Unit 1highlated IOT
Unit 1highlated IOT
IOT - What is the IoT and why is it important? Elements of an IoT ecosystem, Technology drivers,
Business drivers, Trends and implications, Overview of Governance, Privacy and Security Issues.
What is IoT ?
The Internet of Things (IoT) describes the network of physical objects—“things”—that are
embedded with sensors, software, and other technologies for the purpose of connecting and
exchanging data with other devices and systems over the internet. These devices range from
ordinary household objects to sophisticated industrial tools. With more than 7 billion connected
IoT devices today, experts are expecting this number to grow to 10 billion by 2020 and 22 billion
by 2025. Oracle has a network of device partners.
By means of low-cost computing, the cloud, big data, analytics, and mobile technologies, physical
things can share and collect data with minimal human intervention. In this hyperconnected world,
digital systems can record, monitor, and adjust each interaction between connected things. The
physical world meets the digital world—and they cooperate.
• Access to low-cost, low-power sensor technology. Affordable and reliable sensors are
making IoT technology possible for more manufacturers.
• Connectivity. A host of network protocols for the internet has made it easy to connect
sensors to the cloud and to other “things” for efficient data transfer.
• Cloud computing platforms. The increase in the availability of cloud platforms enables
both businesses and consumers to access the infrastructure they need to scale up without
having to manage it all.
• Machine learning and analytics. With advances in machine learning and analytics, along
with access to varied and vast amounts of data stored in the cloud, businesses can gather
insights faster and more easily. The emergence of these allied technologies continues to
push the boundaries of IoT and the data produced by IoT also feeds these technologies.
• Conversational artificial intelligence (AI). Advances in neural networks have brought
natural-language processing (NLP) to IoT devices (such as digital personal assistants
Alexa, Cortana, and Siri) and made them appealing, affordable, and viable for home use.
What is industrial IoT?
Industrial IoT (IIoT) refers to the application of IoT technology in industrial settings, especially
with respect to instrumentation and control of sensors and devices that engage cloud technologies.
Refer to thisTitan use case PDF for a good example of IIoT. Recently, industries have used
machine-to-machine communication (M2M) to achieve wireless automation and control. But with
the emergence of cloud and allied technologies (such as analytics and machine learning), industries
can achieve a new automation layer and with it create new revenue and business models. IIoT is
sometimes called the fourth wave of the industrial revolution, or Industry 4.0. The following are
some common uses for IIoT:
• Smart manufacturing
• Connected assets and preventive and predictive maintenance
• Smart power grids
• Smart cities
• Connected logistics
• Smart digital supply chains
With cloud-based IoT applications, business users can quickly enhance existing processes for
supply chains, customer service, human resources, and financial services. There’s no need to
recreate entire business processes.
1. IoT Devices
IoT devices are actually the layer of sensors, actuators and smart objects that collect data about the
environment and measure physical parameters.
• So, as we have already mentioned, the basic elements of the Internet of Things ecosystem
are sensors and actuators (or simply “things”).
• Sensors are the perception of the IoT system, whose main function is to extract information
from the environment and convert it into data.
In the internet of things ecosystem, it is rare to find only one type of sensor or actuator. Because
there are many types of sensors, each type has its subcategories.
So, we want to mention two of the most common and two of the most important sensors for
improving the ecological state of the earth:
• Temperature sensors: They are one of the most common and popular. A wide range of
industries can use these sensors to measure the temperature of industrial machinery to
monitor its condition, to monitor the temperature of a patient continuously, or to monitor
the condition of a farmer’s soil.
• Subcategories: Thermocouples, RTDs, Infrared Sensors, etc.
• Proximity sensors: They are a popular IoT device because they save light in thousands of
homes with these sensors when no one is around.
• Subcategories: Inductive sensors, Photoelectric sensors, Ultrasonic sensors.
• Water quality sensors – They are particularly important due to ocean pollution. Because
these sensors can help monitor water conditions and detect sources of pollution in real time!
• Sub-categories: residual chlorine sensor, turbidity sensor, pH sensor.
• Chemical sensors – these monitor chemical changes in the air, which is extremely
important in large cities where air pollution problems continue to worsen. These sensors
are also useful in industrial environmental monitoring, hazardous chemical detection and
radioactive detection.
• Subcategories: Chemical Field Effect Transistor, Hydrogen Sulfide Sensor,
Potentiometric Sensor.
2. Security
It is the part that includes all the other parts, provides security for data transfer and prevents
unauthorised connections outside the Internet of Things ecosystem.
In recent years, we also see that the number of IoT-based DDoS attacks has skyrocketed.
Therefore, every IoT system needs a strong level of security that at least protects against the most
common vulnerabilities.
• Access control to the IoT network: Anyone who connects to the network has access to
all its devices, making broken authentication problems particularly acute. Moreover, IoT
devices can also trust the local network so that no further authentication is required.
• Prevention of data loss during data transfer over the network: The data must be
encrypted through the IoT system using protocols such as AES, DES, DSA and others.
• Look for malicious software: Software bugs can sometimes trick attackers into executing
their code on the IoT device. Hence the software versions need to be corrected when a
vulnerability is found.
The Internet of Things ecosystem is also safeguarded by a number of firmware and security
providers, including Azure Sphere, LynxOS, Mocana, Spartan, Forescout, Symantec, etc.
But unfortunately, most Internet of Things vendors and IoT device manufacturers also need to pay
more attention to basic security guidelines.
