unit 3: 5a)elaborate on the four deployement models of cloud environment. Private IoT: The IoT MAI system is operated solely for an organization such as a building management system operated by a property management firm. It may be managed by the organization or a third party and may exist on premise (intranet) or off premise (extranet). ◾ Public IoT: The IoT system is made available to the general public or a large industry group and is owned by an organization, such as Pachube, selling IoT services. ◾ Community IoT: The integrated system is shared by several organizations and supports a specific community that has shared concerns (e.g., mission, security requirements, policy, and compliance considerations). It may be managed by the organizations or a third party and may exist on premise or off premise.). It may be managed by the organizations or a third party and may exist on premise or off premise. Hybrid IoT: The IoT system is an integrated composition of two or more of the above IoT systems (private, community, or public) that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability 5b)give one word descriptions on various security issues that are more concerened with iot applications • Fundamental idea - IoT will connect all objects around us to provide smooth communication • Economic of scale in IoT presents new security challenges for global devices in terms of • Authentication • Addressing • Embedded Security • Devices like RFID and sensor nodes have no access control functionality • Can freely obtain or exchange information from each other • So authentication & authorization scheme must be established between these devices to achieve the security goals for IoT • Privacy of things and security of data is one of the key challenges in the IoT Security Requirements • Access Control – Provides authorized access to network resources – IoT is ad-hoc, and dynamic in nature – Efficient & robust mechanism of secure access to resources must be deployed with distributed nature • Authentication – Identity establishment b/w communicating devices – Due to diversity of devices & end users, an attack resistant and lightweight solution for authentication • Data Confidentiality – Protecting data from unauthorized disclosure – Secure, lightweight, and efficient key exchange mechanism is required • Availability – Ensuring no denial of authorized access to network resources • Trust Management – Decision rules needs to be evolved for trust management in IoT • Secure Software Execution – Secure, managed-code, runtime environment designed to protect against different applications • Secure Storage – Involves confidentiality and integrity of sensitive information stored in the system • Tamper Resistance – Desire to maintain security requirements even when device falls into hands of malicious parties Can be physically or logically probed • Scalability – IoT consist of various types of devices with different capabilities from intelligent sensors and actuators, to home appliances – Communication (wire or wireless) & protocols (Bluetooth, ZigBee, RFID, Wi-Fi, etc.) • Flexibility and Adaptability – IoT will consist of mobile communication devices – Can roam around freely from one type of environment to others – With different type of risks and security threats So users are likely to have different privacy profile depending on environment (or) 6a) explain the relationship between IAAS and PAAS middleware used in the cloud environment with neat diagram Middleware is a term that has come up much more prevalently in recent years. The term was once applied to the software that connected computerswith databases.However,the termhas become much broader of late. If you have not heard this term before, or if you are just starting to understand what this might mean, you are probably wondering ―what is middleware?‖• A simple middleware definition: software that connects computers and devices to other applications. It can also be referred to as the slash or connecting point in client/server. Another way to define middleware is to say that it is software that acts as a liaison between applications and networks. The term is often used in the context of cloud computing, such as public or private cloud. IaaS providers In the IaaS model, the cloud service provider delivers infrastructure components that would otherwise exist in an on-premises data center. These components could consist of servers, storage and networking as well as the virtualization layer, which the IaaS provider hosts in its own data center. Cloud service providers may also complement their IaaS products with services such as monitoring, security, load balancing and storage resiliency. PaaS providers The third type of cloud service provider, PaaS vendors, offers cloud infrastructure and services that users can access to perform various functions. PaaS products are commonly used in software development. In comparison to an IaaS provider, PaaS providers will add more of the application stack, such as operating systems and middleware, to the underlying infrastructure. 