Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Different applications and security concerns in Iot by Jatin Akad
1. Guided By: Submitted By:
Mr. Mahesh Meena Jatin Akad
Assistant Professor EE 8th semester
Dept. of Electrical Engineering PCE/EE/14/090
DEPARTMENT OF ELECTRICAL ENGINEERING
POORNIMA COLLEGE OF ENGINEERING
ISI 06, RIICO INSTITUTIONALAREA
JAIPUR- 302022
(Session 2017-18)
A
Seminar Presentation
On
“DIFFERENT APPLICATIONS AND SECURITY
CONCERNS IN IoT”
1.
2. About the paper
Introduction
Why IoT?
How IoT works?
Advantage
Applications
Challenges Faced by IoT
Solution to the Challenges
The Future of IoT
References
CONTENTS
2.
3. The number of devices that are connected to the Internet is significantly increased as
expected where more than 50 billion devices are to be connected to the Internet by 2020.
Internet of Things (IoT) is a state-of-the-art field that is affecting every aspect of human
life. Variant types of standalone and embedded hardware are becoming the dominant
components in what is known as “things”. Therefore, the Internet is moving toward the
“Internet of things, (IoT)”. This paper presents a overview about some different
application of internet of things in our day-to-day life and about the security concerns
related to the internet of things.
ABOUT THE PAPER
3.
4. INTRODUCTION
• The term “Internet of Things” (IoT), was first proposed in 1999 by Kevin Ashton at
Massachusetts Institute of Technology.
• The Internet of Things (IoT) is the network of physical objects or "things" embedded
with electronics, software, sensors, and network connectivity, which enables these
objects to collect and exchange data.
• IoT allows objects to be sensed and controlled remotely across existing network
infrastructure, creating opportunities for more direct integration between the physical
world and computer-based systems, and resulting in improved efficiency, accuracy
and economic benefit.
6.
5. CONTINUE…….
• So, Internet of Things (IoT) is associate degree rising conception which can
interconnect billions of devices (such as smartphones, sensors and alternative
networking devices), to speak with one another. Due to open and heterogeneous
nature of these networks, they are highly prone to vulnerable attacks. So privacy and
security is the biggest concern in this technology.
7.
6. Why IoT ?
• Dynamic control of industry and daily life.
• Improves the resource utilization ratio.
• Integrating human society and physical systems.
• Flexible configuration.
• Acts as technology integrator.
• Universal inter-networking.
7. How IoT Works?
Internet of Things is not the result of a single novel technology; instead, several
complementary technical developments provide capabilities that taken together help to
bridge the gap between the virtual and physical world.
These capabilities include:
• Communication and cooperation
• Addressability
• Identification
• Sensing
• Actuation
• Embedded information processing
• Localization
• User interfaces 8.
10. APPLICATIONS
• Building and Home automation
• Manufacturing
• Medical and Healthcare systems
• Waste Management System
• Environmental monitoring
• Infrastructure management
• Energy management
• Transportation
• Better quality of life for elderly
14.
11. Challenges faced by IoT
At present IoT is faced with many challenges, like -
• Scalability
• Security
• Technical requirements
• Technological standardization
• Software complexity
15.
12. Solutions to the challenges
Several solutions are proposed to overcome the problems. Some of them are -
• Overcoming compatibility issues is a significant IoT hurdle, but emerging companies
are starting to enable increased interoperability through open-source development.
• Governments and industry bodies need to set standards and regulations for the
various industries to ensure that data is not misused.
• IoT needs strong authentication methods, encrypted data and a platform that can
track irregularities on a network.
14. REFERENCES
[1] Jatinder Singh, Thomas Pasquier, Jean Bacon, Hajoon Ko, David Eyers,” Twenty
Security Considerations for Cloud-supported Internet of Things” IEEE Internet of things
Journal, Vol 3,No 3, June 2016.
[2] Geetha, S. "Social internet of things." World Scientific News 41 (2016):76.
[3]Jorge Granjal, ,”Security for the Internet of Things: A Survey of Existing Protocols
and Open Research Issues”, Univ. of Coimbra, Coimbra, Portugal,09 January 2015.
[4] X. L. D. a. Li, Shancang and S. Zhao, “The internet of things: a survey,” Information
Systems Frontiers, vol. 17, no. 2, pp. 243–259, April 2015.
16.