Free Essay

Internet of Things

In:

Submitted By baloch123
Words 4683
Pages 19
Internet of Things: Perspectives, Challenges and
Opportunities
Antonio Marcos Alberti

Dhananjay Singh

Instituto Nacional de Telecomunicações - Inatel
P.O. Box 05 - 37540-000
Santa Rita do Sapucaí, Minas Gerais, Brazil alberti@inatel.br Department of Electronics Engineering
Hankuk (Korea) University of Foreign studies
Global Campus: Yongin, South Korea dsingh@hufs.ac.kr Abstract – The Internet of things can be defined as to make the “things” belong to the Internet. However, many wonder if the current Internet can support such a challenge. For this and other reasons, hundreds of worldwide initiatives to redesign the Internet are underway. This article discusses the perspectives, challenges and opportunities behind a future
Internet that fully supports the “things”, as well as how the
“things” can help in the design of a more synergistic future
Internet.
Keywords–Internet of things, smart things, future Internet, software-defined networking, service-centrism, informationcentrism, ID/Loc splitting, security, privacy, trust.
I. INTRODUCTION

The Internet of things (IoT) refers to uniquely addressable objects and their virtual representations in an Internet-like structure [18][19][20]. We can say that it is an extension of
Internet with uniquely addressable objects becoming a part of existing Internet. The objects forming the IoT will have distinct characteristics about them. They may hold selfidentifying information; they may even transmit the processed information or anything that may be considered important with respect to the object with which they are associated.
There is a lot of pervasive presence in the human environment of things or objects, such as radio-frequency identification (RFID) tags, sensors, actuators, mobile phones, smart embedded devices, etc. – which, through unique addressing schemes, are able to effectively communicate and interact with each other and work together to reach a common goal of making the system easier to operate and utilize. The objects that will be connected will be adaptive, intelligent, and responsive. The IoT will be altogether a new environment in which the current Internet will be smartly supported by all together new range of smart embedded devices. The IoT will be characterized by an environment rich in RFID, ipv6, near field communication (NFC), barcodes, quick response (QR) codes, smartphone apps, GPS, and other smart devices.
The networked objects will sense the environment with help of the sensors and will communicate among themselves directly or with the help of the Internet. The amount of knowledge comprised with redundant information will certainly be analyzed and assessed by the analytic software and intelligent decisions will be the final outcome.
In this scenario, what could be the number of networked

objects we could expect on the Internet? Estimatives go from billions to trillions [2][21][22]. These estimates will certainly make you wonder if the current Internet can support such tremendous increase in the number of connected devices and networks. These and other challenges have motivated the networking community to question whether it is time to redesign the Internet considering the current state-of-the-art on information and communication technologies (ICT). Thus, worldwide, hundreds of initiatives are proposing to reengineer the
Internet under the banner of the so-called future Internet
(FI) research [5][21].

Figure 1: Future Internet: A “smart things” evolutionary perspective. Considering an evolutionary point of view, the future
Internet will comprise of existing Internet and smart embedded objects which will be the basis of the Internet of things. The IoT will be a distinct part of the FI. It will be seamlessly integrated in to the existing Internet infrastructure which will help the service oriented

architecture of the Internet to utilize the services available through the system. However, as computing and communication resources become more and more ubiquitous, the smart things will increasingly become integral part of the
FI, augmenting the overlapping area of the IoT and Internet spheres in Figure 1.
In an evolutionary perspective, the FI will face the challenge of the integration of smart embedded devices in to the ever expanding Internet. Protocols using 6lowpan are improving. Since there are bandwidth limitations, the users which are using ipv6 will certainly face connectivity and timing issues. To resolve this more efficient compressing algorithm are being developed to be used in the seamless integration in to the system.
In a revolutionary perspective, most of the challenges are at the design level. IoT and FI relationships need to be clearly determined. More synergistic designs are required to take advantage of efforts, reducing unnecessary overlapping and producing more efficient and flexible architectures. This paper provides a first glance discussion on the relationships between the IoT and FI considering a full convergence point of view.
The remaining of this paper is organized as follows. Section
II covers the IoT requirements and perspectives regarding capacity, ubiquity, and scalability issues. Section III focuses on the role of IoT considering a more deep integration between the real and virtual worlds. Section IV concerns on how to expose IoT resources to software and how to orchestrate IoT related services and applications. Section V addresses the relationship between IoT and software-defined networking. Management and human intervention aspects are discussed on section VI. Section VII covers the relationships between IoT and the information-centric paradigm for FI design. Section VIII focuses on naming, identification, mobility, and multihoming support. Section IX concerns to the security, privacy, and trust aspects. Finally, the Section X does some final remarks.
II. CAPACITY, UBIQUITY, AND SCALABILITY
The
accelerated evolution of computing and communications capacities [1], i.e. memory, processing, storage, transmission rate, etc., allows the implementation of small devices capable of sensing the real world and transmitting the obtained data to services and applications on the Internet. As the cost of technologies fall, more and more capacity becomes available, making the use of networked sensoring and actuating devices more and more viable. One can expect that the number of devices will increase faster and faster in the next decades [2]. As a result, sensing and actuating capabilities can become ubiquitous, allowing unprecedented scenarios of interaction between the real and the virtual worlds [3].
Although it is expected that this scenario will bring huge benefits for our information society, the challenges behind it are equally big [3]. A significant increase in the number of internet-enabled devices (IEDs) can create relevant challenges to the scalability of the current TCP/IP stack [2][3], including the support for naming, addressing, identification, location,

