Chameli Devi Group of Institutions Department of Computer Science and Engineering Subject: Internet of Things (CS-801)
Chameli Devi Group of Institutions Department of Computer Science and Engineering Subject: Internet of Things (CS-801)
Chameli Devi Group of Institutions Department of Computer Science and Engineering Subject: Internet of Things (CS-801)
Unit V
IoT Platforms, Arduino, Raspberry Pi Board, Other IoT Platforms; Data Analytics for IoT, Cloud for IoT,
Cloud storage models & communication APIs, Attacks in IoT system, vulnerability analysis in IoT, IoT case
studies: Smart Home, Smart framing etc.
1. IoT Platforms
As in IoT, all the IoT devices are connected to other IoT devices and application to transmit and receive
information using protocols. There is a gap between the IoT device and IoT application. An IoT Platform fills
the gap between the devices (sensors) and application (network). Thus we can say that an IoT platform is an
integrated service that fulfills the gap between the IoT device and application and offers you to bring physical
object online.
CHAMELI DEVI GROUP OF INSTITUTIONS, INDORE. Prepared by: Dayanand Yadav (Asst. Professor, CSE)
INTERNET OF THINGS 2
There are several IoT Platforms available that provides facility to deploy IoT application actively. Some of
them are listed below:
Amazon Web Services (AWS) IoT platform: Amazon Web Service IoT platform offers a set of services that
connect to several devices and maintain the security as well. This platform collects data from connected devices
and performs real-time actions.
Microsoft Azure IoT platform: Microsoft Azure IoT platform offers strong security mechanism, scalability
and easy integration with systems. It uses standard protocols that support bi-directional communication between
connected devices and platform. Azure IoT platform has an Azure Stream Analytics that processes a large
amount of information in real-time generated by sensors. Some common features provided by this platform are:
Information monitoring
A rules engine
Device shadowing
Identity registry
Google Cloud Platform IoT: Google Cloud Platform is a global cloud platform that provides a solution for IoT
devices and applications. It handles a large amount of data using Cloud IoT Core by connecting various devices.
It allows to apply BigQuery analysis or to apply Machine learning on this data. Some of the features provided
by Google Cloud IoT Platform are:
Cloud publisher-subscriber
IBM Watson IoT platform: The IBM Watson IoT platform enables the developer to deploy the application
and building IoT solutions quickly. This platform provides the following services:
Device management
Secure Communication
Artik Cloud IoT platform: Arthik cloud IoT platform is developed by Samsung to enable devices to connect
to cloud services. It has a set of services that continuously connect devices to the cloud and start gathering data.
It stores the incoming data from connected devices and combines this information. This platform contains a set
of connectors that connect to third-party services.
CHAMELI DEVI GROUP OF INSTITUTIONS, INDORE. Prepared by: Dayanand Yadav (Asst. Professor, CSE)
INTERNET OF THINGS 3
Bosch IoT Suite:
Bosch cloud IoT Suit is based on Germany. It offers safe and reliable storing of data on its server in Germany.
This platform supports full app development from prototype to application development.
IoT platform provides security and authentication for sensors and users.
It collects, visualizes, and analyzes the data gathered by the sensor and device.
It would seem there’s a never-ending debate regarding two widely known electronics boards – Raspberry Pi and
Arduino. The battle as to which one is best is, in fact, a fallacy as they’re two different things. Choosing one
over the other depends on the task at hand. This being said, let’s see where each of these devices can be just
what you need.
CHAMELI DEVI GROUP OF INSTITUTIONS, INDORE. Prepared by: Dayanand Yadav (Asst. Professor, CSE)
INTERNET OF THINGS 4
Arduino or Raspberry Pi?
It’s worth pointing out from the get-go that, actually, it’s difficult to directly compare Raspberry Pi and Arduino
since each device is a completely different platform. But before diving into differences between the two, it
appears a basic grasp of each device is in order.
Raspberry Pi
Raspberry Pi 4 Model B
The Raspberry Pi platform was developed at the University of Cambridge in the UK by the Raspberry Pi
Foundation as a low-cost, programmable computer to teach and enhance students’ programming skills.
Raspberry Pi has all the features of a standard PC – dedicated processor, graphics driver and memory and even
its own operating system known as Raspberry Pi OS (earlier called Raspbian OS), which is a version of Linux
optimized for RPi. The device doesn’t provide storage but, fortunately, with microSD cards, you can store up to
32 GB of data. In addition, Raspberry Pi includes Ethernet, Bluetooth and WiFi connectivity, so you can also
use it to transfer files over the Internet.
Since it’s a full-fledged computer, you can plug a monitor, mouse and keyboard to it, connect to the Internet,
add a camera and other things that you typically do to your computer. Because an entire computer is squeezed
into a single circuit board, Raspberry Pi is often called a Single Board Computer (SBC).
CHAMELI DEVI GROUP OF INSTITUTIONS, INDORE. Prepared by: Dayanand Yadav (Asst. Professor, CSE)
INTERNET OF THINGS 5
The Raspberry Pi Foundation is constantly updating and improving the platform. Since its launch, it’s been very
popular in robotics, IoT, weather monitoring and a great number of other electronic systems.
With Raspberry Pi, you can develop software using several programming languages like Python, Java, C, C++,
HTML and others. Sadly, the device’s hardware design and software are not open-source.
Major features
contains everything a standard computer does – GPU, CPU, Ethernet port, GPIO, and power source
connector.
