0% found this document useful (0 votes)
22 views

Presentation by Group8

Uploaded by

Irvin Urmeneta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views

Presentation by Group8

Uploaded by

Irvin Urmeneta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 44

INTERNET OF THINGS

(IOT)
Presentation by Group8
MEMBERS

• CENTINO
• SEÑASE
• TAPA
• OREO
WHAT IS THE INTERNET OF
THINGS (IOT)?

The Internet of Things or IoT is a computing concept in which everyday


objects are connected to the Internet. Through wireless Internet connection,
these objects can be accessed by us, the users as well as other objects and
can be used to perform different tasks.

It is important to note that IoT is not a single technology but a unified


concept that incorporates different kinds of computing technologies
In the Internet of Things, everyday objects can be parts of online systems
that provide us with different kinds of services.
For example:
CCTV cameras, locks, and sensors installed in a house can be connected to a
online security system which can be accessed by the homeowner even if he
is not at home and will automatically inform the police in case of a burglary.
HISTORY OF IOT

The term Internet of Things was coined by Kevin Ashton when he was
working for Procter & Gamble (P&G) in 1999. As a part of his work in
supply chain optimization, Ashton gave a presentation with the goal of
attracting P&G’s senior management’s attention to a new technology called
Radio-Frequency Identification or RFID. His presentation was entitled
“Internet of Things”.
IOT TECHNOLOGIES

When you first heard the term Internet of Things, one of the first questions
that entered your mind was probably “What things?”

It is important to note that the word thing has a special meaning in IoT. In the
context of IoT, a thing is any physical object that can connect to the Internet.

However, IoT does not end with giving physical objects an online presence.
On the contrary, it is just the beginning. A “smart object” needs to have a
function or a purpose.
“SMART” THINGS

In the context of the Internet of Things, the adjective “smart” means


anything that is IoT-based.
KEY IOT TECHNOLOGIES

SENSORS ACTUATORS

CONNECTIVITY CLOUD
PROTOCOLS COMPUTING
SENSORS

In order to interact with the physical world, first, a smart object needs to
gather information about its environment. For this purpose, a smart object
needs to have sensors. As the name implies, a sensor is a component that
detects a specific physical input. The following are common types of sensors
with their definitions and examples:
EXAMPLES SENSOR:

TEMPERATURE SENSOR
detects the temperature of an object or an environment.

PROXIMITY SENSOR
detects motion
EXAMPLES SENSOR:

OPTICAL SENSOR
converts light energy into digital signals

PRESSURE SENSOR
converts physical power into electronic signals
EXAMPLES SENSOR:

HUMIDITY SENSOR
measures the amount of water vapour in the atmosphere
ACCELEROMETER
measures acceleration
GYROSCOPE
uses Earth’s gravity to detect the position or orientation of an object
ACTUATORS

An actuator is a component or mechanism that turns energy into motion.


Basically, actuators comprise the “moving parts” of a smart object. For
example, actuators in a CCTV camera allows the user to point it to different
directions.
CONNECTIVITY PROTOCOLS

Connectivity protocols are sets of rules and standards that govern how
devices communicate and exchange data with each other over a network,
facilitating seamless interaction and data transfer within the Internet of
Things (IoT) and other networked environments.
EXAMPLES:

WIFI
Widely used in home automation, smart devices, and industrial IoT
deployments.

BLUETOOTH
Used in applications such as wireless audio streaming, data synchronization
between devices, and beacon technology for location-based services.
EXAMPLES:

ZIGBEE
Commonly used in home automation, smart lighting, and industrial control
systems.

Z-WAVE
Enables automatic identification and tracking of items in various applications
such as supply chain management, inventory tracking, and access control.
IMPACT OF IOT ON DAILY LIFE:

Internet of Things abundant around us. These devices are making our lives
easier and safer, and they also help us make the best use of our resources.

Here's a discussion on how IoT is transforming different factors of everyday


life:
DIFFERENT FACTORS OF
EVERYDAY LIFE:
1.Home Management
Smart homes are among the most exciting examples of IoT. Plus, they are the
ones you interact with directly. Amazon Echo and Google Nest Hub are top
examples of smart home systems. These IoT devices and systems make
home management easier and more enjoyable.
In addition, such IoT devices help you to conduct online shopping via voice
commands. These smart-systems can also protect your house from fire
incidents or burglary. The cameras and sensors help with that. Smart home
systems help with water and electricity management, too.
DIFFERENT FACTORS OF
EVERYDAY LIFE:
2.Healthcare
IoT is becoming increasingly important in the healthcare system. Wearable
IoT devices like Fitbit can monitor your vital signs 24/7. Therefore, they can
quickly identify an emergency like an asthma attack or heart failure and
immediately notify local authorities via the Internet.

So, IoT devices can save your life during emergencies. They can also help
you maintain health. For instance, wearable devices can keep track of how
many steps you walked today. It can then calculate the calories you burn and
give you a goal.
DIFFERENT FACTORS OF
EVERYDAY LIFE:
3.Retail:

Retail refers to the business of selling goods or services to consumers. In the


context of IoT, it involves using connected devices and data analytics to
improve various aspects of the shopping experience and operational
efficiency.
RFID tags and sensors help retailers monitor inventory levels, track product
movement, and prevent stock shortages, leading to better supply chain
management and cost savings.
DIFFERENT FACTORS OF
EVERYDAY LIFE:
4.Transportation
has revolutionized how our cars navigate the roads. With further
advancements in IoT technologies, traffic jams can become a thing of the
past. Moreover, IoT can also reduce the number of road accidents. Plus,
effective management can help save fuel, decrease carbon footprint, and save
time.