6b)write a short note on follwing 1)uddl 2)wsdl 3)soap unit 4: 7.write a short note on the onditional probability and bayes rule with necessary formulas and examples or 8.Elucidate on the seven IOT business models that are transforming industries 1. Smart Homes Policy based seamless interaction between heterogeneous control systems (climate/security/health/entertainment etc.); service composition; mobility 2. Smart Grid Reliability, Real-time control, Secure Communication to achieve energy efficiency 3. Smart Health Care Security/Privacy/Trust, High reliability, short-communication latency 4. Smart Transportation Very short Response time Ad-hoc + Infrastructure communication with mobility, Secure data collection and exchange IoT Notification System A noti_ication is a way we can send alarms or other kinds of information to users. This post details, step by step, how to build an IoT noti_ication system using a few lines of code and integrating existing cloud platforms. The aim is to send a noti_ication to several devices, such as Android, iOS, or a desktop PC. This IoT project uses an ESP8266, but you can use other IoT development boards to test it like the Arduino UNO, MKR1000, other ESPs, unit 5 9a) what are notifications and alarms in application development?list out the purpose for following notification properties. 1)setsmallcon() 2)set content title() 3)set contenttext() 4)setAutoCancel() 5)setpriority() 9b)"Telphony services in applications development makes use of GSM and CDMa"-make a simple distinctions between GSM and CDMA to back up this argument The Organizational Partners are the European Telecommunications Standards Institute (ETSI), Association of Radio Industries and Businesses/Telecommunication Technology Committee (Japan), China Communications Standards Association, Alliance for Telecommunications Industry Solutions (North America), and Telecommunications Technology Association (South Korea). The project was established in December 1998. The connect layer of DCM can be further divided into three layers based on 3GPP’s efforts for GSM/WCDMA family (3GPP2 for CDMA family) cellular wireless M2M standardization: the M2M area network layer, the access/core network layer, and the external/Internet network layer, as depicted in the 3GPP/ETSI graphic in [230]. The M2M platform in the graphic is an IoT platform middleware at the “M” layer in the DCM value chain. or 10a)whats does location based service mean? list out some of the examples that we come across in our daily life Location-based service (LBS) and surveillance middleware are two of the examples we choose to cover in this chapter. LBS is a service that integrates a mobile device’s location or position with other information so as to provide added value to a user [97]. There are several uses of LBS, and some of them are direct IoT applications: ◾ News: information dissemination based on the location of a user, such as weather information ◾ Point of interest (POI): shows points of interest near the user or vehicles ◾ Directions: shows directions from the current location of a user ◾ Yellow pages: finds services near the user Fleet management: tracks positions of a transportation fleet ◾ Local advertisement: user receives advertisements according to his or her position ◾ Emergency: tracks current position of a user in an emergency ◾ Location-based games: player interacts with another player according to his or her position LBS scenarios involve collecting, analyzing, and matching different types of information including user profiles (e.g., personal information and interests) and information dissemination profiles. For each piece of information, LBS systems have to handle different aspects: ◾ Spatial: LBS middleware must be able to collect information about mobile position and fixed elements, associate them with physical/logical maps, and efficiently match locations and regions. ◾ Temporality: Location information has a temporal dimension that must be included in query capability. ◾ Inaccuracy, imprecision, and uncertainty: LBS must deal with inaccuracy and imprecision associated with location positioning technologies. ◾ Large volumes: In real scenarios, LBS must handle large volumes of data; scalability is a very important issue. ◾ Continuous queries: In an LBS scenario, query executions are continuous, so the query engine of an LBS middleware must be efficient. An example middleware architecture for LBS systems can be found at locationet.com (http://www.locationet.com/ LBSmiddleware.php). Most LBS middleware can be categorized as event based (publish/subscribe), tuple space based, context aware, and data sharing based: 165 ◾ Middleware and IoT ◾ Publish/subscribe: one of the most prominent middleware models, in which communication is defined in terms of exchanging asynchronous messages based on subscription. ◾ Tuple space: originally proposed to coordinate concurrent activities in parallel programming systems such as Linda, in which a process communicates with another process in a global collection of tuples. A tuple is a data element that contains values of a specified data type. ◾ DBMS-based: comprises the use of database interaction to implement a communication and coordination; many geographic information systems (GISs) operate according to this scheme. LBS architecture naturally fits the DBMSmodel, such as user management systems and accounting information systems. As an example, LocatioNet middleware is a product that meets mobile operators’ needs for in-house location-privacy management, location billing functionality, provisioning interfaces, and links to various content databases. LocatioNet comprises a set of modules offered in any required combination: ◾ Comprehensive location privacy management: allows users to decide who can see their location, when, and how precisely, application by application ◾ Billing for location: gives operators a flexible set of billing options for their location and GPS services ◾ Provisioning: enables operators to provision user-tolocation and GPS applications ◾ Content interfaces: enables operators to take advantage of content properties they have access to (such as local news, the weather, points of interest, traffic) by linking them to the location and GPS infrastructure 10b)