT in Retail

Optimized Supply Chain Management: RFID & GPS technologies allow retailers to
identify and inspect every object across warehouses, in transit and on the shelves.
Connected sensors provide a consistent stream of real-time data from the floor to the
store. It helps identify potential bottlenecks, enable contingency planning, allow
route optimization and accelerate product delivery. It also enables manufacturers,
77
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

suppliers and distribution centers to optimize shipping & handling times while ensuring
speedy delivery to vendors and consumers.

Enhanced Customer Experience: IoT capabilities and machine learning algorithms can
accurately assess consumer data to personalize shopping experiences. Bluetooth Light
Energy (BLE) beacons can help personalize shopping by sending alerts & notifications
about special discounts and seasonal offers on smartphones based on a shopper’s location
proximity.

Layout Optimization: Aisle analytics software clubbed with infrared sensors enables IoT
technology to improve the in-store layout. It helps optimize customer behavior. This data can
be used to understand buyer journeys, identify confused and impatient shoppers and
determine the reasons for abandoned carts.

Efficient Inventory Management: RFID chips, beacons and sensors can seamlessly
synchronize assets and inventory with data centers. Smart price tags and digital displays
integrated with image analytics capabilities help improve control and order stock levels
& expiration dates in the warehouse and on the front shelves.
The Use Cases of IoT in the Retail Industry

Seamless In-Store Navigation


Sensor-based lights, temperature controls, security controls, stock monitoring,
indoor air quality (IAQ), and point-of-sale queuing assistance aid in enhancing the in-
store experience for shoppers. Indirect advantages of the data extracted and analyzed
from the IoT mentioned above include compliance monitoring across lighting schedules,
energy consumption, refrigeration zones, warehousing, HVAC equipment performance
& maintenance plans.

78
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

Smart Shelves
Help track items to ensure they’re never out-of-stock, and check that things aren’t
misplaced on various shelves. Fitted with weight sensors and RFID tags & readers allow
scanning of the products on both display and stock shelves. It makes your inventory process
cost-effective and more precise. Additionally, by connecting each RFID tag to a reader,
Smart Shelves can detect in-store theft — saving money on security personnel and
cameras.

Placement
Store managers can use the insights collected from sensors and video analytics to
identify premium store areas. They can test the placement of different product types in
other spots and determine the most profitable layout. Implementing a self-learning
analytics algorithm can also assist store owners and operators deliver a seamless
shopping experience.

Buyer Behavior Tracking


Occupancy sensors share vital insights on store traffic patterns and retention times
in premium product areas. This data enables better planning of in-store merchandising &
guided marketing via effective digital display ads, calculated space
allotment and aisle layouts. This data can also be leveraged to track the wait times at
79
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

checkout for optimizing customer service with additional self-checkouts or more


staffing.

Checkout Automation
Brick-and-mortar stores can use a variety of IoT Technologies, including motion-
activated cameras, beacons, and shelf-tracking tags, to provide a fully automated,
cashier-less in-store shopping experience. Shoppers can walk in, pick the items they
want, make the payment online, get a digital receipt on their smartphone and walk out.

On-Site Sensors for Repairs & Maintenance


Retailers can install commercial sensors for food storage facilities, parking sites,
and warehouses to track light, humidity, temperature and air quality. If any vital aspect is
amiss, an instant alert is triggered. Depending on the software, you can also generate
reports to track trends and fluctuations over time and automate safety checks.

Cold Chain Monitoring


Food spoilage in the grocery industry results in significant losses. Environmental
sensors can be installed to track ambient conditions inside a food storage facility, cargo
vessels, and delivery vehicles to ensure food remains fresh and waste is reduced. They
can help obtain precise data, like the temperature at which an item is being stored, how
long it is spent in transit, etc.

Omnichannel Online & Offline Retail Experiences


The increasing preference for online shopping has compelled retailers to blend in-
store & virtual buying for a seamless experience. IoT devices make this possible by
providing consumers with easy access to real-time stock availability in stores. Shoppers
can load their carts online and try the products in-store. It ensures a hassle-free in-store
experience with minimal time spent.

80
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

IOT FOR OIL ANS GAS INDUSTRY


Today’s oil and gas industry stands out as heavily reliant on technology &
substantial investments. Even the slightest mistakes, malfunctions, or inaccuracies could
result in immense financial losses that could amount to billions of dollars. However,
introducing IoT (Internet of Things) technology to this industry has emerged as the
solution to numerous challenges.

What Is the Role of IoT In Oil and Gas Industry?


IoT for the oil and gas industry involves implementing interconnected devices,
sensors, and systems. It enables data collection, communication, and analysis across
sectorial operations. It would include integrating digital technologies with physical assets
and infrastructure that help enhance operational efficiency, safety, and decision-making.

Forward-thinking oil and gas organizations are tapping into “brownfield” IoT
infrastructure, making the most of existing assets, and exploring groundbreaking
business models. With IoT, companies can gather unprecedented amounts of data from
every corner of their operations – from equipment, facilities, and other assets, thus
enabling remote monitoring & control. This data would include parameters such as
temperature, pressure, flow rates, equipment performance & environmental conditions.

Benefits of IoT in Oil & Gas Industry

81
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

Remote Asset Management: Oil and gas companies constantly want insights into their
assets and equipment because profitability in the oil and gas industry is closely linked
with asset uptime. By enabling remote real-time asset management across the complex
network of fixed and moving equipment, IoT technology helps improve product yield,
energy efficiency, and unit/facility downtime.

Enhanced Responsiveness: Real-time monitoring and data analysis minimize response


time, which helps identify potential issues before they blow out of proportion. Real-time
Safety Monitoring: Oil and Gas companies constantly face the risk of accidents. Real-time
safety monitoring with instant alerts helps detect leaks or other anomalies in real-time and
prevent fatal accidents.

Smarter Decision-Making: Whether you want to optimize processes, cut costs strategically,
or identify new business opportunities, IoT-generated insights enable better decision-making
with real-time insights.

Enhanced Efficiency: By leveraging advanced data analytics and machine learning, you
can uncover trends and patterns to optimize production efficiency.

Streamlined Inventory Management: Enables automating inventory tracking and


optimization to ensure optimal levels at all times while minimizing the risk of shortages or
the cost of overstocking.

Sustainability: IoT technologies are crucial in reducing the oil and gas industry’s carbon
footprint by detecting leaks, improving energy efficiency, and ensuring environmental
compliance.

Compliant Operations: Connected devices provide comprehensive data on facility


operations, making it easier for oil and gas companies to comply with industry standards
and applicable regulations.

82
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

Internet of Things Architecture for the Oil and Gas Industry

Sensors: For Oil & Gas industry, tracking the live location of vehicles has always been a
challenge. Though, advancements in sensor technology enabled by IoT help play a
crucial role in gathering data such as flow rate, temperature & pressure. The said sensors
are connected to wireless networks via gateways at the site. And once connected, field
engineers can access this data via smartphones & tablets for analysis.

Pipeline Management: Industry reports estimate losses of about $10 billion due to fuel
leakage. Therefore, the need for optimized pipeline routes has become apparent. A
dedicated solution would help reduce downtime & enable scheduled maintenance.
Further, sensors monitor factors like temperature, flow & pressure while providing
valuable insights for end-to-end pipeline inspections.

System Integrated Centers: They have proved essential for integrating IoT platforms across
core business processes. They receive data from various devices and can send alerts for
immediate action after quick analysis.

83
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

Real-time analysis: It is considered crucial when dealing with complex data. Therefore,
predictive analysis enables the accurate time tracking of data while alerting the engineers
of any changes in equipment behavior. And based on the timely alerts, the engineers can
make necessary adjustments to prevent failures or disruptions.

Smart Device Utilization: Oil & Gas workers utilize IoT tools, such as tablets & smart
wearables, to access & monitor systems remotely. They offer real-time information &
facilitate data analysis across any location while improving operational efficiency.

3D Printing: The adoption of 3D printing technology for the oil and gas industry has
been slow. Yet it is still proving to be a valuable solution since reverse engineering plays
a significant role in measuring the shape and size of every tool.

Asset Management & Utilization: The loading & unloading of trucks is equally critical
for efficient asset utilization for the transportation & logistics business.

Fleet Management: Interestingly, fleet management has dramatically benefited from IoT
technology. Installing off-road sensors in vehicles helps track real-time location &
health. Intelligent fleet systems help increase efficiency & reduce traffic incidents.

OPINIONS ON IOT APPLICATION AND VALUE FOR INDUSTRY


At a recent international workshop on IoT application and valuecreation for
industry, a quick survey was done asking participants at the workshop ontheir opinion on
value creation using industry IoTapplications
The respondents have been form academia, research,public/governmental and
industry.

84
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

IoT small survey structure

Main areas of industrial IoT applications presently and in 5 years.

85
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

Industry areas are expected to have most important benefit from IoT applications.

HOME MANAGEMENT

 Energy
 Garbage
 Entertainment
 Temperature
 Grossary
 Security etc
86
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

UNIT – V

INTERNET OF THINGS,PRIVACY,SECURITY AND GOVERNANCE

IoT is broad term, which indicates the concept thatincreasingly pervasive


connected devices (embeddedwithin, attached to or related to“Things”) will
supportvarious applications to enhance the awareness andthe capabilities of users.

For example, users will be able to interact with homeautomation systems to remotely
control the heatingor the alarm system.

INTRODUCTION

Firstly IoT is different because it will be possible and likely that objects will
autonomously manage their connections with the Internet or, this will be doneupon the
request of someone or something remotely.When someone shares a video or a
phototaken ontheir mobile phone over the Internet they“call the shots”.

The adoption of IoT essentially depends upon trust. Moreover this trust must be
established andmaintained with respect to a broad group of stakeholders otherwise IoT
will face, to some degree or other, challenges which may restrict adoption scope or delay
its timing.

Trust, privacy and governance aspects of IoT rely for the most part upon
security.Security in its broadest definitions includes health and wellbeing as well as other
forms of protection.

OVERVIEW OF GOVERNANCE,PRIVACY AND SECURITY ISSUES

The European Research Cluster on the Internet of Things hascreated a number of


activity chains to favour close cooperation between the projects addressing IoT topics
and to form an area for exchange of ideas and open dialog on
important research challenges.

87
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

The activity chains are defined as work streams that grouptogether partners or
specific participants from partners around well defined technical activities that will result
into at least oneoutput or delivery that will be used in addressing the IERC objectives.

IERC Activity Chain 05 is a cross-project activityfocused on making a valued


contribution to IoT privacy, security and governance among the EC funded research
projects in the area of Internet of Things.

“Privacy,security and competition have been identified as the main issues related to
IOT Governance.

Overall, the main objective of the Activity Chain 05 is toidentify research


challenges and topics, which could make IoT more secure for users (i.e. citizen, business
andgovernment), to guarantee the privacy of users and support the confident, successful
and trusted development of the IoT market.

In comparison to IoT initiatives in Europe or at a globallevel (e.g., IGF), Activity


Chain 05 does not definegovernment policies but focuses upon research.

CONTRIBUTION FROM FP7 PROJECTS

 FP7 iCore Access Framework (iCore Contribution)


 IoT@Work Capability Based Access Control System(IoT@Work Contribution)
 GAMBAS Adaptive Middleware (GAMBAS Contribution)
 IoT-A Architecture (IoT-A Contribution)
 Governance, Security and Privacy in the Butler Project (Butler Contribution)

FP7 iCore Access Framework (iCore Contribution)


The iCore cognitive framework is based on the principlethat any real world object
and any digital object that is available, accessible, observable or controllable

88
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

can have avirtual representation in the“Internet of Things”, which is called Virtual Object
(VO).

VOs are primarily targeted to the abstraction of technological heterogeneity and


include semantic description of functionality that enables situation-aware selection and use
of objects.

Composite virtual objects (CVOs) use the services of virtual objects. A CVO s a
cognitive mash-up of semantically interoperable VOs that renders services inaccordance
with the user/stakeholder perspectives and the application requirements.

The first cognitive management layer (VO level cognitiveframework) is


responsible for managing the VOs throughout their lifecycle, ensuring reliability of the
link tothe real world object/entity (e.g., sensors, actuators,devices, etc.)

89
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

They represent for example, in a logistic related scenario,tracking temperature


controlled goods transport,individual goods boxes are represented by VOs the container
transported by a truck is a VO as is the truck itself.

The second cognitive management layer(CVOlevel cognitive framework) is


responsible for composing the VOs in Composite VO. CVOs willbe using the services
of VO to compose more sophisticated objects.In our example, the combination of the
truck andthe transported goods is represented in thecognitive framework as a CVO.

The third level (User level cognitive framework) is responsible for interaction
with User/stakeholders.

The cognitive management frameworks will recordthe users needs and


requirements (e.g., humanintentions) by collecting and analyzing the user profiles,
stakeholders contracts (e.g., Service LevelAgreements) and will create/activate
relevantVO/CVOs on behalf of the users.

IoT@Work Capability Based Access Control System(IoT@Work Contribution)


The Internet of Things (IoT) envisages new security challenges,including in the
area of access control that can hardly be met byexisting security solutions.

Indeed, IoT is a more demanding environment in terms ofscalability and


manageability due both to the potentiallyunbounded number of things (resources and
subjects), the expected most relevant need to support the orchestration andintegration of
different services, the relevance of short-lived,often casual and/ or spontaneous
interaction patterns, therelevance of contexts, etc.

It depicts Capability Based Access Control (inthe following referred to as


CapBAC) systemdeveloped within the EU FP7 IoT@Work project.

The CapBAC is devised according to the capabilitybased authorization model in


which a capability is acommunicable, unforgivable token of authority.

90
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

This token uniquely identifies the granted right(s),the object on which the right(s) can
be exercised and the subject that can exercise it/them.

A capability based system reverses the traditional approach being now theuser in
charge of presenting his/her/itsauthorization token to the service provider, whilein a
traditional ACL or RBAC system it is theservice provider that has to check if the user
is,directly or indirectly, authorized to perform the requested operation on the requested
resource.

91
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

The CapBACarchitectural elements can be shortly characterized as follows

 The resource object of the capability


 The authorization capability
 The capability revocation
 The service/operation request
 The PDP (Policy Decision Point) is a resource-agnostic service
 The resource manager
 The revocation service

GAMBAS Adaptive Middleware (GAMBAS Contribution)


The GAMBAS project develops an innovative and adaptive middleware to enable
the privacy-preserving and automated utilization of behaviour-driven services thatadapt
autonomously to the context of users.

In contrast totoday’s mobile information access, which isprimarily realized by on-


demand searches via mobilebrowsers or via mobile apps, the middleware envisioned by
GAMBAS will enable proactive access to the rightinformation at the right point in time.

As a result, the context-aware automation enabled by the GAMBAS middleware


willcreate a seamless and less distractive experience for its users while reducing the
complexity of application development.

The core innovations realized byGAMBAS are the development of models and
infrastructures to support the interoperable representationand scalable processing of context,
the development of ageneric, yet resource-efficient framework to enable themultimodal
recognition of the user’s context, protocols and mechanisms to enforce the user’s privacy as
well asuser interface concepts to optimize theinteraction with behaviour-driven services.

92
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

Security and privacy is based on the following elements.

 Personal acquisition and local storage


 Anonymised data discovery
 Policy-based access control
 Secure distributed query processing
IoT-A Architecture (IoT-A Contribution)
 Security is an important cornerstone for the Internet of Things(IoT).
 This is why, in the IoT-A project, we deemed as very important to thoroughly
address security and privacy issues in various aspects.
 A set of requirements based on the input of external and internal stakeholders was
used as a basis for the identification of the mechanisms and functionalities that
guarantee user data privacy and integrity, user authentication, and trustworthiness
of the system.
 These functionalities were analysed and orchestratedin Functional Groups (FG)
and Functional Components(FC) in the frame of WP1.
 High-level PS&T specifications were integrated in theframe of the IoT-A
Architectural Reference Model(ARM) and then passed to vertical WPs dealing
withcommunication protocols (WP3), infrastructure services (WP4) as well as
hardware aspects (WP5).

93
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

Governance, Security and Privacy in the Butler Project (Butler Contribution)


The goal of the BUTLER project is the creation of an experimental technical
platform to support thedevelopment of the IoT.
The main specificity of the BUTLER approach is its targeted“horizontality”: The
vision behind BUTLER isthat of a ubiquitous IoT affecting several domains of our lives
(health, energy, transports, cities, homes,shopping and business) all at once.

The BUTLER platform must therefore be able to support different“Smart”


domains, by providing themwith communication, location and context
awarenessabilities, while guaranteeing their security and theprivacy of the end users.

