Les professionnels de GBNews.ch s'allient à la puissance des technologies en intelligence artificielle générative, pour informer la communauté des affaires et le grand public, des dernières tendances et des évolutions du marché de l'emploi.

Agenda

Rencontres et Résidences ...

Du 18 septembre 2024 au 13 mai 2025

Liberté conditionnelle : ...

Du 28 juin 2024 au 2 mars 2025

Musée Ariana - ...

Du 15 novembre 2024 au 2 novembre 2025

"Carouge Magique"

Du 23 novembre 2024 au 25 février 2025

The Internet of (Risky) Things

Écrit par Akram Mohammed
Paru le 25 novembre 2020

representing the internet of things

While branding terms such as 'intelligent' or 'smart' are currently ubiquitous, the technology behind many of these new products is called the Internet of Things (IoT).

Such a novel technology is complex and confusing, for even the most qualified people in this field, let alone unspecialized ones. To this end, we will publish a series of articles about IoT to provide a complete overview of this exciting cutting-edge technology.

The beginnings

In 1999, the concept of the Internet of Things (IoT) came into existence as a result of three emerging technologies;

● Radio Frequency Identification (RFID),
● Wireless Sensor Network (WSN), and
● Machine-to-Machine Communications (M2M).

The seamless integration of physical-world objects into a digital one using already-existing technologies or infrastructures (e.g, routers, gateways, and switches) without human intervention is the ultimate objective of IoT.

What makes the IoT different

IoT objects are equipped with limited resources in terms of computational power, memory capacity, energy consumption, or bandwidth.

IoT objects, therefore, require different protocols, such as operating systems, networks, web servers, and protection measures. Under such limitations or constraints, IoT objects include temperature sensors, smartphones, air conditioning, medical equipment, light bulbs, smart grid, thermostats, and TVs. Having communicated directly without human interference, IoT objects are designed not only to fulfill their shared objectives or tasks and harmonize their decisions autonomously but also to track and monitor their environments.

IoT Applications

Various IoT systems - armed with actuators, sensors, and connectivity protocols - have been used in several sectors to provide unprecedented value for developers, governments, researchers, and companies. It is because of this emerging IoT technology that endless services and applications around us are becoming bigger and bigger.

Smart light switches, smartphones, smart cities, smart homes, and Smart Locks, for instance, are IoT applications built specifically to make our life not only easier but also more productive.

Smart homes can, for example, use sensors to reduce energy costs by detecting how many people are in each room. The temperature can be regulated automatically, for example, if a sensor detects a conference room is full of people, it turns the air conditioner on or it turns it down when everyone is left.

IoT challenges

However, the above applications have faced many challenges in terms of security, privacy, standards, and most importantly common requirements to select appropriate IoT protocols.

If such challenges are not properly addressed, the growth, as well as the existence of the IoT, will be in great danger. According to many studies, IoT objects are more vulnerable to cyber-attacks compared to traditional objects for many reasons. The next article will address these challenges in detail.

Further Reading:

A Chinese perception of "IOT" by 

Sources:

Hezam, A.A.; Konstantas, D.; Nijdam, N. A Novel Methodology for Securing IoT Objects Based on their Security Level Certificates. Preprints 2020, 2020040362 (doi: 10.20944/preprints202004.0362.v1).

Abdul-Ghani, H.A.; Konstantas, D. A Comprehensive Study of Security and Privacy Guidelines, Threats, and Countermeasures: An IoT Perspective. J. Sens. Actuator Netw. 2019, 8, 22.

Abdulghani, H.A.; Nijdam, N.A.; Collen, A.; Konstantas, D. A Study on Security and Privacy Guidelines, Countermeasures, Threats: IoT Data at Rest Perspective. Symmetry 2019, 11, 774.

Hezam Akram Abdul-Ghani, Dimitri Konstantas and Mohammed Mahyoub, “A Comprehensive IoT Attacks Survey based on a Building-blocked Reference Model” International Journal of Advanced Computer Science and Applications(ijacsa), 9(3), 2018. http://dx.doi.org/10.14569/IJACSA.2018.090349

Image:

Canva

 

Articles connexes :

Laisser un commentaire

Votre adresse e-mail ne sera pas publiée. Les champs obligatoires sont indiqués avec *

Ce site utilise Akismet pour réduire les indésirables. En savoir plus sur comment les données de vos commentaires sont utilisées.

linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram