IoT — Unit 2

Exam Ready Notes

Definition and Characteristics of M2M (Machine-to-Machine)

Definition: Machine-to-Machine (M2M) is a technology that enables direct communication between devices without human intervention, using wired or wireless networks to automatically collect, exchange, and act on data. In simple terms, M2M allows machines to communicate and perform actions automatically.

1
Problem-Specific / Application-Specific
M2M systems are designed to solve a particular problem for a specific organization or use case. Devices are usually built for one dedicated function.
2
Special-Purpose Devices
Most M2M devices are application-specific hardware designed for a single task, such as smart meters or vending machines. They have limited flexibility.
3
Device- and Communication-Centric
M2M mainly focuses on hardware devices and connectivity technologies rather than advanced software intelligence or analytics.
4
Point-to-Point Communication
Communication is typically direct between machines (device-to-device) and often uses private or closed networks.
5
Enterprise-Oriented Deployment
M2M solutions are usually developed by specialized vendors and deployed within enterprises such as industries, utilities, and banking systems.
6
Limited Scalability
Traditional M2M systems support a fixed or limited number of devices and are not designed for massive scaling like IoT.
7
Hardware-Centric Architecture
M2M systems rely heavily on embedded hardware and gateways, with relatively simple architecture compared to modern IoT systems.
M2M is a hardware-focused, point-to-point automated communication technology used to enable direct interaction between machines for specific applications without human involvement.

Difference Between IoT and M2M

M2M focuses on direct machine communication, whereas IoT provides a broader internet-based ecosystem of connected smart devices.

Aspect M2M (Machine-to-Machine) IoT (Internet of Things)
Full FormMachine-to-MachineInternet of Things
MeaningDirect communication between machinesNetwork of physical objects connected via Internet
Human InterventionNo human involvement during communicationMinimal — mainly for monitoring
Communication TypePoint-to-pointDevice-to-cloud and cloud-to-device
Internet RequirementNot always requiredRequired
Network UsagePrivate networks (GSM, SMS, LAN)Public Internet, Wi-Fi, 4G/5G, LPWAN
ArchitectureSimple and hardware-centricComplex and software-centric
Data HandlingLimited processingAdvanced analytics using AI/ML
ScalabilityLimited number of devicesHighly scalable (millions of devices)
FlexibilityLow, vendor-specificHigh, interoperable systems
SecurityBasic (closed networks)Advanced security mechanisms required
ApplicationsSmart meters, ATMs, vending machinesSmart homes, smart cities, wearables
M2M is a hardware-centric, point-to-point communication technology for specific enterprise applications, while IoT is a scalable, internet-based ecosystem that connects smart devices and enables advanced analytics and intelligent services.

Explain Sensor Technology

Definition: Sensor technology is the technology used for designing sensors and associated electronic circuits that can sense changes in physical parameters — such as temperature, pressure, light, motion, or sound — and convert them into electrical signals.

Working of a Sensor
1
Sensing
Detects a physical quantity (temperature, pressure, light, etc.).
2
Conversion
Converts physical energy into an electrical signal.
3
Transmission
Sends the signal to a processing unit for further action.
Types of Sensors
Analog Sensors

Produce a continuous output signal proportional to the measured quantity.

  • Continuous output
  • Measures variation against reference
  • Requires external ADC for digital systems
  • Examples: temperature, pressure, light sensor
Digital Sensors

Convert the measured signal into digital form (0s and 1s) within the sensor itself.

  • Discrete output
  • Built-in ADC
  • Less affected by noise
  • Easy interface with microcontrollers
  • Examples: IR sensor, ultrasonic, moisture sensor
Smart Sensors

A smart sensor includes sensing, processing, and communication capabilities in a single unit, enabling intelligent data handling without external processing.

Applications of Sensor Technology
Sensor technology forms the foundation of IoT by enabling devices to sense environmental changes and convert them into electrical signals for intelligent processing and automated decision-making.

Explain Security of IoT

Definition: IoT security refers to the technologies, processes, and practices used to protect IoT devices, networks, data, and applications from unauthorized access, attacks, and data breaches.

Need for IoT Security
Common IoT Security Threats
Unauthorized Access — Hackers gain control of devices.
Data Breaches — Leakage of sensitive information.
Malware and Botnets — Devices used in DDoS attacks (e.g., Mirai botnet).
Man-in-the-Middle (MITM) — Interception of data during transmission.
Weak Authentication — Use of default or weak passwords.
Unpatched Firmware — Exploitation of outdated software.
CIA Triad in IoT Security

The CIA triad forms the foundation of IoT security.

Confidentiality
Only authorized users or devices can access data.
Integrity
Data remains accurate and is not altered by unauthorized parties.
Availability
IoT systems and services are accessible whenever required.
AAA Framework

The AAA framework strengthens IoT security.

Authentication
Verifies the identity of the user or device.
Authorization
Defines what actions a user is permitted to perform (using ACL).
Audit Trail
Records user activities for monitoring and security analysis.
IoT security is essential to protect connected devices and data. By implementing the CIA triad and AAA framework, IoT systems can ensure safe, reliable, and trustworthy operation in real-world environments.

Cloud Computing

Cloud computing is a technology that provides computing services such as storage, servers, networking, and software over the Internet. Instead of owning physical hardware, users access these resources on demand from third-party providers — from anywhere, at lower cost.

Key Features of Cloud Computing
1
On-Demand Availability
Resources can be accessed whenever required without prior investment in hardware.
2
Scalability
Resources can be easily increased or decreased based on demand.
3
Cost-Effectiveness
Users pay only for the resources they use — no upfront hardware cost.
4
Accessibility
Data and applications are accessible from anywhere via the internet.
5
Reliability
Provides backup, disaster recovery, and high availability of services.
Service Models of Cloud Computing
IaaS
Infrastructure as a Service
Provides virtual machines, storage, and networking.
PaaS
Platform as a Service
Provides a platform for developing and deploying applications.
SaaS
Software as a Service
Provides ready-to-use software over the internet.
Cloud computing is an efficient and flexible technology that delivers IT resources over the internet, helping organizations reduce costs and improve scalability and accessibility.

Explain IoT Enabling Technologies

Definition: IoT enabling technologies are the fundamental technologies that support the implementation and operation of IoT systems by enabling devices to sense, communicate, process, and analyze data intelligently.

1
Embedded Systems
Specialized computer systems designed to perform dedicated functions within IoT devices. They act as the brain of IoT devices.
Role in IoT
  • Controls device operations
  • Processes sensor data locally
  • Provides real-time response
  • Interfaces with sensors and actuators
Examples
Smart thermostat controller, washing machine controller.
2
Wireless Sensor Networks (WSN)
Consist of many sensor nodes that monitor environmental conditions and transmit data wirelessly to a base station.
Role in IoT
  • Provides large-scale sensing
  • Enables remote monitoring
  • Supports wireless data collection
  • Reduces wiring cost
Features
  • Infrastructure-less
  • Self-configured
  • Uses radio communication
Examples
Smart agriculture monitoring, environmental sensing.
3
Big Data Analytics
Involves processing massive volumes of data generated by IoT devices to extract useful insights and support intelligent decision-making.
Role in IoT
  • Converts raw data into meaningful information
  • Enables predictive analysis
  • Supports AI/ML applications
  • Improves automation and business decisions
Examples
Traffic prediction in smart cities, recommendation systems.
Embedded systems provide device intelligence, WSN enables sensing and communication, and Big Data Analytics extracts valuable insights. Together, these enabling technologies form the foundation of modern IoT systems.