Page 154 - Unleashing the potenti al of the Internet of Things
P. 154

3                                     Unleashing the potential of the Internet of Things

            7.14    Security

            In the IoT, all things are connected which results in significant security threats, such as threats towards
            confidentiality, authenticity and integrity of both data and services. A critical example of security
            requirements is the need to integrate different security policies and techniques related to the variety
            of devices and user networks in the IoT.

            7.15    Privacy
            Many things have their owners and users. Sensed data of things may contain private information
            concerning their owners or users. Unlike ordinary desktop and other legacy applications, in the IoT
            data may be collected by a ubiquitous sensor network (USN) without human users being aware of
            such collection.

            7.16    Infrastructure-less versus infrastructure-based application
            Some IoT applications, such as machine-to-machine (M2M), machine-type communications (MTC),
            machine oriented communications (MOC) or USN-based applications, require network infrastructure
            (for example, Internet or mobile telecommunication networks as a delivery/backbone network). In
            contrast,  some  applications  used  in  smart  home  or  smart  office  may  not  require  network
            infrastructure. These two types of application will have different requirements. Still, it is required that
            these two types of applications be able to talk to each other through proper gateways.

            7.17    Observation and/or actuation vs. data exchanges

            Typically, things with embedded sensors observe physical environments and acquire information
            about surroundings. Based on this information, some devices are actuated (actuators) and physical
            surrounding can be controlled. Some applications, such as RFID applications for example, use data
            exchanges between things. In this type of application, data that the thing acquires from outside and/or
            holds inside are essential to provide the IoT services.


            7.18    Application domains
            IoT applications can be deployed in many domains. Table 7-1 lists typical application domains. This
            list is not exhaustive.
            In the IoT, inter-domain applications will also be very common.

            For example, a pre-planning of an outdoor outing by a family or a group of friends can use the
            following services.
            –       Information  provided  about  transportation:  train  timetable  and  its  operation  status,
                    expressway congestion, etc.
            –       Weather services of regions to be visited.
            –       Information about the environmental conditions of natural habitats such as mountains, rivers,
                    lakes, marshes, etc. of the area to be visited.
            –       If the outing is overnight, information related to reservations (for example, hotel, camping
                    sites or restaurants).
            –       If someone in the group is physically challenged, information on accessibility.















            140      Rec. ITU-T Y.4103/F.748.0 (10/2014)
   149   150   151   152   153   154   155   156   157   158   159