Upload
others
View
9
Download
0
Embed Size (px)
Citation preview
UNIT-1
Q1. Define IOT. (WINTER 2017) (SUMMER 2018) Discuss various application areas of
IoT. (SUMMER 2017) (WINTER 2018) (SUMMER 2019)
IoT Definition:
The internet of things, or IoT, is a system of interrelated computing devices, mechanical and
digital machines, objects or people that are provided with unique identifiers (UIDs) and the
ability to transfer data over a network without requiring human-to-human or human-to-
computer interaction. [1]
Application Areas of IoT:
● Following are the major application areas identified by IERC (Internet of Things
European Research Cluster): 1. Health
2. Transport
3. Energy
4. Security
5. Communications
6. Infotainment
So, In general the areas of Application include Transportation, Building, City, Lifestyle,
Retail, Agriculture, Factory, Supply chain, Emergency, Health care, User interaction, Culture
and Tourism, Environment and Energy.
The table represents Application matrix of Society Needs vs. market segments. This matrix
also includes various applications and services domains.
Areas (Domains) Applications
Cities Smart Parking, Structural Health, Noise Urban
Maps, Traffic Congestion, Smart Lightning,
Waste Management, Intelligent Transportation
System
Environment Forest Fire Detection, Air Pollution, Landslide
and Avalanche Prevention, Earthquake Early
Detection
Water Water Quality, Water Leakage, River Floods
Energy Smart
Grid, Smart
Metering
Smart Grid, Tank Level, Photovoltaic
Installation, Water Flow, Silos Stock Calculation
Security &
Emergencies
Perimeter Access Control, Liquid Presence,
Radiation Levels, Explosive and Hazardous
Gases
Retail Supply Chain Control, NFC Payment, Intelligent
Shopping Applications, Smart Product
Management
Logistics Quality of Shipment Conditions, Item Location,
Storage Incompatibility Detection, Fleet Tracking
Industrial Control M2M Applications, Indoor Air Quality,
Temperature Monitoring, Ozone Presence,
Indoor Location, Vehicle Auto-Diagnosis
Agriculture Wine Quality Enhancing, Green Houses, Golf
Courses, Meteorological Station Network,
Compost
Animal Farming Offspring care, Animal Tracking, Toxic Gas
Levels
Domestic &
Home
Automation
Energy and water use, Remote Control
Appliances, Intrusion Detection System, Art and
Goods Preservation
E-Health Fall Detection, Medical Fridges, Sportsmen Care,
Patients Surveillance, Ultraviolet Radiation
Q2. Explain time for convergence for IoT. (WINTER 2017) (SUMMER 2019)
Due to Internet of Things evolution, so many ―Coherence Horizons‖ have been emerged in
IoT community.
● Out of those horizons, following are the important horizons are going to be
Foundation and A Step Forward to IoT:
1. Coherence of object capabilities and behaviour:
In IoT, there will be huge variety in Objects in terms of
1. Sensing
2. Actuation
3. Information Processing Functionality
4. Time of Existence
By having these properties, objects will gain more ―intelligence‖ and autonomous
behaviour.
2. Coherence of application interactivity:
IoT applications will become complex and modularised. Boundaries between
Applications and Services will be blurred as currently used fixed programme
suites will become dynamic and will become learning application packages.
3. Coherence of corresponding technology approaches:
Various areas like Smart Cities, Cloud Computing, Future Internet, Robotics etc. will
have their own evolution but due to high potential ecosystem of Iot, they will
partially merge with IoT.
4. Coherence of real and virtual worlds:
Today, real and virtual worlds are two opposite concepts. Reason behind the fast
growth of Virtual worlds are large amount of stored data, well establishing
networks and high information processing capacities. Both virtual and real
world both are complementary and evolutionary parts of human evolution
which will lead to new era of living world.
For IoT, these coherences are the major factors for the time for convergence.
Q3. Explain issues of IOT. (WINTER 2017) (WINTER 2018)
Following are the major issues in IoT:
● Device Naming and Organization:
- To identify each device, naming is necessary. By naming each devices, we can
create a well-organized IoT infrastructure. For naming and making IoT system
well organized, we can use well known system like DNS (Domain Name
System).
● Device Connectivity/Communication:
- After resolving naming issue, next issue will be the way devices are going to
communicate with each other or the way they are going to be connected.
- It‘s important to check for the devices that whether they are involved in
providing any kind of service or not. For those devices which are providing
any type of service, naming should be done. For those devices which are not
providing any service, we can ignore naming for such devices.
- In such cases, one can use manufacturer‘s cloud based servers for
communication. E.g. We can use thermostat using a mobile application. In this
case, thermostat and mobile application is not going to communicate directly
as thermostat is not providing any service (hence naming for thermostat is not
required). So here, both thermostat and mobile application both will
communicate independently through cloud server.
● Device Tracking and Monitoring:
- Now days, billions of devices are used in multiple areas in different domains.
Devices are more than a simple device for advanced usage. Examples:
wearable‘s, implants, cars, and flying devices like drones etc.
- In advanced usage, every device is connected to the internet. Hence it‘s the
major issue to track and monitor such devices. Tracking and monitoring is also
an important issue in cases like hijacks or outages.
- While tracking and monitoring these billions of devices, privacy issues also
need high attention.
● Performance Measurement and Optimization:
- Along with the drastic increment in number of connected devices, the amount
of data sent by these devices also increases.
- By producing high amount of data, these connected devices will become a
stress on network. Due to which device manufacturers and consumers both are
going to face the issue to measure the performance of their devices and get the
best performance. On other side, device manufacturers will have to focus on
making their devices more optimized in such stressful network.
● Security and Privacy:
- By involving every devices/things in IoT, somehow we are going to connect
them to the internet. Due to which possibilities of threats and attacks will also
increase. This will lead to the issues like security and privacy.
- To address this issue, we need such a system using which we can identify that
when any security incident is occurring.
- Big Data tools can be helpful to get alerts when attacks are potentially
happening or are in progress.
- Monitoring systems are also required to ensure that threats are addressed in
real time.
- Development of such tools and systems still need more attention.
● Maintenance:
- Day by day, more and more number of devices will be added to the internet.
This flood in internet with internet enabled devices will create difficulties in
order to maintain them.
- By considering future technology, the devices which are designed as per
current technology requirements, need to get updated w.r.t. software and
hardware to make them compatible with future technology.
- Maintenance will be more crucial for those devices which are not getting
updated or maintained and are going to be used with future technologies.
Other key issues:
● Compatibility and Longevity
● Standards for IoT and M2M Solutions
● Intelligent Analysis and Actions
● Regulatory Standards
Q4. Explain security, privacy and trust in IoT Data Platforms for smart cities.
(SUMMER 2017) (WINTER 2018)
TRUST FOR IoT:
● There is a need of such a trust framework which enable the user of that system to have
confidence that they can rely upon the information and services being exchanged. ● Framework needs to convey trust to humans and needs to be robust enough to be used
by machines without denial of service. ● The development of trust frameworks that address this requirement will require
advances in areas such as:
- Lightweight Public Key Infrastructures (PKI)
- Lightweight Key Management System
- Quality of Information
- Decentralised and self-configuring systems
- Novel methods for assessing trust in people, devices and data, beyond reputation
systems
- Assurance methods for trusted platforms including hardware, software, protocols,
etc.
- Access Control to prevent data breaches.
SECURITY FOR IoT:
● As IoT becomes an important part of future internet and national/international
infrastructures, the need to provide proper security to such infrastructures becomes
even more important. ● IoT applications and services are having more vulnerability of attacks and information
theft. ● Requirements to make IoT more secure are as below:
- For Internet, DoS/DDOS attacks are already well understood. But for IoT, we
require specific techniques and mechanisms to ensure that transport, energy, city
infrastructures cannot be disabled or subverted. - General attack detection and recovery/resilience
- Cyber situation awareness tools/techniques
- Variety of access control and associated accounting schemes to support the
various authorisation and usage models that are required by users. - The IoT needs to handle virtually all modes of operation by itself without relying
on human control.
PRIVACY FOR IoT:
● All the information in IoT may have the personal data. Therefore there is a
requirement of requirement to support anonymity and restrictive handling of personal
information. ● There are many areas where advances are required:
- Cryptographic techniques
- Techniques to support Privacy
- Fine-grain and self-configuring access control mechanism ● There are so many issues are arising for the privacy of IoT devices where research is
required like - Preserving location privacy
- Prevention of personal information inference
- Keeping information as local as possible - Use of soft identities
Q5. Define IOT. Explain reasons to converge the technologies and shift to IOT.
(WINTER 2017)
The internet of things, or IoT, is a system of interrelated computing devices, mechanical and
digital machines, objects, animals or people that are provided with unique identifiers (UIDs)
and the ability to transfer data over a network without requiring human-to-human or human-
to-computer interaction. [1]
Reasons to converge the technologies and shift to IoT:
● Growth of many advanced technologies like communications, sensors,
nanoelectronics, smart phones, software, cloud networking, network virtualization and
embedded systems will be play an important role to provide variety of capabilities to
things to be connected all the time - everywhere. ● Innovations in IoT product are bridging the gap between two separate technologies.
For example, technologies such as embedded system or cyber-physical systems form
the edges of the ―Internet of Things‖ bridging the gap between cyber space and the
physical world of real ―things‖.
It will be helpful and important to achieve IoT vision and becoming the part of bigger
systems in the world of ―systems of system‖. ● Example of Technology Convergence is presented in below figure:
Figure: Technology Convergence [3]
● In the field of IoT, many smart applications are being developed to support various
Key Enabling Technologies like:
Micro and Nano electronics, Nanotechnologies, Photonics, Advanced materials,
Biotechnology, Advanced manufacturing Systems. ● Various smart things are used in all the Key Enablers. For the unique identification of
those smart things, we can use IPV6 addressing using which we can enable them for
communicating all across the world. ● Due to high requirement of smart things, sensors and high mobile data traffic, Wifi
and Baseband communications are also going to converge via 3G, LTE etc.
Q6. Explain research directions of IOT. (WINTER 2017)
● Self-Manageable IoT Systems are the major concern of Research directions of IoT.
● For IoT, it may be necessary to have the knowledge base and results of fundamental
research from various domains like software engineering, control theory, artificial
intelligence, embedded systems, biological systems etc.
This knowledge references can be helpful to make IoT system robust and reliable. ● To encourage the interaction level between experts in those domains,
multidisciplinary conferences and workshops should be organised. ● New protocols, algorithms, methodologies, technologies etc. should be developed by
considering the IoT characteristics like: distributed and real-time data handling,
lossy/ unpredicted/ dynamic environment, resource constraints, real time decision
making etc. ● From very initial stages of implementations of IoT systems, all the self-managed
issues should be taken into consideration. Stages include developing concepts,
deployment of devices, various services of IoT and IoT infrastructure. ● IoT software modules should have self-awareness property. ● IoT Hardware should be designed in such a way that user can reconfigurable as per
the requirement. ● Devices should either be able to provide management data to autonomic managers, or
to have embedded intelligence to reason and act locally. ● IoT devices should have embedded intelligence to a particular reason and
functionality to act at local level. Or Autonomic managers should get the management
data from various devices. ● There should be automated tools for all three important phases of IoT devices i.e.
1. Development
2. Deployment and
3. Supervision ● For the validation of research as well as theoretical results, there should be well
defined prototypes at the initial stages itself. ● For interoperability in IoT, well defined interfaces should be there as IoT is made of
heterogeneous networks. ● A model-driven approach should be adopted not only for design and development of
IoT solutions but also during run-time and deployment to achieve the properties like
robustness, correctness, reliability etc. to make IoT solutions self-adaptation. ● Many stakeholders like manufacturers, users, service providers, integrators, telecom
operators, etc. will be included in IoT systems so that sufficient weightage and
importance should be given for resource sharing and policy conflict resolution
between various actors. ● For self-aware applications, new programming standards should be introduced so that
applications can have self-adaptivity. ● Sufficient importance should also be given to Security and Privacy with two reasons:
1) IoT solutions are dealing with sensitive data like business data, personal data etc.
2) IoT solutions are also powerful and capable enough to control physical
environment due to its advanced features and functionalities.
● With drastic increase in growth of IoT Technology, IoT needs to be highly scalable.
For that, research should be done to integrate various global resources with IPv6. ● For making objects smart, enough research is required as many components like CPU,
memory, energy unit, sensors and actuators etc. need to be added into a small tiny
chips. ● Self-management systems should be designed with particular attention in contexts
where the safety of the user can be impacted (e.g., driving cars). ● For designing of self-management or autonomous systems, enough importance should
be given as safety and security of users is very important (e.g. driving cars). ● In some cases, various approaches to prevent safety related risks should be embedded
in the system itself in case of any system break down or malfunction of the
autonomous/self-management system.
Q7. Explain smart parking IOT application using figure. (WINTER 2017) (WINTER
2019)
● In Smart Parking, IoT can be used for monitoring of parking spaces availability in the
city.
