SlideShare a Scribd company logo
1 of 5
Download to read offline
IJSRD || National Conference on ICT & IoT || January 2016
©IJSRD 2016 Published by IJSRD 30
IoT for Everyday Life
Madhavi Dave
Assistant Professor
Department of MCA
Institute of Information & Communication Technology, Indus University, Ahmedabad
Abstract— In today’s emerging world of Internet, each and every thing is supposed to be in connected mode with the help
of billions of smart devices. By connecting all the devises used in our day to day life, make our life trouble less and easy.
We are incorporated in a world where we are used to have smart phones, smart cars, smart gadgets, smart homes and smart
cities. Different institutes and researchers are working for creating a smart world for us but real question which we need to
emphasis on is how to make dumb devises talk with uncommon hardware and communication technology. For the same
what kind of mechanism to use with various protocols and less human interaction. The purpose is to provide the key area for
application of IoT and a platform on which various devices having different mechanism and protocols can communicate with
an integrated architecture.
Key words: Virtual Private Network (VPN), CoAP, XMPP server
I. INTRODUCTION
As being the global network, IoT need to connect actual and virtual devises with efficient data sharing method, secured data
storage using cloud computing and robust inter network connectivity. Iot is responsible to connect millions of objects (things)
which can impact major factors like healthcare, home, security, utility and appliances, communication, business, transportation,
education, government, science, humanity, retail and emergency services.
Fig. 1.1: Application areas of Internet of Things
II. REAL TIME APPLICATION
The applications used for Internet are growing by each day and to utilize it properly, they are classified according to its usage.
The category domains are,
 Personal / Home
 Mobile
 Utilities
 Business
For Home appliances, mostly WiFi network and sensors are used to connect the devices. The IoT servers are connected
with the applications using Apple, iOS, Windows OS, Google Android, etc which are installed and gather raw data from devices.
Sore security paradigm also required using the shared cloud for using same information from server and all devices are
authenticated to use data from that cloud. The sensors and other devices like refrigerator, air conditioner, and security alarm are
connected with cloud so it can take actions for energy savings or other operations.
Mobile communication and its data sharing mechanism are different than other domains thus it is categorized as
separate unit of research. Bluetooth and cellular network systems are widely used to connect mobile phones, hands free devices,
IoT for Everyday Life
(IJSRD/Conf/NCICT /2016/09)
31
positioning systems, etc. With current scenario retails, entertainment, communication and other functionalities can be connected
easily with smart mobile devices. It also plays an important role for tracking system for any logistics.
Utilities can be considered for optimal use or allocated resources. Any organization implements utilities to switch
between available feasible options, for e.g. any organization can select internet usage medium from Wifi, cellular or any other
provided network as per the availability so the resources can be used minimal and profit can be maximized.
For any business or enterprise, some applications are installed for environmental settings. Basic workshop setting,
climate change control, security issues, operation for product design and management are the functions which need surveillance
of technology under IoT. Local business and government body may have different requirements and thus its setup for the system
of Iot.
III. CONTROL INTERFACE
Since IoT applications are required to run on different devices using their own sensors as shown in below figure, the main
control to handle all devices would be user’s smart phone or any other control which user can carry for remote access. The
control interface can be one easily operable UI which can run all application away from home or any work area. The UI should
be able to handle various applications with its criteria of functional operation. For example, UI application on smart phone can
give you information about traffic, home air condition, health monitoring, pressure of your factory’s boiler, etc.
IV. SOFTWARE AND ROBUST APPLICATION
The important role for IoT applications to have smart devices which are required to have smart software to run the functions.
Hardware (device) provides the capability for connection of sensor and internet, whereas software provides platform for
implementing intelligence to that hardware device. Software assures that the hardware to function properly regardless of any
operating environment. The robust system using wireless network can be implemented only with the help of proper software
which ensure to send and receive messages, act upon those messages, take decisions depending on the environment, throw
exceptions if anything went wrong and resolve the issues without much human intervention.
In today’s application driven era, wireless network and sensors have provided the base but the data captured by sensors
are meaningless until we know what to do with that data. Thus software enhances communication facility among devices that
all connected hardware can share the data and can maintain its functionality. The software need to work on abstract level so
any device can install it without worrying about underlying technology. It provides all devices to work on same application
layer irrelevant of their transport or any other device details.
V. DATA SECURITY
The journey of internet from closed group of communication to open for accessing all public networks is accelerating at
alarming speed. Here the alarm is for making our private data secure from public access and protecting from unauthenticated
intruders. As being the embedded system of different types of hardware and software for connection also raise a question mark
for unavoidable interference and thus using system with accurate functionality.
Security has been the issue ever since the network had started. Gradually protocols have been invented which can
make manageable layered communication. Software with high degree of user authentication mechanism incorporated. While
using cloud data, Virtual Private Network (VPN) and its protocols helped to maintain data security which is our highest priority.
Fig. 5.1: Data Security and Storage in IoT
IoT for Everyday Life
(IJSRD/Conf/NCICT /2016/09)
32
The system used for home automation, traffic control, heath monitoring, etc are purely embedded devices which have
very less storage space and thus it’s not appropriate to handle critical task. Also the human interference is very minimal for
such devices. For IoT application we require comparatively more storage space and intelligent devices with some human
operations.
To overcome such issues, the system needs a connecting device like router or gateway which can integrate all data
coming from different embedded devices. These devices are having sensors for accessing and gathering facts from outer
environment. The wired or wireless network would connect all devices and then send the data of different formats to one
connecting router or gateway. The gateway then stores the data in server and also having various cloud and its appropriate
applications to run those devices.
A. Device Authentication
Just as the user requires login name and password before starting any application, device would also need to get authenticated
before connecting with the network. Device credentials are stored in its own storage space. The authenticated device reduces
the risk of intruder.
B. Access Control
There are different accesses controls can be provided i.e. role based, device based and mandatory. The privileges are given on
based the resources can be used by that specific person or device. And if it attempt to use more that what is allowed the all
privileges would be rolled back. Any intruders are given minimal access to the shared resources.
C. Firewall
As the embedded devices are having different protocols from each other, the firewall needs to get installed at host side. So the
firewall operates at client side helps to find malwares and stop it from getting ahead in the system. It also handles non-IT
protocols and communication and data transfer among it.
D. Updates
Software updates and security patches should be installed in such a way that the embedded device need not to compromise on
its functionality or services. Some updates makes the system ideal for couple of minutes and thus the functionality of device
would suffer. To avoid such trouble, updates and patches need to be implemented in time and without using much bandwidth.
VI. COMMUNICATION ARCHITECTURE
The growth of smart devices in each sector and its massive data requires large and reliable data storage for easy and fast
communication. Various devices communicate using different web technologies, thus the integration among them is a major
area of research. For example, any sensor gets raw data by sensing the traffic then how it will be converted into knowledge base
for the purpose of using the data to reduce traffic and avoid inconvenience. Following are the protocols we are using for
communication.
Fig. 6.1: Protocol Suit for Communication Architecture
VII. INTEROPERABILITY THROUGH PROTOCOL
Seamless connection between all devices is the essential requirement for any IoT system. Thus there is no perfect wired /
wireless technology that can server across the network without any flaw. At the end of device, the protocols are needed for easy
and robust communication. As we mostly use IP protocol for connecting through internet, but it requires high degree of features
which is a great overhead for small devices. WiFi can also be used for wireless communication but it is high energy consumers
which is again a problem for IoT device.
The ideal combination of technology and application is must for such communication which can be provided by following few
application and web protocols and its corresponding layers are shown in above figure.
IoT for Everyday Life
(IJSRD/Conf/NCICT /2016/09)
33
A. Application Protocol
1) REST API:
Representational State Transfer Application Program Interchange is used for REST web services. REST lies on the top of
application layer so can facilitate the user to check the transferred data and allow devices to communicate easily. It allows
minimal data to be passed to architecture for working efficiently and shows the user what is necessary.
2) XMPP:
The eXtensible Messaging and Presence Protocol is the TCP protocol based on XML format. The purpose behind using XMPP
for IoT application is its working on real time structured message communication between one or more connected devices. Real
time communication is the basic necessity of IoT system, thus XMPP is mostly suitable for message transfer.
One more important feature of XMPP is its presence information and contact list maintenance which is again benefit
for IoT. XMPP works on decentralized environment so any agent can run their own server and can get message in connected
and disconnected mode.
There are few disadvantages of XMPP too. As it is not providing end-to-end encryption while most of the IoT systems
requires security for communication. Another drawback is its quality of service (QoS). As it is working as instant messages,
the XMPP server will not intimate the device to turn it on for getting message and thus the purpose of the communication may
ruined.
B. Web Protocol
1) CoAP:
The Constrained Application Protocol is useful for the devices working on low power sensors and devices need to be controlled
by internet. It is invented to work on resource constrained devices to communicate using UDP instead of TCP. The basic client-
server model is followed for communication in CoAP for request and response.
CoAP is providing application level QoS for messages as there are received or pending. It also uses RSA key for facilitating
basic encryption mechanism. One major disadvantage of CoAP is its one-to-one communication nature. Though with extension
one can create a group but it’s totally lacking publish-subscriber message queue.
2) MQTT:
Message Queue Telemetry Transport is publish subscribe messaging protocol. It is designed as lightweight structure to save
power and memory. MQTT is also having capacity to communicate with constrained device.
The major advantage is having many-to-many broadcast functionality using TCP on simple sending back and forth messages.
The drawback of MTQQ is its always on connection, so the devices go in sleep mode sometimes. Another downside is the lack
of encryption mechanism for secure communication.
C. Internet Protocol
1) UDP:
User Datagram protocol is connectionless communication protocol. UDP facilitates both multicast and unicast message
transmission. It is lightweight protocol and delivers message in time. Disadvantage of UDP is its not providing any flow or
error control mechanism like TCP.
2) TCP:
Transmission Control Protocol defines a standard for connected devices that how to communicate. It guarantees that a packet
will be surely delivered in order it is send. It can be used for communication between different devices and it is industry standard
made protocol which can work without any add on. The drawback of this protocol is its heavy to implement with its suit for
complete functionality. TCP is also not a real time protocols so takes time before delivering message.
3) IPv6:
Internet Protocol version 6 is internet layer protocol for end-to-end communication of datagram cross different networks. IPv6
facilitate authentication header, thus the security is handled properly. Using IPv6 one can address number of devices because
of its large address space. Due to its feature of indentifying traffic, it can provide quality of service (QoS).
4) 6LoWPAN:
6LoWPAN is the acronym of Low power Wireless Personal Area Network. It is adaption layer of IPv6 and inherits the basic
functionality of it. It is advantageous for IoT applications because of its small packet size and can work on typically battery
operated devices. Its downside is not all routing protocols can be combined with it and its reliability depends on the device.
VIII. INTEGRATED DATABASE
For IoT application the embedded systems gather the data through sensor and automated application stores the data in server.
To make the operation smooth, data is integrated as soon as it’s generated. Most of the centralized databases implement indexing
and classification on automated data. Properly managed IoT data is most valuable when it is connected to other devices and
data sources. The success of IoT can be measured only by secure data storage and continuous flow of information.
IX. CONCLUSION
As we are growing with the emerging world of automation gadgets used in day to day life, IoT plays essential role with all its
technologies. Number of hardware and software are devices and applications are invented to make human life easier. Different
approaches and researches need to be implemented so the finest of the systems and application create IoT environment around
us.
IoT for Everyday Life
(IJSRD/Conf/NCICT /2016/09)
34
ACKNOWLEDGEMENT
The purpose of this document is to give insight about the basic mechanism any IoT system need to incorporate and some
technical aspect of emerging technology. Some details have been referenced from books and few web links mentioned below.
REFERENCES
[1] T. He, J. Stankoviv, C. Lu and T. Abdelzaher, A Spatiotemporal Communication Protocols for Wireless Sensor Networks,
IEEE Transaction on Parallel and Distribute Systems, Oct 2005.
[2] B. Brummit, B. Meyers, J. Krumm, A. Kem and S. A. Shafer, Easyliving: Technologies for Intelligent Environments, HUC,
2000.
[3] J. Stankovic, A Vision of Smart City in Future, Smart Cities, Oct 2013.
[4] S. Ravi, A. Raghunathan, S. Chakradhar. Temper Resistance Mechanism for Secure, Embedded System, 17th International
Conference on VLSI Design, 2004.
[5] John A. Stankovic, Directions for Internet of Things, University of Virginia, 2014.

More Related Content

What's hot

Article on "internet of things"
Article on "internet of things"Article on "internet of things"
Article on "internet of things"Team Saral
 
A Study on Internet of Things
A Study on Internet of ThingsA Study on Internet of Things
A Study on Internet of ThingsIRJET Journal
 
Internet of things - Introduction and Variations (Architecture)
Internet of things - Introduction and Variations (Architecture)Internet of things - Introduction and Variations (Architecture)
Internet of things - Introduction and Variations (Architecture)Mayank Vijh
 
IOT- information Technology
IOT- information Technology IOT- information Technology
IOT- information Technology khushi pokharna
 
15CS81- IoT- VTU- module 3
15CS81- IoT- VTU- module 315CS81- IoT- VTU- module 3
15CS81- IoT- VTU- module 3Syed Mustafa
 
Home monitoring system using io t
Home monitoring system using io tHome monitoring system using io t
Home monitoring system using io tPuneet Mishra
 
New Trends in Internet of Things, Applications, Challenges, and Solutions
New Trends in Internet of Things, Applications, Challenges, and SolutionsNew Trends in Internet of Things, Applications, Challenges, and Solutions
New Trends in Internet of Things, Applications, Challenges, and SolutionsTELKOMNIKA JOURNAL
 
IoT: Ongoing challenges and opportunities in Mobile Technology
IoT: Ongoing challenges and opportunities in Mobile TechnologyIoT: Ongoing challenges and opportunities in Mobile Technology
IoT: Ongoing challenges and opportunities in Mobile TechnologyAI Publications
 
Io t & amp; industry 4.0,internet of things
Io t & amp; industry 4.0,internet of thingsIo t & amp; industry 4.0,internet of things
Io t & amp; industry 4.0,internet of thingsSumanPramanik7
 
Societal Change and Transformation by Internet of Things (IoT)
Societal Change and Transformation by Internet of Things (IoT)Societal Change and Transformation by Internet of Things (IoT)
Societal Change and Transformation by Internet of Things (IoT)CSCJournals
 
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESWIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVEScsandit
 
A Smart Switch to Connect and Disconnect Electrical Devices at Home by using ...
A Smart Switch to Connect and Disconnect Electrical Devices at Home by using ...A Smart Switch to Connect and Disconnect Electrical Devices at Home by using ...
A Smart Switch to Connect and Disconnect Electrical Devices at Home by using ...IRJET Journal
 
Internet of Things -Overview
Internet of Things -OverviewInternet of Things -Overview
Internet of Things -OverviewIJRST Journal
 
Introduction to Internet of things
Introduction to Internet of thingsIntroduction to Internet of things
Introduction to Internet of thingsRehmat Ullah
 

What's hot (20)

Article on "internet of things"
Article on "internet of things"Article on "internet of things"
Article on "internet of things"
 
A Study on Internet of Things
A Study on Internet of ThingsA Study on Internet of Things
A Study on Internet of Things
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Internet of things - Introduction and Variations (Architecture)
Internet of things - Introduction and Variations (Architecture)Internet of things - Introduction and Variations (Architecture)
Internet of things - Introduction and Variations (Architecture)
 
IoT PPT
IoT PPTIoT PPT
IoT PPT
 
IOT- information Technology
IOT- information Technology IOT- information Technology
IOT- information Technology
 
15CS81- IoT- VTU- module 3
15CS81- IoT- VTU- module 315CS81- IoT- VTU- module 3
15CS81- IoT- VTU- module 3
 
Home monitoring system using io t
Home monitoring system using io tHome monitoring system using io t
Home monitoring system using io t
 
theiva
theivatheiva
theiva
 
New Trends in Internet of Things, Applications, Challenges, and Solutions
New Trends in Internet of Things, Applications, Challenges, and SolutionsNew Trends in Internet of Things, Applications, Challenges, and Solutions
New Trends in Internet of Things, Applications, Challenges, and Solutions
 
IoT: Ongoing challenges and opportunities in Mobile Technology
IoT: Ongoing challenges and opportunities in Mobile TechnologyIoT: Ongoing challenges and opportunities in Mobile Technology
IoT: Ongoing challenges and opportunities in Mobile Technology
 
Lecture 16
Lecture 16Lecture 16
Lecture 16
 
Io t & amp; industry 4.0,internet of things
Io t & amp; industry 4.0,internet of thingsIo t & amp; industry 4.0,internet of things
Io t & amp; industry 4.0,internet of things
 
Societal Change and Transformation by Internet of Things (IoT)
Societal Change and Transformation by Internet of Things (IoT)Societal Change and Transformation by Internet of Things (IoT)
Societal Change and Transformation by Internet of Things (IoT)
 
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESWIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
 
A Smart Switch to Connect and Disconnect Electrical Devices at Home by using ...
A Smart Switch to Connect and Disconnect Electrical Devices at Home by using ...A Smart Switch to Connect and Disconnect Electrical Devices at Home by using ...
A Smart Switch to Connect and Disconnect Electrical Devices at Home by using ...
 
Internet of Things -Overview
Internet of Things -OverviewInternet of Things -Overview
Internet of Things -Overview
 
Introduction of iot
Introduction of iotIntroduction of iot
Introduction of iot
 
Introduction to Internet of things
Introduction to Internet of thingsIntroduction to Internet of things
Introduction to Internet of things
 
Internet of things
Internet of thingsInternet of things
Internet of things
 

Viewers also liked

Confusion of Things — The IoT Hardware Kerfuffle
Confusion of Things — The IoT Hardware KerfuffleConfusion of Things — The IoT Hardware Kerfuffle
Confusion of Things — The IoT Hardware KerfuffleOmer Kilic
 
IoT Domain Naming and Pain Points
IoT Domain Naming and Pain PointsIoT Domain Naming and Pain Points
IoT Domain Naming and Pain PointsDavid Fowler
 
Building IoT Devices - From Prototype to Production
Building IoT Devices - From Prototype to ProductionBuilding IoT Devices - From Prototype to Production
Building IoT Devices - From Prototype to ProductionAnwaarullah
 
2016 iot summit_guy_bieber9
2016 iot summit_guy_bieber92016 iot summit_guy_bieber9
2016 iot summit_guy_bieber9Guy Bieber
 
Technical Challenges - How To Design IoT Systems
Technical Challenges - How To Design IoT SystemsTechnical Challenges - How To Design IoT Systems
Technical Challenges - How To Design IoT SystemsEmil Kirilov
 
Internet of Things (IoT) overview powered by Red Hat
Internet of Things (IoT) overview powered by Red HatInternet of Things (IoT) overview powered by Red Hat
Internet of Things (IoT) overview powered by Red HatDavid Bericat
 
Introduction to Internet of Things Hardware
Introduction to Internet of Things HardwareIntroduction to Internet of Things Hardware
Introduction to Internet of Things HardwareDaniel Eichhorn
 
CIS14: Human Identity and the IoT “Jungle”
CIS14: Human Identity and the IoT “Jungle”CIS14: Human Identity and the IoT “Jungle”
CIS14: Human Identity and the IoT “Jungle”CloudIDSummit
 
Grace Hopper - Internet of Things from A to Z
Grace Hopper - Internet of Things from A to ZGrace Hopper - Internet of Things from A to Z
Grace Hopper - Internet of Things from A to ZDesiree Santos
 
IoT Smart APIs using Nomos RuleX
IoT Smart APIs using Nomos RuleXIoT Smart APIs using Nomos RuleX
IoT Smart APIs using Nomos RuleXCliff Faurer
 
9 Ways The Internet of Things Is Changing Everything
9 Ways The Internet of Things Is Changing Everything9 Ways The Internet of Things Is Changing Everything
9 Ways The Internet of Things Is Changing EverythingAttunity
 
Jaakko Kankaanpää - IoT Took My Money - Mindtrek 2016
Jaakko Kankaanpää - IoT Took My Money - Mindtrek 2016Jaakko Kankaanpää - IoT Took My Money - Mindtrek 2016
Jaakko Kankaanpää - IoT Took My Money - Mindtrek 2016Mindtrek
 
Martin Herdina (Wikitude) 2017: When Pikachu meets IoT
Martin Herdina (Wikitude) 2017: When Pikachu meets IoTMartin Herdina (Wikitude) 2017: When Pikachu meets IoT
Martin Herdina (Wikitude) 2017: When Pikachu meets IoTAugmentedWorldExpo
 
What the IoT should learn from the life sciences
What the IoT should learn from the life sciencesWhat the IoT should learn from the life sciences
What the IoT should learn from the life sciencesBoris Adryan
 

Viewers also liked (20)

Confusion of Things — The IoT Hardware Kerfuffle
Confusion of Things — The IoT Hardware KerfuffleConfusion of Things — The IoT Hardware Kerfuffle
Confusion of Things — The IoT Hardware Kerfuffle
 
IoT Domain Naming and Pain Points
IoT Domain Naming and Pain PointsIoT Domain Naming and Pain Points
IoT Domain Naming and Pain Points
 
Li fi for future mobiles
Li fi for future mobilesLi fi for future mobiles
Li fi for future mobiles
 
Building IoT Devices - From Prototype to Production
Building IoT Devices - From Prototype to ProductionBuilding IoT Devices - From Prototype to Production
Building IoT Devices - From Prototype to Production
 
Iot Overview
Iot Overview Iot Overview
Iot Overview
 
2016 iot summit_guy_bieber9
2016 iot summit_guy_bieber92016 iot summit_guy_bieber9
2016 iot summit_guy_bieber9
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Technical Challenges - How To Design IoT Systems
Technical Challenges - How To Design IoT SystemsTechnical Challenges - How To Design IoT Systems
Technical Challenges - How To Design IoT Systems
 
Internet of Things (IoT) overview powered by Red Hat
Internet of Things (IoT) overview powered by Red HatInternet of Things (IoT) overview powered by Red Hat
Internet of Things (IoT) overview powered by Red Hat
 
Ibm iot overview
Ibm   iot overviewIbm   iot overview
Ibm iot overview
 
Design challenges in IoT
Design challenges in IoT Design challenges in IoT
Design challenges in IoT
 
Introduction to Internet of Things Hardware
Introduction to Internet of Things HardwareIntroduction to Internet of Things Hardware
Introduction to Internet of Things Hardware
 
CIS14: Human Identity and the IoT “Jungle”
CIS14: Human Identity and the IoT “Jungle”CIS14: Human Identity and the IoT “Jungle”
CIS14: Human Identity and the IoT “Jungle”
 
6 iot cases
6 iot cases6 iot cases
6 iot cases
 
Grace Hopper - Internet of Things from A to Z
Grace Hopper - Internet of Things from A to ZGrace Hopper - Internet of Things from A to Z
Grace Hopper - Internet of Things from A to Z
 
IoT Smart APIs using Nomos RuleX
IoT Smart APIs using Nomos RuleXIoT Smart APIs using Nomos RuleX
IoT Smart APIs using Nomos RuleX
 
9 Ways The Internet of Things Is Changing Everything
9 Ways The Internet of Things Is Changing Everything9 Ways The Internet of Things Is Changing Everything
9 Ways The Internet of Things Is Changing Everything
 
Jaakko Kankaanpää - IoT Took My Money - Mindtrek 2016
Jaakko Kankaanpää - IoT Took My Money - Mindtrek 2016Jaakko Kankaanpää - IoT Took My Money - Mindtrek 2016
Jaakko Kankaanpää - IoT Took My Money - Mindtrek 2016
 
Martin Herdina (Wikitude) 2017: When Pikachu meets IoT
Martin Herdina (Wikitude) 2017: When Pikachu meets IoTMartin Herdina (Wikitude) 2017: When Pikachu meets IoT
Martin Herdina (Wikitude) 2017: When Pikachu meets IoT
 
What the IoT should learn from the life sciences
What the IoT should learn from the life sciencesWhat the IoT should learn from the life sciences
What the IoT should learn from the life sciences
 

Similar to IoT for Everyday Life

Unit_1_IOT_INTRO.pptx
Unit_1_IOT_INTRO.pptxUnit_1_IOT_INTRO.pptx
Unit_1_IOT_INTRO.pptxBharat Tank
 
Unit 3 - Internet of Things - www.rgpvnotes.in.pdf
Unit 3 - Internet of Things - www.rgpvnotes.in.pdfUnit 3 - Internet of Things - www.rgpvnotes.in.pdf
Unit 3 - Internet of Things - www.rgpvnotes.in.pdfShubhamYadav73126
 
Internet of things
Internet of thingsInternet of things
Internet of thingsTamojit Das
 
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks
 
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET Journal
 
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...IJCSIS Research Publications
 
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdfHOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdfKanagarajanSwamiappa
 
Smart Security System IOT
Smart Security System IOTSmart Security System IOT
Smart Security System IOTijtsrd
 
IOT Based Smart Home System Technologies
IOT Based Smart Home System TechnologiesIOT Based Smart Home System Technologies
IOT Based Smart Home System TechnologiesIJERDJOURNAL
 
Compiler design presentaion
Compiler design presentaionCompiler design presentaion
Compiler design presentaionMdShahinAlam25
 
Implementation of Real Time Home Automation of Embedded System Design with In...
Implementation of Real Time Home Automation of Embedded System Design with In...Implementation of Real Time Home Automation of Embedded System Design with In...
Implementation of Real Time Home Automation of Embedded System Design with In...IRJET Journal
 
Energy Management with Disaster Intimation and Control using IoT
Energy Management with Disaster Intimation and Control using IoTEnergy Management with Disaster Intimation and Control using IoT
Energy Management with Disaster Intimation and Control using IoTIJEACS
 
A Study Mobile Computing
A Study   Mobile ComputingA Study   Mobile Computing
A Study Mobile ComputingSara Alvarez
 
IRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: ReviewIRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: ReviewIRJET Journal
 
UBIQUITOUS SMART HOME SYSTEM USING ANDROID APPLICATION
UBIQUITOUS SMART HOME SYSTEM USING ANDROID APPLICATIONUBIQUITOUS SMART HOME SYSTEM USING ANDROID APPLICATION
UBIQUITOUS SMART HOME SYSTEM USING ANDROID APPLICATIONIJCNCJournal
 
Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Asiri Hewage
 
Development of web-based surveillance system for Internet of Things (IoT) app...
Development of web-based surveillance system for Internet of Things (IoT) app...Development of web-based surveillance system for Internet of Things (IoT) app...
Development of web-based surveillance system for Internet of Things (IoT) app...journalBEEI
 

Similar to IoT for Everyday Life (20)

Unit_1_IOT_INTRO.pptx
Unit_1_IOT_INTRO.pptxUnit_1_IOT_INTRO.pptx
Unit_1_IOT_INTRO.pptx
 
Unit 3 - Internet of Things - www.rgpvnotes.in.pdf
Unit 3 - Internet of Things - www.rgpvnotes.in.pdfUnit 3 - Internet of Things - www.rgpvnotes.in.pdf
Unit 3 - Internet of Things - www.rgpvnotes.in.pdf
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready Infrastructure
 
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
 
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
 
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdfHOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
 
Smart Security System IOT
Smart Security System IOTSmart Security System IOT
Smart Security System IOT
 
IOT Based Smart Home System Technologies
IOT Based Smart Home System TechnologiesIOT Based Smart Home System Technologies
IOT Based Smart Home System Technologies
 
Compiler design presentaion
Compiler design presentaionCompiler design presentaion
Compiler design presentaion
 
Implementation of Real Time Home Automation of Embedded System Design with In...
Implementation of Real Time Home Automation of Embedded System Design with In...Implementation of Real Time Home Automation of Embedded System Design with In...
Implementation of Real Time Home Automation of Embedded System Design with In...
 
Energy Management with Disaster Intimation and Control using IoT
Energy Management with Disaster Intimation and Control using IoTEnergy Management with Disaster Intimation and Control using IoT
Energy Management with Disaster Intimation and Control using IoT
 
A Study Mobile Computing
A Study   Mobile ComputingA Study   Mobile Computing
A Study Mobile Computing
 
IJET-V2I6P24
IJET-V2I6P24IJET-V2I6P24
IJET-V2I6P24
 
IRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: ReviewIRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: Review
 
UBIQUITOUS SMART HOME SYSTEM USING ANDROID APPLICATION
UBIQUITOUS SMART HOME SYSTEM USING ANDROID APPLICATIONUBIQUITOUS SMART HOME SYSTEM USING ANDROID APPLICATION
UBIQUITOUS SMART HOME SYSTEM USING ANDROID APPLICATION
 
IoT.pptx
IoT.pptxIoT.pptx
IoT.pptx
 
Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Security Aspects in IoT - A Review
Security Aspects in IoT - A Review
 
internet of things
internet of thingsinternet of things
internet of things
 
Development of web-based surveillance system for Internet of Things (IoT) app...
Development of web-based surveillance system for Internet of Things (IoT) app...Development of web-based surveillance system for Internet of Things (IoT) app...
Development of web-based surveillance system for Internet of Things (IoT) app...
 

More from ijsrd.com

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Gridijsrd.com
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...ijsrd.com
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Lifeijsrd.com
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learningijsrd.com
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation Systemijsrd.com
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...ijsrd.com
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigeratorijsrd.com
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...ijsrd.com
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingijsrd.com
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logsijsrd.com
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMijsrd.com
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Trackingijsrd.com
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...ijsrd.com
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparatorsijsrd.com
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...ijsrd.com
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.ijsrd.com
 
DESIGN OF FIXTURE OF CONNECTING ROD FOR BORING OPERATION
DESIGN OF FIXTURE OF CONNECTING ROD FOR BORING OPERATIONDESIGN OF FIXTURE OF CONNECTING ROD FOR BORING OPERATION
DESIGN OF FIXTURE OF CONNECTING ROD FOR BORING OPERATIONijsrd.com
 
Analysis of hydrodynamic fixed pad bearing to reduce vibration by replacing f...
Analysis of hydrodynamic fixed pad bearing to reduce vibration by replacing f...Analysis of hydrodynamic fixed pad bearing to reduce vibration by replacing f...
Analysis of hydrodynamic fixed pad bearing to reduce vibration by replacing f...ijsrd.com
 
Neural Network Based Voltage and Frequency Controller for standalone Wind Pow...
Neural Network Based Voltage and Frequency Controller for standalone Wind Pow...Neural Network Based Voltage and Frequency Controller for standalone Wind Pow...
Neural Network Based Voltage and Frequency Controller for standalone Wind Pow...ijsrd.com
 
Study of Compensation of Variable Delay in Communication Link Using Communica...
Study of Compensation of Variable Delay in Communication Link Using Communica...Study of Compensation of Variable Delay in Communication Link Using Communica...
Study of Compensation of Variable Delay in Communication Link Using Communica...ijsrd.com
 

More from ijsrd.com (20)

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Grid
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Life
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learning
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation System
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigerator
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processing
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Tracking
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparators
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
 
DESIGN OF FIXTURE OF CONNECTING ROD FOR BORING OPERATION
DESIGN OF FIXTURE OF CONNECTING ROD FOR BORING OPERATIONDESIGN OF FIXTURE OF CONNECTING ROD FOR BORING OPERATION
DESIGN OF FIXTURE OF CONNECTING ROD FOR BORING OPERATION
 
Analysis of hydrodynamic fixed pad bearing to reduce vibration by replacing f...
Analysis of hydrodynamic fixed pad bearing to reduce vibration by replacing f...Analysis of hydrodynamic fixed pad bearing to reduce vibration by replacing f...
Analysis of hydrodynamic fixed pad bearing to reduce vibration by replacing f...
 
Neural Network Based Voltage and Frequency Controller for standalone Wind Pow...
Neural Network Based Voltage and Frequency Controller for standalone Wind Pow...Neural Network Based Voltage and Frequency Controller for standalone Wind Pow...
Neural Network Based Voltage and Frequency Controller for standalone Wind Pow...
 
Study of Compensation of Variable Delay in Communication Link Using Communica...
Study of Compensation of Variable Delay in Communication Link Using Communica...Study of Compensation of Variable Delay in Communication Link Using Communica...
Study of Compensation of Variable Delay in Communication Link Using Communica...
 

Recently uploaded

ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxAmita Gupta
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 

Recently uploaded (20)

ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 

IoT for Everyday Life

  • 1. IJSRD || National Conference on ICT & IoT || January 2016 ©IJSRD 2016 Published by IJSRD 30 IoT for Everyday Life Madhavi Dave Assistant Professor Department of MCA Institute of Information & Communication Technology, Indus University, Ahmedabad Abstract— In today’s emerging world of Internet, each and every thing is supposed to be in connected mode with the help of billions of smart devices. By connecting all the devises used in our day to day life, make our life trouble less and easy. We are incorporated in a world where we are used to have smart phones, smart cars, smart gadgets, smart homes and smart cities. Different institutes and researchers are working for creating a smart world for us but real question which we need to emphasis on is how to make dumb devises talk with uncommon hardware and communication technology. For the same what kind of mechanism to use with various protocols and less human interaction. The purpose is to provide the key area for application of IoT and a platform on which various devices having different mechanism and protocols can communicate with an integrated architecture. Key words: Virtual Private Network (VPN), CoAP, XMPP server I. INTRODUCTION As being the global network, IoT need to connect actual and virtual devises with efficient data sharing method, secured data storage using cloud computing and robust inter network connectivity. Iot is responsible to connect millions of objects (things) which can impact major factors like healthcare, home, security, utility and appliances, communication, business, transportation, education, government, science, humanity, retail and emergency services. Fig. 1.1: Application areas of Internet of Things II. REAL TIME APPLICATION The applications used for Internet are growing by each day and to utilize it properly, they are classified according to its usage. The category domains are,  Personal / Home  Mobile  Utilities  Business For Home appliances, mostly WiFi network and sensors are used to connect the devices. The IoT servers are connected with the applications using Apple, iOS, Windows OS, Google Android, etc which are installed and gather raw data from devices. Sore security paradigm also required using the shared cloud for using same information from server and all devices are authenticated to use data from that cloud. The sensors and other devices like refrigerator, air conditioner, and security alarm are connected with cloud so it can take actions for energy savings or other operations. Mobile communication and its data sharing mechanism are different than other domains thus it is categorized as separate unit of research. Bluetooth and cellular network systems are widely used to connect mobile phones, hands free devices,
  • 2. IoT for Everyday Life (IJSRD/Conf/NCICT /2016/09) 31 positioning systems, etc. With current scenario retails, entertainment, communication and other functionalities can be connected easily with smart mobile devices. It also plays an important role for tracking system for any logistics. Utilities can be considered for optimal use or allocated resources. Any organization implements utilities to switch between available feasible options, for e.g. any organization can select internet usage medium from Wifi, cellular or any other provided network as per the availability so the resources can be used minimal and profit can be maximized. For any business or enterprise, some applications are installed for environmental settings. Basic workshop setting, climate change control, security issues, operation for product design and management are the functions which need surveillance of technology under IoT. Local business and government body may have different requirements and thus its setup for the system of Iot. III. CONTROL INTERFACE Since IoT applications are required to run on different devices using their own sensors as shown in below figure, the main control to handle all devices would be user’s smart phone or any other control which user can carry for remote access. The control interface can be one easily operable UI which can run all application away from home or any work area. The UI should be able to handle various applications with its criteria of functional operation. For example, UI application on smart phone can give you information about traffic, home air condition, health monitoring, pressure of your factory’s boiler, etc. IV. SOFTWARE AND ROBUST APPLICATION The important role for IoT applications to have smart devices which are required to have smart software to run the functions. Hardware (device) provides the capability for connection of sensor and internet, whereas software provides platform for implementing intelligence to that hardware device. Software assures that the hardware to function properly regardless of any operating environment. The robust system using wireless network can be implemented only with the help of proper software which ensure to send and receive messages, act upon those messages, take decisions depending on the environment, throw exceptions if anything went wrong and resolve the issues without much human intervention. In today’s application driven era, wireless network and sensors have provided the base but the data captured by sensors are meaningless until we know what to do with that data. Thus software enhances communication facility among devices that all connected hardware can share the data and can maintain its functionality. The software need to work on abstract level so any device can install it without worrying about underlying technology. It provides all devices to work on same application layer irrelevant of their transport or any other device details. V. DATA SECURITY The journey of internet from closed group of communication to open for accessing all public networks is accelerating at alarming speed. Here the alarm is for making our private data secure from public access and protecting from unauthenticated intruders. As being the embedded system of different types of hardware and software for connection also raise a question mark for unavoidable interference and thus using system with accurate functionality. Security has been the issue ever since the network had started. Gradually protocols have been invented which can make manageable layered communication. Software with high degree of user authentication mechanism incorporated. While using cloud data, Virtual Private Network (VPN) and its protocols helped to maintain data security which is our highest priority. Fig. 5.1: Data Security and Storage in IoT
  • 3. IoT for Everyday Life (IJSRD/Conf/NCICT /2016/09) 32 The system used for home automation, traffic control, heath monitoring, etc are purely embedded devices which have very less storage space and thus it’s not appropriate to handle critical task. Also the human interference is very minimal for such devices. For IoT application we require comparatively more storage space and intelligent devices with some human operations. To overcome such issues, the system needs a connecting device like router or gateway which can integrate all data coming from different embedded devices. These devices are having sensors for accessing and gathering facts from outer environment. The wired or wireless network would connect all devices and then send the data of different formats to one connecting router or gateway. The gateway then stores the data in server and also having various cloud and its appropriate applications to run those devices. A. Device Authentication Just as the user requires login name and password before starting any application, device would also need to get authenticated before connecting with the network. Device credentials are stored in its own storage space. The authenticated device reduces the risk of intruder. B. Access Control There are different accesses controls can be provided i.e. role based, device based and mandatory. The privileges are given on based the resources can be used by that specific person or device. And if it attempt to use more that what is allowed the all privileges would be rolled back. Any intruders are given minimal access to the shared resources. C. Firewall As the embedded devices are having different protocols from each other, the firewall needs to get installed at host side. So the firewall operates at client side helps to find malwares and stop it from getting ahead in the system. It also handles non-IT protocols and communication and data transfer among it. D. Updates Software updates and security patches should be installed in such a way that the embedded device need not to compromise on its functionality or services. Some updates makes the system ideal for couple of minutes and thus the functionality of device would suffer. To avoid such trouble, updates and patches need to be implemented in time and without using much bandwidth. VI. COMMUNICATION ARCHITECTURE The growth of smart devices in each sector and its massive data requires large and reliable data storage for easy and fast communication. Various devices communicate using different web technologies, thus the integration among them is a major area of research. For example, any sensor gets raw data by sensing the traffic then how it will be converted into knowledge base for the purpose of using the data to reduce traffic and avoid inconvenience. Following are the protocols we are using for communication. Fig. 6.1: Protocol Suit for Communication Architecture VII. INTEROPERABILITY THROUGH PROTOCOL Seamless connection between all devices is the essential requirement for any IoT system. Thus there is no perfect wired / wireless technology that can server across the network without any flaw. At the end of device, the protocols are needed for easy and robust communication. As we mostly use IP protocol for connecting through internet, but it requires high degree of features which is a great overhead for small devices. WiFi can also be used for wireless communication but it is high energy consumers which is again a problem for IoT device. The ideal combination of technology and application is must for such communication which can be provided by following few application and web protocols and its corresponding layers are shown in above figure.
  • 4. IoT for Everyday Life (IJSRD/Conf/NCICT /2016/09) 33 A. Application Protocol 1) REST API: Representational State Transfer Application Program Interchange is used for REST web services. REST lies on the top of application layer so can facilitate the user to check the transferred data and allow devices to communicate easily. It allows minimal data to be passed to architecture for working efficiently and shows the user what is necessary. 2) XMPP: The eXtensible Messaging and Presence Protocol is the TCP protocol based on XML format. The purpose behind using XMPP for IoT application is its working on real time structured message communication between one or more connected devices. Real time communication is the basic necessity of IoT system, thus XMPP is mostly suitable for message transfer. One more important feature of XMPP is its presence information and contact list maintenance which is again benefit for IoT. XMPP works on decentralized environment so any agent can run their own server and can get message in connected and disconnected mode. There are few disadvantages of XMPP too. As it is not providing end-to-end encryption while most of the IoT systems requires security for communication. Another drawback is its quality of service (QoS). As it is working as instant messages, the XMPP server will not intimate the device to turn it on for getting message and thus the purpose of the communication may ruined. B. Web Protocol 1) CoAP: The Constrained Application Protocol is useful for the devices working on low power sensors and devices need to be controlled by internet. It is invented to work on resource constrained devices to communicate using UDP instead of TCP. The basic client- server model is followed for communication in CoAP for request and response. CoAP is providing application level QoS for messages as there are received or pending. It also uses RSA key for facilitating basic encryption mechanism. One major disadvantage of CoAP is its one-to-one communication nature. Though with extension one can create a group but it’s totally lacking publish-subscriber message queue. 2) MQTT: Message Queue Telemetry Transport is publish subscribe messaging protocol. It is designed as lightweight structure to save power and memory. MQTT is also having capacity to communicate with constrained device. The major advantage is having many-to-many broadcast functionality using TCP on simple sending back and forth messages. The drawback of MTQQ is its always on connection, so the devices go in sleep mode sometimes. Another downside is the lack of encryption mechanism for secure communication. C. Internet Protocol 1) UDP: User Datagram protocol is connectionless communication protocol. UDP facilitates both multicast and unicast message transmission. It is lightweight protocol and delivers message in time. Disadvantage of UDP is its not providing any flow or error control mechanism like TCP. 2) TCP: Transmission Control Protocol defines a standard for connected devices that how to communicate. It guarantees that a packet will be surely delivered in order it is send. It can be used for communication between different devices and it is industry standard made protocol which can work without any add on. The drawback of this protocol is its heavy to implement with its suit for complete functionality. TCP is also not a real time protocols so takes time before delivering message. 3) IPv6: Internet Protocol version 6 is internet layer protocol for end-to-end communication of datagram cross different networks. IPv6 facilitate authentication header, thus the security is handled properly. Using IPv6 one can address number of devices because of its large address space. Due to its feature of indentifying traffic, it can provide quality of service (QoS). 4) 6LoWPAN: 6LoWPAN is the acronym of Low power Wireless Personal Area Network. It is adaption layer of IPv6 and inherits the basic functionality of it. It is advantageous for IoT applications because of its small packet size and can work on typically battery operated devices. Its downside is not all routing protocols can be combined with it and its reliability depends on the device. VIII. INTEGRATED DATABASE For IoT application the embedded systems gather the data through sensor and automated application stores the data in server. To make the operation smooth, data is integrated as soon as it’s generated. Most of the centralized databases implement indexing and classification on automated data. Properly managed IoT data is most valuable when it is connected to other devices and data sources. The success of IoT can be measured only by secure data storage and continuous flow of information. IX. CONCLUSION As we are growing with the emerging world of automation gadgets used in day to day life, IoT plays essential role with all its technologies. Number of hardware and software are devices and applications are invented to make human life easier. Different approaches and researches need to be implemented so the finest of the systems and application create IoT environment around us.
  • 5. IoT for Everyday Life (IJSRD/Conf/NCICT /2016/09) 34 ACKNOWLEDGEMENT The purpose of this document is to give insight about the basic mechanism any IoT system need to incorporate and some technical aspect of emerging technology. Some details have been referenced from books and few web links mentioned below. REFERENCES [1] T. He, J. Stankoviv, C. Lu and T. Abdelzaher, A Spatiotemporal Communication Protocols for Wireless Sensor Networks, IEEE Transaction on Parallel and Distribute Systems, Oct 2005. [2] B. Brummit, B. Meyers, J. Krumm, A. Kem and S. A. Shafer, Easyliving: Technologies for Intelligent Environments, HUC, 2000. [3] J. Stankovic, A Vision of Smart City in Future, Smart Cities, Oct 2013. [4] S. Ravi, A. Raghunathan, S. Chakradhar. Temper Resistance Mechanism for Secure, Embedded System, 17th International Conference on VLSI Design, 2004. [5] John A. Stankovic, Directions for Internet of Things, University of Virginia, 2014.