词条 | Internet of things | |||||||||||||||||||||||||||||||||||||||||||
释义 |
The Internet of things (IoT) is the extension of Internet connectivity into physical devices and everyday objects. Embedded with electronics, Internet connectivity, and other forms of hardware (such as sensors), these devices can communicate and interact with others over the Internet, and they can be remotely monitored and controlled.[1][2][3][4] The definition of the Internet of things has evolved due to convergence of multiple technologies, real-time analytics, machine learning, commodity sensors, and embedded systems.[5] Traditional fields of embedded systems, wireless sensor networks, control systems, automation (including home and building automation), and others all contribute to enabling the Internet of things. In the consumer market, IoT technology is most synonymous with products pertaining to the concept of the "smart home", covering devices and appliances (such as lighting fixtures, thermostats, home security systems and cameras, and other home appliances) that support one or more common ecosystems, and can be controlled via devices associated with that ecosystem, such as smartphones and smart speakers. The IoT concept has faced prominent criticism, especially in regards to privacy and security concerns related to these devices and their intention of pervasive presence. HistoryThe concept of a network of smart devices was discussed as early as 1982, with a modified Coke vending machine at Carnegie Mellon University becoming the first Internet-connected appliance,[6] able to report its inventory and whether newly loaded drinks were cold or not.[7] Mark Weiser's 1991 paper on ubiquitous computing, "The Computer of the 21st Century", as well as academic venues such as UbiComp and PerCom produced the contemporary vision of the IoT.[8][9] In 1994, Reza Raji described the concept in IEEE Spectrum as "[moving] small packets of data to a large set of nodes, so as to integrate and automate everything from home appliances to entire factories".[10] Between 1993 and 1997, several companies proposed solutions like Microsoft's at Work or Novell's NEST. The field gained momentum when Bill Joy envisioned device-to-device communication as a part of his "Six Webs" framework, presented at the World Economic Forum at Davos in 1999.[11] The term "Internet of things" was likely coined by Kevin Ashton of Procter & Gamble, later MIT's Auto-ID Center, in 1999,[12] though he prefers the phrase "Internet for things".[13] At that point, he viewed Radio-frequency identification (RFID) as essential to the Internet of things,[14] which would allow computers to manage all individual things.[15][16][17] A research article mentioning the Internet of Things was submitted to the conference for Nordic Researchers in Norway, in June 2002,[18] which was preceded by an article published in Finnish in January 2002.[19] The implementation described there was developed by Kary Främling and his team at Helsinki University of Technology and more closely matches the modern one, i.e. an information system infrastructure for implementing smart, connected objects.[20] Defining the Internet of things as "simply the point in time when more 'things or objects' were connected to the Internet than people", Cisco Systems estimated that the IoT was "born" between 2008 and 2009, with the things/people ratio growing from 0.08 in 2003 to 1.84 in 2010.[21] ApplicationsThe extensive set of applications for IoT devices[22] is often divided into consumer, commercial, industrial, and infrastructure spaces.[23][24] Consumer applicationsA growing portion of IoT devices are created for consumer use, including connected vehicles, home automation, wearable technology (as part of Internet of Wearable Things (IoWT)[25]), connected health, and appliances with remote monitoring capabilities.[26] Smart homeIoT devices are a part of the larger concept of home automation, which can include lighting, heating and air conditioning, media and security systems.[27][28] Long term benefits could include energy savings by automatically ensuring lights and electronics are turned off. A smart home or automated home could be based on a platform or hubs that control smart devices and appliances.[29] For instance, using Apple's HomeKit, manufacturers can have their home products and accessories controlled by an application in iOS devices such as the iPhone and the Apple Watch.[30][31] This could be a dedicated app or iOS native applications such as Siri.[32] This can be demonstrated in the case of Lenovo's Smart Home Essentials, which is a line of smart home devices that are controlled through Apple's Home app or Siri without the need for a Wi-Fi bridge.[32] There are also dedicated smart home hubs that are offered as standalone platforms to connect different smart home products and these include the Amazon Echo, Google Home, Apple's HomePod, and Samsung's SmartThings Hub.[33] Elder careOne key application of smart home is to provide assistance for those with disabilities and elderly individuals. These home systems use assistive technology to accommodate an owner's specific disabilities.[34] Voice control can assist users with sight and mobility limitations while alert systems can be connected directly to cochlear implants worn by hearing impaired users.[35] They can also be equipped with additional safety features. These features can include sensors that monitor for medical emergencies such as falls or seizures.[36] Smart home technology applied in this way can provide users with more freedom and a higher quality of life.[34] The term "Enterprise IoT" refers to devices used in business and corporate settings. By 2019, it is estimated that the EIoT will account for 9.1 billion devices.[23] Commercial applicationMedical and healthcareThe Internet of Medical Things (also called the internet of health things) is an application of the IoT for medical and health related purposes, data collection and analysis for research, and monitoring.[37][38][39][40][41] This 'Smart Healthcare',[42] as it is also called, led to the creation of a digitized healthcare system, connecting available medical resources and healthcare services.[43] IoT devices can be used to enable remote health monitoring and emergency notification systems. These health monitoring devices can range from blood pressure and heart rate monitors to advanced devices capable of monitoring specialized implants, such as pacemakers, Fitbit electronic wristbands, or advanced hearing aids.[44] Some hospitals have begun implementing "smart beds" that can detect when they are occupied and when a patient is attempting to get up. It can also adjust itself to ensure appropriate pressure and support is applied to the patient without the manual interaction of nurses.[37] A 2015 Goldman Sachs report indicated that healthcare IoT devices "can save the United States more than $300 billion in annual healthcare expenditures by increasing revenue and decreasing cost."[45][46] Moreover, the use of mobile devices to support medical follow-up led to the creation of 'm-health', used "to analyze, capture, transmit and store health statistics from multiple resources, including sensors and other biomedical acquisition systems".[47] Specialized sensors can also be equipped within living spaces to monitor the health and general well-being of senior citizens, while also ensuring that proper treatment is being administered and assisting people regain lost mobility via therapy as well.[48] These sensors create a network of intelligent sensors that are able to collect, process, transfer and analyse valuable information in different environments, such as connecting in-home monitoring devices to hospital-based systems.[42] Other consumer devices to encourage healthy living, such as connected scales or wearable heart monitors, are also a possibility with the IoT.[49] End-to-end health monitoring IoT platforms are also available for antenatal and chronic patients, helping one manage health vitals and recurring medication requirements.[50] Advances in plastic and fabric electronics fabrication methods have enabled ultra-low cost, use-and-throw IoMT sensors. These sensors, along with the required RFID electronics, can be fabricated on paper or e-textiles for wirelessly powered disposable sensing devices.[51] Applications have been established for point-of-care medical diagnostics, where portability and low system-complexity is essential.[52] {{as of|2018}} IoMT was not only being applied in the clinical laboratory industry,[39] but also in the healthcare and health insurance industries. IoMT in the healthcare industry is now permitting doctors, patients and others involved (i.e. guardians of patients, nurses, families, etc.) to be part of a system, where patient records are saved in a database, allowing doctors and the rest of the medical staff to have access to the patient's information.[43] Moreover, IoT-based systems are patient-centered, which involves being flexible to the patient's medical conditions.[43] IoMT in the insurance industry provides access to better and new types of dynamic information. This includes sensor-based solutions such as biosensors, wearables, connected health devices and mobile apps to track customer behaviour. This can lead to more accurate underwriting and new pricing models.[53]The application of the IOT in healthcare plays a fundamental role in managing chronic diseases and in disease prevention and control. Remote monitoring is made possible through the connection of powerful wireless solutions. The connectivity enables health practitioners to capture patient’s data and applying complex algorithms in health data analysis.[54] TransportationThe IoT can assist in the integration of communications, control, and information processing across various transportation systems. Application of the IoT extends to all aspects of transportation systems (i.e. the vehicle,[55] the infrastructure, and the driver or user). Dynamic interaction between these components of a transport system enables inter and intra vehicular communication,[56] smart traffic control, smart parking, electronic toll collection systems, logistic and fleet management, vehicle control, safety and road assistance.[44][57] In Logistics and Fleet Management for example, an IoT platform can continuously monitor the location and conditions of cargo and assets via wireless sensors and send specific alerts when management exceptions occur (delays, damages, thefts, etc.). This can only be possible with the IoT and its seamless connectivity among devices. Sensors such as GPS, Humidity, Temperature, send data to the IoT platform and then the data is analyzed and send further to the users. This way, users can track the real-time status of vehicles and can make appropriate decisions. If combined with Machine Learning then it also helps in reducing traffic accidents by introducing drowsiness alerts to drivers and providing self-driven cars too. V2X CommunicationsIoT enables vehicle-to-everything communication (V2X), which consists of three main components of connected environment: vehicle to vehicle communication (V2V), vehicle to infrastructure communication (V2I) and vehicle to pedestrian communications (V2P). V2V empowers vehicles to exchange data, V2I allows them to network with the transport infrastructure (traffic signs and lights etc.) and V2P senses signals from the users smartphones to prevent collisions, involving pedestrians. By constantly analyzing real-time data, V2X designs a transport ecosystem where vehicles, infrastructure and people are interconnected with each other to keep the environment safe from any type of accidents. V2X is the first step to autonomous driving and connected road infrastructure that provides connected cars with needed safety. Building and home automationIoT devices can be used to monitor and control the mechanical, electrical and electronic systems used in various types of buildings (e.g., public and private, industrial, institutions, or residential)[44] in home automation and building automation systems. In this context, three main areas are being covered in literature:[58]
Industrial applications{{main|Industrial Internet of Things}}{{anchor|IIoT}}ManufacturingThe IoT can realize the seamless integration of various manufacturing devices equipped with sensing, identification, processing, communication, actuation, and networking capabilities. Based on such a highly integrated smart cyberphysical space, it opens the door to create whole new business and market opportunities for manufacturing.[60] Network control and management of manufacturing equipment, asset and situation management, or manufacturing process control bring the IoT within the realm of industrial applications and smart manufacturing as well.[61] The IoT intelligent systems enable rapid manufacturing of new products, dynamic response to product demands, and real-time optimization of manufacturing production and supply chain networks, by networking machinery, sensors and control systems together.[44] Digital control systems to automate process controls, operator tools and service information systems to optimize plant safety and security are within the purview of the IoT.[62] But it also extends itself to asset management via predictive maintenance, statistical evaluation, and measurements to maximize reliability.[63] Smart industrial management systems can also be integrated with the Smart Grid, thereby enabling real-time energy optimization. Measurements, automated controls, plant optimization, health and safety management, and other functions are provided by a large number of networked sensors.[44]The term industrial Internet of things (IIoT) is often encountered in the manufacturing industries, referring to the industrial subset of the IoT. IIoT in manufacturing could generate so much business value that it will eventually lead to the Fourth Industrial Revolution, so the so-called Industry 4.0. It is estimated that in the future, successful companies will be able to increase their revenue through Internet of things by creating new business models and improve productivity, exploit analytics for innovation, and transform workforce.[64] The potential of growth by implementing IIoT may generate $12 trillion of global GDP by 2030.[64] Industrial big data analytics will play a vital role in manufacturing asset predictive maintenance, although that is not the only capability of industrial big data.[66][67] Cyber-physical systems (CPS) is the core technology of industrial big data and it will be an interface between human and the cyber world. Cyber-physical systems can be designed by following the 5C (connection, conversion, cyber, cognition, configuration) architecture,[65] and it will transform the collected data into actionable information, and eventually interfere with the physical assets to optimize processes. An IoT-enabled intelligent system of such cases was proposed in 2001 and later demonstrated in 2014 by the National Science Foundation Industry/University Collaborative Research Center for Intelligent Maintenance Systems (IMS) at the University of Cincinnati on a bandsaw machine in IMTS 2014 in Chicago.[68][69][70] Bandsaw machines are not necessarily expensive, but the bandsaw belt expenses are enormous since they degrade much faster. However, without sensing and intelligent analytics, it can be only determined by experience when the band saw belt will actually break. The developed prognostics system will be able to recognize and monitor the degradation of band saw belts even if the condition is changing, advising users when is the best time to replace the belt. This will significantly improve user experience and operator safety and ultimately save on costs.[70] AgricultureThere are numerous IoT applications in farming[71] such as collecting data on temperature, rainfall, humidity, wind speed, pest infestation, and soil content. This data can be used to automate farming techniques, take informed decisions to improve quality and quantity, minimize risk and waste, and reduce effort required to manage crops. For example, farmers can now monitor soil temperature and moisture from afar, and even apply IoT-acquired data to precision fertilization programs.[72] In August 2018, Toyota Tsusho began a partnership with Microsoft to create fish farming tools using the Microsoft Azure application suite for IoT technologies related to water management. Developed in part by researchers from Kindai University, the water pump mechanisms use artificial intelligence to count the number of fish on a conveyor belt, analyze the number of fish, and deduce the effectiveness of water flow from the data the fish provide. The specific computer programs used in the process fall under the Azure Machine Learning and the Azure IoT Hub platforms.[73] Infrastructure applicationsMonitoring and controlling operations of sustainable urban and rural infrastructures like bridges, railway tracks and on- and offshore wind-farms is a key application of the IoT.[62] The IoT infrastructure can be used for monitoring any events or changes in structural conditions that can compromise safety and increase risk. The IoT can benefit the construction industry by cost saving, time reduction, better quality workday, paperless workflow and increase in productivity. It can help in taking faster decisions and save money with Real-Time Data Analytics. It can also be used for scheduling repair and maintenance activities in an efficient manner, by coordinating tasks between different service providers and users of these facilities.[44] IoT devices can also be used to control critical infrastructure like bridges to provide access to ships. Usage of IoT devices for monitoring and operating infrastructure is likely to improve incident management and emergency response coordination, and quality of service, up-times and reduce costs of operation in all infrastructure related areas.[74] Even areas such as waste management can benefit[75] from automation and optimization that could be brought in by the IoT.[76] Metropolitan scale deploymentsThere are several planned or ongoing large-scale deployments of the IoT, to enable better management of cities and systems. For example, Songdo, South Korea, the first of its kind fully equipped and wired smart city, is gradually being built, with approximately 70 percent of the business district completed {{as of|2018|June|lc=y}}. Much of the city is planned to be wired and automated, with little or no human intervention.[77] Another application is a currently undergoing project in Santander, Spain. For this deployment, two approaches have been adopted. This city of 180,000 inhabitants has already seen 18,000 downloads of its city smartphone app. The app is connected to 10,000 sensors that enable services like parking search, environmental monitoring, digital city agenda, and more. City context information is used in this deployment so as to benefit merchants through a spark deals mechanism based on city behavior that aims at maximizing the impact of each notification.[78] Other examples of large-scale deployments underway include the Sino-Singapore Guangzhou Knowledge City;[79] work on improving air and water quality, reducing noise pollution, and increasing transportation efficiency in San Jose, California;[80] and smart traffic management in western Singapore.[81] French company, Sigfox, commenced building an Ultra Narrowband wireless data network in the San Francisco Bay Area in 2014, the first business to achieve such a deployment in the U.S.[82][83] It subsequently announced it would set up a total of 4000 base stations to cover a total of 30 cities in the U.S. by the end of 2016, making it the largest IoT network coverage provider in the country thus far.[84][85] Cisco also participates in smart cities projects. Cisco has started deploying technologies for Smart Wi-Fi, Smart Safety & Security, Smart Lighting, Smart Parking, Smart Transports, Smart Bus Stops, Smart Kiosks, Remote Expert for Government Services (REGS) and Smart Education in the five km area in the city of Vijaywada.[86] Another example of a large deployment is the one completed by New York Waterways in New York City to connect all the city's vessels and be able to monitor them live 24/7. The network was designed and engineered by Fluidmesh Networks, a Chicago-based company developing wireless networks for critical applications. The NYWW network is currently providing coverage on the Hudson River, East River, and Upper New York Bay. With the wireless network in place, NY Waterway is able to take control of its fleet and passengers in a way that was not previously possible. New applications can include security, energy and fleet management, digital signage, public Wi-Fi, paperless ticketing and others.[87] Energy managementSignificant numbers of energy-consuming devices (e.g. switches, power outlets, bulbs, televisions, etc.) already integrate Internet connectivity, which can allow them to communicate with utilities to balance power generation and energy usage[88] and optimize energy consumption as a whole.[44] These devices allow for remote control by users, or central management via a cloud-based interface, and enable functions like scheduling (e.g., remotely powering on or off heating systems, controlling ovens, changing lighting conditions etc.).[44] The smart grid is a utility-side IoT application; systems gather and act on energy and power-related information to improve the efficiency of the production and distribution of electricity.[88] Using advanced metering infrastructure (AMI) Internet-connected devices, electric utilities not only collect data from end-users, but also manage distribution automation devices like transformers.[44] Environmental monitoringEnvironmental monitoring applications of the IoT typically use sensors to assist in environmental protection[89] by monitoring air or water quality,[90] atmospheric or soil conditions,[91] and can even include areas like monitoring the movements of wildlife and their habitats.[92] Development of resource-constrained devices connected to the Internet also means that other applications like earthquake or tsunami early-warning systems can also be used by emergency services to provide more effective aid. IoT devices in this application typically span a large geographic area and can also be mobile.[44] It has been argued that the standardization IoT brings to wireless sensing will revolutionize this area.[93]Living LabAnother example of integrating the IoT is Living Lab which integrates and combines research and innovation process, establishing within a public-private-people-partnership.[94] There are currently 320 Living Labs that use the IoT to collaborate and share knowledge between stakeholders to co-create innovative and technological products. For companies to implement and develop IoT services for smart cities, they need to have incentives. The governments play key roles in smart cities projects as changes in policies will help cities to implement the IoT which provides effectiveness, efficiency, and accuracy of the resources that are being used. For instance, the government provides tax incentives and cheap rent, improves public transports, and offers an environment where start-up companies, creative industries, and multinationals may co-create, share common infrastructure and labor markets, and take advantages of locally embedded technologies, production process, and transaction costs.[94] The relationship between the technology developers and governments who manage city's assets, is key to provide open access of resources to users in an efficient way. Trends and characteristicsThe IoT's major significant trend in recent years is the explosive growth of devices connected and controlled by the Internet.[95] The wide range of applications for IoT technology mean that the specifics can be very different from one device to the next but there are basic characteristics shared by most. The IoT creates opportunities for more direct integration of the physical world into computer-based systems, resulting in efficiency improvements, economic benefits, and reduced human exertions.[96][97][98][99] The number of IoT devices increased 31% year-over-year to 8.4 billion in the year 2017[100] and it is estimated that there will be 30 billion devices by 2020.[95] The global market value of IoT is projected to reach $7.1 trillion by 2020.[101] IntelligenceAmbient intelligence and autonomous control are not part of the original concept of the Internet of things. Ambient intelligence and autonomous control do not necessarily require Internet structures, either. However, there is a shift in research (by companies such as Intel) to integrate the concepts of the IoT and autonomous control, with initial outcomes towards this direction considering objects as the driving force for autonomous IoT.[102] A promising approach in this context is deep reinforcement learning where most of IoT systems provide a dynamic and interactive environment.[103] Training an agent (i.e., IoT device) to behave smartly in such an environment cannot be addressed by conventional machine learning algorithms such as supervised learning. By reinforcement learning approach, a learning agent can sense the environment’s state (e.g., sensing home temperature), perform actions (e.g., turn HVAC on or off) and learn through the maximizing accumulated rewards it receives in long term. IoT intelligence can be offered at three levels: IoT devices, Edge/Fog nodes, and Cloud computing.[104] The need for intelligent control and decision at each level depends on the time sensitiveness of the IoT application. For example, an autonomous vehicle's camera needs to make real-time obstacle detection to avoid an accident. This fast decision making would not be possible through transferring data from the vehicle to cloud instances and return the predictions back to the vehicle. Instead, all the operation should be performed locally in the vehicle. Integrating advanced machine learning algorithms including deep learning into IoT devices is an active research area to make smart objects closer to reality. Moreover, it is possible to get the most value out of IoT deployments through analyzing IoT data, extracting hidden information, and predicting control decisions. A wide variety of machine learning techniques have been used in IoT domain ranging from traditional methods such as regression, support vector machine, and random forest to advanced ones such as convolutional neural networks, LSTM, and variational autoencoder.[105][104] In the future, the Internet of Things may be a non-deterministic and open network in which auto-organized or intelligent entities (web services, SOA components) and virtual objects (avatars) will be interoperable and able to act independently (pursuing their own objectives or shared ones) depending on the context, circumstances or environments. Autonomous behavior through the collection and reasoning of context information as well as the object's ability to detect changes in the environment (faults affecting sensors) and introduce suitable mitigation measures constitutes a major research trend,[106] clearly needed to provide credibility to the IoT technology. Modern IoT products and solutions in the marketplace use a variety of different technologies to support such context-aware automation, but more sophisticated forms of intelligence are requested to permit sensor units and intelligent cyber-physical systems to be deployed in real environments.[107] Architecture{{Expert needed|Technology|section|talk=|reason=The information is partially outdated, unclear, and uncited. Requires more details, but not so technical that others won't understand it.|date=July 2018}}IoT system architecture, in its simplistic view, consists of three tiers: Tier 1: Devices, Tier 2: the Edge Gateway, and Tier 3: the Cloud.[108] Devices include networked things, such as the sensors and actuators found in IIoT equipment, particularly those that use protocols such as Modbus, Zigbee, or proprietary protocols, to connect to an Edge Gateway.[108] The Edge Gateway consists of sensor data aggregation systems called Edge Gateways that provide functionality, such as pre-processing of the data, securing connectivity to cloud, using systems such as WebSockets, the event hub, and, even in some cases, edge analytics or fog computing.[108] The final tier includes the cloud application built for IIoT using the microservices architecture, which are usually polyglot and inherently secure in nature using HTTPS/OAuth. It includes various database systems that store sensor data, such as time series databases or asset stores using backend data storage systems (e.g. Cassandra, Postgres).[108] The cloud tier in most cloud-based IoT system features event queuing and messaging system that handles communication that transpires in all tiers.[109] Some experts classified the three-tiers in the IIoT system as edge, platform, and enterprise and these are connected by proximity network, access network, and service network, respectively.[110] Building on the Internet of things, the web of things is an architecture for the application layer of the Internet of things looking at the convergence of data from IoT devices into Web applications to create innovative use-cases. In order to program and control the flow of information in the Internet of things, a predicted architectural direction is being called BPM Everywhere which is a blending of traditional process management with process mining and special capabilities to automate the control of large numbers of coordinated devices.{{citation needed|date=May 2017}} Network architectureThe Internet of things requires huge scalability in the network space to handle the surge of devices.[111] IETF 6LoWPAN would be used to connect devices to IP networks. With billions of devices[112] being added to the Internet space, IPv6 will play a major role in handling the network layer scalability. IETF's Constrained Application Protocol, ZeroMQ, and MQTT would provide lightweight data transport. Fog computing is a viable alternative to prevent such large burst of data flow through Internet.[113] The edge devices' computation power can be used to analyse and process data, thus providing easy real time scalability.{{citation needed|date=May 2017}} ComplexityIn semi-open or closed loops (i.e. value chains, whenever a global finality can be settled) the IoT will often be considered and studied as a complex system[114] due to the huge number of different links, interactions between autonomous actors, and its capacity to integrate new actors. At the overall stage (full open loop) it will likely be seen as a chaotic environment (since systems always have finality). As a practical approach, not all elements in the Internet of things run in a global, public space. Subsystems are often implemented to mitigate the risks of privacy, control and reliability. For example, domestic robotics (domotics) running inside a smart home might only share data within and be available via a local network.[115] Managing and controlling a high dynamic ad hoc IoT things/devices network is a tough task with the traditional networks architecture, Software Defined Networking (SDN) provides the agile dynamic solution that can cope with the special requirements of the diversity of innovative IoT applications.[116] Size considerationsThe Internet of things would encode 50 to 100 trillion objects, and be able to follow the movement of those objects. Human beings in surveyed urban environments are each surrounded by 1000 to 5000 trackable objects.[117] In 2015 there were already 83 million smart devices in people's homes. This number is about to grow up to 193 million devices in 2020 and will for sure go on growing in the near future.[28] The figure of online capable devices grew 31% from 2016 to 8.4 billion in 2017.[100] Space considerationsIn the Internet of things, the precise geographic location of a thing—and also the precise geographic dimensions of a thing—will be critical.[118] Therefore, facts about a thing, such as its location in time and space, have been less critical to track because the person processing the information can decide whether or not that information was important to the action being taken, and if so, add the missing information (or decide to not take the action). (Note that some things in the Internet of things will be sensors, and sensor location is usually important.[119]) The GeoWeb and Digital Earth are promising applications that become possible when things can become organized and connected by location. However, the challenges that remain include the constraints of variable spatial scales, the need to handle massive amounts of data, and an indexing for fast search and neighbor operations. In the Internet of things, if things are able to take actions on their own initiative, this human-centric mediation role is eliminated. Thus, the time-space context that we as humans take for granted must be given a central role in this information ecosystem. Just as standards play a key role in the Internet and the Web, geospatial standards will play a key role in the Internet of things.[120][121] A solution to "basket of remotes"Many IoT devices have a potential to take a piece of this market. Jean-Louis Gassée (Apple initial alumni team, and BeOS co-founder) has addressed this topic in an article on Monday Note,[122] where he predicts that the most likely problem will be what he calls the "basket of remotes" problem, where we'll have hundreds of applications to interface with hundreds of devices that don't share protocols for speaking with one another.[122] For improved user interaction, some technology leaders are joining forces to create standards for communication between devices to solve this problem. Others are turning to the concept of predictive interaction of devices, "where collected data is used to predict and trigger actions on the specific devices" while making them work together.[123] Enabling technologies for IoTThere are many technologies that enable the IoT. Crucial to the field is the network used to communicate between devices of an IoT installation, a role that several wireless or wired technologies may fulfill:[124][125][126] AddressabilityThe original idea of the Auto-ID Center is based on RFID-tags and distinct identification through the Electronic Product Code. This has evolved into objects having an IP address or URI.[127] An alternative view, from the world of the Semantic Web[128] focuses instead on making all things (not just those electronic, smart, or RFID-enabled) addressable by the existing naming protocols, such as URI. The objects themselves do not converse, but they may now be referred to by other agents, such as powerful centralized servers acting for their human owners.[129] Integration with the Internet implies that devices will use an IP address as a distinct identifier. Due to the limited address space of IPv4 (which allows for 4.3 billion different addresses), objects in the IoT will have to use the next generation of the Internet protocol (IPv6) to scale to the extremely large address space required.[130][131][132] Internet-of-things devices additionally will benefit from the stateless address auto-configuration present in IPv6,[133] as it reduces the configuration overhead on the hosts,[131] and the IETF 6LoWPAN header compression. To a large extent, the future of the Internet of things will not be possible without the support of IPv6; and consequently, the global adoption of IPv6 in the coming years will be critical for the successful development of the IoT in the future.[132] Short-range wireless
Medium-range wireless
Long-range wireless
Wired
Standards and standards organizations{{Expand section |date=September 2016}}This is a list of technical standards for the IoT, most of which are open standards, and the standards organizations that aspire to successfully setting them.[134][135]
Politics and civic engagementSome scholars and activists argue that the IoT can be used to create new models of civic engagement if device networks can be open to user control and inter-operable platforms. Philip N. Howard, a professor and author, writes that political life in both democracies and authoritarian regimes will be shaped by the way the IoT will be used for civic engagement. For that to happen, he argues that any connected device should be able to divulge a list of the "ultimate beneficiaries" of its sensor data and that individual citizens should be able to add new organizations to the beneficiary list. In addition, he argues that civil society groups need to start developing their IoT strategy for making use of data and engaging with the public.[136] Government regulation on IoTOne of the key drivers of the IoT is data. The success of the idea of connecting devices to make them more efficient is dependent upon access to and storage & processing of data. For this purpose, companies working on the IoT collect data from multiple sources and store it in their cloud network for further processing. This leaves the door wide open for privacy and security dangers and single point vulnerability of multiple systems.[137] The other issues pertain to consumer choice and ownership of data[138] and how it is used. Though still in their infancy, regulations and governance regarding these issues of privacy, security, and data ownership continue to develop.[139][140][141] IoT regulation depends on the country. Some examples of legislation that is relevant to privacy and data collection are: the US Privacy Act of 1974, OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data of 1980, and the EU Directive 95/46/EC of 1995.[142] Current regulatory environment: A report published by the Federal Trade Commission (FTC) in January 2015 made the following three recommendations:[143]
However, the FTC stopped at just making recommendations for now. According to an FTC analysis, the existing framework, consisting of the FTC Act, the Fair Credit Reporting Act, and the Children's Online Privacy Protection Act, along with developing consumer education and business guidance, participation in multi-stakeholder efforts and advocacy to other agencies at the federal, state and local level, is sufficient to protect consumer rights.[145] A resolution passed by the Senate in March 2015, is already being considered by the Congress.[146] This resolution recognized the need for formulating a National Policy on IoT and the matter of privacy, security and spectrum. Furthermore, to provide an impetus to the IoT ecosystem, in March 2016, a bipartisan group of four Senators proposed a bill, The Developing Innovation and Growing the Internet of Things (DIGIT) Act, to direct the Federal Communications Commission to assess the need for more spectrum to connect IoT devices. Several standards for the IoT industry are actually being established relating to automobiles because most concerns arising from use of connected cars apply to healthcare devices as well. In fact, the National Highway Traffic Safety Administration (NHTSA) is preparing cybersecurity guidelines and a database of best practices to make automotive computer systems more secure.[147] A recent report from the World Bank examines the challenges and opportunities in government adoption of IoT.[148] These include –
Criticism and controversiesPlatform fragmentationThe IoT suffers from platform fragmentation and lack of technical standards[149][150][151][152][153][154][155] a situation where the variety of IoT devices, in terms of both hardware variations and differences in the software running on them, makes the task of developing applications that work consistently between different inconsistent technology ecosystems hard.[1] For example, wireless connectivity for IoT devices can be done using Bluetooth, Zigbee, Z-Wave, LoRa, NB-IoT, Cat M1 as well as completely custom proprietary radios, each with its own advantages and disadvantages, creating a separate ecosystem for IoT devices[156]. Customers may be hesitant to bet their IoT future on a proprietary software or hardware devices that uses proprietary protocols that may fade or become difficult to customize and interconnect.[2] The IoT's amorphous computing nature is also a problem for security, since patches to bugs found in the core operating system often do not reach users of older and lower-price devices.[157][158][159] One set of researchers say that the failure of vendors to support older devices with patches and updates leaves more than 87% of active Android devices vulnerable.[160][161] Privacy, autonomy, and controlPhilip N. Howard, a professor and author, writes that the Internet of things offers immense potential for empowering citizens, making government transparent, and broadening information access. Howard cautions, however, that privacy threats are enormous, as is the potential for social control and political manipulation.[162]Concerns about privacy have led many to consider the possibility that big data infrastructures such as the Internet of things and data mining are inherently incompatible with privacy.[163] Writer Adam Greenfield claims that these technologies are not only an invasion of public space but are also being used to perpetuate normative behavior, citing an instance of billboards with hidden cameras that tracked the demographics of passersby who stopped to read the advertisement.[164] The Internet of Things Council compared the increased prevalence of digital surveillance due to the Internet of things to the conceptual panopticon described by Jeremy Bentham in the 18th Century.[165] The assertion was defended by the works of French philosophers Michel Foucault and Gilles Deleuze. In Discipline and Punish: The Birth of the Prison Foucault asserts that the panopticon was a central element of the discipline society developed during the Industrial Era.[166] Foucault also argued that the discipline systems established in factories and school reflected Bentham's vision of panopticism.[166] In his 1992 paper "Postscripts on the Societies of Control," Deleuze wrote that the discipline society had transitioned into a control society, with the computer replacing the panopticon as an instrument of discipline and control while still maintaining the qualities similar to that of panopticism.[167] The privacy of households could be compromised by solely analyzing smart home network traffic patterns without dissecting the contents of encrypted application data, yet a synthetic packet injection scheme can be used to safely overcome such invasion of privacy.[168] Peter-Paul Verbeek, a professor of philosophy of technology at the University of Twente, Netherlands, writes that technology already influences our moral decision making, which in turn affects human agency, privacy and autonomy. He cautions against viewing technology merely as a human tool and advocates instead to consider it as an active agent.[169]Justin Brookman, of the Center for Democracy and Technology, expressed concern regarding the impact of the IoT on consumer privacy, saying that "There are some people in the commercial space who say, 'Oh, big data — well, let's collect everything, keep it around forever, we'll pay for somebody to think about security later.' The question is whether we want to have some sort of policy framework in place to limit that."[170] Tim O'Reilly believes that the way companies sell the IoT devices on consumers are misplaced, disputing the notion that the IoT is about gaining efficiency from putting all kinds of devices online and postulating that the "IoT is really about human augmentation. The applications are profoundly different when you have sensors and data driving the decision-making."[171]Editorials at WIRED have also expressed concern, one stating "What you're about to lose is your privacy. Actually, it's worse than that. You aren't just going to lose your privacy, you're going to have to watch the very concept of privacy be rewritten under your nose."[172] The American Civil Liberties Union (ACLU) expressed concern regarding the ability of IoT to erode people's control over their own lives. The ACLU wrote that "There's simply no way to forecast how these immense powers – disproportionately accumulating in the hands of corporations seeking financial advantage and governments craving ever more control – will be used. Chances are big data and the Internet of things will make it harder for us to control our own lives, as we grow increasingly transparent to powerful corporations and government institutions that are becoming more opaque to us."[173] In response to rising concerns about privacy and smart technology, in 2007 the British Government stated it would follow formal Privacy by Design principles when implementing their smart metering program. The program would lead to replacement of traditional power meters with smart power meters, which could track and manage energy usage more accurately.[174] However the British Computer Society is doubtful these principles were ever actually implemented.[175] In 2009 the Dutch Parliament rejected a similar smart metering program, basing their decision on privacy concerns. The Dutch program later revised and passed in 2011.[175] Data storageA challenge for producers of IoT applications is to clean, process and interpret the vast amount of data which is gathered by the sensors. There is a solution proposed for the analytics of the information referred to as Wireless Sensor Networks.[176] These networks share data among sensor nodes that are sent to a distributed system for the analytics of the sensory data.[177] Another challenge is the storage of this bulk data. Depending on the application, there could be high data acquisition requirements, which in turn lead to high storage requirements. Currently the Internet is already responsible for 5% of the total energy generated,[176] and a "daunting challenge to power" IoT devices to collect and even store data still remains.[178] SecurityConcerns have been raised that the IoT is being developed rapidly without appropriate consideration of the profound security challenges involved[179] and the regulatory changes that might be necessary.[180][181] Most of the technical security concerns are similar to those of conventional servers, workstations and smartphones, but security challenges unique to the IoT continue to develop, including industrial security controls, hybrid systems, IoT-specific business processes, and end nodes.[182] Security is the biggest concern in adopting Internet of things technology.[183] In particular, as the Internet of things spreads widely, cyber attacks are likely to become an increasingly physical (rather than simply virtual) threat.[184] The current IoT space comes with numerous security vulnerabilities. These vulnerabilities include weak authentication (IoT devices are being used with default credentials), unencrypted messages sent between devices, SQL injections and lack of verification or encryption of software updates.[185] This allows attackers to easily intercept data to collect PII (Personally Identifiable Information), user credentials can be stolen at login or malware can be injected into newly updated firmware.[185] In a January 2014 article in Forbes, cyber-security columnist Joseph Steinberg listed many Internet-connected appliances that can already "spy on people in their own homes" including televisions, kitchen appliances,[186] cameras, and thermostats.[187] Computer-controlled devices in automobiles such as brakes, engine, locks, hood and trunk releases, horn, heat, and dashboard have been shown to be vulnerable to attackers who have access to the on-board network. In some cases, vehicle computer systems are Internet-connected, allowing them to be exploited remotely.[188] For example, a hacker can gain unauthorized access to IoT devices due to their set-up; that is, because these devices are connected, Internet-enabled, and lack the necessary protective measures.[189] By 2008 security researchers had shown the ability to remotely control pacemakers without authority. Later hackers demonstrated remote control of insulin pumps[190] and implantable cardioverter defibrillators.[191] Many of these IoT devices have severe operational limitations on their physical size and by extension the computational power available to them. These constraints often make them unable to directly use basic security measures such as implementing firewalls or using strong cryptosystems to encrypt their communications with other devices.[192] The U.S. National Intelligence Council in an unclassified report maintains that it would be hard to deny "access to networks of sensors and remotely-controlled objects by enemies of the United States, criminals, and mischief makers... An open market for aggregated sensor data could serve the interests of commerce and security no less than it helps criminals and spies identify vulnerable targets. Thus, massively parallel sensor fusion may undermine social cohesion, if it proves to be fundamentally incompatible with Fourth-Amendment guarantees against unreasonable search."[193] In general, the intelligence community views the Internet of things as a rich source of data.[194] In 2016, a distributed denial of service attack powered by Internet of things devices running the Mirai malware took down a DNS provider and major web sites.[195] The Mirai Botnet had infected roughly 65,000 IoT devices within the first 20 hours.[196] Eventually the infections increased to 200,000 to 300,000 infections.[196] Brazil, Columbia and Vietnam made up of 41.5% of the infections.[196] The Mirai Botnet had singled out specific IoT devices that consisted of DVRs, IP cameras, routers and printers.[196] Top vendors that contained the most infected devices were identified as Dahua, Huawei, ZTE, Cisco, ZyXEL and MikroTik.[196] In May 2017, Junade Ali, a Computer Scientist at Cloudflare noted that native DDoS vulnerabilities exist in IoT devices due to a poor implementation of the Publish–subscribe pattern.[197][198] These sorts of attacks have caused security experts to view IoT as a real threat to Internet services.[199] On 31 January 2019, the Washington Post wrote an article regarding the security and ethical challenges that can occur with IoT doorbells and cameras: "Last month, Ring got caught allowing its team in Ukraine to view and annotate certain user videos; the company says it only looks at publicly shared videos and those from Ring owners who provide consent. Just last week, a California family’s Nest camera let a hacker take over and broadcast fake audio warnings about a missile attack, not to mention peer in on them, when they used a weak password"[200] There have been a range of responses to concerns over security. The Internet of Things Security Foundation (IoTSF) was launched on 23 September 2015 with a mission to secure the Internet of things by promoting knowledge and best practice. Its founding board is made from technology providers and telecommunications companies. In addition, large IT companies are continuously developing innovative solutions to ensure the security for IoT devices. In 2017, Mozilla launched Project Things, which allows to route IoT devices through a safe Web of Things gateway.[201] As per the estimates from KBV Research,[202] the overall IoT security market[203] would grow at 27.9% rate during 2016–2022 as a result of growing infrastructural concerns and diversified usage of Internet of things.[204][205] Governmental regulation is argued by some to be necessary to secure IoT devices and the wider Internet – as market incentives to secure IoT devices is insufficient.[206][180][181] SafetyIoT systems are typically controlled by event-driven smart apps that take as input either sensed data, user inputs, or other external triggers (from the Internet) and command one or more actuators towards providing different forms of automation.[207] Examples of sensors include smoke detectors, motion sensors, and contact sensors. Examples of actuators include smart locks, smart power outlets, and door controls. Popular control platforms on which third-party developers can build smart apps that interact wirelessly with these sensors and actuators include Samsung's SmartThings,[208] Apple's HomeKit,[209] and Amazon's Alexa,[210] among others. A problem specific to IoT systems is that buggy apps, unforeseen bad app interactions, or device/communication failures, can cause unsafe and dangerous physical states, e.g., "unlock the entrance door when no one is at home" or "turn off the heater when the temperature is below 0 degrees Celsius and people are sleeping at night".[207] Detecting flaws that lead to such states, requires a holistic view of installed apps, component devices, their configurations, and more importantly, how they interact. Recently, researchers from the University of California Riverside have proposed IotSan, a novel practical system that uses model checking as a building block to reveal "interaction-level" flaws by identifying events that can lead the system to unsafe states.[207] They have evaluated IotSan on the Samsung SmartThings platform. From 76 manually configured systems, IotSan detects 147 vulnerabilities (i.e., violations of safe physical states/properties). DesignGiven widespread recognition of the evolving nature of the design and management of the Internet of things, sustainable and secure deployment of IoT solutions must design for "anarchic scalability."[211] Application of the concept of anarchic scalability can be extended to physical systems (i.e. controlled real-world objects), by virtue of those systems being designed to account for uncertain management futures. This hard anarchic scalability thus provides a pathway forward to fully realize the potential of Internet-of-things solutions by selectively constraining physical systems to allow for all management regimes without risking physical failure.[211] Brown University computer scientist Michael Littman has argued that successful execution of the Internet of things requires consideration of the interface's usability as well as the technology itself. These interfaces need to be not only more user-friendly but also better integrated: "If users need to learn different interfaces for their vacuums, their locks, their sprinklers, their lights, and their coffeemakers, it's tough to say that their lives have been made any easier."[212] Environmental sustainability impactA concern regarding Internet-of-things technologies pertains to the environmental impacts of the manufacture, use, and eventual disposal of all these semiconductor-rich devices.[213] Modern electronics are replete with a wide variety of heavy metals and rare-earth metals, as well as highly toxic synthetic chemicals. This makes them extremely difficult to properly recycle. Electronic components are often incinerated or placed in regular landfills. Furthermore, the human and environmental cost of mining the rare-earth metals that are integral to modern electronic components continues to grow. This leads to societal questions concerning the environmental impacts of IoT devices over its lifetime.[214] Intentional obsolescence of devicesThe Electronic Frontier Foundation has raised concerns that companies can use the technologies necessary to support connected devices to intentionally disable or "brick" their customers' devices via a remote software update or by disabling a service necessary to the operation of the device. In one example, home automation devices sold with the promise of a "Lifetime Subscription" were rendered useless after Nest Labs acquired Revolv and made the decision to shut down the central servers the Revolv devices had used to operate.[215] As Nest is a company owned by Alphabet (Google's parent company), the EFF argues this sets a "terrible precedent for a company with ambitions to sell self-driving cars, medical devices, and other high-end gadgets that may be essential to a person's livelihood or physical safety."[216] Owners should be free to point their devices to a different server or collaborate on improved software. But such action violates the United States DMCA section 1201, which only has an exemption for "local use". This forces tinkerers who want to keep using their own equipment into a legal grey area. EFF thinks buyers should refuse electronics and software that prioritize the manufacturer's wishes above their own.[216] Examples of post-sale manipulations include Google Nest Revolv, disabled privacy settings on Android, Sony disabling Linux on PlayStation 3, enforced EULA on Wii U.[216] Confusing terminologyKevin Lonergan at Information Age, a business-technology magazine, has referred to the terms surrounding the IoT as a "terminology zoo".[217] The lack of clear terminology is not "useful from a practical point of view" and a "source of confusion for the end user".[217] A company operating in the IoT space could be working in anything related to sensor technology, networking, embedded systems, or analytics.[217] According to Lonergan, the term IoT was coined before smart phones, tablets, and devices as we know them today existed, and there is a long list of terms with varying degrees of overlap and technological convergence: Internet of things, Internet of everything (IoE), Internet of Goods (Supply Chain), industrial Internet, pervasive computing, pervasive sensing, ubiquitous computing, cyber-physical systems (CPS), wireless sensor networks (WSN), smart objects, digital twin, cyberobjects or avatars,[114] cooperating objects, machine to machine (M2M), ambient intelligence (AmI), Operational technology (OT), and information technology (IT).[217] Regarding IIoT, an industrial sub-field of IoT, the Industrial Internet Consortium's Vocabulary Task Group has created a "common and reusable vocabulary of terms"[218] to ensure "consistent terminology"[218][219] across publications issued by the Industrial Internet Consortium. IoT One has created an IoT Terms Database including a New Term Alert[220] to be notified when a new term is published. {{as of|2017|March|}}, this database aggregates 711 IoT-related terms, while keeping material "transparent and comprehensive."[221][222] IoT adoption barriersLack of interoperability and unclear value propositionsDespite a shared belief in the potential of the IoT, industry leaders and consumers are facing barriers to adopt IoT technology more widely. Mike Farley argued in Forbes that while IoT solutions appeal to early adopters, they either lack interoperability or a clear use case for end-users.[223] A study by Ericsson regarding the adoption of IoT among Danish companies suggests that many struggle "to pinpoint exactly where the value of IoT lies for them".[282] Privacy and security concernsAccording to a recent study by Noura Aleisa and Karen Renaud at the University of Glasgow, "the Internet of things' potential for major privacy invasion is a concern"[224] with much of research "disproportionally focused on the security concerns of IoT."[224] Among the "proposed solutions in terms of the techniques they deployed and the extent to which they satisfied core privacy principles",[224] only very few turned out to be fully satisfactory. Louis Basenese, investment director at Wall Street Daily, has criticized the industry's lack of attention to security issues: "Despite high-profile and alarming hacks, device manufacturers remain undeterred, focusing on profitability over security. Consumers need to have ultimate control over collected data, including the option to delete it if they choose...Without privacy assurances, wide-scale consumer adoption simply won't happen."[225] In a post-Snowden world of global surveillance disclosures, consumers take a more active interest in protecting their privacy and demand IoT devices to be screened for potential security vulnerabilities and privacy violations before purchasing them. According to the 2016 Accenture Digital Consumer Survey, in which 28000 consumers in 28 countries were polled on their use of consumer technology, security "has moved from being a nagging problem to a top barrier as consumers are now choosing to abandon IoT devices and services over security concerns."[226] The survey revealed that "out of the consumers aware of hacker attacks and owning or planning to own IoT devices in the next five years, 18 percent decided to terminate the use of the services and related services until they get safety guarantees."[226] This suggests that consumers increasingly perceive privacy risks and security concerns to outweigh the value propositions of IoT devices and opt to postpone planned purchases or service subscriptions.[226] Traditional governance structuresA study issued by Ericsson regarding the adoption of Internet of things among Danish companies identified a "clash between IoT and companies' traditional governance structures, as IoT still presents both uncertainties and a lack of historical precedence."[227] Among the respondents interviewed, 60 percent stated that they "do not believe they have the organizational capabilities, and three of four do not believe they have the processes needed, to capture the IoT opportunity."[227] This has led to a need to understand organizational culture in order to facilitate organizational design processes and to test new innovation management practices. A lack of digital leadership in the age of digital transformation has also stifled innovation and IoT adoption to a degree that many companies, in the face of uncertainty, "were waiting for the market dynamics to play out",[227] or further action in regards to IoT "was pending competitor moves, customer pull, or regulatory requirements."[227] Some of these companies risk being 'kodaked' – "Kodak was a market leader until digital disruption eclipsed film photography with digital photos"[228] – failing to "see the disruptive forces affecting their industry"[229] and "to truly embrace the new business models the disruptive change opens up."[229] Scott Anthony has written in Harvard Business Review that Kodak "created a digital camera, invested in the technology, and even understood that photos would be shared online"[229] but ultimately failed to realize that "online photo sharing was the new business, not just a way to expand the printing business."[229] Business planning and modelsAccording to 2018 study, 70–75% of IoT deployments were stuck in the pilot or prototype stage, unable to reach scale due in part to a lack of business planning.[230]{{page needed|date=August 2018}} Studies on IoT literature and projects show a disproportionate prominence of technology in the IoT projects, which are often driven by technological interventions rather than business model innovation.[231][232]{{synthesis inline|date=August 2018}} See also{{colbegin|colwidth=30em}}
References1. ^1 {{cite web |url=https://www.linux.com/news/who-needs-internet-things |title=Who Needs the Internet of Things? |first=Eric |last=Brown |website=Linux.com |date=13 September 2016 |access-date=23 October 2016}} 2. ^1 {{cite web |url=http://www.linux.com/NEWS/21-OPEN-SOURCE-PROJECTS-IOT |title=21 Open Source Projects for IoT |first=Eric |last=Brown |website=Linux.com |date=20 September 2016 |access-date=23 October 2016}} 3. ^{{cite web |url=http://www.itu.int/en/ITU-T/gsi/iot/Pages/default.aspx |title=Internet of Things Global Standards Initiative |work=ITU |access-date=26 June 2015}} 4. ^{{cite web|url=http://data.london.gov.uk/blog/the-trouble-with-the-internet-of-things/|title=The Trouble with the Internet of Things|last1=Hendricks|first1=Drew|website=London Datastore|publisher=Greater London Authority|accessdate=10 August 2015}} 5. ^{{Cite web|url=http://whatis.techtarget.com/definition/Internet-of-Things|title=Internet of Things (IoT)|last=Wigmore|first=I.|date=June 2014|website=TechTarget}} 6. ^{{cite web|url=https://www.cs.cmu.edu/~coke/history_long.txt|title=The "Only" Coke Machine on the Internet|website=Carnegie Mellon University|accessdate=10 November 2014}} 7. ^{{cite journal|date=7 July 2014|title=Internet of Things Done Wrong Stifles Innovation|url=http://www.informationweek.com/strategic-cio/executive-insights-and-innovation/internet-of-things-done-wrong-stifles-innovation/a/d-id/1279157|journal=InformationWeek|accessdate=10 November 2014}} 8. ^{{cite journal|last1=Mattern|first1=Friedemann|last2=Floerkemeier|first2=Christian|date=2010|title=From the Internet of Computer to the Internet of Things|url=http://www.vs.inf.ethz.ch/publ/papers/Internet-of-things.pdf|journal=Informatik-Spektrum|volume=33|issue=2|pages=107–121|doi=10.1007/s00287-010-0417-7|accessdate=3 February 2014|bibcode=2009InfSp..32..496H}} 9. ^{{cite journal|last=Weiser|first=Mark|date=1991|title=The Computer for the 21st Century|url=http://web.media.mit.edu/~anjchang/ti01/weiser-sciam91-ubicomp.pdf|deadurl=yes|journal=Scientific American|volume=265|issue=3|pages=94–104|bibcode=1991SciAm.265c..94W|doi=10.1038/scientificamerican0991-94|archiveurl=https://web.archive.org/web/20150311220327/http://web.media.mit.edu/~anjchang/ti01/weiser-sciam91-ubicomp.pdf|archivedate=11 March 2015|accessdate=5 November 2014|df=dmy-all}} 10. ^{{cite news|url=http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=284793&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D284793|title=Smart networks for control|last=Raji|first=RS|date=June 1994|newspaper=IEEE Spectrum}} 11. ^{{cite journal|last=Pontin|first=Jason|date=29 September 2005|title=ETC: Bill Joy's Six Webs|url=http://www.technologyreview.com/view/404694/etc-bill-joys-six-webs/|journal=MIT Technology Review|accessdate=17 November 2013}} 12. ^{{cite web|url=http://www.rfidjournal.com/articles/view?4986|title=That 'Internet of Things' Thing|last=Ashton|first=K.|date=22 June 2009|accessdate=9 May 2017}} 13. ^{{cite web|url=http://downloads.bbc.co.uk/podcasts/radio/worldbiz/worldbiz_20150319-0730a.mp3|title=Peter Day's World of Business|website=BBC World Service|publisher=BBC|accessdate=4 October 2016}} 14. ^{{cite web|url=https://www.gartner.com/doc/356347/universal-rfid-infrastructure-good-thing|title=Why a Universal RFID Infrastructure Would Be a Good Thing|last=Magrassi|first=P.|authorlink=Paolo Magrassi|date=2 May 2002|work=Gartner research report G00106518}} 15. ^{{Cite web|url=http://www.gartner.com/DisplayDocument?id=366151|title=A World of Smart Objects|last1=Magrassi|first1=P.|last2=Berg|first2=T|date=12 August 2002|work=Gartner research report R-17-2243}} 16. ^{{cite web|url=http://ec.europa.eu/information_society/policy/rfid/documents/commiot2009.pdf|title=Internet of Things — An action plan for Europe|author=Commission of the European Communities|date=18 June 2009|format=PDF|id=COM(2009) 278 final}} 17. ^{{cite news|url=https://www.theguardian.com/media-network/2015/mar/31/the-internet-of-things-is-revolutionising-our-lives-but-standards-are-a-must|title=The internet of things is revolutionizing our lives, but standards are a must|last1=Wood|first1=Alex|date=31 March 2015|newspaper=The Guardian}} 18. ^HUVIO, Eero, GRÖNVALL, John, FRÄMLING, Kary. Tracking and tracing parcels using a distributed computing approach. In: SOLEM, Olav (ed.) Proceedings of the 14th Annual Conference for Nordic Researchers in Logistics (NOFOMA'2002), Trondheim, Norway, 12–14 June 2002. pp. 29–43. 19. ^FRÄMLING, Kary. Tracking of material flow by an Internet-based product data management system (in Finnish: Tavaravirran seuranta osana Internet-pohjaista tuotetiedon hallintaa). Tieke EDISTY magazine, No. 1, 2002, Publication of Tieke (Finnish Information Society Development Centre), Finland, 2002. pp. 24–25. 20. ^FRÄMLING, Kary, HOLMSTRÖM, Jan, ALA-RISKU, Timo, KÄRKKAINEN, Mikko. Product agents for handling information about physical objects . Report of Laboratory of Information Processing Science series B, TKO-B 153/03, Helsinki University of Technology, 2003. 20 p. 21. ^{{cite journal|date=April 2011|author=Dave Evans|title=The Internet of Things: How the Next Evolution of the Internet Is Changing Everything|url=https://www.cisco.com/c/dam/en_us/about/ac79/docs/innov/IoT_IBSG_0411FINAL.pdf|journal=CISCO White Paper}} 22. ^{{cite journal|last1=Vongsingthong|first1=S.|last2=Smanchat|first2=S.|date=2014|title=Internet of Things: A review of applications & technologies|url=http://ird.sut.ac.th/e-journal/Journal/suwimonv/1403739/1403739.pdf|journal=Suranaree Journal of Science and Technology}} 23. ^1 {{cite web |url=http://www.businessinsider.com/the-enterprise-internet-of-things-market-2014-12 |title=The Enterprise Internet of Things Market |date=25 February 2015 |work=Business Insider |accessdate=26 June 2015}} 24. ^{{Cite journal|last=Perera|first=C.|last2=Liu|first2=C. H.|last3=Jayawardena|first3=S.|date=December 2015|title=The Emerging Internet of Things Marketplace From an Industrial Perspective: A Survey|url=http://ieeexplore.ieee.org:80/document/7004800/?reload=true|journal=IEEE Transactions on Emerging Topics in Computing|volume=3|issue=4|pages=585–598|doi=10.1109/TETC.2015.2390034|issn=2168-6750|arxiv=1502.00134}} 25. ^{{Cite journal|last=Ometov|first=A.|last2=Bezzateev|first2=S. V.|last3=Kannisto|first3=J.|last4=Harju|first4=J.|last5=Andreev|first5=S.|last6=Koucheryavy|first6=Y.|date=July 2017|title=Facilitating the Delegation of Use for Private Devices in the Era of the Internet of Wearable Things|url=https://ieeexplore.ieee.org/abstract/document/7518650/|journal=IEEE Internet of Things Journal|volume=4|issue=4|pages=843–854|doi=10.1109/JIOT.2016.2593898|issn=2327-4662|via=}} 26. ^{{Cite news|url=http://trak.in/tags/business/2016/08/30/internet-of-things-iot-changing-fundamentals-of-retailing/|title=How IoT's are Changing the Fundamentals of "Retailing"|date=30 August 2016|work=Trak.in – Indian Business of Tech, Mobile & Startups|accessdate=2 June 2017}} 27. ^{{cite journal |last1=Kang |first1=Won Min |last2=Moon |first2=Seo Yeon |last3=Park |first3=Jong Hyuk |date=5 March 2017 |title=An enhanced security framework for home appliances in smart home |journal=Human-centric Computing and Information Sciences |volume=7 |issue=6 |doi=10.1186/s13673-017-0087-4 }} 28. ^1 {{Cite news|url=http://www.businessinsider.com/internet-of-things-smart-home-automation-2016-8|title=How IoT & smart home automation will change the way we live|work=Business Insider|accessdate=10 November 2017}} 29. ^{{Cite book|title=The Internet of Things|last=Greengard|first=Samuel|publisher=MIT Press|year=2015|isbn=9780262527736|location=Cambridge, MA|pages=90}} 30. ^{{Cite web|url=https://developer.apple.com/homekit/|title=HomeKit – Apple Developer|last=Inc.|first=Apple|website=developer.apple.com|language=en|access-date=2018-09-19}} 31. ^{{Cite news|url=https://www.cnet.com/news/apple-homekit-everything-you-need-to-know/|title=Here's everything you need to know about Apple HomeKit|last=Wollerton|first=Megan|date=2018-06-03|work=CNET|access-date=2018-09-19|language=en}} 32. ^1 {{Cite news|url=https://9to5mac.com/2018/08/31/cheap-homekit-bulbs-switches-camera/|title=HomeKit devices getting more affordable as Lenovo announces Smart Home Essentials line|last=Lovejoy|first=Ben|date=2018-08-31|work=9to5Mac|access-date=2018-09-19|language=en-US}} 33. ^{{Cite news|url=https://www.tomsguide.com/us/best-smart-home-hubs,review-3200.html|title=Best Smart Home Hubs of 2018|last=Prospero|first=Mike|date=2018-09-12|work=Tom's Guide|access-date=2018-09-19|language=en}} 34. ^1 {{cite journal|last1=Demiris|first1=G|last2=Hensel|first2=K|date=2008|title=Technologies for an Aging Society: A Systematic Review of 'Smart Home' Applications|url=https://pdfs.semanticscholar.org/cd2c/6718a9e3309532f9f1493208a8215cbba9b2.pdf|journal="IMIA Yearbook of Medical Informatics 2008"|pages=33–40|accessdate=27 October 2017}} 35. ^{{Cite book|last1=Aburukba|first1=Raafat|last2=Al-Ali|first2=A. R.|last3=Kandil|first3=Nourhan|last4=AbuDamis|first4=Diala|date=10 May 2016|title=Configurable ZigBee-based control system for people with multiple disabilities in smart homes|url=http://ieeexplore.ieee.org/abstract/document/7462435/|journal=IEEE|pages=1–5|doi=10.1109/ICCSII.2016.7462435|accessdate=27 October 2017|isbn=978-1-4673-8743-9}} 36. ^{{cite journal|last1=Mulvenna|first1=Maurice|last2=Hutton|first2=Anton|last3=Martin|first3=Suzanne|last4=Todd|first4=Stephen|last5=Bond|first5=Raymond|last6=Moorhead|first6=Anne|date=14 December 2017|title=Views of Caregivers on the Ethics of Assistive Technology Used for Home Surveillance of People Living with Dementia|url=https://link.springer.com/content/pdf/10.1007%2Fs12152-017-9305-z.pdf|journal=Neuroethics|volume=10|issue=2|pages=255–266|doi=10.1007/s12152-017-9305-z|pmid=28725288|pmc=5486509|accessdate=27 October 2017}} 37. ^1 {{cite journal |last1=da Costa |first1=CA |last2=Pasluosta |first2=CF |last3=Eskofier |first3=B |last4=da Silva |first4=DB |last5=da Rosa Righi |first5=R |title=Internet of Health Things: Toward intelligent vital signs monitoring in hospital wards. |journal=Artificial Intelligence in Medicine |date=July 2018 |volume=89 |pages=61–69 |doi=10.1016/j.artmed.2018.05.005 |pmid=29871778}} 38. ^{{cite journal |last1=Engineer |first1=A |last2=Sternberg |first2=EM |last3=Najafi |first3=B |title=Designing Interiors to Mitigate Physical and Cognitive Deficits Related to Aging and to Promote Longevity in Older Adults: A Review. |journal=Gerontology |volume=64 |issue=6 |date=21 August 2018 |pages=612–622 |doi=10.1159/000491488 |pmid=30130764}} {{open access}} 39. ^1 {{cite journal |last1=Kricka |first1=LJ |title=History of disruptions in laboratory medicine: what have we learned from predictions? |journal=Clinical Chemistry and Laboratory Medicine |date=21 June 2018 |doi=10.1515/cclm-2018-0518 |pmid=29927745|doi-broken-date=2018-11-27 }} 40. ^{{Cite journal|last=Gatouillat|first=Arthur|last2=Badr|first2=Youakim|last3=Massot|first3=Bertrand|last4=Sejdic|first4=Ervin|date=2018|title=Internet of Medical Things: A Review of Recent Contributions Dealing with Cyber-Physical Systems in Medicine|url=https://ieeexplore.ieee.org/document/8388188/|journal=IEEE Internet of Things Journal|volume=5|issue=5|language=en-US|pages=3810–3822|doi=10.1109/jiot.2018.2849014|issn=2327-4662}} 41. ^{{Cite book|title=The Patient Will See You Now: The Future of Medicine Is in Your Hands|last=Topol|first=Eric|publisher=Basic Books|year=2016|isbn=978-0465040025|location=|pages=}} 42. ^1 {{cite book |last1=Dey |first1=Nilanjan |last2=Hassanien |first2=Aboul Ella |last3=Bhatt |first3=Chintan |last4=Ashour |first4=Amira S. |last5=Satapathy |first5=Suresh Chandra |title=Internet of things and big data analytics toward next-generation intelligence |date=2018 |publisher=Springer International Publishing |isbn=978-3-319-60434-3 |url=http://shsalmani.ir/wp-content/uploads/2017/09/Internet-of-Things-and-Big-Data-Analytics-Toward-Next-Generation-Intelligence.pdf |accessdate=14 October 2018}} 43. ^1 2 {{cite journal |last1=Joyia |first1=Gulraiz J. |last2=Liaqat |first2=Rao M. |last3=Farooq |first3=Aftab |last4=Rehman |first4=Saad |title=Internet of Medical Things (IOMT): Applications, Benefits and Future Challenges in Healthcare Domain |journal=Journal of Communications |date=2017 |doi=10.12720/jcm.12.4.240-247}} 44. ^1 2 3 4 5 6 7 8 9 {{cite journal|last1=Ersue|first1=M.|last2=Romascanu|first2=D.|last3=Schoenwaelder|first3=J.|last4=Sehgal|first4=A.|date=4 July 2014|title=Management of Networks with Constrained Devices: Use Cases|journal=IETF Internet Draft}} 45. ^{{cite web|url=https://www.engagemobile.com/goldman-sachs-report-how-the-internet-of-things-can-save-the-american-healthcare-system-305-billion-annually/|title=Goldman Sachs Report: How the Internet of Things Can Save the American Healthcare System $305 Billion Annually|date=23 June 2016|work=Engage Mobile Blog|publisher=Engage Mobile Solutions, LLC|accessdate=26 July 2018}} 46. ^{{cite web |url=http://www.scbio.org/resources/Documents/Internet%20of%20Things%20-%20Volume%205%20-%20The%20Digital%20Revolution%20comes%20to%20US%20HC%20-%20Jun%2029,%202015[1].pdf |title=The Digital Revolution Comes to US Healthcare |author=Roman, D.H. |author2=Conlee, K.D.|date=29 June 2015|publisher=Goldman Sachs |format=PDF |archiveurl=https://web.archive.org/web/20151123005943/http://www.scbio.org/resources/Documents/Internet%20of%20Things%20-%20Volume%205%20-%20The%20Digital%20Revolution%20comes%20to%20US%20HC%20-%20Jun%2029,%202015[1].pdf |archivedate=23 November 2015|accessdate=26 July 2018}} 47. ^{{cite journal |last1=Joyia |first1=Gulraiz J. |last2=Liaqat |first2=Rao M. |last3=Farooq |first3=Aftab |last4=Rehman |first4=Saad |title=Internet of Medical Things (IOMT): Applications, Benefits and Future Challenges in Healthcare Domain |journal=Journal of Communications |date=2017 |pages=240 |doi=10.12720/jcm.12.4.240-247}} 48. ^{{Cite book|last1=Istepanian|first1=R.|last2=Hu|first2=S.|last3=Philip|first3=N.|last4=Sungoor|first4=A.|year=2011|title=The potential of Internet of m-health Things "m-IoT" for non-invasive glucose level sensing|journal=Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)|volume=2011|pages=5264–6|doi=10.1109/IEMBS.2011.6091302|pmid=22255525|isbn=978-1-4577-1589-1}} 49. ^{{cite journal|last1=Swan|first1=Melanie|date=8 November 2012|title=Sensor Mania! The Internet of Things, Wearable Computing, Objective Metrics, and the Quantified Self 2.0|url=http://www.mdpi.com/2224-2708/1/3/217/htm|journal=Sensor and Actuator Networks|volume=1|issue=3|pages=217–253|doi=10.3390/jsan1030217}} 50. ^{{Cite journal|last=IJSMI|first=Editor|date=April 2018|title=Overview of recent advances in Health care technology and its impact on health care delivery|url=|journal=International Journal of Statistics and Medical Informatics|volume=7|pages=1–6|ssrn=3169884}} 51. ^{{Cite journal|last=Grell|first=Max|last2=Dincer|first2=Can|last3=Le|first3=Thao|last4=Lauri|first4=Alberto|last5=Nunez Bajo|first5=Estefania|last6=Kasimatis|first6=Michael|last7=Barandun|first7=Giandrin|last8=Maier|first8=Stefan A.|last9=Cass|first9=Anthony E. G.|date=2018-11-09|title=Autocatalytic Metallization of Fabrics Using Si Ink, for Biosensors, Batteries and Energy Harvesting|url=https://onlinelibrary.wiley.com/doi/10.1002/adfm.201804798|journal=Advanced Functional Materials|language=en|pages=1804798|doi=10.1002/adfm.201804798|issn=1616-301X}} 52. ^{{Cite journal|last=Dincer|first=Can|last2=Bruch|first2=Richard|last3=Kling|first3=André|last4=Dittrich|first4=Petra S.|last5=Urban|first5=Gerald A.|date=2017-08-01|title=Multiplexed Point-of-Care Testing – xPOCT|url=https://www.sciencedirect.com/science/article/pii/S0167779917300628|journal=Trends in Biotechnology|language=en|volume=35|issue=8|pages=728–742|doi=10.1016/j.tibtech.2017.03.013|issn=0167-7799|via=}} 53. ^{{cite web |last1=Amiot |first1=Emmanuel |title=The Internet of Things. Disrupting Traditional Business Models |url=https://www.oliverwyman.com/content/dam/oliver-wyman/global/en/2015/jun/2015_OliverWyman_Internet-of-Things.pdf |website=Oliver Wyman |accessdate=14 October 2018}} 54. ^Vermesan, Ovidiu, and Peter Friess, eds. Internet of things: converging technologies for smartenvironments and integrated ecosystems. River Publishers, 2013. https://www.researchgate.net/publication/272943881_Internet_of_Things_-_Converging_Technologies_for_Smart_Environments_and_Integrated_Ecosystems 55. ^{{cite journal|last1=Mahmud|first1=Khizir|last2=Town|first2=Graham E.|last3=Morsalin|first3=Sayidul|last4=Hossain|first4=M.J.|date=February 2018|title=Integration of electric vehicles and management in the internet of energy|journal=Renewable and Sustainable Energy Reviews|volume=82|pages=4179–4203|doi=10.1016/j.rser.2017.11.004}} 56. ^{{cite journal|last1=Xie|first1=Xiao-Feng|last2=Wang|first2=Zun-Jing|date=2017|title=Integrated in-vehicle decision support system for driving at signalized intersections: A prototype of smart IoT in transportation|url=https://trid.trb.org/view.aspx?id=1437314|journal=Transportation Research Board (TRB) Annual Meeting, Washington, DC, USA}} 57. ^{{cite web|url=http://www.wiomax.com/what-can-the-smart-iot-transform-transportation-and-smart-cities/|title=Key Applications of the Smart IoT to Transform Transportation|accessdate=28 October 2017|date=2016-09-20}} 58. ^1 2 3 {{Cite journal|last=Haase|first=J.|last2=Alahmad|first2=M.|last3=Nishi|first3=H.|last4=Ploennigs|first4=J.|last5=Tsang|first5=K. F.|date=1 July 2016|title=The IOT mediated built environment: A brief survey|url=http://ieeexplore.ieee.org:80/document/7819322/?reload=true|journal=2016 IEEE 14th International Conference on Industrial Informatics (INDIN)|pages=1065–1068|doi=10.1109/INDIAN.2016.7819322|doi-broken-date=2018-11-27}} 59. ^{{Cite book|author1=Jussi Karlgren|author2=Lennart Fahlén|author3=Anders Wallberg|author4=Pär Hansson|author5=Olov Ståhl|author6=Jonas Söderberg|author7=Karl-Petter Åkesson|date=2008|title=Socially Intelligent Interfaces for Increased Energy Awareness in the Home|journal=The Internet of Things. Lecture Notes in Computer Science|publisher=Springer|volume=4952|pages=263–275|doi=10.1007/978-3-540-78731-0_17|isbn=978-3-540-78730-3|authorlink1=Jussi Karlgren}} 60. ^{{cite journal |last1=Yang |first1=Chen |last2=Shen |first2=Weiming |last3=Wang |first3=Xianbin |title=The Internet of Things in Manufacturing: Key Issues and Potential Applications |journal=IEEE Systems, Man, and Cybernetics Magazine |date=January 2018 |volume=4 |issue=1 |pages=6–15 |doi=10.1109/MSMC.2017.2702391 |url=https://ieeexplore.ieee.org/document/8260591/}} 61. ^{{cite journal |last1=Severi |first1=S. |last2=Abreu |first2=G. |last3=Sottile |first3=F. |last4=Pastrone |first4=C. |last5=Spirito |first5=M. |last6=Berens |first6=F. |title=M2M Technologies: Enablers for a Pervasive Internet of Things |journal=The European Conference on Networks and Communications (EUCNC2014) |date=23–26 June 2014 |url=https://www.academia.edu/6866526}} 62. ^1 {{cite journal|last1=Gubbi|first1=Jayavardhana|last2=Buyya|first2=Rajkumar|last3=Marusic|first3=Slaven|last4=Palaniswami|first4=Marimuthu|date=24 February 2013|title=Internet of Things (IoT): A vision, architectural elements, and future directions|journal=Future Generation Computer Systems|volume=29|issue=7|pages=1645–1660|arxiv=1207.0203|doi=10.1016/j.future.2013.01.010}} 63. ^{{Cite book |last1=Tan |first1=Lu |last2=Wang |first2=Neng |title=Future Internet: The Internet of Things |journal=3rd International Conference on Advanced Computer Theory and Engineering (ICACTE) |date=20–22 August 2010 |volume=5 |pages=376–380 |doi=10.1109/ICACTE.2010.5579543 |isbn=978-1-4244-6539-2}} 64. ^1 {{cite web |last1=Daugherty |first1=Paul |last2=Negm |first2=Walid |last3=Banerjee |first3=Prith |last4=Alter |first4=Allan |title=Driving Unconventional Growth through the Industrial Internet of Things |url=https://www.accenture.com/mz-en/_acnmedia/Accenture/next-gen/reassembling-industry/pdf/Accenture-Driving-Unconventional-Growth-through-IIoT.pdf |website=Accenture |accessdate=17 March 2016}} 65. ^1 {{cite journal |last1=Lee |first1=Jay |last2=Bagheri |first2=Behrad |last3=Kao |first3=Hung-An |title=A cyber-physical systems architecture for industry 4.0-based manufacturing systems |journal=Manufacturing Letters |date=2015 |volume=3 |pages=18–23 |doi=10.1016/j.mfglet.2014.12.001}} 66. ^{{cite book |last1=Lee |first1=Jay |title=Industrial Big Data |date=2015 |publisher=Mechanical Industry Press |location=China |isbn=978-7-111-50624-9}} 67. ^{{cite web |work=Accenture |title=Industrial Internet Insights Report |url=https://www.accenture.com/us-en/_acnmedia/Accenture/next-gen/reassembling-industry/pdf/Accenture-Industrial-Internet-Changing-Competitive-Landscape-Industries.pdf |accessdate=17 March 2016}} 68. ^{{Cite web |url=http://www.imscenter.net |title=Center for Intelligent Maintenance Systems |website=IMS Center |accessdate=8 March 2016}} 69. ^{{Cite journal |last=Lee |first=Jay |date=1 December 2003 |title=E-manufacturing—fundamental, tools, and transformation |url=http://www.sciencedirect.com/science/article/pii/S0736584503000607 |journal=Robotics and Computer-Integrated Manufacturing |series=Leadership of the Future in Manufacturing |volume=19 |issue=6 |pages=501–507 |doi=10.1016/S0736-5845(03)00060-7}} 70. ^1 {{cite journal |last1=Lee |first1=Jay |title=Keynote Presentation: Recent Advances and Transformation Direction of PHM |journal=Roadmapping Workshop on Measurement Science for Prognostics and Health Management of Smart Manufacturing Systems Agenda |date=19 November 2014 }} 71. ^{{cite web |url=https://www.businessinsider.com/internet-of-things-smart-agriculture-2016-10 |title=Why IoT, big data & smart farming are the future of agriculture |author=Meola, A. |work=Business Insider |publisher=Insider, Inc |date=20 December 2016 |accessdate=26 July 2018}} 72. ^{{cite book |url={{Google books|vHi9CgAAQBAJ|page=PA249|keywords=|text=|plainurl=yes}} |title=Precision Agriculture Technology for Crop Farming |author=Zhang, Q. |publisher=CRC Press |pages=249–58 |year=2015 |isbn=9781482251081}} 73. ^{{cite web|url=https://www.theregister.co.uk/2018/09/01/ai_roundup_310818/|title=Google goes bilingual, Facebook fleshes out translation and TensorFlow is dope – And, Microsoft is assisting fish farmers in Japan}} 74. ^{{cite news|url=http://www.mckinsey.com/insights/high_tech_telecoms_internet/the_internet_of_things|title=The Internet of Things|last1=Chui|first1=Michael|work=McKinsey Quarterly|accessdate=10 July 2014|agency=McKinsey & Company|last2=Löffler|first2=Markus|last3=Roberts|first3=Roger}} 75. ^{{cite web|url=http://postscapes.com/smart-trash|title=Smart Trash|work=Postscapes|accessdate=10 July 2014}} 76. ^{{cite web|url=http://www.bizmak.xyz/internet-of-things-iot-revolutionized-the-way-we-live/|title=THE INTERNET OF THINGS (IOT): REVOLUTIONIZED THE WAY WE LIVE!|work=Postscapes|accessdate=23 October 2017|date=2017-08-10}} 77. ^{{cite web |url=https://www.citylab.com/life/2018/06/sleepy-in-songdo-koreas-smartest-city/561374/ |title=Sleepy in Songdo, Korea's Smartest City |author=Poon, L. |work=CityLab |publisher=Atlantic Monthly Group |date=22 June 2018 |accessdate=26 July 2018}} 78. ^{{cite journal |last1=Rico |first1=Juan |title=Going beyond monitoring and actuating in large scale smart cities |journal=NFC & Proximity Solutions – WIMA Monaco |date=22–24 April 2014}} 79. ^{{cite web |work=Sino-Singapore Guangzhou Knowledge City |title=A vision for a city today, a city of vision tomorrow |url=http://www.ssgkc.com |accessdate=11 July 2014}} 80. ^{{cite web |title=San Jose Implements Intel Technology for a Smarter City |url=http://newsroom.intel.com/community/intel_newsroom/blog/2014/06/11/san-jose-implements-intel-technology-for-a-smarter-city |work=Intel Newsroom |accessdate=11 July 2014}} 81. ^{{cite web |work=Coconuts Singapore |title=Western Singapore becomes test-bed for smart city solutions |url=http://singapore.coconuts.co/2014/06/19/western-singapore-becomes-test-bed-smart-city-solutions |accessdate=11 July 2014|date=2014-06-19 }} 82. ^{{cite web |last1=Lipsky |first1=Jessica |title=IoT Clash Over 900 MHz Options |url=http://www.eetimes.com/document.asp?doc_id=1326599 |website=EETimes |accessdate=15 May 2015}} 83. ^{{cite web |last1=Alleven |first1=Monica |title=Sigfox launches IoT network in 10 UK cities |url=http://www.fiercewireless.com/tech/story/sigfox-launches-iot-network-10-uk-cities/2014-12-13 |website=Fierce Wireless Tech |accessdate=13 May 2015}} 84. ^{{cite web |last1=Merritt |first1=Rick |title=13 Views of IoT World |url=http://www.eetimes.com/document.asp?doc_id=1326596 |website=EETimes |accessdate=15 May 2015}} 85. ^{{cite web |last1=Fitchard |first1=Kevin |title=Sigfox brings its internet of things network to San Francisco |url=https://gigaom.com/2014/05/20/sigfox-brings-its-internet-of-things-network-to-san-francisco/ |website=Gigaom |accessdate=15 May 2015|date=2014-05-20 }} 86. ^{{Cite web|url=https://search-proquest-com.mutex.gmu.edu/docview/1774166769/?pq-origsite=primo|title=Cisco to invest in fiber grid, IoT, smart cities in andhra pradesh|last=Ujaley|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}} 87. ^{{cite web |title=STE Security Innovation Awards Honorable Mention: The End of the Disconnect |url=http://www.securityinfowatch.com/article/10840006/ste-security-innovation-awards-honorable-mention-the-end-of-the-disconnect |work=securityinfowatch.com |accessdate=12 August 2015}} 88. ^1 {{cite journal|last1=Parello|first1=J.|last2=Claise|first2=B.|last3=Schoening|first3=B.|last4=Quittek|first4=J.|date=28 April 2014|title=Energy Management Framework|url=http://tools.ietf.org/html/draft-ietf-eman-framework-19|journal=IETF Internet Draft <draft-ietf-eman-framework-19>}} 89. ^{{cite web|url=http://www.extremetech.com/extreme/209715-how-the-internet-of-things-will-enable-smart-buildings|title=How the Internet of Things will enable 'smart buildings'|last=Davies|first=Nicola|website=Extreme Tech}} 90. ^{{cite web|url=http://molluscan-eye.epoc.u-bordeaux1.fr/index.php?rubrique=accueil&lang=en/|title=Molluscan eye|publisher=|accessdate=26 June 2015}} 91. ^{{Cite book|last1=Li|first1=Shixing|last2=Wang|first2=Hong|last3=Xu|first3=Tao|last4=Zhou|first4=Guiping|date=2011|title=Application Study on Internet of Things in Environment Protection Field|journal=Lecture Notes in Electrical Engineering Volume|series=Lecture Notes in Electrical Engineering|volume=133|pages=99–106|doi=10.1007/978-3-642-25992-0_13|isbn=978-3-642-25991-3|url=http://ir.sia.cn/handle/173321/10234|type=Submitted manuscript}} 92. ^{{cite web|url=http://fit-equipex.fr/use-cases/23-use-case-sensitive-wildlife-monitoring|title=Use case: Sensitive wildlife monitoring|work=FIT French Project|accessdate=10 July 2014}} 93. ^{{cite journal|last1=Hart|first1=Jane K.|last2=Martinez|first2=Kirk|date=1 May 2015|title=Toward an environmental Internet of Things|url=http://eprints.soton.ac.uk/377197/3/full|deadurl=yes|journal=Earth & Space Science|volume=2|issue=5|pages=194–200|bibcode=2015E&SS....2..194H|doi=10.1002/2014EA000044|archiveurl=https://web.archive.org/web/20160617134934/http://eprints.soton.ac.uk/377197/3/full|archivedate=17 June 2016|df=dmy-all}} 94. ^1 {{Cite journal|last=Scuotto|first=Veronica|last2=Ferraris|first2=Alberto|last3=Bresciani|first3=Stefano|date=2016-04-04|title=Internet of Things|url=https://www.emeraldinsight.com/action/captchaChallenge?redirectUrl=https%3A%2F%2Fwww.emeraldinsight.com%2Fdoi%2Fabs%2F10.1108%2FBPMJ-05-2015-0074|journal=Business Process Management Journal|language=en|volume=22|issue=2|pages=357–367|doi=10.1108/bpmj-05-2015-0074|issn=1463-7154}} 95. ^1 {{cite web |url=https://spectrum.ieee.org/tech-talk/telecom/internet/popular-internet-of-things-forecast-of-50-billion-devices-by-2020-is-outdated |title=Popular Internet of Things Forecast of 50 Billion Devices by 2020 Is Outdated |first=Amy |last=Nordrum |date=18 August 2016 |work=IEEE}} 96. ^{{cite book|url=http://www.internet-of-things-research.eu/pdf/Converging_Technologies_for_Smart_Environments_and_Integrated_Ecosystems_IERC_Book_Open_Access_2013.pdf|title=Internet of Things: Converging Technologies for Smart Environments and Integrated Ecosystems|last1=Vermesan|first1=Ovidiu|last2=Friess|first2=Peter|publisher=River Publishers|year=2013|isbn=978-87-92982-96-4|location=Aalborg, Denmark}} 97. ^{{cite web|url=http://cordis.europa.eu/fp7/ict/enet/documents/publications/iot-between-the-internet-revolution.pdf|title=The Internet of Things: Between the Revolution of the Internet and the Metamorphosis of Objects|last=Santucci|first=Gérald|website=European Commission Community Research and Development Information Service|accessdate=23 October 2016}} 98. ^{{cite web|url=http://www.vs.inf.ethz.ch/publ/papers/Internet-of-things.pdf|title=From the Internet of Computers to the Internet of Things|last1=Mattern|first1=Friedemann|last2=Floerkemeier|first2=Christian|website=ETH Zurich|accessdate=23 October 2016}} 99. ^{{cite web|url=http://connectedworld.com/the-supply-chain-changing-at-the-speed-of-technology/|title=The Supply Chain: Changing at the Speed of Technology|last=Lindner|first=Tim|date=13 July 2015|work=Connected World|accessdate=18 September 2015}} 100. ^1 {{Cite news | url=http://www.faz.net/aktuell/wirtschaft/diginomics/grosse-internationale-allianz-gegen-cyber-attacken-15451953-p2.html?printPagedArticle=true#pageIndex_1 | title=Online-Kriminalität: Konzerne verbünden sich gegen Hacker| newspaper=Faz.net| last1=Köhn| first1=Rüdiger}} 101. ^{{Cite journal|last=Hsu|first=Chin-Lung|last2=Lin|first2=Judy Chuan-Chuan|title=An empirical examination of consumer adoption of Internet of Things services: Network externalities and concern for information privacy perspectives|journal=Computers in Human Behavior|volume=62|pages=516–527|doi=10.1016/j.chb.2016.04.023|year=2016}} 102. ^{{cite web |url=http://gdruk.com/smarter-things-autonomous-iot/ |title=Smarter Things: The Autonomous IoT |work=GDR Blog |publisher=GDR Creative Intelligence |date=5 January 2018 |accessdate=26 July 2018}} 103. ^Levine, Sergey, et al. "End-to-end training of deep visuomotor policies." The Journal of Machine Learning Research 17.1 (2016): 1334-1373. 104. ^1 Mohammadi M., et al., "Deep Learning for IoT Big Data and Streaming Analytics: A Survey," IEEE Communications Surveys and Tutorials, Vol. 20, No. 4, 2018 105. ^Mahdavinejad, M. S., Rezvan, M., Barekatain, M., Adibi, P., Barnaghi, P., & Sheth, A. P. (2018). Machine learning for Internet of Things data analysis: A survey. Digital Communications and Networks, 4(3), 161-175. 106. ^{{cite book |first=C. |last=Alippi |url=https://www.springer.com/engineering/electronics/book/978-3-319-05277-9 |title=Intelligence for Embedded Systems |publisher=Springer Verlag |year=2014 |isbn=978-3-319-05278-6}} 107. ^{{Cite book |url=https://www.journals.elsevier.com/future-generation-computer-systems/call-for-papers/smart-cyber-physical-systems-towards-pervasive-intelligence |title=Smart Cyber-Physical Systems: towards Pervasive Intelligence systems |editor=Delicato, F.C. |editor2=Al-Anbuky, A. |editor3=Wang, K. |work=Future Generation Computer Systems |publisher=Elsevier |date=2018 |accessdate=26 July 2018}} 108. ^1 2 3 {{Cite book|url=https://www.amazon.com/Industrial-Internet-Application-Development-development-ebook/dp/B075V92JW7/|title=Industrial Internet Application Development: Simplify IIoT development using the elasticity of Public Cloud and Native Cloud Services|last=Traukina|first=Alena|last2=Thomas|first2=Jayant|last3=Tyagi|first3=Prashant|last4=Reddipalli|first4=Kishore|date=2018-09-29|publisher=Packt Publishing|isbn=|edition=1st|location=|pages=18|language=English}} 109. ^{{Cite book |title=Internet of Things: Challenges, Advances, and Applications |last=Hassan |first=Qusay |last2=Khan |first2=Atta|last3=Madani|first3=Sajjad|publisher=CRC Press|year=2017|isbn=9781498778510|location=Boca Raton, Florida|pages=198}} 110. ^{{Cite book|title=Internet of Things, for Things, and by Things|last=Chauhuri|first=Abhik|publisher=CRC Press|year=2018|isbn=9781138710443|location=Boca Raton, Florida|pages=}} 111. ^{{Cite journal |url=http://www.computer.org/cms/Computer.org/ComputingNow/issues/2015/07/mit2015030002.pdf |title=Internet of Things: Making the Hype a Reality |date=May–June 2015 |accessdate=10 April 2016 |journal=IT Pro |last=Pal |first=Arpan}} 112. ^{{cite web |url=http://www.gartner.com/newsroom/id/3165317 |title=Gartner Says 6.4 Billion Connected "Things" Will Be in Use in 2016, Up 30 Percent From 2015 |date=10 November 2015 |website=Gartner |accessdate=21 April 2016}} 113. ^{{cite journal|title=MIST: Fog-based Data Analytics Scheme with Cost-Efficient Resource Provisioning for IoT Crowdsensing Applications | doi=10.1016/j.jnca.2017.01.012 | volume=82 | journal=Journal of Network and Computer Applications | pages=152–165 | last1 = Reza Arkian | first1 = Hamid | year=2017| bibcode=2017JNCA...93...27H }} 114. ^1 {{cite book |last1=Gautier |first1=Philippe |title=L'Internet des Objets... Internet, mais en mieux |last2=Gonzalez |first2=Laurent |publisher=AFNOR editions |others=Foreword by Gérald Santucci (European commission), postword by Daniel Kaplan (FING) and Michel Volle |location=Paris |date=2011 |isbn=978-2-12-465316-4 |url=http://excerpts.numilog.com/books/9782124653164.pdf}} 115. ^{{cite book |chapter-url={{Google books|OGltDQAAQBAJ|page=PA151|keywords=|text=|plainurl=yes}} |chapter=sDOMO communication protocol for home robotic systems in the context of the internet of things |title=Computer Science, Technology And Application |author=Marginean, M.-T. |author2=Lu, C. |publisher=World Scientific |pages=151–60 |year=2016 |isbn=9789813200432}} 116. ^{{cite journal|last=Rowayda|first=A. Sadek|title= – An Agile Internet of Things (IoT) based Software Defined Network (SDN) Architecture |journal= Egyptian Computer Science Journal |date=May 2018 }} 117. ^{{cite book |last=Waldner |first=Jean-Baptiste |authorlink=Jean-Baptiste Waldner |title=Nanoinformatique et intelligence ambiante. Inventer l'Ordinateur du XXIeme Siècle |publisher=Hermes Science |location=London |date=2007 |page=254 |isbn=978-2-7462-1516-0}} 118. ^{{Cite web |title=OGC SensorThings API standard specification |work=OGC |url=https://portal.opengeospatial.org/files/?artifact_id=64146 |accessdate=15 February 2016}} 119. ^{{Cite web |title=OGC Sensor Web Enablement: Overview And High Level Architecture |work=OGC |url=http://portal.opengeospatial.org/files/?artifact_id=25562 |accessdate=15 February 2016}} 120. ^{{cite book |chapter-url={{Google books|FedDDwAAQBAJ|page=PA230|keywords=|text=|plainurl=yes}} |chapter=Chapter 9: Applying Geospatial Analytics to IoT Data |title=Analytics for the Internet of Things (IoT) |author=Minteer, A. |publisher=Packt Publishing |pages=230–57 |year=2017 |isbn=9781787127579}} 121. ^{{cite book |chapter-url={{Google books|tEC5BQAAQBAJ|page=PA160|keywords=|text=|plainurl=yes}} |chapter=Spatial Dimensions of Big Data: Application of Geographical Concepts and Spatial Technology to the Internet of Things |title=Big Data and Internet of Things: A Roadmap for Smart Environments |author=van der Zee, E. |author2=Scholten, H. |editor=Bessis, N. |editor2=Dobre, C. |publisher=Springer |pages=137–68 |year=2014 |isbn=9783319050294}} 122. ^1 {{cite web |url=http://www.mondaynote.com/2014/01/12/internet-of-things-the-basket-of-remotes-problem/ |title=Internet of Things: The "Basket of Remotes" Problem |author=Gassée, J.-L. |work=Monday Note |date=12 January 2014 |accessdate=26 June 2015}} 123. ^{{cite book |chapter-url={{Google books|CFtICgAAQBAJ|page=PA163|keywords=|text=|plainurl=yes}} |chapter=Chapter 10: Integrating with Muzzley |title=Internet of Things with Intel Galileo |author=de Sousa, M. |publisher=Packt Publishing |page=163 |year=2015 |isbn=9781782174912}} 124. ^{{cite news|url=http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7030240|title=Enabling the Internet of Things|last=Want|first=Roy|date=2015|publisher=IEEE|author2=Bill N. Schilit, Scott Jenson|others=Sponsored by IEEE Computer Society|volume=1|pages=28–35}} 125. ^{{cite web|url=https://www.theregister.co.uk/2015/05/14/the_internet_of_things_a_jumbled_mess_or_a_jumbled_mess/|title=The Internet of Things: a jumbled mess or a jumbled mess?|website=The Register|accessdate=5 June 2016}} 126. ^{{cite web|url=http://www.computerworld.com/article/2488373/emerging-technology/can-we-talk--internet-of-things-vendors-face-a-communications--mess-.html|title=Can we talk? Internet of Things vendors face a communications 'mess'|website=Computerworld|accessdate=5 June 2016|date=2014-04-18}} 127. ^{{cite book |url={{Google books|YmpaDwAAQBAJ|page=PA27|keywords=|text=|plainurl=yes}} |title=Internet of Things A to Z: Technologies and Applications |author=Hassan, Q.F. |publisher=John Wiley & Sons |pages=27–8 |year=2018 |isbn=9781119456759}} 128. ^Dan Brickley et al., c. 2001 129. ^{{cite book |url={{Google books|q0PQDAAAQBAJ|page=PA256|keywords=|text=|plainurl=yes}} |title=Managing the Web of Things: Linking the Real World to the Web |author=Sheng, M. |author2=Qun, Y. |author3=Yao, L. |author4=Benatallah, B. |publisher=Morgan Kaufmann |pages=256–8 |year=2017 |isbn=9780128097656}} 130. ^{{cite book|title=Nanocomputers and Swarm Intelligence|last=Waldner|first=Jean-Baptiste|date=2008|publisher=ISTE|isbn=978-1-84704-002-2|location=London|pages=227–231|authorlink=Jean-Baptiste Waldner}} 131. ^1 {{cite IETF|title=IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals|rfc=4919|last1=Kushalnagar|first1=N.|last2=Montenegro|first2=G.|last3=Schumacher|first3=C.|date=August 2007|publisher=IETF}} 132. ^1 {{cite web|url=http://www.computerworld.com/article/2488886/networking/stop-using-internet-protocol-version-4-.html|title=Stop using Internet Protocol Version 4!|last=Sun|first=Charles C.|date=1 May 2014|work=Computerworld}} 133. ^{{cite IETF|title=IPv6 Stateless Address Autoconfiguration|rfc=4862|last1=Thomson|first1=S.|last2=Narten|first2=T.|last3=Jinmei|first3=T.|date=September 2007|publisher=IETF}} 134. ^{{cite book |chapter-url={{Google books|VAG7BQAAQBAJ|page=PA627|keywords=|text=|plainurl=yes}} |chapter=Research on the Relevant Standards of Internet of Things |title=Internet of Things: International Workshop, IOT 2012 |author=Jing, J. |author2=Li, H. |editor=Wang, Y. |editor2=Zhang, X. |publisher=Springer |pages=627–32 |year=2012 |isbn=9783642324277}} 135. ^{{cite book |url={{Google books|dKVFDwAAQBAJ|page=PA89|keywords=|text=|plainurl=yes}} |title=Connected Environments for the Internet of Things: Challenges and Solutions |author=Mahmood, Z. |publisher=Springer |pages=89–90 |year=2018 |isbn=9783319701028}} 136. ^{{cite web|last=Howard|first=Philip N.|author-link=Philip N. Howard|url=http://www.politico.com/agenda/story/2015/06/philip-howard-on-iot-transformation-000099|title=The Internet of Things is Posed to Change Democracy Itself|work=Politico|date=1 June 2015|accessdate=8 August 2017}} 137. ^{{cite web |url=http://www.canadiancybersecuritylaw.com/2015/11/the-internet-of-things-guidance-regulation-and-the-canadian-approach/ |title=The Internet of Things: Guidance, Regulation and the Canadian Approach |first1=Kirsten |last1=Thompson |first2=Brandon |last2=Mattalo |date=24 November 2015 |work=CyberLex |accessdate=23 October 2016}} 138. ^{{cite web |url=http://fortune.com/2016/04/06/who-owns-the-data/ |title=The Question of Who Owns the Data Is About to Get a Lot Trickier |date=6 April 2016 |work=Fortune |accessdate=23 October 2016}} 139. ^{{cite book |url={{Google books|9adAAAAAQBAJ|page=PA59|keywords=|text=|plainurl=yes}} |title=Internet of Things: Legal Perspectives |author=Weber, R.H. |author2=Weber, R. |publisher=Springer Science & Business Media |pages=59–64 |year=2010 |isbn=9783642117107}} 140. ^{{cite book |url={{Google books|YmpaDwAAQBAJ|page=PA41|keywords=|text=|plainurl=yes}} |title=Internet of Things A to Z: Technologies and Applications |author=Hassan, Q.F. |publisher=John Wiley & Sons |pages=41–4 |year=2018 |isbn=9781119456759}} 141. ^{{cite book |url={{Google books|iGpQDwAAQBAJ|page=PA41|keywords=|text=|plainurl=yes}} |title=Internet of Things: Challenges, Advances, and Applications |author=Hassan, Q.F. |author2=Khan, A. ur R. |author3=Madani, S.A. |publisher=CRC Press |pages=41–2 |year=2017 |isbn=9781498778534}} 142. ^{{Cite journal|last=Lopez|first=Javier|last2=Rios|first2=Ruben|last3=Bao|first3=Feng|last4=Wang|first4=Guilin|title=Evolving privacy: From sensors to the Internet of Things|journal=Future Generation Computer Systems|volume=75|pages=46–57|doi=10.1016/j.future.2017.04.045|year=2017}} 143. ^{{cite web |url=http://www.mhc.ie/latest/blog/the-internet-of-things-legal-challenges-in-an-ultra-connected-world |title=The 'Internet of Things': Legal Challenges in an Ultra-connected World |date=22 January 2016 |work=Mason Hayes & Curran |accessdate=23 October 2016}} 144. ^{{cite web |url=https://www.itu.int/en/ITU-D/Conferences/GSR/Documents/GSR2015/Discussion_papers_and_Presentations/GSR_DiscussionPaper_IoT.pdf |title=Regulation and the Internet of Things |first=Ian |last=Brown |website=Oxford Internet Institute |year=2015 |accessdate=23 October 2016}} 145. ^{{cite web |url=https://www.ftc.gov/news-events/press-releases/2015/01/ftc-report-internet-things-urges-companies-adopt-best-practices |title=FTC Report on Internet of Things Urges Companies to Adopt Best Practices to Address Consumer Privacy and Security Risks |work=Federal Trade Commission |date=27 January 2015 |accessdate=23 October 2016}} 146. ^{{cite web |url=http://www.mis-asia.com/tech/internet/iot-users-could-win-with-a-new-bill-in-the-us-senate/ |title=IoT users could win with a new bill in the US Senate |first=Stephen |last=Lawson |date=2 March 2016 |work=MIS-Asia |accessdate=23 October 2016}} 147. ^{{cite web |url=http://www.lexology.com/library/detail.aspx?g=fd6bc26e-dd20-4c4f-897a-5d62484d37ba |title=Legal Developments in Connected Car Arena Provide Glimpse of Privacy and Data Security Regulation in Internet of Things |first=F. Paul |last=Pittman |date=2 February 2016 |work=Lexology |accessdate=23 October 2016}} 148. ^{{Cite journal|last=Rasit|first=Yuce, Mehmet|last2=Claus|first2=Beisswenger, Stefan|last3=Mangalam, Srikanth|last4=Das, Prasanna|first4=Lal|last5=Martin|first5=Lukac|date=2017-11-02|title=Internet of things : the new government to business platform – a review of opportunities, practices, and challenges|pages=1–112|url=http://documents.worldbank.org/curated/en/610081509689089303/Internet-of-things-the-new-government-to-business-platform-a-review-of-opportunities-practices-and-challenges}} 149. ^{{Cite web |url=http://www.mobileworldlive.com/mwc16-articles/iot-experts-fret-over-fragmentation/ |title=IoT experts fret over fragmentation |first=Ken |last=Wieland |work=Mobile World |date=25 February 2016}} 150. ^{{Cite web |url=https://www.qualcomm.com/news/onq/2016/02/19/fragmentation-enemy-internet-things |title=Fragmentation is the enemy of the Internet of Things |date=19 February 2016 |first=Michael |last=Wallace |website=Qualcomm.com}} 151. ^{{Cite web |url=http://www.mckinsey.com/industries/semiconductors/our-insights/internet-of-things-opportunities-and-challenges-for-semiconductor-companies |first1=Harald |last1=Bauer |first2=Mark |last2=Patel |first3=Jan |last3=Veira |title=Internet of Things: Opportunities and challenges for semiconductor companies |work=McKinsey & Co. |date=October 2015}} 152. ^{{cite web |url=https://evothings.com/will-fragmentation-of-standards-only-hinder-the-true-potential-of-the-iot-industry/ |title=Will fragmentation of standards only hinder the true potential of the IoT industry? |first=Aaron |last=Ardiri |work=evothings.com |date=8 July 2014}} 153. ^{{Cite web |url=http://www.arm.com/zh/files/event/ATF2015SZ_A6_Thundersoft.pdf |title=IOT Brings Fragmentation in Platform |work=arm.com}} 154. ^{{Cite web |url=https://www.w3.org/Talks/2016/04-27-countering-fragmentation.pdf |title=Countering Fragmentation with the Web of Things: Interoperability across IoT platforms |first=Dave |last=Raggett |work=W3C |date=27 April 2016}} 155. ^{{cite journal |first=Steve |last=Kovach |url=http://www.businessinsider.com/android-fragmentation-report-2013-7 |title=Android Fragmentation Report |journal=Business Insider |date=30 July 2013 |accessdate=19 October 2013}} 156. ^{{Cite web|url=https://www.argenox.com/library/iot/ultimate-guide-iot-connectivity/|title=Ultimate Guide to Internet of Things (IoT) Connectivity|last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}} 157. ^{{Cite web |url=http://techbeacon.com/will-android-fragmentation-spoil-its-iot-appeal |title=Will Android fragmentation spoil its IoT appeal? |first=Floyd N. |last=Piedad |work=TechBeacon}} 158. ^{{cite web |url=http://motherboard.vice.com/read/goodbye-android |title=Goodbye, Android |website=Motherboard |publisher=Vice |last1=Franceschi-Bicchierai |first1=Lorenzo |accessdate=2 August 2015|date=2015-07-29 }} 159. ^{{cite web |url=http://www.zdnet.com/article/the-android-toxic-hellstew-survival-guide/ |title=The toxic hellstew survival guide |website=ZDnet |last1=Kingsley-Hughes |first1=Adrian |accessdate=2 August 2015}} 160. ^{{cite web |url=http://www.zdnet.com/article/android-security-a-market-for-lemons-that-leaves-87-percent-insecure/ |title=Android security a 'market for lemons' that leaves 87 percent vulnerable |date=13 October 2015 |website=ZDNet |first1=Liam |last1=Tung |accessdate=14 October 2015}} 161. ^{{Cite book |url=https://www.cl.cam.ac.uk/~drt24/papers/spsm-scoring.pdf |first1=Daniel R. |title=Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices – SPSM '15 |pages=87–98 |last1=Thomas |last2=Beresford |first2=Alastair R. |last3=Rice |first3=Andrew |website=Computer Laboratory, University of Cambridge |doi=10.1145/2808117.2808118 |accessdate=14 October 2015|year=2015 |isbn=9781450338196 }} 162. ^{{cite book |first=Philip N. |last=Howard |authorlink=Philip N. Howard |title=Pax Technica: How the internet of things May Set Us Free, Or Lock Us Up |location=New Haven, CT |publisher=Yale University Press |year=2015 |isbn=978-0-30019-947-5}} 163. ^{{cite web |url=http://madsg.com/wp-content/uploads/2015/12/Designing_the_Internet_of_Things.pdf |title=Designing the Internet of Things|first=Adrian |last=McEwan |date=2014 |accessdate=1 June 2016}} 164. ^{{cite web |url=https://storify.com/clarered/adam-greenfield-connected-things-and-civic-respons |title=Connected Things and Civic Responsibilities |first=Clare |last=Reddington |work=Storify |accessdate=20 May 2016}}{{dead link|date=March 2019}} 165. ^{{cite web |url=http://www.theinternetofthings.eu/sites/default/files/Rob%20van%20Kranenburg/Panopticon%20as%20metaphor%20for%20the%20IoT_GS%20Dec2011.pdf |title=Panopticon as a metaphor for the internet of things |work=The Council of the Internet of Things |accessdate=6 June 2016}} 166. ^1 {{cite web |url=https://ccle.ucla.edu/pluginfile.php/1330126/mod_resource/content/0/foucault.pdf |title=Foucault |publisher=UCLA}} 167. ^{{cite web |url=https://ccle.ucla.edu/pluginfile.php/1330127/mod_resource/content/0/Deleuze%20-%201992%20-%20Postscript%20on%20the%20Societies%20of%20Control.pdf |title=Deleuze – 1992 – Postscript on the Societies of Control |publisher=UCLA}} 168. ^{{Cite book |first1=Kenji |last1=Yoshigoe |first2=Wei |last2=Dai |first3=Melissa |last3=Abramson |first4=Alexander |last4=Jacobs |title=Overcoming Invasion of Privacy in Smart Home Environment with Synthetic Packet Injection |journal=TRON Symposium (TRONSHOW) |page=1 |date=2015 |doi=10.1109/TRONSHOW.2014.7396875 |isbn=978-4-8936-2317-1}} 169. ^{{Cite book |last=Verbeek |first=Peter-Paul |title=Moralizing Technology: Understanding and Designing the Morality of Things |location=Chicago |publisher=The University of Chicago Press |year=2011 |isbn=978-0-22685-291-1}} 170. ^{{Cite news |first=Diane |last=Cardwell |url=https://www.nytimes.com/2014/02/18/business/at-newark-airport-the-lights-are-on-and-theyre-watching-you.html |title=At Newark Airport, the Lights Are On, and They're Watching You |newspaper=The New York Times |date=18 February 2014}} 171. ^{{cite news |last1=Hardy |first1=Quentin |title=Tim O'Reilly Explains the Internet of Things|url=http://bits.blogs.nytimes.com/2015/02/04/tim-oreilly-explains-the-internet-of-things/ |website=The New York Times Bits |publisher=The New York Times |accessdate=18 May 2015 |date=4 February 2015}} 172. ^{{Cite news |url=https://www.wired.com/2015/02/say-goodbye-to-privacy/ |title=Say Goodbye to Privacy |first=Geoff |last=Webb |date=5 February 2015 |website=WIRED |accessdate=15 February 2015}} 173. ^{{Cite web |first1=Catherine |last1=Crump |first2=Matthew |last2=Harwood |url=http://www.tomdispatch.com/post/175822/tomgram%3A_crump_and_harwood%2C_the_net_closes_around_us/ |title=The Net Closes Around Us |website=TomDispatch |date=25 March 2014}} 174. ^{{cite journal |ssrn=2215646 |title=Britain's Smart Meter Programme: A Case Study in Privacy by Design |first=Ian |last=Brown |date=12 February 2013 |doi=10.1080/13600869.2013.801580 |volume=28 |issue=2 |journal=International Review of Law, Computers & Technology |pages=172–184}} 175. ^1 {{cite web |url=https://www.bcs.org/upload/pdf/societal-impact-report-feb13.pdf |title=The Societal Impact of the Internet of Things |website=British Computer Society |date=14 February 2013 |accessdate=23 October 2016}} 176. ^1 {{Cite journal|last=Gubbi|first=Jayavardhana|last2=Buyya|first2=Rajkumar|last3=Marusic|first3=Slaven|last4=Palaniswami|first4=Marimuthu|date=1 September 2013|title=Internet of Things (IoT): A vision, architectural elements, and future directions|url=http://www.sciencedirect.com/science/article/pii/S0167739X13000241|journal=Future Generation Computer Systems|series=Including Special sections: Cyber-enabled Distributed Computing for Ubiquitous Cloud and Network Services & Cloud Computing and Scientific Applications — Big Data, Scalable Analytics, and Beyond|volume=29|issue=7|pages=1645–1660|doi=10.1016/j.future.2013.01.010|arxiv=1207.0203}} 177. ^{{cite book |chapter-url={{Google books|4UW4DgAAQBAJ|page=149|keywords=|text=|plainurl=yes}} |chapter=Recognizing Attacks in Wireless Sensor Network in View of Internet of Things |title=Internet of Things: Novel Advances and Envisioned Applications |author=Acharjya, D.P. |author2=Ahmed, N.S.S. |editor=Acharjya, D.P. |editor2=Geetha, M.K. |publisher=Springer |pages=149–50 |year=2017 |isbn=9783319534725}} 178. ^{{cite web |url=https://brage.bibsys.no/xmlui/bitstream/handle/11250/2458157/17677_FULLTEXT.pdf?sequence=1 |format=PDF |title=Energy Consumption of Wireless IoT Nodes |author=Hussain, A. |publisher=Norwegian University of Science and Technology |date=June 2017 |accessdate=26 July 2018}} 179. ^{{cite journal |last1=Singh |first1=Jatinder |last2=Pasquier |first2=Thomas |last3=Bacon |first3=Jean |last4=Ko |first4=Hajoon |last5=Eyers |first5=David |title=Twenty Cloud Security Considerations for Supporting the Internet of Things |journal=IEEE Internet of Things Journal |volume=3 |issue=3 |date=2015 |page=1 |doi=10.1109/JIOT.2015.2460333 |url=http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7165580}} 180. ^1 {{cite news |url=https://www.forbes.com/sites/chrisclearfield/2013/09/18/why-the-ftc-cant-regulate-the-internet-of-things/ |title=Why The FTC Can't Regulate The Internet Of Things |first=Chris |last=Clearfield |work=Forbes |accessdate=26 June 2015}} 181. ^1 {{cite web|url=https://freedom-to-tinker.com/2017/02/18/mitigating-the-increasing-risks-of-an-insecure-internet-of-things/|title=Mitigating the Increasing Risks of an Insecure Internet of Things|publisher=Freedom to Tinker|last=Feamster|first=Nick|date=18 February 2017|accessdate=8 August 2017}} 182. ^{{cite book |chapter-url={{Google books|uW1_CwAAQBAJ|page=PA1|keywords=|text=|plainurl=yes}} |chapter=Chapter 1: Introduction: Securing the Internet of Things |title=Securing the Internet of Things |author=Li, S. |editor=Li, S. |editor2=Xu, L.D. |publisher=Syngress |page=4 |year=2017 |isbn=9780128045053}} 183. ^{{cite web |url=http://www.businessinsider.in/We-Asked-Executives-About-The-Internet-Of-Things-And-Their-Answers-Reveal-That-Security-Remains-A-Huge-Concern/articleshow/45959921.cms |title=We Asked Executives About The Internet Of Things And Their Answers Reveal That Security Remains A Huge Concern |work=Business Insider |accessdate=26 June 2015}} 184. ^{{Cite web |url=http://blogs.hbr.org/2013/06/rethinking-security-for-the-in |first=Christopher |last=Clearfield |title=Rethinking Security for the Internet of Things |work=Harvard Business Review Blog |date=26 June 2013}} 185. ^1 {{Cite journal|last=Bastos|first=D.|last2=Shackleton|first2=M.|last3=El-Moussa|first3=F.|date=2018|title=Internet of Things: A Survey of Technologies and Security Risks in Smart Home and City Environments|url=http://mr.crossref.org/iPage?doi=10.1049%2Fcp.2018.0030|journal=Living in the Internet of Things: Cybersecurity of the IoT – 2018|publisher=Institution of Engineering and Technology|doi=10.1049/cp.2018.0030|isbn=9781785618437}} 186. ^{{cite book |url=https://www.researchgate.net/publication/294889554 |author1=A. Witkovski |title=2015 IEEE Global Communications Conference (GLOBECOM) |pages=1–6 |author2=A. O. Santin |author3=J. E. Marynowski |author4=V. Abreu Jr. |publisher=IEEE Globecom |date=December 2016|doi=10.1109/GLOCOM.2014.7417597 |isbn=978-1-4799-5952-5 }} 187. ^{{cite news |url=https://www.forbes.com/sites/josephsteinberg/2014/01/27/these-devices-may-be-spying-on-you-even-in-your-own-home/ |title=These Devices May Be Spying On You (Even In Your Own Home) |first=Joseph |last=Steinberg |work=Forbes |date=27 January 2014 |accessdate=27 May 2014}} 188. ^{{cite news |url=https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/ |title=Hackers Remotely Kill a Jeep on the Highway—With Me in It |first=Andy |last=Greenberg |authorlink=Andy Greenberg |website=Wired |date=21 July 2015 |accessdate=21 July 2015}} 189. ^{{Cite journal|last=Maras|first=M.-H.|date=2015-04-07|title=Internet of Things: security and privacy implications|url=https://academic.oup.com/idpl/article-abstract/5/2/99/645234?redirectedFrom=fulltext|journal=International Data Privacy Law|language=en|volume=5|issue=2|pages=99–104|doi=10.1093/idpl/ipv004|issn=2044-3994}} 190. ^Scientific American, April 2015, p.68. 191. ^{{cite book |last1=Loukas |first1=George |date=June 2015 |title=Cyber-Physical Attacks A growing invisible threat |url=http://dl.acm.org/citation.cfm?id=2818550|location=Oxford, UK |publisher=Butterworh-Heinemann (Elsevier)|page=65 |isbn=9780128012901}} 192. ^{{Cite journal|last=Liu|first=Ximeng|last2=Yang|first2=Yang|last3=Choo|first3=Kim-Kwang Raymond|last4=Wang|first4=Huaqun|date=2018-09-24|title=Security and Privacy Challenges for Internet-of-Things and Fog Computing|url=https://doi.org/10.1155/2018/9373961|journal=Wireless Communications and Mobile Computing|language=en|volume=2018|pages=1–3|doi=10.1155/2018/9373961|issn=1530-8669}} 193. ^{{Cite web |url=https://fas.org/irp/nic/disruptive.pdf |title=Disruptive Technologies Global Trends 2025 |work=National Intelligence Council (NIC) |date=April 2008 |page=27}} 194. ^{{cite news |url=https://www.wired.com/dangerroom/2012/03/petraeus-tv-remote/ |title=CIA Chief: We'll Spy on You Through Your Dishwasher |date=15 March 2012 |work=WIRED |accessdate=26 June 2015 |first=Spencer |last=Ackerman}} 195. ^{{Cite news |url=https://www.theguardian.com/technology/2016/oct/26/ddos-attack-dyn-mirai-botnet |title=DDoS attack that disrupted internet was largest of its kind in history, experts say |first=Nicky |last=Woolf |newspaper=The Guardian |date=26 October 2016}} 196. ^1 2 3 4 {{Cite book|url=https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-antonakakis.pdf|title=Understanding the Mirai Botnet|last=Antonakakis|first=Manos|last2=April|first2=Tim|date=August 18, 2017|website=Usenix|isbn=978-1-931971-40-9|archive-url=|archive-date=|dead-url=|access-date=May 13, 2018|last3=Bailey|first3=Michael|last4=Bernhard|first4=Matt|last5=Bursztein|first5=Elie|last6=Cochran|first6=Jaime|last7=Durumeric|first7=Zakir|last8=Halderman|first8=J. Alex|last9=Invernizzi|first9=Luca}} 197. ^{{cite web|title=The "anti-patterns" that turned the IoT into the Internet of Shit / Boing Boing|url=https://boingboing.net/2017/05/03/bad-design-thinking.html|website=boingboing.net}} 198. ^{{cite web|last1=Ali|first1=Junade|title=IoT Security Anti-Patterns|url=https://blog.cloudflare.com/iot-security-anti-patterns/|website=Cloudflare Blog|date=2 May 2017}} 199. ^{{cite web |url=https://www.schneier.com/essays/archives/2016/10/we_need_to_save_the_.html |title=We Need to Save the Internet from the Internet of Things |first=Bruce |last=Schneier |work=Motherboard |date=6 October 2016}} 200. ^{{Cite web|url=https://www.washingtonpost.com/technology/2019/01/31/doorbells-have-eyes-privacy-battle-brewing-over-home-security-cameras/|title=The doorbells have eyes: The privacy battle brewing over home security cameras|last=https://www.facebook.com/geoffreyfowler|website=Washington Post|language=en|access-date=2019-02-03}} 201. ^{{cite web|url=https://hacks.mozilla.org/2017/06/building-the-web-of-things|title=Building the Web of Things – Mozilla Hacks – the Web developer blog|website=Mozilla Hacks – the Web developer blog}} 202. ^{{cite web |url=https://kbvresearch.com/ |title=The Step Towards Innovation}} 203. ^{{cite web |url=https://kbvresearch.com/global-iot-security-market/ |title=Global IoT Security Market to reach a market size of $29.2 billion by 2022}} 204. ^{{Cite news |url=https://www.bbc.co.uk/news/technology-34324247 |title=Smart devices to get security tune-up|first=Mark |last=Ward |newspaper=BBC News |date=23 September 2015}} 205. ^{{cite web |url=https://iotsecurityfoundation.org/executive-steering-board/ |title=Executive Steering Board |work=IoT Security Foundation}} 206. ^{{cite web |url=https://www.schneier.com/blog/archives/2017/02/security_and_th.html |title=Security and the Internet of Things |first=Bruce |last=Schneier |date=1 February 2017}} 207. ^1 2 {{cite conference |title=IoTSan: Fortifying the Safety of IoT Systems |last1=Nguyen |first1=Dang Tu |last2=Song |first2=Chengyu |last3=Qian |first3=Zhiyun |last4=V. Krishnamurthy |first4=Srikanth |last5=J. M. Colbert |first5=Edward |last6=McDaniel |first6=Patrick |date=2018 |location=Heraklion, Greece |conference=Proc. of the 14th International Conference on emerging Networking EXperiments and Technologies (CoNEXT '18) |id=arXiv:1810.09551 |doi=10.1145/3281411.3281440|arxiv = 1810.09551}} 208. ^{{cite web|url=https://www.smartthings.com/|title=SmartThings.|website=SmartThings.com}} 209. ^{{cite web|url=https://developer.apple.com/homekit/|title=HomeKit – Apple Developer|website=developer.apple.com}} 210. ^{{cite web|url=https://developer.amazon.com/alexa|title=Amazon Alexa|website=developer.amazon.com}} 211. ^1 {{cite web |url=https://www.ics.uci.edu/~fielding/pubs/dissertation/fielding_dissertation.pdf |first=Roy Thomas |last=Fielding |title=Architectural Styles and the Design of Network-based Software Architectures |year=2000 |work=University Of California, Irvine}} 212. ^{{cite web |last1=Littman |first1=Michael |first2=Samuel |last2=Kortchmar |title=The Path To A Programmable World |url=http://footnote1.com/the-path-to-a-programmable-world/ |website=Footnote |accessdate=14 June 2014|date=2014-06-11 }} 213. ^{{Cite journal |last1=Finley |first1=Klint |title=The Internet of Things Could Drown Our Environment in Gadgets |url=https://www.wired.com/2014/06/green-iot/ |journal=Wired |date=6 May 2014}} 214. ^{{cite book |chapter-url={{Google books|PP1xCQAAQBAJ|page=SA10-PA69|keywords=|text=|plainurl=yes}} |title=Designing Connected Products: UX for the Consumer Internet of Things |chapter=Chapter 11: Responsible IoT Design |author=Light, A. |author2=Rowland, C. |editor=Rowland, C. |editor2=Goodman, E. |editor3=Charlier, M. |display-editors=et al |publisher=O'Reilly Media |pages=457–64 |year=2015 |isbn=9781449372569}} 215. ^{{cite web |title=The time that Tony Fadell sold me a container of hummus |first=Arlo |last=Gilbert |date=3 April 2016 |accessdate=7 April 2016 |url=https://medium.com/@arlogilbert/the-time-that-tony-fadell-sold-me-a-container-of-hummus-cb0941c762c1}} 216. ^1 2 {{cite web |title=Nest Reminds Customers That Ownership Isn't What It Used to Be |date=5 April 2016 |accessdate=7 April 2016 |first=Kit |last=Walsh |url=https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be |work=Electronic Frontier Foundation}} 217. ^1 2 3 {{cite web|title=Taming the IoT terminology zoo: what does it all mean?|url=http://www.information-age.com/taming-iot-terminology-zoo-what-does-it-all-mean-123459907/|website=Information Age|publisher=Vitesse Media Plc|accessdate=14 March 2017|date=2015-07-30}} 218. ^1 {{cite web|title=Technology Working Group|url=http://www.iiconsortium.org/wc-technology.htm|publisher=The Industrial Internet Consortium|accessdate=21 March 2017}} 219. ^{{cite web|title=Vocabulary Technical Report|url=http://www.iiconsortium.org/vocab/index.htm|publisher=The Industrial Internet Consortium|accessdate=21 March 2017}} 220. ^{{cite web|title=Acceleration Sensing|url=http://www.iotone.com/term/acceleration-sensing/t19|publisher=IoT One|accessdate=21 March 2017}} 221. ^{{cite web|title=IoT Terms Database|url=http://www.iotone.com/terms|publisher=IoT One|accessdate=21 March 2017}} 222. ^{{cite web |url=https://www.iotone.com/quick-guide |title=Quick Guide |work=IoT ONE |accessdate=26 July 2018}} 223. ^{{cite web|title=Why The Consumer Internet Of Things Is Stalling|url=https://www.forbes.com/sites/ciocentral/2016/09/13/why-the-consumer-internet-of-things-is-stalling/|publisher=Forbes|accessdate=24 March 2017}} 224. ^1 2 {{Cite arxiv|title=Privacy of the Internet of Things: A Systematic Literature Review (Extended Discussion)|eprint=1611.03340|last1=Aleisa|first1=Noura|last2=Renaud|first2=Karen|last3=Jayawardena|first3=Srimal|year=2016|class=cs.CY}} 225. ^{{cite web|last1=Basenese|first1=Louis|title=The Best Play on the Internet of Things Trend|url=https://www.wallstreetdaily.com/2015/12/21/internet-of-things-future/|website=Wall Street Daily|publisher=Wall Street Daily|accessdate=28 March 2017|date=2015-12-21}} 226. ^1 2 {{cite web|title=Igniting Growth in Consumer Technology|url=https://www.accenture.com/t20160108T124537__w__/us-en/_acnmedia/PDF-3/Accenture-Igniting-Growth-In-Consumer-Technology.pdf|publisher=Accenture|accessdate=27 March 2017}} 227. ^1 2 3 4 {{cite web|title=Every. Thing. Connected. A study of the adoption of 'Internet of Things' among Danish companies|url=http://digital.di.dk/SiteCollectionDocuments/Analyser/IoT_Report_onlineversion.pdf|publisher=Ericsson|accessdate=28 March 2017}} 228. ^{{cite web|last1=Yarmoluk|first1=Dan|title=5 Barriers to IoT Adoption & How to Overcome Them|url=http://assetscan.com/blog/5-barriers-to-iot-adoption-how-to-overcome-them|publisher=ATEK Access Technologies|accessdate=30 March 2017}} 229. ^1 2 3 {{cite web|last1=Anthony|first1=Scott|title=Disruptive Innovation: Kodak's Downfall Wasn't About Technology|url=https://hbr.org/2016/07/kodaks-downfall-wasnt-about-technology|website=Harvard Business Review|publisher=Harvard Business Publishing|accessdate=30 March 2017|date=2016-07-15}} 230. ^{{Cite web |url=http://www3.weforum.org/docs/WEF_Technology_and_Innovation_The_Next_Economic_Growth_Engine.pdf |title=World Economic Forum: The Next Economic Growth Engine – Scaling Fourth Industrial Revolution Technologies in Production |website=World Economic Forum}} 231. ^{{Cite journal|last=Solaimani|first=Sam|last2=Keijzer-Broers|first2=Wally|last3=Bouwman|first3=Harry|date=2015-05-01|title=What we do – and don't – know about the Smart Home: An analysis of the Smart Home literature|journal=Indoor and Built Environment|volume=24|issue=3|pages=370–383|doi=10.1177/1420326X13516350|issn=1420-326X}} 232. ^{{Cite journal|last=Westerlund|first=Mika|last2=Leminen|first2=Seppo|last3=Rajahonka|first3=Mervi|date=2014|title=Designing Business Models for the Internet of Things|url=http://timreview.ca/article/807|journal=Technology Innovation Management Review|volume=4|issue=7|issn=1927-0321}} Bibliography{{commons category|Internet of things}}
6 : Internet of things|Ambient intelligence|Emerging technologies|Technology assessment|Computing and society|Digital technology |
|||||||||||||||||||||||||||||||||||||||||||
随便看 |
|
开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。