SlideShare una empresa de Scribd logo
1 de 17
Descargar para leer sin conexión
Maharishi Markandeshwar Engineering College-
Mullana
Dept:- Electronics & Communication
SEMINAR REPORT ON :-
Internet of Things (IoT)
Submitted To:- Submitted By:-
Er. ANUJ GOEL HITESH KUMAR SINGH
11151111 ( ECE 4th
Sem )
TABLE OF CONTENT
 Abstract
 Introduction
 Evolution of Internet
 Definition of Internet of Things
 Architecture of IoT
 Enabling Technologies
 Applications of IoT
 Challenges
 Future research areas
 Conclusion
ABSTRACT
The Internet of Things (IoT) is defined in many different ways, and it encompasses many
aspects of life from connected homes and cities to connected cars and roads, roads to devices
that track an individual’s behavior and use the data collected for push services. Some mention
one trillion Internetconnected devices by 2025 and define mobile phones as the eyes and ears
of the applications connecting all of those connected things. By these internet of things
billions objects can communicate over worldwide over a public, private internet protocol
network in 2010, the number of everyday physical objects and devices connected to the
Internet was around 12.5 billion. Smart cities, Smart cars, Public safety, Smart Industries and
Environmental Protection has been given the high intention for future protection by IoT
Ecosystem. This results in the generation of enormous amounts of data which have to be
stored, processed and presented in a seamless, efficient, and easily interpretable form.
Internet of Things (IoT) is a new revolution of the Internet. Thus Internet of Things (IoT) can
be said the expansion of internet services. It provides a platform for communication between
objects where objects can organize and manage themselves. It makes objects themselves
recognizable. The internet of things allows everyone to be connected anytime and anywhere.
Objects can be communicated between each other by using radio frequency identification
(RFID), wireless sensor network (WSN), Zigbee, etc. Radio Frequency identification assigns
a unique identification to the objects. RFID technology is used as more secure identification
and for tracking/locating objects, things, vehicle.
INTRODUCTION
The Internet of Things (IoT) is the network of physical objects, devices, vehicles, buildings
and other items which are embedded with electronics, software, sensors, and network
connectivity, which enables these objects to collect and exchange data. The Internet of
Things allows objects to be sensed and controlled remotely across existing network
infrastructure, creating opportunities for more-direct integration between the physical world
and computer-based systems, and resulting in improved efficiency, accuracy and economic
benefit; when IoT is augmented with sensors and actuators, the technology becomes an
instance of the more general class of cyber-physical systems, which also encompasses
technologies such as smart grids, smart homes, intelligent transportation and smart cities.
Each thing is uniquely identifiable through its embedded computing system but is able to
interoperate within the existing Internet infrastructure. Experts estimate that the IoT will
consist of almost 50 billion objects by 2020. British entrepreneur Kevin Ashton first coined
the term in 1999 while working at Auto-ID Labs (originally called Auto-ID centers - referring
to a global network of Radio-frequency identification (RFID) connected objects). Typically,
IoT is expected to offer advanced connectivity of devices, systems, and services that goes
beyond machine-to-machine communications (M2M) and covers a variety of protocols,
domains, and applications. The interconnection of these embedded devices (including smart
objects), is expected to usher in automation in nearly all fields, while also enabling advanced
applications like a Smart Grid, and expanding to the areas such as smart cities. "Things," in
the IoT sense, can refer to a wide variety of devices such as heart monitoring implants,
biochip transponders on farm animals, electric clams in coastal waters, automobiles with
built-in sensors, DNA analysis devices for environmental/food/pathogen monitoring or field
operation devices that assist firefighters in search and rescue operations. These devices
collect useful data with the help of various existing technologies and then autonomously flow
the data between other devices. Current market examples include smart thermostat systems
and washer/dryers that use Wi-Fi for remote monitoring. Besides the plethora of new
application areas for Internet connected automation to expand into, IoT is also expected to
generate large amounts of data from diverse locations that is aggregated very quickly, thereby
increasing the need to better index, store and process such data. IoT is one of the platforms of
today's Smart City and Smart Energy Management Systems..
EVOLUTION OF INTERNET:
Internet of Boffins:
This was the era when ARPANET (Advanced Research Project Agency Network) carried its
first data packet in 1969. It was the first network to use TCP/IP. This was followed by the
Mark I Network in 1970, which was built by Davis. This network was a packet switched
network to serve NPL in UK. It was soon replaced by Mark II in 1973. The other major
inventions such as Telnet in 1974, Ethernet in 1980, GOSIP in 1190 and a full text web
search engine in 1994 followed the trend. This era is called ‘Internet of Boffins’ since in this
era internet was in a stage of early evolution and research.
Internet of Geeks:
‘Internet of Geeks’ era started with the proposal of IPv6. It was the latest revision of the
internet protocol. The communication protocol provides identification and location system
for computers on networks and routes traffic across internet. The popular internet services
started taking roots in this era. Amazon.com started its first online retail service in 1995,
followed by eBay providing customers with online auction and shopping services. Hotmail
started its free web based email service in 1996, followed by Google search in 1998. PayPal
started its first internet payment service in 1998. Internet penetration was low in the market
until 2000.
Internet of masses:
‘Internet of masses’ era started with the Dot-com bubble burst in 2000. In the starting of this
era Dotcom bubble burst led to high growth in stock markets due to increasing use of internet
in the industrial sector. In this era many people across the globe started using internet. Social
networking sites came into existence. In 2001 Wikipedia came into existence followed by
Facebook in 2004, further followed by YouTube, Twitter and WikiLeaks in the consecutive
years
Mobile Internet:
‘Mobile Internet’ era refers to access to the Internet via cellular phone service provider. The
era got a boost with introduction of smartphones which gave a fast working internet on
phones. This was the era from 2007-2011. There was steep rise in the use of internet by the
people round the globe due to the mobile internet.
Internet of Things:
‘Internet of Things’ refers to an era where things can be connected to each other using
internet.
DEFINITION OF INTERNET OF THINGS (IOT)
“Today computers—and, therefore, the Internet—are almost wholly dependent on human
beings for information. Nearly all of the roughly 50 petabytes(a petabyte is 1,024 terabytes)
of data available on the Internet were first captured and created by human beings—by typing,
pressing a record button, taking a digital picture, or scanning a bar code. Conventional
diagrams of the Internet … leave out the most numerous and important routers of all - people.
The problem is, people have limited time, attention and accuracy—all of which means they
are not very good at capturing data about things in the real world. And that's a big deal. We're
physical, and so is our environment … You can't eat bits, burn them to stay warm or put them
in your gas tank. Ideas and information are important, but things matter much more. Yet
today's information technology is so dependent on data originated by people that our
computers know more about ideas than things. If we had computers that knew everything
there was to know about things—using data they gathered without any help from us—we
would be able to track and count everything, and greatly reduce waste, loss and cost. We
would know when things needed replacing, repairing or recalling, and whether they were
fresh or past their best. The Internet of Things has the potential to change the world, just as
the Internet did. Maybe even more so. “ —Kevin Ashton, "That 'Internet of Things' Thing",
RFID Journal, July 22, 2009 “Things are active participants in business, information and
social processes where they are enabled to interact and communicate among themselves and
with the environment by exchanging data and information sensed about the environment,
while reacting autonomously to the real/physical world events and influencing it by running
processes that trigger actions and create services with or without direct human intervention.”
—Cluster of European research projects on the Internet of Things “The Internet of Things
represents an evolution in which objects are capable of interacting with other objects.
Hospitals can monitor and regulate pacemakers long distance, factories can automatically
address production line issues and hotels can adjust temperature and lighting according to a
guest's preferences, to name just a few examples.” – IBM
ARCHITECTURE OF INTERNET OF THINGS
Architecture of internet of Things contains basically 4 layers:
 Application Layer
 Lowest Abstraction Layer
 With sensors we are creating digital nervous system.
 Incorporated to measure physical quantities
 Interconnects the physical and digital world Collects and process the real
time information
 Gateway and the network layer
 Robust and High performance network infrastructure
 Supports the communication requirements for latency, bandwidth or security
 Allows multiple organizations to share and use the same network
independently
 Management Service layer
 Capturing of periodic sensory data
 Data Analytics (Extracts relevant information from massive amount of raw
data)
 Streaming Analytics (Process real time data)
 Ensures security and privacy of data.
 Sensor layer
 Provides a user interface for using IoT.
 Different applications for various sectors like Transportation, Healthcare,
Agriculture, Supply chains, Government, Retail etc.
ENABLING TECHNOLOGIES
In general, three types of technologies enable IoT
1. RFID and near-field communication - In the 2000s, RFID was the dominant technology.
Later, NFC became dominant (NFC). NFC has become common in smart phones during the
early 2010s, with uses such as reading NFC tags or for access to public transportation.
2. Optical tags and quick response codes - This is used for low cost tagging. Phone camera
decodes QR code using image-processing techniques. In reality QR advertisement campaigns
gives less turnout as users need to have another application to read QR codes.
3. Bluetooth low energy - This is one of the latest technology. All newly releasing
smartphones have BLE hardware in them. Tags based on BLE can signal their presence at a
power budget that enables them to operate for up to one year on a lithium coin cell battery.
RFID
Radio-frequency identification (RFID) is the wireless use of electromagnetic fields to transfer
data, for the purposes of automatically identifying and tracking tags attached to objects. The
tags contain electronically stored information. Some tags are powered by electromagnetic
induction from magnetic fields produced near the reader. Some types collect energy from the
interrogating radio waves and act as a passive transponder. Other types have a local power
source such as a battery and may operate at hundreds of meters from the reader. Unlike a
barcode, the tag does not necessarily need to be within line of sight of the reader and may be
embedded in the tracked object. RFID is one method for Automatic Identification and Data
Capture (AIDC).
Sensors
Many IoT devices have sensors that can register changes in temperature, light, pressure,
sound and motion. They are your eyes and ears to what's going on the world. Before we talk
about what they do, let's describe them. These sensors are part of a device category called a
microelectromechanical system (MEMS) and are manufactured in much the same way
microprocessors are manufactured, through a lithography process. These sensors can be
paired with an application-specific integrated circuit or an ASIC. This is a circuit with a
limited degree of programming capability and is hardwired to do something specific. It can
also be paired with microprocessor and will likely be attached to a wireless radio for
communications. For example, you are away on vacation and the house is empty. A moisture
sensor detects water on the basement floor. That sensor finding is processed by an app, which
has received another report from a temperature sensor that detects the flow of water in the
main water pipe. (When water flows, it takes away heat and lowers the temperature).
IPv6
The original idea of the Auto-ID Center is based on RFID-tags and unique identification
through the Electronic Product Code however this has evolved into objects having an IP
address or URI. An alternative view, from the world of the Semantic Web focuses instead on
making all things (not just those electronic, smart, or RFID-enabled) addressable by the
existing naming protocols, such as URI. The objects themselves do not converse, but they
may now be referred to by other agents, such as powerful centralized servers acting for their
human owners. The next generation of Internet applications using Internet Protocol Version 6
(IPv6) would be able to communicate with devices attached to virtually all human-made
objects because of the extremely large address space of the IPv6 protocol. This system would
therefore be able to scale to the large numbers of objects envisaged. A combination of these
ideas can be found in the current GS1/EPC global EPC Information Services (EPCIS)
specifications. This system is being used to identify objects in industries ranging from
aerospace to fast moving consumer products and transportation logistics.
APPLCATIONS OF IoT
Aerospace and aviation industry
IoT can help to improve safety and security of products and services by reliably identifying
counterfeit products and elements. The aviation industry, for example, is vulnerable to the
problem of suspected unapproved parts (SUP). An SUP is an aircraft part that is not
guaranteed to meet the requirements of an approved aircraft part (e.g., counterfeits, which do
not conform to the strict quality constraints of the aviation industry). Thus, SUPs seriously
violate the security standards of an aircraft. Aviation authorities report that
at least 28 accidents or incidents in the United States have been caused by counterfeits [24].
Apart from time-consuming material analyses, verifying the authenticity of aircraft parts can
be performed by inspecting the accompanying documents, which can be easily forged. It is
possible to solve this problem by introducing electronic pedigrees for certain categories of
aircraft parts, which document their origin and safety-critical events during their lifecycle
(e.g.,modifications). By storing these pedigrees within a decentralized database as well as on
RFID tags, which are securely attached to aircraft parts, an authentication (verification of
digital signatures, comparison of the pedigree on RFID tags and within the database) of these
parts can be performed prior to installing them in an aircraft. In this way, safety and
operational reliability of aircrafts can be significantly improved.
Automotive industry
Advanced cars, trains, buses as well as bicycles are becoming equipped with advanced
sensors, actuators with increased processing powers. Applications in the automotive industry
include the use of smart things to monitor and report various parameters from pressure in
tyres to proximity of other vehicles. RFID technology has already been used to streamline
vehicle production, improve logistics, increase quality control and improve customer
services. The devices attached to the parts contain information related to the name of the
manufacturer and when and where the product was made, its serial number, type, product
code, and in some applications the precise location in the facility at that moment. RFID
technology provides real-time data in the manufacturing processes, maintenance operations
and offers new ways of managing recalls more effectively. Dedicated Short Range
Communication (DSRC) technology will possibly help in achieving higher bit rates and
reducing interference with other equipment. Vehicle-to vehicle (V2V) and vehicle-to-
infrastructure (V2I) communications will significantly advance Intelligent Transportation
Systems (ITS) applications such as vehicle safety services and traffic management and will
be fully integrated in the IoT infrastructure.
Telecommunication industry
IoT will create the possibility of merging of diverse telecommunication technologies and
create new services. An illustrative example is the use of GSM, NFC (Near Field
Communication), low power Bluetooth, WLAN, multi-hop
networks, GPS and sensor networks together with SIM-card technology. In these types of
applications the reader (i.e. tag) is a part of the mobile phone, and different applications share
the SIM-card. NFC enables communications among objects in a simple and secure way just
by having them close to each other. The mobile phone can therefore be used as a NFC-reader
and transmit the read data to a central server. When used in a mobile phone, the SIM-card
plays an important role as storage for the NFC data and authentication credentials
(like ticket numbers, credit card accounts, ID information etc). Things can join networks and
facilitate peer-to-peer communication for specialized purposes or to increase robustness of
communications channels and networks. Things can form ad-hoc peer-to-peer networks in
disaster situations to keep the flow of vital information going in case of telecommunication
infrastructure failures.
Medical and Healthcare industry
IoT will have many applications in the healthcare sector, with the possibility of using the cell
phone with RFID-sensor capabilities as a platform for monitoring of medical parameters and
drug delivery. The advantage gained is in prevention and easy monitoring of diseases, ad hoc
diagnosis and providing prompt medical attention in cases of accidents. Implantable and
addressable wireless devices can be used to store health records that can save a patient’s life
in emergency situations, especially for people with diabetes, cancer, coronary heart disease,
stroke, chronic obstructive pulmonary disease, cognitive impairments, seizure disorders and
Alzheimer’s disease. Edible, biodegradable chips can be introduced into human body for
guided actions. Paraplegic persons can have muscular stimuli delivered via an implanted
smart thing-controlled electrical simulation system in order to restore movement functions.
Independent Living
IoT applications and services will have an important impact on independent living by
providing support for an aging population by detecting the activities of daily living using
wearable and ambient sensors, monitoring social interactions using wearable and ambient
sensors, monitoring chronic disease using wearable vital signs sensors, and in body sensors.
With emergence of pattern detection and machine learning algorithms, the things in a
patient’s environment would be able to watch out and care for the patient. Things can learn
regular routines and raise alerts or send out notifications in anomaly situations. These
services can be merged with the medical technology services.
Environmental Monitoring
Utilization of wireless identifiable devices and other IoT technologies in green applications
and environmental conservation are one of the most promising market segments in the future.
There will be an increased usage of wireless identifiable devices in environmentally friendly
programs worldwide.
Media, Entertainment Industry
Deployment of IoT technologies will enable ad hoc news gathering based on locations of the
users. The news gathering could happen by querying IoT, to see which multi-media-capable
devices are present at a certain location, and sending them a (financial) offer to collect
multimedia footage about a certain event. Near field communication tags can be attached to
posters for providing more information by connecting the reader to an URI address that
contains detailed information related to the poster.
Insurance Industry
Often the introduction of IoT technology is perceived as a grave invasion on privacy of
individuals. However, sometimes people are willing to trade privacy for a better service or a
monetary benefit. One example is car insurance. If insurance clients are willing to accept
electronic recorders in their car, which are able to record acceleration, speed, and other
parameters, and communicate this information to their insurer, they are likely to get a cheaper
rate or premium [29]. The insurer can save money by being involved in a very early stage of
an impending accident and can trigger the most economic actions. A part of the savings can
be given to the customers through discounts on insurance premiums. The same applies for
other assets such as buildings, machinery, etc., that are equipped with IoT technology. In
these cases the technology mostly helps in preventing large-scale maintenance operations or
allows for much cheaper predictive maintenance before an incident occurs.
CHALLENGES
The workflows in analysed enterprise environment, home, office and other smart spaces in
the future will be characterized by cross organization interaction, requiring the operation of
highly dynamic and ad-ho relationships. At present, only a very limited ICT support is
available, and the following key challenges exist.
(i) Network Foundation - limitations of the current Internet architecture in
terms of mobility, availability, manageability and scalability are some of
the major barriers to IoT.
(ii) Security, Privacy and Trust - in the domain of security the challenges are:
(a) securing the architecture of IOT - security to be ensured at design time
and execution time, (b) proactive identification and protection of IOT from
arbitrary attacks (e.g. DoS and DDoS attacks) and abuse, and (c) proactive
identification and protection of IOT from malicious software. In the
domain of user privacy, the specific challenges are: (a) control over
personal information (data privacy) and control over individual’s physical
location and movement (location privacy), (b) need for privacy
enhancement technologies and relevant protection laws, and (c) standards,
methodologies and tools for identity management of users and objects. In
the domain of trust, some of the specific challenges are: (a) Need for easy
and natural exchange of critical, protected and sensitive data - e.g. smart
objects will communicate on behalf of users / organizations with services
they can trust, and (b) trust has to be a part of the design of IoT and must be
built in.
(iii) Managing heterogeneity - managing heterogeneous applications,
environments and devices constitute a major challenge. In addition to the
above major challenges, some of the other challenges are: (a) managing
large amount of information and mining large volume of data to provide
useful services, (b) designing an efficient architecture for sensor
networking and storage, (iii) designing mechanisms for sensor data
discovery, (iv) designing sensor data communication protocols - senor data
query, publish/subscribe mechanisms, and (v) developing sensor data
stream processing mechanisms.
Future Research Areas :-
There are several areas in which further research is needed for making deployment of the
concept of IoT reliable, robust and efficient. Some of the areas are identified in the following.
In identification technology domain, further research is needed in development of new
technologies that address the global ID schemes, identity management, identity encoding/
encryption, pseudonimity, revocable anonymity, authentication of parties, repository
management using identification, authentication and addressing schemes and the creation of
global directory lookup services and discovery services for IoT applications with various
identifier schemes. In architecture design domain, some of the issues that need attention are:
design of distributed open architecture with end-to-end characteristics, interoperability of
heterogeneous systems, neutral access, clear layering and resilience to physical network
disruption, decentralized autonomic architectures based on peering of nodes etc. In
communication protocol domain, the issues that need to be addressed are : design of energy
efficient communication by multi frequency protocol, communication spectrum and
frequency allocation, software defined radios to remove the needs for hardware upgrades for
new protocols, and design of high performance, scalable algorithms and protocols. In
network technology domain further research is needed on network on chip technology
considering on chip communication architectures for dynamic configurations design time
parameterized architecture with a dynamic routing scheme and a variable number of allowed
virtual connections at each output. In addition, power-aware network design that turns on and
off the links in response to burst and dips of traffic on demand, scalable communication
infrastructures design on chip to dynamically support the communication among circuit
modules based on varying workloads and /or changing constraints are some of the important
research issues.
Conclusion
The thought of always being tracked and your data being recorded does bring a fear to a
consumer’s mind, but we have to move away from it to see the benefits that this great
technology is going to bring to us. The above examples were about a 'connected you', making
your life seamless, but it brings with it higher benefits like connected cities, better commerce
and an improved ecosystem. As often happens, history is repeating itself. Just as in the early
days when Cisco’s tagline was “The Science of Networking Networks,” IoT is at a stage
where disparate networks and a multitude of sensors must come together and interoperate
under a common set of standards. This effort will require businesses, governments, standards
organizations, and academia to work together toward a common goal. Next, for IoT to gain
acceptance among the general populace, service providers and others must deliver
applications that bring tangible value to peoples’ lives. IoT must not represent the
advancement of technology for technology’s sake; the industry needs to demonstrate value in
human terms. In conclusion, IoT represents the next evolution of the Internet. Given that
humans advance and evolve by turning data into information, knowledge, and wisdom, IoT
has the potential to change the world as we know it today—for the better. How quickly we
get there is up to us.

