SlideShare a Scribd company logo
1 of 15
Internet of Things
Amala Putrevu D018
Sameeksha Trivedi D055
Introduction
ī‚š "In the next century, planet earth will don an electronic skin. It will use the Internet as a
scaffold to support and transmit its sensations."- Neil Gross, 1999
ī‚š In a recent study, the researchers have predicted that the Internet will double in size every
5.32 years
ī‚š By 2020, 20 billion devices will be in use in the world [0]
Concept
ī‚š The Internet of Things is an emerging global Internet-based technical architecture
facilitating the exchange of goods in a global supply-chain network.[1]
ī‚š Rapid advancement in technology in just 21 years
ī‚š IPv6 communication
ī‚š Protocol for M2M communication
ī‚š Smart sensors
ī‚š Cloud storage
ī‚š Sophisticated algorithms via machine learning
Aims & Objectives
ī‚š To assimilate the concept of IoT
ī‚š To dejargonise the terms of IoT
ī‚š To familiarize with devices and technologies that can be employed to realize IoT
ī‚š To gauge the potential of IoT, focusing on the 'home automation and security' space
ī‚š To analyze the threats and challenges associated with it
Applications
ī‚š Smart cities
ī‚š Smart environment
ī‚š Smart metering
ī‚š Security and emergencies
ī‚š Retail
ī‚š Industrial control
ī‚š Home automation
ī‚š Health
Area of focus
ī‚š Home automation & security
ī‚š Smart Appliances
ī‚š Everyday processes: automated
ī‚š Temperature, humidity and quality controlled environment
ī‚š Security from thefts and attacks
ī‚š Safety for all family members
Home automation & Security
ī‚š A “smart home” can be defined as a residence equipped with computing and
information technology which anticipates and responds to the need of its
occupants, working to promote their comfort, convenience, security and entertainment
through the management of technology within the home and connections to the world
beyond. [2]
Home automation & security
ī‚š Internet of things can be used to bolster home security by using devices that monitor
unexpected movement, thermal radiations and unwarranted entry. [3]
Examples of Smart Home Devices
Challenges and Threats
ī‚š Connectivity challenges (Bluetooth, WiFi, ZigBee) [4]
ī‚š Security concerns (thingbots) [5]
ī‚š Data theft [6]
ī‚š Data generation & storage [7]
ī‚š Energy challenges [8]
Conclusion
ī‚š We must expand smart- object design beyond hardware and software to include
interaction design as well as social aspects. [9]6
ī‚š Building applications with RFID data in the IoT is challenging, not just because TREs provide
only low-level information but also because the metadata associated with
tags, antennas, and events must be personalized and carefully controlled to create a
safe, meaningful user experience. [10]
ī‚š With the emergence of an Internet of things, new regulatory approaches to ensure its
privacy and security become necessary.[11]
Citations
[0] Zhang, Guo-Qing; Zhang, Guo-Qiang; Yang, Qing-Feng; Cheng, Su-Qi; and Zhou, Tao. “Evolution of the Internet and
its Cores.” New Journal of Physics 10 (2008) 123027
[1]R. H. Weber, "Internet of Things - New Security and Privacy Challenges", Computer Law & Security Review 26 (2010),
Elsevier ScienceDirect
[2] Frances K. Aldrich, “Smart Homes: past, present and future”, Inside the Smart Home 2003, Springer
[3]G. Kortuem et al, "Smart Objects as building blocks of Internet of things", IEEE Internet Computing Jan/Feb 2010, IEEE
Computer Society
[4][5]Liu, Jing, Yang Xiao, and CL Philip Chen. "Authentication and Access Control in the Internet of Things." ICDCS
Workshops. 2012., IEEE Computer Society
[6][7][8]Roman, Rodrigo, Pablo Najera, and Javier Lopez. "Securing the internet of things." Computer 44.9 (2011): 51-58.
[9]K. Ashton, "The Internet of Things' thing", RFID Journal June 2009
[10]E. Welbourne et al, "Building the Internet of Things using RFID", IEEE Internet Computing May/June 2009, IEEE
Computer Society
[11]A. Sarma et al, "Identities in the future Internet of Things", Wireless Personal Communications: An International Journal,
May 2009, ACM Digital Library& more

More Related Content

What's hot

IoT - IT 423 ppt
IoT - IT 423 pptIoT - IT 423 ppt
IoT - IT 423 ppt
Mhae Lyn
 
Internet of Things: A Hands-On Approach
Internet of Things: A Hands-On ApproachInternet of Things: A Hands-On Approach
Internet of Things: A Hands-On Approach
Arshdeep Bahga
 

What's hot (20)

Presentation on Internet of Things
Presentation on Internet of ThingsPresentation on Internet of Things
Presentation on Internet of Things
 
10 min IoT ppt
10 min IoT ppt10 min IoT ppt
10 min IoT ppt
 
IoT - IT 423 ppt
IoT - IT 423 pptIoT - IT 423 ppt
IoT - IT 423 ppt
 
The internet of things.pptx
The internet of things.pptxThe internet of things.pptx
The internet of things.pptx
 
Internet of Things - IoT
Internet of Things - IoTInternet of Things - IoT
Internet of Things - IoT
 
Internet of Things - Lu, Ralph
Internet of Things - Lu, RalphInternet of Things - Lu, Ralph
Internet of Things - Lu, Ralph
 
Technical Challenges - How To Design IoT Systems
Technical Challenges - How To Design IoT SystemsTechnical Challenges - How To Design IoT Systems
Technical Challenges - How To Design IoT Systems
 
Internet of Things Overview
Internet of Things OverviewInternet of Things Overview
Internet of Things Overview
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Iot amey p naik
Iot amey p naikIot amey p naik
Iot amey p naik
 
Internet of Things: A Hands-On Approach paperback$@@
 Internet of Things: A Hands-On Approach paperback$@@ Internet of Things: A Hands-On Approach paperback$@@
Internet of Things: A Hands-On Approach paperback$@@
 
Internet of things ppt
Internet of things pptInternet of things ppt
Internet of things ppt
 
Iot
IotIot
Iot
 
Internet of Things: A Hands-On Approach
Internet of Things: A Hands-On ApproachInternet of Things: A Hands-On Approach
Internet of Things: A Hands-On Approach
 
A basic PPT on Internet Of Things(IOT)
A basic PPT on Internet Of Things(IOT)A basic PPT on Internet Of Things(IOT)
A basic PPT on Internet Of Things(IOT)
 
Internet of Things IoT
Internet of Things IoTInternet of Things IoT
Internet of Things IoT
 
Introduction to io_t
Introduction to io_tIntroduction to io_t
Introduction to io_t
 
Internet of Things Iot presentation with module
Internet of Things Iot presentation with moduleInternet of Things Iot presentation with module
Internet of Things Iot presentation with module
 
IoT Enabling Technologies
IoT Enabling TechnologiesIoT Enabling Technologies
IoT Enabling Technologies
 

Viewers also liked

Internet of Things (IoT) and Connected Cars - Patent Landscape Highlighting T...
Internet of Things (IoT) and Connected Cars - Patent Landscape Highlighting T...Internet of Things (IoT) and Connected Cars - Patent Landscape Highlighting T...
Internet of Things (IoT) and Connected Cars - Patent Landscape Highlighting T...
Rahul Dev
 
RFID Technology and Internet of Things
RFID Technology and Internet of ThingsRFID Technology and Internet of Things
RFID Technology and Internet of Things
Dmitri Shiryaev
 

Viewers also liked (20)

TCUK 2013 - Don't manage: lead
TCUK 2013 - Don't manage: leadTCUK 2013 - Don't manage: lead
TCUK 2013 - Don't manage: lead
 
WoT Tutorial @ Cisco
WoT Tutorial @ CiscoWoT Tutorial @ Cisco
WoT Tutorial @ Cisco
 
Electronic of things_Final Presentation
Electronic of things_Final PresentationElectronic of things_Final Presentation
Electronic of things_Final Presentation
 
I International Workshop RFID and IoT - Dia 20 - RFID Radio Regulations and I...
I International Workshop RFID and IoT - Dia 20 - RFID Radio Regulations and I...I International Workshop RFID and IoT - Dia 20 - RFID Radio Regulations and I...
I International Workshop RFID and IoT - Dia 20 - RFID Radio Regulations and I...
 
Internet of Things, Quantified Self and Smart Cities in the context of Singul...
Internet of Things, Quantified Self and Smart Cities in the context of Singul...Internet of Things, Quantified Self and Smart Cities in the context of Singul...
Internet of Things, Quantified Self and Smart Cities in the context of Singul...
 
Tutorial on IEEE 802.15.4e standard
Tutorial on IEEE 802.15.4e standardTutorial on IEEE 802.15.4e standard
Tutorial on IEEE 802.15.4e standard
 
Best Practices for Marketing IoT and RFID Technology
Best Practices for Marketing IoT and RFID Technology Best Practices for Marketing IoT and RFID Technology
Best Practices for Marketing IoT and RFID Technology
 
Slide bài giáēŖng váģ láē­p trÃŦnh Scratch dành cho GV
Slide bài giáēŖng váģ láē­p trÃŦnh Scratch dành cho GVSlide bài giáēŖng váģ láē­p trÃŦnh Scratch dành cho GV
Slide bài giáēŖng váģ láē­p trÃŦnh Scratch dành cho GV
 
Internet of Things (IoT) and Connected Cars - Patent Landscape Highlighting T...
Internet of Things (IoT) and Connected Cars - Patent Landscape Highlighting T...Internet of Things (IoT) and Connected Cars - Patent Landscape Highlighting T...
Internet of Things (IoT) and Connected Cars - Patent Landscape Highlighting T...
 
Internet of things (IoT) Patents | Internet of things (IoT) based Systems & M...
Internet of things (IoT) Patents | Internet of things (IoT) based Systems & M...Internet of things (IoT) Patents | Internet of things (IoT) based Systems & M...
Internet of things (IoT) Patents | Internet of things (IoT) based Systems & M...
 
RFID with INTERNET OF THINGS
RFID with INTERNET OF THINGSRFID with INTERNET OF THINGS
RFID with INTERNET OF THINGS
 
Internet of Things and its Enabling Technologies - RFID
Internet of Things  and its Enabling Technologies - RFIDInternet of Things  and its Enabling Technologies - RFID
Internet of Things and its Enabling Technologies - RFID
 
RFID Technology and Internet of Things
RFID Technology and Internet of ThingsRFID Technology and Internet of Things
RFID Technology and Internet of Things
 
Digital Statistics 2014 - India
Digital Statistics 2014 - IndiaDigital Statistics 2014 - India
Digital Statistics 2014 - India
 
What Would Steve Do? Lessons from the World's Most Captivating Presenters
What Would Steve Do? Lessons from the World's Most Captivating PresentersWhat Would Steve Do? Lessons from the World's Most Captivating Presenters
What Would Steve Do? Lessons from the World's Most Captivating Presenters
 
What is the Internet of Things?
What is the Internet of Things?What is the Internet of Things?
What is the Internet of Things?
 
20 Facebook, Twitter, Linkedin & Pinterest Features You Didn't Know Existed (...
20 Facebook, Twitter, Linkedin & Pinterest Features You Didn't Know Existed (...20 Facebook, Twitter, Linkedin & Pinterest Features You Didn't Know Existed (...
20 Facebook, Twitter, Linkedin & Pinterest Features You Didn't Know Existed (...
 
Simulation of Wireless Communication Systems
Simulation of Wireless Communication SystemsSimulation of Wireless Communication Systems
Simulation of Wireless Communication Systems
 
THE INTERNET OF THINGS
THE INTERNET OF THINGSTHE INTERNET OF THINGS
THE INTERNET OF THINGS
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
 

Similar to Internet of things: A beginners' guide

Overview of internet of things (IoT) the new upcoming technology in hand
Overview of internet of things (IoT) the new upcoming technology in handOverview of internet of things (IoT) the new upcoming technology in hand
Overview of internet of things (IoT) the new upcoming technology in hand
Ranjith P
 
sensors requirement and understanding and deployment
sensors requirement and understanding and deploymentsensors requirement and understanding and deployment
sensors requirement and understanding and deployment
S .Ali Raza
 
Cyber Security and the Internet of ThingsVulnerabilities, T.docx
Cyber Security and the Internet of ThingsVulnerabilities, T.docxCyber Security and the Internet of ThingsVulnerabilities, T.docx
Cyber Security and the Internet of ThingsVulnerabilities, T.docx
dorishigh
 
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
IJECEIAES
 
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
DESMOND YUEN
 
Io t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsIo t security_review_blockchain_solutions
Io t security_review_blockchain_solutions
Shyam Goyal
 
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxINTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
vrickens
 

Similar to Internet of things: A beginners' guide (20)

Overview of internet of things (IoT) the new upcoming technology in hand
Overview of internet of things (IoT) the new upcoming technology in handOverview of internet of things (IoT) the new upcoming technology in hand
Overview of internet of things (IoT) the new upcoming technology in hand
 
sensors requirement and understanding and deployment
sensors requirement and understanding and deploymentsensors requirement and understanding and deployment
sensors requirement and understanding and deployment
 
CICS: Cloud–Internet Communication Security Framework for the Internet of Sma...
CICS: Cloud–Internet Communication Security Framework for the Internet of Sma...CICS: Cloud–Internet Communication Security Framework for the Internet of Sma...
CICS: Cloud–Internet Communication Security Framework for the Internet of Sma...
 
Cyber Security and the Internet of ThingsVulnerabilities, T.docx
Cyber Security and the Internet of ThingsVulnerabilities, T.docxCyber Security and the Internet of ThingsVulnerabilities, T.docx
Cyber Security and the Internet of ThingsVulnerabilities, T.docx
 
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
 
76 s201918
76 s20191876 s201918
76 s201918
 
Internet of Things Forensics
Internet of Things ForensicsInternet of Things Forensics
Internet of Things Forensics
 
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
 
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
 
IoT Intro.pptx
IoT Intro.pptxIoT Intro.pptx
IoT Intro.pptx
 
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
 
A Study on Internet of Things
A Study on Internet of ThingsA Study on Internet of Things
A Study on Internet of Things
 
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoT
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoTA STUDY ON SECURITY ISSUES AND CHALLENGES IN IoT
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoT
 
Io t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsIo t security_review_blockchain_solutions
Io t security_review_blockchain_solutions
 
The Internet of Things (IoT): An Overview
The Internet of Things (IoT): An OverviewThe Internet of Things (IoT): An Overview
The Internet of Things (IoT): An Overview
 
A survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusA survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current status
 
Internet of things: review, architecture and applications
Internet of things: review, architecture and applicationsInternet of things: review, architecture and applications
Internet of things: review, architecture and applications
 
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUESCAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
 
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxINTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
 
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Enterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

Internet of things: A beginners' guide

  • 1. Internet of Things Amala Putrevu D018 Sameeksha Trivedi D055
  • 2. Introduction ī‚š "In the next century, planet earth will don an electronic skin. It will use the Internet as a scaffold to support and transmit its sensations."- Neil Gross, 1999 ī‚š In a recent study, the researchers have predicted that the Internet will double in size every 5.32 years ī‚š By 2020, 20 billion devices will be in use in the world [0]
  • 3. Concept ī‚š The Internet of Things is an emerging global Internet-based technical architecture facilitating the exchange of goods in a global supply-chain network.[1] ī‚š Rapid advancement in technology in just 21 years ī‚š IPv6 communication ī‚š Protocol for M2M communication ī‚š Smart sensors ī‚š Cloud storage ī‚š Sophisticated algorithms via machine learning
  • 4.
  • 5. Aims & Objectives ī‚š To assimilate the concept of IoT ī‚š To dejargonise the terms of IoT ī‚š To familiarize with devices and technologies that can be employed to realize IoT ī‚š To gauge the potential of IoT, focusing on the 'home automation and security' space ī‚š To analyze the threats and challenges associated with it
  • 6. Applications ī‚š Smart cities ī‚š Smart environment ī‚š Smart metering ī‚š Security and emergencies ī‚š Retail ī‚š Industrial control ī‚š Home automation ī‚š Health
  • 7. Area of focus ī‚š Home automation & security ī‚š Smart Appliances ī‚š Everyday processes: automated ī‚š Temperature, humidity and quality controlled environment ī‚š Security from thefts and attacks ī‚š Safety for all family members
  • 8.
  • 9. Home automation & Security ī‚š A “smart home” can be defined as a residence equipped with computing and information technology which anticipates and responds to the need of its occupants, working to promote their comfort, convenience, security and entertainment through the management of technology within the home and connections to the world beyond. [2]
  • 10. Home automation & security ī‚š Internet of things can be used to bolster home security by using devices that monitor unexpected movement, thermal radiations and unwarranted entry. [3]
  • 11. Examples of Smart Home Devices
  • 12. Challenges and Threats ī‚š Connectivity challenges (Bluetooth, WiFi, ZigBee) [4] ī‚š Security concerns (thingbots) [5] ī‚š Data theft [6] ī‚š Data generation & storage [7] ī‚š Energy challenges [8]
  • 13.
  • 14. Conclusion ī‚š We must expand smart- object design beyond hardware and software to include interaction design as well as social aspects. [9]6 ī‚š Building applications with RFID data in the IoT is challenging, not just because TREs provide only low-level information but also because the metadata associated with tags, antennas, and events must be personalized and carefully controlled to create a safe, meaningful user experience. [10] ī‚š With the emergence of an Internet of things, new regulatory approaches to ensure its privacy and security become necessary.[11]
  • 15. Citations [0] Zhang, Guo-Qing; Zhang, Guo-Qiang; Yang, Qing-Feng; Cheng, Su-Qi; and Zhou, Tao. “Evolution of the Internet and its Cores.” New Journal of Physics 10 (2008) 123027 [1]R. H. Weber, "Internet of Things - New Security and Privacy Challenges", Computer Law & Security Review 26 (2010), Elsevier ScienceDirect [2] Frances K. Aldrich, “Smart Homes: past, present and future”, Inside the Smart Home 2003, Springer [3]G. Kortuem et al, "Smart Objects as building blocks of Internet of things", IEEE Internet Computing Jan/Feb 2010, IEEE Computer Society [4][5]Liu, Jing, Yang Xiao, and CL Philip Chen. "Authentication and Access Control in the Internet of Things." ICDCS Workshops. 2012., IEEE Computer Society [6][7][8]Roman, Rodrigo, Pablo Najera, and Javier Lopez. "Securing the internet of things." Computer 44.9 (2011): 51-58. [9]K. Ashton, "The Internet of Things' thing", RFID Journal June 2009 [10]E. Welbourne et al, "Building the Internet of Things using RFID", IEEE Internet Computing May/June 2009, IEEE Computer Society [11]A. Sarma et al, "Identities in the future Internet of Things", Wireless Personal Communications: An International Journal, May 2009, ACM Digital Library& more

Editor's Notes

  1. Intro – 2Concept – 0.5Aims – 1 Applications – 2Area of focus – 2 Challenges & Threats – 2 Conclusion – 1