It seems that there is a lot of confusion about what products exactly constitute the “Internet of Things”
(IoT), as well as a general skepticism as to what could actually be
gained by owning a Wi-Fi enabled coffee maker. Not to mention the very
tangible undercurrent of concern associated with fears that a malicious
programmer on the other side of the globe might hack into the family ice
maker and steal bank account numbers. These fears and misconceptions,
like many things in life, can be better grasped and put into perspective
with a more complete understanding of the wide world of the “Internet
of Things” (IoT).
In short, IoT is the tag that’s been stamped on a variety of everyday
objects from bicycles to industrial HVAC systems, with which the
widespread proliferation of the Internet has enabled to become connected
via integrated circuits, sensors, and network connectivity. This
connectivity then allows for the seamless exchange of the mountains of
data generated by these systems with the goal of improving the
efficiency, performance, and user experience of these devices. The
ultimate goal of such connectivity is the endless optimization process
with the aim of increasing the tangible value added to the end user of
these systems.
The potential applications that such interconnectivity could create
is staggering, to say the least. Certainly ongoing research in the
burgeoning field will eventually fully flesh out all of the potential
avenues that this sort of connectivity opens up. Nevertheless, a
cursory overview of the technology, its risk/reward profile, as well as a
general idea of a few affordable commercial items that are currently on
the market, would provide an excellent starting point.
Fitbit Wearable Devices are activity trackers, wireless-enabled wearable
technology devices that measure data such as the number of steps
walked, heart rate, quality of sleep, steps climbed, and other personal
metrics,
First of all, the technology starts with simple wearable health
devices that are already widely used today. Something like a heart
monitor that is able to upload and analyze massive quantities of patient
data into a private cloud server would be extremely useful for any
person suffering from a chronic heart condition. The technology would
then expand greatly from there to include anything from a digital
remotely controlled traffic sign connected to a smart traffic grid, to
intelligent grocery shopping systems whereby a refrigerator at home that
is dangerously low on milk could quite literally lead the consumer to
the milk aisle (via a smartphone), right to the shopper’s preferred
brand. In such a world, the iconic Jerry Seinfeld monologue about the
grocery shopping conundrum that occurs when it’s time to decide whether
or not to buy milk at the supermarket and the shopper mistakenly either
buys too much milk and has to consume it all before it spoils or does
not buy any milk and ends up eating dry cereal for breakfast all week,
will be a relic of ancient history.
Although the onslaught of IoT consumer items remains just around the
corner, it’s estimated that the number of connected
non-computer/PC/tablet/smartphones will reach 50 Billion devices by the year 2020. However, there are still a number of interesting devices on the market today, and the website (http://iotlist.co)
is a great place to browse many common IoT items like the Apple TV, as
well as number of other interesting niche devices such as air quality
monitors designed to help people with severe air quality allergies.
While the gigantic number of potential benefits that interconnected
everyday items could bring to the consumer is undeniable, so too is the
legitimate concerns about the security of such systems. The mountains of
personal “cloud” data that connected items would generate would be an
extremely tempting target for hackers and other others with malicious
intent. Because of this significant risk, rigorous security safeguards
must be built into architecture of IoT devices in order to maximize the
protections to safeguard personal data. In recognition of the security
challenges, the International Standards Organization (ISO) is working to
identify how their Information Security Management Systems
(ISMS) standards (ISO 27000 series standards) can be specifically
adapted or leveraged for IoT specific security
requirements. Additionally, the Standards branch of the Institute of Electrical and Electronics Engineers
(IEEE) is also working to consolidate and standardize general computer
architecture requirements with the aim of ensuring that security is
built into the base level infrastructures of IoT systems.
Some people express a more visceral and fearful reaction that this
generation and integration of massive quantities of data into the
cyber-realm is a security risk that’s far too great to be undertaken.
However, the advent of every new technology comes with an equally great
responsibility to develop, promote, and ensure responsible uses of the
technology. The invention of the automobile was a dangerous
technological advance as well, but smart investment in automobile safety
systems, modern engineered roadways, and driver safety public awareness
campaigns have helped enable safe transportation for millions of
drivers across thousands of miles. With similar upfront investments in data security infrastructure, the IoT revolution does not have to be feared but instead can be welcomed.
0 nhận xét: