Gwak Mi Gyeong Gwak Dr. William Lyle CSC 540 29 April 2014

advertisement
Gwak 1
Mi Gyeong Gwak
Dr. William Lyle
CSC 540
29 April 2014
Internet of Things
Let’s imagine that simple things in sci-fi movies happen in real life. In this universe we
do not need to spend time cooking breakfast because the toaster automatically operates when the
alarm clock rings. We also do not need to worry about forgetting to turn off the lights before
leaving the house because the lighting system responds to the door being locked. These ideas are
not just staying in the imagination. High technology keeps developing and propels our
imagination into reality. Our imagination of the convenient life can be achieved through the
Internet of things (IoT), a popular word for emerging products that are smart and can
communicate wirelessly. The capacity for wireless communication between two objects or
between object and human helps to make the devices smart. The smartphone, smart TV, smart
watch, and smart car; they are applications of the IoT and found easily all around us. The pace of
creating and introducing new products is rapid, however our ability to solve the social and ethical
issues created by ushering in these products and their approaches to life seems relatively slow.
We are required to know about definitions, technologies, applications and ethical issues of the
IoT.
The Internet of things is a technology that applies within a geographically circumscribed
environment, where diverse objects communicate with one another through the Internet. Cisco
defines the IoT further: “these objects contain embedded technology to interact with internal
Gwak 2
states or the external environment. In other words, when objects can sense and communicate, it
changes how and where decisions are made, and who makes them.” The defining features of IoT
are ubiquity, miniaturization, ambiguity, identification, connectivity, mediation and autonomous
agency, embedded intelligence, seamless transfer, distributed control, big data, and
unpredictability (Hoven 4). Delft University of Technology explains that:
The user is engulfed and immersed by IoT… Computing technology will
become translucent and has the tendency to disappear from human sight… The
distinctions between natural objects, artefacts and human beings tends to blur as a
result of the facile transformation of entities of one type into the other by means
of tagging, engineering and absorption into a networks of artefacts…seemingly
insignificant objects and artifacts will have unique identities…The IoT
environment provides ways of extending and augmenting human
agency…Interaction, information flow with IoT context will be effortless, with
potentially very low transaction and information cost (Hoven 4).
A video by International Data Corporation, a market research company, explains that we are
living in a digital universe and four major migrations from analog to digital have emerged:
computer, phones, cameras, and machines (Intel.com). Embedded systems, integrated smartness
and intelligent systems are interchangeable in usage with the term IoT.
The term Internet of Things was proposed by Kevin Ashton, co-founder and executive
director of the Auto-ID Center (LiveScience.com). Also, he described features of the IoT in the
2009 RFID Journal; “If we had computers that knew everything there was to know about
things—using data they gathered without any help from us—we would be able to track and count
everything, and greatly reduce waste, loss and cost. We would know when things needed
Gwak 3
replacing, repairing or recalling, and whether they were fresh or past their best”
(LiveScience.com). Intel is one of the companies that invests in and develops the IoT and
estimates that 15 billion objects by 2015 and 200 billion objects by 2020 will be connected to the
Internet as wireless links. This is the equivalent of each person having about 26 smart objects by
2020. Also, Intel is estimating the total global worth of IoT technology could be as much as $6.2
trillion in health care, manufacturing, etc. Cisco is advertising the IoT business as the Internet of
Everything, which means pretty much everything that we can imagine will wake up online. IBM
is suggesting the idea of building a smarter planet by developing intelligence through the IoT.
Programming knowledge will be required to accomplish these goals. As computer science
majors, the IoT is a very important technology for which we need to prepare and understand in
order to be prepared for this this digital universe that is coming. This preparation will provide
information about the main technology that is used for IoT applications, ethical issues and
current legal protections.
The IoT requires technology for communication, protocol, hardware, and software.
