Professional Documents
Culture Documents
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that
making a false declaration is a form of malpractice.
Student’s signature
Grading grid
P1 P2 P3 P4 M1 M2 M3 M4 D1 D2
ASSIGNMENT 1 BRIEF
Assignment title
Submission Format:
LO1 Analyse what aspects of IoT are necessary and appropriate when designing software applications
LO2 Outline a plan for an appropriate IoT application using common architecture, frameworks, tools, hardware
and APIs
LO3 Develop an IoT application using any combination of hardware, software, data, platforms and services.
LO4 Evaluate your IoT application and detail the problem your IoT application solves, the potential impact on
people, business, society and the end user and the problems it might encounter when integrating into the wider
IoT ecosystem
You currently work as a product developer for a new startup where you design IoT products for the
consumer, corporate, government and defence clients. As part of your role your manager has tasked you
to plan and develop a new IoT product, service or application for a potential client. You are required to
identify a target user and conduct tests with this user and include this feedback into multiple iterative
versions of your product.
Part 1 (Assignment 1):: For the first part, you must:
• Plan an IoT application for a specific target end user and the tests you intend to conduct with this
user. This plan will be in the form of a document and will include supporting evidence and
material, such as user personas and customer journey maps.
• Create multiple iterations of your application and modify each iteration with enhancements
gathered from user feedback and experimentation. This will follow the pathway outlined in your
plan.(log book,)
• Show evidence about Developed IoT application using any combination of hardware, software,
data, platforms and services (video or images of your IoT system with code snippet)
• Evaluate your IoT application and detail the problem your IoT application solves, the potential
impact on people, business, society and the end user and the problems it might encounter when
integrating into the wider IoT ecosystem
LO1 Analyse what aspects of IoT are necessary and appropriate when designing software
applications
LO2 Outline a plan for an appropriate IoT application using common architecture, frameworks,
tools, hardware and APIs
P3 Investigate architecture, M3 Select the most appropriate D2 Make multiple iterations plan
frameworks, tools, hardware IoT architecture, frameworks, of your IoT application and
and API techniques available tools, hardware and API modify each iteration to improve
to develop IoT applications. techniques to include in an your IoT application security.
application to solve this problem.
P4 Determine a specific
problem to solve using IoT. M4 Apply your selected
techniques to create an IoT
application development plan.
Contents
Assignment Brief 1 (RQF) ............................................................................................Error! Bookmark not defined.
P1 Explore various forms of IoT functionality. ........................................................................................................9
1. IoT overview ..............................................................................................................................................9
1.1. IoT definition......................................................................................................................................9
1.2. IoT feature .........................................................................................................................................9
2. IoT history ............................................................................................................................................... 10
3. IoT in software development ................................................................................................................... 14
4. The various form of IoT ............................................................................................................................ 14
4.1. Internet of underwater things........................................................................................................... 15
4.2. Internet of underground things ......................................................................................................... 16
4.3. Internet of battlefield things ............................................................................................................. 16
4.4. Internet of space things .................................................................................................................... 17
4.5. Internet of Nano things .................................................................................................................... 18
5. IOT pros and cons .................................................................................................................................... 19
5.1. Advantage........................................................................................................................................ 19
5.2. Disadvantage ................................................................................................................................... 20
P2 Review standard architecture, frameworks, tools, hardware, and APIs available for use in IoT development.... 21
1. IoT standard architecture ......................................................................................................................... 21
1.1. IoT architecture ................................................................................................................................ 21
1.2. Advantage and disadvantage of IoT architecture ............................................................................... 22
2. IoT frameworks ....................................................................................................................................... 23
2.1. Definition ......................................................................................................................................... 23
2.2. Common IoT frameworks ................................................................................................................. 23
3. IoT tools .................................................................................................................................................. 25
3.1. Definition ......................................................................................................................................... 25
3.2. Pros and cons of several IoT tools ..................................................................................................... 26
4. IoT hardware ........................................................................................................................................... 27
4.1. Definition ......................................................................................................................................... 27
4.2. Several components of IoT hardware ................................................................................................ 27
5. IoT APIs ................................................................................................................................................... 28
5.1. Definition ......................................................................................................................................... 28
5.2. Challenges and opportunities of IoT APIs .......................................................................................... 28
P3 Investigate a specific IoT platform (including architecture, frameworks, tools, hardware, and APIs) has been
chosen to develop an IoT system. ........................................................................................................................ 29
Page 6
Page 7
D1 Evaluate challenges when designing and implementing for the IoT system. ..................................................... 53
1. Challenge ................................................................................................................................................ 53
1.1. Design .............................................................................................................................................. 54
1.2. Implementation ............................................................................................................................... 54
D2 Make multiple iterations plan of your IoT application and modify each iteration to improve your IoT application
security. ............................................................................................................................................................. 57
1. Table of risk and solution for security purpose.......................................................................................... 57
Reference ........................................................................................................................................................... 60
Figure 1 .............................................................................................................................................................. 10
Figure 2 .............................................................................................................................................................. 11
Figure 3 .............................................................................................................................................................. 15
Figure 4 .............................................................................................................................................................. 16
Figure 5 .............................................................................................................................................................. 17
Figure 6 .............................................................................................................................................................. 18
Figure 7 .............................................................................................................................................................. 19
Figure 8 .............................................................................................................................................................. 22
Figure 9 .............................................................................................................................................................. 24
Figure 10 ............................................................................................................................................................ 30
Figure 11 ............................................................................................................................................................ 31
Figure 12 ............................................................................................................................................................ 33
Figure 13 ............................................................................................................................................................ 34
Figure 14 ............................................................................................................................................................ 35
Figure 15 ............................................................................................................................................................ 36
Figure 16 ............................................................................................................................................................ 38
Figure 17 ............................................................................................................................................................ 39
Figure 18 ............................................................................................................................................................ 41
Figure 19 ............................................................................................................................................................ 43
Table 1 ............................................................................................................................................................... 49
Table 2 ............................................................................................................................................................... 50
Table 3 ............................................................................................................................................................... 53
Table 4 ............................................................................................................................................................... 53
Table 5 ............................................................................................................................................................... 60
Page 8
A thing in the internet of things can be a person implanted with a heart monitor, a farm
animal implanted with a biochip transponder, a car with built-in sensors to alert the driver when
tire pressure is low, or any other natural or man-made object that can be assigned an Internet
Protocol (IP) address and can transfer data over a network.
Organizations in a range of sectors are increasingly utilizing IoT to run more effectively,
better understand consumers to provide better customer service, improve decision-making, and
raise the value of the business.
An IoT ecosystem is made up of web-enabled smart devices that employ embedded systems
including processors, sensors, and communication hardware to gather, send, and act on data from
their surroundings. IoT devices exchange sensor data by connecting to an IoT gateway or other
edge device, where data is either transferred to the cloud for analysis or examined locally. These
gadgets occasionally connect with other related devices and act on the information they receive
from one another.
The gadgets conduct most of the work without human interaction, while individuals may
engage with them to set them up, give them instructions, or view the data.
The connection, networking, and communication protocols utilized with these web-enabled
devices are heavily influenced by the IoT applications that are implemented.
IoT may also leverage artificial intelligence (AI) and machine learning to make data collection
easier and more dynamic.
Page 9
Figure 1
2. IoT history
Page 10
Figure 2
Page 11
1969:
ARPANET, the precursor to the modern Internet, is developed and put into service by DARPA, the U.S Defense
Advanced Research Projects agency. This is foundational to the “Internet” part of the Internet of Things.
• 1980s:
ARPANET is opened to the public by commercial providers, making it possible for people to connect things if they
want to.
• 1982:
Programmers at Carnegie Mellon University connect a Coca-Cola vending machine to the Internet, allowing them
to check if the machine has cold sodas before going to purchase one. This is often cited as one of the first IoT
devices.
• 1990:
John Romney, in response to a challenge, connected a toaster to the Internet and was able to successfully turn it
on and off, bringing us even closer to what we think of as modern IoT devices.
• 1993:
Engineers at the University of Cambridge, upholding the now well-established tradition of combining the Internet
with appliances and food, develops a system that takes pictures of a coffee machine three times a minute, allowing
its status to be remotely monitored by workers. World’s first webcam!
• 1995:
The first version of the long-running GPS satellite program run by the U.S. government is finally completed, a big
step towards proving one of the most vital components for many IoT devices: location.
• 1998:
IPv6 becomes a draft standard, enabling more devices to connect to the internet than previously allowed by
IPv4. While 32-bit IPv4 only provides enough unique identifiers for around 4.3 billion devices, 128-bit IPv6 has
enough unique identifiers for up to 2^128, or 340 undecillions. (That’s 340 with 36 zeroes!)
• 1999:
This is a big year for IoT, since it’s when the phrase was probably first used. Kevin Ashton, the head of MIT’s
Auto-ID labs, included it in a presentation to Proctor & Gamble executives as a way to illustrate the potential of RFID
tracking technology.
Page 12
• 2000:
LG announces what has become one of the quintessential IoT devices: the Internet refrigerator. It was an
interesting idea, complete with screens and trackers to help you keep track of what you had in your fridge, but its
$20,000+ USD price tag didn’t earn it a lot of love from consumers.
• 2004:
The phrase “Internet of Things” starts popping up in book titles and makes scattered media appearances.
• 2007:
The first iPhone appears on the scene, offering a whole new way for the general public to interact with the world
and Internet-connected devices.
• 2008:
The first international IoT conference is held in Zurich, Switzerland. The year is fitting, since it’s also the first year
that the number of Internet-connected devices grew to surpass the number of humans on earth.
• 2009:
Google starts self-driving car tests, and St. Jude Medical Center releases Internet-connected pacemakers. St.
Jude’s device will go on to make yet more history by being the first IoT medical device to suffer a major security
breach in 2016 (without casualties, fortunately). Also, Bitcoin starts operation, a precursor to blockchain
technologies that are likely to be a big part of IoT.
• 2010:
The Chinese government names IoT as a key technology and announces that it is part of their long-term
development plan. In the same year Nest releases a smart thermostat that learns your habits and adjusts your
home’s temperature automatically, putting the “smart home” concept in the spotlight.
• 2011:
Market research firm Gartner adds IoT to their “hype cycle,” which is a graph used to measure the popularity of a
technology versus its actual usefulness over time. As of 2018, IoT was just coming off of the peak of inflated
expectations and may be headed for a reality check in the trough of disillusionment before ultimately hitting the
plateau of productivity.
Page 13
• 2013:
Google Glass is released – a revolutionary step in IoT and wearable technology but possibly ahead of its time. It
flops hard.
• 2014:
Amazon releases the Echo, paving the way for a rush into the smart home hub market. In other news, an
Industrial IoT standards consortium form demonstrates the potential for IoT to change the way any number of
manufacturing and supply chain processes work.
• 2016:
General Motors, Lyft, Tesla, and Uber are all testing self-driving cars. Unfortunately, the first massive IoT
malware attack is also confirmed, with the Mirai botnet assaulting IoT devices with manufacturer-default logins,
taking them over, and using them to DDoS popular websites.
• 2017-2019:
IoT development gets cheaper, easier, and more broadly accepted, leading to small waves of innovation all over
the industry. Self-driving cars continue to improve, blockchains and AI begin to be integrated into IoT platforms, and
increased smartphone/broadband penetration continues to make IoT an attractive proposition for the future.
• The creation of embedded devices (low-power, reduced cost computers, most frequently based
on the ARM architecture). Protocols for improved communication (GSM, Wi-Fi, Bluetooth
variants and more specialized Zigbee, 6LowPAN, Sigfox and so on.)
• Protocols for improved communication (GSM, Wi-Fi, Bluetooth variants and more specialized
Zigbee, 6LowPAN, Sigfox and so on.)
• Influential corporations such as Amazon, Google, Apple, IBM, and Microsoft are also driving IoT.
Following the successful implementation of IoT, the Internet of Underwater Things (IoUT)
was originally explored in 2012. The application of IoT to our water bodies is known as IoUT. The
Internet of Underwater Things (IoUT) is a network of interconnected smart things that exist
underwater. This technology's goal is to digitally link all the world's water bodies, including oceans,
lakes, streams, and rivers.
Figure 3
In recent years, several smart underwater items have been developed, including
autonomous underwater vehicles (AUV), remotely operated underwater vehicles (ROV),
autonomous surface vehicles, and others. Underwater wireless sensor networks have been
deployed because of these developments and have proven to be a largely effective network system.
Underwater sensors are the main components of this network architecture; the sensors utilized are
nodes with acoustic modems. These sensors are linked to smart devices underwater by nodes and
Page 15
transmit data like as water quality, temperature, and pressure via acoustic modems. While this is an
intriguing promise, it cannot yet be fully utilized due to the obstacles that IoUT faces.
Figure 4
The Internet of Underground Things (IoUGT) is an enabling technology that can offer smart
oil and gas fields, smart agriculture fields, and smart seismic quality control in the production of all
these resources. However, owing to the harsh subterranean propagation environment, which
necessitates low power and tiny size underground sensors, long-range communication
technologies, efficient networking solutions, and precise localization algorithms, IoUGT
implementation is a difficult undertaking.
Military strategists envisage a future battlefield defined by the internet of things, in which
smart gadgets, unmanned aircraft, and soldier-worn sensors generate an unceasing flow of
Page 16
actionable data. The Internet of Military Things (IoMT) is a subset of the Internet of Things that is
used for military operations and warfare. It is a complex network of linked elements, or "things,"
inside the military domain that constantly communicate with one another to coordinate, learn, and
interact with the physical environment to achieve a wide range of functions in a more efficient and
informed manner. The idea behind IoMT is that future military confrontations will be controlled by
machine intelligence and cyber warfare, and that they would most likely take place in urban areas.
Figure 5
The IoMT is conceptually meant to alleviate much of the physical and mental stress that war
fighters face during conflict by directly building a micro ecosystem of smart technology capable of
distilling sensory data and autonomously regulating various activities. Several names are
established throughout time to define the use of IoT technology for reconnaissance, environmental
monitoring, unmanned warfare, and other military reasons. The names Military Internet of Things
(MIoT), Internet of Battle Things, and recently Internet of Battlefield Things are used (IoBT).
Page 17
more global, scalable, flexible, and robust solution, such as remote monitoring, Internet delivery to
underserved or disturbed regions, or intelligent global transport management. The Internet of
Space Things, a pervasive cyber-physical system for achieving genuine global connection, is
introduced in this article. This article analyses the state-of-the-art in satellite-based data networks
and provides a unique network architecture in which Software-defined Networking and Network
Function Virtualization play major enabling roles. Furthermore, the key issues in network design,
routing, and resource allocation are discussed.
Figure 6
As a result, the Internet of Space Things is the ultimate cyber-physical system, with far
greater application and service domains than the ordinary Internet of Things.
The Internet of Nano Things is a rapidly growing technology that has the possibility of
alleviating many of the world's most serious problems. It functions similarly to how we link devices
in the Internet of Things, but the main distinction is that it can connect nano components, which
the Internet of Things cannot. As a result, it ushers in a cutting-edge revolution in electromagnetic
communication domains among nanoscale devices.
Page 18
The Internet of nano things (IoNT) provides a platform for connecting diverse nanodevices
over high-speed networks. Nanodevices may be implemented with other modern technologies
such as cloud computing, big data, and machine learning using this technology.
The Internet of Nano Things may be used to create a Body Sensor Network (BSN) that uses
in-body nano sensors to monitor any patient's health and biological activities. Patients and
physicians may both access the data acquired by nano sensors on a wearable gadget. Doctors and
patients may access important heath data in real time via IoNT. Such information may be quite
helpful in preparing medical reports and assessing the impact of various therapies on a patient.
Figure 7
Nano sensors can be used to identify viruses that are difficult to detect. When such viruses
or bacteria are detected, nano sensors can warn doctors and patients, allowing healthcare
professionals to make educated decisions regarding their treatment. Healthcare practitioners may
be able to identify virus outbreaks such as the Nipah virus using Nano sensors. nano sensors may
also be used to measure the temperature of live cells within the human body.
The Internet of Things has various benefits in our daily lives. Some of its benefits are as follows:
Page 19
• Reduce human effort: As IoT devices connect and communicate with one another, they
may automate activities, improving the quality of a company's services and minimizing the
need for human intervention.
• Improved data collection: Information is easily available, even if we are far from our actual
position, and it is regularly and in real-time updated. As a result, these gadgets can access
data from anywhere, at any time, on any device.
• Efficient resource usage: By understanding the functioning and operation of each device,
we can increase resource consumption and monitor natural resources.
• Relevant to safety concerns: It is useful for safety since it detects possible dangers and
alerts people. GM OnStar, for example, is an integrated gadget that detects a car crash or
accident on the road. If an accident or crash is discovered, it quickly makes a call.
• Useful in the healthcare industry: Real-time patient care may be provided more effectively
without the requirement for a doctor's visit. It empowers patients to make decisions while
providing evidence-based treatment.
5.2. Disadvantage
As the Internet of Things brings benefits, it also brings a considerable set of problems. The
following are some of the downsides of IoT:
• Concerns about security: IoT systems are networked and interact via networks. As a result,
despite any security precautions, the system provides limited control and can lead to
numerous types of network assaults.
• Unemployment has increased: Unskilled employees, as well as skilled people, are at danger
of losing their jobs, resulting in high unemployment rates. Smart security cameras, robots,
smart ironing systems, smart washing machines, and other amenities are taking the place of
the humans who used to execute these tasks.
• There is a high risk that the entire system may be corrupted: If there is a problem in the
system, every linked device might become corrupted.
Page 20
• Reduced mental and physical activity: People become illiterate because of their reliance on
smart gadgets rather of undertaking physical work, causing them to become sluggish and
sedentary.
• High internet reliance: They are extremely reliant on the internet and cannot function
properly without it.
The Internet of Things (IoT) technology has a wide range of applications, and its use is
rapidly expanding. It operates in accordance with the many Internets of Things application areas
for which it was designed/developed. However, it lacks a standard defined working architecture
that is rigidly adhered to globally. The architecture of IoT is determined by its usefulness and
application in various areas. Still, there is a fundamental process flow upon which IoT is
constructed.
Page 21
Figure 8
• Sensing Layer: This layer contains sensors, actuators, and devices. These Sensors or Actuators receive
data (physical/environmental characteristics), process it, and then transmit it across a network.
• Network Layer: This layer contains Internet/Network gateways and Data Acquisition Systems (DAS). DAS
oversees data aggregation and conversion (Collecting data and aggregating data then converting analog
data of sensors to digital data etc.). Advanced gateways, which primarily link Sensor networks to the
Internet, also handle several fundamental gateway functions such as virus protection and filtering, as
well as decision making based on inputted data and data management services, among others.
• Data processing Layer: This is the IoT ecosystem's processing unit. Data is evaluated and pre-processed
here before being sent to a data center, where it is accessible by software programs known as business
applications, where data is monitored and maintained, and subsequent actions are planned. As a result,
edge IT or edge analytics enters the picture.
• Application Layer: The application layer is the fourth and final step of IoT architecture. Data centers or
the cloud are data management stages where data is maintained and used by end-user applications such
as agriculture, health care, aerospace, farming, military, and so on.
1.2.1. Pros
It can help with better house and city control via mobile phones. It improves security and
provides personal safety. We save a lot of time by automating processes. Even though we are
Page 22
far away from our actual location, information is freely available and constantly updated in
real time. Electric devices are connected directly and interact with a controller computer, such
as a mobile phone, leading in efficient power utilization. Consequently, no superfluous
electricity equipment will be used. IoT apps can give personal help by alerting you to your
routine plans. It is important for safety since it detects possible hazards and alerts people.
1.2.2. Cons
Hackers may obtain access to the system and take sensitive data. Because we are
connecting so many gadgets to the internet, there is a possibility that our information may be
exploited. They are completely reliant on the internet and would be unable to function
successfully without it. There are several ways for systems to fail due to their complexity. We
lose control of our lives—they will be completely regulated and dependant on technology.
People become ignorant because of their overuse of the Internet and technology because they
rely on smart devices instead of completing physical work, causing them to become
lazy. Unskilled individuals face a significant chance of job loss, which might result in
unemployment.
2. IoT frameworks
2.1. Definition
An IoT framework is a middleware layer that sits beneath one or more IoT applications and
provides a network-facing application interface through which peer framework nodes can
communicate. Frameworks frequently offer a variety of communication protocols and message
carrying methods. IoT frameworks also provide security features to apps and peer framework
nodes, such as hardware-roots-of-trust.
The notion of the IoT framework is also used in the design of many physical items, such as
thermostats, electrical gadgets, security and alarm systems, and vending machines, among many
others.
Page 23
Kaa IoT is one of the most powerful and feature-rich Open-Source Internet of Things Cloud
Platforms, allowing anybody to freely execute their smart product designs. On this platform,
you may manage a N number of devices that are connected to each other via cross-device
interoperability. By supplying and installing remote devices, you may monitor your system in
real time. Kaa facilitates data flow between networked devices, the IoT Cloud, information and
visualization systems, and other IoT Ecosystem components.
Figure 9
• Pros
• Cons
✓ it has very limited processing power so it can’t be used for projects which need high
processing like computer vision, speech recognition, deep learning etc.
The open-source Node-Red serves as a visual interface for connecting any linked hardware
devices, services, and APIs. This open-source IoT framework often wires in novel and distinct
Page 24
ways that other open-source frameworks do not. Node-Red open source is based on Node.js
and can run on the Raspberry Pi as well as other 60,000 distinct modules.
• Pros
It visually displays relationships and functions and allows the user to program
without having to enter a language. Node-RED is a browser-based flow editor that
allows you to add and delete nodes as well as wire them together to make them
interact with one another.
• Cons
Despite the benefits indicated above, using a Node RED flow as an orchestrator, and
performed as a function would result in a double billing issue since the orchestrator
function would have to wait for the orchestrated functions to complete.
3. IoT tools
3.1. Definition
IoT Tools is an abbreviation for Internet of Things Tools. It is a network or link of gadgets,
cars, equipment with embedded electronics, household appliances, and buildings, among other
things. This aids in the collection and exchange of many types of data. It also enables the user to
remotely operate the gadgets over a network.
IoT has seized the IT sector and is the latest term in today's internet-driven society. It has
opened a plethora of new opportunities for firms and developers working on IoT. As a result of IoT
app development, several amazing items have been created. Companies that provide Internet of
Page 25
Things solutions are developing hardware and software designs to assist IoT developers in
developing new and exceptional IoT devices and apps.
3.2.1. Tessel 2
It is used to create rudimentary Internet of Things prototypes and apps. It assists because to
its multiple modules and sensors. A developer may use the Tessel 2 board to get Ethernet, Wi-
Fi, two USB ports, a micro-USB port, 32MB of Flash, and 64MB of RAM. Cameras,
accelerometers, RFID, GPS, and other modules can also be incorporated.
• Pros
✓ It supports Node 4.x LTS out of the box and does not require any configuration.
✓ System of coprocessors
• Cons
✓ There is little memory. RAM capacity of 64 MB. This puts it more in line with an
Arduino-style board than a Raspberry Pi-level SBC.
• Pros
Page 26
This tool or instrument enables users to create, adopt, and promote open source IoT
solutions. It is ideally suited for the development of IoT devices, Cloud platforms, and
gateways. Eclipse provides support for several IoT-related projects. These projects
include open-source implementations of IoT protocols, application frameworks and
services, and tools for the Lua programming language, which is marketed as the finest
programming language for IoT.
• Cons
Because it is a very heavy IDE, dealing with low-end frameworks may be a hurried
task. Its start-up time is exceedingly slow and necessitates a significant amount of
handling power. Furthermore, if you are a novice, you will find it quite difficult to use,
and its documentation is also inadequate.
It consumes memory and slows down the machine. The absence of a debugger for
C++ is a shortcoming. There is no plugin available for the live server.
4. IoT hardware
4.1. Definition
On the Internet of Things, hardware may take numerous forms, including the underlying
processors that run the phones, sensors that gather data from the real environment, and edge
machines that process and analyse the data. IoT hardware is at the heart of every connected
endeavour, and the technological capabilities of these boards have only grown in importance as
the Internet of Things has evolved. However, because to the overwhelming amount of design
boards and modules in the room, selecting the correct IoT hardware for a project might be difficult.
In this post, we'll look at several components of IoT hardware and how these devices connect with
the internet.
• Sensors
Sensors are the most important piece of hardware in IoT applications since they collect data
from their surroundings. Power management modules, RF, energy, and sensor modules are all part
of these systems. An RF module manages communication from Wi-Fi, Bluetooth, transceiver, BAW,
and duplexer.
• Microcontrollers
Page 27
IoT hardware includes smart wearable gadgets such as smart memory, glasses, rings, and
shoes. As part of an IoT network, smart gadgets enable us to access more of the material and
resources we like, as well as establish a new way to cooperation. Desktops, mobile phones, and
tablets have become typical command canters and will continue to be a vital element of IoT
applications. Other network distribution equipment, including as switches, hubs, and routers, play
an important role in IoT applications.
5. IoT APIs
5.1. Definition
The application program (or programming) interface, or API, is perhaps what truly binds the
"things" of the "internet of things" together. IoT APIs are the points of contact between an IoT
device and the internet and/or other network elements. "APIs are strongly associated with IoT
because they allow you to securely expose connected devices to consumers, go-to-market
channels, and other applications in your IT infrastructure," says API management provider Axway.
5.2.1. Challenges
APIs, according to Mahbubul Alam, CTO and CMO of Movimento Group, are part of one
frequent pain issue he sees in the IoT ecosystem: suppliers offering a "all or nothing" IoT
solution, regardless of what elements a firm may already have - their own security and
databases, for example.
Corporations frequently boast "open APIs," but this simply means that each IoT application
speaks its own language, to which companies must adapt – as opposed to open-source APIs,
which provide more information.
"APIs are producing a genuine pain point, which is not being fully open and thinking about
how we can mix and match and provide the client the greatest choice.
Page 28
5.2.2. Opportunities
For starters, the industry is likely to expand significantly as more businesses use IoT. There
are currently multiple platforms for consumer and industrial IoT, and this fragmentation has
ramifications for interoperability and the size of IoT installations.
According to Vikram Saksena of NetScout's CTO office, which monitors IoT projects once
they are pushed out, there is opportunity for service providers in these early days of IoT. "This
fragmentation and silos present both obstacles and opportunities," he explained. "I believe
that one of the things that service providers may bring is through breaking down silos."
