Iot ch1 My Notes
Iot ch1 My Notes
IoT stands for Internet of Things. It refers to the interconnectedness of physical devices,
such as appliances and vehicles, that are embedded with software, sensors, and
connectivity which enables these objects to connect and exchange data.
This technology allows for the collection and sharing of data from a vast network of
devices, creating opportunities for more efficient and automated systems.
Internet of Things (IoT) is the networking of physical objects that contain electronics
embedded within their architecture in order to communicate and sense interactions
amongst each other or with respect to the external environment.
Four Key Components of IOT
Device or sensor
Connectivity
Data processing
Interface
The Internet of Things (IoT) is defined by several key characteristics that enable its
widespread functionality and impact:
Bluetooth Low Energy (BLE): Wireless technology for low-power IoT devices.
Wi-Fi: Wireless technology for IoT devices needing high data transfer rates.
Embedded Sensors and Actuators: These are essential for IoT devices to
interact with their environment. Sensors detect changes (temperature, light),
while actuators perform actions based on collected data (turning on lights,
controlling motors).
Autonomous Operation: IoT devices and systems can function independently
and make decisions without direct human intervention, leveraging AI and
machine learning for tasks like home automation and self-healing networks.
Data-Driven: IoT generates vast amounts of data from sensors and other
sources. This data is analyzed to drive improvements in efficiency, performance,
and user experience, enabling informed decisions (e.g., predictive maintenance).
Ubiquity: IoT devices and systems are pervasive, aiming to create a seamless,
interconnected world where devices can communicate transparently and be
accessed from anywhere.
Context Awareness: IoT devices understand and respond to their environment
and context (e.g., adjusting room settings based on time of day or presence of
people), leading to more relevant information and services and optimizing data
transmission.
APPLICATIONS:
Hospitality: IoT sensors monitor indoor air quality (IAQ) to adjust HVAC
systems, track wastewater quality, detect water leaks, optimize waste collection
via smart bins, and manage noise levels for guest comfort and health.
Healthcare: IoT is vital for infection control by monitoring and automating IAQ in
critical areas (e.g., operating rooms) to control airborne contaminants. It also
ensures potable water safety, tracks hazardous medical waste, maintains precise
temperature/humidity for sensitive materials, and helps reduce noise for patient
healing.
In essence, IoT's ability to collect and analyze real-time data drives efficiency, reduces
costs, and enhances safety and environmental sustainability across diverse
environments.
IOT DEVICES :
IoT devices are essentially "smart objects" that connect to the internet to collect and
exchange data, enabling automation, real-time monitoring, and data-driven insights.1
They are categorized by their primary functions within the IoT ecosystem:
1. Sensors: These are the "eyes and ears" of IoT, detecting physical parameters
from the environment and converting them into data. 2 Examples include
temperature, humidity, motion, light, pressure, gas, vibration, and GPS sensors,
used in applications from smart homes to industrial monitoring and smart
farming.
2. Actuators: These are the "muscles" of IoT, performing physical actions based on
commands received from the IoT system.3 Examples include smart light bulbs,
thermostats, locks, motors, pumps, and solenoids, which enable control and
automation in various environments.4
3. End-User / Consumer IoT Devices: These are the common smart gadgets
consumers interact with directly. They often integrate both sensors and
sometimes actuators.5 Examples include smartphones (often acting as control
hubs or basic gateways), wearables (smartwatches, fitness trackers), smart
speakers, smart appliances (refrigerators, washing machines), smart TVs, and
smart security cameras.6
4. IoT Gateways: These devices act as a crucial bridge, connecting local IoT
devices to the broader internet or cloud.7 They gather data from multiple devices,
translate communication protocols if necessary, perform local data processing
(edge computing) and filtering, and securely transmit data to the cloud. 8 They are
vital for scalability, security, and efficient data flow within the IoT architecture.
