This page (revision-1) was last changed on 29-Nov-2024 16:16 by UnknownAuthor

Only authorized users are allowed to rename pages.

Only authorized users are allowed to delete pages.

Page revision history

Version Date Modified Size Author Changes ... Change note

Page References

Incoming links Outgoing links

Version management

Difference between version and

At line 1 added 42 lines
!!! Overview
[{$pagename}] ([IoT]) the [Identity Relation] between one [Digital Identity] and another [Digital Identity].
The [{$pagename}] ([IoT]) is the network of physical objects or "[things]" embedded[1] with electronics, [applications], [sensors] and [telecommunications] to enable it to achieve greater value and service by exchanging [data] with the manufacturer, operator and/or other connected [devices]. Each thing is uniquely identifiable through its embedded computing system but is able to interoperate within the existing [Internet] infrastructure.
The term "[{$pagename}]" was first documented by a British visionary, Kevin Ashton, in 1999. Typically, [IoT] is expected to offer advanced connectivity of devices, systems, and services that goes beyond [machine-to-machine] communications ([M2M]) and covers a variety of [protocols], domains, and [applications]. The interconnection of these embedded devices (including smart objects), is expected to usher in automation in nearly all fields, while also enabling advanced [applications] like a [Smart Grid].
[Things], in the [IoT], can refer to a wide variety of [devices] such as heart monitoring implants, biochip transponders on farm animals, electric clams in coastal waters,[6] [automobiles] with built-in [sensors], or field operation devices that assist fire-fighters in search and rescue. These devices [collect|monitoring] useful [data] with the help of various existing technologies and then autonomously flow the [data] between other [devices].[8] Current market examples include smart thermostat systems and washer/dryers that utilize Wi-Fi for remote monitoring.
Besides the plethora of new [application] areas for Internet connected automation to expand into, IoT is also expected to generate large amounts of data from diverse locations that is aggregated very quickly, thereby increasing the need to better index, store and process such data.[9][10]
!! What is the Impact?
Expected to be 400 to 450% increase in devices in the next five (5) Years. (2016-07).
_[{$pagename}] devices will generate a lot of [data] including [Personal data] and [Patient Data] and frankly, we do not have good methods to deal with these [Protected Resources].
[NIST Electronic Authentication Guidelines] do not specifically address a lot of the [machine-to-machine] [authentication] which will be required.
General belief is that that a [The Laws of Relationships] will need to be applied and that the following will become true:
* [IAM] will be morphed into:
** [Consumers|Consumer of services] and [things] over [Employees]
** Internet-scale over Enterprise-scale
** [Borderless over perimeter|Zero Trust]
* [Mobile Devices] will be involved in [Authentication]
** [Context Based Access Control] over [MFA]
** Enterprise-level local [Authentication] to [IoT] devices
** Single [device] for multiple [Authentication Methods]
!! [Who Owns the Data]
[Who Owns the Data] from [{$pagename}]
!! More Information
There might be more information for this subject on one of the following:
[{ReferringPagesPlugin before='*' after='\n' }]
----
* [#1] - [Internet_of_Things|Wikipedia:Internet_of_Things|target='_blank'] - based on data observed:2015-06-08
* [#2] - [Pillars of IRM|https://kantarainitiative.org/irmpillars/|target='_blank'] - based on information obtained 2015-06-08
* [#3] - [Identity and Access
Management for the
Internet of Things|https://downloads.cloudsecurityalliance.org/assets/research/internet-of-things/identity-and-access-management-for-the-iot.pdf|target='_blank'] - based on information obtained 2017-04-11