SlideShare une entreprise Scribd logo
1  sur  27
Télécharger pour lire hors ligne
1
US San Francisco Bay Area Chapter
Karen Rose
Senior Director, Strategy & Analysis
Internet Society
The Internet of Things:
An Overview
2
US San Francisco Bay Area Chapter
•  About the Internet Society
•  IoT Concepts & Drivers
•  IoT Key Challenges
Security
Privacy
Interoperability
Paper available at: http://www.internetsociety.org/IoT
3
US San Francisco Bay Area Chapter
About the
Internet Society
4
US San Francisco Bay Area Chapter
Who we are
Global not-for-profit organization, founded in 1992
Independent thought leader and advocate on issues impacting the
Internet and its users.
Organizational home of the Internet Engineering Task Force (IETF)
5
US San Francisco Bay Area Chapter
Our Mission
To promote the open development, evolution,
and use of the Internet for the benefit of all
people throughout the world.
6
US San Francisco Bay Area Chapter
Our Global Presence
116
Chapters
Worldwide
80,000+
Individual Members
143
Organization
Members
6
Regional
Bureaus
21
Countries with
ISOC Offices
NORTH AMERICA
LATIN AMERICA/CARIBBEAN
EUROPE
AFRICA
THE MIDDLE EAST
ASIA
7
US San Francisco Bay Area Chapter
How We Work We harness global expertise and
work at the at the intersection of
Internet:
•  policy,
•  technology, and
•  development
2016 Agenda Focus:
• Promoting Trust in the Internet
• Connecting the Unconnected
If you care about the Internet,
join us!
Technology
DevelopmentPolicy
8
US San Francisco Bay Area Chapter
IoT Overview: Concepts & Drivers
9
US San Francisco Bay Area Chapter
What is IoT really?
•  Despite the buzz, no single definition.
•  Or agreed numbers, or categories, or taxonomies...
•  Different emphasis on different aspects of the concept
•  Functionally: The extension of network connectivity and
computing capability to a variety of objects, devices, sensors and
everyday items allowing them to generate/exchange data, often
with remote with data analytic/management capabilities.
•  As Value: Data & what can be done with it.
•  As a Vision: The realization of a ‘hyper-connected” world.
•  This is why it matters.
•  This is why it’s hard.
One view, from McKinsey Global Institute:
10
US San Francisco Bay Area Chapter
Computers, Networks, and “Things”
“Machine to Machine” (M2M)
(~1970s +)
Internet of Things Beginnings
Carnegie Mellon Internet
Coke Machine (1982, 1990)
Trojan Room
Coffee Pot
(first webcam)
(1991)
Internet Toaster
(1990)
11
US San Francisco Bay Area Chapter
If it’s not new, why now?:
A Confluence of Market Trends
UBIQUITOUS
CONNECTIVITY
WIDESPREAD
ADOPTION OF IP
COMPUTING
ECONOMICS
MINIATURIZATION
ADVANCES IN
DATA ANALYTICSUBIQUITOUS
CONNECTIVITY
WIDESPREAD
ADOPTION OF IP
COMPUTING
ECONOMICS
MINIATURIZATION
ADVANCES IN
DATA
ANALYTICS
RISE OF CLOUD
COMPUTING
12
US San Francisco Bay Area Chapter
IoT Challenges
13
US San Francisco Bay Area Chapter
Key IoT Challenges
14
US San Francisco Bay Area Chapter
Key IoT Challenges
15
US San Francisco Bay Area Chapter
Security
16
US San Francisco Bay Area Chapter
Security Must be a Fundamental Priority
•  Security is the most pressing and important IoT challenge for industry,
users, and the Internet.
•  Growth in devices increases the surface available for cyberattack
•  Poorly secured devices affect the security of the Internet and other devices
globally, not just locally.
Developers and users of IoT devices and systems have a collective obligation
to ensure they do not expose others and the Internet itself to potential harm.
17
US San Francisco Bay Area Chapter
A Spectrum of Unique Smart Object Security Challenges
See also IETF RFC 7452 Architectural Considerations in Smart Object Networking
•  Cost/Size/Functionality
•  Volume of Identical Devices
•  Deployment at Mass Scale
•  Long Service Life
•  No / Limited Upgradability
•  Limited Visibility into Internal
Workings
•  Embedded Devices
•  Physical Security Vulnerabilities
•  Unintended Use & BYOIoT
18
US San Francisco Bay Area Chapter
Collaborative Security Approach:
See http://www.internetsociety.org/collaborativesecurity
