Table of Contents
1. What
is Internet of Things (IoT)?
5. Internet
of Things - Hardware
6. Internet
of Things - Software
6.4 Application
and Process Extension
7. Internet
of Things - Technology and Protocols
8. IoT
- Media, Marketing, & Advertising
8.1 Marketing
and Content Delivery
9. IoT
- Transportation Applications
10. Internet
of Things - Consumer Applications
11. Internet
of Things - Security
12. Internet
of Things - Identity Protection
12.2 The
Right to be Left Alone
13. Internet
of Things - Liability
The internet of
things (IoT) is a computing concept that describes the idea of everyday
physical objects being connected to the internet and being able to identify
themselves to other devices. The term is closely identified with RFID as the
method of communication, although it also may include other sensor
technologies, wireless technologies or QR codes.
The most important features of
IoT include artificial intelligence, connectivity, sensors, active engagement,
and small device use. A brief review of these features is given below –
·
AI − IoT essentially makes
virtually anything “smart”, meaning it enhances every aspect of life with the
power of data collection, artificial intelligence algorithms, and networks.
This can mean something as simple as enhancing your refrigerator and cabinets
to detect when milk and your favorite cereal run low, and to then place an
order with your preferred grocer.
·
Connectivity − New enabling
technologies for networking, and specifically IoT networking, mean networks are
no longer exclusively tied to major providers. Networks can exist on a much
smaller and cheaper scale while still being practical. IoT creates these small
networks between its system devices.
·
Sensors − IoT loses its
distinction without sensors. They act as defining instruments which transform
IoT from a standard passive network of devices into an active system capable of
real-world integration.
·
Active Engagement −
Much of today's interaction with connected technology happens through passive
engagement. IoT introduces a new paradigm for active content, product, or
service engagement.
·
Small Devices − Devices, as
predicted, have become smaller, cheaper, and more powerful over time. IoT
exploits purpose-built small devices to deliver its precision, scalability, and
versatility.
The advantages of IoT span across
every area of lifestyle and business. Here is a list of some of the advantages
that IoT has to offer −
·
Improved Customer Engagement −
Current analytics suffer from blind-spots and significant flaws in accuracy;
and as noted, engagement remains passive. IoT completely transforms this to
achieve richer and more effective engagement with audiences.
·
Technology Optimization −
The same technologies and data which improve the customer experience also
improve device use, and aid in more potent improvements to technology. IoT
unlocks a world of critical functional and field data.
·
Reduced Waste − IoT makes
areas of improvement clear. Current analytics give us superficial insight, but
IoT provides real-world information leading to more effective management of
resources.
·
Enhanced Data Collection −
Modern data collection suffers from its limitations and its design for passive
use. IoT breaks it out of those spaces, and places it exactly where humans
really want to go to analyze our world. It allows an accurate picture of
everything.
Though IoT delivers an impressive
set of benefits, it also presents a significant set of challenges. Here is a
list of some its major issues −
·
Security − IoT creates an
ecosystem of constantly connected devices communicating over networks. The
system offers little control despite any security measures. This leaves users exposed
to various kinds of attackers.
·
Privacy − The sophistication of
IoT provides substantial personal data in extreme detail without the user's
active participation.
·
Complexity − Some find IoT
systems complicated in terms of design, deployment, and maintenance given their
use of multiple technologies and a large set of new enabling technologies.
·
Flexibility − Many are
concerned about the flexibility of an IoT system to integrate easily with
another. They worry about finding themselves with several conflicting or locked
systems.
·
Compliance − IoT, like any
other technology in the realm of business, must comply with regulations. Its
complexity makes the issue of compliance seem incredibly challenging when many
consider standard software compliance a battle.
The hardware utilized in IoT
systems includes devices for a remote dashboard, devices for control, servers,
a routing or bridge device, and sensors. These devices manage key tasks and
functions such as system activation, action specifications, security,
communication, and detection to support-specific goals and actions.
The most important hardware in IoT
might be its sensors. These devices consist of energy modules, power management
modules, RF modules, and sensing modules. RF modules manage communications
through their signal processing, WiFi, ZigBee,
Bluetooth, radio transceiver, duplexer, and BAW.

The sensing module manages sensing
through assorted active and passive measurement devices. Here is a list of some
of the measurement devices used in IoT –
|
S.No |
Devices |
|
|
1. |
accelerometers |
temperature sensors |
|
2. |
magnetometers |
proximity sensors |
|
3. |
gyroscopes |
image sensors |
|
4. |
acoustic sensors |
light sensors |
|
5. |
pressure sensors |
gas RFID sensors |
|
6. |
humidity sensors |
micro flow sensors |
Wearable electronic devices are
small devices worn on the head, neck, arms, torso, and feet.

Smart watches
not only help us stay connected, but as a part of an IoT system, they allow
access needed for improved productivity.
Current smart wearable devices
include −

Smart glasses help us enjoy more of the media and services we
value, and when part of an IoT system, they allow a new approach to
productivity.
The desktop, tablet, and cellphone
remain integral parts of IoT as the command center and remotes.
·
The desktop provides the user with the highest
level of control over the system and its settings.
·
The tablet provides access to the key features of
the system in a way resembling the desktop, and also
acts as a remote.
·
The cellphone allows some essential settings
modification and also provides remote functionality.
Other key connected devices include
standard network devices like routers and switches.
IoT
software addresses its key areas of networking and action through platforms,
embedded systems, partner systems, and middleware. These individual and master
applications are responsible for data collection, device integration, real-time
analytics, and application and process extension within the IoT network. They
exploit integration with critical business systems (e.g., ordering systems,
robotics, scheduling, and more) in the execution of related tasks.
This
software manages sensing, measurements, light data filtering, light data
security, and aggregation of data. It uses certain protocols to aid sensors in
connecting with real-time, machine-to-machine networks. Then it collects data
from multiple devices and distributes it in accordance with settings. It also
works in reverse by distributing data over devices. The system eventually
transmits all collected data to a central server.
Software
supporting integration binds (dependent relationships) all system devices to
create the body of the IoT system. It ensures the necessary cooperation and
stable networking between devices. These applications are the defining software
technology of the IoT network because without them, it is not an IoT system.
They manage the various applications, protocols, and limitations of each device
to allow communication.
These
applications take data or input from various devices and convert it into viable
actions or clear patterns for human analysis. They analyze information based on
various settings and designs in order to perform automation-related tasks or
provide the data required by industry.
These
applications extend the reach of existing systems and software to allow a
wider, more effective system. They integrate predefined devices for specific
purposes such as allowing certain mobile devices or engineering instruments
access. It supports improved productivity and more accurate data collection.
IoT
primarily exploits standard protocols and networking technologies. However, the
major enabling technologies and protocols of IoT are RFID, NFC, low-energy
Bluetooth, low-energy wireless, low-energy radio protocols, LTE-A, and WiFi-Direct. These technologies support the specific
networking functionality needed in an IoT system in contrast to a standard
uniform network of common systems.
RFID (radio-frequency
identification) and NFC (near-field communication) provide simple, lowenergy, and versatile options for identity and access
tokens, connection bootstrapping, and payments.
·
RFID technology employs 2-way radio transmitter-receivers to
identify and track tags associated with objects.
·
NFC consists of communication protocols for electronic devices,
typically a mobile device and a standard device.
This
technology supports the low-power, long-use need of IoT function while
exploiting a standard technology with native support across systems.
This
technology replaces the most power hungry aspect of an
IoT system. Though sensors and other elements can power down over long periods,
communication links (i.e., wireless) must remain in listening mode. Low-energy
wireless not only reduces consumption, but also extends the life of the device
through less use.
ZigBee,
Z-Wave, and Thread are radio protocols for creating low-rate private area
networks. These technologies are low-power, but offer
high throughput unlike many similar options. This increases the power of small
local device networks without the typical costs.
LTE-A, or
LTE Advanced, delivers an important upgrade to LTE technology by increasing not
only its coverage, but also reducing its latency and raising its throughput. It
gives IoT a tremendous power through expanding its range, with its most
significant applications being vehicle, UAV, and similar communication.
WiFi-Direct eliminates the need
for an access point. It allows P2P (peer-to-peer) connections with the speed of
WiFi, but with lower latency. WiFi-Direct
eliminates an element of a network that often bogs it down, and it does not
compromise on speed or throughput.
The
applications of IoT in media and advertising involve a customized experience in
which the system analyzes and responds to the needs and interests of each
customer. This includes their general behavior patterns, buying habits,
preferences, culture, and other characteristics.
IoT functions in a similar and
deeper way to current technology, analytics, and big data. Existing technology
collects specific data to produce related metrics and patterns over time,
however, that data often lacks depth and accuracy. IoT improves this by
observing more behaviors and analyzing them differently.
·
This leads to more information and detail, which delivers more
reliable metrics and patterns.
·
It allows organizations to better analyze and respond to customer
needs or preferences.
·
It improves business productivity and strategy,
and improves the consumer experience by only delivering relevant content
and solutions.

Current
advertising suffers from excess and poor targeting. Even with today's
analytics, modern advertising fails. IoT promises different and personalized
advertising rather than one-size-fitsall strategies.
It transforms advertising from noise to a practical part of life because
consumers interact with advertising through IoT rather than simply receiving
it. This makes advertising more functional and useful to people searching the
marketplace for solutions or wondering if those solutions exist.
At every
layer of transportation, IoT provides improved communication, control, and data
distribution. These applications include personal vehicles, commercial
vehicles, trains, UAVs, and other equipment. It extends throughout the entire
system of all transportation elements such as traffic control, parking, fuel
consumption, and more.
The
primary concerns of traffic are managing congestion, reducing accidents, and
parking. IoT allows us to better observe and analyze the flow of traffic through
devices at all traffic observation points. It aids in parking by making storage
flow transparent when current methods offer little if any data.

This smart
road sign receives data and modifications to better inform drivers and prevent
congestion or accidents.
Accidents
typically result from a number of factors, however,
traffic management impacts their frequency. Construction sites, poor rerouting,
and a lack of information about traffic status are all issues that lead to
incidents. IoT provides solutions in the form of better information sharing
with the public, and between various parties directly affecting road traffic.
Many in
the automotive industry envision a future for cars in which IoT technology
makes cars “smart,” attractive options equal to MRT. IoT offers few significant
improvements to personal vehicles. Most benefits come from better control over
related infrastructure and the inherent flaws in automobile transport; however,
IoT does improve personal vehicles as personal spaces. IoT brings the same
improvements and customization to a vehicle as those in the home.
Transportation
benefits extend to business and manufacturing by optimizing the transport arm
of organizations. It reduces and eliminates problems related to poor fleet
management through better analytics and control such as monitoring idling, fuel
consumption, travel conditions, and travel time between points. This results in
product transportation operating more like an aligned service and less like a
collection of contracted services.
Consumers
benefit personally and professionally from the optimization and data analysis
of IoT. IoT technology behaves like a team of personal assistants, advisors,
and security. It enhances the way we live, work, and play.
IoT takes the place of a full staff −
·
Butler − IoT waits for you to
return home, and ensures your home remains fully prepared. It monitors your
supplies, family, and the state of your home. It takes actions to resolve any
issues that appear.
·
Chef − An IoT kitchen
prepares meals or simply aids you in preparing them.
·
Nanny − IoT can somewhat act
as a guardian by controlling access, providing supplies, and alerting the
proper individuals in an emergency.
·
Gardner − The same IoT systems
of a farm easily work for home landscaping.
·
Repairman − Smart systems
perform key maintenance and repairs, and also request
them.
·
Security Guard −
IoT watches over you 24/7. It can observe suspicious individuals
miles away, and recognize the potential of minor equipment problems to become
disasters well before they do.

