SlideShare a Scribd company logo
1 of 15
Internet of Things
Amala Putrevu D018
Sameeksha Trivedi D055
Introduction
 "In the next century, planet earth will don an electronic skin. It will use the Internet as a
scaffold to support and transmit its sensations."- Neil Gross, 1999
 In a recent study, the researchers have predicted that the Internet will double in size every
5.32 years
 By 2020, 20 billion devices will be in use in the world [0]
Concept
 The Internet of Things is an emerging global Internet-based technical architecture
facilitating the exchange of goods in a global supply-chain network.[1]
 Rapid advancement in technology in just 21 years
 IPv6 communication
 Protocol for M2M communication
 Smart sensors
 Cloud storage
 Sophisticated algorithms via machine learning
Aims & Objectives
 To assimilate the concept of IoT
 To dejargonise the terms of IoT
 To familiarize with devices and technologies that can be employed to realize IoT
 To gauge the potential of IoT, focusing on the 'home automation and security' space
 To analyze the threats and challenges associated with it
Applications
 Smart cities
 Smart environment
 Smart metering
 Security and emergencies
 Retail
 Industrial control
 Home automation
 Health
Area of focus
 Home automation & security
 Smart Appliances
 Everyday processes: automated
 Temperature, humidity and quality controlled environment
 Security from thefts and attacks
 Safety for all family members
Home automation & Security
 A “smart home” can be defined as a residence equipped with computing and
information technology which anticipates and responds to the need of its
occupants, working to promote their comfort, convenience, security and entertainment
through the management of technology within the home and connections to the world
beyond. [2]
Home automation & security
 Internet of things can be used to bolster home security by using devices that monitor
unexpected movement, thermal radiations and unwarranted entry. [3]
Examples of Smart Home Devices
Challenges and Threats
 Connectivity challenges (Bluetooth, WiFi, ZigBee) [4]
 Security concerns (thingbots) [5]
 Data theft [6]
 Data generation & storage [7]
 Energy challenges [8]
Conclusion
 We must expand smart- object design beyond hardware and software to include
interaction design as well as social aspects. [9]6
 Building applications with RFID data in the IoT is challenging, not just because TREs provide
only low-level information but also because the metadata associated with
tags, antennas, and events must be personalized and carefully controlled to create a
safe, meaningful user experience. [10]
 With the emergence of an Internet of things, new regulatory approaches to ensure its
privacy and security become necessary.[11]
Citations
[0] Zhang, Guo-Qing; Zhang, Guo-Qiang; Yang, Qing-Feng; Cheng, Su-Qi; and Zhou, Tao. “Evolution of the Internet and
its Cores.” New Journal of Physics 10 (2008) 123027
[1]R. H. Weber, "Internet of Things - New Security and Privacy Challenges", Computer Law & Security Review 26 (2010),
Elsevier ScienceDirect
[2] Frances K. Aldrich, “Smart Homes: past, present and future”, Inside the Smart Home 2003, Springer
[3]G. Kortuem et al, "Smart Objects as building blocks of Internet of things", IEEE Internet Computing Jan/Feb 2010, IEEE
Computer Society
[4][5]Liu, Jing, Yang Xiao, and CL Philip Chen. "Authentication and Access Control in the Internet of Things." ICDCS
Workshops. 2012., IEEE Computer Society
[6][7][8]Roman, Rodrigo, Pablo Najera, and Javier Lopez. "Securing the internet of things." Computer 44.9 (2011): 51-58.
[9]K. Ashton, "The Internet of Things' thing", RFID Journal June 2009
[10]E. Welbourne et al, "Building the Internet of Things using RFID", IEEE Internet Computing May/June 2009, IEEE
Computer Society
[11]A. Sarma et al, "Identities in the future Internet of Things", Wireless Personal Communications: An International Journal,
May 2009, ACM Digital Library& more

More Related Content

What's hot

Presentation on Internet of Things
Presentation on Internet of ThingsPresentation on Internet of Things
Presentation on Internet of ThingsPranay Prabhat
 
IoT - IT 423 ppt
IoT - IT 423 pptIoT - IT 423 ppt
IoT - IT 423 pptMhae Lyn
 
The internet of things.pptx
The internet of things.pptxThe internet of things.pptx
The internet of things.pptxLamisaFaria
 
Internet of Things - IoT
Internet of Things - IoTInternet of Things - IoT
Internet of Things - IoTFarjad Noor
 
Internet of Things - Lu, Ralph
Internet of Things - Lu, RalphInternet of Things - Lu, Ralph
Internet of Things - Lu, Ralphralphlu
 
Technical Challenges - How To Design IoT Systems
Technical Challenges - How To Design IoT SystemsTechnical Challenges - How To Design IoT Systems
Technical Challenges - How To Design IoT SystemsEmil Kirilov
 
Internet of Things Overview
Internet of Things OverviewInternet of Things Overview
Internet of Things OverviewRomin Irani
 
Iot amey p naik
Iot amey p naikIot amey p naik
Iot amey p naikAmey Naik
 
Internet of Things: A Hands-On Approach paperback$@@
 Internet of Things: A Hands-On Approach paperback$@@ Internet of Things: A Hands-On Approach paperback$@@
Internet of Things: A Hands-On Approach paperback$@@loho454
 
Internet of Things: A Hands-On Approach
Internet of Things: A Hands-On ApproachInternet of Things: A Hands-On Approach
Internet of Things: A Hands-On ApproachArshdeep Bahga
 
A basic PPT on Internet Of Things(IOT)
A basic PPT on Internet Of Things(IOT)A basic PPT on Internet Of Things(IOT)
A basic PPT on Internet Of Things(IOT)jaswinder singh thind
 
Internet of Things IoT
Internet of Things IoTInternet of Things IoT
Internet of Things IoTFURQAN M LODHI
 
Internet of Things Iot presentation with module
Internet of Things Iot presentation with moduleInternet of Things Iot presentation with module
Internet of Things Iot presentation with moduleIsp university Multan
 
IoT Enabling Technologies
IoT Enabling TechnologiesIoT Enabling Technologies
IoT Enabling TechnologiesPrakash Honnur
 

What's hot (20)

Presentation on Internet of Things
Presentation on Internet of ThingsPresentation on Internet of Things
Presentation on Internet of Things
 
10 min IoT ppt
10 min IoT ppt10 min IoT ppt
10 min IoT ppt
 
IoT - IT 423 ppt
IoT - IT 423 pptIoT - IT 423 ppt
IoT - IT 423 ppt
 
The internet of things.pptx
The internet of things.pptxThe internet of things.pptx
The internet of things.pptx
 
Internet of Things - IoT
Internet of Things - IoTInternet of Things - IoT
Internet of Things - IoT
 
Internet of Things - Lu, Ralph
Internet of Things - Lu, RalphInternet of Things - Lu, Ralph
Internet of Things - Lu, Ralph
 
Technical Challenges - How To Design IoT Systems
Technical Challenges - How To Design IoT SystemsTechnical Challenges - How To Design IoT Systems
Technical Challenges - How To Design IoT Systems
 
Internet of Things Overview
Internet of Things OverviewInternet of Things Overview
Internet of Things Overview
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Iot amey p naik
Iot amey p naikIot amey p naik
Iot amey p naik
 
Internet of Things: A Hands-On Approach paperback$@@
 Internet of Things: A Hands-On Approach paperback$@@ Internet of Things: A Hands-On Approach paperback$@@
Internet of Things: A Hands-On Approach paperback$@@
 
Internet of things ppt
Internet of things pptInternet of things ppt
Internet of things ppt
 
Iot
IotIot
Iot
 
Internet of Things: A Hands-On Approach
Internet of Things: A Hands-On ApproachInternet of Things: A Hands-On Approach
Internet of Things: A Hands-On Approach
 
A basic PPT on Internet Of Things(IOT)
A basic PPT on Internet Of Things(IOT)A basic PPT on Internet Of Things(IOT)
A basic PPT on Internet Of Things(IOT)
 
Internet of Things IoT
Internet of Things IoTInternet of Things IoT
Internet of Things IoT
 
Introduction to io_t
Introduction to io_tIntroduction to io_t
Introduction to io_t
 
