1 - Iot Final Notes
1 - Iot Final Notes
AND ENGINEERING
INTERNET OF THINGS
NOTES
24-03-2025
By@ HARIKRISHNA.B
ASSISTANT PROFESSOR
1.1 Introduction
⚫ The Internet of Things represents the whole way from collecting data,
processing it, taking an action corresponding to the signification of this
data to storing everything in the cloud. All this is made possible by the
internet
⚫ The Internet of things has become a very widely spread concept in the last few
years. The reason for
this is mainly the need to computerize and control most of the surrounding
objects and have access to data in real time.
⚫ Example: Parking sensors, about phones which can check the weather and so
on
Characteristics of IoT
i)Dynamic & Self Adapting:
IoT devices and systems may have the capability to dynamically
adapt with the changing contexts and take actions based on their
operating conditions, user‘s context or sensed environment.
Eg: The surveillance system comprising of a number of surveillance
cameras. The surveillance camera can adapt modes based on whether it
is day or night. The surveillance system is adapting itself based on
context and changing conditions. ii)Self Configuring:
IOT devices have self configuring capability,allowing a large
number of devices to work together to provide certain
functionality. These devices have the ability configure themselves
setup networking, and fetch latest software upgrades with minimal
manual or user interaction.
iii) Inter Operable Communication Protocols: support a number of
Applications of IoT:
1) Home
2) Cities
3) Environment
4) Energy
5) Retail
6) Logistics
7) Agriculture
8) Industry
9) Health &LifeStyle
The "Things" in IoT usually refers to IoT devices which have unique identities
and can perform remote sensing, actuating and monitoring capabilities.
IoT devices can:
• Exchange data with other connected devices and applications (directly or
indirectly), or
• Collect data from other devices and process the data locally or
• Send the data to centralized servers or cloud-based application back-ends for
processing the data,
• Perform some tasks locally and other tasks within the IoT infrastructure,
based on temporal and space constraints
Generic block diagram of an IoT Device
• An IoT device may consist of several interfaces for connections to other devices,
both wired and wireless.
• I/O interfaces for sensors
• Interfaces for Internet connectivity
• Memory and storage interfaces
• Audio/video interfaces.
a) Link Layer :
Protocols determine how data is physically sent over the network‘s
physical layer or medium. Local network connect to which host is
attached. Hosts on the same link exchange data packets over the link layer
using link layer protocols. Link layer determines how packets are coded
and signalled by
the h/w device over the medium to which the host is attached.
Protocols:
Protocols:
• IPv4: Internet Protocol version4 is used to identify the devices on a n/w using
a hierarchical addressing scheme. 32 bit address. Allows total of 2*32addresses.
• IPv6: Internet Protocol version6 uses 128 bit address scheme and allows 2*128
addresses.
• 6LOWPAN:(IPv6 over Low power Wireless Personal Area Network)
operates in 2.4 GHz frequency range and data transfer 250 kb/s.
c) Transport Layer:
Protocols:
• TCP: Transmission Control Protocol used by web browsers(along with
HTTP and HTTPS), email(along with SMTP, FTP). Connection oriented and
stateless protocol. IP Protocol deals with sending packets, TCP ensures reliable
transmission of protocols in
order. Avoids n/w congestion and congestion collapse.
• UDP: User Datagram Protocol is connectionless protocol.
Useful in time sensitive applications, very small data units to
exchange. Transaction oriented and stateless protocol. Does not
provide guaranteed delivery.
d) Application Layer:
Defines how the applications interface with lower layer protocols to send
data over the n/w. Enables process-to-process communication using ports.
Protocols:
• HTTP: Hyper Text Transfer Protocol that forms foundation of WWW. Follow
requestresponse model
Stateless protocol.
• CoAP:Constrained Application Protocol for
machine-to-machine(M2M) applications with
constrained devices, constrained environment and constrained n/w. Uses client-
server architecture.
• WebSocket: allows full duplex communication over a single socket connection.
• MQTT: Message Queue Telemetry Transport is light weight messaging
protocol based on publish- subscribe model. Uses client server architecture. Well
suited for constrained environment.
• XMPP: Extensible Message and Presence Protocol for real time
communication and streaming XML data between network entities. Support
client-server and server-server communication.
• DDS: Data Distribution Service is data centric middleware standards
for device-to-device or machine-to-machine communication. Uses publish-
subscribe model.
• AMQP: Advanced Message Queuing Protocol is open application layer
protocol for business messaging. Supports both point-to-point and publish-
subscribe model.
A) Request-Response
B) Publish-
Subscribe
C)Push-Pull
D) Exclusive Pair
A) Request-Response
REST:
Big data is defined as collections of data sets whose volume , velocity or variety
is so large that it is difficult to store, manage, process and analyze the data using
traditional databases and data processing tools.
Some examples of big data generated by
IoT are
Sens
or data generated by IoT systems.
• Machine sensor data collected from sensors established in industrial
and energy systems.
• Health and fitness data generated IoT devices.
• Data generated by IoT systems for location and tracking vehicles.
• Data generated by retail inventory
monitoring systems. The underlying characteristics of
Big Data are
Volume: There is no fixed threshold for the volume of data for big data. Big
data is used for massive scale data.
Velocity: Velocity is another important characteristics of Big Data and the
primary reason for exponential growth of data.
Variety: Variety refers to the form of data. Big data comes in different
forms such as structured or unstructured data including test data, image , audio,
video and sensor data .
Level-1 IoT systems has a single node that performs sensing and/or actuation,
stores data, performs analysis and host the application. Suitable for modeling
low cost and low complexity solutions where the data involved is not big and
analysis requirement are not computationally intensive. An e.g., of IoT Level1 is
Homeautomation.The system consist of a single node that allows controlling the
lights and appliances in a home the device used in this system interfaces with
the lights and appliances using electronic rely switches. The status information
of each light or appliances is maintained in a local database. REST services
deployed locally allow retrieving and updating the state of each lighter appliance
in the status database. The controller service continuously monitors the state of
each light or appliance by retrieving the light from the database.
1.5.2 IoT Level 2
IoT Level2 has a single node that performs sensing and/or actuating and local
analysis as shown in fig. Data is stored in cloud and application is usually cloud
based. Level2 IoT systems are suitable for solutions where data are involved is
big, however, the primary analysis requirement is not computationally intensive
and can
be done locally itself. An e,g., of Level2 IoT system for Smart Irrigation.
The system consists of a single node that monitors the soil moisture level and
controls the irrigation system. The device used system collects soil moisture data
from sensors. The controller service continuously monitors the moisture level. A
cloud based REST web service is used for storing and retrieving moisture data
which is stored in a cloud database. A cloud based application is used for
visualizing the moisture level over a period of time which can help in making
decision about irrigation schedule.
b) Smart Appliances: make the management easier and also provide status
information to the users remotely.
c) Intrusion Detection: use security cameras and sensors(PIR sensors and door
sensors) to detect intrusion and raise alerts. Alerts can be in the form of SMS
or email sent to the user.
d) Smoke/Gas Detectors: Smoke detectors are installed in homes and buildings
to detect smoke that is typically an early sign of fire. Alerts raised by smoke
detectors can be in the form of signals to a fire alarm system. Gas detectors
can detect the presence of harmful gases such as CO, LPGetc.,
2) Cities:
a) Smart Parking: make the search for parking space easier and convenient for
drivers. Smart parking are powered by IoT systems that detect the no. of
empty parking slots and send information over internet to smart application
backends.
b) Smart Lighting: for roads, parks and buildings can help in saving energy.
f) Emergency Response: IoT systems for fire detection, gas and water leakage
detection can help in generating alerts and minimizing their effects on the
critical infrastructures.
3) Environment:
d) Forest Fire Detection: Forest fire can cause damage to natural resources,
property and human life.
Early detection of forest fire can help in minimizing damage.
e) River Flood Detection: River floods can cause damage to natural and human
resources and human life. Early warnings of floods can be given by
monitoring the water level and flow rate. IoT based river flood monitoring
system uses a no. of sensor nodes that monitor the water level and flow rate
sensors.
4) Energy:
5) Retail:
6) Logistics:
a) Route generation & scheduling: IoT based system backed by cloud can
provide first response to the route generation queries and can be scaled upto
serve a large transportation network.
7) Agriculture:
8) Industry:
b) Wearable Electronics
M2M Communication
M2M Applications
The possibilities in the realm of M2M can be seen in four major use cases, which
we’ve detailed below:
1. MANUFACTURING
2. HOME APPLIANCES
IoT already affects home appliance connectivity through platforms like Nest.