Fostering Confidence /
Protecting Opportunities
Opportunities for individuals, business, economy and and society will only be
realized if there is confidence in the Internet, systems, and technologies
(including IoT).
Collective Responsibility
No security threats or solutions exist in isolation. Requires collective
responsibility, a common understanding of problems, shared solutions, common
benefits, and open communication channels.
Uphold Fundamental
Properties and Values
Security solutions should be fully integrated with the important objectives of
preserving the fundamental properties of the Internet and fundamental rights.
Evolution and Consensus
Security solutions need to be flexible enough to evolve over time & responsive to
new challenges. Focus needed on defining agreed problems and finding
solutions, including incremental ones.
Think Globally, Act Locally
Creating security and trust requires different players (within their respective
roles / responsibilities) to take action and close to where the issues are occurring.
Developing Solutions in the Context of Principles
19
US San Francisco Bay Area Chapter
Privacy
20
US San Francisco Bay Area Chapter
Privacy and IoT: Data is a Double-Edged Sword
•  The data streams /analytics that drive the value IoT can also paint very detailed
and intrusive pictures of our lives.
•  Expands the feasibility / reach of surveillance and tracking.
•  Redefining the debate about privacy issues
•  Can dramatically change the ways personal data is collected, analyzed,
used and protected.
•  Implications on our:
•  Basic rights
•  Sense of personal safety and control
•  Ability to trust the Internet and devices connected to it.
21
US San Francisco Bay Area Chapter
Meaningful
Awareness &
Control
Breakdown of
“Notice and
Consent”
Managing Across
Many Devices
Different Dimensions of Privacy Challenges in IoT
Individual
Preferences in
Common Contexts
Aggregation of
Personal /
Behavioral Data
Cross-Border
Data Flows
Global Data
Protection
Discrimination
Law
Enforcement
22
US San Francisco Bay Area Chapter
Enhancing Privacy in IoT
•  Strategies need to be developed that respect individual privacy choices across a
broad spectrum of expectations, while still fostering innovation in new technology
and services.
•  Traditional on-line privacy models may not fit.
•  Adapting/adopting basic privacy principles, such as:
•  Transparency/Openness
•  Meaningful Choice
•  Data Minimization
•  Use Limitation
•  Among others..
23
US San Francisco Bay Area Chapter
Interoperability &
Standards
24
US San Francisco Bay Area Chapter
I&S: Not Just a Tech Challenge, It’s a Market Issue
Overall
N. America
Europe
Source: World Economic Forum
40% Interoperability is necessary to create up to
40 percent of the economic value generated by IoT
-- McKinsey Global Institute
Efficiency
Scale
Market Value
25
US San Francisco Bay Area Chapter
Interoperability / Standards Considerations
•  Complex / Dynamic Service Delivery Chains and Use Cases
•  Land Rush and Schedule Risk
•  Proliferation of Standards Efforts
•  Industry coalitions, alliances, SDOs, proprietary development etc.
•  Can overlapping efforts be avoided without undue coordination overhead?
•  Where is Interoperability Needed?
•  Reusable Building Blocks
•  Best Practices and Reference Models
Source: xkdc
Ultimately about advancing innovation and user choice
26
US San Francisco Bay Area Chapter
Closing Thoughts
•  IoT is happening now, with tremendous transformational
potential
•  But the challenges must be addressed to realize the
opportunities and benefits
•  Significant. Real. But not insurmountable
•  Solutions won’t found by simply pitting promise vs. peril
•  It will take Informed engagement, dialogue, and
collaboration across a range of stakeholders to find solutions
and to plot the most effective ways forward.
27
US San Francisco Bay Area Chapter
Karen Rose
Sr. Director, Strategy & Analysis
rose@isoc.org
Thank You
The Internet of Things: An Overview
Understanding the Issues and Challenges of
a More Connected World
http://www.internetsociety.org/IoT

