IoT: Challenges, Applications, and Future Research Report
VerifiedAdded on 2021/06/18
|35
|8516
|1832
Report
AI Summary
This report provides a comprehensive overview of the Internet of Things (IoT), exploring its various facets. It begins with an introduction to IoT, defining its components and potential impact, followed by a literature review covering the history of IoT, its diverse applications across infrastructure, enterprise, and consumer sectors. The report delves into critical privacy and security concerns, examining traditional governance structures and the challenges governments face. It highlights challenges and solutions related to security, including end-user agreements and privacy policies. Furthermore, the report discusses future research directions, advantages, and disadvantages of IoT, and concludes with a summary of the key findings and references for further study. The report emphasizes the importance of addressing privacy and security concerns to ensure the responsible and widespread adoption of IoT technologies.

IoT
INTERNET OF THINGS
INTERNET OF THINGS
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

IOT
ABSTRACT
Internet of Things is a boon for the world, in multiple dimensions. As going with the
saying of ‘Technology is a double edged sword’, the same technology is associated with several
challenges that the world can face. The overall understanding of the Internet of Things is a key as
well as the concern for the entire world. The advantages are numerous and challenges are also
numerous and the concern of the governments and organizations has more focus on higher level
control rather than keep solving the issues arise at lower levels. The major concerns are privacy
and security for the Internet of Things, as it stands as higher priority for the governments to
ensure that the society keeps moving in a normal pace with making no new disturbances. The
government policies and standards are required and should be in synchronizing with the
advantages of the Internet of Things, technical feasibilities, without minimizing the potential
features and benefits of it. And it is a big challenge for the policy makers in the government.
ABSTRACT
Internet of Things is a boon for the world, in multiple dimensions. As going with the
saying of ‘Technology is a double edged sword’, the same technology is associated with several
challenges that the world can face. The overall understanding of the Internet of Things is a key as
well as the concern for the entire world. The advantages are numerous and challenges are also
numerous and the concern of the governments and organizations has more focus on higher level
control rather than keep solving the issues arise at lower levels. The major concerns are privacy
and security for the Internet of Things, as it stands as higher priority for the governments to
ensure that the society keeps moving in a normal pace with making no new disturbances. The
government policies and standards are required and should be in synchronizing with the
advantages of the Internet of Things, technical feasibilities, without minimizing the potential
features and benefits of it. And it is a big challenge for the policy makers in the government.

IOT
Contents
INTERNET OF THINGS....................................................................................................5
INTRODUCTION...............................................................................................................5
LITERATURE REVIEW............................................................................................................7
History.........................................................................................................................................7
Applications.................................................................................................................................8
Infrastructure................................................................................................................8
Enterprise.....................................................................................................................8
Consumer.....................................................................................................................8
Privacy and Security Concerns....................................................................................................9
Traditional Structures of Governance........................................................................................10
Privacy.......................................................................................................................................11
Security......................................................................................................................................15
Security and Privacy Internet of Things Regime.......................................................................17
Challenges and Opportunities with Adoption of IoT, by the Governments..............................19
CHALLENGES AND SOLUTIONS................................................................................19
Security Solutions......................................................................................................................20
End-User Agreements and Privacy Policies for IoT Devices....................................................20
FUTURE RESEARCH......................................................................................................26
ADVANTAGES AND DISADVANTAGES.....................................................................28
Advantages................................................................................................................................28
Disadvantages............................................................................................................................28
CONCLUSION..................................................................................................................29
Contents
INTERNET OF THINGS....................................................................................................5
INTRODUCTION...............................................................................................................5
LITERATURE REVIEW............................................................................................................7
History.........................................................................................................................................7
Applications.................................................................................................................................8
Infrastructure................................................................................................................8
Enterprise.....................................................................................................................8
Consumer.....................................................................................................................8
Privacy and Security Concerns....................................................................................................9
Traditional Structures of Governance........................................................................................10
Privacy.......................................................................................................................................11
Security......................................................................................................................................15
Security and Privacy Internet of Things Regime.......................................................................17
Challenges and Opportunities with Adoption of IoT, by the Governments..............................19
CHALLENGES AND SOLUTIONS................................................................................19
Security Solutions......................................................................................................................20
End-User Agreements and Privacy Policies for IoT Devices....................................................20
FUTURE RESEARCH......................................................................................................26
ADVANTAGES AND DISADVANTAGES.....................................................................28
Advantages................................................................................................................................28
Disadvantages............................................................................................................................28
CONCLUSION..................................................................................................................29
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

