IOT-EMTECH
Data swapping and Laplace noise techniques modify a subset of the data by introducing uncertainty about its value.
Noise addition techniques
main reason for sleep associated respiration disorder
Obstructive sleep apnea (OSA)
according to ______, IoT is the interaction of everyday object's computing devices through the internet that enables the sending and receiving of useful data
Oxford dictionary
helps users to identify the real-time availability of parking spaces on their phone
Parking Sensors
Measure sleep degrees or the sleeping position
Pressure sensor
Challenges of IoT in healthcare
-89% have suffered an IoT- related security breach -49% malware -39% Human Error -22% DDos
Challenges in IoT
-Insufficient testing and updating -concern regarding data security and privacy -software complexity - data volumes and interpretation
Challenges in IoT
-Integration with AI and Automation -Devices require a constant power supply which is difficult -Interaction and short-range communication
Benefits of IoT in healthcare
-Reduced expenses -Time-saving -Personal Care for patients -Monitoring health condition -medicine notification -Improved healthcare devices
Disadvantages of IoT
-Security -privacy -flexibility -complexity -compliance
Advantages of IoT
-Technical Optimization -Improved Data Collection -Reduced Waste -Improved Customer Engagement
results according to several facets.
-data life cycle -privacy preserving techniques -ISO privacy principles
Benefits of IoT in agriculture
-data that works for you -control over the risks -automation and efficiency -better product's quality
Risks IoT can bring
-privacy of patients -Accidental failures -Malware -Lack of encryption
the actual idea of connected devices was proposed in
1970
The term Internet of Things was invented in______ to promote RFID Technology
1999
The term was mentioned in famous publications like the Guardian, Boston Globe, and Scientific American
2004
UN's International Telecommunications Union (ITU) published its first report on this topic.
2005
- The Internet of Things was born
2008
IoT did not accelerate until ___________ and reached mass market in early 2014
2010/2011
Gartner, the market research company, include "The Internet of Things" Technology in their research
2011
theme of Europe's biggest internet conference LeWeb was the "Internet of Things"
2012
The term Internet of Things reached mass market awareness when in January 2014 Google announced to buy Nest for $3.2bn. At the same time the Consumer Electronics Show (CES) in Las Vegas was held under the theme of IoT.
2014
These techniques are effective for ensuring data sharing. Data owners can express their individual preferences about who can access to what data and how others manipulate their shared data
Access control
Helps you to capture heart rate pattern, calorie expenditure, activity levels, and skin temperature on your wrist.
Activity trackers
These techniques hide a data owner's identity by removing any explicit identifier and makes the data less precise. The most commonly used is k-anonymity, l-diversity and t-closeness.
Anonymization protection techniques
Brain of the system which contains all the program created.
Arduino UNO
Create beep sounds depending on the set time.
Buzzer
the concept of connected health care system facilities real-time health monitoring and patient care. It helps in improved medical decision-making based on patient data.
Connect health
IoT helps automobile companies handle billing, parking, insurance, and other related stuff automatically
Connected cars
all the collected data is sent to a cloud infrastructure
Connectivity
These techniques are heavily used when preserving the privacy of distributed entities. They can be categorized into three major groups: secure multiparty computation, asymmetric/symmetric encryption, and public key infrastructure.
Cryptographic protection
These techniques are a series of operations that modify or hide some sensitive parts on the original data to preserve privacy.
Data Perturbation Techniques
These techniques aim at limiting data use by blocking access or encrypting inputs.
Data restriction techniques
There is a huge concern regarding the flexibility of an IoT system. It is mainly regarding integrating with another system as there are many diverse systems involved in the process.
