Internet of Things (Iot 540) : L-T-P - (C) 4-0-0

Download as pdf or txt
Download as pdf or txt
You are on page 1of 50

Internet of Things (IoT 540)

L-T-P-[C] 4-0-0-[4]

Outline of the course


First half of the course –
Introduction to IoT, need, technologies used in IoT, benefits of IoTs, IoT
Implementation Challenges, Applications, Characteristics & technologies
of IoT – RFID, NFC, Bluetooth, IoT structure, Working process of IoT,
Components of internet of things, - Sensor, Actuator.
IoT Networking – IoT Architecture, Reference model, IoT Service Oriented
Architecture, challenges.

IoT Protocols – IEEE 804.14.5, ZigBee, Connectivity (6LowPAN, RPL),


Communication / Transport (Wi-Fi, Bluetooth, LPWAN), Discovery
Protocols (Physical Web, mDNS, DNS-SD), Data Protocol (MQTT, CoAP,
AMQP, Web Socket, Node), Device Management (TR-069, OMA-DM),
Semantic (JSON-LD, Web Thing Model)

Courseware and Reference Books


Text Books:
 Mayur Ramgir, Internet of Things- Architecture, Implementation, and Security, Pearson Education India,
2019.
Reference Books:
1. Raj Kamal, INTERNET OF THINGS Architecture and Design Principles, McGraw Hill Education
(India) Private Limited, 2017.
2. S. Misra, A. Mukherjee, and A. Roy, Introduction to IoT, Cambridge University Press, 2020.
3. S. Misra, C. Roy, and A. Mukerjee, 2020, Introduction to Industrial Internet of Things and Industry 4.0,
CRC Press, 2020
4. Research Papers.
Lecture No 04

Internet of Things (IoT)

Revision

IoT Conceptual Framework

Physical Object + (Controller, Sensor and Actuators)


+ Internet = Internet of Things
Eq.1

Gather + Enrich + Stream + Manage + Acquire +


Organise and Analyse
= Internet of Things with connectivity to data centre,
enterprise or cloud server
Eq.2
Gather + Consolidate + Connect + Collect + Assemble +
Manage and Analyse = Internet of Things with
connectivity to cloud services
Eq.3

Characteristics of IoT:

 Efficient, scalable and associated architecture.

 Unambiguous naming and addressing architecture

 Abundance of sleeping nodes, mobile, and non-IP

devices

 Intermittent connectivity
Technologies used in IoTs

 The thing stack comprises of three different


technology tires:
֍ Sensors,
֍ Microcontrollers & internet connectivity, and
֍ Service platforms.

Tier -1: Sensors are installed in the physical environment


or objects to gather data and events.
Tier -2: Microcontroller and internet connectivity are
responsible for sharing gathered information by
using sensors installed in IoT implementation.

It also acts on the basis of this gathered


information to alter the environment.

The tier allows local storage of data, data


processing and internet connectivity.
If we want to send the gathered data to the cloud
database, the IoT needs internet connectivity.

Tier -3: By using the aggregation and analysis of data,


service platforms are able to provide the
necessary support to help in the smooth
functioning of all the sensors.
Service platforms are also to alter the existing
IoT products’ user experience by enabling the
end users to set system rules and update the
sensors’ firmware.
Local area connectivity technologies:

 Radio frequency identification (RFID) [10cm - 200m]


It uses electromagnetic fields to automatically
identify and track tags attached to objects.

 There are two types of RFID tags:


Passive tags are powered by energy from the
RFID reader's interrogating radio waves.

Active tags are powered by a battery and thus


can be read at a greater range from the RFID
reader, up to hundreds of meters.
RFID tags are made out of three pieces:
A micro chip (an integrated circuit which stores and processes
information and modulates
and demodulates radio-
frequency (RF) signals),
an antenna for receiving and
transmitting the signal and a
substrate.

The tag information is stored in a non-volatile memory.

 The RFID tag includes either fixed or programmable


logic for processing the transmission and sensor
data, respectively.
 An RFID device functions as a tag or label, which
may be placed on an object.
 The object can then be tracked for the movements.
The object may be a parcel, person, bird or an
animal.

 IoT applications of RFID are in business processes,


such as parcels tracking and inventory control, sales
log-ins and supply-chain management.

Near field communication (NFC) 4 cm

 NFC is a set of communication protocols


for communication between two electronic devices
1
over a distance of 4 cm (1 2 in) or less.

 NFC is an enhancement of ISO/IEC2 14443 standard


for contact-less proximity-card.

 NFC is a short distance (20 cm) wireless


communication technology.
ISO stands for International Organization for Standardization and IEC stands for International
Electrotechnical Commission.
 It enables data exchange between cards in proximity
and other devices.

 Examples of applications of NFC are proximity-card


reader/RFID/IoT/M2M/mobile device, mobile
payment wallet, electronic keys for car, house, office
entry keys and biometric passport readers.

 NFC devices transmit and receive data at the same


instance and the setup time (time taken to start the
communication) is 0.1 s.

 The device or its reader can generate RF fields for


the nearby passive devices such as passive RFID.

 An NFC device can check RF field and detect


collision of transmitted signals.

 The device can check collision when the received


signal bits do not match with the transmitted signal
bits.
 Features of an NFC device are:
 Range of functioning is within 10 to 20 cm.

 The device can also communicate with


Bluetooth and Wi-Fi devices in order to extend
the distance from 10 cm to 30 m or higher.

 The device is able to receive and pass the data


to a Bluetooth connection or standardised LAN
or Wi-Fi using information handover functions.

 Device data transfer rates are 106 kbps, 212


kbps, 424 kbps and 848 kbps (bps stands for
bit per second, kbps for kilo bit per second).

 Three modes of communication are:


 Point-to-point (P2P) mode: Both devices use the
active devices in which RF fields alternately
generate when communicating.
 Card-emulation mode: Communication without
interruption for the read and write as required in
a smart card and smart card reader.

FeliCa™ and Mifare™ standards are protocols


for reading and writing data on the card device
and reader, and then the reader can transfer
information to Bluetooth or LAN.

 Reader mode: Using NFC the device reads


passive RFID device. The RF field is generated
by an active NFC device. This enables the
passive device to communicate.

 NFC offers a low-speed connection with simple


setup that can be used to bootstrap more-capable
wireless connections.
NFC devices can act as electronic identity documents and keycards.
 They are used in contactless payment systems and
allow mobile payment replacing or supplementing
systems such as credit cards and electronic
ticket smart cards.

 This is sometimes called NFC/CTLS or CTLS NFC,


with contactless abbreviated CTLS.

NFC can be used for sharing


small files such as contacts,
and bootstrapping fast
connections to share larger
media such as photos, videos,
and other files.

https://en.wikipedia.org/wiki/Near-field_communication#/media/File:NFC_Protocol_Stack.png

Wi-Fi stands for “wireless fidelity” just as Hi-Fi stands


for “high fidelity”.

Wi-Fi – no meaning
 Wi-Fi is an interface technology that uses IEEE
802.11 protocol and enables the Wireless Local Area
Networks (WLANs).

 Wi-Fi devices connect enterprises, universities and


offices through home AP/public hotspots.

 Wi-Fi connects distributed WLAN networks using the


Internet.

 Automobiles, instruments, home networking,


sensors, actuators, industrial device nodes,
computers, tablets, mobiles, printers and many
devices have Wi-Fi interface.

They network using a Wi-Fi network.

Wi-Fi is very popular.


The issues of Wi-Fi interfaces, APs and routers are
higher power consumption, interference and
performance degradation.

Wi-Fi interfaces connect within themselves or to an


AP or wireless router using Wi-Fi PCMCIA or PCI
card or built-in circuit cards and through the
following:
 Base station (BS) or AP
 A WLAN transceiver or BS can connect one or
many wireless devices simultaneously to the
Internet.

 Peer-to-peer nodes without access point: Client


devices within Independent Basic Service Set
(IBSS) network can communicate directly with
each other.
It enables fast and easy setting of an 802.11
network.
 Peer to multipoint nodes with Basic Service Sets
(BSSs) using one in-between AP point or
distributed BSSs connect through multiple APs.

 Connectivity range of each BSS depends on the


range of wireless bridges and antennae used
and environmental conditions.
Bluetooth – [BLE] {PAN} 10m to 100m
 It is a short-range wireless technology standard used
for exchanging data between fixed and mobile
devices over short distances using Ultra high
frequency (UHF) radio waves in the industrial,
scientific and medical (ISM) bands, from 2.402 GHz
to 2.48 GHz, and building personal area
networks (PANs).

 It was originally conceived as a wireless alternative


to RS-232 data cables.

 It is mainly used as an alternative to wire


connections, to exchange files between nearby
portable devices and connect cell phones and music
players with wireless headphones.

 In the most widely used mode, transmission power is


limited to 2.5 milliwatts, giving it a very short range of
up to 10 meters (30 feet).
 The IEEE standardized Bluetooth as IEEE 802.15.1,
but no longer maintains the standard.

 Bluetooth is a wireless LAN technology designed to


connect devices of different functions such as telephones,
notebooks, computers (desktop and laptop), cameras,
printers, coffee makers, and so on.

 A Bluetooth LAN is an ad hoc network, which means that


the network is formed spontaneously; the devices,
sometimes called gadgets, find each other and make a
network called a piconet.

 A Bluetooth LAN can even be connected to the Internet if


one of the gadgets has this capability.

 A Bluetooth LAN, by nature, cannot be large. If there are


many gadgets that try to connect, there is chaos.
 Bluetooth defines two types of networks: piconet and
scatternet.

Piconets

 A Bluetooth network is called a piconet, or a small net.

 A piconet can have up to eight stations, one of which is


called the primary; the rest are called secondaries.

 A piconet can have only one primary station.

 The communication between the primary and the


secondary can be one-to-one or one-to-many.
 Although a piconet can have a maximum of seven
secondaries, an additional eight secondaries can be in the
parked state.

 A secondary in a parked state is synchronized with the


primary, but cannot take part in communication until it is
moved from the parked state.

Scatternet

 Piconets can be combined to form what is called a


scatternet.

 A secondary station in one piconet can be the primary in


another piconet.

 This station can receive messages from the primary in the


first piconet (as a secondary) and, acting as a primary,
deliver them to secondaries in the second piconet.
A station can be a member of two piconets.
Zigbee – 802.15.4 {PAN} 10m to 100m

 It is a wireless technology developed as an open


global standard to address the unique needs of low-
cost, low-power wireless IoT networks.

 The Zigbee standard operates on the IEEE


802.15. 4 physical radio specification and operates
in unlicensed bands including 2.4 GHz, 900 MHz and
868 MHz.

The Zigbee 3.0 software stack incorporates a ‘base


device’ that provides consistent behavior for
commissioning nodes into a network.
Zigbee 3.0 provides enhanced network security. There
are two methods of security that give rise to two types of
network:

 Centralized security: This method employs a


coordinator/trust center that forms the network
and manages the allocation of network and link
security keys to joining nodes.

 Distributed security: This method has no


coordinator/trust center and is formed by a router.
Any Zigbee router node can subsequently provide
the network key to joining nodes.

Nodes adopt whichever security method is used by the


network they join.

Zigbee 3.0 supports the increasing scale and complexity


of wireless networks, and copes with large local networks
of greater than 250 nodes.
Zigbee also handles the dynamic behavior of these
networks (with nodes appearing, disappearing and re-
appearing in the network) and allows orphaned nodes,
which result from the loss of a parent, to re-join the
network via a different parent.

The self-healing nature of Zigbee Mesh networks also


allows nodes to drop out of the network without any
disruption to internal routing.

The backward compatibility of Zigbee 3.0 means that


applications already developed under the Zigbee Light
Link 1.0 or Home Automation 1.2 profile are ready for
Zigbee 3.0.
The Smart Energy profile is also compatible with Zigbee
3.0 at the functional level, but Smart Energy has
additional security requirements that are only addressed
within the profile.

Zigbee’s Over-The-Air (OTA) upgrade feature for


software updates during device operation ensures that
applications on devices already deployed in the field can
be seamlessly migrated to Zigbee 3.0.

OTA upgrade is an optional functionality that


manufacturers are encouraged to support in their Zigbee
products.

How does the Bluetooth layer provide confidentiality and authorisation?

A standard algorithm AES (Advanced Encryption Algorithm) based on symmetric 128-


bit block data encryption and CCM mode (Counter with CBC-MAC) provides the
confidentiality and authorisation. CBC stands for cryptographic block cipher with a
block length of 128 bits. CCM is a method which provisions for the authenticated
encryption algorithm for confidentiality and authentication.
Global System for mobile communication (GSM)
 GSM is a standard developed by the European
Telecommunications Standards Institute (ETSI) to
describe the protocols for second-generation (2G)
digital cellular networks used by mobile devices such
as mobile phones and tablets.

 It was first deployed in Finland in December 1991.

 GSM is an open and digital cellular technology used


for transmitting mobile voice and data services
operate at the 850MHz, 900MHz, 1800MHz, and
1900MHz frequency bands.

 GSM technology was developed as a digital system


using the time division multiple access (TDMA)
technique for communication purposes.

 A GSM digitizes and reduces the data, then sends it


down through a channel with two different streams of
client data, each in its own particular time slot.
 The digital system has the ability to carry 64 kbps to
120 Mbps of data rates.

Features of GSM Module

The features of the GSM module include the following.

 Improved spectrum efficiency


 International roaming
 Compatibility with integrated services digital network
(ISDN)
 Support for new services.
 SIM phonebook management
 Fixed dialing number (FDN)
 Real-time clock with alarm management
 High-quality speech
 Uses encryption to make phone calls more secure
 Short message service (SMS)
General Pocket Radio Services (GPRS)
 GPRS is a packet oriented mobile data standard on
the 2G and 3G cellular communication
network's global system for mobile
communications (GSM).

 GPRS was established by European


Telecommunications Standards Institute (ETSI) in
response to the earlier cellular digital packet data
(CDPD) and i-mode packet-switched cellular
technologies.
i-mode - uses cHTML which is subset of HTML, and it is service.

 It is now maintained by the 3rd Generation


Partnership Project (3GPP).

 In 2G systems, GPRS provides data rates of 56–


114 kbit/sec.
 2G cellular technology combined with GPRS is
sometimes described as 2.5G, that is, a technology
between the second (2G) and third (3G) generations
of mobile telephony.

 It provides moderate-speed data transfer, by using


unused time division multiple access (TDMA)
channels in, for example, the GSM system.

 GPRS is integrated into GSM Release 97 and newer


releases.

GPRS supports the following protocols:


 Internet Protocol (IP). In practice, built-in mobile
browsers use IPv4 before IPv6 is widespread.

 Point-to-Point Protocol (PPP) is typically not supported


by mobile phone operators but if a cellular phone is used
as a modem for a connected computer, PPP may be
used to tunnel IP to the phone.
This allows an IP address to be dynamically assigned
(using IPCP rather than DHCP) to the mobile equipment.

In computer networking, Internet Protocol Control


Protocol (IPCP) is a Network Control Protocol
(NCP) for establishing and configuring
Internet Protocol over a Point-to-Point
Protocol link.

 X.25 connections are typically used for applications like


wireless payment terminals, although it has been
removed from the standard.

X.25 can still be supported over PPP, or even over IP,


but this requires either a network-based router to
perform encapsulation or software built into the end-
device/terminal; e.g., user equipment (UE).
When TCP/IP is used, each phone can have one or
more IP addresses allocated.

GPRS will store and forward the IP packets to the phone


even during handover.

The TCP restores any packets lost (e.g. due to a radio


noise induced pause).

Services offered

GPRS extends the GSM Packet circuit switched data


capabilities and makes the following services possible:

 SMS messaging and broadcasting


 “Always on” internet access
 Multimedia messaging service (MMS)
 Push-to-talk over cellular (PoC)
 Instant messaging and presence—wireless village
 Internet applications for smart devices through wireless
application protocol (WAP)
 Point-to-point (P2P) service: inter-networking with the
Internet (IP)
 Point-to-multipoint (P2M) service: point-to-multipoint
multicast and point-to-multipoint group calls
Long term radio services (LTE)
 In telecommunications, LTE is a standard for
wireless broadband communication for mobile
devices and data terminals, based on
the GSM/EDGE and UMTS/HSPA technologies.

Evolved High Speed Packet Access, or HSPA+,


or HSPA (Plus), or HSPAP is a technical
standard for wireless broadband
telecommunication.
High-Speed Downlink Packet Access (HSDPA)

Universal Mobile Telecommunications


System (UMTS)

 It increases the capacity and speed using a different


radio interface together with core network
improvements.
 LTE is the upgrade path for carriers with both
GSM/UMTS networks and CDMA2000 networks.
Long-Term Evolution (LTE)

Code-division multiple access (CDMA)

 The different LTE frequencies and bands used in


different countries mean that only multi-band phones
are able to use LTE in all countries where it is
supported.
Comparison of 6G with 4G and 5G communication systems

XR – Extended Reality
Differences between NFC, BT LE, ZigBee and WLAN protocols
Benefits of IoT
IoT brings a lot of benefits to end users and businesses.
 Benefits of End users
֍ Easy of doing things
֍ Emergency services
֍ Security services

 Benefits of Businesses
֍ Process improvements
֍ Asset utilization
֍ New market opportunities
֍ Workplace security

IoT Implementation Challenges


 Security
 Regulatory and legal issue
 Network Latency
 Unavailability of standardized platform and common
architecture
 Scalability
 Limited types of sensors
 Power supply
Applications
IoT systems are useful in a broad range of
applications:

 Industry Domain – Automobile & Mining etc.


֍ Automobile
Today’s automobiles are controlled by a number
of electronic systems.
IoT Car - Tesla

1. The Tesla has a persistent 3G cell connection to the


internet that is paid for gratis by Tesla. This makes
it one of the “Internet of Things”.
2. It also has Wi-fi, bluetooth and garage door opener
built in.
3. The car can provide Geolocation information.
4. The car has a camera (in the back).
5. Tesla has reportedly formed an early warning threat
detection and reward system to reward hackers who
discover vulnerabilities in the cars security.
֍ Mining
1. Mine production is often accompanied by
dangerous natural disasters such as fire, gas, and
floods.
2. Protecting the safety of mine personnel has
become a top priority.
3. The application of IoT in mining includes a
number of key technologies, such as perception
technology, identification technology, WSN
technology, and intelligent technology.

 Smart Environment Domain – Smart Home, &


Wearable

֍ Smart Home
֍ Imagine. When you wake up, one touch on your
tablet turns the lights on.

As you rush to your office, one swipe of your


phone checks all the windows are closed
before you step out.
When the sun sets, your lobby light turns on.
Automatically

֍ Wearable
There are many sensor nodes in wearable
devices, which are used to collect and transmit
information.

The information includes sleep patterns, blood


pressure, body temperature, heart rate, and
ambient environmental information.
 Urban Infrastructure – Smart Grid, &
Transportation and Logistics
֍ Smart Grid
Provides technical support for the grid power
generation, transmission, substation, power
distribution, and scheduling.

֍ Transportation and Logistics


With the increasing maturity of IoT, its
application has recently spread to the fields of
transportation and logistics.

The continuous development of key


technologies of IoT promotes the
development of intelligent transportation,
which can effectively alleviate the traffic
problems, such as traffic congestion and
traffic accidents.

Journal of Hardware and Systems Security (2018) 2:97–110


 Healthcare
Electronic Health Records (EHR)

Biometric information gathered from the sensors


can be wirelessly sent using two available
connectivity.
Options: Wi-Fi or Bluetooth
Cows on the IoT
Powering the peddle to the “Fitbit” movement, why
should animals be left far behind?
“Fitbit” - Wearable
So, in the modern day IoT people are talking about different
applications such as smart parking, structural health monitoring,
noise urban maps; that means, noise maps in a particular city or
an urban environment smartphone detection traffic condition,
smart lighting systems, waste management, smart roads, river
flood monitoring, smart grid, tank level monitoring, water flow
monitoring, stock calculations, access control presence of
different liquids hazardous materials and so on and so forth.
 Baseline Technologies
A number of technologies that are very close related to IoT
include

֍ Machine-to-Machine(M2M) communications,
 In M2M communication, one machine directly
talks to another machine, communicates with
other machine without any human intervention.

 Such interactions can occur via a cloud


computing infrastructure (e.g., devices
exchanging information through a cloud
infrastructure).

 M2M offers the means for managing devices


and device interaction, while also collecting
machine and/or sensor data.

 M2M is a term introduces by telecommunication


service providers and, pays emphasis on
machines interactions via one or more telecom /
communication networks (e.g., 3G, 4G, 5G,
satellite, public networks).
֍ Cyber-Physical-Systems(CPS)
In this system, where the cyber, the physical systems
are basically equipped with computer and
connectivity computational and connectivity
mechanism.

֍ Web-of-Things (WoT)
 The web of things is sort of like the web person
of the internet of things.

 The web of things basically focuses more on the


use of web based technologies, such as
HTML5.0, JavaScript, Ajax, PHP and so on and
so forth.

Summary

We learnt

(i) Definition of Internet,


(ii) Definition of the Thing and
(iii) Definition of Internet of Things
(iv) IoT Vision

You might also like