Rushat IOT
Rushat IOT
Internet of Things
Unit One.
What is IOT?
The Internet of Things (IoT) describes the network of physical
objects—“things”—that are embedded with sensors, software, and other
technologies for the purpose of connecting and exchanging data with other
devices and systems over the internet.
Why is IOT important?
Over the past few years, IoT has become one of the most important technologies
of the 21st century. Now that we can connect everyday objects—kitchen
appliances, cars, thermostats, baby monitors—to the internet via embedded
devices, seamless communication is possible between people, processes, and
things. By means of low-cost computing, the cloud, big data, analytics, and mobile
technologies, physical things can share and collect data with minimal human
intervention. In this hyperconnected world, digital systems can record, monitor,
and adjust each interaction between connected things. The physical world meets
the digital world—and they cooperate.
Characteristics of IOT.
Connectivity:
Connectivity is an important requirement of the IoT infrastructure. Things of IoT
should be connected to the IoT infrastructure. Anyone, anywhere, anytime can
connect, this should be guaranteed at all times.
Intelligence and Identity:
The extraction of knowledge from the generated data is very important. For
example, a sensor generates data, but that data will only be useful if it is
interpreted properly. Each IoT device has a unique identity. This identification is
helpful in tracking the equipment and at times for querying its status.
Scalability:
The number of elements connected to the IoT zone is increasing day by day.
Hence, an IoT setup should be capable of handling the massive expansion. The
data generated as an outcome is enormous, and it should be handled
appropriately.
Rushat/ Internet of Things
Architecture of IOT.
Quick Talk<
There is no specific architecture of IoT, there are different architectures proposed
by different people, the architecture which is mentioned below is widely used and
was there on all the major computer science edu sites like GeeksforGeeks,
InterviewBit and the Tutorialspoint.
Rushat/ Internet of Things
Sensing Layer –
The sensing layer is the first layer of the IoT architecture and is responsible for
collecting data from different sources. This layer inc
ludes sensors and actuators that are placed in the environment to gather
information about temperature, humidity, light, sound, and other physical
parameters. These devices are connected to the network layer through wired or
wireless communication protocols.
Network Layer –
The network layer of an IoT architecture is responsible for providing
communication and connectivity between devices in the IoT system. It includes
protocols and technologies that enable devices to connect and communicate with
each other and with the wider internet. Examples of network technologies that are
commonly used in IoT include WiFi, Bluetooth, Zigbee.
Data Processing Layer –
The data processing layer of IoT architecture refers to the software and hardware
components that are responsible for collecting, analyzing, and interpreting data
from IoT devices. This layer is responsible for receiving raw data from the devices,
processing it, and making it available for further analysis or action. The data
processing layer includes a variety of technologies and tools, such as data
management systems, analytics platforms, and machine learning algorithms.
These tools are used to extract meaningful insights from the data and make
decisions based on that data.
Application Layer –
The application layer of IoT architecture is the topmost layer that interacts directly
with the end-user. It is responsible for providing user-friendly interfaces and
functionalities that enable users to access and control IoT devices.This layer
Rushat/ Internet of Things
includes various software and applications such as mobile apps, web portals, and
other user interfaces that are designed to interact with the underlying IoT
infrastructure. It also includes middleware services that allow different IoT devices
and systems to communicate and share data seamlessly.
This was also given in the ppt, this is actually the Cisco Reference Architecture for
IoT, or also called the seven layered reference model.
A physical design of an IoT system refers to the individual node devices and their
protocols that are utilized to create a functional IoT ecosystem. Each node device
can perform tasks such as remote sensing, actuating, monitoring, etc., by relying
on physically connected devices. It may also be capable of transmitting
information through different types of wireless or wired connections.
The things/devices in the IoT system are used for:
● Building connections
● Data processing
● Providing storage
● Providing interfaces
● Providing graphical interfaces
Rushat/ Internet of Things
The devices generate data, and the data is used to perform analysis and do
operations for improving the system.
