Changes

no edit summary
Line 63: Line 63:  
   <p class="highlighted mw-collapsible-content">The IoT evolved from machine-to-machine (M2M) communication. The M2M data is commonly used as a way to determine the health and status of things – inanimate or living. Taking M2M communication to the next level, IoT is a “sensor network” that can be composed of billions of smart devices that connect people, systems, and other applications to collect and share data.</p>
 
   <p class="highlighted mw-collapsible-content">The IoT evolved from machine-to-machine (M2M) communication. The M2M data is commonly used as a way to determine the health and status of things – inanimate or living. Taking M2M communication to the next level, IoT is a “sensor network” that can be composed of billions of smart devices that connect people, systems, and other applications to collect and share data.</p>
 
   <p class="inline-spacer"></p>
 
   <p class="inline-spacer"></p>
   <p class="inline">The IoT’s systems and platforms enable physical objects and infrastructure to interact with monitoring, analytic and control systems over digital Internet-style networks.<ref>Forrester. (2018).<i> [https://www.forrester.com/staticassets/glossary.html#heading-i Glossary]</i>. Retrieved from Forrester</ref></p><p class="highlighted inline mw-collapsible-content"> Many IT administrators use IoT systems for anything in their physical environment that they want to collect information about. The IoT describes a world where almost anything can be connected and can communicate in an intelligent fashion.</p><p class="inline"> With IoT, the physical world is becoming an aggregated information system where everyday physical objects are connected to the internet and are able to identify themselves to other devices. This is significant because an object that can represent itself digitally becomes something greater than the object by itself. The object no longer relates just to its user, but is now connected to the surrounding environment</p><p class="highlighted inline mw-collapsible-content">, objects, and to database data. When many objects act in unison, they are said to have “ambient intelligence” </p><p class="inline">.</p>
+
   <p class="inline">The IoT’s systems and platforms enable physical objects and infrastructure to interact with monitoring, analytic and control systems over digital Internet-style networks.<ref>Forrester. (2018).<i> [https://www.forrester.com/staticassets/glossary.html#heading-i Glossary]</i>. Retrieved from forrester.com</ref></p><p class="highlighted inline mw-collapsible-content"> Many IT administrators use IoT systems for anything in their physical environment that they want to collect information about. The IoT describes a world where almost anything can be connected and can communicate in an intelligent fashion.</p><p class="inline"> With IoT, the physical world is becoming an aggregated information system where everyday physical objects are connected to the internet and are able to identify themselves to other devices. This is significant because an object that can represent itself digitally becomes something greater than the object by itself. The object no longer relates just to its user, but is now connected to the surrounding environment</p><p class="highlighted inline mw-collapsible-content">, objects, and to database data. When many objects act in unison, they are said to have “ambient intelligence”<ref>Emery, C. (2016, June 24).<i> [https://www.techopedia.com/2/31587/it-business/it-marketing/the-awakening-of-ambient-intelligence The Awakening of Ambient Intelligence]</i>. Retrieved from Techopedia.com</ref></p><p class="inline">.</p>
 
   <p class="inline-spacer"></p>
 
   <p class="inline-spacer"></p>
 
   <p class="highlighted inline mw-collapsible-content">There are many types of IoT smart devices, and more emerge every day.</p><p class="inline"> The IoT technology in the home can consist of entertainment systems, including televisions, gaming systems,</p><p class="highlighted inline mw-collapsible-content"> speakers, and headphones,</p><p class="inline"> as well as heating/cooling systems such as</p><p class="highlighted inline mw-collapsible-content"> the thermostat, ceiling fan,</p><p class="inline"> carbon monoxide detector, smoke alarm, and lights. Home security IoT systems include alarms, smart locks, garage door openers, baby monitors, cameras, and home assistants. Home IoT appliances can include refrigerators, coffee makers, the oven, and the vacuum cleaner. External IoT objects can include connected smart cars, buses, trains, and airplanes. They also include wearables like fitness trackers and smartwatches, and healthcare devices like heart and blood pressure monitors.</p><p class="highlighted inline mw-collapsible-content"> Even pets can be connected via IoT with a tracking collar.</p><p class="inline"> By combining these connected devices with automated systems and Artificial Intelligence (AI), it is possible to gather new information, analyse it in real-time, and create an immediate action to help with a particular task, improve processes, or gain new insights.</p>
 
   <p class="highlighted inline mw-collapsible-content">There are many types of IoT smart devices, and more emerge every day.</p><p class="inline"> The IoT technology in the home can consist of entertainment systems, including televisions, gaming systems,</p><p class="highlighted inline mw-collapsible-content"> speakers, and headphones,</p><p class="inline"> as well as heating/cooling systems such as</p><p class="highlighted inline mw-collapsible-content"> the thermostat, ceiling fan,</p><p class="inline"> carbon monoxide detector, smoke alarm, and lights. Home security IoT systems include alarms, smart locks, garage door openers, baby monitors, cameras, and home assistants. Home IoT appliances can include refrigerators, coffee makers, the oven, and the vacuum cleaner. External IoT objects can include connected smart cars, buses, trains, and airplanes. They also include wearables like fitness trackers and smartwatches, and healthcare devices like heart and blood pressure monitors.</p><p class="highlighted inline mw-collapsible-content"> Even pets can be connected via IoT with a tracking collar.</p><p class="inline"> By combining these connected devices with automated systems and Artificial Intelligence (AI), it is possible to gather new information, analyse it in real-time, and create an immediate action to help with a particular task, improve processes, or gain new insights.</p>
   −
   <h2>Technology Brief</h2>
+
   <h2>Technology Brie</h2>
    
   <p>Internet of Things refers to the ever-growing network of physical objects that feature digital Internet connectivity. The IoT technology works via web-enabled  smart devices that transmit information gathered from their surroundings using embedded sensors, software, and processors. The IoT extends Internet connectivity beyond traditional devices like desktops, laptops, smartphones and tablets to a more diverse range of devices, everyday objects and industrial devices that communicate via the Internet.</p>
 
   <p>Internet of Things refers to the ever-growing network of physical objects that feature digital Internet connectivity. The IoT technology works via web-enabled  smart devices that transmit information gathered from their surroundings using embedded sensors, software, and processors. The IoT extends Internet connectivity beyond traditional devices like desktops, laptops, smartphones and tablets to a more diverse range of devices, everyday objects and industrial devices that communicate via the Internet.</p>
 
   <p class="inline-spacer"></p>
 
   <p class="inline-spacer"></p>
   <p class="highlighted inline mw-collapsible-content">First, sensors or devices collect data from their environment. Data is then sent to the cloud connected through a variety of methods including: cellular, satellite, WiFi, Bluetooth, Low-Power Wide-Area Networks (LPWAN), an IoT gateway, other edge devices, or by connecting directly to the internet via Local Area Networks (LANs) or Wide Area Networks (WANs).</p><p class="inline">  Some IoT devices have internal systems that are capable of processing and analyzing data at their local level, such that data sent to the cloud is not simply raw data. In other words: data processing can occur closer to the point of contact, at the edge of the network. Edge computing and processing has become a major component in IoT. This saves data-driven decision-making time by allowing the IoT device to act upon its own analysis, rather then sending large data volumes to a data centre’s analytic system and waiting for that system to signal an alert or make a decision. The connectivity, networking and communication protocols used with these web-enabled devices depend largely on the specific IoT applications deployed.</p>
+
   <p class="highlighted inline mw-collapsible-content">First, sensors or devices collect data from their environment. Data is then sent to the cloud connected through a variety of methods including: cellular, satellite, WiFi, Bluetooth, Low-Power Wide-Area Networks (LPWAN), an IoT gateway, other edge devices, or by connecting directly to the internet via Local Area Networks (LANs) or Wide Area Networks (WANs).<ref>McClelland, C. (2017, November 20).<i>[https://medium.com/iotforall/iot-explained-how-does-an-iot-system-actually-work-e90e2c435fe7 IoT Explained — How Does an IoT System Actually Work?]</i> Retrieved from medium.com</ref></p><p class="inline">  Some IoT devices have internal systems that are capable of processing and analyzing data at their local level, such that data sent to the cloud is not simply raw data. In other words: data processing can occur closer to the point of contact, at the edge of the network. Edge computing and processing has become a major component in IoT. This saves data-driven decision-making time by allowing the IoT device to act upon its own analysis, rather then sending large data volumes to a data centre’s analytic system and waiting for that system to signal an alert or make a decision. The connectivity, networking and communication protocols used with these web-enabled devices depend largely on the specific IoT applications deployed.</p>
 
   <p class="inline-spacer"></p>
 
   <p class="inline-spacer"></p>
 
   <p class="inline">Once data gets to the cloud, analytic software processes it to enable decision making. This could be very simple, such as checking if a temperature reading is within an acceptable range, or very complex, such as using computer vision on IoT video to identify objects (such as prolonged unattended bags at airports).</p><p class="highlighted inline mw-collapsible-content"> This information is made useful to the end-user in some way, usually in near real-time with an alert (email, text, notification, etc), although many IoT reactions can be performed automatically via predefined rules set by the user.</p><p class="inline"> As such, most of the work is done by the IoT devices without human intervention, although users can interact with the devices through initial set-up, establishing pre-defined instructions, or by accessing data.</p>
 
   <p class="inline">Once data gets to the cloud, analytic software processes it to enable decision making. This could be very simple, such as checking if a temperature reading is within an acceptable range, or very complex, such as using computer vision on IoT video to identify objects (such as prolonged unattended bags at airports).</p><p class="highlighted inline mw-collapsible-content"> This information is made useful to the end-user in some way, usually in near real-time with an alert (email, text, notification, etc), although many IoT reactions can be performed automatically via predefined rules set by the user.</p><p class="inline"> As such, most of the work is done by the IoT devices without human intervention, although users can interact with the devices through initial set-up, establishing pre-defined instructions, or by accessing data.</p>
Line 89: Line 89:  
   <h2>Canadian Government Use</h2>
 
   <h2>Canadian Government Use</h2>
   −
   <p class="highlighted inline mw-collapsible-content">Internet of Things has the potential to transform the public sector by profoundly altering how government entities gather data and information by bringing together the major technical and business trends of mobility, automation, and data analytics.</p><p class="inline"> Although the Government of Canada (GC) has a large focus on introducing mobile applications to improve citizen interactions in obtaining GC data and services,  the broad adoption and use of IoT in the GC is still in its infancy. The Treasury Board of Canada Secretariat (TBS) is developing  an IoT guidance, overarching strategy, and policy direction. However, many departments, such as the Canada Border Services Agency (CBSA), have adopted IoT pilot programs without guidance in order to help solve their complex issues.</p>
+
   <p class="highlighted inline mw-collapsible-content">Internet of Things has the potential to transform the public sector by profoundly altering how government entities gather data and information by bringing together the major technical and business trends of mobility, automation, and data analytics.</p><p class="inline"> Although the Government of Canada (GC) has a large focus on introducing mobile applications to improve citizen interactions in obtaining GC data and services,<ref>Treasury Board of Canada. (2013, April 1).<i>[https://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=27088 Standard on Optimizing Websites and Applications for Mobile Devices].</i> Retrieved from tbs-sct.gc.ca</ref> the broad adoption and use of IoT in the GC is still in its infancy. The Treasury Board of Canada Secretariat (TBS) is developing<ref>Canada, T. B. (2018, June). <i>[https://www.canada.ca/en/treasury-board-secretariat/services/information-technology/digital-policy-ideas-stage-what-we-heard-report.html Digital Policy: Ideas Stage - Report on What We Heard].</i> Retrieved from canada.ca</ref> an IoT guidance, overarching strategy, and policy direction. However, many departments, such as the Canada Border Services Agency (CBSA), have adopted IoT pilot programs without guidance in order to help solve their complex issues.</p>
 
   <p class="inline-spacer"></p>
 
   <p class="inline-spacer"></p>
   <p class="highlighted inline mw-collapsible-content">Although the CBSA is not the only GC department leveraging IoT, it provides a clear use case.</p><p class="inline"> The CBSA delivers integrated border services that support national security and public safety priorities and facilitate the free flow of legitimate trade and travel.  The IoT touches on many aspects of CBSA’s operational technology that range from standard desktop computers with document readers attached to audio/video surveillance systems, RFID systems, non-intrusive imaging systems (e.g. X-Rays), non-intrusive detection systems (e.g. radiation/drug detectors), face recognition systems, and mobile/wearable devices.</p><p class="highlighted inline mw-collapsible-content"> The CBSA uses IoT devices to sense, collect, analyse, and control situations, while also capturing vital information, providing deterministic automated responses, real-time alerts for officers, and data for trend analysis.</p>
+
   <p class="highlighted inline mw-collapsible-content">Although the CBSA is not the only GC department leveraging IoT, it provides a clear use case.</p><p class="inline"> The CBSA delivers integrated border services that support national security and public safety priorities and facilitate the free flow of legitimate trade and travel.<ref>Mungham, T. (2019, April 19).<i>[https://iot613.ca/speaker/tony-mungham/ Integrating IoT to Bring Ideas To Life – Use Cases at CBSA].</i> Retrieved from iot613.ca</ref> The IoT touches on many aspects of CBSA’s operational technology that range from standard desktop computers with document readers attached to audio/video surveillance systems, RFID systems, non-intrusive imaging systems (e.g. X-Rays), non-intrusive detection systems (e.g. radiation/drug detectors), face recognition systems, and mobile/wearable devices.</p><p class="highlighted inline mw-collapsible-content"> The CBSA uses IoT devices to sense, collect, analyse, and control situations, while also capturing vital information, providing deterministic automated responses, real-time alerts for officers, and data for trend analysis.</p>
 
   <p class="inline-spacer"></p>
 
   <p class="inline-spacer"></p>
 
   <p class="highlighted mw-collapsible-content">Economic and political pressures have increased the expectation for all GC departments to respond to operational challenges, without significantly increasing the existing workforce or operational footprint. Using the IoT, the focus of GC operations shifts toward higher efficiencies and facilitating services.</p>
 
   <p class="highlighted mw-collapsible-content">Economic and political pressures have increased the expectation for all GC departments to respond to operational challenges, without significantly increasing the existing workforce or operational footprint. Using the IoT, the focus of GC operations shifts toward higher efficiencies and facilitating services.</p>
Line 104: Line 104:  
   <p class="inline">In most cases, organizations leverage the IoT to assist in boosting their existing processes as well as improving optimization, and business models.</p><p class="highlighted inline mw-collapsible-content"> Organizations first use IoT to increase efficiency, reduce cost, or improve utilization rates. While this is beneficial, it largely keeps a business-as-usual culture.</p><p class="inline"> By  contrast, leading organizations use IoT to fundamentally alter and enhance their business models based on the new data, analytics, and automation possibilities accrued from IoT. Here, the balance can shift from improving existing processes to transforming the business with entirely new models since almost all parts of the business processes become interconnected through the IoT.</p><p class="highlighted inline mw-collapsible-content"> In today’s integrated world, it is not enough to rely on business data from isolated business systems.</p>
 
