Вы находитесь на странице: 1из 14

TOPIC

Impact of Internet of Things

SYMBIOSIS INSTITUTE OF OPERATIONS MANAGEMENT,


NASHIK

SUBMITTED BY

Shivanshu Shukla 16020741049


Shubham Jain 16020741137

SUBMITTED TO

Mr. Abhishek Dakhole


Table of contents

1. INTRODUCTION 3
2. OVERVIEW OR BACKGROUND 4
3. RESEARCH FOCUS 5
3.1 RESEARCH PROBLEM 6
3.2 RESEARCH QUESTION 7
3.3 RESEARCH AIM 8
4.1 QUALITATIVE RESEARCH 9
4.3 DATA COLLECTION 10
4.4 DATA ANALYSIS 11
4. LITERATURE REVIEW 12
5. REFERENCES 13
1. Introduction

The Internet of Things is a catchphrase for the growing desire and demand to connect more and
more devices to the Internet and the cloud which provide information and knowledge that enable
us to live better lives. Those devices communicate between themselves, gather data and even
interact with the environment around them. In today's world, the Internet of Things, or IoT as it is
also called, has grown beyond simply laptops, smartphones and tablets and includes everything
from fitness trackers to even a "smart" fashion doll. IoT is formed by networked interconnection
of everyday objects.

In order to define IoT structure, it can be segmented into following four parts:-

i. Things: These are defined as uniquely identifiable nodes, primarily sensors that
communicate without human interaction using IP connectivity. There are millions of IP
addressable things around us already from RFID tags to fitness bands and their
numbers are expected to rise exponentially as sensors become cheaper, smaller and more
power-efficient. Morgan Stanley estimates that this number could be as high as 50 billion
by 2020, which translates to approximately 6.4 devices for every one of the 8 billion human
beings who are expected to be on the Earth at that time.

ii. Gateways: These act as intermediaries between things and the cloud to provide the needed
Internet connectivity, security and manageability.

iii. Network infrastructure: This is comprised of routers, aggregators, gateways, repeaters


and other devices that control data flow. They also connect to the telecom and cable
networks (3G, 4G/LTE) operated by service providers.

iv. Cloud infrastructure: These contains large pools of virtualized servers and storage that
are networked together. Supporting the IoT, this infrastructure runs applications that
analyze data from devices and sensors in order to generate actionable information used for
services and decision-making.

The Internet of Things (IoT) is the inclusion of electronics and software in any device not usually
considered computerized in nature, to enable it to achieve greater value and service by giving it an
ability to network and communicate with other devices. Each item is uniquely identifiable through
its embedded computing device but is able to interoperate within the existing Internet
infrastructure."

Internet of Things (IoT) has provided a promising opportunity to build powerful industrial systems
and applications by leveraging the growing ubiquity of radio-frequency identification (RFID), and
wireless, mobile, and sensor devices. A wide range of industrial IoT applications have been
developed and deployed in recent years. In an effort to understand the development of IoT in
industries, this paper reviews the current research of IoT, key enabling technologies, major IoT
applications in industries, and identifies research trends and challenges.
2. Overview of the topic

The IoT has a significant ability to impact the future of mankind. We are entering a world where
everything has the potential to be connected. In fact, IDC estimates that by 2020, the installed
base for the IoT will be as high as 212 billion, including 30 billion "connected things." This is a
large market and will have a great impact on the daily life of the average person. There is already
talk of connected and self-driving cars, "smart" homes and even connected healthcare is in the
works, indicating the huge potential impact of the Internet of Things.

The Internet of Things has a financial impact as well, with the projected value expected to be
close to $30 billion by 2020. This is going to become a major factor in the global economy as
connectivity becomes the norm in the next few years.

Gartner forecasts that 4.9 billion connected things will be in use in 2015, up 30 percent from 2014,
and will reach 25 billion by 2020". As a point of reference, there are currently 2 billion smart
phones in the world today and about 5 billion mobile phones according to e-Marketer. That means
Gartner is projecting 5x growth in IoT devices

According McKinsey Global report 2016, it looked at more than 150 specific IoT applications that
exist today or could be in widespread use within 10 years and estimate that they could have a total
economic impact of $3.9 trillion to $11.1 trillion per year in 2025. It also found that more than
two-thirds of value will be generated in business-to-business settings and that business customers
and consumers will likely capture more than 90% of the value created.
3. Research Focus

The IoT addresses a broad spectrum of business functions and opportunities. Some of the most
common categories are supply chain management, location tracking, real time financial
analysis, remote monitoring and maintenance, energy efficiency, business process automation,
and health and wellness.

Our Research focus on three areas of the IoT that will impact the network are data
analytics, the need for network agility, and security. Let's take a closer look at these three
areas.

Data Analytics

Data without analytics is relatively useless. The influx of sensors will create vast amounts of
data that will need to be processed. For manufacturers, post-sale service or warranties can be
continuously tracked in real-time using machine-to-machine sensors to identify malfunctions
or warranty issues. Real-time promotions can be sent by analyzing sensor data and customers'
buying preferences.

Agile Networking

The IoT will impact everyone at the professional and individual levels; whole industries will
leverage the availability of sensors and machine-to-machine communication. In agriculture,
irrigation systems will function based on a multitude of inputs, including weather forecasts and
data from moisture sensors. Manufacturing plants will be totally wired on sensor networks, as
will oil drilling equipment. Drilling times will be reduced by the use of advanced analytics that
can predict conditions and improve operation based on previous events.

