Iii Bca and CS Iot Notes 2023 PDF
Iii Bca and CS Iot Notes 2023 PDF
SYLLABUS
IoT& Web Technology, The Internet of Things Today,Time for Convergence, Towards
the IoT Universe,Internet of Things Vision, IoT Strategic Research andInnovation
Directions, IoT Applications, Future Internet Technologies, Infrastructure, Networks and
Communication, processes, Data Management, Security, Privacy & Trust, Device Level
Energy Issues,IoT Related Standardization, Recommendations on Research Topics.
UNIT – II
UNIT – III
IoT Architecture -State of the Art – Introduction, State of the art, Architecture. Reference
Model- Introduction, Reference Model and architecture, IoT reference Model, IoT
Reference Architecture- Introduction, Functional View, Information View, Deployment
and Operational View, Other Relevant architectural views.
UNIT-IV
1
BHARATHIYAR ARTS AND SCIENCE COLLEGE
IoT Applications for Value Creations Introduction, IoT applications for industry: Future
Factory Concepts, Brownfield IoT, Smart Objects, Smart Applications, Four Aspects in
your Business to Master IoT, Value Creation from Big Data and Serialization, IoT for
Retailing Industry, IoT For Oil and GasIndustry, Opinions on IoT Application and Value
for Industry, Home Management.
UNIT-V
TEXT BOOK
REFERENCE BOOK
1. Michael Miller, ―The Internet of Things: How Smart TVs, Smart Cars, Smart Homes,
and Smart Cities Are Changing the World‖, kindle version.
2
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
UNIT- I
The Internet of Things refers to the rapidly growing network of connected objectsthat are able
to collect and exchange data in real time using embedded sensors.
Internet of Things refers to the collective network of connected devices and the
technology that facilitates communication between devices and the cloud, as well as between
the devices themselves.
The Internet of Things (IoT) is a name for the aggregate collection of network- enabled
devices, excluding traditional computers like laptops and servers. Types of network connections
can include Wi-Fi connections, Bluetooth connections.
1
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
IoT, is a network of interrelated devices that connect and exchange data with
other IoT devices and the cloud. IoT devices are typically embedded with technology
such as sensors and software and can include mechanical and digital machines and
consumer objects.
Integrated environments that have been at the origin of the successful take up of
smartphone platforms and capable of running a multiplicity of user-driven applications
and connecting various sensors and objects are missing today. Such super-stack like
environments, bringing together a number of distinct constituencies, represent an
opportunity for Europe to develop Internet of Things ecosystems. As an
2
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
example this would include the definition of open APIs and hence offer a variety of
channels for the delivery of new applications and services.
Such open APIs are of particular importance at module range on any abstraction level
for application-specific data analysis and processing, thus allowing application
developers to leverage the underlying communication infrastructure and use and combine
information generated by various devices to produce added value across multiple
environments. As a quintessence the next big leap in the Internet of Things evolution will
be the coherence of efforts on all levels towards innovation.
In case of the IoT community this would mean that out of many possible “coherence
horizons” the following will likely provide the foundation for a step forward to the
Internet of Things:
Coherence of object capabilities and behaviour: the objects in the Internet of Things will
show a huge variety in sensing and actuation capabilities, in information processing
functionality and their time of existence.
3
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
Coherence of real and virtual worlds: today real and virtual worlds are perceived as two
antagonistic conceptions. At the same time virtual worlds grow exponentially with the
amount of stored data and ever increasing network and information processing
capabilities. Understanding both paradigms as complementary and part of human
evolution could lead to new synergies and exploration of living worlds.
The overall scope is to create and foster ecosystems of platforms for connected smart
objects, integrating the future generation of devices, network technologies, software
technologies, interfaces and other evolving ICT innovations, both for the society and for
people to become pervasive at home, at work and while on the move. These
environments will embed effective and efficient security and privacy mechanisms into
devices, architectures, platforms, and protocols, including characteristics such as
openness, dynamic expandability, interoperability of objects, distributed intelligence, and
cost and energy-efficiency.
4
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
Whereas the forthcoming Internet of Things related research in the scope of Horizon
2020 and corresponding national research programs will address the above matters,
challenges from a societal and policy perspective remain equally important, in particular
the following:
5
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
In the last few years the evolution of markets and applications, and there- fore
their economic potential and their impact in addressing societal trends and challenges for
the next decades has changed dramatically. Societal trends are grouped as: health and
wellness, transport and mobility, security and safety, energy and environment,
communication and e-society. These trends create significant opportunities in the
markets of consumer elec- tronics, automotive electronics, medical applications,
communication.
Potential applications of the IoT are numerous and diverse, permeating into
practically all areas of every-day life of individuals, enterprises, and society as a
6
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
whole. The IERC has identified and described the main Internet of Things applications,
which span numerous applications domains: smart energy, smart health, smart buildings,
smart transport, smart industry and smart city.
The vision of a pervasive IoT requires the integration of the various domains into
a single, unified, domain and addresses the enabling technologies needed for these
domains while taking into account the elements that form the third dimension like
security, privacy, trust, safety.
The applications areas include as well the domain of Industrial Internet where
intelligent devices, intelligent systems, and intelligent decision-making represent the
primary ways in which the physical world of machines, facilities, fleets and networks
can more deeply merge with the connectivity, big data and analytics of the digital world.
The first priorities for IoT research and innovation in the next years are in the areas of
IoT distributed architectures, edge computing, end-to-end security, distributed ledger
technologies (DLTs), AI and the convergence of these technologies.
The applications areas include as well the domain of Industrial Internet where
intelligent devices, intelligent systems, and intelligent decision-making represent the
primary ways in which the physical world of machines, facilities, fleets and networks
can more deeply merge with the connectivity, big data and analytic.
7
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
IOT APPLICATIONS
8
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
Innovating agriculture.
Building smarter cities.
Upgrading supply chain management.
Transforming healthcare. Installing smart grids. Revolutionizing wearables.
Wearles
Wearable technology is the hallmark of IoT applications and one of the earliest
industries to deploy IoT. We have fit bits, heart rate monitors and smartwatches these
days.
Guardian glucose monitoring device has been developed to help people with
diabetes. It detects glucose levels in our body, uses a small electrode called the glucose
sensor under the skin, and relates it to a radiofrequency monitoring device.
Smart Home Applications
The smart home is probably the first thing when we talk about the IoT
application. The example we see the AI home automation is employed by Mark
Zuckerberg. Alan Pan's home automation system, where a string of musical notes uses
in-house functions.
Health care
IoT applications can transform reactive medical-based systems into active
wellness-based systems. Resources that are used in current medical research lack
important real-world information. It uses controlled environments, leftover data, and
volunteers for clinical trials. The Internet of Things improves the device's power,
precision and availability. IoT focuses on building systems rather than just tools. Here's
how the IoT-enabled care device works.
Smart Cities
9
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
Most of you have heard about the term smart city. Smart city uses technology to
provide services. The smart city includes improving transportation and social services,
promoting stability and giving voice to their citizens.
Example of a smart city - Palo Alto.
Palo Alto, San Francisco, is the first city to acquire the traffic approach. He
realized that most cars roam around the same block on the streets in search of parking
spots. It is the primary cause of traffic congestion in the city. Thus, the sensors were
installed at all parking areas in the city. These sensors pass occupancy status to the cloud
of each spot.
Agriculture
By the year 2050, the world's growing population is estimated to have reached about
10 billion. To feed such a large population, agriculture needs to marry technology and get
the best results. There are many possibilities in this area. One of them is Smart Greenhouse.
Farming techniques grow crops by environmental parameters. However, manual
handling results in production losses, energy losses and labor costs, making it less
effective.The greenhouse makes it easy to monitor and enables to control the climate
inside it.
Industrial Automation
10
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
It is one of the areas where the quality of products is an essential factor for a more
significant investment return. Anyone can re-engineer products and their packaging to
provide superior performance in cost and customer experience with IoT applications.
IoT will prove as a game-changer. In industrial automation, IoT is used in the following
areas:
Product flow monitoring
Factory digitization
Inventory management
Safety and security
Logistics and Supply Chain Optimization
Quality control
Packaging customization
Healthcare
Healthcare do real-time monitoring with the help of smart devices. It gathers and
transfers health data such as blood pressure, blood sugar levels, weight, oxygen, and
ECG. The patient can contact the doctor by the smart mobile application in case of any
emergency.
Smart Retail
11
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
IoT applications in retail give shoppers a new experience. Customers do not have
to stand in long queues as the checkout system can read the tags of the products and
deduct the total amount from the customer's payment app with IoT applications' help.
Smart Supply Chain
Customers automate the delivery and shipping with a smart supply chain. It also
provides details of real-time conditions and supply networks.
Smart Farming
Farmers can minimize waste and increase productivity. The system allows the
monitoring of fields with the help of sensors. Farmers can monitor the status of the area.
Internet-connected devices go from 5 million to billions in just one year. Business
Insider Intelligence estimates 24 billion IoT devices will install and generate more than 300
billion.
FUTURE INTERNET TECHNOLOGIES
Future of IoT has the potential to be limitless. Advances to the industrial internet
will be accelerated through increased network agility, integrated artificial intelligence
(AI) and the capacity to deploy, automate, orchestrate and secure diverse use cases at
hyperscale.
Here are the top emerging IoT trends to look for in 2021:
IoT applications are everywhere around us, like wearables, smart homes, industrial
settings, etc. IoT focuses on devices interacting using the internet while Artificial
Intelligence makes the devices learn from their data and experiences.
Combining AI and IoT can redefine the way industries, businesses, and economies
function. AI and IoT can be combined to create intelligent machines that simulate smart
behavior and offer support in decision-making.
12
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
13
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
A rise in the adoption of blockchain technology is one of the latest IoT trends. IoT
devices are considered an easy target for DDoS attacks. In 2021, blockchain will prove
to be the most reliable solution to ensure data protection. It will help address some of the
IoT security and scalability challenges by providing a way for information to be securely
recorded and shared by a community of users.
Remote Learning
Due to the outbreak of Covid-19, schools worldwide had to shut down. While
many countries have begun to move out of lockdown now, the focus is still on remote
learning. To help schools maintain healthy and safe environments, professionals are
considering IoT that can be integrated into the education system.
The focus will be on improving IoT devices like mics, webcams, and virtual
whiteboards. IoT will also be used in addressing other challenges faced while learning
from homes, like visual distractions and background noise.
14
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
15
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
The Covid-19 pandemic has significantly aided IoT’s market expansion in the
healthcare industry. Due to the wide capabilities of IoT in healthcare, like tracking,
authentication, and data collection, its exponential growth is likely to rise.
There has been a surge in the adoption of digital health devices like wearable and
sensors that monitor the vitals of patients. As more people look for affordable and useful
digital health devices, the demand for IoT devices that can monitor patients remotely
will rise. These devices will become more advanced and will tell healthcare professionals
all the details about their patients in real-time.
The coronavirus has lead to more employees working from home. Most of the remote
work requires internet-connected devices such as laptops, webcams, microphones, and
smartphones. Companies such as Microsoft (Teams) and Zoom
16
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
are capitalizing on the trend of moving away from physical work by allowing the
workforce to connect remotely.
In 2021, many companies will be adopting IoT devices to monitor the attendance and
tasks of employees. The data from these devices can be integrated into the cloud and be
used to monitor the safety of employees.
There has been significant adoption of smart home devices in recent years. These
smart home devices consist of a wide range of technologies and are interconnected by the
IoT, voice-first technology, AR (Augmented Reality), and VR (Virtual Reality). The demand
for smart home devices will continue as people want to make their homes more interactive,
safe, and secure. Energy consumption is another reason for the smart home devices market
growth.
A digital twin is a virtual representation of a real object or process. It can be used for
testing, monitoring, diagnosing, optimization, calculating, and analyzing asset
performance and utilization.
17
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
Digital twin technology will play a vital role in industrial IoT application
deployments. It will help in transforming manufacturing processes and provide different
ways to reduce costs, monitor assets, reduce downtime, increase consistency in the
production line, and enable the creation of connected products. In 2021, we can see
digital twins combined with IoT expand to more applications, use cases, and industries.
INFRASTRUCTURE
Any physical device that can be connected to the internet and be used to share and
collect data can be termed under the 'Internet of Things (IoT)'. The future of IoT lies in
the possibility to transform something as small as a chip or even an entire city into a
working IoT device.
Cloud infrastructure for IoT applications involves not only the traditional data
processing (app services, virtual machines, serverless functions, etc.) and storage
(databases, cache, etc.) services, but also gateway services to gather incoming data and
interact with the devices (HTTP/MQTT server, WebSocket server).
18
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
The Internet of Things will become part of the fabric of everyday life. It will become
part of our overall infrastructure just like water, electricity, telephone, TV and most
recently the Internet.
Infrastructure Functionality
semantic information regarding the things, the information they can provide or the
actuation they can perform need to be available.(e.g: temperature the sensor measures).
19
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
IoT is the connection of devices over the internet, where these smart devices
communicate with each other , exchange data , perform some tasks without any human
involvement. These devices are embedded with electronics, software, network and
sensors which help in communication.
Networks Technology
The complexity of future networks and the expected growth of complexity due to
the growth of Internet of Things.
Wireless networks especially will grow largely by adding vast amounts of small
Internet of Things devices with minimum hardware, software.
Mobile Networks:
Expand current end user network nodes into networks of their own or even a
hierarchy of networks.
20
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
Overlay Networks:
In some locations even multiple networks overlaying one another physically and
logically.
Network Self-organization:
The current transition of the global Internet to IPv6 will provide a virtually
unlimited number of public IP addresses able to provide bidirectional and symmetric
(true M2M) access to Billions of smart things.
Communication Technology
Communications technologies for the Future Internet and the Internet of Things
will have to avoid such bottlenecks by construction not only for a given status of
development, but for the whole path to fully developed and still growing nets.
Correctness of Construction:
21
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
The communication between devices and structures in the Internet of Things and
the Future Internet using wired and wireless channels shall be merged into a unified
minimum theoretical framework covering and including formalized communication
within protocols.
PROCESSES
When talking about how does IoT works, the process begins with devices that
have built-in sensors. These devices are connected to IoT platforms which store data
from all the connected devices. The important data is then used to perform tasks that
fulfill the needs of people.
DATA MANAGEMENT
22
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
objects and devices generating the data and the applications accessing the data for
analysis purposes and services. The devices themselves can be arranged into subsystems
or subspaces with autonomous governance and internal hierarchical management.
Organizations or individual users have access to these repositories via query and
federation layers that process queries and analysis tasks, decide which repositories hold
the needed data, and negotiate participation to acquire the data. In addition, real-time or
context-aware queries are handled through the federation layer via a sources layer that
seamlessly handles the discovery and engagement of data sources. The whole framework
therefore allows a two-way publishing and querying of data. This allows the system to
respond to the immediate data and processing requests of the end users and provides
archival capabilities for later long- term analysis and exploration of value-added trends.
Traditional data management systems handle the storage, retrieval, and update of
elementary data items, records and files. In the context of IoT, data management systems
must summarize data online while providing storage, logging, and auditing facilities for
offline analysis. This expands the concept of data management from offline storage,
query processing, and transaction management operations into online-offline
communication/storage dual operations.
23
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
Storage operations aim at making data available on the long term for constant
access/updates, while archival is concerned with read-only data. Since some IoT systems
may generate, process, and store data in-network for real-time and localized services,
with no need to propagate this data further up to concentration points in the system,
“edges” that combine both processing and storage elements may exist as autonomous
units in the cycle.
Querying: Data-intensive systems rely on querying as the core process to access and
retrieve data. In the context of IoT, a query can be issued either to request real-time data
to be collected for temporal monitoring purposes or to retrieve a certain view of the data
stored within the system. The first case is typical when a (mostly localized) real-time
request for data is needed. The second case represents more globalized views of data and
in-depth analysis of trends and patterns.
Production: Data production involves sensing and transfer of data by the “Things”
within the IoT framework and reporting this data to interested parties periodically
pushing it up the network to aggregation points and subsequently to database servers, or
sending it as a response triggered by queries that request the data from sensors and smart
objects.
Collection: The sensors and smart objects within the IoT may store the data for a certain
time interval or report it to governing components. Data may be collected at
24
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
concentration points or gateways within the network where it is further filtered and
processed, and possibly fused into compact forms for efficient transmission. Wireless
communication technologies such as Zigbee, Wi-Fi and cellular are used by objects to
send data to collection points.
Aggregation/Fusion: Transmitting all the raw data out of the network in real-time is often
prohibitively expensive given the increasing data streaming rates and the limited
bandwidth. Aggregation and fusion techniques deploy summarization and merging operations
in real-time to compress the volume of data to be stored and transmitted.
Preprocessing: IoT data will come from different sources with varying formats and
structures. Data may need to be preprocessed to handle missing data, remove
redundancies and integrate data from different sources into a unified schema before
being committed to storage. This preprocessing is a known procedure in data mining
called data cleaning.
Processing/Analysis: This phase involves the ongoing retrieval and analysis operations
performed and stored and archived data in order to gain insights into historical data and
predict future trends, or to detect abnormalities in the data that may trigger further
investigation or action. Task-specific preprocessing may be needed to filter and clean data
before meaningful operations take place. When an
25
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
IoT subsystem is autonomous and does not require permanent storage of its data, but
rather keeps the processing and storage in the network, then in-network processing may
be performed in response to real-time or localized queries.
SECURITY
Due to the unconventional manufacturing of IoT devices and the vast amount of
data they handle, there's a constant threat of cyber attacks. Several high-profile incidents
where a common IoT device was used to infiltrate and attack the larger network have
drawn attention to the need for IoT security.
26
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
27
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
The more ways there are for devices to connect to each other, the more opportunities
there are for threat actors to intercept them. Hypertext Transfer Protocol and APIs are just
two of the channels that IoT devices rely on that hackers can intercept.
The following IoT security challenges continue to threaten the financial safety of both
individuals and organizations:
Remote exposure: Unlike other technologies, IoT devices have a particularly large attack
surface due to their internet-supported connectivity. While this accessibility is extremely
valuable, it also gives hackers the opportunity to interact with devices remotely.
Resource constraints: Not all IoT devices have the computing power to integrate
sophisticated firewalls or antivirus software. In fact, some devices can barely connect to
other devices.
Weak default passwords: IoT devices often come with weak passwords, and most
consumers might not be aware that they need to be replaced with more secure ones.
28
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
Lack of encryption: Most network traffic originating from IoT devices is unencrypted,
which increases the possibility of security threats and data breaches. These threats can be
avoided by ensuring all the devices are secured and encrypted.
PRIVACY& TRUST
The need for privacy is the core property ofself-actualization in IoT. There are
several applicationsworking in many different grounds like patientmonitoring system,
traffic control, energy consumptioninventory management, smart parking, civil
protection any many others. Privacy should be guaranteed to the end user.
29
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
30
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
The Internet of Things plays a vital role in the field of energy management and
regulation. The term used for that is Smart Energy System. IoT applications monitor a
wide variety of energy control function to residential and commercial use.
Residential Energy
Commercial Energy
31
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
energy issues in the same way as functional issues in a complex business network and
provides solutions.
To make the devices work more efficiently or to offer more functionality, the concept
of IoT has been introduced. The implementation of this technology has changed the life
of mankind. It is concerned with getting the devices together with the other devices so
that they can contribute to enhancing their functionality. To manage this, off course,
there exists some standard to make sure everything is happening in a controlled way, and
here we will be focusing on those standards.
32
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
some of the important standards for IoT that helps to ensure the common standards
that the IoT enabled devices are supposed to be complied with.
Bluetooth Smart : Bluetooth smart is one of the most important standards of IoT. This
standard provides the devices to work using Bluetooth connectivity. Moreover, it makes it
possible for the device and the users to communicate or share the instructions using
Bluetooth’s simple connection.
ULE : ULE stands for Ultra-low emission. The amount of power involved in this is
way too less, as stated by its name. The common telephone network we use at our
homework using this standard and the embedded devices leverages it wherever possible
in order to facilitate communication with other devices.
EEE 802.11ah : These standards are concerned with the wifi connectivity that runs on low
power. In the internet of things, the devices preferably work with low power
consumption mechanism involvement. Though Wifi doesn’t fall under the low power
consumption part, this standard is concerned with the lower power consumption of
devices. This standard has been considered as the most effective one as the availability
of wifi is very common.
Thread : Thread may be considered the best standard that provides the opportunity to
leverage IPV6 to make communication over the internet. The ownership of this standard
is held by Alpha that is the parent company of Google. It makes the interaction between
devices very convenient and smooth. Being handled by Alpha,
33
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
this standard consists of most of the parts that are concerned with the secure and efficient
working of the IoT enabled devices.
ZigBee : This is the other standard that helps to take the IoT to the next level. It has been
developed by an organization called the ZigBee industry. The main purpose of this standard
is to offer a network of devices that consume less power to function. The common devices
that are being used in houses leverage this standard in order to communicate with low power
requirements.
Z-Wave : Z-Wave is the most commonly used standard. Similar to the other standards, it
is also concerned with working devices that use less power to work well in the network.
Sigma Designs own this standard, and the changes or improvements in this standard are
taken by this organization only. The outcome of this standard is the low power mesh
technology of networking. In almost all smart devices or IoT enabled devices in the
USA, this standard is de facto.
34
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
Forensics
Additional types of logging, log storage: Can you find the needle in the
haystack?
Increased network traffic: will your firewall / IDS / IPS be compatible and
keep up?
Increased demand for IP addresses both IPv4 and IPv6
Increased network complexity – should these devices be isolated or segmented.
Strengthen partnerships with researchers, vendors, and procurement
department
35
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
UNIT – II
INTRODUCTION
36
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
SOME DEFINTIONS
Machine to machine refers to technology that allowed both wireless and wired
systems tocommunicate with other devices of the same type.
37
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
38
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
IoT Value Chains are about the use and reuse of data across value chains and
across solutions. M2M value chains are internal to one company and cover one solution.
39
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
Here are four trends tech leaders might want to consider when architecting their next
wirelessinfrastructure.
Hardware Rapid Prototyping
In the industrial world, the challenge of IoT hardware design lies in the
bewildering array ofuse case requirements. Take temperature sensors as a simple
example. Depending on criterialike accuracy, temperature range, response time and
stability, there could be hundreds ofavailable sensors to choose from. Hardware
prototyping standards like mikroBUS allow you to build a customized IoT device
prototype in a matter of a few hours and with efficient resources.
An average factory operates with legacy industrial systems that are nowhere near
beingconnected. While these systems employ a number of proprietary communication
protocols forautomation purposes, data is captive within discrete control loops, creating
numerous datasilos on the factory floor.
40
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
Software-Defined Radio
41
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
GVCs thus have a direct impact on the economy, employment and income and
create opportunities for development. They can also be an important mechanism for
developing countries to enhance productive capacity, by increasing the rate of adoption
of technology and through workforce skill development, thus building the foundations
for long-term industrial upgrading.
Countries need to carefully assess the pros and cons of GVC participation and the
costs andbenefits of proactive policies to promote GVCs or GVC-led development
strategies.Promoting GVC participation implies targeting specific GVC segments and
GVCparticipation can only form one part of a country's overall development strategy.
42
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
enabling GVC growth by providing the right framework conditions for trade and
FDI and by putting in place the needed infrastructure;
developing firm capabilities and training the local workforce.
IoT can be classified into a four or five-layered architecture which gives you a
complete overview of how it works in real life.
Network layer: This layer is largely responsible for routing data to the next layer in
thehierarchy with the help of network protocols. It uses wired and wireless technologies for
datatransmission.
Middleware layer: This layer comprises of databases that store the information passed on
bythe lower layers where it performs information processing and uses the results to
makefurther decisions.
Service and application support layer: This layer involve business process modeling
andexecution as well as IoT service monitoring and resolution.
43
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
Application layer: It consists of application user interface and deals with various
applicationssuch as home automation, electronic health monitoring, etc.
Business layer: this layer determines the future or further actions required based on the data
provided by the lower layers.
BUILDING AN ARCHITECTURE
Architecture refers to the description of the main conceptual elements, the actual
elements of a target system, how they relate to each other, and principles for the design of
the architecture. The applied architecture is then the blueprint used to develop the actual
system solution.
The architecture relies on the separation of resources providing sensing and actuation
from the actual devices, a set of contextual and real world entity- centric services, and
the users of the services.
44
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
Asset Layers
45
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
First Layer in IoT - This layer comprises basic element or objects which are used for
Monitoring and Controlling. This layer has various digital representation and Identifiers.
Exp: Building, Utility Systems, Home and People.
Resource Layer
Sensing, Actuation and Embedded Identities are main functionality ofthis layer. It
has two types Primary Resources such as Sensors, Actuatorand RFID Tags, Readers etc
and Secondary Resources such as Gateways.
Communication Layer
Apart from this new identity technologies also used in IoT like RFID,Near Field
Communication (NFC) and ultra-wide bandwidth (UWB).RFID –Radio Frequency
Identification is new technology used to identifyObject using unique
identity in M2M technology. The RFID technologyhas Tags, Readers components.
46
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
Tags are small chip, attached to provideobject’s identity which is normally assigned with
Unique ID. The RFIDreader is another component which is used to transmit a query
signal tothe tag and receives reflected signal from the tag. This signal is passed tothe
database for further processing.
Application Layer
Customers request variety of services which are provided by this layer. It is present
above the Data and Information Layer. This application layer can provide Blood
Pressure, temperature and air humidity measurements of the patient who asks for
analysization using machine learning concepts.The main aim of this layer is to provide
High Quality Services to satisfy Customer requirements and their needs. Smart home,
Smart building, Transportation, Industrial automation and Smart healthcare are numerous
application field which are covered by Application Layer.
Business Layer
Last layer is business (management) layer which is mainly useful for different types
of System activity and Services. They received data from thisapplication layer which is
used to build a business model, graphs, flowcharts, etc which is the unique Functions of
this layer. This layer is responsible for Designing, analyzing, implementing, evaluation
and Monitoring process.
47
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
While organizations such as IEEE, Internet Engineering Task Force (IETF), ITU-
T,OneM2M, 3GPP, etc., are active at international level, Telecommunication Standards
Development Society, India (TSDSI), Global ICT Standardization Forum for India
(GISFI), Bureau of Indian Standards (BIS), Korean Agency for Technology and
Standards (KATS), and so on, are active at national level and European
Telecommunications Standards Institute (ETSI) in the regional level for standardization.
UNIT – III
48
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
There is 4 layers are present that can be divided as follows: Sensing Layer, Network
Layer, Data processing Layer, and Application Layer.
Sensing Layer
The sensing layer is the first layer of the IoT architecture and is responsible for
collecting data from different sources. This layer includes sensors and actuators that are
placed in the environment to gather information about temperature, humidity, light,
sound, and other physical parameters. These devices are connected to the network layer
through wired or wireless communication protocols.
Network Layer
The network layer of an IoT architecture is responsible for providing
communication and connectivity between devices in the IoT system. It includes
protocols and technologies that enable devices to connect and communicate with each
other and with the wider internet. Examples of network technologies that are commonly
used in IoT include WiFi, Bluetooth, Zigbee, and cellular networks such
49
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
as 4G and 5G. Additionally, the network layer may include gateways and routers that act
as intermediaries between devices and the wider internet, and may also include security
features such as encryption and authentication to protect against unauthorized access.
It also includes middleware services that allow different IoT devices and systems
to communicate and share data seamlessly.The application layer also includes analytics
and processing capabilities that allow data to be analyzed and transformed into
meaningful insights. This can include machine learning algorithms, data visualization
tools, and other advanced analytics capabilities.
50
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
M2M Device:
An M2M device connects to the Network Domain either directly or through an
M2M Gateway
Direct connection:
The M2M Device is capable of performing registration, authentication,
authorization, management, and provisioning to the Network Domain.
Direct connection also means that the M2M device contains the appropriate
physical layer to be able to communicate with the Access Network
M2M Gateway:
This is the case when the M2M device does not have the appropriate physical
layer, compatible with the Access Network technology, and therefore it needs a network
domain proxy.
51
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
The M2M Gateway acts as a proxy for the Network Domain and performs the
procedures of authentication, authorization, management, and provisioning. An M2M
Device could connect through multiple M2M Gateways.
M2M Gateway:
Access Network:
The network that allows the devices in the Device and Gateway Domain to
communicate with the Core Network.
Core Network:
IP connectivity
Service and Network control.
Interconnection with other networks.
Roaming.
M2M Applications:
M2M applications (e.g. smart metering) that utilize the M2M Service Capabilities
through the open interfaces.
Network Management Functions:
functions to manage the Access and Core Network
52
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
53
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
A reference model is a model that describes the main conceptual entities and how
they are related to each other, while the reference architecture aims at describing the
main functional components of a system as well as how the system works, how the
system is deployed, what information the system processes, etc.
IoT architecture refers to the tangle of components such as sensors, actuators, cloud
services, Protocols, and layers that make up IoT networking systems. In general, it is
divided into layers that allow administrators to evaluate, monitor, and maintain the integrity
of the system. The architecture of IoT is a four-step process through which data flows from
devices connected to sensors, through a network, and then through the cloud for
processing, analysis, and storage.
54
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
REFERENCE MODEL
55
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
A reference model is a model that describes the main conceptual entities and how
they are related to each other, while the reference architecture aims at describing the
main functional components of a system as well as how the system works, how the
system is deployed, what information thesystem processes, etc.
The domain model captures the basic attributes of the main concepts and the
relationship between these concepts. A domain model also serves as a tool for human
communication between people working in the domain in question and between people
who work across different domains.
Model notation and semantics
57
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
Main concepts
The IoT is a support infrastructure for enabling objects and places in the physical
world to have a corresponding representation in the digital world.
The Devices are physical artefacts with which the physical and virtual worlds
interact. Devices as mentioned before can also be Physical Entities for certain types of
applications, such as management applications when the interesting entities of a system
are the Devices themselves and not the surrounding environment.
For the IoT Domain Model, three kinds of Device types are the most important:
Sensors:
These are simple or complex Devices that typically involve a transducer that converts
physical properties such as temperature into electrical signals.
These Devices include the necessary conversion of analog electrical signals into
digital signals, e.g. a voltage level to a 16-bit number, processing for simple
calculations, potential storage for intermediate results, and potentially
communication capabilities to transmit the digital representation of the physical
property as well receive commands.
A video camera can be another example of a complex sensor that could detect and
recognise people.
58
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
Actuators:
These are also simple or complex Devices that involve a transducer that converts
electrical signals to a change in a physical property (e.g. turn on a switch or move a
motor).
These Devices also include potential communication capabilities, storage of
intermediate commands, processing, and conversion of digital signals to analog
electrical signals.
Tags:
Tags in general identify the Physical Entity that they are attached to. In reality,
tags can be Devices or Physical Entities but not both, as the domain model shows.
An example of a Tag as a Device is a Radio Frequency Identification (RFID) tag,
while a tag as a Physical Entity is a paper-printed immutable barcode or Quick
Response (QR) code.
Either electronic Devices or a paper-printed entity tag contains a unique
identification that can be read by optical means (bar codes or QR codes) or radio
signals (RFID tags).
The reader Device operating on a tag is typically a sensor, and sometimes a sensor
and an actuator combined in the case of writable RFID tags.
59
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
60
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
Cloud: The cloud serves as the centralized storage and processing hub for the data
collected by the devices. It can be a public, private, or hybrid cloud, depending on
specific requirements.
Applications: Software applications leverage the data collected by devices to deliver
insights and value. These applications can be tailored for various purposes, including
monitoring, control, and automation.
Security: Security measures are essential to protect the data collected by devices from
unauthorized access. Techniques like encryption, authentication, and authorization
ensure data security.
Privacy: Privacy measures safeguard personal data collected by devices from
unauthorized access. Anonymization, pseudonymization, and data minimization
techniques contribute to maintaining privacy.
Governance: Governance policies ensure responsible and ethical use of the IoT system.
These policies address aspects such as data ownership, data sharing, and appropriate data
usage.
Benefits of Using IoT Reference Architecture
Common Framework
Security and Scalability
Cost Efficiency
Faster Time to Market
INTRODUCTION
61
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
FUNCTIONAL VIEW
In order to address the concerns of mainly the concrete IoT architect, and secondly
the concerns of most of the above stakeholders, the Reference Architecture is presented
as a set of architectural views
Functional View: Description of what the system does, and its main functions.
INFORMATION VIEW
Description of the data and information that the system handles.
62
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
Virtual Entity descriptions in general, which contain not only the attributes
coming from IoT Devices (e.g. ownership information).
Associations between Virtual Entities and related IoT Services.
Information flow and lifecycle
On a high level, the flow of information in an IoT system follows two main
directions.
From devices that produce information such as sensors and tags, information follows
a context-enrichment process until it reaches the consumer application or part of
the larger system, and from the application or part of a larger system information it
follows a context- reduction process until it reaches the consumer types of devices.
Devices equipped with sensors transform changes in the physical properties of the
Physical Entities of Interest into electrical signals.
These electrical signals are transformed in one or multiple values on the device
level.
These values are then enriched with metadata information such as units of
measurement, timestamp, and possibly location information .
These enriched values are offered by a software component (Resource) either on the
device or the network. The Resource exposes certain IoT Services to formalize access
to this enriched information.
63
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
At this point, the information is annotated with simple attributes such as location
and time, and often this type of metadata is sufficient for certain IoT applications or for
the use in certain larger systems.
64
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
Description of the main real world components of the system such as devices,
network routers, servers, etc.
The Deployment View defines how to transition the system to live operation.
The Operational View defines how to keep the system alive in the field.
Supporting design, development, and testing of complex systems requires the
right environment
65
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
UNIT – IV
INTRODUCTION
IoT Applications
66
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
Reliability
Robustness
Reasonable cost
Security and safety
Simple use
Optimal and adaptive set of features
Low/No maintenance
Standardization
Integration capabilities
Reach sensing and data capabilities
Industry grade support and services
Challenges faced by IoT industry applications
67
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
BROWNFIELD IOT
68
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
Application Layer : realizes the use case of a smart object by a set of functions to users to
meet defined requirements.
70
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
From the users prospect the smartness of a smart object is realized within the service
and the application layers.
Smart objects are designed as miniaturized, low powermicroelectronic systems
based on micro controllers, transceivers,sensors and energy supply.
As these microelectronic systems provide very limited resources (i.e.,processing
power, memory) reconfigurable software implementationsfor smart objects
become a challenge.
Especially when reconfiguration requires: easy programming, minimum code
size.
Reconfiguration is done by adding or changing components or bychanging the
functionality behind the interfaces.This is done by code programming of the
components and bysoftware update on the smart object.
Code Programming and data-intensive software update can beavoided by the new
approach of smart applications.Service oriented approach vs Smart applications
approach (consist ofsoftware components).
71
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
Smart applications work flow from a jigsaw puzzle to theapplication on the node
72
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
Technology
The internet and its technology are offering an established platform for
interconnecting billion things —from tiny sensors, smart phones, PCs, to high performance
computers.
73
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
Business Innovation
The spirit of internet business models is turning up in traditional product
business.
Market
Different industries meet the first time as the Internet of Things & Services crosscuts
some of today’s separate markets.
Competencies
Software and system competencies linked to deep domain knowledge and
enlightened with creativity are the core for innovation in technology and business.
74
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
The business success in one vertical domain is the key entry point,
butsuccessful architectures will reach out to other verticals later.
Only architectures that can cover multiple domains will be successfulin the
long run.
