0% found this document useful (0 votes)
47 views21 pages

IoT Module-1

Iot

Uploaded by

thalivathamil
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
47 views21 pages

IoT Module-1

Iot

Uploaded by

thalivathamil
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

Module-1

Introduction To IoT

Internet of Things refers to the network of physical devices, vehicles, home appliances, and
other items embedded with electronics, software, sensors, and network connectivity,
allowing them to collect and exchange data. The IoT enables these devices to interact with
each other and with the environment and enables the creation of smart systems and services.
Some examples of IoT devices include:

 Smart home devices such as thermostats, lighting systems, and security systems.
 Wearables such as fitness trackers and smartwatches.
 Healthcare devices such as patient monitoring systems and wearable medical
devices.
 Industrial systems such as predictive maintenance systems and supply chain
management systems.
 Transportation systems such as connected cars and autonomous vehicles.
The IoT is transforming various industries, from healthcare and manufacturing to
transportation and energy. IoT devices generate vast amounts of data, which can be analyzed
to improve operations, drive innovation, and create new business opportunities.

IoT systems are typically composed of several components, including IoT devices,
communication networks, gateways, and cloud-based data processing and storage systems.
IoT devices use sensors and other technologies to collect data, and then send that data to the
cloud for analysis and storage. The cloud also provides a centralized platform for managing
and controlling IoT devices and networks.

IoT development involves a wide range of technologies, including wireless communication


protocols, cloud computing, big data analytics, machine learning, and security technologies.

Overall, the IoT is a rapidly growing and evolving field that has the potential to revolutionize
a wide range of industries and transform the way we live and work. As IoT devices and
systems become increasingly widespread, the opportunities for innovation and growth in this
field will continue to expand.

According to the definition of IoT, It is the way to interconnect with the help of internet
devices that can be embedded to implement the functionality in everyday objects by enabling
them to send and receive data. Today data is everything and everywhere. Hence, IoT can also
be defined as the analysis of the data that generates a meaningful action, triggered
subsequently after the interchange of data. IoT can be used to build applications for
agriculture, assets tracking, energy sector, safety and security sector, defense, embedded
applications, education, waste management, healthcare product, telemedicine, smart city
applications, etc.

Characteristics of the Internet of Things


The Internet of Things (IoT) is characterized by the following key features that are mentioned
below.

1. Connectivity
Connectivity is an important requirement of the IoT infrastructure. Things of IoT should be
connected to the IoT infrastructure. Anyone, anywhere, anytime can connect, this should be
guaranteed at all times. For example, the connection between people through Internet devices
like mobile phones, and other gadgets, also a connection between Internet devices such as
routers, gateways, sensors, etc.

2. Intelligence and Identity


The extraction of knowledge from the generated data is very important. For example, a sensor
generates data, but that data will only be useful if it is interpreted properly. Each IoT device
has a unique identity. This identification is helpful in tracking the equipment and at times for
querying its status.

3. Scalability
The number of elements connected to the IoT zone is increasing day by day. Hence, an IoT
setup should be capable of handling the massive expansion. The data generated as an outcome
is enormous, and it should be handled appropriately.

4. Dynamic and Self-Adapting (Complexity)


IoT devices should dynamically adapt themselves to changing contexts and
scenarios. Assume a camera meant for surveillance. It should be adaptable to work in
different conditions and different light situations (morning, afternoon, and night).
5. Architecture
IoT Architecture cannot be homogeneous in nature. It should be hybrid, supporting different
manufacturers ‘products to function in the IoT network. IoT is not owned by anyone
engineering branch. IoT is a reality when multiple domains come together.
6. Safety
There is a danger of the sensitive personal details of the users getting compromised when all
his/her devices are connected to the internet. This can cause a loss to the user. Hence, data
security is the major challenge. Besides, the equipment involved is huge. IoT networks may
also be at risk. Therefore, equipment safety is also critical.

7. Self-Configuring
This is one of the most important characteristics of IoT. IoT devices can upgrade their
software in accordance with requirements with a minimum of user participation.
Additionally, they can set up the network, allowing for the addition of new devices to an
already-existing network.

8. Interoperability
IoT devices use standardized protocols and technologies to ensure they can communicate
with each other and other systems. Interoperability is one of the key characteristics of the
Internet of Things (IoT). It refers to the ability of different IoT devices and systems to
communicate and exchange data with each other, regardless of the underlying technology or
manufacturer.