However, M2M is expected to take home-based IoT to the next level.
Manufacturers like LG and Samsung are already slowly unveiling smart home
appliances to help ensure a higher quality of life for occupants.
For example, an M2M-capable washing machine could send alerts to the owners’
smart devices once it finishes washing or drying, and a smart refrigerator could
automatically order groceries from Amazon once its inventory is depleted. There
are many more examples of home automation that can potentially improve
quality of life for residents, including systems that allow members of the
household to remotely control HVAC systems using their mobile devices. In
situations where a homeowner decides to leave work early, he or she could
contact the home heating system before leaving work to make sure the
temperature at home will be comfortable upon arrival.
One of the biggest opportunities for M2M technology is in the realm of health
care. With M2M technology, hospitals can automate processes to ensure the
highest levels of treatment. Using devices that can react faster than a human
healthcare professional in an emergency situation make this possible. For
instance, when a patient’s vital signs drop below normal, an M2M-connected life
support device could automatically administer oxygen and additional care until a
healthcare professional arrives on the scene. M2M also allows patients to be
monitored in their own homes instead of in hospitals or care centers.
For example, devices that track a frail or elderly person’s normal movement can
detect when he or she has had a fall and alert a healthcare worker to the situation.
M2M features:
M2M technology could be present in our homes, offices, shopping malls and
other places. Controlling electrical appliances like bulbs and fans using RF or
Bluetooth from your smartphone is a simple example of M2M applications at
home. Here, the electrical appliance and your smartphone are the two machines
interacting with each other.
The Internet of Things (IoT) is the network of physical devices embedded with
sensors, software and electronics, enabling these devices to communicate with
each other and exchange data over a computer network. The things in the IoT
refer to hardware devices uniquely identifiable through a network platform
within the Internet infrastructure.
Some more differences like:
Communication Protocols:
• M2M and IoT can differ in how the communication between the machines
ordevices happens.
• M2M uses either proprietary or non-IP based communication protocols for
communication within the M2M area networks. IoT uses IP bases communication
protococls.
• The "Things" in IoT refers to physical objects that have unique identifiers and
can sense and communicate with their external environment (and user
applications) or their internal physical states.
• M2M systems, in contrast to IoT, typically have homogeneous machine types
within an M2M area
network.
Hardware vs Software Emphasis:
Applications:
Data plane:
All the activities involving as well as resulting from data packets sent by the end-
user belong to this plane. This includes:
• Forwarding of packets.
• Segmentation and reassembly of data.
• Replication of packets for multicasting.
Control plane:
All activities necessary to perform data plane activities but do not involve end-
user data packets belong to this plane. In other words, this is the brain of the
network. The activities of the control plane include:
• Making routing tables.
• Setting packet handling policies.
Why SDN is Important?
• Enterprises use SDN, the most widely used method for application
deployment, to deploy applications faster while lowering overall
deployment and operating costs. SDN allows IT administrators to
manage and provision network services from a single location.
• Cloud networking software-defined uses white-box systems. Cloud
providers often use generic hardware so that the Cloud data center can be
changed and the cost of CAPEX and OPEX saved.
Components of Software Defining Networking (SDN)
The three main components that make the SDN are:
1. SDN Applications: SDN Applications relay requests or networks
through SDN Controller using API.
2. SDN controller: SDN Controller collects network information from
hardware and sends this information to applications.
3. SDN networking devices: SDN Network devices help in forwarding and
data processing tasks.
SDN Architecture
In a traditional network, each switch has its own data plane as well as the control
plane. The control plane of various switches exchange topology information and
hence construct a forwarding table that decides where an incoming data packet
has to be forwarded via the data plane. Software-defined networking (SDN) is an
approach via which we take the control plane away from the switch and assign it
to a centralized unit called the SDN controller. Hence, a network administrator
can shape traffic via a centralized console without having to touch the individual
switches. The data plane still resides in the switch and when a packet enters a
switch, its forwarding activity is decided based on the entries of flow tables,
which are pre-assigned by the controller. A flow table consists of match fields
(like input port number and packet header) and instructions. The packet is first
matched against the match fields of the flow table entries. Then the instructions
of the corresponding flow entry are executed. The instructions can be forwarding
the packet via one or multiple ports, dropping the packet, or adding headers to the
packet. If a packet doesn’t find a corresponding match in the flow table, the
switch queries the controller which sends a new flow entry to the switch. The
switch forwards or drops the packet based on this flow entry.
communicates with the switches using south-bound API with the help of
OpenFlow protocol.
Open SDN
2. SDN via APIs: In SDN via API, the functions in remote devices like switches
are invoked using conventional methods like SNMP or CLI or through newer
methods like Rest API. Here, the devices are provided with control points
enabling the controller to manipulate the remote devices using APIs.
3.SDN via Hypervisor-based Overlay Network: In SDN via the hypervisor, the
configuration of physical devices is unchanged. Instead, Hypervisor based
overlay networks are created over the physical network. Only the devices at the
edge of the physical network are connected to the virtualized networks, thereby
concealing the information of other devices in the physical network.
SDN via Hypervisor-based Overlay Network
Advantages of SDN
• The network is programmable and hence can easily be modified via the
controller rather than individual switches.
• Switch hardware becomes cheaper since each switch only needs a data
plane.
• Hardware is abstracted, hence applications can be written on top of the
controller independent of the switch vendor.
• Provides better security since the controller can monitor traffic and
deploy security policies. For example, if the controller detects suspicious
activity in network traffic, it can reroute or drop the packets.
Disadvantages of SDN
Usage of software by virtual machines enables to carry out the same networking
tasks as conventional hardware. The software handles the task of load balancing,
routing, and firewall security. Network engineers can automate the provisioning
of the virtual network and program all of its various components using a
hypervisor or software-defined networking controller.
Benefits of NFV:
• Many service providers believe that advantages outweigh the issues of NFV.
• Traditional hardware-based networks are time-consuming as these
require network administrators to buy specialized hardware units,
manually configure them, then join them to form a network. For this
skilled or well-equipped worker is required.
• It costs less as it works under the management of a hypervisor, which is
significantly less expensive than buying specialized hardware that serves
the same purpose.
• Easy to configure and administer the network because of a virtualized
network. As a result, network capabilities may be updated or added
instantly.
Risks of NFV:
Security hazards do exist, though, and network functions virtualization security
issues have shown to be a barrier to widespread adoption among telecom
companies. The following are some dangers associated with implementing
network function virtualization that service providers should take into account:
• Physical security measures do not work: Comparing virtualized
network components to locked-down physical equipment in a data center
enhances their susceptibility to new types of assaults.
• Malware is difficult to isolate and contain: Malware travels more easily
among virtual components running on the same virtual computer than
between hardware components that can be isolated or physically
separated.
• Network activity is less visible: Because traditional traffic monitoring
tools struggle to detect potentially malicious anomalies in network traffic
going east-west between virtual machines, NFV necessitates more fine-
grained security solutions.
NFV Architecture:
NeedforIoTSystems Management
Managingmultipledeviceswithinasinglesystem
requiresadvancedmanagementcapabilitie.
1) AutomatingConfiguration:IoTsystemmanagementcapabilitiesca
nhelpin
automat
ing the systemconfiguration.
2) Monitoring Operational & Statistical Data : Management systems
can help in monitoring opeartional and statistical data of a system. This
data can be used for fault diagnosis orprognosis.
3) Improved Reliability: A management system
that allows validating the system
configurationsbeforetheyareputinto effect canhelp inimprovingthe
systemreliability.
4) System Wide Configurations : For IoT systems that consists of
multiple devices or nodes, ensuring system wide configuration can be
critical for the correct functioning of thesystem.
5) Multiple System Configurations : For some systems it
may be desirable to have
multiplevalidconfigurationswhichareappliedatdifferenttimesorin
certainconditions.
6) Retrieving&ReusingConfigurations:
Managementsystemswhichhavethecapability of retrieving configurations
from devices can help in reusing the configurations for other devices of
the sametype.
IoTSystemsManagementwithNETCONF-YANG
YANGisadatamodelinglanguageusedtomodelconfigurationandstatedatamanup
ulated by the NETCONF protocol.
ThegenericapproachofIoTdevicemanagement with
NETCONF-YANG. Rolesof various componentsare:
1) ManagementSystem
2) ManagementAPI
3) TransactionManager
4) RollbackManager
5) Data ModelManager
6) ConfigurationValidator
7) ConfigurationDatabase
8) ConfigurationAPI
9) Data ProviderAPI
1) Management System : The operator uses a management system to send
NETCONF messages to configure the IoT device and receives state
information and notifications from the device as NETCONFmessages.
2) ManagementAPI :allowsmanagementapplicationtostartNETCONFsessions.
5) DataModelManager:
KeepstrackofalltheYANGdatamodelsandthecorrespon
ding managed objects. Also keeps track oftheapplications
which providedataforeach partof a datamodel.
9) DataProviderAPI: Applicationsonthe
IoTdevicecanregisterforcallbacksforvarious events using the Data
Provider API. Through the Data Provider API, the applications can report
statistics and opeartionaldata.
StepsforIoTdeviceManagementwithNETCONF-YANG
1) Create a YANG model of the system that defines the configuration and state
data of the system.
2) CompletetheYANGmodelwiththe‗Inctool‘whichcomeswithLibnetconf.
3) Fillinthe IoTdevicemangementcodeintheTransAPImodule.
4) BuildthecallbacksC filetogeneratethelibraryfile.
5) Load the YANG module and the TransAPImodule into
the Netopeer server using Netopeermanagertool.
6) The operator can now connect from the management system to the
Netopeer server using the NetopeerCLI.
7) Operator can issue NETCONF commands from the Netopeer CLI.
Command can be issued to changew the configuration dsta, get
operational dat or execute an RPC on the IoTdevice.
The first step in IoT system design methodology is to define the purpose
and requirements of the system. In this step, the system purpose,
behavior and requirements (such as data collection requirements, data
analysis requirements, system management requirements, data privacy
and security requirements, user interface requirements, ...) are captured.
The fifth step in the IoT design methodology is to define the service
specifications. Service specifications define the services in the IoT
system, service types, service inputs/output, service endpoints, service
schedules, service preconditions and service effects.
The sixth step in the IoT design methodology is to define the IoT level for the
system.
Sensors:
A sensor can be described using several properties, the most important being:
• Range: The maximum and minimum values of the phenomenon that the sensor
can measure.
• Sensitivity: The minimum change of the measured parameter that causes
a detectable change in output signal.
• Resolution: The minimum change in the phenomenon that the sensor can
detect.
Sensor Classification:
Examples include:
• A light sensor which detects if a light is shining on it.
• An infra-red sensor which detects the temperature of an object.
An active sensor is one which transmits a signal into the environment and then
measures the response that comes back.
One example is an ultrasonic system:
Another classification is based on the method used to detect and measure the
property (mechanical, chemical, etc.).
1) Temperature Sensors
2) Humidity Sensors
• These types of sensors measure the amount of water vapor in the
atmosphere of air or other gases. Humidity sensors are commonly found in
heating, vents and air conditioning (HVAC) systems in both industrial and
residential domains. They can be found in many other areas including
hospitals, and meteorology stations to report and predict weather.
• A pressure sensor senses changes in gases and liquids. When the pressure
changes, the sensor detects these changes, and communicates them to
connected systems. Common use cases include leak testing which can be a
result of decay. Pressure sensors are also useful in the manufacturing of
water systems as it is easy to detect fluctuations or drops in pressure.
5. Proximity Sensors
• Proximity sensors are used for non-contact detection of objects near the
sensor. These types of sensors often emit electromagnetic fields or beams
of radiation such as infrared. Proximity sensors have some interesting use
cases. In retail, a proximity sensor can detect the motion between a
customer and a product in which he or she is interested. The user can be
notified of any discounts or special offers of products located near the
sensor. Proximity sensors are also used in the parking lots of malls,
stadiums and airports to indicate parking availability. They can also be used
on the assembly lines of chemical, food and many other types of industries.
6. Level Sensors
• Level sensors are used to detect the level of substances including liquids,
powders and granular materials. Many industries including oil
manufacturing, water treatment and beverage and food manufacturing
factories use level sensors. Waste management systems provide a common
use case as level sensors can detect the level of waste in a garbage can or
dumpster.
7. Accelerometers
• These types of sensors monitor and detect changes in air quality, including
the presence of toxic, combustible or hazardous gasses. Industries using gas
sensors include mining, oil and gas, chemical research and manufacturing.
A common consumer use case is the familiar carbon dioxide detectors used
in many homes.
Optical sensors convert rays of light into electrical signals. There are many
applications and use cases for optical sensors. In the auto industry, vehicles use
optical sensors to recognize signs, obstacles, and other
things that a driver would notice when driving or parking. Optical sensors play a
big role in the development of driverless cars. Optical sensors are very common
in smart phones. For example, ambient light sensors can extend battery life.
Optical sensors are also used in the biomedical field including breath analysis
and heart- rate monitors.
Actuators:
Hydraulic Actuators –
Electrical Actuators –
Mechanical Actuators –
ZigBee is a Personal Area Network task group with low rate task group 4. It is a
technology of home networking. ZigBee is a technological standard created for
controlling and sensing the network. As we know that ZigBee is the Personal
Area network of task group 4 so it is based on IEEE 802.15.4 and is created by
Zigbee Alliance.
ZigBee is a standard that addresses the need for very low-cost implementation of
Low power devices with Low data rates for short-range wireless
communications.
Operating Frequency Bands (Only one channel will be selected for use in a
network):
1. Channel 0: 868 MHz (Europe)
2. Channel 1-10: 915 MHz (the US and Australia)
3. Channel 11-26: 2.4 GHz (Across the World)
Zigbee Network Topologies:
• Star Topology (ZigBee Smart Energy): Consists of a coordinator and
several end devices, end devices communicate only with the coordinator.
• Mesh Topology (Self Healing Process): Mesh topology consists of one
coordinator, several routers, and end devices.
• Tree Topology: In this topology, the network consists of a central node
which is a coordinator, several routers, and end devices. The function of
the
router is to extend the network coverage.
Architecture of Zigbee:
• Physical layer: The lowest two layers i.e the physical and the MAC
(Medium Access Control) Layer are defined by the IEEE 802.15.4
specifications. The Physical layer is closest to the hardware and directly
controls and communicates with the Zigbee radio. The physical layer
translates the data packets in the over-the-air bits for transmission and vice-
versa during the reception.
• Medium Access Control layer (MAC layer): The layer is responsible for
the interface between the physical and network layer. The MAC layer is
also responsible for providing PAN ID and also network discovery through
beacon requests.
• Network layer: This layer acts as an interface between the MAC layer and
the application layer. It is responsible for mesh networking.
• Application layer: The application layer in the Zigbee stack is the highest
protocol layer and it consists of the application support sub-layer and
Zigbee device object. It contains manufacturer- defined applications.
Channel Access:
1. Contention Based Method (Carrier-Sense Multiple Access With Collision
Avoidance Mechanism)
2. Contention Free Method (Coordinator dedicates a specific time slot to
each device (Guaranteed Time Slot (GTS)))
Zigbee Applications:
1. Home Automation
2. Medical Data Collection
3. Industrial Control Systems
4. meter reading system
5. light control system
Advantages:
8. Use Cases: LoRaWAN is suitable for a wide range of IoT use cases,
including smart agriculture, smart cities, industrial IoT, asset tracking, and
environmental monitoring, among others.
Disadvantages:
17. Latency: LoRaWAN is optimized for low power and long range,
which can result in higher latency compared to other wireless
technologies. This may not be suitable for applications requiring real-
time data transmission.
18. Interference:
In crowded radio frequency environments, interference
from other devices operating in the same frequency bands can affect
LoRaWAN communication quality.
8.Limited Use Cases: While LoRaWAN is versatile, it may not be the best choice
for all IoT applications, especially those that require high bandwidth, low
latency, or high mobility.
6LowPAN
6LoWPAN is an IPv6 protocol, and It’s extended from is IPv6 over Low Power
Personal Area Network. As the name itself explains the meaning of this protocol
is that this protocol works on Wireless Personal Area Network i.e., WPAN.
WPAN is a Personal Area Network (PAN) where the interconnected devices are
centered around a person’s workspace and connected through a wireless medium.
You can read more about WPAN at WPAN. 6LoWPAN allows communication
using the IPv6 protocol. IPv6 is Internet Protocol Version 6 is a network layer
protocol that allows communication to take place over the network. It is faster
and more reliable and provides a large number of addresses.
• 6LoWPAN can interact with 802.15.4 devices and also other types of
devices on an IP Network. For example, Wi-Fi.
• It uses AES 128 link layer security, which AES is a block cipher having key
size of 128/192/256 bits and encrypts data in blocks of 128 bits each. This
is defined in IEEE 802.15.4 and provides link authentication and
encryption.
1. The device should be having sleep mode in order to support the battery saving.
2. Minimal memory requirement.
3. Routing overhead should be lowered.
Features of 6LoWPAN:
Advantages of 6LoWPAN:
1. 6LoWPAN is a mesh network that is robust, scalable, and can heal on its own.
2. It delivers low-cost and secure communication in IoT devices.
3. It uses IPv6 protocol and so it can be directly routed to cloud platforms.
4. It offers one-to-many and many-to-one routing.
5. In the network, leaf nodes can be in sleep mode for a longer duration of time.
Disadvantages of 6LoWPAN:
1. It is comparatively less secure than Zigbee.
2. It has lesser immunity to interference than that Wi-Fi and Bluetooth.
3. Without the mesh topology, it supports a short range.
Applications of 6LoWPAN:
•
Radio Frequency Identification (RFID) is a form of wireless communication
that incorporates the use of electromagnetic or electrostatic coupling in the radio
frequency portion of the electromagnetic spectrum to uniquely identify an object,
animal or person. It uses radio frequency to search ,identify, track and
communicate with items and people. it is a method that is used to track or
identify an object by radio transmission uses over the web. Data digitally
encoded in an RFID tag which might be read by the reader. This device work as a
tag or label during which data read from tags that are stored in the database
through the reader as compared to traditional barcodes and QR codes. It is often
read outside the road of sight either passive or active RFID.
Kinds of RFID :
There are many kinds of RFID, each with different properties, but perhaps the
most fascinating aspect of RFID technology is that most RFID tags have neither
an electric plug nor a battery. Instead, all of the energy needed to operate them is
supplied in the form of radio waves by RFID readers. This technology is called
passive RFID to distinguish it from the(less common) active RFID in which there
is a power source on the tag.
It is used on shipping pallets and some driver’s licenses. Readers send signals in
the 902-928 MHz band. Tags communicate at distances of several meters by
changing the way they reflect the reader signals; the reader is able to pick up
these reflections. This way of operating is called backscatter.
It operates at 13.56 MHz and is likely to be in your passport, credit cards, books,
and noncontact payment systems. HF RFID has a short-range, typically a meter
or less because the physical mechanism is based on induction rather than
backscatter.
There are also other forms of RFID using other frequencies, such as LF
RFID(Low-Frequency RFID), which was developed before HF RFID and used
for animal tracking
There are two types of RFID :
1. Passive RFID –
Passive RFID tags does not have their own power source. It uses power
from the reader. In this device, RF tags are not attached by a power
supply and passive RF tag stored their power. When it is emitted from
active antennas and the RF tag are used specific frequency like 125-
134KHZ as low frequency, 13.56MHZ as a high frequency and
856MHZ to 960MHZ as ultra-high frequency.
2. Active RFID –
In this device, RF tags are attached by a power supply that emits a signal
and there is an antenna which receives the data. means, active tag uses a
power source like battery. It has it’s own power source, does not require
power from source/reader.
Working Principle of RFID :
Generally, RFID uses radio waves to perform AIDC function. AIDC stands for
Automatic Identification and Data Capture technology which performs object
identification and collection and mapping of the data.
An antenna is an device which converts power into radio waves which are used
for communication between reader and tag. RFID readers retrieve the
information from RFID tag which detects the tag and reads or writes the data into
the tag. It may include one processor, package, storage and transmitter and
receiver unit.
Working of RFID System :
Application of RFID :
• It utilized in tracking shipping containers, trucks and railroad, cars.
• It uses in Asset tracking.
• It utilized in credit-card shaped for access application.
• It uses in Personnel tracking.
• Controlling access to restricted areas.
• It uses ID badging.
• Supply chain management.
• Counterfeit prevention (e.g., in the pharmaceutical industry).
Advantages of RFID :
Disadvantages of RFID :
History:
The concept of Wi-Fi is very old but its implementation is not so old. At first
ALOHA System is a wireless network system that is used to connect Hawaii
island via a network in the year 1971. Where the protocol is used for this was
ALOHA protocol and the network used packet transfer. Later it’s converted
to IEEE
802.11 protocol.
Then in 1985, the Federal Communications Commission (FCC) released a new
network for general uses which works on 900 Mhz, 2.4 GHz, and 5.8 GHz
bandwidth. This is known as the ISM band. Also, IBM introduced a Token Ring
LAN network for connecting several computers, it can transfer data at 4 Mb/s
speed. Then in 1988, a wireless cashier system was invented based on the Token
Ring LAN network known as waveLAN, it operates at 900MHz or 2.4 GHz band
and offers speeds of 1 to 2 Mbps. Then it was converted to IEEE
802.11LAN/MAN standards in 1989. ?Then in 1990, IEEE 802.11 Working
Group for Wireless LANs is established by Vic Hayes, who was known as the
“Father of WiFi”.
Then in 1994, Dr. Alex Hills introduced a research project on the wireless
network, which provided coverage of the network to 7 buildings wirelessly.
Then in 1996 Commonwealth Scientific and Industrial Research Organization
(CSIRO) introduced a wireless network based on the same protocol 802.11, later
it was known as IEEE 802.11a standards.
Then after all this in 1997 the first version of Wi-Fi is released officially which is
802.11 and it can support a maximum of 2 Mb/s link speed. Then in 1999, the
link speed is increased to 11 Mb/s over the 2.4 GHz frequency band, this version
is known as 802.11b
Then after a month, the IEEE 802.11a standard is approved officially, which
provides up to 54 Mb/s link speed over the 5 GHz band, but the signal range is
weaker than the 2.4 GHz band.
Then in 2003, the speed is increased in a new version, known as 802.11g. The
speed offers up to 54 to 108 Mb/s over 2.4
GHz. After this two more versions were introduced
that are, 802.11i and 802.11e. In 802.11i, the security mechanism was increased
and in 802.11e, Voice over Wireless LAN and multimedia streaming are
involved.
Then in 2009, 802.11n is developed, which supports both 2.4 GHz and 5 GHz
radiofrequency. And these are used simultaneously by dual-band routers and can
reach maximum speeds of 600 Mbps.
Then in 2014, a new version was introduced that offers a potential speed of 1733
Mb/s in the 5 GHz band. This version is known as 802.11ac. Till now this is the
latest version of Wi-Fi.
Applications of Wi-Fi :
Wi-Fi has many applications, it is used in all the sectors where a computer or any
digital media is used, also for entertaining Wi-Fi is used. Some
of the applications are mentioned below –
• Accessing Internet: Using Wi-Fi we can access the internet in any Wi-Fi-
capable device wirelessly.
• We can stream or cast audio or video wirelessly on any device using Wi-Fi
for our entertainment.
• We can share files, data, etc between two or more computers or mobile
phones using Wi-Fi, and the speed of the data transfer rate is also very
high. Also, we can print any document using a Wi- Fi printer, this is very
much used nowadays.
• We can use Wi-Fi as HOTSPOTS also, it points Wireless Internet
access for a particular range of area. Using Hotspot the owner of the
main network connection can offer temporary network access to Wi-Fi-
capable devices so that the users can use the network without knowing
anything about the main network connection. Wi-Fi adapters are mainly
spreading radio signals using the owner network connection to provide a
hotspot.
• Using Wi-Fi or WLAN we can construct simple wireless connections
from one point to another, known as Point to point networks. This can be
useful to connect two locations that are difficult to reach by wire, such as
two buildings of corporate business.
• One more important application is VoWi-Fi, which is known as voice-
over Wi-Fi. Some years ago telecom companies are introduced VoLTE
(Voice over Long-Term Evolution ). Nowadays they are introduced to
VoWi-Fi, by which we can call anyone by using our home Wi-Fi
network, only one thing is that the mobile needs to connect with the Wi-
Fi. Then the voice is transferred using the Wi-Fi network instead of
using the mobile SIM network, so the call quality is very good. Many
mobile phones are already getting the support of VoWi-Fi.
• Wi-Fi in offices: In an office, all the computers are interconnected using
Wi-Fi. For Wi-Fi, there are no wiring complexities. Also, the speed of
the network is good. For Wi-Fi, a project can be presented to all the
members at a time in the form of an excel sheet, ppt, etc. For Wi-Fi,
there is no network loss as in cable due to cable break.
• Also using W-Fi a whole city can provide network connectivity by
deploying routers at a specific area to access the internet. Already
schools, colleges, and universities are providing networks using Wi-Fi
because of its flexibility.
• Wi-Fi is used as a positioning system also, by which we can detect the
positions of Wi-Fi hotspots to identify a device location.
Types of Wi-Fi:
Wi-Fi has several types of standards, which are discussed earlier, here just the
name of the standards are defined,
Year
Standards o Description
f Release
Wi-Fi-1 This version has a link speed from 2Mb/s to 11
(802.11b) 1999 Mb/s over a 2.4 GHz frequency band
Wi-Fi-2 After a month of release previous version, 802.11a
(802.11a) 1999 was released and it provide up to 54 Mb/s link speed
over 5 Ghz band
Wi-Fi-3 In this version the speed was increased up to 54 to
(802.11g) 2003 108 Mb/s over 2.4 GHz
This is the same as 802.11g but only the security
802.11i 2004 mechanism was increased in this version
This is also the same as 802.11g, only Voice over
802.11e 2004 Wireless LAN and multimedia streaming are
involved
Wi-Fi-4 This version supports both 2.4 GHz and 5 GHz radio
(802.11n) 2009 frequency and it offers up to 72 to 600 Mb/s speed
Wi-Fi-5
(802.11ac) 2014 It supports a speed of 1733 Mb/s in the 5 GHz band
A new version will release in 2020 named 802.11ax developed by Huawei,
which can support, a maximum of 3.5 Gb/s. it will know Wi-Fi 6.
Working of Wi-Fi
All the electronics devices read data in binary form, also router or our devices,
here routers provide radio waves and those waves are receive by our devices and
read the waves in binary form. We all know how a wave looks like, the upper
pick of the wave is known as 1 and the lower pick of the wave is known as 0 in
binary. Like
below:
Data transmissionSome more terminologies
Disadvantages of Wi-Fi
• Power consumption is high while using Wi-Fi in any device which has a
battery, such as mobile, laptops, etc.
• Many times there may be some security problems happening even it
has encryption. Such as many times has known devices become
unknown to the router, Wi-Fi can be hacked also.
• Speed is slower than a direct cable connection.
• It has lower radiation like cell phones, so it can harm humans.
• Wi-Fi signals may be affected by climatic conditions like thunderstorms.
• Unauthorized access to Wi-Fi can happen because it does not have a
firewall.
• To use Wi-Fi we need a router, which needs a power source, so at the
time of power cut, we cannot access the internet.
Power Source
1. Battery Power:
- Advantages:
• Portability: Battery-powered IoT devices are highly portable and can be
placed virtually anywhere without the need for a power outlet.
• Low Maintenance: Batteries can provide power for extended periods
(months to years) without the need for frequent maintenance.
- Disadvantages:
• Limited Lifetime: Batteries have a finite lifespan, and their replacement or
recharging can be costly and impractical for certain deployments.
• Size and Weight: Batteries can add bulk and weight to IoT devices, which
may not be suitable for small or lightweight applications.
• Environmental Impact: Battery disposal and the environmental impact of
disposable batteries are concerns.
2. Solar Power:
- Advantages:
• Renewable Energy: Solar panels harness energy from the sun, providing
a renewable and eco- friendly power source.
• Extended Lifespan: Solar-powered IoT devices can operate for extended
periods without the need for battery replacement.
- Disadvantages:
3. Energy Harvesting:
- Advantages:
• Energy from the Environment: Energy harvesting technologies, such
as vibration, thermal, or kinetic energy, allow IoT devices to capture
energy from their environment.
• Continuous Operation: When implemented effectively, energy
harvesting can enable continuous device operation without the need for
battery replacement.
- Disadvantages:
• Variable Energy Availability: The availability of environmental energy
sources can vary, making it challenging to ensure consistent device
operation.
• Energy Storage: Energy harvested must be stored efficiently for later
use, which may require specialized components.
4. Wired Power:
- Advantages:
• Reliable and Stable: Wired power sources, such as AC or DC power
outlets, provide a stable and reliable source of energy.
• High Power Capacity: Wired connections can support high-power IoT
devices and applications.
- Disadvantages:
• Limited Mobility: Devices relying on wired power sources are
typically fixed and cannot be easily moved.
• Installation Complexity: Installing wired power connections may be
labor-intensive and costly, especially in remote or outdoor locations.
5. Hybrid Power:
- Advantages:
• Combining Sources: Hybrid power systems can combine multiple
power sources, such as batteries and solar panels, to provide
redundancy and extended operation.
• Flexibility: Hybrid systems can adapt to changing environmental
conditions and energy availability.
- Disadvantages:
• Complexity: Designing and managing hybrid power systems can be
complex and may require specialized knowledge.
Iot Platform
In the four typical layers of the IoT stack, which are things, connectivity,
core IoT features, and applications & analytics, a top-of-the-range IoT
platform should provide you with the majority of IoT functionality
needed for developing your connected devices and smart things.
Your devices connect to the platform, which sits in the cloud or in your
on-premises data center, either directly or by using an IoT gateway. A
gateway comes useful whenever your endpoints aren’t capable of direct
cloud communication or, for example, you need some computing power
on edge. You can also use an IoT gateway to convert protocols, for
example, when your endpoints are in LoRaWan network but you need
them to communicate with the cloud over MQTT.
An IoT platform itself can be decomposed into several layers. At the
bottom there is the infrastructure level, which is something that enables
the functioning of the platform. You can find here components for
container management, internal platform messaging, orchestration of IoT
solution clusters, and others.
The communication layer enables messaging for the devices; in other
words, this is where devices connect to the cloud to perform different
operations.
The following layer represents core IoT features provided by the
platform. Among the essential ones are data collection, device
management, configuration management, messaging, and OTA software
updates.
Sitting on top of core IoT features, there is another layer, which is less related
to data exchange
between devices but rather to processing of this data in the platform.
There is reporting, which allows you to generate custom reports. There is
visualization for data representation in user applications. Then, there are
a rule engine, analytics, and alerting for notifying you about any
anomalies detected in your IoT solution.
Importantly, the best IoT platforms allow you to add your own industry-
specific components and third-party applications. Without such
flexibility adapting an IoT platform for a particular business scenario
could bear significant extra cost and delay the solution delivery
indefinitely.
Advanced IoT platforms
There are some other important criteria that differentiate IoT platforms
between each other, such as scalability, customizability, ease of use,
code control, integration with 3rd party software, deployment options,
and the data security level.
Board Types
Various kinds of Arduino boards are available depending on different
microcontrollers used. However, all Arduino boards have one thing in
common: they are programed through the Arduino IDE.
The differences are based on the number of inputs and outputs (the
number of sensors, LEDs, and buttons you can use on a single
board), speed, operating voltage, form factor etc.
Some boards are designed to be embedded and have no programming
interface (hardware), which you would need to buy separately. Some can
run directly from a 3.7V battery, others need at least 5V.
Here is a list of different Arduino boards available.
Voltage Regulator
The function of the voltage regulator is to control the
voltage given to the Arduino board and stabilize the DC
voltages used by the processor and other elements.
Crystal Oscillator
The crystal oscillator helps Arduino in dealing with time
issues. How does Arduino calculate time? The answer is,
by using the crystal oscillator. The number printed on top
of the Arduino crystal is 16.000H9H. It tells us that the
frequency is 16,000,000 Hertz or 16 MHz.
Arduino Reset
You can reset your Arduino board, i.e., start your program
from the beginning. You can reset the UNO board in two
ways. First, by using the reset button (17) on the board.
Second, you can connect an external reset button to the
Arduino pin labelled RESET (5).
Analog pins
The Arduino UNO board has six analog input pins A0
through A5. These pins can read the signal from an analog
sensor like the humidity sensor or temperature sensor and
convert it into a digital value that can be read by the
microprocessor.
Main microcontroller
Each Arduino board has its own microcontroller (11). You
can assume it as the brain of your board. The main IC
(integrated circuit) on the Arduino is slightly different from
board to board. The microcontrollers are usually of the
ATMEL Company. You must know what IC your board
has before loading up a new program from the Arduino
IDE. This information is available on the top of the IC. For
more details about the IC construction and functions, you
can refer to the data sheet.
ICSP pin
Mostly, ICSP (12) is an AVR, a tiny programming header
for the Arduino consisting of MOSI, MISO, SCK, RESET,
VCC, and GND. It is often referred to as an SPI (Serial
Peripheral Interface), which could be considered as an
"expansion" of the output. Actually, you are slaving the
output device to the master of the SPI bus.
TX and RX LEDs
On your board, you will find two labels: TX (transmit) and
RX (receive). They appear in two places on the Arduino
UNO board. First, at the digital pins 0 and 1, to indicate the
pins responsible for serial communication. Second, the TX
and RX led (13). The TX led flashes with different speed
while sending the serial data. The speed of flashing depends
on the baud rate used by the board.
