A Survey Paper On Internet of Things

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 9

A Survey Paper on Internet of things(IOT)

and it’s application


by
1). Dhangar Mayuresh Pandurang
2). Chaudhari Mahendra Madhukar

Abstract
Internet of Things (IoT) is the concept of connecting different devices to
each other and to the internet to transmit thousands of bits of data and
information. IoT is changing a great part of the world relevant; from the

A survey paper on IoT and it’s application Page 1


manner in which we drive to how we make buys and even how we get
vitality to our homes. Complex sensors and chips are embedded around us.
How these devices share data and information and how we make use of
them. The common platform of IoT is personal health. In this paper, an
overview of different platforms and architecture and challenges [1].
This paper provides an overview of the Internet of Things (IOT) with
emphasis on enabling technologies, protocols and application issues. The
Internet of things (IOT) is the inter-networking of physical devices,
vehicles (also referred to as "connected devices" and "smart devices"),
buildings, and other items embedded with electronics, software, sensors,
actuators, and network connectivity that enable these objects to collect and
exchange data.[2]

1.Introduction

The term Internet of Things (IOT) has been around for quite a few years. In
this scenario, it is gaining ground with the evolution of advanced wireless
technology. The basic idea of this concept is the presence of a variety of
objects – such as RFID, NFC, sensors, actuators, mobile phones. In this IOT
technology the RFID is the most important concept and it is necessary for
internet of things. Different technologies in market like RFID, machine to
machine communication, vehicle to vehicle communication etc are
implemented using IOT. The main problem of IOT is facing scenario of
security the potential Hackers who always eager to attack. The ability to
code and track objects has allowed companies to become more efficient,
speed up processes, reduce error, prevent theft, and incorporate complex
and flexible organizational systems through IOT. The “Internet of Things”
refers to the coding and networking of everyday objects and things to
render them individually machine-readable and traceable on the Internet
Much existing content in the Internet of Things has been created through
coded RFID tags.[2]

The expression "Internet of Things" was formally presented in 1998–


1999 by Kevin Ashton of Automatic Identification center (Auto-Id) at
Massachusetts Institute of Technology (MIT). Kevin recommended widely
Web-associated RFID advancements can be utilized in supply chains to
monitor things without human contribution [18]. Internet of Things (IoT) is
the concept of connecting different devices to each other and to the

A survey paper on IoT and it’s application Page 2


internet to transmit thousands of bits of data and information. IoT is
changing a great part of the world significantly; from the manner in which
we drive to how we make buys, what is more, even how we get vitality to
our homes. Complex sensors and chips are implanted around us. How these
devices share data and information and how we make use of them. The
common platform of IoT is personal health.[1]

2.Technologies Involved
There are several technologies that can be used to implement the concept
of Internet of Things. In this survey, we will discuss following techniques:

 Radio Frequency Identification(RFID)


 GPS
 Machine-to-machine Communication(M2M)
 Vehicle-to-Vehicle Communication(V2V)
 RFID Reader
 Internet Protocol(IP)
 Wireless Fidality(Wi-Fi)[2]

3.Discussion
3.1.RFID

The RFID is a unique identity of object or person wirelessly using radio


waves in the form of numbers. RFID technology plays an important role in
IOT for solving identification issues. RFID system is composed of one or
more reader and several RFID tags. Tags uses radio-frequency
electromagnetic fields to transfer data attached to an object. The tags
contain electronically stored information. Passive tags collect energy from
a nearby RFID reader's interrogating radio waves. The RFID device serves
the same purpose as a bar code or a magnetic strip on the back of a credit
card or ATM card; it provides a unique identifier for that object. And, just as
a bar code or magnetic strip must be scanned to get the information, the
RFID device must be scanned to retrieve the identifying information.[2]

3.2.RFID Reader

A survey paper on IoT and it’s application Page 3


A radio frequency identification reader (RFID reader) is a device used to
gather information from an RFID tag, which is used to track individual
objects. Radio waves are used to transfer data from the tag to a reader. The
RFID tag it must be within the range of an RFID reader, which ranges from
3 to 300 feet .[2]

3.3.Internet Protocol
Internet Protocol (IP) is the primary network protocol used on the Internet.
The two versions of Internet Protocol (IP) are in use: IPv4 and IPv6.Each
version defines an IP address differently. There are five classes of available
IP ranges in IPv4: Class A, Class B, Class C, Class D and Class E, while only A,
B, and C are commonly used. [2]

3.4.Wireless Fidelity (Wi-Fi)-


Wireless Fidelity (Wi-Fi) is a networking technology that allows computers
and other devices to communicate over a wireless signal. Wi-Fi or WiFi is a
technology for wireless local area networking with devices based on the
IEEE 802.11 standards. Devices that can use Wi-Fi technology include
personal computers, video-game consoles, smartphones, digital cameras,
tablet computers, digital audio players and modern printers. Wi-Fi
compatible devices can connect to the Internet via a WLAN network and a
wireless access point. [2]

3.5.Machine-to-machine communication (M2M)-


Machine-to-Machine (M2M) refers to the communications between
computers, embedded processors, smart sensors, actuators and mobile
devices. The use of M2M communication is increasing in the scenario at a
fast pace M2M has several applications in various fields like healthcare,
smart robots, cyber transportation systems (CTS), manufacturing systems,
smart home technologies, and smart grids. Example of M2M area network
typically includes personal area network technologies, such as Ultra-
wideband and Bluetooth or local networks.[2]

4.IoT Elements

4.1. Sensing
The first step in IOT workflow is gathering information at a “point of
activity.” This can be information captured by an appliance, a wearable
A survey paper on IoT and it’s application Page 4
device, a wall mounted control or any number of commonly found devices.
The sensing can be biometric, biological, environmental, visual or audible
(or all the above). The unique thing in the context of IOT is that the device
doing the sensing is not one that typically gathered information in this way.
Sensing technology specific to this purpose is required. [2]

4.2. Communication
This is where things start to get interesting. Many of the new IOT devices
we are seeing today are not designed for optimal communication with
cloud services. IOT devices require a means for transmitting the
information sensed at the device level to a Cloud-based service for
subsequent processing. This is where the great value inherent in IOT is
created. This requires either WiFi (wireless LAN based communications) or
WAN (wide area network… i.e. cellular) communications. [2]

4.3. Cloud Based Capture


Gathered data is transmitted to a cloud based service where the
information coming in from the IOT device is aggregated with other cloud
based data to provide useful information for the end user. The data being
consolidated can be information from other internet sources as well as
from others subscribing with similar IOT devices. [2]

4.4. Delivery of Information


The last step is delivery of useful information to the end user. That may be
a consumer, a commercial or an industrial user. It may also be another
device in the M2M workflow. The goal in a consumer use case is to provide
the information in as simple and transparent a method as possible. [2]

4.5. Semantics
Semantic in the IOT refers to the ability to extract knowledge smartly by
different machines to provide the required services. Knowledge extraction
includes discovering and using resources and modeling information.[2]

5.Iot Applications

A survey paper on IoT and it’s application Page 5


6.Iot Challenges
In general, any technology has many challenges including security,
difficulty of implementation in the real world and other points to consider
while implementing the topology. The Internet of Things (IoT) is perhaps
the most smoking innovation in the period of computerized change,
associating everything to the Internet. It is simply the center innovation
behind brilliant homes, driving vehicles, savvy utility meters, and keen
urban areas. However, there are nine fundamental security challenges for
the eventual fate of the web of things (IoT). The quantity of IoT gadgets is
quickly expanding in the course of the most recent couple of years. As
indicated by an expert firm Gartner, there will be in excess of 26 billion
associated gadgets around the globe by 2020, up from only 6 billion in
2016. While IoT gadgets bring powerful correspondence between gadgets,
mechanize things, spare time and cost and have various advantages, there
is one thing as yet concerning the clients—IoT security. There have been

A survey paper on IoT and it’s application Page 6


explicit episodes which have made the IoT gadgets testing to trust. Below
are basic nine challenges for the future of IoT [1]:

6.1Outdated equipment and programming


Since the IoT gadgets are being utilized progressively, the producers of
these gadgets are concentrating on building new ones and not giving
enough consideration to security. A larger part of these gadgets doesn’t get
enough updates, though some of them never get a solitary one. This means
these items are secure at the hour of procurement however gets helpless
against assaults when the programmers discover a few bugs or security
issues. When these issues are not fixed by discharging ordinary updates for
equipment and programming, the gadgets stay powerless against assaults.
For each seemingly insignificant detail associated with the Internet, the
standard updates are an absolute necessity. Not having updates can prompt
information break of clients as well as of the organizations that assemble
them.[1]

6.2 Use of weak and default certifications


Many IoT organizations are selling gadgets and furnishing shoppers default
accreditations with them — like an administrator username. Programmers
need only the username and secret word to assault the gadget. At the point
when they know the username, they complete savage power assaults to
contaminate the gadgets. [1]

6.3Malware and ransomware


The quick ascent in the advancement of IoT items will make cyberattack
changes eccentric. Cybercriminals have become propelled today — and
they lock out the buyers from utilizing their very own gadget.
Predicting and forestalling assaults: Cybercriminals are proactively
discovering new strategies for security dangers. In such a situation, there is
a requirement for not just finding the vulnerabilities and fixing them as
they happen yet additionally figuring out how to foresee and forestall new
dangers. The test of security is by all accounts a long-haul challenge for the
security of associated gadgets. Present day cloud administrations utilize
risk knowledge for foreseeing security issues. Other such methods
incorporate AI-fueled checking and investigation instruments. Be that as it
may, it is unpredictable to adjust these methods in IoT in light of the fact
that the associated gadgets need preparing of information in a split second.
[1]

A survey paper on IoT and it’s application Page 7


6.4Difficult to discover if a gadget is influenced
Although it isn't generally conceivable to ensure 100% security from
security dangers and ruptures, the thing with IoT gadgets is that a large
portion of the clients don't become more acquainted if their gadget is
hacked. When there is an enormous size of IoT gadgets, it gets hard to
screen every one of them in any event, for the specialist co-ops. It is on the
grounds that an IoT gadget needs applications, administrations, and
conventions for correspondence. Since the quantity of gadgets is expanding
fundamentally, the quantity of things to be overseen is expanding much
more. Thus, numerous gadgets continue working without the clients
realizing that they have been hacked. [1]

6.5 Data assurance and security challenges


In this interconnected world, the insurance of information has become
extremely troublesome in light of the fact that it gets moved between
numerous gadgets inside a couple of moments. One minute, it is put away
in versatile, the following moment it is on the web, and afterward the cloud.
This information is moved or transmitted over the web, which can prompt
information spill. Not every one of the gadgets through which information
is being transmitted or got are secure. When the information gets spilled,
programmers can offer it to different organizations that disregard the
rights for information protection and security. Besides, regardless of
whether the information doesn't get spilled from the customer side, the
specialist co-ops probably won't be consistent with guidelines and laws.
This can likewise prompt security episodes. [1]

6.6 Use of self-ruling frameworks for information the board


From information assortment and systems administration perspective, the
measure of information created from associated gadgets will be too high to
even consider handling. It will without a doubt need the utilization of AI
devices and mechanization. IoT administrators and system specialists
should set new principles with the goal that traffic examples can be
distinguished effectively. Be that as it may, utilization of such apparatuses
will be somewhat hazardous on the grounds that even a smallest of slip-ups
while designing can cause a blackout. This is basic for huge ventures in
social insurance, monetary administrations, force, and transportation
businesses. [1]

A survey paper on IoT and it’s application Page 8


6.7Home security
Today, an ever-increasing number of homes and workplaces are getting
keen with IoT availability. The huge manufacturers and engineers are
fueling the condos and the whole structure with IoT gadgets. While home
robotization is something to be thankful for, however, not every person
knows about the prescribed procedures that ought to be dealt with for IoT
security. Regardless of whether the IP addresses get uncovered, this can
prompt presentation of private location and other contact subtleties of the
purchaser. Assailants or invested individuals can utilize this data for
underhanded purposes. This leaves shrewd homes at potential hazard.[1]

7.Conclusion
Today IOT is being implemented everywhere which is of human concern
like Smart city, smart environment, security and emergencies, smart
business process, smart agriculture, domestic and home automation and
healthcare. In this paper, we presented the technologies and its
specification that can be used to make Internet of Things a reality. After
that, we state some good examples where Internet of Things is of great use,
and at last we discuss some open issues which are still to be solved before
the wide acceptance of this technology.[2]

8.References
1).Afrah Salman Dawood, University of Technology, Iraq, publication at
researchgate.net

2). Suraj Choudhari, Tejas Rasal, Shubham Suryawanshi, Mayur Mane, Prof.
Satish Yedge , Department of Computer Engineering , KJ’s College Of
Engineering And Research, Pune, Savitribai Phule Pune University,
Maharashtra, India, IJESC Journal

A survey paper on IoT and it’s application Page 9

You might also like