Professional Documents
Culture Documents
1 Smart lighting
Smart lighting for homes helps in saving energy by adapting the lighting to
the ambient condition and switching on/off or dimming the lights when
needed. Key enabling technologies for smart lighting include solid-state
lighting such as LED light and IP enabled the lights.
Wireless enabled and internet connected lights can be controlled remotely
from IoT applications such as a mobile or web application. Smart lights with
sensor for occupancy, Temperature Lux level etc can be configured to
adapt the lighting based on the ambient conditions sensed, in order to
provide a good ambience.
2 Smart Appliances
3 Smart Garden
Sensors may be quite useful for people who want to cultivate their own
veggies, fruit, and herbs at home. Users may check on the app to see
whether the temperature is correct, if the plant is sufficiently hydrated, and
if it is receiving enough sunshine.
The software can track the present status of the soil, determine whether it
has adequate moisture, and, if necessary, activate a smart irrigation
system.
4 Smart Kitchen
IoT devices can make cooking safer and easier by utilizing AI technologies.
Smart sensors can monitor for smoke and carbon monoxide, as well as the
temperature and humidity levels in your kitchen, to ensure that everything is
in working order.
Special built-in applications keep track of whether the user has enough
food in the fridge (and reorder it if necessary), offer recipe suggestions, and
assess the nutritional worth of meals. Smart spoons, for example, urge
users to eat gently.
4 Security System
Do you always double-check that the doors and windows are shut and that
the TV, computer, and other electrical equipment are turned off before
leaving your house? With the aid of specific sensors, smart security
systems will do it for you.
When you leave the house, these controllers can lock the entrance, close
the shutters, switch off electronic gadgets, and ensure that your home is
safe from human and animal intruders. Users may use the app on their
phones to check on their homes and manage the temperature, humidity,
and lighting remotely. You may also keep an eye on your older relatives and
assist them if necessary.
Our future doors will not require keys. The smart door may utilize face
recognition to unlock your home. Any visitors who are not recognised as
residents must be escorted inside the building by a resident. The doors
may also be set to open as you approach your house and close as you
depart.
They can also set off a chain reaction in other gadgets in your house. The
entry door may detect the authorized users and open, followed by the light
turning on; other doors in the house may then open, and the TV and coffee
machine may be switched on.
6 Temperature Control
With temperature control automation, you can set the temperature in your
house to the level that is most comfortable for you. Users may programme
smart thermostats to manage the temperature based on their preferences
and setups. These thermostats can detect your present activities and
adjust the temperature as needed.
7 Safety Sensors
Safety sensors are intelligent gadgets that can detect when anything is
wrong in your house. They can instantly alert users to possible hazards and
even take action to avert them. They only need a smartphone with Internet
access and sensors put in their house.
Temperature, humidity, and gas controllers can monitor the air in your
house on a regular basis and give you notifications through the Internet if
the indications are outside of the ideal range.
8 Smart Bathrooms
In the bathroom, IoT technology may make your daily routine more
enjoyable and convenient. Smart mirrors may link to other devices such as
computers and smartphones, detect the faces of family members in front
of them, and show information that interests those individuals, such as
news articles, weather forecasts, or specific websites.
If no one is in the bathroom, special sensors can detect movement and
switch off the water automatically. Smart shower controls may also
recognise people and set their preferred water temperature and pressure,
as well as limit the amount of time spent in the shower to save water.
Industry Application:
Monitoring indoor air quality in factories is important for health and safety of
the workers. harmful and toxic gas such as carbon monoxide, nitrogen
monoxide and Nitrogen dioxide etc t can cause serious health problems.
IoT based gas monitoring system can help in monitoring the indoor air
quality using various gas sensors.
The indoor air quality can vary for different locations. Wireless sensor
networks based IoT devices can identify the other hazardous zones, so that
a corrective measure can be taken to ensure proper ventilation
4 Quality Control
Another entry among the most important IOT applications is the ability to
monitor the quality of manufactured products at any stage: from the raw
materials that are used in the process, to the way in which they are
transported (via smart tracking applications), to the reactions of the end
customer once the product is received.
Machines that are part of IOT can generate real-time data regarding the
situation on the plant. Through the monitoring of equipment damages, plant
air quality and the frequency of illnesses in a company, among other
indicators, it is possible to avoid hazardous scenarios that imply a threat to
the workers.
This not only boosts safety in the facility, but also productivity and
employee motivation. In addition, economic and reputation costs that result
from poor management of company safety are minimized.
7 Maximizes assets use
One great benefit of applying IoT into the industry is the possibility to
maximize the use of assets. Through software, companies can have a
centralized system to control and monitor their workflows.
In fact, almost every operative process of the company can be monitored,
and that ensures better usage of the machinery, manufacturing, and
processes.
Imagine that you can stop wasting raw material, reduce operational costs,
improve production quality, and delivery times by integrating Internet of
Things in the organization.