5. Cloud Platforms / Servers: While not physical devices, the cloud infrastructure
is a fundamental component of IoT.9 It provides the necessary storage,
processing power, and analytical tools to manage vast amounts of IoT data, offer
device management services, perform advanced analytics, and host IoT
applications.10
6. Edge Devices (for Edge Computing): These are processing units located
closer to the source of the data (the IoT devices themselves). 11 They enable real-
time data analysis, filtering, and decision-making locally, reducing latency,
bandwidth usage, and reliance on constant cloud connectivity. Edge devices can
be integrated into gateways or function as specialized computing units. 12
o Samsung Gear Fit (and similar fitness bands): These wrist-worn smart
fitness bands exemplify consumer IoT.16 They incorporate various
sensors (e.g., accelerometer for movement, gyro sensor for orientation,
optical heart rate sensor for vital signs, light sensor) and use Bluetooth
Low Energy (BLE) for power-efficient wireless communication with
smartphones, enabling data synchronization and notifications. 17
Bluetooth IoT Devices: This refers to any IoT device that uses Bluetooth or,
more commonly, Bluetooth Low Energy (BLE) for communication.18 BLE is
highly valued in IoT due to its extremely low power consumption, making it ideal
for battery-operated devices like wearables, smart home sensors, and certain
medical devices for short-range data exchange.19
In essence, IoT devices encompass a diverse range of hardware, from basic sensors to
complex, interconnected machines and personal gadgets, all working together to
collect, process, and act upon data to create smarter, more efficient environments. 20
Characteristics:
Asynchronous: Publishers and subscribers are decoupled; they
don't need to be aware of each other's existence or directly
communicate.
o Characteristics:
The choice of communication model and underlying protocols in an IoT system depends
on various factors such as latency requirements, data volume, power consumption
constraints, scalability needs, security considerations, and network topology.
Device management
Data handling
Security
These functions simplify development by hiding the complexity of device
communication, similar to how an operating system simplifies application development
on computers. Essentially, oneM2M acts like an OS for IoT, enabling seamless
integration and communication across diverse devices and platforms.
Security: Provide robust security mechanisms for data and device access.
The oneM2M architecture is structured into three logical layers to ensure interoperability
and simplify IoT development:
1. Application Layer
This top layer contains Application Entities (AEs), which are the user-facing IoT
applications like smart home apps or industrial control systems. AEs leverage the lower
layers for their specific use cases.
This is the central part of oneM2M. It features Common Service Entities (CSEs) that
host Common Service Functions (CSFs). CSEs can be deployed in various locations:
CSFs provide reusable, generic functionalities essential for IoT, such as Data
Management, Device Management, Security & Access Control, Communication
Management, Discovery, Subscription & Notification, and Group Management.
3. Network Layer
The bottom layer, composed of Network Service Entities (NSEs), provides the
underlying communication infrastructure like Wi-Fi, cellular, or LoRaWAN. oneM2M is
network-agnostic, meaning it can operate over any of these technologies, with NSEs
simply providing the connectivity.
This layered approach, along with defined interfaces, creates a standardized and
flexible framework for the diverse IoT ecosystem.
.
Key Elements and Their Interactions:
AE (Application Entity): The software application logic that runs the IoT use
case.
CSE (Common Service Entity): The oneM2M "server" that provides the
common services. It can be physically located in the cloud (IN-CSE), on a
gateway (MN-CSE), or directly on an end device (ASN-CSE).
NSE (Network Service Entity): The underlying network infrastructure that
provides connectivity.
Reference Points (Interfaces):
Mca: Interface between an Application Entity (AE) and a Common Service Entity
(CSE). This is how IoT applications interact with the oneM2M platform to access
its services (e.g., requesting sensor data, sending control commands).
Mcc: Interface between two Common Service Entities (CSEs). This enables
communication and data exchange between different parts of a oneM2M
deployment, for example, a gateway CSE communicating with a cloud CSE.
Mcn: Interface between a Common Service Entity (CSE) and a Network Service
Entity (NSE). This allows the oneM2M service layer to leverage the underlying
network's capabilities for data transport.
By standardizing these layers and interfaces, oneM2M aims to create a robust, flexible,
and interoperable foundation for the diverse and rapidly evolving world of IoT.
The IoT data management and compute stack is a multi-layered system designed to
handle the vast amounts of data generated by IoT devices, from collection to analysis,
enabling intelligent actions.
This stack covers the entire data lifecycle, ensuring data is accurate, secure, and
valuable.
1. Data Ingestion (Collection & Transport): This initial phase gathers data from
devices. It uses methods like streaming (for real-time needs via message
queues like Kafka), batch (for less time-sensitive, larger data chunks), and
micro-batch (a hybrid for near real-time). Common protocols include MQTT,
CoAP, and HTTP/HTTPS, chosen based on device constraints and data volume.
Challenges include managing data volume, velocity, variety, and intermittent
connectivity.
