Discuss About The Semantic Service Provisioning Smart Objects?
The following report intends to describe the prospective of IOT technology from the user end and its significance for lifestyle in relation to common IOT products that can be used in one’s day to day life. Apart from that, this report will also discuss the several concerns related to IOT including data storage, security and control etc. with reflective measures for the same.
The Internet of Things (IoT) renovates the physical objects everywhere into a network of information that quickly modifies our way of life. From refrigerators to cars, to parking spaces and homes, the IoT is turning every object into the digital world. Our homes could soon keep track of all our daily activities (Perera 2017), from opening to closing the front door, through automatic product control when the refrigerator is empty.
Whether we are ready for such a level of automation, or what we want, is a whole other matter. However, this should quickly become the norm, before a new evolution of technologies again transforms our way of life.
On the other hand, there are few problems in the smart homes that should be stated. The broad technological concerns range from interface, privacy, connectivity, security and convenience.
The diagram of Internet of Things infrastructure of my home can be shown as:
The devices in my abode can be discussed as:
Firms these days have established the digital auto lock systems that are hassle free, keyless and operate through mobile apps capable of connecting with majorly all smart devices. With such system, it becomes relatively easier to lock and unlock the accesses without the need of keys by just operating online. Customized keys could also be generated and coded for specific visiting hours or days for any guests. Being extremely useful and keyless Internet operates it all. But certain issues faced are:
Issue Type |
Comments |
Usage |
Absence of commercial standards for lock system and different kinds of locks having different standards pose out usage issues. |
Control |
Data authentication is of chief concern for control. |
Connectivity |
Digital Lock arrangements may not work during low connectivity or when offline. |
Security |
If someone loses his or her mobile phone then such emergencies have lot to be handled securely (Oravec, 2017). |
Privacy |
Most smart products are connected to mobile phones and thus they are very powerful and proficient in managing almost every facet of life so is the privacy of the same. |
It would be best if corporate standards were used for the goods (Zahra, Brewer, & Cooper, 2017). By corporate standards it means that different vendors of lock system and home system automation should join hands and develop common set of standards. The common set of standards would ensure that the vulnerabilities in the system are minimized.
Philips new mobile app has a lights control feature thus total regulation of household switches could be operated. Furthermore, this app can self-diagnose and maintain schedules as per individual’s usage and involve its acumen to design links as per generated data. Technology making it same lighting device red, blue yellow or as per the customization.
Issue Type |
Comments |
Usage |
Every light has specific power consumption value thus usage issues could appear. |
Control |
Data authentication is an important issue to deal with. |
Connectivity |
The lighting systems could be sluggish to respond in case of poor connectivity. |
Security |
Apps like Google store their data on clouds and thus there are several replicas at different locations (Han, Crespi, 2017). Therefore, it is very significant for the vendors to simplify such issues. |
Privacy |
Data privacy needs to be taken care of. |
Philips Light systems should integrate with all the coffee machines irrespective of the brand. Nike has launched their smart watch only on iOs and not on Android and it may result in multi levels of collaboration.
IOT enabled thermostat was primarily created by Nest however it was later acquired by Google. These thermostats can be operated online from any location using desired application before reaching home to make more comfortable prior the entry. These technically adapted thermostats do not require any temperature settings, they automatically behave as per the weather conditions and time of day with easily customizable features that too with voice over. It is self-maintaining and improvises itself every time with required substantial data.
Issue Type |
Comments |
Usage |
Different devices have different thermostats with individual power consumption values thus it is bit complex in use. |
Control |
There is a control issue of data authentication. |
Connectivity |
Unavailability of thermostat that could be connected with smart phone or other devices like air conditioners etc. |
Security |
Data compliance needs to be secured. |
Privacy |
Data leakage could be a risk. |
Smart TVs are planned for gizmo homes and are attuned to more than 200 devices and can link with mutual devices like Phone, Bluetooth, Thermostat, related lights and camera (Demirer, Aydin, & Celik, 2017).
Issue Type |
Comments |
Usage |
Diverse user interface for each of the smart TV may create misperception. |
Control |
Data authentication is at stake. |
Connectivity |
Due to poor connectivity smart TV might not get connected to smart phone. |
Security |
Security concern in relation to data compliance. |
Privacy |
Privacy of data is vulnerable. |
There are smart coffee machines in the market that can be fully controlled by the mobile App. One can schedule the brews and give instruction like after how many minutes you want your coffee ready, change settings, number of different ingredients and many more. Also, whenever there is shortage of any ingredient in the machine-like water, it will also send a notification.
Issue Type |
Comments |
Usage |
There is a usage issue of adequate support. There is a possibility that coffee machine does not support all the functions over a mobile app. |
Control |
Data authentication needs have Control |
Connectivity |
There is a connectivity concern related to setup. |
Security |
Data Compliance and its security to be taken care of. |
Privacy |
Privacy of data to be looked after. |
Smart and Connected refrigerators are built with complex system of actuators and sensors that have predictive analysis in relation to shortage of inventory, placing orders to the closest outlets (Verhoef, et al., 2017). Though these characteristics are primarily unrealistic, but with smart approach and regular improvisations its easily getting importance in our lives.
Issue Type |
Comments |
Usage |
Refrigerator may not upkeep all the functions over a mobile application. |
Control |
Data validation could generate control concerns. |
Connectivity |
If connectivity gets lost then data calculation could be faulty. |
Security |
Data maintenance could be loose. |
Privacy |
Data discretion might be at stake. |
Primarily, Ducere Techologies has developed sensor induced footwear for visually impaired people. These shoes act as guide in the direction of the destination with the help of vibrations in shoes operated with Lechal app. Presently, Nike has also introduced IOT enabled shoes which are connected with Apple smart watch and iPhones. These shoes can gauge the travelled distance, running speed, calories burnt and several other characteristics by estimating an individual’s pattern.
Issue Type |
Comments |
Usage |
There is a usage issue of adequate support. |
Control |
There is a control issue of data authentication. |
Connectivity |
Infrastructure Connectivity. |
Security |
Data compliance required with any risks. |
Privacy |
Data Privacy needs to be strong. |
Philips and Kolibree are two major companies dealing in smart toothbrushes. These products are a direct competition to the dentists providing easier and reasonable oral healthcare routines with features to analyze brushing duration, frequency and ignored oral and dental areas. They will also convey performance charts and scheduled reminders for regular activity thus promoting better dental hygiene of an individual.
Issue Type |
Comments |
Usage |
There is a usage issue of sufficient provision. There is a likelihood all the functions might be unsupportable over a mobile app. |
Control |
Biometric authentication might be erroneous. |
Connectivity |
Connectivity arrangement could come up as an issue. |
Security |
There is a security problem of information compliance. |
Privacy |
There is a grave concern of data privacy at stake. |
Conclusion
More and more objects are connected to the Internet and applications are endless, ranging from monitoring machines to massive transfer of information. All kinds of machines ranging from gigantic digitally operated aircrafts to small handheld devices are monitored in the real time. IOT industry is fairly divided as of now and there are enormous organizations, which are involved in IOT related products. Philips, Nike, Google, Apple, Schneider are all open to IOT product development, organizations such as GE, ABB, CISCO, IBM are manufacturing IOT products which can be used in various sectors like retail, automotive and education. High-tech giants like Google, Cisco, and IBM are working on IT aspects of these Internet based communication products (Olsson, Bosch, & Katumba, 2016).
References
Abou-Zahra, S., Brewer, J., & Cooper, M. (2017). Web Standards to Enable an Accessible and Inclusive Internet of Things (IoT).
Demirer, V., Ayd?n, B., & Çelik, ?. B. (2017). Exploring the Educational Potential of Internet of Things (IoT) in Seamless Learning. The Internet of Things: Breakthroughs in Research and Practice: Breakthroughs in Research and Practice, 1.
Han, S. N., & Crespi, N. (2017). Semantic service provisioning for smart objects: Integrating IoT applications into the web. Future Generation Computer Systems.
Olsson, H. H., Bosch, J., & Katumba, B. (2016). Exploring IoT User Dimensions: A Multi-case Study on User Interactions in ‘Internet of Things’ Systems. In Product-Focused Software Process Improvement: 17th International Conference, PROFES 2016, Trondheim, Norway, November 22-24, 2016, Proceedings 17 (pp. 477-484). Springer International Publishing.
Oravec, J. A. (2017). Kill switches, remote deletion, and intelligent agents: Framing everyday household cybersecurity in the internet of things. Technology in Society.
Perera, C. (2017). Sensing as a Service (S2aaS): Buying and Selling IoT Data. arXiv preprint arXiv:1702.02380.
Verhoef, P. C., Stephen, A. T., Kannan, P. K., Luo, X., Abhishek, V., Andrews, M., … & Hu, M. (2017). Consumer Connectivity in a Complex, Technology-Enabled, and Mobile-Oriented World with Smart Products.
We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.
Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.
Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.
Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.
Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.
Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.
We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.
Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.
You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.
Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.
Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.
You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.
You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.
Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.
We create perfect papers according to the guidelines.
We seamlessly edit out errors from your papers.
We thoroughly read your final draft to identify errors.
Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!
Dedication. Quality. Commitment. Punctuality
Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.
We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.
We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.
We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.
We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.