Security

Hyper-connectivity will threaten the individual in more ways than currently acknowledged.
We need to think about how to protect against inevitable threats to the system. Power grids
will be more efficient, and consumer interactions such as net metering will drive the integration
of operational technology (OT) and information technology (IT). However, the integration of
OT and IT opens the door for external threats. Cars will be able to drive themselves, controlled
by applications. Having your networked garage recognize whether or not your car is in the
garage is useful, but it also creates opportunity for hackers. Businesses and homes will become
increasingly targeted and hackable. It's important that the networking industry works now to
ensure security within these networks of tomorrow.
4. Research Problem

Our research problem associated with our research scope which leads to IoT security challenges
that are mentioned below:

A trillion points of vulnerability


Every single device and sensor in the IoT represents a potential risk. How confident can an
organization be that each of these devices have the controls in place to preserve the confidentiality
of the data collected and the integrity of the data sent?
Researchers at the French technology institute Eurecom downloaded some 32,000 firmware
images from potential IoT device manufacturers and products including poor encryption and
backdoors that could allow unauthorized access. And one weak link could open up access to
hundreds of thousands of devices on a network with potentially serious consequences.

Trust and data integrity


Corporate systems will be bombarded by data from all manner of connected sensors in the IoT.
But how sure can an organization be that the data has not been compromised or interfered with?
Take the example of utility companies automatically collecting readings from customer smart
meters. Researchers have already demonstrated that smart meters widely used in Spain, for
example, can be hacked to under-report energy use. They were able to spoof messages being sent
from the meter to the utility company and send false data. In recent years we have been able to go
to a high street store and buy anti-virus protection on a disc or download it straight to our PC. But
in the IoT that security capability doesnt exist in many of the devices that will suddenly become
connected.

Data collection, protection and privacy


The vision for the IoT is to make our everyday lives easier and boost the efficiency and
productivity of businesses and employees. The data collected will help us make smarter decisions.
But this will also have an impact on privacy expectations. If data collected by connected devices
is compromised it will undermine trust in the IoT. We are already seeing consumers place higher
expectations on businesses and governments to safeguard their personal information.

More devices More Problem, Updates and data threat creates


5. Research Question

# Question-1

Our major research question arises what are the major passive and active threat for IoT challenges
in last past few year and how it affected sectors.

How the devices are maintained to graph the changes and maintain the challenges

# Question-2

How IoT impacted the High-tech Industry


6. Research Aim :

With our first question we will be able to analyze what are the possible threats to IoT, can able to
relate to the past datas of recent years. With this research our main aim is to quantify the threat to
data and come to the conclusion of resolving this bigger issue which may affect the further use of
IoT.

Second question direct our research aim to analyze the impact of IoT on high tech industry in last
few years and how it evolve.
7. Qualitative research:-

#Research 1

If we define a possible threats to IoT in recent years:-

Over Half a Billion Personal Records Were Stolen or Lost in 2017


Spear-Phishing Campaigns Targeting Employees Increased 65 Percent in 2017
Major Security Vulnerabilities in Three Quarters of Popular Websites Put Us All at Risk
Ransomware Increased 54 Percent in 2017
Symantec Blocked 100 Million Fake Technical Support Scams in 2017

#Research 2

Government effort to initiate IoT in India which can be explained in below three domains:-

Hardware and software systems: Construction of hardware and software systems that will
make the IoT enabled systems intelligent and secure.
Analytics: Integration and analysis of the enormous streams of physical world instrumentation
with all of the existing data.
Security: Developing pervasive sensing and analytic systems to preserve and protect user
security.
8. Data Collection

New Mobile Vulnerabilities

2014 2015 2016

127 168 528

- +32% +214%

New Android Mobile Malware Variants

2014 2015 2016

3262 2227 4010

- -32% +79%

Web attack blocked one day

2014 2015 2016

570K 495K 1.1M

- -13% +117%

Websites found with Malware

2014 2015 2016

1 in 566 1 in 1126 1 in 3112


9 Data Analysis
If we analyze in past few year the potential threats increased to a higher scale, which affecting the
effective use of IoT.

With year passing the amount of data is increasing but with its increase in data, threats are also
increasing affecting various sectors.

In order to have an impact of IoT, it requires the same holistic approach as other areas of IT
security.

If we compare sector wise data security still acting as a challenge to create a huge impact of IoT

Industry details Percentage of Email as Spam


Mining 56.3%
Manufacturing 54.2%
Construction 53.7%
Services 53.0%
Agriculture, Forestry, & Fishing 52.9%
Retail Trade 52.7%
Transportation & Public Utilities 51.8%

With this data we can clearly analyze every sector is some hoe effected with threats which affecting
the impact Of IoT.
Literature Review: Framing the IoT opportunity

Contextual Offerings Using IoT

The IoT can help electronic component distributors reinvent their existing business
models and break through into adjacent markets. Customers of these companies are
looking for guidance in areas such as connectivity, cloud operations and potential
business models.
11. References

a. https://www.symantec.com/content/dam/symantec/docs/reports/istr-21-
2016-en.pdf
b. http://cerasis.com/2015/10/05/the-internet-of-things/
c. http://analyticsindiamag.com/indias-first-internet-things-policy-one-
step-closer-smart-digital-india/
d. http://www.networkcomputing.com/cloud-infrastructure/iot-network-
impact/1935025134
e. https://www.lifehacker.com.au/2016/03/how-the-internet-of-things-
impacts-security/

Вам также может понравиться