IEEEInternetof Things Magazine September 2018
IEEEInternetof Things Magazine September 2018
The program will feature the most outstanding participants from the research community,
public sector, and industry as well as a vast array of papers and presentations on the latest
technological innovations in the many fields and disciplines that drive the utility and vitality of
IoT solutions and applications.
TOPICAL TRACKS VERTICAL TRACKS
• Artificial Intelligence
• Agriculture
• Communications, Connectivity and
• Automotive and Transportation
5G Technologies
• Healthcare, Pharmaceuticals, and
• Cybersecurity, Data Security, and Privacy
Medical Devices
• Data and The Internet of Things
• Industrial Internet of Things
• Green Technologies – Environment,
• Maritime Internet of Things
Sustainability and the Circular Economy
• Smart Cities
• Sensors and Sensor Systems
FEATURED VERTICALS
14 Why Industry Needs to Accelerate IoT Standards
Maciej Kranz
20 Drilling Deep into Digital Industrial Transformation Will
Determine Who Survives and Thrives
William Ruh
24 Connecting the Dots on IoT for the Industrial World
Karine Lavoie-Tremblay
28 The Future of IoT
Joern Ploennigs
IEEE INTERNET OF THINGS MAGAZINE (ISSN 2576-3180) is published quarterly by The Institute of Electrical and Electronics Engineers, Inc. Headquarters address: IEEE, 3 Park Avenue, 17th Floor, New
York, NY 10016-5997, USA; tel: +1 (212) 705-8900. Responsibility for the contents rests upon authors of signed articles and not the IEEE or its members. Unless otherwise specified, the IEEE neither endorses
nor sanctions any positions or actions espoused in IEEE Internet of Things Magazine.
ANNUAL SUBSCRIPTION: US$53 print subscription; US$38 electronic subscription; US$624 non-member print subscription.
EDITORIAL CORRESPONDENCE: Editor-in-Chief, Keith Gremban, e-mail: [email protected].
COPYRIGHT AND REPRINT PERMISSIONS: Abstracting is permitted with credit to the source. Libraries are permitted to photocopy beyond the limits of U.S. Copyright law for private use of patrons:
those post-1977 articles that carry a code on the bottom of the first page provided the per copy fee indicated in the code is paid through the Copyright Clearance Center, 222 Rosewood Drive,
Danvers, MA 01923. For other copying, reprint, or republication permission, write to Director, Publishing Services, at IEEE Headquarters. All rights reserved. Copyright © 2018 by The Institute of
Electrical and Electronics Engineers, Inc.
POSTMASTER: Send address changes to IEEE Internet of Things Magazine, IEEE, 445 Hoes Lane, Piscataway, NJ 08855-1331. Printed in USA. Periodicals postage paid at New York, NY and at additional
mailing offices. Canadian Post International Publications Mail (Canadian Distribution) Sales Agreement No. 40030962. Return undeliverable Canadian addresses to: Frontier, PO Box 1051, 1031
Helena Street, Fort Eire, ON L2A 6C7.
SUBSCRIPTIONS: Orders, address changes — IEEE Service Center, 445 Hoes Lane, Piscataway, NJ 08855-1331, USA; tel: +1 (732) 981-0060; e-mail: [email protected].
ADVERTISING: Advertising is accepted at the discretion of the publisher. Address correspondence to: Advertising Manager, IEEE Internet of Things Magazine, IEEE, 3 Park Avenue, 17th Floor, New
York, NY 10016-5997.
SUBMISSIONS: The magazine welcomes high-quality articles on IoT technology and end-to-end IoT solutions. Submissions will normally be approximately 4500 words, accompa-
nied by up to six figures and/or tables, with up to fifteen carefully selected references. Electronic submissions are preferred and should be submitted through Manuscript Central:
https://mc.manuscriptcentral.com/iotmag. All submissions will be peer reviewed.
munity of IoT practitioners will find the articles and columns to guide-to-iot.html
4 https://www.mckinsey.com/business-functions/digital-mckinsey/our-insights/the-
be interesting and useful, and provide support for Internet of internet-of-things-the-value-of-digitizing-the-physical-world
Things Magazine in the form of articles, columns, references,
and, of course, subscriptions.
Perspectives on IoT Policy stakes in the benefits and the risks. In other words, IoT brings
new challenges to ongoing and longstanding policy debates.
For example, IoT raises particular cybersecurity challenges, but
from the U.S. NTIA it would be counter-productive to consider them outside of the
context of broader cybersecurity conversations or to reinvent
by David J. Redl the wheel where progress has been made elsewhere.
Assistant Secretary for Communications and Information and This insight is reflected in the policy paper titled Fostering the
Advancement of the Internet of Things (https://www.ntia.doc.
Administrator, National Telecommunications and Information gov/files/ntia/publications/iot_green_paper_01122017.pdf)
Administration, U.S. Department of Commerce that was released by the Department of Commerce’s Internet
Policy Task Force. Informed by public comments from industry,
The Internet of Things (IoT) is not the future — it is the present. academia, civil society, individuals and a public workshop, the
From smart home devices that open blinds, brew coffee, and paper concludes that the United States’ policy approach that
turn on the news in the morning to industrial applications rev- helped lead to the global success of the Internet continues
olutionizing supply chain management, connected devices are to be the best way to respond to innovative technologies. It
changing how we live, work, and play. also lays out the following four areas that could help guide the
At the National Telecommunications and Information Department’s efforts to encourage IoT growth and innovation
Administration (NTIA), we understand the potential benefits of in a manner that is inclusive and widely accessible, and is within
IoT and are dedicated to ensuring that we have the policies and a stable, secure and trustworthy environment:
infrastructure in place to support the innovation behind these Enabling Infrastructure Availability and Access: IoT only
advances. In depth technical understanding is vital to well-run works so long as there is connectivity, and that connectivity
policy making processes, and it is equally important for the is dependent upon telecommunications infrastructure, both
technical community to grapple with the wider impacts of its wireline and wireless. NTIA plays important roles, as our Office
work. IEEE IoT Magazine is therefore a welcome addition to the of Telecommunications and Information Applications works to
conversation, and I appreciate the opportunity to contribute to ensure that unserved communities gain access to the broad-
the inaugural edition. band connectivity necessary for IoT applications, and our Office
NTIA is the Executive Branch agency located within the U.S. of Spectrum Management both manages Federal spectrum
Department of Commerce that is principally responsible for resources and works with the Federal Communications Com-
advising the President on telecommunications and information mission to identify additional spectrum for commercial use.
policy issues. NTIA’s programs and policymaking focus large- Our contribution to wireless connectivity also includes the work
ly on expanding broadband Internet access and deployment of the Institute for Telecommunication Sciences (ITS), NTIA’s
in America, increasing the use of spectrum by all users, and research lab, which is exploring what the real spectrum needs
ensuring that the Internet remains an engine for continued are going to be with the onset of IoT. These efforts put us at the
innovation and economic growth. This broad mandate includes forefront of working to help enable access to robust and inno-
emerging technologies, such as those powering IoT. Within the vative IoT solutions for everyone.
Administration’s interagency processes, NTIA is a primary voice Crafting Balanced Policy and Building Coalitions: The
at the table focused on innovation and economic growth. advancement and adoption of IoT will also be affected by the
Neither the fundamental technologies nor the policy chal- policies that are in place to help encourage trust while safe-
lenges of IoT are novel. IoT differs in the sheer number of devic- guarding innovation. This will require close collaboration across
es that will be connected to the Internet and to each other, the government with industry and civil society to take on issues,
the variety of industries that are newly integrating connectivity such as privacy, cybersecurity, and intellectual property, among
into their products and business processes, and the increased others, that will shape the IoT ecosystem. The United States
has a successful track record in achieving this balance, but it
Editor’s Note: Text appearing in bold indicates a live link in the online version. will take dedication and cooperation across sectors to ensure
that this continues for IoT and other emerging technologies. for Economic Co-operation and Development, and the Inter-
NTIA’s Office of Policy Analysis and Development and Office net Governance Forum. We engage as well on the bilateral
of International Affairs are key players in helping to shape these and regional level, representing U.S. positions and promoting
policies. dialogue. We actively support NIST’s Global Cities Challenge
Promoting Standards and Technology Advancement: The work, which has this year added consideration of cybersecurity
Department of Commerce, through ITS and the National Insti- issues that smart cities face.
tute of Science and Technology (NIST), is committed to ensur- While I highlight cybersecurity, this is only one aspect of IoT
ing that the necessary technical standards are developed and in which NTIA is engaged. All of our diverse efforts are predi-
in place to support global IoT interoperability, and that the cated on stakeholder engagement and reliance on the expertise
technical applications and devices to support IoT continue to of practitioners. So we want to hear from you about the chal-
advance. We remain steadfast in our support of industry-driv- lenges that you face and your thoughts on potential solutions. It
en, consensus-based, voluntary, global standards. NTIA helps is only through your active participation and sharing of knowl-
support these efforts in a number of international organizations. edge that we will be able to craft the informed policy solutions
Encouraging Markets: Finally, the Department of Com- that a vibrant IoT ecosystem requires. NTIA is excited to work
merce is working to promote IoT through the use of its own IoT with you to ensure that IoT continues to fulfill its extraordinary
devices, iterative enhancement, and novel deployment of the potential.
technologies. We will also be working with our global partners
to help translate the economic benefits and opportunities of David J. Redl was sworn in as Assistant Secretary for Commu-
nications and Information at the Department of Commerce in
IoT, expanding the market not only domestically but world- November 2017. He serves as Administrator of the National
wide. Telecommunications and Information Administration (NTIA),
To show how this work is being translated into practice, the Executive Branch agency that is principally responsible for
I want to spend some time drilling down into how NTIA is advising the President on telecommunications and information
policy. He is a lawyer and communications policy expert with
approaching what commenters on our report cited most fre- more than a decade of experience in government and the pri-
quently as a challenge to the advancement of IoT: cyberse- vate sector. He was previously the chief counsel at the U.S. House of Representa-
curity. NTIA is taking a multipronged approach to addressing tives Committee on Energy and Commerce. In that role, he served as principal legal
cybersecurity concerns, takings steps to work with stakeholders advisor to the chairman and members of the Energy and Commerce majority on
communications and technology matters. Prior to his time with the committee, he
and within the government to craft balanced solutions that can was director of regulatory affairs at CTIA, a trade association that represents the U.S.
affect real-world change. wireless communications industry. He earned his J.D. from the Catholic University
First, NTIA has convened cybersecurity multi-stakeholder of America with a certificate from the Institute for Communications Law Studies,
processes that have brought together representatives of indus- and he is a graduate of Pennsylvania State University with degrees in journalism and
political science. He is admitted to the New York and District of Columbia bars. He
try, civil society, academia and the security research community lives in Falls Church, Virginia, with his wife, Amy, and their son, Benjamin.
to tackle difficult policy issues. The second of these processes
focused on patching and upgrading IoT devices to limit vul- Douglas C. Sicker ([email protected]) is currently the Lord Endowed Chair in Engi-
nerabilities. This process resulted in three finished work prod- neering, department head of Engineering and Public Policy, director of CyLab
Security and Privacy Institute, and a professor of engineering and public poli-
ucts — a guide for consumers, a technical breakdown of the cy with a joint appointment in the School of Computer Science and courtesy
patching process and a discussion of incentives and barriers appointment in the Heinz College at Carnegie Mellon University. He is also the
to patching — as well as a compendium of standards and best Executive Director of the Broadband Internet Technical Advisory Group (BITAG).
practices, which will be maintained as a living document. These Previously, he was the DBC Endowed Professor in the Department of Computer
Science at the University of Colorado at Boulder with a joint appointment in, and
documents, as well as more information about our processes, directorship of, the Interdisciplinary Telecommunications Program. He recently
can be found on our website here: https://www.ntia.doc.gov/ served as the chief technology officer and senior advisor for Spectrum at the
other-publication/2016/multistakeholder-process-iot-security. National Telecommunications and Information Administration (NTIA). He also
NTIA has also worked closely with NIST and with the served as the chief technology officer of the Federal Communications Commis-
sion (FCC), and prior to that he served as a senior advisor on the FCC National
Department of Homeland Security to produce a report on how Broadband Plan. Earlier he was director of Global Architecture at Level 3 Commu-
to combat distributed threats on the Internet, which can be nications, Inc. In the late 1990s, he served as Chief of the Network Technology
found here: https://www.commerce.gov/page/report-presi- Division at the FCC. He is an active member of ACM, AAAS, and the Internet
dent-enhancing-resilience-against-botnets. This report benefited Society. He has served as an advisor to the Department of Justice, the Federal
Trade Commission, the FCC, and the Department of State; the Chair of the FCC
greatly from stakeholder input through both comments and a Network Reliability and Interoperability Council steering committee; an advisor on
workshop and lays out actionable steps that can be taken to the Technical Advisory Council of the FCC, and chair of a recent National Acade-
address this abuse of Internet-connected devices. my study on the Boulder Department of Commerce Laboratories. He has chaired
NTIA is further engaged at the international level on devel- numerous conferences as well as served on many program committees and sever-
al National Academy studies. He has published extensively in the fields of wireless
oping cybersecurity policies, working in forums such as the systems, network security, and network policy, and has received funding from
International Telecommunications Union, the Organization NSF, DARPA, FAA, Cisco, Intel, IBM, and other sources.
IoT Standards Matters The IEEE is, obviously, an active contributor to the standards
world, with many of the IEEE outputs being elevated to Nation-
al Standards under the American National Standards Institute
by Mike Violette (ANSI), which is celebrating 100 years since its founding in May
Washington Laboratories, USA 1918, and whose mission is to “administer and coordinate the
U.S. voluntary standards and conformity assessment system.”
The universe of standards issues that affect IoT development A sister initiative under the aegis of the IEEE is the 5G Initia-
and implementation is vast and complicated, involving many tive, and the overlap of 5G and IoT is significant. One resource
organizations, technologies and interests. This article discuss- that has been developed under that initiative is the IEEE 5G
es the intersection of three elements of the IoT Standards Eco- Standards Database, found here: https://5g.ieee.org/standards/
system, namely: the principal organizations that drive Global standards-database. This database is a collaborative effort aimed
Standards Development, Standards for Functionality and Com- at collecting, in one place, standards that have “something to do
patibility, and Standards for Security and Privacy. These topics are with 5G,” and is a crowd-sourced kind of effort. Contributions
evolving rapidly and, like the Internet of Things, constantly mor- are welcome and encouraged from interested parties.
phing as technology solutions are developed and implemented. Clearly, the efforts undertaken to create this broad range of
Not being able to swallow the whole thing, our plan is to eat specifications and methods over the past decades has led to
the standards watermelon a bit at a time over the next several fundamental changes in our way of life. It is certainly expected
issues of IEEE Internet of Things Magazine. to proceed apace and shows no sign of easing as various influ-
So, for this inaugural article, I’ve chosen to briefly introduce encers cooperate and compete with each other for standards
the standards players by some admittedly subjective, broad, territory.
divisions: The Standards Development Organizations (SDO) The interaction between the various SDOs are varied and
Space, the Government Space and the Industry Space. A complex and involve a mix of face-to-face get-togethers requir-
sample of some of the players will be described and further ing many gallons of coffee as well as significant virtual efforts,
explored in future installments. where draft versions of documents whirl about on the Internet
as part of consensus efforts that aim to include many voices.