Figure: Block Diagram of Smart Parking System [2]
● Above diagram represents the block Diagram of Smart Parking System in the city. ● For detecting availability of parking, we can use Ultrasonic sensors which will be
deployed in the parking areas. ● As a controller we can use either Raspberry Pi or the combination of Arduino and
Raspberry Pi. ● Raspberry Pi will receive sensed data from Ultrasonic sensors and send it to cloud. ● From cloud server, any user can access the availability of the parking through Mobile
or Web Applications. ● Hence, using such Smart Parking System user can access the availability of parking
slots anywhere anytime using internet enabled mobile or web application.
Q8. Explain smart home IOT application using figure. (WINTER 2017) (WINTER
2018) (WINTER 2019)
Figure: Platform for Smart Home [3]
● In Smart Home, IoT can be used for following home appliances:
Thermostat, Air Conditioner, Stove, Water Heater, Irrigation Control, Washer/Dryer,
EV Charger etc. ● In IoT, various sensors are embedded in these appliances as per the requirement. ● These home appliances can be accessed via Wi-Fi or Bluetooth and can be connected
to Home IP network. ● For remote access, these devices can be connected to a single or multiple controllers.
Mobile phones need to be connected to such controller for accessing all the
appliances. ● All the sensed data can be shared to the Cloud Server via Gateway using HTTP, TLS,
Bonjour etc. ● User can access all the home appliances using various UI (User Interface) rich mobile
applications such as Kinoma, Siri, Android, HTML5 etc. which can be installed in
Tablets and Smartphones. ● User can get alerts and notification in his/her mobile device and can access whenever
needed via various mobile applications. ● User can also store all the usage data of various home appliances in cloud server for
data analytics which can be useful for Management, Diagnostics, Usage Advice and
Dashboard.
Q9. Explain e-Health IOT applications. (WINTER 2017)
or
Discuss smart health using IoT. (SUMMER 2018)
In e-Health, IoT can be applied in the following areas:
● Fall Detection:
For elderly or disabled people, using IoT, we can provide assistance to them so that
they do not need to reply on others and can live independent life.
● Medical Fridges:
Medical Fridges are used to store various vaccines, medicines and organic elements.
IoT can be used to control the conditions inside freezers depending on the nature of
stored items.
● Sportsmen Care:
In case of sportsmen care, performance can be monitored using various wearable
smart devices for analysing the performance of sportsmen. Various smart devices can
also be deployed in the centres and fields to measure important readings related to
sports. At the end, sportsmen can match the expectations and can analyse the
performance.
● Patients Surveillance:
For patient surveillance, various vital signs are measured to check and assess the
clinical condition of the hospitalized patients. Many vital signs like blood pressure
(BP), blood oxygen saturation, heart rate (HR), core temperature etc. are regularly
monitored by nurses.
Using advanced medical devices, important parameters like Early Warning Score
(EWS) and Modified Early Warning Score (MEWS) can be detected efficiently which
reduce the unnecessary admissions of patients into the ICU. These parameters are also
useful for detecting physiological changes and identifying the patients at risk.
● Ultraviolet Radiation:
By measuring UV Radiation from Sun, people can be warned not to be exposed in
certain time or hours in advance.
Q10. What is IoT? (SUMMER 2018)
IoT Definition:
The internet of things, or IoT, is a system of interrelated computing devices, mechanical and
digital machines, objects, animals or people that are provided with unique identifiers (UIDs)
and the ability to transfer data over a network without requiring human-to-human or human-
to-computer interaction. [1]
List and Explain Major Components forming IoT
● In IoT, there are four major important components as below:
1. Sensors
2. Controller
3. Actuators
4. Internet ● Sensors are the devices which sense various entities exist in surrounding like light,
temperature, humidity, motion etc. Main task of sensors is to sense the entity and send
to the controller. ● Controllers are the devices which contains many components such as processor, USB
port, Ethernet port, Wi-Fi module etc. based on its architecture. Example of
controllers: Raspberry Pi, Arduino UNO etc. Task of the controller is to receive the
data from the sensors, process the data and sending instructions to actuators as per the
requirement. It‘s also used to control locally connected devices. It can also be
considered as the medium between things and internet. ● Actuators are the devices which act according to its functionality and embedded
programmed functions into those actuators. Actuators generally receives the
instructions from controllers. ● Internet enable all the things to connect and communicate within the same domain or
other domains. ● Combination of all four components are widely used in IoT. ● The aim of IoT is to connect all the devices to the internet and provide smartness to
the respective areas. ● Various smart environments and applications are mentioned in below figure:
Figure: Internet of Things in the context of smart environments and applications [4]
Q11. Discuss in detail Smart City application of IoT. (SUMMER 2018) (SUMMER
2019)
● Following figure is the best suitable example for Smart City application of IoT which
represents A Day in the Life of a citizen of a Smart City.
Figure: day in the life of a typical European citizen of a smart city. [5]
● Following are the applications where IoT plays the major role.
● Smart Health:
- Many mobile applications related to health suggest the best healthy food according
to the diet plan and can be automatically ordered and delivered as per the plan and
schedule. - Such Health Applications also suggest food places for lunch or dinner according
to the behaviour and preference of user.
● Smart Home:
- Smart home contains many smart home appliances which are having various
required sensors and are also connected to the internet. User can access such home
appliances through smartphones and mobile applications via internet. Following are
the examples of internet enabled devices used in IoT: Smart Washing Machines,
Refrigerators, AC, Fans, Lights etc.
- User can also analyse the power/energy consumption and production at home.
- User can also provide access to the home remotely whenever user is unavailable
and some trusted person needs to visit the home. So remote access to home is also
one of the important part of smart home.
● Smart Transport: - Deployment of sensors on the road network can resolve many issues in the city.
- In smart transportation, user can avoid traffic jam by analysing the traffic
conditions through mobile applications which provide the live traffic feeds. - User can also reserve the parking slot in advance using such mobile applications
which can be considered as a part of Smart Parking.
- On road side area, the lights can be included in IoT so that it can be turned ON-
OFF as per the requirement and hence we can save the electricity.
● Smart Shopping: - As a part of IoT, various clothing etc. brands can send suggestion notification or
attractive offers whenever users are passing nearby to the shop area or in search
for the item of his/her interest.
UNIT 2
Q12: List Key Application Areas of M2M
● Security: Security system, surveillance system, device security, data preserving. ● Payment methods: Payment gateways, POS (Point of Sales) ● Health: Remote diagnosis, telematics, Remote monitoring. ● Metering Service: Water, Electricity, Cab, Energy, etc. ● Remote Access/Control/Maintenance: Various Sensors, Vehicles traffic, lifts &
Elevators, etc. ● Manufacturing Services: Automation, M2M, etc.
Q13 Define M2M and Explain M2M Value chains (SUMMER 2018)
Machine-to-Machine (M2M) refers to networking to machines (or devices) for the purpose of
remote monitoring and data exchange. [1]
M2M Value chains:
Fig: M2M Value Chains
• Input: Inputs are the base raw ingredients that are turned into a product.
• Production: Production refers to a process that the raw inputs are put through to become a
part of the value chain.
• Processing: Processing refers to the process whereby a product is prepared for sale.
• Packaging: Packaging refers to the process whereby a product can be branded as would be
recognizable to consumers.
• Distribution: This process refers to the channels to market for products.
Q14 List and Explain Various important feature of M2M
M2M refers to networking of various different types of devices for different applications such
as data exchange, consumer services, etc. Keeping this in mind, below mentioned are the
desired features of M2M communication systems.
1. Time Telerancy: These systems should be designed keeping in mind that data transfer
may take long time intervals.
2. Low Mobility: M2M unlike IOT devices are less Mobile. Hence, they have low
mobility.
3. Scheduled: Data Sending/Receiving is pre-scheduled and happens with permission.
4. Low on power consumption: In order to efficiency of M2M application, it is a desired
feature.
5. Packet Switched: M2M device should provide packet switching services.
M2M solution includes various applications and areas. These solutions provide better
productivity, efficiency, security at reduce costs. M2M is applied at several places to create
location specific triggers as well.
Q15 Compare M2M with IoT (WINTER 2019) (WINTER 2018)
Machine to machine (M2M) is a broad label that can be used to describe any technology that
enables networked devices to exchange information and perform actions without the manual
assistance of humans.
Primarily M2M and IoT are similar in an upper layer such as hardware, networking or
devices. But they differ in system architecture, types of applications and underlying
Technologies.
Domain IOT M2M
Application
IoT data can be stored over cloud
hence can be used for analytics
applications, remote diagnosis etc.
M2M data is more preferably stored in
point solutions and can be accessed
locally. Hence used for on-premise
solutions and local diagnosis.
Multiple Application – Multiple
Devices Single Application – Single Device
Innovation Driven Point problem driven
Protocols
IoT & M2M differ in
communication protocols and
machines communicate. In IoT,
they focus on protocols above
network Layer
e.g. HTTP, COAP, DDS etc.
M2M uses proprietary and non-IP based
communication protocols
e.g. Zigbee, Bluetooth, Modbus, IEEE
802.15.4
Hardware
IoT is more focused on sensors
and interfacing. Various
components of IoT systems are
sensors, internet, and Networking
Infrastructure.
M2M is typically more emphasized on
embedded Hardware.
Business
B2B, B2C B2B
It is participatory and community
driven Closed Business Operation
Machines
vs Things
The things in IoT refers to objects
which are uniquely identifiable
and can sense data
In contrast, M2M has homogeneous
machines within the network.
Q16 Explain IoT Value Chains with suitable figure. (WINTER 2017) (SUMMER 2018)
(WINTER 2018) (SUMMER 2019) (WINTER 2019)
Value chain of Internet of Things:
The IoT value chain explains the building blocks of IoT, how value is created, who they
players are, and how they interact with each other to deliver value.
Input/Hardware Layer: Looking at the IoT value chain as a pyramid, at the bottom layer is all
the connected devices: phones, fitness bands, connected cars, smart homes, and other devices
on the consumer side; in industry, you have things like building sensors, smart cities, and
connected factories, for example.
Network Layer: Stepping up a level from the base brings in the network and connectivity—
how devices are connected and communicate. It‘s also where service providers collect device
and network data and upload it to the cloud.
Processing or Platform Layer: In this stage, the data from various inputs from production
stage are combined together to create information.
Packaging: After the data from various inputs have been combined, the packaging component
in the value chain creates information components. These components can be charts or any
other traditional method to communicate the information to consumers.
Application Layer/Distribution Layer: Finally, at the top of the value chain, are applications
and services that are closest to the eventual end users—enterprises and consumers.
Fig: IOT Value Chains
Q17 Explain i-GVC with the figure. (WINTER 2019)
Fig: Information-driven Global Value Chain
There are five fundamental roles within the I-GVC that companies and other actors are
forming around, illustrated in:
● Sensors, RFID, and other devices. ● End-Users. ● Data Factories. ● Service Providers/Data Wholesalers. ● Intermediaries. ● Resellers.
Following are the inputs to the information-driven global commodity chain. There are two
main inputs into the I-GVC:
1. Sensors and other devices (e.g. RFID and NFC).
2. End-users.
Data factories: entities that produce data in digital forms for use in other parts of the I-GVC.
E.g. Ordnance Survey (OS) in the UK has always collected map information from the field.
Service Providers/Data Wholesalers: Many examples exist of service Providers. Several
well-known ones are Twitter, Facebook, Google, etc. Google ―sells‖ its data assets through
the development of extremely accurate, targeted, search-based advertising mechanisms.
Intermediaries: ―anonymise‖ data sufficiently to protect individuals‘ privacy rights in
relevant regional settings.
Resellers: One example is BlueKai, which tracks the online shopping behaviour of Internet
users mines the data gathered for ―purchasing intent‖ in order to allow advertisers to target
buyers more accurately. BlueKai combines data from several sources, including Amazon,
Ebay, and Alibaba.
Q18 Explain main design principles and needed capabilities of loT.
Or For Building an architecture of IoT explain Main design principles and needed
capabilities. (Summer 2019)
In order to explain main design principles and needed capabilities we have to understand IoT
design. Designing for the Internet of Things (IoT) is the designing of connected products. IoT
systems combine physical and digital components that collect data from physical devices and
deliver actionable, operational insights. These components include: physical devices,
sensors, data extraction and secured communication, gateways, cloud servers, analytics, and
dashboards.
There are four universal design principles shaping IoT design today:
● Interoperability: At the most fundamental level, a connected system requires
sensors, machines, equipment, and sites, to communicate and exchange data.
Interoperability is the underlying principle throughout all Industry 4.0 design
processes. ● Information transparency: The rapid growth of connected devices means
continuous bridging between the physical and digital worlds. In this context,
information transparency means that physical processes should be recorded and stored
virtually, creating a Digital Twin.
