0% found this document useful (0 votes)
203 views46 pages

KCA 043 - Question Bank

The document provides an overview of the Internet of Things (IoT), detailing its components, architecture, and the roles of sensors and actuators. It explains the conceptual framework for IoT systems, including data organization and analytics, and differentiates between IoT and Machine to Machine (M2M) communication. Additionally, it discusses data enrichment and consolidation processes essential for effective IoT data analysis.

Uploaded by

pefova5174
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
203 views46 pages

KCA 043 - Question Bank

The document provides an overview of the Internet of Things (IoT), detailing its components, architecture, and the roles of sensors and actuators. It explains the conceptual framework for IoT systems, including data organization and analytics, and differentiates between IoT and Machine to Machine (M2M) communication. Additionally, it discusses data enrichment and consolidation processes essential for effective IoT data analysis.

Uploaded by

pefova5174
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 46

UNIT-1

(Important Questions)
1. What is IoT? What are the different components for IoT devices? Explain
architectural view of IoT.

Ans: Internet of Things (IoT) refers to a network of interconnected physical devices that
can collect and exchange data using embedded sensors, software, and other technologies
over the Internet. These devices, often referred to as "smart devices," can range from home
appliances and wearables to industrial machines and vehicles.

The goal of IoT is to make systems more efficient, intelligent, and responsive by enabling
real-time communication and automation.

Components of IoT Devices


The main components of an IoT system include:
1. Sensors/Actuators
o Sensors gather data from the environment (e.g., temperature, humidity).
o Actuators perform actions (e.g., turn on a fan).
2. Connectivity Module
o Allows the device to connect to the Internet or other devices (e.g., Wi-Fi,
Bluetooth, Zigbee, cellular networks).
3. Microcontroller/Microprocessor
o Acts as the brain of the device. It processes the data from sensors and
controls actuators.
4. Power Supply
o Provides power to the device (e.g., batteries, solar cells).
5. Cloud or Server
o Stores and processes the collected data.
6. User Interface
o Allows users to monitor and
control the IoT device
through mobile apps or web
dashboards

Architectural View of IoT


 Architecture means a description of relationships between the conceptual
elements, target system elements and design principles.
 Architectural view means a model of the elements and their relationships.
 The IoT domain covers an extremely wide range of technologies.
 A number of architecture views (models) are suggested for IoT. Various
architectural views are:
• Functional view
• Information view
• Deployment and Operational view
• Domain based view

The service oriented architecture has architectural view of layers, domain and service
capabilities. The service oriented architecture has four layers namely sensing layer,
network layer, service layer and Interface layer.

The IoT architecture typically consists of four layers:

1) The bottom most layer / sensing layer : Whose prime responsibility is data
sensing or taking care of the acquisition protocols.
a. Various sensing devices like RFID tags, intelligent sensors, RFID
readers, Bluetooth Low Energy (BLE) devices, wireless sensor
networks etc. constitute the sensing layer.
2) The network layer : Above the sensing layer comprises of wireless sensor
networks, Internet, mobile networks, databases, social networks and wireless
LANs.
a. It is responsible for providing communication and connectivity
between devices in the IoT system.
b. Ensures secure and reliable data transmission.
c. Commonly used in IoT include WiFi, Bluetooth, Zigbee, and cellular
networks such as 4G and 5G technology.
3) The service layer: comprises of business logic, service repository, service
division and service integration.
a. Manages services and devices, handles data processing, storage, and
decision-making.
b. Example: IoT platforms like AWS IoT Core, Google Cloud IoT, or
middleware handling service orchestration.
4) The application layer: Front end, contract, API and interface forms the
topmost layer called the Interface layer.

Note : Security is a matter of concern in all layers from top to bottom.

2. Discuss sensors and actuators are used in IoT network. Also define purposes
in detail.
Ans: Generally, sensors are used in the architecture of IOT devices.
Sensors are used for sensing things and devices etc.
Sensors are used in IoT to serve various functional and operational purposes, which enable
the digital system to understand the physical environment.

 Classification of Sensors:
 Passive & Active
 Analog & digital
 Scalar & vector

1. Passive Sensor –
Can not independently sense the input. Ex- Accelerometer, soil moisture, water level
and temperature sensors.
2. Active Sensor –
Independently sense the input. Example- Radar, sounder and laser altimeter sensors.
3. Analog Sensor –
The response or output of the sensor is some continuous function of its input
parameter. Ex- Temperature sensor, LDR, analog pressure sensor and analog hall
effect.
4. Digital sensor –
Response in binary nature. Design to overcome the disadvantages of analog sensors.
Along with the analog sensor, it also comprises extra electronics for bit conversion.
Example – Passive infrared (PIR) sensor and digital temperature sensor(DS1620).

Note : Differentiate between digital and analog sensor exam point of view (2 marks )
5. Scalar sensor –
Detects the input parameter only based on its magnitude. The answer for the sensor
is a function of magnitude of some input parameter. Not affected by the direction of
input parameters.
Example – temperature, gas, strain, color and smoke sensor.
6. Vector sensor –
The response of the sensor depends on the magnitude of the direction and
orientation of input parameter.
Example – Accelerometer, gyroscope, magnetic field and motion detector sensors.

 Purpose of Sensors:
 Data Collection from Environment
Sensors continuously monitor and collect data such as temperature, humidity,
motion, pressure, etc., which forms the basis for IoT intelligence.

 Real-Time Monitoring
Sensors provide instant data updates which help in real-time decision-making.
Example: In a smart home, a smoke sensor instantly detects fire and sends alerts.

 Remote Sensing and Accessibility


Sensors enable remote monitoring of inaccessible or hazardous environments.
Example: Industrial sensors in oil rigs or chemical plants for safety.

 Automation Enablement
Sensor data is used to trigger automatic actions through actuators or systems.
Example: Light sensors turning on street lights at dusk.

 Predictive Maintenance
By continuously collecting data, sensors help predict failures and optimize
maintenance schedules.
Example: Vibration sensors in manufacturing equipment.
 Energy Efficiency
Sensor Type Parameter Measured Example Use Case

Temperature Sensor Heat/temperature Smart thermostats

Humidity Sensor Moisture in air Agricultural IoT, greenhouses

Light Sensor Ambient light levels Smart lighting systems

Proximity Sensor Object presence/distance Smart parking, security systems

Gas Sensor Gas concentration Air quality monitoring

Pressure Sensor Physical pressure Weather stations, health devices

Accelerometer Motion, orientation Fitness trackers, vehicle systems

Environmental sensors help optimize energy use by adjusting lighting, HVAC


systems, etc.
Example: Occupancy sensors turning off lights in empty rooms.
 Types of sensors:

 Actuators and its purpose:


Definition: An actuator is a device that converts electrical signals into physical action,
based on the decisions made by an IoT system or controller.

Purposes of actuators:

 Physical Action Execution


Actuators carry out real-world tasks based on commands received from IoT
systems.
Example: A motor turning the blades of a smart fan.

 Automation of Tasks
They are used to automate repetitive tasks, reducing the need for human
intervention.
 Example: Smart door locks opening when a user is nearby.
 Response to Sensor Inputs
Actuators perform actions based on real-time sensor data.
 Example: If a soil moisture sensor detects dryness, an actuator opens the irrigation
valve.
 Controlling Mechanical Systems
In industrial IoT, actuators control machinery and robotic arms for precise
manufacturing processes.
 Enhancing System Efficiency
By quickly reacting to system commands, actuators ensure the system operates
optimally and efficiently.
 Safety and Emergency Response
Actuators can be used in safety systems to shut down equipment or open emergency
exits when triggered.
Example: Gas leakage detected → actuator closes the gas valve.
3. Describe the conceptual framework using equation which gives the steps
at various levels or layers in IoT system.
Ans: The following equation describes a simple conceptual framework of IoT:
Physical Object + Controller, Sensor and Actuators + Internet = Internet of Things ………… 1

Equation 1:
 It conceptually describes the IoT consists of an internetwork of devices and
physical objects wherein a number of objects can gather the data at remote
locations and communicate to units managing, acquiring, organising and
analysing the data in the processes and services.
 A general framework consists of the number of devices communicating data to a
data centre or an enterprise or a cloud server. The IoT framework of IoT used in
number of applications as well as in enterprise and business processes is therefore,
in general, more complex than the one represented by Equation 1.
The equation below conceptually represents the actions and communication of data at
successive levels in IoT consisting of internetworked devices and objects.

Gather + Enrich + Stream + Manage + Acquire + Organise and Analyse = Internet of Things with
connectivity to data centre, enterprise or cloud server……….2

Equation 2:
It is an IoT conceptual framework for the enterprise processes and services, based on a
suggested IoT architecture given by Oracle.
The steps are as as follows:

1. At level 1 data of the devices (things) using sensors or the things gather the pre data
from the internet.
2. A sensor connected to a gateway, functions as a smart sensor (smart sensor refers to a
sensor with computing and communication capacity).
The data then enriches at level 2, for example, by transcoding at the gateway.
Transcoding means coding or decoding before data transfer between two entities.
3. A communication management subsystem sends or receives data streams at level 3.
4. Device management, identity management and access management subsystems
receive the device’s data at level 4.
5. A data store or database acquires the data at level 5.
6. Data routed from the devices and things organizes and analyses at level 6.

For example, data is analyzed for collecting business intelligence in business processes.
The equation below is an alternative conceptual representation for a complex system.
It is based on IBM IoT conceptual framework.
The equation shows the actions and communication of data at successive levels in IoT.
The framework manages the IoT services using data from internetwork of the devices and
objects, internet and cloud services, and represents the flow of data from the IoT devices
for managing the IoT services using the cloud server.

Gather + Consolidate + Connect + Collect + Assemble + Manage and Analyse = Internet


of things with connectivity to cloud services…………3

Equation 3:
It represents a complex conceptual framework for IoT using cloud-platform based
processes and services.
The steps are as follows:

1. Levels 1 and level 2 consist of a sensor network to gather and consolidate the data.
First level - gathers the data of the things (devices) using sensors circuits. The sensor
connects to a gateway. Data then consolidates at the second level.
For example, transformation at the gateway at level 2.
2. The gateway at level 2 communicates the data streams between levels 2 and 3. The
system uses a communication-management subsystem at level 3.
3. An information service consists of connect, collect, assemble and manage
subsystems at levels 3 and 4. The services render from level 4.
4. Real time series analysis, data analytics and intelligence subsystems are also at levels 4
and 5. A cloud infrastructure, a data store or database acquires the data at level 5.

4. Express how to organizing and analytics in IoT/M2M. Also differentiate M2M and IoT.
Ans: Organizing refers to how data and devices are structured, managed, and prepared for
analysis.
Steps in Organizing:

 Device Identification and Registration: Each device is uniquely identified (using


IP, MAC, ID) and registered in the system.
 Data Classification: Data is grouped by source (e.g., sensor type), time, location, or
application.
 Storage Management: Organized into databases (e.g., NoSQL, cloud storage, edge
storage).
 Protocol Management: Communication organized using standards like MQTT,
CoAP, HTTP.

Analytics in IoT/M2M:

Analytics involves extracting insights from the collected data to enable automation,
prediction, and decision-making.

Descriptive Analytics: What happened? (e.g., daily temperature logs)


Diagnostic Analytics: Why did it happen? (e.g., why machine vibration increased)
Predictive Analytics: What might happen? (e.g., predicting a device failure)
Prescriptive Analytics: What action to take? (e.g., shut down machine to prevent
damage)

Tools used may include:

 Big Data platforms (e.g., Apache Hadoop, Spark)


 AI/ML algorithms for pattern detection and prediction
 Dashboards and Visualization tools (e.g., Power BI, Grafana)
 Difference between IoT and M2M

Basis of IoT M2M

Abbreviation Internet of Things Machine to Machine

The connection is via Network


Connection type The connection is a point to
and using various communication
used point
types.

Traditional protocols and


Communication Internet protocols are used such
communication technology
protocol used as HTTP, FTP, and Telnet.
techniques are used

Data is shared between other


applications that are used to Data is shared with only the
Data Sharing
improve the end-user communicating parties.
experience.

Internet connection is required for Devices are not dependent


Internet
communication on the Internet.

Type of It supports point-to-point


It supports cloud communication
Communication communication.

Involves the usage of both Mostly hardware-based


Computer System
Hardware and Software. technology

A large number of devices yet


Scope Limited Scope for devices.
scope is large.

Business Type Business 2 Business(B2B) and


Business 2 Business (B2B)
used Business 2 Consumer(B2C)

There is no support for Open


Open API support Supports Open API integrations.
APIs
Basis of IoT M2M

It requires Generic commodity devices. Specialized device solutions.

Communication and device


Centric Information and service centric
centric.

Vertical system solution


Approach used Horizontal enabler approach
approach .

Devices/sensors, connectivity, Device, area networks,


Components
data processing, user interface gateway, Application server.

Smart wearables, Big Data and Sensors, Data and


Examples
Cloud, etc. Information, etc.

5. Write short note on the following:


a) Data enrichment and consolidation
 Ans : Data enrichment in the Internet of Things (IoT) refers to the process of
enhancing raw data collected from IoT devices by adding context,
 meaning, and additional information to make it more valuable and useful for
analysis and decision-making.
 This can involve combining the raw data with other data sources, applying
algorithms, or using metadata to provide deeper insights.
Key aspects of data enrichment in IoT
Contextualization
 Adding contextual information such as time, location, or environmental conditions
to the raw data to make it more meaningful.

 For example, temperature readings from sensors are more valuable when paired with
the exact time and location of the measurement.
Integration with External Data
 Combining IoT data with external data sources, such as weather data, traffic
information, or social media feeds,

 to provide a more comprehensive understanding of the situation.


Data Aggregation
 Summarizing or aggregating data from multiple IoT devices to identify trends or
patterns.

 For instance, aggregating energy usage data from multiple smart meters

 can help in analyzing overall energy consumption patterns in a neighborhood.


Application of Algorithms
 Using machine learning and other algorithms to analyze and interpret the data,

 identifying anomalies, predicting future events, or providing actionable insights.

 For example, predictive maintenance algorithms can analyze data from machinery
sensors to predict when maintenance is needed.
Adding Metadata
 Enhancing raw data with metadata, which provides additional details about the data,
such as the source, format, or quality.

 Metadata helps in organizing, searching, and understanding the data more

Data consolidation:
 Data integration is the process of combining data from multiple sources into a
unified database.

 This process is essential for achieving a comprehensive view of the data, improving
data quality, and enabling more effective analysis.

 In Internet of Things (IoT), data consolidation involves aggregating data

 collected from various IoT devices, sensors, and systems into a centralized database
or data warehouse
Key aspects of data consolidation

Data Aggregation
 Gathering data from different IoT devices and sources, such as sensors, machines,
and external databases, and combining it into a single dataset.

