1 PDF
1 PDF
1 PDF
1.1 INTRODUCTION
The Internet of things (IoT) is the network of physical devices, vehicles, home appliances and
other items embedded.
Drawing representing the Internet of things (IoT) with electronics, software, sensors,
actuators, and connectivity which enables these objects to connect and exchange data. Each
thing is uniquely identifiable through its embedded computing system but is able to
interoperate within the existing Internet infrastructure.
Experts estimate that the IoT will consist of about 30 billion objects by 2020. It is also
estimated that the global market value of IoT will reach $7.1 trillion by 2020.
The IoT allows objects to be sensed or controlled remotely across existing network
infrastructure, creating opportunities for more direct integration of the physical world into
computer-based systems, and resulting in improved efficiency, accuracy and economic
benefit in addition to reduced human intervention. When IoT is augmented with sensors and
actuators, the technology becomes an instance of the more general class of cyber-physical
systems, which also encompasses technologies such as smart grids, virtual power plants,
smart homes, intelligent transportation and smart cities.
"Things," in the IoT sense, can refer to a wide variety of devices such as heart monitoring
implants, biochip transponders on farm animals, cameras streaming live feeds of wild animals
in coastal waters, automobiles with built-in sensors, DNA analysis devices for
environmental/food/pathogen monitoring, or field operation devices that assist firefighters in
search and rescue operations. Legal scholars suggest regarding "things" as an "inextricable
mixture of hardware, software, data and service".
These devices collect useful data with the help of various existing technologies and then
autonomously flow the data between other devices.
The term "the Internet of things" was coined by Kevin Ashton of Procter & Gamble, later
MIT's Auto-ID Center, in 1999.
1
9. IoT will exhibit a much higher level of heterogeneity
a) Objects of totally different in terms of functionality, technology and application fields
can communicate
The Internet of Things (IoT) is an important topic in technology industry, policy, and
engineering circles and has become headline news in both the specialty press and the popular
media. This technology is embodied in a wide spectrum of networked products, systems, and
sensors, which take advantage of advancements in computing power, electronics
miniaturization, and network interconnections to offer new capabilities not previously
possible. An abundance of conferences, reports, and news articles discuss and debate the
prospective impact of the “IoT revolution”—from new market opportunities and business
models to concerns about security, privacy, and technical interoperability.
Fundamentally, the Internet Society cares about the IoT as it represents a growing aspect of how
people and institutions are likely to interact with the Internet in their personal, social, and
economic lives. If even modest projections are correct, an explosion of IoT applications could
present a fundamental shift in how users engage with and are impacted by the Internet, raising
new issues and different dimensions of existing challenges across user/consumer concerns,
technology, policy and law. IoT also will likely have varying consequences in different economies
and regions, bringing a diverse set of opportunities and challenges across the globe.
2
CHAPTER:-2
HISTORY
2.1 HISTORY OF IOT
As of 2016, the vision of the Internet of things has evolved due to a convergence of multiple
technologies, including ubiquitous wireless communication, real time analytics, machine learning,
History commodity sensors, and embedded systems. This means that the traditional fields of
embedded systems, wireless sensor networks, control systems, automation (including home and
building automation), and others all contribute to enabling the Internet of things.
The concept of a network of smart devices was discussed as early as 1982, with a modified Coke
machine at Carnegie Mellon University becoming the first Internet-connected appliance, able to
report its inventory and whether newly loaded drinks were cold. Mark Weiser's seminal 1991
paper on ubiquitous computing, "The Computer of the 21st Century", as well as academic venues
such as Ubi Comp and Per Com produced the contemporary vision of IoT. In 1994 Reza Raji
described the concept in IEEE Spectrum as "[moving] small packets of data to a large set of
nodes, so as to integrate and automate everything from home appliances to entire factories".
Between 1993 and 1996 several companies proposed solutions like Microsoft's at
Work or Novell's NEST. However, only in 1999 did the field start gathering momentum. Bill
Joy envisioned Device to Device (D2D) communication as part of his "Six Webs"
framework, presented at the World Economic Forum at Davos in 1999.
The concept of the Internet of things became popular in 1999, through the Auto ID Center at
MIT and related market analysis publications. Radio-frequency identification (RFID) was
seen by Kevin Ashton (one of the founders of the original Auto-ID Center) as a prerequisite
for the Internet of things at that point. Ashton prefers the phrase "Internet for things." If all
objects and people in daily life were equipped with identifiers, computers could manage and
store them. Besides using RFID, the tagging of things may be achieved through such
technologies as near field communication, barcodes, QR codes and digital watermarking.
In its original interpretation, one of the first consequences of implementing the Internet of
things by equipping all objects in the world with minuscule identifying devices or
machinereadable identifiers would be to transform daily life. For instance, instant and
ceaseless inventory control would become ubiquitous. A person's ability to interact with
objects could be altered remotely based on immediate or present needs, in accordance with
existing end-user agreements. For example, such technology could grant motion-picture
publishers much more control over end user private devices by remotely enforcing copyright
restrictions and digital rights management, so the ability of a customer who bought a Blu-ray
disc to watch the movie could become dependent on the copyright holder's decision, similar
to Circuit City's failed DIVX.
A significant transformation is to extend "things" from the data generated from devices to objects
in the physical space. The thought-model for future interconnection environment was proposed in
2004. The model includes the notion of the ternary universe consists of the physical world, virtual
world and mental world and a multi-level reference architecture with the nature and devices at the
bottom level followed by the level of the Internet, sensor network, and mobile network, and
intelligent human-machine communities at the top level, which supports
3
geographically dispersed users to cooperatively accomplish tasks and solve problems by
using the network to actively promote the flow of material, energy, techniques, information,
knowledge, and services in this environment. This thought model envisioned the development
trend of the Internet of things.
4
CHAPTER: - 3
Internet of Things
3.1 WHAT IS THE IoT?
1. A new dimension added to world of information and communication technologies
(ICTs):
a) Anytime connectivity
b) Any place connectivity
c) For anyone
d) Connectivity for anything
2. Connections will multiply and create an entirely new dynamic network of networks
3.2 TECHNOLOGY
1. Depends on dynamic technical innovation like wireless sensors
2. Four kinds of technology basically used.
a) RFID (Radio-frequency identification)
b) Sensor technologies
c) Embedded intelligence
d) Nanotechnology
1. RFID
a) Item identification
5
b) Uses radio waves to identify items
c) Gives information about their location and status
2. Sensor technologies
a) Data collection
b) For example, sensors in an electronic jacket collect changes in external temperature
and parameters of jacket adjusted accordingly.
3. Embedded intelligence
a) Information processing
b) distribute processing power to the edges of network
c) empower things and devices independent decisions
4. Nanotechnology
a) Miniaturization
6
3.4 PROBLEMS AND CONCERNS
1. Technological standardization
a) Standardization is essential for mass deployment and diffusion of any technology
2. Protection of data and privacy
a) sensors and smart tags can track users’ movements, habits and ongoing preferences
7
3.5.2 Gateway and The Network Layer:
8
Fig 3.4: - Chart of IoT
4. Includes content providers (producers) and content users (consumers) that utilize the
Internet of Things and share benefits
5. New services and business innovation will be enabled by an enhanced Internet of
Things infrastructure
6. Companies, public institutions and people will access data for their own benefits and
financial as well as nonfinancial benefit
7. Key goals for Internet of Things architecture to achieve are:
a) An open, scalable, flexible and secure infrastructure
b) A user centric, customizable ‘Web of Things’
8. Interaction possibilities for the benefit of society
a) New dynamic business concepts
9. Flexible billing and incentive
b) Capabilities to promote information sharing 10.
Includes the following components:
a) Extended static data support:
11. There is a need to support all things that carry a unique
ID a) Integration of dynamic data:
12. A need to sense environmental conditions as well as the status of devices
13. Support for non IP devices:
9
CHAPTER: - 4
1. Data security – At the time of designing IoT companies should ensure that data
collection, storage and processing would be secure at all times. Companies should
adopt a “defense in depth” approach and encrypt data at each stage.
2. Data consent – users should have a choice as to what data they share with IoT
companies and the users must be informed if their data gets exposed.
3. Data minimization – IoT companies should collect only the data they need and retain
the collected information only for a limited time.
However, the FTC stopped at just making recommendations for now. According to an FTC
analysis, the existing framework, consisting of the FTC Act, the Fair Credit Reporting Act,
and the Children's Online Privacy Protection Act, along with developing consumer education
and business guidance, participation in multistakeholder efforts and advocacy to other
agencies at the federal, state and local level, is sufficient to protect consumer rights.
A resolution passed by the Senate in March 2015, is already being considered by the
Congress. This resolution recognized the need for formulating a National Policy on IoT and
the matter of privacy, security and spectrum. Furthermore, to provide an impetus to the IoT
ecosystem, in March 2016, a bipartisan group of four Senators proposed a bill, The
Developing Innovation and Growing the Internet of Things (DIGIT) Act, to direct the Federal
Communications Commission to assess the need for more spectrum to connect IoT devices.
Several standards for the IoT industry are actually being established relating to automobiles
because most concerns arising from use of connected cars apply to healthcare devices as well.
10
In fact, the National Highway Traffic Safety Administration (NHTSA) is preparing cyber
security guidelines and a database of best practices to make automotive computer systems
more secure.
A recent report from the World Bank examines the challenges and opportunities in
government adoption of IoT. These include
11
CHAPTER 5
5.2 Security
Concerns have been raised that the Internet of things is being developed rapidly without
appropriate consideration of the profound security challenges involved and the regulatory
changes that might be necessary.
Most of the technical security issues are similar to those of conventional servers, workstations
and smartphones, but the firewall, security update and anti-malware systems used for those
are generally unsuitable for the much smaller, less capable, IoT devices.
Network security will remain preferred solution for IoT security products, with sales anticipated
to account for nearly US$ 15,000 Mn by 2027-end. End-point/ device security will continue to be
the second largest solution for IoT security products. In addition, vulnerability management
solution for IoT security products will register fastest expansion through 2027.Revenues amassed
from smart grid, and home & building automation applications of IoT security products will
collectively account for revenues worth US$ 26,753.5 Mn by 2027end. According to the Business
Insider Intelligence Survey conducted in the last quarter of 2014, 39% of the respondents said that
security is the biggest concern in adopting Internet of things technology. In particular, as the
Internet of things spreads widely, cyber-attacks are likely to become an increasingly physical
(rather than simply virtual) threat. In a January 2014 article in Forbes, cyber-security columnist
Joseph Steinberg listed many Internet-connected appliances that can already "spy on people in
their own homes" including televisions, kitchen appliances, cameras, and thermostats. Computer-
controlled devices in automobiles such as brakes, engine, locks, hood and trunk releases, horn,
heat, and dashboard have been shown to be vulnerable to attackers who have access to the on-
board network. In some cases, vehicle computer systems are Internet-connected, allowing them to
be exploited remotely. By 2008 security researchers had shown the ability to remotely control
pacemakers without authority. Later hackers demonstrated remote control of insulin pumps and
implantable cardioverter defibrillators. David Pogue wrote that some recently published reports
about hackers remotely controlling certain functions of automobiles were not as serious as one
might otherwise guess because of various mitigating circumstances; such as the bug that allowed
the hack having been fixed
12
before the report was published, or that the hack required security researchers having
physical access to the car prior to the hack to prepare for it.
The U.S. National Intelligence Council in an unclassified report maintains that it would be
hard to deny "access to networks of sensors and remotely-controlled objects by enemies of
the United States, criminals, and mischief makers... An open market for aggregated sensor
data could serve the interests of commerce and security no less than it helps criminals and
spies identify vulnerable targets. Thus, massively parallel sensor fusion may undermine social
cohesion, if it proves to be fundamentally incompatible with Fourth-Amendment guarantees
against unreasonable search." In general, the intelligence community views the Internet of
things as a rich source of data.
As a response to increasing concerns over security, the Internet of Things Security
Foundation (IoTSF) was launched on 23 September 2015. IoTSF has a mission to secure the
Internet of things by promoting knowledge and best practice. Its founding board is made from
technology providers and telecommunications companies including BT, Vodafone,
Imagination Technologies and Pen Test Partners. In addition, large IT companies are
continuously developing innovative solutions to ensure the security for IoT devices. As per
the estimates from KBV Research, the overall IoT security market would grow at 27.9% rate
during 2016– 2022 as a result of growing infrastructural concerns and diversified usage of
Internet of things. In 2016, a distributed denial of service attack powered by Internet of things
devices running the Mirai malware took down a DNS provider and major web sites. In May
2017, Junade Ali, a Computer Scientist at Cloudflare noted that native DDoS vulnerabilities
exist in IoT devices due to a poor implementation of the Publish–subscribe pattern.
While security is a concern there are many things being done to protect devices. Device data
is following cryptographic standards and encryption is being used in end-to-end scenarios. To
help with this scenario x.509 certificates are also being used to verify device identity.
Security experts view Internet of things as a threat to the traditional Internet. Some argue that
market incentive to secure IoT devices is insufficient and increased governmental regulation
is necessary to make the Internet of things secure.
The overall understanding of IoT is essential for basic user security. Keeping up with current
antivirus software and patching updates will help mitigate cyber attacks.
13
Fig 5.1:- Challenge to IoT
These machines -- or things -- perform a range of tasks, relatively simple functions like
capturing images and uploading them to social sharing sites to capturing and transmitting
more complicated sensor data and sending real-time information on an organization's various
assets. Thanks to analytics, businesses now want the ability to, say, compare the current
condition of their assets compared with five years ago.
The impact on storage at first seems fairly obvious: There is more data to store. The less
obvious part is that machine-generated data comes in two distinct types, creating two entirely
different challenges. First, there is large-file data, such as images and videos captured from
smartphones and other devices. This data type is typically accessed sequentially. The second
data type is very small, for example, log-file data captured from sensors. These sensors,
while small in size, can create billions of files that must be accessed randomly.
14
CHAPTER 6
15
of the services and related services until they get safety guarantees.” This suggests that
consumers increasingly perceive privacy risks and security concerns to outweigh the value
propositions of IoT devices and opt to postpone planned purchases or service subscriptions.
16
CHAPTER 7
APPLICATIONS
17
7.2 Consumer application
A growing portion of IoT devices are created for consumer use. Examples of consumer
applications include connected car, entertainment, home automation (also known as smart
home devices), wearable technology, quantified self, connected health, and appliances such
as washer/dryers, robotic vacuums, air purifiers, ovens, or refrigerators/freezers that use Wi-
Fi for remote monitoring. Consumer IoT provides new opportunities for user experience and
interfaces.
7.3 Agriculture
The IoT contributes significantly towards innovating farming methods. Farming challenges
caused by population growth and climate change have made it one of the first industries to
utilize the IoT. The integration of wireless sensors with agricultural mobile apps and cloud
platforms helps in collecting vital information pertaining to the environmental conditions–
temperature, rainfall, humidity, wind speed, pest infestation, soil humus content or nutrients,
besides others – linked with a farmland, can be used to improve and automate farming
techniques, take informed decisions to improve quality and quantity, and minimize risks and
wastes. The app-based field or crop monitoring also lowers the hassles of managing crops at
multiple locations. For example, farmers can now detect which areas have been fertilized (or
mistakenly missed), if the land is too dry and predict future yields.
18
Fig 7.3: - Packaged Food Communicates with Microwave Oven.
7.4 Frameworks
IoT frameworks might help support the interaction between "things" and allow for more
complex structures like distributed computing and the development of distributed
applications. Currently, some IoT frameworks seem to focus on real time data logging
solutions, offering some basis to work with many "things" and have them interact. Future
developments might lead to specific software-development environments to create the
software to work with the hardware used in the Internet of things. Companies are developing
technology platforms to provide this type of functionality for the Internet of things. Newer
platforms are being developed, which add more intelligence.
REST is a scalable architecture that allows things to communicate over Hypertext Transfer
Protocol and is easily adopted for IoT applications to provide communication from a thing to
a central web server.
19
7.5 Smart Home
IoT devices are a part of the larger concept of home automation, also known as domotics.
Large smart home systems utilize a main hub or controller to provide users with a central
control for all of their devices. These devices can include lighting, heating and air
conditioning, media and security systems. Ease of usability is the most immediate benefit to
connecting these functionalities. Long term benefits can include the ability to create a more
environmentally friendly home by automating some functions such as ensuring lights and
electronics are turned off. One of the major obstacles to
Obtaining smart home technology is the high initial cost.
7.6 Media
Media use of the Internet of things is primarily concerned with marketing and studying
consumer habits. Through behavioral targeting these devices collect many actionable points
of information about millions of individuals. Using the profiles built during the targeting
process, media producers present display advertising in line with the consumer's known
habits at a time and location to maximize its effect. Further information is collected by
tracking how consumers interact with the content. This is done through conversion tracking,
drop off rate, and click through rate, registration rate and interaction rate. The size of the data
often presents challenges as it crosses into the realm of big data. However, in many cases
benefits gained from the data stored greatly outweighs these challenges.
20
Fig 7.6: - Real- World Awareness
21
Fig 7.7: - Allergy Checker
22
CHAPTER 8
As the Connected Life evolves, the number of mobile connections worldwide is set to rise
dramatically to reach 10.5 billion by 2020, while the total number of connected devices
across all access technologies could reach 25.6 billion1. These devices will bridge the
physical and digital worlds, enabling a new category of services that improve the quality of
life and productivity of individuals, society and enterprises.
This Internet of Things - a widely distributed, locally intelligent network of smart devices -
will enable extensions and enhancements to fundamental services in education, health and
other sectors, as well as providing a new ecosystem for application development.
By enabling devices to communicate with each other independently of human interaction, the
Internet of Things will open up new revenue streams, facilitate new business models, drive
efficiencies and improve the way existing services across many different sectors are
delivered. It will represent a very important demand-side stimulus that helps finance the
deployment of mobile broadband networks around the world. In total, the positive impact on
the global economy could be as much as US$4.5 trillion per annum, according to a study by
Machina Research.
In 2013, M2M connections accounted for 2.8% of global mobile connections (195 million),
indicating that the sector is still at a relatively early stage in its development. There are
significant regional variations between more established markets, such as Europe, North
America and Oceania, where M2M’s share of total connections exceeds the global average,
and rapidly developing markets, such as Asia, which have experienced annual growth of 55%
a year between 2010 and 20132.
23
Figure 8.1: M2M connections by region
As of January 2014, 428 mobile operators offered M2M services across 187 countries,
equivalent to four out of ten mobile operators worldwide. The highest proportion of operators
offering M2M services are in Europe, where about two-thirds of operators have an M2M
offering. This compares to just under half of operators in the Americas, Asia and Oceania.
Market forecasts indicate that by 2020, the number of connected devices in the world will
almost triple from more than nine billion today to 25.6 billion. Of these, 10.5 billion will
connect using mobile technology, with a dedicated SIM and a connection to a mobile
network3. The remaining devices will use alternative communication technologies, such as
short-range radio connections to a communications gateway, Wide Area Network (WAN)
radio, fixed line telecommunications or Wi-Fi networks.
Consumer and socio-economic impact Pervasive connectivity between people and processes will
enable multiple services to be delivered automatically and contextually, whenever and wherever
required, ushering in the Connected Life. Supported by cross-industry collaboration,
24
the Connected Life will have a positive impact on many sectors of the economy, such as
automotive, shipping and logistics, healthcare and utilities, potentially benefitting billions of
people globally.
As the Connected Life will have a fundamental impact on the way we live and work, there
will also be major social and environmental benefits, such as improved healthcare, safer and
more efficient transportation and logistics, better education and more efficient use of energy.
With the ability to capture real-time usage information and provide remote control, embedded
mobile connectivity can make a wide range of devices, machines and vehicles more efficient
and effective, dramatically reducing waste and improving time productivity.
Such services will also contribute to economic growth by creating new business opportunities
for mobile operators, equipment vendors and other players in the mobile ecosystem as well as
in adjacent industries. They will represent a very important demand-side stimulus that helps
25
finance the deployment of upgraded mobile networks able to provide IOT and broadband
connectivity around the world.
The connected devices market will open-up new revenue streams, facilitate new business
models, drive efficiencies and improve the way existing services across many different
sectors are delivered.
The global business impact of the Connected Life can be split into two broad categories:
‘new revenue opportunities’ and ‘cost reduction and service improvements’6:
1. In 2020, revenues from the sale of connected devices and services, and revenues from
related services, such as pay-as-you-drive car insurance, will be worth US$2.5 trillion,
US$1.2 trillion of which could be addressed by mobile operators and the remainder
by the broader Connected Life ecosystem.
2. Cost reductions and service improvements relate to less direct, but tangible, benefits
to organisations, governments and consumers through the evolution of the
Connected Life. In 2020, this could be worth approximately US$2 trillion: US$1
trillion from cost reductions, such as smart meters removing the need for manual
meter readings; and US$1 trillion from service improvements, such as clinical
remote monitoring for patients with chronic illnesses.
Operators are already taking the lead in supporting such global service launches in early
market categories such as automotive, health and consumer electronics. With the emergence
of new products in adjacent categories such as healthcare, wearable and consumer electronics
the importance of the ability to support large-scale global deployments is likely to accelerate.
The template for an M2M roaming annex to existing roaming agreements, developed by the
GSMA in 2012, is already being utilised by operators and serves as a prime example of an
approach that affords the opportunity to reduce fragmentation while allowing the
identification and differentiation of connected IoT devices.
26
8.4 IoT is employing innovative new commercial models
In order to bring new services to market, mobile operators are partnering with adjacent
industry organizations and jointly developing innovative IoT services targeted at the end
consumer. A variety of commercial models are becoming more prominent, such as business
to business to consumer (B2B2C) propositions where the end service is marketed by the
adjacent industry partner who owns the end customer relationship. For example, a mobile
operator could partner with a utilities company for smart metering capabilities, who then
provides energy services to the end consumer. Figure 10 compares the B2B2C model with the
traditional Business to Consumer (B2C) model which is primarily used when operators are
selling voice and data communications services on mobile phones to consumers.
Along with partnering with the leading organizations in adjacent industry sectors, mobile
operators may also need to address the ‘long tail’ of smaller companies, who wish to develop
mobile-enabled services, in an economically viable manner. Standardized enablers, such as
Application Programming Interfaces (APIs), which expose mobile network assets or
management platforms, need to be developed to achieve this. Such enablers will allow mobile
operators to support and monetize relationships with a great number of industry partners from
a wide variety of adjacent sectors.
27
Chapter – 9
Challenges of the Iot
The Internet of Things (IoT) — a universe of connected things providing key physical data
and further processing of that data in the cloud to deliver business insights— presents a huge
opportunity for many players in all businesses and industries . Many companies are
organizing themselves to focus on IoT and the connectivity of their future products and
services. For the IoT industry to thrive there are three categories of challenges to overcome
and this is true for any new trend in technology not only IoT: technology, business and society
9.1 Technology
This part is covering all technologies needed to make IoT systems function smoothly as a
standalone solution or part of existing systems and that’s not an easy mission, there are many
technological challenges, including Security, Connectivity, Compatibility & Longevity,
Standavrds and Intelligent Analysis & Actions
9.2 Security
IoT has already turned into a serious security concern that has drawn the attention of
prominent tech firms and government agencies across the world. The hacking of baby
monitors, smart fridges, thermostats, drug infusion pumps, cameras and even the radio in your
car are signifying a security nightmare being caused by the future of IoT. So many new nodes
being added to networks and the internet will provide malicious actors with innumerable
attack vectors and possibilities to carry out their evil deeds, especially since a considerable
number of them suffer from security holes.
The more important shift in security will come from the fact that IoT will become more
ingrained in our lives. Concerns will no longer be limited to the protection of sensitive
information and assets. Our very lives and health can become the target of IoT hack attacks .
There are many reasons behind the state of insecurity in IoT. Some of it has to do with the industry
being in its “gold rush” state, where every vendor is hastily seeking to dish out the next
28
innovative connected gadget before competitors do. Under such circumstances, functionality
becomes the main focus and security takes a back seat.
9.3 Connectivity
Connecting so many devices will be one of the biggest challenges of the future of IoT, and it
will defy the very structure of current communication models and the underlying technologies.
At present we rely on the centralized, server/client paradigm to authenticate, authorize and
connect different nodes in a network.
This model is sufficient for current IoT ecosystems, where tens, hundreds or even thousands
of devices are involved. But when networks grow to join billions and hundreds of billions of
devices, centralized systems will turn into a bottleneck. Such systems will require huge
investments and spending in maintaining cloud servers that can handle such large amounts of
information exchange, and entire systems can go down if the server becomes unavailable.
The future of IoT will very much have to depend on decentralizing IoT networks. Part of it
can become possible by moving some of the tasks to the edge, such as using fog computing
models where smart devices such as IoT hubs take charge of mission-critical operations and
cloud servers take on data gathering and analytical responsibilities .
Other solutions involve the use of peer-to-peer communications, where devices identify and
authenticate each other directly and exchange information without the involvement of a
broker. Networks will be created in meshes with no single point of failure. This model will
have its own set of challenges, especially from a security perspective, but these challenges can
be met with some of the emerging IoT technologies such as Blockchain.
9.5 Standards
Technology Standards which include network protocols, communication protocols, and data-
aggregation standards, are the sum of all activities of handling, processing and storing the data
collected from the sensors. This aggregation increases the value of data by increasing, The
scale, scop, and and frequency of data available for analysis.
29
FUTURE SCOPES
Internet of Things is not something new and its been there in the industry for a long time. Like
Airforce, Army, Navy, Space research etc.
Anything that touches consumer industry became a buzz word. So now Internet of Things is
one among. What it is - the end goals is to bring all things we use in day to day life over
network and can be accessed across the world over internet. That means every objects/gadgets
we use in a day to day life will have a identify over network and its information can be
consumes via Laptop, Tablet and mobile and including wearable like smart watches.
c) Utility:
IOT will make a digital revolution in all the fields. It will make daily life easier with
availability of technology which will be user friendly. According to Xing Zhihao, Zhong
Yongfeng, the power companies would read meters through telemetering systems instead of
visiting houses; doctors would remotely monitor the conditions of their patients 24/7 by
having the patients use devices at home instead of requiring the patients to stay at hospital;
vehicle mounted terminals automatically display the nearest parking space; sensors in smart
homes turn off utilities, close windows, monitor security, and report to house owners in real
time. These are scenarios that only existed in science fiction previously. With the coming of
age of the Internet of Things, however, they would become a reality
d) Information:
In future, internet access will be much faster than what we think; we will get the answers by
just thinking about it. One can access internet anywhere any time without any expensive
gadgets and gizmos.
30
Chapter 10
CONCLUSION
The thought of always being tracked and your data being recorded does bring a fear to a
consumer’s mind, but we have to move away from it to see the benefits that this great
technology is going to bring to us. The above examples were about a 'connected you', making
your life seamless, but it brings with it higher benefits like connected cities, better commerce
and an improved ecosystem. As often happens, history is repeating itself. Just as in the early
days when Cisco’s tagline was “The Science of Networking Networks,” IoT is at a stage
where disparate networks and a multitude of sensors must come together and interoperate
under a common set of standards. This effort will require businesses, governments, standards
organizations, and academia to work together toward a common goal. Next, for IoT to gain
acceptance among the general populace, service providers and others must deliver
applications that bring tangible value to peoples’ lives. IoT must not represent the
advancement of technology for technology’s sake; the industry needs to demonstrate value in
human terms. In conclusion, IoT represents the next evolution of the Internet. Given that
humans advance and evolve by turning data into information, knowledge, and wisdom, IoT
has the potential to change the world as we know it today—for the better. How quickly we
get there is up to us.
31
REFERENCE
1. https://en.wikipedia.org/wiki/Internet_of_things
2. https://techbeacon.com/app-dev-testing/67-open-source-tools-resources-iot
3. https://www.raspberrypi.org/documentation/usage/python/
4. https://www.researchgate.net/publication/26388489_An_Introduction_to_Face_Rec
ognition_Technology
5. https://engineering.eckovation.com/what-are-network-topology-in-iot/
32