IoT Applications and Challenges - Internet of Things - ثاني ثانوي

Lesson 2 IoT Applications and Challenges Line to digital lesson OXXO www.len.edusa IoT Applications loT is one of the fastest-growing technologies, and as we move from the age of products to an age of services, IoT plays a major role in this technological revolution. The day is not too far when you will go home in a self-driving car and the entrance door will auto-detect your presence and open automatically. The following are some examples of areas where loT changes how we live and work: Figure 2.11 Wearable smart object Telemedicine Wearables Wearables are a very popular item on the market, but many people consider them simple gadgets. In fact, these devices are loT devices offering a variety of functions, ranging from medical monitoring to wellness and fitness tracking. They can communicate with cloud services to provide real-time health insights to their user and even provide alerts for potential health problems. Telemedicine, or telehealth, has not yet reached its full potential. IoT-enabled telemedicine is exemplified by always-connected medical devices that healthcare professionals can monitor. Remote medical diagnosis happens proactively, saving valuable time for the proper treatment of patients. For example, heart attack detection systems can sense a person's heartbeat in real-time and send life-saving messages to a doctor. 50 Figure 2:12. Telemedicine application Figure 2.13 Smart home manitoring Smart Homes Smart homes, one of the best and most practical implementations of the lot, significantly enhance convenience and home security. There are a variety of loT applications for smart homes, but the most effective combine intelligent utility systems and entertainment. Home security is strengthened with improved locking systems and networked surveillance systems. As loT evolves, we can be confident that our homes will become more intelligent. For example, an automatic lighting system will know when we are not home and conserve energy.

Lesson 2: IoT Applications and Challenges

IoT Applications

Wearables

Telemedicine

Smart Homes

Figure 2.14 Saudi university implements an lot based security system Smart Grids Education An loT-enabled school or campus can assist teachers and the management in the recording of daily attendance. The system can also notify the parents of absent students automatically. Other loT devices used in the education sector are smart boards, door locks and fire or security systems. The electricity grid is a complex and critical system as it provides electricity to buildings, industries, transportation and almost everything in our daily life. A smart grid is an electricity grid that uses loT technologies to reduce electricity waste, enhance electricity transmission efficiency, improve restoration time and reduce operating costs. Figure 2.15 Smart grid communication Figure 2.16. Sid! Driving car on a higliway Retail Shops Self-Driving Cars The big technology companies are developing versions of self-driving cars or other vehicles. For example, a telecom company has implemented a self-driving bus service for its Riyadh complex. King Abdullah University of Science and Technology is using a similar autonomous bus for its campus. Multiple sensors and embedded devices connected to the cloud generate massive data for decision-making based on machine learning algorithms. Even if it takes more years for the technology to fully develop and for countries to amend their laws and regulations, we are currently experiencing one of the fastest loT implementations. However, since human lives are on the streets, we must ensure that the technology is ready to improve road safety. A new type of retail shop bridges the gap between online and physical stores. The loT-enabled store adds products to your shopping cart in real-time as you select them from the shelves and facilitates cashless transactions by deducting funds from your digital wallet on your smartphone. If you change your mind and add another item to your cart, the prior item is removed and replaced with the new one. There is no cashier to charge you for your purchases, and you do not need to wait in line to pay. Figure 17: Effecient digital shopping Saudi lot is the main regional event dedicated to the growth and development of loT technologies. The conference focuses on current and future opportunities created by lat technologies, applications, and services: Studi lot is aligned to the Saudi Vision 2030, which views emerging technologies as a requirement and the key to discovering more innovative methods of conducting business and enhancing the economy. 51

Lesson 2: IoT Applications and Challenges

Education

Smart Grids

Self-Driving Cars

Retail Shops

52 Smart Supply-Chain Management Supply networks must be efficient and optimized, otherwise, they increase the cost of goods. IoT solutions for tracking items with electronic tags while in warehouses or on the road provide real- time information, reduce errors, and minimize delays in the supply chain. Figure 2 By Industrial IoT application in manufacturing Figure 2.18 Smart supply chain networks Industrial IoT The Industrial lot, or llot, consists of sensors, instruments, and other loT devices linked to production and energy management applications. Industry experts anticipate that IoT will have the greatest potential of all loT applications as it can improve product quality and production efficiency. For example, a commercial jetliner manufacturer has integrated sensors into tools and machines and given workers smart glasses to reduce errors and enhance safety in the workplace. Smart Agriculture The loT will benefit the agricultural industry, and the future is undoubtedly optimistic. Tools for drip irrigation, recognizing crop patterns, water distribution and drones for farm surveillance are being continuously developed. These innovations enable farmers to become more productive and address concerns more effectively. Figure 2:20 Smart guide of applican Figure 2.1. Smart transportanon networks Smart Transportation The Riyadh Metro and Riyadh Rapid Bus Transit System is a new public transportation system that enables individuals to navigate the city easily. Riyadh Metro uses loT-enabled driverless trains and provides consumers with integrated solutions that enhance their commuting experience. The project includes a state-of-the-art center for monitoring and controlling surveillance systems for stations, lines, and other infrastructure.

Lesson 2: IoT Applications and Challenges

Smart Supply-Chain Management

Industrial IoT

Smart Agriculture

Smart Transportation

Traffic Management With the help of loT technologies, traffic management in large cities can be enhanced. Using mobile phones as smart objects with their GPS sensors and apps such as Google Maps, and information from our vehicles through cloud systems like the Local Hazard Information system, IoT technologies can improve traffic and road safety. Long-term analysis of traffic patterns is another loT application. Commuters will be better equipped to avoid traffic and delays if they are informed of alternative routes during busy hours. Agure 2.22: Highway laf application To improve road safety and traffic management, the Ministry of Transport and Logistic Services is actively pursuing the implementation of intelligent transport systems on its highways. The road and highway networks will be equipped with toT systems to control the flow and efficiency of traffic. The ministry's plan defines the primary framework for the future implementation of intelligent transport systems. Figure 2.23. Traffic monitoring with lo Water/Waste Management Numerous municipalities are implementing water recycling through the use of water treatment units. Using an loT application, it is possible to determine how much water is consumed in a particular location, how much wastewater is being created, and how waste production has changed over time. With a smart waste management system, authorities can forecast, among other things, how much waste will be generated in a particular region, how it will be processed, when it will be cleared, and how to evaluate data for future planning. Similarly, the volume of garbage generated in each neighborhood over time can be analyzed. All this information can be utilized to plan the city's improvement initiatives. Data analytics systems enable optimal trash collection planning and forecasting of future trends. Example Figure 2.24 Smart waste management minimizes solid waste More than twed million Muslims gather yearly in Makkah during Ramadan and Hajj, and the local authorities must handle the increased waste generation. The Vision 2030 strategy aims to minimize all types of waste by implementing waste management systems. An effective solid waste management Psystem based on loT technologies improves waste collection at the source. Saudi universities propose the use of smart containers that allow the automation of waste classification for recycling. 53

Lesson 2: IoT Applications and Challenges

Traffic Management

Water/Waste Management

Example

The Importance of the Internet of Things Now and in the Future For decades, humans have been required to input data into computer systems. This data is processed to automate tasks or generate valuable information for decisions that must be taken. IoT technologies are changing this computing paradigm because nowadays, computers are autonomously perceiving environments and gathering data through their sensors. IoT technologies represent a significant technical transition, but there are also considerations regarding its implications for future technological advances. IoT changes how individuals, systems and organizations interact with their surroundings. Using real-time connectivity to manage and monitor intelligent devices offers a new level of data-driven decision-making. This leads to optimized systems and processes and the delivery of new services that save individuals and businesses time and enhance overall quality of life. The number of smart objects as separate lot devices or embedded in existing physical objects in everyday life will increase enormously in the coming years. Since 1990, when the first loT device was created, a toaster connected to the Internet, we have managed to convert almost any possible physical object into a smart object. loT Analytics, an IoT market research organization, estimates that we are now using 14 billion loT devices worldwide and projects this number to reach 27 billion by 2025. These numbers do not include computers and smartphones, very simple sensors, or single-directional communications devices: Industry solutions in energy, water and waste management, retail and wholesale, and transportation will drive the adoption of lot technologies. Technological Trends in Smart Objects • Size is decreasing: Microcontrollers and sensors continue to shrink in size. Some of them are so small that they cannot be seen with the human eye. This reduced size makes integrating intelligence and network connectivity into commonplace physical objects easier • Power consumption is decreasing: The hardware components of an IoT device require less energy over time. This is important for sensors, as many of them are entirely passive. Some battery-powered sensors have a battery life of 10 years or longer. • Processing power is increasing: CPUs continue to increase in processing power and decrease in size. This is a significant development for smart objects, which are becoming increasingly sophisticated with local capabilities like, as we have discussed, edge analytics. ⚫ Communication capabilities are improving: In addition to speed increases in data transfer, wireless connections are also improving in range while keeping power consumption low. • Communication is increasingly standardized: The loT promotes the development of increasingly specialized communication protocols that support various use cases. The industry is making a great effort to build open standards for loT communication protocols. 30 40 داية التعليم 27.0 17.2 12.2 10.0 201 2017 JOVI 2003 2873-1985 54 Figure 2 25 Global active of connections in billions, excluding computers, laptops, smartphones or tablets

Lesson 2: IoT Applications and Challenges

The Importance of the Internet of Things Now and in the Future

Technological Trends in Smart Objects

Challenges of Internet of Things Systems While the vast array of loT components is intended to generate significant productivity and automation benefits, it also poses new problems. Numerous aspects of loT have become a reality, but some challenges must be addressed for loT to become prevalent in various industries and in our daily lives. Table 2.5 shows some of the most common problems and challenges faced by every technological advancement, including lot systems. Table 2.5: Common IoT challenges Challenge Scale Description Traditional IT networks might be big, but loT networks can be several orders of magnitude larger. As the number of devices in a system increases, the complexity of the connections Increases and scaling becomes an issue Problems arise in delayed response and processing time as networks scale making it difficult to manage real-time systems. Security As more smart objects are connected to one another and te users, IoT security becomes an increasingly difficult task. The security rek has increased dramatically, and if a device's connectivity is compromised, it poses a big problem. A hacked device may be used to attack other devices and systems Privacy As sensors became more prevalent in our daily lives, a growing share of the data they collect will be specific to Individuals and their actions. This data may include health information, purchasing patterns, and retail activities Businesses can monetize this information, and companies continually debate who owns it and how individuals can control access to it. Big data and date analytics The loT and its various sensers will generate a massive amount of data that must be analyzed. If efficiently processed, this data will yield vital Information and insights. The problem, however, is how to evaluate massive amounts of data from many sources and formats before they become worthless agngerability العليم 2173-1955 As with any developing technology, loT protocols and architectures strive for market share and standardization. Some protocols and implementations are based on commercial components, while others are based on open standards. 55

Lesson 2: IoT Applications and Challenges

Challenges of Internet of Things Systems

Table 2.5: Common IoT challenges

56 Other IoT Barriers The Table below shows current obstacles that slow down the deployment and development of loT systems. Technology evolves, best practices and experience from Failures are integrated in new systems and government regulation provides security and privacy guidelines to overcome these barriers. Table 2.6: Common IoT barriers tot barriers Deployment of IPV6 Servor Power Consumption Legal and Regulatory Issues Flexibility and Evelution of Appliccions Integration of Data from Multiple Sources Examples The lot connects billions of small devices, each of which must have a unique IP address. Only IPv6 can support the current number of lot devices. The migration to the new il' standard delays the rapid development of the Internet of Things ecosystem, and it will result in an increase in network security vulnerabilities. IoT sensors must be autonomous. Changing batteries on the billions of deployed devices is time-consuming, and the sunsors must also be power- efficient to avoid rising energy costs. Ublizing lot devices causes several legal complications and magnifies numerous Internet-related privacy issues, One issue Includes the transmission of data across international borders. Every day sensors and devices continue to expand their capabilities This results in the development of new, enhanced services. Modern apps with an intuitive user experience that support these services are becoming more complex and dumanding for developers and user experience designers. Several data sources, including sensors, mobile devices, social network feeds, and other web resources, are streamed in loT applications generating data in a variety of formats. It is increasingly difficult to filter and process this data effectively وزارة التعليم JR-1445 A Figure 2 26 Common MT barriers

