Tuesday, December 10, 2019

Internet of Things Devices Within the Dwelling †MyAssignmenthelp.com

Question: Discuss about the Internet of Things Devices Within the Dwelling. Answer: Introduction: This report focuses on the IoT devices that have applications in the dwelling for completing work in automated way. Following is a list of twelve devices that can be helpful in household works in easy and automated way. Many of the devices are easy to use and have normal access systems with less complexity. Technically al IoT are complex but the devices that have listed in this report are either based on automatic working or can be accessible thorough application using any mobile device. These devices are helping each human to be smarter and enhance the manner of living in better and efficient way through better user-interface interaction between the device and the user. It can be said that the best benefit or facility through these devices are mobile push notifications, which is embedded in most of the devices including their controls through mobile applications that can be installed in the mobile devices can be activated or get notified from any place via connecting to the internet . IoT Devices within the Dwelling Amazon Echo Show: Amazons new series of IoT devices Alexa is rising and gaining attention of new technology lovers. This device is incorporated with features like controlling the appliance that are being used in the house with an extra feature screen that enables the user to look after the output of the command provided. Additional feature that is embedded in this device other than smartphone control is that it allows user to make video calling and video streaming to similar Alexa devices that have camera (Sivaraman et al., 2015). TP Link Multicolor smart WiFI: Various IoT devices have been introduced to the market by the TP Link devices and have become a stable brand in the market. This device introduced does not require any hub at all that makes it easy to be kept at any place a consumer wants to. It is could be the best devices to get started towards a smart home or smart than other products with similar features (Santoso Vun, 2015). Fitbit Aria Wi-Fi Smart Scale: This is a revolutionary device that enables the user to track their fitness and maintain those including motivational stages through earning badges. Fitbits Aria smart scale tracks the weight of the individual including body fat percentage and calculates the Body Mass Index (BMI) and enables the user to monitor on these recoded data and values that are based on long-term. The embedded features auto-updates the data to an online graph that is being synced wirelessly in manner to monitor the activities and goals the individual is achieving (Pang et al., 2015). Keen Home Smart Vent: It is an AC monitoring and controlling device that allows the user to control the temperature by manipulating the vents by just selecting options on the smartphones in manner to manage the temperature of other rooms from anywhere at the home. An automatic option automatically closes and opens the vents for different rooms but it could also be operated manually using a manual option. Another feature embedded in this device is that it can be integrated with Nest thermostats (Tozlu et al., 2012). Piper: The devices that are being offered by the piper enable the user to automate the home security and controlling of the home appliances using smartphone. Hubs are used for the devices that are being automated, which makes it little secured than other devices that are being operated wirelessly. Devices can be integrated at the exit or entry ways of the house and features like video camera recording with motion sensors and push notification services makes it a reliable product. Elgato Eve: It is a device powered by Apple Inc. for automating the HomeKit appliance that is being offered by the Apple. The main feature that makes it application within the flat is that it monitors the environment of the surrounding and notifies about the doors and windows whether they are open or not. It monitors the quality of the air indoor and outdoor weather including the energy consumption. Both android and iOS users can use this device as it offers application for both the operating system. Belkin Wemo: It is an innovative product produced by the Belkin that helps in automating each home appliance without any connectivity hub. This device could control smart switches, motion sensors, plugs, LED lights and lightning devices through smartphone applications and uses the personal and free cloud service provided by the Belkin. A single application can be used to monitor and control several devices as each device is being operated at unique channel. Energy Aware Technology Neurio: Another home appliance controller that enables the user to monitor the break down activities of the home appliances, power used by them and based on the machine learning interpret the activities and then pushed a notification to the registered user if there is certain changes needed into the house like oven is on, boiler stills on and many several important activities by tracking the power signatures of the appliances that