Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
6 views61 pages

AIIoT Unit I 04 08 2024

The document provides an overview of the Internet of Things (IoT), detailing its components, architecture, and design principles. It emphasizes the importance of security, real-world testing, and effective data management in IoT systems. Additionally, it covers specific elements such as Arduino and Raspberry Pi, highlighting their functionalities and applications in IoT projects.

Uploaded by

hayan4225
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views61 pages

AIIoT Unit I 04 08 2024

The document provides an overview of the Internet of Things (IoT), detailing its components, architecture, and design principles. It emphasizes the importance of security, real-world testing, and effective data management in IoT systems. Additionally, it covers specific elements such as Arduino and Raspberry Pi, highlighting their functionalities and applications in IoT projects.

Uploaded by

hayan4225
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 61

AI in IoT

I M.Sc (AI)
2024 - 2026
Introduction
• IoT stands for Internet of Things.
• It refers to the interconnectedness of physical devices, such as appliances and vehicles,
that are embedded with software, sensors, and connectivity which enables these objects
to connect and exchange data.
• Main components used in IoT:
• Low-power embedded systems: Less battery consumption, high performance are the
inverse factors that play a significant role during the design of electronic systems.
• Sensors: It is a physical device that measures and detects certain physical quantities
and converts it into signal which can be provided as an input to processing or control
unit for analysis purpose.
• Control Units: It is a unit of small computer on a single integrated circuit containing
microprocessor or processing core, memory and programmable input/output
devices/peripherals.
• It is responsible for major processing work of IoT devices and all logical operations
are carried out here.
2
Introduction
• Cloud computing: Data collected through IoT devices is massive, and this data has to
be stored on a reliable storage server. This is where cloud computing comes into play.
• Availability of big data: IoT relies heavily on sensors, especially in real-time. These
electronic devices spread throughout every field, their usage is going to trigger a
massive flux of big data.
• Networking connection: In order to communicate, internet connectivity is a must,
where each physical object is represented by an IP address.
• However, there are only a limited number of addresses available according to the IP
naming.
• Therefore, researchers are looking for another alternative naming system to
represent each physical object.
• IPV6

3
Introduction
• Characteristics of IoT:
• Massively scalable and efficient
• IP-based addressing will no longer be suitable in the upcoming future.
• An abundance of physical objects is present that do not use IP, so IoT is made
possible.
• Devices typically consume less power. When not in use, they should be
automatically programmed to sleep.
• A device that is connected to another device right now may not be connected
in another instant of time.
• Intermittent connectivity – IoT devices aren’t always connected. In order to
save bandwidth and battery consumption, devices will be powered off
periodically when not in use.
4
Architectural Overview
• Internet of Things (IoT) technology has a wide variety of applications and use of
Internet of Things is growing so faster.
• Depending upon different application areas of Internet of Things, it works
accordingly as per it has been designed/developed.
• But it has not a standard defined architecture of working which is strictly followed
universally.
• Basic fundamental architecture :

5
Architecture – Cont..

6
Architecture – Cont..
• Sensing Layer
• The sensing layer is the first layer of the IoT architecture and is responsible for collecting
data from different sources.
• This layer includes sensors and actuators that are placed in the environment to gather
information about temperature, humidity, light, sound, and other physical parameters.
• Network Layer
• The network layer of an IoT architecture is responsible for providing communication and
connectivity between devices in the IoT system .
• Data processing Layer
• The data processing layer of IoT architecture refers to the software and hardware
components that are responsible for collecting, analyzing, and interpreting data from IoT
devices.
• Application Layer
• The application layer of IoT architecture is the topmost layer that interacts directly with the
end-user. 7
Design Principles
• Principle 1: Think of Security in advance
• Privacy and security issues are the key challenges of IoT products.
• Incorrect or insecure software may open a network to hacker attacks and data leakage.
• In addition, there is a need to establish proper security update processes as a part of IoT
update management to deploy security patches effectively and quickly.
• Principle 2: Test in real environment
• The IoT fleet interacts with an environment which makes it vulnerable to all kinds of
physical effects hits, rapid temperature drops, pests etc..
• So devices has to be tested in real environment where it is going to deployed.
• Principle 3 : Apply UX in device and application development
• UX aims to provide an positive experience and helps to meet user needs and requirements.
• UX based IoT design brings great value to the final user and the IoT system.
8
Design Principles – Cont..
• Principle 4: Provide autonomy of devices during connection loss
• The IoT is about connectivity. At times, the devices will disconnect from the network.
• The device should continue to work properly and transfer the collected information when
the connection is restored.
• Principle 5: Place gateways close to the maximum number of devices
• The location of gateway should be as close to the IoT fleet as possible.
• Its necessary to provide lower latency in their communication.
• Principle 6: The system should be easily scalable
• The growth of IoT depends on its opportunities to scale efficiently and stay robust when the
volume of data and number of devices increases.
• Principle 7: Build trust in your system
• Since IoT deals with sensitive information trust should be ensured to acquire more users.
9
Design Principles – Cont..
• Principle 8: Deploy only working products
• Once connected devices are deployed, their replacement with newer version will be
almost an impossible task to accomplish due to cost constraint.
• Its good to avoid untested hardware iterations and deploy only working products
• Principle 9: Data management and analysis should be effective
• IoT system generates enormous volume of information.
• The data will be useless if not transformed to valuable insights.
• So, effective data management and analysis is required.

10
Elements of IoT
• Arduino :
• Arduino is an open-source platform used for building electronics projects.
• Arduino consists of both a physical programmable circuit board (often referred to as a
microcontroller) and a piece of software, or IDE (Integrated Development Environment) that
runs on the computer, used to write and upload computer code to the physical board.
• Unlike most previous programmable circuit boards, the Arduino does not need a separate
piece of hardware (called a programmer) in order to load new code onto the board -- you
can simply use a USB cable.

11
Arduino

• Arduino IDE uses a simplified version of C++, making it easier to learn to program.
• Arduino can interact with buttons, LEDs, motors, speakers, GPS units, cameras, the
internet, smart-phone or on TV.
• There are variety of Arduino boards used for different purpose.
• Majority of the components are same

• 1. Power USB

• The Arduino UNO can be powered from a USB


cable coming from the computer or a wall power
supply that is terminated in a barrel jack .

• 2. Barrel Jack 12
Arduino
• Pins (5V, 3.3V, GND, Analog, Digital, PWM, AREF):
• The pins on your Arduino are the places to connect wires to construct a circuit in conjunction
with a breadboard and some wire.
• They usually have black plastic ‘headers’ that allow you to just plug a wire right into the
board.
• The Arduino has several different kinds of pins, each of which is labeled on the board and
used for different functions.
• GND (3): Short for ‘Ground’.
• 5V (4) : 5V pin supplies 5 volts of power,
• 3.3V (5) pin supplies 3.3 volts of power.
• Analog (6): The area of pins under the ‘Analog In’ label (A0 to A5)
is Analog In pins. These pins can read the signal from an
analog sensor (like a temperature sensor) and convert
it into a digital value where user can read. 13
Arduino
• Digital (7): Across from the analog pins are the digital pins (0 through 13 on the UNO).
• These pins can be used for both digital input (like telling if a button is pushed) and digital
output (like powering an LED).
• PWM (8): You may have noticed the tilde (~) next to some of the digital pins (3, 5, 6, 9, 10,
and 11 on the UNO).
• These pins act as normal digital pins, but can also be used for something called Pulse-Width
Modulation (PWM).
• These pins as being able to simulate analog output (like fading an LED in and out).
• AREF (9): Stands for Analog Reference.
• Most of the time you can leave this pin alone.
• It is sometimes used to set an external reference voltage (between 0 and 5 Volts) as the
upper limit for the analog input pins.

14
Arduino Uno
• Reset Button: Arduino has a reset button (10). Pushing it will temporarily connect the reset
pin to ground and restart any code that is loaded on the Arduino.
• Power LED Indicator : Tiny LED next to the word ‘ON’ (11). This LED should light up whenever
you plug your Arduino into a power source. If this light doesn’t turn on, there’s a good
chance something is wrong.
• TX RX LEDs: TX is short for transmit, RX is short for receive.
• These markings appear quite a bit in electronics to indicate the pins responsible for serial
communication.
• Arduino UNO where TX and RX appear -- once by digital pins 0 and 1, and a second time next
to the TX and RX indicator LEDs (12).
• These LEDs will give us visual indications whenever our Arduino is receiving or transmitting
data.
• Main IC: The black thing with all the metal legs is an IC, or Integrated Circuit (13). Think of it
as the brains of our Arduino.
15
Arduino Uno
• Voltage Regulator: The voltage regulator (14) is not actually something you
can (or should) interact with on the Arduino.
• The voltage regulator does exactly what it says -- it controls the amount of
voltage that is let into the Arduino board.
• It will turn away an extra voltage that might harm the circuit.
• It has its limits, so don’t hook up your Arduino to anything greater than 20
volts.

16
Raspberry pi
• The Raspberry pi is a single computer board with credit card size, that can be
used for many tasks like playing games, word processing, spreadsheets and also
to play HD video.
• It was established by the Raspberry pi foundation from the UK. It has been ready
for public consumption since 2012.
• The main purpose of designing the raspberry pi board is, to encourage learning,
experimentation and innovation for school level students.
• The raspberry pi board comprises a program memory (RAM), processor and
graphics chip, CPU, GPU, Ethernet port, GPIO pins, Xbee socket, UART, power
source connector and various interfaces for other external devices.

17
Raspberry pi
• Raspberry pi

18
Raspberry pi
• Memory: The raspberry pi model Aboard is designed with 256MB of SDRAM and model B
is designed with 51MB.
• Raspberry pi is a small size PC compare with other PCs.
• The normal PCs RAM memory is available in gigabytes. But in raspberry pi board, the RAM
memory is available more than 256MB or 512MB
• CPU (Central Processing Unit): The Central processing unit is the brain of the raspberry pi
board and that is responsible for carrying out the instructions of the computer through
logical and mathematical operations.
• The raspberry pi uses ARM11 series processor.
• GPU (Graphics Processing Unit): The GPU is a specialized chip in the raspberry pi board
and that is designed to speed up the operation of image calculations.
• This board designed with a Broadcom video core IV and it supports OpenGL (OpenGL
(Open Graphics Library) is a cross-language, multi-platform application programming
interface (API) for rendering 2D and 3D vector graphics)
19
Raspberry pi
• Ethernet Port: The Ethernet port of the raspberry pi is the main gateway for communicating
with additional devices.
• The raspberry pi Ethernet port is used to plug your home router to access the internet.
• GPIO Pins: The general purpose input & output pins are used in the raspberry pi to associate
with the other electronic boards.
• These pins can accept input & output commands based on programming raspberry pi.
• The raspberry pi affords digital GPIO pins.
• These pins are used to connect other electronic components.
• For example, you can connect it to the temperature sensor to transmit digital data.
• XBee Socket: The XBee socket is used in raspberry pi board for the wireless communication
purpose.
• Power Source Connector: The power source cable is a small switch, which is placed on side of
the shield. The main purpose of the power source connector is to enable an external power
source.
20
Raspberry pi
• UART: The Universal Asynchronous Receiver/ Transmitter is a serial input & output port.
That can be used to transfer the serial data in the form of text and it is useful for converting
the debugging code.
• Display: The connection options of the raspberry pi board are two types such as HDMI and
Composite.

21
Raspberry pi
• Essential hardware specifications of raspberry pi board mainly include SD card
containing Linux OS, US keyboard, monitor, power supply and video cable.
• Optional hardware specifications include USB mouse, powered USB hub, case, internet
connection, the Model A or B: USB WiFi adaptor is used and internet connection to
Model B is LAN cable.

22
NodeMCU

23
Sensors & Actuators
• Transducer - Any device that converts one form of energy to another.
• MICROPHONE is a transducer which converts variations of sound
pressure into variations of electrical current.
• Sensors – Device that measures physical quantities and convert them
into signals which can be read by instruments.
• Ultrasonic sensor
• An ultrasonic sensor is an instrument that measures
the distance to an object using ultrasonic sound waves
• Actuators – Device that actuates or moves something.
• They convert energy into motion or mechanical energy.
• Motor

24
Sensors
• A sensor is a device that detects and responds to some type of input from the physical
environment. The input can be light, heat, motion, moisture, pressure or any number of
other environmental phenomena.
• Classification :
• Active and Passive Sensor
• Analog & Digital
• Scalar & Vector
• A passive sensor is one which just ‘listens’ to what is happening. Examples include:
• A light sensor which detects if a light is shining on it
• An infra-red sensor which detects the temperature of an object
• An active sensor is one which transmits a signal into the environment and then measures
the response that comes back.
• One example is an ultrasonic system:

