2. Introduction
"In the next century, planet earth will don an electronic skin. It will use the Internet as a
scaffold to support and transmit its sensations."- Neil Gross, 1999
In a recent study, the researchers have predicted that the Internet will double in size every
5.32 years
By 2020, 20 billion devices will be in use in the world [0]
3. Concept
The Internet of Things is an emerging global Internet-based technical architecture
facilitating the exchange of goods in a global supply-chain network.[1]
Rapid advancement in technology in just 21 years
IPv6 communication
Protocol for M2M communication
Smart sensors
Cloud storage
Sophisticated algorithms via machine learning
4.
5. Aims & Objectives
To assimilate the concept of IoT
To dejargonise the terms of IoT
To familiarize with devices and technologies that can be employed to realize IoT
To gauge the potential of IoT, focusing on the 'home automation and security' space
To analyze the threats and challenges associated with it
6. Applications
Smart cities
Smart environment
Smart metering
Security and emergencies
Retail
Industrial control
Home automation
Health
7. Area of focus
Home automation & security
Smart Appliances
Everyday processes: automated
Temperature, humidity and quality controlled environment
Security from thefts and attacks
Safety for all family members
8.
9. Home automation & Security
A “smart home” can be defined as a residence equipped with computing and
information technology which anticipates and responds to the need of its
occupants, working to promote their comfort, convenience, security and entertainment
through the management of technology within the home and connections to the world
beyond. [2]
10. Home automation & security
Internet of things can be used to bolster home security by using devices that monitor
unexpected movement, thermal radiations and unwarranted entry. [3]
12. Challenges and Threats
Connectivity challenges (Bluetooth, WiFi, ZigBee) [4]
Security concerns (thingbots) [5]
Data theft [6]
Data generation & storage [7]
Energy challenges [8]
13.
14. Conclusion
We must expand smart- object design beyond hardware and software to include
interaction design as well as social aspects. [9]6
Building applications with RFID data in the IoT is challenging, not just because TREs provide
only low-level information but also because the metadata associated with
tags, antennas, and events must be personalized and carefully controlled to create a
safe, meaningful user experience. [10]
With the emergence of an Internet of things, new regulatory approaches to ensure its
privacy and security become necessary.[11]
15. Citations
[0] Zhang, Guo-Qing; Zhang, Guo-Qiang; Yang, Qing-Feng; Cheng, Su-Qi; and Zhou, Tao. “Evolution of the Internet and
its Cores.” New Journal of Physics 10 (2008) 123027
[1]R. H. Weber, "Internet of Things - New Security and Privacy Challenges", Computer Law & Security Review 26 (2010),
Elsevier ScienceDirect
[2] Frances K. Aldrich, “Smart Homes: past, present and future”, Inside the Smart Home 2003, Springer
[3]G. Kortuem et al, "Smart Objects as building blocks of Internet of things", IEEE Internet Computing Jan/Feb 2010, IEEE
Computer Society
[4][5]Liu, Jing, Yang Xiao, and CL Philip Chen. "Authentication and Access Control in the Internet of Things." ICDCS
Workshops. 2012., IEEE Computer Society
[6][7][8]Roman, Rodrigo, Pablo Najera, and Javier Lopez. "Securing the internet of things." Computer 44.9 (2011): 51-58.
[9]K. Ashton, "The Internet of Things' thing", RFID Journal June 2009
[10]E. Welbourne et al, "Building the Internet of Things using RFID", IEEE Internet Computing May/June 2009, IEEE
Computer Society
[11]A. Sarma et al, "Identities in the future Internet of Things", Wireless Personal Communications: An International Journal,
May 2009, ACM Digital Library& more