Académique Documents
Professionnel Documents
Culture Documents
and to each other through small, embedded sensors and wired and
wireless technologies, creating an ecosystem of ubiquitous computing
(FTC, 2015, p. 5). Others argue the defining point is simply embedded
intelligence in physical objects. However, [w]hat all definitions of the
IoT have in common is that they focus on how computers, sensors, and
objects interact with one another and process data (FTC, 2015, p. 5).
The IoT is not yet a ubiquitous part of everyday life, but
estimates claim there will be as many as sixteen billion devices
connected to the Internet by 2020 (Clark, 2014; Middleton et al., 2013;
Press, 2014). In a matter of years, practically every daily activity will be
automated, connected to the Internet, and gathering data. In the
home, the IoT will start the coffee maker before you wake up, learn
your temperature habits and adjust accordingly, lower the shades to
block afternoon sun, alert you when you are low on essentials such as
milk or bread, and unlock your doors to your home as you approach in
your car, among countless other possibilities.
The IoT will extend far beyond providing convenience for the
average consumer. The increased potential for efficiency that comes
with an Internet-intergraded world is enormous. The IoT will change the
ways businesses are run and the way cities are organized. It will
change manufacturing, create safety measures previously impossible,
and through its application in healthcare, save lives. From simple
access control to predictive maintenance, the IoT will streamline the
processes of any industry in countless ways. Businesses will be able to
and outside [their] home[s] (FTC, 2015, p. 9). The list of timesaving
uses the IoT entails goes well beyond this cursory list of examples, and
as the IoT grows, its uses will continue to expand.
The IoT will promote efficiency for individual consumers, public
utilities, and private entities. In the manufacturing sector as well as
other sectors of business, the utilization of IoT technology will
enhance restocking or other supply chain management services
(Weinberg et al., 2015, p. 619). This will in turn save the company both
money and time through increased productivity, allowing valuable
resources to be devoted to other areas, such as research and
development. The ways in which firms make money and charge for
services can be similarly revolutionized through the IoT. For example,
pay-as-you-go could be broadened beyond mobile phone services and
automobile rentalsto almost any application, such as insurance
(Weinberg et al., 2015, p. 619). Such innovation could both save
consumers money and attract new consumers who might be wary of
long-term monetary commitments.
Additionally, individuals and public and private entities will be
able to work together for communal efficiency through the IoT. For
example, smart meters can enable energy providers to analyze
consumer energy use and identify issues with home appliances, even
alerting homeowners if their insulation seems inadequate compared to
their neighbors, thus empowering consumers to make better
decisions about how they use electricity (FTC, 2015, p. 8). Such
would allow them to manage their health care at home without the
need for long-term hospital stays or transition to a long-term care
facility (FTC, 2015, p. 7).
While wearable devices have a limited range of uses, injected or
ingested devices would allow [d]ata [to]be collected for finer grain
health-related phenomena such as blood flow, neural activity, or
ultimatelyprotection from life-threatening afflictions (Weinberg et
al., 2015, p. 619). Advanced uses of IoT technology such as these are
still on the periphery of current technology. However, it can be inferred
that through the ever-increasing speed of innovation, the uses for
Internet connected medical devices of this nature could be practically
endless. It could be possible, in the near future, a wearable or ingested
device and its peripherals could predict a life-threatening event such
as a heart attack or stroke, contact emergency services, and relay the
patients vital statistics to emergency personnel who are en route, as
well as the receiving hospital.
RISKS
Despite the potential benefits of a widely distributed IoT, with
such high levels of connectivity, come high levels of risk. Most of the
probable threats that come with a network of physical objects
connected to the Internet relate to the simple issue of privacy. With
tens of billions of objects projected to be interacting with one another,
the security risks become very real, as each of these communications
must be secured against intruders. The number of attack vectors
medical device that monitors things like heart rate and activity could
harm the individuals future prospects: the data gathered by the
device could be used in the future to price health or life insurance or to
infer the users suitability for credit or employment (FTC, 2015, p. 16).
There are multiple facets to be considered, even when only dealing
with the most superficially connected wearable medical devices. As it
is a private firm that often creates the device and collects the data, it is
similarly often that firm that owns the rights to the data. This means
that they can sell the data for a profit, if they so choose. The consumer
must consider with whom they are comfortable sharing their personal
medical information. They should consider their devices privacy policy,
if it has one. The main problem is that consumers often do not realize
that they are conveying sensitive information through a physical
device. Many individuals today safeguard their online presence, be it
through email, social media, etc.because they understand this data
to be to some degree vulnerable. However, many consumers do not
yet understand the privacy risks of physical object with built-in wireless
sensors, increasing their vulnerability.
Similarly, as medical records become increasingly digitized, and
potentially shared between networks, there exists an increased risk of
privacy violations. Medical records can be at risk of theft and misuse
both from within a medical institution and without. While a breach of
personal health information can be inadvertent or malicious, most
individuals would consider this be a major breach of their privacy rights
either way.
On the more serious side of potential risks associated with IoT
enabled medical devices comes the hacking of actual devices. While
this is a risk that is often sensationalized, there have been recorded
instances that validate this possibility. For example, the FTC reports an
instance where an individual was able to hack remotely into
connected insulin pumps and change their settings so that they no
longer delivered medicine (FTC, 2015, p. 12). Similar threats could be
imagined: advanced hearing aids or advanced prosthetic limbs could
be disabled, and wirelessly connected pacemakers could be shut off.
Whether or not these threats will present themselves to be likely
occurrences, the IoT will at the very least make them possible, and
thus cannot be taken lightly.
Another area in which the IoT presents a serious risk to safety is
with connected automobiles. Connected sensors could transmit to
insurance companies the extent to which a driver brakes suddenly,
speeds, etc. and give motive to subsequently increase rates. However,
similar to connected medical devices, connected automobiles produce
a more serious risk. It becomes possible for an attacker [to] gain
access to the cars internal computer network without ever physically
touching the car (FTC, 2015, p. 12), in turn creating the potential for
the attacker to remotely assume control of the vehicle. This gives a
hacker a several-thousand pound weapon to control, which poses a
serious safety risk not only to those inside the vehicle, but also to
failure
and should adjust itself to node failures.
2. Data authentication: As a principle, retrieved address and
object
information must be authenticated.
3. Access control: Information providers must be able to
implement
access control on the data provided.
4. Client privacy: Measures need to be taken that only the
information
provider is able to infer from observing the use of lookup
system
related to a specific consumer; at least, inference should be
very
hard to conduct.
(Weber, 2010, p. 24).
If private entities successfully implement these measures from the
outset, as opposed to in reaction to breaches, the IoT could be a
reasonably secure platform for sensitive data. The private sector
should take the onus upon themselves to make these safeguards
standard, not only to appease consumers, but to ensure security and
longevity for the IoT, which will in turn provide benefits for firms in
numerous ways.
Self-regulation by the private sector is unlikely to be successful if
left to its own devices, however. Legislation will likely be necessary to
ensure the security of the IoT. This could range from simple incentives
that urge private firms that build connected devices to include
stringent safety measures at the low end, to regulation that requires all
firms that produce such devices to meet certain privacy and security
CONCLUSION
The continued development of the IoT will undoubtedly
revolutionized the way one lives his or her life and how society will
function as a whole. It could very well turn out to be the most
important advancement since the Internet itself. This is why its
innovation must be adequately protected. The benefit society stands to
REFERENCES
Clark, D. (2014, January 5). Internet of things in reach: Companies
rush into devices
like smart doors locks, appliances, but limitations exist. The Wall
Street
Journal.
FTC Staff Report. (2015, January). Internet of things: Privacy & security
in a
connected world.
Medaglia, C., & Serbanati, A. (2010). The internet of things. New York,
NY: Springer
New York.
Middleton, P., Kjeldsen, P., & Tully, J. (2013, November 18). Forecast:
The internet of
things, worldwide, 2013. Gartner.