Internet of Thing M4Eve
Internet of Thing M4Eve
Internet of Thing M4Eve
(IoT)
In 1990, the toaster was invented, which is In 2008, the number of interacting
considered the first IoT device. devices exceeded the number of people
on the planet.
In 1993, the world's first webcam prototype,
the Trojan Room Coffee Pot, was installed
at the University of Cambridge to monitor In particular, the IoT has recently become
the amount of coffee in the coffee machine. an important part of our lives with
developing technologies such as artificial
In the late 1990s and 2000s, IoT became intelligence-supported devices, and
popular, especially with the emergence of COVID-19 has contributed greatly to the
smartphones. widespread use of these technologies.
Applications of Internet of Things
Transportation
With a vehicle tracking system, an administrator can easily track
the location of the vehicle and the driver's unauthorized stops. In
addition, drivers can check the maintenance needs of the
equipment in the vehicle with their smart phones and take into
account the warnings and intervene in time.
S ecurity S hopping
With the facial recognition system and motion sensors, people Through IoT, customer behavior can be examined and customer-
and their activities in an area can be detected. In this way, it specific campaigns can be created based on these behaviors with
becomes easier to detect unusual movements in high-security the data obtained. For the company, being able to instantly
areas where only authorized persons are allowed to enter. control low-selling goods, products that run out quickly, and
stock status in the warehouse is very useful in terms of time
saving and strategy determination.
Human-Related Information in IoT
Enabling technologies for the Internet of Things considered in can be grouped into three categories:
i) Technologies that enable “things” to acquire contextual information.
ii) Technologies that enable “things” to process contextual information.
iii) Technologies to improve security and privacy.
E nabling Technologies
The first two categories can be jointly understood as functional building blocks required building
“intelligence” into “things”, which are indeed the features that differentiate the IoT from the usual Internet. The
third category is not a functional but rather a de facto requirement, without it the penetration of the IoT would be
severely reduced.
Addres s ability and Connection Wireles s S ens or Network
IoT systems use both wired and wireless Wireless sensor network (WSN) is a distributed
connection types. Some examples of these are devices with sensors which monitors
in short range wireless connection Bluetooth, environment and physical conditions. A WSN
Li-Fi, Wi-Fi, and Z-Wave in medium range consists of several end nodes, routers and a
LTE-Advanced and 5G and in long range coordinator. End nodes have sensors attached to
LPWAN and VSAT. For wired connections them and can also act as a router. Routers are
they mainly use Ethernet, but Power-Line responsible for routing the data packet from the
Communication (PLC) can also be seen in IoT end nodes to the coordinator. The coordinator
systems connections. node collect the data from all the notes and act
Transitioning to IPv6 from IPv4 is inevitable as a gateway that connects the WSN to the
due to IPv4's limited address space. IPv6 offers internet.
advantages like stateless address auto-
configuration and IRTF6 LoWPAN header
compression. Consequently, IoT's future looks
promising with advancements in connection
and addressability technologies.
B ig Data Analytics Communication Protocols
Big data is the analysis of extensive datasets IoT devices communicate with each other and
that are too large, fast-moving, or diverse to be with the central systems by communication
managed, processed, and analyzed through protocols. These protocols monitor the
traditional databases. These datasets are efficiency and security of the data transfer in
collected from various sources such as digital IoT networks. IoT communication protocols are
images and sensors. There are several steps to required for devices to connect and share data in
analyze big data: the IoT ecosystem. There are several popular
IoT communication protocols, each with unique
advantages and applications. Several important
• Data cleaning
IoT communication protocols are:
• Munging
Message Queue Telemetry Transport
• Processing (MQTT)
• Visualization. Hypertext Transfer Protocol (HTTP)
Constrained Application Protocol (CoAP)
Bluetooth
Zigbee
Bluetooth Low Energy (BLE)
Wi-Fi
Z-Wave
Cloud Computing Embedded Systems
1) Infrastructure as a service(IAAS)
2) Platform as a service(PaaS)
3) Software as a service(SaaS)
Des ign and
Development
Purpose And Requirements
Define purpose and requirements of IoT system
Service Specifications
Map process and information model to services and define service specifications
Application Development
Develop Applications
Data Generation
1 Data Generation Methods
Passive devices data
Active devices data
Event data
Device real-time data
Event-driven device data
2 Data Acquisition
Data acquisition means acquiring data from IoT or M2M devices.
3 Data Validation
Data validation software do the validation checks on the acquired data.
4 Data Categorizations
Valid, useful and relevant data can be categorized into three categories for
storage.
1. Data which needs to be repeatedly processed
2. Data which needs processing only once
3. Online, real-time or streaming data
4. Big Data
Privacy
IoT privacy is the special considerations required to
protect the information of individuals from expose in the IoT
environment.
When data or messages communicate from the things (device
platforms), those are meant only for the applications or services
and for targeted goals only.
Vulnerabilities of IoT
An IoT security article describes that there are many
vulnerabilities, due to participation of the number of layers,
hardware sublayers and software in applications and services. The
nature of IoT also varies. For example, sensors, machines,
automobiles, wearables, and so on. Each faces different kind of
vulnerabilities and has complex security and privacy issues.
OWASP has identified top ten vulnerabilities in IoT applications/services as follows:
2 Authentications
Security FG contains five sets of functions which are
required for ensuring security and privacy. Large
number of devices, applications and services
3 Authorizations
communicate in IoT.