Bluetooth
Bluetooth is one of the most widely used protocols for short-range
communication. It is a standard IoT protocol for wireless data transmission. This
communication protocol is secure and perfect for short-range, low-power,
low-cost, and wireless transmission between electronic devices. Bluetooth
protocol is mostly used in smart wearables, smartphones, and other mobile
devices, where small fragments of data can be exchanged without high power
and memory. Offering ease of usage, Bluetooth tops the list of IoT device
connectivity protocols.
ZigBee
ZigBee is an IoT protocol that allows smart objects to work together. It is
commonly used in home automation. More famous for industrial settings, ZigBee
is used with apps that support low-rate data transfer between short distances.
Street lighting and electric meters in urban areas, which provides low power
consumption, use the ZigBee communication protocol. It is also used with
security systems and in smart homes.
These were the IoT network protocols HTTP, LoRaWan, Bluetooth, ZigBee and now
we will see the IoT data protocols.
to the client in HTTP. For light-weight implementation, it makes use of UDP (User
Datagram Protocol) and reduces space usage. The protocol uses binary data
format EXL (Efficient XML Interchanges). CoAP protocol is used mainly in
automation, mobiles, and microcontrollers. The protocol sends a request to the
application endpoints such as appliances at homes and sends back the response
of services and resources in the application.
Publisher-Subscriber Model
● In this model, you will find three main entities:- Publisher, Broker and
Consumer Let us see the roles of each of these 3 entities.
● Publishers send the data to the topics that are managed by the
broker. They are the source of data.
● The Man in the Middle, the Broker, has the responsibility to accept the
data sent by the publisher and deliver that data to the consumers.
● What is the task of the Consumers? Consumers will subscribe to the
broker-managed topics.
● Publishers aren't aware of who the consumers are.
● Once the data is published on a topic, the broker sends this message
to all consumers who have subscribed to the specific topic.
● Example(s):- MQTT (Message Queue Telemetry Transport), AMQP
(Advanced Message Queue Protocol), DDS (Data Distribution Service).
Push-Pull Model
Exclusive Pair
● Due to one time dedicated connection setup, there is less overhead, lower
traffic and less latency and high throughput.
● So Web socket is the most suitable IoT Communication APIs for IoT System.
REST-based APIs (not so important topic)
● Representational state transfer (REST) is a set of architectural principles by
which you can design Web services, the Web APIs that focus on the
system's resources and how resource states are addressed and transferred.
● URIs(example:- example.com/api/tasks) are used to depict resources in the
RESTful web service.
● Client tries to access these resources via URIs using commands like GET,
PUT, POST, DELETE and so on that are defined by HTTP.
● In response, the server responds with a JSON object or XML file.
● The REST APIs follow the request-response model.
ZigBee, Z-Wave, and Thread are radio protocols for creating low-rate private area
networks. These technologies are low-power, but offer high throughput unlike
many similar options. This increases the power of small local device networks
without the typical costs.
LTE-A
LTE-A, or LTE Advanced, delivers an important upgrade to LTE technology by
increasing not only its coverage, but also reducing its latency and raising its
throughput. It gives IoT tremendous power through expanding its range, with its
most significant applications being vehicles.
WiFi-Direct
WiFi-Direct eliminates the need for an access point. It allows P2P (peer-to-peer)
connections with the speed of WiFi, but with lower latency. WiFi-Direct eliminates
an element of a network that often bogs it down, and it does not compromise on
speed or throughput.
Other Important IoT enabling technologies:
Wireless Sensor Network
A WSN comprises distributed devices with sensors which are used to monitor the
environmental and physical conditions. A wireless sensor network consists of end
nodes, routers and coordinators.
Cloud Computing
It provides us the means by which we can access applications as utilities over the
internet. Cloud means something which is present in remote locations.
With Cloud computing, users can access any resources from anywhere like
databases, web servers, storage, any device, and any software over the internet.
Big Data Analytics
It refers to the method of studying massive volumes of data or big data. Collection
of data whose volume, velocity or variety is simply too massive and tough to store,
control, process and examine the data using traditional databases.
Communications Protocols
They are the backbone of IoT systems and enable network connectivity and
linking to applications. Communication protocols allow devices to exchange data
over the network. Multiple protocols often describe different aspects of a single
communication.
Embedded System
It is a combination of hardware and software used to perform special tasks.
It includes microcontroller and microprocessor memory, networking units
(Ethernet Wi-Fi adapters), input output units (display keyword etc. ) and storage
devices (flash memory). It collects the data and sends it to the internet.
Rushat/ Internet of Things
Internet of Things
Unit two.
NFV Architecture
An individual proprietary hardware component, such as a router, switch, gateway,
firewall, load balancer, or intrusion detection system, performs a specific
networking function in a typical network architecture. A virtualized network
substitutes software programs that operate on virtual machines for these pieces
of hardware to carry out networking operations. Three components make up an
NFV architecture:
Centralized virtual network infrastructure: The foundation of an NFV
infrastructure can be either a platform for managing containers or a hypervisor
that abstracts the resources for computation, storage, and networking.
Applications: Software delivers many forms of network functionality by
substituting for the hardware elements of a conventional network design
(virtualized network functions).
Rushat/ Internet of Things
White Box: uses network devices, such as switches and routers, that as based on
“generic” merchant silicon networking networking chipset available for anyone to
buy, as opposed to proprietary silicon chips designed by and for a single
networking vendor.
End of Unit 2.
Rushat/ Internet of Things
Internet of Things
Unit Three
The domain model specification diagram for home automation system is as shown
in the below figure:
5) Service Specifications
The service specification defines the following:
● Services in the system
● Service types
● Service inputs/output
● Service endpoints
● Service schedules
● Service effects
For each state and attribute in the process specification and information model,
we define a service. Services either change the state of attributes or retrieve their
current values. The service specification for each state in home automation
systems are as shown below:
Rushat/ Internet of Things
The Arduino platform has become quite popular with people just starting out with
electronics, and for good reason. Unlike most previous programmable circuit
boards, the Arduino does not need a separate piece of hardware (called a
programmer) in order to load new code onto the board – you can simply use a
USB cable. Additionally, the Arduino IDE uses a simplified version of C++, making it
easier to learn to program.
Raspberry Pi
A Raspberry Pi is a credit card-sized computer originally designed for education,
inspired by the 1981 BBC Micro. Creator Eben Upton's goal was to create a
low-cost device that would improve programming skills and hardware
understanding at the pre-university level. But thanks to its small size and
accessible price, it was quickly adopted by tinkerers, makers, and electronics
enthusiasts for projects that require more than a basic microcontroller (such as
Arduino devices).
The Raspberry Pi is slower than a modern laptop or desktop but is still a complete
Linux computer and can provide all the expected abilities that implies, at a
low-power consumption level.
Internet of Things
Unit Four
cybercriminals with a vast and accessible attack surface. IoT security provides the
vital protections needed for these vulnerable devices. Developers of IoT systems
are known to focus on the functionality of the devices and not on security. This
amplifies the importance of IoT security and for users and IT teams to be
responsible for implementing protections.
Consider security solutions and tools. A large hurdle that users face in trying to
secure their IoT ecosystems is the limited capacity in which they can implement
these steps. Some device settings might have restricted access and are difficult to
configure. In such cases users can supplement their efforts by considering security
solutions that provide multi-layered protection and endpoint encryption.
Take into consideration the different protocols used by IoT devices. To
communicate, IoT devices use not only internet protocols, but also a huge set of
different networking protocols, from the well-known Bluetooth and Near Field
Communication (aka NFC), to the lesser-known LoRA, LoRaWAN and optical,
infrared communication. Administrators must understand the whole set of
protocols used in their IoT systems in order to reduce risks and prevent threats.
Secure the heavy use of GPS. Some IoT devices and applications use GPS heavily,
which carries potential security concerns. Organizations, in particular, need to be
wary of cases where GPS signals can be jammed or even faked, especially if they
use positioning systems for manufacturing, monitoring, and other functions.
IoT Vulnerabilities
Tomography
Computational Tomography
● A computing method of producing a three-dimensional picture of the
internal structures of an object
● observation and recording of the differences in effects on passage of energy
waves impinging on those structures
Security Tomography
● Means finding attack vulnerable sections/subsections
● Observations of behavior, using a finite number of objects or threats in a
complex set of subsystems
Network Tomography
● Refers to study of vulnerabilities and security aspects for network
monitoring in a complex system
● WSNs
● RFIDs networks
● IoT networks
● Allocating resources and ensuring the network reliability and security
HTTPS
● Content privacy domain header:
● Allows use of digital signatures and encryption, various encryption options
● Server-client negotiations
● Cryptographic scheme is a Property assigned for the link
● Specific algorithm is the Value assigned
Rushat/ Internet of Things
Identity and access management (IAM) ensures that the right people and job roles
in your organization (identities) can access the tools they need to do their jobs.
