
eBook - ePub
Challenges of the Internet of Things
Technique, Use, Ethics
- English
- ePUB (mobile friendly)
- Available on iOS & Android
eBook - ePub
Challenges of the Internet of Things
Technique, Use, Ethics
About this book
This book will examine the issues of IoT according to three complementary axes: technique, use, ethics. The techniques used to produce artefacts (physical objects, infrastructures), programs (algorithms, software) and data (Big data, linked data, metadata, ontologies) are the subject of many innovations as the field of IoT is rich and stimulating. Along with this technological boom, IoT uses colonize new fields of application in the fields of transport, administration, housing, maintenance, health, sports, well-being.... Privileged interface with digital ecosystems now at the heart of social exchanges, the IoT develops a power to act whose consequences both good and bad make it difficult to assess a fair business.
Frequently asked questions
Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
No, books cannot be downloaded as external files, such as PDFs, for use outside of Perlego. However, you can download books within the Perlego app for offline reading on mobile or tablet. Learn more here.
Perlego offers two plans: Essential and Complete
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, weāve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere ā even offline. Perfect for commutes or when youāre on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Challenges of the Internet of Things by Imad Saleh, Mehdi Ammi, Samuel Szoniecky, Imad Saleh,Mehdi Ammi,Samuel Szoniecky in PDF and/or ePUB format, as well as other popular books in Computer Science & Information Technology. We have over one million books available in our catalogue for you to explore.
Information
1
Internet of Things (IoT): Concepts, Issues, Challenges and Perspectives
This chapter is an in-depth review of our article published in 2017. We considered some elements to develop concepts based on the IoT. In this chapter, we present: (1) the connected object (CO), (2) a definition of the Internet of Things, (3) steps and technologies in the IoT ecosystem, (4) IoT to the Internet of Everything (IoE), (5) IoT and Big Data, (6) cloud computing applied to Big Data and the IoT, (7) data science and the IoT, (8) issues and challenges of the IoT, (9) opportunities and threats in the IoT ecosystem, (10) security of the IoT, (11) blockchain and the IoT and (12) conclusion, summarizing the perspectives of the IoT.
1.1. Introduction
The Internet in general and the Web in particular have continued to evolve ā from the Web of information to the Web of individualized1 Things ā via various connected objects thanks to miniaturization and technological development, which make room for a double approach: being connected and communicating consistently without any constraints as regards space and time so as to meet the demands and needs of users in terms of services, communication and information [ROX 17, THE 13].
The Internet is gradually transforming into a HyperNetwork, just like a network consisting of multitudes of connections between artifacts (physical, documentary), actors (biological, algorithmic), scripts and concepts (linked data, metadata, ontologies, folksonomy), called the āInternet of Things (IoT)ā, connecting billions of people and objects. It has become the most powerful tool ever invented by man to create, modify and share information. This transformation shows the evolution of the Internet: from a computer network to a network of personal computers, then to a nomadic network integrating communication technologies [CHA 12]. Developments in machine-to-machine (M2M) technologies for remote machine control and the first use of IP (Internet Protocol) in the year 2000 on mobile cellular networks have accelerated the evolution from M2M to the IoT [WOO 11].
1.2. The connected object (CO)
Before defining IoT concepts, it is important to define a connected object as being a device whose primary purpose is neither to be a computer system nor to be a Web Access interface. For example, an object such as a coffee machine or a lock was designed without integrating a computer system or Internet connection. Integrating an Internet connection to a CO enriches it in terms of functionality and interaction with its environment. This makes it an Enriched CO (ECO); for example, the integration of an Internet connection to a coffee machine will make it remotely accessible.
A CO can independently interact with the physical world without human intervention. It has several constraints such as memory, bandwidth or energy usage. It must be adapted for a purpose and has some form of intelligence, which is the ability to receive and transmit data with software through embedded sensors [ROX 17]. A CO has value when connected to other objects and software components; for example, a connected watch is only relevant within a health or wellbeing-oriented ecosystem, which goes far beyond knowing the time.
A connected object (CO) has three key elements:
- ā generated or received, stored or transmitted data;
- ā algorithms to process this data;
- ā the ecosystem in which it will react and integrate.
Use properties of a CO [SAL 17] are:
- ā ergonomics (usability, workability, etc.);
- ā aestheticism (shapes, colors, sounds, sensations, etc.);
- ā usage (cultural history, profile, social matrix, etc.);
- ā metamorphism (adaptability, customization, modulation, etc.).
Some researchers talk of āhyper objectsā [MAV 03] as able to pool their resources to perform everyday tasks as they are linked by āinvisible linksā within the same ecosystem. In this context, researchers such as [WEI 93] have already considered ubiquitous computing to be where āthe most profound technologies are the ones that have become invisible. Those ones which, when tied together, form the fabric of our daily life to the point of becoming inseparableā [WEI 91, p. 94].
Communication between objects is passed through identifications that are known to each other. An object must have one or more IDs (barcodes) to be recognized by another so as to establish connection. The GS1 system has proposed a technology based on RFID tags2 that will uniquely associate the logistical information related to an object with a URL. Google has proposed the Physical Web project to uniquely associate a URL with an object3. The ubiquity of heterogeneous, mobile and fragile objects in our life poses the problem of trust models adapted to this complex and fragile ecosystem [SZO 17]. Behind these technologies is the fight for norms and standards for the IoT between giant Internet companies because each wishes to impose its technologies.
1.3. Internet of Things: definition
Kevin Ahston4, the co-founder of MITās Auto-ID Center, used the term āInternet Of Thingsā in 1999. The term IoT was first used during a presentation made by Procter & Gamble (P&G). This term conjures up the world of objects, devices and sensors that are interconnec...
Table of contents
- Cover
- Table of Contents
- Introduction
- 1 Internet of Things (IoT): Concepts, Issues, Challenges and Perspectives
- 2 Deep Learning Approach of Raw Human Activity Data
- 3 Study and Development of a Smart Cup for Monitoring Post-stroke Patientsʼ Activities at Home
- 4 Enabling Fast-prototyping of Connected
- 5 Multi-standard Receiver for Medical IoT Sensor Networks
- 6 Ambient Atoms: a Device for Ambient Information Visualization
- 7 New Robust Protocol for IoV Communications
- 8 Interconnected Virtual Space and Theater: A ResearchāCreation Project on Theatrical Performance Space in the Network Era
- 9 Mobile Telephones and Mobile Health: a Societal Question Under Debate in the Public Domain
- 10 Modeling Power to Act for an Ethics of the Internet of Things
- List of Authors
- Index
- End User License Agreement