Sie sind auf Seite 1von 97

IoT Fundamentals

A Comprehensive Introduction To IoT


Theory & Applications
About This course
 As the Internet of Things continues to develop, further
potential is estimated by a combination with related
technology approaches and concepts such as Cloud
computing, Future Internet, Big Data, robotics and Semantic
technologies.
 So To follow-up this rapid growth and tremendous
technological development this Course was developed to
bridge the technical gap of the student, and create a solid
background that enables him to keep pace with the
development of internet things in the next few years.
 By end of this course students will be able to:
 high-level overview of IoT & Needs of Design prospective.
 Building Blocks Of IoT, Including pertinent Technologies and
protocols.
 steps you through common industry cases so he can see how
IoT is applied in the real world.
 successfully work in the IoT area
About the Technical Reviewers
 Dr Fayez is the head of cyber security department in school of
Intelligence.
 Dr Fayez.
 Mohammed Elyas is Cisco Platform Engineer Routing
&Switching portfolio in the Enterprise Networking Group at
Cisco Elyas also is Huawei Certified Engineer.
 Mohammed is responsible for working closely with Dr Fayez
and the engineering team to develop and execute the product
strategy and roadmap for the cybersecurity portfolio in the
School .
 Mohammed had been with Huawei Systems for Two Years as IP
core Engineer He designed, implemented, and operate several
key infrastructure features on the Network .
Course Contents Securing IoT

Data and Analytics for IoT

Connect smart Object IoT in Industry


05 06

04

03
Smart Objects: The “Things” in
IoT
01 02
IoT Network Architecture and
Introduction to IoT Design
Introduction to IoT

The Major change In Human core Life:


 A major technology shift is happening in our
world, Electricity, petroleum, thermal
mechanics, aviation, communications and the
Internet all These Discovered scientist
happened and continuously growing in our
universe ,responsible to facilitate Human being
core life .
 By and by all these Technologies needs to talk
and communicate with human and with each
others, So from this prospective there will a
substantial Technology will raise and take a
unique place in our life.
A great technology shift is happening in our
world, and it is centered around the Internet of
Things (IoT).
The IoT is all about connecting the
unconnected. Most of the objects in our
current world are not connected to a computer
network, but that paradigm is rapidly changing.
This is the basic premise behind IoT and
illustrates why some theorize that it will be as
transformative as the Industrial Revolution.
 The Internet of Things represents a vision in
which the Internet extends into the real world
embracing everyday objects. Physical items
are no longer disconnected from the virtual
world, but can be controlled remotely and
can act as physical access points to Internet
services.
 When objects and machines can be sensed
and controlled remotely across a network, a
tighter integration between the physical
world and computers is enabled.
 This allows for improvements in the areas of
efficiency, accuracy, automation, and the
enablement of advanced applications.
What Is IoT?
 The basic premise and goal of IoT is
to “connect the unconnected.” This
means that objects that are not
currently joined to a computer
network, namely the Internet, will be
connected so that they can
communicate and interact with
people and other objects.
Genesis of IoT Evolutionary Phases of the Internet
The age of IoT is often said to have started between the years 2008 100%
and 2009. During this time period, the number of devices connected
90%
to the Internet eclipsed the world’s population. With more “things”
connected to the Internet than people in the world, a new age was 80%
upon us, and the Internet of Things was born. The person credited 70%
with the creation of the term “Internet of Things” is Kevin Ashton. 60%
While working for Procter & Gamble in 1999, Kevin used this phrase 50%
to explain a new idea related to linking the company’s supply chain 40%
to the Internet 30%
It is widely accepted that IoT is a major technology shift, but what 20%
is its scale and importance? Where does it fit in the evolution of the 10%
Internet. 0%

Connectivity: Immersive Experience: Internet Of Things:


 E-mail & web search.  Social.  People.
Network Economy:  Mobility.  process.
 E-commerce  Cloud.  Data.

 Digital supply chain  Things.


 Video.
 Collaboration
Internet phase Role
Connectivity This phases connected people to E-mail ,Web
(Digitize access) services so that Information's easy to be access
Networked Economy This phase enable E-commerce and supply chain
(Digitized Business) enhance the business process
Immersive Experience This phases extend the Internet experience to
(Digitized Interaction) encompass wide spread video and Social Media
Internet Of Thing This phase is adding connectivity to objects
(Digitized The World) machine and physical devices around the world.
Its connected the unconnected
Infographic Network Diagram for
PowerPoint Immersive Experiences
Connectivity is characterized by the emergence
The focus of
was now on leveraging social media, collaboration, and
connectivity for efficiency and widespread mobility on a variety of
profit. This inflection devices.
point marked the beginning of Connectivity is now pervasive, using
the second phase of the Internet multiple platforms from mobile
evolution, called phones to tablets to laptops and
the Networked Economy. desktop
Internetcomputers
of Things

Networked Economy Machines and


objects in this phase connect
Vendors and suppliers became closely with other machines and
interlinked with producers, objects, along with
and online shopping experienced humans. Business and
incredible growth. The victims of this shift society have already started
were traditional brick-and-mortar retailers. down this path and are
experiencing huge increases
in data and knowledge
IoT Impact
Chart Title
100%
Projections on the potential impact
of IoT are impressive. About 14 90%

billion, or just 0.06%, of “things” are 80%

connected to the Internet today. 70%

60%
Cisco Systems predicts that by 2020,
this number will reach 50 billion. A 50%

UK government report speculates 40%

that this number could be even 30%

higher, in the range of 100 billion 20%


objects connected. 10%

Cisco further estimates that these 0%


2003 2008 2010 2015 2020
new connections will lead to $19
trillion in profits and cost savings.3 Things & Device population Dimension

Figure 1-2 provides a graphical look


at the growth in the number of
devices being connected.
The basic premise and goal of IoT:
 “connect the unconnected” This means that objects that are not
currently joined to a computer network, namely the Internet, will be
connected so that they can communicate and interact with people
and other objects.
 objects can be used to remotely determine their state so that
information systems can collect up-to-date information on physical
objects and processes.
Connected Roadways
IoT is going to allow self-driving vehicles to better interact with the
transportation system around them through bidirectional data
exchanges while also providing important data to the riders.
Basic sensors reside in cars ,They monitor
1-oil pressure.
2-tire pressure.
3-temperature, and other operating conditions.
these sensors are becoming IP-enabled to allow easy communication
with other systems both inside and outside the car.
• For example, with IoT-connected roadways, a
concept known as Intersection Movement Assist Application Of IoT Benifites
(IMA) is possible.
These benefits include
• This application warns a driver triggers the reduced traffic jams
appropriate response in a self-driving car) when it and urban
is not safe to enter an intersection due to a high congestion
probability of a collision—perhaps because decreased casualties
another car has run a stop sign or strayed into the Connected Roadways and fatalities
wrong lane
increased response
time for
emergency vehicles,
and reduced vehicle
emissions
Connected Factory Application Of IoT Benifites
The main challenges facing manufacturing in a factory environment from a purely
today include the following: automated
 Accelerating new product and service introductions to meet customer assembly line to
and market smart control
 Mitigating unplanned downtime (which wastes, on average, at least analyze the data and
Connected Factory make intelligent
5%of production)
decisions.
 Securing factories from cyber threats
machines predicting
• As with the IoT solution for these , there are already large numbers of
failures and self-
basic sensors on factory floors.
healing and points to
• A real-time location system (RTLS). An RTLS utilizes small and easily a world where
deployed Wi-Fi RFID tags that attach to virtually any material and human monitoring
provide real-time location and status. These tags enable a facility to and
track production as it happens. These IoT sensors allow components
and materials on an assembly line to “talk” to the network. So intervention are no
decisions can be made to speed up or slow production to meet longer necessary
targets.
Smart Connected Buildings Application Of IoT Benefits

Similarly, sensors are often used to control the heating, ventilation, and air-conditioning
makes them easier,
(HVAC) system. Temperature sensors are spread throughout the building and are used to cheaper, and more
influence the building management system’s (BMS’s)control of air flow into a room efficient to manage

analyze the data and


Smart Connected make intelligent
Buildings decisions.
long-term business
case supporting
reduced energy costs
IoT Challenges Challenges
Scale
Description
While the Scale of
While an IoT-enabled future paints an impressive picture, it Network can be
does not come without significant challenges. Many parts of large ,The Scale of
OT can be larger
IoT have become reality, but certain obstacles need to be Security With more “things”
overcome for IoT to become ubiquitous throughout industry and connect to “things”
our everyday life & “People” Security
is increasingly
complex issue
Big Data and Data IoT and it’s a large
Analytics number of sensor is
going to trigger
deluge of Data
,should be processed
in efficient manner

Interoperability Various protocol and


architecture will be
used
Summary
This chapter provides
1- An introductory look at the Internet of Things and answers the
question “What is IoT?” IoT is about connecting the unconnected,
enabling smart objects to communicate with other objects,
systems, and people.
2-The end result is an intelligent network that allows more control of
the physical world and the enablement of advanced applications.
3- Convergence between IT and OT. The last section details the
challenges faced IoT.
Chapter 2. IoT Network Architecture and
Design
Chapter 2. IoT Network Architecture and
Design
This chapter examines some of the unique
challenges posed by IoT networks and how these
challenges have driven new architectural models.
This chapter explores the following areas:
Drivers Behind New Network Architectures:
Comparing IoT Architectures:
A Simplified IoT Architecture.
The Core IoT Functional Stack
 IoT Data Management and Compute Stack
IT and IoT networks
The key difference between IT and IoT is the
data.
While IT systems are:
mostly concerned with reliable and continuous
support of business applications such as email,
web, databases, CRM systems, and so on.
While IoT systems are:
 IoT is all about the data generated by sensors
and how that data is used. The essence of IoT
architectures thus involves how the data is
transported, collected, analyzed, and ultimately
acted upon.
loser look at some of the differences between IT and IoT
networks

Data Volume

Legacy device
support
CPU , Memory &
Security link constrained
networks

Scale
Analyzed real time
Data
Scale
The scale of a typical IT network is on the order of
several thousand devices typically printers, mobile
wireless devices, laptops, servers, and so on.
consider what happens when the scale of a network
goes from a few thousand endpoints to a few million.
How many IT engineers have ever designed a network
that is intended to support millions of routable IP
endpoints?.
Based on scale requirements of this order, IPv6 is the
natural foundation for the IoT network layer.
Security
IoT systems require
consistent mechanisms of authentication, encryption, and intrusion
prevention techniques.
For optimum security, IoT systems must:
 Be able to identify and authenticate all entities involved in the IoT
service (that is, gateways, endpoint devices, home networks, roaming
networks, service platforms)
 Ensure that all user data encrypted
 Comply with local data protection legislation .
 Establish rules based security policies.
 Take a holistic, network-level approach to security.
Constrained Devices and Networks

oMost IoT sensors are designed for a single job, and they are
typically small and inexpensive.
oThis means they often have limited power, CPU, and memory,
and they transmit only when there is something important.
oBecause of the massive scale of these devices and the large,
uncontrolled environments where they are usually deployed,
the networks that provide connectivity also tend to be very
lossy and support very low data rates.
o IoT requires a new breed of connectivity technologies that
meet both the scale and constraint limitations.
Data
IoT devices generate a mountain of data
In IoT the data is like gold, as it is what enables businesses
to deliver new IoT services that enhance the customer experience, reduce
cost,
and deliver new revenue opportunities.
Unlike IT networks, IoT systems are designed to stagger data
consumption throughout the architecture, both to filter and reduce
unnecessary data going upstream and to provide the fastest possible
response to devices when necessary
Legacy Device Support
Supporting legacy devices in an IT organization is not usually a big problem
As IoT networks are deployed, they need to support the older devices already
present on the
network, as well as devices with new capabilities. In many cases, legacy
devices are so old that they don’t even support IP. For example, a factory may
replace machines only once every 20 years—or perhaps even longer However,
many of these legacy machines might support older protocols, such as serial
interfaces, and use RS- 232. In this case, the IoT network must either be capable of
some type of protocol translation or use a gateway device to connect these legacy
endpoints to the IoT network.
IoT Architectures
The aforementioned challenges and requirements of IoT systems have
driven a whole new discipline of network architecture. In the past several
years, architectural standards and frameworks have emerged to address the
challenge of designing massive-scale IoT networks.
The foundational concept in all these architectures is supporting data,
process, and the functions that endpoint devices perform. Two of the best-
known architectures are those supported by oneM2M and the IoT World
Forum (IoTWF), discussed in the following sections.
The oneM2M IoT Standardized
Architecture
One of the greatest challenges in designing an IoT architecture is
dealing with the heterogeneity of devices, software, and access
methods.
 By developing a horizontal platform architecture, oneM2M is
developing standards that allow interoperability at all levels of the IoT
stack. For example, you might want to automate your HVAC system by
connecting it with wireless temperature sensors spread throughout
your office. You decide to deploy sensors that use LoRaWAN
technology The problem is that the LoRaWAN network and the
BACnet system that your HVAC and BMS run on are completely
different systems and have no natural connection point.
 This is where the oneM2M common services architecture comes in.
The oneM2M architecture divides IoT functions into three major domains:
1-Applications layer: The oneM2M architecture gives major attention to
connectivity between devices and their applications. This domain
includes the application-layer protocols and attempts to standardize
northbound API definitions for interaction with business intelligence (BI)
systems. Applications tend to be industry-specific and have their own
sets of data models, and thus they are shown as vertical entities.
2-Services layer: This layer is shown as a horizontal framework
across
the vertical industry applications. At this layer, horizontal modules
include the physical network that the IoT applications run on, the
underlying management protocols, and the hardware. Examples
include
backhaul communications via cellular, MPLS networks, VPNs, and
so
On.
Network layer:
This is the communication domain for the IoT devices
and endpoints. It includes the devices themselves and the
communications network that links them.
In other cases, machine-to-machine communication is not necessary,
and the devices simply communicate through a field area network (FAN)
to use-case-specific apps in the IoT application domain.
 Therefore, the device domain also includes the gateway device, which
provides communications up into the core network and acts as a
demarcation point between the device and network
domains.
The IoT World Forum (IoTWF) Standardized
Architecture
In 2014 the IoTWF architectural
committee (led by Cisco, IBM,
Rockwell
Automation, and others) published a
seven-layer IoT architectural
reference model. Each of the seven
layers is broken down into specific
functions, and security encompasses
the entire model.
layers of the IoT Function

Layer 1: Physical Devices and Controllers Layer 1-generating data


2-capable of being queried and/or controlled over a
network
Layer 2: Connectivity Layer 1-communication between layer1 devices
2-Reliable Delivery of Information
3-Network level security
Layer 3: Edge Computing Layer 1-evaluate and reformat data for processing data for
higher layer
2-Filter data to reduce traffic Higher level processing
Layer4 : Data Communications 1-capture data to use by applications.
2-convert event-based data to query based
processing
Layer5 : Data abstraction layer 1-Reconciles multiple data format
2-confirm data is complete and consolidate
Layer6 : Application layer 1-Interprets data using software application
2- Reports and analysis Data
Layer 7 :collaboration and process layers 1- consumes and share the application information's
Summary
The requirements of IoT systems are driving new architectures that address
the scale, constraints, and data management aspects of IoT.
 The Core IoT Functional Stack has three layers:
the IoT sensors and actuators, networking components, and applications and
analytics layers.
 The networking components and applications layers involve several
sublayers corresponding to different parts of the overall IoT system.
 The IoT Data Management and Compute Stack deals with how and where
data is filtered, aggregated, stored, and analyzed.
In traditional IT models, this occurs in the cloud or the data center.
Chapter 3. Smart Objects: The “Things” in
IoT
• This chapter provides:
 Detailed analysis of smart objects and their architecture.
 An understanding of their design limitations and role
within IoT networks.
 Specifically, the following sections are included:
• Sensors, Actuators, and Smart Objects: This section
defines sensors, actuators, and smart objects and
describes how they are the fundamental building blocks of
IoT networks.
• Sensor Networks: This section covers the design,
drivers for adoption, and deployment challenges of sensor
networks.
Sensors
• A sensor does exactly as its name indicates: It
senses. More specifically, a sensor measures
some physical quantity and converts that
measurement reading into a digital
representation.
• That digital representation is typically passed
to another device for transformation into
useful data that can be consumed by
intelligent devices or humans.
Type of Sensors
1. Active or passive
2. Invasive or non-invasive
3. Contact or no-contact
4. Area of application
5. How sensors measure
6. What sensors measure
Actuators
Actuators are natural complements
to sensors.
• Actuators, on the others hand,
receive some type of control signal
(commonly an electric signal or
digital command) that triggers a
physical effect, usually some type
of motion, force, and so on.
Micro-electro-mechanical systems(MEMS):
sometimes simply referred to as micro-machines, can integrate and
combine electric and mechanical elements, such as sensors and
actuators
MEMS an attractive option for a huge number of IoT applications.
Smart Objects
• Smart objects are, quite simply, the building blocks of IoT. They
are what transform everyday objects into a network of
intelligent objects that are able to learn from and interact with
their environment in a meaningful way
• defining characteristics:
Processing unit
Sensor(s) and/or actuator(s)
Communication device
Power source
Sensor Networks
• A sensor/actuator network (SANET), as the name suggests, is a
network of sensors that sense and measure their environment
and/or actuators that act on their environment.
• Smart homes are a type of SANET that display this
coordination between distributed sensors and actuators. For
example, smart homes can have temperature sensors, When a
sensor detects a specified temperature, this can trigger an
actuator to take action and heat or cool the home as needed.
Wireless Sensor Networks (WSNs)
• Wireless sensor networks are made up of wirelessly connected
smart objects, which are sometimes referred to as motes.
• The following are some of the most significant limitations of the
smart objects in WSNs:
Limited processing power
Limited memory
Lossy communication
Limited transmission speeds
Limited power
Summary
• As discussed in this chapter, we unlock the power of IoT by
networking smart objects.
• Sensor and actuator networks (SANETs) are discussed, with
particular attention and detail given to the overwhelmingly
ubiquitous use case of wireless sensor networks (WSNs).
• introduces the “things” that are the building blocks of IoT. It
includes descriptions and practical examples of sensors and
how they are able to measure their environment
Chapter 4. Connecting Smart Objects
Connecting Smart Objects
• IoT devices and sensors must be connected
to the network for their data to be
utilized. In addition to the wide range of
sensors, actuators, and smart objects that
make up IoT, there are also a number of
different protocols used to connect them.
This chapter takes a look at the:
1-Communications Criteria.
2- IoT Access Technologies.
Communications Criteria
• Wireless communication is prevalent
in the world of smart object
connectivity, mainly because it
eases deployment and allows smart
objects to be mobile, changing
location without losing connectivity.
Communications Criteria
• Range: importance of signal propagation and
distance.
• Frequency Bands: describes licensed and
unlicensed spectrum, including sub-GHz
frequencies.
• Power Consumption: the considerations required
for devices connected to a stable power source
compared to those that are battery powered.
• Topology: the various layouts that may be
supported for connecting multiple smart objects.
• Constrained Devices: details the limitations of
certain smart objects from a connectivity
perspective.
• Constrained-Node Networks: the challenges that
are often encountered with networks connecting
smart objects.
IoT Access Technologies
• The second main section of this chapter, “IoT Access
Technologies,” provides an in-depth look at some of the
technologies that are considered when connecting smart objects.
• This section intentionally limits the discussion of technologies for
connecting sensors to the ones that seem to be most promising
going forward in the IoT marketplace.
• The following subsections cover • IEEE 802.15.4 is commonly found
technologies for connecting smart in the following types of
objects: deployments:
IEEE 802.15.4 Home and building automation
IEEE 802.15.4g and IEEE Automotive networks
802.15.4e Industrial wireless sensor
IEEE 1901.2a networks
• IEEE 802.11ah Interactive toys and remote
LoRaWAN controls
NB-IoT and Other LTE Variations
• Particularly, the following topics are addressed for each IoT
access technology:
Standardization and alliances: The standards bodies that
maintain the protocols for a technology.
Physical layer: The wired or wireless methods and relevant
frequencies.
MAC layer: Considerations at the Media Access Control (MAC)
layer, which bridges the physical layer with data link control.
Topology: The topologies supported by the technology.
Security: Security aspects of the technology.
Competitive technologies: Other technologies that are
similar and may be suitable alternatives to the given
technology.
• Standardization and Alliances:
• IEEE 802.15.4 or IEEE 802.15 Task Group 4 defines low-
data-rate PHY and MAC layer specifications for wireless
personal area networks (WPAN).
• These protocol stacks are promoted separately through
various organizations and often commercialized.
Well Known protocols:
1. ZigBee
2. 6loWPAN
ZigBee
3. ZigBee IP
4. ISA100.11a
5. WirelssHart
6. Thread
• Physical Layer:
• The 802.15.4 standard supports an extensive number of PHY
options that range from 2.4 GHz to sub-GHz frequencies in ISM
bands.
• DSSS is a modulation technique in which a signal is intentionally
spread in the frequency domain, resulting in greater bandwidth.
The original physical layer transmission options were as follows:
1- 2.4 GHz, 16 channels, with a data rate of 250 kbps
2- 915 MHz, 10 channels, with a data rate of 40 kbps
3- 868 MHz, 1 channel, with a data rate of 20 kbps
IEEE 802.15.4 introduced additional PHY communication options,
including the following:
OQPSK PHY
BPSK PHY
ASK PHY
MAC Layer
• The IEEE 802.15.4 MAC layer manages access to the PHY channel by
defining how devices in the same area will share the frequencies
allocated
four types of MAC frames are specified in 802.15.4:
• Data frame: Handles all transfers of data.
• Beacon frame: Used in the transmission of beacons from a PAN
coordinator.
• Acknowledgement frame: Confirms the successful reception of a
frame.
• MAC command frame: Responsible for control communication
between devices.
Topology
• Deployments of IEEE 802.15 are mostly based on a mesh
topology:
oA mesh topology allows deployments to be done in urban or rural
areas, expanding the distance between nodes that can relay the
traffic of other nodes.
oSecurity
oTherefore, encryption is provided by AES, with a 128-bit key So a
secure acknowledgement and a secure Enhanced Beacon field
complete the MAC layer security.
Summary
• This chapter reviews the communications criteria and the
significant and most recent technologies supporting the
deployment of IoT smart objects.
Chapter 5. Data and Analytics for IoT
Data and Analytics for IoT
• This chapter provides an overview of the field of data analytics
from an IoT perspective, including the following sections:
• An Introduction to Data Analytics for IoT
• Machine Learning
• Big Data Analytics Tools and Technology
• Edge Streaming Analytics
• Network Analytics
An Introduction to Data Analytics for IoT

• In the world of IoT, the creation of massive


amounts of data from sensors is common and
one of the biggest challenges—not only from a
transport perspective but also from a data
management standpoint. A great example of
the deluge of data that can be generated by
IoT is found in the commercial aviation
industry and the sensors that are deployed
throughout an aircraft.
• Modern jet engines are fitted with thousands
of sensors that generate a whopping 10GB of
data per second.
Structured Versus Unstructured Data

• Structured data and unstructured


data are important classifications as
they typically require different
toolsets from a data analytics
perspective.
• Structured data means that the data follows a model or schema that
defines how the data is represented or organized.

• IoT sensor data often uses structured values, such as temperature,


pressure, humidity, and so on, which are all sent in a known format.

• Structured data is easily formatted, stored, queried, and processed; for


these reasons, it has been the core type of data used for making
business decisions.
• Unstructured data lacks a logical schema for understanding and
decoding the data through traditional programming means. Examples
of this data type include text, speech, images, and video. As a
general rule, any data that does not fit neatly into a predefined data
model is classified as unstructured data.
Data in Motion Versus Data at Rest
• As in most networks, data in IoT networks is either in transit
(“data in motion”) or being held or stored (“data at rest”).

data in motion include traditional client/server exchanges, such


as web browsing and file transfers, and email.

 data at rest is Data saved to a hard drive, storage array, or USB


drive .
IoT Data Analytics Overview
there are four types of data analysis results:
• Descriptive: Descriptive data analysis tells you
what is happening, either now or in the past.
For example, a thermometer in a truck engine
reports temperature values every second. If the
temperature value is too high, then there may
be a cooling problem or the engine may be
experiencing too much load.
• Diagnostic: When you are interested in the “why,” diagnostic
data analysis can provide the answer. Continuing with the
example of the temperature sensor in the truck engine, you
might wonder why the truck engine failed. Diagnostic analysis
might show that the temperature of the engine was too high,
and the engine overheated. Applying diagnostic analysis across
the data generated by a wide range of smart objects can
provide a clear picture of why a problem or an event occurred.
• Predictive: Predictive analysis aims to foretell problems or issues
before they occur. For example, with historical values of
temperatures for the truck engine, predictive analysis could
provide an estimate on the remaining life of certain components in
the engine.
• Prescriptive: Prescriptive analysis goes a step
beyond predictive and recommends solutions for
upcoming problems. A prescriptive analysis of the
temperature data from a truck engine might
calculate various alternatives to cost-effectively
maintain our truck. Prescriptive analysis looks at a
variety of factors and makes the appropriate
recommendation.
Machine Learning
• One of the core subjects in IoT is how to makes sense of
the data that is generated. This brings us to the subject of
machine learning (ML).
• For example, every time a new advance is made in the
field of self-driving vehicles, abnormal pattern recognition
in a crowd, or any other automated intelligent and
machine-assisted decision system, ML is named as the
tool that made the advance possible.
Neural Networks
• Neural networks are ML methods that mimic the way the
human brain works.
• to organize ML operations into two broad subgroups:
• Local learning: In this group, data is collected and processed
locally, either in the sensor itself (the edge node) or in the
gateway (the fog node).
• Remote learning: In this group, data is collected and sent to
a central computing unit (typically the data center in a
specific location or in the cloud), where it is processed.
Summary
• IoT systems are producing vast volumes of data—far more than has
ever been available in the past
• A new form of data management has therefore emerged: IoT data
analytics.
• To unlock the value of the data, special algorithms that perform
machine learning are required to process the data and find
patterns.
• network analytics comes in many shapes and forms. Each of them
plays a key role in the world of IoT and helps define the true value
that comes from connecting things.
Chapter 6. Securing IoT
• This chapter explores a number of practical steps for creating a
more secure industrial environment, including best practices in
introducing modern IT network security into legacy industrial
environments. It includes the following sections:
A Brief History of OT Security
How IT and OT Security Practices and Systems Vary
Formal Risk Analysis Structures: OCTAVE and FAIR
The Phased Application of Security in an Operational
Environment
A Brief History of OT Security
• Attackers were skilled individuals with deep knowledge of
technology and the systems they were attacking. However, as
technology has advanced, tools have been created to make
attacks much easier to carry out.

(US Industrial Control Systems

Cyber Emergency

Response Team (ICS-CERT)


Common Challenges in OT
Security
Erosion of Network Architecture
Pervasive Legacy Systems
Insecure Operational Protocols
DNP3 (Distributed Network Protocol)
Device Insecurity
Dependence on External Vendors
Security Knowledge
Formal Risk Analysis Structures: OCTAVE and FAIR
• The key for any industrial environment is that it needs to
address security holistically and not just focus on
technology. It must include people and processes, and it
should include all the vendor ecosystem components
that make up a control system. In this section, we
present a brief review of two such risk assessment
frameworks:
 OCTAVE (Operationally Critical Threat, Asset and
Vulnerability
Evaluation) from the Software Engineering Institute at
Carnegie Mellon University
 FAIR (Factor Analysis of Information Risk) from The
Open Group
OCTAVE
OCTAVE Allegro
steps and phases:
FAIR
• FAIR (Factor Analysis of Information Risk) is a technical
standard for risk definition from The Open Group.
• With this definition, a clear hierarchy of sub elements
emerges, with one side of the taxonomy focused on frequency
and the other on magnitude:
1) the threat event frequency (TEF)
2) the probable loss magnitude (PLM)
Secured Network Infrastructure and Assets
Deploying Dedicated Security Appliances
The goal is to provide:
1-visibility.
2- safety
3-security for traffic within the network.
• This level of visibility is typically achieved with:
deep packet inspection (DPI) technologies such as intrusion
detection/prevention systems (IDS/IPS).
access control lists (ACLs).
Summary
• Network connectivity can be made secure with the right
equipment and policies.
• Threats from unsafe practices, attacks, and remote access
needs can be identified and controlled with dedicated
industrial security appliances and practices.
• Learning from the more extensive and mature security
practices and tools in IT environments as well as coordinating
layers of defense to protect critical industrial assets are key
security enablers for operational environments.
Chapter 7 :IoT in Industry
IoT Applications
• IPTV
• Manufacturing
• Oil & Gas
• Smart and Connected Cities
• Transportation
• Mining
• Public Safety
IPTV
• IPTV systems are an upgrade of classic
broadcast systems Transmission of a
video signal over an IP network
• Numerous advantages :
• Return channel interactivity
• Content on demand
• Niche content (free spectrum is not
the limit)
• HDTV, multichannel sound
• Supplementary services, better user
interfaces,…
Manufacturing
• The world of manufacturing is rapidly
moving toward digital transformation.
Manufacturers are migrating disparate
independent systems toward converged
networks and control protocols.
Converged Plant wide Ethernet (CPwE)
REP, DLR, and MRP, which allow rapid
Ethernet ring convergence.
Oil and Gas
• The oil and gas industry was one of the
first industrial sectors to start leveraging
the power of technology
• IoT and digitization are bringing about
significant improvements in the oil and
gas industry, including the following:
1.Enabling feasible data acquisition
2. Driving cost savings throughout the
value chain—upstream, midstream,
and downstream.
3. Increasing agility and risk
mitigation.
4. Improving productivity and bridging
the oncoming talent gap
Smart and Connected Cities
• Smart buildings: Smart buildings have the potential to save $100
billion by lowering operating costs by reducing energy
consumption through the efficient integration of: (HVAC)
Heating
Ventilation
and air-conditioning
• Smart parking: Smart parking could create $41 billion by providing
real-time visibility into parking space availability across a city.
• Road pricing: Cities could create $18 billion in new revenues by
implementing automatic payments as vehicles enter busy city
zones while improving overall traffic conditions.
Transportation
IoT brings formidable
advantages:
Connected Cars
Connected Fleets
• A common way to reduce stop-
and-go traffic is to carefully
regulate the flow of transport
entering the various sections
of the road.
Mining
• Smart objects are at the entry
point of the IoT network
stack. In mining environments
the large objects, including
haul trucks and electric
shovels, are now becoming
smart objects. Because these
large objects are often
operated by a local human,
sensors commonly connect to
a human–machine interface
(HMI) over a wired interface.
Public Safety
a profound impact
on public safety:
real-time
information and
situational
awareness
Enables users to
take action based
on intelligent
data

Das könnte Ihnen auch gefallen