SlideShare a Scribd company logo
1 of 15
Internet of Things
Amala Putrevu D018
Sameeksha Trivedi D055
Introduction
 "In the next century, planet earth will don an electronic skin. It will use the Internet as a
scaffold to support and transmit its sensations."- Neil Gross, 1999
 In a recent study, the researchers have predicted that the Internet will double in size every
5.32 years
 By 2020, 20 billion devices will be in use in the world [0]
Concept
 The Internet of Things is an emerging global Internet-based technical architecture
facilitating the exchange of goods in a global supply-chain network.[1]
 Rapid advancement in technology in just 21 years
 IPv6 communication
 Protocol for M2M communication
 Smart sensors
 Cloud storage
 Sophisticated algorithms via machine learning
Aims & Objectives
 To assimilate the concept of IoT
 To dejargonise the terms of IoT
 To familiarize with devices and technologies that can be employed to realize IoT
 To gauge the potential of IoT, focusing on the 'home automation and security' space
 To analyze the threats and challenges associated with it
Applications
 Smart cities
 Smart environment
 Smart metering
 Security and emergencies
 Retail
 Industrial control
 Home automation
 Health
Area of focus
 Home automation & security
 Smart Appliances
 Everyday processes: automated
 Temperature, humidity and quality controlled environment
 Security from thefts and attacks
 Safety for all family members
Home automation & Security
 A “smart home” can be defined as a residence equipped with computing and
information technology which anticipates and responds to the need of its
occupants, working to promote their comfort, convenience, security and entertainment
through the management of technology within the home and connections to the world
beyond. [2]
Home automation & security
 Internet of things can be used to bolster home security by using devices that monitor
unexpected movement, thermal radiations and unwarranted entry. [3]
Examples of Smart Home Devices
Challenges and Threats
 Connectivity challenges (Bluetooth, WiFi, ZigBee) [4]
 Security concerns (thingbots) [5]
 Data theft [6]
 Data generation & storage [7]
 Energy challenges [8]
Conclusion
 We must expand smart- object design beyond hardware and software to include
interaction design as well as social aspects. [9]6
 Building applications with RFID data in the IoT is challenging, not just because TREs provide
only low-level information but also because the metadata associated with
tags, antennas, and events must be personalized and carefully controlled to create a
safe, meaningful user experience. [10]
 With the emergence of an Internet of things, new regulatory approaches to ensure its
privacy and security become necessary.[11]
Citations
[0] Zhang, Guo-Qing; Zhang, Guo-Qiang; Yang, Qing-Feng; Cheng, Su-Qi; and Zhou, Tao. “Evolution of the Internet and
its Cores.” New Journal of Physics 10 (2008) 123027
[1]R. H. Weber, "Internet of Things - New Security and Privacy Challenges", Computer Law & Security Review 26 (2010),
Elsevier ScienceDirect
[2] Frances K. Aldrich, “Smart Homes: past, present and future”, Inside the Smart Home 2003, Springer
[3]G. Kortuem et al, "Smart Objects as building blocks of Internet of things", IEEE Internet Computing Jan/Feb 2010, IEEE
Computer Society
[4][5]Liu, Jing, Yang Xiao, and CL Philip Chen. "Authentication and Access Control in the Internet of Things." ICDCS
Workshops. 2012., IEEE Computer Society
[6][7][8]Roman, Rodrigo, Pablo Najera, and Javier Lopez. "Securing the internet of things." Computer 44.9 (2011): 51-58.
[9]K. Ashton, "The Internet of Things' thing", RFID Journal June 2009
[10]E. Welbourne et al, "Building the Internet of Things using RFID", IEEE Internet Computing May/June 2009, IEEE
Computer Society
[11]A. Sarma et al, "Identities in the future Internet of Things", Wireless Personal Communications: An International Journal,
May 2009, ACM Digital Library& more

More Related Content

What's hot

IoT - IT 423 ppt
IoT - IT 423 pptIoT - IT 423 ppt
IoT - IT 423 ppt
Mhae Lyn
 
Internet of Things: A Hands-On Approach
Internet of Things: A Hands-On ApproachInternet of Things: A Hands-On Approach
Internet of Things: A Hands-On Approach
Arshdeep Bahga
 

What's hot (20)

Presentation on Internet of Things
Presentation on Internet of ThingsPresentation on Internet of Things
Presentation on Internet of Things
 
10 min IoT ppt
10 min IoT ppt10 min IoT ppt
10 min IoT ppt
 
IoT - IT 423 ppt
IoT - IT 423 pptIoT - IT 423 ppt
IoT - IT 423 ppt
 
The internet of things.pptx
The internet of things.pptxThe internet of things.pptx
The internet of things.pptx
 
Internet of Things - IoT
Internet of Things - IoTInternet of Things - IoT
Internet of Things - IoT
 
Internet of Things - Lu, Ralph
Internet of Things - Lu, RalphInternet of Things - Lu, Ralph
Internet of Things - Lu, Ralph
 
Technical Challenges - How To Design IoT Systems
Technical Challenges - How To Design IoT SystemsTechnical Challenges - How To Design IoT Systems
Technical Challenges - How To Design IoT Systems
 
Internet of Things Overview
Internet of Things OverviewInternet of Things Overview
Internet of Things Overview
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Iot amey p naik
Iot amey p naikIot amey p naik
Iot amey p naik
 
Internet of Things: A Hands-On Approach paperback$@@
 Internet of Things: A Hands-On Approach paperback$@@ Internet of Things: A Hands-On Approach paperback$@@
Internet of Things: A Hands-On Approach paperback$@@
 
Internet of things ppt
Internet of things pptInternet of things ppt
Internet of things ppt
 
Iot
IotIot
Iot
 
Internet of Things: A Hands-On Approach
Internet of Things: A Hands-On ApproachInternet of Things: A Hands-On Approach
Internet of Things: A Hands-On Approach
 
A basic PPT on Internet Of Things(IOT)
A basic PPT on Internet Of Things(IOT)A basic PPT on Internet Of Things(IOT)
A basic PPT on Internet Of Things(IOT)
 
Internet of Things IoT
Internet of Things IoTInternet of Things IoT
Internet of Things IoT
 
Introduction to io_t
Introduction to io_tIntroduction to io_t
Introduction to io_t
 
Internet of Things Iot presentation with module
Internet of Things Iot presentation with moduleInternet of Things Iot presentation with module
Internet of Things Iot presentation with module
 
IoT Enabling Technologies
IoT Enabling TechnologiesIoT Enabling Technologies
IoT Enabling Technologies
 

Viewers also liked

Internet of Things (IoT) and Connected Cars - Patent Landscape Highlighting T...
Internet of Things (IoT) and Connected Cars - Patent Landscape Highlighting T...Internet of Things (IoT) and Connected Cars - Patent Landscape Highlighting T...
Internet of Things (IoT) and Connected Cars - Patent Landscape Highlighting T...
Rahul Dev
 
RFID Technology and Internet of Things
RFID Technology and Internet of ThingsRFID Technology and Internet of Things
RFID Technology and Internet of Things
Dmitri Shiryaev
 

Viewers also liked (20)

TCUK 2013 - Don't manage: lead
TCUK 2013 - Don't manage: leadTCUK 2013 - Don't manage: lead
TCUK 2013 - Don't manage: lead
 
WoT Tutorial @ Cisco
WoT Tutorial @ CiscoWoT Tutorial @ Cisco
WoT Tutorial @ Cisco
 
Electronic of things_Final Presentation
Electronic of things_Final PresentationElectronic of things_Final Presentation
Electronic of things_Final Presentation
 
I International Workshop RFID and IoT - Dia 20 - RFID Radio Regulations and I...
I International Workshop RFID and IoT - Dia 20 - RFID Radio Regulations and I...I International Workshop RFID and IoT - Dia 20 - RFID Radio Regulations and I...
I International Workshop RFID and IoT - Dia 20 - RFID Radio Regulations and I...
 
Internet of Things, Quantified Self and Smart Cities in the context of Singul...
Internet of Things, Quantified Self and Smart Cities in the context of Singul...Internet of Things, Quantified Self and Smart Cities in the context of Singul...
Internet of Things, Quantified Self and Smart Cities in the context of Singul...
 
Tutorial on IEEE 802.15.4e standard
Tutorial on IEEE 802.15.4e standardTutorial on IEEE 802.15.4e standard
Tutorial on IEEE 802.15.4e standard
 
Best Practices for Marketing IoT and RFID Technology
Best Practices for Marketing IoT and RFID Technology Best Practices for Marketing IoT and RFID Technology
Best Practices for Marketing IoT and RFID Technology
 
Slide bài giảng về lập trình Scratch dành cho GV
Slide bài giảng về lập trình Scratch dành cho GVSlide bài giảng về lập trình Scratch dành cho GV
Slide bài giảng về lập trình Scratch dành cho GV
 
Internet of Things (IoT) and Connected Cars - Patent Landscape Highlighting T...
Internet of Things (IoT) and Connected Cars - Patent Landscape Highlighting T...Internet of Things (IoT) and Connected Cars - Patent Landscape Highlighting T...
Internet of Things (IoT) and Connected Cars - Patent Landscape Highlighting T...
 
Internet of things (IoT) Patents | Internet of things (IoT) based Systems & M...
Internet of things (IoT) Patents | Internet of things (IoT) based Systems & M...Internet of things (IoT) Patents | Internet of things (IoT) based Systems & M...
Internet of things (IoT) Patents | Internet of things (IoT) based Systems & M...
 
RFID with INTERNET OF THINGS
RFID with INTERNET OF THINGSRFID with INTERNET OF THINGS
RFID with INTERNET OF THINGS
 
Internet of Things and its Enabling Technologies - RFID
Internet of Things  and its Enabling Technologies - RFIDInternet of Things  and its Enabling Technologies - RFID
Internet of Things and its Enabling Technologies - RFID
 
RFID Technology and Internet of Things
RFID Technology and Internet of ThingsRFID Technology and Internet of Things
RFID Technology and Internet of Things
 
Digital Statistics 2014 - India
Digital Statistics 2014 - IndiaDigital Statistics 2014 - India
Digital Statistics 2014 - India
 
What Would Steve Do? Lessons from the World's Most Captivating Presenters
What Would Steve Do? Lessons from the World's Most Captivating PresentersWhat Would Steve Do? Lessons from the World's Most Captivating Presenters
What Would Steve Do? Lessons from the World's Most Captivating Presenters
 
What is the Internet of Things?
What is the Internet of Things?What is the Internet of Things?
What is the Internet of Things?
 
20 Facebook, Twitter, Linkedin & Pinterest Features You Didn't Know Existed (...
20 Facebook, Twitter, Linkedin & Pinterest Features You Didn't Know Existed (...20 Facebook, Twitter, Linkedin & Pinterest Features You Didn't Know Existed (...
20 Facebook, Twitter, Linkedin & Pinterest Features You Didn't Know Existed (...
 
Simulation of Wireless Communication Systems
Simulation of Wireless Communication SystemsSimulation of Wireless Communication Systems
Simulation of Wireless Communication Systems
 
THE INTERNET OF THINGS
THE INTERNET OF THINGSTHE INTERNET OF THINGS
THE INTERNET OF THINGS
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
 

Similar to Internet of things: A beginners' guide

Overview of internet of things (IoT) the new upcoming technology in hand
Overview of internet of things (IoT) the new upcoming technology in handOverview of internet of things (IoT) the new upcoming technology in hand
Overview of internet of things (IoT) the new upcoming technology in hand
Ranjith P
 
sensors requirement and understanding and deployment
sensors requirement and understanding and deploymentsensors requirement and understanding and deployment
sensors requirement and understanding and deployment
S .Ali Raza
 
Cyber Security and the Internet of ThingsVulnerabilities, T.docx
Cyber Security and the Internet of ThingsVulnerabilities, T.docxCyber Security and the Internet of ThingsVulnerabilities, T.docx
Cyber Security and the Internet of ThingsVulnerabilities, T.docx
dorishigh
 
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
IJECEIAES
 
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
DESMOND YUEN
 
Io t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsIo t security_review_blockchain_solutions
Io t security_review_blockchain_solutions
Shyam Goyal
 
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxINTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
vrickens
 

Similar to Internet of things: A beginners' guide (20)

Overview of internet of things (IoT) the new upcoming technology in hand
Overview of internet of things (IoT) the new upcoming technology in handOverview of internet of things (IoT) the new upcoming technology in hand
Overview of internet of things (IoT) the new upcoming technology in hand
 
sensors requirement and understanding and deployment
sensors requirement and understanding and deploymentsensors requirement and understanding and deployment
sensors requirement and understanding and deployment
 
CICS: Cloud–Internet Communication Security Framework for the Internet of Sma...
CICS: Cloud–Internet Communication Security Framework for the Internet of Sma...CICS: Cloud–Internet Communication Security Framework for the Internet of Sma...
CICS: Cloud–Internet Communication Security Framework for the Internet of Sma...
 
Cyber Security and the Internet of ThingsVulnerabilities, T.docx
Cyber Security and the Internet of ThingsVulnerabilities, T.docxCyber Security and the Internet of ThingsVulnerabilities, T.docx
Cyber Security and the Internet of ThingsVulnerabilities, T.docx
 
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
 
76 s201918
76 s20191876 s201918
76 s201918
 
Internet of Things Forensics
Internet of Things ForensicsInternet of Things Forensics
Internet of Things Forensics
 
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
 
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
 
IoT Intro.pptx
IoT Intro.pptxIoT Intro.pptx
IoT Intro.pptx
 
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
 
A Study on Internet of Things
A Study on Internet of ThingsA Study on Internet of Things
A Study on Internet of Things
 
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoT
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoTA STUDY ON SECURITY ISSUES AND CHALLENGES IN IoT
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoT
 
Io t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsIo t security_review_blockchain_solutions
Io t security_review_blockchain_solutions
 
The Internet of Things (IoT): An Overview
The Internet of Things (IoT): An OverviewThe Internet of Things (IoT): An Overview
The Internet of Things (IoT): An Overview
 
A survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusA survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current status
 
Internet of things: review, architecture and applications
Internet of things: review, architecture and applicationsInternet of things: review, architecture and applications
Internet of things: review, architecture and applications
 
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUESCAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
 
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxINTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
 
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 

Internet of things: A beginners' guide

  • 1. Internet of Things Amala Putrevu D018 Sameeksha Trivedi D055
  • 2. Introduction  "In the next century, planet earth will don an electronic skin. It will use the Internet as a scaffold to support and transmit its sensations."- Neil Gross, 1999  In a recent study, the researchers have predicted that the Internet will double in size every 5.32 years  By 2020, 20 billion devices will be in use in the world [0]
  • 3. Concept  The Internet of Things is an emerging global Internet-based technical architecture facilitating the exchange of goods in a global supply-chain network.[1]  Rapid advancement in technology in just 21 years  IPv6 communication  Protocol for M2M communication  Smart sensors  Cloud storage  Sophisticated algorithms via machine learning
  • 4.
  • 5. Aims & Objectives  To assimilate the concept of IoT  To dejargonise the terms of IoT  To familiarize with devices and technologies that can be employed to realize IoT  To gauge the potential of IoT, focusing on the 'home automation and security' space  To analyze the threats and challenges associated with it
  • 6. Applications  Smart cities  Smart environment  Smart metering  Security and emergencies  Retail  Industrial control  Home automation  Health
  • 7. Area of focus  Home automation & security  Smart Appliances  Everyday processes: automated  Temperature, humidity and quality controlled environment  Security from thefts and attacks  Safety for all family members
  • 8.
  • 9. Home automation & Security  A “smart home” can be defined as a residence equipped with computing and information technology which anticipates and responds to the need of its occupants, working to promote their comfort, convenience, security and entertainment through the management of technology within the home and connections to the world beyond. [2]
  • 10. Home automation & security  Internet of things can be used to bolster home security by using devices that monitor unexpected movement, thermal radiations and unwarranted entry. [3]
  • 11. Examples of Smart Home Devices
  • 12. Challenges and Threats  Connectivity challenges (Bluetooth, WiFi, ZigBee) [4]  Security concerns (thingbots) [5]  Data theft [6]  Data generation & storage [7]  Energy challenges [8]
  • 13.
  • 14. Conclusion  We must expand smart- object design beyond hardware and software to include interaction design as well as social aspects. [9]6  Building applications with RFID data in the IoT is challenging, not just because TREs provide only low-level information but also because the metadata associated with tags, antennas, and events must be personalized and carefully controlled to create a safe, meaningful user experience. [10]  With the emergence of an Internet of things, new regulatory approaches to ensure its privacy and security become necessary.[11]
  • 15. Citations [0] Zhang, Guo-Qing; Zhang, Guo-Qiang; Yang, Qing-Feng; Cheng, Su-Qi; and Zhou, Tao. “Evolution of the Internet and its Cores.” New Journal of Physics 10 (2008) 123027 [1]R. H. Weber, "Internet of Things - New Security and Privacy Challenges", Computer Law & Security Review 26 (2010), Elsevier ScienceDirect [2] Frances K. Aldrich, “Smart Homes: past, present and future”, Inside the Smart Home 2003, Springer [3]G. Kortuem et al, "Smart Objects as building blocks of Internet of things", IEEE Internet Computing Jan/Feb 2010, IEEE Computer Society [4][5]Liu, Jing, Yang Xiao, and CL Philip Chen. "Authentication and Access Control in the Internet of Things." ICDCS Workshops. 2012., IEEE Computer Society [6][7][8]Roman, Rodrigo, Pablo Najera, and Javier Lopez. "Securing the internet of things." Computer 44.9 (2011): 51-58. [9]K. Ashton, "The Internet of Things' thing", RFID Journal June 2009 [10]E. Welbourne et al, "Building the Internet of Things using RFID", IEEE Internet Computing May/June 2009, IEEE Computer Society [11]A. Sarma et al, "Identities in the future Internet of Things", Wireless Personal Communications: An International Journal, May 2009, ACM Digital Library& more

Editor's Notes

  1. Intro – 2Concept – 0.5Aims – 1 Applications – 2Area of focus – 2 Challenges & Threats – 2 Conclusion – 1