Internet of Things (IoT) the Identity Relation between one Digital Identity and another Digital Identity.

The Internet of Things (IoT) is the network of physical objects or "things" embedded[1] with electronics, software, sensors and connectivity to enable it to achieve greater value and service by exchanging data with the manufacturer, operator and/or other connected devices. Each thing is uniquely identifiable through its embedded computing system but is able to interoperate within the existing Internet infrastructure.

The term "Internet of Things" was first documented by a British visionary, Kevin Ashton, in 1999. Typically, IoT is expected to offer advanced connectivity of devices, systems, and services that goes beyond machine-to-machine communications (M2M) and covers a variety of protocols, domains, and applications. The interconnection of these embedded devices (including smart objects), is expected to usher in automation in nearly all fields, while also enabling advanced applications like a Smart Grid.

Things, in the IoT, can refer to a wide variety of devices such as heart monitoring implants, biochip transponders on farm animals, electric clams in coastal waters,[6] automobiles with built-in sensors, or field operation devices that assist fire-fighters in search and rescue.[7] These devices collect useful data with the help of various existing technologies and then autonomously flow the data between other devices.[8] Current market examples include smart thermostat systems and washer/dryers that utilize Wi-Fi for remote monitoring.

Besides the plethora of new application areas for Internet connected automation to expand into, IoT is also expected to generate large amounts of data from diverse locations that is aggregated very quickly, thereby increasing the need to better index, store and process such data.[9][10]

What is the Impact?#

Expected to be 400 to 450% increase in devices in the next five (5) Years. (2016-07).

_Internet of Things devices will generate a lot of data including Personal data and Patient Data and frankly, we do not have good methods to deal with these Protected Resources.

NIST Electronic Authentication Guidelines do not specifically address a lot of the machine-to-machine authentication which will be required.

General belief is that that a The Laws of Relationships will need to be applied and that the following will become true:

More Information#

There might be more information for this subject on one of the following:

Add new attachment

Only authorized users are allowed to upload new attachments.
« This page (revision-10) was last changed on 03-Jan-2017 10:17 by jim