IoT Module-1
IoT Module-1
Introduction To IoT
Internet of Things refers to the network of physical devices, vehicles, home appliances, and
other items embedded with electronics, software, sensors, and network connectivity,
allowing them to collect and exchange data. The IoT enables these devices to interact with
each other and with the environment and enables the creation of smart systems and services.
Some examples of IoT devices include:
          Smart home devices such as thermostats, lighting systems, and security systems.
          Wearables such as fitness trackers and smartwatches.
          Healthcare devices such as patient monitoring systems and wearable medical
           devices.
          Industrial systems such as predictive maintenance systems and supply chain
           management systems.
          Transportation systems such as connected cars and autonomous vehicles.
The IoT is transforming various industries, from healthcare and manufacturing to
transportation and energy. IoT devices generate vast amounts of data, which can be analyzed
to improve operations, drive innovation, and create new business opportunities.
IoT systems are typically composed of several components, including IoT devices,
communication networks, gateways, and cloud-based data processing and storage systems.
IoT devices use sensors and other technologies to collect data, and then send that data to the
cloud for analysis and storage. The cloud also provides a centralized platform for managing
and controlling IoT devices and networks.
Overall, the IoT is a rapidly growing and evolving field that has the potential to revolutionize
a wide range of industries and transform the way we live and work. As IoT devices and
systems become increasingly widespread, the opportunities for innovation and growth in this
field will continue to expand.
According to the definition of IoT, It is the way to interconnect with the help of internet
devices that can be embedded to implement the functionality in everyday objects by enabling
them to send and receive data. Today data is everything and everywhere. Hence, IoT can also
be defined as the analysis of the data that generates a meaningful action, triggered
subsequently after the interchange of data. IoT can be used to build applications for
agriculture, assets tracking, energy sector, safety and security sector, defense, embedded
applications, education, waste management, healthcare product, telemedicine, smart city
applications, etc.
1. Connectivity
Connectivity is an important requirement of the IoT infrastructure. Things of IoT should be
connected to the IoT infrastructure. Anyone, anywhere, anytime can connect, this should be
guaranteed at all times. For example, the connection between people through Internet devices
like mobile phones, and other gadgets, also a connection between Internet devices such as
routers, gateways, sensors, etc.
3. Scalability
The number of elements connected to the IoT zone is increasing day by day. Hence, an IoT
setup should be capable of handling the massive expansion. The data generated as an outcome
is enormous, and it should be handled appropriately.
7. Self-Configuring
This is one of the most important characteristics of IoT. IoT devices can upgrade their
software in accordance with requirements with a minimum of user participation.
Additionally, they can set up the network, allowing for the addition of new devices to an
already-existing network.
8. Interoperability
IoT devices use standardized protocols and technologies to ensure they can communicate
with each other and other systems. Interoperability is one of the key characteristics of the
Internet of Things (IoT). It refers to the ability of different IoT devices and systems to
communicate and exchange data with each other, regardless of the underlying technology or
manufacturer.
Interoperability is critical for the success of IoT, as it enables different devices and systems
to work together seamlessly and provides a seamless user experience. Without
interoperability, IoT systems would be limited to individual silos of data and devices, making
it difficult to share information and create new services and applications.
Actuators are devices that can interact with the environment, such as turning on lights,
opening or closing doors, or controlling the speed of a motor. In IoT systems, actuators are
embedded into devices, allowing them to perform actions based on data collected by sensors.
Together, sensors and actuators allow IoT devices to collect data about the environment,
process that data, and take action based on the results. This makes it possible to automate a
wide range of processes and tasks, such as home automation, energy management, and
predictive maintenance.
In order to ensure that sensors and actuators can communicate with each other and with other
devices and systems, they use standardized communication protocols, such as Bluetooth Low
Energy (BLE), Zigbee, or Wi-Fi.
In IoT systems, devices and systems are equipped with sensors, actuators, and processing
power, allowing them to collect and process data about the environment, make decisions
based on that data, and take action accordingly.
For example, an IoT system might use sensors to detect changes in temperature or light levels
in a room, and then use actuators to adjust the temperature or turn on the lights based on that
data. This allows for the automation of many tasks, such as energy management, home
automation, and predictive maintenance.
11. Data-driven
Data-driven is a key characteristic of the Internet of Things (IoT). IoT devices and systems
collect vast amounts of data from sensors and other sources, which can be analyzed and used
to make data-driven decisions.
In IoT systems, data is collected from embedded sensors, actuators, and other sources, such
as cloud services, databases, and mobile devices. This data is used to gain insights into the
environment, improve operational efficiency, and make informed decisions.
For example, an IoT system might use data from sensors to monitor the temperature and
humidity levels in a building, and then use that data to optimize heating, cooling, and
ventilation systems. This can result in significant energy savings and improved indoor air
quality.
12. Security
Security is a critical concern for the Internet of Things (IoT), as IoT devices and systems
handle sensitive data and are connected to critical infrastructure. The increasing number of
connected devices and the amount of data being transmitted over the Internet make IoT
systems a prime target for cyberattacks.
To secure IoT systems, multiple layers of security are necessary, including physical
security, network security, and data security.
Physical security involves protecting the physical devices from unauthorized access or
tampering. This can be achieved through measures such as secure enclosures, access controls,
and tamper-proofing.
Network security involves protecting the communication networks that connect IoT devices,
including Wi-Fi networks, cellular networks, and wired networks. This can be achieved
through encryption, secure authentication, and firewalls.
Data security involves protecting the data collected and transmitted by IoT devices and
systems. This can be achieved through encryption, secure storage, and access controls.
In addition to these technical measures, it is also important to have robust policies and
procedures in place to ensure the security of IoT systems, such as incident response plans
and regular security audits.
13. Ubiquity
Ubiquity refers to the widespread and pervasive presence of the Internet of Things (IoT)
devices and systems in our daily lives. The goal of IoT is to create a seamless and
interconnected world where devices and systems can communicate and share data seamlessly
and transparently.
Ubiquity is achieved through the widespread deployment of IoT devices, such as sensors,
actuators, and other connected devices, as well as the development of IoT networks and
infrastructure to support communication and data exchange.
In a ubiquitous IoT environment, devices and systems can be accessed and controlled from
anywhere, at any time, using a variety of devices, such as smartphones, laptops, and other
connected devices.
Context awareness is a critical aspect of IoT, as it enables IoT devices and systems to make
decisions and take actions based on the context in which they are operating.
For example, in a smart home, a context-aware IoT system could adjust the temperature,
lighting, and other systems based on the time of day, the presence of people in the home, and
other factors.
In addition, context awareness is also used to improve the efficiency and effectiveness of IoT
systems by reducing the amount of data that needs to be transmitted and processed. For
example, a context-aware IoT system might only collect and transmit data when it is relevant
to the current context, such as when a person is in the room or when the temperature changes
significantly.
           Bank transactions
           Data generated by IoT systems for location and tracking of vehicles
           E-commerce and in Big-Basket
           Health and fitness data generated by IoT system such as a fitness bands
4. Communications Protocols:
They are the backbone of IoT systems and enable network connectivity and linking to
applications. Communication protocols allow devices to exchange data over the network.
Multiple protocols often describe different aspects of a single communication. A group of
protocols designed to work together is known as a protocol suite; when implemented in
software they are a protocol stack.
They are used in
        1. Data encoding
        2. Addressing schemes
5. Embedded Systems:
It is a combination of hardware and software used to perform special tasks.
It includes microcontroller and microprocessor memory, networking units (Ethernet Wi-Fi
adapters), input output units (display keyword etc. ) and storage devices (flash memory).
It collects the data and sends it to the internet.
Embedded systems used in
Examples –
        1. Digital camera
        2. DVD player, music player
        3. Industrial robots
        4. Wireless Routers etc.
Sensors play a crucial role in IoT by collecting data from the physical environment and
converting it into digital information. Different sensor technologies are employed in IoT
devices, including:
These sensors enable IoT devices to collect real−time data, monitor the environment, and
respond to specific conditions or triggers.
Connectivity
Devices like USB hosts and ETHERNET are used for connectivity between the devices and
the server.
Processor
A processor like a CPU and other units are used to process the data. these data are further used
to improve the decision quality of an IoT system.
Audio/Video Interfaces
An interface like HDMI and RCA devices is used to record audio and videos in a system.
Input/Output interface
To give input and output signals to sensors, and actuators we use things like UART, SPI, CAN,
etc.
Storage Interfaces
Things like SD, MMC, and SDIO are used to store the data generated from an IoT
device.
Other things like DDR and GPU are used to control the activity of an IoT system.
These protocols are used to establish communication between a node device and a
server over the internet. it helps to send commands to an IoT device and receive data
from an IoT device over the internet. we use different types of protocols that are present
on both the server and client side and these protocols are managed by network layers
like application, transport, network, and link layer.
In this layer, protocols define how the data can be sent over the network with the lower layer
protocols using the application interface. These protocols include HTTP, WebSocket, XMPP,
MQTT, DDS, and AMQP protocols.
Communication protocols are essential for IoT devices to exchange data and information. Some
commonly used protocols in IoT include:
Transport Layer
This layer is used to control the flow of data segments and handle error control. also, these
layer protocols provide end-to-end message transfer capability independent of the underlying
network.
TCP
The transmission control protocol is a protocol that defines how to establish and maintain a
network that can exchange data in a proper manner using the internet protocol.
UDP
a user datagram protocol is part of an internet protocol called the connectionless protocol. this
protocol is not required to establish the connection to transfer data.
Network Layer
This layer is used to send datagrams from the source network to the destination network. we
use IPv4 and IPv6 protocols as host identification that transfers data in packets.
IPv4
This is a protocol address that is a unique and numerical label assigned to each device
connected to the network. an IP address performs two main functions host and location
addressing. IPv4 is an IP address that is 32-bit long.
IPv6
It is a successor of IPv4 that uses 128 bits for an IP address. it is developed by the IETF task
force to deal with long-anticipated problems.
Link Layer
Link-layer protocols are used to send data over the network’s physical layer. it also
determines how the packets are coded and signalled by the devices.
Wireless connectivity is a key aspect of IoT, providing flexibility and mobility. Some common
wireless connectivity options used in IoT devices include:
      Wi−Fi: A widely used wireless networking technology that enables high−speed data
       transfer over short to medium distances. It is suitable for applications with power
       availability and the need for high bandwidth.
      Bluetooth: A short−range wireless technology used for connecting devices in
       proximity. It is commonly used for IoT devices that require low power consumption
       and intermittent data transfer, such as wearable devices and home automation systems.
      Zigbee: A low−power, low−data−rate wireless communication protocol designed for
       applications with low power consumption requirements and a large number of devices.
       It is commonly used in home automation, smart lighting, and industrial applications.
      LPWAN (Low−Power Wide Area Network): LPWAN technologies, such as
       LoRaWAN and NB−IoT, offer long−range connectivity with low power consumption,
       making them suitable for IoT applications that require wide area coverage, such as
       smart city deployments and agricultural monitoring.
While wireless connectivity is prevalent in IoT, there are also cases where wired connectivity
is preferred for its reliability and stability. Some common wired connectivity options include:
      Ethernet: A standard wired networking technology that provides reliable and highspeed
       data transfer over local area networks (LANs). Ethernet is commonly used in industrial
       settings and for devices requiring high bandwidth and low latency.
      Powerline Communication: This technology allows data transmission over existing
       power lines, eliminating the need for additional wiring. Powerline communication is
       often used in home automation systems and smart meters.
   Power and Energy Management
   Power requirements of IoT devices can vary based on factors such as their functionality,
   processing capabilities, and communication needs. IoT devices typically fall into two
   categories:
         Battery−powered devices: These devices operate on limited battery power and must be
          designed to optimize energy consumption to extend battery life. They often employ
          low−power components, sleep modes, and efficient power management techniques.
         Line−powered devices: Devices that are connected to a power source have more
          flexibility in terms of power requirements. However, energy efficiency is still a
          consideration to minimize operating costs and environmental impact.
   Extending battery life is crucial for many IoT devices to ensure uninterrupted operation and
   minimize maintenance. Energy−efficient designs for IoT devices may include:
   But before you learn about the logical design of IoT systems you need to know a little bit about
   the physical design of IoT.
