Internet of Things: Difference between revisions
No edit summary |
|||
Line 1: | Line 1: | ||
'''Internet of Things''' (IoT) is anything that can be given an IP address or unique identifier with the ability to transfer information over a network via cloud computing and data gathering sensors.<ref>[http://www.wired.com/insights/2014/11/the-internet-of-things-bigger/ The Internet of Things. Retrieved 18 October 2015.]</ref> This data transfer would not require human to human contact and mostly relies on machine to machine (M2M) contact mitigated by sensors. <ref>[http://whatis.techtarget.com/definition/Internet-of-Things Internet of Things. Retrieved June 11 2015.]</ref> | '''Internet of Things''' (IoT) is anything that can be given an IP address or unique identifier with the ability to transfer information over a network via cloud computing and data-gathering sensors.<ref>[http://www.wired.com/insights/2014/11/the-internet-of-things-bigger/ The Internet of Things. Retrieved 18 October 2015.]</ref> This data transfer would not require human-to-human contact and mostly relies on machine-to-machine (M2M) contact mitigated by sensors. <ref>[http://whatis.techtarget.com/definition/Internet-of-Things Internet of Things. Retrieved June 11 2015.]</ref><br/> | ||
IoT devices exchange data with remote services hosted on the Internet and locate these services via the DNS protocol. They operate across two ecosystems: the DNS (and its resolver operators, authoritative name server operators, and domain registration providers) and the IoT (and its device manufacturers, device operators, and remote service providers). IoT deployments introduce new security, availability, and transparency requirements because they interact with physical space, providing an opportunity for the DNS because it is a globally pervasive infrastructure.<ref>[https://www.caida.org/catalog/papers/2020_dns_in_iot/dns_in_iot.pdf The DNS in IoT, Caida, December 2020]</ref> But, IoT devices also present major risks. IoT device engineers may use the DNS naively to operate their applications or misconfigure resolvers to accept DNS queries from anyone, overwhelming the DNS. Or [[threat Actor|threat actors]] can intentionally use IoT devices as a platform for large-scale [[DDoS Attack]]s.<ref>[https://www.dnsfilter.com/blog/dns-security-internet-of-things#:~:text=IoT%20and%20DDoS,for%20network%20availability%2C%20for%20example. DNS Security and the IoT, DNS Filter Blog]</ref> | |||
==Uses and Examples== | ==Uses and Examples== | ||
In a sponsored article, Wired Magazine outlined how building bridges and other integral infrastructure with "smart cement", using sensors involved in | In a sponsored article, Wired Magazine outlined how building bridges and other integral infrastructure with "smart cement", using sensors involved in M2M would result in superior, more thorough tracking of bridge quality and strength. This could potentially alert engineers to any issues with structural integrity--ensuring the ability to monitor cracks and stresses. <ref>[http://www.wired.com/insights/2014/11/the-internet-of-things-bigger/ The Internet of Things. Retrieved 18 October 2015.]</ref> | ||
==Criticism== | ==Criticism== |