Internet of Things Iot presentation with module
Internet of Things Iot presentation with moduleInternet of Things Iot presentation with module
Internet of Things Iot presentation with module
 
IoT Enabling Technologies
IoT Enabling TechnologiesIoT Enabling Technologies
IoT Enabling Technologies
 

Viewers also liked

TCUK 2013 - Don't manage: lead
TCUK 2013 - Don't manage: leadTCUK 2013 - Don't manage: lead
TCUK 2013 - Don't manage: leadTCUK Conference
 
I International Workshop RFID and IoT - Dia 20 - RFID Radio Regulations and I...
I International Workshop RFID and IoT - Dia 20 - RFID Radio Regulations and I...I International Workshop RFID and IoT - Dia 20 - RFID Radio Regulations and I...
I International Workshop RFID and IoT - Dia 20 - RFID Radio Regulations and I...CPqD
 
Internet of Things, Quantified Self and Smart Cities in the context of Singul...
Internet of Things, Quantified Self and Smart Cities in the context of Singul...Internet of Things, Quantified Self and Smart Cities in the context of Singul...
Internet of Things, Quantified Self and Smart Cities in the context of Singul...Yuri van Geest
 
Tutorial on IEEE 802.15.4e standard
Tutorial on IEEE 802.15.4e standardTutorial on IEEE 802.15.4e standard
Tutorial on IEEE 802.15.4e standardGiuseppe Anastasi
 
Best Practices for Marketing IoT and RFID Technology
Best Practices for Marketing IoT and RFID Technology Best Practices for Marketing IoT and RFID Technology
Best Practices for Marketing IoT and RFID Technology Kelly Stark
 
Slide bài giảng về lập trình Scratch dành cho GV
Slide bài giảng về lập trình Scratch dành cho GVSlide bài giảng về lập trình Scratch dành cho GV
Slide bài giảng về lập trình Scratch dành cho GVBùi Việt Hà
 
Internet of Things (IoT) and Connected Cars - Patent Landscape Highlighting T...
Internet of Things (IoT) and Connected Cars - Patent Landscape Highlighting T...Internet of Things (IoT) and Connected Cars - Patent Landscape Highlighting T...
Internet of Things (IoT) and Connected Cars - Patent Landscape Highlighting T...Rahul Dev
 
Internet of Things and its Enabling Technologies - RFID
Internet of Things  and its Enabling Technologies - RFIDInternet of Things  and its Enabling Technologies - RFID
Internet of Things and its Enabling Technologies - RFIDSwetha Kogatam
 
RFID Technology and Internet of Things
RFID Technology and Internet of ThingsRFID Technology and Internet of Things
RFID Technology and Internet of ThingsDmitri Shiryaev
 
Digital Statistics 2014 - India
Digital Statistics 2014 - IndiaDigital Statistics 2014 - India
Digital Statistics 2014 - IndiaIdeateLabs
 
What Would Steve Do? Lessons from the World's Most Captivating Presenters
What Would Steve Do? Lessons from the World's Most Captivating PresentersWhat Would Steve Do? Lessons from the World's Most Captivating Presenters
What Would Steve Do? Lessons from the World's Most Captivating PresentersMartafy!
 
What is the Internet of Things?
What is the Internet of Things?What is the Internet of Things?
What is the Internet of Things?Felix Grovit
 
20 Facebook, Twitter, Linkedin & Pinterest Features You Didn't Know Existed (...
20 Facebook, Twitter, Linkedin & Pinterest Features You Didn't Know Existed (...20 Facebook, Twitter, Linkedin & Pinterest Features You Didn't Know Existed (...
20 Facebook, Twitter, Linkedin & Pinterest Features You Didn't Know Existed (...HubSpot
 
Simulation of Wireless Communication Systems
Simulation of Wireless Communication SystemsSimulation of Wireless Communication Systems
Simulation of Wireless Communication SystemsBernd-Peter Paris
 
THE INTERNET OF THINGS
THE INTERNET OF THINGSTHE INTERNET OF THINGS
THE INTERNET OF THINGSRamana Reddy
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applicationsPasquale Puzio
 

