Summary

These notes provide an introduction to the Internet of Things (IoT), defining it as a network of interconnected devices exchanging data with other devices and the cloud. The document further explores the basic architecture and different perspectives of IoT, such as the IoT equation and five-layer architecture. It also briefly touches upon fog computing and various IoT visions.

Full Transcript

Internet of Things Prof. Sonia D’Souza Semester-III Credit points-2 Lecture-1 The “Internet” of “Things” Definition Basic architecture Agenda IOT vison Why IOT SMART objects What is IOT? So, wh...

Internet of Things Prof. Sonia D’Souza Semester-III Credit points-2 Lecture-1 The “Internet” of “Things” Definition Basic architecture Agenda IOT vison Why IOT SMART objects What is IOT? So, what is IOT? The internet of things, or IoT, is a network of interrelated devices that connect and exchange data with other IoT devices and the cloud. Internet of Things means a network of physical things (objects) sending, receiving, or communicating information using the Internet or other communication technologies and network just as the computers, tablets and mobiles do, and thus enabling the monitoring, coordinating or controlling process across the Internet or another data network.  It is where things become ‘SMART’ and function like living entities by sensing, computing and communicating through embedded devices which interact with remote objects (servers, clouds, applications, services and processes) or persons IOT equation The IERC definition states that IoT is  “A dynamic global network infrastructure  with self-configuring capabilities  based on standard and interoperable communication protocols  where physical and virtual “things”  have identities, physical attributes, and virtual personalities  and use intelligent interfaces  and are seamlessly integrated into the information network.”. Basic Architecture Network Layer: Responsible for connecting SMART things to network devices and servers. Also transmits and processes sensor data over a network. Sensing/Perception layer: Sensors sense and gather information about the environment and transport it to the network layer. They sense the physical parameters and identify other objects in the environment. Basic Architecture Application layer: Responsible for delivering application specific services to the user. Defines applications in which IOT can be deployed. Data Processing layer: Stores, analyzes, computes and processes large amounts of data. Database transactions, Cloud computing, Big Data processing is handled in this layer. 5-Layer Architecture Perception layer: In the perception layer, number of sensors and actuators are used to gather useful information like temperature, moisture content, intruder detection, sounds, etc. Network layer: It gets data from perception layer and passes data to middleware layer using networking technologies like 3G, 4G, WiFI, etc. Middleware Layer: This layer has advanced features like storage, computation, processing, action taking capabilities. 5-Layer Architecture Application layer: This layer manages all application process based on information obtained from middleware layer. Business Layer: This layer handles how the data is delivered to the customer. It involves making flowcharts, graphs, analysis of results, and how device can be improved, etc. Fog Computing Sensors/ devices gather data and transmit to the middle layer(Fog nodes) which is very close to the data source. These nodes are capable of handling data, consumes minimum power and few resources. Data is private as all the processing is done before going to the cloud. Fog Computing Sensitive data is processed faster and with an instant response. Fog is only meant for light transactions hence data with less time sensitivity is sent to the cloud for historical analysis, big data analytics and long- term storage. IOT vision Vision: IoT signifies “world-wide network of interconnected objects uniquely addressable based on standard communication protocols” The three visions of IoT as shown are:  Things Oriented Vision  Internet Oriented Vision  Semantic Oriented Vision Contd.. Things Oriented Vision In this vision, objects are tracked by sensors and technologies using RFID Each object is uniquely identified by Electronic Product Code (EPC) The data is collected through sensors and sensor based embedded system This vision depends on RFID-based sensor networks and other sensor-based networks which integrate technologies based on RFID, sensing, computing devices and the global connectivity. Contd.. Internet Oriented Vision The internet-oriented vision sees the various physical devices interacting with each other. The sensor-based objects can be determined uniquely and their whereabouts can be regularly monitored. These smart embedded objects can be considered as microcomputers with computing resources. Contd.. Semantic Oriented Vision This vision states that the data collected through sensors will be huge. Thus, the collected data is processed effectively. The raw data is processed to make it consistent and least redundant which is useful for better representations and interpretation. Why IOT ? Benefits of IoT Higher demand for increasingly powerful mobile, wearable and connected devices Improved efficiency and automation of tasks. Increased convenience and accessibility of information. Better monitoring and control of devices and systems. Greater ability to gather and analyze data. Improved decision-making. Cost savings. Disadvantages of IoT Security concerns and potential for hacking or data breaches. Privacy issues related to the collection and use of personal data. Dependence on technology and potential for system failures. Complexity and increased maintenance requirements. High initial investment costs. Limited battery life on some devices. Concerns about job displacement due to automation The SMART era Smart devices are devices with computing and communication capabilities that can constantly connect to networks. Wearables What’s your step count? What's the weather like? How often do you exercise? How well did you sleep? What’s your workout pattern? How many calories did you burn today? Who’s trying to contact you? Can you wake me up at 8? Can you play my favorite song? Checking heart rate!! Smart appliances The IoT has the capability of making the homes smart by managing energy consumption, providing interaction among the home appliances, spotting emergencies, ensuring safety etc. Smart appliances can help develop deeper relationships by contributing to the customer experience in different ways. A Smart plug adaptor is equipped with a sensor to measure the energy consumption in near real time and allow for appliance control (on/off action) Other devices include Smart Thermostats, Smart speakers- Alexa/Siri/Google, Smart fridge, Smart washing machines etc. Smart home Mobile, tablets, IP- TV, video- conferencing, Wi-Fi and internet Home security: Access control and security alerts video-on-demand, Sensors and actuators manage a smart home with an Internet connection. Fire detection or Lighting control Home healthcare Leak detection Wired and wireless sensors are incorporated into the security sensors, cameras, thermostats, smart plugs, lights and Solar panel Temperature Energy entertainment systems. efficiency monitoring and monitoring and control HVAC control A connected home has the following applications deployed in a smart home Refrigerator network with Automated maintenance and meter reading service centres Smart car Farming Smart farming will help in adopting better farming practices by getting acquainted with the various possible land conditions and climate instability Through a group of sensors different land requirements can be identified and actions can be taken as per the need of the land. Other use case scenarios include smart wrapping up of seeds, fertilizers to cater to environmental conditions. Healthcare Connected devices in healthcare—often referred to as the Internet of Medical Things(IoMT) Physicians can keep track of patients’ health more effectively. They can track patients’ adherence to treatment plans or any need for immediate medical attention. IoT devices tagged with sensors are used for tracking real time location of medical equipment like wheelchairs, defibrillators, nebulizers, oxygen pumps and other monitoring equipment. Major advantages of IoT in healthcare: Cost Reduction, Improved Treatment, Faster Disease Diagnosis, Proactive Treatment, Drugs and Equipment Management Smart city Prof. Sonia D’Souza Thank you Email: [email protected] Internet of Things Prof. Sonia D’Souza Semester-III Credit points-2 Lecture-2 What is IOT? So, what was the BSOD issue? CrowdStrike is a cloud-based cybersecurity platform More than half of Fortune 500 companies use their software known as Falcon to keep their systems safe from malware and cyberattacks, according to CrowdStrike. Falcon is a sensor that detects a threat, it can stop execution of malicious code instead of just alerting a company, maximize visibility into real-time and historical endpoint security events by gathering event data needed to identify, understand and respond to attacks CrowdStrike identified a “logic error” as the culprit in the Microsoft outage. The programming error was triggered by a sensor configuration update to Falcon, which is a frequent type of update. Major components of IOT Thing or Device: SMART devices are embedded with sensors and actuators. Sensors are used to collect and transmit data from the environment. Whereas actuators carry out an action based on the data collected. Eg: Temperature sensors, GPS sensors Gateway: It is a physical device that passes through itself data streams from sensors to the cloud and in the opposite direction. It also performs data preprocessing before the information will be transferred to the cloud. Eg: Communication, Load balancing Cloud: A resource provides the management, storage, and processing of the data that is generated by IoT (Internet of Things) devices: Data Storage, Data Collection, Security, Pay-as-you-go Analytics: It is a process of converting data from smart devices and sensors into useful insights which can be interpreted and used for detailed analysis. Eg: Anomaly Detection, Environmental Monitoring, Energy Management User Interface: provides an interface by which the users can interact with the applications and systems. Example: Data Visualization, User-Friendly Design What are Sensors? Sensors or transducers represent physical devices that convert one form of energy into another. Sensors convert a physical device into an electrical impulse to take the desired action. For example, a thermometer takes the temperature as physical characteristic and then converts it into electrical signals for the system. What are Actuators? Actuator is a device that converts the electrical signals into the physical events or characteristics. An actuator operates in the reverse direction of a sensor. It takes an electrical input and turns it into physical action. For example, heaters are some of the commonly used actuators. Sensor to Actuator flow A sensor may collect information and route to a control center. The controller is a decision maker. It uses the sensors for monitoring and the actuators for actions. The actuator requires a source of energy and a control signal. When it receives a control signal, it converts the source of energy to a mechanical operation. Ex: Temperature sensor detects heat so it will send a detect signal to the Controller. The controller will send a command to turn on the cooling fan/sprinklers. The actuator, on receiving this command, will turn on the the cooling fan/sprinkler. What is RFID? Radio Frequency Identification (RFID) is a form of wireless communication, that uses radio frequency to search, identify, track embedded devices, animals or people. A tag enables identification of an object at different locations and times RFID tags contain microchips that store information about the object they are attached to. These can then be read remotely by a scanning device using radio waves and electromagnetic fields. The reader circuit can use NFC protocol to identify the tag. When the RFID tag is less than 20cm, a mobile/ NFC device generates and RF field which triggers the RFID to transmit identification of tag contents. Components of RFID RFID reader: Connected to the antenna wirelessly and receives data from the RFID tags. Data is then transmitted to the RFID DB where it can be stored and evaluated. Antenna/ Radio waves: Receives stored data from the tag and transmits it to the RFID Reader. RFID tag: RFID tags can be attached to objects or embedded in devices, like active and passive tags, allowing you to identify or locate them easily, and transmit stored data to the antenna. RFID tag The microchip stores the unique identification information for the object to which the tag is attached. Average storage range of an RFID microchip is 64 bits to 2 kilobytes. Antennas are used to receive and transmit signals from an RFID reader. The Substrate is the material onto which the chip and antenna are mounted. The substrate material is chosen to be resilient and capable of withstanding conditions like like heat, moisture, vibration, chemicals, sunlight, abrasion etc ensuring that the tag remains functional and intact. Types of RFID Active RFID: An active RFID tag is a small device that broadcasts their own signal. Active tags have their own power source i.e. a battery and can collect more detailed information about the object they are attached to. They can provide signals over an extended range, up to 100meters They can accurately track the real-time location of assets, can be attached to devices like cameras and GPS sensors, allowing you to identify and locate them easily. Passive RFID: They are used as tags with no internal power source and instead are powered by the electromagnetic energy transmitted from an RFID reader They can provide tag readability up to 3mt, within the area of the reader. They are cheaper than Active RFIDs and are more economical, hence widely used. Passive tags are popular in retail settings such as smart labels, file tracking RFID Frequency bands Tags are designed to operate on different frequencies: Low Frequency (LF): LF RFID systems have a short read range. Example: animal identification for pet tagging Frequency Frequency Distance Band Range High Frequency(HF): Low 30 kHz to =10 cm HF RFID systems have a slightly medium-range reading. Frequency 300 kHz Example: payment systems, and library book tracking. High 3 MHz to 30 Up to 1mt Ultra High Frequency(UHF): Frequency MHz UHF RFID systems have the longest read range and higher Ultra-High 300 MHz to up to 12 metres data transfer rates. Frequency 3 GHz or more Example: track cargo containers, monitoring incoming and outgoing goods in logistics RFID Readers RFID in Retail EPC( Electronic Product Codes) is an RFID Technology that assign unique identity, viz a number, to any object/product. These numbers are tracked in an EAS Database(Electronic article surveillance). After scanning the EPC for purchase, EPC numbers are removed from the EAS DB. At the exit, where the RFID scanners exist, products are scanned and activate an alarm if unsold. Near Field Communication (NFC) Near Field Communication(NFCs) NFC is a short-range wireless communication technology, that enables connection of NFC- enabled devices within 4cm or less. NFC is a subset of RFID technology but has low transmission range upto frequency of 13.56MHz NFC works through a magnetic field from an NFC reader device being brought near to an NFC tag to create an electromagnetic field that is passed through the coil activating a transfer of stored data on the tag to the reader device. Most smartphones, cards are equipped with NFCs. Example: Google pay, Apple pay, “tap-card” payments NFC Work Principle 2 types of devices: Active device: Generate radio waves to transmit or listen to data. Passive device: Can only transmit the data. NFC works in 3 modes of communication – Reader mode: an NFC-enabled device can read information from an NFC tag or card. Example: passports contain an NFC chip that can be read by NFC hardware Peer-to-Peer: two NFC-enabled devices can exchange data with each other.Example: Exchange of photos between two smartphones Card-emulation mode: an NFC-enabled device can emulate an NFC card, such as a credit card or access card.. Example: Smartphone emulating as a passive smart card. Applications of NFC Data transfer: The feature allows you to transfer whatever content or data you had on-screen to other NFC-enabled devices. Touch the back of both devices and accept the transfer prompt. Mobile payments: Samsung Pay, Google Pay, and Apple Pay all use your smartphone’s NFC chip for contactless payments. Most debit and credit cards these days already