Actuators in IoT Identity Management?
CLUSTRING
*An IoTdevice is made up of a Physical object (“thing”) + Identity management is a method of verifying the identities of The task of grouping data points based on their similarity
Controller (“brain”) + Sensors + Actuators + Networks network entities and the level of access for enterprise network with each other is called Clustering or Cluster Analysis.
(Internet). resources. It helps keep IT systems, networks, and data secure. Clustering aims at forming groups of homogeneous data
*An actuator is a machine component or system that moves The goal of identity management (IdM) is to ensure that only points from a heterogeneous dataset.
or controls the mechanism of the system. authorized users have access to systems, applications, and Types of Clustering
*Sensors in the device sense the environment, then control components. 1.Hard Clustering: In this type of clustering, each data point
signals are generated for the actuators according to the Identity management models are frameworks that define how belongs to a cluster completely or not. For example, Let’s say
actions needed to perform a system manages user or object identities. They help ensure there are 4 data point and we have to cluster them into 2
Types of Actuators that identity information is managed securely and efficiently. clusters. So each data point will either belong to cluster 1 or
1.Hydraulic Actuators: A hydraulic actuator uses hydraulic Three common identity management models: cluster 2.
power to perform a mechanical operation. They are actuated 1.Isolated identity management : This model requires that 2.Soft Clustering: In this type of clustering, instead of
by a cylinder or fluid motor. *The mechanical motion is each user possess an identifier for access to each isolated assigning each data point into a separate cluster, a
converted to rotary, linear, or oscillatory motion, according service. This system is used a lot in online services and probability or likelihood of that point being that cluster is
to the need of the IoT device. resources, because it is relatively simple for service providers evaluated.
Advantages :Hydraulic actuators can produce a large to manage, but it is rapidly becoming unmanageable for users. *Uses of Clustering*
2.Federated identity management Federated identity *Market Segmentation – Businesses use clustering to group
magnitude of force and high speed.Used in welding,
management simplifies the account management problem. A their customers and use targeted advertisements to attract
clamping, etc. *Disadvantages : Hydraulic fluid leaks can
set of agreements and standards are defined among a group of more audience.
cause efficiency loss and issues of cleaning. *It is expensive.
service providers who recognise user identifiers from one *Medical Imaging – Doctors use Clustering to find out
2. Pneumatic Actuators: A pneumatic actuator uses energy
another. diseased areas in diagnostic images like X-rays.
formed by vacuum or compressed air at high pressure to
3. Centralised identity management: In this model, the same Anomaly detection– To find outliers in a stream of real-time
convert into either linear or rotary motion. Advantages identifier and credential are used by each service provider. dataset or forecasting fraudulent transactions we can use
:They are a low-cost option and are used at extreme This could for example be implemented by having a PKI, where clustering to identify them.
temperatures where using air is a safer option than a Certificate Authority (CA) issues certificates to users. Applications of Clustering in different fields:
chemicals. Disadvantages: Loss of pressure can make it less 1.Marketing: It can be used to characterize & discover
efficient. *Air can be polluted, and it needs maintenance. customer segments for marketing purposes.
3. Electrical Actuators: An electric actuator uses electrical 2.Biology: It can be used for classification among different
energy, is usually actuated by a motor that converts species of plants and animals.
electrical energy into mechanical torque. 3.Libraries: It is used in clustering different books on the
Advantages :It has many applications in various industries as basis of topics and information.
it can automate industrial valves. *Disadvantages: It is 4.Insurance: It is used to acknowledge the customers, their
expensive. *It depends a lot on environmental conditions. policies and identifying the frauds.
Basics of Wi-Fi Data synchronization: Internet protocol (IP) is a set of rules that dictates how
Wired networks differ from wireless which uses radio Data synchronization is the process of ensuring that data data gets sent to the internet. IoT protocols ensure that
across multiple devices and systems is consistent and up- information from one device or sensor gets read and
waves rather than transmitting electrical signals over
to-date. It's a fundamental process for many IT solutions, understood by another device, a gateway, a service.
the cables. Wi-Fi stands for Wireless Fidelity. It is a especially in the Internet of Things (IoT) and mobile. Different IoT protocols have been designed and optimized
technology for wireless local area networking with In IoT, data synchronization is important for many reasons, for different scenarios and usage.
devices based on IEEE 802.11 standards. including: Some examples of IoT protocols:
IEEE has defined certain specifications for wireless LAN, *Reliable data flow: Clocks help devices determine when *6LowPAN: Used in connectivity infrastructure
called IEEE 802.11 which covers physical and data link to share sensor measurements with the network. *Wi-Fi and Bluetooth: Used in communications
*Battery life: Poor sync processes can lead to poor battery *MQTT, CoAP, and XMPP: Used in data transmission
layers.
life. *DTLS: Used in security.
Access Point(AP) is a wireless LAN base station that can Some challenges of data synchronization include: 6 Types Of Most Common IoT Protocols
connect one or many wireless devices simultaneously 1.Asynchrony 2.Conflicts 3.Slow bandwidth 4.Flaky 1.Satellite:Using satellite technology, a mobile phone can
to internet. networks 5.Third-party applications 6.File systems that communicate with the closest antenna from up to 15 miles
The frequencies operate on 2 types of bandwidth at have different semantics . distant. 2.Bluetooth: Bluetooth is a short-range wireless
present, 2.4 GHz and 5 GHz. Some ways to improve data synchronization in IoT fidelity data exchange protocol. 3.WiFi: WiFi is popular with
include: practically everyone because of its ubiquitous use in
Features of Wi-Fi include
*Using a new data synchronization algorithm that uses business and residential settings.
Compatibility: Wi-Fi is a widely adopted technology timestamp and bitmap to improve network transmission 4.Advanced Message Queuing Protocol (AMQP): This
and is compatible with a wide range of devices, efficiency protocol is responsible for ensuring that only reliable
including smartphones, laptops, tablets, and smart *Using the P.T.P. Protocol for clock correction to communications are transmitted. 5.Constrained Application
home devices. synchronize the sound of all devices Protocol (CoAP): CoAP is a transfer protocol for the Internet
Interference: Wi-Fi signals can be subject to *Using a time synchronization mechanism that employs that was for networks with limited capacity and shaky
CoAP instead of extra standards for time synchronization connections. 6.Radio-Frequency Identification (RFID): RFID
interference from other wireless devices and physical
protocols uses radio waves to send data packets wirelessly in places
barriers, such as walls and buildings, which can impact with limited space.
network performance.
Reliability: Wi-Fi networks can sometimes suffer from
dropouts or signal loss, particularly in areas with high
network congestion or interference.
Wireless Connectivity: , High Speed: , Easy
Setup: Multiple Device Connectivity: ,
Security: Range: ,Wi-Fi Direct: ,Hotspot: , Wi-Fi Calling