They are:
• The device boot process should be protected from running inappropriate pieces of code.
• Cryptographic keys must be used to execute all commands on devices. This is especially
important when managing IoT updates.
• All commands and control information must pass through a gateway to avoid direct access
to the device outside the network.
• All IoT devices must install security patches whenever a new security flaw is detected.
3. Network
The network is the logistical heart of the Internet of Things ecosystem. The network is also known
as the connectivity layer. It is responsible for all communications within the IoT system:
connecting smart objects, transferring data and commands between IoT stages, and connecting to
the cloud.
• The first mode of communication: Occurs locally in a local area network (LAN) between
IoT devices and smart gateways via short-range wireless communication protocols. This
communication mode is optional because the sensors can connect directly to the cloud via
the Internet using the TCP / IP protocol.
However, connecting via non-IP protocols consumes less power because the devices connect to
local smart gateways instead of trying to access the main server in the cloud.
So, the most popular short-distance protocols for IoT architecture are:
1. Wireless internet access (WiFi)
2. Bluetooth and Bluetooth Low Energy (or Bluetooth LE for less powerful devices that
generate less data)
3. ZigBee – a universal solution that connects all smart devices
4. Near Field Communication (NFC)
5. Radio Frequency Identification (RFID)
6. Sigfox
7. LoRaWAN
If the system needs to cover long distances in the range of miles, it can use Low Power Wide Area
Network (or LPWAN) designed for long-distance wireless data transfer.
• The second mode of communication: Occurs when the data of things are transferred to
the cloud in cases where there is no smart gateway or in cases of communication between
the smart gateways and the cloud. The network layer establishes a connection between the
local network and the Internet. The basic protocol here is the IPv6 protocol.
4. Gateways
IoT Gateway is a physical or virtual platform that mediates between IoT devices and the cloud.
• Control the flow of data in the Internet of Things ecosystem. The data flow goes through
the gateway from the devices to the cloud and in the opposite direction.
• Ensure the security of the transmission of information in both directions. Also, transmit
commands from the cloud to IoT devices.
• Preprocess data before sending it to the cloud. Gateways filter, aggregate, synthesise, and
aggregate traffic from different devices.
• Save energy from IoT devices as communication over the internet is energy-intensive,
unlike low-energy technologies such as Bluetooth Low Energy ( it is a wireless personal
area network technology designed and marketed by the Bluetooth Special Interest Group
aimed at novel applications in the healthcare, fitness, beacons, security, and home
entertainment industries).
• Reduce response latency to IoT devices. Some devices require a real-time response from
the system.
5. The Cloud
The cloud is a computing resource responsible for storing, analysing, and managing data. In other
words, it is a group of computers that people access over the Internet to use their computing power
for a particular purpose.
The cloud is where a large pile of raw sensor data is converted into neat little piles of valuable
information. The cloud can be powered by analytics software, visualisation tools, AI, and machine
learning for in-depth data analysis and processing. And the most popular cloud computing
providers are Microsoft Azure and AWS IoT.
Surprisingly one of the main advantages of the cloud solution is that it is easily scalable. It is an
essential requirement for building an effective IoT system.
6. Application
When software development companies build software products for the IoT ecosystem, they will
cover all seven components. And will create a system that covers all the requirements at every
level.
But even still, the IoT application is just the tip of the iceberg in IoT software development. Also,
an application is where users can interact with the Internet of Things ecosystem. This interaction
is only made possible by the graphical user interface, where the users can consult analyses reports,
control the system and manage devices.
• Bank transactions
• Data generated by IoT systems for location and tracking of vehicles
• E-commerce and in Big-Basket
• Health and fitness data generated by IoT system such as a fitness bands
4. Communications Protocols :
They are the backbone of IoT systems and enable network connectivity and linking to
applications. Communication protocols allow devices to exchange data over the network.
Multiple protocols often describe different aspects of a single communication. A group of
protocols designed to work together is known as a protocol suite; when implemented in
software they are a protocol stack.
They are used in
• Digital camera
• DVD player, music player
• Industrial robots
• Wireless Routers etc.
Business drivers are the key inputs and activities that drive the operational and financial results of
a business. Common examples of business drivers are salespeople, number of stores, website
traffic, number and price of products sold, units of production, etc.
Nevertheless, since there are no legal frameworks for IoT governance, even if the differences
between the IoT and the Internet have been overestimated at the beginning, an analysis of the
major IoT governance issues (legitimacy, transparency, accountability, anti-competitive
behaviour) seems to be worthwhile to design and develop.
In the IoT context, it is difficult to separate the concepts of Governance, Security and Privacy,
because addressing privacy and security aspects to achieve trust in IoT would probably need
governance mechanisms as well. As mention before, at the higher level of the interaction of IoT
with users, ethical aspects cannot be disjointed from the governance, security and privacy
aspects as well.
In addition to that the proliferation of wireless devices with ubiquitous presence is expected to
worsen the issue of privacy due to the current design of the link-layer and lower layer protocols,
which usually expose information like implicit names and identifiers that can reveal users
identity. To eliminate these issues, these layers should be redesigned in order to minimize the
collection of such data, conceal important information from the un-trusted parties and, to
reveal proper information to the authorized or trusted parties. The management of
heterogeneous devices, applications and protocols can be also addressed using the principles
of service-oriented computing, which going to achieve a significant flexibility in different levels
of the IoT architecture