3. Internet of Things
The was coined in 1999 by Kevin Ashton, a British technologist,
It refers to a network of physical objects /things—embedded with
sensors, processing ability, software, and other technologies that
enable them to connect and exchange data with other devices and
systems over the Internet or other communication networks.
These "things" can include everyday household items, industrial
machines, vehicles, wearable devices, and more.
a rapidly growing field that connects various devices and systems to
enable seamless communication and data exchange.
4. Characteristics of IoT:
1. Connectivity
It is the ability to communicate with and share information
between two or more devices. IoT devices /things of IoT should be
connected with each other and to the IoT infrastructure to share
and access data.
2. Identity of Things
Device Identity is the unique characteristic of a device that makes
an IoT device unique and identifiable. An IP address of a device is
a unique identifier (UID) that represents a device in a network.
5. 3. Dynamic or Self-Adapting/Self Configuring
IoT system is self-adaptive to understand the modifications
/changes/upgrades happening around it and respond accordingly. IoT
devices should dynamically adapt themselves to the changing context
& scenarios. e.g. surveillance camera
4. Scalability
IoT systems are capable of handling massive expansion with the ability
to grow without affecting their performance.
6. 5. Intelligence
IoT systems are intelligent because they often incorporate AI and
machine learning to analyze data, processing/computing capabilities ,
predict trends, and optimize operation.
6. Heterogeneity
Heterogeneity in IoT makes possible for a number of devices having
different architectures , different processing powers, different
technologies to interact with each other, without any compatibility
issues among the devices.
7. 7. Interoperability
It refers to the ability of different IoT devices and systems to
communicate and exchange data with each other, regardless of the
underlying technology or manufacturer. It enables different devices and
systems to work together seamlessly , common standards and
protocols facilitate the communication.
8. Security and Privacy
IoT is trending and the use of connected devices
through communication protocols in IoT has made security and privacy
our top priorities. Most of these devices contain confidential
information and, therefore, attractive targets for cybercriminals.
8. 9. Communication
In IoT , devices are increasing in number day by day, becoming more
interconnected. Hence, they must communicate to work more
efficiently and smoothly, these devices are connected to the internet
through cloud services.
10. Autonomous operation
It refers to the ability of IoT devices and systems to operate
independently , make decisions and take actions accordingly without
human intervention.
9. 11. Data analysis
The data gathered from IoT devices are analyzed for future prediction.
IoT devices can analyze data to identify patterns, offer
recommendations, and identify potential issues .
12. Security
With a large number of things added to IoT, the vulnerabilities of data
breach and various security issues are bound to arise. An attack in a
single IoT device means breaching the security of a big network. IoT
devices are usually resource constrained and don’t possess the
compute power necessary to implement strong security features.
10. IIOT- refers to the use of Internet of Things technology (connected
machines, devices, and sensors) in industrial applications to enhance
efficiency, productivity and safety.
Industry 4.0—also called the Fourth Industrial Revolution or 4IR—is the
next phase in the digitization of the manufacturing sector. It represents
the transformation of manufacturing and industrial processes through
smart and connected technologies.
11. Advantages of IoT
• Improved Quality of Life: IoT applications increased comfort, safety, and
convenience with automation, remote monitoring and better resource
management.
• Automation and increased efficiency- IoT enables automation, reducing
human intervention and increased efficiency.
• Improved Decision-Making- IoT devices collect and analyze real-time data,
leading to informed decision-making.
12. • Enhanced Security and Monitoring- Smart surveillance systems, IoT-
enabled alarms, asset tracking and remote monitoring improve
security.
• Cost Reduction- Automated processes reduced labor costs
• Optimized Resource Utilization- IoT helps in energy management
through smart grids, automated lighting, and smart meters.
Agriculture sector benefits from precision farming, reducing water
and fertilizer wastage.
13. Disadvantages of IoT:
• Privacy and Security Concerns: IoT devices can be vulnerable to
cyber-attacks, leading to data breaches and privacy issues. The vast
amount of personal data collected by IoT devices raises concerns
about data misuse.
• Complexity and Compatibility Issues- Interoperability challenges
arise due to different manufacturers using varied communication
protocols. Managing and integrating multiple IoT devices can be
complex.
• Dependence on Internet Connectivity: IoT devices rely on stable
internet connections to function effectively. Connectivity issues can
disrupt the performance of IoT systems.
14. • High Initial Costs and Infrastructure Requirements- Implementing
IoT solutions requires a significant investment in hardware, software,
and networking.
• Job Reductions and Workforce Displacement- Automation and AI-
driven decision-making may reduce the need for human labor in
various sectors.
15. Challenges in IoT
• Security and Privacy- As billions of devices are connected to the internet,
they become potential targets for cyberattacks. Moreover, IoT devices often
collect personal data, raising privacy concern.
• Interoperability- IoT encompasses a wide array of devices, sensors, and
platforms from various manufacturers and platform providers. Ensuring
these devices to communicate and work together seamlessly is a significant
challenge.
• Scalability- As the number of connected devices grows, maintaining an
efficient network becomes challenging.
• Power Consumption and Energy Efficiency/ Battery Life- Many IoT devices
operate on limited power sources, making energy efficiency a critical issue.
16. • Data Management and Storage- IoT devices generate vast amounts of
data, Managing , analyzing this data to derive meaningful insights can be
overwhelming. requiring efficient storage and processing solutions.
• Cost and Deployment Challenges- Deploying IoT infrastructure, including
sensors, networks, and data centers, requires significant investment.
• Regulatory Compliance- IoT deployments often cross borders and must
adhere to multiple regulations and standard.
• Reliability and Maintenance- IoT devices, particularly those deployed in
harsh or remote environments, must be reliable. Implementing robust
maintenance and remote monitoring strategies is essential to address
issues promptly.
17. IoT Applications
IoT Smart Home Applications
• Smart Lighting Systems -Lights turn on/off based on occupancy or
schedule , and natural light levels.
• Smart Security Systems- Smart Door Locks, Video Doorbells, Smart
Security Cameras, smart alarm
• Smart Temp & Climate Control - Automatically adjust temperature for
energy efficiency, individualized climate control in different rooms
• Smart Home Assistants, smart Home Entertainment , smart Cleaning
& Maintenance, Smart Energy & Utility Management….
18. IoT Smart City Applications
• Smart Traffic Management - Sensors and cameras detect real time
traffic flow, congestion, and accidents, adjusting signal timings to
optimize traffic
• Smart Traffic Lights:Traffic lights adapt in real-time to traffic
conditions, reducing waiting times
• Smart Parking: IoT-enabled sensors detect available parking spots and
guide drivers to them, reducing traffic and fuel consumption.
• Air pollution monitoring
• Smart Buildings & Infrastructure –smart buildings, smart streetlights,..
Smart Waste Management, Smart Water Management, Smart Energy
& Grid Management , Smart Public Safety & Surveillance
22. The building blocks of IoT play a crucial role in the successful
implementation and functioning of IoT solutions. It contains:
Sensors:
• form the front end of the IoT system.
• play a crucial role by collecting real-time data from the physical
world, receive and respond to a stimulus.
• Examples of sensors are gas sensors, water quality sensors, moisture
sensors, etc.
23. Types of Sensors:
• Temperature Sensors - measure the ambient temperature and are
widely used in applications like smart thermostats, weather
stations, and industrial monitoring systems.
• Humidity Sensors- measure the moisture content in the air and
find applications in areas such as agriculture, HVAC systems, and
indoor air quality monitoring.
• Light Sensors/ Photodetectors- detect the intensity of light and are
utilized in automatic lighting systems, security cameras, and energy-
saving devices.
• Pressure Sensors- measure the force exerted on them and are
commonly used in applications like automotive systems, industrial
automation, and medical devices.
• Motion Sensors- detect movement and are found in applications
like security systems, automatic doors, and gaming consoles.
24. Actuators-
• responsible for performing actions based on collected data from
sensors/user command.
• convert digital signals into physical actions (mechanical output)
• placed at the output point of the system.
