IoT Module-3 Notes
IoT Module-3 Notes
IoT Module-3 Notes
1. Introduction:
Prototype deployment of the programs require boot loader, OS and IDE. Software
embeds into a design platform.
IDE enables development of software at first level and second level for embedding
into a device platform.
Boot loader firm ware stores at Flash/ROM of a microcontroller in a device and
enables communication with a computer having an IDE.
IDE consist of API’s, Libraries, compilers, RTOS, Simulator, editor, assembler,
debugger and so on.
IDE enables the development of codes on a computer and later on downloading of
codes on to be embedded device.
Arduino board can be programmed using avr-gcc tools. The Arduino board has a pre-
installed bootloader embedded into the firmware.
Arduino programmer develops the codes using a graphical cross-platform IDE.
Arduino provides simplicity.
IDE of Arduino board also has simplicity, is based on processing language and
makes the programming easy.
The Arduino bootloader provisions for multitasking by the usage of interrupt.
The Arduino IDE includes a C/C++ library. The library is called Wiring for a
project of the same name with open source module at a website
4. Devices, Gateways, Internet And Web/Cloud Services Software
development:
The fig. shows five levels for software development for applications and services
in the IoT or M2M.
The software needs are for the devices, local network, gateway, cloud/web
connectivity and web/cloud APIs.
Software, such as Eclipse IoT, enable the development of software for the first,
second and third levels.
The software enables the device gateways connectivity to the Internet and cloud
server.
IoT enables the open source implementation of IoT protocols.
Fig. Five levels for software development applications and services for IoT or M2M.
5. IoT Privacy and Security:
Introduction:
International organizations are making a number of efforts towards ensuring that IoT
design must ensure trust, data security and privacy.
Message: String that represents data.
Hash: Collection or bundles which gives irreversible result after many operations on data.
Digest: It is a process which gives irreversible results involving many operations.
Encryption: It is a process of generating new data using a secret key known only to a
receiver.
Decryption: which retrieves the data from the encrypted data.
Use Case: It means a list of event steps which defines the interaction between two ends.
Misuse case: It can be understood as reverse sense of use case.
7. Security Tomography:
******************