According to Wikipedia, “Radio-frequency identification (RFID) was seen as a prerequisite for
the Internet of Things in the early days. If all objects and people in daily life were equipped with
identifiers, they could be managed and inventoried by computers. Besides using RFID, the
tagging of things may be achieved through such technologies as near field communication,
barcodes, QR codes and digital watermarking.” A RFID device uses a specific radio-frequency
tag in order to uniquely identify an object and for automatically tracking tags attached to an
object. It does not require direct contact or line-of-sight scanning like a barcodes (Rouse 1). Near
field communication (NFC) uses similar technology as RFID and is usually associated with
smartphones since the range of communication should be less than a few inches. Applications of
Gwak 4
NFC are formed as simple as tags, stickers, key fobs, or cards that do not need power. Bluetooth
and WiFi are common wireless communication technology for data exchange. Bluetooth uses
short-wavelength radio waves and is used to build personal area networks. The Wi-Fi Alliance
defines Wi-Fi as any "wireless local area network (WLAN) products that are based on the
Institute of Electrical and Electronics Engineers' (IEEE) 802.11 standards” (Postscapes.com).
There are additional methods used to build communication for the IoT, such as EnOcean,
Weightless, global system for mobile communications (GSM), 3G, 4G LTE, Etherent, Zigbee,
etc.
Each object needs to have unique identification online. “IP (short for Internet Protocol)
specifies the technical format of packets and the addressing scheme for computers to
communicate over a network. Most networks combine IP with a higher-level protocol called
Transmission Control Protocol (TCP), which establishes a virtual connection between a
destination and a source” (Webopedia). Internet Protocol version 6 (IPv6) is the latest version
and uses 128-bit address compared to IPv4 that uses 32-bit address. TCP provides reliable,
ordered and error-checked delivery, such as sending data in the form of message units between
hosts in computers or in interconnected communication networks. However, user datagram
protocol (UDP) offers fast, lightweight, but unreliable delivery of data and a connectionless
datagram service between hosts.
Basic knowledge of hardware, software, and cloud service for the IoT will help you to
build your IoT device. Postscapes.com explains that “manufactures like Gainspan, Wiznet,
Nordic Semiconductor, TI and others are creating self-contained, RF-certified module solutions
that have TCP, UDP and IP on chip.” Prototyping boards are available like the Arduino,
Raspberry Pi and BeagleBone Black in order to start your own IoT project. Postscapes.com also
Gwak 5
explains some software for IoT: “RIOT OS is an operating system for Internet of Things (IoT)
devices. It is based on a microkernel and designed for energy efficiency, hardware independent
development, a high degree of modularity… Thingsquare Mist open source firmware is
exceptionally lightweight, battle-proven, and works with multiple microcontrollers with a range
of radios.” IoT generate tremendous data since it keeps tracking every moment and cloud service
is important to store the big data. There are numerous cloud platforms for IoT, such as
ThingWorx, Evrythng, and Sense.
Any type of objects can be smart with sensors that acquire data and have wireless
communication ability. Various applications of the IoT are being developed continuously. You
do not want to miss some cool products that are already in the market. Mimo monitor is a baby
suit that has sensors and provides real-time information about baby’s breathing, skin temperature,
body position, and activity level on parent’s smartphone. BeClose system can track an aging
family member’s daily routine and gives alert through smartphone when any serious disruptions
detected in their normal schedule using a wearable alarm button and other discrete wireless
sensors placed around the home. Also, there are other applications that can track information in
city, industry and environment (Postscapes.com).
Libelium, wireless sensor networks hardware manufacturer, is selling products that can
be applied in many different arenas: city, environment, water, metering, security, retail, logistics,
industrial control, agriculture, home, and health. If I were to pick some applications from these
areas in order to build a smart campus for Murray State University, I might pick smart parking
which is the monitoring of parking space availability in order to help a lot of student-drivers save
time in their effort to get to a class. Potable water monitoring that displays the quality of tap
water on campus would provide convenience for those attempting to choose better water.
Gwak 6
Structural health system that provide for the monitoring of vibrations and material conditions in
the campus buildings will protect students’ safety since some of our school buildings are old, and
we need to be aware in case of imminent collapse as shown in the example of the building in
downtown Murray. These are some examples of applying the IoT on campus and I do not think
that it will take long time to easily see these applications around our area.
According to David Talbot from MIT technology review on April 21, “Now Bug Labs, a
New York City company, is trying to make it as easy to create an Internet of things application
as it is to put a file into Dropbox.” A sample demo is available on their website, dweet.io, and
my mouse curser location was posted instantaneously on the website. I assume data from internet
capable devices can be posted on the website using Javascrpt object notation (JSON) which is a
lightweight data-interchange format. Users can set up a device name online and maintain privacy
through purchasing a lock for 99 cents per month. This method suggests that anybody can easily
monitor data from any Internet-capable object through an online website.
