Wednesday, December 11, 2019

Semantic Service Provisioning Smart Objects â€Myassignmethelp.Com

Question: Discuss About The Semantic Service Provisioning Smart Objects? Answer: Introduction The following report intends to describe the prospective of IOT technology from the user end and its significance for lifestyle in relation to common IOT products that can be used in ones day to day life. Apart from that, this report will also discuss the several concerns related to IOT including data storage, security and control etc. with reflective measures for the same. IOT Home Network The Internet of Things (IoT) renovates the physical objects everywhere into a network of information that quickly modifies our way of life. From refrigerators to cars, to parking spaces and homes, the IoT is turning every object into the digital world. Our homes could soon keep track of all our daily activities (Perera 2017), from opening to closing the front door, through automatic product control when the refrigerator is empty. Whether we are ready for such a level of automation, or what we want, is a whole other matter. However, this should quickly become the norm, before a new evolution of technologies again transforms our way of life. On the other hand, there are few problems in the smart homes that should be stated. The broad technological concerns range from interface, privacy, connectivity, security and convenience. The diagram of Internet of Things infrastructure of my home can be shown as: Home Networking: My Abode The devices in my abode can be discussed as: Lock system Firms these days have established the digital auto lock systems that are hassle free, keyless and operate through mobile apps capable of connecting with majorly all smart devices. With such system, it becomes relatively easier to lock and unlock the accesses without the need of keys by just operating online. Customized keys could also be generated and coded for specific visiting hours or days for any guests. Being extremely useful and keyless Internet operates it all. But certain issues faced are: Issue Type Comments Usage Absence of commercial standards for lock system and different kinds of locks having different standards pose out usage issues. Control Data authentication is of chief concern for control. Connectivity Digital Lock arrangements may not work during low connectivity or when offline. Security If someone loses his or her mobile phone then such emergencies have lot to be handled securely (Oravec, 2017). Privacy Most smart products are connected to mobile phones and thus they are very powerful and proficient in managing almost every facet of life so is the privacy of the same. The three important resolutions are: Firewall addition: It is suggested that an additional layer of firewall should protect the lock system. Use of antivirus software. Biometric checks to be installed. It is observed that passwords are not that safe in home automation and home locking system. Therefore, it would make sense to protect the home with the means of biometrics system. It would be best if corporate standards were used for the goods (Zahra, Brewer, Cooper, 2017). By corporate standards it means that different vendors of lock system and home system automation should join hands and develop common set of standards. The common set of standards would ensure that the vulnerabilities in the system are minimized. Home Lighting systems Philips new mobile app has a lights control feature thus total regulation of household switches could be operated. Furthermore, this app can self-diagnose and maintain schedules as per individuals usage and involve its acumen to design links as per generated data. Technology making it same lighting device red, blue yellow or as per the customization. Issue Type Comments Usage Every light has specific power consumption value thus usage issues could appear. Control Data authentication is an important issue to deal with. Connectivity The lighting systems could be sluggish to respond in case of poor connectivity. Security Apps like Google store their data on clouds and thus there are several replicas at different locations (Han, Crespi, 2017). Therefore, it is very significant for the vendors to simplify such issues. Privacy Data privacy needs to be taken care of. The key measures to be taken are as follows: Protection through strong passwords. At the same time, it is recommended that users should change the password on regular time interval. Antivirus Systems to be installed with lighting systems software. At the same time, it is recommended that the antivirus system should be updated on regular time interval. Philips Light systems should integrate with all the coffee machines irrespective of the brand. Nike has launched their smart watch only on iOs and not on Android and it may result in multi levels of collaboration. Thermostat IOT enabled thermostat was primarily created by Nest however it was later acquired by Google. These thermostats can be operated online from any location using desired application before reaching home to make more comfortable prior the entry. These technically adapted thermostats do not require any temperature settings, they automatically behave as per the weather conditions and time of day with easily customizable features that too with voice over. It is self-maintaining and improvises itself every time with required substantial data. Issue Type Comments Usage Different devices have different thermostats with individual power consumption values thus it is bit complex in use. Control There is a control issue of data authentication. Connectivity Unavailability of thermostat that could be connected with smart phone or other devices like air conditioners etc. Security Data compliance needs to be secured. Privacy Data leakage could be a risk. The three key solutions are: Use of password or second layer of authentication over the mobile user interface. Use of antivirus systems. Smart TV Smart TVs are planned for gizmo homes and are attuned to more than 200 devices and can link with mutual devices like Phone, Bluetooth, Thermostat, related lights and camera (Demirer, Aydin, Celik, 2017). Issue Type Comments Usage Diverse user interface for each of the smart TV may create misperception. Control Data authentication is at stake. Connectivity Due to poor connectivity smart TV might not get connected to smart phone. Security Security concern in relation to data compliance. Privacy Privacy of data is vulnerable. The three key solutions are: Different profile should be created for all the users who watch TV Inbuilt Antivirus Program should be there in the software of smart TV The software of Smart TV should be updated as soon as there is a new version or new patch in the market Coffee machine There are smart coffee machines in the market that can be fully controlled by the mobile App. One can schedule the brews and give instruction like after how many minutes you want your coffee ready, change settings, number of different ingredients and many more. Also, whenever there is shortage of any ingredient in the machine-like water, it will also send a notification. Issue Type Comments Usage There is a usage issue of adequate support. There is a possibility that coffee machine does not support all the functions over a mobile app. Control Data authentication needs have Control Connectivity There is a connectivity concern related to setup. Security Data Compliance and its security to be taken care of. Privacy Privacy of data to be looked after. The main resolutions are: Password Protection Antivirus Installation Refrigerator Smart and Connected refrigerators are built with complex system of actuators and sensors that have predictive analysis in relation to shortage of inventory, placing orders to the closest outlets (Verhoef, et al., 2017). Though these characteristics are primarily unrealistic, but with smart approach and regular improvisations its easily getting importance in our lives. Issue Type Comments Usage Refrigerator may not upkeep all the functions over a mobile application. Control Data validation could generate control concerns. Connectivity If connectivity gets lost then data calculation could be faulty. Security Data maintenance could be loose. Privacy Data discretion might be at stake. The three key way outs are: Password protection Antivirus Protection IOT Footwear Primarily, Ducere Techologies has developed sensor induced footwear for visually impaired people. These shoes act as guide in the direction of the destination with the help of vibrations in shoes operated with Lechal app. Presently, Nike has also introduced IOT enabled shoes which are connected with Apple smart watch and iPhones. These shoes can gauge the travelled distance, running speed, calories burnt and several other characteristics by estimating an individuals pattern. Issue Type Comments Usage There is a usage issue of adequate support. Control There is a control issue of data authentication. Connectivity Infrastructure Connectivity. Security Data compliance required with any risks. Privacy Data Privacy needs to be strong. The three key measures are: Firewall Protected. Antivirus Protected. Biometric Authentication. Smart Toothbrushes Philips and Kolibree are two major companies dealing in smart toothbrushes. These products are a direct competition to the dentists providing easier and reasonable oral healthcare routines with features to analyze brushing duration, frequency and ignored oral and dental areas. They will also convey performance charts and scheduled reminders for regular activity thus promoting better dental hygiene of an individual. Issue Type Comments Usage There is a usage issue of sufficient provision. There is a likelihood all the functions might be unsupportable over a mobile app. Control Biometric authentication might be erroneous. Connectivity Connectivity arrangement could come up as an issue. Security There is a security problem of information compliance. Privacy There is a grave concern of data privacy at stake. The major solutions are: The second level of authentication like face detection of fingerprint can be used to provide access to toothbrush. The software of the toothbrush should be updated on regular time interval. Conclusion More and more objects are connected to the Internet and applications are endless, ranging from monitoring machines to massive transfer of information. All kinds of machines ranging from gigantic digitally operated aircrafts to small handheld devices are monitored in the real time. IOT industry is fairly divided as of now and there are enormous organizations, which are involved in IOT related products. Philips, Nike, Google, Apple, Schneider are all open to IOT product development, organizations such as GE, ABB, CISCO, IBM are manufacturing IOT products which can be used in various sectors like retail, automotive and education. High-tech giants like Google, Cisco, and IBM are working on IT aspects of these Internet based communication products (Olsson, Bosch, Katumba, 2016). References Abou-Zahra, S., Brewer, J., Cooper, M. (2017). Web Standards to Enable an Accessible and Inclusive Internet of Things (IoT). Demirer, V., Ayd?n, B., elik, ?. B. (2017). Exploring the Educational Potential of Internet of Things (IoT) in Seamless Learning.The Internet of Things: Breakthroughs in Research and Practice: Breakthroughs in Research and Practice, 1. Han, S. N., Crespi, N. (2017). Semantic service provisioning for smart objects: Integrating IoT applications into the web.Future Generation Computer Systems. Olsson, H. H., Bosch, J., Katumba, B. (2016). Exploring IoT User Dimensions: A Multi-case Study on User Interactions in Internet of Things Systems. InProduct-Focused Software Process Improvement: 17th International Conference, PROFES 2016, Trondheim, Norway, November 22-24, 2016, Proceedings 17(pp. 477-484). Springer International Publishing. Oravec, J. A. (2017). Kill switches, remote deletion, and intelligent agents: Framing everyday household cybersecurity in the internet of things.Technology in Society. Perera, C. (2017). Sensing as a Service (S2aaS): Buying and Selling IoT Data.arXiv preprint arXiv:1702.02380. Verhoef, P. C., Stephen, A. T., Kannan, P. K., Luo, X., Abhishek, V., Andrews, M., ... Hu, M. (2017). Consumer Connectivity in a Complex, Technology-Enabled, and Mobile-Oriented World with Smart Products.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.