IAM systems are designed to perform three key tasks: identify, authenticate, and
authorize. Meaning, only the right persons should have access to computers,
hardware, software apps, any IT resources, or perform specific tasks.
IAM Framework
1. A database containing users’ identities and access privileges
2. IAM tools for creating, monitoring, modifying, and deleting access privileges
3. A system for auditing login and access history
Role-Based Access
Many IAM systems use role-based access control (RBAC). Under this approach,
there are predefined job roles with specific sets of access privileges.
Single Sign-On
Some IAM systems implement Single Sign-On (SSO). With SSO, users only need to
verify themselves one time. They would then be given access to all systems
without the need to log separately into each system.
Multi-Factor Authentication
Whenever extra steps are required for authentication, it’s either a two-factor
authentication (2FA) or multi-factor authentication (MFA). This authentication
process combines something the user knows (like a password) with something the
user has (like a security token or OTP) or something that’s part of the user’s body
(like biometrics).
Benefits of IAM
IAM enhances security. This is perhaps the most important benefit organizations
can get from IAM. By controlling user access, companies can eliminate instances
of data breaches, identity theft, and illegal access to confidential information. IAM
can prevent the spread of compromised login credentials, avoid unauthorized
entry to the organization’s network, and provide protection against ransomware,
hacking, phishing, and other kinds of cyber attacks.
IAM streamlines IT workload. Whenever a security policy gets updated, all access
privileges across the organization can be changed in one sweep. IAM can also
Rushat/ Internet of Things
reduce the number of tickets sent to the IT helpdesk regarding password resets.
Some systems even have automation set for tedious IT tasks.
IAM helps in compliance. With IAM, companies can quickly meet the requirements
of industry regulations (like HIPAA and GDPR) or implement IAM best practices.
IAM allows collaboration and enhances productivity. Companies can provide
outsiders (like customers, suppliers, and visitors) access to their networks without
jeopardizing security.
IAM improves user experience. There's no need to enter multiple passwords to
access multiple systems under SSO. If biometrics or smart cards are used, users
may have no more need to remember complex passwords.
Access Control
Physical access control: limits access to campuses, building and other physical
assets, e.g. a proximity card to unlock a door.
Logical access control: limits access to computers, networks, files and other
sensitive data, e.g. a username and password.
Internet of Things
Unit Five
Previously there were only IoT applications in this unit but in the ppt shared on the
official group some new topics are also mentioned in addition with applications.
Rushat/ Internet of Things
These new topics are: [ Sensor Technology, Participatory Sensing, Industrial IOT,
Actuator, Sensor Data Communication Protocols, Radio Frequency Identification
technology, Wireless Sensor Network Technology ],
I am adding all these topics in this pdf.
Sensor Technology
Sensors are now found in a wide variety of applications, such as smart mobile
devices, automotive systems, industrial control, healthcare, oil exploration and
climate monitoring. Sensors are used almost everywhere, and now sensor
technology is beginning to closely mimic the ultimate sensing machine @ the
human being. A sensor is a device that detects and responds to some type of input
from the physical environment. The specific input could be light, heat, motion,
moisture, pressure, or any one of a great number of other environmental
phenomena.
Smart Sensor
A smart sensor is a device that takes input from the physical environment and
uses built-in compute resources to perform predefined functions upon detection
of specific input and then process data before passing it on.
Difference between Sensor and Transducer
The main difference between sensor and transducer is that a transducer is a
device that can convert energy from one form to another, whereas a sensor is a
device that can detect a physical quantity and convert the data into an electrical
signal. Sensors are also a type of transducers.
