SlideShare a Scribd company logo
Key Challenges Facing The
Future of IoT
Prof. Ahmed Banafa
College of Engineering
San Jose State University
San Jose, CA USA
• The Internet of Things (#IoT) phenomenon—
ubiquitous connected things providing key
physical data and further processing of that
data in the cloud to deliver business insights—
presents a huge opportunity for many players
in all businesses and industries.
• Many companies are organizing themselves to
focus on IoT and the connectivity of their
future products and services.
• For the IoT industry to thrive there are three
categories of challenges to overcome and this
is true for any new trend in technology not
only IoT:
IoT Challenges
• Technology
• Business
• Society
Technology
• This part is covering all the technologies
needed to make IoT systems function
smoothly as a standalone solution or part of
existing systems. Cloud Security Alliance
(CSA) listed some of the root causes of such
technological challenges:
• Many IoT Systems are poorly designed and
implemented, using diverse protocols and
technologies that create complex
configurations.
• Lack of mature IoT technologies and business
processes
• Limited guidance for life cycle maintenance
and management of IoT devices
• Limited best practices available for IoT
developers
• There is a lack of standards for authentication
and authorization of IoT edge devices
• There are no best practices for IoT-based
incident response activities.
• Audit and Logging standards are not defined
for IoT components
• Restricted interfaces available IoT devices to
interact with security devices and
applications.
• No focus yet on identifying methods for
achieving situational awareness of the security
posture of an organization’s IoT assets.
Technical Challenges
Security
• IoT has already turned into a serious security
concern that has drawn the attention of
prominent tech firms and government
agencies across the world.
• The hacking of baby monitors, smart fridges,
thermostats, drug infusion pumps, cameras
and even assault rifles are signifying a security
nightmare being caused by the future of IoT.
• So many new nodes being added to networks
and the internet will provide malicious actors
with innumerable attack vectors and
possibilities to carry out their evil deeds,
especially since a considerable number of
them suffer from security holes.
• This fear was realized with a massive
distributed denial of service attack that
crippled the servers of services like Twitter,
NetFlix , NYTimes, and PayPal across the U.S.
on October 21st , 2016.
• It’s the result of an immense assault that
involved millions of Internet addresses and
malicious software, according to Dyn, the
prime victim of that attack.
• "One source of the traffic for the attacks was
devices infected by the Mirai botnet" the link
to the source code of #Mirai malware is on
GitHub.
• The attack comes amid heightened
#cybersecurity fears and a rising number of
Internet security breaches.
• Preliminary indications suggested that
countless Internet of Things (IoT) devices that
power everyday technology like closed-circuit
cameras and smart-home devices were
hijacked by the malware, and used against the
servers.
• The more important shift in security will come
from the fact that IoT will become more
ingrained in our lives. Concerns will no longer
be limited to the protection of sensitive
information and assets.
• Our very lives and health can become the
target of IoT hack attacks.
• There are many reasons behind the state of
insecurity in IoT. Some of it has to do with the
industry being in its “gold rush” state, where
every vendor is hastily seeking to dish out the
next innovative connected gadget before
competitors do.
• Under such circumstances, functionality
becomes the main focus and #security takes a
back seat.
Connectivity
• Connecting so many devices will be one of the
biggest challenges of the future of IoT, and it
will defy the very structure of current
communication models and the underlying
technologies.
• At present we rely on the centralized,
server/client paradigm to authenticate,
authorize and connect different nodes in a
network.
• This model is sufficient for current IoT
ecosystems, where tens, hundreds or even
thousands of devices are involved. But when
networks grow to join billions and hundreds of
billions of devices, centralized brokered
systems will turn into a bottleneck.
• Such systems will require huge investments
and spending in maintaining cloud servers
that can handle such large amounts of
information exchange, and entire systems can
go down if the server becomes unavailable.
• The future of IoT will very much have to
depend on decentralizing IoT networks. Part
of it can become possible by moving
functionality to the edge, such as using #fog
computing models where smart devices such
as IoT hubs take charge of time-critical
operations and cloud servers take on data
gathering and analytical responsibilities.
• Other solutions involve the use of peer-to-
peer communications, where devices identify
and authenticate each other directly and
exchange information without the
involvement of a broker. Networks will be
created in meshes with no single point of
failure.
• This model will have its own set of challenges,
especially from a security perspective, but
these challenges can be met with some of the
emerging IoT technologies such as
#Blockchain.
Compatibility and Longevity
• IoT is growing in many different directions,
with many different technologies competing
to become the standard. This will cause
difficulties and require the deployment of
extra hardware and software when connecting
devices.
• Other compatibility issues stem from non-
unified cloud services, lack of standardized
#M2M protocols and diversities in firmware
and operating systems among IoT devices.
• Some of these technologies will eventually
become obsolete in the next few years,
effectively rendering the devices
implementing them useless.
• This is especially important, since in contrast
to generic computing devices which have a
lifespan of a few years, IoT appliances (such as
smart fridges or TVs) tend to remain in service
for much longer, and should be able to
function even if their manufacturer goes out
of service.
Standards
• Technology standards which include network
protocols, communication protocols, and
data-aggregation standards, are the sum of all
activities of handling, processing and storing
the data collected from the sensors.
• This aggregation increases the value of data by
increasing, the scale, scope, and frequency of
data available for analysis.
Challenges facing the adoptions of
standards within IoT
• Standard for handling unstructured data:
Structured data are stored in relational
databases and queried through #SQL for
example. Unstructured data are stored in
different types of #NoSQL databases without a
standard querying approach.
• Technical skills to leverage newer aggregation
tools: Companies that are keen on leveraging
big-data tools often face a shortage of talent
to plan, execute, and maintain systems.
Intelligent Analysis & Actions
• The last stage in IoT implementation is
extracting insights from data for analysis,
where analysis is driven by cognitive
technologies and the accompanying models
that facilitate the use of cognitive
technologies.
Factors driving adoption intelligent
analytics within the IoT
• Artificial intelligence (#AI) models can be
improved with large data sets that are more
readily available than ever before, thanks to
the lower storage
• Growth in #crowdsourcing and open- source
analytics software: Cloud-based
crowdsourcing services are leading to new
algorithms and improvements in existing ones
at an unprecedented rate.
• Real-time data processing and analysis:
Analytics tools such as complex event
processing (CEP) enable processing and
analysis of data on a real-time or a near real-
time basis, driving timely decision making and
action
Challenges facing the adoptions of
intelligent analytics within IoT
• Inaccurate analysis due to flaws in the data
and/or model: A lack of data or presence of
outliers may lead to false positives or false
negatives, thus exposing various algorithmic
limitations
• Legacy systems’ ability to analyze
unstructured data: Legacy systems are well
suited to handle structured data;
unfortunately, most IoT/business interactions
generate unstructured data
• Legacy systems’ ability to manage real- time
data: Traditional analytics software generally
works on batch-oriented processing, wherein
all the data are loaded in a batch and then
analyzed
• The second phase of this stage is intelligent
actions which can be expressed as #M2M and
M2H interfaces for example with all the
advancement in UI and UX technologies.
Factors driving adoption of intelligent
actions within the IoT
• Lower machine prices
• Improved machine functionality
• Machines “influencing” human actions
through behavioral-science rationale
• Deep Learning tools
Challenges facing the adoption of
intelligent actions within IoT
• Machines’ actions in unpredictable situations
• Information security and privacy
• Machine interoperability
• Mean-reverting human behaviors
• Slow adoption of new technologies
Business
• The bottom line is a big motivation for
starting, investing in, and operating any
business, without a sound and solid business
model for IoT we will have another bubble this
model must satisfy all the requirements for all
kinds of e-commerce; vertical markets,
horizontal markets, and consumer markets.
• But this category is always a victim of
regulatory and legal scrutiny.
• End-to-end solution providers operating in
vertical industries and delivering services using
cloud analytics will be the most successful at
monetizing a large portion of the value in IoT.
• While many IoT applications may attract modest
revenue, some can attract more. For little burden
on the existing communication infrastructure,
operators have the potential to open up a
significant source of new revenue using IoT
technologies.
IoT can be divided into 3 categories
based on usage and clients base:
1. Consumer IoT includes the connected devices
such as smart cars, phones, watches, laptops,
connected appliances, and entertainment systems.
2. Commercial IoT includes things like inventory
controls, device trackers, and connected medical
devices.
3. Industrial IoT covers such things as connected
electric meters, waste water systems, flow gauges,
pipeline monitors, manufacturing robots, and other
types of connected industrial devices and systems.
• Clearly, it is important to understand the value
chain and business model for the IoT
applications for each category of IoT.
Society
• Understanding IoT from the customers and
regulators prospective is not an easy task for
the following reasons:
• Customer demands and requirements change
constantly.
• New uses for devices—as well as new
devices—sprout and grows at breakneck
speeds.
• Inventing and reintegrating must-have
features and capabilities are expensive and
take time and resources.
• The uses for Internet of Things technology are
expanding and changing—often in uncharted
waters.
• Consumer Confidence: Each of these problems
could put a dent in consumers' desire to purchase
connected products, which would prevent the IoT
from fulfilling its true potential.
• Lack of understanding or education by consumers
of best practices for IoT devices security to help
in improving privacy, for example change default
passwords of IoT devices.
Social and Legal Challenges
Privacy
• The IoT creates unique challenges to privacy,
many that go beyond the data privacy issues
that currently exist. Much of this stems from
integrating devices into our environments
without us consciously using them.
• This is becoming more prevalent in consumer devices,
such as tracking devices for phones and cars as well as
smart televisions.
• In terms of the latter, voice recognition or vision
features are being integrated that can continuously
listen to conversations or watch for activity and
selectively transmit that data to a cloud service for
processing, which sometimes includes a third party.
• The collection of this information exposes legal and
regulatory challenges facing data protection and
privacy law.
• In addition, many IoT scenarios involve device
deployments and data collection activities
with multinational or global scope that cross
social and cultural boundaries. What will that
mean for the development of a broadly
applicable privacy protection model for the
IoT?
• In order to realize the opportunities of the IoT,
strategies will need to be developed to
respect individual privacy choices across a
broad spectrum of expectations, while still
fostering innovation in new technologies and
services.
Regulatory Standards
• Regulatory standards for data markets are
missing especially for data brokers; they are
companies that sell data collected from
various sources. Even though data appear to
be the currency of the IoT, there is a lack of
transparency about;
• Who gets access to data and how those data
are used to develop products or services and
sold to advertisers and third parties. There is a
need for clear guidelines on the retention,
use, and security of the data including
metadata (the data that describe other data).
Any questions?
Thank you!
@BanafaAhmed
https://www.linkedin.com/in/ahmedbanafa
ahmed.banafa@sjsu.edu

