IOT Notes

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

INTERNET OF THINGS ASSIGNMENT-1

NAME : Kuldeep Singh


BATCH : BCA 5 EVENING (2020-2023)
ROLL NO. : A10046620011

Q1 : Identify the three legal aspects of IOT and proposed solutions for same.
ANS:
Data Privacy & Protection
The risk of a data security breach is great since there are so many IoT devices communicating with
one another online. As more IoT devices are released onto the market, this problem will only
become more complicated.

The Information Technology Act of 2000 (ITA) and the "Reasonable Practices and Procedures and
Sensitive Personal Data or Information Rules, 2011" (Rules) enacted under Section 43A of the ITA
both contain provisions relating to the protection of individual personal information (as amended).
According to Section 43A of the Information Technology Act (ITA), which deals with safeguarding
data on electronic means, a body corporate is negligent if it neglects to create and maintain
"adequate security standards and procedures" in respect to any individual.
The IoT service provider can have a carefully crafted privacy policy outlining the private
information that is gathered by the service provider, the breadth and amount of use to which such
information is put, and the procedures taken to ensure the protection of the collected information.
The Service provider can also adopt precisely drafted terms & conditions which typically regulate,
Limitation of Liability, Responsibilities of the service provider and consumer/user, Indemnification,
Intellectual Property Rights, Assignment/Licensing, and Dispute Resolution etc.
Further, in order to ensure compliance with Section 72 of ITA, the service provider can execute
stringently drafted Non-Disclosure Agreements with its customers.

Liability Issues
The service provider may be required to delegate the task of gathering, processing, and storing the
data to third-party "specialised data brokers/vendors" due to the volume of the data/information and
the number of stakeholders involved, which is likely to grow in the near future.
In such a case, it is important that the service provider take all necessary precautions to guarantee
that the privacy and data protection provisions are not violated before disclosing any information to
any third party.
The service provider needs to strike the right balance concerning the "allocation of risk". This is
particularly vital in order to set the limitation of liability for the service provider in the event of
breach of data privacy and non-disclosure requirements. The allocation of risk can be dealt with by
incorporating relevant provision in the terms & conditions of use of service. Alternatively, the
service provider can have software End User Licensing Agreements (EULA) drafted that
incorporate the relevant clauses which can be executed each time a user of IoT agrees to use the
service provider's software/services.

Data Ownership
Due to the involvement of multiple stakeholders/IoT users, involvement of third parties and the
multitude of sources of the data, the data may come into possession of many data processors. The
IoT service provider, being the data controller would essentially determine the scope, extent,
manner and purpose of the use of the personal data, whereas the service provider may have different
third party data processors, functioning to process the data on the instance and under the control of
data controller. Therefore, an aspect worth noting is that since there are numerous channels of
dissemination of the data/information and multiple stakeholders involved, the IoT service provider
(data controller) at all times should ensure that the line between data controller and data processor
does not get obscured. Additionally, the Machine Generated Information (MGI) and Machine to
Machine Communication (M2M) generated in an IoT environment would also pose ownership and
liability issues.
In light of the above, the allocation of risk and responsibilities between the parties must be defined
preciselyin particular, which party bears the liability for any damage caused to the user of an IoT
and which party owns the information generated by the IoT project. Hence, warranties and
indemnities regarding data protection, security and privacy will become important to help draw the
line between data controller and data processor which are made all the more complex by the large
number of stakeholders involved in an IoT environment. The question that who will own the data
will be purely based upon the agreement between the two entities.

