0% found this document useful (0 votes)
2K views23 pages

IOT Seminar Report

The document is a seminar report on Internet of Things (IoT) submitted by Abhishek V. Sontakke, a 7th semester student of Mechanical Engineering at PRMIT&R Badnera, Amravati, under the guidance of Prof. Ankush Patil for the academic year 2021-2022. It includes an abstract providing an overview of IoT, a table of contents listing the topics to be discussed, and initial sections defining IoT, describing its origins from concepts developed in the 1970s through its naming and popularization in 1999.

Uploaded by

Kiran Konde
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2K views23 pages

IOT Seminar Report

The document is a seminar report on Internet of Things (IoT) submitted by Abhishek V. Sontakke, a 7th semester student of Mechanical Engineering at PRMIT&R Badnera, Amravati, under the guidance of Prof. Ankush Patil for the academic year 2021-2022. It includes an abstract providing an overview of IoT, a table of contents listing the topics to be discussed, and initial sections defining IoT, describing its origins from concepts developed in the 1970s through its naming and popularization in 1999.

Uploaded by

Kiran Konde
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 23

A Seminar Report On

“ Internet of things(IOT)”

SUBMITTED BY

Abhishek V.

Sontakke Roll No :

203

Seventh Semester

B.E. (Mechanical Engineering)

GUIDED BY

Prof. Ankush Patil Sir

MECHANICAL ENGINEERING DEPARTMENT

Prof. Ram Meghe Institute of Technology and Research Badnera -

Amravati 444701(MS)

Academic Year: 2021-22


0
CERTIFICATE
This is to certify that the seminar report Entitled

“ Internet of things(IOT)”

Is a bonafide work and it is submitted to the Sant Gadge Baba Amravati

University, Amravati.

By
Abhishek V. Sontakke

Seventh Semester B.E.(Mechanical Engineering) in the partial


fulfillment of the requirement for the degree of Bachelor of Engineering in
Mechanical Engineering, during the academic year 2021-2022 under the
guidance of
Prof. Ankush Patil Sir Dr. A.D.Shirbhate Sir

Guide Head of Department,

Department of mechanical Engg Department of mechanical Engg


PRMIT&R Badnera, Amravati PRMIT&R Badnera, Amravati

MECHANICAL ENGINEERING DEPARTMENT


Prof. Ram Meghe Institute of Technology and Research Badnera -
Amravati 444701(MS)
Academic Year: 2021-22

1
ACKNOWLEDGEMENT

There’s quite a bit of confusion around the Internet of Things (IoT). What is it
exactly? Is it something that my business or organization needs to use? If so, how? What are
the use cases? The risks? How do I get started?

Because IoT is such a large concept and there has been so much noise associated
with it in the past few years, it’s easy to dismiss it all as hype. But make no mistake, IoT is a
powerful, long-term approach that every business will need to leverage to succeed in the
future.

We won’t be able to answer all the questions posed above, but this seminar is
intended to equip you with a solid foundation in the Internet of Things and its accompanying
concepts, components, and the technologies that make it all possible. You’ll have a much
better handle on what IoT means and how you might be able to use it to build a new
organization, to launch a new business line within your existing organization, or to simply
improve your internal processes and operations.

No matter which way you look at it, technology has been headed towards automation
for a long time now. In fact, isn’t the very basic principle of technology to make our lives
easier by leaving fewer things to be explicitly done by us? It might be making us all lazier
everyday, or one might argue that it is giving us far greater time to pursue whatever we
desire. Whatever might be the effect, there is no doubt that automation is the future and the
place that it is happening the most significantly is right in our homes.

Name of student

2
ABSTRACT

Technology is shaping the world like never before. The government and business
leaders in India must harness the opportunities offered by technology and its implications on
the future of work.

COVID-19 and the resulting geopolitical fall out have made it more urgent for
corporate leaders to ensure that India is able to respond to the new normal. They also need
to ensure that the country can seize the opportunity to increase its market share in the global
manufacturing economy.