Interoperability is critical for the success of IoT, as it enables different devices and systems
to work together seamlessly and provides a seamless user experience. Without
interoperability, IoT systems would be limited to individual silos of data and devices, making
it difficult to share information and create new services and applications.

To achieve interoperability, IoT devices, and systems use standardized communication


protocols and data formats. These standards allow different devices to understand and process
data in a consistent and reliable manner, enabling data to be exchanged between devices and
systems regardless of the technology used.

9. Embedded Sensors and Actuators


Embedded sensors and actuators are critical components of the Internet of Things (IoT). They
allow IoT devices to interact with their environment and collect and transmit data.
Sensors are devices that can detect changes in the environment, such as temperature, light,
sound, or movement. In IoT systems, sensors are embedded into devices, allowing them to
collect data about the environment.

Actuators are devices that can interact with the environment, such as turning on lights,
opening or closing doors, or controlling the speed of a motor. In IoT systems, actuators are
embedded into devices, allowing them to perform actions based on data collected by sensors.
Together, sensors and actuators allow IoT devices to collect data about the environment,
process that data, and take action based on the results. This makes it possible to automate a
wide range of processes and tasks, such as home automation, energy management, and
predictive maintenance.

In order to ensure that sensors and actuators can communicate with each other and with other
devices and systems, they use standardized communication protocols, such as Bluetooth Low
Energy (BLE), Zigbee, or Wi-Fi.

10. Autonomous operation


Autonomous operation refers to the ability of IoT devices and systems to operate
independently and make decisions without human intervention. This is a crucial
characteristic of the Internet of Things (IoT) and enables a wide range of new applications
and services.

In IoT systems, devices and systems are equipped with sensors, actuators, and processing
power, allowing them to collect and process data about the environment, make decisions
based on that data, and take action accordingly.

For example, an IoT system might use sensors to detect changes in temperature or light levels
in a room, and then use actuators to adjust the temperature or turn on the lights based on that
data. This allows for the automation of many tasks, such as energy management, home
automation, and predictive maintenance.

11. Data-driven
Data-driven is a key characteristic of the Internet of Things (IoT). IoT devices and systems
collect vast amounts of data from sensors and other sources, which can be analyzed and used
to make data-driven decisions.
In IoT systems, data is collected from embedded sensors, actuators, and other sources, such
as cloud services, databases, and mobile devices. This data is used to gain insights into the
environment, improve operational efficiency, and make informed decisions.
For example, an IoT system might use data from sensors to monitor the temperature and
humidity levels in a building, and then use that data to optimize heating, cooling, and
ventilation systems. This can result in significant energy savings and improved indoor air
quality.

12. Security
Security is a critical concern for the Internet of Things (IoT), as IoT devices and systems
handle sensitive data and are connected to critical infrastructure. The increasing number of
connected devices and the amount of data being transmitted over the Internet make IoT
systems a prime target for cyberattacks.

To secure IoT systems, multiple layers of security are necessary, including physical
security, network security, and data security.
Physical security involves protecting the physical devices from unauthorized access or
tampering. This can be achieved through measures such as secure enclosures, access controls,
and tamper-proofing.

Network security involves protecting the communication networks that connect IoT devices,
including Wi-Fi networks, cellular networks, and wired networks. This can be achieved
through encryption, secure authentication, and firewalls.
Data security involves protecting the data collected and transmitted by IoT devices and
systems. This can be achieved through encryption, secure storage, and access controls.
In addition to these technical measures, it is also important to have robust policies and
procedures in place to ensure the security of IoT systems, such as incident response plans
and regular security audits.

13. Ubiquity
Ubiquity refers to the widespread and pervasive presence of the Internet of Things (IoT)
devices and systems in our daily lives. The goal of IoT is to create a seamless and
interconnected world where devices and systems can communicate and share data seamlessly
and transparently.
Ubiquity is achieved through the widespread deployment of IoT devices, such as sensors,
actuators, and other connected devices, as well as the development of IoT networks and
infrastructure to support communication and data exchange.

In a ubiquitous IoT environment, devices and systems can be accessed and controlled from
anywhere, at any time, using a variety of devices, such as smartphones, laptops, and other
connected devices.

