Slides - Murray State University`s RacerNet

advertisement
Internet of Things (IoT)
0 It is a technology that applies within a geographically
circumscribed environment, where diverse objects
communicate with one another through the Internet.
www.control4.com
Defining Features of IoT
0 ubiquity
0 embedded intelligence
0 miniaturization
0 seamless transfer
0 ambiguity
0 distributed control
0 identification
0 big data
0 connectivity
0 unpredictability
0 mediation and
autonomous agency
Digital Universe
Four major migrations from analog to digital
1. computer
2. phones
3. Cameras
4. machines
postmastersqc.com
Intel’s Estimation
0 15 billion objects by 2015
0 200 billion objects by 2020
0 Each person having about 26 smart objects by 2020
0 Total global worth of IoT technology = $6.2 trillion
0 Infographic:
0 http://www.intel.com/content/www/us/en/intellige
nt-systems/iot/internet-of-things-infographic.html
0 http://share.cisco.com/internet-of-things.html
Technology - Communication
0 Radio-frequency identification (RFID)
0 Near field communication (NFC)
0 Bluetooth
0 WiFi
www.mpilabels.com
it.emcelettronica.com
www.gwi.net
Technology - Identification
0 Internet Protocol version 6 (IPv6)
0 Internet Protocol version 4 (IPv4)
0 Transmission Control Protocol (TCP)
0 User Datagram Protocol (UDP)
Hardware, Software, and
Cloud Service
0 Gainspan
0 RIOT OS
0 Wiznet
0 Thingsquare Mist
0 Nordic Semiconductor
0 ThingWorx
0 TI
0 Evrythng
0 Arduino
0 Sense
0 Raspberry Pi
0 BeagleBone Black
Applications
0 Mimo monitor
0 BeClose system
0 dweet.io
0 http://postscapes.com/internet-of-things-examples/
0 http://www.libelium.com/top_50_iot_sensor_applicat
ions_ranking/
Ethical Issues
0 Privacy
0 Malicious usage
0 Cybercrime
0 Discrimination
Examples
0 “It might be some effort to get this kind of scenario,
but if breaking into one server means you get to
ransack 100, 1,000, 10,000 people’s homes, that’s
definitely worth it, and that’s where the real danger
lies.“ - Rachel Metz from MIT Review
0 Hackers used 100,000 everyday consumer gadgets
that were connected to the internet to send more than
750,000 malicious spam phishing emails to
enterprises and individuals throughout the world.
(Occured between December 23, 2013 and January 6)
Laws and Regulations
0 The Fourth Amendment to the United States
“the right of the people to be secure in their persons,
houses, papers, and effects, against unreasonable
searches and seizures, shall not be violated, and no
warrants shall issue, but upon probable cause, supported
by oath or affirmation, and particularly describing the
place to be searched, and the persons or things to be
seized"
“Shine the Light” law by
California constitution
“… outlines specific rules regarding how and when a
business must disclose use of a customer's personal
information and imposes civil damages for violation of
the law”
en.wikipedia.org
The Computer Fraud and
Abuse Act (CFAA)
0 accessing a computer without authorization and
0
0
0
0
subsequently transmitting classified government
information. [Subsection 1030(a)(1)];
theft of financial information [Subsection 1030(a)(2)];
accessing a "protected computer," which the courts have
recently interpreted as being any computer connected to
the internet, even if the intruder obtains no data
[Subsection 1030(a)(3)];
transmitting code that causes damage to a computer
system [Subsection 1030(a)(5)];
trafficking in computer passwords for the purpose of
affecting interstate commerce or a government computer
[Subsection 1030(a)(6)];
The Electronic
Communication Privacy Act
(ECPA)
0 “for the increasing amount of communications and
data transferred and stored on computer systems…
under the law, unauthorized access to computer
messages, whether in transit or in storage, is a federal
crime”
Conclusion
0 Our imagination becomes reality.
0 We are future computer scientists.
0 Building a better smart world through the IoT
depends on us, on our action.
tonden.wordpress.com
References
0 http://www.livescience.com/38562-internet-of-things.html
0 http://www.slideshare.net/PasqualePuzio/internet-of-things0
0
0
0
0
0
and-its-applications
http://www.intel.com/content/www/us/en/intelligentsystems/iot/internet-of-things-infographic.html
http://en.wikipedia.org/wiki/Internet_of_Things
http://searchmanufacturingerp.techtarget.com/definition/RFID
http://postscapes.com/internet-of-things-technologies
http://www.webopedia.com/DidYouKnow/Internet/ipv6_ipv4_d
ifference.html
http://www.technologyreview.com/news/526006/an-easyinterface-for-the-internet-of-things/
References
0 http://postscapes.com/internet-of-things-examples/
0 http://www.libelium.com/top_50_iot_sensor_applications_ranki
0
0
0
0
ng/
http://www.dailymail.co.uk/sciencetech/article2541306/Cyber-criminals-hack-REFRIGERATOR-sendmalicious-emails-worlds-household-attack.html
https://sites.google.com/a/cortland.edu/the-internet-ofthings/ethics
http://www.itu.int/en/ITUD/Statistics/Documents/facts/ICTFactsFigures2013-e.pdf
http://www.zdnet.com/cisco-launches-internet-of-thingssecurity-challenge-7000026925/
http://www.pbs.org/wgbh/pages/frontline/shows/hackers/bla
me/crimelaws.html
Download