IOT Unit-4
IOT Unit-4
• Gateway
• Analytics
• Connectivity of Devices
• Cloud Computing
• Automation
• Inter Operability
i. GATEWAY:
Data traffic between the IOT devices has to be monitor.
• Network protocols
▪ Encryption standards
▪ Transmission and reception using specify port number.
ii. ANALYTICS:
Analog data can be read and analyzed and converted a appropriate formats. Try
to prevent data loss and malicious attacks.
OVERVIEW OF GOVERNANCE:
It deals with data security and integrity. The major layers involved are: Application
layer, network layer and physical layer.
Platform:
Communication:
Tap with the set of protocols. Transport the data across all the layers. Follow GDPR
(General Data Protection Regulation)
I. IOT Architecture
II. Security Architecture
IOT ARCHITECTURE:
Key device the IOT platform and establish the set of standard & guidelines to be
followed.
SECURITY ARCHITECTURE:
✓ Infrastructure
✓ Architect design
✓ Secure coding practice
✓ Testing methodologies
✓ Security Audit
Data scientist
Security Architect
• The user can reduce and prevent the threads in the following practices.
APPROACHES:
• Vulnerablities are the major and constant issues in the field of IOT and the
vulnerablities can count from any layer of the IOT devices.
• Even the old vulnerablities are being used by the cyber criminals to infect the
devices.
IOT solutions can use saas to identify the authorization and authentication
requirements.
During execution certain main modules can be removed such as boot process
,security enforcement encryption models and similer modules can be removed it leads
inot mal function of the IOT device.
It should be conducted across the signal path to identify any vulnerablities found in
the web interface.
Considering different protocols used by IOT:
• A huge set of Network protocols are used such as bluetooth, NFC(Near Field
Communication), RFF 24, LORA and Infrared communication are used.
• So the administrator should understand the hole set of protocols used in the IOT
system to reduce the risk and to recent the threads.
FOCUS:
Focus fastest the research in Europe and other countries and it is focused on the
following areas:
• Health
• Food and Agriculture
• Fishers and Bio-technology
• Information and Communication technology
• Nano science
• Space
• Security
The idea’s behind FP7 is mostly carried out by individual teams and they are
implemented by European research council (ERC), it is nothing but European Union
Research Development and funding program.
• Virtual object
• Composite Virtual Object
Virtual Object:
GAMBAS:
Acutators
➢ Some of the interoperability issues that can be occur are listed below:
• The data may be received from the heterogeneous devices, so that the data
representation may also get differ.
• There may be chances for dynamics/frequent changes in the information delivered
from the data stream or sensor.
GAMBAS APPLICATION
Recognising content
Discover Services Prototype Application
Recommended Services
Pick services
Query Context Validate Enable
Expose privacy User
Share context Interface
Automated Interoperable
Get result
Privacy data
reservation modelling
Data
acquisation
SMARTIE:
Architectural
Component of
Smart city
Data processing and data
minimization
Access
Control
Secure Informtion
Storage of trust
worthy
service
Cryptographic supply
• It allows the user for data accessing at the same time it provides solutions for easy
configure management process.
• The user in the resident will require full access and data privacy policies for
example a user might be willing to share this location information with his families
and friends and make this available in the public transport at the same time user
does not wish to use the location by the third party service providers . so creating
such type of platform is highly a challenging task.
Risk measures to a smart city IOT platform:
• We predict that the smart city data will be eventually store in the cloud and deploy
cloud computing techniques. so in this case the smart city management system
inherits the security and privacy risk of smart city management from the outside
attackers.
• There are several risk that can be exposed over a smart city infrastructure such as:
ix. so that no single server will have the power over a significant data.
FIRST STEP TOWARDS SECURE PLATFORM IN IOT
The IOT system has many different owner and they are in need to get cooperated in
system of services so the individual systems are combined together in order to interact and
provide services to the multiple number of systems.
All system of SOS will have their own lifecycle so no systems will be dependent
on another systems
There are certain fundamental builds for managing SOS. There are:
• Autonomy
• Belonging
• Connectivity
• Diversity
• Emergence
Autonomy:
Belonging:
Connectivity:
Diversity:
Emergence:
The new property that may appear and it can be enhanced based on it adaptability
i. Aggregate
ii. Confirm
There will be three roles distributed among the node.
i. Aggregator node
ii. Normal node
iii. Storage node
• Each message will be authenticated and broadcasted by the protocol.
• Each node will sense the environment and send back its measurement to
the base notation.
• The aggregator node collects all the from values and measure the precision
and compute the result.
• Each nodes will check the result and compare with its own measurement
and works on biggest algorithm and share the key values to its relevant
base.
1 2 1 2 3 4 3