The issue of security and privacy is therefore centralin the BUTLER project and
develops in severalrequirements, the main requirements relate to:

 Standard issues of data security


 The application enabled by the IoT may pose

additional privacy issues


However, Privacy and Security do not only referto security of the exchange of
data over thenetwork but shall include

94
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

 Protection of the accuracy of the data exchanged


 Protection of the server information
 Protection of the usage of the data by explicit
 Selected disclosure of Data
 The implementation of “Transparency of data usage”policies.

SECURITY,PRIVACY AND TRUST IN IOT-DATA-


PLATFORMS FOR SMART CITITES

All this information is stored in a variety ofdifferent places, for instance it can remain
locally in the sensors or company internal databases, insocial networks, in data storage
located in privatedata centres or even in a public cloud storageservice.

The components of a typical smart city information system.

It is clearly visible that information needs to cross multiple administrative


boundaries and can be used for multiple purpose. In fact it could be used for, at the time
of gathering, unknown purposes.Also actuation decisions can be taken in acoordinated
way between multiple contro lcentres or data providers.

Hence it is clear that there is a need of an information sharing platform in


which data flows from various sources and from different administrative boundaries need
to be treated in asecure and privacy preserving way.
95
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

To ensure this, security and privacy need to bepart of the platform by design and
may not be added later on.

FIRST STEPS TOWARDS A SECURE PLATFORM

Past and current projects, such as UbiSec&Sense,SENSEI, WSAN4CIP provide


already some solutions onwhich a platform as outlined above can build.

We present in this section certain components, which can be used as building


blocks, but also components that need further development to be suitable for the type of
platform SMARTIE aims for.

SMARTIE APPROACH

SMARTIE will design and build a data-centring information sharing platform in


which information will be accessed through an information service layer operating above
heterogeneous network devices and data sources andprovide services to diverse
applications in a transparent manner.It is crucial for the approach that all the layers involve
appropriate mechanisms to protect the data already at the perception layer as well as at the
layers on top of it.

SMARTIE will focus on key innovations that strengthen security, privacy and trust at
different IoT Layers as below:
 Applications
 Information Services
 Network
 Smart Objects

DATA AGGREGATION FOR THE IOT IN SMART CITIES

96
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

Data aggregation enables many IoT applications, including smart cities, industrial automation,
health care monitoring, environmental monitoring, and more. It provides the necessary data inputs for
these applications to operate efficiently and derive actionable intelligence.

The starting point of data aggregation is the collection of information from different
sensors.IoT is heterogeneous both semantically and syntactically.

SECURITY

The fact that internet-connected devices can operate with high performance in remote locations is
useful and even critical in many cases. But this also means hackers and cybercriminals are coming up
with new, sophisticated tactics to hack these devices.

Protect data from attackers by encrypting data between IoT devices, applications, and backend
systems. This includes encrypting data both in transit and at rest and using the PKI security model to
ensure that both sender and receiver are authenticated by the system prior to transmission.

97
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

IoT security is a vital component of a corporate cyber security strategy because it


limits the risks posed by these insecure, networked devices.

Cloud security measures include secure data storage, access controls, and
encryption. Many IoT devices store data they collect in the cloud, so strong security,
encryption, and authentication are crucial to keep that data where it belongs.

98
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

MODEL QUESTION PAPER

CLASS: III BSC AND III BCA Time: 3Hours


Max. Marks: 75
PART- A [15*1=15]

Answer ALL the Questions.

1. What is the full form of IoT?

(a) Internet of Technology (b) Incorporate of Things (c) Internet of Things

(d) Incorporate of Technology

2. Which of the following is not an IoT device?

(a)Table (b) Laptop (c) Arduino (d) Tablet

3. is a community that is working together to establish an iot architecture.