25
Sensors
• Ultrasonic system :
• A pulse of ultrasound is emitted.
• If an object is in the way, the pulse is reflected back.
• The sensor detects it.
• The time taken between emission and detection gives an indication of the distance of the
object.
• Analog Sensor – The response or output of the sensor is some continuous function of
its input parameter.
• Ex- Temperature sensor, analog pressure sensor and analog hall effect
• Pressure Sensor - if the sensor is designed to measure pressures from 0 to 100 psi (pounds
per square inch) and has an output range of 0-5V, the analog output changes continuously as
the pressure changes, then a pressure of 50 psi would correspond to an output of 2.5V.
• There are two common types of analog outputs: voltage and current.
26
Sensor
• Digital sensor – Response in binary nature.
• Along with the analog sensor, it also comprises extra electronics for bit conversion.
• Example – Passive infrared (PIR) sensor and digital temperature sensor(DS1620).
• Scaler sensors only use the input parameter’s magnitude to detect it.
• Ex: Temperature sensor, Pressure sensor, Light sensor
• Vector sensor measures the magnitude of the direction and orientation of the input
parameter determines the sensor’s response.
• Ex : Accelerometer, Magnetic field sensor, Gyroscope
• Types : Temperature Sensors: They measure how much heat is produced by an
area or an object.
• Proximity Sensors: They find the presence or absence of objects nearby without
physical contact.
• Infrared Sensors: Such sensors can either detect or emit infrared radiation.
27
Hence, they are useful for sensing changes in the surrounding area.
Sensor
• Pressure Sensors: They spot any change in a gas or liquid. Additionally, pressure sensors raise an alarm when
the pressure range exceeds a defined threshold.
• Smoke Sensors: Smoke detectors are very common in everyday use. Also, they have long protected our
homes and places of business.
• Motion Sensors: These sensors monitor physical movement in an area.
• Gyroscope Sensors: A gyroscope sensor calculates the rotational speed around an axis measuring the angular
rate or velocity.
• Image Sensors: They turn optical pictures into signals. Additionally, they are useful for electronic file storage
or display.
• Humidity sensors: These sensors calculate the air’s water vapor content.
• Accelerometer Sensors: They can identify an object’s orientation and the rate of change like tapping. They can
also sense shaking, and positioning.
• Level Sensors: They measure the presence of a variety of substances, such as liquids, powders, and grains.
• Optical Sensors: These sensors take light measurements and turn them into electrical impulses.
• Water Quality Sensors: As the name suggests, these sensors monitor the quality of water.
• Chemical and Gas Sensors: They track the quality of air to identify any toxic or hazardous gas.

28
Actuator
• An actuator is a device that converts energy into motion. It does this by taking an electrical signal
and combining it with an energy source.
• In an IoT system, the actuator can act on data collected by sensors to create an outcome as
determined by the chosen settings of the user.
• Sensors in the device sense the environment, then control signals are generated for the actuators
according to the actions needed to perform.
• A servo motor is an example of an actuator.
• They are linear or rotatory actuators, can move to a given specified angular or linear position.
• We can use servo motors for IoT applications and make the motor rotate to 90 degrees, 180
degrees, etc., as per our need.

• The control system acts upon an environment through the actuator.


• It requires a source of energy and a control signal. When it receives a control signal, it converts29 the
source of energy to a mechanical operation.
Actuator
• Types of Actuator :
• A hydraulic actuator uses hydraulic power to perform a mechanical operation.
• They are actuated by a cylinder or fluid motor.
• The mechanical motion is converted to rotary, linear, or oscillatory motion, according to the
need of the IoT device.
• Ex- construction equipment uses hydraulic actuators because hydraulic actuators can
generate a large amount of force. (Pressurized water/fluid)
• Pneumatic Actuator uses energy formed by vacuum or compressed air at high pressure to
convert into either linear or rotary motion.
• Example- Used in robotics, use sensors that work like human fingers by using compressed air
• Electric actuator uses electrical energy, is usually actuated by a motor that converts electrical
energy into mechanical torque.
• An example of an electric actuator is a solenoid based electric bell.

30
Actuator
• A thermal actuator is a type of non-electric motor.
• It’s equipped with thermal-sensitive material that’s capable of producing linear motion in
response to temperature changes.
• When used alongside other devices, a thermal actuator doesn’t require an outside power
source to produce motion.
• Thermal actuators can be used for many applications and in many industries, including
aerospace, automotive, agriculture, solar, construction, and manufacturing.
• A magnetic actuator is a device that uses microelectromechanical systems (MEMS) to convert
an electric current into a mechanical output.
• Magnetic actuators are used within the aerospace, automotive industry, health care,
computers, and many other industries.
• MEMS is the technology of microscopic devices incorporating both electronic and moving
parts. MEMS are made up of components between 1 and 100 micrometers in size.

31
Sensing & Actuation
• Sensing is a technology that uses sensors to acquire information by detecting the physical,
chemical, or biological property quantities and convert them into readable signal.

• Actuation take electrical signals from control modules and turn them into physical outputs.
They can perform a wide range of functions, from turning rotors and valves

32
IoT Applications
• IoT is currently found in different popular domains:
• Wearables
• Smart Home Applications
• Smart Buildings / Smart Infrastructure
• Health Care
• Smart Cities
• Agriculture
• Industrial Automation
• Earthquake detection

33
Networking Basics
• Networking refers to linking of computers or communication network devices which are
connected via internet or intranet .
• Each device(host) are separated by unique device identifier like IP address or MAC address.
• The host may be connected by single path or multi path for sending and receiving data.
• The data transferred between the host may be text, images, or videos.
• Network Connection types:

34
Networking Basics
• The physical manner in which the communication path between the host are connected,
computer networks have various topologies.

35
Networking Basics
• Network Types PAN

36
Networking Basics
• The interconnection between hosts in any network is built upon the premises of various tasks
specific layers.
• Network Access and Physical Layer IoT Technologies:
• IoT network technologies to be aware of toward the bottom of the
protocol stack include cellular, Wifi, and Ethernet, as well as more
specialized solutions such as LPWAN, Bluetooth Low Energy (BLE),
ZigBee, NFC, and RFID.
• LPWAN
• (Low Power Wide Area Network) is a category of technologies designed for low-power, long-
range wireless communication.
• They are ideal for large-scale deployments of low-power IoT devices such as wireless sensors.
• LPWAN technologies include LoRa (LongRange physical layer protocol), Haystack, SigFox,
LTE-M, and NB-IoT (Narrow-Band IoT).
37
Cont..
• Cellular : The LPWAN NB-IoT and LTE-M standards address low-power, low-cost IoT
communication options using existing cellular networks.
• NB-IoT is the newest of these standards and is focused on long-range communication
between large numbers of primarily indoor devices.
• LTE-M and NB-IoT were developed specifically for IoT, however existing cellular technologies
are also frequently adopted for long-range wireless communication.
• BLE (Bluetooth Low Energy)
• BLE is a low-power version of the popular Bluetooth 2.4 GHz wireless communication
protocol. It is designed for short-range (no more than 100 meters) communication, typically in
a star configuration, with a single primary device that controls several secondary devices.
• Bluetooth operates across both layers 1 (PHY) and 2 (MAC) of the OSI model.
• BLE is best suited to devices that transmit low volumes of data in bursts.
• Devices are designed to sleep and save power when they are not transmitting data.
• Personal IoT devices such as wearable health and fitness trackers, often use BLE .
38
Cont..
• ZigBee: ZigBee operates on 2.4GHz wireless communication spectrum.
• It has a longer range than BLE by up to 100 meters.
• It also has a slightly lower data rate (250 kbps maximum compared to 270 kbps for BLE) than
BLE.
• ZigBee is a mesh network protocol. Unlike BLE, not all devices can sleep between bursts.
• Much depends on their position in the mesh and whether they need to act as routers or
controllers within the mesh.
• ZigBee was designed for building and home automation applications.
• Another closely related technology to ZigBee is Z-Wave, which is also based on IEEE 802.15.4.
• Z-Wave was designed for home automation.
• It has been proprietary technology, but was recently released as a public domain specification

39
Cont..
• NFC : The near field communication (NFC) protocol is used for very small range
communication (up to 4 cm), such as holding an NFC card or tag next to a reader.
• NFC is often used for payment systems, but also useful for check-in systems and smart labels
in asset tracking.
• RFID RFID stands for Radio Frequency Identification. RFID tags store identifiers and data.
• The tags are attached to devices and read by an RFID reader.
• The typical range of RFID is less than a meter.
• RFID tags can be active, passive, or assisted passive.
• Passive tags are ideal for devices without batteries, as the ID is passively read by the reader.
• Active tags periodically broadcast their ID, while assisted passive tags become active when
RFID reader is present.
• Dash7 is a communication protocol that uses active RFID that is designed to be used within
Industrial IoT applications for secure long-range communication.
• Similar to NFC, a typical use case for RFID is tracking inventory items within retail and
industrial IoT applications. 40
Cont..
• Wifi Wifi is standard wireless networking based on IEEE 802.11a/b/g/n specifications.
• 802.11n offers the highest data throughput, but at the cost of high-power consumption, so
IoT devices might only use 802.11b or g for power conservation reasons.
• Although wifi is adopted within many prototype and current generation IoT devices, as
longer-range and lower-power solutions become more widely available, it is likely that wifi
will be superseded by lower-power alternatives.
• Ethernet Widely deployed for wired connectivity within local area networks, Ethernet
implements the IEEE 802.3 standard.
• Not all IoT devices need to be stationery wireless .
• For example, sensor units installed within a building automation system can use wired
networking technologies like Ethernet.
• Power line communication (PLC), an alternative hard-wired solution, uses existing electrical
wiring instead of dedicated network cables.

