SlideShare ist ein Scribd-Unternehmen logo
1 von 43
Engineering Informatics
Webinar on Unit No - 06
Presenter – Nutan V. Bansode
Unit No 06
Internet of Things
Contents
• IoT: Overview, Characteristics and
Architecture
• Embedded Devices: Sensors, Actuators,
Arduino and Raspberry PI
• IOT Ecosystem: Basic elements / building
blocks of IOT application
• Systematic method to design IOT application
• Applications: Asset management, Industrial
automation, Smart cities
What is the Internet of Things?
The term “Internet of Things” (IoT) was first used in 1999
by British technology pioneer Kevin Ashton
“IoT is a system in which objects in the physical world
could be connected to the Internet by sensors”
The Internet of Things has become a popular term for
describing scenarios in which Internet connectivity and
computing capability extend to a variety of objects,
devices, sensors, and everyday items.
Poll Question
• What will be the count of people and things in
next decade?
A. 07 Billion people and 07 Trillian things
B. 07 Trillion people and 07 Billian things
“Why is the Internet of Things a newly popular topic
today?”
• It possible to interconnect more and smaller
devices cheaply and easily
• Low–cost, high–speed, pervasive network
connectivity is possible
• Driven by industry investment in research,
development, and manufacturing
• Small and inexpensive sensor devices, which
drive many IoT applications.
• Advances in Data Analytics— New algorithms
and rapid increases in computing power, data
storage, and cloud services enable the
aggregation, correlation, and analysis of vast
quantities of data; these large and dynamic
datasets provide new opportunities for
extracting information and knowledge.
• Rise of Cloud Computing– Cloud computing,
which leverages remote, networked
computing resources to process, manage, and
store data, allows small and distributed
devices to interact with powerful back-end
analytic and control capabilities.
Area of Applications in IoT
Area of Applications in IoT
Connectivity Models
IoT implementations use different technical
communications models, each with its own
characteristics.
Four common communications models described
by the Internet Architecture Board include:
Device-to-Device
Device-to-Cloud
Device-to-Gateway and
Back-End Data-Sharing.
Device-to-Device Communications
• The device-to-device communication model represents two or
more devices that directly connect and communicate
between one another, rather than through an intermediary
application server.
• These devices communicate over many types of networks,
including IP networks or the Internet.
• These devices use protocols like Bluetooth,40 Z-Wave,41 or
ZigBee42 to establish direct device-to-device
communications, e.g. a door lock status message or turn on
light command
Device-to-Cloud Communications
• In a device-to-cloud communication model, the IoT device
connects directly to an Internet cloud service like an
application service provider to exchange data and control
message traffic.
• Wired Ethernet or Wi-Fi connections is used to establish a
connection between the device and the IP network, which
ultimately connects to the cloud service.
Device-to-Gateway Model
• In the device-to-gateway model, or more typically,
the device-to-application-layer gateway (ALG) model,
the IoT device connects through an ALG service as a
conduit to reach a cloud service.
• There is application software operating on a local
gateway device, which acts as an intermediary
between the device and the cloud service and
provides security and other functionality such as
data or protocol translation.
Back-End Data-Sharing Model
• The back-end data-sharing model refers to a
communication architecture that enables
users to export and analyze smart object data
from a cloud service in combination with data
from other sources.
Back-End Data-Sharing Model
4 Layers Model of IoT
Integrated
Application
Information
Processing
Network
Construction
Sensing and
Identification
IoT Security Challenge
• More IoT Devices
• Lack Of Encryption / privacy in data
• Small Scale Attacks In IoT
• Unreliable Threat Detection Methods
• Weak Default Passwords
• Outdated Legacy Security
• Inability To Predict Threats
• Infrequent Updates
How we can overcome the challenges,
• Good Design Practices
• Cost vs. Security Trade-Offs
• Data Confidentiality, Authentication and
Access Control
• Field-Upgradeability
• Shared Responsibility
Applications of IoT
Underwater applications
INTERNET OF UNDERGROUND
THINGS
Internet of Battlefield Things
INTERNET OF NANOTHINGS
Over body
Nano-Things
Electronic
Devices
Block diagram for agricultural
application
Smart Home
Block diagram for smart home application
Smart City
Smart City application
Block diagram for Smart city
INTERNET OF THINGS: PERSPECTIVE
ADOPTION OF IOT NETWORKS:
HEALTHCARE INDUSTRY
• Remote patient monitoring services
• Mobile health technology
• Telemedicine
• Medication Management
• Improved Clinical Care
• Employee workflow management and
• Inpatient monitoring
Intelligent Transportation
• Driver warning, autopilot, emergency self
stop, traffic management
• Real-time vehicle tracking and fleet
management
• Route planning information, high-precision
estimated arrival times
• Valuable data for insurance companies
Why IoT has been preferred now a
days
• Utility companies use IoT to improve
• Asset performance
• Reduce costs
• Infrastructure management
• Lower supply chain risks and
• Empower employees and consumers
• More efficient and proactive maintenance
MAJOR OBSTACLES FOR IOT
DEPLOYMENTS
• High Costs of required investment in IoT infrastructure
• Concerns about security and privacy
• Lack of senior management knowledge/commitment
• Weaknesses in organization’s technology infrastructure
• Regulation (e.g., relating to data privacy)
• Weaknesses in public com infrastructure available to
organization
• Immaturity of industry standard around the IoT
• General economic uncertainty
• Undeveloped consumer awareness
• Absence of business case/business model
Advantages of IoT
• Efficient resource utilization: If we know the functionality and
the way that how each device work we definitely increase the
efficient resource utilization as well as monitor natural
resources.
• Minimize human effort: As the devices of IoT interact and
communicate with each other and do lot of task for us, then
they minimize the human effort.
• Save time: As it reduces the human effort then it definitely
saves out time. Time is the primary factor which can save
through IoT platform.
• Enhance Data Collection:
• Improve security: Now, if we have a system that all these
things are interconnected then we can make the system more
secure and efficient.
Disadvantages of IoT
• Security: As the IoT systems are interconnected
and communicate over networks. The system
offers little control despite any security measures,
and it can be lead the various kinds of network
attacks.
• Privacy: Even without the active participation on
the user, the IoT system provides substantial
personal data in maximum detail.
• Complexity: The designing, developing, and
maintaining and enabling the large technology to
IoT system is quite complicated.
• For more detail refer the following video,
Introduction to IoT
By Prof Sudip Misra
IIT Kharagpur
https://youtu.be/WUYAjxnwjU4?list=PLaxu2gn-
9WXMf_ln5pMvxjf043jzof4-i
Unit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).ppt

Weitere ähnliche Inhalte

Ähnlich wie Unit 6 Final ppt (1).ppt

Internet_of_Things.pptx
Internet_of_Things.pptxInternet_of_Things.pptx
Internet_of_Things.pptxzarakhalid20
 
Views and myths of IoT
Views and myths of IoTViews and myths of IoT
Views and myths of IoTAhmed Banafa
 
Internet of things (IOT) connects physical to digital
Internet of things (IOT) connects physical to digitalInternet of things (IOT) connects physical to digital
Internet of things (IOT) connects physical to digitalEslam Nader
 
Group 4 IT INfrastructure Group presentation Final [Auto-saved].pptx
Group 4 IT INfrastructure Group presentation Final  [Auto-saved].pptxGroup 4 IT INfrastructure Group presentation Final  [Auto-saved].pptx
Group 4 IT INfrastructure Group presentation Final [Auto-saved].pptxOdedeleIfeoluwa
 
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014Adrian Wright
 
IoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesIoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesAhmed Banafa
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT SecurityCAS
 
IOT TOTAL POWER POINT PRESENTATION UNITS
IOT TOTAL POWER POINT PRESENTATION UNITSIOT TOTAL POWER POINT PRESENTATION UNITS
IOT TOTAL POWER POINT PRESENTATION UNITSDineshV95
 
CHAPTER 1-Introduction of Advanced Network Technology and Facilities.pptx
CHAPTER 1-Introduction of Advanced Network Technology and Facilities.pptxCHAPTER 1-Introduction of Advanced Network Technology and Facilities.pptx
CHAPTER 1-Introduction of Advanced Network Technology and Facilities.pptxFame22
 
Internet of Things with Cloud Computing and M2M Communication
Internet of Things with Cloud Computing and M2M CommunicationInternet of Things with Cloud Computing and M2M Communication
Internet of Things with Cloud Computing and M2M CommunicationSherin C Abraham
 
SYBSC(CS)_WCIOT_Sem-II-Unit 3 IoT Architecture.pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 3 IoT Architecture.pdfSYBSC(CS)_WCIOT_Sem-II-Unit 3 IoT Architecture.pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 3 IoT Architecture.pdfshubhangisonawane6
 
Unit 1 IoT Fundamentals.pdf
Unit 1 IoT Fundamentals.pdfUnit 1 IoT Fundamentals.pdf
Unit 1 IoT Fundamentals.pdfZoyaAli844417
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)asfaw Alene
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)milemadinah
 

Ähnlich wie Unit 6 Final ppt (1).ppt (20)

Internet_of_Things.pptx
Internet_of_Things.pptxInternet_of_Things.pptx
Internet_of_Things.pptx
 
iot1.pptx
iot1.pptxiot1.pptx
iot1.pptx
 
Views and myths of IoT
Views and myths of IoTViews and myths of IoT
Views and myths of IoT
 
IoT.pptx
IoT.pptxIoT.pptx
IoT.pptx
 
CHA_001_IOT.pptx
CHA_001_IOT.pptxCHA_001_IOT.pptx
CHA_001_IOT.pptx
 
Internet of things (IOT) connects physical to digital
Internet of things (IOT) connects physical to digitalInternet of things (IOT) connects physical to digital
Internet of things (IOT) connects physical to digital
 
Group 4 IT INfrastructure Group presentation Final [Auto-saved].pptx
Group 4 IT INfrastructure Group presentation Final  [Auto-saved].pptxGroup 4 IT INfrastructure Group presentation Final  [Auto-saved].pptx
Group 4 IT INfrastructure Group presentation Final [Auto-saved].pptx
 
Module-1.pptx
Module-1.pptxModule-1.pptx
Module-1.pptx
 
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
 
IoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesIoT Standardization and Implementation Challenges
IoT Standardization and Implementation Challenges
 
Shubham hatzade
Shubham hatzadeShubham hatzade
Shubham hatzade
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT Security
 
IOT TOTAL POWER POINT PRESENTATION UNITS
IOT TOTAL POWER POINT PRESENTATION UNITSIOT TOTAL POWER POINT PRESENTATION UNITS
IOT TOTAL POWER POINT PRESENTATION UNITS
 
CHAPTER 1-Introduction of Advanced Network Technology and Facilities.pptx
CHAPTER 1-Introduction of Advanced Network Technology and Facilities.pptxCHAPTER 1-Introduction of Advanced Network Technology and Facilities.pptx
CHAPTER 1-Introduction of Advanced Network Technology and Facilities.pptx
 
Internet of Things with Cloud Computing and M2M Communication
Internet of Things with Cloud Computing and M2M CommunicationInternet of Things with Cloud Computing and M2M Communication
Internet of Things with Cloud Computing and M2M Communication
 
SYBSC(CS)_WCIOT_Sem-II-Unit 3 IoT Architecture.pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 3 IoT Architecture.pdfSYBSC(CS)_WCIOT_Sem-II-Unit 3 IoT Architecture.pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 3 IoT Architecture.pdf
 
IOT UNIT I.pptx
IOT UNIT I.pptxIOT UNIT I.pptx
IOT UNIT I.pptx
 
Unit 1 IoT Fundamentals.pdf
Unit 1 IoT Fundamentals.pdfUnit 1 IoT Fundamentals.pdf
Unit 1 IoT Fundamentals.pdf
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 

Kürzlich hochgeladen

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 

Kürzlich hochgeladen (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 

Unit 6 Final ppt (1).ppt

  • 1. Engineering Informatics Webinar on Unit No - 06 Presenter – Nutan V. Bansode
  • 2. Unit No 06 Internet of Things Contents • IoT: Overview, Characteristics and Architecture • Embedded Devices: Sensors, Actuators, Arduino and Raspberry PI • IOT Ecosystem: Basic elements / building blocks of IOT application • Systematic method to design IOT application • Applications: Asset management, Industrial automation, Smart cities
  • 3. What is the Internet of Things? The term “Internet of Things” (IoT) was first used in 1999 by British technology pioneer Kevin Ashton “IoT is a system in which objects in the physical world could be connected to the Internet by sensors” The Internet of Things has become a popular term for describing scenarios in which Internet connectivity and computing capability extend to a variety of objects, devices, sensors, and everyday items.
  • 4.
  • 5.
  • 6.
  • 7. Poll Question • What will be the count of people and things in next decade? A. 07 Billion people and 07 Trillian things B. 07 Trillion people and 07 Billian things
  • 8. “Why is the Internet of Things a newly popular topic today?” • It possible to interconnect more and smaller devices cheaply and easily • Low–cost, high–speed, pervasive network connectivity is possible • Driven by industry investment in research, development, and manufacturing • Small and inexpensive sensor devices, which drive many IoT applications.
  • 9. • Advances in Data Analytics— New algorithms and rapid increases in computing power, data storage, and cloud services enable the aggregation, correlation, and analysis of vast quantities of data; these large and dynamic datasets provide new opportunities for extracting information and knowledge. • Rise of Cloud Computing– Cloud computing, which leverages remote, networked computing resources to process, manage, and store data, allows small and distributed devices to interact with powerful back-end analytic and control capabilities.
  • 12. Connectivity Models IoT implementations use different technical communications models, each with its own characteristics. Four common communications models described by the Internet Architecture Board include: Device-to-Device Device-to-Cloud Device-to-Gateway and Back-End Data-Sharing.
  • 13. Device-to-Device Communications • The device-to-device communication model represents two or more devices that directly connect and communicate between one another, rather than through an intermediary application server. • These devices communicate over many types of networks, including IP networks or the Internet. • These devices use protocols like Bluetooth,40 Z-Wave,41 or ZigBee42 to establish direct device-to-device communications, e.g. a door lock status message or turn on light command
  • 14. Device-to-Cloud Communications • In a device-to-cloud communication model, the IoT device connects directly to an Internet cloud service like an application service provider to exchange data and control message traffic. • Wired Ethernet or Wi-Fi connections is used to establish a connection between the device and the IP network, which ultimately connects to the cloud service.
  • 15. Device-to-Gateway Model • In the device-to-gateway model, or more typically, the device-to-application-layer gateway (ALG) model, the IoT device connects through an ALG service as a conduit to reach a cloud service. • There is application software operating on a local gateway device, which acts as an intermediary between the device and the cloud service and provides security and other functionality such as data or protocol translation.
  • 16.
  • 17. Back-End Data-Sharing Model • The back-end data-sharing model refers to a communication architecture that enables users to export and analyze smart object data from a cloud service in combination with data from other sources.
  • 19. 4 Layers Model of IoT Integrated Application Information Processing Network Construction Sensing and Identification
  • 20. IoT Security Challenge • More IoT Devices • Lack Of Encryption / privacy in data • Small Scale Attacks In IoT • Unreliable Threat Detection Methods • Weak Default Passwords • Outdated Legacy Security • Inability To Predict Threats • Infrequent Updates
  • 21. How we can overcome the challenges, • Good Design Practices • Cost vs. Security Trade-Offs • Data Confidentiality, Authentication and Access Control • Field-Upgradeability • Shared Responsibility
  • 22.
  • 26. INTERNET OF NANOTHINGS Over body Nano-Things Electronic Devices
  • 27.
  • 28. Block diagram for agricultural application
  • 30. Block diagram for smart home application
  • 33. Block diagram for Smart city
  • 34. INTERNET OF THINGS: PERSPECTIVE
  • 35. ADOPTION OF IOT NETWORKS: HEALTHCARE INDUSTRY • Remote patient monitoring services • Mobile health technology • Telemedicine • Medication Management • Improved Clinical Care • Employee workflow management and • Inpatient monitoring
  • 36. Intelligent Transportation • Driver warning, autopilot, emergency self stop, traffic management • Real-time vehicle tracking and fleet management • Route planning information, high-precision estimated arrival times • Valuable data for insurance companies
  • 37. Why IoT has been preferred now a days • Utility companies use IoT to improve • Asset performance • Reduce costs • Infrastructure management • Lower supply chain risks and • Empower employees and consumers • More efficient and proactive maintenance
  • 38. MAJOR OBSTACLES FOR IOT DEPLOYMENTS • High Costs of required investment in IoT infrastructure • Concerns about security and privacy • Lack of senior management knowledge/commitment • Weaknesses in organization’s technology infrastructure • Regulation (e.g., relating to data privacy) • Weaknesses in public com infrastructure available to organization • Immaturity of industry standard around the IoT • General economic uncertainty • Undeveloped consumer awareness • Absence of business case/business model
  • 39. Advantages of IoT • Efficient resource utilization: If we know the functionality and the way that how each device work we definitely increase the efficient resource utilization as well as monitor natural resources. • Minimize human effort: As the devices of IoT interact and communicate with each other and do lot of task for us, then they minimize the human effort. • Save time: As it reduces the human effort then it definitely saves out time. Time is the primary factor which can save through IoT platform. • Enhance Data Collection: • Improve security: Now, if we have a system that all these things are interconnected then we can make the system more secure and efficient.
  • 40. Disadvantages of IoT • Security: As the IoT systems are interconnected and communicate over networks. The system offers little control despite any security measures, and it can be lead the various kinds of network attacks. • Privacy: Even without the active participation on the user, the IoT system provides substantial personal data in maximum detail. • Complexity: The designing, developing, and maintaining and enabling the large technology to IoT system is quite complicated.
  • 41. • For more detail refer the following video, Introduction to IoT By Prof Sudip Misra IIT Kharagpur https://youtu.be/WUYAjxnwjU4?list=PLaxu2gn- 9WXMf_ln5pMvxjf043jzof4-i