Semantic Service Provisioning Smart Objects: Prospective And Concerns

Discuss About The Semantic Service Provisioning Smart Objects?

The following report intends to describe the prospective of IOT technology from the user end and its significance for lifestyle in relation to common IOT products that can be used in one’s day to day life. Apart from that, this report will also discuss the several concerns related to IOT including data storage, security and control etc. with reflective measures for the same.

The Internet of Things (IoT) renovates the physical objects everywhere into a network of information that quickly modifies our way of life. From refrigerators to cars, to parking spaces and homes, the IoT is turning every object into the digital world. Our homes could soon keep track of all our daily activities (Perera 2017), from opening to closing the front door, through automatic product control when the refrigerator is empty.

Whether we are ready for such a level of automation, or what we want, is a whole other matter. However, this should quickly become the norm, before a new evolution of technologies again transforms our way of life.

On the other hand, there are few problems in the smart homes that should be stated. The broad technological concerns range from interface, privacy, connectivity, security and convenience.

The diagram of Internet of Things infrastructure of my home can be shown as:

The devices in my abode can be discussed as:

  1. Lock system

Firms these days have established the digital auto lock systems that are hassle free, keyless and operate through mobile apps capable of connecting with majorly all smart devices. With such system, it becomes relatively easier to lock and unlock the accesses without the need of keys by just operating online. Customized keys could also be generated and coded for specific visiting hours or days for any guests. Being extremely useful and keyless Internet operates it all. But certain issues faced are:

Issue Type

Comments

Usage

Absence of commercial standards for lock system and different kinds of locks having different standards pose out usage issues.

Control

Data authentication is of chief concern for control.

Connectivity

Digital Lock arrangements may not work during low connectivity or when offline.

Security

If someone loses his or her mobile phone then such emergencies have lot to be handled securely (Oravec, 2017).

Privacy

Most smart products are connected to mobile phones and thus they are very powerful and proficient in managing almost every facet of life so is the privacy of the same.

  1. Firewall addition: It is suggested that an additional layer of firewall should protect the lock system.
  2. Use of antivirus software.
  3. Biometric checks to be installed. It is observed that passwords are not that safe in home automation and home locking system. Therefore, it would make sense to protect the home with the means of biometrics system.

It would be best if corporate standards were used for the goods (Zahra, Brewer, & Cooper, 2017). By corporate standards it means that different vendors of lock system and home system automation should join hands and develop common set of standards. The common set of standards would ensure that the vulnerabilities in the system are minimized.

Philips new mobile app has a lights control feature thus total regulation of household switches could be operated. Furthermore, this app can self-diagnose and maintain schedules as per individual’s usage and involve its acumen to design links as per generated data. Technology making it same lighting device red, blue yellow or as per the customization.

Issue Type

Comments

Usage

Every light has specific power consumption value thus usage issues could appear.

Control

Data authentication is an important issue to deal with.

Connectivity

The lighting systems could be sluggish to respond in case of poor connectivity.

Security

Apps like Google store their data on clouds and thus there are several replicas at different locations (Han, Crespi, 2017). Therefore, it is very significant for the vendors to simplify such issues.

Privacy

Data privacy needs to be taken care of.

  1. Protection through strong passwords. At the same time, it is recommended that users should change the password on regular time interval.
  2. Antivirus Systems to be installed with lighting systems software. At the same time, it is recommended that the antivirus system should be updated on regular time interval.

Home Networking: My Abode

Philips Light systems should integrate with all the coffee machines irrespective of the brand. Nike has launched their smart watch only on iOs and not on Android and it may result in multi levels of collaboration.

IOT enabled thermostat was primarily created by Nest however it was later acquired by Google. These thermostats can be operated online from any location using desired application before reaching home to make more comfortable prior the entry. These technically adapted thermostats do not require any temperature settings, they automatically behave as per the weather conditions and time of day with easily customizable features that too with voice over. It is self-maintaining and improvises itself every time with required substantial data.

Issue Type

Comments

Usage

Different devices have different thermostats with individual power consumption values thus it is bit complex in use.

Control

There is a control issue of data authentication.

Connectivity

Unavailability of thermostat that could be connected with smart phone or other devices like air conditioners etc.

Security

Data compliance needs to be secured.

Privacy

Data leakage could be a risk.

  1. Use of password or second layer of authentication over the mobile user interface.
  2. Use of antivirus systems.

Smart TVs are planned for gizmo homes and are attuned to more than 200 devices and can link with mutual devices like Phone, Bluetooth, Thermostat, related lights and camera (Demirer, Aydin, & Celik, 2017).

Issue Type

Comments

Usage

Diverse user interface for each of the smart TV may create misperception.

Control

Data authentication is at stake.

Connectivity

Due to poor connectivity smart TV might not get connected to smart phone.

Security

Security concern in relation to data compliance.

Privacy

Privacy of data is vulnerable.

  1. Different profile should be created for all the users who watch TV
  2. Inbuilt Antivirus Program should be there in the software of smart TV
  3. The software of Smart TV should be updated as soon as there is a new version or new patch in the market

There are smart coffee machines in the market that can be fully controlled by the mobile App. One can schedule the brews and give instruction like after how many minutes you want your coffee ready, change settings, number of different ingredients and many more. Also, whenever there is shortage of any ingredient in the machine-like water, it will also send a notification.

Issue Type

Comments

Usage

There is a usage issue of adequate support. There is a possibility that coffee machine does not support all the functions over a mobile app. 

Control

Data authentication needs have Control

Connectivity

There is a connectivity concern related to setup.

Security

Data Compliance and its security to be taken care of.

Privacy

Privacy of data to be looked after.

  1. Password Protection
  2. Antivirus Installation
  3. Refrigerator

Smart and Connected refrigerators are built with complex system of actuators and sensors that have predictive analysis in relation to shortage of inventory, placing orders to the closest outlets (Verhoef, et al., 2017). Though these characteristics are primarily unrealistic, but with smart approach and regular improvisations its easily getting importance in our lives.

Issue Type

Comments

Usage

Refrigerator may not upkeep all the functions over a mobile application. 

Control

Data validation could generate control concerns.

Connectivity

If connectivity gets lost then data calculation could be faulty.

Security

Data maintenance could be loose.

Privacy

Data discretion might be at stake.

  1. Password protection
  2. Antivirus Protection
  3. IOT Footwear

Primarily, Ducere Techologies has developed sensor induced footwear for visually impaired people. These shoes act as guide in the direction of the destination with the help of vibrations in shoes operated with Lechal app. Presently, Nike has also introduced IOT enabled shoes which are connected with Apple smart watch and iPhones. These shoes can gauge the travelled distance, running speed, calories burnt and several other characteristics by estimating an individual’s pattern.

Issue Type

Comments

Usage

There is a usage issue of adequate support.

Control

There is a control issue of data authentication.

Connectivity

Infrastructure Connectivity.

Security

Data compliance required with any risks.

Privacy

Data Privacy needs to be strong.

  1. Firewall Protected.
  2. Antivirus Protected.
  3. Biometric Authentication.

Philips and Kolibree are two major companies dealing in smart toothbrushes. These products are a direct competition to the dentists providing easier and reasonable oral healthcare routines with features to analyze brushing duration, frequency and ignored oral and dental areas. They will also convey performance charts and scheduled reminders for regular activity thus promoting better dental hygiene of an individual.

Issue Type

Comments

Usage

There is a usage issue of sufficient provision. There is a likelihood all the functions might be unsupportable over a mobile app. 

Control

Biometric authentication might be erroneous.

Connectivity

Connectivity arrangement could come up as an issue.

Security

There is a security problem of information compliance.

Privacy

There is a grave concern of data privacy at stake.

  1. The second level of authentication like face detection of fingerprint can be used to provide access to toothbrush.
  2. The software of the toothbrush should be updated on regular time interval.

Conclusion

More and more objects are connected to the Internet and applications are endless, ranging from monitoring machines to massive transfer of information. All kinds of machines ranging from gigantic digitally operated aircrafts to small handheld devices are monitored in the real time. IOT industry is fairly divided as of now and there are enormous organizations, which are involved in IOT related products. Philips, Nike, Google, Apple, Schneider are all open to IOT product development, organizations such as GE, ABB, CISCO, IBM are manufacturing IOT products which can be used in various sectors like retail, automotive and education. High-tech giants like Google, Cisco, and IBM are working on IT aspects of these Internet based communication products (Olsson, Bosch, & Katumba, 2016).

References

Abou-Zahra, S., Brewer, J., & Cooper, M. (2017). Web Standards to Enable an Accessible and Inclusive Internet of Things (IoT).

Demirer, V., Ayd?n, B., & Çelik, ?. B. (2017). Exploring the Educational Potential of Internet of Things (IoT) in Seamless Learning. The Internet of Things: Breakthroughs in Research and Practice: Breakthroughs in Research and Practice, 1.

Han, S. N., & Crespi, N. (2017). Semantic service provisioning for smart objects: Integrating IoT applications into the web. Future Generation Computer Systems.

Olsson, H. H., Bosch, J., & Katumba, B. (2016). Exploring IoT User Dimensions: A Multi-case Study on User Interactions in ‘Internet of Things’ Systems. In Product-Focused Software Process Improvement: 17th International Conference, PROFES 2016, Trondheim, Norway, November 22-24, 2016, Proceedings 17 (pp. 477-484). Springer International Publishing.

Oravec, J. A. (2017). Kill switches, remote deletion, and intelligent agents: Framing everyday household cybersecurity in the internet of things. Technology in Society.

Perera, C. (2017). Sensing as a Service (S2aaS): Buying and Selling IoT Data. arXiv preprint arXiv:1702.02380.

Verhoef, P. C., Stephen, A. T., Kannan, P. K., Luo, X., Abhishek, V., Andrews, M., … & Hu, M. (2017). Consumer Connectivity in a Complex, Technology-Enabled, and Mobile-Oriented World with Smart Products.

Calculate your order
Pages (275 words)
Standard price: $0.00
Client Reviews
4.9
Sitejabber
4.6
Trustpilot
4.8
Our Guarantees
100% Confidentiality
Information about customers is confidential and never disclosed to third parties.
Original Writing
We complete all papers from scratch. You can get a plagiarism report.
Timely Delivery
No missed deadlines – 97% of assignments are completed in time.
Money Back
If you're confident that a writer didn't follow your order details, ask for a refund.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00
Power up Your Academic Success with the
Team of Professionals. We’ve Got Your Back.
Power up Your Study Success with Experts We’ve Got Your Back.