• Used in automated systems to control valves, switches and other
components
• e.g. different types of electric motors, stepper motor, robotic arm
25. Processors:
• brain of the IoT system, gives intelligence to the data
• responsible for processing and analyzing the data captured by sensors
so as to extract valuable data from the enormous amount of raw data
collected. as well as executing user commands.
• can range from simple microcontrollers to powerful microprocessors,
depending on the complexity of the IoT application.
enable real-time decision-making and ensure efficient utilization of
resources.
• Ex. Embedded hardware devices, microcontrollers, etc are the ones
that process the data because they have processors attac.hed to it
26. Gateways:
• act as intermediaries between IoT devices and the cloud or central
server.
• play a crucial role in ensuring seamless, secure and reliable
communication between devices and the cloud.,
• responsible for routing the processed data and send them to proper
locations for its (data) proper utilization, thus provides network
connectivity to the data, essential for any IoT system to communicate.
• LAN, WAN, PAN, etc are examples of network gateways.
27. Applications:
• the user-facing part of the IoT systems.
• provide interfaces for users to interact with IoT devices and access
data
• essential for the proper utilization of all the data collected.
• These cloud-based applications that are responsible for rendering the
effective meaning to the data collected. Applications are controlled by
users and are a delivery point of particular services.
• Examples of applications are home automation apps, security
systems, industrial control hubs, etc.
29. The architecture of IoT is divided into 4 different layers –
• Sensing Layer
• Network Layer
• Data processing Layer
• Application Layer
30. Perception/Sensing Layer
• first layer of the IoT architecture , responsible for collecting data from
different sources.
• includes sensors that are placed in the environment to gather
information about temperature, humidity, light, sound, etc..
31. Network Layer:
• responsible for data transmission , it provides path for the flow of data , thus providing
communication and connectivity between devices in the IoT system. Network layer includes:
• protocols and technologies - that enable devices to connect and communicate with each
other and with the wider internet. Ex. WiFi, Bluetooth, Zigbee, and cellular networks such
as 4G and 5G tehnology
• gateways and routers- that act as intermediaries between devices and the wider internet
• data acquisition systems (DAS) - performs data aggregation and conversion functions
(collecting and aggregating data from sensors, then converting analog data to digital data,
etc.).
• security features - such as encryption and authentication to protect against unauthorized
access.
• .
32. Data processing Layer:
• responsible for receiving raw data from the devices, processing it,
and making it available for further analysis or action.
• Typically, data is analyzed, pre-processed, and stored here before
being sent to the data center, where it is accessed by software
applications that both monitor and manage the data as well as
prepare further actions.
• includes a variety of technologies and tools, such as data
management systems, analytics platforms, and machine
learning algorithms. These tools are used to extract meaningful
insights from the data and make decisions based on that data.
• Example of a technology used in the data processing layer is a data
lake, which is a centralized repository for storing raw data from IoT
devices.
33. Application Layer:
• topmost layer that interacts directly with the end-user
• delivers application-specific services to the user. An example might be a smart
home application
• responsible for providing user-friendly interfaces and functionalities that enable
users to access and control IoT devices.
• includes various software and applications such as mobile apps, web portals,
and other user interfaces that are designed to interact with the underlying IoT
infrastructure.
• also includes analytics and processing capabilities that allow data to be analyzed
and transformed into meaningful insights. This can include machine learning
algorithms, data visualization tools, and other advanced analytics capabilities.
35. Support Layer/ Secure layer:
•Lies between perception layer and network layer
• a lot of threats in three-layer logical design of IoT , hence added
another level that could resolve most of the issues.
• focuses on making IoT communication models more protected from
possible threats.
• verifies if the information is sent from an authenticated user. In most
cases, passwords or shared keys are used as authentication methods.
After verifying a user, the Support layer sends information obtained
from sensors of IoT devices to the Network layer.
• Thus, adds security to the architecture of IoT.
36. Transport Layer
•Lies between perception layer and processing layer
•Transfers sensor data from perception layer to processing layer and
vice versa, through networks.(Wireless, 3G,LANs, Bluetooth)
Business Layer
• layer that is located above the Application layer.
• Manages the entire IoT system (business- profit models )
• related to decision-making because it interacts with stakeholders.