Page 154 - Unleashing the potenti al of the Internet of Things
P. 154
3 Unleashing the potential of the Internet of Things
7.14 Security
In the IoT, all things are connected which results in significant security threats, such as threats towards
confidentiality, authenticity and integrity of both data and services. A critical example of security
requirements is the need to integrate different security policies and techniques related to the variety
of devices and user networks in the IoT.
7.15 Privacy
Many things have their owners and users. Sensed data of things may contain private information
concerning their owners or users. Unlike ordinary desktop and other legacy applications, in the IoT
data may be collected by a ubiquitous sensor network (USN) without human users being aware of
such collection.
7.16 Infrastructure-less versus infrastructure-based application
Some IoT applications, such as machine-to-machine (M2M), machine-type communications (MTC),
machine oriented communications (MOC) or USN-based applications, require network infrastructure
(for example, Internet or mobile telecommunication networks as a delivery/backbone network). In
contrast, some applications used in smart home or smart office may not require network
infrastructure. These two types of application will have different requirements. Still, it is required that
these two types of applications be able to talk to each other through proper gateways.
7.17 Observation and/or actuation vs. data exchanges
Typically, things with embedded sensors observe physical environments and acquire information
about surroundings. Based on this information, some devices are actuated (actuators) and physical
surrounding can be controlled. Some applications, such as RFID applications for example, use data
exchanges between things. In this type of application, data that the thing acquires from outside and/or
holds inside are essential to provide the IoT services.
7.18 Application domains
IoT applications can be deployed in many domains. Table 7-1 lists typical application domains. This
list is not exhaustive.
In the IoT, inter-domain applications will also be very common.
For example, a pre-planning of an outdoor outing by a family or a group of friends can use the
following services.
– Information provided about transportation: train timetable and its operation status,
expressway congestion, etc.
– Weather services of regions to be visited.
– Information about the environmental conditions of natural habitats such as mountains, rivers,
lakes, marshes, etc. of the area to be visited.
– If the outing is overnight, information related to reservations (for example, hotel, camping
sites or restaurants).
– If someone in the group is physically challenged, information on accessibility.
140 Rec. ITU-T Y.4103/F.748.0 (10/2014)