Lecture 11

vishal choudhary
vishal choudharyresearch at University Apps, Inc. à https://scholar.google.com/citations?user=nRH0A5sAAAAJ&hl=en
Vishal Choudhary
vishalhim@yahoo.com
IOT- ARCHITECTURE
 Internet of Things (IoT) according to the 2020
conceptual framework is expressed through a
simple formula
IoT= Services+ Data+ Networks + Sensors
the term IoT is a worldwide network of intelligent
objects that are interconnected and uniquely
represent able on the basis of communication-
based protocols
The Internet of things’ objects enable the connection
with internet to work anytime, anywhere and anyplace
The IoT four key technological enablers are: -
 For tagging the things RFID technology used
 For sensing the things sensor technology used
 For thinking the things smart technology used
 For shrinking the things Nanotechnology used
ARCHITECTURE
The Internet of Things is considered as the third
wave of the World Wide Web (WWW) after static
web pages and social networking’s based web. The
IoT is a worldwide network that connects different
type of objects at anytime and anywhere via a
popular internet protocol named Internet Protocol(IP)
Conventional IoT architecture
it is considered as three layers: -
 Perception Layer
 Network Layer
 Application Layer
IOT Architecture
Perception layer
The perception layer is the lowest layer of the conventional architecture of
IoT. This layer’s main responsibility is to collect useful information/data
from things or the environment (such as WSN, heterogeneous devices,
sensors type real world objects, humidity, and temperature etc.) and
transform them in a digital setup. The main purpose of objects is unique
address identification and communication between short-range technologies
such as RFID, Bluetooth, Near-Field Communication (NFC), 6LoWPAN
(Low Power Personal Area Network)
Network layer
This layer’s main responsibility is to help and secure data transmission
between the application and perception layer of IoT architecture .This
layer mainly collects information and delivers to the perception layer
toward several applications and servers. Basically, this layer is a
convergence of internet and communication-based networks.
It is the core layer (network layer) of IoT that is capable of advancing
the information for relevant procedures. The data processing relevant
tasks handled IoT management. This layer also ensures unique
addressing and routing abilities to the unified integration of uncountable
devices in a single cooperative network. Various types of technologies
are contributed for this phenomenon such as wired, wireless and
satellite. The implementation of 6LoWPAN protocol towards IPV6 for
Application layer
The application layer is considered as a top layer of conventional IoT
architecture. This layer provides the personalized based services
according to user relevant needs . This layer’s main responsibility is
to link the major gap between the users and applications. This IoT
layer combines the industry to attain the high-level intelligent
applications type solutions such as the disaster monitoring, health
monitoring, transposition, fortune, medical and ecological
environment, and handled global management relevant to all
intelligent type applications.
Three layers model is further divided
into five layers
1. The bottom layer of IoT architecture perception layer represents
an object layer. The object layer’s main responsibility is to collect
data from different heterogeneous category devices and then
process and digitize the data. It also transfers the processed data
into upper layers of IoT architecture.
2. The middle layer of conventional IoT architecture network layer
represents an object abstraction layer. The object abstraction layer
acts as a mediating layer between service management and the
object layer. In object abstraction, RFID, WIFI and Third
Generation (3G) communication technologies are used.
3. The service management layer’s main responsibilities are facilitating
information processing, decision-making, and control of pairing
requestor information processing for relevant tasks.
4. The application layer provides the customers with smart high-quality
facilities according to the pre-request of the customers.
5. The Business layer represents the business model and data that’s
been received from the application layer
IoT Security
The IoT security is dependent on three things data confidentiality,
privacy, and trust. The IoT security goals are achieved in a better
way if the three things are utilized for all of the users of IoT efficient
and reliable way.
 The IoT architecture layers all faced security issues in term of
security attacks. The security requirements are different according to
different applications. The IoT architectures’ top layer of the
application layers’ main security issues til today are data sharing that
protect user privacy and access controls. The other attacks also
faced on application layers include phishing, malware attack.
 The IoT architecture core network layer faced main security
challenges like integrity and confidential data. The other problems on
the network layer are Denial of Services (DoS), eavesdropping, a
man in the middle, heterogeneity, RFID interference, Node jamming
 The IoT architectures’ lowest layer, the perception layer, faces the
major security challenge of cyber-attack. The other attacks faced in
the perception layer are a fake node, malicious code injection,
protection of sensor data, side channel attack.These attacks destroy
any type of applications in IoT architecture if proper security
mechanism, algorithms, and technologies are not implemented in
time. The researchers analyzed the IoT architecture layers high
impact on security attacks are node tempering, fake node, malicious
code based injection, heterogeneity type of network problem, data
access and authentication problem,
IOT Security Requirement
 That the application layer security requirements are authentication and
key management, privacy protection and management.
 The network layer security requirements are identity authentication,
encryption mechanism, and communication security.
 The perception layer security requirements are lightweight encryption
technology, protection sensor data, and key management.
 The IoT security challenges involved different encryption mechanisms such as end-to-
end encryption and hop encryption. The IoT security challenges involved different
communication protocols such as Transport Layer Security (TLS), Secure Socket Layer
(SSL), Internet Protocol Security (IPSec). The IoT security challenges are controlled
through the implement action of cryptographic algorithms such Advance Encryption
Standard (AES) for confidentiality, Rivest Shamir Adelman (RSA) for the digital signature
of the key, Diffi-Hellman (DH) for key agreement and Secure Hash Algorithm (SHA) for
integrity
Elements of IoT architecture
Things
A “thing” is an object equipped with sensors that gather data which
will be transferred over a network and actuators that allow things to
act (for example, to switch on or off the light, to open or close a door,
to increase or decrease engine rotation speed and more). This
concept includes fridges, street lamps, buildings, vehicles,
production machinery, rehabilitation equipment and everything else
imaginable. Sensors are not in all cases physically attached to the
things: sensors may need to monitor, for example, what happens in
the closest environment to a thing.
Gateway
Data goes from things to the cloud and vice versa through the
gateways. A gateway provides connectivity between things and the
cloud part of the IoT solution, enables data preprocessing and
filtering before moving it to the cloud (to reduce the volume of data
for detailed processing and storing) and transmits control commands
going from the cloud to things. Things then execute commands using
their actuators.
Streaming Data Processor
Ensures effective transition of input data to a data lake and
control applications. No data can be occasionally lost or
corrupted.
Data Lake
A data lake is used for storing the data generated by connected
devices in its natural format. Big data comes in "batches" or
in “streams”. When the data is needed for meaningful insights it’s
extracted from a data lake and loaded to a big data warehouse.
Big Data Warehouse
Filtered and preprocessed data needed for meaningful insights is
extracted from a data lake to a big data warehouse. A big data
warehouse contains only cleaned, structured and matched data
(compared to a data lake which contains all sorts of data generated
by sensors). Also, data warehouse stores context information about
things and sensors (for example, where sensors are installed) and
the commands control applications send to things.
Data analysts
Data analysts can use data from the big data warehouse to find
trends and gain actionable insights. When analyzed (and in many
cases – visualized in schemes, diagrams, info graphics) big data
show, for example, the performance of devices, help identify
inefficiencies and work out the ways to improve an IoT system (make
it more reliable, more customer-oriented). Also, the correlations and
patterns found manually can further contribute to creating algorithms
for control applications.
Machine learning and the models ML
generates
With machine learning, there is an opportunity to create more
precise and more efficient models for control applications.
Models are regularly updated (for example, once in a week or
once in a month) based on the historical data accumulated in a
big data warehouse. When the applicability and efficiency of new
models are tested and approved by data analysts, new models
are used by control applications.
Control application
Send automatic commands and alerts to actuators, for example:
 Windows of a smart home can receive an automatic command to open or close
depending on the forecasts taken from the weather service.
 When sensors show that the soil is dry, watering systems get an automatic command
to water plants.
 Sensors help monitor the state of industrial equipment, and in case of a pre-failure
situation, an IoT system generates and sends automatic notifications to field
engineers.
 Control applications can be either rule-based or machine-learning based. In the first
case, control apps work according to the rules stated by specialists. In the second
case, control apps are using models which are regularly updated (once in a week,
once in a month depending on the specifics of an IoT system) with the historical data
stored in a big data warehouse.
Users applications
a software component of an IoT system which enables the
connection of users to an IoT system and gives the options to
monitor and control their smart things (while they are connected
to a network of similar things, for example, homes or cars and
controlled by a central system). With a mobile or web app, users
can monitor the state of their things, send commands to control
applications, set the options of automatic behavior (automatic
notifications and actions when certain data comes from sensors).
Conclusion
 Things equipped with sensors to gather data
and actuators to perform commands received from the cloud.
 Gateways for data filtering, preprocessing and moving it to the
cloud and vice versa, – receiving commands from the cloud.
 Cloud gateways to ensure data transition between field
gateways and central IoT servers.
 Streaming data processors to distribute the data coming
from sensors among relevant IoT solution’s components.
 Data lake for storing all the data of defined and undefined
value.
 Big data warehouse for collecting valuable data.
 Control applications to send commands to actuators.
 Machine learning to generate the models which are then
used by control applications.
 User applications to enable users to monitor control their
connected things.
 Data analytics for manual data processing.
1 sur 26

Recommandé

Iot architecture par
Iot architectureIot architecture
Iot architectureAnam Iqbal
2.1K vues30 diapositives
IOT and Characteristics of IOT par
IOT and  Characteristics of IOTIOT and  Characteristics of IOT
IOT and Characteristics of IOTAmberSinghal1
19.6K vues12 diapositives
Iot architecture par
Iot architectureIot architecture
Iot architectureNiranjan Kumar
13.3K vues19 diapositives
Iot presentation par
Iot presentationIot presentation
Iot presentationhuma742446
2.1K vues41 diapositives
IOT Platform Design Methodology par
IOT Platform Design Methodology IOT Platform Design Methodology
IOT Platform Design Methodology poonam kumawat
2.6K vues35 diapositives
15CS81- IoT Module-2 par
15CS81- IoT Module-215CS81- IoT Module-2
15CS81- IoT Module-2Syed Mustafa
13.3K vues212 diapositives

Contenu connexe

Tendances

Internet of Things: A Hands-On Approach par
Internet of Things: A Hands-On ApproachInternet of Things: A Hands-On Approach
Internet of Things: A Hands-On ApproachArshdeep Bahga
12.3K vues2 diapositives
Lecture 1 - Introduction to IoT par
Lecture 1 - Introduction to IoTLecture 1 - Introduction to IoT
Lecture 1 - Introduction to IoTAlexandru Radovici
10.5K vues27 diapositives
IoT security (Internet of Things) par
IoT security (Internet of Things)IoT security (Internet of Things)
IoT security (Internet of Things)Sanjay Kumar (Seeking options outside India)
14.8K vues41 diapositives
IoT par
IoTIoT
IoTAnanth Kumar
7K vues37 diapositives
what is Internet of things(iot) & how does it work par
what is Internet of things(iot) & how does it workwhat is Internet of things(iot) & how does it work
what is Internet of things(iot) & how does it workSara shall
496 vues17 diapositives
iot based home automation par
iot based home automationiot based home automation
iot based home automationparvathy s m
12.9K vues19 diapositives

Tendances(20)

Internet of Things: A Hands-On Approach par Arshdeep Bahga
Internet of Things: A Hands-On ApproachInternet of Things: A Hands-On Approach
Internet of Things: A Hands-On Approach
Arshdeep Bahga12.3K vues
what is Internet of things(iot) & how does it work par Sara shall
what is Internet of things(iot) & how does it workwhat is Internet of things(iot) & how does it work
what is Internet of things(iot) & how does it work
Sara shall496 vues
iot based home automation par parvathy s m
iot based home automationiot based home automation
iot based home automation
parvathy s m12.9K vues
Technology Behind IoT (JNTUK - Unit - 1) par FabMinds
Technology Behind IoT (JNTUK - Unit - 1)Technology Behind IoT (JNTUK - Unit - 1)
Technology Behind IoT (JNTUK - Unit - 1)
FabMinds562 vues
IOT - Design Principles of Connected Devices par Devyani Vasistha
IOT - Design Principles of Connected DevicesIOT - Design Principles of Connected Devices
IOT - Design Principles of Connected Devices
Devyani Vasistha6.9K vues
Io t system management with par xyxz
Io t system management withIo t system management with
Io t system management with
xyxz15.2K vues
Pervasive computing par Preethi AKNR
Pervasive computingPervasive computing
Pervasive computing
Preethi AKNR19.1K vues
Home automation using iot par Rasik Rashid
Home automation using iotHome automation using iot
Home automation using iot
Rasik Rashid798 vues
Internet of things for Smart Home par Khwaja Aamer
Internet of things for Smart Home Internet of things for Smart Home
Internet of things for Smart Home
Khwaja Aamer21.9K vues

Similaire à Lecture 11

Security Issues & Threats in IoT Infrastructure par
Security Issues & Threats in IoT InfrastructureSecurity Issues & Threats in IoT Infrastructure
Security Issues & Threats in IoT InfrastructureIJAEMSJORNAL
19 vues5 diapositives
15CS81 Module1 IoT par
15CS81 Module1 IoT15CS81 Module1 IoT
15CS81 Module1 IoTGanesh Awati
773 vues25 diapositives
Lec2.pptx par
Lec2.pptxLec2.pptx
Lec2.pptxMuhammadIbrahim983635
7 vues21 diapositives
Lec2.pptx par
Lec2.pptxLec2.pptx
Lec2.pptxMuhammadIbrahim983635
7 vues21 diapositives
IoT architecture.pptx par
IoT architecture.pptxIoT architecture.pptx
IoT architecture.pptxHammadArif32
33 vues18 diapositives
Challenges and application of Internet of Things par
Challenges and application of Internet of ThingsChallenges and application of Internet of Things
Challenges and application of Internet of ThingsAshutosh Bhardwaj
7.2K vues9 diapositives

Similaire à Lecture 11(20)

Security Issues & Threats in IoT Infrastructure par IJAEMSJORNAL
Security Issues & Threats in IoT InfrastructureSecurity Issues & Threats in IoT Infrastructure
Security Issues & Threats in IoT Infrastructure
IJAEMSJORNAL19 vues
Challenges and application of Internet of Things par Ashutosh Bhardwaj
Challenges and application of Internet of ThingsChallenges and application of Internet of Things
Challenges and application of Internet of Things
Ashutosh Bhardwaj7.2K vues
Internet of things chapter2.pdf par Rupesh930637
Internet of things chapter2.pdfInternet of things chapter2.pdf
Internet of things chapter2.pdf
Rupesh93063761 vues
Research Inventy : International Journal of Engineering and Science par inventy
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
inventy979 vues
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS par IJNSA Journal
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
IJNSA Journal70 vues
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS par IJNSA Journal
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
IJNSA Journal57 vues

Plus de vishal choudhary

SE-Lecture1.ppt par
SE-Lecture1.pptSE-Lecture1.ppt
SE-Lecture1.pptvishal choudhary
19 vues29 diapositives
SE-Testing.ppt par
SE-Testing.pptSE-Testing.ppt
SE-Testing.pptvishal choudhary
12 vues48 diapositives
SE-CyclomaticComplexityand Testing.ppt par
SE-CyclomaticComplexityand Testing.pptSE-CyclomaticComplexityand Testing.ppt
SE-CyclomaticComplexityand Testing.pptvishal choudhary
6 vues54 diapositives
SE-Lecture-7.pptx par
SE-Lecture-7.pptxSE-Lecture-7.pptx
SE-Lecture-7.pptxvishal choudhary
34 vues32 diapositives
Se-Lecture-6.ppt par
Se-Lecture-6.pptSe-Lecture-6.ppt
Se-Lecture-6.pptvishal choudhary
6 vues47 diapositives
SE-Lecture-5.pptx par
SE-Lecture-5.pptxSE-Lecture-5.pptx
SE-Lecture-5.pptxvishal choudhary
3 vues20 diapositives

Plus de vishal choudhary(20)

Dernier

Structure and Functions of Cell.pdf par
Structure and Functions of Cell.pdfStructure and Functions of Cell.pdf
Structure and Functions of Cell.pdfNithya Murugan
719 vues10 diapositives
Psychology KS5 par
Psychology KS5Psychology KS5
Psychology KS5WestHatch
119 vues5 diapositives
Dance KS5 Breakdown par
Dance KS5 BreakdownDance KS5 Breakdown
Dance KS5 BreakdownWestHatch
99 vues2 diapositives
Classification of crude drugs.pptx par
Classification of crude drugs.pptxClassification of crude drugs.pptx
Classification of crude drugs.pptxGayatriPatra14
101 vues13 diapositives
Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant... par
Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant...Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant...
Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant...Ms. Pooja Bhandare
133 vues45 diapositives
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB... par
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...Nguyen Thanh Tu Collection
88 vues113 diapositives

Dernier(20)

Structure and Functions of Cell.pdf par Nithya Murugan
Structure and Functions of Cell.pdfStructure and Functions of Cell.pdf
Structure and Functions of Cell.pdf
Nithya Murugan719 vues
Psychology KS5 par WestHatch
Psychology KS5Psychology KS5
Psychology KS5
WestHatch119 vues
Dance KS5 Breakdown par WestHatch
Dance KS5 BreakdownDance KS5 Breakdown
Dance KS5 Breakdown
WestHatch99 vues
Classification of crude drugs.pptx par GayatriPatra14
Classification of crude drugs.pptxClassification of crude drugs.pptx
Classification of crude drugs.pptx
GayatriPatra14101 vues
Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant... par Ms. Pooja Bhandare
Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant...Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant...
Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB... par Nguyen Thanh Tu Collection
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
CUNY IT Picciano.pptx par apicciano
CUNY IT Picciano.pptxCUNY IT Picciano.pptx
CUNY IT Picciano.pptx
apicciano54 vues
Solar System and Galaxies.pptx par DrHafizKosar
Solar System and Galaxies.pptxSolar System and Galaxies.pptx
Solar System and Galaxies.pptx
DrHafizKosar106 vues
The basics - information, data, technology and systems.pdf par JonathanCovena1
The basics - information, data, technology and systems.pdfThe basics - information, data, technology and systems.pdf
The basics - information, data, technology and systems.pdf
JonathanCovena1146 vues
How to empty an One2many field in Odoo par Celine George
How to empty an One2many field in OdooHow to empty an One2many field in Odoo
How to empty an One2many field in Odoo
Celine George87 vues
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively par PECB
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
PECB 623 vues
Class 9 lesson plans par TARIQ KHAN
Class 9 lesson plansClass 9 lesson plans
Class 9 lesson plans
TARIQ KHAN51 vues

Lecture 11

  • 2.  Internet of Things (IoT) according to the 2020 conceptual framework is expressed through a simple formula IoT= Services+ Data+ Networks + Sensors the term IoT is a worldwide network of intelligent objects that are interconnected and uniquely represent able on the basis of communication- based protocols
  • 3. The Internet of things’ objects enable the connection with internet to work anytime, anywhere and anyplace The IoT four key technological enablers are: -  For tagging the things RFID technology used  For sensing the things sensor technology used  For thinking the things smart technology used  For shrinking the things Nanotechnology used
  • 4. ARCHITECTURE The Internet of Things is considered as the third wave of the World Wide Web (WWW) after static web pages and social networking’s based web. The IoT is a worldwide network that connects different type of objects at anytime and anywhere via a popular internet protocol named Internet Protocol(IP)
  • 5. Conventional IoT architecture it is considered as three layers: -  Perception Layer  Network Layer  Application Layer
  • 7. Perception layer The perception layer is the lowest layer of the conventional architecture of IoT. This layer’s main responsibility is to collect useful information/data from things or the environment (such as WSN, heterogeneous devices, sensors type real world objects, humidity, and temperature etc.) and transform them in a digital setup. The main purpose of objects is unique address identification and communication between short-range technologies such as RFID, Bluetooth, Near-Field Communication (NFC), 6LoWPAN (Low Power Personal Area Network)
  • 8. Network layer This layer’s main responsibility is to help and secure data transmission between the application and perception layer of IoT architecture .This layer mainly collects information and delivers to the perception layer toward several applications and servers. Basically, this layer is a convergence of internet and communication-based networks. It is the core layer (network layer) of IoT that is capable of advancing the information for relevant procedures. The data processing relevant tasks handled IoT management. This layer also ensures unique addressing and routing abilities to the unified integration of uncountable devices in a single cooperative network. Various types of technologies are contributed for this phenomenon such as wired, wireless and satellite. The implementation of 6LoWPAN protocol towards IPV6 for
  • 9. Application layer The application layer is considered as a top layer of conventional IoT architecture. This layer provides the personalized based services according to user relevant needs . This layer’s main responsibility is to link the major gap between the users and applications. This IoT layer combines the industry to attain the high-level intelligent applications type solutions such as the disaster monitoring, health monitoring, transposition, fortune, medical and ecological environment, and handled global management relevant to all intelligent type applications.
  • 10. Three layers model is further divided into five layers 1. The bottom layer of IoT architecture perception layer represents an object layer. The object layer’s main responsibility is to collect data from different heterogeneous category devices and then process and digitize the data. It also transfers the processed data into upper layers of IoT architecture. 2. The middle layer of conventional IoT architecture network layer represents an object abstraction layer. The object abstraction layer acts as a mediating layer between service management and the object layer. In object abstraction, RFID, WIFI and Third Generation (3G) communication technologies are used.
  • 11. 3. The service management layer’s main responsibilities are facilitating information processing, decision-making, and control of pairing requestor information processing for relevant tasks. 4. The application layer provides the customers with smart high-quality facilities according to the pre-request of the customers. 5. The Business layer represents the business model and data that’s been received from the application layer
  • 12. IoT Security The IoT security is dependent on three things data confidentiality, privacy, and trust. The IoT security goals are achieved in a better way if the three things are utilized for all of the users of IoT efficient and reliable way.
  • 13.  The IoT architecture layers all faced security issues in term of security attacks. The security requirements are different according to different applications. The IoT architectures’ top layer of the application layers’ main security issues til today are data sharing that protect user privacy and access controls. The other attacks also faced on application layers include phishing, malware attack.  The IoT architecture core network layer faced main security challenges like integrity and confidential data. The other problems on the network layer are Denial of Services (DoS), eavesdropping, a man in the middle, heterogeneity, RFID interference, Node jamming
  • 14.  The IoT architectures’ lowest layer, the perception layer, faces the major security challenge of cyber-attack. The other attacks faced in the perception layer are a fake node, malicious code injection, protection of sensor data, side channel attack.These attacks destroy any type of applications in IoT architecture if proper security mechanism, algorithms, and technologies are not implemented in time. The researchers analyzed the IoT architecture layers high impact on security attacks are node tempering, fake node, malicious code based injection, heterogeneity type of network problem, data access and authentication problem,
