SlideShare a Scribd company logo
1 of 26
Vishal Choudhary
vishalhim@yahoo.com
IOT- ARCHITECTURE
 Internet of Things (IoT) according to the 2020
conceptual framework is expressed through a
simple formula
IoT= Services+ Data+ Networks + Sensors
the term IoT is a worldwide network of intelligent
objects that are interconnected and uniquely
represent able on the basis of communication-
based protocols
The Internet of things’ objects enable the connection
with internet to work anytime, anywhere and anyplace
The IoT four key technological enablers are: -
 For tagging the things RFID technology used
 For sensing the things sensor technology used
 For thinking the things smart technology used
 For shrinking the things Nanotechnology used
ARCHITECTURE
The Internet of Things is considered as the third
wave of the World Wide Web (WWW) after static
web pages and social networking’s based web. The
IoT is a worldwide network that connects different
type of objects at anytime and anywhere via a
popular internet protocol named Internet Protocol(IP)
Conventional IoT architecture
it is considered as three layers: -
 Perception Layer
 Network Layer
 Application Layer
IOT Architecture
Perception layer
The perception layer is the lowest layer of the conventional architecture of
IoT. This layer’s main responsibility is to collect useful information/data
from things or the environment (such as WSN, heterogeneous devices,
sensors type real world objects, humidity, and temperature etc.) and
transform them in a digital setup. The main purpose of objects is unique
address identification and communication between short-range technologies
such as RFID, Bluetooth, Near-Field Communication (NFC), 6LoWPAN
(Low Power Personal Area Network)
Network layer
This layer’s main responsibility is to help and secure data transmission
between the application and perception layer of IoT architecture .This
layer mainly collects information and delivers to the perception layer
toward several applications and servers. Basically, this layer is a
convergence of internet and communication-based networks.
It is the core layer (network layer) of IoT that is capable of advancing
the information for relevant procedures. The data processing relevant
tasks handled IoT management. This layer also ensures unique
addressing and routing abilities to the unified integration of uncountable
devices in a single cooperative network. Various types of technologies
are contributed for this phenomenon such as wired, wireless and
satellite. The implementation of 6LoWPAN protocol towards IPV6 for
Application layer
The application layer is considered as a top layer of conventional IoT
architecture. This layer provides the personalized based services
according to user relevant needs . This layer’s main responsibility is
to link the major gap between the users and applications. This IoT
layer combines the industry to attain the high-level intelligent
applications type solutions such as the disaster monitoring, health
monitoring, transposition, fortune, medical and ecological
environment, and handled global management relevant to all
intelligent type applications.
Three layers model is further divided
into five layers
1. The bottom layer of IoT architecture perception layer represents
an object layer. The object layer’s main responsibility is to collect
data from different heterogeneous category devices and then
process and digitize the data. It also transfers the processed data
into upper layers of IoT architecture.
2. The middle layer of conventional IoT architecture network layer
represents an object abstraction layer. The object abstraction layer
acts as a mediating layer between service management and the
object layer. In object abstraction, RFID, WIFI and Third
Generation (3G) communication technologies are used.
3. The service management layer’s main responsibilities are facilitating
information processing, decision-making, and control of pairing
requestor information processing for relevant tasks.
4. The application layer provides the customers with smart high-quality
facilities according to the pre-request of the customers.
5. The Business layer represents the business model and data that’s
been received from the application layer
IoT Security
The IoT security is dependent on three things data confidentiality,
privacy, and trust. The IoT security goals are achieved in a better
way if the three things are utilized for all of the users of IoT efficient
and reliable way.
 The IoT architecture layers all faced security issues in term of
security attacks. The security requirements are different according to
different applications. The IoT architectures’ top layer of the
application layers’ main security issues til today are data sharing that
protect user privacy and access controls. The other attacks also
faced on application layers include phishing, malware attack.
 The IoT architecture core network layer faced main security
challenges like integrity and confidential data. The other problems on
the network layer are Denial of Services (DoS), eavesdropping, a
man in the middle, heterogeneity, RFID interference, Node jamming
 The IoT architectures’ lowest layer, the perception layer, faces the
major security challenge of cyber-attack. The other attacks faced in
the perception layer are a fake node, malicious code injection,
protection of sensor data, side channel attack.These attacks destroy
any type of applications in IoT architecture if proper security
mechanism, algorithms, and technologies are not implemented in
time. The researchers analyzed the IoT architecture layers high
impact on security attacks are node tempering, fake node, malicious
code based injection, heterogeneity type of network problem, data
access and authentication problem,
IOT Security Requirement
 That the application layer security requirements are authentication and
key management, privacy protection and management.
 The network layer security requirements are identity authentication,
encryption mechanism, and communication security.
 The perception layer security requirements are lightweight encryption
technology, protection sensor data, and key management.
 The IoT security challenges involved different encryption mechanisms such as end-to-
end encryption and hop encryption. The IoT security challenges involved different
communication protocols such as Transport Layer Security (TLS), Secure Socket Layer
(SSL), Internet Protocol Security (IPSec). The IoT security challenges are controlled
through the implement action of cryptographic algorithms such Advance Encryption
Standard (AES) for confidentiality, Rivest Shamir Adelman (RSA) for the digital signature
of the key, Diffi-Hellman (DH) for key agreement and Secure Hash Algorithm (SHA) for
integrity
Elements of IoT architecture
Things
A “thing” is an object equipped with sensors that gather data which
will be transferred over a network and actuators that allow things to
act (for example, to switch on or off the light, to open or close a door,
to increase or decrease engine rotation speed and more). This
concept includes fridges, street lamps, buildings, vehicles,
production machinery, rehabilitation equipment and everything else
imaginable. Sensors are not in all cases physically attached to the
things: sensors may need to monitor, for example, what happens in
the closest environment to a thing.
Gateway
Data goes from things to the cloud and vice versa through the
gateways. A gateway provides connectivity between things and the
cloud part of the IoT solution, enables data preprocessing and
filtering before moving it to the cloud (to reduce the volume of data
for detailed processing and storing) and transmits control commands
going from the cloud to things. Things then execute commands using
their actuators.
Streaming Data Processor
Ensures effective transition of input data to a data lake and
control applications. No data can be occasionally lost or
corrupted.
Data Lake
A data lake is used for storing the data generated by connected
devices in its natural format. Big data comes in "batches" or
in “streams”. When the data is needed for meaningful insights it’s
extracted from a data lake and loaded to a big data warehouse.
Big Data Warehouse
Filtered and preprocessed data needed for meaningful insights is
extracted from a data lake to a big data warehouse. A big data
warehouse contains only cleaned, structured and matched data
(compared to a data lake which contains all sorts of data generated
by sensors). Also, data warehouse stores context information about
things and sensors (for example, where sensors are installed) and
the commands control applications send to things.
Data analysts
Data analysts can use data from the big data warehouse to find
trends and gain actionable insights. When analyzed (and in many
cases – visualized in schemes, diagrams, info graphics) big data
show, for example, the performance of devices, help identify
inefficiencies and work out the ways to improve an IoT system (make
it more reliable, more customer-oriented). Also, the correlations and
patterns found manually can further contribute to creating algorithms
for control applications.
Machine learning and the models ML
generates
With machine learning, there is an opportunity to create more
precise and more efficient models for control applications.
Models are regularly updated (for example, once in a week or
once in a month) based on the historical data accumulated in a
big data warehouse. When the applicability and efficiency of new
models are tested and approved by data analysts, new models
are used by control applications.
Control application
Send automatic commands and alerts to actuators, for example:
 Windows of a smart home can receive an automatic command to open or close
depending on the forecasts taken from the weather service.
 When sensors show that the soil is dry, watering systems get an automatic command
to water plants.
 Sensors help monitor the state of industrial equipment, and in case of a pre-failure
situation, an IoT system generates and sends automatic notifications to field
engineers.
 Control applications can be either rule-based or machine-learning based. In the first
case, control apps work according to the rules stated by specialists. In the second
case, control apps are using models which are regularly updated (once in a week,
once in a month depending on the specifics of an IoT system) with the historical data
stored in a big data warehouse.
Users applications
a software component of an IoT system which enables the
connection of users to an IoT system and gives the options to
monitor and control their smart things (while they are connected
to a network of similar things, for example, homes or cars and
controlled by a central system). With a mobile or web app, users
can monitor the state of their things, send commands to control
applications, set the options of automatic behavior (automatic
notifications and actions when certain data comes from sensors).
Conclusion
 Things equipped with sensors to gather data
and actuators to perform commands received from the cloud.
 Gateways for data filtering, preprocessing and moving it to the
cloud and vice versa, – receiving commands from the cloud.
 Cloud gateways to ensure data transition between field
gateways and central IoT servers.
 Streaming data processors to distribute the data coming
from sensors among relevant IoT solution’s components.
 Data lake for storing all the data of defined and undefined
value.
 Big data warehouse for collecting valuable data.
 Control applications to send commands to actuators.
 Machine learning to generate the models which are then
used by control applications.
 User applications to enable users to monitor control their
connected things.
 Data analytics for manual data processing.

More Related Content

What's hot

IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019 IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019
Tonex
 

What's hot (20)

Machine Learning and Internet of Things
Machine Learning and Internet of ThingsMachine Learning and Internet of Things
Machine Learning and Internet of Things
 
Top 5 IoT Use Cases
Top 5 IoT Use CasesTop 5 IoT Use Cases
Top 5 IoT Use Cases
 
IoT Based Weather Monitoring System for Effective Analytics
IoT Based Weather Monitoring System for Effective AnalyticsIoT Based Weather Monitoring System for Effective Analytics
IoT Based Weather Monitoring System for Effective Analytics
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
security and privacy-Internet of things
security and privacy-Internet of thingssecurity and privacy-Internet of things
security and privacy-Internet of things
 
Introduction to Node MCU
Introduction to Node MCUIntroduction to Node MCU
Introduction to Node MCU
 
Iot architecture
Iot architectureIot architecture
Iot architecture
 
IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019 IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019
 
IOT gateways.pptx
IOT gateways.pptxIOT gateways.pptx
IOT gateways.pptx
 
Security challenges in IoT
Security challenges in IoTSecurity challenges in IoT
Security challenges in IoT
 
Iot architecture
Iot architectureIot architecture
Iot architecture
 
Real Time Systems & RTOS
Real Time Systems & RTOSReal Time Systems & RTOS
Real Time Systems & RTOS
 
A basic PPT on Internet Of Things(IOT)
A basic PPT on Internet Of Things(IOT)A basic PPT on Internet Of Things(IOT)
A basic PPT on Internet Of Things(IOT)
 
Introduction to Internet of Things Hardware
Introduction to Internet of Things HardwareIntroduction to Internet of Things Hardware
Introduction to Internet of Things Hardware
 
Smart home Environment using iot
Smart home Environment using iotSmart home Environment using iot
Smart home Environment using iot
 
The Internet of Things (IoT) and cybersecurity: A secure-by-design approach
The Internet of Things (IoT) and cybersecurity: A secure-by-design approachThe Internet of Things (IoT) and cybersecurity: A secure-by-design approach
The Internet of Things (IoT) and cybersecurity: A secure-by-design approach
 
Introduction to IOT
Introduction to IOTIntroduction to IOT
Introduction to IOT
 
Components of IOT Implementation
Components of IOT ImplementationComponents of IOT Implementation
Components of IOT Implementation
 
netconf and yang
netconf and yangnetconf and yang
netconf and yang
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
 

Similar to Lecture 11

OCS352-IOT -UNIT-1.pdf
OCS352-IOT -UNIT-1.pdfOCS352-IOT -UNIT-1.pdf
OCS352-IOT -UNIT-1.pdf
gopinathcreddy
 
Unit 3 - Internet of Things - www.rgpvnotes.in.pdf
Unit 3 - Internet of Things - www.rgpvnotes.in.pdfUnit 3 - Internet of Things - www.rgpvnotes.in.pdf
Unit 3 - Internet of Things - www.rgpvnotes.in.pdf
ShubhamYadav73126
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscape
Samir SEHIL
 

Similar to Lecture 11 (20)

Security Issues & Threats in IoT Infrastructure
Security Issues & Threats in IoT InfrastructureSecurity Issues & Threats in IoT Infrastructure
Security Issues & Threats in IoT Infrastructure
 
15CS81 Module1 IoT
15CS81 Module1 IoT15CS81 Module1 IoT
15CS81 Module1 IoT
 
Lec2.pptx
Lec2.pptxLec2.pptx
Lec2.pptx
 
Lec2.pptx
Lec2.pptxLec2.pptx
Lec2.pptx
 
OCS352-IOT -UNIT-1.pdf
OCS352-IOT -UNIT-1.pdfOCS352-IOT -UNIT-1.pdf
OCS352-IOT -UNIT-1.pdf
 
IoT architecture.pptx
IoT architecture.pptxIoT architecture.pptx
IoT architecture.pptx
 
Challenges and application of Internet of Things
Challenges and application of Internet of ThingsChallenges and application of Internet of Things
Challenges and application of Internet of Things
 
Internet of things chapter2.pdf
Internet of things chapter2.pdfInternet of things chapter2.pdf
Internet of things chapter2.pdf
 
IOT_UNIT-1.pptx
IOT_UNIT-1.pptxIOT_UNIT-1.pptx
IOT_UNIT-1.pptx
 
Unit 3 - Internet of Things - www.rgpvnotes.in.pdf
Unit 3 - Internet of Things - www.rgpvnotes.in.pdfUnit 3 - Internet of Things - www.rgpvnotes.in.pdf
Unit 3 - Internet of Things - www.rgpvnotes.in.pdf
 
IoT [Internet of Things]
IoT [Internet of Things]IoT [Internet of Things]
IoT [Internet of Things]
 
Unit_1_IOT_INTRO.pptx
Unit_1_IOT_INTRO.pptxUnit_1_IOT_INTRO.pptx
Unit_1_IOT_INTRO.pptx
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscape
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Emerging chapter 4.pptx
Emerging chapter 4.pptxEmerging chapter 4.pptx
Emerging chapter 4.pptx
 
AGI Part 4.pdf
AGI Part 4.pdfAGI Part 4.pdf
AGI Part 4.pdf
 
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdfHOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
 
Module 1 Internet of Things (2).ppt.pdf on iot
Module 1 Internet of Things (2).ppt.pdf on iotModule 1 Internet of Things (2).ppt.pdf on iot
Module 1 Internet of Things (2).ppt.pdf on iot
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
 

More from vishal choudhary

More from vishal choudhary (20)

SE-Lecture1.ppt
SE-Lecture1.pptSE-Lecture1.ppt
SE-Lecture1.ppt
 
SE-Testing.ppt
SE-Testing.pptSE-Testing.ppt
SE-Testing.ppt
 
SE-CyclomaticComplexityand Testing.ppt
SE-CyclomaticComplexityand Testing.pptSE-CyclomaticComplexityand Testing.ppt
SE-CyclomaticComplexityand Testing.ppt
 
SE-Lecture-7.pptx
SE-Lecture-7.pptxSE-Lecture-7.pptx
SE-Lecture-7.pptx
 
Se-Lecture-6.ppt
Se-Lecture-6.pptSe-Lecture-6.ppt
Se-Lecture-6.ppt
 
SE-Lecture-5.pptx
SE-Lecture-5.pptxSE-Lecture-5.pptx
SE-Lecture-5.pptx
 
XML.pptx
XML.pptxXML.pptx
XML.pptx
 
SE-Lecture-8.pptx
SE-Lecture-8.pptxSE-Lecture-8.pptx
SE-Lecture-8.pptx
 
SE-coupling and cohesion.ppt
SE-coupling and cohesion.pptSE-coupling and cohesion.ppt
SE-coupling and cohesion.ppt
 
SE-Lecture-2.pptx
SE-Lecture-2.pptxSE-Lecture-2.pptx
SE-Lecture-2.pptx
 
SE-software design.ppt
SE-software design.pptSE-software design.ppt
SE-software design.ppt
 
SE1.ppt
SE1.pptSE1.ppt
SE1.ppt
 
SE-Lecture-4.pptx
SE-Lecture-4.pptxSE-Lecture-4.pptx
SE-Lecture-4.pptx
 
SE-Lecture=3.pptx
SE-Lecture=3.pptxSE-Lecture=3.pptx
SE-Lecture=3.pptx
 
Multimedia-Lecture-Animation.pptx
Multimedia-Lecture-Animation.pptxMultimedia-Lecture-Animation.pptx
Multimedia-Lecture-Animation.pptx
 
MultimediaLecture5.pptx
MultimediaLecture5.pptxMultimediaLecture5.pptx
MultimediaLecture5.pptx
 
Multimedia-Lecture-7.pptx
Multimedia-Lecture-7.pptxMultimedia-Lecture-7.pptx
Multimedia-Lecture-7.pptx
 
MultiMedia-Lecture-4.pptx
MultiMedia-Lecture-4.pptxMultiMedia-Lecture-4.pptx
MultiMedia-Lecture-4.pptx
 
Multimedia-Lecture-6.pptx
Multimedia-Lecture-6.pptxMultimedia-Lecture-6.pptx
Multimedia-Lecture-6.pptx
 
Multimedia-Lecture-3.pptx
Multimedia-Lecture-3.pptxMultimedia-Lecture-3.pptx
Multimedia-Lecture-3.pptx
 

Recently uploaded

Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answers
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 

Lecture 11

  • 2.  Internet of Things (IoT) according to the 2020 conceptual framework is expressed through a simple formula IoT= Services+ Data+ Networks + Sensors the term IoT is a worldwide network of intelligent objects that are interconnected and uniquely represent able on the basis of communication- based protocols
  • 3. The Internet of things’ objects enable the connection with internet to work anytime, anywhere and anyplace The IoT four key technological enablers are: -  For tagging the things RFID technology used  For sensing the things sensor technology used  For thinking the things smart technology used  For shrinking the things Nanotechnology used
  • 4. ARCHITECTURE The Internet of Things is considered as the third wave of the World Wide Web (WWW) after static web pages and social networking’s based web. The IoT is a worldwide network that connects different type of objects at anytime and anywhere via a popular internet protocol named Internet Protocol(IP)
  • 5. Conventional IoT architecture it is considered as three layers: -  Perception Layer  Network Layer  Application Layer
  • 7. Perception layer The perception layer is the lowest layer of the conventional architecture of IoT. This layer’s main responsibility is to collect useful information/data from things or the environment (such as WSN, heterogeneous devices, sensors type real world objects, humidity, and temperature etc.) and transform them in a digital setup. The main purpose of objects is unique address identification and communication between short-range technologies such as RFID, Bluetooth, Near-Field Communication (NFC), 6LoWPAN (Low Power Personal Area Network)
  • 8. Network layer This layer’s main responsibility is to help and secure data transmission between the application and perception layer of IoT architecture .This layer mainly collects information and delivers to the perception layer toward several applications and servers. Basically, this layer is a convergence of internet and communication-based networks. It is the core layer (network layer) of IoT that is capable of advancing the information for relevant procedures. The data processing relevant tasks handled IoT management. This layer also ensures unique addressing and routing abilities to the unified integration of uncountable devices in a single cooperative network. Various types of technologies are contributed for this phenomenon such as wired, wireless and satellite. The implementation of 6LoWPAN protocol towards IPV6 for
  • 9. Application layer The application layer is considered as a top layer of conventional IoT architecture. This layer provides the personalized based services according to user relevant needs . This layer’s main responsibility is to link the major gap between the users and applications. This IoT layer combines the industry to attain the high-level intelligent applications type solutions such as the disaster monitoring, health monitoring, transposition, fortune, medical and ecological environment, and handled global management relevant to all intelligent type applications.
  • 10. Three layers model is further divided into five layers 1. The bottom layer of IoT architecture perception layer represents an object layer. The object layer’s main responsibility is to collect data from different heterogeneous category devices and then process and digitize the data. It also transfers the processed data into upper layers of IoT architecture. 2. The middle layer of conventional IoT architecture network layer represents an object abstraction layer. The object abstraction layer acts as a mediating layer between service management and the object layer. In object abstraction, RFID, WIFI and Third Generation (3G) communication technologies are used.
  • 11. 3. The service management layer’s main responsibilities are facilitating information processing, decision-making, and control of pairing requestor information processing for relevant tasks. 4. The application layer provides the customers with smart high-quality facilities according to the pre-request of the customers. 5. The Business layer represents the business model and data that’s been received from the application layer
  • 12. IoT Security The IoT security is dependent on three things data confidentiality, privacy, and trust. The IoT security goals are achieved in a better way if the three things are utilized for all of the users of IoT efficient and reliable way.
  • 13.  The IoT architecture layers all faced security issues in term of security attacks. The security requirements are different according to different applications. The IoT architectures’ top layer of the application layers’ main security issues til today are data sharing that protect user privacy and access controls. The other attacks also faced on application layers include phishing, malware attack.  The IoT architecture core network layer faced main security challenges like integrity and confidential data. The other problems on the network layer are Denial of Services (DoS), eavesdropping, a man in the middle, heterogeneity, RFID interference, Node jamming
  • 14.  The IoT architectures’ lowest layer, the perception layer, faces the major security challenge of cyber-attack. The other attacks faced in the perception layer are a fake node, malicious code injection, protection of sensor data, side channel attack.These attacks destroy any type of applications in IoT architecture if proper security mechanism, algorithms, and technologies are not implemented in time. The researchers analyzed the IoT architecture layers high impact on security attacks are node tempering, fake node, malicious code based injection, heterogeneity type of network problem, data access and authentication problem,
  • 15. IOT Security Requirement  That the application layer security requirements are authentication and key management, privacy protection and management.  The network layer security requirements are identity authentication, encryption mechanism, and communication security.  The perception layer security requirements are lightweight encryption technology, protection sensor data, and key management.  The IoT security challenges involved different encryption mechanisms such as end-to- end encryption and hop encryption. The IoT security challenges involved different communication protocols such as Transport Layer Security (TLS), Secure Socket Layer (SSL), Internet Protocol Security (IPSec). The IoT security challenges are controlled through the implement action of cryptographic algorithms such Advance Encryption Standard (AES) for confidentiality, Rivest Shamir Adelman (RSA) for the digital signature of the key, Diffi-Hellman (DH) for key agreement and Secure Hash Algorithm (SHA) for integrity
  • 16. Elements of IoT architecture
  • 17. Things A “thing” is an object equipped with sensors that gather data which will be transferred over a network and actuators that allow things to act (for example, to switch on or off the light, to open or close a door, to increase or decrease engine rotation speed and more). This concept includes fridges, street lamps, buildings, vehicles, production machinery, rehabilitation equipment and everything else imaginable. Sensors are not in all cases physically attached to the things: sensors may need to monitor, for example, what happens in the closest environment to a thing.
  • 18. Gateway Data goes from things to the cloud and vice versa through the gateways. A gateway provides connectivity between things and the cloud part of the IoT solution, enables data preprocessing and filtering before moving it to the cloud (to reduce the volume of data for detailed processing and storing) and transmits control commands going from the cloud to things. Things then execute commands using their actuators.
  • 19. Streaming Data Processor Ensures effective transition of input data to a data lake and control applications. No data can be occasionally lost or corrupted.
  • 20. Data Lake A data lake is used for storing the data generated by connected devices in its natural format. Big data comes in "batches" or in “streams”. When the data is needed for meaningful insights it’s extracted from a data lake and loaded to a big data warehouse.
  • 21. Big Data Warehouse Filtered and preprocessed data needed for meaningful insights is extracted from a data lake to a big data warehouse. A big data warehouse contains only cleaned, structured and matched data (compared to a data lake which contains all sorts of data generated by sensors). Also, data warehouse stores context information about things and sensors (for example, where sensors are installed) and the commands control applications send to things.
  • 22. Data analysts Data analysts can use data from the big data warehouse to find trends and gain actionable insights. When analyzed (and in many cases – visualized in schemes, diagrams, info graphics) big data show, for example, the performance of devices, help identify inefficiencies and work out the ways to improve an IoT system (make it more reliable, more customer-oriented). Also, the correlations and patterns found manually can further contribute to creating algorithms for control applications.
  • 23. Machine learning and the models ML generates With machine learning, there is an opportunity to create more precise and more efficient models for control applications. Models are regularly updated (for example, once in a week or once in a month) based on the historical data accumulated in a big data warehouse. When the applicability and efficiency of new models are tested and approved by data analysts, new models are used by control applications.
  • 24. Control application Send automatic commands and alerts to actuators, for example:  Windows of a smart home can receive an automatic command to open or close depending on the forecasts taken from the weather service.  When sensors show that the soil is dry, watering systems get an automatic command to water plants.  Sensors help monitor the state of industrial equipment, and in case of a pre-failure situation, an IoT system generates and sends automatic notifications to field engineers.  Control applications can be either rule-based or machine-learning based. In the first case, control apps work according to the rules stated by specialists. In the second case, control apps are using models which are regularly updated (once in a week, once in a month depending on the specifics of an IoT system) with the historical data stored in a big data warehouse.
  • 25. Users applications a software component of an IoT system which enables the connection of users to an IoT system and gives the options to monitor and control their smart things (while they are connected to a network of similar things, for example, homes or cars and controlled by a central system). With a mobile or web app, users can monitor the state of their things, send commands to control applications, set the options of automatic behavior (automatic notifications and actions when certain data comes from sensors).
  • 26. Conclusion  Things equipped with sensors to gather data and actuators to perform commands received from the cloud.  Gateways for data filtering, preprocessing and moving it to the cloud and vice versa, – receiving commands from the cloud.  Cloud gateways to ensure data transition between field gateways and central IoT servers.  Streaming data processors to distribute the data coming from sensors among relevant IoT solution’s components.  Data lake for storing all the data of defined and undefined value.  Big data warehouse for collecting valuable data.  Control applications to send commands to actuators.  Machine learning to generate the models which are then used by control applications.  User applications to enable users to monitor control their connected things.  Data analytics for manual data processing.