Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

Unit -3

IoT Decision Framework


The IoT decision framework provides a structured approach to create a powerful
IoT product strategy. The IoT decision framework is all about the strategic
decision making. The IoT Decision Framework helps us to understand the areas
where we need to make decisions and ensures consistency across all of our
strategic business decision, technical and more.

The IoT decision framework is much more important as the product or services
communicates over networks goes through five different layers of complexity of
technology.

1. Device Hardware
2. Device Software
3. Communications
4. Cloud Platform
5. Cloud Application

Decision Area
The IoT decision framework pays attention to six key decision areas in any IoT
product. These decision areas are:

1. User Experience (UX)


2. Data
3. Business
4. Technology
5. Security
6. Standards & Regulations
1. User Experience Decision Area: This is the area where we concentrate
about who are the users, what are their requirements and how to provide a
great experience at each step of IoT stack .
2. Data Decision Area: In this area, we make the overall data strategy such
as the data flow over the entire IoT stack to fulfill the user's requirements.
3. Business Decision Area: Based on the previous decisions area, we make
the decision how product or services will became financial potential.
4. Technology Decision Area: In this area, we work with the technology for
each layer to facilitate the final solution.
5. Security Decision Area: After going through the implementation of
technology it is important to decide and provide the security at each stage
of the IoT Stack.
6. Standards & Regulations Decision Area: At the last stage of IoT
Decision Area, we identify the standards and regulations of product or
services that will affect your product at each layer of the IoT Stack.

Implementation of Device integration


Device integration is a crucial aspect of IoT (Internet of Things)
implementation, as it involves connecting and coordinating various IoT devices
to work together seamlessly. The process of implementing device integration in
IoT typically involves the following steps:
1. **Identify Devices and Their Communication Protocols:**
• Begin by identifying the IoT devices that need to be integrated into the
IoT ecosystem. Determine the types of sensors, actuators, and other
hardware components that will be part of the network.
• Understand the communication protocols used by these devices, as they
may use different standards such as Wi-Fi, Bluetooth, Zigbee, LoRa,
cellular, or proprietary protocols.
2. **Select an IoT Platform or Middleware:**
• Choose an IoT platform or middleware that will serve as the central
hub for device management and data integration.
• Popular IoT platforms include AWS IoT, Microsoft Azure IoT, Google
Cloud IoT, and open-source solutions like MQTT and Eclipse Paho.
3. **Device Registration and Onboarding:**
• Register each IoT device with the chosen IoT platform or middleware.
This involves assigning unique identifiers (e.g., device IDs or MAC
addresses) to each device.
• Configure the devices to connect to the IoT platform using the
appropriate protocols and security measures.
4. **Data Ingestion and Processing:**
• Set up data ingestion pipelines to receive data from the IoT devices.
Depending on the platform, this may involve configuring topics,
channels, or queues for data streams.
5. **Security Measures:**
• Implement robust security measures to protect device communication
and data. This includes device authentication, encryption, and access
control.
• Regularly update device firmware to address security vulnerabilities.
Data Acquisition
Data acquisition (DAQ) is the process of collecting and measuring data from
various sources or sensors and converting it into a digital format that can be
analyzed and processed by a computer or data acquisition system. Data
acquisition systems are commonly used in scientific research, industrial
automation, test and measurement, and many other applications. The process of
data acquisition typically involves the following key steps:

1. **Sensors and Signals:** Data acquisition begins with the selection of


appropriate sensors or transducers to capture physical or electrical phenomena.
These sensors can measure a wide range of parameters, such as temperature,
pressure, voltage, current, displacement, force, and more. The sensors generate
analog signals that represent the measured data.
2. **Signal Conditioning:** In many cases, the analog signals from sensors
need to be conditioned to ensure accuracy and compatibility with the data
acquisition system.
3. **Analog-to-Digital Conversion (ADC):** The conditioned analog signals
are converted into digital values using analog-to-digital converters (ADCs).
4. **Sampling Rate:** The rate at which the analog signals are sampled and
converted into digital data is called the sampling rate or sample rate. It
determines how many data points are collected per unit of time and impacts the
accuracy and fidelity of the acquired data.
5. **Data Transmission:** In some cases, the digital data is transmitted from
the data acquisition system to a computer or data processing unit for analysis.
This transmission can be done using various communication protocols, such as
USB, Ethernet, serial communication, or wireless connections.
Unit -4
Structured Data
Structured data is a type of data that is highly organized and formatted in a way
that is easily readable by both humans and computers. It conforms to a
predefined data model or schema, and its characteristics include:
• Structured data follows a predetermined and fixed schema, which means
that it is organized into a consistent format with well-defined data types
and structures.
• Structured data is often stored in tables, consisting of rows and columns.
• Structured data often involves relationships between different tables
within a relational database.
• Structured data is well-suited for querying and analysis using standard
database query languages like SQL (Structured Query Language).

Examples of structured data include:


• Customer information in a CRM (Customer Relationship Management)
system, where each attribute (e.g., name, address, phone number) is
stored in a separate column within a table.
• Financial transaction records in a banking system
• Product inventory in an e-commerce database
• Employee records in a human resources management system

Unstructured Data
Unstructured data refers to information that does not have a predefined data
model or is not organized in a structured manner. It lacks the organization and
structure that traditional relational databases offer. Unstructured data is
characterized by its flexibility and ability to store diverse types of information,
making it more challenging to process and analyze compared to structured data.
Here are some key characteristics of unstructured data:
• Unlike structured data, which has a predefined schema with tables, rows,
and columns, unstructured data does not follow a fixed format.
• Unstructured data typically lacks the clear and well-defined relationships
found in structured data.
• Unstructured data can accumulate in large volumes.
• Unstructured data can originate from a wide range of sources, including
websites, social media platforms, email correspondence, sensors, and
multimedia devices.
• Unstructured data is more challenging to analyze than structured data
because it lacks the structured format that traditional data analysis tools
and techniques require.

Examples of unstructured data include:


- Text documents, such as word processing documents, PDFs, and emails.
- Multimedia content, including images, videos, and audio recordings.
- Social media posts and comments.
- Sensor data from devices, such as IoT sensors.
- Web pages and web content.
- Text messages and chat logs.
- Voice recordings and speech.
- Free-form survey responses and comments.

Unstructured Data Storage on Cloud


Storing unstructured data in the cloud is a common and practical solution, as it
provides scalability, accessibility, and cost-efficiency for managing the vast
amounts of unstructured data generated by various sources, such as documents,
images, videos, audio, and more. Here are some key considerations and
approaches for storing unstructured data in the cloud:
1. **Cloud Storage Services:**
• Cloud service providers like Amazon Web Services (AWS), Microsoft
Azure, Google Cloud Platform, and others offer a range of storage
services specifically designed for unstructured data.
• These services are scalable, durable, and cost-effective.
2. **Data Classification and Organization:**
• Before storing unstructured data in the cloud, it's essential to classify and
organize the data into meaningful categories or folders.
• This can help with efficient data retrieval and management.
3. **Data Access Control:**
• Implement access control and security measures to protect sensitive
unstructured data.
4. **Data Versioning and Backup:**
• Some cloud storage services offer versioning and backup capabilities.
This allows you to track changes to your unstructured data and recover
previous versions in case of accidental modifications or data loss.
5. **Data Lifecycle Management:**
• Implement data lifecycle policies to automatically manage and archive
unstructured data.
• You can set rules to move data to less expensive storage tiers as it
becomes less frequently accessed.

Authentication of Devices in IOT


Authentication of devices in IoT (Internet of Things) is a critical security
measure that ensures that only authorized devices can communicate with an IoT
network or platform. It helps prevent unauthorized access, data breaches, and
malicious attacks. Several methods and protocols are used for device
authentication in IoT:
1. **Digital Certificates:**
• Digital certificates, such as X.509 certificates, are commonly used for
device authentication.
• When a device attempts to connect to the IoT network or platform, it
presents its certificate. The server or IoT platform verifies the certificate's
authenticity by checking the CA's signature.
2. **Pre-shared Keys (PSK):**
• Pre-shared keys are secret keys shared between devices and the network.
Both the device and the network know the key, which is used for
authentication.
• PSKs are simple to implement but can be vulnerable to exposure if not
securely managed.
3. **Asymmetric (Public Key) Cryptography:**
• Asymmetric cryptography involves a public-private key pair. Devices
have a public key that is widely known, and a private key that is kept
secret.
4. **OAuth and OAuth2:**
• OAuth (Open Authorization) and OAuth2 are used for authentication
and authorization between devices and web services. They are
commonly used in IoT applications that involve cloud services.
5. **Biometric Authentication:**
• Some IoT devices, especially those with user interfaces (e.g., smart
locks, wearables), may employ biometric authentication methods such
as fingerprint recognition or facial recognition for user or device
authentication.

Authorization of Devices in IOT


Authorization of devices in IoT (Internet of Things) is the process of granting or
denying access to specific resources, actions, or data within an IoT ecosystem
based on the identity and permissions of the device. It is a crucial aspect of IoT
security and access control, ensuring that only authorized devices can perform
certain operations. Here are some key considerations and methods for
authorizing devices in IoT:
1. **Role-Based Access Control (RBAC):**
• Implement RBAC to define and manage device permissions within the
IoT ecosystem. Assign roles to devices, each with specific privileges
and access rights.
• Common roles include administrators, operators, and viewers, with
varying levels of control and access.
2. **Token-Based Authorization:**
• Use tokens, such as JSON Web Tokens (JWTs), to represent a device's
authorization to access specific resources or services.
• Token expiration and renewal can help enhance security.
3. **OAuth and OAuth2:**
• Leverage OAuth and OAuth2 for granting access to resources in cloud-
based IoT ecosystems. OAuth2 enables devices to obtain access tokens
for specific resources through a secure authorization flow.
4. **API Keys:**
• Assign unique API keys to devices that wish to access services or APIs
within the IoT system.
• API keys are used for authentication and authorization purposes,
allowing the system to track and manage device access.
5. **Time-Based Access:**
• Set time-based restrictions on device access. For example, certain
devices may have access only during specific hours or on certain days.

You might also like