IoT which stands for Internet of Things is not a very new topic, but sensing its importance and growing demand, it's very important for one to understand what exactly is IoT. So, here is the file, which will help you know about it in a very easy manner.
Hope this will help you
1. Maharishi Markandeshwar Engineering College-
Mullana
Dept:- Electronics & Communication
SEMINAR REPORT ON :-
Internet of Things (IoT)
Submitted To:- Submitted By:-
Er. ANUJ GOEL HITESH KUMAR SINGH
11151111 ( ECE 4th
Sem )
2. TABLE OF CONTENT
Abstract
Introduction
Evolution of Internet
Definition of Internet of Things
Architecture of IoT
Enabling Technologies
Applications of IoT
Challenges
Future research areas
Conclusion
3. ABSTRACT
The Internet of Things (IoT) is defined in many different ways, and it encompasses many
aspects of life from connected homes and cities to connected cars and roads, roads to devices
that track an individual’s behavior and use the data collected for push services. Some mention
one trillion Internetconnected devices by 2025 and define mobile phones as the eyes and ears
of the applications connecting all of those connected things. By these internet of things
billions objects can communicate over worldwide over a public, private internet protocol
network in 2010, the number of everyday physical objects and devices connected to the
Internet was around 12.5 billion. Smart cities, Smart cars, Public safety, Smart Industries and
Environmental Protection has been given the high intention for future protection by IoT
Ecosystem. This results in the generation of enormous amounts of data which have to be
stored, processed and presented in a seamless, efficient, and easily interpretable form.
Internet of Things (IoT) is a new revolution of the Internet. Thus Internet of Things (IoT) can
be said the expansion of internet services. It provides a platform for communication between
objects where objects can organize and manage themselves. It makes objects themselves
recognizable. The internet of things allows everyone to be connected anytime and anywhere.
Objects can be communicated between each other by using radio frequency identification
(RFID), wireless sensor network (WSN), Zigbee, etc. Radio Frequency identification assigns
a unique identification to the objects. RFID technology is used as more secure identification
and for tracking/locating objects, things, vehicle.
4. INTRODUCTION
The Internet of Things (IoT) is the network of physical objects, devices, vehicles, buildings
and other items which are embedded with electronics, software, sensors, and network
connectivity, which enables these objects to collect and exchange data. The Internet of
Things allows objects to be sensed and controlled remotely across existing network
infrastructure, creating opportunities for more-direct integration between the physical world
and computer-based systems, and resulting in improved efficiency, accuracy and economic
benefit; when IoT is augmented with sensors and actuators, the technology becomes an
instance of the more general class of cyber-physical systems, which also encompasses
technologies such as smart grids, smart homes, intelligent transportation and smart cities.
Each thing is uniquely identifiable through its embedded computing system but is able to
interoperate within the existing Internet infrastructure. Experts estimate that the IoT will
consist of almost 50 billion objects by 2020. British entrepreneur Kevin Ashton first coined
the term in 1999 while working at Auto-ID Labs (originally called Auto-ID centers - referring
to a global network of Radio-frequency identification (RFID) connected objects). Typically,
IoT is expected to offer advanced connectivity of devices, systems, and services that goes
beyond machine-to-machine communications (M2M) and covers a variety of protocols,
domains, and applications. The interconnection of these embedded devices (including smart
objects), is expected to usher in automation in nearly all fields, while also enabling advanced
applications like a Smart Grid, and expanding to the areas such as smart cities. "Things," in
the IoT sense, can refer to a wide variety of devices such as heart monitoring implants,
biochip transponders on farm animals, electric clams in coastal waters, automobiles with
built-in sensors, DNA analysis devices for environmental/food/pathogen monitoring or field
operation devices that assist firefighters in search and rescue operations. These devices
collect useful data with the help of various existing technologies and then autonomously flow
the data between other devices. Current market examples include smart thermostat systems
and washer/dryers that use Wi-Fi for remote monitoring. Besides the plethora of new
application areas for Internet connected automation to expand into, IoT is also expected to
generate large amounts of data from diverse locations that is aggregated very quickly, thereby
increasing the need to better index, store and process such data. IoT is one of the platforms of
today's Smart City and Smart Energy Management Systems..
