You are on page 1of 63

lOMoARcPSD|16042441

1690 GCS2005 16 Thai Hy Chan Assignment 1

Computer (FPT University)

StuDocu is not sponsored or endorsed by any college or university


Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)
lOMoARcPSD|16042441

Higher Nationals in Computing

Unit 43: Internet Of Things


ASSIGNMENT 1

Learner’s name: Thai Hy Chan


ID: GCS200516
Class:0902
Subject code: 1690

Assessor name: PHAN MINH TAM

Assignment due: Assignment submitted:

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

ASSIGNMENT 1 FRONT SHEET

Qualification BTEC Level 5 HND Diploma in Computing

Unit number and title Unit 43: Internet of Things

Submission date Date Received 1st submission

Re-submission Date Date Received 2nd submission

Student Name Thái Hy Chấn Student ID GCS200516

Class 0902 Assessor name Phan Minh Tam

Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that
making a false declaration is a form of malpractice.

Student’s signature

Grading grid

P1 P2 P3 P4 M1 M2 M3 M4 D1 D2

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

 Summative Feedback:  Resubmission Feedback:

Grade: Assessor Signature: Date:

Signature & Date:

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

ASSIGNMENT 1 BRIEF

Qualification BTEC Level 5 HND Diploma in Computing

Unit number Unit 43: Internet of Things

Assignment title

Academic Year 2021

Unit Tutor Phan Minh Tam

Issue date Submission date

IV name and date

Submission Format:

Format: This assignment is an Individual assignment and specifically including 1 document:


You must use font Calibri size 12, set number of the pages and use multiple line spacing at
1.3. Margins must be: left: 1.25 cm; right: 1 cm; top: 1 cm and bottom: 1 cm. The reference
follows Harvard referencing system. The recommended word limit is 2.000-2.500 words.
You will not be penalized for exceeding the total word limit. The cover page of the report
has to be the Assignment front sheet 1.
Submission Students are compulsory to submit the assignment in due date and in a way requested by
the Tutors. The form of submission will be a soft copy posted on
http://cms.greenwich.edu.vn/
Note: The Assignment must be your own work, and not copied by or from another student or from
books etc. If you use ideas, quotes or data (such as diagrams) from books, journals or other sources, you
must reference your sources, using the Harvard style. Make sure that you know how to reference
properly, and that understand the guidelines on plagiarism. If you do not, you definitely get fail

Unit Learning Outcomes:

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

LO1 Analyse what aspects of IoT are necessary and appropriate when designing software applications
LO2 Outline a plan for an appropriate IoT application using common architecture, frameworks, tools, hardware
and APIs
LO3 Develop an IoT application using any combination of hardware, software, data, platforms and services.
LO4 Evaluate your IoT application and detail the problem your IoT application solves, the potential impact on
people, business, society and the end user and the problems it might encounter when integrating into the wider
IoT ecosystem

Assignment Brief and Guidance:

You currently work as a product developer for a new startup where you design IoT products for the
consumer, corporate, government and defence clients. As part of your role your manager has tasked you
to plan and develop a new IoT product, service or application for a potential client. You are required to
identify a target user and conduct tests with this user and include this feedback into multiple iterative
versions of your product.
Part 1 (Assignment 1):: For the first part, you must:

• Plan an IoT application for a specific target end user and the tests you intend to conduct with this
user. This plan will be in the form of a document and will include supporting evidence and
material, such as user personas and customer journey maps.
• Create multiple iterations of your application and modify each iteration with enhancements
gathered from user feedback and experimentation. This will follow the pathway outlined in your
plan.(log book,)

Part 2 (Assignment 2): For the first part, you must:

• Show evidence about Developed IoT application using any combination of hardware, software,
data, platforms and services (video or images of your IoT system with code snippet)
• Evaluate your IoT application and detail the problem your IoT application solves, the potential
impact on people, business, society and the end user and the problems it might encounter when
integrating into the wider IoT ecosystem

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

Learning Outcomes and Assessment Criteria

Pass Merit Distinction

LO1 Analyse what aspects of IoT are necessary and appropriate when designing software
applications

P1 Explore various forms of M1 Evaluate the impact of D1 Evaluate specific forms of


IoT functionality. common IoT architecture, IoT architecture and justify their
frameworks, tools, hardware and use when designing software
APIs in the software development applications.
P2 Review standard
lifecycle.
architecture, frameworks,
tools, hardware and APIs
available for use in IoT M2 Review specific forms of IoT
development. architecture, frameworks, tools,
hardware and APIs for different
problem-solving requirements.

LO2 Outline a plan for an appropriate IoT application using common architecture, frameworks,
tools, hardware and APIs

P3 Investigate architecture, M3 Select the most appropriate D2 Make multiple iterations plan
frameworks, tools, hardware IoT architecture, frameworks, of your IoT application and
and API techniques available tools, hardware and API modify each iteration to improve
to develop IoT applications. techniques to include in an your IoT application security.
application to solve this problem.
P4 Determine a specific
problem to solve using IoT. M4 Apply your selected
techniques to create an IoT
application development plan.

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

Contents
Assignment Brief 1 (RQF) ............................................................................................Error! Bookmark not defined.
P1 Explore various forms of IoT functionality. ........................................................................................................9
1. IoT overview ..............................................................................................................................................9
1.1. IoT definition......................................................................................................................................9
1.2. IoT feature .........................................................................................................................................9
2. IoT history ............................................................................................................................................... 10
3. IoT in software development ................................................................................................................... 14
4. The various form of IoT ............................................................................................................................ 14
4.1. Internet of underwater things........................................................................................................... 15
4.2. Internet of underground things ......................................................................................................... 16
4.3. Internet of battlefield things ............................................................................................................. 16
4.4. Internet of space things .................................................................................................................... 17
4.5. Internet of Nano things .................................................................................................................... 18
5. IOT pros and cons .................................................................................................................................... 19
5.1. Advantage........................................................................................................................................ 19
5.2. Disadvantage ................................................................................................................................... 20
P2 Review standard architecture, frameworks, tools, hardware, and APIs available for use in IoT development.... 21
1. IoT standard architecture ......................................................................................................................... 21
1.1. IoT architecture ................................................................................................................................ 21
1.2. Advantage and disadvantage of IoT architecture ............................................................................... 22
2. IoT frameworks ....................................................................................................................................... 23
2.1. Definition ......................................................................................................................................... 23
2.2. Common IoT frameworks ................................................................................................................. 23
3. IoT tools .................................................................................................................................................. 25
3.1. Definition ......................................................................................................................................... 25
3.2. Pros and cons of several IoT tools ..................................................................................................... 26
4. IoT hardware ........................................................................................................................................... 27
4.1. Definition ......................................................................................................................................... 27
4.2. Several components of IoT hardware ................................................................................................ 27
5. IoT APIs ................................................................................................................................................... 28
5.1. Definition ......................................................................................................................................... 28
5.2. Challenges and opportunities of IoT APIs .......................................................................................... 28
P3 Investigate a specific IoT platform (including architecture, frameworks, tools, hardware, and APIs) has been
chosen to develop an IoT system. ........................................................................................................................ 29

Page 6

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

1. IoT architecture development .................................................................................................................. 29


1.1. IoT Architecture with Three Layers (Tiers) ......................................................................................... 29
2. Framework .............................................................................................................................................. 31
2.1. Google Cloud Platform – Internet of Things framework ..................................................................... 31
3. Tools ....................................................................................................................................................... 32
3.1. Arduino ............................................................................................................................................ 32
4. Hardware ................................................................................................................................................ 34
4.1. Temperature sensor ............................................................................................................................. 34
4.2. Gas sensor ........................................................................................................................................... 34
4.3. Water pump ........................................................................................................................................ 35
4.4. Arduino Uno R3 ................................................................................................................................... 36
5. APIs ......................................................................................................................................................... 36
5.1. Advantage........................................................................................................................................ 36
5.2. Disadvantage ................................................................................................................................... 37
5.3. Several API providers........................................................................................................................ 37
P4 Explain about your IoT demo system, including architecture and how it works ................................................ 39
1. Scenario .................................................................................................................................................. 39
2. Gantt chart .............................................................................................................................................. 40
M1 Evaluate the impact of common IoT architecture, frameworks, tools, hardware, and APIs in the software
development lifecycle. ........................................................................................................................................ 41
1. The impact of common IoT platform in software development ................................................................. 41
1.1. Impact and effectiveness in SDLC ...................................................................................................... 42
M2 Evaluate the impact of common IoT architecture, frameworks, tools, hardware, and APIs in IoT security. ....... 44
1. The impact of common IoT platform in IoT security .................................................................................. 44
1.1. IoT security issue and challenge ........................................................................................................ 44
1.2. Several example ............................................................................................................................... 46
M3 Discuss and give out the reason for your IoT platform chosen. ....................................................................... 47
1. Arduino ................................................................................................................................................... 47
1.1. Discussion ........................................................................................................................................ 47
1.2. The reason that Arduino is suitable ................................................................................................... 48
M4 Apply your selected techniques to create an IoT application development plan. ............................................. 49
1. IoT application n development plan ......................................................................................................... 49
1.1. Human resources ............................................................................................................................. 49
1.2. Budget ............................................................................................................................................. 50
1.3. Project timeline ................................................................................................................................ 53

Page 7

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

D1 Evaluate challenges when designing and implementing for the IoT system. ..................................................... 53
1. Challenge ................................................................................................................................................ 53
1.1. Design .............................................................................................................................................. 54
1.2. Implementation ............................................................................................................................... 54
D2 Make multiple iterations plan of your IoT application and modify each iteration to improve your IoT application
security. ............................................................................................................................................................. 57
1. Table of risk and solution for security purpose.......................................................................................... 57
Reference ........................................................................................................................................................... 60

Figure 1 .............................................................................................................................................................. 10
Figure 2 .............................................................................................................................................................. 11
Figure 3 .............................................................................................................................................................. 15
Figure 4 .............................................................................................................................................................. 16
Figure 5 .............................................................................................................................................................. 17
Figure 6 .............................................................................................................................................................. 18
Figure 7 .............................................................................................................................................................. 19
Figure 8 .............................................................................................................................................................. 22
Figure 9 .............................................................................................................................................................. 24
Figure 10 ............................................................................................................................................................ 30
Figure 11 ............................................................................................................................................................ 31
Figure 12 ............................................................................................................................................................ 33
Figure 13 ............................................................................................................................................................ 34
Figure 14 ............................................................................................................................................................ 35
Figure 15 ............................................................................................................................................................ 36
Figure 16 ............................................................................................................................................................ 38
Figure 17 ............................................................................................................................................................ 39
Figure 18 ............................................................................................................................................................ 41
Figure 19 ............................................................................................................................................................ 43

Table 1 ............................................................................................................................................................... 49
Table 2 ............................................................................................................................................................... 50
Table 3 ............................................................................................................................................................... 53
Table 4 ............................................................................................................................................................... 53
Table 5 ............................................................................................................................................................... 60

Page 8

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

P1 Explore various forms of IoT functionality.


1. IoT overview
1.1. IoT definition

The internet of things, or IoT, is a network of interconnected computing devices, mechanical


and digital machinery, items, animals, or people that have unique identities (UIDs) and the capacity
to send data over a network without the need for human-to-human or human-to-computer
contact.

A thing in the internet of things can be a person implanted with a heart monitor, a farm
animal implanted with a biochip transponder, a car with built-in sensors to alert the driver when
tire pressure is low, or any other natural or man-made object that can be assigned an Internet
Protocol (IP) address and can transfer data over a network.

Organizations in a range of sectors are increasingly utilizing IoT to run more effectively,
better understand consumers to provide better customer service, improve decision-making, and
raise the value of the business.

1.2. IoT feature

An IoT ecosystem is made up of web-enabled smart devices that employ embedded systems
including processors, sensors, and communication hardware to gather, send, and act on data from
their surroundings. IoT devices exchange sensor data by connecting to an IoT gateway or other
edge device, where data is either transferred to the cloud for analysis or examined locally. These
gadgets occasionally connect with other related devices and act on the information they receive
from one another.

The gadgets conduct most of the work without human interaction, while individuals may
engage with them to set them up, give them instructions, or view the data.

The connection, networking, and communication protocols utilized with these web-enabled
devices are heavily influenced by the IoT applications that are implemented.

IoT may also leverage artificial intelligence (AI) and machine learning to make data collection
easier and more dynamic.

Page 9

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

Figure 1

2. IoT history

Page 10

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

Figure 2

Page 11

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

1969:

ARPANET, the precursor to the modern Internet, is developed and put into service by DARPA, the U.S Defense
Advanced Research Projects agency. This is foundational to the “Internet” part of the Internet of Things.

• 1980s:

ARPANET is opened to the public by commercial providers, making it possible for people to connect things if they
want to.

• 1982:

Programmers at Carnegie Mellon University connect a Coca-Cola vending machine to the Internet, allowing them
to check if the machine has cold sodas before going to purchase one. This is often cited as one of the first IoT
devices.

• 1990:

John Romney, in response to a challenge, connected a toaster to the Internet and was able to successfully turn it
on and off, bringing us even closer to what we think of as modern IoT devices.

• 1993:

Engineers at the University of Cambridge, upholding the now well-established tradition of combining the Internet
with appliances and food, develops a system that takes pictures of a coffee machine three times a minute, allowing
its status to be remotely monitored by workers. World’s first webcam!

• 1995:

The first version of the long-running GPS satellite program run by the U.S. government is finally completed, a big
step towards proving one of the most vital components for many IoT devices: location.

• 1998:

IPv6 becomes a draft standard, enabling more devices to connect to the internet than previously allowed by
IPv4. While 32-bit IPv4 only provides enough unique identifiers for around 4.3 billion devices, 128-bit IPv6 has
enough unique identifiers for up to 2^128, or 340 undecillions. (That’s 340 with 36 zeroes!)

• 1999:

This is a big year for IoT, since it’s when the phrase was probably first used. Kevin Ashton, the head of MIT’s
Auto-ID labs, included it in a presentation to Proctor & Gamble executives as a way to illustrate the potential of RFID
tracking technology.

Page 12

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

• 2000:

LG announces what has become one of the quintessential IoT devices: the Internet refrigerator. It was an
interesting idea, complete with screens and trackers to help you keep track of what you had in your fridge, but its
$20,000+ USD price tag didn’t earn it a lot of love from consumers.

• 2004:

The phrase “Internet of Things” starts popping up in book titles and makes scattered media appearances.

• 2007:

The first iPhone appears on the scene, offering a whole new way for the general public to interact with the world
and Internet-connected devices.

• 2008:

The first international IoT conference is held in Zurich, Switzerland. The year is fitting, since it’s also the first year
that the number of Internet-connected devices grew to surpass the number of humans on earth.

• 2009:

Google starts self-driving car tests, and St. Jude Medical Center releases Internet-connected pacemakers. St.
Jude’s device will go on to make yet more history by being the first IoT medical device to suffer a major security
breach in 2016 (without casualties, fortunately). Also, Bitcoin starts operation, a precursor to blockchain
technologies that are likely to be a big part of IoT.

• 2010:

The Chinese government names IoT as a key technology and announces that it is part of their long-term
development plan. In the same year Nest releases a smart thermostat that learns your habits and adjusts your
home’s temperature automatically, putting the “smart home” concept in the spotlight.

• 2011:

Market research firm Gartner adds IoT to their “hype cycle,” which is a graph used to measure the popularity of a
technology versus its actual usefulness over time. As of 2018, IoT was just coming off of the peak of inflated
expectations and may be headed for a reality check in the trough of disillusionment before ultimately hitting the
plateau of productivity.

Page 13

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

• 2013:

Google Glass is released – a revolutionary step in IoT and wearable technology but possibly ahead of its time. It
flops hard.

• 2014:

Amazon releases the Echo, paving the way for a rush into the smart home hub market. In other news, an
Industrial IoT standards consortium form demonstrates the potential for IoT to change the way any number of
manufacturing and supply chain processes work.

• 2016:

General Motors, Lyft, Tesla, and Uber are all testing self-driving cars. Unfortunately, the first massive IoT
malware attack is also confirmed, with the Mirai botnet assaulting IoT devices with manufacturer-default logins,
taking them over, and using them to DDoS popular websites.

• 2017-2019:

IoT development gets cheaper, easier, and more broadly accepted, leading to small waves of innovation all over
the industry. Self-driving cars continue to improve, blockchains and AI begin to be integrated into IoT platforms, and
increased smartphone/broadband penetration continues to make IoT an attractive proposition for the future.

3. IoT in software development


Most IoT devices' real components include tags, sensors, embedded processors, and actuators
embedded in things. While some IoT items are "vertical specific," others may be used in a variety of
applications. Some, such as tags or iBeacons, will be "deploy and forget." Others will continually
provide data that the owner monitors and controls via a web interface, or that is offered by firms that
provide IoT-as-a-service to clients, such as Thing speak. Commoditisation and interoperability are the
key driving forces behind IoT, and hence influencing its future, and are dependent on:

• The creation of embedded devices (low-power, reduced cost computers, most frequently based
on the ARM architecture). Protocols for improved communication (GSM, Wi-Fi, Bluetooth
variants and more specialized Zigbee, 6LowPAN, Sigfox and so on.)

• Protocols for improved communication (GSM, Wi-Fi, Bluetooth variants and more specialized
Zigbee, 6LowPAN, Sigfox and so on.)

• Influential corporations such as Amazon, Google, Apple, IBM, and Microsoft are also driving IoT.

4. The various form of IoT


Page 14

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

4.1. Internet of underwater things

The Internet of Underwater Things (IoUT) is characterized as a global network of smart,


linked underwater devices that allows for the monitoring of huge unknown aquatic regions. The
goal of this article is to examine how to use the IoUT to learn from, exploit, and protect natural
undersea resources.

Following the successful implementation of IoT, the Internet of Underwater Things (IoUT)
was originally explored in 2012. The application of IoT to our water bodies is known as IoUT. The
Internet of Underwater Things (IoUT) is a network of interconnected smart things that exist
underwater. This technology's goal is to digitally link all the world's water bodies, including oceans,
lakes, streams, and rivers.

Figure 3

In recent years, several smart underwater items have been developed, including
autonomous underwater vehicles (AUV), remotely operated underwater vehicles (ROV),
autonomous surface vehicles, and others. Underwater wireless sensor networks have been
deployed because of these developments and have proven to be a largely effective network system.
Underwater sensors are the main components of this network architecture; the sensors utilized are
nodes with acoustic modems. These sensors are linked to smart devices underwater by nodes and

Page 15

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

transmit data like as water quality, temperature, and pressure via acoustic modems. While this is an
intriguing promise, it cannot yet be fully utilized due to the obstacles that IoUT faces.

4.2. Internet of underground things

Figure 4

The ever-increasing demand for natural resources necessitates the development of


revolutionary technologies to increase subsurface exploration and agricultural production. Natural
resources such as earth minerals, fossil fuels, metal ores, groundwater, and food are found in the
subsurface environment and agricultural fields. to keep track of and improve

The Internet of Underground Things (IoUGT) is an enabling technology that can offer smart
oil and gas fields, smart agriculture fields, and smart seismic quality control in the production of all
these resources. However, owing to the harsh subterranean propagation environment, which
necessitates low power and tiny size underground sensors, long-range communication
technologies, efficient networking solutions, and precise localization algorithms, IoUGT
implementation is a difficult undertaking.

4.3. Internet of battlefield things

Military strategists envisage a future battlefield defined by the internet of things, in which
smart gadgets, unmanned aircraft, and soldier-worn sensors generate an unceasing flow of

Page 16

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

actionable data. The Internet of Military Things (IoMT) is a subset of the Internet of Things that is
used for military operations and warfare. It is a complex network of linked elements, or "things,"
inside the military domain that constantly communicate with one another to coordinate, learn, and
interact with the physical environment to achieve a wide range of functions in a more efficient and
informed manner. The idea behind IoMT is that future military confrontations will be controlled by
machine intelligence and cyber warfare, and that they would most likely take place in urban areas.

Figure 5

The IoMT is conceptually meant to alleviate much of the physical and mental stress that war
fighters face during conflict by directly building a micro ecosystem of smart technology capable of
distilling sensory data and autonomously regulating various activities. Several names are
established throughout time to define the use of IoT technology for reconnaissance, environmental
monitoring, unmanned warfare, and other military reasons. The names Military Internet of Things
(MIoT), Internet of Battle Things, and recently Internet of Battlefield Things are used (IoBT).

4.4. Internet of space things

The Internet of Things is an important component of next generation 5G wireless


technologies for terrestrial deployments. However, there are several use cases that necessitate a

Page 17

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

more global, scalable, flexible, and robust solution, such as remote monitoring, Internet delivery to
underserved or disturbed regions, or intelligent global transport management. The Internet of
Space Things, a pervasive cyber-physical system for achieving genuine global connection, is
introduced in this article. This article analyses the state-of-the-art in satellite-based data networks
and provides a unique network architecture in which Software-defined Networking and Network
Function Virtualization play major enabling roles. Furthermore, the key issues in network design,
routing, and resource allocation are discussed.

Figure 6

As a result, the Internet of Space Things is the ultimate cyber-physical system, with far
greater application and service domains than the ordinary Internet of Things.

4.5. Internet of Nano things

The Internet of Nano Things is a rapidly growing technology that has the possibility of
alleviating many of the world's most serious problems. It functions similarly to how we link devices
in the Internet of Things, but the main distinction is that it can connect nano components, which
the Internet of Things cannot. As a result, it ushers in a cutting-edge revolution in electromagnetic
communication domains among nanoscale devices.

Page 18

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

The Internet of nano things (IoNT) provides a platform for connecting diverse nanodevices
over high-speed networks. Nanodevices may be implemented with other modern technologies
such as cloud computing, big data, and machine learning using this technology.

The Internet of Nano Things may be used to create a Body Sensor Network (BSN) that uses
in-body nano sensors to monitor any patient's health and biological activities. Patients and
physicians may both access the data acquired by nano sensors on a wearable gadget. Doctors and
patients may access important heath data in real time via IoNT. Such information may be quite
helpful in preparing medical reports and assessing the impact of various therapies on a patient.

Figure 7

Nano sensors can be used to identify viruses that are difficult to detect. When such viruses
or bacteria are detected, nano sensors can warn doctors and patients, allowing healthcare
professionals to make educated decisions regarding their treatment. Healthcare practitioners may
be able to identify virus outbreaks such as the Nipah virus using Nano sensors. nano sensors may
also be used to measure the temperature of live cells within the human body.

5. IOT pros and cons


5.1. Advantage

The Internet of Things has various benefits in our daily lives. Some of its benefits are as follows:

Page 19

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

• Reduce human effort: As IoT devices connect and communicate with one another, they
may automate activities, improving the quality of a company's services and minimizing the
need for human intervention.

• Improved data collection: Information is easily available, even if we are far from our actual
position, and it is regularly and in real-time updated. As a result, these gadgets can access
data from anywhere, at any time, on any device.

• Efficient resource usage: By understanding the functioning and operation of each device,
we can increase resource consumption and monitor natural resources.

• Use in traffic systems: Asset tracking, delivery, surveillance, traffic or transportation


tracking, inventory control, individual order tracking, and customer management may all be
made more cost-effective by utilizing IoT technology.

• Relevant to safety concerns: It is useful for safety since it detects possible dangers and
alerts people. GM OnStar, for example, is an integrated gadget that detects a car crash or
accident on the road. If an accident or crash is discovered, it quickly makes a call.

• Useful in the healthcare industry: Real-time patient care may be provided more effectively
without the requirement for a doctor's visit. It empowers patients to make decisions while
providing evidence-based treatment.

5.2. Disadvantage

As the Internet of Things brings benefits, it also brings a considerable set of problems. The
following are some of the downsides of IoT:

• Concerns about security: IoT systems are networked and interact via networks. As a result,
despite any security precautions, the system provides limited control and can lead to
numerous types of network assaults.

• Unemployment has increased: Unskilled employees, as well as skilled people, are at danger
of losing their jobs, resulting in high unemployment rates. Smart security cameras, robots,
smart ironing systems, smart washing machines, and other amenities are taking the place of
the humans who used to execute these tasks.

• There is a high risk that the entire system may be corrupted: If there is a problem in the
system, every linked device might become corrupted.

Page 20

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

• Reduced mental and physical activity: People become illiterate because of their reliance on
smart gadgets rather of undertaking physical work, causing them to become sluggish and
sedentary.

• Lack of international standards: Because there is no worldwide standard for IoT


interoperability, it is difficult for devices from various manufacturers to connect with one
another.

• High internet reliance: They are extremely reliant on the internet and cannot function
properly without it.

P2 Review standard architecture, frameworks, tools,


hardware, and APIs available for use in IoT development.
1. IoT standard architecture
1.1. IoT architecture

The Internet of Things (IoT) technology has a wide range of applications, and its use is
rapidly expanding. It operates in accordance with the many Internets of Things application areas
for which it was designed/developed. However, it lacks a standard defined working architecture
that is rigidly adhered to globally. The architecture of IoT is determined by its usefulness and
application in various areas. Still, there is a fundamental process flow upon which IoT is
constructed.

Page 21

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

Figure 8

• Sensing Layer: This layer contains sensors, actuators, and devices. These Sensors or Actuators receive
data (physical/environmental characteristics), process it, and then transmit it across a network.
• Network Layer: This layer contains Internet/Network gateways and Data Acquisition Systems (DAS). DAS
oversees data aggregation and conversion (Collecting data and aggregating data then converting analog
data of sensors to digital data etc.). Advanced gateways, which primarily link Sensor networks to the
Internet, also handle several fundamental gateway functions such as virus protection and filtering, as
well as decision making based on inputted data and data management services, among others.
• Data processing Layer: This is the IoT ecosystem's processing unit. Data is evaluated and pre-processed
here before being sent to a data center, where it is accessible by software programs known as business
applications, where data is monitored and maintained, and subsequent actions are planned. As a result,
edge IT or edge analytics enters the picture.
• Application Layer: The application layer is the fourth and final step of IoT architecture. Data centers or
the cloud are data management stages where data is maintained and used by end-user applications such
as agriculture, health care, aerospace, farming, military, and so on.

1.2. Advantage and disadvantage of IoT architecture

1.2.1. Pros

It can help with better house and city control via mobile phones. It improves security and
provides personal safety. We save a lot of time by automating processes. Even though we are

Page 22

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

far away from our actual location, information is freely available and constantly updated in
real time. Electric devices are connected directly and interact with a controller computer, such
as a mobile phone, leading in efficient power utilization. Consequently, no superfluous
electricity equipment will be used. IoT apps can give personal help by alerting you to your
routine plans. It is important for safety since it detects possible hazards and alerts people.

1.2.2. Cons

Hackers may obtain access to the system and take sensitive data. Because we are
connecting so many gadgets to the internet, there is a possibility that our information may be
exploited. They are completely reliant on the internet and would be unable to function
successfully without it. There are several ways for systems to fail due to their complexity. We
lose control of our lives—they will be completely regulated and dependant on technology.
People become ignorant because of their overuse of the Internet and technology because they
rely on smart devices instead of completing physical work, causing them to become
lazy. Unskilled individuals face a significant chance of job loss, which might result in
unemployment.

2. IoT frameworks
2.1. Definition

An IoT framework is a middleware layer that sits beneath one or more IoT applications and
provides a network-facing application interface through which peer framework nodes can
communicate. Frameworks frequently offer a variety of communication protocols and message
carrying methods. IoT frameworks also provide security features to apps and peer framework
nodes, such as hardware-roots-of-trust.

The Internet of Things framework is a fundamental component of modern technology, with


applications in practically every industry. One of the most important uses of the Internet of Things
is the creation of smart homes.

The notion of the IoT framework is also used in the design of many physical items, such as
thermostats, electrical gadgets, security and alarm systems, and vending machines, among many
others.

2.2. Common IoT frameworks

2.2.1. KAA IoT

Page 23

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

Kaa IoT is one of the most powerful and feature-rich Open-Source Internet of Things Cloud
Platforms, allowing anybody to freely execute their smart product designs. On this platform,
you may manage a N number of devices that are connected to each other via cross-device
interoperability. By supplying and installing remote devices, you may monitor your system in
real time. Kaa facilitates data flow between networked devices, the IoT Cloud, information and
visualization systems, and other IoT Ecosystem components.

Figure 9

• Pros

✓ Personalized microservice architecture


✓ Technology choice is unrestricted, and implementation is simple.
✓ IoT protocols that are open
✓ Gateway is compatible with
✓ Versioning of applications
✓ based on open components

• Cons

✓ it has very limited processing power so it can’t be used for projects which need high
processing like computer vision, speech recognition, deep learning etc.

✓ Fewer hardware modules are supported.


✓ Expensive price

2.2.2. Node RED

The open-source Node-Red serves as a visual interface for connecting any linked hardware
devices, services, and APIs. This open-source IoT framework often wires in novel and distinct

Page 24

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

ways that other open-source frameworks do not. Node-Red open source is based on Node.js
and can run on the Raspberry Pi as well as other 60,000 distinct modules.

• Pros

Node-RED, which is based on Node.js, is a tool for programming visually without


having to write any code. It has a browser-based flow editor that makes it simple to link
hardware devices and APIs, making it a great tool for rapidly designing programs for IoT
devices.

It visually displays relationships and functions and allows the user to program
without having to enter a language. Node-RED is a browser-based flow editor that
allows you to add and delete nodes as well as wire them together to make them
interact with one another.

• Cons

Despite the benefits indicated above, using a Node RED flow as an orchestrator, and
performed as a function would result in a double billing issue since the orchestrator
function would have to wait for the orchestrated functions to complete.

Whether or not the orchestrating function is chargeable is essentially a business


model issue that should be isolated from technical competency. In other words, the
supplier may opt to supply such capability for free or at a different pricing model than
function execution time. If the relevant supplier wishes to acquire a competitive edge
and provide their clients with the capacity to simply design and deploy arbitrary
processes, they might use this method.

3. IoT tools
3.1. Definition

IoT Tools is an abbreviation for Internet of Things Tools. It is a network or link of gadgets,
cars, equipment with embedded electronics, household appliances, and buildings, among other
things. This aids in the collection and exchange of many types of data. It also enables the user to
remotely operate the gadgets over a network.

IoT has seized the IT sector and is the latest term in today's internet-driven society. It has
opened a plethora of new opportunities for firms and developers working on IoT. As a result of IoT
app development, several amazing items have been created. Companies that provide Internet of

Page 25

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

Things solutions are developing hardware and software designs to assist IoT developers in
developing new and exceptional IoT devices and apps.

3.2. Pros and cons of several IoT tools

3.2.1. Tessel 2

It is used to create rudimentary Internet of Things prototypes and apps. It assists because to
its multiple modules and sensors. A developer may use the Tessel 2 board to get Ethernet, Wi-
Fi, two USB ports, a micro-USB port, 32MB of Flash, and 64MB of RAM. Cameras,
accelerometers, RFID, GPS, and other modules can also be incorporated.

• Pros

✓ Out-of-the-box support for NodeJS

✓ It supports Node 4.x LTS out of the box and does not require any configuration.

✓ System of coprocessors

✓ A 580MHz MediaTek router-on-a-chip with an asynchronous 48MHz SAMD21


coprocessor for GPIO, ADC, I2C, SPI, PWM, and UART programming runs Linux
and user application code.

✓ USB or Wi-Fi programming is possible.

✓ The method of installing software, whether in JavaScript, Python, or Rust, is


presented in the same way for USB and Wi-Fi connections.

✓ Simple to get started with

✓ The "Getting Started" experience in Tessel 2 involves just the installation of


Node.js and a single package (the CLI) via npm. Complete and up-to-date
walkthroughs for Linux, Mac, and Windows are available.

• Cons

✓ There is little memory. RAM capacity of 64 MB. This puts it more in line with an
Arduino-style board than a Raspberry Pi-level SBC.

3.2.2. Eclipse IoT

Eclipse is a computer programming integrated development environment. It has a base


workspace as well as an extendable plug-in framework for personalizing the environment.

• Pros

Page 26

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

This tool or instrument enables users to create, adopt, and promote open source IoT
solutions. It is ideally suited for the development of IoT devices, Cloud platforms, and
gateways. Eclipse provides support for several IoT-related projects. These projects
include open-source implementations of IoT protocols, application frameworks and
services, and tools for the Lua programming language, which is marketed as the finest
programming language for IoT.

• Cons

Because it is a very heavy IDE, dealing with low-end frameworks may be a hurried
task. Its start-up time is exceedingly slow and necessitates a significant amount of
handling power. Furthermore, if you are a novice, you will find it quite difficult to use,
and its documentation is also inadequate.

It consumes memory and slows down the machine. The absence of a debugger for
C++ is a shortcoming. There is no plugin available for the live server.

4. IoT hardware
4.1. Definition

On the Internet of Things, hardware may take numerous forms, including the underlying
processors that run the phones, sensors that gather data from the real environment, and edge
machines that process and analyse the data. IoT hardware is at the heart of every connected
endeavour, and the technological capabilities of these boards have only grown in importance as
the Internet of Things has evolved. However, because to the overwhelming amount of design
boards and modules in the room, selecting the correct IoT hardware for a project might be difficult.
In this post, we'll look at several components of IoT hardware and how these devices connect with
the internet.

4.2. Several components of IoT hardware

• Sensors

Sensors are the most important piece of hardware in IoT applications since they collect data
from their surroundings. Power management modules, RF, energy, and sensor modules are all part
of these systems. An RF module manages communication from Wi-Fi, Bluetooth, transceiver, BAW,
and duplexer.

• Microcontrollers

Page 27

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

A microcontroller is a single-chip integrated circuit device dedicated to performing a specific


task and operating an application. This includes programmable peripherals, a memory unit, and a
CPU. Microcontrollers are primarily developed for embedded applications and are commonly
employed in remotely controlled electronic equipment such as cell phones, washing machines,
microwaves, and cameras.

• Other Internet of Things hardware

IoT hardware includes smart wearable gadgets such as smart memory, glasses, rings, and
shoes. As part of an IoT network, smart gadgets enable us to access more of the material and
resources we like, as well as establish a new way to cooperation. Desktops, mobile phones, and
tablets have become typical command canters and will continue to be a vital element of IoT
applications. Other network distribution equipment, including as switches, hubs, and routers, play
an important role in IoT applications.

5. IoT APIs
5.1. Definition

The application program (or programming) interface, or API, is perhaps what truly binds the
"things" of the "internet of things" together. IoT APIs are the points of contact between an IoT
device and the internet and/or other network elements. "APIs are strongly associated with IoT
because they allow you to securely expose connected devices to consumers, go-to-market
channels, and other applications in your IT infrastructure," says API management provider Axway.

5.2. Challenges and opportunities of IoT APIs

5.2.1. Challenges

APIs, according to Mahbubul Alam, CTO and CMO of Movimento Group, are part of one
frequent pain issue he sees in the IoT ecosystem: suppliers offering a "all or nothing" IoT
solution, regardless of what elements a firm may already have - their own security and
databases, for example.

Corporations frequently boast "open APIs," but this simply means that each IoT application
speaks its own language, to which companies must adapt – as opposed to open-source APIs,
which provide more information.

"APIs are producing a genuine pain point, which is not being fully open and thinking about
how we can mix and match and provide the client the greatest choice.

Page 28

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

5.2.2. Opportunities

For starters, the industry is likely to expand significantly as more businesses use IoT. There
are currently multiple platforms for consumer and industrial IoT, and this fragmentation has
ramifications for interoperability and the size of IoT installations.

According to Michael Starsinic, technical track senior manager at InterDigital, this


fragmentation presents an opportunity for horizontal platforms that interface with all types of
devices and vertical applications. He emphasized the need of standardization, noting that
there is present, continuing work to standardize IoT APIs even while other sections of the
ecosystem continue to use their own API versions in the lack of an overarching common
strategy.

According to Vikram Saksena of NetScout's CTO office, which monitors IoT projects once
they are pushed out, there is opportunity for service providers in these early days of IoT. "This
fragmentation and silos present both obstacles and opportunities," he explained. "I believe
that one of the things that service providers may bring is through breaking down silos."

P3 Investigate a specific IoT platform (including architecture,


frameworks, tools, hardware, and APIs) has been chosen to
develop an IoT system.
1. IoT architecture development
1.1. IoT Architecture with Three Layers (Tiers)

While a whole end-to-end IoT architecture is comprised of several bits, this design reduces it to
three key building elements [3]:

➢ Sensors, actuators, and edge devices that interact with the environment comprise the
perception layer.

➢ Network Layer — Discovers, connects, and translates devices across a network,


working in tandem with the application layer.

➢ Application Layer — Data processing and storage that provides consumers with
customized services and capabilities.

Page 29

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

Figure 10

A physical or perceptual IoT layer is made up of devices, which often contain sensors, actuators, and
other smart devices. These are the "Things" in the Internet of Things. In turn, devices interface with and
interact with the cloud through wire or localized Radio Frequency (RF) networks. Typically, this is
accomplished using gateways. IoT devices are frequently considered to be at the "edge" of the IoT network
and are referred to as "edge nodes." When choosing a device, consider the needs for specific I/O protocols
and potential delay, wired or RF connections, power, durability, and overall sensitivity. It's vital to figure
just how much device flexibility your architecture needs.

IoT Gateways are critical middlemen that act as messengers and translators between the cloud and
clusters of smart devices. They are physical devices or software programs that often run from the field near
edge sensors and other devices. Large IoT systems may employ a slew of gateways to service many edge
nodes. They can perform a variety of functions, but their primary job is to normalize, link, and transport
data between the physical device layer and the cloud. Every data that travels between the cloud and the
physical device layer must pass via a gateway. IoT gateways are sometimes known as "intelligent gateways"
or "control tiers."

The application layer is the Cloud. It connects with the gateway through wired or cellular internet. The

Page 30

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

"Cloud" might be anything from AWS or Google Cloud services to server farms or even a company's on-
premises remote server. It offers strong servers and databases that allow sophisticated IoT applications
and combine features like data storage, big data processing, filtering, analytics, 3rd party APIs, business
logic, alarms, monitoring, and user interfaces. The "Cloud" is also used to control, configure, and trigger
events at the gateway and, eventually, the edge devices in a Three Layer IoT Architecture.

2. Framework
2.1. Google Cloud Platform – Internet of Things framework

Google is capable of accomplishing tasks. With its end-to-end platform, Google Cloud is one
of the greatest IoT systems available today. Google distinguishes themselves from the competition
by being able to process enormous amounts of data utilizing Cloud IoT Core.

It's a simple fact that corporations prefer their competitors' IoT products over Google's.
Element of this is likely due to Amazon and Microsoft having larger cloud client bases, and another
part is that Google isn't as well-known to companies. Instead, corporations may regard Google as a
social media firm, which is correct in terms of income.

Figure 11

Google's IoT technical tools are excellent, but the packaging of their IoT services differs
sufficiently from competitors that prospective purchasers may struggle to determine what's
required and how to utilize it.

• Processing of IoT Events

Page 31

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

Google's proprietary ASIC (Edge TPU) was created to enable AI forward staging for latency-
sensitive applications. The ASIC is open to device manufacturers, but Google has partnered with
Coral to supply a choice of edge controllers that use the chip. Other edge elements can be used for
local event processing by employing one of the devices linked IoT protocols or by establishing a
bespoke link to Cloud Pub/Sub, Google's message/event ingestion service.

In Google's IoT paradigm, Cloud Pub/Sub is the on-ramp for all event processing. It converts
messages and events into a generic publish/subscribe format, allowing any Google Cloud or Cloud
IoT application, as well as user applications, to subscribe to event flows and receive IoT messages
based on their requirements. Cloud Pub/Sub is a framework for ensuring event delivery, event
steering, and even features that ensure all events are properly handled. It also offers
security/compliance capabilities that make developing compliant IoT apps easier.

Cloud Pub/Sub is a Google Cloud service that is used to link devices using the controlled
Cloud IoT Core Service’s Protocol Bridge element. As a result, IoT apps that do not use Cloud IoT
Core for whatever reason can still connect to the rest of Google's IoT-friendly cloud services, such
as analytics. A Pub/Sub Lite version is also available if complex processing skills are less critical than
inexpensive cost.

• Analytics for IoT

The Cloud Pub/Sub interface connects events to any of Google's analytics products (Cloud
Dataflow, Big Query, Cloud Bigtable, Machine Learning, and Google Data Studio), as well as third-
party analytics or AI apps that can use Cloud Pub/Sub. Google also provides a diverse variety of
tools and apps that make use of artificial intelligence and machine learning. These are accessible to
IoT apps but are not directly connected with Google's IoT products.

While Google offers certain digital twin solutions at the business process level (for example,
its new Supply Chain Digital Twin), it has not yet provided digital twinning of IoT apps or IoT
infrastructure. As with edge computing, Google may rely on third-party connections to provide a
larger digital twin IoT application architecture, albeit this has not yet been published.

3. Tools
3.1. Arduino

Arduino is a computer technology business established in Italy that creates interactive items
and microcontroller boards. It is an open-source prototyping platform that provides IoT hardware
as well as software. Interactive electronics can benefit from hardware standards, and software

Page 32

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

includes the Integrated Development Environment (IDE). It is the most popular IDE among all IoT
development tools. This platform is basic and straightforward to use.

In comparison to other microcontroller systems, Arduino boards are comparatively


affordable. The cheapest Arduino module may be constructed by hand, and even pre-made
Arduino modules cost less than $50.

Cross-platform - The Arduino Software (IDE) is available for Windows, Macintosh OSX, and
Linux. Most microcontroller systems are only compatible with Windows.

Figure 12

Simple, straightforward programming environment - The Arduino Software (IDE) is simple


enough for novices to use while yet being versatile enough for expert users to benefit from. It's
convenient for teachers since it's based on the Processing programming environment, so students
who learn to code in that environment will be familiar with how the Arduino IDE works.

Open source and extendable software - The Arduino software is provided as open-source
tools, allowing skilled programmers to extend it. The language may be expanded using C++
libraries, and those interested in the technical intricacies can switch from Arduino to the AVR C
programming language on which it is based. Similarly, if you choose, you may incorporate AVR-C
code straight into your Arduino applications.

Page 33

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

Open source and extendable hardware - The Arduino board plans are given under a Creative
Commons license, allowing skilled circuit designers to create their own version of the module,
expanding, and upgrading it. Even unskilled users may construct the breadboard version of the
module to learn how it works and save money.

4. Hardware
4.1. Temperature sensor

The Temperature Sensor LM35 series are precision integrated-circuit temperature devices
with output voltages that are directly proportional to the temperature in degrees Celsius.

Figure 13

The LM35 device has an advantage over linear temperature sensors calibrated in Kelvin in
that the user does not have to remove a huge constant voltage from the output to achieve easy
Centigrade scaling. The LM35 device does not require any external calibration or trimming to
achieve average accuracies of +1/4°C at room temperature and +3/4°C throughout a temperature
range of 55°C to 150°C.

4.2. Gas sensor

The Gas Sensor detects gas and smoke concentrations ranging from 300ppm to 10000ppm.
Butane, propane, methane, alcohol, hydrogen, and smoke are all detectable by it.

Page 34

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

The sensor's output voltage varies in response to the amount of smoke/gas in the
environment. The sensor produces a voltage that is proportionate to the amount of smoke/gas
present.

In other terms, the following is the connection between voltage and gas concentration:

• The higher the gas concentration, the higher the output voltage.

• The lower the output voltage, the lower the gas concentration.

4.3. Water pump

In any case, a water pump is a device that uses kinetic energy to create a flow of liquid. As a
result, it has the following fundamental elements:

Figure 14

Starter: the point at which the liquid is absorbed.

The one in charge of creating the kinetic energy that removes the water from the inlet and
transfers it through the outlet is the motor + propeller.

Check-out: this is the intake where the liquid driven by the water pump's power will exit.

Page 35

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

These hydraulic pumps are widely employed in a wide range of applications and gadgets.
From industrial to water dispensers, automatic irrigation systems, sprinkler irrigation, supply
systems, treatment plants, and so on. As a result, there are a plethora of models on the market,
each with a unique set of capabilities and capabilities.

4.4. Arduino Uno R3

The Arduino Uno R3 is a microcontroller board that is powered by a detachable dual-inline-


package (DIP) ATmega328 AVR microprocessor. It features a total of 20 digital input/output pins (of
which 6 can be used as PWM outputs and 6 can be used as analogue inputs). It may be
programmed using the simple Arduino computer software.

Figure 15

The FTDI USB-to-serial driver chip is absent from the Uno, as is the case with all previous boards.
Instead, it has an ATmega16U2 that has been programmed as a USB-to-serial converter. This extra
microcontroller comes with its own USB bootloader, allowing experienced users to reprogram it.

5. APIs
5.1. Advantage

In the case of IoT devices, effective administration and handling can allow developers to
choose which API to use and when to withdraw access. App and IoT device developers can provide
single or many connection requirements. Continuous API monitoring is an important part of the
process since it allows for the early discovery of any unanticipated flaws or failure chances. It offers
a clear picture of the value and application of APIs in IoT.

Deeper insights into the API developer experience may be gained by comparing the standard
experience and delivering an end-user experience to identify shortcomings. IoT programming that
necessitates the deployment of an emergency API is fully supported since it provides information
on API scalability and use quotas.

Page 36

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

IoT programming that necessitates the usage of an emergency API is fully supported, since it
provides information on API scalability, use quotas, and throttling.API version changes are now
easier than ever, with strong management standards being maintained when new version updates
are made available on a timely basis.

5.2. Disadvantage

There are two types of issues that must be handled:

• Everyone must adhere to the most recent OAuth requirements. This has shown to be the
simplest, most secure, and dependable method for consumers to communicate their
data with another system via APIs. Most large corporations have done this, but it must
be done universally. The OAuth standard is not used by the great majority of APIs.
Pulling data from a device becomes considerably more challenging in the absence of a
common OAuth implementation. When you attempt to connect to such APIs, the
connection can quickly break, especially if there are changes, such as when a user
changes his or her password. The interruption of service reduces the simplicity of use for
the person attempting to turn it on.

• Obtaining reporting APIs as opposed to basic data APIs. Base data APIs enable you to
retrieve data, but if you want metrics or measurements, you must replicate the
algorithms on your end to acquire the statistics you want. With reporting APIs, which are
required for most use cases, you may ask queries and get the answer immediately away.
For example, if I wanted to retrieve all my sales from the previous year using a base data
API, I would have to acquire all of the data from that year and then add the figures to get
what I wanted. With a reporting API, I could request the year's sales and it would
automatically provide the total for the year.

5.3. Several API providers

5.3.1. Apple homekit

HomeKit is Apple's smart home platform that allows you to operate different internet-connected
home gadgets, including as thermostats and plugs, as well as window blinds, light bulbs, and other
devices, using Apple devices.

Page 37

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

Figure 16

Nowadays, more and more goods are internet-connected, which is why the term "Internet of
Things" has become popular. The Internet of Things is a perplexing collection of "smart" devices
that link to the internet and may be managed by a variety of platforms, ranging from Amazon's
Alexa to Google Home to Samsung SmartThings.

HomeKit is Apple's "Internet of Things" solution, which connects HomeKit-enabled smart gadgets
in a way that allows you to control them with your Apple devices.

5.3.2. Google cloud

Google Cloud APIs provide programmatic access to Google Cloud Platform services. They are an
important component of Google Cloud Platform, letting you to quickly add the power of computing,
networking, storage, and machine-learning-based data analysis to your apps.

Customers can access cloud APIs using network API services such as the Cloud Pub/Sub API.
Each Cloud API generally operates on one or more subdomains of googleapis.com, such as
pubsub.googleapis.com, and offers clients with JSON HTTP and gRPC interfaces through public
internet and Virtual Private Cloud (VPC) networks. Clients can use client libraries or submit HTTP
and gRPC queries directly to Cloud API endpoints.

Page 38

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

Figure 17

Millions of developers and consumers rely on cloud APIs. To guarantee fair usage and reduce
the danger of abuse, all Cloud APIs enforce rate limitations and resource caps on consumption,
often known as quotas. You may also utilize these quotas to reduce your Google Cloud spending by
lowering your own quota limitations. Quota increase requests must be sent if you want additional
quotas than the default limitations.

Most Cloud APIs include precise statistics on your project's use of that API, such as traffic
volumes, error rates, and latencies. It enables you to swiftly triage problems with Cloud API-enabled
apps. This information is available in the Google Cloud API Dashboard in the Google Cloud Console.

P4 Explain about your IoT demo system, including


architecture and how it works
1. Scenario
According to nowadays contaminated environment and global warming, a system which provide an
ability to alert the concentration of micro dust and auto propitiate the environment by watering will

Page 39

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

help.

First of all, the micro dust in our environment is now more and more serious. As we can see, the
consequence of micro dust is health issue. The birth of air purifier is the solution for this problem. But
the maintenance cost of air purifier is not easily to adapt. Because of this reason I decided to develop a
system which can record the concentration of dust in air and alert for the purifier to work. This will
bring efficiency according to the save of energy that air purifier does not have to work all along even
the air is clean. In addition, air micro dust measurer will work with a sensor to record dust
concentration. It also comprises a system to evaluate the safety level by popping color led and send the
advice to user for deciding to operate the air purifier.

On the other edge, the system also provides an ability to reduce environment heat. Nowadays
global warming has become an aching problem. The most optimal solution for this is an air conditioner.
The sensor in the system will evaluate the level of heat to decide misting the air. When highly efficient
cooling machine have gotten over in wasting energy and producing contaminant, misting the air by
water will become the most efficient solution. The combination of heat sensor and watering system will
bring human an opportunity to reduce the use of electricity but remain the productivity of cooling.

In conclusion, this system will provide a healthier environment via the combination of air micro dust
controller and atmosphere heat propitiate. In the wish of better life quality, I will develop a full system
of environment health impact resistance system. Nevertheless, this system will provide more
technology in the future.

2. Gantt chart

Page 40

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

Figure 18

M1 Evaluate the impact of common IoT architecture,


frameworks, tools, hardware, and APIs in the software
development lifecycle.
1. The impact of common IoT platform in software development
Given its success rate, software has long been associated with a condition of crisis. The proliferation
of Internet-connected gadgets, sometimes known as the Internet of Things, adds to the complexity of
software systems. The properties of these systems, such as their immense size and variety, provide
ever-increasing new problems. In this article, we will first provide a quick overview of the IoT paradigm

Page 41

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

and the present level of software development. Then, we go into the specifics of building software for
IoT systems and systems of systems, with an overview of the existing approaches and tools for
designing, developing, and testing such systems.

1.1. Impact and effectiveness in SDLC

The entire lifetime of software systems has become far more complicated than in the past.
They entail hybrid development teams, complicated code, and continuous data collecting.

IoT technologies are extremely valuable to software development firms. Professionals that
can stay up with the latest IT technology developments will be extremely successful in their jobs.
Mastering IoT software development necessitates the acquisition of a variety of abilities, including
AI and machine learning.

IoT platforms support a wide range of devices, plug-and-play sensors, and external
applications. These platforms provide the essential components for developing and managing an
IoT solution. IoT solutions and software development are influencing each other, and this trend is
expected to continue as low-code or no-code platforms become more business-friendly. The
Internet of Things (IoT) has brought about a slew of unexpected yet fantastic developments in our
daily lives. The Internet of Things has resulted in a significant shift in the way people connect.
Technological improvements have occurred in both hardware and software. Quality software
applications are critical to the success of many firms.

Page 42

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

Figure 19

With digitization accelerating, an increasing number of businesses are using IoT-based


solutions. Security, for example, is a big worry that IoT may assist to address. The implications of an
unauthorized individual or group breaching and gaining access to, and control of a business's data
and control can be severe. Using various IoT technologies, aspects such as security, integration,
performance, and scalability may be created, developed, and implemented.

• Extending the Access Bar

It is obvious that IoT devices need extensive expertise of coding, editing, and data
management. Web developers will now need to broaden their knowledge, which implies that IoT
entry-level development employment will need to be matched with rising web technologies.

• Predictive assistance

Page 43

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

Predictive analysis is widely used in many commercial applications, particularly e-commerce


apps and platforms.

• Dynamic User Interface

At a time when user experience is critical for any organization, IoT enables the creation of
intelligent and dynamic user interfaces.

• Security

IoT platform technology in software products assist in meeting a variety of security criteria.
Improving Security Features. There is a rising public concern about digital security. User identity,
authentication, and access management mechanisms will be required for contemporary IoT
resources.

• Architecture of software

IoT is being used by businesses to create innovative and engaging software systems. The degree
of complexity of IoT devices has doubled - it has progressed to the end of the UI web design, data
management, task sharing, project management, and other features. Complexity may occasionally
have an impact on development cycles.

• Testing

Automated testing is critical in quality assurance, and IoT is assisting in the development of
these testing automation solutions.

• Load distribution

It is feasible to create software systems that can manage massive loads with the help of IoT
technologies.

M2 Evaluate the impact of common IoT architecture,


frameworks, tools, hardware, and APIs in IoT security.
1. The impact of common IoT platform in IoT security
1.1. IoT security issue and challenge
The techniques of protection employed to safeguard internet-connected or network-based devices
are referred to as IoT security. The phrase Internet of Things (IoT) is quite wide, and as technology
continues to advance, the concept has only become larger. Almost every modern gadget, from watches

Page 44

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

to thermostats to video game consoles, may interface with the internet or other devices in some way.
IoT security refers to the approaches, strategies, and technologies used to keep these devices from
being hacked. Ironically, the connection inherent in IoT devices renders them increasingly vulnerable to
hackers.

The Internet of Things umbrella does not just encompass internet-connected gadgets. Bluetooth-
enabled appliances are also considered IoT devices and, as such, require IoT security. Such oversights
have led to the current increase in IoT-related data leaks.

The following are a few of the IoT security issues that continue to jeopardize the financial security
of both individuals and enterprises:

• Exposure from a distance


Because of their internet-supported connection, IoT devices present a particularly broad attack
surface in comparison to other technologies. While this access is highly important, it also allows hackers
to interact with equipment remotely. Therefore, hacking campaigns such as phishing are so powerful.
To secure assets, IoT security, like cloud security, must account for a high number of entry points.

• Inadequate industry foresight


Certain sectors and their goods have undergone digital transformations as organizations continue
to modernize their businesses. Automotive and healthcare industries have lately increased their choices
of IoT devices to become more productive and cost-efficient. However, the digital revolution has
resulted in greater technical dependency than ever before.

While this is not generally a problem, dependence on technology can exacerbate the impact of a
successful data breach. What's more, these businesses are now dependent on a piece of technology
that is intrinsically more vulnerable: IoT devices. Furthermore, many healthcare and automobile firms
were unwilling to commit the money and resources necessary to safeguard these devices.

• Resources are limited


Lack of foresight isn't the only challenge that newly digital sectors face when it comes to IoT
security. Another important issue with IoT security is the limited resources of many of these devices.

Not all IoT devices have the processing power to run complex firewalls or antivirus software. Some
gadgets can hardly connect to other devices. Bluetooth-enabled IoT devices, for example, have recently
been subjected to a surge of data breaches. Once again, the automobile industry has been one of the
hardest hit markets.
Page 45

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

1.2. Several example


1.2.1. MindSphere by Siemens
MindSphere is the Siemens IoT platform that has been designated as the premier
"industrial IoT as a service" solution. It has been employed in the realm of smart
manufacturing for proactive maintenance and anomaly detection, for example.
Furthermore, it has been used successfully in a variety of contexts, both industrial and civil,
to decrease energy and water waste.

• MindSphere's IoT security


Customers can function comfortably in a secure cloud environment thanks to the
platform. The major purpose achieved by implementing the security-by-design approach is
data protection throughout the lifespan, from connecting devices and data retention until
decommissioning. MindSphere adheres to the International Organization for Standardization
(ISO) 27001 Information Security Management System Framework and is IEC-certified for
safe development lifecycle (SDL). This standard specifies cybersecurity standards for
products used in the industrial automation and control systems environments, as well as
best practices for information security management procedures. JSON Web Token (JWT)
checks are constantly used for identity management and access control.

Authentication is implemented using multifactor authentication (MFA) to validate


the identities of users attempting to access the system by adhering to worldwide industry
standards for selecting the appropriate password based on the needed strength.
MindSphere APIs provide the fine-grained authorization mechanism, which validates
approved calls based on the context of the application and the user permissions. Transport
Layer Security (TLS) v. 1.2 is used to secure all communication from the client to MindSphere
via public endpoints, and Reliable x509 certificates from the Siemens Trust Center are used,
which is trusted by the European Telecommunications Standards Institute (ETSI) and the
Certification Authority Browser Forum. To provide safe, cost-effective, and simple device
communication, the MindSphere platform employs so-called MindConnect devices, which
have a unique identification number.

1.2.2. Watson by IBM


IBM Watson was originally envisaged as a question-answering computing system
designed to use modern technologies such as information retrieval, knowledge representation,

Page 46

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

advanced reasoning, and machine learning to such a sector. Watson now contains a suite of
business-ready tools, apps, and solutions designed to lower the costs and barriers to AI
adoption while optimizing results and responsible AI use.

• Watson's security
The platform has been certified in accordance with the ISO 27001 standard [34]. To
establish a trustworthy connection to the authentic platform service, IoT information is
encrypted using the HTTPS communication protocol for both browser-based GUI and REST
APIs with a certificate certified by DigiCert. Furthermore, access to the web-based GUI is
verified by a one-of-a-kind IBM identification code. To provide a high degree of security, device
and application credentials are protected by an authentication token that is salted and hashed.
By default, each device is linked to the platform using TLS v.1.2 security, which ensures that
devices may only connect via a secure, encrypted channel. To prevent devices from
impersonating other devices, once authenticated, devices are only permitted to publish and
subscribe to a limited topic space, and the authentication credentials supplied by the client
determine which device the subject space is scoped by the platform service.

M3 Discuss and give out the reason for your IoT platform
chosen.
1. Arduino
1.1. Discussion

Arduino is a free and open-source electronics platform with simple hardware and software.
Arduino boards can read inputs such as a light on a sensor, a finger on a button, or a Twitter tweet
and convert them into outputs such as operating a motor, turning on an LED, or posting anything
online. You may direct your board by delivering a series of instructions to the board's
microcontroller. You utilize the Arduino programming language (based on Wiring) and the Arduino
Software (IDE) (based on Processing) to do this.

Over the years, Arduino has served as the brain of hundreds of projects, ranging from simple
household products to complicated scientific equipment. A global community of makers - students,
amateurs, artists, programmers, and professionals - has collected around this open-source

Page 47

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

platform, and their contributions have built up to an astounding quantity of accessible information
that may be of tremendous benefit to both novices and specialists.

Arduino was created at the Ivrea Interaction Design Institute as a simple tool for rapid
prototyping intended for students with no prior experience with electronics or programming. As
the Arduino board gained popularity, it began to evolve to meet new demands and problems,
transitioning from basic 8-bit boards to solutions for IoT applications, wearables, 3D printing, and
embedded settings.

1.2. The reason that Arduino is suitable

Arduino has been utilized in millions of different projects and applications because to its
easy and accessible user experience. The Arduino software is simple enough for novices to use
while yet being versatile enough for expert users. It is compatible with Mac, Windows, and Linux. It
is used by teachers and students to create low-cost scientific equipment, to demonstrate chemistry
and physics principles, and to get started with programming and robotics. Designers and architects
use it to create interactive prototypes, while musicians and artists use it to create installations and
experiment with new musical instruments. Arduino is a valuable tool for learning new things.

For physical computing, there are several additional microcontrollers and microcontroller
platforms available. Similar capability is provided by Parallax Basic Stamp, Net media’s BX-24,
Phidgets, MIT's Handyboard, and many more programs. All these tools take the tangled nuances of
microcontroller programming and package them in a user-friendly format. Although alternative
systems simplify working with microcontrollers, Arduino has several advantages for instructors,
students, and curious amateurs:

• Inexpensive

• Cross-platform

• Simple and straightforward programming environment

• Software that is open source and extendable

• Hardware that is open source and extendable

1.3. Arduino compare with Raspberry Pi

Basis Arduino Raspberry Pi

License Arduino is a community-driven Raspberry Pi's hardware and


open-source initiative. Its software are both closed

Page 48

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

software and hardware are sources.


both open sources.

Capability Arduino is typically used to Raspberry Pi can perform


repeat single (and basic) numerous tasks at the same
actions. time.

Software C/C++ programming languages Raspberry Pi OS, a Linux-based


are used to program Arduino operating system, is supported.
boards. You can also install the
operating system of your
choice.

Internet Arduino does not have internet The Raspberry Pi includes an


connectivity. To connect it to Ethernet connector as well as
the internet, you'll need extra Wi-Fi capability.
modules or shields.

Handle power drop When an Arduino gadget is Raspberry Pi takes the same
turned on, it begins running attention as a computer. You
code. As a result, if the power is must correctly shut down the
abruptly switched off, you will operating system.
not have a corrupt operating
system or faults. When the
code is plugged in, it just
restarts.
Table 1

M4 Apply your selected techniques to create an IoT


application development plan.
1. IoT application n development plan
1.1. Human resources
Role function Requirement

Page 49

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

Analyzer In this process analyzer must discover Analyzer must provide


which environment factor which affect information of factors which
project sensor. They have to gather air affect the environment for
sample to filter what air component developer (example air
will the machine absort contaminate sample, air
material, contaminated
environment structure)
Developer Program code implement will be Every logical situation when
researched in this role. Logical and the machine was running must
challenge situation when a machine be designed and tested
work will be tested and fixed here
Implementation This role will have to calculate the Material and tools must be
partner budget, tool, and plan. They must work ensured during the developing
with developer to design the machine process. In the end of this
shape and logical function for process a complete product
durability while operation must be ready for tester
Tester A list of test case will be deployed in Most of the machine error
this role. After a pass through all the must be recorded. Number of
test case they must analyze the error important test case must be
and send it back to project manager deployed so that developer
can reduce any huge impact
which might affect when it in
use
Project This role will ensure the team operate Ensure the operation, send
manager smoothly. In each process, they must report, and recorded to the
urge the operation and fix the team next role whenever a role is
operation. finish with their jobs
Table 2

1.2. Budget
Tools Image price

Page 50

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

Arduino 200$

Water pump 300$

Air sensor 30$

Page 51

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

Heat sensor 50$

Led 15$

Wire 20$

Breadboard 28$

Page 52

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

Total price (The quantity is one for each material) 643$


Table 3

1.3. Project timeline


Process Description Times
Analyze Research and analyze 1 weeks (11/4-18/4)
what element are
contained in the
atmosphere
Develop Get the result from the 3 days (19/4-22/4)
previous process and
write down the code in
programable platform
(Arduino)
Implement Prepare and build up the 2 days (23/4-25/4)
machine from the
material which have
been included in the tool
list
Test Begin to test and write 2 days (26/4-28/4)
down the error according
to the test case list
Accomplishment Fix all the error which 4 days (29/4-3/5)
appear in test case. Re-
test and complete all
redundant part. Prepare
for the represent days
Table 4

D1 Evaluate challenges when designing and implementing for


the IoT system.
1. Challenge
Page 53

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

1.1. Design

1.1.1. CERTIFICATIONS AND TESTS

Testing and certification are critical components of the design process for every IoT
device. Any board with a wireless component—or any radiating component—must go
through stringent certification processes before it can be sold in different regions of the
world. These certification requirements may differ from continent to continent or even from
country to country. Aside from being a time-consuming operation, this comes at a high
cost—costs that the system designer should factor into their budgets for circuit designs.
Several certifications are necessary for each Bluetooth module or chip present onboard,
including those from the FCC (for the United States), CE (for European nations), IC (for
Canada), and so on.

1.1.2. System security

Systems must be developed and implemented to be resilient and dependable, as well


as secure using cryptographic methods and security protocols. It entails several techniques
to securing all embedded system components from prototype through deployment.

1.1.3. Cost and time to market increases

Cost and time to market increases the demand arises from the need to drive
improved techniques when creating IoT devices to manage cost modelling or cost optimally
with digital electronic components. Designers must also tackle the design time issue and
deliver the embedded device to market on time.

1.1.4. Battery life restriction :

Packaging and integration issues with small-sized chips with minimal weight and
power consumption. If you've been following the mobile arena, you've probably seen how
there appears to be no restriction in terms of display screen size every year. Consider the
rise of 'phablets,' which can be phones that are nearly as large as tablets. Although useful,
larger displays aren't necessarily for convenience; rather, display screen sizes are increasing
to accommodate larger batteries. Computers are becoming smaller, but battery energy
remains constant.

1.2. Implementation

1.2.1. CYBERSECURITY DIFFICULTIES - BALANCE CYBER RISKS AND FEARS WITH IOT BENEFITS

Page 54

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

Business executives are understandably concerned about the threat of cyberattacks.


As more gadgets and assets are connected and networked, executives are becoming
increasingly concerned about an expanded digital attack surface and increased
susceptibility. Customer data theft, ransomware, and industrial espionage are all examples
of IoT security concerns that are being driven by the rising professionalization of cybercrime.
The attack surface gets increasingly necessary to protect as the number of vulnerabilities
rises.

Furthermore, connecting the OT and IT worlds introduces several unknown cyber


challenges as the number, diversity, and complexity of connections increase: a secure link
with the cloud, the industrial control centre, or third-party providers must be guaranteed,
while asset availability and connectivity must be ensured at all times. In general, the
disparity between OT and IT network logic must be examined to describe the IoT difficulties
here.

Possible solution:

The first step is to recognize that even if a corporation currently has sophisticated
cybersecurity measures in place, they often only protect the IT world. There are new
difficulties in the IoT / OT world, thus businesses must modify their strategy. One typical
mistake is to endanger the IT landscape by ignoring the operational technology (OT)
network. This introduces new dangers that businesses must address.

While projects are still being created, companies should use the planning phase to
incorporate security into their IoT project and define threat risks with a thorough IoT risk
assessment. As a result, a risk-based approach that prioritizes vulnerabilities and threats
could be the solution: It is critical to begin with prevention to make it as difficult as possible
for an adversary to break into the systems. If a cybercriminal gains access, businesses must
discover the threat actor as soon as feasible.

1.2.2. CHANGE MANAGEMENT DIFFICULTIES - PUTTING YOUR PEOPLE AT THE CORE

The failure rate for IoT initiatives remains high – between 60% and 85% – owing to
the numerous IoT obstacles. Many of them are about people, such as the need of including
all employees in digital transformation activities.

As previously stated, one of the primary causes of failure derives from a


misunderstanding of IoT as a project built solely on new technologies. IoT is a people

Page 55

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

company, and success is dependent on bringing employees along for the ride from the
outset. Executives, on the other hand, frequently do not know how to prepare their people
for what is to come.

Possible solution:

Some of the most difficult parts of IoT for workers and leaders alike are defined by
the need for a cultural transition rather than a technological one - this necessitates a
systematic change management strategy from the start. First and foremost, an integrated
approach to the transformation's tangible and non-physical parts is required. This entails
combining technology and procedural features with social ones like company and team
culture. Both factors are equally crucial in achieving employee buy-in.

Furthermore, understanding and acceptance of dynamic target states - a necessary


aspect of any digital transition – is critical. Leaders must cultivate an adaptive attitude in this
situation. Needs and overarching objectives may alter unexpectedly throughout the
transformation - this is natural. To continually adapt to new requirements – while not losing
people – flexible concepts and an agile strategy are required.

1.2.3. DETERMINING THE EFFECTIVENESS OF YOUR INITIATIVES

90% of CEOs are unable to effectively calculate the return on investment (ROI) of
their IoT activities. This is one of many typical IoT difficulties and issues in large and complex
enterprises, raising executives' concerns about the effect and value of IoT for their company.

The return on investment is "simply" defined as the ratio of profit to investment cost
based on discounted cash-flow estimates. However, leaders have significant challenges in
effectively measuring and calculating it.

Possible solution:

The first point to remember is that CEOs should only contemplate embarking on their
digitization and IoT journey after establishing a clear business purpose. Companies tend to "fall
in love" with a new technology while overlooking the actual economic value it should deliver
to them. The true worth of digital projects may be recognized and assessed more clearly if
executives reverse the ROI question: instead of searching for the ROI of a specific IoT solution,
they can ask how to compute the ROI when utilizing IoT to address a business problem and
have a long-term effect.

Page 56

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

D2 Make multiple iterations plan of your IoT application and


modify each iteration to improve your IoT application security.
1. Table of risk and solution for security purpose

Threat Description Impact Solution

Vulnerabilities Vulnerabilities are a major Vulnerable standard Check for fixes and
issue that users and components harm updates on a regular
businesses face daily. One millions of devices, as basis. Vulnerabilities
of the primary reasons IoT illustrated by Ripple20 are a serious and
devices are insecure is a and URGENT/11. Aside ongoing concern in
lack of computing capability from the devices the realm of IoT. This
for built-in security. themselves, is due to the fact that
Another factor for the vulnerabilities in web vulnerabilities might
pervasiveness of apps and related software arise from any layer of
vulnerabilities is the limited for IoT devices can lead to IoT devices.
budget for designing and compromised systems. Cybercriminals are
testing safe firmware, still using earlier flaws
which is driven by the price to infect devices,
point of devices and their revealing how long
relatively short unpatched devices
development cycle. may remain online.

Malware This is a tactic that hackers The most prominent Keep an eye on the
have utilized to great effect assault occurred in 2016, baseline network and
in recent years. IoT botnet when Mirai used an army device activity.
malware is one of the most of ordinary IoT devices to Cyberattacks are
common kinds since it is take down key websites notoriously difficult to
both adaptable and and services. detect. Knowing the
profitable for hackers. Cryptocurrency mining baseline behaviour of
malware and ransomware devices and networks
are examples of other (speed, normal

Page 57

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

malware families. bandwidth, etc.)


might help users see
variations that
indicate malware
infestations.

Mismanagement Users may just lack the Security flaws, poor Decide on who will
and knowledge and password hygiene, and oversee things.
misconfiguration competence to apply general device Having someone
of devices suitable security measures, mismanagement can all function as an
in which case service contribute to the success administrator for IoT
providers and of these threats. devices and the
manufacturers may need to network can assist to
assist their clients in reduce security
improving their security. oversights and
vulnerabilities. They
will be in responsible
of safeguarding the
security of IoT
devices, including at
home. The position is
crucial, especially in
this era of WFH
settings, when IT
professionals have
little control over
safeguarding home
networks, which now
have a bigger effect
on work networks.

Assets left behind If a program was not It's dangerous to make Encrypting data
initially intended for cloud obsolete apps Internet- transfers inside the

Page 58

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

connectivity, it is likely to ready without making network is required to


be unprepared to deal with major changes—but with securely send data to
contemporary cyber historical assets, this isn't and from your
assaults. These outdated always achievable. devices. However,
materials, for example, may They've been cobbled even if your
not be compatible with together over years application and
contemporary encryption (perhaps decades), network are safe,
standards. making even minor there is a gap
security enhancements a between them where
mammoth task. your data might be
captured. You can
address this security
gap by using an X.509
certificate and/or a
single VPN/IPsec
connection between
the mobile network
and the application
server.

Security principles When it comes to security The absence of standards Small M2M devices
that are standards, IoT is a bit of a makes it more difficult to often have minimal
inconsistent free-for-all. Because there protect IoT devices and to computing power.
is no industry-wide enable machine-to- This prohibits them
standard, firms and niches machine (M2M) from putting up
must build their own communication without firewalls. A network-
standards and norms. raising risk. based firewall, on the
other hand,
safeguards your data
from the minute it
enters the network.
This removes the
device from the

Page 59

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

labour-intensive
process of packet
filtering, guaranteeing
that malicious data is
never delivered to the
device or even
allowed to access the
network in the first
place.
Table 5

Reference
1. softwaretestinghelp.com (2021). 10 Best IoT Platforms To Watch Out In 2022.Available at:
https://www.softwaretestinghelp.com/best-iot-platforms/ [April 7,2022].
2. Hindawi.com (2021). Internet of Things: Architectures, Protocols, and Applications. Available at:
https://www.hindawi.com/journals/jece/2017/9324035/#introduction/ [April 7,2022].
3. pareteum.com (2021). Internet of Things: The Five Types of IoT. Available at:
https://www.pareteum.com/internet-of-things-the-five-types-of-iot/type [April 7,2022].
4. educba.com (2021). IoT Hardware Available at: https://www.educba.com/iot-hardware/[April
7,2022].
5. how2shout.com (2021). 9 Best & Top Open source IoT Platforms To Develop the IOT Projects.
Available at: https://www.how2shout.com/tools/best-opensource-iot-platformsdevelop-iot-
projects.html [April 7,2022].
6. programmableweb.com (2018). 10 Top APIs for the Internet of Things. Available at:
https://www.programmableweb.com/news/10-top-apis-internet-things/brief/2020/03/29[April
7,2022].
7. vnecotec.com (2021). IoT Frameworks. Available at: https://www.vnecotec.com/iotframework/
[April 7,2022].
8. circuitdigest.com (2021). Top Hardware Platforms for Internet of Things (IoT). Available at:
https://circuitdigest.com/article/top-hardware-platforms-for-internet-of-things-iot [April
7,2022].

Page 60

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)


lOMoARcPSD|16042441

9. Wikipedia.com (2021). What is IoT. Available at:


https://en.wikipedia.org/wiki/Internet_of_things#How_SIoT_different_from_IoT? [April 7,2022].
10. educba.com (2021). IoT tools Available at: https://www.educba.com/iot-tools/ [April 7,2022].
11. Alexander S.Gillis. (2022). What is the Internet of Things (IoT)? [online] TechTarget. Available at:
https://www.techtarget.com/iotagenda/definition/Internet-of-Things-IoT [Accessed 5 April.
2022].
12. Pryia Pedamkar. (2022). IoT features. [online] Educba. Available at:
https://www.educba.com/iot-features/ [Accessed at 5 April.2022].
13. Geeksforgeeks.org, (2021). Characteristics of Internet of Things. [online] Available at:
https://www.geeksforgeeks.org/characteristics-of-internet-of-things/ [Accessed at 5 April.2022].
14. Jigsawacademy.com, (2021). Major Applications of IoT. [online] Available at:
https://www.jigsawacademy.com/top-uses-of-iot/ [Accessed at 5 April.2022].
15. Dataversity.net, (2022). A Brief History of Internet of Things. [online] Available at:
https://www.dataversity.net/brief-history-internet-
things/#:~:text=Realizing%20the%20Concept&text=Kevin%20Ashton%2C%20MIT's%20Executive
%20Director,IoT%20has%20evolved%20over%20time. [Accessed at 5 April.2022].

Page 61

Downloaded by Ph??c Võ (minhtenlaphuoc2002@gmail.com)

You might also like