Internet of Things
According to Lueth (2017), Internet of Things (IoT) is defined as the “sensors and actuators embedded in physical objects are linked through wired and wireless networks”. IoT was officially named in 1999 after evolving as the RFID technology. Since 1999, the acceleration in technology development has enabled the Internet of Things to become more sophisticated by increasing its ability to interconnect with other devices. Today, IoT is improving the lives of humans in aspects. Some of the benefits that IoT has provided have been linked with smarter cities, cleaner air and water, improved agriculture practices, enhanced medical care, and transportation (Kranz, 2018). This paper discusses how information technology led to the development of the IoT, the associated privacy issues, and recommendations to remedy the situation.
The Growth of IoT
In the past two decades, information technology has undergone developments that have led to the development of IoT. Garg, and Sharma (2019) highlight that the most common information technology innovations that have played a significant part in developing the IoT include big data technology, which deals with information extraction, analysis, and processing. With IoT-connected devices increases, the amount of data generated continues to grow, which might slow down the ability of the device to data process ability and response to commands. However, big data technology has enhanced the capability of IoT-connected devices to remain responsive despite the large volume of data involved. Big data technology can quickly analyze and process a ton of data efficiently; letting the IoT developers unveil Internet of Things full potential (Garg, and Sharma, 2019). Another information technology that has accelerated the development of IoT is Artificial Intelligence (AI). AI technology is a computer program that simulates human intelligence processes such as reasoning, self-correction, and learning. The technology has been used in developing IoT by giving IoT the ability to analyze generated data, presenting it to users in a more understandable way, and suggesting possible responses and solutions to problems.
Edge computing is another information technology that led to the development of IoT. According to Garg, and Sharma (2019), edge computing technology provides micro-centers for data storage and processing slightly closer to systems instead of the centralized location as in the cloud. Micro-centers have enhanced the operation of IoT-connected devices by increasing the speed of data exchange and response-ability. The innovations in cloud technology have been essential in the development of IoT. The new hybrid cloud technology availed consists of both public and private models of cloud, which has increased the security and desired flexibility of IoT-connected devices. Some of the benefits provided by hybrid cloud technology to IoT include mobility in data access, increased data security, scalability, and disaster recovery advantage.
Another information technology that led to the development of IoT is the Digital Twin technology. An article by HQSoftware (2019) explains that digital Twin technology is a digital copy of places, real-life assets, processes, and systems that offer information applicable in various human lives sphere. IoT capitalizes on the Digital Twin technology capability to integrate into different devices used for management and work coordination. 5G cellular communication technology can be used to enhance IoT development. IoT can use 5G capabilities such as increased speed in data transfer, high network reliability, and minimized latencies to improve its functionalities in IoT-enabled devices.
Privacy Concerns Related to IoT
Internet of Things is now connected to almost all devices that humans depend on, which increases the difficulty in controlling the security and privacy. According to Maras (2015), IoT connected devices are not built with privacy security in mind that can protect the user information from being accessed. Since the IoT enabled devices can monitor the user, they have been developed to also collect and relay information. With more devices becoming IoT connected, it means the interconnectivity between devices is sustained by IoT, which harvests, stores, and communicates a wealth of information. The large amount of user data accessed by IoT can be used to obtain individual real-time information, including financial and health information, contacts, behaviors, locations, and habitats (Maras, 2015). IoT has created an environment where another individual can easily store, analyze, monitor, and share the information of another person.
Despite the existence of various privacy laws, it has become difficult for IoT connected users to maintain their privacy. Fully developed IoT increases its capability of information access, which puts a strain on existing possibilities of anonymous service use (Maras, 2015). Another privacy issue related to IoT connected devices is the right of an individual to control information about what others can access or should have about him or her. Without proper security measures installed in the device, controlling information during communication and data exchange between devices is difficult. The IoT connected devices can be triggered automatically or by default without the knowledge of the user to share information of the user or communication with other devices. Maras (2015), states that third parties have been accused of infringing on IoT users’ privacy by harvesting their data without their consent. For instance, an organization can collect data regarding its employees when their devices are connected with the organization system.
Recommendation and Solutions
Despite the potential that IoT holds in terms of enhancing development, it is essential to consider how the privacy and security issues can be contained. The European Union has a compressive data protection law in place that regulates the transfer and processing of personal data. The EU Member States’ law also provides users with protection against unauthorized access, disclosure, and use of personal data (Maras, 2015). Canada is another country that has enforced the privacy protection law through the Personal Information Protection and Electronic Documents Act of 2000. Therefore, it is recommended for the United States to develop a governing data protection law that would govern the privacy of IoT consumers.
Security and privacy of the IoT can be achieved by ensuring less availability of user-identified data outside the user’s personal sphere by implanting local data processing. The communication between devices should be horizontally connected rather than vertical transmission, which can be easily manipulated or triggered to provide user data to unauthorized devices (Alhalafi and Veeraraghavan, 2013). Privacy and security preservation techniques should be integrated into the IoT networks, not only in the machines. Some of the methods that can be deployed in IoT networks include encryptions, data perturbation, data anonymity, and client-side personalization. Authentication of IoT network-connected devices is another way of ensuring privacy is achieved. Physical Unclonable Functions (PUFs) is one of the applicable authentication techniques, which protects devices against attackers and authorized users from accessing data.
Conclusion
The Internet of Things has proved to be of significant importance in the current society. Its development in the past decade has boosted the IoT capability of connecting to different technological devices. The paper highlighted several information technologies that played a significant role in accelerating the development of IoT. They include the development of Big Data technology, Artificial Intelligence (AI), Edge computing, hybrid cloud technology, Digital Twin, and 5G cellular communication technology. Despite the capabilities provided t by the IoT, it holds concerns regarding the privacy of users. The users’ information can be easily accessed by unauthorized individuals or without consent due to the interconnectivity of devices enabled by IoT. Several mechanisms can be deployed as solutions to the privacy issue in the IoT. One of the recommended approaches to enhanced IoT connected device privacy is the creation of data protection laws that enforce the processes associated with data usage and sharing.
References
Alhalafi, N., and Veeraraghavan, P. (2013). Privacy and Security Challenges and Solutions in IOT: A review. IOP Conference Series Earth and Environmental Science. doi: 10.1088/1755-1315/322/1/012013
Kranz, M. (2018). 6 ways the Internet of Things is improving our lives. World Economic Forum. Retrieved from https://www.weforum.org/agenda/2018/01/6-ways-the-internet-of-things-is-improving-our-lives/
Lueth, K. (2014). Why the Internet of Things is called Internet of Things: Definition, history, disambiguation. IoT Analytics GmbH. Retrieved from https://iot-analytics.com/internet-of-things-definition/
Mars, M. (2015). Internet of Things: security and privacy implications. International Data Privacy Law. Vol. 5, No. 2. doi: 10.1093/idpl/ipv004
Garg, P. K., & Sharma, L. (2019). Future of Internet of Things. From Visual Surveillance to Internet of Things: Technology and Applications, 245.
HQSoftware. (2019, October, 16). What Technologies Improved IoT in 2019? Major Trends. Retrieved from https://hqsoftwarelab.com/blog/iot-trends/
Annotated Bibliography on Domestic Violence
RESEARCH PAPER: ANNOTATED BIBLIOGRAPHY ASSIGNMENT INSTRUCTIONS OVERVIEW This assignment will help you begin the process of gathering information for your approved topic. You will find 10 peer-reviewed articles related to your topic. These will be used for your Research Paper: Final Submission Assignment. A strong understanding of a social problem will cover possible causes/risk factors, […]