Google Maps and similar applications are the best examples of IoT in traffic
management. Here, your smartphones work like sensors. They exchange
information about the roads between themselves. As a result, all the vehicles
can sync with each other and reduce traffic jams.
DIFFERENT FACTORS OF
EVERYDAY LIFE:
5.Agriculture
The Internet of Things can significantly increase farming success. Farmers
can get a lot of helpful information through IoT devices. For instance, IoT
sensors can tell them about the moisture and acidity levels in the soil. It can
precisely explain agricultural lands’ chemical characteristics and nutrient
levels.

As a result, farmers can now make better-informed decisions than in the past.
Plus, data-driven insights from the IoT systems can further help with farming
commitments. These systems can also tell you the best time for sowing the
crops. Advanced devices can alarm the farmer about plant diseases
beforehand.
BENEFITS OF IOT

IoT enhances convenience by providing seamless automation and remote


control of everyday tasks, improves efficiency through real-time data
insights and optimized processes, and boosts productivity by enabling
smarter decision-making and resource utilization.
IOT SECURITY

IoT devices can pose a risk to their owners and others. An insecure IoT
device can be used to gain a foothold on an organization’s network and
enable an attacker to move laterally behind their defenses. IoT devices can
also be conscripted into botnets to perform
distributed denial-of-service (DDoS) attack, credential stuffing, and other
automated attacks. IoT security can help to secure IoT devices and reduce
the cybersecurity risks that they pose.
EXAMPLES OF CHALLENGES:

WEAK AUTHENTICATION
IoT devices are notorious for their use of weak and default passwords. Several large
botnets, such as Mirai, infected many devices simply by logging in using default and
hardcoded passwords.
DATA ENCRYPTION
IoT devices commonly collect large amounts of sensitive data, but they don’t
always protect it properly. For example, IoT devices frequently fail to
encrypt data stored on devices or traveling over the network.
EXAMPLES OF CHALLENGES:

VULNERABLE SOFTWARE
IoT device creators do not always follow development security best practices, including
the use of reputable and updated libraries. These issues are exacerbated by the fact that
IoT devices are often difficult to patch, leaving vulnerabilities exposed for exploitation.

INSECURE PROTOCOLS
IoT devices often use insecure network interfaces and protocols. For
example, some IoT devices allow connections via Telnet, which exposes
credentials and other data in plaintext on the network.
EXAMPLES OF CHALLENGES:

LACK OF STANDARDIZATION
One of the main contributors to weak IoT security is the lack of security standards and
requirements. For IoT devices, most security standards are optional recommendations, if
they exist at all.
SECURITY CHALLENGES IN IOT

The Internet of Things (IoT) envisages the world where all our electronic
devices can communicate with one another. Just as the internet connects
people, the IoT will connect our smart gadgets together. However, as with
any fledgling technology, there are teething problems that can’t be ignored as
connected devices become more integrated into businesses and our everyday
lives. The following five IoT hacks demonstrate the current vulnerabilities in
IoT.
FIVE IOT HACK

MIRAI BOTNET
Mirai malware that it used to infect connected devices. Once it successfully infected a
vulnerable IoT gadget, it automatically searched the internet for other vulnerable devices.
Whenever it found one, the malware used the default name and password to login into the
device, install itself, and repeat the process.
HACKABLE CARDIAC DEVICES
These pacemakers relayed information about the patient’s conditions to their physicians,
which made monitoring of each patient much easier. Once attackers gained access to
pacemaker’s transmitter, they were able to alter its functioning, deplete the battery, and
even administer potentially fatal shocks.
FIVE IOT HACK

OWLET WI-FI BABY HEART MONITOR


easy-to-hack baby monitors allowed them to target other smart devices on the same
network. As it turns out, one unprotected device can make your entire home vulnerable.

TRENDNET WEBCAM HACK


The TRENDnet Webcam Hack allowed unauthorized users to remotely access live video
feeds from certain models of TRENDnet's internet-connected webcams due to a software
vulnerability that bypassed authentication measures, compromising the privacy and
security of individuals and organizations using the devices.
FIVE IOT HACK

JEEP HACK
The Jeep Hack involved exploiting vulnerabilities in Fiat Chrysler's Uconnect
infotainment system, allowing attackers to remotely take control of critical vehicle
functions, including steering, brakes, and transmission, posing significant safety risks to
drivers and passengers.
CONCLUSION

The Internet of Things (IoT) encompasses interconnected devices exchanging data,


shaping various daily activities. Utilizing sensors, connectivity protocols like Wi-Fi, and
cloud computing, IoT applications extend across sectors such as healthcare,
transportation, and retail. While IoT enhances convenience, efficiency, and productivity,
security vulnerabilities, including weak authentication and encryption, pose significant
risks, exemplified by real-world breaches like the TRENDnet Webcam Hack and the Jeep
Hack.
Quiz
By: Group 8
1.What does IOT stands for?
2.Who coined IOT?
3. In the context of the
Internet of Things, the
adjective “_____” means
anything that is IoT-based.
4.Give us 1 example of KEY
IOT TECHNOLOGIES.
5. a component or
mechanism that turns
energy into motion.
6. Widely used in home
automation, smart devices,
and industrial IoT
deployments.
7. Commonly used in home
automation, smart lighting,
and industrial control systems.
8. Give 1 factors that affects
IOT in our daily life
9. involved exploiting
vulnerabilities in Fiat
Chrysler's Uconnect
infotainment system.
10. malware that it used to
infect connected devices.
1. INTERNET OF THINGS
2. Kevin Ashton
3. Smart
4. Sensors/ Actuators/ Connectivity Protocols / Cloud Computing
5. ACTUATORS
6. Wifi
7. ZIGBEE
8. Home management/ Retail/ Healthcare/ Transportation/ Agriculture
9. JEEP HACK
10. Mirai BotNet

You might also like