0% found this document useful (0 votes)
125 views109 pages

of Chapter 5

1. The document discusses the course outcomes and topics related to issues in Internet of Things (IoT) standards, including technical, syntactic, and semantic interoperability needs. 2. Key challenges in IoT interoperability/standards are discussed, including security, analytics, device management, networks, processors, operating systems, and platforms. 3. Regulatory issues involving cross-border data flows are examined, along with data protection challenges and differing country approaches.

Uploaded by

Fallen Angel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
125 views109 pages

of Chapter 5

1. The document discusses the course outcomes and topics related to issues in Internet of Things (IoT) standards, including technical, syntactic, and semantic interoperability needs. 2. Key challenges in IoT interoperability/standards are discussed, including security, analytics, device management, networks, processors, operating systems, and platforms. 3. Regulatory issues involving cross-border data flows are examined, along with data protection challenges and differing country approaches.

Uploaded by

Fallen Angel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 109

UNIVERSITY INSTITUTE OF

ENGINEERING
COMPUTER SCIENCE ENGINEERING
Bachelor of Engineering (Computer Science & Engineering)
Subject Name: Internet of Things
Subject Code: 20CST-357

IoT Standard Issues DISCOVER . LEARN . EMPOWER


1
Internet of Things
Course Outcomes:

1. Analyze the basic terminologies associated with IoT and


use it.

2. Justify the applications of internet of things and correlate


them.

3. Compare different objects and communication strategies


and also able to see the issues raised by communication
strategies in IoT.

4. Examine the protocols required for communication and


packet size required for each application.

5. Illustrate security issues with IoT like security, privacy,


communication standard and some other legal issues. 2
UNIT 3

CHAPTER 5

IoT Standard Issues

3
Internet of
Things
IoT Interoperability / Standards Background

Key Considerations and Challenges in IoT


Interoperability / Standards

Regulatory, Legal, and Rights Issues: Data


Protection and Cross border Data Flows

IoT Data Discrimination

IoT Devices as Aids to Law Enforcement and


Public Safety

IoT Device Liability

4
IoT Interoperability and Standards Background (CO-5)

IoT interoperability is the capacity for multiple components within an IoT deployment to
effectively communicate, share data and perform together to achieve a shared outcome.
Organizations must be able to transmit and understand data throughout all the connections
from devices to the cloud.

"Interoperability in an IoT context refers to the ability to transport meaningful, actionable


information between systems. Information can refer to many things, so it's important to
understand that IoT is a vast system of systems, where connections and data exchange can
occur between literally billions of devices and systems," said Shawn Chandler, CTO at GridCure
and a senior member of the professional association IEEE.
6
IoT deployments have three interoperability needs:

1. Technical interoperability. The deployment has the ability to


use a physical communications infrastructure to transport bits
of data.

2. Syntactic interoperability. A shared syntax or common


information model structures the data and establishes a protocol
to share the information as specific typed data.

3. Semantic IoT deployments require the ability to establish


the meaning of the data.
7
Interoperability Framework

8
Interoperability standards bridge IoT device communication

Many within the IoT community, including manufacturers and


engineers who design connected ecosystems for use, work together to
develop standards that address interoperability challenges. Multiple
standards organizations have rallied around the cause, but there's no
dominant common standard that's applicable in every IoT use case.

9
10
11
12
Key Considerations and Challenges in IoT Interoperability/Standards (CO-5)

The 10 most important considerations for IoT solutions:

1. IoT Security
2. IoT Analytics
3. IoT Device (Thing) Management
4. Low-Power, Short-Range IoT Networks
5. Low-Power, Wide-Area Networks
6. IoT Processors
7. IoT Operating Systems
8. Event Stream Processing
9. IoT Platforms
10. IoT Standards and Ecosystems

13
IoT Protocol Standardization Efforts

14
15
The hurdles facing IoT standardization can be divided into four categories; Platform,
Connectivity, Business Model and Killer Applications:

1. Platform

2. Connectivity

3. Business Model

4. Killer Applications: In this category there are three functions needed to have killer
applications: control "things", collect "data", and analyze "data". IoT needs killer applications
to drive the business model using a unified platform.

