Iot Notes
Iot Notes
Iot Notes
Introduction - Definition and Characteristics of IoT - Physical design - IoT Protocols - Logical
design - IoT communication models, IoT Communication APIs - Enabling technologies - Wireless
Sensor Networks, Cloud Computing, Big data analytics, Communication protocols, Embedded
Systems, IoT Levels and Templates - Domain specific IoTs - IoT Architectural view.
1.1 Introduction
The Internet of Things represents the whole way from collecting data, processing it, taking an
action corresponding to the signification of this data to storing everything in the cloud. All this is
made possible by the internet
The Internet of things has become a very widely spread concept in the last few years. The reason for
this is mainly the need to computerize and control most of the surrounding objects and have access
to data in real time.
Example: Parking sensors, about phones which can check the weather and so on
A dynamic global n/w infrastructure with self configuring capabilities based on standard and
interoperable communication protocols where physical and virtual ―things‖ have
identities, physical attributes and virtual personalities and use intelligent interfaces, and are
seamlessly integrated into information n/w, often communicate data associated with users and
their environments.
Characteristics of IoT
i)Dynamic & Self Adapting:
IoT devices and systems may have the capability to dynamically adapt with the changing
contexts and take actions based on their operating conditions, user‘s context or sensed
environment.
Eg: The surveillance system comprising of a number of surveillance cameras. The
surveillance camera can adapt modes based on whether it is day or night. The surveillance
system is adapting itself based on context and changing conditions. ii)Self Configuring:
IOT devices have self configuring capability,allowing a large number of devices to work
together to provide certain functionality. These devices have the ability configure
themselves setup networking, and fetch latest software upgrades with minimal manual or
user interaction.
iii) Inter Operable Communication Protocols: support a number of interoperable
communication protocols and can communicate with other devices and also with
infrastructure.
iv) Unique Identity: Each IoT device has a unique identity and a unique
identifier(IP address).
v) Integrated into Information Network: that allow them to communicate and exchange
data with other devices and systems.
Applications of IoT:
1) Home
2) Cities
3) Environment
4) Energy
5) Retail
6) Logistics
7) Agriculture
8) Industry
9) Health &LifeStyle
The "Things" in IoT usually refers to IoT devices which have unique identities and can perform remote
sensing, actuating and monitoring capabilities.
IoT devices can:
Exchange data with other connected devices and applications (directly or indirectly), or
Collect data from other devices and process the data locally or
Send the data to centralized servers or cloud-based application back-ends for processing the data,
Perform some tasks locally and other tasks within the IoT infrastructure, based on temporal and
space constraints
Generic block diagram of an IoT Device
• An IoT device may consist of several interfaces for connections to other devices, both wired and wireless.
• I/O interfaces for sensors
• Interfaces for Internet connectivity
• Memory and storage interfaces
• Audio/video interfaces.
IoT Protocols:
a) Link Layer :
Protocols determine how data is physically sent over the network‘s physical layer or medium. Local
network connect to which host is attached. Hosts on the same link exchange data packets over the
link layer using link layer protocols. Link layer determines how packets are coded and signalled by
the h/w device over the medium to which the host is attached.
Protocols:
802.3-Ethernet: IEEE802.3 is collection of wired Ethernet standards for the link layer. Eg: 802.3 uses co-
axial cable; 802.3i uses copper twisted pair connection; 802.3j uses fiber optic connection; 802.3ae uses
Ethernet overfiber.
802.11-WiFi: IEEE802.11 is a collection of wireless LAN(WLAN) communication standards including
extensive description of link layer. Eg: 802.11a operates in 5GHz band, 802.11b and 802.11g operates in
2.4GHz band, 802.11n operates in 2.4/5GHz band, 802.11ac operates in 5GHz band, 802.11ad operates in
60Ghzband.
802.16 - WiMax: IEEE802.16 is a collection of wireless broadband standards including exclusive
description of link layer. WiMax provide data rates from 1.5 Mb/s to 1Gb/s.
802.15.4-LR-WPAN: IEEE802.15.4 is a collection of standards for low rate wireless personal area
network(LR-WPAN). Basis for high level communication protocols such as ZigBee. Provides data rate from
40kb/s to250kb/s.
2G/3G/4G-Mobile Communication: Data rates from 9.6kb/s(2G) to up to100Mb/s(4G). B)
b) Network/Internet Layer:
Responsible for sending IP datagrams from source n/w to destination n/w. Performs the host
addressing and packet routing. Datagrams contains source and destination address.
Protocols:
IPv4: Internet Protocol version4 is used to identify the devices on a n/w using a hierarchical addressing
scheme. 32 bit address. Allows total of 2*32addresses.
IPv6: Internet Protocol version6 uses 128 bit address scheme and allows 2*128 addresses.
6LOWPAN:(IPv6 over Low power Wireless Personal Area Network) operates in 2.4 GHz frequency
range and data transfer 250 kb/s.
c) Transport Layer:
Provides end-to-end message transfer capability independent of the underlying n/w. Set up on
connection with ACK as in TCP and without ACK as in UDP. Provides functions such as error
control, segmentation, flow control and congestion control.
Protocols:
TCP: Transmission Control Protocol used by web browsers(along with HTTP and HTTPS),
email(along with SMTP, FTP). Connection oriented and stateless protocol. IP Protocol deals with sending
packets, TCP ensures reliable transmission of protocols in
order. Avoids n/w congestion and congestioncollapse.
UDP: User Datagram Protocol is connectionless protocol. Useful in time sensitive
applications, very small data units to exchange. Transaction oriented and stateless
protocol. Does not provide guaranteed delivery.
d) Application Layer:
Defines how the applications interface with lower layer protocols to send data over the n/w. Enables
process-to-process communication using ports.
Protocols:
HTTP: Hyper Text Transfer Protocol that forms foundation of WWW. Follow requestresponse model
Stateless protocol.
CoAP: Constrained Application Protocol for machine-to-machine(M2M) applications with
constrained devices, constrained environment and constrained n/w. Uses client-server architecture.
WebSocket: allows full duplex communication over a single socket connection.
MQTT: Message Queue Telemetry Transport is light weight messaging protocol based on publish-
subscribe model. Uses client server architecture. Well suited for constrained environment.
XMPP: Extensible Message and Presence Protocol for real time communication and streaming XML
data between network entities. Support client-server and server-server communication.
DDS: Data Distribution Service is data centric middleware standards for device-to-device or
machine-to-machine communication. Uses publish-subscribe model.
AMQP: Advanced Message Queuing Protocol is open application layer protocol for business
messaging. Supports both point-to-point and publish-subscribe model.
Refers to an abstract represent of entities and processes without going into the low level specifies of
implementation.
1) IoT Functional Blocks
2) IoT Communication Models
3) IoT Comm. APIs
Provide the system the capabilities for identification, sensing, actuation, communication and management
Device: An IoT system comprises of devices that provide sensing, actuation, monitoring and control
functions.
Communication: handles the communication for IoT system.
Services: for device monitoring, device control services, data publishing services and services for
device discovery.
Management: Provides various functions to govern the IoT system.
Security: Secures IoT system and priority functions such as authentication, authorization, message
and context integrity and data security.
Application: IoT application provide an interface that the users can use to control and monitor
various aspects of IoT system.
A) Request-Response
B) Publish-Subscribe
C)Push-Pull
D) Exclusive Pair
A) Request-Response
Request-Response is a communication model in which the client sends requests to the server and the server
responds to the requests. When the server receives a request, it decides how to respond, fetches the data,
retrieves resource representations, prepares the response, and then sends the response to the client.
RESTful webservice is a collection of resources which are represented by URIs. RESTful web API has a
base URI(e.g: http://example.com/api/tasks/). The clients and requests to these URIs using the methods
defined by the HTTP protocol(e.g: GET, PUT, POST or DELETE). A RESTful web service can support
various internet media types.
b) WebSocket Based Communication APIs: WebSocket APIs allow bi-directional, full duplex
communication between clients and servers. WebSocket APIs follow the exclusive pair communication
model.
Cloud computing is a transformative computing paradigm that involves delivering applications and
services over the internet. Cloud computing involves provisioning of computing, networking and storage
resources on demand and providing these resources as metered services to the users, in a “pay as you go”.
Cloud computing resources can be provisioned on-demand by the users, without requiring interactions with
the cloud service provider. The process of provisioning resources is automated.
Cloud computing services are offered to users in different forms.
• Infrastructure-as-a-service(IaaS):Provides users the ability to provision computing and
storage resources. These resources are provided to the users as a virtual machine instances
and virtual storage.
• Platform-as-a-Service(PaaS): Provides users the ability to develop and deploy
application in cloud using the development tools, APIs, software libraries and services
provided by the cloud service provider.
• Software-as-a-Service(SaaS): Provides the user a complete software application or the
user interface to the application itself. The cloud service provider manages the underlying
cloud infrastructure including servers, network, operating systems, storage, and
application software.
1.4.3 Big data Analysis
Big data is defined as collections of data sets whose volume , velocity or variety is so large that it is
difficult to store, manage, process and analyze the data using traditional databases and data processing
tools.
Some examples of big data generated by IoT are Sensor
data generated by IoT systems.
• Machine sensor data collected from sensors established in industrial and energy systems.
• Health and fitness data generated IoT devices.
• Data generated by IoT systems for location and tracking vehicles.
• Data generated by retail inventory monitoring systems.
The underlying characteristics of Big Data are
Volume: There is no fixed threshold for the volume of data for big data. Big data is used for massive scale
data.
Velocity: Velocity is another important characteristics of Big Data and the primary reason for exponential
growth of data.
Variety: Variety refers to the form of data. Big data comes in different forms such as structured or
unstructured data including test data, image , audio, video and sensor data .
1.4.4Communication Protocols:
Communication Protocols form the back-bone of IoT systems and enable network connectivity and
coupling to applications.
• Allow devices to exchange data over network.
• Define the exchange formats, data encoding addressing schemes for device and routing of
packets from source to destination.
• It includes sequence control, flow control and retransmission of lost packets.
Embedded Systemsis a computer system that has computer hardware and software embedded to
perform specific tasks. Key components of embedded system include microprocessor or
micro controller, memory (RAM, ROM, Cache), networking units (Ethernet Wi-Fi
Adaptor), input/output units (Display, Keyboard, etc..,) and storage (Flash memory).
Embedded System range from low cost miniaturized devices such as digital watches to
devices such as digital cameras, POS terminals, vending machines, appliances etc.,
Level-1 IoT systems has a single node that performs sensing and/or actuation, stores data, performs
analysis and host the application. Suitable for modeling low cost and low complexity solutions where the
data involved is not big and analysis requirement are not computationally intensive. An e.g., of IoT Level1
isHomeautomation.The system consist of a single node that allows controlling the lights and appliances in
a home the device used in this system interfaces with the lights and appliances using electronic rely
switches. The status information of each light or appliances is maintained in a local database. REST
services deployed locally allow retrieving and updating the state of each lighter appliance in the status
database. The controller service continuously monitors the state of each light or appliance by retrieving the
light from the database.
1.5.2 IoT Level 2
IoT Level2 has a single node that performs sensing and/or actuating and local analysis as shown in fig. Data
is stored in cloud and application is usually cloud based. Level2 IoT systems are suitable for solutions where
data are involved is big, however, the primary analysis requirement is not computationally intensive and can
be done locally itself. An e,g., of Level2 IoT system for Smart Irrigation.
The system consists of a single node that monitors the soil moisture level and controls the irrigation system.
The device used system collects soil moisture data from sensors. The controller service continuously
monitors the moisture level. A cloud based REST web service is used for storing and retrieving moisture
data which is stored in a cloud database. A cloud based application is used for visualizing the moisture level
over a period of time which can help in making decision about irrigation schedule.
a) Smart Lighting: helps in saving energy by adapting the lighting to the ambient conditions and
switching on/off or diming the light when needed.
b) Smart Appliances: make the management easier and also provide status information to the users
remotely.
c) Intrusion Detection: use security cameras and sensors(PIR sensors and door sensors) to detect intrusion
and raise alerts. Alerts can be in the form of SMS or email sent to the user.
d) Smoke/Gas Detectors: Smoke detectors are installed in homes and buildings to detect smoke that is
typically an early sign of fire. Alerts raised by smoke detectors can be in the form of signals to a fire
alarm system. Gas detectors can detect the presence of harmful gases such as CO, LPGetc.,
2) Cities:
a) Smart Parking: make the search for parking space easier and convenient for drivers. Smart parking
are powered by IoT systems that detect the no. of empty parking slots and send information over
internet to smart application backends.
b) Smart Lighting: for roads, parks and buildings can help in saving energy.
c) Smart Roads: Equipped with sensors can provide information on driving condition, travel time
estimating and alert in case of poor driving conditions, traffic condition and accidents.
d) Structural Health Monitoring: uses a network of sensors to monitor the vibration levels in the
structures such as bridges and buildings.
e) Surveillance: The video feeds from surveillance cameras can be aggregated in cloud based scalable
storage solution.
f) Emergency Response: IoT systems for fire detection, gas and water leakage detection can help in
generating alerts and minimizing their effects on the critical infrastructures.
3) Environment:
a) Weather Monitoring: Systems collect data from a no. of sensors attached and send the data to cloud
based applications and storage back ends. The data collected in cloud can then be analyzed and
visualized by cloud based applications.
b) Air Pollution Monitoring: System can monitor emission of harmful gases(CO2, CO, NO, NO2 etc.,)
by factories and automobiles using gaseous and meteorological sensors. The collected data can be
analyzed to make informed decisions on pollutions control approaches.
c) Noise Pollution Monitoring: Due to growing urban development, noise levels in cities have
increased and even become alarmingly high in some cities. IoT based noise pollution monitoring
systems use a no. of noise monitoring systems that are deployed at different places in a city. The data on
noise levels from the station is collected on servers or in the cloud. The collected data is then aggregated
to generate noise maps.
d) Forest Fire Detection: Forest fire can cause damage to natural resources, property and human life.
Early detection of forest fire can help in minimizing damage.
e) River Flood Detection: River floods can cause damage to natural and human resources and human life.
Early warnings of floods can be given by monitoring the water level and flow rate. IoT based river flood
monitoring system uses a no. of sensor nodes that monitor the water level and flow rate sensors.
4) Energy:
a) Smart Grids: is a data communication network integrated with the electrical grids that collects and
analyze data captured in near-real-time about power transmission, distribution and consumption. Smart
grid technology provides predictive information and recommendations to utilities, their suppliers, and
their customers on how best to manage power. By using IoT based sensing and measurement
technologies, the health of equipment and integrity of the grid can be evaluated.
b) Renewable Energy Systems: IoT based systems integrated with the transformers at the point of
interconnection measure the electrical variables and how much power is fed into the grid. For wind
energy systems, closed-loop controls can be used to regulate the voltage at point of interconnection
which coordinate wind turbine outputs and provides power support.
c) Prognostics: In systems such as power grids, real-time information is collected using specialized
electrical sensors called Phasor Measurment Units(PMUs) at the substations. The information received
from PMUs must be monitored in real-time for estimating the state of the system and for predicting
failures.
5) Retail:
a) Inventory Management: IoT systems enable remote monitoring of inventory using data collected by
RFIDreaders.
b) Smart Payments: Solutions such as contact-less payments powered by technologies such as Near Field
Communication(NFC) and Bluetooth.
c) Smart Vending Machines: Sensors in a smart vending machines monitors its operations and send the
data to cloud which can be used for predictive maintenance.
6) Logistics:
a) Route generation & scheduling: IoT based system backed by cloud can provide first response to the
route generation queries and can be scaled upto serve a large transportation network.
c) Shipment Monitoring: IoT based shipment monitoring systems use sensors such as temp, humidity,
to monitor the conditions and send data to cloud, where it can be analyzed to detect foods poilage.
d) Remote Vehicle Diagnostics: Systems use on-board IoT devices for collecting data on Vehicle
operations(speed, RPMetc.,) and status of various vehicle subsystems.
7) Agriculture:
8) Industry:
b) Wearable Electronics
The IoT system is defined in different levels called as tiers. A model enables the
conceptualisation of the framework.
A reference model can be used to depict the building blocks, successive interactions and
integration.
The diagram below depicts the CISCO presentation of a reference model comprising of 7 levels
and the functions of each level.
• The architecture serves as a reference in the applications of IoT in services and business
processes.
• A set of sensors which are smart, capture the data, perform necessary data element analysis
and transformation as per device application framework and connect directly to a
communication manager.
• The communication management subsystem consists of protocol handlers, message routers
and access management.
• Data routes from gateway through the Internet and data centre to the application server or
enterprise server which acquires that data.
• Organisation and analysis subsystems enable the services, business processes, enterprise
integration and complex processes.
UNIT II ELEMENTS OF IOT
IoT and M2M- difference between IoT and M2M - Software Defined Networks - Network
Function Virtualization - IoT systems management – Needs - NETCONF, YANG - IoT design
methodology.
M2M Communication
Traditionally, M2M focused on “industrial telematics,” which is a fancy way of explaining data
transfer for some commercial benefit. But many original uses of M2M still stand today, like smart meters.
Wireless M2M has been dominated by cellular since it came out in the mid-2000’s with 2G cell networks.
Because of this, the cellular market has tried to brand M2M as an inherently cellular thing by offering M2M
data plans. But cellular M2M is only one subsection of the market, and it shouldn’t be thought of as a
cellular-only area.
How M2M Works
As previously stated, machine-to-machine communication makes the Internet of Things possible. According
to Forbes, M2M is among the fastest-growing types of connected device technologies in the market right
now, largely because M2M technologies can connect millions of devices within a single network. The range
of connected devices includes anything from vending machines to medical equipment to vehicles to
buildings. Virtually anything that houses sensor or control technology can be connected to some sort of
wireless network.
This sounds complex, but the driving thought behind the idea is quite simple. Essentially, M2M networks
are very similar to LAN or WAN networks, but are exclusively used to allow machines, sensors, and
controls, to communicate. These devices feed information they collect back to other devices in the network.
This process allows a human (or an intelligent control unit) to assess what is going on across the whole
network and issue appropriate instructions to member devices.
M2M Applications
The possibilities in the realm of M2M can be seen in four major use cases, which we’ve detailed below:
1. MANUFACTURING
2. HOME APPLIANCES
IoT already affects home appliance connectivity through platforms like Nest. However, M2M is expected to
take home-based IoT to the next level. Manufacturers like LG and Samsung are already slowly unveiling
smart home appliances to help ensure a higher quality of life for occupants.
For example, an M2M-capable washing machine could send alerts to the owners’ smart devices once it
finishes washing or drying, and a smart refrigerator could automatically order groceries from Amazon once
its inventory is depleted. There are many more examples of home automation that can potentially improve
quality of life for residents, including systems that allow members of the household to remotely control
HVAC systems using their mobile devices. In situations where a homeowner decides to leave work early, he
or she could contact the home heating system before leaving work to make sure the temperature at home will
be comfortable upon arrival.
One of the biggest opportunities for M2M technology is in the realm of health care. With M2M technology,
hospitals can automate processes to ensure the highest levels of treatment. Using devices that can react faster
than a human healthcare professional in an emergency situation make this possible. For instance, when a
patient’s vital signs drop below normal, an M2M-connected life support device could automatically
administer oxygen and additional care until a healthcare professional arrives on the scene. M2M also allows
patients to be monitored in their own homes instead of in hospitals or care centers.
For example, devices that track a frail or elderly person’s normal movement can detect when he or she has
had a fall and alert a healthcare worker to the situation.
There are different M2M applications, environment monitoring, civil protection and public safety, supply
chain management, energy and utility distribution as in smart grid, smart grid separately common. we have
intelligent transportation systems, healthcare, automation of buildings, military applications, agriculture,
home networks all these are different applications of M2M.
M2M features:
M2M device connects to the network domain via direct connectivity or M2M gateway. In the first
case, the M2M device connects to the network domain via the access network, which performs the
procedures such as registration, authentication, authorization, management, and provisioning with
the network domain. In the second case, the M2M device connects to the M2M gateway using the
M2M area network.
M2M area network provides connectivity between M2M devices and M2M gateways.
M2M gateway acts as a proxy between M2M devices and the network domain. As an example, an
M2M gateway can run an application that collects and treats various information (e.g., contextual
parameters) from sensors and meters.
M2M communication network provides connection between the M2M gateways/devices and the
M2M servers. Usually it contains two parts: the access network and the Internet.
M2M server works as a middleware layer to pass data through various application services.
Difference Between IoT and M2M:
M2M technology could be present in our homes, offices, shopping malls and other places. Controlling
electrical appliances like bulbs and fans using RF or Bluetooth from your smartphone is a simple example of
M2M applications at home. Here, the electrical appliance and your smartphone are the two machines
interacting with each other.
The Internet of Things (IoT) is the network of physical devices embedded with sensors, software and
electronics, enabling these devices to communicate with each other and exchange data over a computer
network. The things in the IoT refer to hardware devices uniquely identifiable through a network platform
within the Internet infrastructure.
Some more differences like:
Communication Protocols:
• M2M and IoT can differ in how the communication between the machines ordevices happens.
• M2M uses either proprietary or non-IP based communication protocols for
communication within the M2M area networks. IoT uses IP bases communication protococls.
• The "Things" in IoT refers to physical objects that have unique identifiers and can sense and communicate
with their external environment (and user applications) or their internal physical states.
• M2M systems, in contrast to IoT, typically have homogeneous machine types within an M2M area
network.
Hardware vs Software Emphasis:
• While the emphasis of M2M is more on hardware with embedded modules, the
emphasis of IoT is more on software.
Applications:
• M2M data is collected in point solutions and can be accessed by on premises applications such as
diagnosis applications, service management applications, and on- premises enterprise applications.
• IoT data is collected in the cloud and can be accessed by cloud applications such as analytics applications,
enterprise applications, remote diagnosis and management applications, etc
Data plane:
All the activities involving as well as resulting from data packets sent by the end-user belong to this plane.
This includes:
Forwarding of packets.
Segmentation and reassembly of data.
Replication of packets for multicasting.
Control plane:
All activities necessary to perform data plane activities but do not involve end-user data packets belong to
this plane. In other words, this is the brain of the network. The activities of the control plane include:
Making routing tables.
Setting packet handling policies.
Why SDN is Important?
Better Network Connectivity: SDN provides very better network connectivity for sales,
services, and internal communications. SDN also helps in faster data sharing.
Better Deployment of Applications: Deployment of new applications, services, and many
business models can be speed up using Software Defined Networking.
Better Security: Software-defined network provides better visibility throughout the network.
Operators can create separate zones for devices that require different levels of security. SDN
networks give more freedom to operators.
Better Control with High Speed: Software-defined networking provides better speed than other
networking types by applying an open standard software-based controller.
In short, it can be said that- SDN acts as a “Bigger Umbrella or a HUB” where the rest of other networking
technologies come and sit under that umbrella and get merged with another platform to bring out the best of
the best outcome by decreasing the traffic rate and by increasing the efficiency of data flow.
Where is SDN Used?
Enterprises use SDN, the most widely used method for application deployment, to deploy
applications faster while lowering overall deployment and operating costs. SDN allows IT
administrators to manage and provision network services from a single location.
Cloud networking software-defined uses white-box systems. Cloud providers often use generic
hardware so that the Cloud data center can be changed and the cost of CAPEX and OPEX saved.
Components of Software Defining Networking (SDN)
SDN Architecture
In a traditional network, each switch has its own data plane as well as the control plane. The control plane of
various switches exchange topology information and hence construct a forwarding table that decides where
an incoming data packet has to be forwarded via the data plane. Software-defined networking (SDN) is an
approach via which we take the control plane away from the switch and assign it to a centralized unit called
the SDN controller. Hence, a network administrator can shape traffic via a centralized console without
having to touch the individual switches. The data plane still resides in the switch and when a packet enters a
switch, its forwarding activity is decided based on the entries of flow tables, which are pre-assigned by the
controller. A flow table consists of match fields (like input port number and packet header) and instructions.
The packet is first matched against the match fields of the flow table entries. Then the instructions of the
corresponding flow entry are executed. The instructions can be forwarding the packet via one or multiple
ports, dropping the packet, or adding headers to the packet. If a packet doesn’t find a corresponding match in
the flow table, the switch queries the controller which sends a new flow entry to the switch. The switch
forwards or drops the packet based on this flow entry.
Application layer: It contains the typical network applications like intrusion detection, firewall,
and load balancing
Control layer: It consists of the SDN controller which acts as the brain of the network. It also
allows hardware abstraction to the applications written on top of it.
Infrastructure layer: This consists of physical switches which form the data plane and carries
out the actual movement of data packets.
The layers communicate via a set of interfaces called the north-bound APIs(between the application and
control layer) and southbound APIs(between the control and infrastructure layer).
SDN Architecture
Open SDN
2. SDN via APIs: In SDN via API, the functions in remote devices like switches are invoked using
conventional methods like SNMP or CLI or through newer methods like Rest API. Here, the devices are
provided with control points enabling the controller to manipulate the remote devices using APIs.
3. SDN via Hypervisor-based Overlay Network: In SDN via the hypervisor, the configuration of physical
devices is unchanged. Instead, Hypervisor based overlay networks are created over the physical network.
Only the devices at the edge of the physical network are connected to the virtualized networks, thereby
concealing the information of other devices in the physical network.
SDN via Hypervisor-based Overlay Network
Software Defined Network is a virtual networking A traditional network is the old conventional
approach. networking approach.
Software Defined Network is the open interface. A traditional network is a closed interface.
In Software Defined Network data plane and In a traditional network data plane and control
control, the plane is decoupled by software. plane are mounted on the same plane.
For more details you can refer differences between SDN and Traditional Networking article.
Advantages of SDN
The network is programmable and hence can easily be modified via the controller rather than
individual switches.
Switch hardware becomes cheaper since each switch only needs a data plane.
Hardware is abstracted, hence applications can be written on top of the controller independent of
the switch vendor.
Provides better security since the controller can monitor traffic and deploy security policies. For
example, if the controller detects suspicious activity in network traffic, it can reroute or drop the
packets.
Disadvantages of SDN
The central dependency of the network means a single point of failure, i.e. if the controller gets
corrupted, the entire network will be affected.
The use of SDN on large scale is not properly defined and explored.
With the help of NFV, it becomes possible to separate communication services from specialized hardware
like routers and firewalls. This eliminates the need for buying new hardware and network operations can
offer new services on demand. With this, it is possible to deploy network components in a matter of hours as
opposed to months as with conventional networking. Furthermore, the virtualized services can run on less
expensive generic servers.
Advantages:
Lower expenses as it follows Pay as you go which implies companies only pay for what they
require.
Less equipment as it works on virtual machines rather than actual machines which leads to fewer
appliances, which lowers operating expenses as well.
Scalability of network architecture is quite quick and simple using virtual functions in NFV. As a
result, it does not call for the purchase of more hardware.
Working:
Usage of software by virtual machines enables to carry out the same networking tasks as conventional
hardware. The software handles the task of load balancing, routing, and firewall security. Network engineers
can automate the provisioning of the virtual network and program all of its various components using a
hypervisor or software-defined networking controller.
Benefits of NFV:
Many service providers believe that advantages outweigh the issues of NFV.
Traditional hardware-based networks are time-consuming as these require network
administrators to buy specialized hardware units, manually configure them, then join them to
form a network. For this skilled or well-equipped worker is required.
It costs less as it works under the management of a hypervisor, which is significantly less
expensive than buying specialized hardware that serves the same purpose.
Easy to configure and administer the network because of a virtualized network. As a result,
network capabilities may be updated or added instantly.
Risks of NFV:
Security hazards do exist, though, and network functions virtualization security issues have shown to be a
barrier to widespread adoption among telecom companies. The following are some dangers associated with
implementing network function virtualization that service providers should take into account:
Physical security measures do not work: Comparing virtualized network components to
locked-down physical equipment in a data center enhances their susceptibility to new types of
assaults.
Malware is difficult to isolate and contain: Malware travels more easily among virtual
components running on the same virtual computer than between hardware components that can
be isolated or physically separated.
Network activity is less visible: Because traditional traffic monitoring tools struggle to detect
potentially malicious anomalies in network traffic going east-west between virtual machines,
NFV necessitates more fine-grained security solutions.
NFV Architecture:
An individual proprietary hardware component, such as a router, switch, gateway, firewall, load balancer, or
intrusion detection system, performs a specific networking function in a typical network architecture. A
virtualized network substitutes software programs that operate on virtual machines for these pieces of
hardware to carry out networking operations.
Three components make up an NFV architecture:
Centralized virtual network infrastructure: The foundation of an NFV infrastructure can be
either a platform for managing containers or a hypervisor that abstracts the resources for
computation, storage, and networking.
Applications: Software delivers many forms of network functionality by substituting for the
hardware elements of a conventional network design (virtualized network functions).
Framework: To manage the infrastructure and provide network functionality, a framework is
required (commonly abbreviated as MANO, meaning Management, Automation, and Network
Orchestration).
NeedforIoTSystems Management
Managingmultipledeviceswithinasinglesystem requiresadvancedmanagementcapabilitie.
1) AutomatingConfiguration:IoTsystemmanagementcapabilitiescanhelpin automating
the systemconfiguration.
2) Monitoring Operational & Statistical Data : Management systems can help in monitoring
opeartional and statistical data of a system. This data can be used for fault diagnosis orprognosis.
3) Improved Reliability: A management system that allows validating the system
configurationsbeforetheyareputinto effect canhelp inimprovingthe systemreliability.
4) System Wide Configurations : For IoT systems that consists of multiple devices or nodes,
ensuring system wide configuration can be critical for the correct functioning of thesystem.
5) Multiple System Configurations : For some systems it may be desirable to have
multiplevalidconfigurationswhichareappliedatdifferenttimesorin certainconditions.
6) Retrieving&ReusingConfigurations: Managementsystemswhichhavethecapability of retrieving
configurations from devices can help in reusing the configurations for other devices of the
sametype.
IoTSystemsManagementwithNETCONF-YANG
1) ManagementSystem
2) ManagementAPI
3) TransactionManager
4) RollbackManager
5) Data ModelManager
6) ConfigurationValidator
7) ConfigurationDatabase
8) ConfigurationAPI
9) Data ProviderAPI
1) Management System : The operator uses a management system to send NETCONF messages to
configure the IoT device and receives state information and notifications from the device as
NETCONFmessages.
2) ManagementAPI :allowsmanagementapplicationtostartNETCONFsessions.
3) Transaction Manager: executes all the NETCONF transactions and ensures that ACID properties
hold true for thetrasactions.
4) Rollback Manager : is responsible for generating all the transactions necessary to rollback a
current configuration to its original state.
6) Configuration Validator : checks if the resulting configuration after applying a transaction would
be a validconfiguration.
7) ConfigurationDatabase:containsbothconfigurationandoperastionaldata.
8) Configuration API : Using the configuration API the application on the IoT device can be read
configuration data from the configuration datastore and write opeartional data to the
opearationaldatastore.
StepsforIoTdeviceManagementwithNETCONF-YANG
1) Create a YANG model of the system that defines the configuration and state data of the system.
2) CompletetheYANGmodelwiththe‗Inctool‘whichcomeswithLibnetconf.
3) Fillinthe IoTdevicemangementcodeintheTransAPImodule.
4) BuildthecallbacksC filetogeneratethelibraryfile.
5) Load the YANG module and the TransAPImodule into the Netopeer server using
Netopeermanagertool.
6) The operator can now connect from the management system to the Netopeer server using the
NetopeerCLI.
7) Operator can issue NETCONF commands from the Netopeer CLI. Command can be issued to
changew the configuration dsta, get operational dat or execute an RPC on the IoTdevice.
The first step in IoT system design methodology is to define the purpose and requirements of the
system. In this step, the system purpose, behavior and requirements (such as data collection
requirements, data analysis requirements, system management requirements, data privacy and
security requirements, user interface requirements, ...) are captured.
The second step in the IoT design methodology is to define the process specification. In this step,
the use cases of the IoT system are formally described based on and derived from the purpose
and requirement specifications.
The third step in the IoT design methodology is to define the Domain Model. The domain model
describes the main concepts, entities and objects in the domain of IoT system to be designed.
Domain model defines the attributes of the objects and relationships between objects. Domain
model provides an abstract representation of the concepts, objects and entities in the IoT domain,
independent of any specific technology or platform. With the domain model, the IoT system
designers can get an understanding of the IoT domain for which the system is to be designed.
The fourth step in the IoT design methodology is to define the Information Model. Information
Model defines the structure of all the information in the IoT system, for example, attributes of
Virtual Entities, relations, etc. Information model does not describe the specifics of how the
information is represented or stored. To define the information model, we first list the Virtual
Entities defined in the Domain Model. Information model adds more details to the Virtual
Entities by defining their attributes and relations.
The fifth step in the IoT design methodology is to define the service specifications. Service
specifications define the services in the IoT system, service types, service inputs/output, service
endpoints, service schedules, service preconditions and service effects.
The sixth step in the IoT design methodology is to define the IoT level for the system.
The seventh step in the IoT design methodology is to define the Functional View. The Functional
View (FV) defines the functions of the IoT systems grouped into various Functional Groups
(FGs). Each Functional Group either provides functionalities for interacting with instances of
concepts defined in the Domain Model or provides information related to these concepts.
The eighth step in the IoT design methodology is to define the Operational View Specifications.
In this step, various options pertaining to the IoT system deployment and operation are defined,
such as, service hosting options, storage options, device options, application hosting options, etc
The final step in the IoT design methodology is to develop the IoT application.
UNIT III IOT PROTOCOLS
Sensors and actuators - Communication modules – Zigbee - LoRa - RFID - Wi-Fi - Power sources.
Sensors:
• Generally speaking, a sensor is a device that is able to detect changes in an environment. By itself, a
sensor is useless, but when we use it in an electronic system, it plays a key role. A sensor is able to
measure a physical phenomenon (like temperature, pressure, and so on) and transform it into an
electric signal. These three features should be at the base of a good sensor:
• It should be sensitive to the phenomenon that it measures
• It should not be sensitive to other physical phenomena
• It should not modify the measured phenomenon during the measurement process
• There is a wide range of sensors we can exploit to measure almost all the physical properties around
us. A few common sensors that are widely adopted in everyday life include thermometers, pressure
sensors, light sensors, accelerometers, gyroscopes, motion sensors, gas sensors and many more.