More Related Content

What's hot

IoT Connectivity
IoT Connectivity IoT Connectivity
IoT Connectivity
Hitesh Mohapatra
 
Internet of things
Internet of thingsInternet of things
Internet of things
Palak Sood
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
pkshc01
 
Internet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
Internet of Things(IOT)_Seminar_Dr.G.RajeshkumarInternet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
Internet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
RAJESHKUMARG12
 
Internet of things
Internet of thingsInternet of things
Internet of things
Shahneel Siddiqui
 
CHAPTER 4.pptx
CHAPTER 4.pptxCHAPTER 4.pptx
CHAPTER 4.pptx
ttyu2
 
Architecture and scope of Internet of things (IoT)
Architecture and scope of  Internet of things (IoT)Architecture and scope of  Internet of things (IoT)
Architecture and scope of Internet of things (IoT)
Varaprasad Erapu
 
Internet of Things(IoT) - Introduction and Research Areas for Thesis
Internet of Things(IoT) - Introduction and Research Areas for ThesisInternet of Things(IoT) - Introduction and Research Areas for Thesis
Internet of Things(IoT) - Introduction and Research Areas for Thesis
WriteMyThesis
 
IoT architecture
IoT architectureIoT architecture
IoT architecture
Sumit Sharma
 
Internet of things(IoT)
Internet of things(IoT)Internet of things(IoT)
Internet of things(IoT)
NAGUR SHAREEF SHAIK
 
Security issues and solutions : IoT
Security issues and solutions : IoTSecurity issues and solutions : IoT
Security issues and solutions : IoT
Jinia Bhowmik
 
6 g technology-two
6 g technology-two6 g technology-two
6 g technology-two
susmitabiswal2
 
5G wireless technology
5G wireless technology5G wireless technology
5G wireless technology
Dr. Ali Yadborughi
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
Intel® Software
 
security and privacy-Internet of things
security and privacy-Internet of thingssecurity and privacy-Internet of things
security and privacy-Internet of things
sreelekha appakondappagari
 
Security challenges in IoT
Security challenges in IoTSecurity challenges in IoT
Security challenges in IoT
Vishnupriya T H
 
Internet of things ppt
Internet of things pptInternet of things ppt
Internet of things ppt
Dania Purnama Sari
 
INTERNET OF THING PRESENTATION ON PUBLIC SPEAKING
INTERNET OF THING PRESENTATION ON PUBLIC SPEAKINGINTERNET OF THING PRESENTATION ON PUBLIC SPEAKING
INTERNET OF THING PRESENTATION ON PUBLIC SPEAKING
AYESHA JAVED
 
Internet of things startup basic
Internet of things  startup basicInternet of things  startup basic
Internet of things startup basic
Mathan kumar
 

What's hot (20)

IoT Connectivity
IoT Connectivity IoT Connectivity
IoT Connectivity
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Introduction to IOT
Introduction to IOTIntroduction to IOT
Introduction to IOT
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Internet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
Internet of Things(IOT)_Seminar_Dr.G.RajeshkumarInternet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
Internet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
CHAPTER 4.pptx
CHAPTER 4.pptxCHAPTER 4.pptx
CHAPTER 4.pptx
 
Architecture and scope of Internet of things (IoT)
Architecture and scope of  Internet of things (IoT)Architecture and scope of  Internet of things (IoT)
Architecture and scope of Internet of things (IoT)
 
Internet of Things(IoT) - Introduction and Research Areas for Thesis
Internet of Things(IoT) - Introduction and Research Areas for ThesisInternet of Things(IoT) - Introduction and Research Areas for Thesis
Internet of Things(IoT) - Introduction and Research Areas for Thesis
 
IoT architecture
IoT architectureIoT architecture
IoT architecture
 
Internet of things(IoT)
Internet of things(IoT)Internet of things(IoT)
Internet of things(IoT)
 
Security issues and solutions : IoT
Security issues and solutions : IoTSecurity issues and solutions : IoT
Security issues and solutions : IoT
 
6 g technology-two
6 g technology-two6 g technology-two
6 g technology-two
 
5G wireless technology
5G wireless technology5G wireless technology
5G wireless technology
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
 
security and privacy-Internet of things
security and privacy-Internet of thingssecurity and privacy-Internet of things
security and privacy-Internet of things
 
Security challenges in IoT
Security challenges in IoTSecurity challenges in IoT
Security challenges in IoT
 
Internet of things ppt
Internet of things pptInternet of things ppt
Internet of things ppt
 
INTERNET OF THING PRESENTATION ON PUBLIC SPEAKING
INTERNET OF THING PRESENTATION ON PUBLIC SPEAKINGINTERNET OF THING PRESENTATION ON PUBLIC SPEAKING
INTERNET OF THING PRESENTATION ON PUBLIC SPEAKING
 
Internet of things startup basic
Internet of things  startup basicInternet of things  startup basic
Internet of things startup basic
 

Viewers also liked

7 trends of IoT in 2017
7 trends of IoT in 20177 trends of IoT in 2017
7 trends of IoT in 2017
Ahmed Banafa
 
IoT and Blockchain Convergence
IoT and Blockchain ConvergenceIoT and Blockchain Convergence
IoT and Blockchain Convergence
Ahmed Banafa
 
Introduction to IOT & Smart City
Introduction to IOT & Smart CityIntroduction to IOT & Smart City
Introduction to IOT & Smart City
Dr. Mazlan Abbas
 