16
17
Issues with IoT Standardization

• Standardization is like a double-edged sword: critical to market development, but it


may threaten innovation and inhibit change when standards are accepted by the
market.

• The following two issues for the IoT standardization in particular and the ICT
standardization in general may never have answers

• ICT standardization is a highly decentralized activity. How can the individual activities
of the network of extremely heterogeneous standards-setting bodies be coordinated?

• It will become essential to allow all interested shake-holders to participate in the


standardization process toward the IoT and to voice their respective requirements and
concerns.
18
19
Regulatory, Legal and Right Issues: Data Protection and Cross Border Data Flows (CO-5)

20
Cross Border Data Flows
As the world moves online, facilitating cross-border data flows is essential. It has not only
served as the foundation for modern economy but also continued to unlock innovative and
promising societal benefits. Yet, over the past few years, regulatory friction around cross-
border data flows has only deepened and governments around the world are grappling with
competing policy priorities to protect data privacy, security, intellectual property and law
enforcement access.

Recognizing the opportunities and challenges associated with cross-border data flows, the
Digital Trade team engages the foremost political, business, cultural and other leaders of
society to explore the ever changing impacts of data transfer mechanisms and shape
domestic, regional and global arrangements on this novel governance issue.

21
22
23
24
25
1. Cross-border data flows were first deliberated at international fora, before
trickling down into domestic policy.
2. Countries’ conflicting value systems inhibit the development of a global treaty
on data or Internet governance.
3. India consistently looks to preserve domestic policy space as it negotiates
internationally on technology policy.
4. Market imperatives can help build global consensus between countries on
cross-border data flows.
5. India’s upcoming G20 Presidency can bring differing points of view together and
shape the future of digital governance.

26
Challenges in Cross Boarder Knowledge Flows

27
28
China`s Model for Cross Boarder Data Flows

29
IoT Data Discrimination (CO-5)

Data discrimination is a comparison of the general features of the target class data objects
against the general features of objects from one or multiple contrasting classes. The target and
contrasting classes can be specified by a user, and the corresponding data objects can be
retrieved through database queries.

30
31
32
33
IoT Devices as Aids to Law Enforcement and Public Safety (CO-5)

Key areas where IoT is beginning to make a difference in law


enforcement:

1. Crime detection

2. Evidence gathering

3. Wearable for law enforcement

4. IoT-enabled firearms

34
IoT and Law Enforcement
The contribution of the Internet of Things (IoT) is undoubtedly strong and uncountable in
human lives. Be it pharmaceutical management or cybercrime. IoT is controlling each sphere of
life. Law enforcement is also a working field of IoT. Regulation of law and enforcement of legal
rights and laws is essential to improve human existence.

Laws not only secure the life of humans, but also protect the vulnerable from risks and
damages. Laws play a critical role in ensuring the safety and security of a tribe and an area.
Increasing criminal cases can be governed only by enforcing the right laws and policies.

35
36
IoT Device Liability (CO-5)

The liabilities of IoT devices, software, or hardware affect the shareholders of the
company, the developers, the distributors, and even the users. There is no doubt
that the IoT technology is different from the rest of the technologies and hence
identifying a breach becomes more difficult. When there is communication
between devices via a network, the system is prone to DSoS attacks which are
harder to track with IoT devices.

37
38
39
40
Major IoT liabilities :
1. Device Malfunction

2. Data theft

3. Cyber attacks

Given below are a few of the most effective methods to prevent cyber attacks:

a. Built-in security: Devices with inbuilt features for security are at lesser exposure to cyber attacks than those with
less secure systems.

b. Encryption– manufacturers must ensure end-to-end encryption to allow safe communication between devices.

c. Risk analysis: There must be a proper system to calculate the risks of involving any functionality in iot devices and
hardware.

d. Authorization: Hard to decode passwords prevent illegal access or login to private devices such as smart cars or
smart homes.
41
42
Impact of IoT liability
Any defective product impacts a chain of customers and organizations:

1. Product manufacturers
2. Producer of component parts
3. Product assembling party
4. Product installer
5. Wholesalers and vendors selling the product

43
IoT Product Liability Could Create Challenges for End-Users and Developers
As the market for internet of things devices grows, IoT liability is likely to become a critical issue
for both end-users and developers. This could be especially true for end-users of industrial IoT
products, who may face the potential for significant damages if an IoT device is compromised
by hackers.

Experts expect significant uncertainty in the near future. Courts and lawmakers may adopt a
range of positions on IoT liability. Developers could be held liable for damages often, or only in
cases where end-users can prove that actions on the developer’s part led to the damages.

44
45
Summary

Regulatory standards for data markets are missing especially for data brokers;
they are companies that sell data collected from various sources. Even though
data appear to be the currency of the IoT, there is a lack of transparency about;
who gets access to data and how those data are used to develop products or
services and sold to advertisers and third parties. There is a need for clear
guidelines on the retention, use, and security of the data including metadata (the
data that describe other data).

46
Quiz
1. Interoperability is best defined as:
a. The exchange of the latest news information.
b. The ability of systems to work together in order to communicate and exchange information when necessary.
c. The development of the latest weather story.
d. All of the responses are correct.
2. Which Internet of Things (IoT) challenge involves the difficulty of developing and implementing protocols that allow devices
to communicate in a standard fashion?
a. Security b. Privacy
c. Interoperability d. Compliance
3. Which one of the following is NOT an example of store-and-forward messaging?
a. Voicemailb. Unified messaging
c. Telephone call d .Email

4. Which action is the best step to protect Internet of Things (IoT) devices from becoming the entry point for security
vulnerabilities into a network while still meeting business requirements?
a. Turning IoT devices off when not in use b.Removing IoT devices from the network
c. Using encryption for communications d.Applying security updates promptly.
47
5. What do organizations need to expect as they get more dependent upon the Internet of Things (IoT)?
a. Security risks will increase. b. Security risks will go down.
c. Security risks will stay the same. d. Security risks will be eliminated.
6. How many numbers of the element in the open IoT architecture?
a. Four elements b. Five elements
c. Six elements d. Seven elements

7. Which of the following is the way in which an IoT device is associated with data?
a. Internet b. Cloud
c. Automata d. Network

8. Which of the following IoT networks has a very short range?


a. Short Network b. LPWAN
c. SigFox d. Short range wireless network

9. An IoT network is a collection of ______ devices.


a. Signal b. Machine to Machine
c. Interconnected d. Network to Network

10. Which one of the following is not an IoT device?


a. Amazon echo voice controller b. Google Home
c. Nest Smoke Alarm d. None of these
48
REFERENCES
TEXT BOOKS

1. Ovidiu Vermesan, Peter Friess, “Internet of Things-Converging Technologies for Smart Environments & integrated Ecosystem”, River Publications Netherlands.
2. Internet Society, “An overview of Internet of Things”.
3. IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things by David Hanes, Gonzalo Salgueiro, Patrick Grossetete, CISO Press.

REFERENCE BOOKS

1. Pfister, Cuno, “Getting started with the Internet of Things: connecting sensors and microcontrollers to the cloud", O'Reilly Media, Inc.”, 2011.
2. Greenfield, Adam,” Everyware: The dawning age of ubiquitous computing”, New Riders, 2010.
3. The Internet of Things, revised and updated edition (The MIT Press Essential Knowledge series) by Samuel Greengard, MIT Press.

VIDEO LINKS

1. https://www.youtube.com/watch?v=vgoX_m6Mkko
2. https://www.youtube.com/watch?v=ipdTLJcIkWI
3. https://www.youtube.com/watch?v=GIERiTd8e6k

WEB LINKS

1. https://www.iso.org/standard/71885.html
2. https://iot.ieee.org/newsletter/july-2016/iot-standardization-and-implementation-challenges.html
3. https://www.bbvaopenmind.com/en/technology/digital-world/iot-standardization-and-implementation-challenges/

49
THANK YOU

50
UNIVERSITY INSTITUTE OF
ENGINEERING
COMPUTER SCIENCE ENGINEERING
Bachelor of Engineering (Computer Science & Engineering)
Subject Name: Internet of Things
Subject Code: 20CST-357

Smart Homes & Beyond Syllabus DISCOVER . LEARN . EMPOWER


51
Internet of Things
Course Outcomes:

1. Analyze the basic terminologies associated with IoT and


use it.

2. Justify the applications of internet of things and correlate


them.

3. Compare different objects and communication strategies


and also able to see the issues raised by communication
strategies in IoT.

4. Examine the protocols required for communication and


packet size required for each application.

5. Illustrate security issues with IoT like security, privacy,


communication standard and some other legal issues. 52
UNIT 3

CHAPTER 7

Smart Homes
&
Advanced Topics
53
Internet of
Things

Chapter-7 (Case Study)


Case study on smart homes using
Internet of Things.
 
ADVANCED TOPICS (BEYOND
SYLLABUS)
Mobile Cloud Services
IoT and Cloud Security
Smart Cloud and IOT

54
Smart Homes using IoT (CO-2)

The home can be called smart when it has a range of smart devices that you can control
remotely by setting them the way you like to automatize house maintenance. They can also be
united into one network. For example, the lights can turn on at the moment you enter the
home (lamps will know it from the sensors) or your vacuum cleaner can start cleaning every day
at 11 AM.
But the true magic starts when IoT (Internet of Things) joins this team. It provides all the
devices with internet access which broadens the possibilities of such a home network. For
instance, now you can see what happens in your house watching security cameras through your
smartphone or computer. IoT applications allow you connecting devices to each other and
letting them communicate without your participation. Imagine this: the moment your car
leaves the parking near the office, the conditioner starts cooling your house so that after a hot
day you could enter a pleasantly cool home.
56
57
Benefits of IoT Smart Home Technologies

The cool house on a hot day far not the only profit you get. Let’s now see the most significant benefits of the IoT
smart home applications.

1. Control and Monitoring

2. Cost and Energy Savings

3. Environment Impact

4. Better Security

5. Comfort

58
59
61
Advanced Topics Beyond Syllabus

62
Mobile Cloud Services (CO-3)

Mobile cloud services mean when a mobile phone interacts with the cloud.
Mobile cloud services enable a user for an amazing experience on mobile phones
which consists of the best components. The main components are cloud
technology, mobile computing, and wireless network. This also enables a mobile
user and other network operators a great opportunity to explore. Internet of
Things has become a major component for controlling devices using data in the
cloud. The users always tend to find services that are easy to access and therefore
mobile cloud services have become very famous. Data of several sensors or other
components can easily be tracked using a mobile phone just like how it’s done on
desktop or other devices.

63
64
Advantages of Mobile Cloud Services:

1. Several features are present on mobile phones which is a great factor for
developers and mobile phone users.
2. Many new developers can easily start making projects using mobile cloud
services for the Internet of Things.
3. These mobile services help developers reach greater markets and give a lot of
profit to several companies.
4. Therefore, Due to its portability, it is very user friendly and it proves itself to
be efficient.
5. Several companies save a lot of money as they are not forced to pay a huge
amount for these services.
66
67
69
IoT and Cloud Security (CO-5)

70
FIVE BEST PRACTICES TO ENSURE IOT AND CLOUD SECURITY
A. Encrypt your data
1. Azure Security Center by Microsoft
2. AWS Security Hub by Amazon
3. Cloud Security Command Center by Google

B. Leave sensitive data on-premises

C. Use DevSecOps approach

D. Choose an IoT development partner with an established security policy

71
5 Ways to Secure IoT in any Enterprise:
1.Employ device discovery for visibility across the board
2.Actively Monitor IoT Devices
3. Carefully configure your router
4. Adopt Secure Password Practices
5. Keep an eye on vendor & supplier IoT practices
74
Smart Cloud and IoT (CO-3)

75
Cloud Computing can be defined as the practice of using a network of
remote servers hosted on the Internet to store, manage, and process
data, rather than a local server or a personal computer. Companies
offering such kinds of cloud computing services are called cloud
providers and typically charge for cloud computing services based on
usage. Grids and clusters are the foundations for cloud computing.

76
77
Types of Cloud Computing:

Most cloud computing services fall into five broad categories:

1. Software as a service (SaaS)


2. Platform as a service (PaaS)
3. Infrastructure as a service (IaaS)
4. Anything/Everything as a service (XaaS)
5. Function as a Service (FaaS)

78
79
80
81
Summary
Smart homes can feature either wireless or hardwired systems—or both. Wireless systems are easier to install. Putting in a
wireless home automation system with features such as smart lighting, climate control, and security can cost several thousand
dollars, making it very cost-friendly.

The downside to wireless systems is you likely need strong Wi-Fi coverage and broadband service throughout your entire
house. This may require you to invest in range extenders or hardwired wireless access points. Wireless smart home systems are
generally more appropriate for smaller existing homes or rental properties due to their smaller size.

Hardwired systems, on the other hand, are considered more reliable and are typically more difficult to hack. A hardwired
system can increase the resale value of a home. In addition, hardwired smart home systems can easily be scaled; therefore, it is
often the default method when designing a new build or performing a major renovation.

There is a drawback—it's fairly expensive. Installing a luxury and hardwired smart system can cost homeowners tens of
thousands of dollars. In addition, you must have space for network hardware equipment including Ethernet cables.

82
Quiz
1. Interoperability is best defined as:
a. The exchange of the latest news information.
b. The ability of systems to work together in order to communicate and exchange information when necessary.
c. The development of the latest weather story.
d. All of the responses are correct.
2. Which Internet of Things (IoT) challenge involves the difficulty of developing and implementing protocols that allow devices
to communicate in a standard fashion?
a. Security b. Privacy
c. Interoperability d. Compliance
3. Which one of the following is NOT an example of store-and-forward messaging?
a. Voicemailb. Unified messaging
c. Telephone call d .Email

4. Which action is the best step to protect Internet of Things (IoT) devices from becoming the entry point for security
vulnerabilities into a network while still meeting business requirements?
a. Turning IoT devices off when not in use b.Removing IoT devices from the network
c. Using encryption for communications d.Applying security updates promptly.
83
5. What do organizations need to expect as they get more dependent upon the Internet of Things (IoT)?
a. Security risks will increase. b. Security risks will go down.
c. Security risks will stay the same. d. Security risks will be eliminated.
6. How many numbers of the element in the open IoT architecture?
a. Four elements b. Five elements
c. Six elements d. Seven elements

7. Which of the following is the way in which an IoT device is associated with data?
a. Internet b. Cloud
c. Automata d. Network

8. Which of the following IoT networks has a very short range?


a. Short Network b. LPWAN
c. SigFox d. Short range wireless network

9. An IoT network is a collection of ______ devices.


a. Signal b. Machine to Machine
c. Interconnected d. Network to Network

10. Which one of the following is not an IoT device?


a. Amazon echo voice controller b. Google Home
c. Nest Smoke Alarm d. None of these
84
REFERENCES
Text Books:

1. Ovidiu Vermesan, Peter Friess, “Internet of Things-Converging Technologies for Smart Environments & integrated Ecosystem”, River Publications Netherlands.
2. Internet Society, “An overview of Internet of Things”.
3. IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things by David Hanes, Gonzalo Salgueiro, Patrick Grossetete, CISO Press.

