SlideShare uma empresa Scribd logo
1 de 26
IoT
Internet Of Things
Presented by :-
IT-3rd Year
Anindya Sundar De
Gopal Basak
Rashbihari Halder
Agnish Majumder
What is IoT ??
• The Internet of Things (IoT) is the network of physical
objects or "things" embedded with electronics, software,
sensors, and network connectivity, it enables these objects
to collect and exchange data.
• IoT allows objects to be sensed and controlled
remotely across existing network infrastructure, creating
opportunities for more direct integration between the
physical world and computer-based systems, and resulting
in improved efficiency, accuracy and economic benefit.
“Things” in IoT
• "Things," in the IoT sense, can refer to a wide
variety of devices such as heart monitoring
implants, biochip transponders on farm animals,
electric clams in coastal waters, automobiles with
built-in sensors, DNA analysis devices for environmental/food/pathogen monitoring or
field operation devices that assist fire-fighters in search and rescue operations.
• These devices collect useful data with the help of various existing technologies and
then autonomously flow the data between other devices.
History of IoT
• The concept of the Internet of Things first became popular in 1999,
through the Auto-ID Centre at MIT and related market-analysis
publications.
• Radio-frequency identification (RFID) was seen as a prerequisite for
the IoT at that point. If all objects and people in
daily life were equipped with identifiers, computers could manage
and inventory them. Besides using RFID, the tagging may be
achieved through such technologies as near field communication,
barcodes, QR codes, Bluetooth, and digital watermarking.
Various Names, One Concept
M2M (Machine to Machine)
“Internet of Everything” (Cisco Systems)
“World Size Web” (Bruce Schneider)
“Skynet” (Terminator movie)
Various things, One controller
IoT Explained (How IoT works??)
A complete IoT system integrates four distinct components: sensors/devices, connectivity, data
processing, and a user interface.
 Sensors/Devices : First, sensors or devices collect data from their environment. This could be as
simple as a temperature reading or as complex as a full video feed(in case of IP Camera). In this
first step data is being collected from the environment .
 Connectivity: Next, that data is sent to the cloud , but it needs a way to get there.. The
sensors/devices can be connected to the cloud through a variety of methods including: cellular,
satellite, Wi-Fi, Bluetooth, low-power wide-area networks (LPWAN), or connecting directly to the
internet via ethernet. Here , we have to Choose which connectivity option is best to the specific IoT
application, they all accomplish the same task: getting data to the cloud.
 Data Processing: Once the data gets to the cloud, software performs some kind of processing on it.
This could be very simple, such as checking that the temperature reading is within an acceptable
range. Or it could also be very complex, such as using computer vision on video to identify objects
(such as intruders in your house).
But what happens when the temperature is too high or if there is an intruder in your house? That’s
where the user comes in.
 User Interface: Next, the information is sent to the end-user in some way. This could be via an
alert to the user (email, text, notification, etc). For example, a text alert when the temperature is too
high in the company’s cold storage. it’s not always a one-way street. Depending on the IoT
application, the user may also be able to perform an action and affect the system. For example, the
user might remotely adjust the temperature in the cold storage via an app on their phone.
And some actions are performed automatically. rather than just call you to alert you of an
intruder, the IoT system could also automatically notify relevant authorities.
Current Status &Future Prospect of IoT
The Future of IoT
"The Sky's not the limit. It's only the beginning with IoT."
Unlock the Massive potential of IoT
IoT is modern technology in IT
or technology industry .So
there are huge area to improve
performance .
And maintaining cost of IoT is
very high. So normal people
cannot easily afford this
technology where it is very
needful for security purpose.
So cost(maintaining) should be
reduced.
And from corporate side there
need a new strategy to get
more revenue from this
technology & as well some
innovative services also
needed in today’s era.
Applications of IoT
Smart Propane Tank
This super smart propane
tank gauge connects to an
app on your mobile device
so no matter where you
are, you’ll always know
when it’s time to refuel.
Glucose Monitoring
A cellular-powered glucose
meter transmits each test
result to a secure server
and provides instant
feedback and coaching to
patients. This equips
doctors, nurses, diabetes
educators with real-time
clinical data.
Hydroponic System
Niwa is the first fully automated
hydroponic system that attends
to all of your plants’ needs and
water them, feed them and make
sure they have optimal growing
conditions 24/7.
Smart Home Security
Canary is a complete security
system packed into a single,
device. It adapts to your home
over time and sendsintelligent
notifications with HD video
directly to your smartphone.
Blood Pressure Monitor
Simply slip on the cuff, turn on
the Wireless Blood Pressure
Monitor and the Health Mate app
will automatically launch.
Smart Socks
Socks infused with proprietary
100%textile sensors. They are
paired with a Bluetooth Smart
cool and detachable anklet
that delivers accuracy instep
counting, speed, calories, altitude
and distance tracking.
Smart Doorlock
The Genie Smart Lock -A door
lock that allows you to lock and
unlock your home using your
smart phone, bluetooth keyringor
computer.
Attacking IoT
Default, weak, and hardcoded credentials
Difficult to update firmware and OS
Lack of vendor support for repairing vulnerabilities
Vulnerable web interfaces (SQL injection, XSS)
Coding errors (buffer overflow)
Clear text protocols and unnecessary open ports
DoS / DDoS
Physical theft and tampering.
Case Study: Trane
Connected thermostat vulnerabilities
detected by Cisco’s Talos group
allowed foothold into network
12 months to publish fixes for 2
vulnerabilities
21 months to publish fix for 1
vulnerability
Device owners may not be aware of
fixes, or have the skill to install
updates
Case Study: Lessons Learned
 All software can contain
vulnerabilities.
 Public not informed for months
 Vendors may delay or ignore issues
 Product lifecycles and end-of-
support
Patching IoT devices may not scale in
large environments
Recommendations
Plan for IoT growth:
 Additional types of logging, log storage: Can you find
the needle in the haystack?
 Increased network traffic.
 Increase use for IP address IPv6
 Increased network complexity – should these devices
be isolated or segmented.
Threat vs. Opportunity
If misunderstood and misconfigured, IoT poses risk to our
data, privacy, and safety.
If understood and secured, IoT will enhance communications,
lifestyle, and delivery of services.
For
For your kind attention …

