Why Interop & Security are major issues in IOT?


Chandramouli Srinivasan

Target’s experimental smart home space – “Open House” is ready to blow your mind in San Francisco

This is an interesting display given that every Smart thing is brought into one place for a demo. Target
claims to be controlling all things using a single Mobile App like IFTTT. Many Smart Home Devices in the U.S. operate  on WiFi, Bluetooth & ZigBee. Every device manufacturer have their own gateway for aggregation.This display might actually throw light on the number of devices needed and the complexity existing to make devices of various manufacturer to work together to achieve a specific space. This is extremely challenging and I would expect Target to have a lot of SILO implementation that is struggling to talk to each other to accomplish automation of a specific use case for the user. This would be classic case of identifying IOT interoperability nightmare.

Strategy analytics reported top IOT Trends in 2015

Major trends predicted in IOT for 2015. As rest of the pieces of IOT emerge the one area that is lacking serious focus is security. Hence I have moved Security as top most item and moved other trends after security. As one of the other report stated companies like Google & Facebook already know much more about its user than the user itself.

The user gives away information in exchange of the service. The difference is between knowing vs. controlling. In IOT we are talking about giving control to AI algorithms to act on behalf of the user.

Here are the key trends

  • Data privacy and ownership will become a prominent issue in IoT
  • Security becomes paramount-risk-based security and context-based security emerges
  • New developer and connectivity platforms will continue to emerge
  • IoT becomes more personal: Mobile devices such as smartphones become a critical component of IoT
  • Apps will dominate IoT user interaction in 2015. This is a move towards a richer, more interactive”web of things”
  • IoT architecture will see more decentralization as elements move to the edge of the network
  • Location-aware systems will gather pace in industries such as retail and smart cities
  • New analytics tools will be needed to handle the diversity of IoT data

Pattern of Life Analytics(POL) & Internet of Things (IOT)

POL analytics is not restricted to military applications, although the recent uses of the term generally derive from military documents, specifically those of the NSA. As mentioned, the closest, most popular analogous term is “profiling”. The reported Target, Inc incident was about use of the information to focus marketing efforts on women it had identified as likely to be pregnant. Based on its data analytics, Target had sent pregnancy-related information to a high-school girl at her residence, also the residence of her parents. The angry father complained to Target, and then followed up with his daughter,  about whom he had not yet been informed that she was indeed pregnant.  That incident is an early, classic case of POL intelligence that illustrated the point that consumers do not welcome evident invasions of their privacy. This Target case could be considered to be classic POL analysis, or profiling.

Image Credit: pixabay

%d bloggers like this: