Machine and Deep Learning Techniques in IoT and Cloud

Machine and Deep Learning Techniques in IoT and Cloud

J. Fenila Naomi, Kavitha M., Sathiyamoorthi V.
DOI: 10.4018/978-1-7998-3111-2.ch013
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

In establishing a healthy environment for connectivity devices, it is essential to ensure that privacy and security of connectivity devices are well protected. The modern world lives on data, information, and connectivity. Various kinds of sensors and edge devices stream large volumes of data to the cloud platform for storing, processing, and deriving insights. An internet of things (IoT) system poses certain difficulties in discretely identifying, remotely configuring, and controlling the devices, and in the safe transmission of data. Mutual authentication of devices and networks is crucial to initiate secure communication. It is important to keep the data in a secure manner during transmission and in store. Remotely operated devices help to monitor, control, and manage the IoT system efficiently. This chapter presents a review of the approaches and methodologies employed for certificate provisioning, device onboarding, monitoring, managing, and configuring of IoT systems. It also examines the real time challenges and limitations in and future scope for IoT systems.
Chapter Preview
Top

Iot Ecosystem

The Internet stands as a platform for devices to communicate. Billions of connectivity devices endorse the brilliance of IoT. Though connectivity is an enabler, its true value lies in data transmission, business insight, and data-driven economy.

Devices that establish connectivity on the Internet provide a range of advantages – for example, we can remotely control, monitor, fault diagnose, and collect data for analysis. Devices used for making connectivity are equipped with modern microcontrollers. Data transmission may seem to be a minor task in today’s Internet protocols, but this is not true. Though in many instances, pure data transmission is set to be the goal of hackathons and other hands-on IoT workshops, it is the only part objective of the IoT system.

While the manufacturer-credentials are perpetual, the operational credentials are typically short-lived for use with designated communicating members. IoT devices differ from other kinds of computing device like a smart phone by having only a small number of communicating parties, restricting the number of operational credentials to be stored by the IoT system, and providing certain ease of operation.

Complete Chapter List

Search this Book:
Reset