Flexibility
M2M as well as the industrial internet are not opposing concepts to IoT. In fact both are a subset of the internet of things with a narrower reach
Further Observations
according to the _______ ,IoT is a framework of all things that have a representation in the presence of the internet in such a way that new applications and services enable the interaction in the physical and virtual world
IEEE communications
IoT facilitates immediate action on data
Improved Data Collection
allows you to improve customer experience by detecting problems and improving the process
Improved customer Engagement
this term was strongly pushed by GE, it goes beyond M2M since it not only connections between machines but also includes human interfaces
Industrial Internet (of Things)
describes a set of concepts to drive the next industrial revolution. That includes all kinds of connectivity concepts in the industrial context.
Industry 4.0
connects only people
Internet
according to the _______________ definition, ______ is the networking of smart objects meaning a huge number of devices intelligently communicating in the presence of internet protocol.
Internet Architecture Board (IAB), Internet Of Things
according to ________, smart objects in IoT have some constraints such as limited bandwidth, power, and processing accessibility.
Internet Engineering Task Force (IETF)
Sensors and actuators embedded in physical objects are linked through wired and wireless networks, often using the same Internet Protocol (IP) that connects the Internet.
Internet Of Things
aims to include all sorts of connection that one can envision. The concept has thus the highest reach
Internet of Everything
Transmit information inside the network.
Internet of Things
transmit information from the sensors and display in internet application
Internet of Things (IoT)
includes connections beyond the industrial context such as wearable devices on people
IoT
he created a toaster which could be turned on/off over the internet in 1990
John Romkey
"Internet of Things" was coined by
Kevin Ashton, 1999 during his work at procter&Gamble
Displays the respiration rate and sleeping time.
LCD or Liquid Crystal Display
has been in use for more than a decade, and is well-known in the Telecoms sector.
M2M or Machine to Machine
r reports on a systematic literature review of privacy preserving solutions used in Cooperative Information Systems (CIS) in the IoT field.
Privacy-Aware in the IoT Applications: A Systematic Literature Review
Enables the use of a RTC and calendar.
RTC or Real-time clock
offers real-time information leading to effective decision making & management of resources
Reduced waste
Determine respiration rate. If the breathing level increases, it'll be displayed on LCD.
Respiratory mic sensor
IoT technology creates an ecosystem of connected devices. However, during this process, the system may offer little authentication control despite sufficient security measures.
Security
Four fundamental components of IoT System
Sensors/Devices Connectivity Data Processing User Interface
introduced the first cellular module built for M2M in 1995
Siemens
offers all types of use cases which include traffic management to water distribution, waste management, etc.
Smart city
Encapsulates the connectivity inside your homes. it includes smoke detectors, home appliances, light bulbs, windows, door locks, etc
Smart home
Integrated with pressure sensor and IoT functions for sleep apnea detection
Smart mattress
Remotely turn any device on or off. It also allows you to track a device's energy level and get custom notifications directly into your smartphone
Smart outlets
helps in real-time tracking of goods while they are on the road, or getting suppliers to exchange inventory information
Smart supply chain
save resource on heating bills by knowing your usage patterns
Smart thermostats
IoT applications
Smart thermostats Connected cars Activity trackers Smart Outlets Parking Sensors
collect data from various car sensors. The manufacturer analyzes them to improve its design and make them more efficient
Technical Optimization
needs to available to the end user in some way which can be achieved by triggering alarms on their phones or sending them notification through email or text message
User Interface
much narrower in scope as the other concepts as it solely focuses on software architecture
Web of Things
IoT has its own set of rules and regulations. However, because of its complexity, the task of compliance is quite challenging.
compliance
The design of the IoT system is also quite complicated. Moreover, it's deployment and maintenance also not very easy.
complicated
once that data is collected, and it gets to the cloud, the software performs processing on the gathered data.
data processing
Three positions of pressure sensors were used to analyze the body condition.
left,right,center
how to detect sleep apnea
pressure sensors Respiration Microphone sensors
The use of IoT, exposes a substantial amount of personal data, in extreme detail, without the user's active participation. This creates lots of privacy issues
privacy
helps collect live data from the surrounding environment
sensors/devices
affects a person's common health and quality of life
sleep-disordered respiration