have an NFC tag built-in. These apps simply emulate the tags, with permission from the issuing bank. Quick pairing: Many wireless speakers and headphones use it to exchange pairing information with your smartphone. Transportation: Commuters can now bypass traditional ticket purchasing methods, opting instead for swift, secure transactions directly from their mobile devices. This not only speeds up the boarding process but also reduces the need for physical tickets, making operations eco-friendlier and more cost-effective. Keyless Access: NFC can be used to access doors by the auto-detect feature and provide easier access entry to vehicles. Wireless technology is a method of connection between objects Wireless Networks embedded with sensors, smart devices to connect and exchange data with other devices within an IoT Types of Wireless Networks Cellular Networks: Cellular networks provide reliable broadband communication with a high bandwidth that supports everything from streaming applications to voice calls. These networks were originally designed for smartphones, they were not considered for IoT devices. Eventually, the cellular industry developed new technologies that were more appropriate for IoT use cases. Two cellular IoT wireless protocols currently vying for dominance are LTE-M and Narrowband IoT (NB- IoT). LTE-M(CAT-M1) is optimized for higher bandwidth, it supports much more connectivity and low device power consumption, however, is not economical. NB-IoT is cheaper because its devices have longer battery life but there’s not enough coverage everywhere. Example of Cellular networks: Traditional communication Types of Wireless Networks Local and Personal Area Networks (LAN/PAN) Networks that cover short distances are called personal area networks (PAN) and local area networks (LAN). These networks have limited data transmissions. WiFi can be used for applications that run in a local or distributed environments if there are multiple access points integrated into a larger network. Bluetooth or BLE(Bluetooth low energy) is a short-range communication technology with optimization for power consumption positioned to support small-scale consumer IoT applications. For example: Wearables, Smart-home gadgets, Security cameras, smartwatches Types of Wireless Networks Local Power Wide Area Networks (LPWAN) IoT devices that run on LPWANs send small packets of information infrequently and over long distances. This network can be used by devices to communicate over large areas with the help of small inexpensive batteries with low power consumption. LoRaWAN, which operates on the LoRa (long-range) communication network, is a well- known and widely used IoT network protocol. Benefits are reduced power consumption (for longer battery life) and relatively affordable Since the range is high for LoRaWAN, sensors can be widely deployed over a large area. Examples: Asset tracking, Gas and Water Metering Types of Wireless Networks Mesh Networks: In mesh networks, all sensor nodes work together to share data among themselves to reach the gateway. Example: A star topology, in contrast, is where all sensor nodes communicate to a central hub. Mesh networks have limited range and may require extra sensors throughout a building or the use of repeaters to get the coverage your application needs. Zigbee is one of the most well-known mesh protocols used in IoT applications. Zigbee’s low-cost and low-power solutions, and bigger data transfers, help applications to be managed with inexpensive batteries for ten years. Example of Mesh networks: Automatic meter readings What are Wireless Sensor Networks? Wireless Sensor Networks (WSNs) are self- configured wireless networks of spatially dispersed sensors that monitor and record the physical conditions of the environment and forward the collected data to a central location. A WSN acquires data from multiple and remote locations. Each node of the WSN has an RF transceiver. The transceiver functions as both, a transmitter and receiver. For example, in Internet Waste Containers, the sensors wirelessly communicate the waste containers statuses in a waste management system in a smart city WSN Architecture Each node in a WSN contains a sensor, which is responsible for measuring physical or environmental conditions. The microcontroller is used to process the data collected by the sensor and to communicate with other nodes in the network. The communication interface allows the node to transmit and receive data wirelessly. This can be- RF wireless transmissions, Bluetooth, ZigBee etc The central base station or gateway device is responsible for managing the network and collecting data from the nodes. It is typically connected to a computer or server, which is used to analyze and store the data collected by the network. WSN Network Topologies Star : Data flows from the sink(central) node to the connected nodes. This topology is efficient for centralized control. This is efficient for centralized control. Tree: Data is transmitted from one node to another along the branches of the tree structure. This is useful for hierarchical deployments. Mesh: Data can travel through multiple paths from one node to another until it reaches its destination. Types of WSN Terrestrial WSNs:  Used for efficient communication between base stations.  Consist of multiple nodes placed in an ad hoc or structured manner. Underground WSNs  Nodes are buried underground to monitor underground conditions.  Require additional sink nodes above ground for data transmission. Underwater WSNs  Deployed in water environments using sensor nodes and autonomous underwater vehicles. Multimedia WSNs  Used to monitor multimedia events such as video, audio, and images.  Nodes equipped with microphones and cameras for data capture. Mobile WSNs  Composed of mobile sensor nodes capable of independent movement.  Nodes can sense, compute, and communicate while moving in the environment. Real Time Location System(RTLS) A system that can accurately identify and determine the location of objects/people in real time throughout large indoor facilities. Wireless RTLS tags are attached to objects or worn by people, and in most RTLS, fixed reference points receive wireless signals from tags to determine their location. For example: Hospitals can enhance their patient care, improve operational efficiency and reduce costs Working of RTLS Tags are attached to the objects to be tracked. Tags are made up of coin-batteries and LED diodes. Tags utilize technologies such as RFID, Wi- fi to transmit signals containing unique identifiers and location data. The transmitted signals are then received and processed by a network of sensors placed at reference points strategically placed throughout the environment. The information (e.g. current location, users of the object, physical conditions, maintenance records, compliance, etc.) stored on these devices along with the real-time positioning of the object is then communicated back to an associated business system. Two Types of RTLS Precision based RTLS Proximity based RTLS The location of the object or person The location of the object or person is tracked in an accurate way to the exact tracked to an accuracy of a few square location feet or within a zone Cheaper to implement More sensitive hardware and more cost Range up to 20mt Range over 300mt Technology: BLE Bluetooth beacons, Technology: Ultra-Wideband(UWB), Wi-fi RTLS with advanced algorithms Example: Medical-Equipment location- Example: Surgical instrument tracking- detect instruments on specific detect precise location of urgent floor/department, Staff location, asset instruments- ventilators management GPS GPS tracking software is a software system that uses the Internet of Things and Global Positioning System (GPS) technologies to track the location of objects or people in real-time. The software collects data from GPS sensors, which are attached to the objects or people being tracked and sends this data to a central server for processing. The server then uses this data to generate reports, maps, and other visualizations that allow users to monitor the location of their assets. This technology is commonly used in logistics and transportation, fleet management, crime detection and personal safety applications. GPS Receiver: GPS satellites transmit radio wave signals containing timestamp. These GPS receivers capable of capturing signals from GPS satellites. Data Collection: The receiver processes the satellite signals to determine the device location(d=c*t) Data Transmission: The location and sensor data is transmitted to the cloud-based platform or a central server via cellular networks- Wi-fi / wireless communication protocols Data Analysis: The collected data is analyzed to extract valuable insights and generate information. IOT Agents IOT Agents An agent is an entity that can perceive the environment and act on it. Based on this information gathered by sensors, they can take/enable decisions. Assisted learning is the process by which agents are helped to take decisions based on the feedback received from the users or the system they come from. After the agent develops a knowledge base, when one of the learnt situations occurs again, the agent will know what to do. Moreover, the learning method and the decisions the agent takes are ever changing and improving. Working of Agents When the IoT system is used by the user in an environment, the sensors in the device collect data from the outside. The data is submitted to an agent for knowledge analysis and extraction, so that the agent knows how to handle the environment next time. Learning Element is the process responsible for improving the agent's learning method so that the Performance Element is as efficient as possible. The "Critic Element" is essential for the agent to know it took the right decision or not. Feedback is then sent to the Learning Element The Problem Generator which studies the possibilities that have not yet occurred during the functioning or learning processes of the agent. Working of Agents The Learning element sends the learned information to the Performance element, the component that decides the actions are good and sent to the effectors. Effectors apply or implement the decision actions taken by the agent; these being destined for the end user. Given the taken decisions, the "Performance Element" decides whether the actions were good or not, and it sends feedback onto the "Learning Element" which recreates the knowledge base. Real-life Examples: Self-driving cars designed by Google Siri, Cortana Multi agent systems Prof. Sonia D’Souza Thank you Email: [email protected] Internet of Things Prof. Sonia D’Souza Semester-III Credit points-2 Lecture-3 Information security The CIA model is a guiding model in information security Confidentiality refers to protecting information from unauthorized access Integrity means data are trustworthy, complete, and have not been accidentally altered or modified by an unauthorized user Availability means data are accessible when you need them Information security is designed to protect the CIA model of the computer system Information security breaches Information security impact Phishing: Deceptive emails, texts, or websites trick users into revealing personal information like login credentials or clicking malicious links that install malware. IMPACT: Stolen credentials, data breaches, financial losses, identity theft Malware: Malicious software like viruses, worms, or ransomware infects systems, enabling attackers to steal data, encrypt files or disrupt operations IMPACT: Data theft, system disruption, financial losses, data corruption Access Control: unauthorized individuals gain access to restricted data systems, often through stolen credentials, phishing attacks, or exploiting system vulnerabilities IMPACT: financial losses, identity theft, reputational damage DOS/DDOS: Attackers flood a server/multiple computers with overwhelming traffic, making it unavailable to legitimate users IMPACT: Disruption of services, financial losses, reputational damage IOT Security IoT security refers to securing embedded devices and ensuring they do not introduce threats into a network. All embedded devices are connected to the internet Attackers can try to remotely compromise IoT devices using a variety of methods, from credential theft to vulnerability exploits. Once they control an IoT device, they can use it to steal data, conduct distributed denial-of- service (DDoS) attacks, or attempt to compromise the rest of the connected network. Why is IOT security important? Multiple IoT devices are manufactured every year Every device maintains huge amount of data Without adequate security on the Internet of Things, all connected devices provide a direct gateway into our personal and professional networks IoT security can be challenging because many IoT devices are not built with strong security in place — typically, the manufacturer's focus is on features and usability, rather than security, so that the devices can get to market quickly. IOT security challenges Weak authentication and authorization: Many devices use default passwords making it easier for hackers to gain access to IoT devices and the networks they use for communication Lack of encryption: network traffic is unencrypted making confidential and personal data vulnerable to a malware attack Vulnerabilities in firmware and software: The short development cycles and low-price points of IoT devices limit the budget for developing and testing secure firmware Shared-network communication: IoT devices are often connected to the same network as other devices, which means due to lack of network segmentation, an attack on one device can spread to others. Protocols like HTTP (Hypertext Transfer Protocol) and API-are channels that IoT devices rely on, and cyber criminals can exploit Difficulty in patching and updating devices: Many IoT devices are not designed to receive regular IoT security updates, which makes them vulnerable to attacks Types of IOT security threats Hardware: attacks the circuit -the attacker monitors, modifies, or disables either the data stored in the circuit or the communication of the circuit while designing the device. -attacker exploits the leakage of physical information from a system. Information gathered can be analyzed to extract private information such as cryptographic keys -attacker alters the data associated with an IC after it is involved in an application and modifies the behavior of the IC by installing malicious hardware/software. - internal structure of an IC to block users to access the service. Software: attacks the app -Botnets- Malwares inserted into IOT device connected to the internet, making them bots/zombies, under control of cyber-criminals. Types of IOT security threats Software: attacks the app -attacker impersonates a valid IoT device or authenticated user to gain access to a network -attackers use computer(s) to flood or overload a target with massive amounts of messages or data Data: attacks the data/network -attackers use programs that are developed to locate and record private data communications -attacker captures packets of information from an authenticated device, stores it, then delays or re-transmits it later as if the attacker is an authenticated device -examining captured network traffic to deduce useful information based on patterns in communication -the attacker is in the middle of the communication as a relay/proxy between a sender and a receiver to alter their communication IOT Security Frameworks and standards IoT security frameworks provide structured guidelines and best practices to help secure IoT devices and systems  National Institute of Standards and Technology (NIST) Cybersecurity for IoT Program: They have developed a comprehensive program which include standards, guidelines, and tools to help manufacturers, enterprises, and consumers secure IoT devices IoT Device Cybersecurity Capability Core Baseline: set of cybersecurity capabilities that manufacturers include in their IOT devices. Core functions: Identify, Protect, Detect, Respond and Recover IoT Non-Technical Supporting Capability Core Baseline: for customer support  Cloud Security Alliance (CSA) IoT Security Controls Framework Identifies basic security controls required to mitigate risks and allocates them to specific components in IoT system IOT Security Frameworks and standards IoT security frameworks provide structured guidelines and best practices to help secure IoT devices and systems  ISO/IEC 27001: An international standard for information security management systems(ISMS) that provides a robust framework for managing and protecting sensitive information, which can be applied to IoT devices and systems  European Telecommunications Standards Institute (ETSI) EN 303 645 Specifically developed for consumer IoT devices, it outlines security requirements to protect consumer devices from common cyber threats  Data Protection: Ensuring data is securely stored and transmitted.  