Más contenido relacionado

La actualidad más candente

Iot ppt
Iot pptIot ppt
Iot pptpiyuu7
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)Akanksha Prasad
 
Iot internet-of-things-ppt
Iot internet-of-things-pptIot internet-of-things-ppt
Iot internet-of-things-pptSonalSharnam
 
Internet of Things (IoT) and its applications
Internet of Things (IoT) and its applicationsInternet of Things (IoT) and its applications
Internet of Things (IoT) and its applicationsSarwan Singh
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)Prakhyath Rai
 
IOT - internet of Things - August 2017
IOT - internet of Things - August 2017IOT - internet of Things - August 2017
IOT - internet of Things - August 2017paul young cpa, cga
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applicationsPasquale Puzio
 
Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsDr. Mazlan Abbas
 
Challenges and application of Internet of Things
Challenges and application of Internet of ThingsChallenges and application of Internet of Things
Challenges and application of Internet of ThingsAshutosh Bhardwaj
 
Internet of Things (IoT) - Seminar ppt
Internet of Things (IoT) - Seminar pptInternet of Things (IoT) - Seminar ppt
Internet of Things (IoT) - Seminar pptNishant Kayal
 

La actualidad más candente (20)

Internet of Things (IoT) - IK
Internet of Things (IoT) - IKInternet of Things (IoT) - IK
Internet of Things (IoT) - IK
 
Introduction to IoT (Internet of Things)
Introduction to IoT (Internet of Things)Introduction to IoT (Internet of Things)
Introduction to IoT (Internet of Things)
 
Iot ppt
Iot pptIot ppt
Iot ppt
 
IoT Basics
IoT BasicsIoT Basics
IoT Basics
 
6G Technology
6G Technology6G Technology
6G Technology
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 
Iot Report
Iot ReportIot Report
Iot Report
 
Iot internet-of-things-ppt
Iot internet-of-things-pptIot internet-of-things-ppt
Iot internet-of-things-ppt
 
Introduction to IOT
Introduction to IOTIntroduction to IOT
Introduction to IOT
 
Internet of Things (IoT) and its applications
Internet of Things (IoT) and its applicationsInternet of Things (IoT) and its applications
Internet of Things (IoT) and its applications
 
Internet of Things building blocks
Internet of Things building blocksInternet of Things building blocks
Internet of Things building blocks
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 
IOT - internet of Things - August 2017
IOT - internet of Things - August 2017IOT - internet of Things - August 2017
IOT - internet of Things - August 2017
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
 
Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and Applications
 
IoT
IoTIoT
IoT
 
Internet Of Things
 Internet Of Things Internet Of Things
Internet Of Things
 
Challenges and application of Internet of Things
Challenges and application of Internet of ThingsChallenges and application of Internet of Things
Challenges and application of Internet of Things
 
IoT Healthcare
IoT HealthcareIoT Healthcare
IoT Healthcare
 
Internet of Things (IoT) - Seminar ppt
Internet of Things (IoT) - Seminar pptInternet of Things (IoT) - Seminar ppt
Internet of Things (IoT) - Seminar ppt
 

Similar a IoT(Internet of Things) Report

Internet of things Seminar Reprt
Internet of things Seminar ReprtInternet of things Seminar Reprt
Internet of things Seminar ReprtVikrant Negi
 
Disadvantages Of Internet Of Things
Disadvantages Of Internet Of ThingsDisadvantages Of Internet Of Things
Disadvantages Of Internet Of ThingsNatalie Parnell
 
Internet of things
Internet of thingsInternet of things
Internet of thingsAshish Sahu
 
Introduction of Internet of Things(IoT) By Thakur Pawan & Pathania Susheela
Introduction of Internet of Things(IoT) By Thakur Pawan & Pathania SusheelaIntroduction of Internet of Things(IoT) By Thakur Pawan & Pathania Susheela
Introduction of Internet of Things(IoT) By Thakur Pawan & Pathania SusheelaGovt. P.G. College Dharamshala
 
Internet of-thing
Internet of-thingInternet of-thing
Internet of-thingRishab garg
 
The Internet Of Things ( Iot And The Internet
The Internet Of Things ( Iot And The InternetThe Internet Of Things ( Iot And The Internet
The Internet Of Things ( Iot And The InternetMichelle Singh
 
Internet of things iot based real time gas leakage monitoring and controlling
Internet of things iot based real time gas leakage monitoring and controllingInternet of things iot based real time gas leakage monitoring and controlling
Internet of things iot based real time gas leakage monitoring and controllingIAEME Publication
 
Internet of things iot based real time gas leakage monitoring and controlling
Internet of things iot based real time gas leakage monitoring and controllingInternet of things iot based real time gas leakage monitoring and controlling
Internet of things iot based real time gas leakage monitoring and controllingIAEME Publication
 
Internet of things New Version 2017 Document
Internet of things New Version 2017 DocumentInternet of things New Version 2017 Document
Internet of things New Version 2017 DocumentAjith Kumar Ravi
 
VET4SBO Level 1 module 3 - unit 1 - v1.0 en
VET4SBO Level 1   module 3 - unit 1 - v1.0 enVET4SBO Level 1   module 3 - unit 1 - v1.0 en
VET4SBO Level 1 module 3 - unit 1 - v1.0 enKarel Van Isacker
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Thingspandey97
 
CHAPTER 4.pptx
CHAPTER 4.pptxCHAPTER 4.pptx
CHAPTER 4.pptxttyu2
 
IoT and Big Data.pptx
IoT and Big Data.pptxIoT and Big Data.pptx
IoT and Big Data.pptxcetabac
 
IoT and Big Data.pptx
IoT and Big Data.pptxIoT and Big Data.pptx
IoT and Big Data.pptxSampath737246
 
IoT and Big Data.pptx
IoT and Big Data.pptxIoT and Big Data.pptx
IoT and Big Data.pptxssuser2cc0d4
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)Tarika Verma
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)Zohaib Hassan
 

Similar a IoT(Internet of Things) Report (20)

Internet of things Seminar Reprt
Internet of things Seminar ReprtInternet of things Seminar Reprt
Internet of things Seminar Reprt
 
Disadvantages Of Internet Of Things
Disadvantages Of Internet Of ThingsDisadvantages Of Internet Of Things
Disadvantages Of Internet Of Things
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Introduction of Internet of Things(IoT) By Thakur Pawan & Pathania Susheela
Introduction of Internet of Things(IoT) By Thakur Pawan & Pathania SusheelaIntroduction of Internet of Things(IoT) By Thakur Pawan & Pathania Susheela
Introduction of Internet of Things(IoT) By Thakur Pawan & Pathania Susheela
 