14. Context Awareness


Context awareness refers to the ability of Internet of Things (IoT) devices and systems to
understand and respond to the environment and context in which they are operating. This is
achieved through the use of sensors and other technologies that can detect and collect data
about the environment.

Context awareness is a critical aspect of IoT, as it enables IoT devices and systems to make
decisions and take actions based on the context in which they are operating.

For example, in a smart home, a context-aware IoT system could adjust the temperature,
lighting, and other systems based on the time of day, the presence of people in the home, and
other factors.

In addition, context awareness is also used to improve the efficiency and effectiveness of IoT
systems by reducing the amount of data that needs to be transmitted and processed. For
example, a context-aware IoT system might only collect and transmit data when it is relevant
to the current context, such as when a person is in the room or when the temperature changes
significantly.

IoT (internet of things) enabling technologies are


1. Wireless Sensor Network
2. Cloud Computing
3. Big Data Analytics
4. Communications Protocols
5. Embedded System
1. Wireless Sensor Network (WSN) :
A WSN comprises distributed devices with sensors which are used to monitor the
environmental and physical conditions. A wireless sensor network consists of end nodes,
routers and coordinators. End nodes have several sensors attached to them where the data is
passed to a coordinator with the help of routers. The coordinator also acts as the gateway
that connects WSN to the internet.
Example –
 Weather monitoring system
 Indoor air quality monitoring system
 Soil moisture monitoring system
 Surveillance system
 Health monitoring system
2. Cloud Computing:
It provides us the means by which we can access applications as utilities over the internet.
Cloud means something which is present in remote locations.
With Cloud computing, users can access any resources from anywhere like databases,
webservers, storage, any device, and any software over the internet.
Characteristics –
1. Broad network access
2. On demand self-services
3. Rapid scalability
4. Measured service
3. Big Data Analytics:
It refers to the method of studying massive volumes of data or big data. Collection of data
whose volume, velocity or variety is simply too massive and tough to store, control, process
and examine the data using traditional databases.
Big data is gathered from a variety of sources including social network videos, digital
images, sensors and sales transaction records.
Several steps involved in analyzing big data –
1. Data cleaning
2. Munging
3. Processing
4. Visualization
Examples –

 Bank transactions
 Data generated by IoT systems for location and tracking of vehicles
 E-commerce and in Big-Basket
 Health and fitness data generated by IoT system such as a fitness bands
4. Communications Protocols:
They are the backbone of IoT systems and enable network connectivity and linking to
applications. Communication protocols allow devices to exchange data over the network.
Multiple protocols often describe different aspects of a single communication. A group of
protocols designed to work together is known as a protocol suite; when implemented in
software they are a protocol stack.
They are used in
1. Data encoding
2. Addressing schemes
5. Embedded Systems:
It is a combination of hardware and software used to perform special tasks.
It includes microcontroller and microprocessor memory, networking units (Ethernet Wi-Fi
adapters), input output units (display keyword etc. ) and storage devices (flash memory).
It collects the data and sends it to the internet.
Embedded systems used in
Examples –
1. Digital camera
2. DVD player, music player
3. Industrial robots
4. Wireless Routers etc.

Physical Design of IoT


Sensor technologies used in IoT

Sensors play a crucial role in IoT by collecting data from the physical environment and
converting it into digital information. Different sensor technologies are employed in IoT
devices, including:

 Temperature Sensors: Measure and monitor temperature variations.


 Humidity Sensors: Detect and measure humidity levels in the environment.
 Proximity Sensors: Detect the presence or absence of objects within a certain range.
 Motion Sensors: Detect motion or movement in their surroundings.
 Light Sensors: Measure light intensity or detect changes in light levels.
 Pressure Sensors: Measure pressure variations in gases or liquids.
 Accelerometers: Detect and measure acceleration, tilt, and vibration.
 GPS (Global Positioning System) Sensors: Provide location information using satellite
signals.

These sensors enable IoT devices to collect real−time data, monitor the environment, and
respond to specific conditions or triggers.

Connectivity
Devices like USB hosts and ETHERNET are used for connectivity between the devices and
the server.

Processor
A processor like a CPU and other units are used to process the data. these data are further used
to improve the decision quality of an IoT system.

Audio/Video Interfaces
An interface like HDMI and RCA devices is used to record audio and videos in a system.

Input/Output interface
To give input and output signals to sensors, and actuators we use things like UART, SPI, CAN,
etc.

Storage Interfaces

Things like SD, MMC, and SDIO are used to store the data generated from an IoT
device.
Other things like DDR and GPU are used to control the activity of an IoT system.

Communication protocols for IoT

These protocols are used to establish communication between a node device and a
server over the internet. it helps to send commands to an IoT device and receive data
from an IoT device over the internet. we use different types of protocols that are present
on both the server and client side and these protocols are managed by network layers
like application, transport, network, and link layer.

Application Layer protocol

In this layer, protocols define how the data can be sent over the network with the lower layer
protocols using the application interface. These protocols include HTTP, WebSocket, XMPP,
MQTT, DDS, and AMQP protocols.

Communication protocols are essential for IoT devices to exchange data and information. Some
commonly used protocols in IoT include:

 MQTT (Message Queuing Telemetry Transport): A lightweight protocol designed for


efficient communication in constrained networks, suitable for low−power devices and
unreliable connections.
 HTTP (Hypertext Transfer Protocol): A standard protocol used for communication
between web browsers and servers, also employed in IoT for web−based interactions
and data transfer.
 CoAP (Constrained Application Protocol): Designed for resource−constrained devices,
CoAP enables efficient communication and is often used in IoT applications that
require low power and low bandwidth.
 AMQP (Advanced Message Queuing Protocol): A protocol for reliable messaging
between devices and applications, capable of supporting complex messaging scenarios.
 WebSocket: A communication protocol that enables full−duplex communication over
a single, long−lived connection, facilitating real−time data transfer between IoT devices
and servers.

Transport Layer
This layer is used to control the flow of data segments and handle error control. also, these
layer protocols provide end-to-end message transfer capability independent of the underlying
network.

TCP

The transmission control protocol is a protocol that defines how to establish and maintain a
network that can exchange data in a proper manner using the internet protocol.

UDP

a user datagram protocol is part of an internet protocol called the connectionless protocol. this
protocol is not required to establish the connection to transfer data.

Network Layer
This layer is used to send datagrams from the source network to the destination network. we
use IPv4 and IPv6 protocols as host identification that transfers data in packets.

IPv4

This is a protocol address that is a unique and numerical label assigned to each device
connected to the network. an IP address performs two main functions host and location
addressing. IPv4 is an IP address that is 32-bit long.

IPv6

It is a successor of IPv4 that uses 128 bits for an IP address. it is developed by the IETF task
force to deal with long-anticipated problems.
Link Layer

Link-layer protocols are used to send data over the network’s physical layer. it also
determines how the packets are coded and signalled by the devices.

Wireless connectivity options

Wireless connectivity is a key aspect of IoT, providing flexibility and mobility. Some common
wireless connectivity options used in IoT devices include:

 Wi−Fi: A widely used wireless networking technology that enables high−speed data
transfer over short to medium distances. It is suitable for applications with power
availability and the need for high bandwidth.
 Bluetooth: A short−range wireless technology used for connecting devices in
proximity. It is commonly used for IoT devices that require low power consumption
and intermittent data transfer, such as wearable devices and home automation systems.
 Zigbee: A low−power, low−data−rate wireless communication protocol designed for
applications with low power consumption requirements and a large number of devices.
It is commonly used in home automation, smart lighting, and industrial applications.
 LPWAN (Low−Power Wide Area Network): LPWAN technologies, such as
LoRaWAN and NB−IoT, offer long−range connectivity with low power consumption,
making them suitable for IoT applications that require wide area coverage, such as
smart city deployments and agricultural monitoring.

Wired connectivity options

While wireless connectivity is prevalent in IoT, there are also cases where wired connectivity
is preferred for its reliability and stability. Some common wired connectivity options include:

 Ethernet: A standard wired networking technology that provides reliable and highspeed
data transfer over local area networks (LANs). Ethernet is commonly used in industrial
settings and for devices requiring high bandwidth and low latency.
 Powerline Communication: This technology allows data transmission over existing
power lines, eliminating the need for additional wiring. Powerline communication is
often used in home automation systems and smart meters.
Power and Energy Management

Power requirements of IoT devices can vary based on factors such as their functionality,
processing capabilities, and communication needs. IoT devices typically fall into two
categories:

 Battery−powered devices: These devices operate on limited battery power and must be
designed to optimize energy consumption to extend battery life. They often employ
low−power components, sleep modes, and efficient power management techniques.
 Line−powered devices: Devices that are connected to a power source have more
flexibility in terms of power requirements. However, energy efficiency is still a
consideration to minimize operating costs and environmental impact.