5. EVOLUTION OF INTERNET:
Internet of Boffins:
This was the era when ARPANET (Advanced Research Project Agency Network) carried its
first data packet in 1969. It was the first network to use TCP/IP. This was followed by the
Mark I Network in 1970, which was built by Davis. This network was a packet switched
network to serve NPL in UK. It was soon replaced by Mark II in 1973. The other major
inventions such as Telnet in 1974, Ethernet in 1980, GOSIP in 1190 and a full text web
search engine in 1994 followed the trend. This era is called ‘Internet of Boffins’ since in this
era internet was in a stage of early evolution and research.
Internet of Geeks:
‘Internet of Geeks’ era started with the proposal of IPv6. It was the latest revision of the
internet protocol. The communication protocol provides identification and location system
for computers on networks and routes traffic across internet. The popular internet services
started taking roots in this era. Amazon.com started its first online retail service in 1995,
followed by eBay providing customers with online auction and shopping services. Hotmail
started its free web based email service in 1996, followed by Google search in 1998. PayPal
started its first internet payment service in 1998. Internet penetration was low in the market
until 2000.
6. Internet of masses:
‘Internet of masses’ era started with the Dot-com bubble burst in 2000. In the starting of this
era Dotcom bubble burst led to high growth in stock markets due to increasing use of internet
in the industrial sector. In this era many people across the globe started using internet. Social
networking sites came into existence. In 2001 Wikipedia came into existence followed by
Facebook in 2004, further followed by YouTube, Twitter and WikiLeaks in the consecutive
years
Mobile Internet:
‘Mobile Internet’ era refers to access to the Internet via cellular phone service provider. The
era got a boost with introduction of smartphones which gave a fast working internet on
phones. This was the era from 2007-2011. There was steep rise in the use of internet by the
people round the globe due to the mobile internet.
Internet of Things:
‘Internet of Things’ refers to an era where things can be connected to each other using
internet.
7. DEFINITION OF INTERNET OF THINGS (IOT)
“Today computers—and, therefore, the Internet—are almost wholly dependent on human
beings for information. Nearly all of the roughly 50 petabytes(a petabyte is 1,024 terabytes)
of data available on the Internet were first captured and created by human beings—by typing,
pressing a record button, taking a digital picture, or scanning a bar code. Conventional
diagrams of the Internet … leave out the most numerous and important routers of all - people.
The problem is, people have limited time, attention and accuracy—all of which means they
are not very good at capturing data about things in the real world. And that's a big deal. We're
physical, and so is our environment … You can't eat bits, burn them to stay warm or put them
in your gas tank. Ideas and information are important, but things matter much more. Yet
today's information technology is so dependent on data originated by people that our
computers know more about ideas than things. If we had computers that knew everything
there was to know about things—using data they gathered without any help from us—we
would be able to track and count everything, and greatly reduce waste, loss and cost. We
would know when things needed replacing, repairing or recalling, and whether they were
fresh or past their best. The Internet of Things has the potential to change the world, just as
the Internet did. Maybe even more so. “ —Kevin Ashton, "That 'Internet of Things' Thing",
RFID Journal, July 22, 2009 “Things are active participants in business, information and
social processes where they are enabled to interact and communicate among themselves and
with the environment by exchanging data and information sensed about the environment,
while reacting autonomously to the real/physical world events and influencing it by running
processes that trigger actions and create services with or without direct human intervention.”
—Cluster of European research projects on the Internet of Things “The Internet of Things
represents an evolution in which objects are capable of interacting with other objects.
Hospitals can monitor and regulate pacemakers long distance, factories can automatically
address production line issues and hotels can adjust temperature and lighting according to a
guest's preferences, to name just a few examples.” – IBM
8. ARCHITECTURE OF INTERNET OF THINGS
Architecture of internet of Things contains basically 4 layers:
Application Layer
Lowest Abstraction Layer
With sensors we are creating digital nervous system.
Incorporated to measure physical quantities
Interconnects the physical and digital world Collects and process the real
time information
Gateway and the network layer
Robust and High performance network infrastructure
Supports the communication requirements for latency, bandwidth or security
Allows multiple organizations to share and use the same network
independently
Management Service layer
Capturing of periodic sensory data
Data Analytics (Extracts relevant information from massive amount of raw
data)
Streaming Analytics (Process real time data)
Ensures security and privacy of data.
Sensor layer
Provides a user interface for using IoT.
Different applications for various sectors like Transportation, Healthcare,
Agriculture, Supply chains, Government, Retail etc.
9. ENABLING TECHNOLOGIES
In general, three types of technologies enable IoT
1. RFID and near-field communication - In the 2000s, RFID was the dominant technology.
Later, NFC became dominant (NFC). NFC has become common in smart phones during the
early 2010s, with uses such as reading NFC tags or for access to public transportation.
2. Optical tags and quick response codes - This is used for low cost tagging. Phone camera
decodes QR code using image-processing techniques. In reality QR advertisement campaigns
gives less turnout as users need to have another application to read QR codes.
3. Bluetooth low energy - This is one of the latest technology. All newly releasing
smartphones have BLE hardware in them. Tags based on BLE can signal their presence at a
power budget that enables them to operate for up to one year on a lithium coin cell battery.
RFID
Radio-frequency identification (RFID) is the wireless use of electromagnetic fields to transfer
data, for the purposes of automatically identifying and tracking tags attached to objects. The
tags contain electronically stored information. Some tags are powered by electromagnetic
induction from magnetic fields produced near the reader. Some types collect energy from the
interrogating radio waves and act as a passive transponder. Other types have a local power
source such as a battery and may operate at hundreds of meters from the reader. Unlike a
barcode, the tag does not necessarily need to be within line of sight of the reader and may be
embedded in the tracked object. RFID is one method for Automatic Identification and Data
Capture (AIDC).
Sensors
Many IoT devices have sensors that can register changes in temperature, light, pressure,
sound and motion. They are your eyes and ears to what's going on the world. Before we talk
about what they do, let's describe them. These sensors are part of a device category called a
microelectromechanical system (MEMS) and are manufactured in much the same way
microprocessors are manufactured, through a lithography process. These sensors can be
paired with an application-specific integrated circuit or an ASIC. This is a circuit with a
10. limited degree of programming capability and is hardwired to do something specific. It can
also be paired with microprocessor and will likely be attached to a wireless radio for
communications. For example, you are away on vacation and the house is empty. A moisture
sensor detects water on the basement floor. That sensor finding is processed by an app, which
has received another report from a temperature sensor that detects the flow of water in the
main water pipe. (When water flows, it takes away heat and lowers the temperature).
IPv6
The original idea of the Auto-ID Center is based on RFID-tags and unique identification
through the Electronic Product Code however this has evolved into objects having an IP
address or URI. An alternative view, from the world of the Semantic Web focuses instead on
making all things (not just those electronic, smart, or RFID-enabled) addressable by the
existing naming protocols, such as URI. The objects themselves do not converse, but they
may now be referred to by other agents, such as powerful centralized servers acting for their
human owners. The next generation of Internet applications using Internet Protocol Version 6
(IPv6) would be able to communicate with devices attached to virtually all human-made
objects because of the extremely large address space of the IPv6 protocol. This system would
therefore be able to scale to the large numbers of objects envisaged. A combination of these
ideas can be found in the current GS1/EPC global EPC Information Services (EPCIS)
specifications. This system is being used to identify objects in industries ranging from
aerospace to fast moving consumer products and transportation logistics.
11. APPLCATIONS OF IoT
Aerospace and aviation industry
IoT can help to improve safety and security of products and services by reliably identifying
counterfeit products and elements. The aviation industry, for example, is vulnerable to the
problem of suspected unapproved parts (SUP). An SUP is an aircraft part that is not
guaranteed to meet the requirements of an approved aircraft part (e.g., counterfeits, which do
not conform to the strict quality constraints of the aviation industry). Thus, SUPs seriously
violate the security standards of an aircraft. Aviation authorities report that
at least 28 accidents or incidents in the United States have been caused by counterfeits [24].
Apart from time-consuming material analyses, verifying the authenticity of aircraft parts can
be performed by inspecting the accompanying documents, which can be easily forged. It is
possible to solve this problem by introducing electronic pedigrees for certain categories of
aircraft parts, which document their origin and safety-critical events during their lifecycle
(e.g.,modifications). By storing these pedigrees within a decentralized database as well as on
RFID tags, which are securely attached to aircraft parts, an authentication (verification of
digital signatures, comparison of the pedigree on RFID tags and within the database) of these
parts can be performed prior to installing them in an aircraft. In this way, safety and
operational reliability of aircrafts can be significantly improved.
Automotive industry
Advanced cars, trains, buses as well as bicycles are becoming equipped with advanced
sensors, actuators with increased processing powers. Applications in the automotive industry
include the use of smart things to monitor and report various parameters from pressure in
tyres to proximity of other vehicles. RFID technology has already been used to streamline
vehicle production, improve logistics, increase quality control and improve customer
services. The devices attached to the parts contain information related to the name of the
manufacturer and when and where the product was made, its serial number, type, product
code, and in some applications the precise location in the facility at that moment. RFID
technology provides real-time data in the manufacturing processes, maintenance operations
and offers new ways of managing recalls more effectively. Dedicated Short Range
Communication (DSRC) technology will possibly help in achieving higher bit rates and
reducing interference with other equipment. Vehicle-to vehicle (V2V) and vehicle-to-
12. infrastructure (V2I) communications will significantly advance Intelligent Transportation
Systems (ITS) applications such as vehicle safety services and traffic management and will
be fully integrated in the IoT infrastructure.
Telecommunication industry
IoT will create the possibility of merging of diverse telecommunication technologies and
create new services. An illustrative example is the use of GSM, NFC (Near Field
Communication), low power Bluetooth, WLAN, multi-hop
networks, GPS and sensor networks together with SIM-card technology. In these types of
applications the reader (i.e. tag) is a part of the mobile phone, and different applications share
the SIM-card. NFC enables communications among objects in a simple and secure way just
by having them close to each other. The mobile phone can therefore be used as a NFC-reader
and transmit the read data to a central server. When used in a mobile phone, the SIM-card
plays an important role as storage for the NFC data and authentication credentials
(like ticket numbers, credit card accounts, ID information etc). Things can join networks and
facilitate peer-to-peer communication for specialized purposes or to increase robustness of
communications channels and networks. Things can form ad-hoc peer-to-peer networks in
disaster situations to keep the flow of vital information going in case of telecommunication
infrastructure failures.
Medical and Healthcare industry
IoT will have many applications in the healthcare sector, with the possibility of using the cell
phone with RFID-sensor capabilities as a platform for monitoring of medical parameters and
drug delivery. The advantage gained is in prevention and easy monitoring of diseases, ad hoc
diagnosis and providing prompt medical attention in cases of accidents. Implantable and
addressable wireless devices can be used to store health records that can save a patient’s life
in emergency situations, especially for people with diabetes, cancer, coronary heart disease,
stroke, chronic obstructive pulmonary disease, cognitive impairments, seizure disorders and
Alzheimer’s disease. Edible, biodegradable chips can be introduced into human body for
13. guided actions. Paraplegic persons can have muscular stimuli delivered via an implanted
smart thing-controlled electrical simulation system in order to restore movement functions.
Independent Living
IoT applications and services will have an important impact on independent living by
providing support for an aging population by detecting the activities of daily living using
wearable and ambient sensors, monitoring social interactions using wearable and ambient
sensors, monitoring chronic disease using wearable vital signs sensors, and in body sensors.
With emergence of pattern detection and machine learning algorithms, the things in a
patient’s environment would be able to watch out and care for the patient. Things can learn
regular routines and raise alerts or send out notifications in anomaly situations. These
services can be merged with the medical technology services.
Environmental Monitoring
Utilization of wireless identifiable devices and other IoT technologies in green applications
and environmental conservation are one of the most promising market segments in the future.
There will be an increased usage of wireless identifiable devices in environmentally friendly
programs worldwide.
Media, Entertainment Industry
Deployment of IoT technologies will enable ad hoc news gathering based on locations of the
users. The news gathering could happen by querying IoT, to see which multi-media-capable
devices are present at a certain location, and sending them a (financial) offer to collect
multimedia footage about a certain event. Near field communication tags can be attached to
posters for providing more information by connecting the reader to an URI address that
contains detailed information related to the poster.
14. Insurance Industry
Often the introduction of IoT technology is perceived as a grave invasion on privacy of
individuals. However, sometimes people are willing to trade privacy for a better service or a
monetary benefit. One example is car insurance. If insurance clients are willing to accept
electronic recorders in their car, which are able to record acceleration, speed, and other
parameters, and communicate this information to their insurer, they are likely to get a cheaper
rate or premium [29]. The insurer can save money by being involved in a very early stage of
an impending accident and can trigger the most economic actions. A part of the savings can
be given to the customers through discounts on insurance premiums. The same applies for
other assets such as buildings, machinery, etc., that are equipped with IoT technology. In
these cases the technology mostly helps in preventing large-scale maintenance operations or
allows for much cheaper predictive maintenance before an incident occurs.
15. CHALLENGES
The workflows in analysed enterprise environment, home, office and other smart spaces in
the future will be characterized by cross organization interaction, requiring the operation of
highly dynamic and ad-ho relationships. At present, only a very limited ICT support is
available, and the following key challenges exist.
(i) Network Foundation - limitations of the current Internet architecture in
terms of mobility, availability, manageability and scalability are some of
the major barriers to IoT.
(ii) Security, Privacy and Trust - in the domain of security the challenges are:
(a) securing the architecture of IOT - security to be ensured at design time
and execution time, (b) proactive identification and protection of IOT from
arbitrary attacks (e.g. DoS and DDoS attacks) and abuse, and (c) proactive
identification and protection of IOT from malicious software. In the
domain of user privacy, the specific challenges are: (a) control over
personal information (data privacy) and control over individual’s physical
location and movement (location privacy), (b) need for privacy
enhancement technologies and relevant protection laws, and (c) standards,
methodologies and tools for identity management of users and objects. In
the domain of trust, some of the specific challenges are: (a) Need for easy
and natural exchange of critical, protected and sensitive data - e.g. smart
objects will communicate on behalf of users / organizations with services
they can trust, and (b) trust has to be a part of the design of IoT and must be
built in.
(iii) Managing heterogeneity - managing heterogeneous applications,
environments and devices constitute a major challenge. In addition to the
above major challenges, some of the other challenges are: (a) managing
large amount of information and mining large volume of data to provide
useful services, (b) designing an efficient architecture for sensor
networking and storage, (iii) designing mechanisms for sensor data
discovery, (iv) designing sensor data communication protocols - senor data
query, publish/subscribe mechanisms, and (v) developing sensor data
stream processing mechanisms.
16. Future Research Areas :-
There are several areas in which further research is needed for making deployment of the
concept of IoT reliable, robust and efficient. Some of the areas are identified in the following.
In identification technology domain, further research is needed in development of new
technologies that address the global ID schemes, identity management, identity encoding/
encryption, pseudonimity, revocable anonymity, authentication of parties, repository
management using identification, authentication and addressing schemes and the creation of
global directory lookup services and discovery services for IoT applications with various
identifier schemes. In architecture design domain, some of the issues that need attention are:
design of distributed open architecture with end-to-end characteristics, interoperability of
heterogeneous systems, neutral access, clear layering and resilience to physical network
disruption, decentralized autonomic architectures based on peering of nodes etc. In
communication protocol domain, the issues that need to be addressed are : design of energy
efficient communication by multi frequency protocol, communication spectrum and
frequency allocation, software defined radios to remove the needs for hardware upgrades for
new protocols, and design of high performance, scalable algorithms and protocols. In
network technology domain further research is needed on network on chip technology
considering on chip communication architectures for dynamic configurations design time
parameterized architecture with a dynamic routing scheme and a variable number of allowed
virtual connections at each output. In addition, power-aware network design that turns on and
off the links in response to burst and dips of traffic on demand, scalable communication
infrastructures design on chip to dynamically support the communication among circuit
modules based on varying workloads and /or changing constraints are some of the important
research issues.
17. Conclusion
The thought of always being tracked and your data being recorded does bring a fear to a
consumer’s mind, but we have to move away from it to see the benefits that this great
technology is going to bring to us. The above examples were about a 'connected you', making
your life seamless, but it brings with it higher benefits like connected cities, better commerce
and an improved ecosystem. As often happens, history is repeating itself. Just as in the early
days when Cisco’s tagline was “The Science of Networking Networks,” IoT is at a stage
where disparate networks and a multitude of sensors must come together and interoperate
under a common set of standards. This effort will require businesses, governments, standards
organizations, and academia to work together toward a common goal. Next, for IoT to gain
acceptance among the general populace, service providers and others must deliver
applications that bring tangible value to peoples’ lives. IoT must not represent the
advancement of technology for technology’s sake; the industry needs to demonstrate value in
human terms. In conclusion, IoT represents the next evolution of the Internet. Given that
humans advance and evolve by turning data into information, knowledge, and wisdom, IoT
has the potential to change the world as we know it today—for the better. How quickly we
get there is up to us.