top of page

Internet of Things

The Internet of Things, also known as IoT, encompasses a multitude of intelligent, internet-connected objects and services that have the ability to sense, connect, deduce, and take action. It facilitates the creation of novel products and business models, while providing governments with opportunities to deliver more effective services and enhance public engagement. Key concerns with IoT encompass technology design and standardization, safety and security vulnerabilities, privacy and trust dangers, potential limitations on widespread social advantages, and the necessity for responsible governance.

Internet of Things

Architecture and Standards for the Internet of Things

The Internet of Things (IoT) represents a transformative technological frontier, but its effective implementation hinges on thoughtful architecture and careful selection of standards. To foster the flourishing of IoT, it is imperative to make architectural decisions that are scalable, future-proof, and cost-effective. This involves connecting a diverse array of devices, ranging from simple doorbells to complex infrastructure like dams, to the internet. Leveraging existing reference architectures is a key strategy for organizations and authorities to create robust standards with well-defined interfaces. Such standards form the foundation for resilient environments that can effectively address performance and safety concerns. It is worth noting that there is no one-size-fits-all solution for IoT design, whether it involves sensing, communication, analytics, or actuation (the conversion of an electric signal into a physical action).

However, two prominent architectural models have emerged in the IoT landscape. The first model is known as "digital mirroring" or "Digital Twins." In this model, physical objects from the real world are replicated as fully digital entities. These digital counterparts possess the capability to interact with the physical world as well as with other digital replicas and computing services, often utilizing the cloud as their foundation. Cloud services offer the computational capacity to handle substantial data analysis or to create "Cognitive Firewalls" that protect physical systems from digital threats.

Another architectural approach in IoT design revolves around "edge" or "fog" computing. This model divides processing tasks between local devices capable of rapid response and the cloud, where resource-intensive analytics that are not time-sensitive can be executed. This distributed processing enhances response times and allows for more computationally intensive analysis. However, this approach tends to consume more power. The significance of architectural decisions lies in establishing specific locations and connections where standards can be defined.

The development of a comprehensive framework of IoT standards can effectively address issues related to networking, communication, and data management. Furthermore, it can enhance overall compatibility, enabling devices and services from various suppliers to collaborate, exchange data, and enhance their utility. While emerging architectures and standards have contributed to reducing fragmentation in early IoT systems, it is crucial to exercise caution in the selection and development of appropriate options. The technical choices made today will determine the long-term success or failure of the Internet of Things, and an overabundance of standardization could result in "vendor lock-in," limiting choices and utilization.

Safety, Security, and the IoT

The convergence of the digital and physical realms through the Internet of Things introduces novel security complexities that demand careful consideration. The IoT, which interconnects a multitude of devices through the internet, is blurring the boundaries between the digital and physical domains, giving rise to unforeseen cybersecurity challenges. The extensive scope and diverse applications of IoT present significant concerns due to the vulnerability of critical areas to non-traditional forms of attacks. The interconnectedness and remote accessibility of energy utilities, infrastructure, transportation, commerce, and homes create unprecedented opportunities for security breaches. However, this same interconnectedness also means that compromising a single node could lead to widespread societal and economic consequences.

Some security challenges in the IoT may not be immediately apparent, and there is always the potential for unexpected consequences stemming from increased connectivity. For example, a smart home, while enhancing convenience for its residents, also presents new security vulnerabilities. An intelligent home assistant that responds to voice commands, when combined with a connected lock within the IoT ecosystem, offers a convenient solution for opening doors without physical movement. However, it also introduces a potential security vulnerability, as an intruder could exploit this system by shouting through an open window to gain unauthorized access when homeowners are absent. Authentication is paramount in developing dependable real-time systems that enhance the value of the IoT. It ensures the clear identification and trustworthiness of both digital and physical data sources.

The era of relying on "security through obscurity," which depends on a lack of knowledge about system vulnerabilities, is coming to an end. The IoT has made previously inaccessible system blueprints widely available on the internet. Overlooking a vulnerability that was once considered minor can become a potent weapon when in the hands of malicious actors. Therefore, it is imperative to incorporate security into the initial stages of system design. Systems should be fortified to withstand extreme circumstances and should be capable of remote upgrades, even if they incur higher expenses.

A "Cognitive Firewall" represents a scalable and upgradable security solution that functions as a self-learning system. It contextualizes received commands and only allows safe actions to be executed on a device via the cloud. Many individuals are unknowingly involved in the IoT, possibly without realizing that their personal data can be publicly disclosed due to the lack of security in a colleague's "smart" light switch. Hence, providing comprehensive security education to all individuals is crucial.

IoT Value Creation and Business Models

The Internet of Things has the potential to revolutionize various industries by enhancing efficiency and productivity through the interconnection of ordinary devices. However, the realization of this potential relies on substantial innovation, increased investment, and the active involvement of a diverse range of stakeholders across affected industries. IoT leverages various fields of study to create an advanced solution that transcends the limitations of isolated advancements. Its implementation results in increased sales of hardware and services for technology providers, improved analytics for marketing firms, and direct benefits for consumers, such as improved health monitoring and reduced fuel consumption through monitoring.

IoT generates value by linking otherwise ordinary machines through the internet. However, it is crucial to understand that IoT does not create value from nothing; rather, it enhances existing processes and services. To make a significant impact, it is necessary to introduce substantial innovation, expand investment, and include a wide range of participants in all industries affected by IoT. The IoT's transformative potential extends to various sectors, including technology providers, marketing firms, and consumers. For technology providers, IoT results in increased sales of hardware and services. Marketing firms benefit from enhanced analytics, while consumers experience improved services such as health monitoring and energy efficiency through IoT.

IoT-enabled vehicles, for instance, can collect valuable self-data, schedule necessary maintenance proactively, and optimize spare parts supply chains for auto manufacturers. Governments can collaborate with technology companies to establish public-private partnerships aimed at enhancing public services through IoT infrastructure. This requires a shift in traditional business structures, as IoT can transform single sales into service-oriented approaches, such as car sharing and integrated smart home technologies. Subscription-based services can enhance value for both sellers and buyers by integrating seemingly unrelated technologies, such as combining internet-connected smoke detectors with home security webcams. Data analytics, a disruptive element of the IoT business model, involves leveraging data generated during online interactions, often referred to as "information exhaust," to gain valuable insights. These insights can be used to improve product development or target advertising campaigns more effectively. However, it is crucial to adopt fair and transparent practices when utilizing this data.

Privacy and Trust in the IoT

The proliferation of the Internet of Things (IoT) has raised concerns about privacy and trust in an era where extensive digital identities and personal information are shared through connected devices. In today's digital landscape, heavy internet users construct carefully curated online identities by uploading substantial content to social media platforms. Simultaneously, they generate extensive "digital exhaust" through interactions with IoT-connected devices, often without full awareness of the extent of data generation.

External entities, whether benevolent or malevolent, have the ability to construct comprehensive profiles from these data collections, which they can exploit and manipulate at their discretion. This challenge arises from a significant advantage offered by IoT: the seamless connectivity among digital systems. While internet services offer enticing possibilities, users often fail to consider the specific information required to achieve their online objectives. It is rare for users to thoroughly read a website's terms of service and subsequently configure their privacy settings meticulously. Moreover, companies that violate their terms of service or recklessly disclose information seldom face significant consequences.

The implementation of the European Union's General Data Protection Regulation (GDPR) in 2018 introduced disclosure obligations for corporations seeking to utilize internet user data. While the GDPR has contributed to increased public awareness about online data collection and sharing practices, consumers still grapple with the balance between consent and utility in their interactions with IoT. This is partly due to unresolved questions regarding the intentions, policies, and procedures related to personally identifiable information. Additionally, platforms often lack transparency regarding their data sharing practices and controls.

This deficiency in governance, which lacks both technological and economic awareness, results in insufficient incentives for enterprises to prioritize consumer protections and a lack of well-defined consequences for those who fail to develop secure systems. Both individual internet users and enterprises have recognized the absence of transparency and security in IoT. Consequently, some have resisted adopting IoT technology due to a lack of trust in existing privacy safeguards and concerns about abrupt changes in terms and conditions. To ensure the successful growth of the Internet of Things, it is imperative to establish clear, user-focused guidelines regarding data collection, storage, and sharing. Effective governance is essential to ensure that IoT technology generates maximum social and economic benefits.

Making the Rules for a Beneficial IoT

The Internet of Things holds immense potential for society, but realizing this potential requires the establishment of effective governance. The rapid but somewhat disjointed evolution of IoT has resulted in decentralized systems that lack comprehensive governance. To harness the power of IoT, these fragmented systems must find a way to effectively communicate and coordinate with each other, necessitating governance that takes into account the broader context.

While some degree of governance exists in IoT, it may not be sufficient to foster sustained growth. Technical governance in the form of standards exists, but over-standardization has led to complications, including infighting and incompatibility.

One of the significant challenges facing IoT is the diversity of applications and industries it impacts. Creating a single set of standards that works seamlessly for various IoT applications, from dishwashers to autonomous cars to smartwatches, presents considerable hurdles. Each object, service, or network has its unique design considerations, and within a single industry, multiple conflicting standards may exist.

Therefore, there is a compelling need for corporate and international governance in the realm of IoT. The challenge lies in determining the appropriate level of governance and creating incentives for all stakeholders to collaborate. IoT requires substantial investments to realize its potential, and it is primarily deployed in well-resourced regions, even though less affluent areas could benefit most from its efficiency improvements and cost savings. Efforts to promote IoT adoption must aim to ensure that it benefits all, rather than exacerbating disparities.

Ultimately, the Internet of Things has the potential to create societal value that contributes to achieving the United Nations Sustainable Development Goals established in 2015. IoT-powered mobility services can reduce vehicle ownership, fuel consumption, and emissions. Additionally, IoT-enabled monitoring of agriculture and supply chains can reduce food wastage and ensure that resources reach those in need. However, to unlock this potential, explicit and user-centered guidelines for data collection, storage, and sharing must be established. Effective governance is crucial to ensure that IoT technology generates maximum social and economic benefits.

bottom of page