Difference between revisions of "Technology Trends/Internet of Things"
(One intermediate revision by the same user not shown) | |||
Line 67: | Line 67: | ||
<p class="highlighted inline mw-collapsible-content">There are many types of IoT smart devices, and more emerge every day.</p><p class="inline"> The IoT technology in the home can consist of entertainment systems, including televisions, gaming systems,</p><p class="highlighted inline mw-collapsible-content"> speakers, and headphones,</p><p class="inline"> as well as heating/cooling systems such as</p><p class="highlighted inline mw-collapsible-content"> the thermostat, ceiling fan,</p><p class="inline"> carbon monoxide detector, smoke alarm, and lights. Home security IoT systems include alarms, smart locks, garage door openers, baby monitors, cameras, and home assistants. Home IoT appliances can include refrigerators, coffee makers, the oven, and the vacuum cleaner. External IoT objects can include connected smart cars, buses, trains, and airplanes. They also include wearables like fitness trackers and smartwatches, and healthcare devices like heart and blood pressure monitors.</p><p class="highlighted inline mw-collapsible-content"> Even pets can be connected via IoT with a tracking collar.</p><p class="inline"> By combining these connected devices with automated systems and Artificial Intelligence (AI), it is possible to gather new information, analyse it in real-time, and create an immediate action to help with a particular task, improve processes, or gain new insights.</p> | <p class="highlighted inline mw-collapsible-content">There are many types of IoT smart devices, and more emerge every day.</p><p class="inline"> The IoT technology in the home can consist of entertainment systems, including televisions, gaming systems,</p><p class="highlighted inline mw-collapsible-content"> speakers, and headphones,</p><p class="inline"> as well as heating/cooling systems such as</p><p class="highlighted inline mw-collapsible-content"> the thermostat, ceiling fan,</p><p class="inline"> carbon monoxide detector, smoke alarm, and lights. Home security IoT systems include alarms, smart locks, garage door openers, baby monitors, cameras, and home assistants. Home IoT appliances can include refrigerators, coffee makers, the oven, and the vacuum cleaner. External IoT objects can include connected smart cars, buses, trains, and airplanes. They also include wearables like fitness trackers and smartwatches, and healthcare devices like heart and blood pressure monitors.</p><p class="highlighted inline mw-collapsible-content"> Even pets can be connected via IoT with a tracking collar.</p><p class="inline"> By combining these connected devices with automated systems and Artificial Intelligence (AI), it is possible to gather new information, analyse it in real-time, and create an immediate action to help with a particular task, improve processes, or gain new insights.</p> | ||
− | <h2>Technology | + | <h2>Technology Brief</h2> |
<p>Internet of Things refers to the ever-growing network of physical objects that feature digital Internet connectivity. The IoT technology works via web-enabled smart devices that transmit information gathered from their surroundings using embedded sensors, software, and processors. The IoT extends Internet connectivity beyond traditional devices like desktops, laptops, smartphones and tablets to a more diverse range of devices, everyday objects and industrial devices that communicate via the Internet.</p> | <p>Internet of Things refers to the ever-growing network of physical objects that feature digital Internet connectivity. The IoT technology works via web-enabled smart devices that transmit information gathered from their surroundings using embedded sensors, software, and processors. The IoT extends Internet connectivity beyond traditional devices like desktops, laptops, smartphones and tablets to a more diverse range of devices, everyday objects and industrial devices that communicate via the Internet.</p> | ||
− | + | ||
− | <p class="highlighted inline mw-collapsible-content">First, sensors or devices collect data from their environment. Data is then sent to the cloud connected through a variety of methods including: cellular, satellite, WiFi, Bluetooth, Low-Power Wide-Area Networks (LPWAN), an IoT gateway, other edge devices, or by connecting directly to the internet via Local Area Networks (LANs) or Wide Area Networks (WANs).<ref>McClelland, C. (2017, November 20).<i>[https://medium.com/iotforall/iot-explained-how-does-an-iot-system-actually-work-e90e2c435fe7 IoT Explained — How Does an IoT System Actually Work?]</i> Retrieved from medium.com</ref></p><p class="inline"> | + | <p class="highlighted inline mw-collapsible-content">First, sensors or devices collect data from their environment. Data is then sent to the cloud connected through a variety of methods including: cellular, satellite, WiFi, Bluetooth, Low-Power Wide-Area Networks (LPWAN), an IoT gateway, other edge devices, or by connecting directly to the internet via Local Area Networks (LANs) or Wide Area Networks (WANs).<ref>McClelland, C. (2017, November 20).<i>[https://medium.com/iotforall/iot-explained-how-does-an-iot-system-actually-work-e90e2c435fe7 IoT Explained — How Does an IoT System Actually Work?]</i> Retrieved from medium.com</ref></p><p class="inline"> Some IoT devices have internal systems that are capable of processing and analyzing data at their local level, such that data sent to the cloud is not simply raw data. In other words: data processing can occur closer to the point of contact, at the edge of the network. Edge computing and processing has become a major component in IoT. This saves data-driven decision-making time by allowing the IoT device to act upon its own analysis, rather then sending large data volumes to a data centre’s analytic system and waiting for that system to signal an alert or make a decision. The connectivity, networking and communication protocols used with these web-enabled devices depend largely on the specific IoT applications deployed.</p> |
<p class="inline-spacer"></p> | <p class="inline-spacer"></p> | ||
<p class="inline">Once data gets to the cloud, analytic software processes it to enable decision making. This could be very simple, such as checking if a temperature reading is within an acceptable range, or very complex, such as using computer vision on IoT video to identify objects (such as prolonged unattended bags at airports).</p><p class="highlighted inline mw-collapsible-content"> This information is made useful to the end-user in some way, usually in near real-time with an alert (email, text, notification, etc), although many IoT reactions can be performed automatically via predefined rules set by the user.</p><p class="inline"> As such, most of the work is done by the IoT devices without human intervention, although users can interact with the devices through initial set-up, establishing pre-defined instructions, or by accessing data.</p> | <p class="inline">Once data gets to the cloud, analytic software processes it to enable decision making. This could be very simple, such as checking if a temperature reading is within an acceptable range, or very complex, such as using computer vision on IoT video to identify objects (such as prolonged unattended bags at airports).</p><p class="highlighted inline mw-collapsible-content"> This information is made useful to the end-user in some way, usually in near real-time with an alert (email, text, notification, etc), although many IoT reactions can be performed automatically via predefined rules set by the user.</p><p class="inline"> As such, most of the work is done by the IoT devices without human intervention, although users can interact with the devices through initial set-up, establishing pre-defined instructions, or by accessing data.</p> | ||
Line 89: | Line 89: | ||
<h2>Canadian Government Use</h2> | <h2>Canadian Government Use</h2> | ||
− | <p class="highlighted inline mw-collapsible-content">Internet of Things has the potential to transform the public sector by profoundly altering how government entities gather data and information by bringing together the major technical and business trends of mobility, automation, and data analytics.</p><p class="inline"> Although the Government of Canada (GC) has a large focus on introducing mobile applications to improve citizen interactions in obtaining GC data and services,<ref>Treasury Board of Canada. (2013, April 1).<i>[https://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=27088 Standard on Optimizing Websites and Applications for Mobile Devices].</i> Retrieved from tbs-sct.gc.ca</ref> | + | <p class="highlighted inline mw-collapsible-content">Internet of Things has the potential to transform the public sector by profoundly altering how government entities gather data and information by bringing together the major technical and business trends of mobility, automation, and data analytics.</p><p class="inline"> Although the Government of Canada (GC) has a large focus on introducing mobile applications to improve citizen interactions in obtaining GC data and services,<ref>Treasury Board of Canada. (2013, April 1).<i>[https://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=27088 Standard on Optimizing Websites and Applications for Mobile Devices].</i> Retrieved from tbs-sct.gc.ca</ref> the broad adoption and use of IoT in the GC is still in its infancy. The Treasury Board of Canada Secretariat (TBS) is developing<ref>Treasury Board of Canada. (2018, June). <i>[https://www.canada.ca/en/treasury-board-secretariat/services/information-technology/digital-policy-ideas-stage-what-we-heard-report.html Digital Policy: Ideas Stage - Report on What We Heard].</i> Retrieved from canada.ca</ref> an IoT guidance, overarching strategy, and policy direction. However, many departments, such as the Canada Border Services Agency (CBSA), have adopted IoT pilot programs without guidance in order to help solve their complex issues.</p> |
<p class="inline-spacer"></p> | <p class="inline-spacer"></p> | ||
− | <p class="highlighted inline mw-collapsible-content">Although the CBSA is not the only GC department leveraging IoT, it provides a clear use case.</p><p class="inline"> The CBSA delivers integrated border services that support national security and public safety priorities and facilitate the free flow of legitimate trade and travel.<ref>Mungham, T. (2019, April 19).<i>[https://iot613.ca/speaker/tony-mungham/ Integrating IoT to Bring Ideas To Life – Use Cases at CBSA].</i> Retrieved from iot613.ca</ref> | + | <p class="highlighted inline mw-collapsible-content">Although the CBSA is not the only GC department leveraging IoT, it provides a clear use case.</p><p class="inline"> The CBSA delivers integrated border services that support national security and public safety priorities and facilitate the free flow of legitimate trade and travel.<ref>Mungham, T. (2019, April 19).<i>[https://iot613.ca/speaker/tony-mungham/ Integrating IoT to Bring Ideas To Life – Use Cases at CBSA].</i> Retrieved from iot613.ca</ref> The IoT touches on many aspects of CBSA’s operational technology that range from standard desktop computers with document readers attached to audio/video surveillance systems, RFID systems, non-intrusive imaging systems (e.g. X-Rays), non-intrusive detection systems (e.g. radiation/drug detectors), face recognition systems, and mobile/wearable devices.</p><p class="highlighted inline mw-collapsible-content"> The CBSA uses IoT devices to sense, collect, analyse, and control situations, while also capturing vital information, providing deterministic automated responses, real-time alerts for officers, and data for trend analysis.</p> |
<p class="inline-spacer"></p> | <p class="inline-spacer"></p> | ||
<p class="highlighted mw-collapsible-content">Economic and political pressures have increased the expectation for all GC departments to respond to operational challenges, without significantly increasing the existing workforce or operational footprint. Using the IoT, the focus of GC operations shifts toward higher efficiencies and facilitating services.</p> | <p class="highlighted mw-collapsible-content">Economic and political pressures have increased the expectation for all GC departments to respond to operational challenges, without significantly increasing the existing workforce or operational footprint. Using the IoT, the focus of GC operations shifts toward higher efficiencies and facilitating services.</p> | ||
Line 102: | Line 102: | ||
<p>Deploying IoT devices and platforms offers a number of benefits to organizations such as: assisting in monitoring overall business processes; improving customer experience; saving time and money; enhancing cost-effectiveness; enhancing employee productivity; integrating and adapting business models; improving business decisions; and generating more revenue. The IoT can also assist in real-time and near-to-real-time visibility of the IT ecosystem and help in the pursuit of transforming traditional business to a data-driven business. The business impact of new data from IoT can help inform situational awareness, drive process improvements, and lead to overall better business decision making.</p> | <p>Deploying IoT devices and platforms offers a number of benefits to organizations such as: assisting in monitoring overall business processes; improving customer experience; saving time and money; enhancing cost-effectiveness; enhancing employee productivity; integrating and adapting business models; improving business decisions; and generating more revenue. The IoT can also assist in real-time and near-to-real-time visibility of the IT ecosystem and help in the pursuit of transforming traditional business to a data-driven business. The business impact of new data from IoT can help inform situational awareness, drive process improvements, and lead to overall better business decision making.</p> | ||
− | <p class="inline">In most cases, organizations leverage the IoT to assist in boosting their existing processes as well as improving optimization, and business models.</p><p class="highlighted inline mw-collapsible-content"> Organizations first use IoT to increase efficiency, reduce cost, or improve utilization rates. While this is beneficial, it largely keeps a business-as-usual culture.</p><p class="inline"> By | + | <p class="inline">In most cases, organizations leverage the IoT to assist in boosting their existing processes as well as improving optimization, and business models.</p><p class="highlighted inline mw-collapsible-content"> Organizations first use IoT to increase efficiency, reduce cost, or improve utilization rates. While this is beneficial, it largely keeps a business-as-usual culture.</p><p class="inline"> By contrast, leading organizations use IoT to fundamentally alter and enhance their business models based on the new data, analytics, and automation possibilities accrued from IoT. Here, the balance can shift from improving existing processes to transforming the business with entirely new models since almost all parts of the business processes become interconnected through the IoT.</p><p class="highlighted inline mw-collapsible-content"> In today’s integrated world, it is not enough to rely on business data from isolated business systems.</p> |
<p class="highlighted mw-collapsible-content">The IoT can assist in one of the GC’s most complex areas – asset monitoring and control. Managing assets across the country where distances are vast and device numbers are huge, lessening the burden of asset tracking, monitoring, and managing would be a great benefit. The GC has a tremendous amount of materiel and assets which must be managed in a financially responsible way.<ref>Department of Finance Canada. (2018, October 19).<i>[https://www.fin.gc.ca/afr-rfa/2018/report-rapport-eng.asp Annual Financial Report of the Government of Canada].</i> Retrieved from fin.gc.ca</ref> Assets and materiel must be managed by departments in a manner that supports the cost-effective and efficient delivery of government programs.<ref>Treasury Board of Canada. (2006, June 26).<i>[https://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=12062 Policy on Management of Materiel].</i> Retrieved from tbs-sct.gc.ca</ref></p> | <p class="highlighted mw-collapsible-content">The IoT can assist in one of the GC’s most complex areas – asset monitoring and control. Managing assets across the country where distances are vast and device numbers are huge, lessening the burden of asset tracking, monitoring, and managing would be a great benefit. The GC has a tremendous amount of materiel and assets which must be managed in a financially responsible way.<ref>Department of Finance Canada. (2018, October 19).<i>[https://www.fin.gc.ca/afr-rfa/2018/report-rapport-eng.asp Annual Financial Report of the Government of Canada].</i> Retrieved from fin.gc.ca</ref> Assets and materiel must be managed by departments in a manner that supports the cost-effective and efficient delivery of government programs.<ref>Treasury Board of Canada. (2006, June 26).<i>[https://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=12062 Policy on Management of Materiel].</i> Retrieved from tbs-sct.gc.ca</ref></p> | ||
Line 112: | Line 112: | ||
<p class="inline">Security is one of the biggest challenge facing IoT initiatives. The IoT connects billions of devices to the internet; these devices also represent billions of network end points, all of which need to be secured. Due to its expanded “attack surface”, IoT security and IoT privacy are cited as major concerns.</p><p class="highlighted inline mw-collapsible-content"> Hackers will target networks via IoT devices through their default usernames/passwords, which are usually admin/admin.</p><p class="inline"> Additionally, there is no single IoT industry standard for communication between IoT devices, although a number of competing groups have formed with the aim of designing the IoT standards of the future.</p><p class="highlighted inline mw-collapsible-content"> The IoT standard-less situation resembles the early days of mobile operating-systems.<ref>Mariani, J. (2017, February 14).<i>[https://www2.deloitte.com/insights/us/en/focus/internet-of-things/regulating-iot-technology-role-of-government.html Guiding the IoT to safety].</i> Retrieved from deloitte.com</ref> This lack of standards increases the complexity of managing network security. This poses significant risks to critical infrastructure, including electricity, transportation, and financial services as IoT devices are potential access points into these critical systems. Certification has emerged as a means to confirm IoT devices are secure, but there still remains no central standard.</p> | <p class="inline">Security is one of the biggest challenge facing IoT initiatives. The IoT connects billions of devices to the internet; these devices also represent billions of network end points, all of which need to be secured. Due to its expanded “attack surface”, IoT security and IoT privacy are cited as major concerns.</p><p class="highlighted inline mw-collapsible-content"> Hackers will target networks via IoT devices through their default usernames/passwords, which are usually admin/admin.</p><p class="inline"> Additionally, there is no single IoT industry standard for communication between IoT devices, although a number of competing groups have formed with the aim of designing the IoT standards of the future.</p><p class="highlighted inline mw-collapsible-content"> The IoT standard-less situation resembles the early days of mobile operating-systems.<ref>Mariani, J. (2017, February 14).<i>[https://www2.deloitte.com/insights/us/en/focus/internet-of-things/regulating-iot-technology-role-of-government.html Guiding the IoT to safety].</i> Retrieved from deloitte.com</ref> This lack of standards increases the complexity of managing network security. This poses significant risks to critical infrastructure, including electricity, transportation, and financial services as IoT devices are potential access points into these critical systems. Certification has emerged as a means to confirm IoT devices are secure, but there still remains no central standard.</p> | ||
<p class="inline-spacer"></p> | <p class="inline-spacer"></p> | ||
− | <p class="inline">In many cases, IoT devices lack the technical ability to apply security patches when vulnerabilities are discovered and as a result, exposed IoT devices can be used to carry out malicious activities.<ref>Communications Security Establishment. (2017, June).<i>[https://www.cse-cst.gc.ca/en/node/2097/html/27699#a4 Internet of Things - The Future is Now].</i> Retrieved from cse-cst.gc.ca</ref> In general, most IoT devices use proprietary software with weak encryption schemes and limited endpoint security to protect information. Many things connected to the internet also tend to send information about their use back to the manufacturer, which can be hacked by outside parties.<ref> | + | <p class="inline">In many cases, IoT devices lack the technical ability to apply security patches when vulnerabilities are discovered and as a result, exposed IoT devices can be used to carry out malicious activities.<ref>Communications Security Establishment. (2017, June).<i>[https://www.cse-cst.gc.ca/en/node/2097/html/27699#a4 Internet of Things - The Future is Now].</i> Retrieved from cse-cst.gc.ca</ref> In general, most IoT devices use proprietary software with weak encryption schemes and limited endpoint security to protect information. Many things connected to the internet also tend to send information about their use back to the manufacturer, which can be hacked by outside parties.<ref>Get Cyber Safe. (2017, September 1).<i>[https://www.getcybersafe.gc.ca/cnt/blg/pst-20170901-en.aspx How to #ConnectSmarter on the Internet of Things (IoT)].</i> Retrieved from getcybersafe.gc.ca</ref> Likewise, if manufacturers don't update their devices regularly, or at all, they leave their products vulnerable to cybercriminals.</p><p class="highlighted inline mw-collapsible-content"> In many cases, IoT devices lack the actual technical ability to apply security patches that are pushed by the manufacturer when vulnerabilities are discovered. As with any emerging technology, mitigations and streamlined patch solutions are not always available.</p> |
<p class="inline-spacer"></p> | <p class="inline-spacer"></p> | ||
<p class="inline">Privacy is another major concern for IoT users, including GC employees who may be required to input personal information on IoT devices in order to use them for work purposes. Connected devices often ask users to input their personal information, including names, ages, addresses, phone numbers, and even social media accounts – valuable privacy information for hackers. Public Service organizations may also expose employees to privacy risks by asking them to use these IoT devices, thereby increasing their digital footprint beyond what the employee would normally have done.</p><p class="highlighted inline mw-collapsible-content"> Lastly, even the companies that make and distribute consumer IoT devices could use those devices to obtain and sell users' personal data either legally through terms of use or illegally.</p> | <p class="inline">Privacy is another major concern for IoT users, including GC employees who may be required to input personal information on IoT devices in order to use them for work purposes. Connected devices often ask users to input their personal information, including names, ages, addresses, phone numbers, and even social media accounts – valuable privacy information for hackers. Public Service organizations may also expose employees to privacy risks by asking them to use these IoT devices, thereby increasing their digital footprint beyond what the employee would normally have done.</p><p class="highlighted inline mw-collapsible-content"> Lastly, even the companies that make and distribute consumer IoT devices could use those devices to obtain and sell users' personal data either legally through terms of use or illegally.</p> |
Latest revision as of 13:13, 16 July 2019
|
|||||||
---|---|---|---|---|---|---|---|
Status | Published | ||||||
Initial release | July 4, 2019 | ||||||
Latest version | July 4, 2019 | ||||||
Official publication | Internet of Things.pdf | ||||||
|
The Internet of Things is the system of interconnected computing devices via the Internet and with each other throughout the world. In this context, a thing refers to a mechanical or digital machine which may be attributed to a physical object or a person and that has a connection to the internet to collect and share data. Because of the low price of cheap processor and wireless communication, anything can be part of the Internet of Things. This adds digital intelligence to these devices and enables them to communicate real-time data without human interference.
Business Brief
The Internet of Things (IoT) market has grown tremendously over the past two decades.
In 2018, total global spending on smart devices and services is expected to reach $3.7 trillion alone.