(a) Red Hat (b) Intercloud (c) Eclipse IOT (d) Bot 2 Bot

4. Which of the following protocol is used to link all the devices in the IoT?

(a) HTTP (b) UDP (c) Network (d)TCP/IP

5. What IoT collects?

(a) Device data (b) Machine generated data (c) Sensor data

(d) Human generated data

6. Which of the following is not an application of IoT?

(a) Wearables (b) Smart Grid (c) Arduino (d) Smart city

7. Which environment does Global Sensor Network work on?

(a) C++ (b) Java (c) HTML (d) C


8. Which of the following devices is used to measure the gases or liquid?

(a) Optical sensor (b) Gas sensor (c) smoke sensor (d) Pressure sensor

9. What is the real example of a smart grid device in IoT?

99
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

(a) Mobile phone (b) Television (c) Smart Speaker (d) Smart Meters

10. Which of the following layers provides end-to-end communication in IoT?

(a) logical layer (b) data link layer (c) Transport layer (d) session layer

11. Which of the following is not an IOT platform?

(a) Amazon Web Services (b) Microsoft Azure (c) salesforce (d) Filpkart

12. Which of the following command is used to trigger the Amazon echo IOT device?

(a) Hello (b) Suri (c) Alexa (d)Hey

13. Which layer is used for wireless connection in IOT devices?

(a) Application layer (b) Network layer (c) Data link layer (d)

(d) Transport layer

14. Which of the following is not a fundamental component of an IOT system?

(a) Sensors (b) Connectivity and data processing (c) Interface (d) Transformer

15. In which year,the term "Internet of things" was coined ?

(a) 1998 (b) 2000 (c) 1999 (d) 2001

PART-B [2*5=10]

Answer Any TWO Questions out of FIVE

16. Write a short notes on IoT application.


17.Write a short note on IoT value chains.
18.Discuss about Functional View.
19.Explain about IoT for Retailing Industry,
20. Write about Smartie Approach.
PART-C [5*10=50]
Answer ALL the Questions.

100
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

21.a) Write about note on Future Internet Technologies. (OR)

b) Explain about Security, Privacy & Trust, in IoT .

22.a) Explain about emerging industrial structure for IoT in detail. (OR)

b) Write about M2M to IoT-An Architecture in detail

23.a) Explain about IoT Architecture State of the Art in detail. (OR)

b) Explain about IoT Reference Architecture in detail.

24.a) Write Four Aspects in your Business to Master IoT in detail. (OR)

b) Write about Opinions on IoT Application and Value for Industry.

25.a) Explain about Contribution from FP7 Projects in detail. (OR)

b) Explain about First Steps Towards a Secure Platform in detail.

MODEL OBJECTIVE QUESTIONS


INTERNET OF THINGS AND ITS
APPLICATIONS

1. What is the full form of IoT?

(a) Internet of Technology (b) Incorporate of Things (c) Internet of Things

(d) Incorporate of Technology

101
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

2. Which of the following is not an IoT device?

(a)Table (b)Laptop (c)Arduino (d)Tablet

3. is a community that is working together to establish an iot architecture.


(a) Red Hat (b)Intercloud (c)Eclipse IOT (d)Bot 2 Bot

4. Which of the following protocol is used to link all the devices in the IoT?

(a) HTTP (b) UDP (c) Network (d)TCP/IP

5. What IoT collects?

(a) Device data (b) Machine generated data (c) Sensor data

(d) Human generated data

6. Which of the following is not an application of IoT?

(a) Wearables (b) Smart Grid (c) Arduino (d) Smart city

7. Which environment does Global Sensor Network work on?

(a) C++ (b) Java (c) HTML (d) C


8. Which of the following devices is used to measure the gases or liquid?

(a) Optical sensor (b) Gas sensor (c) smoke sensor (d) Pressure sensor

9. What is the real example of a smart grid device in IoT?

(a) Mobile phone (b) Television (c) Smart Speaker (d) Smart Meters

10. Which of the following layers provides end-to-end communication in IoT?

(a) logical layer (b) data link layer (c) Transport layer (d) session layer

11. Which of the following is not an IOT platform?

(a) Amazon Web Services (b) Microsoft Azure (c) salesforce (d) Filpkart

12. Which of the following command is used to trigger the Amazon echo IOT device?

(a) Hello (b) Suri (c) Alexa (d)Hey

102
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN

13. Which layer is used for wireless connection in IOT devices?

(a) Application layer (b) Network layer (c) Data link layer (d)

(d) Transport layer

14. Which of the following is not a fundamental component of an IOT system?

(a) Sensors (b) Connectivity and data processing (c) Interface (d) Transformer

15. In which year,the term "Internet of things" was coined ?

(a) 1998 (b) 2000 (c) 1999 (d) 2001

103

You might also like