 This step ensures that all relevant data is available in one place for analysis.
Data Cleaning
 Identifying and correcting errors, inconsistencies, and duplicates in the collected
data.
 Data cleaning is crucial to ensure that the consolidated dataset is accurate, reliable,
and ready for analysis.
Data Transformation
 Converting data from different formats and structures into a standardized format.

 This step ensures that data from various sources can be easily integrated and
compared within the unified dataset.
Data Integration

Merging data from different sources while preserving its integrity and consistency.

 Data integration often involves resolving conflicts and discrepancies between


datasets to create a cohesive and accurate consolidated dataset.
Data Storage
 Storing the consolidated data in a centralized repository, such as a data warehouse
or cloud storage.

 This repository provides a single source of truth for the data, making it easier to
access, manage, and analyze

b. Ease of designing and affordability


Ans : Ease of Designing
 The concept of ease of designing in IoT (Internet of Things) pertains to the
simplicity,
 efficiency, and user-friendliness of the design process for IoT solutions. Here's how
it applies:
Intuitive Design Tools
 Design tools specific to IoT, such as IoT development platforms and integrated
development environments (IDEs), should be intuitive and user-friendly.

 These tools should simplify the process of creating IoT applications, enabling
designers to easily prototype, iterate, and refine their ideas.
Modular and Reusable Components
 Designing IoT solutions becomes easier when designers can leverage modular and
reusable components.
 This allows them to quickly assemble and integrate various hardware
and software modules to create custom IoT devices and applications without
starting from scratch.
Prototyping and Simulation
 Ease of designing IoT solutions is enhanced through tools that support rapid
prototyping and simulation.
 Designers can create virtual prototypes of IoT devices and systems, simulate their
behavior in different scenarios.
Visualization and Interface Design
 Visualization tools and interface design frameworks play a crucial role in IoT
design.
 Designers should have access to tools that allow them to create intuitive user
interfaces and visualize data from IoT devices in a clear and actionable manner,
enhancing the overall user experience.
Collaboration and Integration
 Collaboration tools and integration capabilities facilitate teamwork among
designers, developers, engineers, and stakeholders involved in IoT projects.
 Designers should be able to seamlessly collaborate, share ideas, and integrate their
work with other team members' contributions to ensure cohesion and alignment
throughout the design process.
Documentation and Support
 Comprehensive documentation and support resources are essential for designers
working on IoT projects.

 Access to tutorials, guidelines, reference materials, and community forums can help
designers navigate challenges

In Internet of Things (IoT), affordability refers to the cost-effectiveness of IoT
solutions, devices, and infrastructure.

 It encompasses several aspects related to the financial accessibility and


sustainability of IoT implementations.

Affordability :
 In Internet of Things (IoT), affordability refers to the cost-effectiveness of IoT
solutions, devices, and infrastructure.

 It encompasses several aspects related to the financial accessibility and


sustainability of IoT implementations.

Cost-Effective Solutions
 IoT solutions should be designed and developed with a focus on minimizing costs
without compromising quality, performance, or security.

 This involves optimizing hardware, software, and deployment processes to reduce


expenses associated with manufacturing, installation, maintenance, and operation.
Affordable Devices and Components
 IoT devices, sensors, and components should be affordable and accessible to a
wide range of users, including individuals, businesses, and organizations with
varying budgets and resources.
 This may involve leveraging cost-effective materials, manufacturing
techniques, and supply chains to keep production costs low.
Scalability and Cost Efficiency
 IoT deployments should be scalable and cost-efficient, allowing for incremental
expansion and growth without significant increases in expenses.
 This includes designing systems that can accommodate additional devices, users,
and data volume without substantial investments in infrastructure or resources.
Energy Efficiency
Affordability in IoT also involves minimizing energy consumption and operational costs
associated with IoT devices and networks.
Energy-efficient designs, low-power components, and optimized communication protocols help reduce
electricity bills and extend the lifespan of battery-powered devices.

Total Cost of Ownership (TCO)


 Affordability considerations in IoT extend beyond initial purchase costs to include
the total cost of ownership over the device or solution's lifecycle.
 This encompasses ongoing expenses such as maintenance, upgrades, software
updates, data storage, and support services.

c. Industrial Internet of Things(IIoT)


Ans : The Industrial Internet of Things (IIoT) refers to the application of IoT
technologies in industrial sectors like manufacturing, transportation, energy, and
healthcare. It focuses on connecting machines, sensors, and devices to optimize
operations, improve efficiency, and enable automation. Here's a breakdown:

Key Features of IIoT:

1. Machine-to-Machine Communication (M2M): IIoT relies heavily on M2M


communication to enable seamless data exchange between industrial equipment.
2. Big Data and Analytics: It uses advanced analytics to process large volumes of
data collected from sensors and devices, providing actionable insig hts.
3. Predictive Maintenance: IIoT helps monitor equipment health and predict
failures before they occur, reducing downtime and maintenance costs.
4. Edge Computing: Data is processed closer to the source (at the edge) for faster
decision-making, rather than relying solely on centralized cloud systems.
5. Cyber-Physical Systems: Integration of physical machines with software and
communication technologies for enhanced automation.
Applications of IIoT:

 Smart Factories: Automated production lines with real-time monitoring and


optimization.
 Energy Management: Efficient use of resources in power plants and grids.
 Healthcare: Advanced medical devices and systems for patient monitoring.
 Transportation: Connected vehicles and logistics systems for improved
efficiency.

IIoT is a cornerstone of Industry 4.0, driving innovation and transforming traditional


industrial processes. Let me know if you'd like to explore specific use cases or
technologies

UNIT-2
(Important Questions)
1. Explain the concept and terminology of RFID technology. Illustrate the working of RFID
communication. Write its IoT application areas in detail?
Ans: Concept of RFID:
RFID (Radio Frequency Identification) is a wireless communication technology.
• It uses radio waves to automatically identify tagged objects or things.
• It transmits data from an RFID tag to an RFID reader using an antenna, enabling
accurate
and real-time tracking.
• RFID technology is capable of storing, recovering, and re-recording a vast
amount of data
(up to four million characters and thousands of bytes) on a small chip
• RFID technology is widely used in several commercial and industrial applications
to search,
identify, track, and communicate with various objects, people, items, or things.
• It automates the collection of data and reduces human effort and error.
Terminology in RFID Technology
Term Description
A small device attached to the object to be tracked. Contains a microchip
RFID Tag
and an antenna.
RFID Reader A device that emits radio waves and captures responses from RFID tags.
Antenna Sends and receives radio signals between the reader and the tag.
EPC (Electronic Product
A unique identifier stored on the tag.
Code)
Frequency Bands RFID works in LF (125–134 kHz), HF (13.56 MHz), and UHF (860–960 MHz).
Working of RFID communication:-
step-by-Step Communication Process:

1. Initiation:
The RFID reader emits radio frequency signals through its antenna.
2. Tag Activation:
When an RFID tag enters the range of the reader, it gets powered (in passive tags)
and becomes active.
3. Data Transmission:
The tag sends its stored data (like ID or product info) back to the reader via radio
waves.
4. Data Processing:
The reader forwards this data to a backend system for processing, storage, or
decision-making.

