Environment Characteristics: Iot DR
Environment Characteristics: Iot DR
Environment Characteristics: Iot DR
Environment characteristics
One of the important characteristics of Internet of Things is data collection from their
environment. This is achieved through dynamic changes that occur in the environment
around these devices. The state of these devices changes dynamically as well as the number
of devices with people, place and time.
The primary function of the Internet of Things is to gather data from its surroundings. The
data is accomplished through the dynamic changes around the devices. The condition of these
devices changes dynamically, such as sleeping and waking up, being connected or
disconnected, and the context of devices, such as temperature, location, and speed.
Connectivity and sensor technology help create a greener world, and the tech world is
beginning to see IoT devices increasing energy efficiency in homes and on farms.
Here are five ways the IoT is helping to reduce strains on the environment.
1. Green on the go
Intelligent, autonomous cars can usher in a new era of green driving by allowing cars on the
road to communicate and process what other vehicles are about to do.
This allows traffic to move at one speed with only a few meters between vehicles, reducing
the fuel inefficiency by the speed and gear changes of human-operated vehicles.
IBM’S Watson IoT Platform has been used to create a driverless car called Olli. The Watson
IoT platform analyzes the vast amounts of data from the vehicle's sensors, allowing it to
accelerate, decelerate, and change lanes without driver input.
2. Connected wildlife
IoT has been used to bring species back from the brink of extinction, with great success.
The Iberian Lynx was re-established in Spain after using IoT technologies to track and
monitor the few remaining wild lynxes.
How?
Using collars for geo-mapping their location and habits, together with connected drones,
which were much less invasive when tracking the animals, scientists and wildlife experts
were able to help re-establish the species.
3. Waste not
Leaving lights on, heating an empty house or heating water that no one will use are all big
energy wastes.
But smart and connected homes can prevent unnecessary energy use.
Like the Loxone Smart Home, there are programs already available that allow users to turn
lights on or off and control the temperature and boiler activity when out of the house.
Not only that, but cars can also connect to homes, creating a more comprehensive array of
efficiency-saving options.
IoT DR SHIKHA GAUTAM
4. Sensing change
Sensors are more sophisticated than ever and can now be carried around by people with ease.
A range of sensors measure air quality and warn users through apps on their smartphones
when they are at dangerous levels or are likely to cause asthma.
This is helpful for the user and can also raise awareness of pollution and high emissions in
populated areas.
Similar devices are also used for working with radiation and miners. It's a good way of
driving communities and governments to combat rising pollution levels.
5. Smarter farming
Using smart sensors, farmers can reduce the amount of waste they produce and monitor their
agricultural processes depending on weather, humidity, sunlight, and other external factors.
It's also possible to reduce the amount of water used to hydrate growing crops when a sensor
discovers that the soil's moisture levels are just right. An IoT approach can help reduce waste
and increase energy efficiency in the farming world.
Traffic characteristics
Traffic characteristics study is very vital for designing the required geometric features in the
roadway. It includes volume of traffic, speed of traffic, and percentage of trucks or larger
vehicles like bus, etc.
Traffic characteristics are broadly classified under two types such as: 1) Road user
characteristics and 2) Vehicular characteristics.
Road user characteristics include the physical characteristic of driver like power of vision,
hearing and reaction time of the driver shown during a traffic situation.
Psychological characteristics includes emotional factors (anger, fear and anxiety),
environmental factors include atmospheric and traffic stream conditions.
Vehicular characteristics are classified as two types as follows. Static characteristics
involving the vehicular dimensions (length, wheel base, width, and center clearance) and the
dynamic characteristics (speed, power, acceleration) with the breaking characteristics.
It is an important characteristic of IoT due to which anyone at any time can connect from
anywhere. This allows network connectivity and device interoperability. IoT can also connect
manufacturing devices with identification, sensing, actuation, and network capabilities. The
connectivity allows these devices to be controlled remotely. If businesses neglect the IoT
connectivity, it can lead to project failures since strong connectivity ensures that these
devices are working properly.
By connecting everyday devices, connectivity enables the Internet of Things. Because simple
object-level interactions contribute to collective intelligence in an IoT network, connectivity
of these things is critical. It allows for network connectivity and device interoperability. The
networking of intelligent devices and apps can provide new commercial prospects for the
Internet of Things with this connectivity.
IoT DR SHIKHA GAUTAM
One of the significant aspects of the Internet of Things is heterogeneity. Devices in the
Internet of Things are based on many hardware platforms and networks, and they can
communicate with other devices or service platforms over various networks. Direct network
connectivity between heterogeneous networks should be supported by IoT architecture.
Scalabilities, modularity, extensibility, and interoperability are the core design criteria for
heterogeneous things.
Reliability and scalability go hand in hand here. Before you launch, make sure you can reach
the number of devices and connectivity to properly deliver on the promises you make to your
customers.
Let’s take a closer look at a few common challenges for IoT scalability:
Security
When you deploy an IoT product at scale, it means more devices are in operation - and an
increase in the number of connected devices always creates more security threats. That's
because each new device adds another attack surface and more people have access to the
network.
Always searching for points of vulnerability, botnets pose a significant security threat to IoT
devices. If they find an open back door, they can bring down entire systems using Distributed
Denial of Service attack, which is a strategy that floods a system with messages and requests
to shut it down. If an IoT fleet provider experiences a DDoS attack, it could be the death blow
that kills a particular project - or the entire business.
Securing your IoT devices and the network as you scale up production and deployment can
be challenging, especially for smaller companies that may not have a dedicated team of in-
house cyber-security experts to aid them.
Device Management
IoT device management, especially after the devices have been manufactured and deployed,
is another challenging hurdle. Most electronic devices are sold and shipped with the latest
firmware. Still, it's essential to have a way to issue and load updates, including security
patches, as you discover new vulnerabilities and develop new features.
Connected devices need a reliable over-the-air service to provide periodic updates as they're
deployed, giving you the ability to push those updates quickly without the need for human
oversight on the device side.
Integrating hardware architecture with cloud and connectivity providers is another challenge
inherent in device management. It can be a complicated and challenging process when
companies attempt to integrate hardware, software, and connectivity themselves. One way to
avoid this headache is by choosing a single provider that can handle all three areas.
Cellular Coverage
Ensuring cellular coverage for an IoT deployment may also prove difficult, especially when
you're deploying devices across vast geographic areas.
Cellular connectivity is an essential piece of the puzzle for a successful deployment, as
interruptions can mean the loss of vital data. To manage cellular IoT deployments at scale,
companies have a host of strategic decisions to make about:
Manufacturers and firmware (including whether to use a traditional SIM or eSIM that
enables OTA updates)
Modem components and modules
The microcontroller network stack
SIM provider mobile network operator
IoT DR SHIKHA GAUTAM
Interoperability points
Next figure shows the various interactions between components of an IoT system, each arrow
being an interaction capability or an interoperability point. Some interactions can be visible
by users, for instance, a smartphone can interact with a smartwatch. Others are internal, for
instance, an interaction between a security surveillance application and an IoT home gateway,
or an interaction between the home gateway and an intrusion detector.
IoT DR SHIKHA GAUTAM
https://www.trialog.com/wp-content/uploads/2020/09/interoperability10.gif
Next figure shows an example of an IoT system: a remote heating control. The user can use
the smartphone to control externally a heating device at home.
Now that you know about the importance of security and privacy for the long-term growth of
IoT, it is reasonable to reflect on both of them individually. What are the factors associated
with the concerns of security in IoT? The Internet of Things landscape is gradually becoming
more diverse with legacy computing systems and modern computing devices. As a result, IoT
easily becomes vulnerable to a wide range of security risks in different approaches.
First of all, it is important to note that many devices in the IoT landscape are tailored for
large-scale deployment. The example of such devices refers to sensors. In addition, deploying
IoT devices also involves a set of similar or almost identical appliances with resembling
traits. The resemblance is responsible for magnifying the security vulnerabilities. While
security issues have been prominently noted in the information and technology sector, IoT
implementation has come up with some new challenges.
The answer to ‘Why security is important in IoT?’ is evident in the nature of
interconnectivity between the IoT devices. If a poorly secured device connects with the IoT
landscape, then it could affect the security and resilience of IoT. With a large number of
homogenous devices deployed in IoT, the IoT users and developers must ensure that they are
not exposing other users to potential harm.
One of the most prominent factors to draw your attention towards security in IoT would refer
to authentication. The authentication mechanisms used in existing IoT ecosystems are
restricted only to offering safeguards against limited threats such as replay attacks or Denial
of Service (DoS) attacks. It is also important to consider the role of information security as
one of the highly vulnerable domains of IoT authentication. Why?
The abundance of risky applications which enable a natural multiplicity of data collection
could present formidable information security risks. In addition, the importance of security
becomes clearly evident with the prevalence of man-in-the-middle attacks. Third-party agents
could intercept communication channels for impersonating identities of vulnerable nodes
associated with network exchange.
Hardware issues
Lack of security in data transfer and storage
Hard-coded, weak, or guessable usernames and passwords
appropriate encryption for the connection and protection for updated files, any malicious
agent could access sensitive information.
Abundance of Data
The data generated by IoT devices is radically staggering for all the right reasons. According
to the Federal Trade Commission, less than 10,000 households could create almost 150
million discrete data points daily. Therefore, you can clearly notice the increased possibilities
for breaches of privacy in IoT. You have more entry points for hackers while leaving
sensitive information and your IoT devices vulnerable.
Eavesdropping
IoT users would also have to find eavesdropping as one of the ominous answers to ‘What are
the privacy concerns in IoT?’ for specific reasons. Imagine a hacker using one of your smart
home appliances to snoop in your personal life. As a matter of fact, hackers and even
manufacturers could use a connected device to basically invading an individual’s home.
For example, researchers have been successful in eavesdropping in IoT by intercepting
unencrypted data from a smart meter device. The unencrypted data helped in identify the
television show an individual was watching at the particular instance of time.
Bottom Line
It is quite clear that the Internet of Things or IoT is all set to transform the way we perceive
devices. Now, it is possible to connect almost every device we can think of to the internet. As
a result, the continuously expanding network of IoT devices could only amplify the concerns
of security and privacy in IoT.
At the same time, it is also inevitable to note that security and privacy issues are common in
the domain of information and technology. You can also think of IoT in parallel with the
domain of information and technology to understand how an understanding of the security
and privacy issues related to IoT would support its long-term growth. Learn more
about IoT and develop a better understanding of the security and privacy risks.