IoT Term 2 Flashcards
What are the 6 characteristics of IoT?
Intelligence Architecture Complex system Size considerations Time considerations Everything as a service
Name some applications of IoT
Home Smart infrastructure Security and surveillance Transportation Retail Healthcare
Define ecosystem
A system of devices, vendors and clients that pass data and money between each other and depend on each other
What are the three parts of IoT data flow?
Site, network, Cloud/DC
What parts of data flow are included in site?
Things (sensors, devices etc) -> nodes and gateways
What parts of data flow are included in network?
Connectivity -> backbone
What parts of data flow are included in cloud/DC?
Data ingestion -> data analysis -> processes and people
What is fog computing?
Computing done on the IoT gateway
Local computing is possible
Reduces chatter on the transmission medium
What is mist computing?
Some decisions taken at the source
Discard useless information
Data processed faster at destination
Processing done on the level of the sensors
What are the 9 IoT ecosystem components?
Gateway Analytics Connectivity of devices Cloud User interface Standards and protocols Database Automation Development
What does the gateway do?
Enables easy management of data traffic flowing between protocols and networks
Translates the network protocols and makes sure that the devices and sensors are connected properly.
Pre-process the data from sensors and send them off to next level
Provides encryption with the network flow and data transmission.
What is the Cloud?
A high performance network that connects servers to optimize performance of data processing
What are the dimensions of consumption?
Mode - how the end consumer gets the product
Ownership - is the product bought or used as a service
Operations - do it yourself or via a third party
Payment - pay for each use, subscription or one time fee
What is cloud computing?
Delivery of on-demand computing services over the internet on a pay as you go basis
What are the two types of cloud computing?
Deployment model
Service model
What are the three types of deployment model?
Public cloud - accessible to everyone
Private cloud - owned by a single person
Hybrid cloud - can be rented privately
What are the advantages of a public cloud?
Lower costs
No maintenance
Near unlimited scalability
Reliable
What are the advantages of a private cloud?
Flexible
Very secure
High scalability
What are the advantages of a hybrid cloud?
Control
Flexible
Cost effective
What are the three types of service model?
Infrastructure as a service (IaaS)
Platform as a service (PaaS)
Software as a service (SaaS)
What does IaaS provide?
Provides basic computing infrastructure
What does PaaS provide?
Provides cloud platforms and runtime environments for developing, testing and managing applications
What does SaaS provide?
Hosts and manages the software application as a pay as you go model
Adequate
Breasts
What is the application layer?
Responsible for delivering application specific services to the user. Defines applications in which the system can be deployed
What is the network layer?
Responsible for connecting smart things, network devices and servers. Also used to transmit and process sensor data
What is the perception layer?
Senses physical parameters or identifies objects in the environment
What is the business layer?
Manages the whole system
What is the processing layer?
Stores, analyses and processes large amounts of data
What is the transport layer?
Transfers the sensor data between different layers through networks
What is the architecture of cloud computing?
Data processing is done in large centralised fashion
What is the architecture of fog computing?
A layered approach which inserts monitoring, pre-processing, storage and security layers between the physical and transport layers
What are the limitations of processing everything on the cloud?
Smart devices are mobile which makes communication difficult
Latency sensitive systems require real time responses
Multiple devices increase latency
What four main challenges are faced with IoT communication?
Addressing and identification - each device must have a unique address across the network
Low power
Low memory
High speed, lossless comms
Define big data
A collection of data sets so large and complex that it’s difficult to process using on-hand database system tools and traditional data processing applications
What are the 7 V’s of big data?
Volume Variety Velocity Variability Veracity Visualisation Value
What is the variety of data?
The different kinds of data generated from various sources
What is the velocity of data?
The rate at which data is generated
What is the variability of data?
The meaning of data changes
What is the veracity of data?
Uncertainties and inconsistencies in data
What are the 3 main problems with big data?
Storing exponentially growing huge datasets
Processing data having complex structure
Processing data faster
What solutions are there to storing big data?
Using Hadoop which is a distributed file system. It divides files into smaller chunks and stores it across the cluster. It’s scalable
What solutions are there to storing unstructured data?
HDFS allows any kind of data (structured, semi-structured or unstructured) to be stored. Follows write once read many. No schema validation is done with dumping data
What solutions are there to processing data faster?
Hadoop provides parallel processing of data. Allows data to be processed locally
What is big data analytics?
Examines large and different types of data to uncover patterns and correlations
What are the security goals of IoT?
Confidentiality – data is secured to authorized parties
Integrity – data is trusted to be kept safe
Availability – data is accessible when and where needed
Non-repudiation – service provides a trusted audit trail
Authenticity – components can prove their identity
Privacy – service does not automatically ‘see’ customer data
What are the 4 classes of security attacks? List some examples
Physical attacks – Node tampering, RF interference, physical damage, social engineering, sleep deprivation attack, code injection on node etc.
Network attacks – Traffic analysis attack, RFID spoofing/cloning, MITM attack, routing information, Sybil attack
Software attacks – Virus and Worms, Spyware, Trojans, DOS, Malicious scripts
Encryption attacks – Side channel attacks, MITM, cryptanalysis attack
What are the ways of securing an IoT system?
Physical layer – secure booting, device authentication, data integrity, data confidentiality, anonymity
Network layer – data privacy, routing security, data integrity
Application layer – data security, access control lists, firewalls, anti-virus
What are the 4 legal issues that IoT presents?
Discrimination - IoT data allows consumers to be sorted and discriminated against
Privacy
Security - No jurisdictional boundaries
Consent - Consumer protection laws currently not prepared to tackle consent issues
What are the characteristics of an IoT device?
Small and low powered
Has communications capabilities
Can sense or control its environment