IOT Assignment FinalKhushi (1)
IOT Assignment FinalKhushi (1)
B. Tech: IV Year
Semester VII
Remark
Sr. No. Question
Compare and contrast the logical design and physical design of IoTsystems.
4
The architecture of IoT is divided into 4 different layers i.e. Sensing Layer, Network
Layer,Data processing Layer, and Application Layer.
Sensing Layer: The sensing layer is the first layer of the Internet of Things
architecture and is responsible for collecting data from different sources. This layer
includes sensors and actuators that are placed in the environment to gather
information about temperature, humidity, light, sound, and other physical
parameters.Wired or wireless communication protocols connect these devices to the
network layer.
Network Layer: The network layer of an IoT architecture is responsible for
providing communication and connectivity between devices in the IoT system. It
includes protocols and technologies that enable devices to connect and communicate
with each other and with the wider internet. Examples of network technologies that
are commonly used in IoT include WiFi, Bluetooth, Zigbee, and cellular networks
such as 4G and 5G technology. Additionally, the network layer may include
gateways and routers that actas intermediaries between devices and the wider
internet, and may also include security features such as encryption and
authentication to protect against unauthorized access.
Data processing Layer: The data processing layer of IoT architecture refers to the
software and hardware components that are responsible for collecting, analyzing,
and interpreting data from IoT devices. This layer is responsible for receiving raw
data from the devices, processing it, and making it available for further analysis or
action.The dataprocessing layer includes a variety of technologies and tools, such as
data management systems, analytics platforms, and machine learning algorithms.
These tools are used to extract meaningful insights from the data and make decisions
based on that data.Example of a technology used in the data processing layer is a
data lake, which is a centralized repository for storing raw data from IoT devices.
Application Layer: The application layer of IoT architecture is the topmost layer
that interacts directly with the end-user. It is responsible for providing user-friendly
interfaces and functionalities that enable users to access and control IoT devices.This
layer includes various software
and applications such as mobile
apps, web portals, and other user
interfaces that are designed to
interact with the underlying IoT
infrastructure. It also includes
middleware services that allow
different IoT devices and systems
to communicate and share data
seamlessly. The application layer
also includes analytics and
processing capabilities that allow data to be analyzed and transformed into
meaningful insights. This can include machine learning algorithms, data
visualization tools, and other advanced analytics capabilities.
o The data from the network layer is sent to edge devices, which may filter,
aggregate, or perform local computations before sending data to higher layers.
3. Edge Layer to Application Layer:
o Insights from the application layer, such as energy consumption data or health
statistics, are analysed in the business layer to optimize processes, improve
decision-making, or drive business strategies.
Question 2: Explain the architectural view of IoT, including the main components and
their roles.
The IoT system is defined in different levels called as tiers. A model enables the
conceptualisation of the framework. A reference model can be used to depict the building
blocks, successive interactions and integration.
The "Things" in IoT usually refers to IoT devices which have unique identities and can
performremote sensing, actuating and monitoring capabilities. IoT devices can:
Exchange data with other connected devices and applications (directly or indirectly), or
Collect data from other devices and process the data locally or
Send the data to centralized servers or cloud-based application back-ends for processing
thedata,
Perform some tasks locally and other tasks within the IoT infrastructure, based on
temporaland space constraints
Wearable Electronics
Agriculture:
Cities:
Smart Parking: make the search for parking space easier and convenient for drivers.
Smart parking are powered by IoT systems that detect the no. of empty parking slots
and send information over internet to smart application backends.
Smart Lighting: for roads, parks and buildings can help in saving energy.
Smart Roads: Equipped with sensors can provide information on driving condition,
travel time estimating and alert in case of poor driving conditions, traffic condition and
accidents.
Surveillance: The video feeds from surveillance cameras can be aggregated in cloud
based scalable storage solution.
Emergency Response: IoT systems for fire detection, gas and water leakage detection
can help in generating alerts and minimizing their effects on the critical infrastructures.
