SlideShare a Scribd company logo
1 of 26
Vishal Choudhary
vishalhim@yahoo.com
IOT- ARCHITECTURE
 Internet of Things (IoT) according to the 2020
conceptual framework is expressed through a
simple formula
IoT= Services+ Data+ Networks + Sensors
the term IoT is a worldwide network of intelligent
objects that are interconnected and uniquely
represent able on the basis of communication-
based protocols
The Internet of things’ objects enable the connection
with internet to work anytime, anywhere and anyplace
The IoT four key technological enablers are: -
 For tagging the things RFID technology used
 For sensing the things sensor technology used
 For thinking the things smart technology used
 For shrinking the things Nanotechnology used
ARCHITECTURE
The Internet of Things is considered as the third
wave of the World Wide Web (WWW) after static
web pages and social networking’s based web. The
IoT is a worldwide network that connects different
type of objects at anytime and anywhere via a
popular internet protocol named Internet Protocol(IP)
Conventional IoT architecture
it is considered as three layers: -
 Perception Layer
 Network Layer
 Application Layer
IOT Architecture
Perception layer
The perception layer is the lowest layer of the conventional architecture of
IoT. This layer’s main responsibility is to collect useful information/data
from things or the environment (such as WSN, heterogeneous devices,
sensors type real world objects, humidity, and temperature etc.) and
transform them in a digital setup. The main purpose of objects is unique
address identification and communication between short-range technologies
such as RFID, Bluetooth, Near-Field Communication (NFC), 6LoWPAN
(Low Power Personal Area Network)
Network layer
This layer’s main responsibility is to help and secure data transmission
between the application and perception layer of IoT architecture .This
layer mainly collects information and delivers to the perception layer
toward several applications and servers. Basically, this layer is a
convergence of internet and communication-based networks.
It is the core layer (network layer) of IoT that is capable of advancing
the information for relevant procedures. The data processing relevant
tasks handled IoT management. This layer also ensures unique
addressing and routing abilities to the unified integration of uncountable
devices in a single cooperative network. Various types of technologies
are contributed for this phenomenon such as wired, wireless and
satellite. The implementation of 6LoWPAN protocol towards IPV6 for
Application layer
The application layer is considered as a top layer of conventional IoT
architecture. This layer provides the personalized based services
according to user relevant needs . This layer’s main responsibility is
to link the major gap between the users and applications. This IoT
layer combines the industry to attain the high-level intelligent
applications type solutions such as the disaster monitoring, health
monitoring, transposition, fortune, medical and ecological
environment, and handled global management relevant to all
intelligent type applications.
Three layers model is further divided
into five layers
1. The bottom layer of IoT architecture perception layer represents
an object layer. The object layer’s main responsibility is to collect
data from different heterogeneous category devices and then
process and digitize the data. It also transfers the processed data
into upper layers of IoT architecture.
2. The middle layer of conventional IoT architecture network layer
represents an object abstraction layer. The object abstraction layer
acts as a mediating layer between service management and the
object layer. In object abstraction, RFID, WIFI and Third
Generation (3G) communication technologies are used.
3. The service management layer’s main responsibilities are facilitating
information processing, decision-making, and control of pairing
requestor information processing for relevant tasks.
4. The application layer provides the customers with smart high-quality
facilities according to the pre-request of the customers.
5. The Business layer represents the business model and data that’s
been received from the application layer
IoT Security
The IoT security is dependent on three things data confidentiality,
privacy, and trust. The IoT security goals are achieved in a better
way if the three things are utilized for all of the users of IoT efficient
and reliable way.
 The IoT architecture layers all faced security issues in term of
security attacks. The security requirements are different according to
different applications. The IoT architectures’ top layer of the
application layers’ main security issues til today are data sharing that
protect user privacy and access controls. The other attacks also
faced on application layers include phishing, malware attack.
 The IoT architecture core network layer faced main security
challenges like integrity and confidential data. The other problems on
the network layer are Denial of Services (DoS), eavesdropping, a
man in the middle, heterogeneity, RFID interference, Node jamming
 The IoT architectures’ lowest layer, the perception layer, faces the
major security challenge of cyber-attack. The other attacks faced in
the perception layer are a fake node, malicious code injection,
protection of sensor data, side channel attack.These attacks destroy
any type of applications in IoT architecture if proper security
mechanism, algorithms, and technologies are not implemented in
time. The researchers analyzed the IoT architecture layers high
impact on security attacks are node tempering, fake node, malicious
code based injection, heterogeneity type of network problem, data
access and authentication problem,
IOT Security Requirement
 That the application layer security requirements are authentication and
key management, privacy protection and management.
 The network layer security requirements are identity authentication,
encryption mechanism, and communication security.
 The perception layer security requirements are lightweight encryption
technology, protection sensor data, and key management.
 The IoT security challenges involved different encryption mechanisms such as end-to-
end encryption and hop encryption. The IoT security challenges involved different
communication protocols such as Transport Layer Security (TLS), Secure Socket Layer
(SSL), Internet Protocol Security (IPSec). The IoT security challenges are controlled
through the implement action of cryptographic algorithms such Advance Encryption
Standard (AES) for confidentiality, Rivest Shamir Adelman (RSA) for the digital signature
of the key, Diffi-Hellman (DH) for key agreement and Secure Hash Algorithm (SHA) for
integrity
Elements of IoT architecture
Things
A “thing” is an object equipped with sensors that gather data which
will be transferred over a network and actuators that allow things to
act (for example, to switch on or off the light, to open or close a door,
to increase or decrease engine rotation speed and more). This
concept includes fridges, street lamps, buildings, vehicles,
production machinery, rehabilitation equipment and everything else
imaginable. Sensors are not in all cases physically attached to the
things: sensors may need to monitor, for example, what happens in
the closest environment to a thing.
Gateway
Data goes from things to the cloud and vice versa through the
gateways. A gateway provides connectivity between things and the
cloud part of the IoT solution, enables data preprocessing and
filtering before moving it to the cloud (to reduce the volume of data
for detailed processing and storing) and transmits control commands
going from the cloud to things. Things then execute commands using
their actuators.
Streaming Data Processor
Ensures effective transition of input data to a data lake and
control applications. No data can be occasionally lost or
corrupted.
Data Lake
A data lake is used for storing the data generated by connected
devices in its natural format. Big data comes in "batches" or
in “streams”. When the data is needed for meaningful insights it’s
extracted from a data lake and loaded to a big data warehouse.
Big Data Warehouse
Filtered and preprocessed data needed for meaningful insights is
extracted from a data lake to a big data warehouse. A big data
warehouse contains only cleaned, structured and matched data
(compared to a data lake which contains all sorts of data generated
by sensors). Also, data warehouse stores context information about
things and sensors (for example, where sensors are installed) and
the commands control applications send to things.
Data analysts
Data analysts can use data from the big data warehouse to find
trends and gain actionable insights. When analyzed (and in many
cases – visualized in schemes, diagrams, info graphics) big data
show, for example, the performance of devices, help identify
inefficiencies and work out the ways to improve an IoT system (make
it more reliable, more customer-oriented). Also, the correlations and
patterns found manually can further contribute to creating algorithms
for control applications.
Machine learning and the models ML
generates
With machine learning, there is an opportunity to create more
precise and more efficient models for control applications.
Models are regularly updated (for example, once in a week or
once in a month) based on the historical data accumulated in a
big data warehouse. When the applicability and efficiency of new
models are tested and approved by data analysts, new models
are used by control applications.
Control application
Send automatic commands and alerts to actuators, for example:
 Windows of a smart home can receive an automatic command to open or close
depending on the forecasts taken from the weather service.
 When sensors show that the soil is dry, watering systems get an automatic command
to water plants.
 Sensors help monitor the state of industrial equipment, and in case of a pre-failure
situation, an IoT system generates and sends automatic notifications to field
engineers.
 Control applications can be either rule-based or machine-learning based. In the first
case, control apps work according to the rules stated by specialists. In the second
case, control apps are using models which are regularly updated (once in a week,
once in a month depending on the specifics of an IoT system) with the historical data
stored in a big data warehouse.
Users applications
a software component of an IoT system which enables the
connection of users to an IoT system and gives the options to
monitor and control their smart things (while they are connected
to a network of similar things, for example, homes or cars and
controlled by a central system). With a mobile or web app, users
can monitor the state of their things, send commands to control
applications, set the options of automatic behavior (automatic
notifications and actions when certain data comes from sensors).
Conclusion
 Things equipped with sensors to gather data
and actuators to perform commands received from the cloud.
 Gateways for data filtering, preprocessing and moving it to the
cloud and vice versa, – receiving commands from the cloud.
 Cloud gateways to ensure data transition between field
gateways and central IoT servers.
 Streaming data processors to distribute the data coming
from sensors among relevant IoT solution’s components.
 Data lake for storing all the data of defined and undefined
value.
 Big data warehouse for collecting valuable data.
 Control applications to send commands to actuators.
 Machine learning to generate the models which are then
used by control applications.
 User applications to enable users to monitor control their
connected things.
 Data analytics for manual data processing.

More Related Content

What's hot

Unit 2,3,4 _ Internet of Things A Hands-On Approach (Arshdeep Bahga, Vijay Ma...
Unit 2,3,4 _ Internet of Things A Hands-On Approach (Arshdeep Bahga, Vijay Ma...Unit 2,3,4 _ Internet of Things A Hands-On Approach (Arshdeep Bahga, Vijay Ma...
Unit 2,3,4 _ Internet of Things A Hands-On Approach (Arshdeep Bahga, Vijay Ma...
Selvaraj Seerangan
 
A Reference Architecture for IoT
A Reference Architecture for IoT A Reference Architecture for IoT
A Reference Architecture for IoT
WSO2
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Dr. Mazlan Abbas
 

What's hot (20)

IOT DATA MANAGEMENT AND COMPUTE STACK.pptx
IOT DATA MANAGEMENT AND COMPUTE STACK.pptxIOT DATA MANAGEMENT AND COMPUTE STACK.pptx
IOT DATA MANAGEMENT AND COMPUTE STACK.pptx
 
Unit 2,3,4 _ Internet of Things A Hands-On Approach (Arshdeep Bahga, Vijay Ma...
Unit 2,3,4 _ Internet of Things A Hands-On Approach (Arshdeep Bahga, Vijay Ma...Unit 2,3,4 _ Internet of Things A Hands-On Approach (Arshdeep Bahga, Vijay Ma...
Unit 2,3,4 _ Internet of Things A Hands-On Approach (Arshdeep Bahga, Vijay Ma...
 
Computer science seminar topics
Computer science seminar topicsComputer science seminar topics
Computer science seminar topics
 
IOT Networks
IOT NetworksIOT Networks
IOT Networks
 
A Reference Architecture for IoT
A Reference Architecture for IoT A Reference Architecture for IoT
A Reference Architecture for IoT
 
FOG COMPUTING
FOG COMPUTINGFOG COMPUTING
FOG COMPUTING
 
Current Trends in Internet of Things (IOT)
Current Trends in Internet of Things (IOT)Current Trends in Internet of Things (IOT)
Current Trends in Internet of Things (IOT)
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An Iceberg
 
Sensors in IOT
Sensors in IOTSensors in IOT
Sensors in IOT
 
Introduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsIntroduction to IoT Architectures and Protocols
Introduction to IoT Architectures and Protocols
 
Iot architecture
Iot architectureIot architecture
Iot architecture
 
IoT internet of things
IoT  internet of thingsIoT  internet of things
IoT internet of things
 
The Current and Future State of Internet of Things: Unveiling the Opportunities
The Current and Future State of Internet of Things: Unveiling the OpportunitiesThe Current and Future State of Internet of Things: Unveiling the Opportunities
The Current and Future State of Internet of Things: Unveiling the Opportunities
 
Lecture 5
Lecture 5Lecture 5
Lecture 5
 
Cloud of things (IoT + Cloud Computing)
Cloud of things (IoT + Cloud Computing)Cloud of things (IoT + Cloud Computing)
Cloud of things (IoT + Cloud Computing)
 
1. Internet of Things - M2M to IoT
1. Internet of Things - M2M to IoT1. Internet of Things - M2M to IoT
1. Internet of Things - M2M to IoT
 
Agent architectures
Agent architecturesAgent architectures
Agent architectures
 
Lecture 1 - Introduction to IoT
Lecture 1 - Introduction to IoTLecture 1 - Introduction to IoT
Lecture 1 - Introduction to IoT
 
IOT PROTOCOLS.pptx
IOT PROTOCOLS.pptxIOT PROTOCOLS.pptx
IOT PROTOCOLS.pptx
 
Introduction to Arduino & Raspberry Pi
Introduction to Arduino & Raspberry PiIntroduction to Arduino & Raspberry Pi
Introduction to Arduino & Raspberry Pi
 

Similar to Lecture 11

OCS352-IOT -UNIT-1.pdf
OCS352-IOT -UNIT-1.pdfOCS352-IOT -UNIT-1.pdf
OCS352-IOT -UNIT-1.pdf
gopinathcreddy
 
Unit 3 - Internet of Things - www.rgpvnotes.in.pdf
Unit 3 - Internet of Things - www.rgpvnotes.in.pdfUnit 3 - Internet of Things - www.rgpvnotes.in.pdf
Unit 3 - Internet of Things - www.rgpvnotes.in.pdf
ShubhamYadav73126
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscape
Samir SEHIL
 

Similar to Lecture 11 (20)

Security Issues & Threats in IoT Infrastructure
Security Issues & Threats in IoT InfrastructureSecurity Issues & Threats in IoT Infrastructure
Security Issues & Threats in IoT Infrastructure
 
15CS81 Module1 IoT
15CS81 Module1 IoT15CS81 Module1 IoT
15CS81 Module1 IoT
 
Lec2.pptx
Lec2.pptxLec2.pptx
Lec2.pptx
 
Lec2.pptx
Lec2.pptxLec2.pptx
Lec2.pptx
 
OCS352-IOT -UNIT-1.pdf
OCS352-IOT -UNIT-1.pdfOCS352-IOT -UNIT-1.pdf
OCS352-IOT -UNIT-1.pdf
 
IoT architecture.pptx
IoT architecture.pptxIoT architecture.pptx
IoT architecture.pptx
 
Internet of things chapter2.pdf
Internet of things chapter2.pdfInternet of things chapter2.pdf
Internet of things chapter2.pdf
 
IOT_UNIT-1.pptx
IOT_UNIT-1.pptxIOT_UNIT-1.pptx
IOT_UNIT-1.pptx
 
Unit 3 - Internet of Things - www.rgpvnotes.in.pdf
Unit 3 - Internet of Things - www.rgpvnotes.in.pdfUnit 3 - Internet of Things - www.rgpvnotes.in.pdf
Unit 3 - Internet of Things - www.rgpvnotes.in.pdf
 
IoT [Internet of Things]
IoT [Internet of Things]IoT [Internet of Things]
IoT [Internet of Things]
 
Unit_1_IOT_INTRO.pptx
Unit_1_IOT_INTRO.pptxUnit_1_IOT_INTRO.pptx
Unit_1_IOT_INTRO.pptx
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscape
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Emerging chapter 4.pptx
Emerging chapter 4.pptxEmerging chapter 4.pptx
Emerging chapter 4.pptx
 
AGI Part 4.pdf
AGI Part 4.pdfAGI Part 4.pdf
AGI Part 4.pdf
 
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdfHOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
 
Module 1 Internet of Things (2).ppt.pdf on iot
Module 1 Internet of Things (2).ppt.pdf on iotModule 1 Internet of Things (2).ppt.pdf on iot
Module 1 Internet of Things (2).ppt.pdf on iot
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
 

More from vishal choudhary

More from vishal choudhary (20)

SE-Lecture1.ppt
SE-Lecture1.pptSE-Lecture1.ppt
SE-Lecture1.ppt
 
SE-Testing.ppt
SE-Testing.pptSE-Testing.ppt
SE-Testing.ppt
 
SE-CyclomaticComplexityand Testing.ppt
SE-CyclomaticComplexityand Testing.pptSE-CyclomaticComplexityand Testing.ppt
SE-CyclomaticComplexityand Testing.ppt
 
SE-Lecture-7.pptx
SE-Lecture-7.pptxSE-Lecture-7.pptx
SE-Lecture-7.pptx
 
Se-Lecture-6.ppt
Se-Lecture-6.pptSe-Lecture-6.ppt
Se-Lecture-6.ppt
 
SE-Lecture-5.pptx
SE-Lecture-5.pptxSE-Lecture-5.pptx
SE-Lecture-5.pptx
 
XML.pptx
XML.pptxXML.pptx
XML.pptx
 
SE-Lecture-8.pptx
SE-Lecture-8.pptxSE-Lecture-8.pptx
SE-Lecture-8.pptx
 
SE-coupling and cohesion.ppt
SE-coupling and cohesion.pptSE-coupling and cohesion.ppt
SE-coupling and cohesion.ppt
 
SE-Lecture-2.pptx
SE-Lecture-2.pptxSE-Lecture-2.pptx
SE-Lecture-2.pptx
 
SE-software design.ppt
SE-software design.pptSE-software design.ppt
SE-software design.ppt
 
SE1.ppt
SE1.pptSE1.ppt
SE1.ppt
 
SE-Lecture-4.pptx
SE-Lecture-4.pptxSE-Lecture-4.pptx
SE-Lecture-4.pptx
 
SE-Lecture=3.pptx
SE-Lecture=3.pptxSE-Lecture=3.pptx
SE-Lecture=3.pptx
 
Multimedia-Lecture-Animation.pptx
Multimedia-Lecture-Animation.pptxMultimedia-Lecture-Animation.pptx
Multimedia-Lecture-Animation.pptx
 
MultimediaLecture5.pptx
MultimediaLecture5.pptxMultimediaLecture5.pptx
MultimediaLecture5.pptx
 
Multimedia-Lecture-7.pptx
Multimedia-Lecture-7.pptxMultimedia-Lecture-7.pptx
Multimedia-Lecture-7.pptx
 
MultiMedia-Lecture-4.pptx
MultiMedia-Lecture-4.pptxMultiMedia-Lecture-4.pptx
MultiMedia-Lecture-4.pptx
 
Multimedia-Lecture-6.pptx
Multimedia-Lecture-6.pptxMultimedia-Lecture-6.pptx
Multimedia-Lecture-6.pptx
 
Multimedia-Lecture-3.pptx
Multimedia-Lecture-3.pptxMultimedia-Lecture-3.pptx
Multimedia-Lecture-3.pptx
 

Recently uploaded

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Recently uploaded (20)

Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 

Lecture 11

  • 2.  Internet of Things (IoT) according to the 2020 conceptual framework is expressed through a simple formula IoT= Services+ Data+ Networks + Sensors the term IoT is a worldwide network of intelligent objects that are interconnected and uniquely represent able on the basis of communication- based protocols
  • 3. The Internet of things’ objects enable the connection with internet to work anytime, anywhere and anyplace The IoT four key technological enablers are: -  For tagging the things RFID technology used  For sensing the things sensor technology used  For thinking the things smart technology used  For shrinking the things Nanotechnology used
  • 4. ARCHITECTURE The Internet of Things is considered as the third wave of the World Wide Web (WWW) after static web pages and social networking’s based web. The IoT is a worldwide network that connects different type of objects at anytime and anywhere via a popular internet protocol named Internet Protocol(IP)
  • 5. Conventional IoT architecture it is considered as three layers: -  Perception Layer  Network Layer  Application Layer
  • 7. Perception layer The perception layer is the lowest layer of the conventional architecture of IoT. This layer’s main responsibility is to collect useful information/data from things or the environment (such as WSN, heterogeneous devices, sensors type real world objects, humidity, and temperature etc.) and transform them in a digital setup. The main purpose of objects is unique address identification and communication between short-range technologies such as RFID, Bluetooth, Near-Field Communication (NFC), 6LoWPAN (Low Power Personal Area Network)
  • 8. Network layer This layer’s main responsibility is to help and secure data transmission between the application and perception layer of IoT architecture .This layer mainly collects information and delivers to the perception layer toward several applications and servers. Basically, this layer is a convergence of internet and communication-based networks. It is the core layer (network layer) of IoT that is capable of advancing the information for relevant procedures. The data processing relevant tasks handled IoT management. This layer also ensures unique addressing and routing abilities to the unified integration of uncountable devices in a single cooperative network. Various types of technologies are contributed for this phenomenon such as wired, wireless and satellite. The implementation of 6LoWPAN protocol towards IPV6 for
  • 9. Application layer The application layer is considered as a top layer of conventional IoT architecture. This layer provides the personalized based services according to user relevant needs . This layer’s main responsibility is to link the major gap between the users and applications. This IoT layer combines the industry to attain the high-level intelligent applications type solutions such as the disaster monitoring, health monitoring, transposition, fortune, medical and ecological environment, and handled global management relevant to all intelligent type applications.
  • 10. Three layers model is further divided into five layers 1. The bottom layer of IoT architecture perception layer represents an object layer. The object layer’s main responsibility is to collect data from different heterogeneous category devices and then process and digitize the data. It also transfers the processed data into upper layers of IoT architecture. 2. The middle layer of conventional IoT architecture network layer represents an object abstraction layer. The object abstraction layer acts as a mediating layer between service management and the object layer. In object abstraction, RFID, WIFI and Third Generation (3G) communication technologies are used.
  • 11. 3. The service management layer’s main responsibilities are facilitating information processing, decision-making, and control of pairing requestor information processing for relevant tasks. 4. The application layer provides the customers with smart high-quality facilities according to the pre-request of the customers. 5. The Business layer represents the business model and data that’s been received from the application layer
  • 12. IoT Security The IoT security is dependent on three things data confidentiality, privacy, and trust. The IoT security goals are achieved in a better way if the three things are utilized for all of the users of IoT efficient and reliable way.
  • 13.  The IoT architecture layers all faced security issues in term of security attacks. The security requirements are different according to different applications. The IoT architectures’ top layer of the application layers’ main security issues til today are data sharing that protect user privacy and access controls. The other attacks also faced on application layers include phishing, malware attack.  The IoT architecture core network layer faced main security challenges like integrity and confidential data. The other problems on the network layer are Denial of Services (DoS), eavesdropping, a man in the middle, heterogeneity, RFID interference, Node jamming
  • 14.  The IoT architectures’ lowest layer, the perception layer, faces the major security challenge of cyber-attack. The other attacks faced in the perception layer are a fake node, malicious code injection, protection of sensor data, side channel attack.These attacks destroy any type of applications in IoT architecture if proper security mechanism, algorithms, and technologies are not implemented in time. The researchers analyzed the IoT architecture layers high impact on security attacks are node tempering, fake node, malicious code based injection, heterogeneity type of network problem, data access and authentication problem,
  • 15. IOT Security Requirement  That the application layer security requirements are authentication and key management, privacy protection and management.  The network layer security requirements are identity authentication, encryption mechanism, and communication security.  The perception layer security requirements are lightweight encryption technology, protection sensor data, and key management.  The IoT security challenges involved different encryption mechanisms such as end-to- end encryption and hop encryption. The IoT security challenges involved different communication protocols such as Transport Layer Security (TLS), Secure Socket Layer (SSL), Internet Protocol Security (IPSec). The IoT security challenges are controlled through the implement action of cryptographic algorithms such Advance Encryption Standard (AES) for confidentiality, Rivest Shamir Adelman (RSA) for the digital signature of the key, Diffi-Hellman (DH) for key agreement and Secure Hash Algorithm (SHA) for integrity
  • 16. Elements of IoT architecture
  • 17. Things A “thing” is an object equipped with sensors that gather data which will be transferred over a network and actuators that allow things to act (for example, to switch on or off the light, to open or close a door, to increase or decrease engine rotation speed and more). This concept includes fridges, street lamps, buildings, vehicles, production machinery, rehabilitation equipment and everything else imaginable. Sensors are not in all cases physically attached to the things: sensors may need to monitor, for example, what happens in the closest environment to a thing.
  • 18. Gateway Data goes from things to the cloud and vice versa through the gateways. A gateway provides connectivity between things and the cloud part of the IoT solution, enables data preprocessing and filtering before moving it to the cloud (to reduce the volume of data for detailed processing and storing) and transmits control commands going from the cloud to things. Things then execute commands using their actuators.
  • 19. Streaming Data Processor Ensures effective transition of input data to a data lake and control applications. No data can be occasionally lost or corrupted.
  • 20. Data Lake A data lake is used for storing the data generated by connected devices in its natural format. Big data comes in "batches" or in “streams”. When the data is needed for meaningful insights it’s extracted from a data lake and loaded to a big data warehouse.
  • 21. Big Data Warehouse Filtered and preprocessed data needed for meaningful insights is extracted from a data lake to a big data warehouse. A big data warehouse contains only cleaned, structured and matched data (compared to a data lake which contains all sorts of data generated by sensors). Also, data warehouse stores context information about things and sensors (for example, where sensors are installed) and the commands control applications send to things.
  • 22. Data analysts Data analysts can use data from the big data warehouse to find trends and gain actionable insights. When analyzed (and in many cases – visualized in schemes, diagrams, info graphics) big data show, for example, the performance of devices, help identify inefficiencies and work out the ways to improve an IoT system (make it more reliable, more customer-oriented). Also, the correlations and patterns found manually can further contribute to creating algorithms for control applications.
  • 23. Machine learning and the models ML generates With machine learning, there is an opportunity to create more precise and more efficient models for control applications. Models are regularly updated (for example, once in a week or once in a month) based on the historical data accumulated in a big data warehouse. When the applicability and efficiency of new models are tested and approved by data analysts, new models are used by control applications.
  • 24. Control application Send automatic commands and alerts to actuators, for example:  Windows of a smart home can receive an automatic command to open or close depending on the forecasts taken from the weather service.  When sensors show that the soil is dry, watering systems get an automatic command to water plants.  Sensors help monitor the state of industrial equipment, and in case of a pre-failure situation, an IoT system generates and sends automatic notifications to field engineers.  Control applications can be either rule-based or machine-learning based. In the first case, control apps work according to the rules stated by specialists. In the second case, control apps are using models which are regularly updated (once in a week, once in a month depending on the specifics of an IoT system) with the historical data stored in a big data warehouse.
  • 25. Users applications a software component of an IoT system which enables the connection of users to an IoT system and gives the options to monitor and control their smart things (while they are connected to a network of similar things, for example, homes or cars and controlled by a central system). With a mobile or web app, users can monitor the state of their things, send commands to control applications, set the options of automatic behavior (automatic notifications and actions when certain data comes from sensors).
  • 26. Conclusion  Things equipped with sensors to gather data and actuators to perform commands received from the cloud.  Gateways for data filtering, preprocessing and moving it to the cloud and vice versa, – receiving commands from the cloud.  Cloud gateways to ensure data transition between field gateways and central IoT servers.  Streaming data processors to distribute the data coming from sensors among relevant IoT solution’s components.  Data lake for storing all the data of defined and undefined value.  Big data warehouse for collecting valuable data.  Control applications to send commands to actuators.  Machine learning to generate the models which are then used by control applications.  User applications to enable users to monitor control their connected things.  Data analytics for manual data processing.