The general prediction is that there will be 200 billion connected objects by 2020 (26 connected things per human being on earth). This is a great leap forward from the mere 2 billion IoT objects in 2006, and 15 billion in 2015.[1]
The term, Internet of Things (IoT), was allegedly first coined during a presentation entitled "Internet of Things" to Proctor & Gamble in 1999. However, the first IoT device, a Coke machine, already existed in the 1980s as a university project. Today, IoT is fast becoming a tangible technology that can be applied to collect information on just about anything that IT wants to measure and/or control.
There are a variety of ways in which IoT is defined.
In general, IoT refers to physical devices (also known as “connected” or “smart” devices) that connect to each other via the Internet. The ability to send and/or receive information makes objects or devices “smart”. These smart devices are a mixed network of industrial and everyday web-enabled objects that can be remotely controlled and monitored, and work via a variety of software, cameras, and sensors.[2] The IoT is the two-way connection between the physical and the digital, where a certain extent of control can be exerted.
The IoT evolved from machine-to-machine (M2M) communication. The M2M data is commonly used as a way to determine the health and status of things – inanimate or living. Taking M2M communication to the next level, IoT is a “sensor network” that can be composed of billions of smart devices that connect people, systems, and other applications to collect and share data.
The IoT’s systems and platforms enable physical objects and infrastructure to interact with monitoring, analytic and control systems over digital Internet-style networks.[3]
Many IT administrators use IoT systems for anything in their physical environment that they want to collect information about. The IoT describes a world where almost anything can be connected and can communicate in an intelligent fashion.
With IoT, the physical world is becoming an aggregated information system where everyday physical objects are connected to the internet and are able to identify themselves to other devices. This is significant because an object that can represent itself digitally becomes something greater than the object by itself. The object no longer relates just to its user, but is now connected to the surrounding environment
, objects, and to database data. When many objects act in unison, they are said to have “ambient intelligence”[4]
.
There are many types of IoT smart devices, and more emerge every day.
The IoT technology in the home can consist of entertainment systems, including televisions, gaming systems,
speakers, and headphones,
as well as heating/cooling systems such as
the thermostat, ceiling fan,
carbon monoxide detector, smoke alarm, and lights. Home security IoT systems include alarms, smart locks, garage door openers, baby monitors, cameras, and home assistants. Home IoT appliances can include refrigerators, coffee makers, the oven, and the vacuum cleaner. External IoT objects can include connected smart cars, buses, trains, and airplanes. They also include wearables like fitness trackers and smartwatches, and healthcare devices like heart and blood pressure monitors.
Even pets can be connected via IoT with a tracking collar.
By combining these connected devices with automated systems and Artificial Intelligence (AI), it is possible to gather new information, analyse it in real-time, and create an immediate action to help with a particular task, improve processes, or gain new insights.
Technology Brief
Internet of Things refers to the ever-growing network of physical objects that feature digital Internet connectivity. The IoT technology works via web-enabled smart devices that transmit information gathered from their surroundings using embedded sensors, software, and processors. The IoT extends Internet connectivity beyond traditional devices like desktops, laptops, smartphones and tablets to a more diverse range of devices, everyday objects and industrial devices that communicate via the Internet.
First, sensors or devices collect data from their environment. Data is then sent to the cloud connected through a variety of methods including: cellular, satellite, WiFi, Bluetooth, Low-Power Wide-Area Networks (LPWAN), an IoT gateway, other edge devices, or by connecting directly to the internet via Local Area Networks (LANs) or Wide Area Networks (WANs).[5]
Some IoT devices have internal systems that are capable of processing and analyzing data at their local level, such that data sent to the cloud is not simply raw data. In other words: data processing can occur closer to the point of contact, at the edge of the network. Edge computing and processing has become a major component in IoT. This saves data-driven decision-making time by allowing the IoT device to act upon its own analysis, rather then sending large data volumes to a data centre’s analytic system and waiting for that system to signal an alert or make a decision. The connectivity, networking and communication protocols used with these web-enabled devices depend largely on the specific IoT applications deployed.
Once data gets to the cloud, analytic software processes it to enable decision making. This could be very simple, such as checking if a temperature reading is within an acceptable range, or very complex, such as using computer vision on IoT video to identify objects (such as prolonged unattended bags at airports).
This information is made useful to the end-user in some way, usually in near real-time with an alert (email, text, notification, etc), although many IoT reactions can be performed automatically via predefined rules set by the user.
As such, most of the work is done by the IoT devices without human intervention, although users can interact with the devices through initial set-up, establishing pre-defined instructions, or by accessing data.
The Operating Systems (OS) that run IoT devices are usually lightweight systems, which manage the device hardware and software resources. These OSs provide common services and APIs for IoT connectivity, management, security, computing, and analytics. This has the effect of boosting battery life depending on device and software efficiency. Additionally, IoT platforms connect to and manage multiple and diverse smart devices and infrastructure in order to integrate and control operational data into business and customer processes. These platforms are comprehensive Platform as a Service (PaaS) and are used for the rapid design, development, and deployment of the largest-scale big data, predictive analytics, AI, and IoT applications for any business value chain. These platforms may include Identity and Access Management (IAM) to manage the identity life cycle, governance, and authentication of IoT devices on the network.
The IoT platforms monitor and manage the IoT devices, including the management of security patching and on-boarding of new IoT products. The IoT platforms are required in order to ensure patching is rigorously tested and deployed with a robust set of checks in place to confirm that IoT devices have been properly updated.
Industry Use
The Fourth Industrial Revolution (Industry 4.0), is the fourth major industrial era since the Industrial Revolution began in the 18th century. It is characterized by technology that blurs the line between physical and digital (cyber-physical systems).
The IoT, an important part of digital infrastructure, has emerged within Industry 4.0 as one of the fundamental technologies helping to create the “factory of the future”. Industry 4.0 transforms the traditional production system into the new model called “Industrial Internet of Things” (IIoT). The IIoT involves accessing real-time data that allows manufacturing partners and their machines to share information accurately and quickly. The goal of Industry 4.0 is to achieve low-cost production efficiencies and create more reliable operations by leveraging IoT and automation. In this new IIoT paradigm, supply chain and material handling processes become integrated across the company, producing “lean manufacturing”.
In the oil and gas sector, oil companies spend substantial amounts on procuring and operating special-purpose oil drilling machinery. Smart sensors attached to oil rigs and the related equipment can continuously monitor and recommend preventative maintenance, enabling significant reductions in operating costs.
There are numerous other industry applications of the IoT.
Smart sensors in homes can carry out real-time pollution or pollen counts for asthma sufferers, consumers can be notified of lower operational costs via alerts on the optimum usage of dryer/washing machines, and control of heating/cooling and lighting can be optimized to suit the users needs. Wearable IoT devices, such as the Apple Watch or Samsung’s Galaxy Watch, have sensors and software that collect and analyze user data, sending messages to other technologies about the user with the aim of making users' life easier.
Smart devices can monitor various bodily activities and metrics to enhance safety and maintain health. Certain devices can track people’s activity levels and help change their behaviours to improve well-being.
Medical sensors, for example, can support overall health by monitoring blood sugar levels and dispensing insulin when necessary.
New insights are gained as a result of analysis conducted on new and greater volumes of data that are collected via the IoT.
In healthcare, IoT offers many benefits, including the ability to monitor patient health more closely and to use the data that's generated for real-time and historical analysis. Hospitals often use IoT systems to complete tasks such as inventory management for both pharmaceuticals and medical instruments. In agriculture, IoT-based smart farming systems can help monitor, for instance, light, temperature, humidity and soil moisture of crop fields using connected sensors and IoT is instrumental in automating irrigation systems.
The IoT can also make public transportation more efficient and safer
, as well as offer a more pleasant ride to commuters and provide cities with financial savings. Connected trains display arrival and departure times so passengers can plan accordingly
. Individuals can look at their smartphones to know the exact time to leave their houses to catch a train or the bus. In smart cities, the public transportation options are connected to buildings as well, so transport managers can provide more buses and trains after a sporting game or concert when there are more people in one area of the city.
City managers can send public service announcements to connected individuals around the city who can then heed warnings or take action as necessary. New IoT features such as touchscreens in these locations can help riders find directions, check the weather and view real-time arrival and departure times.
Canadian Government Use
Internet of Things has the potential to transform the public sector by profoundly altering how government entities gather data and information by bringing together the major technical and business trends of mobility, automation, and data analytics.
Although the Government of Canada (GC) has a large focus on introducing mobile applications to improve citizen interactions in obtaining GC data and services,[6] the broad adoption and use of IoT in the GC is still in its infancy. The Treasury Board of Canada Secretariat (TBS) is developing[7] an IoT guidance, overarching strategy, and policy direction. However, many departments, such as the Canada Border Services Agency (CBSA), have adopted IoT pilot programs without guidance in order to help solve their complex issues.
Although the CBSA is not the only GC department leveraging IoT, it provides a clear use case.
The CBSA delivers integrated border services that support national security and public safety priorities and facilitate the free flow of legitimate trade and travel.[8] The IoT touches on many aspects of CBSA’s operational technology that range from standard desktop computers with document readers attached to audio/video surveillance systems, RFID systems, non-intrusive imaging systems (e.g. X-Rays), non-intrusive detection systems (e.g. radiation/drug detectors), face recognition systems, and mobile/wearable devices.
The CBSA uses IoT devices to sense, collect, analyse, and control situations, while also capturing vital information, providing deterministic automated responses, real-time alerts for officers, and data for trend analysis.
Economic and political pressures have increased the expectation for all GC departments to respond to operational challenges, without significantly increasing the existing workforce or operational footprint. Using the IoT, the focus of GC operations shifts toward higher efficiencies and facilitating services.
Implications for Government Agencies
Value Proposition
Deploying IoT devices and platforms offers a number of benefits to organizations such as: assisting in monitoring overall business processes; improving customer experience; saving time and money; enhancing cost-effectiveness; enhancing employee productivity; integrating and adapting business models; improving business decisions; and generating more revenue. The IoT can also assist in real-time and near-to-real-time visibility of the IT ecosystem and help in the pursuit of transforming traditional business to a data-driven business. The business impact of new data from IoT can help inform situational awareness, drive process improvements, and lead to overall better business decision making.
In most cases, organizations leverage the IoT to assist in boosting their existing processes as well as improving optimization, and business models.
Organizations first use IoT to increase efficiency, reduce cost, or improve utilization rates. While this is beneficial, it largely keeps a business-as-usual culture.
By contrast, leading organizations use IoT to fundamentally alter and enhance their business models based on the new data, analytics, and automation possibilities accrued from IoT. Here, the balance can shift from improving existing processes to transforming the business with entirely new models since almost all parts of the business processes become interconnected through the IoT.
In today’s integrated world, it is not enough to rely on business data from isolated business systems.
The IoT can assist in one of the GC’s most complex areas – asset monitoring and control. Managing assets across the country where distances are vast and device numbers are huge, lessening the burden of asset tracking, monitoring, and managing would be a great benefit. The GC has a tremendous amount of materiel and assets which must be managed in a financially responsible way.[9] Assets and materiel must be managed by departments in a manner that supports the cost-effective and efficient delivery of government programs.[10]
Challenges
There are many challenges SSC will face in the development and deployment of IoT devices and platforms. Most notable is the large amount of time, guidance, effort, resources, and funding required for establishing and maintaining a robust GC IoT program
that also has a high level of interoperability
. Additional planning will be needed for SSC’s infrastructure to accommodate increased IoT data traffic and data processing.
Security is one of the biggest challenge facing IoT initiatives. The IoT connects billions of devices to the internet; these devices also represent billions of network end points, all of which need to be secured. Due to its expanded “attack surface”, IoT security and IoT privacy are cited as major concerns.
Hackers will target networks via IoT devices through their default usernames/passwords, which are usually admin/admin.
Additionally, there is no single IoT industry standard for communication between IoT devices, although a number of competing groups have formed with the aim of designing the IoT standards of the future.
The IoT standard-less situation resembles the early days of mobile operating-systems.[11] This lack of standards increases the complexity of managing network security. This poses significant risks to critical infrastructure, including electricity, transportation, and financial services as IoT devices are potential access points into these critical systems. Certification has emerged as a means to confirm IoT devices are secure, but there still remains no central standard.
In many cases, IoT devices lack the technical ability to apply security patches when vulnerabilities are discovered and as a result, exposed IoT devices can be used to carry out malicious activities.[12] In general, most IoT devices use proprietary software with weak encryption schemes and limited endpoint security to protect information. Many things connected to the internet also tend to send information about their use back to the manufacturer, which can be hacked by outside parties.[13] Likewise, if manufacturers don't update their devices regularly, or at all, they leave their products vulnerable to cybercriminals.
In many cases, IoT devices lack the actual technical ability to apply security patches that are pushed by the manufacturer when vulnerabilities are discovered. As with any emerging technology, mitigations and streamlined patch solutions are not always available.
Privacy is another major concern for IoT users, including GC employees who may be required to input personal information on IoT devices in order to use them for work purposes. Connected devices often ask users to input their personal information, including names, ages, addresses, phone numbers, and even social media accounts – valuable privacy information for hackers. Public Service organizations may also expose employees to privacy risks by asking them to use these IoT devices, thereby increasing their digital footprint beyond what the employee would normally have done.
Lastly, even the companies that make and distribute consumer IoT devices could use those devices to obtain and sell users' personal data either legally through terms of use or illegally.
Implementing an IoT project with real-time analytics is a complex undertaking. For most organizations, the technological logistics to interconnect IoT devices and the increased levels of data traffic are unprecedented. Even consumers who have purchased one of the myriad smart home products – from lightbulbs, switches, to motion sensors – will attest to the fact that IoT is in its infancy, where products and devices do not always easily connect to or work with each other.
In order for IoT to work in data centers and platforms from competing vendors, the devices need to be able to communicate with one another. Focusing on organizations, project managers who wish to use IoT tools may find that their IT departments simply cannot provide the ability to connect all the IoT devices or the back-end IT infrastructure needed to collect, store, and analyze the new streams of data.
Data privacy and integration is always more costly and more difficult to implement than organizations originally estimate.
Considerations
A strategic policy approach to IoT investments will need to be developed to ensure that the IoT opportunities are properly leveraged. The GC invests a significant portion of its annual budget on IT and supporting infrastructure. Without strategic IoT direction, the fragmented approaches to IT investments, coupled with rapid developing technology and disjointed business practices, can undermine effective and efficient delivery of GC programs and services.[14]
A clear vision and mandate for how IoT will transform services and what the end-state IoT initiative is supposed to look like is a prominent consideration. In fact, most IoT considerations will need to be made on the non-technical side. Questions such as why a particular IoT solution is needed, what business requirements it will solve, how clients will use the IoT service from SSC, what the IoT service should look like from a client’s perspective etc., should all be taken into account first. Often the organizational cost of deploying and integrating IoT is higher than expected with regard to funding, time, and resource expertise.
Considerable IoT needs and requirements come from the operational level of an organization. This includes managers and/or operators who require additional visibility on their operations or devices, for example asset handlers, transportation managers, database managers, project managers, etc. Usually, IoT projects are enacted for small focussed problems by these lower organizational personnel. Due to little to no upper management strategy and guidance, these projects often do not notify or even involve IT in the process. This often leads to quick but siloed implementations where old off-the-shelf IoT tech is used, which frequently fails or is not operational. Thinking strategically may not be part of lower operational personnel’s job requirements. Many of these personnel are attempting to solve a small isolated problem they have without much thought for how an IoT solution could help the rest of the organization, making senior management strategic policy and direction so crucial to consider for IoT investments.
Additionally, strategic guidance will need to be considered regarding the analytic capabilities required for IoT deployments. Considerations for how much data traffic can be accommodated by the network and data centres, as well as what type of data and information should or should not be collected, will need attention.
Enterprises like SSC should be cognisant of not flooding their ability to conduct business with massive amounts of data without properly planning for its analysis, simply due to a fear-of-missing-out. An IoT device on its own does not understand what is happening around it, meaning that IoT devices and near-to-real-time analytics constitute a package that go hand in hand. Organizations will often deploy IoT for a specific purpose in silos but fail to handle the new influx of data or fail to connect these devices with other systems for aggregate analysis.
To add value, organizations should consider the Analytics of Things (AoT)[15] before creating sensors that stream enormous amounts of data to databases from the devices. This also means that decisions will need to be made on how much local processing the IoT device does, including what data to keep, what data to abbreviate or discard, what data to segment off and send immediately as an alert, and what data to simply log on local storage that can be later retrieved manually by personnel and transferred to databases for review. There are specific data transmission needs due to privacy retrictions or national security, where the data classification may not allow the information to be transferred over the network and instead require a physical pick-up for data transfer.
Additionally, there is a significant consideration to be made on whether real-time visibility and analytics is a business requirement or if near-to-real-time is adequate. In the vast number of business cases, real-time visibility is almost never needed for business operations. Near-to-real-time is sufficient for the vast majority of business processes, however, senior executives will need to consider the policy when deciding what processes will actually require real-time analytics.
Although security has been flagged as an issue, most of the IoT security issues can be resolved by banning the use of default device passwords of any device that comes onto the network. Banning default password and setting the IT requirements for any device that connects to the network will be a paramount project for SSC to consider in the future. In this way, the diverse nature of IoT services can be better managed based on the requirements set out by SSC. Shared Services will need to remain open to many different IoT solutions, however, it may want to consider how particular it will be concerning the low-level requirements of devices and software implemented on the network.
Shared Services will need to consider how to ensure it is an agile and flexible IT service provider as it pursues IoT deployments. This will be vital since the value, impact, and success of IoT initiatives can vary greatly from one organization to the next. Many enterprises have launched pilot projects to develop IoT-enabled products and services or have used the IoT to achieve operational improvements. Of these, less than 30 percent have taken their IoT programs beyond the pilot phase.[16] Even among companies with large-scale IoT efforts, a significant gap separates the top tier of performers from the bottom tier.
The continued support and use of Open Standards, Open Source, and standard APIs may need to be considered as a means to maintain SSC as an agile and flexible organization. No single IoT platform will be able to meet all the diverse technical and business requirements of IoT devices and business processes. Using Open Source and Open Standards may be needed in order to accommodate diverse devices and software.
Lastly, SSC may wish to consider evaluating the current Service Catalogue in order to determine where IoT can be leveraged to improve efficiencies, reduce costs, and reduce administrative burdens of existing services as well as how a new IoT service could be delivered on a consistent basis. Any new procurements of devices or platforms should have high market value and can be on-boarded easily onto the GC network.
References
- ↑ Intel. (2019, January 18). A Guide to the Internet of things. Retrieved from intel.ca
- ↑ Canadian Centre for Cyber Security. (2019). Glossary. Retrieved from cyber.gc.ca
- ↑ Forrester. (2018). Glossary. Retrieved from forrester.com
- ↑ Emery, C. (2016, June 24). The Awakening of Ambient Intelligence. Retrieved from Techopedia.com
- ↑ McClelland, C. (2017, November 20).IoT Explained — How Does an IoT System Actually Work? Retrieved from medium.com
- ↑ Treasury Board of Canada. (2013, April 1).Standard on Optimizing Websites and Applications for Mobile Devices. Retrieved from tbs-sct.gc.ca
- ↑ Treasury Board of Canada. (2018, June). Digital Policy: Ideas Stage - Report on What We Heard. Retrieved from canada.ca
- ↑ Mungham, T. (2019, April 19).Integrating IoT to Bring Ideas To Life – Use Cases at CBSA. Retrieved from iot613.ca
- ↑ Department of Finance Canada. (2018, October 19).Annual Financial Report of the Government of Canada. Retrieved from fin.gc.ca
- ↑ Treasury Board of Canada. (2006, June 26).Policy on Management of Materiel. Retrieved from tbs-sct.gc.ca
- ↑ Mariani, J. (2017, February 14).Guiding the IoT to safety. Retrieved from deloitte.com
- ↑ Communications Security Establishment. (2017, June).Internet of Things - The Future is Now. Retrieved from cse-cst.gc.ca
- ↑ Get Cyber Safe. (2017, September 1).How to #ConnectSmarter on the Internet of Things (IoT). Retrieved from getcybersafe.gc.ca
- ↑ Government of Canada. (2018, December 3).Directive on Management of Information Technology. Retrieved from tbs-sct.gc.ca
- ↑ Pal, K. (2016, August 11).Analytics Of Things: Taking IoT to the Next Level. Retrieved from techopedia.com
- ↑ Chui, M., May, B., Narayanan, S., & Shah, R. (2019, January).What separates leaders from laggards in the Internet of Things. Retrieved from mckinsey.com