Logistics:
Route generation & scheduling: IoT based system backed by cloud can provide first
response to the route generation queries and can be scaled up to serve a large
transportation network.
Fleet Tracking: Use GPS to track locations of vehicles in real-time.
Shipment Monitoring: IoT based shipment monitoring systems use sensors such as
temp, humidity, to monitor the conditions and send data to cloud, where it can be
analyzed to detect foods poilage.
Remote Vehicle Diagnostics: Systems use on-board IoT devices for collecting data on
Vehicle operations (speed, RPMetc.,) and status of various vehicle subsystems.
NFC is one of the key technologies used in the Internet of Things (IoT) because it
allowsfor quick, simple, and secure interactions between devices without needing to pair
or establish complex connections. Its use cases range from mobile payments to access
controland data sharing in IoT networks.
Working of NFC
NFC works based on the principles of RFID (Radio Frequency Identification), but
with the key difference that it operates over much shorter distances. It involves the
interaction between two devices: a reader (or initiator) and a target (or responder).
Here's how it works:
6. Power Consumption:
o NFC is designed to operate with low power consumption, which makes it
highly suitable for battery-powered devices in IoT systems.
Question 7: Explain CoAP and AMQP protocol.
Use Cases:
Smart Homes: CoAP is used in applications where low-power, resource-
constraineddevices like sensors and actuators are involved.
Smart Cities: It is used in infrastructure management, including lighting, air quality
sensors, and traffic management systems.
Wearables: Low-power, battery-operated IoT devices benefit from CoAP's efficiency.
Overview:
AMQP is a message-oriented middleware protocol that facilitates
communicationbetween applications using a message queue system.
It is more suitable for enterprise-level IoT applications and message brokering
acrosslarger networks.
AMQP operates over TCP and is used for reliable messaging in systems where
complex, high-throughput message exchange is required.
Use Cases:
Enterprise IoT Systems: AMQP is often used in industrial IoT systems where data
from sensors and devices need to be processed by multiple consumers in real-time.
Smart Grids: AMQP can be used in smart grids to transmit large amounts of data
between meters, grid management systems, and cloud platforms.
Messaging in Complex Applications: It is useful in IoT systems where devices
need to send and receive high volumes of data reliably and securely (e.g., industrial
control systems, healthcare).
Question 8: Explain different types of attacks and vulnerabilities in IoT.
Vulnerabilities in IoT:
1. Weak Authentication and Authorization:
o Many IoT devices have weak authentication mechanisms, such as default
passwords or unencrypted credentials. This makes them vulnerable to
unauthorized access.
o Insecure access control mechanisms can allow attackers to gain elevated
privileges, compromising the security of the entire system.
2. Unsecured Communication Protocols:
o Many IoT devices use communication protocols that are not encrypted,
making data vulnerable to interception (eavesdropping) or tampering (Man-
in-the- Middle).
o Popular insecure protocols include HTTP, Telnet, and FTP. Secure
alternatives like HTTPS, TLS, and VPNs should be used to protect
communication.
3. Lack of Regular Updates and Patches:
o IoT devices often lack a mechanism for automatically updating their firmware
or software. This means that known vulnerabilities may go unpatched, leaving
devices susceptible to attacks.
o Many IoT manufacturers do not provide adequate support for long-term device
security, leading to obsolete and vulnerable systems.
4. Limited Computational Resources:
o IoT devices often have limited processing power, memory, and storage, which
can make it difficult to implement strong security features like encryption or
intrusion detection.
o The lack of resources can lead to simplified security mechanisms that are
easier for attackers to bypass.
5. Insecure Web Interfaces:
o Many IoT devices have web-based user interfaces that allow users to
configure and control the devices. These interfaces are often insecure,
exposing the device to vulnerabilities such as cross-site scripting (XSS), SQL
injection, and other web-based attacks.
o Weaknesses in web interfaces can allow attackers to bypass authentication and
gain control over the device.
