0% found this document useful (0 votes)
25 views15 pages

Unit 1

Himmmmmmmmmmmmm

Uploaded by

kushawahahimangi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views15 pages

Unit 1

Himmmmmmmmmmmmm

Uploaded by

kushawahahimangi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

UNIT I

Introduction to IoT: Introduction to IoT, Architectural Overview, Design


principles and needed capabilities, Basics of Networking, M2M and IoT
Technology Fundamentals - Devices and gateways, Data management,
Everything as a Service (XaaS), Role of Cloud in IoT, Security aspects in IoT.

Introduction to IoT
Internet: Interconnected computer networks, based on a standard communication protocol (TCP/IP)
Things: any unique object in the world
Internet of Things: connected objects uniquely addressable, based on standard communication protocol
IoT  Big Data Extract knowledge (offering value-added services)

The Internet of Things ( IoT ), also called Internet of Everything, is the network of physical objects or
"things" embedded with electronics, software, sensors, and connectivity to enable objects to exchange
data with the production, operator and/or other connected devices based on the infrastructure of
International Telecommunication Union's Global Standards Initiative. The Internet of Things allows
objects to be sensed and controlled remotely across existing network infrastructure, creating
opportunities for more direct integration between the physical world and computer-based systems, and
resulting in improved efficiency, accuracy and economic benefit.

Example of IoT :
• Imagine when you enter your house, your car send signals to open garage door, turn on air
condition/ heat system, lights, TV, Stove, etc. to find everything ready for you, making your life
easier and save your money buy saving energy.
• Internet-Connected Bed to track your sleeping pattern and make your bed auto-adjusts itself.
• Internet-Connected onesies to track baby’s respiration, pressure, moisture and temperature.

Architectural Overview
1. CISCO seven layered Reference model
Level 1 - Physical Devices and Controllers: This represents the hardware in IoT, such as sensors,
devices, and controllers. These are the things in IoT, including machines, sensors, and other
devices.
Level 2 - Connectivity: This level manages communication between devices and processing units,
allowing data to be transferred and managed across systems.
Level 3 - Edge Computing: Here, data analysis and transformation occur closer to the source, reducing
the amount of raw data sent to the cloud by filtering and processing some data locally.
Level 4 - Data Accumulation: This layer involves data storage, where data from various devices is
aggregated and stored for future use.
Level 5 - Data Abstraction: This level involves organizing and providing access to the data. Data
aggregation, abstraction, and transformation are handled here to facilitate analysis.
Level 6 - Application: This layer deals with the analysis and reporting of data, making it available for
decision-making. This is where control systems and other applications come into play.
Level 7 - Collaboration and Processes: This is the highest level, involving people and business
processes that utilize the insights gained from IoT data to make informed decisions and
coordinate actions.

2. ORACLE IoT architecture Reference Model

It has more than one equation - Complex equation :


Level 1: Gather (Objects integrated with sensors)
Sensor- A sensor is a device that measure physical input from its environment & Convert it into data
that can be interpreted by a computer
Smart Sensor – It have ability to compute & Communicate.
• The Sensors have the capacity to take measurement such as temperature ,air quality
,speed ,Humidity ,Pressure ,Flow ,Measurement ,Electricity etc..
• Smart sensor collect the data & then transmit it to level 2 through transcode (which does
coding & Decoding)
Level 2: Enrich
Application Framework- These are libraries with the help of these libraries sensor will connect with
gateway & Other devices.
IOT Communication framework- this medium / Protocol with the help of that devices are
connected with each other .It may be wifi, internet, IP, Bluetooth etc..
Gateway- it is the hardware which behave like a gate between the two devices it may be a router ,
server.
To transport massive volume of data produced by sensors , a robust & high performance wired or
wireless network infrastructure is required.
Data from sensors come to gateway after the encoding & when data go to the next level from
gateway decoding is done.
Level 3: Stream
Communication management is done here to send & Receive the data streams.
Protocol handlers- These are used to check whether the device connected in IOT has ability to
access the internet or net.
Message Router- if any device send the message then the router will decide to who it will go.
Message cache- it stores the recently comes data.
Level 4:Manage
Level 4 receive the device data .Here device management, device identity Management & Access
Management receives devices data . The device / hardware which we are using should be registered .
The registered device can only access the data.
For Example- Let two mobile phones wants to communicate with second mobile phone, So the first
mobile phone is registered & the data of this mobile is on level 4 . Like data of device register,
device identity etc..
Level 5: Acquire
It is a database which stores the data.
Level 6: Organize & Analyse
Data Routed from previous levels are organized & Analyzed at level 6 . Data is analyzed for
collecting business intelligence.
Data is analyzed & to check whether the data is authenticated sensitive or non sensitive.