While a whole end-to-end IoT architecture is comprised of several bits, this design reduces it to
three key building elements [3]:
➢ Sensors, actuators, and edge devices that interact with the environment comprise the
perception layer.
➢ Application Layer — Data processing and storage that provides consumers with
customized services and capabilities.
Page 29
Figure 10
A physical or perceptual IoT layer is made up of devices, which often contain sensors, actuators, and
other smart devices. These are the "Things" in the Internet of Things. In turn, devices interface with and
interact with the cloud through wire or localized Radio Frequency (RF) networks. Typically, this is
accomplished using gateways. IoT devices are frequently considered to be at the "edge" of the IoT network
and are referred to as "edge nodes." When choosing a device, consider the needs for specific I/O protocols
and potential delay, wired or RF connections, power, durability, and overall sensitivity. It's vital to figure
just how much device flexibility your architecture needs.
IoT Gateways are critical middlemen that act as messengers and translators between the cloud and
clusters of smart devices. They are physical devices or software programs that often run from the field near
edge sensors and other devices. Large IoT systems may employ a slew of gateways to service many edge
nodes. They can perform a variety of functions, but their primary job is to normalize, link, and transport
data between the physical device layer and the cloud. Every data that travels between the cloud and the
physical device layer must pass via a gateway. IoT gateways are sometimes known as "intelligent gateways"
or "control tiers."
The application layer is the Cloud. It connects with the gateway through wired or cellular internet. The
Page 30
"Cloud" might be anything from AWS or Google Cloud services to server farms or even a company's on-
premises remote server. It offers strong servers and databases that allow sophisticated IoT applications
and combine features like data storage, big data processing, filtering, analytics, 3rd party APIs, business
logic, alarms, monitoring, and user interfaces. The "Cloud" is also used to control, configure, and trigger
events at the gateway and, eventually, the edge devices in a Three Layer IoT Architecture.
2. Framework
2.1. Google Cloud Platform – Internet of Things framework
Google is capable of accomplishing tasks. With its end-to-end platform, Google Cloud is one
of the greatest IoT systems available today. Google distinguishes themselves from the competition
by being able to process enormous amounts of data utilizing Cloud IoT Core.
It's a simple fact that corporations prefer their competitors' IoT products over Google's.
Element of this is likely due to Amazon and Microsoft having larger cloud client bases, and another
part is that Google isn't as well-known to companies. Instead, corporations may regard Google as a
social media firm, which is correct in terms of income.
Figure 11
Google's IoT technical tools are excellent, but the packaging of their IoT services differs
sufficiently from competitors that prospective purchasers may struggle to determine what's
required and how to utilize it.
Page 31
Google's proprietary ASIC (Edge TPU) was created to enable AI forward staging for latency-
sensitive applications. The ASIC is open to device manufacturers, but Google has partnered with
Coral to supply a choice of edge controllers that use the chip. Other edge elements can be used for
local event processing by employing one of the devices linked IoT protocols or by establishing a
bespoke link to Cloud Pub/Sub, Google's message/event ingestion service.
In Google's IoT paradigm, Cloud Pub/Sub is the on-ramp for all event processing. It converts
messages and events into a generic publish/subscribe format, allowing any Google Cloud or Cloud
IoT application, as well as user applications, to subscribe to event flows and receive IoT messages
based on their requirements. Cloud Pub/Sub is a framework for ensuring event delivery, event
steering, and even features that ensure all events are properly handled. It also offers
security/compliance capabilities that make developing compliant IoT apps easier.
Cloud Pub/Sub is a Google Cloud service that is used to link devices using the controlled
Cloud IoT Core Service’s Protocol Bridge element. As a result, IoT apps that do not use Cloud IoT
Core for whatever reason can still connect to the rest of Google's IoT-friendly cloud services, such
as analytics. A Pub/Sub Lite version is also available if complex processing skills are less critical than
inexpensive cost.
The Cloud Pub/Sub interface connects events to any of Google's analytics products (Cloud
Dataflow, Big Query, Cloud Bigtable, Machine Learning, and Google Data Studio), as well as third-
party analytics or AI apps that can use Cloud Pub/Sub. Google also provides a diverse variety of
tools and apps that make use of artificial intelligence and machine learning. These are accessible to
IoT apps but are not directly connected with Google's IoT products.
While Google offers certain digital twin solutions at the business process level (for example,
its new Supply Chain Digital Twin), it has not yet provided digital twinning of IoT apps or IoT
infrastructure. As with edge computing, Google may rely on third-party connections to provide a
larger digital twin IoT application architecture, albeit this has not yet been published.
3. Tools
3.1. Arduino
Arduino is a computer technology business established in Italy that creates interactive items
and microcontroller boards. It is an open-source prototyping platform that provides IoT hardware
as well as software. Interactive electronics can benefit from hardware standards, and software
Page 32
includes the Integrated Development Environment (IDE). It is the most popular IDE among all IoT
development tools. This platform is basic and straightforward to use.
Cross-platform - The Arduino Software (IDE) is available for Windows, Macintosh OSX, and
Linux. Most microcontroller systems are only compatible with Windows.
Figure 12
Open source and extendable software - The Arduino software is provided as open-source
tools, allowing skilled programmers to extend it. The language may be expanded using C++
libraries, and those interested in the technical intricacies can switch from Arduino to the AVR C
programming language on which it is based. Similarly, if you choose, you may incorporate AVR-C
code straight into your Arduino applications.
Page 33
Open source and extendable hardware - The Arduino board plans are given under a Creative
Commons license, allowing skilled circuit designers to create their own version of the module,
expanding, and upgrading it. Even unskilled users may construct the breadboard version of the
module to learn how it works and save money.
4. Hardware
4.1. Temperature sensor
The Temperature Sensor LM35 series are precision integrated-circuit temperature devices
with output voltages that are directly proportional to the temperature in degrees Celsius.
Figure 13
The LM35 device has an advantage over linear temperature sensors calibrated in Kelvin in
that the user does not have to remove a huge constant voltage from the output to achieve easy
Centigrade scaling. The LM35 device does not require any external calibration or trimming to
achieve average accuracies of +1/4°C at room temperature and +3/4°C throughout a temperature
range of 55°C to 150°C.
The Gas Sensor detects gas and smoke concentrations ranging from 300ppm to 10000ppm.
Butane, propane, methane, alcohol, hydrogen, and smoke are all detectable by it.
Page 34
The sensor's output voltage varies in response to the amount of smoke/gas in the
environment. The sensor produces a voltage that is proportionate to the amount of smoke/gas
present.
In other terms, the following is the connection between voltage and gas concentration:
• The higher the gas concentration, the higher the output voltage.
• The lower the output voltage, the lower the gas concentration.
In any case, a water pump is a device that uses kinetic energy to create a flow of liquid. As a
result, it has the following fundamental elements:
Figure 14
The one in charge of creating the kinetic energy that removes the water from the inlet and
transfers it through the outlet is the motor + propeller.
