Internet Of Things – Industrial Robots And Virtual Monitoring

Internet Of Things – Industrial Robots And Virtual Monitoring

Internet Of Things – Industrial Robots And Virtual Monitoring

One of the hottest topics in Information and Communication Technology (ICT) is the Internet of Things (IOT). According to the report of International Telecommunication Union (2012), “the Internet of things can be perceived as a vision with technological and societal implications. It is considered as a global infrastructure for the information society, enabling advanced services by interconnecting (physical and virtual) things based on existing and evolving interoperable information and communication technologies”. Based on this definition, IOT refers to networkable things. Things can be Physical things which exist in the physical world (e.g. sensors of surrounding environments, industrial robots, goods, and electrical equipment), or Virtual things which exist in the information world (e.g. multimedia contents, application software and service representations of physical things). They are able to be integrated into communication networks and can offer services to various kinds of applications such as intelligent transportation systems, e-health, and smart environmental monitoring.

According to Lee et al. (2013), the Internet of things will include: “ubiquitous connectivity allowing for whenever, whoever, wherever, and whatever types of communications; a pervasive reality for effective interfaces to provide connectable real world environments; and ambient intelligence allowing for innovative communications and providing increased value creation”. The vision of the IOT suggests that devices can communicate with other devices through a worldwide network with or without the involvement of human. Humans can also communicate with a device in order to get or transfer specific information. In this way, everything from individuals, groups, communities, objects, products, data, services, and processes will be connected by the IOT. It is estimated that approximately 50 billion things will be connected to each other through the communication network by 2020. A massive set of data will be created. It would seem that management of the data generated and its interpretation for application purposes are important issues that should be considered.

Connected Communities

The IOT will create new services based on real-time physical world data and will transform businesses, industries, and the daily life of people. Smart cities (connected communities), smart planet (green environment), smart building (building, smart homes), smart industry (industrial environment), smart energy (electric grid), smart transport (intelligent transport system), smart living (entertainment, leisure), smart health (health care system) are examples of the Internet of things.

The major characteristics of the IOT are: interconnectivity of physical and virtual things; ability of providing thing-related services within the constraints of things; heterogeneity of IOT devices; dynamic changes of devices, and enormous scale. Various technologies such as M2M, microcontrollers, wireless communication, RFID, energy harvesting technologies, location technology, and various software will contribute to the development of the IOT.

Many scholars believe that security, privacy, and trust are important issues and should be considered as fundamental design parameters of sensor systems. In a world where everything is connected by the internet, confidentiality, authenticity, and integrity of data and services are critical particularly for public services, enterprises, and citizens. Furthermore, privacy protection of data during transmission, aggregation, storage, mining and processing is important. Therefore, dynamic trust models need to be designed to provide security and privacy features.

(Image Source: Shutterstock)

By Mojgan Afshari

About Mojgan Afshari

Mojgan Afshari is a senior lecturer in the Department of Educational Management, Planning and Policy at the University of Malaya. She earned a Bachelor of Science in Industrial Applied Chemistry from Tehran, Iran. Then, she completed her Master’s degree in Educational Administration. After living in Malaysia for a few years, she pursued her PhD in Educational Administration with a focus on ICT use in education from the University Putra Malaysia.She currently teaches courses in managing change and creativity and statistics in education at the graduate level. Her research areas include teaching and learning with ICT, school technology leadership, Educational leadership, and creativity. She is a member of several professional associations and editor of the Journal of Education. She has written or co-authored articles in the following journals: Journal of Technology, Pedagogy and Education, The Turkish Online Journal of Educational Technology, International Journal of Education and Information Technologies, International Journal of Instruction, International Journal of Learning, European Journal of Social Sciences, Asia Pacific Journal of Cancer Prevention, Life Science Journal, Australian Journal of Basic and Applied Sciences, Scientific Research and Essays.

View All Articles

Sorry, comments are closed for this post.

Are You Sure You Are Ready For The Cloud: Type of Cloud

Are You Sure You Are Ready For The Cloud: Type of Cloud

Type of Cloud Continuing this theme on “Are you ready for the Cloud”, we are going to move forward with a new question: What type a cloud? That can be encompassed with many different connotations. It could mean it’s going to be hosted by a provider, or is it going to be an on-prem cloud?…

Encrypting Your Cloud Data For Extra Protection

Encrypting Your Cloud Data For Extra Protection

Encrypting Your Cloud Data Encrypting data is one of the best ways of protecting your data as it moves to the cloud. The only thing better than encrypting your data, is not storing your data at all. Let’s first look at the case of using file sharing applications such as Dropbox. If you are the…

The Implication Of Consumers Not Having Their Heads In The Cloud

The Implication Of Consumers Not Having Their Heads In The Cloud

Customers CAN Better Protect Themselves The majority of cloud consumers don’t understand what cloud is let alone what the implications of transacting in the cloud or of having their data and digital assets stored in the cloud. As a result most consumers are their own worst enemy when it comes to putting themselves at risk…

How IRM Makes Cloud-Based File Collaboration “Security-Aware”

How IRM Makes Cloud-Based File Collaboration “Security-Aware”

IRM Cloud-Based File Collaboration  Data breaches and data loss due to insider threats, including malicious insiders stealing, manipulating or destroying data, are the fastest-growing risks that keep managers up at night, according to new research by Ernst & Young. How can we ensure that the right people in an organization have the right access to…

Why Hybrid Cloud Delivers Better Business Agility

Why Hybrid Cloud Delivers Better Business Agility

Why Hybrid Cloud Delivers Better Business Agility A CIO friend of mine once told me that a hybrid cloud model enables him to “own the base, rent the spike” when it comes to unplanned events. Let’s face it – maintaining unused infrastructure for rare or random IT events is expensive and unnecessary in a cloud…

Hybrid IT Matures Just In Time To Tackle Complex Challenges

Hybrid IT Matures Just In Time To Tackle Complex Challenges

Tackling Complex IT Challenges Sponsored by Hybrid IT: The Next Evolution in Enterprise IT, NetApp and Verizon. Today’s sophisticated business environment demands a dynamic and robust IT infrastructure which is a far cry from the closed, controlled environments that most IT departments were created to handle. A hybrid IT infrastructure, drawing services from multiple cloud-based…

Featured Sponsored Articles
The Benefits of Cloud-Based Phone Systems

The Benefits of Cloud-Based Phone Systems

Cloud-Based Phone Systems This article has been sponsored by RingCentral, provider of state-of-the-art cloud infrastructure. Although today’s businesses rely on a host of modern technology, the century-old telephone call is as essential as ever. Of course, businesses today aren’t relying on simple analog voice calls for effective interaction with partners, suppliers, colleagues, and customers, but…

Featured Sponsored Articles
Working With Cloud White Label Partners

Working With Cloud White Label Partners

Cloud White Label Services Sponsored by CloudMGR The benefits of consolidating your cloud to one of the giants such as AWS, Microsoft Azure, and Google Cloud are improving as competition increases, with pricing wars between the service providers meaning better savings for businesses utilizing these services, and an abundance of features at user fingertips as…

Featured Sponsored Articles

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Sponsor