INTERNET OF THINGS1Table of ContentsIntroduction................................................................................................................................2Benefits and Risks of Internet of Things....................................................................................3Conclusion................................................................................................................................10Bibliography.............................................................................................................................11
INTERNET OF THINGS2IntroductionThe internet of things technology connected various devices with each other, through a singleinternet system, which allow them in collecting and sharing of data with each other. The IoTtechnology convergence two distinct devices, it assists in improving the competence,accuracy, and advantage of such equipment. Each IoT device has a unique identity whichallows them to connect through a single internet infrastructure; the users can control IoTdevices remotely through the internet infrastructure. The IoT technology improves theusability and efficiency of everyday tools, but there are several security threats in using IoTdevices. The devices are vulnerable towards cyber-attacks, data analytics, and hackingbecause there is lack of proper security measures. This essay will focus on advantages ofimplementing IoT technology into everyday products, and it will provide various examples ofproducts using IoT technology. Further, the essay will discuss multiple real-life case studiesof companies which has to succeed and failed in IoT technology implementation and providesuggestions for improving cybersecurity.
INTERNET OF THINGS3Benefits and Risks of Internet of Things The concept of the internet of things (IoT) was first introduced by Kevin Ashton at MIT’sAutoID lab, in the early 2000s1; the idea was simple but powerful. Ashton provided that allobjects used in daily life were equipped with a wireless network, these objects cancommunicate with each other, and the computers can control them. Ashton stated thateveryday object collect data from us without our help and it could assist in the reduction ofwastage, loss, and cost. The RFID and sensor technology can be used in the objects throughthe computer to observe and identify the world without the requirement of human-entereddata. The IoT devise are connected through a single network, and they use sensors to collectthe data and then share it with other devices. Currently, many obstacles are removed from theway of IoT technology, for example, IPv6 allows billions of devices to connect andcommunicate with networks which were not possible previously. As per the study conductedby ABI Research, more than 18 billion wireless chips will be ship by companies from 2015 to20192. As per the research of Cisco, more than 50 billion objects will be connected throughIoT technology by 20203.Many experts believe that IoT technology has brought various benefits to the convergenceand convenience, but there are several potential risks in using IoT technology, the companiescan adopt multiple security measures to protect IoT devices form cyber-attacks4. Theconvergence of technology means coming together of two distinct technologies in a singledevice; the devices are deeply integrated with each other, so they can send and receive datawith each other5. Primarily, IoT connects devices which are daily used by the peoples. Thereare several companies which use IoT technology to improve the working and efficiency ofdaily use devices. Many corporations such as Nest, Amazon, and Philips, are popular forcreating smart home devices which improve the usability and efficiency of everyday objects.1 K. Ashton, ‘That ‘internet of things’ thing.’RFiD Journal22.7 (2011).2 ABI Research, “Wi-Fi Chipset Shipments will near 18 Billion Chipsets during the Next Five Years.” [website],2014, https://www.abiresearch.com/press/wi-fi-chipset-shipments-will-near-18-billion-chips/, (accessed 27 October 2014).3 R. Bogue, "Towards the trillion sensors market,"Sensor Review34.2 (2014): 137-142.4 L. Atzori, A. Iera, and G. Morabito, "The internet of things: A survey."Computer networks54.15 (2010): 2787-2805.5 J. Soldatos, M. Serrano, and M. Hauswirth, "Convergence of utility computing with the internet-of-things."Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2012 Sixth International Conference on. IEEE, 2012.
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
Assignment on Cyber Crimelg...
|15
|4799
|77
Internet of Things Security Threatslg...
|14
|3518
|36
Security Risks and Issues in IoT Technologylg...
|7
|3094
|74
Internet of Things Technologylg...
|11
|2627
|81
IoT and Cyber Securitylg...
|15
|4234
|395
Analyzing The Security Challenges of IoT Deviceslg...