RX flashes during the receiving process.
Digital I/O
The Arduino UNO board has 14 digital I/O pins (15) (of
which 6 provide PWM (Pulse Width Modulation) output.
These pins can be configured to work as input digital pins
to read logic values (0 or 1) or as digital output pins to
drive different modules like LEDs, relays, etc. The pins
labeled “~” can be used to generate PWM.
AREF
AREF stands for Analog Reference. It is sometimes, used
to set an external reference voltage (between 0 and 5 Volts)
as the upper limit for the analog input pins.
After learning about the main parts of the Arduino UNO board, we are
ready to learn how to set up the Arduino IDE. Once we learn this, we
will be ready to upload our program on the Arduino board.
In this section, we will learn in easy steps, how to set up the Arduino IDE on
our computer and prepare the board to receive the program via USB cable.
Step 1 − First you must have your Arduino board (you can choose your
favorite board) and a USB cable. In case you use Arduino UNO, Arduino
Duemilanove, Nano, Arduino Mega 2560, or Diecimila, you will need a
standard USB cable (A plug to B plug), the kind you would connect to a
USB printer as shown in the following image.
In case you use Arduino Nano, you will need an A to Mini-B cable
instead as shown in the following image.
Step 2 − Download Arduino IDE Software.
You can get different versions of Arduino IDE from theDownload
pageon the Arduino Official website. You must select your software,
which is compatible with your operating system (Windows, IOS, or
Linux). After your file download is complete, unzip the file.
Let’s go through the most popular IoT platforms and see how they work
and benefit IoT software developers.
Arduino
The Arduino platform was created back in 2005 by the Arduino
company and allows for open source prototyping and flexible software
development and back-end deployment while providing significant ease
of use to developers, even those with very little experience building IoT
solutions.
Arduino is sensible to literally every environment by receiving source
data from different external sensors and is capable to interact with other
control elements over various devices, engines and drives. Arduino has a
built-in micro controller that operates on the Arduino software.
Projects based on this platform can be both standalone and collaborative,
i.e. realized with use of external tools and plugins. The integrated
development environment (IDE) is composed of the open source code
and works equally good with Мac, Linux and Windows OS. Based on a
processing programming language, the Arduino platform seems to be
created for new users and for experiments. The processing language is
dedicated to visualizing and building interactive apps using animation
and Java Virtual Machine (JVM) platform.
Let's note that this programming language was developed for the purpose
of learning basic computer programming in a visual context. It is an
absolutely free project available to every interested person. Normally, all
the apps are programmed in C/C++, and are wrapped with avr- gcc
(WinAVR in OS Windows).
Arduino offers analogue-to-digital input with a possibility of connecting
light, temperature or sound sensor modules. Such sensors as SPI or I2C
may also be used to cover up to 99% of these apps’ market.
Raspberry Pi
This block diagram describes Model B and B+; Model A, A+, and the Pi
Zero are similar, but
lack theEthernetandUSBhub components. The Ethernet adapter is
internally connected to an additional USB port. In Model A, A+, and the
Pi Zero, the USB port is connected directly to thesystem on a chip(SoC).
On the Pi 1 Model B+ and later models the USB/Ethernet chip contains a
five-port USB hub, of which four ports are available, while the Pi 1
Model B only provides two. On the Pi Zero, the USB port is also
connected directly to the SoC, but it uses amicro USB(OTG) port.
Unlike all other Pi models, the 40 pin GPIO connector is omitted on the
Pi Zero, with solderable through-holes only in the pin locations. The Pi
Zero WH remedies this.
Processor speed ranges from 700 MHz to 1.4 GHz for the Pi 3 Model B+
or 1.5 GHz for the Pi 4; on-board memory ranges from 256MiBto
1GiBrandom-access memory(RAM), with up to 8 GiB available on the
Pi 4.SecureDigital(SD) cards in MicroSDHC form factor (SDHC on
early
models) are used to store the operating system and program memory.
The boards have one to fiveUSBports. For video
output,HDMIandcomposite videoare supported, with a standard 3.5
mmtip-ring-sleevejack for audio output. Lower-level output is provided
by a number ofGPIOpins, which support common protocols likeI²C. The
B-models have an8P8CEthernetport and the Pi 3, Pi 4 and Pi Zero W
have on-boardWi-
Fi802.11nandBluetooth.
Cloud is a centralized system helping to transfer and deliver data and files to
data centers over the Internet. A variety of data and programs are easy to access
from a centralized cloud system.
The Internet of Things refers to devices connected to the Internet. In the IoT, data
is stored in real-time, as well as historical data. The IoT can analyze and instruct
devices to make effective decisions, as well as track how certain actions function.
Cloud computing encompasses the delivery of data to datacenters over the
Internet. IBM divides cloud computing into six different categories:
1. Platform as a Service (PaaS) –
The cloud contains everything you need to build and deliver cloud
applications so there is no need to maintain and buy equipment,
software, etc.
In this case, applications run in the cloud and other companies operate
devices that connect to users’ computers through a web browser.
3. Infrastructure as a Service (IaaS) –
4. Public cloud –
Companies manage spaces and provide users with quick access through the
public network.
5. Private cloud –
The same as a public cloud, but only one person has access here, which
can be an organization, an individual company, or a user.
6. Hybrid cloud –
Data processing at the network edge or edge computing is used with IoT
solutions and enables faster processing and response times. To get a better
understanding of how this works, consider a large factory with many
implemented IoT sensors. In this situation, it makes sense, before sending data to
the cloud for processing, to aggregate it close to the border to prevent cloud
overload by reducing direct connections.
Data centers with this approach make data processing much faster. Yet, an
approach that is only based on the edge will never provide a complete view of
business operations. If there is no cloud solution, then the factory only controls
each unit individually. Also, it has no way of imagining how these units work in
relation to each other. This is why only the combination of the edge and the
cloud will enable businesses to benefit from IoT developments.
The Role of Cloud Computing on the Internet of Things:
Cloud connectivity
in IoT How
communication
works
Cloud connectivity, a fundamental part of the majority of the Internet of Things
(IoT) projects, is intertwined with expertise in embedded systems and software
integration. That’s why MCU suppliers are working closely with cloud service
providers to develop integrated hardware and software solutions that enable IoT
developers to establish an edge-to-cloud connection using out-of-the-box
solutions quickly and efficiently.
These collaborations take out most of the complexities in cloud-connected IoT
deployments and thus significantly lower the barrier to entry for IoT solutions
deployment. IoT developers, for instance, can connect development boards
supplied by MCU vendors to cloud services like Google’s Cloud IoT Core and
Amazon’s AWS IoT Core with a single click.
But how does an IoT-to-cloud connection actually work? For a start, like every
communication cannel, the link between an IoT device and the cloud service is
established via wired or wireless communication networks such as Ethernet and
Wi-Fi. Next, there are two common transport- and application-layer protocols
that help facilitate communication between an IoT device and a cloud service.
Next, at the application-layer level, Hyper Text Transfer Protocol (HTTP) is the
common standard to send connection requests and return responses for TCP-
based communications. Message Queuing Telemetry Transport (MQTT) is
another application-layer protocol; it’s lightweight with a small code footprint
and is becoming popular in resource-constrained IoT devices.
It’s a two-way data communication over the Internet between a device and a
remote service. An IoT device establishes a connection with the Internet Protocol
(IP) network and is subsequently hooked to the cloud. Here, support from MCU
vendors ranges from the hardware level to the API stacks to facilitate IoT-to-
cloud development.
The APIs are well defined, and they include open-source client libraries,
example codes, and protocol stacks. Then there are third-party tools that make
these APIs easier to use and deploy. So, all developers
need to learn is how to use IoT device interfaces effectively; embedded designers
who know how to use or leverage IoT device APIs are now in high demand.
Data Analytics is the science (and art!) of applying statistical techniques to large
data sets to obtain actionable insights for making smart decisions. It is the
process to uncover hidden patterns, unknown correlations, trends and any other
useful business information.
Analysing data
Distributed analytics
Real-time analytics
Edge analytics
IoT analytics is not usually applied to raw device data. The data is pre-
processed to filter out duplicates or to re-order, aggregate or normalize the data
prior to analysis. This processing typically occurs at the point of acquisition, on
the IoT devices themselves or on gateway devices that aggregate the data, to
determine which data needs to be sent upstream.
Analytics applied at the edges of the network, as close as possible to the
devices generating the data is known as edge analytics. Linux Foundation’s Edge
X Foundry, an open source IoT edge computing framework, also supports edge
analytics.
Edge analytics is low-latency and reduces bandwidth requirements because
not as much data needs to be transmitted from the device. However, constrained
devices have limited processing capacity, so most IoT solutions use a hybrid
approach involving edge analytics and upstream analytics.
Machine learning
Data Visualization
In the context of IoT, data visualization plays a crucial role in translating the
massive amounts of data generated by IoT devices into meaningful and
actionable insights. It helps in uncovering hidden patterns,
trends, and anomalies within the data, leading to informed decision-making and
improved business outcomes.
Data visualization also offers the opportunity to explore data interactively. Users
can utilize interactive elements, such as filters, drill-downs, and zoom features, to
delve deeper into the data and uncover more detailed insights. This interactivity
enhances the user experience and allows for dynamic exploration of the data.
Data visualization in the context of IoT offers numerous benefits that help
organizations harness the power of their data. Let’s explore some of the key
advantages of using data visualization in the IoT landscape:
6. Interactive Data Exploration: Tools like Plotly, d3.js, and ggplot2 allow for
interactive data exploration and manipulation. These tools provide users with the
ability to filter, sort, and drill down into IoT data to gain deeper insights.
Interactive visualizations enhance the exploration process and support data-
driven decision-making.
7. Data Streaming Visualization: For real-time data streaming from IoT devices,
tools like Apache Kafka and Apache Flink are often used. These tools allow for
the data ingestion, processing, and visualization of high-velocity IoT data
streams. They provide real-time visualizations and analytics for streaming data,
enabling organizations to monitor and analyze IoT data as it flows.
6. Ensure Data Accuracy and Integrity: Validate the accuracy and integrity of
the IoT data before visualizing it. Check for outliers, missing data, and any data
inconsistencies that could affect the reliability and validity of the visualizations.
Incorrect or misleading visualizations can lead to poor decision-making, so
ensure the data is trustworthy.
9. Iterative Design and Testing: Take an iterative approach to design and testing
of the visualizations. Seek feedback from end users and stakeholders to fine-tune
the visualizations and ensure they effectively meet their needs. Test the
visualizations on various devices and platforms to identify and resolve any
usability or compatibility issues.
1. Smart Cities: In smart cities, IoT devices gather data on traffic patterns, air
quality, energy consumption, and more. Data visualization tools help city
officials analyze and visualize this data to make informed decisions. For
example, interactive maps can display real-time traffic congestion, enabling
officials to optimize traffic flow and reduce congestion.
6. Retail Analytics: In the retail industry, IoT devices track customer movement,
footfall, and buying behavior. Data visualizations enable retailers to understand
customer behavior, optimize store layouts, and personalize shopping experiences.
Heat maps and flow diagrams visualize foot traffic patterns, informing strategic
decisions on product placement and store design.
Many network security solutions do not have the ability to detect connected
IoT devices or show which devices are communicating on the network.
The following sections explore these and other big IoT security challenges
including:
The short development cycles and low price points of IoT devices limit the
budget for developing and testing secure firmware. Without this built-in
IoT security, IoT devices are vulnerable to the most rudimentary forms of
attack. From firmware to software and third-party apps–millions of devices
are affected by vulnerabilities in standard components.
IoT devices are often connected to the same network as other devices,
which means that an attack on one device can spread to others. Lack of
network segmentation and oversight of the ways IoT devices communicate
makes them easier to intercept. For example, not long ago the automotive
industry’s adoption of Bluetooth technology in IoT devices resulted in a
wave of data breaches that made the news. As well, protocols like HTTP
(Hypertext Transfer Protocol) and API–are all channels that IoT devices
rely on and cyber criminals exploit.
For example, in 2022, millions of Buetooth digital locks in smart cars could
be remotely unlocked by hackers exploiting a vulnerability in Bluetooth
technology. As well, protocols like HTTP (Hypertext Transfer Protocol)
and API-are channels that IoT devices rely on and cyber criminals can
exploit.
Difficulty in Patching and Updating Devices
IoT manufacturers don’t focus on building IoT security into their devices to
make hardware tamper proof and secure. Many IoT devices are not
designed to receive regular IoT security updates, which makes them
vulnerable to attacks. Without built-in IoT security it’s difficult to ensure
secure upgrades, provide firmware updates and patches, and perform
dynamic testing. Therefore, the onus is on the organization to protect its
IoT devices and network environment from cyber threats.
The IoT attack surface expands every day as more and more devices come
online–from our smartwatches and smart TVs, to our smart homes and
smart cars, to the ever-growing industry IoT. In addition to consumer
goods, IoT sensors are widely used in healthcare, manufacturing, and
supply chain operations, as well as for green agriculture, the economy, and
national defense.
Burgeoning IoT spans virtually any device or sensor that connects to the
internet-from a large container on an ocean barge to a small Tile Tracker
for your phone. To underscore, the IEEE IoT technology forecast of
connected devices is expected to increase by about 300% from 8.7 billion
devices in 2020 to more than 25 billion IoT devices in 2030.
Given the expanded attack surface for security risks to availability, integrity
and confidentiality, IoT security is critical for organizations to protect their
network environments from IoT device-borne threats.
As the IoT and the cloud converge, consider securing the technologies with
another layer of cloud- based security solutions that also add processing
capabilities to devices at the edge.
There are many different protocols used by IoT devices from internet
protocols and network protocols to Bluetooth and other communications
protocols. Understanding the protocols your devices use can help reduce
security risks.
Industries that rely on GPS for critical operations should monitor their GPS
connected devices for potential security issues such as fake or jammed GPS
signals.
As mentioned above (e.g., default passwords), most IoT devices come with
poor authentication. When deploying IoT devices, similar to websites and
web apps, one of the best methods for IT
admins to secure IoT devices is to use digital certificates. IoT device
certificates are integral to an IoT security strategy.
Like other digital devices, IoT devices must be patched and updated to
prevent threats from taking advantage of vulnerabilities in software and
firmware. Installing updates and patching vulnerabilities is essential to IoT
security as well as operational technology (OT). When devices cannot be
patched or taken offline to prevent exploitation, administrators can
deploy intrusion prevention systems (IPS).
Cyber attacks are used to exploit unprotected IoT devices with tactics such
as network scanning, remote code execution, and command injection. The
healthcare industry has the highest share of IoT security issues from
internet connected devices used for medical imaging systems, patient
monitoring systems, and medical device gateways. Another high-risk sector
includes commonly used IoT devices such as security cameras and printers.
Consumer electronics, IP phones, and energy management devices are also
at higher risk.
Many industries have adopted IoT at the risk of higher exposure to cyber
threats from vulnerabilities in IoT devices. Some industries are more
vulnerable than others due to the sensitive nature of their data (e.g., medical
records, autonomous vehicles, or intellectual property).
IoT devices are not built to meet the business and regulatory requirements
of critical industries. If developers integrated security into IoT devices and
software, it would go a long way to help protect sensitive data and prevent
exploitation when those devices go online.
IoT Applications:
IoT applications promise to bring immense value into our lives. With
newer wireless networks, superior sensors and revolutionary computing
capabilities, the Internet of Things could be the next frontier in the race
for its share of the wallet. IoT applications are expected to equip billions
of everyday objects with connectivity and intelligence. It is already being
deployed extensively, few applications of IoT:
• Wearables
• Smart Home Applications
• Smart Buildings
• Smart Infrastructure
• Securities
• Health Care
• Smart Cities
• Agriculture
• Industrial Automation
Smart Cities:
Connected City
• Smart parking
An IoT solution will permit monitoring the availability of parking spots in the
city. With the GPS data from drivers’ smartphones (or road-surface sensors in
the ground), smart parking solutions let the user know when the closest parking
spot becomes free to find a parking spot faster and easier instead of blindly
driving around.
Smart Home:
, Z-Wave, or Bluetooth for example, and many Wi-Fi routers can only
allow up to thirty devices connected at once. As compared to Ethernet, Wi-Fi
brings several advantages, including the easy connection and access of multiple
devices, the expandability (adding new devices without the hassle of additional
wiring), lower cost, or single access point requirement.
The basic architecture enables measuring home conditions, process
instrumented data, utilizing microcontroller-enabled sensors for measuring home
conditions and actuators for monitoring home embedded devices.The popularity
and penetration of the smart home concept is growing in a good pace, as it
became part of the modernization and reduction of cost trends. This is achieved
by embedding the capability to maintain a centralized event log, execute machine
learning processes to provide main cost elements, saving recommendations and
other useful reports.
Smart home services
• Measuring home conditions
A typical smart home is equipped with a set of sensors for measuring home
conditions, such as: temperature, humidity, light and proximity. Each sensor is
dedicated to capture one or more measurement. Temperature and humidity may
be measured by one sensor, other sensors calculate the light ratio for a given area
and the distance from it to each object exposed to it. All sensors allow storing the
data and visualizing it so that the user can view it anywhere and anytime. To do
so, it includes a signal processer, a communication interface and a host on a cloud
infrastructure.
• Infrastructure
Smart Cities utilize sensor technology to gather and analyze information in an
effort to improve the quality of life for residents. Sensors collect data on
everything from rush hour stats to crime rates to overall air quality. Complicated
and costly infrastructure is involved in installing and maintaining these sensors.
How will they be powered? Will it involve hard-wiring, solar energy, or battery
operation? Or, in case of power failure, perhaps a combination of all three?
Funding for new infrastructure projects is limited and approval processes can
take years. Installing new sensors and other improvements cause temporary –
though still frustrating – problems for people living in these cities.
• Security and Hackers
As IoT and sensor technology use expands, so does the threat level to security.
This begs the question…is technology really considered “smart” if hackers can
break into it and shut down an entire city? Recent discussion involving cyber-
terror threats to vulnerable and outdated power grids has everyone a bit more
concerned and skeptical about technology and security. Smart Cities are investing
more money and resources into security, while tech companies are creating
solutions with new built-in mechanisms to protect against hacking and cyber-
crimes.
• Privacy Concerns
In any major city, there’s a balance between quality of life and invasion of
privacy. While everyone wants to enjoy a more convenient, peaceful, and healthy
environment, nobody wants to feel like they are constantly being monitored by
“Big Brother.”
Cameras installed on every street corner may help deter crime, but they can
also install fear and paranoia in law-abiding citizens. Another valid concern is the
amount of data being collected from all the smart sensors residents come into
contact with each day.
• Educating & Engaging the Community
For a Smart City to truly exist and thrive, it needs “smart” citizens who are
engaged and actively taking advantage of new technologies. With any new city-
wide tech project, part of the implementation process must involve educating the
community on its benefits. This can be done through a series of in-person town
hall-style meetings and email campaigns with voter registration, as well as an
online education platform that keeps citizens engaged and up-to-date. When a
community feels like it’s playing a part in the overall decisions that affect daily
life, and is being communicated to in a clear and thoughtful manner, it’s more apt
to use the technology and encourage others to use it as well. This is key to a
Smart City’s success.
Connected vehicles:
Challenges:
• Security
• Privacy
• Scalability
• Reliability
• Quality of service
• Lack of Global Standards
Smart Grid:
The “grid” is the electrical network serving every resident, business and
infrastructure service in a city. The “smart grid” is the next generation of those
energy systems, which have been updated with communications technology and
connectivity to drive smarter resource use.
The technologies that make today’s IoT-enabled energy grid “smart” include
wireless devices such as sensors, radio modules, gateways and routers. These
devices provide the sophisticated connectivity and communications that empower
consumers to make better energy usage decisions, allow cities to save electricity
and expense, and enables power authorities to more quickly restore power after a
blackout.
The Smart Grid is critical to building a secure, clean, and more efficient future,
according to the International Energy Agency (IEA). The Smart Grid is part of
an IoT framework, which can be used to remotely monitor and manage
everything from lighting, traffic signs, traffic congestion, parking spaces, road
warnings, and early detection of things like power influxes as the result of
earthquakes and extreme weather. The Smart Grid does this through a network of
transmission lines, smart meters, distribution automation, substations,
transformers, sensors, software and more that are distributed to businesses and
homes across the city.
Smart Grid technologies all contribute to efficient IoT energy management
solutions that are currently lacking in the existing framework. What makes the
IoT Smart Grid better is two-way communication between connected devices and
hardware that can sense and respond to user demands. These technologies mean
that a Smart Grid is more resilient and less costly than the current power
infrastructure.
Another key advantage offered by tele-management systems is that bills are more
accurate. They always reflect the real consumption of each month instead of
estimates, reducing the cost of the old system of manual energy meter readings.
In addition to being able to access information about the installation remotely,
problems become easier to diagnose and solutions can therefore be implemented
faster, improving customer service. Now a days customers have to notify
companies for them to take action. But with remote management the system itself
automatically reports all incidents to the electric company so it can respond faster
to users.
Smart Grids can collect much more data than the manual energy meter reading
system. This permits the use of data analysis techniques and the preparation of
highly realistic consumption forecasts as many more variables are taken into
account. Utilities can then better tailor their production to consumption
(balances) and reduce energy surpluses.
Smart grid technology can be expressed in a single sentence: a new electric grid
with two-way communication. For the first time, businesses and consumers can
get real time billing information while utility companies can better meet the
needs of their customers as they react to demand spikes and fix or manage
blackouts and other challenges. Smart grid is resilient, efficient and green which
is good for the consumer, the utility company and the environment. Wireless
technology will replace thousands of miles of cable that would have been needed
to advance the smart grid to where it is today.
Challenges:
• High Investment
• Cyber attacks
Industrial IoT:
The Industrial Internet of Things (IIoT), which is considered as the main
future IoT-application area, is defined by the Industrial Internet Consortium as
machines, computers and people enabling intelligent industrial operations using
advanced data analytics for transformational business outcomes” (“Industrial
Internet Consortium,” 2017). Generally, IioT is one basis of Industry 4.0 and the
digital transformation. The IioT is the connection between IT (information
technology) and OT (operational technology). IioT is the most important segment
in IoT, much more than consumer applications. The Industrial Internet of Things
is related to the Industry 4.0: all IoT applications in Industry 4.0 are forms of IioT
but not all IioT use cases are about the industries which are categorized as
Industry 4.0. Typical use cases of the Industrial Internet of Things include
intelligent machine applications, industrial control applications, factory floor use
cases, condition monitoring, use cases in agriculture or smart grid applications. It
is important to know that the IioT is not just about saving costs and optimizing
efficiency though. Companies also have the possibility to realize important
transformations and can find new opportunities, e.g., entirely new business
models in Industry 4.0.
Benefits of IioT
These are 5 of the biggest benefits of adopting a fully connected IIoT manufacturing
operation.
Increase efficiency
The biggest benefit of IIoT is that it gives manufacturers the ability to automate,
and therefore optimize their operating efficiency. Robotics and automated
machinery can work more efficiently and accurately, boosting productivity and
helping manufacturers streamline their functions.
Additionally, physical machinery can be connected to software via sensors that
monitor performance on a constant basis. This enables manufacturers to have
better insights into the operational performance of individual pieces of equipment
as well as entire fleets.
IIoT-enabled data systems empower manufacturers to improve operating efficiencies
by:
• Bypassing manual tasks and functions and implementing automated, digital
ones
• Making data-driven decisions regarding all manufacturing functions
• Monitoring performance from anywhere – on the manufacturing floor or
from thousands of miles away
Reduce Errors
Predictive Maintenance
All of the data and sensors required of a fully functioning IIoT manufacturing
operation are also helping to bolster workplace safety. “Smart manufacturing” is
turning into “smart security” when all of the IIoT sensors work together to
monitor workplace and employee safety.
Integrated safety systems are protecting workers on the floor, on the line, and in
distribution. If an accident occurs, everyone in the facility can be alerted,
operations can cease, and company leadership can intervene and make sure the
accident and incident is resolved. This incident can also generate valuable data
that can help prevent a repeat occurrence in the future.
A newer option some manufacturers are utilizing is the use of wearable
technology among their employees. Wearables have been part of IoT since its
infancy, and it are just now being utilized in industrial IoT operations.
Wearables help leadership keep tabs on things like employee posture and the
surrounding noise levels, and they can then improve work conditions and
potentially improve performance. They can also alert employees when they aren’t
following proper workplace safety procedures, so they can correct their actions
and stay safe on the job.
Reduce Costs
Knowledge is power, and the knowledge provided to manufacturers via IIoT
solutions is giving them the tools they need to reduce costs and generate more
revenue. Data-driven insights into operations, production, marketing, sales, and
more can steer businesses in a profitable direction.
All of the aforementioned benefits of IIoT – predictive maintenance, fewer
errors, improved quality control, and maximized efficiencies – will all boost
profits for a manufacturer. Industrial IoT also offers arguably the most valuable
tool for leaders of a manufacturing company – insights from anywhere, anytime.
Remote monitoring of manufacturing operations is now possible 365 days a year,
24/7, from anywhere in the world. This 360-degree view into the entire
manufacturing process, and the follow-up service provided to customers in their
buying journey, is an invaluable asset.