● Technical assistance: A driving benefit of IoT, technical assistance refers to the
ability of connected systems to provide and display data that helps people to make
better operational decisions and solve issues faster. In addition, IoT-enabled things
should assist people in laborious tasks to improve productivity and safety. ● Decentralized decisions: The final principle of Industry 4.0 design is for the
connected system to go beyond assisting and exchanging data, to be able to make
decisions and execute requirements according to its defined logic.
Q19 List the types in which Devices can be characterised in IoT
A device in IoT can be characterised in IoT has having following properties:
● Microcontroller: 8-, 16-, or 32-bit working memory and storage. ● Power Source: Fixed, battery, energy harvesting, or Hybrid. ● Sensors and Actuators: Onboard sensors and actuators, or circuitry that allows them
to be connected, sampled, conditioned, and controlled. ● Communication: Cellular, wireless, or wired for LAN and WAN communication. ● Operating System: Main-loop, event-based, real-time, or full-featured OS. ● Applications: Simple sensor sampling or more advanced applications. ● User Interface: Display, buttons, or other functions for user interaction. ● Device Management: Provisioning, firmware, bootstrapping, and monitoring. ● Execution Environment: Application lifecycle management and Application
Programming Interface (API).
UNIT 3
Q20 Explain IoT architecture outline with a diagram. (WINTER 2019)
Fig: IoT Architecture
Layers:
● Asset layer: No functionality E.g. real World object, Vehicles and machinery, Home,
People, building
● Resource Layer: Functional capabilities to Asset with embedded technology,
sensors, Smart meters, RFID code, Quick Response code.
● Communication Layer: Connectivity between resource to other infrastructure No
functionality E.g. LAN,WAN ,DSL(Digital Subscriber Line)
● Service Support layer: It is executed in data center and Server farms, Location based
service, GIS.RFID tag.
● Data and Information layer: Capture knowledge and provide Advance control logic.
Knowledge management framework
● Application Layer: Smart Metering, SMART Grid, Vehicle Tracking, Building
automation, participatory sensing.
● Business Layer: CRM,ERP,BSS
Along with above mentioned Functional layers, there are 3 types of Functional Group:
● Management: Operation, maintenance, administration, Provisioning
● Security: Communication Security and Information Security
● Data And Services: Topological perspective, e.g. data Averaging, contextual meta
data, Data Mining, Data analytics
Q21 Discuss the Functional view of IoT. (May 2019)
Functional view describes system's runtime functional components, their responsibilities,
default functions, interfaces and primary interactions.
● Device and application Functional Group: Device functional component contains
the sensing, actuation log, processing and storage components. Application functional
group contains the standalone application. ● Communication Functional Group: It contains the components for end-to-end
communication, network communication, and hop-by-hop communication. ● IoT service Functional Group: The IoT Service FG corresponds mainly to the
Service class from the IoT Domain Model, and contains single IoT Services exposed
by Resources hosted on Devices or in the Network (e.g. processing or storage
Resources). ● Virtual entity Functional Group: A major difference between IoT Services and
Virtual Entity Services is the semantics of the requests and responses to/from these
services. ● Process management Functional Group: Provides the functional concepts
necessary to conceptually integrate the lost world into traditional processes. ● Service organization Functional Group: Acts as a communication hub between
several other functional groups by composing and orchestrating services of different
level of abstraction. ● Security Functional Group: It is responsible for security and privacy matters in IoT-
A compliant IoT systems. ● Management Functional Group: It is responsible for the composition and tracking
of actions that involve in the other FGs.
Q22 Explain ETSI M2M high-level architecture (MAY 2019)
ETSI is European Telecommunications Standards Institute M2M/oneM2M formed a
Technical Committee (TC) on M2M.
ETSI M2M high-level architecture: Two main domains are as follows:
1. Network domain and
2. Device and Gateway domain
● Topological border between the physical devices and gateways and the physical
communication infrastructure (Access network).
The Device and Gateway Domain
● It contains the following functional/topological entities:
● M2M Device
● M2M Area Network
● M2M Gateway
Fig: ETSI M2M Architecture
M2M Device
● Direct connection: The M2M Device is capable of performing registration,
authentication, authorization, management, and provisioning to the Network Domain.
● Direct connection also means that the M2M device contains the appropriate physical
layer to be able to communicate with the Access Network., through one or more M2M
Gateway
● It does not have the appropriate physical layer, compatible with the Access Network
technology, and therefore it needs a network domain proxy.
M2M Area Network
● This is typically a local area such as Local Area network (LAN) or a Personal Area
Network (PAN) Provides connectivity between M2M Devices and M2M Gateways.
● Typical networking technologies for above requirement is as follows:
● IEEE
● 802.15.1 (Bluetooth),
● IEEE 802.15.4 (ZigBee, IETF 6LoWPAN/ (wired or wireless) etc.
M2M Gateway
● M2M Gateway: The device that provides connectivity for M2M Devices in an M2M
Area Network towards the Network Domain.
● The M2M Gateway contains M2M Applications and M2M Service Capabilities.
● The M2M Gateway may also provide services to other legacy devices that are not
visible to the Network Domain.
Network Domain
● Network Domain contains the following functional/topological entities:
● Access Network:
● Core Network
● M2M Service Capabilities
● M2M Applications:
● Network Management Functions
● M2M Management Functions
Q23 Explain ITU-T IoT Reference Model.
ITU-T stands for International Telecommunication Union Telecommunication sector view
(ITU-T) Model. ITU-T IoT domain model includes a set of physical devices that connect
directly or through gateway devices to a communication network that allows them to
exchange information with other devices, services, and applications.
Fig: ITU-T Model
Application Layer
● Application Layer the ITU-T IoT model considers this layer as the host of specific
IoT applications (e.g. remote patient monitoring).
The Service & Application Support Layer (otherwise known as Service Support and
Application Support Layer)
● It consists of generic service capabilities
● IoT applications, such as data processing and data storage and specific service
capabilities tailored to specific application domains, such as e-health or telematics.
Network Layer
● It provides networking capabilities such as Mobility Management, Authentication,
Authorization, and Accounting (AAA), and Transport Capabilities such as
connectivity for IoT service data.
The Device Layer: It has two components
● Device Capabilities and
● Gateway Capabilities.
Device Capabilities:
● It include, among others, the direct device interaction with the communication
network and therefore the Network Layer Capabilities,
Gateway Capabilities
● The Gateway Device Capabilities include multiple protocol support and protocol
conversion
● In order to bridge the Network Layer capabilities and the device communication
capabilities.
Management Capabilities
● It includes: FCAPS (Fault, Configuration, Accounting, Performance, Security)
model of capabilities as well as Device management, traffic management.
Security Capabilities:
● This layer represents a grouping of different Security Capabilities required by other
layers.
● The capabilities are grouped generically, such as AAA and message
integrity/confidentiality support, and specifically, such as ones that are tailored to the
specific application, e.g. mobile payment.
Q24 Explain Architecture Reference Model (ARM) in IoT.
An Architecture Reference Model (ARM) is divided into two main parts: Reference model
and Reference architecture.
The reference model is a division of functionality into elements together with the data flow
among those elements. The reference architecture is a reference model mapped onto
software element that implements the functionality defined in the reference model.
Figure Relation between loT architecture model and IoT reference model.
The reference model consists of the domain, information, functional, communication,
and security model.
• The domain model is responsible for outlining core concepts in loT such as devices,
services, and virtual entities.
• The information model defines the generic structural properties of information in an
loT system
• The functional model identifies groups of functionalities based on the relations
defined in the domain model.
• The communication model addresses the complexity of communications in IoT
environment.
• The security model provides security and ensures the safety of the loT application.
The ARM also defines reference architecture which is the reference for developing the actual
system.
Above Fig shows two facets of IoT ARM:
1) How to actually create an IoT ARM.
2) How to use it with respect to building actual systems.
Q25 Explain Information view w.r.t. IoT reference architecture in detail. (MAY 2018)
• Information view provides the overview of how the static and dynamic information is
represented.
• It also describes the components that handle the information, the flow of information
through the system and the life cycle of information in the system.
• One of the main purpose of connected and smart objects in the loT is the exchange of
information between each other and also with external systems.
• Information flow in loT can use two paths:
1)From devices such as sensors, actuators, tags until it reaches the consumer application.
2) From the application part of the larger system until it reaches the consumer part of the
system.
• An IoT system is typically deployed to monitor and control physical entities, monitoring
and controlling physical entities in turn performed by mainly the devices, communication,
loT services and virtual entity functional group in the functional view.
• The virtual entity in any loT system models the physical entity.
• Information in the system is handled by services.
• Services are registered to the loT system using service description which is provided by
service itself.
There are four common message exchanging patterns considered for information exchange
between loT functional components.
1) Push pattern: It is the one-way communication between two devices.
2) Request response pattern: It is the synchronous way of communication in which client
waits for the server response. A client will send the request to the server. The server will get
the request and send a response.
3) Subscribe/notify pattern: It is the asynchronous way of communication in which client
doesn't wait for the server response. It just sends the subscribe-call to the server. The server
gets it and notifies the client when it sends the response.
4) Publish/subscribe pattern: It allows the loose coupling between communication partners.
The services are advertised on the broker component and whenever client shows the interest
in a service, the connection between client and server is established.
Q26 Explain deployment and Operational view w.r.t. IoT reference architecture. (MAY
2019)
The Deployment and Operational View depends on the specific actual use case and
requirements, and therefore we present here one way of realizing the Parking Lot example
seen earlier. Let us take an example of the parking IoT system.
Fig IoT based Smart Parking System
• As we can see in the figure, there are two sensor nodes #1 and #2, each of which is
connected to eight car presence sensors. They are also connected to the payment stations
through wireless or wired communication
• The payment station acts both as a user interface for the device to pay and get a payment
receipt as well as a communication gateway that connects the two sensor nodes and payment
interface physical devices with the internet through WAN.
• The occupation sign also acts as a communication gateway for the actuator node, and we
assume that because of the deployment, a direct connection to the payment station is not
feasible.
• The physical gateway devices connect through WAN to the internet and towards a data
centre where the parking lot management system software is hosted as one of the virtual
machines on a platform as service configurations.
• The two main applications connected to this management system are human user mobile
phone applications and parking operation centre applications.
Q27 Explain IoT domain model notations and semantics.
● Unified Modelling Language (UML) is used to show relationships between the main
concepts of the loT domain model. ● Each class in UML is a set of objects that have similar structure, behaviour, and
properties. ● Each class contains the name and a set of attributes ● The interaction with the physical world is the key for loT and it needs to be captured
in the domain model. ● The domain model represents the main concepts of IoT and the relationships between
them.
As shown in the diagram, a physical entity can contain another physical entity. For example,
a building contains several floors and each floor has several rooms.
● The physical entity is represented in the digital world as the virtual entity. ● A virtual entity can be a database entry, an image or avatar or any other digital
unit. ● The relations between the services and entities are represented using
associations. ● These associations can be static or dynamic.
Three types of devices are very important in IoT domain model:
1. Sensors: to convert physical properties to electrical signals.
2. Actuators: to convert electrical signals to physical properties.
3. Tags: to uniquely identify any physical entity.
UNIT 4
Q What is the difference between Greenfield and brownfield IoT development?
Greenfield IoT development
In software development, Greenfield refers to software that is created from scratch in a totally
new environment. No constraints are imposed by legacy code, no requirements to integrate
with other systems. The development process is straightforward, but the risks are high as well
because you‘re moving into uncharted territory.
In IoT, Greenfield development refers to all these shiny new gadgets and devices that come
with internet connectivity. Connected washing machines, smart locks, TVs, thermostats, light
bulbs, toasters, coffee machines and whatnot that you see in tech publications and consumer
electronic expos are clear examples of greenfield IoT projects.
Brownfield IoT development
Again, to take the cue from software development, brownfield development refers to any
form of software that created on top of legacy systems or with the aim of coexisting with
other software that are already in use. This will impose some constraints and requirements
that will limit design and implementation decisions to the developers. The development
process can become challenging and arduous and require meticulous analysis, design and
testing, things that many upstart developers don‘t have the patience for.
The same thing applies to IoT, but the challenges become even more accentuated. In
brownfield IoT development, developers inherit hardware, embedded software and design
decisions. They can‘t deliberate on where they want to direct their efforts and will have to
live and work within a constrained context. Throwing away all the legacy stuff will be costly.
Some of it has decades of history, testing and implementation behind it, and manufacturers
aren‘t ready to repeat that cycle all over again for the sake of connectivity.
So which is the better?
There‘s no preference. There should be balance and coordination between Greenfield and
brownfield IoT development. We should see more efforts that bridge the gap between so
many dispersed efforts in IoT development, a collective effort toward creating establishing
standards that will ensure present and future IoT devices can seamlessly connect and combine
their functionality and power. The point is, we don‘t need to reinvent the wheel. We just have
to use it correctly.
Q Discuss IoT for Oil and Gas Industry.
Unconventional resources challenge the oil industry. And IoT can provide following benefits.
● Real-time field data using sensors, installed at various locations for optimizing Oil and Gas assets and
production
● End-to-End connected pipeline
sensors monitor pipeline data like temperature, flow, pressure, etc., that helps in real-
time controlling ● Equipment health check and Preventive Maintenance
ability to capture multiple data points from multiple devices for determining the
health of equipment and forecast any potential failures ● Tanker/fleet tracking and management in real-time
Sensors that are fitted inside the tankers enables real-time tracking of location and
health of vehicle ● Remote asset tracking & management
utilization of the assets, history of the assets and increase their efficiency, predictable
asset lifecycle management ● Maintain a sustainable environment
better-more accurate-real-time monitoring by the industry to identify any impact to
the environment
These and many more similar areas IoT can play a wide role in Oil and Gas Industry.
Q What can the shopping basket tell: loT for the retailing industry?
• IoT has changed the retailing industry significantly
There are four broad IoT application areas within the retailing industry.
1) Sensors fitted in the refrigerator and other electronic devices can save a huge amount of
energy for the retailers. This way the retailers can reduce their carbon footprint which will
lead to better customer loyalty.
2) Installing CCTV cameras for video analysis can trigger real-time automated alerts which
can help the retailer to provide stuff to the customers in urgent need. It will lead to better
customer experience, effective labour utilization and will ultimately increase sales.
3) IoT sensors can enable the dynamic re-routing of delivery vans based on the weather
forecast and live traffic updates. Retailers can get better visibility into the inventory using the
RFID tags.
This all results in: cost saving and improved customer satisfaction.
4) Using in-store sensors and video analysis, the retailer can understand customer hot spots,
flow pattern and purchase timing. This way the retailer can keep the things together which is
often bought by customers together. This is called market basket analysis. It will increase the
revenue for sure.
So, using loT retailers can gain a deeper understanding of customers‘ path to purchase,
shopping habits that can be used in a variety of ways to optimize various customer touch
points and build strong brand perception. Latest technologies like RFID, NFC. Big Data,
sensors, cloud computing etc. have provided opportunities to redefine retail stores like never
before.
Q What is a Smart City? What are the features of IoT in a smart city? Explain the role
of IoT in smart city
A city which not only continuously reads live data from various sources (sensors) but also
analyses it to forecast changes and alters its behaviour according to changing data patterns. A
city which has, a dynamic relationship with its citizens, rather than a simple transactional
relationship. That, in my view, is a perfect definition of a smart city.
A smart city is considered smart due to its inherent intelligence in dealing with its
resources and environment. It makes effective use of available ―Information and
Communication technologies‖, especially the ―Internet of things (IOT)‖. Internet of Things
inputs the required intelligence into basic building blocks of the city and helps make it smart!
Just imagine sensors monitoring energy usage, water levels, traffic flows and parking lots, the
environment and security cameras, and sending that data directly to the city monitoring
control center. Smart cities possess massive potential in completely turning around the
operational efficiency of a city and IOT is the technical foundation behind the same.
Features of IoT Smart City:
● Applying Smart Solutions to infrastructure and services ● Efficient Metering of Energy and Resources ● Making Governance easy and Citizen Friendly ● Effective Transportation management ● Smart Traffic Assistance ● Reducing Carbon emission ● Air/Water management ● Waste management ● Efficient Parking management ● Etc.
Q Four Aspects to Master in IoT
There are many aspects to be considered for improving business with IoT, some of there are
listed below.
i) Data collection:
-One of the most prominent methods in which companies use smart technology is to collect
data for manufactured products.
Knowing how your target consumer utilizes a specific piece of merchandise can open the
doors to a wide scope of analytics
for future improvements of those goods. For example, a smart-enabled golf club could record
swing power and impact resistance
in order to formulate a new way to build a driver.
ii) Information Sharing with customers:
- Almost three out of four consumers say that customer support is the driving factor of doing
business with any company. Since
smart technology can accumulate a wide scope of information and present it in an easy-to-
read platform, the data is quite
beneficial for target consumers. An example of this is how some farming equipment
companies share crop planting and plowing
information with tractor customers. This offers a layer of customer service by helping the
individual beyond the simple purchase of the product.
iii) Clarity within the Organization:
- According to statistics, about 70% of project managers don‘t have formal training or
certifications in such. This means the leader doesn‘t
have necessary insight to spearhead the success of the project. When smart technology is
involved with regular updates for products and services,
there is greater clarity within the organization. It‘s easier to keep track of things like tools,
inventory and even office supplies. It can be a
measure of cost cutting as the business spends less on replacing things that have become
misplaced or lost. Information sharing is at the heart of
what is IoT.
-Clarity can also come in the form of better communication between employees. Chat
applications, video conferencing from smartphones and tablets,
team management tools and more utilize the power and versatility of the Internet to boost
productivity and reduce errors and complications.
iv) Changes in Company Equipment:
- Organizations that don‘t utilize smart-enabled devices will be at a serious disadvantage. The
basis of IoT is to make processes streamlined and
easy to access. This means you may have to replace a great deal of equipment in your facility
or even change the procedures of your employees.
However, this upgrade to the business may offer a substantial increase to productivity and
efficiency.
-As long as your employees are willing to change the way they work to incorporate enhanced
technology, the process of upgrading has potential for easiness for everyone.
Other four aspects:
•Internet Conquering Product Business
•Strategic Business Aspects
•Vertical Business Domains for IoT
•Reference Architecture and the Core Competence for Business
Q. Explain value creation from big data and serialization.
- IoT technology as a value creation capability rather than as a cost optimization
strategy
- Exploring the value of data that is collected from multiple infrastructures across a
product lifecycle where the Auto-ID serialized identifier may serve as a key to
linking relevant data to individual products, processes and related outcomes.
- In ‗Internet of Things‘, Serialization can be used majorly for: *Big data in the pharmaceutical industry
*Tracking serialized products
*The value of supply chain data
*Legal information flows
*Finance flows
*Product lifecycle management data
*Keeping better track of things
UNIT 5
Explain contributions from the FP7 project.
The complete name of FP7 is 7th Framework Programme for Research and Technological
Development. It will last for seven years from 2007 until 2013. The programme has a total
budget of over € 50 billion. FP7 is a key tool to respond to Europe's needs in terms of jobs
and competitiveness, and to maintain leadership in the global knowledge economy.
FP7 is the natural successor to the previous programme, FP6. It is the result of years of
consultation with the research community from both the public and private sectors, with
economic actors, and with political decision makers in Europe. FP7 is both larger and more
comprehensive than its predecessors. It is also more flexible, with simplified procedures.
The Framework Programmes for Research have two main strategic objectives:
● To strengthen the scientific and technological base of European industry;
● To encourage its international competitiveness, while promoting research that
supports EU policies.
Who can participate and benefit in FP7?
Participation in FP7 is open to a wide range of organisations and individuals:
● research groups at universities or research institutes
● companies intending to innovate
● small or medium-sized enterprises (SMEs)
● SME associations or groupings
● public or governmental administration (local, regional or national)
● early-stage researchers (postgraduate students)
● experienced researchers
● institutions running research infrastructures of transnational interest
● organisations and researchers from third countries
● international organisations
● civil society organisations
The above list is only indicative, not exhaustive.
The FP7 provided funding for various projects and technological development. ―Funding
schemes‖ are the types of projects, by which FP7 is implemented. They are the following:
● Collaborative Projects
● Network of excellence
● Coordination and support actions
● Individual projects
● Support for training and career development of researchers
Q. Discuss GAMBAS middleware in detail with suitable Figure.
GAMBAS mean Generic Adaptive Middleware for Behaviour-driven Autonomous
Service.
● The GAMBAS middleware will enable the development of novel applications and
internet-based service.
The GAMBAS middleware with its associated software development kit (SDK) addresses
these challenges by simplifying these high-level tasks by means of
a) Models and infrastructures that support the interoperable representation and city-wide pro-
cessing of (context) information,
b) Frameworks and methods to enable resource- efficient data acquisition using the mobile
devices carried by the citizens, and
c) Protocols and tools to derive, generalize, and enforce privacy-policies allowing citizens to
control the sharing of their information.
In the following, we describe the different components of the GAMBAS middle- ware and
detail how they support data acquisition, data distribution and data integration.
Fig: GAMBAS Middleware architecture.
Q- Explain SMARTIE approach for IoT.
SMARTIE is used to design and build data-centric information sharing platform. The vision
of SMARTIE is to create a distributed framework to share large volumes of heterogeneous
information for the use in the smart city applications, enabling end-to-end security and trust
in information delivery for decision-making purposes following data owner‘s privacy
requirements.
Objectives:
● Understanding requirements for data and application security and creating a policy
enabled framework supporting data sharing across applications. ● Developing new technologies that establish trust and security in the perception layer
and network layer ● Develop new technologies for trusted information creation and secure storage for the
information service layer ● Develop new technologies for information retrieval and processing guided by access
control policies in the application layer ● Demonstrate the project results in the real use cases
Q Discuss activity chain 05- governance, security, privacy issues.
Governance- Corporate governance is the set of mechanisms that are designed to address the
conflicts between the managers and owners of assets when there is a separation of ownership
and control. These mechanisms are intended to monitor the person who has control over the
assets so that the use of the assets does not conflict with the incentives of the owners of the
assets. Boards of directors, institutional shareholders, and the market for corporate control are
some examples of corporate governance mechanisms that are expected to mitigate the
potential conflicts between owners and the managers.
Security- Security related research is expected to generate new knowledge and promote the
application of new technologies in the field of civil security.
Research in the timeframe of the FP7 will address the following areas:
● Security of citizens ● Security of infrastructures and utilities, ● Intelligent surveillance and border security, ● Restoring security and safety in case of crisis, ● Security systems integration, ● Interconnectivity and interoperability, ● Security and society, ● Security research co-ordination and structuring.
Privacy Issues- Privacy issues arise when data are collected and stored. The handling of
digital personal data is of major concern because of the processing possibilities and the
potential to link vast amounts of personal data. On the whole, privacy concerns any data
which, either alone or when linked to other, relate to an identifiable individual or individuals.
There is a reasonableness test involved in the linking of data as any data could potentially be
linked together to identify an individual. If such information is collected, then the data is
subject to the relevant EU data protection standards.
Q. Explain IoT@Work Capability Based Access Control System.
● Capability Based Access Control (also known as CapBAC) system developed within
the EU FP7 IoT@Work project.
● Capability based authorization model in which a capability is a communicable,
unforgeable token of authority.
● This token uniquely identifies
- the granted right(s),
- the object on which the right(s) can be exercised and
- the subject that can exercise it/them.
● As shown in Figure, a capability based system reverses the traditional approach
● Now the user in charge of presenting his/her/its authorization token to the service
provider
(while in a traditional ACL or RBAC system it is the service provider that has to
check if the user is, directly or indirectly, authorized to perform the requested
operation on the requested resource)
Q. Security, Privacy and Trust in IoT-Data-Platforms for Smart Cities.
● Aims of Smart City technologies: to provide different optimization mechanisms for
different aspects of data management.
● Major points to be considered for any Smart City IoT Data platforms:
- Data gathering
- Data/Information Storage
- Security & Privacy
- Risks
● Data Gathering: Data is gathered from various sources owned by different administrative domains.
● Major/Important parts are data from
- public and private transportation providers,
- data from mobile users, captured for instance with their smart phones
- surveillance data and videos from private and public organisations and
- a vast amount of sensors and meters, attached to machines and infrastructures,
distributed throughout the city.
● Data/Information Storage: All this information is stored in a variety of different places
- it can remain locally in the sensors
- company‘s internal databases
- in social networks
- in data storage located in private data centres
- even in a public cloud storage service
● There is a need of an information sharing platform in which data flows from various
sources and from different administrative boundaries need to be treated in a secure
and privacy preserving way.
● Security and privacy need to be part of the platform starting from designing phase and
may not be added later on.
● All parties involved in the overall systems such as sensors and actuators, end users,
data owners but also service providers need strong mechanisms for reliability and
trust.
● Risks to a Smart City IoT Platform:
● We predict that smart city data will eventually be stored in the cloud and employ
cloud computing techniques, due to the high scalability of resources and computing
performance and reduced cost in maintenance and operation.
● In this case, the smart city management system inherits also the security and privacy
risks of cloud computing, for instance the compromise of cloud servers or data abuse
by insider attacks.
● Additionally the Smart Cities infrastructure is also interacting with sensors and
actuators in order to gather data and control critical infrastructure functions.
This clearly requires to authenticate and authorize the access and to provide trusted
information in a secure and privacy-preserving way.
● A smart city infrastructure, as pictured above, is exposed to several risks such as
attacks on the control infrastructure, poisoning of data, and leakage of confidential
data.
● An attacker can simultaneously attack on multiple layers:
○ Manipulate the sensor measurements to infiltrate the system with wrong data,
e.g. to cause certain actuations
○ Attack the sensors and actuators physically to obtain credentials
○ Attack or impersonate network components to act as a man-in-the middle
○ Obtain sensitive data or cause actuation by attacking the sharing platform with
forged or malicious requests