SlideShare a Scribd company logo
1 of 25
Download to read offline
IoMT (IOT Media)
Group 7
• Introduction to IOT in media
• Mechanism and main components
• Applications of IOT in media
• Challenges and Solutions
• Abstract
• Future Trends
• Conclusion
Agenda
Abstract
Abstract
• The Internet of Things (IoT) refers to the network of
tangible objects or "things" that are embedded with
electronics, software, sensors, and network connectivity.
This integration empowers these objects to gather and
share data effectively.
• It permits remote sensing and control of objects through
existing network infrastructure, fostering opportunities for
closer integration between the physical world and
computer-based systems. This integration leads to
enhanced efficiency, accuracy, and economic benefits.
• In the context of the Internet of Things (IoT), the
term "Things" encompasses a diverse range of
devices. Examples include heart monitoring
implants, biochip transponders for farm animals,
electric clams in coastal waters, vehicles
equipped with built-in sensors, DNA analysis
devices for environmental/food/pathogen
monitoring, and field operation devices aiding
fire-fighters in search and rescue operations.
• These devices gather valuable data utilizing various
existing technologies and subsequently autonomously
transmit the data to other devices.
Introduction to IOT in media
Introduction
• Media Things represent a novel category of interconnected
objects accessible, discoverable, and manipulated by non-
living analytical agents within the Internet of Things. By
categorizing media files and streams as "Things,"
conventional IoT functions, like those in smart homes, can
receive enhanced support, while also unlocking numerous
new applications. The significance goes beyond mere
identification of the type of video file; it extends to
understanding details such as capture-time and location. The
diverse standards established by MPEG anticipate broad
applications. In the realm of IoT, Media Things offer a
mechanism to consolidate and link the abundant online data
into coherent information packages. These packages are
usable by device systems, facilitating applications that span
the extensive spectrum envisioned by MPEG.
• The associations, facilitated by non-living agents, appear geared towards eventual
presentation to human users, aligning with IoMT's diverse use cases. Media Things,
searchable and discoverable, integrate seamlessly into the existing Internet of Things
framework, offering applications through API or within a blockchain for security and
commerce. The essence of the Internet of Things lies in devices-as-agents engaging
in valuable online activities, with IoMT presenting a broad array of applications,
especially in smart homes. Surveillance networks, influenced by evolving production
systems, extend beyond theft prevention. IoMT introduces not only Media Things but
also leverages various MPEG standards across evolving device systems,
showcasing its adaptability and impact in the IoT landscape.
Mechanism and main
components
IoT is a system of interconnected devices that communicate and share data with
each other over a network, usually the internet. The mechanism of IoT involves a
combination of hardware, software, and communication technologies to enable
seamless connectivity and data exchange. The main components of an IoT system
Mechanism
Main components :
1. Devices/Things :
2. Sensor
3. Connectivity modules
4. Data Processing and Analytics unit
5. User Interface
• Device/things :
These are physical objects or devices embedded with sensors, actuators, and other technologies to
collect and transmit data. Examples include sensors in home appliances, wearable devices, industrial
machines, and more.
• Sensor :
Sensors are critical components that gather data from the physical environment. They measure various
parameters such as temperature, humidity, light, motion, and more, depending on the application.
• Connectivity modules :
This component facilitates the communication between devices and the central system or other devices.
Connectivity options include Wi-Fi, Bluetooth, Zigbee, RFID, cellular networks, and more.
• Data processing and Analytic unit :
Collected data needs to be processed and analyzed to extract meaningful insights. This is often done in the cloud
or at the edge, utilizing computing resources to make informed decisions.
• User Interface :
This component allows users to interact with and control IoT devices. It could be a mobile app,
web portal, or other interfaces that provide a user-friendly experience.
Applications
Applications
• Smart TVs and Streaming Devices: Discuss how
IoT is integrated into smart TVs and streaming
devices, allowing users to access content
seamlessly and personalize their viewing
experience. Wearables for Media Consumption:
Explore how wearables, such as smartwatches
and augmented reality glasses, can enhance
media consumption on the go. Connected Audio
Devices: Discuss how IoT has transformed audio
devices like smart speakers and headphones,
enabling users to control their media through
voice commands.
Challenges and Solutions
challenges
• Lack of encryption :Although encryption is a great way to prevent hackers
from accessing data, it is also one of the leading IoT security challenges.
These drives like the storage and processing capabilities that would be found
on a traditional computer.
The result is an increase in attacks where hackers can easily manipulate the
algorithms that were designed for protection.
• Insufficient testing and updating :With the increase in the number of
IoT(internet of things) devices, IoT manufacturers are more eager to produce
and deliver their device as fast as they can without giving security too much of
although.
Most of these devices and IoT products do not get enough testing and
updates and are prone to hackers and other security issues.
• Brute forcing and the risk of default passwords :Weak credentials and
login details leave nearly all IoT devices vulnerable to password hacking
and brute force. Any company that uses factory default credentials on their
devices is placing both their business and its assets and the customer and
their valuable information at risk of being susceptible to a brute force
attack.
• IoT Malware and ransomware :Increases with increase in devices.
Ransomware uses encryption to effectively lock out users from various
devices and platforms and still use a user’s valuable data and info
Example:
A hacker can hijack a computer camera and take pictures.
By using malware access points, the hackers can demand ransom to unlock
the device and return the data.
Solutions
• Change Default Passwords: Change the default passwords on your IoT
devices to strong, unique passwords. Default passwords are often known and
can be exploited by attackers.
• Keep Software Updated: Regularly update the firmware and software of your
IoT devices. Manufacturers release updates to fix security vulnerabilities, so
keeping devices up to date is essential for maintaining security.
• Use Strong Authentication: Enable two-factor authentication whenever
possible. This adds an extra layer of security by requiring a second form of
verification in addition to a password.
• Secure Your Home Network: Ensure that your home Wi-Fi network is secure
by using strong encryption, a strong network password, and changing default
router login credentials.
• Review and Adjust Privacy Settings: Understand the privacy settings of your IoT
devices and adjust them according to your preferences. Limit the data collection and
sharing permissions to the minimum necessary.
• Regularly Check for Updates: Periodically check for updates not only on the devices
themselves but also on the associated mobile apps or web interfaces. Keeping all
components updated helps maintain security.
• Be Mindful of Camera and Microphone Access: If your IoT devices have cameras or
microphones, be cautious about their use. Disable these features when not needed to
protect your privacy.
• Secure Physical Access: Ensure that physical access to your IoT devices is restricted.
Physical tampering can pose security risks, so place devices in secure locations,
especially those with sensitive features like cameras or microphones.
• Monitor Device Activity: Regularly review the activity logs or notifications provided by
your IoT devices. Unusual or unexpected behavior could be an indicator of a security
issue.
Future Trends
Future Trends
• Edge Computing Adoption:
The rise of edge computing involves processing data closer to the source (devices) rather than
relying solely on centralized cloud servers. This trend is expected to reduce latency, enhance real-
time processing, and alleviate bandwidth requirements.
• 5G Integration:
The rollout and widespread adoption of 5G networks are expected to significantly impact IoT. The
increased speed and lower latency of 5G will support a more extensive array of connected devices
and applications.
• AI and Machine Learning Integration:
The integration of Artificial Intelligence (AI) and Machine Learning (ML) into IoT systems will
enable smarter and more autonomous decision-making. This combination can analyze large
datasets, identify patterns, and optimize device functionalities.
• IoT in Healthcare:
The healthcare industry is poised to see significant IoT advancements, including remote
patient monitoring, smart medical devices, and improved healthcare delivery through real-
time data analysis.
• IoT in Agriculture (AgTech):
Precision agriculture and the use of IoT in farming practices, often referred to as AgTech, will
likely increase. Sensors and data analytics can optimize crop management, resource utilization,
and yield.
Conclusion
Conclusion
• In conclusion, the convergence of IoT and media, often referred to as IoT Media or
IoMT, represents a transformative integration of technology. This synergy facilitates
the seamless connection and utilization of various media-related devices, allowing
for enhanced user experiences and diverse applications. As Media Things become
integral components of the broader IoT ecosystem, the potential for innovative
solutions, improved efficiency, and enriched content delivery continues to expand,
promising a dynamic future at the intersection of media and the Internet of Things.
References
https://drait.edu.in/assets/departments/ECE/mater
ials/Internet_of_things.pdf
https://www.acma.gov.au/sites/default/files/2020-
07/Internet%20of%20Things%20in%20media%20and%20communications_Occasional
%20paper.pdf
https://www.geeksforgeeks.org/challenges-in-internet-of-things-iot/
https://mpeg.chiariglione.org/news/introducing-media-things-
internet-things
THANK YOU

More Related Content

Similar to Presentation about IoT in media and communication.pdf

Unit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).pptUnit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).pptnadoje
 
Security Issues in IoT-Based Environments
Security Issues in IoT-Based EnvironmentsSecurity Issues in IoT-Based Environments
Security Issues in IoT-Based EnvironmentsIRJET Journal
 
Security Issues in IoT-Based Environments
Security Issues in IoT-Based EnvironmentsSecurity Issues in IoT-Based Environments
Security Issues in IoT-Based EnvironmentsIRJET Journal
 
The Internet of Things.pdf
The Internet of Things.pdfThe Internet of Things.pdf
The Internet of Things.pdfSONALIKABAL
 
Internet of things
Internet of thingsInternet of things
Internet of thingsTamojit Das
 
Internet of things (io t)
Internet of things (io t)Internet of things (io t)
Internet of things (io t)Biniam Behailu
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT SecurityCAS
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)asfaw Alene
 
IoT Device Management
IoT Device ManagementIoT Device Management
IoT Device ManagementFriendlyTech1
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)GOPAL BASAK
 
An Analysis of the Architecture of the Internet of Things.pdf
An Analysis of the Architecture of the Internet of Things.pdfAn Analysis of the Architecture of the Internet of Things.pdf
An Analysis of the Architecture of the Internet of Things.pdfCIOWomenMagazine
 
iot-full-notes-iot-for-smart-systems.pdf
iot-full-notes-iot-for-smart-systems.pdfiot-full-notes-iot-for-smart-systems.pdf
iot-full-notes-iot-for-smart-systems.pdfRamithaDevi
 

Similar to Presentation about IoT in media and communication.pdf (20)

Unit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).pptUnit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).ppt
 
Unit 1 iot.pptx
Unit 1 iot.pptxUnit 1 iot.pptx
Unit 1 iot.pptx
 
1. IoT.pptx
1. IoT.pptx1. IoT.pptx
1. IoT.pptx
 
Security Issues in IoT-Based Environments
Security Issues in IoT-Based EnvironmentsSecurity Issues in IoT-Based Environments
Security Issues in IoT-Based Environments
 
Security Issues in IoT-Based Environments
Security Issues in IoT-Based EnvironmentsSecurity Issues in IoT-Based Environments
Security Issues in IoT-Based Environments
 
The Internet of Things.pdf
The Internet of Things.pdfThe Internet of Things.pdf
The Internet of Things.pdf
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Internet of things (io t)
Internet of things (io t)Internet of things (io t)
Internet of things (io t)
 
123456.pptx
123456.pptx123456.pptx
123456.pptx
 
IOT- UNIT-1.pptx
IOT- UNIT-1.pptxIOT- UNIT-1.pptx
IOT- UNIT-1.pptx
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT Security
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 
IoT Device Management
IoT Device ManagementIoT Device Management
IoT Device Management
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 
Chapter~4.pptx
Chapter~4.pptxChapter~4.pptx
Chapter~4.pptx
 
M2M_IoT_Presentation
M2M_IoT_PresentationM2M_IoT_Presentation
M2M_IoT_Presentation
 
Introduction to IoT
Introduction to IoTIntroduction to IoT
Introduction to IoT
 
PPT Format for CA1.pptx
PPT Format for CA1.pptxPPT Format for CA1.pptx
PPT Format for CA1.pptx
 
An Analysis of the Architecture of the Internet of Things.pdf
An Analysis of the Architecture of the Internet of Things.pdfAn Analysis of the Architecture of the Internet of Things.pdf
An Analysis of the Architecture of the Internet of Things.pdf
 
iot-full-notes-iot-for-smart-systems.pdf
iot-full-notes-iot-for-smart-systems.pdfiot-full-notes-iot-for-smart-systems.pdf
iot-full-notes-iot-for-smart-systems.pdf
 

Recently uploaded

Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 

Recently uploaded (20)

Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 

Presentation about IoT in media and communication.pdf

  • 2. • Introduction to IOT in media • Mechanism and main components • Applications of IOT in media • Challenges and Solutions • Abstract • Future Trends • Conclusion Agenda
  • 4. Abstract • The Internet of Things (IoT) refers to the network of tangible objects or "things" that are embedded with electronics, software, sensors, and network connectivity. This integration empowers these objects to gather and share data effectively. • It permits remote sensing and control of objects through existing network infrastructure, fostering opportunities for closer integration between the physical world and computer-based systems. This integration leads to enhanced efficiency, accuracy, and economic benefits.
  • 5. • In the context of the Internet of Things (IoT), the term "Things" encompasses a diverse range of devices. Examples include heart monitoring implants, biochip transponders for farm animals, electric clams in coastal waters, vehicles equipped with built-in sensors, DNA analysis devices for environmental/food/pathogen monitoring, and field operation devices aiding fire-fighters in search and rescue operations. • These devices gather valuable data utilizing various existing technologies and subsequently autonomously transmit the data to other devices.
  • 7. Introduction • Media Things represent a novel category of interconnected objects accessible, discoverable, and manipulated by non- living analytical agents within the Internet of Things. By categorizing media files and streams as "Things," conventional IoT functions, like those in smart homes, can receive enhanced support, while also unlocking numerous new applications. The significance goes beyond mere identification of the type of video file; it extends to understanding details such as capture-time and location. The diverse standards established by MPEG anticipate broad applications. In the realm of IoT, Media Things offer a mechanism to consolidate and link the abundant online data into coherent information packages. These packages are usable by device systems, facilitating applications that span the extensive spectrum envisioned by MPEG.
  • 8. • The associations, facilitated by non-living agents, appear geared towards eventual presentation to human users, aligning with IoMT's diverse use cases. Media Things, searchable and discoverable, integrate seamlessly into the existing Internet of Things framework, offering applications through API or within a blockchain for security and commerce. The essence of the Internet of Things lies in devices-as-agents engaging in valuable online activities, with IoMT presenting a broad array of applications, especially in smart homes. Surveillance networks, influenced by evolving production systems, extend beyond theft prevention. IoMT introduces not only Media Things but also leverages various MPEG standards across evolving device systems, showcasing its adaptability and impact in the IoT landscape.
  • 10. IoT is a system of interconnected devices that communicate and share data with each other over a network, usually the internet. The mechanism of IoT involves a combination of hardware, software, and communication technologies to enable seamless connectivity and data exchange. The main components of an IoT system Mechanism Main components : 1. Devices/Things : 2. Sensor 3. Connectivity modules 4. Data Processing and Analytics unit 5. User Interface
  • 11. • Device/things : These are physical objects or devices embedded with sensors, actuators, and other technologies to collect and transmit data. Examples include sensors in home appliances, wearable devices, industrial machines, and more. • Sensor : Sensors are critical components that gather data from the physical environment. They measure various parameters such as temperature, humidity, light, motion, and more, depending on the application. • Connectivity modules : This component facilitates the communication between devices and the central system or other devices. Connectivity options include Wi-Fi, Bluetooth, Zigbee, RFID, cellular networks, and more. • Data processing and Analytic unit : Collected data needs to be processed and analyzed to extract meaningful insights. This is often done in the cloud or at the edge, utilizing computing resources to make informed decisions. • User Interface : This component allows users to interact with and control IoT devices. It could be a mobile app, web portal, or other interfaces that provide a user-friendly experience.
  • 13. Applications • Smart TVs and Streaming Devices: Discuss how IoT is integrated into smart TVs and streaming devices, allowing users to access content seamlessly and personalize their viewing experience. Wearables for Media Consumption: Explore how wearables, such as smartwatches and augmented reality glasses, can enhance media consumption on the go. Connected Audio Devices: Discuss how IoT has transformed audio devices like smart speakers and headphones, enabling users to control their media through voice commands.
  • 15. challenges • Lack of encryption :Although encryption is a great way to prevent hackers from accessing data, it is also one of the leading IoT security challenges. These drives like the storage and processing capabilities that would be found on a traditional computer. The result is an increase in attacks where hackers can easily manipulate the algorithms that were designed for protection. • Insufficient testing and updating :With the increase in the number of IoT(internet of things) devices, IoT manufacturers are more eager to produce and deliver their device as fast as they can without giving security too much of although. Most of these devices and IoT products do not get enough testing and updates and are prone to hackers and other security issues.
  • 16. • Brute forcing and the risk of default passwords :Weak credentials and login details leave nearly all IoT devices vulnerable to password hacking and brute force. Any company that uses factory default credentials on their devices is placing both their business and its assets and the customer and their valuable information at risk of being susceptible to a brute force attack. • IoT Malware and ransomware :Increases with increase in devices. Ransomware uses encryption to effectively lock out users from various devices and platforms and still use a user’s valuable data and info Example: A hacker can hijack a computer camera and take pictures. By using malware access points, the hackers can demand ransom to unlock the device and return the data.
  • 17. Solutions • Change Default Passwords: Change the default passwords on your IoT devices to strong, unique passwords. Default passwords are often known and can be exploited by attackers. • Keep Software Updated: Regularly update the firmware and software of your IoT devices. Manufacturers release updates to fix security vulnerabilities, so keeping devices up to date is essential for maintaining security. • Use Strong Authentication: Enable two-factor authentication whenever possible. This adds an extra layer of security by requiring a second form of verification in addition to a password. • Secure Your Home Network: Ensure that your home Wi-Fi network is secure by using strong encryption, a strong network password, and changing default router login credentials.
  • 18. • Review and Adjust Privacy Settings: Understand the privacy settings of your IoT devices and adjust them according to your preferences. Limit the data collection and sharing permissions to the minimum necessary. • Regularly Check for Updates: Periodically check for updates not only on the devices themselves but also on the associated mobile apps or web interfaces. Keeping all components updated helps maintain security. • Be Mindful of Camera and Microphone Access: If your IoT devices have cameras or microphones, be cautious about their use. Disable these features when not needed to protect your privacy. • Secure Physical Access: Ensure that physical access to your IoT devices is restricted. Physical tampering can pose security risks, so place devices in secure locations, especially those with sensitive features like cameras or microphones. • Monitor Device Activity: Regularly review the activity logs or notifications provided by your IoT devices. Unusual or unexpected behavior could be an indicator of a security issue.
  • 20. Future Trends • Edge Computing Adoption: The rise of edge computing involves processing data closer to the source (devices) rather than relying solely on centralized cloud servers. This trend is expected to reduce latency, enhance real- time processing, and alleviate bandwidth requirements. • 5G Integration: The rollout and widespread adoption of 5G networks are expected to significantly impact IoT. The increased speed and lower latency of 5G will support a more extensive array of connected devices and applications. • AI and Machine Learning Integration: The integration of Artificial Intelligence (AI) and Machine Learning (ML) into IoT systems will enable smarter and more autonomous decision-making. This combination can analyze large datasets, identify patterns, and optimize device functionalities.
  • 21. • IoT in Healthcare: The healthcare industry is poised to see significant IoT advancements, including remote patient monitoring, smart medical devices, and improved healthcare delivery through real- time data analysis. • IoT in Agriculture (AgTech): Precision agriculture and the use of IoT in farming practices, often referred to as AgTech, will likely increase. Sensors and data analytics can optimize crop management, resource utilization, and yield.
  • 23. Conclusion • In conclusion, the convergence of IoT and media, often referred to as IoT Media or IoMT, represents a transformative integration of technology. This synergy facilitates the seamless connection and utilization of various media-related devices, allowing for enhanced user experiences and diverse applications. As Media Things become integral components of the broader IoT ecosystem, the potential for innovative solutions, improved efficiency, and enriched content delivery continues to expand, promising a dynamic future at the intersection of media and the Internet of Things.