IoT - IT 423 ppt
IoT - IT 423 pptIoT - IT 423 ppt
IoT - IT 423 pptMhae Lyn
 
What is next for IoT and IIoT
What is next for IoT and IIoTWhat is next for IoT and IIoT
What is next for IoT and IIoT
Ahmed Banafa
 
5 questions about the IoT (Internet of Things)
5 questions about the IoT (Internet of Things) 5 questions about the IoT (Internet of Things)
5 questions about the IoT (Internet of Things)
Deloitte United States
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Dr. Mazlan Abbas
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Mohan Kumar G
 
[Infographic] How will Internet of Things (IoT) change the world as we know it?
[Infographic] How will Internet of Things (IoT) change the world as we know it?[Infographic] How will Internet of Things (IoT) change the world as we know it?
[Infographic] How will Internet of Things (IoT) change the world as we know it?
InterQuest Group
 
The data defined-vehicle_architecture
The data defined-vehicle_architectureThe data defined-vehicle_architecture
The data defined-vehicle_architecture
Sebastian Wedeniwski
 
Autonomous Car & Cybersecurity - IAA 2015 - New Mobility World
Autonomous Car & Cybersecurity - IAA 2015 - New Mobility WorldAutonomous Car & Cybersecurity - IAA 2015 - New Mobility World
Autonomous Car & Cybersecurity - IAA 2015 - New Mobility World
Mahbubul Alam
 
Meetup8 IoT trends 2016
Meetup8 IoT trends 2016Meetup8 IoT trends 2016
Meetup8 IoT trends 2016
Francesco Rago
 
NIEC DELHI IoT Guest Lecture
NIEC DELHI IoT Guest LectureNIEC DELHI IoT Guest Lecture
NIEC DELHI IoT Guest Lecture
Hitesh
 
What is the internet of things v3
What is the internet of things v3What is the internet of things v3
What is the internet of things v3
Incubation & Industry
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Sigma Software
 
IoT App Development Areas And Major Challenges
IoT App Development Areas And Major ChallengesIoT App Development Areas And Major Challenges
IoT App Development Areas And Major Challenges
astoria0128
 
Security challenges for IoT
Security challenges for IoTSecurity challenges for IoT
Security challenges for IoTWSO2
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Prithwis Mukerjee
 
Challenges in the IoT
Challenges in the IoTChallenges in the IoT
Challenges in the IoT
EUBrasilCloudFORUM .
 

Viewers also liked (20)

7 trends of IoT in 2017
7 trends of IoT in 20177 trends of IoT in 2017
7 trends of IoT in 2017
 
IoT and Blockchain Convergence
IoT and Blockchain ConvergenceIoT and Blockchain Convergence
IoT and Blockchain Convergence
 
Introduction to IOT & Smart City
Introduction to IOT & Smart CityIntroduction to IOT & Smart City
Introduction to IOT & Smart City
 
IoT - IT 423 ppt
IoT - IT 423 pptIoT - IT 423 ppt
IoT - IT 423 ppt
 
What is next for IoT and IIoT
What is next for IoT and IIoTWhat is next for IoT and IIoT
What is next for IoT and IIoT
 
Understanding the Internet of Things Protocols
Understanding the Internet of Things ProtocolsUnderstanding the Internet of Things Protocols
Understanding the Internet of Things Protocols
 
5 questions about the IoT (Internet of Things)
5 questions about the IoT (Internet of Things) 5 questions about the IoT (Internet of Things)
5 questions about the IoT (Internet of Things)
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An Iceberg
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
 
[Infographic] How will Internet of Things (IoT) change the world as we know it?
[Infographic] How will Internet of Things (IoT) change the world as we know it?[Infographic] How will Internet of Things (IoT) change the world as we know it?
[Infographic] How will Internet of Things (IoT) change the world as we know it?
 
The data defined-vehicle_architecture
The data defined-vehicle_architectureThe data defined-vehicle_architecture
The data defined-vehicle_architecture
 
Autonomous Car & Cybersecurity - IAA 2015 - New Mobility World
Autonomous Car & Cybersecurity - IAA 2015 - New Mobility WorldAutonomous Car & Cybersecurity - IAA 2015 - New Mobility World
Autonomous Car & Cybersecurity - IAA 2015 - New Mobility World
 
Meetup8 IoT trends 2016
Meetup8 IoT trends 2016Meetup8 IoT trends 2016
Meetup8 IoT trends 2016
 
NIEC DELHI IoT Guest Lecture
NIEC DELHI IoT Guest LectureNIEC DELHI IoT Guest Lecture
NIEC DELHI IoT Guest Lecture
 
What is the internet of things v3
What is the internet of things v3What is the internet of things v3
What is the internet of things v3
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
IoT App Development Areas And Major Challenges
IoT App Development Areas And Major ChallengesIoT App Development Areas And Major Challenges
IoT App Development Areas And Major Challenges
 
Security challenges for IoT
Security challenges for IoTSecurity challenges for IoT
Security challenges for IoT
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Challenges in the IoT
Challenges in the IoTChallenges in the IoT
Challenges in the IoT
 

Similar to Key challenges facing the future of IoT

ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
Adrian Wright
 
IoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesIoT Standardization and Implementation Challenges
IoT Standardization and Implementation Challenges
Ahmed Banafa
 