Participatory Sensing
Participatory sensing is the process whereby individuals and communities use
ever more capable mobile phones and cloud services to collect and analyze
systematic data for use in discovery. Participatory sensing is the concept of
communities (or other groups of people) contributing sensory information to form
a body of knowledge. Participatory sensing can be used to retrieve information
about the environment, weather, urban mobility, congestion as well as any other
sensory information that collectively forms knowledge.
Industrial IoT (IIOT)
● IIoT incorporates machine learning and big data technology, harnessing the
sensor data, machine-to-machine (M2M) communication and automation
technologies that have existed in industrial settings for years.
● The driving philosophy behind the IIoT is that smart machines are better
than humans at accurately, consistently capturing and communicating data.
Rushat/ Internet of Things
Benefits of IIOT
● Improving operational efficiency.
● Improving productivity.
● Creating new business opportunities.
● Reducing downtime.
● Maximizing asset utilization.
Actuator
An actuator is a component of a machine that is responsible for moving and
controlling a mechanism or system, for example by opening a valve. In simple
terms, it is a "mover". An actuator requires a control signal and a source of energy.
An actuator is a motor that converts energy into torque which then moves or
controls a mechanism or a system into which it has been incorporated. It can
Rushat/ Internet of Things
Context Awareness
● Sensor fusion, along with embedded processing and connectivity, enables
context awareness, and context awareness enables a new world of services.
● Context is defined as the circumstances or facts that form the setting for an
event, statement, situation or idea.
● Context-aware apps examine who, where, when and what, and the software
designer uses this contextual information to determine why a situation is
happening and then encodes some action in the application.
● Based on this definition, the four most important categories of information
to formulate a context-aware action are:
1. Identity
2. Location
3. Time
4. Activity
the sensor nodes advertise the available data to the users, and the users query the
data which they are interested in. An application layer protocol that provides user
the software with efficient interfaces for interest dissemination is useful for lower
layer operations, such as routing.
The main objectives and the desired features of the transport layer protocols that
can address the unique requirements of the
wireless sensor networks paradigm can be stated as follows:
● Reliable Transport
● Congestion Control
● Self-configuration
● Energy Awareness
● Biased Implementation
● Constrained Routing/Addressing
Radio Frequency Identification Technology (RFID)
Radio-frequency identification (RFID) uses electromagnetic fields to automatically
identify and track tags attached to objects. The tags contain electronically-stored
information. RFID is one method for Automatic Identification and Data Capture
(AIDC). RFID refers to a wireless system, which has two components: tags and
readers. The reader is a device that has one or more antennas that emit radio
waves and receive signals back from the RFID tag. RFID methods utilize radio
Rushat/ Internet of Things
WSN Architecture
The most common wireless sensor network architecture follows the OSI
architecture Model. The architecture of the WSN includes five layers and three
cross layers. Mostly in sensor n/w, we require five layers, namely application,
transport, n/w, data link & physical layer. The three cross planes are namely power
management, mobility management, and task management. These layers of the
WSN are used to accomplish the n/w and make the sensors work together in
order to raise the complete efficiency of the network.
Rushat/ Internet of Things
Application Layer
The application layer is liable for traffic management and offers software for
numerous applications that convert the data in a clear form to find positive
information. Sensor’s network is arranged in numerous applications in different
fields such as agricultural, military, environment, medical, etc.
Transport Layer
The function of the transport layer is to deliver congestion avoidance and
reliability where a lot of protocols intended to offer this function are either
practical on the upstream. These protocols use dissimilar mechanisms for loss
recognition and loss recovery. The transport layer is exactly needed when a
system is planned to contact other networks.
Network Layer
The main function of the network layer is routing, it has a lot of tasks based on the
application, but actually, the main tasks are in the power conserving, partial
memory, buffers, and sensor don’t have a universal ID and have to be
self-organized.
Physical Layer
The physical layer provides an edge for transferring a stream of bits above the
physical medium. This layer is responsible for the selection of frequency,
generation of a carrier frequency, signal detection, Modulation & data encryption.
Applications of IoT
(According to syllabus)
Home Automation, smart lighting, home intrusion detection, smart
cities, smart parking, environment, weather monitoring system, agriculture.
These applications are available on Google you can refer them from there and we
can even write about them with our own imagination.
And in this way we have completed the syllabus of IoT in just 46 pages.
END