IOT Seminar Report
IOT Seminar Report
“ Internet of things(IOT)”
SUBMITTED BY
Abhishek V.
Sontakke Roll No :
203
Seventh Semester
GUIDED BY
Amravati 444701(MS)
“ Internet of things(IOT)”
University, Amravati.
By
Abhishek V. Sontakke
1
ACKNOWLEDGEMENT
There’s quite a bit of confusion around the Internet of Things (IoT). What is it
exactly? Is it something that my business or organization needs to use? If so, how? What are
the use cases? The risks? How do I get started?
Because IoT is such a large concept and there has been so much noise associated
with it in the past few years, it’s easy to dismiss it all as hype. But make no mistake, IoT is a
powerful, long-term approach that every business will need to leverage to succeed in the
future.
We won’t be able to answer all the questions posed above, but this seminar is
intended to equip you with a solid foundation in the Internet of Things and its accompanying
concepts, components, and the technologies that make it all possible. You’ll have a much
better handle on what IoT means and how you might be able to use it to build a new
organization, to launch a new business line within your existing organization, or to simply
improve your internal processes and operations.
No matter which way you look at it, technology has been headed towards automation
for a long time now. In fact, isn’t the very basic principle of technology to make our lives
easier by leaving fewer things to be explicitly done by us? It might be making us all lazier
everyday, or one might argue that it is giving us far greater time to pursue whatever we
desire. Whatever might be the effect, there is no doubt that automation is the future and the
place that it is happening the most significantly is right in our homes.
Name of student
2
ABSTRACT
Technology is shaping the world like never before. The government and business
leaders in India must harness the opportunities offered by technology and its implications on
the future of work.
COVID-19 and the resulting geopolitical fall out have made it more urgent for
corporate leaders to ensure that India is able to respond to the new normal. They also need
to ensure that the country can seize the opportunity to increase its market share in the global
manufacturing economy.
COVID-19 has precipitated companies’ entire focus towards industry 4.0. Two things
that have become more important for companies today are: focusing on adopting digital
technologies that constitute the Industrial 4.0 revolution, and investing in new products and
services that enable them to thrive in the fast evolving economic environment.
This report discusses why we believe IoT, the most critical technology of the
Industrial 4.0 revolution, has a future despite facing continuous challenges in the market. It
covers impending drivers that build a stronger case for the technology. We will also discuss
how the technology could benefit market players by creating opportunities for monetisation
and evolving new business models. Towards the end, the report provides recommendations
on the way forward..
3
Table of Content
1 What is IOT? 5
4 Why IOT? 11
8 References 21
4
What is IOT?
The internet of things, or IoT, is a system of interrelated computing devices, mechanical and
digital machines, objects, animals or people that are provided with unique identifiers (UIDs)
and the ability to transfer data over a network without requiring human-to-human or human-
to-computer interaction.
A thing in the internet of things can be a person with a heart monitor implant, a farm animal
with a biochip transponder, an automobile that has built-in sensors to alert the driver when
tire pressure is low or any other natural or man-made object that can be assigned an Internet
Protocol (IP) address and is able to transfer data over a network.
Increasingly, organizations in a variety of industries are using IoT to operate more efficiently,
better understand customers to deliver enhanced customer service, improve decision-making
and increase the value of the business.
How are you reading this ebook right now? It might be on desktop, on mobile, maybe a
tablet, but whatever device you’re using, it’s most likely connected to the internet.
5
An internet connection is a wonderful thing, it gives us all sorts of benefits that just weren’t
possible before. If you’re old enough, think of your cell phone before it was a smartphone.
You could call and you could text, sure, but now you can read any book, watch any movie, or
listen to any song all in the palm of your hand.
The point is that connecting things to the internet yields many amazing benefits. We’ve all
seen these benefits with our smartphones, laptops, and tablets, but this is true for everything
else too. And yes, we do mean everything.
The Internet of Things is actually a pretty simple concept, it means taking all the physical
places and things in the world and connecting them to the internet.
Confusion arises not because the concept is so narrow and tightly defined, but rather because
it’s so broad and loosely defined. It can be hard to nail down the concept in your head when
there are so many examples and possibilities in IoT.
To help clarify, it’s important to understand the benefits of connecting things to the internet.
Why would we even want to connect everything to the internet?
6
Where did it come from?
Although Ashton's was the first mention of the internet of things, the idea of connected
devices has been around since the 1970s, under the monikers embedded internet and
pervasive computing.
The first internet appliance, for example, was a Coke machine at Carnegie Mellon University
in the early 1980s. Using the web, programmers could check the status of the machine and
determine whether there would be a cold drink awaiting them, should they decide to make the
trip to the machine.