Arduino
Arduino Uno
CHAMELI DEVI GROUP OF INSTITUTIONS, INDORE. Prepared by: Dayanand Yadav (Asst. Professor, CSE)
INTERNET OF THINGS 6
Arduino was created in Italy. Its name comes from the bar where its creator, Massimo Banzi, a lecturer at the
Interaction Design Institute Ivrea and co-founders first came up with an idea of a simple prototype device for
students. It quickly became popular outside educational institutions, and started to change and adapt to new
challenges and needs. With its easily accessible and simple UI, the device has been used worldwide for a great
variety of electronics projects.
It provides a programmable circuit board along with software that’s called Integrated Development
Environment (IDE). The boards execute code written in the C/C++ languages that’s stored in their firmware.
This microcontroller development board can read data from sensors, buttons, and turn it into outputs, for
example, controlling motors, blinking LEDs, opening doors, among other things.
The Arduino boards are open-source. This means with the design files and source code available to the public,
you can work on your board and customize it to your needs.
Major features
32k bytes of flash memory and 2k bytes of SRAM (Static Random Access Memory),
The processor speed varies from 8 MHz to 400 MHz. The average speed of most Arduino boards is 16
MHz,
32 KB of flash memory,
Now that we’ve learned a thing or two about each of the platforms, let’s compare them pointing out the major
differences.
Key Differences
You can build a robot using either, but depending on the board, the robot will have different capabilities.
Arduino is an electronic board with a simple microcontroller, whereas Raspberry Pi is a full-fledged
computer.
CHAMELI DEVI GROUP OF INSTITUTIONS, INDORE. Prepared by: Dayanand Yadav (Asst. Professor, CSE)
INTERNET OF THINGS 7
Unlike Arduino, Raspberry Pi has its own operating system and thanks to that, it can carry out complex
operations like robot control, monitoring weather and many others. Arduino works based on simple
instructions that its IDE (Integrated Development Environment) provides.
Raspberry Pi has a superb processing power – up to 1.6 GHz (depending on the board), whereas that of
Arduino is up to 16 MHz (depending on the board).
Arduino will come in handy for controlling motors, LEDs, or interfacing sensors, whereas Raspberry Pi
is good for developing software applications.
Arduino and Raspberry Pi have different power requirements. Although both can be powered by USB,
Raspberry Pi needs more current than Arduino does. This means that you’ll need a power adapter for
Raspberry Pi, but a USB port of your computer will do the job in the case of Arduino.
Since Arduino is a controller board, you can plug and unplug the power as you see fit. As a full-fledged
computer, Raspberry Pi needs to be properly turned off before powering it down or after using it.
Arduino’s open-source software and hardware enables you to create your own customized Arduino
board, and you can find many alternatives for it such as Teensy, ESP32, Adafruit, something that’s
much harder with Raspberry Pi as it’s not open-source.
In Raspberry Pi, the key programming languages used to develop applications are C, C++, Python, Ruby
and Scratch. As to Arduino, it can be programmed with the use of C or C++.
With Ethernet or WiFi, you can easily connect to the Internet with Raspberry Pi. Most Arduino boards
don’t support wireless connectivity and the Internet but it’s possible with extra modules or shields.
Both Raspberry Pi and Arduino have their pros and cons. It would seem that Raspberry Pi is a much more
powerful device and hence, it should be better. But, in fact, neither is superior to the other, not in a direct
comparison. They are two different things for different purposes. Comparing them in light of which one is
better is not a good approach. The key to the right choice lies in the type of project you’re working on.
Arduino is fitted for repetitive tasks such as turning the light on and off, opening and closing doors, reading
from sensors, and the like. Hence, if your project consists of some repetitive elements and simply needs an
output based on sensory input, Arduino should do great for this purpose.
Raspberry Pi is suitable for performing complex tasks such as running elaborate robots, monitoring the weather,
among other things. If the project calls for complex functionalities and Internet connection, Raspberry Pi will be
the best choice. For simple projects, it might be an overkill.
Internet of Things (IoT) analytics is a data analysis tool that assesses the wide range of data collected from IoT
devices. IoT analytics assesses vast quantities of data and produces useful information from it.
CHAMELI DEVI GROUP OF INSTITUTIONS, INDORE. Prepared by: Dayanand Yadav (Asst. Professor, CSE)
INTERNET OF THINGS 8
IoT analytics are usually discussed in tandem with Industrial IoT (IIoT). Data is collected from a wide range of
sensors on manufacturing infrastructure, weather stations, smart meters, delivery trucks, and all forms of
machinery. IoT analytics can be applied to managing data centers and applications handling retail and
healthcare.
In many ways, IoT data is similar to big data. The key difference between the two is not just the quantity of data
but the range of sources it is obtained from. All this data has to be processed into one comprehensible, single
stream of data. Considering the several kinds of sources of information, data integration becomes quite difficult,
and this is where IoT analytics makes a difference, though it can be tough to develop and implement.
Wearables
Dedicated trackers such as Fitbit or other smartwatches have gone beyond tracking steps. You can track your
friends' fitness activities, compete with them, message, and even answer the phone by connecting your devices
through the Internet. This information is tracked by fitness companies, enabling them to create customized
packages if you sign up. This can include exercise routines, diet, goals, and more. The newest smart watches
even monitor heart rates and rhythms and have accurately diagnosed heart problems in their wearers.
CHAMELI DEVI GROUP OF INSTITUTIONS, INDORE. Prepared by: Dayanand Yadav (Asst. Professor, CSE)
INTERNET OF THINGS 9
Smart Home
Smart homes have security systems you can access and control when you are away from home, to appliances
you can turn on and off with digital assistance. There is a wide range of devices that you can incorporate into
your home and a wide range of data that can be collected to assess usage patterns, the efficacy of systems, and
more.
Healthcare
Healthcare has a wide range of IoT devices. Bluetooth technology creates hearing aids, records heart and blood
pressure, and monitors pulse-based alarm systems that can call for help. This has helped enhance healthcare to a
large extent. The data collected is invaluable in terms of creating newer and better technology.
Voice-Activated Everything
Digital assistants are a form of IoT devices. Alexa, Siri, and Google take notes, find information, play music,
order cabs, tell the weather, set alarms, and everything else. The internet regularly updates these digital
assistants to improve functionality. Their data helps companies tailor their services for you, based on your
everyday interaction with digital assistants.
With a wide range of devices, there is an endless stream of data in enormous quantities. IoT analytics helps
analyze this data across all connected devices without hardware or infrastructure. As the needs of your
organization change, computing power and data storage scales up or down accordingly, ensuring your IoT
analysis has the requisite capacity.
The first step is to collect data aggregated from a variety of sources, in a range of formats, and at
multiple frequencies.
The analysis can be done in multiple ways--with custom analysis systems, with standard SQL queries, or
with machine learning analysis techniques. The results can be used to make a wide range of predictions.
With the information received, organizations can build several systems and applications to ease business
processes.
Smart agriculture: With IoT analytics, connected field machinery works based on information derived from IoT
analysis. Analysis factors include time, geographical location, weather, altitude, and local environmental
conditions. For example, irrigation systems can be optimized to deliver the exact amount of water as rainfall
predictions.
CHAMELI DEVI GROUP OF INSTITUTIONS, INDORE. Prepared by: Dayanand Yadav (Asst. Professor, CSE)
INTERNET OF THINGS 10
Regular restocking of supplies: Monitor inventories in real-time. A food vending company, with connected
machines, can have their machines request restocking based on the depletion of products. This can be triggered
when stocks in the machine reach a particular level.
Predictive maintenance: Varying infrastructure needs regular maintenance. With IoT analysis, pre-set templates
can help determine quality predictive maintenance models applied to specific needs. For example, in long-
distance transport vehicles with heating and cooling systems--IoT analytics can determine when vehicles need
an overhaul to ensure cargos are not damaged.
Process efficiency scoring: Every company works with a range of processes in place. IoT analytics can measure
the efficiency of these processes and make the necessary changes in them. Results from IoT analytics can
identify bottlenecks--both current and potential--and can increase efficiencies.
IoT analytics brings a wide range of benefits, such as actionable intelligence and invaluable insights. These can
result in:
Challenges in Implementation
While the many benefits of IoT analytics are quite clear, it does not come without its share of implementation
difficulties. Some of the major challenges of IoT analytics include:
Ascertaining time series and data structures: Sensors are a part of IoT analytics and often have a barrage of
static data thrown at them. This data remains the same until something happens to change it. What influences
the change during these long periods is difficult to ascertain and its impact on analysis cannot always be
determined. This can impact diagnostic and predictive efforts.
Balancing speed and storage: Companies often struggle with storing the right amount of data and analyzing it
quickly. Scaling these two processes up, particularly in the case of time-sensitive data, can be a challenge,
especially when historical data is needed to make comparisons. With historical data, it is essential to store data
for a long time, which increases the cost of storage, putting a strain on financial resources.
CHAMELI DEVI GROUP OF INSTITUTIONS, INDORE. Prepared by: Dayanand Yadav (Asst. Professor, CSE)
INTERNET OF THINGS 11
Finding the right professionals: To run IoT analytics, a company needs to hire professionals in several fields.
You will need developers, database specialists, and data scientists as well as data processing specialists and
other specific skill sets, depending on your organization and the kind of work it does.
With an increase in popularity for IoT devices, data is abundant. Organizations have data flowing continuously
from personal devices, smart homes devices, automobiles, and more. For organizations looking to capitalize on
this, building a robust IoT analysis-based system is key. IoT analytics can unlock the true potential of IoT data,
opening up several opportunities a company can leverage to get ahead of the competition.
One component that improves the success of the Internet of Things is Cloud Computing. Cloud computing
enables users to perform computing tasks using services provided over the Internet. The use of the Internet of
Things in conjunction with cloud technologies has become a kind of catalyst: the Internet of Things and cloud
computing are now related to each other. These are true technologies of the future that will bring many benefits.
Due to the rapid growth of technology, the problem of storing, processing, and accessing large amounts of data
has arisen. Great innovation relates to the mutual use of the Internet of Things and cloud technologies. In
combination, it will be possible to use powerful processing of sensory data streams and new monitoring
services. As an example, sensor data can be uploaded and saved using cloud computing for later use as
intelligent monitoring and activation using other devices. The goal is to transform data into insights and thus
drive cost-effective and productive action.
CHAMELI DEVI GROUP OF INSTITUTIONS, INDORE. Prepared by: Dayanand Yadav (Asst. Professor, CSE)
INTERNET OF THINGS 12
IaaS is also known as Hardware as a Service (HaaS). It is a computing infrastructure managed over the internet.
The main advantage of using IaaS is that it helps users to avoid the cost and complexity of purchasing and
managing the physical servers.
Characteristics of IaaS
Example: DigitalOcean, Linode, Amazon Web Services (AWS), Microsoft Azure, Google Compute Engine
(GCE), Rackspace, and Cisco Metacloud.
CHAMELI DEVI GROUP OF INSTITUTIONS, INDORE. Prepared by: Dayanand Yadav (Asst. Professor, CSE)
INTERNET OF THINGS 13
PaaS cloud computing platform is created for the programmer to develop, test, run, and manage the
applications.
Characteristics of PaaS
Builds on virtualization technology, so resources can easily be scaled up or down as per the
organization's need.
Example: AWS Elastic Beanstalk, Windows Azure, Heroku, Force.com, Google App Engine, Apache Stratos,
Magento Commerce Cloud, and OpenShift.