COVID-19 has precipitated companies’ entire focus towards industry 4.0. Two things
that have become more important for companies today are: focusing on adopting digital
technologies that constitute the Industrial 4.0 revolution, and investing in new products and
services that enable them to thrive in the fast evolving economic environment.

This report discusses why we believe IoT, the most critical technology of the
Industrial 4.0 revolution, has a future despite facing continuous challenges in the market. It
covers impending drivers that build a stronger case for the technology. We will also discuss
how the technology could benefit market players by creating opportunities for monetisation
and evolving new business models. Towards the end, the report provides recommendations
on the way forward..

3
Table of Content

Sr. No Title Page no.

1 What is IOT? 5

2 Where did it come from? 7

3 How does it operate? 9

4 Why IOT? 11

5 Issues and Challenges of IoT 12

6 IOT Benefits vs Concerns 16

7 Conclusion And Future Enhancements 20

8 References 21

4
What is IOT?

The internet of things, or IoT, is a system of interrelated computing devices, mechanical and
digital machines, objects, animals or people that are provided with unique identifiers (UIDs)
and the ability to transfer data over a network without requiring human-to-human or human-
to-computer interaction.

A thing in the internet of things can be a person with a heart monitor implant, a farm animal
with a biochip transponder, an automobile that has built-in sensors to alert the driver when
tire pressure is low or any other natural or man-made object that can be assigned an Internet
Protocol (IP) address and is able to transfer data over a network.

Increasingly, organizations in a variety of industries are using IoT to operate more efficiently,
better understand customers to deliver enhanced customer service, improve decision-making
and increase the value of the business.

How are you reading this ebook right now? It might be on desktop, on mobile, maybe a

tablet, but whatever device you’re using, it’s most likely connected to the internet.

5
An internet connection is a wonderful thing, it gives us all sorts of benefits that just weren’t
possible before. If you’re old enough, think of your cell phone before it was a smartphone.
You could call and you could text, sure, but now you can read any book, watch any movie, or
listen to any song all in the palm of your hand.

The point is that connecting things to the internet yields many amazing benefits. We’ve all
seen these benefits with our smartphones, laptops, and tablets, but this is true for everything
else too. And yes, we do mean everything.

The Internet of Things is actually a pretty simple concept, it means taking all the physical
places and things in the world and connecting them to the internet.

Confusion arises not because the concept is so narrow and tightly defined, but rather because
it’s so broad and loosely defined. It can be hard to nail down the concept in your head when
there are so many examples and possibilities in IoT.

To help clarify, it’s important to understand the benefits of connecting things to the internet.
Why would we even want to connect everything to the internet?

6
Where did it come from?

Kevin Ashton, co-founder of the Auto-ID Center at the Massachusetts Institute of


Technology (MIT), first mentioned the internet of things in a presentation he made to Procter

& Gamble (P&G) in 1999. Wanting to of where IoT was headed.


bring radio frequency ID (RFID) to the
attention of P&G's senior management,
Ashton called his presentation "Internet of
Things' to incorporate the cool new trend
of 1999: the internet. MIT professor Neil
Gershenfeld's book, When Things Start to
Think, also appeared in 1999. It didn't use
the exact term but provided a clear vision

IoT has evolved from the convergence of wireless technologies, microelectromechanical


systems (MEMSes), microservices and the internet. The convergence has helped tear down
the silos between operational technology (OT) and information technology (IT), enabling
unstructured machine-generated data to be analyzed for insights to drive improvements.

Although Ashton's was the first mention of the internet of things, the idea of connected
devices has been around since the 1970s, under the monikers embedded internet and
pervasive computing.

The first internet appliance, for example, was a Coke machine at Carnegie Mellon University
in the early 1980s. Using the web, programmers could check the status of the machine and
determine whether there would be a cold drink awaiting them, should they decide to make the
trip to the machine.

7
IoT evolved from M2M communication, i.e., machines connecting to each other via a
network without human interaction. M2M refers to connecting a device to the cloud,
managing it and collecting data.

Taking M2M to the next level, IoT is a sensor network of billions of smart devices that
connect people, systems and other applications to collect and share data. As its foundation,
M2M offers the connectivity that enables IoT.

The internet of things is also a natural extension of supervisory control and data acquisition
(SCADA), a category of software application programs for process control, the gathering of
data in real time from remote locations to control equipment and conditions. SCADA systems
include hardware and software components. The hardware gathers and feeds data into a
computer that has SCADA software installed, where it is then processed and presented in a
timely manner. The evolution of SCADA is such that late-generation SCADA systems
developed into first-generation IoT systems.

The concept of the IoT ecosystem, however, didn't really come into its own until the middle
of 2010 when, in part, the government of China said it would make IoT a strategic priority in
its five-year plan.

8
How does it operate?

An IoT ecosystem consists of web-enabled smart devices that use embedded systems, such as
processors, sensors and communication hardware, to collect, send and act on data they
acquire from their environments. IoT devices share the sensor data they collect by connecting
to an IoT gateway or other edge device where data is either sent to the cloud to be analyzed
or analyzed locally. Sometimes, these devices communicate with other related devices and
act on the information they get from one another. The devices do most of the work without
human intervention, although people can interact with the devices -- for instance, to set them
up, give them instructions or access the data.

The connectivity, networking and communication protocols used with these web-enabled
devices largely depend on the specific IoT applications deployed.

IoT can also make use of artificial intelligence (AI) and machine learning to aid in making
data collecting processes easier and more dynamic.

9
An IoT system consists of sensors/devices which “talk” to the cloud through some kind of
connectivity. Once the data gets to the cloud, software processes it and then might decide to
perform an action, such as sending an alert or automatically adjusting the sensors/devices
without the need for the user.

But if user input is needed or if the user simply wants to check in on the system, a user
interface allows them to do so. Any adjustments or actions that the user makes are then sent
in the opposite direction through the system: from the user interface, to the cloud, and back to
the sensors/devices to make some kind of change.

That’s how an IoT system works at a high level. Now we’ll take a deeper dive into each of
these components to explain what they are, how they work, and important considerations for
your organization as you consider building and/or implementing IoT solutions.

10
Why IOT?

The internet of things helps people live and work smarter, as well as gain complete control
over their lives. In addition to offering smart devices to automate homes, IoT is essential to
business. IoT provides businesses with a real-time look into how their systems really work,
delivering insights into everything from the performance of machines to supply chain and
logistics operations.

IoT enables companies to automate processes and reduce labor costs. It also cuts down on
waste and improves service delivery, making it less expensive to manufacture and deliver
goods, as well as offering transparency into customer transactions.

As such, IoT is one of the most important technologies of everyday life, and it will continue
to pick up steam as more businesses realize the potential of connected devices to keep them
competitive.

11
Issues and Challenges of IoT

Scalability:

Given the huge number of devices requiring simultaneous connectivity, scalability in


IoT systems has become a concern. In IoT, there are mainly two types of scalability
issues: vertical scalability, which refers to the addition or removal of computing
resources of an IoT node; and horizontal scalability, which refers to the addition or
removal of an IoT node. Given its importance, IoT scalability has been extensively
addressed in the literature, with the proposal of cloud computing (Cabré et al., 2017;
Cheng et al., 2017; Shirer and MacGillivray, 2020) or cloud-based architectures (Xu
and Helal, 2015). However, despite these efforts, challenges still remain, such as IoT
nodes needing to provide an increased number of services, such as functional
scalability, access control, data storage, fault tolerance, and privacy and security, to
name a few.

Security and Privacy

The lack of privacy standards and end-to-end security solutions has been an ongoing
concern for conventional IoT deployment, and wireless IoT faces more challenges in
terms of these aspects (Shafagh et al., 2017). Several technologies are aiming to solve
privacy and security issues from both a hardware and software perspective. For
hardware, RFID and newer releases of 5G and other local network protocols are key
to tackling security issues at a hardware level. In terms of software, Key Management
System (KMS) with a zero-trust network feature and blockchain are rapidly
addressing the privacy and trust threats with reinforced security features (Sicari et al.,
2015; Sun et al., 2019; Xu et al., 2020). With the help of newer communication
protocols, KMS, and blockchain, the grand challenge of IoT devices is the
interdependence of security, privacy, and trust for IoT ecosystems. The challenge
shall always be considered as a holistic goal for optimal integrity and performance.