Viewers also liked (20)

TCUK 2013 - Don't manage: lead
TCUK 2013 - Don't manage: leadTCUK 2013 - Don't manage: lead
TCUK 2013 - Don't manage: lead
 
WoT Tutorial @ Cisco
WoT Tutorial @ CiscoWoT Tutorial @ Cisco
WoT Tutorial @ Cisco
 
Electronic of things_Final Presentation
Electronic of things_Final PresentationElectronic of things_Final Presentation
Electronic of things_Final Presentation
 
I International Workshop RFID and IoT - Dia 20 - RFID Radio Regulations and I...
I International Workshop RFID and IoT - Dia 20 - RFID Radio Regulations and I...I International Workshop RFID and IoT - Dia 20 - RFID Radio Regulations and I...
I International Workshop RFID and IoT - Dia 20 - RFID Radio Regulations and I...
 
Internet of Things, Quantified Self and Smart Cities in the context of Singul...
Internet of Things, Quantified Self and Smart Cities in the context of Singul...Internet of Things, Quantified Self and Smart Cities in the context of Singul...
Internet of Things, Quantified Self and Smart Cities in the context of Singul...
 
Tutorial on IEEE 802.15.4e standard
Tutorial on IEEE 802.15.4e standardTutorial on IEEE 802.15.4e standard
Tutorial on IEEE 802.15.4e standard
 
Best Practices for Marketing IoT and RFID Technology
Best Practices for Marketing IoT and RFID Technology Best Practices for Marketing IoT and RFID Technology
Best Practices for Marketing IoT and RFID Technology
 
Slide bài giảng về lập trình Scratch dành cho GV
Slide bài giảng về lập trình Scratch dành cho GVSlide bài giảng về lập trình Scratch dành cho GV
Slide bài giảng về lập trình Scratch dành cho GV
 
Internet of Things (IoT) and Connected Cars - Patent Landscape Highlighting T...
Internet of Things (IoT) and Connected Cars - Patent Landscape Highlighting T...Internet of Things (IoT) and Connected Cars - Patent Landscape Highlighting T...
Internet of Things (IoT) and Connected Cars - Patent Landscape Highlighting T...
 
Internet of things (IoT) Patents | Internet of things (IoT) based Systems & M...
Internet of things (IoT) Patents | Internet of things (IoT) based Systems & M...Internet of things (IoT) Patents | Internet of things (IoT) based Systems & M...
Internet of things (IoT) Patents | Internet of things (IoT) based Systems & M...
 
RFID with INTERNET OF THINGS
RFID with INTERNET OF THINGSRFID with INTERNET OF THINGS
RFID with INTERNET OF THINGS
 
Internet of Things and its Enabling Technologies - RFID
Internet of Things  and its Enabling Technologies - RFIDInternet of Things  and its Enabling Technologies - RFID
Internet of Things and its Enabling Technologies - RFID
 
RFID Technology and Internet of Things
RFID Technology and Internet of ThingsRFID Technology and Internet of Things
RFID Technology and Internet of Things
 
Digital Statistics 2014 - India
Digital Statistics 2014 - IndiaDigital Statistics 2014 - India
Digital Statistics 2014 - India
 
What Would Steve Do? Lessons from the World's Most Captivating Presenters
What Would Steve Do? Lessons from the World's Most Captivating PresentersWhat Would Steve Do? Lessons from the World's Most Captivating Presenters
What Would Steve Do? Lessons from the World's Most Captivating Presenters
 
What is the Internet of Things?
What is the Internet of Things?What is the Internet of Things?
What is the Internet of Things?
 
20 Facebook, Twitter, Linkedin & Pinterest Features You Didn't Know Existed (...
20 Facebook, Twitter, Linkedin & Pinterest Features You Didn't Know Existed (...20 Facebook, Twitter, Linkedin & Pinterest Features You Didn't Know Existed (...
20 Facebook, Twitter, Linkedin & Pinterest Features You Didn't Know Existed (...
 