Software Updates: Providing secure mechanisms for updating device software.  Vulnerability Reporting: Establishing processes for reporting and addressing vulnerabilities IOT Security Frameworks and standards IoT security frameworks provide structured guidelines and best practices to help secure IoT devices and systems  Open Web Application Security Project (OWASP) IoT Project: It includes a comprehensive list of top IoT vulnerabilities and recommendations for mitigating them  Authentication and Authorization: Ensuring only authorized users and devices can access the system.  Secure Communication: Protecting data in transit between devices and networks.  Device Management: Implementing secure methods for device provisioning, configuration, and updates.  IoT Security Foundation (IoTSF) Framework A framework aimed at improving the security of IoT devices – includes guidelines, and checklists for manufacturers, developers, and users to follow  Secure Design: Incorporating security from the initial design phase.  Supply Chain Security: Ensuring security throughout the supply chain. Lifecycle Management: Managing security throughout the device lifecycle, from deployment IOT Network Security Lifecycle 1. Identify all managed and unmanaged devices in detail. 2. Accurately assess and identify vulnerabilities and risks associated with all devices. 3. Automate Zero Trust policies and enforcement of those policies. 4. Take swift action on preventing known threats. 5. Rapidly detect and respond to unknown threats. IOT Encryption Data encryption is the method of converting plain text data into an unreadable format using a mathematical algorithm. Data encryption is a critical security measure that is used to protect sensitive information and helps in securing the communication between the IoT devices, the cloud, and the end-users, from potential security threats. Encryption involves the use of complex mathematical algorithms to scramble the data, making it unreadable to anyone who does not have the specific encryption key. This ensures that even if the data falls into the wrong hands, it cannot be accessed or read. Two Types of encryption Symmetric encryption Asymmetric encryption uses the same single key to function uses a key pair - a public key for encryption encryption and decryption and a private key for decryption, linked mathematically and logically to each other It is faster, requires low power, and includes a simple, straight forward end-to-end Involves authentication with strengthened process. Eg: AES, DES, Blowfish security. Eg: RSA, DSA, and TLS/SSL. IoT Encryption Algorithms Advanced Encryption Standard (AES) This is a widely used encryption standard that is known for its high level of security and efficient performance. It is an approved algorithm for the US federal government to protect classified information. AES is extremely efficient when used in 128-bit form. However, it also uses keys of 192 and 256 bits for heavy-duty encryption. It’s the world’s most widely used encryption algorithm – and can be found in these IoT applications: Wi-Fi security Mobile app encryption VPN Processor security and file encryption IoT Encryption Algorithms Triple DES Encryption Standard (DES) Triple DES uses three rounds of encryption to secure the data. This was designed to replace the original DES algorithm(56bit) as that was cracked by many security researchers Triple-DES is efficient when used in 112-bits. It is generally recommended in legacy applications or use- cases with older systems. It is still considered as a dependable solution in payment systems- ATM transactions some areas of fintech. IoT Encryption Algorithms RSA Algorithm (Rivest–Shamir–Adleman): This is the most the most widely used asymmetric encryption algorithm It allows users to send encrypted messages without sharing the code with the recipient. As a result, it’s extremely secure. It comes in multiple encryption key lengths, ranging from 768-bit to 4096-bit (and more) It’s most used to establish communications, digital signatures ensuring data integrity and software protection by protecting software licenses to prevent unauthorized copies IoT Encryption Algorithms TLS/SSL handshake: (Transport Layer Security/Secure Socket Layer) 1) The message will include which TLS version the client supports, the cipher suites supported, and string of random bytes, known as the “client random” 2) In reply, the server sends a message containing the server's SSL certificate, the server's chosen cipher suite and another string of random bytes, called the “server random” 3) Authentication: The client verifies the server's SSL certificate with the certificate authority that issued it is the actual owner of the domain 4) The premaster secret is encrypted with the public key and can only be decrypted with the private key by the server. (The client gets the public key from the server's SSL certificate) 5) If the server has sent a “client certificate request” in Step 2, the client sends its digital certificate. The server verifies the client's certificate 6) The server decrypts the premaster secret. Both client and server generate session keys from the client random, the server random, and the premaster secret. They should arrive at the same results. 7) The client sends a "finished" message that is encrypted with a session key 8) The server sends a "finished" message encrypted with a session key 9) The handshake is completed, and communication continues using the session keys Examples: Used in secure web browsing(HTTPS), email-security Advantages of encryption IOT security: ensures security by encrypting the data and this make it unreadable to unauthorized person Integration of data: techniques such as digital signature and message authentication codes prevent data integration during transmission Authentication of the user: authentication ensures only to authorized individuals like homeowner, as he/she can unlock the door using fingerprints or password scanners IoT Firewall A system that monitors and controls incoming and outgoing traffic based on specific rules. The primary function of an IoT firewall is to prevent/block unauthorized access to IoT devices and networks IoT firewalls analyze network traffic and determine whether it's authorized or unauthorized Example: an IoT firewall can disallow non-HTTPS traffic to a smart fridge because other traffic shouldn’t occur on such a device Types of IOT Firewall IoT network firewall IoT embedded firewall Deployed as a component of network Deployed in the operating system of gateway the IOT device itself at the time of manufacturing They allow network segmentation options Various filtering mechanisms help to ensure safe and secure data IoT network firewalls can use VPNs to transmission and prevent encrypt traffic between the gateway unauthorized access to the device. and remote servers that process data collected by IoT devices Example: Defend of DDoS Attacks IoT Network Intrusion Detection Systems(NIDS) NIDS monitors the internet traffic across the devices in an IoT network NIDS examines and investigates the hosted device’s network, user actions, and discovers signatures of known threats and unknown malicious attacks within a network It monitors the IoT network, discover unauthorized intrusions within the network, and enable awareness to other devices connected to the network and the execution of necessary firewall rules This system also generates alerts based on internal and external attacks. IoT Network Intrusion Detection Systems(NIDS) There are three general elements of NIDS : Observation: This module monitors the network traffics, patterns, and resources Analysis and Detection: This module detects intrusions based on given algorithmic rules Alert: This module raises attack flags if an intrusion is detected. Cyber-attackers initiate internal attacks through the compromised IoT devices connected to the network. Third parties outside the leading network initiate external attacks Risk management IOT Risk mitigations Authentication and access control: This includes implementing secure identity management, two-factor authentication, and role-based access controls Users should be enabled to update IoT device/gateway credentials and also select features based on their preferences. Device Authentication: Device manufacturers should follow secure coding practices, conduct regular vulnerability assessments, and promptly release security patches to address identified vulnerabilities to make the device more authentic. IOT Risk mitigations Network security: This involves using firewalls, intrusion detection and prevention systems (IDS), and monitoring network traffic for suspicious activities Network Segmentation: Divide the network into segments to isolate critical devices from potential threats Firmware and Software Updates: Keep devices updated with the latest security patches Devices should be updated automatically once a latest patch is released Turn off unnecessary features: Disable unwanted features to minimize the risk IOT Risk mitigations Privacy and consent: Organizations must comply with privacy regulations and obtain appropriate consent when collecting, processing, and storing personal data through IoT devices Security awareness and training: Organizations should provide security awareness and training programs for employees, vendors, and users involved in IoT systems to raise awareness about security risks, best practices for secure usage, and the potential consequences of improper handling of IoT devices and data Continuous monitoring and improvement: IoT security is an ongoing process. Regular monitoring, logging, and analysis of IoT systems should be performed to detect anomalies, potential breaches, and vulnerabilities Case-studies IOT case-studies 1. Mirai botnet (2016) : A botnet is an army/network of devices(bots/zombies) that can take down servers, often used to launch DDOS attacks In September 2016, the authors of the Mirai malware launched a DDoS attack on the website of a well-known security expert, using the botnet to take up nearly 1TB of bandwidth per second. The botnet consisted of 145,607 video recorders and IP cameras A week later they released the source code into the world, this code was quickly replicated by other cybercriminals Mirai botnet targeted another domain registration service: Dyn, in October 2016. And that time, Mirai brought down huge sections of the Internet, including Netflix, Twitter, Reddit, The Guardian, and CNN How does Mirai work? A malware called Mirai, targeted vulnerable IoT devices and turned them into bots that could be used for Distributed Denial of Service (DDoS) attacks Mirai scans the Internet for IoT devices that run on the ARC processor This processor runs a stripped-down version of the Linux operating system If the default username-and-password combo is not changed, Mirai is able to log into the device and infect it The Mirai botnet employed a hundred thousand hijacked IoT devices to bring down Dyn The Mirai botnet attack of 2016 was a wake-up call for the security community, highlighting the need for improved security measures for IoT devices. IOT case-studies 2. Verkada hack (2021) : Verkada is a cloud-based video surveillance service The attackers could access private information belonging to Verkada software clients and access live feeds of over 150,000 cameras mounted in factories, hospitals, schools, prisons, and other sites using legitimate admin account credentials found on the internet Over 100 employees were later found to have "super admin" privileges, enabling them access to thousands of customer cameras, revealing the risks associated with over privileged users IOT case-studies 3. St. Jude Medical’s pacemakers (2017) : FDA announced that more than 465,000 implantable pacemaker devices were vulnerable to hacking With control of one of these devices, a hacker could literally kill someone by depleting the battery, altering someone’s heart rate, or administering shocks Fortunately, no hacks were reported and the security flaw led St. Jude’s Medical to update its devices An IoT security flaw essentially turned a life-saving device into a potentially deadly weapon IOT case-studies Cold in Finland (2016): Cybercriminals turned off the heating in two buildings After that, another DDoS assault was launched, forcing the heating controllers to reboot the system repeatedly, preventing the heating from ever turning on JEEP SUV hack (2015): A group of researchers tested the security of the Jeep SUV They managed to take control of the vehicle via the cellular network by taking advantage of a firmware update vulnerability. They could then control the vehicle’s speed and even steer it off the road Prof. Sonia D’Souza Thank you Email: [email protected] Internet of Things Prof. Sonia D’Souza Semester-III Credit points-2 Lecture-4 Embedded systems What is an Embedded system? An embedded system is the heart of an IoT device An embedded system is a combination of computer hardware and software designed for a specific function Embedded systems use sensors to monitor specific features and can initiate an automated action in response to data received from the sensor Embedded systems are also called embedded computers, they can serve as standalone devices too Eg: TV remote controls, microwave ovens, motion sensors, gaming consoles Microprocessor Microcontroller Heart of a computer Heart of an embedded system Microprocessor only consists of Central Microcontroller has memory, a CPU and I/O Processing Unit Since memory and I/O are present together, Since memory and I/O are connected the internal circuit is small in size externally, the circuit becomes large in size Cost is low Cost is high Total power consumption is low due to less Total power consumption is high due to external components external components Can run up to 200MHz or more Can run at a very high speed Example: IoT Devices Example: Computers ES hardware components Sensor: The sensor measures and converts the physical quantity to an electrical signal, which can then be read by an embedded systems engineer or any electronic instrument. A sensor stores the measured quantity to the memory. A-D Converter: An analog-to-digital converter converts the analog signal(LED light, sound etc.) sent by the sensor into a digital signal Memory: stores the device storage Buses: A computer bus is used for transferring data between hardware components D-A Converter: A digital-to-analog converter changes the digital data fed by the processor to analog data Actuator: An actuator compares the output given by the D-A Converter to the actual output stored and stores the approved output. ES software components Embedded software is used to control and manage hardware devices and is usually pre-installed Firmware. This is a built-in program that directly interfaces with the hardware, usually to boot up the system Operating system: Real-Time Operating Systems(RTOS) performs the functions like task scheduling, interrupt handling, and inter-process communication. It also provides an interface(API) for application software to interact with hardware components without having to control them directly Middleware: A library of functions and services that simplifies complex actions and makes it easier for application software to perform functions Application: The end user directly interacts with the software to accomplish a specific task, like controlling an LED display. Internally, the application interacts with the operating system and hardware through system calls and APIs provided by the OS and middleware. Embedded systems working Initialization: When the embedded system is powered on, the firmware starts up first to initialize the hardware. OS Booting: After hardware initialization, the firmware starts the operating system. Middleware and Application Launch: Once the OS is up and running, middleware services are initialized, and finally, the application software is launched. Run-Time: During operation, the application software will often make use of middleware services to accomplish its tasks. These, in turn, interact with the operating system, which may then interact with the firmware to control hardware components. Data Flow: Data can flow both ways; sensor data could be read into an application through a stack of firmware, OS, and middleware layers, and commands to actuate hardware could travel down the same layers. Shut Down: When the system is turned off, the application software is terminated first, followed by middleware services and then the OS, which may use firmware routines to safely power down the hardware. What is embedded system in IoT? IoT embedded system is a "smart" device An IoT embedded system always has internet connectivity, that enables devices to communicate with each other or the cloud Sensor Integration : Embedded systems are responsible for integrating sensors into devices. Communication: They enable wireless or wired communication between devices and can use a variety of protocols such as Wi-Fi, Bluetooth, and Zigbee Data Processing: They are responsible for processing the data generated by sensors and to process the transmitted data to other devices/ cloud Security: They are responsible for secure data transmission, secure access to devices, and protecting against cyber attacks Power Management: responsible for managing the power supply, optimizing power usage, and managing battery life. IOT embedded systems Serial communication Serial communication is the process of sending data one bit at a time, sequentially, over a communication channel or computer bus Communication is done in 8bit, binary pulses where every bit represents data Binary contains the two numbers 0 and 1. 