Internet of Things: 18 MCA 5 4 E
Internet of Things: 18 MCA 5 4 E
Internet of Things: 18 MCA 5 4 E
4E
FACULTY UNIT – I INTRODUCTION
Objective: On Successful Completion of the Course the students should have understood IOT Protocols,
Web of Things, Network Dynamics applications.
UNIT I:
Introduction: Definitions and Functional Requirements – Motivation – Architecture. The Toolkit
Approach for End-user Participation in the Internet of Things. Web 3.0: View of IOT – Ubiquitous
IOT Applications – Four Pillars of IOT – DNA of IOT – Middleware for IOT: Overview –
Communication Middleware for IOT – IOT Information Security.
(Book 1 | Chapter 1 & 4; Book 2 | Chapter 1 to 5)
UNIT II:
IOT Protocol Standardization Efforts: M2M and WSN Protocols – SCADA and RFID Protocols –
Issues with IOT Standardization – Unified Data Standards. Protocols IEEE 802.15.4 – BACnet
Protocol – ModBus – KNX – Zigbee Architecture: Network Layer – APS layer – Security.
(Book 2 | Chapter 6; Book 3 | Chapter 1, 3, 5, 6, 7)
UNIT III:
Web of Things: Web of Things versus Internet of Things – Two Pillars of the Web. Architecture
Standardization for WOT: Platform Middleware for WOT – Unified Multitier WOT Architecture –
WOT Portals and Business Intelligence. Cloud Computing: Grid/SOA and Cloud Computing – Cloud
Middleware – Cloud Standards – Cloud Providers and Systems. The Cloud of Things: Mobile Cloud
Computing – The Cloud of Things Architecture.
(Book 2 | Chapter 6.1, 7 to 9)
UNIT IV:
Integrated Billing Solutions in the Internet of Things – Business Models for the Internet of Things.
Network Dynamics: Population Models: Information Cascades – Network Effects. Network
Dynamics: Structural Models: Cascading Behavior in Networks – The Small-World Phenomenon.
(Book 1 | Chapter 9 & 10; Book 4 | Chapter 16, 17, 19, 20)
UNIT V:
The Role of the Internet of Things for Increased Autonomy and Agility in Collaborative
Production Environments – Resource Management in the Internet of Things: Clustering,
Synchronization and Software Agents. Smart Grid – Electrical Vehicle Charging.
(Book 1 | Chapter 7 & 8; Book 3 | Chapter 15, 16)
TEXT BOOKS:
1. Dieter Uckelmann; Mark Harrison; Florian Michahelles, “Architecting the Internet of Things”,
Springer 2011. 2. Honbo Zhou,”The Internet of Things in the Cloud: A Middleware Perspective”, CRC
Press 2012. 3. Olivier Hersent, Omar Elloumi and David Boswarthick, “The Internet of Things:
Applications to the Smart Grid and Building Automation”, Wiley 2012.
4. David Easley and Jon Kleinberg, “Networks, Crowds, and Markets: Reasoning About a Highly
Connected World”, Cambridge University Press, 2010.
INTRODUCTION TO IOT
IoT comprises things that have unique identities and are connected to internet. By 2020 there will
be a total of 50 billion devices /things connected to internet. IoT is not limited to just connecting things
to the internet but also allow things to communicate and exchange data.
DEFINITION:
• The Internet of Things, also called The Internet of Objects, refers to a wireless network between
objects, usually the network will be wireless and self-configuring, such as household appliances.
Internet of Things (IoT) is the networking of physical objects that contain electronics
embedded within their architecture in order to communicate and sense interactions
amongst each other or with respect to the external environment. In the upcoming years,
IoT-based technology will offer advanced levels of services and practically change the
way people lead their daily lives. Advancements in medicine, power, gene therapies,
agriculture, smart cities, and smart homes are just a very few of the categorical
examples where IoT is strongly established.
Over 9 billion ‘Things’ (physical objects) are currently connected to the Internet, as of
now. In the near future, this number is expected to rise to a whopping 20 billion.
There are four main components used in IoT:
1. Low-power embedded systems: Less battery consumption, high performance are
the inverse factors that play a significant role during the design of electronic
systems.
2. Cloud computing: Data collected through IoT devices is massive and this data has
to be stored on a reliable storage server. This is where cloud computing comes into
play. The data is processed and learned, giving more room for us to discover where
things like electrical faults/errors are within the system.
3. Availability of big data: We know that IoT relies heavily on sensors, especially in
real-time. As these electronic devices spread throughout every field, their usage is
going to trigger a massive flux of big data.
4. Networking connection: In order to communicate, internet connectivity is a must
where each physical object is represented by an IP address. However, there are only
a limited number of addresses available according to the IP naming. Due to the
growing number of devices, this naming system will not be feasible anymore.
Therefore, researchers are looking for another alternative naming system to
represent each physical object.
There are two ways of building IoT:
1. Form a separate internetwork including only physical objects.
2. Make the Internet ever more expansive, but this requires hard-core technologies
such as rigorous cloud computing and rapid big data storage (expensive).
In the near future, IoT will become broader and more complex in terms of scope. It will
change the world in terms of
“anytime, anyplace, anything in connectivity.”
IoT Enablers:
RFIDs: uses radio waves in order to electronically track the tags attached to each
physical object.
Sensors: devices that are able to detect changes in an environment (ex: motion
detectors).
Nanotechnology: as the name suggests, these are extremely small devices with
dimensions usually less than a hundred nanometers.
Smart networks: (ex: mesh topology).
Characteristics of IoT:
Massively scalable and efficient
IP-based addressing will no longer be suitable in the upcoming future.
An abundance of physical objects is present that do not use IP, so IoT is made
possible.
Devices typically consume less power. When not in use, they should be automatically
programmed to sleep.
A device that is connected to another device right now may not be connected in
another instant of time.
Intermittent connectivity – IoT devices aren’t always connected. In order to save
bandwidth and battery consumption, devices will be powered off periodically when
not in use. Otherwise, connections might turn unreliable and thus prove to be
inefficient.
As a quick note, IoT incorporates trillions of sensors, billions of smart systems, and
millions of applications.
Application Domains: IoT is currently found in four different popular domains:
1) Manufacturing/Industrial business - 40.2%
2) Healthcare - 30.3%
3) Security - 7.7%
4) Retail - 8.3%
Modern Applications:
1. Smart Grids and energy saving
2. Smart cities
3. Smart homes
4. Healthcare
5. Earthquake detection
6. Radiation detection/hazardous gas detection
7. Smartphone detection
8. Water flow monitoring
9. Traffic monitoring
10. Wearables
CHARACTERISTICS:
1) Dynamic & Self Adapting: IoT devices and systems may have the capability to dynamically adapt
with the changing contexts and take actions based on their operating conditions, users’ context or
sensed environment. E.g.: the surveillance system is adapting itself based on context and changing
conditions.
2) Self-Configuring: allowing a large number of devices to work together to provide certain
functionality. 3) Inter Operable Communication Protocols: support a number of interoperable
communication protocols ans can communicate with other devices and also with infrastructure.
4) Unique Identity: Each IoT device has a unique identity and a unique identifier (IP address). 5)
Integrated into Information Network: that allow them to communicate and exchange data with other
devices and systems.
IOT FUNCTIONAL REQUIREMENTS:
Functional requirements define the products and features that the IoT system must deliver. There
are seven categories of requirements to consider when developing any IoT initiative for private or public
institutions. 1. Feature requirements: What are the high-level expectations of the solution? This is the
general goal of the initiative.
2. Business requirements: This is a description of the new or improved capabilities the user must be
able to do as a result of the new system.
3. Nonfunctional requirements: This defines the service level expectations of the system such as
availability, reliability, scalability, security, backup, and disaster recovery.
4. Functional requirements: This is a description of the functions that the user requires from the system.
It should contain a process model, data entities, user stories, and use cases.
5. System design requirements: This defines the interaction of the IoT system with other systems.
6. IoT data management requirements: This describes how the data will be ingested and analyzed. The
following four areas need to be defined:
● Ingestion: how the data will be collected and integrated into one data source
● Analytics: defines the predictive analytics models and data analysis requirements
● Communications: who needs to be informed when an alarm is identified
● Persistence: defines how long the data needs to be retained
7. Reports and dashboards: This defines the reports and dashboards that users need to rapidly analyze
and respond to data collected.
MOTIVATION OF IOT:
IoT systems allow users to achieve deeper automation, analysis, and integration within a system.
They improve the reach of these areas and their accuracy. IoT utilizes existing and emerging technology
for sensing, networking, and robotics.
IoT exploits recent advances in software, falling hardware prices, and modern attitudes towards
technology. Its new and advanced elements bring major changes in the delivery of products, goods, and
services; and the social, economic, and political impact of those changes.
IOT − KEY FEATURES
The most important features of IoT include artificial intelligence, connectivity, sensors, active
engagement, and small device use. A brief review of these features is given below;
● AI − IoT essentially makes virtually anything “smart”, meaning it enhances every aspect of life with
the power of data collection, artificial intelligence algorithms, and networks. This can mean
something as simple as enhancing your refrigerator and cabinets to detect when milk and your
favorite cereal run low, and to then place an order with your preferred grocer.
● Connectivity − New enabling technologies for networking, and specifically IoT networking, mean
networks are no longer exclusively tied to major providers. Networks can exist on a much smaller
and cheaper scale while still being practical. IoT creates these small networks between its system
devices.
● Sensors − IoT loses its distinction without sensors. They act as defining instruments which transform
IoT from a standard passive network of devices into an active system capable of real-world integration.
● Active Engagement − Much of today's interaction with connected technology happens through passive
engagement. IoT introduces a new paradigm for active content, product, or service engagement. ● Small
Devices − Devices, as predicted, have become smaller, cheaper, and more powerful over time. IoT
exploits purpose-built small devices to deliver its precision, scalability, and versatility.
IOT ARCHITECTURE:
There is not such a unique or standard consensus on the Internet of Things (IoT) architecture which is
universally defined. The IoT architecture differs from their functional area and their solutions. However,
the IoT architecture technology mainly consists of four major components:
● Sensors/Devices
● Gateways and Networks
● Cloud/Management Service Layer
● Application Layer
Figure 1: IoT Architecture
STAGES OF IOT SOLUTIONS ARCHITECTURE
There are several layers of IoT built upon the capability and performance of IoT elements that provides
the optimal solution to the business enterprises and end-users. The IoT architecture is a fundamental way
to design the various elements of IoT, so that it can deliver services over the networks and serve the
needs for the future.
Following are the primary stages (layers) of IoT that provides the solution for IoT architecture. ●
Sensors/Actuators: Sensors or Actuators are the devices that are able to emit, accept and process data
over the network. These sensors or actuators may be connected either through wired or wireless. This
contains GPS, Electrochemical, Gyroscope, RFID, etc. Most of the sensors need connectivity through
sensors gateways. The connection of sensors or actuators can be through a Local Area Network (LAN)
or Personal Area Network. ● Gateways and Data Acquisition: As the large numbers of data are produced
by this sensors and actuators need the high-speed Gateways and Networks to transfer the data. This
network can be of type Local Area Network (LAN such as Wi-Fi, Ethernet, etc.), Wide Area Network
(WAN such as GSM, 5G, etc.). ● Edge IT: Edge in the IoT Architecture is the hardware and software
gateways that analyze and pre-process the data before transferring it to the cloud. If the data read from
the sensors and gateways are not changed from its previous reading value then it does not transfer over
the cloud, this saves the data used. ● Data center/ Cloud: The Data Center or Cloud comes under the
Management Services which process the information through analytics, management of device and
security controls. Beside this security controls and device management the cloud transfers the data to the
end user’s application such as Retail, Healthcare, Emergency, Environment, and Energy, etc.
Internet of Things (IoT) technology has a wide variety of applications and use of Internet
of Things is growing so faster. Depending upon different application areas of Internet of
Things, it works accordingly as per it has been designed/developed. But it has not a
standard defined architecture of working which is strictly followed universally. The
architecture of IoT depends upon its functionality and implementation in different
sectors. Still, there is a basic process flow based on which IoT is built.
So. here in this article we will discuss basic fundamental architecture of IoT i.e., 4 Stage
IoT architecture.
So, from the above image it is clear that there is 4 layers are present that can be divided
as follows: Sensing Layer, Network Layer, Data processing Layer, and Application
Layer.
These are explained as following below.
1. Sensing Layer –
Sensors, actuators, devices are present in this Sensing layer. These Sensors or
Actuators accepts data(physical/environmental parameters), processes data and
emits data over network.
2. Network Layer –
Internet/Network gateways, Data Acquisition System (DAS) are present in this layer.
DAS performs data aggregation and conversion function (Collecting data and
aggregating data then converting analog data of sensors to digital data etc).
Advanced gateways which mainly opens up connection between Sensor networks
and Internet also performs many basic gateway functionalities like malware
protection, and filtering also some times decision making based on inputted data and
data management services, etc.
3. Data processing Layer –
This is processing unit of IoT ecosystem. Here data is analyzed and pre-processed
before sending it to data center from where data is accessed by software
applications often termed as business applications where data is monitored and
managed and further actions are also prepared. So here Edge IT or edge analytics
comes into picture.
4. Application Layer –
This is last layer of 4 stages of IoT architecture. Data centers or cloud is
management stage of data where data is managed and is used by end-user
applications like agriculture, health care, aerospace, farming, defense, etc.
1. M2M:
● Machine to Machine.
● Enables flow of data between machines which monitors data by means of sensors and at other end
extracts the information on gathered data and processes it.
● Subset of IoT.
● It uses WAN, GPRS, Cellular and Fixed N/w’s
This is commonly known as Machine to machine communication. It is a concept where
two or more than two machines communicate with each other without human
interaction using a wired or wireless mechanism. M2M is an technology that helps the
devices to connect between devices without using internet. M2M communications
offer several applications such as security, tracking and tracing, manufacturing and
facility management.
2. RFID:
● Radio Frequency Identification
● Uses radio frequency to read and capture information stored on a tag attached to an object. ● A tag can
be read from up to several feet away and does not need to be within direct line-of-sight of the reader to
be tracked.
● Uses NFC (Next Field Communication protocol), IC (Integrated Circuit) Cards, Radio Waves.
RFID stands for “radio frequency identification.” It’s a technology that captures
digital data encoded in smart labels and RFID tags through a reader via radio
waves.
RFID serves a similar purpose to that of a bar code or a magnetic strip of an ATM
card where data from a label or tag is captured by the device and then later stored
in the database.
However, RFID works better than a barcode and ATM magnetic strips. The most
significant advantage of using RFID over barcode is that it doesn’t need to be placed
or positioned relative to the scanner.
The other advantage is that with RFID, you can scan more than one object at a time,
unlike a barcode, which saves loads of time and energy.
We have all seen the kind of struggle that clerks go through at stores when
ensuring the position of the barcode is set in a way that can be read.
Moreover, ATM cards also need to be swiped through a special reader.
RFID solves all these issues since it works within the few feet of the scanner. For
instance, to scan a bag full of groceries, all you need to do is to set the bag on the
scanner without worrying about its proper positioning or placing.
Moreover, the clerk doesn’t have to scan objects one by one like in the case of a
barcode.
RFID Tag
An RFID tag consists of an embedded transmitter and a receiver. RFID component
comprises two parts:
Integrated circuit: It’s used for storing and processing the information.
Antenna: It’s used to transmit and receive signals.
RFID tags also have non-volatile memory storage, which includes either
programmable or fixed logic for sensor data and transmission. Tags can be
categorized as:
Passive: This tag remains dormant since it has no battery. It uses the reader’s
signal energy to turn on the tag along with reflecting a signal back to the
reader that carries the information.
Active: Active RFID tags have a battery in it that transmits signals
periodically. These tags have a range of up to 100 meters due to the presence
of a battery. Due to this, active tags are useful in location tracking
applications.
Battery-assistive passive: These tags do contain a battery, but it doesn’t
transmit signals periodically like that of active RFID tags.
The battery is used to turn the tag when it receives a signal, which enables all the
energy from the reader’s signal to reflect.
RFID Reader
An RFID reader consists of an interrogator, which is nothing but a two-way radio-
transmitted receiver, also known as a transceiver.
The prime function of a transceiver is to transmit an encoded signal that activates
the tag.
In response, the tag transponder initiates the conversion of radio signals into
usable power along with responding to the reader.
3. SCADA
● Supervisory means top level.
● Control means controlling things.
● Data Acquisition means acquiring the data / reading the data.
● SCADA is a s/w used to control the hardware i.e., PLC, drives, servers, sensors and also acquire the
data which is stored on the personal computer or Human Machine Interface (HMI).
SCADA stands for Supervisory Control And Data Acquisition.
SCADA software system is a device monitoring and controlling framework. The supervisory
control includes, taking action and control through remote locations for various control
mechanisms and processes.
Various kinds of data can be acquired from network of devious (connected through
wireless/wired communication systems) for storage, processing and analytics to aid decision
making.
Frontend of a SCADA software solution is a graphical user interface (GUI/UI).
In a nutshell, a SCADA software solution is a real time monitoring, supervision and control
system from remote and/or local physical location.
Let’s try to understand the functional blocks of a SCADA based IoT system, with the help of the
simplified IoT framework as shown above
The User Interface(UI) of Mobile App or Web based dashboard represented above is the
HMI of the SCADA system.
This, along with the backend business logic, database (cloud server) and a Gateway
constitutes of a SCADA solution for control and monitoring of devices in an IoT network.
The IoT gateway ensures compatibility between IoT sensor network and cloud server.
Through the gateway, the sensor data is stored in the cloud server.
The cloud server is the hosting spot for the algorithms that implement the business logic.
The sensor unit detects the change in the environment like change in temperature, sound
and also acts as a data accumulating unit.
There can be a number of devices or machines connected within a SCADA solution based IoT
project. For an instance, in case of home automation system, various home appliances such as
AC, lights, refrigerator can be a part of connected smart home.
Hence SCADA solution is an intelligent software system with an intuitive UI (for data
representation) connected with cloud server for data processing and predictive and descriptive
analysis.
Let us see the detailed features of a SCADA software system
4. WSN
● Wireless Sensor Networks.
● It senses and gathers data using sensors which are spatially distributed.
● It collects this data into a centralized location with the help of wired / wireless
connection.
Wireless Sensor Network (WSN) is an infrastructure-less wireless network that is
deployed in a large number of wireless sensors in an ad-hoc manner that is used to
monitor the system, physical or environmental conditions.
Sensor nodes are used in WSN with the onboard processor that manages and monitors
the environment in a particular area. They are connected to the Base Station which acts
as a processing unit in the WSN System.
Base Station in a WSN System is connected through the Internet to share data.
WSN can be used for processing, analysis, storage, and mining of the data.
Applications of WSN:
1. Internet of Things (IOT)
2. Surveillance and Monitoring for security, threat detection
3. Environmental temperature, humidity, and air pressure
4. Noise Level of the surrounding
5. Medical applications like patient monitoring
6. Agriculture
7. Landslide Detection
Challenges of WSN:
1. Quality of Service
2. Security Issue
3. Energy Efficiency
4. Network Throughput
5. Performance
6. Ability to cope with node failure
7. Cross layer optimisation
8. Scalability to large scale of deployment
Components of WSN:
1. Sensors:
Sensors in WSN are used to capture the environmental variables and which is used
for data acquisition. Sensor signals are converted into electrical signals.
2. Radio Nodes:
It is used to receive the data produced by the Sensors and sends it to the WLAN
access point. It consists of a microcontroller, transceiver, external memory, and
power source.
3. WLAN Access Point:
It receives the data which is sent by the Radio nodes wirelessly, generally through
the internet.
4. Evaluation Software:
The data received by the WLAN Access Point is processed by a software called as
Evaluation Software for presenting the report to the users for further processing of
the data which can be used for processing, analysis, storage, and mining of the data.
DNA OF IOT
DNA Connectivity IoT subscriptions are intended for corporate data transfer between sensors, devices
and systems when mobile data transfer is required. We provide this service in 2G, 3G and 4G networks.
Subscriptions can be easily and comprehensively managed via the DNA Control Center (a user interface
provided by Cisco Jasper).
IoT subscriptions use DNA’s nationwide mobile network. Mobile subscriptions are particularly
suitable for connecting IoT devices located over a wide area – from large properties or factory buildings
to cities – or where devices are in mobile use. IoT subscriptions make use of the mobile network’s
advanced information security features. The mobile network combines the reliability and continuity of
an established technology with predictable development according to mobile technology standards.
SIM cards with various physical characteristics are available to suit the different user cases and
devices. Subscriptions can be integrated into secure company-specific APN solutions, and an
international roaming feature can also be added if you want to use the connections outside Finland.
The DNA of IoT
4.1 DCM: Device, Connect, and Manage
The first issue that the Internet of Things (IoT) ecosystem needs to address is the long and fragmented
value chain that characterizes the industry. This results in numerous supplier–buyer interfaces, adding costs
and time to the launch of any new product offering.
Just like the blind men and the elephant story and people’s understanding of the four pillars or the six
pillars mentioned before, the IoT is still different things to different people, even though introduced more
than a decade ago. However, there is one thing most people agree with: IoT (or machine-to-machine,
M2M; wireless sensor networks, WSN; supervisory control and data acquisition, SCADA; radio-frequency
identification, RFID; etc.) systems all have three layers. Figure 4.1 is an example IoT application of an
intelligent nuclear power plant IoT system [63] of Datang Telcom in China. More examples of the three-
layer architecture of IoT can be found at European Telecommunications Standards Institute (ETSI)’s
website
The three-layer DCM classification is more about the IoT value chain than its system architecture at
runtime. For system architecture, some (e.g., one of Numerex’s and IBM’s reports) have divided the IoT
system into as many as nine layers, from bottom to top: devices, connectivity, data collection,
communication, device management, data rules, administration, applications, and integration.
While large companies such as IBM, Oracle, Microsoft, and others have comprehensive solutions,
products, and services that cover almost the entire value chain, startups or smaller players in the IoT sector
should focus on providing products or services in no more than two components or areas in the value chain.
The following sections discuss the three DCM components.
Sensor Type
Sensors (Examples)
(Examples)
Sensor Type
Sensors (Examples)
(Examples)
Acoustic, sound,
Geophone, hydrophone, lace sensor, microphone, seismometer
vibration
Air flow meter, anemometer, flow sensor, gas meter, mass flow
Flow, fluid velocity
sensor, water meter
Microelectromechanical systems (MEMS) is the technology of very small mechanical devices driven by
electricity. It merges at the nanoscale into nanoelectromechanical systems (NEMS) and nanotechnology.
MEMS are also referred to as micromachines in Japan, or microsystems technology in Europe. MEMS can
be a sensor or actuator, or a transducer.
Energy harvesting (also known as power harvesting or energy scavenging) is the process by which
energy is derived from external sources (e.g., solar power, thermal energy, wind energy, salinity gradients,
and kinetic energy), captured, and stored for small wireless autonomous devices, like those used in
wearable electronics and WSNs. Energy-harvesting devices or sensors have a very long historical
connection to the water wheel, windmills, and waste heat. Before batteries (Volta, 1799) and the dynamo
(Faraday, 1831), those energy-harvesting devices were the only ways to get any useful power. The
following are options for energy harvesting:
RF, used for RFID tag energy broadcasting and harvesting
Solar, a well-known clean energy
Thermoelectric, used in watches
Vibrations, used in (kinetic) watches
Human input, home utility (piezoelectric) switches
Today, there is an accelerated interest in the information and communications technology (ICT)
community for powering ubiquitously deployed sensor networks, mobile electronics, electric vehicles, and
so on. Many things become possible as this technolgy improves.
DLMS/IEC 62056
ANSI C12.18
IEC 61107
Automatic meter
reading
Modbus
M-Bus
U-SNAP [191]
IDB-1394
SMARTwireX
Wire—from Dallas/Maxim
Building, home
automation
BACnet—designed by committee ASHRAE
S-Bus
C-Bus
DALI
DSI
Dynet
oBIX—OASIS Standard
xAP—Open protocol
MTConnect
OPC
OPC UA
Industrial control
system
AS-Interface (Actuator Sensor Interface)—an industrial
networking solution used in PLC, DCS, and PC-based systems
IEC 61850
IEC 60870-5
Profibus
DF-1
PROFINET IO
EtherCAT
HART
Modbus Plus
Modbus PEMEX
Sinec H1—Siemens
SynqNet—Danaher
TTEthernet—TTTech
The graphic (the CIP family of field bus protocols) in [219, first page] compares some of the field buses
against the OSI model. In the past, automation field bus protocols have tended to be application specific,
making them very efficient at what they do but limiting the roles for which they can be used, and making
interoperability between the protocols used in different application areas difficult to achieve. The Common
Industrial Protocol (CIP) forms the basis for a family of related technologies and has numerous benefits for
both device manufacturers and the users of industrial automation systems. The first of the CIP-based
technologies, DeviceNet, emerged in 1994 and is an implementation of CIP over CAN, which provides the
data link layer for DeviceNet.
PHASE 1: EPLORATION:
The first phase of the toolkit is "exploration". This phase begins with the iteration "understand", and
forms the basis for understanding the context, problem, and users. Followed by the second iteration
"discover" that is characterized by immersion in the situation, empathizing with the users and observing
them, leading to discoveries of new ideas and insights. Having reached a level of understanding,
combined with discoveries of ideas and insights, the third iteration "define" consists of framing these
insights into well- defined opportunities and needs, pain points and positive experiences of the users.
The entire process is iterative, and all these different processes
overlap and repeat throughout, and that is especially true for the "think" iteration. Here this toolkit
provides you with concrete ideation techniques and brainstorming tools which are helpful throughout the
entire journey. Finally, in the "conceptualize" iteration all the insights are gathered and ideas are
examined, combined, visualized and framed into a complete concept.
PHASE 2: EXPERIMENTATION:
Having formed a concept in the previous phase, it's now time to put it to the test. First, the "plan &
engage" activities are considered important at the beginning of experimentation, to ensure sustainable
end-user involvement. With careful planning the piloting or experimentation activities can be carried out
in an engaging manner, keeping the stakeholders involved and informed throughout the process. The
following "prototype" iteration consists of building and creating a prototype. Prototypes can take on
many forms, from tangible MVPs (Minimum Viable Products) to intangible service or experience design
prototypes, but the main goal of the
prototype is always the same: to "test" it in the third iteration. The purpose of building a prototype is to
find answers, discover new insights and ideas, and to filter and measure the assumptions made.
Therefore, these two iterations are often repeated numerous times, bringing you back to the first phase of
exploration for new insights, ideas and concepts – by debunking your assumptions or validating insights.
Once a well-defined, tested and validated prototype has come out from the many iterations throughout
the processes, the process of "pre-launch" has to do with analyzing, validating, distilling and
orchestrating the upcoming launch of the prototype. The "develop" iteration continues to develop, deploy
and generate the prototype into a product or service.
PHASE 3: EVALUATION:
Many of the toolkits available across the various sources have focused on the previous two phases, but
the third phase of evaluation is equally important. Beginning with the first iteration "launch", the final
prototypes, products and services are realized and delivered. Very similarly, the second iteration
"implement" refers to delivering to the stakeholders, but further so, focuses on the process of fully
implementing the product/service and explaining
its importance and impact for the context. The third iteration "Identify" finally identifies the outcome of
the process and ensures the ongoing sustainability of the product/service in the future. LSPs looking for
tools that serve in answering to their current needs can use the filters below to display the specific tools
relating to each of the tracks: 1. use cases, 2. co-creation, 3. prototyping & testing, 4. user research. A
selection can also be made according to the skill level, effort needed and overall level of difficulty in
using the tool: beginner, intermediate, advanced.
IOT MIDDLEWARE:
Internet of Things middleware is software that serves as an interface between components of the IoT,
making communication possible among elements that would not otherwise be capable.
Middleware connects different, often complex and already existing programs that were not
originally designed to be connected. The essence of the Internet of Things is making it possible for just
about anything (any Thing) to be connected and to communicate data over a network. Middleware is part
of the architecture enabling connectivity for huge numbers of diverse Things by providing a connectivity
layer for sensors and also for the application layers that provide services that ensure effective
communications among software.
MuleSoft, Oracle, RedHat and WSO2 are among the companies that offer IoT middleware. These
products provide API management as well as basic messaging, routing and message transformation.
More comprehensive IoT platforms include middleware along with sensors and networking components.
What is middleware?
Middleware is software that serves as an interface between components of the IoT, making communication
possible among elements that would not otherwise be capable. Often described as “software glue,”
middleware makes it easier for software developers to implement communication and input/output so that
they can shift their focus to the specific purpose of their application.
Examples of middleware:
1. OpenIot
2. Middlewhere
3. FiWare
Middleware enables connection between complex programs that were not initially designed to be
connected, which makes it an integral part of the supporting architecture. There are many reasons why
middleware is needed to connect autonomous devices:
3. Security
IoT devices have a strong integration into our personal lives. As the sales of smartwatches, smart pillows,
and voice commanded shower controls accelerate, security and privacy issues should also be addressed.
The middleware supporting IoT should have certain security controls, including user authentication and
access control management.
4. Cloud services
As the cloud is an integral part of IoT deployment, it is imperative for IoT middleware to have the potential
to run on various types of clouds.
IoT devices are reshaping how future services are going to be defined. Instead of reinventing the wheel,
enterprises must take a look at pre-built middleware that provides a connection between autonomous
devices.
https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.1071.5409&rep=rep1&type=pdf
IOT INFORMATION SECURITY:
The sheer volume of Internet of Things devices makes their security a high priority and is crucial for the
future wellbeing of the internet ecosystem.
For device users, this means abiding by basic security best practices, such as changing default
security passwords and blocking unnecessary remote access (e.g., when not required for a device’s
functionality). Vendors and device manufacturers, on the other hand, should take a broader approach and
invest heavily in securing IoT management tools. Steps that should be taken include:
● Proactively notifying users about devices running outdated software/OS versions.
● Enforcing smart password management (e.g., mandatory default password
changes). ● Disabling remote access to a device, unless it’s necessary for core
functions.
● Introducing a strict access control policy for APIs.
● Protecting C&C centers from compromise attempts and DDoS attacks.
Imperva cloud WAF helps IoT manufacturers protect their C&C centers by providing on-edge traffic
filtering services that ensure only authorized and authenticated client requests are allowed to reach their
APIs. Combining industry-leading WAF services and DDoS mitigation solutions, Imperva cloud WAF is
able to secure its users against all online threats and efficiently handle multi-versioning from different
devices. For added reliability, the service is also equipped with load balancing and failover features that
help operators handle organic traffic spikes, such as the kind that can occur upon the
release of a new firmware patch.
Definition
Internet of Things (IoT) security is the safeguards and protections for cloud-connected devices such as
home automation, SCADA machines, security cameras, and any other technology that connects directly to
the cloud. IoT technology is distinguished from mobile devices (e.g., smartphones and tablets) technology
based on its automatic cloud connectivity in gadgets. IoT security involves securing traditionally poorly
designed devices for data protection and cybersecurity. Recent data breaches have shown that IoT security
should be a priority for most manufacturers and developers.
For regular users, smart homes demonstrate just how accessible IoT devices are.
Users can update their home’s security system (through smart locks, IP cameras, and
motion sensors) or improve their entertainment system (through a smart TV, smart
speakers, and connected game consoles) by simply buying such devices. IoT devices
are also often portable and can be connected to any network. A typical example is
how users bring their devices from their homes to the office (e.g. smart watches and e-
readers).
While diversity can give users countless devices to choose from, it is one of the
reasons behind the fragmentation of the IoT and carries many of its security concerns.
The lack of industry foresight and standardization has given rise to compatibility issues
that also complicate the matter of security. The portability of devices presents a
greater possibility of threats poisoning more than one network. Compounding to these
concerns are other factors that IoT security must address.
IoT security is critical largely because of the expanded attack surface of threats that
have already been plaguing networks. Adding to these threats are insecure practices
among users and organizations who may not have the resources or the knowledge to
best protect their IoT ecosystems.
Emerging issues
The lack of industry foresight gave little time to develop strategies and defenses
against familiar threats in growing IoT ecosystems. Anticipating emerging issues is
one of the reasons research on IoT security must be done continuously. Here are
some of the emerging issues that need to be monitored:
Aside from the threats themselves, their consequences in the context of the IoT can
be much more damaging to deal with. The IoT has the unique capability of affecting
both virtual and physical systems. Cyberattacks on IoT ecosystems could have far
more unpredictable effects because they translate more easily into physical
consequences. This is most prominent in the field of industrial internet of things (IIoT),
where past cyberattacks had already demonstrated cascading consequences. In the
healthcare industry, IoT devices are already being utilized to remotely monitor
patients’ vital signs and has proven very helpful during the pandemic. Attacks on such
devices can expose sensitive patient information or even endanger their health and
safety. In the smart home, exposed devices could allow cybercriminals to monitor the
household, compromise security devices like smart locks, and turn devices against
their owners, as was the case when a baby monitor and a smart thermostat were
hacked in separate attacks.
Aside from employing these security practices, users should also be aware of new
developments in the technology. IoT security has been given heavier consideration in
recent times. Research is continually being done on how to secure specific industries,
monitor IoT-related threats, and prepare for upcoming gamechangers such as 5G.
Users must understand that the IoT is an active and developing field, therefore its
security will always have to transform and adapt to its changes.