2. Introduction
ī "In the next century, planet earth will don an electronic skin. It will use the Internet as a
scaffold to support and transmit its sensations."- Neil Gross, 1999
ī In a recent study, the researchers have predicted that the Internet will double in size every
5.32 years
ī By 2020, 20 billion devices will be in use in the world [0]
3. Concept
ī The Internet of Things is an emerging global Internet-based technical architecture
facilitating the exchange of goods in a global supply-chain network.[1]
ī Rapid advancement in technology in just 21 years
ī IPv6 communication
ī Protocol for M2M communication
ī Smart sensors
ī Cloud storage
ī Sophisticated algorithms via machine learning
4.
5. Aims & Objectives
ī To assimilate the concept of IoT
ī To dejargonise the terms of IoT
ī To familiarize with devices and technologies that can be employed to realize IoT
ī To gauge the potential of IoT, focusing on the 'home automation and security' space
ī To analyze the threats and challenges associated with it
6. Applications
ī Smart cities
ī Smart environment
ī Smart metering
ī Security and emergencies
ī Retail
ī Industrial control
ī Home automation
ī Health
7. Area of focus
ī Home automation & security
ī Smart Appliances
ī Everyday processes: automated
ī Temperature, humidity and quality controlled environment
ī Security from thefts and attacks
ī Safety for all family members
8.
9. Home automation & Security
ī A âsmart homeâ can be defined as a residence equipped with computing and
information technology which anticipates and responds to the need of its
occupants, working to promote their comfort, convenience, security and entertainment
through the management of technology within the home and connections to the world
beyond. [2]
10. Home automation & security
ī Internet of things can be used to bolster home security by using devices that monitor
unexpected movement, thermal radiations and unwarranted entry. [3]
12. Challenges and Threats
ī Connectivity challenges (Bluetooth, WiFi, ZigBee) [4]
ī Security concerns (thingbots) [5]
ī Data theft [6]
ī Data generation & storage [7]
ī Energy challenges [8]
13.
14. Conclusion
ī We must expand smart- object design beyond hardware and software to include
interaction design as well as social aspects. [9]6
ī Building applications with RFID data in the IoT is challenging, not just because TREs provide
only low-level information but also because the metadata associated with
tags, antennas, and events must be personalized and carefully controlled to create a
safe, meaningful user experience. [10]
ī With the emergence of an Internet of things, new regulatory approaches to ensure its
privacy and security become necessary.[11]
15. Citations
[0] Zhang, Guo-Qing; Zhang, Guo-Qiang; Yang, Qing-Feng; Cheng, Su-Qi; and Zhou, Tao. âEvolution of the Internet and
its Cores.â New Journal of Physics 10 (2008) 123027
[1]R. H. Weber, "Internet of Things - New Security and Privacy Challenges", Computer Law & Security Review 26 (2010),
Elsevier ScienceDirect
[2] Frances K. Aldrich, âSmart Homes: past, present and futureâ, Inside the Smart Home 2003, Springer
[3]G. Kortuem et al, "Smart Objects as building blocks of Internet of things", IEEE Internet Computing Jan/Feb 2010, IEEE
Computer Society
[4][5]Liu, Jing, Yang Xiao, and CL Philip Chen. "Authentication and Access Control in the Internet of Things." ICDCS
Workshops. 2012., IEEE Computer Society
[6][7][8]Roman, Rodrigo, Pablo Najera, and Javier Lopez. "Securing the internet of things." Computer 44.9 (2011): 51-58.
[9]K. Ashton, "The Internet of Things' thing", RFID Journal June 2009
[10]E. Welbourne et al, "Building the Internet of Things using RFID", IEEE Internet Computing May/June 2009, IEEE
Computer Society
[11]A. Sarma et al, "Identities in the future Internet of Things", Wireless Personal Communications: An International Journal,
May 2009, ACM Digital Library& more