| |9 JANUARY 2016HIGHERReviewSecure identifying protocols are being developed to counter these threats. An alternative is to provide tagged devices with unique UIDsthe connectivity of innumerous multiple objects to the Internet. ·Connectivity: Today connectivity is not consistent and often trips or goes missing, which is a grave risk and a challenge for IoT. Seamless connectivity in the IoT will have to be mostly wireless, using many possible solutions like the Wi-Fi, GPRS, 3G,WirelessHART, Zigbee, Bluetooth, adaptive ad-hoc network with mesh-routing capabilities , all of which holds promise to optimize communication with devices in the world of IoT.·Openness and Data Model Standards: Currently, we have few working examples of connected objects like automatic meter reading, customer electronics, health check devices to name a few which rely on a vertical and closed ecosystem. The IoT envisages a more open ecosystem with challenges of uniform and universal standardization. If all connected objects and sensors were to be accessible in a more `open' and `standard' way, then, the same objects would have more than one `connected usage' scenario. The open, wider and standard ecosystem is a good incentive for end users to exploit the opportunities, which in turn would be an incentive for service providers to develop new services using these objects. ·Security and Privacy (vs. Simplification): Security - is a key component used in the IoT, RFIDs, are susceptible to attack. Secure identifying protocols are being developed to counter these threats. An alternative is to provide tagged devices with unique UIDs. Privacy - is one of the main concerns that the IoT has to address convincing users to adopt emerging technologies is the protection of data and privacy. The fact that in the IoT, a lot of data flows autonomously and without human knowledge makes it very important to have authorization protocols in place to avoid misuse of data. To promote a more widespread adoption of the technologies underlying the IoT, principles of informed consent, data confidentiality and security must be safeguarded.·Computing Power: The real-time nature of the IoT is a big-time challenge with the amount of computing power required with 50 to 100 trillion objects in scope of data sharing. The desktop based contemporary computing models would be inadequate and inappropriate for ubiquitous computing. Widespread parallel systems capable of analytics performing magnitude of calculations would be required. Cloud computing is an answer in the offing which is the future of solutions. The IoT is expected to drive the new digital era with new and emerging communication technologies. We have seen the current wave of disruptive nature of digital revolution and the advent and rise of IoT furthers this disruptive nature potential of IoT. Businesses and organizations will have to brave themselves to adopt and adapt this revolution in order to reap the associated benefits in terms of economic growth and individual wellbeing, thus making IoT work for People in-masse.Purshottam Purswani
<
Page 8 |
Page 10 >