Aggregation/Fusion: Transmitting all the raw data out of the
network in real-time is often prohibitively expensive given the increasing
data streaming rates and the limited bandwidth. Aggregation and fusion
techniques deploy summarization and merging operations in real-time to
compress the volume of data to be stored and transmitted.
Delivery: As data is filtered, aggregated, and possibly processed
either at the concentration points or at the autonomous virtual units
within the IoT, the results of these processes may need to be sent further
up the system, either as final responses, or for storage and in-depth
analysis. Wired or wireless broadband communications may be used there
to transfer data to permanent data stores.
Preprocessing: IoT data will come from different sources with
varying formats and structures. Data may need to be preprocessed to
handle missing data, remove redundancies and integrate data from
different sources into a unified schema before being committed to
storage. This preprocessing is a known procedure in data mining called
data cleaning.
Storage/Update—Archiving: This phase handles the efficient
storage and organization of data as well as the continuous update of data
with new information as it becomes available. Archiving refers to the
offline long-term storage of data that is not immediately needed for the
system's ongoing operations.
Processing/Analysis: This phase involves the ongoing retrieval
and analysis operations performed and stored and archived data in order
to gain insights into historical data and predict future trends, or to detect
abnormalities in the data that may trigger further investigation or action.
Task-specific preprocessing may be needed to filter and clean data before
meaningful operations take place. When an IoT subsystem is autonomous
and does not require permanent storage of its data, but rather keeps the
processing and storage in the network, then in-network processing may
be performed in response to real-time or localized queries.
1
1.13 SECURITY
IoT security (internet of things security) is the technology segment
focused on safeguarding connected devices and networks in IoT. IoT
involves adding internet connectivity to a system of interrelated
computing devices, mechanical and digital machines, objects, animals and
people.
Due to the unconventional manufacturing of IoT devices and the
vast amount of data they handle, there's a constant threat of cyber
attacks. Several high-profile incidents where a common IoT device was
used to infiltrate and attack the larger network have drawn attention to
the need for IoT security.
The ever-looming possibility of vulnerabilities, data breaches and
other risks associated with IoT device usage underscores the urgent need
for strong IoT security. IoT security is vital for enterprises, as it includes a
wide range of techniques, strategies, protocols and actions that aim to
mitigate the increasing IoT vulnerabilities of modern businesses.
IoT security issues and challenges
The more ways there are for devices to connect to each other, the
more opportunities there are for threat actors to intercept them.
Hypertext Transfer Protocol and APIs are just two of the channels that IoT
devices rely on that hackers can intercept.
The following IoT security challenges continue to threaten
the financial safety of both individuals and organizations:
2
Remote exposure: Unlike other technologies, IoT devices have a
particularly large attack surface due to their internet-supported
connectivity. While this accessibility is extremely valuable, it also gives
hackers the opportunity to interact with devices remotely.
Lack of industry foresight: As organizations continue with digital
transformations, so too have certain industries and their products. The
automotive and healthcare industries have expanded their selection of IoT
devices to become more productive and cost-efficient.
Resource constraints: Not all IoT devices have the computing
power to integrate sophisticated firewalls or antivirus software. In fact,
some devices can barely connect to other devices.
Weak default passwords: IoT devices often come with weak
passwords, and most consumers might not be aware that they need to be
replaced with more secure ones.
Multiple connected devices: Most households today have
multiple interconnected devices. The drawback of this convenience is
that, if one device fails due to a security misconfiguration, the rest of the
connected devices in the same household go down as well.
Lack of encryption: Most network traffic originating from IoT
devices is unencrypted, which increases the possibility of security threats
and data breaches. These threats can be avoided by ensuring all the
devices are secured and encrypted.
3
1.14 PRIVACY& TRUST
Security plays an important role in terms of usability,efficiency, and
reliability in IoT. The need for privacy is the core property ofself-
actualization in IoT. There are several applicationsworking in many
different grounds like patientmonitoring system, traffic control, energy
consumptioninventory management, smart parking, civil protection any
many others. Privacy should be guaranteed to the end user.
1.15 DEVICE LEVEL ENERGY ISSUES
IoT Energy Domain
The Internet of Things plays a vital role in the field of energy
management and regulation. The term used for that is Smart Energy
System. IoT applications monitor a wide variety of energy control function
to residential and commercial use.
Residential Energy
4
As technology is increasing day by day, it also raises the cost of
energy. Consumers search the way through which they can reduce and
control the energy cost. IoT provides a mature way to analyze and
optimize the use of the device as well as the entire system of a home. It
may be changing the device setting, simply switching on/off or dimming
lights to optimize energy use.
Commercial Energy
Wastage of energy widely impacts any business enterprises in their
cost of production. IoT provides a specific way for monitoring and
maintaining a low cost and high level of care. IoT system provides a
strong means of managing the consumption cost of energy and optimize
the output of enterprises. It discovers energy issues in the same way as
functional issues in a complex business network and provides solutions.
5
1.16 IOT RELATED STANDARDIZATION
Standardization is key to achieving universally accepted
specifications and protocols for true interoperability between devices and
applications.
The use of standards:
ensures interoperable and cost-effective solutions
opens up opportunities in new areas
allows the market to reach its full potential
To make the devices work more efficiently or to offer more
functionality, the concept of IoT has been introduced. The implementation
of this technology has changed the life of mankind. It is concerned with
getting the devices together with the other devices so that they can
contribute to enhancing their functionality. To manage this, off course,
there exists some standard to make sure everything is happening in a
controlled way, and here we will be focusing on those standards.
some of the important standards for IoT that helps to ensure the
common standards that the IoT enabled devices are supposed to be
complied with.
Bluetooth Smart : Bluetooth smart is one of the most important
standards of IoT. This standard provides the devices to work using
Bluetooth connectivity. Moreover, it makes it possible for the device and
the users to communicate or share the instructions using Bluetooth’s
simple connection.
ULE : ULE stands for Ultra-low emission. The amount of power
involved in this is way too less, as stated by its name. The common
6
telephone network we use at our homework using this standard and the
embedded devices leverages it wherever possible in order to facilitate
communication with other devices.
EEE 802.11ah : These standards are concerned with the wifi
connectivity that runs on low power. In the internet of things, the devices
preferably work with low power consumption mechanism involvement.
Though Wifi doesn’t fall under the low power consumption part, this
standard is concerned with the lower power consumption of devices. This
standard has been considered as the most effective one as the availability
of wifi is very common.
Thread : Thread may be considered the best standard that provides
the opportunity to leverage IPV6 to make communication over the
internet. The ownership of this standard is held by Alpha that is the parent
company of Google. It makes the interaction between devices very
convenient and smooth. Being handled by Alpha, this standard consists of
most of the parts that are concerned with the secure and efficient working
of the IoT enabled devices.
ZigBee : This is the other standard that helps to take the IoT to the
next level. It has been developed by an organization called the ZigBee
industry. The main purpose of this standard is to offer a network of
devices that consume less power to function. The common devices that
are being used in houses leverage this standard in order to communicate
with low power requirements.
Z-Wave : Z-Wave is the most commonly used standard. Similar to
the other standards, it is also concerned with working devices that use
less power to work well in the network. Sigma Designs own this standard,
and the changes or improvements in this standard are taken by this
organization only. The outcome of this standard is the low power mesh
technology of networking. In almost all smart devices or IoT enabled
devices in the USA, this standard is de facto.
6LoWPAN : This is another standard influenced by IEEE. It is
concerned with creating the IoT system that consists of devices that are
connected to the internet and use less power to facilitate communication.
7
IPV6 has been used in this standard when it comes to connecting the
devices that are available on the internet. All of the standards for IoT are
concerned about the way devices interact with each other to create the
network of the devices.
1.17 RECOMMENDATIONS ON RESEARCH TOPICS
Accommodate IoT with existing practices:
Policies, Procedures, & Standards
Awareness Training
Risk Management
Vulnerability Management
Forensics