You are on page 1of 53

Higher Nationals in Computing

Unit 43: Internet of Things


ASSIGNMENT 1
Project name: Smart Irrigation System Using IoT

Learner’s name: DANG AN THANH


ID: GCS190644
Class: GCS0805A
Subject code: 1690
Assessor name: NGUYEN VAN SON

Assignment due: 2 8 / 0 8 / 2 0 2 1 . Assignment submitted: 27/08/2021


ASSIGNMENT 1 FRONT SHEET
Qualification TEC Level 5 HND Diploma in Computing
Unit number and
Unit 43: Internet of Things
title
Submission date 27/08/2021 Date Received 1st submission
Re-submission
Date Received 2nd submission
Date
Student Name Dang An Thanh Student ID GCS190644

Class GCS0805A Assessor name Nguyen Van Son

Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the
consequences of plagiarism. I understand that making a false declaration is a form of malpractice.
Student’s signature

Grading grid
P1 P2 P3 P4 M1 M2 M3 M4 D1 D2
❒ Summative Feedback: ❒ Resubmission Feedback:

Grade: Assessor Signature: Date:

Signature & Date:


ASSIGNMENT 1 BRIEF
Higher National Certificate/Diploma in Business
Student Name/ID Number: GCS190644
Unit Number and Title: Unit 43 – Internet of Things
Academic Year: 2021
Unit Assessor: Tran Trong Minh
Assignment Title: Assignment 1 – Internet of Things
Issue Date:
Submission Date:
Internal Verifier Name:
Date:

Submission Format:

Format: This assignment is an Individual assignment and specifically including 1 document:


You must use font Calibri size 12, set number of the pages and use multiple line spacing at
1.3. Margins must be: left: 1.25 cm; right: 1 cm; top: 1 cm and bottom: 1 cm. The reference
follows Harvard referencing system. The recommended word limit is 2.000-2.500 words.
You will not be penalized for exceeding the total word limit. The cover page of the report
has to be the Assignment front sheet 1.
Submission Students are compulsory to submit the assignment in due date and in a way requested by the
Tutors. The form of submission will be a soft copy posted on http://cms.greenwich.edu.vn/
Note: The Assignment must be your own work, and not copied by or from another student or from
books etc. If you use ideas, quotes or data (such as diagrams) from books, journals or other sources, you
must reference your sources, using the Harvard style. Make sure that you know how to reference properly,
and that understand the guidelines on plagiarism. If you do not, you definitely get fail

Unit Learning Outcomes:

LO1 Analyse what aspects of IoT are necessary and appropriate when designing software applications
LO2 Outline a plan for an appropriate IoT application using common architecture, frameworks, tools,
hardware and APIs
LO3 Develop an IoT application using any combination of hardware, software, data, platforms and
services.
LO4 Evaluate your IoT application and detail the problem your IoT application solves, the potential
impact on people, business, society and the end user and the problems it might encounter when
integrating into the wider IoT ecosystem

Assignment Brief and Guidance:

You currently work as a product developer for a new startup where you design IoT products for the
consumer, corporate, government and defence clients. As part of your role your manager has tasked you to
plan and develop a new IoT product, service or application for a potential client. You are required to
identify a target user and conduct tests with this user and include this feedback into multiple iterative
versions of your product.
Part 1 (Assignment 1):: For the first part, you must:
 Plan an IoT application for a specific target end user and the tests you intend to conduct with this
user. This plan will be in the form of a document and will include supporting evidence and material,
such as user personas and customer journey maps.
 Create multiple iterations of your application and modify each iteration with enhancements gathered
from user feedback and experimentation. This will follow the pathway outlined in your plan.(log
book,)

Part 2 (Assignment 2): For the first part, you must:


 Show evidence about Developed IoT application using any combination of hardware, software,
data, platforms and services (video or images of your IoT system with code snippet)
 Evaluate your IoT application and detail the problem your IoT application solves, the potential
impact on people, business, society and the end user and the problems it might encounter when
integrating into the wider IoT ecosystem
Learning Outcomes and Assessment Criteria

Pass Merit Distinction

LO1 Analyse what aspects of IoT are necessary and appropriate when designing software
applications

P1 Explore various forms of M1 Evaluate the impact of D1 Evaluate specific forms of


IoT functionality. common IoT architecture, IoT architecture and justify their
frameworks, tools, hardware and usage when designing software
APIs in the software development applications.
P2 Review standard
lifecycle.
architecture, frameworks,
tools, hardware and APIs
available for use in IoT M2 Evaluate the impact of
development. common IoT architecture,
frameworks, tools, hardware and
APIs in IoT security.

LO2 Outline a plan for an appropriate IoT application using common architecture, frameworks,
tools, hardware and APIs

P3 Investigate architecture, M3 Select the most appropriate D2 Make multiple iterations plan
frameworks, tools, hardware IoT architecture, frameworks, of your IoT application and
and API techniques available tools, hardware and API modify each iteration to improve
to develop IoT applications. techniques to include in an your IoT application security.
application to solve this problem.
P4 Determine a specific
problem to solve using IoT. M4 Apply your selected
techniques to create an IoT
application development plan.
Table of Contents
Unit 43: Internet of Things ASSIGNMENT 1.........................................................................................1
P1 Explore various forms of IoT functionality.....................................................................................1
1. What is Internet of Things (IoT):.............................................................................................1
2. How does IoT work:................................................................................................................2
3. Applications of IoT:.................................................................................................................3
3.1. Wearables...............................................................................................................................3
3.2. Smart Home Applications.......................................................................................................3
3.3. Health Care.............................................................................................................................4
3.4. Smart Cities.............................................................................................................................4
3.5. Industrial Automation.............................................................................................................5
3.6. Agriculture..............................................................................................................................5
4. Characteristics of IoT:.............................................................................................................6
5. Examples for real world application of IoT:.............................................................................7
P2 Review standard architecture, frameworks, tools, hardware and APIs available for use in IoT
development.....................................................................................................................................8
1. IoT Architectures....................................................................................................................8
2. IoT Frameworks......................................................................................................................8
2.1. What is IoT Framework?.........................................................................................................9
2.2. Main Components of the Internet of Things Framework......................................................9
3. IoT tools...............................................................................................................................11
4. IoT hardware........................................................................................................................12
5. IoT APIs................................................................................................................................12
M1 Evaluate the impact of common IoT architecture, frameworks, tools, hardware and APIs in the
software development lifecycle.......................................................................................................14
M2 Evaluate the impact of common IoT architecture, frameworks, tools, hardware and APIs in IoT
security............................................................................................................................................17
1. IOT vulnerabilities and security issues..................................................................................17
2. Threats to users....................................................................................................................17
3. Threats to others..................................................................................................................18
4. IoT Security Challenges.........................................................................................................18
D1 Evaluate specific forms of IoT architecture and justify their usage when designing software
applications.....................................................................................................................................19
P3 Investigate architecture, frameworks, tools, hardware and API techniques available to develop
IoT applications...............................................................................................................................24
1. IoT frameworks:...................................................................................................................24
2. IoT hardware:.......................................................................................................................28
3. IoT tools:..............................................................................................................................30
P4 Determine a specific problem to solve using IoT..........................................................................32
1. Title of project......................................................................................................................32
2. Introduction.........................................................................................................................32
3. Project description...............................................................................................................32
3.1. Project introduction..............................................................................................................33
3.2. Aim........................................................................................................................................33
3.3. Scope.....................................................................................................................................33
3.4. Main function.......................................................................................................................33
3.5. List tools, devices to develope IoT project...........................................................................33
M3 Select the most appropriate IoT architecture, frameworks, tools, hardware and API techniques
to include in an application to solve this problem............................................................................35
M4 Apply your selected techniques to create an IoT application development plan.........................37
1. Project work breakdown structure ( WBS)............................................................................37
2. Project cost...........................................................................................................................37
D2 Make multiple iterations plan of your IoT application and modify each iteration to improve your
IoT application security....................................................................................................................38
1. Questions of “ Smart Irrigation System Using IoT.....................................................................38
2. Analysis of user feedback and experimentation.......................................................................39
CONCLUSION...................................................................................................................................41
REFERENCES....................................................................................................................................43
Table of Figure
Figure 1 Internet of Things.........................................................................................................................2
Figure 2 Wearable Technology..................................................................................................................3
Figure 3 Smart Home Applications............................................................................................................3
Figure 4 Health Care...................................................................................................................................4
Figure 5 Smart Cities..................................................................................................................................5
Figure 6 Industrial Automation..................................................................................................................5
Figure 7 Agriculture...................................................................................................................................6
Figure 8 IoT Framwork..............................................................................................................................9
Figure 9 Major Components of Iot...........................................................................................................10
Figure 10 IoT Tools..................................................................................................................................12
Figure 11 API Platform............................................................................................................................13
Figure 12 SDLC........................................................................................................................................14
Figure 13 KAA IoT..................................................................................................................................25
Figure 14 CISCO......................................................................................................................................25
Figure 15 Zetta IoT...................................................................................................................................26
Figure 16 Oracle IoT................................................................................................................................27
Figure 17 Microsoft Azure Iot..................................................................................................................27
Figure 18 Industrial Microcontroller........................................................................................................28
Figure 19 Signle Board Computer............................................................................................................29
Figure 20 System On Chip.......................................................................................................................29
Figure 21 Arduino Software.....................................................................................................................30
Figure 22 Eclipse IoT Software................................................................................................................30
Figure 23 Kinoma Software......................................................................................................................31
Figure 24 Node-RED Software................................................................................................................31
Figure 25 Arduino Uno R3.......................................................................................................................33
Figure 26 Temperature Sensor LM35.......................................................................................................34
Figure 27 A mini water Pump..................................................................................................................34
Figure 28 Software IDE............................................................................................................................34
Figure 29 Automatic watering architecture..............................................................................................35
Figure 30 Blynk – IoT Platform...............................................................................................................36
Figure 31 Work breakdown structure.......................................................................................................37
ASSIGNMENT 1 ANSWERS
The Internet of Things (IoT) is the networking of physical items with electronics built in their
architecture that allow them to communicate and feel interactions with one another and with the
outside world. IoT- based technology will deliver advanced levels of services in the next years,
effectively changing how people live their lives. Medicine, power, gene therapies, agriculture, smart
cities, and smart homes are just a few of the categories where IoT is well-established.

In IoT, there are four key components:

1. Low-power embedded systems - Less battery consumption, high performance are the inverse
factors play a significant role during the design of electronic systems.

2. Cloud computing - Data collected through IoT devices is massive and this data has to be stored on a
reliable storage server. This is where cloud computing comes into play. The data is processed and
learned, giving more room for us to discover where things like electrical faults/errors are within the
system.

3. Availability of big data - We know that IoT relies heavily on sensors, especially real-time. As these
electronic devices spread throughout every field, their usage is going to trigger a massive flux of big
data.

4. Networking connection - In order to communicate, internet connectivity is a must where each


physical object is represented by an IP address. However, there are only a limited number of
addresses available according to the IP naming. Due to the growing number of devices, this naming
system will not be feasible anymore. Therefore, researchers are looking for another alternative
naming system to represent each physical object.

P1 Explore various forms of IoT functionality.

1. What is Internet of Things (IoT):

The Internet of Things, or IoT, is a machine of interrelated computing devices, mechanical and virtual
machines, objects, animals or human beings which might be furnished with precise identifiers (UIDs)

Page |1
and the capacity to switch facts over a community with out requiring human-to-human or human-to-
pc interaction.

A issue withinside the net of factors may be someone with a coronary heart display implant, a farm
animal with a biochip transponder, an vehicle that has integrated sensors to alert the motive force
while tire stress is low or some other herbal or man-made item that may be assigned an Internet
Protocol (IP) cope with and is capable of switch facts over a community.

Figure 1 Internet of Things

2. How does IoT work:

The IoT ecosystem is made up of web-enabled smart devices that use embedded systems such as
processors, sensors, and communication hardware to collect, send, and process the data they collect
from their environment. The devices do most of the work without human intervention. Interference,
although people can interact with devices, such as to configure them, give instructions, or access data.
The connectivity, networking, and communication protocols used with these web-enabled devices are
highly dependent on the specific IoT applications being deployed. IoT can also use artificial intelligence
(AI) and machine learning to make data collection easier and more dynamic.

Page |2
3. Applications of IoT:

3.1. Wearables
Wearable technology is a hallmark of IoT applications and was probably one of the first industries to
implement IoT in their service. These days, we stumble across Fit Bits, heart rate monitors, and
smartwatches.

Figure 2 Wearable Technology

3.2. Smart Home Applications


At the point when we talk about IoT Applications, Smart Homes are presumably the principal thing
that we consider. The best model I can consider here is Jarvis, the AI home mechanization utilized by
Mark Zuckerberg. There is likewise Allen Pan's Home Automation System where capacities in the
house are impelled by utilization of a line of melodic notes. The accompanying video could give you a
superior thought.

Figure 3 Smart Home Applications

3.3. Health Care


Page |3
IoT applications can transform responsive clinical based frameworks into proactive wellbeing based
frameworks.
The assets that momentum clinical exploration utilizes, need basic certifiable data. It generally utilizes
extra information, controlled conditions, and volunteers for clinical assessment. IoT opens
approaches to an ocean of significant information through investigation, constant field information,
and testing.
The Internet of Things likewise works on the current gadgets in force, exactness, and accessibility. IoT
centers around making frameworks instead of just hardware.
Here's the way an IoT-empowered consideration gadget works.

Figure 4 Health Care

3.4. Smart Cities


At this point I accept, a large portion of you more likely than not caught wind of the term Smart City.
The speculation of the enhanced traffic framework I referenced before, is one of the numerous
viewpoints that establish a brilliant city.
The thing about the keen city idea is that it's unmistakable to a city. The issues looked in Mumbai are
totally different than those in Delhi. The issues in Hong Kong are unique in relation to New York.
Indeed, even worldwide issues, as limited clean drinking water, disintegrating air quality and
expanding metropolitan thickness, happen in various forces across urban communities.
Subsequently, they influence every city in an unexpected way.

Page |4
The Government and designers can utilize IoT to investigate the regularly intricate elements of town
arranging explicit to every city. The utilization of IoT applications can help with regions like water the
executives, squander control, and crises.

Figure 5 Smart Cities

3.5. Industrial Automation


This is one of the fields where both quicker turns of events, just as the nature of items, are the basic
elements for a better yield on Investment. With IoT Applications, one could even re-engineer items
and their bundling to convey better execution in both expense and client experience. IoT here can
end up being down changing with answers for every one of the accompanying spaces in its arms
stockpile.

Figure 6 Industrial Automation

Page |5
3.6. Agriculture
Measurements gauge the consistently developing total populace to arrive at almost 10 billion
continuously 2050. To take care of a particularly monstrous populace one requirements to wed
horticulture to innovation and acquire best outcomes. There are various conceivable outcomes in this
field.

Figure 7 Agriculture

4. Characteristics of IoT:
Ë Connectivity
Availability is a significant necessity of the IoT foundation. Things of IoT ought to be associated with
the IoT foundation. Anybody, anyplace, whenever can network ought to be ensured consistently
Without association, nothing bodes well.
Ë Intelligence and Identity
The extraction of information from the produced information is vital. For instance, a sensor produces
information, yet that information may be helpful in case it is deciphered appropriately. Each IoT
gadget has a novel character. This recognizable proof is useful in following the hardware and on
occasion for questioning its status.
Ë Scalability
The quantity of components associated with the IoT zone is expanding step by step. Subsequently, an
IoT arrangement ought to be fit for dealing with the enormous development. The information
created as a result is colossal, and it ought to be taken care of fittingly.
IoT gadgets ought to progressively adjust to the changing settings and situations.
Page |6
Ë Dynamic and Self-Adapting (Complexity)
Expect a camera implied forDoctumheent shsaurerdvonewiwllwa.dnocsiety.comIt ought to be
versatile to work in various conditions and diverse light circumstances (morning, evening, night).
Ë Architecture
IoT engineering can't be homogenous in nature. It ought to be half breed, supporting various makers
items to work in the IoT organization. IoT isn't possessed by anybody designing branch. IoT is a reality
when numerous areas meet up.
Ë Safety
There is a risk of the touchy individual subtleties of the clients getting compromised when all his/her
gadgets are associated with the web. This can make a misfortune the client. Thus, information
security is the significant test. Furthermore, the hardware included is colossal. IoT organizations may
likewise be at the danger. In this manner, hardware wellbeing is likewise basic.
5. Examples for real world application of IoT:
Ë Data analysis:
IoT information examination applications can investigate organized, unstructured, and semi-
organized information to extricate significant bits of knowledge from it. Associations can utilize IoT
information examination to distinguish patterns a lot from information records, all things considered,
including movement informational indexes, topographical data, and medical services information.
Ë Tracking And Monitoring Systems
IoT resource GPS beacons use GPS or radio recurrence (RF) checking to follow and distinguish
different business resources' properties, for example, item stock. IoT applications in this space can
work with the long-range distinguishing proof and check of resources.
Ë Smart Barcode Readers
In the retail area, IoT scanner tag perusers support computerized signal handling dependent on man-
made consciousness (AI). Cloud information associations empower the perusers to interface with
different frameworks.
IoT scanner tag perusers can likewise be joined into shopping baskets, utilizing AI-based sensors to
distinguish items as they are dropped in or taken out. The perusers would then be able to move this
information to a PC that directs a programmed checkout framework. This is the innovation reason for
Amazon Go.

Page |7
Other than retail, IoT scanner tag perusers can streamline measures in regions like coordinations and
warehousing
Ë Connected Factories
Mechanical IoT or Industry 4.0 applications utilize associated processing plant arrangements like
Azure IoT for gadget the board and checking and detailing key measurements like gear effectiveness
and telemetry information. This data might come from resources that are dispersed across various
geological areas. IoT associated processing plant innovation can likewise work with the controller of
modern gadgets.
Ë Connected Health Care Systems
In the Internet of Medical Things or IoMT, associated innovation can help screen and send imperative
information on the side of clinical choices, and expand the scope of openness of medical care to a
more extensive populace.
IoT clinical gadgets can empower the distant and constant checking of patient conditions, gathering
data, for example, pulse, pulses, sugar levels, oxygen, and weight. Gadgets can consequently cover
peculiarities and crises, and doctors and guardians can promptly get to clinical information put away
on the web.
P2 Review standard architecture, frameworks, tools, hardware and APIs available for use in IoT
development.
1. IoT Architectures
While each IoT framework is unique, the establishment for every Internet of Things engineering just
as its overall information measure stream is generally something similar. As a matter of first
importance, it comprises of the Things, which are objects associated with the Internet which through
their inserted sensors and actuators can detect the climate around them and accumulate data that is
then given to IoT doors. The following stage comprises of IoT information obtaining frameworks and
doors that gather the incredible mass of natural information, convert it into computerized streams,
channel and pre-measure it so it is prepared for examination. The third layer is addressed by edge
gadgets answerable for additional handling and upgraded examination of information. This layer is
additionally where perception and AI advances might step in. From that point forward, the
information is moved to server farms which can be either cloud-based or introduced locally. This is
the place where the information is put away, oversaw and examined inside and out for significant
experiences.

Page |8
2. IoT Frameworks
2.1. What is IoT Framework?
Normally, when large data is being generated and transmitted across a number of devices, there has
to be a specific point where everything is collected and combined.
This specific point is very essential in a network, as it combines all data, making it possible to
understand the data being generated.
However, the smooth transmission and generation of data don’t just happen. Rather, it is usually
made possible by the Internet of Things Framework, (IoT framework). So, just what is IoT framework?
The Internet of Things (IoT) Framework can be described as being an ecosystem, comprising of
several connected devices that communicate with each other, over the Internet. These connected
devices usually work to transfer and sense data over the Internet, while requiring very little human
intervention.

Figure 8 IoT Framwork

The IoT framework is what makes it possible for the connected devices to have smooth
communication over the Internet. It is no wonder, then, that it is referred to as the ‘Internet of
Things’ framework.
The IoT framework is a very important element of technology in the modern world, finding
application in almost every sector. For instance, one of the major applications of the IoT is in the
designing of smart homes.
The IoT framework concept is also applied in the designing of different physical objects, such as
thermostats, electrical devices, security and alarm systems, as well as vending machines, among
many other objects.
Page |9
2.2. Main Components of the Internet of Things Framework

Figure 9 Major Components of Iot

Ë Device Hardware

The device hardware component of the IoT framework requires some fundamental information on
design. The client is likewise needed to have a thought on the working of the diverse miniature
regulators, too the sensors.
Instances of equipment gadgets that structure part of this IoT system segment are sensors, miniature
regulators and regulators.
Ë Device Software
In order for the device software of the IoT framework to function properly, the included composing
applications are needed to arrange the regulator, then, at that point work them distantly. The client is
needed to have a fundamental comprehension of how an API functions inside the miniature
regulators, also how libraries are generally made for programming.
Ë Communication and Cloud Platform

P a g e | 10
The cloud platform is one of the most crucial parts of the IoT framework. It requires the essential
information on all correspondence, regardless of whether remote or wired. The client is additionally
needed to have a decent comprehension of IoT joining, just as the working of the cloud innovation.
In outline, we can say the correspondence and Cloud Platform of the IoT Framework is the place
where all interchanges occur.
Ë Cloud Application
The cloud application is a type of software program, which fundamentally comprises of parts that can
be gotten to very simpler and quicker. These segments can be either nearby or even cloud-based. The
cloud application attempts to work on the framework, with the end goal that its most extreme
potential is figured it out.
All in all, the cloud application can be characterized as the composed use of an IoT structure, that ties
all the neighborhood equipment gadgets, just as the cloud-based gadgets.
3. IoT tools
IoT Tools stands for the Internet of Things Tools. It is an organization or association of gadgets,
vehicles, gear applying inserted hardware, home apparatuses, structures and some more. This aides in
gathering and trading various types of information. It additionally assists the client with controlling the
gadgets distantly.
Today in the web driven world, IoT has overwhelmed the IT business and is the most recent popular
expression. It has opened numerous new skylines for organizations and engineers dealing with IoT.
Numerous excellent items have been created because of IoT application advancement. Organizations
giving Internet of Things arrangement are making equipment and programming plans to help the IoT
engineers to make new and amazing IoT gadgets and applications.

P a g e | 11
Figure 10 IoT Tools

4. IoT hardware
IoT Hardware includes a wide range of devices such as devices for routing, bridges, sensors etc. These
IoT devices manage key tasks and functions such as system activation, security, action specifications,
communication, and detection of support-specific goals and actions.
IoT Hardware components can vary from low-power boards; single-board processors like the Arduino
Uno which are basically smaller boards that are plugged into mainboards to improve and increase its
functionality by bringing out specific functions or features (such as GPS, light and heat sensors, or
interactive displays).
5. IoT APIs
The application program (or programming) interface, or API, is arguably what really ties together the
connected “things” of the “internet of things.” IoT APIs are the points of interaction between an IoT
device and the internet and/or other elements within the network.
As API the board organization Axway puts it, "APIs are firmly connected with IoT on the grounds that
they permit you to safely open associated gadgets to clients, go-to-advertise directs and different
applications in your IT framework."

P a g e | 12
Figure 11 API Platform

Homes, urban areas, vehicles, organizations, and working environments are getting more intelligent
because of the Internet of Things (IoT). Designers wishing to make IoT applications and incorporate
with IoT-empowered gadgets can look to ProgrammableWeb to discover many appropriate
Application Programming Interfaces, or APIs, to assist them with taking care of business.
IoT APIs permit applications to understand sensors and dissect brilliant city or shrewd grounds
information, computerize home machines, use voice orders, oversee nearness signals, robotize
smartcars, oversee edge figuring, oversee producing and modern hardware, thus significantly more.
The Internet of Things class on ProgrammableWeb has more than 300 APIs. Here we feature ten
famous ones, in light of site traffic.

P a g e | 13
M1 Evaluate the impact of common IoT architecture, frameworks, tools, hardware and APIs in the
software development lifecycle.

Ë The Typical SDLC Process for Connected Products

Figure 12 SDLC

The Software Development Life Cycle (SDLC) process, a framework that defines the tasks that should
be performed at each step in the software development process, provides significant value related to
reducing risk, meeting business goals and enabling repeatable processes. The graphic below describes
the major phases in a typical device SDLC process, including their technical and non-technical activities
and the steps required to ensure the smooth integration of security requirements into each phase.
The following sections of this post describe each phase and how it is impacted by the implementation
of security measures. For the full version including all development- and security-related details about
each phase of the SDLC process, please download our latest practical guide – Integrating Security into
the Device SDLC Process.
P a g e | 14
 Phase 1 – Requirements
Indeed, even at this beginning stage, it is fundamental to characterize the item's security
prerequisites. To do this, you first need to characterize the item's key security chances, for example,
the kind of data that it will measure and its usefulness. Then, you need to characterize the security
norms or accreditations that the item should meet, which available or industry and should be gotten
as a prerequisite from the item supervisory group.
To decide the degree of safety that is fitting for the item, and afterward test if that level is met later
on, you need to lead either a manual or a computerized security investigation to create a rundown of
safety prerequisites dependent on the particular gadget, its equipment, working framework and
practical tasks (for instance, what availability convention it upholds). It is enthusiastically suggested
that you know about these security necessities before you continue to the plan stage.
 Phase 2 - Design
When planning another item, you first need to figure out what innovations you need to utilize, the
dangers in the plan, and the time and spending imperatives. To appropriately resolve these issues, you
need to make framework and programming configuration archives dependent on the necessity
particulars that were characterized in the past stage. These records give an itemized depiction of the
different components and tasks needed to help the utilitarian prerequisites of the associated item.
According to a security point of view, you should audit the engineering and configuration plans
utilizing danger displaying methods to distinguish, list and focus on potential dangers like primary
weaknesses. The danger demonstrating measure incorporates four significant stages - decaying the
application, classifying the dangers, positioning the dangers, and relieving the dangers.
To ensure you consider all security necessities in this stage and appropriately plan their execution, it is
prescribed that you approach point by point data about every prerequisite including its seriousness
level, the work needed for its execution and definite execution how-to direction, just as data with
respect to the main norms and guidelines that are pertinent to every prerequisite.
 Phase 3 - Development
This significantly diminishes future overhead and defers identified with afterward security alleviations
and executions. While most CI cycles are planned with programming conveyance speed as the first
concern, standing by too long to even think about incorporating security prerequisites essentially
influences delivery dates. These deferrals can be effectively tried not to by address security issues in
prior stages.
P a g e | 15
To improve on the execution of safety prerequisites at this phase of the SDLC interaction, it is
extremely useful to utilize mechanized examination apparatuses that give gadget explicit reports
dependent on the item's firmware. Their reports ought to incorporate, in addition to other things, all
the security holes at various seriousness levels, portrayals of the subsequent dangers, references to
pertinent guidelines and guidelines, and bit by bit relief direction. It likewise helps if these reports
incorporate known outsider security weaknesses and suspected zero-day weaknesses.
 Phase 4 - System Testing
The focal point of this stage is to check that the item meets the specialized, useful and business
prerequisites that were characterized before, in light of a progression of tests that covers the whole
framework. A couple of the significant tests performed during this stage incorporate virtual lab tests,
acknowledgment tests, actual lab tests and accreditation tests.
According to the security viewpoint, there are a few security rules that should be met during
framework testing including distinguishing basic security issues by running static and dynamic
examination of the total last firmware picture, running infiltration tests to check how the item handles
different maltreatment cases, and guaranteeing that the security suspicions determined during the
plan stage are as yet important.
To guarantee that the item meets all security necessities before it is delivered, it is profoundly
significant to run last security assessments, for example, those given via mechanized examination
apparatuses. Now in the SDLC interaction the coordinated firmware picture can be broke down
completely, empowering an exhaustive assessment of any leftover security holes.
 Phase 5 - Requirements
This stage is centered around making the framework functional in a live climate and afterward keeping
up with functional strength. It incorporates a few stages – fabricating, creation approval, delivery and
consistent state.
From a security prerequisites viewpoint, check that the assembling cycle keeps security norms and
rules which might be industry-explicit, and that the item isn't transported with superfluous open
actual ports. At long last, the item's product should be consistently refreshed to guarantee a solid
security framework, with unique consideration paid to outsider weakness the executives.
These security prerequisites can be executed physically previously/after the item's delivery or
consequently by running examination devices on the item picture. It is enthusiastically suggested that
the firmware be investigated occasionally after sending so it very well may be checked against state-
P a g e | 16
of-the-art gadget explicit upgrade weakness the board, it is ideal to depend on an information base
that is consistently refreshed for new dangers and weaknesses, just as normal programming parts and
libraries.
SDLC Security Requirements Checklist for Connected Products. The consistent coordination of safety
into each period of the SDLC interaction as depicted here isn't simply fundamental for the
improvement of secure programming, it likewise decreases the general expense and exertion
associated with security execution and guarantees that the associated item meets its business
objectives.
M2 Evaluate the impact of common IoT architecture, frameworks, tools, hardware and APIs in IoT
security.
1. IOT vulnerabilities and security issues
C&C centers and APIs effectively manage day-to-day IoT operations. That said, their centralized nature
creates a number of exploitable weak spots, including:
 Unpatched vulnerabilities – Connectivity issues or the requirement for end-clients to
physically download refreshes straightforwardly from a C&C focus regularly bring about
gadgets running on obsolete programming, leaving them open to newfound security
weaknesses.
 Weak authentication – Manufacturers regularly discharge IoT gadgets (e.g., home switches)
containing effectively understandable passwords, which may be left set up by merchants and
end-clients. At the point when passed on open to far off access, these gadgets become simple
prey for aggressors running mechanized contents for mass abuse.
 Vulnerable APIs – As a door to a C&C focus, APIs are normally designated by an assortment of
dangers, remembering Man for the Middle (MITM), code infusions (e.g., SQLI), and
appropriated refusal of administration (DDoS) attacks. More data about the ramifications of
API-focusing on assaults can be found here.
The dangers posed by exploitable devices can be broken into two categories: threats that they pose to
their users and threats that they pose to others.
2. Threats to users
A compromised IoT device places its users at risk in a number of ways, such as:
Ë Data Theft

P a g e | 17
An IoT gadget contains immense measures of information, a lot of which is extraordinary to its
individual clients, counting internet perusing/buy records, charge card subtleties and individual
wellbeing data.
An inappropriately gotten gadget leaves this information powerless against burglary. In addition, weak
gadgets can be utilized as doors to different spaces of the organization they are sent on, taking into
consideration more touchy information to be extricated.
Ë Physical Harm
IoT gadgets are presently typical in the clinical business, with models including pacemakers, heart
screens and defibrillators. While helpful (a doctor can fine-tune a patient’s pacemaker remotely),
these gadgets are likewise powerless against security dangers.
An inappropriately gotten gadget can be taken advantage of to meddle with a patient's clinical
consideration. It's a really uncommon event, yet one to be viewed as when fostering a system for
getting IoT gadgets.
3. Threats to others
Insecure IoT devices are defenseless against being seized and utilized in a botnet — an assortment of
malware-tainted web associated gadgets, potentially numbering in the large numbers, controlled from
a far off area. For culprits, finding unprotected gadgets is easy and can be effectively accomplished by
running broadly accessible scripts or instruments. This is best exemplified by the presence of Shodan,
a publically accessible web crawler made for the disclosure of such gadgets.
As IoT gadgets have gotten more refined, so have the dangers that they present. This has showed itself
in all way of cyberattacks, including boundless spam and phishing efforts, just as DDoS assaults. The
last have been filling in size as of late, generally because of the expanded accessibility of under
secured IoT gadgets.

4. IoT Security Challenges


Now, it is not only us with our computers, but there are also “things” that interact with the Internet
without our intervention. These “things” are continually communicating with the Internet, a fridge
sending an update of the food inside or our vehicle transmitting messages to the mechanic to inform
its oil levels.

P a g e | 18
IoT is wonderful in many ways. But unfortunately, technology has not matured yet, and it is not
entirely safe. The entire IoT environment, from manufacturers to users, still have many security
challenges of IoT to overcome, such as:
 Manufacturing standards
 Update management
 Physical hardening
 Users’ knowledge and awareness
D1 Evaluate specific forms of IoT architecture and justify their usage when designing software
applications.
In simple terms, our IoT architecture contains the following components:
 Things equipped with sensors to gather data and actuators to perform commands received
from the cloud.
 Gateways for data filtering, preprocessing and moving it to the cloud and vice versa, –
receiving commands from the cloud.
 Cloud gateways to ensure data transition between field gateways and central IoT servers.
 Streaming data processors to distribute the data coming from sensors among relevant IoT
solution’s components.
 Data lake for storing all the data of defined and undefined value.
 Big data warehouse for collecting valuable data.
 Control applications to send commands to actuators.
 Machine learning to generate the models which are then used by control applications.
 User applications to enable users to monitor control their connected things.

These are the four layers of IoT architecture described in detail:

P a g e | 19
Ë Things, sensors and controllers
As the basis for every IoT system, connected devices are responsible for providing the essence of the
Internet of Things which is the data. To get actual boundaries in the rest of the world or inside the
actual item, they need sensors. These can be either inserted in the actual gadgets or carried out as
independent items to gauge and gather telemetry information. For a model, consider horticultural
sensors whose errand is to quantify boundaries, for example, air and soil temperature and mugginess,
soil pH levels or yield openness to daylight.
Another vital component of this layer are the actuators. Being in close joint effort with the sensors,
they can change the information produced by keen articles into actual activity. We should envision a
savvy watering framework with every one of the important sensors set up. In view of the info given by
the sensors, the framework examinations the circumstance continuously and orders the actuators to
open chosen water valves situated in where soil dampness is underneath the set worth. The valves are
kept open until the sensors report that the qualities are reestablished to default. Clearly, the entirety
of this occurs without a solitary human intercession.
What is likewise significant is that the associated articles ought not exclusively be equipped for
discussing bidirectionally with their relating entryways or information procurement frameworks, yet in
addition having the option to perceive and converse with one another to assemble and share data and
team up progressively to use the worth of the entire sending. If there should arise an occurrence of
asset compelled and battery-worked gadgets especially, accomplishing this is definitely not a simple
errand since such correspondence requires heaps of figuring power and burns-through valuable
energy and data transmission. Along these lines, a vigorous engineering can possibly empower

P a g e | 20
compelling gadget the executives when it utilizes fit-for-reason, secure and lightweight
correspondence conventions.
Ë Gateways and data acquisition
Although this layer still functions in close proximity with sensors and actuators on given devices, it is
fundamental to depict it as a different IoT engineering stage as it is vital for the cycles of information
assortment, separating and move to edge foundation and cloud-based stages. Given the gigantic
volume of info and yield that million-gadget organizations might produce, abilities for the collection,
choice and transportation of information ought to be at the center of attention. As delegates between
the associated things and the cloud and investigation, passages and information obtaining frameworks
give the essential association point that integrates the leftover layers.
Sitting at the skirt of the universes of OT and IT, entryways work with correspondence between the
sensors and the remainder of the framework by changing over the sensor information into designs
that are effectively adaptable and usable for other framework segments down the line. In addition,
they can handle, channel and select information to limit the volume of data that should be sent to the
cloud, which emphatically influences network transmission expenses and reaction times.
Consequently, passages give a spot to the nearby preprocessing of sensor information which is gotten
into valuable groups prepared for additional handling.
Another perspective that the entryways support is security. Since the doors are answerable for dealing
with the data stream in the two ways, with the assistance of appropriate encryption and security
instruments they can forestall IoT cloud information spills just as decrease the danger of malevolent
external assaults on IoT gadgets.
Ë Edge analytics
While not being an inevitable component of every IoT architecture, edge devices can bring significant
benefits especially to large-scale IoT projects. Even with restricted openness and information move
speed of the IoT cloud stages, edge frameworks can give speedier reaction times and greater
adaptability in the preparing and investigation of IoT information. As speed of information
investigation is key in some Industrial Internet of Things applications, edge figuring has as of late seen
a sensational expansion in fame among Industrial Internet of Things environments.
As edge framework can be found nearer to the information source in actual terms, it is simpler and
speedier for it to follow up on the IoT material progressively and give yield as moment significant
insight. In this situation, just the bigger lumps of information which truly need the force of the Cloud
P a g e | 21
to be prepared are sent there. By limiting organization openness, security can be essentially upgraded,
while decreased force and data transmission utilization adds to more productive utilizing of business
assets.
Ë Data center / Cloud platform
If sensors are neurons and the gateway is the backbone of IoT, then the cloud is the brain in the
Internet of Things body. Contrary to edge solutions, a data center or a cloud-based system is designed
to store, process and analyze massive volumes of data for deeper insights using powerful data
analytics engines and machine learning mechanisms which edge systems would never be able to
support.
Having seen expanded reception (particularly in Industrial IoT design) in the course of recent years,
distributed computing adds to higher creation rates, decrease of impromptu vacation and energy
utilization and numerous other business benefits.
Whenever outfitted with legitimate client application arrangements, the cloud can give business
knowledge and show choices that assist people with cooperating the framework, control and screen it
and settle on educated choices on the premise regarding reports, dashboards and information saw
continuously
Ë Intelligent lighting
Let’s see how IoT architecture elements work together by the example of smart yard lighting as a part
of a smart home – a bright illustration of how an IoT solution simultaneously contributes to user
convenience and energy efficiency. There are various ways a smart lighting system can function, and
we’ll cover basic options.
Ë Basic components
Sensors take data from the environment (for example, daylight, sounds, people’s movements). Lamps
are equipped with the actuators to switch the light on and off. A data lake stores raw data coming
from sensors. A big data warehouse contains the extracted info smart home dwellers’ behavior in
various days of the week, energy costs and more.
Ë Manual monitoring and manual control
Users control smart lighting system with a mobile app featuring the map of the yard. With the app
users can see which lights are on and off and send commands to the control applications that further
transmit them to lamp actuators. Such an app can also show which lamps are about to be out of order.
Ë Data analytics
P a g e | 22
Analyzing the way users apply smart lighting, their schedules (either provided by users or identified by
the smart system) and other info gathered with sensors, data analysts can make and update the
algorithms for control applications.
Data analytics also helps in assessing the effectiveness of the IoT system and revealing problems in the
way the system works. For example, if a user switches off the light right after a system automatically
switches it on and vice versa, there might be gaps in the algorithms, and it’s necessary to address
them as soon as possible.
Ë Automatic control’s options and pitfalls
The sensors monitoring natural light send the data about the light to the cloud. When the daylight is
not enough (according to previously stated threshold), the control apps send automatic commands to
the actuators to switch on the lamps. The rest of the time the lamps are switched off.
However, a lighting system can be “baffled” by the street illumination, lamps from neighboring yards
and any other sources. Extraneous light captured by sensors can make the smart system conclude that
it’s enough light, and lighting should be switched off. Thus, it makes sense to give the smart system a
better understanding of the factors that influence lighting and accumulate these data in the cloud.
When sensors monitor motions and sounds, it’s not enough just to switch on the light when
movements or sounds are identified in the yard or switch all the lamps off in the silence. Movements
and sounds can be produced, for example, by pets, and cloud applications should distinguish between
human voices and movements and those of pets. The same is about the noises coming from the street
and neighboring houses and other sounds. To address this issue, it’s possible to store the examples of
various sounds in the cloud and compare them with the sounds coming from the sensors.

Ë Machine learning

Intelligent lighting can apply models generated by machine learning, for example, to recognize the
patterns of smart home owners’ behavior (leaving home at 8 am, coming back at 7 pm) and
accordingly adjust the time when lights are switched on and off (for example, switch the lamps on 5
minutes before they will be needed).
Analyzing users’ behavior in long-time perspective, a smart system can develop advanced behavior.
For example, when sensors don’t identify typical movements and voices of home inhabitants, a smart
system can “suppose” that smart home dwellers are on a holiday and adjust the behavior: for

P a g e | 23
example, occasionally switch on the lights to give the impression that the house is not empty (for
security reasons), but do not keep the lights on all the time to reduce energy consumption.
Ë User management options
To ensure efficient user management, the smart lighting system can be designed for several users with
role distribution: for example, owner, inhabitants, guests. In this case, the user with the title “owner”
will have full control over the system (including changing the patterns of smart light behavior and
monitoring the status of the yard lamps) and priorities in giving commands (when several users give
contradicting commands, an owner’s command will be the one control apps execute), while other
users will have access to a limited number of the system’s functions. “Inhabitants” will be enabled to
switch on and off the lamps with no opportunity to change settings. “Guests” will be able to switch on
and off the light in some parts of the house and have no access to controlling the lights, for example,
near the garage.
Apart from role distribution, it’s essential to consider ownership (as soon as one system can control
over 100 thousand of households, and it’s important that a dweller of a smart home manages the
lighting in his yard, and not the one of a neighbor).

P3 Investigate architecture, frameworks, tools, hardware and API techniques available to develop
IoT applications.

1. IoT frameworks:
o KAA IoT
Kaa IoT is one of the most effective and rich Open Source Internet of Things Cloud Platforms, where
anyone can freely implement their smart product concepts. You can manage an N number of devices
connected to each other with cross-device interoperability on this platform. You can monitor your
machine in actual time by providing and configuring remote devices. Kaa enables information
exchange between linked devices, the IoT Cloud, information and visualization systems, as well as
other elements of IoT Ecosystems.

P a g e | 24
Figure 13 KAA IoT

o Cisco IoT Cloud Connect


Cisco IoT Cloud Connect provides robust, automated, and highly secure connectivity for the compute
the data. As Cisco is very famous for its security services, it protects IoT deployment against threats
with a secure IoT architecture.

Figure 14 CISCO

o ZETTA IoT
Zetta is nothing but a server-oriented platform developed based on the REST, NodeJS, and the Siren
hypermedia-API-strip flow-based reactive programming philosophy. After being abstracted as REST
APIs they are connected with cloud services. These internet services include tools for visualizing

P a g e | 25
machine analytics and support such as Splunk. It builds a gero-distributed network through
connectivity with systems like Heroku to endpoints like Arduino and Linux hackers.

Figure 15 Zetta IoT

o Oracle IoT
We surely include Oracle, a worldwide software company known to offer its top level of solutions in
database management, and business software, as we compare the top Internet-of- Things platforms.
Oracle offers its flexible environment outstanding company possibilities to create company
applications. Oracle supports the processing and builds large-scale IoT networks with very wide data.
The use of advanced security systems to protect IoT systems against external threats is another worth
mentioning. Since these systems usually have different devices, some of which have no security tool, it
is not sufficiently justifiable to implement centralized security measures.

P a g e | 26
Figure 16 Oracle IoT

o Microsoft Azure IoT


Without the Microsoft Azure solution, a cloud service giant with AWS and Google Cloud platform, the
comparison of our IoT platform will be not complete. The Microsoft Azure IoT Suite provides
preconfigured solutions and the ability to personalize and develop new solutions to meet the project
requirements. The strongest safety mechanisms, superb scalability and simple integration with your
current or future systems are achieved through Microsoft Azure Internet of thing Suite.

Figure 17 Microsoft Azure Iot

P a g e | 27
2. IoT hardware:
o Industrial Microcontroller
In the industrial world, digital computers have to be rugged and adapted for the control of
manufacturing processes, such as assembly lines, or robotic devices or any activity that requires high-
reliability control and ease of programming and process fault diagnosis. There are two well-known
types of Microcontrollers you should know. The Programmable Logic Controller and the Remote
Terminal Unit.

Figure 18 Industrial Microcontroller

A Programmable Logic Controller (PLC) is basically a gigantic microcontroller. It does the same things a
microcontroller can do, but with higher speed, performance, and reliability where a microcontroller is
really just a tiny low power CPU or computer with some output registers wired to pins
The Functions of RTUs and PLCs pretty much overlap, but in terms of usage, RTUs tend to be a better
fit for wide geographic telemetry, while PLCs are best suited for local area control.
o Single Board Computer
A single-board computer (SBC) is a complete computer built on single circuit board, with
microprocessor(s), memory, input/output (I/O) and other features required of a functional computer.
Single-board computers were made as demonstration or development systems, for educational
systems, or for use as embedded computer controllers. Many types of home computers or portable
computers integrate all their functions onto a single printed circuit board.

P a g e | 28
Figure 19 Signle Board Computer

The Omega is a personal single-board computer created by a startup company called Onion, released
on Kickstarter. It is advertised as "the world's smallest Linux Server". The system combines the tiny
form factor and power-efficiency of the Arduino, with the power and flexibilities of the Raspberry Pi,
you can find this SBU in a lot of device around, if you own a D- Link router you'll find out that it is
powered by an Onion Omega.
o System On Chip
SOC are electronic systems that integrate a Microcontroller Unit (MCU) as one of its components. It
typically runs on a single MCU and can be 8, 16, 32 bits. It also exposes General Purpose
Inputs/Outputs (GPIO) and is programmable using a toolchain that compiles the code (Firmware) and
loads it in the MCU's permanent memory (SDRAM).

Figure 20 System On Chip

3. IoT tools:
P a g e | 29
Ë Arduino
Arduino is an open-source prototyping platform based on easy-to-use hardware and software. It is
both a hardware specification for interactive electronics and a set of software that includes an IDE and
the Arduino programming language. The website explains that Arduino is "a tool for making
computers than can sense and control more of the physical world than your desktop computer."

Figure 21 Arduino Software

Ë Eclipse IoT
Have you heard of the Lua programming language yet? Eclipse is sponsoring several different projects
surrounding IoT. They include application frameworks and services; open source implementations of
IoT protocols and tools for working with Lua, which Eclipse is promoting as an ideal IoT programming
language. Eclipse-related projects include Mihini, Koneki and Paho.

Figure 22 Eclipse IoT Software

Ë Kinoma

P a g e | 30
Kinoma, a Marvell Semiconductor hardware prototyping platform encompasses three different open
source projects. Kimona Create is a DIY construction kit for prototyping electronic devices. Kimona
Studio is the development environment that works with Create and the Kinoma Platform Runtime.
Kimona Connect is a free iOS and Android app that links smartphones and tables with IoT devices.

Figure 23 Kinoma Software

Ë Node-RED
A visual tool for wiring the Internet of Things wiring together hardware devices, APIs and online
services in new and interesting ways. Built on Node.js, Node-RED describes itself as "a visual tool for
wiring the Internet of Things." It allows developers to connect devices, services and APIs together
using a browser-based flow editor. It can run on Raspberry Pi, and more than 60,000 modules are
available to extend its capabilities.

Figure 24 Node-RED Software

P4 Determine a specific problem to solve using IoT.


1. Title of project
P a g e | 31
Smart Irrigation System Using IoT
2. Introduction
Currently bonsai or other types of mini bonsai are simply ornamental plants that are popular with
many people, they play bonsai for passion and partly to relieve stress after stressful working hours.
However, not everyone likes to play bonsai, bonsai also has enough time to take care of these plants,
especially watering plants. There are many people because of their busy work, sometimes they forget
to water the plants, forgetting to water can cause the plants to wither, no longer able to grow.
Bonsai trees are cared for in a limited space, so the source of nutrients for the tree is also limited. So
you need to focus on watering the plants regularly because this is how you "feed the plants", the
longer the watering time, the more nutrients the plants can absorb.
As mentioned above, the longer the time of watering the bonsai tree, the more beneficial it is for the
tree, but you also need to water it just enough to avoid waterlogging, making the tree not have
enough oxygen to "breathe".
To save time and effort in taking care of bonsai trees, you should water all the trees in the garden in
turn and then water them again, instead of watering each tree one by one, because this way of
watering will help create the time it takes for the water to soak up the bottom.
And more specifically, for each plant, you should water the soil, then water the leaves, then water the
root again. You need to avoid watering the plant in hot weather as this can cause leaf burn.
However, such daily irrigation is also quite time-consuming, if you do not have enough time to take
care of it that way, you can consider installing smart watering systems. These systems will help you
save a lot of time and effort to water and care for bonsai trees and bring extremely good care
efficiency.
Because of that problem and also for those of you who are passionate about bonsai, today I will show
you how to make an automatic watering machine for ornamental plants. With very simple tools, we
will make a mini plant waterer that can measure both soil moisture and automatically water plants
when the humidity drops to the lowest level. So you will never have to worry again when you forget to
water the plants and fear the plants will wither when there is not enough water.

3. Project description
3.1. Project introduction

P a g e | 32
Using IoT technology to solve this problem, this device will sense the temperature to decide whether
to water the plants or not. When the air level increases a certain number, this device will sense and
calculate the amount of water just enough to water the plants.
3.2. Aim
Using IoT to automate smart watering patterns
3.3. Scope
Development of an application with procedures to water plants automatically through IOT sensor.
Tech companies and research groups both see potential smartphones, IoT devices, and technology can
automatically track activity.
3.4. Main function
 When the soil is dry and lacks moisture, the sensor will send a notification signal to the
controller
 Then will give the most optimal irrigation solution for the gardens; Smart watering house,
automatic irrigation system.
 Some sensors have the function of automatically switching off the current when the humidity
exceeds the allowable threshold. To avoid wasting water and causing damage to crops.
3.5. List tools, devices to develope IoT project
Hardware
No Name Image

Arduino Uno R3
1

Figure 25 Arduino Uno R3

P a g e | 33
2 Temperature Sensor LM35

Figure 26 Temperature Sensor LM35

A Mini water Pump


3

Figure 27 A mini water Pump

Software
Software IDE

Arduino used to import source code into


Arduino device to execute our functions
4 written in source code.

Figure 28 Software IDE

P a g e | 34
M3 Select the most appropriate IoT architecture, frameworks, tools, hardware and API techniques
to include in an application to solve this problem.

Ë Automatic watering architecture

Figure 29 Automatic watering architecture

Ë Blynk – IoT Platform


Blynk is an Internet-of-Things platform designed to make the development and implementation of
smart IoT devices quick and easy. It can be used to read, store, and visualize sensor data and control
hardware remotely.
Internet of Things has been all the buzz lately and more and more devices are being talked to the
internet every day. With the rise of such amazing technology, the risk of security has also increased
substantially. Some of the major concerns in IoT are:

P a g e | 35
 If IoT devices are sending your data to the internet, the communication needs to be closed
and encrypted which cannot be possible without using a dedicated and closed server which is
really hard to manage.
 The IoT devices also need to be responsive and again, that is not possible without a server
with low latency and high responsiveness.
 In IoT, the platform needs to be compatible with many different types of hardware
architecture and devices, so that it doesn’t restrict its users with a single type of hardware
with limited capabilities.
Keeping in view the problems mentioned above, Blynk is the perfect solution for all these problems.
Blynk consists of the following three major components:

Figure 30 Blynk – IoT Platform

M4 Apply your selected techniques to create an IoT application development plan.

P a g e | 36
1. Project work breakdown structure ( WBS)

Figure 31 Work breakdown structure

2. Project cost
Item Quantity Cost (VND) Total (VND)
Arduino Uno R3 1 168.000 168.000
Temperature Sensor LM35 1 36.000 30.000
A Mini water Pump 1 60.000 60.000
Adapter 5v 1 40.000 40.000
Breadboard Jumper Wires Male To Female 1 10.000 10.000
Dupont Cable
Total 308.000

D2 Make multiple iterations plan of your IoT application and modify each iteration to improve your
IoT application security.

P a g e | 37
1. Questions of “ Smart Irrigation System Using IoT
Topic: Smart Irrigation System Using IoT
Time: 15/08/2021 – 20/08/2021
Link:
https://docs.google.com/forms/d/e/1FAIpQLSfkBCJ6s5IY4RBbrSOSP5yZ88B7Qgy5DiPk_lX5n0EhvOy
tVg/viewform

P a g e | 38
2. Analysis of user feedback and experimentation

After getting feedback of first 10 customers, most of people are satisfy with the device. 60% of
customers think that this device is very useful for bonsai tree care and 40% of customers are wondering
about it. Most of customer need to use it to take care of their bonsai. Through survey, 60% of customers
think that price from 300.000 VND to 400.000 is suitable for them and 40 % of customers want to
purchase it with price from 400.000 VND to 400.000 VND.

Summary:

Most of customers are very satisfied with this product. It can help customers can take care of their
bonsai.Price from 300.000 VND to 400.000 VND is suitable for customer.

P a g e | 39
Results of the survey:

P a g e | 40
CONCLUSION
In a nutshell, IoT is a concept that connects all the devices to the internet and let them communicate
with each other over the internet. IoT is a giant network of connected devices – all of which gather
and share data about how they are used and the environments in which they are operated.
Through this report, point out the following:
Analyze what aspects of IoT are necessary and appropriate when designing software applications:
 Plan an IoT application for a specific target end-user and the tests you intend to conduct with
this user. This plan will be in the form of a document and will include supporting evidence and
material, such as user personas and customer journey maps.
 Outline a plan for an appropriate IoT application using common architecture, frameworks,
tools, hardware, and APIs: Create multiple iterations of your application and modify each
iteration with enhancements gathered from user feedback and experimentation. This will
follow the pathway outlined in your plan.
The IoT has the potential to dramatically increase the availability of information and is likely to
transform companies and organizations in virtually every industry around the world.
As such, finding ways to leverage the power of the IoT is expected to factor into the strategic
objectives of most technology companies, regardless of their industry focus.
The number of different technologies required to support the deployment and further growth of the
IoT places a premium on interoperability and has resulted in widespread efforts to develop standards
and technical specifications that support seamless communication between IoT devices and
components.

P a g e | 41
Collaboration between various standards development groups and the consolidation of some current
efforts will eventually result in greater clarity for IoT technology companies.

REFERENCES
P a g e | 42
[1].IoT Agenda. 2021. What is IoT (Internet of Things) and How Does it Work?. [online] Available at:
https://internetofthingsagenda.techtarget.com/definition/Internet-of-Things-IoT. [Accessed 3 August,
2021].

[2]. Edureka. (2018). IoT Applications | Internet Of Things Examples | Real World IoT Examples.
[online] Available at: https://www.edureka.co/blog/iot-applications/#iot-applications [Accessed 3
August, 2021].

[3].Horowitz, J., 2021. Examples of IoT in day to day life, ranging from medical to fun. [online]
ITChronicles. Available at: https://itchronicles.com/iot/examples-applications-of-iot/ [Accessed 3
August, 2021].

[4].MasterAdminStrate (2019). IoT in Daily Life. [online] Strate, School of Design. Available at:
https://www.strate.education/gallery/news/iot-daily-life. [Accessed 4 August, 2021].

[5].Wikipedia Contributors (2019). Internet of things. [online] Wikipedia. Available at:


https://en.wikipedia.org/wiki/Internet_of_Things . [Accessed 4 August, 2021].

[6].GeeksforGeeks. (2021). Characteristics of Internet of Things. [online] Available at:


https://www.geeksforgeeks.org/characteristics-of-internet-of-things / [Accessed 5 August, 2021].

[7].www.avsystem.com. (n.d.). What is IoT architecture? [online] Available at:


https://www.avsystem.com/blog/what-is-iot-architecture/ [Accessed 5 August, 2021].

[8].EDUCBA. (2019). IoT Framework | Learn the List of different Iot Framework. [online] Available at:
https://www.educba.com/iot-framework/ [Accessed 6 August, 2021].

[9]. EDUCBA. (2019). IoT Tools | Concept and a Few Popular IoT Development Tools. [online] Available
at: https://www.educba.com/iot-tools/ [Accessed 9 August, 2021].

[10]. DataFlair Team (2018). IoT Hardware | IoT Software - A Complete Tour - DataFlair. [online]
DataFlair. Available at: https://data-flair.training/blogs/iot-hardware/ [Accessed 9 August, 2021].

[11]. joyc (2020). 10 Top APIs for the Internet of Things. [online] ProgrammableWeb. Available at:
https://www.programmableweb.com/news/10-top-apis-internet-things/brief/2020/03/29 [Accessed
10 August, 2021].

[12]. RCR Wireless News. (2016). What is an IoT API? [online] Available at:
https://www.rcrwireless.com/20161018/internet-of-things/what-is-an-iot-api-tag6-tag99. [Accessed
11 August, 2021].

[13]. VDOO. (n.d.). SDLC Security Requirements Checklist. [online] Available at:
https://www.vdoo.com/blog/integrating-security-into-the-device-sdlc-process [Accessed 12 August,
2021].

P a g e | 43
[14]. EDUCBA. (2019). IoT Framework | Learn the List of different Iot Framework. [online] Available
at: https://www.educba.com/iot-framework/ [Accessed 16 August, 2021].

[15]. https://www.facebook.com/kdnuggets (2016). 35 Open Source tools for Internet of Things -


KDnuggets. [online] KDnuggets. Available at: https://www.kdnuggets.com/2016/07/open-source-
tools-internet-things.html [Accessed 16 August, 2021].

[16]. Intellias. (2018). Smart IoT Traffic Solutions for Resolving Traffic Jams in the City | Intellias Blog.
[online] Available at: https://www.intellias.com/smart-iot-solution-for-resolving-traffic-jams/
[Accessed 18 August, 2021].

[17]. Osoyoo.com. (2018). What is Blynk ? «osoyoo.com. [online] Available at:


https://osoyoo.com/2018/02/04/what-is-blynk/ [Accessed 20 August, 2021].

P a g e | 44

You might also like