This smart, connected stove from Whirlpool allows two different
heat settings on the same surface, remote monitoring, and remote control.
A smart
office or other workspace combines customization of the work environment with
smart tools. IoT learns about you, your job, and the way you work to deliver an
optimized environment. This results in practical accommodations like adjusting
the room temperature, but also more advanced benefits like modifying your
schedule and the tools you use to increase your output and reduce your work
time. IoT acts as a manager and consultant capable of seeing what you cannot.
IoT learns as much about you
personally as it does professionally. This enables the technology to support
leisure −
·
Culture and Night Life −
IoT can analyze your real-world activities and response to guide you in finding
more of the things and places you enjoy such as recommending restaurants and
events based on your preferences and experiences.
·
Vacations − Planning and
saving for vacations proves difficult for some, and many utilize agencies,
which can be replaced by IoT.
·
Products and Services −
IoT offers better analysis of the products you like and need than current
analytics based on its deeper access. It integrates with key information like
your finances to recommend great solutions.
Every connected device creates
opportunities for attackers. These vulnerabilities are broad, even for a single
small device. The risks posed include data transfer, device access,
malfunctioning devices, and always-on/always-connected devices.
The main challenges in
security remain the security limitations associated with producing low cost
devices, and the growing number of devices which creates more opportunities for
attacks.
The
definition of a secured device spans from the simplest measures to
sophisticated designs. Security should be thought of as a spectrum of
vulnerability which changes over time as threats evolve.
Security
must be assessed based on user needs and implementation. Users must recognize
the impact of security measures because poorly designed security creates more
problems than it solves.
Example − A German report revealed hackers compromised the
security system of a steel mill. They disrupted the control systems, which
prevented a blast furnace from being shut down properly, resulting in massive
damage. Therefore, users must understand the impact of an attack before
deciding on appropriate protection.
Beyond costs and the ubiquity of
devices, other security issues plague IoT −
·
Unpredictable Behavior −
The sheer volume of deployed devices and their long list of enabling
technologies means their behavior in the field can be unpredictable. A specific
system may be well designed and within administration control, but there are no
guarantees about how it will interact with others.
·
Device Similarity −
IoT devices are fairly uniform. They utilize the same
connection technology and components. If one system or device suffers from a
vulnerability, many more have the same issue.
·
Problematic Deployment −
One of the main goals of IoT remains to place advanced networks and analytics
where they previously could not go. Unfortunately, this creates the problem of
physically securing the devices in these strange or easily accessed places.
·
Long Device Life and Expired Support −
One of the benefits of IoT devices is longevity, however, that long life also
means they may outlive their device support. Compare this to traditional
systems which typically have support and upgrades long after many have stopped
using them. Orphaned devices and abandonware lack the same security hardening
of other systems due to the evolution of technology over time.
·
No Upgrade Support −
Many IoT devices, like many mobile and small devices, are not designed to allow
upgrades or any modifications. Others offer inconvenient upgrades, which many
owners ignore, or fail to notice.
·
Poor or No Transparency −
Many IoT devices fail to provide transparency with regard to
their functionality. Users cannot observe or access their processes,
and are left to assume how devices behave. They have no control over
unwanted functions or data collection; furthermore, when a manufacturer updates
the device, it may bring more unwanted functions.
·
No Alerts − Another goal
of IoT remains to provide its incredible functionality without being obtrusive.
This introduces the problem of user awareness. Users do not monitor the devices
or know when something goes wrong. Security breaches can persist over long
periods without detection.
IoT
devices collect data about their environment, which includes people. These
benefits introduce heavy risk. The data itself does not present the danger,
however, its depth does. The highly detailed data collection paints a very
clear picture of an individual, giving criminals all the
information they need to take advantage of someone.
People
may also not be aware of the level of privacy; for example, entertainment
devices may gather A/V data, or “watch” a consumer, and share intimate
information. The demand and price for this data exacerbates the issue
considering the number and diversity of parties interested in sensitive data.
Problems
specific to IoT technology lead to many of its privacy issues, which primarily
stem from the user's inability to establish and control privacy –
The
traditional model for “notice and consent” within connected systems generally
enforces existing privacy protections. It allows users to interact with privacy
mechanisms, and set preferences typically through
accepting an agreement or limiting actions. Many IoT devices have no such
accommodations. Users not only have no control, but they are also not afforded
any transparency regarding device activities.
Users
have normal expectations for privacy in certain situations. This comes from the
commonly accepted idea of public and private spaces; for example, individuals
are not surprised by surveillance cameras in commercial spaces, however, they
do not expect them in their personal vehicle. IoT devices challenge these norms
people recognize as the “right to be left alone.” Even in public spaces, IoT
creeps beyond the limits of expected privacy due to its power.
Modern
big data poses a substantial threat to privacy, but IoT compounds the issue
with its scale and intimacy. It goes not only where passive systems cannot, but
it collects data everywhere. This supports creation of highly detailed profiles
which facilitate discrimination and expose individuals to physical, financial,
and reputation harm.
The
growth of IoT normalizes it. Users become comfortable with what they perceive
as safe technology. IoT also lacks the transparency that warns users in
traditional connected systems; consequently, many act
without any consideration for the potential consequences.
The
security flaws of IoT and its ability to perform certain tasks open the door to
any associated liability. The three main areas of concern are device
malfunction, attacks, and data theft. These issues can result in a wide variety
of damages.
IoT
introduces a deeper level of automation which can have control over critical
systems, and systems impacting life and property. When these systems fail or
malfunction, they can cause substantial damage; for example, if an IoT furnace
control system experiences a glitch, it may fail in an unoccupied home and
cause frozen pipes and water damage. This forces organizations to create
measures against it.

This smart thermostat allows attackers to gain remote access, and breach the rest of the network.
IoT devices expose an entire
network and anything directly impacted to the risk of attacks. Though those
connections deliver powerful integration and productivity, they also create the
perfect opportunity for mayhem like a hacked stove or fire safety sprinkler
system. The best measures against this address the most vulnerable points, and provide custom protections such as monitoring
and access privileges.
Some of the most effective measures
against attacks prove simple −
·
Built-in Security −
Individuals and organizations should seek hardened devices, meaning those with
security integrated in the hardware and firmware.
·
Encryption − It must be
implemented by the manufacturer and through user systems.
·
Risk Analysis − Organizations
and individuals must analyze possible threats in designing their systems or
choosing them.
·
Authorization − Devices,
whenever possible, must be subject to privilege policies and access methods.
Data,
IoT's strength and weakness, proves irresistible to many. These individuals
have a number of reasons for their interest −
the value of personal data to marketing/advertising, identity theft, framing
individuals for crimes, stalking, and a bizarre sense of satisfaction. Measures
used to fight attacks are also effective in managing this threat.