IoT is one step closer to the future

IoT is one step closer to the future

What is the first thing that comes to your mind when you think of the word Iot? In my case, I didn't know anything about it, but it will start to appear more commonly in your day by day, and if you are related to the tech industry you already hear about but don't pay that attention, after you read this article this will change and probably also your life.

IoT means “Internet of things” and it's related to sensors, software, and other technologies with the purpose to connect each other between them and other systems using the internet to gather information and optimize processes in-home, finances, security, and almost every industry aspect that allow us to measure and control.

No hay texto alternativo para esta imagen

Intelligent IoT applications are pre-defined software-as-a-service (SaaS) applications that can analyze and present captured IoT sensor data to business users through dashboards.?

IoT applications use machine learning algorithms to analyze massive amounts of data from connected sensors in the cloud. Using real-time IoT alerts and dashboards, you gain visibility into key performance indicators, mean time between failures statistics, and other information. Algorithms based on machine learning can identify anomalies in equipment and send alerts to users and even activate automatic solutions or proactive countermeasures.?

Examples

The applications are almost endless, but some examples will be described to give visibility of some of them, both in everyday life and in the business environment:?

Let us suppose the refrigerator of a house, where the food is kept, which, in turn, has an expiration date. In this scenario, the refrigerator could be connected to the internet to notify the user through their mobile phone, for example, when food expires, if there is a drop in temperature due to a breakdown if any food is running out, or simply the electricity consumption based on the number of times the refrigerator door is opened.?

If you think about industrial applications, IoT is already used in many production plants where devices and sensors connected to the network allow data to be analyzed and generate alarms and messages that are sent to different users to take the necessary actions or even initiate action protocols automatically, without human interaction, to correct or treat these alarms.?

No hay texto alternativo para esta imagen

Security

In recent years, with the development of computer science, communication technology, and perception recognition technology, the network of things has made a great breakthrough. Current Internet security protocols rely on a well-known and widely trusted suite of cryptographic algorithms: the Advanced Encryption Standard (AES) block cipher for confidentiality; the Rivest-Shamir-Adelman (RSA) asymmetric algorithm for digital signatures and key transport; the Diffie-Hellman (DH) asymmetric key agreement algorithm; and the SHA1 and SHA-256 secure hash algorithms. This suite of algorithms is supplemented by a set of emerging asymmetric algorithms, known as Elliptic Curve Cryptography (ECC).

No hay texto alternativo para esta imagen

IPsec (Internet Protocol Security) is a framework for a set of protocols for security at the network or packet processing layer of network communication. Earlier security approaches have inserted security at the Application layer of the communications model. IPsec is said to be especially useful for implementing virtual private networks and for remote user access through dial-up connections to private networks. A big advantage of IPsec is that security arrangements can be handled without requiring changes to individual user computers. Cisco has been a leader in proposing IPsec as a standard (or combination of standards and technologies) and has included support for it in its network routers. IPsec provides two choices of security service: Authentication Header (AH), which essentially allows authentication of the sender of data, and Encapsulating Security Payload (ESP), which supports both authentications of the sender and encryption of data as well. The specific information associated with each of these services is inserted into the packet in a header that follows the IP packet header. Separate key protocols can be selected, such as the ISAKMP/Oakley protocol.

Bibliography

https://www.cse.wustl.edu/~jain/cse570-15/ftp/iot_sec2.pdf

https://www2.deloitte.com/es/es/pages/technology/articles/IoT-internet-of-things.html

https://www.oracle.com/co/internet-of-things/what-is-iot/

要查看或添加评论,请登录

Juan David Tuta Botero的更多文章

社区洞察

其他会员也浏览了