Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
IoT.ppt
1.
2. Team Members
• Kundan Kumar(CSE/15/45)
• Diksha Gupta(CSE/15/47)
• Subhasis Daripa(CSE/15/48)
• Sudeep Biswas(CSE/15/49)
• Binit Mondal(CSE/15/50)
• Anisha Dutta(CSE/15/51)
• Sukalyan Dash(CSE/15/52)
3. Acknowledgment
We are grateful to our Respectable teacher, Mrs.Nira
Konar Ma’am, Mr.Ayushman Banerjee Sir and
Mr.Joydeep Chakraborty Sir whose insightful
leadership and knowledge benefited us to steer out
this project successfully; Thank you for your
continuing support for our important work in this
field!
We would also like to underscore dynamic efforts of
the teamwork and their expert advice and
contributions to the preparation of this report.
4. Plan of Presentation
What is Internet of Things?
History
Why IoT?
Components of IoT
How IoT Works?
Few Applications of IoT
Current Status & Future Prospect of IoT
Technological Challenges of IoT
Criticisms & Controversies of IoT
5. What is Internet of Things?
The Internet of Things is the network of physical
devices, vehicles, home appliances and other
items embedded with electronics, software, sens
ors, actuators, and connectivity which enables
these objects to connect and exchange data.
The IoT allows objects to be sensed or controlled
remotely across existing network infrastructure,
creating opportunities for more direct integration
of the physical world into computer-based
systems, and resulting in improved efficiency,
accuracy and economic benefit
6. History
• 1.The term Internet of Things is 19 years old. But the actual idea of
connected devices had been around longer, at least since the 70s.
Back then, the idea was often called “embedded internet” or
“pervasive computing”. But the actual term “Internet of Things”
was coined by Kevin Ashton in 1999 during his work at
Procter&Gamble
• 2. 2000: Starting off what is now becoming a meme, LG announces
it's first Internet refrigerator plans.
• 3. 2003-2004: The term is mentioned in main-stream publications
like The Guardian, Scientific American and the Boston Globe.
• 4. 2005: The IoT hit another level when the UN's International
Telecommunications Union ITU published its first report on the
topic.
5. 2006-2008: Recognition by the EU, and the First European IOT
conference is held.
7. Why IoT?
Dynamic control of industry and daily life.
Improves the resource utilization ratio.
Integrating human society and physical systems.
Flexible configuration.
Acts as technology integrator.
Universal inter-networking.
8. Components of IoT
• SmartSystemsand Internet of Thingsare driven
by acombination of:
1) Sensors
2) Connectivity
3) People& Processes
9. How IoT works?
• Internet of Things is not the result of a single novel
technology; instead, several complementary technical
developments provide capabilities that taken together help to
bridge the gap between the virtual and physical world.
• These capabilities include:
Communication and cooperation
Addressability
Identification
Sensing
Actuation
Embedded information processing
Localization
User interfaces
14. TECHNOLOGICAL CHALLENGES OF IOT
• SECURITY CHALLENGES
• PRIVACY CHALLENGES
• CONNECTIVITY CHALLENGES
• COMPATIBILITY AND LONGEVITY CHALLENGES
15. SECURITY CHALLENGES
• Hacking of baby monitors, smart fridges, Barbie dolls,
drug infusion pumps, cameras and even assault rifles are
portending a security nightmare being caused by the
future of IoT.
• Our very lives and health can become the target of IoT
hack attacks, as was shown in the hacking of
pacemakers.
• Critical city infrastructure can also become a target, as
the Ukraine power grid hack warned us last year.
16. PRIVACY CHALLENGES
• The necessary precautions aren’t taken when storing
the data or sharing it with other service providers.
• Data generated about a single appliance (such as a
smart toaster) might not be sensitive per-se, yet
when combined with data from other devices, it can
reveal information such as the consumer’s life
pattern, which can become very damaging if they fall
into the hands of the wrong people.
• In many cases, criminals don’t even need to pry into
your encrypted communications in order to obtain
the information they want.
17. CONNECTIVITY CHALLENGES
• Connecting so many devices will be one of the
biggest challenges of the future of IoT, and it
will defy the very structure of current
communication models and the underlying
technologies.
• Systems will require huge investments and
spending in maintaining cloud servers that can
handle large amounts of information exchange,
and entire systems can go down if the server
becomes unavailable.
18. COMPATIBILITY AND LONGEVITY
CHALLENGES
• Compatibility issues stem from non-unified cloud
services, lack of standardized M2M protocols and
diversities in firmware and operating systems among
IoT devices.
• As an industry that is going through its baby steps,
IoT is growing in many different directions, with
many different technologies competing to become
the standard. This will cause difficulties and require
the deployment of extra hardware and software
when connecting devices.
20. WIDESPREAD CRITICISM
A different criticism is that the Internet of
Things is being developed rapidly without
appropriate consideration of the profound
security challenges involved and the
regulatory changes that might be necessary.
In particular, as the Internet of Things spreads
widely, cyber-attacks are likely to become an
increasingly physical (rather than simply
virtual) threat.
21. The Mirai Botnet (aka Dyn Attack)
Back in October of 2016, the largest DDoS attack ever was
launched on service provider Dyn using an IoT botnet. This
lead to huge portions of the internet going down, including
Twitter, the Guardian, Netflix, Reddit, and CNN.
This IoT botnet was made possible by malware called Mirai.
Once infected with Mirai, computers continually search the
internet for vulnerable IoT devices and then use known
default usernames and passwords to login, infecting them
with malware. These devices were things like digital cameras
and DVR players.
22. The Hackable Cardiac Devices from
St. Jude
Early this year, CNN wrote, “The FDA confirmed that St. Jude
Medical which makes heart implants, has implantable cardiac
devices having vulnerabilities that could allow a hacker to
access a device. Once in, they could deplete the battery or
administer incorrect pacing or shocks, the FDA said.
The devices, like pacemakers and defibrillators, are used to
monitor and control patients’ heart functions and prevent heart
attacks.”
The article continued to say, “The vulnerability occurred in the
transmitter that reads the device’s data and remotely shares it
with physicians. The FDA said hackers could control a device by
accessing its transmitter.”
23. The Owlet WiFi Baby Heart Monitor
Vulnerabilities
Right behind the St. Jude cardiac devices is the Owlet WiFi baby
heart monitor. According to Cesare Garlati, Chief Security
Strategist at the prpl Foundation:
“This latest case is another example of how devices with the
best of intentions, such as alerting parents when their babies
experience heart troubles, can turn dangerous if taken
advantage of by a sinister party.
Sadly, this is more often than not in the case of embedded
computing within so-called smart devices. The connectivity
element makes them exploitable and if manufacturers and
developers don’t consider this and take extra steps to secure
devices at the hardware layer, these are stories that we will,
unfortunately, keep hearing.”
24. The Jeep Hack
The IBM SecurityIntelligence website reported the Jeep
hack a few years ago, saying, “It was just one, but it was
enough. In July [2015], a team of researchers was able to
take total control of a Jeep SUV using the vehicle’s CAN bus.
By exploiting a firmware update vulnerability, they hijacked
the vehicle over the Sprint cellular network and discovered
they could make it speed up, slow down and even veer off
the road. It’s proof of concept for emerging Internet of
Things (IoT) hacks: While companies often ignore the
security of peripheral devices or networks, the
consequences can be disastrous.”