generally missed out by the individuals (Domingo, 2012). Interactive Voice ivee Sleek (or ivee Voice): This product was earlier presented in the market but modifications have enabled the facilities through this device. A simple alarm clock looking device has many features like monitoring the home appliances via voice that enables the user to communication with the SmartThings smart home monitoring, the Nest smart home thermostat, and the Staples Connected Home and controlling systems. Additional features are broadcasting news and weather report gathered from the internet (Gaikwad, Gabhange Golait, 2015). Sen.se Mother: A smart suit for smart dwelling powered by the Sen.se with a maternally embedded theme that have features like wireless sensors as cookies and the hubs as Mother that enables the user in manner to attach the people and the objects and can be controlled in a way to monitor the activities that include the temperature and the location. It can be used for the patients and if there is any kid at home. Lifx Color 1000: An innovative experiment that resulted as an innovative market product that enables the user in getting brighter and efficient light with less electricity expanses. It can be used in the dwelling replacing the LED bulbs as not any hub is required and colors can be changed according to the mood and the temperature it is much more attractive than any other bulbs. Implementation of smartphone application controls, IFTTT and Alexa into the device makes it more reliable and efficient to be used in the flat or home (Baccelli et al., 2013). D-Link WI-Fi Water Sensor: Device that is best for the flood prone area. This device can be incorporated within the walls and there is no need of batteries in this device. The basic feature of this device is to push notification in the phone whenever there are chances of the flood across the surroundings. Its workings depends on the Internet that its connect via Wi-Fi and is much reliable than any other voice calls or statements (Mitsugi et al., 2014). Issues Related with Iot Devices: Usage Issues Constantly being connected with the smartphones and these devices could let to metal and physical health problems that could be serious concern regarding the use of IoT devices (Corcoran, 2014). According to the recent researches it is seen that Text Neck health problem can be caused due to much staring at smartphones and keeping the IoT devices too much closer can lead to health problems like stress and others (Yoon, Park Yoo, 2015). Proper infrastructure is the must objective for issues related with the usage of IoT devices. Control Issues The devices that are based on machine learning for automatic controlling the temperatures and others can lead to issues due to some technical problem or intrusion made by an unwanted intruder. There are not even any existing laws that can relate the security and privacy issues that could be raised due to the application of these devices, which implies on having no control over the device (Zhang et al., 2014). These devices have much more accountability issues that could lead to serious damage to the information of the user that is being collected for enhancing the performance of the user (barcena Wueest, 2015). Connectivity Issues These devices can only be used within a network connection, generally internet or Wi-Fi. This led to the necessity of the network in order to activate the device and use the device and most of the rural areas do not have even communication systems and lacks in finance too, thus they are not able to take benefits of these devices. There should be exchange of information but it should be interconnected with the IoT devices for an ideal environment but it is becoming dependent on various communication protocols and inherently complex. Security Issues Various security issues have been related to the application of IoT devices within the dwelling or flat or in real world (Sicari et al., 2015). These devices are vulnerable to cyber-attacks because of the connectivity with the internet and if the security is not maintained properly it could lead to security issues by the expose or manipulation of data and information to an unauthorized actor. Many hackers can easily manipulate the programming of these devices and steal information that is personal and sensitive for an individual (Borgia, 2014). Examples of these issues can be related to the Sony Playstation that was breached in which personal information of the gamers had been stolen. Another incident was Ring Doorbell Pro system in which due to glitch wrong people appeared at wrong places on the video streaming. Privacy issues The devices that need internet connection collect personal information of the individual. Many of the IoT devices have been launched in the market to monitor the behaviors of the customers, which can be used in Big Data. Increase in the number of IoT devices users will lead to make more profit for the organizations that are using Big Data as the system for increasing productivity. This is the most critical concern in using IoT devices within the dwellings. This no-doubt violating laws but even that no one is opposing the use of personal