Module 4: IOT Flashcards
Quel est la définition du IOT?
il n’existe pas de définition standard, unifiée et partagée . Certaines insistent sur les aspects techniques de l’IdO, sur les usages et les fonctionnalités.
« L’Internet des objets se réfère à des objets identifiables de manière unique et à leur représentation virtuelle dans une structure de type Internet. » – Wikipedia
« L’Internet des objets est un réseau d’objets physiques contenant une technologie intégrée et permettant de communiquer et de détecter, ou d’interagir avec leurs états internes ou l’environnement externe. » – Gartner
« L’Internet des objets (IoT) est la représentation d’un nouveau concept dans l’univers des technologies de l’information et des communications, sur lequel réfléchissent les constructeurs informatiques, les fournisseurs de services et les intégrateurs de systèmes, du fait du potentiel considérable de nouveaux flux de chiffre d’affaires et de client. » – IDC
Quelles sont les caractéristiques du IOT?
Dans l’Internet des objets (IdO), les appareils se réunissent et partagent des informations directement entre eux et le nuage, ce qui permet de collecter, enregistrer et analyser les nouveaux flux de données plus rapide et plus précise.
Il est considéré comme la troisième évolution de l’Internet, ( Web3.0)
L’internet des objets revêt un caractère universel pour désigner des objets
connectés aux usages variés, dans le domaine de la e-santé, de la domotique ou du Quantified Self..
L’internet des objets est en partie responsable d’un accroissement exponentiel du volume de données générées sur le réseau, à l’origine du Big Data.
Il est constitué de milliards d’appareils, de capteurs et de puces électroniques communiquant via l’Internet.
Donnez une liste de caractéristiques de l’internet des objets.
- Ambient intelligence
- Flexible structure
- Semantic sharing
- Complex access technologies
- Event Driven
Quels sont les défis de IOT?
- security
- privacy
- interoperability and standards
- legal, regulatory, and rights
- emerging economies and development
- Spontaneous interaction – without the user’s involvement
- Ultra-large-networks and large number of devices
- Dynamic network and no infrastructure
- Context-aware : context is the key of IoT and its applications – data anlayzed, interpreted and understood
- Intelligence
- Location-aware
- Distributed
What are IOT security challenges?
Good Design Practices. What are the sets of best practices for engineers and developers to use to design IoT devices to make them more secure?
Cost vs. Security Trade-Offs. How do stakeholders make informed cost-benefit analysis decisions with respect to Internet of Things devices? How do we accurately quantify and assess the security risks?
Standards and Metrics. What is the role of technical and operational standards for the development and deployment of secure, well-behaving IoT devices?
Data Confidentiality, Authentication and Access Control. What is the optimal role of data encryption with respect to IoT devices? Is the use of strong encryption, authentication and access control technologies in IoT devices an adequate solution to prevent eavesdropping and hijacking attacks of the data streams these devices produce?
Field-Upgradeability. With an extended service life expected for many IoT devices, should devices be designed for maintainability and upgradeability in the field to adapt to evolving security threats?
Shared Responsibility. How can shared responsibility and collaboration for IoT security be encouraged across stakeholders?
Regulation. Should device manufacturers be penalized for selling software or hardware with known or unknown security flaws?
Device Obsolescence. What is the right approach to take with obsolete IoT devices as the Internet evolves and security threats change? Should IoT devices be required to have a built-in end-of-life expiration feature that disables them?
What are IOT privacy issues?
Fairness in Data Collection and Use. How do we resolve the marketplace relationship between data sources and data collectors in the context of IoT? Personal data has personal and commercial value that sources and collectors value differently, both individually and in aggregate; both parties have legitimate interests that may conflict.
Transparency, Expression, and Enforcement of Privacy Preferences. How can privacy policies and practices be made readily available and understandable in the context of IoT?
Wide-Ranging Privacy Expectations. Privacy norms and expectations are closely related to the social and cultural context of the user, which will vary from one group or nation to another.
Privacy by Design. How can we encourage IoT device manufacturers to integrate privacy-by- design principles into their core values?
Identification. How should we protect data collected by IoT that appears not to be personal at the point of collection or has been “de-identified”, but may at some point in the future become personal data (e.g. because data can be re-identified or combined with other data)?
What are iteroperability issues?
Proprietary Ecosystems and Consumer Choice. Some device manufacturers see a market advantage to creating a proprietary ecosystem of compatible IoT products, sometimes called “walled gardens”, which limit interoperability to only those devices and components within the brand product line. For example, in the home automation market, light bulbs from one vendor may not be interoperable with a light switch or control system manufactured by another.
Technical and Cost Constraints. As manufacturers develop IoT devices, there are inherent technical, time to market, and cost constraints that factor into device interoperability and design. Some devices are constrained by technical factors like limited internal processing resources, memory, or power consumption demands.
Schedule Risk. In a globally competitive market, there is often a first-mover advantage to bringing a product to market quickly and establishing market share, and this certainly applies to IoT device manufacturers
Technical Risk. When an IoT device manufacturer or user is planning the development of a product, they need to assess technical design risks of protocols in the development process. Incorporating existing and proven standards into product or system designs can represent a lower technical risk compared to the development and use of proprietary protocols.
Devices Behaving Badly. Lack of standards and documented best practices have a greater impact than just limiting the potential of IoT devices. In a passive way, absence of these standards can enable bad behavior by IoT devices
Legacy Systems. Interoperability standardization is a challenge for new IoT devices that need to interface with systems already deployed and operating. This is relevant to many industry-specific and application-specific environments that have established networks of devices.
Qu’est-ce qu’un middleware et à quoi servent-ils?
In general, middleware can ease a development process by integrating heterogeneous computing and communications devices, and supporting interoperability within the diverse applications and services.
A middleware provides a software layer between applications, the operating system and the network communications layers, which facilitates and coordinates some aspect of cooperative processing.
Quelles sont les caractéristiques d’une infrastructure IOT?
Heterogeneous devices Resources constraints Spontaneous interaction Ultra large scale networks Large number of events Dynamics network No infrastructure Context aware Intelligence Location aware Distributed
Quelles sont les types d’application IOT?
Diverse applications Real Time (on-time) delivery Everything-as-a-service Increased security atack Privacy leakage
Qu’est-ce que le 3V du Big Data?
- Le Volume (taille de données)
- La Vitesse (le debit dont on a géneré les données, ou pour les traiter)
- La Varieté (hétérogeneté des données)