2. 2
IoT devices will likely touch most aspects
of our lives, which suggests policy
makers will need to consider the broad
implications across a wide array of
areas.
Policy Areas Might
Benefit From a Review
Many connected devices are
designed to operate in the
background with minimal
human intervention.
Passive Engagement
How people and institutions interact with
the Internet in their personal, social, and
economic lives is changing.
Paradigm Shift
Some everyday items have
been controlled over the
Internet since the early ‘90s.
The IoT is Not New
Future
2010s
2000s
1990s
Key Considerations
3.
4. Guiding Principles
4
Promote Internet and data-infrastructure growth
— Governments should promote the expansion of
both wireless and wireline infrastructure, and
remove barriers to datacentre development.
Encourage IPv6 deployment
— Governments should make IPv6 adoption a
national priority, as the IoT will drive up the
number of connected devices.
Encourage open, voluntary IoT standards
— Encourage interested stakeholders to work
together on the development of open, consensus-
based standards that support interoperability.
Adopt a collaborative, multistakeholder approach
to IoT policy discussions
— Draw on the expertise of a wide range of
stakeholders to develop appropriate solutions.
Encourage a collaborative approach to IoT
security
— Empower players to address security issues close
to where they occur – don’t centralize IoT security.
Encourage responsible design practices for IoT
services
— Security-by-design and privacy-by-design
practices for IoT devices should be encouraged.
5. IOT (Internet of Things):
The Internet of things (IoT) describes the network of physical
objects “things” that are embedded with sensors, software,
and other technologies for the purpose of connecting and
exchanging data with other devices and systems over the
Internet.
Internet technology connecting devices, machines, tools to the
internet by means of wireless technologies such as Wi-Fi
cellular technologies, Bluetooth, Zigbee and different other
wireless technologies that are available to us.
The IoT is the network of physical objects that contain
embedded technology to communicate and sense or interact
with their internal states or the external states.
6. The things that are connected to the internet are going to
be projected to cross the 20 billion figures soon. This is
what has been predicted.
So, many things, billions and in fact, billions and trillions of
things are going to be connected to the internetwork of
things.
Internet of things says is that the scope of this internet is
going to be expanded. So, it is going to be expanded
beyond computing and computer devices being
7. It is going to interconnect different things that physical
objects that we see around us
Different objects such as the lighting system in a room, the
lights, the fans, the air conditioners and anything and
everything including things such as the toothbrush, the
microwave oven, the refrigerator and so on.
So forth and not only in our homes, but also in our
businesses such as internet working different machines,
internet working different equipment's and so on.
8. So, each and everything that we see around us that we use
at our home in businesses, in workplaces, everything being
internet worked. So, this is the whole vision of internet work
of things, internet of things.
11. THE FLAVOUR OF THE INTERNET OF THINGS
The alarm rings. As you open your eyes blearily, you see that
it’s five minutes later than your usual wake-up time. The
clock has checked the train times online, and your train must
be delayed, so it lets you sleep in a little longer.
12. Contd..
In your kitchen, a blinking light reminds you it’s time to take
your tablets. If you forget, the medicine bottle cap goes online
and emails your doctor to let her know.
On your way out of the house, you catch a glow in the corner
of your eye. Your umbrella handle is lit up, which means that it
has checked the BBC weather reports and predicts rain. You
sigh and pick it up.
13. Contd..
LCD displays tracking the buses and trains online through
GPS.
Travel indicator
Diet and exercise monitor
14. THE “INTERNET” OF “THINGS”
All the above cases we saw used the Internet to send, receive, or
communicate information.
And in each case, the gadget that was connected to the Internet
wasn’t a computer, tablet, or mobile phone but an object, a Thing.
These Things are designed for a purpose: the umbrella has a
retractable canopy and a handle to hold it.
15. THE “INTERNET” OF “THINGS”
A bus display has to be readable to public transport users, including
the elderly and partially sighted and be able to survive poor weather
conditions and the risk of vandalism.
The sports bracelet is easy to wear while running, has a display that
is large enough and bright enough to read even when you are
moving, and will survive heat, cold, sweat, and rain.
16. Contd..
So the idea of the Internet of Things suggests that rather than
having a small number of very powerful computing devices in
your life (laptop, tablet, phone, music player), you might have a
large number of devices which are perhaps less powerful
(umbrella, bracelet, mirror, fridge, shoes).
An earlier buzzword for roughly the same concept was
“ubiquitous computing”, also known by the ugly portmanteau
“ubicomp”, and this also reflects the huge number of possible
objects that might contain computing technology.
17. One of the very essential components of internet of things is
sensors and the other one is actuators.
Whereas, the sensors basically sense the physical phenomena
that are occurring around them and the actuators basically based
on the sensed information.
18.
19.
20. What does it mean to “connect an object to
the Internet”? “sensors” and “actuators”
28. Internetwork of things can be construed to be built in two different
ways.
Internet is going to be expanded further. It is going to become
much bigger than what it is at present with only the computers
connected.
The other approach is to build a separate internetwork of these
physical objects from scratch.
29. So, one is basically expanding the existing internet
and the other one is a separate internetwork which
is going to be built from scratch. So, irrespective of
which one we adopt, each of these approaches
has its own separate challenges that have to
overcome.
30.
31.
32.
33.
34.
35. The Technology of the Internet of Things
Communication, language and information exchange
Emergence of new objects
Miniaturisation and cost reduction
Some examples like high end cars
There is a real change to an object or appliance when you embed computing
power into it and another real change when you connect that power to the Internet.
36. Enchanted Objects
The best known of Arthur C. Clarke’s “three laws of prediction” states “Any sufficiently
advanced technology is indistinguishable from magic”.
Enchanted objects are everyday things that talk to us or to each other, and in some ways make
our lives better, delight us, and give an emotional connection.
Enchanted Objects are ordinary things, made extraordinary.
Enchanted Objects are ordinary things, augmented, connected.
39. Contd...
There are many crossover points between all the disciplines listed
“builder of the Internet of Things”
a hacker might tinker at the prototype for a Thing; a software developer might write the online
component; a designer might turn the ugly prototype into a thing of beauty, possibly invoking the
skills of a craftsperson, and an engineer might be required to solve difficult technical challenges,
especially in scaling up to production
40. Design Principles for Connected Devices
•Industrial / product design
• Interface design
• Digital service design
41. CALM AND AMBIENT TECHNOLOGY
When the devices start interacting with people, things get more complicated.
Already we’re seeing the number of notifications, pop-ups, and indicator noises on
our computers and mobile phones proliferate. When we scale up this number to
include hundreds of new services and applications and then spread that across the
rest of the objects in our world, it will become an attention-seeking cacophony.
Mark Weiser and John Seely Brown proposed an antidote to such a problem by
suggesting we design ubiquitous computing systems to seek to blend into their
surroundings; in so doing, we could keep them in our peripheral perception until the
right time to take centre stage:
Calm technology engages both the center and the periphery of our attention, and in
fact moves back and forth between the two.
It’s a technology which informs but doesn't demand our focus or attention
Designing Calm Technology, Mark Weiser and John Seely Brown
42. Contd..
Calm technology or Calm design is a type of information technology where the
interaction between the technology and its user is designed to occur in the user's
periphery rather than constantly at the center of attention. Information from the
technology smoothly shifts to the user's attention when needed but otherwise stays
calmly in the user's periphery.
A great example of this approach is Live Wire, one of the first Internet of Things
devices. Created by artist Natalie Jeremijenko when she was in residence at Xerox
PARC under the guidance of Mark Weiser, Live Wire (also sometimes called
Dangling String) is a simple device: an electric motor connected to an eight-foot
long piece of plastic string. The power for the motor is provided by the data
transmissions on the Ethernet network to which it is connected, so it twitches
whenever a packet of information is sent across the network
43. Challenges
43
Emerging Economy and
Development Issues
Strategies need to be developed that
promote transparency, fairness, and user
choice in data collection and handling.
Privacy
How to ensure robust and
lifelong security in IoT
products and services?
Security
The rapid rate of change in IoT
technology could outpace the ability
of associated policy, legal, and
regulatory structures to adapt.
Regulatory, Legal, and
Rights Issues
The voluntary use of open,
interoperable, and widely available
standards as technical building blocks
for IoT devices will deliver greater
benefits.
Interoperability and Standards
In order for the benefits of the IoT to be
truly global, the unique needs and
challenges of implementation in less-
developed regions will need to be
addressed.
44. Security
• Internet of Things devices present new and unique security challenges. A collaborative
approach to IoT security will be needed to develop effective and appropriate
solutions that are well-suited to the scale and complexity of the issues.
• Devices and services with weak security are vulnerable to cyber attacks and can expose
user data to theft. Because an increasing number of IoT devices online increases the
number of potential security vulnerabilities, this a key IoT challenge to be addressed.
• Manufacturers are frequently presented with economic and technical challenges when
building and maintaining robust security features in IoT devices.
• Ensuring lifetime security in IoT products and services must be a fundamental priority to
maintaining overall user trust in this technology. Users need to trust that IoT devices and
related data services are secure, especially as they become more pervasive and
integrated into our daily lives.
• One-way hashing is a cryptographic technique used to condense an arbitrarily sized chunk
of data into a fixed-sized piece, called the hash
45. Privacy
The Internet of Things devices that we own aren’t the only ones that should concern us when it
comes to matters of trust.
With more sensors and devices watching us and reporting data to the Internet, the privacy of
third parties who cross our sensors’ paths (either by accident or design) is an important
consideration.
Sometimes these devices collect data about individuals without their knowledge or
informed consent.
IoT devices that collect data about people in one jurisdiction may transmit that data to another
jurisdiction for data storage or processing. Challenges can arise if the data collected is deemed
to be personal or sensitive and is subject to data protection laws in multiple jurisdictions.
Strategies need to be developed that promote transparency, fairness, and user choice in data
collection and handling, enhance user privacy rights and expectations across a range of
preferences, and foster innovation in new technology and services.
Designers of an Internet of Things service will need to balance these concerns carefully.
46. Interoperability and Standards
• Today’s marketplace offers a variety of technical approaches to the IoT.
Some companies see strategic advantages to developing proprietary
ecosystems, while others are developing their own approaches because
common technologies do not yet exist. A wide range of companies, industry
groups, and researchers are working on approaches that create greater IoT
interoperability and standards.
• The Internet Society believes that greater interoperability and the use of
generic, open, voluntary, and widely available standards as technical
building blocks for IoT devices and services will support greater user
benefits, innovation, and economic opportunity.
• This is because interoperability among IoT devices and data streams can
encourage innovation and provide efficiencies for device manufactures and
users, thereby increasing overall benefits and economic value.
47. Regulatory, Legal, and Rights Issues
• The rapid rate of change in IoT technology could outpace the ability of associated policy, legal, and regulatory
structures to adapt.
• For example, If someone is harmed as a result of an IoT device’s action or inaction, who is responsible? The
answer is often complicated, and in many instances there is not enough case law to support a position.
• IoT devices also raise potential human rights concerns regarding the pervasiveness of societal monitoring, the
secondary uses of data by the government, and access to data from personal IoT devices by law enforcement or as
evidence in legal actions, among other challenging issues.
• Given the broad nature of IoT regulatory and policy challenges, a collaborative governance approach to
policy development that relies on input and participation by a range of stakeholders is needed for the best
outcomes.
Emerging Economy and Development Issues
• The IoT holds significant promise for delivering social and economic benefits to emerging and developing
economies in areas such as sustainable agriculture, water quality and use, healthcare, industrialization, climate
monitoring, and environmental management.
• However, developing regions present unique challenges related to the deployment, growth, implementation,
and use of the technology. These challenges include the deployment of adequate Internet and basic
communications infrastructure in rural and remote areas, incentives for investment, and local participation in the
development of IoT solutions.
47
48. WHOSE DATA IS IT ANYWAY?
With the number of sensors being deployed, it isn’t always clear whose
data is being gathered. Consider the case of a camera deployed in an
advertising hoarding which can check to see whether people are
looking at the different adverts.
Does the data belong to the company that installed the camera or to the
members of the public who are looking at the adverts?
Adam Greenfield, a leading practitioner of urban computing, makes a
convincing argument that in a public space this data is being generated
by the public, so they should at least have equal rights to be aware of,
and also have access to, that data.
49. Web Thinking for Connected Devices
The Internet flourished not because it is neatly controlled from a central
location, but because it isn’t; it is a collection of services and machines
following the maxim of small pieces, loosely joined
Because the Internet is so welcoming and tolerant of all sorts of
devices and services, the endpoints have a massively disparate and
diverse range of capabilities. As a result, building services which can
be used by all of them is a nearly impossible task. However, a number
of design patterns have evolved to mitigate the problem
Compatibility issues
50. Affordances
Affordances are an object's properties that show the possible actions users can take with it,
thereby suggesting how they may interact with that object.
51. Contd..
As adoption of the Internet of Things gathers
pace, more and more of our cities, homes, and
environment will become suffused with
technology. With these additional capabilities will
come additional complexity—something that
successful designers of connected devices and
services will need to counter.
By their very nature, many of the new capabilities
added to objects will be hidden from sight or not
immediately apparent from first glance, which
makes intuitive design difficult. What are the
affordances of digitally enhanced objects?
52. Contd..
How do we convey to the user of an object that it can communicate with
the cloud? Or that this device is capable of short-range communication
such as RFID? What does it mean that a toy knows what the
temperature is or when it is shaken? How do you know whether your
local bus shelter is watching you or, possibly more importantly, why? An
important start is to keep the existing affordances of the object being
enhanced. Users who don’t realise that a device has any extra
capabilities should still be able to use it as if it hasn’t. Although this
principle sounds like common sense, it is often discarded due to costs or
difficulties in design
Editor's Notes
Introduction:
The Internet of Things is a broad term used to describe devices, sensors, and everyday items which are not ordinarily considered to be computers but which have Internet connectivity and computing capability. These objects include: consumer goods, cars and trucks, industrial components, wearable health monitors, and collections of devices working together to create concepts such as “smart cities” and “smart homes”.
These objects collect data from their surroundings which are then transmitted and remotely analyzed to create new insights, deliver services, and control other items. It is projected that there will be 100 billion connected IoT devices by 2025.
The potential for tremendous growth, innovation, applications, and services is a testament to the open nature of the Internet’s architecture and design, which does not place limits on the kinds of devices or services that can connect to it.
There remain significant challenges associated with the IoT which must be addressed in order for technology to reach its full potential. These challenges include the issues of: security, privacy, interoperability, and standards, as well as regulatory and rights issues, and the readiness of emerging economies to adopt it.
Key Considerations:
The concept of connecting objects and items to the Internet is not new. The first everyday items to be controlled over the Internet emerged in the early 1990s and set the stage for today’s Internet of Things.
How people and institutions interact with the Internet in their personal, social, and economic lives is changing. The Internet of Things may represent a shift in how users engage with and are impacted by the Internet. For example, today’s Internet experience is largely characterized by users actively downloading and generating content through their computers and smartphones. But this might be about to change…
Many Internet of Things devices are designed to operate in the background. These devices send and receive data on a user’s behalf with little human intervention or even awareness; others are designed to control objects and physical assets in the world, such as vehicles and buildings, or to monitor human behavior.
It is projected that there will be 100 billion connected IoT devices by 2025. If the projections and trends about the IoT become reality, we would be wise to consider the implications of a world in which the most common interaction with the Internet comes from passive engagement with connected objects, rather than active engagement with content. For example, governments may want to ensure that their policies keep pace with this rapidly changing environment.
While the Internet of Things is not a particularly new idea from a technical perspective, the growth and maturity of the Internet of Things will present both new benefits and new challenges that will require shifts in policy approaches and strategies.
Privacy and data security policies should be considered that reflect how the technology is evolving and its potential impacts on users. Policies that promote Internet infrastructure, the efficient use of wireless spectrum, datacenter development, and user empowerment and choice are critical to the evolution of the Internet of Things.
Other policy areas may also benefit from a review. Internet of Things devices will likely touch most aspects of our lives, and are likely to be installed in our homes, workplaces, schools, hospitals, and other public spaces. As such, privacy, data security, healthcare, transportation, and technology and innovation policies will likely be impacted.
Guiding Principles:
The Internet Society urges governments to take the following steps to accommodate, and foster, IoT deployment:
> Promote Internet and data-infrastructure growth
Governments should review their existing Internet infrastructure in light of the potential increased data communication needs of IoT devices.
For example, consider removing burdensome equipment taxes or licensing requirements to encourage the development of new datacentres and physical infrastructure.
> Encourage IPv6 deployment IPv6 is an enabling technology for Internet growth, and it will become even more critical as the IoT drives up the number of connected devices.
For example, governments should consider making IPv6 adoption a national priority and engage with stakeholders in their community to encourage IPv6 rollout.
> Encourage open, voluntary IoT standards
The use of open, voluntary, and widely available standards as technical building blocks for IoT devices will support greater user benefits, innovation, and economic opportunity.
For example, governments should refrain from mandating technical approaches to the IoT. Instead, governments should encourage industry, researchers, and other stakeholders to work together and to develop open, consensus-based standards that support interoperability.
> Adopt a collaborative, multistakeholder approach to IoT policy discussions
The IoT is a challenging area for policymakers, as it is a rapidly developing environment and its technology spans many industries and uses.
As a result, a collaborative governance approach that draws on the expertise and engagement of a wide range of stakeholders will be needed to develop effective and appropriate solutions. The Internet Society believes that policies should aim to promote users’ ability to connect, speak, innovate, share, choose, and trust in a manner that both promotes innovation and enables user rights.
> Encourage a collaborative approach to IoT security
Participants in the IoT space should adopt a collaborative approach to security by assuming responsibility, sharing best practices and lessons learned, encouraging dialog on security issues, and emphasizing the development of flexible, shared security solutions that can adapt and evolve as threats change over time.
IoT security is the collective responsibility of all who develop and use IoT devices. IoT security policy should thus focus on empowering players to address security issues close to where they occur, rather than centralizing IoT security among a few, while also preserving the fundamental properties of the Internet and user rights.
> Encourage responsible design practices for IoT sevices
IoT device developers should be encouraged to respect the end-user’s privacy and data security interests and consider those interests a core element of the product-development process. They should also consider the full lifecycle of the IoT system to ensure obsolete devices don’t pose security risks and are compatible with responsible environmental stewardship.
For example, governments should encourage security-by-design and privacy-by-design practices for IoT devices.
Challenges:
A number of challenges need to be addressed in order for the Internet of Thing’s potential benefits to individuals, societies, and economies to be fully realized:
Security
Internet of Things devices present new and unique security challenges. A collaborative approach to IoT security will be needed to develop effective and appropriate solutions that are well-suited to the scale and complexity of the issues.
Devices and services with weak security are vulnerable to cyber attacks and can expose user data to theft. Because an increasing number of IoT devices online increases the number of potential security vulnerabilities, this a key IoT challenge to be addressed.
Manufacturers are frequently presented with economic and technical challenges when building and maintaining robust security features in IoT devices.
Ensuring lifetime security in IoT products and services must be a fundamental priority to maintaining overall user trust in this technology. Users need to trust that IoT devices and related data services are secure, especially as they become more pervasive and integrated into our daily lives.
Privacy
The ability to collect, analyze, and transform data drives much of the value of IoT devices and services.
However, this data can be used to paint detailed and invasive profiles of users. This raises concerns about a potential increase in surveillance and tracking, and the amount of sensitive data that can be collected by devices operating in our homes, businesses, and public environments.
Sometimes these devices collect data about individuals without their knowledge or informed consent.
IoT devices that collect data about people in one jurisdiction may transmit that data to another jurisdiction for data storage or processing. Challenges can arise if the data collected is deemed to be personal or sensitive and is subject to data protection laws in multiple jurisdictions. Enabling cross-border data flows that protect privacy and promote legal certainty for users and IoT service providers will be key to promoting the global growth of the IoT.
Strategies need to be developed that promote transparency, fairness, and user choice in data collection and handling, enhance user privacy rights and expectations across a range of preferences, and foster innovation in new technology and services.
Interoperability and Standards
Today’s marketplace offers a variety of technical approaches to the IoT. Some companies see strategic advantages to developing proprietary ecosystems, while others are developing their own approaches because common technologies do not yet exist. A wide range of companies, industry groups, and researchers are working on approaches that create greater IoT interoperability and standards.
The Internet Society believes that greater interoperability and the use of generic, open, voluntary, and widely available standards as technical building blocks for IoT devices and services will support greater user benefits, innovation, and economic opportunity.
This is because interoperability among IoT devices and data streams can encourage innovation and provide efficiencies for device manufactures and users, thereby increasing overall benefits and economic value.
Regulatory, Legal, and Rights Issues
The rapid rate of change in IoT technology could outpace the ability of associated policy, legal, and regulatory structures to adapt.
For example, If someone is harmed as a result of an IoT device’s action or inaction, who is responsible? The answer is often complicated, and in many instances there is not enough case law to support a position.
IoT devices also raise potential human rights concerns regarding the pervasiveness of societal monitoring, the secondary uses of data by the government, and access to data from personal IoT devices by law enforcement or as evidence in legal actions, among other challenging issues.
Given the broad nature of IoT regulatory and policy challenges, a collaborative governance approach to policy development that relies on input and participation by a range of stakeholders is needed for the best outcomes.
Emerging Economy and Development Issues
The IoT holds significant promise for delivering social and economic benefits to emerging and developing economies in areas such as sustainable agriculture, water quality and use, healthcare, industrialization, climate monitoring, and environmental management.
However, developing regions present unique challenges related to the deployment, growth, implementation, and use of the technology. These challenges include the deployment of adequate Internet and basic communications infrastructure in rural and remote areas, incentives for investment, and local participation in the development of IoT solutions.