Mais conteúdo relacionado

Mais procurados

Internet of Things Connectivity for Embedded Devices
Internet of Things Connectivity for Embedded DevicesInternet of Things Connectivity for Embedded Devices
Internet of Things Connectivity for Embedded Devicesmentoresd
 
Internet Of Things
Internet Of ThingsInternet Of Things
Internet Of ThingsRohan M
 
Internet of things (iot)
Internet of things (iot)Internet of things (iot)
Internet of things (iot)shubhamyadav613
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)asfaw Alene
 
Internet of Things: Challenges and Issues
Internet of Things: Challenges and IssuesInternet of Things: Challenges and Issues
Internet of Things: Challenges and Issuesrjain51
 
Getting Started with the NodeMCU- Getting started with Internet of Things (Io...
Getting Started with the NodeMCU- Getting started with Internet of Things (Io...Getting Started with the NodeMCU- Getting started with Internet of Things (Io...
Getting Started with the NodeMCU- Getting started with Internet of Things (Io...AkshetPatel
 
Internet of Things -Indoor Environmental Monitoring And Control System
Internet of Things -Indoor Environmental Monitoring And Control SystemInternet of Things -Indoor Environmental Monitoring And Control System
Internet of Things -Indoor Environmental Monitoring And Control Systemsalim lakade
 
Tips on designing for the Internet of Things
Tips on designing for the Internet of ThingsTips on designing for the Internet of Things
Tips on designing for the Internet of ThingsDesign World
 
Internet of things –
Internet of things –Internet of things –
Internet of things –Mathews Job
 
A Technical Introduction to The Internet of Things
A Technical Introduction to The Internet of ThingsA Technical Introduction to The Internet of Things
A Technical Introduction to The Internet of ThingsAPNIC
 
Disrupting and Enhancing Healthcare with the Internet of Things
Disrupting and Enhancing Healthcare with the Internet of ThingsDisrupting and Enhancing Healthcare with the Internet of Things
Disrupting and Enhancing Healthcare with the Internet of Thingstodbotdotcom
 
What Is IoT, IoT Testing And What Are Its Challenges | BugRaptors
What Is IoT, IoT Testing And What Are Its Challenges | BugRaptorsWhat Is IoT, IoT Testing And What Are Its Challenges | BugRaptors
What Is IoT, IoT Testing And What Are Its Challenges | BugRaptorsBugRaptors
 
Meetup9 iot sensors and security
Meetup9 iot sensors and securityMeetup9 iot sensors and security
Meetup9 iot sensors and securityFrancesco Rago
 
IoT - What is it ?
IoT -  What is it ?IoT -  What is it ?
IoT - What is it ?Mirco Vanini
 
Internet of things (IOT) Presentation-PPT
Internet of things (IOT) Presentation-PPTInternet of things (IOT) Presentation-PPT
Internet of things (IOT) Presentation-PPTCharan Vimala
 

Mais procurados (20)

Internet of Things Connectivity for Embedded Devices
Internet of Things Connectivity for Embedded DevicesInternet of Things Connectivity for Embedded Devices
Internet of Things Connectivity for Embedded Devices
 
Internet Of Things
Internet Of ThingsInternet Of Things
Internet Of Things
 
Internet of things (iot)
Internet of things (iot)Internet of things (iot)
Internet of things (iot)
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 
Internet of Things: Challenges and Issues
Internet of Things: Challenges and IssuesInternet of Things: Challenges and Issues
Internet of Things: Challenges and Issues
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Getting Started with the NodeMCU- Getting started with Internet of Things (Io...
Getting Started with the NodeMCU- Getting started with Internet of Things (Io...Getting Started with the NodeMCU- Getting started with Internet of Things (Io...
Getting Started with the NodeMCU- Getting started with Internet of Things (Io...
 
Internet of Things -Indoor Environmental Monitoring And Control System
Internet of Things -Indoor Environmental Monitoring And Control SystemInternet of Things -Indoor Environmental Monitoring And Control System
Internet of Things -Indoor Environmental Monitoring And Control System
 
Tips on designing for the Internet of Things
Tips on designing for the Internet of ThingsTips on designing for the Internet of Things
Tips on designing for the Internet of Things
 
Internet of things –
Internet of things –Internet of things –
Internet of things –
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
A Technical Introduction to The Internet of Things
A Technical Introduction to The Internet of ThingsA Technical Introduction to The Internet of Things
A Technical Introduction to The Internet of Things
 
Disrupting and Enhancing Healthcare with the Internet of Things
Disrupting and Enhancing Healthcare with the Internet of ThingsDisrupting and Enhancing Healthcare with the Internet of Things
Disrupting and Enhancing Healthcare with the Internet of Things
 
What Is IoT, IoT Testing And What Are Its Challenges | BugRaptors
What Is IoT, IoT Testing And What Are Its Challenges | BugRaptorsWhat Is IoT, IoT Testing And What Are Its Challenges | BugRaptors
What Is IoT, IoT Testing And What Are Its Challenges | BugRaptors
 
Intelligent IoT Projects In 7 Days
Intelligent IoT Projects In 7 Days Intelligent IoT Projects In 7 Days
Intelligent IoT Projects In 7 Days
 
Meetup9 iot sensors and security
Meetup9 iot sensors and securityMeetup9 iot sensors and security
Meetup9 iot sensors and security
 
IoT - What is it ?
IoT -  What is it ?IoT -  What is it ?
IoT - What is it ?
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
Iot
IotIot
Iot
 
Internet of things (IOT) Presentation-PPT
Internet of things (IOT) Presentation-PPTInternet of things (IOT) Presentation-PPT
Internet of things (IOT) Presentation-PPT
 

Semelhante a Internet of things (IoT)

The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy AnkitThakkar46
 
The internet of things (io t)
The internet of things (io t)The internet of things (io t)
The internet of things (io t)shashankvaidyar2
 
IOT LADEN GHISING.pptx
IOT LADEN GHISING.pptxIOT LADEN GHISING.pptx
IOT LADEN GHISING.pptxrupasharma39
 
What is the Internet of Things? How does it Work?
What is the Internet of Things? How does it Work?What is the Internet of Things? How does it Work?
What is the Internet of Things? How does it Work?AbhijitVerma9
 
Presentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfPresentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfezzAyman1
 
Emerging chapter 4.pptx
Emerging chapter 4.pptxEmerging chapter 4.pptx
Emerging chapter 4.pptxAderawAlemie
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSomasundaram Jambunathan
 
Internet_of_Things.pptx
Internet_of_Things.pptxInternet_of_Things.pptx
Internet_of_Things.pptxzarakhalid20
 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Somasundaram Jambunathan
 
IRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: ReviewIRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: ReviewIRJET Journal
 

Semelhante a Internet of things (IoT) (20)

1. IoT.pptx
1. IoT.pptx1. IoT.pptx
1. IoT.pptx
 
The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy
 
The internet of things (io t)
The internet of things (io t)The internet of things (io t)
The internet of things (io t)
 
123456.pptx
123456.pptx123456.pptx
123456.pptx
 
IOT LADEN GHISING.pptx
IOT LADEN GHISING.pptxIOT LADEN GHISING.pptx
IOT LADEN GHISING.pptx
 
What is the Internet of Things? How does it Work?
What is the Internet of Things? How does it Work?What is the Internet of Things? How does it Work?
What is the Internet of Things? How does it Work?
 
Presentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfPresentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdf
 
Internet of things presentation
Internet of things presentationInternet of things presentation
Internet of things presentation
 
iot PPT.ppt
iot PPT.pptiot PPT.ppt
iot PPT.ppt
 
IOT VIVA QUESTION.pdf
IOT VIVA QUESTION.pdfIOT VIVA QUESTION.pdf
IOT VIVA QUESTION.pdf
 
iot_ppt.pptx
iot_ppt.pptxiot_ppt.pptx
iot_ppt.pptx
 
Unit 1 iot.pptx
Unit 1 iot.pptxUnit 1 iot.pptx
Unit 1 iot.pptx
 
The internet of things
The internet of thingsThe internet of things
The internet of things
 
Shubham hatzade
Shubham hatzadeShubham hatzade
Shubham hatzade
 
Emerging chapter 4.pptx
Emerging chapter 4.pptxEmerging chapter 4.pptx
Emerging chapter 4.pptx
 
Questions in iot
Questions in iotQuestions in iot
Questions in iot
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of Things
 
Internet_of_Things.pptx
Internet_of_Things.pptxInternet_of_Things.pptx
Internet_of_Things.pptx
 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4
 
IRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: ReviewIRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: Review
 

Último

UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 

Último (20)

UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 

Internet of things (IoT)

  • 2. Presented by :- IT-3rd Year Anindya Sundar De Gopal Basak Rashbihari Halder Agnish Majumder
  • 3. What is IoT ?? • The Internet of Things (IoT) is the network of physical objects or "things" embedded with electronics, software, sensors, and network connectivity, it enables these objects to collect and exchange data. • IoT allows objects to be sensed and controlled remotely across existing network infrastructure, creating opportunities for more direct integration between the physical world and computer-based systems, and resulting in improved efficiency, accuracy and economic benefit.
  • 4. “Things” in IoT • "Things," in the IoT sense, can refer to a wide variety of devices such as heart monitoring implants, biochip transponders on farm animals, electric clams in coastal waters, automobiles with built-in sensors, DNA analysis devices for environmental/food/pathogen monitoring or field operation devices that assist fire-fighters in search and rescue operations. • These devices collect useful data with the help of various existing technologies and then autonomously flow the data between other devices.
  • 5.
  • 6. History of IoT • The concept of the Internet of Things first became popular in 1999, through the Auto-ID Centre at MIT and related market-analysis publications. • Radio-frequency identification (RFID) was seen as a prerequisite for the IoT at that point. If all objects and people in daily life were equipped with identifiers, computers could manage and inventory them. Besides using RFID, the tagging may be achieved through such technologies as near field communication, barcodes, QR codes, Bluetooth, and digital watermarking.
  • 7. Various Names, One Concept M2M (Machine to Machine) “Internet of Everything” (Cisco Systems) “World Size Web” (Bruce Schneider) “Skynet” (Terminator movie)
  • 8. Various things, One controller
  • 9. IoT Explained (How IoT works??) A complete IoT system integrates four distinct components: sensors/devices, connectivity, data processing, and a user interface.  Sensors/Devices : First, sensors or devices collect data from their environment. This could be as simple as a temperature reading or as complex as a full video feed(in case of IP Camera). In this first step data is being collected from the environment .  Connectivity: Next, that data is sent to the cloud , but it needs a way to get there.. The sensors/devices can be connected to the cloud through a variety of methods including: cellular, satellite, Wi-Fi, Bluetooth, low-power wide-area networks (LPWAN), or connecting directly to the internet via ethernet. Here , we have to Choose which connectivity option is best to the specific IoT application, they all accomplish the same task: getting data to the cloud.  Data Processing: Once the data gets to the cloud, software performs some kind of processing on it.
  • 10. This could be very simple, such as checking that the temperature reading is within an acceptable range. Or it could also be very complex, such as using computer vision on video to identify objects (such as intruders in your house). But what happens when the temperature is too high or if there is an intruder in your house? That’s where the user comes in.  User Interface: Next, the information is sent to the end-user in some way. This could be via an alert to the user (email, text, notification, etc). For example, a text alert when the temperature is too high in the company’s cold storage. it’s not always a one-way street. Depending on the IoT application, the user may also be able to perform an action and affect the system. For example, the user might remotely adjust the temperature in the cold storage via an app on their phone. And some actions are performed automatically. rather than just call you to alert you of an intruder, the IoT system could also automatically notify relevant authorities.
  • 11. Current Status &Future Prospect of IoT
  • 12. The Future of IoT "The Sky's not the limit. It's only the beginning with IoT."
  • 13. Unlock the Massive potential of IoT IoT is modern technology in IT or technology industry .So there are huge area to improve performance . And maintaining cost of IoT is very high. So normal people cannot easily afford this technology where it is very needful for security purpose. So cost(maintaining) should be reduced. And from corporate side there need a new strategy to get more revenue from this technology & as well some innovative services also needed in today’s era.
  • 14. Applications of IoT Smart Propane Tank This super smart propane tank gauge connects to an app on your mobile device so no matter where you are, you’ll always know when it’s time to refuel.
  • 15. Glucose Monitoring A cellular-powered glucose meter transmits each test result to a secure server and provides instant feedback and coaching to patients. This equips doctors, nurses, diabetes educators with real-time clinical data.
  • 16. Hydroponic System Niwa is the first fully automated hydroponic system that attends to all of your plants’ needs and water them, feed them and make sure they have optimal growing conditions 24/7.
  • 17. Smart Home Security Canary is a complete security system packed into a single, device. It adapts to your home over time and sendsintelligent notifications with HD video directly to your smartphone.
  • 18. Blood Pressure Monitor Simply slip on the cuff, turn on the Wireless Blood Pressure Monitor and the Health Mate app will automatically launch.
  • 19. Smart Socks Socks infused with proprietary 100%textile sensors. They are paired with a Bluetooth Smart cool and detachable anklet that delivers accuracy instep counting, speed, calories, altitude and distance tracking.
  • 20. Smart Doorlock The Genie Smart Lock -A door lock that allows you to lock and unlock your home using your smart phone, bluetooth keyringor computer.
  • 21. Attacking IoT Default, weak, and hardcoded credentials Difficult to update firmware and OS Lack of vendor support for repairing vulnerabilities Vulnerable web interfaces (SQL injection, XSS) Coding errors (buffer overflow) Clear text protocols and unnecessary open ports DoS / DDoS Physical theft and tampering.
  • 22. Case Study: Trane Connected thermostat vulnerabilities detected by Cisco’s Talos group allowed foothold into network 12 months to publish fixes for 2 vulnerabilities 21 months to publish fix for 1 vulnerability Device owners may not be aware of fixes, or have the skill to install updates
  • 23. Case Study: Lessons Learned  All software can contain vulnerabilities.  Public not informed for months  Vendors may delay or ignore issues  Product lifecycles and end-of- support Patching IoT devices may not scale in large environments
  • 24. Recommendations Plan for IoT growth:  Additional types of logging, log storage: Can you find the needle in the haystack?  Increased network traffic.  Increase use for IP address IPv6  Increased network complexity – should these devices be isolated or segmented.
  • 25. Threat vs. Opportunity If misunderstood and misconfigured, IoT poses risk to our data, privacy, and safety. If understood and secured, IoT will enhance communications, lifestyle, and delivery of services.
  • 26. For For your kind attention …

Notas do Editor

  1. To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image.