1. Introduction/IOT/Sangeetha K/CSE/SNSCT
IDENTIFICATION OF IoT OBJECTS AND SERVICE
▪ Definition
various types of identifiers with different purposes.
Identification codes can be classified as
(i) object IDs (OIDs)
radio frequency identification (RFID)/
electronic product code (EPC),
content ID,
telephone number, and uniform resource identifier
(URI)/uniform resource locator (URL);
(ii) communication IDs.
media access control (MAC) address, network layer/IP address, and
session/protocol ID
2. Introduction/IOT/Sangeetha K/CSE/SNSCT
▪ It is also desirable as well as feasible for all end-point network locations and/or
intermediary-point network locations to have a durable, unique network address (NAdr)
Every object then has a tuple (OID, NAdr) that is always unique, although the second
entry of the tuple may change with time, location, or situation
*non-variable, or mostly static environment,, to assign the OID to be identical to the
NAdr where the object is expected to attach to the network; that is, the object inherits
the tuple (NAdr, NAdr)
4. Introduction/IOT/Sangeetha K/CSE/SNSCT
RFID Senso
r
Smart
Tech
Nano
Tech
To identify
and track
the data of
things
To collect and
process the
data to detect
the changes
in the physical
status of
things
To enhance the
power of the
network by
evolving
processing
capabilities to
different part of
the network.
To make the
smaller and
smaller things
have the
ability to
connect and
interact.
Enabling Technologies
5. Introduction/IOT/Sangeetha K/CSE/SNSCT
Benefits of IoT
IoT offers a number of benefits to organizations, enabling them
to:
1. Monitor their overall business processes;
2. Improve the customer experience;
3. Save time and money;
4. Enhance employee productivity;
5. Integrate and adapt business models;
6. Make better business decisions;
7. Generate more revenue.
6. Introduction/IOT/Sangeetha K/CSE/SNSCT
Consumer and enterprise IoT applications
Source:
https://internetofthi
ng
sagenda.techtarge
t.c
om/definition/Inter
net
-of-Things-IoT
7. Introduction/IOT/Sangeetha K/CSE/SNSCT
The Smart World of the future – using IoT
Source:
https://www.forbes.
c
om/sites/jacobmor
ga
n/2014/05/13/simp
le-
explanation-interne
t-
things-that-anyone-
can-
understand/#ef243
3f
1d091
8. Introduction/IOT/Sangeetha K/CSE/SNSCT
ITU-T Views
International Telecommunications Union – Telecommunications
The ITU-T is in the process of identifying a common way to
define/describe the IoT.
Infrastructure View - Internet as an infrastructure provide a number
of technological capabilities.
Concept View - Internet as an concept provide an array of data
exchange and linkage services.
View A: IoT is just a concept (conceptual aspects of definition)
View B: IoT is an infrastructure: The IoT refers to an infrastructure.
10. Introduction/IOT/Sangeetha K/CSE/SNSCT
Sample: consumer IoT products & Services
1. Helmet Concussion Sensor
2. Medical Alert Watch
3. Smart Fitness Clothing and Smart Running Shoes
4. One-Button Product Purchases: “Order at the click of a button!” Amazon has taken that
phrase literally and produced physical branded buttons called Amazon Dash that link to
products in your home. Say you run out of laundry powder. You can press your Dash button
for Tide and Amazon will reorder your Tide Powder product for you. No need to sign onto the
Web, fumble with payment methods, or retype credit card numbers.
5. Garden Sensors
6. Smart Televisions
11. Introduction/IOT/Sangeetha K/CSE/SNSCT
Helmet concussion sensor
https://www.amazon.com/Shoc
k
box-LM2004-EXT-MultiSport-
Helmet-
Sensor/dp/B00DVHA1LM?impr
T
oken=NXcTrCppNfgrAo2MA1K
7
i
g&slotNum=2&SubscriptionId
=A
KIAIO22DD3AFUSKXUKQ&tag=
makeusw-
20&linkCode=xm2&camp=20
25
&creative=165953&creativeAS
IN
=B00DVHA1LM
14. Introduction/IOT/Sangeetha K/CSE/SNSCT
Connected car story
Source:
https://www.businessinsider.com/connected-c
ar-
statistics-manufacturers-2015-2?IR=T
The connected car is equipped with internet
connections and software that allow people to
stream music, look up movie times, be alerted
of traffic and weather conditions, and even
power driving-assistance services such as self-
parking.
15. Introduction/IOT/Sangeetha K/CSE/SNSCT
Shopping
Experience
S
(2) When shopping in the market, the
goods
(1) When entering the doors, scanners
will identify the tags on her clothing.
(4) When paying for the goods, the
microchip of
the credit card will communicate with checkout
reader.
(3) When moving the goods, the
reader will tell the staff to put a
16. Introduction/IOT/Sangeetha K/CSE/SNSCT
Smart farming: Use of IoT to improve agriculture
In IoT-based smart farming, a system is built for monitoring the crop field with the help of
sensors (light, humidity, temperature, soil moisture, etc.) and automating the irrigation
system. The farmers can monitor the field conditions from anywhere. This is highly
efficient compared to the
traditional/conventional approach.
In terms of environmental issues, IoT-based smart farming provides great benefits
including: and efficient water usage, and optimization of inputs and treatments.
bette
r
Therefore, smart farming based on IoT technologies enables growers and farmers to reduce
waste and enhance productivity.
Some of the IoT applications in this area are:
i. Precision farming
ii. Agricultural drones
iii. Livestock monitoring
iv. Smart greenhouses
17. Introduction/IOT/Sangeetha K/CSE/SNSCT
Industrial Iot (IIoT)
Industrial IoT (IIoT) focusses on the use of cyber-physical systems to monitor the physical
factory processes and make data-based automated decisions.
While the physical systems are made the intelligent using IoT, the real-time
communication, and cooperation both with each other and with humans is established via
the wireless web
IIoT brings in the concept of ‘a connected factory leads to a smart factory’.
18. Introduction/IOT/Sangeetha K/CSE/SNSCT
IIoT in
Manufacturing
1. Digital/connected factory: IoT enabled machinery can transmit operational information
to the partners like original equipment manufacturers and to field engineers.
2. Facility management: The use of IoT sensors in manufacturing equipment enables
condition- based maintenance alerts.
3. Production flow monitoring: IoT in manufacturing can enable the monitoring of production
lines starting from the refining process down to the packaging of final products.
4. Inventory management: IoT applications permit the monitoring of events across a supply
chain.
19. Introduction/IOT/Sangeetha K/CSE/SNSCT
IIoT in Manufacturing
5. Plant Safety and Security: IoT combined big data analysis can improve the overall workers’
safety and security in the plant. .
6. Quality control: IoT sensors collect aggregate product data and other third-party syndicated
data
from various stages of a product cycle.
7. Packaging Optimization: By using IoT sensors in products and/or packaging, manufacturers
can gain insights into the usage patterns and handling of product from multiple customers.
8. Logistics and Supply Chain Optimization: The Industrial IoT (IIoT) can provide access to real-
time supply chain information by tracking materials, equipment, and products as they move
through the supply chain.
20. Introduction/IOT/Sangeetha K/CSE/SNSCT
IOT CHALLENGES
Security, privacy and data sharing issues
Because IoT devices are closely connected, all a hacker has to do is exploit one
vulnerability to
manipulate all the data, rendering it unusable. And manufacturers that don't update their devices
regularly -- or at all -- leave them vulnerable to cybercriminals.
However, hackers aren't the only threat to the internet of things; privacy is another major concern
for IoT users. For instance, companies that make and distribute consumer IoT devices could
use those devices to obtain and sell users' personal data.
Challenges with IIoT:
i. Security of data – same as above
ii. Reliability and stability – of IIoT sensors
iii. Connectivity of all the systems in IIoT setup – no maintenance envisioned?
iv. Blending legacy systems – IIoT is new in the market
22
21. Introduction/IOT/Sangeetha K/CSE/SNSCT
What NEEDS TO be done?
1. Consumer education
2. Product reviews and comparisons
3. Vulnerability disclosure and vulnerability markets
4. Self-certification and voluntary codes of practice
5. Trust marks and labels like Internet Society’s Online Trust Alliance (OTA) IoT Trust
Framework
6. Government initiatives
7. Mandated security requirements
8. Mandated certification
9. Liability reform
10. Etc.
11. No intervention!?
23. Introduction/IOT/Sangeetha K/CSE/SNSCT
The future of IoT
Bain & Company expects annual IoT revenue of hardware and software to exceed $450
billion by 2020.
McKinsey & Company estimates IoT will have an $11.1 trillion impact by 2025.
IHS Markit believes the number of connected IoT devices will increase 12% annually to reach
125 billion in 2030.
Gartner assesses that 20.8 billion connected things will be in use by 2020, with total spend
on IoT devices and services to reach $3.7 trillion in 2021.
By 2023, the average CIO will be responsible for more than three times as many endpoints as
this year
– Gartner
Garter forecasts that worldwide IoT Security Spending will be 3.11 billion by 2021 largely
driven by regulatory compliance.
Great improvements in the security of IoT devices driven by manufacturers’ own initiatives
as well users’ demand for better secure devices.
Global manufacturers will use analytics data recorded from connected devices to analyze
processes
and identify optimization possibilities, according to IDC and SAP.
Business Insider forecasts that by 2020, 75 percent of new
cars will come with built-in IoT connectivity.
25. Introduction/IOT/Sangeetha K/CSE/SNSCT
Basic Nodal Capabilities
Remote device generally needs to have a basic protocol stack
Basic protocol supports as minimum local connectivity and
networking connectivity.
In addition some higher layer application support protocols are
generally needed
27. Introduction/IOT/Sangeetha K/CSE/SNSCT
Retransmission – Network recovers from packet loss or informs application
Recovery is immediate: on the order of RTTs, not second
Network independent of MAC/PHY
Scale – Thousands of nodes – Multiple link speed
Multicast – Throughout network – Reliable (positive Ac)
Duplicate suppression
Emergency messages – Routed and/or queued around other traffic – Other traffic slushed
as delivered
Polling of nodes
Capabilities – Discover nodes – Discover node capabilities – Deliver multisegment records
Simple publish/subscribe parsers
Security –
Strong encryption
Mutual authentication –
Protection against record/playback attacks –
Suite B ciphers
28. Introduction/IOT/Sangeetha K/CSE/SNSCT
IoT FRAMEWORKS
The HLSA (high level M2M system architecture) comprises of
the device and gateway domain
the network domain
the applications domain.
IoT FRAMEWORKS
The device and gateway domain is composed of the following
elements:
1. M2M device: A device that runs M2M application(s) using M2M
service capabilities. M2M devices connect to network domain in the
following manners:
Case 1 “Direct Connectivity”:M2Mdevices connect to the
network domain via the access network.
Case 2 “Gateway as a Network Proxy”: The M2M device
connects to the network domain via an M2M gateway.
2. M2M area network: It provides connectivity between M2M
devices and M2M gateways
3. M2M gateway: A gateway that runs M2M application(s) using M2M service capabilities.
31. Introduction/IOT/Sangeetha K/CSE/SNSCT
The network domain is composed of the following elements:
1.Access network: A network that allows the M2M device and gateway domain to communicate with the core
network.
2. Core network: A network that provides the following :
– IP connectivity - minimum and possibly other connectivity means
– Service and network control functions
– Interconnection (with other networks)
– Roaming
3. M2M service capabilities:
– Provide M2M functions - to be shared by different applications
– Expose functions through a set of open interfaces
– Use Core Network functionalities
– Simplify and optimize application development and deployment through hiding of network specificities
The applications domain is composed of the following elements:
M2M applications: Applications that run the service logic and use M2M service capabilities accessible via an
open interface.
Other management functions within an overall M2M service provider domain, as follows:
Network management functions - functions required to manage the access and core networks
M2M management functions - required to manage M2M service capabilities in the network domain
32. Introduction/IOT/Sangeetha K/CSE/SNSCT
Physical Design of IoT
Things/Devices are used to build a connection, process
data, provide interfaces, provide storage, and provide
graphics interfaces in an IoT system
Protocols that are used to establish
communication between the Node devices and
servers over the internet.
39. Introduction/IOT/Sangeetha K/CSE/SNSCT
IoT Levels & Deployment Templates
Developing an IoT Level Template system consists of the following components:
1. Device: These may be sensors or actuators capable of identifying, remote sensing, or
monitoring.
2. Resources: These are software components on IoT devices for accessing and processing.
storing software components or controlling actuators connected to the device. Resources
also include software components that enable network access.
3. Controller Service: It is a service that runs on the device and interacts with web services.
The controller service sends data from the device to the web service and receives
commands from the application via web services for controlling the device.
4. Database: Stores data generated from the device
5. Web Service: It provides a link between IoT devices, applications, databases, and analysis
components.
6. Analysis Component: It performs an analysis of the data generated by the lol device and
generates results in a form which are easy for the user to understand.
7. Application: It provides a system for the user to view the system status and view product
data. It also allows users to control and monitor various aspects of the IoT system.
41. Introduction/IOT/Sangeetha K/CSE/SNSCT
IoT level 2
A node performs sensing/actuation and local analysis. Data is stored in the cloud. this level is
facilitated where the data involved is big and primary analysis is not comprehensive
42. Introduction/IOT/Sangeetha K/CSE/SNSCT
IoT level 3
At this level, the application is cloud-based. A single node monitors the environment
and stores data in the cloud. This is suitable where data is comprehensive and analysis
1 computationally intensive.
43. Introduction/IOT/Sangeetha K/CSE/SNSCT
IoT level 4
At this level, Multiple nodes collect information and store it in the cloud. Local and rent server
nodes are used to grant and receive information collected in the cloud from various devices.
Observer nodes can process information and use it for applications but not perform control
functions, This level is the best solution where data involvement is big, requirement analysis is
comprehensive and multiple nodes are required,
44. Introduction/IOT/Sangeetha K/CSE/SNSCT
IoT level 5
In this level Nodes present locally are of two types end Nodes and coordinator nodes. End nodes
collect data and perform sensing or actuation or both. Coordinator nodes collect data from end
nodes and send it to the cloud. Data is stored and analyzed in the cloud. This level is best for
WSN, where the data involved is big and the requirement analysis is comprehensive.
45. Introduction/IOT/Sangeetha K/CSE/SNSCT
IoT Level-6
At this level, the application is also cloud-based and data is stored in the cloud-like of levels.
Multiple independent end nodes perform sensing and actuation and send d to the cloud. The
analytics components analyze the data and store the results in the cloud database. The results
are visualized with a cloud-based application. The centralized controller is aware of the status
of all the end nodes and sends control commands to the nodes.
49. Introduction/IOT/Sangeetha K/CSE/SNSCT
1.Daniel Minoli, Building the Internet of Things with IPv6 and MIPv6: The Evolving
W orld of M2M Communications, Wiley Publications, First Edition, 2013. (UNIT I-
IV)
2. Arsheep Bahga , Vijay Madisetti , Internet of Things: A Hands-On Approach,
Universities Press, First Edition , 2014.(UNIT I & V)
References :
06/08/2020
226