IOT
REFERENCES..................................................................................................................30
REFERENCES..................................................................................................................30
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

IOT
INTERNET OF THINGS
INTRODUCTION
The Internet of Things (IoT) is a global network made with physical devices, home
appliances, vehicles and several other items, all embedded with sensors, electronics, actuators,
connectivity and software, all by enabling such objects to exchange the data by connecting
altogether (Brown, 2016). Every individual piece has its unique identification, set by the
respective embedded computing system and still have the ability to inter-operate within the
internet infrastructure existing. The potential of total number of objects that have the capability
to access online by Internet of Things is estimated to be more than 30 million objects, by the year
2020 that can reach the value of Internet of Things global market to $7.1 trillion, estimated by
the same year.
The objective of development of Internet of Things is increase the capability of the
physical world and enable it to integrate into computer-based systems, with the ability to control
or sense remotely across the infrastructure of existing network and thereby improving the
accuracy and efficiency and also focus on opportunities to gain economic benefit, apart from
achieving reduced intervention of human being (Nordrum, 2016). With appropriate augmentation
of Internet of Things with actuators, sensors the technology can achieve an instance of more
cyber-physical system general class that can encompass various technologies, like smart cities,
smart grids, smart homes, virtual power plants and intelligent transportation.
INTERNET OF THINGS
INTRODUCTION
The Internet of Things (IoT) is a global network made with physical devices, home
appliances, vehicles and several other items, all embedded with sensors, electronics, actuators,
connectivity and software, all by enabling such objects to exchange the data by connecting
altogether (Brown, 2016). Every individual piece has its unique identification, set by the
respective embedded computing system and still have the ability to inter-operate within the
internet infrastructure existing. The potential of total number of objects that have the capability
to access online by Internet of Things is estimated to be more than 30 million objects, by the year
2020 that can reach the value of Internet of Things global market to $7.1 trillion, estimated by
the same year.
The objective of development of Internet of Things is increase the capability of the
physical world and enable it to integrate into computer-based systems, with the ability to control
or sense remotely across the infrastructure of existing network and thereby improving the
accuracy and efficiency and also focus on opportunities to gain economic benefit, apart from
achieving reduced intervention of human being (Nordrum, 2016). With appropriate augmentation
of Internet of Things with actuators, sensors the technology can achieve an instance of more
cyber-physical system general class that can encompass various technologies, like smart cities,
smart grids, smart homes, virtual power plants and intelligent transportation.

IOT
Figure 1: Basic Internet of Things Connectivity
‘Things’ is the most generalized word in Internet of Things, which is defined technically,
as ‘inextricable mixture of software, hardware, service and data’. And in general, the word
‘things’ may refer to any simple to advanced functioning object, like a simple mobile phone to
field operation devices, used in operations of search and rescue, by fire fighters, cameras that
stream live wild animals feeds, in coastal waters, heart monitoring implants, automobiles having
sensors built-in, biochip transponders used for farm animals, DNA analysis devices for
monitoring food, environment or pathogen (Chin-Lung et al, 2016). All these various kinds of
objects and devices collect data that is useful, through adapting various technologies existing and
the data is shared autonomously among the other devices.
Figure 1: Basic Internet of Things Connectivity
‘Things’ is the most generalized word in Internet of Things, which is defined technically,
as ‘inextricable mixture of software, hardware, service and data’. And in general, the word
‘things’ may refer to any simple to advanced functioning object, like a simple mobile phone to
field operation devices, used in operations of search and rescue, by fire fighters, cameras that
stream live wild animals feeds, in coastal waters, heart monitoring implants, automobiles having
sensors built-in, biochip transponders used for farm animals, DNA analysis devices for
monitoring food, environment or pathogen (Chin-Lung et al, 2016). All these various kinds of
objects and devices collect data that is useful, through adapting various technologies existing and
the data is shared autonomously among the other devices.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

IOT
The technology of Internet of Things is considered as contrary to RFID (Radio Frequency
Identification) technology, as it is considered as an information system infrastructure for
connected and smart objects implementation.
LITERATURE REVIEW
History
1982
The network concept with the objective of connecting smart devices was initiated, at
Carnegie Mellon University. The first internet connected appliance stands as modified coke
machine that gained capability to report details and data about the drinks loaded.
1991
A contemporary vision of Internet of Things was virtually conceived in UbiComp and
PerCom academic venues and ubiquitous computing seminal paper is introduced by Mark
Weiser.
1994
A concept in IEEE Spectrum was described by Reza Raji, as small data packets to a large
nodes set towards automation and integration of everything right at home to anything to entire
factories.
1999
The concept of Internet of Things is envisioned as communication between Device to
Device by Bill Joy, as part of the framework, ‘Six Webs’ and presented at Davos, in World
Economic Forum (Vermesan & Friess, 2013).
2004
The technology of Internet of Things is considered as contrary to RFID (Radio Frequency
Identification) technology, as it is considered as an information system infrastructure for
connected and smart objects implementation.
LITERATURE REVIEW
History
1982
The network concept with the objective of connecting smart devices was initiated, at
Carnegie Mellon University. The first internet connected appliance stands as modified coke
machine that gained capability to report details and data about the drinks loaded.
1991
A contemporary vision of Internet of Things was virtually conceived in UbiComp and
PerCom academic venues and ubiquitous computing seminal paper is introduced by Mark
Weiser.
1994
A concept in IEEE Spectrum was described by Reza Raji, as small data packets to a large
nodes set towards automation and integration of everything right at home to anything to entire
factories.
1999
The concept of Internet of Things is envisioned as communication between Device to
Device by Bill Joy, as part of the framework, ‘Six Webs’ and presented at Davos, in World
Economic Forum (Vermesan & Friess, 2013).
2004
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

IOT
The future interconnection environment thought model was proposed. The same thought
model envisioned the Internet of Things development trend.
Applications
The applications of Internet of Things is literally can be in each and every field in the
world, almost, as long as the things in such fields possess the ability to network by embedding
memory, power sources and memory in limited physical sizes (Brown, 2013).
Internet of Things has extensive applications. These applications can be categorized into
various categories however important categories are infrastructure, enterprise and consumer.
Infrastructure
The key application of infrastructure Internet of Things is to controlling monitoring of
rural and urban infrastructure, such as railway tracks, bridges, offshore wind farms.
Enterprise
Enterprise Internet of Things refers to interconnecting all the business related devices and
corporate settings (Santucci, N.D). The best example is media to study consumer habits and
marketing products accordingly.
Consumer
When the applications are considered for a common man and in consumer field, the
examples include interconnecting home automation, entertainment, car, connected health,
wearable technology, appliances like air purifiers, washer, ovens, dryers, freezers, refrigerators,
robotic vacuums and quantified self all enabled to be remote monitored using Wi-Fi.
The biggest segment of market for Internet of Things is by consumer, for transforming a
typical home environment to smart home in terms of accessibility of products used at home. So,
devices of Internet of Things are a larger part of domotics or home automation (Mattern &
The future interconnection environment thought model was proposed. The same thought
model envisioned the Internet of Things development trend.
Applications
The applications of Internet of Things is literally can be in each and every field in the
world, almost, as long as the things in such fields possess the ability to network by embedding
memory, power sources and memory in limited physical sizes (Brown, 2013).
Internet of Things has extensive applications. These applications can be categorized into
various categories however important categories are infrastructure, enterprise and consumer.
Infrastructure
The key application of infrastructure Internet of Things is to controlling monitoring of
rural and urban infrastructure, such as railway tracks, bridges, offshore wind farms.
Enterprise
Enterprise Internet of Things refers to interconnecting all the business related devices and
corporate settings (Santucci, N.D). The best example is media to study consumer habits and
marketing products accordingly.
Consumer
When the applications are considered for a common man and in consumer field, the
examples include interconnecting home automation, entertainment, car, connected health,
wearable technology, appliances like air purifiers, washer, ovens, dryers, freezers, refrigerators,
robotic vacuums and quantified self all enabled to be remote monitored using Wi-Fi.
The biggest segment of market for Internet of Things is by consumer, for transforming a
typical home environment to smart home in terms of accessibility of products used at home. So,
devices of Internet of Things are a larger part of domotics or home automation (Mattern &

IOT
Friess, N.D). Home user can achieve central control for all the domestically used devices and
products and majorly to provide assistance for elderly and disabled individuals at home.
Internet of Things has applications in other major industries, such as agriculture,
manufacturing, energy management, environmental monitoring, building & home automation,
metropolitan scale deployments, medical and healthcare, transportation (Solaimani et al, 2015).
Privacy and Security Concerns
Having explored numerous or near to unlimited applications of Internet of Things, the
concerns of privacy and security also become part of research, to ensure that the technology does
not end up the human and world.
According to Karen Renaud and Noura Aleisa, at the University of Glsgow, in their
recent study, they expressed the concern that the potential of Internet of Things for major
invasion of privacy is a major concern, as much of the research focused disproportionally, on the
concerns of security of Internet of Things (Singh et al, 2015). There are various proposed
solutions in terms of the deployed techniques and the extent to which privacy core principles are
satisfied. However, there are only a very few among them, turned to be satisfactory fully.
Investment director, Louis Basenese at Wall Street Daily has criticized the lack of attention to the
issues of security by the industry of the Internet of Things. According to it, despite alarming
hacks and high profile manufacturers of device remain undeterred, having their focus more on
profitability, rather than the security. However, the ultimate control should be owned by
consumers, for collection of data that includes the options of deleting it, in case they prefer to
choose (Lindener, 2015). Wide scale consumer adoption should not happen with no assurance of
privacy.
Friess, N.D). Home user can achieve central control for all the domestically used devices and
products and majorly to provide assistance for elderly and disabled individuals at home.
Internet of Things has applications in other major industries, such as agriculture,
manufacturing, energy management, environmental monitoring, building & home automation,
metropolitan scale deployments, medical and healthcare, transportation (Solaimani et al, 2015).
Privacy and Security Concerns
Having explored numerous or near to unlimited applications of Internet of Things, the
concerns of privacy and security also become part of research, to ensure that the technology does
not end up the human and world.
According to Karen Renaud and Noura Aleisa, at the University of Glsgow, in their
recent study, they expressed the concern that the potential of Internet of Things for major
invasion of privacy is a major concern, as much of the research focused disproportionally, on the
concerns of security of Internet of Things (Singh et al, 2015). There are various proposed
solutions in terms of the deployed techniques and the extent to which privacy core principles are
satisfied. However, there are only a very few among them, turned to be satisfactory fully.
Investment director, Louis Basenese at Wall Street Daily has criticized the lack of attention to the
issues of security by the industry of the Internet of Things. According to it, despite alarming
hacks and high profile manufacturers of device remain undeterred, having their focus more on
profitability, rather than the security. However, the ultimate control should be owned by
consumers, for collection of data that includes the options of deleting it, in case they prefer to
choose (Lindener, 2015). Wide scale consumer adoption should not happen with no assurance of
privacy.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

IOT
In a global surveillance post-Snowden world, more active interest is taken by the
consumers, in the protection of their privacy and demands the devices of the Internet of Things to
be screened against the vulnerabilities of potential security and violations of privacy, before
attempting to purchase the same. According to the Digital Consumer Survey, conducted by
Accenture, in 2016, when polled on the usage of consumer security and technology, has moved
the consumers to a top barriers from being a nagging problem, since the choice of the consumers
now is to choose to abandon the devices and services of the Internet of Things and concerns of
security. The survey was conducted in 28 countries with 28000 consumers. The survey also
revealed and reported that out of consumers, who have awareness of planning or owing to the
devices of the Internet of Things and having awareness of the attacks of the hacker, about 18
percent of them decided to terminate the Internet of Things services and also related services
usage, until safety guarantee is assured, in the next five years. The data and statistics reveal that
the there is an increasing perception of security and risks concerns to outweigh the Internet of
Things devices’ value propositions and opt to postpone service subscriptions or planned
purchases (Basenese & Louis, N.D).
Traditional Structures of Governance
Ericsson has conducted a study, regarding the Traditional Structures of Governance
adoption, among the companies of Danish and identified a clash in between the traditional
governance structures of companies and Internet of Things, as IoT presents still both lack of
historical precedence and uncertainties. About 60% of the respondents interviewed have stated
that they possess enough capabilities to organize and 75 percent of respondents expressed the
opinion that they do not believe that they have the required processes for capturing the
opportunity of Internet of Things (Chabanne et al, 2011). It led to a need for organizational
In a global surveillance post-Snowden world, more active interest is taken by the
consumers, in the protection of their privacy and demands the devices of the Internet of Things to
be screened against the vulnerabilities of potential security and violations of privacy, before
attempting to purchase the same. According to the Digital Consumer Survey, conducted by
Accenture, in 2016, when polled on the usage of consumer security and technology, has moved
the consumers to a top barriers from being a nagging problem, since the choice of the consumers
now is to choose to abandon the devices and services of the Internet of Things and concerns of
security. The survey was conducted in 28 countries with 28000 consumers. The survey also
revealed and reported that out of consumers, who have awareness of planning or owing to the
devices of the Internet of Things and having awareness of the attacks of the hacker, about 18
percent of them decided to terminate the Internet of Things services and also related services
usage, until safety guarantee is assured, in the next five years. The data and statistics reveal that
the there is an increasing perception of security and risks concerns to outweigh the Internet of
Things devices’ value propositions and opt to postpone service subscriptions or planned
purchases (Basenese & Louis, N.D).
Traditional Structures of Governance
Ericsson has conducted a study, regarding the Traditional Structures of Governance
adoption, among the companies of Danish and identified a clash in between the traditional
governance structures of companies and Internet of Things, as IoT presents still both lack of
historical precedence and uncertainties. About 60% of the respondents interviewed have stated
that they possess enough capabilities to organize and 75 percent of respondents expressed the
opinion that they do not believe that they have the required processes for capturing the
opportunity of Internet of Things (Chabanne et al, 2011). It led to a need for organizational
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

IOT
culture understanding so that the processes of organizational design can be facilitated and to test
new practices of innovation management. A digital leadership lacking in the digital
transformation era has stifled innovation also and the adoption of Internet of Things to a great
degree that various companies were waiting for the dynamics of market ot play out, in the face of
uncertainty (Westerlund et al, 2014)
Privacy
The basic definition of privacy is ‘the right to be left alone’, according to Thomas
Cooley(Thomas M. Cooley, A Treatise on the Law of Torts, Or the Wrongs Which Arise
Independent of Contracts (Chicago: Callaghan & Co., 1888).). Privacy can be into four states,
reserve, intimacy, solitude and anonymity, all suggesting as to be free from observations by
others and free from groups.
Figure 2: Privacy Concerns of IoT
Consumers or the end users face the privacy threats, both from the unauthorized external
parties and authorized organizations collecting data, which tamper and intercept with the
culture understanding so that the processes of organizational design can be facilitated and to test
new practices of innovation management. A digital leadership lacking in the digital
transformation era has stifled innovation also and the adoption of Internet of Things to a great
degree that various companies were waiting for the dynamics of market ot play out, in the face of
uncertainty (Westerlund et al, 2014)
Privacy
The basic definition of privacy is ‘the right to be left alone’, according to Thomas
Cooley(Thomas M. Cooley, A Treatise on the Law of Torts, Or the Wrongs Which Arise
Independent of Contracts (Chicago: Callaghan & Co., 1888).). Privacy can be into four states,
reserve, intimacy, solitude and anonymity, all suggesting as to be free from observations by
others and free from groups.
Figure 2: Privacy Concerns of IoT
Consumers or the end users face the privacy threats, both from the unauthorized external
parties and authorized organizations collecting data, which tamper and intercept with the

IOT
personal information stored and collected about them. A privacy threat is defined technically, as
possible sensitive data exposure event to entities, such as artificial intelligence, enterprise or
person that are not required or authorized to possess such personal data about the individuals. It
can be either too much data present in the hands of the authorized or right entity or in the hands
of wrong entity (Palmer, 2017).
In an Internet of Things applications report made in 2016, by the Privacy Commissioner
in the home and office observed that when the organizations and consumers begin to use devices
and sensors enabled by internet, then more and more points are and will be open to attack.
A report made by Ernst & Young, in 2015, claim that in today’s world of not enough
awarenss of security, on the part of users, with ‘always on’ technology, the cyber attacks would
then be a matter of ‘when’, rather than ‘if’. It is also stated by the government that it will be
easier to enter a network by the attackers, because the traditional systems of closed operating
technology have given IP addresses increasingly that can externally be accessed and hence the
way is easily made out by the back office systems cyber threats and into various significant
infrastructures, like automation systems, like power generation and transportation systems
(Vongsinghong & Smanchat, 2014). The network of Internet of Things is likened to a global
giant inter connected robot that is so insecure and disparate that against it, the cyber attacks are
increasingly causing to major problems of society, if are not properly regulated.
Apart from the obvious privacy breach, when personal information is viewed by an
unauthorized party, these parties may use such personal information for various notorious and
nefarious purposes. Criminal activity can be indicated when the persistent original user footprint,
the other devices identification that are tied together, fraudulently (Couldry & Turow, 2014).
Personal information can be published by unauthorized parties and also can extend to
personal information stored and collected about them. A privacy threat is defined technically, as
possible sensitive data exposure event to entities, such as artificial intelligence, enterprise or
person that are not required or authorized to possess such personal data about the individuals. It
can be either too much data present in the hands of the authorized or right entity or in the hands
of wrong entity (Palmer, 2017).
In an Internet of Things applications report made in 2016, by the Privacy Commissioner
in the home and office observed that when the organizations and consumers begin to use devices
and sensors enabled by internet, then more and more points are and will be open to attack.
A report made by Ernst & Young, in 2015, claim that in today’s world of not enough
awarenss of security, on the part of users, with ‘always on’ technology, the cyber attacks would
then be a matter of ‘when’, rather than ‘if’. It is also stated by the government that it will be
easier to enter a network by the attackers, because the traditional systems of closed operating
technology have given IP addresses increasingly that can externally be accessed and hence the
way is easily made out by the back office systems cyber threats and into various significant
infrastructures, like automation systems, like power generation and transportation systems
(Vongsinghong & Smanchat, 2014). The network of Internet of Things is likened to a global
giant inter connected robot that is so insecure and disparate that against it, the cyber attacks are
increasingly causing to major problems of society, if are not properly regulated.
Apart from the obvious privacy breach, when personal information is viewed by an
unauthorized party, these parties may use such personal information for various notorious and
nefarious purposes. Criminal activity can be indicated when the persistent original user footprint,
the other devices identification that are tied together, fraudulently (Couldry & Turow, 2014).
Personal information can be published by unauthorized parties and also can extend to
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 35
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.