0% found this document useful (0 votes)
31 views

UNIT 1 IOT

The document provides an overview of the Internet of Things (IoT), detailing its definition, characteristics, applications, and enabling technologies. It covers the technical building blocks of IoT, including device communication technologies, physical design, and various protocols used in IoT systems. Additionally, it discusses the challenges and issues related to IoT, such as security, privacy, and management of IoT devices.

Uploaded by

moorthyind
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views

UNIT 1 IOT

The document provides an overview of the Internet of Things (IoT), detailing its definition, characteristics, applications, and enabling technologies. It covers the technical building blocks of IoT, including device communication technologies, physical design, and various protocols used in IoT systems. Additionally, it discusses the challenges and issues related to IoT, such as security, privacy, and management of IoT devices.

Uploaded by

moorthyind
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 42

UNIT I

INTRODUCTION OF IoT
Definition and characteristics of IoT, Technical Building blocks of IoT,
Device, Communication Technologies, Physical design of IoT, IoT
enabling technologies, IoT Issues and Challenges- Planning, Costs and
Quality , Security and Privacy, Risks.
Introduction
 Internet of things (IoT) comprises things that have unique identities and
are connected to the internet.

 The focus on IoT is in the configuration, control and networking via the
internet of devices or “things” that are traditionally not associated with
internet.

 The scope of IoT is mot limited to just connecting things to the internet,
IoT allows these things to communicate and exchange data while executing
meaningful application towards a common user or machine goal.
IoT Applications
 Home - Smart lighting
 Cities - Smart Parking
 Environment - Weather monitoring
 Energy - Smart grids
 Retail - Smart payment
 Logistics – Remote vehicle diagnostics
 Agriculture – Smart Irrigation, Green house model
 Industry – Indoor Air Quality monitoring
 Health & Lifestyle – Wearable electronics
Definition of IoT

 A dynamic global network infrastructure with self-configuring


capabilities based on standard and interoperable communication
protocols where physical and virtual "things" have identities,
physical attributes, and virtual personalities and use intelligent
interfaces, and are seamlessly integrated into the information
network, often communicate data associated with users and their
environments.

Book website: Bahga & Madisetti, ©


Definition of IoT

 The Internet of things (IoT) describes physical objects (or groups of


such objects) with sensors processing ability, software and other
technologies that connect and exchange data with other devices and
systems over the Internet or other communications networks.
Characteristics of IoT

 Dynamic & Self-Adapting - IoT devices and systems have the capability
to dynamically adapt with changing contexts and take actions based on
their operating conditions.
 Self-Configuring – IoT devices have self configuring capability such as set
up the networking, fetch latest software upgrades with minimal user
intervention.
 Interoperable Communication Protocols – It support a number of
interoperable communication protocols and can communicate with other
devices, infrastructure.

Book website: Bahga & Madisetti, ©


Characteristics of IoT

 Unique Identity – Each IoT device has a unique identity and a unique
identifier (IP address or a URI). IoT device interfaces allow users to
query the devices, monitor their status and control them remotely.
 Integrated into Information Network – IoT devices are integrated
into information network which allows them to communicate and
exchange data with other device and systems. It can be dynamically
discovered in the network by other devices and /or the network.
Physical Design of IoT

• The "Things" in IoT usually refers to IoT devices which have unique
identities and can perform remote sensing, actuating and monitoring
capabilities.
• IoT devices can:
• Exchange data with other connected devices and applications (directly or
indirectly), or
• Collect data from other devices and process the data locally or
• Send the data to centralized servers or cloud-based application back-ends for
processing the data, or
• Perform some tasks locally and other tasks within the IoT infrastructure,
based on temporal and space constraints

Book website: Bahga & Madisetti, ©


Generic block diagram of an IoT Device

• An IoT device may consist of


several interfaces for
connections to other devices,
both wired and wireless.
• I/O interfaces for sensors
• Interfaces for Internet
connectivity
• Memory and storage
interfaces
• Audio/video
interfaces.

