Internet of Things: Difference between revisions
No edit summary |
Christiane (talk | contribs) m Christiane moved page IoT to Internet of Things over redirect: Standardize |
||
(22 intermediate revisions by 2 users not shown) | |||
Line 1: | Line 1: | ||
[[ | '''Internet of Things''' (IoT) is anything that can be given an IP address or unique identifier with the ability to transfer information over a network via cloud computing and data-gathering sensors.<ref>[http://www.wired.com/insights/2014/11/the-internet-of-things-bigger/ The Internet of Things. Retrieved 18 October 2015.]</ref> This data transfer would not require human-to-human contact and mostly relies on machine-to-machine (M2M) contact mitigated by sensors. <ref>[http://whatis.techtarget.com/definition/Internet-of-Things Internet of Things. Retrieved June 11 2015.]</ref> | ||
Internet | IoT devices exchange data with remote services hosted on the Internet and locate these services via the DNS protocol. They operate across two ecosystems: the DNS (and its resolver operators, authoritative name server operators, and domain registration providers) and the IoT (and its device manufacturers, device operators, and remote service providers). IoT deployments introduce new security, availability, and transparency requirements because they interact with physical space, providing an opportunity for the DNS because it is a globally pervasive infrastructure.<ref>[https://www.caida.org/catalog/papers/2020_dns_in_iot/dns_in_iot.pdf The DNS in IoT, Caida, December 2020]</ref> But, IoT devices also present major risks. IoT device engineers may use the DNS naively to operate their applications or misconfigure resolvers to accept DNS queries from anyone, overwhelming the DNS. Or [[threat Actor|threat actors]] can intentionally use IoT devices as a platform for large-scale [[DDoS Attack]]s.<ref>[https://www.dnsfilter.com/blog/dns-security-internet-of-things#:~:text=IoT%20and%20DDoS,for%20network%20availability%2C%20for%20example. DNS Security and the IoT, DNS Filter Blog]</ref> | ||
==IoT and ICANN== | |||
The IoT operates outside [[ICANN]]'s remit. In SAC105, the SSAC explained that the IoT differs greatly from traditional Internet applications such as email and [[Web Evolution|web browsing]], but ultimately a significant number of IoT deployments will use the [[DNS]] to locate remote services to enable telemetry data transmission and collection for monitoring and analysis of sensor data.<ref>[https://www.icann.org/en/system/files/files/sac-105-en.pdf SAC105, SSAC, ICANN]</ref> The publication recommends: | |||
# developing a DNS library for IoT devices; | |||
# training IoT DNS professionals; # creating a shared system that enables DNS operators to share information on IoT botnets; | |||
# constructing a system to enable DNS operators to handle [[DDoS Attack]]s involving IoT devices; and | |||
# producing a system that enables DNS operators to measure how IoT uses the DNS.<ref>[https://dig.watch/updates/icann-issues-report-iot-implications-dns ICANN Report on IoT Implications for the DNS, Digital Watch]</ref> | |||
In a sponsored article, Wired Magazine outlined how building bridges and other integral infrastructure with "smart cement", using sensors involved in M2M would result in superior, more thorough tracking of bridge quality and strength. This could potentially alert engineers to any issues with structural integrity--ensuring the ability to monitor cracks and stresses. <ref>[http://www.wired.com/insights/2014/11/the-internet-of-things-bigger/ The Internet of Things. Retrieved 18 October 2015.]</ref> | |||
==IoT and Web3 Techologies== | |||
The relationship between IoT devices and blockchain, data, and AI | |||
==Criticism== | |||
* Most IoT devices take the walled garden approach, restricting which devices and brands can work together, which undermines the ideal of freedom associated with the Internet<ref>[https://www.insidetheiot.com/freedom-walled-garden/ Freedom and Walled Gardens, Inside the IoT]</ref> | |||
* IoT applications are currently siloed infrastructures, requiring IoT consumers to install and use separate apps for accessing different services and interfering with [[interoperability]]<ref>[https://circleid.com/posts/20220413-evolving-from-an-internet-registry-to-iot-registry Evolving from an Internet Registry to an IoT Registry, CircleID]</ref> | |||
* [[Evgeny Morozov]]<ref>[http://www.evgenymorozov.com/ Evgeny Morozov Homepage. Retrieved 19 Oct. 2015.]</ref>, a Belarusian writer, researcher and critic of the Internet and its development as a commercial entity, has explored the use of IoT as an apparatus of the state. In an article for The Guardian, the writer describes the success of digital tracking as a proxy for surveillance and policing of citizens. <ref>[http://www.theguardian.com/technology/2014/jul/20/rise-of-data-death-of-politics-evgeny-morozov-algorithmic-regulation The Rise of Data and Death of Politics. Retrieved 19 Oct 2015.]</ref> | |||
* Switching connectivity service providers requires hardware modifications, such as replacing the connectivity module<ref>[https://circleid.com/posts/20220413-evolving-from-an-internet-registry-to-iot-registry Evolving from an Internet Registry to an IoT Registry, CircleID]</ref> | |||
==References== | |||
{{reflist}} |
Latest revision as of 20:57, 19 June 2024
Internet of Things (IoT) is anything that can be given an IP address or unique identifier with the ability to transfer information over a network via cloud computing and data-gathering sensors.[1] This data transfer would not require human-to-human contact and mostly relies on machine-to-machine (M2M) contact mitigated by sensors. [2]
IoT devices exchange data with remote services hosted on the Internet and locate these services via the DNS protocol. They operate across two ecosystems: the DNS (and its resolver operators, authoritative name server operators, and domain registration providers) and the IoT (and its device manufacturers, device operators, and remote service providers). IoT deployments introduce new security, availability, and transparency requirements because they interact with physical space, providing an opportunity for the DNS because it is a globally pervasive infrastructure.[3] But, IoT devices also present major risks. IoT device engineers may use the DNS naively to operate their applications or misconfigure resolvers to accept DNS queries from anyone, overwhelming the DNS. Or threat actors can intentionally use IoT devices as a platform for large-scale DDoS Attacks.[4]
IoT and ICANN[edit | edit source]
The IoT operates outside ICANN's remit. In SAC105, the SSAC explained that the IoT differs greatly from traditional Internet applications such as email and web browsing, but ultimately a significant number of IoT deployments will use the DNS to locate remote services to enable telemetry data transmission and collection for monitoring and analysis of sensor data.[5] The publication recommends:
- developing a DNS library for IoT devices;
- training IoT DNS professionals; # creating a shared system that enables DNS operators to share information on IoT botnets;
- constructing a system to enable DNS operators to handle DDoS Attacks involving IoT devices; and
- producing a system that enables DNS operators to measure how IoT uses the DNS.[6]
In a sponsored article, Wired Magazine outlined how building bridges and other integral infrastructure with "smart cement", using sensors involved in M2M would result in superior, more thorough tracking of bridge quality and strength. This could potentially alert engineers to any issues with structural integrity--ensuring the ability to monitor cracks and stresses. [7]
IoT and Web3 Techologies[edit | edit source]
The relationship between IoT devices and blockchain, data, and AI
Criticism[edit | edit source]
- Most IoT devices take the walled garden approach, restricting which devices and brands can work together, which undermines the ideal of freedom associated with the Internet[8]
- IoT applications are currently siloed infrastructures, requiring IoT consumers to install and use separate apps for accessing different services and interfering with interoperability[9]
- Evgeny Morozov[10], a Belarusian writer, researcher and critic of the Internet and its development as a commercial entity, has explored the use of IoT as an apparatus of the state. In an article for The Guardian, the writer describes the success of digital tracking as a proxy for surveillance and policing of citizens. [11]
- Switching connectivity service providers requires hardware modifications, such as replacing the connectivity module[12]
References[edit | edit source]
- ↑ The Internet of Things. Retrieved 18 October 2015.
- ↑ Internet of Things. Retrieved June 11 2015.
- ↑ The DNS in IoT, Caida, December 2020
- ↑ DNS Security and the IoT, DNS Filter Blog
- ↑ SAC105, SSAC, ICANN
- ↑ ICANN Report on IoT Implications for the DNS, Digital Watch
- ↑ The Internet of Things. Retrieved 18 October 2015.
- ↑ Freedom and Walled Gardens, Inside the IoT
- ↑ Evolving from an Internet Registry to an IoT Registry, CircleID
- ↑ Evgeny Morozov Homepage. Retrieved 19 Oct. 2015.
- ↑ The Rise of Data and Death of Politics. Retrieved 19 Oct 2015.
- ↑ Evolving from an Internet Registry to an IoT Registry, CircleID