Lesson 2: IoT Applications and Challenges

Other IoT Barriers

Table 2.6: Common IoT barriers

IoT Security Issues One of the biggest issues arising from the universal use of the Internet, the rapid increase of devices in the lot and the use of the cloud is the security of this entire digital global environment. Data networks have existed for decades, but most were publicly inaccessible, with special security protocols and access devices. The connection of billions of devices on data networks that are eventually part of the Internet is the reason for increased security breaches. IoT devices may simply switch on and off street lights to conserve energy, but they may also interact with sensitive data like personal medical data. It is imperative to address these security concerns from the beginning of the system design. IoT networks are exposed to a greater variety of attacks than other networks, and the quality and complexity of these attacks are increasing daily. IoT systems should ensure user interactions are conducted in a secure environment. To avoid unwanted access to private data, IoT security experts should consider the following: ■Trustworthy and decentralized authentication models ■ Technologies for encryption and data protection that save energy • Cloud computing security and trustworthiness • Data control •Legal and liability concerns • Communication and networking vulnerabilities • Access and user rights and rules for sharing value additions ■ Secure, inexpensive hardware ■ Privacy policies management Tigure 237 of security and Examples: Security Issues with RFID Technologies Radio-Frequency Identification is one of the most commonly used communication protocols for processing identification data for smart objects. RFID employs radio frequency waves to interact and exchange data without needing physical contact. Two components comprise an RFID system: transponders (RFID tags) and transceivers (RFID readers). The Electronic Product Code (EPC) is the unique identifier of the smart object, RFID tags are characterized as either active or passive. Iteinbaur battery of an active tag permits the remote interaction of its unique EPC with surrounding EPCs at a limited distance. Passive tags operate without a battery, and data is read only when a transceiver within a short range activates the tag. Unfortunately, the data within the RFID is vulnerable to tampering, corruption, and deletion, although cryptographic techniques are used to ensure privacy and proof of originality of the transferred data. 2103-1875

Lesson 2: IoT Applications and Challenges

IoT Security Issues

Examples: Security Issues with RFID Technologies

Table 2.7: Examples of security vulnerabilities of loT systems through RFID exploitation Security vulnerability Attack on Authenticity Unauthorized Tag Disabling Attack on Integrity Unauthorized Tag Cloning Attack on Confidentiality Attack example These attacks cause RFID tags to malfunction and behave Incorrectly when an RFID reader scans them. The EPC flags false information that do not match the RFID tag's destination properties. Typically, this attack is conducted remotely, allowing the attacker to modify the tag's behavior from a distance. The theft of CPC identity Information and medification of tags by unauthorized RFID readers comes under this category, Once the identity information of a tag has been obtained, it is easy to replicate the tag, which can be used to circumvent or counterfelt security mechanisms and create new vulnerabilities during automato verification processes. Tracing an RFID tag through unauthorized readers may result in the disclosure of sensitive information. Attack on Availability Denial of Service (DOS) Attack Jamming the system with noise interference, blocking radio signals, or removing or disabling RFID tr=cllent.amely cades [true]# status (ma get] [error] virus detected Com 4s s status.com 58 Security Issues with Wireless Sensor Networks Technologies Wireless sensor networks (WSN) are responsible for transferring data and information between smart objects in loT systems. They are composed of autonomous nodes that communicate with limited frequency and capacity. The communication node consists of a battery, sensor, memory, radio transceiver, and microprocessor. Due to the limited communication range of each sensor node, information is relayed between the source and the brace Station in multiple stages. Wireless sensors gather and transmit the required data in coordination with other nodes for routing to the central system. Wireless sensors have limited power and computing Papabilities, making many traditional security methodologies difficult or impossible to implement. 173-1445 Wireless sensor network A wireless sensor network (WSN) consists of dispersed autonomous sensors monitoring physical or environmental conditions that collectively transmit data to a central location.

Lesson 2: IoT Applications and Challenges

Table 2.7: Examples of security vulnerabilities of IoT systems through RFID exploitation

Security Issues with Wireless Sensor Networks Technologies

Security and Privacy Concerns Any connected device could be a potential open door to the loT infrastructure or sensitive data. Concerns about data security and privacy are very important as complexity can create more vulnerabilities related to the provision of loT services. Table 2.8: Security concerns based on loT system levels loT system levels Device level Security concerns IoT devices must prove their identity to maintain authenticity and limit locally stored data to protect privacy. Because loT devices are present everywhere in the environment, physical security is also important. This creates the need to design resistance to device breaches so that it is difficult to extract sensitive items such as personal data, cryptographic keys, or credentials. To support a long service life, software updates must be frequently applied. Q Network level This level of the loT system represents connectivity and messaging between loT devices and cloud services, Internet communications are usually a combination of private and public networks, so securing traffic is critical. Many IoT devices also communicate through protocols other than WIEL. The loT gateway is responsible for maintaining confidentiality, integrity and availability when translating between different wireless protocols HT8 Service level This level represents the loT management system and is responsible for managing devices and users, implementing policies and rules, and coordinating automation acress devices. Rele-based access control to manage the identity of users and devices and the actions they are authorized to take are critical at this level. Tracking of actions must be enabled to ensure that potentially compromised devices can be identified when abnormal behavior is detected Data level رارت التعليم 2073-1445 Large data analysis of aggregated data generated by lot is often described as the most valuable aspect of tot for service providers. Maintaining data privacy is a top priority for govemment agencies with the Communications, Space and Technology Commission (CST) in Saudi Arabia, the Federal Trade Commission (FTC) in the USA and the Network and Information Security Agency (ENISA) in the European Union, which release the corresponding privacy-related security requirements guidelines. 59

Lesson 2: IoT Applications and Challenges

Security and Privacy Concerns

Table 2.8: Security concerns based on IoT system levels

60 Approaches to Solving Security Challenges Security must be considered during the design phase of an IoT system. Building security throughout the design phase begins at the hardware level, communication infrastructure, the operating system level, followed by the design level, and should be extended until application deployment. Companies and state organizations should enforce data protection policies and comply with their country's legislation. Specialized network and security engineers, with experience in loT systems design, test and secure loT devices and networks by implementing best practices in cybersecurity. These engineers must combine technical knowledge and field experience from various computing domains. Privacy Concerns The concept of privacy differs in different cultures and has evolved and transformed over time. Initially, installing surveillance cameras was considered intrusive; however, this practice is now widespread and accepted. The Internet of Things is a blend of public and commercial applications, and who will have access to and authority over the collected data is a concern. In IoT systems, privacy should be enforced over personally identifiable information, and storage and disclosure restrictions should be imposed. An adequate privacy and protection framework must be in place, and consumers must be guaranteed that their data is private and secure. 8 APTOP rror DAP nt("please OPERATON C Types.Operator LO ro Governmental Regulation The rapid growth of loT applications has raised several concerns around data privacy issues and malicious attacks that can disrupt critical operations of the industry or government. Governments worldwide have started to focus on solving this problem with regulation and legislation initiatives covering loT ecosystems. at active of هيئة الاتصالات والقضاء والتقنية CST Communications. Space & Technology Commission IoT Regulatory Framework The Kingdom of Saudi Arabia aims to become a leading country in developing and applying loT technologies and services. The Communications, Space and Technology Commission (CST) has developed the loT Regulatory Framework to regulate loT service provisioning requirements to support this endeavor. The framework defines regulations specific to loT equipment, lot identifiers, such as IP addresses, that Miquely identify objects to simplify communications, and other loT technologies. In aduition, the fol Regulatory Framework includes other fundamental standards for loT service providers, such as communication with end-users regarding the significance of network and data Pulsecurity and data protection guidelines. 173-175

Lesson 2: IoT Applications and Challenges

Approaches to Solving Security Challenges

Governmental Regulation

INTERNET OF THINGS (IoT) REGULATORY FRAMEWORK CST والكرم والاقليم CommELK CST Emerging Technology Regulatory Sandbox Application Quidamus Figure 128 CST 10T downlo-dale documents Emerging Technology Regulatory Sandbox CST has also established the Emerging Technology Regulatory Sandbox to develop and deliver innovative applications in Saudi Arabia. The initiative is part of the authority's responsibility to oversee and control the ICT sector, including licensing and regulating telecommunications applications that integrate loT technologies. This regulatory sandbox aims to support, facilitate, and sustain the expansion of the loT application development ecosystem in Saudi Arabia and benefit all sector stakeholders, including companies and customers. The Emerging Techmology Regulatory Sandbox tries to decrease the time required to bring applications to market and reduce the cost-of-service delivery while application developers can test novel products and services in a controlled environment. CST also contributes to developing an ecosystem hospitable to nevation by improving access to funding. These efforts align with the Saudi Vision 2030 to assist the growth of the private Pulsector and the creation of technology-related jobs. 273-1485 CST 61

Lesson 2: IoT Applications and Challenges

Emerging Technology Regulatory Sandbox

Exercises 1 Read the sentences and tick True or False. 1. Telemedicine is one of the lot applications that is on the decline. 2. Smart grid loT applications are used only to save energy. 3. The most critical innovations in loT technologies have occurred in the last 20 years. 4. Smart objects will consume more energy in the future. 5. Implementing the same security standards for all loT systems is the least complex problem in lot systems: 6. The IPv6 protocol will not be able to support the expected number of future smart objects. 7. The amount of input data sources for smart objects will increase. True False 8. RFID and WSN technologies are invulnerable to DoS attacks. 9. IoT applications and systems are unregulated by government authorities. 16 10. Privacy of loT data is a significant concern to governments and organizations. 2 Compare and contrast loT-enabled self-driving cars and smart public transportation. Are these loT applications separated or complement each other? Present your ideas below. وزارة العملية

Lesson 2: IoT Applications and Challenges

Read the sentences and tick True or False.

Compare and contrast IoT-enabled self-driving cars and smart public transportation. Are these IoT applications separated or complement each other? Present your ideas below.

3 Solar or wind renewable energy sources introduce variability in power generation. Do you think smart grid technologies can make the distribution and management of renewable energy more effective? Present your reasons below. 4 Identify which technological trend in smart objects will be the most important in developing loT systems. Present your ideas below. وزارة التعليم -1445

Lesson 2: IoT Applications and Challenges

Solar or wind renewable energy sources introduce variability in power generation. Do you think smart grid technologies can make the distribution and management of renewable energy more effect

Identify which technological trend in smart objects will be the most important in developing IoT systems. Present your ideas below.

5 Discuss which of the common loT challenges is the most difficult and expensive to overcome. Present your findings below. 6 Search the Internet for an event where a security vulnerability led to a cyberattack on an loT system. What were the damages caused, and how could it have been prevented? Present your findings below. حرارة المحلية

Lesson 2: IoT Applications and Challenges

Discuss which of the common IoT challenges is the most difficult and expensive to overcome. Present your findings below.

Search the Internet for an event where a security vulnerability led to a cyberattack on an IoT system. What were the damages caused, and how could it have been prevented? Present your finding

7 Consider the most vulnerable point in Wireless Sensor Networks and how it affects toT systems. Present your ideas below. 8 Describe what actions the CST board took to regulate the adoption of loT applications in the Kingdom of Saudi Arabia. وزارة التعليم

Lesson 2: IoT Applications and Challenges

Consider the most vulnerable point in Wireless Sensor Networks and how it affects IoT systems. Present your ideas below.

Describe what actions the CITC board took to regulate the adoption of IoT applications in the Kingdom of Saudi Arabia.