SDOs Often, it works well. Not infrequently the process may not work
Standards Development Organizations SDOs or Standards Set- so well and there are often winners and losers in the standards
tings Organizations SSOs operate, in general, according to certain race (think the long-ago VHS vs BETA square-off).
defined processes. Many organizations operate through a con-
sensus process that is characterized by openness, transparency, Standards for Functionality
balance, and due process or mechanisms for ensuring adherence A second layer of this standards-dive includes functionality. This
to organizational procedures, including provision for appeals.” 1 is a pretty critical aspect of the standards biome, and winners
The global standards eco-system is varied and vast with a mix of and losers are also defined in this space.
players with various, and sometimes opposing, agendas. With so many players in the IoT space, it’s a little dizzying to
Figure 1 represents a cross-section of standards-setting bod- determine the dominant drivers for IoT functionality; in fact, to
ies that are involved in various IoT standards (among other be honest, the task is a bit overwhelming. Major players in the
things, such as EMC, Electrical Safety, Radio/Wireless and industry, from software and hardware developers to govern-
Cyber-Security) involved with formally-recognized national ment to network operators, have already staked out decades of
standards bodies, committees and global organizations as well operating methods that drive IoT functionality.
other “fora and consortia.” This space includes consensus-driven efforts as well as pri-
The availability of the standards depends largely on the fund- vate and proprietary standards. One organization that has an
ing strategies. Many SDOs charge for their standards (IEC, ISO, open, consensus-based structure is the Internet Engineering
IEEE, etc.) while others distribute the standards for free (ETSI, Task Force (IETF), which is a “large open international commu-
e.g.) as part of government-sponsored efforts to promulgate nity of network designers, operators, vendors, and researchers
the information. In many of the standards-development models, concerned with the evolution of the Internet architecture.”
much of the work is performed by volunteers who presumably This particular group has over 100 working groups aimed at
have a stake in the outcome of the end-product, whether pro- improving “the smooth operation of the Internet.” The work-
moting a certain technology, protecting a bit of existing “real ing groups have defined areas that range from HTTP to Video
estate” or staying connected for other reasons. (I have met Codecs to IPv6 Operations to Software Updates for Internet
many standards “nerds” who do this for fun!) of Things. This group is open to anyone who is interested in
How big is the standards universe? Just a brief perusal of contributing to the IETF’s core mission and there are no mem-
the IEEE Standards Association website2 shows a “partial list- bership fees. https://www.ietf.org/about/participate/.
ing” of IEEE standards that are related to IoT. This listing has The development and improvement in standards and specifi-
over 70 standards, from base standards like IEEE 802.3-2012 cations are conducted through mail lists and collaborative tools,
“IEEE Standard for Ethernet” to more esoteric and specific IEEE while face-to-face meetings serve the purpose of putting faces
1609.11™-2010 — “IEEE Standard for Wireless Access in Vehic- with email addys.
ular Environments (WAVE) — Over-the-Air Electronic Payment The IETF’s IoT efforts include melding IoT needs with existing
Data Exchange Protocol for Intelligent Transportation Systems standards, such as the first WG chartered in 2005 (6LoWPAN)
(ITS).” which defined methods for adapting IPv6 to IEEE 802.15.4
(wireless personal area networks (WPANs)). Other wireless
Editor’s Note: Text appearing in bold indicates a live link in the online version. technologies are similarly adapted, including flavors of Blue-
Figure 1. A cross-section of standards-setting bodies that are involved in various IoT standards Figure credit:
Dr. Jochen Friedrich, IBM Europe.
Surface: IoT Privacy Risk precursor for privacy threats, vulnerabilities and harms.
The architecture of the IoT reduces friction in the collection,
processing, disclosure and actuation of data. The effect is a
by Erin Kenneally
blurring of temporal, spatial and organizational boundaries that
Department of Homeland Security (USA) and have heretofore separated our physical, digital, biological, and
International Computer Science Institute (USA) social spheres. IoT sensors act as vectors for digitizing anything
that can be sensed, resulting in the reduction of communica-
It has become almost cliché that the so called Internet tions, visual, auditory, physical and biological systems to pure
of Things (IoT) means different things to different people. information that can then be managed, interconnected and
When it comes to privacy and security risks, what is implicit controlled.2
across the myriad conceptualizations of IoT lies the key to According to Boston Consulting Group, there will be 18–50
unearthing why IoT risk heralds a difference with a distinc- billion connected devices by 2020, compared with 6–14 billion
tion compared to traditional offline and online contexts. connected devices in 2014.3 Those numbers are aligned with
Critics of an exceptionalist view of IoT risk might contend Gartner’s research that forecasts 20.5 billion connected devices
that the IoT is really just distributed computing on ste- by 2020, up from 8.4 billion in 2017.4 The scope of digitiza-
roids, i.e., the IoT is merely a relabeling and repackaging tion and level of precision of IoT data capture is transforming
of technologies past like client-server, web services, SoA, everything into data, and advances beyond a capture of fuzzy
mobile, virtualization, and distributed computing, which snapshots of activities and attributes toward advanced, high
means that risk management is merely an exercise in graft- resolution data and inferences. It is only logical then to expect
ing the decades-long understanding of privacy and security that the scale and opacity of data collection and flows will influ-
from those familiar contexts onto the IoT. Without getting ence the relationship between individuals and organizations
into a religious debate, it is incontrovertible that there are regarding the collection, use and disclosure of information in
advances in the quality and quantity of data collection from ways that have critical privacy implications. The technical drive
IoT technologies as opposed to previous generations of to optimize and reduce friction in information flows results in
technology, and these are driven by real and prospective increased privacy friction for individuals attempting to maintain
socioeconomic value propositions. privacy through control of their information.
