Iot Unit 3
Iot Unit 3
Processing in IoT
Dr. Yashwant Dongre
Syllabus : Unit 3
Data Collection and Processing: Data types and formats in IoT, Data analytics in IoT
IoT and Cloud Computing: Cloud platforms for IoT (AWS IoT, Google Cloud IoT, Microsoft Azure IoT), Edge
computing and its importance
Security and Privacy Challenges: Common vulnerabilities in IoT systems, best practices for securing IoT
networks
Introduction
• In the Internet of Things (IoT), data collection and processing
involve capturing data from sensors attached to physical
devices, transmitting it wirelessly, and then processing it to
extract insights and enable informed decisions. This process is
crucial for real-time monitoring, predictive maintenance, and
improved operational efficiency.
Data Collection:
Sensors:
IoT devices utilize various sensors (e.g., temperature, pressure,
motion) to gather information from the environment and the devices
themselves.
Wireless Transmission:
Collected data is then transmitted wirelessly to a central system, such
as a server or the cloud, using protocols like Wi-Fi, Bluetooth, or
cellular networks.
Data Storage:
The collected data is stored in a database or other storage system for
later processing and analysis
Data Processing:
Scalability:
Handling the vast amount of data generated by IoT devices can be
challenging.
Security:
Protecting sensitive data collected and transmitted by IoT devices is crucial.
Interoperability:
Ensuring seamless communication between different IoT devices and
systems is important.
Data Privacy:
Respecting data privacy and complying with regulations like GDPR is
crucial.
IoT data processing pipeline
• An IoT data processing pipeline is a series of steps that
transforms raw data from IoT devices into a usable format for
analysis and decision-making. It typically involves data
ingestion, processing, storage, and analysis, often utilizing tools
like MQTT, Apache Kafka, and stream processing
frameworks. This pipeline enables real-time data analysis and
insights, crucial for various IoT applications.
What is IOT analytics?
• IoT analytics refers to collect , process and analyze data that are
generated by IoT devices. As more devices are connected in the
internet , it generate a large amount of data that provides a valuable
insights and provide valuable information from that particular data.
IoT can be the subset of Bigdata and it consist of heterogenous streams
that combined and transformed to correct information.
The roles and Responsibilities of data
analytics
Value Extraction: in IoT
IoT devices generate massive amounts of data, but this data is only valuable when analyzed and
interpreted to extract actionable insights. Data analytics helps uncover trends, patterns, and
relationships within the data, providing a foundation for informed decision-making.
Real-time Monitoring and Optimization:
IoT data analytics allows for real-time monitoring of devices, processes, and environments, enabling
businesses to quickly identify and address inefficiencies, potential issues, and emerging trends.
Predictive Maintenance:
By analyzing historical data and using machine learning algorithms, businesses can predict equipment
failures and proactively schedule maintenance, minimizing downtime and reducing costs.
Improved Customer Experience:
Analyzing data from IoT devices can provide valuable insights into customer behavior, preferences,
and needs, allowing businesses to personalize products and services, improve customer support, and
enhance overall satisfaction.
Driving Revenue:
Data analytics can help identify new revenue streams by enabling businesses to offer value-added
services, such as predictive maintenance, remote diagnostics, and personalized product
recommendations.
Smart Cities and Infrastructure:
In smart city applications, IoT data analytics plays a vital role in optimizing traffic flow, managing
energy consumption, improving public safety, and enhancing citizen services.
IoT With Cloud Computing
• Several cloud platforms are widely used for Internet of Things
(IoT) deployments, including Amazon Web Services (AWS) IoT
Core, Microsoft Azure IoT Hub, Google Cloud IoT Core, and
IBM Watson IoT Platform. These platforms offer a range of
services for device management, data ingestion, processing,
and analytics.
Here's a more detailed look at some popular
options:
Amazon Web Services (AWS) IoT Core:
A managed cloud platform for connecting and managing IoT devices, offering
features like secure data ingestion, processing, and analysis, along with
integration with other AWS services.
Microsoft Azure IoT Hub:
A robust platform for managing IoT devices at scale, providing device
provisioning, configuration, and monitoring.
Google Cloud IoT Core:
A fully managed service for connecting, managing, and ingesting data from a
large number of devices.
IBM Watson IoT Platform:
A cloud-based solution for device management, connectivity, control, and
analytics visualization
Other Notable Platforms:
•Oracle IoT Cloud: A Platform-as-a-Service (PaaS) offering for smart manufacturing, logistics, and
predictive maintenance.
•ThingWorx: An industrial IoT platform with features for data analysis, management, and gathering.
•Cisco IoT Cloud Connect: A cloud-based solution for mobile operators providing IoT experiences.
•ThingsBoard: An open-source IoT platform for device management, data collection, processing, and
visualization.
•Salesforce IoT Cloud: A platform for connecting devices and sensors, creating real-time insights
and applications.
What Is AWS IoT Core?
• AWS IoT Core is a managed cloud service that lets connected devices
interact with cloud applications and other devices. It can support a large
volume of messages, and can process and route those messages to AWS
endpoints and to other devices reliably and securely.
• AWS IoT Core makes it possible to build applications that act on the data
generated by connected devices. These applications can be hosted in the
cloud, which enables web-based access to these services, thus enhancing
the scalability, accessibility, and maintenance of IoT systems.
• AWS IoT Core is particularly useful in IoT use cases where devices need to
communicate with each other and the cloud, but do not have the ability to
directly interact with backend services. AWS IoT Core acts as the
communication hub between these devices and the backend services,
handling all the complexities of concurrent communication, message
routing, security, authorization, and error handling.
6 Key Features of AWS IoT Core
Home Automation
AWS IoT Core offers powerful tools for creating smart home devices. It enables the connection of various devices such
as smart thermostats, lighting systems, security systems, and appliances to the internet, allowing homeowners to
control them remotely.
Wearables
Wearables like fitness trackers, smartwatches, and health monitors have become increasingly popular in recent years.
AWS IoT Core plays a significant role in the functionality of these devices. It facilitates the exchange of data between
the wearable device and the cloud, allowing for real-time health monitoring, fitness tracking, and personalized insights.
Secure data transmission ensures the user's personal information is protected.
Smart Cities
AWS IoT Core can be instrumental in building smart cities. It enables the connection of various city services and
infrastructure to the internet, facilitating real-time monitoring and data analysis. This interconnectedness can lead to
improved public services, enhanced public safety, reduced environmental impact, and overall improved quality of life for
city residents.
Asset Tracking
In the logistics and supply chain industry, AWS IoT Core is used for asset tracking. It enables real-time tracking of
goods, providing businesses with valuable insights into their inventory and supply chain operations. This visibility helps
Google Cloud IoT Core
Before diving into the issues of privacy and security in IoT, it is important
to understand IoT itself. In the most general sense, IoT refers to the
global network of connected devices which share information with
each other through the internet. The devices communicate with each
other alongside generating and collecting data for ensuring optimized
functionality.
• As a matter of fact, IoT devices collect data regarding individual
users and could contain extremely private and sensitive information.
In addition, it is also important to note that the IoT market would have
a value of more than half a trillion dollars by 2022. The growing IoT
landscape implies the addition of more devices, thereby leading to
concerns of security and privacy.
Importance of Security and Privacy in IoT
• The Internet of Things or IoT landscape includes more devices with every
passing day. By 2025, the world could expect around 64 billion IoT devices
in use. The growth in the number of IoT devices is definitely beneficial with
a major transformation in the ways for carrying out everyday activities. For
example, smart lighting could help in reducing your electric bill and energy
consumption.
• Abundance of Data
• Eavesdropping
• Unwanted Public Exposure
Detailed Best Practices:
1. Strong Authentication and Access Controls:
Change Default Credentials: Always change default passwords on all IoT devices as soon as they are connected to
the network.
Multi-Factor Authentication (MFA): Implement MFA where possible for an extra layer of security.
Role-Based Access Controls (RBAC): Restrict access based on user roles, ensuring that only authorized personnel
can interact with devices.
Strong Passwords: Use strong, unique passwords for device access and Wi-Fi networks.
2. Network Segmentation:
Isolate IoT Devices: Segment the network to isolate IoT devices from the main network, limiting the potential impact of
a breach.
Microsegmentation: Implement granular policies within segments to further restrict communication between devices.
Use VLANs and Firewalls: Employ VLANs, firewalls, and network access controls to create secure zones for different
types of traffic.
3. Encryption:
Data in Transit: Use strong encryption protocols (like TLS/SSL) to secure data transmitted between IoT
devices and the cloud.
Data at Rest: Consider encrypting data stored on IoT devices to protect against physical theft.
Secure Protocols: Utilize secure protocols like HTTPS and SSH.
7. Endpoint Protection:
Secure Configurations: Employ secure-by-default configurations for IoT devices.
Minimize Attack Surface: Disable unused services and features on IoT devices.
8. Device Management:
Device Discovery: Employ device discovery tools to gain visibility into all IoT devices connected to the network.
Asset Management: Maintain a detailed inventory of IoT assets, including device types, firmware versions, and security configurations.
By implementing these best practices, organizations can significantly enhance the security of their IoT networks and protect sensitive data
and critical infrastructure from cyber threats.
Securing data in IoT environments
• Securing data at rest and in transit is crucial in IoT
environments due to the vast amounts of sensitive data
generated and transmitted by connected devices. Data at rest,
stored on devices or in cloud infrastructure, can be targeted by
physical or cyber threats, while data in transit, moving across
networks, is vulnerable to interception and manipulation. Both
require robust security measures, including encryption and
access controls, to protect confidentiality and integrity.
Data at Rest:
Vulnerability:
Stored data is susceptible to unauthorized access if devices are
compromised or if storage systems are breached.
Examples:
Data stored on IoT device hard drives, cloud storage, or databases.
Protection:
Encryption, strong access controls, and regular security audits help mitigate
risks.
Importance:
Protecting data at rest is crucial for maintaining data confidentiality and
preventing unauthorized access.
Data in Transit:
Vulnerability:
Data being transmitted over networks is at risk of being intercepted, altered, or stolen by
attackers.
Examples:
Data transmitted between IoT devices and cloud platforms, or data sent over public
networks.
Protection:
Encryption protocols (e.g., TLS, SSL), secure communication channels, and data integrity
checks are essential.
Importance:
Protecting data in transit ensures data privacy and prevents unauthorized access during
transmission.
IoT Specific Challenges:
• Resource constraints:
• IoT devices often have limited processing power and memory,
making encryption and security measures computationally expensive.
• Security updates:
• Ensuring IoT devices receive timely security updates can be
challenging, increasing vulnerability.
• Network security:
• Securely connecting a large number of IoT devices to a network can
create significant security challenges.
Case Study: IoT based Pollution Monitoring
and control
• An IoT-based pollution monitoring system utilizes sensors and
the internet to gather real-time data on pollution levels, which is
then transmitted to a cloud platform for analysis and
visualization. This system enables remote monitoring, alerts,
and informed decision-making regarding pollution levels.
Key Components and Functionality:
1. Sensor Network:
• Purpose: To collect real-time data on various traffic parameters.
• Examples:
• Ultrasonic sensors: Measure vehicle density and speed.
• Cameras: Provide visual data for traffic monitoring and anomaly detection.
• RFID tags: Track vehicles for detailed movement analysis.
• GPS: Location data for vehicles and potential route optimization.
• Other IoT sensors: Can be used to monitor weather conditions or other
relevant factors.
…
2. Cloud Platform:
Purpose:
To process, store, and analyze the collected data, and potentially provide insights to traffic management
authorities and end-users.
Functions:
Data collection and storage: Aggregates data from various sensors and devices.
Data processing: Analyzes the data to identify patterns, predict congestion, and optimize traffic flow.
Data visualization: Provides dashboards and interfaces for traffic managers to monitor real-time
conditions.
Dynamic traffic management: Adjusts traffic signals, reroutes traffic, and provides alerts based on
real-time data.
Edge computing: Some systems use edge computing to process data locally before transmitting it to
the cloud, improving efficiency and reducing latency.
3. Applications:
• Dynamic traffic signal control: Adjusts traffic light timings based on
real-time traffic conditions.
• Route optimization: Provides drivers with real-time route guidance
to avoid congestion.
• Congestion prediction and alert systems: Predicts potential
congestion and alerts drivers or traffic authorities.
• Accident prevention: Facilitates quick responses to incidents and
alerts emergency services.
• Dynamic lane management: Adjusts lane markings based on
real-time traffic flow.
4. Advantages:
• Improved traffic flow: Dynamic adjustments to traffic signals
and routes can reduce congestion and travel times.
• Enhanced safety: Real-time monitoring and alerting can help
prevent accidents.
• Increased efficiency: Optimized traffic flow can lead to more
efficient use of roads and resources.
• Data-driven decision-making: Provides traffic managers with
valuable data to make informed decisions.
Case study 3: Smart Lock System
• An IoT-enabled smart lock system offers a keyless entry and
remote access solution while enhancing security against
unauthorized access through various authentication methods
like PIN, fingerprint, or voice recognition, and remote monitoring
capabilities. These systems often leverage communication
technologies like Bluetooth or Wi-Fi to connect with a
smartphone app or voice assistant, allowing users to control
and monitor the lock remotely. Alerts and notifications can also
be sent to the owner in case of unauthorized access attempts or
tampering.
Key Features and Benefits:
• Keyless Entry: Eliminates the need for physical keys, reducing the risk of
theft or loss.
• Remote Access: Allows users to lock and unlock doors from anywhere
with an internet connection.
• Enhanced Security: Provides multiple authentication methods, including
PIN, fingerprint, and voice recognition, to prevent unauthorized access.
• Remote Monitoring: Enables users to view real-time footage of the
entrance and receive alerts when the door is unlocked or opened.
• Convenience: Offers ease of use and flexibility for managing access to
properties.
• Alerts and Notifications: Can be configured to send alerts to the owner in
case of unauthorized access attempts or tampering.
Security Considerations:
Encryption:
Strong encryption protocols are used to protect communication channels and prevent eavesdropping.
Access Control:
Implement strict access control policies to ensure only authorized users can access the system.
Regular Updates:
Keep software and firmware updated to patch potential security vulnerabilities.
Biometric Security:
Biometric authentication methods offer a higher level of security than traditional PINs or passwords.
Alert and Notification System:
✔ Secure Communication
✔ Data encryption
✔ Access logging
✔ Physical Security
• Thank You.
• Write to [email protected]