Check-out: this is the intake where the liquid driven by the water pump's power will exit.
Page 35
These hydraulic pumps are widely employed in a wide range of applications and gadgets.
From industrial to water dispensers, automatic irrigation systems, sprinkler irrigation, supply
systems, treatment plants, and so on. As a result, there are a plethora of models on the market,
each with a unique set of capabilities and capabilities.
Figure 15
The FTDI USB-to-serial driver chip is absent from the Uno, as is the case with all previous boards.
Instead, it has an ATmega16U2 that has been programmed as a USB-to-serial converter. This extra
microcontroller comes with its own USB bootloader, allowing experienced users to reprogram it.
5. APIs
5.1. Advantage
In the case of IoT devices, effective administration and handling can allow developers to
choose which API to use and when to withdraw access. App and IoT device developers can provide
single or many connection requirements. Continuous API monitoring is an important part of the
process since it allows for the early discovery of any unanticipated flaws or failure chances. It offers
a clear picture of the value and application of APIs in IoT.
Deeper insights into the API developer experience may be gained by comparing the standard
experience and delivering an end-user experience to identify shortcomings. IoT programming that
necessitates the deployment of an emergency API is fully supported since it provides information
on API scalability and use quotas.
Page 36
IoT programming that necessitates the usage of an emergency API is fully supported, since it
provides information on API scalability, use quotas, and throttling.API version changes are now
easier than ever, with strong management standards being maintained when new version updates
are made available on a timely basis.
5.2. Disadvantage
• Everyone must adhere to the most recent OAuth requirements. This has shown to be the
simplest, most secure, and dependable method for consumers to communicate their
data with another system via APIs. Most large corporations have done this, but it must
be done universally. The OAuth standard is not used by the great majority of APIs.
Pulling data from a device becomes considerably more challenging in the absence of a
common OAuth implementation. When you attempt to connect to such APIs, the
connection can quickly break, especially if there are changes, such as when a user
changes his or her password. The interruption of service reduces the simplicity of use for
the person attempting to turn it on.
• Obtaining reporting APIs as opposed to basic data APIs. Base data APIs enable you to
retrieve data, but if you want metrics or measurements, you must replicate the
algorithms on your end to acquire the statistics you want. With reporting APIs, which are
required for most use cases, you may ask queries and get the answer immediately away.
For example, if I wanted to retrieve all my sales from the previous year using a base data
API, I would have to acquire all of the data from that year and then add the figures to get
what I wanted. With a reporting API, I could request the year's sales and it would
automatically provide the total for the year.
HomeKit is Apple's smart home platform that allows you to operate different internet-connected
home gadgets, including as thermostats and plugs, as well as window blinds, light bulbs, and other
devices, using Apple devices.
Page 37
Figure 16
Nowadays, more and more goods are internet-connected, which is why the term "Internet of
Things" has become popular. The Internet of Things is a perplexing collection of "smart" devices
that link to the internet and may be managed by a variety of platforms, ranging from Amazon's
Alexa to Google Home to Samsung SmartThings.
HomeKit is Apple's "Internet of Things" solution, which connects HomeKit-enabled smart gadgets
in a way that allows you to control them with your Apple devices.
Google Cloud APIs provide programmatic access to Google Cloud Platform services. They are an
important component of Google Cloud Platform, letting you to quickly add the power of computing,
networking, storage, and machine-learning-based data analysis to your apps.
Customers can access cloud APIs using network API services such as the Cloud Pub/Sub API.
Each Cloud API generally operates on one or more subdomains of googleapis.com, such as
pubsub.googleapis.com, and offers clients with JSON HTTP and gRPC interfaces through public
internet and Virtual Private Cloud (VPC) networks. Clients can use client libraries or submit HTTP
and gRPC queries directly to Cloud API endpoints.
Page 38
Figure 17
Millions of developers and consumers rely on cloud APIs. To guarantee fair usage and reduce
the danger of abuse, all Cloud APIs enforce rate limitations and resource caps on consumption,
often known as quotas. You may also utilize these quotas to reduce your Google Cloud spending by
lowering your own quota limitations. Quota increase requests must be sent if you want additional
quotas than the default limitations.
Most Cloud APIs include precise statistics on your project's use of that API, such as traffic
volumes, error rates, and latencies. It enables you to swiftly triage problems with Cloud API-enabled
apps. This information is available in the Google Cloud API Dashboard in the Google Cloud Console.
Page 39
help.
First of all, the micro dust in our environment is now more and more serious. As we can see, the
consequence of micro dust is health issue. The birth of air purifier is the solution for this problem. But
the maintenance cost of air purifier is not easily to adapt. Because of this reason I decided to develop a
system which can record the concentration of dust in air and alert for the purifier to work. This will
bring efficiency according to the save of energy that air purifier does not have to work all along even
the air is clean. In addition, air micro dust measurer will work with a sensor to record dust
concentration. It also comprises a system to evaluate the safety level by popping color led and send the
advice to user for deciding to operate the air purifier.
On the other edge, the system also provides an ability to reduce environment heat. Nowadays
global warming has become an aching problem. The most optimal solution for this is an air conditioner.
The sensor in the system will evaluate the level of heat to decide misting the air. When highly efficient
cooling machine have gotten over in wasting energy and producing contaminant, misting the air by
water will become the most efficient solution. The combination of heat sensor and watering system will
bring human an opportunity to reduce the use of electricity but remain the productivity of cooling.
In conclusion, this system will provide a healthier environment via the combination of air micro dust
controller and atmosphere heat propitiate. In the wish of better life quality, I will develop a full system
of environment health impact resistance system. Nevertheless, this system will provide more
technology in the future.
2. Gantt chart
Page 40
Figure 18
Page 41
and the present level of software development. Then, we go into the specifics of building software for
IoT systems and systems of systems, with an overview of the existing approaches and tools for
designing, developing, and testing such systems.
The entire lifetime of software systems has become far more complicated than in the past.
They entail hybrid development teams, complicated code, and continuous data collecting.
IoT technologies are extremely valuable to software development firms. Professionals that
can stay up with the latest IT technology developments will be extremely successful in their jobs.
Mastering IoT software development necessitates the acquisition of a variety of abilities, including
AI and machine learning.
IoT platforms support a wide range of devices, plug-and-play sensors, and external
applications. These platforms provide the essential components for developing and managing an
IoT solution. IoT solutions and software development are influencing each other, and this trend is
expected to continue as low-code or no-code platforms become more business-friendly. The
Internet of Things (IoT) has brought about a slew of unexpected yet fantastic developments in our
daily lives. The Internet of Things has resulted in a significant shift in the way people connect.
Technological improvements have occurred in both hardware and software. Quality software
applications are critical to the success of many firms.
