Course Code : ECT458
Course Name : Internet of Things
Course Objectives
This course aims to develop skills in IoT system development and to apply the same in real life applications.
Course Outcome
CO1: Understand the IoT fundamentals and architecture modelling
CO2: Understand the smart things in IoT and functional blocks
CO3: To understand the communication networks and protocols used in IoT.
CO4: To understand the cloud resources, data analysis and applications.
CO5: To apply the IoT processes in embedded applications
Syllabus
Module 1 (7 Hours)
Introduction to IoT technology: Definitions and Characteristics of IoT, IoT Architectural View, Physical Design of IOT, Logical Design of IoT- IoT Functional blocks, IoT communication models, IoT Enabling Technologies, IoT Levels & Deployment Templates.
Module 2 (7 Hours)
IoT and M2M- M2M, Difference between IoT and M2M, SDN and NFV for IoT, Smart Objects: The “Things” in IoT: Sensors, Actuators, and Smart Objects, Sensor Networks- Wireless Sensor Networks (WSNs), Communication Protocols for Wireless Sensor Networks- Connecting Smart Objects- Communication Criteria.
Module 3 (7 Hours)
Unified Data Standards –Protocols –IEEE 802.15.4 -The Physical Layer, The Media-Access Control Layer, Uses of 802.15.4 ,The Future of 802.15.4: 802.15.4e and 802.15.4g–Modbus– ZigBee-Zigbee Architecture- LoRaWAN -Standardization and Alliances, Physical Layer, MAC Layer, Topology, LTE-M, NB-IoT-Network layer –The next generation: IP-based protocols – 6LoWPAN and RPL, Overview of the 6LoWPAN Adaptation Layer .
Module 4 (9 hours)
Data Collection, storage and computing Using a Cloud Platform-Introduction, Cloud Computing Paradigm for Data Collection, Storage and Computing-Cloud Computing Paradigm, Cloud Deployment Models-Everything as a Service and Cloud Service Models-SaaS, PaaS, IaaS, DaaS. Cloud based platforms-XIVELY, NIMBITS.
IoT Physical Devices & Endpoints-IoT Device-Building blocks –Raspberry-Pi -Board-Linux on Raspberry-Pi-Raspberry-Pi Interfaces (serial, SPI, I2C). Raspberry Pi interfacing and programming examples using python (LED, switch, sensor, serial, SPI, I2C devices). Controlling GPIO outputs and displaying sensor readings using web interface/cloud (Python programming is required only for assignments and projects and not for examinations. Other end nodes and platforms can also be used).
Module 5 (6 Hours)
IoT privacy, security and vulnerabilities solutions, vulnerabilities, security requirements, threat analysis, security tomography, layered attacker model, Identity management, access control, secure message communication.
Smart and Connected Cities-An IoT Strategy for Smarter Cities-Vertical IoT Needs for Smarter Cities, Global vs. Siloed Strategies-Smart City IoT Architecture-Street Layer, City Layer, Data Center Layer, Services Layer- Smart City Security Architecture – Smart City Use-Case Examples – Street lighting, smart parking, smart traffic and air pollution monitoring
Text Books
1. Vijay Madisetti and Arshdeep Bahga, “Internet of Things (A Hands-on- Approach)”, 1st Edition, VPT, 2014 ( Module1,2,4)
2. David Hanes, Gonzalo Salgueiro, Patrick Grossetete, Rob Barton and Jerome Henry,
―IoT Fundamentals: Networking Technologies, Protocols and Use Cases for Internet of Things, Cisco Press, 2017. (Module2,3,5)
3. Rajkamal, “Internet of Things : Architecture and Design Principles”, McGraw Hill (India) Private Limited.
4. Raspberry Pi Cookbook, Software and Hardware Problems and solutions, Simon Monk, O’Reilly (SPD), 2016, ISBN.
Reference Books/Papers
1. Olivier Hersent, David Boswarthick, Omar Elloumi , “The Internet of Things –Key applications and Protocols”, Wiley, 2012 (Module 3)
2. Al-Fuqaha et al. Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Communications Surveys & Tutorials (2015), pp. 2347- 2376.
3. The Internet of Things (The MIT Press Essential Knowledge series) Paperback – March 20, 2015 by Samuel Greengard
4. The Internet of Things: Converging Technologies for Smart Environments and Integrated Ecosystems, Ovidu Vermesan and Peter Friess, River Publishers.
5. Internet of Things – From Research and Innovation to Market Deployment-RIVER PUBLISHERS, PETER FRIESS, OVIDIU VERMESAN (Editors)
6. Internet of Things Security and DataProtection, Sébastien Ziegler, Springer International Publishing 2019.
Curriculum
- 5 Sections
- 11 Lessons
- 12 Weeks
- Module 1 - Introduction to IoT technologyThe Internet of Things (IoT) refers to a network of interconnected devices that communicate and exchange data over the internet. These devices, often embedded with sensors, software, and communication technologies, collect and share data to automate processes, improve efficiency, and enhance user experiences.3
- Module 2 - IoT and M2MIoT (Internet of Things) and M2M (Machine-to-Machine) communication are two closely related technologies that enable devices to communicate and exchange data without human intervention. However, there are significant differences between them in terms of scope, architecture, and applications.2
- Module 3 -Unified Data StandardsUnified Data Standards refer to a set of standardized protocols, formats, and frameworks that ensure seamless communication, interoperability, and security among IoT devices and systems. Since IoT involves diverse manufacturers, platforms, and applications, standardized data handling is essential for a cohesive and scalable ecosystem.2
- Module 4 -Data collection, storage & computing using cloud platformThe cloud platform plays a crucial role in IoT by providing scalable, reliable, and secure infrastructure for handling massive amounts of data generated by IoT devices. It enables efficient data collection, storage, processing, and analytics, making IoT applications smarter and more responsive.2
- Module 5 -Iot privacy, security and vulnerability solutionsThe Internet of Things (IoT) connects billions of devices, making security and privacy critical challenges. Weak security can lead to data breaches, device hijacking, and system failures. Implementing strong security measures helps protect IoT devices, networks, and user data.2