   <p class="inline">In most cases, organizations leverage the IoT to assist in boosting their existing processes as well as improving optimization, and business models.</p><p class="highlighted inline mw-collapsible-content"> Organizations first use IoT to increase efficiency, reduce cost, or improve utilization rates. While this is beneficial, it largely keeps a business-as-usual culture.</p><p class="inline"> By  contrast, leading organizations use IoT to fundamentally alter and enhance their business models based on the new data, analytics, and automation possibilities accrued from IoT. Here, the balance can shift from improving existing processes to transforming the business with entirely new models since almost all parts of the business processes become interconnected through the IoT.</p><p class="highlighted inline mw-collapsible-content"> In today’s integrated world, it is not enough to rely on business data from isolated business systems.</p>
   −
   <p class="highlighted mw-collapsible-content">The IoT can assist in one of the GC’s most complex areas – asset monitoring and control. Managing assets across the country where distances are vast and device numbers are huge, lessening the burden of asset tracking, monitoring, and managing would be a great benefit. The GC has a tremendous amount of materiel and assets which must be managed in a financially responsible way. Assets and materiel must be managed by departments in a manner that supports the cost-effective and efficient delivery of government programs.</p>
+
   <p class="highlighted mw-collapsible-content">The IoT can assist in one of the GC’s most complex areas – asset monitoring and control. Managing assets across the country where distances are vast and device numbers are huge, lessening the burden of asset tracking, monitoring, and managing would be a great benefit. The GC has a tremendous amount of materiel and assets which must be managed in a financially responsible way.<ref>Department of Finance Canada. (2018, October 19).<i>[https://www.fin.gc.ca/afr-rfa/2018/report-rapport-eng.asp Annual Financial Report of the Government of Canada].</i> Retrieved from fin.gc.ca</ref> Assets and materiel must be managed by departments in a manner that supports the cost-effective and efficient delivery of government programs.<ref>Treasury Board of Canada. (2006, June 26).<i>[https://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=12062 Policy on Management of Materiel].</i> Retrieved from tbs-sct.gc.ca</ref></p>
    
   <h4>Challenges</h4>
 
   <h4>Challenges</h4>
Line 110: Line 110:  
   <p class="inline">There are many challenges SSC will face in the development and deployment of IoT devices and platforms. Most notable is the large amount of time, guidance, effort, resources, and funding required for establishing and maintaining a robust GC IoT program</p><p class="highlighted inline mw-collapsible-content"> that also has a high level of interoperability</p><p class="inline">. Additional planning will be needed for SSC’s infrastructure to accommodate increased IoT data traffic and data processing.</p>
 
   <p class="inline">There are many challenges SSC will face in the development and deployment of IoT devices and platforms. Most notable is the large amount of time, guidance, effort, resources, and funding required for establishing and maintaining a robust GC IoT program</p><p class="highlighted inline mw-collapsible-content"> that also has a high level of interoperability</p><p class="inline">. Additional planning will be needed for SSC’s infrastructure to accommodate increased IoT data traffic and data processing.</p>
 
   <p class="inline-spacer"></p>
 
   <p class="inline-spacer"></p>
   <p class="inline">Security is one of the biggest challenge facing IoT initiatives. The IoT connects billions of devices to the internet; these devices also represent billions of network end points, all of which need to be secured. Due to its expanded “attack surface”, IoT security and IoT privacy are cited as major concerns.</p><p class="highlighted inline mw-collapsible-content"> Hackers will target networks via IoT devices through their default usernames/passwords, which are usually admin/admin.</p><p class="inline"> Additionally, there is no single IoT industry standard for communication between IoT devices, although a number of competing groups have formed with the aim of designing the IoT standards of the future.</p><p class="highlighted inline mw-collapsible-content"> The IoT standard-less situation resembles the early days of mobile operating-systems. This lack of standards increases the complexity of managing network security. This poses significant risks to critical infrastructure, including electricity, transportation, and financial services as IoT devices are potential access points into these critical systems. Certification has emerged as a means to confirm IoT devices are secure, but there still remains no central standard.</p>
+
   <p class="inline">Security is one of the biggest challenge facing IoT initiatives. The IoT connects billions of devices to the internet; these devices also represent billions of network end points, all of which need to be secured. Due to its expanded “attack surface”, IoT security and IoT privacy are cited as major concerns.</p><p class="highlighted inline mw-collapsible-content"> Hackers will target networks via IoT devices through their default usernames/passwords, which are usually admin/admin.</p><p class="inline"> Additionally, there is no single IoT industry standard for communication between IoT devices, although a number of competing groups have formed with the aim of designing the IoT standards of the future.</p><p class="highlighted inline mw-collapsible-content"> The IoT standard-less situation resembles the early days of mobile operating-systems.<ref>Mariani, J. (2017, February 14).<i>[https://www2.deloitte.com/insights/us/en/focus/internet-of-things/regulating-iot-technology-role-of-government.html Guiding the IoT to safety].</i> Retrieved from deloitte.com</ref> This lack of standards increases the complexity of managing network security. This poses significant risks to critical infrastructure, including electricity, transportation, and financial services as IoT devices are potential access points into these critical systems. Certification has emerged as a means to confirm IoT devices are secure, but there still remains no central standard.</p>
 
   <p class="inline-spacer"></p>
 
   <p class="inline-spacer"></p>
   <p class="inline">In many cases, IoT devices lack the technical ability to apply security patches when vulnerabilities are discovered and as a result, exposed IoT devices can be used to carry out malicious activities. In general, most IoT devices use proprietary software with weak encryption schemes and limited endpoint security to protect information. Many things connected to the internet also tend to send information about their use back to the manufacturer, which can be hacked by outside parties. Likewise, if manufacturers don't update their devices regularly, or at all, they leave their products vulnerable to cybercriminals.</p><p class="highlighted inline mw-collapsible-content"> In many cases, IoT devices lack the actual technical ability to apply security patches that are pushed by the manufacturer when vulnerabilities are discovered.  As with any emerging technology, mitigations and streamlined patch solutions are not always available.</p>
+
   <p class="inline">In many cases, IoT devices lack the technical ability to apply security patches when vulnerabilities are discovered and as a result, exposed IoT devices can be used to carry out malicious activities.<ref>Communications Security Establishment. (2017, June).<i>[https://www.cse-cst.gc.ca/en/node/2097/html/27699#a4 Internet of Things - The Future is Now].</i> Retrieved from cse-cst.gc.ca</ref> In general, most IoT devices use proprietary software with weak encryption schemes and limited endpoint security to protect information. Many things connected to the internet also tend to send information about their use back to the manufacturer, which can be hacked by outside parties.<ref>Canada. (2017, September 1).<i>[https://www.getcybersafe.gc.ca/cnt/blg/pst-20170901-en.aspx How to #ConnectSmarter on the Internet of Things (IoT)].</i> Retrieved from getcybersafe.gc.ca</ref> Likewise, if manufacturers don't update their devices regularly, or at all, they leave their products vulnerable to cybercriminals.</p><p class="highlighted inline mw-collapsible-content"> In many cases, IoT devices lack the actual technical ability to apply security patches that are pushed by the manufacturer when vulnerabilities are discovered.  As with any emerging technology, mitigations and streamlined patch solutions are not always available.</p>
 
   <p class="inline-spacer"></p>
 
   <p class="inline-spacer"></p>
 
   <p class="inline">Privacy is another major concern for IoT users, including GC employees who may be required to input personal information on IoT devices in order to use them for work purposes. Connected devices often ask users to input their personal information, including names, ages, addresses, phone numbers, and even social media accounts – valuable privacy information for hackers. Public Service organizations may also expose employees to privacy risks by asking them to use these IoT devices, thereby increasing their digital footprint beyond what the employee would normally have done.</p><p class="highlighted inline mw-collapsible-content"> Lastly, even the companies that make and distribute consumer IoT devices could use those devices to obtain and sell users' personal data either legally through terms of use or illegally.</p>
 
   <p class="inline">Privacy is another major concern for IoT users, including GC employees who may be required to input personal information on IoT devices in order to use them for work purposes. Connected devices often ask users to input their personal information, including names, ages, addresses, phone numbers, and even social media accounts – valuable privacy information for hackers. Public Service organizations may also expose employees to privacy risks by asking them to use these IoT devices, thereby increasing their digital footprint beyond what the employee would normally have done.</p><p class="highlighted inline mw-collapsible-content"> Lastly, even the companies that make and distribute consumer IoT devices could use those devices to obtain and sell users' personal data either legally through terms of use or illegally.</p>