SlideShare a Scribd company logo
1 of 10
Challenges posed by IOT
By: Musfirah Ahmed
List of challenges
1. Vulnerable security
• End users send huge amount of data in the cloud without
knowing who is monitoring them
• Most of the data is available on internet which can be accessed
ethically on unethically.
• Networks are being hacked, new security techniques required
2. Personal privacy
• End users are a part of loop of IoT. Many devices are
connected to them
• some devices might be implanted into the body without
adequate safety measures
• Our location, activity even heart rate is monitored
continuously
• Getting tracked without our consent can bring lethal outcome.
3. Sensors implantation and service
• No. of users are increasing, so no. of sensors to be implanted
also increase. Servicing these sensors is a concern
• To be more efficient, sensors are deployed over large
geographic area.
• These sensor nodes might be affected by physical damage,
environmental factors or lack of power
• Challenge is to attain sensor technology which requires
minimal or no efforts to deploy
4. Power issues
• Once the sensor is installed into the subject it is almost
impossible to replace its battery
E.g. sensor in an animal for tracking purposes.it should outlive
the animal
• Limitation of battery life is an issue. Mobile phones needs
recharging, some sensors also need battery changing
• To overcome there should be wireless charging of sensors,
lifetime batteries.
5. Connectivity
• Connectivity is the backbone of IoT
• Today the number of devices connected to the internet exceeds
the number of humans
• Connecting large number of users is a big challenge
• When there are multiple simultaneous users, some might not
receive the connection.
6. Real-time results
• Due to heavy traffic on cloud there is a delay in results of
about 200 milliseconds or more.
• A delay of 5-10 seconds in going off of a security alarm/traffic
signal may take a life
• Generating timely and accurate answers is a giant challenge
7. Complexity
• IoT is a complex of numerous devices, technologies, protocols
and domains
• Experts are required, single person can not develop IoT alone
• lack of experts in the market also the toolkits; software and
hardware are not in abundance
• Complexity of IoT is looked upon as a challenge. Measures are
to be taken to simplify it.
8. E-wastes
• climate change is the major threat for living beings in a current
era
• What happens when the lifetime of a sensor/product is over.
• There is no proper disposing system for the E-wastes.
• These wastes are majorly consisting of non-biodegradable
products and thus impose a threat to the environment.
conclusion

More Related Content

What's hot

Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsMark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsStanford School of Engineering
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceCigdem Sengul
 
Internet of Things: Challenges and Issues
Internet of Things: Challenges and IssuesInternet of Things: Challenges and Issues
Internet of Things: Challenges and Issuesrjain51
 
Internet Of Things
Internet Of ThingsInternet Of Things
Internet Of ThingsVodqaBLR
 
Advantages using Internet of Things
Advantages using Internet of ThingsAdvantages using Internet of Things
Advantages using Internet of ThingsZufar Dhiyaulhaq
 
IoT security patterns
IoT security patterns IoT security patterns
IoT security patterns Exosite
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)GOPAL BASAK
 
Security challenges for internet of things
Security challenges for internet of thingsSecurity challenges for internet of things
Security challenges for internet of thingsMonika Keerthi
 
Webinar | Wi-Fi for IoT: How Home Networking is Changing the Smart Home
Webinar | Wi-Fi for IoT: How Home Networking is Changing the Smart HomeWebinar | Wi-Fi for IoT: How Home Networking is Changing the Smart Home
Webinar | Wi-Fi for IoT: How Home Networking is Changing the Smart HomeCirrent
 
TOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of ThingsTOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of ThingsChromeInfo Technologies
 
5G: A tool for empowering the IoT infrastructure
 5G: A tool for empowering the IoT infrastructure 5G: A tool for empowering the IoT infrastructure
5G: A tool for empowering the IoT infrastructureVARUN KUMAR
 
Internet of Things (IoT) Based Smart Security & Home Automation System.
Internet of Things (IoT) Based Smart Security & Home Automation System.Internet of Things (IoT) Based Smart Security & Home Automation System.
Internet of Things (IoT) Based Smart Security & Home Automation System.sayed78
 
Internet of Things -Indoor Environmental Monitoring And Control System
Internet of Things -Indoor Environmental Monitoring And Control SystemInternet of Things -Indoor Environmental Monitoring And Control System
Internet of Things -Indoor Environmental Monitoring And Control Systemsalim lakade
 

What's hot (20)

Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsMark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
 
Internet of Things(IoT)
Internet of Things(IoT)Internet of Things(IoT)
Internet of Things(IoT)
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List Conference
 
Internet of Things: Challenges and Issues
Internet of Things: Challenges and IssuesInternet of Things: Challenges and Issues
Internet of Things: Challenges and Issues
 
IoT Final Project
IoT Final ProjectIoT Final Project
IoT Final Project
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
What is IoT?
What is IoT?What is IoT?
What is IoT?
 