12
Self-Organization

There is an ongoing paradigm shift from Internet-of-Things to Internet-of-Everything


due to the proliferation of IoT nodes which demands new approaches to autonomic
management to make the network proactive rather than reactive. The main idea
behind self-organization in IoT systems is to actively respond to the changing
environments in an automatic and coordinated fashion through the use of one or more
control loops that reconfigures the system behavior on-demand to keep it within
desired bounds (Kephart, 2005). These systems proactively self-manage themselves
by reacting to the changing environment using advanced algorithms in conjunction
with high-level human-defined goals and policies. These self-organization capabilities
are important to ensure the robustness and survival of the future dense IoT network
and therefore have attracted an intense research interest (Milner et al., 2012; Ding et
al., 2013; Qiu et al., 2017; Pang et al., 2020). However, there are many open
challenges in this space and some notable research directions for the future include
dealing with the heterogeneous interoperability of the system, designing optimal self-
organizing protocols and routing strategies for large-scale distributed heterogeneous
IoT networks, and cross-platform behavior optimization.

13
Energy Efficiency

Researchers have used several approaches to address the problem of designing energy
efficient IoT networks:

(a) developing energy-efficient routing protocols to reduce the number of hops


(Machado et al., 2013), optimizing communication link status (Khan et al., 2016),
adopting wake-sleep strategies based on network traffic (Xia and Li, 2013), and data
reduction via controlling the network topology.

(b) incorporating renewable energy devices in the network alongside adopting load-
balancing strategies (Li et al., 2015; Han et al., 2016).

(c) exploiting wireless charging mechanisms to solve the fundamental issue of power
management, especially for large-scale heterogenous IoT networks (Madhja et al.,
2016). However, from a hardware perspective there is a significant need to develop
net-zero-energy sensor nodes, since the current trend is to pack an energy constrained
node with more and more functionality, which could lead to a possible compromise
between fidelity and power efficiency.

14
Grand Challenges in Sensing

Sensing constitutes a vital part within IoT and wireless sensor networks. In a typical
setting, sensed data is sent over the IoT network for post-analysis and inference to get
insights. For the post-processing inference to be valuable, the accuracy of sensors is
fundamental. For this accord, ISO standard 5725:1994 separates accuracy into
precision and trueness while emphasizing the integrity of a sensor (Suzuki et al.,
2019). In contrast, RF sensing utilizes the channel state information for sensing and,
due to its inherent EM nature, it utilizes machine learning for classifying sensed
information and presents additional challenges, such as linearity, repeatability,
resolution, hysteresis, temperature coefficients, stability, and calibration.

Addressing these challenges consequently improves the reliability of RF sensing,


ultimately realizing a possible future for ambient RF sensing. Furthermore, RF
sensing has the advantage of a tactile nature, making it feasible for use in numerous
applications, easily deployable, and cost-effective. The subsequent advances in ML
techniques and RF characterization are envisaged to make RF sensing an integral part
of IoT networks. This is also evident from the recent developments in the THz band
for sensing and communications. Currently, THz is potentially being used for sensing
food and water security (Ren et al., 2019a,b), sensing the cornea of eyes (Ozheredov
et al., 2018), freezing of gait detection in Parkinson's disease (Tahir et al., 2019),
sensing for real time near field imaging (Hillger et al., 2018), detecting corneal tissue
water content (Grundfest et al., 2019), etc. Nevertheless, for the true success of IoT,
we envisage that a variety of sensing instruments will be part of the network and the
above challenges would need to be effectively addressed.

15
IOT Benefits vs Concerns

Benefits:

1. Better Analysis Because You Have More Data Than Ever Before

With multiple devices connected to the internet, you are able to bring together
manufacturing-related data (and many other forms) that will help with reporting,
analysis, visual summaries and being able to pass data from the corporate level to the
branch level in order to increase efficiencies.

