1 / 20

Internet of Things

Internet of Things. Mi Gyeong Gwak CSC 540 – Individual Research 29 April 2014. Internet of Things ( IoT ). It is a technology that applies within a geographically circumscribed environment, where diverse objects communicate with one another through the Internet. www.control4.com.

rosine
Télécharger la présentation

Internet of Things

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Internet of Things MiGyeongGwak CSC 540 – Individual Research 29 April 2014

  2. Internet of Things (IoT) • It is a technology that applies within a geographically circumscribed environment, where diverse objects communicate with one another through the Internet. www.control4.com

  3. Defining Features of IoT • ubiquity • miniaturization • ambiguity • identification • connectivity • mediation and autonomous agency • embedded intelligence • seamless transfer • distributed control • big data • unpredictability

  4. Digital Universe Four major migrations from analog to digital 1. computer 2. phones 3. Cameras 4. machines postmastersqc.com

  5. Intel’s Estimation • 15 billion objects by 2015 • 200 billion objects by 2020 • Each person having about 26 smart objects by 2020 • Total global worth of IoT technology = $6.2 trillion • Infographic: • http://www.intel.com/content/www/us/en/intelligent-systems/iot/internet-of-things-infographic.html • http://share.cisco.com/internet-of-things.html

  6. Technology - Communication • Radio-frequency identification (RFID) • Near field communication (NFC) • Bluetooth • WiFi www.gwi.net www.mpilabels.com it.emcelettronica.com

  7. Technology - Identification • Internet Protocol version 6 (IPv6) • Internet Protocol version 4 (IPv4) • Transmission Control Protocol (TCP) • User Datagram Protocol (UDP)

  8. Hardware, Software, and Cloud Service • Gainspan • Wiznet • Nordic Semiconductor • TI • Arduino • Raspberry Pi • BeagleBone Black • RIOT OS • ThingsquareMist • ThingWorx • Evrythng • Sense

  9. Applications • Mimo monitor • BeClosesystem • dweet.io • http://postscapes.com/internet-of-things-examples/ • http://www.libelium.com/top_50_iot_sensor_applications_ranking/

  10. Ethical Issues • Privacy • Malicious usage • Cybercrime • Discrimination

  11. Examples • “It might be some effort to get this kind of scenario, but if breaking into one server means you get to ransack 100, 1,000, 10,000 people’s homes, that’s definitely worth it, and that’s where the real danger lies.“ - Rachel Metz from MIT Review • Hackers used 100,000 everyday consumer gadgets that were connected to the internet to send more than 750,000 malicious spam phishing emails to enterprises and individuals throughout the world. (Occured between December 23, 2013 and January 6)

  12. Laws and Regulations • The Fourth Amendment to the United States “the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized"

  13. “Shine the Light” law by California constitution “… outlines specific rules regarding how and when a business must disclose use of a customer's personal information and imposes civil damages for violation of the law” en.wikipedia.org

  14. The Computer Fraud and Abuse Act (CFAA) • accessing a computer without authorization and subsequently transmitting classified government information. [Subsection 1030(a)(1)]; • theft of financial information [Subsection 1030(a)(2)]; • accessing a "protected computer," which the courts have recently interpreted as being any computer connected to the internet, even if the intruder obtains no data [Subsection 1030(a)(3)]; • transmitting code that causes damage to a computer system [Subsection 1030(a)(5)]; • trafficking in computer passwords for the purpose of affecting interstate commerce or a government computer [Subsection 1030(a)(6)];

  15. The Electronic Communication Privacy Act (ECPA) • “for the increasing amount of communications and data transferred and stored on computer systems… under the law, unauthorized access to computer messages, whether in transit or in storage, is a federal crime”

  16. Conclusion • Our imagination becomes reality. • We are future computer scientists. • Building a better smart world through the IoT depends on us, on our action. tonden.wordpress.com

  17. References • http://www.livescience.com/38562-internet-of-things.html • http://www.slideshare.net/PasqualePuzio/internet-of-things-and-its-applications • http://www.intel.com/content/www/us/en/intelligent-systems/iot/internet-of-things-infographic.html • http://en.wikipedia.org/wiki/Internet_of_Things • http://searchmanufacturingerp.techtarget.com/definition/RFID • http://postscapes.com/internet-of-things-technologies • http://www.webopedia.com/DidYouKnow/Internet/ipv6_ipv4_difference.html • http://www.technologyreview.com/news/526006/an-easy-interface-for-the-internet-of-things/

  18. References • http://postscapes.com/internet-of-things-examples/ • http://www.libelium.com/top_50_iot_sensor_applications_ranking/ • http://www.dailymail.co.uk/sciencetech/article-2541306/Cyber-criminals-hack-REFRIGERATOR-send-malicious-emails-worlds-household-attack.html • https://sites.google.com/a/cortland.edu/the-internet-of-things/ethics • http://www.itu.int/en/ITU-D/Statistics/Documents/facts/ICTFactsFigures2013-e.pdfhttp://www.zdnet.com/cisco-launches-internet-of-things-security-challenge-7000026925/ • http://www.pbs.org/wgbh/pages/frontline/shows/hackers/blame/crimelaws.html

More Related