IoT_class_U4_U5_Postmid
IoT_class_U4_U5_Postmid
Sensor Network
Data Acquiring
• Data Generation:
• Passive Devices Data: Data generated by devices without their own power
source (e.g., RFID, ATM debit cards)
• Active Devices Data: Data generated by powered devices (e.g., active
RFID, wireless sensor nodes)
• Event Data: Generated based on specific conditions (e.g., security breach,
traffic detection)
• Device Real-time Data: Instantaneous data communication (e.g., ATM
transactions)
• Event-driven Device Data: Data generated only upon specific events (e.g.,
device status updates)
• Data Acquisition:
• Data acquisition from IoT/M2M devices
• Interaction with data acquisition systems (Applications)
• Configuration of devices for periodic data collection/data on demand
• Data management at the gateway (transcoding, security, integration,
fusion)
Data Acquiring
• Data Validation
• Ensuring correctness, consistency, and meaningfulness of acquired data
• Validation checks using software logic and rules
• Strategies for handling large-scale data (filtering, frequency control,
enrichment)
• Data Categorization for Storage:
• Three storage categories: Raw data for future processing and auditing
• Data along with processed results for quick analytics
• Streaming/real-time data requiring immediate processing
• Storage as Big Data in databases, warehouses, or Cloud
• Assembly Software for Events
• Sensors generating event data (e.g., temperature threshold, pressure
levels)
• Assigning event IDs and logic states (Logic 1 = event generated, Logic 0
= event acted upon)
• Event assembly using software logic, timestamps, and device IDs
Data Acquiring
• Data Store
• Concept of data repositories (databases, flat files, spreadsheets,
servers)
• Distributed data storage (e.g., Apache Cassandra)
• Structured (relational databases) vs unstructured data storage
• Data Centre Management
• Facilities for secure data storage and protection
• Infrastructure components (servers, high-speed networks, security
systems)
• Role of data centre managers in IT operations, security, and quality
control
• Server Management
• Managing server services, setup, and maintenance
• Key responsibilities: Fast response to system/network failures
• Security, updates, and monitoring
• Confidentiality and integrity of data
• Protection against cyber threats (spam, malware, unauthorized access)
Data Acquiring
• Spatial Storage
• Storage of location-based data for tracking and inventory control
• Spatial data refers to the data which represents object defined in
geometric space
• Spatial databases optimized for geometric data (points, lines, polygons,
3D objects)
• Application areas: RFID tracking, traffic monitoring, digital maps
Summary for Data Acquiring
1. Data Generation
2. Data Acquisition
3. Data Validation
4. Data Categorization for storage
5. Assembly Software for events
6. Data Store
7. Data Center Management
8. Server management
9. Spatial Storage
Data Organizing
• Database
• Query Processing
• SQL
• NOSQL
• ETL
• RTSS
• RT&I
Data Processing
Architecture reference model for the business intelligence and business processes at
Automotive Components and Predictive Automotive Maintenance System
Data Processing
• Distributed Business Process
• Why Distribution?
• Reduces complexity, communication costs
• Analytics architecture
consists of the
following layers:
• Data sources layer
• Data storage and
processing layer
• Data access and query
processing layer
• Data services,
reporting and
advanced analytics
layer
Cloud Computing
Disadvantages of Iaas:
• Security
Security is one of the biggest issues in IaaS. Most of the IaaS
providers are not able to provide 100% security.
• Maintenance & Upgrade
Although IaaS service providers maintain the software, but they
do not upgrade the software for some organizations.
• Interoperability issues
It is difficult to migrate VM from one IaaS provider to the other,
so the customers might face problem related to vendor lock-in.
Hosted Development Operating Servers and Networking Data center
applications tools, systems storage firewalls/ physical plant/
/ database security building
apps management,
business
analytics
Platform as a Service (PaaS)
• Vendor lock-in
• Data Privacy
• Integration with the rest of the systems
applications
Software-as-a-Service (SaaS)
• It is a Three-layered architecture
• Application
• Network
• Physical cum Data-link
Architecture for Connecting Nodes
• Two architectures for connecting WSN nodes
• Fixed connection: Connecting infrastructure of WSN nodes,
coordinators, relays, gateways and routers
• Adhoc network of WSNs, access points, routers, gateways and
multi-point relays
Architecture for Networking of the
Nodes
• Two basic architectures for networking of the nodes:
• Layered architecture (MINA)
• Multi-cluster architecture.
Architecture for Networking of the
Nodes
• Two basic architectures for networking of the nodes:
• Layered architecture
• Multi-cluster architecture.
Sensor Data Communication Protocol
∙ What it means: The web dashboard or portal used to configure or access IoT
devices is poorly secured.
∙ Example: A smart thermostat's web control panel has no HTTPS or login limit.
∙ What it means: The services running on IoT devices (like Telnet, FTP) are
exposed and vulnerable.
Example: An open Telnet port on an IoT bulb allows attackers to access the
system.
∙ What it means: Devices collect, store, or share personal information without proper control or
consent.
∙ Example: A fitness band shares location data with third parties without user knowledge.
∙ What it means: The APIs or cloud dashboards managing the IoT system are not properly secured.
∙ Example: An attacker uses weak API keys to control a smart irrigation system.
∙ What it means: Mobile apps used to control IoT devices are vulnerable.
∙ What it means: The user cannot configure essential security options (e.g., disable unused
ports, change passwords).
Example: A smart plug cannot disable remote access even if the user wants to.
9. Insecure Software or Firmware
∙ What it means: Devices run outdated or vulnerable firmware/software, often with no secure
update mechanism.
∙ Example: A security camera doesn’t check update authenticity and accepts rogue firmware.
∙ What it means: Physical ports or access to the device hardware is not protected.
∙ Example: USB port on an industrial IoT controller is left accessible, allowing malware injection.
Security in IoT
• IoT reference architecture is a set of three architectural
views—functional, information, and deployment and operational.
• Security is one of the functional groups (FG) of the functional view.
• FG for security consists of security functions between the application
and device.
• Security FG contains five sets of functions which are required for
ensuring security and privacy.
1. Identity management (IdM)
2. Authentications
3. Authorisation
4. Key exchange and management
5. Trust and reputation
Security Functional Group
3. Authorization
• Defines what authenticated users/devices are allowed to do.
• Controls access to features, services, or data.
• Prevents misuse or overreach by legitimate users.
• Example: A sensor can send data but cannot control an HVAC
system.
4. Key Exchange and Management
• Handles the secure generation, distribution, and renewal of
cryptographic keys.
• Enables encrypted communication between IoT devices.
• Ensures confidentiality and integrity of transmitted data.
• Example: Smart meter and utility server exchange encryption
keys.
Security Functional Group
Mitigation Techniques:
• Use port scanning tools internally to identify and close vulnerable ports
•SecProf_0: No Security
•Usage: 6LowPAN/CoAP
•Security Model: No temper-resistant provisions.
•SecProf_1: Home Usage
•Usage: Operations between things without central
device.
•Security Model:
•No temper-resistant
•Sharing keys between layers.
Advanced Security Profiles