Professional Documents
Culture Documents
❖ The term was coined in the late 1990s by Kevin Ashton and has 5. Platforms
❖ The history of IoT can be traced back to the 1990s when 8. User Interference
in 2014, and the World Economic Forum predicts that by 2025, 41.6 billions of devices to the internet, making it an important problem due to
billion devices will be collecting data on how we live, work, move, its larger attack surface. In 2016, Mirai was a botnet that hacked the
and use machines, with an estimated economic value of $11.1 domain name server provider Dyn and temporarily brought down a large
❖ COVID-19 has hastened the deployment of these technologies, (DDoS) assaults ever recorded. Attackers used inadequately protected IoT
such as temperature sensors and parcel tracking. devices to gain access to the network, and devices made by
❖ IoT-enabled devices have made it easier for people to monitor their manufacturers that don't update frequently or at all leave them open to
health, control their homes, and stay connected with friends and hackers. Therefore, it is essential to ensure that IoT devices are secured
To properly install and maintain IoT security, a comprehensive ❖ In our daily lives IoT can be seen as simply surfing the internet for
methodology is needed. A robust IoT security security solution must have your homework but because of today’s advancement in technology
the following three key capabilities: the ability to learn, protect, and IOT can now be observed in almost every single thing we do.
segment, to enforce IoT security policies in accordance with activities at During these innovative times, information processing can now be
various points in the infrastructure, segment, and use segmentation done even with a watch for example your blood pressure, number
based on policy, and learn what the ecosystem encompasses and what the of steps, and even your calories burned can now be determined
risk profiles are for each group of IoT devices. with the tap of an app.
❖ However, the application of The Internet of Things goes beyond just
There are also IoT protocols that are standards that enable the
the household, it can be seen in retail, manufacturing, health care,
exchange and transmission of data between the Internet and devices at
and etc. With IotT devices these sectors help understand
the edge.
consumers better, therefore active more efficiently and effectively.
❖ The impact of IoT is also visible in the news media industry, where
IoT Network Protocols IoT Data Protocols it changed how news is collected, reported, and consumed.
IoT-enabled devices such as drones and sensors are utilized to
● Wi-Fi ● AMQP
● LTE CAT 1 ● MQTT gather information from remote and inaccessible locations. While
● LTE CAT M1 ● HTTP personalized news apps are being developed using machine
● NB-IoT ● CoAP
learning algorithms to provide users with customized news content.
● Bluetooth ● DDS
● ZigBee ● LwM2M
● LoRaWAN