2. Maximize Efficiency

Here I am going to talk about one of my favorite parts of the IoT – tracking my
package. Think about it- before you would, maybe, get a window of time on when
your package was supposed to arrive and now I get a text for every step it makes from
leaving the warehouse to arriving at my front door. Again, selfish reasoning but even
back in 2014, Frederico Guerrini wrote in Forbes about how this technology would
transform the postal service. The IoT can make USPS more efficient, I don’t know of
a better case study than that.

3. Decreased Cost

Let’s be honest, it usually comes down to budget. When you take advantage of the
connectivity of your solutions you can monitor on a real time basis and cut on visits
between locations. If you are in healthcare, this can cut down on doctor’s rounds by
giving real-time patient updates. If you are in financial services, you can get real-time
readings from each bank branch.

16
Concerns:

1. Big Data On Steroids

I realize this is directly in contradiction from the #1 point above but let’s be honest,
more data can lead to more problems. The IoT means that you have more devices and
more data than ever before and while that can be great for analysis and for figuring
out new efficiencies, it can also lead to a list of vulnerabilities and alerts so large that
you don’t know where to begin. How do you fix this? You need a vulnerability
management and a threat-detection solution. Why? Because there is just no way that
you, or any human, can go through all of this information and decide what is most
important. With so much data from so many devices in the IoT, you need a
vulnerability management solution and a threat detection solution. One to prioritize
the vulnerability risks so that you can manage down the threat surface and one to
monitor your devices to tell you if, and when, you've been compromised by a bad
actor. However, just like there are thousands of vulnerabilities in your organization,

17
there are thousands of alerts that can come with a threat detection solution. Make sure
you have a solution that will only give you verified alerts rather than wasting time on
alerts that aren’t real.

2. The Threat of Unknown Networks

With the convenience of 24/7 access comes the unknown factor of just where that
24/7 access is taking place. Are you in the office? Are you at home but also on your
VPN network? Then you’ve clearly been listening to your security team. But if you
happen to be on a plane on a coast to coast trip with Wi-Fi that won’t let you connect
to VPN but you also really need to get that proposal done before you land…. You
could be in trouble. That is just one example but I’m sure you can think of plenty
more, especially if you have remote employees or multiple locations. These devices
are connecting to these unknown networks and then coming back home to your safe,
protected network with malware and other vulnerabilities and you must be able to
catch them. Again, here a threat detection solution will monitor anything and every
device that is connected to your network so that you can be sure, anything that is
connected will be monitored and you will be alerted if there are any compromised
devices immediately.

18
3. Admin Passwords

If you are a DevOps person, this may be the time to stop reading. I love developers
but, let’s be honest, they are not usually too concerned about security. They expect
you, your SecOps or your IT security team to take care of that. Therefore, you are left
with administrative passwords like “admin” or “1234” which are easy for them to
remember but also for every bad actor to guess. Again, the convenience of devices
doesn’t always mean it’s convenient for you. Make sure that you are checking,
changing, and enforcing password resets on all of your IoT devices

19
Conclusion And Future Enhancements

Just as with most things in life, there are benefits and threats against introducing the Internet
of Things to your company. What only you and your team can decide is if the benefits
outweigh the risks. When it comes to cyber-security, there are always risks and we all know
that it is not “if” someone can get in but “when” they get in. If you decide to take the risk and
invest in the IoT for your company, make sure that you not only heed the threats listed above
but also have a vulnerability management solution to help you prioritize the threats before
they get in and a solution that will monitor all of your connected IoT devices to give you
verified alerts when there is a threat to your organization.

“What you do makes a difference, and

you have to decide what kind of difference

you want to make.”

- Jane goodall

20
REFERENCES

➢ https://www.google.com/search
➢ https://en.wikipedia.org/wiki/Internet_of_things
➢ Dr. Mazlan Abbas, MIMOS Berhad, Wisma IEM, Petaling Jaya,
➢ GE cloud expo 2014. "Industrial Internet as a Service", by Shyam Varan
Nath, Principal Architect.
➢ Cisco whitepaper, "The Internet of Things" - How the Next Evolution of
the Internet Is Changing Everything, by Dave Evans, April 2011.
➢ https://www.oracle.com
➢ https://studymafia.org

21

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy