67% found this document useful (3 votes)
5K views128 pages

IoT Technical Publications

Technical Publications of "Internet of Things"

Uploaded by

Abhinav Saini
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
67% found this document useful (3 votes)
5K views128 pages

IoT Technical Publications

Technical Publications of "Internet of Things"

Uploaded by

Abhinav Saini
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

4 Cloud for loT

Syllabus
OT and clowd. Fog computing, Security in cloud, Case stucy.

Contents
41 Introduction of Cloud Computing

42 Fog Computing
4.3 Security in Cloud

44 Case Study of Adafruit Cloud


4.5 Short Questions and Answers
4.6 Mutiple Choice Questions

(4- 1)
loT and its Applicationss 4-2
Cloud for loT
4.1 Introduction of Cloud Computing
Cloud computing refer to a variety of services available over the Inte
deliver compute functionality on the service provider's infrastructure. Internet hat
Its environment (infrastructure) may actually be hosted on either a grid
or utility
computing environment, but that doesn't matter to a service user.
Cloud computing is a general term used to describe class of network
network base
a new

computing that takes place over the Internet, basically a


step on from Uti
Computing Utlity
I n other words,
this is a collection/group of
integrated and networked hardwa
software and Internet infrastructure (called a vare,
platform).
Cloud computing refers to
applications and services that run on a
distributeded
network using virtualized resources and accessed
and networking standards.
by common Internet protocnle
Fig 4.1.1 shows cloud symbol. It denotes cloud
boundary.

Fig. 4.1.1: Cloud symbol


I T resources include
server, virtual server, storage
services and software device, networking devie
programs.
An
on-premise IT resource can access and interact with a
An cloud-based IT resoure
on-premise IT resource
can be moved to a cloud,
cloud-based IT resource. thereby changing it to d

Cloud Provider : A
person, organization, or
service available interested parties. When
to entity responsible for maa
an
organization is responsible for making assuming the role of cloua
cloud services availabie to
P cloud

consumers, as per agreed


provider have their
upon Service Level Cloud
Agreement (SLA) guarantee
own II resources.

TECHNICAL PUBLICATIONS An up thrust


for knowledge
ts
Applicatlons
4-3
of and Cloud for ioT

loud Consumer: Aperson or organization that maintains a business relationship


hand uses service from, Cloud Providers. The cloud
service consumer to access a cloud service.
consumer uses a doud

Cloud Service Owner The


person or organization that legally owns a doud
serv is called a cloud service owner. The cloud service owner
can be the doud
ronsumer, or the cloud provider that owns the cloud within which
the doud
service resides.

Resource Administrator: Cloud resource administrator is the person or


organization responsible for administering a cloud-based IT resource. The doud
consumer or cloud provider , or even third-party organization could be a doud
resource administrator

4.1.1 Cloud Components


Cloud computing solutions are made up of several elements. Fig. 4.1.1 shows
doud components

Internet

Data centers

Client computers

Distributed servers

Fig.4.1.2: Cloud components


1.
Clients: Mobile, terminals or regular computers
2. less
Benefits : Lower
Lo hardware costs, lower IT costs, security, data security,
PoWer consumption, ease of repair or replacement, less noise.
3. Data centre to subscribe is
itres: Collection of servers where the application
ed. It could be a room in the basement of your
building or a room
full of large
servers on the other side of the world

TECHNICAL PUBLICATIONS- An up thrust for knowledge


loT and its 4-4
Applications
Cloud for l6T
4. Virtualizing servers: Software can be installed allowing multipile
ple instances of
virtual servers to be used and a dozen virtual servers can run on
on one physica
server
5. Distributed servers: Servers don't all have to be housed in the
can be in geographically disparate locations. If something were location. It
one site, causing a failure, the service would still be accessed throPPen a
site. If the cloud needs
happen
through anoth at
er
more hardware, they can add them at anothe er
site.
4.1.2 Cloud Deployment models
.Cloud deployment models are refers to the location and
cloud's infrastructure. management

Deployment models are defined by the ownership and control of


design and the available customization.
architard.
ectural
degree of Cloud
deployment models are
private, public and community clouds.
Fig. 4.1.3 shows cloud deployment model.

Private cloud

Public cloud

Fig. 4.1.3 (a) : Private cloud


1. Public Cloud Fig. 4.1.3 (b): Public cloud
The doud
infrastructure is made available to
group and is owned the general industry

by an organization public or a lag


Public Cloud is a selling cloud services.
The services are
huge data centre that
offers the same
Users

accessible for
everyone
services
and much used for the 0
Examples of public services are co
Public cloud benefits: Facebook, Google and Linkedln
a) Low investment hurdle :
Pay for what
you use.
4 5 Cloud for IoT
Applicetions

is
and
oT

www.e

wwwwR22

Organization 2
Organization 1
cloud
Fig. 4.1.3 (c) : Community
servers.
scale to many
environment for applications that
D) Good test/development
Public cloud risks : Internet.
transfers over the
concerns Multi-tenancy and
ecurity control over data center

negatively to loss of
organization may react
function.
2.Private Cloud It may be
for a single organization.
The O u d infrastructure is operated solely on-premises
or

third party and may exist


or a
E d by the organization
off-premises.
Private cloud benefits: in place.
a) Fewer data center security stays

l
security concerns as existing
rganization retains control over data center.

Private cloud risks: along


with purchases

a) High investmen in private


cloud
implementation,

rdle

ew hard
OT new hardware and software.

PUBLICATIONS An up
thrust forknowedge
cCHNICAL
4-6
Applications
lOT and its
Cloud for IOT
are required; old processes not
b) New operational processes all suitable
private cloud. for
3. Community Cloud
. The cloud infrastructure is shared by several organizations and
and supren
supports a
community that has
shared concerns (e.g. mission,
pecitfic
security requirements, Pecis
policy.
It may be managed by the
compliance considerations).
exist on-premises or off-premises.
organizations or a
thir
third
party and may

4. Hybrid Cloud
. The cloud infrastructure is a composition of two or more cloud
community or public) that remain unique entities but are bound
standardized proprietary technology that enables data and together b
or application
and applica
portability (e.g, cdoud bursting for load-balancing between clouds).
Hybrid cloud benefits
a) Operational flexibility : Run mission critical on private cloud, dev/test on uhlie
cloud
b) Scalability: Run peak and bursty workloads on the public cloud

Hybrid cloud risks:


a) Hybrid douds are still being developed; not many in real use.
b) Control of security between private and public clouds, some of same concems
as in public cloud.

4.1.3 Difference between Public and Private Cloud

Public Cloud Private Cloud


Public cloud infrastructure is offered via Private cloud infrastructure is dedicated to
a

applications and also as web services overweb


Internet to the public. singleorganization.
wwwwwie

Support multiple customer


wiionare
Support dedicated customer
ouonrooinooerol
Full utilized of infrastructure.
wwww Does not utilize shared infrastructure

Security is low as compared to private cloud


High level of security
Lowcost wwww.w.
High cost
Azure, Amazon Web NIRXs

Engine and Force.comServices,


are a few
Google Appp An example of the Private Cloud.is
public clouds examples of one Server with dedicated servers
wwwwww.wiwwwwwww.wwwwwwwwww.w. wwwwwwwa
*****"****"""***
wewwww
its Applicetions 4-7 Cloud for loT
loT and

4.1.4 Cloud Computing Challenges


1. Increased Security Vulnerabilities
2. Reduced Operational Governance Control
3. Limited Portability Between Cloud Providers

4. Multi-Regional Compliance and Legal Issues


Use of cloud for business purpose means that the responsibility over data security
becomes shared with the cloud provider. Organization extends their trust
boundary to cloud consumer to external cloud.

. I tis clear that the security issue has played the most important role in hindering
cloud computing acceptance.
Without doubt, putting your data, running your software on someone else's hard
disk using someone else's CPU appears daunting to many.
Well-known security issues such as data loss, phishing, pose serious threats to
organization's data and software.
Business concerns of cloud computing8
1. Capacity Storage capacity is of the main reasons for
planning : one

organization using cloud. Capacity planning is an unavoidable responsibility


for most IT organizations.
Future demands from business need to be planned for and accommodated. This
an be very challenging because this involves estimating the usage and specially
usage fluctuations over time.
S o there is constant need to balance peak usage requirements without

on-premise IT infrastructure.
unnecessarily over-spending on

2. Cost reduction and operating overhead : For any organization, initial


investment of cloud is huge. The growth of IT environments often corresponds
to the assessment of their maximum usage requirements. This can make the
support of new and expanded business automations an ever-increasing
investment
.Organizational agility : From cloud perspective IT organizations, the IT
resources needs to be more available and/or reliable than previously thought.
T ability for an IT organization to be able to respond to these chang8es
capacity or availability helps to increase an organizational agility.

TECHNICAL PUBLICATIONS An up thrust for knowledge


loT and its 4- 8
Applicetions
Cloud for lOT
4.1.5 Cloud Applications
1. Through cloud cost flexibility, online marketplace gains access to mors
analytics online. Cloud takes away the need to fund the buildine o powerful
installing software or paying dedicated software license fees. hardware,
2. Greater business scalability enables online video retailer to meet mil.

demand: Cloud enables businesses not just


IT operations to
add orsin
computing resources just at the time they're needed. vision
3. Greater market adaptability provides
online entertainment platform
the ahil
reach any type of customer device. A third of the executives we to
surveyed hei
cloud can help them adapt to diverse user groups with a diverse assorh
nent f
devices.
4. Masked complexity enables access to services, no matter how
intricate tho
technology they're built on.
5. With context-driven variability, "intelligent assistants" are possible. "Because of its
expanded computing power and capacity, cloud can store information about user
preferences, which can enable product or service customization," the report states,
6. Ecosystem connectivity enables information exchange across business partners.

4.2 Fog Computing


Edge computing: it is also known as just "edge". It brings processing close to the
data source, and it does not need to be sent to a remote cloud or other centralized
systems for processing. Also called as "mist" computing.
By eliminating the distance and time it takes to send data to centralized sources,
we can improve the speed and performance of data transport, as well as devices
and applications on the edge.
Fog computing is standard that defines how
a
edge computing should work,and
it facilitates the operation of compute, storage and networking services betweet
end devices and cloud computing data centres.
Examples : industrial controllers, switches, routers, embedded server d loT
gateways.

Fog nodes
1. Receive feeds from loT devices using any protocol, in real time.
2. Run loT-enabled applications for real-time control and analytics, with m
response time.
Provide transient storage, often 1-2 hours.

TECHNICAL PUBLICATIONS An up thrust for knowledge


its Applications 4-9 Cloud for loT
loT end

4. Send periodic data summaries to the cloud.


Additionally, many use fog as a jumping-off point for edge computing.
.With edge, compute and storage systems reside at the edge as wel, as close as
possible to the component, device, application or human that produces the data
being processed.
.The purpose is to remove processing latency, because the data needn't be sent
from the edge of the network to a central processing system, then back to the
edge
.The applications for edge make sense: Internet of Things-connected devices are a
clear use for edge computing architecture.
.With remote sensors installed on a machine, component or device, they generate
massive amounts of data.
. I fthat data is sent back across a long network link to be analyzed, logged and
tracked, that takes much more time than if the data is processed at the edge, close
to the source of the data.

. I n essence, fog is the standard, and edge is the concept. Fog enables repeatable
structure in the edge computing concept, so enterprises can push compute out of
centralized systems or clouds for better and more scalable performance.

Characteristics of Fog computing


1. Contextual location awareness and low latency.
2. Graphic distribution
3. Deployment near loT endpoints.
Benefits of Fog Computing:
Greater business agility:them
With the right tools, developers can quickly develop fog
applications and deploy where needed.
Better security : Protect your fog nodes using the same policy, controls, and
procedures you use in other parts of your IT environment. Use the same physical
security and cyber security solutions.
Deeper insights, with privacy control: Analyse sensitive data locally instead o
sending it to the cloud for analysis.
Lower operating expense Conserve network bandwidth
: by processing selected
data locally instead of sending it to the cloud for analysis.

TECHNICAL PUBLICATIONS An up thrust for knowledge


loT and its Applications 4-10

Cloud for l6t


4.3 Security in Cloud
While doud typically means outsourcing some or all of
n
infrastructure, ultimately the organization is responsible for
.Cloud security is more essential than ever as the number of
for infrastnization)
infrastructure
of attact.
attacks increases
rganizations
.Protecting the cloud starts at a secure architecture, which inchu d.
placement and intrusion prevention systems.
.Organizations should practice compliance and due diligence to th.
privacy standards. their counties
Monitoring and visibility into a cloud is key to
detecting attacks in
manner.
timely
Authentication systems can act as the first line of defence to a
potential attac
.
Identity Security End-to-end identity management,
services and identity must become a key element of
third-party authentie-
entication
cloud security. ldem
security keeps the integrity and confidentiality of data and enty
making access readily available to appropriate users. applications whis
Information Security : In the traditional data centre, controls
access to hardware and software and identity controls all physical acess on
combine to protect the
data. In the cloud, that
protective barrier that secures infrastructure is diffused.
Infrastructure Security at the Network Level: When
of infrastructure looking at the network leve
security, it is important to distinguish between
private clouds. With private clouds, there are no new attacks, public
cdouds andi
vulnerabilies, or
changes in risk specific to this topology that information security personnel neu
to consider.

If publiccloud services are chosen,


changing security requirements will
changes to the network topology and the manner in which the existing
nerwo
topology interacts with the cloud provider's network topology should e utaken
into account.

Summary i n cloud computing, it is necessary


hardware, storage security and network
to provide security
security.
4.4 Case Study of Adafruit Cloud
Adafruit Industries is YorkCit
an
open-source hardware company based in a t the maker
The Adafruit cloud, Adafruit
IO, is a cloud service primarily aimea
storing
data

market. Adafruit IO is an useful for


storing
easy-to-use IoT platform that is userul
viewing data, and controlling devices.

TECHNICAL PUBLICATIONS" -An up thrust for knowledge


Applicetions 4-11 Cloud for loT
its
1oTand
is a web-based platform designed to help connect otherwise "dumb"
Adafruit.io
rest of the internet.
devices to the
cloud service built for loT solutions. It interfaces:
Adafruit 10 is a provides two
REST API.
MQTT and
libraries that wrap REST and MQTT APIs.
IO includes client our

are of the Adafruit IO system. The feed holds metadata about the
the core
.Feeds
data you push to Adafruit IO. This includes settings for whether the data is public
license the falls under, and a general
stored data
or private, what sensor

also contains the sensor data values that get


description of the data. The feed
pushed to Adafruit IO from your device.

one feed for each unique source of data you send to the
.You will need to create
have a project with one temperature sensor and two
system. For example, if you
sensors, you would need to create three
feeds. One feed for the
humidity
sensor, and one feed for each humidity sensor.
temperature
.Dashboards allow you to visualize data and control Adafruit 1O connected projects
buttons
Widgets such as charts, sliders, and
are
from any modern web browser.
without the
available to help you quickly get your loT project up and running
need for any custom code.

4.5 Short Questions and Answers


?
Q1 What the essential characteristics of cloud computing
are
on demand self-service,
Ans.: Five essential characteristics of Cloud Computing
are

and Measured service


Broad network access, Resource pooling, Rapid Elasticity

Q,2 Define NIST definition of cloud computing.


model for enabling
Ans.: NIST definition of cloud :Cloud computing is a pay-per-use
access to a shared pool of configurable
available, convenient, on-demand network
servers,services) that can be
storage, applications,
COmputing resources (e.g., networks, service-provider
effort or

aplaly provisioned and released with minimal management


interaction.
Q.3 characteristics of cloud computing as per NIST ?
What are the major
follows:
NIST five essential characteristics of Cloud Computing are as
1. On demand self-service
2. Broad network access
3. Resource pooling

4. Rapid elasticity
5. Measured service

TECHNICAL PUBLICATIONS -An up thrust for knowledge


5 Application Building with loT

Syllabus

Various application ofloT: Food, Healthcare, Lavatory maintenance, Water


Retail, Driver Assistance, Collision impact. quality, Warehouse,

Contents
5.1 loTApplication in Food
5.2 Healthcare Application
53 Lavatory maintenance
5.4 Water Quality
5.5 Warehouse
5.6 Retail
5.7 Driver Assistance

(5 1)
Application
5-2 Building with lo
Applications

its
loT a n d
Food
in

5.1 loT
Application

are
sensitive
to temperature, and thus,
and easonable
beverages temperatures are maintained
ar
food and to
ensure
the
ed atat the
Many conducted
temperature
temperature leu
levels could cause
control
must be
Failure
gulate the right
to regulate
level.
endanger
the public.
appropriate
diseases
that might
food-borme

food, companies
are using mart thermostats
smas

Ostats
to
the issue of unsafe ucts in
products in real-time.
.To eradicate
manutactured
of the e
the temperature
constantly
monitor
means that if the temm
of the
temperature ure of the
monitoring
standard, that product
is rem
removed out of
Real-time

roduct falls
below the set irculation to
guarantee food safety.
with QR codes that customers can
customers

loT systems
are equipped scan to
.Integrated This creates an assurance between the
the consumer
confirm the safety
product. of the
that the food is safe for
consumntion

manufacturing company
and the
requires speed and volume to be
pronktsLt

T h e food manufacturing industry The


tools loT offers will allow machhines
and optimization to
powerful analysis machines.
self-regulate and interact with other

must be parsed and sorted by workers to create actionskl,


Data no longer
insights, but can now be leveraged immediately in production.
like walmart store their products
Major food sellers and distributers in
warehouses. As food demand increases, these companies stock their warehouses

with these food to cater for the increasing demand.


One challenge arises because it is difficult to monitor the movement of each
product in real-time. Keeping of these fast-moving
an inventory products becomes
challenge due to the large size of these warehouses.
To enhance efficiency in inventory management, companies are using
pressure-sensitive sensors to monitor the stock. The sensor sends alerts when ur

stock runs low.


Companies can further integrate artificial intelligence with loT to unaei
consumer
purchasing habits that will facilitate in future planning:
A fully alert
integrated food manufacturing network will reduce downu
workers of
maintenance needs, and provide greater control than ever Over quality
control both in
processing and during packaging and distributing
The food industry requires careful work

profitable. Balancing inventory with monitoring of all systems


and

quality,

demand, istent
maintaining machine conditions are only a few ofensuring m i n i s y s t e m sa n d

processes that must work thousands 1r


perfectly.
Applications 5-3 Application Building with loT
its
loTand

LT data from all these systems can be centralized and put where it's needed to
allow for continuous improvement in food manufacturing.

5.2 Healthcare Application

The World Health Organization (WHO) defines e-Health as E-health is the


transfer of health resources and health care by electronic means. It encompasses
three main areas The delivery of health information, for health professionals and
health consumers, through the internet and telecommunications.
E-health provides a new method for using health resources - such as information,
money, and medicines and in time should help to improve efficient use of these
resources.

. E-Health brings special characteristics. The monitoring device's environment is a


patient; a living and breathing human being. This changes some of the dynamics
of the situation. Human interaction with the device means batteries could be
changed, problems could be called in to technical support and possibly be
resolved over the phone rather than some type of service call. In most cases, the
devices on the patient are mobile not static with regard to location.
.Fig. 5.2.1 shows High Level e-Health ecosystem Architecture.
******

EMR/PMSs ...
*** *******
ww*

************* *******
.
***

******

******* :

***********"*
********************** Device
Specialist gatewa wwww
E-health cloud
*

www.ww

wwwww
*

**x
*wwwww**
ww*

Wellness partners ****** ** *****

Home
Partner monitoring
cloud service/CDS

Fig. 5.2.1: High Level e-Health ecosystem architecture


ne data flow architecture focuses on the source of the data, the destination the
ata and
path the data. The source of the data is typicaly the senisor.
he data can be either locally cached or is sent to the upstream systems without

the sensor. The path taken by the data includes


gin
also cache
some of
a gateway, which can
the data and do distributed processing

TECHNICAL PUBLICATIONS -An up thrust for knowledge


5-4
loT and its Applications Applicetion Buildin
Intermediate hubs can also store and process the data to filter out
r make cert
decisions. A distributed rules engine is used to make distributed decisiea
dosest point of care. This enables data traffic to be filtered ecisionsproceat the
filtered and
efficiently without having every data being processed by the cloud servie
vice

Sink
N WIFi
atatase
Internet

On body sensors

WiFi
Heaith cartte

At home

.The development of wireless networks has led to the emergency of a new type of
e-healthcare system, providing expert-based medical treatment
remotely on time.
.With the e-healthcare system, wearable sensors and
portable wireless
automatically monitor individuals' health status and forward them to thedevices can
hospitals
doctors and related people.
The system offers great conveniences to both
For the
patients
and health care providers.
patients, the foremost
advantage reduce the waiting time of diagnoss
is to
and medical treatment, since
they can deliver the emergent accident information to
their doctors even if
they are far away from the hospital or they don't notce ther
health condition.
In addition, e-health system causes little interruption to
For the health patients' daily activit
care
providers, after receiving the abnormal
signals ro
patients, appropriate treatment can be made, which saves medical resources.
Furthermore, without direct contact with medical or
other patients, the facilities, medical persoul
patients are unlikely to be infected with other
However, to
diseases
ensure the security and privacy of records

encounters a
lot of challenges patients' medical
1. How to achieve the
confidentiality and integrity of patients' informano
2. The security of wireless body area network,
3. The privacy and unlink
ability of patients' health status,
4. The
undeniability and
unlinkability of doctors' treatment,
TECHNICAL PUBLICATIONS" -An up thrust for knewledge
5-5
Application Building with loT
Applications

is
oTand
The location privacy of patients, the fine-grained access control of patients
5.
5.
cal record,
the mutual authentication between
patients and hospitals, etc.
l d be
would be useful to create an up-to-date bibliography on secure e-healthcare
It
systems

5 . 3 Lavatory Maintenance

main function of IoT is to collect data measured by sensors integrated with


A
chort range wireless networks such as bluetooth, zigbee, or Wi-Fi, which again
ransmit data to larger networks such as internet network gateways.

1oT sensors provide low cost, scalable, efficient, low power, and integrated data
through all sub-networks. As more sensors are incorporated and data collection
period increases, the data becomes significantly large and hence the name "big
data"
. Statistics show that a bathroom is one of the most hazardous places. Following
market and we it in bathroom.
sensors are available in
c a n use

1. Leak Detection Sensor: It electronic resistance between two nodes. It


measures
can be installed on a bathroom floor to detect water leakage and flooding
when an injured person is unable to move.
especially
2. Digital Light / Lux Sensor: It measures intensity of light radiation. Light
infrared ray, visible ray, and
sensors detect most spectrum ranges including
and
ultra-violet ray. The s e n s o r can be used to detect human-presence
and identification and frequency of
movement, total time spent in a bathroom,
a person in a bathroom.

3. Voice Detection Sensor: It detects acoustic and


noise signals. It is very useful as
microcontroller
it translate pre-programed messages
can (e.g., Help!) through a
in the case of medical
emergency
magnitude
Pressure Sensor: It detects of contact-pressure. A simple pressure
* of using toilet and bath tub.
A digital
Sensor is able to detect a person's status
that
m o r e precise pressure readings
oad cell sensor is same kind but provides
can be used for weight pattern analysis.
can
It detects tilt, pitch, and inclination. These sensors
ositional Sensor (Gyro): installed objects
locational changes for
DE used to detect falling, tilting, and
Such as bath tub, shower room, and bathroom floor.
in a
bathroom. Mobility
Sensor: It detects movement of people in a
uon and alarm for emergency
nroom can provide pattern of bathroom usage
situation.

knowiedge
TECHNICAL PUBLICATIONS -
An up thrust for
5-6 Application uilding with lot
Applicetions

its
loT e n d ection and measurem
asurement
Water leakage
detection
of water usage
Flow
Sensor:
monitoring
and monitoring health corndi
Water water
s1eh tions,
ns. Unusual
7. data for saving
important
situation such as
uncon:
nsciousness
emergency
are indicate an 0nsciou
plumbing lea
water usage may
shower or
unnoticed
internal
akage.
a
before finishing f key requirements
requirements for
for loT
Sensor: One of key sensors is low
Harvesting maintenance of thoco
those sensors. Energy
8. Energy to minimize
consumption of electronic enero
power
generate
small a m o u n t enough or
for the,
their
energy harvestino
sensors
harvesting
sensor device or adjacent
from the
operation flow.
and hydraulic
pressure,
as sunlight
cleanliness monitoring system
aircraft lavatory
Example loT based after landing and durine
cleaned before take-ott,
The aircraft
lavatories are
require tw ight
Cleanliness Monitoring System,
. we

For Aircraft Lavatory


s e n s o r (MQ-02)
and infrared sensor.
s e n s o r s : gas

cleanliness monitoring system


Fig. 5.3.1 shows lavatory

Data

)
ESP32 Third party
server analytics
Board
WIFil
(Adafruit cloud)
BLE

Negative
F/B using
Gas sensor touch sensor

IR Sensor#1 Aircrafe support staff

IR Sensor#2
Fig. 5.3.1 Lavatory cleanliness monitoring system
eshold
G a s sensor is used to check methane level of lavatory compartment.
methane level for clean lavatory is identified and used as reference.
Ifany
The smell sensor is used to detect the toilet.
any unwanted gases present in
foul smell goes into the sensor, it creates a signal. All the signals are pas
nell and
through the NodeMCU microcontroller where the constraints ot
turbid water are checked.
gases
of
MQ2 gas sensor is an
alcohol gas sensor which can detect the presence

tneuthe
which contain alcohol traces in them. It is made out of tin in Paform o fstanni

oxide. It can detect alcohol, etharnol and


smoke.
IR sensor are used for passenger
feedback: positive feedda
feedback.

TECHNICAL PUBLICATIONS" -

An up thrust for knowieog


Applications
5-7 Applicetion Building with loT
hs
oTand
connected to microcontroller board using wifi and BLE. The
e sensors are

ollected
sensor data is quickly uploaded to the adafruit cloud storage before
at the airports.
and after landing
take-off
between collected real-time sensor data and threshold value
Baced on comparison
cas sensor aircraft support
staff is alerted for cleaning the lavatories. The alert
of
real-time methane level exceeds the threshold value.
is sounded when
5.4 Water Quality
collection of
In conventional systems,
the monitoring process involves the manual
Sample water from various regions, followed by laboratory testing and analysis.
ineffective, as this process is arduous and time-consuming and it
This process is
real-time results.
does not provide
to ensure the safe supply
The of water should be monitored continuously,
quality
.

water bodies and water resources. Hence,


the design and
of water from any
low-cost system for real-time monitorin8 of
water quality using
development of a
is essential.
the Internet of Things (loT)
Internet of Things helps in
water quality in water bodies using
Monitoring
environmental issues and improving the
health and living standards of
combating
all living things.
monitors the quality of water relentlessly with the help of
The proposed system attached in
such The in-built Wi-Fi module is
NodeMCU.
loT devices, as,
transfers the measured data from
NodeMCU which enables internet connectivity
sensors to the Cloud.

Fig. 5.4.1 shows water monitoring system.

Subscnibe Farmer
SPublish
23C

Sensor node
Publish temp 23'C
Publish pH 7.2 Cloud
computing
Publish Na MQTT
broker

Pond Database

Researcher

Data analysis

Fig. 5.4.1 water monitoring system

TECHNICAL PUBLICATIONS -
An up thrust for knowledge
loT and its Applications 5-8
Applicetion Building
with loT
.The system mainly consists of sensor node as publishers, and Rasnk
broker, and mobile client devices as subscribers. The sensor nodes y pi MOTT
are
small embedded devices, LoRa wireless intertace, and water
water quality
quality sensors, built with
water temperature sensor, pH sensor, and salinity sensor.
ie
Water quality sensor: The pH meter is used for the quality check if
if water
for use. is safe

Temperature sensor: A device which gives temperature measurement


electrical signal is called as temperature sensor. This electrical signal will as a
be in the
form of electrical voltage and is proportional to the temperature
measurement
.Water level sensor This sensor will help us decide it we have enough
of water to be An ultrasonic
quanih
supplied. triggered from the sensor and wave is
distance to target is determined by calculating the time required after the echo
returned. The sensor emits a high-frequency pulse, generally in the 20
kHz
200 kHz range, and then listens for the echo.

Sensor node technical specification is listed below:


w wwww.wwwwww.mww w

Microcontroller Arduino MEGA 2560


Wireless Interface LoRa Shield with 915 MHz Antenna
w w w wwwww
SensorsS Water Temperature, Salinity, pH
Battery 12 V 18AH Rechargeable Sealed Lead Acid

Solar Cell 20 WP 12 V
Packet Size 17bytes
Transmission Interval
wwwwww.wwwwww.wwwwwww.wwwwwwwwwwuwwowwowsuw.ooowwwwwwww
60 seconds
www.w www
****wwwwwwwwwwwwwwwwwwwwwwwwwwwww.wwwwwwwwwwwww.ww**

5.5 Warehouse
Today, warehouses are more than storage inventory facilities. and
Many
better
organizations are therefore investing in loT-enabled warehouses 0
(WMS)
Automated Control Systems (ACS) and Warehouse
to improve their
Management systen
operational costs. efficiency by reducing p r o d u c t locations
loT enabled warehouses gives businesses real-time data on proau store
tes
transportation details, packaging, and routing. Due to these instant ensure

managers ensure no inventory is lost during transportation. A


supply chain vendors manage deliveries responsibly. the

.RFID technology enables businesses that


to track goods entera
warehouse in real-timne.