Design principles and needed capabilities

1. With in existing work for deriving requirements and creating architectures or reference models
for IoT and M2M, three primary sources can been identified.
2. Two of them are the larger European 7th Framework Program research projects, SENSEI (2013)
and IoT-A (2013), the third being the result of a standardization activity driven by ETSI in their
Technical Committee (TC) M2M (ETSI M2M TC 2013). These sources have been selected, as
they represent state-of-the-art in terms of creating more complete architectures for the IoT and
M2M.
3. The approach taken in SENSEI was to develop an architecture and technology building blocks
that enable a “Real World integration in a future Internet.”
4. The telecommunications industry, meanwhile, has focused on defining a common service core
for supporting various M2M applications, and that is agnostic to underlying networks in ETSI
TC M2M
5. Finally, the approach taken in IoT-A differs from the two approaches above in the sense that
instead of defining a single architecture, a reference architecture is created, captured in what the
IoT-A refers to as the Architectural Reference Model (ARM).
Design Principles
1. Design for reuse of deployed IoT resources across application domains.
2. Design for a set of support services that provide open service-oriented capabilities and can be
used for application development and execution.
3. Design for different abstraction levels that hide underlying complexities and heterogeneities.
4. Design for sensing and actors taking on different roles of providing and using services across
different business domains and value chains.
5. Design for ensuring trust, security, and privacy.
6. Design for scalability, performance, and effectiveness.
7. Design for evolvability , heterogeneity, and simplicity of integration.
8. Design for simplicity of management.
9. Design for different service delivery models.
10. Design for lifecycle support.

Basics of Networking
● Networking technologies enable IoT devices to communicate with other devices, applications,
and services running in the cloud. ·
● The internet relies on standardized protocols to ensure communication between heterogeneous
devices is secure and reliable. ·
● Standard protocols specify rules and formats that devices use to establish and manage networks
and transmit data across those networks. ·
● Networks are built as a “stack” of technologies. A technology such as Bluetooth LE is at the
bottom of the stack. ·
● While others such as such as IPv6 technologies (which is responsible for the logical device
addressing and routing of network traffic) are further up the stack.
● Technologies at the top of the stack are used by the applications that are running on top of those
layers, such as message queuing technologies.
● The Open Systems Interconnection (OSI) model is an ISO-standard abstract model is a stack of
seven protocol layers. ·
● From the top down, they are: application, presentation, session, transport, network, data link and
physical. TCP/IP, or the Internet Protocol suite, underpins the internet, and it provides a
simplified concrete implementation of these layers in the OSI model.

Figure. OSI and TCP/IP networking models

● The TCP/IP model includes only four layers, merging some of the OSI model layers:
Network Access & Physical Layer :This TCP/IP Layer subsumes both OSI layers 1 and 2. The
physical (PHY) layer (Layer 1 of OSI) governs how each device is physically connected to the
network with hardware, for example with an optic cable, wires, or radio in the case of wireless
network like wifi IEEE 802.11 a/b/g/n). At the link layer (Layer 2 of OSI), devices are identified
by a MAC address, and protocols at this level are concerned with physical addressing, such as
how switches deliver frames to devices on the network.
Internet Layer :This layer maps to the OSI Layer 3 (network layer). OSI Layer 3 relates to
logical addressing. Protocols at this layer define how routers deliver packets of data between
source and destination hosts identified by IP addresses. IPv6 is commonly adopted for IoT device
addressing.
Transport Layer: The transport layer (Layer 4 in OSI) focuses on end-to-end communication
and provides features such as reliability, congestion avoidance, and guaranteeing that packets
will be delivered in the same order that they were sent. UDP (User Datagram protocol) is often
adopted for IoT transport for performance reasons.
Application Layer: The application layer (Layers 5, 6, and 7 in OSI) covers application-level
messaging. HTTP/S is an example of an application layer protocol that is widely adopted across
the internet