41
Cont..
• INTERNET LAYER IOT NETWORK TECHNOLOGIES
• Internet layer technologies (OSI Layer 3) identify and route packets of data. Technologies
commonly adopted for IoT are related to this layer, and include IPv6, 6LoWPAN, and RPL .
• IPv6 At the Internet layer, devices are identified by IP addresses.
• IPv6 is typically used for IoT applications over legacy IPv4 addressing.
• IPv4 is limited to 32-bit addresses, which only provide around 4.3 billion addresses in total,
which is less than the current number of IoT devices that are connected.
• while IPv6 uses 128 bits, and so provides 2 128 addresses (around 3.4 × 10 38 or 340 billion
billion billion billion) addresses.
• In practice, not all IoT devices need public addresses.
• Of the tens of billions of devices expected to connect via the IoT over the next few years,
many will be deployed in private networks that use private address ranges and only
communicate out to other devices or services on external networks by using gateways.

42
Cont..
• 6LoWPAN The IPv6 Low Power Wireless Personal Area Network (6LoWPAN) standard
allows IPv6 to be used over 802.15.4 wireless networks.
• 6LoWPAN is often used for wireless sensor networks, and the Thread protocol for home
automation devices also runs over 6LoWPAN.
• RPL The Internet Layer also covers routing.
• IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) is designed for routing
IPv6 traffic over low-power networks like those networks implemented over 6LoWPAN.
• RPL (pronounced “ripple”) is designed for routing packets within constrained networks
such as wireless sensor networks, where not all devices are reachable at all times and
there are high or unpredictable amounts of packet loss.
• RPL can compute the optimal path by building up a graph of the nodes in the network
based on dynamic metrics and constraints like minimizing energy consumption or
latency.

43
Cont..
• APPLICATION LAYER IOT NETWORK TECHNOLOGIES
• HTTP and HTTPS are ubiquitous across internet applications, which is true also within IoT, with
RESTful HTTP and HTTPS interfaces widely deployed.
• CoAP (Constrained Application Protocol) is like a lightweight HTTP that is often used in
combination with 6LoWPAN over UDP.
• Messaging protocols like MQTT, AMQP, and XMPP are also frequently used within IoT
applications:
• MQTT Message Queue Telemetry Transport (MQTT) is a publish/subscribe-based messaging
protocol that was designed for use in low bandwidth situations, particularly for sensors and
mobile devices on unreliable networks.
• AMQP Advanced Message Queuing Protocol (AMQP) is an open standard messaging protocol
that is used for message-oriented middleware.
• XMPP The Extensible Messaging and Presence Protocol (XMPP) was originally designed for
real-time human-to-human communication including instant messaging.
• This protocol has been adapted for machine-to-machine (M2M) communication to implement
lightweight middleware and for routing XML data. XMPP is primarily used with 44smart
Cont..
• The choice of technologies at this layer will depend on the specific application
requirements of the IoT project.
• For example, for a budget home automation system that involves several sensors.
• MQTT would be a good choice as it is great for implementing messaging on devices
without much storage or processing power because the protocol is simple and lightweight
to implement.
• They are built to achieve a particularly good efficiency level. They are very small in size
operating system, need little power
• These systems can't at all be upgraded or updated. Thus, they must be really high on
efficiency and reliability as they can't be updated.

45
Embedded OS
• An embedded operating system is a specialized operating system (OS) designed
to perform a specific task for a device that is not a computer.
• All Embedded Systems are task specific. They mostly do a particular task on
loop/repeatedly for their entire lifetime.
• These systems are designed to execute their task within a particular time interval, and
thus they have to be fast enough to be up to their time limit.
• They have little or no user interface like a fully automatic washing machine does its
task fully once its programmed is set and stops after its work is finished with almost no
user interface.