A sensor can be described using several properties, the most important being:
• Range: The maximum and minimum values of the phenomenon that the sensor can measure.
• Sensitivity: The minimum change of the measured parameter that causes a detectable change in
output signal.
• Resolution: The minimum change in the phenomenon that the sensor can detect.
Sensor Classification:
Passive or Active: Passive sensors do not require an external power source to monitor an environment,
while Active sensors require such a source in order to work. A passive sensor is one which just ‘listens’ to
what is happening.
Examples include:
A light sensor which detects if a light is shining on it.
An infra-red sensor which detects the temperature of an object.
An active sensor is one which transmits a signal into the environment and then measures the response that
comes back.
One example is an ultrasonic system:
Another classification is based on the method used to detect and measure the property (mechanical,
chemical, etc.).
Analog and Digital: Analog sensors produce an analog, or continuous, signal while digital sensors produce
a discrete signal.
There are different types of sensors that produce continuous analog output signal and these sensors are
analog sensors. This continuous output signal produced by the analog sensors is proportional to the
measurand. Generally, There are various types of analog sensors; practical examples of various types of
analog sensors are as follows: accelerometers, pressure sensors, light sensors, sound sensors, temperature
sensors, and so on.
Unlike analog sensor, Digital Sensor produce discrete values (0 and 1’s). Discrete values often called digital
or binary signals in digital communication.
Electronic sensors or electrochemical sensors in which data conversion and data transmission take place
digitally are digital sensors. These digital sensors are replacing analog sensors as they are capable of
overcoming the drawbacks of analog sensors. The digital sensor consists of majorly three components such
as senor, cable, and transmitter. But, In digital sensors, the signal measured directly converted into digital
signal output inside the digital sensor itself. So, this digital signal transmitted through cable digitally. There
are different types of digital sensors that overcome the disadvantages of analog sensors.
Then, scaler sensors basically measure scalar variables which can measure only the changes in the
magnitude whereas, the vector senses not only the magnitude, but also the direction. So, scalar sensor
example would be temperature sensor is an example of scalar sensor because you know irrespective of
which orientation you put, the sensor temperature sensor or in which direction you are taking it, it is going to
give you the magnitude value. Only the changes in the magnitude of the temperature, on the contrary we
have the vector sensor. For example, the camera sensor or the accelerometer sensor whose values are
dependent on the orientation on the direction and so on direction in which the sensor is being put and the
weight is measuring. Scalar sensors measure only the magnitude physical quantities, such as temperature
colour, pressure, strain etcetera. These are scalar quantities and measurement of the change of magnitude is
sufficient to convey the information.
On the other hand, vector sensors produce output signal of the voltage which is generally proportional to the
magnitude as well as the direction and orientation of the quantity that is being measured. So, physical
quantities such as the sound, image, velocity, acceleration orientation, these are all vector quantities and
their measurement is not just dependent on the magnitude, but also on the direction. So, for example,
accelerometer sensor, they give outputs in three dimensions x, y and z coordinate axis.
1)Temperature Sensors
• Temperature sensors measure the amount of heat energy in a source, allowing them to detect
temperature changes and convert these changes to data. Machinery used in manufacturing often
requires environmental and device temperatures to be at specific levels. Similarly, within agriculture,
soil temperature is a key factor for crop growth.
2) Humidity Sensors
• These types of sensors measure the amount of water vapor in the atmosphere of air or other gases.
Humidity sensors are commonly found in heating, vents and air conditioning (HVAC) systems in
both industrial and residential domains. They can be found in many other areas including hospitals,
and meteorology stations to report and predict weather.
• A pressure sensor senses changes in gases and liquids. When the pressure changes, the sensor detects
these changes, and communicates them to connected systems. Common use cases include leak
testing which can be a result of decay. Pressure sensors are also useful in the manufacturing of water
systems as it is easy to detect fluctuations or drops in pressure.
5. Proximity Sensors
• Proximity sensors are used for non-contact detection of objects near the sensor. These types of
sensors often emit electromagnetic fields or beams of radiation such as infrared. Proximity sensors
have some interesting use cases. In retail, a proximity sensor can detect the motion between a
customer and a product in which he or she is interested. The user can be notified of any discounts or
special offers of products located near the sensor. Proximity sensors are also used in the parking lots
of malls, stadiums and airports to indicate parking availability. They can also be used on the
assembly lines of chemical, food and many other types of industries.
6. Level Sensors
• Level sensors are used to detect the level of substances including liquids, powders and granular
materials. Many industries including oil manufacturing, water treatment and beverage and food
manufacturing factories use level sensors. Waste management systems provide a common use case as
level sensors can detect the level of waste in a garbage can or dumpster.
7. Accelerometers
• Accelerometers detect an object’s acceleration i.e. the rate of change of the object’s velocity with
respect to time. Accelerometers can also detect changes to gravity. Use cases for accelerometers
include smart pedometers and monitoring driving fleets. They can also be used as anti-theft
protection alerting the system if an object that should be stationary is moved.
8. Gyroscope
• Gyroscope sensors measure the angular rate or velocity, often defined as a measurement of speed and
rotation around an axis. Use cases include automotive, such as car navigation and electronic stability
control (anti-skid) systems. Additional use cases include motion sensing for video games, and
camera-shake detection systems.
9. Gas Sensors
• These types of sensors monitor and detect changes in air quality, including the presence of toxic,
combustible or hazardous gasses. Industries using gas sensors include mining, oil and gas, chemical
research and manufacturing. A common consumer use case is the familiar carbon dioxide detectors
used in many homes.
• These types of sensors sense characteristics in their surroundings by either emitting or detecting
infrared radiation. They can also measure the heat emitted by objects. Infrared sensors are used in a
variety of different IoT projects including healthcare as they simplify the monitoring of blood flow
and blood pressure.
• Televisions use infrared sensors to interpret the signals sent from a remote control. Another
interesting application is that of art historians using infrared sensors to see hidden layers in paintings
to help determine whether a work of art is original or fake or has been altered by a restoration
process.
Optical sensors convert rays of light into electrical signals. There are many applications and use cases for
optical sensors. In the auto industry, vehicles use optical sensors to recognize signs, obstacles, and other
things that a driver would notice when driving or parking. Optical sensors play a big role in the development
of driverless cars. Optical sensors are very common in smart phones. For example, ambient light sensors can
extend battery life. Optical sensors are also used in the biomedical field including breath analysis and heart-
rate monitors.
Actuators:
• An IoT device is made up of a Physical object (“thing”) + Controller (“brain”) + Sensors + Actuators
+ Networks (Internet). An actuator is a machine component or system that moves or controls the
mechanism or the system. Sensors in the device sense the environment, then control signals are
generated for the actuators according to the actions needed to perform.
• A servo motor is an example of an actuator. They are linear or rotatory actuators, can move to a
given specified angular or linear position. We can use servo motors for IoT applications and make
the motor rotate to 90 degrees, 180 degrees, etc., as per our need.
• The following diagram shows what actuators do; the controller directs the actuator based on the
sensor data to do the work.
• The control system acts upon an environment through the actuator. It requires a source of energy and
a control signal. When it receives a control signal, it converts the source of energy to a mechanical
operation. On this basis, on which form of energy it uses, it has different types given below.
Types of Actuators:
Hydraulic Actuators –
A hydraulic actuator uses hydraulic power to perform a mechanical operation. They are actuated by a
cylinder or fluid motor. The mechanical motion is converted to rotary, linear, or oscillatory motion,
according to the need of the IoT device. Example- construction equipment uses hydraulic actuators
because hydraulic actuators can generate a large amount of force. So, this name suggests, these
hydraulic actuators consist of a cylinder or fluid motor that uses hydraulic power to facilitate
mechanical operation. The mechanical motion is converted to linear rotary or oscillatory motion.
Basically when some fluid passes through, then you know that motion is converted to some linear
motion or some oscillatory motion or rotary motion and since liquids are nearly impossible to
compress, most of the hydraulic actuators basically exert considerable force which is the reason why
liquid based actuators are typically used and these are quite popular because of this particular reason.
Pneumatic Actuators –
A pneumatic actuator uses energy formed by vacuum or compressed air at high pressure to convert
into either linear or rotary motion. Example- Used in robotics, use sensors that work like human
fingers by using compressed air. Pneumatic actuator, pneumatic means air based. A pneumatic
actuator basically converts the energy formed by vacuum or compressed air at high pressure into
either linear or rotatory motion. Pneumatic actuators basically exert a lot of force and for example,
the pneumatic brakes can be very responsive to small changes in pressure that are applied by the
driver.
Pneumatic brakes are quite common in different devices like trucks etc. They use pneumatic brakes.
So, hydraulic brakes are more common in cars, in trucks pneumatic brakes are quite common. The
advantage of pneumatic brakes, is that they are very responsive to small changes.
Electrical Actuators –
An electric actuator uses electrical energy, is usually actuated by a motor that converts electrical energy into
mechanical torque. An example of an electric actuator is a solenoid based electric bell. An electric actuator
is generally powered by a motor that converts electrical energy into mechanical torque. So, this electrical
energy is used to actuate the equipment, such as the solenoid valve which control the flow of water in pipes
in response to electrical signals.
Thermal /Magnetic Actuators –
• Actuators are simply devices used to transform energy into motion. A thermal actuator is a type of
non-electric motor made of components such as a piston and a thermal sensitive material capable of
producing linear motion in response to temperature changes.
• Magnetic Actuators: Magnetic Actuators use magnetic effects to generate forces which impact on the
motion of a part in the actuator.
Mechanical Actuators –
• A mechanical actuator executes movement by converting rotary motion into linear motion. It
involves pulleys, chains, gears, rails, and other devices to operate.
Communication modules:
Zigbee Architecture
ZigBee is a Personal Area Network task group with low rate task group 4. It is a technology of home
networking. ZigBee is a technological standard created for controlling and sensing the network. As we know
that ZigBee is the Personal Area network of task group 4 so it is based on IEEE 802.15.4 and is created by
Zigbee Alliance.
ZigBee is a standard that addresses the need for very low-cost implementation of Low power devices with
Low data rates for short-range wireless communications.
• Zigbee Coordinator Device: It communicates with routers. This device is used for connecting the
devices.
• Zigbee Router: It is used for passing the data between devices.
• Zigbee End Device: It is the device that is going to be controlled.
Operating Frequency Bands (Only one channel will be selected for use in a network):
1. Channel 0: 868 MHz (Europe)
2. Channel 1-10: 915 MHz (the US and Australia)
3. Channel 11-26: 2.4 GHz (Across the World)
Zigbee Network Topologies:
• Star Topology (ZigBee Smart Energy): Consists of a coordinator and several end devices, end
devices communicate only with the coordinator.
• Mesh Topology (Self Healing Process): Mesh topology consists of one coordinator, several routers,
and end devices.
• Tree Topology: In this topology, the network consists of a central node which is a coordinator,
several routers, and end devices. The function of the
router is to extend the network coverage.
Architecture of Zigbee:
• Physical layer: The lowest two layers i.e the physical and the MAC (Medium Access Control) Layer
are defined by the IEEE 802.15.4 specifications. The Physical layer is closest to the hardware and
directly controls and communicates with the Zigbee radio. The physical layer translates the data
packets in the over-the-air bits for transmission and vice-versa during the reception.
• Medium Access Control layer (MAC layer): The layer is responsible for the interface between the
physical and network layer. The MAC layer is also responsible for providing PAN ID and also
network discovery through beacon requests.
• Network layer: This layer acts as an interface between the MAC layer and the application layer. It is
responsible for mesh networking.
• Application layer: The application layer in the Zigbee stack is the highest protocol layer and it
consists of the application support sub-layer and Zigbee device object. It contains manufacturer-
defined applications.
Channel Access:
1. Contention Based Method (Carrier-Sense Multiple Access With Collision Avoidance Mechanism)
2. Contention Free Method (Coordinator dedicates a specific time slot to each device (Guaranteed
Time Slot (GTS)))
Zigbee Applications:
1. Home Automation
2. Medical Data Collection
3. Industrial Control Systems
4. meter reading system
5. light control system
The LoRaWAN protocol is a Low Power Wide Area Networking (LPWAN) communication protocol that
functions on LoRa. The LoRaWAN specification is open so anyone can set up and operate a LoRa network.
LoRa is a wireless audio frequency technology that operates in a license-free radio frequency spectrum.
LoRa is a physical layer protocol that uses spread spectrum modulation and supports long-range
communication at the cost of a narrow bandwidth. It uses a narrow band waveform with a central frequency
to send data, which makes it robust to interference.
Advantages:
8. Long Range: LoRaWAN can provide long-range communication, spanning several kilometers
in urban areas and even greater distances in rural environments. This long-range capability is a
significant advantage for applications that require wide-area coverage.
9. Low Power Consumption: IoT devices using LoRaWAN can operate on batteries for an
extended period, often several years, before needing a battery replacement or recharge. This low
power consumption is crucial for remote and battery-powered devices.
10. Scalability: LoRaWAN networks are highly scalable, allowing for the addition of a large
number of devices to a single network without significant infrastructure changes.
11. Cost-Efficiency: Due to its low power requirements and long-range capabilities, LoRaWAN
can be a cost-effective solution for many IoT applications. It reduces the need for frequent
battery replacements and complex power infrastructure.
12. License-Free Spectrum: LoRaWAN operates in unlicensed ISM radio bands, reducing
regulatory and licensing requirements. This simplifies deployment and lowers operational costs.
13. Wide Adoption: LoRaWAN has gained widespread adoption and support from various
companies and organizations, creating a thriving ecosystem of devices, gateways, and network
providers.
14. Security Features: LoRaWAN includes security features such as encryption and device
authentication to protect data transmitted between devices and the network.
8. Use Cases: LoRaWAN is suitable for a wide range of IoT use cases, including smart agriculture, smart
cities, industrial IoT, asset tracking, and environmental monitoring, among others.
Disadvantages:
15. Low Data Rate: LoRaWAN is designed for low-data-rate applications. If you need to transmit
large amounts of data quickly, it may not be the best choice.
16. Limited Bandwidth: LoRaWAN networks have limited available bandwidth, which can lead
to network congestion in areas with a high density of devices.
17. Latency: LoRaWAN is optimized for low power and long range, which can result in higher
latency compared to other wireless technologies. This may not be suitable for applications
requiring real-time data transmission.
18. Interference: In crowded radio frequency environments, interference from other devices
operating in the same frequency bands can affect LoRaWAN communication quality.
19. Not Suitable for High Mobility: LoRaWAN is designed for stationary or slowly moving
devices. It may not be suitable for applications that require high mobility, such as asset tracking
on fast-moving vehicles.
20. Initial Deployment Complexity: Setting up a LoRaWAN network can be more complex than
other wireless technologies, as it requires the installation of gateways and configuration of
network servers.
21. Dependence on Gateways: LoRaWAN devices rely on gateways to relay data to the network.
If gateways are unavailable or experience issues, communication can be disrupted.
8. Limited Use Cases: While LoRaWAN is versatile, it may not be the best choice for all IoT applications,
especially those that require high bandwidth, low latency, or high mobility.
6LowPAN
6LoWPAN is an IPv6 protocol, and It’s extended from is IPv6 over Low Power Personal Area Network. As
the name itself explains the meaning of this protocol is that this protocol works on Wireless Personal Area
Network i.e., WPAN.
WPAN is a Personal Area Network (PAN) where the interconnected devices are centered around a person’s
workspace and connected through a wireless medium. You can read more about WPAN at WPAN.
6LoWPAN allows communication using the IPv6 protocol. IPv6 is Internet Protocol Version 6 is a network
layer protocol that allows communication to take place over the network. It is faster and more reliable and
provides a large number of addresses.
6LoWPAN initially came into existence to overcome the conventional methodologies that were adapted to
transmit information. But still, it is not so efficient as it only allows for the smaller devices with very limited
processing ability to establish communication using one of the Internet Protocols, i.e., IPv6. It has very low
cost, short-range, low memory usage, and low bit rate.
It comprises an Edge Router and Sensor Nodes. Even the smallest of the IoT devices can now be part of the
network, and the information can be transmitted to the outside world as well. For example, LED Streetlights.
• It is a technology that makes the individual nodes IP enabled.
• 6LoWPAN can interact with 802.15.4 devices and also other types of devices on an IP Network. For
example, Wi-Fi.
• It uses AES 128 link layer security, which AES is a block cipher having key size of 128/192/256 bits
and encrypts data in blocks of 128 bits each. This is defined in IEEE 802.15.4 and provides link
authentication and encryption.
1. The device should be having sleep mode in order to support the battery saving.
2. Minimal memory requirement.
3. Routing overhead should be lowered.
Features of 6LoWPAN:
Advantages of 6LoWPAN:
1. 6LoWPAN is a mesh network that is robust, scalable, and can heal on its own.
2. It delivers low-cost and secure communication in IoT devices.
3. It uses IPv6 protocol and so it can be directly routed to cloud platforms.
4. It offers one-to-many and many-to-one routing.
5. In the network, leaf nodes can be in sleep mode for a longer duration of time.
Disadvantages of 6LoWPAN:
1. It is comparatively less secure than Zigbee.
2. It has lesser immunity to interference than that Wi-Fi and Bluetooth.
3. Without the mesh topology, it supports a short range.
Applications of 6LoWPAN:
• Security: 6LoWPAN security is ensured by the AES algorithm, which is a link layer security, and
the transport layer security mechanisms are included as well.
• Interoperability: 6LoWPAN is able to operate with other wireless devices as well which makes it
interoperable in a network.
Frequency Identification (RFID) is a form of wireless communication that incorporates the use of
Radio
electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum to
uniquely identify an object, animal or person. It uses radio frequency to search ,identify, track and
communicate with items and people. it is a method that is used to track or identify an object by radio
transmission uses over the web. Data digitally encoded in an RFID tag which might be read by the reader.
This device work as a tag or label during which data read from tags that are stored in the database through
the reader as compared to traditional barcodes and QR codes. It is often read outside the road of sight either
passive or active RFID.
Kinds of RFID :
There are many kinds of RFID, each with different properties, but perhaps the most fascinating aspect of
RFID technology is that most RFID tags have neither an electric plug nor a battery. Instead, all of the energy
needed to operate them is supplied in the form of radio waves by RFID readers. This technology is called
passive RFID to distinguish it from the(less common) active RFID in which there is a power source on the
tag.
It is used on shipping pallets and some driver’s licenses. Readers send signals in the 902-928 MHz band.
Tags communicate at distances of several meters by changing the way they reflect the reader signals; the
reader is able to pick up these reflections. This way of operating is called backscatter.
It operates at 13.56 MHz and is likely to be in your passport, credit cards, books, and noncontact payment
systems. HF RFID has a short-range, typically a meter or less because the physical mechanism is based on
induction rather than backscatter.
There are also other forms of RFID using other frequencies, such as LF RFID(Low-Frequency RFID),
which was developed before HF RFID and used for animal tracking
There are two types of RFID :
1. Passive RFID –
Passive RFID tags does not have their own power source. It uses power from the reader. In this
device, RF tags are not attached by a power supply and passive RF tag stored their power. When
it is emitted from active antennas and the RF tag are used specific frequency like 125-134KHZ as
low frequency, 13.56MHZ as a high frequency and 856MHZ to 960MHZ as ultra-high
frequency.
2. Active RFID –
In this device, RF tags are attached by a power supply that emits a signal and there is an antenna
which receives the data. means, active tag uses a power source like battery. It has it’s own power
source, does not require power from source/reader.
Generally, RFID uses radio waves to perform AIDC function. AIDC stands for Automatic Identification and
Data Capture technology which performs object identification and collection and mapping of the data.
An antenna is an device which converts power into radio waves which are used for communication between
reader and tag. RFID readers retrieve the information from RFID tag which detects the tag and reads or
writes the data into the tag. It may include one processor, package, storage and transmitter and receiver unit.
Working of RFID System :
Every RFID system consists of three components: a scanning antenna, a transceiver and a transponder.
When the scanning antenna and transceiver are combined, they are referred to as an RFID reader or
interrogator. There are two types of RFID readers — fixed readers and mobile readers. The RFID reader is a
network-connected device that can be portable or permanently attached. It uses radio waves to transmit
signals that activate the tag. Once activated, the tag sends a wave back to the antenna, where it is translated
into data.
The transponder is in the RFID tag itself. The read range for RFID tags varies based on factors including the
type of tag, type of reader, RFID frequency and interference in the surrounding environment or from other
RFID tags and readers. Tags that have a stronger power source also have a longer read range.
Features of RFID :
Application of RFID :
Advantages of RFID :
It provides data access and real-time information without taking to much time.
RFID tags follow the instruction and store a large amount of information.
The RFID system is non-line of sight nature of the technology.
It improves the Efficiency, traceability of production.
In RFID hundred of tags read in a short time.
Disadvantages of RFID :
History:
The concept of Wi-Fi is very old but its implementation is not so old. At first ALOHA System is a wireless
network system that is used to connect Hawaii island via a network in the year 1971. Where the protocol is
used for this was ALOHA protocol and the network used packet transfer. Later it’s converted to IEEE
802.11 protocol.
Then in 1985, the Federal Communications Commission (FCC) released a new network for general uses
which works on 900 Mhz, 2.4 GHz, and 5.8 GHz bandwidth. This is known as the ISM band. Also, IBM
introduced a Token Ring LAN network for connecting several computers, it can transfer data at 4 Mb/s
speed. Then in 1988, a wireless cashier system was invented based on the Token Ring LAN network known
as waveLAN, it operates at 900MHz or 2.4 GHz band and offers speeds of 1 to 2 Mbps. Then it was
converted to IEEE 802.11LAN/MAN standards in 1989. ?Then in 1990, IEEE 802.11 Working Group for
Wireless LANs is established by Vic Hayes, who was known as the “Father of WiFi”.
Then in 1994, Dr. Alex Hills introduced a research project on the wireless network, which provided
coverage of the network to 7 buildings wirelessly.
Then in 1996 Commonwealth Scientific and Industrial Research Organization (CSIRO) introduced a
wireless network based on the same protocol 802.11, later it was known as IEEE 802.11a standards.
Then after all this in 1997 the first version of Wi-Fi is released officially which is 802.11 and it can support
a maximum of 2 Mb/s link speed. Then in 1999, the link speed is increased to 11 Mb/s over the 2.4 GHz
frequency band, this version is known as 802.11b
Then after a month, the IEEE 802.11a standard is approved officially, which provides up to 54 Mb/s link
speed over the 5 GHz band, but the signal range is weaker than the 2.4 GHz band.
Then in 2003, the speed is increased in a new version, known as 802.11g. The speed offers up to 54 to 108
Mb/s over 2.4 GHz.
After this two more versions were introduced that are, 802.11i and 802.11e. In 802.11i, the security
mechanism was increased and in 802.11e, Voice over Wireless LAN and multimedia streaming are
involved.
Then in 2009, 802.11n is developed, which supports both 2.4 GHz and 5 GHz radiofrequency. And these are
used simultaneously by dual-band routers and can reach maximum speeds of 600 Mbps.
Then in 2014, a new version was introduced that offers a potential speed of 1733 Mb/s in the 5 GHz band.
This version is known as 802.11ac. Till now this is the latest version of Wi-Fi.
Applications of Wi-Fi :
Wi-Fi has many applications, it is used in all the sectors where a computer or any digital media is used, also
for entertaining Wi-Fi is used. Some of the applications are mentioned below –
Accessing Internet: Using Wi-Fi we can access the internet in any Wi-Fi-capable device
wirelessly.
We can stream or cast audio or video wirelessly on any device using Wi-Fi for our entertainment.
We can share files, data, etc between two or more computers or mobile phones using Wi-Fi, and
the speed of the data transfer rate is also very high. Also, we can print any document using a Wi-
Fi printer, this is very much used nowadays.
We can use Wi-Fi as HOTSPOTS also, it points Wireless Internet access for a particular range
of area. Using Hotspot the owner of the main network connection can offer temporary network
access to Wi-Fi-capable devices so that the users can use the network without knowing anything
about the main network connection. Wi-Fi adapters are mainly spreading radio signals using the
owner network connection to provide a hotspot.
Using Wi-Fi or WLAN we can construct simple wireless connections from one point to another,
known as Point to point networks. This can be useful to connect two locations that are difficult to
reach by wire, such as two buildings of corporate business.
One more important application is VoWi-Fi, which is known as voice-over Wi-Fi. Some years
ago telecom companies are introduced VoLTE (Voice over Long-Term Evolution ). Nowadays
they are introduced to VoWi-Fi, by which we can call anyone by using our home Wi-Fi network,
only one thing is that the mobile needs to connect with the Wi-Fi. Then the voice is transferred
using the Wi-Fi network instead of using the mobile SIM network, so the call quality is very
good. Many mobile phones are already getting the support of VoWi-Fi.
Wi-Fi in offices: In an office, all the computers are interconnected using Wi-Fi. For Wi-Fi, there
are no wiring complexities. Also, the speed of the network is good. For Wi-Fi, a project can be
presented to all the members at a time in the form of an excel sheet, ppt, etc. For Wi-Fi, there is
no network loss as in cable due to cable break.
Also using W-Fi a whole city can provide network connectivity by deploying routers at a specific
area to access the internet. Already schools, colleges, and universities are providing networks
using Wi-Fi because of its flexibility.
Wi-Fi is used as a positioning system also, by which we can detect the positions of Wi-Fi
hotspots to identify a device location.
Types of Wi-Fi:
Wi-Fi has several types of standards, which are discussed earlier, here just the name of the standards are
defined,
Year of
Standards Release Description
Wi-Fi-1 This version has a link speed from 2Mb/s to 11 Mb/s over a 2.4 GHz
(802.11b) 1999 frequency band
Wi-Fi-2 After a month of release previous version, 802.11a was released and it
(802.11a) 1999 provide up to 54 Mb/s link speed over 5 Ghz band
Wi-Fi-3 In this version the speed was increased up to 54 to 108 Mb/s over 2.4
(802.11g) 2003 GHz
This is the same as 802.11g but only the security mechanism was
802.11i 2004 increased in this version
This is also the same as 802.11g, only Voice over Wireless LAN and
802.11e 2004 multimedia streaming are involved
Wi-Fi-4 This version supports both 2.4 GHz and 5 GHz radio frequency and it
(802.11n) 2009 offers up to 72 to 600 Mb/s speed
Wi-Fi-5
(802.11ac) 2014 It supports a speed of 1733 Mb/s in the 5 GHz band
A new version will release in 2020 named 802.11ax developed by Huawei, which can support, a maximum
of 3.5 Gb/s. it will know Wi-Fi 6.
Wi-Fi is a wireless technology for networking, so it uses Electromagnetic waves to transmit networks. We
know that there are many divisions of Electromagnetic waves according to their frequency such as X-ray,
Gamma-ray, radio wave, microwave, etc, in Wi-Fi, the radio frequency is used. For transmitting Wi-Fi
signal there is three medium,
Base station network or an Ethernet(802.3) connection: It is the main host network from
where the network connection is provided to the router.
Access point or router: it is a bridge between a wired network and a wireless network. It accepts
a wired Ethernet connection and converts the wired connection to a wireless connection and
spreads the connection as a radio wave.
Accessing devices: It is our mobile, computer, etc from where we use the Wi-Fi and surfing
internet.
Working of Wi-Fi
All the electronics devices read data in binary form, also router or our devices, here routers provide radio
waves and those waves are receive by our devices and read the waves in binary form. We all know how a
wave looks like, the upper pick of the wave is known as 1 and the lower pick of the wave is known as 0 in
binary. Like below:
Data transmissionSome more terminologies
SSID (Service Set Identifier): It is a 32 character name that identifies the Wi-Fi network and
differentiates one Wi-Fi from another Wi-Fi. All the devices are attempting to connect a
particular SSID. Simply, SSID is the name of the wireless network.
WPA-PSK (Wi-Fi Protected Access- Pre-Shared Key): It is a program developed by the Wi-Fi
Alliance Authority to secure wireless networks with the use of Pre-Shared Key(PSK)
authentication. WPA has 3 types, such as WPA. WPA2, WPA3. It is a way of encrypting the Wi-
Fi signal to protect from unwanted users.
Wi-Fi uses Ad-Hoc networks to transmit. It is a point-to-point network without any interface.
How signals are reached to our devices?
Base Station
Advantages of Wi-Fi
Disadvantages of Wi-Fi
Power consumption is high while using Wi-Fi in any device which has a battery, such as mobile,
laptops, etc.
Many times there may be some security problems happening even it has encryption. Such as
many times has known devices become unknown to the router, Wi-Fi can be hacked also.
Speed is slower than a direct cable connection.
It has lower radiation like cell phones, so it can harm humans.
Wi-Fi signals may be affected by climatic conditions like thunderstorms.
Unauthorized access to Wi-Fi can happen because it does not have a firewall.
To use Wi-Fi we need a router, which needs a power source, so at the time of power cut, we
cannot access the internet.
Power Source
Power sources in IoT (Internet of Things) devices are a critical consideration as they directly impact
the device's functionality, longevity, and deployment options.
1. Battery Power:
- Advantages:
Portability: Battery-powered IoT devices are highly portable and can be placed virtually anywhere
without the need for a power outlet.
Low Maintenance: Batteries can provide power for extended periods (months to years) without the
need for frequent maintenance.
- Disadvantages:
Limited Lifetime: Batteries have a finite lifespan, and their replacement or recharging can be costly
and impractical for certain deployments.
Size and Weight: Batteries can add bulk and weight to IoT devices, which may not be suitable for
small or lightweight applications.
Environmental Impact: Battery disposal and the environmental impact of disposable batteries are
concerns.
2. Solar Power:
- Advantages:
Renewable Energy: Solar panels harness energy from the sun, providing a renewable and eco-
friendly power source.
Extended Lifespan: Solar-powered IoT devices can operate for extended periods without the need for
battery replacement.
- Disadvantages:
Sunlight Dependency: Solar power is dependent on sunlight, which can be limited in certain
geographic locations or during cloudy days.
Initial Costs: Solar panel installation can have high upfront costs, although it can lead to long-term
savings.
3. Energy Harvesting:
- Advantages:
Energy from the Environment: Energy harvesting technologies, such as vibration, thermal, or
kinetic energy, allow IoT devices to capture energy from their environment.
Continuous Operation: When implemented effectively, energy harvesting can enable continuous
device operation without the need for battery replacement.
- Disadvantages:
Variable Energy Availability: The availability of environmental energy sources can vary, making
it challenging to ensure consistent device operation.
Energy Storage: Energy harvested must be stored efficiently for later use, which may require
specialized components.
4. Wired Power:
- Advantages:
Reliable and Stable: Wired power sources, such as AC or DC power outlets, provide a stable and
reliable source of energy.
High Power Capacity: Wired connections can support high-power IoT devices and applications.
- Disadvantages:
Limited Mobility: Devices relying on wired power sources are typically fixed and cannot be
easily moved.
Installation Complexity: Installing wired power connections may be labor-intensive and costly,
especially in remote or outdoor locations.
5. Hybrid Power:
- Advantages:
Combining Sources: Hybrid power systems can combine multiple power sources, such as
batteries and solar panels, to provide redundancy and extended operation.
Flexibility: Hybrid systems can adapt to changing environmental conditions and energy
availability.
- Disadvantages:
Complexity: Designing and managing hybrid power systems can be complex and may require
specialized knowledge.
- Reducing power consumption through efficient hardware design and software optimization is crucial for
extending the lifespan of battery-powered IoT devices.
7. Energy-Efficient Communication Protocols:
- Choosing energy-efficient communication protocols like LoRaWAN or MQTT-SN can minimize the
power required for data transmission.
- Implementing energy monitoring and management features in IoT devices can help optimize power
usage and extend battery life.
UNIT IV BUILDING IoT WITH CLOUD AND DATA ANALYTICS
IoT platforms – Arduino – Raspberry Pi - Cloud Computing in IoT - Cloud Connectivity - Big
Data Analytics - Data Visualization
Iot Platform
Thus, an IoT platform can be wearing different hats depending on how you look at it. It is
commonly referred to as middleware when we talk about how it connects remote devices to user
applications (or other devices) and manages all the interactions between the hardware and the
application layers. It is also known as a cloud enablement platform or IoT enablement platform
to pinpoint its major business value, that is empowering standard devices with cloud-based
applications and services. Finally, under the name of the IoT application enablement platform, it
shifts the focus to being a key tool for IoT developers.
IoT platforms originated in the form of IoT middleware, which purpose was to function as a
mediator between the hardware and application layers. Its primary tasks included data collection
from the devices over different protocols and network topologies, remote device configuration
and control, device management, and over-the-air firmware updates.
In the four typical layers of the IoT stack, which are things, connectivity, core IoT features, and
applications & analytics, a top-of-the-range IoT platform should provide you with the majority of
IoT functionality needed for developing your connected devices and smart things.
Your devices connect to the platform, which sits in the cloud or in your on-premises data center,
either directly or by using an IoT gateway. A gateway comes useful whenever your endpoints
aren’t capable of direct cloud communication or, for example, you need some computing power
on edge. You can also use an IoT gateway to convert protocols, for example, when your
endpoints are in LoRaWan network but you need them to communicate with the cloud over
MQTT.
An IoT platform itself can be decomposed into several layers. At the bottom there is the
infrastructure level, which is something that enables the functioning of the platform. You can
find here components for container management, internal platform messaging, orchestration of
IoT solution clusters, and others.
The communication layer enables messaging for the devices; in other words, this is where
devices connect to the cloud to perform different operations.
The following layer represents core IoT features provided by the platform. Among the essential
ones are data collection, device management, configuration management, messaging, and OTA
software updates.
Sitting on top of core IoT features, there is another layer, which is less related to data exchange
between devices but rather to processing of this data in the platform. There is reporting, which
allows you to generate custom reports. There is visualization for data representation in user
applications. Then, there are a rule engine, analytics, and alerting for notifying you about any
anomalies detected in your IoT solution.
Importantly, the best IoT platforms allow you to add your own industry-specific components and
third-party applications. Without such flexibility adapting an IoT platform for a particular
business scenario could bear significant extra cost and delay the solution delivery indefinitely.
Advanced IoT platforms
There are some other important criteria that differentiate IoT platforms between each other, such
as scalability, customizability, ease of use, code control, integration with 3rd party software,
deployment options, and the data security level.
• Scalable (cloud native) – advanced IoT platforms ensure elastic scalability across
any number of endpoints that the client may require. This capability is taken for
granted for public cloud deployments but it should be specifically put to the test in
case of an on-premises deployment, including the platform’s load balancing
capabilities for maximized performance of the server cluster.
• Customizable – a crucial factor for the speed of delivery. It closely relates to
flexibility of integration APIs, louse coupling of the platform’s components, and
source code transparency. For small-scale, undemanding IoT solutions good APIs
may be enough to fly, while feature-rich, rapidly evolving IoT ecosystems usually
require developers to have a greater degree of control over the entire system, its
source code, integration interfaces, deployment options, data schemas,
connectivity and security mechanisms, etc.
• Secure – data security involves encryption, comprehensive identity management,
and flexible deployment. End-to-end data flow encryption, including data at rest,
device authentication, user access rights management, and private cloud
infrastructure for sensitive data – this is the basics of how to avoid potentially
compromising breaches in your IoT solution.
Cutting across these aspects, there are two different paradigms of IoT solution cluster
deployment offered by IoT platform providers: a public cloud IoT PaaS and a self-hosted private
IoT cloud.
An IoT cloud is a pinnacle of the IoT platforms evolution. Sometimes these two terms are used
interchangeably, in which case the system at hand is typically an IoT platform-as-aservice
(PaaS). This type of solution allows you to rent cloud infrastructure and an IoT platform all from
a single technology provider. Also, there might be ready-to-use IoT solutions (IoT cloud
services) offered by the provider, built and hosted on its infrastructure. However, one important
capability of a modern IoT platform consists in a private IoT cloud enablement. As opposed to
public PaaS solutions located at a provider’s cloud, a private IoT cloud can be hosted on any
cloud infrastructure, including a private data center. This type of deployment offers much greater
control over the new features development, customization, and third-party integrations. It is also
advocated for stringent data security and performance requirements.
Board Types
Various kinds of Arduino boards are available depending on different microcontrollers used.
However, all Arduino boards have one thing in common: they are programed through the
Arduino IDE.
The differences are based on the number of inputs and outputs (the number of sensors,
LEDs, and buttons you can use on a single board), speed, operating voltage, form factor etc.
Some boards are designed to be embedded and have no programming interface (hardware),
which you would need to buy separately. Some can run directly from a 3.7V battery, others need
at least 5V.
Here is a list of different Arduino boards available.
In this chapter, we will learn about the different components on the Arduino board. We will
study the Arduino UNO board because it is the most popular board in the Arduino board family.
In addition, it is the best board to get started with electronics and coding. Some boards look a bit
different from the one given below, but most Arduinos have majority of these components in
common.
Power USB
Arduino board can be powered by using the USB cable from your computer. All
you need to do is connect the USB cable to the USB connection (1).
Voltage Regulator
The function of the voltage regulator is to control the voltage given to the
Arduino board and stabilize the DC voltages used by the processor and other
elements.
Crystal Oscillator
The crystal oscillator helps Arduino in dealing with time issues. How does
Arduino calculate time? The answer is, by using the crystal oscillator. The
number printed on top of the Arduino crystal is 16.000H9H. It tells us that the
frequency is 16,000,000 Hertz or 16 MHz.
Arduino Reset
You can reset your Arduino board, i.e., start your program from the beginning.
You can reset the UNO board in two ways. First, by using the reset button (17)
on the board. Second, you can connect an external reset button to the Arduino
pin labelled RESET (5).
Analog pins
The Arduino UNO board has six analog input pins A0 through A5. These pins
can read the signal from an analog sensor like the humidity sensor or
temperature sensor and convert it into a digital value that can be read by the
microprocessor.
Main microcontroller
Each Arduino board has its own microcontroller (11). You can assume it as the
brain of your board. The main IC (integrated circuit) on the Arduino is slightly
different from board to board. The microcontrollers are usually of the ATMEL
Company. You must know what IC your board has before loading up a new
program from the Arduino IDE. This information is available on the top of the
IC. For more details about the IC construction and functions, you can refer to
the data sheet.
ICSP pin
Mostly, ICSP (12) is an AVR, a tiny programming header for the Arduino
consisting of MOSI, MISO, SCK, RESET, VCC, and GND. It is often referred
to as an SPI (Serial Peripheral Interface), which could be considered as an
"expansion" of the output. Actually, you are slaving the output device to the
master of the SPI bus.
TX and RX LEDs
On your board, you will find two labels: TX (transmit) and RX (receive). They
appear in two places on the Arduino UNO board. First, at the digital pins 0 and
1, to indicate the pins responsible for serial communication. Second, the TX
and RX led (13). The TX led flashes with different speed while sending the
serial data. The speed of flashing depends on the baud rate used by the board.
RX flashes during the receiving process.
Digital I/O
The Arduino UNO board has 14 digital I/O pins (15) (of which 6 provide PWM
(Pulse Width Modulation) output. These pins can be configured to work as
input digital pins to read logic values (0 or 1) or as digital output pins to drive
different modules like LEDs, relays, etc. The pins labeled “~” can be used to
generate PWM.
AREF
AREF stands for Analog Reference. It is sometimes, used to set an external
reference voltage (between 0 and 5 Volts) as the upper limit for the analog
input pins.
After learning about the main parts of the Arduino UNO board, we are ready to learn how to set
up the Arduino IDE. Once we learn this, we will be ready to upload our program on the Arduino
board.
In this section, we will learn in easy steps, how to set up the Arduino IDE on our computer and
prepare the board to receive the program via USB cable.
Step 1 − First you must have your Arduino board (you can choose your favorite board) and a
USB cable. In case you use Arduino UNO, Arduino Duemilanove, Nano, Arduino Mega 2560, or
Diecimila, you will need a standard USB cable (A plug to B plug), the kind you would connect to
a USB printer as shown in the following image.
In case you use Arduino Nano, you will need an A to Mini-B cable instead as shown in the
following image.
The IoT concepts imply a creation of network of various devices interacting with each other and
with their environment. Interoperability and connectivity wouldn’t be possible without hardware
platforms that help developers solve issues such as building autonomous interactive objects or
completing common infrastructure related tasks.
Let’s go through the most popular IoT platforms and see how they work and benefit IoT software
developers.
Arduino
The Arduino platform was created back in 2005 by the Arduino company and allows for open
source prototyping and flexible software development and back-end deployment while providing
significant ease of use to developers, even those with very little experience building IoT
solutions.
Arduino is sensible to literally every environment by receiving source data from different
external sensors and is capable to interact with other control elements over various devices,
engines and drives. Arduino has a built-in micro controller that operates on the Arduino software.
Projects based on this platform can be both standalone and collaborative, i.e. realized with use of
external tools and plugins. The integrated development environment (IDE) is composed of the
open source code and works equally good with Мac, Linux and Windows OS. Based on a
processing programming language, the Arduino platform seems to be created for new users and
for experiments. The processing language is dedicated to visualizing and building interactive
apps using animation and Java Virtual Machine (JVM) platform.
Let's note that this programming language was developed for the purpose of learning basic
computer programming in a visual context. It is an absolutely free project available to every
interested person. Normally, all the apps are programmed in C/C++, and are wrapped with avr-
gcc (WinAVR in OS Windows).
Arduino offers analogue-to-digital input with a possibility of connecting light, temperature or
sound sensor modules. Such sensors as SPI or I2C may also be used to cover up to 99% of these
apps’ market.
Arduino is a microcontroller (generally it is the 8-bit ATmega microcontroller), but not a mini-
computer, which makes Arduino somehow limited in its features for advanced users. Arduino
provides an excellent interactivity with external devices and offers a wide range of user manuals,
project samples as well as a large community of users to learn from / share knowledge with.
Raspberry Pi
This block diagram describes Model B and B+; Model A, A+, and the Pi Zero are similar, but
lack theEthernetandUSBhub components. The Ethernet adapter is internally connected to an
additional USB port. In Model A, A+, and the Pi Zero, the USB port is connected directly to
thesystem on a chip(SoC). On the Pi 1 Model B+ and later models the USB/Ethernet chip
contains a five-port USB hub, of which four ports are available, while the Pi 1 Model B only
provides two. On the Pi Zero, the USB port is also connected directly to the SoC, but it uses
amicro USB(OTG) port. Unlike all other Pi models, the 40 pin GPIO connector is omitted on the
Pi Zero, with solderable through-holes only in the pin locations. The Pi Zero WH remedies this.
Processor speed ranges from 700 MHz to 1.4 GHz for the Pi 3 Model B+ or 1.5 GHz for the Pi 4;
on-board memory ranges from 256MiBto 1GiBrandom-access memory(RAM), with up to 8 GiB
available on the Pi 4.SecureDigital(SD) cards in MicroSDHC form factor (SDHC on early
models) are used to store the operating system and program memory. The boards have one to
fiveUSBports. For video output,HDMIandcomposite videoare supported, with a standard 3.5
mmtip-ring-sleevejack for audio output. Lower-level output is provided by a number
ofGPIOpins, which support common protocols likeI²C. The B-models have an8P8CEthernetport
and the Pi 3, Pi 4 and Pi Zero W have on-boardWi-
Fi802.11nandBluetooth.
Raspberry Pi is a mono-board computing platform that's as tiny as a credit card. Initially it was
developed for computer science education with later on progress to wider functions.
Since the inception of Raspberry, the company sold out more than 8 million items. Raspberry Pi
3 is the latest version and it is the first 64-bit computing board that also comes with built-in Wi-
Fi and Bluetooth functions. According to Raspberry Pi Foundation CEO Eben Upton, "it's been a
year in the making". The Pi3 version is replaced with a quad-core 64-bit
1.2 GHz ARM Cortex A53 chip, 1GB of RAM, VideoCore IV graphics, Bluetooth 4.1 and
802.11n Wi-Fi. The developers claim the new architecture delivers an average 50% performance
improvement over the Pi 2.
Another peculiarity of Raspberry Pi is the GPIO (General Purpose Input-Output), which is a low-
level interface of self-operated control by input-output ports. Raspberry has it as a 40pin
connector.
Raspberry Pi uses Linux as its default operating system (OS). It’s also fully Android compatible.
Using the system on Windows OS is enabled through any virtualization system like XenDesktop.
If you want to develop an application for Raspberry Pi on your computer, it is necessary to
download a specific toolset comprised of ARM-compiler and some libraries complied down to
ARM-target platform like glibc.
Cloud Computing in IOT
One component that improves the success of the Internet of Things is Cloud Computing. Cloud computing
enables users to perform computing tasks using services provided over the Internet. The use of the Internet
of Things in conjunction with cloud technologies has become a kind of catalyst: the Internet of Things and
cloud computing are now related to each other. These are true technologies of the future that will bring
many benefits.
Due to the rapid growth of technology, the problem of storing, processing, and accessing large amounts of
data has arisen. Great innovation relates to the mutual use of the Internet of Things and cloud technologies.
In combination, it will be possible to use powerful processing of sensory data streams and new monitoring
services. As an example, sensor data can be uploaded and saved using cloud computing for later use as
intelligent monitoring and activation using other devices. The goal is to transform data into insights and thus
drive cost-effective and productive action.
Benefits And Functions of IoT Cloud:
Cloud is a centralized system helping to transfer and deliver data and files to data centers over the Internet.
A variety of data and programs are easy to access from a centralized cloud system.
The Internet of Things refers to devices connected to the Internet. In the IoT, data is stored in real-time, as
well as historical data. The IoT can analyze and instruct devices to make effective decisions, as well as track
how certain actions function.
Cloud computing encompasses the delivery of data to datacenters over the Internet. IBM divides cloud
computing into six different categories:
1. Platform as a Service (PaaS) –
The cloud contains everything you need to build and deliver cloud applications so there is no
need to maintain and buy equipment, software, etc.
In this case, applications run in the cloud and other companies operate devices that connect to
users’ computers through a web browser.
3. Infrastructure as a Service (IaaS) –
IaaS is an option providing companies with storage, servers, networks and hubs processing data
for each use.
4. Public cloud –
Companies manage spaces and provide users with quick access through the public network.
5. Private cloud –
The same as a public cloud, but only one person has access here, which can be an organization,
an individual company, or a user.
6. Hybrid cloud –
Data processing at the network edge or edge computing is used with IoT solutions and enables faster
processing and response times. To get a better understanding of how this works, consider a large factory
with many implemented IoT sensors. In this situation, it makes sense, before sending data to the cloud for
processing, to aggregate it close to the border to prevent cloud overload by reducing direct connections.
Data centers with this approach make data processing much faster. Yet, an approach that is only based on
the edge will never provide a complete view of business operations. If there is no cloud solution, then the
factory only controls each unit individually. Also, it has no way of imagining how these units work in
relation to each other. This is why only the combination of the edge and the cloud will enable businesses to
benefit from IoT developments.
The Role of Cloud Computing on the Internet of Things:
Cloud computing works to improve the efficiency of daily tasks in conjunction with the Internet of Things.
Cloud computing is about providing a path for data to reach its destination while the Internet of Things
generates a huge amount of data.
According to Amazon Web Services, there are four benefits of cloud computing:
1. No need to pre-guess infrastructure capacity needs
2. Saves money, because you only need to pay for those resources that you use, the larger the scale,
the more savings
3. In a few minutes, platforms can be deployed around the world
4. Flexibility and speed in providing resources to developers
Figure 1: A view of an IoT node-to-cloud connection showing the hardware and software building blocks
employed for an end-to-end IoT connection. (Image: STMicroelectronics)
Anatomy of cloud connection
But how does an IoT-to-cloud connection actually work? For a start, like every communication cannel, the
link between an IoT device and the cloud service is established via wired or wireless communication
networks such as Ethernet and Wi-Fi. Next, there are two common transport- and application-layer protocols
that help facilitate communication between an IoT device and a cloud service.
At the transport-layer level, the device-to-cloud communication usually takes place either via Transmission
Control Protocol (TCP) or User Datagram Protocol (UDP). Here, it’s important to note that though TCP
takes more network overhead, it’s favored in IoT applications for its reliability. UDP, on the other hand, is
more suitable for applications like video streaming that can afford some data packet loss.
Next, at the application-layer level, Hyper Text Transfer Protocol (HTTP) is the common standard to send
connection requests and return responses for TCP-based communications. Message Queuing Telemetry
Transport (MQTT) is another application-layer protocol; it’s lightweight with a small code footprint and is
becoming popular in resource-constrained IoT devices.
It’s a two-way data communication over the Internet between a device and a remote service. An IoT device
establishes a connection with the Internet Protocol (IP) network and is subsequently hooked to the cloud.
Here, support from MCU vendors ranges from the hardware level to the API stacks to facilitate IoT-to-cloud
development.
The APIs are well defined, and they include open-source client libraries, example codes, and protocol
stacks. Then there are third-party tools that make these APIs easier to use and deploy. So, all developers
need to learn is how to use IoT device interfaces effectively; embedded designers who know how to use or
leverage IoT device APIs are now in high demand.
Figure 2: A step-by-step display of how an MCU-based IoT device can be connected to a cloud service like
AWS IoT Core. (Image: CNX Software)
Take the example of how MCU suppliers are integrating software platforms like Amazon FreeRTOS into
their microcontroller offerings (Figure 2). Amazon FreeRTOS is an open-source real-time operating system
(RTOS) for microcontrollers that includes kernel and software libraries to connect small, low-power MCUs
to Amazon’s cloud service AWS IoT Core.
The FreeRTOS-enabled microcontrollers can directly connect to a cloud service like AWS IoT Core, or they
can connect to a local edge device such as AWS Greengrass and sustain the communications even if the IoT
device loses connection to the cloud.
Data Analytics is the science (and art!) of applying statistical techniques to large data sets to obtain
actionable insights for making smart decisions. It is the process to uncover hidden patterns, unknown
correlations, trends and any other useful business information.
Analysing data
IoT data needs to be analysed in order to make it useful, but manually processing the flood of data
produced by IoT devices is not practical. So, most IoT solutions rely on automated analytics. Analytics tools
are applied to the telemetry data to generate descriptive reports, to present data through dashboards and data
visualizations, and to trigger alerts and actions.
There are many different open-source analytics frameworks or IoT platforms that can be used to
provide IoT data processing and analytics to your IoT solutions. Analytics can be performed in real-time as
the data is received or through batch processing of historical data. Analytics approaches include distributed
analytics, real-time analytics, edge analytics and machine learning.
Distributed analytics
Distributed analytics is necessary in IoT systems to analyse data at scale, particularly when dealing
with historical data that is too vast to be stored or processed by a single node. Data can be spread across
multiple databases; for example, device data might be bucketed into databases for each device per time
period, such as hourly, daily, or monthly, like the IBM Watson IoT Historian Service that connects to
Cloudant NoSQL database that stores the IoT data. Analytics may involve aggregating results which are
distributed across multiple geographical locations. You’ll want to adopt a storage driver or analytics
framework that bridges distributed storage and compute infrastructure to allow seamless querying across
distributed databases. Of particular note for processing of distributed data are the ecosystem of frameworks
arising from the Hadoop community. Apache Hadoop is a batch processing framework that uses a
MapReduce engine to process distributed data. Hadoop is very mature and was one of the first open-source
frameworks to take off for big data analytics. There’s also Apache Spark, which was started later with an
intention to improve on some of the weak points of Hadoop. Hadoop and Spark are ideal for historical IoT
data analytics for batch-processing where time sensitivity is not an issue, such as performing analysis over a
complete set of data and producing a result at a later time.
