Overview#Internet of Things (IoT) the Identity Relation between one Digital Identity and another Digital Identity.
The Internet of Things (IoT) is the network of physical objects or "things" embedded with electronics, applications, sensors and telecommunications to enable it to achieve greater value and service by exchanging data with the manufacturer, operator and/or other connected devices. Each thing is uniquely identifiable through its embedded computing system but is able to interoperate within the existing Internet infrastructure.
The term "Internet of Things" was first documented by a British visionary, Kevin Ashton, in 1999. Typically, IoT is expected to offer advanced connectivity of devices, systems, and services that goes beyond machine-to-machine communications (M2M) and covers a variety of protocols, domains, and applications. The interconnection of these embedded devices (including smart objects), is expected to usher in automation in nearly all fields, while also enabling advanced applications like a Smart Grid.
Things, in the IoT, can refer to a wide variety of devices such as heart monitoring implants, biochip transponders on farm animals, electric clams in coastal waters, automobiles with built-in sensors, or field operation devices that assist fire-fighters in search and rescue. These devices collect useful data with the help of various existing technologies and then autonomously flow the data between other devices. Current market examples include smart thermostat systems and washer/dryers that utilize Wi-Fi for remote monitoring.
Besides the plethora of new application areas for Internet connected automation to expand into, IoT is also expected to generate large amounts of data from diverse locations that is aggregated very quickly, thereby increasing the need to better index, store and process such data.
What is the Impact?#Expected to be 400 to 450% increase in devices in the next five (5) Years. (2016-07).
General belief is that that a The Laws of Relationships will need to be applied and that the following will become true:
- IAM will be morphed into:
- Consumers and things over Employees
- Internet-scale over Enterprise-scale
- Borderless over perimeter
- Mobile Devices will be involved in Authentication
More Information#There might be more information for this subject on one of the following:
- Constrained Application Protocol
- Future Prediction
- Home Automation
- IAM Charter
- Industry 4.0
- Persistent Compute Objects
- Remote Procedure Call
- Terminology for Constrained-Node Networks
- The Laws of Relationships
- User-Managed Access
- Web Blog_blogentry_080615_1
- Web Blog_blogentry_111017_1
- Web Blog_blogentry_140316_1
- Web Blog_blogentry_190617_1
- Web Blog_blogentry_200217_2
- Who Owns the Data