TCP/IP MODEL PROTOCALS

A) Link Layer / Physical Layer : Protocols determine how data is physically sent over the
network‘s physical layer or medium. Local network connect to which host is attached. Hosts
on the same link exchange data packets over the link layer using link layer protocols. Link
layer determines how packets are coded and signaled by the h/w device over the medium to
which the host is attached
Protocols:
 802.3-Ethernet: IEEE802.3 is collection of wired Ethernet standards for the link layer.
Eg : 802.3 uses co-axial cable; 802.3i uses copper twisted pair connection; 802.3j uses
fiber optic connection; 802.3ae uses Ethernet over fiber.
 802.11-WiFi: IEEE802.11 is a collection of wireless LAN(WLAN) communication
standards including extensive description of link layer. Eg : 802.11a operates in 5GHz
band, 802.11b and 802.11g operates in 2.4GHz band, 802.11n operates in 2.4/5GHz
band, 802.11ac operates in 5GHz band, 802.11ad operates in 60Ghzband. ·
 802.16 - WiMax : IEEE802.16 is a collection of wireless broadband standards including
exclusive description of link layer. WiMax provide data rates from 1.5 Mb/s to 1Gb/s. ·
 802.15.4-LR-WPAN: IEEE802.15.4 is a collection of standards for low rate wireless
personal area network(LR-WPAN). Basis for high level communication protocols such
as ZigBee. Provides data rate from 40kb/s to250kb/s. ·
 2G/3G/4G-Mobile Communication: Data rates from 9.6kb/s(2G) to up
to100Mb/s(4G).

B) Network/Internet Layer: Responsible for sending IP datagrams from source n/w to


destination n/w. Performs the host addressing and packet routing. Datagrams contains source
and destination address.
Protocols: ·
 IPv4: Internet Protocol version4 is used to identify the devices on a n/w using a
hierarchical addressing scheme. 32 bit address. Allows total of 2**32addresses. ·
 IPv6: Internet Protocol version6 uses 128 bit address scheme and allows 2**128
addresses. ·
 6LOWPAN: (IPv6 over Low power Wireless Personal Area Network) operates in 2.4
GHz frequency range and data transfer 250 kb/s.
C) Transport Layer: Provides end-to-end message transfer capability independent of the
underlying n/w. Set up on connection with ACK as in TCP and without ACK as in UDP.
Provides functions such as error control, segmentation, flow control and congestion control.
Protocols: ·
 TCP: Transmission Control Protocol used by web browsers(along with HTTP and
HTTPS), email(along with SMTP, FTP). Connection oriented and stateless protocol.
IP Protocol deals with sending packets, TCP ensures reliable transmission of protocols
in order. Avoids n/w congestion and congestion collapse. ·
 UDP: User Datagram Protocol is connectionless protocol. Useful in time sensitive
applications, very small data units to exchange. Transaction oriented and stateless
protocol. Does not provide guaranteed delivery.

D) Application Layer: Defines how the applications interface with lower layer protocols to
send data over the n/w. Enables process-to-process communication using ports.
Protocols: ·
 HTTP: Hyper Text Transfer Protocol that forms foundation of WWW. Follow request
response model Stateless protocol. ·
 CoAP: Constrained Application Protocol for machine-to-machine(M2M) applications
with constrained devices, constrained environment and constrained n/w. Uses client
server architecture. ·
 WebSocket: allows full duplex communication over a single socket connection. ·
 MQTT: Message Queue Telemetry Transport is light weight messaging protocol
based on publish-subscribe model. Uses client server architecture. Well suited for
constrained environment. ·
 XMPP: Extensible Message and Presence Protocol for real time communication and
streaming XML data between network entities. Support client-server and server-server
communication. ·
 DDS: Data Distribution Service is data centric middleware standards for device-to-
device or machine-to-machine communication. Uses publish-subscribe model. ·
 AMQP: Advanced Message Queuing Protocol is open application layer protocol for
business messaging. Supports both point-to-point and publish-subscribe model

Machine-to-Machine (M2M) Communication

Machine-to-Machine (M2M) communication, also known as M2M/IoT, is an advanced technological


concept in which devices communicate directly with each other, often without any human intervention.
This form of communication allows devices to share data seamlessly, enabling smooth and coordinated
operations across various applications, such as industrial automation, smart homes, and urban
infrastructure.

Machine-to-Machine (M2M) Architecture :

● An M2M area network comprises of machines( or M2M nodes) which have embedded network
modules for sensing, actuation and communicating various communication protocols can be used
for M2M LAN such as ZigBee, Bluetooth, M-bus, Wireless M-Bus etc., These protocols provide
connectivity between M2M nodes within an M2M area network.
● The communication network provides connectivity to remote M2M area networks. The
communication network provides connectivity to remote M2M area network. The
communication network can use either wired or wireless network(IP based). While the M2M are
networks use either Proprietary or non-IP based communication protocols, the communication
network uses IP-based network. Since non-IP based protocols are used within M2M area
network, the M2M nodes within one network cannot communicate with nodes in an external
network.
● To enable the communication between remote M2M are network, M2M gateways are used.