Q.2-How Silicon chip can be a game changer for IOT


Technology.
ANS: Across the globe almost each and every domain have started embracing Internet of Things
(IoT). Weather its manufacturing, industrial automation, healthcare or artificial intelligence domain
the impact of IOT is pretty evident. In the recent past we have seen some really exciting
developments in the field of IOT especially how users have started interacting with machines.
According to a research the key reason why businesses are adopting IOT solutions are primarily
because to increase productivity of their workforce, reliability on their operation, and increase
quality of their product or services.
In the coming years IoT will create a significant impact of several industries, through this blog I am
trying to briefly explain few of them.
Artificial Intelligence (AI)
As we all know AI, and machine learning, is a process of building a scientific model. We analyze
certain set of data and derive meaningful insights or knowledge from it. In the coming years we will
a lot of application of AI in IoT space for example GPS based tracking, robotics and security. Major
players like Google, Microsoft, and Facebook are using AI techniques in various research projects.

Manufacturing
Many of us believe, the biggest use of IoT technology is with the end consumer products, however
in my opinion, in the next couple of years the biggest drive for IoT technology will be from
manufacturing and industrial automation domain. As per a survey in 2016, 38% of the organizations
have already adopted IoT, almost 57% are planning to go for it in this year, and 69% of them are
planning to increase their budget in this space. 2017 and years to come, looks bullish for IoT;
especially in this domain.
Security and Privacy
The basic principle of IoT is that number of devices will be connected to internet and that to AI
driven internet in future. The rate at which these devices will increase and the amount of data and
information these devices will share brings the risk of device, data and information security in
future. It will remain the point of concern for organization opting for IoT platforms. They will be
aware of the security concerns and will be ready to invest in solutions offering security measures for
these IoT devices.

Q3 How Next generation network can solved issued of IOT


Network.
ANS: IoT entered the scene, the interaction between doctors and patients was confined to texts,
visits, and telecommunications. There were no ways to enable doctors to monitor their patients
continuously and provide suggestions in real-time.
This scenario changed after the arrival of IoT–it empowered doctors to deliver excellent care by
remotely monitoring the patients using IoT-enabled devices.
And this is just one of the plenty of use cases of IoT in the healthcare industry.
If we talk about the corporate world, IoT makes it possible for companies to offer flexible working
options to their employees. With the help of IoT devices, companies can let their employees work
from home, connect with their colleagues effortlessly, and make their offices safer using social
distancing monitors.
The last example is from the automotive industry. Connected vehicles are some of the latest
developments in the automotive industry. In simple words, they’re computer-enhanced vehicles that
automate several driving tasks, making them more accessible and safer.
This shows the extent to which IoT is entangled in our everyday lives. But, while it will deepen its
roots in the coming years, it still needs faster, more reliable, and safer Wi-Fi connectivity to reach
its true potential.

the Next-Generation Wi-Fi is Going to Change IoT


Unlocking the full potential of IoT devices requires high bandwidth and lower power, low latency
connection. This is where Wi-Fi 6, Wi-Fi 6E, and Wi-Fi Halow come into the scene.
To put it simply, Wi-Fi 6, Wi-Fi 6E, and Wi-Fi Halow are the next generation of Wi-Fi. While they
still do the same work of connecting users to the internet, they offer a bunch of additional
technologies that help make the process more efficient, faster, and better. Next-generation Wi-fi
borrows several multi-user technologies from the cellular industry, like OFDMA and MU-MIMO,
to improve wireless network performance and enable simultaneous connections to several devices.

Features of Wi-Fi 6
The evolution of the latest Wi-Fi 6 standard has introduced several new technologies that overcome
the traditional limitations of Wi-Fi networks.
For one, the Orthogonal Frequency Division Multiple Access (OFDMA) makes Wi-Fi 6 a much
better-suited option for IoT than its previous versions, providing better performance, lower latency,
and faster data rates.
In addition, it comes with advanced capabilities like Target Wake Time (TWT) for better scheduling
and longer device battery life and directional beamforming that focuses wireless signals toward
specific clients instead of having the signal spread in one direction.
Lastly, when it comes to security, Wi-Fi certified technologies like Wi-Fi 6, Wi-Fi 6E, and Wi-Fi
Harlow support strong WPA3 security and worldwide interoperable assurances, letting vendors
deliver the best experiences to their customers.

Q.4-Explain various technology for security in IOT also


proposed your new Idea in IOT security.

Ans :- IoT security is the technology segment focused on safeguarding connected devices and
networks in the internet of things (IoT). IoT involves adding internet connectivity to a system of
interrelated computing devices, mechanical and digital machines, objects, animals and/or people.
Each "thing" is provided a unique identifier and the ability to automatically transfer data over a
network. Allowing devices to connect to the internet opens them up to a number of serious
vulnerabilities if they are not properly protected.
A number of high-profile incidents where a common IoT device was used to infiltrate and attack the
larger network has drawn attention to the need for IoT security. It is critical to ensuring the safety of
networks with IoT devices connected to them. IoT security, includes a wide range of techniques,
strategies, protocols and actions that aim to mitigate the increasing IoT vulnerabilities of modern
businesses.
What is IoT security?
IoT security refers to the methods of protection used to secure internet-connected or network-based
devices. The term IoT is incredibly broad, and with the technology continuing to evolve, the term
has only become broader. From watches to thermostats to video game consoles, nearly every
technological device has the ability to interact with the internet, or other devices, in some capacity.
IoT security is the family of techniques, strategies and tools used to protect these devices from
becoming compromised. Ironically, it is the connectivity inherent to IoT that makes these devices
increasingly vulnerable to cyberattacks.

IoT security issues and challenges


The more ways for devices to be able to connect to each other, the more ways threat actors can
intercept them. Protocols like HTTP (Hypertext Transfer Protocol) and API are just a few of the
channels that IoT devices rely on that hackers can intercept.
The IoT umbrella doesn't strictly include internet-based devices either. Appliances that use
Bluetooth technology also count as IoT devices and, therefore, require IoT security. Oversights like
this have contributed to the recent spike in IoT-related data breaches.
Below are a few of the IoT security challenges that continue to threaten the financial safety of both
individuals and organizations.
1. Remote exposure
Unlike other technologies, IoT devices have a particularly large attack surface due to their internet-
supported connectivity. While this accessibility is extremely valuable, it also grants hackers the
opportunity to interact with devices remotely. This is why hacking campaigns like phishing are
particularly effective. IoT security, like cloud security, has to account for a large number of entry
points in order to protect assets.
2. Lack of industry foresight
As firms continue with digital transformations of their business, so, too, have certain industries and
their products. Industries such as automotive and healthcare have recently expanded their selection
of IoT devices to become more productive and cost-efficient. This digital revolution, however, has
also resulted in a greater technological dependence than ever before.
While normally not an issue, a reliance on technology can amplify the consequences of a successful
data breach. What makes this concerning is that these industries are now relying on a piece of
technology that is inherently more vulnerable: IoT devices. Not only that, but many healthcare and
automotive companies were not prepared to invest the amount of money and resources required to
secure these devices.
This lack of industry foresight has unnecessarily exposed many organizations and manufacturers to
increased cybersecurity threats.
Q.5 Identity the gaps in existing IOT based cloud network and
proposed your own framework for the improvement for the
architecture.
Ans : Internet of Things (IoT) is the concept of connecting multiple objects together in an Internet-
based architecture. Applications built around this concept are constantly growing in variety and
quantity. Technologies in IoT have been evolving rapidly and the alternatives also have increased
quickly. As a result, it becomes challenging to conduct system and software trade-off analysis or
select suitable IoT technologies for applications. The paper emphasizes variability management
(consisting of alternative technologies) and aims to provide a framework as a result, which would
allow or facilitate users to create their own IoT applications. In order to achieve this goal, we have
adopted the idea of software product line engineering (SPLE) and created a framework with a
layered architecture consisting of a Cloud Layer, a Central Hub Layer, and an End Devices Layer.
The layers are loosely coupled with well-defined interfaces allowing for variability to be added at
each layer. We were successfully able to create a framework which allows users to build their own
applications, only being limited by the devices supported by the framework

You might also like