Application areas of RFID Technology:


• Inventory Management (Retail, Warehouses)
• Access Control (Secure Entry, Employee ID Cards)
• Logistics & Supply Chain (Tracking Shipments)
• Healthcare (Patient & Equipment Tracking)
• Animal Tracking (Livestock Management
• Supply Chain Management: Enhancing transparency and efficiency from
production to delivery.
2. What is wireless sensor networks? What are the characteristics and
applications?
Ans : WSN consists of multiple sensor nodes that communicate wirelessly to collect
and transmit data to a central system for processing and decision-making.
 A wireless sensor network (WSN) is a network of small, low power and
autonomous devices, also known as nodes, that are deployed in a given
environment to measure and monitor various environmental parameters.
 These nodes are interconnected with each other and can communicate with
each other either directly or indirectly.
 They are typically powered by batteries or other energy sources and can be used
for a variety of applications, such as monitoring temperature, humidity, air
quality, weather, and more.

Note : complete reference slides(46-56) of UNIT-2

Each sensor node typically consists of:

 Sensing unit
 Microcontroller
 Communication module (transceiver)
 Power source (battery or energy harvesting

Classification of Wireless Sensor Networks


Wireless Sensor Networks in general can be classified into the following categories.
 Static and Mobile WSN
 Deterministic and Nondeterministic WSN
 Single Base Station and Multi Base Station WSN
 Static Base Station and Mobile Base Station WSN
 Single-hop and Multi-hop WSN
 Self – Reconfigurable and Non – Self – Configurable WSN
 Homogeneous and Heterogeneous WSN

Network Topologies in WSN

 Star Topology
 Tree Topology
 Mesh Topology

Applications of Wireless Sensor Networks


Theoretically speaking, the possible applications of Wireless Sensor Networks are unlimited.
Some of the commonly used applications of wireless sensor networks are listed below.

 Air Traffic Control (ATC)


 Heating Ventilation and Air Conditioning (HVAC)
 Industrial Assembly Line
 Automotive Sensors
 Battlefield Management and Surveillance
 Biomedical Applications
 Bridge and Highway Monitoring
 Disaster Management
 Earthquake Detection
 Electricity Load Management
 Environment Control and Monitoring
 Industrial Automation
 Inventory Management
 Personal Health Care
 Security Systems
 Tsunami Alert Systems
 Weather Sensing and Monitoring

Define the relationship between WSN and IoT.

 Ans: The Internet of Things (IoT) and Wireless Sensor Networks (WSN) are two
closely related technologies, but they serve different purposes and have distinct
characteristics.
 Wireless Sensor Networks (WSN)
 A Wireless Sensor Network (WSN) is a collection of autonomous devices that create an
ad hoc network to gather information from the physical environment.
 These devices, or nodes, are typically low-powered and communicate using specific
protocols.
 WSNs are used to collect data from various sources and send it to a central server or
gateway for processing.
 Examples of WSN applications include monitoring environmental conditions,
infrastructure management, and healthcare.
 Key Features of WSN:
o Architecture: WSNs consist of multiple sensor nodes that can be arranged in
o different topologies, such as star or hub topology. These nodes collect data and
send it to a central hub or server.
o Devices: The nodes in a WSN are small, mobile, and often battery-powered. They
use energy harvesting as their primary power source.
o Protocols: WSNs use various routing protocols, including DSR, AODV, OLSR,
and ZRP

Internet of Things (IoT)

The Internet of Things (IoT) is a network of connected devices that can communicate with each
other and the internet. IoT devices can range from smartphones and home appliances to industrial
machines and wearables. The primary goal of IoT is to connect the physical world to the internet,
enabling real-time data collection, analysis, and control1.

Key Features of IoT:


 Architecture: IoT systems have a gateway that connects to internetworks, including routers,
switches, and access points. IoT devices can send and receive data over the internet.
 Devices: IoT devices include both consumer and industrial hardware, such as smartwatches,
smart thermostats, and remote monitoring systems.
 Protocols: IoT uses IPv6 in the sensor network and IPv4 on the internetwork portion. Routing
protocols in IoT include AODV and RPL.

2. Compare the features of of Intel Galileo, Raspberry and BeagleBone boards for the IoT
applications.

Ans:  Intel Galileo is Arduino-compatible and designed for x86-based embedded


development. It supports Linux and is better for industrial IoT but lacks strong
community and software support.

Features of Intel Galileo Board:

 The microcomputer is equipped with Intel® Quark™ SoC X1000.


 Operating at speeds of up to 400 MHz.
 A motherboard with up to 8 Mb of flash memory and 256 RAM.
 The device also has a VLAN port available with the 100Mb capacity.
 A micro SD card and mini PCI express slots, RS 232.
 USB 2.0 ports with a possibility to connect up to 128 devices.
 This platform works with a very light distribution of Linux and a standard
environment of Arduino.
 Intel Galileo has such features as its own USB controller and data exchange
without SPI components.
 Another cool feature is that there is an expansion slot for PCI Express for Wi-Fi,
Bluetooth and 3G installation.
 Intel Galileo supports the Arduino IDE.

Raspberry Pi is most popular due to its powerful processor, rich OS support, and large
community. It is ideal for DIY IoT, home automation, edge computing, and multimedia
IoT applications.

Features of Raspberry Pi:


 Superior software implementation
 64-bit Quad-core processor
 Large RAM (latest Raspberry Pi 4 Model B Board has up to 8G of RAM)
 Processor speed- 700MHz- 1.5GHz
 Raspberry Pi has 40 input/output pins.
 It can be connected to the Internet.
 It can run all kinds of applications (including MS Office and Email).
 It contains everything- CPU (Central Processing Unit), GPU (Graphics Processing
Unit), Ethernet port, GPIO (General-purpose Input/Output) pins, and power
source connector.

BeagleBone Black offers more GPIO pins and real-time control features, making it ideal
for robotics, industrial control, and low-level sensor interfacing.

Features of Beagle Bone Board:

 Processor: 1GHz AM335x ARM Cortex-A8 (from Texas Instruments)


 RAM: 512MB DDR3
 Storage: 4GB onboard eMMC + microSD card slot
 Connectivity: USB host, micro-USB (power & OTG), Ethernet (10/100)
 GPIO Pins: 65+ available for input/output, PWM, UART, SPI, I2C, etc.
 HDMI Output: Mini HDMI port for display
 Linux-based OS: Ships with Debian, but also supports Ubuntu, Android, and others

3. Why we use Arduino? Discuss the different Arduino Board with their features.
Determine some differences between Arduino and Raspberry Pi.

Ans : we use an Arduino board because it provides a simple and accessible way to build
and program electronic projects. Here are the main reasons why Arduino is popular:

1. Easy to Use: Arduino is beginner-friendly. Its programming environment (Arduino


IDE) is simple and easy to learn, especially for those new to electronics or coding.
2. Open Source: The hardware and software are open source, meaning anyone can
study, modify, and improve the design.
3. Versatile: It can be used for a wide range of applications — from blinking LEDs to
controlling robots, reading sensors, and automating home systems.
4. Large Community: A huge online community provides tutorials, examples, and
support for both beginners and advanced users.
5. Affordable: Arduino boards are relatively inexpensive compared to other
microcontroller platforms.
6. Ready-to-Use Hardware: It comes with built-in I/O pins, voltage regulators, and a
USB interface, making it easy to connect to sensors, motors, and computers.

Different Arduino Boards and their features:


 Arduino Uno
 Microcontroller: ATmega328P
 Operating Voltage: 5V
 Digital I/O Pins: 14 (6 PWM)
 Analog Input Pins: 6
 Flash Memory: 32 KB
 Features:
o Most commonly used and beginner-friendly board.
o Ideal for simple projects and learning purposes.
o Strong community support and abundant resources.

 Arduino Mega 2560


 Microcontroller: ATmega2560
 Operating Voltage: 5V
 Digital I/O Pins: 54 (15 PWM)
 Analog Input Pins: 16
 Flash Memory: 256 KB
 Features:
o Suitable for projects requiring a large number of I/O pins.
o Used in robotics, automation, and complex sensor systems.

 Arduino Nano
 Microcontroller: ATmega328P
 Operating Voltage: 5V
 Digital I/O Pins: 22 (6 PWM)
 Analog Input Pins: 8
 Flash Memory: 32 KB
 Features:

o Compact and breadboard-friendly.


o Ideal for space-constrained projects.
 Arduino Due
 Microcontroller: ARM Cortex-M3 (SAM3X8E)
 Operating Voltage: 3.3V
 Digital I/O Pins: 54 (12 PWM)
 Analog Input Pins: 12
 Flash Memory: 512 KB
 Features:
o 32-bit processor with higher speed and memory.
o Used in advanced applications like audio processing and large data handling.

4. Discuss participatory sensing technology and its components.


Ans: Participatory sensing is the process where by individuals and communities use ever-
more-capable mobile phones and cloud services to collect and analyze systematic data for
use in discovery.
The convergence of technology and analytical innovation with a citizenry that is increasingly
comfortable using mobile phones. Participatory sensing enables the collection of real-time
data on a massive scale, allowing for more comprehensive and accurate analysis.
Crowdsourcing data collection involves incentivizing individuals to contribute their data.
Incentives can be in the form of rewards, recognition, or access to personalized services.
Mobile crowd sensing utilizes the sensors present in smartphones to collect data.
Smartphones are equipped with various sensors, including GPS, accelerometer, gyroscope,
microphone, and camera.
These sensors can capture information about the user's location, movement, sound, and
visual surroundings.
Data fusion techniques are used to combine data from multiple sources and generate
meaningful insights.

Phase 1 coordination, in which the participants of PS process organize after


identifying the sources.
Phase 2 and 3 data capture, communication and storage on servers or cloud.
Phases4 and 5—PS data processing and analytics, visualization and knowledge
discovery.
Phase 6 is for initiating appropriate actions.

Components of Participatory Sensing:

1. Sensing Devices:
o Typically smartphones or wearable sensors.
o Equipped with GPS, camera, microphone, accelerometer, etc.
o Used to sense environmental data (e.g., noise, temperature,
pollution).
2. Users (Participants):
o Individuals who voluntarily collect and share data.
o May be incentivized or motivated by personal, social, or civic
reasons.
3. Data Collection Applications:
o Mobile apps or platforms used to gather and submit data.
o Example: apps for reporting potholes, air quality, or traffic
congestion.
4. Communication Network:
o Data is transmitted via mobile networks, Wi-Fi, or the Internet.
o Ensures real-time or batch uploading of collected information.
5. Data Aggregation and Processing System:
o Back-end servers or cloud infrastructure to collect and process
data.
o Uses algorithms to clean, analyze, and visualize data.
6. Data Consumers:
o Government agencies, researchers, NGOs, or the general public.
o Use the data for decision-making, urban planning, or awareness.

Applications of Participatory Sensing:

 Environmental Monitoring: Air and noise pollution mapping.


 Urban Planning: Reporting infrastructure issues (e.g., broken lights,
potholes).
 Healthcare: Monitoring health trends through fitness trackers.
 Disaster Management: Real-time citizen reports during emergencies.
 Traffic Monitoring: Crowdsourced traffic data for smart navigation.

UNIT-3
(Important Questions)
5. Examine the different issues faced during wireless medium access in IoT.

Ans: When it comes to communication using a wireless medium there is always a


concern about the interference due to other present wireless communication
technologies. Wireless means communication and message transfer without
the use of physical medium i.e., wires.
 Limited bandwidth: IoT devices often have limited processing and
communication capabilities, leading to low data rates.This can cause a
bottleneck when multiple devices are trying to access the wireless
medium simultaneously.
 Energy consumption: Many IoT devices are battery-powered and have
limited energy resources. Transmitting and receiving data wirelessly
consumes a significant amount of energy, and as such, IoT devices need
to conserve energy to extend their battery life.
 Security: IoT devices are often deployed in uncontrolled environments,
making them vulnerable to security breaches.Wireless medium access
needs to be secure to protect sensitive data from being intercepted by
unauthorized parties.
 Scalability:With the increasing number of IoT devices being
deployed,there is a need for a wireless medium access
scheme that can scale to accommodate the increasing demand for
connectivity.

 The very important issues which are observed are:


o Half Duplex operation,
o Time-varying channel
o Burst channel errors.
o
Half-duplex operation:
Half-duplex transmission means when the sender and receiver both are capable of sharing
data but one at a time.In wireless transmission, it is difficult to receive data when the
transmitter is sending the data because during transmission a large amount or a large
fraction of signal energy is leaked while broadcasting.
The magnitude of the transferred signal and received signal differs a lot.
Due to which collision detection is even not possible by the sender as the intensity of
the transferred signal is large than the received one.
Hence this causes the problem of collision and the prime focus should be to minimize
the collision.
How to Overcome Half-Duplex Issues?

 Use full-duplex technology (e.g., modern Ethernet, 5G).


 Upgrade to Wi-Fi 6 or newer, which improves efficiency using better scheduling.
 Use multiple access points to distribute network load.

Time-varying channel :

Time-varying channels include the three mechanisms for radio signal propagations they
are Reflection, Diffraction, and Scattering.
 Reflection –This occurs when a propagating wave carrying information intrudes on an
object that has very large dimensions than the wavelength of the wave.
 Diffraction –This occurs when the radio path between the transmitter and the receiver
is collided by the surface with sharp edges. This is a phenomenon which causes the
diffraction of the wave from the targeted position.
 Scattering –This occurs when the medium through from the wave is traveling consists
of some objects which have dimensions smaller than the wavelength of the wave.

Burst channel errors


Burst channel errors are called as a contiguous sequence of symbols, which are received
in a communication channel, in which the first and last symbols has an error and there
is no evidence of contiguous sub-sequence of corrected received symbols.
Burst channel errors occur when the start and last symbols in a communication channel
are incorrect, and there is no indication of a contiguous subsequence of corrected
received symbols.
For Example,
Watching a digital TV broadcast – If there is interference (like heavy rain), the entire
screen may glitch or freeze because multiple bits are lost together (not just a single
pixel).
Mobile Data Transmission – If you’re in a weak signal area, a burst error may cause
an entire part of a message or webpage to be missing or unreadable.

6. Describe in detail with suitable example CoAP and MQTT protocols used in application
layer.

Ans: The application layer in IoT architecture enables devices to communicate, interpret,
and process data in a way that applications and users can understand. Two widely used
lightweight protocols at this layer are:

 MQTT (Message Queuing Telemetry Transport)


 CoAP (Constrained Application Protocol)

Constrained Application Protocol: The constrained application protocol is client-


server-based. With this protocol, the COAP packet can be shared between different
client nodes which are commanded by the COAP server. The server is responsible for
sharing the information depending on its logic but has not acknowledged it. This is used
with the applications which support the state transfer model.
Characteristics of COAP
 UDP-Based: CoAP uses UDP (User Datagram Protocol) instead of TCP, making it
suitable for limited resources and networks.
 HTTP-Like Semantics: CoAP employs HTTP-like methods (GET, POST, PUT, DELETE) for
interactions.
 Multicast Support: CoAP includes UDP’s multicast feature, which TCP lacks.
 Low Overhead: CoAP minimizes protocol overhead for efficient communication in
constrained environments.