Application
It is an interface that provides a control system that use by users to view the status and analyze
of system.
Management
This functional block provides various functions that are used to manage an IoT system.
Services
This functional block provides some services like monitoring and controlling a device and
publishing and deleting the data and restoring the system.
Communication
This block handles the communication between the client and the cloud-based server and
sends/receives the data using protocols.
Security
This block is used to secure an IoT system using some functions like authorization, data
security, authentication, 2-step verification, etc.
Device
These devices are used to provide sensing and monitoring control functions that collect data
from the outer environment.
Example
When we search a query on a browser then the browser submits an HTTP request to the server
and then the server returns a response to the browser (client).
Example
On the website many times we subscribed to their newsletters using our email address. these
email addresses are managed by some third-party services and when a new article is published
on the website it is directly sent to the broker and then the broker sends these new data or posts
to all the subscribers.
Example
When we visit a website we saw a number of posts that are published in a queue and according
to our requirements, we click on a post and start reading it.
Exclusive Pair Communication Model
It is a bidirectional fully duplex communication model that uses a persistent connection
between the client and server. here first set up a connection between the client and the server
and remain open until the client sends a close connection request to the server.
Client-server
Here the client is not aware of the storage of data because it is concerned about the server and
similarly the server should not be concerned about the user interface because it is a concern of
the client. and this separation is needed for independent development and updating of the server
and client. no matter how the client is using the response of the server and no matter how the
server is using the request of the client.
Stateless
It means each request from the client to the server must contain all the necessary information
to understand the server. because if the server can’t understand the request of the client then it
can’t fetch the requested data in a proper manner.
Cacheable
In response, if the cache constraints are given then a client can reuse that response in a later
request. it improves the efficiency and scalability of the system without loading extra data.
A RESTful web API is implemented using HTTP and REST principles.
This type of API reduces the traffic and latency of data and makes sure that each time when we
request new data it cannot terminate the request.
Sensors capture electric pulse or primary analogue data sources. They can measure
temperature, humidity, light, motion, acceleration, smoke, chemical particles, and pressure.
Sensors detect, and actuators act. Actuators will operate in the reverse direction. When
triggered by the application, they act. Electric switches, valves, and motors are actuators.
2. Device connectivity
And the device itself has an element that allows it to connect to the network to transmit data to
the cloud and receive commands.
The network could be Wi-Fi, the network could be cellular, and it could be a lot of technologies.
On the device itself – and it's the third functional block of IoT systems– is an application. That's
the logic that says, for example, "if the temperature exceeds 20 degrees, I send a notification
to the network."
You need to have the application that's running. The application runs on a processor. That's
called either an MCU, a multi-controller unit or an MPU multi-processor unit.
4.The network
The fourth IoT layer is the network itself that connects from the device back to the cloud.
This device connects to the network. The network could be Wi-Fi, it could be Bluetooth, and
the network could be cellular.
    Let's focus on the cellular because many IoT applications are based on it for reliability and
    service levels.
    And in cellular, you've got a host of options based on the bandwidth you want for your
    application or the battery.
    The LPWAN, a low-powered wide-area network, has two variants: category M (Cat-M
     or LTE-M) and category NB-IoT (Cat NB-IoT).
    Then you've got the mid-range bandwidth, category LTE-1 (LTE Cat 1).
    And then, the high bandwidth applications typically use networks called LTE Advanced (LTE-
    A) or LTE Advanced Pro.
    5G networks
    There's something called massive IoT, an extension in the 5G world of the CAT-M and CAT
    NB we spoke about in 4G LTE environments.
    Now that the data comes back, it's stored in a database. It is treated/processed. There are actions
    taken on it. That's sitting in the cloud.
    A gigantic step to aid M2M in evolving into IoT is the emergence of public cloud platforms
    specially tuned for IoT applications. Platforms such as AWS IoT from Amazon, Google Cloud,
    or Azure from Microsoft have vastly simplified IoT and offered a common structure, including
    security and device management. They have also eased the standardization of the structure of
    messages sent from the edge device
    6. Data Analytics
    The one thing that would be different out there, though, more in IoT than in enterprise
    applications, is machine learning or analytics.
