Benefits and Security Issues of IoT in Farming - Synthesis Matrix
VerifiedAdded on 2023/06/04
|3
|1178
|313
AI Summary
This synthesis matrix discusses the benefits and security issues of IoT in farming. It includes insights from Kamilaris, Ryu, Bandyopadhyay, and Aazam. The benefits of IoT in farming include easier data exchange, increased automation, and interoperability. However, there are also security and privacy concerns that need to be addressed. The sources used in this matrix are Kamilaris et al. (2016), Ryu et al. (2015), Bandyopadhyay and Sen (2011), and Aazam et al. (2014).
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
ITECH 5500
Tutorial-Workshop 08
PART A
a) Synthesis Matrix
My research topic/question: _Application of IoT in Farming
Kamilaris Ryu Bandyopadhyay Aazam
Benefits of
IoT in
Farming
All IoT devices
including
sensors and
controllers
have to be
connected with
the &Cube, and
then the
&Cube could
register them
into the
Mobius
through the
REST APIs (p.
447)
all the
interfaces used
in the
smartphone
application are
REST APIs
provided the
Mobius.
(p. 446)
end users can
monitor and
control their
connected farm
using IoT
applications on
their
smartphones or
tablets by
accessing
virtual
representation
of the devices
resided in the
Mobius (p.
IoT frameworks
for smart farming
can bring various
benefits, including
reducing the risk of
vendor lock-in,
adopting
machinery and
sensing/automation
systems from
different
companies, as
these could
become easily
interoperable in the
overall farm’s
smart system,
easier data
exchange among
different,
heterogeneous
components,
increased
automation with
less effort by
employing internet
standard (p. 2)
To semantically
annotate data
streams, Agri-IoT
uses lightweight
information
models developed
on top of
wellknown
models, such as the
SSN and OWL-
ontologies (p. 3)
- -
[You need to work on the Tutorial-Workshop during the Tutorial-Workshop class and
participate in a controlled discussion as directed. Finally, you also need to update and submit
the completed Tutorial-Workshop (both parts) into the Week 8 Tutorial-Workshop
submission link by Week 8 Sunday 11:55 pm.]
Tutorial-Workshop 08
PART A
a) Synthesis Matrix
My research topic/question: _Application of IoT in Farming
Kamilaris Ryu Bandyopadhyay Aazam
Benefits of
IoT in
Farming
All IoT devices
including
sensors and
controllers
have to be
connected with
the &Cube, and
then the
&Cube could
register them
into the
Mobius
through the
REST APIs (p.
447)
all the
interfaces used
in the
smartphone
application are
REST APIs
provided the
Mobius.
(p. 446)
end users can
monitor and
control their
connected farm
using IoT
applications on
their
smartphones or
tablets by
accessing
virtual
representation
of the devices
resided in the
Mobius (p.
IoT frameworks
for smart farming
can bring various
benefits, including
reducing the risk of
vendor lock-in,
adopting
machinery and
sensing/automation
systems from
different
companies, as
these could
become easily
interoperable in the
overall farm’s
smart system,
easier data
exchange among
different,
heterogeneous
components,
increased
automation with
less effort by
employing internet
standard (p. 2)
To semantically
annotate data
streams, Agri-IoT
uses lightweight
information
models developed
on top of
wellknown
models, such as the
SSN and OWL-
ontologies (p. 3)
- -
[You need to work on the Tutorial-Workshop during the Tutorial-Workshop class and
participate in a controlled discussion as directed. Finally, you also need to update and submit
the completed Tutorial-Workshop (both parts) into the Week 8 Tutorial-Workshop
submission link by Week 8 Sunday 11:55 pm.]
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
ITECH 5500
Tutorial-Workshop 08
443)
Security
issues in
using IoT in
farming
- - For such tags,
information is
centralized in
the tags, while
the value
resides in the
communication
management to
ensure security
and effective
synchronization
with the
network (p. 50)
privacy-
preserving
technology is
still in its
infancy: the
systems that do
work are not
designed for
resource-
restricted
devices, and a
holistic view on
privacy is still
to be developed
(e.g., the view
on privacy
throughout
one’s life). (53)
Data security
would be an
issue on IoT
side as well as
on cloud side.