mobility, routing, etc. The Internet lacks on the support for unique identification and transparency. IP addresses are used no only to locate devices on the network, but also to identify them [2][4]. Since the devices’ addresses behind a network address translation (NAT) are opaque [5], the IDs are not valid outside an autonomous system. This severely limits the transparency on the network. The scalability of the current domain naming system (DNS) is also affected by a huge increase in the number of device networks. Several other aspects on the current Internet are affected by this evolution scenario [2][3].
New network architectures need to overcome the current
Internet limitations by rethinking such limiting aspects.
They need to take advantage of the expected ubiquity of computing and communication resources to improve the connectivity and robustness of wireless sensor and actuator networks (WSANs). Devices need to be persistently identified to allow perennial traceability to existent sensoring and actuating resources [3]. The challenge is to identify perennially and uniquely the devices that are collecting real world information or actuating over the real world. Also, device locators need to be decoupled from identifiers to allow mobility without loss of identity [4].
This and other proposals to improve IoT scalability will be discussed on the following sections.
III. REAL-VIRTUAL WORLDS INTEGRATION
The perspective behind the IoT is that the real world will be increasingly integrated with the virtual one [3]. Right now, the world is in process of making new smart embedded devices. Embedded devices are still emerging.
This will create a flood of real world information, considerably enriching our applications, making them more aware of what happens in the real world, in real time, everywhere. Smart applications are being thought of as the process of making the system more popular as per the system point of views. One can expect the popularization of new applications that take advantage of this situational information, like augment reality, ambient intelligence, social appliances, networked cars, and many others. Also, there are the applications to control or act over the real world. Decisions made on the virtual side can be reflected on the real environment. This will help us to save energy, to better use our environmental resources.
To transform this huge amount of raw data on knowledge is one of the biggest challenges behind the IoT. There is an entire cycle of raw data processing up to the generation of a knowledge database. Possible data processing includes statistics generation, data aggregation, filtering, correlation, contextualization, and exposition. Depending on the service or application, time sensitivity is also an issue.
Generally speaking, the information and knowledge obtained from the sensorial network will be further used to feed other processes, like decision making or actuating.
Therefore, complex hierarchical feedback control loops can

be created based on the obtained sensorial data. As in any control system, some challenges are stability, performance, and sensitivity. New network architectures must create the necessary support to such hierarchical control systems, providing the appropriate support for the data/information exchange between the real and virtual worlds.
IV. RESOURCES EXPOSITION AND SERVICE CENTRISM
Not only the collected IoT data need to be exposed to the software environment, but also the existent IoT resources, i.e. sensors, actuators, or even entire networks. In other words,
IoT resources need be exposed to software orchestration frameworks, allowing the dynamic and integrated composition of devices, networks, services, and applications [6]. Entire services’ life-cycles can be orchestrated involving such exposed resources. First, services and applications can search for available IoT devices. Second, dynamic usage contracts can be negotiated and established. The quality of the sensoring and actuating functionalities can be monitored and evaluated.
Dynamic contracts with sensors and actuators that do not perform as expected can be revoked. Devices can compete each other to provide better services to virtual entities. The reputation of networked objects can be estimated according to previous established contracts.
Nonetheless, IoT capabilities can be seen as a service that is exposed to other software via orchestration frameworks and contracted on demand. This view approximates the IoT to the so-called Internet of services (IoS) [7][8], which is a branch of the FI research. In this context, a first challenge is how to design a service oriented IoT? A second one is how to enable the joint orchestration of non-IoT and IoT substrate resources and services. The convergence, the search for synergies, and the elimination of redundant aspects in these two proposals strengthens both and more efficiently addresses the challenges behind the design of a new Internet.
The IoT resources need to be very precisely exposed. Thus, devices’ descriptors can be elaborated and divulgated to possible partners. The publish/subscribe paradigm fits very well on this task [9]. However, one can not expect that small sensors and actuators are able to neither expose their capabilities, nor establish dynamic contracts. It is well known that energy and other factors limit the IEDs’ functionalities.
Therefore, proxies can be used to represent simple networked objects that do not support such functionalities.
Another very important challenge for FI architectures is the consistent management of exposed resources’ life-cycle. In this context, some questions are: How to manage the life-cycle of exposed resources? How to share IoT resources among several orchestration frameworks? How to describe the device capabilities? How to format the contracts? How to provide the adequate search mechanisms? Which circumstances can cause a contract revocation? These are open problems that need to be investigated.

V. SOFTWARE-DEFINED NETWORKING
Software-defined networking (SDN) means to design networks from a software engineering perspective [10]. It means to look for the right abstractions when designing new network architectures. OpenFlow is a first realization of this idea [11]. Network control is performed based on a centralized view of the network. However, it is important to note that the SDN paradigm is more broad than the
OpenFlow implementation. The research for the right abstractions for the SDN is still in the beginning.
In this scenario, the convergence between the IoT and the
SDN is an emerging research area. A priori, the relationship between the two technologies appear to be bilateral. The
SDN paradigm could be applied to the IoT design. This is already happening for wireless networks and WSANs, where OpenFlow is used to program/configure network nodes [23]. Software-defined and software-controlled
WSANs were just emerged as a research topic. An interesting issue is how the well-known limitations of
WSANs will shape the application of the SDN paradigm on this networks.
In the opposite direction, the IoT can be used to collect real-world information that is relevant for networking control, as well as to reflect software decisions on network hardware. An open subject is how to design networking control and management systems that take advantage of the
IoT. An additional challenge is to ensure the correctness and temporal coherence of the controls sent by software to the actuators.
VI. MANAGEMENT AND AUTONOMICITY
The expectation behind the IoT is that it will manage itself or at least reduce considerably the degree of the human intervention required [3]. We can not expect that the
IoT will be managed in the same way as the telecom operator’s networks today. First, because the quantity of networked devices will be orders of magnitude greater. The traditional management model would have a very high cost if applied for the IoT scenario. Second, hundreds or even thousands of devices will be under the ownership of nontechnical people, in their houses, cars, clothes, etc. Third,
IoT management requirements have several important differences when compared to traditional networks [12].
Therefore, to manage such devices is a different problem when compared with traditional Internet or telephony management. Fortunately, the restrictions imposed on the
IoT devices (e.g. energy, computing power, faults, limited reach, etc.) are well understood right now and have influenced the creation of evolving management approaches less dependent on human interference [14].
The IoT viability depends on the scalability, generality, autonomicity, and comprehensiveness of its management.
Moreover, when we look for more deep synergies, the FI management may itself depend on the IoT, since sensoring and actuating are desirable functionalities for any ICT

equipment management. Thus, while the IoT works like a sensorial nervous system for the FI, providing the required data to establish adequate real-world awareness, it also demands the management of its “army” of devices. Therefore, there is a two-way relationship between the substrate resources management and the sensoring and actuating capabilities of the IoT. An open challenge is how to combine both requirements in an elegant design, without unnecessary overlappings. Among the proposals to reduce human interference on ICT, there is the so-called autonomic technology, or self-* [13].
The asterisk is the name of the function that is performed autonomically, e.g. self-organization, self-configuration, selfoptimizing, self-healing, etc. The goal would be to create a self-management solution or an autonomic “pilot” for the IoT.
The implementation of the self-* properties is typically based on an autonomic element that performs an autonomic cycle. According to Kephart and Chess [13], this cycle consists on the following phases: monitoring, analyzing, planning, execution, and knowledge. The monitoring phase relies on sensors that collect the relevant data at a managed entity, while the execution phase depends on effectors that execute the planned actions. The analyzing phase aims at contextualizing the monitored data to create the required awareness regarding the managed entity. At the planning phase, actuating plans are generated and evaluated based on the analyzed data and other inputs, like politics, rules, goals, etc. The execution phase aims at executing the elaborated plans. And, in a knowledge phase, fitness and learning takes place based on the history of the actions done. In this context, the IoT role on future networks:
Y Merges with the necessary functionalities to implement a self-management approach. Observe that many of the IoT roles overlap with the functionalities advocated by the autonomic cycle. Thus, the autonomic technology appears to be a natural candidate for the IoT management [14].
Y Provides the contextualized real-world information necessary to feed the autonomic cycle of other FI architectural components. For example, assume a virtual network admission control service that decides whether a new virtual network can be established or not over some real-world substrate. The autonomic cycle of this service could rely in a set of contracted sensors that measure the available capacity on the physical infrastructure. If a new virtual network is accepted, the admission installation can be done by effectors at the real-world equipment, e.g. optical switch control or electromechanical antenna positioning. Thus, the IoT appears to be a natural candidate to implement some of the phases of the autonomic cycle for FI components.
VII. INFORMATION-CENTRISM
The IoS approach considers that behind a certain level of abstraction, everything in a new Internet can be considered a service, e.g. infrastructure, frameworks, operating systems,

databases, etc. On the contrary, the information-centric design considers the information as the main ingredient of the FI [15]. The argument is the same, i.e. everything can be considered as information over a certain level of abstraction. This approach is also know as information centric networking (ICN). Let’s call this branch of the FI design as Internet of information (IoI). As previously discussed, the IoT and IoS also present a two-way relationship, where the IoT can be seen as a service on the
IoS approach and the IoS depends on the contextualized information provided by the IoT, as well as on its actuating capability. Thus, what is the relationship between the IoT and the IoI?
Node-centrism is perhaps the most common approach for designing WSANs. A possible explanation is that for many years the main design challenges were related to the energy and other environmental pre-requirements. The idea of putting sensoring and actuating nodes on the Internet made other design aspects emerge, such as the ones addressed on this paper. Additionally, there are the information-centric aspects, e.g. information representation, naming, identification, addressing, search, locating, traceability, distribution, privacy, security, integrity, and management.
Thus this paper defends that the IoT can take great advantage of the precepts behind the IoI. Self-certifying names (SCNs) can be used to name data and/or information in a persistent and verifiable way1. The integrity of sensing and actuating data can be checked based on such names.
Also, IoT information can be described and represented by information objects, which contain digital signatures, checksums, metadata, access rights, formats, ontology, etc.
The persistent identification of data chunks or coded information is another requirement advocated by the IoI.
Information identifiers need to be decoupled from addresses and locators. Therefore, IoT information could be moved or copied without loosing its identity. Search and discovery of
IoT information can be performed based on persistent names and/or identifiers. Also, information coherence, provenance, and traceability become persistent. Finally, data and information are secured per se [16] – they do not depend anymore only on secured connections.
In the opposite direction, the IoT can enrich the IoI with the information measured in the real world, as well as allow actuating over it. The benefits for the IoI are similar to those resulting from the convergence of the IoS and the IoT.
Thus, the application of the information-centric paradigm on the context of the IoT is an unexplored research area.
Some open challenges are: How to name data chunks and information sensed on the IoT? How to create identifier for them? How to resolve identifiers to locators? How to create the metadata for the measured data? How to distribute the data to one or more interested destinations? How to support
ID-based mobility? How to enable search and discovery of
1
SCNs contain the result of a cryptographic hash function over the binary pattern of the data.

