SlideShare ist ein Scribd-Unternehmen logo
1 von 26
IoT
Internet Of Things
Presented by :-
IT-3rd Year
Anindya Sundar De
Gopal Basak
Rashbihari Halder
Agnish Majumder
What is IoT ??
• The Internet of Things (IoT) is the network of physical
objects or "things" embedded with electronics, software,
sensors, and network connectivity, it enables these objects
to collect and exchange data.
• IoT allows objects to be sensed and controlled
remotely across existing network infrastructure, creating
opportunities for more direct integration between the
physical world and computer-based systems, and resulting
in improved efficiency, accuracy and economic benefit.
“Things” in IoT
• "Things," in the IoT sense, can refer to a wide
variety of devices such as heart monitoring
implants, biochip transponders on farm animals,
electric clams in coastal waters, automobiles with
built-in sensors, DNA analysis devices for environmental/food/pathogen monitoring or
field operation devices that assist fire-fighters in search and rescue operations.
• These devices collect useful data with the help of various existing technologies and
then autonomously flow the data between other devices.
History of IoT
• The concept of the Internet of Things first became popular in 1999,
through the Auto-ID Centre at MIT and related market-analysis
publications.
• Radio-frequency identification (RFID) was seen as a prerequisite for
the IoT at that point. If all objects and people in
daily life were equipped with identifiers, computers could manage
and inventory them. Besides using RFID, the tagging may be
achieved through such technologies as near field communication,
barcodes, QR codes, Bluetooth, and digital watermarking.
Various Names, One Concept
M2M (Machine to Machine)
“Internet of Everything” (Cisco Systems)
“World Size Web” (Bruce Schneider)
“Skynet” (Terminator movie)
Various things, One controller
IoT Explained (How IoT works??)
A complete IoT system integrates four distinct components: sensors/devices, connectivity, data
processing, and a user interface.
 Sensors/Devices : First, sensors or devices collect data from their environment. This could be as
simple as a temperature reading or as complex as a full video feed(in case of IP Camera). In this
first step data is being collected from the environment .
 Connectivity: Next, that data is sent to the cloud , but it needs a way to get there.. The
sensors/devices can be connected to the cloud through a variety of methods including: cellular,
satellite, Wi-Fi, Bluetooth, low-power wide-area networks (LPWAN), or connecting directly to the
internet via ethernet. Here , we have to Choose which connectivity option is best to the specific IoT
application, they all accomplish the same task: getting data to the cloud.
 Data Processing: Once the data gets to the cloud, software performs some kind of processing on it.
This could be very simple, such as checking that the temperature reading is within an acceptable
range. Or it could also be very complex, such as using computer vision on video to identify objects
(such as intruders in your house).
But what happens when the temperature is too high or if there is an intruder in your house? That’s
where the user comes in.
 User Interface: Next, the information is sent to the end-user in some way. This could be via an
alert to the user (email, text, notification, etc). For example, a text alert when the temperature is too
high in the company’s cold storage. it’s not always a one-way street. Depending on the IoT
application, the user may also be able to perform an action and affect the system. For example, the
user might remotely adjust the temperature in the cold storage via an app on their phone.
And some actions are performed automatically. rather than just call you to alert you of an
intruder, the IoT system could also automatically notify relevant authorities.
Current Status &Future Prospect of IoT
The Future of IoT
"The Sky's not the limit. It's only the beginning with IoT."
Unlock the Massive potential of IoT
IoT is modern technology in IT
or technology industry .So
there are huge area to improve
performance .
And maintaining cost of IoT is
very high. So normal people
cannot easily afford this
technology where it is very
needful for security purpose.
So cost(maintaining) should be
reduced.
And from corporate side there
need a new strategy to get
more revenue from this
technology & as well some
innovative services also
needed in today’s era.
Applications of IoT
Smart Propane Tank
This super smart propane
tank gauge connects to an
app on your mobile device
so no matter where you
are, you’ll always know
when it’s time to refuel.
Glucose Monitoring
A cellular-powered glucose
meter transmits each test
result to a secure server
and provides instant
feedback and coaching to
patients. This equips
doctors, nurses, diabetes
educators with real-time
clinical data.
Hydroponic System
Niwa is the first fully automated
hydroponic system that attends
to all of your plants’ needs and
water them, feed them and make
sure they have optimal growing
conditions 24/7.
Smart Home Security
Canary is a complete security
system packed into a single,
device. It adapts to your home
over time and sendsintelligent
notifications with HD video
directly to your smartphone.
Blood Pressure Monitor
Simply slip on the cuff, turn on
the Wireless Blood Pressure
Monitor and the Health Mate app
will automatically launch.
Smart Socks
Socks infused with proprietary
100%textile sensors. They are
paired with a Bluetooth Smart
cool and detachable anklet
that delivers accuracy instep
counting, speed, calories, altitude
and distance tracking.
Smart Doorlock
The Genie Smart Lock -A door
lock that allows you to lock and
unlock your home using your
smart phone, bluetooth keyringor
computer.
Attacking IoT
Default, weak, and hardcoded credentials
Difficult to update firmware and OS
Lack of vendor support for repairing vulnerabilities
Vulnerable web interfaces (SQL injection, XSS)
Coding errors (buffer overflow)
Clear text protocols and unnecessary open ports
DoS / DDoS
Physical theft and tampering.
Case Study: Trane
Connected thermostat vulnerabilities
detected by Cisco’s Talos group
allowed foothold into network
12 months to publish fixes for 2
vulnerabilities
21 months to publish fix for 1
vulnerability
Device owners may not be aware of
fixes, or have the skill to install
updates
Case Study: Lessons Learned
 All software can contain
vulnerabilities.
 Public not informed for months
 Vendors may delay or ignore issues
 Product lifecycles and end-of-
support
Patching IoT devices may not scale in
large environments
Recommendations
Plan for IoT growth:
 Additional types of logging, log storage: Can you find
the needle in the haystack?
 Increased network traffic.
 Increase use for IP address IPv6
 Increased network complexity – should these devices
be isolated or segmented.
Threat vs. Opportunity
If misunderstood and misconfigured, IoT poses risk to our
data, privacy, and safety.
If understood and secured, IoT will enhance communications,
lifestyle, and delivery of services.
For
For your kind attention …

Weitere ähnliche Inhalte

Was ist angesagt?

Internet of Things Connectivity for Embedded Devices
Internet of Things Connectivity for Embedded DevicesInternet of Things Connectivity for Embedded Devices
Internet of Things Connectivity for Embedded Devicesmentoresd
 
Internet Of Things
Internet Of ThingsInternet Of Things
Internet Of ThingsRohan M
 
Internet of things (iot)
Internet of things (iot)Internet of things (iot)
Internet of things (iot)shubhamyadav613
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)asfaw Alene
 
Internet of Things: Challenges and Issues
Internet of Things: Challenges and IssuesInternet of Things: Challenges and Issues
Internet of Things: Challenges and Issuesrjain51
 
Getting Started with the NodeMCU- Getting started with Internet of Things (Io...
Getting Started with the NodeMCU- Getting started with Internet of Things (Io...Getting Started with the NodeMCU- Getting started with Internet of Things (Io...
Getting Started with the NodeMCU- Getting started with Internet of Things (Io...AkshetPatel
 
Internet of Things -Indoor Environmental Monitoring And Control System
Internet of Things -Indoor Environmental Monitoring And Control SystemInternet of Things -Indoor Environmental Monitoring And Control System
Internet of Things -Indoor Environmental Monitoring And Control Systemsalim lakade
 
Tips on designing for the Internet of Things
Tips on designing for the Internet of ThingsTips on designing for the Internet of Things
Tips on designing for the Internet of ThingsDesign World
 
Internet of things –
Internet of things –Internet of things –
Internet of things –Mathews Job
 
A Technical Introduction to The Internet of Things
A Technical Introduction to The Internet of ThingsA Technical Introduction to The Internet of Things
A Technical Introduction to The Internet of ThingsAPNIC
 
Disrupting and Enhancing Healthcare with the Internet of Things
Disrupting and Enhancing Healthcare with the Internet of ThingsDisrupting and Enhancing Healthcare with the Internet of Things
Disrupting and Enhancing Healthcare with the Internet of Thingstodbotdotcom
 
What Is IoT, IoT Testing And What Are Its Challenges | BugRaptors
What Is IoT, IoT Testing And What Are Its Challenges | BugRaptorsWhat Is IoT, IoT Testing And What Are Its Challenges | BugRaptors
What Is IoT, IoT Testing And What Are Its Challenges | BugRaptorsBugRaptors
 
Meetup9 iot sensors and security
Meetup9 iot sensors and securityMeetup9 iot sensors and security
Meetup9 iot sensors and securityFrancesco Rago
 
IoT - What is it ?
IoT -  What is it ?IoT -  What is it ?
IoT - What is it ?Mirco Vanini
 
Internet of things (IOT) Presentation-PPT
Internet of things (IOT) Presentation-PPTInternet of things (IOT) Presentation-PPT
Internet of things (IOT) Presentation-PPTCharan Vimala
 

Was ist angesagt? (20)

Internet of Things Connectivity for Embedded Devices
Internet of Things Connectivity for Embedded DevicesInternet of Things Connectivity for Embedded Devices
Internet of Things Connectivity for Embedded Devices
 
Internet Of Things
Internet Of ThingsInternet Of Things
Internet Of Things
 
Internet of things (iot)
Internet of things (iot)Internet of things (iot)
Internet of things (iot)
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 
Internet of Things: Challenges and Issues
Internet of Things: Challenges and IssuesInternet of Things: Challenges and Issues
Internet of Things: Challenges and Issues
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Getting Started with the NodeMCU- Getting started with Internet of Things (Io...
Getting Started with the NodeMCU- Getting started with Internet of Things (Io...Getting Started with the NodeMCU- Getting started with Internet of Things (Io...
Getting Started with the NodeMCU- Getting started with Internet of Things (Io...
 
Internet of Things -Indoor Environmental Monitoring And Control System
Internet of Things -Indoor Environmental Monitoring And Control SystemInternet of Things -Indoor Environmental Monitoring And Control System
Internet of Things -Indoor Environmental Monitoring And Control System
 
Tips on designing for the Internet of Things
Tips on designing for the Internet of ThingsTips on designing for the Internet of Things
Tips on designing for the Internet of Things
 
Internet of things –
Internet of things –Internet of things –
Internet of things –
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
A Technical Introduction to The Internet of Things
A Technical Introduction to The Internet of ThingsA Technical Introduction to The Internet of Things
A Technical Introduction to The Internet of Things
 
Disrupting and Enhancing Healthcare with the Internet of Things
Disrupting and Enhancing Healthcare with the Internet of ThingsDisrupting and Enhancing Healthcare with the Internet of Things
Disrupting and Enhancing Healthcare with the Internet of Things
 
What Is IoT, IoT Testing And What Are Its Challenges | BugRaptors
What Is IoT, IoT Testing And What Are Its Challenges | BugRaptorsWhat Is IoT, IoT Testing And What Are Its Challenges | BugRaptors
What Is IoT, IoT Testing And What Are Its Challenges | BugRaptors
 
Intelligent IoT Projects In 7 Days
Intelligent IoT Projects In 7 Days Intelligent IoT Projects In 7 Days
Intelligent IoT Projects In 7 Days
 
Meetup9 iot sensors and security
Meetup9 iot sensors and securityMeetup9 iot sensors and security
Meetup9 iot sensors and security
 
IoT - What is it ?
IoT -  What is it ?IoT -  What is it ?
IoT - What is it ?
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
Iot
IotIot
Iot
 
Internet of things (IOT) Presentation-PPT
Internet of things (IOT) Presentation-PPTInternet of things (IOT) Presentation-PPT
Internet of things (IOT) Presentation-PPT
 

Ähnlich wie Internet of things (IoT)

The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy AnkitThakkar46
 
The internet of things (io t)
The internet of things (io t)The internet of things (io t)
The internet of things (io t)shashankvaidyar2
 
IOT LADEN GHISING.pptx
IOT LADEN GHISING.pptxIOT LADEN GHISING.pptx
IOT LADEN GHISING.pptxrupasharma39
 
What is the Internet of Things? How does it Work?
What is the Internet of Things? How does it Work?What is the Internet of Things? How does it Work?
What is the Internet of Things? How does it Work?AbhijitVerma9
 
Presentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfPresentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfezzAyman1
 
Emerging chapter 4.pptx
Emerging chapter 4.pptxEmerging chapter 4.pptx
Emerging chapter 4.pptxAderawAlemie
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSomasundaram Jambunathan
 
Internet_of_Things.pptx
Internet_of_Things.pptxInternet_of_Things.pptx
Internet_of_Things.pptxzarakhalid20
 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Somasundaram Jambunathan
 
IRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: ReviewIRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: ReviewIRJET Journal
 

Ähnlich wie Internet of things (IoT) (20)

1. IoT.pptx
1. IoT.pptx1. IoT.pptx
1. IoT.pptx
 
The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy
 
The internet of things (io t)
The internet of things (io t)The internet of things (io t)
The internet of things (io t)
 
123456.pptx
123456.pptx123456.pptx
123456.pptx
 
IOT LADEN GHISING.pptx
IOT LADEN GHISING.pptxIOT LADEN GHISING.pptx
IOT LADEN GHISING.pptx
 
What is the Internet of Things? How does it Work?
What is the Internet of Things? How does it Work?What is the Internet of Things? How does it Work?
What is the Internet of Things? How does it Work?
 
Presentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfPresentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdf
 
Internet of things presentation
Internet of things presentationInternet of things presentation
Internet of things presentation
 
iot PPT.ppt
iot PPT.pptiot PPT.ppt
iot PPT.ppt
 
IOT VIVA QUESTION.pdf
IOT VIVA QUESTION.pdfIOT VIVA QUESTION.pdf
IOT VIVA QUESTION.pdf
 
iot_ppt.pptx
iot_ppt.pptxiot_ppt.pptx
iot_ppt.pptx
 
Unit 1 iot.pptx
Unit 1 iot.pptxUnit 1 iot.pptx
Unit 1 iot.pptx
 
The internet of things
The internet of thingsThe internet of things
The internet of things
 
Shubham hatzade
Shubham hatzadeShubham hatzade
Shubham hatzade
 
Emerging chapter 4.pptx
Emerging chapter 4.pptxEmerging chapter 4.pptx
Emerging chapter 4.pptx
 
Questions in iot
Questions in iotQuestions in iot
Questions in iot
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of Things
 
Internet_of_Things.pptx
Internet_of_Things.pptxInternet_of_Things.pptx
Internet_of_Things.pptx
 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4
 
IRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: ReviewIRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: Review
 

Kürzlich hochgeladen

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 

Kürzlich hochgeladen (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

Internet of things (IoT)

  • 2. Presented by :- IT-3rd Year Anindya Sundar De Gopal Basak Rashbihari Halder Agnish Majumder
  • 3. What is IoT ?? • The Internet of Things (IoT) is the network of physical objects or "things" embedded with electronics, software, sensors, and network connectivity, it enables these objects to collect and exchange data. • IoT allows objects to be sensed and controlled remotely across existing network infrastructure, creating opportunities for more direct integration between the physical world and computer-based systems, and resulting in improved efficiency, accuracy and economic benefit.
  • 4. “Things” in IoT • "Things," in the IoT sense, can refer to a wide variety of devices such as heart monitoring implants, biochip transponders on farm animals, electric clams in coastal waters, automobiles with built-in sensors, DNA analysis devices for environmental/food/pathogen monitoring or field operation devices that assist fire-fighters in search and rescue operations. • These devices collect useful data with the help of various existing technologies and then autonomously flow the data between other devices.
  • 5.
  • 6. History of IoT • The concept of the Internet of Things first became popular in 1999, through the Auto-ID Centre at MIT and related market-analysis publications. • Radio-frequency identification (RFID) was seen as a prerequisite for the IoT at that point. If all objects and people in daily life were equipped with identifiers, computers could manage and inventory them. Besides using RFID, the tagging may be achieved through such technologies as near field communication, barcodes, QR codes, Bluetooth, and digital watermarking.
  • 7. Various Names, One Concept M2M (Machine to Machine) “Internet of Everything” (Cisco Systems) “World Size Web” (Bruce Schneider) “Skynet” (Terminator movie)
  • 8. Various things, One controller
  • 9. IoT Explained (How IoT works??) A complete IoT system integrates four distinct components: sensors/devices, connectivity, data processing, and a user interface.  Sensors/Devices : First, sensors or devices collect data from their environment. This could be as simple as a temperature reading or as complex as a full video feed(in case of IP Camera). In this first step data is being collected from the environment .  Connectivity: Next, that data is sent to the cloud , but it needs a way to get there.. The sensors/devices can be connected to the cloud through a variety of methods including: cellular, satellite, Wi-Fi, Bluetooth, low-power wide-area networks (LPWAN), or connecting directly to the internet via ethernet. Here , we have to Choose which connectivity option is best to the specific IoT application, they all accomplish the same task: getting data to the cloud.  Data Processing: Once the data gets to the cloud, software performs some kind of processing on it.
  • 10. This could be very simple, such as checking that the temperature reading is within an acceptable range. Or it could also be very complex, such as using computer vision on video to identify objects (such as intruders in your house). But what happens when the temperature is too high or if there is an intruder in your house? That’s where the user comes in.  User Interface: Next, the information is sent to the end-user in some way. This could be via an alert to the user (email, text, notification, etc). For example, a text alert when the temperature is too high in the company’s cold storage. it’s not always a one-way street. Depending on the IoT application, the user may also be able to perform an action and affect the system. For example, the user might remotely adjust the temperature in the cold storage via an app on their phone. And some actions are performed automatically. rather than just call you to alert you of an intruder, the IoT system could also automatically notify relevant authorities.
  • 11. Current Status &Future Prospect of IoT
  • 12. The Future of IoT "The Sky's not the limit. It's only the beginning with IoT."
  • 13. Unlock the Massive potential of IoT IoT is modern technology in IT or technology industry .So there are huge area to improve performance . And maintaining cost of IoT is very high. So normal people cannot easily afford this technology where it is very needful for security purpose. So cost(maintaining) should be reduced. And from corporate side there need a new strategy to get more revenue from this technology & as well some innovative services also needed in today’s era.
  • 14. Applications of IoT Smart Propane Tank This super smart propane tank gauge connects to an app on your mobile device so no matter where you are, you’ll always know when it’s time to refuel.
  • 15. Glucose Monitoring A cellular-powered glucose meter transmits each test result to a secure server and provides instant feedback and coaching to patients. This equips doctors, nurses, diabetes educators with real-time clinical data.
  • 16. Hydroponic System Niwa is the first fully automated hydroponic system that attends to all of your plants’ needs and water them, feed them and make sure they have optimal growing conditions 24/7.
  • 17. Smart Home Security Canary is a complete security system packed into a single, device. It adapts to your home over time and sendsintelligent notifications with HD video directly to your smartphone.
  • 18. Blood Pressure Monitor Simply slip on the cuff, turn on the Wireless Blood Pressure Monitor and the Health Mate app will automatically launch.
  • 19. Smart Socks Socks infused with proprietary 100%textile sensors. They are paired with a Bluetooth Smart cool and detachable anklet that delivers accuracy instep counting, speed, calories, altitude and distance tracking.
  • 20. Smart Doorlock The Genie Smart Lock -A door lock that allows you to lock and unlock your home using your smart phone, bluetooth keyringor computer.
  • 21. Attacking IoT Default, weak, and hardcoded credentials Difficult to update firmware and OS Lack of vendor support for repairing vulnerabilities Vulnerable web interfaces (SQL injection, XSS) Coding errors (buffer overflow) Clear text protocols and unnecessary open ports DoS / DDoS Physical theft and tampering.
  • 22. Case Study: Trane Connected thermostat vulnerabilities detected by Cisco’s Talos group allowed foothold into network 12 months to publish fixes for 2 vulnerabilities 21 months to publish fix for 1 vulnerability Device owners may not be aware of fixes, or have the skill to install updates
  • 23. Case Study: Lessons Learned  All software can contain vulnerabilities.  Public not informed for months  Vendors may delay or ignore issues  Product lifecycles and end-of- support Patching IoT devices may not scale in large environments
  • 24. Recommendations Plan for IoT growth:  Additional types of logging, log storage: Can you find the needle in the haystack?  Increased network traffic.  Increase use for IP address IPv6  Increased network complexity – should these devices be isolated or segmented.
  • 25. Threat vs. Opportunity If misunderstood and misconfigured, IoT poses risk to our data, privacy, and safety. If understood and secured, IoT will enhance communications, lifestyle, and delivery of services.
  • 26. For For your kind attention …

Hinweis der Redaktion

  1. To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image.