7
IoT evolved from M2M communication, i.e., machines connecting to each other via a
network without human interaction. M2M refers to connecting a device to the cloud,
managing it and collecting data.
Taking M2M to the next level, IoT is a sensor network of billions of smart devices that
connect people, systems and other applications to collect and share data. As its foundation,
M2M offers the connectivity that enables IoT.
The internet of things is also a natural extension of supervisory control and data acquisition
(SCADA), a category of software application programs for process control, the gathering of
data in real time from remote locations to control equipment and conditions. SCADA systems
include hardware and software components. The hardware gathers and feeds data into a
computer that has SCADA software installed, where it is then processed and presented in a
timely manner. The evolution of SCADA is such that late-generation SCADA systems
developed into first-generation IoT systems.
The concept of the IoT ecosystem, however, didn't really come into its own until the middle
of 2010 when, in part, the government of China said it would make IoT a strategic priority in
its five-year plan.
8
How does it operate?
An IoT ecosystem consists of web-enabled smart devices that use embedded systems, such as
processors, sensors and communication hardware, to collect, send and act on data they
acquire from their environments. IoT devices share the sensor data they collect by connecting
to an IoT gateway or other edge device where data is either sent to the cloud to be analyzed
or analyzed locally. Sometimes, these devices communicate with other related devices and
act on the information they get from one another. The devices do most of the work without
human intervention, although people can interact with the devices -- for instance, to set them
up, give them instructions or access the data.
The connectivity, networking and communication protocols used with these web-enabled
devices largely depend on the specific IoT applications deployed.
IoT can also make use of artificial intelligence (AI) and machine learning to aid in making
data collecting processes easier and more dynamic.
9
An IoT system consists of sensors/devices which “talk” to the cloud through some kind of
connectivity. Once the data gets to the cloud, software processes it and then might decide to
perform an action, such as sending an alert or automatically adjusting the sensors/devices
without the need for the user.
But if user input is needed or if the user simply wants to check in on the system, a user
interface allows them to do so. Any adjustments or actions that the user makes are then sent
in the opposite direction through the system: from the user interface, to the cloud, and back to
the sensors/devices to make some kind of change.
That’s how an IoT system works at a high level. Now we’ll take a deeper dive into each of
these components to explain what they are, how they work, and important considerations for
your organization as you consider building and/or implementing IoT solutions.
10
Why IOT?
The internet of things helps people live and work smarter, as well as gain complete control
over their lives. In addition to offering smart devices to automate homes, IoT is essential to
business. IoT provides businesses with a real-time look into how their systems really work,
delivering insights into everything from the performance of machines to supply chain and
logistics operations.
IoT enables companies to automate processes and reduce labor costs. It also cuts down on
waste and improves service delivery, making it less expensive to manufacture and deliver
goods, as well as offering transparency into customer transactions.
As such, IoT is one of the most important technologies of everyday life, and it will continue
to pick up steam as more businesses realize the potential of connected devices to keep them
competitive.
11
Issues and Challenges of IoT
Scalability:
The lack of privacy standards and end-to-end security solutions has been an ongoing
concern for conventional IoT deployment, and wireless IoT faces more challenges in
terms of these aspects (Shafagh et al., 2017). Several technologies are aiming to solve
privacy and security issues from both a hardware and software perspective. For
hardware, RFID and newer releases of 5G and other local network protocols are key
to tackling security issues at a hardware level. In terms of software, Key Management
System (KMS) with a zero-trust network feature and blockchain are rapidly
addressing the privacy and trust threats with reinforced security features (Sicari et al.,
2015; Sun et al., 2019; Xu et al., 2020). With the help of newer communication
protocols, KMS, and blockchain, the grand challenge of IoT devices is the
interdependence of security, privacy, and trust for IoT ecosystems. The challenge
shall always be considered as a holistic goal for optimal integrity and performance.
12
Self-Organization
13
Energy Efficiency
Researchers have used several approaches to address the problem of designing energy
efficient IoT networks:
(b) incorporating renewable energy devices in the network alongside adopting load-
balancing strategies (Li et al., 2015; Han et al., 2016).
(c) exploiting wireless charging mechanisms to solve the fundamental issue of power
management, especially for large-scale heterogenous IoT networks (Madhja et al.,
2016). However, from a hardware perspective there is a significant need to develop
net-zero-energy sensor nodes, since the current trend is to pack an energy constrained
node with more and more functionality, which could lead to a possible compromise
between fidelity and power efficiency.
14
Grand Challenges in Sensing
Sensing constitutes a vital part within IoT and wireless sensor networks. In a typical
setting, sensed data is sent over the IoT network for post-analysis and inference to get
insights. For the post-processing inference to be valuable, the accuracy of sensors is
fundamental. For this accord, ISO standard 5725:1994 separates accuracy into
precision and trueness while emphasizing the integrity of a sensor (Suzuki et al.,
2019). In contrast, RF sensing utilizes the channel state information for sensing and,
due to its inherent EM nature, it utilizes machine learning for classifying sensed
information and presents additional challenges, such as linearity, repeatability,
resolution, hysteresis, temperature coefficients, stability, and calibration.
