Internet of Things (IoT)
If we go into the definition of the Internet of Things, we find out that it is the concept of inter-networking of physical devices, connected devices, smart devices, and other devices embedded with electronics, software, sensors, actuators, and network connectivity that enable these objects to collect and exchange data.
For example, if books, thermostats, refrigerators, parcels, lamps, medicine cabinets, automotive parts, among others, were connected to the internet and equipped with identification devices, there would, in theory, no out-of-stock items or expired medicines; We would know exactly the location, how they are consumed in the world; the loss would become a thing of the past, and we would know what is on and what is off at all times.
Let’s imagine a world where things stop being so routine and are more automatic, that human contact is minimal and that the focus is only for its improvement and technological growth, we see a world with more possibilities.
Four key stages in the internet of things
Now, having the concept of IoT clear, we can delve into the 4 key stages in this process:
- Capture the data. Through sensors, IoT devices capture data from their environments. This could be as simple as the temperature or as complex a real-time video feed.
- Share the data. Using available network connections, IoT devices make this data accessible through a public or private cloud, as directed.
- Process the data. At this point, software is programmed to do something based on that data — such as turn on a fan or send a warning.
- Act on the data. Accumulated data from all devices within an IoT network is analyzed. This delivers powerful insights to inform confident actions and business decisions.
Privacy and security concerns in IoT
The concerns and problems around Iot have generated the belief among users and connoisseurs that big data structures such as the internet of things or data mining, are inherently incompatible with privacy, in addition to devices, where vulnerabilities in operating systems, wireless security protocols and applications are highly complex to protect security. The Chartered Institute for Iot states that:
Privacy concerns arise as a result of the compilation of detailed data on the consumption behavior of individuals and neighborhoods, up to the creation of predictive models of energy, water and transport use. It is not difficult to imagine a future information system that contains a detailed report about where citizens live, when they are at home, when they will leave or how often they watch television or use their washing machine.
It may happen that the privacy security of those who use these technologies is very high and not very controllable, in this case I will comment on the 10 main security problems associated with Internet of Things (IoT) devices and that they should be taken into account account for all those who develop, create or manage IoT systems:
- Weak, predictable, or in-code passwords
- Insecure network services
- Ecosystem of insecure interfaces
- Lack of secure update mechanisms
- Use of unsafe or outdated components
- Insufficient privacy protection
- Unsafe data transfer and storage
- Lack of management controls
- Unsafe default settings
- Lack of hardening
A real case occurred with a recognized company, the BBC comments on the case that occurred with Amazon’s voice assistant, a couple in Portland, Oregon, United States, used to joke about whether Alexa, the virtual assistant of the speaker made by Amazon, could be listening to their conversations … but the joke It came to an end when they discovered that indeed the machine had registered and also sent what they were talking about inside their house. Messages that actually reached one of the contacts in the phone book registered with Alexa, to which Amazon responded; — what has happened is a string of inopportune coincidences
To overcome this problem, the Chartered Institude for Iot suggests that general IoT infrastructures require broad public support that can only be achieved through broad citizen engagement and action to help them. Understand the purpose and ramifications of the proposed developments.
In conclusion, as in everything else, technology is a very wide world and that can encompass everything that one can imagine, errors occur that based on experience are corrected and progress is made, in a world where we are all connected, more than in entertainment, the advancement of the productivity of repetitive things without the need for much human contact, can be a new advance for humanity. It is not said that it will be easy, but over time we will understand that they will be necessary, created in the correct way for the good of people without exceeding the limits of control.