Message Queuing Telemetry Transport?

Message Queuing Telemetry Transport is a communication-based protocol used for IoT


devices. MQTT is a simple, lightweight messaging protocol used to establish
communication between multiple devices.
It is a TCP-based protocol relying on the publish-subscribe model. This communication
protocol is suitable for transmitting data between resource-constrained devices having
low bandwidth and low power requirements. Hence this messaging protocol is widely
used for communication in the IoT Framework.

Characterstics of MQTT:

 Publish-Subscribe Model: MQTT operates on a publish-subscribe model, where


publishers send messages to topics, and subscribers receive those messages.
 Lightweight: MQTT minimizes data packet size, making it ideal for bandwidth-
constrained environments.
 Retained Messages: MQTT allows retaining the most recent message for a topic.
 Last Will and Testament: If a client disconnects abruptly, a pre-defined “last will”
message is sent to subscribers.
 Session Management: MQTT supports re-establishing sessions after connection loss.


7. What do you mean by WSN routing protocol? Illustrate the features of RPL? How they
enable routing in a lossy environment?
Ans: A WSN (Wireless Sensor Network) routing protocol defines the rules and procedures
used to determine how data packets are transmitted from sensor nodes to the sink node
(or base station) in a multi-hop wireless environment. These protocols are designed to be
energy-efficient, scalable, and robust, given the constraints of WSNs such as:
 Limited battery power
 Unreliable links
 Dynamic topology
 Low bandwidth

Types of WSN Routing Protocols:

1. Flat-based Routing: All nodes have equal roles (e.g., SPIN, Directed Diffusion).
2. Hierarchical Routing: Nodes are organized into clusters (e.g., LEACH, TEEN).
3. Location-based Routing: Uses geographic location of nodes (e.g., GPSR).
4. IPv6-based Routing Protocols: Specifically for IoT and IP-enabled WSNs (e.g., RPL).

What is RPL?
Definition: RPL (Routing Protocol for Low-power and Lossy Networks) is a distance-
vector routing protocol standardized by the IETF (RFC 6550), designed specifically for
LLNs (Low-power and Lossy Networks) such as IoT and WSN environments.

It supports IPv6-based communication and forms the backbone of routing in


6LoWPAN networks.

It is a Distance Vector Routing Protocol that creates a tree-like routing topology called
the Destination Oriented Directed Acyclic Graph (DODAG), rooted towards one or more
nodes called the root node or sink node.
In an RPL Network, each node acts as a router and becomes part of a mesh network.
Routing is performed at the IP Layer. Each node examines every received IPv6 packet
and determines the next-hop destination based on the information contained in the IPv6
header.

No information from the MAC layer header is needed to perform the next determination .

Main Features of RPL protocol:

 Scalability: The protocol can accommodate such type of big networks with low power
and lossy connectivity, which makes it appropriate for a range of Internet of Things
applications.
 Multipoint-to-point traffic generation: RPL offers a way to send data to a single
destination point from several devices within the LLN as per requirement.
 Quality of Service (QoS) – The protocol guarantees QoS by offering various types of
methods for reliable packet delivery system and congestion control systetm.
 Adaptive – RPL modifies the required routes in response to link quality and energy
availability changes in the network environment or system.
 Security system: To guarantee various types of secure communication within the LLN
as per requirement, RPL incorporates techniques for integrity protection,
authentication, confidentiality, and encryption for better performance

How RPL Enables Routing in a Lossy Environment:


1. Rank-Based Topology (DODAG):
 Nodes join a DODAG and select parents based on their rank (a function of link
quality, energy, and distance).
 This structure avoids routing loops and allows efficient path construction.
2. Multipath Parent Selection:
 Nodes maintain a list of multiple candidate parents.
 If one path fails, the node can switch to an alternative without disrupting
communication.
3. ETX (Expected Transmission Count):
 RPL uses ETX to estimate link reliability.
 Lower ETX means fewer retransmissions, so RPL prefers those links for routing.
4. Adaptive Control Messaging (Trickle Algorithm):
 Limits routing control traffic during stable periods to save energy.
 Quickly reacts to topology changes or link failures by increasing message
frequency.
5. Local Repair Mechanism:
 When a link breaks, nodes perform local repairs without requiring complete
network restructuring.
 Ensures quick recovery in lossy or dynamic environments.
6. Support for Mobility and Scalability:
 RPL adapts to node mobility and scales well in large networks by building
hierarchical routes

8. What do you mean by sensor node deployment? Discuss various sensor node
deployment techniques/models/ approaches.
Ans: Sensor deployment and node discovery are two important aspects of building an IoT
system.Deployment is concerned about the set-up process of an operational sensor
network in the real world .Deployment is cumbersome and labor-intensive as bugs may
be triggered or the performance is degraded that was not observed at the time pre-
deployment.
• Here are some approaches to sensor deployment and node discovery in IoT.

 Manual Deployment:
In this approach, the sensors are deployed manually by technicians or field engineers.
This involves physically installing the sensors in the desired location and configuring
them to communicate with the network.
Node discovery is also performed manually by scanning the network for new devices
and adding them to the network
 Automated Deployment:
In this approach, sensors are deployed automatically using robots or drones.
The sensors are pre-configured with the network settings and are dropped off in the
desired location by the robot or drone.
Node discovery is also automated, with the sensors automatically joining the network
once they are within range.

Deterministic Deployment

Definition: Nodes are manually or algorithmically placed at precise locations.


Environment: Controlled or accessible (e.g., smart homes, industrial plants).
Method: Pre-planned layout using a grid, line, or pattern.
Example: Sensors placed at specific corners in a smart building.

Advantages:
 High coverage efficiency.
 Predictable network performance.

Disadvantages:

 Time-consuming and expensive.


 Not suitable for harsh or inaccessible environments.

Random Deployment

 Definition: Nodes are deployed randomly, often dropped from aircraft or drones.
 Environment: Inaccessible, dangerous, or large-scale areas (e.g., forests, disaster
zones).
 Method: No prior knowledge of terrain; nodes self-organize post-deployment.

Advantages:
 Quick and easy deployment.
 Suitable for emergency or military scenarios.
Disadvantages:
 Possible coverage gaps or node clustering.
 May require additional algorithms to reorganize the network.

 Machine Learning-based Deployment:


In this approach, machine learning algorithms are used to optimize the deployment of
sensors based on factors such as signal strength, interference, and coverage.
The algorithms analyze the data from the sensors to determine the best locations for
deploying new sensors and the best routes for transmitting data.
Why it is necessary:
The efficient deployment scheme can reduce the deployment cost and enhance the
detection capability of the wireless sensor networks.
In addition, it can enhance the quality of monitoring in wireless sensor networks by
increasing the coverage area.
Poor deployment of sensor nodes leads to inefficient network connectivity or
redundancy of coverage.
Deployment planning requires consideration of several objectives such as energy
consumption, sensing coverage, network lifetime, network connectivity, and so forth.
9. What do you mean by data aggregation and dissemination? Discuss different
techniques involved during data gathering and dissemination while building IoT
applications.
Ans: In wireless sensor networks (WSNs) and Internet of Things (IoT) environments, efficient
data handling is crucial due to limitations in energy, bandwidth, and memory. Two important
operations in this context are data aggregation and data dissemination. Both aim to optimize
communication, conserve energy, and improve overall network performance.

