Вы находитесь на странице: 1из 32

CHAPTER: - 1

1.1 INTRODUCTION
The Internet of things (IoT) is the network of physical devices, vehicles, home appliances and
other items embedded.
Drawing representing the Internet of things (IoT) with electronics, software, sensors,
actuators, and connectivity which enables these objects to connect and exchange data. Each
thing is uniquely identifiable through its embedded computing system but is able to
interoperate within the existing Internet infrastructure.
Experts estimate that the IoT will consist of about 30 billion objects by 2020. It is also
estimated that the global market value of IoT will reach $7.1 trillion by 2020.
The IoT allows objects to be sensed or controlled remotely across existing network
infrastructure, creating opportunities for more direct integration of the physical world into
computer-based systems, and resulting in improved efficiency, accuracy and economic
benefit in addition to reduced human intervention. When IoT is augmented with sensors and
actuators, the technology becomes an instance of the more general class of cyber-physical
systems, which also encompasses technologies such as smart grids, virtual power plants,
smart homes, intelligent transportation and smart cities.
"Things," in the IoT sense, can refer to a wide variety of devices such as heart monitoring
implants, biochip transponders on farm animals, cameras streaming live feeds of wild animals
in coastal waters, automobiles with built-in sensors, DNA analysis devices for
environmental/food/pathogen monitoring, or field operation devices that assist firefighters in
search and rescue operations. Legal scholars suggest regarding "things" as an "inextricable
mixture of hardware, software, data and service".
These devices collect useful data with the help of various existing technologies and then
autonomously flow the data between other devices.
The term "the Internet of things" was coined by Kevin Ashton of Procter & Gamble, later
MIT's Auto-ID Center, in 1999.

1. IoT: All about physical items talking to each other


2. The term coined by Kevin Ashton in 1999 • Composed by two words and concepts:
a) “Internet”: “The worldwide network of interconnected computer networks, based
on a standard communication protocol, the Internet suite (TCP/IP)”
b) “Thing” : “an object not precisely identifiable”
3. “Internet of Things” means “a worldwide network of interconnected objects uniquely
addressable, based on standard communication protocols”.
4. Any object will have a unique way of identification in the coming future.
5. The capacity of addressing each other and verifying their identities
6. Objects will be able to exchange information
7. Object knows its common properties such as creation, recycling, transformation,
ownership change, or use for different purposes
8. Current Internet is a collection of uniform devices

1
9. IoT will exhibit a much higher level of heterogeneity
a) Objects of totally different in terms of functionality, technology and application fields
can communicate

Fig 1.1: Challenge to IoT

The Internet of Things (IoT) is an important topic in technology industry, policy, and
engineering circles and has become headline news in both the specialty press and the popular
media. This technology is embodied in a wide spectrum of networked products, systems, and
sensors, which take advantage of advancements in computing power, electronics
miniaturization, and network interconnections to offer new capabilities not previously
possible. An abundance of conferences, reports, and news articles discuss and debate the
prospective impact of the “IoT revolution”—from new market opportunities and business
models to concerns about security, privacy, and technical interoperability.
Fundamentally, the Internet Society cares about the IoT as it represents a growing aspect of how
people and institutions are likely to interact with the Internet in their personal, social, and
economic lives. If even modest projections are correct, an explosion of IoT applications could
present a fundamental shift in how users engage with and are impacted by the Internet, raising
new issues and different dimensions of existing challenges across user/consumer concerns,
technology, policy and law. IoT also will likely have varying consequences in different economies
and regions, bringing a diverse set of opportunities and challenges across the globe.

2
CHAPTER:-2
HISTORY
2.1 HISTORY OF IOT
As of 2016, the vision of the Internet of things has evolved due to a convergence of multiple
technologies, including ubiquitous wireless communication, real time analytics, machine learning,
History commodity sensors, and embedded systems. This means that the traditional fields of
embedded systems, wireless sensor networks, control systems, automation (including home and
building automation), and others all contribute to enabling the Internet of things.
The concept of a network of smart devices was discussed as early as 1982, with a modified Coke
machine at Carnegie Mellon University becoming the first Internet-connected appliance, able to
report its inventory and whether newly loaded drinks were cold. Mark Weiser's seminal 1991
paper on ubiquitous computing, "The Computer of the 21st Century", as well as academic venues
such as Ubi Comp and Per Com produced the contemporary vision of IoT. In 1994 Reza Raji
described the concept in IEEE Spectrum as "[moving] small packets of data to a large set of
nodes, so as to integrate and automate everything from home appliances to entire factories".
Between 1993 and 1996 several companies proposed solutions like Microsoft's at
Work or Novell's NEST. However, only in 1999 did the field start gathering momentum. Bill
Joy envisioned Device to Device (D2D) communication as part of his "Six Webs"
framework, presented at the World Economic Forum at Davos in 1999.
The concept of the Internet of things became popular in 1999, through the Auto ID Center at
MIT and related market analysis publications. Radio-frequency identification (RFID) was
seen by Kevin Ashton (one of the founders of the original Auto-ID Center) as a prerequisite
for the Internet of things at that point. Ashton prefers the phrase "Internet for things." If all
objects and people in daily life were equipped with identifiers, computers could manage and
store them. Besides using RFID, the tagging of things may be achieved through such
technologies as near field communication, barcodes, QR codes and digital watermarking.
In its original interpretation, one of the first consequences of implementing the Internet of
things by equipping all objects in the world with minuscule identifying devices or
machinereadable identifiers would be to transform daily life. For instance, instant and
ceaseless inventory control would become ubiquitous. A person's ability to interact with
objects could be altered remotely based on immediate or present needs, in accordance with
existing end-user agreements. For example, such technology could grant motion-picture
publishers much more control over end user private devices by remotely enforcing copyright
restrictions and digital rights management, so the ability of a customer who bought a Blu-ray
disc to watch the movie could become dependent on the copyright holder's decision, similar
to Circuit City's failed DIVX.
A significant transformation is to extend "things" from the data generated from devices to objects
in the physical space. The thought-model for future interconnection environment was proposed in
2004. The model includes the notion of the ternary universe consists of the physical world, virtual
world and mental world and a multi-level reference architecture with the nature and devices at the
bottom level followed by the level of the Internet, sensor network, and mobile network, and
intelligent human-machine communities at the top level, which supports

3
geographically dispersed users to cooperatively accomplish tasks and solve problems by
using the network to actively promote the flow of material, energy, techniques, information,
knowledge, and services in this environment. This thought model envisioned the development
trend of the Internet of things.

Fig 2.1: Thing to speak

4
CHAPTER: - 3
Internet of Things
3.1 WHAT IS THE IoT?
1. A new dimension added to world of information and communication technologies
(ICTs):
a) Anytime connectivity
b) Any place connectivity
c) For anyone
d) Connectivity for anything
2. Connections will multiply and create an entirely new dynamic network of networks

Fig 3.1: - ICT (information and communication technology)

3.2 TECHNOLOGY
1. Depends on dynamic technical innovation like wireless sensors
2. Four kinds of technology basically used.
a) RFID (Radio-frequency identification)
b) Sensor technologies
c) Embedded intelligence
d) Nanotechnology
1. RFID
a) Item identification

5
b) Uses radio waves to identify items
c) Gives information about their location and status

2. Sensor technologies
a) Data collection
b) For example, sensors in an electronic jacket collect changes in external temperature
and parameters of jacket adjusted accordingly.
3. Embedded intelligence
a) Information processing
b) distribute processing power to the edges of network
c) empower things and devices independent decisions
4. Nanotechnology
a) Miniaturization

Fig3.2: - Miniaturization towards the IoT

3.3 WIDER TECHNOLOGICAL TRENDS


1. For the years to come, four distinct macro trends that will shape the future of IT
b) “exaflood” or “data deluge”: explosion of the amount of data collected and exchanged
c) The energy required to operate the intelligent devices will dramatically decrease
d) Miniaturization of devices
e) Autonomic resources

6
3.4 PROBLEMS AND CONCERNS
1. Technological standardization
a) Standardization is essential for mass deployment and diffusion of any technology
2. Protection of data and privacy
a) sensors and smart tags can track users’ movements, habits and ongoing preferences

Fig3.3: - Privacy Protection

3.5 ARCHITECTURE OF IOT


Architecture of internet of Things contains basically 4 layers:
Application Layer
Gateway and the network lay
Management Service layer
Sensor layer
3.5.1 Application Layer:

Lowest Abstraction Layer


With sensors we are creating digital nervous
system. Incorporated to measure physical quantities
Interconnects the physical and digital world
Collects and process the real time information

7
3.5.2 Gateway and The Network Layer:

Robust and High performance network infrastructure


Supports the communication requirements for latency, bandwidth
or security
Allows multiple organizations to share and use the same network
independently

3.5.3 Management Layer:

Capturing of periodic sensory data


Data Analytics (Extracts relevant information from massive
amount of raw data)
Streaming Analytics (Process real time
data) Ensures security and privacy of data.

3.5.4 Sensor Layer:

Provides a user interface for using IoT.


Different applications for various sectors like Transportation,
Healthcare, Agriculture, Supply chains, Government, Retail etc.

1. There can be more than one architecture for Internet of Things 2.


The one explained here is standardized open architecture:
3. The EPC global Network
a) widely accepted and has gained the biggest support from IT companies

8
Fig 3.4: - Chart of IoT

4. Includes content providers (producers) and content users (consumers) that utilize the
Internet of Things and share benefits
5. New services and business innovation will be enabled by an enhanced Internet of
Things infrastructure
6. Companies, public institutions and people will access data for their own benefits and
financial as well as nonfinancial benefit
7. Key goals for Internet of Things architecture to achieve are:
a) An open, scalable, flexible and secure infrastructure
b) A user centric, customizable ‘Web of Things’
8. Interaction possibilities for the benefit of society
a) New dynamic business concepts
9. Flexible billing and incentive
b) Capabilities to promote information sharing 10.
Includes the following components:
a) Extended static data support:
11. There is a need to support all things that carry a unique
ID a) Integration of dynamic data:
12. A need to sense environmental conditions as well as the status of devices
13. Support for non IP devices:

3.6 Non IP devices offer only limited capability.


Can be integrated in IoT through gateways
1. Integration of an actuator interface:
a) Actuators execute decisions either rendered by humans or software agents on their behalf
2. Optional integration of software agents:
b) For automated decision making
3. Data synchronization for offline support

9
CHAPTER: - 4

GOVERNMENT REGULATION ON IOT

4.1 Regulation on IOT


One of the key drivers of the IoT is data. The success of the idea of connecting devices to make
them more efficient is dependent upon access to and storage & processing of data. For this
purpose, companies working on IoT collect data from multiple sources and store it in their cloud
network for further processing. This leaves the door wide open for privacy and security dangers
and single point vulnerability of multiple systems. The other issues pertain to consumer choice
and ownership of data and how it is Government regulation on IoT used. Presently the regulators
have shown more interest in protecting the first three issues identified above. IoT regulation
depends on the country. Some examples of legislation that is relevant to privacy and data
collection are: the US Privacy Act of 1974, OECD Guidelines on the Protection of Privacy and
Transborder Flows of Personal Data of 1980, and the EU Directive 95/46/EC of 1995.

4.2 Current regulatory environment:


A report published by the Federal Trade Commission (FTC) in January 2015 made the
following three recommendations:

1. Data security – At the time of designing IoT companies should ensure that data
collection, storage and processing would be secure at all times. Companies should
adopt a “defense in depth” approach and encrypt data at each stage.
2. Data consent – users should have a choice as to what data they share with IoT
companies and the users must be informed if their data gets exposed.
3. Data minimization – IoT companies should collect only the data they need and retain
the collected information only for a limited time.

However, the FTC stopped at just making recommendations for now. According to an FTC
analysis, the existing framework, consisting of the FTC Act, the Fair Credit Reporting Act,
and the Children's Online Privacy Protection Act, along with developing consumer education
and business guidance, participation in multistakeholder efforts and advocacy to other
agencies at the federal, state and local level, is sufficient to protect consumer rights.

A resolution passed by the Senate in March 2015, is already being considered by the
Congress. This resolution recognized the need for formulating a National Policy on IoT and
the matter of privacy, security and spectrum. Furthermore, to provide an impetus to the IoT
ecosystem, in March 2016, a bipartisan group of four Senators proposed a bill, The
Developing Innovation and Growing the Internet of Things (DIGIT) Act, to direct the Federal
Communications Commission to assess the need for more spectrum to connect IoT devices.

Several standards for the IoT industry are actually being established relating to automobiles
because most concerns arising from use of connected cars apply to healthcare devices as well.

10
In fact, the National Highway Traffic Safety Administration (NHTSA) is preparing cyber
security guidelines and a database of best practices to make automotive computer systems
more secure.

A recent report from the World Bank examines the challenges and opportunities in
government adoption of IoT. These include

1. Still early days for IoT in government


2. Underdeveloped policy and regulatory frameworks
3. Unclear business models, despite strong value proposition
4. Clear institutional and capacity gap in government AND the private sector
5. Inconsistent data valuation and management
6. Infrastructure a major barrier
7. Government as an enabler
8. Most successful pilots share common characteristics (public-private partnership, local,
leadership)

Fig4.1:- Human activity approach

11
CHAPTER 5

DATA STORAGE AND SECURITY

5.1 Data storage and analytics


A challenge for producers of IoT applications is to clean, process and interpret the vast amount of
data which is gathered by the sensors. There is a solution proposed for the analytics of the
information referred to as Wireless Sensor Networks. These networks share data among sensor
nodes that are sent to a distributed system for the analytics of the sensory data.
Another challenge is the storage of this bulk data. Depending on the application there could be
high data acquisition requirements which in turn lead to high storage requirements. Currently the
internet is already responsible for 5% of the total energy generated and this consumption will
increase significantly when we start utilizing applications with multiple embedded sensors.

5.2 Security
Concerns have been raised that the Internet of things is being developed rapidly without
appropriate consideration of the profound security challenges involved and the regulatory
changes that might be necessary.
Most of the technical security issues are similar to those of conventional servers, workstations
and smartphones, but the firewall, security update and anti-malware systems used for those
are generally unsuitable for the much smaller, less capable, IoT devices.
Network security will remain preferred solution for IoT security products, with sales anticipated
to account for nearly US$ 15,000 Mn by 2027-end. End-point/ device security will continue to be
the second largest solution for IoT security products. In addition, vulnerability management
solution for IoT security products will register fastest expansion through 2027.Revenues amassed
from smart grid, and home & building automation applications of IoT security products will
collectively account for revenues worth US$ 26,753.5 Mn by 2027end. According to the Business
Insider Intelligence Survey conducted in the last quarter of 2014, 39% of the respondents said that
security is the biggest concern in adopting Internet of things technology. In particular, as the
Internet of things spreads widely, cyber-attacks are likely to become an increasingly physical
(rather than simply virtual) threat. In a January 2014 article in Forbes, cyber-security columnist
Joseph Steinberg listed many Internet-connected appliances that can already "spy on people in
their own homes" including televisions, kitchen appliances, cameras, and thermostats. Computer-
controlled devices in automobiles such as brakes, engine, locks, hood and trunk releases, horn,
heat, and dashboard have been shown to be vulnerable to attackers who have access to the on-
board network. In some cases, vehicle computer systems are Internet-connected, allowing them to
be exploited remotely. By 2008 security researchers had shown the ability to remotely control
pacemakers without authority. Later hackers demonstrated remote control of insulin pumps and
implantable cardioverter defibrillators. David Pogue wrote that some recently published reports
about hackers remotely controlling certain functions of automobiles were not as serious as one
might otherwise guess because of various mitigating circumstances; such as the bug that allowed
the hack having been fixed

12
before the report was published, or that the hack required security researchers having
physical access to the car prior to the hack to prepare for it.
The U.S. National Intelligence Council in an unclassified report maintains that it would be
hard to deny "access to networks of sensors and remotely-controlled objects by enemies of
the United States, criminals, and mischief makers... An open market for aggregated sensor
data could serve the interests of commerce and security no less than it helps criminals and
spies identify vulnerable targets. Thus, massively parallel sensor fusion may undermine social
cohesion, if it proves to be fundamentally incompatible with Fourth-Amendment guarantees
against unreasonable search." In general, the intelligence community views the Internet of
things as a rich source of data.
As a response to increasing concerns over security, the Internet of Things Security
Foundation (IoTSF) was launched on 23 September 2015. IoTSF has a mission to secure the
Internet of things by promoting knowledge and best practice. Its founding board is made from
technology providers and telecommunications companies including BT, Vodafone,
Imagination Technologies and Pen Test Partners. In addition, large IT companies are
continuously developing innovative solutions to ensure the security for IoT devices. As per
the estimates from KBV Research, the overall IoT security market would grow at 27.9% rate
during 2016– 2022 as a result of growing infrastructural concerns and diversified usage of
Internet of things. In 2016, a distributed denial of service attack powered by Internet of things
devices running the Mirai malware took down a DNS provider and major web sites. In May
2017, Junade Ali, a Computer Scientist at Cloudflare noted that native DDoS vulnerabilities
exist in IoT devices due to a poor implementation of the Publish–subscribe pattern.
While security is a concern there are many things being done to protect devices. Device data
is following cryptographic standards and encryption is being used in end-to-end scenarios. To
help with this scenario x.509 certificates are also being used to verify device identity.
Security experts view Internet of things as a threat to the traditional Internet. Some argue that
market incentive to secure IoT devices is insufficient and increased governmental regulation
is necessary to make the Internet of things secure.
The overall understanding of IoT is essential for basic user security. Keeping up with current
antivirus software and patching updates will help mitigate cyber attacks.

13
Fig 5.1:- Challenge to IoT

5.3 The Internet of Things presents a new set of data storage


Humans are quickly being outnumbered by Internet-connected devices that are constantly
collecting and transmitting data. The term used to describe this is the Internet of Things.
Regardless of how you feel about it, the explosion in machine-generated data is changing
storage and data protection forever.

These machines -- or things -- perform a range of tasks, relatively simple functions like
capturing images and uploading them to social sharing sites to capturing and transmitting
more complicated sensor data and sending real-time information on an organization's various
assets. Thanks to analytics, businesses now want the ability to, say, compare the current
condition of their assets compared with five years ago.

5.3.1 Storage implications

The impact on storage at first seems fairly obvious: There is more data to store. The less
obvious part is that machine-generated data comes in two distinct types, creating two entirely
different challenges. First, there is large-file data, such as images and videos captured from
smartphones and other devices. This data type is typically accessed sequentially. The second
data type is very small, for example, log-file data captured from sensors. These sensors,
while small in size, can create billions of files that must be accessed randomly.

14
CHAPTER 6

IOT ADOPTION BARRIERS


6.1 Lack of interoperability and unclear value propositions
Despite a shared belief in the potential of IoT, industry leaders and consumers are facing
barriers to adopt IoT technology more widely. Mike Farley argued in Forbes that many IoT
solutions either lack interoperability or a clear use case for end users.
“Instead of convincing consumers that they need complex systems to serve needs they don’t
have, we should fix real problems people struggle with every day.” Many gadgets in the
consumer IoT space have appealed to early adopters, yet failed to demonstrate relevance to
ordinary people’s lives.
“In order to boost sales and drive demand beyond the early adopter set, we need to stop
making toys no one cares about and instead work on building simple solutions to real,
everyday problems for real people.”
A recent study by Ericsson regarding the adoption of IoT among Danish companies, has
suggested that many are struggling “to pinpoint exactly where the value of IoT lies for them”.
A company must identify where the value of IoT lies in order to capture it, otherwise
nonaction is the consequence. This indicates that a major roadblock to IoT adoption is not
technical but analytical in nature.

6.2 Privacy and security concerns


According to a recent study by Noura Aleisa and Karen Renaud at the University of Glasgow,
"the Internet of things' potential for major privacy invasion is a concern" with much of research
"disproportionally focused on the security concerns of IoT." Among the "proposed solutions in
terms of the techniques they deployed and the extent to which they satisfied core privacy
principles", only very few turned out to be fully satisfactory. Louis Basenese, investment director
at Wall Street Daily, has criticized the industry's lack of attention to security issues:
"Despite high-profile and alarming hacks, device
In a post-Snowden world of global surveillance disclosures, consumers take a more active
interest in protecting their manufacturers remain undeterred, focusing on profitability over
security. Consumers need to have ultimate control over collected data, including the option to
delete it if they choose...Without privacy assurances, wide-scale consumer adoption simply
won't happen."
In a post-Snowden world of global surveillance disclosures, consumers take a more active interest
in protecting their privacy and demand IoT devices to be screened for potential security
vulnerabilities and privacy violations before purchasing them. According to the 2016 Accenture
Digital Consumer Survey, in which 28000 consumers in 28 countries were polled on their use of
consumer technology, security “has moved from being a nagging problem to a top barrier as
consumers are now choosing to abandon IoT devices and services over security concerns.” The
survey revealed that “out of the consumers aware of hacker attacks and owning or planning to
own IoT devices in the next five years, 18 percent decided to terminate the use

15
of the services and related services until they get safety guarantees.” This suggests that
consumers increasingly perceive privacy risks and security concerns to outweigh the value
propositions of IoT devices and opt to postpone planned purchases or service subscriptions.

6.3 Traditional governance structures


A study issued by Ericsson regarding the adoption of Internet of things among Danish companies
identified a "clash between IoT and companies' traditional governance structures, as IoT still
presents both uncertainties and a lack of historical precedence." Among the respondents
interviewed, 60 percent stated that they "do not believe they have the organizational capabilities,
and three of four do not believe they have the processes needed, to capture the IoT opportunity."
This has led to a need to understand organizational culture in order to facilitate organizational
design processes and to test new innovation management practices. A lack of digital leadership in
the age of digital transformation has also stifled innovation and IoT adoption to a degree that
many companies, in the face of uncertainty, "were waiting for the market dynamics to play out",
or further action in regards to IoT "was pending competitor moves, customer pull, or regulatory
requirements." Some of these companies risk being 'kodaked' – "Kodak was a market leader until
digital disruption eclipsed film photography with digital photos" – failing to "see the disruptive
forces affecting their industry" and "to truly embrace the new business models the disruptive
change opens up." Scott Anthony has written in Harvard Business Review that Kodak "created a
digital camera, invested in the technology, and even understood that photos would be shared
online" but ultimately failed to realize that "online photo sharing was the new business, not just a
way to expand the printing business."

