Internet Of Things – Industrial Robots And Virtual Monitoring

Internet Of Things – Industrial Robots And Virtual Monitoring

Internet Of Things – Industrial Robots And Virtual Monitoring

One of the hottest topics in Information and Communication Technology (ICT) is the Internet of Things (IOT). According to the report of International Telecommunication Union (2012), “the Internet of things can be perceived as a vision with technological and societal implications. It is considered as a global infrastructure for the information society, enabling advanced services by interconnecting (physical and virtual) things based on existing and evolving interoperable information and communication technologies”. Based on this definition, IOT refers to networkable things. Things can be Physical things which exist in the physical world (e.g. sensors of surrounding environments, industrial robots, goods, and electrical equipment), or Virtual things which exist in the information world (e.g. multimedia contents, application software and service representations of physical things). They are able to be integrated into communication networks and can offer services to various kinds of applications such as intelligent transportation systems, e-health, and smart environmental monitoring.

According to Lee et al. (2013), the Internet of things will include: “ubiquitous connectivity allowing for whenever, whoever, wherever, and whatever types of communications; a pervasive reality for effective interfaces to provide connectable real world environments; and ambient intelligence allowing for innovative communications and providing increased value creation”. The vision of the IOT suggests that devices can communicate with other devices through a worldwide network with or without the involvement of human. Humans can also communicate with a device in order to get or transfer specific information. In this way, everything from individuals, groups, communities, objects, products, data, services, and processes will be connected by the IOT. It is estimated that approximately 50 billion things will be connected to each other through the communication network by 2020. A massive set of data will be created. It would seem that management of the data generated and its interpretation for application purposes are important issues that should be considered.

Connected Communities

The IOT will create new services based on real-time physical world data and will transform businesses, industries, and the daily life of people. Smart cities (connected communities), smart planet (green environment), smart building (building, smart homes), smart industry (industrial environment), smart energy (electric grid), smart transport (intelligent transport system), smart living (entertainment, leisure), smart health (health care system) are examples of the Internet of things.

The major characteristics of the IOT are: interconnectivity of physical and virtual things; ability of providing thing-related services within the constraints of things; heterogeneity of IOT devices; dynamic changes of devices, and enormous scale. Various technologies such as M2M, microcontrollers, wireless communication, RFID, energy harvesting technologies, location technology, and various software will contribute to the development of the IOT.

Many scholars believe that security, privacy, and trust are important issues and should be considered as fundamental design parameters of sensor systems. In a world where everything is connected by the internet, confidentiality, authenticity, and integrity of data and services are critical particularly for public services, enterprises, and citizens. Furthermore, privacy protection of data during transmission, aggregation, storage, mining and processing is important. Therefore, dynamic trust models need to be designed to provide security and privacy features.

(Image Source: Shutterstock)

By Mojgan Afshari

About Mojgan Afshari

Mojgan Afshari is a senior lecturer in the Department of Educational Management, Planning and Policy at the University of Malaya. She earned a Bachelor of Science in Industrial Applied Chemistry from Tehran, Iran. Then, she completed her Master’s degree in Educational Administration. After living in Malaysia for a few years, she pursued her PhD in Educational Administration with a focus on ICT use in education from the University Putra Malaysia.She currently teaches courses in managing change and creativity and statistics in education at the graduate level. Her research areas include teaching and learning with ICT, school technology leadership, Educational leadership, and creativity. She is a member of several professional associations and editor of the Journal of Education. She has written or co-authored articles in the following journals: Journal of Technology, Pedagogy and Education, The Turkish Online Journal of Educational Technology, International Journal of Education and Information Technologies, International Journal of Instruction, International Journal of Learning, European Journal of Social Sciences, Asia Pacific Journal of Cancer Prevention, Life Science Journal, Australian Journal of Basic and Applied Sciences, Scientific Research and Essays.

View All Articles

Sorry, comments are closed for this post.

Comics
Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

Using Cloud Technology In The Education Industry

Using Cloud Technology In The Education Industry

Education Tech and the Cloud Arguably one of society’s most important functions, teaching can still seem antiquated at times. Many schools still function similarly to how they did five or 10 years ago, which is surprising considering the amount of technical innovation we’ve seen in the past decade. Education is an industry ripe for innovation…

2017 Brings DLP Technology and IoT’s Weaknesses to Light

2017 Brings DLP Technology and IoT’s Weaknesses to Light

DLP Technology In regards to data loss prevention (DLP), in the last five years many companies rushed to implement DLP solutions without taking the time to first identify the data that should not transit egress points. Most of these rushed implementations have not been successful. Security analysts, in particular 451 Research, have been recommending that…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…