Data Aggregation

Definition: Data aggregation is the process of gathering and combining data from
multiple sensor nodes to eliminate redundancy, reduce the number of transmissions,
and save energy. It is commonly used in WSNs where sensors collect similar data from
nearby environments.

Purpose:

 Reduce communication overhead.


 Minimize energy consumption.
 Avoid redundant or duplicate data transmission.
 Extend network lifetime.

How it works: Sensor nodes collect raw data (e.g., temperature, humidity, motion) and
forward it to a data aggregator node (e.g., a cluster head or intermediate node). The
aggregator processes the data using techniques like averaging, summing, or selecting
minimum/maximum values, and sends the summarized data to the base station.

Example: In an agricultural monitoring system, 50 sensors deployed in a field may collect


temperature data every hour. Instead of sending 50 individual readings to the base
station, an aggregator node computes the average temperature and sends just one
value, reducing the transmission cost.

Data Dissemination

Definition: Data dissemination refers to the process of spreading or distributing data


from one node (usually a sink or base station) to other nodes in the network. It may
include control commands, configuration information, or software updates.

Purpose:

 Distribute information to multiple nodes.


 Ensure network-wide awareness of critical data.
 Enable coordinated actions among nodes.
How it works: The base station or sink node broadcasts a message which is forwarded
across the network. Sensor nodes receive, interpret, and act upon the data based on
predefined rules or interests.

Techniques for Data Gathering

Data gathering refers to the collection of sensor data from various IoT devices, typically
forwarded to a central node (e.g., gateway or cloud).

1. Data Aggregation

 Combines data from multiple sources to eliminate redundancy.


 Reduces bandwidth and energy usage.
 Example: Computing the average temperature from multiple sensors.
 Protocols: LEACH, TAG, Directed Diffusion

2. Clustering

 Network is divided into clusters with a Cluster Head (CH) responsible for collecting
and aggregating data from nodes in its cluster.
 Improves scalability and reduces transmission load.
 Example: CH gathers data locally and sends it to the cloud.
 Protocols: LEACH, HEED

3. Data Compression

 Raw data is compressed before transmission using algorithms like Huffman coding
or run-length encoding.
 Reduces packet size and saves energy.
 Tools: TinyOS, Contiki OS support compression mechanisms.

4. Event-Driven Data Collection

 Data is only collected and transmitted when a specific event occurs, such as
motion detection or threshold breach.
 Efficient for power-constrained systems.
 Example: A security sensor sends data only when motion is detected.

5. Mobile Sink-Based Collection

 A mobile sink (e.g., drone or robot) moves through the network to gather data
from sensor nodes.
 Reduces energy depletion near fixed sinks and balances network load.
Techniques for Data Dissemination

Data dissemination is the process of spreading information (e.g., commands, updates, or


requests) from the central server or sink node to various IoT devices.

1. Flooding

 Simple method where each node broadcasts the message to all neighbors.
 Easy to implement but can cause redundancy and network congestion (broadcast
storm).

2. Interest-Based Dissemination

 Only nodes that express interest in specific data will receive it.
 Reduces unnecessary transmission.

 Protocol: Directed Diffusion

3. Publish/Subscribe Mechanism

 Nodes subscribe to specific types of data or events.


 A broker (e.g., MQTT broker) publishes updates to all subscribed devices.
 Widely used in cloud-based IoT platforms.
 Protocol: MQTT (Message Queuing Telemetry Transport)

4. Multicast/Broadcast

 Efficient for disseminating the same data to multiple nodes simultaneously.


 Used in software updates, emergency alerts, or system-wide configurations.

5. Location-Based Dissemination

 Data is sent to nodes based on their geographic location.


 Reduces unnecessary traffic outside the target region.
 Example: Sending flood warnings only to sensors in a river basin.

6. Time-Based Dissemination

 Data or commands are scheduled for periodic dissemination.


 Suitable for regular updates like configuration files or synchronization.
UNIT-4
1. What is identity management of Internet of Things? Explain any two identity
management techniques of internet of things?
Identity management (IdM), also known as identity and access management (IAM)
ensures that authorized people – and only authorized people – have access to the
technology resources they need to perform their job functions.
An identity management system prevents unauthorized access to systems and
resources, helps prevent exfiltration of enterprise or protected data, and raises alerts
and alarms when access attempts are made by unauthorized personnel or programs,
whether from inside or outside the enterprise perimeter.
IoT Device Identity Management
• IoT device identity management involves securing internet-connected devices by
giving them unique IDs tied to cryptographic keys.
• IAM is focused on identifying people and managing access to different data types
(like sensitive data, non-sensitive data, or device data). IAM helps identify devices,
too, while managing user access to data, thus safeguarding against breaches and
malicious activities.
• In the age of IoT, the issue is not that connected things can be accessed effortlessly,
but rather that access to these things poses risks, and thus, must be protected.

Identity Management Techniques


1. Local Identity
In centralized architecture like smart home or client server paradigm, identity is local
in nature.
In centralized computing, a host system maintains and manages local database of
identities.
·In IoT context smart home is an example of centralized computing where all devices
in smart home are registered in a local database and if external device or entity
wishes to join the system, it is first required to acquire an identity from server and
entry is to be made in registry.
The system also checks for duplication of identity being issued in order to maintain
uniqueness.
In centralized computing, addition,deletion of identities is simple and independent of
other operations.
As shown in figure, a central object registry is maintained for all the terminals or
devices connected to it.
As in case of smart home, all devices in one context are registered with one central
database and can be shared across the system.

2. Federated Identity Management Model


• Identity federation is known within the web security world and refers to
management of a network/web objects identity across different domains.
• The main reason of enabling federation in network/web environment is that the
work flow of system often requires an object for which identity is established in one
domain to be established in other domain as well.
• Identity in the web based system refers to a user’s identity while in IoT, identity
refers to a device or “thing”. Hence the interaction of identities in
• IoT is in the form of device to device communication.
• Different federation topologies
• Local Profiling
• Distributed profiling
• Third party profiling

3. Global Web Identity


• With the emergence of WWW and popularity of online social networks, global
identity is a need today.
• Web identity is uniquely identified throughout WWW and it is identifiable via URI
(Universal resource identifier).
• Due to increasing number of users on WWW and online social network, it is
important to keep unique identity of users as well as services.
• In context of IoT networks, web identity is ubiquitous in nature and web identity
information should be capable of uniquely resolving various IoT networks

4. User centric Identity Management


• In user centric IdM models, full control is with the end user over his/her personal
data.
• Eg: OpenID
• OpenId consists of 4 layers
• Identifiers Discovery Authentication Data Transport
• The process to be completed involves three different entities
• The end-users Relying party Identity provider
• OPenId allows relying party to redirect the client to the identity provider for
authentication at identity provider site thus violating user control.
• The second problem with openID is that the URL that is used to identify the subject
is recyclable. Since OpenID permiots URL based identification, it brings the issue of
privacy.

5. Device centric identity management


• Eg: Higgins is a software infrastructure that supports consistent user experience that
works with digital identity protocols
• Eg: WS-Trust, OpenID.
• Main objective of Higgins project is to manage multiple contexts, interoperability,
define common interface for an identity system.
• The HIggins framework does not provide support for quantitative measure identity
strength and lacks the fulfillment of defining strength of identity.\
• Issue with security

2. Why we use arduino? Explain about the Arduino IDE.


Arduino is an open-source electronics platform based on easy-to-use hardware and
software. Arduino boards are able to read inputs - light on a sensor, a finger on a button,
or a Twitter message - and turn it into an output - activating a motor, turning on an LED,
publishing something online. t has a large library of pre-written code: Arduino has a large
library of pre-written code called the Arduino library. Basically, this simplifies common
tasks and makes it easy to interact with sensors and other devices connected to the
board.
Arduino IDE is an open source software that is used to program the Arduino controller
board based on variations of the C and C++ programming language. It can be
downloaded from Arduino’s official website and installed into PC. Following Steps are
required to set up an Arduino Board.
3. Discuss control statements? Explain all the Arduino control statements with syntax
// If statement
if(condition)
{
Statements if the condition is true ;
}
// If…Else statement
if(condition )
{
Statements if the condition is true;
}
Else
{
Statements if the condition is false;
}
// If…….Elseif…..Else
if (condition1)
{
Statements if the condition1 is true;
}
else if (condition2)
{ Statements if the condition1 is false
and condition2 is true;
}
Else
{
Statements if both the conditions are false;
}
Q4:Make a simple program in Arduino.
void setup()
{
Serial.begin(9600);
}
void loop() {
int a = 5; // initialization of values to the variables a and b
int b = 4;
int c;
c = myAddfunction(a, b); // c will now contains the value 9
Serial.println(c); // to print the resulted value
delay(1000); // time delay of 1 second or 1000 milliseconds
}
int myAddfunction(int i, int j)
{
int sum;
sum = i + j;
return sum;
}

5. Discuss Aurdino board Pin with diagram.


Arduino boards senses the environment by receiving inputs from many sensors, and
affects their surroundings by controlling lights, motors, and other actuators. Arduino
boards are the microcontroller development platform that will be at the heart of your
projects.
When making something you will be building the circuits and interfaces for interaction,
and telling the microcontroller how to interface with other components. Here the
anatomy of Arduino UNO.
UNIT-5
1. Explain designing of smart street lights in smart city.
Smart street light refers to public street lighting that adapts to movement by pedestrians,
cyclists and cars.
• Intelligent street lighting also referred to as adaptive street lighting, dims when no
activity is detected, butbrightens when movement is detected. This type of lighting is
different from traditional, stationary illumination, or dimmable street lighting that dims
at pre-determined times.
• Smart street light system tries to find solution for the faster depletion of energy
resources due to the inefficient usage and wastage of these resources.
• Increasing electricity bill is something that can be witnessed by these practices.
• Smart Street lights decrease the wastage of electricity by controlling the working of
street light system that
• attributes to a good amount of electricity.
• Street lights can be made intelligent by placing cameras or other sensors on them,
which enables them to detect. The other advantage of LED is that the intensity can be
controlled easily.
Working Principle
The working principle of the work “Design of a street light system in a smart city
implementing IoT concept” is primarily divided into 6 units.
• The 1st unit is a sensor circuit that detects the environmental light to assume whether
it is day or night (or evening). This unit is having two sensors. The 1st sensor to detect
sunlight and the 2nd sensor to identify the LED panel is working or not.
• The 2nd and the primary unit is an 8-bit microcontroller which is responsible for
monitoring the status of the 1st LDR i.e. whether the environment is having enough
sunlight or not.
• The 3rd unit is nothing but a relay driver circuit and the relay which is controlled by
designated IO pin of the microcontroller.
• The 4th unit is an LED panel made of 6×8 matrix.
• The 5th unit is a WIFI modem based on ESP 8266. THE microcontroller is
communicating ESP 8266 through the serial communication.
• The transmitted data is handled by the 6th unit i.e., a web server.

Q2: Why do IoT system have to be self-adapting and self-configuring?


Self-Adapting: IoT devices and systems may have the capability to dynamically adapt with
the changing contexts and take actions based on their operating conditions, user‘s
context or sensed environment. IoT (internet of things) are made on the natural direction
to manage themselves, both in terms of their software/hardware configuration and their
resource. IoT devices are continuously collecting data. As the sensors and firmware are
remote they have to be self-adapting depending on the difference in the data it is
receiving and then taking continuous decisions (self-adapting) all the time as per the
algorithms defined
Eg: The surveillance system comprising of a number of surveillance cameras. The
surveillance camera can adapt modes based on whether it is day or night. The
surveillance system is adapting itself based on context and changing conditions.
Self-Configuring: IOT devices have self-configuring capability, allowing a large number of
devices to work together to provide certain functionality. These devices have the ability
configure themselves setup networking, and fetch latest software upgrades with minimal
manual or user interaction.
3. Explain Smart Metering in brief.
Smart metering is the monitoring of resource consumption, such as energy, water, gas,
etc., through modern metering devices connected to the Internet via IoT technology.
These metering devices are typically referred to as smart meters. While there’s a huge
variety of them available on the market today, the biggest challenge is integrating
various devices into a meaningful smart metering solution for a specific company’s use
case.
Smart metering is typically used for accurate energy accounting and billing, but it can be
also used for many other real-life use cases, such as, to optimize and eliminate wasteful
practices on factory floors, spot water leaks or reduced gas pressure, encourage efficient
fuel consumption, or prevent theft.
How do smart meters work?
So, how do smart meters work? The crux of a smart meter's operation lies in its capacity
to communicate. Smart meters measure energy consumption like traditional meters.
However, they also have a two-way communication system. This system allows them to
send consumption data to the utility provider. It also allows them to receive instructions
or updates from the provider.
How do smart meters communicate?
A variety of communication technologies, including cellular networks, power line
communication (PLC), or radio frequency (RF) mesh networks, enable smart meters to
communicate. These communication protocols facilitate the seamless integration of
smart meters into the expansive IoT ecosystem.
4. Explain the design challenge in IoT ?
Issues in packaging and integration of small-sized chip with low weight and less power
consumption.
• If you’ve been following the mobile space, you’ve likely see how every year it looks like
there’s no restriction in terms of display screen size.
• Take the upward thrust of ‘phablets’, for instance, which can be telephones nearly as
huge as tablets.
• Although helpful, the bigger monitors aren’t always only for convenience, rather,
instead, display screen sizes are growing to accommodate larger batteries. Computers
have getting slimmer, but battery energy stays the same.

Increased cost and time to market


• Embedded systems are lightly constrained by cost.
• The need originates to drive better approaches when designing the IoT devices in order
to handle the cost modelling or cost optimally with digital electronic components.

• Designers also need to solve the design time problem and bring the embedded device
at the right time to the market.
Security of the system
• Systems have to be designed and implemented to be robust and reliable and have to
be secure with cryptographic algorithms and security procedures.
• It involves different approaches to secure all the components of embedded systems
from prototype to deployment.

Explain the security challenges in IoT.


Internet of Things security is a set of approaches and practices towards protecting
physical devices, networks, processes, and technologies that comprise an IoT
environment from a broad spectrum of IoT security attacks.
The two key goals of IoT security are to:
• Make sure all data is collected, stored, processed, and transferred securely
• Detect and eliminate vulnerabilities in IoT components.
Note : For more detail go with slide of UNIT-5(MCA-1)

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy