SlideShare a Scribd company logo
1 of 52
Internet Society © 1992–2016
Everyday items connected
to the Internet will transform
the ways we work, live, and play.
The Internet of Things
(IoT)
Presentation title – Client name
2
IoT devices will likely touch most aspects
of our lives, which suggests policy
makers will need to consider the broad
implications across a wide array of
areas.
Policy Areas Might
Benefit From a Review
Many connected devices are
designed to operate in the
background with minimal
human intervention.
Passive Engagement
How people and institutions interact with
the Internet in their personal, social, and
economic lives is changing.
Paradigm Shift
Some everyday items have
been controlled over the
Internet since the early ‘90s.
The IoT is Not New
Future
2010s
2000s
1990s
Key Considerations
Guiding Principles
4
Promote Internet and data-infrastructure growth
— Governments should promote the expansion of
both wireless and wireline infrastructure, and
remove barriers to datacentre development.
Encourage IPv6 deployment
— Governments should make IPv6 adoption a
national priority, as the IoT will drive up the
number of connected devices.
Encourage open, voluntary IoT standards
— Encourage interested stakeholders to work
together on the development of open, consensus-
based standards that support interoperability.
Adopt a collaborative, multistakeholder approach
to IoT policy discussions
— Draw on the expertise of a wide range of
stakeholders to develop appropriate solutions.
Encourage a collaborative approach to IoT
security
— Empower players to address security issues close
to where they occur – don’t centralize IoT security.
Encourage responsible design practices for IoT
services
— Security-by-design and privacy-by-design
practices for IoT devices should be encouraged.
IOT (Internet of Things):
 The Internet of things (IoT) describes the network of physical
objects “things” that are embedded with sensors, software,
and other technologies for the purpose of connecting and
exchanging data with other devices and systems over the
Internet.
 Internet technology connecting devices, machines, tools to the
internet by means of wireless technologies such as Wi-Fi
cellular technologies, Bluetooth, Zigbee and different other
wireless technologies that are available to us.
 The IoT is the network of physical objects that contain
embedded technology to communicate and sense or interact
with their internal states or the external states.
 The things that are connected to the internet are going to
be projected to cross the 20 billion figures soon. This is
what has been predicted.
 So, many things, billions and in fact, billions and trillions of
things are going to be connected to the internetwork of
things.
 Internet of things says is that the scope of this internet is
going to be expanded. So, it is going to be expanded
beyond computing and computer devices being
 It is going to interconnect different things that physical
objects that we see around us
 Different objects such as the lighting system in a room, the
lights, the fans, the air conditioners and anything and
everything including things such as the toothbrush, the
microwave oven, the refrigerator and so on.
 So forth and not only in our homes, but also in our
businesses such as internet working different machines,
internet working different equipment's and so on.
 So, each and everything that we see around us that we use
at our home in businesses, in workplaces, everything being
internet worked. So, this is the whole vision of internet work
of things, internet of things.
An Overview
An Overview
THE FLAVOUR OF THE INTERNET OF THINGS
The alarm rings. As you open your eyes blearily, you see that
it’s five minutes later than your usual wake-up time. The
clock has checked the train times online, and your train must
be delayed, so it lets you sleep in a little longer.
Contd..
 In your kitchen, a blinking light reminds you it’s time to take
your tablets. If you forget, the medicine bottle cap goes online
and emails your doctor to let her know.
 On your way out of the house, you catch a glow in the corner
of your eye. Your umbrella handle is lit up, which means that it
has checked the BBC weather reports and predicts rain. You
sigh and pick it up.
Contd..
 LCD displays tracking the buses and trains online through
GPS.
 Travel indicator
 Diet and exercise monitor
THE “INTERNET” OF “THINGS”
 All the above cases we saw used the Internet to send, receive, or
communicate information.
 And in each case, the gadget that was connected to the Internet
wasn’t a computer, tablet, or mobile phone but an object, a Thing.
 These Things are designed for a purpose: the umbrella has a
retractable canopy and a handle to hold it.
THE “INTERNET” OF “THINGS”
A bus display has to be readable to public transport users, including
the elderly and partially sighted and be able to survive poor weather
conditions and the risk of vandalism.
The sports bracelet is easy to wear while running, has a display that
is large enough and bright enough to read even when you are
moving, and will survive heat, cold, sweat, and rain.
Contd..
 So the idea of the Internet of Things suggests that rather than
having a small number of very powerful computing devices in
your life (laptop, tablet, phone, music player), you might have a
large number of devices which are perhaps less powerful
(umbrella, bracelet, mirror, fridge, shoes).
 An earlier buzzword for roughly the same concept was
“ubiquitous computing”, also known by the ugly portmanteau
“ubicomp”, and this also reflects the huge number of possible
objects that might contain computing technology.
 One of the very essential components of internet of things is
sensors and the other one is actuators.
 Whereas, the sensors basically sense the physical phenomena
that are occurring around them and the actuators basically based
on the sensed information.
What does it mean to “connect an object to
the Internet”? “sensors” and “actuators”
Contd..
An equation for the Internet of Things:
Internetwork of things can be construed to be built in two different
ways.
 Internet is going to be expanded further. It is going to become
much bigger than what it is at present with only the computers
connected.
 The other approach is to build a separate internetwork of these
physical objects from scratch.
So, one is basically expanding the existing internet
and the other one is a separate internetwork which
is going to be built from scratch. So, irrespective of
which one we adopt, each of these approaches
has its own separate challenges that have to
overcome.
The Technology of the Internet of Things
Communication, language and information exchange
Emergence of new objects
Miniaturisation and cost reduction
Some examples like high end cars
There is a real change to an object or appliance when you embed computing
power into it and another real change when you connect that power to the Internet.
Enchanted Objects
The best known of Arthur C. Clarke’s “three laws of prediction” states “Any sufficiently
advanced technology is indistinguishable from magic”.
Enchanted objects are everyday things that talk to us or to each other, and in some ways make
our lives better, delight us, and give an emotional connection.
Enchanted Objects are ordinary things, made extraordinary.
Enchanted Objects are ordinary things, augmented, connected.
Contd..
Who is Making the Internet of Things?
Contd...
There are many crossover points between all the disciplines listed
“builder of the Internet of Things”
a hacker might tinker at the prototype for a Thing; a software developer might write the online
component; a designer might turn the ugly prototype into a thing of beauty, possibly invoking the
skills of a craftsperson, and an engineer might be required to solve difficult technical challenges,
especially in scaling up to production
Design Principles for Connected Devices
•Industrial / product design
• Interface design
• Digital service design
CALM AND AMBIENT TECHNOLOGY
When the devices start interacting with people, things get more complicated.
Already we’re seeing the number of notifications, pop-ups, and indicator noises on
our computers and mobile phones proliferate. When we scale up this number to
include hundreds of new services and applications and then spread that across the
rest of the objects in our world, it will become an attention-seeking cacophony.
Mark Weiser and John Seely Brown proposed an antidote to such a problem by
suggesting we design ubiquitous computing systems to seek to blend into their
surroundings; in so doing, we could keep them in our peripheral perception until the
right time to take centre stage:
Calm technology engages both the center and the periphery of our attention, and in
fact moves back and forth between the two.
It’s a technology which informs but doesn't demand our focus or attention
Designing Calm Technology, Mark Weiser and John Seely Brown
Contd..
Calm technology or Calm design is a type of information technology where the
interaction between the technology and its user is designed to occur in the user's
periphery rather than constantly at the center of attention. Information from the
technology smoothly shifts to the user's attention when needed but otherwise stays
calmly in the user's periphery.
A great example of this approach is Live Wire, one of the first Internet of Things
devices. Created by artist Natalie Jeremijenko when she was in residence at Xerox
PARC under the guidance of Mark Weiser, Live Wire (also sometimes called
Dangling String) is a simple device: an electric motor connected to an eight-foot
long piece of plastic string. The power for the motor is provided by the data
transmissions on the Ethernet network to which it is connected, so it twitches
whenever a packet of information is sent across the network
Challenges
43
Emerging Economy and
Development Issues
Strategies need to be developed that
promote transparency, fairness, and user
choice in data collection and handling.
Privacy
How to ensure robust and
lifelong security in IoT
products and services?
Security
The rapid rate of change in IoT
technology could outpace the ability
of associated policy, legal, and
regulatory structures to adapt.
Regulatory, Legal, and
Rights Issues
The voluntary use of open,
interoperable, and widely available
standards as technical building blocks
for IoT devices will deliver greater
benefits.
Interoperability and Standards
In order for the benefits of the IoT to be
truly global, the unique needs and
challenges of implementation in less-
developed regions will need to be
addressed.
Security
• Internet of Things devices present new and unique security challenges. A collaborative
approach to IoT security will be needed to develop effective and appropriate
solutions that are well-suited to the scale and complexity of the issues.
• Devices and services with weak security are vulnerable to cyber attacks and can expose
user data to theft. Because an increasing number of IoT devices online increases the
number of potential security vulnerabilities, this a key IoT challenge to be addressed.
• Manufacturers are frequently presented with economic and technical challenges when
building and maintaining robust security features in IoT devices.
• Ensuring lifetime security in IoT products and services must be a fundamental priority to
maintaining overall user trust in this technology. Users need to trust that IoT devices and
related data services are secure, especially as they become more pervasive and
integrated into our daily lives.
• One-way hashing is a cryptographic technique used to condense an arbitrarily sized chunk
of data into a fixed-sized piece, called the hash
Privacy
The Internet of Things devices that we own aren’t the only ones that should concern us when it
comes to matters of trust.
With more sensors and devices watching us and reporting data to the Internet, the privacy of
third parties who cross our sensors’ paths (either by accident or design) is an important
consideration.
Sometimes these devices collect data about individuals without their knowledge or
informed consent.
IoT devices that collect data about people in one jurisdiction may transmit that data to another
jurisdiction for data storage or processing. Challenges can arise if the data collected is deemed
to be personal or sensitive and is subject to data protection laws in multiple jurisdictions.
Strategies need to be developed that promote transparency, fairness, and user choice in data
collection and handling, enhance user privacy rights and expectations across a range of
preferences, and foster innovation in new technology and services.
Designers of an Internet of Things service will need to balance these concerns carefully.
Interoperability and Standards
• Today’s marketplace offers a variety of technical approaches to the IoT.
Some companies see strategic advantages to developing proprietary
ecosystems, while others are developing their own approaches because
common technologies do not yet exist. A wide range of companies, industry
groups, and researchers are working on approaches that create greater IoT
interoperability and standards.
• The Internet Society believes that greater interoperability and the use of
generic, open, voluntary, and widely available standards as technical
building blocks for IoT devices and services will support greater user
benefits, innovation, and economic opportunity.
• This is because interoperability among IoT devices and data streams can
encourage innovation and provide efficiencies for device manufactures and
users, thereby increasing overall benefits and economic value.
Regulatory, Legal, and Rights Issues
• The rapid rate of change in IoT technology could outpace the ability of associated policy, legal, and regulatory
structures to adapt.
• For example, If someone is harmed as a result of an IoT device’s action or inaction, who is responsible? The
answer is often complicated, and in many instances there is not enough case law to support a position.
• IoT devices also raise potential human rights concerns regarding the pervasiveness of societal monitoring, the
secondary uses of data by the government, and access to data from personal IoT devices by law enforcement or as
evidence in legal actions, among other challenging issues.
• Given the broad nature of IoT regulatory and policy challenges, a collaborative governance approach to
policy development that relies on input and participation by a range of stakeholders is needed for the best
outcomes.
Emerging Economy and Development Issues
• The IoT holds significant promise for delivering social and economic benefits to emerging and developing
economies in areas such as sustainable agriculture, water quality and use, healthcare, industrialization, climate
monitoring, and environmental management.
• However, developing regions present unique challenges related to the deployment, growth, implementation,
and use of the technology. These challenges include the deployment of adequate Internet and basic
communications infrastructure in rural and remote areas, incentives for investment, and local participation in the
development of IoT solutions.
47
WHOSE DATA IS IT ANYWAY?
With the number of sensors being deployed, it isn’t always clear whose
data is being gathered. Consider the case of a camera deployed in an
advertising hoarding which can check to see whether people are
looking at the different adverts.
Does the data belong to the company that installed the camera or to the
members of the public who are looking at the adverts?
Adam Greenfield, a leading practitioner of urban computing, makes a
convincing argument that in a public space this data is being generated
by the public, so they should at least have equal rights to be aware of,
and also have access to, that data.
Web Thinking for Connected Devices
The Internet flourished not because it is neatly controlled from a central
location, but because it isn’t; it is a collection of services and machines
following the maxim of small pieces, loosely joined
Because the Internet is so welcoming and tolerant of all sorts of
devices and services, the endpoints have a massively disparate and
diverse range of capabilities. As a result, building services which can
be used by all of them is a nearly impossible task. However, a number
of design patterns have evolved to mitigate the problem
Compatibility issues
Affordances
Affordances are an object's properties that show the possible actions users can take with it,
thereby suggesting how they may interact with that object.
Contd..
As adoption of the Internet of Things gathers
pace, more and more of our cities, homes, and
environment will become suffused with
technology. With these additional capabilities will
come additional complexity—something that
successful designers of connected devices and
services will need to counter.
By their very nature, many of the new capabilities
added to objects will be hidden from sight or not
immediately apparent from first glance, which
makes intuitive design difficult. What are the
affordances of digitally enhanced objects?
Contd..
How do we convey to the user of an object that it can communicate with
the cloud? Or that this device is capable of short-range communication
such as RFID? What does it mean that a toy knows what the
temperature is or when it is shaken? How do you know whether your
local bus shelter is watching you or, possibly more importantly, why? An
important start is to keep the existing affordances of the object being
enhanced. Users who don’t realise that a device has any extra
capabilities should still be able to use it as if it hasn’t. Although this
principle sounds like common sense, it is often discarded due to costs or
difficulties in design

More Related Content

What's hot

Designing for an internet of things
Designing for an internet of thingsDesigning for an internet of things
Designing for an internet of things
Timo Arnall
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
u065932
 
Comm%20 tech%20final%20project
Comm%20 tech%20final%20projectComm%20 tech%20final%20project
Comm%20 tech%20final%20project
awgalv01
 
Internet Of Things A new vision of the future - Perlat Kociaj
Internet Of Things A new vision of the future - Perlat KociajInternet Of Things A new vision of the future - Perlat Kociaj
Internet Of Things A new vision of the future - Perlat Kociaj
perlatsp
 
Introducing the Internet of Things: lecture @IULM University
Introducing the Internet of Things: lecture @IULM UniversityIntroducing the Internet of Things: lecture @IULM University
Introducing the Internet of Things: lecture @IULM University
Leandro Agro'
 
Geeks bearing gifts: Unwrapping New Technologies, Version April12
Geeks bearing gifts: Unwrapping New Technologies, Version April12Geeks bearing gifts: Unwrapping New Technologies, Version April12
Geeks bearing gifts: Unwrapping New Technologies, Version April12
ayoungkin
 

What's hot (20)

Designing for an internet of things
Designing for an internet of thingsDesigning for an internet of things
Designing for an internet of things
 
Internet of Things Webinar
Internet of Things WebinarInternet of Things Webinar
Internet of Things Webinar
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Intermediate project by harsha
Intermediate project by harshaIntermediate project by harsha
Intermediate project by harsha
 
The Programmable Internet of Things
The Programmable Internet of ThingsThe Programmable Internet of Things
The Programmable Internet of Things
 
Comm%20 tech%20final%20project
Comm%20 tech%20final%20projectComm%20 tech%20final%20project
Comm%20 tech%20final%20project
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Design beyond the glowing rectangle - EuroIA2010
Design beyond the glowing rectangle - EuroIA2010Design beyond the glowing rectangle - EuroIA2010
Design beyond the glowing rectangle - EuroIA2010
 
Internet Of Things A new vision of the future - Perlat Kociaj
Internet Of Things A new vision of the future - Perlat KociajInternet Of Things A new vision of the future - Perlat Kociaj
Internet Of Things A new vision of the future - Perlat Kociaj
 
Research: The Internet of Things
Research: The Internet of ThingsResearch: The Internet of Things
Research: The Internet of Things
 
Introducing the Internet of Things: lecture @IULM University
Introducing the Internet of Things: lecture @IULM UniversityIntroducing the Internet of Things: lecture @IULM University
Introducing the Internet of Things: lecture @IULM University
 
Geeks bearing gifts: Unwrapping New Technologies, Version April12
Geeks bearing gifts: Unwrapping New Technologies, Version April12Geeks bearing gifts: Unwrapping New Technologies, Version April12
Geeks bearing gifts: Unwrapping New Technologies, Version April12
 
Iot new
Iot newIot new
Iot new
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
The Top 10 Technology Trends Of The 4th Industrial Revolution
The Top 10 Technology Trends Of The 4th Industrial RevolutionThe Top 10 Technology Trends Of The 4th Industrial Revolution
The Top 10 Technology Trends Of The 4th Industrial Revolution
 
Experimental Input and Output
Experimental Input and OutputExperimental Input and Output
Experimental Input and Output
 
Modern Technology
Modern TechnologyModern Technology
Modern Technology
 
Digital vs analogue
Digital vs analogueDigital vs analogue
Digital vs analogue
 
Ubiquitous computing abstract
Ubiquitous computing abstractUbiquitous computing abstract
Ubiquitous computing abstract
 
Role play - The internet of things - Nanotechnology
Role play - The internet of things - NanotechnologyRole play - The internet of things - Nanotechnology
Role play - The internet of things - Nanotechnology
 

Similar to Iot chap i

The Internet Of Things ( Iot And The Internet
The Internet Of Things ( Iot And The InternetThe Internet Of Things ( Iot And The Internet
The Internet Of Things ( Iot And The Internet
Michelle Singh
 
Answer Concept of the IoT (the Internet of Things)  The Interne.pdf
Answer  Concept of the IoT (the Internet of Things)  The Interne.pdfAnswer  Concept of the IoT (the Internet of Things)  The Interne.pdf
Answer Concept of the IoT (the Internet of Things)  The Interne.pdf
aptexx
 
Internet of things and nanothings workshop may 2014
Internet of things and nanothings workshop may 2014Internet of things and nanothings workshop may 2014
Internet of things and nanothings workshop may 2014
Marios Kyriazis
 

Similar to Iot chap i (20)

Internet of things Seminar Reprt
Internet of things Seminar ReprtInternet of things Seminar Reprt
Internet of things Seminar Reprt
 
The Internet Of Things ( Iot And The Internet
The Internet Of Things ( Iot And The InternetThe Internet Of Things ( Iot And The Internet
The Internet Of Things ( Iot And The Internet
 
'Sentrollers" and the Internet of Things
'Sentrollers" and the Internet of Things'Sentrollers" and the Internet of Things
'Sentrollers" and the Internet of Things
 
IoT(Internet of Things) Report
IoT(Internet of Things) ReportIoT(Internet of Things) Report
IoT(Internet of Things) Report
 
Ioe module 1
Ioe module 1Ioe module 1
Ioe module 1
 
Answer Concept of the IoT (the Internet of Things)  The Interne.pdf
Answer  Concept of the IoT (the Internet of Things)  The Interne.pdfAnswer  Concept of the IoT (the Internet of Things)  The Interne.pdf
Answer Concept of the IoT (the Internet of Things)  The Interne.pdf
 
internet of things
internet of thingsinternet of things
internet of things
 
Plugging into IoT - An Introduction to the Internet of Things
Plugging into IoT - An Introduction to the Internet of ThingsPlugging into IoT - An Introduction to the Internet of Things
Plugging into IoT - An Introduction to the Internet of Things
 
Io t an insight
Io t an insightIo t an insight
Io t an insight
 
Introduction of Internet of Things(IoT) By Thakur Pawan & Pathania Susheela
Introduction of Internet of Things(IoT) By Thakur Pawan & Pathania SusheelaIntroduction of Internet of Things(IoT) By Thakur Pawan & Pathania Susheela
Introduction of Internet of Things(IoT) By Thakur Pawan & Pathania Susheela
 
Internet of Things.
Internet of Things.Internet of Things.
Internet of Things.
 
IoT-updated.pptx
IoT-updated.pptxIoT-updated.pptx
IoT-updated.pptx
 
Internet of-thing
Internet of-thingInternet of-thing
Internet of-thing
 
Internet of things and nanothings workshop may 2014
Internet of things and nanothings workshop may 2014Internet of things and nanothings workshop may 2014
Internet of things and nanothings workshop may 2014
 
Growth Of IOT NETWORK.pptx
Growth Of IOT NETWORK.pptxGrowth Of IOT NETWORK.pptx
Growth Of IOT NETWORK.pptx
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
IoT Development - Opportunities and Challenges
IoT Development - Opportunities and ChallengesIoT Development - Opportunities and Challenges
IoT Development - Opportunities and Challenges
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Iot report
Iot reportIot report
Iot report
 
Internet of things New Version 2017 Document
Internet of things New Version 2017 DocumentInternet of things New Version 2017 Document
Internet of things New Version 2017 Document
 

Recently uploaded

AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
VictorSzoltysek
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
mohitmore19
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
VishalKumarJha10
 

Recently uploaded (20)

Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfAzure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 

Iot chap i

  • 1. Internet Society © 1992–2016 Everyday items connected to the Internet will transform the ways we work, live, and play. The Internet of Things (IoT) Presentation title – Client name
  • 2. 2 IoT devices will likely touch most aspects of our lives, which suggests policy makers will need to consider the broad implications across a wide array of areas. Policy Areas Might Benefit From a Review Many connected devices are designed to operate in the background with minimal human intervention. Passive Engagement How people and institutions interact with the Internet in their personal, social, and economic lives is changing. Paradigm Shift Some everyday items have been controlled over the Internet since the early ‘90s. The IoT is Not New Future 2010s 2000s 1990s Key Considerations
  • 3.
  • 4. Guiding Principles 4 Promote Internet and data-infrastructure growth — Governments should promote the expansion of both wireless and wireline infrastructure, and remove barriers to datacentre development. Encourage IPv6 deployment — Governments should make IPv6 adoption a national priority, as the IoT will drive up the number of connected devices. Encourage open, voluntary IoT standards — Encourage interested stakeholders to work together on the development of open, consensus- based standards that support interoperability. Adopt a collaborative, multistakeholder approach to IoT policy discussions — Draw on the expertise of a wide range of stakeholders to develop appropriate solutions. Encourage a collaborative approach to IoT security — Empower players to address security issues close to where they occur – don’t centralize IoT security. Encourage responsible design practices for IoT services — Security-by-design and privacy-by-design practices for IoT devices should be encouraged.
  • 5. IOT (Internet of Things):  The Internet of things (IoT) describes the network of physical objects “things” that are embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the Internet.  Internet technology connecting devices, machines, tools to the internet by means of wireless technologies such as Wi-Fi cellular technologies, Bluetooth, Zigbee and different other wireless technologies that are available to us.  The IoT is the network of physical objects that contain embedded technology to communicate and sense or interact with their internal states or the external states.
  • 6.  The things that are connected to the internet are going to be projected to cross the 20 billion figures soon. This is what has been predicted.  So, many things, billions and in fact, billions and trillions of things are going to be connected to the internetwork of things.  Internet of things says is that the scope of this internet is going to be expanded. So, it is going to be expanded beyond computing and computer devices being
  • 7.  It is going to interconnect different things that physical objects that we see around us  Different objects such as the lighting system in a room, the lights, the fans, the air conditioners and anything and everything including things such as the toothbrush, the microwave oven, the refrigerator and so on.  So forth and not only in our homes, but also in our businesses such as internet working different machines, internet working different equipment's and so on.
  • 8.  So, each and everything that we see around us that we use at our home in businesses, in workplaces, everything being internet worked. So, this is the whole vision of internet work of things, internet of things.
  • 11. THE FLAVOUR OF THE INTERNET OF THINGS The alarm rings. As you open your eyes blearily, you see that it’s five minutes later than your usual wake-up time. The clock has checked the train times online, and your train must be delayed, so it lets you sleep in a little longer.
  • 12. Contd..  In your kitchen, a blinking light reminds you it’s time to take your tablets. If you forget, the medicine bottle cap goes online and emails your doctor to let her know.  On your way out of the house, you catch a glow in the corner of your eye. Your umbrella handle is lit up, which means that it has checked the BBC weather reports and predicts rain. You sigh and pick it up.
  • 13. Contd..  LCD displays tracking the buses and trains online through GPS.  Travel indicator  Diet and exercise monitor
  • 14. THE “INTERNET” OF “THINGS”  All the above cases we saw used the Internet to send, receive, or communicate information.  And in each case, the gadget that was connected to the Internet wasn’t a computer, tablet, or mobile phone but an object, a Thing.  These Things are designed for a purpose: the umbrella has a retractable canopy and a handle to hold it.
  • 15. THE “INTERNET” OF “THINGS” A bus display has to be readable to public transport users, including the elderly and partially sighted and be able to survive poor weather conditions and the risk of vandalism. The sports bracelet is easy to wear while running, has a display that is large enough and bright enough to read even when you are moving, and will survive heat, cold, sweat, and rain.
  • 16. Contd..  So the idea of the Internet of Things suggests that rather than having a small number of very powerful computing devices in your life (laptop, tablet, phone, music player), you might have a large number of devices which are perhaps less powerful (umbrella, bracelet, mirror, fridge, shoes).  An earlier buzzword for roughly the same concept was “ubiquitous computing”, also known by the ugly portmanteau “ubicomp”, and this also reflects the huge number of possible objects that might contain computing technology.
  • 17.  One of the very essential components of internet of things is sensors and the other one is actuators.  Whereas, the sensors basically sense the physical phenomena that are occurring around them and the actuators basically based on the sensed information.
  • 18.
  • 19.
  • 20. What does it mean to “connect an object to the Internet”? “sensors” and “actuators”
  • 22. An equation for the Internet of Things:
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28. Internetwork of things can be construed to be built in two different ways.  Internet is going to be expanded further. It is going to become much bigger than what it is at present with only the computers connected.  The other approach is to build a separate internetwork of these physical objects from scratch.
  • 29. So, one is basically expanding the existing internet and the other one is a separate internetwork which is going to be built from scratch. So, irrespective of which one we adopt, each of these approaches has its own separate challenges that have to overcome.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35. The Technology of the Internet of Things Communication, language and information exchange Emergence of new objects Miniaturisation and cost reduction Some examples like high end cars There is a real change to an object or appliance when you embed computing power into it and another real change when you connect that power to the Internet.
  • 36. Enchanted Objects The best known of Arthur C. Clarke’s “three laws of prediction” states “Any sufficiently advanced technology is indistinguishable from magic”. Enchanted objects are everyday things that talk to us or to each other, and in some ways make our lives better, delight us, and give an emotional connection. Enchanted Objects are ordinary things, made extraordinary. Enchanted Objects are ordinary things, augmented, connected.
  • 38. Who is Making the Internet of Things?
  • 39. Contd... There are many crossover points between all the disciplines listed “builder of the Internet of Things” a hacker might tinker at the prototype for a Thing; a software developer might write the online component; a designer might turn the ugly prototype into a thing of beauty, possibly invoking the skills of a craftsperson, and an engineer might be required to solve difficult technical challenges, especially in scaling up to production
  • 40. Design Principles for Connected Devices •Industrial / product design • Interface design • Digital service design
  • 41. CALM AND AMBIENT TECHNOLOGY When the devices start interacting with people, things get more complicated. Already we’re seeing the number of notifications, pop-ups, and indicator noises on our computers and mobile phones proliferate. When we scale up this number to include hundreds of new services and applications and then spread that across the rest of the objects in our world, it will become an attention-seeking cacophony. Mark Weiser and John Seely Brown proposed an antidote to such a problem by suggesting we design ubiquitous computing systems to seek to blend into their surroundings; in so doing, we could keep them in our peripheral perception until the right time to take centre stage: Calm technology engages both the center and the periphery of our attention, and in fact moves back and forth between the two. It’s a technology which informs but doesn't demand our focus or attention Designing Calm Technology, Mark Weiser and John Seely Brown
  • 42. Contd.. Calm technology or Calm design is a type of information technology where the interaction between the technology and its user is designed to occur in the user's periphery rather than constantly at the center of attention. Information from the technology smoothly shifts to the user's attention when needed but otherwise stays calmly in the user's periphery. A great example of this approach is Live Wire, one of the first Internet of Things devices. Created by artist Natalie Jeremijenko when she was in residence at Xerox PARC under the guidance of Mark Weiser, Live Wire (also sometimes called Dangling String) is a simple device: an electric motor connected to an eight-foot long piece of plastic string. The power for the motor is provided by the data transmissions on the Ethernet network to which it is connected, so it twitches whenever a packet of information is sent across the network
  • 43. Challenges 43 Emerging Economy and Development Issues Strategies need to be developed that promote transparency, fairness, and user choice in data collection and handling. Privacy How to ensure robust and lifelong security in IoT products and services? Security The rapid rate of change in IoT technology could outpace the ability of associated policy, legal, and regulatory structures to adapt. Regulatory, Legal, and Rights Issues The voluntary use of open, interoperable, and widely available standards as technical building blocks for IoT devices will deliver greater benefits. Interoperability and Standards In order for the benefits of the IoT to be truly global, the unique needs and challenges of implementation in less- developed regions will need to be addressed.
  • 44. Security • Internet of Things devices present new and unique security challenges. A collaborative approach to IoT security will be needed to develop effective and appropriate solutions that are well-suited to the scale and complexity of the issues. • Devices and services with weak security are vulnerable to cyber attacks and can expose user data to theft. Because an increasing number of IoT devices online increases the number of potential security vulnerabilities, this a key IoT challenge to be addressed. • Manufacturers are frequently presented with economic and technical challenges when building and maintaining robust security features in IoT devices. • Ensuring lifetime security in IoT products and services must be a fundamental priority to maintaining overall user trust in this technology. Users need to trust that IoT devices and related data services are secure, especially as they become more pervasive and integrated into our daily lives. • One-way hashing is a cryptographic technique used to condense an arbitrarily sized chunk of data into a fixed-sized piece, called the hash
  • 45. Privacy The Internet of Things devices that we own aren’t the only ones that should concern us when it comes to matters of trust. With more sensors and devices watching us and reporting data to the Internet, the privacy of third parties who cross our sensors’ paths (either by accident or design) is an important consideration. Sometimes these devices collect data about individuals without their knowledge or informed consent. IoT devices that collect data about people in one jurisdiction may transmit that data to another jurisdiction for data storage or processing. Challenges can arise if the data collected is deemed to be personal or sensitive and is subject to data protection laws in multiple jurisdictions. Strategies need to be developed that promote transparency, fairness, and user choice in data collection and handling, enhance user privacy rights and expectations across a range of preferences, and foster innovation in new technology and services. Designers of an Internet of Things service will need to balance these concerns carefully.
  • 46. Interoperability and Standards • Today’s marketplace offers a variety of technical approaches to the IoT. Some companies see strategic advantages to developing proprietary ecosystems, while others are developing their own approaches because common technologies do not yet exist. A wide range of companies, industry groups, and researchers are working on approaches that create greater IoT interoperability and standards. • The Internet Society believes that greater interoperability and the use of generic, open, voluntary, and widely available standards as technical building blocks for IoT devices and services will support greater user benefits, innovation, and economic opportunity. • This is because interoperability among IoT devices and data streams can encourage innovation and provide efficiencies for device manufactures and users, thereby increasing overall benefits and economic value.
  • 47. Regulatory, Legal, and Rights Issues • The rapid rate of change in IoT technology could outpace the ability of associated policy, legal, and regulatory structures to adapt. • For example, If someone is harmed as a result of an IoT device’s action or inaction, who is responsible? The answer is often complicated, and in many instances there is not enough case law to support a position. • IoT devices also raise potential human rights concerns regarding the pervasiveness of societal monitoring, the secondary uses of data by the government, and access to data from personal IoT devices by law enforcement or as evidence in legal actions, among other challenging issues. • Given the broad nature of IoT regulatory and policy challenges, a collaborative governance approach to policy development that relies on input and participation by a range of stakeholders is needed for the best outcomes. Emerging Economy and Development Issues • The IoT holds significant promise for delivering social and economic benefits to emerging and developing economies in areas such as sustainable agriculture, water quality and use, healthcare, industrialization, climate monitoring, and environmental management. • However, developing regions present unique challenges related to the deployment, growth, implementation, and use of the technology. These challenges include the deployment of adequate Internet and basic communications infrastructure in rural and remote areas, incentives for investment, and local participation in the development of IoT solutions. 47
  • 48. WHOSE DATA IS IT ANYWAY? With the number of sensors being deployed, it isn’t always clear whose data is being gathered. Consider the case of a camera deployed in an advertising hoarding which can check to see whether people are looking at the different adverts. Does the data belong to the company that installed the camera or to the members of the public who are looking at the adverts? Adam Greenfield, a leading practitioner of urban computing, makes a convincing argument that in a public space this data is being generated by the public, so they should at least have equal rights to be aware of, and also have access to, that data.
  • 49. Web Thinking for Connected Devices The Internet flourished not because it is neatly controlled from a central location, but because it isn’t; it is a collection of services and machines following the maxim of small pieces, loosely joined Because the Internet is so welcoming and tolerant of all sorts of devices and services, the endpoints have a massively disparate and diverse range of capabilities. As a result, building services which can be used by all of them is a nearly impossible task. However, a number of design patterns have evolved to mitigate the problem Compatibility issues
  • 50. Affordances Affordances are an object's properties that show the possible actions users can take with it, thereby suggesting how they may interact with that object.
  • 51. Contd.. As adoption of the Internet of Things gathers pace, more and more of our cities, homes, and environment will become suffused with technology. With these additional capabilities will come additional complexity—something that successful designers of connected devices and services will need to counter. By their very nature, many of the new capabilities added to objects will be hidden from sight or not immediately apparent from first glance, which makes intuitive design difficult. What are the affordances of digitally enhanced objects?
  • 52. Contd.. How do we convey to the user of an object that it can communicate with the cloud? Or that this device is capable of short-range communication such as RFID? What does it mean that a toy knows what the temperature is or when it is shaken? How do you know whether your local bus shelter is watching you or, possibly more importantly, why? An important start is to keep the existing affordances of the object being enhanced. Users who don’t realise that a device has any extra capabilities should still be able to use it as if it hasn’t. Although this principle sounds like common sense, it is often discarded due to costs or difficulties in design

Editor's Notes

  1. Introduction: The Internet of Things is a broad term used to describe devices, sensors, and everyday items which are not ordinarily considered to be computers but which have Internet connectivity and computing capability. These objects include: consumer goods, cars and trucks, industrial components, wearable health monitors, and collections of devices working together to create concepts such as “smart cities” and “smart homes”. These objects collect data from their surroundings which are then transmitted and remotely analyzed to create new insights, deliver services, and control other items. It is projected that there will be 100 billion connected IoT devices by 2025. The potential for tremendous growth, innovation, applications, and services is a testament to the open nature of the Internet’s architecture and design, which does not place limits on the kinds of devices or services that can connect to it. There remain significant challenges associated with the IoT which must be addressed in order for technology to reach its full potential. These challenges include the issues of: security, privacy, interoperability, and standards, as well as regulatory and rights issues, and the readiness of emerging economies to adopt it.
  2. Key Considerations: The concept of connecting objects and items to the Internet is not new. The first everyday items to be controlled over the Internet emerged in the early 1990s and set the stage for today’s Internet of Things. How people and institutions interact with the Internet in their personal, social, and economic lives is changing. The Internet of Things may represent a shift in how users engage with and are impacted by the Internet. For example, today’s Internet experience is largely characterized by users actively downloading and generating content through their computers and smartphones. But this might be about to change… Many Internet of Things devices are designed to operate in the background. These devices send and receive data on a user’s behalf with little human intervention or even awareness; others are designed to control objects and physical assets in the world, such as vehicles and buildings, or to monitor human behavior. It is projected that there will be 100 billion connected IoT devices by 2025. If the projections and trends about the IoT become reality, we would be wise to consider the implications of a world in which the most common interaction with the Internet comes from passive engagement with connected objects, rather than active engagement with content. For example, governments may want to ensure that their policies keep pace with this rapidly changing environment. While the Internet of Things is not a particularly new idea from a technical perspective, the growth and maturity of the Internet of Things will present both new benefits and new challenges that will require shifts in policy approaches and strategies. Privacy and data security policies should be considered that reflect how the technology is evolving and its potential impacts on users. Policies that promote Internet infrastructure, the efficient use of wireless spectrum, datacenter development, and user empowerment and choice are critical to the evolution of the Internet of Things. Other policy areas may also benefit from a review. Internet of Things devices will likely touch most aspects of our lives, and are likely to be installed in our homes, workplaces, schools, hospitals, and other public spaces. As such, privacy, data security, healthcare, transportation, and technology and innovation policies will likely be impacted.
  3. Guiding Principles: The Internet Society urges governments to take the following steps to accommodate, and foster, IoT deployment: >  Promote Internet and data-infrastructure growth Governments should review their existing Internet infrastructure in light of the potential increased data communication needs of IoT devices. For example, consider removing burdensome equipment taxes or licensing requirements to encourage the development of new datacentres and physical infrastructure. >  Encourage IPv6 deployment IPv6 is an enabling technology for Internet growth, and it will become even more critical as the IoT drives up the number of connected devices. For example, governments should consider making IPv6 adoption a national priority and engage with stakeholders in their community to encourage IPv6 rollout. >  Encourage open, voluntary IoT standards The use of open, voluntary, and widely available standards as technical building blocks for IoT devices will support greater user benefits, innovation, and economic opportunity. For example, governments should refrain from mandating technical approaches to the IoT. Instead, governments should encourage industry, researchers, and other stakeholders to work together and to develop open, consensus-based standards that support interoperability. >  Adopt a collaborative, multistakeholder approach to IoT policy discussions The IoT is a challenging area for policymakers, as it is a rapidly developing environment and its technology spans many industries and uses. As a result, a collaborative governance approach that draws on the expertise and engagement of a wide range of stakeholders will be needed to develop effective and appropriate solutions. The Internet Society believes that policies should aim to promote users’ ability to connect, speak, innovate, share, choose, and trust in a manner that both promotes innovation and enables user rights. >  Encourage a collaborative approach to IoT security Participants in the IoT space should adopt a collaborative approach to security by assuming responsibility, sharing best practices and lessons learned, encouraging dialog on security issues, and emphasizing the development of flexible, shared security solutions that can adapt and evolve as threats change over time. IoT security is the collective responsibility of all who develop and use IoT devices. IoT security policy should thus focus on empowering players to address security issues close to where they occur, rather than centralizing IoT security among a few, while also preserving the fundamental properties of the Internet and user rights. >  Encourage responsible design practices for IoT sevices IoT device developers should be encouraged to respect the end-user’s privacy and data security interests and consider those interests a core element of the product-development process. They should also consider the full lifecycle of the IoT system to ensure obsolete devices don’t pose security risks and are compatible with responsible environmental stewardship. For example, governments should encourage security-by-design and privacy-by-design practices for IoT devices.
  4. Challenges: A number of challenges need to be addressed in order for the Internet of Thing’s potential benefits to individuals, societies, and economies to be fully realized: Security Internet of Things devices present new and unique security challenges. A collaborative approach to IoT security will be needed to develop effective and appropriate solutions that are well-suited to the scale and complexity of the issues. Devices and services with weak security are vulnerable to cyber attacks and can expose user data to theft. Because an increasing number of IoT devices online increases the number of potential security vulnerabilities, this a key IoT challenge to be addressed. Manufacturers are frequently presented with economic and technical challenges when building and maintaining robust security features in IoT devices. Ensuring lifetime security in IoT products and services must be a fundamental priority to maintaining overall user trust in this technology. Users need to trust that IoT devices and related data services are secure, especially as they become more pervasive and integrated into our daily lives. Privacy The ability to collect, analyze, and transform data drives much of the value of IoT devices and services. However, this data can be used to paint detailed and invasive profiles of users. This raises concerns about a potential increase in surveillance and tracking, and the amount of sensitive data that can be collected by devices operating in our homes, businesses, and public environments. Sometimes these devices collect data about individuals without their knowledge or informed consent. IoT devices that collect data about people in one jurisdiction may transmit that data to another jurisdiction for data storage or processing. Challenges can arise if the data collected is deemed to be personal or sensitive and is subject to data protection laws in multiple jurisdictions. Enabling cross-border data flows that protect privacy and promote legal certainty for users and IoT service providers will be key to promoting the global growth of the IoT. Strategies need to be developed that promote transparency, fairness, and user choice in data collection and handling, enhance user privacy rights and expectations across a range of preferences, and foster innovation in new technology and services. Interoperability and Standards Today’s marketplace offers a variety of technical approaches to the IoT. Some companies see strategic advantages to developing proprietary ecosystems, while others are developing their own approaches because common technologies do not yet exist. A wide range of companies, industry groups, and researchers are working on approaches that create greater IoT interoperability and standards. The Internet Society believes that greater interoperability and the use of generic, open, voluntary, and widely available standards as technical building blocks for IoT devices and services will support greater user benefits, innovation, and economic opportunity. This is because interoperability among IoT devices and data streams can encourage innovation and provide efficiencies for device manufactures and users, thereby increasing overall benefits and economic value. Regulatory, Legal, and Rights Issues The rapid rate of change in IoT technology could outpace the ability of associated policy, legal, and regulatory structures to adapt. For example, If someone is harmed as a result of an IoT device’s action or inaction, who is responsible? The answer is often complicated, and in many instances there is not enough case law to support a position. IoT devices also raise potential human rights concerns regarding the pervasiveness of societal monitoring, the secondary uses of data by the government, and access to data from personal IoT devices by law enforcement or as evidence in legal actions, among other challenging issues. Given the broad nature of IoT regulatory and policy challenges, a collaborative governance approach to policy development that relies on input and participation by a range of stakeholders is needed for the best outcomes. Emerging Economy and Development Issues The IoT holds significant promise for delivering social and economic benefits to emerging and developing economies in areas such as sustainable agriculture, water quality and use, healthcare, industrialization, climate monitoring, and environmental management. However, developing regions present unique challenges related to the deployment, growth, implementation, and use of the technology. These challenges include the deployment of adequate Internet and basic communications infrastructure in rural and remote areas, incentives for investment, and local participation in the development of IoT solutions.