InternetofThings(IoT)EnablingTechnologies
•IoT(internetofthings)enablingtechnologiesare
•WirelessSensorNetwork
•CloudComputing
•BigDataAnalytics
•CommunicationsProtocols
•EmbeddedSystem
•1. Wireless Sensor Network(WSN) :
AWSNcomprises distributed devices with sensors which are used to
monitor the environmental and physical conditions. Awireless sensor
networkconsists of end nodes, routers and coordinators. End nodes have
several sensors attached to them where the data is passed to a
coordinator with the help of routers. The coordinator also acts as the
gateway that connects WSN to the internet.
•Example –
•Weather monitoring system
•Indoor air quality monitoring system
•Soil moisture monitoring system
•Surveillance system
•Health monitoring system
2.CloudComputing
It provides us the means by which we can access applications as utilities over
the internet. Cloud means something which is present in remote locations.
With Cloud computing, users can access any resources from anywhere like
databases, webservers, storage, any device, and any software over the
internet.
Characteristics –
•Broadnetworkaccess
•Ondemandself-services
•Rapidscalability
•Measuredservice
•Pay-per-use
3.BigData Analytics: :
It refers to the method of studying massive volumes of data or big data.
Collection of data whose volume, velocity or variety is simply too massive
and tough to store, control, process and examine the data using traditional
databases.
Big data is gathered from a variety of sources including social network
videos, digital images, sensors and sales transaction records.
Several steps involved in analyzing big data –
•Datacleaning
•Munging
•Processing
•Visualization
•Examples–
•Banktransactions
•DatageneratedbyIoTsystemsforlocationandtrackingofvehicles
•E-commerceandinBig-Basket
•HealthandfitnessdatageneratedbyIoTsystemsuchasafitnessbands
4.CommunicationsProtocols:
•TheyarethebackboneofIoTsystemsandenablenetworkconnectivity
andlinkingtoapplications.Communicationprotocolsallowdevicesto
exchangedataoverthenetwork.
•Multiple protocols often describe different aspects of a single
communication. A group of protocols designed to work together is known
as a protocol suite; when implemented in software they are a protocol
stack.
They are used in
•Dataencoding
•Addressingschemes
5.EmbeddedSystems:
•Itisacombinationofhardwareandsoftwareusedtoperformspecial
tasks.
•It includes microcontroller and microprocessor memory, networking units
(Ethernet Wi-Fi adapters), input output units (display keyword etc. ) and
storage devices(flash memory).
It collects the data and sends it to the internet.
Embedded systems used in
Examples –
•Digitalcamera
•DVDplayer,musicplayer
•Industrialrobots
•WirelessRoutersetc.
•Defines set of levels with control flowing from the center (cloud service or
dedicated data center), to the edge
•May includes sensors, devices, machines, and other types of intelligent
end nodes.
•Usingthismodel,weareabletoachieve:–DecomposetheIoTproblem
intosmallerparts–Identifydifferenttechnologiesateachlayerandhow
theyrelatetooneanother–Defineasysteminwhichdifferentpartscan
beprovidedbydifferentvendors–Haveaprocessofdefininginterfaces
thatleadstointeroperability–Defineatieredsecuritymodelthatis
enforcedatthetransitionpointsbetweenlevels.
Layer 6: Applications Layer
•Interprets data using software applications.
•Applications may monitor, control and provides reports based on the
analysis of the data.
Layer 6: Collaborations and Processes Layer
•Consumes and shares the applications information.
•Collaborating on and communicating IoT information often requires
multiple steps and it is what makes IoT useful
•This layer can change business processes and delivers the benefits of IoT.
Alternative IoT models
TheIoTsallowpeopleandthingstobeconnectedanytime,anyspace,with
anythingandanyone,usinganynetworkandanyservice.
TypesofCommunicationModel:
1. Request & Response Model –
This model follows a client-server architecture.
•Theclient,whenrequired,requeststheinformationfromtheserver.This
requestisusuallyintheencodedformat.
•Thismodelisstatelesssincethedatabetweentherequestsisnotretained
andeachrequestisindependentlyhandled.
•TheserverCategoriestherequest,andfetchesthedatafromthedatabase
anditsresourcerepresentation.Thisdataisconvertedtoresponseandis
transferredinanencodedformattotheclient.Theclient,inturn,receives
theresponse.
2. Publisher-Subscriber Model –
This model comprises three entities: Publishers, Brokers, and Consumers.
•Publishersarethesourceofdata.Itsendsthedatatothetopicwhichare
managedbythebroker.Theyarenotawareofconsumers.
•Consumerssubscribetothetopicswhicharemanagedbythebroker.
•Hence,Brokersresponsibilityistoacceptdatafrompublishersandsendit
totheappropriateconsumers.Thebrokeronlyhastheinformation
regardingtheconsumertowhichaparticulartopicbelongstowhichthe
publisherisunawareof.
3. Push-Pull Model –
The push-pull model constitutes data publishers, data consumers, and
data queues.
•PublishersandConsumersarenotawareofeachother.
•Publisherspublishthemessage/dataandpushitintothequeue.The
consumers,presentontheotherside,pullthedataoutofthequeue.
Thus,thequeueactsasthebufferforthemessagewhenthedifference
occursintherateofpushorpullofdataonthesideofapublisherand
consumer.
IoT Challenges
•TheInternetofThings(IoT)hasfastgrowntobealargepartofhow
humanbeingslive,communicateanddobusiness.Allacrosstheworld,
web-enableddevicesareturningourglobalrightsintoagreaterswitched-
on area to live in.
TherearevarioustypesofchallengesinfrontofIoT.
1.SecuritychallengesinIoT:
i)Lackofencryption-Althoughencryptionisagreatwaytopreventhackers
fromaccessingdata,itisalsooneoftheleadingIoTsecuritychallenges.
ii)Insufficienttestingandupdating-Withtheincreaseinthenumberof
IoT(internetofthings)devices,IoTmanufacturersaremoreeagerto
produceanddelivertheirdeviceasfastastheycanwithoutgiving
security too much of although.
MostofthesedevicesandIoTproductsdonotgetenoughtestingand
updatesandarepronetohackersandothersecurityissues.
iii)Bruteforcingandtheriskofdefaultpasswords-Weakcredentialsandlogin
detailsleavenearlyallIoTdevicesvulnerabletopasswordhackingandbrute
force.
Anycompanythatusesfactorydefaultcredentialsontheirdevicesisplacing
boththeirbusinessanditsassetsandthecustomerandtheirvaluable
informationatriskofbeingsusceptibletoabruteforceattack.
iv) IoT Malware and ransomware –
Increases with increase in devices.
Ransom ware uses encryption to effectively lock out users from various
devices and platforms and still use a user’s valuable data and info.
Example –
A hacker can hijack a computer camera and take pictures.
By using malware access points, the hackers can demand ransom to unlock the
device and return the data.
2.DesignchallengeinIoT:
i)Interoperability-Interoperabilityreferstotheabilityofdifferentsystems,
devices,orcomponentstoworktogetherseamlesslyandexchangedata
effectively.InthecontextoftheInternetofThings(IoT),interoperability
isacriticalchallenge,asalargenumberofdiversedevicesarebeing
connectedtotheinternet.