Reference Books:

3. Pfister, Cuno, “Getting started with the Internet of Things: connecting sensors and microcontrollers to the cloud", O'Reilly Media, Inc.”, 2011.
4. Greenfield, Adam,” Everyware: The dawning age of ubiquitous computing”, New Riders, 2010.
3. The Internet of Things, revised and updated edition (The MIT Press Essential Knowledge series) by Samuel Greengard, MIT Press.

VIDEO LINKS

1. https://www.youtube.com/watch?v=gpB4600keWA
2. https://www.youtube.com/watch?v=NjYTzvAVozo
3. https://www.youtube.com/watch?v=sYqjs8TKkOE

WEB LINKS

1. https://www.intel.com/content/www/us/en/internet-of-things/smart-home.html
2. https://www.brsoftech.com/blog/iot-smart-home-devices/
3. https://www.digiteum.com/iot-smart-home-automation/

85
THANK YOU

86
UNIVERSITY INSTITUTE OF
ENGINEERING
COMPUTER SCIENCE ENGINEERING
Bachelor of Engineering (Computer Science & Engineering)
Subject Name: Internet of Things
Subject Code: 20CST-357

Proliferation and IoT Devices DISCOVER . LEARN . EMPOWER


87
Internet of Things
Course Outcomes:

1. Analyze the basic terminologies associated with IoT and


use it.

2. Justify the applications of internet of things and correlate


them.

3. Compare different objects and communication strategies


and also able to see the issues raised by communication
strategies in IoT.

4. Examine the protocols required for communication and


packet size required for each application.

5. Illustrate security issues with IoT like security, privacy,


communication standard and some other legal issues. 88
UNIT 3

CHAPTER 6

Proliferation and IoT Devices

89
Internet of
Things

IoT used in Legal Actions, Regulatory,


Legal, and Rights Issues Summary

Emerging Economy and Development


Issues: Ensuring IoT Opportunities
are Global

Economic and Development


Opportunities.

90
IoT used in Legal Actions, Regulatory, Legal, and Rights Issues Summary (CO-5)

Legal Issues

After having defined the challenges and ethical issues, a new legal question about the ability of the existence of
laws ready to protect users in such an environment arises.. This is a major concern because the border between
physical and virtual is almost transparent in IoT.

The following questions are examples for issues needed to be discussed.

1-What will happen when internet goes down in medical applications, who is responsible, who will be
sanctioned? Is it the medical service provider or the local or global internet service provider?
2-Who is responsible for patching new IoT devices to be sure its fully secured?
3-Are the standards and laws ready to deal with these situations?
4-What happens if a medical service provider is out of business? What is the fate of the patients, how the data
will be used?
5-When these devices should take a break from collecting data?
92
93
Legal and regulatory aspects in the Industrial IoT

1. Fair access to connectivity bandwidth

2. Responsibility, Accountability and Liability Issues

3. IoT Law about Data Handling

4. Unlawful profiling

5. Privacy and Security

6. Ownership of data

7. Automated contracts

94
Emerging Economy and Development Issues: Ensuring IoT Opportunities are Global (CO-2)

The Internet of Things holds significant promise for delivering social and economic
benefits to emerging and developing economies. This includes areas such as sustainable
agriculture, water quality and use, healthcare, industrialization, and environmental
management, among others. As such, IoT holds promise as a tool in achieving the
United Nations Sustainable Development Goals. The broad scope of IoT challenges will
not be unique to industrialized countries. Developing regions also will need to respond
to realize the potential benefits of IoT.

95
96
98
Economic and Development Opportunities (CO-2)

99
100
101
102
103
104
Summary
The majority of the device-enablement value pool is based in the Americas, where it was worth
€5.5 billion in 2018. Device enablement’s importance to the IoT and its global revenue growth
also means that both technological and business opportunities will be almost geography-
agnostic and grow at similar rates. And although enterprise customers will remain the largest
customer segment, device-enablement platforms will see fast uptake among small and mid-
sized customers.
The growing market for IoT technology reflects some of the ways in which maturing
technologies have begun to fulfill the promises of the IoT. PE funds should evaluate
opportunities to leverage IoT in their portfolio companies and look for emerging investment
opportunities in both the IoT market and in sectors that can reap outsized benefits from these
technologies.

105
Quiz
1. Interoperability is best defined as:
a. The exchange of the latest news information.
b. The ability of systems to work together in order to communicate and exchange information when necessary.
c. The development of the latest weather story.
d. All of the responses are correct.
2. Which Internet of Things (IoT) challenge involves the difficulty of developing and implementing protocols that allow devices
to communicate in a standard fashion?
a. Security b. Privacy
c. Interoperability d. Compliance
3. Which one of the following is NOT an example of store-and-forward messaging?
a. Voicemailb. Unified messaging
c. Telephone call d .Email

4. Which action is the best step to protect Internet of Things (IoT) devices from becoming the entry point for security
vulnerabilities into a network while still meeting business requirements?
a. Turning IoT devices off when not in use b.Removing IoT devices from the network
c. Using encryption for communications d.Applying security updates promptly.
106
5. What do organizations need to expect as they get more dependent upon the Internet of Things (IoT)?
a. Security risks will increase. b. Security risks will go down.
c. Security risks will stay the same. d. Security risks will be eliminated.
6. How many numbers of the element in the open IoT architecture?
a. Four elements b. Five elements
c. Six elements d. Seven elements

7. Which of the following is the way in which an IoT device is associated with data?
a. Internet b. Cloud
c. Automata d. Network

8. Which of the following IoT networks has a very short range?


a. Short Network b. LPWAN
c. SigFox d. Short range wireless network

9. An IoT network is a collection of ______ devices.


a. Signal b. Machine to Machine
c. Interconnected d. Network to Network

10. Which one of the following is not an IoT device?


a. Amazon echo voice controller b. Google Home
c. Nest Smoke Alarm d. None of these
107
REFERENCES
TEXT BOOKS

1. Ovidiu Vermesan, Peter Friess, “Internet of Things-Converging Technologies for Smart Environments & integrated Ecosystem”, River Publications Netherlands.
2. Internet Society, “An overview of Internet of Things”.
3. IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things by David Hanes, Gonzalo Salgueiro, Patrick Grossetete, CISO Press.

REFERENCE BOOKS

1. Pfister, Cuno, “Getting started with the Internet of Things: connecting sensors and microcontrollers to the cloud", O'Reilly Media, Inc.”, 2011.
2. Greenfield, Adam,” Everyware: The dawning age of ubiquitous computing”, New Riders, 2010.
3. The Internet of Things, revised and updated edition (The MIT Press Essential Knowledge series) by Samuel Greengard, MIT Press.

Web Links

1. https://cohenhealthcarelaw.com/2016/01/the-internet-of-things-iot-legal-and-regulatory-issues/
2. https://www.iiprd.com/legal-issues-pertaining-to-internet-of-things-iot/
3. https://www.computerweekly.com/opinion/The-legal-considerations-of-the-internet-of-things

Video Links

1. https://www.youtube.com/watch?v=sgMG7zRrcPk
2. https://www.youtube.com/watch?v=bccEMm8gRuc
3. https://www.youtube.com/watchv=LlhmzVL5bm8&list=PL9ooVrP1hQOGccfBbP5tJWZ1hv5sIUWJl

108
THANK YOU

109

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy