Group 4 IT INfrastructure Group presentation Final [Auto-saved].pptxOdedeleIfeoluwa
The rapid advancement of technology in recent years has given rise to the proliferation of interconnected devices, commonly known as the Internet of Things (IoT).
The Internet of Things (IoT) is a concept that describes a totally interconnected world. It’s a world where devices of every shape and size are manufactured with “smart” capabilities that allow them to communicate and interact with other devices, exchange data, make autonomous decisions and perform useful tasks based on preset conditions.
IoT is expected to gross over $19 trillion over the next few years. However, the problem is that these ‘things’ have myths surrounding them, some of which are impacting how organizations develop the apps to support them.
Any new technology involves a certain amount of uncertainty and business risk. In the case of the Internet of Things, however, many of the risks have been exaggerated or misrepresented. While the IoT vision will take years to mature fully, the building blocks to begin this process are already in place.
Key hardware and software are either available today or under development; stakeholders need to address security and privacy concerns, and collaborate to implement the open standards that will make the IoT safe, secure, reliable and interoperable, and allow the delivery of secured services as seamlessly as possible.
The IoT Era Begins
Components of IoT-Enabled Things
IoT Reference model
IoT Security
IoT Security & Privacy Req. defined by ITU-T
An IoT Security Framework
IoT Security Challenges
Internet of Things - Liability
IoT security tools
Group 4 IT INfrastructure Group presentation Final [Auto-saved].pptxOdedeleIfeoluwa
The rapid advancement of technology in recent years has given rise to the proliferation of interconnected devices, commonly known as the Internet of Things (IoT).
The Internet of Things (IoT) is a concept that describes a totally interconnected world. It’s a world where devices of every shape and size are manufactured with “smart” capabilities that allow them to communicate and interact with other devices, exchange data, make autonomous decisions and perform useful tasks based on preset conditions.
IoT is expected to gross over $19 trillion over the next few years. However, the problem is that these ‘things’ have myths surrounding them, some of which are impacting how organizations develop the apps to support them.
Any new technology involves a certain amount of uncertainty and business risk. In the case of the Internet of Things, however, many of the risks have been exaggerated or misrepresented. While the IoT vision will take years to mature fully, the building blocks to begin this process are already in place.
Key hardware and software are either available today or under development; stakeholders need to address security and privacy concerns, and collaborate to implement the open standards that will make the IoT safe, secure, reliable and interoperable, and allow the delivery of secured services as seamlessly as possible.
The IoT Era Begins
Components of IoT-Enabled Things
IoT Reference model
IoT Security
IoT Security & Privacy Req. defined by ITU-T
An IoT Security Framework
IoT Security Challenges
Internet of Things - Liability
IoT security tools
IoT Standardization and Implementation ChallengesAhmed Banafa
The rapid evolution of the IoT market has caused an explosion in the number and variety of IoT solutions.
Additionally, large amounts of funding are being deployed at IoT startups.
Consequently, the focus of the industry has been on manufacturing and producing the right types of hardware to enable those solutions.
IoT Security: Debunking the "We Aren't THAT Connected" MythSecurity Innovation
In a world where convenience is key, consumers are adopting every new connected device that hits the shelves - and doing so with the assumption that due diligence security has been considered. But recent IoT attacks suggest otherwise.
As organizations migrate from a primarily offline to online business model, they are failing to consider IoT’s unique threats which traditional solutions are unable to secure. As a result, steps must be taken to ensure that the device, connections and infrastructure are hardened, especially software which runs IoT devices and is the source of ~90% of attacks.
This webinar is ideal for risk, technology, and security professionals that want to understand why a hacker would want to attack their “harmless” IoT device and what the stealth risk to their organization and consumers is.
Topics covered include:
- IoT security – why it’s so different….and tough
- The IoT ecosystem and attack surface
- Managing liability - IoT risks to consumers and vendors
- Auditing IoT software development
Presentation from IBM InterConnect in Las Vegas March 2017.
Enabling Internet of Things (IoT) so your employees and your customers can have a simplified experience with new services and products sounds exciting. In this session, we will dig into the top ten risks that come with the IoT experience. Due to the rapidly evolving nature of IoT and associated threats, there are risks in allowing access to your enterprise resources. Custom firmware, embedded operating systems and wi-fi connectivity of IoT devices offer many possible areas for exploits and misuse. Come explore current security offerings and get a first look at best practices. Walk away with an immediate checklist to benefit your enterprise as it deploys and offers IoT access.
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014Adrian Wright
Embracing & Securing the Internet of Things
A briefing for CIOs at the CIO Dialogue 9 Oxford. May 2014
Presenter: Adrian Wright
VP of Research - Information Systems Security Association
CEO of Secoda Risk Management
What are the roles of Building and Functional Blocks of IoT.pdfashumasih3
The Internet of Things (IoT) is the connection of devices, machines, and sensors connected in a network to the Internet. It comprises four basic building blocks: sensors, processors, gateways, and applications. It is the foundation of the IoT ecosystem. Companies use IoT to enhance their productivity and boost their revenues.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
IoT Standardization and Implementation ChallengesAhmed Banafa
The rapid evolution of the IoT market has caused an explosion in the number and variety of IoT solutions.
Additionally, large amounts of funding are being deployed at IoT startups.
Consequently, the focus of the industry has been on manufacturing and producing the right types of hardware to enable those solutions.
IoT Security: Debunking the "We Aren't THAT Connected" MythSecurity Innovation
In a world where convenience is key, consumers are adopting every new connected device that hits the shelves - and doing so with the assumption that due diligence security has been considered. But recent IoT attacks suggest otherwise.
As organizations migrate from a primarily offline to online business model, they are failing to consider IoT’s unique threats which traditional solutions are unable to secure. As a result, steps must be taken to ensure that the device, connections and infrastructure are hardened, especially software which runs IoT devices and is the source of ~90% of attacks.
This webinar is ideal for risk, technology, and security professionals that want to understand why a hacker would want to attack their “harmless” IoT device and what the stealth risk to their organization and consumers is.
Topics covered include:
- IoT security – why it’s so different….and tough
- The IoT ecosystem and attack surface
- Managing liability - IoT risks to consumers and vendors
- Auditing IoT software development
Presentation from IBM InterConnect in Las Vegas March 2017.
Enabling Internet of Things (IoT) so your employees and your customers can have a simplified experience with new services and products sounds exciting. In this session, we will dig into the top ten risks that come with the IoT experience. Due to the rapidly evolving nature of IoT and associated threats, there are risks in allowing access to your enterprise resources. Custom firmware, embedded operating systems and wi-fi connectivity of IoT devices offer many possible areas for exploits and misuse. Come explore current security offerings and get a first look at best practices. Walk away with an immediate checklist to benefit your enterprise as it deploys and offers IoT access.
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014Adrian Wright
Embracing & Securing the Internet of Things
A briefing for CIOs at the CIO Dialogue 9 Oxford. May 2014
Presenter: Adrian Wright
VP of Research - Information Systems Security Association
CEO of Secoda Risk Management
What are the roles of Building and Functional Blocks of IoT.pdfashumasih3
The Internet of Things (IoT) is the connection of devices, machines, and sensors connected in a network to the Internet. It comprises four basic building blocks: sensors, processors, gateways, and applications. It is the foundation of the IoT ecosystem. Companies use IoT to enhance their productivity and boost their revenues.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Essentials of Automations: Optimizing FME Workflows with Parameters
IOT TOTAL POWER POINT PRESENTATION UNITS
1. Internet of Things and
Applications
Prepared By
Mrs.Archana B T
Assistant Professor, Dept. of ECE
2. INTRODUCTION TO IOT
• Internet of Things (IoT) is a concept which enables communication
between internetworking devices and applications, whereby physical
objects or ‘things’ communicate through the Internet.
• The Internet is a vast global network of connected servers,
computers, tablets and mobiles that is governed by standard protocols
for connected systems. It enables sending, receiving, or
communication of information, connectivity with remote servers,
cloud and analytics platforms.
