Slide 1
Slide 1
Slide 1
For the purpose of the IoT Reference Model, security measures must:
● Secure each device or system
● Provide security for all processes at each level.
● Secure movement and communication between each level.
Part 2:
Physical
Devices and
Controllers
Sensors and Actuators
• In the previous slides, you gained a good understanding
of what the Internet of Things refers to, and its
enormous scope to help increase safety and create
efficiencies.
• Sensor: A sensor detects changes in its environment and
sends information about that change. (Temperature
sensor, Microphone, Humidity Sensor, etc.)
• Actuator: performs action, such as moves or controls
something. (Motor, Speaker, Screen, etc.)
• Watch Video-2 (Sensors and Actuators)
Sensors in your smart
phone
• The touch screen allows interaction with all phone (IoT device)
functions and Apps, and some game Apps use the capability for play.
• A typical smart phone contains many sensors of various types, and is
generally internet capable. A few of the most common sensors
include:
• Magnetometer: Detects magnetic fields
• Accelerometer: Detects the movement of the phone (helps in determining
location) (linear motion)
• Gyroscope: Detects a change in the phone’s orientation (rotated motion)
• In most cases these sensors generate data and deal with it in the
phone itself. In an IoT scenario, the data generated by a sensor is sent
out into a network. This may or may not involve a message or
command for action coming back to the phone.
Phone Sensors
Packet Tracer Demo
• Learn about packet tracer (can download Packet Tracer from
https://www.netacad.com/courses/packet-tracer-download/ by
enrolling in Cisco’s free Introduction to Packet Tracer course. ).
• Watch Video 3 (Packet Tracer Demo) to learn more about packet tracer tool.
1. Ethernet
• A wired network is the traditional way of connecting devices to the
Internet, and is practical for an environment with a wired
connection to the Internet, such as a smart home system.
System Communication
• Sensor to Cloud communication protocols
2. Wireless
• The diagram below illustrates the different types of wireless communications
used by mobile technology, and how the communication is sent to the internet:
via Bluetooth (BT), WiFi and Mobile.
How 'things' connect?
• We need to know how can things send data and receive instructions through a network.
• IoT makes use of existing technology for physical connections, and their corresponding
protocols, such as Ethernet , 4G mobile, or 5G mobile network.
• There are also newer protocols and connectivity types being developed specifically for
IoT.
• These protocols use a wireless technology called narrow band RF technology such as
LoRa (Long Range Radio) WAN network, SIGFOX (Ultra Narrow Band), and NB-IoT
(Narrow-Band IoT).
• Narrowband RF technologies operate over longer distances and at lower power levels,
but their trade-off is that they only offer smaller bandwidth connectivity, limiting their
use to restricted data and bandwidth applications. Examples include alarm systems,
critical sensor arrays, and many (Machine to Machine) M2M applications.
• The main advantage of Narrowband RF technologies is that they are low cost to set up
and operate, and the devices that they support use minimal power.
How 'things' connect?
• Watch Video 10 (Tilt Maze) that shows a ball in a maze game being controlled
remotely via a tablet. This utilizes servo motors to tilt the physical maze, and
sensors in the tablet responding to the position of the tablet.
6- What enables the remote user to view the position of the ball?
How 'things' connect?
• The diagram below simplifies the process, to illustrate
how the data moves through the layers (of the layer
model).
OSI and TCP/IP Models
(Frameworks)
OSI and TCP/IP Models
(Frameworks)
OSI and TCP/IP Models
OSI and TCP/IP Models
OSI and TCP/IP Models
OSI and TCP/IP Models
OSI and TCP/IP Models
Protocol data units
PDU
Encapsulation & Decapsulation
Data link layer addressing -
MAC addressing
• Also, in most IoT applications, devices are required to be very small in size for implementation, and
therefore they must operate on battery, and run on low memory and CPU power with a limited
network communication capability. The majority of IoT applications (such as smart cities), contain a
large number of low-power, low-data rate, small devices performing the data acquisition process,
transmission of information to actuators, and the update of feedback loops.
• There are numerous IoT protocols available and in progress, and in the following slides we
will examine the most popular ones.
IoT Protocols Overview
6LoWPAN
IPv6 addresses are too long for IoT data frames; standards
and protocols are required to encapsulate the IPv6
datagram in small packets. IPv6 over Low power Wireless
Personal Network (6LoWPAN) is the first protocol to have
successfully encapsulated the IPv6 for IEEE802.15.4
networks [Salman 2015].
