Schweitzer Fachinformationen
Wenn es um professionelles Wissen geht, ist Schweitzer Fachinformationen wegweisend. Kunden aus Recht und Beratung sowie Unternehmen, öffentliche Verwaltungen und Bibliotheken erhalten komplette Lösungen zum Beschaffen, Verwalten und Nutzen von digitalen und gedruckten Medien.
F. Leo John1*, D. Lakshmi2 and Manideep Kuncharam3
1 Department Computer Science and Information Technology, Prowess University, Delaware, Wilmington, USA
2 School of Computing Science and Engineering, VIT Bhopal University, Madhya Pradesh, India
3 Department of Information Technology, B.V. Raju Institute of Technology, Narasapur, Telangana, India
Abstract
The Internet of Things (IOT) and its security is an important role in the modern era of intelligent computing and its applications. The IOT advantages support the individuals and organizations from the remote regions to complete the tasks, operations and services and make their decisions in an effective manner. Providers of services and manufacturers of equipment primarily concentrate on the provision of information and pay little attention to the protection and privacy of the information provided. The IOT integrates a range of innovations and plans through standard communication protocols and special solution schemes to integrate a variety of smart artifacts. As the rising emphasis and major global investments show, green IOT, IOT security, self-configuration, self-adaptation and interoperable communication are the main topics for study. Sensors have been used by different industries to gather data, however their control systems are kept purposely isolated in order to prevent cyberattacks. The deployment of IOT security issues poses the entire evolution of smart objects. The capacity of IOT is extended to connecting devices, machines and applications to the Internet. IOT allows all the connected devices and things to exchange data or even control each other. The different types of current IOT platforms, IOT protocol threats, and IOT layers are discussed in this paper. Experts forecast that after the existence of 5G technology to the extent almost 50 billion devices or things are connected to the internet. This book chapter will be useful for developing IOT applications for organizations, with a better approach and provides a key factor in the decision-making process.
Keywords: IOT security, threats, privacy, IOT platforms
It has now become a buzzword for everyone working in this field of research, with the rapid development of the Universal Object Interaction (UOI or IOT). IOT is the global "intelligent" versioned network for regular physical objects. Its ability to carry out its activities automatically by means of integrated computer hardware, cameras, sensors, actuators, control units and applications. Figure 1.1 illustrates the various layers and its protocols that get connected in the IOT environment. The 21st century is for IOT, which is seen as a physical devices network from electronic and software sensors. The network of around 27 billion physical devices on IOT is now available and the list is expanding. These devices (car, fridge, TV, etc.) can be uniquely recognized by an interconnected computing system and can be linked from anywhere to gain more services and value through effective information and communications technologies. The "THING" in IOT is everywhere around us, like health care equipment, houses, computers, mobiles, livestock, agriculture, humans, energy, industry, logistics etc. Today, intelligent health services, intelligent houses, intelligent traffic and intelligent home appliances are using this technology for greater digital use. Figure 1.1 shows the overview of the IOT environment.
It is possible to classify IOT applications into two categories:
Figure 1.1 Internet of Things environment.
The major characteristics of IOT are:
Self-Adaptation: The capability of an IOT system needs to adapt with the operating conditions and changing contexts.
Self-Configuration: This feature enables several IOT or IOT devices to work along with larger numbers of devices simultaneously. IOT devices should have the capability of configuring the network, software upgrade with lesser or no manual intervention.
Interoperable Communication Protocols: This feature allows communication with all other devices within the infrastructure.
Unique Identity: Every IOT device has its own unique identifier. Integrated into Information Network: Data from the larger number of IOT nodes are connected to aggregate the data, analyze and predict or decision making.
Classification of Sensors
Data sources are growing enormously in terms of formats and volume. The scale of data will be incredibly high with the connectivity of numerous IOT connected devices and anticipated billions of sensors too in the near future too. A sensor is a device that detects changes in the environment. A sensor is worthless by itself, but it plays an essential part in using it in the electronic device.
The various types of data sources are given below:
Data from passive sources: Passive sensor data is less effective, low-power and needs to be allowed, generating data only when advised before data can be collected and transmitted. For example, when the readable machine is correctly invoked, only current statistics are provided by a sensor that measures ground-water saturation. These sensors are typically small, durable and used in hazardous, and remote places. Usually, these sensors are lightweight, rugged and used in hazardous and remote areas.
Real time data: Active sensor data streams the data continuously (Example: a jet engine). For easy receipt and extraction of insights from data sources, data capture, processing platforms and infrastructures must therefore be available.
Dynamic source (fog devices) Data: Here sensor data is collected from physical, mechanical, electrical and electronic components attached to the sensors. These sensors can be used to allow IOT devices to transmit data. These sensors possess the inherent resources and capacity to conduct communication with IOT applications based on business, the web and cloud using all types of IOT devices.
Features of Sensors
A node of the sensor, also called a mote, which is a node in a network of sensors that can process, collect sensory information and connect to other linked nodes in the network. A mote is a node, but a node is not a mote every time. The sensors deployed heavily can be the temperature, pressure removal, long-range communication, short-range communication.
The three characteristics for a strong sensor is as follows:
Properties of Sensor
The most important thing is that a sensor can be defined by different properties:
Range: The initial and final values of the phenomenon or condition that the sensor can measure.
Sensitivity: the minimum parameter change that induces a measurable signal change.
Resolution: The minimal change in the sensor's phenomenon or condition.
There are a wide variety of sensors that we can use to monitor almost any physical aspect surrounding us. Below are some common sensors commonly used in daily life:
Electronic Sensors
Temperature Sensor: Used to measure temperature in the physical environment. For example: thermocouple.
IR Sensor: It is used to detect obstacles and controls direction in the robotic vehicle. Eg.- Device having photo chips with photocell, Tv remote.
Ultrasonic Sensor: It is used to detect high frequency sound waves and measure the distant object. Ex: Transducers, SONAR, and Radar.
Touch Sensor: Touch Sensors are nothing but switches used in electric stove.
IOT Sensors
Proximity Sensor: It is used to find the properties of the existing or non-existing objects. It is mainly used in retail to track the number of particular products sold.
Chemical Sensors: Used to detect any changes in the liquid or air. Eg.-chemi resistor.
Gas Sensor: It is very similar to gas sensors but used in multiple domains such as agriculture, health, manufacturing industries and so on. Ex: Ozone Monitoring Type.
Humidity...
Dateiformat: ePUBKopierschutz: Adobe-DRM (Digital Rights Management)
Systemvoraussetzungen:
Das Dateiformat ePUB ist sehr gut für Romane und Sachbücher geeignet – also für „fließenden” Text ohne komplexes Layout. Bei E-Readern oder Smartphones passt sich der Zeilen- und Seitenumbruch automatisch den kleinen Displays an. Mit Adobe-DRM wird hier ein „harter” Kopierschutz verwendet. Wenn die notwendigen Voraussetzungen nicht vorliegen, können Sie das E-Book leider nicht öffnen. Daher müssen Sie bereits vor dem Download Ihre Lese-Hardware vorbereiten.Bitte beachten Sie: Wir empfehlen Ihnen unbedingt nach Installation der Lese-Software diese mit Ihrer persönlichen Adobe-ID zu autorisieren!
Weitere Informationen finden Sie in unserer E-Book Hilfe.