0 is used to show the LOW or 0 Volts, and 1 is used to show the HIGH or 5 Volts Serial communication is of two types – synchronous and asynchronous Example: Serial communication is USBs, Wifi as it uses less transmission lines. Asynchronous communication A group of bits will be treated as an independent unit – 8bits = 1byte The data bits will be sent at any point in time Every data byte is in between a start bit(0) and a stop bit (1). These bits are useful to ensure that the data is correctly sent Since there is no clock to synchronize the data transmission, which is the major advantage. Time is calculated only within the data received in start and stop bit This method is cost-effective, but has slow data transmission What is UART ? UART stands for Universal Asynchronous Receiver/Transmitter UART a hardware communication protocol that's used in microcontrollers, embedded systems, and computers to exchange serial data between devices UART uses two wires to transmit and receive data It's considered a simple protocol that allows devices with different architectures or clock rates to communicate without issue UART packet The data in UART serial communication is organized in to blocks called Packets Start Bit: Start bit is a synchronization bit that is added before the actual data and marks the beginning of the data packet. To start the data transfer, the transmitting UART pulls the data line from high voltage level(1) to low voltage level(0). The receiving UART detects this change from high to low on the data line and begins reading the actual data. Stop Bit: This bit marks the end of the data packet. It is usually two bits long but often only one bit is used Parity Bit: Parity allows the receiver to check whether the received data is correct or not. It is optional Data Bits: Data bits are the actual data being transmitted from sender to receiver. The length of the data frame can be anywhere between 5 and 9 (9 bits if parity is not used and only 8 bits if parity is used) How UART works? The transmitting UART receives data in parallel from the data bus of the microcontroller The transmitting UART adds the start bit, parity bit, and the stop bit(s) to the data frame The entire packet is sent serially from the transmitting UART to the receiving UART The receiving UART discards the start bit, parity bit, and stop bit from the data frame The receiving UART reads the data packet bit by bit Finally, the receiving UART transfers the data packet in parallel to the data bus on the receiving end UART in IoT Embedded systems real-time applications Smart Home consumer electronic devices and household appliances, such as TV and music systems, digital cameras, smartphones, gaming consoles, air conditioners, fridges, coffee machines and vacuum-cleaning robots Smart Cities smart parking, surveillance systems, traffic control systems, pollution monitoring solutions, interactive kiosks Healthcare electronic thermometer, ECG and MRI machines, pacemakers Automotive Anti-lock braking systems, keyless technologies, blind spot detection, Fuel control systems monitor fuel consumption, Emission control technology to reduce air pollution, Heated seats, climate control make driving comfortable Manufacturing online monitoring and remote control Applications industries of IOT Smart home Home Automation: IoT devices like smart thermostats, lights, and security systems can be controlled remotely, enhancing convenience and energy efficiency. Security: Smart cameras and locks provide real-time monitoring and alerts, improving home security. Healthcare Remote Monitoring: Wearable devices track vital signs and send data to healthcare providers, enabling remote patient monitoring and timely interventions Smart Medical Devices: IoT-enabled devices like insulin pumps and heart monitors provide continuous health data, improving patient care Manufacturing Predictive Maintenance: IoT sensors monitor equipment health and predict failures, reducing downtime and maintenance costs. Supply Chain Management: IoT devices track inventory and shipments in real-time, optimizing supply chain operations. Transportation Fleet Management: IoT solutions track vehicle locations, monitor driver behavior, and optimize routes, improving efficiency and safety. Smart Traffic Management: IoT sensors and cameras help manage traffic flow and reduce congestion in urban areas. Retail Inventory Management: IoT devices track inventory levels in real- time, reducing stockouts and overstock situations. Customer Experience: Smart shelves and personalized marketing enhance the shopping experience by providing relevant product information and offers. Agriculture Precision Farming: IoT sensors monitor soil conditions, weather, and crop health, enabling data-driven farming decisions. Livestock Monitoring: IoT devices track the health and location of livestock, improving animal welfare and farm management. Energy Management Smart Grids: IoT-enabled grids optimize energy distribution and reduce outages by monitoring and managing energy flow in real-time. Energy Efficiency: Smart meters and IoT devices help consumers monitor and reduce their energy consumption. Smart cities Public Safety: IoT devices like smart cameras and sensors enhance public safety by monitoring and responding to incidents in real-time. Environmental Monitoring: IoT sensors track air and water quality, helping cities manage pollution and environmental health. Consumer IOT (CIoT) What is CIoT? Consumer IoT (CIoT) is a subcategory of the Internet of Things (IoT) that involves connecting physical and digital objects to the consumer market. It refers to connected devices at individual level, that collect and share data through an internet connection. CIoT devices use edge computing technologies, embedded sensors, and actuators to capture real-time data. In 2022, the global consumer IoT market was valued at $221.74 billion, and is expected to grow to $616.75 billion by 2032. CIoT use-cases Home Automation & Security Home automation devices with smart energy management and security applications, internet-enabled appliances are expected to hold the largest share of the consumer IoT market by 2023 Asset Tracking From smartphone, camera, key, etc. tracking to pet tracking, even tracking vulnerable family members, like kids and the elderly, are being made possible and convenient by consumer IoT Smart Wearables Consumer-oriented wearables with applications are now being designed to transform how consumers go about their daily lives Personal Healthcare From patient monitoring, smart hearing aids, healthcare equipment tracking to elderly care, there is a growing convergence between personal healthcare and IoT in healthcare Connected cars Vehicles that are connected to the internet CIoT examples Personal CIoT : Smart Home CIoT: Applications include wearable, hearable, Applications include home automation products like smart kitchen gadgets and security systems smartphones and personal laptop gadgets with face recognition and voice control Smart Clothing Voice Assistance Examples – Ralph Lauren smart t-shirt, Arrow Examples – Amazon Echo and Google Home Smart Voice-Activated Speaker Smart Shirt with NFC. Temperature: Nest Smart home Thermostat Smart Watch Examples – Apple Watch, Fitbit. Lighting fixtures Examples – Philips Hue Smart Bulbs,L8 Battery power-sharing between two SmartLight smartphones Asset tracking: Examples - Apple's AirTag that Examples – Donor Cable bracelets by NAR can be attached to items to help users locate Mobile. them if they get lost