IoT Introduction Lecture Notes PDF

Summary

These lecture notes introduce the key concepts related to the Internet of Things (IoT). Topics discussed include IoT terminologies, system-on-a-chip (SoC) components, and the differences between IoT and Machine-to-Machine (M2M) communications strategies.

Full Transcript

8/6/2024 Chip Terminologies in IoT Microprocessor Micro Controller Embedded System API (Application Programming Interface) Latency Telemetry...

8/6/2024 Chip Terminologies in IoT Microprocessor Micro Controller Embedded System API (Application Programming Interface) Latency Telemetry AJ SoC (System on Chip) integrates all components of a computer or SoC = other electronic system. 1 8/6/2024 Examples on SoC Components of Soc Processor Memory Interface DSP I/O ports Almost all, every area, every device, every sensor, every software are connected to each other. The ability to access these devices through a smartphone or through a computer is called IoT. AJ 2 8/6/2024 What is IOT? The term Internet of Things generally refers to scenarios where network connectivity and computing capability extends to objects, sensors and everyday items not normally considered computers, allowing these devices to generate, exchange and consume data with minimal human intervention. IOT The IOT is widely used term for a set of technologies, systems and design principles associated with the emerging wave of internet connected things that are based on the physical environment. IOT is about the technology , the remote monitoring and control and also about where these technologies are applied. In many aspects it initially looks the same as M2M Communication – connecting sensors and other devices to information and communication technology systems via wired or wireless networks. What is M2M ? Machine to machine (M2M) is direct communication between devices using any communications channel, including wired and wireless. Machine to machine communication can include industrial instrumentation, enabling a sensor or meter to communicate the information it records (such as temperature, inventory level, etc.) to application software that can use it (for example, adjusting an industrial process based on temperature or placing orders to replenish inventory) 3 8/6/2024 DEFINITION OF M2M COMMUNICATION Machine-to-machine communication, or M2M, is exactly as it sounds: two machines “communicating,” or exchanging data, without human interfacing or interaction. This includes serial connection, powerline connection (PLC), or wireless communications in the industrial Internet of Things (IoT). Switching over to wireless has made M2M communication much easier and enabled more applications to be connected. M2M Communication M2M refers to those solutions that allows communication between devices of same type and specific applications. M2M solutions allows end-users to capture data about events from assets , such as temperature or inventory levels. M2M has been applied in many different scenarios, including the remote monitoring and control of enterprise assests,or to provide connectivity of remote machine-type device. Machine – To – Machine : device (water meter) which is monitored by means of sensor [in “uplink”] device (valve) which is instructed to actuate [in “downlink”] Machine – To – Machine : network which facilitates end-to-end connectivity between machines composed of radio, access network, gateway, core network, backend server Machine – To – Machine : device (computer) which extracts, processes (and displays) gathered information device (computer) which automatically controls and instructs other machines 4 8/6/2024 Difference Between IOT and M2M M2M IOT Abbreviation for machine to machine. Abbreviation for internet of things. It is about direct machine to machine It is about sensor automation and internet communication. platform. It supports point to point communication. It supports cloud based communication. Device not necessary relay on internet Device necessary relay on internet. It is mostly based on Hardware. It is based on hardware and software both. Machine normally communicates with Many users can access at a time over single machine at a time. internet. Limited number of devices can be More number of devices can be connected connected at a time. over a time. It is less scalable. It is more scalable. It does not support open API’s. It supports open API’s. Example – Remote monitoring Example- Smart Cities 5 8/6/2024 key aspect to note between M2M and IoT is that the technology used for these solutions may be very similar they may even use the same base components but the manner in which the data is managed will be different. In an M2M solution, data remains within strict boundaries it is used solely for the purpose that it was originally developed for. With IoT, however, data may be used and reused for many different purposes, Reasons of IoT Data deluge : The explosion of the amount of data collected and exchanged is one of the major reason why IoT came in existence. Forecasts indicate that in the year 2015 more than 220 Exabytes of data are stored. So we need novel mechanisms to find, fetch, and transmit data. There is decrease in energy required to operate intelligent devices. The search will be for a zero level of entropy where the device or system will have to harvest its own energy. the devices are becoming increasingly smaller. Autonomic management: the devices/systems of future will have self-management, self-healing, and self-configuration capabilities AJ AJ 6 8/6/2024 Types of IoT Consumer IoT -home appliances, voice assistance, and light fixtures. Commercial IoT - Primarily used in the healthcare and transport industries. Eg: smart pacemakers and monitoring systems. Military Things (IoMT) - Primarily used for the application of IoT technologies in the military field. Eg: surveillance robots and human- wearable biometrics for combat. Industrial Internet of Things (IIoT) - Digital control systems, smart agriculture and industrial big data. Infrastructure IoT - connectivity in smart cities AJ AJ Threat vs. Opportunity If misunderstood and misconfigured, IoT poses risk to our data, privacy, and safety. If understood and secured, IoT will enhance communications, lifestyle, and delivery of services. Can You Justify? AJ 7 8/6/2024 AJ AJ IoT − Key Features (Characteristics of IoT) AI Connectivity Sensors Identity of Things Dynamic Scalability Self Upgradation Small devices Architecture Security Network Data AJ 8 8/6/2024 IoT − Advantages Improved Customer Engagement Technology Optimization Reduced Waste Enhanced Data Collection AJ IoT − Disadvantages Security Privacy Complexity Flexibility Compliance AJ AJ 9 8/6/2024 AJ AJ AJ 10 8/6/2024 AJ AJ The IoT Lifecycle Data collection - Design Review Prototyping Validation Manufacturing and Maintenance AJ 11 8/6/2024 Robot as IoT (Case Study) What is Robot? sense Plan Act Technologies used in Robot. Paradigm of Robotics Control Theory Components of Robot Embodiment Sensor Action Brain Power Supply Controllers IoT Product Liability (Challenges for Developers and End-Users) Device Malfunction Data theft Cyberattacks AJ 12 8/6/2024 4 Stages of IoT AJ stages of IoT architecture implementation AJ IoT - Architecture AJ 13 8/6/2024 IoT- Working AJ AJ Components of IoT Sensors Connectivity Data processing User interface AJ 14 8/6/2024 AJ Role of Software in IoT Data Collection Device Integration Real-Time Analytics Application and Process Extension AJ Engineering, Industry, and Infrastructure Rahul runs a manufacturing facility that makes shields for manufacturing equipment. When regulations change for the composition and function of the shields, the new appropriate requirements are automatically programmed in production robotics, and engineers are alerted about their approval of the changes. AJ 15 8/6/2024 Government and Safety Juliya lives in a small city. She’s heard about a recent spike in crime in her area, and worries about coming home late at night. Local law enforcement has been alerted about the new “hot” zone through system flags, and they’ve increases their presence. Area monitoring devices have detected suspicious behavior, and law enforcement has investigated these leads to prevent crimes. AJ Home and Office Jash works in advertising. He enters his office, and it recognizes his face. It adjusts the lighting and temperature to his preference. It turns on his devices and opens applications to his last working points. His office door detected and recognized a colleague visiting his office multiple times before he arrived. Jash’s system opens this visitor’s messages automatically. AJ Health and Medicine Sonam is a nurse in an emergency room. A call has come in for a man wounded in an altercation. The system recognized the patient and pulls his records. On the scene, paramedic equipment captures critical information automatically sent to the receiving parties at the hospital. The system analyzes the new data and current records to deliver a guiding solution. The status of the patient is updated every second in the system during his transport. The system prompts Joan to approve system actions for medicine distribution and medical equipment preparation. AJ 16 8/6/2024 Marketing and Content Delivery AJ Other IoT applications… Air and Water Pollution Extreme Weather Commercial Farming AJ AJ 17 8/6/2024 AJ Tips to avoid IoT Mishaps Do not buy devices that are cheap and vulnerable. Do not trust blindly. Every device has its own defects. Only go for devices that offer security assurances. Ensure that the data you store is visible to only you. Enable private locks and security passwords. In case of open source data, do not leave the data unchecked. Never fail to use SSL layer and HTTPS protocol. Take care of your personal belongings where you have stored your IoT data. Example IMEI number There are several IoT wearable available. But choose only devices that are necessary to you, in your official or personal life. Never buy them just for the sake of experimenting. This could lead to trouble. Major IoT Security Issues Data Encryption Data should be encoded If you have stored bank details on smart watch then??? In wireless transmission use encoding technique Use SSL , protocols, firewall Data Authentication Student ID card for attendance If data is not mapped then it will map some other data Misuse of your data IoT Hardware Issues Cost Change of h/w cyber-attacks 18 8/6/2024 Major IoT Security Issues Hardware testing is inevitable Device range memory capacity Scalability configurability Security Managing updates Safe Storage tips to make your smart home more secure Give your router a name Use a strong encryption method for Wi-Fi Set up a guest network Change default usernames and passwords Use strong, unique passwords for Wi-Fi networks and device accounts Check the setting for your devices Disable features you may not need. Keep your software up to date. Audit the IoT devices already on your home network Do the two-step. (Authentication) Avoid public Wi-Fi networks. security measures you can take to help secure your devices internet security software for tabs, mobile, PC… strong and unique passwords Read privacy policy of apps Do your research before you buy Know what data the device or app wants to access on your phone Use a VPN firmware updates Social sharing features – not good Never leave your smartphone unattended 19 8/6/2024 IoT Attack The IoT attack surface is the sum total of all potential security vulnerabilities in IoT devices and associated software and infrastructure in a given network, be it local or the entire Internet. Internet of Things (IoT) devices were exploited by cybercriminals and turned into a rogue and malevolent army IoT’s are embedded with electronics, software, sensors and network connectivity so that they can connect to the internet. Modes of Attack Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks If you flood a website with more traffic than it was built to handle, you'll overload the website's server and it'll be nigh-impossible for the website to serve up its content to visitors who are trying to access it. Man-in-the-middle (MitM) attack 20 8/6/2024 Phishing and spear phishing attacks Phishing attack is the practice of sending emails that appear to be from trusted sources with the goal of gaining personal information or influencing users to do something. It combines social engineering and technical trickery. It could involve an attachment to an email that loads malware onto your computer. It could also be a link to an illegitimate website that can trick you into downloading malware or handing over your personal information. Password attack Because passwords are the most commonly used mechanism to authenticate users to an information system, obtaining passwords is a common and effective attack approach Brute-force password guessing means using a random approach by trying different passwords and hoping that one work Some logic dictionary attack Malware attack – Can you define them Quick? Macro viruses File infectors System or boot-record infectors Polymorphic viruses Stealth viruses Trojans Logic bombs Worms Time Bombs Ransomware 21 8/6/2024 List of possible errors for a system or What could be the reasons for a System to have gone blank and how would you Debug it? List of possible errors for a system or What could be the reasons for a System to have gone blank and how would you Debug it? - PC being overheated. - Dust having being accumulated all around. - CPU fans not working properly. - Faulty power connections. - Faulty circuit board from where the power is being drawn. - Support Drivers not having being installed.  Classroom 2000 To capture the live experiences of the occupants and to provide that record Examples! to users for later access and review content generation by instrumenting a room with the capabilities to automatically record a lecture Microphones and video cameras were stored in the ceiling  Smart Space and Meeting Room Sense ongoing human activities and respond them Digitised signals from two hundred microphones, five video cameras Two sets of tools are used to manage sensory data, NIST Smart Flow and Architecture and Tools for Linguistic Analysis System(ATLAS) Take dictation, record a transcript of the meeting , track individual speakers  Interactive Workspaces and iRoom Contained one or more large displays, ability to integrate proratble devices and create applications Emphasise co location (location awareness) Rely on social conventions to help make systems intelligible Wide applicability (interoperability) Keep it simple (intelligible) for user 22 8/6/2024 Smart Buildings and Home Automation Automation is increasingly used in building automation, such as light and climate control, control of doors and window shutters, security and surveillance systems, etc. used to control multi media home entertainment systems, automatic plant watering and Smart Buildings and Home pet feeders. Automation. Some control devices can be surface mounted, e.g., building lighting, etc.. They can be designed to switch on automatically when it gets dark or when movement or body heat is detected. In other cases, it may be best to design systems as part of the building. e.g., doors that open as people walk towards them and close afterwards Smart Livin Environments& Smart Furniture Several smart environment devices can adapt to human activities. Doors, lighting, taps and air ventilation can be designed to detect the presence of humans, to be activated by them and to adapt to them. Smart fridge behaves as a stock-control system MediaCup (Beigl et al., 2001) Smart chairs such as SenseChair (Forlizzzi et al., 2005) Smart clocks e.g., Microsoft wherabouts clock. Smart mirrors: can move to adapt view, e.g., as car moves, can overlay other information, can link to cameras. Smart wardrobe , smart bed, smart pillow Smart Mat, smart sofa (Park et al. 2003). Smart Street Furniture Street furniture refers to equipment installed on streets and roads such as benches, bollards, lighting, traffic lights, traffic signs, public transport stops, waste bins, taxi stands and fountains. Example:Street furniture typically utilises solar panels to supplement power. Traffic lights may also adapt to the traffic patterns rather than be timer driven. 23 8/6/2024 Smart Vehicles, Transport and Travel Embedded computer systems increasingly being used within vehicles. Improves operation such as automatically controlling or providing assisted control. Automatically guided vehicles along track Inform waiting passengers of the status of arriving & departing vehicles. Location determination for remote tracking of vehicles Access travel info. much more conveniently. Travel Tickets are also smarter – see smart cards. Access to Internet in moving smart vehicles. Project : Poster Presentation on following topics/ Research Paper Rules: Smart home 1) Group – 4 people Smart city 2) Format Title Wearable Introduction Objective of title Smart grid Working of model (Diagram) Idea / views of the same Connected car Future idea/ your own idea / concept /diagram Digital health Advantages to society Smart retail Smart farming Smart office Smart school AJ AJ 24 8/6/2024 Class Activity! What do you mean by TeleOperation? Justify the relation between teleoperation and IoT. How will you design Waste management using IoT Describe various features of IoT. 4fp4j4u AJ 25

Use Quizgecko on...
Browser
Browser