The document provides an introduction to the Internet of Things (IoT), including its definition, characteristics, physical design, enabling technologies, and communication models. Some key points:
- IoT comprises "things" that have unique identities and are connected to the internet, including devices not traditionally associated with the internet. Experts forecast 50 billion connected devices by 2020.
- IoT has dynamic and self-configuring capabilities. Devices use interoperable communication protocols and have unique identities.
- The physical design of IoT includes "things" like sensors and devices. Protocols at different layers like Ethernet, WiFi, TCP, and HTTP enable communication.
- The logical design includes functional blocks for identification
This document provides an overview of Internet of Things (IoT) concepts including:
- IoT comprises things that have unique identities and are connected to the internet to communicate and exchange data. By 2020 there will be 50 billion connected devices.
- IoT has characteristics like being dynamic and self-adapting, self-configuring, using interoperable communication protocols, and having unique identities.
- IoT applications include home automation, smart cities, environment monitoring, energy management, retail, logistics, agriculture, healthcare, and more.
- IoT devices use various protocols at the link, network, transport, and application layers to connect and exchange data. Common protocols discussed are Ethernet, WiFi,
This document provides an overview of Internet of Things (IoT) concepts including:
- IoT comprises things that have unique identities and are connected to the internet to communicate and exchange data. By 2020 there will be 50 billion connected devices.
- IoT has characteristics like being dynamic and self-adapting, self-configuring, using interoperable communication protocols, and having unique identities.
- IoT applications include home automation, smart cities, environment monitoring, energy management, retail, logistics, agriculture, healthcare, and more.
- IoT devices use various protocols at the link, network, transport, and application layers to connect and exchange data. Common protocols discussed are Ethernet, WiFi,
The document discusses Internet of Things (IoT) concepts including:
1. It defines IoT and describes its key characteristics such as being dynamic, self-configuring, using interoperable communication protocols, and devices having unique identities.
2. It explains the physical and logical design of IoT including things in IoT, IoT protocols, functional blocks, and communication models and APIs.
3. It discusses enabling technologies for IoT like wireless sensor networks, cloud computing, big data analytics, embedded systems, and communication protocols.
The document provides a detailed overview of foundational aspects of IoT from definitions to enabling technologies.
This document provides an overview of the course "18BME18 INTERNET OF THINGS FOR BIOMEDICAL ENGINEERS". The course aims to discuss IoT concepts, interpret wireless sensor network protocols, illustrate IoT applications in healthcare using tools and embedded systems. The document outlines the various units that will be covered, including IoT and M2M communication models, functional blocks, and protocols. It also compares IoT with M2M and describes software-defined networking.
Introduction to IoT
Defining IoT,
Characteristics of IoT,
Physical design of IoT,
Logical design of IoT,
Functional blocks of IoT,
Brief review of applications of IoT.
Smart Object
Definition,
Characteristics and Trends
Text Book
1. Arsheep Bahga (Author), Vijay Madisetti, Internet Of Things: A Hands-On Approach
Paperback, Universities Press,
Reprint 2020
2. David Hanes, Gonzalo Salgueiro, Patrick Grossetete, Robert Barton, Jerome Henry,
IoT Fundamentals Networking Technologies, Protocols, and Use Cases for the Internet of
Things CISCO.
Internet of Things.
CSDLO5013
The document discusses the introduction to Internet of Things (IoT). It defines IoT and describes its characteristics, physical and logical design, enabling technologies, and deployment levels. The physical design covers IoT devices, protocols, and communication layers. The logical design includes functional blocks, communication models, and APIs. Enabling technologies include wireless sensor networks, cloud computing, big data analysis, communication protocols, and embedded systems. IoT deployment levels range from single node local systems to multi-node systems with local coordination and cloud-based storage, analysis and applications.
The document provides an introduction to the Internet of Things (IoT), including its definition, characteristics, physical design, enabling technologies, and communication models. Some key points:
- IoT comprises "things" that have unique identities and are connected to the internet, including devices not traditionally associated with the internet. Experts forecast 50 billion connected devices by 2020.
- IoT has dynamic and self-configuring capabilities. Devices use interoperable communication protocols and have unique identities.
- The physical design of IoT includes "things" like sensors and devices. Protocols at different layers like Ethernet, WiFi, TCP, and HTTP enable communication.
- The logical design includes functional blocks for identification
This document provides an overview of Internet of Things (IoT) concepts including:
- IoT comprises things that have unique identities and are connected to the internet to communicate and exchange data. By 2020 there will be 50 billion connected devices.
- IoT has characteristics like being dynamic and self-adapting, self-configuring, using interoperable communication protocols, and having unique identities.
- IoT applications include home automation, smart cities, environment monitoring, energy management, retail, logistics, agriculture, healthcare, and more.
- IoT devices use various protocols at the link, network, transport, and application layers to connect and exchange data. Common protocols discussed are Ethernet, WiFi,
This document provides an overview of Internet of Things (IoT) concepts including:
- IoT comprises things that have unique identities and are connected to the internet to communicate and exchange data. By 2020 there will be 50 billion connected devices.
- IoT has characteristics like being dynamic and self-adapting, self-configuring, using interoperable communication protocols, and having unique identities.
- IoT applications include home automation, smart cities, environment monitoring, energy management, retail, logistics, agriculture, healthcare, and more.
- IoT devices use various protocols at the link, network, transport, and application layers to connect and exchange data. Common protocols discussed are Ethernet, WiFi,
The document discusses Internet of Things (IoT) concepts including:
1. It defines IoT and describes its key characteristics such as being dynamic, self-configuring, using interoperable communication protocols, and devices having unique identities.
2. It explains the physical and logical design of IoT including things in IoT, IoT protocols, functional blocks, and communication models and APIs.
3. It discusses enabling technologies for IoT like wireless sensor networks, cloud computing, big data analytics, embedded systems, and communication protocols.
The document provides a detailed overview of foundational aspects of IoT from definitions to enabling technologies.
This document provides an overview of the course "18BME18 INTERNET OF THINGS FOR BIOMEDICAL ENGINEERS". The course aims to discuss IoT concepts, interpret wireless sensor network protocols, illustrate IoT applications in healthcare using tools and embedded systems. The document outlines the various units that will be covered, including IoT and M2M communication models, functional blocks, and protocols. It also compares IoT with M2M and describes software-defined networking.
Introduction to IoT
Defining IoT,
Characteristics of IoT,
Physical design of IoT,
Logical design of IoT,
Functional blocks of IoT,
Brief review of applications of IoT.
Smart Object
Definition,
Characteristics and Trends
Text Book
1. Arsheep Bahga (Author), Vijay Madisetti, Internet Of Things: A Hands-On Approach
Paperback, Universities Press,
Reprint 2020
2. David Hanes, Gonzalo Salgueiro, Patrick Grossetete, Robert Barton, Jerome Henry,
IoT Fundamentals Networking Technologies, Protocols, and Use Cases for the Internet of
Things CISCO.
Internet of Things.
CSDLO5013
The document discusses the introduction to Internet of Things (IoT). It defines IoT and describes its characteristics, physical and logical design, enabling technologies, and deployment levels. The physical design covers IoT devices, protocols, and communication layers. The logical design includes functional blocks, communication models, and APIs. Enabling technologies include wireless sensor networks, cloud computing, big data analysis, communication protocols, and embedded systems. IoT deployment levels range from single node local systems to multi-node systems with local coordination and cloud-based storage, analysis and applications.
The document discusses the introduction to Internet of Things (IoT), including its definition, applications, characteristics such as being dynamic and self-adapting, self-configuring, using interoperable communication protocols, having a unique identity, and being integrated into information networks; it also discusses the physical design of IoT devices and protocols as well as the logical design including devices, communication, services, management, security, and applications.
This document provides an introduction to IoT including definitions and key characteristics. It discusses the four layers of an IoT architecture: sensing, network, data processing, and application. Common IoT protocols at each layer like MQTT, CoAP, and HTTP are also outlined. The document then covers microprocessors, comparing CISC and RISC architectures. Microcontrollers are defined as specialized microprocessors used in embedded systems. ARM is highlighted as a popular architecture for IoT devices due to its low power consumption and integrated components.
The document discusses various protocols used in Internet of Things (IoT). It begins with defining IoT and how it works. It then discusses the current status and future of IoT. The major sections of the document are on IoT data link protocols like IEEE 802.15.4, WirelessHART, Z-Wave, and Bluetooth Low Energy. It also covers network layer routing protocols such as RPL and CORPL, and network layer encapsulation protocols.
The document discusses the physical design of IoT devices and protocols. It describes that IoT devices have interfaces for sensors, internet connectivity, memory/storage, and audio/video. These devices can exchange data directly or indirectly with other devices. The document then explains several common link layer, network/internet layer, and transport layer protocols used in IoT including Ethernet, WiFi, TCP, and UDP. It also distinguishes between IoT network protocols like HTTP, LoRaWAN, Bluetooth, and Zigbee that connect devices over networks, and IoT data protocols like MQTT, CoAP, AMQP, M2M, and XMPP that provide point-to-point device connectivity without an internet connection.
The document provides an overview of Internet of Things (IoT) concepts including definitions, characteristics, physical and logical design of IoT systems, enabling technologies, communication models and protocols. It discusses domain-specific IoT applications, IoT platforms design methodology, physical IoT devices, and emerging technologies related to IoT like big data, industry 4.0, RFID and mobile app development tools.
The document provides an overview of Internet of Things (IoT) concepts including definitions, characteristics, physical and logical design of IoT systems, enabling technologies, communication models and protocols. It discusses domain-specific IoT applications, IoT platforms design methodology, physical IoT devices, and emerging technologies related to IoT like big data, industry 4.0, RFID and mobile app development tools.
iot.pptx related to technology which existVINODN33
The Internet of things (IoT) describes devices with sensors, processing ability, software and other technologies that connect and exchange data with other devices and systems over the Internet or other communications networks.[1][2][3][4][5] The Internet of things encompasses electronics, communication, and computer science engineering. "Internet of things" has been considered a misnomer because devices do not need to be connected to the public internet; they only need to be connected to a network[6] and be individually addressable.[7][8]
The field has evolved due to the convergence of multiple technologies, including ubiquitous computing, commodity sensors, and increasingly powerful embedded systems, as well as machine learning.[9] Older fields of embedded systems, wireless sensor networks, control systems, automation (including home and building automation), independently and collectively enable the Internet of things.[10] In the consumer market, IoT technology is most synonymous with "smart home" products, including devices and appliances (lighting fixtures, thermostats, home security systems, cameras, and other home appliances) that support one or more common ecosystems and can be controlled via devices associated with that ecosystem, such as smartphones and smart speakers. IoT is also used in healthcare systems.[11]
The Internet of things (IoT) describes devices with sensors, processing ability, software and other technologies that connect and exchange data with other devices and systems over the Internet or other communications networks.[1][2][3][4][5] The Internet of things encompasses electronics, communication, and computer science engineering. "Internet of things" has been considered a misnomer because devices do not need to be connected to the public internet; they only need to be connected to a network[6] and be individually addressable.[7][8]
The field has evolved due to the convergence of multiple technologies, including ubiquitous computing, commodity sensors, and increasingly powerful embedded systems, as well as machine learning.[9] Older fields of embedded systems, wireless sensor networks, control systems, automation (including home and building automation), independently and collectively enable the Internet of things.[10] In the consumer market, IoT technology is most synonymous with "smart home" products, including devices and appliances (lighting fixtures, thermostats, home security systems, cameras, and other home appliances) that support one or more common ecosystems and can be controlled via devices associated with that ecosystem, such as smartphones and smart speakers. IoT is also used in healthcare systems.[11]
he extensive set of applications for IoT devices[31] is often divided into consumer, commercial, industrial, and infrastructure spaces.[32][33]
Consumers
A growing portion of IoT devices is created for consumer use, including connected vehicles, home automation, wearable technology, connected health, and appli
The document discusses several Internet of Things (IoT) data link protocols, including IEEE 802.15.4, WirelessHART, Z-Wave, Bluetooth Low Energy, Zigbee Smart Energy, DASH7, LTE-A, LoRaWAN, and DECT/ULE. It provides details on their network architectures, medium access control methods, and suitability for various IoT applications.
The document introduces Internet of Things (IoT) and provides definitions and outlines key concepts. It defines IoT as a network of physical objects equipped with sensors and software that connects and exchanges data with other devices and systems over the Internet. The document discusses the characteristics, physical design including generic device components, logical design including functional blocks, and communication protocols of IoT systems. It provides examples of protocols used at different layers including networking, transport, and application layers.
The document discusses fog networks and cloud computing in the context of an Internet of Things course. It covers the following key points:
- Fog networks refer to decentralized computing infrastructure located closer to IoT devices to help process some data locally instead of sending everything to the cloud. This helps address issues like latency.
- Cloud computing provides on-demand access to shared computing resources, allowing IoT systems to extend functionality by processing and storing data in the cloud.
- Common cloud service models for IoT include Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Major cloud providers like Amazon AWS offer services tailored to IoT applications
COAP (Constrained Application Protocol) is a specialized web transfer protocol designed for resource-constrained devices like those in IoT. It uses a simple request-response model and operates over UDP, making it efficient for low-power devices to communicate. COAP supports methods like GET and PUT similar to HTTP and defines response codes to indicate request status. Overall, COAP is promising for IoT as it is designed to work efficiently and reliably with constrained devices and networks.
This document discusses IoT protocols for data communication and connection models. It describes the key pillars of IoT protocols as being device, connectivity, data, and analytics. It also outlines various types of IoT data protocols like AMQP, DDS, XMPP, and WebSocket that establish end-to-end communication. Additionally, it covers IoT network protocols like Bluetooth, LPWANs, ZigBee, Z-Wave and others that facilitate secured communication between IoT devices over the internet.
Bluetooth Based Smart Sensor Network By SAIKIRAN PANJALASaikiran Panjala
This document discusses Bluetooth-based wireless sensor networks. It describes how Bluetooth can be used for short-range communication between sensors and a gateway. The gateway acts as an interface between the sensors and end users, collecting data from the sensors using various communication protocols and making it available in a structured format. Several applications of wireless sensor networks are mentioned, along with considerations for using Bluetooth in sensor networks like its widespread availability and support for automatic discovery and connection setup.
The document introduces Internet of Things (IoT) concepts. It defines IoT as a global network of devices connected by standard protocols that can communicate data. It describes key characteristics of IoT including dynamic self-configuration. It outlines the physical design of IoT devices and logical design of IoT systems. It also discusses common IoT protocols like CoAP, MQTT, and WebSocket. Finally, it examines different communication models used in IoT like request-response, publish-subscribe, and push-pull.
This document provides an overview of Internet of Things (IoT) and Industrial Internet of Things (IIoT). It discusses key concepts including sensors, gateways, connectivity protocols, cloud platforms, security, and applications. Specifically, it describes how sensors collect data and transmit it via protocols like MQTT and AMQP to gateways, which perform edge analytics and send data to the cloud for storage and processing using services like AWS IoT. The cloud platform then makes this data available to applications and end users.
Internet Of Things(IoT) is emerging technology in future world.The term IoT comprises of Cloud computing, Data mining,
Big data analytics, hardware board. The Security and Interoperability is a main factor that influences the IoT Enegy
consumption is also main fator for IoT application designing.The various protocols such as MQTT,AMQP,XMPP are used in
IoT.This paper analysis the various protocols used in Internet of Things.
IOT and its communication models and protocols.pdfMD.ANISUR RAHMAN
A brief visual description of the Internet of Things and how it works. Then, we will learn about the communication models of IoT and how their structure defines them. Then we will go for the IoT protocols and know about different types of protocols. At last, we will see some applications of IoT.
The document discusses various protocols and security aspects related to IoT. It provides details on protocols such as IEEE 802.15.4, BACnet, Modbus, KNX, Zigbee etc. It also outlines vulnerabilities in IoT like unauthorized access, information corruption, DoS attacks. Key elements of IoT security discussed are identity establishment, access control, data security, non-repudiation and availability. Security requirements and models for IoT are also mentioned.
Securing BGP: Operational Strategies and Best Practices for Network Defenders...APNIC
Md. Zobair Khan,
Network Analyst and Technical Trainer at APNIC, presented 'Securing BGP: Operational Strategies and Best Practices for Network Defenders' at the Phoenix Summit held in Dhaka, Bangladesh from 23 to 24 May 2024.
More Related Content
Similar to IoT.pptx .in this we can see about more details
The document discusses the introduction to Internet of Things (IoT), including its definition, applications, characteristics such as being dynamic and self-adapting, self-configuring, using interoperable communication protocols, having a unique identity, and being integrated into information networks; it also discusses the physical design of IoT devices and protocols as well as the logical design including devices, communication, services, management, security, and applications.
This document provides an introduction to IoT including definitions and key characteristics. It discusses the four layers of an IoT architecture: sensing, network, data processing, and application. Common IoT protocols at each layer like MQTT, CoAP, and HTTP are also outlined. The document then covers microprocessors, comparing CISC and RISC architectures. Microcontrollers are defined as specialized microprocessors used in embedded systems. ARM is highlighted as a popular architecture for IoT devices due to its low power consumption and integrated components.
The document discusses various protocols used in Internet of Things (IoT). It begins with defining IoT and how it works. It then discusses the current status and future of IoT. The major sections of the document are on IoT data link protocols like IEEE 802.15.4, WirelessHART, Z-Wave, and Bluetooth Low Energy. It also covers network layer routing protocols such as RPL and CORPL, and network layer encapsulation protocols.
The document discusses the physical design of IoT devices and protocols. It describes that IoT devices have interfaces for sensors, internet connectivity, memory/storage, and audio/video. These devices can exchange data directly or indirectly with other devices. The document then explains several common link layer, network/internet layer, and transport layer protocols used in IoT including Ethernet, WiFi, TCP, and UDP. It also distinguishes between IoT network protocols like HTTP, LoRaWAN, Bluetooth, and Zigbee that connect devices over networks, and IoT data protocols like MQTT, CoAP, AMQP, M2M, and XMPP that provide point-to-point device connectivity without an internet connection.
The document provides an overview of Internet of Things (IoT) concepts including definitions, characteristics, physical and logical design of IoT systems, enabling technologies, communication models and protocols. It discusses domain-specific IoT applications, IoT platforms design methodology, physical IoT devices, and emerging technologies related to IoT like big data, industry 4.0, RFID and mobile app development tools.
The document provides an overview of Internet of Things (IoT) concepts including definitions, characteristics, physical and logical design of IoT systems, enabling technologies, communication models and protocols. It discusses domain-specific IoT applications, IoT platforms design methodology, physical IoT devices, and emerging technologies related to IoT like big data, industry 4.0, RFID and mobile app development tools.
iot.pptx related to technology which existVINODN33
The Internet of things (IoT) describes devices with sensors, processing ability, software and other technologies that connect and exchange data with other devices and systems over the Internet or other communications networks.[1][2][3][4][5] The Internet of things encompasses electronics, communication, and computer science engineering. "Internet of things" has been considered a misnomer because devices do not need to be connected to the public internet; they only need to be connected to a network[6] and be individually addressable.[7][8]
The field has evolved due to the convergence of multiple technologies, including ubiquitous computing, commodity sensors, and increasingly powerful embedded systems, as well as machine learning.[9] Older fields of embedded systems, wireless sensor networks, control systems, automation (including home and building automation), independently and collectively enable the Internet of things.[10] In the consumer market, IoT technology is most synonymous with "smart home" products, including devices and appliances (lighting fixtures, thermostats, home security systems, cameras, and other home appliances) that support one or more common ecosystems and can be controlled via devices associated with that ecosystem, such as smartphones and smart speakers. IoT is also used in healthcare systems.[11]
The Internet of things (IoT) describes devices with sensors, processing ability, software and other technologies that connect and exchange data with other devices and systems over the Internet or other communications networks.[1][2][3][4][5] The Internet of things encompasses electronics, communication, and computer science engineering. "Internet of things" has been considered a misnomer because devices do not need to be connected to the public internet; they only need to be connected to a network[6] and be individually addressable.[7][8]
The field has evolved due to the convergence of multiple technologies, including ubiquitous computing, commodity sensors, and increasingly powerful embedded systems, as well as machine learning.[9] Older fields of embedded systems, wireless sensor networks, control systems, automation (including home and building automation), independently and collectively enable the Internet of things.[10] In the consumer market, IoT technology is most synonymous with "smart home" products, including devices and appliances (lighting fixtures, thermostats, home security systems, cameras, and other home appliances) that support one or more common ecosystems and can be controlled via devices associated with that ecosystem, such as smartphones and smart speakers. IoT is also used in healthcare systems.[11]
he extensive set of applications for IoT devices[31] is often divided into consumer, commercial, industrial, and infrastructure spaces.[32][33]
Consumers
A growing portion of IoT devices is created for consumer use, including connected vehicles, home automation, wearable technology, connected health, and appli
The document discusses several Internet of Things (IoT) data link protocols, including IEEE 802.15.4, WirelessHART, Z-Wave, Bluetooth Low Energy, Zigbee Smart Energy, DASH7, LTE-A, LoRaWAN, and DECT/ULE. It provides details on their network architectures, medium access control methods, and suitability for various IoT applications.
The document introduces Internet of Things (IoT) and provides definitions and outlines key concepts. It defines IoT as a network of physical objects equipped with sensors and software that connects and exchanges data with other devices and systems over the Internet. The document discusses the characteristics, physical design including generic device components, logical design including functional blocks, and communication protocols of IoT systems. It provides examples of protocols used at different layers including networking, transport, and application layers.
The document discusses fog networks and cloud computing in the context of an Internet of Things course. It covers the following key points:
- Fog networks refer to decentralized computing infrastructure located closer to IoT devices to help process some data locally instead of sending everything to the cloud. This helps address issues like latency.
- Cloud computing provides on-demand access to shared computing resources, allowing IoT systems to extend functionality by processing and storing data in the cloud.
- Common cloud service models for IoT include Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Major cloud providers like Amazon AWS offer services tailored to IoT applications
COAP (Constrained Application Protocol) is a specialized web transfer protocol designed for resource-constrained devices like those in IoT. It uses a simple request-response model and operates over UDP, making it efficient for low-power devices to communicate. COAP supports methods like GET and PUT similar to HTTP and defines response codes to indicate request status. Overall, COAP is promising for IoT as it is designed to work efficiently and reliably with constrained devices and networks.
This document discusses IoT protocols for data communication and connection models. It describes the key pillars of IoT protocols as being device, connectivity, data, and analytics. It also outlines various types of IoT data protocols like AMQP, DDS, XMPP, and WebSocket that establish end-to-end communication. Additionally, it covers IoT network protocols like Bluetooth, LPWANs, ZigBee, Z-Wave and others that facilitate secured communication between IoT devices over the internet.
Bluetooth Based Smart Sensor Network By SAIKIRAN PANJALASaikiran Panjala
This document discusses Bluetooth-based wireless sensor networks. It describes how Bluetooth can be used for short-range communication between sensors and a gateway. The gateway acts as an interface between the sensors and end users, collecting data from the sensors using various communication protocols and making it available in a structured format. Several applications of wireless sensor networks are mentioned, along with considerations for using Bluetooth in sensor networks like its widespread availability and support for automatic discovery and connection setup.
The document introduces Internet of Things (IoT) concepts. It defines IoT as a global network of devices connected by standard protocols that can communicate data. It describes key characteristics of IoT including dynamic self-configuration. It outlines the physical design of IoT devices and logical design of IoT systems. It also discusses common IoT protocols like CoAP, MQTT, and WebSocket. Finally, it examines different communication models used in IoT like request-response, publish-subscribe, and push-pull.
This document provides an overview of Internet of Things (IoT) and Industrial Internet of Things (IIoT). It discusses key concepts including sensors, gateways, connectivity protocols, cloud platforms, security, and applications. Specifically, it describes how sensors collect data and transmit it via protocols like MQTT and AMQP to gateways, which perform edge analytics and send data to the cloud for storage and processing using services like AWS IoT. The cloud platform then makes this data available to applications and end users.
Internet Of Things(IoT) is emerging technology in future world.The term IoT comprises of Cloud computing, Data mining,
Big data analytics, hardware board. The Security and Interoperability is a main factor that influences the IoT Enegy
consumption is also main fator for IoT application designing.The various protocols such as MQTT,AMQP,XMPP are used in
IoT.This paper analysis the various protocols used in Internet of Things.
IOT and its communication models and protocols.pdfMD.ANISUR RAHMAN
A brief visual description of the Internet of Things and how it works. Then, we will learn about the communication models of IoT and how their structure defines them. Then we will go for the IoT protocols and know about different types of protocols. At last, we will see some applications of IoT.
The document discusses various protocols and security aspects related to IoT. It provides details on protocols such as IEEE 802.15.4, BACnet, Modbus, KNX, Zigbee etc. It also outlines vulnerabilities in IoT like unauthorized access, information corruption, DoS attacks. Key elements of IoT security discussed are identity establishment, access control, data security, non-repudiation and availability. Security requirements and models for IoT are also mentioned.
Similar to IoT.pptx .in this we can see about more details (20)
Securing BGP: Operational Strategies and Best Practices for Network Defenders...APNIC
Md. Zobair Khan,
Network Analyst and Technical Trainer at APNIC, presented 'Securing BGP: Operational Strategies and Best Practices for Network Defenders' at the Phoenix Summit held in Dhaka, Bangladesh from 23 to 24 May 2024.
HijackLoader Evolution: Interactive Process HollowingDonato Onofri
CrowdStrike researchers have identified a HijackLoader (aka IDAT Loader) sample that employs sophisticated evasion techniques to enhance the complexity of the threat. HijackLoader, an increasingly popular tool among adversaries for deploying additional payloads and tooling, continues to evolve as its developers experiment and enhance its capabilities.
In their analysis of a recent HijackLoader sample, CrowdStrike researchers discovered new techniques designed to increase the defense evasion capabilities of the loader. The malware developer used a standard process hollowing technique coupled with an additional trigger that was activated by the parent process writing to a pipe. This new approach, called "Interactive Process Hollowing", has the potential to make defense evasion stealthier.
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...APNIC
Adli Wahid, Senior Internet Security Specialist at APNIC, delivered a presentation titled 'Honeypots Unveiled: Proactive Defense Tactics for Cyber Security' at the Phoenix Summit held in Dhaka, Bangladesh from 23 to 24 May 2024.
Discover the benefits of outsourcing SEO to Indiadavidjhones387
"Discover the benefits of outsourcing SEO to India! From cost-effective services and expert professionals to round-the-clock work advantages, learn how your business can achieve digital success with Indian SEO solutions.
2. Internet of Things (IoT) comprises things that have unique identities and
are connected to the internet.
Experts forecast that by the year 2020 there will be a total of 50 billion
devices/ things connected to the internet.
The scope of IoT is not limited to just connected things(Devices,
appliance, machines) to the Internet.
Applications on IoT networks extract and create information from lower
level data by filtering, processing , categorizing, condensing and
contextualizing the data.
3. Definition
A dynamic global network infrastructure with self – configuring based on
standard and interoperable communication protocols where physical and
virtual “things” have identified, physical attributes, and virtual personalities
and use intelligent interfaces, often communicate data associated with users
and their environment
4. Dynamic and self-Adapting:
◦ Ex: Surveillance cameras can adapt their modes based on whether it is day or
night.
Self – Configuring:
◦ IoT devices may have self-Configuring capability allowing a large number of
devices to work together to provide certain functionality .
Interoperable communication protocols:
◦ IoT Devices may support a number of interoperable communication protocols and
can communicate with other devices and also with the infrastructure.
5. Unique Identity:
◦ Each IoT devices has a unique identity and a unique identifier. IP address, URI).
Integrated into information network:
◦ IoT devices are usually integrated into the information network that allows them to
communicate and exchange data with other devices and systems.
6. Things of IoT
◦ The “Things” in IoT usually refers to IoT devices which have unique identities and
can perform remote sensing, Actuating and monitoring capabilities.
◦ An IoT device may consist of several interfaces connections to other devices, both
wired and wireless.
◦ These include
◦ I)IoT interfaces for sensors
◦ II) interfaces for internet connectivity
◦ III) memory and storage interfaces
◦ IV) audio video interfaces.
7. IoT Protocol :
◦ Link Layer:
Link Layer protocols determine how the data is physically sent over the
networks physical layer or medium(example copper wire, electrical cable, or
radio wave).
The Scope of The Link Layer is the Last Local Network connections to
which host is attached.
802.3 Ethernet:
802.3 is a collections of wired Ethernet standards for the link layer.
For example 802.3 10BASE5 Ethernet that uses coaxial cable as a shared
medium, 802.3.i is standard for 10 BASET Ethernet over copper twisted pair
connection, Standards provide data rates from 10 Mb/s to 40 gigabits per
second and the higher.
8. 802.1- WI-FI:
◦ IEEE 802.3 is a collections of wireless Local area network.(WLAN)
communication standards, including extensive descriptions of the link layer.
◦ For example 802.11a operate in the 5 GHz band, 802.11b and 802.11g operate in
the 2.4 GHz band. 802.11ac operates in the 5G hertz band.
802.16 wiMAX:
◦ IEEE 802.16 is a collection of wireless broadband and Standards, including
extensive descriptions for the link layer also called WiMAX wimax standard
provides a data rates from 1.5 Mb/s to 1Gb/s the recent update provides data rates
of hundred megabits per second for mobile station.
9. 802.15.4 LR-WPAN:
◦ IEEE 802.1 5.4 is a collections of standard for low rate wireless
personal area network(LR-WPAN).
◦ These standard form the basis of specifications for high level
communication Zigbee.
◦ LR-WPAN standards provide data rates from 40 k b/ s.
◦ These standards provide low cost and low speed Communications
for power constrained devices.
10. Network / internet layer :
◦ The network layer are responsible for sending of IP data grams from the source network to
the destination network.
◦ This layer Performs the host addressing and packet routing.
IPV4: Internet protocol versions for open parents close (IPV4) is there most deployed internet
protocol.
As more and more devices got connected to the internet.
IPv6: It is the newest versions of internet protocol and successor to IPv4.
6LoWPAN:
IPv6 over low power wireless personal area networks brings IP protocol to the low power device which
have limited processing capability it operate in the 2.4 GHz frequency range and provide the data
transfer rate off to 50 kb/s.
11. Transport layer :
◦ The Transport layer protocols provides end-to-end message transfer capability
independent of the underlying network.
◦ The message transfer capability can be set up on connections, either using handshake or
without handshake acknowledgements. Provides functions such as error control ,
segmentation, flow control and congestion control.
◦ TCP: Transmission control protocol is the most widely used to transport layer protocol
that is used by the web browsers along with HTTP , HTTPS application layer protocols
email program (SMTP application layer protocol) and file transfer protocol.
◦ TCP is a connection Oriented and statefull protocol while IP protocol deals with sending
packets, TCP ensures reliable transmissions of packets in order.
12. Application layer :
◦ Application layer protocol define how the application interfaces with the lower layer
protocols to send the data over the network.
◦ Data are typically in files, is encoded by the application layer protocol and encapsulated in
the transport layer protocol .
◦ Application layer protocol enable process-to-process connection using ports.
◦ Http: Hypertext transfer protocol is the application layer protocol that forms the
foundations of world wide web http includes, ,commands such as GET, PUT, POST,
DELETE, HEAD, TRACE, OPTIONS etc.
◦ CoAP: Constrained application protocol is an application layer protocol for machine to
machine application M2M meant for constrained environment with constrained devices
and constrained networks.
◦ Websocket:Websocket protocol allows full duplex communication over a single socket
connections for sending message between client and server. Websocket is based on TCP
and Allows streams of messages to be sent back and forth between the client and server
while keeping the TCP connection open.
13. ◦ MQTT :Message Queue Telemetry Transport it is a lightweight message protocol based on
public -subscribe model MQTT uses a client server Architecture by the clients such as an
IoT device connect to the server also called the MQTT broker and publishers message to
topic on the server.
◦ XMPP: Extensible Messaging and Presence Protocol it is a protocol for real-time
communication and streaming XML data between network entities XMPP powers wide
range of applications including messaging, presence, data syndication, gaming multiparty
chat and voice / voice calls.
◦ DDS: Data distribution service is the date centric middleware standard for device-to-
device machine to machine communication DDS uses a publish subscribe model where
publisher example device that generate data create topics to which subscribers per can
subscribe publisher is an object responsible for data distributions and the subscriber
responsible for receiving published data.
14. AMQP:
◦ Advanced Message Queuing protocols. it is an open application layer protocol for
business messaging.
◦ AMQP support point to point and publish - subscribe model routing and queuing.
15. Def:
Logical design of an IoT system refers to an abstract representation of the
entities and process without going into low level specification of the
implementations .
16. IoT functional block:
◦ An IoT system comprises of a number of functional blocks that provide the system the
capabilities for identification , sensing, actuation ,communication and Management.
◦ The function blocks are described as follows
17. Devices:
◦ An IoT system comprises of the devices that provide sensing, actuation, monitoring and control
function
Communication:
◦ communication block handle the communication systems
Services :
◦ An IoT system uses various types of IoT services such as services for device monitoring ,device
control services ,data publishing services and services for device Discovery.
Management:
◦ Functional blocks provide various functions to govern the IoT system
Security:
◦ Security functional block security IoT system and by providing functions such as application
authorization message and content integrity and data security.
Application:
◦ IoT application provides and interface that the user can used to control and monitor various aspects
of the IoT system. Application also allow users to view the system status and view or analyze the
processed to data.
18. IoT communication model
Request response:
◦ Request-response is a Communications model in which the client sends request to the
server and the server responds to the requests.
◦ when the server receives a request it decides how to respond,
Publish - Subscribe:
◦ Respect is a communication model that involve Publishers brokers and consumers.
◦ Publishers are the source of data.
◦ Publishers send the data to the topics which is managed by the broker. Publishers are
not aware of the consumer.
◦ Consumers Subscribe to the topic which are managed by the broker.
◦ When the broker receives the data for a topic from the publisher, it send the data to all
the subscribed consumers.
19. Push pull:
◦ Push pull is communication model in which the data producers push the data to queues
and the consumers pull the data from the queues. Producers do not need to be aware of
the consumer.
◦ Queues help in decoupling the messaging between the Producers and Consumers .
Exclusive pair:
◦ Exclusive pair is a bi directional, fully duplex communication model that uses a
persistent connections between the client and the server.
◦ once the condition is setup it remains open until the client sends a request to close the
connection.
◦ client and server can send messages to each other after connection setup.
◦ Exclusive pair is a stateful Communications model and the server is aware of all the
open connections
20. IoT communication APIs
REST- based communication API:
◦ Representational state transfer is a set of architectural principles by which you
can design web service and Web API that focus on a system resources and how
resources states and addressed the transferred.
◦ REST API follow the request- response communication model.
The REST architectural constraints apply to the components, connectors,
and data elements .
Client server:
◦ The principle behind the client-server conference separations of concerns for
example client should not be concerned with the storage of data which is their
concern of the server.
◦ Similarly the server should not be concerned about the user interface which is a
concern of the client.
◦ separation allows client and server to be independently deployed and updated.
21. Stateless:
◦ Each request from client to server must contain all the information necessary to understand the
request , and cannot take advantage of any stored context on the server .
Catchable:
◦ Catch constrain requires that the data within the response to a request be implicitly or
explicitly labeled as catchable or non-catchable.
◦ Then a client cache is given the right to reuse that response data for later, equivalent requests.
◦ completely eliminate some attractions and improve efficiency and scalability.
Layered system:
◦ System constraint come off constraints, constrains the behavior of components such that each
component cannot see beyond the immediate layer with which they are interacting.
◦ Example client cannot tell whether it is connected directly to the end server or to an
intermediary along the way system scalability can be improved allowing intermediaries to
respond to request instead of tender server.
22. Uniform interface:
◦ Uniform interface constraints requires that the method of communication between
client and server must be uniform.
◦ Resources are identified in the request and separate from the representation of the
resource that are returned to the client.
◦ When climbing holds a representation of your resource it has all the information
required to update or delete the resource
Code on demand :
◦ Service can provide executable code script for clients to execute in their context.
23. Web Socket based communication API:
◦ Web Socket API allow bi directional, full duplex communication between client and
server.
◦ Unlike request-response API allow full duplex communication and do not require new
connection to be set up for each message to be sent.
◦ Web socket communication begins with connection setup request send by the client to
the server.
◦ The request is sent over http and the server interprets it as an upgrade request.
◦ If the server support protocol response to the website handshake response after the
connection setup the client and the server can send data or messages to each other in
full duplex model.
◦ Web Socket API reduce network traffic and latency as there is no overhead for
connection setup and determination records to each message.
24. Def:
◦ It is enabled by several Technologies including wireless sensor networks, cloud
computing big Data Analytics, embedded system, security protocols and architectures,
communication protocols, web service, mobile internet and semantic search engine .
25. wireless sensor network :
◦ Wireless sensor network ( wsn) comprise of distributed devices with the sensor which
are used to monitor the environmental and physical conditions.
◦ A WSN consists of a number of end nodes and routers and a coordinator. End nodes
have several sensors attached to them. End node can also act as a routers.
◦ Routers are responsible for routing the data packet from end nodes to the coordinator.
The coordinator node collect the data from all the notes coordinator also act as a
Gateway that connects the WSN to the internet
26. IoT systems are described as follows
◦ Weather monitoring system using WSN in which the nodes collect temperature,
humidity and other data which is aggregated and analyzed .
◦ Indoor air quality monitoring system using WSN to collect data on the indoor air
quality and connections of various gases.
◦ Soil moisture monitoring system using WSN to monitor soil moisture at various
location.
◦ Surveillance systems use WSN for collecting surveillance data(motion detection data)
◦ Smart grid use wireless sensor network for monitoring the grid at various point.
◦ Structural health monitoring systems use WSN to monitor the health of structure by
writing vibration data from sensor nodes deployed at various points in the structure.
27. Cloud computing:
◦ Cloud Computing is a transformative computing paradigm that involves delivering
applications and services over the internet.
◦ Cloud Computing involves provisioning of computing networking and storage resources on
demand and providing these resources as metered services to the users, in a “ pay as you go”
model.
◦ cloud Computing resources can be provisioned on demand by the user without requiring
interactions with the Cloud Service Provider.
◦ The process of provisioning resources used automatic Cloud Computing resources can be
accessed then it worked using standard access mechanism that provide platform-independent
access through the use of heterogeneous client platforms such as workstations laptops tablets
and Smartphones the computing and storage resources provided by Cloud Service Provider our
food to serve multiple user using multi Tenancy.
◦ Multi-tenant aspects on the multiple users to be served by the same physical hardware .
28. Cloud Computing services are offered to user in different forms
Infrastructure as a service(IAAS) :
IaaS provides the user the ability provision computing and storage resources. These
resources are provided to the users as virtual machine instances and virtual storage.
Users can start, stop configure and manage the virtual machines instance on the virtual
storage using can deploy operating systems and applications on their choice on the
actual resources provisions in the cloud . Cloud Service Provider manages the underlying
infrastructure.
Platform as a service(PaaS) :
platform as a service provides the user the ability to develop and deploy application in
the cloud using the deployment tool application programming interfaces API, software
libraries and services provided by the Cloud Service Provider. The Cloud Service Provider
manages the underlying cloud infrastructure including servers, network, operating
systems and storage .
Software as a service(SaaS) :
Provide the user a complete software applications of the user interface to the application
itself . The Cloud Service Provider manage the underlying cloud infrastructure including
server, network storage and application software, and the user is unaware of the
underlying architecture of the cloud. Applications are provided to the user through a
thin client interface example Browser application. SaaS applications are accessed from
various client smartphones running different operating system.
29. In this section we define various levels of IoT systems with increasing
completely.
IoT system comprises of the following components:
Device : An IoT device allow identification, remote sensing, actuating and
remote monitoring capabilities.
Resources : Resources are software components on the device for
accessing and storing information for controlling actuator connected to the
device also include software components that enable network access for the
device .
30. Controller service: Controller Service is a native service that runs on the
device and interact with the web services. Controller service sends data
from the device to the web service receive command from the application
from controlling the device.
Database: Database can be either local or in the cloud and stores the data
generated by the IoT device.
Web service: Serve as a link between the device, application database and
analysis components. Web Services can be implemented using HTTP and
REST principles or using website protocol.
31. A comparison of restaurant website is provided below:
◦ Stateless/stateful:
Rest services stateless in nature.
Each request contain all the information needed to process it.
Request are independent of each other.
- Directional / Bi- directional:
- REST service operate over http and unidirectional.
- Request is always sent by a client and the server response to the request.
32. Request response / full duplex:
◦ REST service follower request response Communications model where the client
sends request and the server response to the request
TCP connections:
◦ For REST Service each http request involves setting up in a new TCP connections
Websocket on the other hand involves a single TCP connection over which the client
and server communicate in a full duplex mode.
Headache Overhead:
◦ REST service operate over http , and each request is independent of others . Thus each
request carries http header which is an overhead.
33. Scalability:
◦ Scalability is easier in this case of the REST services of request are independent And
no state information needs to be maintained by the server.
◦ Thus both horizontal out and vertical scaling solutions are possible for REST services.
Analysis component:
◦ The analysis component is responsible for analyzing the IoT data and generate results
in the form which are easy for the user to understand.
Application:
◦ IoT applications provide an interface that the user can use to control and monitor
various aspects of the IoT system.
◦ Applications also allow user to view the system status and view the processed data.