The vast network of devices connected to the Internet, including smart phones and tablets and almost anything with a sensor on it – cars, machines in production plants, jet engines, oil drills, wearable devices, and more. These “things” collect and exchange data.
The IoT allows objects to be sensed or controlled remotely across existing network infrastructure,creating opportunities for more direct integration of the physical world into computer-based systems, and resulting in improved efficiency, accuracy and economic benefit in addition to reduced human intervention.
7. Identify each object in
Environment of IoT.
Gather information through
RFID tags, sensors,
cameras etc
Transmits the gathering
data by perception layer
with the help of hardware
and software application.
Network layer can
integrate resource of
network into huge
intelligent network
system through internet
platform.
This layer has
bridge between the
social IoT to the
industrial
technology.
Perception Layer Network Layer Application Layer
8. Tagging Things: To identify and track data of things
Sensors:To collect and process the data to detect the changes in the
physical status of things.
Connectivity/Gateways:Provide connections to cloud for data
processing.
Nanotechnolgy:Make smaller and smaller things that have the ability
to connect and interact.
10. Challenges in IOT
● Massive gathered
information
● Security
● Privacy
● Absence of Proper
Communication Protocols
11. Massive Gathered Information:
● The quantity of gathered data is massive data due to very large number of IoT things.
● Problem is defined as transmission problem, storing data in database and processing for
analyzing the data in cloud.
● It’s required to transmit all objects data to the cloud in real time but that is not guarantee,
because of bandwidth issues.
● Where can store huge of data?
● How we can analyze data?
● How can get backup from huge of data?
Security:
● Three physical components of Internet of Things are RFID, CLUD, WSN, and cloud is
vulnerable to attacker.
● RFID (passive of data), it usually seems that is most vulnerable for hacker it allows person
tracking object and no highly level intelligence can be providing using cryptography scenario,
which recently is under review of researcher.
13. Application of IOT
The ultimate goal of IOT is to automate Human Life.
▪ Building and home automation.
▪ Medical and Healthcare System.
▪ Environment Monitoring.
▪ Energy Management.
▪ Better quality of life for elderly people.
▪ Media
▪ … …. ….