物联网与嵌入式系统概论-week1-What Is the IoT- Lesson3: The Importance of the IoT

This series of articles are the study notes of  "An Introduction to Programming the Internet of Things", by Prof. Harris, Department of Computer Science, University of California, Irvine. This article is week 1, lessen 1: Definition of the Internet of Things (IoT). This article is the notes of Lesson3: The Importance of the Internet of Things (IoT) in Society.

3. Lesson 3 The Importance of the Internetof Things (IoT) in Society

3.1 Lecture 3.1 Societal Benefits of IoT

3.1.1 IoT makes life easier

  • What food do I need?
  • Are my accounts balanced?

3.1.2 Independence from people

  • IoT devices handle things you needed humans for
  • Fewer doctor visits; no trips to the super market

Also, IoT devices, they got Internet right there in the term, they connect into the network, so you can actually connect to people. So in some ways, it can enhance your interaction with people in a different form. So maybe not inperson interaction, but you can talk to people on the network. Through any device that you feel like using, right. So you can have all sorts of personal interactions, but also professional interactions.

3.2 Lecture 3.2 Risks, Privacy, andSecurity

3.2.1 IoT Risks

Social isolation

One advantage that we listed in the last lecture was that  you don't have to depend on people as much. You can depend on your IoT device to do things for you, and you don't have todeal with people as much. So  the down side of that is potential social isolation. You don't have to leave your house if you don't want to. You can be a hermit. Stay in your house, never walk out, and have everything come to you.


Dependence on technology and infrastructure

Another big problem with IoT is that you're now more dependent on technology, and all the infrastructure that comes along with it. So, if things go down, like for instance my email. And this is noteven really an Internet of Things issue. But, email, I use it on a standard computeror my iphone too, if I want to. But if email goes down, it's a seriousimpediment to me. When you're using it through IoT, through the internet, and through your devices, when your  device goes down, or when the network itself goes down, it's a big problem for you. So, power outages in general are a big problem because all your devices are going down.

3.2.2 Privacy and Security

So another property of these IoT devices isthey are, they're recording information. They are observing us. Now, presumably for our benefit. But they are observing us a lot and they are pervasive, so everywhere.

Observation by IoT devices is pervasive

  • Location: cell phone
  • Health: health monitor
  • Media watching habits: TV/ media system
  • Purchasing habits: credit card, cellphone
  • Driving habits: car incident recording

Data may be used to market to you

  • Health problem? Drugs may be marketed to you

Purchasing an IoT device may give the manufacturerpermission to use or sell your data

  • Consumer agreement contracts can be cryptic

Often you give permission to the person you purchase the device from, you give them permission to use that data in those long agreements that you click Okay to. So when you buy a device, buy a phone, or put an application on your phone and it says do you accept the agreement terms? And you don't read that, but you click Okay.

Data my be used by insurance agencies

This type of information is very useful to different agencies in different ways. And you should be aware that while these IoT devices are beneficial to you, they are storing data and that data may or may not be in your control.

  • Were you speeding at the time of the accident?
  • Do you have any undignosed health problem?

Security: data maynot be held in a secure way

  • Cloud is attacked with your data inside
  • Even encrypted data is decrypted in use

Security's another thing. Often this datais held in the cloud somewhere. So say FitBit, it tracks your data, it sends it to some cloud servers. Now, this is medical information and you would like it to remain private. And they maybe try to keep it private, but there are hackers. There are people who steal data, and you must have heard about this inthe news. The data can be attacked at the cloud server, and it's out of your control. So if that data isn't maintained in a secure way. So, what we're showing over here is basically a rough picture of an encryption algorithm. But the idea is that data would need to be encrypted.


  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值