IOT (Module 1, Module 3)
IOT (Module 1, Module 3)
Internet of Things (IoT) technology has a wide range of applications and the use of the Internet of
Things is growing so faster. It is the networking of physical objects that contain electronics
embedded within their architecture to communicate and sense interactions amongst each other or
to the external environment.
Architecture of IoT
The architecture of IoT is divided into 4 different layers i.e. Sensing Layer, Network Layer, Data
processing Layer, and Application Layer.
Sensing Layer: The sensing layer is the first layer of the Internet of Things architecture and
is responsible for collecting data from different sources. This layer
includes sensors and actuators that are placed in the environment to gather information
about temperature, humidity, light, sound, and other physical parameters. Wired or wireless
communication protocols connect these devices to the network layer.
Network Layer: The network layer of an IoT architecture is responsible for providing
communication and connectivity between devices in the IoT system. It includes protocols
and technologies that enable devices to connect and communicate with each other and with
the wider internet. Examples of network technologies that are commonly used in IoT
include WiFi, Bluetooth, Zigbee, and cellular networks such as 4G and 5G technology.
Additionally, the network layer may include gateways and routers that act as intermediaries
between devices and the wider internet, and may also include security features such as
encryption and authentication to protect against unauthorized access.
Data processing Layer: The data processing layer of IoT architecture refers to the software
and hardware components that are responsible for collecting, analyzing, and interpreting
data from IoT devices. This layer is responsible for receiving raw data from the devices,
processing it, and making it available for further analysis or action. The data processing
layer includes a variety of technologies and tools, such as data management systems,
analytics platforms, and machine learning algorithms. These tools are used to extract
meaningful insights from the data and make decisions based on that data. Example of a
technology used in the data processing layer is a data lake, which is a centralized repository
for storing raw data from IoT devices.
Application Layer: The application layer of IoT architecture is the topmost layer that interacts
directly with the end-user. It is responsible for providing user-friendly interfaces and
functionalities that enable users to access and control IoT devices. This layer includes
various software and applications such as mobile apps, web portals, and other user
interfaces that are designed to interact with the underlying IoT infrastructure. It also includes
middleware services that allow different IoT devices and systems to communicate and share
data seamlessly. The application layer also includes analytics and processing capabilities
that allow data to be analyzed and transformed into meaningful insights. This can include
machine learning algorithms, data visualization tools, and other advanced analytics
capabilities.
Architecture of IoT
Advantages of IoT
Execute multiple tasks at a time like a computer.
Easiest internet connectivity
Works on GUI (Graphical User Interface) mode because of HDMI port.
Best suited for server-based applications i.e., can be connected via SSH–Secure Shell-to
access the Rpi command line remotely and file sharing via FTP–File Transfer Protocol.
More reliable for software applications.
Disadvantages of IoT
Security concerns and potential for hacking or data breaches.
Privacy issues related to the collection and use of personal data.
Dependence on technology and potential for system failures.
Limited standardization and interoperability among devices.
Complexity and increased maintenance requirements.
High initial investment costs.
Limited battery life on some devices.
Concerns about job displacement due to automation.
Limited regulation and legal framework for IoT, which can lead to confusion and uncertainty.
Modern Applications of IoT
Smart Grids and energy saving
Smart cities
Smart homes/Home automation
Healthcare
Earthquake detection
Radiation detection/hazardous gas detection
Smartphone detection
Water flow monitoring
Traffic monitoring
Smart door lock protection system
Robots and Drones
Healthcare and Hospitals, Telemedicine applications
Biochip Transponders (For animals in farms)
Heart monitoring implants (Example Pacemaker, ECG real time tracking
(this is comprehensive informarion abot M2M and IOT in a short way)
M2M and IoT Technology Fundamentals: A
Comprehensive Overview
Machine-to-Machine (M2M) communication and the Internet of Things (IoT) are foundational technologies in the
digital transformation модерн (modern) era, enabling a vast network of interconnected devices. While often used
interchangeably, they have distinct characteristics and scopes.
Fundamentals:
Point-to-Point Communication: M2M typically involves direct communication between specific devices.
Automation: The core idea is to automate processes, data collection, and actions based on a-наперед
визначений (predefined) logic.
Data Exchange: Devices capture data (e.g., from sensors, RFID tags) and share it with other connected
devices or a central platform.
Specific Applications: M2M solutions are often built for particular tasks within a closed system, like telemetry,
remote monitoring, and control in industrial settings.
Network Reliance: M2M can utilize various communication networks, including cellular (like GSM-GPRS,
CDMA EVDO), Wi-Fi, Bluetooth, or even wired connections. The role of these networks is often confined to
being a transport medium.
1. M2M Devices: These are the machines or hardware (e.g., sensors, actuators, embedded systems) that collect
data or perform actions.
2. Communication Network: The infrastructure (wired or wireless) that enables data transmission between
devices. This can include cellular networks, Wi-Fi, or satellite links.
3. Data Processing Units/Software Applications: These interpret the exchanged data, make decisions, and can
trigger automated actions. This could be embedded software or a centralized M2M platform.
4. Gateways (in some architectures): Devices that can act as intermediaries, aggregating data from multiple M2M
devices before transmitting it over a wider network.
Smart Meters: Utility meters that automatically send consumption data to the utility company.
Industrial Automation: Machines on a factory floor communicating to optimize production processes.
Fleet Management: Vehicles sending location and diagnostic data to a central management system.
Vending Machines: Alerting suppliers when stock is low.
Fundamentals:
Interconnectedness: IoT connects a vast array of diverse devices to the internet and to each other.
Data Collection & Analysis: IoT devices typically use sensors to collect data from their environment, which is
then often sent to the cloud for processing, analysis (potentially using AI and machine learning), and storage.
Cloud Communication: IoT heavily relies on cloud platforms for data storage, processing, and application
management.
User Interaction: While IoT aims for automation, it often includes user interfaces (e.g., mobile apps,
dashboards) for monitoring, control, and interaction with the IoT ecosystem.
Scalability: IoT systems are designed to be highly scalable, accommodating a growing number of connected
devices.
Intelligence: IoT systems often incorporate a higher degree of intelligence, with devices and applications
making informed decisions based on analyzed data.
1. Smart Devices/Things (Sensors & Actuators): These are the physical objects embedded with sensors (to
collect data) and actuators (to perform actions based on data or commands).
2. Connectivity: Various communication protocols and technologies (e.g., Wi-Fi, Bluetooth, Cellular, LPWAN like
LoRaWAN, Zigbee) that connect devices to the internet or other devices.