Page 42
Figure 19
It is obvious that IoT devices need extensive expertise of coding, editing, and data
management. Web developers will now need to broaden their knowledge, which implies that IoT
entry-level development employment will need to be matched with rising web technologies.
• Predictive assistance
Page 43
At a time when user experience is critical for any organization, IoT enables the creation of
intelligent and dynamic user interfaces.
• Security
IoT platform technology in software products assist in meeting a variety of security criteria.
Improving Security Features. There is a rising public concern about digital security. User identity,
authentication, and access management mechanisms will be required for contemporary IoT
resources.
• Architecture of software
IoT is being used by businesses to create innovative and engaging software systems. The degree
of complexity of IoT devices has doubled - it has progressed to the end of the UI web design, data
management, task sharing, project management, and other features. Complexity may occasionally
have an impact on development cycles.
• Testing
Automated testing is critical in quality assurance, and IoT is assisting in the development of
these testing automation solutions.
• Load distribution
It is feasible to create software systems that can manage massive loads with the help of IoT
technologies.
Page 44
to thermostats to video game consoles, may interface with the internet or other devices in some way.
IoT security refers to the approaches, strategies, and technologies used to keep these devices from
being hacked. Ironically, the connection inherent in IoT devices renders them increasingly vulnerable to
hackers.
The Internet of Things umbrella does not just encompass internet-connected gadgets. Bluetooth-
enabled appliances are also considered IoT devices and, as such, require IoT security. Such oversights
have led to the current increase in IoT-related data leaks.
The following are a few of the IoT security issues that continue to jeopardize the financial security
of both individuals and enterprises:
While this is not generally a problem, dependence on technology can exacerbate the impact of a
successful data breach. What's more, these businesses are now dependent on a piece of technology
that is intrinsically more vulnerable: IoT devices. Furthermore, many healthcare and automobile firms
were unwilling to commit the money and resources necessary to safeguard these devices.
Not all IoT devices have the processing power to run complex firewalls or antivirus software. Some
gadgets can hardly connect to other devices. Bluetooth-enabled IoT devices, for example, have recently
been subjected to a surge of data breaches. Once again, the automobile industry has been one of the
hardest hit markets.
Page 45
Page 46
advanced reasoning, and machine learning to such a sector. Watson now contains a suite of
business-ready tools, apps, and solutions designed to lower the costs and barriers to AI
adoption while optimizing results and responsible AI use.
• Watson's security
The platform has been certified in accordance with the ISO 27001 standard [34]. To
establish a trustworthy connection to the authentic platform service, IoT information is
encrypted using the HTTPS communication protocol for both browser-based GUI and REST
APIs with a certificate certified by DigiCert. Furthermore, access to the web-based GUI is
verified by a one-of-a-kind IBM identification code. To provide a high degree of security, device
and application credentials are protected by an authentication token that is salted and hashed.
By default, each device is linked to the platform using TLS v.1.2 security, which ensures that
devices may only connect via a secure, encrypted channel. To prevent devices from
impersonating other devices, once authenticated, devices are only permitted to publish and
subscribe to a limited topic space, and the authentication credentials supplied by the client
determine which device the subject space is scoped by the platform service.
M3 Discuss and give out the reason for your IoT platform
chosen.
1. Arduino
1.1. Discussion
Arduino is a free and open-source electronics platform with simple hardware and software.
Arduino boards can read inputs such as a light on a sensor, a finger on a button, or a Twitter tweet
and convert them into outputs such as operating a motor, turning on an LED, or posting anything
online. You may direct your board by delivering a series of instructions to the board's
microcontroller. You utilize the Arduino programming language (based on Wiring) and the Arduino
Software (IDE) (based on Processing) to do this.
Over the years, Arduino has served as the brain of hundreds of projects, ranging from simple
household products to complicated scientific equipment. A global community of makers - students,
amateurs, artists, programmers, and professionals - has collected around this open-source
Page 47
platform, and their contributions have built up to an astounding quantity of accessible information
that may be of tremendous benefit to both novices and specialists.
Arduino was created at the Ivrea Interaction Design Institute as a simple tool for rapid
prototyping intended for students with no prior experience with electronics or programming. As
the Arduino board gained popularity, it began to evolve to meet new demands and problems,
transitioning from basic 8-bit boards to solutions for IoT applications, wearables, 3D printing, and
embedded settings.
Arduino has been utilized in millions of different projects and applications because to its
easy and accessible user experience. The Arduino software is simple enough for novices to use
while yet being versatile enough for expert users. It is compatible with Mac, Windows, and Linux. It
is used by teachers and students to create low-cost scientific equipment, to demonstrate chemistry
and physics principles, and to get started with programming and robotics. Designers and architects
use it to create interactive prototypes, while musicians and artists use it to create installations and
experiment with new musical instruments. Arduino is a valuable tool for learning new things.
For physical computing, there are several additional microcontrollers and microcontroller
platforms available. Similar capability is provided by Parallax Basic Stamp, Net media’s BX-24,
Phidgets, MIT's Handyboard, and many more programs. All these tools take the tangled nuances of
microcontroller programming and package them in a user-friendly format. Although alternative
systems simplify working with microcontrollers, Arduino has several advantages for instructors,
students, and curious amateurs:
• Inexpensive
• Cross-platform
Page 48
Handle power drop When an Arduino gadget is Raspberry Pi takes the same
turned on, it begins running attention as a computer. You
code. As a result, if the power is must correctly shut down the
abruptly switched off, you will operating system.
not have a corrupt operating
system or faults. When the
code is plugged in, it just
restarts.
Table 1
Page 49
1.2. Budget
Tools Image price
Page 50
Arduino 200$
Page 51
Led 15$
Wire 20$
Breadboard 28$
Page 52
1.1. Design
Testing and certification are critical components of the design process for every IoT
device. Any board with a wireless component—or any radiating component—must go
through stringent certification processes before it can be sold in different regions of the
world. These certification requirements may differ from continent to continent or even from
country to country. Aside from being a time-consuming operation, this comes at a high
cost—costs that the system designer should factor into their budgets for circuit designs.
Several certifications are necessary for each Bluetooth module or chip present onboard,
including those from the FCC (for the United States), CE (for European nations), IC (for
Canada), and so on.
Cost and time to market increases the demand arises from the need to drive
improved techniques when creating IoT devices to manage cost modelling or cost optimally
with digital electronic components. Designers must also tackle the design time issue and
deliver the embedded device to market on time.
Packaging and integration issues with small-sized chips with minimal weight and
power consumption. If you've been following the mobile arena, you've probably seen how
there appears to be no restriction in terms of display screen size every year. Consider the
rise of 'phablets,' which can be phones that are nearly as large as tablets. Although useful,
larger displays aren't necessarily for convenience; rather, display screen sizes are increasing
to accommodate larger batteries. Computers are becoming smaller, but battery energy
remains constant.