sensorial information? How to deal with the privacy of the IoT information? Or more generally speaking, how to apply the state-of-the-art on information-centric design to the IoT scope? VIII.NAMING, IDENTIFICATION, MOBILITY, AND MULTIHOMING
People like to assign legible names to devices, networks, services, and even for information. In addition to the legible names, SCNs can be calculated based on the binary patterns of digital entities and information. On the other hand, identifiers are symbols that uniquely identify an entity or a content in a certain scope. SCNs can be identifiers if they are unique in some scope. The dynamic resolution of an identifier in other identifiers allows the architecture to model the relationships among devices and their sensorial data. As a data moves it changes its address and location, but its identifier remains the same within the same scope. The same occurs to a node that moves in some network. Therefore, the separation of identifiers and locators in the IoT is very desirable. More research needs to be done on the dynamic resolution problem.
Also, standardization bodies need to verify the suitability of the contemporary approaches for device identification on the
FI. The research on mechanisms to generate persistent and unique identifiers to other entities in the IoT is also an issue, including networks, services, virtual entities, etc. Other challenges are: How to ensure that there is no collision? Or at least, how to minimize collisions probability? How to check the veracity and uniqueness of a given identifier? How to map an identifier to a locator in a large population of IoT devices?
Is it possible to use the IDs as addresses to forward or route information? Or more generally, how to design an ID-based
IoT?
Finally, there is the multihoming support for IoT resources.
The current Internet provides a limited support for multihoming. New architectures need to support simultaneous connectivity and multipath routing. The ubiquitous connectivity needs to be explored in design, as well as new routing approaches. Service redundancy is also a prerequirement.
IX. SECURITY, PRIVACY, AND TRUST
The data gathered from IoT sensors or tags can carry sensible information for client’s privacy. For example, consider a personal area health monitoring system that periodically transfers to a hospital the state of a certain patient.
The data collected by this system are property of the patient being monitored, which authorizes the hospital and its medical staff to access and analyze it. An unauthorized access to this data consists of a breaking on the security and privacy of this patient. However, consider that the communication to the authorized hospital is lost and another medical staff needs to access the data due to a supposed emergency. This situation can become much worse if the patient is unconscious and can not authorize the new medical team. This scenario illustrates how complex can be the security and privacy problem in the

IoT. An approach to deal with this situation (and many others on the FI) could be the establishment of a trust network of hospitals. Instead of individually authorizing every possible hospital in a country, the patient authorizes the trust network. Thus, in case of emergency access can be granted to other hospital in the trust network.
Trust networks are in essence a collaboration contract between trustable peers. They can be established among nodes in a WSAN in order to authenticate forwarding, routing, or even aggregation of data [17]. They can also help on the selection of a node cluster’s leader. Observe how close this idea is to the dynamic contract establishment idea on the IoS. Therefore, the management of trust networks requires a complex contract life-cycle management. Also, entities reputation need to be estimated in order to decline or not their participation in some network. Moreover, the establishment of comprehensive trust networks that spread over the IoT and other FI components is a new research frontier.
X.FINAL REMARKS
The Internet of things is a fundamental ingredient of the future Internet, since it provides the sensorial and actuating capabilities required to greatly enhance the interaction between the real and virtual worlds. Not only it collects the real world data that feeds the entire FI, but also it offers the actuating devices that can make virtual world decisions real.
The continued reduction in the cost of computing and communication capabilities indicates that the IoT will become ubiquitous, allowing the FI to achieve increasing levels of environmental awareness, as well as making our environment more intelligent and sustainable. Such capabilities feed significant bilateral relationships with other
FI ingredients, such as: information- and service-centric approaches, software-defined networking, self-management, naming, identification, mobility, multihoming, security, privacy, and trust. Therefore, this paper argues that the FI research should better exploit the synergies between these proposals and the IoT, eliminating unnecessary overlappings and cohesively integrating them towards the design of a cohesive new Internet.
REFERENCES
[1]
[2]
[3]

[4]

[5]
[6]

R. Kurzweil, The singularity is near: when humans transcend biology, A Penguin Book: Science, Penguin, (2006).
H. Harai et al., New generation network architecture akari conceptual design, Tech. Rep. v1, NICT, (2010).
M. Presser, P. Daras, N. Baker, S. Karnouskos, A. Gluhak, S. Krco,
C. Diaz, I. Verbauwhede, S. Naqvi, F. Alvarez, A. A. FernandezCuesta, Real world internet, Tech. rep., Future Internet Assembly
(2008).
Y. Wang, J. Bi, X. Jiang, Mobility support in the internet using identifiers, in: Proceedings of the 7th International Conference on
Future Internet Technologies, CFI ‘12, ACM, New York, NY, USA,
(2012).
European Commission FIArch Group, Future Internet design principles, Position Paper, (2012).
M. Presser, P. Barnaghi, M. Eurich, C. Villalonga, The sensei project: integrating the physical world with the digital world of the

[7]
[8]
[9]
[10]
[11]

[12]

[13]
[14]

[15]

[16]

[17]

[18]
[19]
[20]
[21]
[22]

[23]

network of the future, Communications Magazine, IEEE 47 (4), (2009).
C. Schroth, T. Janner, Web 2.0 and soa: Converging concepts enabling the internet of services, IT Professional 9 (3), (2007).
P. Buxmann, T. Hess, R. Ruggaber, Internet of services, Business and
Information Systems Engineering 1 (5).
S. Tarkoma et al., The Publish/Subscribe Internet Routing Paradigm
(PSIRP): Designing the Future Internet Architecture, IOS Press, 2009.
ONF, Open networking foundation, (2012). URL www.opennetworking.org. N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson,
J. Rexford, S. Shenker, J. Turner, Openflow: enabling innovation in campus networks, SIGCOMM Comput. Commun. Rev. 38 (2) (2008).
L. Ruiz, J. Nogueira, A. Loureiro, MANNA: A management architecture for Wireless Sensor Networks, IEEE Communications
Magazine, February (2003).
J. Kephart, D. Chess, The vision of autonomic computing, Computer 36
(1) (2003).
T. Braga, F. Silva, J. Nogueira, A. Loureiro, L. Ruiz, A tiny and lightweight autonomic element for wireless sensor networks, IEEE Fourth
International Conference on Autonomic Computing (ICAC’07), 2007.
D. Trossen, M. Sarela, K. Sollins, Arguments for an information-centric internetworking architecture, SIGCOMM Comput. Commun. Rev. 40
(2010).
C. Dannewitz, Netinf: An information-centric design for the future internet, in: Proc. 3rd GI ITG KuVS Workshop on The Future Internet,
2009.
P. Trakadas, T. Zahariadis, H. Leligou, S. Voliotis, K. Papadopoulos,
Awissenet: Setting up a secure wireless sensor network, in: ELMAR,
2008. 50th International Symposium, Vol. 2, (2008).
K. Ashton, That ‘Internet of things’ thing, RFID Journal, (2009).
J. P. Conti, The internet of things, Communications Engineer, Vol 4,
2006.
L. Atzori, A. Iera, G. Morabito, The internet of things: A survey,
Comput. Netw. 54 (2010).
D. Papadimitriou et al., Future internet: The cross-etp vision document,
Tech. rep., Cross-ETP (2009).
H. Sundmaeker et al., Vision and challenges for realising the Internet of Things, Cluster of European Research Projects on the Internet of
Things, European Commission (2010).
T. Luo, H. Tan; T.Q.S. Quek, Sensor OpenFlow: Enabling SoftwareDefined Wireless Sensor Networks, IEEE Communications Letters, vol.16, no.11, pp.1896,1899, (2012).

Similar Documents

Free Essay

Internet of Things

...OCTOBER 29, 2015 INTERNET OF THINGS ROHAN VERMA IST659, MSIM Syracuse University Internet of Things ii When American author and politician Bruce Barton said “Talker have always ruled. They will continue to rule. The smart thing is to join them”, probably he considered only human beings to be able to communicate. However, we understand, backed by research, that all animals and plants communicate with each other and with ever advancing technologies, it has been possible for humans to communicate effectively with the modern machines as well. Which brings us to the question, can machines communicate with other machines? Can we envisage an environment in which objects, animals or people have communication channels which do not require human-to-human or human-to-computer interaction for interaction? The Internet of Things(IoT) helps create an environment in which machines can interact amongst themselves or with living beings (human, animals and plants), where each entity is provided with unique identifiers and the ability to transfer data over a network without any human-to-human or human-to-machine interaction (Wigmore, 2014). IoT is a generic term and all entities play an active role owing to their connection to the Internet. It provides access to information, media and services, through wired and wireless broadband connections. The IoT feeds from the connections set up between the Consumer, Business and Industrial Internet to help create new services...

Words: 3338 - Pages: 14

Free Essay

Internet of Things

...11636637 Contemporary Issues in Business and Management 6BUS1101 Assignment One – The Internet of Things Contents Page | Page Number | | | 2.0 Introduction | 1 | | | 3.0 Internet of Things | | 3.1 What is Internet of Things | 1 | 3.2 Why is this a contemporary issue? | 1 | | | 4.0 Managing in an increasingly global world | 2 | | | 5.0 Environment and Culture | 2-3 | | | 6.0 Issues in managing change and innovation | 3-4 | | | 7.0 Conclusion | 5 | | | 8.0 References | 6 | | | 1.0 Introduction The following report will be all about Internet of Things. Namely, what it is, when and why it came about and what the “Things” are. Following that, why it is a contemporary issue. Finally, using theory from three topics, the opportunities and threats associated with the implementation of Internet of Things on these will be discussed. These topics are as follows; managing in an increasingly global world, environment and culture (constraints and challenges for the global manager) and issues in managing change and innovation. 2.0 Internet of Things 2.1 What is Internet of Things? So just what actually is meant by the phrase “Internet of Things”? Chaochi (2013) suggests that there are two ways in which IoT can be defined, from an economical point of view and a technical point of view. She states that economically, its about “designing new services and generating new revenue streams in the communication...

Words: 2092 - Pages: 9

Premium Essay

Internet of Things

...INTRODUCTION Internet of Things (IoT) is the present and next generation of the internet technologies. It is a global system of IP- connected computer networks, sensors, actuators, machines and devices. Merging this physical world with the virtual world of the internet and software enables companies and consumers to create and enjoy new services that are web based business modules. Internet of things is a practical and applicable technology trends that can generate return on investment (ROI) and insights for organizations. Internet of things concept is first proposed by Kevin Aston in 1999. This concept is not new 20 years ago one MIT professor described a world where things can connect and able to share data using devices and sensors. Now the world is having a billion of smart, connected devices. The analyst firm Gartner says that by 2020 there will be over 26 billion connected devices over the world. The IOT is a giant network of connected things that also includes people. The relationship will be among machine to machine, people to people, people to things and things to things. Machine to machine focuses on connections to devices. It captures data at end points and transmits it across local and WAN’s to generate specific alerts or actions. Technologies used in IOT: Radio frequency identification (RFID) identifies objects or people it does not require human intervention, it will read tag ID and it passes things to a host computer system. It is used in logistics and transportation...

Words: 753 - Pages: 4

Free Essay

Internet of Things

...Uniquely identifiable objects and their virtual representations in an Internet like structure. • IoT – connects people and things anytime, anyplace with anything and anyone. • Introduced by Kevin Ashton in 1998. • It aims at a future where everyday physical objects will be connected to the Internet and will be able to identify themselves to other devices. • The things become context aware and they can sense, communicate, interact, exchange data, information and knowledge. • IoT gives smarter homes and offices, smarter transportation systems, smarter hospitals, smarter enterprises and factories. • In future it is expected to revolutionize the Aerospace and aviation Industry, Automotive Industry, Health Care industry, Retail, logistics and SCM, transportation, Media, Insurance… • Cisco, GE, IBM, Capgemini are already into consulting for IoT Skill Set Required • Aviation Industry • Independent Living • Medicine and Healthcare industry • Environment monitoring • Construction • Transportation Industry • MQTT: a protocol for collecting device data and communicating it to servers (D2S) • XMPP: a protocol best for connecting devices to people • DDS: a fast bus for integrating intelligent machines (D2D) • AMQP: a queuing system designed to connect servers to each other (S2S) • Wireless SoC(System on Chip) – built-in security features • Smart Dust to Interplanetary Internet • Riot OS -programming in C or C++ and can run both 16 and 32-bit platforms ...

Words: 306 - Pages: 2

Free Essay

Internet of Things

...| Internet of Things | 2014| Pragya Vaishwanar | Aricent Marketing Research Report | Summary It’s fair to say that more people have heard of the “internet of things” than have experienced it. More objects are becoming embedded with sensors and gaining the ability to communicate. The resulting information networks promise to create new business models, improve business processes, and reduce costs and risks. There is breathless press coverage of the phenomenon—always patiently re-explained by tech pundits as the trend by which all of one’s most mundane possessions will become internet-connected. These are invariably coupled with estimates that the internet of things will be a multi-trillion dollar business. 2014 is really, finally the year that the “internet of things”—that effort to remotely control every object on earth —becomes visible in one’s everyday lives. In a sense the internet of things is already with us. For one thing, anyone with a smartphone has already joined the club. The average smartphone is brimming with sensors—an accelerometer, a compass, GPS, light, sound, altimeter. It’s the prototypical internet-connected listening station, equally adept at monitoring our health, the velocity of our car, the magnitude of earthquakes and countless other things that its creators never envisioned. Yet despite repeated declarations one of the most successful sellers of baubles that help make your home “smart,” Smart-things, has only shipped 10,000 or so units since...

Words: 13930 - Pages: 56

Free Essay

The Internet of Things

...The Internet of Things 1. Summarize what have you learnt about Industry 4.0 (The Internet of Thing) As the Internet of Things, most of organizations try to find and use lots of information from many sources such as internal and external sources, including public, suppliers, and internet in order to analyze and evaluate the projects. As the Internet, it is the most easiest and effective ways to get information or databases to analyze the efficiency of projects or operations for increasing the logistic of industries. Using internet system, it is the new challenge that most of companies adapt it in order to become successful. As the internet of things, it is the new strategy for applying with business models that how business can use technology to increase profitability and efficiency of business’ operation. There are two main types of emerging applications, including information and analysis, and automation and control as the tools for develop and improve technology to increase values and opportunities’ companies. As Information and Analysis, it is using networks to collect and link all information and data among consumers and producers for gaining and improving decision making of organization or management processes of production. There are three applications of information and analysis, which consists of tracking behavior, enhanced situational awareness, and sensor-driven decision analytics. Tracking behavior, it is using tracking product to identify details, status, and...

Words: 883 - Pages: 4

Free Essay

Internet of Things

...IoT (Hiremath, 2015) IoT stands for Internet of things which in itself explains that it is things that are connected to internet which include sensors, devices, actuators, transducers any equipment or material thing (further referred as THINGS ) which in some way are able to communicate via internet. There has been some kind of automation in industry, home, and office through various THINGS but IoT is a concept where in all these THINGS are connected to internet and communicate via internet and can be intervened or controlled through internet. They also intern generate data and can be stored on cloud for further processing or the data required for control mechanism of these THINGS may exist on cloud itself. The crux of such exercise is to achieve improved efficiency, effectiveness, accuracy and economic benefit. I chose not to tell you the whole story but few specific examples of IoT which will bring us on same page of thoughts and make us easily understand in future anything we come across which is related to IoT. Smart Home: Smart home widely working on ZigBee protocol (considered as most secured and safe till now) is basically automation of lights, AC, door lock, Curtains etc.. In home and also able to communicate via internet through a gateway to any smart device connected to internet like smart phone and be accessible to any authorised user so as to monitor or control home appliances sitting globally anywhere using a smart home specific application. For example a Chinese...

Words: 1698 - Pages: 7

Free Essay

Internet of Things

...INTERNET OF THINGS Introduction: The next wave in the era of computing will be outside the realm of the traditional desktop. In the Internet of Things (IoT) paradigm, many of the objects that surround us will be on the network in one form or another. Radio Frequency IDentification (RFID) and sensor network technologies will rise to meet this new challenge, in which information and communication systems are invisibly embedded in the environment around us. This results in the generation of enormous amounts of data which have to be stored, processed and presented in a seamless, efficient, and easily interpretable form. This model will consist of services that are commodities and delivered in a manner similar to traditional commodities. Cloud computing can provide the virtual infrastructure for such utility computing which integrates monitoring devices, storage devices, analytics tools, visualization platforms and client delivery. The cost based model that Cloud computing offers will enable end-to-end service provisioning for businesses and users to access applications on demand from anywhere. Smart connectivity with existing networks and context-aware computation using network resources is an indispensable part of IoT. With the growing presence of WiFi and 4G-LTE wireless Internet access, the evolution towards ubiquitous information and communication networks is already evident. However, for the Internet of Things vision to successfully...

Words: 858 - Pages: 4

Premium Essay

The Internet of Things

...uses, including reproduction and distribution, or selling or licensing copies, or posting to personal, institutional or third party websites are prohibited. In most cases authors are permitted to post their version of the article (e.g. in Word or Tex form) to their personal website or institutional repository. Authors requiring further information regarding Elsevier’s archiving and manuscript policies are encouraged to visit: http://www.elsevier.com/authorsrights Author's personal copy Journal of Network and Computer Applications 42 (2014) 120–134 Contents lists available at ScienceDirect Journal of Network and Computer Applications journal homepage: www.elsevier.com/locate/jnca A survey on trust management for Internet of Things Zheng Yan a,b,n,1, Peng Zhang c, Athanasios V. Vasilakos d a The State Key Laboratory of ISN, Xidian University, PO Box 119, No. 2...

Words: 18072 - Pages: 73

Free Essay

Internet of Things

...Introduction Book publishing business recently has been going through lots of changes. New technologies opened doors for new competitors in industry and started to reshaping many processes. To sustain long-term profitability publishers now must respond strategically to new competition. Natural thing to do is to track your established rivals and react accordingly. However, as you scan competitive arena, are you also looking beyond your direct competitors. As Porter explains four additional forces can hurt your prospective profits. (1)    * Savvy customers can force down prices by playing you and your rivals against one another.   * Powerful suppliers may constrain your profits if they charge higher prices.   * Aspiring entrants, armed with new capacity and hungry for market share , can ratchet up the investment up the investment required for you to stay in the game .    * Substitutes offerings can lure customers away.(1) Industry prior e-books revolution Before e- books publishing industry was highly fragmented, which was also very highly labor intensive. However, as many mature industries faces significant changes with emerging new technologies, so did and publishing.   Internet and self-publishing technologies brought more fierce rivalry into...

Words: 294 - Pages: 2

Free Essay

The Internet of Things

...THE INternet of Things THE INternet of Things Contents Abstract 1 Introduction 1 Origination 1 Definition 1 Vision of the internet of things 1 Internet of things a buzzword or future reality? 2 Applications and Business opportunities of the internet of things 3 Retail 3 Supply Chains 3 Applications within the public sector 4 Government 4 Healthcare 4 Transportation 5 Overall opportunities for business 5 Technological factors in the adoption of the internet of things. 6 Miniaturisation of devices 6 Reduction in cost of components 7 Radio Frequency Identification (RFID) 7 Internet Protocol version 6 (IPv6) 8 Increasing communication throughput and lower latency 8 Real-time Analytics 9 Cloud Computing 10 Security and Privacy 11 Cisco and its stake in the future of the internet of things 12 Company Background and activity 12 CISCOS vision 12 CISCOS stake in the internet of things. 12 Ireland and the internet of things 13 Overview 13 Blueface and IOT 13 Challenges Ireland faces in IOT adoption 14 Conclusion. 14 Abstract The following report examines the “Internet of things” (IOT) as a concept and emerging buzzword .This examination is carried out by first examining the applications and opportunities for IOT and then analysing the core technological advances in which will aid the expansion of this platform. Finally examples of those with a stake in the growth of the area within the international...

Words: 4659 - Pages: 19

Premium Essay

Internet of Things

...Internet of Things Zainab Salih National University MKT 602- Marketing Management Professor Nicole DeRogatis JAN 2016 Introduction In this report, we will analyze Wall Street article published on November 4, 2015, under the title "Capitalizing on the Promise and the Power of the Internet of Things ". The article discussed the revolution on the internet and smart devices and how that will affect the industry, design, marketing and social relation. In below analyzes, we will consider topics that related to marketing and how that will affect marketing core concepts as we know them today ,highlighting today needs to achieve success in the future The article defines the internet of things (IOT) as "a suite of technologies and processes that allows data to be tracked, analyzed, shared and acted upon through ubiquitous connectivity—may have the same impact in half that time"(WSJ, 2015). The internets of things component are the internet, smart device, and user. The smart device connected to the internet will send all operating information from the source to the data user. A dish washing machine can send operating information to the manufacture for operating analysis and calculating life cycle time and another operation fact, manufacture can estimate motor quantity needed for CMA dish machine for future forecast production at the same time Marketers can study the operation data and direct consumer either for better machine that can handle his heavy usage or may...

Words: 625 - Pages: 3

Free Essay

Internet of Things

...MAKHULO INTERNET OF THINGS |No. |Name |ADM |SIGNATURE | |1 |Vane B. B. Onwonga |KSU/NRB/012/015 | | |2 |Eric Ombasa |CBM12/10183/15 | | |3 |Vincent Master Oseko |CBM12/10220/15 | | Table of Contents What is Internet of Things 1 The Advantages of IoT 2 The Disadvantages of IoT 4 Scenarios: 6 Challenges and Concerns 8 WAYS THE INTERNET OF THINGS IS CHANGING THE WORLD 10 ENVIRONMENT 10 RECOMMENDATIONS 24 In particular, policymakers should do the following: 24 Diagram illustrating IoT 27 References 28 THE INTERNET OF THINGS (IOT) What is Internet of Things The Internet of Things (IoT) is an environment in which objects, animals or people are provided with unique identifiers and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction. IoT has evolved from the convergence of wireless technologies, micro-electromechanical systems (MEMS) and the Internet. Technologies...

Words: 7142 - Pages: 29

Premium Essay

Internet of Things

...BUS 101 E-Business Article Critique November 14, 2015 MSV, Janakiram. "AWS IoT: Amazon's Knock Out Punch To The Competition." Forbes. Forbes Magazine, 13 Oct. 2015. Web. 11 Nov. 2015. Internet of Things (IoT) is a cloud based service that allows companies and individuals to connect virtually any device internet. In the October 12, 2015 Forbes Magazine Article, author Janakiram MSV, discusses the information he learned while attending an invention conference regarding Amazon’s new IoT Platform called AWS. Janakiram MSV covered the main feature data points that make Amazon’s new AWS IoT Platform standout compared to other IoT cloud services currently being offered. The feature data points include security, protocol choice, clear separation of concerns, things shadow, and a few other features he felt were noteworthy. Before reading the article I had never heard of IoT cloud service and was curious to learn more about this newer technological advancement. The author does provide readers with a general explanation of what IoT cloud service provides to businesses and developers. He also explains how, and why, the feature data points Amazon chose to incorporate into their new AWS IoT cloud service are different, and an improvement from the other IoT cloud services available. The author does use technical names and vocabulary while discussing Amazon’s AWS IoT cloud service features making sections of the article difficult to understand if you don’t have a strong technology...

Words: 828 - Pages: 4

Premium Essay

Internet of Things

...about the commencement of The Internet. The United States Department of Defense funded a project in which a team from their Advanced Research Projects Agency (ARPA) built a network called ARPANET. The Defense Communications Agency (DCA) took over the operation of ARPANET in the 1980s which began the widespread use by colleges, government agencies and contractors to communicate and exchange data electronically. The Internet, a proper name for the global collection of publicly accessible networks, also known as the World Wide Web (WWW) runs on two networking protocols called Transmission Control Protocol/Internet Protocol (TCP/IP). TCP ensures messages are delivered reliably while IP manages the routing of the transmissions from the sender to the receiver. TCP/IP is classified as public domain because it is owned by everyone and no one and funded by the public. A major milestone for the Internet occurred in 1992 with the number of hosts reaching one million and The Internet Society (ISOC) was chartered, the parent for the boards and task forces. The second generation proved to be successful with the creation of various forums, boards and task forces that set standards and controls for the Internet. Cloud computing emerged as a popular trend for the Internet during this period as well. Most of us are just learning about Cloud computing and asking questions like: What is it exactly? How much does it cost? Where does it reside in the Internet? How does it work? Simply...

Words: 360 - Pages: 2