Simulation of Wireless Communication Systems
Simulation of Wireless Communication SystemsSimulation of Wireless Communication Systems
Simulation of Wireless Communication Systems
 
THE INTERNET OF THINGS
THE INTERNET OF THINGSTHE INTERNET OF THINGS
THE INTERNET OF THINGS
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
 

Similar to Internet of things: A beginners' guide

Overview of internet of things (IoT) the new upcoming technology in hand
Overview of internet of things (IoT) the new upcoming technology in handOverview of internet of things (IoT) the new upcoming technology in hand
Overview of internet of things (IoT) the new upcoming technology in handRanjith P
 
CICS: Cloud–Internet Communication Security Framework for the Internet of Sma...
CICS: Cloud–Internet Communication Security Framework for the Internet of Sma...CICS: Cloud–Internet Communication Security Framework for the Internet of Sma...
CICS: Cloud–Internet Communication Security Framework for the Internet of Sma...AlAtfat
 
Cyber Security and the Internet of ThingsVulnerabilities, T.docx
Cyber Security and the Internet of ThingsVulnerabilities, T.docxCyber Security and the Internet of ThingsVulnerabilities, T.docx
Cyber Security and the Internet of ThingsVulnerabilities, T.docxdorishigh
 
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Eswar Publications
 
76 s201918
76 s20191876 s201918
76 s201918IJRAT
 
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...IJECEIAES
 
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Scientific Review SR
 
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...DESMOND YUEN
 
A Study on Internet of Things
A Study on Internet of ThingsA Study on Internet of Things
A Study on Internet of ThingsIRJET Journal
 
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoT
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoTA STUDY ON SECURITY ISSUES AND CHALLENGES IN IoT
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoTDaniel Wachtel
 
Io t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsIo t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsShyam Goyal
 
The Internet of Things (IoT): An Overview
The Internet of Things (IoT): An OverviewThe Internet of Things (IoT): An Overview
The Internet of Things (IoT): An OverviewIJERA Editor
 
A survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusA survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusvivatechijri
 
Internet of things: review, architecture and applications
Internet of things: review, architecture and applicationsInternet of things: review, architecture and applications
Internet of things: review, architecture and applicationsCSITiaesprime
 
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUESCAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUESIJNSA Journal
 
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxINTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxvrickens
 
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...IRJET Journal
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSIJNSA Journal
 

Similar to Internet of things: A beginners' guide (20)

Overview of internet of things (IoT) the new upcoming technology in hand
Overview of internet of things (IoT) the new upcoming technology in handOverview of internet of things (IoT) the new upcoming technology in hand
Overview of internet of things (IoT) the new upcoming technology in hand
 
CICS: Cloud–Internet Communication Security Framework for the Internet of Sma...
CICS: Cloud–Internet Communication Security Framework for the Internet of Sma...CICS: Cloud–Internet Communication Security Framework for the Internet of Sma...
CICS: Cloud–Internet Communication Security Framework for the Internet of Sma...
 
Cyber Security and the Internet of ThingsVulnerabilities, T.docx
Cyber Security and the Internet of ThingsVulnerabilities, T.docxCyber Security and the Internet of ThingsVulnerabilities, T.docx
Cyber Security and the Internet of ThingsVulnerabilities, T.docx
 
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
 
76 s201918
76 s20191876 s201918
76 s201918
 
Internet of Things Forensics
Internet of Things ForensicsInternet of Things Forensics
Internet of Things Forensics
 
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
 
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
 
IoT Intro.pptx
IoT Intro.pptxIoT Intro.pptx
IoT Intro.pptx
 
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
 
A Study on Internet of Things
A Study on Internet of ThingsA Study on Internet of Things
A Study on Internet of Things
 
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoT
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoTA STUDY ON SECURITY ISSUES AND CHALLENGES IN IoT
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoT
 
Io t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsIo t security_review_blockchain_solutions
Io t security_review_blockchain_solutions
 
The Internet of Things (IoT): An Overview
The Internet of Things (IoT): An OverviewThe Internet of Things (IoT): An Overview
The Internet of Things (IoT): An Overview
 
A survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusA survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current status
 
Internet of things: review, architecture and applications
Internet of things: review, architecture and applicationsInternet of things: review, architecture and applications
Internet of things: review, architecture and applications
 