The IoT brings convenience into our lives; however the ethical issues are increasing. The
biggest ethical issue of the IoT is privacy. Your personal information would not be private
anymore if someone or some device that you do not expected keeps monitoring your daily life,
such as your heart rate, calories burned, medicine that you took, or what you purchased at a
market. Also, losing a device that was tracking and customized a person’s daily activities will
cause a loss of privacy right. How many people, who are using a smartphone that is tracking
personal information, such as financial records, medical records, and location information, would
feel comfortable about losing their phone? As IoT keeps developing, devices and cloud storage
and linkage services that IoT uses requires serious advancement in being secured and protected.
Rachel Metz from MIT Review said that, “it might be some effort to get this kind of scenario,
Gwak 7
but if breaking into one server means you get to ransack 100, 1,000, 10,000 people’s homes,
that’s definitely worth it, and that’s where the real danger lies." It would be scary that thousands
of people’s data can be stolen by hacking one server. According to Rachel Metz, “Starbucks [has]
coffee makers that update recipes automatically and track consumer preferences to connected
cars; the IoT is already big business.”
Since the IoT operates without the control of the user in the environment of the Internet
connection, it is unavoidable that malicious usage or cybercrime through the Internet could occur,
such as by hacking or through a virus. Only a few months ago, an interesting cybercrime
occurred. According to an article from Daily Mail, “In this case, hackers broke into more than
100,000 everyday consumer gadgets that were connected to the internet, such as homenetworking routers, connected multimedia centres, televisions, and at least one refrigerator. They
then used those objects to send more than 750,000 malicious spam phishing emails to enterprises
and individuals throughout the world.” Many companies are investing in IoT security. Cisco is
trying to solve the security challenges of the IoT through a competition that is offering prize
worth up to $300,000 for the winner (ZDnet).
The IoT can cause discrimination against certain groups of people who do not have
access to the Internet or chose not to do so. According to research in 2013 by International
Telecommunication Union, 2.7 billion people, which is almost 40 % of the world’s population,
are internet users, and “in the developing world, 31 % of the population is online, compared with
77 % in the developed world.” Although the percentage of the internet users is growing, we
cannot ignore the fact that more than half of the world’s population does not have access to the
Internet, and they are restricted from the society built by the IoT. The Code of Ethics for the
IEEE states that it will strive “to treat fairly all persons regardless of such factors as race, religion,
Gwak 8
gender, disability, age, or national origin” (IEEE, 2012). Also, the ACM Code of Ethics states it
will “be fair and take action not to discriminate” (ACM council, 2012). We have an ethical
responsibility to reduce the gap between people group who can access the Internet and who
cannot since we have privilege to use the Internet.
Laws and regulations for the ethical issues of the IoT become significant issues and need
to be developed to better protect and prevent the malicious usage of the IoT. Based on result of
privacy law of the United States, Wikipedia has this entry: “… there are Constitutional limits to
the government's intrusion into individuals' right to privacy.” The Fourth Amendment to the
United States Constitution ensures that “the right of the people to be secure in their persons,
houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and
no warrants shall issue, but upon probable cause, supported by oath or affirmation, and
particularly describing the place to be searched, and the persons or things to be seized”
(Wikipedia). Some states have dealt with the issue in their legislatures. The California
constitution declares privacy as an inalienable right and its “Shine the Light” law in 2005
declares: “… outlines specific rules regarding how and when a business must disclose use of a
customer's personal information and imposes civil damages for violation of the law” (Wikipedia).
There is Global privacy policy for international companies, but there are agreements for Internet
usage. They need to be forged since the internet is global. The Computer Fraud and Abuse Act
(CFAA) prohibits possible cybercrime, such as “accessing a "protected computer," which the
courts have recently interpreted as being any computer connected to the Internet, even if the
intruder obtains no data” and “trafficking in computer passwords for the purpose of affecting
interstate commerce or a government computer” (Frontline). It is also clearly declaring the
regulation of “theft of financial information” and “transmitting code that causes damage to a
Gwak 9
computer system” (Frontline). Anyone violating the CFAA will receive punishment of “a prison
sentence as long as 20 years and a fine of up to $250,000” (Frontline). The Electronic
Communication Privacy Act (ECPA) accounts “for the increasing amount of communications
and data transferred and stored on computer systems… under the law, unauthorized access to
computer messages, whether in transit or in storage, is a federal crime” (Frontline).
Our imagination becomes reality through the IoT advancements that are taking place, and
it cannot be easily ignored. It is certain to become pervasive in our lives in the near future. As
future computer scientists, our responsibility to use our technical knowledge wisely in
developing new products and business models will increase in importance. Building a better
smart world through the IoT depends on us, on our action.
Gwak 10
Works Cited
"50 Sensor Applications for a Smarter World." Libelium Connecting Sensors to the Cloud RSS. N.p.,
n.d. Web. 26 Apr. 2014. <http://www.libelium.com/top_50_iot_sensor_applications_ranking/>.
"A Guide to The Internet of Things." . Intel Corporation, n.d. Web. 26 Apr. 2014.
<http://www.intel.com/content/www/us/en/intelligent-systems/iot/internet-of-things-infographic.html>.
Brooks, Chad. "The Internet of Things: A Seamless Network of Everyday Objects." . LiveScience, 31
July 2013. Web. 26 Apr. 2014. <http://www.livescience.com/38562-internet-of-things.html>.
"Computer Crime Laws." PBS. PBS, n.d. Web. 26 Apr. 2014.
<http://www.pbs.org/wgbh/pages/frontline/shows/hackers/blame/crimelaws.html>.
"Ethical Issues - The Internet of Things." Ethical Issues - The Internet of Things. SUNY Cortland, n.d.
Web. 26 Apr. 2014. <https://sites.google.com/a/cortland.edu/the-internet-of-things/ethics>.
Hoven, Jeroen. "Fact sheet- Ethics Subgroup IoT - Version 4.0." European Commission: 21. Web.
"ICT Facts and Figures." . International Telecommunication Union, 1 Feb. 2013. Web. 26 Apr. 2014.
<http://www.itu.int/en/ITU-D/Statistics/Documents/facts/ICTFactsFigures2013-e.pdf>.
"Internet of Things Examples - Postscapes." Internet of Things Examples - Postscapes. Postscapes, n.d.
Web. 26 Apr. 2014. <http://postscapes.com/internet-of-things-examples/>.
"Internet of Things Technologies- Postscapes." Postscapes. Postscapes, n.d. Web. 26 Apr. 2014.
<http://postscapes.com/internet-of-things-technologies>.
"Internet of Things." Wikipedia. Wikimedia Foundation, 27 Apr. 2014. Web. 26 Apr. 2014.
<http://en.wikipedia.org/wiki/Internet_of_Things>.
Osborne, Charlie. "Cisco launches Internet of Things security challenge | ZDNet." ZDNet. ZDNet, 3
Mar. 2014. Web. 26 Apr. 2014. <http://www.zdnet.com/cisco-launches-internet-of-things-security-challenge7000026925/>.
Gwak 11
Rouse, Margaret. "RFID (radio frequency identification)." What is ?. Search Manufacturing ERP, 1
Apr. 2007. Web. 26 Apr. 2014. <http://searchmanufacturingerp.techtarget.com/definition/RFID>.
Talbot, David. "An Easy Internet of Things Interface | MIT Technology Review." MIT Technology
Review. MIT Technology Review, 21 Apr. 2014. Web. 26 Apr. 2014.
<http://www.technologyreview.com/news/526006/an-easy-interface-for-the-internet-of-things/>.
"What is The Difference Between IPv6 and IPv4?." The Difference Between IPv6 and IPv4 Explained.
N.p., n.d. Web. 26 Apr. 2014.
<http://www.webopedia.com/DidYouKnow/Internet/ipv6_ipv4_difference.html>.
Zolfagharifard, Ellie. "Cyber criminals hack a REFRIGERATOR: Will the 'Internet of Things' create a
new bot army for the spammers?." Mail Online. Associated Newspapers, 17 Jan. 2014. Web. 29 Apr. 2014.
<http://www.dailymail.co.uk/sciencetech/article-2541306/Cyber-criminals-hack-REFRIGERATOR-sendmalicious-emails-worlds-household-attack.html>.
Download