Internet of-thing
Internet of-thingInternet of-thing
Internet of-thing
 
The Internet Of Things ( Iot And The Internet
The Internet Of Things ( Iot And The InternetThe Internet Of Things ( Iot And The Internet
The Internet Of Things ( Iot And The Internet
 
Ioe module 1
Ioe module 1Ioe module 1
Ioe module 1
 
Internet of things iot based real time gas leakage monitoring and controlling
Internet of things iot based real time gas leakage monitoring and controllingInternet of things iot based real time gas leakage monitoring and controlling
Internet of things iot based real time gas leakage monitoring and controlling
 
Internet of things iot based real time gas leakage monitoring and controlling
Internet of things iot based real time gas leakage monitoring and controllingInternet of things iot based real time gas leakage monitoring and controlling
Internet of things iot based real time gas leakage monitoring and controlling
 
Internet of things New Version 2017 Document
Internet of things New Version 2017 DocumentInternet of things New Version 2017 Document
Internet of things New Version 2017 Document
 
VET4SBO Level 1 module 3 - unit 1 - v1.0 en
VET4SBO Level 1   module 3 - unit 1 - v1.0 enVET4SBO Level 1   module 3 - unit 1 - v1.0 en
VET4SBO Level 1 module 3 - unit 1 - v1.0 en
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
IoT Intro.pptx
IoT Intro.pptxIoT Intro.pptx
IoT Intro.pptx
 
CHAPTER 4.pptx
CHAPTER 4.pptxCHAPTER 4.pptx
CHAPTER 4.pptx
 
IoT.pptx
IoT.pptxIoT.pptx
IoT.pptx
 
IoT and Big Data.pptx
IoT and Big Data.pptxIoT and Big Data.pptx
IoT and Big Data.pptx
 
IoT and Big Data.pptx
IoT and Big Data.pptxIoT and Big Data.pptx
IoT and Big Data.pptx
 
IoT and Big Data.pptx
IoT and Big Data.pptxIoT and Big Data.pptx
IoT and Big Data.pptx
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 

Más de Hitesh Kumar Singh

Project report on Vehicle accident and Alcohol sensing alert with Engine Lock...
Project report on Vehicle accident and Alcohol sensing alert with Engine Lock...Project report on Vehicle accident and Alcohol sensing alert with Engine Lock...
Project report on Vehicle accident and Alcohol sensing alert with Engine Lock...Hitesh Kumar Singh
 
Synopsis on vehicle accident and alcohol sensing alert with engine locking sy...
Synopsis on vehicle accident and alcohol sensing alert with engine locking sy...Synopsis on vehicle accident and alcohol sensing alert with engine locking sy...
Synopsis on vehicle accident and alcohol sensing alert with engine locking sy...Hitesh Kumar Singh
 
Microsoft Hololens Seminar Report
Microsoft Hololens Seminar ReportMicrosoft Hololens Seminar Report
Microsoft Hololens Seminar ReportHitesh Kumar Singh
 
Cell Phone Detector Presentation
Cell Phone Detector Presentation Cell Phone Detector Presentation
Cell Phone Detector Presentation Hitesh Kumar Singh
 

Más de Hitesh Kumar Singh (6)

Project report on Vehicle accident and Alcohol sensing alert with Engine Lock...
Project report on Vehicle accident and Alcohol sensing alert with Engine Lock...Project report on Vehicle accident and Alcohol sensing alert with Engine Lock...
Project report on Vehicle accident and Alcohol sensing alert with Engine Lock...
 
Synopsis on vehicle accident and alcohol sensing alert with engine locking sy...
Synopsis on vehicle accident and alcohol sensing alert with engine locking sy...Synopsis on vehicle accident and alcohol sensing alert with engine locking sy...
Synopsis on vehicle accident and alcohol sensing alert with engine locking sy...
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
Microsoft Hololens Seminar Report
Microsoft Hololens Seminar ReportMicrosoft Hololens Seminar Report
Microsoft Hololens Seminar Report
 
Cell Phone Detector Presentation
Cell Phone Detector Presentation Cell Phone Detector Presentation
Cell Phone Detector Presentation
 
BitCoin report
BitCoin reportBitCoin report
BitCoin report
 

Último

Bio Medical Waste Management Guideliness 2023 ppt.pptx
Bio Medical Waste Management Guideliness 2023 ppt.pptxBio Medical Waste Management Guideliness 2023 ppt.pptx
Bio Medical Waste Management Guideliness 2023 ppt.pptxnaveenithkrishnan
 
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024Jan Löffler
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSedrianrheine
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...APNIC
 
Presentation2.pptx - JoyPress Wordpress
Presentation2.pptx -  JoyPress WordpressPresentation2.pptx -  JoyPress Wordpress
Presentation2.pptx - JoyPress Wordpressssuser166378
 
Check out the Free Landing Page Hosting in 2024
Check out the Free Landing Page Hosting in 2024Check out the Free Landing Page Hosting in 2024
Check out the Free Landing Page Hosting in 2024Shubham Pant
 
Computer 10 Lesson 8: Building a Website
Computer 10 Lesson 8: Building a WebsiteComputer 10 Lesson 8: Building a Website
Computer 10 Lesson 8: Building a WebsiteMavein
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSlesteraporado16
 
Introduction to ICANN and Fellowship program by Shreedeep Rayamajhi.pdf
Introduction to ICANN and Fellowship program  by Shreedeep Rayamajhi.pdfIntroduction to ICANN and Fellowship program  by Shreedeep Rayamajhi.pdf
Introduction to ICANN and Fellowship program by Shreedeep Rayamajhi.pdfShreedeep Rayamajhi
 
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdf
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdfLESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdf
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdfmchristianalwyn
 
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced Horizons
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced HorizonsVision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced Horizons
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced HorizonsRoxana Stingu
 
Zero-day Vulnerabilities
Zero-day VulnerabilitiesZero-day Vulnerabilities
Zero-day Vulnerabilitiesalihassaah1994
 

Último (12)

Bio Medical Waste Management Guideliness 2023 ppt.pptx
Bio Medical Waste Management Guideliness 2023 ppt.pptxBio Medical Waste Management Guideliness 2023 ppt.pptx
Bio Medical Waste Management Guideliness 2023 ppt.pptx
 
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
 
Presentation2.pptx - JoyPress Wordpress
Presentation2.pptx -  JoyPress WordpressPresentation2.pptx -  JoyPress Wordpress
Presentation2.pptx - JoyPress Wordpress
 
Check out the Free Landing Page Hosting in 2024
Check out the Free Landing Page Hosting in 2024Check out the Free Landing Page Hosting in 2024
Check out the Free Landing Page Hosting in 2024
 
Computer 10 Lesson 8: Building a Website
Computer 10 Lesson 8: Building a WebsiteComputer 10 Lesson 8: Building a Website
Computer 10 Lesson 8: Building a Website
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
 
Introduction to ICANN and Fellowship program by Shreedeep Rayamajhi.pdf
Introduction to ICANN and Fellowship program  by Shreedeep Rayamajhi.pdfIntroduction to ICANN and Fellowship program  by Shreedeep Rayamajhi.pdf
Introduction to ICANN and Fellowship program by Shreedeep Rayamajhi.pdf
 
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdf
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdfLESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdf
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdf
 
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced Horizons
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced HorizonsVision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced Horizons
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced Horizons
 
Zero-day Vulnerabilities
Zero-day VulnerabilitiesZero-day Vulnerabilities
Zero-day Vulnerabilities
 

IoT(Internet of Things) Report

  • 1. Maharishi Markandeshwar Engineering College- Mullana Dept:- Electronics & Communication SEMINAR REPORT ON :- Internet of Things (IoT) Submitted To:- Submitted By:- Er. ANUJ GOEL HITESH KUMAR SINGH 11151111 ( ECE 4th Sem )
  • 2. TABLE OF CONTENT  Abstract  Introduction  Evolution of Internet  Definition of Internet of Things  Architecture of IoT  Enabling Technologies  Applications of IoT  Challenges  Future research areas  Conclusion
  • 3. ABSTRACT The Internet of Things (IoT) is defined in many different ways, and it encompasses many aspects of life from connected homes and cities to connected cars and roads, roads to devices that track an individual’s behavior and use the data collected for push services. Some mention one trillion Internetconnected devices by 2025 and define mobile phones as the eyes and ears of the applications connecting all of those connected things. By these internet of things billions objects can communicate over worldwide over a public, private internet protocol network in 2010, the number of everyday physical objects and devices connected to the Internet was around 12.5 billion. Smart cities, Smart cars, Public safety, Smart Industries and Environmental Protection has been given the high intention for future protection by IoT Ecosystem. This results in the generation of enormous amounts of data which have to be stored, processed and presented in a seamless, efficient, and easily interpretable form. Internet of Things (IoT) is a new revolution of the Internet. Thus Internet of Things (IoT) can be said the expansion of internet services. It provides a platform for communication between objects where objects can organize and manage themselves. It makes objects themselves recognizable. The internet of things allows everyone to be connected anytime and anywhere. Objects can be communicated between each other by using radio frequency identification (RFID), wireless sensor network (WSN), Zigbee, etc. Radio Frequency identification assigns a unique identification to the objects. RFID technology is used as more secure identification and for tracking/locating objects, things, vehicle.
  • 4. INTRODUCTION The Internet of Things (IoT) is the network of physical objects, devices, vehicles, buildings and other items which are embedded with electronics, software, sensors, and network connectivity, which enables these objects to collect and exchange data. The Internet of Things allows objects to be sensed and controlled remotely across existing network infrastructure, creating opportunities for more-direct integration between the physical world and computer-based systems, and resulting in improved efficiency, accuracy and economic benefit; when IoT is augmented with sensors and actuators, the technology becomes an instance of the more general class of cyber-physical systems, which also encompasses technologies such as smart grids, smart homes, intelligent transportation and smart cities. Each thing is uniquely identifiable through its embedded computing system but is able to interoperate within the existing Internet infrastructure. Experts estimate that the IoT will consist of almost 50 billion objects by 2020. British entrepreneur Kevin Ashton first coined the term in 1999 while working at Auto-ID Labs (originally called Auto-ID centers - referring to a global network of Radio-frequency identification (RFID) connected objects). Typically, IoT is expected to offer advanced connectivity of devices, systems, and services that goes beyond machine-to-machine communications (M2M) and covers a variety of protocols, domains, and applications. The interconnection of these embedded devices (including smart objects), is expected to usher in automation in nearly all fields, while also enabling advanced applications like a Smart Grid, and expanding to the areas such as smart cities. "Things," in the IoT sense, can refer to a wide variety of devices such as heart monitoring implants, biochip transponders on farm animals, electric clams in coastal waters, automobiles with built-in sensors, DNA analysis devices for environmental/food/pathogen monitoring or field operation devices that assist firefighters in search and rescue operations. These devices collect useful data with the help of various existing technologies and then autonomously flow the data between other devices. Current market examples include smart thermostat systems and washer/dryers that use Wi-Fi for remote monitoring. Besides the plethora of new application areas for Internet connected automation to expand into, IoT is also expected to generate large amounts of data from diverse locations that is aggregated very quickly, thereby increasing the need to better index, store and process such data. IoT is one of the platforms of today's Smart City and Smart Energy Management Systems..
  • 5. EVOLUTION OF INTERNET: Internet of Boffins: This was the era when ARPANET (Advanced Research Project Agency Network) carried its first data packet in 1969. It was the first network to use TCP/IP. This was followed by the Mark I Network in 1970, which was built by Davis. This network was a packet switched network to serve NPL in UK. It was soon replaced by Mark II in 1973. The other major inventions such as Telnet in 1974, Ethernet in 1980, GOSIP in 1190 and a full text web search engine in 1994 followed the trend. This era is called ‘Internet of Boffins’ since in this era internet was in a stage of early evolution and research. Internet of Geeks: ‘Internet of Geeks’ era started with the proposal of IPv6. It was the latest revision of the internet protocol. The communication protocol provides identification and location system for computers on networks and routes traffic across internet. The popular internet services started taking roots in this era. Amazon.com started its first online retail service in 1995, followed by eBay providing customers with online auction and shopping services. Hotmail started its free web based email service in 1996, followed by Google search in 1998. PayPal started its first internet payment service in 1998. Internet penetration was low in the market until 2000.
  • 6. Internet of masses: ‘Internet of masses’ era started with the Dot-com bubble burst in 2000. In the starting of this era Dotcom bubble burst led to high growth in stock markets due to increasing use of internet in the industrial sector. In this era many people across the globe started using internet. Social networking sites came into existence. In 2001 Wikipedia came into existence followed by Facebook in 2004, further followed by YouTube, Twitter and WikiLeaks in the consecutive years Mobile Internet: ‘Mobile Internet’ era refers to access to the Internet via cellular phone service provider. The era got a boost with introduction of smartphones which gave a fast working internet on phones. This was the era from 2007-2011. There was steep rise in the use of internet by the people round the globe due to the mobile internet. Internet of Things: ‘Internet of Things’ refers to an era where things can be connected to each other using internet.
  • 7. DEFINITION OF INTERNET OF THINGS (IOT) “Today computers—and, therefore, the Internet—are almost wholly dependent on human beings for information. Nearly all of the roughly 50 petabytes(a petabyte is 1,024 terabytes) of data available on the Internet were first captured and created by human beings—by typing, pressing a record button, taking a digital picture, or scanning a bar code. Conventional diagrams of the Internet … leave out the most numerous and important routers of all - people. The problem is, people have limited time, attention and accuracy—all of which means they are not very good at capturing data about things in the real world. And that's a big deal. We're physical, and so is our environment … You can't eat bits, burn them to stay warm or put them in your gas tank. Ideas and information are important, but things matter much more. Yet today's information technology is so dependent on data originated by people that our computers know more about ideas than things. If we had computers that knew everything there was to know about things—using data they gathered without any help from us—we would be able to track and count everything, and greatly reduce waste, loss and cost. We would know when things needed replacing, repairing or recalling, and whether they were fresh or past their best. The Internet of Things has the potential to change the world, just as the Internet did. Maybe even more so. “ —Kevin Ashton, "That 'Internet of Things' Thing", RFID Journal, July 22, 2009 “Things are active participants in business, information and social processes where they are enabled to interact and communicate among themselves and with the environment by exchanging data and information sensed about the environment, while reacting autonomously to the real/physical world events and influencing it by running processes that trigger actions and create services with or without direct human intervention.” —Cluster of European research projects on the Internet of Things “The Internet of Things represents an evolution in which objects are capable of interacting with other objects. Hospitals can monitor and regulate pacemakers long distance, factories can automatically address production line issues and hotels can adjust temperature and lighting according to a guest's preferences, to name just a few examples.” – IBM
  • 8. ARCHITECTURE OF INTERNET OF THINGS Architecture of internet of Things contains basically 4 layers:  Application Layer  Lowest Abstraction Layer  With sensors we are creating digital nervous system.  Incorporated to measure physical quantities  Interconnects the physical and digital world Collects and process the real time information  Gateway and the network layer  Robust and High performance network infrastructure  Supports the communication requirements for latency, bandwidth or security  Allows multiple organizations to share and use the same network independently  Management Service layer  Capturing of periodic sensory data  Data Analytics (Extracts relevant information from massive amount of raw data)  Streaming Analytics (Process real time data)  Ensures security and privacy of data.  Sensor layer  Provides a user interface for using IoT.  Different applications for various sectors like Transportation, Healthcare, Agriculture, Supply chains, Government, Retail etc.
  • 9. ENABLING TECHNOLOGIES In general, three types of technologies enable IoT 1. RFID and near-field communication - In the 2000s, RFID was the dominant technology. Later, NFC became dominant (NFC). NFC has become common in smart phones during the early 2010s, with uses such as reading NFC tags or for access to public transportation. 2. Optical tags and quick response codes - This is used for low cost tagging. Phone camera decodes QR code using image-processing techniques. In reality QR advertisement campaigns gives less turnout as users need to have another application to read QR codes. 3. Bluetooth low energy - This is one of the latest technology. All newly releasing smartphones have BLE hardware in them. Tags based on BLE can signal their presence at a power budget that enables them to operate for up to one year on a lithium coin cell battery. RFID Radio-frequency identification (RFID) is the wireless use of electromagnetic fields to transfer data, for the purposes of automatically identifying and tracking tags attached to objects. The tags contain electronically stored information. Some tags are powered by electromagnetic induction from magnetic fields produced near the reader. Some types collect energy from the interrogating radio waves and act as a passive transponder. Other types have a local power source such as a battery and may operate at hundreds of meters from the reader. Unlike a barcode, the tag does not necessarily need to be within line of sight of the reader and may be embedded in the tracked object. RFID is one method for Automatic Identification and Data Capture (AIDC). Sensors Many IoT devices have sensors that can register changes in temperature, light, pressure, sound and motion. They are your eyes and ears to what's going on the world. Before we talk about what they do, let's describe them. These sensors are part of a device category called a microelectromechanical system (MEMS) and are manufactured in much the same way microprocessors are manufactured, through a lithography process. These sensors can be paired with an application-specific integrated circuit or an ASIC. This is a circuit with a
  • 10. limited degree of programming capability and is hardwired to do something specific. It can also be paired with microprocessor and will likely be attached to a wireless radio for communications. For example, you are away on vacation and the house is empty. A moisture sensor detects water on the basement floor. That sensor finding is processed by an app, which has received another report from a temperature sensor that detects the flow of water in the main water pipe. (When water flows, it takes away heat and lowers the temperature). IPv6 The original idea of the Auto-ID Center is based on RFID-tags and unique identification through the Electronic Product Code however this has evolved into objects having an IP address or URI. An alternative view, from the world of the Semantic Web focuses instead on making all things (not just those electronic, smart, or RFID-enabled) addressable by the existing naming protocols, such as URI. The objects themselves do not converse, but they may now be referred to by other agents, such as powerful centralized servers acting for their human owners. The next generation of Internet applications using Internet Protocol Version 6 (IPv6) would be able to communicate with devices attached to virtually all human-made objects because of the extremely large address space of the IPv6 protocol. This system would therefore be able to scale to the large numbers of objects envisaged. A combination of these ideas can be found in the current GS1/EPC global EPC Information Services (EPCIS) specifications. This system is being used to identify objects in industries ranging from aerospace to fast moving consumer products and transportation logistics.
  • 11. APPLCATIONS OF IoT Aerospace and aviation industry IoT can help to improve safety and security of products and services by reliably identifying counterfeit products and elements. The aviation industry, for example, is vulnerable to the problem of suspected unapproved parts (SUP). An SUP is an aircraft part that is not guaranteed to meet the requirements of an approved aircraft part (e.g., counterfeits, which do not conform to the strict quality constraints of the aviation industry). Thus, SUPs seriously violate the security standards of an aircraft. Aviation authorities report that at least 28 accidents or incidents in the United States have been caused by counterfeits [24]. Apart from time-consuming material analyses, verifying the authenticity of aircraft parts can be performed by inspecting the accompanying documents, which can be easily forged. It is possible to solve this problem by introducing electronic pedigrees for certain categories of aircraft parts, which document their origin and safety-critical events during their lifecycle (e.g.,modifications). By storing these pedigrees within a decentralized database as well as on RFID tags, which are securely attached to aircraft parts, an authentication (verification of digital signatures, comparison of the pedigree on RFID tags and within the database) of these parts can be performed prior to installing them in an aircraft. In this way, safety and operational reliability of aircrafts can be significantly improved. Automotive industry Advanced cars, trains, buses as well as bicycles are becoming equipped with advanced sensors, actuators with increased processing powers. Applications in the automotive industry include the use of smart things to monitor and report various parameters from pressure in tyres to proximity of other vehicles. RFID technology has already been used to streamline vehicle production, improve logistics, increase quality control and improve customer services. The devices attached to the parts contain information related to the name of the manufacturer and when and where the product was made, its serial number, type, product code, and in some applications the precise location in the facility at that moment. RFID technology provides real-time data in the manufacturing processes, maintenance operations and offers new ways of managing recalls more effectively. Dedicated Short Range Communication (DSRC) technology will possibly help in achieving higher bit rates and reducing interference with other equipment. Vehicle-to vehicle (V2V) and vehicle-to-
  • 12. infrastructure (V2I) communications will significantly advance Intelligent Transportation Systems (ITS) applications such as vehicle safety services and traffic management and will be fully integrated in the IoT infrastructure. Telecommunication industry IoT will create the possibility of merging of diverse telecommunication technologies and create new services. An illustrative example is the use of GSM, NFC (Near Field Communication), low power Bluetooth, WLAN, multi-hop networks, GPS and sensor networks together with SIM-card technology. In these types of applications the reader (i.e. tag) is a part of the mobile phone, and different applications share the SIM-card. NFC enables communications among objects in a simple and secure way just by having them close to each other. The mobile phone can therefore be used as a NFC-reader and transmit the read data to a central server. When used in a mobile phone, the SIM-card plays an important role as storage for the NFC data and authentication credentials (like ticket numbers, credit card accounts, ID information etc). Things can join networks and facilitate peer-to-peer communication for specialized purposes or to increase robustness of communications channels and networks. Things can form ad-hoc peer-to-peer networks in disaster situations to keep the flow of vital information going in case of telecommunication infrastructure failures. Medical and Healthcare industry IoT will have many applications in the healthcare sector, with the possibility of using the cell phone with RFID-sensor capabilities as a platform for monitoring of medical parameters and drug delivery. The advantage gained is in prevention and easy monitoring of diseases, ad hoc diagnosis and providing prompt medical attention in cases of accidents. Implantable and addressable wireless devices can be used to store health records that can save a patient’s life in emergency situations, especially for people with diabetes, cancer, coronary heart disease, stroke, chronic obstructive pulmonary disease, cognitive impairments, seizure disorders and Alzheimer’s disease. Edible, biodegradable chips can be introduced into human body for
  • 13. guided actions. Paraplegic persons can have muscular stimuli delivered via an implanted smart thing-controlled electrical simulation system in order to restore movement functions. Independent Living IoT applications and services will have an important impact on independent living by providing support for an aging population by detecting the activities of daily living using wearable and ambient sensors, monitoring social interactions using wearable and ambient sensors, monitoring chronic disease using wearable vital signs sensors, and in body sensors. With emergence of pattern detection and machine learning algorithms, the things in a patient’s environment would be able to watch out and care for the patient. Things can learn regular routines and raise alerts or send out notifications in anomaly situations. These services can be merged with the medical technology services. Environmental Monitoring Utilization of wireless identifiable devices and other IoT technologies in green applications and environmental conservation are one of the most promising market segments in the future. There will be an increased usage of wireless identifiable devices in environmentally friendly programs worldwide. Media, Entertainment Industry Deployment of IoT technologies will enable ad hoc news gathering based on locations of the users. The news gathering could happen by querying IoT, to see which multi-media-capable devices are present at a certain location, and sending them a (financial) offer to collect multimedia footage about a certain event. Near field communication tags can be attached to posters for providing more information by connecting the reader to an URI address that contains detailed information related to the poster.
  • 14. Insurance Industry Often the introduction of IoT technology is perceived as a grave invasion on privacy of individuals. However, sometimes people are willing to trade privacy for a better service or a monetary benefit. One example is car insurance. If insurance clients are willing to accept electronic recorders in their car, which are able to record acceleration, speed, and other parameters, and communicate this information to their insurer, they are likely to get a cheaper rate or premium [29]. The insurer can save money by being involved in a very early stage of an impending accident and can trigger the most economic actions. A part of the savings can be given to the customers through discounts on insurance premiums. The same applies for other assets such as buildings, machinery, etc., that are equipped with IoT technology. In these cases the technology mostly helps in preventing large-scale maintenance operations or allows for much cheaper predictive maintenance before an incident occurs.
  • 15. CHALLENGES The workflows in analysed enterprise environment, home, office and other smart spaces in the future will be characterized by cross organization interaction, requiring the operation of highly dynamic and ad-ho relationships. At present, only a very limited ICT support is available, and the following key challenges exist. (i) Network Foundation - limitations of the current Internet architecture in terms of mobility, availability, manageability and scalability are some of the major barriers to IoT. (ii) Security, Privacy and Trust - in the domain of security the challenges are: (a) securing the architecture of IOT - security to be ensured at design time and execution time, (b) proactive identification and protection of IOT from arbitrary attacks (e.g. DoS and DDoS attacks) and abuse, and (c) proactive identification and protection of IOT from malicious software. In the domain of user privacy, the specific challenges are: (a) control over personal information (data privacy) and control over individual’s physical location and movement (location privacy), (b) need for privacy enhancement technologies and relevant protection laws, and (c) standards, methodologies and tools for identity management of users and objects. In the domain of trust, some of the specific challenges are: (a) Need for easy and natural exchange of critical, protected and sensitive data - e.g. smart objects will communicate on behalf of users / organizations with services they can trust, and (b) trust has to be a part of the design of IoT and must be built in. (iii) Managing heterogeneity - managing heterogeneous applications, environments and devices constitute a major challenge. In addition to the above major challenges, some of the other challenges are: (a) managing large amount of information and mining large volume of data to provide useful services, (b) designing an efficient architecture for sensor networking and storage, (iii) designing mechanisms for sensor data discovery, (iv) designing sensor data communication protocols - senor data query, publish/subscribe mechanisms, and (v) developing sensor data stream processing mechanisms.
  • 16. Future Research Areas :- There are several areas in which further research is needed for making deployment of the concept of IoT reliable, robust and efficient. Some of the areas are identified in the following. In identification technology domain, further research is needed in development of new technologies that address the global ID schemes, identity management, identity encoding/ encryption, pseudonimity, revocable anonymity, authentication of parties, repository management using identification, authentication and addressing schemes and the creation of global directory lookup services and discovery services for IoT applications with various identifier schemes. In architecture design domain, some of the issues that need attention are: design of distributed open architecture with end-to-end characteristics, interoperability of heterogeneous systems, neutral access, clear layering and resilience to physical network disruption, decentralized autonomic architectures based on peering of nodes etc. In communication protocol domain, the issues that need to be addressed are : design of energy efficient communication by multi frequency protocol, communication spectrum and frequency allocation, software defined radios to remove the needs for hardware upgrades for new protocols, and design of high performance, scalable algorithms and protocols. In network technology domain further research is needed on network on chip technology considering on chip communication architectures for dynamic configurations design time parameterized architecture with a dynamic routing scheme and a variable number of allowed virtual connections at each output. In addition, power-aware network design that turns on and off the links in response to burst and dips of traffic on demand, scalable communication infrastructures design on chip to dynamically support the communication among circuit modules based on varying workloads and /or changing constraints are some of the important research issues.
  • 17. Conclusion The thought of always being tracked and your data being recorded does bring a fear to a consumer’s mind, but we have to move away from it to see the benefits that this great technology is going to bring to us. The above examples were about a 'connected you', making your life seamless, but it brings with it higher benefits like connected cities, better commerce and an improved ecosystem. As often happens, history is repeating itself. Just as in the early days when Cisco’s tagline was “The Science of Networking Networks,” IoT is at a stage where disparate networks and a multitude of sensors must come together and interoperate under a common set of standards. This effort will require businesses, governments, standards organizations, and academia to work together toward a common goal. Next, for IoT to gain acceptance among the general populace, service providers and others must deliver applications that bring tangible value to peoples’ lives. IoT must not represent the advancement of technology for technology’s sake; the industry needs to demonstrate value in human terms. In conclusion, IoT represents the next evolution of the Internet. Given that humans advance and evolve by turning data into information, knowledge, and wisdom, IoT has the potential to change the world as we know it today—for the better. How quickly we get there is up to us.