SlideShare una empresa de Scribd logo
1 de 20
Vishal Choudhary
vishalhim@yahoo.com
Challenges in IoT
Internet of Things (IoT) designs mesh together several
design domains in order to successfully develop a
product. Individually, these design domains are
challenging. Bringing them all together to create an IoT
product can place extreme pressure on design teams.
IOT Technologies are facing many challenges , including interoperability and
scalability, as billions of heterogeneous devices will be connected, deciding on
how to invest in the IoT is a challenge for business, and there are also major
social, legal and ethical challenges, including security and privacy of data
collection, which must be resolved
Scalability
Billions of internet-enabled devices get connected in a huge network, large
volumes of data are needed to be processed. The system that stores, analyses
the data from these IoT devices needs to be scalable. In present, the era of
IoT evolution everyday objects are connected with each other via Internet.
The raw data obtained from these devices need big data analytics and cloud
storage for interpretation of useful data.
Interoperability
Technological standards in most areas are still fragmented. These
technologies need to be converged. Which would help us in establishing a
common framework and the standard for the IoT devices. As the
standardization process is still lacking, interoperability of IoT with legacy
devices should be considered critical. This lack of interoperability is
preventing us to move towards the vision of truly connected everyday
interoperable smart objects.
Security And Privacy:
 There has been no research in security
vulnerabilities and its improvements. It should
ensure Confidentiality, Integrity and Availability of
personal data.
Design Based Challenge
With the development in technology design challenges are increasing at
a faster rate. There have been issues regarding design like limited
computation power, limited energy and limited memory which need to
be sorted out.
Standards
 Lack of standards and documented best practices have a greater impact than just
legislating the potential of IoT devices. Without standards to guide
manufacturers, developers sometimes design products that operate in distracting
ways on the Internet without much regard to their impact. If poorly designed
and configured, such devices can have incorrect consequences for the
networking resources they connect to and the broader Internet.
 A lot of this comes down to cost constraints and the need to develop a product
to release quicker than competitors. Add to this the toughness with managing
and configuring larger numbers of IoT devices, the need for thoughtful design
and standardization of configuration tools, methods, and interfaces, coupled
with the adoption of IPv6, will be essential in the future.
Regulation
there is an enormous range of regulatory and legal questions surrounding the
IoT, which need thoughtful consideration. Legal issues with IoT devices
include cross border data flow; a conflict between law enforcement
surveillance and civil rights; data retention and destruction policies; and
legal liability for unintended uses, security breaches or privacy lapses.
Further, technology is awaiting much more rapidly than the associated
policy and regulatory environments.
Compatibility
When IoT devices that have to talk to each other
are running different software versions, all kinds of
performance issues and security vulnerabilities can
result. That’s a big part of why it’s so important that
IoT consumers keep their devices patched and up to
date.
Technological Challenges
 This part is covering all technologies needed to make IoT systems
function smoothly as a standalone solution or part of existing systems
and that’s not an easy mission, there are many technological challenges,
including Security, Connectivity, Compatibility & Longevity, Standards
and Intelligent Analysis & Actions
Security
IoT has already turned into a serious security concern that has drawn the
attention of prominent tech firms and government agencies across the
world. The hacking of baby monitors, smart fridges, thermostats, drug
infusion pumps, cameras and even the radio in your car are signifying a
security nightmare being caused by the future of IoT. So many new nodes
being added to networks and the internet will provide malicious actors with
innumerable attack vectors and possibilities to carry out their evil deeds,
especially since a considerable number of them suffer from security holes.
 Insufficient testing and updating
Main problems with tech companies building these devices is that they are too careless
when it comes to handling of device-related security risks.
Most of these devices and IoT products don’t get enough updates while, some don’t
get updates at all.
This means that a device that was once thought of as secure when the customers
first bought it becomes insecure and eventually prone to hackers and other security
issues.
 Brute-forcing and the issue of default passwords
IoT devices that come with default (read, hackable) credentials such as using
“admin” as username and/or passwords. Weak credentials and login details
leave nearly all IoT devices vulnerable to password hacking and brute-forcing
in particular. any company that used factory default credentials on their
devices is placing both their business and its assets and the customers and
their valuable information at risk of being susceptible to a brute-force attack
 Data security and privacy concerns (mobile, web,
cloud)
Data is constantly being harnessed, transmitted, stored and processed
by large companies using a wide array of IoT devices, such as smart TVs,
speakers and lighting systems, all this user-data is shared between or
even sold to various companies, violating our rights for privacy and Data
security and further driving public distrust.
Connectivity
 Connecting so many devices will be one of the biggest challenges of the
future of IoT, and it will defy the very structure of current communication
models and the underlying technologies . At present we rely on the
centralized, server/client paradigm to authenticate, authorize and connect
different nodes in a network.This model is sufficient for current IoT
ecosystems, where tens, hundreds or even thousands of devices are
involved. But when networks grow to join billions and hundreds of billions
of devices, centralized systems will turn into a bottleneck. Such systems
will require huge investments and spending in maintaining cloud servers
that can handle such large amounts of information exchange, and entire
systems can go down if the server becomes unavailable.
The future of IoT will very much have to depend on decentralizing IoT
networks. Part of it can become possible by moving some of the tasks to the
edge, such as using fog computing models where smart devices such as IoT
hubs take charge of mission-critical operations and cloud servers take on
data gathering and analytical responsibilities.
Bandwidth
Connectivity is a bigger challenge to the IoT than
you might expect. As the size of the IoT market grows
exponentially, some experts are concerned that
bandwidth-intensive IoT applications such as video
streaming will soon struggle for space on the IoT’s
current server-client model.
Compatibility and Longevity
 IoT is growing in many different directions, with
many different technologies competing to become
the standard. This will cause difficulties and require
the deployment of extra hardware and software
when connecting devices.
 Other compatibility issues stem from non-unified
cloud services, lack of standardized M2M protocols
and diversities in firmware and operating systems
among IoT devices.
Some of these technologies will eventually become obsolete in the next few
years, effectively rendering the devices implementing them useless. This is
especially important, since in contrast to generic computing devices which
have a lifespan of a few years, IoT appliances (such as smart fridges or
TVs) tend to remain in service for much longer, and should be able to
function even if their manufacturer goes out of service.
Standards
 Standard for handling unstructured data: Structured data are stored in
relational databases and queried through SQL for example. Unstructured
data are stored in different types of NoSQL databases without a standard
querying approach.
 Technical skills to leverage newer aggregation tools: Companies that are
keen on leveraging big-data tools often face a shortage of talent to plan,
execute, and maintain systems.
Intelligent Analysis & Actions
 Inaccurate analysis due to flaws in the data and/or model: A lack of data or presence of
outliers may lead to false positives or false negatives, thus exposing various algorithmic
limitations
 Legacy systems’ ability to analyze unstructured data: Legacy systems are well suited to
handle structured data; unfortunately, most IoT/business interactions generate
unstructured data
 Legacy systems’ ability to manage real- time data: Traditional analytics software
generally works on batch-oriented processing, wherein all the data are loaded in a batch
and then analyzed

Más contenido relacionado

La actualidad más candente

IoT Enabling Technologies
IoT Enabling TechnologiesIoT Enabling Technologies
IoT Enabling TechnologiesPrakash Honnur
 
Iot architecture
Iot architectureIot architecture
Iot architectureAnam Iqbal
 
M2M systems layers and designs standardizations
M2M systems layers and designs standardizationsM2M systems layers and designs standardizations
M2M systems layers and designs standardizationsFabMinds
 
M2M vs IoT: The Key Differences and Similarities
M2M vs IoT: The Key Differences and SimilaritiesM2M vs IoT: The Key Differences and Similarities
M2M vs IoT: The Key Differences and SimilaritiesNavjyotsinh Jadeja
 
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoTINTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoTMuhammad Ahad
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
IoT Design Principles
IoT Design PrinciplesIoT Design Principles
IoT Design Principlesardexateam
 
Internet of Things - Recent developments and Trends
Internet of Things - Recent developments and TrendsInternet of Things - Recent developments and Trends
Internet of Things - Recent developments and TrendsDennis Jacob
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoTSKS
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Ravindra Dastikop
 
Internet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless HibernationInternet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless HibernationIRJET Journal
 
domain specific iot system
domain specific iot systemdomain specific iot system
domain specific iot systemRadha Mahalle
 

La actualidad más candente (20)

Introduction to IoT - Unit I
Introduction to IoT - Unit IIntroduction to IoT - Unit I
Introduction to IoT - Unit I
 
Iot unit i
Iot unit iIot unit i
Iot unit i
 
IoT Enabling Technologies
IoT Enabling TechnologiesIoT Enabling Technologies
IoT Enabling Technologies
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Internet of Things building blocks
Internet of Things building blocksInternet of Things building blocks
Internet of Things building blocks
 
Iot architecture
Iot architectureIot architecture
Iot architecture
 
M2M systems layers and designs standardizations
M2M systems layers and designs standardizationsM2M systems layers and designs standardizations
M2M systems layers and designs standardizations
 
A survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOTA survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOT
 
Wireless networks
Wireless networks Wireless networks
Wireless networks
 
M2M vs IoT: The Key Differences and Similarities
M2M vs IoT: The Key Differences and SimilaritiesM2M vs IoT: The Key Differences and Similarities
M2M vs IoT: The Key Differences and Similarities
 
Lecture 9
Lecture 9Lecture 9
Lecture 9
 
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoTINTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
IoT Design Principles
IoT Design PrinciplesIoT Design Principles
IoT Design Principles
 
Internet of Things - Recent developments and Trends
Internet of Things - Recent developments and TrendsInternet of Things - Recent developments and Trends
Internet of Things - Recent developments and Trends
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
 
Nazmul haq abir
Nazmul haq abirNazmul haq abir
Nazmul haq abir
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough?
 
Internet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless HibernationInternet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless Hibernation
 
domain specific iot system
domain specific iot systemdomain specific iot system
domain specific iot system
 

Similar a Lecture 14

VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 enKarel Van Isacker
 
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks
 
Key challenges facing the future of IoT
Key challenges facing the future of IoTKey challenges facing the future of IoT
Key challenges facing the future of IoTAhmed Banafa
 
Future of IoT: Key Challenges to Face
Future of IoT: Key Challenges to FaceFuture of IoT: Key Challenges to Face
Future of IoT: Key Challenges to FaceAltoros
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) Ahmed Banafa
 
IOT and Security.pptx
IOT and Security.pptxIOT and Security.pptx
IOT and Security.pptxinfosec train
 
IOT and Security.pptx
IOT and Security.pptxIOT and Security.pptx
IOT and Security.pptxInfosectrain3
 
Views and myths of IoT
Views and myths of IoTViews and myths of IoT
Views and myths of IoTAhmed Banafa
 
11 things IT leaders need to know about the internet of things
11 things IT leaders need to know about the internet of things 11 things IT leaders need to know about the internet of things
11 things IT leaders need to know about the internet of things WGroup
 
9 IoT predictions for 2019
9 IoT predictions for 20199 IoT predictions for 2019
9 IoT predictions for 2019Ahmed Banafa
 
8 trends of IoT in 2018
8 trends of IoT in 20188 trends of IoT in 2018
8 trends of IoT in 2018Ahmed Banafa
 
assignment help experts
assignment help expertsassignment help experts
assignment help experts#essaywriting
 
10 things i wish someone told me before i decided to become an io t applicati...
10 things i wish someone told me before i decided to become an io t applicati...10 things i wish someone told me before i decided to become an io t applicati...
10 things i wish someone told me before i decided to become an io t applicati...Pavan Kumar
 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Somasundaram Jambunathan
 
How to fail in the IoT business
How to fail in the IoT businessHow to fail in the IoT business
How to fail in the IoT businessPerry Lea
 
hahahafunnyjokes.blogspot.com-Complete Introduction to IoT.pdf
hahahafunnyjokes.blogspot.com-Complete Introduction to IoT.pdfhahahafunnyjokes.blogspot.com-Complete Introduction to IoT.pdf
hahahafunnyjokes.blogspot.com-Complete Introduction to IoT.pdfRamiz ALI
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSomasundaram Jambunathan
 
The internet of things(IoT)
The internet of things(IoT)The internet of things(IoT)
The internet of things(IoT)Saurabh Yadav
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscapeSamir SEHIL
 

Similar a Lecture 14 (20)

VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
 
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready Infrastructure
 
Key challenges facing the future of IoT
Key challenges facing the future of IoTKey challenges facing the future of IoT
Key challenges facing the future of IoT
 
Future of IoT: Key Challenges to Face
Future of IoT: Key Challenges to FaceFuture of IoT: Key Challenges to Face
Future of IoT: Key Challenges to Face
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference )
 
IOT and Security.pptx
IOT and Security.pptxIOT and Security.pptx
IOT and Security.pptx
 
IOT and Security.pptx
IOT and Security.pptxIOT and Security.pptx
IOT and Security.pptx
 
Views and myths of IoT
Views and myths of IoTViews and myths of IoT
Views and myths of IoT
 
11 things IT leaders need to know about the internet of things
11 things IT leaders need to know about the internet of things 11 things IT leaders need to know about the internet of things
11 things IT leaders need to know about the internet of things
 
9 IoT predictions for 2019
9 IoT predictions for 20199 IoT predictions for 2019
9 IoT predictions for 2019
 
8 trends of IoT in 2018
8 trends of IoT in 20188 trends of IoT in 2018
8 trends of IoT in 2018
 
assignment help experts
assignment help expertsassignment help experts
assignment help experts
 
sample assignment
sample assignmentsample assignment
sample assignment
 
10 things i wish someone told me before i decided to become an io t applicati...
10 things i wish someone told me before i decided to become an io t applicati...10 things i wish someone told me before i decided to become an io t applicati...
10 things i wish someone told me before i decided to become an io t applicati...
 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4
 
How to fail in the IoT business
How to fail in the IoT businessHow to fail in the IoT business
How to fail in the IoT business
 
hahahafunnyjokes.blogspot.com-Complete Introduction to IoT.pdf
hahahafunnyjokes.blogspot.com-Complete Introduction to IoT.pdfhahahafunnyjokes.blogspot.com-Complete Introduction to IoT.pdf
hahahafunnyjokes.blogspot.com-Complete Introduction to IoT.pdf
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of Things
 
The internet of things(IoT)
The internet of things(IoT)The internet of things(IoT)
The internet of things(IoT)
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscape
 

Más de vishal choudhary (20)

SE-Lecture1.ppt
SE-Lecture1.pptSE-Lecture1.ppt
SE-Lecture1.ppt
 
SE-Testing.ppt
SE-Testing.pptSE-Testing.ppt
SE-Testing.ppt
 
SE-CyclomaticComplexityand Testing.ppt
SE-CyclomaticComplexityand Testing.pptSE-CyclomaticComplexityand Testing.ppt
SE-CyclomaticComplexityand Testing.ppt
 
SE-Lecture-7.pptx
SE-Lecture-7.pptxSE-Lecture-7.pptx
SE-Lecture-7.pptx
 
Se-Lecture-6.ppt
Se-Lecture-6.pptSe-Lecture-6.ppt
Se-Lecture-6.ppt
 
SE-Lecture-5.pptx
SE-Lecture-5.pptxSE-Lecture-5.pptx
SE-Lecture-5.pptx
 
XML.pptx
XML.pptxXML.pptx
XML.pptx
 
SE-Lecture-8.pptx
SE-Lecture-8.pptxSE-Lecture-8.pptx
SE-Lecture-8.pptx
 
SE-coupling and cohesion.ppt
SE-coupling and cohesion.pptSE-coupling and cohesion.ppt
SE-coupling and cohesion.ppt
 
SE-Lecture-2.pptx
SE-Lecture-2.pptxSE-Lecture-2.pptx
SE-Lecture-2.pptx
 
SE-software design.ppt
SE-software design.pptSE-software design.ppt
SE-software design.ppt
 
SE1.ppt
SE1.pptSE1.ppt
SE1.ppt
 
SE-Lecture-4.pptx
SE-Lecture-4.pptxSE-Lecture-4.pptx
SE-Lecture-4.pptx
 
SE-Lecture=3.pptx
SE-Lecture=3.pptxSE-Lecture=3.pptx
SE-Lecture=3.pptx
 
Multimedia-Lecture-Animation.pptx
Multimedia-Lecture-Animation.pptxMultimedia-Lecture-Animation.pptx
Multimedia-Lecture-Animation.pptx
 
MultimediaLecture5.pptx
MultimediaLecture5.pptxMultimediaLecture5.pptx
MultimediaLecture5.pptx
 
Multimedia-Lecture-7.pptx
Multimedia-Lecture-7.pptxMultimedia-Lecture-7.pptx
Multimedia-Lecture-7.pptx
 
MultiMedia-Lecture-4.pptx
MultiMedia-Lecture-4.pptxMultiMedia-Lecture-4.pptx
MultiMedia-Lecture-4.pptx
 
Multimedia-Lecture-6.pptx
Multimedia-Lecture-6.pptxMultimedia-Lecture-6.pptx
Multimedia-Lecture-6.pptx
 
Multimedia-Lecture-3.pptx
Multimedia-Lecture-3.pptxMultimedia-Lecture-3.pptx
Multimedia-Lecture-3.pptx
 

Último

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 

Último (20)

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 

Lecture 14

  • 2. Internet of Things (IoT) designs mesh together several design domains in order to successfully develop a product. Individually, these design domains are challenging. Bringing them all together to create an IoT product can place extreme pressure on design teams. IOT Technologies are facing many challenges , including interoperability and scalability, as billions of heterogeneous devices will be connected, deciding on how to invest in the IoT is a challenge for business, and there are also major social, legal and ethical challenges, including security and privacy of data collection, which must be resolved
  • 3. Scalability Billions of internet-enabled devices get connected in a huge network, large volumes of data are needed to be processed. The system that stores, analyses the data from these IoT devices needs to be scalable. In present, the era of IoT evolution everyday objects are connected with each other via Internet. The raw data obtained from these devices need big data analytics and cloud storage for interpretation of useful data.
  • 4. Interoperability Technological standards in most areas are still fragmented. These technologies need to be converged. Which would help us in establishing a common framework and the standard for the IoT devices. As the standardization process is still lacking, interoperability of IoT with legacy devices should be considered critical. This lack of interoperability is preventing us to move towards the vision of truly connected everyday interoperable smart objects.
  • 5. Security And Privacy:  There has been no research in security vulnerabilities and its improvements. It should ensure Confidentiality, Integrity and Availability of personal data.
  • 6. Design Based Challenge With the development in technology design challenges are increasing at a faster rate. There have been issues regarding design like limited computation power, limited energy and limited memory which need to be sorted out.
  • 7. Standards  Lack of standards and documented best practices have a greater impact than just legislating the potential of IoT devices. Without standards to guide manufacturers, developers sometimes design products that operate in distracting ways on the Internet without much regard to their impact. If poorly designed and configured, such devices can have incorrect consequences for the networking resources they connect to and the broader Internet.  A lot of this comes down to cost constraints and the need to develop a product to release quicker than competitors. Add to this the toughness with managing and configuring larger numbers of IoT devices, the need for thoughtful design and standardization of configuration tools, methods, and interfaces, coupled with the adoption of IPv6, will be essential in the future.
  • 8. Regulation there is an enormous range of regulatory and legal questions surrounding the IoT, which need thoughtful consideration. Legal issues with IoT devices include cross border data flow; a conflict between law enforcement surveillance and civil rights; data retention and destruction policies; and legal liability for unintended uses, security breaches or privacy lapses. Further, technology is awaiting much more rapidly than the associated policy and regulatory environments.
  • 9. Compatibility When IoT devices that have to talk to each other are running different software versions, all kinds of performance issues and security vulnerabilities can result. That’s a big part of why it’s so important that IoT consumers keep their devices patched and up to date.
  • 10. Technological Challenges  This part is covering all technologies needed to make IoT systems function smoothly as a standalone solution or part of existing systems and that’s not an easy mission, there are many technological challenges, including Security, Connectivity, Compatibility & Longevity, Standards and Intelligent Analysis & Actions
  • 11. Security IoT has already turned into a serious security concern that has drawn the attention of prominent tech firms and government agencies across the world. The hacking of baby monitors, smart fridges, thermostats, drug infusion pumps, cameras and even the radio in your car are signifying a security nightmare being caused by the future of IoT. So many new nodes being added to networks and the internet will provide malicious actors with innumerable attack vectors and possibilities to carry out their evil deeds, especially since a considerable number of them suffer from security holes.
  • 12.  Insufficient testing and updating Main problems with tech companies building these devices is that they are too careless when it comes to handling of device-related security risks. Most of these devices and IoT products don’t get enough updates while, some don’t get updates at all. This means that a device that was once thought of as secure when the customers first bought it becomes insecure and eventually prone to hackers and other security issues.  Brute-forcing and the issue of default passwords IoT devices that come with default (read, hackable) credentials such as using “admin” as username and/or passwords. Weak credentials and login details leave nearly all IoT devices vulnerable to password hacking and brute-forcing in particular. any company that used factory default credentials on their devices is placing both their business and its assets and the customers and their valuable information at risk of being susceptible to a brute-force attack
  • 13.  Data security and privacy concerns (mobile, web, cloud) Data is constantly being harnessed, transmitted, stored and processed by large companies using a wide array of IoT devices, such as smart TVs, speakers and lighting systems, all this user-data is shared between or even sold to various companies, violating our rights for privacy and Data security and further driving public distrust.
  • 14. Connectivity  Connecting so many devices will be one of the biggest challenges of the future of IoT, and it will defy the very structure of current communication models and the underlying technologies . At present we rely on the centralized, server/client paradigm to authenticate, authorize and connect different nodes in a network.This model is sufficient for current IoT ecosystems, where tens, hundreds or even thousands of devices are involved. But when networks grow to join billions and hundreds of billions of devices, centralized systems will turn into a bottleneck. Such systems will require huge investments and spending in maintaining cloud servers that can handle such large amounts of information exchange, and entire systems can go down if the server becomes unavailable.
  • 15. The future of IoT will very much have to depend on decentralizing IoT networks. Part of it can become possible by moving some of the tasks to the edge, such as using fog computing models where smart devices such as IoT hubs take charge of mission-critical operations and cloud servers take on data gathering and analytical responsibilities.
  • 16. Bandwidth Connectivity is a bigger challenge to the IoT than you might expect. As the size of the IoT market grows exponentially, some experts are concerned that bandwidth-intensive IoT applications such as video streaming will soon struggle for space on the IoT’s current server-client model.
  • 17. Compatibility and Longevity  IoT is growing in many different directions, with many different technologies competing to become the standard. This will cause difficulties and require the deployment of extra hardware and software when connecting devices.  Other compatibility issues stem from non-unified cloud services, lack of standardized M2M protocols and diversities in firmware and operating systems among IoT devices.
  • 18. Some of these technologies will eventually become obsolete in the next few years, effectively rendering the devices implementing them useless. This is especially important, since in contrast to generic computing devices which have a lifespan of a few years, IoT appliances (such as smart fridges or TVs) tend to remain in service for much longer, and should be able to function even if their manufacturer goes out of service.
  • 19. Standards  Standard for handling unstructured data: Structured data are stored in relational databases and queried through SQL for example. Unstructured data are stored in different types of NoSQL databases without a standard querying approach.  Technical skills to leverage newer aggregation tools: Companies that are keen on leveraging big-data tools often face a shortage of talent to plan, execute, and maintain systems.
  • 20. Intelligent Analysis & Actions  Inaccurate analysis due to flaws in the data and/or model: A lack of data or presence of outliers may lead to false positives or false negatives, thus exposing various algorithmic limitations  Legacy systems’ ability to analyze unstructured data: Legacy systems are well suited to handle structured data; unfortunately, most IoT/business interactions generate unstructured data  Legacy systems’ ability to manage real- time data: Traditional analytics software generally works on batch-oriented processing, wherein all the data are loaded in a batch and then analyzed