SaaS is also known as "on-demand software". It is a software in which the applications are hosted by a cloud
service provider. Users can access these applications with the help of internet connection and web browser.
Characteristics of SaaS
Users are not responsible for hardware and software updates. Updates are applied automatically.
Example: BigCommerce, Google Apps, Salesforce, Dropbox, ZenDesk, Cisco WebEx, ZenDesk, Slack, and
GoToMeeting.
CHAMELI DEVI GROUP OF INSTITUTIONS, INDORE. Prepared by: Dayanand Yadav (Asst. Professor, CSE)
INTERNET OF THINGS 14
It provides a virtual data center to It provides virtual platforms and It provides web software and
store information and create tools to create, test, and deploy apps to complete business
platforms for app development, apps. tasks.
testing, and deployment.
1. IoT Cloud Computing provides many connectivity options, implying large network access. People use a
wide range of devices to gain access to cloud computing resources: mobile devices, tablets, laptops. This
is convenient for users but creates the problem of the need for network access points.
2. Developers can use IoT cloud computing on-demand. In other words, it is a web service accessed
without special permission or any help. The only requirement is Internet access.
3. Based on the request, users can scale the service according to their needs. Fast and flexible means you
can expand storage space, edit software settings, and work with the number of users. Due to this
characteristic, it is possible to provide deep computing power and storage.
4. Cloud Computing implies the pooling of resources. It influences increased collaboration and builds close
connections between users.
CHAMELI DEVI GROUP OF INSTITUTIONS, INDORE. Prepared by: Dayanand Yadav (Asst. Professor, CSE)
INTERNET OF THINGS 15
5. As the number of IoT devices and automation in use grows, security concerns emerge. Cloud solutions
provide companies with reliable authentication and encryption protocols.
6. Finally, IoT cloud computing is convenient because you get exactly as much from the service as you
pay. This means that costs vary depending on use: the provider measures your usage statistics. A
growing network of objects with IP addresses is needed to connect to the Internet and exchange data
between the components of the network.
It is important to note that cloud architecture must be well-designed since reliability, security, economy, and
performance optimization depends upon it. Using well-designed CI/CD pipelines, structured services, and
sandboxed environments results in a secure environment and agile development.
Cloud is a centralized system helping to transfer and deliver data and files to data centers over the Internet. A
variety of data and programs are easy to access from a centralized cloud system.
The Internet of Things refers to devices connected to the Internet. In the IoT, data is stored in real-time, as well
as historical data. The IoT can analyze and instruct devices to make effective decisions, as well as track how
certain actions function.
Cloud computing encompasses the delivery of data-to-data centers over the Internet. IBM divides cloud
computing into six different categories:
1. Platform as a Service (PaaS) –The cloud contains everything you need to build and deliver cloud
applications so there is no need to maintain and buy equipment, software, etc.
2. Software as a Service (SaaS) –In this case, applications run in the cloud and other companies operate
devices that connect to users’ computers through a web browser.
3. Infrastructure as a Service (IaaS) – IaaS is an option providing companies with storage, servers,
networks and hubs processing data for each use.
4. Public cloud – Companies manage spaces and provide users with quick access through the public
network.
5. Private cloud – The same as a public cloud, but only one person has access here, which can be an
organization, an individual company, or a user.
6. Hybrid cloud – Based on a private cloud, but provides access to a public cloud.
Now, the Internet of Things refers to connecting devices to the Internet. Everyday devices such as cars and
household appliances may have an Internet connection, and with the advancement of the Internet of Things,
more and more devices will join this list.
Data processing at the network edge or edge computing is used with IoT solutions and enables faster processing
and response times. To get a better understanding of how this works, consider a large factory with many
CHAMELI DEVI GROUP OF INSTITUTIONS, INDORE. Prepared by: Dayanand Yadav (Asst. Professor, CSE)
INTERNET OF THINGS 16
implemented IoT sensors. In this situation, it makes sense, before sending data to the cloud for processing, to
aggregate it close to the border to prevent cloud overload by reducing direct connections.
Data centers with this approach make data processing much faster. Yet, an approach that is only based on the
edge will never provide a complete view of business operations. If there is no cloud solution, then the factory
only controls each unit individually. Also, it has no way of imagining how these units work in relation to each
other. This is why only the combination of the edge and the cloud will enable businesses to benefit from IoT
developments.
Cloud computing works to improve the efficiency of daily tasks in conjunction with the Internet of Things.
Cloud computing is about providing a path for data to reach its destination while the Internet of Things
generates a huge amount of data.
According to Amazon Web Services, there are four benefits of cloud computing:
2. Saves money, because you only need to pay for those resources that you use, the larger the scale, the
more savings
Thus, the role of cloud computing in IoT is to work together to store IoT data, providing easy access when
needed. It’s important to note that cloud computing is an easy way to move large data packets across the
Internet generated by the IoT.
A cloud storage API is an application programming interface that connects a locally based application to a
cloud-based storage system so that a user can send data to it and access and work with data stored in it. To the
application, the cloud storage system is just another target device, like disk-based storage.
A cloud API is specific to the storage service it targets. For example, a cloud object storage service might offer
an API that can create, fetch and delete objects on that platform, as well as perform other object-related tasks.
An API for a file storage service operates at the file and folder level, supporting operations such as uploading
and downloading files and sharing folders with multiple users.
Even if providers offer the same type of storage, such as Amazon Simple Storage Service (S3) and Microsoft
Azure blob, each service still requires an API specific to that service. For example, developers can't use the
Amazon S3 representational state transfer (REST) API to access an object in Azure Blob.
These APIs provide a range of capabilities that developers can implement in their applications, but each is
specific to a cloud storage service. This adds complexity to the development process when multiple cloud
CHAMELI DEVI GROUP OF INSTITUTIONS, INDORE. Prepared by: Dayanand Yadav (Asst. Professor, CSE)
INTERNET OF THINGS 17
services are involved. Even if those services are with the same provider, individual APIs are often still required.
The process becomes even more complex when storage services and their APIs are updated or changed in any
way.
The lack of a common cloud API can make it difficult to move data from one provider's service to another's.
Organizations that want to deploy multi-cloud strategies can have an especially difficult time managing
resources across the cloud platforms.
Many IT pros view the lack of cloud computing standards as a potential roadblock to adoption, stemming from
cloud provider lock-in fears and the inability to move virtual machines and data from cloud to cloud…
What users want is a cloud API like the network API, TCP/IP -- one that's implemented in all cloud products
and services and promotes transparent interoperability. This would increase the confidence of prospective
public cloud adopters, as they'd be able to leave their providers whenever they want. It would also eliminate the
belief that it's easy to get into the cloud but difficult to get out.
Although the industry has changed significantly since Claybrook made his pronouncement, much of what he
said still holds true today. Most cloud storage vendors have published APIs for building applications that can
access their storage services. However, the APIs continue to be specific to the individual services and cannot be
used to connect directly to other services.
CHAMELI DEVI GROUP OF INSTITUTIONS, INDORE. Prepared by: Dayanand Yadav (Asst. Professor, CSE)
INTERNET OF THINGS 18
Developing a common cloud API would be a difficult, lengthy process. It is complicated by the fact that cloud
storage providers have little incentive to make this happen. Many of today's APIs support industry standards,
such as the REST architectural style and the Open Authorization, or OAuth, 2.0 authentication and
authorization protocol. However, the APIs remain limited to their own target services.
Amazon S3 REST API. This one is a Hypertext Transfer Protocol (HTTP) interface to Amazon S3 that is
programming language-neutral. The API lets developers build applications that include HTTP requests and use
standard HTTP headers and status codes. In this way, developers can work with any toolkit that supports HTTP.
However, Amazon added functionality to HTTP in some areas, so developers should be aware of these changes
when working with the API.
Dropbox API. With this API, developers get a set of HTTP endpoints to help integrate their applications with
the Dropbox The API can access both user and business endpoints, accommodating direct work with stored
files. Developers can use the API for advanced functionality, such as sharing, thumbnails and full-text search.
They can also manage the user lifecycle for a business account, perform actions on multiple team members and
access Dropbox Business administration functionality.
Google Drive API. This API lets developers create applications that integrate with Google Drive. It supports
file upload and download, search for files and folders, and file and folder sharing. Developers can also create
third-party shortcuts that are external links to data in a different data store or cloud storage system.
Microsoft OneDrive REST API. Developers can use this API to access OneDrive, OneDrive for Business,
SharePoint document libraries and Office Groups. The API makes it possible to read and store content in any of
these locations without having to modify the code.
Microsoft Azure Storage REST APIs. These offer programmatic access to various Azure services. The APIs
vary depending on which service is being accessed. For example, developers can use the Blob service API to
retrieve service stats, set container metadata and create a hierarchical namespace similar to a file system. They
can use the Table service API to set service properties, create tables and configure a table's access control list.
CHAMELI DEVI GROUP OF INSTITUTIONS, INDORE. Prepared by: Dayanand Yadav (Asst. Professor, CSE)
INTERNET OF THINGS 19
IOT attacks
IoT devices are manufactured to fulfill the general needs of an organization; therefore, they lack strict security
protocols. Attackers have been using this advantage to break into the system of an organization through any of
the weak IoT devices.
IoT attacks are cyber-attacks that gain access to users' sensitive data with the help of any IoT device. Attackers
usually install malware on the device, harm the device, or gain access to further personal data of the company.
For instance, an attacker may gain access to an organization's temperature control system through a security
loophole in any IoT device. He can then influence the temperature of the rooms connected to the appropriate
device.
As discussed, IoT devices are not built with proper security protocols. Hence, they are one of an organization's
weakest links and pose a huge security threat. Following are the attacking zones where the attacks originate and
compromise sensitive data:
Devices
Various parts of a device raise security threats for an organization, such as the memory, firmware, web
interface, physical interface, and networking service of a device. Attackers can take advantage of these and
initiate an IoT attack by finding a loophole in the device, such as an outdated component.
Communication channels
Channels that connect IoT devices to one another need to be secured; otherwise, an IoT attack can be easily
initiated.
Applications and software connected to IoT devices also pose a threat to the security of the system. It is easy to
access the IoT device by compromising the application or the software of the device.
Some of the most common IoT attacks have been listed below:
Physical tampering: Hackers can access the physical location of the devices and easily steal data from them. In
addition, they can install malware on the device or break into the network by accessing the ports and inner
circuits of the device.
Eavesdropping: The attacker can use a weak connection between the server and an IoT device. They can
intercept the network traffic and gain access to sensitive data. Using an eavesdropping attack, the intruder can
also spy on your conversations using the data of the microphone and camera IoT device.
CHAMELI DEVI GROUP OF INSTITUTIONS, INDORE. Prepared by: Dayanand Yadav (Asst. Professor, CSE)
INTERNET OF THINGS 20
Brute-force password attacks: Cybercriminals can break into your system by trying different combinations of
common words to crack the password. Since IoT devices are made without security concerns in mind, they have
the simplest password to crack.
Privilege escalation: Attackers can gain access to an IoT device by exploiting vulnerabilities, such as an
operating system oversight, unpatched vulnerabilities, or a bug in the device. They can break into the system
and crawl up to the admin level by further exploiting vulnerabilities and gaining access to the data that can be
helpful for them.
DDoS: Zombified IoT devices and botnets have made DDoS attacks easier than before. It is when a device is
made unavailable to the user due to an immense traffic flow.
Man-in-the-middle attack: By exploiting insecure networks, cybercriminals can access the confidential data
being passed by the device to the server. The attacker can modify these packets to disrupt communication.
Malicious code injection: Cybercriminals can exploit an input validation flaw and add malicious code to that
place. The application can run the code and make unwanted changes to the program.
IoT devices are manufactured to perform basic organizational tasks. However, the organization implementing
and incorporating these devices into their networks should be highly cautious of their security. Following
measures can be taken to ensure device security:
Have strong passwords for all IoT devices. Regularly change and update them.
Configure the users and give access to the essential users only.
Give users limited data and device access, as per their requirements, to ensure data confidentiality.
Regularly update software, application, and your operating system so that attackers cannot find a gap in
your devices.
Schedule regular security audits to discover any potential loopholes that can compromise security.
Configure and detect all the devices, as well as the users connected to the devices. This ensures that the
data is accounted for and prevents unwanted traffic.
Companies should have recovery procedures and policies that can be immediately implemented if any
device is compromised.
With swaths of employees bringing in their smart devices to work and a new office cafeteria boasting a host of
new internet-connected microwaves and kettles, hackers are exposing the security flaws one device after
another.
Few can deny the convenience that IoT devices have offered us in the past decade, but fewer still realize the
damage they can cause if not designed with security in mind.
The internet of things, a term coined by Kevin Ashton in 1999, simply describes what we would consider any
internet-connected device; the more technical definition is as follows:
“Sensors and actuators embedded in physical objects are linked through wired and wireless networks, often
using the same Internet Protocol (IP) that connects the Internet” – IoT Analytics
IoT security, therefore, is the protection applied to or provided for IoT devices. This security could be the active
protection of sensors and actuators or the network to which the device is connected.
At first, this may seem a little complicated, but the cybersecurity architecture does not vary significantly from
standard or traditional means. One thing is certain; there is no one-size-fits-all approach to IoT security or
cybersecurity for that matter.
IoT Vulnerabilities
To understand IoT security, one must understand IoT vulnerabilities; they are, after all, the weaknesses hackers
will be attempting to exploit.
CHAMELI DEVI GROUP OF INSTITUTIONS, INDORE. Prepared by: Dayanand Yadav (Asst. Professor, CSE)
INTERNET OF THINGS 22
Like IoT security, vulnerabilities don’t fit a typical mold, and often every device will have a particular quirk
that may need addressing. An example of this would be phones, everyone today is rocking a smartphone, but
not all smartphones are created equal. A security patch that can be applied to the iPhone IOS will almost
certainly be ineffective for an Android phone of the same caliber.
This is one small but a powerfully obvious example of the complexity IoT devices bring to the security
environment. It only gets more complicated as you begin to discover the kinds of devices that have gone
“smart.”
Having said that there are some vulnerability “areas” that can be bracketed and targeted when developing a
management framework, and those are:
Device to device: devices will often “talk” to each other, and this can be both a good and bad thing; it depends
on what they are talking about. Knowing these communication channels means you can apply certain security
techniques on the device’s end (discussed in a later section).
Device to endpoints: this vulnerability area is when IoT devices will communicate with traditional network
endpoints, like computer terminals and servers. Unwanted packages can be uploaded from the device to the
endpoint and weak channels can be exploited for various means.
Device to network perimeters: IoT devices can and will often take advantage of weak network perimeters. This
could mean that the organization’s firewall is not configured correctly or is entirely nonexistent. Often these
devices “out-of-the-box” are not configured with security in mind and will default to open ports, which are
extremely easy to exploit.
Device to the cloud: IoT devices rely heavily on cloud services. It is easier for IoT devices to communicate
through the cloud. But cloud services, like many new technologies, are seldom designed with security in mind,
making this a key area of vulnerability.
IoT Security
Once the organization can identify the vulnerabilities associated with the IoT devices attached to its network, it
can begin to implement a security framework. Essentially, IoT security boils down to the active management of
IoT devices on an organizational network. In a later section, we will explore some potential IoT security
solutions and how they can be implemented in a vulnerability management framework.
Before looking into vulnerability management, there is a vital first step that every organization must take, and
that is to identify the IoT network
Most information systems are comprised of a multitude of devices and endpoints. In most cases, traditional
cybersecurity methods are applied to the base level information system, which includes computer terminals,
servers, data channels, and staff.
CHAMELI DEVI GROUP OF INSTITUTIONS, INDORE. Prepared by: Dayanand Yadav (Asst. Professor, CSE)
INTERNET OF THINGS 23
IoT devices are an extra layer of complexity that is added on to the overall information system. However, many
of the same methods of security can be applied to this layer. Most security audits will begin with a simple
inventory, and IoT security is no different. You can not know what to protect if you do not know what you
have.
In the area of IoT, most of the inventory capacity, if not all, will be made up of physical devices. It is vital that
the organization is meticulous with this inventory, as any device left unchecked could pose a serious threat
down the line.
Some of the devices that are commonly found in office environments that are considered IoT devices are:
“Smart” devices
Phones
Kitchen utensils (kettles, fridges, microwaves, etc.), most likely only modern offices would be fitted
with such devices.
Bad actors can potentially exploit all of this and more, so the organization must know what they have and how
it is used. Many organization won’t even know that an IoT device is even connected to their network
A simple hardware inventory would suffice, giving a picture of how many IoT devices are in operation.
Techniques
There are many techniques that an organization can employ when conducting an inventory. We have outlined
some that are pertinent to IoT devices below:
Software assistance: there is software that can be used that will scan the organizational network and return a list
of connected devices. Most routers will also come with an inbuilt dashboard that will showcase the connected
devices. The only drawback is that devices that are not connected will not return a value, but they might still
pose a security risk.
Physical Check: the organization can always employ the traditional technique of clipboard in hand and write
down all the devices that come in and out of the office, higher a specialist is recommended for a full physical
check.
CHAMELI DEVI GROUP OF INSTITUTIONS, INDORE. Prepared by: Dayanand Yadav (Asst. Professor, CSE)
INTERNET OF THINGS 24
Audits and auditors: many cybersecurity organizations will run both software and hardware inventories as part
of the consultation or implementation package. The use of a specialist will surely boost the accuracy of an
inventory and the information provided can be actioned upon.
Once the organization has a solid grasp on the IoT inventory, it can begin to explore possible IoT security
solutions, which we examine now.
As mentioned in a prior section, it is essential to realize that IoT security does not have a one-size-fits-all
approach, cybersecurity seldom does. However, this does not mean that there is no starting point and there are
security use cases that can be applied to various IoT networks. In this section, we’ll discuss some security
techniques and methods that your organization can employ today, given a proper IoT device inventory.
End-to-end device encryption: if the organization has some autonomy over the devices that are used on the
network, or if the organization itself issues them, it is paramount that end-to-end encryption is applied. End-to-
end encryption means communication between IoT devices are secured at the device level. This method of
encryption stops hackers from intercepting communications that are in transit. Many prominent messaging
services like Watsapp, Viber, or Telegram utilize this type of technology for their messaging services.
IoT testing framework: A testing framework should be implemented as part of the security policy. Any potential
device should be tested against a security framework and should only be used if it passes specific security
requirements.
Banning vendors that don’t pass: any vendor that does not design devices with security in mind should not be
allowed to access organizational networks.
Greenlight list: Any vendors that pass the security requirements can be added to a greenlight list, where
employees may use personal devices (with correct security configs) from the vendors, or office spaces are
allowed to be fitted with devices from these vendors.
IoT security analytics: employing a security analytics tool that is tailored to IoT security can help in detecting
threats and vulnerabilities in the IoT environment.
IoT authentication: similar to multi-factor authentication for passwords, IoT authentication, adds an extra layer
of security in the information ecosystem. Authenticating IoT devices means that hackers can not create “clones”
or valid devices or device bots that can attach to the organization’s networks.
These are a few of the potential security solutions that can be adapted to various scenarios and environments.
The solution will be one that is right for your organization’s infrastructure, but one thing that should be done
regardless is keeping updated on the IoT security landscape.
The wider cybersecurity community will often post updates on new vulnerabilities and solutions for IoT devices
and your organization might be using these devices so information must be updated and communicated.
CHAMELI DEVI GROUP OF INSTITUTIONS, INDORE. Prepared by: Dayanand Yadav (Asst. Professor, CSE)
INTERNET OF THINGS 25
Once all previous information discussed in this article is known, a vulnerability management framework can be
implemented.
The framework is the active protection of the IoT environment. An inventory of the ecosystems is made,
solutions are discussed, and vulnerability management begins.
The above-named elements are some of the more general procedures that should be mapped in the vulnerability
management framework. Each organization will have some elements specific to them, which is why it is
recommended you hire the help of a specialist.
Lighting
Today, the most widely used smart home application is home lighting. Most people know of tunable lighting
that can change between warm and bright with different colour hues that suit your mood & requirement.
But let’s check a few other use case scenarios for smart lights.
As you enter your home, lights can turn on automatically without the necessity to press a button. (This can also
work as a safety feature to detect intrusions)
The opposite is also possible as you leave your home; the system can turn the lights off automatically, thereby
saving energy.
Home theatre enthusiasts can have the lights programmed to automatically dim while watching a movie to
provide the best viewing experience.
Your light can turn on when your alarm rings in the morning, waking the whole household up if need be.
All smart lighting in your home can be connected to your smartphone and other connected devices and can be
voice-controlled.
Kitchen
Smart home automation devices can make the cooking process safer and convenient too.
CHAMELI DEVI GROUP OF INSTITUTIONS, INDORE. Prepared by: Dayanand Yadav (Asst. Professor, CSE)
INTERNET OF THINGS 26
It can turn on the lights or play soothing music when you enter the kitchen in the morning to prepare that hot,
steaming cup of morning chai.
Smart sensors can check for gas leaks, smokes, water leakages and turn off the power in the house if the
indicators are outside the optimum range.
Appliances (refrigerators, chimneys) can be controlled through voice-activated devices. You can ask Alexa to
preheat the oven to 180 degrees while you prep your cake.
Safety sensors identify anything wrong at your home. They can notify home users of any overlooked like an
appliance left on or any potential threats immediately and even trigger necessary action to prevent them.
Proximity, motion & video sensors can identify if a burglar makes an attempt to break into your home and
automatically turn on the panic alarm, lights and call the police.
No more doubts or double checks on whether the doors and windows were closed or if that motor or heater are
off? Smart home users can check their home state remotely through the app on their phones and control pretty
much everything at home.
While locking the door, you can set controllers to automatically close the curtains, turn off devices and ensure
your home is protected against any trespassers.
You can monitor your elderly relatives and automate things remotely for them if needed.
Bathrooms
Smart home IoT technologies in the bathroom can help in power and energy savings with convenience.
With smart home automation, you can set your geysers to automatically turn on and off at a pre-set pattern basis
your shower routine.
