CIT882
CIT882
FACULTY OF SCIENCES
1
COURSE GUIDE
Introduction
CIT 882 Internets of Things is a Two [2] credit unit course of four modules with eleven
units. It is designed to train you for the use of the internet of things in the world of
Enterprise. The knowledge gained in this course would lead to proficiency in the usage
and application of IoT across different domains. As a computer scientist, savvy in
technology, it is advised that you study each unit carefully to ensure you gain the
desired skills and knowledge required in the implementation of the Internet of Things.
The course material is made up of four modules.
Module 1: This module provides a foundation for the course. In this module, we
described the concept of Things and the Internet. The definitions of IoT and the
essential Characteristics of IoT provided different applications with diagrammatic
representation and provided other details that will help you understand the remaining
parts of the course. Also covered in the module are the various design and development
considerations, security issues with using IoT, and the evolving extension of the
Internet of Everything.
Module 2: The building blocks of IoT are extensively discussed in this module. Four
things form the basic building blocks of the IoT system – sensors, processors,
gateways, applications. Each of these nodes has to have its characteristics to form a
useful IoT system.
Module 3: This module examined the security considerations and challenges in the
IoT Network Layer, Support Layer, and application layer. Also, the attack and
vulnerabilities with countermeasures of open-source solutions. The security
considerations and solution in the IoT Network Layer, Support Layer, and application
layer was also discussed. the attack and vulnerabilities with countermeasures of open-
source solutions are explained. IoT Use Case in Utility Companies especially the
Automatic Smart Metering and Autonomous Vehicle, the IoT Security in Utility
challenges and IoT security solutions and IoT security in Manufacturing industry were
described.
Module 4: The internet of everything (IoE) is a broad term that refers to devices and
consumer products connected to the internet and outfitted with expanded digital
2
features. It is a philosophy in which technology's future is comprised of many different
types of appliances, devices, and items connected to the global internet. The positive
impact of the IoT on citizens, businesses, and governments will be significant, ranging
from helping governments reduce healthcare costs and improving quality of life, to
reducing carbon footprints, increasing access to education in remote underserved
communities, and improving transportation safety.
This Course Guide gives you a brief overview of the course content and course
materials.
Course Competencies
In this course, you will be exposed to the introductory aspect of IoT and its application
across different industries, the use of Data Analytics with business and its efficiency,
and other applications such as remote monitoring, smart homes, IoT in Diary Farms
e.t.c.
Course Aims
This course aims to equip you with the explicit knowledge of the internet of things and
the devotion that brings about digital transformation in the IoT industry. By the end
of the course, you should be able to confidently work on IoT architecture and describe
the use cases as applicable to different domains
Course Objectives
At the end of this course, you should be able to:
o identify various application areas of IoT
o identify the vulnerabilities and attacks in IoT
o build a countermeasure against the vulnerability
o identify opportunities in IoT
Working Through this Course
To have a thorough understanding of the course units, you will need to read and
understand the contents of this course and explore the impact and application of the
Internet of Things in today’s world. A lot of Use cases example was given in this
course, to help understand the concept and the essential security measure to put in
place when discussing as well as implementing IoT
Study Units
There are 11 units in this course
3
Module 1: Introduction to Internet of Things (IoT)
Unit 1: Introduction to Internet of Things (IoT)
Unit 2: IoT Origin and Impact Contents
Unit 3: Overview of IoT-in Digital Transformation
4
Internet of Things (IoT) - Part 2 (Building Blocks & Architecture) (c-
sharpcorner.com)
Knowledge byte: Building Blocks of IoT Architecture | Cloud Credential
Council of Things: Design Primitives and Solution Data Management for the
Internet of Things: Design Primitives and Solution (nih.gov)
Abu-Elkiheir M, Hayajneh M, and Abu N (2013) Data Management for the Internet
of Things: Design Primitives and Solution Data Management for the Internet of
Things: Design Primitives and Solution (nih.gov)
Fuller J. R (2016), The 4 stages of an IoT architecture. How to design an IoT-ready
infrastructure: The 4-stage architecture (techbeacon.com)
Broadband Internet Technical Advisory Group. (2016). Internet of Things (IoT)
Security and Privacy Recommendations. Retrieved from BITAG website:
https://www.bitag.org/documents/BITAG_Report_-
_Internet_of_Things_(IoT)_Security_and_Privacy_Recommendations.pdf
6
Module 1: Introduction to Internet of Things (IoT)
Module Introduction
This module provides a foundation for the course. In this module, we described the
concept of Things and the Internet. The definitions of IoT and the essential
Characteristics of IoT provided different applications with diagrammatic
representation and provided other details that will help you understand the remaining
parts of the course. Also covered in the module are the various design and development
considerations, security issues with using IoT, and the evolving extension of the
Internet of Everything.
Contents
1.0 Introduction
2.0 Intended Learning Outcomes (ILOs)
3.0 Main Content
3.1 Overview of Internet of Things
3.2 Definitions
3.3 Characteristics of IoT
3.4 Applications of IoT
4.0 Self-Assessment Exercise(s)
5.0 Conclusion
6.0 Summary
7.0 Further Readings
1.0 Introduction
In this unit, we shall provide a foundation for this course on the Internet of Things
(IoT). To achieve this, some basic concepts of Things and the Internet are discussed.
The definitions of IoT and the essential Characteristics of IoT. Specifically, different
applications of IoT will be described and diagrammatic representation will be
presented to aid the understanding of the remaining part of this course.
7
2.0 Intended Learning Outcomes (ILOs)
At the end of this unit, you should be able to:
1. Explain the meaning of Things, with respect to the Internet of Things (IoT)
2. Describe the characteristics of IoT
3. Explain some desirable Applications of IoT
3.2 Definitions
The Internet of Things (IoT) is a reference to a collection of devices or objects that are
linked together using an Internet connection. The hub for the collection (the “things”
part) is what sends and collects data using the Internet, which helps the devices to
make decisions and remember particular patterns and routines for action to be carried
out without any manual involvement. IoT simply means the connection of multiple
devices to the internet.
ITU Definition:
“The IoT can be viewed as a global infrastructure for the information society, enabling
advanced services by interconnecting (physical and virtual) things based on existing
and evolving interoperable information and communication technologies (ICT).”
These devices can include multiple appliances that need to be connected for reasons
including automation and real-time control of the device. As the IoT has both real-
time and historical data stored, it can provide effective decision-making instructions
8
to devices, and control certain actions and aspects of when and how they function.
This technology enables your systems and devices to be automated cost-effectively.
This concept includes buildings, vehicles, production machinery, fridges, street lamps,
rehabilitation equipment, and everything else imaginable. The sensors are not in all
cases physically attached to the things, sensors may necessitate monitoring, for
instance, what happens in the closest environment to a thing.
The Internet of Things (IoT) is an emerging paradigm that enables the communication
between electronic devices and sensors through the internet to facilitate our lives. IoT
uses smart devices and the internet to provide innovative solutions to various
challenges and issues related to various business, governmental, and public/private
industries across the world. IoT is progressively becoming an important aspect of our
life that can be sensed everywhere around us. On whole, IoT is an innovation that puts
together an extensive variety of smart systems, frameworks, and intelligent devices
and sensors.
9
3.4 Applications of IoT:
A great transformation can be observed in our daily routine life along with the
increasing involvement of IoT devices and technology. For instance, the concept of
i. Smart Home Systems (SHS) and appliances that consist of internet-based
devices, automation systems for homes, and reliable energy management
systems.
ii. Smart Health Sensing system (SHSS). SHSS incorporates small intelligent
equipment and devices to support the health of human beings. These devices
can be used both indoors and outdoors to check and monitor the different
health issues and fitness levels or the amounts of calories burned in the
fitness center etc. Also, it is being used to monitor critical health conditions
in hospitals and trauma centers as well. Hence, it has changed the entire
scenario of the medical domain by facilitating it with high technology and
smart devices. Moreover, IoT developers and researchers are actively
involved to uplift the lifestyle of the disabled and senior age group people.
iii. Smart Transportation. IoT has brought up some new advancements to
make it more efficient, comfortable, and reliable. Intelligent sensors, drone
devices are now controlling the traffic at different signalized intersections
across major cities. In addition, vehicles are being launched in markets with
pre-installed sensing devices that can sense the upcoming heavy traffic
congestions on the map and may suggest you another route with low traffic
congestion.
iv. Smart Cities: Urban cities have now become enormous information
gathering centers with IoT sensors collecting data on infrastructure
management, home automation, building security, traffic management, and
city parking systems every day. All the gathered data is stored and analyzed
so that city officials can respond to problems in real-time. Eventually, the
data collected from various smart city components are massive. However,
the flood of data is a challenge that needs to be considered while planning
for a sustainable smart city as it can be very difficult as well as expensive to
manage this vast amount of data. To address this issue, smart city initiatives
can implement edge analytics, which collects the data and analyzes it.
v. Financial sector
Many banking institutions are implementing edge computing together with
smartphone apps to provide services to customers in a better manner. Also,
10
ATMs, banking apps, and kiosks work on similar principles – gathering and
processing data, making such utilities more responsive by providing users
with a broader suite of abilities. For high-volume trading and finance firms,
even a millisecond of delay in a trading algorithm computation can lead to
huge losses. The edge computing architecture is placed near the stock
exchange data servers to run resource-intensive algorithms which result in
reduced latency and localized data traffic. This provides such financial
institutes with more accurate as well as up-to-date information to keep their
business running. Apart from that, banks and other financial firms use edge
analytics to derive insights to understand their customers better and provide
a seamless user experience. Banks also use location-based suggestions and
customer recommendations to cross-sell products in near real-time.
11
Figure 1: IoT Applications
12
4.0 Self -Assessment Exercise(s)
Answer the following questions:
1. What do you understand by Things in respect to IoT?
2. Define IoT
3. List the characteristics of IoT
4. Explain the applications of IoT
5.0 Conclusion
The IoT can be viewed as a global infrastructure for the information society, enabling
advanced services by interconnecting (physical and virtual) things based on existing
and evolving interoperable information and communication technologies (ICT).
These devices can include multiple appliances that need to be connected for reasons
including automation and real-time control of the device. As the IoT has both real-
time and historical data stored, it can provide effective decision-making instructions
to devices, and control certain actions and aspects of when and how they function.
6.0 Summary
In this study, we have learned about the meaning of things in the context of IoT,
Characteristics of IoT, and Applications of IoT
13
Unit 2: IOT Origin and Impact Contents
1.0 Introduction
2.0 Intended Learning Outcomes (ILOs)
3.0 Main Content
3.1 IOT Origin and Impact
3.1.1 IoT Origin
3.1.1.1 Realizing the Concept
3.1.1.2 Connecting Devices in New Ways
3.1.1.3 Customer Privacy
3.1.1.4 Security
3.1.2 IoT Impacts
3.2 IoT Revolution in Industries
3.3 Use Case: Fleet Management Using IoT
3.4 Benefits of IoT in Fleet Management
3.5 Use Case: IoT for Financial Services
3.6 Benefits of IoT for Financial Services
3.7 IoT in Dairy Farming
3.7.1 Automatic Milking System (AMS)
3.7.2 Cow Monitoring
3.7.3 Feeding Automation
4.0 Self -Assessment Exercise(s)
5.0 Conclusion
6.0 Summary
7.0 Further Reading
1.0 Introduction
With the IoT rapid growth and technology advances, growth in IoT applications
deployment has been witnessed. Today’s IoT applications include; industrial control
and automation, sustainability, resources, waste management, and health and safety.
Also, IoT applications, challenges, and opportunities are equally discussed
The first telemetry system was rolled out in Chicago way back in 1912. It is said to
have used telephone lines to monitor data from power plants. Telemetry expanded to
weather monitoring in the 1930s, when a device known as a radiosonde became
widely used to monitor weather conditions from balloons. In 1957 the Soviet Union
launched Sputnik and with it the Space Race. This has been the entry of aerospace
telemetry that created the basis of our global satellite communications today. Broad
adoption of machine-to-machine (M2M) technology began in the 1980s with wired
connections for SCADA (supervisory control and data acquisition) on the factory floor
and in-home and business security systems.
In the 1990s, M2M began moving toward wireless technologies. ADEMCO built its
private radio network to address intrusion and smoke detection because budding
cellular connectivity was too expensive. In 1995, Siemens introduced the first cellular
module built for M2M. The Internet of Things (IoT) has not been around for very long.
However, there have been visions of machines communicating with one another since
the early 1800s. Machines have been providing direct communications since the
telegraph (the first landline) was developed in the 1830s and 1840s. Described as
“wireless telegraphy,” the first radio voice transmission took place on June 3, 1900,
providing another necessary component for developing the Internet of Things. The
development of computers began in the 1950s.
The Internet, itself is a significant component of the IoT, started as part of DARPA
(Defense Advanced Research Projects Agency) in 1962, and evolved into ARPANET
in 1969. In the 1980s, commercial service providers began supporting public use of
ARPANET, allowing it to evolve into our modern Internet. Global Positioning
Satellites (GPS) became a reality in early 1993, with the Department of Defense
providing a stable, highly functional system of 24 satellites. This was quickly followed
by privately owned, commercial satellites being placed in orbit. Satellites and
landlines provide basic communications for much of the IoT.
One additional and important component in developing a functional IoT was IPV6’s
remarkably intelligent decision to increase address space. Steve Leibson, of the
Computer History Museum, states, “The address space expansion means that we could
assign an IPV6 address to every atom on the surface of the earth, and still have enough
15
addresses left to do another 100+ piles of earth.” Put another way, we are not going to
run out of internet addresses anytime soon.
The Internet of Things, as a concept, wasn’t officially named until 1999. One of the
first examples of an Internet of Things is from the early 1980s and was a Coca-Cola
machine, located at the Carnegie Melon University. Local programmers would
connect by the Internet to the refrigerated appliance, and check to see if there was a
drink available and if it was cold, before making the trip.
By the year 2013, the Internet of Things had evolved into a system using multiple
technologies, ranging from the Internet to wireless communication and from micro-
electromechanical systems (MEMS) to embedded systems. The traditional fields of
automation (including the automation of buildings and homes), wireless sensor
networks, GPS, control systems, and others, all support the IoT.
Simply stated, the Internet of Things consists of any device with an on/off switch
connected to the Internet. This includes almost anything you can think of, ranging from
cellphones to building maintenance to the jet engine of an airplane. Medical devices,
such as a heart monitor implant or a biochip transponder in a farm animal, can transfer
data over a network and are members of the IoT. If it has an off/on the switch, then it
can theoretically be part of the system. The IoT consists of a gigantic network of
internet-connected “things” and devices. Ring, a doorbell that links to a smartphone,
provides an excellent example of a recent addition to the Internet of Things. Ring
signals when the doorbell is pressed and lets the user see who it is and to speak with
them.
Kevin Ashton, the Executive Director of Auto-ID Labs at MIT, was the first to
describe the Internet of Things while making a presentation for Procter & Gamble.
During his 1999 speech, Mr. Ashton stated:
“Today computers, and, therefore, the Internet, is almost wholly dependent on human
beings for information. Nearly all of the roughly 50 petabytes (a petabyte is 1,024
terabytes) of data available on the Internet were first captured and created by human
beings by typing, pressing a record button, taking a digital picture, or scanning a bar
code. The problem is, people have limited time, attention, and accuracy. All of which
means they are not very good at capturing data about things in the real world. If we
had computers that knew everything there was to know about things, using data they
gathered without any help from us, we would be able to track and count everything
16
and greatly reduce waste, loss, and cost. We would know when things needed
replacing, repairing or recalling and whether they were fresh or past their best.”
Kevin Ashton believed Radio Frequency Identification (RFID) was a prerequisite for
the Internet of Things. He concluded if all devices were “tagged,” computers could
manage, track, and inventory them. To some extent, the tagging of things has been
achieved through technologies such as digital watermarking, barcodes, and QR codes.
Inventory control is one of the more obvious advantages of the Internet of Things.
When thinking of the IoT, consider the idea, “any device capable, can be
interconnected with other devices.” The IoT is ripe for new and creative ideas to add
to the tasks already in use. Imagine an alarm waking you at 6 AM, and then
simultaneously signaling your coffee maker to turn on and start brewing coffee.
Imagine your printer knowing when you are running low on paper, and automatically
ordering more. Imagine the watch on your wrist telling you “where” you have been
the most productive, while at work. The IoT can be used to organize such things as
transportation networks. “Smart cities” can use it to reduce waste and maximize the
efficient use of energy.
In truth, the IoT provides a nearly endless supply of opportunities to interconnect our
devices and equipment. In terms of creativity, this field is wide open, with an infinite
number of ways to “interconnect the devices.” It can be an exciting time for innovative
individuals, in part, because we don’t fully understand the impact of these
interconnections. The IoT offers both opportunities and potential security problems.
At present, the Internet of Things is best viewed with an open mind, for purposes of
creativity, and a defensive posture for purposes of privacy and security.
17
Currently, choices regarding privacy are very black and white, or on/off. The customer
is forced to give up all privacy, (often in an agreement so convoluted people don’t
bother to plow through it) or the customer simply cannot access the service. This has
led to continuing discussions about consumer privacy and how to best educate
consumers regarding privacy and the accessibility of data.
3.1.1.4 Security
While there are steps to take to help ensure security, it should come as no surprise this
issue has become a significant concern with the growth of the IoT. Literally, billions
of devices are being interconnected together, making it possible (eventually) for
someone to hack into your coffee maker, and then access your entire network. The
Internet of Things also makes businesses all around the world more open to security
threats. Additionally, data sharing and privacy become issues when using the Internet
of Things. Consider how concerns will grow when billions of devices are
interconnected. Some businesses will be faced with storing the massive amounts of
information these devices will be producing. They will need to find a method of
securely storing the data, while still being able to access, track, and analyze the huge
amounts of it being generated.
James Lewis, who is a cybersecurity researcher for the Center for Strategic and
International Studies, wrote a report describing how the Internet of Things’
interconnections will allow computer hackers to wreak havoc through interconnected
devices. The threat is so real, even the Federal Trade Commission has gotten involved,
wanting to know how to guarantee privacy, and how security safeguards are being
installed in new Internet-connected devices. For example, new cars can now be
hijacked by way of their Wi-Fi connections. Consider the threat of hackers when
automated driving becomes popular. Security and risk management should not be
taken lightly when creating new ways to use the Internet of Things.
18
Engineering, Research & Development (ER&D): Availability of real-time data
from devices to get full product transparency. It enhances streamlining of the
introduction of new products or upgrade of existing ones, in response to changing
consumer needs and market scenarios
Various technological, economic, and behavioral factors are driving the uptake of IoT
globally
• Low-cost sensors, declining cost of connectivity as well as reduced cost and time of
processing will play a key role in the rise and adoption of IoT
• Use of big data analytics and cloud computing will enable processing and analysis
of unstructured data to move from insights to foresight
• Consumer interest in IoT technologies is also rising due to increased reliance on
mobile devices
The vast majority of technology enthusiasts are also interested in connecting devices
to each other so that they exchange relevant information. For example, a connected
car could detect that its owner and their family are traveling, and automatically turn
off the home heating system. In the KRC Research, 89% of respondents said they are
interested “in having all their household devices communicate constantly and
seamlessly with one another to form a completely connected home or lifestyle.” There
is a clear need to establish standards and interoperability between different connected
products or services. As such the GSMA Connected Living programme is facilitating
interoperability between solutions from different vendors and service providers,
enabling industry collaboration, encouraging appropriate regulation, and helping
mobile operators to optimise their networks. The programme is also developing key
enablers, such as the GSMA Embedded SIM Specification, which enables the remote
provisioning of secure connectivity.
IoT (Internet of Things) trends are connecting all business levels and promising
transformation. Companies are embracing various technologies and platforms to
implement IoT networks such as LTE-M, NB-IoT, LoRaWAN, Sigfox, Zigbee, etc.
Generally, IoT networks consist of many controlled intelligent devices, typically
deployed to improve the efficiency of the engineering process, enable automation and
reduce the wastage of resources. IoT networks are considered suitable candidates for
all field operations ranging from exploration to production and refining. This is due to
the IoT-enabled qualities, regularly decreased fabrication cost and device size, and low
deployment expense. Statistical figures show rapid growth in the number of IoT
devices and forecast (within a few years) their numbers to increase to the tune of
billions.
IoT applications will help optimize, innovate and transform consumer products as well
as business processes
Optimization: IoT helps reduce costs by efficient product usage while increasing
efficient use of assets across business processes.
Innovation: IoT applications help create differentiated products/ services and
improved operations, eventually leading to better customer service.
Transformation: IoT is blurring industry boundaries by enabling disruptive business
models. For example, telematics involves both the automotive and insurance
industries. IoT is expected to add value to business processes and take value creation
for industrial applications to the next level, specifically in the case of Manufacturing.
IoT is perhaps the most crucial element of Industry 4.0, which refers to the digital
transformation of the processes and systems in the manufacturing sector.
• Various connected technologies such as high-quality sensors, more reliable and
powerful networks, high-performance computing, robotics, artificial intelligence, and
cognitive technologies, and augmented reality are changing Manufacturing in
20
profound ways. IoT market growth will be driven primarily by connected units in the
Manufacturing and Automotive industries, with Transportation & Logistics forming
the largest share of industry-specific IoT revenue. Among industries, Manufacturing
and Automotive are expected to drive the highest volumes in IoT adoption.
India is a rapidly growing hub for IoT solutions with a market value expected to
be $9 billion, and an installed unit base of 1.9 billion by 2020
• Although India began its IoT journey much later than developed economies, the
installed base of connected units is expected to grow at a rate much faster than theirs.
IoT units in India are expected to see a rapid growth of ~32X to reach 1.9 billion units
by 2020, from its current base of 60 million. As a result, the India IoT market is
expected to grow ~7X to move from $1.3 billion in 2016 to $9 billion by 2020.
• Rise of the tech-savvy consumer along with increasing smartphone and mobile
internet penetration is driving consumer IoT applications in the Indian market.
However, consumer IoT adoption is expected to be slower than its industrial
counterpart due to the cost of IoT devices and security as well as privacy concerns of
consumers.
21
Figure 2: IoT applications in (a) mining (b) oil and gas environment.
On the customer front, there’s a growing trend for consumers—and also business
customers— to want direct links to the companies that manufacture the products and
services they use, cutting out the traditional ‘middlemen’. This profound behavioural
shift is evident across a host of industries, from energy to telecoms, and from
mainstream media to technology. It’s one of the key drivers of manufacturers’
industry-wide move into services—a change that increasingly involves progressing
from product-based to service-based offerings by building platforms, thus
simultaneously expanding revenues and building ‘stickiness’ (see Figure 1).
Meanwhile, on the operational front, the fact is that Internet connectivity—for an
HVAC system or any other piece of equipment, whether a brake pad or a turbine
engine—means much more than just linking it digitally to your business’ systems. It
also represents a way of getting closer to end-users than ever before, creating a degree
of direct customer engagement and interaction that most manufacturing companies
have never experienced.
22
Figure 3 Companies moving from product-based offerings to service-based
offerings by building platforms, expanding revenues, and building stickiness (Source:
PwC, 2016)
23
3.4 Benefits of IoT in Fleet Management
Easier and Efficient Operations: Although logistics companies have had
connectivity options like mobile phones, GPS sensors, etc, IoT offers many new tools,
like in-vehicle streaming cameras, driver mobile apps, etc. making communication
easier and prompt. Scheduling, load management, driver and vehicle tracking, and
effective routing are some additional benefits offered by the Internet of Things.
Besides these GPS and RFID-based tools, IoT also covers advanced applications such
as weather APIs, traffic reporting, smart parking, maintenance monitoring, driving
behavior monitoring, etc.
Automated Processes: Another major benefit of IoT in fleet management is the ability
to automate various processes. As devices are interconnected and work as part of an
integrated process, companies can set up an automatic flow of daily logistics processes
and trip planning. Internet of Things also allows logistic companies to move daily
operations into the cloud and helps remote tracking of fleets at any time from any
place. Process automation through IoT is not restricted to the scheduled system. It also
helps automate scenarios like broken-down vehicles that send automatic tickets to tow
trucks; driver receives weather warning notifications, automatic rerouting, etc.
Better Analytics: The Internet of Things can derive collectivity data from various
sensors. This enables fleet management companies to get useful insights into driver
behavior, adherence to laws, vehicle speeding and idling, etc. These sensors don’t
just help in tracking data; they also play an important role in improving performance
and diagnostics of problems related to processes and equipment.
24
3.5 Use Case: IoT for Financial Services
The emergence of the Internet of Things (IoT) has created quite a buzz in the business
world. The Internet of Things can be best defined as the interconnectivity of computer
devices in everyday objects via the internet. It is estimated that by 2025, there will be
64 billion IoT devices worldwide. This figure is a big leap from the 10 billion devices
in 2018. Further, according to McKinsey, 127 new devices globally are connected to
the internet each second.
25
individual’s heartbeat for biometric authentication. This tech was tested and proved to
be secure in making wireless payments.
Increased business efficiency through automation: IoT applications enable
companies to boost efficiency using process automation. IoT use cases in financial
services will help to improve customer service and streamline daily functions. For
example, Citibank adopted beacons that allow customers to use their smartphones to
unlock doors at ATMs during off hours rather than using key cards.
Self-checkout services: IoT Fintech startups can use smart devices to offer wireless
self-checkout services on various domains. Already, Amazon is implementing such a
concept across its self-checkout stores.
Automation enables dairy farmers to control and manage larger herds, saving time and
providing information. This latter aspect is a key factor in managing dairy farms
through a -proactive perspective rather than a -reactive one, however depending on the
skills of each farmer. Indeed, automation and technology themselves do not solve a
problem but rather suggest where the problem is. Only within this perspective,
automation can leads to benefits as improved profitability, animal health, lifestyle, and
26
milk quality. Usually, on a dairy farm, automation concerns three main areas: (i)
automation of milking-related tasks; (ii) cow monitoring; (iii) feeding automation.
i. The data profiles enable the farmer to supervise and monitor the effectiveness
of employees.
ii. Dairy production statics support research and quality control and are accessible
in both provincial and national databases that are both current and
comprehensive.
iii. Workers who operate the milking equipment and oversee the milking process
are responsible for the cleaning and stimulation of the udders as preparation for
milking. Changes to the readings over time identify potential health risks to the
cow such as the presence of udder infections. Analysis of the data supports staff
in addressing health risks that potentially threaten the cow’s productivity. In
some cases, training needs that support staff performance can be identified and
managed easily so that the health of the cow is not compromised.
iv. Innovations in smart technology greatly support the quality assurance of milk
production and staff effectiveness because decisions are implemented through
the interpretation of data based upon input from each cow.
28
5.0 Conclusion
The technology services industry across IT Services, Business Process Management
(BPM), and Engineering, Research & Development (ER&D) will witness increased
opportunities related to IoT solutions. IoT applications will help optimize, innovate
and transform consumer products as well as business processes
6.0 Summary
We have been able to overview the constant transformation that changes the
trajectory history of humanity with the introduction of the internet of things.
Opportunities of IoT in industry 4.0 was discussed and Use Cases such as IoT for
Financial Services and Its Benefits examined, also the application of IoT in Dairy
Farming and its benefits were explicitly discussed
30
Unit 3: Overview of IoT-in Digital Transformation
1.0 Introduction
2.0 Intended Learning Outcomes (ILOs)
3.0 Main Content
3.1 Evolution of IoT
3.2 Transforming Digital World
3.3 Differences Between M2m and IoT
3.4 Use Case: IoT in Autonomous Vehicles
3.4.1 Five Use Cases
4.0 Self -Assessment Exercise(s)
5.0 Conclusion
6.0 Summary
7.0 Further Reading
1.0 Introduction
IoT in digital transformation, many factors are enhancing the utility of IoT and driving
its growth. Data has become extremely valuable to companies and AI has made this
possible by making data actionable.
The term IoT began to be used in mainstream publications like The Guardian and
Scientific American by 2003-2004. In the same period, RFID was deployed by the US
Department of Defence and by Walmart in its stores. The United Nations International
Telecommunications Union acknowledged the impact of IoT in its report in 2005. It
is predicted that IoT will help create an entirely new dynamic network of networks.
In March 2008, the first IoT conference was held in Zurich. It brought together
researchers and practitioners from both academia and industry to facilitate sharing of
knowledge. In the same year, the US National Intelligence Council included the
internet of things as one of the six disruptive civil technologies. In its 2011 white
paper, Cisco Internet Business Solutions Group (CIBSG) said that the internet of
things can truly be said to be born between 2008 and 2009 when the number of things
connected to the internet exceeded the number of people connected to it.
CIBSG calculated that the things to people ratio grew from approximately 0.8 in 2003
to 1.84 in 2010. Together with the white paper, Cisco released many educational
materials on the topic and started marketing initiatives to attract clients looking to
adopt IoT. IBM and Ericsson joined the race soon after. In 2011 Gartner included IoT
in its Hype Cycle for emerging technologies that were on the rise. In 2013 IDC
released a report that predicted the IoT market to grow at a CAGR of 7.9% and
reach USD 8.9 trillion by 2020.\
With the addition of sensing and data transmitting devices to networks of connectivity
and value comes an avalanche of data on top of our big data universe. With the growth
of the Internet of Things, we already have more data in specific industries and
applications (e.g. life sciences) than we can humanly handle. While devices and
connectivity are of course all important, whether it’s in the Industrial Internet of
Things or the Consumer Internet of Things where the device has an additional
dimension, in the end, the Internet of Things is an umbrella term. It covers many
things, and at the same time is part of a bigger ecosystem of technologies and value.
Data, why we capture it using IoT, and how we turn it into knowledge (DIKW),
matters a lot, especially as the Data Age study shows IoT data volumes grow fastest.
It’s how we analyze and use this data to enhance what we do across all areas of society
that makes the Internet of Things so powerful and truly the Internet of Transformation.
It’s the way we combine data and intelligence to power innovative and
transformational smart services with data exchange models and business model
innovation. Big data analysis, the cloud and other related technologies to enable this
move from data to knowledge to outcome are all key digital transformation
technologies. While concerns in several areas are tackled and increasingly will,
companies across the globe are investing in the Internet of Things and have already
achieved considerable benefits. Others move slower, while consumer adoption of the
Internet of Things also picks up. Even though connecting devices is not new and that
with the Internet of Things we have entered a new dimension in many areas, we are
still at the beginning of an era of accelerating Internet of Things adoption. And it will
be a key pillar in the digital transformation economy.
All components and layers of an Internet of Things project or solution are important.
Today most people focus on the devices, the connections, and the volumes. Enter what
we could call the Internet of Things 2.0 and where we see all digital transformation
technologies meet each other, depending on the use case, scope, etc. on the road to
an Internet of Transformation. The Internet of Things is such a vast reality that
it has become an umbrella term for many underlying use cases, technologies, and
other aspects. It’s why we started to distinguish between the Consumer Internet of
Things and the Industrial Internet of Things. It’s also why some prefer terms such as
34
the Internet of Everything, and in an industrial context, simply the Industrial Internet.
Regardless of how we call it, the Internet of Things 2.0 reality is about an Internet of
Transformation that is put in the context of related technologies, processes, people,
benefits, outcomes, and massive real-life opportunities, rather than just the technology
and device aspect. It’s about how we move to a hyper-connected world with goals in
mind and roadmaps to achieve these goals clearly defined. And in that roadmap will
be several digital transformation technologies. The hyper-connected world: leveraging
connected knowledge at scale for optimization, innovation, and human purpose.
Internet of Things 2.0 in the end leads to an even more hyper-connected world where
eventually the term Internet of Things will disappear or be used like we use the term
Internet today: as a given, a new normal, a bit like electricity. That’s when it will be
the Internet of Transformation although no one will call it like that.
Internet of Things 2.0 moves from devices and data to actionable intelligence and
purposeful action and transformation. The focus will be on the possibilities of hyper-
connectivity, less from the connectedness perspective as such but more about how we
can improve business, life, and society, using the insights gained, thanks to the hyper-
connectedness of which the Internet of Things is a crucial additional component. IoT
is not just transforming technologies, industries, and the various digital transformation
goals, it is also radically transforming and – yes – disrupting existing channels in IT
and IOT with far-reaching consequences in traditional go-to-market approaches. It is
also transforming the nature of work, changing the role or even the existence of the
middleman, the list is endless.
In order to connect the dots and realize the benefits of this hyper-connected world, it’s
important to see the Internet of Things puzzle, the various pieces of that puzzle, why
we want to complete it to start with, and what is needed to put the puzzle in a safe,
valuable and broader perspective. Usually, this requires a high-level understanding, an
understanding of how the Internet of Things fits in the scope of digital transformation
35
and various related digital transformation technologies, insights regarding the Internet
of Things beyond the “number of connected devices level” and a holistic view of
people, purpose, process, and actionable information.
The Internet of Things is about to change entire industries (look at what’s happening
with Industry 4.0) and already transforms organizations in the true sense of the word
and on all levels, ranging from customer experience to the transformation of business
models and real innovation is becoming the state-of-the-art.
Focus Area For monitoring and control of 1 or To address the everyday needs of
few infrastructure/assets. humans.
Sharing of Data collected is not shared with Data is shared with other applications
collected data other applications (like weather forecasts, social media,
etc.) to improve end-user experience
38
PARAMETERS M2M IoT
Example Remote monitoring, fleet control Smart Cities, smart agriculture, etc.
Related terms Sensors, Data and Information End users, devices, wearables, Cloud
and Big Data
Finding out where a vehicle is, taking numerous phone calls to provide location
updates to customers, or figuring out which driver is closest to an urgent job is
consuming a lot of valuable time that can be spent on processing new orders, invoicing,
improving logistics, and delivering better service to your client base.
With real-time GPS location, businesses can provide customers with the exact times
of arrival or instantly update the route for a customer emergency. Using fleet tracking
software also helps reduce wait times at destinations and monitor driver behaviour on
the road to ensure safety and compliance, as well as minimize the risk of crashes and
liability. IoT telematics can collect data on vehicle diagnostics, such as speed, idling
time, harsh acceleration or braking, fuel consumption, vehicle faults, tire pressure, and
more.
39
In case of a crash, the hardware, connected to the vehicle’s engine module, will send
an alert to the head office indicating a collision, so you can dispatch help to your driver
without delay. You can also incorporate a better maintenance and vehicle health
program for your fleet with better scheduling and routine checkups that will help avoid
downtime and breakdown costs on the roadside.
This way, using IoT-enabled fleet management solutions can boost performance
through better asset visibility and vehicle utilization, reduced wait times at
destinations, and proactive maintenance for cost savings. For autonomous vehicle
technology to properly function, it must work in conjunction with other areas. The five
most relevant are listed below.
3.4.1 Five Use Cases
5G
An autonomous vehicle is expected to generate 2 Petabytes (2 million GB) of data
every year. It would take the best Wi-Fi available months to be able to transfer that
amount of information. The nearly real-time speeds of 5G are 10 times faster than 4G.
With its infrastructure and dense network, 5G makes the future of autonomous vehicles
possible.
Latency
Decreased latency, another characteristic of 5G, can also benefit autonomous vehicles.
4G currently has a latency of 50 milliseconds, which can be seen as a large delay when
it comes to passenger safety.
Smart Cities and the Internet of Things (IoT)
For an autonomous vehicle to make smart decisions, it requires information about its
environment. Smart cities, which are IoT-ready, allow for that. A city that can report
on traffic, signals, etc., can help a self-driving car move smarter and more easily
navigate its way around town.
Data Management
Analyzing the amount of data a self-driving car produces takes time. With the potential
of nearly 10 million cars hitting the road, edge computing can help streamline this
analysis by examining it closer to the source.
V2X
Vehicle-to-everything (V2X) allows the information from autonomous vehicle sensors
and other sources to travel through high-bandwidth, high-reliability, and low-latency
channels. It creates an ecosystem that enables cars to communicate both with each
other and with infrastructures including parking lots and traffic lights.
Not only can this improve vehicle safety, but it also gives drivers or passengers
information about road conditions ahead, so that they can appropriately respond. When
combined with Artificial Intelligence (AI), a self-driving car will be able to make that
decision itself.
40
Roadblocks
A study from NAMIC found that 42% of surveyed consumers said that no matter how
long the technology was available, they would refuse to ride in fully automated
vehicles. Similarly, 46% of respondents were skeptical about using fully automated
vehicles for ride-sharing services. To gain public trust, the right infrastructure needs
to be in place.
Data management challenges, safety concerns, and high manufacturing costs
are roadblocks that can prevent widespread autonomous vehicle adoption. However,
as large manufacturers and automotive organizations continue to enhance and improve
the technology, the potential for an autonomous future continues to grow.
5.0 Conclusion
IoT technologies offer immense value and support the enhancement of a business
model in operational fields. Research has shown that mining and gas companies, Diary
Farm, Vehicle Automation, and Fleet Managements that have made IoT investments
are reporting positive results. IoT technologies are used to enable automation,
streamline engineering processes, reduce downtime and provide transparency at every
layer of the operation. IoT data enables solution architects to upgrade designs and
prevent historical irregularities. In addition to the design and implantation challenges
of IoT networks, the overwhelming IoT market increases the difficulty of making a
strategic business decision.
6.0 Summary
In this unit, we have considered the evolution of IoT, the Digital World Transformation
with respect to industry 4.0 and we have been able to discuss the difference between
M2M and IoT. Also, use cases of Autonomous Vehicles were explained.
41
7.0 Further Reading
Overview of IoT-in Digital Transformation - Bing
Alavi A., Jiao P., Buttlar W., and Lajnef N., (2018), “Internet of Things-enabled smart
cities: State-of-the-art and future trends,” Measurement, vol. 129, pp. 589-606
Paraszczak J., (2014), “Maximization of productivity of autonomous equipment in
underground mines,”, Mining Engineering, vol. 66, no. 6, pp. 24- 34,40-41
Oraibi I., Otero C. E., and Olasupo T. O., (2017), “Empirical path loss model for
vehicle-to-vehicle IoT device communication in fleet management,” Mediterranean
Ad Hoc Networking Workshop, pp. 1-4
Leonardi S. (2014), Internet of Things (IoT) and Dairy Farm Automation Università
Degli Studi Di Milano Graduate School of Veterinary Sciences for Animal Health
and Food Safety
Microsoft Word - IoT_IBSG_0411FINAL.doc (cisco.com)
Evolution of Internet of Things (IoT): Past, present, and future (techaheadcorp.com)
Penna M., Shivashankar, Arjun B., Goutham K., Madhaw L., and Sanjay K., (2017),
“Smart fleet monitoring system using Internet of Things (IoT),” IEEE International
Conference on Recent Trends in Electronics, Information & Communication
Technology, pp. 1232-1236
White-Paper-IoT-revolution-in-oil-gas-and-mining-industries.pdf (titanict.com.au)
Deloitte Touche Tohmatsu India LLP. Member of Deloitte Touche Tohmatsu Limited,
2017.
Vate-U-Lan, P., Quigley, & Masouras, P. (2016). Smart dairy farming through the
Internet of Things (IoT). Asian International Journal of Social Sciences, 17(3), 23 –
36. Retrieved from http://aijss.org/index.php/aijss20170302/
Yeong Y.W., IoT: The 4th Industrial Revolution. Analytics Innovation Forum 2017.
Filler slides (sas.com)
IEEE Innovation at work (2021) Use Cases for Autonomous Vehicle Technology
https://innovationatwork.ieee.org/use-cases-for-autonomous-vehicle-technology/
Pareteum (2021), How Can IoT and M2M Connectivity Improve Your Business?
https://www.pareteum.com/IoT-use-cases/
i-scoop (2021), Digital transformation technologies: the Internet of Transformation
42
https://www.i-scoop.eu/digital-transformation/digital-transformation-technologies-
IoT/
Krasniqi X., and Hajrizi E. (2016) Use of IoT Technology to Drive the Automotive
Industry from Connected to Full. IFAC-PapersOnLine 49-29 (2016) 269–274
Okano M. T., (2017), IoT and Industry 4.0: The Industrial New Revolution.
International Conference on Management and Information Systems September 25-26
Foote K. D., (2016), A Brief History of the Internet of Things. A Brief History of the
Internet of Things - DATAVERSITY
What are the Differences Between M2M and the IoT (2019)
https://www.electronicsforu.com/technology-trends/learn-electronics/difference-
between-m2m-and-IoT?
Ipwithease (2021), IoT vs M2M – Difference between M2M and IoT Explained
https://ipwithease.com/internet-of-things-vs-machine-to-machine-IoT-vs-m2m/
43
Module 2: Building Blocks of IoT
Module Introduction
The building blocks of IoT are extensively discussed in this module. Four things from
the basic building blocks of the IoT system –sensors, processors, gateways,
applications. Each of these nodes has to have its characteristics to form a useful IoT
system.
1.0 Introduction
Things are the concentrated areas where information is sensed with the sensor
elements or the actuators. Gateways block is used for connectivity purposes and it is
an intermediate block between things and network or cloud infrastructure. Network
infrastructure (NI) block helps in providing control over the information provided and
allows secure and smooth flow.
i. Things: allows to communicate and collect the information from the objects of
focused areas without any human interaction through the IoT devices such as
Sensors and Actuators.
ii. Gateways: act as an intermediate block and enables strong connectivity between
things and cloud infrastructure. It also provides security and manageability
abilities during the data flow.
iii. Network Infrastructure (NI): It allows control over the data flow from things to
the cloud infrastructure. It also enables security during the information flow.
The IoT devices used include Routers, Aggregators, Gateways, and Repeaters.
iv. Cloud infrastructure (CI): It allows analytical, logical, and advanced computing
abilities. The IoT devices used include Virtualized Servers (VS) and Data
Storage Units (DSU)
Things with Networked Sensors and Actuators where they sense the detailed
information as per the user requirements. The information sensed can be with respect
45
to the time duration set by the user. The information is then stored in the second
component of IoT i.e. Raw Information and Processed Data Storage allowing an
interaction between the TNSA and RI-PD-S. The interaction is enabled by sending
the report states and the information is stored in various formats such as data, text,
videos, and images, etc. The third component of IoT is the Analytical and Computing
Engines (ACE) where the stored information is analyzed logically with appropriate
decisions using numerous models thereby allowing an interaction between the RI-PD-
S unit and ACE. This logical analysis is done with multiple iterative procedures until
the best results are achieved as required by the user. In this third component human-
machine, interactive learning is possible along with cloud and server-based analytics.
Based on the human-machine interactive learning, the feedback and control commands
or requests were given to the Things with Networked Sensors and Actuators
component thereby allowing interaction between TNSA and ACE.
46
4.0 Self -Assessment Exercise(s)
Answer the following question:
1. Describe the four building blocks of IoT
2. Explain the three components of IoT in connectivity Blocks and
Communication Protocols
5.0 Conclusion
The IoT architecture comprises four basic building blocks: sensors, processors,
gateways, and applications. Sensors are responsible for converting a non-electrical
input to an electrical signal; processors “handle” the signals; gateways are used to
connect a network to another, and, ultimately, an application offers a user interface
and effective utilization of the data collected
6.0 Summary
The IoT building blocks include the Things, Gateways, Network Infrastructure (NI),
and Cloud Infrastructure (CI) was described. The gateways block used for the
connectivity purpose and it is an intermediate block between the things and network
or cloud infrastructure was shown in the diagram given in Figure 7.
47
Knowledge byte: Building Blocks of IoT Architecture | Cloud Credential
Council
48
Unit 2 - IoT Device Architecture
1.0 Introduction
2.0 Intended Learning Outcomes (ILOs)
3.0 Main Content
3.1 IoT Device Architecture
3.2 IoT Reference Architecture
3.3 IoT Standardization and Design Considerations
3.4 IoT Device Architecture: Network and Cloud
4.0 Self -Assessment Exercise(s)
5.0 Conclusion
6.0 Summary
7.0 Further Reading
1.0 Introduction
Internet-of-Things architecture can be conveniently viewed as an abstraction of
several hierarchical layers. Three key layers in the abstraction are the application
layer, the network layer, and the perception layer. The technologies of each layer are
different, even though the technology used by the device of the same layer may be
heterogeneous. The devices and technology in the Internet-of-Things are used to
provide a diversity of services, each with its requirements, constraints, and trade-offs
Application Layer: The application layer is the social division of the Internet-of-
Things, combining with the industry demand and realizing extensive
intellectualization. This layer implements different applications for different scenarios.
This layer is used to manage and process data from the middleware layer, also
providing quality service to the final user. The problem of the application layer mainly
occurs in the operation of sensitive data, such as illegal access to data, malicious
modification of data, and the lifetime of permission. Attackers can exploit code
vulnerabilities to attack systems to gain sensitive data and modify it.
Middleware Layer: The middleware layer obtains data from the network layer, links
the system to the cloud and database, and performs data processing and storage. With
the continuous development of cloud computing and IoT, the middleware layer can
provide more powerful computing and storage capabilities. Meanwhile, this layer
50
provides APIs to meet the demands of the application layer. Database security and
cloud security are the main issues in the middleware layer, which affect the quality of
service in the application layer.
Network Layer: This layer is responsible for the connectivity of the IoT
infrastructure. It also collects data from the perception layer and transmits it to the
upper layer. The transmission medium can be wired or wireless, and the main
technologies are ZigBee, WiFi, Bluetooth, 3G, and so on. Attacks on the network layer
are diverse, typically affecting coordination of work and information sharing among
devices.
Perception Layer: The perception layer aims at identifying objects and collecting
target information, and transforms the information into digital signals The key
technologies of this layer are RFID tags, cameras, sensors, wireless sensor network
(WSN), and so on. The technology of the perception layer is affected by energy and
computing power. At the same time, a sensor device may be working in a hostile
environment and can be easily destroyed (intentionally and unintentionally). This has
a direct effect on the efficiency of the entire system. The main challenge for this layer
is the malicious attack on the sensor and identification technology, which interferes
with the collection of data
51
Figure 9: Architecture of an IoT
Stage 1. Sensors/actuators
Sensors collect data from the environment or object under measurement and turn it
into useful data. Think of the specialized structures in your cell phone that detect the
directional pull of gravity—and the phone's relative position to the “thing” we call the
earth—and convert it into data that your phone can use to orient the device. Actuators
can also intervene to change the physical conditions that generate the data. An actuator
might, for example, shut off a power supply, adjust an airflow valve, or move a robotic
gripper in an assembly process.
The sensing/actuating stage covers everything from legacy industrial devices to
robotic camera systems, water-level detectors, air quality sensors, accelerometers, and
heart rate monitors. And the scope of the IoT is expanding rapidly, thanks in part to
low-power wireless sensor network technologies and Power over Ethernet, which
enable devices on a wired LAN to operate without the need for an A/C power source.
In an IoT architecture, some data processing can occur in each of the four stages.
However, while you can process data at the sensor, what you can do is limited by the
processing power available on each IoT device. Data is at the heart of an IoT
architecture, and you need to choose between immediacy and depth of insight when
processing that data. The more immediate the need for information, the closer to the
end devices your processing needs to be.
For deeper insights that require more extensive processing, you'll need to move the
data into a cloud- or data center-based system that can bring several sources of data
together. But some decisions simply can’t wait for deep processing. Did the robotic
52
arm perform the surgery to cut an artery? Will the car crash? Is the aircraft approaching
the threat detection system a friend or a foe? You don't have time to send that data to
your core IT assets. You must process the data right at the sensor— at the very edge
of the edge network—for the fastest response.
Why preprocess the data? The analog data streams that come from sensors create large
volumes of data quickly. The measurable qualities of the physical world in which your
business may be interested—motion, voltage, vibration, and so on—can create
voluminous amounts of constantly changing data. Think how much sensor data a
complex machine like an aircraft engine might generate in one day, and there’s no
theoretical limit to the number of sensors that could be feeding data into an IoT system.
What’s more, an IoT system is always on, providing continuous connectivity and data
feeds. IoT data flows can be immense such as 40 TB/second in one case. That's a lot
of data to transport into the data center. It's best to preprocess it.
Another reason not to pass the data on to the data center in this form is that analog data
has specific timing and structural characteristics that require specialized software to
process. It's best to convert the data into digital form first, and that's what happens in
Stage 2.
Intelligent gateways can build on additional, basic gateway functionality by adding
such capabilities as analytics, malware protection, and data management services.
These systems enable the analysis of data streams in real-time. Although delivering
business insights from the data is a little less immediate at the gateway than it would
be when sent directly from the sensor/actuator zone, the gateway has the compute
power to render the information in a form that is more understandable to business
stakeholders.
Gateways are still edged devices—they are external to the data center—so geography
and location matter. In the pump example, if you have 100 pump units and want to
53
process data on-premises, you might have instant data at the pump level, aggregate the
information to create a plantwide view for the facility, and pass the data on to the data
center for companywide view. DAS and gateway devices may end up in a wide variety
of environments, from the factory floor to mobile field stations, so these systems are
usually designed to be portable, easy to deploy, and rugged enough to withstand
variations in temperature, humidity, dust, and vibration.
Stage 3: Edge IT
Once IoT data has been digitized and aggregated, it's ready to cross into the realm of
IT. However, the data may require further processing before it enters the data center.
This is where edge IT systems, which perform more analysis, come into play. Edge IT
processing systems may be located in remote offices or other edge locations, but
generally, these sit in the facility or location where the sensors reside closer to the
sensors, such as in a wiring closet. Because IoT data can easily eat up network
bandwidth and swamp your data center resources, it's best to have systems at the edge
capable of performing analytics as a way to lessen the burden on core IT infrastructure.
If you just had one large data pipe going to the data center, you'd need enormous
capacity. You'd also face security concerns, storage issues, and delays in processing
the data. With a staged approach, you can preprocess the data, generate meaningful
results, and pass only those on. For example, rather than passing on raw vibration data
for the pumps, you could aggregate and convert the data, analyze it, and send only
projections as to when each device will fail or need service.
Here's another example: You might use machine learning at the edge to scan for
anomalies that identify impending maintenance problems that require immediate
attention. Then you could use visualization technology to present that information
using easy-to-understand dashboards, maps, or graphs. Highly integrated computer
systems, such as hyper-converged infrastructure, are ideally suited to these tasks
because they're relatively fast and easy to deploy and manage remotely.
54
Living on the edge
The 4-stage approach to IoT infrastructure and processing will require new levels of
collaboration, particularly as the separations between these stages start to blur. If
you’re an OT professional, be prepared to work side by side with IT professionals. If
you’re in IT, get ready to collaborate more closely with OTs. Eventually, the two
functions will converge as the IoT pulls domain expertise deeper into data processing.
IT professionals can build their IoT skills by starting small and working with domain
experts to identify sources of potentially valuable data. Would understand the
operating conditions of a machine help operations design more efficient maintenance
cycles? Could developing knowledge of air temperature fluctuations in a warehouse
help to improve product storage? Investigate the sensors and edge devices you would
need to harvest the data. Design the infrastructure. Then experiment to make sure that
the project produces results that make for a strong business case.
The IoT continues to reshape commercial, industrial, scientific, and engineering
endeavors in profound and unpredictable ways. In the scientific revolution of the 17th
century, newly invented instruments extended the reach of human senses far into the
microscopic and astronomic realms. The IoT is the instrument that will enable your
organization to connect intelligent technologies to the data-emitting universe of
objects. The implications for IT infrastructure will be just as far-reaching.
A Reference Architecture (RA) can be visualized as the Matrix that eventually gives
birth ideally to all concrete architectures. For establishing such a Matrix, based on
strong and exhaustive analysis of the State of the Art, we need to envisage the superset
of all possible functionalities, mechanisms, and protocols that can be used for building
such concrete architecture and to show how interconnections could take place between
selected ones (as no concrete system is likely to use all of the functional possibilities).
Given such a foundation along with a set of design choices, based on the
55
characterization of the targeted system with various dimensions (like distribution,
security, real-time, semantics) it becomes possible for a system architect to select the
protocols, functional components, architectural options, needed to build their IoT
systems. As any metaphoric representation, this tree does not claim to be fully
consistent in its depiction; it should therefore not be interpreted too strictly. On the one
hand, the roots of this tree are spanning across a selected set of communication
protocols (6LoWPAN, Zigbee, IPv6,…) and device technologies (sensors, actuators,
tags,..) while on the other hand the blossoms/leaves of the tree represent the whole set
of IoT applications that can be built from the sap (i.e., data and information) coming
from the roots. The trunk of the tree is of utmost importance here, as it represents the
Architectural Reference Model (ARM).
The ARM is the combination of the Reference Model and the Reference Architecture,
the set of models, guidelines, best practices, views, and perspectives that can be used
for building fully interoperable concrete IoT architectures and systems. In this tree, we
aim at selecting a minimal set of interoperable technologies (the roots) and proposing
the potentially necessary set of enablers or building blocks (the trunk) that enable the
creation of a maximal set of interoperable IoT systems (the leaves). The IoT Reference
Model provides the highest abstraction level for the definition of the IoT-A
Architectural Reference Model. It promotes a common understanding of the IoT
domain. The description of the IoT Reference Model includes a general discourse on
the IoT domain, and IoT Domain Model as a top-level description, an IoT Information
Model explaining how IoT information is going to be modeled, and an IoT
Communication Model to understand specifics about communication between many
heterogeneous IoT devices and the Internet as a whole. The IoT Reference
Architecture is the reference for building compliant IoT architectures. As such, it
provides views and perspectives on different architectural aspects that are of concern
to stakeholders of the IoT. The terms view and perspectives are used according to the
general literature and standards the creation of the IoT Reference Architecture focuses
on abstract sets of mechanisms rather than concrete application architectures. To
organizations, an important aspect is the compliance of their technologies with
standards and best practices, so that interoperability across organizations is ensured.
Its also worth noting that as devices and various intermediaries are added to the
network, the data paths can be altered which may negatively impact system
performance. To correct this, caching data on devices closer to the client, such as proxy
servers or gateways, network performance will be enhanced, or least maintained as the
data paths change. Additionally, through the use of Uniform Resource Identifiers
(URIs), network resources can be addressed by IoT clients. Using HTTP for the
transmission, resources can be accessed and/or modified through commonly used
protocols such as JSON and XML. For added protection, encryption can be used for
safe data transmission HTTP(s).
5.0 Conclusion
Internet-of-Things architecture can be conveniently viewed as an abstraction of several
hierarchical layers. Three key layers in the abstraction are the application layer, the
network layer, and the perception layer. The technologies of each layer are different,
even though the technology used by the device of the same layer may be
heterogeneous. The devices and technology in the Internet-of-Things are used to
provide a diversity of services, each with its requirements, constraints, and trade-offs.
6.0 Summary
The functionality of the four layers architecture was described to motivate their unique
security needs. The IoT Device Architecture fascinating solutions to most problems
that the workforce is facing is also explained in stages and the IoT Reference
Architecture describes essential building blocks as well as design choices to deal with
conflicting requirements regarding functionality, performance, deployment, and
security. Interfaces should be standardized, best practices in terms of functionality and
information usage need to be provided. IoT Standardization and Design Consideration
and IoT Design Considerations for Embedded Connected Devices were described.
59
Unit 3 - Platforms Supporting IoT
1.0 Introduction
2.0 Intended Learning Outcomes (ILOs)
3.0 Main Content
3.1 Platforms Supporting IoT
3.2 Cloud Computing for IoT
3.2.1 Cloud Platforms for the Internet of Things
3.3 Data Management for IoT
3.3.1 The IoT data management
3.3.2 Data Management Challenges
3.3.3 IoT Data Lifecycle
3.4 Mobile Applications for IoT
3.5 Use Case: Lora Communication Protocol
3.6 Use Case: Smart Home Using Arduino
4.0 Self -Assessment Exercise(s)
5.0 Conclusion
6.0 Summary
7.0 Further Reading
1.0 Introduction
Diverse platforms have embraced the advent of the internet of things. With cloud
facility, users can have the visualization, machine learning, data analytics options for
wider sets of information; taking the overall available data and refining it down to
important information is referred to as Data management. Different devices from
different applications send large volumes and varieties of information. Managing all
this IoT data means developing and executing architectures, policies, practices, and
procedures that can meet the full data lifecycle needs. Things are controlled by smart
devices to automate tasks, so we can save time.
60
3.0 Main Content
3.1 Platforms Supporting IoT
IoT platforms and tools are considered the most significant component of the IoT
ecosystem. Any IoT device permits to connect to other IoT devices and applications
to pass on information using standard Internet protocols. IoT platforms fill the gap
between the device sensors and data networks. It connects the data to the sensor system
and gives insights using back-end applications to create a sense of the plenty of data
developed by the many sensors. The Internet of Things (IoT) is the future of
technology that helps Artificial intelligence (AI) to regulate and understand things in
a considerably stronger way. Below are a mix of best known IoT platforms and tools
that help you to develop IoT projects in an organized way.
1. Zetta
Zetta is API based IoT platform based on Node.js. It is considered a complete toolkit
to make HTTP APIs for devices. Zetta combines REST APIs, WebSockets to make
data-intensive and real-time applications. The following are some notable features.
It can run on the cloud, or a PC, or even modest development boards.
Easy interface and necessary programming to control sensors, actuators, and
controllers.
Allows developers to assemble smartphone apps, device apps, and cloud apps.
It is developed for data-intensive and real-time applications.
Turns any machine into an API.
2. Arduino
If you are seeking to make a computer that can perceive and exercise stronger control
over the real world when related to your ordinary stand-alone computer,
then Arduino can be your wise preference.
Offering an appropriate blend of IoT hardware and software, Arduino is a simple-to-
use IoT platform. It operates through an array of hardware specifications that can be
given to interactive electronics. The software of Arduino comes in the plan of the
Arduino programming language and Integrated Development Environment (IDE).
3. OpenRemote
OpenRemote has introduced a new open-source IoT platform to create professional
energy management, crowd management, or more generic asset management
applications.
Summing up the most important features:
Generic asset and attribute model with different asset types
Protocol agents like HTTP REST or MQTT to connect your IoT devices,
gateways, or data services or build a missing vendor-specific API.
61
Flow editor for data processing, and a WHEN-THEN and a Groovy UI for
event-based rules.
Standard Dashboard for provisioning, automating, controlling, and monitoring
your application as well as Web UI components to build project-specific apps.
Android and iOS consoles allow you to connect to your phone services, e.g.,
geofences, and push notifications.
Edge Gateway solution to connect multiple instances with a central management
instance.
Multi-realms multi-tenant solution, combined with account management and
identity service.
4. Node-RED
Node-RED is a visual tool for lining the Internet of Things, i.e., wiring together
hardware devices, APIs, and online services in new ways. Built on Node.js, Node-
RED describes itself as “a visual means for wiring the Internet of Things.”
It provides developers to connect devices, services, and APIs using a browser-based
flow editor. It can run on Raspberry Pi, and further 60,000 modules are accessible to
increase its facilities.
5. Flutter
Flutter is a programmable processor core for electronics projects, designed for
students, and engineers. Flutter’s take to glory is it's long-range. This Arduino-based
board includes a wireless transmitter that can show up to more than a half-mile. Plus,
you don’t require a router; flutter boards can interact with each other quickly.
It consists of 256-bit AES encryption, and it’s simple to use. Some of the other features
are below.
Fast Performance
Expressive and Flexible UI
Native Performance
Visual finish and functionality of existing widgets.
6. M2MLabs Mainspring
M2MLabs Mainspring is an application framework for developing a machine to
machines (M2M) applications such as remote control, fleet administration, or smart
terminal. Its facilities include flexible design of devices, device structure, connection
between machines and applications, validation and normalization of data, long-term
data repository, and data retrieval functions.
It’s based on Java and the Apache Cassandra NoSQL database. M2M applications can
be modeled in hours rather than weeks and subsequently passed on to a high-
performance execution environment made on top of a standard J2EE server and the
highly-scalable Apache Cassandra database.
62
7. ThingsBoard
ThingsBoard is for data collection, processing, visualization, and device management.
It upholds all standard IoT protocols like CoAP, MQTT, and HTTP as quickly as cloud
and on-premise deployments. It builds workflows based on design life cycle events,
REST API events, RPC requests.
Let’s take a look at the following ThigsBoard features.
A stable platform that is combining scalability, production, and fault tolerance.
Easy control of all connected devices in an exceptionally secure system
Transforms and normalizes device inputs and facilitates alarms for generating
alerts on all telemetry events, restores, and inactivity.
Enables use-state-specific features using customizable rule groups.
Handles millions of devices at the same time.
No single moment of failure, as every node in the bundle is exact.
Multi-tenant installations out-of-the-wrap.
Thirty highly customized dashboard widgets for successful user access.
8. Kinoma
Kinoma, a Marvell Semiconductor hardware prototyping platform, involves three
different open source projects. Kimona Create is a DIY construction kit for prototyping
electronic devices. Kimona Studio is the development environment that functions with
Set up and the Kinoma Platform Runtime. Kimona Connect is a free iOS and Android
app that links smartphones and stands with IoT devices.
11.DSA
Distributed Services Architecture (DSA) is for implementing inter-device
communication, logic, and efforts at every turn of the IoT infrastructure. It allows
cooperation between devices in a distributed manner and sets up a network engineer
to share functionality between discrete computing systems. You can manage node
attributes, permission, and links from DSLinks.
12.Thinger
Thinger.io provides a scalable cloud base for connecting devices. You can deal with
them quickly by running the admin console or combining them into your project logic
using their REST API. It supports all types of hackers' boards such as Raspberry Pi,
Intel Edison, ESP8266. Thinger can be integrated with IFTT, and it provides real-time
data on a beautiful dashboard.
Figure 10: Data processing in the cloud and fog-based architectures of IoT
1. AWS IoT
There are billions of devices present in the hospital, homes, cars, and N number of
places. AWS helps the user to collect, store and analyze the device data even when
internet connectivity is down. It provides services like AWS IoT Core, AWS IoT
device management, and AWS IoT device defender. AWS IoT analytics services are
provided for analyzing their IoT data. It is scalable to use and pay for what you use. It
provides security features such as encryption and access control devices, monitor and
audit security policies. It is useful for connected homes, industrial and commercial
projects and industrial applications like Anel company uses IoT platform for energy
management (creating green glass enable gateways for homes, Symantec network uses
IoT for the backend.
65
2. Microsoft Azure IoT Hub
Cloud computing is about accessing computing services like storage, networking over
the internet from the service provider Azure. When we store photos online instead of
phone gallery is cloud computing. It provides services for deploying applications on a
massive global network using preferred tools and frameworks. It is used for meeting
business challenges. It is a Microsoft product, less expensive to use, more secure, and
reliable. We can scale up and down storage resources when our needs change on azure.
It will manage tools and services for hybrid cloud applications. We can build a
framework with all the languages and can deploy wherever we want. Help is provided
by the expert while using azure.
3. Salesforce IoT
Building an application takes a lot of time but with the help of salesforce, it becomes
easy and less time-consuming because it provides the fastest path from thinking of
creating an app to building it successfully. No need to worry about infrastructure and
tools. It is available in the cloud, anyone can use it from anywhere through the internet.
It is scalable to the growth of the company which is seasonally changing it is
applications. It supports start-ups and small businesses. It provides software solutions
and platforms for users and developers. Infrastructure and up-gradation happen
automatically. Sales cloud, service cloud, exact target market cloud, app exchange are
services provided to the customers. Organizations can store and process Internet of
things data, can utilize services provided by the salesforce IoT cloud. Salesforce
handles a massive amount of data generated by devices, websites, sensors, etc, and
provides responsive actions to the data provided by customers.
Data from IoT devices are used for analytical purposes. Information that businesses
collect and store but remain relatively stagnant because it is not used for analytical
purposes, is called dark data. It includes customer demographic information, purchase
histories and satisfaction levels, or general product data. To better understand
customers, dark data is invaluable to businesses, as it allows them to uncover
additional insights more efficiently. Before the release of a product, IoT data
management requires field tests. Data from the field tests help improve the design and
create a higher-quality product. Collecting field data post-launch helps in continuous
product improvement with software updates and by identifying anomalies. This also
provides important insights to support the development process of new products.
Sensors and devices can connect indirectly through the cloud, where data is centrally-
managed, or send data directly to other devices to locally collect, store and analyze the
data, and then share selected findings or information with the cloud. Edge devices for
data management help secure the most valuable data and reduce bandwidth costs.
These also provide great performance, ownership over data, and lower maintenance
cost. Edge devices run a Web-based dashboard that end-users can access to monitor
the flow of data, so they can decide how various systems in demonstration and devices
are running, and get notified by alarms. A large amount of data can be represented in
the form of a graph for any desired range of time, and each point on the graph
represents a record that can be found by searching the database, which stores a large
quantity of data.
68
3.3.3 IoT Data Lifecycle
The lifecycle of data within an IoT system—illustrated in Figure 11—proceeds from
data production to aggregation, transfer, optional filtering and preprocessing, and
finally to storage and archiving. Querying and analysis are the endpoints that initiate
(request) and consume data production, but data products can be set to be “pushed” to
the IoT consuming services. Production, collection, aggregation, filtering, and some
basic querying and preliminary processing functionalities are considered online,
communication-intensive operations. Intensive preprocessing, long-term storage, and
archival, and in-depth processing/analysis are considered offline storage-intensive
operations.
Storage operations aim at making data available in the long term for constant
access/updates, while archival is concerned with read-only data. Since some IoT
systems may generate, process, and store data in-network for real-time and localized
services, with no need to propagate this data further up to concentration points in the
system, “edges” that combine both processing and storage elements may exist as
autonomous units in the cycle. In the following paragraphs, each of the elements in the
IoT data lifecycle is explained.
Querying: Data-intensive systems rely on querying as the core process to access and
retrieve data. In the context of IoT, a query can be issued either to request real-time
data to be collected for temporal monitoring purposes or to retrieve a certain view of
the data stored within the system. The first case is typical when a (mostly localized)
real-time request for data is needed. The second case represents more globalized views
of data and in-depth analysis of trends and patterns.
69
Production: Data production involves sensing and transfer of data by the “Things”
within the IoT framework and reporting this data to interested parties periodically (as
in a subscribe/notify model), pushing it up the network to aggregation points and
subsequently to database servers, or sending it as a response triggered by queries that
request the data from sensors and smart objects. Data is usually time-stamped and
possibly geo-stamped and can be in the form of simple key-value pairs, or it may
contain rich audio/image/video content, with varying degrees of complexity in-
between.
Collection: The sensors and smart objects within the IoT may store the data for a
certain time interval or report it to govern components. Data may be collected at
concentration points or gateways within the network where it is further filtered and
processed, and possibly fused into compact forms for efficient transmission. Wireless
communication technologies such as Zigbee, Wi-Fi, and cellular are used by objects
to send data to collection points.
Aggregation/Fusion: Transmitting all the raw data out of the network in real-time is
often prohibitively expensive given the increasing data streaming rates and the limited
bandwidth. Aggregation and fusion techniques deploy summarization and merging
operations in real-time to compress the volume of data to be stored and transmitted.
Delivery: As data is filtered, aggregated, and possibly processed either at the
concentration points or the autonomous virtual units within the IoT, the results of these
processes may need to be sent further up the system, either as final responses or for
storage and in-depth analysis. Wired or wireless broadband communications may be
used there to transfer data to permanent data stores.
Preprocessing: IoT data will come from different sources with varying formats and
structures. Data may need to be preprocessed to handle missing data, remove
redundancies and integrate data from different sources into a unified schema before
being committed to storage. This preprocessing is a known procedure in data mining
called data cleaning. Schema integration does not imply brute-force fitting of all the
data into a fixed relational (tables) schema, but rather a more abstract definition of a
consistent way to access the data without having to customize access for each source's
data format(s). Probabilities at different levels in the schema may be added at this
phase to IoT data items to handle the uncertainty that may be present in data or to deal
with the lack of trust that may exist in data sources [7].
Storage/Update—Archiving: This phase handles the efficient storage and
organization of data as well as the continuous update of data with new information as
it becomes available. Archiving refers to the offline long-term storage of data that is
not immediately needed for the system's ongoing operations. The core of centralized
storage is the deployment of storage structures that adapt to the various data types and
the frequency of data capture. Relational database management systems are a popular
choice that involves the organization of data into a table schema with predefined
interrelationships and metadata for efficient retrieval at later stages. NoSQL key-value
70
stores are gaining popularity as storage technologies for their support of big data
storage with no reliance on a relational schema or strong consistency requirements
typical of relational database systems. Storage can also be decentralized for
autonomous IoT systems, where data is kept at the objects that generate it and is not
sent up the system. However, due to the limited capabilities of such objects, storage
capacity remains limited in comparison to the centralized storage model.
Processing/Analysis: This phase involves the ongoing retrieval and analysis
operations performed and stored and archived data to gain insights into historical data
and predict future trends, or to detect abnormalities in the data that may trigger further
investigation or action. Task-specific preprocessing may be needed to filter and clean
data before meaningful operations take place. When an IoT subsystem is autonomous
and does not require permanent storage of its data, but rather keeps the processing and
storage in the network, then in-network processing may be performed in response to
real-time or localized queries.
There are several platforms for developing smartphone applications such as Windows
Mobile, Symbian, iOS, and Android. In the proposed system, the Android platform
app is developed as most of the phones and handy devices support Android OS. Java
programming language using the Android Software Development Kit (SDK) has been
used for the development and implementation of the smart home app. The SDK
includes a complete set of development tools such as a debugger, libraries, and a
handset emulator with documentation, sample code, and tutorials. Eclipse (running on
Windows 7 development platform), which is the officially supported integrated
development environment (IDE) has been used in conjunction with the Android
Development Tools (ADT) Plug-in to develop the smart home app. The designed app
71
for the smart home system provides the following functionalities to the user: • Device
control and monitoring. • Scheduling tasks and setting automatic control of the smart
home environment. • Password change option. • Supports voice activation for
switching functions
74
Animal conservation - Tracking sensors manage endangered species such as
Black Rhinos and Amur Leopards.
Dementia patients - Wristband sensors provide fall detection and medication
tracking.
Smart farms- Real-time insights into crop soil moisture and optimized
irrigation schedule reduce water use up to 30%.
Water conservation- Identification and faster repair of leaks in a city’s water
network.
Food safety- Temperature monitoring ensures food quality maintenance.
Smart waste bins - Waste bin level alerts sent to staff optimize the pickup
schedule.
Smart bikes- Bike trackers track bikes in remote areas and dense buildings.
Airport tracking - GPS-free tracking monitors vehicles, personnel, and
luggage.
Efficient workspaces - Room occupancy, temperature, energy usage, and
parking availability monitoring.
Cattle health - Sensors monitor cattle health, detect diseases, and forecast
calves delivery time.
LoRa in space - Satellites to provide LoRaWAN-based coverage worldwide.
75
Figure 13: Block diagram of the Structure system.
From this block, there are two main important parts: the Microcontroller Board and
the Ethernet Shield Module. The Ethernet shield part is connected with six sensors and
an eight-channel relays board, The DHT11 sensor is a temperature & humidity sensor
in the system; the motion sensor is a motion detector that uses a passive infrared
sensor; the Rain sensor is a YL-83 module; Arduino Electronics DIY Parts
Photoresistor is a Light Sensor; the flame sensor is a fire detector, and the MQ5 sensor
is a gas detector, also Fire Alarm buzzer and gas buzzer. The data from all these sensors
and relay are continually processed by the Microcontroller, and status is given in web
browsers and home applications if there is an event in the home by switching ON/OFF
the relays. Also, it can see or control every event and status by web browsers or home
applications.
These units are responsible for the management and provide smart home automation.
The user can control the state of the relay and remotely turn ON/OFF the light and
devices in the house. Actually, the Ethernet Shield is the interface between the
microcontroller and web browser by using the internet. During this operation, the
information is transferred from the Microcontroller to the web browser. The
commands sent by the user from a web browser are executed by the Microcontroller.
This system works in a smart home automation system providing a guaranty and a
remote management system for all devices inside the home.
76
4.0 Self -Assessment Exercise(s)
Answer the following questions:
1. What do you understand by Data management of IoT?
2. Explain Mobile Applications of IoT
5.0 Conclusion
We have learned about IoT cloud computing, how it will help the business to grow in
the 20’s era where competition is getting tougher for services provided to the users.
Types of IoT clouds available to the users. Different IoT cloud provides different
features but one common thing is there about different cloud and that is the security
and privacy of user data. This will help the company to build users’ trust. An internet-
based smart home system that can be controlled remotely upon user authentication is
proposed and implemented. The Android-based smart home app communicates with
the micro web-server via the internet using the REST fully based web service. Any
android supported device can be used to install the smart home app and control and
monitor the smart home environment. A low-cost smart home system has been
developed which does not require a PC as all processing is handled by the
microcontroller. The system also uses the Google speech recognition engine thus
eliminating the need for an external voice recognition module. Prospective future
works include incorporating SMS and call alerts and reducing the wiring changes for
installing the proposed system in pre-existing houses by creating a wireless network
within the home environment for controlling and monitoring the smart home
environment.
6.0 Summary
This module discusses the development process and design considerations that
developers must follow to guarantee a successful launch of the Internet of Things (IoT)
and wearable products. When developing a new product, there is a set of steps that
must be followed to turn an innovative idea into a product available for sale. Some
steps can have multiple iterations, which is typical when it comes to developing
technically complex products based on hardware and software systems.
77
Idowu, Park, Ibrahim (2017), A New IoT Architecture for a Sustainable IoT Adoption.
International Journal of Computer Science and Information Technology Research Vol.
5, Issue 2, pp: (204-208)
Kumar and Mallick, (2018), The Internet of Things: Insights into the building blocks,
component interactions, and architecture layers. International Conference on
Computational Intelligence and Data Science (ICCIDS 2018) Procedia Computer
Science 109–117
IoT Cloud Platforms | Top 6 IoT Cloud Platforms for IoT Development (educba.com)
Abu-Elkiheir M, Hayajneh M, and Abu N (2013) Data Management for the Internet
of Things: Design Primitives and Solution Data Management for the Internet of
Things: Design Primitives and Solution (nih.gov)
Abu-Elkiheir M, Hayajneh M, and Abu N (2013) Data Management for the Internet
of Things: Design Primitives and Solution Data Management for the Internet of
Things: Design Primitives and Solution (nih.gov)
Fuller J. R (2016), The 4 stages of an IoT architecture. How to design an IoT-ready
infrastructure: The 4-stage architecture (techbeacon.com)
Abed A. (2017), Internet of Things (IoT): Architecture and Design
https://www.researchgate.net/publication/321587819 cussions, stats, and author
profiles for this publication at: https://www.researchgate.net/publication/308647314
12 Open Source Internet of Things (IoT) Platforms and Tools (geekflare.com)
Fremantle P. (2015), A Reference Architecture for the Internet of Things DOI:
10.13140/RG.2.2.20158.89922
What are LoRa and LoRaWAN? | The Things Network
Almali N, Bahir K. S, Atan O. (2021), Arduino Based Smart Home Automation
System. International Journal of Scientific Research in Information Systems and
Engineering Volume 2, Issue 2, August – 2016. ISSN 2380-8128
Algoiare T. O., “Design and Implementation of Intelligent Home Using GSM
Network” MSc dissertation, Dept. of Computer Engineering, Ankara, Turkey, 2014.
201902_GSMA_APAC_MobileIoT_Case_Study.pdf
78
Module 3: Security Considerations Using IoT
Module Introduction
In its essence, the Internet of Things is comprised of not just humans, but billions of
IoT devices talking to each other using the Internet autonomously to fulfill their
specific functions. Do you use IoT-powered motion sensor-based lighting solutions or
smart locks at home? If so, they need to process the captured motion data within the
fraction of a second it takes you to take a step and decide whether to keep the lights
on or switch them off. That entire lightning-fast processing of data happens through
the Internet. Of course, that’s only a very basic example of IoT functionality. True IoT
is capable of running entire factory floors, with its evolving complexities,
autonomously. Needless to say, IoT represents a degree of autonomy and convenience
that’s incredibly attractive for consumers (enterprise and public). This is driving
widespread adoption much faster than the technology has a chance to mature and
before the devices can be properly equipped with required safety standards.
79
1.0 Introduction
This unit presents the Internet of Things (IoT) security guidelines and best practices
that others can use as a basis for future standards, certifications, laws, policies, and/or
product ratings. Most, if not all, of these guidelines, would apply to any Internet-
connected device; however, this paper focuses on security and privacy measures either
peculiar to the IoT or especially relevant to the IoT. This paper assumes the end-to-
end processing model of the Internet, in which application features such as security
are handled by end nodes of the network, client, and server hardware. It focuses on
security mechanisms, including patching and updating, that should be considered at
the manufacturing design phase rather than after devices have already been built or
deployed.
Recently a bill was drafted for the Senate of the State of Michigan which would punish
automobile hacking with a sentence of life in prison. One of the authors contacted one
of the senators proposing the legislation and that senator agreed to modify the bill to
allow hacking for beneficial research purposes. Researchers who discover serious
vulnerabilities and report them responsibly provide a service to the industry similar to
people who discover safety flaws in automobiles and other safety-critical machinery.
Legitimate security research may be hindered by excessive legislation. One way to
differentiate between research and unethical hacking is to mandate responsible
80
disclosure of discovered vulnerabilities. Responsible disclosure requires the researcher
to first notify the manufacturer or governing authorities and allow reasonable time for
the vulnerability to be independently verified and fixed before going public with a
system hack.
Another, less desirable, the approach might be to require researchers to first register
with a government office or the manufacturer before attempting to break into a device.
Certainly, legislation should promote a safe and useful IoT ecosystem for everyone.
Legislation should punish offenders. However, legislation should also avoid
criminalizing activities that help promote safety and security. Legislation should avoid
giving safe harbor to activities that cause harm. This position has been articulately
expressed by Terrell McSweeney, Commissioner of the Federal Trade Commission.
Manufacturers do not benefit financially from exposing flaws in their products but
these flaws must be identified to improve functionality and security. Manufacturer-
paid bug bounty systems can enable manufacturers to mitigate bad press while
improving product quality at a cost lower than the cost of hiring paid penetration
testers. Precautions should be taken by legislators to prevent retaliatory prosecutions
of ethical hackers. Explicit provisions should be written into legislation to permit
research and ethical hacking. Safe harbor clauses should be avoided for manufacturers
who could implement harmful, insecure products for financial gain.
The program board should be empowered to verify whether the provider abides by
responsible engineering practices (especially practices that enable security and privacy
of the IoT), and would provide endorsement of providers who are bound by them.
Negative action would be another dimension of this certification program and should
be limited to loss of certification status and potentially reporting to the FTC or other
government bodies for further action. The certification body should verify at least the
following elements of a provider's products, protocols, and documents:
a) Data are handled, used, protected, and shared responsibly.
b) Protocols used or recommended do not leak information about users beyond the
explicit intent of those users.
c) When privacy issues arise, the certified provider responds promptly to concerns.
81
d) Authentication is suitably strong and follows proven protocols.
e) Devices are not over-powered or under-protected.
f) Devices should have an identifying label that cannot be easily forged and that
contains a web link where customers can go to find the certification status of the device
along with a device description (model and serial number, etc.). This can be done in
cooperation with the FTC or other national bodies.
Certification programs such as these decrease uncertainty and provide device makers,
engineers, and authors with best practices to follow. Courts can consider certification
as evidence that acceptable practices are generally followed. In the event of litigation,
a provider can point to the certification and say that it followed good engineering
practice.
82
2. Provide for firmware updates/patches Inevitably vulnerabilities will be discovered
after devices have been deployed. Devices must be patchable or upgradable. Naturally,
device firmware should only be modifiable with the proper digital signature. As it
stands, device vendors and manufacturers have a little financial incentive in ensuring
ongoing IoT patch upgrades since revenue comes from the sale of the device, not the
maintenance. The upkeep of IoT devices may detract from revenue. In addition,
vendors are not legally held accountable for ongoing maintenance of devices beyond
initial sales and competition drives vendors to cut corners, negating on quality for
efficiency and speed of release into the market. While these factors may not have been
critical previous to IoT, the interconnected nature of IoT devices raises the bar to a
new level in terms of functionality and accountability. Detrimental also is the tendency
of vendors towards planned obsolescence of devices to maximize profit through
continued sales rather than through the upkeep of existing devices. Furthermore, IoT
devices are not efficiently designed or configured to respond to OTA (over the air)
updates, resulting in, at best costly, and at worst, unmanageable procedures. As it
stands, many IoT devices are un-patchable, and as such, cannot be made secure.
Researchers have observed that the ubiquitous advancement of IoT and the placement
of unsecured and unattended IoT devices throughout homes and businesses will
increase exponentially, opening up opportunities for hackers to exploit critical
vulnerabilities. Further to planned obsolescence, many IoT devices simply have
limited life cycles. Companies must be legally held accountable to monitor and
maintain devices through prescribed and agreed-upon lifecycles. For this, there are
needs for standards to be established and legislation put in place. In addition, vendors
need to remain transparent and forthcoming about the life cycle of devices, especially
in terms of service and upkeep policies, including the length of time they plan to
support their devices. They need to take an active role in providing details on patches
and upgrades as well as security risks and privacy concerns, ensuring that the
consumer and/or user is informed about changes in policy, functionality, and security.
The full lifecycle of the IoT device must be considered, beginning at manufacturing
where security credentials must be “generated, allocated, and securely provisioned into
the devices”. Deliberations must also integrate the lifecycle of the original
manufacturer. When the original vendor no longer exists, it becomes impossible to
trace credentials to patch vulnerabilities and security breaches, and vendors are
inevitably replaced and/or go defunct or bankrupt.
3. Perform dynamic testing It is crucial that IoT devices undergo thorough testing, and
establish a minimum baseline for security. Static testing is not intended or designed to
find vulnerabilities that exist in the off-the-shelf components such as processors and
memory into which may be a component of the overall application. Dynamic testing,
on the other hand, is capable of exposing both code weaknesses and any underlying
defects or vulnerabilities introduced by hardware and which may not be visible to static
83
analysis. Dynamic testing may discover vulnerabilities that are created when new code
is used on old processors. We recommend manufacturers who purchase hardware and
software from others do dynamic testing to ensure the items are secure.
2. Use strong encryption and secure protocols Even if device passwords are secure,
communications between devices may be hackable. In the IoT, there are many
protocols, including Bluetooth, Zigbee, Z-Wave, 6LoWPAN, Thread, Wi-Fi, cellular,
NFC, Sigfox, Neul, and LoRaWAN. Depending on the protocol and available
computing resources, a device may be more or less able to use strong encryption.
Manufacturers should examine their situation on a case-by-case basis and use the
strongest encryption possible, preferably IPsec and/or TLS/SSL. There may be cases
where encryption is not desirable, such as in SAE J2735 Basic Safety Messages
(BSMs), the wireless communications cars can use to avoid collisions. In those cases,
messages can be sent in the open and verified using digital signatures. However,
consideration should be given to the implications of omitting encryption. In the SAE
J2735 case, BSMs could be used to alert collision-management systems falsely and
immobilize an automobile. There is no stock answer that avoids the need for careful
thought about the threat models anticipated and the vulnerabilities that will be
tolerated. If data are transmitted unencrypted and unsigned, precautions should be
made to ensure that false data have little or no chance of causing harm.
3. Minimize device bandwidth Recently DDoS attacks have been conducted in large
measure by armies of poorly protected IoT devices that have become zombie systems
in massive global campaigns. Most IoT devices are made of commodity components
that have vastly overpowered network capabilities for the function they are supposed
to perform causing congestion on home networks and potentially contributing to huge
costs for the targets of IoT-borne DDoS attacks. If in the future there were 50 billion
devices connected to the Internet, and if we assume (based on current conditions) that
1.1% of them are compromised and under coordinated remote control, that is 55
million rogue IoT devices. Suppose each device is capable of generating line-rate
attack traffic equivalent to Gigabit Ethernet (81,274 - 1,488,096 frames per second),
for example, the ARM9 system-on-a-chip (SoC) has two such connections built-in,
85
and it costs less than $5 to make per chip. Using this 55-million-device zombie army
to generate DDoS events, attackers could generate between 4.47 to 81.8 trillion frames
per second or 55 petabits per second. This is well beyond the defensive capabilities of
any single service provider. An attack of this magnitude would overwhelm the fastest
network interface built to date (300Gbps) by a margin of 183,333 to 1. There is no
good way to reduce the malicious traffic produced by these systems apart from
squelching it at the source. We recommend device manufacturers should limit the
amount of network traffic IoT devices can generate to levels reasonably needed to
perform their functions. There is very little need for an Internet-connected refrigerator
to spew Internet Control and Management Protocol (ICMP) messages at gigabit-per-
second speeds. While some refrigerators are outfitted with video screens, they more
than likely do not need to have high-speed upload capabilities. Vendors should use
hardware and kernel-level bandwidth limitations to throttle network transmission rates
to levels reasonable for the tasks of each device. Such limitations make it much harder
for an attacker to use a device in a DDoS attack, even if he has completely
compromised it. Additionally, devices should be programmed to self-monitor for
unusual behaviors and restore themselves to factory settings when alarming behavior
is detected. If resetting devices to factory settings is not feasible, devices should at
least reboot to potentially clear code the attacker has running in memory. Now,
supposing the aforementioned 55 million malicious IoT devices had hardware/kernel-
enforced attenuated bandwidth, say 10 Ethernet frames per second, then their
aggregate potential attack profile drops to 550 million frames per second, and not more
than 6.6 terabits per second. This is nearly 150,000 times smaller, and while it is still
too big for a single defender, that size attack is feasible for a distributed set of
defenders to stop. Additional kernel-level controls within devices that notice and
attenuate large amounts of uploaded traffic or stop other unexpected behavior could
further reduce the destructive capabilities of compromised devices without requiring
heroic efforts by network defenders. Thus, we recommend serious consideration of the
performance requirements of each device and those modest limitations be emplaced
that are difficult to circumvent. This will greatly increase the safety of IoT devices and
make it possible to safely field many more of them in the future.
4. Divide networks into segments Separate the network into smaller local networks
using VLANs, IP address ranges, or a combination thereof. Network segmentations
are utilized in next-generation firewall security policies to identify one or more source
and destination interfaces on the platform. Each interface on the firewall must be
assigned to a security zone before it can process traffic. This allows organizations to
create security zones to represent different segments being connected to and controlled
by, the firewall. For example, security administrators can allocate all cardholder or
patient data repositories in one network segment identified by a security zone (e.g.,
Customer Data). Then the administrator can craft security policies that only permit
86
certain users, groups of users, specific applications, or other security zones to access
the Customer Data zone – thereby preventing unauthorized internal or external access
to the data stored in that segment. This type of solution is more common in industrial
applications but may be useful in broader circumstances. A separate, detached private
network for a security system, perhaps with a dedicated channel to a "home base" in
the case of a home security system, might suffice. If the system must use the Internet,
a virtual private network (VPN) might be implemented.
88
i. Unreliable Communication: Because of the diversity of communication media
used in propagating potentially sensitive data, IoT applications can be
vulnerability to several security vulnerabilities. Each such vulnerability can be
unique, based on the medium involved. The wireless medium is one of the most
vulnerable candidates. Note that the nature of this medium is broadcasting.
Consequently, the transmission process based on this kind of media is
vulnerable to eavesdropping, replay attack, and tampering attacks. The attacker
can also inject malicious code into the wireless routing node, thereby affecting
the communication of the whole wireless network. Collision is also a problem
in wireless networks: even if the channel is available, it cannot guarantee that
the communication is reliable. Another critical problem is a delay, particularly
for applications that impose real-time constraints. In complex environments,
there is large-scale deployment of sensor nodes via several ad hoc technologies,
making manageability a non-trivial issue. Finally, the network topology is
vulnerable to environment and node failure, which can compromise the
reliability of information transmission.
ii. Hostile Environment: In IoT applications, many devices and nodes are deployed
in a hostile environment, i.e., within the physical vicinity of the attacker.
Attackers can consequently obtain information about devices and nodes through
physical access, which can enable attacks such as tag cloning and, even worse,
can physically destroy the device directly. At the same time, in a hostile
environment, the energy consumption of the device also has certain
requirements, making the device is resource-constrained. Attackers can exploit
these constraints to launch a series of attacks, such as a sleep deprivation attack.
Furthermore, resource constraints often preclude the application of
sophisticated security frameworks and security algorithms on such devices.
iii. Inadequate Data and Privilege Protection: The issues of data security and
permission have clear correspondence with Internet-of-Things security.
Because of the lack of permission protection, the attacker can remotely access
and modify the data in the system. The vulnerabilities with authorization, such
as the over privilege, can allow attackers to perform unauthorized operations.
Users’ privacy is often easily violated due to the lack of protection for user
input. In addition, by exploiting bugs on the program, attackers can inject
malicious code into the system and extract data.
5.0 Conclusion
Interconnecting “things” and devices that take the form of wearables, sensors,
actuators, mobiles, computers, meters, or even vehicles is a critical requirement for the
current era. These inter-networked connections are serving the emerging applications
of home and building automation, smart cities and infrastructure, smart industries, and
smart everything. However, the security of these connected Internet of things (IoT)
plays a centric role with no margin for error. After a review of the relevant, online
literature on the topic and after looking at the market trends and developments, one
can notice that there are still concerns about security in IoT products and services. This
unit highlight the most significant problems related to safety and security in the IoT
ecosystems. This unit identifies the general threat and attacks vectors against IoT
devices while highlighting the flaws and weak points that can lead to breaching the
security.
6.0 Summary
We have examined the security considerations and challenges in the IoT Network
Layer, Support Layer, and application layer. We have seen the attack and
vulnerabilities with countermeasures of open-source solutions.
91
Unit 2 - IoT Security Considerations Solutions
1.0 Introduction
2.0 Intended Learning Outcomes (ILOs)
3.0 Main Content
3.1 IoT Security Considerations and Solutions in IoT Network Layer.
3.2 IoT Security Considerations and Solutions in IoT Support Layer.
3.3 Security Considerations and Solutions in IoT Application Layer.
3.4 IoT Open Source Solutions
3.4.1 Encryption Algorithms and Mechanisms in IoT
3.4.2 Lightweight Stream Ciphers (LWSC) Algorithms
3.4.3 Lightweight Block Cipher (LWBC) Algorithms
3.4.4 Lightweight Hash Functions (LWHF)
3.4.5 Symmetric and Asymmetric Lightweight Cryptographic
Algorithms Used in IoT
4.0 Self -Assessment Exercise(s)
5.0 Conclusion
6.0 Summary
7.0 Further Reading
1.0 Introduction
In this section, we turn to an analysis of IoT security assurance from the point of view
of system design. First, we analyze several requirements that must be met and some
countermeasures. IoT security requirements Quality attribute IoT security description
Data integrity: Data integrity ensures data integrity, reliability, and correctness and
confirms that data has not been modified and destroyed. Data confidentiality: Data
confidentiality aims at concealing data from unauthorized individuals, thus protecting
users’ privacy and sensitive data without being acquired by attackers. Only legitimate
users can access the information. Data availability: Data availability is used to make
sure that resources (e.g., data and service) are available. Authentication:
Authentication defines verification and differentiation of identities that can access
entities. In IoT, authentication protocols play an important role in mutual
communication among different entities. Authorization: Authorization defines the
process of granting, denying, and restricting access to entities. The authorization
scheme performs different operations according to different entities.
92
2.0 Intended Learning Outcomes (ILOs)
At the end of this unit, you should be able to:
1. Explain the Security Considerations and Solutions in IoT Network Layer.
2. Discuss the Security Considerations and Solutions in IoT Support Layer.
3. Describe the vulnerability and challenges of security in IoT
93
• Protect the web by detecting and preventing malicious traffic by host-based firewalls
and using IPS / IDS
• Log Monitoring, especially for authorized users and management of the event log
com-plex from several sources with SIEM (Security Information and Event
Management) solutions to analyze security incidents.
5.0 Conclusion
IoT security solutions are the software and embedded tools used to monitor edge
devices, proactively detect threats, and facilitate remediation. As such, current IoT
security solutions are a mix of standalone and bundle plans that include existing tools
like EDR, encryption, IAM, EMM, and more to protect connected devices and
networks. The proliferation of IoT devices means securing the next generation of IT
environments will require IoT-specific security strategies and solutions. Organizations
actively deploying IoT devices should be prudent about the security risks of insecure
edge devices and proceed with caution.
Organizations need to visualize IoT assets under management, profile their risk, apply
adequate protections, and monitor IoT traffic for unknown threats. Like so much else
in cybersecurity, visibility informs action and strategy – making the upfront work of
selecting an IoT security solution or assembly a strategy that much more valuable in
avoiding unnecessary risk
6.0 Summary
We have examined the security considerations and solutions in the IoT Network Layer,
Support Layer, and application layer. We have seen the attack and vulnerabilities with
countermeasures of open-source solutions.
97
7.0 Further Reading
Broadband Internet Technical Advisory Group. (2016). Internet of Things (IoT)
Security and Privacy Recommendations. Retrieved from BITAG website:
https://www.bitag.org/documents/BITAG_Report_-
_Internet_of_Things_(IoT)_Security_and_Privacy_Recommendations.pdf
98
Unit 3 - IoT Use Cases
1.0 Introduction
2.0 Intended Learning Outcomes (ILOs)
3.0 Main Content
3.1 IoT Use Case: Utility Companies
3.1.1 Automatic Smart Metering
3.1.2 Trends in the utilities industry
3.1.3 Regulatory compliance and operational efficiency
3.1.4 Electrical vehicle (EV) charging and smart home offerings
3.1.5 Mobile network connectivity for utilities
3.1.6 IoT is redefining the power grid
3.1.7 Collect consumption data effortlessly
3.1.8 On-site visits required only for maintenance and repair
3.1.9 Monitor your back-up power facilities
3.1.10 Maintain stocks at optimum levels
3.1.11 Electricity pole surveillance
3.1.12 Monitor water facilities simply and remotely
3.2 IoT Security in Utilities Challenges
3.3 IoT Security Solutions
3.4 Use Case: IoT Security in Manufacturing Industry
4.0 Self -Assessment Exercise(s)
5.0 Conclusion
6.0 Summary
7.0 Further Reading
1.0 Introduction
Internet of Things (IoT) applications are becoming more widespread. According
to Mckinsey, the percentage of businesses that use IoT technology has increased from
13% to 25% between 2014 and 2019. IoT enables a myriad of different business
applications. Knowing those IoT examples and use cases can help businesses integrate
IoT technologies into their future investment decisions. That is why we set out to create
the most comprehensive list of IoT use cases in industries.
99
3. Describe IoT Security in Utilities Challenges
4. Explain IoT Security Solutions
5. Elucidate Use Case: IoT Security in Manufacturing Industry
100
3.1.3 Regulatory compliance and operational efficiency
Increasingly, regulations require the recording of accurate meter data at regular
intervals, and that the data collected be made available to all actors in the grid being
producers, consumers, or both. AMI is a cost-efficient way to collect accurate readings
based on actual consumption from millions of meters. Smart meters also give utilities
the ability to operate and upgrade every node remotely.
102
3.2 IoT Security in Utilities Challenges
Protection and testing mechanisms are critical in the implementation of any IoT
program. We've highlighted the top security issues you can consider to help you build
more stable and attack-proof internet of things connected devices and applications.
F. Home Intrusion
Home intrusions or home invasions IoT security problem. The idea of "smart houses"
was born as the Internet of Things technologies became a feature of an increasing
number of homes. This home automation poses a significant risk because rogue
devices with weak protection mechanisms can broadcast IP addresses. Hackers could
be able to find the address of the computer owner using so-called Shodan searches.
The potential for misuse is obvious, and it may also lead to the user's address hitting
criminal circles. Connecting with VPNs and protecting login credentials are two ways
to avoid this IoT security violation, which we'll go through later in the post.
A. Device Range
The IoT device's range coverage network is critical. one must be very precise when it
comes to the range metrics for the app or tablet. For example, if you're using Zigbee
technology to control the device's network, one will need to figure out how many
105
repeaters one will need inside a building to give the computer enough connectivity
range. However, one cannot simply add any number of repeaters because the power of
the machine reduces as the number of repeaters increases. As a result, system range
testing would allow one to discover the sweet spot where one can optimize range
without exceeding the limit.
107
Figure 14: IoT Remote Monitoring
4. Digital Twins
A virtual, or simulated real-world object, concept, or area within a digital space, digital
twins are an interesting and powerful use case of IoT. They can even include a 3D
representation of all of the physical assets, operational systems, and structures within
an entire facility. This can help manufacturers test changes and simulate the impact
without actually rolling out any physical changes.
108
Real-time machine monitoring makes this possible, providing a stream of data straight
from the machine control to provide accurate data analytics that can be used for in-
the-moment decision-making or in-depth analysis.
5.0 Conclusion
In conclusion, there are many different types of security issues and infrastructural
challenges in every IoT architecture layer that should be considered for IoT creation
and development. Meanwhile, each IoT security approach is required to have a new
design of security classification. It could be used more easily and accurately to classify
those IoT security threats and vulnerabilities. a four-layered IoT framework for
security architecture is presented. Furthermore, the characteristics and performance of
each layer were identified based on various threats and vulnerabilities, and security
solutions and considerations that could improve security services at each IoT layer
were stated. To have a secure system, it is essential to enhance the basic security
principles in network implementation, including creating a safe and secure network
environment, creating scaled protection, and data protection. As a final point,
considering the future IoT security, standardization of global security mechanisms,
and finding effective and efficient lightweight encryption techniques are described. In
future researches, attention to the important intelligence, active defense systems, and
resource conservation capabilities, comprehensive prevention and information
security improvement, enhanced technology management, ongoing technological
research, and ensuring IoT control capability is needed.
6.0 Summary
We have described the IoT Use Case in Utility Companies especially the Automatic
Smart Metering and Autonomous Vehicle. We also discussed IoT Security in Utility
challenges and IoT security solutions. IoT security in the Manufacturing industry was
also described.
109
7.0 Further Reading
Broadband Internet Technical Advisory Group. (2016). Internet of Things (IoT)
Security and Privacy Recommendations. Retrieved from BITAG website:
https://www.bitag.org/documents/BITAG_Report_-
_Internet_of_Things_(IoT)_Security_and_Privacy_Recommendations.pdf
110
Intertrust: How energy and utility companies can create a secure IoT device
ecosystem, 2021
IoT trends in the utilities industry | Telenor Connexion
IoT use cases for utilities & energy. CBSigfox_UseCase_for_Utilities.pdf
(connectedbaltics.com), 2021
managing-IoT-risks-in-power-and-utilities.pdf (assets.kpmg)
Afzal S, Faisal A., Siddique I., Afzal M. (2021), Internet of Things (IoT) Security:
Issues, Challenges and Solutions. For all IJSER International Journal of Scientific &
Engineering Research Volume 12, Issue 6
IoT in Manufacturing: Top Use Cases and Case Studies (machinemetrics.com), 2021
NXP EdgeLock™ SE050 Use Case: Securing the Industrial IoT, 2021
111
Module 4: Internet of Everything (IoE)
Module Introduction
The internet of everything (IoE) is a broad term that refers to devices and consumer
products connected to the internet and outfitted with expanded digital features. It is a
philosophy in which technology's future is comprised of many different types of
appliances, devices, and items connected to the global internet. The positive impact of
the IoT on citizens, businesses, and governments will be significant, ranging from
helping governments reduce healthcare costs and improving quality of life, to reducing
carbon footprints, increasing access to education in remote underserved communities,
and improving transportation safety.
1.0 Introduction
2.0 Intended Learning Outcomes (ILOs)
3.0 Main Content
3.1 Opportunities with IoT
3.2 Data Analytics With IoT in Business
3.3 Data Analytics With IoT: Business Efficiency
3.4 Industry and IoT
3.5 Use Case: Industry - predictive Maintenance
4.0 Self -Assessment Exercise(s)
5.0 Conclusion
6.0 Summary
7.0 Further Reading
1.0 Introduction
After years of hype, anticipation, and steady uptake, the Internet of Things (IoT) seems
poised to cross over into mainstream business use. The number of businesses that use
IoT technologies has increased from 13 percent in 2014 to about 25 percent today. And
the worldwide number of IoT-connected devices is projected to increase to 43 billion by
2023, an almost threefold increase from 2018
112
2.0 Intended Learning Outcomes (ILOs)
At the end of this unit, you should be able to:
1. describe the Opportunities with IoT in Business
2. discuss the Data Analytics with IoT
3. explain the Preventive and Predictive maintenance
Figure 15: Example of use cases and opportunities for big IoT data analytics
architecture
A. E-commerce
113
Big IoT data analytics offers well-designed tools to process real-time big data, which
produce timely results for decision making. Big IoT data exhibit heterogeneity,
increasing volume, and real-time data processing features. The convergence of big
data with IoT brings new challenges and opportunities to build a smart environment.
Big IoT data analytics has widespread applications in nearly every industry. However,
the main success areas of analytics are in e-commerce, revenue growth, increased
customer size, the accuracy of sale forecast results, product optimization, risk
management, and improved customer segmentation.
B. Smart cities
Big data collected from smart cities offer new opportunities in which efficiency gains
can be achieved through an appropriate analytics platform/infrastructure to analyze
big IoT data. Various devices connect to the Internet in a smart environment and share
information. Moreover, the cost of storing data has been reduced dramatically after the
invention of cloud computing technology. Analysis capabilities have made huge
leaps. Thus, the role of big data in a smart city can potentially transform every sector
of the economy of a nation. Hadoop with the YARN resource manager has offered
recent advancements in big data technology to support and handle numerous
workloads, real-time processing, and streaming data ingestion.
D. Healthcare
Recent years have witnessed tremendous growth in smart health monitoring devices.
These devices generate enormous amounts of data. Thus, applying data analytics to
data collected from fetal monitors, electrocardiograms, temperature monitors, or blood
glucose level monitors can help healthcare specialists efficiently assess the physical
conditions of patients. Moreover, data analytics enables healthcare professionals to
diagnose serious diseases in their early stages to help save lives. Furthermore, data
analytics improves the clinical quality of care and ensures the safety of patients. In
addition, physician profiles can be reviewed by looking into the history of the
114
treatment of patients, which can improve customer satisfaction, acquisition, and
retention.
115
enabling sales staff to focus on selling, by reducing the time and effort required for
data collection and account management tasks. In addition, companies can integrate.
116
3.5 Use Case: Industry -Predictive Maintenance
AGRICULTURE
USE CASES: Real-time crop monitoring and management, soil moisture
monitoring for controlled irrigation, smart usage of fertilizers and pesticides to
manage and reduce environmental impact, equipment scheduling and
maintenance, animal health monitoring, and energy and greenhouse gas
emissions management.
Benefits: Reduction of environmental impact, reduced water, fertilizer, and
pesticide consumption, resource optimization, livestock tracking, augmented
crop productivity as well as numerous operational controls such as tracking
water consumption to enable tariffing and detection of unauthorized water
consumption
MANUFACTURING INDUSTRY
Case Study: Fastenal Uses Real-Time Machine Monitoring to run faster, gain
production hours, take on more jobs, and produce more parts than ever before.
Predictive Maintenance
There are many types of maintenance that manufacturers can employ at their
facilities. As they advance in maturity, they can deploy more advanced forms
of maintenance that are based on data. This data provides insight into the
performance and health of equipment, giving maintenance teams a better
understanding of when equipment needs to be serviced.
With IoT-connected equipment, manufacturers can move from a calendar-based
plan to a condition-based strategy. If manufacturers collect enough data on
equipment performance and health, they can closely monitor variables to
establish a threshold that can predict impending machine failure.
This advanced form of maintenance, predictive maintenance, enables
manufacturers to get the absolute most out of their maintenance spending while
reducing downtime as much as possible.
Production Visibility
The only way for most manufacturers to know what is happening on the shop
floor is to walk out onto the shop floor. Even then it may take some time to
observe the operators and machines to truly understand where performance
stands. They may have to engage with managers, analyze a whiteboard of part
counts, etc.
117
With connected equipment via a machine monitoring solution, manufacturing
leaders, plant managers, and operators have insight into all their machines with
visual dashboards tracking the performance against production goals.
This opens many use cases for optimizing the performance of equipment,
including process optimization, maintenance, and quality.
5.0 Conclusion
The positive impact of the IoT on citizens, businesses, and governments will be
significant, ranging from helping governments reduce healthcare costs and improving
quality of life, to reducing carbon footprints, increasing access to education in remote
underserved communities, and improving transportation safety.
6.0 Summary
Opportunity in IoT Use Cases has discussed and Data Analytics with IoT in Business.
We also explain the Industry and IoT with preventive and predictive maintenances.
118
IoT Data Analytics Report, (2016) Ideya Ltd. /Camrosh Ltd. IOT Analytics Excerpts
Final.pdf (ideya.eu.com)
Marjani M., Nasaruddin F.H., Gani A., Karim A., (2017), Big IoT Data Analytics:
Architecture, Opportunities, and Open Research Challenges (PDF) Big IoT Data
Analytics: Architecture, Opportunities, and Open Research Challenges
(researchgate.net)
1.0 Introduction
The emergence of the Internet of Everything (IoE) technology addressed the rise in
needs for better lifestyles and energy optimization. The growth of portable devices,
such as smartphones and tablets, supports the new technology evolution. The
global Internet of Everything (IoE) market is segmented into hardware, software, and
services based on component type.
120
Figure 17: Top Investment Pockets
Storage System
Automation of processes has significantly improved the operational competency of the
manufacturing industry with reduced turnaround time and high productivity. The
potential for cyber-physical systems to improve productivity in the manufacturing
process and supply chain is enormous. The demand for smart devices that can make
acceptable decisions in the process is expected to increase during the analysis period.
Software, sensors, and wireless connectivity are vital parts of the manufacturing
industry that offer an adequate foundation for the Internet of Everything (IoE).
Manufacturers are investing in Internet of Everything (IoE) technology and solutions
to simplify the processes, produce the maximum outcome, and meet the customers
increasing requirements.
The Healthcare Internet of Everything (IoE) market size is expected to grow at the
highest CAGR during the forecast period. Healthcare Internet of Everything (IoE)
devices include mobile medical applications or wearables that allow patients or
medical experts to capture health data. Hospitals use the Internet of Everything (IoE)
to keep track of the location of medical devices, patients, and personnel.
Advancements in medical technology and the high adoption of healthcare-connected
devices are expected to increase the Internet of Everything (IoE) market share in the
healthcare sector. However, a few factors that negatively impact the market growth
include privacy & security of data, and reliability of devices.
IoE is a major market transition that, by its very definition, will attract the participation
of many companies. However, Cisco is pursuing its research on IoE independently. Of
course, Cisco and its partners will be working with customers to bring IoE to life. How
does Cisco’s concept of the “Internet of Everything” differ from Qualcomm’s?
Qualcomm uses the expression “Internet of Everything” as an umbrella term to define
both the market opportunity associated with increasingly pervasive connectivity and
new sources of information, especially machine-to-machine (M2M) and next-
generation connected consumer devices, as well as the company’s wide-ranging
solutions in this area. With an ecosystem of M2M technology partners, Qualcomm
offers wireless technologies and chipsets for numerous industry-focused IoE
applications, spanning passenger-car telematics, smart energy and security, industrial
and enterprise automation, consumer M2M devices, and others. Cisco’s work on the
Internet of Everything Economy explores the economic and strategic implications of
IoE innovations for companies and looks at many of the same kinds of applications,
such as smart buildings and factories, smart energy grids, intelligent vehicles, and
connected healthcare and patient monitoring.
Internet Of Everything (IoE) has been one of the trendiest topics lately and it’s here,
IoE is the upcoming most innovative and Ubiquitous technology advancement which
123
is going to make networked connections more relevant and valuable than ever before.
Turning information into action creates new capabilities, richer experiences, and
unprecedented economic opportunities for businesses, individuals, and countries.
Technically IoE refers to billions of devices and consumer products connected to the
internet in an intelligent networked environment with expanded digital features.
It is a philosophy in which our technology future is compromised of different types of
appliances, devices, and things connected to the global internet.
As of now, the internet connection is only restricted to Phone’s/Tablet’s, PC’s and a
handful of other devices but the idea behind IoE is that in the future, Machines will
become more intelligent and cognitive by having more access to data and expanded
network opportunities.
In simpler terms, IoE is the intelligent connection of people, processes, data, and
things that will be transforming our world in such a way that there will be billions of
connected devices having sensors to detect, measure and access their status all of
which will be connected over a public or private network built over standard protocols
like TCP/IP.
So how is the; Internet of Everything any different from the Internet of Things?
The difference is the intelligent connection. IoT is mostly about physical devices and
objects communicating with each other but IoE brings with it the network intelligence
to bind all these concepts together into a cohesive system. IoT has been limited to only
machines thus achieving Machine to Machine Communication but IoE brings together
people, processes, data, and things and adds them into the network therefore not just
Phone/tablets and PCs but People. Health Fitness bands, Coffee pots, Marine
containers all become a Node in an intelligent network communicating with each
other. The more expansive IoE concepts include, besides M2M communication, M2P,
and technology-assisted P2P communication. The IoE Economy will profoundly
affect four major Aspects of our lives:
1. People –
People will be connected to the internet in more relevant ways and will be
generating data and interacting with devices not only through
Mobile’s/Tablet’s, PC’s and Social networks but also through Sensors placed
on human skins or sewn into clothing which will provide a person’s vital signs.
In this way, people will themselves becomes Nodes on the internet.
A good example is Nike’s wearable fitness band’s which read a person’s vital signs
and sports apparel and gears embedded with chips that track the performance of
Athletes.
124
2. Things –
Things and physical items such as sensors, industry devices, consumer products,
enterprise assets will be connected to the internet or each other, also fetching
information from its surroundings, will be more context-aware, more cognitive,
more intelligent, often so-called the internet of things.
As of 1984, only 1000 devices were connected to the internet which increased to about
1 million in 1992 and shot across 10 Billion in 2010, and as Cisco predicts there will
be around 50 billion devices connected to the internet by 2020. These devices will be
fetching data from their environment internally or externally and sending it back to the
server for analyzing and making much more intelligent decisions.
3. Data –
Rather than simply collecting Raw data, these connected devices will be sending
higher level, more processed data back to respective servers for faster evaluation
or more intelligent decision making.
Here the data is more about insightful information and action plan than just a random
chunk. Figuring out a way to decipher the right flow of information is the key to
making the best use of Big Data and as the types of data and sources increase, to draw
useful insight’s there will be a need to classify information and analyze it.
4. Process –
With the equivalent to the IOE process, the right information will be delivered
to the right person at the right time in an appropriate way.
Technology-based Businesses will be relying on data to make further decisions
and advance their workflow processes and strategies and will be therefore
competing to leverage the data faster than their competitors for agile and faster
decision making.
General Electrics predicts that IoE can add 15 trillion dollars to the Global Domestic
Product while Cisco estimates 19 trillion in savings and profits for companies that can
leverage IoE. But as the number of devices connected to the internet increase and
therefore collect more data, privacy is put at risk which increases security concerns
but as these devices grow more intelligent, hopes is that the device and network will
grow knowledgeable enough to detect, stop and prevent any harmful threats. IoE is
here and is inevitable, we should embrace ourselves to adapt our lives to the changes
that it brings with it.
1. Saving Lives by Connecting Roads and Hospitals: Traffic crashes influenced the
deaths of around 857 bicyclists in 2018 in the US, according to the US Department of
Transportation some analysts had suggested that these lives could have been saved by
leveraging the IoE. Connecting the helmet of a rider to necessary services like traffic
signals, hospitals, and nearby police stations through sensors, medical treatment can
be provided which can save innumerable lives. This way information about the
patient’s criticality can be directly received by the doctor by tracking a hospital around
the vicinity right away so that the ambulance reaches the spot on time, enabling the
ambulance to interact with the streetlights thus, showing green lights all the way, to
take the victim to the hospital without any obstacles blocking the way, and allows the
doctor to be ready with the essentials by the time patient arrives.
3. Elderly Care: A significant amount of the population is now senior citizenry, and
the needs of this section of people are completely different. There have been numerous
attempts by various academicians and developers to fulfill these needs and to alleviate
their day-to-day hardships. The role of IoE can serve as a solution to these everyday
problems by helping the senior citizens stay active, and keeping them in touch with
their loved ones. There are many robots in the market to nurse the elderly, take care of
their health, give them timely medication and even by conversing with them these
robots can alleviate their mental health issues if any. From assisting them on how to
use smartphones to interact with their loved ones to offering companionship to those
who are struggling with a disturbed mind, these robots provide emotional simulation.
126
4. Connecting Homes for a Comfortable Life: By establishing connections between
different devices and equipment to automate the life processes IoE has innumerable
opportunities to explore. Imagine how you would feel waking up to serene music with
hot coffee beside your bed, imagine a robot feeding and watching your pets timely
when you are not home, imagine a robot that knows your mood, taste, and health status
and cooks accordingly. Imagine a home that adjusts to the outside temperature
automatically. Doesn’t it look like a wonderful and comfortable life? Imagine your
home and life becoming like that one from the Sci-Fi movies you see, like, and desire
to have. No, don’t imagine it is possible with IoE now!
5. Agriculture is No More a Hectic Human Task: Demand for food supply is ever-
increasing with increasing population but the supply even though increasing has
always remained far below the demand. Governments across the world are bringing in
new policies, giving incentives to farmers to equip new technologies, and increasing
their spending in the R&D department to find ways to increase food production. Smart
farming has always been in news but despite limited trials, it has never been employed
on a full scale. To yield better results on investment for farmers, to eradicate hunger,
and to reduce the demand-supply gaps smart farming is the way to go. From assisting
the farmers in sensing the soil moisture, nutrient content, and controlling the water
usage to connecting the farmers directly to the markets IoE has the potential to become
an enabling factor in transforming the agriculture sector.
Not only that but IoE has also been implemented in the building of ERP software
platforms like SAP Cloud Platform. This is used as an extension and integration
platform for the running of various applications. SAP Fiori applications support the
consumer goods system and enhance the sales process. It is all about reconnecting and
re-engaging various service lines to remodel the business.
Pros: In this section, let us have a look at some benefits of the Internet of everything.
1. Information access- Information accessibility will now become a hassle-free
task despite your location. The network of devices makes it easy for you to
access information from any corner of the earth.
2. Communication- Better communication with interconnected devices with
reduced inefficiencies.
3. Affordability- The same data that once took hours to transfer will now be done
within no time hence negligibly reducing the delay and hence reducing the costs
involved.
4. Automation- Automation has become the buzzword and has been intriguing
humankind for quite a long time. This helps reduce human intervention and
boosts the quality of services.
Cons: In this section, let us have a look at all the cons of the Internet of everything:
1. Privacy and security- There are a lot of “what ifs” and “buts” in the case of
security and privacy. The leakage of data has always been a matter of concern.
The privilege of technology comes at the cost of security. This is a major
drawback but can be overcome with adequate measures and safety protocols.
Data breaches and issues in law enforcement regarding the “deep web” have
blown out in the world Recently, testimony has been held against Facebook
accused of leakage of data.
2. Dependability- Technology has made us depend on it even for small tasks,
making humans lazy and killing creativity in humans. The impact of technology
is paramount in our everyday life processes
There are other obstacles like the availability of finance for the purpose and availability
of power the entire time.
5.0 Conclusion
The fusion of IoT and Big Data and the role of real-time analytics in IoT is an emerging
technology that can drive a new wave of application of analytics into the regular
129
routines of humans. The scalability of IoT would lead to smarter applications in
various domains ranging from health care to smart and secure homes. The actionable
intelligence obtained by the application of real-time analytics on the data or “Big Data”
of IoT is one of the main benefits of IoT. To tap into the advantages of IoT, Big Data
analytics is needed. Even though it may feel like IoE has covered as much ground as
it can, IoE has been mapping new territories enhancing its implementations, and
expanding unexpectedly. Signaling more connectivity from cars, electronic gadgets,
and toys to traffic lights and home security systems IoE facilitates connectivity
between a range of internet-supported physical devices and non-internet supportive
devices. With this emerging involvement of IoE in almost every field, many other
technologies can be expected to naturally wane out of the process.
Beyond just pure technological concepts for academicians, IoE is capable of
transforming the socio-cultural fabric of the world by connecting people and
processes.
6.0 Summary
At the end of this unit, we have described the overview of the Internet of Everything
and its uses cases. The future work was also described.
130
http://www.cisco.com/web/solutions/trends/IoT/overview.html
http://time.com/#539/the-next-big-thing-for-tech-the-internet-of-everything/
http://www.gartner.com/newsroom/id/2621015
http://www.livemint.com/Specials/34DC3bDLSCItBaTfRvMBQO/Internet-of-
Everything-gains-momentum.html
http://www.tibco.com/blog/2013/10/07/gartners-internet-of-everything/
http://www.eweek.com/small-business/internet-of-everything-personal-worlds-
creating-new-markets-gartner.html
131