2. Unit No 06
Internet of Things
Contents
• IoT: Overview, Characteristics and
Architecture
• Embedded Devices: Sensors, Actuators,
Arduino and Raspberry PI
• IOT Ecosystem: Basic elements / building
blocks of IOT application
• Systematic method to design IOT application
• Applications: Asset management, Industrial
automation, Smart cities
3. What is the Internet of Things?
The term “Internet of Things” (IoT) was first used in 1999
by British technology pioneer Kevin Ashton
“IoT is a system in which objects in the physical world
could be connected to the Internet by sensors”
The Internet of Things has become a popular term for
describing scenarios in which Internet connectivity and
computing capability extend to a variety of objects,
devices, sensors, and everyday items.
4.
5.
6.
7. Poll Question
• What will be the count of people and things in
next decade?
A. 07 Billion people and 07 Trillian things
B. 07 Trillion people and 07 Billian things
8. “Why is the Internet of Things a newly popular topic
today?”
• It possible to interconnect more and smaller
devices cheaply and easily
• Low–cost, high–speed, pervasive network
connectivity is possible
• Driven by industry investment in research,
development, and manufacturing
• Small and inexpensive sensor devices, which
drive many IoT applications.
9. • Advances in Data Analytics— New algorithms
and rapid increases in computing power, data
storage, and cloud services enable the
aggregation, correlation, and analysis of vast
quantities of data; these large and dynamic
datasets provide new opportunities for
extracting information and knowledge.
• Rise of Cloud Computing– Cloud computing,
which leverages remote, networked
computing resources to process, manage, and
store data, allows small and distributed
devices to interact with powerful back-end
analytic and control capabilities.
12. Connectivity Models
IoT implementations use different technical
communications models, each with its own
characteristics.
Four common communications models described
by the Internet Architecture Board include:
Device-to-Device
Device-to-Cloud
Device-to-Gateway and
Back-End Data-Sharing.
13. Device-to-Device Communications
• The device-to-device communication model represents two or
more devices that directly connect and communicate
between one another, rather than through an intermediary
application server.
• These devices communicate over many types of networks,
including IP networks or the Internet.
• These devices use protocols like Bluetooth,40 Z-Wave,41 or
ZigBee42 to establish direct device-to-device
communications, e.g. a door lock status message or turn on
light command
14. Device-to-Cloud Communications
• In a device-to-cloud communication model, the IoT device
connects directly to an Internet cloud service like an
application service provider to exchange data and control
message traffic.
• Wired Ethernet or Wi-Fi connections is used to establish a
connection between the device and the IP network, which
ultimately connects to the cloud service.
15. Device-to-Gateway Model
• In the device-to-gateway model, or more typically,
the device-to-application-layer gateway (ALG) model,
the IoT device connects through an ALG service as a
conduit to reach a cloud service.
• There is application software operating on a local
gateway device, which acts as an intermediary
between the device and the cloud service and
provides security and other functionality such as
data or protocol translation.
16.
17. Back-End Data-Sharing Model
• The back-end data-sharing model refers to a
communication architecture that enables
users to export and analyze smart object data
from a cloud service in combination with data
from other sources.
19. 4 Layers Model of IoT
Integrated
Application
Information
Processing
Network
Construction
Sensing and
Identification
20. IoT Security Challenge
• More IoT Devices
• Lack Of Encryption / privacy in data
• Small Scale Attacks In IoT
• Unreliable Threat Detection Methods
• Weak Default Passwords
• Outdated Legacy Security
• Inability To Predict Threats
• Infrequent Updates
21. How we can overcome the challenges,
• Good Design Practices
• Cost vs. Security Trade-Offs
• Data Confidentiality, Authentication and
Access Control
• Field-Upgradeability
• Shared Responsibility
35. ADOPTION OF IOT NETWORKS:
HEALTHCARE INDUSTRY
• Remote patient monitoring services
• Mobile health technology
• Telemedicine
• Medication Management
• Improved Clinical Care
• Employee workflow management and
• Inpatient monitoring
36. Intelligent Transportation
• Driver warning, autopilot, emergency self
stop, traffic management
• Real-time vehicle tracking and fleet
management
• Route planning information, high-precision
estimated arrival times
• Valuable data for insurance companies
37. Why IoT has been preferred now a
days
• Utility companies use IoT to improve
• Asset performance
• Reduce costs
• Infrastructure management
• Lower supply chain risks and
• Empower employees and consumers
• More efficient and proactive maintenance
38. MAJOR OBSTACLES FOR IOT
DEPLOYMENTS
• High Costs of required investment in IoT infrastructure
• Concerns about security and privacy
• Lack of senior management knowledge/commitment
• Weaknesses in organization’s technology infrastructure
• Regulation (e.g., relating to data privacy)
• Weaknesses in public com infrastructure available to
organization
• Immaturity of industry standard around the IoT
• General economic uncertainty
• Undeveloped consumer awareness
• Absence of business case/business model
39. Advantages of IoT
• Efficient resource utilization: If we know the functionality and
the way that how each device work we definitely increase the
efficient resource utilization as well as monitor natural
resources.
• Minimize human effort: As the devices of IoT interact and
communicate with each other and do lot of task for us, then
they minimize the human effort.
• Save time: As it reduces the human effort then it definitely
saves out time. Time is the primary factor which can save
through IoT platform.
• Enhance Data Collection:
• Improve security: Now, if we have a system that all these
things are interconnected then we can make the system more
secure and efficient.
40. Disadvantages of IoT
• Security: As the IoT systems are interconnected
and communicate over networks. The system
offers little control despite any security measures,
and it can be lead the various kinds of network
attacks.
• Privacy: Even without the active participation on
the user, the IoT system provides substantial
personal data in maximum detail.
• Complexity: The designing, developing, and
maintaining and enabling the large technology to
IoT system is quite complicated.
41. • For more detail refer the following video,
Introduction to IoT
By Prof Sudip Misra
IIT Kharagpur
https://youtu.be/WUYAjxnwjU4?list=PLaxu2gn-
9WXMf_ln5pMvxjf043jzof4-i