Internet of Things (IoT)
0 It is a technology that applies within a geographically circumscribed environment, where diverse objects communicate with one another through the Internet.
www.control4.com
Defining Features of IoT
0ubiquity 0miniaturization0ambiguity 0 identification 0 connectivity 0mediation and
autonomous agency
0embedded intelligence0 seamless transfer 0distributed control 0big data0unpredictability
Digital Universe
Four major migrations from analog to digital
1. computer 2. phones 3. Cameras4. machines
postmastersqc.com
Intel’s Estimation
015 billion objects by 20150200 billion objects by 2020 0Each person having about 26 smart objects by 20200Total global worth of IoT technology = $6.2 trillion
0 Infographic: 0http://www.intel.com/content/www/us/en/intellige
nt-systems/iot/internet-of-things-infographic.html
0http://share.cisco.com/internet-of-things.html
Technology - Communication
0Radio-frequency identification (RFID) 0Near field communication (NFC) 0Bluetooth0WiFi
it.emcelettronica.com www.gwi.netwww.mpilabels.com
Technology - Identification
0 Internet Protocol version 6 (IPv6) 0 Internet Protocol version 4 (IPv4)0Transmission Control Protocol (TCP)0User Datagram Protocol (UDP)
Hardware, Software, and Cloud Service
0Gainspan
0Wiznet 0Nordic Semiconductor0TI0Arduino 0Raspberry Pi0BeagleBone Black
0RIOT OS 0Thingsquare Mist0ThingWorx0Evrythng0Sense
Applications0Mimo monitor 0BeClose system0dweet.io 0 http://postscapes.com/internet-of-things-examples/0http://www.libelium.com/top_50_iot_sensor_applicat
ions_ranking/
Examples
0 “It might be some effort to get this kind of scenario, but if breaking into one server means you get to ransack 100, 1,000, 10,000 people’s homes, that’s definitely worth it, and that’s where the real danger lies.“ - Rachel Metz from MIT Review
0Hackers used 100,000 everyday consumer gadgets that were connected to the internet to send more than 750,000 malicious spam phishing emails to enterprises and individuals throughout the world. (Occured between December 23, 2013 and January 6)
Laws and Regulations
0The Fourth Amendment to the United States
“the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized"
“Shine the Light” law by California constitution
“… outlines specific rules regarding how and when a business must disclose use of a customer's personal information and imposes civil damages for violation of the law”
en.wikipedia.org
The Computer Fraud and Abuse Act (CFAA)
0 accessing a computer without authorization and subsequently transmitting classified government information. [Subsection 1030(a)(1)];
0 theft of financial information [Subsection 1030(a)(2)];0 accessing a "protected computer," which the courts have
recently interpreted as being any computer connected to the internet, even if the intruder obtains no data [Subsection 1030(a)(3)];
0 transmitting code that causes damage to a computer system [Subsection 1030(a)(5)];
0 trafficking in computer passwords for the purpose of affecting interstate commerce or a government computer [Subsection 1030(a)(6)];
The Electronic Communication Privacy Act
(ECPA)0 “for the increasing amount of communications and
data transferred and stored on computer systems… under the law, unauthorized access to computer messages, whether in transit or in storage, is a federal crime”
Conclusion
0Our imagination becomes reality. 0We are future computer scientists.0Building a better smart world through the IoT
depends on us, on our action.
tonden.wordpress.com
References
0 http://www.livescience.com/38562-internet-of-things.html 0 http://www.slideshare.net/PasqualePuzio/internet-of-things-an
d-its-applications0 http://www.intel.com/content/www/us/en/intelligent-systems
/iot/internet-of-things-infographic.html
0 http://en.wikipedia.org/wiki/Internet_of_Things 0 http://searchmanufacturingerp.techtarget.com/definition/RFID 0 http://postscapes.com/internet-of-things-technologies 0 http://www.webopedia.com/DidYouKnow/Internet/ipv6_ipv4_d
ifference.html
0 http://www.technologyreview.com/news/526006/an-easy-interface-for-the-internet-of-things/
References
0 http://postscapes.com/internet-of-things-examples/ 0 http://www.libelium.com/top_50_iot_sensor_applications_ranking/0 http://www.dailymail.co.uk/sciencetech/article-2541306/Cyber-cri
minals-hack-REFRIGERATOR-send-malicious-emails-worlds-household-attack.html
0 https://sites.google.com/a/cortland.edu/the-internet-of-things/ethics
0 http://www.itu.int/en/ITU-D/Statistics/Documents/facts/ICTFactsFigures2013-e.pdf http://www.zdnet.com/cisco-launches-internet-of-things-security-challenge-7000026925/
0 http://www.pbs.org/wgbh/pages/frontline/shows/hackers/blame/crimelaws.html
Top Related