    This is really different for IoT because the value in IoT is in the data generated and the results
    that derive from analyzing the data leveraging virtual data analytics.
    So, this is something that will specifically come across the analytic side.
More often, that's running in the cloud, the sixth functional layer of the IoT ecosystem.
    Big data analytics can benefit the IoT-enabled smart grid, where millions of data are collected
    and stored.
    7. Security
    Security building block: the security at the device, the security at the cloud, and the channel
    between the device and the cloud.
    Security is a broad concept that needs to be adapted to the use case.
    But the general security principles established in IoT and the acronyms used are PKI, public-
    key cryptography, encryption,
Security Challenges of IoT
1. Lack of encryption
Although encryption is a great way to prevent hackers from accessing data, it is also one of the leading
IoT security challenges.
These drives like the storage and processing capabilities that would be found on a traditional computer.
The result is an increase in attacks where hackers can easily manipulate the algorithms that were
designed for protection.
With the increase in the number of IoT(internet of things) devices, IoT manufacturers are more eager
to produce and deliver their device as fast as they can without giving security too much of although.
Most of these devices and IoT products do not get enough testing and updates and are prone to
hackers and other security issues.
Weak credentials and login details leave nearly all IoT devices vulnerable to password hacking and
brute force.
Any company that uses factory default credentials on their devices is placing both their business and
its assets and the customer and their valuable information at risk of being susceptible to a brute force
attack.
Ransomware uses encryption to effectively lock out users from various devices and platforms and still
use a user’s valuable data and info.
By using malware access points, the hackers can demand ransom to unlock the device and return the
data.
IoT botnet workers can manipulate data privacy, which could be massive risks for an open Crypto
market. The exact value and creation of cryptocurrencies code face danger from mal-intentioned
hackers.
The blockchain companies are trying to boost security. Blockchain technology itself is not particularly
vulnerable, but the app development process is.
6. Inadequate device security: Inadequate device security refers to the lack of proper measures to
protect electronic devices such as computers, smartphones, and IoT devices from cyber-attacks,
hacking, data theft, and unauthorized access. This can happen due to outdated software, weak
passwords, unpatched vulnerabilities, lack of encryption, and other security risks. It is important to
regularly update the software and implement strong security measures to ensure the security and
privacy of sensitive information stored on these devices. Many IoT devices have weak security features
and can be easily hacked.
9. Unsecured data transmission: Unsecured data transmission refers to the transfer of data over a
network or the internet without adequate protection. This can leave the data vulnerable to
interception, tampering, or theft by malicious actors. Unsecured data transmission can occur when
data is transmitted over an unencrypted network connection or when insecure protocols are used. To
protect sensitive data during transmission, it is important to use secure protocols such as SSL/TLS or
VPN, and to encrypt the data before sending it.
10. Privacy concerns: Privacy concerns refer to issues related to the collection, storage, use, and
sharing of personal information. This can include concerns about who has access to personal
information, how it is being used, and whether it is being protected from unauthorized access or
misuse.
11. Software vulnerabilities: Software vulnerabilities are weaknesses or flaws in software code that
can be exploited by attackers to gain unauthorized access, steal sensitive information, or carry out
malicious activities. Software vulnerabilities can arise from errors or mistakes made during the
development process, or from the use of outdated or unsupported software. Attackers can exploit
these vulnerabilities to gain control over a system, install malware, or steal sensitive information. To
reduce the risk of software vulnerabilities, it is important for software developers to follow secure
coding practices and for users to keep their software up-to-date and properly configured
12. Insider threats: Insider threats refer to security risks that come from within an organization, rather
than from external sources such as hackers or cyber criminals. These threats can take many forms,
such as employees who intentionally or unintentionally cause harm to the organization, contractors
who misuse their access privileges, or insiders who are coerced into compromising the security of the
organization. Insider threats can result in data breaches, theft of intellectual property, and damage to
the reputation of the organization. To mitigate the risk of insider threats, organizations should
implement strict access controls, monitor employee activity, and provide regular training on security
and privacy policies.