46
Cont..
• Some examples of devices with embedded OSes include the following:
• ATMs
• cellphones
• electric vehicles
• industrial control systems (ICS)
• Arduino-based devices
• Advantages
• Portable
• Much faster than other operating systems
• Less Hardware requirement
• Highly Predictable

47
Cont..

• Disadvantages
• Less optimization
• High modification is required
• Customization is time taking process

48
IoT and Cloud
• The Internet of Things (IoT) is a vast network of interconnected devices. These devices
have particular parts (called sensors) and software that help them collect and share
information.
• Cloud computing is a way to use computer services, like storing information or running
programs, over the internet without using our machines or equipment. It makes it easy
for people to access data from anywhere in the world.
• IoT and Cloud Computing are closely linked technologies, with cloud-based IoT data
storage and management and cloud computing playing a pivotal role in enabling IoT.
• IoT Data Storage and Management in the Cloud
• The massive amount of data generated daily by IoT devices like smart thermostats and
fitness bands can be stored and managed in the cloud.
• This takes advantage of the cloud's scalability, flexibility, and low cost.
• With AI-driven analytics tools, valuable insights can be extracted from this raw data, all in
the cloud.
• For example, IoT devices sending data to the cloud can monitor and study a city's49traffic
patterns. It helps city planners find ways to reduce traffic congestion and improve city life .
Cont..
• Cloud Computing as an IoT Enabler
• Cloud computing helps IoT by providing storage and computing power for IoT applications.
• Companies can store their data on remote servers, accessed anytime and anywhere.
• It makes it easier for devices to stay connected and ensure real-time data exchange.
• Developers can also create custom IoT solutions using cloud services without needing lots of
hardware or programming knowledge.
• Cloud service providers like AWS and Azure offer managed services for working with
databases or machine learning tools.

50
Cont..
• Benefits of Merging IoT and Cloud Technology :
• Scalability and Flexibility for IT Infrastructure Businesses today generate massive
amounts of data through IoT devices, requiring a reliable and robust system to
manage this data effectively without causing downtime or delays.
• Businesses can quickly scale resources up or down using cloud solutions based
on their needs.
• Cloud computing also offers more flexibility, allowing access to data and
applications from anywhere.
• Cost-Effectiveness : Merging IoT and cloud computing can help businesses save
money. By using cloud-based solutions, companies can significantly reduce
infrastructure costs while ensuring access to scalable data storage and analytics
capabilities.
• It means lower initial investment costs and higher operational efficiency through
automated workflows.
• IoT sensors collect large amounts of data from multiple locations.
• This data is processed on central cloud platforms for analysis. Organisations can track various
metrics, like energy consumption levels and temperature control systems' performance. They51 don't
need to install local hardware, leading to cost-saving benefits.
Cont.
• Better Data Security - Combining IoT and cloud technologies can strengthen data security,
which is crucial in today's digital world.
• Companies must protect their valuable data from unauthorised access or hacking attempts.
• Encryption protocols like Transport Layer Security (TLS) can secure sensitive data transmitted
between devices over the network.
• Additionally, implementing role-based access control policies and multi-factor authentication
mechanisms can reduce risks related to privileged access misuse or insider threats.
• Improved Performance and Reliability
• Merging IoT and cloud computing can significantly enhance performance and reliability for
businesses.
• This combination allows faster access to real-time data, which can be swiftly analysed, providing
actionable insights for better decision-making.
• For instance, a logistics company can use IoT sensors to track goods in transit.
• IoT devices need fast and reliable connectivity to transmit accurate data without interruption.
• Cloud computing provides scalable storage capacity and high-speed access to this information,
52
making data available when needed.
Cont..

• Challenges in Combining IoT and Cloud Technology


• Data Privacy Concerns - Integrating IoT and cloud computing raises data privacy concerns.
• Transferring sensitive information from IoT devices to the cloud increases the risk of
unauthorized access and data breaches.
• Privacy breaches can happen when data is transmitted from sensors or devices, leading to
unclear data handling.
• Cloud storage of IoT data needs proper security measures to prevent hacks or unauthorised
access.
• Third-party data centres add more risks, primarily if they don't provide sufficient
protection.
• Network Latency Issues - Network latency, or delays in data transmission between devices,
is a significant challenge in combining IoT and cloud computing.
• As more IoT devices connect to the internet and transmit data, latency issues may arise.

53
Cont..
• Interoperability Problems
• A key challenge in merging IoT and cloud computing is
interoperability.
• The issue arises due to differences in communication protocols,
data formats, and security standards between the two
technologies.

54
• https://www.slideshare.net/slideshow/sensorsandactuatorsworking-p
rinciple-and-types-of-sensors/266741964
• https://slideplayer.com/slide/5676368/
• https://www.theiotacademy.co/blog/sensor/#:~:text=Scalar%20%26%
20vector,parameter%20determines%20the%20sensor's%20response
.
• https://www.slideshare.net/slideshow/module-1introduction-to-iot-b
asics-of-networking-emergence-of-iotpptx/266294739
• https://www.cloudpanel.io/blog/iot-and-cloud-computing/

55
Security aspects of IoT
• IoT security is an umbrella term that covers the strategies, tools,
processes, systems, and methods used to protect all aspects of
the internet of things.
• Included in IoT security is the protection of the physical
components, applications, data, and network connections to
ensure the availability, integrity, and confidentiality of IoT
ecosystems.
• Robust IoT security includes all facets of protection, including
hardening components, monitoring, keeping firmware updated,
access management, threat response, and remediation of
vulnerabilities.
• IoT security is critical as these systems are sprawling and
vulnerable, making them a highly-targeted attack vector.
• Securing IoT devices from unauthorized access ensures that they
56
Cont..
• IoT security vulnerabilities are found in everything from vehicles and smart grids to
watches and smart home devices.
• For example, researchers found webcams that could be easily hacked to gain access to
networks and smartwatches containing security vulnerabilities that allowed hackers to
track the wearer’s location and eavesdrop on conversations.
• Firmware is a type of software, but with specific characteristics. While firmware and
software provide instructions for devices, firmware is designed for a specific piece of
hardware and is embedded within it. Software, on the other hand, is more versatile
and can be used across various devices.
• Patches are software and operating system (OS) updates that address security
vulnerabilities within a program or product.
• APIs are mechanisms that enable two software components to communicate with
each other using a set of definitions and protocols. For example, the weather bureau's
software system contains daily weather data. The weather app on your phone “talks”
to this system via APIs and shows you daily weather updates on your phone.
57
IoT Security Challenges
• Lack of visibility - Users often deploy IoT devices without the knowledge of IT
departments, which makes it impossible to have an accurate inventory of what needs to
be protected and monitored.
• Limited security integration - Because of the variety and scale of IoT devices,
integrating them into security systems ranges from challenging to impossible.
• Open-source code vulnerabilities - Firmware developed for IoT devices often includes
open-source software, which is prone to bugs and vulnerabilities.
• Overwhelming data volume - The amount of data generated by IoT devices make data
oversight, management, and protection difficult.
• Poor testing - Because most IoT developers do not prioritize security, they fail to
perform effective vulnerability testing to identify weaknesses in IoT systems.
• Unpatched vulnerabilities - Many IoT devices have unpatched vulnerabilities for many
reasons, including patches not being available and difficulties accessing and installing
patches.
58
Cont..
• Vulnerable APIs - APIs are often used as entry points to command-and-control centers from
which attacks are launched, such as SQL injection, distributed denial of service (DDoS), man-
in-the-middle (MITM), and breaching networks.
• Weak passwords - IoT devices are commonly shipped with default passwords that many
users fail to change, giving cyber criminals easy access. In other cases, users create weak
passwords that can be guessed.
• Addressing IoT Security Challenges
• A holistic approach is required to implement and manage IoT security effectively. It must
encompass a variety of tactics and tools as well as take into consideration adjacent systems,
such as networks.
• Three key capabilities for a robust IoT security solution are the ability to:
1.Learn
Take advantage of security solutions that provide network visibility to learn what the
ecosystem encompasses at what the risk profiles are for each group of IoT devices.

59
Cont..
2. Protect
Monitor, inspect, and enforce IoT security policies with activities at
different points in the infrastructure
3. Segment
In the same way that networks are segmented, use segmentation based
on policy groups and risk profiles to segment IoT systems.
• Specific features required for securing IoT devices include the following:
• API security
• Broader and deep IoT device inventory
• Continuous software updates
• DNS filtering
• Education and training staff, vendors, and partners
• Encryption for data at rest and in transit
60
Cont..
• Honeypot decoy programs - A honeypot is a decoy system that is designed to mimic a real
system, application, or network. Honeypots are used to gather intelligence about the presence
of attackers, while decoys are used to divert attackers away from real systems or applications
and gather information also about the purpose of the attack.
• Multi-factor authentication
• Network security
• Network traffic monitoring analysis
• Password management
• Patch management
• Security gateways
• Unauthorized IoT device scans

• Reference
• https://www.balbix.com/insights/addressing-iot-security-challenges/#:~:text=Robust%20IoT%
20security%20includes%20all,response%2C%20and%20remediation%20of%20vulnerabilities 61

You might also like