2. Introduction
Internet of things (IoT)
How IoT works?
Technologies in IoT
Applications of IoT
Challenges & Threats
References
3. With the emerging trends in technologies we human beings want secure, comfort life at our command.
Internet of Things (IoT) makes our world interactive.
Today, we almost have internet infrastructure everywhere and we can use it whenever.
IoT establish advanced connectivity among embedded computing devices such as MP3 players, traffic
lights, microwave ovens, washing machines and dishwashers, GPS or services in order to make
automation in all areas.
Currently we have around 8 billion devices connected through IoT.
Recent researches shows by 2020 we have over 20 billion devices which uses IoT.
4. The Internet of Things in its most basic form is
connecting physical objects to each other and to
humans through wired and wireless networks.
This essentially means a physical object can be
assigned an IP address and provided with the
ability to transfer data over a network.
5. IoT solutions enable a car that has built-in sensors to alert the driver when his or her petrol is low.
Also enables people to control their home appliances using their phones or TV sets, and receive
useful information on one’s health based on one’s sleeping and eating habits.
6. Smart systems and IoT are driven by a combination of
o Sensors
o Connectivity
o People & processes
7. Sensors
◦ Sensors detect and measure changes in position, temperature, light, etc. and they turn objects into
data-generating “things” that can report on their status, and in some cases, interact with their
environment.
◦ Sensors transmit a wide variety of data like location, weather, movement, temperature, and
environment.
◦ IoT uses low power Micro electro-mechanical systems (MEMS) sensors which are paired with an
application-specific integrated circuit (ASIC) or microprocessor; and will likely be attached to a
wireless radio for communications.
◦ The data from ASIC is then processed using algorithms to make sense of it so that humans or
machines can react appropriately.
8. Connectivity
◦ IoT devices are assigned an IP address and provided with the ability to transfer data over a network.
◦ They mainly use wireless technologies such as Personal Area Network (PAN), Local Area Network
(LAN) & Wide Area Network (WAN) to establish connection among things.
◦ WiFi is designed as a LAN technology, but Bluetooth is intended for use on a LAN portion, and PAN.
◦ PANs are usually wireless and cover a range of about 10 meters.
◦ LANs are either wired or wireless or a combination of the two; Wireless LANs (WLANs) usually
cover a range up to 100 meters.
◦ WANs are spread across a very large area – as big as the entire globe.
◦ The Internet is considered a WAN and it is built
of a complex mix of wired and wireless connections.
9. People & processes
o IoT is connecting people in a more relevant and intelligent way through devices, like smart-phones,
PCs and tablets to the things around us.
o As the Internet of Things emerge, the interaction of people on the Internet will evolve. For example, it
may become common to wear sensors on our skin or in our clothes that collect and transmit data to
healthcare providers.
o Process includes delivering the right information to the right person or machine at the right time.
o It plays an important role in how each of these entities—people, data, and things—interact with each
other within the network to deliver societal benefits and economic value.
12. Barcodes/ QR codes
(standard range upto 0.5m, long range upto 2.5m, an extra long-range upto 10m)
EnOcean
(300m Outdoors, 30m Indoors)
13. BACKBONE:
Advanced Internet Protocol (IPv6)
• Internet Protocol is the connectionless communications protocol that provides an identification and
location system for computers on networks and routes traffic across the Internet.
• IP protocol deals only with packets and this 6th version uses a 128-bit address.
TCP
• Transmission Control Protocol is one of the main protocols in TCP/IP networks.
• TCP guarantees delivery of data and also guarantees that packets will be delivered in the same order in which
they were sent.
• TCP uses connection-oriented model and provides reliable, ordered, and error checked delivery of data.
• Major Internet applications such as the world wide web, email, remote administration and file transfer rely on
TCP.
UDP
• The User Datagram Protocol is a transport layer protocol defined for use with the IP network layer protocol.
• It uses a simple connectionless transmission model; wherein computer applications can send messages.
• It is suitable for purposes where error checking and correction is not necessary.
14. HARDWARE:
Wireless System-on-Chip (SoC)
• The best way to overcome challenges like cost and complexity is to combine multiple functions into a
single chip.
• SoC handles processing, connectivity and sensor interfaces on a single die component.
• SoCs for the Internet of Things integrate memory, signal peripherals, Multi-protocol wireless
transceivers, Sensor interfaces, etc.
Prototyping boards & platforms
• This technology provides data handling and storage embedded on a single platform.
• The palm-sized board integrates wifi chip, CPU, memory, including SD slot, USB port, and many
connection points for attaching displays, sensors, and other peripherals.
• It has its own server, which means that data generated by the programs it runs is stored locally and
remains fully under the user’s control.
15. SOFTWARE:
Riot OS
• Standard programming in C or C++.
• Static and dynamic memory allocation.
• Code once, run on 8-bit platforms (e.g. Arduino Mega 2560), 16-bit platforms (e.g. MSP430),
and on 32-bit platforms (e.g. ARM).
Thingsquare Mist
• It is a software platform that product makers use to connect their products with smart-phones.
• It connects battery-powered wireless microcontrollers to the Internet, allowing quick
connection of products such as smart bulbs and home appliances to smart-phone apps and
database back-ends.
• It builds on open Internet standards, such as IPv6, UDP.
20. Security concerns
Connectivity challenges
Data theft
Energy challenges
Absence of governance
21. The Internet of Things: Opportunities & Challenges, Texas Instruments
http://www.psfk.com/2014/03/internet-of-things-infographic.html
Internet of Things, Xia, F., Yang, L. INTERNATIONAL JOURNAL OF COMMUNICATION
SYSTEMS Int. J. Commun. Syst. 2012; 25:1101–1102
The Internet of Things How the Next Evolution of the Internet Is Changing Everything, Evans,
D. Cisco Systems
IERC, http://www.internet-of-things-research.eu/
http://www.slideshare.net/PasqualePuzio/internet-of-things-and-its-applications
http://www.codeproject.com/Articles/832492/Stage-Introduction-to-the-Internet-of-Things-
Wha
http://www.tweaktown.com/news/41530/internet-of-things-market-is-growing-with-industry-
deals-accelerating/index.html
22. Internet of Things: Converging Technologies for Smart Environments and Integrated
Ecosystems , Vermesan, O., Friess, P. Page 6 to 50
http://electronicsmaker.com/smart-homes-and-the-iot
http://www2.advantech.com/embedded-boards-design-in-services/casestudies/59dead04-
87e1-4568-854d-
f17ac4fa6377/?utm_source=eCampaign&utm_medium=E_mail&utm_campaign=2015Q3_A
NADMF_Take_Control_Embedded%20Automation_GA_eDM_1-
0_New&CampId=4fb76cd0af&UID=
http://postscapes.com/internet-of-things-technologies