6.3 Lack of solid business models


Studies on IoT literature and projects show a disproportionately strong prominence of
technology in the IoT projects, which are often driven by technological interventions rather
than business model innovation

Fig 6.3:- IoT solution

16
CHAPTER 7

APPLICATIONS

7.1 IOT Application


The applications for internet connected devices are extensive. Multiple categorizations have
been suggested, most of which agree on a separation between consumer, enterprise
(business), and infrastructure applications. George Osborne, the former British Chancellor of
the Exchequer, posited that
A 2012 Internet refrigerator from LG the Internet of things is the next stage of the information
revolution and referenced the inter-connectivity of everything from urban transport to medical
devices to household appliances.
The ability to network embedded devices with limited CPU, memory and power resources
means that IoT finds applications in nearly every field. Such systems could be in charge of
collecting information in settings ranging from natural ecosystems to buildings and factories,
thereby finding applications in fields of environmental sensing and urban planning. Intelligent
shopping systems, for example, could monitor specific users' purchasing habits in a store by
tracking their specific mobile phones. These users could then be provided with special offers
on their favorite products, or even location of items that they need, which their fridge has
automatically conveyed to the phone. Additional examples of sensing and actuating are
reflected in applications that deal with heat, water, electricity and energy management, as
well as cruise-assisting transportation systems. Other applications that the Internet of things
can provide is enabling extended home security features and home automation.

Fig 7.1: - Pallet Communications with Gate

17
7.2 Consumer application
A growing portion of IoT devices are created for consumer use. Examples of consumer
applications include connected car, entertainment, home automation (also known as smart
home devices), wearable technology, quantified self, connected health, and appliances such
as washer/dryers, robotic vacuums, air purifiers, ovens, or refrigerators/freezers that use Wi-
Fi for remote monitoring. Consumer IoT provides new opportunities for user experience and
interfaces.

Fig 7.2: - Clothes Communicates with Display

7.3 Agriculture
The IoT contributes significantly towards innovating farming methods. Farming challenges
caused by population growth and climate change have made it one of the first industries to
utilize the IoT. The integration of wireless sensors with agricultural mobile apps and cloud
platforms helps in collecting vital information pertaining to the environmental conditions–
temperature, rainfall, humidity, wind speed, pest infestation, soil humus content or nutrients,
besides others – linked with a farmland, can be used to improve and automate farming
techniques, take informed decisions to improve quality and quantity, and minimize risks and
wastes. The app-based field or crop monitoring also lowers the hassles of managing crops at
multiple locations. For example, farmers can now detect which areas have been fertilized (or
mistakenly missed), if the land is too dry and predict future yields.

18
Fig 7.3: - Packaged Food Communicates with Microwave Oven.

7.4 Frameworks
IoT frameworks might help support the interaction between "things" and allow for more
complex structures like distributed computing and the development of distributed
applications. Currently, some IoT frameworks seem to focus on real time data logging
solutions, offering some basis to work with many "things" and have them interact. Future
developments might lead to specific software-development environments to create the
software to work with the hardware used in the Internet of things. Companies are developing
technology platforms to provide this type of functionality for the Internet of things. Newer
platforms are being developed, which add more intelligence.
REST is a scalable architecture that allows things to communicate over Hypertext Transfer
Protocol and is easily adopted for IoT applications to provide communication from a thing to
a central web server.

Fig 7.4: - Cooperating Smart Everyday Things

19
7.5 Smart Home
IoT devices are a part of the larger concept of home automation, also known as domotics.
Large smart home systems utilize a main hub or controller to provide users with a central
control for all of their devices. These devices can include lighting, heating and air
conditioning, media and security systems. Ease of usability is the most immediate benefit to
connecting these functionalities. Long term benefits can include the ability to create a more
environmentally friendly home by automating some functions such as ensuring lights and
electronics are turned off. One of the major obstacles to
Obtaining smart home technology is the high initial cost.

Fig7.5:- Use Case: Location Lost Objects

7.6 Media
Media use of the Internet of things is primarily concerned with marketing and studying
consumer habits. Through behavioral targeting these devices collect many actionable points
of information about millions of individuals. Using the profiles built during the targeting
process, media producers present display advertising in line with the consumer's known
habits at a time and location to maximize its effect. Further information is collected by
tracking how consumers interact with the content. This is done through conversion tracking,
drop off rate, and click through rate, registration rate and interaction rate. The size of the data
often presents challenges as it crosses into the realm of big data. However, in many cases
benefits gained from the data stored greatly outweighs these challenges.

20
Fig 7.6: - Real- World Awareness

7.7 Medical and healthcare


IoT devices can be used to enable remote health monitoring and emergency notification
systems. These health monitoring devices can range from blood pressure and heart rate
monitors to advanced devices capable of monitoring specialized implants, such as
pacemakers, Fitbit electronic wristbands, or advanced hearing aids. Some hospitals have
begun implementing "smart beds" that can detect when they are occupied and when a patient
is attempting to get up. It can also adjust itself to ensure appropriate pressure and support is
applied to the patient without the manual interaction of nurses. According to the latest
research, US Department of Health plans to save up to USD 300 billion from the national
budget due to medical innovations.
Specialized sensors can also be equipped within living spaces to monitor the health and
general well-being of senior citizens, while also ensuring that proper treatment is being
administered and assisting people regain lost mobility via therapy as well. Other consumer
devices to encourage healthy living, such as, connected scales or wearable heart monitors, are
also a possibility with the IoT. More and more end-to-end health monitoring IoT platforms
are coming up for antenatal and chronic patients, helping one manage health vitals and
recurring medication requirements.
The Research & Development Corporation (DEKA), a company that creates prosthetic limbs,
has created a battery-powered arm that uses myoelectricity, a device that converts muscle
group sensations into motor control. The arm is nicked named Luke Arm after Luke
Skywalker (Star Wars).

21
Fig 7.7: - Allergy Checker

7.8 Network architecture


The Internet of things requires huge scalability in the network space to handle the surge of
devices. IETF 6LoWPAN would be used to connect devices to IP networks. With billions of
devices being added to the Internet space, IPv6 will play a major role in handling the network
layer scalability. IETF's Constrained Application Protocol, Zero MQ, and MQTT would
provide lightweight data transport. "MQ" in "MQTT" came from IBM's MQ Series message
queuing product line.
Fog computing is a viable alternative to prevent such large burst of data flow through
Internet. The edge devices' computation power can be used to analyses and process data, thus
providing easy real time scalability.

Fig 7.8: - Communicating Products

22
CHAPTER 8

IoT connected to life

8.1 The GSMA’s Vision of IoT Services - The Connected Life


Mobile networks already deliver connectivity to a broad range of devices, enabling the
development of innovative new services and applications. This new wave of connectivity is
going beyond tablets and laptops; to connected cars and buildings; TVs and game consoles;
smart meters and traffic control; with the prospect of intelligently connecting almost anything
and anyone. This is what the GSMA refers to as the “Connected Life”.

As the Connected Life evolves, the number of mobile connections worldwide is set to rise
dramatically to reach 10.5 billion by 2020, while the total number of connected devices
across all access technologies could reach 25.6 billion1. These devices will bridge the
physical and digital worlds, enabling a new category of services that improve the quality of
life and productivity of individuals, society and enterprises.

This Internet of Things - a widely distributed, locally intelligent network of smart devices -
will enable extensions and enhancements to fundamental services in education, health and
other sectors, as well as providing a new ecosystem for application development.

By enabling devices to communicate with each other independently of human interaction, the
Internet of Things will open up new revenue streams, facilitate new business models, drive
efficiencies and improve the way existing services across many different sectors are
delivered. It will represent a very important demand-side stimulus that helps finance the
deployment of mobile broadband networks around the world. In total, the positive impact on
the global economy could be as much as US$4.5 trillion per annum, according to a study by
Machina Research.

8.2 Early stages of market development


Machine to Machine (M2M) solutions - a subset of the Internet of Things – already use wireless
networks to connect devices to each other and the Internet, with minimal direct human
intervention, to deliver services that meet the needs of a wide range of industries. The Internet of
Things represents an evolution of M2M through the coordination of multiple vendors’ machines,
devices and appliances connected to the Internet through multiple networks.

In 2013, M2M connections accounted for 2.8% of global mobile connections (195 million),
indicating that the sector is still at a relatively early stage in its development. There are
significant regional variations between more established markets, such as Europe, North
America and Oceania, where M2M’s share of total connections exceeds the global average,
and rapidly developing markets, such as Asia, which have experienced annual growth of 55%
a year between 2010 and 20132.

23
Figure 8.1: M2M connections by region

M2M connections as a share of total connections is an indicator of M2M market maturity.


The top four markets worldwide by this measure in 2013 were Sweden (23%), Norway
(15%), New Zealand (14%) and Finland (11%).

As of January 2014, 428 mobile operators offered M2M services across 187 countries,
equivalent to four out of ten mobile operators worldwide. The highest proportion of operators
offering M2M services are in Europe, where about two-thirds of operators have an M2M
offering. This compares to just under half of operators in the Americas, Asia and Oceania.

Market forecasts indicate that by 2020, the number of connected devices in the world will
almost triple from more than nine billion today to 25.6 billion. Of these, 10.5 billion will
connect using mobile technology, with a dedicated SIM and a connection to a mobile
network3. The remaining devices will use alternative communication technologies, such as
short-range radio connections to a communications gateway, Wide Area Network (WAN)
radio, fixed line telecommunications or Wi-Fi networks.

Figure 8.2: M2M AS A percentage of total connections in leading markets

Consumer and socio-economic impact Pervasive connectivity between people and processes will
enable multiple services to be delivered automatically and contextually, whenever and wherever
required, ushering in the Connected Life. Supported by cross-industry collaboration,

24
the Connected Life will have a positive impact on many sectors of the economy, such as
automotive, shipping and logistics, healthcare and utilities, potentially benefitting billions of
people globally.

Figure 8.3: consumer impact of the connected life

As the Connected Life will have a fundamental impact on the way we live and work, there
will also be major social and environmental benefits, such as improved healthcare, safer and
more efficient transportation and logistics, better education and more efficient use of energy.
With the ability to capture real-time usage information and provide remote control, embedded
mobile connectivity can make a wide range of devices, machines and vehicles more efficient
and effective, dramatically reducing waste and improving time productivity.

Figure 8.4: socio-economic impact of the connected life in 2017

Such services will also contribute to economic growth by creating new business opportunities
for mobile operators, equipment vendors and other players in the mobile ecosystem as well as
in adjacent industries. They will represent a very important demand-side stimulus that helps

25
finance the deployment of upgraded mobile networks able to provide IOT and broadband
connectivity around the world.

The connected devices market will open-up new revenue streams, facilitate new business
models, drive efficiencies and improve the way existing services across many different
sectors are delivered.

The global business impact of the Connected Life can be split into two broad categories:
‘new revenue opportunities’ and ‘cost reduction and service improvements’6:

1. In 2020, revenues from the sale of connected devices and services, and revenues from
related services, such as pay-as-you-drive car insurance, will be worth US$2.5 trillion,
US$1.2 trillion of which could be addressed by mobile operators and the remainder
by the broader Connected Life ecosystem.
2. Cost reductions and service improvements relate to less direct, but tangible, benefits
to organisations, governments and consumers through the evolution of the
Connected Life. In 2020, this could be worth approximately US$2 trillion: US$1
trillion from cost reductions, such as smart meters removing the need for manual
meter readings; and US$1 trillion from service improvements, such as clinical
remote monitoring for patients with chronic illnesses.

8.3 Distribution models for IoT services are often global


The modern age of business and consumerism is increasingly driven in a global fashion with
international brands in many vertical industries. In order to support the development of a viable
service ecosystem, i.e. one that meets customer expectations in an economical manner, globally
consistent service enablers will be a key requirement. For companies in vertical industries, the
ability to deploy their services across several countries by partnering with a single mobile
operator, or an operator partnership or alliance, not only helps guarantee a consistent end
customer experience but also allows for the centralisation of manufacturing and planning
processes while also leveraging common management systems for consistent policy controls (e.g.
for provisioning, customer care, security, data protection, privacy, billing and reporting). This in
turn allows the service partners to benefit from economies of scale for service delivery that helps
accelerate speed and quality of deployment for the market as a whole. Furthermore, the resulting
economies of scale also enable service delivery in markets where the cost of creating a bespoke
local service would make serving the market economically unviable.

Operators are already taking the lead in supporting such global service launches in early
market categories such as automotive, health and consumer electronics. With the emergence
of new products in adjacent categories such as healthcare, wearable and consumer electronics
the importance of the ability to support large-scale global deployments is likely to accelerate.

The template for an M2M roaming annex to existing roaming agreements, developed by the
GSMA in 2012, is already being utilised by operators and serves as a prime example of an
approach that affords the opportunity to reduce fragmentation while allowing the
identification and differentiation of connected IoT devices.

26
8.4 IoT is employing innovative new commercial models
In order to bring new services to market, mobile operators are partnering with adjacent
industry organizations and jointly developing innovative IoT services targeted at the end
consumer. A variety of commercial models are becoming more prominent, such as business
to business to consumer (B2B2C) propositions where the end service is marketed by the
adjacent industry partner who owns the end customer relationship. For example, a mobile
operator could partner with a utilities company for smart metering capabilities, who then
provides energy services to the end consumer. Figure 10 compares the B2B2C model with the
traditional Business to Consumer (B2C) model which is primarily used when operators are
selling voice and data communications services on mobile phones to consumers.

In addition to this structural distinction, there is a fundamental difference in the nature of


customer charges. While customer charges underpinning traditional telecommunication
services are typically usage-based, often tied to data consumption, those supporting IoT
services will be linked to service value (of which connectivity will be an indistinguishable
component). For example, consumers of connected cars may pay a monthly service fee, along
with some discretionary fees for value-added services, such as entertainment, while eReader
consumers may pay for the device upfront and then pay per book downloaded. In many cases,
the mobile operator providing the IoT services will not be visible to the end customer, as its
relationship will be with the adjacent sector organisation.

Along with partnering with the leading organizations in adjacent industry sectors, mobile
operators may also need to address the ‘long tail’ of smaller companies, who wish to develop
mobile-enabled services, in an economically viable manner. Standardized enablers, such as
Application Programming Interfaces (APIs), which expose mobile network assets or
management platforms, need to be developed to achieve this. Such enablers will allow mobile
operators to support and monetize relationships with a great number of industry partners from
a wide variety of adjacent sectors.

27
Chapter – 9
Challenges of the Iot

The Internet of Things (IoT) — a universe of connected things providing key physical data
and further processing of that data in the cloud to deliver business insights— presents a huge
opportunity for many players in all businesses and industries . Many companies are
organizing themselves to focus on IoT and the connectivity of their future products and
services. For the IoT industry to thrive there are three categories of challenges to overcome
and this is true for any new trend in technology not only IoT: technology, business and society

9.1 Technology
This part is covering all technologies needed to make IoT systems function smoothly as a
standalone solution or part of existing systems and that’s not an easy mission, there are many
technological challenges, including Security, Connectivity, Compatibility & Longevity,
Standavrds and Intelligent Analysis & Actions

Figure 9.1: Technological Challenges

9.2 Security
IoT has already turned into a serious security concern that has drawn the attention of
prominent tech firms and government agencies across the world. The hacking of baby
monitors, smart fridges, thermostats, drug infusion pumps, cameras and even the radio in your
car are signifying a security nightmare being caused by the future of IoT. So many new nodes
being added to networks and the internet will provide malicious actors with innumerable
attack vectors and possibilities to carry out their evil deeds, especially since a considerable
number of them suffer from security holes.
The more important shift in security will come from the fact that IoT will become more
ingrained in our lives. Concerns will no longer be limited to the protection of sensitive
information and assets. Our very lives and health can become the target of IoT hack attacks .
There are many reasons behind the state of insecurity in IoT. Some of it has to do with the industry
being in its “gold rush” state, where every vendor is hastily seeking to dish out the next

28
innovative connected gadget before competitors do. Under such circumstances, functionality
becomes the main focus and security takes a back seat.

9.3 Connectivity
Connecting so many devices will be one of the biggest challenges of the future of IoT, and it
will defy the very structure of current communication models and the underlying technologies.
At present we rely on the centralized, server/client paradigm to authenticate, authorize and
connect different nodes in a network.
This model is sufficient for current IoT ecosystems, where tens, hundreds or even thousands
of devices are involved. But when networks grow to join billions and hundreds of billions of
devices, centralized systems will turn into a bottleneck. Such systems will require huge
investments and spending in maintaining cloud servers that can handle such large amounts of
information exchange, and entire systems can go down if the server becomes unavailable.
The future of IoT will very much have to depend on decentralizing IoT networks. Part of it
can become possible by moving some of the tasks to the edge, such as using fog computing
models where smart devices such as IoT hubs take charge of mission-critical operations and
cloud servers take on data gathering and analytical responsibilities .
Other solutions involve the use of peer-to-peer communications, where devices identify and
authenticate each other directly and exchange information without the involvement of a
broker. Networks will be created in meshes with no single point of failure. This model will
have its own set of challenges, especially from a security perspective, but these challenges can
be met with some of the emerging IoT technologies such as Blockchain.

9.4 Compatibility and Longevity


IoT is growing in many different directions, with many different technologies competing to
become the standard. This will cause difficulties and require the deployment of extra
hardware and software when connecting devices.
Other compatibility issues stem from non-unified cloud services, lack of standardized
M2M protocols and diversities in firmware and operating systems among IoT devices.
Some of these technologies will eventually become obsolete in the next few years, effectively
rendering the devices implementing them useless. This is especially important, since in
contrast to generic computing devices which have a lifespan of a few years, IoT appliances
(such as smart fridges or TVs) tend to remain in service for much longer, and should be able
to function even if their manufacturer goes out of service.

9.5 Standards
Technology Standards which include network protocols, communication protocols, and data-
aggregation standards, are the sum of all activities of handling, processing and storing the data
collected from the sensors. This aggregation increases the value of data by increasing, The
scale, scop, and and frequency of data available for analysis.

29
FUTURE SCOPES

Internet of Things is not something new and its been there in the industry for a long time. Like
Airforce, Army, Navy, Space research etc.

Anything that touches consumer industry became a buzz word. So now Internet of Things is
one among. What it is - the end goals is to bring all things we use in day to day life over
network and can be accessed across the world over internet. That means every objects/gadgets
we use in a day to day life will have a identify over network and its information can be
consumes via Laptop, Tablet and mobile and including wearable like smart watches.

a) Monitoring and Reporting:


Thousands and millions of devices, equipments would be connected with each other with IOT
concept. Inputting data at present is not fully automated in the internet, but this also will be
achieved with Self Monitoring Analysis and Reporting Technology (SMART). Using IOT
each and every movement in our home can be monitored and connected to the internet. By
reporting and monitoring we mean to say that if there is a gas leak, the sensors can find out
and communicate it to us. Smart cities would ensure living in clean and safe environments,
intelligent smart traffic systems ensuring less number of accidents.

b) Plants and Animals:


IoT will drive tremendous innovation in the way our food is grown, processed, distributed,
stored, and consumed. We would be able to know the requirement of plants and animals,
based on data that can tell people, computers, and machines when, for example, they require
water, treatment, healthcare support, need more sun or individual attention

c) Utility:
IOT will make a digital revolution in all the fields. It will make daily life easier with
availability of technology which will be user friendly. According to Xing Zhihao, Zhong
Yongfeng, the power companies would read meters through telemetering systems instead of
visiting houses; doctors would remotely monitor the conditions of their patients 24/7 by
having the patients use devices at home instead of requiring the patients to stay at hospital;
vehicle mounted terminals automatically display the nearest parking space; sensors in smart
homes turn off utilities, close windows, monitor security, and report to house owners in real
time. These are scenarios that only existed in science fiction previously. With the coming of
age of the Internet of Things, however, they would become a reality

d) Information:
In future, internet access will be much faster than what we think; we will get the answers by
just thinking about it. One can access internet anywhere any time without any expensive
gadgets and gizmos.

30
Chapter 10
CONCLUSION

The thought of always being tracked and your data being recorded does bring a fear to a
consumer’s mind, but we have to move away from it to see the benefits that this great
technology is going to bring to us. The above examples were about a 'connected you', making
your life seamless, but it brings with it higher benefits like connected cities, better commerce
and an improved ecosystem. As often happens, history is repeating itself. Just as in the early
days when Cisco’s tagline was “The Science of Networking Networks,” IoT is at a stage
where disparate networks and a multitude of sensors must come together and interoperate
under a common set of standards. This effort will require businesses, governments, standards
organizations, and academia to work together toward a common goal. Next, for IoT to gain
acceptance among the general populace, service providers and others must deliver
applications that bring tangible value to peoples’ lives. IoT must not represent the
advancement of technology for technology’s sake; the industry needs to demonstrate value in
human terms. In conclusion, IoT represents the next evolution of the Internet. Given that
humans advance and evolve by turning data into information, knowledge, and wisdom, IoT
has the potential to change the world as we know it today—for the better. How quickly we
get there is up to us.

31
REFERENCE
1. https://en.wikipedia.org/wiki/Internet_of_things
2. https://techbeacon.com/app-dev-testing/67-open-source-tools-resources-iot
3. https://www.raspberrypi.org/documentation/usage/python/
4. https://www.researchgate.net/publication/26388489_An_Introduction_to_Face_Rec
ognition_Technology
5. https://engineering.eckovation.com/what-are-network-topology-in-iot/

32

Вам также может понравиться