You are on page 1of 48

INTERNET OF THINGS(IOT)

CHAPTER-1

INTRODUCTION

The internet of things, or IoT, is a system of interrelated computing devices, mechanical and
digital machines, objects, animals or people that are provided with unique identifiers (UIDs)
and the ability to transfer data over a network without requiring human-to-human or human-
to-computer interaction.

FIG: 1.1 What is IOT

A thing in the internet of things can be a person with a heart monitor implant, a farm animal
with a biochip transponder, an automobile that has built-in sensors to alert the driver when
tire pressure is low or any other natural or man-made object that can be assigned an Internet
Protocol (IP) address and is able to transfer data over a network.

Increasingly, organizations in a variety of industries are using IoT to operate more efficiently,
better understand customers to deliver enhanced customer service, improve decision-making
and increase the value of the business.
Dept of ECE, SBIT
INTERNET OF THINGS(IOT)

How are you reading this ebook right now? It might be on desktop, on mobile, maybe a
tablet, but whatever device you’re using, it’s most likely connected to the internet.

A thing in the internet of things can be a person with a heart monitor implant, a farm animal
with a biochip transponder, an automobile that has built-in sensors to alert the driver when
tire pressure is low or any other natural or man-made object that can be assigned an Internet
Protocol (IP) address and is able to transfer data over a network.
The point is that connecting things to the internet yields many amazing benefits. We’ve all
seen these benefits with our smartphones, laptops, and tablets, but this is true for everything
else too. And yes, we do mean everything.The Internet of Things is actually a pretty simple
concept, it means taking all the physical places and things in the world and connecting them
to the internet. IoT has evolved from the convergence of wireless technologies,
microelectromechanical systems (MEMSes), microservices and the internet. The
convergence has helped tear down the silos between operational technology (OT) and
information technology (IT), enabling unstructured machine-generated data to be analyzed
for insights to drive improvements. The point is that connecting things to the internet yields
many amazing benefits. We’ve all seen these benefits with our smartphones, laptops, and
tablets, but this is true for everything else too. And yes, we do mean everything.The Internet
of Things is actually a pretty simple concept, it means taking all the physical places and
things in the world and connecting them to the internet. IoT has evolved from the
convergence of wireless technologies, microelectromechanical systems (MEMSes),
microservices and the internetThe point is that connecting things to the internet yields many
amazing benefits. We’ve all seen these benefits with our smartphones, laptops, and tablets,
but this is true for everything else too. And yes, we do mean everything.The Internet of
Things is actually a pretty simple concept, it means taking all the physical places and things
in the world and connecting them to the internet. IoT has evolved from the convergence of
wireless technologies, microelectromechanical systems (MEMSes), microservices and the
internet The point is that connecting things to the internet yields many amazing benefits.
We’ve all seen these benefits with our smartphones, laptops, and tablets, but this is true for
everything else too. And yes, we do mean everything.

Dept of ECE, SBIT


INTERNET OF THINGS(IOT)

Dept of ECE, SBIT


INTERNET OF THINGS(IOT)

An internet connection is a wonderful thing, it gives us all sorts of benefits that just weren’t
possible before. If you’re old enough, think of your cell phone before it was a smartphone.
You could call and you could text, sure, but now you can read any book, watch any movie, or
listen to any song all in the palm of your hand.

The point is that connecting things to the internet yields many amazing benefits. We’ve all
seen these benefits with our smartphones, laptops, and tablets, but this is true for everything
else too. And yes, we do mean everything.

The Internet of Things is actually a pretty simple concept, it means taking all the physical
places and things in the world and connecting them to the internet.

FIG: 1.2 Building blocks of IOT

Confusion arises not because the concept is so narrow and tightly defined, but rather because
it’s so broad and loosely defined. It can be hard to nail down the concept in your head when
there are so many examples and possibilities in IoT.

To help clarify, it’s important to understand the benefits of connecting things to the internet.
Dept of ECE, SBIT
INTERNET OF THINGS(IOT)

Why would we even want to connect everything to the internet?

Dept of ECE, SBIT


INTERNET OF THINGS(IOT)

Where did it come from?

Kevin Ashton, co-founder of the Auto-ID Center at the Massachusetts Institute of


Technology (MIT), first mentioned the internet of things in a presentation he made to Procter

& Gamble (P&G) in 1999. Wanting to of where IoT was headed.


bring radio frequency ID (RFID) to the
attention of P&G's senior management,
Ashton called his presentation "Internet of
Things' to incorporate the cool new trend
of 1999: the internet. MIT professor Neil
Gershenfeld's book, When Things Start to
Think, also appeared in 1999. It didn't use
the exact term but provided a clear vision

Kevin Ashton

IoT has evolved from the convergence of wireless technologies, microelectromechanical


systems (MEMSes), microservices and the internet. The convergence has helped tear down
the silos between operational technology (OT) and information technology (IT), enabling
unstructured machine-generated data to be analyzed for insights to drive improvements.

Although Ashton's was the first mention of the internet of things, the idea of connected
devices has been around since the 1970s, under the monikers embedded internet and
pervasive computing.

The first internet appliance, for example, was a Coke machine at Carnegie Mellon University
in the early 1980s. Using the web, programmers could check the status of the machine and
determine whether there would be a cold drink awaiting them, should they decide to make the
trip to the machine.

Dept of ECE, SBIT


INTERNET OF THINGS(IOT)

IoT evolved from M2M communication, i.e., machines connecting to each other via a
network without human interaction. M2M refers to connecting a device to the cloud,
managing it and collecting data.

Taking M2M to the next level, IoT is a sensor network of billions of smart devices that
connect people, systems and other applications to collect and share data. As its foundation,
M2M offers the connectivity that enables IoT.

The internet of things is also a natural extension of supervisory control and data acquisition
(SCADA), a category of software application programs for process control, the gathering of
data in real time from remote locations to control equipment and conditions. SCADA systems
include hardware and software components. The hardware gathers and feeds data into a
computer that has SCADA software installed, where it is then processed and presented in a
timely manner. The evolution of SCADA is such that late-generation SCADA systems
developed into first-generation IoT systems.

The concept of the IoT ecosystem, however, didn't really come into its own until the middle
of 2010 when, in part, the government of China said it would make IoT a strategic priority in
its five-year plan.
The point is that connecting things to the internet yields many amazing benefits. We’ve all
seen these benefits with our smartphones, laptops, and tablets, but this is true for everything
else too. And yes, we do mean everything. But if user input is needed or if the user simply
wants to check in on the system, a user interface allows them to do so. Any adjustments or
actions that the user makes are then sent in the opposite direction through the system: from
the user interface, to the cloud, and back to the sensors/devices to make some kind of change.
But if user input is needed or if the user simply wants to check in on the system, a user
interface allows them to do so. Any adjustments or actions that the user makes are then
sent in the opposite direction through the system: from the user interface, to the cloud, and
back to the sensors/devices to make some kind of change.
That’s how an IoT system works at a high level. Now we’ll take a deeper dive into each of
these components to explain what they are, how they work, and important considerations for
your organization as you consider building and/or implementing IoT solutions

Dept of ECE, SBIT


INTERNET OF THINGS(IOT)

CHAPTER-2
HOW DOES IT OPERATE?

An IoT ecosystem consists of web-enabled smart devices that use embedded systems, such as
processors, sensors and communication hardware, to collect, send and act on data they
acquire from their environments. IoT devices share the sensor data they collect by connecting
to an IoT gateway or other edge device where data is either sent to the cloud to be analyzed
or analyzed locally. Sometimes, these devices communicate with other related devices and
act on the information they get from one another. The devices do most of the work without
human intervention, although people can interact with the devices -- for instance, to set them
up, give them instructions or access the data.

FIG: 2.1 Working of IOT

The connectivity, networking and communication protocols used with these web-enabled
devices largely depend on the specific IoT applications deployed.

IoT can also make use of artificial intelligence (AI) and machine learning to aid in making

Dept of ECE, SBIT


INTERNET OF THINGS(IOT)

data collecting processes easier and more dynamic.

Dept of ECE, SBIT


INTERNET OF THINGS(IOT)

FIG: 2.2 The stages of IOT

An IoT system consists of sensors/devices which “talk” to the cloud through some kind of
connectivity. Once the data gets to the cloud, software processes it and then might decide to
perform an action, such as sending an alert or automatically adjusting the sensors/devices
without the need for the user.

But if user input is needed or if the user simply wants to check in on the system, a user
interface allows them to do so. Any adjustments or actions that the user makes are then
sent in the opposite direction through the system: from the user interface, to the cloud, and
back to the sensors/devices to make some kind of change.

That’s how an IoT system works at a high level. Now we’ll take a deeper dive into each of
these components to explain what they are, how they work, and important considerations for
your organization as you consider building and/or implementing IoT solutions.

Dept of ECE, SBIT


INTERNET OF
THINGS(IOT)

Why IOT?

The internet of things helps people live and work smarter, as well as gain complete
control over their lives. In addition to offering smart devices to automate homes,
IoT is essential to business. IoT provides businesses with a real-time look into how
their systems really work, delivering insights into everything from the performance
of machines to supply chain and logistics operations.

FIG: 2.3 Future in IOT

IoT enables companies to automate processes and reduce labor costs. It also cuts
down on waste and improves service delivery, making it less expensive to
manufacture and deliver goods, as well as offering transparency into customer
transactions.

As such, IoT is one of the most important technologies of everyday life, and it
will continue to pick up steam as more businesses realize the potential of connected
devices to keep them competitive.

Dept of ECE, SBIT


INTERNET OF THINGS(IOT)

CHAPTER-3
ISSUES AND CHALLENGES OF IOT

Scalability:

Given the huge number of devices requiring simultaneous connectivity, scalability in


IoT systems has become a concern. In IoT, there are mainly two types of scalability
issues: vertical scalability, which refers to the addition or removal of computing
resources of an IoT node; and horizontal scalability, which refers to the addition or
removal of an IoT node. Given its importance, IoT scalability has been extensively
addressed in the literature, with the proposal of cloud computing (Cabré et al., 2017;
Cheng et al., 2017; Shirer and MacGillivray, 2020) or cloud-based architectures (Xu
and Helal, 2015). However, despite these efforts, challenges still remain, such as IoT
nodes needing to provide an increased number of services, such as functional
scalability, access control, data storage, fault tolerance, and privacy and security, to
name a few.

Security and Privacy

The lack of privacy standards and end-to-end security solutions has been an ongoing
concern for conventional IoT deployment, and wireless IoT faces more challenges in
terms of these aspects (Shafagh et al., 2017). Several technologies are aiming to solve
privacy and security issues from both a hardware and software perspective. For
hardware, RFID and newer releases of 5G and other local network protocols are key
to tackling security issues at a hardware level. In terms of software, Key Management
System (KMS) with a zero-trust network feature and blockchain are rapidly
addressing the privacy and trust threats with reinforced security features (Sicari et al.,
2015; Sun et al., 2019; Xu et al., 2020). With the help of newer communication
protocols, KMS, and blockchain, the grand challenge of IoT devices is the
interdependence of security, privacy, and trust for IoT ecosystems. The challenge
Dept of ECE, SBIT
INTERNET OF THINGS(IOT)

shall always be considered as a holistic goal for optimal integrity and performance.

Dept of ECE, SBIT


INTERNET OF THINGS(IOT)

FIG: 3.1 Self organization

Self-Organization

There is an ongoing paradigm shift from Internet-of-Things to Internet-of-Everything


due to the proliferation of IoT nodes which demands new approaches to autonomic
management to make the network proactive rather than reactive. The main idea
behind self-organization in IoT systems is to actively respond to the changing
environments in an automatic and coordinated fashion through the use of one or more
control loops that reconfigures the system behavior on-demand to keep it within
desired bounds (Kephart, 2005). These systems proactively self-manage themselves
by reacting to the changing environment using advanced algorithms in conjunction
with high-level human-defined goals and policies. These self-organization capabilities
are important to ensure the robustness and survival of the future dense IoT network
and therefore have attracted an intense research interest (Milner et al., 2012; Ding et
al., 2013; Qiu et al., 2017; Pang et al., 2020). However, there are many open
challenges in this space and some notable research directions for the future include
dealing with the heterogeneous interoperability of the system, designing optimal self-
organizing protocols and routing strategies for large-scale distributed heterogeneous

Dept of ECE, SBIT


INTERNET OF THINGS(IOT)

IoT networks, and cross-platform behavior optimization.

Dept of ECE, SBIT


INTERNET OF THINGS(IOT)

Energy Efficiency

Researchers have used several approaches to address the problem of designing energy
efficient IoT networks:

(a) developing energy-efficient routing protocols to reduce the number of hops


(Machado et al., 2013), optimizing communication link status (Khan et al., 2016),
adopting wake-sleep strategies based on network traffic (Xia and Li, 2013), and data
reduction via controlling the network topology.

(b) incorporating renewable energy devices in the network alongside adopting load-
balancing strategies (Li et al., 2015; Han et al., 2016).

(c) exploiting wireless charging mechanisms to solve the fundamental issue of power
management, especially for large-scale heterogenous IoT networks (Madhja et al.,
2016). However, from a hardware perspective there is a significant need to develop
net-zero-energy sensor nodes, since the current trend is to pack an energy constrained
node with more and more functionality, which could lead to a possible compromise
between fidelity and power efficiency.

Dept of ECE, SBIT


INTERNET OF THINGS(IOT)

Grand Challenges in Sensing

Sensing constitutes a vital part within IoT and wireless sensor networks. In a typical
setting, sensed data is sent over the IoT network for post-analysis and inference to get
insights. For the post-processing inference to be valuable, the accuracy of sensors is
fundamental. For this accord, ISO standard 5725:1994 separates accuracy into
precision and trueness while emphasizing the integrity of a sensor (Suzuki et al.,
2019). In contrast, RF sensing utilizes the channel state information for sensing and,
due to its inherent EM nature, it utilizes machine learning for classifying sensed
information and presents additional challenges, such as linearity, repeatability,
resolution, hysteresis, temperature coefficients, stability, and calibration.

Addressing these challenges consequently improves the reliability of RF sensing,


ultimately realizing a possible future for ambient RF sensing. Furthermore, RF
sensing has the advantage of a tactile nature, making it feasible for use in numerous
applications, easily deployable, and cost-effective. The subsequent advances in ML
techniques and RF characterization are envisaged to make RF sensing an integral part
of IoT networks. This is also evident from the recent developments in the THz band
for sensing and communications. Currently, THz is potentially being used for sensing
food and water security (Ren et al., 2019a,b), sensing the cornea of eyes (Ozheredov
et al., 2018), freezing of gait detection in Parkinson's disease (Tahir et al., 2019),
sensing for real time near field imaging (Hillger et al., 2018), detecting corneal tissue
water content (Grundfest et al., 2019), etc. Nevertheless, for the true success of IoT,
we envisage that a variety of sensing instruments will be part of the network and the
above challenges would need to be effectively addressed.

Dept of ECE, SBIT


INTERNET OF THINGS(IOT)

CHAPTER-4
IOT BENEFITS VS CONCERNS

Benefits:

1. Better Analysis Because You Have More Data Than Ever Before

With multiple devices connected to the internet, you are able to bring together
manufacturing-related data (and many other forms) that will help with reporting,
analysis, visual summaries and being able to pass data from the corporate level to the
branch level in order to increase efficiencies.

2. Maximize Efficiency

Here I am going to talk about one of my favorite parts of the IoT – tracking my
package. Think about it- before you would, maybe, get a window of time on when
your package was supposed to arrive and now I get a text for every step it makes from
leaving the warehouse to arriving at my front door. Again, selfish reasoning but even
back in 2014, Frederico Guerrini wrote in Forbes about how this technology would
transform the postal service. The IoT can make USPS more efficient, I don’t know
of a better case study than that.

3. Decreased Cost

Dept of ECE, SBIT


INTERNET OF THINGS(IOT)

Let’s be honest, it usually comes down to budget. When you take advantage of the
connectivity of your solutions you can monitor on a real time basis and cut on visits
between locations. If you are in healthcare, this can cut down on doctor’s rounds by
giving real-time patient updates. If you are in financial services, you can get real-time
readings from each bank branch. I realize this is directly in contradiction from the #1
point above but let’s be honest, more data can lead to more problems. The IoT means
that you have more devices and more data than ever before and while that can be
great for analysis and for figuring out new efficiencies, it can also lead to a list of
vulnerabilities and alerts so large that you don’t know where to begin. How do you
fix this? You need a vulnerability management and a threat-detection solution. I
realize this is directly in contradiction from the #1 point above but let’s be honest,
more data can lead to more problems. The IoT means that you have more devices and
more data than ever before and while that can be great for analysis and for
figuring out new efficiencies, it can also lead to a list of vulnerabilities and alerts so
large that you don’t know where to begin. How do you fix this? You need a
vulnerability management and a threat-detection solution. But if you happen to be on
a plane on a coast to coast trip with Wi-Fi that won’t let you connect to VPN but you
also really need to get that proposal done before you land…. You could be in trouble.
That is just one example but I’m sure you can think of plenty more, especially if you
have remote employees or multiple locations. These devices are connecting to these
unknown networks and then coming back home to your safe, protected network with
malware and other vulnerabilities and you must be able to catch them. Again, here a
threat detection solution will monitor anything and every device that is connected to
your network so that you can be sure, anything that is connected will be monitored
and you will be alerted if there are any compromised devices immediately. But if you
happen to be on a plane on a coast to coast trip with Wi-Fi that won’t let you connect
to VPN but you also really need to get that proposal done before you land…. You
could be in trouble. That is just one example but I’m sure you can think of plenty
more, especially if you have remote employees or multiple locations. These devices
are connecting to these unknown networks and then coming back home to your safe,
protected network with malware and other vulnerabilities and you must be able to
catch them. Again, here a threat detection solution will monitor anything and every
device that is connected to your network so that you can be sure, anything that is
connected will be monitored and you will be alerted if there are any compromised

Dept of ECE, SBIT


INTERNET OF THINGS(IOT)

devices immediately.

Dept of ECE, SBIT


INTERNET OF THINGS(IOT)

FIG: 4.1 Benefits vs concerns

Concerns:

1. Big Data On Steroids

I realize this is directly in contradiction from the #1 point above but let’s be honest,
more data can lead to more problems. The IoT means that you have more devices and
more data than ever before and while that can be great for analysis and for
figuring out new efficiencies, it can also lead to a list of vulnerabilities and alerts so
large that you don’t know where to begin. How do you fix this? You need a
vulnerability management and a threat-detection solution. Why? Because there is just
no way that you, or any human, can go through all of this information and decide
what is most important. With so much data from so many devices in the IoT, you
need a vulnerability management solution and a threat detection solution. One to

Dept of ECE, SBIT


INTERNET OF THINGS(IOT)

prioritize the vulnerability risks so that you can manage down the threat surface and
one to monitor your devices to tell you if, and when, you've been compromised by a
bad tor. However, just like there are thousands of vulnerabilities in your
organization, I realize this is directly in contradiction from the #1 point above but
let’s be honest, more data can lead to more problems. The IoT means that you have
more devices and more data than ever before and while that can be great for
analysis and for figuring out new efficiencies, it can also lead to a list of
vulnerabilities and alerts so large that you don’t know where to begin. How do you
fix this? You need a vulnerability management and a threat-detection solution. I
realize this is directly in contradiction from the #1 point above but let’s be honest,
more data can lead to more problems. The IoT means that you have more devices and
more data than ever before and while that can be great for analysis and for
figuring out new efficiencies, it can also lead to a list of vulnerabilities and alerts so
large that you don’t know where to begin. How do you fix this? You need a
vulnerability management and a threat-detection solution. But if you happen to be on
a plane on a coast to coast trip with Wi-Fi that won’t let you connect to VPN but you
also really need to get that proposal done before you land…. You could be in trouble.
That is just one example but I’m sure you can think of plenty more, especially if you
have remote employees or multiple locations. These devices are connecting to these
unknown networks and then coming back home to your safe, protected network with
malware and other vulnerabilities and you must be able to catch them. Again, here a
threat detection solution will monitor anything and every device that is connected to
your network so that you can be sure, anything that is connected will be monitored
and you will be alerted if there are any compromised devices immediately. But if you
happen to be on a plane on a coast to coast trip with Wi-Fi that won’t let you connect
to VPN but you also really need to get that proposal done before you land…. You
could be in trouble. That is just one example but I’m sure you can think of plenty
more, especially if you have remote employees or multiple locations. These devices
are connecting to these unknown networks and then coming back home to your safe,
protected network with malware and other vulnerabilities and you must be able to
catch them. Again, here a threat detection solution will monitor anything and every
device that is connected to your network so that you can be sure, anything that is
connected will be monitored and you will be alerted if there are any compromised
devices immediately.

Dept of ECE, SBIT


INTERNET OF THINGS(IOT)

there are thousands of alerts that can come with a threat detection solution. Make sure
you have a solution that will only give you verified alerts rather than wasting time on
alerts that aren’t real.

2. The Threat of Unknown Networks

With the convenience of 24/7 access comes the unknown factor of just where that
24/7 access is taking place. Are you in the office? Are you at home but also on your
VPN network? Then you’ve clearly been listening to your security team. But if you
happen to be on a plane on a coast to coast trip with Wi-Fi that won’t let you connect
to VPN but you also really need to get that proposal done before you land…. You
could be in trouble. That is just one example but I’m sure you can think of plenty
more, especially if you have remote employees or multiple locations. These devices
are connecting to these unknown networks and then coming back home to your safe,
protected network with malware and other vulnerabilities and you must be able to
catch them. Again, here a threat detection solution will monitor anything and every
device that is connected to your network so that you can be sure, anything that is
connected will be monitored and you will be alerted if there are any compromised
devices immediately.

Dept of ECE, SBIT


INTERNET OF THINGS(IOT)

FIG: 4.2 IOT Year graph

3. Admin Passwords

If you are a DevOps person, this may be the time to stop reading. I love developers
but, let’s be honest, they are not usually too concerned about security. They expect
you, your SecOps or your IT security team to take care of that. Therefore, you are left
with administrative passwords like “admin” or “1234” which are easy for them to
remember but also for every bad actor to guess. Again, the convenience of devices
doesn’t always mean it’s convenient for you. Make sure that you are checking,
changing, and enforcing password resets on all of your IoT devices But if you happen
to be on a plane on a coast to coast trip with Wi-Fi that won’t let you connect to VPN
but you also really need to get that proposal done before you land…. You could be in
trouble. That is just one example but I’m sure you can think of plenty more,
especially if you have remote employees or multiple locations. These devices are
connecting to these unknown networks and then coming back home to your safe,
protected network with malware and other vulnerabilities and you must be able to
catch them. Again, here a threat detection solution will monitor anything and every
device that is connected to your network so that you can be sure, anything that is
connected will be monitored and you will be alerted if there are any compromised
devices immediately.
But if you happen to be on a plane on a coast to coast trip with Wi-Fi that won’t let
you connect to VPN but you also really need to get that proposal done before you
land…. You could be in trouble. That is just one example but I’m sure you can think
of plenty more, especially if you have remote employees or multiple locations. These
devices are connecting to these unknown networks and then coming back home to
your safe, protected network with malware and other vulnerabilities and you must be
able to catch them. Again, here a threat detection solution will monitor anything and
every device that is connected to your network so that you can be sure, anything that
is connected will be monitored and you will be alerted if there are any compromised
devices immediately.

Dept of ECE, SBIT


INTERNET OF
THINGS(IOT)

CHAPTER-5
EVOLUTION OF INTERNET

FIG: 5.1 Evolution of internet

Internet of Boffins:

This was the era when ARPANET (Advanced Research Project Agency Network) carried its
first data packet in 1969. It was the first network to use TCP/IP. This was followed by the
Mark I Network in 1970, which was built by Davis. This network was a packet switched
network to serve NPL in UK. It was soon replaced by Mark II in 1973. The other major
inventions such as Telnet in 1974, Ethernet in 1980, GOSIP in 1190 and a full text web
search engine in 1994 followed the trend. This era is called ‘Internet of Boffins’ since in this
era internet was in a stage of early evolution and research.

Internet of Geeks:

‘Internet of Geeks’ era started with the proposal of IPv6. It was the latest revision of the
internet protocol. The communication protocol provides identification and location system for
computers on networks and routes traffic across internet. The popular internet services started
taking roots in this era. Amazon.com started its first online retail service in 1995, followed by
eBay providing customers with online auction and shopping services. Hotmail started its free
Dept of ECE, SBIT
INTERNET OF
THINGS(IOT)
web based email service in 1996, followed by Google search in 1998. PayPal started its first
internet payment service in 1998. Internet penetration was low in the market until 2000.

Internet of masses:

‘Internet of masses’ era started with the Dot-com bubble burst in 2000. In the starting of this
era Dot- com bubble burst led to high growth in stock markets due to increasing use of
internet in the industrial sector. In this era many people across the globe started using
internet. Social networking sites came into existence. In 2001 Wikipedia came into existence
followed by Facebook in 2004, further followed by YouTube, Twitter and WikiLeaks in the
consecutive years. A radical evolution of the current Internet into a Network of
interconnected objects that not only harvests information from the environment (sensing) and
interacts with the physical world (actuation/ command/control), but also uses existing Internet
standards to provide services for information transfer, analytics, applications, and
communications. Fueled by the prevalence of devices enabled by open wireless technology
such as Bluetooth, radio frequency identification (RFID), Wi-Fi, and telephonic data services
as well as embedded sensor and actuator nodes, IoT has stepped out of its infancy and is on
the verge of transforming the current static Internet into a fully integrated Future Internet.

The Internet revolution led to the interconnection between people at an unprecedented scale
and pace. The next revolution will be the interconnection between objects to create a smart
environment. Only in 2011 did the number of interconnected devices on the planet overtake
the actual number of people. Currently there are 9 billion interconnected devices and it is
expected to reach 24 billion devices by 2020. According to the GSMA, this amounts to $1.3
trillion revenue opportunities for mobile network operators alone spanning vertical segments
such as health, automotive, utilities and consumer electronics. A radical evolution of the
current Internet into a Network of interconnected objects that not only harvests information
from the environment (sensing) and interacts with the physical world (actuation/
command/control), but also uses existing Internet standards to provide services for
information transfer, analytics, applications, and communications. Fueled by the prevalence
of devices enabled by open wireless technology

Dept of ECE, SBIT


INTERNET OF
THINGS(IOT)

Mobile Internet:

‘Mobile Internet’ era refers to access to the Internet via cellular phone service provider. The
era got a boost with introduction of smartphones which gave a fast working internet on
phones. This was the era from 2007-2011. There was steep rise in the use of internet by the
people round the globe due to the mobile internet.

Internet of Things:

‘Internet of Things’ refers to an era where things can be connected to each other using internet.

IMPACT OF INTERNET

The uses of internet include but not limited to usage of search engines which will help you to
collect data from all over the world, usage of email and other instant message services which
are giving flexibility of sharing information among groups within seconds, usage of internet
in shopping via online shopping carts helped both clients and customers. Internet has become
a platform to share knowledge between different communities. Several universities are
publishing their research papers in their websites/digital libraries and helping other university
students, researchers and professors scholar activities.

INTERNET USAGE

IDC estimates Internet of Things (IoT) market to grow to $8.9 trillion with over 212 billion
connected things by 2020. The no. of connected devices surpassed total world population in
year 2005 and it is estimated that no. of devices will be around 50 billion which is about 7
times of the world population at that time.

From the simplest day to day activities to the most complex human emotions, IoT will impact
it.

Dept of ECE, SBIT


INTERNET OF
THINGS(IOT)

FIG: 5.2 Internet Usage and Population Statistics

INTRODUCTION TO INTERNET OF THINGS (IOT)

Anyone who says that the Internet has fundamentally changed society may be right, but at the
same time, the greatest transformation actually still lies ahead of us. Several new technologies
are now converging in a way that means the Internet is on the brink of a substantial expansion
as objects large and small get connected and assume their own web identity.

Following on from the Internet of computers, when our servers and personal computers
were connected to a global network, and the Internet of mobile telephones, when it was the
turn of telephones and other mobile units, the next phase of development is the Internet of
things, when more or less anything will be connected and managed in the virtual world. This
revolution will be the Net’s largest enlargement ever and will have sweeping effects on every
industry — and all of our everyday lives.

Smart connectivity with existing networks and context-aware computation using network
resources is an indispensable part of IoT. With the growing presence of WiFi and 4G-LTE
wireless Internet access, the evolution towards ubiquitous information and communication
networks is already evident. However, for the Internet of Things vision to successfully
emerge, the computing paradigm will need to go beyond traditional mobile computing
scenarios that use smart phones and portables, and evolve into connecting everyday existing
Dept of ECE, SBIT
INTERNET OF
THINGS(IOT)

objects and embedding intelligence into our environment. For technology to disappear from
the consciousness of the user, the Internet of Things demands: a shared understanding of the
situation of its users and their appliances, software architectures and pervasive
communication networks to process and convey the contextual information to where it is
relevant, and the analytics tools in the Internet of Things that aim for autonomous and smart
behavior. With these three fundamental grounds in place, smart connectivity and context-
aware computation can be accomplished. A radical evolution of the current Internet into a
Network of interconnected objects that not only harvests information from the environment
(sensing) and interacts with the physical world (actuation/ command/control), but also uses
existing Internet standards to provide services for information transfer, analytics,
applications, and communications. Fueled by the prevalence of devices enabled by open
wireless technology such as Bluetooth, radio frequency identification (RFID), Wi-Fi, and
telephonic data services as well as embedded sensor and actuator nodes, IoT has stepped out
of its infancy and is on the verge of transforming the current static Internet into a fully
integrated Future Internet.