• Thing in English has number of uses and meanings. In a dictionary,
thing is a word used to refer to a physical object, an action or idea, a
situation or activity, in case when one does not wish to be precise.
unit 1 Introduction to IOT
3. INTRODUCTION TO IOT
• Internet of Things means a network of physical things (objects) sending,
receiving, or communicating information using the Internet or other
communication technologies and network just as the computers, tablets
and mobiles do, and thus enabling the monitoring, coordinating or
controlling process across the Internet or another data network.
unit 1 Introduction to IOT
4. Sensing Layer − The first stage of IoT includes
sensors, devices, actuators etc. which collect data
from the physical environment, processes it and then
sends it over the network.
Network Layer − The second stage of the IoT
consists of Network Gateways and Data Acquisition
Systems. DAS converts the analogue data (collected
from Sensors) into Digital Data. It also performs
malware detection and data management.
Data Processing Layer − The third stage of IoT is the most important stage. Here, data is pre-processed
on its variety and separated accordingly. After this, it is sent to Data Centres. Here Edge IT comes into
use.
Application Layer − The fourth stage of IoT consists of Cloud/Data Centres where data is managed and
used by applications like agriculture, defence, health care etc.
IOT ARCHITECTURE
unit 1 Introduction to IOT
5. •
Architectural Overview
• Functional View: Description of what the system does, and its main
functions.
• Information View: Description of the data and information that the
system handles.
• Deployment and Operational View: Description of the main real
world components of the system such as devices, network routers,
servers, etc.
unit 1 Introduction to IOT
6. IOT Functional View
• Device and Application functional group
• Communication functional group
• IoT Service functional group
• Virtual Entity functional group
• Process Management functional group
• Service Organization functional group
• Security functional group
• Management functional group
unit 1 Introduction to IOT
7. IOT Information View
• Virtual Entity context information,
• Virtual Entity descriptions
• Virtual Entity Associations
• IoT Service
• Resource Descriptions
• Device Descriptions
• Descriptions of Composed Services
• IoT Business Process Model describes
unit 1 Introduction to IOT
8. Deployment and Operational view
• Deployment view gives the view of deployments of FCs, such as
objects ( sensors, machines, actuators, devices ), software entities,
such as gateway, firewall, network protocols, management and service
in IoT system.
unit 1 Introduction to IOT
9. Advantages and Disadvantages of IoT
• Cost Reduction − IOT devices catch any problem very fast as compared
to traditional troubleshooting. It not only saves time but also saves costs
of large repairs.
• Efficiency and Productivity − An automated PDF conversion and
creation tool will remove the hustle of PDF editing and archiving.
Hence, increase in Efficiency and Productivity.
• Business Opportunities − IOT provides advanced analytics, smart utility
grids which help Small Management Businesses to provide more
valuable content and things to their customers.
unit 1 Introduction to IOT
10. • Customer Experience − Nowadays customer's experience is the most
valuable thing in running a business. IoT has drastically increased the
customer's experience. An example of customer experience is Home
Automation. Since everything is connected, customers need not have
to worry about appliances. One can turn off the appliance through
mobile.
• Mobility and Agility − With the help of IoT, employees can do their
work from any geographical location, anytime without any
restrictions.
unit 1 Introduction to IOT
11. Disadvantages
Security − The data is travelling all over the Internet. So maintaining its
privacy is still a Big Challenge. End-to-end Encryption is a must in IoT.
Compatibility − There is no International Standard for the monitoring
of the equipment.
Complexity − Most of the devices still contain some software bugs.
Each device must be able to seamlessly interact with other devices in the
network.
Safety − Suppose a patient is left unattended by a doctor. And some
notorious guy changes the prescription or Health monitoring devices
malfunctioned. Then it can result in the death of the patient.
Policies − Government authorities must take some steps to make
policies and standards related to IoT to stop the Black marketing of IoT
devices.
unit 1 Introduction to IOT
12. Design Principles
Basic design principles for IoT architecture design are:
• Open source
• Reuse of resources across application domains and across wide range
of applications
• Design for ensuring the privacy, security and trusted real world
services
• Scalability, performance and effectiveness
• Simplicity of management
• Design of different service delivery models
• Life cycle support
unit 1 Introduction to IOT
13. FOCUS ON VALUE
• Need to find out where lies a problem truly worth solving and what is the real end
user value of the solution
• Need to understand what might be the barriers of adopting the new technology
• The features that might be valuable and highly relevant for the tech early adopters
may be uninteresting for the majority of the users
TAKE A HOLISTIC VIEW
• IoT solutions typically consist of multiple devices with different capabilities so the
solution may also be provided in co-operation with multiple different service
providers.
• Need to take a holistic look across the whole system, the role of each device and
service, and the conceptual model of how user understands and perceives the
system. unit 1 Introduction to IOT
14. PUT SAFETY FIRST
• It is really important for users to feel, that their private data is safe,
their home, working environment and everyday objects cannot be
hacked and their loved ones are not put at risk.
• Quality assurance is critical and it should not only focus on testing the
SW, but on testing the end to end system, in a real-world context.
CONSIDER THE CONTEXT
• Depending on the physical context, the goal might be to minimize
distraction of the user
• e.g. to design devices that hold up against changing weather
conditions.
unit 1 Introduction to IOT
15. BUILD A STRONG BRAND
• Due to the real world context of the IoT solutions, regardless of how
carefully you design things and aim to build trust
• While designing your brand, you must keep in mind, that trust should
be a key element of the brand,
PROTOTYPE EARLY AND OFTEN
• Typically HW and SW have quite different lifespans, but as successful
IoT solution needs both the HW and SW elements, the lifespans
should be aligned
USE DATA RESPONSIBLY
• It’s necessary for the designer to understand the possibilities of data
science and how to make sense of the data. Data science provides a lot
of opportunities to reduce user friction, i.e. reducing use of time,
energy and attention or diminishing stress.
unit 1 Introduction to IOT
16. Needed capabilities
1. Create an enterprise data strategy
• Determining what data they have and how it relates to business goals, identifying
new data sources, ensuring overall data quality
• Understanding how spaces are used allows you to make more informed decisions
about how to grow your organization, plan development, update infrastructure,
and estimate workforce demands
2. Balance structure and flexibility to exploit new opportunities
• IoT can be used to improve existing business processes, but its actual worth is
realized when teams take the time to figure out what's failing and why, fix the
underlying issues, and align all associated processes and workflows to optimize
new IoT value
unit 1 Introduction to IOT
17. 3 Develop specialized talent
• Hire new-skilled employees
• People who can work in an environment marked by constant change, uncertain
outcomes, and a desire to create and optimize business value
4 Harden and evolve security
• Companies must prepare for greater cyberattacks as they implement IoT programs
• The Internet of Things creates security issues. With more endpoints hackers have a
larger attack surface to deal with. The answer is to address security at a large scale
5 Continually consider consumer expectations
• consumer consent to collect only the data they require and then asking for
permission to collect more
• Companies who fail to follow this policy risk losing business if they lose
consumer trust as a result of privacy or security breaches
unit 1 Introduction to IOT
19. Basics of networking
• A computer network is made up of two or more
computers that are linked together by cables (wired)
or Wi-Fi (wireless) in order to transmit, exchange, or
share data and resources
• Hardware (such as routers, switches, access points,
and cables) and software are used to create a
computer network (e.g., operating systems or
business applications).
unit 1 Introduction to IOT
Networking types
1. Wired Networks
Ethernet is the data link protocol used in wired networks. This is unlikely to alter with
the Internet of Things, as most IoT devices will be wireless
20. Wired advantages
• Wireless networks are slower than wired networks. Data rates were
boosted from 10 megabits per second to 1 gigabit per second on a regular
basis. The majority of residential networks use speeds of 10 to 100 Mbps.
• Wireless is less secure
unit 1 Introduction to IOT
21. Disadvantages
• Need to use cable, which is unattractive, difficult to install, and costly.
• It is difficult to utilize between buildings (planning etc.).
• Mobile phones and tablets are not supported.
unit 1 Introduction to IOT
22. 2 Wireless network
• Wi-Fi is the data communication protocol used by wireless networks.
Advantages
• In general, they are easier to set up.
• It operates on both private and public networks.
• There are no cables necessary.
• Mobile phones and tablets are supported.
Disadvantages
• Networks that are wireless are slower than those that are wired.
• Range is a limitation.
• Eavesdropping is possible.
• Depending on the setup, it may not be secure.
unit 1 Introduction to IOT
23. Network topology
• There are a variety of methods for connecting network nodes. This
isn't usually a consideration in small networks, but it becomes
increasingly significant as networks grow larger.
• Wi-Fi, Bluetooth, and other common connection technologies are
intended to work with a specific network layout.
Common are:
• Bus
• Ring
• Mesh
• Star
• Hybrid Each
unit 1 Introduction to IOT
25. unit 1 Introduction to IOT
The following are some terms that are frequently used:
PAN - PAN (Personal Area Network) is a network that connects local devices,
such as a computer to a printer
LAN - The LAN (Local Area Network) connects devices in a single or
multiple offices
MAN - MAN (Metropolitan Area Network) is a network that connects devices
across numerous buildings, such as a campus
WAN - WAN stands for wide area network, and it connects devices across a
country or countries.
27. M2M and IoT Technology Fundamentals
• Machine-to-machine, or M2M, is a broad label that can be used to
describe any technology that enables networked devices to exchange
information and perform actions without the manual assistance of
humans.
• M2M has found applications in field such as healthcare, business, and
insurance. M2M is also the foundation for the internet of things (IoT).
• Example:
• A vending machine can message the distributor's network, or machine,
when a particular item is running low to send a refill
• In telemedicine, M2M devices can enable the real-time monitoring of
patients' vital statistics, dispensing medicine when required, or
tracking healthcare assets.
unit 1 Introduction to IOT
28. Key features of M2M technology include
• Low power consumption, to improve the system's ability to effectively service
M2M applications.
• A network operator that provides packet-switched service
• Monitoring abilities that provide the functionality to detect events
• Time control, meaning data can only be sent or received at specific predetermined
periods.
• Location-specific triggers that alert or wake up devices when they enter particular
areas.
• The ability to continually send and receive small amounts of data.
unit 1 Introduction to IOT
30. Working of M2M Communication
• The main purpose of machine-to-machine technology is to collect sensor data and
transmit it to a network
• The main components of an M2M system include sensors, RFID, a Wi-Fi or
cellular communications link, and autonomic computing software programmed to
help a network device interpret data and make decisions.
M2M Benefits
• Reduced costs by minimizing equipment maintenance and downtime
• Boosted revenue by revealing new business opportunities for servicing
products in the field
• Improved customer service by proactively monitoring and servicing equipment
before it fails or only when it is needed.
unit 1 Introduction to IOT
31. unit 1 Introduction to IOT
M2M requirements
• Scalability - The M2M system should be able to continue to function
efficiently as more connected objects are added.
• Anonymity - The M2M system must be able to hide the identity of an
M2M device when requested, subject to regulatory requirements.
• Logging - M2M systems must support the recording of important
events, such as failed installation attempts, service not operating, or the
occurrence of faulty information.
36. • IoT Gateway is a system for facilitating IoT communication, which is
typically device-to-device or device-to-cloud
• Gateway allows to communicate with devices maintaining security
and providing an admin interface to perform simple tasks.
unit 1 Introduction to IOT
37. IoT Gateway feature set
• Facilitating communication with non-internet connected devices
• Data caching, buffering and streaming
• Data pre-processing, filtering and optimization
• Device to Device communications/M2M
• Networking features and hosting live data
• Security – manage user access and network security features
• Device configuration management
• System diagnostics
unit 1 Introduction to IOT
38. Data management
• Data management is the process of reducing a large amount of data to
the most relevant information
• Intelligent things can gather, transmit, and analyze data, but
aggregating data and drawing inferences, trends, and patterns will
require a tool.
• Embedded system and device developers and manufacturers must
create a data management framework that is interoperable with all
software and hardware involved in data collection, administration, and
distribution.
unit 1 Introduction to IOT
39. Requirement for data management
• Scalability
• Organizations should consider whether their current network and
infrastructure can handle massive data volumes in the long run. They
should also consider which storage solution is best for them: cloud,
data center, data stored at the edge, or a hybrid model
• Data gravity
• Value is created by volume
• Data gravity develops when the volume of IoT data expands. As data
volumes increase, other applications or services can extract value from
it.
unit 1 Introduction to IOT
40. • Integration
• Wired and wireless devices, processors and storage, services,
platforms, and apps are all available to help you turn your connection
into value
• This includes real-time processing of operational data, secure
integration of components and connections within an IoT
environment, and security safeguards that enable enterprises to
connect, harvest, share, and manage data across the whole IoT
network.
• Data management challenges
• It's critical to keep data safe from unauthorized access and alteration
unit 1 Introduction to IOT
41. • Why IoT data management
• Product development
IoT data management can help you recognize and use patterns, which
can then be used in the decision-making process to improve product
design and development.
• Facilitate resource and system efficiency
Data management allows you to have a better understanding of how
customers interact with your products in a consumer IoT context
unit 1 Introduction to IOT
42. • Predict wear and tear of assets
You can utilize the data to see if devices and/or people are acting in
unusual ways and create predictions based on that information
unit 1 Introduction to IOT
43. Business Process in IOT
• Business process is a series of activities or a collection of inter related
structured activities, task or process
• A BP serves a particular goal or specific result or service product
Distributed Business Process is a collection of logically interrelated business
process
• It reduces the complexity and enables faster responses and smaller
processing load at the central BP system
unit 1 Introduction to IOT
44. • Business Intelligence is a process which a business service to extract
new facts and knowledge and the undertake better decisions
• New facts and knowledge follow from the earlier results of data
processing, aggregation and analysing those results
unit 1 Introduction to IOT
47. • Everything as a Service (XaaS):
• refers to the services and apps that users can request on the Internet
• cloud computing terminology
• SaaS (Software-as-a-Service)
• PaaS (Platform-as-a-Service)
• IaaS (Infrastructure –as-a-Service)
48. • Communication-as-a-Service (CaaS)
VoIP (voice over IP or Internet telephony),
IM (instant messaging)
video conference software
• Security-as-a-Service (SECaaS)
Anti-virus software, encryption, authentication,
intrusion detection systems, and other services may
be provided.
49. • Healthcare-as-a-Service (HaaS)
• Online consultations with doctors
• Health monitoring 24/7
• Medicine delivery at your doorstep
• Lab samples collection even at home and delivery of results as soon as they
are ready
• Access to your medical records 24/7
50. • Transportation-as-a-Service (TaaS)
• Mobility and flexibility of traveling over various
distances are important trends in modern civilization.
• Car sharing - You can rent a car from any location using
a special app and drive wherever you need to go, paying
for the time you use the car or the distance you travel.
• Uber taxi services - You hire a cab through an app that
estimates the cost of the journey ahead of time). In the
near future, Uber plans to test flying taxis and selfdriving
planes.
51. • Benefits of XaaS
• Scalability
• Cost and time effectiveness
• Focus on core competencies
• The high quality of services
• Better customer services
52.
53. • Role of Cloud in IoT
• The Internet of Things (IoT) generates a large amount
of data, which is referred to as big data
• Cloud computing, with its various models and
implementation platforms, assists businesses in
managing and analyzing data, hence improving the
overall efficiency and effectiveness of IoT systems.
54. • Cloud Platform for Device Lifecycle Management
• Cloud services (SaaS) enable businesses to create apps and software
that link devices and enable device registration, onboarding, remote
device upgrades, and remote device diagnosis in a fraction of the time
while lowering operating and support expenses.
55. • Internet Cloud+ clients =User application/services
• Cloud platform usages for M2M/IoT
• Data storage
• Data connected to Application Programming Interface(API) for application
• Data connect to the services
• Application/services integrate the data with the enterprise application/services
and gets analysed
unit 1 Introduction to IOT
56. Data collection/storage and computing using
cloud
Methods for data collection and storage
• Devices/sensor networks data collection at the device web servers
• Local files
• Dedicated data store at coordinating node
• Local edge node distributed DBMS files for M2M/IoT devices
network
• Internet connected server
• Internet connected distributed DBMS nodes at an enterprise server or
at data centre
unit 1 Introduction to IOT
57. M2M /IoT device connected PaaS Cloud
unit 1 Introduction to IOT
58. • CISCO IoT PaaS(CIOT)
• It allows a developer to work in familiar Linux Applications
environment
• It provides network connectivity, cyber and physical security and data
analytics
• CISCO Fog provides an ecosystem with the ability to transfer sensor
data and perform control functions with distributed network nodes
unit 1 Introduction to IOT
60. • Amazon simple storage service(S3)
• It is a scalable , high speed, web based cloud storage service designed
for online backup and archiving of data and application on AWS
unit 1 Introduction to IOT
61. TCS Connected universe PaaS
• Connected Universe Platform(CUP) offers connectivity to customers,
Mobile app, etc
• CUP provides data processing functions and data analytics in BPs,
intelligence and knowledge discovery
• It is a scalable platform for sensor data storage and real time data
processing
• It makes it easy to develop and deploy software applications
unit 1 Introduction to IOT
62. Security Aspects in IoT
• Five functional components of security are defined in IoT
• Identity Management
• Authentication
• Authorisation
• Key exchange and management
• Trust and reputation
unit 1 Introduction to IOT
63. • Identity Management
• Source of message need to specify an identity when sending message
• Messages can be from sensors, actuators, platforms etc and needed to
connect to several applications/services
• MAC address specify the identity of computing device platform
• Universal Resource Identifier(URL) can be used in internet
• In IoT applications Object identifiers are used
• E.g.: Type of things (ATM,RFID)
• Instance identifier VIN(Vehicle Identify Number)
unit 1 Introduction to IOT
64. Authentication
• A hash function gives irreversible result after many operations on
input
• The operations generate a 128 or 256 bit hash value using
authentication data and secret keys as input
• Receiver end receives the hash value and compares with stored value
• If both are equal then sender is authenticated
unit 1 Introduction to IOT
65. Authorisation
• Access control allows only authorised device or application /service to
a resource such as web API input, IoT device, Sensor or actuator data
• Data authorisation model
• Access Control List for coarse grain access control
• Role based access control for fine grain access control
• Attribute based access control for other capability based system
access control
unit 1 Introduction to IOT
66. Key Exchange and Management
• Key of sender messages need to be known to receiver for accessing the
received data
• The key need to be exchange before the communication of
authentication code, authorisation command encrypted message
unit 1 Introduction to IOT
67. • Message Integrity
• When communication takes place the message should remains
unchanged
• Encrypted data after decrypting should be identical to one before
encryption
unit 1 Introduction to IOT
68. Do not put any sensitive business or personal information in the cloud.
• No passwords should be stored on your IoT device or in the cloud.
• Installing malware without first validating its legitimacy is a bad
idea.
• Always get third-party software from reputable and trustworthy
sources.
• Do not be in a hurry to start utilizing your IoT gadget; instead,
protect it with anti-malware and anti-virus software.
• If feasible, change the password on your IoT device on a frequent
basis to boost security.
• If your home network is less secure than your office network, don't
bring any important business material home to rework.
unit 1 Introduction to IOT
69. Do not keep sensitive information on readily hacked storage devices or
in public storage facilities.
Furthermore, avoid using a public WiFi network for such tasks. • Turn
down unneeded IoT devices in
• your home network since they are exposed to hackers. When not in
use, for example, turn off IoT-enabled thermostats. •
• When you don't need internet connectivity, turn off the wifi on your
smartphone. This is because it has been discovered that passwords and
location information from
•
unit 1 Introduction to IOT
70. smartphone-based fitness apps can be easily leaked through public wifi
networks.
• Companies in the business, finance, and banking sectors should keep
and retain data until it is needed. To reduce the risk of hacking, they
should be erased after they are no longer needed
unit 1 Introduction to IOT
71. unit 1 Introduction to IOT
•
Regular software fixes for smart watches, IoT sensors, IoT gadgets,
and healthcare apps on smartphones should be provided by IoT
service providers.
This improves the security of IoT devices.
These fixes should be able to handle the most recent and
contemporary malware and viruses.