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUESCAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
 
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxINTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
 
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
 

Recently uploaded

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 

Recently uploaded (20)

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 

Internet of things: A beginners' guide

  • 1. Internet of Things Amala Putrevu D018 Sameeksha Trivedi D055
  • 2. Introduction  "In the next century, planet earth will don an electronic skin. It will use the Internet as a scaffold to support and transmit its sensations."- Neil Gross, 1999  In a recent study, the researchers have predicted that the Internet will double in size every 5.32 years  By 2020, 20 billion devices will be in use in the world [0]
  • 3. Concept  The Internet of Things is an emerging global Internet-based technical architecture facilitating the exchange of goods in a global supply-chain network.[1]  Rapid advancement in technology in just 21 years  IPv6 communication  Protocol for M2M communication  Smart sensors  Cloud storage  Sophisticated algorithms via machine learning
  • 4.
  • 5. Aims & Objectives  To assimilate the concept of IoT  To dejargonise the terms of IoT  To familiarize with devices and technologies that can be employed to realize IoT  To gauge the potential of IoT, focusing on the 'home automation and security' space  To analyze the threats and challenges associated with it
  • 6. Applications  Smart cities  Smart environment  Smart metering  Security and emergencies  Retail  Industrial control  Home automation  Health
  • 7. Area of focus  Home automation & security  Smart Appliances  Everyday processes: automated  Temperature, humidity and quality controlled environment  Security from thefts and attacks  Safety for all family members
  • 8.
  • 9. Home automation & Security  A “smart home” can be defined as a residence equipped with computing and information technology which anticipates and responds to the need of its occupants, working to promote their comfort, convenience, security and entertainment through the management of technology within the home and connections to the world beyond. [2]
  • 10. Home automation & security  Internet of things can be used to bolster home security by using devices that monitor unexpected movement, thermal radiations and unwarranted entry. [3]
  • 11. Examples of Smart Home Devices
  • 12. Challenges and Threats  Connectivity challenges (Bluetooth, WiFi, ZigBee) [4]  Security concerns (thingbots) [5]  Data theft [6]  Data generation & storage [7]  Energy challenges [8]
  • 13.
  • 14. Conclusion  We must expand smart- object design beyond hardware and software to include interaction design as well as social aspects. [9]6  Building applications with RFID data in the IoT is challenging, not just because TREs provide only low-level information but also because the metadata associated with tags, antennas, and events must be personalized and carefully controlled to create a safe, meaningful user experience. [10]  With the emergence of an Internet of things, new regulatory approaches to ensure its privacy and security become necessary.[11]
  • 15. Citations [0] Zhang, Guo-Qing; Zhang, Guo-Qiang; Yang, Qing-Feng; Cheng, Su-Qi; and Zhou, Tao. “Evolution of the Internet and its Cores.” New Journal of Physics 10 (2008) 123027 [1]R. H. Weber, "Internet of Things - New Security and Privacy Challenges", Computer Law & Security Review 26 (2010), Elsevier ScienceDirect [2] Frances K. Aldrich, “Smart Homes: past, present and future”, Inside the Smart Home 2003, Springer [3]G. Kortuem et al, "Smart Objects as building blocks of Internet of things", IEEE Internet Computing Jan/Feb 2010, IEEE Computer Society [4][5]Liu, Jing, Yang Xiao, and CL Philip Chen. "Authentication and Access Control in the Internet of Things." ICDCS Workshops. 2012., IEEE Computer Society [6][7][8]Roman, Rodrigo, Pablo Najera, and Javier Lopez. "Securing the internet of things." Computer 44.9 (2011): 51-58. [9]K. Ashton, "The Internet of Things' thing", RFID Journal June 2009 [10]E. Welbourne et al, "Building the Internet of Things using RFID", IEEE Internet Computing May/June 2009, IEEE Computer Society [11]A. Sarma et al, "Identities in the future Internet of Things", Wireless Personal Communications: An International Journal, May 2009, ACM Digital Library& more

Editor's Notes

  1. Intro – 2Concept – 0.5Aims – 1 Applications – 2Area of focus – 2 Challenges & Threats – 2 Conclusion – 1