物联网技术面临的挑战_物联网开发人员面临的4大技术挑战

物联网技术面临的挑战

IoTWeek_Gray

It’s IoT Week at SitePoint! All week we’re publishing articles focused on the intersection of the internet and the physical world, so keep checking the IoT tag for the latest updates.

这是SitePoint的IoT周! 我们整周都在发布有关互联网与物理世界交汇点的文章,因此请继续检查IoT标签以获取最新更新。

The Internet of Things (IoT) is taking the world by storm. The millions of connected sensors and smart devices that are being deployed on a daily basis in homes, offices, cities and even on our persons are creating unprecedented opportunities in cutting costs, reducing energy consumption, improving efficiency and customer services, and better understanding how we interact with our environment.

物联网(IoT)席卷全球。 每天在家庭,办公室,城市甚至我们的人中部署的数百万个已连接的传感器和智能设备正在为削减成本,减少能耗,提高效率和客户服务以及更好地了解我们如何创造前所未有的机会 。与我们的环境互动。

The IoT, hailed as one of the biggest breakthroughs in the history of the tech industry, will soon be an inherent part of every aspect of our lives, from retail shops to hotels, to cars and airplanes and practically everything we interact with.

物联网被誉为科技行业历史上最大的突破之一,它将很快成为我们生活各个方面的固有组成部分,从零售商店到酒店,再到汽车和飞机,乃至几乎与我们互动的所有事物。

But this added utility comes with its own set of caveats and requirements, which need to be met and overcome with the proper solutions and approaches. Here are four challenges to expect in the future.

但是,此增加的实用程序具有其自己的一组警告和要求,需要通过适当的解决方案和方法来满足和克服这些警告和要求。 这是未来的四个挑战。

internet of things

安全挑战 (Security Challenges)

IoT has already turned into a serious security concern that has drawn the attention of prominent tech firms and government agencies across the world. The hacking of baby monitors, smart fridges, Barbie dolls, drug infusion pumps, cameras and even assault rifles are portending a security nightmare being caused by the future of IoT. So many new nodes being added to networks and the internet will provide malicious actors with innumerable attack vectors and possibilities to carry out their evil deeds, especially since a considerable number of them suffer from security holes.

物联网已经变成了严重的安全问题,引起了全球知名科技公司和政府机构的关注。 婴儿监视器智能冰箱芭比娃娃 ,输液泵,相机甚至是突击步枪的入侵正预示着物联网未来的安全梦night。 如此多的新节点被添加到网络和Internet中,将为恶意行为者提供无数的攻击媒介,并有可能实施其恶行,特别是因为其中相当多的人遭受安全漏洞的困扰。

The more important shift in security will come from the fact that IoT will become more ingrained in our lives. Concerns will no longer be limited to the protection of sensitive information and assets. Our very lives and health can become the target of IoT hack attacks, as was shown in the hacking of pacemakers. Critical city infrastructure can also become a target, as the Ukraine power grid hack warned us last year.

物联网将在我们的生活中更加根深蒂固,这将是安全性方面更为重要的转变。 关注不再局限于对敏感信息和资产的保护。 如起搏器被黑客攻击所示, 我们的生命和健康可能成为IoT黑客攻击的目标。 去年, 乌克兰电网黑客警告我们,关键的城市基础设施也可能成为目标。

There are many reasons behind the state of insecurity in IoT. Some of it has to do with the industry being in its “gold rush” state, where every vendor is hastily seeking to dish out the next innovative connected gadget before competitors do. Under such circumstances, functionality becomes the main focus and security takes a back seat.

物联网中不安全状态的背后原因有很多。 其中一些原因与该行业处于“淘金热”状态有关,在该行业中,每个供应商都在争先恐后地寻求推出下一个创新的联网小工具,而不是竞争对手。 在这种情况下,功能性成为主要焦点,安全性则退居二线。

Also, many IoT developers often come from an embedded systems programming background and are ignorant of the threats of IoT programming. They don’t necessarily have the knowhow and expertise to program for the hostile connected environment of the internet, and end up dishing out code that is reliable from a functionality perspective, but can easily be exploited remotely.

此外,许多物联网开发人员通常来自嵌入式系统编程背景,并且不了解物联网编程的威胁。 他们不一定具有为互联网的敌对连接环境编程的知识和专长,最终抛出的代码从功能角度来看是可靠的,但可以很容易地被远程利用。

Scalability issues also contribute to the creation insecure IoT products. The fact is that many security solutions being used today have been created with generic computing devices in mind. IoT devices often lack the computational power, storage capacity and even proper operating system to be able to deploy such solutions.

可伸缩性问题也导致创建不安全的IoT产品。 事实是,当今使用的许多安全解决方案都是在考虑通用计算设备的情况下创建的。 物联网设备通常缺乏计算能力,存储容量,甚至缺乏合适的操作系统来部署此类解决方案。

隐私挑战 (Privacy Challenges)

Some of the data that IoT devices collect are very sensitive and are protected by legislations such as the Health Insurance Portability and Accountability Act (HIPAA) in the U.S. and are fundamentally different from our browsing and clicking habits. Yet the necessary precautions aren’t taken when storing the data or sharing it with other service providers. Vendors and manufacturers must either discard this data or remove the Personally Identifiable Information (PII) to make sure that consumers aren’t damaged in case of data breaches.

物联网设备收集的某些数据非常敏感,并受到美国健康保险可移植性和责任法案(HIPAA)等法律的保护,与我们的浏览和点击习惯根本不同。 但是,在存储数据或与其他服务提供商共享数据时,并没有采取必要的预防措施。 供应商和制造商必须丢弃此数据或删除个人身份信息(PII),以确保在数据泄露的情况下不会损坏消费者。

Another consideration to take is that while data generated about a single appliance (such as a smart toaster) might not be sensitive per-se, yet when combined with data from other devices, it can reveal information such as the consumer’s life pattern, which can become very damaging if they fall into the hands of the wrong people. In many cases, criminals don’t even need to pry into your encrypted communications in order to obtain the information they want. A study by LGS Innovations elaborates on this issue and presents a DIY solution to protect IoT traffic and privacy.

需要考虑的另一个因素是,虽然有关单个设备(例如智能烤面包机)生成的数据本身可能并不敏感,但是当与其他设备的数据结合使用时,它可以揭示诸如消费者的生活模式之类的信息。如果他们落入错误的人的手中,将会变得非常有害。 在许多情况下,犯罪分子甚至无需撬入您的加密通信即可获取他们想要的信息。 LGS Innovations的一项研究详细阐述了此问题,并提出了一种DIY解决方案来保护物联网流量和隐私。

连接挑战 (Connectivity Challenges)

Connecting so many devices will be one of the biggest challenges of the future of IoT, and it will defy the very structure of current communication models and the underlying technologies. At present we rely on the centralized, server/client paradigm to authenticate, authorize and connect different nodes in a network.

连接如此多的设备将是物联网未来的最大挑战之一,它将挑战当前通信模型和底层技术的结构。 目前,我们依靠集中的服务器/客户端范例来认证,授权和连接网络中的不同节点。

This model is sufficient for current IoT ecosystems, where tens, hundreds or even thousands of devices are involved. But when networks grow to join billions and hundreds of billions of devices, centralized brokered systems will turn into a bottleneck. Such systems will require huge investments and spending in maintaining cloud servers that can handle such large amounts of information exchange, and entire systems can go down if the server becomes unavailable.

对于当前涉及数十,数百甚至数千个设备的物联网生态系统,此模型已足够。 但是,当网络连接成千上万亿个设备时,集中式代理系统将成为瓶颈。 这样的系统将需要大量投资和维护维护可处理大量信息交换的云服务器,并且如果服务器不可用,整个系统可能会崩溃。

The future of IoT will very much have to depend on decentralizing IoT networks. Part of it can become possible by moving functionality to the edge, such as using fog computing models where smart devices such as IoT hubs take charge of time-critical operations and cloud servers take on data gathering and analytical responsibilities.

物联网的未来将非常依赖于分散式物联网网络。 通过将功能移至边缘(例如使用雾计算模型) ,部分功能将成为可能,在该模型中,物联网中枢等智能设备负责时间紧迫的操作,而云服务器则负责数据收集和分析。

Other solutions involve the use of peer-to-peer communications, where devices identify and authenticate each other directly and exchange information without the involvement of a broker. Networks will be created in meshes with no single point of failure. This model will have its own set of challenges, especially from a security perspective, but these challenges can be met with some of the emerging IoT technologies such as the Phantom protocol, or leveraging the success of other tried and tested models such as the blockchain.

其他解决方案涉及对等通信的使用,在这种对等通信中,设备可以直接相互识别和认证,并且无需经纪人的参与即可交换信息。 将在没有单点故障的网格中创建网络。 该模型将面临一系列挑战,尤其是从安全性角度来看,但是这些挑战可以通过一些新兴的物联网技术(例如Phantom协议 )或利用其他经过验证的模型(例如区块链)的成功来解决。

兼容性和长寿挑战 (Compatibility and Longevity Challenges)

As an industry that is going through its baby steps, IoT is growing in many different directions, with many different technologies competing to become the standard. For instance, we currently have ZigBee, Z-Wave, Wi-Fi, Bluetooth and Bluetooth Low Energy (BTLE) all vying to become the dominant transport mechanism between devices and hubs. This will cause difficulties and require the deployment of extra hardware and software when connecting devices.

物联网作为一个处于起步阶段的行业,其发展方向朝着不同的方向发展,许多不同的技术竞争成为标准。 例如,我们目前有ZigBee,Z-Wave,Wi-Fi,蓝牙和低功耗蓝牙(BTLE)争夺成为设备和集线器之间的主要传输机制。 这将造成困难,并且在连接设备时需要部署额外的硬件和软件。

Other compatibility issues stem from non-unified cloud services, lack of standardized M2M protocols and diversities in firmware and operating systems among IoT devices.

其他兼容性问题源于非统一的云服务,缺乏标准化的M2M协议以及物联网设备之间固件和操作系统的多样性。

Some of these technologies will eventually become obsolete in the next few years, effectively rendering the devices implementing them useless. This is especially important, since in contrast to generic computing devices which have a lifespan of a few years, IoT appliances (such as smart fridges or TVs) tend to remain in service for much longer, and should be able to function even if their manufacturer goes out of service.

这些技术中的某些技术最终将在未来几年内过时,从而使实施这些技术的设备毫无用处。 这一点特别重要,因为与使用寿命长达数年的通用计算设备相比,物联网设备(例如智能冰箱或电视)的使用寿命往往更长,即使制造商也应能够运行停止服务。

I’ve already discussed how the concept of abstraction and separation of concerns can help overcome many of the compatibility challenges that lie ahead in the evolution of IoT. Other notable efforts in this regard include the creation of platforms such as Afero and the Apple’s HomeKit, which enable developers to focus on functionality while letting the platform take care of communication and security.

我已经讨论了抽象和关注点分离的概念如何帮助克服物联网发展中面临的许多兼容性挑战。 在这方面,其他值得注意的工作包括创建Afero和Apple的HomeKit之类的平台 ,这些平台使开发人员可以专注于功能,同时让该平台负责通信和安全性。

翻译自: https://www.sitepoint.com/4-major-technical-challenges-facing-iot-developers/

物联网技术面临的挑战

  • 2
    点赞
  • 7
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值