3. Data Processing (Cloud/Edge): This includes IoT applications and platforms (often cloud-based) that collect,
store, process, and analyze data from IoT devices. Edge computing (processing data closer to where it's
generated) is also becoming crucial.
4. User Interface: Dashboards, mobile apps, or other interfaces that allow users to interact with the IoT system,
visualize data, and manage devices.
5. Analytics and AI/ML: Advanced analytics, artificial intelligence, and machine learning are often used to derive
insights, predict outcomes, and automate complex decision-making.
Smart Homes: Connected appliances, lighting, security systems, and voice assistants.
Wearable Technology: Smartwatches and fitness trackers collecting health and activity data.
Smart Cities: Solutions for traffic management, waste management, public safety, and environmental
monitoring.
Connected Healthcare: Remote patient monitoring and smart medical devices.
Industrial IoT (IIoT): Predictive maintenance, supply chain optimization, and smart manufacturing.
Smart Agriculture: Precision farming using sensors to monitor soil conditions, weather, and crop health.
1. Internet of Things : IOT is known as the Internet of Things where things are said to be the
communicating devices that can interact with each other using a communication media. Usually every day
some new devices are being integrated which uses IoT devices for its function. These devices use various
sensors and actuators for sending and receiving data over the internet. It is an ecosystem where the
devices share data through a communication media known as the internet or Iot is an ecosystem of
connected physical object that are accessible through internet. Iot means anything which can be connected
to internet and can be controlled or monitored using internet from smart devices or PC.
2. Machine to Machine : This is commonly known as Machine to machine communication. It is a concept
where two or more than two machines communicate with each other without human interaction using a
wired or wireless mechanism. M2M is an technology that helps the devices to connect between devices
without using internet. M2M communications offer several applications such as security, tracking and
tracing, manufacturing and facility management.
Difference between IoT and M2M :
Open API support Supports Open API integrations. There is no support for Open APIs
Smart wearables, Big Data and Cloud, Sensors, Data and Information,
Examples
etc. etc.
Sensors in Internet of Things(IoT)
Generally, sensors are used in the architecture of IOT devices.
Sensors are used for sensing things and devices etc.
A device that provides a usable output in response to a specified measurement.
The sensor attains a physical parameter and converts it into a signal suitable for processing (e.g. electrical,
mechanical, optical) the characteristics of any device or material to detect the presence of a particular
physical quantity.
The output of the sensor is a signal which is converted to a human-readable form like changes in
characteristics, changes in resistance, capacitance, impedance, etc.
IOT HARDWARE
Transducer :
A transducer converts a signal from one physical structure to another.
It converts one type of energy into another type.
It might be used as actuator in various systems.
Sensor Classification :
Passive & Active
Analog & digital
Scalar & vector
1. Passive Sensor –
Can not independently sense the input. Ex- Accelerometer, soil moisture, water level and
temperature sensors.
2. Active Sensor –
Independently sense the input. Example- Radar, sounder and laser altimeter sensors.
3. Analog Sensor –
The response or output of the sensor is some continuous function of its input parameter. Ex-
Temperature sensor, LDR, analog pressure sensor and analog hall effect.
4. Digital sensor –
Response in binary nature. Design to overcome the disadvantages of analog sensors. Along with
the analog sensor, it also comprises extra electronics for bit conversion. Example – Passive infrared
(PIR) sensor and digital temperature sensor(DS1620).
5. Scalar sensor –
Detects the input parameter only based on its magnitude. The answer for the sensor is a function of
magnitude of some input parameter. Not affected by the direction of input parameters.
Example – temperature, gas, strain, color and smoke sensor.
6. Vector sensor –
The response of the sensor depends on the magnitude of the direction and orientation of input
parameter. Example – Accelerometer, gyroscope, magnetic field and motion detector sensors.
Types of sensors –
Electrical sensor :
Light sensor is also known as photo sensors and one of the important sensor.
Light dependent resistor or LDR is a simple light sensor available today.
The property of LDR is that its resistance is inversely proportional to the intensity of the ambient light i.e
when the intensity of light increases, it’s resistance decreases and vise versa.
Touch sensor:
Detection of something like a touch of finger or a stylus is known as touch sensor.
It’s name suggests that detection of something.
They are classified into two types:
1. Resistive type
2. Capacitive type
Today almost all modern touch sensors are of capacitive types.
Because they are more accurate and have better signal to noise ratio.
Range sensing:
Range sensing concerns detecting how near or far a component is from the sensing position, although they
can also be used as proximity sensors.
Distance or range sensors use non-contact analog techniques. Short range sensing, between a few
millimetres and a few hundred millimetres is carried out using electrical capacitance, inductance and
magnetic technique.
Longer range sensing is carried out using transmitted energy waves of various types eg radio waves,
sound waves and lasers.
Mechanical sensor:
Any suitable mechanical / electrical switch may be adopted but because a certain amount of force is
required to operate a mechanical switch it is common to use micro-switches.
Pneumatic sensor:
In there simplest form, optical proximity sensors operate by breaking a light beam which falls onto a light
sensitive device such as a photocell. These are examples of non contact sensors. Care must be exercised
with the lighting environment of these sensors for example optical sensors can be blinded by flashes from
arc welding processes, airborne dust and smoke clouds may impede light transmission etc.
Speed Sensor:
Sensor used for detecting the speed of any object or vehicle which is in motion is known as speed sensor
.For example – Wind Speed Sensors, Speedometer ,UDAR ,Ground Speed Radar .
Temperature Sensor:
Devices which monitors and tracks the temperature and gives temperature’s measurement as an electrical
signal are termed as temperature sensors .These electrical signals will be in the form of voltage and is
directly proportional to the temperature measurement .
PIR Sensor:
PIR stands for passive infrared sensor and it is an electronic sensor that is used for the tracking and
measurement of infrared (IR) light radiating from objects in its field of view and is also known as
Pyroelectric sensor .It is mainly used for detecting human motion and movement detection .
Ultrasonic Sensor:
The principle of ultrasonic sensor is similar to the working principle of SONAR or RADAR in which the
interpretation of echoes from radio or sound waves to evaluate the attributes of a target by generating the
high frequency sound waves .
Actuators in IoT
An IoT device is made up of a Physical object (“thing”) + Controller (“brain”) + Sensors + Actuators +
Networks (Internet). An actuator is a machine component or system that moves or controls the mechanism
of the system. Sensors in the device sense the environment, then control signals are generated for the
actuators according to the actions needed to perform.
A servo motor is an example of an actuator. They are linear or rotatory actuators, can move to a given
specified angular or linear position. We can use servo motors for IoT applications and make the motor
rotate to 90 degrees, 180 degrees, etc., as per our need.
The following diagram shows what actuators do, the controller directs the actuator based on the sensor
data to do the work.
Working of IoT devices and use of Actuators
The control system acts upon an environment through the actuator. It requires a source of energy and a
control signal. When it receives a control signal, it converts the source of energy to a mechanical operation.
On this basis, on which form of energy it uses, it has different types given below.
Types of Actuators :
1. Hydraulic Actuators –
A hydraulic actuator uses hydraulic power to perform a mechanical operation. They are actuated by a
cylinder or fluid motor. The mechanical motion is converted to rotary, linear, or oscillatory motion, according
to the need of the IoT device. Ex- construction equipment uses hydraulic actuators because hydraulic
actuators can generate a large amount of force.
Advantages :
Hydraulic actuators can produce a large magnitude of force and high speed.
Used in welding, clamping, etc.
Used for lowering or raising the vehicles in car transport carriers.
Disadvantages :
Hydraulic fluid leaks can cause efficiency loss and issues of cleaning.
It is expensive.
It requires noise reduction equipment, heat exchangers, and high maintenance systems.
2. Pneumatic Actuators –
A pneumatic actuator uses energy formed by vacuum or compressed air at high pressure to convert into
either linear or rotary motion. Example- Used in robotics, use sensors that work like human fingers by using
compressed air.
Advantages :
They are a low-cost option and are used at extreme temperatures where using air is a safer option
than chemicals.
They need low maintenance, are durable, and have a long operational life.
It is very quick in starting and stopping the motion.
Disadvantages :
Loss of pressure can make it less efficient.
The air compressor should be running continuously.
Air can be polluted, and it needs maintenance.
3. Electrical Actuators –
An electric actuator uses electrical energy, is usually actuated by a motor that converts electrical energy
into mechanical torque. An example of an electric actuator is a solenoid based electric bell.
Advantages :
It is expensive.
It depends a lot on environmental conditions.
Internet of Things (IoT) Gateways
Gateway provides a bridge between different communication technologies which means we can say that a
Gateway acts as a medium to open up connections between the cloud and controller(sensors/devices)
in Internet of Things (IoT). With the help of gateways, it is possible to establish device-to-device or device-
to-cloud communication. A gateway can be a typical hardware device or software program. It enables a
connection between the sensor network and the Internet along with enabling IoT communication, it also
performs many other tasks such as this IoT gateway performs protocol translation, aggregating all data,
local processing, and filtering of data before sending it to the cloud, locally storing data and autonomously
controlling devices based on some inputted data, providing additional device security. The below figure
shows how IoT Gateways establish communication between sensors and the cloud (Data System):As IoT
devices work with low power consumption(Battery power) in other words they are energy constrained so if
they will directly communicate to cloud/internet it won’t be effective in terms of power. So they communicate
with Gateway first using short range wireless
transmission modes/network like ZigBee, Bluetooth, etc
as they consume less power or they can also be
connected using long range like Cellular and WiFi etc.
Then Gateway links them to Internet/ cloud by
converting data into a standard protocol like MQTT.
using ethernet, WiFi/cellular or satellite connection. And
in mostly Gateway is Mains powered unlike sensor
nodes which are battery powered. In practice there are
multiple Gateway devices. Let’s think about a simple IoT
gateway, then our smartphone comes into picture as it
can also work as a basic IoT gateway when we use multiple radio technologies like WiFi, Bluetooth,
Cellular network of smart phone to work on any IoT project in sending and receiving data at that time this
also acts as a basic IoT Gateway.
Key functionalities of IoT Gateway :
There are several advantages of using a gateway in the Internet of Things (IoT), including:
Protocol translation: IoT devices typically use different communication protocols, and a gateway
can translate between these protocols to enable communication between different types of devices.
Data aggregation: A gateway can collect data from multiple IoT devices and aggregate it into a
single stream for easier analysis and management.
Edge computing: Gateways can perform edge computing tasks such as data processing, analytics,
and machine learning, enabling faster and more efficient decision-making.
Security: Gateways can act as a secure access point for IoT devices, providing a layer of protection
against cyber threats.
Scalability: Gateways can support a large number of IoT devices and can be easily scaled up or
down to meet changing needs.
Improved reliability: Gateways can help to improve the reliability of IoT devices by managing
network connectivity and providing a backup mechanism in case of network failure.
Cost-effective: Gateways can be a cost-effective way to manage and control a large number of IoT
devices, reducing the need for expensive infrastructure and IT resources.
An interconnection of multiple devices, also known as hosts, that are connected using multiple paths for the
purpose of sending/receiving data or media. Computer networks can also include multiple
devices/mediums which help in the communication between two different devices; these are known
as Network devices and include things such as routers, switches, hubs, and bridges.
Network Devices
Network Topology
The Network Topology is the layout arrangement of the different devices in a network. Some types of
network topologies are:
Bus Topology: In bus topology all devices are connected to a single central cable called a bus.
Data is sent along this cable and all devices share the same connection. Simple and cheap to set
up but if the main cable fails the whole network goes down.
Star Topology: In star topology all devices are connected to a central node called hub or switch.
The hub controls the flow of data between devices. If one device fails the rest of the network is
unaffected. But, if the central hub fails the whole network stops working.
Ring Topology: In ring topology devices are connected in a circular loop with each device
connected to two others. Data travels in one direction (or sometimes both) passing through each
device until it reaches its destination. A failure in one device can affect the whole network.
Mesh Topology: In mesh topology every device is connected to every other device in the network.
It provides multiple paths for data so if one path fails another can take over.
Tree Topology: Tree topology is the combination of star and bus topology. Tree topology is good for
organizing large networks and allows for easy expansion.
Hybrid Topology: Hybrid topology is the combination of two or more different topologies (like star
and mesh). It is flexible and can be customized based on the network’s specific needs.
Network Topology
Network Protocols
A protocol is a set of rules or algorithms which define the way how two entities can communicate across the
network and there exists a different protocol defined at each layer of the OSI model. A few such protocols
are TCP, IP, UDP, ARP, DHCP, FTP, and so on.
Transmission Control Protocol/Internet Protocol (TCP/IP): TCP/IP is the foundational protocol
suite of the internet, enabling reliable communication. TCP Ensures data is delivered reliably and in
order and IP routes data packets to their destination based on IP addresses.
Hypertext Transfer Protocol (HTTP) and HTTPS: HTTP and HTTPS protocols used for
transmitting web pages. In HTTP communication is unsecured and in HTTPS secured
communication using SSL/TLS encryption.
Simple Mail Transfer Protocol (SMTP): SMTP protocol used to send email. SMTP protocol works
with other protocols like POP3 and IMAP for email retrieval.
File Transfer Protocol (FTP): FTP protocol used for transferring files between computers. Includes
commands for uploading, downloading, and managing files on a remote server.
Dynamic Host Configuration Protocol (DHCP): DHCP protocol automatically assigns IP
addresses to devices on a network. Reduces manual configuration and IP address conflicts.
Domain Name System (DNS): DNS Translates human-friendly domain names into IP addresses.
Ensures seamless navigation on the internet.
Domain IP Address
ARP: ARP stands for Address Resolution Protocol. It is used to convert an IP address to its
corresponding physical address(i.e., MAC Address). ARP is used by the Data Link Layer to identify the
MAC address of the Receiver’s machine.
RARP: RARP stands for Reverse Address Resolution Protocol. As the name suggests, it provides the IP
address of the device given a physical address as input. But RARP has become obsolete since the time
DHCP has come into the picture.
The Domain Name System (DNS) is a critical component of computer networking. It converts easily
recognizable domain names, such as www.example.com, into numerical IP addresses that computers use
to identify each other on the network.
How DNS Works?
DNS works efficiently, translating user-friendly domain names into IP addresses, allowing seamless
navigation on the internet. Below step by step working of DNS:
User Input: When a user enters a domain name in a browser, the system needs to find its IP
address.
DNS Query: The user’s device sends a DNS query to the DNS resolver.
Resolver Request: The DNS resolver checks its cache for the IP address. If not found, it forwards
the request to the root DNS server.
Root DNS Server: The root DNS server provides the address of the TLD (Top-Level Domain)
server for the specific domain extension (e.g., .com).
TLD DNS Server: The TLD server directs the resolver to the authoritative DNS server for the actual
domain.
Authoritative DNS Server: The authoritative DNS server knows the IP address for the domain and
provides it to the resolver.
Response to User: The resolver stores the IP address in its cache and sends it to the user’s
device.
Access Website: With the IP address, the user’s device can access the desired website.
Network Security
Ensuring the security of a network is crucial to protect data and resources from unauthorized access and
attacks. Key aspects of network security include:
Firewalls: Devices or software that monitor and control incoming and outgoing network traffic based
on security rules.
Encryption: The process of encoding data to prevent unauthorized access. Commonly used
in VPNs, HTTPS, and secure email.
Intrusion Detection Systems (IDS): Tools that monitor network traffic for suspicious activity and
potential threats.
Access Control: Mechanisms that restrict access to network resources based on user identity and
role.
Regular Updates and Patching: Keeping software and hardware up to date to protect against
vulnerabilities.
Why Use Computer Networks?
Computer network play a important role in modern life. Here are some key benefits of computer networks:
Fast and Easy Communication: Networks enable all types of digital communication, like emails,
messaging, file sharing, video calls, and streaming.
More Storage Space: Suppose if we don’t have a cloud storage then we have to store data in
physical files that will consume a physical space so computer network provide a storage for storing
data.
Easier Sharing of Information: Networks make it simpler for users and teams to share resources
and information. Teams can collaborate more easily, and users get faster response from network
devices.
Better Security: Well designed networks are more reliable and give businesses more options for
keeping data safe. They come with built-in security features like encryption and access controls to
protect sensitive information from cyber threats.
An efficient approach of collecting, filtering, as well as deploying data sets in a structured manner to
achieve the projected organization’s goals and decision-making process. In the effective data
management system, it is the most important process for the information technology sector. It runs
business applications by providing analytical information. The whole process is a combination of different
functions that are collectively developed to ensure accessibility to the data. In this blog, we are going to
discuss today the critical concepts of data management and its significance, with the associated risks
and difficulties of the data handling process.
What is Data Management?
Data management is a functional system for collecting and analyzing raw datasets. The main goal of this
process is to help people, and organizations and optimize the use of data by maintaining the policy and
regulations. There are some key components of data management include as:
It is the first and foremost process, where you need to collect and gather the data from various sources in a
raw format. They could be structured or unstructured. You need to sort the data in a secure and organized
manner. This step involves selecting appropriate storage technology based on the data volume.
Collection of data is the first and foremost process, where you need to collect and gather the data from
various sources in a raw format. They could be structured or unstructured. You need to sort the data in a
secure and organized manner. This step involves selecting appropriate storage technology based on the
data volume. Processing the data is an important process to filter the data into a structured format. It
involves data cleaning, aggregating, and enhancing the dataset to make it more meaningful. When you
need to assure the accuracy and reliability of the data, you should maintain the data quality which involves
the validation rules, and error-checking processes.
Maintaining data security and privacy processes implement security measures to protect the data from
unauthorized access, security breaches, and data loss by imposing data encryption and access control.
Furthermore, it is important to analyze the data by applying the data mining process, machine learning,
and data visualization processes. There are different types of data management lifecycles in the market,
by which organizations can maintain the business and regulatory requirements to develop a durable data
set. It leads to managing the process of metadata and provides detailed information about
the structure, mining process, and data usage to perform the process effectively.
Importance of Data Management
In today’s data-driven world, data management has become a paramount concept, which involves various
organizations, storage, processing, and data protection. It increases data accuracy and accessibility to
ensure user reliability. Here are some key reasons that make Data Management very important:
1. Informed Decision-Making Process: Data is the most important component for businesses and
organizations because they make their important decisions based on data. A proper data
management process ensures that the decision-makers have direct access to the updated
information which helps to make effective choices.
2. Data Quality and Efficiency: A well-managed data set leads to a streamlined process, which helps
to maintain data quality and efficiency. It reduces error risks and poor decision-making.
3. Compliance and Customer Trust: Many organisations have strict regulations to maintain the data
management process properly. It also follows effective processes to handle client data responsibly.
4. Strategy Development and Innovation: In the modern context, data is a valuable asset that can
help organisations to identify trends and potential opportunities with the challenges. It helps to
understand the organisations to culture the market trends with customer behaviour. On the other
hand, effective data management allows you to analyse the previous data to identify the patterns
which lead to the development of new products and solutions.
5. Long-term Sustainability: Proper data management helps organisations to plan for the long run. It
helps to master data management efficiently by reducing redundancies, data duplication, and
unnecessary storage costs.
6. Competitive Advantage: Proper data management entitles organisations to explore market trends,
customer behaviours, and other insights that can help them outperform competitors.
Risks and Challenges in Data Management
While effective data management can produce significant benefits, on the other hand, there are so many
risks and challenges related to it. Here are some aspects of them:
Security and Privacy: Unauthorised access to sensitive data by hacking can be a cause of data
breaches, which can expose confidential information and may cause financial losses for an
organisation.
Data Quality: Poor data quality and duplicate data lead to stemming errors during data collection,
leading to incorrect decision-making. It occupies valuable storage and creates confusion during the
analysis process.
Data Governance: Lack of data ownership and access control can lead to inconsistent data
management. This process leads to security risks and compromises the security of data.
Data Integration Process: Integrating the data from various sources is difficult, as it contains
different formats and complex structures. It disrupts the proper decision-making and process of data
analysis.
Data Scaling: Scaling the data management systems is needed to increase the data loads to
maintain the performance by overcoming technical challenges.
Data Lifecycle Management: Organisations need to be transparent in their data retention policies
which helps to determine the data processing time and which data needs to be deleted. Data
disposal is also needed for security measures to prevent unauthorised access.
Data Analysis: Analysing complex and various data sets, required to create the advanced analytics
tools. For actionable data insight development, it is needed to understand the business context
properly with the particular domain knowledge.
From a business perspective, IoT can join equipment, vehicles, and any other business
assets to a system to monitor the function of this equipment or vehicle as well as other
assets, making decisions, and optimization of operations.
For example, manufacturers can use the IoT sensors to take note of certain problems
within industries and arrange for maintenance at the right time thus reducing the
incidence of expensive repair and production breakdowns.
3. Energy Management
IoT solutions assist in saving energy by analyzing energy utilization and determining
wastage levels. They also assist in monitoring energy consumption by using smart
technology such as smart meters and connected devices to cut down the expenses
incurred on energy bills and the usage of energy appliances.
For instance, in a smart building, light and heating ventilation air conditioning systems
can be controlled according to the presence of people and weather and this greatly
reduces energy expenses.
4. Customer Experience
IoT can dramatically change the world of customer interactions through timely and
personalized services. IoT-enabled devices are widely employed in the retail industry
to collect consumers' information, monitor their behavior, and improve shopping
experiences. Additionally, having mobile XR solutions can enhance immersive
experiences, providing more interactive ways to engage with customers.
Some examples of intelligent capabilities include; Smart shelves for example can
inform the staff that certain products are almost out of stock and also inform the
customers of the real-time stock status.
Data centers with this approach make data processing much faster. Yet, an approach that is only based on
the edge will never provide a complete view of business operations. If there is no cloud solution, then the
factory only controls each unit individually. Also, it has no way of imagining how these units work in relation
to each other. This is why only the combination of the edge and the cloud will enable businesses to benefit
from IoT developments.
The Role of Cloud Computing on the Internet of Things:
Cloud computing works to improve the efficiency of daily tasks in conjunction with the Internet of Things.
Cloud computing is about providing a path for data to reach its destination while the Internet of Things
generates a huge amount of data.
According to Amazon Web Services, there are four benefits of cloud computing:
1. No need to pre-guess infrastructure capacity needs
2. Saves money, because you only need to pay for those resources that you use, the larger the scale,
the more savings
3. In a few minutes, platforms can be deployed around the world
4. Flexibility and speed in providing resources to developers
Security was not considered during the design of IoT devices. The constant diversity and expansion of IoT
devices and communication channels raises the possibility that cyber attacks may target your company.
What is IoT Security?
IoT security is a technology area that particularly focuses on protecting connected devices and networks in
IoT. The act of protecting these devices and making sure they don't bring risks into a network is known as
IoT security. Attacks are likely to occur to anything linked to the Internet at some time. From the Internet of
Things devices, Attackers may utilize remote access to steal data by using a variety of strategies, including
credential theft and vulnerability exploitation.
Types of IoT Security
IoT security encompasses a multi-layered approach to protect devices, networks, and data. It involves both
user and manufacturer responsibilities.
1. Network Security
This focuses on safeguarding the overall IoT network infrastructure. It involves:
Establishing a strong network perimeter: Implementing firewalls, intrusion detection systems,
and access controls to prevent unauthorized entry.
Enforcing zero-trust architecture: Assuming every device and user is potentially malicious,
requiring continuous verification.
Securing network communication: Encrypting data transmitted between devices and using
secure protocols.
2. Device Security
This centers on protecting individual IoT devices:
Embedded security agents: Employing lightweight software to monitor device behavior and detect
anomalies.
Firmware hardening: Ensuring device software is free from vulnerabilities through rigorous testing
and updates.
Secure boot process: Verifying the integrity of the device's operating system before startup.
3. Data Security
IoT devices are any devices that can store data by connecting to the cloud.
IoT devices need a special set of cybersecurity guidelines because of how they differ from
conventional mobile devices. They lack the benefit of built-in security guidelines seen in
mobile operating systems like iOS and Android.
A lot of information is stored in the cloud, if an attacker manages to get access to the user's
account, it might be exploited for identity theft or privacy invasion.
Although there isn't a single solution for IoT security, cybersecurity experts have made it their
mission to inform manufacturers and developers about secure coding practices and how to
strengthen cloud activity defences.
Importance of IoT Security
Cyberattacks are a continual concern because of the unusual way that IoT devices are
manufactured and the enormous volume of data they process.
IoT security is necessary, as evidenced by some high-profile cases in which a common IoT device
was an advantage to breach and attack the wider network.
Strong IoT security is desperately needed, as seen by the regular threat of vulnerabilities, data
breaches, and other dangers related to the use of IoT devices.
IoT security, which encompasses a broad variety of tactics, strategies, protocols, and activities
aimed at reducing the growing IoT vulnerabilities of contemporary firms, is essential for
corporations.
Benefits of IoT Security
Below are some benefits of IoT Security
Network protection: By identifying and preventing threats like Distributed Denial of Service (DDoS)
attacks, which can disrupt and harm the whole network, security solutions may aid in the protection
of the Internet of Things as a whole.
Privacy protection: These solutions shield user privacy from unauthorized surveillance, data theft,
and device tracking by protecting IoT devices.
Scalability: Strong IoT security is scalable in that it can keep up with the expansion of an
organization's IoT environment and guarantee security protocols work even as the number of
connected devices rises.
Device protection: IoT security ensures the lifetime and correct operation of devices by protecting
them from viruses, hacking, and unauthorized access.
Which Industries Need IoT Security?
IoT Security thus has a huge role in various industries because most of them are getting interconnected.
Some of the sectors that really need strong IoT Security:
Healthcare: Even medical devices, like pacemakers, insulin pumps, and remote patient monitoring
systems, are susceptible to cyber-attacks that may result in the loss of lives.
Manufacturing: Cyber attacks paralyze ICS/OT environments of critical infrastructure and bring
with them enormous financial losses and safety hazards.
Energy and Utilities: This sector represents critical infrastructure that is accompanied by a high
utilization of IoT devices, powering power grids and water treatment plants, among others, making
them very attractive targets for cyber-attacks that may have catastrophic consequences.
Transportation: Autonomous vehicles, smart traffic systems, and connected cars use vast volumes
of data, making them quite vulnerable to hacking and subsequent data breaches.
Financial Services: IoT-related devices used in banking, payments, and financial transactions
process sensitive financial data and hence require robust security measures against fraud and data
theft.
Retail: Point-of-sale systems, inventory management data, and customer data are all at risk if IoT
devices are compromised.
Government: IoT security is necessary for critical infrastructure, national security, and citizen data.
Agriculture: Cyber-attacks on smart farms and IoT-enabled equipment can affect food production
and its supply chain.
Building Automation: Security is required for smart buildings with IoT-enabled systems against
unauthorized access and data breaches.
How to protect IoT systems and devices?
Microcontrollers (MCUs): These are the brains of many IoT devices, responsible for controlling sensors,
processing data, and managing communication. Examples include Arduino and ESP32.
Single-Board Computers (SBCs): More powerful than MCUs, SBCs like Raspberry Pi can handle more
complex data processing and run operating systems.
Data Acquisition (DAQ) Systems: Specialized hardware and software for acquiring and digitizing signals
from various sensors. These can range from simple handheld devices to complex industrial systems.
Wireless Communication Modules: Integrated circuits or modules that handle the transmission of data
over wireless networks (e.g., Wi-Fi modules, Bluetooth chips, LoRa modules).
IoT Gateways: Devices that act as intermediaries between IoT devices and the cloud, often performing
protocol translation, data aggregation, and edge processing.
1. Data Collection: Gathering data from the various IoT devices and other sources.
2. Data Transformation: Converting data from its original format into a consistent and usable format. This
may involve:
o Data Type Conversion: Ensuring numerical values, timestamps, and categorical data are
represented uniformly.
o Unit Conversion: Standardizing units of measurement (e.g., Celsius to Fahrenheit).
o Data Cleaning: Handling missing values, outliers, and inconsistencies.
o Data Aggregation: Summarizing or combining data points (e.g., calculating averages, sums).
o Data Enrichment: Adding contextual information to the data (e.g., device location, timestamp).
3. Data Normalization: Structuring data in a way that reduces redundancy and improves data integrity.
4. Data Storage: Storing the integrated data in a suitable data repository, which could be a:
o Time-Series Database: Optimized for storing time-stamped data (e.g., InfluxDB, TimescaleDB).
o NoSQL Database: Flexible for handling various data formats (e.g., MongoDB, Cassandra).
o Data Lake: A centralized repository for storing large volumes of raw and processed data in various
formats (e.g., AWS S3, Azure Data Lake Storage).
o Data Warehouse: A structured repository for analytical reporting (e.g., Snowflake, Amazon
Redshift).
5. Data Access and Analysis: Providing tools and interfaces for accessing and analyzing the integrated data
to derive insights and support decision-making.
Data Variety: IoT devices generate diverse data types (numerical, textual, images, video) and formats.
Data Volume and Velocity: The sheer amount of data generated by numerous IoT devices in real-time can
be overwhelming.
Data Silos: Data from different devices or systems might be stored in isolated systems, making integration
difficult.
Interoperability: Devices and systems from different vendors might use different protocols and data
formats, hindering seamless communication and integration.
Data Quality: Ensuring the accuracy, consistency, and reliability of data from various sources can be
challenging.
Security and Privacy: Protecting sensitive data during acquisition, transmission, and integration is crucial.
Latency Requirements: Some IoT applications require real-time data integration and analysis, which can
be challenging with large data volumes and complex transformations.
Scalability: The data integration infrastructure needs to be scalable to handle the increasing number of
devices and data volumes over time.
Develop a Comprehensive Data Strategy: Define clear goals for data acquisition and integration aligned
with business objectives.
Choose Appropriate Protocols and Technologies: Select communication protocols and data integration
tools that are suitable for the specific IoT application requirements (e.g., latency, bandwidth, security).
Implement Edge Computing: Process and analyze data closer to the source to reduce latency, bandwidth
usage, and cloud processing costs.
Standardize Data Formats: Where possible, adopt common data formats and protocols to simplify
integration.
Ensure Data Quality: Implement data validation and cleaning processes to ensure the accuracy and
reliability of the integrated data.
Prioritize Security: Implement robust security measures at each stage of data acquisition and integration,
including encryption, authentication, and access control.
Design for Scalability: Build a data integration infrastructure that can easily scale to accommodate future
growth in devices and data volume.
Leverage Data Mapping and Metadata Management: Use tools and techniques to understand the
relationships between different data sources and manage metadata effectively.
Implement Robust Error Handling and Monitoring: Set up systems to detect and handle errors during data
acquisition and integration and continuously monitor the health of the data pipelines.
Consider Data Governance and Compliance: Adhere to relevant data governance policies and regulatory
requirements.
Scalability: IoT deployments can involve a massive number of devices generating continuous data
streams. Cloud storage offers the virtually unlimited scalability needed to handle this volume without
significant upfront investment in physical infrastructure. Services like AWS S3, Azure Blob Storage, and
Google Cloud Storage are designed for this.
Cost-Effectiveness: For many IoT projects, especially those with fluctuating data volumes, the pay-as-you-
go model of cloud storage can be more cost-effective than maintaining a large local infrastructure.
Accessibility and Integration: Cloud platforms provide easy access to data from anywhere and offer a wide
range of integrated services for data processing, analytics, machine learning, and AI. This is crucial for
deriving insights from IoT data.
Managed Services: Cloud providers handle the underlying infrastructure, security, and maintenance,
reducing the operational burden on the IoT solution provider.
Global Reach: For geographically distributed IoT deployments, cloud storage offers data centers across
the globe, potentially reducing latency for data ingestion and access.
Disadvantages:
Latency: Depending on the application, the latency involved in sending data to and retrieving it from the
cloud might be unacceptable for real-time control and critical applications. For instance, autonomous
vehicles or industrial control systems might require immediate local data processing.
Connectivity Dependence: Reliable internet connectivity is a prerequisite for cloud storage. IoT devices
deployed in remote or areas with poor connectivity might face challenges.
Security and Privacy Concerns: While cloud providers have robust security measures, some organizations
might have concerns about transmitting and storing sensitive IoT data on third-party infrastructure.
Compliance with data sovereignty regulations can also be a factor.
Data Egress Costs: Retrieving large volumes of IoT data from the cloud for processing or analysis can
lead to significant egress charges.
Low Latency: Local servers offer the lowest possible latency for data access, which is critical for real-time
IoT applications that require immediate processing and response. Edge computing architectures often rely
on local storage for this reason.