Similarly, in
terms of
privacy, more
concern would
be there. (p. 4)
It will also
help in
efficient
utilization of
power. For this
purpose, the
gateway
device,
connecting IoT
to the cloud,
should be
having extra
functionality
to do a little
processing
before sending
it to the
Internet and
eventually to
the cloud (p. 5)
Sources:
Kamilaris, A., Gao, F., Prenafeta-Boldú, F.X. and Ali, M.I., 2016, December. Agri-IoT: A
semantic framework for Internet of Things-enabled smart farming applications. In Internet
of Things (WF-IoT), 2016 IEEE 3rd World Forum on (pp. 442-447). IEEE.
Ryu, M., Yun, J., Miao, T., Ahn, I.Y., Choi, S.C. and Kim, J., 2015, November. Design
and implementation of a connected farm for smart farming system. In SENSORS, 2015
IEEE (pp. 1-4). IEEE.
Bandyopadhyay, D. and Sen, J., 2011. Internet of things: Applications and challenges in
technology and standardization. Wireless Personal Communications, 58(1), pp.49-69.
Aazam, M., Khan, I., Alsaffar, A.A. and Huh, E.N., 2014, January. Cloud of Things:
Integrating Internet of Things and cloud computing and the issues involved. In Applied
Sciences and Technology (IBCAST), 2014 11th International Bhurban Conference on (pp.
414-419). IEEE.
[You need to work on the Tutorial-Workshop during the Tutorial-Workshop class and
participate in a controlled discussion as directed. Finally, you also need to update and submit
the completed Tutorial-Workshop (both parts) into the Week 8 Tutorial-Workshop
submission link by Week 8 Sunday 11:55 pm.]
Tutorial-Workshop 08
443)
Security
issues in
using IoT in
farming
- - For such tags,
information is
centralized in
the tags, while
the value
resides in the
communication
management to
ensure security
and effective
synchronization
with the
network (p. 50)
privacy-
preserving
technology is
still in its
infancy: the
systems that do
work are not
designed for
resource-
restricted
devices, and a
holistic view on
privacy is still
to be developed
(e.g., the view
on privacy
throughout
one’s life). (53)
Data security
would be an
issue on IoT
side as well as
on cloud side.
Similarly, in
terms of
privacy, more
concern would
be there. (p. 4)
It will also
help in
efficient
utilization of
power. For this
purpose, the
gateway
device,
connecting IoT
to the cloud,
should be
having extra
functionality
to do a little
processing
before sending
it to the
Internet and
eventually to
the cloud (p. 5)
Sources:
Kamilaris, A., Gao, F., Prenafeta-Boldú, F.X. and Ali, M.I., 2016, December. Agri-IoT: A
semantic framework for Internet of Things-enabled smart farming applications. In Internet
of Things (WF-IoT), 2016 IEEE 3rd World Forum on (pp. 442-447). IEEE.
Ryu, M., Yun, J., Miao, T., Ahn, I.Y., Choi, S.C. and Kim, J., 2015, November. Design
and implementation of a connected farm for smart farming system. In SENSORS, 2015
IEEE (pp. 1-4). IEEE.
Bandyopadhyay, D. and Sen, J., 2011. Internet of things: Applications and challenges in
technology and standardization. Wireless Personal Communications, 58(1), pp.49-69.
Aazam, M., Khan, I., Alsaffar, A.A. and Huh, E.N., 2014, January. Cloud of Things:
Integrating Internet of Things and cloud computing and the issues involved. In Applied
Sciences and Technology (IBCAST), 2014 11th International Bhurban Conference on (pp.
414-419). IEEE.
[You need to work on the Tutorial-Workshop during the Tutorial-Workshop class and
participate in a controlled discussion as directed. Finally, you also need to update and submit
the completed Tutorial-Workshop (both parts) into the Week 8 Tutorial-Workshop
submission link by Week 8 Sunday 11:55 pm.]
ITECH 5500
Tutorial-Workshop 08
PART B
1. Now do some test-testing on paraphrasing and also referencing
The following quote is taken from the text book Business Driven Information Systems
written by Paige Baltzan, Amy Phillips, Kathy Lynch, and Peter Blakey, published in
2010, page 258, published by McGraw-Hill Australia Pty Ltd, North Ryde, NSW,
Australia.
a. What in-text reference should appear at the end of this quote?
(Baltzan et al. 2010, p. 258
b. Write down the matching item for the Reference list
Business driven information system in banking industries
c. Paraphrase the quote keeping the author’s meaning, but using
different words.
There are four major banks in Australia among which, Westpac Financial Services (WFS)
is the one that has their own database. The easy access and efficient information
management of the stored data and information can be delivered through the availability
of own database. However, the organization fails to develop information-capturing
standards that could possibly lead to the inconsistency in the collection of information
related to the organization. An example can be introduced for explaining this situation
such as one of the systems might be able to capture the emails however, other might not be
able to capture. There is the possibility of redundancy in the customer list being captured
in two different databases that could possibly lead to the chaos I the functioning and
operating of the banks. This could also allow the consumers to have different accounts
with same name in the bank and could possibly lead to forgery actions such as accessing
one account for life insurance and other one for credit cards. It will be untraceable for the
WFS to identify the same person having two bank accounts in the bank. Since, the
competition was raising, it was the need for WFS to adopt strategies to mitigate these
issues and assure quality of services to the consumers. NADIS (Name & Address Data
Integrity Software) has been installed within the existing system of the WFS that was
capable of providing services such as filters customer information, highlighting missing,
inaccurate and redundant information. This led to the bank to be competitive among its
competitors and has been operating single database through an overview at every
consumer (Baltzan et al. 2010, p. 258).
d. Give an appropriate title to the given paragraph.
The transformation of WFS database system
[You need to work on the Tutorial-Workshop during the Tutorial-Workshop class and
participate in a controlled discussion as directed. Finally, you also need to update and submit
the completed Tutorial-Workshop (both parts) into the Week 8 Tutorial-Workshop
submission link by Week 8 Sunday 11:55 pm.]
Tutorial-Workshop 08
PART B
1. Now do some test-testing on paraphrasing and also referencing
The following quote is taken from the text book Business Driven Information Systems
written by Paige Baltzan, Amy Phillips, Kathy Lynch, and Peter Blakey, published in
2010, page 258, published by McGraw-Hill Australia Pty Ltd, North Ryde, NSW,
Australia.
a. What in-text reference should appear at the end of this quote?
(Baltzan et al. 2010, p. 258
b. Write down the matching item for the Reference list
Business driven information system in banking industries
c. Paraphrase the quote keeping the author’s meaning, but using
different words.
There are four major banks in Australia among which, Westpac Financial Services (WFS)
is the one that has their own database. The easy access and efficient information
management of the stored data and information can be delivered through the availability
of own database. However, the organization fails to develop information-capturing
standards that could possibly lead to the inconsistency in the collection of information
related to the organization. An example can be introduced for explaining this situation
such as one of the systems might be able to capture the emails however, other might not be
able to capture. There is the possibility of redundancy in the customer list being captured
in two different databases that could possibly lead to the chaos I the functioning and
operating of the banks. This could also allow the consumers to have different accounts
with same name in the bank and could possibly lead to forgery actions such as accessing
one account for life insurance and other one for credit cards. It will be untraceable for the
WFS to identify the same person having two bank accounts in the bank. Since, the
competition was raising, it was the need for WFS to adopt strategies to mitigate these
issues and assure quality of services to the consumers. NADIS (Name & Address Data
Integrity Software) has been installed within the existing system of the WFS that was
capable of providing services such as filters customer information, highlighting missing,
inaccurate and redundant information. This led to the bank to be competitive among its
competitors and has been operating single database through an overview at every
consumer (Baltzan et al. 2010, p. 258).
d. Give an appropriate title to the given paragraph.
The transformation of WFS database system
[You need to work on the Tutorial-Workshop during the Tutorial-Workshop class and
participate in a controlled discussion as directed. Finally, you also need to update and submit
the completed Tutorial-Workshop (both parts) into the Week 8 Tutorial-Workshop
submission link by Week 8 Sunday 11:55 pm.]
1 out of 3
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.