 Difference between M2M & IOT


Feature M2M (Machine-to-Machine) IoT (Internet of Things)
Device-to-device communication, Broad ecosystem of internet-connected
Definition often for specific tasks and typically devices sharing data and enabling end-user
in industrial use. applications.
Point-to-point communication, Multi-layered (devices, connectivity, edge
Architecture closed systems for specific computing, cloud storage, analytics,
applications. applications) for scalable solutions.
Limited to device-to-device or local Internet-enabled, supporting protocols like
Communication server, using protocols like SMS, MQTT, CoAP, HTTP for cloud and user
HTTP, or SCADA. interaction.
Cloud-based processing, with advanced
Data processing is local, with limited
Data Processing analytics, machine learning, and predictive
or immediate-use analytics.
insights.
Proprietary or local networks, often Variety of connectivity options (Wi-Fi,
Connectivity with dedicated cellular or wired Bluetooth, Zigbee, LPWAN) for global,
connections. internet-based access.
Industrial applications (remote Broad applications, including smart
Use Cases monitoring, fleet management, homes, healthcare, smart cities,
utilities, security systems). agriculture, and retail.
Limited scalability; expansion Highly scalable, leveraging cloud
Scalability requires significant infrastructure computing for easy integration of millions
investment. of devices.
Simpler security needs due to closed Complex security requirements, including
Security systems, but older implementations data encryption, device authentication, and
may lack security. protection against cyberattacks.
Higher initial costs due to dedicated Cost-effective with cloud infrastructure,
Costs and
infrastructure and specialized and lower total cost of ownership due to
Implementation
solutions. advances in technology.

Devices and Gateways


Devices:
A device is a hardware unit that can sense aspects of it’s environment and/or actuate, i.e. perform
tasks in its environment.
A device can be characterized as having several properties, including:
● Microcontroller: 8-, 16-, or 32-bit working memory and storage.
● Power Source: Fixed, battery, energy harvesting, or hybrid.
● Sensors and Actuators: Onboard sensors and actuators, or circuitry that allows them to be
connected, sampled, conditioned, and controlled.
● Communication: Cellular, wireless, or wired for LAN and WAN communication.
● Operating System (OS): Main-loop, event-based, real-time, or full featured OS.
○ Applications: Simple sensor sampling or more advanced applications.
● User Interface: Display, buttons, or other functions for user interaction.
● Device Management (DM): Provisioning, firmware, bootstrapping, and monitoring.
● Execution Environment (EE): Application lifecycle management and Application
Programming Interface (API).

Device types:
● There are no clear criteria today for categorizing devices, but instead there is more of a sliding
scale. we group devices into two categories
Basic Devices:
● Devices that only provide the basic services of sensor readings and/or actuation tasks, and in
some cases limited support for user interaction.
● LAN communication is supported via wired or wireless technology, thus a gateway is needed to
provide the WAN connection.
Advanced Devices:
● In this case the devices also host the application logic and a WAN connection.
● They may also feature device management and an execution environment for hosting multiple
applications. Gateway devices are most likely to fall into this category.

Gateways:
● Gateway provides a bridge between different communication technologies which means we can
say that a Gateway acts as a medium to open up connections between the cloud and
controller(sensors/devices) in Internet of Things (IoT).
● With the help of gateways, it is possible to establish device-to-device or device-to-cloud
communication.
● A gateway can be a typical hardware device or software program. It enables a connection
between the sensor network and the Internet along with enabling IoT communication, it also
performs many other tasks such as this IoT gateway performs protocol translation, aggregating
all data, local processing, and filtering of data before sending it to the cloud, locally storing data
and autonomously controlling devices based on some inputted data, providing additional device
security.
● The below figure shows how IoT Gateways establish communication between sensors and the
cloud (Data System):
● As IoT devices work with low power consumption(Battery power) in other words they are
energy constrained so if they will directly communicate to cloud/internet it won’t be effective in
terms of power.
 So they communicate with Gateway first using short range wireless transmission
modes/network like ZigBee, Bluetooth, etc as they consume less power or they can also be
connected using long range like Cellular and WiFi etc.
 Then Gateway links them to Internet/ cloud by converting data into a standard protocol like
MQTT. using Ethernet, WiFi / Cellular or satellite connection. And in mostly Gateway is
Mains powered unlike sensor nodes which are battery powered.
 In practice there are multiple Gateway devices. Let’s think about a simple IoT gateway, then
our smart phone comes into picture as it can also work as a basic IoT gateway when we use
multiple radio technologies like WiFi, Bluetooth, Cellular network of smart phone to work on
any IoT project in sending and receiving data at that time this also acts as a basic IoT
Gateway.
Data management

● The gateway includes two functions viz. data management and consolidation, and connected
device management. The following subsections describe the framework for data enrichment and
consolidation.
● Gateway includes the provisions for one or more of the following functions: transcoding and data
management. Following are data management and consolidation functions:
 Transcoding
 Privacy, security
 Integration
 Compaction and fusion
Transcoding:
Transcoding means data adaptation, conversion and change of protocol, format or code using software.
For example, use of transcoding enables the message request characters to be in ASCII format at the
device and in Unicode at the server. It also enables the use of XML format database at the device, while
the server has a DB2, Oracle or any other database. Transcoding involves formats, data and code
conversion from one end to another when the multimedia data is transferred from a server to the mobile
TV, Internet TV, VoIP phone or smartphone as the client devices. Transcoding applications also involve
filtering, compression or decompression.
Privacy :
Privacy is an aspect of data management and must be remembered while designing an application. The
design should ensure privacy by ensuring that the data at the receiving end is considered anonymous
from an individual or company. Following are the components of the privacy model:
● Devices and applications identity-management
● Authentication
● Authorization
● Trust
● Reputation
Integration: Refers to the process of combining and coordinating various IoT devices, platforms, and
systems to efficiently collect, store, process, and analyze the vast amounts of data generated by IoT
devices. It involves multiple layers and technologies to ensure seamless interaction between devices,
applications, and data systems.
compaction and fusion: Essential processes for optimizing data storage, reducing redundancy, and
improving the efficiency of data transmission and analysis. Both techniques play a critical role in
managing the massive amount of data generated by IoT devices

Everything as a Service (XaaS)


● XaaS refers to four specific cloud services – software as a service (SaaS), platform as a service
(PaaS), infrastructure as a service (IaaS), and managed services.
● This “Everything as a service” model allows businesses to pay only for what they need, when
they need it and use it wherever they have an internet connection. Cloud technology continues to
advance as new features are introduced.
● XaaS is a newer concept in cloud computing that makes it easier to implement cloud services in
your business.
1. Software as a Service (SaaS)
● Software as a Service (SaaS), this type of Cloud service is provided in the form of software.
Examples of SaaS are Google Apps (Docs, Sheets, etc.), Office 365, and Adobe Creative
Cloud. In SaaS services, service users only need to use the application without having to
understand and take care of how data is stored or how the application is maintained, because this
is a service provided by the service provider.
Profit:
● Users can immediately use the service for free or by paying a rental fee without having to invest
in making it themselves (in-house development) or buying a relatively expensive license.
● The availability and reliability of the application is guaranteed by the service provider. Users
only need to focus on their data. The only devices needed by users are a computer and the
internet.
Loss:
● Users do not have full control over rented applications. Users cannot arbitrarily change the
features provided because SaaS is multi-tenant so the features created are general features
(cannot be specific to the needs of certain users). In some applications, customization can be
done with limited scale and functionality.
2. Platform as a Service (PaaS)
● Platform as a Service (PaaS), this type of Cloud service is provided in the form of a platform that
users can use to create applications on it. Examples of PaaS are Amazon Web Services,
Microsoft Azure, Facebook, etc. Things that PaaS service users can do are build applications,
upload applications, test, and manage configurations.
Profit:
● Users can create their own applications with many available features such as platform security,
OS, database system, web server, and application framework. Users can focus more on
application development.
● The main feature of PaaS is usually high scalability. When the application that we upload starts
to be used by many users, the PaaS service will automatically scale our application to be better at
serving our application users.
Loss:
● The security features provided by PaaS services are platform security, not our application
security. So we still have to take into account the security risks of our own applications.
3. Infrastructure as a Service (IaaS)
● Infrastructure as a Service (IaaS), IaaS type cloud services are basically physical server boxes
and virtual computers. IaaS provides companies with computing resources including servers,
networks, storage and data center space.
Profit:
● Users do not need to physically purchase computers and equipment, carry out routine
maintenance, and configure devices.
Loss:
● Users must be connected to the Internet to use it, and if they need additional resources, they must
contact the service provider. Users take care of their own OS, security, applications, databases,
frameworks, etc. because what is provided is only the server and network.
Role of Cloud in IoT
● One component that improves the success of the Internet of Things is Cloud
Computing.
● Cloud computing means a collection of services available over the Internet.
Cloud Platform Services Cloud platform offers the following:
 Infrastructure for large data storage of devices, RFIDs, industrial plant
machines, automobiles and device networks
 Computing capabilities, such as analytics, IDE (Integrated Development
Environment)
 Collaborative computing and data store sharing

Cloud Deployment Models :


Following are the four cloud deployment models:
1. Public cloud: This model is provisioned by educational institutions, industries,
government institutions or businesses or enterprises and is open for public use.
2. Private cloud: This model is exclusive for use by institutions, industries,
businesses or enterprises and is meant for private use in the organisation by the
employees and associated users only.
3. Community cloud: This model is exclusive for use by a community formed by
institutions, industries, businesses or enterprises, and for use within the community
organisation, employees and associated users. The community specifies security
and compliance considerations. A cloud deployment model may be public, private,
community or hybrid 210 Internet of Things: Architecture and Design Principles
4. Hybrid cloud: A set of two or more distinct clouds (public, private or community)
with distinct data stores and applications that bind between them to deploy the
proprietary or standard technology.
Cloud Computing Features and Advantages:
Essential features of cloud storage and computing are:
● On demand self-service to users for the provision of storage, computing
servers, software delivery and server time
● Resource pooling in multi-tenant model
●Broad network accessibility in virtualised environment to heterogeneous
users, clients, systems and devices
● Elasticity
● Massive scale availability
● Scalability
● Maintainability
● Homogeneity
● Virtualisation
● Interconnectivity platform with virtualised environment for enterprises and
provisioning of in-between Service Level Agreements (SLAs)
● Resilient computing
● Advanced security
● Low cost
Security aspects in IoT
Security in the Internet of Things (IoT) is crucial, as the interconnected nature of IoT
devices makes them vulnerable to a variety of threats. Here are the key aspects of IoT
security:
1. Data Encryption
Why it’s important: IoT devices often transmit sensitive data, such as personal
information, financial details, or operational data.
Security measure: End-to-end encryption (e.g., SSL/TLS) ensures that data
transmitted between devices and servers cannot be intercepted or altered.
2. Device Authentication
Why it’s important: IoT devices need to be properly authenticated to prevent
unauthorized access.
Security measure: Strong authentication mechanisms, such as digital certificates
or biometric access, help verify the identity of both the devices and users.
3. Access Control
Why it’s important: Controlling who or what can interact with IoT devices
prevents unauthorized access.
Security measure: Role-based access control (RBAC) and least-privilege policies
limit access to only necessary resources.

4. Firmware and Software Updates


Why it’s important: Outdated software or firmware may contain vulnerabilities
that attackers can exploit.
Security measure: Regular updates and secure patching systems keep devices
protected against known threats.
5. Network Security
Why it’s important: IoT devices often operate over the internet, which opens
them to network-based attacks.
Security measure: Implementing firewalls, VPNs, and secure communication
protocols (e.g., MQTT, CoAP) helps protect the network layer.
6. Physical Security
Why it’s important: IoT devices in the field (e.g., cameras, sensors) are often
physically exposed and vulnerable to tampering.
Security measure: Physical tamper protection (e.g., case sensors, secure boot)
ensures devices are secure against physical attacks.
7. Intrusion Detection and Prevention
Why it’s important: Real-time detection of anomalous behavior helps in
identifying potential attacks.
Security measure: Anomaly detection systems (ADS) or intrusion detection
systems (IDS) monitor traffic patterns and device behaviors to detect and mitigate
threats.
8. Privacy Concerns
Why it’s important: IoT devices often collect personal or sensitive information.
Security measure: Ensuring data minimization, anonymization, and compliance
with privacy regulations like GDPR protects user privacy.
9. Resilience and Redundancy
Why it’s important: IoT networks need to remain functional even in the event of a
security breach.
Security measure: Building redundant systems and failover mechanisms ensures
that devices continue to operate securely in case of a failure or attack.
10. Security by Design
Why it’s important: Security should be a fundamental consideration during the
design phase, not an afterthought.
Security measure: Manufacturers and developers should adopt secure coding
practices, perform threat modeling, and apply security testing early in the
development cycle.
These security measures are essential for reducing risks in IoT environments,
especially as the number of devices grows and the complexity of networks
increases.

You might also like