IoT Module 1 Note
IoT Module 1 Note
Module- 1
6. IoT Security
(i) Dynamic and Self-Adapting: IoT devices can adjust their behavior and
operations automatically based on changes in the environment or user
needs.
(ii) Self-Configuring: IoT devices can set themselves up and organize into
networks without human intervention.
(iv) Unique Identity: Every IoT device has a distinct identifier, like an IP
address, that distinguishes it from other devices.
Advantages of IoT:
Better Decision Making: IoT devices collect and analyze data in real-time,
helping businesses make more informed and timely decisions.
Applications of IoT:
Interfaces for Internet Connectivity: These are used for connecting the
device to the internet, enabling data exchange and communication with
other devices and services.
IoT Protocols:
Link Layer
802.3 – Ethernet:
Wired communication standard for local area networks (LANs).
802.11 – WiFi:
Wireless communication standard for connecting devices to networks
over short distances.
802.16 – WiMax:
Wireless broadband access standard, used for long-range
communication.
802.15.4 – LR-WPAN:
Low-rate wireless personal area network standard, used for low-power,
short-range communication (e.g., Zigbee).
2G/3G/4G:
Cellular network standards for mobile communication, providing wide-
area connectivity.
Network/Internet Layer
IPv4:
Internet Protocol version 4, widely used for addressing and routing
traffic on the internet.
IPv6:
Internet Protocol version 6, designed to replace IPv4, offering a larger
address space.
6LoWPAN:
IPv6 over Low-Power Wireless Personal Area Networks, enabling IPv6
communication over low-power, low-bandwidth networks.
Transport Layer
TCP:
Transmission Control Protocol, ensuring reliable, ordered, and error-
checked data transmission.
UDP:
User Datagram Protocol, offering faster, connectionless communication
with less overhead but no guarantee of delivery.
Application Layer
HTTP:
Hypertext Transfer Protocol, used for web communication.
CoAP:
Constrained Application Protocol, lightweight for constrained devices
and networks.
WebSocket:
Protocol enabling full-duplex communication over a single TCP
connection.
MQTT:
Message Queuing Telemetry Transport, a lightweight publish/subscribe
messaging protocol for IoT.
XMPP:
Extensible Messaging and Presence Protocol, used for real-time
communication.
DDS:
Data Distribution Service, real-time, publish/subscribe protocol for high-
performance IoT systems.
AMQP:
Advanced Message Queuing Protocol, a secure and reliable protocol for
enterprise-level messaging.
(I) Device
Functions:
(II) Communication
Responsible for data exchange within the IoT system and between the
system and external networks.
Functions:
(III) Services
Functions:
(IV) Management
Functions:
(V) Security
Functions:
Message and Content Integrity: Ensuring that the data has not been
tampered with during transmission.
(VI) Application
Functions:
User Control and Monitoring: Allows users to interact with the system,
control devices, and monitor their status.
Publishers are the source of data. Publishers send the data to the topics
which are managed by the broker. Publishers are not aware of the
consumers.
Consumers subscribe to the topics which are managed by the broker.
When the broker receives data for a topic from the publisher, it sends
the data to all the subscribed consumers.
Once the connection is setup, it remains open until the client sends a
request to close the connection.
Client and server can send messages to each other after connection
setup.
Key Features
Common Uses
Device Management: You can use REST APIs to add, update, or remove
IoT devices from a system.
Data Access: Fetch sensor readings or device statuses.
Configuration Changes: Change settings on devices remotely.
Two-Way Communication: Both the client and server can send messages
to each other at any time.
Low Latency: Because the connection stays open, messages can be sent
with very little delay.
Common Uses
Streaming Data: Useful for sending a constant stream of data, like video
or sensor readings
6. IoT Security
No Built-In Security: Many IoT devices were not designed with security in
mind, so they can be easily hacked.
Sensitive Data: IoT devices often send data over the internet without any
protection, which makes it easy for hackers to steal information.
Risk of Attacks: If IoT devices aren’t secured, hackers can break into
networks and steal data or cause other problems.
Data Encryption: Implement strong encryption for data both at rest and
in transit to prevent unauthorized access.