6LoWPAN represents an adaptation layer between datalink layer and Internet layer
IPv6 Routing Protocol for Low Power and
Lossy Networks (RPL)
RPL is a distance Routing table stored on the border router
vector routing
protocol that
determines the
best route based
on the distance
between the
nodes.
IoT routers are resource constrained and thus can not support the traditional routing
protocols
IPv6 Routing Protocol for Low Power and
Lossy Networks (RPL)
IPv6 Routing Protocol for Low Power and
Lossy Networks (RPL)
Routing table stored on all nodes router
Network access and physical
protocols (IEEE 802.3 Ethernet)
IoT devices may be connected via a wired connection. For permanent
connections, Ethernet is commonly used. The data rate using
Ethernet can range from 10 Mbps to more than 1 Gbps (1000 Mbps).
10-base-T can be found on small microcontrollers; 100-base-T (100
Mbps) can be found on many higher-powered microcontrollers or
single board computers.
Some examples of Ethernet-connected IoT devices are:
• Cameras – video. Transmitting 4K quality video over WiFi
may create problems due to the data speed constraints in WiFi
• Voice (VoIP)
• Set-top boxes - video/audio streaming and storage
• Game applications and systems
• Static industrial equipment
• Sensors transmitting high security data, where transmitting via
a wireless connection is viewed as high risk transmission
• High-reliability control, such as robotics or medical
applications
Network access and physical protocols
(IEEE 802.11 a/b/g/n/ac/ad/ah/ax WiFi)
IEEE 802.11, also known as WiFi, is a protocol replacing wired
Ethernet for wireless communications. In a WiFi network, the
transmitter or wireless access point (WAP) is responsible for
translating the digital signals from wired network to radio signals,
and vice versa, for communications between mobile devices in the
WAP range and the Internet.
The Global Service for Mobile communication (GSM) is a 2G (second generation) cellular network protocol that was
developed by the European Telecommunication Standards Institute (ETSI) in 1991. GSM added fast data
communication and introduced the Short Messaging System (SMS). In the later version, the General Packet Radio
Service (GPRS) was added to GSM, with the Multimedia Messaging System (MMS) as the main feature for sending
video, pictures, and sound [Joan 2011].
To improve the speed and capacity of cellular networks, LTE (Long-Term Evolution) based on 4G was introduced. LTE
is replacing the GSM in IoT applications for M2M connection, with better connection and lower costs - however all
cellular network protocols come with a high price that in most situations makes them too expensive to adopt.
The new LTE 4G includes the standardization of NarrowBand IoT (or NB-IoT) that is a LPWAN technology.
Cellular networks are expensive technology, due to their utilization of licensed Radio Frequency and intellectual
property protection.
The 5th Generation cellular network is in progress, and will improve IoT communications. It also promises to lower
costs, battery consumption, and latency. In a 5G network, data rates of hundreds of megabits are available per
second for tens of thousands of users. It also enables several hundreds of thousands of simultaneous connections for
massive wireless sensor networks.
Bandwidth and coverage
Today’s IoT networks are best explained by looking at the bandwidth and coverage of
each network technology, as shown
LPWAN Cellular
IEEE 802.15.4
• The figure below illustrates two topologies of Bluetooth technology: star and mesh topologies.
Bluetooth mesh is the latest version, and includes ‘many-to-many’ communications for large-scale
networking applications such as asset tracking, home and building automation, lighting, beaconing,
and smart metering.
Personal Area Network (PAN) and
Wireless Sensor Network (WSN)
• ZigBee - IEEE 802.15.4
• ZigBee is a WPAN protocol for low processing and low power devices. It has a low data
rate that is less expensive than Bluetooth and WiFi, and based on IEEE 802.15.4.
• ZigBee is suitable for infrequent data transmission at low-data rates within a small area
(10-100 m), such as buildings.
• ZigBee uses the 2.4GHz ISM (Industrial, Scientific and Medical) frequency, and has a data
rate of approximately 250 kbps.
• ZigBee operation
• ZigBee routers are used to bridge the data between ZigBee client and ZigBee
coordinators when they are far from each other. The figure below shows the three
types of ZigBee topologies.
• NFC devices are used in contactless payment systems, like those used in credit
cards and electronic ticket smartcards. NFC-enabled devices can act as
electronic identity documents and keycards.
Wireless Local Area Network
(WLAN)
• WiFi (IEEE 802.11)
• Frequency: 900MHz