0% found this document useful (0 votes)
25 views5 pages

Unit 2 IoT Notes

The document discusses communication technologies, data management, and security in IoT, detailing various wireless communication protocols like Wi-Fi, Bluetooth, and LoRa, as well as IoT protocols such as MQTT and CoAP. It highlights the importance of data management strategies, including on-device, edge, and cloud storage, along with processing types like real-time and batch processing. Additionally, it addresses security concerns in IoT, outlining potential threats, authentication methods, and encryption techniques to ensure data integrity.

Uploaded by

sahilsahil69221
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views5 pages

Unit 2 IoT Notes

The document discusses communication technologies, data management, and security in IoT, detailing various wireless communication protocols like Wi-Fi, Bluetooth, and LoRa, as well as IoT protocols such as MQTT and CoAP. It highlights the importance of data management strategies, including on-device, edge, and cloud storage, along with processing types like real-time and batch processing. Additionally, it addresses security concerns in IoT, outlining potential threats, authentication methods, and encryption techniques to ensure data integrity.

Uploaded by

sahilsahil69221
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Unit II: Communication Technologies, Data Management, and

Security in IoT

1. Communication Technologies in IoT

IoT relies on a variety of communication technologies to transfer data between devices, sensors,

gateways, and cloud platforms. These technologies can be classified broadly into wireless

communication standards and application layer protocols.

a. Wireless Communication Protocols

1. Wi-Fi (Wireless Fidelity)

- Standard: IEEE 802.11

- Range: ~50 meters indoors

- Data Rate: Up to several Gbps with Wi-Fi 6

- Frequency: 2.4 GHz, 5 GHz

- Pros: High-speed, widely available infrastructure

- Cons: High power consumption, potential interference

- Use Cases: Smart homes, video streaming, office IoT systems

2. Bluetooth

- Standard: IEEE 802.15.1

- Range: ~10 meters (up to 100m with Bluetooth 5)

- Data Rate: Up to 2 Mbps

- Pros: Low energy usage, ease of integration

- Cons: Short range, lower throughput

- Use Cases: Wearables, fitness devices, headphones


3. Zigbee

- Standard: IEEE 802.15.4

- Range: 10-100 meters

- Data Rate: 250 Kbps

- Pros: Mesh networking, low power, robust

- Cons: Limited bandwidth

- Use Cases: Smart lighting, home automation, industrial sensors

4. LoRa (Long Range)

- Range: 2-15 kilometers depending on environment

- Data Rate: 0.3-50 Kbps

- Frequency: Sub-GHz (e.g., 868 MHz, 915 MHz)

- Pros: Very long range, low power

- Cons: Very low bandwidth

- Use Cases: Smart cities, environmental monitoring

5. Cellular (3G/4G/5G)

- Range: Nationwide

- Data Rate: 1 Mbps to Gbps depending on generation

- Pros: Reliable, broad coverage

- Cons: High cost, high power

- Use Cases: Vehicle tracking, industrial IoT

b. IoT Protocols

1. MQTT (Message Queuing Telemetry Transport)


- Architecture: Publish/Subscribe

- Transport: TCP/IP

- Lightweight and efficient for small sensors

- Components: Clients, Broker (central server)

- Use Case: Remote monitoring, telemetry, home automation

2. HTTP (HyperText Transfer Protocol)

- Architecture: Request/Response

- Transport: TCP

- Pros: Universally supported

- Cons: Heavy, unsuitable for constrained devices

- Use Case: Web APIs for IoT dashboards

3. CoAP (Constrained Application Protocol)

- Transport: UDP

- Architecture: Similar to HTTP (RESTful)

- Lightweight for constrained environments

- Use Case: Resource-constrained sensors, embedded systems

2. Data Management and Analytics in IoT

IoT generates massive volumes of structured and unstructured data. Proper data management

ensures efficient storage, processing, and analysis.

a. Data Storage in IoT

1. On-Device Storage: Temporary data buffers, limited due to device constraints


2. Edge Storage: Local servers or gateways, enables low-latency decision making

3. Cloud Storage: Scalable and centralized (e.g., AWS IoT Core, Google Cloud IoT)

4. Distributed Storage: Redundant, high-availability systems for large-scale apps

b. Data Processing Types

1. Real-Time Processing: Immediate action (e.g., fire alert)

2. Batch Processing: Periodic processing (e.g., daily logs)

3. Stream Processing: Continuous data flow (e.g., traffic monitoring)

c. Big Data Analytics in IoT

- Uses: Descriptive, Predictive, Prescriptive analytics

- Tools: Apache Hadoop, Apache Spark

d. Edge Computing

- Local computation to reduce latency, improve response, and save bandwidth

- Examples: Smart cameras with motion detection

3. Security and Privacy in IoT

IoT systems are vulnerable due to distributed nature and resource constraints.

a. Threats and Vulnerabilities

1. Physical Attacks: Tampering, theft


2. Network Attacks: Eavesdropping, MitM, DDoS

3. Software Attacks: Malware, insecure firmware

b. Authentication and Access Control

- Authentication Methods: Passwords, certificates, biometrics

- Access Control: RBAC and ABAC models

c. Encryption and Data Integrity

1. Encryption: AES (symmetric), RSA (asymmetric)

2. Integrity: Checksums, SHA-256

3. Secure Communication: HTTPS, TLS, DTLS

You might also like