Finance flows
Regulatory oversight
Product lifecycle management data
Keeping better track of things
IOT FOR RETAILING INDUSTRY
Data collection & sharing: Devices embedded with sensors help track product and
shopping lifecycle. It would include tracking various forms of data, including
environmental & equipment, asset performance, stock levels & more. This information
can be stored, transformed & analyzed using algorithms to extract meaningful insights to
optimize operations.
Process automation: IoT-enabled connected stores and devices can be partially or fully
automated to bring efficiency, sustainability & resilience to retail operations and
processes. Further, retail automation helps increase the pace, precision &
76
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
Due to the seismic shift in demand for IoT in retail, its market size is expected to
hit $177.90 billion by 2031.
Factors include effective store space monitoring, inventory management, supply
chain management, and customer behavior monitoring. It will drive demand for
IoT in the retail market.
Optimization and automation of the supply chain is identified as the main factor
for IoT adoption
Further, connectivity technologies, including digital signage, top-of-the-shelf
displays, beacons, and price displays, will allow brands to access large volumes
of data on customer activity during in-store shopping.
Benefits of IoT in Retail
Optimized Supply Chain Management: RFID & GPS technologies allow retailers to
identify and inspect every object across warehouses, in transit and on the shelves.
Connected sensors provide a consistent stream of real-time data from the floor to the
store. It helps identify potential bottlenecks, enable contingency planning, allow
route optimization and accelerate product delivery. It also enables manufacturers,
77
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
suppliers and distribution centers to optimize shipping & handling times while ensuring
speedy delivery to vendors and consumers.
Enhanced Customer Experience: IoT capabilities and machine learning algorithms can
accurately assess consumer data to personalize shopping experiences. Bluetooth Light
Energy (BLE) beacons can help personalize shopping by sending alerts & notifications
about special discounts and seasonal offers on smartphones based on a shopper’s location
proximity.
Layout Optimization: Aisle analytics software clubbed with infrared sensors enables IoT
technology to improve the in-store layout. It helps optimize customer behavior. This data can
be used to understand buyer journeys, identify confused and impatient shoppers and
determine the reasons for abandoned carts.
Efficient Inventory Management: RFID chips, beacons and sensors can seamlessly
synchronize assets and inventory with data centers. Smart price tags and digital displays
integrated with image analytics capabilities help improve control and order stock levels
& expiration dates in the warehouse and on the front shelves.
The Use Cases of IoT in the Retail Industry
78
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
Smart Shelves
Help track items to ensure they’re never out-of-stock, and check that things aren’t
misplaced on various shelves. Fitted with weight sensors and RFID tags & readers allow
scanning of the products on both display and stock shelves. It makes your inventory process
cost-effective and more precise. Additionally, by connecting each RFID tag to a reader,
Smart Shelves can detect in-store theft — saving money on security personnel and
cameras.
Placement
Store managers can use the insights collected from sensors and video analytics to
identify premium store areas. They can test the placement of different product types in
other spots and determine the most profitable layout. Implementing a self-learning
analytics algorithm can also assist store owners and operators deliver a seamless
shopping experience.
Checkout Automation
Brick-and-mortar stores can use a variety of IoT Technologies, including motion-
activated cameras, beacons, and shelf-tracking tags, to provide a fully automated,
cashier-less in-store shopping experience. Shoppers can walk in, pick the items they
want, make the payment online, get a digital receipt on their smartphone and walk out.
80
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
Forward-thinking oil and gas organizations are tapping into “brownfield” IoT
infrastructure, making the most of existing assets, and exploring groundbreaking
business models. With IoT, companies can gather unprecedented amounts of data from
every corner of their operations – from equipment, facilities, and other assets, thus
enabling remote monitoring & control. This data would include parameters such as
temperature, pressure, flow rates, equipment performance & environmental conditions.
81
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
Remote Asset Management: Oil and gas companies constantly want insights into their
assets and equipment because profitability in the oil and gas industry is closely linked
with asset uptime. By enabling remote real-time asset management across the complex
network of fixed and moving equipment, IoT technology helps improve product yield,
energy efficiency, and unit/facility downtime.
Smarter Decision-Making: Whether you want to optimize processes, cut costs strategically,
or identify new business opportunities, IoT-generated insights enable better decision-making
with real-time insights.
Enhanced Efficiency: By leveraging advanced data analytics and machine learning, you
can uncover trends and patterns to optimize production efficiency.
Sustainability: IoT technologies are crucial in reducing the oil and gas industry’s carbon
footprint by detecting leaks, improving energy efficiency, and ensuring environmental
compliance.
82
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
Sensors: For Oil & Gas industry, tracking the live location of vehicles has always been a
challenge. Though, advancements in sensor technology enabled by IoT help play a
crucial role in gathering data such as flow rate, temperature & pressure. The said sensors
are connected to wireless networks via gateways at the site. And once connected, field
engineers can access this data via smartphones & tablets for analysis.
Pipeline Management: Industry reports estimate losses of about $10 billion due to fuel
leakage. Therefore, the need for optimized pipeline routes has become apparent. A
dedicated solution would help reduce downtime & enable scheduled maintenance.
Further, sensors monitor factors like temperature, flow & pressure while providing
valuable insights for end-to-end pipeline inspections.
System Integrated Centers: They have proved essential for integrating IoT platforms across
core business processes. They receive data from various devices and can send alerts for
immediate action after quick analysis.
83
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
Real-time analysis: It is considered crucial when dealing with complex data. Therefore,
predictive analysis enables the accurate time tracking of data while alerting the engineers
of any changes in equipment behavior. And based on the timely alerts, the engineers can
make necessary adjustments to prevent failures or disruptions.
Smart Device Utilization: Oil & Gas workers utilize IoT tools, such as tablets & smart
wearables, to access & monitor systems remotely. They offer real-time information &
facilitate data analysis across any location while improving operational efficiency.
3D Printing: The adoption of 3D printing technology for the oil and gas industry has
been slow. Yet it is still proving to be a valuable solution since reverse engineering plays
a significant role in measuring the shape and size of every tool.
Asset Management & Utilization: The loading & unloading of trucks is equally critical
for efficient asset utilization for the transportation & logistics business.
Fleet Management: Interestingly, fleet management has dramatically benefited from IoT
technology. Installing off-road sensors in vehicles helps track real-time location &
health. Intelligent fleet systems help increase efficiency & reduce traffic incidents.
84
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
85
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
Industry areas are expected to have most important benefit from IoT applications.
HOME MANAGEMENT
Energy
Garbage
Entertainment
Temperature
Grossary
Security etc
86
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
UNIT – V
For example, users will be able to interact with homeautomation systems to remotely
control the heatingor the alarm system.
INTRODUCTION
Firstly IoT is different because it will be possible and likely that objects will
autonomously manage their connections with the Internet or, this will be doneupon the
request of someone or something remotely.When someone shares a video or a
phototaken ontheir mobile phone over the Internet they“call the shots”.
The adoption of IoT essentially depends upon trust. Moreover this trust must be
established andmaintained with respect to a broad group of stakeholders otherwise IoT
will face, to some degree or other, challenges which may restrict adoption scope or delay
its timing.
Trust, privacy and governance aspects of IoT rely for the most part upon
security.Security in its broadest definitions includes health and wellbeing as well as other
forms of protection.
87
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
The activity chains are defined as work streams that grouptogether partners or
specific participants from partners around well defined technical activities that will result
into at least oneoutput or delivery that will be used in addressing the IERC objectives.
“Privacy,security and competition have been identified as the main issues related to
IOT Governance.
88
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
can have avirtual representation in the“Internet of Things”, which is called Virtual Object
(VO).
Composite virtual objects (CVOs) use the services of virtual objects. A CVO s a
cognitive mash-up of semantically interoperable VOs that renders services inaccordance
with the user/stakeholder perspectives and the application requirements.
89
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
The third level (User level cognitive framework) is responsible for interaction
with User/stakeholders.
90
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
This token uniquely identifies the granted right(s),the object on which the right(s) can
be exercised and the subject that can exercise it/them.
A capability based system reverses the traditional approach being now theuser in
charge of presenting his/her/itsauthorization token to the service provider, whilein a
traditional ACL or RBAC system it is theservice provider that has to check if the user
is,directly or indirectly, authorized to perform the requested operation on the requested
resource.
91
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
The core innovations realized byGAMBAS are the development of models and
infrastructures to support the interoperable representationand scalable processing of context,
the development of ageneric, yet resource-efficient framework to enable themultimodal
recognition of the user’s context, protocols and mechanisms to enforce the user’s privacy as
well asuser interface concepts to optimize theinteraction with behaviour-driven services.
92
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
93
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
The issue of security and privacy is therefore centralin the BUTLER project and
develops in severalrequirements, the main requirements relate to:
94
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
All this information is stored in a variety ofdifferent places, for instance it can remain
locally in the sensors or company internal databases, insocial networks, in data storage
located in privatedata centres or even in a public cloud storageservice.
To ensure this, security and privacy need to bepart of the platform by design and
may not be added later on.
SMARTIE APPROACH
SMARTIE will focus on key innovations that strengthen security, privacy and trust at
different IoT Layers as below:
Applications
Information Services
Network
Smart Objects
96
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
Data aggregation enables many IoT applications, including smart cities, industrial automation,
health care monitoring, environmental monitoring, and more. It provides the necessary data inputs for
these applications to operate efficiently and derive actionable intelligence.
The starting point of data aggregation is the collection of information from different
sensors.IoT is heterogeneous both semantically and syntactically.
SECURITY
The fact that internet-connected devices can operate with high performance in remote locations is
useful and even critical in many cases. But this also means hackers and cybercriminals are coming up
with new, sophisticated tactics to hack these devices.
Protect data from attackers by encrypting data between IoT devices, applications, and backend
systems. This includes encrypting data both in transit and at rest and using the PKI security model to
ensure that both sender and receiver are authenticated by the system prior to transmission.
97
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
Cloud security measures include secure data storage, access controls, and
encryption. Many IoT devices store data they collect in the cloud, so strong security,
encryption, and authentication are crucial to keep that data where it belongs.
98
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
4. Which of the following protocol is used to link all the devices in the IoT?
(a) Device data (b) Machine generated data (c) Sensor data
(a) Wearables (b) Smart Grid (c) Arduino (d) Smart city
(a) Optical sensor (b) Gas sensor (c) smoke sensor (d) Pressure sensor
99
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
(a) Mobile phone (b) Television (c) Smart Speaker (d) Smart Meters
(a) logical layer (b) data link layer (c) Transport layer (d) session layer
(a) Amazon Web Services (b) Microsoft Azure (c) salesforce (d) Filpkart
12. Which of the following command is used to trigger the Amazon echo IOT device?
(a) Application layer (b) Network layer (c) Data link layer (d)
(a) Sensors (b) Connectivity and data processing (c) Interface (d) Transformer
PART-B [2*5=10]
100
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
22.a) Explain about emerging industrial structure for IoT in detail. (OR)
23.a) Explain about IoT Architecture State of the Art in detail. (OR)
24.a) Write Four Aspects in your Business to Master IoT in detail. (OR)
101
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
4. Which of the following protocol is used to link all the devices in the IoT?
(a) Device data (b) Machine generated data (c) Sensor data
(a) Wearables (b) Smart Grid (c) Arduino (d) Smart city
(a) Optical sensor (b) Gas sensor (c) smoke sensor (d) Pressure sensor
(a) Mobile phone (b) Television (c) Smart Speaker (d) Smart Meters
(a) logical layer (b) data link layer (c) Transport layer (d) session layer
(a) Amazon Web Services (b) Microsoft Azure (c) salesforce (d) Filpkart
12. Which of the following command is used to trigger the Amazon echo IOT device?
102
B.SC COMPUTER SCIENCE &BCA BHARATHIYAR ARTS AND SCIENCE COLLEGE FOR WOMEN
(a) Application layer (b) Network layer (c) Data link layer (d)
(a) Sensors (b) Connectivity and data processing (c) Interface (d) Transformer
103