Advertisement

A Comprehensive Approach to an Internet of Things (IoT) Network: Weather Monitoring System

  • Rahul Parthasarathy
  • Suhas R. Sharma
  • Prasad B. HonnavalliEmail author
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 39)

Abstract

The overall scope of IoT sensor networks over the last decade has seen a considerable growth in technology as well as application in corporate and domestic requirement. The goal of the system proposed in this paper is a unique approach to a stable, robust, scalable, location independent, automated and efficient IoT network that is built to monitor the weather conditions at any geographic location. The data from the nodes whose positions are forethought, are transmitted one after the other in an organised, timed and precise manner to a base station where it is validated real-time by comparing values obtained from a verified online resource. Emails are sent out to the user in case of faulty behaviour of the nodes. Subsequently, this data is uploaded to a cloud platform, categorised efficiently, processed in real time and is displayed to the users on demand. Graphical visualizations of the data can be achieved using tools in the cloud platform that facilitate better understanding of the sensor data. Collision control and packet loss, an issue Wireless Sensor Networks (WSNs) face is mitigated in this model through polling techniques.

To throw light on the necessity of security in WSNs, a penetration test is performed to show one of the ways to gain unauthorized access to the network.

Keywords

IoT Weather monitoring Amazon web services IoT security 

Notes

Acknowledgement

This paper and the research behind it would not have been possible without the exceptional support of our mentor, Prof. Prasad B. Honnavalli from the IFSCR Lab at PES University. We are grateful to Prof. Kedar Ramachandra for sharing his pearls of wisdom with us during the course of this research. We are also thankful to our colleagues Rishab S Kharidhi and Sharat Chandra who provided valuable inputs that assisted the research.

We are immensely grateful for their valuable comments on the earlier versions of the manuscript, although any errors are our own and should not sully the reputation of these esteemed professionals.

References

  1. 1.
    Math, R.K.M., Dharwadkar, N.V.: IoT Based lowcost weather station and monitoring system for precision agriculture in India. In: 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC) (2018)Google Scholar
  2. 2.
    Zamfir, S., Balan, T., Iliescu, I., Sandu, F.: A security analysis on standard IoT protocols. In: Proceedings International Conference Applied and Theoretical Electricity (ICATE), Craiova, Romania, pp. 1–6 (2016)Google Scholar
  3. 3.
    Liu; Y., Tong, K.F., Qiu, X., Liu, Y., Ding, X.: Wireless mesh networks in IoT networks. In: 2017 International Workshop on Electromagnetics: Applications and Student Innovation Competition (2017)Google Scholar
  4. 4.
    Chandan, A.R., Khairnar, A.R.: Security Testing Methodology of IoT. In: International Conference on Inventive Research in Computing Applications (ICIRCA) (2018)Google Scholar
  5. 5.
    Amazon Web Services Documentation. https://aws.amazon.com/documentation/
  6. 6.
  7. 7.
    Evans, G.D.: The Internet of Things—How the next evolution of the internet is changing everything. Cisco Internet Business Solutions Group (IBSG), white paper (2011)Google Scholar
  8. 8.
    Wang, J., Wang, M., Zheng, K., Huang, X.: Model checking nRF24L01-based internet of things systems. In: 2018 9th International Conference on Information Technology in Medicine and Education (ITME) (2018)Google Scholar
  9. 9.
    Raspberry Pi Documentation. https://www.raspberrypi.org/documentation/
  10. 10.
    Biswas, A.R., Giaffreda, R.: IoT and cloud convergence: opportunities and challenges. In: 2014 IEEE World Forum on Internet of Things (WF-IoT) (2014)Google Scholar
  11. 11.
    Kennedy, D., O’Gorman, J., Kearns, D., Aharoni, M.: Metasploit the penetration testers guide. No Starch Press, San Francisco (2011)Google Scholar
  12. 12.
    Tantitharanukul, N., Osathanunkul, K., Hantrakul, K., Pramokchon, P., Khoenkaw, P.: MQTT-topics management system for sharing of open data. In: 2017 International Conference on Digital Arts, Media and Technology (ICDAMT) (2017)Google Scholar
  13. 13.
    Waher, P.: Learning Internet of Things. Packt Publishing, Birmingham (2015)Google Scholar
  14. 14.
  15. 15.

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Rahul Parthasarathy
    • 1
  • Suhas R. Sharma
    • 1
  • Prasad B. Honnavalli
    • 2
    Email author
  1. 1.Information Security Forensics and Cyber Resilience (ISFCR) LabPES UniversityBengaluruIndia
  2. 2.Department of Computer Science EngineeringPES UniversityBengaluruIndia

Personalised recommendations