TECHNICAL PUBLICATIONs - An up thrust for knowledge


lOT Cloud aggregates The ERP system queries
User queries inventory data
inventory data loT cloud for the Visual dashboard
from the ERP system
ww.ww. inventory data

Net inventory data ERP system Net inventory data is


Warehouse displayed as a visual
2
incoming inventory dashboard

lOT cloud loT cloud


gathers In - Transit
gathers warehouse
inventory data from inventory data from all
warehouse warehouses

Warehousse Inter warehouse


In Transit inventory
Tir loT cloud
gathers dispatched
inventory data fromm
warehouse
3
Inventory
Class B
and C
Class A Warehouse
outgoing inventory
-
Class: A Inventory is continually
monitored by drone

Fig. 5.1.1
loT and its Applications 5-10
pplication Building with
loT
.Using loT devices in warehouses enables businesses to detect rist
k and avoid
accidents that can create disruptions in the supply chain. loT oid
warehouses can monitor temperature conditions. In addition, data sensors in
vehicles, shipping conveyances and products can be combined
gathered from
to
counterfeiting, theft, and spoilage. duce
Fig. 5.5.1 shows.
1. Real time data received from sensors/beacons ensure that
actual inventom
levels are measured. bry
2. Real-time updates on inventory count,
alerts tor mismatch between
data in ERP and actual inventory in warehouse. inventor
nto

3. Restocking process becomes more efficient and stock out losses are avoided
4. Automated navigation within warehouse
5. End-to-End visibility on inventory

5.6 Retail
5.6.1 Inventory Management
Retail involves the sale of
goods from a single point (malls, markets, department
stores etc) directly to the consumer in small
quantities for his end use.
Retail is a
challenging business but the pressures of
are
resulting in today's economic conditions
evern more selective
The effect of internet of
consumer shopping and spendin8
things on
inventory management is the next huge thing in
progress when it comes to Business Process
In
Management (BPM).
typical business, the process of ordering,
any
good is a day to day storing, tracking and managus
this process
requirement. with all high investmernt top-tier busineb
As
becomes more complex with
demand. increasing amount of Suppy and
nis
process involves huge
transaction of monetary resources and hence "
impervious that a high preference is are
given to this in a BPM. Inventories
mismanaged can create significant o a
financial problems for a business, leadu
inventory shortage.
Existing technologies such as bar
(RFID) alreadylet retailers monitor coding and Radio-Frequeney
their inventories.
loT will enable this to data
be taken to the more

coming in the monitoring systems and next level evel with significantly
signiicanly hain
P p l y chain.

products moving throug

TECHUIdL
its
Applications
5- 11
loT and Application Building with loT
This considerably improve supply chain efficiencies and enable leaner
nventories. retailers such
ventories. Large retail as Walmart
and inventory management.
are
already using IoT for supply chain

Tracking is done using RFID readers attached to the retail store


shelves.
5.6.2 Smart Payments

Smart payment system uses Near Field


Communication (NFC) and bluetooth
communication.

Near Field
Near Field Communication (NFC) technology is a standards-based wireless
communication technology that allows data to be exchanged between devices that
are a few centimeters apart.
. NFC operates at 13.56 MHiz and transfers data at to 424
Kbits/second. up
.NFC is available as standard functionality in many mobile phones and allows
consumers to perform safe contactless transactions, access digital content, and
connect electronic devices simply.
An NFC chip in a mobile device can act as a card or a reader or both, enabling
consumer devices to share information and to make secure payments quickly.
Using smart phone applications, payments can be made using a simple tap or
waving the card within the proximity.
Service providers can integrate payment option into smart phones using an NFC
tag embedded inside the device. Apple pay, google wallet (android pay) and
smsung pay are the most popular among smart phone payment systems.
Data transfer using smart device are possible using NFC technology like android
Deam. Two users can share documents, photos, resumes and business cards by just

waving their smart phone.


S.6.3 Smart Vending Machines
S
vending is about management systems and telemetry tools,
building remote
which transmission and delivery of operational data from
each
egrate monitoring,
vending machine via the Internet.
Smart vending Solution offers its customer's flexible payment options and
onitors the machines and in real time.
remotely
Smart
user
phone
ne applications that communicate with smart vending
machine allow
user
erences to be remembered and learned with time.
For .instance,
"smart" shelves continuously scan items
on shelf innovations like RFID based
theCe,
and notifies the appropriate systems. During low or out of stock

TECHNICAL PUBLICATIONS An up thrust for knowledgge


loT and its Applicetions 5-12
ApplicetionBuilding
with lot
situations they create automatic replenishment alerts and end
directly to central warehouse and to manufacturers. automatic orders
Smart vending Machine provided following
1. Achieve high levels of efficiency in the management of their Ssets;
2. Offers its customer's flexible payment options: RFID/NFC
card
payments; Smartphone payments; Cash; Debit and Credit card: Mobile
3. Monitor the machines remotely and in real time;
4. Simplifies business since the vending machines contain multiple sence that
alert the owners about their location, the state
inventory and einentual
maintenance issues

5.7 Driver Assistance


.At present time, drowsy driving has become one of the major issues of the traffe
collision. According to statistics, a large number of road accidents occur due t
drowsy driving which results in severe injuries and deaths.
Three techniques used to detect the drowsiness of commercial
are
drivers
recognizing the driver's eyes through cameras and using biosignals such a
breathing, temperature, and heart rate to analyze operation patterns, such as the
abnormal of
pedals and steering wheels.
use

The term "drowsy" is


synonymous with sleepy, which simply means an incinaton
to fall
asleep. The stages of sleep can be categorized as awake, Non-Rapid Eye
Movement sleep (NREM), and
Rapid Eye Movement Sleep (REM).
The crashes that occur due to driver drowsiness have a number of characteristUcs
a. Occur late at night (0:00 am-7:00 am) or during mid-afternoon
(2:00 pm-4:00 pm)
b. Involve a
single vehicle running off the road
c. Occur on
high-speed roadways
d. Driver is often alone
e. Driver is often a
young male, 16 to 25 years old
f. No skid marks or indication of braking
is
Applicetions
5-13
loTand Application Building with loT
Drowslness detector algorithm:

1setup a camera that monitors a stream for faces:

2. If a face is found, we
apply facial landmark detection and extract the
eye
regions:

3. Now that have the


we
regions,
eye we can compute the eye aspect ratio to
determine if the eyes are closed

Each
by 6 (x, y)-coordinates, starting at the left-comer of
represented the
Ve i tne
you were looking at the person), and then working clockwise around
Femainder of the
region:

TECHNICAL PUBLICATIONS for knowledge


An up thrust
5-14 wliration B
Applications
oT and ts

PA
po Ps
5.7.1 Eye Aspect Ratio (EAR)
Fig.

EAR
P2-P6 * P3-Ps
2 P1-P4

pó are 2D facial landmark location


Where pl, .
If the eye aspect ratio indicates that the eyes have been dosed for a suificed

amount of time, well sound an alarm to wake up the driver.


long enough

The system analyses the driver's consistency while driving in the form ot vznes

pody movements, posture, steering input given by the driver on a era


interval. Considering these scenarios, the starts system analyzing the
parameters like-speed, weather conditions, humidity, etc.
A that a
camera
is installed
the device is used to repeatedly reconds
in
behavioral landmark and movement of
eves and lips of the driver. Becaue
eye closure period for sleepy drivers are longer than normal eve blinkns

Through that live video streaming, a frame is extracted for mag


Images are captured typically at a fix frame rate of
20fps.
Using the image and annotation data set, the understands the psar**
driver is feeling sleepy by system understands let a

nose,
measuring the coordinates ot the right and
mouth, left and right ear
brow. The human visual
visual content

represents the feature of the scene with few in it.


a valuable information

TECHNIGAL PUR
6 Arduino and Raspberry Pi

Syllabus
Arduino: Architecture, Programming and
Application.
Raspberry Pi: Architecture, Programming andApplication.

Contents
6.1 Arduino Architecture

6.2 Raspbemy Pi

6.3 Raspbery Pi Interface


64 Raspbery Pi with Python Programming
6.5 Short Questions and Answers
6.6 Multiple Choice Questions
6-2 Arduino and
loT and its Applications Raspberry Pi
6 . 1 Arduino Architecture

electronics platform based on easy-to-use hardwa


Arduino is an open-source and
software.
able to read inputs light
on a sensor,
- a finger on a button
Arduino boards are or
and turn it into an output - activating
a motor, turning on an
Twitter message
-

a
online.
LED, publishing something
be powered via the USB connection or with an extemal
nal
T h e Arduino Uno can

source is selected automatically.


power supply. The power
Features
MCU
Support fast computations, ARM based
clock is ATSAMSX8I
AVR micro-controller

is 3.3 Volt
Operating input voltages
It uses EEPROM, SRAM and Flash memory
UART
I t also support USB and

Fig. 6.1.1 shows Arduino board.

O0000000 O0000000
0
21 09 8 7 6 5 43 2 1

Digital

Arduino
USB
http://arduino.berlios.de

8 D1
TIMIUN
Q1

ICSP

IC1

Power Analog in
5V GND 9V 0 1 2 3 4 5

o00
Fig. 6.1.1: Arduino Board

clockwise from the top center,


Starting
Analog
Reference pin (1st pin)

.Digital Ground f o r d i g i t a l1 O

13 (green)
Digital Pins 2 These pins cannot be used ation

Digital Pins 0-1/Serial In/Out - TX/RX: serial


communicatio

and digital Write) if you


are also using
(digital Read
TECHNICAL PUBLICATIONS An up thrust for knowledge
Applications
6-3
andits Arduino and Raspbemy Pi
oT

Reset Button S 1

In-circuit Serial Programme

ln Pins 0
-
5
Analog
Ground Pins
Power and
External Power Supply In (9-12VDC) X1
Toggle External Power and USB Power (place jumper on two pins closest to
desired supply)
-
SV1 (purple)
.USB

Digital Pins
In addition to the specific functions listed below, the digital pins on an Arduino
board can be used for general purpose input and output via the pinMode()
digitalRead(), and digitalWrite( ) commands.
Each pin has an internal pull-up resistor which can be turned on and off using
digitalWrite( ), when the pin is configured as an input. The maximum current per

pin is 40 mA.
(TX) TTL serial data.
Serial: 0 (RX) and1 (TX). Used to receive (RX) and transmit
connected to the corresponding pins of
On the Arduino Diecimila, these pins are

BT, they are connected to the


the FIDI USB-to-TTL Serial chip. On the Arduino
WT11 Bluetooth module. On
the Arduino Mini and
corresponding pins of the
module
with an external TTL serial
LlyP'ad Arduino, they are intended for use
(eg. the Mini-USB Adapter).
can be configured
to trigger an interrupt
Interrupts: 2 and 3. These pins
External
in value. See the
falling edge, or a change
alow value, a rising or

attachInterrupt() function for details.


the analogWrite)
Provide 8-bit PWM output with
3 , 5 , 6, 9, 10, and 11. is available on pins 9,
only
function. On boards with a n ATmega8, PWM output
On.On
10, and 11. bluetooth
the reset line of the
Connected to
ESet : 7. (Arduino BT-only)
module.
13 (SCK). These pins
support sPi
SPI 10 (SS), 11 (MOSI), 12 (MISO),
the underlying
hardware, is not

communication, which, although provided by


uFTently included in the Arduino language. built-in LED
connected to

LED 13. On LilyPad, there


is a is LOW,
and
the the pn
digit .
ne
hi
Diecimila

When the pin is HIGH Diecimua1CH


value,
value, the LED
the
is on,
when

it's off.
Analog Pins
listed below, the analog innu+
I n addition to the specific functions ns support
10-bit analog-to-digital conversion (ADC) using the analogRead() function.

Most of the analog inputs can also be used as digital pins: analoe in ut as
digital pin 14 through analog input
5 as digital pin 19.
Analog inputs' 7
the Mini and BT) cannot be used as digital pins.
(present on

12C: 4 (SDA) and 5 (SCL). Support 12C (TWI) communication.

Power Pins
VIN (sometimes labelled "9 V"). The input voltage to the Arduino board when ie.
it's
using an external power source.

You can supply voltage through this pin, Or, if supplying voltage via the power
jack, access it through this pin. Note that different boards accept different input
voltages ranges, please see the documentation for your board. Also note that the
LilyPad has no VIN pin and accepts only a regulated input.
5 V: The regulated power supply used to power the microcontroller and other
components on the board. This can come either from VIN via an on-board
regulator, or be supplied by USB or another regulated5 V supply.
3V3: (Diecimila-only) A 3.3 volt supply generated by the on-board FTDI chip.
.GND: Ground pins.
Other Pins
AREF: Reference voltage for the analog inputs. Not currently supported by the
Arduino software.
Reset Bringthis line LOW to reset the microcontroller.
reset button to shields which block
Typically used to add a
the one on the board.
I t has 14 digital
6 analog
input/output pins (of which 6 can be used as PWM outpu
inputs, 16 MHz crystal oscillator, a USB connection, a
a an

ICSP header, and a reset button. power


The board operate on an external supply of 6 to 20 volts. It
can es

than 7 V, however, the 5 V suPpue


pin may supply less than five volts and tne may

be unstable. If using more than 12 and

V, the voltage regulator may ov


damage the board. The recommended range is 7 to 12 volts.
Arduino Uno R3 Programming
The
The
programming of
Arduino Uno R3 can be done using IDE sorwthat
an
microcontroller on the board will come with pre-burned by a boot loader
permits to upload fresh code without using g r a m m e r .

an exterior hardware pro


TECHNICAL PUBLICATIONS
An up thrust for knowledge
Applicetions
6- 5 Arduino and RaspbemryP
i's
oTand
ommunication of this can be done using a protocol like STK500.
can also upload the program in the microcontroller by avoiding the boot
We ca
loader using the header like the In-Circuit Serial Programming.

6.2 Raspberry Pi

Raspberry Pi is a credit card-sized computer originally designed for education,


the 1981 BBC Micro.
inspired by
Creator Eben Upton's goal was to create a low-cost device that would improve

programming skills and hardware understanding at the pre-university level.


.The Raspberry Pi is slower than a modern laptop or desktop but is still a complete

Linux computer and


can provide all the expected abilities that implies, at a

low-power consumption level.

Versions RemarkS
anno n *********** *****************************************

Raspberry Pi 1 The original Raspberry Pi had 256 Mb of RAM, which increased to 512 MB

in a later revision.
.It has a 26-way GPIO connector --

Pi Zero .The Pi Zero includes the GPIO connector, but the header pins are not

soldered *** ******

Raspberry Pi2.The Raspberry Pi 2 swapped the single-core processor for a much faster

quad-core processor and increased the memory to 1GB RAM

to an even more powerful 64-bit


T h e Raspberry Pi 3 changes the processor
processor.
needed to be added as a
It also adds Wi-Fi and bluetooth which previously
USB device.
launched in February 2016.
The Raspberry Pi 3 Model B was

SD card needs to be prepared with the Linux


10get the Raspberry Pi working an

operating system installed.


this
y i users have made many creative and impressive projects usin8
network by
can also be programmed to assist in housekeeping' your
functioning as NAS, LDAP server, web server, media server, DNS
server etc.

The which will


nil ry i Foundation recommends Python. Any language
Pi: CC
e for ARMv6 can be used, Installed by default on the Raspberry
Java, Scratch and
Ruby.

ECHNICAL PUBLICATIONS An up thrust for knowledge


6-6 Arduino
loT and its Applicetions
Raspbemy Pi
6.2.1 About the Board

6.2.1 shows the Raspberry Pi board. The Raspberry Pi does n a s


ot have a
Fig.
separate CPU, RAM or GPU.
Instead they are
squeezed
all squeezed into one
one
component
called a system on Chip or SoC unit.
JTAG
RCA headers
VIDEO
OUT
GPIO
AUDIO Status LEDs
OUT
headers

DSI display
connector

SD card slot
(back of board) USB 2.0

Micro USB power Broadcom ETHERNET OUT


(5V 1ADC) BCM 2835 onily on 256 MB models
ARM11 700 MHz
CSI connector
camera

HDMI OUT
Fig. 6.2.1 (a) : Raspberry Pi circuit board
USB
LEDs

RCA vide0 Audio. LAN


:

****

GPIO 512 MB RAM


CPU and GPU
H HDM
igitjiniafititjipirtaferj
igtjirjaitasipaiojiajti giq4tj
SD card
Power

Fig. 6.2.1 (b): Block diagram


TECHNICAL PUBLICATIONS" - An up thrust for knowledge
Applications
6-7 Arduino and Raspbemy Pi
its
oTand
PPi
Raspberry i is open hardware with the exception of its primary chip, the
omm
SoC
Broadcomm SoC which runs the main
components of the board - CPU, graphics,
USB controller etc.
memory,
Pi Models share the
All of these Raspberry following features:
Operating systems: Raspbian RaspBMC, Arch Linux, Rise Os, OpenELEC Pidora
HDMI Composite RCA
2. Video output:
SupDorted resolutiorns 640x350 to 1920x1200, including 1080p, PAL and NTSC
standards

Power source : Micro USB


4.

Components ** ***************************************** ** ****


Description
Processor Raspberry Pi uses an ARM processor which is also installed in a wide
variety of mobile phones.
. This CPU is single core, however it does have a co-processor to perform
floating point calculations *************************** **:************ *

Memory Model B Raspberry Pi has 512 MB SDRAM (Synchronous Dynamic RAM)


It store programs that are currently being run in the CPU
USB ports Board has two USB ports. USB port can provide a current upto 100 mA
Using powered hub, it is possible to connect more devices *****************************

HDMI High Definition Multimedia Interface (HDMI) supports high-quality digital


Output video & audio through a single cable.
It is also possible to connect a computer monitor with a DVI connection to
HDMI using a cornverter.
Composite l t support composite video output with RCA jack and also support PAL and
Video
Output NTSC.
The TVDAC pin can be used to output composite video.
Audio
Output Audio output jack is 3.5 mm.

This jack is used for providing audio output to old television along with the
RCA jack for video
GPIO Pins Both models have a total of 26 GPIO pins, organized into one pin header,

named the P1 header


GPIO pins ina
he newer Raspberry Pi (model B revision 2) adds 8 more

v04004tindiei irsoitivoiididroi onew


initeeo pin header called P5
**********wwwww.w.wwwwwww.eredtNiwwwwwviwvwewevwmwnivemwwwwwwww.wwwwwwwwwwwwwwwww.w.ww.w.wwww

*********wwwwwwwweenwwwwwwwwwwwwwww******
www.wwwwww

TECHNICAL PUBLICATIONS-An up thrust for knowledge


loT and its Applications 6-8
Arduino and
www T*w nmoovenog spbemy Pi
Not all the GPIO pins are programmable. Some of them are 5.0 Vme
ord 3
VDC positive power pins, some of them are negative ground pins a n
of them are marked DNC (do not connect). nd a few
The P1 header has 17 programmable pins and the P5 header adds 4m
ore.
Fig 6.2.2 shows GPIO pin header.
Reading from various environmerntal sensors. Writing output to dc mn
dc motors,
LEDs for status. * * ********* **"* ***** **** * ****** "**** ******ieisuenaee.....

Fower Input Micro-USB connector is used for power input


Status LED. It has five status LED
CSI .Camera Serial Interface (CSI)can be used t0 Connect a camera module toto
Raspberry
ww.wxwwwwwwwwww.e
wwww
Pi wwww

SD Card Slot This card is used for loading operating System


wwwwwwww.wwwwwwwwwwwww.wwwww.wwwwwww.wwwww.w.wwww..w.wwwwwwwwwww.wR wwwwaim niimimmnmnimmnnwwwwwww

The Raspberry Pi comes with aset of 26 exposed vertical pins on the board. These
pins are a General Purpose Input /Output interface that is purposely not linked to
any specific native function on the Raspberry Pi board.

Raspberry Pi P1 head
PIN# Name Name PIN#
3.3VDC powersooe
OON5.0 VDC power
8 SDAO(2C) OO DNC
9 SCLO120) OO 0V (Ground)
7 GPIO7 TxD
DNC RxD 16
0 GPIo0 OO5 GPI01
2 GPIO2
889888998geogg
OO DNC
3 GPI0 3 O GPI04
DNC OO GPIO5
12 MOSI O 8 DNC
13 MIS0 O ON GPIO6
14 SCLK OO | CEO 10

DNC
& CE 11

Fig. 6.2.2 GPIO pin header


APplications

is
IoT and 6-9
ino and Raspbem
ad.
ea the GPIO pins are there
exXplicitly for the end
har access directly to the
board for the user to have low-level
eDeripherals, LCD display
screens and
purposes of
attaching other hardware
other hardware devices
The Status LEDs to the Pi.
Status Color
LED Functions
ACT Green Lights when the SD card is
accessed (marked OK on earlier boards)
PWR Red Hooked up to 3.3 V
power
FDX Green On ifnetwork adapter is full duplex
INK Green Network activity light
100 Yellow On if the network connection is 100
a v w wwwwwwww
Mbps
.The Raspberry Pi draws its power from a
microUSB
requires port and a
microUSB-to-AC adapter. Because the Pi is a micro
computer and not simply a cell
phone getting a battery topped off, you need to use a high
stable power delivery that
quality charger with
provides a cornsistent 5 V with at least 700 mA
minimum output for older model units and 2.5 A for the Pi 3.

6.2.2 Linux on Raspberry Pi


There several unix like operating systems for the RPI and there is
are
an operating
system called RISC OS that has its
origin at the developers of the first ARM chips.
e Kaspberry Pi Foundation recommends the use of the following Linux

Distributions
1. Debian7
2. Raspbian
3. Arch Linux ARM 4. QtonPi

Plan 1s free operating system based


a on Debian optimized for the Raspberry
Pi (RPT) hardware.

shown in
eault command prompt on the Pi consists of four components
Fig. 6.2.3.
Raspbian is e desired operating system for the Raspberry Pi. In order tob
do you
b and install the operating system onto our Raspberry 1
Rasp
pDlan, Win32Disklmager and USB memory card reader

knowledge
TECHNICAL PUBLICATIONS -
An up thrust for
loT end its Applicetions 6- 10 Arduino and
taspbery P
and
1. Download both Raspbian
somewhere
Win32Disklmager and save
Working
easily accessible username directory
2. Plug the USB memory card reader into
pi@raspberrypi
your computer
3. Open Win32DiskImager hostname type
after
4. Find the location of the image file and this
the memory card

5. Click Write" Fig. 6.2.3: Command prompt


Logging In

.Now it is time to turn on our Raspberry Pi. When the memory card, HDMI lead
ead,
Ethernet cable, mouse and keyboard are plugged in, plug in the power lead.

As soon as you do this. You screen should be black and filled with white textt
This will be visible every time you turn on your raspberry pi.

Wait until your screen reads "raspberrypi login :"


Username = pi [ENTER

Password = raspberry [ENTER

Bcbian M/Limx uhcczy/sid raspbcrrypi tty1

aspberrypi login: pi
Passunrd
ast lugin: Tue Auy 21 21:24:59 EDT 2012 un tty1
Linux raspberrypi 3,1.9* 1168 PREEMPT Sat Jul 14 18:56:31 BST 2012 arnuél

The prograns inciuded uith the Debian GNU/LinmIx systen are free softuare
he exact distribut ion terns for each proyran are described in the
ind iuidua files in /usr/share/doc/w/copyright

Debian GHIL inux c s uith ABSIANTELY NO WARRANTY, to the exteut


Ber'mitled by appl icable lau

Fype startx' to launch a graphical sess ion

pieraspberrmpi ,$

Starting the Raspbian GUI


It is the
GUI stands for Graphical User Interface and is a type of operating systentpeople to
most common type of user interface as it is a very friendly' way tore
icons and poi
interact with the computer. It makes use of pictures, graphics,
hence the name 'Graphical> User Interface. Fig. 6.2.4 shows Rasbian Lnu
Applications
loT and its 6-11
Arduino and
1. Type the line: "start" Rasphery Pi

Fig. 6.2.4 Rasbian Linus desktop


Raspicouf i

adruatf Inforetion abont thi


Expand ruot partition tu
Change overstan fili
canf igsrekeiyoard Set keyboard
changepass laycat
Change passuord fur i
changeluca ie Set loca le
hametimezni Set timezuue
separysplit Change nenory split
0uerciock
ssh Coufiyure ourclockim
Etiable disable sh erver
or
bont behauiur Start desktop n ht?
upda tr Try tu upyradr raspi conf ig

CSelect

Fig. 6.2.5 First boot time to configure your Pi

2.3 Difference between


Raspberry Pi is and Desktop Computers
n
Raspberry Pi, operating
system is installed on SD card whereas in desktop
computer, operating system is installed in hard disk.
Kaspberry Pi does not have their own CPU and RAM.
rOcessing power of Raspberry Pi is less compared to desktop computers.
as

Kaspberry Pi uses less power than desktop computers

TECHNICAL PUBLICATIONs"- An up thrustfor knowiedge


lOT and its Applications 6-12 Arduino and
aspbemy P
6.3 Raspberry Pi Interface
Three types of interface is supported by Raspberry Pi.

1. Serial
serial peripherals for serial communication.
It uses
.Transmit (Tx) and Receive (Rx) pin is used for serial communication.

2. Serial Peripheral Interface (SPI)


SPI is a communication protocol used to transfer data between micro-cOmnt
like the Raspberry Pi and peripheral devices. These peripheral devices maputers
either sensors or actuators.
SPI uses4 separate connections to communicate with the target device. These
connections are the serial clock (CLK), Master Input Slave Output
(MISO), Master
Output Slave Input (MOSI) and Chip Select (CS).
The clock pin sense pulses at a
regular frequency, the speed at which the
Raspberry Pi and SPI device agree to transfer data to each other.
For the ADC, clock pulses sampled their
are on
rising edge, on the transition from
low to high.
The MISO pin is a data pin used for the master to receive data from the ADC.
Data is read from the bus after every clock
pulse.
The MOSI pin sends data from the
Raspberry Pi to the ADC. The ADC will take
the value of the bus on the rising edge of the clock. This means the
value must be
set before the clock is
pulsed.
The Chip Select line chooses which
particular SPI device is in use. If there are
multiple SPI devices, they can all share the same CLK, MOSI, and MISO.
The SPI has the following features
1. 16-bit shift register
2. 16-bit Receive buffer register (SPIBUF) and 16-bit Receive buffer emulation alias

register (SPIEMU)
3. 16-bit Transmit data register (SPIDATO) and 16-bit Transmit data and rr
selection register (SPIDAT1)
4. 8-bit baud clock generator
5. Serial clock (SPICLK) I/O pin
6. Slave in, master out (SPISIMO) I/Opin
7. Slave out, master in (SPISOM1) V0 pin

TECHNICAL PUBLICATIONS An up thrust for knowledge


its
Applications 6-13 Arduino and Raspberry Pi
oTand
8.Multiple slave chip select (SPISCS[nl) I/O pins (4 pin mode only)
clock frequency
9 Programmable SPI range
10.Programmable character length (2 to 16 bits)

11. Programmable
clock phase (delay or no delay)
clock polarity (high or low)
12. Programmable
13.Interupt capability
14.DMA support (read/Write synchronization events)
15. Up to 66 MHz operation

Master-slave configuration of SPI


Fig. 6.3.1 shows SPI system. SPI bus is composed by four signals, namely the
Master Out Slave In (MOSI), Master In Slave Out (MISO), serial clock (SCK) and
active low slave select ( \SS).
MOSI This pin is used to transmit data out of the SPI module when it is
configured as a Master and receive data when it is configured as Slave.
MISO:This pin is used to transmit data out of the SPI module when it is
configured as a Slave and receive data when it is configured as Master.
/SS: This pin is used to output the select signal from the SPI module to another
with which data transfer is to take place when its oconfigured
pempheral a
Master and its used as an input to receive the slave select signal when the SPI is
as a

Configured as Slave.
SCLK: This pin is used to output the cdock with respect to which the SPI transfers
data or receive clock in case of Slave.

SCLK
MOSI
SPI Master MISO SPI Slave
SS

Flg.6.3.1: SPI
SCK master device will generate a pulse and the data will be synchronized in both
14ster
E r and slave devices. There are four different clock types to define sP
C,depending
hese
on what the SCK polarity and phase may be. It must ensure
signals between the master and slave devices compatible with each other.

TECHNICAL PUBLICATIONS An up thrust for knowledge


Arduino and Raspbe
6-14 Pi
loT and its Applicetions
signal 1s provided by the ma
master to
The clock
SPI is a Synchronous protocol. controls when data can chanon
The clock signal and
provide synchronization.
when it is valid for reading.
devices. Data leaving the master exits On
the
between two
SPI creates a data loop the m a s t e r enters on the serial
line. Data entering ta
SDO (serial data output)
input, SDI line.
It controls when and ho..
the master device. ow
A clock (SCK), is generated by
between the two devices.
quickly data is exchanged
master device to control when particular slave is being addrescad
a
S S allows a
more than one slave and simplifies the
This allows the possibility of having
slave device, only that slave is
communications. the SS
When goes low at a
signal
accessed by SPI
lines (CS), Serial Data In (SDD
For SPI, thereSerial Clocks (SCLK), Chip Select
are
one master, there number of slaves
and Serial Data Out( SDO). There is only
on the number of chip
select lines of the master.
depends
Synchronous operation, latch on rising or falling edge of clock, SDI on rising edge,
SDO on falling edge. It operates in 1 to 2 MHz range.

Master sends out clocks and chip selects. Activates the slaves it wants to
communicate with.

Fig. 6.3.2 master with multiple slave interface.

Master Slave 1 Slave 2

MOSI

MISO
Clock

SS

Fig. 6.3.2 Multiple slave interface


When
S P I data transmit and data receive nts of
the SPI.
register are the main elements gister are
rred
transferre

the communication takes


place the data on the transmit regis
into the shift register.

TECHNNICAL DUDI IATI hruat for kaowledge


its
Applicetions
6-15
loTand Arduino and Raspberry Pi

The shift register in the master of width (8,16,32) and the


shift register in the slave
linked by
linked MOSI and MISO pins to form a
by MOSI
distributed 16,32,64 bit register
respectively.
Ahen the data transter operation needs to be
serially shifted eight, sixteen, thirty-two bit
are
performed these
16,32,64- bit
egisters positions
lock generated by the master so that the data can be exchanged by
the serial
between the
master and the selected slave.
. Data on the master SPI data transmit register becomes the input data for the slave
read from the MOSI and the data read from the master SPI data receive register
was the data send from the slave from MISso.
Data on the shift registers are transferred into data receive register when the
transfer completes and this data may be read from the data receive register any
time before next transfer has completed.

. P Cis a communication protocol that the Raspberry Pi can use to speak to other
embedded devices (temperature sensors, displays, accelerometers, etc).
between microcontrollers and
.1cis a useful bus that allows data exchange
peripherals with a minimum of wiring.
ICis a two wire bus, the connections are called SDA (Serial Data) and SCL (Serial

Clock). EachIC bus has one or more masters ( Raspberry Pi) and one or more

slave devices, like the I/O Expander.


need
data and clock lines are shared between multiple slaves, we
AS the same
communicate with.
SOme way to choose which device to

64 Raspberry Pi with Python Programming


whose behavior
is a generic pin on a chip
Eeral
Purpose Input/Output (GPIO) has a number of
the at run time. The GPIO connector
be controlled by user

different types of connection:


E GPIO pins that you can use to turn LEDs on and off etc.
two
2. hardware modules with just
ertace pins that allow you to connect
control pins. different
a
3. SPI interfac 12C but uses
similar concept to
errace with SPI devices, a

standard.
4 Serial Rx and Tx pins for communication with serial peripherals.

An yp thrust for knowledge


TECHNICAL PUBLICATIONS"-
6- 16
Arduino and Rasp
arry Pi
loT and its Applicetions

Pi
Controlling
LED with Raspberry
6.4.1 Pi. The LED will initiall.
LED to Kaspberry ly
.Fig 6.4.1
shows diagram of connecting at power-on.
are initialized
as inputs
the GPIO pins
be off because
A library that will let us control the GPIO n s.
.Install Python 2 library Rpi.GPIO.
Install commands:

sudo aptget update


install python?dev
sudo apt?get
sudo apt?get install python?rpi.gpio

ast
1NNTHI

CSttCAMERA

GPIO 27

GPIO17

GPIO 4

Fig.6.4.1: Dlagram of connecting LED to Raspberry Pi

TECHNICAL PUBLICATIONS -

An up thrust for knowledge


6-17
Tand
i sA p p l i c a t i o n s Arduino and Raspberry Pi

Circuit
.Simple LED C ir is shows be

GPIO pin-
Vcc 3.3 V-
Anode 200 22
2002
Cathode

GPIO pin-

(a) (b) (c)

Fig. 6.4.2

.Current flows from the anode (+) to cathode (). Anode is longer pin and cathode
is shorter pin.
software and create a New file. Save it
.Open up IDLE, the Python programming
as led.py and input
the code from the code listing. What the code does is first tell
connect to the GPIO pins, by
Pythonto use the GPIO module so w e carn
importing the module.
between commands.
We then import the time module so w e can create a delay
number they are on the board
We then tell the code to treat the GPIO pins as the
and to turm the seventh pin into an output.
and off. Once it's
between True and False so that it turns the pin o n
We alternate Done' into IDLE and finally
turn off
cycled a few times, it will print the message
the GPIO pins.

Pin 10.. 6 Common anode


3,8
A
C
DP
B A
D DP 10
Pin 1 ..5

Fig. 6.4.3

BLICATIONS"- An up thrust for knowledge


TECHNICA
loT and its Applicetions 6-18
Arduino and Rasp

Import RPi.GPIO as GPIO


Import time

GPIO.setmode(GPIO.BOARD)

GPIO.setup(7, GPIO.OUT)

GPIO.output{7,True)
time.sleep(1)
GPIO.output(7,False)
time.sleep(1)
GPIO.output(7,True)
time.sleep(1)
GPIO.output(7,False)
print'Done"
GPIO.cleanup0
Task 1 Turn LED for 2 seconds and off for 1 second,
on
loop forever. Code is given
below
(In this example, we use diagram (b), i.e. controlling the LED by controlling the
voltage at the anode (+)).
import RPi.GPIO as GPIO
import time
def main( ):
GPIO.cleanup()
GPIO.setmode(GPIO.BOARD) # to use Raspberry Pi board pin numbers
GPIO.setup(11, GPIO.OUT) # set up GPIO output channel
while True
GPIO.output(11, GPIO.LOW) # set RPi board pin 11 low. Tun off LED.

time.sleep()
LED.
GPIO.output(11, GPIO.HIGH) # set RPi board pin 11 high. Turn on

time.sleep(2)
main( ) lay
Example: Display digit on 7-segment LED. It is most direct way tocontro
1. Connect
pin 3/8 of 7-seg-LED to Vcc

TECHNICAL PUBLICATIONSAn up thrust for knowledge


6-19 Arduino and Raspbery Pi
oTandhsAPplcations

8 pins to 8 GPIO pins


2 Connect the other
nedt the
pins as out
the88 GPIO pins
GPIO
Configure

3. display "2". Tun on segments A, B, D, E, G and turn off segments


F o r example

B, D, E, G to LOW and set C, F, DP to HIGH. Set Pin 7, 6, 2, 1,


CF
DP..Set A,
and Set pin 4, 9, 5 HIGH
10 LOW
an LED and Switch with Raspberry Pi
Interfacing
not pushed: GPIo detects Vcc (HIGH)
.When the switch is
GPIO detects GND (LOWN
When the switch is pushed :
Sample Code
GPIO Input
RPLGPIO as GPIO
import
numbers from the ribbon cable board
#Use the pin
GPIOsetmode (GPIO.BCM
#Set up this pin as input.

GPIOsetup (17, GPIO.IN)


#Check the value of the input pin

GPIOinput (17)
"true".
# Hold down the button, run the command again. The output should be

GPIOinput(17
Vcc 3.3 V

GPIO input 10 k2
pin

pull up resistor

Fig. 6.4.4

64.3 Interfacing Light Sensor


other devices the Raspberry Pi does not have any
analogue inputs.
A me and low levels or read
hi"ts GPIO pins are digital. They can output high
hgh and low levels.
or
sensors that act LDRs (Light Dependent
as variable resistor such as
a
Resisto solution. It allows
(temperature sensors) there is simple
a
Or thermistors

TECHNICAL PUBLICATIONS An up thrust for knowledge


6- 20 Arduino and
lOT and its Applicetions Raspbery P
you to measure a number of levels using a single GPIO pin. In the ase of a light

to measure different light levels.


sensor this allows you

Fig 6.4.5 shows diagram of connecting an LDR to Raspberry Pi.

DS (DI5PL AY

v4swwoIso

ETHERNE

USB 2x

***** ******

Fig. 6.4.5: Diagram of connecting an LDR to Raspberry Pi

Following are steps:


1. First connect pin number 1 (3v3) to the positive rail on the breadboard.
2. Next connect pin number 6 (ground)
to the ground rail on the breadboara.
3. Now place the LDR sensor onto the board and have wire go from
a one
the positive rail.

4. On the other side of the LDR sensor place a wire leading back to the Raspbery
Pi. Hook this to pin number 7.
board.
5. Finally place the capacitor from the wire to the negative rail on the Dica
Make sure you have the negative
pin of the capacitor in the negative ra

TECHNICAL PUBLICATIONS An up thrust for knowledge


6-21
Applicetions

and its
oT
Arduinoand
6.4.6 shows circuit
Raspberry Pi
Fig. diagram for above configuration.
of events
sequence
The
the GPIO pin as an
1. Set
output and set it Low. This
3.3V (Pin 1)
discharges any charge in the
2.2 k
R1
capacitor and ensures that
both sides of the capacitoor
are 0 V. LDR
2. Set the GPIO pin as an GPIO
input. This starts a flow of C1
current through the resistors 14F GND (Pin 6
and through the capacitor to
ground. The voltage acro Fig. 6.4.6: Circuit diagram for LDR
the capacitor starts to rise. The
time it takes is
LDR. proportional to the resistance of the
3. Monitor the GPIO pin and read its
value. Increment counter while we wait.
a
4. At some
pointthe capacitor
voltage will increase enough to be considered
High by the GPIO pin as a

level seen
(approx 2v). The time taken is proportional to the light
by the LDR.
.Setthe GPIO pin as an
output and repeat the process as
required.
Python Code
#l/usT/local/bin/python
#Read an
analogue sensor with a single GPIO pin
import RPiGPIO
# Tell
as GPIO, time
the GPIO
library to use
#Broadcom GPIO references
GPIOsetmfurnctis
Define ode(GPIO.BCM)
nction
def RCtime (PiPin):to easure charge time

measurement =0
# Discharge capacitor

GPIO.setup(PIPin, GPIO.OUT)
GPIO.output(PiPin, GPIO.LOW)
TECHNICAL PUBLICATIONS- An up thrust for knowledge
Arduino
loT and its Applicetions
6-22
Raspbery
time.sleep(0.1)
GPIOsetup(PiPin, GPIO.IN)
acro0Ss
#Count loops until voltage
GPIO
#capacitor reads high on

== GPIO.LOW):
while (GPIO.input(PiPin)

measurement += 1

return measurement

# Main program loop


while True:
# Measure timing using GPI04
print RCtime(4)

6.5 Short Questions and Answers


Q.1 What is Raspberry Pi?
Ans.: Raspberry Pi is a low-cost, credit card-sized computer that connects toa

computer monitor or TV using HDMI and uses a standard keyboard and mouse. It can
Ost of operating systems, such as Raspbian, Android, Windows 10, IoT Core,

etc.

Q.2 What are the different raspberry Pi model types ?

Ans. The Raspberry Pi models of two


are
types
1. Model A (introduced later hardware-reduced model)
as a

2. Model B (introduced first and is the full hardware


model)
Q.3 What is Arduino ?

Ans.:Arduino is an open-source electronics platform based on easy-to-use harawe


on a
and software. Arduino boards are able to read sensor, a finger
inputs light on a sensor, u ing on
button or a twisster message and turn it into an output activating a motor,
an LED, publishing something online.
Q4 Explain difference between Model A and Model B of Raspberry .
Ans.

Parameters Model A Model B


GPU type VideoCore IV VideoCore IV
USB port
Memory
ww.wwwn
256 MB 512 MB
wwwww..wwwwwwwww
wwwww.

eiwwwwwwwwwiwwwwwwww.www.ovvvvwwwwwwwvevevwe wwww

TECHNICAL PUBLICATIONS- An up thrust for knowiedg


6-23 Arduino and Raspbery Pi
oTendi sApplications

Ethernet port
No Ethernet port 10/100Ethernet
Broadcom BCM2837BO Broadcom BCM2837B0
SoC Type
Number of Cores
4

It is hardware-reduced It is fuil hardware model.


Type model.

is Python
?
What
a5 language with integrated
an object-oriented,
high-level programming
APythonis for web and app development.
dynamic semantics primarily
features of Python.
explain
List and
Q6
Ans.: F e a t u r e s :

and minimalistic language


1. Python is a simple
Learn
2 Easy to
Source
3. Free and Open as well as object-oriented
programming
procedure-oriented
4 Python supports
programming
Standard Library is huge indeed
5. Extensive Libraries
The Python to give
within your C/C+
programs
You can embed Python
6. Embeddable users.
for your program's
SCripting capabilities
7 List the benefits of Python.
Ans.
Python can be used to develop prototypes. than massive languages
environment

m o r e productive
coding
ython allows for
a
framework.
like C# and Java. web application
source

complete and open


y n o n powers Django, a
Python.
platforms rely
on
data
Most data mining and big modularity
utomation, program
which encourages
packages,
yt p p o r t s modules
and
an
and code reuse.
Q8 What is GND in GPIO ? numbers 6, 9, 14, 20,
are physical
Ans.: GND means G r o u n d GPIO pins
g r o u n d pins.
25, 30, 34an
30, 34 and 39.
Q9
Define Raspberry Pi hardware.
GPU,
RAM and USB port.
processor,
i n c l u d e s ARM
hardware

thaust for knowledge


7 lOT Security

Syllabus
Various security issues and need, architecture, requirement, challenges and algorithms

Contents
7.1 Various Security Issues and Need
7.2 Security Architecture
7.3 Secuity Requirement
7.4 Challenges
7.5 Short Questions and Answers

(7-1)
7-2 oSecunty
Applications
loT and its
Issues
and Need
Security obiects and

of connected
Various
7.1 refers to a concept
thes of
evices of
Internet of Things
(loT) wireless. The popularity of loT or
Internet
.The
over the Internet
wired o r
these technologies are used stor
all types rapidly, as
increased and busineee
education, and
has transportation,
transportation,
of Things communication,

including
purposes,

development. and the lack of device update


have
not changing passwords
.Theunconscious use, risks and access to malicious applications to the loT
increased cybersecurity
systems sensitive data.
consider loT as the vulnerable point f
professionals
Most of the security and policies. Even though several
due to weak security protocols
cyber-attacks from cyber-attacks,
were developed to protect lol devices
mechanisms
security documented.
are not appropriately
security guidelines
in industrial applications and for multiple
devices have been used
lOT enabled these businesses to attain a competitive edge
business purposes. The apps help
over their competitors.
excessive adoption of various smart devices with data
However, due to the
breach becomes a significant concern
sharing and integration, the privacy and data and network
of work, activities,
to most businesses, as it interrupts the flow
services.

loT system functionalities


time to time in microprocessor firmware.
1. Security patch must be upload
2. Monitor the access and usage of public network.
3. User authentication is necessary.
trol
4.Only after authentication can the controller direct commands for things co
that are present in the system.
The Internet of Things (loT) has become a ubiquitous term to describe tne
to
billions of devices that have sensing or actuation capabilities and are conne
each other via the Internet.

Risks
nd smart home

The IoT includes everything from wearable fitness bands and


mobiles automobiles.

appliances to factory control devices, medical devices and eve a*


Security has not been a high priority for these devices until now.
b e e s t a b l i s h e d .

can be
The security of the Internet of
Things, the following principles e

TECHNICAL PUBLICATIONS An up thrust for knowledge


Applicetions 7-3 loT Secuity
loT and its

a)ldentity: Trust is always tied to an identity. Therefore every device needs a


unique identity that can't be changed. The device must also be able to prove its
identity at all times.
b) Positive intention : The device and linked service have positive intentions.
Predictability and transparency: The functional scope of the service provided
by devices is known to its full extent. There are no undocumented (secret)
functions. The behaviour of the system can be checked at any time by
independent third parties.
d) Reputation: An increasing number of positive interactions between the things
gradually form a reputation based intelligent network.
7.2 Security Architecture

.Fig. 7.2.1 shows loT security architecture. (See Fig. 7.2.1 on next page.)
IoT systems are often highly complex, requiring end-to-end security solutions that
span cloud and connectivity layers, and support resource-constrained loT devices
that often aren't powerful enough to support traditional security solutions.
Application layer support user services. This layer helps users access IoT through
the interface using PC, mobile equipment etc. This layer also support secure
communication protocol and authentication protocols.
Network layer support wired and wireless communication protocol and
technology. This layer is responsible for dependable broadcast of data and
information from the below layer.
Sensors are the monitors that pick up data and relay it for further analysis.
Actuators are devices that act as robotic controls. Many IoT attacks have used
actuators, such as printers, as launch points into a business's network.
of the
An IoT security architecture is a blueprint that illustrates all components
lOT infrastructure for all IoT projects and details how to secure each component.

In both cases, it is imperative to ensure device access is controlled via settable


passwords, encrypt any data stored locally and monitor and contain any
executable code run by the device.
Fhysical layer gathers all types of information with the help of physical
equipment. loT devices face many threats, including malicious data that can be
sent over authenticated connections, exploiting vulnerabilities and/or

misconfigurations.
Such attacks frequently exploit many weaknesses, including but not limited to

a) Failure to use code signature verification and secure boot,


D Poorly implemented verification models which can be bypassed.
TECHNICAL PUBLICATIONS An up thrust for knowledge
loT and its Applications 7-4
loT
Security
Smart business, smart e-health, End device/user
smart e-city, smart e-learning authentication protocols,
secure communication
Application layer protocols

2G, 3G, Wi-fi, CDMA, GSM Cryptographic protocol for


data at cloudigrid,IPSec
Wired Wireless protocol for communication,
Network laver Intrusion detection
mechanism, firewalls

Various sensors, RFID readers,


cameras Software based
cryptographic protocols
for data security
Physical layer

Fig. 7.2.1
Attackers often use those weaknesses to
install backdoors, sniffers, data
software, file transfer capabilities to extract collection
and sometimes even sensitive information from the system,
Command & Control
system behaviour. (C&C) infrastructure to manipulate
7.3 Security Requirement
The key requirements for any loT
security solution are :
1. Device and data
and
security, including authentication of devices and confidentauy
integrity of data.
2.
Implementing and running security
3. Meeting operations at loT scale.
compliance requirements and
4.
Meeting performance requirements as requests.
per the use case.
Application layer: Verification and user's
Support layer: Various encryption confidentiality
.Network layer: Distributed algorithms
denial of service attackk
Physical layer: Authentication.

TECHNICAL PUBLICATIONS An up thrust for knewledge


lOT and its Applications 7-5 loT Security

7.4 Challenges
The security challenges are as follows:
a. Devices are not reachable : Most of the time a device is not connected.
b. Devices can be lost and stolen : Makes security difficult when the device is not
connected.

c Devices are not crypto-engines : Strong security difficult without processing


power.

d. Devices have finite life: Credentials need to be tied to lifetime.


e. Devices are transportable : Will cross borders.
IOT system has a cloud database that is connected to all your devices. These
devices are connected to the internet and it could be accessed by the
cybercriminals and hackers. As the number of connected devices increases, chances
for hackers to breach the security system gets increased.

7.5 Short Questions and Answers


Q.1 What is senseloT ?
Ans.: SenseloT is a great sensor data storage platform. With senseloT you can easily
store the data from your sensors and devices safely and securely.

Q,2 What do you mean by risk in loT ?


Ans.: The loT includes everything from wearable fitness bands and smart homne
appliances to factory control devices, medical devices and even automobiles. loT
devices allow hackers to produce physical effects.
Q.3 What risks do insecure loT devices bring to privacy and security ?
Ans.
Using insecure loT devices increases the risks of personal data being
exposed/stolen and privacy compromised :
A smart camera using default username and password combination can be used
tO SPY on you or be compromised to send junk information to the Internet.

A wearable smart device that sends health information over un-enrypted


channels can expose
personal data.
A smart home device like a television that lacks sufficient updates can de

vulnerable to new attacks and be used to share private data.

TECHNICAL PUBLICATIONS - An up thrust for knowledge

You might also like