2. Presented by :-
IT-3rd Year
Anindya Sundar De
Gopal Basak
Rashbihari Halder
Agnish Majumder
3. What is IoT ??
• The Internet of Things (IoT) is the network of physical
objects or "things" embedded with electronics, software,
sensors, and network connectivity, it enables these objects
to collect and exchange data.
• IoT allows objects to be sensed and controlled
remotely across existing network infrastructure, creating
opportunities for more direct integration between the
physical world and computer-based systems, and resulting
in improved efficiency, accuracy and economic benefit.
4. “Things” in IoT
• "Things," in the IoT sense, can refer to a wide
variety of devices such as heart monitoring
implants, biochip transponders on farm animals,
electric clams in coastal waters, automobiles with
built-in sensors, DNA analysis devices for environmental/food/pathogen monitoring or
field operation devices that assist fire-fighters in search and rescue operations.
• These devices collect useful data with the help of various existing technologies and
then autonomously flow the data between other devices.
5.
6. History of IoT
• The concept of the Internet of Things first became popular in 1999,
through the Auto-ID Centre at MIT and related market-analysis
publications.
• Radio-frequency identification (RFID) was seen as a prerequisite for
the IoT at that point. If all objects and people in
daily life were equipped with identifiers, computers could manage
and inventory them. Besides using RFID, the tagging may be
achieved through such technologies as near field communication,
barcodes, QR codes, Bluetooth, and digital watermarking.
7. Various Names, One Concept
M2M (Machine to Machine)
“Internet of Everything” (Cisco Systems)
“World Size Web” (Bruce Schneider)
“Skynet” (Terminator movie)
9. IoT Explained (How IoT works??)
A complete IoT system integrates four distinct components: sensors/devices, connectivity, data
processing, and a user interface.
Sensors/Devices : First, sensors or devices collect data from their environment. This could be as
simple as a temperature reading or as complex as a full video feed(in case of IP Camera). In this
first step data is being collected from the environment .
Connectivity: Next, that data is sent to the cloud , but it needs a way to get there.. The
sensors/devices can be connected to the cloud through a variety of methods including: cellular,
satellite, Wi-Fi, Bluetooth, low-power wide-area networks (LPWAN), or connecting directly to the
internet via ethernet. Here , we have to Choose which connectivity option is best to the specific IoT
application, they all accomplish the same task: getting data to the cloud.
Data Processing: Once the data gets to the cloud, software performs some kind of processing on it.
10. This could be very simple, such as checking that the temperature reading is within an acceptable
range. Or it could also be very complex, such as using computer vision on video to identify objects
(such as intruders in your house).
But what happens when the temperature is too high or if there is an intruder in your house? That’s
where the user comes in.
User Interface: Next, the information is sent to the end-user in some way. This could be via an
alert to the user (email, text, notification, etc). For example, a text alert when the temperature is too
high in the company’s cold storage. it’s not always a one-way street. Depending on the IoT
application, the user may also be able to perform an action and affect the system. For example, the
user might remotely adjust the temperature in the cold storage via an app on their phone.
And some actions are performed automatically. rather than just call you to alert you of an
intruder, the IoT system could also automatically notify relevant authorities.
12. The Future of IoT
"The Sky's not the limit. It's only the beginning with IoT."
13. Unlock the Massive potential of IoT
IoT is modern technology in IT
or technology industry .So
there are huge area to improve
performance .
And maintaining cost of IoT is
very high. So normal people
cannot easily afford this
technology where it is very
needful for security purpose.
So cost(maintaining) should be
reduced.
And from corporate side there
need a new strategy to get
more revenue from this
technology & as well some
innovative services also
needed in today’s era.
14. Applications of IoT
Smart Propane Tank
This super smart propane
tank gauge connects to an
app on your mobile device
so no matter where you
are, you’ll always know
when it’s time to refuel.
15. Glucose Monitoring
A cellular-powered glucose
meter transmits each test
result to a secure server
and provides instant
feedback and coaching to
patients. This equips
doctors, nurses, diabetes
educators with real-time
clinical data.
16. Hydroponic System
Niwa is the first fully automated
hydroponic system that attends
to all of your plants’ needs and
water them, feed them and make
sure they have optimal growing
conditions 24/7.
17. Smart Home Security
Canary is a complete security
system packed into a single,
device. It adapts to your home
over time and sendsintelligent
notifications with HD video
directly to your smartphone.
18. Blood Pressure Monitor
Simply slip on the cuff, turn on
the Wireless Blood Pressure
Monitor and the Health Mate app
will automatically launch.
19. Smart Socks
Socks infused with proprietary
100%textile sensors. They are
paired with a Bluetooth Smart
cool and detachable anklet
that delivers accuracy instep
counting, speed, calories, altitude
and distance tracking.
20. Smart Doorlock
The Genie Smart Lock -A door
lock that allows you to lock and
unlock your home using your
smart phone, bluetooth keyringor
computer.
21. Attacking IoT
Default, weak, and hardcoded credentials
Difficult to update firmware and OS
Lack of vendor support for repairing vulnerabilities
Vulnerable web interfaces (SQL injection, XSS)
Coding errors (buffer overflow)
Clear text protocols and unnecessary open ports
DoS / DDoS
Physical theft and tampering.
22. Case Study: Trane
Connected thermostat vulnerabilities
detected by Cisco’s Talos group
allowed foothold into network
12 months to publish fixes for 2
vulnerabilities
21 months to publish fix for 1
vulnerability
Device owners may not be aware of
fixes, or have the skill to install
updates
23. Case Study: Lessons Learned
All software can contain
vulnerabilities.
Public not informed for months
Vendors may delay or ignore issues
Product lifecycles and end-of-
support
Patching IoT devices may not scale in
large environments
24. Recommendations
Plan for IoT growth:
Additional types of logging, log storage: Can you find
the needle in the haystack?
Increased network traffic.
Increase use for IP address IPv6
Increased network complexity – should these devices
be isolated or segmented.
25. Threat vs. Opportunity
If misunderstood and misconfigured, IoT poses risk to our
data, privacy, and safety.
If understood and secured, IoT will enhance communications,
lifestyle, and delivery of services.