Professional Documents
Culture Documents
Industrial Iot Notes
Industrial Iot Notes
humidity, etc.
16mark
“Things” in IoT
Things refer to IoT devices with unique identities that have actuating, monitoring, and remote
sensing capabilities. Things are the primary component of IoT applications.
IoT devices can be of various types, including smartwatches, sensing devices, smart
electronics appliances, automobiles, wearable sensors, and industrial machines. IoT devices
generate data in some form which leads to useful information when processed.
Interesting Post: IoT Sensors – Developing Safer, Smarter & Reliable Solutions for
Businesses
Building connections
Data processing
Providing storage
Providing interfaces
Providing graphical interfaces
The devices generate data, and the data is used to perform analysis and do operations for
improving the system. For instance, a moisture sensor is used to obtain the moisture data
from a location, and the system analyses it to give an output.
o Request-response model
o Push-pull model
o Publish-subscribe model
o Client-server
o Stateless
o Cacheable
IoT Protocols
The set of rules governing all direct or indirect exchange of data between computers on a
network. These rules are formulated at the application level and are used collectively to
define how devices communicate interoperably, irrespective of differences in their internal
designs and operations.
IoT protocols help send commands and data between a network of devices controlled by
sensors or other physical attributes like motion, temperature, or vibration. Network protocols
help achieve reliable data transfer across all layers like the application, transport, network,
and link layer.
Industrial IOT
various IoT devices communicate with each other. Communication models used in
IoT have great value. The IoTs allow people and things to be connected any time,
any space, with anything and anyone, using any network and any service.
Types of Communication Model :
1. Request & Response Model –
This model follows a client-server architecture.
The client, when required, requests the information from the server. This
request is usually in the encoded format.
This model is stateless since the data between the requests is not retained
and each request is independently handled.
The server Categories the request, and fetches the data from the database
and its resource representation. This data is converted to response and is
transferred in an encoded format to the client. The client, in turn, receives
the response.
On the other hand — In Request-Response communication model client
sends a request to the server and the server responds to the request. When
the server receives the request it decides how to respond, fetches the data
retrieves resources, and prepares the response, and sends it to the client.
2. Publisher-Subscriber Model –
This model comprises three entities: Publishers, Brokers, and Consumers.
Publishers are the source of data. It sends the data to the topic which are
managed by the broker. They are not aware of consumers.
Consumers subscribe to the topics which are managed by the broker.
Hence, Brokers responsibility is to accept data from publishers and send it
to the appropriate consumers. The broker only has the information
regarding the consumer to which a particular topic belongs to which the
publisher is unaware of.
Industrial IOT
3. Push-Pull Model –
The push-pull model constitutes data publishers, data consumers, and data queues.
Publishers and Consumers are not aware of each other.
Publishers publish the message/data and push it into the queue. The
consumers, present on the other side, pull the data out of the queue. Thus,
the queue acts as the buffer for the message when the difference occurs in
the rate of push or pull of data on the side of a publisher and consumer.
Queues help in decoupling the messaging between the producer and
consumer. Queues also act as a buffer which helps in situations where
there is a mismatch between the rate at which the producers push the data
and consumers pull the data.
4. Exclusive Pair –
Industrial IOT
turning our global rights into a greater switched-on area to live in.
There are various types of challenges in front of IoT.
Security challenges in IoT :
1. Lack of encryption –
Although encryption is a great way to prevent hackers from accessing data,
it is also one of the leading IoT security challenges.
These drives like the storage and processing capabilities that would be
found on a traditional computer.
The result is an increase in attacks where hackers can easily manipulate the
algorithms that were designed for protection.
2. Insufficient testing and updating –
With the increase in the number of IoT(internet of things) devices, IoT
manufacturers are more eager to produce and deliver their device as fast as
they can without giving security too much of although.
Most of these devices and IoT products do not get enough testing and
updates and are prone to hackers and other security issues.
3. Brute forcing and the risk of default passwords –
Weak credentials and login details leave nearly all IoT devices vulnerable to
password hacking and brute force.
Any company that uses factory default credentials on their devices is
placing both their business and its assets and the customer and their
valuable information at risk of being susceptible to a brute force attack.
4. IoT Malware and ransomware –
Increases with increase in devices.
Ransomware uses encryption to effectively lock out users from various
devices and platforms and still use a user’s valuable data and info.
Example –
A hacker can hijack a computer camera and take pictures.
By using malware access points, the hackers can demand ransom to unlock
the device and return the data.
5. IoT botnet aiming at cryptocurrency –
IoT botnet workers can manipulate data privacy, which could be massive
risks for an open Crypto market. The exact value and creation of
cryptocurrencies code face danger from mal-intentioned hackers.
The blockchain companies are trying to boost security. Blockchain
technology itself is not particularly vulnerable, but the app development
process is.
6. Inadequate device security : Inadequate device security refers to the lack
of proper measures to protect electronic devices such as computers,
smartphones, and IoT devices from cyber attacks, hacking, data theft, and
unauthorized access. This can happen due to outdated software, weak
passwords, unpatched vulnerabilities, lack of encryption, and other security
risks. It is important to regularly update the software and implement strong
security measures to ensure the security and privacy of sensitive
information stored on these devices. Many IoT devices have weak security
features and can be easily hacked.
Industrial IOT
2. Data storage: Ensuring that the data collected by IoT devices is stored
securely and that access to it is strictly controlled.
3. Data sharing: Controlling who has access to the data collected by IoT
devices and ensuring that it is not shared without proper authorization.
To address these privacy challenges, organizations should implement robust
privacy policies and procedures, such as data protection, data minimization, and
data retention. They should also educate users on the privacy implications of using
IoT devices and encourage them to take steps to protect their privacy.
Additionally, organizations should adopt privacy-enhancing technologies, such as
encryption and anonymization, to protect the privacy of individuals whose
information is collected by IoT devices. By prioritizing privacy, organizations can
help to ensure that individuals’ rights and freedoms are respected, and that
sensitive information is protected from unauthorized access or misuse. Protecting the
privacy of individuals whose personal information is collected and
transmitted by IoT devices.
Battery life is a limitation –
Issues in packaging and integration of small-sized chip with low weight and
less power consumption. If you’ve been following the mobile space, you’ve
likely see how every yr it looks like there’s no restriction in terms of display
screen size. Take the upward thrust of ‘phablets’, for instance, which can be
telephones nearly as huge as tablets. Although helpful, the bigger monitors
aren’t always only for convenience, rather, instead, display screen sizes are
growing to accommodate larger batteries. Computers have getting slimmer,
but battery energy stays the same.
Increased cost and time to market –
Embedded systems are lightly constrained by cost.
The need originates to drive better approaches when designing the IoT
devices in order to handle the cost modelling or cost optimally with digital
electronic components.
Designers also need to solve the design time problem and bring the
embedded device at the right time to the market.
Security of the system –
Systems have to be designed and implemented to be robust and reliable and
have to be secure with cryptographic algorithms and security procedures.
It involves different approaches to secure all the components of embedded
systems from prototype to deployment.
Designers and engineers must carefully balance these design challenges to create IoT
systems that are functional, secure, and scalable.
Deployment challenges in IoT :
The deployment of Internet of Things (IoT) systems can present several challenges,
including:
1. Connectivity –
It is the foremost concern while connecting devices, applications and cloud
platforms.
Connected devices that provide useful front and information are extremely
Industrial IOT
valuable. But poor connectivity becomes a challenge where IoT sensors are
required to monitor process data and supply information.
2. Cross platform capability –
IoT applications must be developed, keeping in mind the technological
changes of the future.
Its development requires a balance of hardware and software functions.
It is a challenge for IoT application developers to ensure that the device and
IoT platform drivers the best performance despite heavy device rates and
fixings.
3. Data collection and processing –
In IoT development, data plays an important role. What is more critical here
is the processing or usefulness of stored data.
Along with security and privacy, development teams need to ensure that
they plan well for the way data is collected, stored or processed within an
environment.
4. Lack of skill set –
All of the development challenges above can only be handled if there is a
proper skilled resource working on the IoT application development.
The right talent will always get you past the major challenges and will be an
important IoT application development asset.
5. Integration: Ensuring that IoT devices and systems integrate seamlessly
with existing technology and infrastructure.
6. Network infrastructure: Building and maintaining the network
infrastructure needed to support the large number of connected IoT devices.
7. Device management: Efficiently managing and maintaining the large
number of IoT devices in a deployment.
8. Data management: Managing and analyzing the large amounts of data
generated by IoT devices, and integrating it with existing data systems.
9. Security: Ensuring that the IoT deployment is secure from threats such as
cyber attacks, data breaches, and unauthorized access.
10. Cost: Balancing the cost of deploying and maintaining an IoT system with
the benefits it delivers.
To address these deployment challenges, organizations should adopt a structured
and well-planned deployment approach, involving the careful selection of
hardware and software components, careful planning of the network infrastructure,
and the development of a robust security strategy. They should also
implement efficient device and data management systems, and seek to maximize the
return on investment by choosing cost-effective solutions. By approaching
deployment in a structured and well-planned manner, organizations can help ensure
that their IoT systems deliver the intended benefits and results.
Industrial IOT
ARPANET was the first connected network – granddad of the Internet as we know it today.
The history of IoT starts with ARPANET.
He was helped in this endeavor by Mike Kazar and Ivor Durham, two fellow students, and
John Zsarnay, a research engineer at the university. The code they wrote could check if coke
was available in the vending machine, and if yes, whether it was cold or not. Anyone on the
university ARPANET could monitor the status of the coke vending machine.
In 1989 Tim Berners Lee proposed the framework of world wide web, which laid the
foundation of the Internet.
In 1990 John Romkey developed a toaster that could be turned on and off over the Internet. It
was a toaster wired to the computer as there was no Wi-Fi then!! This toaster is considered to
be the first IoT device – the first “thing” that began Internet of Things.
Researchers and scientists seem to have a thing for caffeine – cold or hot. In 1993, the Trojan
Room Coffee Pot was built in the computer laboratory of the University of Cambridge by
Quentin Stafford-Fraser and Paul Jardetzky in 1993. An image of the interior of the pot was
uploaded to the building server thrice every minute. Later on, when browsers began
displaying images, these images could be viewed online.
The next milestone in development of IoT came in 1999 when Kevin Ashton, current
Executive Director of the Auto-ID Labs, coined the term internet of things. It was the title of
a presentation he made at Procter and Gamble (where he was working at that point of time)
about linking RFID in P&G’s supply chain to the Internet.
The term IoT began to be used in mainstream publications like The Guardian and Scientific
American by 2003-2004. In the same period RFID deployed by the US department of
Defence and by Walmart in its stores.
In March 2008, the first IoT conference was held in Zurich. It brought together researchers
and practitioners from both academia and industry to facilitate sharing of knowledge. In the
Industrial IOT
same year, the US National Intelligence Council included the Internet of Things as one of the
six disruptive civil technologies.
In its 2011 white paper, Cisco Internet Business Solutions Group (CIBSG) said that internet
of things can truly be said to be born between 2008 and 2009 when the number of things
connected to the internet exceeded the number of people connected to it. CIBSG calculated
that the things to people ratio grew from approximately 0.8 in 2003 to 1.84 in 2010.
Together with the white paper, Cisco released many educational materials on the topic and
started marketing initiatives to attract clients looking to adopt IoT. IBM and Ericsson joined
the race soon after.
In 2011 Gartner included IoT in its Hype cycle for emerging technologies that were on the
rise.
In 2013 IDC released a report that predicted IoT market to grow at a CAGR of 7.9% and
reach USD 8.9 trillion by 2020.
Industrial IOT
Industrial IOT
uture of IoT
According to Statista, the total number of installed connected devices is expected to be 75.4
billion globally by 2025. This would be five times increase since 2015.
These numbers indicate that the future of IoT promises to be more innovative and
revolutionary as compared to the present. That more and more domains would be embracing
IoT is a foregone conclusion. Let’s discuss some of the trends that will change the face of
IoT:
5G integration
2020 has already seen testing of 5G by many companies. IoT architecture will be integrating
5G into systems, new as well as old. 5G would enhance capabilities of existing networks
manifolds. 5G would not be replacing the existing network but enhancing its capabilities. Old
or new, 5G would be enable transmission of data to and from cloud servers at lightning
speed.
Single interface
As discussed earlier, more and more devices with varieties of capabilities are joining the IoT
networks every second. users — individuals or Enterprises — would need a single interface
that provides them end to end access instead of a basket of remotes and interfaces.
Data privacy and security is going to be even more important. Historically data security has
been implemented at device level be it a smartphone or a laptop or a any other smart device
connected to the IoT network. However, in future privacy and security measures would be
implemented at multiple layers between IoT endpoints.
The key driver of any IoT system is the data generated by it. Companies providing products
would gradually move towards services around insights provided by the data.
anything that can be connected to internet and can be controlled / monitored using
Internet from our smart devices or PCs.
The “things” specified here can be anything from small tracking chips to actual
smart cars on road, all these can be categorized as IOT. All things that are connected
to internet are assigned with IP to it so that it can be monitored uniquely using
internet. The embedded systems and technology are the objects that help in
realization of successful IOT.
Why to use IOT ?
Everything can be connected to internet and can be controlled from internet. Systems
can be automated so that sensors upload data continuously to cloud and various
algorithms (like Machine Learning Techniques) can be applied to this data so that
we can analyse the data properly and produce efficient outputs. And based on
results, the clouds can perform pre-defined actions in response to sensor data.
Security can be enhanced from our smart devices as we can keep an eye at our
homes, work places etc. Automated rapid responses like in industries when certain
parameters get disturbed automatically actions are triggered to counter the effect.
(License plate recognition used in Traffic systems). Monitor places where
surveillance is difficult.
IOT in Agriculture, Health Care etc.
Smart Wearables, Vehicles and cars.
Smart Grids and Industries.
Smart cities and Smart Grids.
Major Components of IOT:
These are explained as following below.
1. Things or Device
These are fitted with sensors and actuators. Sensors collect data from the
environment and give to gateway where as actuators performs the action
Industrial IOT
3. Standards:
There are no proper standards and documentations discussing the best
practices.
4. Regulation:
Legal issues with Int involves cross border data flow, data retention and
destruction policies etc.
5. Development:
It should be expanded and implemented to even developing and under
developed countries instead of focusing only on developed countries.
6.iot architect
Internet of Things (IoT) technology has a wide variety of applications and use of
Internet of Things is growing so faster. Depending upon different application areas
of Internet of Things, it works accordingly as per it has been designed/developed.
But it has not a standard defined architecture of working which is strictly followed
universally. The architecture of IoT depends upon its functionality and
implementation in different sectors. Still, there is a basic process flow based on
which IoT is built.
So. here in this article we will discuss basic fundamental architecture of IoT i.e., 4
Stage IoT architecture.
So, from the above image it is clear that there is 4 layers are present that can be
divided as follows: Sensing Layer, Network Layer, Data processing Layer, and
Application Layer.
These are explained as following below.
1. Sensing Layer –
The sensing layer is the first layer of the IoT architecture and is
responsible for collecting data from different sources. This layer includes
sensors and actuators that are placed in the environment to gather
Industrial IOT
as the industrial internet or Industry 4.0, IIoT uses the power of smart
machines and real-time analytics to take advantage of the data that "dumb
machines" have produced in industrial settings for years. The driving
philosophy behind IIoT is that smart machines are not only better than
humans at capturing and analyzing data in real time, but they're also better
at communicating important information that can be used to drive business
decisions faster and more accurately.
storage for the data that is generated by the IIoT devices; and
people.
IIoT infrastructure components include the IoT or edge gateway, sensors, actuators and
edge nodes.
The agriculture industry makes extensive use of IIoT devices, too. Industrial
sensors collect data about soil nutrients, moisture and more, enabling
farmers to produce an optimal crop.
The oil and gas industry also uses industrial IoT devices. Some oil
companies maintain a fleet of autonomous aircraft that can use visual and
thermal imaging to detect potential problems in pipelines. This information
is combined with data from other types of sensors to ensure safe
operations.
Another benefit is more efficient field service. IIoT technologies help field
service technicians identify potential issues in customer equipment before
they become major issues, enabling techs to fix the problems before they
inconvenience customers. These technologies might also provide field
service technicians with information about which parts they need to make a
repair. That way, the technician has the necessary parts with them when
making a service call.
IIoT also allows for enhanced customer satisfaction. When products are
connected to the internet of things, the manufacturer can capture and
analyze data about how customers use their products, enabling
manufacturers and product designers to build more customer-centric
product roadmaps.
Is IIoT secure?
Early on, manufacturers created IoT devices with little regard for security,
resulting in a perception that IoT devices are inherently insecure. Given the
Industrial IOT
similarities between IoT and IIoT devices, it's worth considering whether it's
safe to use IIoT devices.
IIoT applications, on the other hand, connect machines and devices in such
industries as oil and gas, utilities and manufacturing. System failures and
downtime in IIoT deployments can result in high-risk situations, or even life-
threatening ones. IIoT applications are also more concerned with improving
efficiency and improving health or safety, versus the user-centric nature of
IoT applications.
IIoT is used in many industries and sectors, including robotics, manufacturing and smart
cities.
The emergence of 5G will likely affect the use of IIoT devices in two main
ways. First, 5G's high throughput and low latency will make it possible for
devices to share data in real time. Previously, this was only possible when
the devices were located on private networks with high-speed connectivity.
This real-time connectivity will support use cases such as driverless
cars and smart cities.
The other way 5G will affect IIoT adoption is that it will likely result in device
proliferation. Industrial operations might use thousands of 5G connected
devices. 5G's high speed and low latency also means we'll likely see IIoT
devices used in remote sites whose lack of high-speed connectivity
previously made IIoT use impractical.
Industry 1.0 was the first Industrial Revolution and occurred in the late
1700s as companies began to use water-powered or steam-powered
machines in manufacturing. Industry 2.0 started at the beginning of the
20th century and was brought about by the introduction of electricity and
assembly lines. Industry 3.0 occurred in the latter part of the 20th century
and was tied to the use of computers in the manufacturing process.
Industry 4.0 is where we are today. Industry 4.0 is based on the use of
connected electronic devices -- particularly, IIoT devices.
Going forward, IIoT devices will play a major role in digital transformations,
especially as organizations attempt to digitize their production lines and
supply chains. Additionally, big data analytics will evolve to incorporate IIoT
data. This will make it possible for organizations to detect changing
conditions in real time and respond accordingly.
Although IIoT devices have been around for several years, real-world
adoption is still in its infancy. This is sure to change as 5G becomes
increasingly prevalent and more and more organizations begin to realize
what IIoT can do for them. There are a number of resources available
online for organizations that want to get up to speed on IoT and IIoT.