Contenu connexe

Tendances

Tendances (20)

Internet of things executive overview
Internet of things executive overviewInternet of things executive overview
Internet of things executive overview
 
Understanding big data using IoT
Understanding big data using IoTUnderstanding big data using IoT
Understanding big data using IoT
 
Iot internet-of-things-ppt
Iot internet-of-things-pptIot internet-of-things-ppt
Iot internet-of-things-ppt
 
The Internet of Things - What It Is, Where Its Headed and Its Applications
The Internet of Things - What It Is, Where Its Headed and Its ApplicationsThe Internet of Things - What It Is, Where Its Headed and Its Applications
The Internet of Things - What It Is, Where Its Headed and Its Applications
 
IOT- information Technology
IOT- information Technology IOT- information Technology
IOT- information Technology
 
IoT Training, Learn IoT From Scratch With Tonex Training
IoT Training, Learn IoT From Scratch With Tonex TrainingIoT Training, Learn IoT From Scratch With Tonex Training
IoT Training, Learn IoT From Scratch With Tonex Training
 
The Internet of Things
The Internet of ThingsThe Internet of Things
The Internet of Things
 
The Internet of Things. Wharton Guest Lecture by Sandeep Kishore – Corporate ...
The Internet of Things. Wharton Guest Lecture by Sandeep Kishore – Corporate ...The Internet of Things. Wharton Guest Lecture by Sandeep Kishore – Corporate ...
The Internet of Things. Wharton Guest Lecture by Sandeep Kishore – Corporate ...
 
what is Internet of things(iot) & how does it work
what is Internet of things(iot) & how does it workwhat is Internet of things(iot) & how does it work
what is Internet of things(iot) & how does it work
 
Education and the Internet of Things
Education and the Internet of ThingsEducation and the Internet of Things
Education and the Internet of Things
 
Internet of Things (IOT) - The Tipping Point
Internet of Things (IOT) - The Tipping PointInternet of Things (IOT) - The Tipping Point
Internet of Things (IOT) - The Tipping Point
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
An Overview of Internet of Things
An Overview of Internet of Things An Overview of Internet of Things
An Overview of Internet of Things
 
[AIIM17] Knowledge Management and the Internet of Things - Katrina Pugh
[AIIM17]  Knowledge Management and the Internet of Things - Katrina Pugh[AIIM17]  Knowledge Management and the Internet of Things - Katrina Pugh
[AIIM17] Knowledge Management and the Internet of Things - Katrina Pugh
 
Internet of things (IOT)
Internet of things (IOT)Internet of things (IOT)
Internet of things (IOT)
 
IOT - internet of Things - August 2017
IOT - internet of Things - August 2017IOT - internet of Things - August 2017
IOT - internet of Things - August 2017
 
Internet of things: New Technology and its Impact on Business Models
Internet of things: New Technology and its Impact on Business ModelsInternet of things: New Technology and its Impact on Business Models
Internet of things: New Technology and its Impact on Business Models
 
TIA DevTalk Lampung - How IoT can Reshape the Future of Digital Products
TIA DevTalk Lampung - How IoT can Reshape the Future of Digital Products TIA DevTalk Lampung - How IoT can Reshape the Future of Digital Products
TIA DevTalk Lampung - How IoT can Reshape the Future of Digital Products
 
