Internet of Thing M4Eve

Download as pdf or txt
Download as pdf or txt
You are on page 1of 23

Internet of Things

(IoT)

Nazlıhan Altıgöz - 2018556501


Ahmet Keleş - 2019556042
Tuna Er - 2019556026
CONTE NTS
• What is Internet of Things ?
• Applications of Internet of Things
• Human-Related Information in IoT
• Legal Regulations on IoT
• E nabling Technologies
• Des ign and Development
• Data Generation
• Privacy
• References
What is Internet of Things ?

Internet of Things is physical objects equipped with


sensors and software that uses technologies such as RFID, Wi-Fi,
Bluetooth to interact. Thanks to IoT concept, devices interact with
both people and other devices, making life much easier both in
daily life and in different sectors, and contributes to efficiency by
saving time and cost.

Phones, smart watches, thermostats, lighting systems,


sound systems, irrigation systems, smart home devices, security
cameras are just a few of the things that make up the IoT.
History of Internet of Things
In the 1980s, the first devices with internet The term Internet of Things was first
connection appeared. coined in 1999 by computer scientist
Kevin Ashton, who suggested placing
In 1982, Carnegie Mellon University radio frequency identification (RFID)
students turned a cola vending machine into chips in products to track them.
an IoT device.

In 1990, the toaster was invented, which is In 2008, the number of interacting
considered the first IoT device. devices exceeded the number of people
on the planet.
In 1993, the world's first webcam prototype,
the Trojan Room Coffee Pot, was installed
at the University of Cambridge to monitor In particular, the IoT has recently become
the amount of coffee in the coffee machine. an important part of our lives with
developing technologies such as artificial
In the late 1990s and 2000s, IoT became intelligence-supported devices, and
popular, especially with the emergence of COVID-19 has contributed greatly to the
smartphones. widespread use of these technologies.
Applications of Internet of Things

Transportation
With a vehicle tracking system, an administrator can easily track
the location of the vehicle and the driver's unauthorized stops. In
addition, drivers can check the maintenance needs of the
equipment in the vehicle with their smart phones and take into
account the warnings and intervene in time.

Smart Homes Healthcare


Many objects in homes can be controlled with any IoT device. For Data obtained through sensors from the patient monitoring
example, people connect to an air conditioner that can adjust the system, which can detect body blood pressure, ECG signals, body
temperature of the house before returning home, they can turn on a temperature, body movements and the amount of glucose in the
robot vacuum cleaner to clean the house, adjust the lighting level blood, can be transferred to computers and smartphones using
in the house via any phone without using a traditional switch. RFID technology. In this way, regular monitoring of a patient's
health status has become easier.
Applications of Internet of Things

Agriculture Indus trial Control


The aim of the smart agriculture system is to automate agriculture Through the sensors in the production machines, the need for
with minimum human intervention. For example, remote control malfunctions and maintenance can be easily detected, thus
of soil moisture and automatic activation of the irrigation system greatly reducing the possibility of the production process being
positively affects agricultural productivity. endangered.

S ecurity S hopping
With the facial recognition system and motion sensors, people Through IoT, customer behavior can be examined and customer-
and their activities in an area can be detected. In this way, it specific campaigns can be created based on these behaviors with
becomes easier to detect unusual movements in high-security the data obtained. For the company, being able to instantly
areas where only authorized persons are allowed to enter. control low-selling goods, products that run out quickly, and
stock status in the warehouse is very useful in terms of time
saving and strategy determination.
Human-Related Information in IoT

In addition to the explicit interaction between humans


and devices, human originated information is often highly
valuable or even crucial in many IoT applications. Most obvious
examples include IoT applications monitoring humans. Practical
examples include self-monitoring applications, which are
typically related to health and wellbeing. Other examples include
applications for monitoring of other people, such as children and
elderly.
IoT in Turkis h Law
There are not any specific regulations or laws on IoT,
but some laws area can be expanded to include IoT regarding
matters.
• Firstly, law 5651 “Regulating Online Publications and
Addressing Crimes Committed Through These Publications on
the Internet Platform” makes sure to inspect and regulate the
publications for any criminal activities.
• Secondly, law 243 in Turkish Penal Code guarantees the
integrity of an informational system, since IoT systems are
also devices connected via internet they also considered as IS
and unauthorized access to these systems invoke this law. ,
• Finally, Constitution of the Republic of Turkey protect the
personal privacy in article 20 this also include IoT systems
since these types of systems can also collect and process vast
amount of personal data.
IoT in US Law
For the US still does not have strict federal legislation
on IoT. But IoT Cybersecurity Improvement Act of 2020 gives
the authority to NIST (National Institute of Standard and
Technology) in managing IoT cybersecurity of devices acquired
by the federal government.
Also, California can be a state level example for IoT
laws. California introduced “the California IoT Cybersecurity law
(2020), the California Consumer Privacy Act (2020) and the
California Privacy Right Act (2023)”.
IoT in E U Law
EU has implemented more comprehensive regulations
on IoT than both Turkey and the US.
• The first regulations that include IoT can be addressed as The
EU Cybersecurity Act (2019). This act is a cybersecurity
certification scheme for ICT (Information and Communication
Technology) products, services, and processes including IoT
devices.
• The NIS Directive 2 is a directive which advice EU members
to pass a law to boost overall cybersecurity measures.
• The General Data Protection Regulation (2018) can be
mentioned in IoT regulations since it ensures data integrity
and privacy.
Enabling Technologies

Enabling technologies for the Internet of Things considered in can be grouped into three categories:
i) Technologies that enable “things” to acquire contextual information.
ii) Technologies that enable “things” to process contextual information.
iii) Technologies to improve security and privacy.
E nabling Technologies

The first two categories can be jointly understood as functional building blocks required building
“intelligence” into “things”, which are indeed the features that differentiate the IoT from the usual Internet. The
third category is not a functional but rather a de facto requirement, without it the penetration of the IoT would be
severely reduced.
Addres s ability and Connection Wireles s S ens or Network

IoT systems use both wired and wireless Wireless sensor network (WSN) is a distributed
connection types. Some examples of these are devices with sensors which monitors
in short range wireless connection Bluetooth, environment and physical conditions. A WSN
Li-Fi, Wi-Fi, and Z-Wave in medium range consists of several end nodes, routers and a
LTE-Advanced and 5G and in long range coordinator. End nodes have sensors attached to
LPWAN and VSAT. For wired connections them and can also act as a router. Routers are
they mainly use Ethernet, but Power-Line responsible for routing the data packet from the
Communication (PLC) can also be seen in IoT end nodes to the coordinator. The coordinator
systems connections. node collect the data from all the notes and act
Transitioning to IPv6 from IPv4 is inevitable as a gateway that connects the WSN to the
due to IPv4's limited address space. IPv6 offers internet.
advantages like stateless address auto-
configuration and IRTF6 LoWPAN header
compression. Consequently, IoT's future looks
promising with advancements in connection
and addressability technologies.
B ig Data Analytics Communication Protocols

Big data is the analysis of extensive datasets IoT devices communicate with each other and
that are too large, fast-moving, or diverse to be with the central systems by communication
managed, processed, and analyzed through protocols. These protocols monitor the
traditional databases. These datasets are efficiency and security of the data transfer in
collected from various sources such as digital IoT networks. IoT communication protocols are
images and sensors. There are several steps to required for devices to connect and share data in
analyze big data: the IoT ecosystem. There are several popular
IoT communication protocols, each with unique
advantages and applications. Several important
• Data cleaning
IoT communication protocols are:
• Munging
 Message Queue Telemetry Transport
• Processing (MQTT)
• Visualization.  Hypertext Transfer Protocol (HTTP)
 Constrained Application Protocol (CoAP)
 Bluetooth
 Zigbee
 Bluetooth Low Energy (BLE)
 Wi-Fi
 Z-Wave
Cloud Computing Embedded Systems

Cloud Computing is a transformative An embedded system is a type of computer


computing paradigm that involves delivering setup with both hardware and software built-in
applications and services over the internet. to do specific jobs. Unlike regular computers
Cloud Computing involves provisioning of that can do many things, embedded systems are
computing networking and storage resources made for specifics tasks. They include parts like
on demand and providing these resources as microprocessors, memory, networking tools,
metered services to the users, in a “ pay as you input/output devices, displays, and storage.
go” model. Cloud computing resources can be Some of them even have special processors like
provisioned on demand by the user without graphic processors and digital signal processors
requiring interactions with the Cloud Service for specific tasks.
Provider. There are three main types of cloud
computing:

1) Infrastructure as a service(IAAS)
2) Platform as a service(PaaS)
3) Software as a service(SaaS)
Des ign and
Development
Purpose And Requirements
Define purpose and requirements of IoT system

Process Model Specification


Define the use cases

Domain Model Specification


Define physical entities, virtual entities, devices, resources and services in the IoT system

Information Model Specification


Define the structure of all the information in the IoT system

Service Specifications
Map process and information model to services and define service specifications

IoT Level Specification


Define the IoT level for the system

Functional View Specification


Map IoT Level to functional groups

Operational View Specification


Define communication options, service hosting options, storage options, device options

Device and Component Integration


Integrate devices, develop and integrate the components

Application Development
Develop Applications
Data Generation
1 Data Generation Methods
Passive devices data
Active devices data
Event data
Device real-time data
Event-driven device data
2 Data Acquisition
Data acquisition means acquiring data from IoT or M2M devices.
3 Data Validation
Data validation software do the validation checks on the acquired data.

4 Data Categorizations
Valid, useful and relevant data can be categorized into three categories for
storage.
1. Data which needs to be repeatedly processed
2. Data which needs processing only once
3. Online, real-time or streaming data
4. Big Data
Privacy
IoT privacy is the special considerations required to
protect the information of individuals from expose in the IoT
environment.
When data or messages communicate from the things (device
platforms), those are meant only for the applications or services
and for targeted goals only.

Vulnerabilities of IoT
An IoT security article describes that there are many
vulnerabilities, due to participation of the number of layers,
hardware sublayers and software in applications and services. The
nature of IoT also varies. For example, sensors, machines,
automobiles, wearables, and so on. Each faces different kind of
vulnerabilities and has complex security and privacy issues.
OWASP has identified top ten vulnerabilities in IoT applications/services as follows:

Insecure web interface Lack of transport encryption/integrity verification

Insufficient authentication or authorization Insecure mobile interface

Insecure network services Insufficient security configurability

Privacy concerns Insecure software or firmware

Insecure cloud interface Poor physical security


S ecurity Requirements

1 Identity management (IdM)

2 Authentications
Security FG contains five sets of functions which are
required for ensuring security and privacy. Large
number of devices, applications and services
3 Authorizations
communicate in IoT.

4 Key exchange and management

5 Trust and reputation


THANK YOU FOR YOUR TIME
AND ATTENTION
RE F E RE NCE S
• Hanes, D., Salgueiro, G., Grossetete, P., Barton, R., & Henry, J. (2017). IoT Fundamentals. Cisco Press. [1]
• Mulfari, D., Celesti, A., Fazio, M., & Villari, M. (2015). Human-computer interface based on IOT embedded
systems for users with disabilities. Lecture Notes of the Institute for Computer Sciences, Social Informatics and
Telecommunications Engineering, 376–383. https://doi.org/10.1007/978-3-319-19656-5_50 [2]
• Raj Kamal. (2017). Internet of things : architecture and design principles. Mc Graw Hill India. [3]
• Bahga, A., & Madisetti, V. (2015). Internet of things: A hand-on approach. Universities Press (India). [4]
• Ovidiu Vermesan, & Friess, P. (2022). Internet of Things Applications - From Research and Innovation to Market
Deployment. CRC Press. [5]
• Guptha, A. (2020). INTERNET OF THINGS & ITS APPLICATIONS. Autonomous Institution – UGC, Govt. of
India. [6]
• Kuyoro, S., Osisanwo, F., & Akinsowon, O. (2015). Internet of Things (IoT): An Overview. 3rd International
Conference on Advances in Engineering Sciences & Applied Mathematics (ICAESAM’2015). [7]
• Turunen, M., Sonntag, D., Engelbrecht, K.-P., Olsson, T., Schnelle-Walka, D., & Lucero, A. (1970, January 1).
Interaction and humans in internet of things. SpringerLink. https://link.springer.com/chapter/10.1007/978-3-319-
22723-8_80 [8]
• BOZKURT YÜKSEL, A. E. (2016). NESNELERİN İNTERNETİNİN HUKUKİ YÖNDEN İNCELENMESİ.
Dokuz Eylül Üniversitesi, İİBF, İşletme Bölümü, Ticaret Hukuku Anabilim Dalı. [9]
REFERENCES
• GfG. (2023, February 26). Challenges in internet of things (IOT). GeeksforGeeks.
https://www.geeksforgeeks.org/challenges-in-internet-of-things-iot/ [10]
• GfG. (2021, June 8). Internet of things (IOT) enabling technologies. GeeksforGeeks.
https://www.geeksforgeeks.org/internet-of-things-iot-enabling-technologies/ [11]
• Khan, S. (2023, August 16). IoT (Internet of Things) Enabling Technologies. IOT (internet of things) enabling
technologies. https://www.includehelp.com/iot/iot-internet-of-things-enabling-technologies.aspx [12]
• IOT cybersecurity: Regulating the internet of things. Thales Group. (n.d.).
https://www.thalesgroup.com/en/markets/digital-identity-and-security/iot/inspired/iot-regulations [13]
• Schmitz-Berndt, S. (2023). Defining the reporting threshold for a cybersecurity incident under the NIS directive
and the NIS 2 directive. Journal of Cybersecurity, 9(1). https://doi.org/10.1093/cybsec/tyad009 [14]

You might also like