Real-time analytics
Analytics for high-volume IoT data streams is often performed in real-time, particularly if the stream
includes time-sensitive data, where batch processing of data would produce results too late to be useful or
any other application where latency is a concern.
Real-time analytics are also ideal for time series data, because unlike batch processing, real-time analytics
tools usually support controlling the window of time analysis, and calculating rolling metrics, for example,
to track hourly averages over time rather than calculating a single average across an entire dataset.
Frameworks that are designed for real-time stream analytics include Apache Storm and Apache Samza
(usually used with Kafka and Hadoop YARN). Hybrid engines that can be used for either stream or batch
analytics include Apache Apex, Apache Spark, and Apache Flink. Apache Kafka acts as an ingestion layer
that can sit over the top of an engine like Spark, Storm or Hadoop. For a guide to selecting between these
open source frameworks, read Choosing the right platform for high-performance, cost-effective stream
processing applications.
Edge analytics
IoT analytics is not usually applied to raw device data. The data is pre-processed to filter out
duplicates or to re-order, aggregate or normalize the data prior to analysis. This processing typically occurs
at the point of acquisition, on the IoT devices themselves or on gateway devices that aggregate the data, to
determine which data needs to be sent upstream.
Analytics applied at the edges of the network, as close as possible to the devices generating the data
is known as edge analytics. Linux Foundation’s Edge X Foundry, an open source IoT edge computing
framework, also supports edge analytics.
Edge analytics is low-latency and reduces bandwidth requirements because not as much data needs
to be transmitted from the device. However, constrained devices have limited processing capacity, so most
IoT solutions use a hybrid approach involving edge analytics and upstream analytics.
Machine learning
Using traditional mathematical statistical models for analytics provides value as they can be used to
track goals, create reports and insights, predict trends, and create simulations that are used to predict and
optimize for specific outcomes. For example, you can predict the outcome of applying a specific action,
predict the time to failure for a given piece of equipment, or optimize the configuration of an IoT system in
terms of cost or performance.
However, the value of statistical analytics models diminishes when applied to dynamic data that
contains many variables that change over time, when you don’t know what factors to look for, or what
variables to change to achieve a desired outcome like reducing cost or improving efficiency. In these cases,
instead of using a statistical model, machine learning algorithms that learn from the data can be applied.
Machine learning can be applied to historic or real-time data. Machine learning techniques can be
used to identify patterns, identify key variables and relationships between them to automatically create and
refine analytics models, and then use those model for simulations or to produce decisions. Machine learning
approaches have the advantage over static statistical analytics models that as new data comes in, the models
can be improved over time, which leads to improved results. The state of the art Machine learning
techniques mostly come in the domain of Deep learning using neural networks (Convolutional Neural
Networks, Long Short Term Memory networks). Emerging and promising areas of research include Active
learning, Multi modal and Multi-Task learning, and Transformer-based language models. That being said,
the traditional machine learning methods like Regression, Support Vector Machines, and Decision trees can
still prove to be effective in a lot of applications.
Data Visualization
Data visualization is the graphical representation of data to uncover patterns, relationships, and insights that
might not be easily discernible in raw data. It involves transforming complex datasets into visual visuals,
such as charts, graphs, maps, and infographics, to make data more understandable and accessible to a wide
audience.
In the context of IoT, data visualization plays a crucial role in translating the massive amounts of data
generated by IoT devices into meaningful and actionable insights. It helps in uncovering hidden patterns,
trends, and anomalies within the data, leading to informed decision-making and improved business
outcomes.
Data visualization allows users to quickly grasp complex concepts and understand the significance of the
data. Instead of poring over spreadsheets or rows of numbers, data visualizations present information in a
visually appealing and intuitive manner, enabling easier interpretation and analysis.
By representing data visually, various relationships and patterns can be identified. For example, line charts
can show trends over time, scatter plots can reveal correlations between variables, and maps can display
geographic distribution.
Data visualization also offers the opportunity to explore data interactively. Users can utilize interactive
elements, such as filters, drill-downs, and zoom features, to delve deeper into the data and uncover more
detailed insights. This interactivity enhances the user experience and allows for dynamic exploration of the
data.
2. Identifying actionable insights: Data visualizations enable the identification of actionable insights from
IoT data. By representing data visually, patterns and relationships become more apparent, enabling
organizations to extract valuable insights. These insights can drive operational efficiency, optimize
processes, and uncover potential areas for innovation.
3. Real-time monitoring: IoT devices generate data in real-time, which requires near-instantaneous
analysis. Data visualizations provide real-time monitoring dashboards, enabling organizations to track key
performance indicators (KPIs), identify anomalies, and respond promptly to critical events. Real-time data
visualization empowers organizations to make informed decisions and take timely actions.
4. Improved collaboration: Data visualizations are easily understood by diverse audiences, including non-
technical stakeholders. By presenting data visually, organizations can foster collaboration between technical
and non-technical teams. This interdisciplinary collaboration facilitates a shared understanding of IoT data,
leading to more effective communication, problem-solving, and decision-making.
5. Enhanced data exploration: Data visualization tools offer interactive features that empower users to
explore and analyze IoT data in depth. These features include filters, drill-down capabilities, and dynamic
visual representations. With interactive data visualizations, users can uncover hidden insights, perform root
cause analysis, and gain a deeper understanding of IoT data.
7. Data-driven storytelling: Data visualization enables organizations to tell compelling stories with their
IoT data. By presenting data in a visually engaging manner, organizations can captivate audiences and
communicate data-driven insights effectively. With data-driven storytelling, organizations can gain buy-in
from stakeholders, inspire action, and drive positive business outcomes.
Data visualization in the context of IoT offers numerous benefits that help organizations harness the power
of their data. Let’s explore some of the key advantages of using data visualization in the IoT landscape:
1. Improved data comprehension: Data visualization simplifies complex data by presenting it in a visual
format that is easy to understand. By representing data using charts, graphs, and other visual elements, users
can quickly grasp patterns, trends, and relationships within IoT data. This improved comprehension
enhances decision-making and drives actionable insights.
2. Enhanced decision-making: Data visualization empowers decision-makers to make informed and data-
driven decisions. By visualizing IoT data, decision-makers can quickly identify trends, outliers, and insights
that are difficult to discern in tabular or textual formats. Visual representations facilitate quicker decision-
making, leading to better business outcomes.
3. Identification of anomalies and issues: Data visualization enables the identification of anomalies and
issues within IoT data. By spotting unusual patterns or outliers, organizations can proactively address
problems or take necessary actions. Detecting anomalies in real-time helps prevent system failures, optimize
processes, and improve overall operational efficiency.
4. Optimization of IoT systems: Data visualization provides valuable insights into the performance and
efficiency of IoT systems. By visualizing key metrics and performance indicators, organizations can identify
bottlenecks, inefficiencies, and areas for improvement. This helps optimize IoT systems, enhance device
performance, and ensure reliable and efficient operations.
5. Enhanced data exploration: Data visualization tools offer interactive features that facilitate in-depth
exploration of IoT data. Users can easily filter, drill down, and manipulate visualizations to gain deeper
insights. This interactive data exploration helps uncover hidden patterns, correlations, and dependencies
within IoT data, enabling predictive analysis and data-driven decision-making.
7. Real-time monitoring and alerts: Data visualization allows for real-time monitoring of IoT data.
Interactive dashboards provide up-to-date insights and alerts on key performance indicators and metrics.
Real-time monitoring enables organizations to respond promptly to critical events, mitigate risks, and ensure
optimal operational performance.
8. Storytelling with data: Data visualization enables impactful storytelling with IoT data. By presenting
data visually, organizations can create compelling narratives that engage and inspire audiences. Visual
storytelling helps convey the significance and implications of IoT data, driving action and enabling
stakeholders to understand the value of data-driven insights.
Data visualization in the IoT landscape is facilitated by a variety of tools and techniques specifically
designed to handle the complexities of IoT data. Let’s explore some of the commonly used tools and
techniques for data visualization in IoT:
1. Business Intelligence (BI) Platforms: BI platforms such as Tableau, Power BI, and QlikView provide
powerful data visualization capabilities. These platforms enable users to connect and visualize IoT data from
various sources, create interactive dashboards, and generate insightful reports. They offer a range of chart
types, advanced data manipulation options, and real-time monitoring features.
3. Real-time Monitoring and Dashboarding: Real-time monitoring is crucial in IoT data visualization.
Tools such as Grafana, Kibana, and Splunk enable users to create real-time dashboards that display key
metrics, alerts, and IoT data streams. These tools offer interactive visualizations, anomaly detection, and the
ability to drill down into real-time data for in-depth analysis.
4. Geospatial Visualization: Geospatial visualization is often used in IoT applications that involve
geographic data. Platforms like ArcGIS, Google Maps API, and Mapbox provide mapping capabilities to
visualize IoT data in a spatial context. Geospatial visualizations help analyze location-based data, identify
spatial patterns, and make location-specific decisions.
5. Time-Series Analysis and Visualization: Time-series analysis is crucial in IoT, where data is collected
over time. Tools like Grafana, Python’s Matplotlib, and Excel offer specialized features for time-series
analysis and visualizations. These tools enable users to uncover trends, seasonality, and anomalies in time-
series IoT data and present them in intuitive visual formats.
6. Interactive Data Exploration: Tools like Plotly, d3.js, and ggplot2 allow for interactive data exploration
and manipulation. These tools provide users with the ability to filter, sort, and drill down into IoT data to
gain deeper insights. Interactive visualizations enhance the exploration process and support data-driven
decision-making.
7. Data Streaming Visualization: For real-time data streaming from IoT devices, tools like Apache Kafka
and Apache Flink are often used. These tools allow for the data ingestion, processing, and visualization of
high-velocity IoT data streams. They provide real-time visualizations and analytics for streaming data,
enabling organizations to monitor and analyze IoT data as it flows.
8. Machine Learning and AI Visualization: Machine learning and AI techniques are employed in IoT data
analysis. Tools like TensorFlow, RapidMiner, and KNIME provide visualization capabilities specifically
designed for machine learning models and algorithms. These tools enable users to visualize model outputs,
analyze predictions, and evaluate the performance of AI-based IoT applications.
Effective data visualization in the IoT landscape requires adherence to certain best practices to ensure
clarity, accuracy, and actionable insights. Let’s explore some of the key best practices for data visualization
in IoT:
1. Understand the Audience: Start by understanding the target audience and their specific needs and goals.
Consider the level of technical expertise, domain knowledge, and the key insights they are seeking from the
IoT data. Customize the visualizations accordingly to ensure they resonate with the audience and effectively
convey the intended message.
2. Keep it Simple and Clear: Simplify complex data by using a minimalist approach. Avoid cluttered and
overloaded visuals that can confuse or overwhelm the viewers. Choose clean and straightforward visual
elements, removing any unnecessary embellishments. Focus on clarity and ensure that the key message is
communicated clearly.
3. Choose the Right Visualization Techniques: Select appropriate visualization techniques that best
represent the IoT data and insights you want to convey. Consider the data type, relationships, and objectives.
Whether it’s line charts, bar graphs, maps, or scatter plots, choose visuals that effectively communicate the
message and facilitate easy interpretation.
4. Provide Context: Contextualize the IoT data by providing relevant background information,
explanations, and labels. Include axes labels, titles, and legends to help viewers understand and interpret the
visualizations accurately. Adding context ensures that the viewers can grasp the significance of the data and
make informed decisions based on it.
5. Use Color and Contrast Thoughtfully: Color is a powerful tool in data visualization, but it should be
used thoughtfully. Choose a color palette that enhances the visual appeal without compromising clarity. Use
color to highlight key data points or patterns, and ensure sufficient contrast to distinguish between different
elements in the visualization.
6. Ensure Data Accuracy and Integrity: Validate the accuracy and integrity of the IoT data before
visualizing it. Check for outliers, missing data, and any data inconsistencies that could affect the reliability
and validity of the visualizations. Incorrect or misleading visualizations can lead to poor decision-making, so
ensure the data is trustworthy.
7. Make it Interactive: Incorporate interactive elements in the visualizations to enable viewers to explore
the IoT data further. Interactive features like filters, brushable charts, and tooltips allow users to analyze
specific areas of interest, drill down into details, and extract more insights. Interactivity enhances
engagement and facilitates deeper exploration of IoT data.
8. Consider Device Limitations: Keep in mind the limitations of the devices through which the
visualizations will be accessed. Ensure that the visualizations are responsive and optimized for different
screen sizes and resolutions. Consider the bandwidth and processing power of the devices to ensure a
smooth and seamless user experience.
9. Iterative Design and Testing: Take an iterative approach to design and testing of the visualizations. Seek
feedback from end users and stakeholders to fine-tune the visualizations and ensure they effectively meet
their needs. Test the visualizations on various devices and platforms to identify and resolve any usability or
compatibility issues.
10. Document and Maintain Consistency: Document the design decisions, guidelines, and standards for
data visualization in IoT. Maintain consistency in style, colors, fonts, and layouts across different
visualizations to reinforce the brand identity and create a cohesive experience. Consistency improves user
familiarity and allows for easier understanding and interpretation of the visualizations.
Data visualization plays a crucial role in various real-world applications of IoT, enabling organizations to
gain valuable insights from complex data and make data-driven decisions. Let’s explore some noteworthy
examples of data visualization in IoT:
1. Smart Cities: In smart cities, IoT devices gather data on traffic patterns, air quality, energy consumption,
and more. Data visualization tools help city officials analyze and visualize this data to make informed
decisions. For example, interactive maps can display real-time traffic congestion, enabling officials to
optimize traffic flow and reduce congestion.
2. Manufacturing and Industrial IoT: In manufacturing, IoT devices collect data on the production line,
equipment performance, and product quality. Data visualizations provide real-time monitoring of
manufacturing processes, highlighting areas for improvement and identifying bottlenecks. Interactive
dashboards allow operators to adjust parameters to optimize production efficiency.
3. Agriculture and Precision Farming: In precision farming, IoT sensors collect data on soil moisture,
temperature, and crop health. Data visualization tools help farmers understand this data visually, enabling
them to make informed decisions on irrigation, fertilization, and disease control. Visualizations can display
crop health maps, showing areas that require attention.
4. Healthcare and Telemedicine: In healthcare, IoT devices and wearables monitor patient vitals and
collect health data. Data visualization tools enable healthcare professionals to monitor patients remotely,
visualize trends in health parameters, and detect anomalies. This visual information assists in making timely
decisions and providing personalized care.
5. Energy Management: IoT devices monitor energy usage in smart buildings, homes, and grids. Data
visualizations help users understand energy consumption patterns, identify areas of high energy usage, and
optimize energy efficiency. Interactive dashboards can display real-time energy consumption and provide
recommendations for reducing energy waste.
6. Retail Analytics: In the retail industry, IoT devices track customer movement, footfall, and buying
behavior. Data visualizations enable retailers to understand customer behavior, optimize store layouts, and
personalize shopping experiences. Heat maps and flow diagrams visualize foot traffic patterns, informing
strategic decisions on product placement and store design.
7. Transportation and Logistics: In the transportation sector, IoT sensors gather data on vehicle
performance, fuel consumption, and route optimization. Data visualization tools help fleet managers monitor
vehicle conditions, track routes, and identify areas for improvement. Real-time visualizations can display
live tracking of vehicles, enabling efficient routing and minimizing delays.
8. Environmental Monitoring: IoT sensors collect data on air quality, water quality, and weather
conditions. Data visualization tools transform this data into interactive maps, graphs, and heat maps,
providing a comprehensive view of environmental factors. Visualizations enable researchers and
policymakers to monitor and respond to environmental changes effectively.
UNIT V CHALLENGES IN IOT AND CASE STUDIES
Security Concerns and Challenges - Real time applications of IoT – Home automation – Automatic
lighting – Home intrusion detection – Cities – Smart parking – Environment – Weather monitoring
system – Agriculture – Smart irrigation.
IoT security is based on a cybersecurity strategy to protect IoT devices and the vulnerable networks
they connect to from cyber attacks. IoT devices have no built-in security. IoT security is needed to
help prevent data breaches because IoT devices transfer data over the internet unencrypted and
operate undetected by standard cybersecurity systems.
Along with the meaning of IoT Security, it is important to understand the many challenges facing
enterprises when dealing with IoT security issues. IoT devices were not built with security in mind.
The ongoing proliferation and diversity of IoT devices and communications channels increases the
potential for your organization to be exposed to cyber threats.
Unfortunately, there is no way to install security software on most IoT devices. IoT devices may
even ship with malware on them that infects the network when they connect. This is why network
security is a priority for IoT security.
Many network security solutions do not have the ability to detect connected IoT devices or show
which devices are communicating on the network.
The following sections explore these and other big IoT security challenges including:
IoT devices often rely on weak authentication and authorization practices, which makes them
vulnerable to threats. For example, many devices use default passwords making it easier for hackers
to gain access to IoT devices and the networks they use for communication. In addition, rogue IoT
devices (i.e., undetected) that are connected to the network can be used to steal data or launch
attacks.