Internet of Things
Internet of Things Internet of Things
Internet of Things
 
Sensors, Wearables and the Internet of Things: A Revolution in the Making
Sensors, Wearables and the Internet of Things: A Revolution in the MakingSensors, Wearables and the Internet of Things: A Revolution in the Making
Sensors, Wearables and the Internet of Things: A Revolution in the Making
 

En vedette

A Reference Architecture for IoT
A Reference Architecture for IoT A Reference Architecture for IoT
A Reference Architecture for IoT
WSO2
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Vala Afshar
 

En vedette (20)

2. Salles d'asile
2. Salles d'asile2. Salles d'asile
2. Salles d'asile
 
Promoting Local Content Hosting to Develop the Internet Ecosystem, A Case Stu...
Promoting Local Content Hosting to Develop the Internet Ecosystem, A Case Stu...Promoting Local Content Hosting to Develop the Internet Ecosystem, A Case Stu...
Promoting Local Content Hosting to Develop the Internet Ecosystem, A Case Stu...
 
Sustainable Brands: Engaging the Future
Sustainable Brands: Engaging the FutureSustainable Brands: Engaging the Future
Sustainable Brands: Engaging the Future
 
Technology and Innovation
Technology and InnovationTechnology and Innovation
Technology and Innovation
 
Kurtilas ra1
Kurtilas ra1Kurtilas ra1
Kurtilas ra1
 
Big data, Behavioral Change and IOT Architecture
Big data, Behavioral Change and IOT ArchitectureBig data, Behavioral Change and IOT Architecture
Big data, Behavioral Change and IOT Architecture
 
Buses isa
Buses isaBuses isa
Buses isa
 
Security issues and solutions : IoT
Security issues and solutions : IoTSecurity issues and solutions : IoT
Security issues and solutions : IoT
 
Security Issues of IoT with Fog
Security Issues of IoT with FogSecurity Issues of IoT with Fog
Security Issues of IoT with Fog
 
IoT Architecture - Are Traditional Architectures Good Enough or do we Need Ne...
IoT Architecture - Are Traditional Architectures Good Enough or do we Need Ne...IoT Architecture - Are Traditional Architectures Good Enough or do we Need Ne...
IoT Architecture - Are Traditional Architectures Good Enough or do we Need Ne...
 
IoT End-to-End Security Overview
IoT End-to-End Security OverviewIoT End-to-End Security Overview
IoT End-to-End Security Overview
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
proyecto mano amiga ong
proyecto mano amiga ongproyecto mano amiga ong
proyecto mano amiga ong
 
A Reference Architecture for IoT
A Reference Architecture for IoT A Reference Architecture for IoT
A Reference Architecture for IoT
 
What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?
 
Internet of Things Architecture / Topology
Internet of Things Architecture / TopologyInternet of Things Architecture / Topology
Internet of Things Architecture / Topology
 
IoT architecture
IoT architectureIoT architecture
IoT architecture
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 

Similaire à The Internet of Things: An Overview (IoT) ISOC SFO Chapter INET

Boston Cloud Dinner/Discussion November 2010
Boston Cloud Dinner/Discussion November 2010Boston Cloud Dinner/Discussion November 2010
Boston Cloud Dinner/Discussion November 2010
Ness Technologies
 
Saigf 15 thematic-paper 7 - A case for multi-stakeholder partnerships for cri...
Saigf 15 thematic-paper 7 - A case for multi-stakeholder partnerships for cri...Saigf 15 thematic-paper 7 - A case for multi-stakeholder partnerships for cri...
Saigf 15 thematic-paper 7 - A case for multi-stakeholder partnerships for cri...
Cade Zvavanjanja
 
Direct Project HIT Standards 10.27
Direct Project HIT Standards 10.27Direct Project HIT Standards 10.27
Direct Project HIT Standards 10.27
Brian Ahier
 

Similaire à The Internet of Things: An Overview (IoT) ISOC SFO Chapter INET (20)

Isoc bishkek 2015 11-25
Isoc bishkek 2015 11-25Isoc bishkek 2015 11-25
Isoc bishkek 2015 11-25
 
State of Florida Neo4J Graph Briefing - Keynote
State of Florida Neo4J Graph Briefing - KeynoteState of Florida Neo4J Graph Briefing - Keynote
State of Florida Neo4J Graph Briefing - Keynote
 
Cyber Security in Manufacturing
Cyber Security in ManufacturingCyber Security in Manufacturing
Cyber Security in Manufacturing
 
IT Cyber Security
IT Cyber Security IT Cyber Security
IT Cyber Security
 
ISOC and GSMA: Shared Futures, Global Opportunities
ISOC and GSMA: Shared Futures, Global OpportunitiesISOC and GSMA: Shared Futures, Global Opportunities
ISOC and GSMA: Shared Futures, Global Opportunities
 
Review of Previous ETAP Forums - Deepak Maheshwari
Review of Previous ETAP Forums - Deepak MaheshwariReview of Previous ETAP Forums - Deepak Maheshwari
Review of Previous ETAP Forums - Deepak Maheshwari
 
Nvis pitch deck version 4 - 2021 dec
Nvis pitch deck version 4 - 2021 decNvis pitch deck version 4 - 2021 dec
Nvis pitch deck version 4 - 2021 dec
 
Keynote: Graphs in Government_Lance Walter, CMO
Keynote:  Graphs in Government_Lance Walter, CMOKeynote:  Graphs in Government_Lance Walter, CMO
Keynote: Graphs in Government_Lance Walter, CMO
 
4th ICANN APAC-TWNIC Engagement Forum and 39th TWNIC OPM: Future of Internet ...
4th ICANN APAC-TWNIC Engagement Forum and 39th TWNIC OPM: Future of Internet ...4th ICANN APAC-TWNIC Engagement Forum and 39th TWNIC OPM: Future of Internet ...
4th ICANN APAC-TWNIC Engagement Forum and 39th TWNIC OPM: Future of Internet ...
 
Bhef almaden 20131122 v1
Bhef almaden 20131122 v1Bhef almaden 20131122 v1
Bhef almaden 20131122 v1
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
Boston Cloud Dinner/Discussion November 2010
Boston Cloud Dinner/Discussion November 2010Boston Cloud Dinner/Discussion November 2010
Boston Cloud Dinner/Discussion November 2010
 
UCISA 2013 Presentation
UCISA 2013 PresentationUCISA 2013 Presentation
UCISA 2013 Presentation
 
Cybersecurity Day for Parliament
Cybersecurity Day for ParliamentCybersecurity Day for Parliament
Cybersecurity Day for Parliament
 
V5I6-0559
V5I6-0559V5I6-0559
V5I6-0559
 
Saigf 15 thematic-paper 7 - A case for multi-stakeholder partnerships for cri...
Saigf 15 thematic-paper 7 - A case for multi-stakeholder partnerships for cri...Saigf 15 thematic-paper 7 - A case for multi-stakeholder partnerships for cri...
Saigf 15 thematic-paper 7 - A case for multi-stakeholder partnerships for cri...
 
IoT system development.pdf
IoT system development.pdfIoT system development.pdf
IoT system development.pdf
 
Key challenges facing the future of IoT
Key challenges facing the future of IoTKey challenges facing the future of IoT
Key challenges facing the future of IoT
 
Future of IoT: Key Challenges to Face
Future of IoT: Key Challenges to FaceFuture of IoT: Key Challenges to Face
Future of IoT: Key Challenges to Face
 
Direct Project HIT Standards 10.27
Direct Project HIT Standards 10.27Direct Project HIT Standards 10.27
Direct Project HIT Standards 10.27
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Dernier (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

The Internet of Things: An Overview (IoT) ISOC SFO Chapter INET

  • 1. 1 US San Francisco Bay Area Chapter Karen Rose Senior Director, Strategy & Analysis Internet Society The Internet of Things: An Overview
  • 2. 2 US San Francisco Bay Area Chapter •  About the Internet Society •  IoT Concepts & Drivers •  IoT Key Challenges Security Privacy Interoperability Paper available at: http://www.internetsociety.org/IoT
  • 3. 3 US San Francisco Bay Area Chapter About the Internet Society
  • 4. 4 US San Francisco Bay Area Chapter Who we are Global not-for-profit organization, founded in 1992 Independent thought leader and advocate on issues impacting the Internet and its users. Organizational home of the Internet Engineering Task Force (IETF)
  • 5. 5 US San Francisco Bay Area Chapter Our Mission To promote the open development, evolution, and use of the Internet for the benefit of all people throughout the world.
  • 6. 6 US San Francisco Bay Area Chapter Our Global Presence 116 Chapters Worldwide 80,000+ Individual Members 143 Organization Members 6 Regional Bureaus 21 Countries with ISOC Offices NORTH AMERICA LATIN AMERICA/CARIBBEAN EUROPE AFRICA THE MIDDLE EAST ASIA
  • 7. 7 US San Francisco Bay Area Chapter How We Work We harness global expertise and work at the at the intersection of Internet: •  policy, •  technology, and •  development 2016 Agenda Focus: • Promoting Trust in the Internet • Connecting the Unconnected If you care about the Internet, join us! Technology DevelopmentPolicy
  • 8. 8 US San Francisco Bay Area Chapter IoT Overview: Concepts & Drivers
  • 9. 9 US San Francisco Bay Area Chapter What is IoT really? •  Despite the buzz, no single definition. •  Or agreed numbers, or categories, or taxonomies... •  Different emphasis on different aspects of the concept •  Functionally: The extension of network connectivity and computing capability to a variety of objects, devices, sensors and everyday items allowing them to generate/exchange data, often with remote with data analytic/management capabilities. •  As Value: Data & what can be done with it. •  As a Vision: The realization of a ‘hyper-connected” world. •  This is why it matters. •  This is why it’s hard. One view, from McKinsey Global Institute:
  • 10. 10 US San Francisco Bay Area Chapter Computers, Networks, and “Things” “Machine to Machine” (M2M) (~1970s +) Internet of Things Beginnings Carnegie Mellon Internet Coke Machine (1982, 1990) Trojan Room Coffee Pot (first webcam) (1991) Internet Toaster (1990)
  • 11. 11 US San Francisco Bay Area Chapter If it’s not new, why now?: A Confluence of Market Trends UBIQUITOUS CONNECTIVITY WIDESPREAD ADOPTION OF IP COMPUTING ECONOMICS MINIATURIZATION ADVANCES IN DATA ANALYTICSUBIQUITOUS CONNECTIVITY WIDESPREAD ADOPTION OF IP COMPUTING ECONOMICS MINIATURIZATION ADVANCES IN DATA ANALYTICS RISE OF CLOUD COMPUTING
  • 12. 12 US San Francisco Bay Area Chapter IoT Challenges
  • 13. 13 US San Francisco Bay Area Chapter Key IoT Challenges
  • 14. 14 US San Francisco Bay Area Chapter Key IoT Challenges
  • 15. 15 US San Francisco Bay Area Chapter Security
  • 16. 16 US San Francisco Bay Area Chapter Security Must be a Fundamental Priority •  Security is the most pressing and important IoT challenge for industry, users, and the Internet. •  Growth in devices increases the surface available for cyberattack •  Poorly secured devices affect the security of the Internet and other devices globally, not just locally. Developers and users of IoT devices and systems have a collective obligation to ensure they do not expose others and the Internet itself to potential harm.
  • 17. 17 US San Francisco Bay Area Chapter A Spectrum of Unique Smart Object Security Challenges See also IETF RFC 7452 Architectural Considerations in Smart Object Networking •  Cost/Size/Functionality •  Volume of Identical Devices •  Deployment at Mass Scale •  Long Service Life •  No / Limited Upgradability •  Limited Visibility into Internal Workings •  Embedded Devices •  Physical Security Vulnerabilities •  Unintended Use & BYOIoT
  • 18. 18 US San Francisco Bay Area Chapter Collaborative Security Approach: See http://www.internetsociety.org/collaborativesecurity Fostering Confidence / Protecting Opportunities Opportunities for individuals, business, economy and and society will only be realized if there is confidence in the Internet, systems, and technologies (including IoT). Collective Responsibility No security threats or solutions exist in isolation. Requires collective responsibility, a common understanding of problems, shared solutions, common benefits, and open communication channels. Uphold Fundamental Properties and Values Security solutions should be fully integrated with the important objectives of preserving the fundamental properties of the Internet and fundamental rights. Evolution and Consensus Security solutions need to be flexible enough to evolve over time & responsive to new challenges. Focus needed on defining agreed problems and finding solutions, including incremental ones. Think Globally, Act Locally Creating security and trust requires different players (within their respective roles / responsibilities) to take action and close to where the issues are occurring. Developing Solutions in the Context of Principles
  • 19. 19 US San Francisco Bay Area Chapter Privacy
  • 20. 20 US San Francisco Bay Area Chapter Privacy and IoT: Data is a Double-Edged Sword •  The data streams /analytics that drive the value IoT can also paint very detailed and intrusive pictures of our lives. •  Expands the feasibility / reach of surveillance and tracking. •  Redefining the debate about privacy issues •  Can dramatically change the ways personal data is collected, analyzed, used and protected. •  Implications on our: •  Basic rights •  Sense of personal safety and control •  Ability to trust the Internet and devices connected to it.
  • 21. 21 US San Francisco Bay Area Chapter Meaningful Awareness & Control Breakdown of “Notice and Consent” Managing Across Many Devices Different Dimensions of Privacy Challenges in IoT Individual Preferences in Common Contexts Aggregation of Personal / Behavioral Data Cross-Border Data Flows Global Data Protection Discrimination Law Enforcement
  • 22. 22 US San Francisco Bay Area Chapter Enhancing Privacy in IoT •  Strategies need to be developed that respect individual privacy choices across a broad spectrum of expectations, while still fostering innovation in new technology and services. •  Traditional on-line privacy models may not fit. •  Adapting/adopting basic privacy principles, such as: •  Transparency/Openness •  Meaningful Choice •  Data Minimization •  Use Limitation •  Among others..
  • 23. 23 US San Francisco Bay Area Chapter Interoperability & Standards
  • 24. 24 US San Francisco Bay Area Chapter I&S: Not Just a Tech Challenge, It’s a Market Issue Overall N. America Europe Source: World Economic Forum 40% Interoperability is necessary to create up to 40 percent of the economic value generated by IoT -- McKinsey Global Institute Efficiency Scale Market Value
  • 25. 25 US San Francisco Bay Area Chapter Interoperability / Standards Considerations •  Complex / Dynamic Service Delivery Chains and Use Cases •  Land Rush and Schedule Risk •  Proliferation of Standards Efforts •  Industry coalitions, alliances, SDOs, proprietary development etc. •  Can overlapping efforts be avoided without undue coordination overhead? •  Where is Interoperability Needed? •  Reusable Building Blocks •  Best Practices and Reference Models Source: xkdc Ultimately about advancing innovation and user choice
  • 26. 26 US San Francisco Bay Area Chapter Closing Thoughts •  IoT is happening now, with tremendous transformational potential •  But the challenges must be addressed to realize the opportunities and benefits •  Significant. Real. But not insurmountable •  Solutions won’t found by simply pitting promise vs. peril •  It will take Informed engagement, dialogue, and collaboration across a range of stakeholders to find solutions and to plot the most effective ways forward.
  • 27. 27 US San Francisco Bay Area Chapter Karen Rose Sr. Director, Strategy & Analysis rose@isoc.org Thank You The Internet of Things: An Overview Understanding the Issues and Challenges of a More Connected World http://www.internetsociety.org/IoT