Battery life and energy−efficient designs

Extending battery life is crucial for many IoT devices to ensure uninterrupted operation and
minimize maintenance. Energy−efficient designs for IoT devices may include:

 Low−power components: Using low−power microcontrollers, sensors, and wireless


modules helps reduce power consumption.
 Sleep modes: Devices can be programmed to enter sleep or idle modes when not
actively performing tasks, conserving energy.
 Optimized data transmission: Transmitting data in a compressed or aggregated format
reduces the amount of data transferred, saving power.

Logical Design of IoT

Logical Design of IoT


The logical design of an IoT system refers to an abstract representation of entities and
processes without going into the low-level specifies of implementation. it uses Functional
Blocks, Communication Models, and Communication APIs to implement a system.

But before you learn about the logical design of IoT systems you need to know a little bit about
the physical design of IoT.

Logical Design of the Internet of Things(IoT)

1. IoT Functional Blocks


2. IoT Communication Models
3. IoT Communication APIs

IoT Functional blocks


An IoT system consists of a number of functional blocks like Devices, services,
communication, security, and application that provide the capability for sensing, actuation,
identification, communication, and management.

IoT functional blocks


These functional blocks consist of devices that provide monitoring control functions, handle
communication between host and server, manage the transfer of data, secure the system using
authentication and other functions, and interface to control and monitor various terms.

Application
It is an interface that provides a control system that use by users to view the status and analyze
of system.

Management
This functional block provides various functions that are used to manage an IoT system.

Services
This functional block provides some services like monitoring and controlling a device and
publishing and deleting the data and restoring the system.

Communication
This block handles the communication between the client and the cloud-based server and
sends/receives the data using protocols.

Security
This block is used to secure an IoT system using some functions like authorization, data
security, authentication, 2-step verification, etc.
Device
These devices are used to provide sensing and monitoring control functions that collect data
from the outer environment.

IoT Communication Models


There are several different types of models available in an IoT system that is used to
communicate between the system and server like the request-response model, publish-
subscribe model, push-pull model, exclusive pair model, etc.

Request-Response Communication Model


This model is a communication model in which a client sends the request for data to the server
and the server responds according to the request. when a server receives a request it fetches the
data, retrieves the resources and prepares the response, and then sends the data back to the
client.

Request response communication model


In simple terms, we can say that in the request-response model, the server sends the response
equivalent to the request of the client. in this model, HTTP works as a request-response protocol
between a client and server.

Example

When we search a query on a browser then the browser submits an HTTP request to the server
and then the server returns a response to the browser (client).

Publish-Subscribe Communication Model


In this communication model, we have a broker between the publisher and the consumer. here
publishers are the source of data but they are not aware of consumers. they send the data
managed by the brokers and when a consumer subscribes to a topic that is managed by the
broker and when the broker receives data from the publisher it sends the data to all the
subscribed consumers.
Published-subscribe communication model

Example

On the website many times we subscribed to their newsletters using our email address. these
email addresses are managed by some third-party services and when a new article is published
on the website it is directly sent to the broker and then the broker sends these new data or posts
to all the subscribers.

Push-Pull Communication Model


It is a communication model in which the data push by the producers in a queue and the
consumers pull the data from the queues. here also producers are not aware of the consumers.

Push Pull Model

Example

When we visit a website we saw a number of posts that are published in a queue and according
to our requirements, we click on a post and start reading it.
Exclusive Pair Communication Model
It is a bidirectional fully duplex communication model that uses a persistent connection
between the client and server. here first set up a connection between the client and the server
and remain open until the client sends a close connection request to the server.

Exclusive Pair communication model


IoT communication APIs
These APIs like REST and WebSocket are used to communicate between the server and system
in IoT.

REST-based communication APIs


Representational state transfer(REST) API uses a set of architectural principles that are used to
design web services. these APIs focus on the systems’ resources that how resource states are
transferred using the request-response communication model. This API uses some architectural
constraints.

Client-server

Here the client is not aware of the storage of data because it is concerned about the server and
similarly the server should not be concerned about the user interface because it is a concern of
the client. and this separation is needed for independent development and updating of the server
and client. no matter how the client is using the response of the server and no matter how the
server is using the request of the client.

Stateless

It means each request from the client to the server must contain all the necessary information
to understand the server. because if the server can’t understand the request of the client then it
can’t fetch the requested data in a proper manner.

Cacheable

In response, if the cache constraints are given then a client can reuse that response in a later
request. it improves the efficiency and scalability of the system without loading extra data.
A RESTful web API is implemented using HTTP and REST principles.

WebSocket-based communication API


This type of API allows bi-directional full-duplex communication between server and client
using the exclusive pair communication model. This API uses full-duplex communication so it
does not require a new connection setup every time when it requests new data. WebSocket API
begins with a connection setup between the server and client and if the WebSocket is supported
by the server then it responds back to the client with a successful response after the setup of a
connection server and the client can send data to each other in full-duplex mode.

This type of API reduces the traffic and latency of data and makes sure that each time when we
request new data it cannot terminate the request.

The 7 components of an IoT ecosystem architecture

1. Sensors in the IoT device

Sensors capture electric pulse or primary analogue data sources. They can measure
temperature, humidity, light, motion, acceleration, smoke, chemical particles, and pressure.
Sensors detect, and actuators act. Actuators will operate in the reverse direction. When
triggered by the application, they act. Electric switches, valves, and motors are actuators.

2. Device connectivity

The sensors are connected to a device or a part of the device.

And the device itself has an element that allows it to connect to the network to transmit data to
the cloud and receive commands.

The network could be Wi-Fi, the network could be cellular, and it could be a lot of technologies.

3. Application in the smart device

On the device itself – and it's the third functional block of IoT systems– is an application. That's
the logic that says, for example, "if the temperature exceeds 20 degrees, I send a notification
to the network."

You need to have the application that's running. The application runs on a processor. That's
called either an MCU, a multi-controller unit or an MPU multi-processor unit.

4.The network

The fourth IoT layer is the network itself that connects from the device back to the cloud.

This device connects to the network. The network could be Wi-Fi, it could be Bluetooth, and
the network could be cellular.
Let's focus on the cellular because many IoT applications are based on it for reliability and
service levels.

And in cellular, you've got a host of options based on the bandwidth you want for your
application or the battery.

 The LPWAN, a low-powered wide-area network, has two variants: category M (Cat-M
or LTE-M) and category NB-IoT (Cat NB-IoT).

 Then you've got the mid-range bandwidth, category LTE-1 (LTE Cat 1).
And then, the high bandwidth applications typically use networks called LTE Advanced (LTE-
A) or LTE Advanced Pro.
5G networks

There's something called massive IoT, an extension in the 5G world of the CAT-M and CAT
NB we spoke about in 4G LTE environments.

5. The application (and processing) on the cloud

Now that the data comes back, it's stored in a database. It is treated/processed. There are actions
taken on it. That's sitting in the cloud.

This part is a typical IT application.

A gigantic step to aid M2M in evolving into IoT is the emergence of public cloud platforms
specially tuned for IoT applications. Platforms such as AWS IoT from Amazon, Google Cloud,
or Azure from Microsoft have vastly simplified IoT and offered a common structure, including
security and device management. They have also eased the standardization of the structure of
messages sent from the edge device

6. Data Analytics
The one thing that would be different out there, though, more in IoT than in enterprise
applications, is machine learning or analytics.

This is really different for IoT because the value in IoT is in the data generated and the results
that derive from analyzing the data leveraging virtual data analytics.
So, this is something that will specifically come across the analytic side.

More often, that's running in the cloud, the sixth functional layer of the IoT ecosystem.

Big data analytics can benefit the IoT-enabled smart grid, where millions of data are collected
and stored.

7. Security
Security building block: the security at the device, the security at the cloud, and the channel
between the device and the cloud.
Security is a broad concept that needs to be adapted to the use case.

But the general security principles established in IoT and the acronyms used are PKI, public-
key cryptography, encryption,
Security Challenges of IoT

1. Lack of encryption

Although encryption is a great way to prevent hackers from accessing data, it is also one of the leading
IoT security challenges.

These drives like the storage and processing capabilities that would be found on a traditional computer.

The result is an increase in attacks where hackers can easily manipulate the algorithms that were
designed for protection.

2. Insufficient testing and updating

With the increase in the number of IoT(internet of things) devices, IoT manufacturers are more eager
to produce and deliver their device as fast as they can without giving security too much of although.

Most of these devices and IoT products do not get enough testing and updates and are prone to
hackers and other security issues.

3. Brute forcing and the risk of default passwords

Weak credentials and login details leave nearly all IoT devices vulnerable to password hacking and
brute force.

Any company that uses factory default credentials on their devices is placing both their business and
its assets and the customer and their valuable information at risk of being susceptible to a brute force
attack.

4. IoT Malware and ransomware

Increases with increase in devices.

Ransomware uses encryption to effectively lock out users from various devices and platforms and still
use a user’s valuable data and info.

Example – A hacker can hijack a computer camera and take pictures.

By using malware access points, the hackers can demand ransom to unlock the device and return the
data.

5. IoT botnet aiming at cryptocurrency

IoT botnet workers can manipulate data privacy, which could be massive risks for an open Crypto
market. The exact value and creation of cryptocurrencies code face danger from mal-intentioned
hackers.

The blockchain companies are trying to boost security. Blockchain technology itself is not particularly
vulnerable, but the app development process is.

6. Inadequate device security: Inadequate device security refers to the lack of proper measures to
protect electronic devices such as computers, smartphones, and IoT devices from cyber-attacks,
hacking, data theft, and unauthorized access. This can happen due to outdated software, weak
passwords, unpatched vulnerabilities, lack of encryption, and other security risks. It is important to
regularly update the software and implement strong security measures to ensure the security and
privacy of sensitive information stored on these devices. Many IoT devices have weak security features
and can be easily hacked.

7. Lack of standardization: Lack of standardization refers to the absence of agreed-upon specifications


or protocols in a particular field or industry. This can result in different systems, products, or processes
being incompatible with each other, leading to confusion, inefficiency, and decreased interoperability.
For example, in the context of technology, a lack of standardization can cause difficulties in
communication and data exchange between different devices and systems. Establishing standards and
protocols can help overcome this and ensure uniformity and compatibility. There is a lack of
standardization in IoT devices, making it difficult to secure them consistently.

8. Vulnerability to network attacks: Vulnerability to network attacks refers to the susceptibility of a


network, system or device to being compromised or exploited by cyber criminals. This can happen due
to weaknesses in the network infrastructure, unpatched software, poor password management, or a
lack of appropriate security measures.

9. Unsecured data transmission: Unsecured data transmission refers to the transfer of data over a
network or the internet without adequate protection. This can leave the data vulnerable to
interception, tampering, or theft by malicious actors. Unsecured data transmission can occur when
data is transmitted over an unencrypted network connection or when insecure protocols are used. To
protect sensitive data during transmission, it is important to use secure protocols such as SSL/TLS or
VPN, and to encrypt the data before sending it.

10. Privacy concerns: Privacy concerns refer to issues related to the collection, storage, use, and
sharing of personal information. This can include concerns about who has access to personal
information, how it is being used, and whether it is being protected from unauthorized access or
misuse.

11. Software vulnerabilities: Software vulnerabilities are weaknesses or flaws in software code that
can be exploited by attackers to gain unauthorized access, steal sensitive information, or carry out
malicious activities. Software vulnerabilities can arise from errors or mistakes made during the
development process, or from the use of outdated or unsupported software. Attackers can exploit
these vulnerabilities to gain control over a system, install malware, or steal sensitive information. To
reduce the risk of software vulnerabilities, it is important for software developers to follow secure
coding practices and for users to keep their software up-to-date and properly configured

12. Insider threats: Insider threats refer to security risks that come from within an organization, rather
than from external sources such as hackers or cyber criminals. These threats can take many forms,
such as employees who intentionally or unintentionally cause harm to the organization, contractors
who misuse their access privileges, or insiders who are coerced into compromising the security of the
organization. Insider threats can result in data breaches, theft of intellectual property, and damage to
the reputation of the organization. To mitigate the risk of insider threats, organizations should
implement strict access controls, monitor employee activity, and provide regular training on security
and privacy policies.

You might also like