Lack of Encryption
The overwhelming majority of IoT device network traffic is unencrypted making confidential and
personal data vulnerable to a malware attack such as ransomware or other form of data breach or
theft. This includes IoT devices used for medical imaging and patient monitoring, as well as security
cameras and printers.
The short development cycles and low price points of IoT devices limit the budget for developing
and testing secure firmware. Without this built-in IoT security, IoT devices are vulnerable to the
most rudimentary forms of attack. From firmware to software and third-party apps–millions of
devices are affected by vulnerabilities in standard components.
Plus, network environments can be compromised by vulnerable web apps and software for IoT
devices. Whether it is a new threat or old malware, without IoT security, all types of vulnerabilities
make IoT devices good targets for savvy bad actors to stage cyberattacks.
IoT devices are often connected to the same network as other devices, which means that an attack on
one device can spread to others. Lack of network segmentation and oversight of the ways IoT
devices communicate makes them easier to intercept. For example, not long ago the automotive
industry’s adoption of Bluetooth technology in IoT devices resulted in a wave of data breaches that
made the news. As well, protocols like HTTP (Hypertext Transfer Protocol) and API–are all
channels that IoT devices rely on and cyber criminals exploit.
For example, in 2022, millions of Buetooth digital locks in smart cars could be remotely unlocked by
hackers exploiting a vulnerability in Bluetooth technology. As well, protocols like HTTP (Hypertext
Transfer Protocol) and API-are channels that IoT devices rely on and cyber criminals can exploit.
IoT manufacturers don’t focus on building IoT security into their devices to make hardware tamper
proof and secure. Many IoT devices are not designed to receive regular IoT security updates, which
makes them vulnerable to attacks. Without built-in IoT security it’s difficult to ensure secure
upgrades, provide firmware updates and patches, and perform dynamic testing. Therefore, the onus
is on the organization to protect its IoT devices and network environment from cyber threats.
The IoT attack surface expands every day as more and more devices come online–from our
smartwatches and smart TVs, to our smart homes and smart cars, to the ever-growing industry IoT.
In addition to consumer goods, IoT sensors are widely used in healthcare, manufacturing, and supply
chain operations, as well as for green agriculture, the economy, and national defense.
Burgeoning IoT spans virtually any device or sensor that connects to the internet-from a large
container on an ocean barge to a small Tile Tracker for your phone. To underscore, the IEEE IoT
technology forecast of connected devices is expected to increase by about 300% from 8.7 billion
devices in 2020 to more than 25 billion IoT devices in 2030.
Given the expanded attack surface for security risks to availability, integrity and confidentiality, IoT
security is critical for organizations to protect their network environments from IoT device-borne
threats.
IoT and security requirements can only be accomplished with an integrated solution that delivers
visibility, segmentation, and protection throughout the entire network infrastructure, such as a
holistic security fabric approach.
Learn: With complete network visibility, security solutions can authenticate and classify IoT
devices to build a risk profile and assign them to IoT device groups.
Segment: Once the enterprise understands its IoT attack surface, IoT devices can be
segmented into policy-driven groups based on their risk profiles.
Protect: The policy-driven IoT groups and internal network segmentation enable monitoring,
inspection, and policy enforcement based on the activity at various points within the
infrastructure.
Understanding IoT Security Requirements
IoT security requirements support an IoT security strategy that is specific to the business, industry,
and network environment. There is a broad swath of protection to be considered in addition to the
rigor of practicing administrative oversight, conducting regular patches and updates, enforcing use of
strong passwords, and focusing on Wi-Fi security.
Monitoring network and device behavior to detect deviations is a best practice to detect malware
from an IoT device vulnerability. Another best practice is network segmentation of IoT devices
whereby they connect to a separate network to isolate vulnerable devices and threats to prevent
malware from spreading across the enterprise. Applying zero-trust network access provides an
additional layer of security.
With the limited configuration capabilities of many IoT devices, instead of trying to secure the IoT
firmware and software, you can protect your IoT environment with security solutions that provide
multiple layers of protection including endpoint encryption.
As the IoT and the cloud converge, consider securing the technologies with another layer of cloud-
based security solutions that also add processing capabilities to devices at the edge.
There are many different protocols used by IoT devices from internet protocols and network
protocols to Bluetooth and other communications protocols. Understanding the protocols your
devices use can help reduce security risks.
Industries that rely on GPS for critical operations should monitor their GPS connected devices for
potential security issues such as fake or jammed GPS signals.
Attackers prey on negligence. They take advantage of organizations that do not oversee IoT devices
that are connected to the corporate network. These devices can include anything from rogue devices
to overlooked routers with outdated firmware. Understanding the risk of each device that is
connected to your network and monitoring individual behavior is critical to prevent cyber attacks.
Also essential to IoT security is maintaining a full inventory of networked devices on the corporate
network. Finding a solution that can discover–in minutes–all the IoT connections within your
network should be a top priority.
Authentication is one of the most crucial security measures for an engineer to consider in an IoT
deployment. IT administrators can determine which IoT authentication and authorization type, such
as one-way, two-way, or three-way, will serve the organization best based on the mechanism’s
latency and data requirements.
As mentioned above (e.g., default passwords), most IoT devices come with poor authentication.
When deploying IoT devices, similar to websites and web apps, one of the best methods for IT
admins to secure IoT devices is to use digital certificates. IoT device certificates are integral to an
IoT security strategy.
The primary purpose of encryption is to protect the confidentiality of digital data stored on computer
systems or transmitted over the internet or any other computer network. IoT encryption is a key
player in securing many different types of IoT devices. By encrypting data communications from
IoT devices, an organization stands to gain confidentiality of contents, authentication of origin, data
integrity, and awareness of the sender.
Encryption is an effective way to secure data, but the cryptographic keys must be carefully managed
to ensure data remains protected, yet accessible when needed. While IoT devices often are not
targets themselves, without built-in security, they serve as attractive conduits for the distribution of
malware that could result in a data breach.
Data encryption is not a substitute for other information protection controls, such as physical access,
authentication and authorization, or network access controls. Data encryption is a method to reduce
risk as is the practice of using secure communications protocols and channels for sensitive data.
Although IoT devices are easy to deploy, their communication protocols must have the processing
power, range, and reliability to run on existing internet infrastructure as called out in the criteria for
IoT implementation (Wi-Fi 802.11 a/b/g/n/ac, etc.).
It is important to consider power consumption when designing an IoT network. Low power wireless
networks are best. For this reason, communication protocols created for IoT application
requirements generally fall into two groups:
Like other digital devices, IoT devices must be patched and updated to prevent threats from taking
advantage of vulnerabilities in software and firmware. Installing updates and patching vulnerabilities
is essential to IoT security as well as operational technology (OT). When devices cannot be patched
or taken offline to prevent exploitation, administrators can deploy intrusion prevention
systems (IPS).
Managing IoT security on your network could be overwhelming without the help of IoT detection
services and tools that discover IoT devices, block malicious traffic, and enable virtual patching.
Detection is based on a local (installed) library of IoT devices that is regularly expanded and updated
for the latest threats and vulnerabilities. Along with an IPS and network access control, detection
services are integral to an IT security strategy for effective risk management.
Which IoT Device Types Are Most Susceptible to Security Risks?
Cyber attacks are used to exploit unprotected IoT devices with tactics such as network scanning,
remote code execution, and command injection. The healthcare industry has the highest share of IoT
security issues from internet connected devices used for medical imaging systems, patient
monitoring systems, and medical device gateways. Another high-risk sector includes commonly used
IoT devices such as security cameras and printers. Consumer electronics, IP phones, and energy
management devices are also at higher risk.
Many industries have adopted IoT at the risk of higher exposure to cyber threats from vulnerabilities
in IoT devices. Some industries are more vulnerable than others due to the sensitive nature of their
data (e.g., medical records, autonomous vehicles, or intellectual property).
These include large organizations with complex networks, digital factories and plants that rely on
industrial operational technology (OT), and healthcare organizations that use medical IoT for patient
care such as networked scanners, monitoring tools, wearable devices, and other internet connected
systems.
IoT devices are not built to meet the business and regulatory requirements of critical industries. If
developers integrated security into IoT devices and software, it would go a long way to help protect
sensitive data and prevent exploitation when those devices go online.
IoT Applications:
IoT applications promise to bring immense value into our lives. With newer wireless networks,
superior sensors and revolutionary computing capabilities, the Internet of Things could be the
next frontier in the race for its share of the wallet. IoT applications are expected to equip billions
of everyday objects with connectivity and intelligence. It is already being deployed extensively,
few applications of IoT:
• Wearables
• Smart Home Applications
• Smart Buildings
• Smart Infrastructure
• Securities
• Health Care
• Smart Cities
• Agriculture
• Industrial Automation
Smart Cities:
The urbanization process has greatly improved people’s standard of living, providing water supplies
and sewerage systems, residential and office buildings, education and health services and convenient
transportation. The concentration of educated people in cities helps to improve the industrial structure and
promote production efficiency. However, urbanization also creates new challenges and problems. As a
representative developing country, the economic advantages of Indian cities are being offset by the perennial
urban curses of overcrowding, air and water pollution, environmental degradation, contagious diseases and
crime; the urban issues of reducing air pollution and providing clean water, safe neighborhoods and efficient
infrastructure desperately need to be addressed.
All these challenges and problems force citizens, governments and stakeholders to pay attention to the
environment and sustainable development of cities, and to try to find a set of technical solutions to reduce
these urban problems. The Information and Communication Technology (ICT) revolution has offered people
the opportunity to reduce the scale of and/or solve urbanization issues. During the past 10 years, city
systems have become more digital and information-based, and there has been a fundamental change in the
living environment of citizens and the governing mode of cities. The economy, culture, transport,
entertainment and all other aspects of cities have become closely combined with ICT, and the Internet has
become a major part of citizens’ daily lives. The abundant accomplishments of digitizing a city’s
information not only introduce daily convenience to the population, but also establish an infrastructure and
conglomeration of data as a basis for further evolution of modern cities. Over the last 10 years, innovative
information technologies such as cloud computing, ‘big data’, data vitalization, the ‘Internet of Things’ and
mobile computing have become widely adopted in a variety of different areas. Cloud computing enables,
developers to provide internet services without the need for a large capital outlay on hardware for
deployment or the staff to operate it. The amount of information published and processed both on- and
offline has given rise to an information explosion, and a new field dedicated to dealing with it—big data—
which has spawned the need for new, more scalable, techniques to derive answers from huge sets of data.
The emergence of the Internet of Things makes it possible to access remote sensor data and to control the
physical world from a distance, meaning that cities can effectively sense and manage essential elements such
as the water supply, building operations, and road and transport networks. Data vitalization proposes a new
paradigm for large-scale dataset analysis and offers ubiquitous data support for top-level applications for
smart cities. With the help of mobile computing, users can access and process information anywhere, and
anytime, on all aspects of life. The urbanization, growth and associated problems of modern cities, coupled
with the rapid development of new ICT, has enabled us to first envisage the ‘smart cities’ concept, and now
to begin to build smart cities, which is seen as the future form for cities. Figure 1 shows how a smart city is
formed. Smart city includes smart business, smart living, smart education, smart community, smart
government, smart infrastructure, smart utility, smart mobility and smart environment.
The new Internet of Things (IoT) applications are enabling Smart City initiatives worldwide. It
provides the ability to remotely monitor, manage and control devices, and to create new insights and
actionable information from massive streams of real-time data. The main features of a smart city include a
high degree of information technology integration and a comprehensive application of information
resources. The essential components of urban development for a smart city should include smart technology,
smart industry, smart services, smart management and smart life. The Internet of Things is about installing
sensors (RFID, IR, GPS, laser scanners, etc.) for everything, and connecting them to the internet through
specific protocols for information exchange and communications, in order to achieve intelligent recognition,
location, tracking, monitoring and management. With the technical support from IoT, smart city need to
have three features of being instrumented, interconnected and intelligent. Only then a Smart City can be
formed by integrating all these intelligent features at its advanced stage of IOT development. The explosive
growth of Smart City and Internet of Things applications creates many scientific and engineering challenges
that call for ingenious research efforts from both academia and industry, especially for the development of
efficient, scalable, and reliable Smart City based on IoT. New protocols, architectures, and services are in
dire needs to respond for these challenges. The goal of the special issue is to bring together scholars,
professors, researchers, engineers and administrators resorting to the state-of-the-art technologies and ideas
to significantly improve the field of Smart City based on IoT.
So, when we talked about smart cities; what is it. So, in addition to the regular infrastructure that is
there in any city for example, the urban infrastructure consisting of office buildings residential areas
hospitals schools transportation police and so on you also need something in addition to make the cities
smart. So, what is this in addition let us talk about. So, smart means what smart means that it is in terms of
the services that are given to the respective stake holders of these cities. So, citizens are able to do things in
a better manner in an improved manner then usual and how is that made possible that is made possible with
the help of nothing, but the ICT technologies information and communication technologies which also
includes electronics embedded electronics different other advanced topologies in electrical in a electrical
sciences and so on. So, computers electronics put together can make these cities smart.So, definitely will
have to take help of sensors ,sensor networks sensor networks then actuators then the different other
communication technologies RFID, NFC, ZWAVE and so and so forth.
Modern urban spaces are hotbeds of new ideas and world-shaking innovations. As for urban
adoption of connected tech: all things considered, it really makes practical sense. Densely populated areas
stand to gain the most from improved surroundings, and depending on the city, they might already come
equipped with the fundamental IT infrastructures, which makes the further adaption easier. Meanwhile, the
IoT might also offer some solutions to ease the huge burden that the urban explosion has meant for the
existing infrastructures.
Connected City
A common definition for a smart city is using ICT to make a city (administration, education,
transportation, etc.) more intelligent and efficient. The definitions and concepts of smart cities are still
emerging, and there is currently no clear and consistent definition of a smart city among the different
stakeholders. In order to implement and assess smart cities in practice, a deeper understanding of the ‘smart
city’ still needs to be defined. Many countries and cities have launched their own smart city projects to
resolve urbanization issues and challenges. The USA was one of the first countries to launch a smart city
project with a high compliment of smarter planet notions from President Barack Obama. In particular, for
developing countries, the speed of urbanization is considerably faster and, as a consequence, the
infrastructure problems faced are much greater. In 2014, India declared an intention to build more than 100
smart cities, with high-technology communication capabilities, throughout the country. ICT plays an
important role in smart city construction. Top-level architecture research plays a considerable role in guiding
technology development in every domain of a smart city and improving research into resource
configuration. Now let’s extrapolate the potential use cases to an entire city in which we have many objects
that are capable of capturing information and interacting with other objects. The street lamp can now not
only communicate with the devices that are closest but with other objects that are connected to the Internet
and process this information to make decisions, for example, about the intensity of the light that is the most
appropriate. The objects can also send information about what is happening in their environment or process
different information. If the information from the street lamp is processed alongside with information from a
nearby traffic light, we can start talking about the IoT use cases in the smart city environment.
When it comes to smart cities and the management of public space, the scope of possibilities, that
IoT offers, is infinite. In other words, the IoT comes with considerable possibilities and room for
manoeuvre within the field of smart cities. It is one of the aspects that we will touch in the Master’s in
Global Smart City Manager. IoT is a technology that is already there, that has been developed for a long
time, but whose implantation in the public space will prevail in the years to come.
And depending on the way we approach our smart city project or the implementation of this
technology in public space, smart city projects will be developed in one way, or another, they will be able to
achieve common objectives in one way or another.
Possible IoT Use Cases for Smart Cities
Smart parking
An IoT solution will permit monitoring the availability of parking spots in the city. With the GPS data from
drivers’ smartphones (or road-surface sensors in the ground), smart parking solutions let the user know when
the closest parking spot becomes free to find a parking spot faster and easier instead of blindly driving
around.
Smart cities can be described as cities capable of using information technology to create efficiencies and
create sustainability, and improve the quality of life of it’s residents. A smart city is basically a living entity,
capable of extraordinary adaptations that we once thought were not possible. This post will be discussing
smart cities, including what makes a smart city, it’s benefits, it’s effects on the environment, and what
negative effects, if any it might have on it’s citizens and the world as a whole.
Smart Home:
The Internet of Things (IoT) is a system that allows devices to be connected and remotely monitored
across the Internet. In the last years, the IoT concept has had a strong evolution, being currently used in
various domains such as smart homes, telemedicine, industrial environments, etc. Wireless sensor network
technologies integrated into the IoT enable a global interconnection of smart devices with advanced
functionalities. A wireless home automation network, composed of sensors and actuators that share
resources and are interconnected to each other, is the key technology to making intelligent homes.
A “smart home” is a part of the IoT paradigm and aims to integrate home automation. Allowing
objects and devices in a home to be connected to the Internet enables users to remotely monitor and control
them. These include light switches that can be turned on and off by using a smartphone or by voice
command, thermostats that will adjust the indoor temperatures and generate reports about energy usage, or
smart irrigation systems that will start at a specific time of a day, on a custom monthly schedule, and thus
will control water waste. Smart home solutions have become very popular in the last years. Figure 1 shows
an example of a smart home that uses different IoT-connected utilities.
One of the greatest advantages of home automation systems is their easy management and control
using different devices, including smartphones, laptops and desktops, tablets, smart watches, or voice
assistants. Home automation systems offer a series of benefits; they add safety through appliance and
lighting control, secure the home through automated door locks, increase awareness through security
cameras, increase convenience through temperature adjustment, save precious time, give control, and save
money.
