3/2/1: High/Medium/Low
3/2/1: High/Medium/Low
3/2/1: High/Medium/Low
Preamble: This course intends to provide insight into new innovations that will build novel
type of interactions among things and humans, and enables the realization of smart cities,
infrastructures, and services for enhancing the quality of life and utilization of resources. An
overview of IOT and its related concepts, different IOT architectures and their components,
emerging paradigms such as Fog computing, Platforms and solutions supporting development
and deployment of IOT applications, message passing mechanisms such as RPC, REST, and
CoAP, data and knowledge management, data confidentiality, data integrity, and operation
control issues faced by IOT are included in the course.
Prerequisite: Basic concepts of Information Technology and Internet.
Course Outcomes: After completion of the course the student will be able to
Blooms Category
CO No: Course Outcome (CO)
Level
Level 2:
CO 1 Describe the main concepts and features of the IOT paradigm.
Understand
Discuss Fog computing, TinyOS - nesC and programming Level 2:
CO 2
frameworks for IOT Understand
Describe the data management techniques applied to the IOT Level 2
CO 3
environment. Understand
Level 2
CO 4 Explain security, and privacy in IOT environments
Understand
Discuss key enablers and solutions to enable practical IoT Level 2
CO 5
systems Understand
Assessment Pattern
Bloom’s Category Continuous Assessment End Semester Examination
Tests
1 2
Remember 20 20 20
Understand 30 30 40
60
Apply
Analyse
Evaluate
Create
Mark Distribution
Total CIE ESE ESE
Marks Duration
100 40 60 3 hours
End Semester Examination Pattern: There will be two parts; Part A and Part B. Part A
contain 10 compulsory short answer questions, 2 from each module. Each question carries 3
marks. Part B contains 2 questions from each module of which student should answer any one.
Each question can have a maximum of 2 subdivisions and carry 6 marks.
61
Course Outcome 5 (CO5):
1. Give an overview on the Wired Gateway Interfaces.
2. List the features to select the gateway hardware.
3. List the steps to prepare Raspberry Pi for the execution.
Part A
13. a. Comment on the four broad requirements that motivate the design of TinyOS
(3 Marks)
62
15. Compare Stream Management System (DSMS) and Complex Event Processing (CEP).
(6 Marks)
OR
16. Describe hyper ellipsoidal model for anomaly detection. (6 Marks)
17. Describe the error detection techniques which are applicable in the context of an IOT.
(6 Marks)
OR
18. Explain the Station-to-Station protocol (STS) and the two main shortcomings of STS.
(6 Marks)
19. Discuss the sensors required to build the environmental-sensing IoT gateway device for
weather monitoring. (6 Marks)
OR
20. List and explain the six steps for the development of a sensor project. (6 Marks)
Syllabus
Module 1 (9 Hours)
Module 3 (8 Hours)
Module 4 (9 Hours)
Security and privacy in the Internet of Things- Internet of Things - robustness and
reliability. TinyTO: two-way authentication for constrained devices in the Internet of
Things - Obfuscation and diversification for securing the Internet of Things
63
Module 5 (8 Hours)
Creating a simple IoT project - Preparing Raspberry Pi – Interfacing the hardware - Internal
representation of sensor values- Persisting data - Creating the actuator project - Creating a
controller.
More detailed knowledge may be acquired through seminars, assignments and talks by eminent
external experts and also by implementing a micro project.
Any one of the following or similar micro projects may be given as part of the course.
1. Smart Gas Leakage Detector
2. Night Patrol at home
Text Books
1. RajkumarBuyya; Amir VahidDastjerdi , “Internet of Things”, Morgan Kaufmann, 2016
Reference Books
1. Peter Waher, “Learning Internet of Things”, Packt Publishing, 2015
2. S. SitharamaIyengar; Nandan Parameswaran; Vir V. Phoha; N. Balakrishnan; Chuka Okoye,
“Fundamentals of Sensor Network Programming: Applications and Technology”, Wiley,
December 14, 2010
3. Robert Stackowiak, Art Licht, VenuMantha, Louis Nagode, “Big Data and The Internet of
Things: Enterprise Information Architecture for A New Age”, Apress, 2015
Web Resources
1. https://www.coursera.org/specializations/internet-of-things
2. http://web.mit.edu/professional/digital-programs/courses/IoT
No. of
No Topic
Lectures
1 Introduction (9 Hours)
1.1 Internet of things- definition, evolution. Applications -Smart home
applications, Health care, Elder care, Traffic surveillance. 1
64
1.2 Open IOT architecture for IOT/Cloud convergence, Sensor 1
middleware, Cloud computing infrastructure, Directory service,
Global Scheduler, Local Scheduler component, Service delivery
and utility manager
65
Coordination Languages- Orchestration, Choreography, Linda and 1
eLinda, Orc, Features of Orc, Java Orchestration Language
Interpreter Engine (Jolie), Polyglot Programming, Inverse pyramid
for Polyglot Programming.
66
Enhancing the security in IOT using obfuscation and diversification 1
techniques, motivations and limitations, different use-case
scenarios on software diversification and obfuscation.
5 IoT Implementation (8 Hours)
5.1 Three key components to an IOT architecture, Sensor to gateway 1
communication - wired gateway interfaces, wireless gateway
interfaces
Sensors - sensors required to build the environmental-sensing IOT 1
gateway device for weather monitoring
67