2. What is Internet ?
A global computer network providing a variety of information and
communication facilities, consisting of interconnected networks using
standardized communication protocols.
It is a very large Wide Area Network (WAN) connecting computers and
networks around the world.
It makes possible for billions of users to connect to one another via
telephone, social media etc.
3.
4.
5.
6. Internet Present Scenario
Industry and Edge Computing are growing at an incredibly fast pace and have
become an integral part of our daily lives through applications such as
intelligent tracking system in transportation, industrial wireless automation,
public safety, personal health monitoring, and health care for the aged
community. The potential is seemingly endless. We are living in the future
that we once thought was a lifetime away.
Since IoT devices are connected with the web, they can be hacked just like
any other internet-enabled device. With such a high level of device
connectivity being brought into businesses can create a significant data
security risk. With past security alert incidents like hackers shutting down IoT
gadgets, and security attacks against enterprise infrastructure, electrical
grids, dams, etc., it seems that IoT security may not just be about home or
enterprise data security but also national security.
8. The figure below show the top Internet OF Thing (IoT)
2022 trends in India:
Smart Cities: Smart Cities is everyone’s choice today. Thanks to IoT, Smart
Cities will continue to expand its reach with hi-tech technologies that will
leverage data of IoT devices between entities. IoT provides scope for better
cities which entails smart lighting, automated parking, environment sensible
to check pollution levels, smart irrigation, waste generation, walkable
localities and smart homes to make better use of infrastructure, ensure the
safety of residents and help in the resource management efficiently.
Smart Factories: IoT can boost productivity by enabling automation and real-
time data analytics and ensure seamless operations with high-quality output
by optimizing workflows and detecting errors missed by the human eye. It can
also help to save production time and track assets in the factory and help
consolidate control rooms.
9. .
Data-Driven Healthcare: Using IoT, Healthcare service providers can access real-
time data to remotely monitor patients and mitigate the risk of diseases. As a
result, the healthcare workforce can focus more on research, learning, and
patient fulfilment.
Artificial Intelligence (AI): AI capabilities allows businesses to extract more value
out of their massive collection of data. AI will analyse the data collected through
IoT devices in various ways such as data preparation, visualization of streaming
data, real-time location, predictive analysis and so forth.
Data Processing with Edge Computing: Edge Computing stores data on a local
device near the IoT device, before sending it to the cloud that can be used for
sorting and calculating the data. In the coming years, more organizations will
adapt edge computing with affordable edge devices as there will be less
bandwidth consumption by IoT devices using Edge Computing.
Smart Retail: Retail experience is getting smarter and better with utilization of
RFID (Radio Frequency Identification Tags) and use of IoT devices. By using IoT
devices, store managers can find out the way visitors spend their time in the
stores, can track their movements and analyse, and manage inventory well.
10. .
Fitness: Real-time data from fitness trackers and health devices can provide
qualitative life by monitoring health conditions like blood pressure, blood
sugar level, heartbeat rate, etc. In an emergency, healthcare smart devices
can issue alerts to the concerned person/department.
Telecommunications: In the coming years, the number of connected devices
and IoT applications will increase with the rollout of 5G. Hence, redefining
our lives in the hyper-connected zone
11. Challenges in Securing IoT
The Internet Society (ISOC) recently released a 50-page whitepaper examining
the opportunities and challenges associated with the Internet of Things – The
Internet of Things: An Overview – Understanding the Issues and Challenges of
a More Connected World
Security
Security is an essential pillar of the Internet and one that ISOC perceives to
be equally essential and ‘the’ most significant challenge for the IoT.
Increasing the number of connected devices increases the opportunity to
exploit security vulnerabilities, as do poorly designed devices, which can
expose user data to theft by leaving data streams inadequately protected and
in some cases people’s health and safety (implanted, Internet-enabled
medical devices and hackable cars) can be put at risk.
12. .
Privacy
The IoT creates unique challenges to privacy, many that go beyond the data
privacy issues that currently exist. Much of this stems from integrating devices
into our environments without us consciously using them.
This is becoming more prevalent in consumer devices, such as tracking devices for
phones and cars as well as smart televisions. In terms of the latter, voice
recognition or vision features are being integrated that can continuously listen to
conversations or watch for activity and selectively transmit that data to a cloud
service for processing, which sometimes includes a third party. The collection of
this information exposes legal and regulatory challenges facing data protection
and privacy law.
Standard
Lack of standards and documented best practices have a greater impact than just
limiting the potential of IoT devices. As APNIC’s Geoff Huston has pointed out
previously, absence of standards can enable stupid behavior by IoT devices.
Without standards to guide manufacturers, developers sometimes design products
that operate in disruptive ways on the Internet without much regard to their
impact. If poorly designed and configured, such devices can have negative
consequences for the networking resources they connect to and the broader
Internet.
13. .
Regulation
Legal issues with IoT devices include crossborder data flow; conflict between
law enforcement surveillance and civil rights; data retention and destruction
policies; and legal liability for unintended uses, security breaches or privacy
lapses. Further, technology is advancing much more rapidly than the
associated policy and regulatory environments.
Regulatory analysis of IoT devices is increasingly being viewed from a general,
technology-neutral perspective legal lens, which seeks to prevent unfair or
deceptive practices against consumers.
14. Some of IoT Solutions:
Secure the IoT Network
Protect and secure the network connecting IoT devices to the back-end
systems on the internet by implementing traditional endpoint security
features such as antivirus, anti-malware, firewalls, and intrusion prevention
and detection systems.
Authenticate the IoT Devices
Allow the users to authenticate the IoT devices by introducing multiple user
management features for a single IoT device and implementing robust
authentication mechanisms such as two-factor authentication, digital
certificates, and biometrics.
Use IoT Data Encryption
To protect the privacy of users and prevent IoT data breaches, encrypt the
data at rest and in-transit between IoT devices and back-end systems by using
standard cryptographic algorithms and fully-encrypted key lifecycle
management processes to boost the overall security of user data and privacy.