SlideShare a Scribd company logo
UNIT-III IoT ELEMENTS AND
CHALLENGES
Building blocks of an IoT Device – Raspberry Pi, Arduino – Sensing devices,
Communication Modules: Bluetooth, Zigbee, RFID, Wi-Fi - Power Sources –Data
Management, Business Processes in IoT –– Challenges in IoT: Design Challenges,
Development Challenges, Security Challenges and Other Challenges.
Building blocks of an IoT Device
Block Diagram of IoT devices
Exemplary Device: Raspberry Pi
• Raspberry Pi is a low-cost mini-computer with the physical size of a credit card.
• Raspberry Pi runs various flavors of Linux and can perform almost all tasks that a
normal desktop computer can do.
• Raspberry Pi also allows interfacing sensors and actuators through the general-
purpose I/O pins.
• Since Raspberry Pi runs Linux operating system, it supports Python "out of the
box".
Raspberry Pi
Linux on Raspberry Pi
Raspberry Pi GPIO
Raspberry Pi Interfaces
IoT Scenario
• An IoT device or sensor generates data that is sent through a
messaging system, evaluated against complex event-processing rules,
and then stored for downstream applications, reporting, and further
machine learning.
• An edge device is any piece of hardware that controls data flow at the
boundary between two networks. Cloud computing and the internet
of things (IoT) have elevated the role of edge devices, ushering in the
need for more intelligence, computing power and advanced services at
the network edge.
unit-3.pptx
unit-3.pptx
IoT device level
• IoT bridges the gap between the physical world and the digital world and that
starts with things.
• Include transducers such as sensors and actuators
• A transducer converts a signal in a form of energy into a signal in another
form.
• Myriad(countless) objects which are often called ‘smart’, ‘intelligent’, or plain
old ‘connected’ (smart light bulbs, connected valves and pumps, smart
meters, connected cars, intelligent or smart building components, smart
home devices, etc.).
• Hardware, software, connection and associated services come together in
one device.
Sensor
• A sensor is a device that detects, measures, or indicates any specific
physical quantity such as light, heat, motion, moisture, pressure, or
similar entities, by converting them into any other form which is
mostly, electrical pulses.
• Sensors can ‘sense’ and communicate about are parameters such as
sound, temperature, humidity, presence of specific chemical
components or gases, light, occupancy (e.g. of a room)
• Very accurate, giving the world a digital nervous system.
• A connected object can have a few or many thousands of sensors and
transducers. Share part of the digital data backbone of connected and
intelligent solutions.
unit-3.pptx
Actuators
• Actuators are transducers.
• Sensor's sense and send
• Actuators act and activate.
• Actuator does the opposite of a sensor
• The actuator gets a signal and sets in motion what it needs to set in
motion in order to act upon/within an environment.
• Actuators in most cases are about turning something on or off by
applying some force.
• In industrial applications or robotics, the usage of actuators for
grippers.
Example
• Sensors detect there is no one in the room.
• Actuators get triggered to lower temperature or stop HVAC
• Control system reports back the decision to the management system
• With energy savings as a result Everyone is happy.
Sensor Vs Actuator
Sensor Actuator
A sensor is a device that changes a physical parameter
to an electrical output.
An actuator is a device that converts an electrical signal
to a physical output
The sensor is situated at the input port to take the
input
An actuator is placed at the output port
Sensor generates electrical signals An actuator results in the production of energy in the
form of heat or motion.
Sensors present with information about the state of
the system.
Actuators accept commands to perform a function
Magnetometer, cameras, microphones are some of the
examples in which the sensor is used.
Actuators are used in the LED, loudspeaker, motor
controllers, laser actuators are used in the LED,
loudspeaker, motor controllers, laser
IoT Gateway
• A high level of interoperability, redundancy, connectivity, pre-processing of data,
aggregation of data, remote control and management leads to the requirement for
gateways
• Gateways are not IoT devices
• A different IoT technology layer
• An Internet of Things (IoT) gateway is a physical device or software program that
serves as the connection point between the cloud and controllers, sensors and
intelligent devices.
• Benefit of an IoT gateway is that it can provide additional security for the IoT network
and the data it transports.
• An IoT Gateway is a solution for enabling IoT communication, usually device -to-device
communications or device-to-cloud communications.
• The gateway is typically a hardware device housing application software that
performs essential tasks.
Need for Gateway
• Bridge it all and enable those various things and sensors and data to
‘talk’ with each other
• Making some sense of it all before sending all this data somewhere
else where it really – ideally – leads to real sense, actionable insights
and actions in whatever shape.
• Bridge between the “full” edge (including the edge systems) on one
hand and the cloud (and business applications or whatever
infrastructure where the data goes to/through) on the other.
unit-3.pptx
Why are IoT gateways used?
• In order to make the convergence of IT and OT a reality in any given
project one need IoT gateways and IoT platforms.
• Has everything to do with security on the level of communications.
• Example : an IoT gateway for fleet management needs to be able to
‘communicate’ with telematics systems and their specific protocols, as
well as with GPS.
Why Use an IoT Gateway Device?
• Bridging the Gap Between OT and IT
• High Scalability – they are able to take intelligent data from the datacenter
or cloud and push into the field or network edge.
• Lowering Costs – end-point devices needn’t have as high processing power,
memory or storage since the gateway does this all for them.
• Faster Production – an accelerated and more advanced production line can
decrease time-to-market significantly.
• Reduce Telecommunications Cost – less M2M communication means a
smaller network and (WAN) traffic.
• Mitigate Risks – gateways can isolate devices and sensors that aren’t
performing before they cause bigger problems for the production line.
• Adding a Layer of Security
Zigbee
• Product from Zigbee alliance
• Zigbee is a wireless technology developed as an open global standard to address
the unique needs of low-cost, low-power wireless IoT networks.
• The Zigbee standard operates on the IEEE 802.15.4 physical radio specification and
operates in unlicensed bands including 2.4 GHz, 900 MHz and 868 MHz.
• Requires low power from the device, the battery life is significantly improved.
• IEEE 802.15.4 is a technical standard which defines the operation of low-rate
wireless personal area networks (LR-WPANs).
• Zigbee stack gained ratification by IEEE in 2003.
• The specification is a packet-based radio protocol intended for low-cost, battery-
operated devices.
• The protocol allows devices to communicate in a variety of network topologies
and can have battery life lasting several years.
Zigbee3.0
• https://www.elprocus.com/what-is-zigbee-technology-architecture-
and-its-applications/
• Here are some brands and devices to look out for.
• Amazon Echo
• Bosch Security Systems
• Honeywell thermostats
• Philips Hue (Signify)
• Samsung SmartThings
• ZigBee is primarily used for two-way communication between a sensor
and a control system.
• Like Bluetooth and Wi-Fi, it is a short-range communication and offers
connectivity up to 100 meters.
• On the other end, Wi-Fi and Bluetooth are high data rate standards
which support the transfer of media files, software, etc.
• Communication standard defines physical and Media Access Control
(MAC) layers to handle many devices at low-data rates.
• Zigbee is a low-cost and low-powered
mesh network
• Deployed in controlling and monitoring
applications where it covers 10-100
meters within the range
• Supports network configurations for the
master to master or master to slave
communications.
• can be operated in different modes as a
result the battery power is conserved.
• Zigbee networks are scalable with the use
of routers and allow many nodes to
interconnect with each other for building
a wider area network
How does Zigbee Technology Work?
• Zigbee technology works with digital radios by allowing different devices to
converse through one another.
• The devices used in this network are a router, coordinator and end devices.
• The main function of these devices is to deliver the instructions and
messages from the coordinator to the single end devices such as a light
bulb.
• In this network, the coordinator is the most essential device which is placed
at the origin of the system.
• For each network, there is one coordinator, used to perform different tasks.
• They choose a suitable channel to scan a channel as well as to find the most
appropriate one through the minimum of interference, allocate an exclusive
ID as well as an address to every device within the network so that
messages otherwise instructions can be transferred in the network.
Cont..
• Routers are arranged in the coordinator as well as end devices
• Accountable for messages routing among the various nodes.
• Routers get messages from the coordinator and stored them until their end
devices are in a situation to get them.
• Also permit other end devices as well as routers to connect the network
• End devices don’t converse directly through each other.
• Traffic can be routed toward the parent node like the router, which holds
this data until the device’s receiving end is in a situation to get it through
being aware.
• End devices request any messages that are waiting from the parent
Zigbee Architecture
• Consists of three different types of devices as Zigbee Coordinator, Router,
and End device
• Every Zigbee network must consist of at least one coordinator which acts as
a root and bridge of the network.
• The coordinator is responsible for handling and storing the information
while performing receiving and transmitting data operations.
• Zigbee routers act as intermediary devices that permit data to pass to and
fro through them to other devices.
• End devices have limited functionality to communicate with the parent
nodes such that the battery power is saved
• The number of routers, coordinators, and end devices depends on the type
of networks such as star, tree, and mesh networks.
ZigBee Network
Zigbee Protocol Architecture
Cont..
• Physical Layer: This layer does modulation and demodulation operations upon transmitting and
receiving signals respectively. This layer’s frequency, data rate, and a number of channels are
given below.
• MAC Layer: This layer is responsible for reliable transmission of data by accessing different
networks with the carrier sense multiple access collision avoidances (CSMA). This also transmits
the beacon frames for synchronizing communication.
• Network Layer: This layer takes care of all network-related operations such as network setup, end
device connection, and disconnection to network, routing, device configurations, etc.
• Application Support Sub-Layer: This layer enables the services necessary for Zigbee device
objects and application objects to interface with the network layers for data managing services.
This layer is responsible for matching two devices according to their services and needs.
• Application Framework: It provides two types of data services as key-value pair and generic
message services. The generic message is a developer-defined structure, whereas the key-value
pair is used for getting attributes within the application objects. ZDO provides an interface
between application objects and the APS layer in Zigbee devices. It is responsible for detecting,
initiating, and binding other devices to the network.
Zigbee Communication Operation
• Zigbee two-way data is transferred in two modes:
• Non-beacon mode and
• Beacon mode.
• In a beacon mode, the coordinators and routers continuously monitor the active
state of incoming data hence more power is consumed. In this mode, the routers
and coordinators do not sleep because at any time any node can wake up and
communicate.
• Requires more power supply but its overall power consumption is low because
most of the devices are in an inactive state for over long periods in the network.
• In a non beacon mode, when there is no data communication from end devices,
then the routers and coordinators enter into a sleep state. Periodically this
coordinator wakes up and transmits the beacons to the routers in the network.
• These beacon networks work for time slots which means, they operate when the
communication needed results in lower duty cycles and longer battery usage
Zigbee Topologies
Star Topology
• the most commonly used configurations are star, mesh and cluster
tree topologies.
• Any topology consists of one or more coordinator.
• In Star the network consists of one coordinator which is responsible
for initiating and managing the devices over the network.
• All other devices are called end devices that directly communicate
with coordinator.
• This is used in industries where all the end point devices are needed
to communicate with the central controller
• is simple and easy to deploy.
Mesh and Tree Topology
• In mesh and tree topologies, the Zigbee network is extended with several
routers where coordinator is responsible for staring them.
• These structures allow any device to communicate with any other adjacent
node for providing redundancy to the data.
• If any node fails, the information is routed automatically to other device by
these topologies.
• As the redundancy is the main factor in industries, hence mesh topology is
mostly used.
• In a cluster-tree network, each cluster consists of a coordinator with leaf
nodes, and these coordinators are connected to parent coordinator which
initiates the entire network.
Cont..
• low cost
• low power operating modes
• topologies,
• short range communication
technology
• Best Suited for short range
applications
Applications of Zigbee
• Industrial Automation: In manufacturing and production industries, a
communication link continually monitors various parameters and critical
equipments. Hence Zigbee considerably reduce this communication cost as well
as optimizes the control process for greater reliability.
• Home Automation: Zigbee is perfectly suited for controlling home appliances
remotely as a lighting system control, appliance control, heating and cooling
system control, safety equipment operations and control, surveillance, and so on.
• Smart Metering: Zigbee remote operations in smart metering include energy
consumption response, pricing support, security over power theft, etc.
• Smart Grid monitoring: Zigbee operations in this smart grid involve remote
temperature monitoring, fault locating, reactive power management, and so on.
RADIO FREQUENCY IDENTIFICATION (RFID)
• Radio Frequency Identification (RFID) is a method that is used to track or
identify an object by radio transmission uses over the web. Data is digitally
encoded in an RFID tag which might be read by the reader. This is device
work as a tag or label during which data read from tags that are stored in
the database through the reader as compared to traditional barcodes and
QR codes. It is often read outside the road of sight either passive or active
RFID.
• RFID tags contain a chip that holds an electronic product code (EPC) number that
points to additional data detailing the contents of the package.
• Readers identify the EPC numbers at a distance, without a line of sight
scanning or involving physical contact.
• Middleware can perform initial filtering on data from the readers.
• Applications are evolving to comply with shipping products to automatically
processing transactions based on RFID technology.
RADIO FREQUENCY IDENTIFICATION (RFID)
TAGS
• A Tag is a transponder that receives a radio signal and in response
to it sends out a radio signal.
• Tag contains an antenna and a small chip that stores a small
amount of data.
• Tag can be programmed at manufacture or on installation.
• Tag is powered by the high-power electromagnetic field generated
by the antennas – usually in doorways.
• The field allows the chip/antenna to reflect back an extremely
weak signal containing the data.
• Collision Detection – recognition of multiple tags in the read
range – is employed to separately read the individual tags
DIFFERENT TYPES OF TAGS
TAG ATTRIBUTES
READERS
□ An RFID reader is a device that is used to interrogate an RFID tag. The reader has an
antenna that emits radio waves; the tag responds by sending back its data.
The reader has two basic components –
□ scanning antenna
□ transceiver with a decoder to interpret the data
Some Reader Examples
THE EPC CODE
□ The objective of the Electronic Product Code (EPC) is to provide unique
identification of physical objects.
□ The EPC will be used to address and access individual objects from the
computer network, much as the Internet Protocol (IP) Address allows
computers to identify, organize and communicate with one another.
THE EPC CODE
□ Eg. 613.23000.123456.123456789 (96 bits)
□ Header – defines data type (8 bits)
□ EPC Manager – describes originator of EPC
(Product manufacturer) (34 bits)
□ Object Class Could describe the product type (20
Bits)
□ Serial Number – Unique ID for that product item (34
Bits)
APPLICATIONS
□ IT Asset Tracking
institutions with large IT assets with numerous data centers
□ Race Timing
Registering race start and end timings for individuals in a
marathontype race
Individuals wear a chest number containing passive tags which
are read by antennae placed alongside the track
Rush error, lap count errors and accidents at start time are
avoided
APPLICATIONS
□ Epassport
Pioneer: Malaysia(1998)visual data page, travel history
Norway(2005), Japan, EU, UK, Australia, US, Serbia
□ Transportation Payments
Gurgaon, Noida: Tollway
Mumbai: Integrated transport buses and local trains
United States: Chicago Transit Authority’s Card for Metro, Metra,
CTA buses & PACE buses fare payments (2002)
An Electronic Road
Pricing gantry
RFID tag : electronic toll
collection
Human implants
Libraries
APPLICATIONS of RFID
□ Animal tracking tags, inserted beneath the
skin, can be rice-sized.
□ Tags can be screw-shaped to identify trees
or wooden items.
□ Credit card shaped for use in
access applications.
□ The antitheft hard plastic tags attached
to merchandise in stores are also RFID
tags.
□ zombie RFID tag, a tag that can be temporarily deactivated
when it leaves the store.
The process would work like this: you bring your purchase up to
the register, the RFID scanner reads the item, you pay for it
and as you leave the store, you pass a special device that
sends a signal to the RFID tag to "die." That is, it is no longer
readable.
The "zombie" element comes in when you bring an item back to
the store. A special device specially made for that kind of tag
revives the RFID tag, allowing the item to re-enter the supply
chain.
PROBLEMS AND CONCERNS IN RFID
TECHNICAL PROBLEMS
□ No Standardization
□ Exxon Mobil Speed pass
□ Easy to Jam
□ Disastrous in case of hospitals and military
□ RFID Reader Collision
□ One tag many readers
□ RFID Tag Collision
□ One Reader many tags
SECURITY , PRIVACYAND ETHICAL PROBLEMS in IoT
□ Contents can be read after the item leaves the supply chain
□ RFID tags are difficult to remove
□ RFID tags can be read without your knowledge
□ RFID tags can be read a greater distances with a high gain
antenna
□ RFID tags with unique serial numbers could be linked to an
individual credit card number
Challenges on the Internet of things (IoT)
• The Internet of Things (IoT) has fast grown to be a large part of how human beings live,
communicate and do business. Across the world, web-enabled devices are turning our
global rights into a greater switched-on area to live in.
There are various types of challenges in front of IoT.
Security challenges in IoT :
1.Lack of encryption – Although encryption is a great way to prevent hackers from
accessing data, it is also one of the leading IoT security challenges.
These drives like the storage and processing capabilities that would be found on a
traditional computer.
The result is an increase in attacks where hackers can easily manipulate the algorithms
that were designed for protection.
2.Insufficient testing and updating – With the increase in the number of IoT devices, IoT
manufacturers are more eager to produce and deliver their devices as fast as they can
without giving security too much of although.
Most of these devices and IoT products do not get enough testing and updates and are
vulnerable to hackers and other security issues.
Cont..
3. Brute forcing and the risk of default passwords – Weak credentials
and login details leave nearly all IoT devices vulnerable to password
hacking and brute force.
Any company that uses factory default credentials on their devices is
placing both their business and its assets and the customer and their
valuable information at risk of being permittable to a brute force attack.
4. IoT Malware and ransomware – Increases with increase in devices.
Ransomware uses encryption to effectively lockout users from various
devices and platforms and still use a user’s valuable data and
information.
Example
1.A hacker can hijack a computer camera and take pictures.
By using malware access points, the hackers can demand ransom to
unlock the device and return the data.
2.IoT botnets aiming at cryptocurrency –
IoT botnet (An IoT botnet is a network of devices connected to the
IoT, typically routers, that have been infected by malware,
specifically IoT botnet malware, and have fallen into the control of
malicious actors.) workers can manipulate data privacy, which could
be a massive risk for an open Crypto market. The exact value and
creation of cryptocurrencies code face danger from mal-intentioned
hackers.
Blockchain companies are trying to boost security. Blockchain
technology itself is not particularly vulnerable, but the app
development process is.
The design challenges in IoT :
1.Battery life is a limitation –
Issues in packaging and integration of small-sized chips with low weight and less
power consumption. If you’ve been following the mobile space, you’ve likely seen
how every year it looks like there’s no restriction in terms of display screen size.
Take the upward thrust of ‘phablets’, for instance, which can telephone nearly as
huge as tablets. Although helpful, the bigger monitors aren’t always only for
convenience, rather, instead, display screen sizes are growing to accommodate
larger batteries. Computers have gotten slimmer, but battery energy stays the
same.
2.Increased cost and time to market –
Embedded systems are lightly constrained by cost. The need originates to drive
better approaches when designing the IoT devices in order to handle the cost
modeling or cost optimally with digital electronic components. Designers also need
to solve the design-time problem and bring the embedded device at the right time
to the market.
3.Security of the system –
Systems must be designed and implemented to be robust and reliable and have to
be secure with cryptographic algorithms and security procedures.
It involves different approaches to secure all the components of embedded
systems from prototype to deployment.
Deployment challenges in IoT :
1.Connectivity –
It is the foremost concern while connecting devices, applications and cloud platforms.
Connected devices that provide useful front and information are extremely valuable. But
poor connectivity becomes a challenge when IoT sensors are required to monitor process
data and supply information.
2.Cross-platform capability –
IoT applications must be developed, keeping in mind the technological changes of the
future.
Its development requires a balance of hardware and software functions.
It is a challenge for IoT application developers to ensure that the device and IoT platform
drive the best performance despite heavy device rates and fixings.
3.Data collection and processing –
In IoT development, data plays an important role. What is more critical here is the
processing or usefulness of stored data.
Along with security and privacy, development teams need to ensure that they plan well for
the way data is collected, stored, or processed within an environment.
4.Lack of skillset –
All the development challenges above can only be handled if there is a proper skilled
resource working on the IoT application development.
The right talent will always get you past the major challenges and will be an important IoT
application development asset.

More Related Content

PPTX
Energy conservation Act 2001.pptx
PDF
5: Energy Management In Water Supply Systems - Electrical Systems
PPTX
Latest ECE Projects Ideas In Various Electronics Technologies
PPTX
Solar Powered Auto Irrigation System
PDF
IOT_Working_computer_science_business_recap
PPTX
Internet of Things - block buildings Unit 2.pptx
DOCX
IOT Device.docx gghhhfgfhgfghnmjnhbjhbjhbgvvgggg
PDF
iot module 1 ppt (3).pdf
Energy conservation Act 2001.pptx
5: Energy Management In Water Supply Systems - Electrical Systems
Latest ECE Projects Ideas In Various Electronics Technologies
Solar Powered Auto Irrigation System
IOT_Working_computer_science_business_recap
Internet of Things - block buildings Unit 2.pptx
IOT Device.docx gghhhfgfhgfghnmjnhbjhbjhbgvvgggg
iot module 1 ppt (3).pdf

Similar to unit-3.pptx (20)

PPTX
iot module 1 ppt.pptx
PPTX
III CSE IoT Unit - I.pptx
PDF
Lecture No. One -chapter 1 Introduction.pdf
PDF
Best HW for IoT project-1.pdf
PPT
iot PPT.ppt
PPT
Emergig-Technology-ch-4.ppt
PPTX
IOT Presentation new (2).pptx
PDF
iotarchitecture-190506052723.pdf
PPT
1_IoT_Fundamentals.ppt
PPTX
Iot architecture
PPTX
Introduction to IoT Unit - I PRESENTATION.pptx
PPTX
Emerging chap asasasasasawwqwqwwqwewewr4.pptx
DOCX
IoT Smart keychain finder project
PPTX
IOT hacking an dusage aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa .pptx
PPTX
UNIT 1 Nan mudhalvan how tofaefjlnajlncjlanjlcnajknfjkanjkfnajnfj
PPT
chaptertaaaaaaaaaaaaaaadddddddd2222 4.ppt
PDF
Internet of things for Developing (2024).pdf
PPTX
UNIT-2.pptx
PDF
IoT Notes Syllabus .pdf
PPTX
Emerging Technology for anChapter 4.pptx
iot module 1 ppt.pptx
III CSE IoT Unit - I.pptx
Lecture No. One -chapter 1 Introduction.pdf
Best HW for IoT project-1.pdf
iot PPT.ppt
Emergig-Technology-ch-4.ppt
IOT Presentation new (2).pptx
iotarchitecture-190506052723.pdf
1_IoT_Fundamentals.ppt
Iot architecture
Introduction to IoT Unit - I PRESENTATION.pptx
Emerging chap asasasasasawwqwqwwqwewewr4.pptx
IoT Smart keychain finder project
IOT hacking an dusage aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa .pptx
UNIT 1 Nan mudhalvan how tofaefjlnajlncjlanjlcnajknfjkanjkfnajnfj
chaptertaaaaaaaaaaaaaaadddddddd2222 4.ppt
Internet of things for Developing (2024).pdf
UNIT-2.pptx
IoT Notes Syllabus .pdf
Emerging Technology for anChapter 4.pptx
Ad

Recently uploaded (20)

PDF
Introduction-to-World-Schools-format-guide.pdf
PPTX
Causes of Flooding by Slidesgo sdnl;asnjdl;asj.pptx
PPT
WHY_R12 Uaafafafpgradeaffafafafaffff.ppt
PPTX
Media And Information Literacy for Grade 12
PDF
Design Thinking - Module 1 - Introduction To Design Thinking - Dr. Rohan Dasg...
PDF
intro_to_rust.pptx_123456789012446789.pdf
PDF
Interior Structure and Construction A1 NGYANQI
PPTX
YV PROFILE PROJECTS PROFILE PRES. DESIGN
PPTX
rapid fire quiz in your house is your india.pptx
PPT
Machine printing techniques and plangi dyeing
PDF
The Basics of Presentation Design eBook by VerdanaBold
PPTX
Evolution_of_Computing_Presentation (1).pptx
PPT
robotS AND ROBOTICSOF HUMANS AND MACHINES
PDF
Test slideshare presentation for blog post
PDF
UNIT 1 Introduction fnfbbfhfhfbdhdbdto Java.pptx.pdf
PPTX
DOC-20250430-WA0014._20250714_235747_0000.pptx
PDF
Skskkxiixijsjsnwkwkaksixindndndjdjdjsjjssk
PDF
GSH-Vicky1-Complete-Plans on Housing.pdf
PPTX
EDP Competencies-types, process, explanation
PPTX
CLASSIFICATION OF YARN- process, explanation
Introduction-to-World-Schools-format-guide.pdf
Causes of Flooding by Slidesgo sdnl;asnjdl;asj.pptx
WHY_R12 Uaafafafpgradeaffafafafaffff.ppt
Media And Information Literacy for Grade 12
Design Thinking - Module 1 - Introduction To Design Thinking - Dr. Rohan Dasg...
intro_to_rust.pptx_123456789012446789.pdf
Interior Structure and Construction A1 NGYANQI
YV PROFILE PROJECTS PROFILE PRES. DESIGN
rapid fire quiz in your house is your india.pptx
Machine printing techniques and plangi dyeing
The Basics of Presentation Design eBook by VerdanaBold
Evolution_of_Computing_Presentation (1).pptx
robotS AND ROBOTICSOF HUMANS AND MACHINES
Test slideshare presentation for blog post
UNIT 1 Introduction fnfbbfhfhfbdhdbdto Java.pptx.pdf
DOC-20250430-WA0014._20250714_235747_0000.pptx
Skskkxiixijsjsnwkwkaksixindndndjdjdjsjjssk
GSH-Vicky1-Complete-Plans on Housing.pdf
EDP Competencies-types, process, explanation
CLASSIFICATION OF YARN- process, explanation
Ad

unit-3.pptx

  • 1. UNIT-III IoT ELEMENTS AND CHALLENGES Building blocks of an IoT Device – Raspberry Pi, Arduino – Sensing devices, Communication Modules: Bluetooth, Zigbee, RFID, Wi-Fi - Power Sources –Data Management, Business Processes in IoT –– Challenges in IoT: Design Challenges, Development Challenges, Security Challenges and Other Challenges.
  • 2. Building blocks of an IoT Device
  • 3. Block Diagram of IoT devices
  • 4. Exemplary Device: Raspberry Pi • Raspberry Pi is a low-cost mini-computer with the physical size of a credit card. • Raspberry Pi runs various flavors of Linux and can perform almost all tasks that a normal desktop computer can do. • Raspberry Pi also allows interfacing sensors and actuators through the general- purpose I/O pins. • Since Raspberry Pi runs Linux operating system, it supports Python "out of the box".
  • 9. IoT Scenario • An IoT device or sensor generates data that is sent through a messaging system, evaluated against complex event-processing rules, and then stored for downstream applications, reporting, and further machine learning. • An edge device is any piece of hardware that controls data flow at the boundary between two networks. Cloud computing and the internet of things (IoT) have elevated the role of edge devices, ushering in the need for more intelligence, computing power and advanced services at the network edge.
  • 12. IoT device level • IoT bridges the gap between the physical world and the digital world and that starts with things. • Include transducers such as sensors and actuators • A transducer converts a signal in a form of energy into a signal in another form. • Myriad(countless) objects which are often called ‘smart’, ‘intelligent’, or plain old ‘connected’ (smart light bulbs, connected valves and pumps, smart meters, connected cars, intelligent or smart building components, smart home devices, etc.). • Hardware, software, connection and associated services come together in one device.
  • 13. Sensor • A sensor is a device that detects, measures, or indicates any specific physical quantity such as light, heat, motion, moisture, pressure, or similar entities, by converting them into any other form which is mostly, electrical pulses. • Sensors can ‘sense’ and communicate about are parameters such as sound, temperature, humidity, presence of specific chemical components or gases, light, occupancy (e.g. of a room) • Very accurate, giving the world a digital nervous system. • A connected object can have a few or many thousands of sensors and transducers. Share part of the digital data backbone of connected and intelligent solutions.
  • 15. Actuators • Actuators are transducers. • Sensor's sense and send • Actuators act and activate. • Actuator does the opposite of a sensor • The actuator gets a signal and sets in motion what it needs to set in motion in order to act upon/within an environment. • Actuators in most cases are about turning something on or off by applying some force. • In industrial applications or robotics, the usage of actuators for grippers.
  • 16. Example • Sensors detect there is no one in the room. • Actuators get triggered to lower temperature or stop HVAC • Control system reports back the decision to the management system • With energy savings as a result Everyone is happy.
  • 17. Sensor Vs Actuator Sensor Actuator A sensor is a device that changes a physical parameter to an electrical output. An actuator is a device that converts an electrical signal to a physical output The sensor is situated at the input port to take the input An actuator is placed at the output port Sensor generates electrical signals An actuator results in the production of energy in the form of heat or motion. Sensors present with information about the state of the system. Actuators accept commands to perform a function Magnetometer, cameras, microphones are some of the examples in which the sensor is used. Actuators are used in the LED, loudspeaker, motor controllers, laser actuators are used in the LED, loudspeaker, motor controllers, laser
  • 18. IoT Gateway • A high level of interoperability, redundancy, connectivity, pre-processing of data, aggregation of data, remote control and management leads to the requirement for gateways • Gateways are not IoT devices • A different IoT technology layer • An Internet of Things (IoT) gateway is a physical device or software program that serves as the connection point between the cloud and controllers, sensors and intelligent devices. • Benefit of an IoT gateway is that it can provide additional security for the IoT network and the data it transports. • An IoT Gateway is a solution for enabling IoT communication, usually device -to-device communications or device-to-cloud communications. • The gateway is typically a hardware device housing application software that performs essential tasks.
  • 19. Need for Gateway • Bridge it all and enable those various things and sensors and data to ‘talk’ with each other • Making some sense of it all before sending all this data somewhere else where it really – ideally – leads to real sense, actionable insights and actions in whatever shape. • Bridge between the “full” edge (including the edge systems) on one hand and the cloud (and business applications or whatever infrastructure where the data goes to/through) on the other.
  • 21. Why are IoT gateways used? • In order to make the convergence of IT and OT a reality in any given project one need IoT gateways and IoT platforms. • Has everything to do with security on the level of communications. • Example : an IoT gateway for fleet management needs to be able to ‘communicate’ with telematics systems and their specific protocols, as well as with GPS.
  • 22. Why Use an IoT Gateway Device? • Bridging the Gap Between OT and IT • High Scalability – they are able to take intelligent data from the datacenter or cloud and push into the field or network edge. • Lowering Costs – end-point devices needn’t have as high processing power, memory or storage since the gateway does this all for them. • Faster Production – an accelerated and more advanced production line can decrease time-to-market significantly. • Reduce Telecommunications Cost – less M2M communication means a smaller network and (WAN) traffic. • Mitigate Risks – gateways can isolate devices and sensors that aren’t performing before they cause bigger problems for the production line. • Adding a Layer of Security
  • 23. Zigbee • Product from Zigbee alliance • Zigbee is a wireless technology developed as an open global standard to address the unique needs of low-cost, low-power wireless IoT networks. • The Zigbee standard operates on the IEEE 802.15.4 physical radio specification and operates in unlicensed bands including 2.4 GHz, 900 MHz and 868 MHz. • Requires low power from the device, the battery life is significantly improved. • IEEE 802.15.4 is a technical standard which defines the operation of low-rate wireless personal area networks (LR-WPANs). • Zigbee stack gained ratification by IEEE in 2003. • The specification is a packet-based radio protocol intended for low-cost, battery- operated devices. • The protocol allows devices to communicate in a variety of network topologies and can have battery life lasting several years.
  • 24. Zigbee3.0 • https://www.elprocus.com/what-is-zigbee-technology-architecture- and-its-applications/ • Here are some brands and devices to look out for. • Amazon Echo • Bosch Security Systems • Honeywell thermostats • Philips Hue (Signify) • Samsung SmartThings
  • 25. • ZigBee is primarily used for two-way communication between a sensor and a control system. • Like Bluetooth and Wi-Fi, it is a short-range communication and offers connectivity up to 100 meters. • On the other end, Wi-Fi and Bluetooth are high data rate standards which support the transfer of media files, software, etc. • Communication standard defines physical and Media Access Control (MAC) layers to handle many devices at low-data rates.
  • 26. • Zigbee is a low-cost and low-powered mesh network • Deployed in controlling and monitoring applications where it covers 10-100 meters within the range • Supports network configurations for the master to master or master to slave communications. • can be operated in different modes as a result the battery power is conserved. • Zigbee networks are scalable with the use of routers and allow many nodes to interconnect with each other for building a wider area network
  • 27. How does Zigbee Technology Work? • Zigbee technology works with digital radios by allowing different devices to converse through one another. • The devices used in this network are a router, coordinator and end devices. • The main function of these devices is to deliver the instructions and messages from the coordinator to the single end devices such as a light bulb. • In this network, the coordinator is the most essential device which is placed at the origin of the system. • For each network, there is one coordinator, used to perform different tasks. • They choose a suitable channel to scan a channel as well as to find the most appropriate one through the minimum of interference, allocate an exclusive ID as well as an address to every device within the network so that messages otherwise instructions can be transferred in the network.
  • 28. Cont.. • Routers are arranged in the coordinator as well as end devices • Accountable for messages routing among the various nodes. • Routers get messages from the coordinator and stored them until their end devices are in a situation to get them. • Also permit other end devices as well as routers to connect the network • End devices don’t converse directly through each other. • Traffic can be routed toward the parent node like the router, which holds this data until the device’s receiving end is in a situation to get it through being aware. • End devices request any messages that are waiting from the parent
  • 29. Zigbee Architecture • Consists of three different types of devices as Zigbee Coordinator, Router, and End device • Every Zigbee network must consist of at least one coordinator which acts as a root and bridge of the network. • The coordinator is responsible for handling and storing the information while performing receiving and transmitting data operations. • Zigbee routers act as intermediary devices that permit data to pass to and fro through them to other devices. • End devices have limited functionality to communicate with the parent nodes such that the battery power is saved • The number of routers, coordinators, and end devices depends on the type of networks such as star, tree, and mesh networks.
  • 32. Cont.. • Physical Layer: This layer does modulation and demodulation operations upon transmitting and receiving signals respectively. This layer’s frequency, data rate, and a number of channels are given below. • MAC Layer: This layer is responsible for reliable transmission of data by accessing different networks with the carrier sense multiple access collision avoidances (CSMA). This also transmits the beacon frames for synchronizing communication. • Network Layer: This layer takes care of all network-related operations such as network setup, end device connection, and disconnection to network, routing, device configurations, etc. • Application Support Sub-Layer: This layer enables the services necessary for Zigbee device objects and application objects to interface with the network layers for data managing services. This layer is responsible for matching two devices according to their services and needs. • Application Framework: It provides two types of data services as key-value pair and generic message services. The generic message is a developer-defined structure, whereas the key-value pair is used for getting attributes within the application objects. ZDO provides an interface between application objects and the APS layer in Zigbee devices. It is responsible for detecting, initiating, and binding other devices to the network.
  • 33. Zigbee Communication Operation • Zigbee two-way data is transferred in two modes: • Non-beacon mode and • Beacon mode. • In a beacon mode, the coordinators and routers continuously monitor the active state of incoming data hence more power is consumed. In this mode, the routers and coordinators do not sleep because at any time any node can wake up and communicate. • Requires more power supply but its overall power consumption is low because most of the devices are in an inactive state for over long periods in the network. • In a non beacon mode, when there is no data communication from end devices, then the routers and coordinators enter into a sleep state. Periodically this coordinator wakes up and transmits the beacons to the routers in the network. • These beacon networks work for time slots which means, they operate when the communication needed results in lower duty cycles and longer battery usage
  • 35. Star Topology • the most commonly used configurations are star, mesh and cluster tree topologies. • Any topology consists of one or more coordinator. • In Star the network consists of one coordinator which is responsible for initiating and managing the devices over the network. • All other devices are called end devices that directly communicate with coordinator. • This is used in industries where all the end point devices are needed to communicate with the central controller • is simple and easy to deploy.
  • 36. Mesh and Tree Topology • In mesh and tree topologies, the Zigbee network is extended with several routers where coordinator is responsible for staring them. • These structures allow any device to communicate with any other adjacent node for providing redundancy to the data. • If any node fails, the information is routed automatically to other device by these topologies. • As the redundancy is the main factor in industries, hence mesh topology is mostly used. • In a cluster-tree network, each cluster consists of a coordinator with leaf nodes, and these coordinators are connected to parent coordinator which initiates the entire network.
  • 37. Cont.. • low cost • low power operating modes • topologies, • short range communication technology • Best Suited for short range applications
  • 38. Applications of Zigbee • Industrial Automation: In manufacturing and production industries, a communication link continually monitors various parameters and critical equipments. Hence Zigbee considerably reduce this communication cost as well as optimizes the control process for greater reliability. • Home Automation: Zigbee is perfectly suited for controlling home appliances remotely as a lighting system control, appliance control, heating and cooling system control, safety equipment operations and control, surveillance, and so on. • Smart Metering: Zigbee remote operations in smart metering include energy consumption response, pricing support, security over power theft, etc. • Smart Grid monitoring: Zigbee operations in this smart grid involve remote temperature monitoring, fault locating, reactive power management, and so on.
  • 39. RADIO FREQUENCY IDENTIFICATION (RFID) • Radio Frequency Identification (RFID) is a method that is used to track or identify an object by radio transmission uses over the web. Data is digitally encoded in an RFID tag which might be read by the reader. This is device work as a tag or label during which data read from tags that are stored in the database through the reader as compared to traditional barcodes and QR codes. It is often read outside the road of sight either passive or active RFID. • RFID tags contain a chip that holds an electronic product code (EPC) number that points to additional data detailing the contents of the package. • Readers identify the EPC numbers at a distance, without a line of sight scanning or involving physical contact. • Middleware can perform initial filtering on data from the readers. • Applications are evolving to comply with shipping products to automatically processing transactions based on RFID technology.
  • 41. TAGS • A Tag is a transponder that receives a radio signal and in response to it sends out a radio signal. • Tag contains an antenna and a small chip that stores a small amount of data. • Tag can be programmed at manufacture or on installation. • Tag is powered by the high-power electromagnetic field generated by the antennas – usually in doorways. • The field allows the chip/antenna to reflect back an extremely weak signal containing the data. • Collision Detection – recognition of multiple tags in the read range – is employed to separately read the individual tags
  • 44. READERS □ An RFID reader is a device that is used to interrogate an RFID tag. The reader has an antenna that emits radio waves; the tag responds by sending back its data. The reader has two basic components – □ scanning antenna □ transceiver with a decoder to interpret the data Some Reader Examples
  • 45. THE EPC CODE □ The objective of the Electronic Product Code (EPC) is to provide unique identification of physical objects. □ The EPC will be used to address and access individual objects from the computer network, much as the Internet Protocol (IP) Address allows computers to identify, organize and communicate with one another.
  • 46. THE EPC CODE □ Eg. 613.23000.123456.123456789 (96 bits) □ Header – defines data type (8 bits) □ EPC Manager – describes originator of EPC (Product manufacturer) (34 bits) □ Object Class Could describe the product type (20 Bits) □ Serial Number – Unique ID for that product item (34 Bits)
  • 47. APPLICATIONS □ IT Asset Tracking institutions with large IT assets with numerous data centers □ Race Timing Registering race start and end timings for individuals in a marathontype race Individuals wear a chest number containing passive tags which are read by antennae placed alongside the track Rush error, lap count errors and accidents at start time are avoided
  • 48. APPLICATIONS □ Epassport Pioneer: Malaysia(1998)visual data page, travel history Norway(2005), Japan, EU, UK, Australia, US, Serbia □ Transportation Payments Gurgaon, Noida: Tollway Mumbai: Integrated transport buses and local trains United States: Chicago Transit Authority’s Card for Metro, Metra, CTA buses & PACE buses fare payments (2002)
  • 49. An Electronic Road Pricing gantry RFID tag : electronic toll collection
  • 51. APPLICATIONS of RFID □ Animal tracking tags, inserted beneath the skin, can be rice-sized. □ Tags can be screw-shaped to identify trees or wooden items. □ Credit card shaped for use in access applications. □ The antitheft hard plastic tags attached to merchandise in stores are also RFID tags.
  • 52. □ zombie RFID tag, a tag that can be temporarily deactivated when it leaves the store. The process would work like this: you bring your purchase up to the register, the RFID scanner reads the item, you pay for it and as you leave the store, you pass a special device that sends a signal to the RFID tag to "die." That is, it is no longer readable. The "zombie" element comes in when you bring an item back to the store. A special device specially made for that kind of tag revives the RFID tag, allowing the item to re-enter the supply chain.
  • 53. PROBLEMS AND CONCERNS IN RFID TECHNICAL PROBLEMS □ No Standardization □ Exxon Mobil Speed pass □ Easy to Jam □ Disastrous in case of hospitals and military □ RFID Reader Collision □ One tag many readers □ RFID Tag Collision □ One Reader many tags
  • 54. SECURITY , PRIVACYAND ETHICAL PROBLEMS in IoT □ Contents can be read after the item leaves the supply chain □ RFID tags are difficult to remove □ RFID tags can be read without your knowledge □ RFID tags can be read a greater distances with a high gain antenna □ RFID tags with unique serial numbers could be linked to an individual credit card number
  • 55. Challenges on the Internet of things (IoT) • The Internet of Things (IoT) has fast grown to be a large part of how human beings live, communicate and do business. Across the world, web-enabled devices are turning our global rights into a greater switched-on area to live in. There are various types of challenges in front of IoT. Security challenges in IoT : 1.Lack of encryption – Although encryption is a great way to prevent hackers from accessing data, it is also one of the leading IoT security challenges. These drives like the storage and processing capabilities that would be found on a traditional computer. The result is an increase in attacks where hackers can easily manipulate the algorithms that were designed for protection. 2.Insufficient testing and updating – With the increase in the number of IoT devices, IoT manufacturers are more eager to produce and deliver their devices as fast as they can without giving security too much of although. Most of these devices and IoT products do not get enough testing and updates and are vulnerable to hackers and other security issues.
  • 56. Cont.. 3. Brute forcing and the risk of default passwords – Weak credentials and login details leave nearly all IoT devices vulnerable to password hacking and brute force. Any company that uses factory default credentials on their devices is placing both their business and its assets and the customer and their valuable information at risk of being permittable to a brute force attack. 4. IoT Malware and ransomware – Increases with increase in devices. Ransomware uses encryption to effectively lockout users from various devices and platforms and still use a user’s valuable data and information.
  • 57. Example 1.A hacker can hijack a computer camera and take pictures. By using malware access points, the hackers can demand ransom to unlock the device and return the data. 2.IoT botnets aiming at cryptocurrency – IoT botnet (An IoT botnet is a network of devices connected to the IoT, typically routers, that have been infected by malware, specifically IoT botnet malware, and have fallen into the control of malicious actors.) workers can manipulate data privacy, which could be a massive risk for an open Crypto market. The exact value and creation of cryptocurrencies code face danger from mal-intentioned hackers. Blockchain companies are trying to boost security. Blockchain technology itself is not particularly vulnerable, but the app development process is.
  • 58. The design challenges in IoT : 1.Battery life is a limitation – Issues in packaging and integration of small-sized chips with low weight and less power consumption. If you’ve been following the mobile space, you’ve likely seen how every year it looks like there’s no restriction in terms of display screen size. Take the upward thrust of ‘phablets’, for instance, which can telephone nearly as huge as tablets. Although helpful, the bigger monitors aren’t always only for convenience, rather, instead, display screen sizes are growing to accommodate larger batteries. Computers have gotten slimmer, but battery energy stays the same. 2.Increased cost and time to market – Embedded systems are lightly constrained by cost. The need originates to drive better approaches when designing the IoT devices in order to handle the cost modeling or cost optimally with digital electronic components. Designers also need to solve the design-time problem and bring the embedded device at the right time to the market. 3.Security of the system – Systems must be designed and implemented to be robust and reliable and have to be secure with cryptographic algorithms and security procedures. It involves different approaches to secure all the components of embedded systems from prototype to deployment.
  • 59. Deployment challenges in IoT : 1.Connectivity – It is the foremost concern while connecting devices, applications and cloud platforms. Connected devices that provide useful front and information are extremely valuable. But poor connectivity becomes a challenge when IoT sensors are required to monitor process data and supply information. 2.Cross-platform capability – IoT applications must be developed, keeping in mind the technological changes of the future. Its development requires a balance of hardware and software functions. It is a challenge for IoT application developers to ensure that the device and IoT platform drive the best performance despite heavy device rates and fixings. 3.Data collection and processing – In IoT development, data plays an important role. What is more critical here is the processing or usefulness of stored data. Along with security and privacy, development teams need to ensure that they plan well for the way data is collected, stored, or processed within an environment. 4.Lack of skillset – All the development challenges above can only be handled if there is a proper skilled resource working on the IoT application development. The right talent will always get you past the major challenges and will be an important IoT application development asset.