The Internet of Things
The Internet of Things
The Internet of Things
The connectivity, networking and communication protocols used with these web-
enabled devices largely depend on the specific IoT applications deployed. IoT can
also make use of artificial intelligence (AI) and machine learning to aid in making
data collecting processes easier and more dynamic.
An example of how an IoT system works from collecting data to taking action
Why is IoT important?
The internet of things helps people live and work smarter, as well as gain complete
control over their lives. In addition to offering smart devices to automate homes,
IoT is essential to business. IoT provides businesses with a real-time look into how
their systems really work, delivering insights into everything from the performance
of machines to supply chain and logistics operations.
IoT enables companies to automate processes and reduce labor costs. It also cuts
down on waste and improves service delivery, making it less expensive to
manufacture and deliver goods, as well as offering transparency into customer
transactions.
As such, IoT is one of the most important technologies of everyday life, and it will
continue to pick up steam as more businesses realize the potential of connected
devices to keep them competitive.
IoT encourages companies to rethink the ways they approach their businesses and
gives them the tools to improve their business strategies.
IoT can benefit farmers in agriculture by making their job easier. Sensors can
collect data on rainfall, humidity, temperature and soil content, as well as other
factors, that would help automate farming techniques.
A home automation business can utilize IoT to monitor and manipulate mechanical
and electrical systems in a building. On a broader scale, smart cities can help
citizens reduce waste and energy consumption.
If there's a bug in the system, it's likely that every connected device will
become corrupted.
Arm Mbed IoT is a platform to develop apps for IoT based on Arm
microcontrollers. The goal of the Arm Mbed IoT platform is to provide a
scalable, connected and secure environment for IoT devices by
integrating Mbed tools and services.
In the consumer segment, for example, smart homes that are equipped with smart
thermostats, smart appliances and connected heating, lighting and electronic
devices can be controlled remotely via computers and smartphones.
Wearable devices with sensors and software can collect and analyze user data,
sending messages to other technologies about the users with the aim of making
users' lives easier and more comfortable. Wearable devices are also used for public
safety -- for example, improving first responders' response times during
emergencies by providing optimized routes to a location or by tracking
construction workers' or firefighters' vital signs at life-threatening sites.
In healthcare, IoT offers many benefits, including the ability to monitor patients
more closely using an analysis of the data that's generated. Hospitals often use IoT
systems to complete tasks such as inventory management for both pharmaceuticals
and medical instruments.
Smart buildings can, for instance, reduce energy costs using sensors that detect
how many occupants are in a room. The temperature can adjust automatically -- for
example, turning the air conditioner on if sensors detect a conference room is full
or turning the heat down if everyone in the office has gone home.
In a smart city, IoT sensors and deployments, such as smart streetlights and smart
meters, can help alleviate traffic, conserve energy, monitor and address
environmental concerns, and improve sanitation.
In 2016, one of the most notorious recent IoT attacks was Mirai, a botnet that
infiltrated domain name server provider Dyn and took down many websites for an
extended period of time in one of the biggest distributed denial-of-service (DDoS)
attacks ever seen. Attackers gained access to the network by exploiting poorly
secured IoT devices.
Because IoT devices are closely connected, all a hacker has to do is exploit one
vulnerability to manipulate all the data, rendering it unusable. Manufacturers that
don't update their devices regularly -- or at all -- leave them vulnerable to
cybercriminals.
Additionally, connected devices often ask users to input their personal information,
including names, ages, addresses, phone numbers and even social media accounts
-- information that's invaluable to hackers.
Hackers aren't the only threat to the internet of things; privacy is another major
concern for IoT users. For instance, companies that make and distribute consumer
IoT devices could use those devices to obtain and sell users' personal data.
Although Ashton's was the first mention of the internet of things, the idea of
connected devices has been around since the 1970s, under the monikers embedded
internet and pervasive computing.
The first internet appliance, for example, was a Coke machine at Carnegie Mellon
University in the early 1980s. Using the web, programmers could check the status
of the machine and determine whether there would be a cold drink awaiting them,
should they decide to make the trip to the machine.
IoT evolved from M2M communication, i.e., machines connecting to each other
via a network without human interaction. M2M refers to connecting a device to the
cloud, managing it and collecting data.
Taking M2M to the next level, IoT is a sensor network of billions of smart devices
that connect people, systems and other applications to collect and share data. As its
foundation, M2M offers the connectivity that enables IoT.
The internet of things is also a natural extension of supervisory control and data
acquisition (SCADA), a category of software application programs for process
control, the gathering of data in real time from remote locations to control
equipment and conditions. SCADA systems include hardware and software
components. The hardware gathers and feeds data into a computer that has
SCADA software installed, where it is then processed and presented in a timely
manner. The evolution of SCADA is such that late-generation SCADA systems
developed into first-generation IoT systems.
The concept of the IoT ecosystem, however, didn't really come into its own until
the middle of 2010 when, in part, the government of China said it would make IoT
a strategic priority in its five-year plan.