6. Insecure Cloud Services:
o Many IoT systems rely on cloud platforms to store and process data. If the
cloud service is insecure or improperly configured, attackers could gain
access to sensitive information.
o Issues like poor API security, inadequate encryption of stored data, and
insecure cloud communication can make IoT systems vulnerable.
1. Inadequate Device Management:
o IoT devices often lack proper management and monitoring tools, which
makes it difficult to detect vulnerabilities or unauthorized access in real-time.
o Remote management of devices can be exploited if not properly secured,
allowing attackers to change settings, upload malicious software, or disable
security features.
2. Unnecessary Services and Open Ports:
o IoT devices may run unnecessary services or open ports that expose them to
potential attacks. For example, services like Telnet, SSH, or FTP may be
open on IoT devices and not adequately protected, giving attackers an entry
point.
o Disabling unused services and ports is essential to minimize the attack surface.
3. Lack of End-to-End Encryption:
o In many IoT systems, data is transmitted between devices, gateways, and
cloud services without adequate end-to-end encryption. This allows
attackers to intercept sensitive information during transit.
o Ensuring that data is encrypted both at rest and in transit can mitigate these
risks.
Question 9: Explain different types of sensor classes.
M2M Communication
M2M technology could be present in our homes, offices, shopping malls and other
places. Controlling electrical appliances like bulbs and fans using RF or Bluetooth from
your smartphone is a simple example of M2M applications at home. Here, the electrical
appliance and your smartphone are the two machines interacting with each other.
The Internet of Things (IoT) is the network of physical devices embedded with sensors,
software and electronics, enabling these devices to communicate with each other and
exchange data over a computer network. The things in the IoT refer to hardware devices
uniquely identifiable through a network platform within the Internet infrastructure.
Question 11: Discuss the role of Software Defined Networking (SDN) and Network
FunctionVirtualization (NFV) in IoT networks.
Question 13 : Describe the IoT Cloud-based services and their importance in the
functioning ofIoT systems.
Cloud-based services play a crucial role in the functioning of Internet of Things (IoT)
systems by providing scalable, reliable, and flexible infrastructure for storing, processing,
andanalyzing the vast amounts of data generated by IoT devices. These services enable
IoT systems to leverage cloud computing's power to manage complex tasks, handle high
volumes of data, and deliver real-time insights and actions.
Here’s an overview of IoT Cloud-based services and their importance:
Key IoT Cloud-Based Services:
1. Data Storage Services:
o Cloud storage is essential for storing the large amounts of data generated by
IoT devices, such as sensor readings, images, logs, and videos. These services
provide scalable storage solutions that can grow as the data increases, offering
a secure and centralized location for IoT data.
o Popular cloud storage services include:
Amazon S3 (Simple Storage Service): Used for storing large amounts
of unstructured data such as images and sensor readings.
Google Cloud Storage: A unified storage platform for IoT data with
strong data protection features.
Azure Blob Storage: Microsoft’s scalable object storage for big data
and IoT data storage needs.
2. Data Processing and Analytics Services:
o IoT data is often voluminous and needs to be processed before it can provide
value. Cloud platforms offer services to process and analyze data from IoT
devices to derive actionable insights.
o Edge processing allows initial processing of data at the device or gateway
level, but cloud-based services provide deeper analytics and more complex
processing.
o Common services include:
Amazon Kinesis: For real-time data streaming and processing, useful
for IoT data that needs immediate analysis.
Google BigQuery: A scalable data warehouse for analyzing large
datasets.
Azure Stream Analytics: A real-time analytics service for processing
large-scale IoT data streams.
Question 15: Discuss how Web Sockets are used for real-time communication in
IoTapplications.
Benefits in IoT:
Question 20: Explain Sensor Data Communication Protocols like Zigbee, LoRa, and
Bluetooth