2. Data Pre-processing (Edge/Gateway Processing): Raw data is cleaned,
filtered, aggregated, and transformed at the edge (on gateways or edge
devices) before being sent to the cloud. This reduces bandwidth, latency, and
cloud processing load by discarding irrelevant data, summarizing readings,
standardizing formats, and correcting errors.
3. Data Storage: Processed and raw data are persisted for analysis, compliance,
and historical reference. Storage types vary: on-device for temporary caching,
edge storage on gateways for short-term local access, and cloud storage for
scalable, long-term retention. Cloud storage is further categorized into hot
(frequently accessed, real-time data like time-series databases), warm (less
frequent access), and cold (archival, low-cost data). Considerations include data
characteristics, cost, and compliance.
4. Data Processing & Analytics: This stage transforms data into actionable
insights using various analytical techniques:
o Descriptive: What happened?
Tools include big data frameworks (Apache Spark), ML platforms, and BI tools.
5. Data Visualization & Reporting: Analyzed data is presented through
dashboards, reports, and alerts for human decision-making.
6. Security and Privacy: Crucial across all layers, this involves data encryption
(at rest and in transit), access control, data masking/anonymization (for
privacy), anomaly detection (for breaches or malfunctions), and secure device
management.
This stack defines where data processing and analysis occur, primarily leveraging edge
computing and cloud computing.
Modern IoT often uses a hybrid approach, combining edge and cloud computing. The
edge handles immediate, time-sensitive, and localized data processing, acting as a first
filter. The cloud manages large-scale storage, complex analytics, and provides global
insights. This synergy optimizes performance, cost, security, and reliability, delivering
both real-time actions and comprehensive strategic analysis.
IoT security is paramount because the interconnected nature of IoT devices, while
offering immense convenience and efficiency, also introduces a massive attack surface
that can have severe real-world consequences if compromised. Unlike traditional IT
systems, IoT devices often interact directly with the physical world, meaning security
breaches can extend beyond data theft to cause physical damage, endanger lives, and
disrupt critical infrastructure.
IoT devices collect vast amounts of data, often highly personal or sensitive, from users
and environments. A breach can expose this information, leading to severe privacy
violations and financial harm.
Example: A compromised smart home security camera or smart baby
monitor could allow unauthorized individuals to spy on private spaces,
potentially leading to stalking, theft, or blackmail. In 2021, the Verkada hack
exposed live feeds from over 150,000 security cameras in businesses, schools,
and hospitals, demonstrating how easily private footage can be accessed if
security is lax. Similarly, images from iRobot Roomba vacuums with built-in
cameras have reportedly surfaced online, raising serious privacy concerns about
data collected within homes.
2. Preventing Cyberattacks and Botnets
Many IoT devices are built with minimal security features, default passwords, or
unpatched vulnerabilities, making them easy targets for cybercriminals. Once
compromised, these devices can be recruited into massive botnets to launch
devastating attacks.
Example: The Mirai botnet (2016) famously leveraged insecure IoT devices
(like DVRs and IP cameras) with default credentials to launch Distributed Denial
of Service (DDoS) attacks. One attack brought down major websites like Netflix,
Twitter, and Reddit, demonstrating how a vast network of insecure IoT devices
can cripple the internet. These devices often have limited processing power
individually, but collectively, they can overwhelm targets with traffic.
3. Safeguarding Critical Infrastructure
For manufacturers and service providers, a security incident can severely damage their
brand reputation and erode consumer trust, leading to loss of market share and legal
liabilities.
Example: If a smart appliance manufacturer experiences a widespread security
vulnerability that allows hackers to compromise devices in people's homes,
consumers will lose trust in the brand. The negative publicity and potential
lawsuits can have long-lasting effects on the company's viability. Conversely,
companies that prioritize security can differentiate themselves and build stronger
customer loyalty.
6. Compliance with Regulations
In summary, IoT security is not merely about protecting data; it's about safeguarding
physical safety, critical infrastructure, financial stability, and fundamental privacy in an
increasingly interconnected world. The consequences of overlooking IoT security range
from minor inconveniences to life-threatening scenarios and widespread economic
disruption.
why iot security is important explain with example :
IoT security is crucial because the vast interconnectedness of IoT devices creates a
large attack surface, leading to severe real-world consequences, including physical
harm and critical infrastructure disruption, beyond just data theft.