Views and myths of IoT
Views and myths of IoTViews and myths of IoT
Views and myths of IoT
Ahmed Banafa
 
Lecture 14
Lecture 14Lecture 14
Lecture 14
vishal choudhary
 
A Secure Model of IoT Using Blockchain
A Secure Model of IoT Using BlockchainA Secure Model of IoT Using Blockchain
A Secure Model of IoT Using Blockchain
Altoros
 
Group 4 IT INfrastructure Group presentation Final [Auto-saved].pptx
Group 4 IT INfrastructure Group presentation Final  [Auto-saved].pptxGroup 4 IT INfrastructure Group presentation Final  [Auto-saved].pptx
Group 4 IT INfrastructure Group presentation Final [Auto-saved].pptx
OdedeleIfeoluwa
 
Internet of Things: Trends and challenges for future
Internet of Things: Trends and challenges for futureInternet of Things: Trends and challenges for future
Internet of Things: Trends and challenges for future
Startup Europe IoT Accelerator
 
9 IoT predictions for 2019
9 IoT predictions for 20199 IoT predictions for 2019
9 IoT predictions for 2019
Ahmed Banafa
 
Hot technologies of 2019
Hot technologies of 2019Hot technologies of 2019
Hot technologies of 2019
Ahmed Banafa
 
Inventory of IoT slide sets
Inventory of IoT slide setsInventory of IoT slide sets
Inventory of IoT slide sets
Bob Marcus
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference )
Ahmed Banafa
 
IoT-Introduction.pptx
IoT-Introduction.pptxIoT-Introduction.pptx
IoT-Introduction.pptx
ImpanaR2
 
Unit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).pptUnit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).ppt
nadoje
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT
Ahmed Banafa
 
Module-1.pptx
Module-1.pptxModule-1.pptx
Module-1.pptx
ssuserb7947f
 
Leveraging IOT and Latest Technologies
Leveraging IOT and Latest TechnologiesLeveraging IOT and Latest Technologies
Leveraging IOT and Latest Technologies
Mithileysh Sathiyanarayanan
 
8 trends of IoT in 2018
8 trends of IoT in 20188 trends of IoT in 2018
8 trends of IoT in 2018
Ahmed Banafa
 
87 seminar presentation
87 seminar presentation87 seminar presentation
87 seminar presentation
Vishakha Kumar
 
Secure and Smart IoT
Secure and Smart IoT Secure and Smart IoT
Secure and Smart IoT
Ahmed Banafa
 
Blockchain and AI
Blockchain and AIBlockchain and AI
Blockchain and AI
Ahmed Banafa
 

Similar to Key challenges facing the future of IoT (20)

ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
 
IoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesIoT Standardization and Implementation Challenges
IoT Standardization and Implementation Challenges
 
Views and myths of IoT
Views and myths of IoTViews and myths of IoT
Views and myths of IoT
 
Lecture 14
Lecture 14Lecture 14
Lecture 14
 
A Secure Model of IoT Using Blockchain
A Secure Model of IoT Using BlockchainA Secure Model of IoT Using Blockchain
A Secure Model of IoT Using Blockchain
 
Group 4 IT INfrastructure Group presentation Final [Auto-saved].pptx
Group 4 IT INfrastructure Group presentation Final  [Auto-saved].pptxGroup 4 IT INfrastructure Group presentation Final  [Auto-saved].pptx
Group 4 IT INfrastructure Group presentation Final [Auto-saved].pptx
 
Internet of Things: Trends and challenges for future
Internet of Things: Trends and challenges for futureInternet of Things: Trends and challenges for future
Internet of Things: Trends and challenges for future
 
9 IoT predictions for 2019
9 IoT predictions for 20199 IoT predictions for 2019
9 IoT predictions for 2019
 
Hot technologies of 2019
Hot technologies of 2019Hot technologies of 2019
Hot technologies of 2019
 
Inventory of IoT slide sets
Inventory of IoT slide setsInventory of IoT slide sets
Inventory of IoT slide sets
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference )
 
IoT-Introduction.pptx
IoT-Introduction.pptxIoT-Introduction.pptx
IoT-Introduction.pptx
 
Unit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).pptUnit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).ppt
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT
 
Module-1.pptx
Module-1.pptxModule-1.pptx
Module-1.pptx
 
Leveraging IOT and Latest Technologies
Leveraging IOT and Latest TechnologiesLeveraging IOT and Latest Technologies
Leveraging IOT and Latest Technologies
 
8 trends of IoT in 2018
8 trends of IoT in 20188 trends of IoT in 2018
8 trends of IoT in 2018
 
87 seminar presentation
87 seminar presentation87 seminar presentation
87 seminar presentation
 
Secure and Smart IoT
Secure and Smart IoT Secure and Smart IoT
Secure and Smart IoT
 
Blockchain and AI
Blockchain and AIBlockchain and AI
Blockchain and AI
 

More from Ahmed Banafa

IoT and 5G convergence
IoT and 5G convergenceIoT and 5G convergence
IoT and 5G convergence
Ahmed Banafa
 
Quantum Computing and AI
Quantum Computing and AIQuantum Computing and AI
Quantum Computing and AI
Ahmed Banafa
 
The convergence of IoT and Quantum Computing
The convergence of IoT and Quantum ComputingThe convergence of IoT and Quantum Computing
The convergence of IoT and Quantum Computing
Ahmed Banafa
 
Quantum Internet Explained
Quantum Internet ExplainedQuantum Internet Explained
Quantum Internet Explained
Ahmed Banafa
 
IoT and Covid 19
IoT and Covid 19IoT and Covid 19
IoT and Covid 19
Ahmed Banafa
 
Quantum Teleportation
Quantum TeleportationQuantum Teleportation
Quantum Teleportation
Ahmed Banafa
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)
Ahmed Banafa
 
How blockchain is revolutionizing crowdfunding
How blockchain is revolutionizing crowdfundingHow blockchain is revolutionizing crowdfunding
How blockchain is revolutionizing crowdfunding
Ahmed Banafa
 
Blockchain technology and supply chain management
Blockchain technology and supply chain managementBlockchain technology and supply chain management
Blockchain technology and supply chain management
Ahmed Banafa
 
8 key tech trends in a post covid-19 world edited
8 key tech trends in a post covid-19 world edited8 key tech trends in a post covid-19 world edited
8 key tech trends in a post covid-19 world edited
Ahmed Banafa
 
Blockchain Technology and COVID19
Blockchain Technology and COVID19Blockchain Technology and COVID19
Blockchain Technology and COVID19
Ahmed Banafa
 
Ten trends of blockchain in 2020
Ten trends of blockchain in 2020Ten trends of blockchain in 2020
Ten trends of blockchain in 2020
Ahmed Banafa
 
Quantum Computing and Blockchain: Facts and Myths
Quantum Computing and Blockchain: Facts and Myths  Quantum Computing and Blockchain: Facts and Myths
Quantum Computing and Blockchain: Facts and Myths
Ahmed Banafa
 
Ten Blockchain Applications
Ten Blockchain ApplicationsTen Blockchain Applications
Ten Blockchain Applications
Ahmed Banafa
 
The Blockchain Wave in 2019 and Beyond - SJSU
The Blockchain Wave in 2019 and Beyond - SJSU The Blockchain Wave in 2019 and Beyond - SJSU
The Blockchain Wave in 2019 and Beyond - SJSU
Ahmed Banafa
 
Secure and Smart IoT using Blockchain and AI
Secure and Smart  IoT using Blockchain and AISecure and Smart  IoT using Blockchain and AI
Secure and Smart IoT using Blockchain and AI
Ahmed Banafa
 
The Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and BeyondThe Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and Beyond
Ahmed Banafa
 
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
Ahmed Banafa
 
Second line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : BlockchainSecond line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : Blockchain
Ahmed Banafa
 
First line of defense for cybersecurity : AI
First line of defense for cybersecurity : AIFirst line of defense for cybersecurity : AI
First line of defense for cybersecurity : AI
Ahmed Banafa
 

More from Ahmed Banafa (20)

IoT and 5G convergence
IoT and 5G convergenceIoT and 5G convergence
IoT and 5G convergence
 
Quantum Computing and AI
Quantum Computing and AIQuantum Computing and AI
Quantum Computing and AI
 
The convergence of IoT and Quantum Computing
The convergence of IoT and Quantum ComputingThe convergence of IoT and Quantum Computing
The convergence of IoT and Quantum Computing
 
Quantum Internet Explained
Quantum Internet ExplainedQuantum Internet Explained
Quantum Internet Explained
 
IoT and Covid 19
IoT and Covid 19IoT and Covid 19
IoT and Covid 19
 
Quantum Teleportation
Quantum TeleportationQuantum Teleportation
Quantum Teleportation
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)
 
How blockchain is revolutionizing crowdfunding
How blockchain is revolutionizing crowdfundingHow blockchain is revolutionizing crowdfunding
How blockchain is revolutionizing crowdfunding
 
Blockchain technology and supply chain management
Blockchain technology and supply chain managementBlockchain technology and supply chain management
Blockchain technology and supply chain management
 
8 key tech trends in a post covid-19 world edited
8 key tech trends in a post covid-19 world edited8 key tech trends in a post covid-19 world edited
8 key tech trends in a post covid-19 world edited
 
Blockchain Technology and COVID19
Blockchain Technology and COVID19Blockchain Technology and COVID19
Blockchain Technology and COVID19
 
Ten trends of blockchain in 2020
Ten trends of blockchain in 2020Ten trends of blockchain in 2020
Ten trends of blockchain in 2020
 
Quantum Computing and Blockchain: Facts and Myths
Quantum Computing and Blockchain: Facts and Myths  Quantum Computing and Blockchain: Facts and Myths
Quantum Computing and Blockchain: Facts and Myths
 
Ten Blockchain Applications
Ten Blockchain ApplicationsTen Blockchain Applications
Ten Blockchain Applications
 
The Blockchain Wave in 2019 and Beyond - SJSU
The Blockchain Wave in 2019 and Beyond - SJSU The Blockchain Wave in 2019 and Beyond - SJSU
The Blockchain Wave in 2019 and Beyond - SJSU
 
Secure and Smart IoT using Blockchain and AI
Secure and Smart  IoT using Blockchain and AISecure and Smart  IoT using Blockchain and AI
Secure and Smart IoT using Blockchain and AI
 
The Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and BeyondThe Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and Beyond
 
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
 
Second line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : BlockchainSecond line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : Blockchain
 
First line of defense for cybersecurity : AI
First line of defense for cybersecurity : AIFirst line of defense for cybersecurity : AI
First line of defense for cybersecurity : AI
 

Recently uploaded

ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
Himani415946
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
ShahulHameed54211
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
TristanJasperRamos
 

Recently uploaded (16)

ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
 

Key challenges facing the future of IoT

  • 1. Key Challenges Facing The Future of IoT Prof. Ahmed Banafa College of Engineering San Jose State University San Jose, CA USA
  • 2. • The Internet of Things (#IoT) phenomenon— ubiquitous connected things providing key physical data and further processing of that data in the cloud to deliver business insights— presents a huge opportunity for many players in all businesses and industries.
  • 3. • Many companies are organizing themselves to focus on IoT and the connectivity of their future products and services.
  • 4. • For the IoT industry to thrive there are three categories of challenges to overcome and this is true for any new trend in technology not only IoT:
  • 5.
  • 6. IoT Challenges • Technology • Business • Society
  • 7. Technology • This part is covering all the technologies needed to make IoT systems function smoothly as a standalone solution or part of existing systems. Cloud Security Alliance (CSA) listed some of the root causes of such technological challenges:
  • 8. • Many IoT Systems are poorly designed and implemented, using diverse protocols and technologies that create complex configurations. • Lack of mature IoT technologies and business processes • Limited guidance for life cycle maintenance and management of IoT devices
  • 9. • Limited best practices available for IoT developers • There is a lack of standards for authentication and authorization of IoT edge devices
  • 10. • There are no best practices for IoT-based incident response activities. • Audit and Logging standards are not defined for IoT components
  • 11. • Restricted interfaces available IoT devices to interact with security devices and applications. • No focus yet on identifying methods for achieving situational awareness of the security posture of an organization’s IoT assets.
  • 13. Security • IoT has already turned into a serious security concern that has drawn the attention of prominent tech firms and government agencies across the world.
  • 14. • The hacking of baby monitors, smart fridges, thermostats, drug infusion pumps, cameras and even assault rifles are signifying a security nightmare being caused by the future of IoT.
  • 15. • So many new nodes being added to networks and the internet will provide malicious actors with innumerable attack vectors and possibilities to carry out their evil deeds, especially since a considerable number of them suffer from security holes.
  • 16. • This fear was realized with a massive distributed denial of service attack that crippled the servers of services like Twitter, NetFlix , NYTimes, and PayPal across the U.S. on October 21st , 2016.
  • 17. • It’s the result of an immense assault that involved millions of Internet addresses and malicious software, according to Dyn, the prime victim of that attack.
  • 18. • "One source of the traffic for the attacks was devices infected by the Mirai botnet" the link to the source code of #Mirai malware is on GitHub. • The attack comes amid heightened #cybersecurity fears and a rising number of Internet security breaches.
  • 19. • Preliminary indications suggested that countless Internet of Things (IoT) devices that power everyday technology like closed-circuit cameras and smart-home devices were hijacked by the malware, and used against the servers.
  • 20. • The more important shift in security will come from the fact that IoT will become more ingrained in our lives. Concerns will no longer be limited to the protection of sensitive information and assets. • Our very lives and health can become the target of IoT hack attacks.
  • 21.
  • 22. • There are many reasons behind the state of insecurity in IoT. Some of it has to do with the industry being in its “gold rush” state, where every vendor is hastily seeking to dish out the next innovative connected gadget before competitors do. • Under such circumstances, functionality becomes the main focus and #security takes a back seat.
  • 23.
  • 24. Connectivity • Connecting so many devices will be one of the biggest challenges of the future of IoT, and it will defy the very structure of current communication models and the underlying technologies. • At present we rely on the centralized, server/client paradigm to authenticate, authorize and connect different nodes in a network.
  • 25. • This model is sufficient for current IoT ecosystems, where tens, hundreds or even thousands of devices are involved. But when networks grow to join billions and hundreds of billions of devices, centralized brokered systems will turn into a bottleneck.
  • 26. • Such systems will require huge investments and spending in maintaining cloud servers that can handle such large amounts of information exchange, and entire systems can go down if the server becomes unavailable.
  • 27. • The future of IoT will very much have to depend on decentralizing IoT networks. Part of it can become possible by moving functionality to the edge, such as using #fog computing models where smart devices such as IoT hubs take charge of time-critical operations and cloud servers take on data gathering and analytical responsibilities.
  • 28. • Other solutions involve the use of peer-to- peer communications, where devices identify and authenticate each other directly and exchange information without the involvement of a broker. Networks will be created in meshes with no single point of failure.
  • 29. • This model will have its own set of challenges, especially from a security perspective, but these challenges can be met with some of the emerging IoT technologies such as #Blockchain.
  • 30. Compatibility and Longevity • IoT is growing in many different directions, with many different technologies competing to become the standard. This will cause difficulties and require the deployment of extra hardware and software when connecting devices.
  • 31. • Other compatibility issues stem from non- unified cloud services, lack of standardized #M2M protocols and diversities in firmware and operating systems among IoT devices.
  • 32. • Some of these technologies will eventually become obsolete in the next few years, effectively rendering the devices implementing them useless.
  • 33. • This is especially important, since in contrast to generic computing devices which have a lifespan of a few years, IoT appliances (such as smart fridges or TVs) tend to remain in service for much longer, and should be able to function even if their manufacturer goes out of service.
  • 34. Standards • Technology standards which include network protocols, communication protocols, and data-aggregation standards, are the sum of all activities of handling, processing and storing the data collected from the sensors. • This aggregation increases the value of data by increasing, the scale, scope, and frequency of data available for analysis.
  • 35. Challenges facing the adoptions of standards within IoT • Standard for handling unstructured data: Structured data are stored in relational databases and queried through #SQL for example. Unstructured data are stored in different types of #NoSQL databases without a standard querying approach.
  • 36. • Technical skills to leverage newer aggregation tools: Companies that are keen on leveraging big-data tools often face a shortage of talent to plan, execute, and maintain systems.
  • 37. Intelligent Analysis & Actions • The last stage in IoT implementation is extracting insights from data for analysis, where analysis is driven by cognitive technologies and the accompanying models that facilitate the use of cognitive technologies.
  • 38. Factors driving adoption intelligent analytics within the IoT • Artificial intelligence (#AI) models can be improved with large data sets that are more readily available than ever before, thanks to the lower storage
  • 39. • Growth in #crowdsourcing and open- source analytics software: Cloud-based crowdsourcing services are leading to new algorithms and improvements in existing ones at an unprecedented rate.
  • 40. • Real-time data processing and analysis: Analytics tools such as complex event processing (CEP) enable processing and analysis of data on a real-time or a near real- time basis, driving timely decision making and action
  • 41. Challenges facing the adoptions of intelligent analytics within IoT • Inaccurate analysis due to flaws in the data and/or model: A lack of data or presence of outliers may lead to false positives or false negatives, thus exposing various algorithmic limitations
  • 42. • Legacy systems’ ability to analyze unstructured data: Legacy systems are well suited to handle structured data; unfortunately, most IoT/business interactions generate unstructured data
  • 43. • Legacy systems’ ability to manage real- time data: Traditional analytics software generally works on batch-oriented processing, wherein all the data are loaded in a batch and then analyzed
  • 44. • The second phase of this stage is intelligent actions which can be expressed as #M2M and M2H interfaces for example with all the advancement in UI and UX technologies.
  • 45. Factors driving adoption of intelligent actions within the IoT • Lower machine prices • Improved machine functionality • Machines “influencing” human actions through behavioral-science rationale • Deep Learning tools
  • 46. Challenges facing the adoption of intelligent actions within IoT • Machines’ actions in unpredictable situations • Information security and privacy • Machine interoperability • Mean-reverting human behaviors • Slow adoption of new technologies
  • 47. Business • The bottom line is a big motivation for starting, investing in, and operating any business, without a sound and solid business model for IoT we will have another bubble this model must satisfy all the requirements for all kinds of e-commerce; vertical markets, horizontal markets, and consumer markets. • But this category is always a victim of regulatory and legal scrutiny.
  • 48. • End-to-end solution providers operating in vertical industries and delivering services using cloud analytics will be the most successful at monetizing a large portion of the value in IoT. • While many IoT applications may attract modest revenue, some can attract more. For little burden on the existing communication infrastructure, operators have the potential to open up a significant source of new revenue using IoT technologies.
  • 49.
  • 50. IoT can be divided into 3 categories based on usage and clients base:
  • 51. 1. Consumer IoT includes the connected devices such as smart cars, phones, watches, laptops, connected appliances, and entertainment systems. 2. Commercial IoT includes things like inventory controls, device trackers, and connected medical devices. 3. Industrial IoT covers such things as connected electric meters, waste water systems, flow gauges, pipeline monitors, manufacturing robots, and other types of connected industrial devices and systems.
  • 52. • Clearly, it is important to understand the value chain and business model for the IoT applications for each category of IoT.
  • 53.
  • 54. Society • Understanding IoT from the customers and regulators prospective is not an easy task for the following reasons:
  • 55. • Customer demands and requirements change constantly. • New uses for devices—as well as new devices—sprout and grows at breakneck speeds. • Inventing and reintegrating must-have features and capabilities are expensive and take time and resources.
  • 56. • The uses for Internet of Things technology are expanding and changing—often in uncharted waters. • Consumer Confidence: Each of these problems could put a dent in consumers' desire to purchase connected products, which would prevent the IoT from fulfilling its true potential. • Lack of understanding or education by consumers of best practices for IoT devices security to help in improving privacy, for example change default passwords of IoT devices.
  • 57. Social and Legal Challenges
  • 58. Privacy • The IoT creates unique challenges to privacy, many that go beyond the data privacy issues that currently exist. Much of this stems from integrating devices into our environments without us consciously using them.
  • 59. • This is becoming more prevalent in consumer devices, such as tracking devices for phones and cars as well as smart televisions. • In terms of the latter, voice recognition or vision features are being integrated that can continuously listen to conversations or watch for activity and selectively transmit that data to a cloud service for processing, which sometimes includes a third party. • The collection of this information exposes legal and regulatory challenges facing data protection and privacy law.
  • 60. • In addition, many IoT scenarios involve device deployments and data collection activities with multinational or global scope that cross social and cultural boundaries. What will that mean for the development of a broadly applicable privacy protection model for the IoT?
  • 61. • In order to realize the opportunities of the IoT, strategies will need to be developed to respect individual privacy choices across a broad spectrum of expectations, while still fostering innovation in new technologies and services.
  • 62. Regulatory Standards • Regulatory standards for data markets are missing especially for data brokers; they are companies that sell data collected from various sources. Even though data appear to be the currency of the IoT, there is a lack of transparency about;
  • 63. • Who gets access to data and how those data are used to develop products or services and sold to advertisers and third parties. There is a need for clear guidelines on the retention, use, and security of the data including metadata (the data that describe other data).