Several home automation systems involved with IoT have been proposed by academic researchers in
the literature in the last decade. In wireless-based home automation systems, different technologies have
been used, each of them with their pros and cons. For example, Bluetooth-based automation is low cost, fast,
and easy to be installed, but it is limited to short distances. GSM and ZigBee are widely used wireless
technologies as well. GSM provides long-range communication at the cost of a mobile plan of the service
provider that operates in the area. Zigbee is a wireless mesh network standard that is designed to be low-cost
and with low power consumption, targeted at battery-powered devices in wireless control and monitoring
applications. However, it has a low data speed, low transmission, as well as low network stability, and has a
high maintenance cost. The advantages of Wi-Fi technology over ZigBee or Z-Wave are related to price,
complexity (meaning simplicity), and accessibility. First, Wi-Fi-enabled smart devices are usually cheap. In
addition, it is easier to find do-it-yourself devices that use Wi-Fi, resulting a less expensive option. Second,
Wi-Fi is already a necessity and it is in most homes, so it is easier to buy devices that are already Wi-Fi-
enabled. Finally, Wi-Fi is characterized by simplicity, meaning that a user must connect only a minimal
number of devices for a home automation setup. Since it is very common, the investment on extra hardware
is avoided; a user only needs the basic setup for a home automation system. However, Wi-Fi is not designed
to create mesh networks, it consumes ten times more energy than similar devices using ZigBee
, Z-Wave, or Bluetooth for example, and many Wi-Fi routers can only allow up to thirty devices
connected at once. As compared to Ethernet, Wi-Fi brings several advantages, including the easy connection
and access of multiple devices, the expandability (adding new devices without the hassle of additional
wiring), lower cost, or single access point requirement.
The basic architecture enables measuring home conditions, process instrumented data, utilizing
microcontroller-enabled sensors for measuring home conditions and actuators for monitoring home
embedded devices.The popularity and penetration of the smart home concept is growing in a good pace, as it
became part of the modernization and reduction of cost trends. This is achieved by embedding the capability
to maintain a centralized event log, execute machine learning processes to provide main cost elements,
saving recommendations and other useful reports.
Smart home services
Measuring home conditions
A typical smart home is equipped with a set of sensors for measuring home conditions, such as: temperature,
humidity, light and proximity. Each sensor is dedicated to capture one or more measurement. Temperature
and humidity may be measured by one sensor, other sensors calculate the light ratio for a given area and the
distance from it to each object exposed to it. All sensors allow storing the data and visualizing it so that the
user can view it anywhere and anytime. To do so, it includes a signal processer, a communication interface
and a host on a cloud infrastructure.
Cloud computing and its contribution to IoT and smart home: Cloud computing is a shared pool of
computing resources ready to provide a variety of computing services in different levels, from basic
infrastructure to most sophisticated application services, easily allocated and released with minimal
efforts or service provider interaction. In practice, it manages computing, storage, and
communication resources that are shared by multiple users in a virtualized and isolated environment.
IoT and smart home can benefit from the wide resources and functionalities of cloud to compensate
its limitation in storage, processing, communication, support in pick demand, backup and recovery.
For example, cloud can support IoT service management and fulfillment and execute complementary
applications using the data produced by it. Smart home can be condensed and focus just on the basic
and critical functions and so minimize the local home resources and rely on the cloud capabilities
and resources. Smart home and IoT will focus on data collection, basic processing, and transmission
to the cloud for further processing. To cope with security challenges, cloud may be private for highly
secured data and public for the rest.
Infrastructure
Smart Cities utilize sensor technology to gather and analyze information in an effort to improve the quality
of life for residents. Sensors collect data on everything from rush hour stats to crime rates to overall air
quality. Complicated and costly infrastructure is involved in installing and maintaining these sensors. How
will they be powered? Will it involve hard-wiring, solar energy, or battery operation? Or, in case of power
failure, perhaps a combination of all three? Funding for new infrastructure projects is limited and approval
processes can take years. Installing new sensors and other improvements cause temporary – though still
frustrating – problems for people living in these cities.
Security and Hackers
As IoT and sensor technology use expands, so does the threat level to security. This begs the question…is
technology really considered “smart” if hackers can break into it and shut down an entire city? Recent
discussion involving cyber-terror threats to vulnerable and outdated power grids has everyone a bit more
concerned and skeptical about technology and security. Smart Cities are investing more money and
resources into security, while tech companies are creating solutions with new built-in mechanisms to protect
against hacking and cyber-crimes.
Privacy Concerns
In any major city, there’s a balance between quality of life and invasion of privacy. While everyone wants to
enjoy a more convenient, peaceful, and healthy environment, nobody wants to feel like they are constantly
being monitored by “Big Brother.”
Cameras installed on every street corner may help deter crime, but they can also install fear and
paranoia in law-abiding citizens. Another valid concern is the amount of data being collected from all the
smart sensors residents come into contact with each day.
Educating & Engaging the Community
For a Smart City to truly exist and thrive, it needs “smart” citizens who are engaged and actively taking
advantage of new technologies. With any new city-wide tech project, part of the implementation process
must involve educating the community on its benefits. This can be done through a series of in-person town
hall-style meetings and email campaigns with voter registration, as well as an online education platform that
keeps citizens engaged and up-to-date. When a community feels like it’s playing a part in the overall
decisions that affect daily life, and is being communicated to in a clear and thoughtful manner, it’s more apt
to use the technology and encourage others to use it as well. This is key to a Smart City’s success.
Connected vehicles:
Connected vehicle technology can change our transportation system as we know it by enabling safe,
interoperable networked wireless communications among vehicles, the infrastructure, and passengers’
personal communications devices. Connected vehicle technology will enable cars, trucks, buses, and other
vehicles to “talk” to each other with in-vehicle or aftermarket devices that continuously share important
safety and mobility information. Connected vehicles can also use wireless communication to “talk” to traffic
signals, work zones, toll booths, school zones, and other types of infrastructure.
Different communications technologies (satellite, cellular, dedicated short range communications) may be
utilized depending on the performance requirements of the connected vehicle applications. Cars, trucks,
buses, and other vehicles can “talk” to each other with in-vehicle or aftermarket devices that continuously
share important safety and mobility information. Connected vehicles can also use wireless communication to
“talk” to traffic signals, work zones, toll booths, school zones, and other types of infrastructure. The vehicle
information communicated does not identify the driver or vehicle, and technical controls have been put in
place to help prevent vehicle tracking and tampering with the system. The vision for connected vehicle
technologies is to transform surface transportation systems to create a future where:
• Highway crashes and their tragic consequences are significantly reduced
• Traffic managers have data to accurately assess transportation system performance and actively manage
the system in real time, for optimal performance
• Travelers have continual access to accurate travel time information about mode choice and route options,
and the potential environmental impacts of their choices
• Vehicles can talk to traffic signals to eliminate unnecessary stops and help drivers operate vehicles for
optimal fuel efficiency.
Challenges:
Security
Privacy
Scalability
Reliability
Quality of service
Lack of Global Standards
Vehicle to Everything (V2X) is a vehicular communication system that supports the transfer of information
from a vehicle to moving parts of the traffic system that may affect the vehicle. The main purpose of V2X
technology is to improve road safety, energy savings, and traffic efficiency on the roads.
The key components of V2X technology include V2V (vehicle-to-vehicle) and V2I (vehicle-to-
infrastructure). V2V allows vehicles to communicate with other vehicles on the road, while V2I allows
vehicles to communicate with external entities, such as traffic lights, parking spaces, cyclists, and
pedestrians. The technologies help improve road safety, reduce fuel consumption, and enhance the
experience between drivers and other road users, such as cyclists and pedestrians. When V2X systems are
integrated into traditional vehicles, drivers can receive important information about the weather patterns,
nearby accidents, road conditions, road works warning, emergency vehicle approaching, and activities of
other drivers using the same road. Autonomous vehicles equipped with V2X systems may provide more
information to the existing navigation system of the vehicle. The systems also make it possible for
autonomous vehicles to scan the surrounding environment and make immediate decisions based on the
information received.
Smart Grid:
The “grid” is the electrical network serving every resident, business and infrastructure service in a city. The
“smart grid” is the next generation of those energy systems, which have been updated with communications
technology and connectivity to drive smarter resource use.
The technologies that make today’s IoT-enabled energy grid “smart” include wireless devices such as
sensors, radio modules, gateways and routers. These devices provide the sophisticated connectivity and
communications that empower consumers to make better energy usage decisions, allow cities to save
electricity and expense, and enables power authorities to more quickly restore power after a blackout.
The Smart Grid is critical to building a secure, clean, and more efficient future, according to the
International Energy Agency (IEA). The Smart Grid is part of an IoT framework, which can be used to
remotely monitor and manage everything from lighting, traffic signs, traffic congestion, parking spaces, road
warnings, and early detection of things like power influxes as the result of earthquakes and extreme weather.
The Smart Grid does this through a network of transmission lines, smart meters, distribution automation,
substations, transformers, sensors, software and more that are distributed to businesses and homes across the
city.
Smart Grid technologies all contribute to efficient IoT energy management solutions that are currently
lacking in the existing framework. What makes the IoT Smart Grid better is two-way communication
between connected devices and hardware that can sense and respond to user demands. These technologies
mean that a Smart Grid is more resilient and less costly than the current power infrastructure.
One of the advantages of smart grids is that they can tell us the consumption at an energy meter at any time,
so users are better informed of their real consumption. Moreover, with better consumption monitoring,
contracted power can be adjusted to meet the real need of each consumer. These two factors result in users
reducing their consumption and tailoring their contracted power to their real needs.
Better customer service and more accurate bills
Another key advantage offered by tele-management systems is that bills are more accurate. They always
reflect the real consumption of each month instead of estimates, reducing the cost of the old system of
manual energy meter readings. In addition to being able to access information about the installation
remotely, problems become easier to diagnose and solutions can therefore be implemented faster, improving
customer service. Now a days customers have to notify companies for them to take action. But with remote
management the system itself automatically reports all incidents to the electric company so it can respond
faster to users.
Smart Grids can collect much more data than the manual energy meter reading system. This permits the use
of data analysis techniques and the preparation of highly realistic consumption forecasts as many more
variables are taken into account. Utilities can then better tailor their production to consumption (balances)
and reduce energy surpluses.
All the benefits above involve reducing consumption, which entails a reduction in CO2 emissions. We can
thus say that Smart Grids lead to a more sustainable future. All this will directly contribute to the future
integration of electric vehicle charging systems on the mains. The deployment of renewable energy systems
is also made easier as utilities gain greater control of their grids.
Traditional energy grids are designed to transmit electricity from a large, centralized power station to a wide
network of homes and businesses in the area. At this stage, the electric grid is not designed to accept inputs
from homes and businesses that are generating power via solar panels or windmills. A smart grid is designed
to accept power from renewable resources. Crucially, the smart grid in conjunction with wirelessly enabled
smart meters can keep track of how much energy a net-positive establishment is generating and reimburse
them accordingly. The smart grid also allows for monitoring of solar panels and equipment as well. We
mentioned earlier that a smart grid can mitigate the effects of a disaster such as a terrorist attack or natural
disaster on a power station, a feat that’s possible due to decentralized energy generation. Under the
traditional model, a small number of power plants powered a city. This left these services vulnerable to
threats that would result in widespread blackouts and energy shortages. With a decentralized model, even if
the centralized power plant is taken offline, multiple alternative sources, including wind and solar, can
supplant the resources in the grid. This decentralized system is much harder to take offline and can provide a
robustness that’s not possible when one plant is powering an entire city.
Smart grid technology can be expressed in a single sentence: a new electric grid with two-way
communication. For the first time, businesses and consumers can get real time billing information while
utility companies can better meet the needs of their customers as they react to demand spikes and fix or
manage blackouts and other challenges. Smart grid is resilient, efficient and green which is good for the
consumer, the utility company and the environment. Wireless technology will replace thousands of miles of
cable that would have been needed to advance the smart grid to where it is today.
Challenges:
High Investment
Cyber attacks
Industrial IoT:
The Industrial Internet of Things (IIoT), which is considered as the main future IoT-application
area, is defined by the Industrial Internet Consortium as machines, computers and people enabling intelligent
industrial operations using advanced data analytics for transformational business outcomes” (“Industrial
Internet Consortium,” 2017). Generally, IioT is one basis of Industry 4.0 and the digital transformation. The
IioT is the connection between IT (information technology) and OT (operational technology). IioT is the
most important segment in IoT, much more than consumer applications. The Industrial Internet of Things is
related to the Industry 4.0: all IoT applications in Industry 4.0 are forms of IioT but not all IioT use cases are
about the industries which are categorized as Industry 4.0. Typical use cases of the Industrial Internet of
Things include intelligent machine applications, industrial control applications, factory floor use cases,
condition monitoring, use cases in agriculture or smart grid applications. It is important to know that the
IioT is not just about saving costs and optimizing efficiency though. Companies also have the possibility to
realize important transformations and can find new opportunities, e.g., entirely new business models in
Industry 4.0.
According to TechTarget, IioT can be formally defined as “the use of smart sensors and actuators to enhance
manufacturing and industrial processes. Also known as the industrial internet or Industry 4.0, IioT leverages
the power of smart machines and real-time analytics to take advantage of the data that dumb machines have
produced in industrial settings for years.”
Industrial IoT capabilities require widespread digitization of manufacturing operations. Organizations must
include four primary pillars to be considered a fully IioT-enabled operation:
Smart machines equipped with sensors and software that can track and log data.
Robust cloud computer systems that can store and process the data.
Advanced data analytics systems that make sense of and leverage data collected from systems,
informing manufacturing improvements and operations.
Valued employees, who put these insights to work and ensure proper manufacturing function.
Benefits of IioT
These are 5 of the biggest benefits of adopting a fully connected IIoT manufacturing operation.
Increase efficiency
The biggest benefit of IIoT is that it gives manufacturers the ability to automate, and therefore optimize their
operating efficiency. Robotics and automated machinery can work more efficiently and accurately, boosting
productivity and helping manufacturers streamline their functions.
Additionally, physical machinery can be connected to software via sensors that monitor performance on a
constant basis. This enables manufacturers to have better insights into the operational performance of
individual pieces of equipment as well as entire fleets.
IIoT-enabled data systems empower manufacturers to improve operating efficiencies by:
Bypassing manual tasks and functions and implementing automated, digital ones
Making data-driven decisions regarding all manufacturing functions
Monitoring performance from anywhere – on the manufacturing floor or from thousands of miles
away
Reduce Errors
Industrial IoT empowers manufacturers to digitize nearly every part of their business. By reducing manual
process and entries, manufacturers are able to reduce the biggest risk associated with manual labor – human
error.
This goes beyond just operational and manufacturing errors. IIoT solutions also can reduce the risk of cyber
and data breaches caused by human error. A Cyber Security Trend report cited people as the biggest cause
of cyber security breaches, with human error being the culprit 37% of the time. AI and machine learning-
enabled programs and machinery can do much of the required computing themselves, eliminating the
potential for someone to make a simple mistake, and put the manufacturer’s data at risk.
Predictive Maintenance
Nothing negatively impacts a manufacturing operation more than machine downtime. When maintenance in
the manufacturing world is reactive rather than proactive, manufacturers are stuck trying to identify what the
issue is, how it can be repaired, and what it will cost. With predictive maintenance powered by industrial
IoT solutions, all of those issues are alleviated.
When machinery performance and function is monitored consistently, manufacturers can create a baseline.
This baseline and the corresponding data empowers companies with the information they need to see any
issue before it occurs. They can then schedule maintenance prior to downtime, which benefits them in that
they:
Improve Safety
All of the data and sensors required of a fully functioning IIoT manufacturing operation are also helping to
bolster workplace safety. “Smart manufacturing” is turning into “smart security” when all of the IIoT
sensors work together to monitor workplace and employee safety.
Integrated safety systems are protecting workers on the floor, on the line, and in distribution. If an accident
occurs, everyone in the facility can be alerted, operations can cease, and company leadership can intervene
and make sure the accident and incident is resolved. This incident can also generate valuable data that can
help prevent a repeat occurrence in the future.
A newer option some manufacturers are utilizing is the use of wearable technology among their employees.
Wearables have been part of IoT since its infancy, and it are just now being utilized in industrial IoT
operations.
Wearables help leadership keep tabs on things like employee posture and the surrounding noise levels, and
they can then improve work conditions and potentially improve performance. They can also alert employees
when they aren’t following proper workplace safety procedures, so they can correct their actions and stay
safe on the job.
Reduce Costs
Knowledge is power, and the knowledge provided to manufacturers via IIoT solutions is giving them the
tools they need to reduce costs and generate more revenue. Data-driven insights into operations, production,
marketing, sales, and more can steer businesses in a profitable direction.
All of the aforementioned benefits of IIoT – predictive maintenance, fewer errors, improved quality control,
and maximized efficiencies – will all boost profits for a manufacturer. Industrial IoT also offers arguably the
most valuable tool for leaders of a manufacturing company – insights from anywhere, anytime.
Remote monitoring of manufacturing operations is now possible 365 days a year, 24/7, from anywhere in
the world. This 360-degree view into the entire manufacturing process, and the follow-up service provided
to customers in their buying journey, is an invaluable asset.