the internet of things is the network of physical objects embedded with electron
ID: 3661370 • Letter: T
Question
the internet of things is the network of physical objects embedded with electronics,software,sensors,and network connectivity, which enables these objects to collect and exchange data. write a detailed report on IoT detailing the following points:
a. what efforts are being made to make the IoT secure? are these efforts being successful?
b.will widespread use of IoT have any effects on privacy? what assurance are being made to this regard? are these assurances based upon facts such as a particular protocol design?
c.what efforts are being made in order for all of the IoT devices to be interoperable?
d. the billions of IoT devices will produce a large amount of data. how do you think that this data can be used to the benefit and detriment of the customers at large?
Explanation / Answer
a)The various efforts to make internet of things(IoT) secure are:
1.M2M->Connectivity & Reliability
With a vast experience in security, telecommunications and automotive, Infineon is offering an extensive portfolio of security microcontrollers for M2M applications where high quality, endurance and security are key success factors. Infineon’s product portfolio for the cellular M2M market has been specially designed to be a perfect match for Industrial M2M and in-Car connectivity.
2.Authentication Turn-key Solution
The OPTIGA™ Trust family of products consists of turn-key and programmable solutions that give you the benefit of easy and convenient integration whilst offering you the most suitable security to protect your business and product. It contains a full range of embedded security products addressing the device authentication market which enables the right features and the right level of security for your projects such as the protection of embedded systems against counterfeiting, unauthorized products, intentional attacks, and unintentional operator errors.
3.Symantec has solutions to secure and authenticate devices and code in IoT environments:
These are very much affective ensuring data secrecy and confidentiality of the data being used in organizations and providing access to known people who are authorised to.It also prevents data from malicious attacks from people from stealing data. More technologies are coming up to ensure similar features and these are very much affective till date.
b)Iot's affect on privacy:
Countless sensors and smart objects in our houses, cars, clothes and even our bodies will constantly collect information about us.
Our current understanding of privacy will recede as organizations constantly gather more and more information about us from our IoT-enabled devices. Because our devices and possessions will always be connected, we will always be connected, too. The very concept of being offline or even alone may become extinct.
Big data, especially, will make it hard to keep anything private. Our “things” will gather contextual details about us, giving organizations the capability to analyze and predict our behavior. This will no doubt open very public windows into all of our lives.It’s difficult to tell how much, or how little, privacy we will have once the IoT is fully formed. The IoT’s impact on privacy may lead to a dystopian nightmare filled with constant surveillance, or it might even make some positive changes in the world as human beings become more transparent with each other.
Whenever there is a transfer of information, your data can be stolen or corrupted enroute. Strong vulnerability exists when your transferred data sits in the collation hub, waiting to get uploaded. Various set of data needs various tiers of security. There are few data having sensitive information embedded in it. As a result, they require high level of security to stay protected.There also might be an underlying possibility that your data gets hacked while on its way. With increasing advances in the realm of IoT hacking, it has become quite easy for a hacker to have an unauthorized access to your important information.With the advent of IoT technology, the cloud security issues have heightened. Storing data either publicly or privately has emerged out as a big question now. So, data access issues and ID authentication should be taken into consideration seriously.
Protocol design to protect the privacy:
Two protocols, CoAP and HTTP/REST, are both based on request response without a publish/subscribe approach. In the case of CoAP, the use of 6LoWPAN and the automatic addressing of IPv6 is used to uniquely identify nodes. In the case of HTTP/REST the approach is different in that the request can be anything including a request to publish or a request to subscribe so in fact it becomes the general case if designed in this way. Today, these protocols are being merged to provide a complete publish/subscribe request/response model.
c)The various efforts to make IoT devices interoperable includes:
1.AllJoyn is one of the oldest standards protocols in the market. AllJoyn was first created by Qualcomm to promote interoperability. Qualcomm’s goal with AllJoyn was to ease communication for developers without having to get deep into that networking layer of IoT so that they could focus on applications. Later, AllJoyn was signed over to the Linux Foundation to make it open source and the AllSeen Alliance was dedicated to driving the adoption of the AllJoyn protocol for interoperability between devices. The key benefits to AllJoyn are that it does not require Internet to work and that it is open source. Despite being open source, Qualcomm is still heavily involved with the protocol and while AllJoyn has been in the market for a long time, it is not seeing widespread adoption in the market quite yet.
2.The OIC, like AllJoyn, is open source. There is a lot of collaboration between members working on various devices. In some ways, this collaboration provides some great solutions, but it also leads to too many cooks in the IoT kitchen. The OIC is still in the early stages of development as the framework was just released in January. We are not seeing devices on the market yet but the OIC looks promising. This is a wait-and-see standard.
3.HomeKit is Apple’s answer to application framework for interoperability for IoT. It is a common network protocol, which includes end-to-end encryption. They simplify the set up and pairing process and it is an overall great start to interoperability. HomeKit products have just begun to hit the market with more on the way. Apple is really driving the ship when it comes to this standard, which may seem limiting to some but it also allows HomeKit manufacturers to move their products much quicker to market because there is only one set of rules and standards to follow. Obviously this standard is great for iOS but it leaves out Android, Windows, and other operating systems (a move not unprecedented considering the element of competition).
d)The various ways it can provide benefits to the customers include:
1.Money:It is one the biggest advantage of IoT ->saving money. If the price of the tagging and monitoring equipment is less than the amount of money saved, then the Internet of Things will be very widely adopted. IoT fundamentally proves to be very helpful to people in their daily routines by making the appliances communicate to each other in an effective manner thereby saving and conserving energy and cost. Allowing the data to be communicated and shared between devices and then translating it into our required way, it makes our systems efficient.
2.Efficient and Saves Time
The machine-to-machine interaction provides better efficiency, hence; accurate results can be obtained fast. This results in saving valuable time. Instead of repeating the same tasks every day, it enables people to do other creative jobs.
3.Saves Money
Optimum utilization of energy and resources can be achieved by adopting this technology and keeping the devices under surveillance. We can be alerted in case of possible bottlenecks, breakdowns, and damages to the system. Hence, we can save money by using this technology.
4.Better Quality of Life
All the applications of this technology culminate in increased comfort, convenience, and better management, thereby improving the quality of life.
The various disadvantages associated with using IoT includes:
1.Privacy/Security:With all of this IoT data being transmitted, the risk of losing privacy increases.
2.Technology Takes Control of Life
Our lives will be increasingly controlled by technology, and will be dependent on it. The younger generation is already addicted to technology for every little thing. We have to decide how much of our daily lives are we willing to mechanize and be controlled by technology.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.