Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
67 views11 pages

EIOT UNIT 3 IoT Configurations and Basic Components

This document covers the fundamentals of IoT and Arduino programming, including IoT device configurations, basic components, and security measures. It discusses the integration of sensors and actuators with Arduino, as well as the importance of software updates, access control, and data management for IoT devices. Additionally, it highlights the role of gateways, cloud services, and user interfaces in the IoT ecosystem.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
67 views11 pages

EIOT UNIT 3 IoT Configurations and Basic Components

This document covers the fundamentals of IoT and Arduino programming, including IoT device configurations, basic components, and security measures. It discusses the integration of sensors and actuators with Arduino, as well as the importance of software updates, access control, and data management for IoT devices. Additionally, it highlights the role of gateways, cloud services, and user interfaces in the IoT ecosystem.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 11

UNIT III

IOT AND ARDUINO PROGRAMMING

IoT Configurations and Basic Components


Syllabus
UNIT III IOT AND ARDUINO
PROGRAMMING Introduction to the Concept
of IoT Devices – IoT Devices Versus Computers
– IoT Configurations – Basic Components –
Introduction to Arduino – Types of Arduino –
Arduino Toolchain – Arduino Programming
Structure – Sketches – Pins – Input/Output
From Pins Using Sketches – Introduction to
Arduino Shields – Integration of Sensors and
Actuators with Arduino.
IoT Configuration
Access Control
⚫ Ensure device access control restricts unauthorized or unauthenticated access.
⚫ Change default passwords to complex ones with 16 or more characters.
⚫ Access management interfaces over encrypted channels like HTTPS.
⚫ For Raspberry Pi devices, configure sudo to require a password and restrict SSH
access to specific users.
⚫ Use key-based authentication for SSH login.
⚫ Disable unnecessary services on printers to prevent unauthorized access.

Software Updates
⚫ Keep device software updated with the latest security patches and firmware.
⚫ Regularly apply patches to fix vulnerabilities and strengthen security measures.
Services, Network, Logging, and Redundancy
⚫ Disable all unused services to reduce attack surface.
⚫ UseConfigure printers to automatically delete data after printing and disable local
printer memory usage.
⚫ non-publicly-routable IP addresses for IoT devices whenever possible.
⚫ Restrict access to IoT device management services using firewalls or IP address
ranges.
⚫ Install and configure fail2ban and antivirus software on Raspberry Pi devices.
⚫ Enable logging of device access and configuration changes, and monitor logs for
unusual behavior.
⚫ Implement redundancy and backups for critical IoT devices and regularly back up
device configurations.
⚫ Stay informed about device security bulletins and configurations to maintain
security measures.
Basic Components
Internet of Things (IoT):
⚫ The Internet of Things (IoT) is the network of physical
objects/devices like vehicles, buildings, cars, and other
items embedded with electronics, software, sensors, and
network connectivity that enables these objects to collect
and exchange data. IoT devices have made human life
easier. The IoT devices like smart homes, smart cars have
made the life of humans very comfortable. IoT devices are
now being a part of our day-to-day life.
Computers:
⚫ A computer is a hardware device embedded
with software in it. The computer does most
of the work like calculations, gaming, web
browsers, word processors, e-mails, etc. The
main function of a computer is to compute
the functions, to run the programs. It takes
input from the computer and then
computes/processes it and generates the
output.
Basic Components of IoT
Smart Devices and Sensors - Device Connectivity
Devices and Sensors:
⚫ Components of the device connectivity layer.
⚫ Collect data from the environment and transmit it.
⚫ Common sensors include temperature, pressure, humidity, light intensity,
proximity, and RFID tags.
Device Connection:
⚫ Connected to low-power wireless networks like Wi-Fi, ZigBee, Bluetooth, etc.
⚫ Each wireless technology has its pros and cons in terms of power, data transfer
rate, and efficiency.
⚫ Developments in low-power wireless devices promise energy-efficient data
transmission for IoT networks.
Gateway:
⚫ Manages bidirectional data traffic between networks and protocols.
⚫ Translates different network protocols for interoperability.
⚫ Can perform pre-processing of collected data locally before transmission.
⚫ Offers security through encryption techniques to protect against malicious attacks
and unauthorized access.
Cloud:
⚫ Manages massive data from devices, applications, and users.
⚫ Provides tools for collecting, processing, managing, and storing data in real-time.
⚫ Uses distributed database management systems for efficient data processing.
Analytics:
⚫ Converts analog data from devices into useful insights for detailed analysis.
⚫ Provides real-time analytics to identify irregularities and prevent undesired
scenarios.
⚫ Helps predict trends in the market and plan future business opportunities.
User Interface:
⚫ Visible and tangible part of the IoT system accessible to users.
⚫ Well-designed interfaces encourage user interactions and ease complex tasks.
⚫ Modern technology offers interactive touch panel controls for smart home devices.
⚫ Multicolor touch panels replace hard switches for household appliances.

Real-Life Example of IoT:


⚫ AC with temperature sensor integrated with a gateway for connectivity.
⚫ Cloud infrastructure records device information and user interactions.
⚫ Web services like RESTful APIs facilitate communication with the cloud.
⚫ Users interact with the cloud through mobile apps for device control and
monitoring.
⚫ Cloud authenticates devices, retrieves data from sensors, and pushes it to user
apps for real-time monitoring

You might also like