Going Beyond the User — The Challenges of Universal Connectivity in IoT

نویسندگان

  • Darshana Thomas
  • Greig Paul
  • James Irvine
چکیده

The Internet of Things (IoT) approach to interconnected devices has become a significant topic in recent years, and is likely to be a major influence on future networking standards, such as ongoing work on 5G. IoT introduces connectivity to a much wider range of devices than seen previously, which raises a number of challenges, both technical and ethical. This paper explores some of these challenges which IoT faces, as a result of the personal and confidential information which may be transmitted from body-worn sensors, and the inherent challenges of introducing connectivity to standalone devices, rather than to equipment operated by users.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Going beyond the Hero in Leadership Development: The Place of Healthcare Context, Complexity and Relationships; Comment on “Leadership and Leadership Development in Healthcare Settings – A Simplistic Solution to Complex Problems?”

There remains a conviction that the torrent of publications and the financial outlay on leadership development will create managers with the skills and characters of perfect leaders, capable of guiding healthcare organisations through the challenges and crises of the 21st century. The focus of much attention continues to be the search for the (illusory) core set of heroic qualities, abilities o...

متن کامل

Intrusion Detection in IOT based Networks Using Double Discriminant Analysis

Intrusion detection is one of the main challenges in wireless systems especially in Internet of things (IOT) based networks. There are various attack types such as probe, denial of service, remote to local and user to root. In addition to known attacks and malicious behaviors, there are various unknown attacks that some of them have similar behavior with respect to each other or mimic the norma...

متن کامل

A Mutual Authentication Method for Internet of Things

Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...

متن کامل

A survey on RPL attacks and their countermeasures

RPL (Routing Protocol for Low Power and Lossy Networks) has been designed for low power networks with high packet loss. Generally, devices with low processing power and limited memory are used in this type of network. IoT (Internet of Things) is a typical example of low power lossy networks. In this technology, objects are interconnected through a network consisted of low-power circuits. Exampl...

متن کامل

Securing Real-Time Internet-of-Things

Todays embedded and cyber-physical systems are ubiquitous. A large number of critical cyber-physical systems have real-time requirements (e.g., avionics, automobiles, power grids, manufacturing systems, industrial control systems, etc.). The current trend is to connect real-time embedded devices to the Internet. This gives rise to the real-time Internet-ofthings (RT-IoT) that promises a better ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015