8 Packaging Optimization
Manufacturers can gain insights into the usage patterns and handling of
product from different customers by using IoT sensors embedded in
products and/or packaging. There are smart tracking mechanisms that can
trace product deterioration during the product transit.
Other factors such as weather impact, a condition of roads and other
environment variables on the product. Through these insights, one can re-
engineer products and their packaging for delivering better performance in
both costs of packaging and customer experience.
Surveillance applications:
1 Manufacturers
2 Smart Homes
that can detect and restrict access to dangerous areas by toddlers or pets
are possible with IoT-enhanced video surveillance systems.
3 Smart Cities
4 Physical Security
5 Retail establishments
1 Raspberry pie
2 Arduino
3 Banana Pie
4 Flutter
CHIP is making news for it’s low cost ($9) and high value features. It is fully
loaded with built-in WiFi b/g/n, 1GHz Processor, 4GB onboard storage,
512MB RAM, and Bluetooth 4.0.
6 Particle.io
8 Adafruit
Implementation of IOT:
1 Set Effective Business Objectives
When you decide to adopt IoT implementation, you need to determine the
factors involved. Understanding every IoT asset or device to be integrated
into the network is essential. Ensure you select appropriate hardware
consisting of the most primary sensors. Examples of the devices used for
accurate data collection include volume, weight, color, sound, vision,
temperature, pressure, and humidity. You will need to upload the data on
the cloud with another hardware.
IoT platforms are software for centralizing and controlling all aspects of IoT
devices and networks. You can get these IoT platforms from specialized
suppliers or custom-made in-house. Once you get an effective IoT platform, it
becomes the foundation of the network–everything else is built around it.
A crucial step for implementing IoT is collecting sufficient and valuable data.
Several sensors can be used for this; however, more complex needs would
require more sensors for data collection. Some of the standard sensors
include oil, integrity, and fuel sensors. You may also be generating terabytes
of data daily. The data generated must be interpreted, processed, and stored
on a secure database.
Hot or cold path analytics are decision-making processes. Hot path analytics
are short-term, while cold path analytics focuses on the long-term. They
involve storing the data collected by the sensors in parts or wholly. The data is
converted or interpreted by embedded systems and later analysed.
10 Be Security Conscious
Being security conscious is one of the ways to protect your business from
unforeseen attacks. Many organizations have lost or been forced to pay top
dollars because of poor security measures. Ensure you deploy effective
security measures that can protect your business from hacking and other
attacks.
Cloud Computing:
One component that improves the success of the Internet of Things is Cloud
Computing. Cloud computing enables users to perform computing tasks using
services provided over the Internet. The use of the Internet of Things in
conjunction with cloud technologies has become a kind of catalyst: the
Internet of Things and cloud computing are now related to each other. These
are true technologies of the future that will bring many benefits.
Due to the rapid growth of technology, the problem of storing, processing, and
accessing large amounts of data has arisen. Great innovation relates to the
mutual use of the Internet of Things and cloud technologies. In combination, it
will be possible to use powerful processing of sensory data streams and new
monitoring services. As an example, sensor data can be uploaded and saved
using cloud computing for later use as intelligent monitoring and activation
using other devices. The goal is to transform data into insights and thus drive
cost-effective and productive action.
fog computing:
connected vehicles:
Security has finally been recognized as an essential requirement for all types
of computer systems, including IoT systems. However, many IoT systems are
much less secure than typical Windows/Mac/Linux systems.
IoT security problems stem from a range of causes: inadequate security
features in hardware, poorly designed software with a range of vulnerabilities,
default passwords, and other security design errors.
Insecure IoT nodes create problems for the security of the entire IoT system.
Because nodes typically have lifetimes of several years, the large installed
base of insecure devices will create security problems for some time to come.
Insecure IoT systems also cause security problems for the rest of the Internet.
IoT devices are plentiful; insecure IoT nodes are ideally suited to denial-of-
service attacks.
The Dyn attack is one example of an IoT-based attack on traditional Internet
infrastructure. Privacy is related to security but requires specific measures at
the application, network, and device levels. Not only must user data be
protected from outright theft, but the network needs to be designed so that
less-private data cannot easily be used to infer more private data.
Security Risks
• IoT devices are connected to your desktop or laptop. Lack of security
increases the risk of your personal information leaking while the data is
collected and transmitted to the IoT device.
• IoT devices are connected with a consumer network. This network is
also connected with other systems. So if the IoT device contains any
security vulnerabilities, it can be harmful to the consumer’s network.
This vulnerability can attack other systems and damage them.
• Sometimes unauthorized people might exploit the security
vulnerabilities to create risks to physical safety.
Privacy Risks
• In IoT, devices are interconnected with various hardware and software,
so there are obvious chances of sensitive information leaking through
unauthorized manipulation.
• All the devices are transmitting the user’s personal information such as
name, address, date of birth, health care information, credit card detail
and much more without encryption.