or stolen Hearable Smart Kitchen Gadgets Examples – AirPods, Google Pixel Buds. Examples – iGrill Smart grill thermometer, Samsung Family Hub Benefits of CIoT Increased comfort Higher control Efficient tracking of loved-one/ valuables Better insights Enhanced connections between people, systems, and the environment Improved quality of life Convenience Industrial IOT (IIot) What is IIoT? Industrial IoT which uses Internet of Things (IoT) technology in industrial settings. IIoT network connect devices that communicate with each other and with a central system, regularly transmitting data. IIoT devices communicate through gateways, which are physical servers that filter data and transmit it to other devices and software applications The data can then be analyzed with AI and machine learning capabilities to improve efficiency and decision-making IIoT architecture IIoT architecture is built over the IOT architecture Key components:  smart devices and machines that can sense, communicate and store data  gathering, filtering, and preprocessing data from multiple sources in an aggregation system, like Edge Gateway  cloud computer systems to store and process the data  advanced data analytics systems that provide helpful information to improve manufacturing processes and employees who put given insights into a business context IIoT use-cases Automotive This industry uses Industrial robots, IIoT can help proactively maintain these systems and spot potential problems before they can disrupt production Agriculture Industrial sensors collect data about soil nutrients, moisture and other variables, enabling farmers to produce an optimal crop Forecasting: Improving forecasting and data analysis in IMD deprtments Logistics: Improving logistics and distribution Utilities : Monitoring of industrial utilities(electric, water and gas) equipment such as transformers Quality control: Gaining insights into factors that impact quality control IIoT examples Kuka: Predictive Analytics: A robotics manufacturer that applied predictive analytics to reduce downtime across its facilities Airbus: Smart Factory: The company launched they call the Factory of the Future. They installed sensors in the machines and workers’ uniforms to increase safety and reduce errors. For example, Airbus offers smart glasses that allow employees to decipher complex blueprints and convert measurements from inch to cm Maersk: Route Optimization: The well renowned shipping company, uses IIOT to monitor their shipments, minimize fuel consumption, and identify the best possible routes. John Deere: Self-Driving Vehicles: a manufacturer of various heavy equipment, the company utilizes cutting-edge GPS systems with an accuracy of two centimeters. They use IIoT to maintain a high level of safety, avoid human-made errors, and increase efficiency Bosch: Inventory Tracking: an engineering and technology company that uses industrial IoT applications in the Track and Trace program which helps workers locate tools and improve their work efficiency. North Star BlueScope Steel: Employee Safety : a leading supplier in the steel industry, the company launched specialized helmets and wristbands to help managers keep track of employee safety and detect potentially dangerous scenarios. The wristbands are equipped with vital tracking features to inform executives of the health conditions of their personnel. Sensors in factories also inform managers about radiation levels, toxic gasses, and other hazardous environmental factors. Benefits of IIoT IIoT vs CIoT IIoT CIoT Focus Segment: Industrial applications Focus Segment: Domestic/commercial applications Interest: Complex industrial processes optimization via smart devices. Interest: Daily task automation through consumers devices Objective: Aimed at automating machinery to ensure safety, efficiency and sustainability Objective: Aimed at rendering convenience. Simply making the user’s life easy Connectivity: Both wired and wireless Connectivity: Mostly wireless. Sensor Utilisation: Sophisticated sensors e.g., pressure sensors, speed sensors, radio- Sensor Utilisation: Basic sensors e.g., motion frequency identification (RFID) sensors. sensors, temperature sensors, gyroscopes. Data Quantity: High to very High Data Quantity: Medium to High Maintenance: Properly scheduled and planned Maintenance : Preference of the users. IoT – A Catalyst For Sustainability The Internet of Things (IoT) is a technology that can help create a more sustainable world by reducing energy consumption, carbon emissions, and environmental impact By leveraging data from sensors, IoT technology enhances operational efficiency, allowing us to improve the environmental and contribute significantly to building a greener world Empowering IOT sustainability Reducing vehicle emissions & traffic management: Organizations worldwide are utilizing IoT to monitor and improve vehicle performance whilst simultaneously reducing harmful emissions By having devices and sensors installed in vehicles and industrial equipment, we can access real-time information about fuel usage, dynamic route optimization and CO2 emissions, further reducing our carbon footprints from transportation and industry. Energy usage: IoT devices and smart meters enable businesses and consumers to monitor and manage their costs and consumption in real time It not only helps in reducing our overall environmental impact but motivates a shift towards sustainable sources like solar panels/ turbines. IoT sensors can be used to program smart lighting systems to only emit the required amount of light and switch off automatically when not needed Empowering IOT sustainability Agriculture and water conservation: IoT solutions such as smart irrigation systems minimize water wastage and harmful pesticides and improve crop yields IoT can help farmers monitor soil moisture, temperature, and nutrient levels, enabling precise irrigation and fertilization IoT can tackle the water wastage issue in a plethora of ways - leak detection sensors, smart water meters, remotely-controlled water valves, predictive maintenance for detecting potential failures Food safety: IoT can help assure food safety by digitizing traceability and monitoring food throughout the supply chain Waste Management: By making waste collection more efficient and enhancing recycling, we’re not just cutting down costs but also addressing one of the critical challenges of our times—natural resource conservation(plastic reduced) Future of IOT sustainability By integrating with energy management, agriculture, waste management, smart cities, environmental compliance and renewable energy, IoT is having a deep impact on the health of our planet IoT and AI are reinventing urban landscapes to make cities smarter, sustainable, and responsive to the needs of their denizens (plant, animal, person) The global IoT market is expected to grow at a Compound Annual Growth Rate of 25.2% by 2026 Microsoft’s Project 15 Open Platform is a a conservation and ecosystem sustainability open platform that works on to bring the latest Microsoft cloud and Internet of Things (IoT) technologies to accelerate scientific teams building sustainability and conservation solutions like species tracking & observation, poaching prevention, ecosystem monitoring, pollution detection Reborn Electric, a South American company, converts diesel-engine buses to electric power Schréder, a remote management system for monitoring, controlling, metering and managing outdoor lighting. The smart lighting system reduces energy consumption and CO2 emissions. WiseConn Engineering, uses IoT to capture data from low-power sensors and transmit it back to a farmer’s control station for complete, optimal irrigation control Prof. Sonia D’Souza Thank you Email: [email protected] IOT- Experiential learning Groups of 3-4 / Individual Pick one of the SMART cities. Ensure cities should not be replicated. Singapore, Helsinki => Finland, Zurich => Switzerland, Oslo =>Norway, Amsterdam => The Netherlands, New York=> United States, Seoul=> South Korea, Dubai => UAE, Tokyo => Japan, Canberra => Australia, India Create a ppt of 20 content-based slides on the following points: 1. 5- IoT Initiatives implemented 2. Technology used => types of sensors, RFID, GPS touchpoints 3. Security 4. Key Benefits and Challenges 5. IOT sustainability for the use-case/as a whole Start date: 1/09/2024 Last date: 25/09/2024 Total marks: 30

Use Quizgecko on...
Browser
Browser