data for the benefits of the organization (Condry Nelson, 2016). Since the data is being collected in a mass level and stored at a single database, cyber-attacks may lead to mass damage by affecting lots of people and exposing their personal information including recorded videos, images and many more. Solution to the Issues Raised on the application of Iot Devices Proper agreement should be made between the user and the seller in manner to compensate the loss in future (Stankovic, 2014). Government should made strict rules for the security of the information that the organization is collecting. Secured network should be used to communicate. Government should provide better network connection at the rural areas. Credentials of the account should not be exposed to an unwanted person (Yoshigoe et al., 2015). Dwelling Layout Figure 1: Dwelling layout with IoT devices (Source: Created by Author) Conclusion: It can be concluded that regardless of the benefits of the application of IoT devices, there are certain disadvantages of using these devices for the daily operational activities within the house. These are no doubt helping in securing the house and helping in making the systems smarter with machine learning and without user-interface system but these are vulnerable to cyber-attacks, which means it can be manipulated using certain advance coding in computer languages. As stated in the above report there are certain risks in using these devices but these could be minimized at extreme low level through approaches made by both the user and the products provider. Cyber-attacks can be represented as the most concerning topic in the list of information security and should be the most priority for the individuals who are using information technologies including IoT devices. Priority should be given on minimizing the threats and the risks as it could not be eliminated completely from the sys tem. Most of the devices stated above are using wireless technology that is the need of this digital world in order to get more advanced but these are also providing windows to the intruders to get into the system and gain access to the personal information. References: Baccelli, E., Hahm, O., Gunes, M., Wahlisch, M., Schmidt, T. C. (2013, April). RIOT OS: Towards an OS for the Internet of Things. In Computer Communications Workshops (INFOCOM WKSHPS), 2013 IEEE Conference on (pp. 79-80). IEEE. Barcena, M. B., Wueest, C. (2015). Insecurity in the Internet of Things. Security Response, Symantec. Borgia, E. (2014). The Internet of Things vision: Key features, applications and open issues.Computer Communications,54, 1-31. Condry, M. W., Nelson, C. B. (2016). Using smart edge IoT devices for safer, rapid response with industry IoT control operations.Proceedings of the IEEE,104(5), 938-946. Corcoran, P. (2014). Consumer Electronics and the Internet of Things [Society News]. IEEE Consumer Electronics Magazine, 3(3), 29-34. Domingo, M. C. (2012). An overview of the Internet of Things for people with disabilities. Journal of Network and Computer Applications, 35(2), 584-596 Gaikwad, P. P., Gabhane, J. P., Golait, S. S. (2015, April). A survey based on Smart Homes system using Internet-of-Things. In Computation of Power, Energy Information and Commuincation (ICCPEIC), 2015 International Conference on (pp. 0330-0335). IEEE. Pang, Z., Zheng, L., Tian, J., Kao-Walter, S., Dubrova, E., Chen, Q. (2015). Design of a terminal solution for integration of in-home health care devices and services towards the Internet-of-Things. Enterprise Information Systems, 9(1), 86-116. Santoso, F. K., Vun, N. C. (2015, June). Securing IoT for smart home system. In Consumer Electronics (ISCE), 2015 IEEE International Symposium on (pp. 1-2). IEEE. Sicari, S., Rizzardi, A., Grieco, L. A., Coen-Porisini, A. (2015). Security, privacy and trust in Internet of Things: The road ahead.Computer Networks,76, 146-164. Sivaraman, V., Gharakheili, H. H., Vishwanath, A., Boreli, R., Mehani, O. (2015, October). Network-level security and privacy control for smart-home IoT devices. In Wireless and Mobile Computing, Networking and Communications (WiMob), 2015 IEEE 11th International Conference on (pp. 163-167). IEEE. Stankovic, J. A. (2014). Research directions for the internet of things.IEEE Internet of Things Journal,1(1), 3-9. Tozlu, S., Senel, M., Mao, W., Keshavarzian, A. (2012). Wi-Fi enabled sensors for internet of things: A practical approach. IEEE Communications Magazine, 50(6). Yoon, S., Park, H., Yoo, H. S. (2015). Security issues on smarthome in IoT environment. InComputer Science and its Applications(pp. 691-696). Springer, Berlin, Heidelberg. Yoshigoe, K., Dai, W., Abramson, M., Jacobs, A. (2015, December). Overcoming invasion of privacy in smart home environment with synthetic packet injection. InTRON Symposium (TRONSHOW), 2015(pp. 1-7). IEEE. Zhang, Z. K., Cho, M. C. Y., Wang, C. W., Hsu, C. W., Chen, C. K., Shieh, S. (2014, November). IoT security: ongoing challenges and research opportunities. In Service-Oriented Computing and Applications (SOCA), 2014 IEEE 7th International Conference on (pp. 230-234). IEEE.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.