Enhancing IoT Data Dependability through a Blockchain Mirror Model

N/A | May 21, 2019

article image
One subtle aspect of the alert recently raised by Dr. Geneveva Allen about a “science crisis “is the observation that current machine learning algorithms may discover patterns in data that exist only In data but not in the real world. This is particularly true of data obtained by external sources where a validation process is barely exposed or accomplished. The emphasis here is not in external sources but in the lack of a credible validation process of data. This is “a fortiori” true in the case of data generated by the Internet of Things (IoT). In fact, the IoT relies (and will rely) heavily on Artificial Intelligence (AI) techniques to provide security and reliability.

Spotlight

IIoT Center

Within the Industrial Internet of Things (IIoT) Center at the Fraunhofer FOKUS in Berlin (Germany), industrial network technologies, standard-based connectivity and communication mechanisms, Fog/Edge/Cloud computing infrastructures, machine-to-machine communication, device management, orchestration and data analytics platforms enable a new generation of highly reliable, highly secure, near-realtime and intelligent IIoT applications.

OTHER ARTICLES

IoT Security: Inherent Risks Require Robust Solutions

Article | February 25, 2020

IoT technologies offer many remarkable benefits. They can make complicated tasks, such as tracking a fleet of thousands of vehicles, monitoring and adjusting manufacturing processes or automating a smart home or office simpler, easier and more cost-effective than ever before. By inviting IoT devices into our homes, workplaces and public spaces, however, we also expose new attack surfaces. When we assign an IoT system to be responsible for a critical task or trust it to monitor sensitive information in our most private spaces, we want to ensure that the system can be trusted. For this reason, it is vital that security best practices are applied at all stages when developing an IoT solution.

Read More

Breaking Down IoT Standards and Protocols

Article | February 25, 2020

The Internet of Things has given rise to a host of new standards and protocols. Still more protocols that originally existed for other purposes but are well suited to new IoT applications have been adopted by device manufacturers and application creators. Though in some senses IoT devices are the same as any other internet-connected device, the bandwidth, power, and transmission distance constraints inherent in many IoT applications require novel new solutions to the fundamental actions of connectivity, data transfer, device discovery, and communication. This article will serve as a brief glossary of terms related to IoT communication protocols and standards. Click here for a more complete introduction to connectivity options.

Read More

THE FUTURE OF BIOMETRICS IOT

Article | February 25, 2020

In 2018 when Apple unveiled its iconic iPhone X with a feature to unlock the phone with Face ID thereby eliminating the use of the home button, it met a lot of eye-rolls. Fast forward to now, people are in love with the biometrics enabled technologies. While iPhone X had a unimodal authentication system, gadget these days have updated themselves in a better way. Let’s try to have a better understanding of the Biometrics. Biometrics are a way to measure a person’s physical characteristics to verify their identity. It can be physiological traits, like fingerprints and eyes, or behavioral traits, that define the manner an individual respond to stimuli. These characteristics are unique to the person. Once collected the data compared with the pre-existing database to find a match. Accordingly, it then produces an outcome. There are many varieties in which this data is collected. Facial and voice recognition, iris and finger scanner, signature verification, hand geometry, keystroke, gait detectors are some of the examples.

Read More

Smart Building Initiatives are the Building Blocks of a Smart City

Article | February 25, 2020

To paraphrase a well-known saying, the journey to a complete smart city begins with a single building. No matter the size of the city, the extent of the technology or the most helpful use cases, a prospective smart city can integrate into — or branch off of — initiatives pushed forward by a smart building or campus. And when there is an increasing demand for these types of solutions, large corporations have the opportunity to improve corporate and social governance practices, as well as stand out in their community by championing more connected technologies.

Read More

Spotlight

IIoT Center

Within the Industrial Internet of Things (IIoT) Center at the Fraunhofer FOKUS in Berlin (Germany), industrial network technologies, standard-based connectivity and communication mechanisms, Fog/Edge/Cloud computing infrastructures, machine-to-machine communication, device management, orchestration and data analytics platforms enable a new generation of highly reliable, highly secure, near-realtime and intelligent IIoT applications.

Events