Book website: Bahga & Madisetti, ©


 Connectivity – IoT devices are connected with internet either USB or
RJ 45 connectors, The connections are either wired or wireless.
 Memory Interfaces – DDR – Double data rate.
 Audio/Video Interfaces – HDMI - High-Definition Multimedia
Interface, a standard for simultaneously transmitting digital video
and audio from a source.
 3.5 mm audio – Diameter with 3.5, provides audio function.
 RCA video - A Radio Corporation of America (RCA) connector is a
type of electrical connector that is used to carry audio/video (A/V)
signals.
Storage interfaces :
 SD - A Secure Digital (SD) card is a tiny flash memory card designed
for high-capacity memory and various portable devices.
 MMC – It is used as storage media for a portable device, in a form
that can easily be removed for access by a PC.
 SDIO - It is an interface designed as an extension for the existing SD
card standard, to allow connecting different peripherals to the host
with the standard SD controller.
I/O Interfaces
 UART - UART stands for universal asynchronous receiver / transmitter and
defines a protocol, or set of rules, for exchanging serial data between two
devices. UART is very simple and only uses two wires between transmitter and
receiver to transmit and receive in both directions.
 Serial peripheral interface (SPI) is an interface that enables the serial (one bit at
a time) exchange of data between two devices, one called a master and the
other called a slave . An SPI operates in full duplex mode.
 I2C stands for the inter-integrated controller. This is a serial communication
protocol that can connect low-speed devices.
 CAN – Controller area Network - A rugged, digital serial bus designed for
industrial environments.
IoT Devices
 Home appliances
 Smart phones and computers
 Wearable electronics
 Automobiles
 Energy systems
 Retail payment systems
 Printers
 Industrial machines
 Healthcare systems
 Surveillance cameras
IoT Protocols
• Link Layer
• 802.3 – Ethernet
• 802.11 – WiFi
• 802.16 – WiMax
• 802.15.4 – LR-WPAN
• 2G/3G/4G
• Network/Internet Layer
• IPv4
• IPv6
• 6LoWPAN
• Transport Layer
• TCP
• UDP
• Application Layer
• HTTP
• CoAP
• WebSocket
• MQTT
• XMPP
• DDS
• AMQP
Book website: Bahga & Madisetti, ©
LINK LAYER
 Link layer protocols determine how the data is physically sent over the network's
physical layer or medium (e.g.. copper wire, coaxial cable, or a radio wave).
 802.3- Ethernet: IEEE 802.3 is a collection of wired Ethernet standards for the
link layer.
 802.11- WiFi : IEEE 802.11 is a collection of wireless local area network (WLAN)
communication standards, including extensive description of the link layer.
 802.16 WiMax: IEEE 802 16 is a collection of wireless broadband standards,
including extensive descriptions for the link layer (also called WiMax). WiMax
standards provide data rates from 1.5 Mb/s to 1 Gb/s.
 802.15.4 LR-WPAN : IEEE 802.15.4 is a collection of standards for low-rate
wireless personal area networks (LR-WPANs). These standards form the basis of
specifications for high level communication protocols such as ZigBee.
NETWORK / INTERNET LAYER

 The network layers are responsible for sending of IP datagrams from the source
network to the destination network. This layer performs the host addressing and
packet routing.
 IPv4: Internet Protocol version 4 (IPv4) is the most deployed Internet protocol
that is used to identify the devices on a network using a hierarchical addressing
scheme, IPV4 uses a 32-bit address scheme.
 IPv6: Internet Protocol version 6 (IPv6) is the newest version of Internet protocol
and successor to IPv4, IPv6 uses 128-bit address scheme.
 6LOWPAN: 6LoWPAN (IPv6 over Low power Wireless Personal Area Networks)
brings IP protocol to the low-power devices which have limited processing
capability. 6LOWPAN operates in the 2.4 GHz frequency range and provides data
transfer rates of 250 Kb/s.
TRANSPORT LAYER
 The transport layer protocols provide end-to-end message transfer capability
independent of the underlying network.
 TCP: Transmission Control Protocol (TCP) is the most widely used transport layer
protocol, that is used by web browsers (along with HTTP, HTTPS application layer
protocols), email programs (SMTP application layer protocol) and file transfer
(FTP).
 TCP is a connection oriented and state ful protocol
 TCP ensures reliable transmission of packets in-order
 TCP also provides error detection capability
 Performs flow control and congestion control.
 UDP: UDP is a connectionless protocol. UDP is useful for time-sensitive
applications that have very small data units to exchange and do not want the
overhead of connection setup. UDP does not provide guaranteed delivery,
ordering of messages and duplicate elimination
APPLICATION LAYER
 Application layer protocols define how the applications interface with the lower
layer protocols to send the data over the network
 HTTP – Hyper text transfer protocol :
 It is used to access the webpages in world wide Web,
 This protocol uses Request response model where a client sends the request
and server gives the response,
 It is a stateless protocol
 COAP: Constrained Application Protocol (CoAP) is an application layer protocol
for machine-to-machine (M2M) applications, meant for constrained
environments with constrained devices and constrained networks.
 Web Socket: Web Socket protocol allows full-duplex communication over a
single socket connection for sending messages between client and server and it
is based on TCP.
 MQTT – Message Queue Telemetry Transport is a light weight messaging protocol
based on Publish subscribe model, It follows client server architecture, where the
client is IoT device and server is broker.
 XMPP – Extensible Messaging and Presence protocol is a protocol for real time
communication and streaming XML data between entities, XMPP is a decentralized
protocol and supports both client to server and Server to Server communication
paths.
 DDS : Data distribution service is a data centric middle ware standard for deice to
device communication, It uses Publish Subscribe model for transferring data.
 AMQP – Advanced Message Queuing protocol is an open application layer protocol
for business messaging, It supports both point to point and Publisher Subscribe
model.
IoT Communication technologies

• Logical design of an IoT system


refers to an abstract
representation of the entities
and processes without going
into the low-level specifics of
the implementation.

• An IoT system comprises of a


number of functional blocks
that provide the system the
capabilities for identification,
sensing, actuation,
communication, and
management.

Book website: Bahga & Madisetti, ©


Device: An IoT system comprises of devices that provide sensing, actuation, monitoring and control
functions.

Communication: The communication block handles the communication for the IoT system.

Services: An IoT system uses various types of IoT services such as services for device monitoring, device
control services, data publishing services and services for device discovery.

Management: Management functional block provides various functions to govern the IoT system.

Security: Security functional block secures the IoT system and by providing functions such as
authentication, authorization, message and content integrity, and data security.

Application: IoT applications provide an interface that the users can use to control and monitor various
aspects of the IoT system. Applications also allow users to view the system status and view or analyse the
processed data.
IoT Communication
Model
Request-Response communication model

• Request-Response is a
communication model in which
the client sends requests to
the server and the server
responds to the requests.

• When the server receives a


request, it decides how to
respond, fetches the data,
retrieves resource
representations, prepares
the response, and then
sends the response to the
client.

Book website: Bahga & Madisetti, ©


Publish-Subscribe communication model

• Publish-Subscribe is a
communication model that
involves publishers, brokers and
consumers.
• Publishers are the source of data.
Publishers send the data to the
topics which are managed by the
broker. Publishers are not aware
of the consumers.
• Consumers subscribe to the topics
which are managed by the broker.
• When the broker receives data for
a topic from the publisher, it
sends the data to all the
subscribed consumers.

Book website: Bahga & Madisetti, ©


Push-Pull communication model

• Push-Pull is a communication
model in which the data
producers push the data to
queues and the consumers pull
the data from the queues.
Producers do not need to be
aware of the consumers.
• Queues help in decoupling the
messaging between the producers
and consumers.
• Queues also act as a buffer which
helps in situations when there is a
mismatch between the rate at
which the producers push data
and the rate rate at which the
consumers pull data.

Book website: Bahga & Madisetti, ©


Exclusive Pair communication model

• Exclusive Pair is a
bidirectional, fully duplex
communication model that
uses a persistent connection
between the client and
server.
• Once the connection is setup
it remains open until the
client sends a request to
close the connection.
• Client and server can send
messages to each other after
connection setup.

Book website: Bahga & Madisetti, ©


IoT COMMUNICATION APIs
REST-based Communication APIs

• Representational State Transfer


(REST) is a set of architectural
principles by which you can design
web services and web APIs that
focus on a system’s resources and
how resource states are
addressed and transferred.
• REST APIs follow the request-
response communication model.
• The REST architectural constraints
apply to the components,
connectors, and data elements,
within a distributed hypermedia
system.

Book website: Bahga & Madisetti, ©


WebSocket-based Communication APIs

• WebSocket APIs allow bi-


directional, full duplex
communication between
clients and servers.
• WebSocket APIs follow the
exclusive pair
communication model

Book website: Bahga & Madisetti, ©


loT Enabling Technologies
IoT is enabled by several technologies including wireless
sensor networks, cloud computing. big data analytics,
embedded systems, security protocols and architectures,
communication protocols, web services, mobile Internet, and
semantic search engines.
Wireless Sensor Networks
 A Wireless Sensor Network (WSN) comprises of distributed devices with sensors which are used
to monitor the environmental and physical conditions. A WSN consist of a number of end-nodes
and routers and a coordinator. End nodes have several sensors attached to them.
 End nodes can also act as routers. Routers are responsible for routing the data packets from end-
nodes to the coordinator. The coordinator collects the data from all the nodes. Coordinator also
acts as a gateway that connects the WSN to the Internet.
 Weather monitoring systems use WSNS in which the nodes collect temperature, humidity
 Indoor air quality monitoring systems use WSNS to collect data on the indoor air quality and
concentration of various gases.
 Soil moisture monitoring systems use WSNs to monitor soil moisture at various locations.
 Surveillance systems use WSNS for collecting surveillance data (such as motion detection data)
 Smart grids use WSNs for monitoring the grid at various points.

 WSNS are enabled by wireless communication protocols such as IEEE 802.15.4. ZigBee is one of
the most popular wireless technologies used by WSNs. ZigBee specifications are based on IEEE
802.15.4. ZigBee operates at 2.4 GHz frequency and offers data rates upto 250 KB/s and range
from 10 to 100 meters depending on the power output and environmental conditions.
Cloud Computing
 Cloud computing is a transformative computing paradigm that involves applications and services
over the Internet. Cloud computing involves provisioning of computing, networking and storage
based on demand.
 Cloud computing resources can be accessed over the network using standard access
mechanisms.
 Infrastructure-as-a-Service (IaaS): IaaS provides the users the ability to provision computing and
storage resources. These resources are provided to the users as virtual machine instances and
virtual storage. Users can start, stop, configure and manage the virtual machine instances and
virtual storage.
 Platform-as-a-Service (PaaS): PaaS provides the users the ability to develop and deploy
application in the cloud using the development tools, application programming interfaces (APIs),
The users, themselves, are responsible for developing, deploying, configuring and managing
applications on the cloud infrastructure.
 Software-as-a-Service (SaaS): SaaS provides the users a complete software application or the
user interface to the application itself. The cloud service provider manages the underlying cloud
infrastructure including servers, network, operating systems, storage and application software,
and the user is unaware of the underlying architecture of the cloud.
Big Data Analytics

 Big data is defined as collections of data sets whose volume, velocity (in terms of its temporal
variation), or variety, is so large that it is difficult to store, manage, process and analyze the data using
traditional databases and data processing tools.
 Some examples of big data generated by IoT systems are described as follows,
 Machine sensor data collected from sensors embedded in industrial and energy systems for monitoring
their health and detecting failures.
 Health and fitness data generated by IoT devices such as wearable fitness bands.
 Data generated by loT systems for location and tracking of vehicles.
 Volume: Though there is no fixed threshold for the volume of data to be considered as big data,
however, typically, the term big data is used for massive scale data that is difficult to store, manage and
process using traditional databases and data processing architectures.
 Velocity: Velocity of data refers to how fast the data is generated and how frequently it varies.
 Variety: Variety refers to the forms of the data. Big data comes in different forms such as structured or
unstructured data, including text data, image, audio, video and sensor data.
Communication Protocols
 Communication protocols form the backbone of IoT systems and enable
network connectivity and coupling to applications.
 Communication protocols allow devices to exchange data. over the
network.
The function includes,
 Data exchange formats and data encoding
 addressing schemes for devices and routing of packets from source to
destination,
 Sequence control, flow control
Embedded Systems

 An Embedded System is a computer system that has computer


hardware and software embedded to perform specific tasks. In
contrast to general purpose computers or personal computers (PCs)
which can perform various types of tasks, embedded systems are
designed to perform a specific set of tasks.

 Embedded systems range from low-cost devices such as digital


watches to devices such as digital cameras, point of sale terminals,
vending machines, appliances (such as washing machines), etc.
Security and Privacy Issues in IoT
 Inadequate Password Protection : Default passwords may enable hackers to
enter the machine without any obstacles. One of the examples of such an attack
refers to the Mirai malware, which infected IoT devices such as routers, video
recorders, and video cameras.
 Limited Compliance from IoT Manufacturers :
 Another important factor affecting the security factor in privacy and security in
IoT refers to the lack of compliance from IoT manufacturers. IoT device
manufacturers have started introducing internet connectivity in their devices
without paying attention to the ‘security’ aspect in the product designing
process.
 Some of the notable security risks for IoT which are due to manufacturers
include,
 Hardware issues
 Lack of security in data transfer and storage
 Hard-coded, weak, or guessable usernames and passwords
Security Issues in IoT

Device Update Management :


 The concerns of security and privacy in IoT could also refer to security issues due to device
update management. Insecure firmware or software could generally lead to IoT security
risks. Even if a manufacturer offers a device with the most recent software update, you will
encounter new vulnerabilities.

Lack of Secure Interfaces :


 The IoT devices need apps, protocols, and services for communication, and the insecure
interfaces are responsible for various IoT vulnerabilities. The most common concern
of security in IoT interface is the lack of device authorization and authentication mechanism
and weak or no encryption mechanism.
Security Issues in IoT

 Lack of encryption
 Insufficient testing and updating
 Inadequate device security
 Lack of standardization
 Vulnerability to network attacks
 Unsecured data transmission
 Software vulnerabilities
Privacy Concerns in IoT
 Privacy: Privacy is a critical concern in the Internet of Things (IoT), as IoT
devices collect, store, and transmit large amounts of personal and sensitive
information.
 Some of the privacy challenges in IoT include:
 Data collection: Ensuring that only the necessary data is collected and that
it is collected in a way that respects individuals’ privacy rights.
 Data storage: Ensuring that the data collected by IoT devices is stored
securely and that access to it is strictly controlled.
 Data sharing: Controlling who has access to the data collected by IoT
devices and ensuring that it is not shared without proper authorization.
Privacy Concerns in IoT
 To address these privacy challenges, organizations should implement
robust privacy policies and procedures, such as data protection, data
minimization, and data retention.

 They should also educate users on the privacy implications of using


IoT devices and encourage them to take steps to protect their
privacy.

 Additionally, organizations should adopt privacy-enhancing


technologies, such as encryption and anonymization, to protect the
privacy of individuals whose information is collected by IoT devices
Privacy Concerns in IoT

 Abundance of Data : The data generated by IoT devices is radically


staggering for all the right reasons. According to the Federal Trade
Commission, less than 10,000 households could create almost 150
million discrete data points daily.
 Eavesdropping – Unauthorized real time interception
 Unwanted Public Exposure : IoT device manufacturers often have
long documentation for terms of service, and there is barely anyone
who reads the document thoroughly.

You might also like