Internet of Things
Computer Sciences and Information Technology

Internet of Things
The Internet of Things is defined as the “sensors and actuators embedded in physical objects are linked through wired and wireless networks” (Lueth, 2017). IoT was officially named in 1999 after evolving as the RFID technology. Since 1999, the acceleration in technology development has enabled the Internet of Things to become more sophisticated by increasing its ability to interconnect with other devices. The IoT today is improving the lives of humans in aspects. Some of the benefits that IoT has provided has been linked with smarter cities, cleaner air and water, improved agriculture practices, enhanced medical care, and transportation (Kranz, 2018). This paper provides an analysis of how information technology led to the development of the Internet of Things. The paper also evaluates concerns regarding privacy related to IoT and recommendations and solutions to counter the concerns.
In the past two decades, information technology has undergone developments that have led to the development of IoT. The most common information technology innovations that have played a significant part in developing the Internet of Things include big data technology, which deals with information extraction, analysis, and processing. With IoT-connected devices increases, the amount of data generated continues to grow, which might slow down the ability of the device to data process ability and response to commands. However, big data technology has enhanced the capability of IoT-connected devices to remain responsive despite the large volume of data involved. Big data technology can quickly analyze and process a ton of data efficiently, letting the IoT developers unveil Internet of Things full potential. Another information technology that has accelerated the development of IoT is Artificial Intelligence (AI). AI technology is a computer program that simulates human intelligence processes such as reasoning, self-correction, and learning. The technology has been used in developing IoT by giving IoT the ability to analyze generated data, presenting it to users in a more understandable way, and suggesting possible responses and solutions to problems.
Edge computing is another information technology that led to the development of IoT. Edge computing technology provides micro-centers for data storage and processing slightly closer to systems instead of the centralized location as in the cloud. Micro-centers have enhanced the operation of IoT-connected devices by increasing the speed of data exchange and response-ability. The innovations in cloud technology have been essential in the development of IoT. The new hybrid cloud technology availed consists of both public and private models of cloud, which has increased the security and desired flexibility of IoT-connected devices. Some of the benefits provided by hybrid cloud technology to IoT include mobility in data access, increased data security, scalability, and disaster recovery advantage (HQSoftware, 2019). Another information technology that led to the development of IoT is the Digital Twin. Digital Twin technology is a digital copy of places, real-life assets, processes, and systems that offer information applicable in various human lives sphere. IoT capitalizes on the Digital Twin technology capability to integrate into different devices used for management and work coordination. 5G cellular communication technology can be used to enhance IoT development. Internet of Things can use 5G capabilities such as increased speed in data transfer, high network reliability, and minimized latencies to improve its functionalities in IoT-enabled devices.
Concerns regarding privacy related to IoT
Internet of Things is now connected to almost all devices that humans depend on, which increases the difficulty in controlling the security and privacy. The IoT connected devices are not built with privacy security in mind that can protect the user information from being accessed. Since the IoT enabled devices can monitor the user, they have been developed to also collect and relay information. With more devices becoming IoT connected, it means the interconnectivity between devices is sustained by IoT, which harvests, stores, and communicates a wealth of information. The large amount of user data accessed by IoT can be used to obtain individual real-time information, including financial and health information, contacts, behaviors, locations, and habitats. IoT has created an environment where another individual can easily store, analyze, monitor, and share the information of another person (Maras, 2015).
Despite the existence of various privacy laws, it has become difficult for IoT connected users to maintain their privacy. Fully developed IoT increases its capability of information access, which puts a strain on existing possibilities of anonymous service use. Another privacy issue related to IoT connected devices is the right of an individual to control information about what others can access or should have about him or her. Without proper security measures installed in the device, controlling information during communication and data exchange between devices is difficult. The IoT connected devices can be triggered automatically or by default without the knowledge of the user to share information of the user or communication with other devices. Third parties have been accused of infringing IoT users’ privacy by harvesting the data of users without their consent and using it decision making. For instance, an organization can collect data regarding its employees when their devices are connected with the organization system.
Recommendation and solutions
Despite the potential that IoT holds in terms of enhancing development, it is essential to consider how the privacy and security issues can be contained. The European Union has a compressive data protection law in place that regulates the transfer and processing of personal data. The EU Member States’ law also provides users with protection against unauthorized access, disclosure, and use of personal data (Maras, 2015). Canada is another country that has enforced the privacy protection law through the Personal Information Protection and Electronic Documents Act of 2000. Therefore, it is recommended for the United States to develop a governing data protection law that would govern the privacy of IoT consumers.
Security and privacy of the IoT can be achieved by ensuring less availability of user-identified data outside the user’s personal sphere by implanting local data processing. The communication between devices should be horizontally connected rather than vertical transmission, which can be easily manipulated or triggered to provide user data to unauthorized devices (Alhalafi and Veeraraghavan, 2013). Privacy and security preservation techniques should be integrated into the IoT networks, not only in the machines. Some of the methods that can be deployed in IoT networks include encryptions, data perturbation, data anonymity, and client-side personalization. Authentication of IoT network-connected devices is another way of ensuring privacy is achieved. Physical Unclonable Functions (PUFs) is one of the authentication techniques that can apply, which protects devices against attackers and authorized users from accessing data.
References
Alhalafi, N., and Veeraraghavan, P. (2013). Privacy and Security Challenges and Solutions in IOT: A review.  IOP Conference Series Earth and Environmental Science. doi: 10.1088/1755-1315/322/1/012013
HQSoftware. (2019, October, 16). What Technologies Improved IoT in 2019? Major Trends. Retrieved from https://hqsoftwarelab.com/blog/iot-trends/
Kranz, M. (2018). 6 ways the Internet of Things is improving our lives. World Economic Forum. Retrieved from https://www.weforum.org/agenda/2018/01/6-ways-the-internet-of-things-is-improving-our-lives/
Lueth, K. (2014). Why the Internet of Things is called Internet of Things: Definition, history, disambiguation. IoT Analytics GmbH. Retrieved from https://iot-analytics.com/internet-of-things-definition/
Mars, M. (2015). Internet of Things: security and privacy implications. International Data Privacy Law. Vol. 5, No. 2. doi: 10.1093/idpl/ipv004

Published by
Essays
View all posts