Internet of Things (IoT)

A network of physical objects embedded with sensors and software for data exchange.

The Internet of Things (IoT) refers to a network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these objects to connect and exchange data. The architecture of an IoT system typically comprises several layers: device layer (the 'things' themselves), connectivity layer (communication protocols like Wi-Fi, Bluetooth, cellular, LoRaWAN), processing/middleware layer (data aggregation, filtering, and analysis, often in the cloud or edge computing), and application layer (user interfaces and specific applications). Data generated by sensors is transmitted via various communication protocols to a central platform for analysis. This analysis can trigger actions via actuators embedded in the devices or provide insights to users. Trade-offs in IoT design involve balancing factors like device cost, power consumption, data security, network bandwidth, and latency. The sheer scale of connected devices presents significant challenges in terms of data management, security, and interoperability between different vendor ecosystems. Security is a paramount concern, as compromised IoT devices can be used in botnets or provide entry points into sensitive networks.

        graph LR
  Center["Internet of Things (IoT)"]:::main
  Pre_computer_science["computer-science"]:::pre --> Center
  click Pre_computer_science "/terms/computer-science"
  Rel_antimatter_propulsion["antimatter-propulsion"]:::related -.-> Center
  click Rel_antimatter_propulsion "/terms/antimatter-propulsion"
  Rel_arpanet["arpanet"]:::related -.-> Center
  click Rel_arpanet "/terms/arpanet"
  Rel_artificial_consciousness["artificial-consciousness"]:::related -.-> Center
  click Rel_artificial_consciousness "/terms/artificial-consciousness"
  classDef main fill:#7c3aed,stroke:#8b5cf6,stroke-width:2px,color:white,font-weight:bold,rx:5,ry:5;
  classDef pre fill:#0f172a,stroke:#3b82f6,color:#94a3b8,rx:5,ry:5;
  classDef child fill:#0f172a,stroke:#10b981,color:#94a3b8,rx:5,ry:5;
  classDef related fill:#0f172a,stroke:#8b5cf6,stroke-dasharray: 5 5,color:#94a3b8,rx:5,ry:5;
  linkStyle default stroke:#4b5563,stroke-width:2px;

      

🧒 Explain Like I'm 5

🌍 Imagine if everything in your house—the toaster, the lights, and even the plants—could talk to each other and to you through your phone. That's IoT. It's giving everyday objects a voice and a brain.

🤓 Expert Deep Dive

IoT architectures span edge, fog, and cloud computing paradigms. Edge computing processes data closer to the source, reducing latency and bandwidth requirements, crucial for real-time applications. Fog computing acts as an intermediate layer. Communication protocols are diverse, ranging from low-power, short-range options (Bluetooth LE, Zigbee) to wide-area networks (NB-IoT, LoRaWAN) and traditional IP-based protocols (Wi-Fi, Ethernet). Security is a major architectural challenge, often addressed through device authentication, encrypted communication (TLS/DTLS), and secure boot processes. However, the resource constraints of many IoT devices limit the implementation of robust security measures. Data management involves handling massive volumes of heterogeneous data, often requiring specialized databases and stream processing frameworks. Trade-offs include the security-performance-cost triangle: enhancing security often increases cost and complexity, potentially impacting performance. Vulnerabilities include insecure network services, weak authentication, lack of regular updates, and susceptibility to physical tampering.

🔗 Related Terms

Prerequisites:

📚 Sources