15
IOT Benefits vs Concerns
Benefits:
1. Better Analysis Because You Have More Data Than Ever Before
With multiple devices connected to the internet, you are able to bring together
manufacturing-related data (and many other forms) that will help with reporting,
analysis, visual summaries and being able to pass data from the corporate level to the
branch level in order to increase efficiencies.
2. Maximize Efficiency
Here I am going to talk about one of my favorite parts of the IoT – tracking my
package. Think about it- before you would, maybe, get a window of time on when
your package was supposed to arrive and now I get a text for every step it makes from
leaving the warehouse to arriving at my front door. Again, selfish reasoning but even
back in 2014, Frederico Guerrini wrote in Forbes about how this technology would
transform the postal service. The IoT can make USPS more efficient, I don’t know of
a better case study than that.
3. Decreased Cost
Let’s be honest, it usually comes down to budget. When you take advantage of the
connectivity of your solutions you can monitor on a real time basis and cut on visits
between locations. If you are in healthcare, this can cut down on doctor’s rounds by
giving real-time patient updates. If you are in financial services, you can get real-time
readings from each bank branch.
16
Concerns:
I realize this is directly in contradiction from the #1 point above but let’s be honest,
more data can lead to more problems. The IoT means that you have more devices and
more data than ever before and while that can be great for analysis and for figuring
out new efficiencies, it can also lead to a list of vulnerabilities and alerts so large that
you don’t know where to begin. How do you fix this? You need a vulnerability
management and a threat-detection solution. Why? Because there is just no way that
you, or any human, can go through all of this information and decide what is most
important. With so much data from so many devices in the IoT, you need a
vulnerability management solution and a threat detection solution. One to prioritize
the vulnerability risks so that you can manage down the threat surface and one to
monitor your devices to tell you if, and when, you've been compromised by a bad
actor. However, just like there are thousands of vulnerabilities in your organization,
17
there are thousands of alerts that can come with a threat detection solution. Make sure
you have a solution that will only give you verified alerts rather than wasting time on
alerts that aren’t real.
With the convenience of 24/7 access comes the unknown factor of just where that
24/7 access is taking place. Are you in the office? Are you at home but also on your
VPN network? Then you’ve clearly been listening to your security team. But if you
happen to be on a plane on a coast to coast trip with Wi-Fi that won’t let you connect
to VPN but you also really need to get that proposal done before you land…. You
could be in trouble. That is just one example but I’m sure you can think of plenty
more, especially if you have remote employees or multiple locations. These devices
are connecting to these unknown networks and then coming back home to your safe,
protected network with malware and other vulnerabilities and you must be able to
catch them. Again, here a threat detection solution will monitor anything and every
device that is connected to your network so that you can be sure, anything that is
connected will be monitored and you will be alerted if there are any compromised
devices immediately.
18
3. Admin Passwords
If you are a DevOps person, this may be the time to stop reading. I love developers
but, let’s be honest, they are not usually too concerned about security. They expect
you, your SecOps or your IT security team to take care of that. Therefore, you are left
with administrative passwords like “admin” or “1234” which are easy for them to
remember but also for every bad actor to guess. Again, the convenience of devices
doesn’t always mean it’s convenient for you. Make sure that you are checking,
changing, and enforcing password resets on all of your IoT devices
19
Conclusion And Future Enhancements
Just as with most things in life, there are benefits and threats against introducing the Internet
of Things to your company. What only you and your team can decide is if the benefits
outweigh the risks. When it comes to cyber-security, there are always risks and we all know
that it is not “if” someone can get in but “when” they get in. If you decide to take the risk and
invest in the IoT for your company, make sure that you not only heed the threats listed above
but also have a vulnerability management solution to help you prioritize the threats before
they get in and a solution that will monitor all of your connected IoT devices to give you
verified alerts when there is a threat to your organization.
- Jane goodall
20
REFERENCES
➢ https://www.google.com/search
➢ https://en.wikipedia.org/wiki/Internet_of_things
➢ Dr. Mazlan Abbas, MIMOS Berhad, Wisma IEM, Petaling Jaya,
➢ GE cloud expo 2014. "Industrial Internet as a Service", by Shyam Varan
Nath, Principal Architect.
➢ Cisco whitepaper, "The Internet of Things" - How the Next Evolution of
the Internet Is Changing Everything, by Dave Evans, April 2011.
➢ https://www.oracle.com
➢ https://studymafia.org
21