0% found this document useful (0 votes)
44 views17 pages

Mca Iv Iot Unit 4

The document outlines the key components of Internet of Things (IoT) including data analytics, machine learning, and security challenges. It emphasizes the importance of extracting actionable insights from IoT data, the role of machine learning in predictive maintenance, and the evolution of IoT security practices. Additionally, it highlights the unique challenges faced in securing IoT devices compared to traditional IT systems.

Uploaded by

anushkav1612
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
44 views17 pages

Mca Iv Iot Unit 4

The document outlines the key components of Internet of Things (IoT) including data analytics, machine learning, and security challenges. It emphasizes the importance of extracting actionable insights from IoT data, the role of machine learning in predictive maintenance, and the evolution of IoT security practices. Additionally, it highlights the unique challenges faced in securing IoT devices compared to traditional IT systems.

Uploaded by

anushkav1612
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

MCA VI Semester

Internet of Things
TMC-403
Jaishankar Bhatt
Assistant Professor
Graphic Era Deemed to be University
Dehradun

Graphic Era Deemed to be Universsity, Dehradun


UNIT 4
Contents
• Data and its Analytics for IoT

• Introduction to Data Analytics for IoT

• Machine Learning, Big Data Analytics Tools and Technology

• Edge Streaming Analytics, Network Analytics.

• Securing IoT

• A Brief History of IoT Security

• Common Challenges in IoT Security

• How IT and IoT Security Practices and Systems Vary.


Introduction to Data Analytics for IoT
What is IoT?
• Internet of Things (IoT) refers to interconnected devices that collect and exchange data via the internet.
• Examples: Smart home devices, industrial sensors, connected vehicles.
Role of Data in IoT
• IoT generates massive amounts of real-time data from diverse sources (sensors, GPS, RFID, etc.).
• Data can be structured, semi-structured, or unstructured.
Data Analytics for IoT
• Goal: Extract actionable insights from IoT data to drive decisions and automation.
• Steps:
o Data Collection (sensors/devices)
o Data Transmission (networks/protocols)
o Data Processing and Storage (cloud/edge/fog)
o Data Analysis (real-time/historical)
Importance
• Enables predictive maintenance, operational efficiency, real-time monitoring, customer behavior analysis, etc.
Machine Learning for IoT
Why ML in IoT?

• IoT data is massive and complex — ML helps to uncover patterns and make predictions.

ML Techniques Used in IoT

• Supervised Learning (e.g., classification of sensor failures)

• Unsupervised Learning (e.g., clustering usage behavior)

• Reinforcement Learning (e.g., smart energy management)

Common Use Cases

• Predictive Maintenance: Predict failures using historical sensor data.

• Anomaly Detection: Detect abnormal behavior in connected systems.

• Smart Cities: Optimize traffic and utilities.

• Healthcare: Remote patient monitoring with anomaly alerts.


ML Pipeline for IoT

1. Data Collection

2. Preprocessing (cleaning, normalization)

3. Feature Engineering

4. Model Training

5. Deployment (often on edge/fog devices)


Big Data Analytics Tools and Technology

Key Characteristics of IoT Data (Big Data)

• Volume: Large amount of data

• Velocity: High-speed generation and processing

• Variety: Different formats (text, images, video, sensor data)

• Veracity: Uncertainty in data accuracy

• Value: Extracting useful insights


Tools & Technologies

Category Examples

Hadoop Distributed File System (HDFS), Amazon


Data Storage
S3, Apache Cassandra, MongoDB

Data Processing Apache Hadoop, Apache Spark, Flink, Storm

Stream Processing Apache Kafka, Apache Storm, Apache Flink

ML Libraries TensorFlow, Scikit-learn, PyTorch, MLlib (Spark)

Visualization Tableau, Power BI, Grafana

Platforms: AWS IoT, Azure IoT Hub, Google Cloud IoT — offer end-to-end support for analytics.
Edge Streaming Analytics
What is Edge Analytics?

• Analytics done near or at the data source, rather than in a centralized cloud.

Need for Edge Analytics

• Reduces latency, bandwidth usage, and ensures real-time responsiveness.

• Ideal for time-sensitive applications (e.g., autonomous vehicles, industrial safety).

Edge Analytics Workflow

1. Data captured by IoT sensors

2. Data processed by edge device/gateway

3. Processed data transmitted to cloud (if needed)


Technologies

• Edge devices: Raspberry Pi, NVIDIA Jetson, Intel NUC

• Frameworks: AWS Greengrass, Azure IoT Edge, EdgeX Foundry

Use Cases

• Smart manufacturing (detecting faults in real time)

• Retail (real-time customer behavior tracking)

• Remote monitoring (oil rigs, power stations)


Network Analytics in IoT
What is Network Analytics?

• Analyzing communication patterns, traffic loads, and performance across IoT networks.

Importance

• Ensure reliability, security, and performance of IoT data transmission.

• Detect network anomalies or failures early.

Key Metrics Analyzed

• Latency, bandwidth, packet loss, device connectivity, signal strength

Tools and Techniques

• SNMP-based tools, NetFlow, Wireshark, network telemetry systems


• AI/ML for:

o Predictive network performance

o Adaptive routing

o Anomaly and intrusion detection

Use Cases

• Smart Grids (ensuring stable communication between sensors and control


centers)

• Industrial IoT (monitoring connectivity between PLCs and cloud)

• Healthcare IoT (ensuring uninterrupted patient data streaming)


A Brief History of IoT Security
Early Days of IoT
• IoT started as simple embedded systems for automation and monitoring (e.g., thermostats, RFID, wearable tech).
• Security was not a priority — focus was on functionality, cost, and battery life.
Evolution of IoT
• As connectivity increased (Wi-Fi, Bluetooth, 4G/5G), IoT devices became smarter and more widespread:
• Smart homes, connected cars, health trackers, industrial sensors.
• Security risks emerged: devices connected to the internet without protection.
Rise of Threats
• Mirai Botnet (2016): Major attack that used insecure IoT devices to launch massive DDoS attacks.
• BrickerBot, VPNFilter, and other malware exploited weak/default credentials and outdated firmware.
• Governments began regulating IoT security (e.g., UK’s IoT cybersecurity law, California’s SB-327).
Current Focus
• Shift toward “Security by Design”: embedding security into devices from the start.
• Use of secure boot, hardware root of trust, encryption, and firmware updates.
Common Challenges in IoT Security
1. Weak Authentication
• Many IoT devices still use default or hardcoded passwords.
• Lack of multi-factor authentication (MFA).
2. Insecure Communication
• Data often transmitted unencrypted (e.g., HTTP instead of HTTPS).
• Vulnerable to man-in-the-middle (MitM) attacks.
3. Lack of Updates
• IoT devices may not support over-the-air (OTA) firmware updates.
• Users are often unaware or unable to update devices, leaving vulnerabilities
unpatched.
4. Device Constraints
• Limited processing power, memory, and storage.
• Difficult to implement strong encryption or complex security protocols.
5. Supply Chain Risks
•Firmware or components may have malware/backdoors before deployment.
•Lack of transparency in manufacturing and sourcing.
6. Scalability
•Large-scale deployments (e.g., smart cities) make it hard to manage and monitor every device.
•Risk of botnets, DDoS, and automated attacks increases with scale.
7. Privacy Concerns
•IoT devices collect sensitive personal data (location, voice, video).
•Weak protection can lead to data breaches, identity theft, and surveillance.
How IT and IoT Security Practices and Systems Vary
Features IT security IoT Security
Primary Goal Data confidentiality, integrity, availability Device reliability, data privacy, uptime
System Complexity Managed computers and servers Massive number of diverse smart devices
Update Mechanism Regular software patches & updates Often lacks OTA updates or user support
Authentication Strong (passwords, MFA, SSO, etc.) Often weak or default authentication
Security Tools Firewalls, antivirus, endpoint protection Lightweight or absent due to constraints
Network Design Centralized Distributed and dynamic
Lifecycle 3–5 years 5–15 years, often unsupported after sale
User Interaction Tech-savvy admins Non-technical end users (home or field)
Patch Management Automated or manual patching Often no patching mechanisms
Key Implications
• IoT security requires lightweight, scalable, and automated protection mechanisms.
• IT policies must be adapted to fit IoT’s hardware and connectivity limitations.
• Secure IoT design must consider long device lifecycles, physical access, and non-technical users.
Summery of the Unit 4
Area Focus
Data Analytics for IoT Extract insights from device-generated data
Machine Learning Predictive models for sensor behaviour, maintenance, and detection
Big Data Tools Handle the scale, speed, and complexity of IoT data
Edge Streaming Analytics Process data close to where it’s generated
Network Analytics Ensure stable, efficient, and secure data transmission in IoT
IoT Security
• IoT security has evolved from being an afterthought to a critical requirement due to real-world attacks.
• Unique challenges such as weak authentication, lack of updates, and constrained devices make IoT harder to
secure than traditional IT.
• Security practices need to be tailored for IoT environments, considering hardware limits and usability, while
following core principles of cybersecurity.

You might also like