In essence, IoT security goes beyond data; it's about safeguarding physical safety,
critical infrastructure, financial stability, and fundamental privacy. Overlooking it can lead
to consequences ranging from minor issues to life-threatening scenarios and
widespread economic disruption.
✅ Summary: Why IoT Security is Important (with Examples)
IoT security is essential because IoT devices are deeply integrated into both digital and physical worlds. Unlike
traditional systems, IoT devices can cause real-world harm if compromised — affecting personal privacy, critical
infrastructure, safety, and economy.
Example:
🔍 Verkada camera hack exposed live feeds from hospitals and offices.
📷 Roomba cameras leaked private home images online.
Example:
🌐 Mirai botnet (2016) hijacked IoT devices to take down websites like Netflix and Twitter with DDoS attacks.
Example:
🔥 Finland heating hack disabled heating in buildings via IoT system.
🚗 Jeep Cherokee hack allowed remote control of a car.
💥 Stuxnet worm disrupted Iran’s nuclear facilities.
Attacks can halt operations, cause data loss, or lead to ransomware demands.
Example:
🏭 Industrial IoT breach could stop factory lines, costing millions.
🖨️ Even smart printers or lights can be exploited to access networks.
Example:
📉 A smart appliance company with poor security risks customer trust, lawsuits, and market share loss.
IoT systems must follow privacy and security laws (e.g., GDPR, HIPAA).
Example:
🏥 Healthcare devices that leak patient data can result in huge fines and legal action.
📌 In Summary:
🔐 Privacy
⚠️ Physical safety
💼 Business operations
🏛️ Critical infrastructure
🌍 Societal trust
Neglecting IoT security can lead to life-threatening consequences, massive losses, and public distrust.
Sensors are devices that detect and respond to changes in their environment,
converting physical changes (like light, temperature, or motion) into measurable signals.
They are crucial in IoT for collecting and processing data, bridging the gap between the
physical and digital worlds.
Classification of Sensors
Our daily lives are filled with various sensors that simplify tasks. Here are some key
types:
Temperature Sensors: Monitoring temperature of used devices in industrial
applications. They are used to measure temperature (air, liquid, solid) and can be
analog (e.g., LM35) or digital (e.g., DS1621).
Accelerometer Sensors: Measure the rate of change of velocity and
acceleration (e.g., ADXL335 for 3-axis values), used in car electronics, ships, and
agricultural machines.
Alcohol Sensors: Detect alcohol, commonly found in breathalyzer devices, used
by law enforcement.
Radiation Sensors: Detect the presence of alpha, beta, or gamma particles,
providing signals to counters and display devices.
Position Sensors: Electronic devices used to sense the positions of valves,
doors, throttles, etc., providing signals to control or display devices (e.g., string
potentiometers).
Gas Sensors: Measure and detect the concentration of different gases present
in the atmosphere or any other environment.
Torque Sensors: Used for measuring rotating torque and the speed of rotation.
Optical Sensors (Photosensors / Light Sensors): Detect light waves at
different points in the light spectrum, including ultraviolet, visible, and infrared
light. They are extensively used in smartphones, robotics, and Blu-ray players.
Proximity Sensors: Detect the distance between two objects or the presence of
an object, used in elevators, parking lots, automobiles, and robotics.
Touch Sensors: Detect physical contact on a monitored surface, used
extensively in electronic devices for trackpad and touchscreen technologies, as
well as in elevators, robotics, and soap dispensers.
Image Sensors: Used for distance measurement, pattern matching, color
checking, structured lighting, and motion capture, with applications in 3D
imaging, video/broadcast, security, automotive, and medical fields.
Electrical Sensors: A broad category of sensors that detect and measure
various electrical quantities such as voltage, current, resistance, and
capacitance. They are fundamental in electronic circuits and power systems for
monitoring and control.
Torch Sensors: While not a standalone sensor category, this likely refers to
specialized optical or light sensors integrated into a torch (flashlight) for
functionalities like automatic brightness adjustment based on ambient light or
detecting specific light patterns.
Mechanical Sensors: These sensors respond to physical changes like force,
pressure, displacement, strain, and vibration. Examples include strain gauges,
pressure sensors, and accelerometers (which can also be categorized as
mechanical due to their response to physical motion).
Speed Sensors: Measure the rate at which an object is moving. These can be
based on various principles, including rotational speed (like in torque sensors),
vehicle speed, or linear speed, often used in automotive, industrial machinery,
and transportation systems.
Applications of Sensors