The Internet of things (IoT) is the extension of Internet connectivity into physical devices and everyday objects. Embedded with electronics, Internet connectivity, and other forms of hardware (such as sensors), these devices can communicate and interact with others over the Internet, and they can be remotely monitored and controlled.
The definition of the Internet of things has evolved due to the convergence of multiple technologies, real-time analytics, machine learning, commodity sensors, and embedded systems.[5] Traditional fields of embedded systems, wireless sensor networks, control systems, automation (including home and building automation),
and others all contribute to enabling the Internet of things. In the
consumer market, IoT technology is most synonymous with products
pertaining to the concept of the "smart home", covering devices and
appliances (such as lighting fixtures, thermostats, home security
systems and cameras, and other home appliances) that support one or more
common ecosystems, and can be controlled via devices associated with
that ecosystem, such as smartphones and smart speakers.
The IoT concept has faced prominent criticism, especially in regards to privacy and security concerns related to these devices and their intention of pervasive presence.
⠂History
concept of a network of smart devices was discussed as early as 1982, with a modified Coke vending machine at Carnegie Mellon University becoming the first Internet-connected appliance,[6] able to report its inventory and whether newly loaded drinks were cold or not.[7]Mark Weiser's 1991 paper on ubiquitous computing,
"The Computer of the 21st Century", as well as academic venues such as
UbiComp and PerCom produced the contemporary vision of the IoT.[8][9] In 1994, Reza Raji described the concept in IEEE Spectrum
as "[moving] small packets of data to a large set of nodes, so as to
integrate and automate everything from home appliances to entire
factories".[10] Between 1993 and 1997, several companies proposed solutions like Microsoft's at Work or Novell's NEST. The field gained momentum when Bill Joy envisioned device-to-device communication as a part of his "Six Webs" framework, presented at the World Economic Forum at Davos in 1999.[11]
The term "Internet of things" was likely coined by Kevin Ashton of Procter & Gamble, later MIT's Auto-ID Center, in 1999,[12] though he prefers the phrase "Internet for things".[13] At that point, he viewed Radio-frequency identification (RFID) as essential to the Internet of things,[14] which would allow computers to manage all individual things.[15][16][17] A research article mentioning the Internet of Things was submitted to the conference for Nordic Researchers in Norway, in June 2002,[18] which was preceded by an article published in Finnish in January 2002.[19] The implementation described there was developed by Kary Främling and his team at Helsinki University of Technology and more closely matches the modern one, i.e. an information system infrastructure for implementing smart, connected objects.[20] Defining the Internet of things as "simply the point in time when
more 'things or objects' were connected to the Internet than people", Cisco Systems
estimated that the IoT was "born" between 2008 and 2009, with the
things/people ratio growing from 0.08 in 2003 to 1.84 in 2010.
Connected devices are part of a scenario in which every device talks
to other related devices in an environment to automate home and
industry tasks, and to communicate usable sensor data
to users, businesses and other interested parties. IoT devices are
meant to work in concert for people at home, in industry or in the
enterprise. As such, the devices can be categorized into three main
groups: consumer, enterprise and industrial.
Consumer connected devices include smart TVs, smart speakers, toys, wearables and smart appliances. Smart meters, commercial security systems and smart city
technologies -- such as those used to monitor traffic and weather
conditions -- are examples of industrial and enterprise IoT devices.
Other technologies, including smart air conditioning, smart thermostats,
smart lighting and smart security, span home, enterprise and industrial
uses. In a smart home,
for example, a user arrives home and his car communicates with the
garage to open the door. Once inside, the thermostat is already adjusted
to his preferred temperature, and the lighting is set to a lower
intensity and his chosen color for relaxation, as his pacemaker data
indicates it has been a stressful day. In the enterprise, smart sensors located in a conference room can
help an employee locate and schedule an available room for a meeting,
ensuring the proper room type, size and features are available. When
meeting attendees enter the room, the temperature will adjust according
to the occupancy, and the lights will dim as the appropriate PowerPoint
loads on the screen and the speaker begins his presentation.
On a plant floor, an assembly line machine outfitted with sensors
will provide sensor data to the plant operator, informing her of
anomalies and predicting when parts will need to be replaced. Such
information can prevent unexpected downtime, along with lost
productivity and profits. In the field, such notifications can alert users to what is wrong,
as well as the parts needed to fix a problem, preventing the need to
send a field service worker out to diagnose an issue, only to waste her
time driving to a warehouse, finding the correct part and returning to
the site.
IoT device management
A number of challenges can hinder the successful deployment of an
IoT system and its connected devices, including security,
interoperability, power/processing capabilities, scalability and
availability. Many of these can be addressed with IoT device management
either by adopting standard protocols or using services offered by a
vendor. Device management helps companies integrate, organize, monitor and
remotely manage internet-enabled devices at scale, offering features
critical to maintaining the health, connectivity and security of the IoT
devices along their entire lifecycles. Such features include:
Device registration
Device authentication/authorization
Device configuration
Device provisioning
Device monitoring and diagnostics
Device troubleshooting
Available standardized device management protocols include the Open
Mobile Alliance's Device Management (OMA DM) and Lightweight
Machine-to-Machine (OMA LwM2M). IoT device management services and software are also available from
vendors including Amazon, Bosch Software Innovations GmbH, Microsoft,
Software AG and Xively.
IoT device connectivity and networking
The networking, communication and connectivity protocols used with
internet-enabled devices largely depend on the specific IoT application
deployed. Just as there are many different IoT applications, there are
many different connectivity and communications options. Communications protocols include CoAP, DTLS and MQTT, among others. Wireless protocols include IPv6, LPWAN, Zigbee, Bluetooth Low Energy, Z-Wave, RFID and NFC. Cellular, satellite, Wi-Fi and Ethernet can also be used. Each option has its tradeoffs in terms of power consumption, range
and bandwidth, all of which must be considered when choosing connected
devices and protocols for a particular IoT application. To share the sensor data they collect, IoT devices connect to an IoT gateway or another edge device where data can either be analyzed locally or sent to the cloud for analysis.
IoT device security
The interconnection of traditionally dumb devices raises a number of
questions in relation to security and privacy. As if often the case,
IoT technology has moved more quickly than the mechanisms available to
safeguard the devices and their users. Researchers have already demonstrated remote hacks on pacemakers and
cars, and, in October 2016, a large distributed denial-of-service
attack dubbed Mirai affected DNS servers on the east coast of the United
States, disrupting services worldwide -- an issue traced back to
hackers infiltrating networks through IoT devices, including wireless
routers and connected cameras. However, safeguarding IoT devices and the networks they connect to
can be challenging due to the variety of devices and vendors, as well as
the difficulty of adding security to resource-constrained devices. In
the case of the Mirai botnet, the problem was traced back to the use of
default passwords on the hacked devices. Strong passwords,
authentication/authorization and identity management, network
segmentation, encryption, and cryptography are all suggested IoT
security measures. Concerned by the dangers posed by the rapidly growing IoT attack surface, the FBI released the public service announcement FBI Alert Number I-091015-PSA in September 2015, which is a document outlining the risks of IoT devices, as well as protections and defense recommendations. In August 2017, the U.S. Senate introduced the IoT Cybersecurity
Improvement Act, a bill addressing security issues associated with IoT
devices. While it is a start, the bill only requires internet-enabled
devices purchased by the federal government to meet minimum
requirements, not the industry as a whole. However, it is being viewed
as a starting point which, if adopted across the board, could pave the
way to better IoT security industry-wide.
IoT device trends and anticipated growth
Gartner estimated the total number of IoT devices in use to have
reached 8.4 billion in 2017, a 31% increase over 2016. And the
estimations for future growth of IoT devices have been fast and furiouramu
wow............
ReplyDeletetry best
better next time
b.madan
Deletegood..
ReplyDeletevery usefull
Thnks
DeleteThank you for sharing such a useful article. I had a great time. This article was fantastic to read. Continue to publish more articles on
ReplyDeleteData Engineering Services
AI Services