Professional Documents
Culture Documents
Gbs c8 Iot Fixed-Min-Gbs
Gbs c8 Iot Fixed-Min-Gbs
Technology Literation
8. Internet of Things
Agenda
• History IoT
• Architecture IoT
• IoT Service Platforms
• Applied IoT (Part-1)
• Applied IoT (Part-2)
• IoT Security
• Trends and Research
2
3
3
4
4
5
History of IoT
Jamali, Jabraeil, et al. Towards the Internet of Things. Springer International Publishing, 2020.
5
6
https://www.cisco.com/c/dam/m/en_us/solutions/service-provider/vni-forecast-highlights/pdf/Global_2022_Forecast_Highlights.pdf
6
7
Agenda
• History IoT
• Architecture IoT
• IoT Service Platforms
• Applied IoT (Part-1)
• Applied IoT (Part-2)
• IoT Security
• Trends and Research
7
8
8
9
9
10
IoT Architecture
• Provide services required by customer.
Application • Span various sectors such as Smart Home, Smart Healthcare, Smart
Transportation, etc.
Alam, Mansaf, Kashish Ara Shakil, and Samiya Khan. "Internet of Things (IoT)." Springer International Publishing, 2020.
10
11
Agenda
• History IoT
• Architecture IoT
• IoT Service Platforms
• Applied IoT (Part-1)
• Applied IoT (Part-2)
• IoT Security
• Trends and Research
11
12
Etc.
Google
IBM Watson
Cloud
IoT
Platform
Microsoft
Azure IoT
Amazon
Web Service
(AWS) IoT
12
13
Agenda
• History IoT
• Architecture IoT
• IoT Service Platforms
• Applied IoT (Part-1)
• Applied IoT (Part-2)
• IoT Security
• Trends and Research
13
14
Smart Infrastructure
• Smart Home
• Smart City
• Smart Factory/Industry
• Smart Grid
• Smart Healthcare
14
15
15
16
16
17
Agenda
• History IoT
• Architecture IoT
• IoT Service Platforms
• Applied IoT (Part-1)
• Applied IoT (Part-2)
• IoT Security
• Trends and Research
17
18
18
19
19
20
20
21
Agenda
• History IoT
• Architecture IoT
• IoT Service Platforms
• Applied IoT (Part-1)
• Applied IoT (Part-2)
• IoT Security
• Trends and Research
21
22
IoT Security
22
23
Industry
Groups
Standards
Addressing IoT Bodies
Security Challenges
Governments
23
24
Standards
Addressing IoT Bodies
Security Challenges
Governments
✓ Potential Economic
✓ Controlling Vendor
✓ Law
24
25
Authentication
Non-repudiation
Availability
Privacy
Confidentiality
25
26
Authorization
Authentication
Application
Exhaustion of
Resources
Establishment
MITM
Communication Eavesdropping
DoS/DDoS
Privacy
Data
Trust
26
Unsecured Secured 27
Internet Internet
MQTT Publisher MQTT Publisher MQTT Publisher MQTT Publisher MQTT Publisher MQTT Publisher
Registered Registered Unregistered Registered Registered Unregistered
Raspberry Pi Raspberry Pi Raspberry Pi Raspberry Pi Raspberry Pi Raspberry Pi
PIR Sensor IR Sensor PIR Sensor IR Sensor PIR Sensor IR Sensor PIR Sensor IR Sensor PIR Sensor IR Sensor PIR Sensor IR Sensor
27
28
Agenda
• History IoT
• Architecture IoT
• IoT Service Platforms
• Applied IoT (Part-1)
• Applied IoT (Part-2)
• IoT Security
• Trends and Research
28
29
29
30
30
31
31
32
32
33
33
34
References
34
35
Technology Literation
Thank You