  • 15. IOT Security Requirement  That the application layer security requirements are authentication and key management, privacy protection and management.  The network layer security requirements are identity authentication, encryption mechanism, and communication security.  The perception layer security requirements are lightweight encryption technology, protection sensor data, and key management.  The IoT security challenges involved different encryption mechanisms such as end-to- end encryption and hop encryption. The IoT security challenges involved different communication protocols such as Transport Layer Security (TLS), Secure Socket Layer (SSL), Internet Protocol Security (IPSec). The IoT security challenges are controlled through the implement action of cryptographic algorithms such Advance Encryption Standard (AES) for confidentiality, Rivest Shamir Adelman (RSA) for the digital signature of the key, Diffi-Hellman (DH) for key agreement and Secure Hash Algorithm (SHA) for integrity
  • 16. Elements of IoT architecture
  • 17. Things A “thing” is an object equipped with sensors that gather data which will be transferred over a network and actuators that allow things to act (for example, to switch on or off the light, to open or close a door, to increase or decrease engine rotation speed and more). This concept includes fridges, street lamps, buildings, vehicles, production machinery, rehabilitation equipment and everything else imaginable. Sensors are not in all cases physically attached to the things: sensors may need to monitor, for example, what happens in the closest environment to a thing.
  • 18. Gateway Data goes from things to the cloud and vice versa through the gateways. A gateway provides connectivity between things and the cloud part of the IoT solution, enables data preprocessing and filtering before moving it to the cloud (to reduce the volume of data for detailed processing and storing) and transmits control commands going from the cloud to things. Things then execute commands using their actuators.
  • 19. Streaming Data Processor Ensures effective transition of input data to a data lake and control applications. No data can be occasionally lost or corrupted.
  • 20. Data Lake A data lake is used for storing the data generated by connected devices in its natural format. Big data comes in "batches" or in “streams”. When the data is needed for meaningful insights it’s extracted from a data lake and loaded to a big data warehouse.
  • 21. Big Data Warehouse Filtered and preprocessed data needed for meaningful insights is extracted from a data lake to a big data warehouse. A big data warehouse contains only cleaned, structured and matched data (compared to a data lake which contains all sorts of data generated by sensors). Also, data warehouse stores context information about things and sensors (for example, where sensors are installed) and the commands control applications send to things.
  • 22. Data analysts Data analysts can use data from the big data warehouse to find trends and gain actionable insights. When analyzed (and in many cases – visualized in schemes, diagrams, info graphics) big data show, for example, the performance of devices, help identify inefficiencies and work out the ways to improve an IoT system (make it more reliable, more customer-oriented). Also, the correlations and patterns found manually can further contribute to creating algorithms for control applications.
  • 23. Machine learning and the models ML generates With machine learning, there is an opportunity to create more precise and more efficient models for control applications. Models are regularly updated (for example, once in a week or once in a month) based on the historical data accumulated in a big data warehouse. When the applicability and efficiency of new models are tested and approved by data analysts, new models are used by control applications.
  • 24. Control application Send automatic commands and alerts to actuators, for example:  Windows of a smart home can receive an automatic command to open or close depending on the forecasts taken from the weather service.  When sensors show that the soil is dry, watering systems get an automatic command to water plants.  Sensors help monitor the state of industrial equipment, and in case of a pre-failure situation, an IoT system generates and sends automatic notifications to field engineers.  Control applications can be either rule-based or machine-learning based. In the first case, control apps work according to the rules stated by specialists. In the second case, control apps are using models which are regularly updated (once in a week, once in a month depending on the specifics of an IoT system) with the historical data stored in a big data warehouse.
  • 25. Users applications a software component of an IoT system which enables the connection of users to an IoT system and gives the options to monitor and control their smart things (while they are connected to a network of similar things, for example, homes or cars and controlled by a central system). With a mobile or web app, users can monitor the state of their things, send commands to control applications, set the options of automatic behavior (automatic notifications and actions when certain data comes from sensors).
  • 26. Conclusion  Things equipped with sensors to gather data and actuators to perform commands received from the cloud.  Gateways for data filtering, preprocessing and moving it to the cloud and vice versa, – receiving commands from the cloud.  Cloud gateways to ensure data transition between field gateways and central IoT servers.  Streaming data processors to distribute the data coming from sensors among relevant IoT solution’s components.  Data lake for storing all the data of defined and undefined value.  Big data warehouse for collecting valuable data.  Control applications to send commands to actuators.  Machine learning to generate the models which are then used by control applications.  User applications to enable users to monitor control their connected things.  Data analytics for manual data processing.