Semantic Service Provisioning Smart Objects: Prospective And Concerns

Discuss About The Semantic Service Provisioning Smart Objects?

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

The following report intends to describe the prospective of IOT technology from the user end and its significance for lifestyle in relation to common IOT products that can be used in one’s day to day life. Apart from that, this report will also discuss the several concerns related to IOT including data storage, security and control etc. with reflective measures for the same.

The Internet of Things (IoT) renovates the physical objects everywhere into a network of information that quickly modifies our way of life. From refrigerators to cars, to parking spaces and homes, the IoT is turning every object into the digital world. Our homes could soon keep track of all our daily activities (Perera 2017), from opening to closing the front door, through automatic product control when the refrigerator is empty.

Whether we are ready for such a level of automation, or what we want, is a whole other matter. However, this should quickly become the norm, before a new evolution of technologies again transforms our way of life.

On the other hand, there are few problems in the smart homes that should be stated. The broad technological concerns range from interface, privacy, connectivity, security and convenience.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

The diagram of Internet of Things infrastructure of my home can be shown as:

The devices in my abode can be discussed as:

  1. Lock system

Firms these days have established the digital auto lock systems that are hassle free, keyless and operate through mobile apps capable of connecting with majorly all smart devices. With such system, it becomes relatively easier to lock and unlock the accesses without the need of keys by just operating online. Customized keys could also be generated and coded for specific visiting hours or days for any guests. Being extremely useful and keyless Internet operates it all. But certain issues faced are:

Issue Type

Comments

Usage

Absence of commercial standards for lock system and different kinds of locks having different standards pose out usage issues.

Control

Data authentication is of chief concern for control.

Connectivity

Digital Lock arrangements may not work during low connectivity or when offline.

Security

If someone loses his or her mobile phone then such emergencies have lot to be handled securely (Oravec, 2017).

Privacy

Most smart products are connected to mobile phones and thus they are very powerful and proficient in managing almost every facet of life so is the privacy of the same.

  1. Firewall addition: It is suggested that an additional layer of firewall should protect the lock system.
  2. Use of antivirus software.
  3. Biometric checks to be installed. It is observed that passwords are not that safe in home automation and home locking system. Therefore, it would make sense to protect the home with the means of biometrics system.

It would be best if corporate standards were used for the goods (Zahra, Brewer, & Cooper, 2017). By corporate standards it means that different vendors of lock system and home system automation should join hands and develop common set of standards. The common set of standards would ensure that the vulnerabilities in the system are minimized.

Philips new mobile app has a lights control feature thus total regulation of household switches could be operated. Furthermore, this app can self-diagnose and maintain schedules as per individual’s usage and involve its acumen to design links as per generated data. Technology making it same lighting device red, blue yellow or as per the customization.

Issue Type

Comments

Usage

Every light has specific power consumption value thus usage issues could appear.

Control

Data authentication is an important issue to deal with.

Connectivity

The lighting systems could be sluggish to respond in case of poor connectivity.

Security

Apps like Google store their data on clouds and thus there are several replicas at different locations (Han, Crespi, 2017). Therefore, it is very significant for the vendors to simplify such issues.

Privacy

Data privacy needs to be taken care of.

  1. Protection through strong passwords. At the same time, it is recommended that users should change the password on regular time interval.
  2. Antivirus Systems to be installed with lighting systems software. At the same time, it is recommended that the antivirus system should be updated on regular time interval.

Home Networking: My Abode

Philips Light systems should integrate with all the coffee machines irrespective of the brand. Nike has launched their smart watch only on iOs and not on Android and it may result in multi levels of collaboration.

IOT enabled thermostat was primarily created by Nest however it was later acquired by Google. These thermostats can be operated online from any location using desired application before reaching home to make more comfortable prior the entry. These technically adapted thermostats do not require any temperature settings, they automatically behave as per the weather conditions and time of day with easily customizable features that too with voice over. It is self-maintaining and improvises itself every time with required substantial data.

Issue Type

Comments

Usage

Different devices have different thermostats with individual power consumption values thus it is bit complex in use.

Control

There is a control issue of data authentication.

Connectivity

Unavailability of thermostat that could be connected with smart phone or other devices like air conditioners etc.

Security

Data compliance needs to be secured.

Privacy

Data leakage could be a risk.

  1. Use of password or second layer of authentication over the mobile user interface.
  2. Use of antivirus systems.

Smart TVs are planned for gizmo homes and are attuned to more than 200 devices and can link with mutual devices like Phone, Bluetooth, Thermostat, related lights and camera (Demirer, Aydin, & Celik, 2017).

Issue Type

Comments

Usage

Diverse user interface for each of the smart TV may create misperception.

Control

Data authentication is at stake.

Connectivity

Due to poor connectivity smart TV might not get connected to smart phone.

Security

Security concern in relation to data compliance.

Privacy

Privacy of data is vulnerable.

  1. Different profile should be created for all the users who watch TV
  2. Inbuilt Antivirus Program should be there in the software of smart TV
  3. The software of Smart TV should be updated as soon as there is a new version or new patch in the market

There are smart coffee machines in the market that can be fully controlled by the mobile App. One can schedule the brews and give instruction like after how many minutes you want your coffee ready, change settings, number of different ingredients and many more. Also, whenever there is shortage of any ingredient in the machine-like water, it will also send a notification.

Issue Type

Comments

Usage

There is a usage issue of adequate support. There is a possibility that coffee machine does not support all the functions over a mobile app. 

Control

Data authentication needs have Control

Connectivity

There is a connectivity concern related to setup.

Security

Data Compliance and its security to be taken care of.

Privacy

Privacy of data to be looked after.

  1. Password Protection
  2. Antivirus Installation
  3. Refrigerator

Smart and Connected refrigerators are built with complex system of actuators and sensors that have predictive analysis in relation to shortage of inventory, placing orders to the closest outlets (Verhoef, et al., 2017). Though these characteristics are primarily unrealistic, but with smart approach and regular improvisations its easily getting importance in our lives.

Issue Type

Comments

Usage

Refrigerator may not upkeep all the functions over a mobile application. 

Control

Data validation could generate control concerns.

Connectivity

If connectivity gets lost then data calculation could be faulty.

Security

Data maintenance could be loose.

Privacy

Data discretion might be at stake.

  1. Password protection
  2. Antivirus Protection
  3. IOT Footwear

Primarily, Ducere Techologies has developed sensor induced footwear for visually impaired people. These shoes act as guide in the direction of the destination with the help of vibrations in shoes operated with Lechal app. Presently, Nike has also introduced IOT enabled shoes which are connected with Apple smart watch and iPhones. These shoes can gauge the travelled distance, running speed, calories burnt and several other characteristics by estimating an individual’s pattern.

Issue Type

Comments

Usage

There is a usage issue of adequate support.

Control

There is a control issue of data authentication.

Connectivity

Infrastructure Connectivity.

Security

Data compliance required with any risks.

Privacy

Data Privacy needs to be strong.

  1. Firewall Protected.
  2. Antivirus Protected.
  3. Biometric Authentication.

Philips and Kolibree are two major companies dealing in smart toothbrushes. These products are a direct competition to the dentists providing easier and reasonable oral healthcare routines with features to analyze brushing duration, frequency and ignored oral and dental areas. They will also convey performance charts and scheduled reminders for regular activity thus promoting better dental hygiene of an individual.

Issue Type

Comments

Usage

There is a usage issue of sufficient provision. There is a likelihood all the functions might be unsupportable over a mobile app. 

Control

Biometric authentication might be erroneous.

Connectivity

Connectivity arrangement could come up as an issue.

Security

There is a security problem of information compliance.

Privacy

There is a grave concern of data privacy at stake.

  1. The second level of authentication like face detection of fingerprint can be used to provide access to toothbrush.
  2. The software of the toothbrush should be updated on regular time interval.

Conclusion

More and more objects are connected to the Internet and applications are endless, ranging from monitoring machines to massive transfer of information. All kinds of machines ranging from gigantic digitally operated aircrafts to small handheld devices are monitored in the real time. IOT industry is fairly divided as of now and there are enormous organizations, which are involved in IOT related products. Philips, Nike, Google, Apple, Schneider are all open to IOT product development, organizations such as GE, ABB, CISCO, IBM are manufacturing IOT products which can be used in various sectors like retail, automotive and education. High-tech giants like Google, Cisco, and IBM are working on IT aspects of these Internet based communication products (Olsson, Bosch, & Katumba, 2016).

References

Abou-Zahra, S., Brewer, J., & Cooper, M. (2017). Web Standards to Enable an Accessible and Inclusive Internet of Things (IoT).

Demirer, V., Ayd?n, B., & Çelik, ?. B. (2017). Exploring the Educational Potential of Internet of Things (IoT) in Seamless Learning. The Internet of Things: Breakthroughs in Research and Practice: Breakthroughs in Research and Practice, 1.

Han, S. N., & Crespi, N. (2017). Semantic service provisioning for smart objects: Integrating IoT applications into the web. Future Generation Computer Systems.

Olsson, H. H., Bosch, J., & Katumba, B. (2016). Exploring IoT User Dimensions: A Multi-case Study on User Interactions in ‘Internet of Things’ Systems. In Product-Focused Software Process Improvement: 17th International Conference, PROFES 2016, Trondheim, Norway, November 22-24, 2016, Proceedings 17 (pp. 477-484). Springer International Publishing.

Oravec, J. A. (2017). Kill switches, remote deletion, and intelligent agents: Framing everyday household cybersecurity in the internet of things. Technology in Society.

Perera, C. (2017). Sensing as a Service (S2aaS): Buying and Selling IoT Data. arXiv preprint arXiv:1702.02380.

Verhoef, P. C., Stephen, A. T., Kannan, P. K., Luo, X., Abhishek, V., Andrews, M., … & Hu, M. (2017). Consumer Connectivity in a Complex, Technology-Enabled, and Mobile-Oriented World with Smart Products.

What Will You Get?

We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.

Premium Quality

Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.

Experienced Writers

Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.

On-Time Delivery

Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.

24/7 Customer Support

Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.

Complete Confidentiality

Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.

Authentic Sources

We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.

Moneyback Guarantee

Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.

Order Tracking

You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.

image

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

image

Trusted Partner of 9650+ Students for Writing

From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.

Preferred Writer

Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.

Grammar Check Report

Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.

One Page Summary

You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.

Plagiarism Report

You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.

Free Features $66FREE

  • Most Qualified Writer $10FREE
  • Plagiarism Scan Report $10FREE
  • Unlimited Revisions $08FREE
  • Paper Formatting $05FREE
  • Cover Page $05FREE
  • Referencing & Bibliography $10FREE
  • Dedicated User Area $08FREE
  • 24/7 Order Tracking $05FREE
  • Periodic Email Alerts $05FREE
image

Services offered

Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.

  • On-time Delivery
  • 24/7 Order Tracking
  • Access to Authentic Sources
Academic Writing

We create perfect papers according to the guidelines.

Professional Editing

We seamlessly edit out errors from your papers.

Thorough Proofreading

We thoroughly read your final draft to identify errors.

image

Delegate Your Challenging Writing Tasks to Experienced Professionals

Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!

Check Out Our Sample Work

Dedication. Quality. Commitment. Punctuality

Categories
All samples
Essay (any type)
Essay (any type)
The Value of a Nursing Degree
Undergrad. (yrs 3-4)
Nursing
2
View this sample

It May Not Be Much, but It’s Honest Work!

Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.

0+

Happy Clients

0+

Words Written This Week

0+

Ongoing Orders

0%

Customer Satisfaction Rate
image

Process as Fine as Brewed Coffee

We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.

See How We Helped 9000+ Students Achieve Success

image

We Analyze Your Problem and Offer Customized Writing

We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.

  • Clear elicitation of your requirements.
  • Customized writing as per your needs.

We Mirror Your Guidelines to Deliver Quality Services

We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.

  • Proactive analysis of your writing.
  • Active communication to understand requirements.
image
image

We Handle Your Writing Tasks to Ensure Excellent Grades

We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.

  • Thorough research and analysis for every order.
  • Deliverance of reliable writing service to improve your grades.
Place an Order Start Chat Now
image

Order your essay today and save 30% with the discount code ESSAYHELP