Software and Hardware Requirements

In order to participate in the Internet of Things, one must be able to connect to the internet, and all of the software and hardware being used for communication between "things" must be compatible. Various types of sensors and monitors must be available to record and transmit the information, and each object must have its own unique identification. Take this example from from Benson Hougland's TEDx presentation (featured below): if you are using an application to remotely control your thermostat, then both the thermostat and your smartphone (or other device) must have internet access. The thermostat must have sensors that can correctly measure the temperature in the home, and those sensors must be able to transmit that information to the app on your smartphone. Then, after reading the information, if you decide to adjust the temperature remotely, your phone must be able to transmit that information back to the thermostat, and the thermostat must be able to read and interpret that information so that it can make the required adjustments.

Unfortunately, there are several potential downsides to using this technology. In order for the Internet of Things to work to its fullest potential, every person, place, and thing must be identified and monitored. This increase in monitoring and sharing information will reduce personal privacy, and could result in security risks if the companies who are accessing this information are not protecting it carefully. In the video, "What is the Internet of Things? And why should you car?" Benson Hougland discusses how we are comfortable sharing our private account information on the internet when we bank online because we know that banks have taken extreme measures to ensure a secure connection. He raises the next question -- can we trust that the companies designing our "smart" garage door openers and thermostats are equally as secure with our information? Imagine if someone wanted to rob your house and information about whether or not you were home was easily accessible online -- that would be a devastating flaw in this technology!


No comments:

Post a Comment