IoT Communication Models and Operating Systems

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

7 hours 6 minutes
Video Transcription
Hey, everyone, welcome back to the course in this video. We're gonna talk about I o t communication models, and we're also going to talk about some of the i o T. Operating systems.
So what are R i o t communication models? We've got our back end data sharing. We've got device to cloud. We've got a device to device and our device to gateway. Let's talk about each one of those a little bit.
So our back end data sharing this model extends a divisive cloud communication type
on DSO. Basically, the data from the I o T. Devices
is put into the cloud stored there and then it could be accessed by third party. So keep that in mind.
We've got a device to cloud. This is where the devices communicate with the cloud and not the direct client to send the data. So this one's gonna use communication protocols like WiFi, Ethernet,
um, sometimes cellular etcetera.
We got our device to device. So this is where devices this is for devices that are.
This is where they interact with each other through the Internet, but they use protocols like zig B Z wave a swell as Bluetooth.
So think of this as devices like the smart light bulbs that will send data back saying, Hey, it's time to change me. Um, if you work in health care, the E C d or E K G, as it's more commonly called, which is basically where if you've ever been to the cardiologists, where the doctor puts the little wires on you, the little sticky pads shave your chest, chest and all that
and looks at your actual heart rhythm.
I'm gets a capture of that. That's what the E k. G does for you
and then as well as things like security cameras. Right, So our CCTV cameras
device to Gateway s. So this is basically the intermediary, right? That's what the gateway is. It's an intermediary between that raw data that we're getting from these devices and the cloud where we're storing that data. Add, um, could be many things, right. The gateway could be many things, including things like a smart smartphone.
All right, it's gonna use protocols like before, like zig B and Z wave.
So let's talk about some of our i. O. T. Operating system. So
we've got our riot OS or operating system. This one has less resource requirements, and it uses energy pretty efficiently. It can run on things like embedded systems, sensors and even actuator boards.
We've got our arm embedded OS. It's, uh, mostly used for lower power devices. Eso think things like your wearable devices like your Fitbit and stuff
we've got Our real sense this one is using uses Intel's depth sensing technology so you'll see a lot of times and centers as well as like cameras.
We've got nucleus. This one is used primarily like a medical or industrial applications, as well as things like Aerospace.
We've got Brillo, this one's android based. So this is used in low end devices. So think of like your thermostats thes days. You're smart thermostats. That's where we'll see Brillo.
We've got counting key. This one is also used in low powered wireless devices. So think of like street lighting, so the streetlight knows when you walk down the street it turns on or when you drive down the street. Street light comes on also like sound monitoring systems as well.
Zephyr is used in low power and resource constrained devices,
and we've got integrity which is used in things like aerospace, defense, automotive, medical, Acela's industrial.
So just a quick, quick question here for you. Which communication model typically involves sharing data with third parties.
It's a device to gateway, back end or device to cloud.
So if you get back end, you are correct. Remember, that's the one where the data has been sent into the cloud and then the third parties access to data.
So in this video, we just talked about some of the I O. T communication models as well as some of the different types of coyote operating systems available.
Up Next
Penetration Testing and Ethical Hacking

The Penetration Testing and Ethical Hacking course prepares students for industry penetration testing certifications, like CEH. This course walks students through the process of gaining intelligence, scanning and enumerating and hacking the target.

Instructed By