Enhanced Security and Control: Organizations have direct control over the physical security and access to
data stored on their local servers, which can be a major advantage for sensitive IoT data.
Independence from Internet Connectivity: Local storage ensures continuous data collection and access
even if internet connectivity is intermittent or unavailable. This is vital for critical infrastructure or remote
deployments.
Predictable Costs (Long-Term): While the initial investment in hardware and setup can be high, the
ongoing costs might be more predictable in the long run compared to variable cloud storage fees,
especially for consistently high data volumes.
Disadvantages:
Limited Scalability: Scaling local storage to accommodate the exponential growth of IoT data can be
expensive and complex, requiring significant hardware upgrades and management.
Higher Upfront Costs and Maintenance: Setting up and maintaining local server infrastructure involves
substantial capital expenditure, as well as ongoing costs for power, cooling, IT staff, and security.
Limited Accessibility and Integration: Accessing and integrating data on local servers with cloud-based
analytics or other services can be more complex and might require additional software and configurations.
Responsibility for Maintenance and Security: The organization is fully responsible for the maintenance,
security, backups, and disaster recovery of its local server infrastructure.
Edge Computing: Processing and storing a subset of the most time-sensitive or critical data locally at the
edge (near the devices). This addresses latency and bandwidth concerns.
Cloud Storage for Long-Term Archival and Analytics: Transferring less time-critical unstructured data to
the cloud for scalable storage, long-term archiving, and leveraging cloud-based big data analytics and AI
services.
Textual unstructured data can be searched for simple content. Traditional analytics solutions are designed to work
with highly organized relational data, therefore they're useless for unstructured data like rich media, consumer
mteractions, and social media.
Big Data and unstructured data are frequently associated: according to IDC, 90 percent of these massive
databases are unstructured. New technologies for analyzing these and other unstructured sources have lately
become accessible. Such platforms, which are powered by Al and machine learning, operate in near real-time and
educate themselves depending on the patterns and insights they unearth. These systems are being used on big
unstructured datasets to enable applications that have never been conceivable before, such as:
• Customer social media chats and interactions are being tracked and analyzed.
Cloud storage
Cloud storage, while not technically a device, is the newest and most adaptable sort of computer storage. The
"cloud" is a massive collection of servers situated in data centers all over the world, rather than a single location
or thing. You're saving a document on these servers when you save it to the cloud.
Because cloud storage stores everything online, it saves space by not using any of your computer's secondary
storage.
Cloud storage offers much better storage capabilities than USB flash drives and other physical choices. You won't
have to search through each device to find the proper file this way.
External hard drives and solid-state drives (HDDs and SSDs) were formerly popular because of their portability,
but they, too, fall short when compared to cloud storage. There aren't many external hard drives that are small
enough to fit in your pocket. They are still physical devices, despite being smaller and lighter than a computer's
internal storage drive. The cloud, on the other hand, may accompany you everywhere you go without taking up
physical space or exposing you to the physical risks of an external drive.
External storage devices were also popular as a speedy way to transfer files, but they’re only useful if each actual
device can be accessed. As many firms increasingly function remotely, cloud computing is flourishing.
Preventing Unauthorized Access: Ensures that only legitimate and trusted devices can connect to the
network and interact with other devices or cloud services.
Protecting Data Integrity: Prevents malicious devices from injecting false data into the system.
Maintaining System Stability: Prevents compromised devices from disrupting the normal operation of the
IoT network.
Ensuring Secure Updates: Verifies the source of software updates to prevent the installation of malicious
firmware.
Establishing Trust: Forms the foundation for secure communication and data exchange.
Pre-shared Keys (PSK): Each device is provisioned with a unique secret key that is also known by the
central authentication server or gateway. During connection, the device proves its identity by
demonstrating knowledge of this key.
o Pros: Simple to implement for smaller deployments.
o Cons: Scalability challenges for large deployments, key management can be complex, a single
compromised key can affect multiple devices.
Digital Certificates (X.509): Each device is issued a unique digital certificate signed by a trusted
Certificate Authority (CA). The server or other devices can verify the device's identity by validating the
certificate and the chain of trust back to the CA.
o Pros: Strong security, scalable for large deployments, easier key management through certificate
lifecycle management.
o Cons: More complex to implement initially, requires a Public Key Infrastructure (PKI).
Hardware Security Modules (HSMs) or Secure Elements (SEs): Dedicated hardware chips within the
device that securely store cryptographic keys and perform cryptographic operations. This makes it much
harder to extract or tamper with the device's identity.
o Pros: Very high level of security for key storage and cryptographic operations.
o Cons: Increased hardware cost, more complex integration.
Trusted Platform Modules (TPM): A specialized chip on the device motherboard that can securely store
cryptographic keys, platform integrity measurements, and provide other security functionalities.
o Pros: Enhances device security and integrity.
o Cons: Requires TPM hardware on the device.
Token-Based Authentication: After initial authentication (using one of the methods above), the device
may receive a temporary security token (e.g., OAuth 2.0 access token). Subsequent communication uses
this token for identification, reducing the need for repeated full authentication.
o Pros: Improves efficiency after initial authentication.
o Cons: Requires secure token management and storage.
Physical Unclonable Functions (PUFs): Leveraging inherent, unique variations in the physical
manufacturing process of integrated circuits to create a unique "fingerprint" for each device. This can be
used for authentication without storing secret keys.
o Pros: Highly secure as the "key" is physically embedded and difficult to replicate.
o Cons: Still an evolving technology, can be susceptible to environmental variations.
Enforcing Least Privilege: Ensures that devices only have the necessary permissions to perform their
intended functions, limiting the potential damage if a device is compromised.
Data Access Control: Restricts devices from accessing sensitive data they are not authorized to view or
modify.
Preventing Unauthorized Actions: Prevents devices from performing actions that could disrupt the system
or harm other devices.
Implementing Security Policies: Allows administrators to define and enforce security policies across the
IoT deployment.
Role-Based Access Control (RBAC): Devices are assigned roles based on their function (e.g.,
temperature sensor, smart lock controller). Permissions are then associated with these roles.
o Pros: Simplifies management of permissions for a large number of devices with similar
functionalities.
o Cons: Might not be granular enough for devices with highly specific authorization needs.
Attribute-Based Access Control (ABAC): Authorization decisions are based on attributes of the device,
the resource being accessed, and the context of the request (e.g., time of day, location).
o Pros: Highly flexible and granular control over access.
o Cons: Can be more complex to implement and manage.
Access Control Lists (ACLs): Explicitly define which devices or users have access to specific resources
and what actions they can perform.
o Pros: Provides fine-grained control over individual resources.
o Cons: Can become difficult to manage for large and dynamic IoT deployments.
Capabilities/Tokens: After authentication, a device might receive a capability token that grants it specific
permissions for a limited time or scope.
o Pros: Provides temporary and specific authorization.
o Cons: Requires secure management and revocation of tokens.
Policy-Based Authorization: Centralized policy engines evaluate requests based on predefined policies to
determine if access should be granted.
o Pros: Enables consistent and centralized enforcement of security policies.
o Cons: Requires a robust policy management system.
Scalability: Managing authentication and authorization for a massive number of diverse devices can be
complex.
Device Heterogeneity: The wide range of devices with varying capabilities and security features makes it
difficult to implement uniform security solutions.
Lifespan of Devices: IoT devices can have long lifespans, requiring ongoing security management and updates.
Dynamic Environments: Devices may move, join, and leave the network frequently, requiring dynamic
authentication and authorization mechanisms.
Over-the-Air Updates: Securely updating device firmware and security credentials is crucial.
(same thing in board way if you don’t want read that’s also fine)
Authentication and authorization are two crucial components in the ongoing effort to keep Internet clients and
devices safe. Because, at its most basic level, the Internet of Things is just devices—from simple sensors to
intricate automobiles and mobile devices—connecting together to share data, these components axe critical to
any IoT project. These connections need to be protected, and authentication and authorization can help.
Although there are some parallels between the two notions, they each represent something very different in this
context:
Authentication
The process of recognizing the device is known as authentication. The authentication method for Message
Queuing Telemetry Transport (MQTT) is to ensure that the device's client ID is valid, that is, that the ID belongs
to the device in question.
Authorization
Authorization is a method of associating a certain device with specific permissions. Authorization is split into two
steps using Edge Connect:
• Associating devices with groups
• Creating a link between groups and issues
Authentication and authorization can be divided into two categories: device-based and userbased.
Let's take a closer look at each of them and how they’re used.
Device-based authentication and authorization will most likely be utilized for devices that do not have operators
(or users), or for devices where the connection is not dependent on the operator. An automobile is an excellent
example: whether or not the car has user-specific communication—such as running user applications or offering
user-specific configurations— the device (i.e., the car) will most likely wish to be linked to share car-specific
information. Diagnostics, command and control, software updates, and advanced feature availability are all
examples of data that is exclusive to the car rather than the driver.
Client-side certificates saved in the automobile are used for device-based authentication and authorization.
During the TLS handshake, authentication takes place. The automobile will send up its certificate, which will be
signed by a preset signing authority, as well as information signed by its private key, as part of the handshake.
The device is authenticated after the handshake is completed, and the client ID is taken from the certificate. The
client ID for an automobile might be the vehicle identification number (VIN).
After the car has been validated and the client ID has been determined, the proper authorization groups must be
determined. A device can join an authorization group simply by connecting. Because the device in this case is a
car, all automobiles that connect will be assigned to the authorization group "car." Additional groups, just like the
client ID, can be derived from the certificate. The VIN of our car, for example, can be used to extract a range of
groups.
We already know the manufacturer in this scenario because the client has already been validated by the
manufacturer. However, the certificate/VIN can also be used to derive the brand and year. The authorization
group "B-BH” (which stands for “Brand=BH”) and the group “Y-M” (which stands for “Year=M”) would be
allocated to the car in this situation. Other fields that may include features can be retrieved and turned into groups
as well. The car's devicebased authorization groups would be something like: car, B-BH,Y-M, NAV assuming we
pulled information from another field and established that the car was a premium package with a navigation
system.
The person is the focus of user-based authentication and authorization rather than the device. While a device must
still offer a unique device ID, the authorization groups in this case are determined by the user's identification.
Edge Connect supports JSON Web Tokens for this type of connection (JWT). The user will log in with
credentials on the device by sending a request to a JWT server (not included with Edge Connect); once verified
and authorized, a JWT token will be returned, as shown in Figure A below. Claims in this token include the client
ID, user, authorization groups, and an expiry date. The token is also signed to confirm that it is legitimate.
----------------------------------------------------------------------------------------
Fig3:JWT
The next step
The next step is to link these authorizations to subjects after a device or user has been authenticated and allocated
authorization groups (topics are basically named channels, or queues, that messages are published against). The
first step in the binding process is to create subject access control lists, or "topic ACLs." Topic ACLs are made up
of a topic or a topic filter (i.e., a wildcard topic) and a list (or lists) of publishers and/or subscribers. ACLs with
topic filters, publishers, and subscribers are shown in the graph below. The first ACL illustrates a typical wildcard
subject filter with PUB1 as the sole publisher and SUB1 as the single subscriber, as well as a typical wildcard
topic filter.
Any connection to the PUB1 permission group would be able to publish to any subject that met the filter's
requirements. Thus, a connection to the PUB1 permission group could publish to topic/foo, topic/bar, and
topic/foo/bar in this situation. The # wildcard means that “topic/” can be followed by any number of paths; if the
topic filter had been topic/+, topic/foo and topic/bar would have matched, but topic/foo/bar would not.
It's worth noting that the percent c path and the percent u path are defined in two different sets of ACLs.
Permissions to the topic are granted to devices whose client ID matches percent c in the percent c ACLs. Only a
device with the client ID devOOOl would be able to publish to device/devOOOl/up for the device/percent c/up
topic. Anyone in the SUB2 authorization group might, of course, subscribe to (or read from) the topic. A
device-specific topic is what it’s termed. Only the device having an authorized client ID that matches the subject
can publish to (or subscribe to, in the second ACL) that topic.
The percent u works in the same way as the percent c, except it uses the username instead of the client ID.
User-specific themes are what they're called. The connection must send a JWT token with a username in a
claim—often the subject) claim—to obtain access to these subjects as a user. For user-based services, this form of
topic ACL is ideal. Chat is a good example of such a service because it allows users to join from their mobile
device, desktop device, and web-based device all at once. They must all have unique client IDs, but they're all
serving the same person. As a result, it’s a user-specific subject.
All ACLs are examined while determining permissions, therefore one or more ACLs may apply to a certain topic.
There are five ACLs in all, as shown in the chart below, with the subject my/topic/foo/bar matching three of them.
Publ, pub2, and subl, sub2, sub3 are the publishers and subscribers in this scenario, accordingly. The
authorization groups are cumulative when more than one ACL is matched, as seen below.
Key takeaway
Authentication and authorization are two crucial components in the ongoing effort to keep Internet clients and
devices safe. Because, at its most basic level, the Internet of Things is just devices—from simple sensors to
intricate automobiles and mobile devices—connecting together to share data, these components are critical to any
IoT project.