Internet Of Things
Internet Of ThingsInternet Of Things
Internet Of Things
 
Advantages using Internet of Things
Advantages using Internet of ThingsAdvantages using Internet of Things
Advantages using Internet of Things
 
IoT security patterns
IoT security patterns IoT security patterns
IoT security patterns
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 
Security challenges for internet of things
Security challenges for internet of thingsSecurity challenges for internet of things
Security challenges for internet of things
 
internet of things
internet of thingsinternet of things
internet of things
 
Webinar | Wi-Fi for IoT: How Home Networking is Changing the Smart Home
Webinar | Wi-Fi for IoT: How Home Networking is Changing the Smart HomeWebinar | Wi-Fi for IoT: How Home Networking is Changing the Smart Home
Webinar | Wi-Fi for IoT: How Home Networking is Changing the Smart Home
 
TOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of ThingsTOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of Things
 
Simon Ford - ARM and the Open Internet of Things
Simon Ford - ARM and the Open Internet of ThingsSimon Ford - ARM and the Open Internet of Things
Simon Ford - ARM and the Open Internet of Things
 
5G: A tool for empowering the IoT infrastructure
 5G: A tool for empowering the IoT infrastructure 5G: A tool for empowering the IoT infrastructure
5G: A tool for empowering the IoT infrastructure
 
Shubham hatzade
Shubham hatzadeShubham hatzade
Shubham hatzade
 
Internet of Things (IoT) Based Smart Security & Home Automation System.
Internet of Things (IoT) Based Smart Security & Home Automation System.Internet of Things (IoT) Based Smart Security & Home Automation System.
Internet of Things (IoT) Based Smart Security & Home Automation System.
 
Internet of Things -Indoor Environmental Monitoring And Control System
Internet of Things -Indoor Environmental Monitoring And Control SystemInternet of Things -Indoor Environmental Monitoring And Control System
Internet of Things -Indoor Environmental Monitoring And Control System
 

Similar to Challenges posed by iot

Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...CableLabs
 
Views and myths of IoT
Views and myths of IoTViews and myths of IoT
Views and myths of IoTAhmed Banafa
 
Introduction to Internet of things
Introduction to Internet of thingsIntroduction to Internet of things
Introduction to Internet of thingsRehmat Ullah
 
Speaking at John Carrol University on the Internet of Things
Speaking at John Carrol University on the Internet of ThingsSpeaking at John Carrol University on the Internet of Things
Speaking at John Carrol University on the Internet of ThingsJustin Grammens
 
Unit 1 IoT Fundamentals.pdf
Unit 1 IoT Fundamentals.pdfUnit 1 IoT Fundamentals.pdf
Unit 1 IoT Fundamentals.pdfZoyaAli844417
 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Somasundaram Jambunathan
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSomasundaram Jambunathan
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Ravindra Dastikop
 
Chapter-4 Internet of Things.pptx, AI, Data Science
Chapter-4 Internet of Things.pptx, AI, Data ScienceChapter-4 Internet of Things.pptx, AI, Data Science
Chapter-4 Internet of Things.pptx, AI, Data Sciencehaile468688
 
Presentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfPresentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfezzAyman1
 
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014Adrian Wright
 
IoT Based Home Automation System_revised_27_06_2021.pptx
IoT Based Home Automation System_revised_27_06_2021.pptxIoT Based Home Automation System_revised_27_06_2021.pptx
IoT Based Home Automation System_revised_27_06_2021.pptxCUInnovationTeam
 
Key challenges facing the future of IoT
Key challenges facing the future of IoTKey challenges facing the future of IoT
Key challenges facing the future of IoTAhmed Banafa
 
Future of IoT: Key Challenges to Face
Future of IoT: Key Challenges to FaceFuture of IoT: Key Challenges to Face
Future of IoT: Key Challenges to FaceAltoros
 
How Internet of Things Works | IoT Examples | IoT Applications
How Internet of Things Works | IoT Examples | IoT ApplicationsHow Internet of Things Works | IoT Examples | IoT Applications
How Internet of Things Works | IoT Examples | IoT ApplicationsAnand SFJ
 
Technology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityTechnology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityCableLabs
 
IOT(Internet of Things) Seminar
IOT(Internet of Things) SeminarIOT(Internet of Things) Seminar
IOT(Internet of Things) Seminarman003
 

Similar to Challenges posed by iot (20)

Iot presentation1
Iot presentation1Iot presentation1
Iot presentation1
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
 
Views and myths of IoT
Views and myths of IoTViews and myths of IoT
Views and myths of IoT
 
Introduction to Internet of things
Introduction to Internet of thingsIntroduction to Internet of things
Introduction to Internet of things
 
Speaking at John Carrol University on the Internet of Things
Speaking at John Carrol University on the Internet of ThingsSpeaking at John Carrol University on the Internet of Things
Speaking at John Carrol University on the Internet of Things
 
Unit 1 IoT Fundamentals.pdf
Unit 1 IoT Fundamentals.pdfUnit 1 IoT Fundamentals.pdf
Unit 1 IoT Fundamentals.pdf
 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of Things
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough?
 
IoT Hetero - split
IoT Hetero - splitIoT Hetero - split
IoT Hetero - split
 
Chapter-4 Internet of Things.pptx, AI, Data Science
Chapter-4 Internet of Things.pptx, AI, Data ScienceChapter-4 Internet of Things.pptx, AI, Data Science
Chapter-4 Internet of Things.pptx, AI, Data Science
 
Presentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfPresentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdf
 
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
 
IoT Based Home Automation System_revised_27_06_2021.pptx
IoT Based Home Automation System_revised_27_06_2021.pptxIoT Based Home Automation System_revised_27_06_2021.pptx
IoT Based Home Automation System_revised_27_06_2021.pptx
 
Key challenges facing the future of IoT
Key challenges facing the future of IoTKey challenges facing the future of IoT
Key challenges facing the future of IoT
 
Future of IoT: Key Challenges to Face
Future of IoT: Key Challenges to FaceFuture of IoT: Key Challenges to Face
Future of IoT: Key Challenges to Face
 
How Internet of Things Works | IoT Examples | IoT Applications
How Internet of Things Works | IoT Examples | IoT ApplicationsHow Internet of Things Works | IoT Examples | IoT Applications
How Internet of Things Works | IoT Examples | IoT Applications
 
123456.pptx
123456.pptx123456.pptx
123456.pptx
 
Technology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityTechnology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT Security
 
IOT(Internet of Things) Seminar
IOT(Internet of Things) SeminarIOT(Internet of Things) Seminar
IOT(Internet of Things) Seminar
 

Recently uploaded

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Challenges posed by iot

  • 1. Challenges posed by IOT By: Musfirah Ahmed
  • 2. List of challenges 1. Vulnerable security • End users send huge amount of data in the cloud without knowing who is monitoring them • Most of the data is available on internet which can be accessed ethically on unethically. • Networks are being hacked, new security techniques required
  • 3. 2. Personal privacy • End users are a part of loop of IoT. Many devices are connected to them • some devices might be implanted into the body without adequate safety measures • Our location, activity even heart rate is monitored continuously • Getting tracked without our consent can bring lethal outcome.
  • 4. 3. Sensors implantation and service • No. of users are increasing, so no. of sensors to be implanted also increase. Servicing these sensors is a concern • To be more efficient, sensors are deployed over large geographic area. • These sensor nodes might be affected by physical damage, environmental factors or lack of power • Challenge is to attain sensor technology which requires minimal or no efforts to deploy
  • 5. 4. Power issues • Once the sensor is installed into the subject it is almost impossible to replace its battery E.g. sensor in an animal for tracking purposes.it should outlive the animal • Limitation of battery life is an issue. Mobile phones needs recharging, some sensors also need battery changing • To overcome there should be wireless charging of sensors, lifetime batteries.
  • 6. 5. Connectivity • Connectivity is the backbone of IoT • Today the number of devices connected to the internet exceeds the number of humans • Connecting large number of users is a big challenge • When there are multiple simultaneous users, some might not receive the connection.
  • 7. 6. Real-time results • Due to heavy traffic on cloud there is a delay in results of about 200 milliseconds or more. • A delay of 5-10 seconds in going off of a security alarm/traffic signal may take a life • Generating timely and accurate answers is a giant challenge
  • 8. 7. Complexity • IoT is a complex of numerous devices, technologies, protocols and domains • Experts are required, single person can not develop IoT alone • lack of experts in the market also the toolkits; software and hardware are not in abundance • Complexity of IoT is looked upon as a challenge. Measures are to be taken to simplify it.
  • 9. 8. E-wastes • climate change is the major threat for living beings in a current era • What happens when the lifetime of a sensor/product is over. • There is no proper disposing system for the E-wastes. • These wastes are majorly consisting of non-biodegradable products and thus impose a threat to the environment.