The Internet revolution led to the interconnection between people at an unprecedented scale
and pace. The next revolution will be the interconnection between objects to create a smart
environment. Only in 2011 did the number of interconnected devices on the planet overtake
the actual number of people. Currently there are 9 billion interconnected devices and it is
expected to reach 24 billion devices by 2020. According to the GSMA, this amounts to $1.3
trillion revenue opportunities for mobile network operators alone spanning vertical segments
such as health, automotive, utilities and consumer electronics. A radical evolution of the
current Internet into a Network of interconnected objects that not only harvests information
from the environment (sensing) and interacts with the physical world (actuation/
command/control), but also uses existing Internet standards to provide services for
information transfer, analytics, applications, and communications. Fueled by the prevalence
of devices enabled by open wireless technologyA radical evolution of the current Internet into
a Network of interconnected objects that not only harvests information from the environment
(sensing) and interacts with the physical world (actuation/ command/control), but also uses
existing Internet standards to provide services for information transfer, analytics,
applications, and communications. Fueled by the prevalence of devices enabled by open
wireless technology

Dept of ECE, SBIT


INTERNET OF
THINGS(IOT)

A radical evolution of the current Internet into a Network of interconnected objects that not
only harvests information from the environment (sensing) and interacts with the physical
world (actuation/ command/control), but also uses existing Internet standards to provide
services for information transfer, analytics, applications, and communications. Fueled by the
prevalence of devices enabled by open wireless technology such as Bluetooth, radio
frequency identification (RFID), Wi-Fi, and telephonic data services as well as embedded
sensor and actuator nodes, IoT has stepped out of its infancy and is on the verge of
transforming the current static Internet into a fully integrated Future Internet.

The Internet revolution led to the interconnection between people at an unprecedented scale
and pace. The next revolution will be the interconnection between objects to create a smart
environment. Only in 2011 did the number of interconnected devices on the planet overtake
the actual number of people. Currently there are 9 billion interconnected devices and it is
expected to reach 24 billion devices by 2020. According to the GSMA, this amounts to $1.3
trillion revenue opportunities for mobile network operators alone spanning vertical segments
such as health, automotive, utilities and consumer electronics.

DEFINITION OF INTERNET OF THINGS (IOT)

“Today computers—and, therefore, the Internet—are almost wholly dependent on human


beings for information. Nearly all of the roughly 50 petabytes(a petabyte is 1,024 terabytes)
of data available on the Internet were first captured and created by human beings—by typing,
pressing a record button, taking a digital picture, or scanning a bar code. Conventional
diagrams of the Internet … leave out the most numerous and important routers of all - people.
The problem is, people have limited time, attention and accuracy—all of which means they
are not very good at capturing data about things in the real world. And that's a big deal. We're
physical, and so is our environment … You can't eat bits, burn them to stay warm or put them
in your gas tank. Ideas and information are important, but things matter much more. Yet
today's information technology is so dependent on data originated by people that our
computers know more about ideas than things. If we had computers that knew everything
there was to know about things—using data they gathered without any help from us—we
would be able to track and count everything, and greatly reduce waste, loss and cost. We
would know when things needed replacing, repairing or recalling, and whether they were
fresh or past their best. The Internet of Things has the potential to change the world, just as
the Internet did. Maybe even more so. “

Dept of ECE, SBIT


INTERNET OF
THINGS(IOT)
—Kevin Ashton, "That 'Internet of Things' Thing", RFID Journal, July 22, 2009

“Things are active participants in business, information and social processes where they are
enabled to interact and communicate among themselves and with the environment by
exchanging data and information sensed about the environment, while reacting
autonomously to the real/physical worldA radical evolution of the current Internet into a
Network of interconnected objects that not only harvests information from the environment
(sensing) and interacts with the physical world (actuation/ command/control), but also uses
existing Internet standards to provide services for information transfer, analytics,
applications, and communications. Fueled by the prevalence of devices enabled by open
wireless technologyA radical evolution of the current Internet into a Network of
interconnected objects that not only harvests information from the environment (sensing) and
interacts with the physical world (actuation/ command/control), but also uses existing Internet
standards to provide services for information transfer, analytics, applications, and
communications. Fueled by the prevalence of devices enabled by open wireless technology

A radical evolution of the current Internet into a Network of interconnected objects that not
only harvests information from the environment (sensing) and interacts with the physical
world (actuation/ command/control), but also uses existing Internet standards to provide
services for information transfer, analytics, applications, and communications. Fueled by the
prevalence of devices enabled by open wireless technology such as Bluetooth, radio
frequency identification (RFID), Wi-Fi, and telephonic data services as well as embedded
sensor and actuator nodes, IoT has stepped out of its infancy and is on the verge of
transforming the current static Internet into a fully integrated Future Internet.A radical
evolution of the current Internet into a Network of interconnected objects that not only
harvests information from the environment (sensing) and interacts with the physical world
(actuation/ command/control), but also uses existing Internet standards to provide services for
information transfer, analytics, applications, and communications. Fueled by the prevalence
of devices enabled by open wireless technology such as Bluetooth, radio frequency
identification (RFID), Wi-Fi, and telephonic data services as well as embedded sensor and
actuator nodes, IoT has stepped out of its infancy and is on the verge of transforming the
current static Internet into a fully integrated Future Internet.

Dept of ECE, SBIT


INTERNET OF
THINGS(IOT)

events and influencing it by running processes that trigger actions and create services with or
without direct human intervention.”

—Cluster of European research projects on the Internet of Things

“The Internet of Things represents an evolution in which objects are capable of interacting
with other objects. Hospitals can monitor and regulate pacemakers long distance, factories
can automatically address production line issues and hotels can adjust temperature and
lighting according to a guest's preferences, to name just a few examples.”

– IBM

ARCHITECTURE OF INTERNET OF THINGS

Architecture of internet of Things contains basically 4 layers:

 Application Layer

 Gateway and the network layer

 Management Service layer

 Sensor layer

Application Layer:

 Lowest Abstraction Layer

 With sensors we are creating digital nervous system.

 Incorporated to measure physical quantities

 Interconnects the physical and digital world

 Collects and process the real time information


Dept of ECE, SBIT
INTERNET OF
THINGS(IOT)

 Capturing of periodic sensory data

 Data Analytics (Extracts relevant information from massive amount of raw data)

 Streaming Analytics (Process real time data)

 Ensures security and privacy of data.

Sensor Layer:

 Provides a user interface for using IoT.

 Different applications for various sectors like Transportation, Healthcare, Agriculture,


Supply chains, Government, Retail etc.

ENABLING TECHNOLOGIES

In general, three types of technologies enable IoT.

1. RFID and near-field communication - In the 2000s, RFID was the dominant
technology. Later, NFC became dominant (NFC). NFC has become common in smart
phones during the early 2010s, with uses such as reading NFC tags or for access to
public transportation.
2. Optical tags and quick response codes - This is used for low cost tagging. Phone
camera decodes QR code using image-processing techniques. In reality QR
advertisement campaigns gives less turnout as users need to have another application
to read QR codes.
3. Bluetooth low energy - This is one of the latest technology. All newly releasing
smartphones have BLE hardware in them. Tags based on BLE can signal their
presence at a power budget that enables them to operate for up to one year on a
lithium coin cell battery.

RFID

Dept of ECE, SBIT


INTERNET OF
THINGS(IOT)
Radio-frequency identification (RFID) is the wireless use of electromagnetic fields to transfer
data, for the purposes of automatically identifying and tracking tags attached to objects. The
tags contain electronically stored information. Some tags are powered by electromagnetic
induction from magnetic fields produced near the reader. Some types collect energy from the
interrogating radio waves and act as a passive transponder. Other types have a local power
source such as a battery and may operate at hundreds of meters from the reader. Unlike a
barcode, the tag does not necessarily need to be within line of sight of the reader and may be
embedded in the tracked object. RFID is one method for Automatic Identification and Data
Capture (AIDC).

RFID tags are used in many industries, for example, an RFID tag attached to an automobile
during production can be used to track its progress through the assembly line; RFID-tagged
pharmaceuticals A radical evolution of the current Internet into a Network of interconnected
objects that not only harvests information from the environment (sensing) and interacts with
the physical world (actuation/ command/control), but also uses existing Internet standards to
provide services for information transfer, analytics, applications, and communications. Fueled
by the prevalence of devices enabled by open wireless technology such as Bluetooth, radio
frequency identification (RFID), Wi-Fi, and telephonic data services as well as embedded
sensor and actuator nodes, IoT has stepped out of its infancy and is on the verge of
transforming the current static Internet into a fully integrated Future Internet. A radical
evolution of the current Internet into a Network of interconnected objects that not only
harvests information from the environment (sensing) and interacts with the physical world
(actuation/ command/control), but also uses existing Internet standards to provide services for
information transfer, analytics, applications, and communications. Fueled by the prevalence
of devices enabled by open wireless technology such as Bluetooth, radio frequency
identification (RFID), Wi-Fi, and telephonic data services as well as embedded sensor and
actuator nodes, IoT has stepped out of its infancy and is on the verge of transforming the
current static Internet into a fully integrated Future Internet. A radical evolution of the current
Internet into a Network of interconnected objects that not only harvests information from the
environment (sensing) and interacts with the physical world (actuation/ command/control),
but also uses existing Internet standards to provide services for information transfer,
analytics, applications, and communications. Fueled by the prevalence of devices enabled by
open wireless technology such as Bluetooth, radio frequency identification (RFID), Wi-Fi,
and telephonic data services as well as embedded sensor and actuator nodes, IoT has stepped
out of its infancy and is on the verge of transforming the current static Internet into a fully

Dept of ECE, SBIT


INTERNET OF
THINGS(IOT)
integrated Future Internet.

can be tracked through warehouses; and implanting RFID microchips in livestock and pets
allows positive identification of animals.

Since RFID tags can be attached to cash, clothing, and possessions, or implanted in animals
and people, the possibility of reading personally-linked information without consent has
raised serious privacy concerns. These concerns resulted in standard specifications
development addressing privacy and security issues. ISO/IEC 18000 and ISO/IEC 29167 use
on-chip cryptography methods for untraceability, tag and reader authentication, and over-the-
air privacy. ISO/IEC 20248 specifies a digital signature data structure for RFID and barcodes
providing data, source and read method authenticity. This work is done within ISO/IEC JTC
1/SC 31 Automatic identification and data capture techniques.

Sensors

Many IoT devices have sensors that can register changes in temperature, light, pressure,
sound and motion. They are your eyes and ears to what's going on the world. Before we talk
about what they do, let's describe them. These sensors are part of a device category called a
microelectromechanical system (MEMS) and are manufactured in much the same way
microprocessors are manufactured, through a lithography process. These sensors can be
paired with an application-specific integrated circuit or an ASIC. This is a circuit with a
limited degree of programming capability and is hardwired to do something specific. It can
also be paired with microprocessor and will likely be attached to a wireless radio for
communications.

For example, you are away on vacation and the house is empty. A moisture sensor detects
water on the basement floor. That sensor finding is processed by an app, which has received
another report from a temperature sensor that detects the flow of water in the main water
pipe. (When water flows, it takes away heat and lowers the temperature).

That both sensors are detecting anomalies is cause for concern. A high rate of flowing water
may signal a burst pipe, triggering an automated valve shutoff; a slight water flow might be a
running toilet, and the water on the basement floor by routine leakage from a heavy rain. In
either case, you get a machine- generated message describing the findings.
Dept of ECE, SBIT
INTERNET OF
THINGS(IOT)
IPv6

The original idea of the Auto-ID Center is based on RFID-tags and unique identification

Dept of ECE, SBIT


INTERNET OF
THINGS(IOT)

The objects themselves do not converse, but they may now be referred to by other agents,
such as powerful centralized servers acting for their human owners.

The next generation of Internet applications using Internet Protocol Version 6 (IPv6) would
be able to communicate with devices attached to virtually all human-made objects because of
the extremely large address space of the IPv6 protocol. This system would therefore be able
to scale to the large numbers of objects envisaged.

A combination of these ideas can be found in the current GS1/EPC global EPC Information
Services (EPCIS) specifications. This system is being used to identify objects in industries
ranging from aerospace to fast moving consumer products and transportation logistics.

CLOUD CENTRIC INTERNET OF THINGS

The vision of IoT can be seen from two perspectives— ‘Internet’ centric and ‘Thing’ centric.
The Internet centric architecture will involve internet services being the main focus while
data is contributed by the objects. In the object centric architecture, the smart objects take the
center stage.

In order to realize the full potential of cloud computing as well as ubiquitous sensing, a
combined framework with a cloud at the center seems to be most viable. This not only gives
the flexibility of dividing associated costs in the most logical manner but is also highly
scalable. Sensing service providers can join the network and offer their data using a storage
cloud; analytic tool developers can provide their software tools; artificial intelligence experts
can provide their data mining and machine learning tools useful in converting information to
knowledge and finally computer graphics designers can offer a variety of visualization tools.
Cloud computing can offer these services as Infrastructures, Platforms or Software where the
full potential of human creativity can be tapped using them as services.

The new IoT application specific framework should be able to provide support for:

(1) Reading data streams either from sensors directly or fetch the data from databases.

(2) Easy expression of data analysis logic as functions/operators that process data
streams in a transparent and scalable manner on Cloud infrastructures

Dept of ECE, SBIT


INTERNET OF
THINGS(IOT)
(3) If any events of interest are detected, outcomes should be passed to output streams,

CHAPTER-6
INTERNET OF THINGS IN 2015

Smartwatches

Smartwatches broke new ground last year, with the popularity of the devices like the pebble
and the Galaxy Gear. More mart watches making their way in the market with better and at
the feasible prices. With apple’s long-anticipated announcement of the Apple Watch, as the
company has been ramping up its sapphire glass production and flexible, wearable watch like
patents.

Industry Innovators: Pebble, Metawatch, Samsung Galaxy Gear

The Automated home

Popular devices like Google’s Nest Smart Thermostat and WeMo’s electrical outlet controller
gained in popularity last year. Since then, numerous home automation IoT technologies have
flourished- everything from smart locks to Wi-Fi enabled light bulbs.

Industry Innovators: Nest, Lockitron, Lifx

Fitness and Health Tracking

Last year, health and fitness devices like Nike Fuel band and Jawbone Up were among the
most popular IoT gadgets, making large appearance at CES.

Industry Innovators: Fitbit, Nike, Jawbone

Connected Retail

Traditional retailer store is struggling to keep up with the growing e-commerce. Thanks to the
Internet of Things, innovators have started to breathe new life into the retail experience-
offering connected point of sale systems, NFC payments solutions and supply chain
software’s.
Dept of ECE, SBIT
INTERNET OF
THINGS(IOT)
Industry Innovators: Shopkeep, Cisco, Placemeter

Virtual Augmented Reality

Last year Oculus Rift and Google glass made headline in both the virtual and augmented
Reality worlds. Oculus was acquired by Facebook for $2.3 Billion earlier this year and
Google glass recently rolled out a one-day sale of its “Explorer Edition”.

Industry Innovators: Oculus, Google Glass, Sony

APPLICATIONS

According to Gartner, Inc. (a technology research and advisory corporation), there will be
nearly 26 billion devices on the Internet of Things by 2020. ABI Research estimates that
more than 30 billion Monitoring and controlling operations of urban and rural infrastructures
like bridges, railway tracks, on- and offshore- wind-farms is a key application of the IoT. The
IoT infrastructure can be used for monitoring any events or changes in structural conditions
that can compromise safety and increase risk. It can also be used for scheduling repair and
maintenance activities in an efficient manner, by coordinating tasks between different service
providers and users of these facilities.] IoT devices can also be used to control critical
infrastructure like bridges to provide access to ships. Usage of IoT devices for monitoring and
operating infrastructure is likely to improve incident management and emergency response
coordination, and quality of service, up-times and reduce costs of operation in all
infrastructure related areas. Even areas such as waste management can benefit from
automation and optimization that could be brought in by the IoT. Monitoring and controlling
operations of urban and rural infrastructures like bridges, railway tracks, on- and offshore-
wind-farms is a key application of the IoT. The IoT infrastructure can be used for monitoring
any events or changes in structural conditions that can compromise safety and increase risk. It
can also be used for scheduling repair and maintenance activities in an efficient manner, by
coordinating tasks between different service providers and users of these facilities.] IoT
devices can also be used to control critical infrastructure like bridges to provide access to
ships. Usage of IoT devices for monitoring and operating infrastructure is likely to improve
incident management and emergency response coordination, and quality of service, up-times
and reduce costs of operation in all infrastructure related areas. Even areas such as waste
Dept of ECE, SBIT
INTERNET OF
THINGS(IOT)
management can benefit from automation and optimization that could be brought in by the
IoT.

devices will be wirelessly connected to the Internet of Things by 2020. As per a recent survey
and study done by Pew Research Internet Project, a large majority of the technology experts
and engaged Internet users who responded—83 percent—agreed with the notion that the
Internet/Cloud of Things, embedded and wearable computing (and the corresponding
dynamic systems) will have widespread and beneficial effects by 2025. As such, it is clear
that the IoT will consist of a very large number of devices being connected to the Internet. In
an active move to accommodate new and emerging technological innovation, the UK
Government, in their 2015 budget, allocated £40,000,000 towards research into the Internet
of Things. The British Chancellor of the Exchequer George Osborne, posited that the Internet
of Things is the next stage of the information revolution and referenced the inter-connectivity
of everything from urban transport to medical devices to household appliances.

Integration with the Internet implies that devices will use an IP address as a unique identifier.
However, due to the limited address space of IPv4 (which allows for 4.3 billion unique
addresses), objects in the IoT will have to use IPv6 to accommodate the extremely large
address space required. Objects in the IoT will not only be devices with sensory capabilities,
but also provide actuation capabilities (e.g., bulbs or locks controlled over the Internet). To a
large extent, the future of the Internet of Things will not be possible without the support of
IPv6; and consequently the global adoption of IPv6 in the coming years will be critical for the
successful development of the IoT in the future.

The ability to network embedded devices with limited CPU, memory and power resources
means that IoT finds applications in nearly every field. Such systems could be in charge of
collecting information in settings ranging from natural ecosystems to buildings and factories,
thereby finding applications in fields of environmental sensing and urban planning.

On the other hand, IoT systems could also be responsible for performing actions, not just
sensing things. Intelligent shopping systems, for example, could monitor specific users'
purchasing habits in a store by tracking their specific mobile phones. These users could then
be provided with special offers on their favorite products, or even location of items that they
need, which their fridge has automatically conveyed to the phone. Additional examples of
sensing and actuating are reflected in applications that deal with heat, electricity and energy
management, as well as cruise-assisting transportation systems. Other applications that the
Internet of Things can provide is enabling extended home security features and home

Dept of ECE, SBIT


INTERNET OF
THINGS(IOT)
automation. The concept of an "internet of living things" has been proposed to describe
networks of biological sensors that could use cloud-based analyses to allow users to study
DNA or other molecules. All these advances add to the numerous list of IoT applications.

Dept of ECE, SBIT


INTERNET OF
THINGS(IOT)

However, the application of the IoT is not only restricted to these areas. Other specialized use
cases of the IoT may also exist. An overview of some of the most prominent application areas
is provided here. Based on the application domain, IoT products can be classified broadly
into five different categories: smart wearable, smart home, smart city, smart environment, and
smart enterprise. The IoT products and solutions in each of these markets have different
characteristics.

Media

In order to hone the manner in which the Internet of Things (IoT), the Media and Big Data
are interconnected, it is first necessary to provide some context into the mechanism used for
media process. It has been suggested by Nick Couldry and Joseph Turow that Practitioners in
Media approach Big Data as many actionable points of information about millions of
individuals. The industry appears to be moving away from the traditional approach of using
specific media environments such as newspapers, magazines, or television shows and instead
tap into consumers with technologies that reach targeted people at optimal times in optimal
locations. The ultimate aim is of course to serve, or convey, a message or content that is
(statistically speaking) in line with the consumer's mindset. For example, publishing
environments are increasingly tailoring messages (advertisements) and content (articles) to
appeal to consumers that have been exclusively gleaned through various data-mining
activities.

The media industries process Big Data in a dual, interconnected manner:

 Targeting of consumers (for advertising by marketers)

 Data-capture

Thus, the internet of things creates an opportunity to measure, collect and analyze an ever-
increasing variety of behavioral statistics. Cross-correlation of this data could revolutionize
the targeted marketing of products and services. For example, as noted by Danny
Meadows-Klue, the combination of analytics for conversion tracking withbehavioural
targeting has unlocked a new level of precision that enables display advertising to be focused
on the devices of people with relevant interests. Big Data and the IoT work in conjunction.
From a media perspective, Data is the key derivative of device inter connectivity, whilst
being pivotal in allowing clearer accuracy in targeting. The Internet of Things therefore

Dept of ECE, SBIT


INTERNET OF
THINGS(IOT)
transforms the media industry, companies and even governments, opening up a new era of
economic growth and competitiveness. The wealth of data generated by this industry (i.e. Big
Data) will allow Practitioners in Advertising and Media to gain an elaborate layer on the
present targeting mechanisms used by the industry.

Environmental monitoring

Environmental monitoring applications of the IoT typically use sensors to assist in


environmental protection by monitoring air or water quality, atmospheric or soil conditions,
and can even include areas like monitoring the movements of wildlife and their habitats.[61]
Development ofA radical evolution of the current Internet into a Network of interconnected
objects that not only harvests information from the environment (sensing) and interacts with
the physical world (actuation/ command/control), but also uses existing Internet standards to
provide services for information transfer, analytics, applications, and communications. Fueled
by the prevalence of devices enabled by open wireless technology such as Bluetooth, radio
frequency identification (RFID), Wi-Fi, and telephonic data services as well as embedded
sensor and actuator nodes, IoT has stepped out of its infancy and is on the verge of
transforming the current static Internet into a fully integrated Future Internet. In order to hone
the manner in which the Internet of Things (IoT), the Media and Big Data are interconnected,
it is first necessary to provide some context into the mechanism used for media process. It has
been suggested by Nick Couldry and Joseph Turow that Practitioners in Media approach Big
Data as many actionable points of information about millions of individuals. The industry
appears to be moving away from the traditional approach of using specific media
environments such as newspapers, magazines, or television shows and instead tap into
consumers with technologies that reach targeted people at optimal times in optimal locations.
The ultimate aim is of course to serve, or convey, a message or content that is (statistically
speaking) in line with the consumer's mindset. For example, publishing environments are
increasingly tailoring messages (advertisements) and content (articles) to appeal to consumers
that have been exclusively gleaned through various data-mining activities.

Dept of ECE, SBIT


INTERNET OF
THINGS(IOT)

resource constrained devices connected to the Internet also means that other
applications like earthquake or tsunami early-warning systems can also be used by
emergency services to provide more effective aid. IoT devices in this application typically
span a large geographic area and can also be mobile.

Infrastructure management

Monitoring and controlling operations of urban and rural infrastructures like bridges, railway
tracks, on- and offshore- wind-farms is a key application of the IoT. The IoT infrastructure
can be used for monitoring any events or changes in structural conditions that can
compromise safety and increase risk. It can also be used for scheduling repair and
maintenance activities in an efficient manner, by coordinating tasks between different service
providers and users of these facilities.] IoT devices can also be used to control critical
infrastructure like bridges to provide access to ships. Usage of IoT devices for monitoring and
operating infrastructure is likely to improve incident management and emergency response
coordination, and quality of service, up-times and reduce costs of operation in all
infrastructure related areas. Even areas such as waste management can benefit from
automation and optimization that could be brought in by the IoT.

Manufacturing

Network control and management of manufacturing equipment, asset and situation


management, or manufacturing process control bring the IoT within the realm on industrial
applications and smart manufacturing as well. The IoT intelligent systems enable rapid
manufacturing of new products, dynamic response to product demands, and real-time
optimization of manufacturing production and supply chain networks, by networking
machinery, sensors and control systems together.

Digital control systems to automate process controls, operator tools and service information
systems to optimize plant safety and security are within the purview of the IoT. But it also
extends itself to asset management via predictive maintenance, statistical evaluation, and
measurements to maximize reliability. Smart industrial management systems can also be
integrated with the Smart Grid, thereby enabling real-time energy optimization.
Measurements, automated controls, plant optimization, health and safety management, and
other functions are provided by a large number of networked sensors.

Dept of ECE, SBIT


INTERNET OF
THINGS(IOT)
Energy management

Integration of sensing and actuation systems, connected to the Internet, is likely to optimize
energy consumption as a whole. It is expected that IoT devices will be integrated into all
forms of energy consuming devices (switches, power outlets, bulbs, televisions, etc.) and be
able to communicate with the utility supply company in order to effectively balance power
generation and energy usage. Such devices would also offer the opportunity for users to
remotely control their devices, or centrally manage them via a cloud based interface, and
enable advanced functions like scheduling (e.g., remotely) In order to hone the manner in
which the Internet of Things (IoT), the Media and Big Data are interconnected, it is first
necessary to provide some context into the mechanism used for media process. It has been
suggested by Nick Couldry and Joseph Turow that Practitioners in Media approach Big Data
as many actionable points of information about millions of individuals. The industry appears
to be moving away from the traditional approach of using specific media environments such
as newspapers, magazines, or television shows and instead tap into consumers with
technologies that reach targeted people at optimal times in optimal locations. The ultimate
aim is of course to serve, or convey, a message or content that is (statistically speaking) in
line with the consumer's mindset. For example, publishing environments are increasingly
tailoring messages (advertisements) and content (articles) to appeal to consumers that have
been exclusively gleaned through various data-mining activities. In order to hone the manner
in which the Internet of Things (IoT), the Media and Big Data are interconnected, it is first
necessary to provide some context into the mechanism used for media process. It has been
suggested by Nick Couldry and Joseph Turow that Practitioners in Media approach Big Data
as many actionable points of information about millions of individuals. The industry appears
to be moving away from the traditional approach of using specific media environments such
as newspapers, magazines, or television shows and instead tap into consumers with
technologies that reach targeted people at optimal times in optimal locations. The ultimate
aim is of course to serve, or convey, a message or content that is (statistically speaking) in
line with the consumer's mindset. For example, publishing environments are increasingly
tailoring messages (advertisements) and content (articles) to appeal to consumers that have
been exclusively gleaned through various data-mining activities.

Dept of ECE, SBIT


INTERNET OF THINGS(IOT)

powering on or off heating systems, controlling ovens, changing lighting conditions etc.). In fact, a
few systems that allow remote control of electric outlets are already available in the market, e.g.,
Belkin's WeMo, Ambery Remote Power Switch, Budderfly, Telkonet's EcoGuard, WhizNets Inc.,
etc.

Besides home based energy management, the IoT is especially relevant to the Smart Grid since it
provides systems to gather and act on energy and power-related information in an automated fashion
with the goal to improve the efficiency, reliability, economics, and sustainability of the production
and distribution of electricity. Using Advanced Metering Infrastructure (AMI) devices connected to
the Internet backbone, electric utilities can not only collect data from end-user connections, but also
manage other distribution automation devices like transformers and reclosers.

Medical and healthcare systems

IoT devices can be used to enable remote health monitoring and emergency notification systems.
These health monitoring devices can range from blood pressure and heart rate monitors to advanced
devices capable of monitoring specialized implants, such as pacemakers or advanced hearing aids.
Specialized sensors can also be equipped within living spaces to monitor the health and general well-
being of senior citizens, while also ensuring that proper treatment is being administered and assisting
people regain lost mobility via therapy as well. Other consumer devices to encourage healthy living,
such as, connected scales or wearable heart monitors, are also a possibility with the IoT. More and
more end-to-end health monitoring IoT platform are coming up for antenatal and chronic patients,
helping one manage health vitals and recurring medication requirements. Distinct advantages over
similar products from the US and Europe are cost-effectiveness and personalization for chronic
patients. Doctors can monitor the health of their patients on their smart phones after the patient gets
discharged from the hospital.

Building and home automation

IoT devices can be used to monitor and control the mechanical, electrical and electronic systems
used in various types of buildings (e.g., public and private, industrial, institutions, or residential).
Home automation systems, like other building automation systems, are typically used to control
lighting, heating, ventilation, air conditioning, appliances, communication systems, entertainment
and home security devices to improve convenience, comfort, energy efficiency, and security.

Transportation

Dept of ECE, SBIT


INTERNET OF THINGS(IOT)

CHAPTER-7
CONCLUSION

Just as with most things in life, there are benefits and threats against introducing the
Internet of Things to your company. What only you and your team can decide is if the
benefits outweigh the risks. When it comes to cyber-security, there are always risks
and we all know that it is not “if” someone can get in but “when” they get in. If you
decide to take the risk and invest in the IoT for your company, make sure that you not
only heed the threats listed above but also have a vulnerability management solution
to help you prioritize the threats before they get in and a solution that will monitor all
of your connected IoT devices to give you verified alerts when there is a threat to
your organization. But if you happen to be on a plane on a coast to coast trip with Wi-
Fi that won’t let you connect to VPN but you also really need to get that proposal
done before you land…. You could be in trouble. That is just one example but I’m
sure you can think of plenty more, especially if you have remote employees or
multiple locations. These devices are connecting to these unknown networks and then
coming back home to your safe, protected network with malware and other
vulnerabilities and you must be able to catch them. Again, here a threat detection
solution will monitor anything and every device that is connected to your network so
that you can be sure, anything that is connected will be monitored and you will be
alerted if there are any compromised devices immediately.

Dept of ECE, SBIT


INTERNET OF THINGS(IOT)

CHAPTER-8
REFERENCES

➢ https://www.google.com/search

➢ https://en.wikipedia.org/wiki/Internet_of_things

➢ Dr. Mazlan Abbas, MIMOS Berhad, Wisma IEM, Petaling Jaya,

➢ GE cloud expo 2014. "Industrial Internet as a Service", by Shyam Varan Nath,


Principal Architect.
➢ Cisco whitepaper, "The Internet of Things" - How the Next Evolution of the
Internet Is Changing Everything, by Dave Evans, April 2011.
➢ https://www.oracle.com

➢ https://studymafia.org

Dept of ECE, SBIT

You might also like