Uploaded by Mythri Sridevi

wot

advertisement
unit 3:
5a)elaborate on the four deployement models of cloud environment.
Private IoT: The IoT MAI system is operated solely for an organization such as a building management
system operated by a property management firm. It may be managed by the organization or a third
party and may exist on premise (intranet) or off premise (extranet).
◾ Public IoT: The IoT system is made available to the general public or a large industry group and is
owned by an organization, such as Pachube, selling IoT services.
◾ Community IoT: The integrated system is shared by several organizations and supports a specific
community that has shared concerns (e.g., mission, security requirements, policy, and compliance
considerations). It may be managed by the organizations or a third party and may exist on premise or off
premise.). It may be managed by the organizations or a third party and may exist on premise or off
premise.
Hybrid IoT: The IoT system is an integrated composition of two or more of the above IoT systems
(private, community, or public) that remain unique entities but are bound together by standardized or
proprietary technology that enables data and application portability
5b)give one word descriptions on various security issues that are more
concerened with iot applications
• Fundamental idea - IoT will connect all objects around us to provide smooth
communication
• Economic of scale in IoT presents new security challenges for global devices
in terms of
• Authentication
• Addressing
• Embedded Security
• Devices like RFID and sensor nodes have no access control functionality
• Can freely obtain or exchange information from each other
• So authentication & authorization scheme must be established between
these devices to achieve the security goals for IoT
• Privacy of things and security of data is one of the key challenges in the IoT
Security Requirements
• Access Control
– Provides authorized access to network resources
– IoT is ad-hoc, and dynamic in nature
– Efficient & robust mechanism of secure access to resources must be
deployed with distributed nature
• Authentication
– Identity establishment b/w communicating devices
– Due to diversity of devices & end users, an attack resistant and
lightweight solution for authentication
• Data Confidentiality
– Protecting data from unauthorized disclosure
– Secure, lightweight, and efficient key exchange mechanism is
required
• Availability
– Ensuring no denial of authorized access to network resources
• Trust Management
– Decision rules needs to be evolved for trust management in IoT
• Secure Software Execution
– Secure, managed-code, runtime environment designed to protect
against different applications
• Secure Storage
– Involves confidentiality and integrity of sensitive information stored
in the system
• Tamper Resistance
– Desire to maintain security requirements even when device falls into
hands of malicious parties
Can be physically or logically probed
• Scalability
– IoT consist of various types of devices with different capabilities from
intelligent sensors and actuators, to home appliances
– Communication (wire or wireless) & protocols (Bluetooth, ZigBee,
RFID, Wi-Fi, etc.)
• Flexibility and Adaptability
– IoT will consist of mobile communication devices
– Can roam around freely from one type of environment to others
– With different type of risks and security threats
So users are likely to have different privacy profile depending on environment
(or)
6a) explain the relationship between IAAS and PAAS middleware used in the
cloud environment with neat diagram
Middleware is a term that has come up much more prevalently in recent years. The term was once
applied to the software that connected computerswith databases.However,the termhas become much
broader of late. If you have not heard this term before, or if you are just starting to understand what this
might mean, you are probably wondering ―what is middleware?‖• A simple middleware definition:
software that connects computers and devices to other applications. It can also be referred to as the
slash or connecting point in client/server. Another way to define middleware is to say that it is software
that acts as a liaison between applications and networks. The term is often used in the context of cloud
computing, such as public or private cloud.
IaaS providers
In the IaaS model, the cloud service provider delivers infrastructure components that would
otherwise exist in an on-premises data center. These components could consist of servers, storage
and networking as well as the virtualization layer, which the IaaS provider hosts in its own data
center. Cloud service providers may also complement their IaaS products with services such as
monitoring, security, load balancing and storage resiliency.
PaaS providers
The third type of cloud service provider, PaaS vendors, offers cloud infrastructure and services that
users can access to perform various functions. PaaS products are commonly used in software
development. In comparison to an IaaS provider, PaaS providers will add more of the application
stack, such as operating systems and middleware, to the underlying infrastructure.
6b)write a short note on follwing
1)uddl
2)wsdl
3)soap
unit 4:
7.write a short note on the onditional probability and bayes rule with necessary
formulas and examples
or
8.Elucidate on the seven IOT business models that are transforming industries
1. Smart Homes
Policy based seamless interaction between heterogeneous control systems
(climate/security/health/entertainment etc.); service composition; mobility
2. Smart Grid
Reliability, Real-time control, Secure Communication to achieve energy efficiency
3. Smart Health Care
Security/Privacy/Trust, High reliability, short-communication latency
4. Smart Transportation
Very short Response time Ad-hoc + Infrastructure communication with mobility, Secure data
collection and exchange
IoT Notification System
A noti_ication is a way we can send
alarms or other kinds of information to users. This post details, step by step, how to build
an IoT
noti_ication system using a few lines of code and integrating existing cloud platforms. The
aim is to send
a noti_ication to several devices, such as Android, iOS, or a desktop PC. This IoT project
uses an ESP8266,
but you can use other IoT development boards to test it like the Arduino UNO, MKR1000,
other ESPs,
unit 5
9a) what are notifications and alarms in application development?list
out the purpose for following notification properties.
1)setsmallcon()
2)set content title()
3)set contenttext()
4)setAutoCancel()
5)setpriority()
9b)"Telphony services in applications development makes use of GSM
and CDMa"-make a simple distinctions between GSM and CDMA to back
up this argument
The Organizational Partners are the European Telecommunications Standards Institute (ETSI),
Association of Radio Industries and Businesses/Telecommunication Technology Committee (Japan),
China Communications Standards Association, Alliance for Telecommunications Industry Solutions
(North America), and Telecommunications Technology Association (South Korea). The project was
established in December 1998. The connect layer of DCM can be further divided into three layers based
on 3GPP’s efforts for GSM/WCDMA family (3GPP2 for CDMA family) cellular wireless M2M
standardization: the M2M area network layer, the access/core network layer, and the external/Internet
network layer, as depicted in the 3GPP/ETSI graphic in [230]. The M2M platform in the graphic is an IoT
platform middleware at the “M” layer in the DCM value chain.
or
10a)whats does location based service mean? list out some of the examples that
we come across in our daily life
Location-based service (LBS) and surveillance middleware are two of the examples we choose to cover
in this chapter. LBS is a service that integrates a mobile device’s location or position with other
information so as to provide added value to a user [97]. There are several uses of LBS, and some of them
are direct IoT applications: ◾ News: information dissemination based on the location of a user, such as
weather information ◾ Point of interest (POI): shows points of interest near the user or vehicles ◾
Directions: shows directions from the current location of a user ◾ Yellow pages: finds services near the
user
Fleet management: tracks positions of a transportation fleet ◾ Local advertisement: user receives
advertisements according to his or her position ◾ Emergency: tracks current position of a user in an
emergency ◾ Location-based games: player interacts with another player according to his or her
position LBS scenarios involve collecting, analyzing, and matching different types of information
including user profiles (e.g., personal information and interests) and information dissemination profiles.
For each piece of information, LBS systems have to handle different aspects: ◾ Spatial: LBS middleware
must be able to collect information about mobile position and fixed elements, associate them with
physical/logical maps, and efficiently match locations and regions. ◾ Temporality: Location information
has a temporal dimension that must be included in query capability. ◾ Inaccuracy, imprecision, and
uncertainty: LBS must deal with inaccuracy and imprecision associated with location positioning
technologies. ◾ Large volumes: In real scenarios, LBS must handle large volumes of data; scalability is a
very important issue. ◾ Continuous queries: In an LBS scenario, query executions are continuous, so the
query engine of an LBS middleware must be efficient. An example middleware architecture for LBS
systems can be found at locationet.com (http://www.locationet.com/ LBSmiddleware.php). Most LBS
middleware can be categorized as event based (publish/subscribe), tuple space based, context aware,
and data sharing based: 165 ◾ Middleware and IoT ◾ Publish/subscribe: one of the most
prominent middleware models, in which communication is defined in terms of exchanging asynchronous
messages based on subscription. ◾ Tuple space: originally proposed to coordinate concurrent activities
in parallel programming systems such as Linda, in which a process communicates with another process
in a global collection of tuples. A tuple is a data element that contains values of a specified data type. ◾
DBMS-based: comprises the use of database interaction to implement a communication and
coordination; many geographic information systems (GISs) operate according to this scheme. LBS
architecture naturally fits the DBMSmodel, such as user management systems and accounting
information systems. As an example, LocatioNet middleware is a product that meets mobile operators’
needs for in-house location-privacy management, location billing functionality, provisioning interfaces,
and links to various content databases. LocatioNet comprises a set of modules offered in any required
combination: ◾ Comprehensive location privacy management: allows users to decide who can see their
location, when, and how precisely, application by application ◾ Billing for location: gives operators a
flexible set of billing options for their location and GPS services ◾ Provisioning: enables operators to
provision user-tolocation and GPS applications ◾ Content interfaces: enables operators to take
advantage of content properties they have access to (such as local news, the weather, points of interest,
traffic) by linking them to the location and GPS infrastructure
10b)
Download