Download presentation
Presentation is loading. Please wait.
Published byJoão Lucas Fartaria Modified over 6 years ago
1
Assist. Prof. Rassim Suliyev Zhumaniyaz Mamatnabiyev Week 4
IoT in Industry Assist. Prof. Rassim Suliyev Zhumaniyaz Mamatnabiyev Week 4
2
OUTLINE IoT Programming What programming where? Programming Languages
What is IoT Data? Digital Data Big Data Real Time Data and Historic Data Data Types Big Data and the Cloud Security and privacy implications of IoT overview Security issues related to IoT Hackable devices Cyber security methods Off the shelf IoT Fog computing Encryption Planning for IoT design Idea to working model Project concept planning / IoT business plans IoT development kit components
3
IoT Programming? Programming is, essentially, the process of creating a set of instructions that tell a computer how to perform a task or sequence of tasks. The engineering practice of computer programming is primarily concerned with discovering and implementing the most efficient algorithms to address a specific class of problem. This part of the course is not a programming course, but it is an exposure to how programming diffrers and what you specifically need to know in programming to work with IoT. We will be looking at Big Data how do we store this massive amount of data the IoT is collecting. What do we do with? How do we make sense of it.
4
IoT Programming Video: Programming the foot drop project
Direct Link:
5
SMART SPRINKLER SYSTEM
What programming where? SMART SPRINKLER SYSTEM
6
What programming where?
SMART SPRINKLER SYSTEM Existing programming to make weather forecasts and records available online. Programming of sensor to detect moisture levels, collate and send sensor data. Programming to communicate between application and actuator. Programming to put together weather predictions and sensor data to make smart decisions about watering time. Embedded programming to control water release and shut off.
7
Blockly games If you have no experience of programming the following activity provides an opportunity to learn to program at an elementary level. Blockly Games is a Google project and is a series of educational games that teach programming. Link:
8
Programming Languages
Choosing a programming language for IoT will likely be influenced by personal preference and the needs of your project. Article: 12 Popular Programming Languages for IOT Development, by Andrew Zola, looks at the key languages for building IoT projects and the reasons for selecting these languages. According to the survey of developers conducted by the Eclipse Foundation, the top four languages for building IoT solutions are as follows: Java C JavaScript Python
9
Main considerations for programming IoT
The main consideration for programming for IoT is that the small devices generally have: Limited power supply Limited computational power Limited memory
11
Review Question Where in the IoT process is there specific programming? Select the two correct answers. Instructing Arduino hardware Sending data to cloud service Cleaning and filtering data then interpreting .csv file to signals (graphical read out) Signal analysis generating report for medical practitioner 2) According to a survey of developers done by Eclipse Foundation – what are the top 4 languages for building IoT solutions? Assembly B# C C++ Java Javascript Python Rust
12
Review Question 3) What are the 3 major sections of IoT architectural environment? (where programming is required to manage data) Cell tower collecting data from mobile devices Centralised servers where data ends up Internet router through which data passes Sensors generating data Gateways or hubs organising data
13
Programming a simple sensor - actuator set up
Video: Sensor - Actuator set up Direct Link:
14
Programming a simple sensor - actuator set up
15
What is IoT Data? Traditionally, information has come into our homes (and offices) in different ways: Television uses a connection to either aerial or satellite dish Telephone (voice) comes through the telephone connection Internet and come through an internet connection
16
What is IoT Data? In a converged network, there are still many points of contact and many specialized devices, such as personal computers, phones, TVs, and tablet computers, but there is one common network infrastructure. This network infrastructure uses the same set of rules, agreements, and implementation standards. (Cisco Network Academy)
17
Digital Data Data can be a telephone conversation, a television program, a web page, an , an online theatre booking, or a series of readings from a sensor or instructions to a machine.
18
Digital Data Digital data is data that is represented using a binary system of zeros (0) and ones (1). Visual images, speech, text, sensor readings and so on all get converted to this binary system. The data is packaged into bytes - bite-sized pieces that can be moved through the network from one address to another using various protocols. Bytes are sometimes split further into Nibbles (half the size) or Bits (one eighth the size of a Byte).
19
Big Data Big data is data sets that have become so large and so complex that advanced programming and processing is required to capture the data, and then appropriately store, analyse, search, share, transfer, and visualise it. Big data is significantly impacted by the growth of information-sensing Internet of Things devices.
20
In End
21
Big Data Video: iVEC and the Pawsey Centre
Direct Link:
22
Real time data and historic data
Video: How it works: Internet of Things Direct Link:
23
Review Question Complete this quote: 'Making data valuable means making it ______'. Digital Organised Available Big 2. What is the use of historic data collected from thousands of cars? Customers can have the fault efficiently dealt with Dealers can better market the cars Manufacturers can improve design and manufacturing 3. To which two places does the data from a fault finding sensor in a car go? Directly to a webpage at the dealership To the car’s computer (diagnostics) triggering an alert on the dashboard To a diagnostic bus then a gateway before being sent to the manufacturer and dealer responsible for the car To the driver’s mobile phone To the traffic monitoring system on the road
24
Data Types IBM describes the 4 V's of Big Data as:
Volume (quantity – big data observes and tracks what happens without sampling) Velocity (speed – big data is generally available in real-time) Variety (big data extracts from multiple sources such as text, images, audio, video) Veracity (data quality – whether it stays true, or some is lost or damaged)
25
Security and privacy implications of IoT overview
Securing the Internet of Things is a highly necessary and complex task that sits across the top of its devices, networks and applications, but must be considered and factored into the design and planning phase. Many IoT devices are purposely very small and low powered, and this increases the difficulty of securing them. Connecting things up makes private data about ourselves, our lives, and our businesses accessible. The Internet of Things challenges notions and ethics of privacy, factors which must be considered and designed for. There is also the concern that IoT technology development is outpacing the governance and regulation required, as well as the ability of many individuals to be aware of the threats and know how to address them. Aside from digital security risks, we also need to know how to keep IoT devices physically secure. There are a vast and growing number of IoT devices in our lives, and they need to be protected - just as we keep our phones and computers physically secure from theft, damage and misuse.
26
Security issues related to IoT
27
Hackable devices Video: All your devices can be hacked - Avi Rubin
Direct Link:
28
Review Questions What vulnerability did the researchers exploit to hack the defibrillator? That it was worn by a person with a heart defect. That it could be communicated with wirelessly. That it was very small and could not support complex software. 2. How did the researchers take charge of a car? Via its radio and internal wireless network. Via its steering column. Via its axle and wheels. 3. What were Avi Rubin’s two main messages to developers? Select both. Developers need to think of security at the beginning. Don’t leave your phone unattended. Anything with software in it is vulnerable. A car is highly computerised and connected by a wired network.
29
Cyber security methods
IoT devices can connect a person’s activity to their identity, which presents a challenge to privacy. A device does need to be able to check ownership and identity, but it also needs to de-couple (separate) itself from the owner. This is called shadowing. The device uses a virtual identity to act on behalf of the owner (whom it knows about, but does not reveal the identity of).
31
Cyber security methods
Picture from previous slide outlines the following components: Authentication – IoT devices connecting to the network create a trust relationship, based on validated identity through mechanisms such as: passwords, tokens, biometrics, RFID, X.509 digital certificate, shared secret, or endpoint MAC address. Authorisation – a trust relationship is established based on authentication and authorisation of a device that determines what information can be accessed and shared. Network Enforced Policy – controls all elements that route and transport endpoint traffic securely over the network through established security protocols. Secure Analytics: Visibility and Control – provides reconnaissance, threat detection, and threat mitigation for all elements that aggregate and correlate information.
32
Off the shelf IoT If you’re using an 'off the shelf' IoT product, don’t forget the following additional security measures: Disable default passwords Disable UPnP (Universal Plug and Play - which allows the device to automatically make itself available to networks) Disable remote management Keep software (firmware) up to date Use encryption and/or certificates where possible Physically keep device secure
33
Fog computing Another way to increase the security of IoT devices, is to use ‘the fog’. The fog extends the reach of ‘the cloud’, so it is closer to devices that create and act on IoT data. Using fog computing reduces security risks by acting on data at the source.
34
Encryption Encryption is an important form of computer security. Encryption simply involves encoding a message or information. You probably engaged in some simple encryption when writing secret notes as a child, replacing letters with other letters, numbers or characters, or writing in invisible ink and needing a UV light to expose the message. Computer encryption uses the same basic principles. If you’d like to try some encryption, the PlanetCalc website offers several different ciphers to try. Start with the simple Caesar cipher (which involves shifting the letters of the alphabet) and then have a look at some others, such as the Vigenere cipher. You may also be interested in this online simulation of the infamous Enigma encryption machines used by the German Navy in World War II.
35
Planning for IoT design
IoT is not about using technology for technology’s sake. Whatever IOT innovation you have in mind should, above all, provide a benefit or solve a problem, such as: Saving resources Performing a job better/more efficiently Advancing knowledge
36
Idea to working model Video: French start-up makes IoT smart stick
Direct Link:
37
Project concept planning
38
Project concept planning
For an IoT project to be successful, it is vital that your IoT solution addresses a real problem or provides a real benefit or efficiency in an existing process. It helps to have clear idea of who your product is specifically designed for (your target audience) and what they need it for (their requirements). For example, Shiva’s gait detection system is aimed at doctors and patients that need to diagnose and treat a gait problem. As well as knowing the problem your project sets out to solve, it is also important to know what makes your product better than what is currently available.
39
IoT business plans If you want your IoT idea to become a commercial product, then you will have to have a business plan. Even if your IoT project is personal or in-house, it is still worth going through the motions of a modified business plan, so you don't waste time and money developing something that doesn't solve a problem...or solves a problem in a way that doesn't improve upon an existing solution. Canvanizer is a free online product that allows you to work out rough, one-page business plans.
40
P P
41
IoT development kit components
There are a vast array of IoT development kits, microcontrollers and other electronic components available for you to start playing with IoT device designs. The following articles provide a good overview of what's available. Best IoT development kits 2018, Techworld: Creating quick connections with IoT development kits, Mouser Electronics:
42
Any Questions?
Similar presentations
© 2025 SlidePlayer.com Inc.
All rights reserved.