1.2. Implementation
1.2.1. CYBERSECURITY DIFFICULTIES - BALANCE CYBER RISKS AND FEARS WITH IOT BENEFITS
Page 54
Possible solution:
The first step is to recognize that even if a corporation currently has sophisticated
cybersecurity measures in place, they often only protect the IT world. There are new
difficulties in the IoT / OT world, thus businesses must modify their strategy. One typical
mistake is to endanger the IT landscape by ignoring the operational technology (OT)
network. This introduces new dangers that businesses must address.
While projects are still being created, companies should use the planning phase to
incorporate security into their IoT project and define threat risks with a thorough IoT risk
assessment. As a result, a risk-based approach that prioritizes vulnerabilities and threats
could be the solution: It is critical to begin with prevention to make it as difficult as possible
for an adversary to break into the systems. If a cybercriminal gains access, businesses must
discover the threat actor as soon as feasible.
The failure rate for IoT initiatives remains high – between 60% and 85% – owing to
the numerous IoT obstacles. Many of them are about people, such as the need of including
all employees in digital transformation activities.
Page 55
company, and success is dependent on bringing employees along for the ride from the
outset. Executives, on the other hand, frequently do not know how to prepare their people
for what is to come.
Possible solution:
Some of the most difficult parts of IoT for workers and leaders alike are defined by
the need for a cultural transition rather than a technological one - this necessitates a
systematic change management strategy from the start. First and foremost, an integrated
approach to the transformation's tangible and non-physical parts is required. This entails
combining technology and procedural features with social ones like company and team
culture. Both factors are equally crucial in achieving employee buy-in.
90% of CEOs are unable to effectively calculate the return on investment (ROI) of
their IoT activities. This is one of many typical IoT difficulties and issues in large and complex
enterprises, raising executives' concerns about the effect and value of IoT for their company.
The return on investment is "simply" defined as the ratio of profit to investment cost
based on discounted cash-flow estimates. However, leaders have significant challenges in
effectively measuring and calculating it.
Possible solution:
The first point to remember is that CEOs should only contemplate embarking on their
digitization and IoT journey after establishing a clear business purpose. Companies tend to "fall
in love" with a new technology while overlooking the actual economic value it should deliver
to them. The true worth of digital projects may be recognized and assessed more clearly if
executives reverse the ROI question: instead of searching for the ROI of a specific IoT solution,
they can ask how to compute the ROI when utilizing IoT to address a business problem and
have a long-term effect.
Page 56
Vulnerabilities Vulnerabilities are a major Vulnerable standard Check for fixes and
issue that users and components harm updates on a regular
businesses face daily. One millions of devices, as basis. Vulnerabilities
of the primary reasons IoT illustrated by Ripple20 are a serious and
devices are insecure is a and URGENT/11. Aside ongoing concern in
lack of computing capability from the devices the realm of IoT. This
for built-in security. themselves, is due to the fact that
Another factor for the vulnerabilities in web vulnerabilities might
pervasiveness of apps and related software arise from any layer of
vulnerabilities is the limited for IoT devices can lead to IoT devices.
budget for designing and compromised systems. Cybercriminals are
testing safe firmware, still using earlier flaws
which is driven by the price to infect devices,
point of devices and their revealing how long
relatively short unpatched devices
development cycle. may remain online.
Malware This is a tactic that hackers The most prominent Keep an eye on the
have utilized to great effect assault occurred in 2016, baseline network and
in recent years. IoT botnet when Mirai used an army device activity.
malware is one of the most of ordinary IoT devices to Cyberattacks are
common kinds since it is take down key websites notoriously difficult to
both adaptable and and services. detect. Knowing the
profitable for hackers. Cryptocurrency mining baseline behaviour of
malware and ransomware devices and networks
are examples of other (speed, normal
Page 57
Mismanagement Users may just lack the Security flaws, poor Decide on who will
and knowledge and password hygiene, and oversee things.
misconfiguration competence to apply general device Having someone
of devices suitable security measures, mismanagement can all function as an
in which case service contribute to the success administrator for IoT
providers and of these threats. devices and the
manufacturers may need to network can assist to
assist their clients in reduce security
improving their security. oversights and
vulnerabilities. They
will be in responsible
of safeguarding the
security of IoT
devices, including at
home. The position is
crucial, especially in
this era of WFH
settings, when IT
professionals have
little control over
safeguarding home
networks, which now
have a bigger effect
on work networks.
Assets left behind If a program was not It's dangerous to make Encrypting data
initially intended for cloud obsolete apps Internet- transfers inside the
Page 58
Security principles When it comes to security The absence of standards Small M2M devices
that are standards, IoT is a bit of a makes it more difficult to often have minimal
inconsistent free-for-all. Because there protect IoT devices and to computing power.
is no industry-wide enable machine-to- This prohibits them
standard, firms and niches machine (M2M) from putting up
must build their own communication without firewalls. A network-
standards and norms. raising risk. based firewall, on the
other hand,
safeguards your data
from the minute it
enters the network.
This removes the
device from the
Page 59
labour-intensive
process of packet
filtering, guaranteeing
that malicious data is
never delivered to the
device or even
allowed to access the
network in the first
place.
Table 5
Reference
1. softwaretestinghelp.com (2021). 10 Best IoT Platforms To Watch Out In 2022.Available at:
https://www.softwaretestinghelp.com/best-iot-platforms/ [April 7,2022].
2. Hindawi.com (2021). Internet of Things: Architectures, Protocols, and Applications. Available at:
https://www.hindawi.com/journals/jece/2017/9324035/#introduction/ [April 7,2022].
3. pareteum.com (2021). Internet of Things: The Five Types of IoT. Available at:
https://www.pareteum.com/internet-of-things-the-five-types-of-iot/type [April 7,2022].
4. educba.com (2021). IoT Hardware Available at: https://www.educba.com/iot-hardware/[April
7,2022].
5. how2shout.com (2021). 9 Best & Top Open source IoT Platforms To Develop the IOT Projects.
Available at: https://www.how2shout.com/tools/best-opensource-iot-platformsdevelop-iot-
projects.html [April 7,2022].
6. programmableweb.com (2018). 10 Top APIs for the Internet of Things. Available at:
https://www.programmableweb.com/news/10-top-apis-internet-things/brief/2020/03/29[April
7,2022].
7. vnecotec.com (2021). IoT Frameworks. Available at: https://www.vnecotec.com/iotframework/
[April 7,2022].
8. circuitdigest.com (2021). Top Hardware Platforms for Internet of Things (IoT). Available at:
https://circuitdigest.com/article/top-hardware-platforms-for-internet-of-things-iot [April
7,2022].
Page 60
Page 61