This also helps make your home energy efficient by eliminating the unnecessary functioning of high power-
consuming home appliances like geysers, heaters, ACs.
Gardens
A smart home can be exceptionally beneficial for those plant lovers interested in growing vegetables, fruit,
herbs, and indoor plants at home.
The technology allows users to check if the plant is adequately hydrated and receiving the necessary amount of
sunlight.
You can monitor your plant and turn on your smart irrigation system when needed. You can control and stop the
watering system, thus optimizing water usage
CHAMELI DEVI GROUP OF INSTITUTIONS, INDORE. Prepared by: Dayanand Yadav (Asst. Professor, CSE)
INTERNET OF THINGS 27
Smart home IoT technology has led to a real breakthrough in gardening, which will completely remodel the
traditional approach to growing plants.
Temperature Control
With temperature control automation, you can optimize your ACs to provide the best experience while being
energy efficient.
For instance, users can turn on their bedroom ACs as they drive from the office to enjoy a cool room once home
after a tiring day.
You can configure the bedroom AC with your geyser times, so once you step out from your bath, the room is
ready for you.
You can set the ACs to function based on the room temperature while you sleep at night. So you are neither
cold nor hot and get a good night’s sleep.
Doors
We can safely assume the doors of our future will not need keys. Digital locks are safe and can be set to initiate
a sequence of other devices in your home.
For instance, a door open can follow a customized sequence of actions like the light switching on; inside doors
unlocked, and music and ACs are turned on.
The entry door digital lock can identify who opened the door when. With a custom entry assigned for each
individual, you can know when your kids, your hubby, or your maid reached home through notifications on
your smartphones.
Retro-fit
The most significant advantage of eGlu smart home solutions is that the patented products are retro-fit, which
means:
It is easily fittable to existing homes & electrical systems without any rewiring required.
Scalable to new and existing homes – so you can do only a part of the home initially and extend to the rest of
the house at a later stage.
Smart Farming
Smart agriculture, on the other hand, is mostly used to denote the application of IoT solutions in agriculture. So
what is smart agriculture using IoT? By using IoT sensors to collect environmental and machine metrics,
farmers can make informed decisions, and improve just about every aspect of their work – from livestock to
crop farming.
CHAMELI DEVI GROUP OF INSTITUTIONS, INDORE. Prepared by: Dayanand Yadav (Asst. Professor, CSE)
INTERNET OF THINGS 28
For example, by using smart agriculture sensors to monitor the state of crops, farmers can define exactly how
many pesticides and fertilizers they have to use to reach optimal efficiency. The same applies to the smart
farming definition.
Technologies and IoT have the potential to transform agriculture in many aspects. Namely, there are 6
ways IoT can improve agriculture:
Data, tons of data, collected by smart agriculture sensors, e.g. weather conditions, soil quality, crop’s
growth progress or cattle’s health. This data can be used to track the state of your business in general as
well as staff performance, equipment efficiency, etc.
Better control over the internal processes and, as a result, lower production risks. The ability to foresee
the output of your production allows you to plan for better product distribution. If you know exactly how
much crops you are going to harvest, you can make sure your product won’t lie around unsold.
Cost management and waste reduction thanks to the increased control over the production. Being able to
see any anomalies in the crop growth or livestock health, you will be able to mitigate the risks of losing
your yield.
Increased business efficiency through process automation. By using smart devices, you can automate
multiple processes across your production cycle, e.g. irrigation, fertilizing, or pest control.
Enhanced product quality and volumes. Achieve better control over the production process and maintain
higher standards of crop quality and growth capacity through automation.
CHAMELI DEVI GROUP OF INSTITUTIONS, INDORE. Prepared by: Dayanand Yadav (Asst. Professor, CSE)
INTERNET OF THINGS 29
Reduced environmental footprint. Automation also carries environmental benefits. Smart farming
technologies can cut down on the use of pesticides and fertilizer by offering more precise coverage, and
thus, reduce greenhouse gas emissions.
There are many types of IoT sensors for agriculture as well as IoT applications in agriculture in general:
Probably the most popular smart agriculture gadgets are weather stations, combining various smart farming
sensors. Located across the field, they collect various data from the environment and send it to the cloud. The
provided measurements can be used to map the climate conditions, choose the appropriate crops, and take the
required measures to improve their capacity (i.e. precision farming).
Some examples of such agriculture IoT devices are allMETEO, Smart Elements, and Pycno.
CHAMELI DEVI GROUP OF INSTITUTIONS, INDORE. Prepared by: Dayanand Yadav (Asst. Professor, CSE)
INTERNET OF THINGS 30
DroneSeed,
for example, builds drones for planting trees in deforested areas. The use of such drones is 6 times more
effective than human labor. A Sense Fly agriculture drone eBee SQ uses multispectral image analyses to
estimate the health of crops and comes at an affordable price.
CHAMELI DEVI GROUP OF INSTITUTIONS, INDORE. Prepared by: Dayanand Yadav (Asst. Professor, CSE)
INTERNET OF THINGS 31
End-to-end farm management systems
A more complex approach to IoT products in agriculture can be represented by the so-called farm productivity
management systems. They usually include a number of agriculture’s IoT devices and sensors, installed on the
premises as well as a powerful dashboard with analytical capabilities and in-built accounting/reporting features.
This offers remote farm monitoring capabilities and allows you to streamline most of the business operations.
Similar solutions are represented by FarmLogs and Cropio.
In addition to the listed IoT agriculture use cases, some prominent opportunities include vehicle tracking (or
even automation), storage management, logistics, etc.
CHAMELI DEVI GROUP OF INSTITUTIONS, INDORE. Prepared by: Dayanand Yadav (Asst. Professor, CSE)