The ubiquitous and pervasive connections between
IoT components (devices, hardware, software, communi- IoT Privacy Threats
cations, and applications) are creating and mediating new Privacy threats in the IoT are characterized by access, col-
cyber-physical, psychological, and economic seams where lection, use (analysis, actuation) and disclosure of sensitive
data is produced, aggregated, fused, consumed, dissemi- information (e.g., personally identifying) information in contra-
nated and acted upon. These features quantitatively and vention of individuals’ expectations. This is no different than
qualitatively impact the relationships between individuals privacy threats in the online ecosystem we experience on a
and organizations implicated by this data in ways heretofore daily basis. However, the scope of threats associated with the
unseen or understated. More specifically, we are likely to IoT is arguably more expansive, raising the likelihood of privacy
see increasing tensions between equity rights and interests in harm. Unsurprisingly, the threat landscape at play with IoT pri-
privacy, security, innovation, free expression and governance vacy should consider the omnipresent attack vector presented
playing out, where your right to privacy may conflict with my by malicious actors, where the myriad of sensors and actuators
right to security, the government’s interest in infrastructure offer an opportunity to weaponize IoT to collect, use and/or
protection and public safety, industry’s right to commercial disclose data in ways that negatively impact privacy. What’s
free speech, and other citizens’ interests in open and trans- more interesting, however, is how the IoT drives equity conflicts
parent data. between legitimate, non-malicious stakeholders — industry, the
Accepting the above framing of our challenge, and government, and fellow citizens — as a function of competing
anchoring off the notion that privacy is the rights and inter- rights and interests introduced by IoT capabilities. Take a smart
ests between individuals and organizations regarding the cities scenario where sensors collect, analyze and share data
collection, use and disclosure of information, we necessar- from light pole sensors that monitor vehicle and pedestrian traf-
ily have to think about IoT privacy in socio-technical terms. fic, parking and local transportation. My expectation of privacy
This introduces a range of dimensions such as governance, (to not be monitored or targeted), may conflict with the gov-
economics, management and risk. This inaugural column ernment’s interest in enhanced public services, which may clash
delves into privacy risk of the IoT. Risk is typically defined with my fellow citizen’s expectation of safety, which may collide
as the severity and likelihood of harm to something of value with industry’s claim to commercial free speech (travel logistics
(an asset) when a threat exploits a vulnerability. As such, IoT products and services).
privacy risk is the confluence of threats and vulnerabilities
that negatively impact privacy rights and interests, the assets Power Imbalance
in our risk formula.1s These equity tensions represent another threat posed by the IoT
that involves power imbalance. If power is the ability to collect,
Editor’s Note: This editorial is an abridged version of a section in a larger co-authored publication, process and actuate data to exert control over individuals in
Internet of Things Privacy Forum, “Clearly Opaque: Privacy Risks of the Internet of Things,” (May 2018). ways that negatively impact their self-determination, the IoT
threatens to exacerbate disproportionate control of personal products and services are increasingly subject to commercial
information and perpetuate a lack of transparency essential pressures to generate revenue. Facebook stands as an obvious
to consumers’ exercise of appropriate control. Hence, more reminder of the reality that its social networking platform comes
equitable power relations are a prerequisite to and an indicator at the cost of selling access to users’ social activities. While the
of meaningful consent, and serve as a social and democratic revenue model for the IoT is still emerging, the expectation of
check and balance. Power inequity, on the other hand, is a freely using an IoT service without a transfer of personal data,
barrier to meaningful negotiations, competition, and bargaining and for that matter expecting that ownership of a device will
over competing rights and interests. In the IoT, power inequi- guarantee privacy, is tenuous.
ty will be a threat to privacy to the extent that data control is Consumers are being asked to provide and link more infor-
unchecked and consolidated by owners of platforms and ser- mation (e.g., cameras and voice to detect mood, emotion, ges-
vices that consumers depend upon, the IoT equivalents of Goo- tures, activities) to avail themselves of IoT functionality, yet so
gle, Amazon, Facebook, Microsoft, etc. If these IoT platforms far have been given limited tools to control that personalization.
are fueled by data from users, the users’ lack of control over Even when an individual is not the direct target of sensing, inci-
that data will threaten their self-determination and ultimately dental data captured by other people’s devices and the inter-
create a self-perpetuating power imbalance. If past is prologue connectedness of large volumes of data are another gap in the
and IoT privacy threats resemble what has occurred in a pre- IoT that render privacy vulnerabilities.
IOT ecosystem, the now infamous Facebook and Cambridge In addition to impacting the degree of vulnerability in the
Analytica controversy serves as a crystal ball. previous examples, the IoT introduces a relative difference in
the kind of vulnerability that can enhance privacy risk. The sens-
Insufficient Understanding of Threat ing and digitization of sentiments and emotions yields a new
The scope of the IoT threat landscape is further complicated path to measuring intimate parts of people in ways not seen
by a lack of general understanding of how threats will manifest. heretofore. As well, if the current imbalanced control over data
This precludes knowing the precautions and mitigation mea- migrates to the IoT, techniques to mitigate IoT privacy vulner-
sures to put in place to avoid or minimize adverse impacts. The abilities bode equally unlikely. Examples of imbalances include
Mirai botnet in the Fall of 2016 that commandeered hundreds a lack of opt-out mechanisms, uninformed consent such as
of thousands of unwitting IoT devices to impose untold millions incomprehensible privacy policies, and the lack of collection
of dollars in damage from business interruption, fraud, and and purpose constraints.
loss of data and customer loyalty revealed what some believe Similar to how a lack of understanding exacerbates threats
to be a tip of the iceberg with regard to the harm potential of because users will not apply appropriate protections to thwart
leveraging IoT devices to wreak financial, psychological, and them, the scope of privacy vulnerability is enhanced by a lack
physical harm.5 Also, Mirai is widely believed to be collateral of transparency in the collection, use and disclosure of data.
damage from a spat between MOOC players, which leaves Opacity of data flows, dissemination and aggregation (pack-
open an entirely other dimension of our deficient understand- aging and redistribution of data) can enhance privacy vulner-
ing of the adversarial capacities and incentives that drive inten- ability exposure. When exposure of data occurs incrementally
tional attacks in the IoT. over time and across locations, the privacy harm may be more
serious than acute data breaches because mitigation is never
IoT Privacy Vulnerabilities undertaken. Even if knowledge of collection exists, the vulner-
Another element in the privacy risk equation involves under- ability may persist due to lack of awareness of the novel ways
standing the weaknesses or gaps in protections that can be that data can be combined and augmented to transform seem-
exploited by the aforementioned threats to cause privacy harm. ingly benign data into an exposure, including that which is the
First of all, the scale and volume of data available for collection basis for the triad of authentication: something you have (e.g.,
and use expands the range of opportunities to exploit data that smart card), know (e.g., password), or are (e.g., biometric).
implicates privacy and therefore increases the probability of
realized harm. As discussed above in the technical underpin- IoT Privacy Harms
ning, the digitization of anything that leaves a trace or is subject Understanding the negative impacts on privacy rights and inter-
to sensing — biometrics, emotions, behaviors — introduces a ests (the assets) comprises the third consideration in the fram-
privacy exposure point. ing of IoT privacy risk. Examples of the potential differences
Second, the traditional boundaries by which society has con- with distinction, whether in degree or kind, regarding privacy
structed privacy expectations are blurring. It is hard for individu- harms in the context of IoT include the following.
als to know if the physical features that have assured a sense of
solitude, permitted people to act anonymously, and supported Personal Information Breaches and Identity Fraud
control over identities are becoming ineffective. This is the case Conspicuous risks of harm in the IoT are those that ensue from
when data flows in an opaque, unobtrusive, automatic, regular- inadequate security, such as breaches of personal information
ized manner, all promised features of the IoT. and identity theft.6 If an IoT company loses data about users’
Third, even when users are aware of data flows, privacy vul- personal behaviors gathered in their homes or in activities in
nerability can stem from inadequate security of IoT devices. IoT public and their identity is linked, this could cause measurable
devices are often cheap and developed by companies without harm to consumers. Breaches of personal data may become
significant security budgets or incentives. IoT devices are often the next iteration of data breaches with the risk of such breach-
low-power and lack large capacities for computation or storage, es likely to be quantitatively higher. The resultant harms may be
further complicating efforts to provide the security needed to the most easily quantifiable relative to other harms discussed
protect data. below.
As well, even when deficient security is not the cause of pri-
vacy vulnerabilities, context-shifting and blurring between data Violation of Expectations of Privacy
collection for commercial and social settings creates another Law sets formal expectations of privacy rights. When there is
type of privacy vulnerability. Personal and social transactions incongruity between what society believes privacy harm to be
and activities that are mediated by commercial information and what can be remediated via the law, we have fractured
jectively real but where people are unable to articulate legally 154, no. 3, p. 477, Jan. 2006; GWU Law School Public Law Research Paper No.
129. Available at SSRN: http://ssrn.com/abstract=667622.
cognizable harm due to a lack of information about whether or 8 See, e.g., In the matter of DesignerWare, LLC, No. 112-3151 (Apr. 15, 2013).
how data is actually being used.
AN EXPLORATION JOURNEY
IN THE WORLD OF IOT WHERE
THE BOTTOM-LINE MATTERS
Big corporations Long tail
Consumers
by Raffaele Giaffreda Figure 2. The World of IoT.
Chief IoT Scientist, FBK CREATE-NET
We live in a technology-oriented world where the business accept for using such services? Currently for many, not high enough
bottom-line numbers matter more than ever before. The IoT to justify investment; thus, the quest for the consumer market killer
world is in a transition period, often illustrated on a Gartner Hype IoT applications is still on.
Cycle1 as the “Trough of Disillusionment,” where a technology Further exploration, beyond these mainstream applications
has to convince the world that it can deliver on the promises that and markets for IoT, also needs to reach far-away lands, looking
generated the “Peak of Inflated Expectations.” for applications to be positioned in the so called longtail of poten-
This article provides a perspective and seeks contributions that will tial IoT services. In this part of the IoT world we will find peculiar
inspire the IoT Magazine readers, reporting on challenges met and solu- products and solutions that came into existence to address a very
tions created within big corporations, consumer markets, but also longtail precise need, present in a specific region and nowhere else due
applications that are all characterized by solid “bottom-line” numbers. to the surrounding geo-cultural context. This is where unexpected
The costs of hardware procurement, like the sizes of components innovation might spark new and somewhat fresh ideas. Worth
needed to implement many parts of digitization processes across mentioning, as a source of inspiration, are some of the publica-
different industrial sectors, have been steadily going down. What is tions of the IEEE IoT Newsletter, which explore what IoT can do to
emerging as frequent and unquestionable Return on Investments support UN Sustainable Development Goals,2 or how Developing
(ROI) for IoT, is tied to savings on utilities and maintenance bills. Yet, Countries3 will leverage on IoT, narrowing down the scope with
gains in these sectors, characterized by a huge savings potential, only the needs of specific regions such as Latin America4 (mining and
become possible and more substantial with widespread availability agriculture industries), down to specific IoT projects for Canada5
of data, which in turn requires more distributed sensing capabilities (smart cities enabling IoT platforms), Japan6 (IoT in buildings for
and therefore more upfront investments. Making the numbers work earthquake-aware solutions), Finland7 (use of IoT in saunas), etc.
for a low margin business case requires substantial investment capac- Certainly, many gaps will need to be filled to enhance and extend
ity, hence this approach represents a “big corporations only” party. this initial map I have sketched here. This is what will keep this journey
Beyond this well-accepted by now role of IoT in targeting “around the world of IoT” exciting and interesting. The call for articles
savings on current operations, there is also an increased percep- therefore goes out to all explorers willing to inspire the IoT Magazine
tion, from the shareholders of various companies, that value and readers with challenges met and solutions created that fit within these
long-term strategies cannot depart from the compulsory path of three broad IoT world “continents” (big corporations, consumer mar-
digitization. This generates a subtle but compelling push, driven kets, and long-tail applications) and most importantly of all, are sup-
by peer pressure: there is no doubt that organizations in many ported by solid “bottom-line” numbers that matter so much.
sectors will extract value from a structural digitization strategy.
Raffaele Giaffreda ([email protected]) is a chief IoT scientist at FBK
The problem is whether or not such an approach is affordable
CREATE-NET, Italy. He has worked in the telecom R&D environ-
given shorter-term pressures afflicting the bottom-line of these ment since the beginning of his career, focusing in the last decade
businesses. So much for big corporations only parties. on IoT and related technology transfer activities. In his role, he is
What’s looming in the world of IoT outside this cyclopean happy now responsible for setting research and innovation directions,
island is much more complex and fragmented. High-margin business acquisition of funding, and the execution of a number of collab-
orative projects in the IoT domain. He worked in Italy and in the
opportunities for small to medium sized companies have yet to United Kingdom (10 years), acquiring experience in both corpo-
materialize. On the consumer front IoT is not yet considered as cool rate telco environments (R&D of BT and Telecom Italia) as well as in a small research
as the portable sleek gadgets we are accustomed to. Consider for organization (CREATE-NET before its merger with FBK), where the ability to acquire
example our smartphones. The ratio between the value (“too low”) funding was key to ensuring continuity of operations. He is a recognized expert with
you get for your investment and the costs (“too high”) is still minimal a substantial record of IEEE publications and conference presentations, a patent, and
various book chapters and tutorials on IoT. He is an experienced speaker and chair of
and the advantages IoT brings are not tangible enough to ensure IoT related events, serves as an EU reviewer, has served on the TPCs of a number of
the emergence of other sustainable business happy islands. Take the international conferences, and he is the Editor-in-Chief of the IEEE IoT Newsletter.
example of smart-
Peak of Inflated Expectations GARTNER HYPE CYCLE homes: IoT devices FOOTNOTES
provide support for 1 The Gartner Hype Cycle: https://www.gartner.com/technology/research/meth-
automation, helping 2
odologies/hype-cycle.jsp
https://iot.ieee.org/newsletter/september-2016/the-iot4sdg-challenge.html
to save time and 3 https://iot.ieee.org/newsletter/july-2015/iot-for-development-iot4d.html
perhaps money in 4 https://iot.ieee.org/newsletter/july-2017/ipv6-and-internet-of-things-prospects-
managing applianc- for-latin-america
es and routine jobs 5 https://iot.ieee.org/newsletter/january-2018/smart-city-application-enable-
EMPOWER YOURSELF!
With Global Vision, Knowledge and Networking
as a Member of the IEEE Power Electronics Society.
TECHNICAL COMMUNITIES
PUBLICATIONS
CONFERENCES
EDUCATION
Abstract
We review the fundamental problems of standardization for data transfer and security. With those basics established, we move
on to formulate key factors for the continued growth of IoT. Then we review a general approach for implementing IoT in a business,
and describe four recognized Fast Paths for IoT payback. We focus on the Remote Operations Fast Path, and specifically on its
implementation in the mining industry by Goldcorp, a major mining company. We present the business case for IoT at Goldcorp,
and then describe the benefits reaped by its implementation.
journey, and not a one-time event. Along the way the company
will encounter both unexpected challenges and unforeseen
opportunities. While it may be easy to imagine an IoT utopia
at the company in the distant future, it is necessary to identify
a small area of the company as a starting point, and then focus
on solving real problems in that small area. Consider that first
IoT area to be a beachhead, from which other benefits of IoT
can take hold and spread into the rest of the company. Once a
business problem is identified, gather stats and benchmarks for
the problem, and build a business case for using IoT to solve the
problem. The business case will help the IoT team at the com-
pany to get a C-suite champion of IoT. That internal champion
can help drive any cultural or structural changes that may be
needed for a successful implementation. The implementation of
IoT will also force the company to build a new team, including
attracting and training new and existing talent. The team will
have to be a partner eco-system that will learn and co-develop
with the company as it implements IoT. Finally, security has to
be everybody’s top priority in the IoT implementation, from the
very start of the process.
OVER
200
INTERNATIONAL
CHAPTERS
OVER
Join the IEEE Robotics & Automation Society (RAS) today. 40
TECHNICAL
COMMUNITIES
To become a member…
Go to www.ieee-ras.org and click on the JOIN RAS button
in the upper-right-hand corner. Or simply scan our QR code now.
The IEEE Internet of Things Vertical and Topical Summit will be part of
RWW2019 in Orlando, Florida on January 20-21, 2019. The theme for
the Summit is “The Internet of Things (IoT) Meets the Internet of Space
(IoS)” and participants will explore the essential role that Space-Based
Communications and Sensor Systems play in making IoT a reality.
Visit http://rww2019.iot.ieee.org/
for more information and to register.
Abstract
Today, businesses in every industry are under increased pressure to deliver outcomes. Whether you sell hamburgers or elevators,
it is not enough to simply ship a great product. The new onus is to ship a great experience. Owing to the rapid commodification of
sensors and the advent of cutting-edge data analytics, heavy equipment manufacturers have arrived at the dawn of a new industrial
revolution. Whether this tidal shift spells boom or bust for organizations like UTC is entirely up to us.
Abstract
The Internet of Things (IoT) is infiltrating many businesses. It provides simple means to collect and analyze technical system data
to identify and optimize the performance of many things in our private and work lives. This technical revolution is also revealing
new challenges and issues with our current IoT technologies. New solutions like Artificial Intelligence, Blockchain or 5G promise to
overcome these challenges. Within this paper we discuss with leading experts the pros and cons of these technologies and what it
means for the future IoT business.
Introduction ure the production from digital twin models and produce more
individualized products. This is the Industry 4.0 value proposi-
IoT is a broad field with many different technologies and appli- tion and will lead to increased production efficiency.
cations reflected by the variety of questions and opinions peo- Joern: I agree that there will be big societal value in building
ple have about IoT. Within this article we want to discuss some bigger and more resilient systems with IoT.
of these questions and review the current state and future of John: Also, more customized systems. We see this in the
IoT. To echo the variety of opinions, the paper is written as maker space. Here now people can easily build things at home
a panel discussion with three experts in IoT. First, we want to that were reserved to experts in the past. The same happens
introduce our panelists: John Cohn, Andy Stanford-Clark and in industry across domains. IoT makes it easier and cheaper to
Joern Ploennigs. measure many things and allows us to instrument everything.
John is an IBM Fellow for IoT and the technical lead at Wat- The value for the customer is that he has more information
son IoT headquarters and now delegate for the IBM AI collabo- available. For the business the value is that they do not have to
ration with MIT. His background is originally in semiconductors, send people with a checklist to collect information across the
and he has been building things from small devices to large supply chain.
robots for years. He is one of the first advocates of blockchain Joern: Of course, there is value in this. But does just collect-
for IoT, which he promoted in 2014 when blockchain was ing the data create enough business value?
largely unknown in this space [2]. John: There was a recent study [3] that showed that this
Andy is one of the creators of the MQTT protocol, the most is currently changing across the IoT industry. In the last few
common communication protocol in IoT. In addition to his years, most companies only focused on instrumentation. They
extensive experience in standardization, he is also very hands- now have collected the data and look stronger into analytics.
on. He has been building IoT solutions for years and IoT-tized The value of IoT is in deriving actionable insights that allow
his own house in 2000 with MQTT. He is now the CTO for IBM us to optimize business processes. By following some design
UK and Ireland and rolling out large IoT solutions for clients. guidelines as shown in Fig. 1, it is easier to create value. Busi-
Joern is working at IBM Research on Artificial Intelligence ness value derives from combining and analyzing IoT data from
(AI) solutions for IoT and Digital Twin. He combines semantics different sources. These data have to be continuously available
with machine learning and intuitive user interfaces to automate from a secure, resilient and flexible architecture. Only then can
IoT systems and increase their usability. He is a board member value be holistically delivered.
of the IEEE IoT Initiative and active in many conferences in the Andy: Value needs to be well designed. There is a risk that
areas of IoT and AI. people are too technology centric and do things only because
it is technically feasible. They do not think about what the prob-
Where is the Value in IOT? lem is they want to solve. As a result, many developments are
Joern: Let start the discussion with a simple question. Andy, just experimental, like smart toothbrushes, and the world will
where do you see the value in the Internet of Things? decide what we need.
Andy: IoT allows monitoring and actioning at a distance. It Joern: There are many more important problems that we
is about knowing about what is happening in a place that one need to solve, like climate change and resource limitations.
is not. Some ideas for applications go back to Bill Gates’ book, Is IoT not providing us the sensors to measure energy con-
The Road Ahead [1]. Applications can be a simple thing like sumption and evaluate and optimize the performance of our
getting notifications when the bus is coming. This leads to an systems?
improved perceived quality of life for people. IoT makes our John: To address these problems, we know that collecting
lives better in subtle ways. the data is necessary and that analytics help derive value. Now
Joern: This is the idea of ambient intelligence [4]? is the time when we have to really deliver on the value and roll
Andy: It is similar. The important difference in IoT is that we this out everywhere.
measure things not only in the environment but also at a dis- Joern: In summary, IoT solutions can improve the quality of
tance. We called it remote telemetry in the past. life and productivity, and also help save energy and the planet.
Joern: I see this value, but don’t we already have this? There are recipes that we can follow to design good solutions
Andy: It is the amount of data that gets richer and the ability that help us to deploy scalable IoT solutions. We will come
to interpret multidimensional datasets from sensors at differ- back to these aspects later in the discussion.
ent places with machine learning and AI that leads to deeper
insights. For businesses this turns data into gold. Where are we on the Hype Cycle?
John: This will, in particular, have a large impact on industrial Joern: People often ask me if IoT is hyped and if they can
production. We started with automation in industry in the 80s. trust that it will grow further and lead to substantial business.
IoT is the next evolution that allows us to automatically config- What is your answer to this question?
Andy: A very good model for this is the Gartner hype cycle
Editor’s Note: Text appearing in bold indicates a live link in the online version. for IoT [7]. The Gartner hype cycle describes the hype around
Digital Object Identifier: 10.1109/IOTM.2018.1700021 a technical development. It divides it into an initial phase where
Internet
not be accessed without permission through a smart contract,
of Things and every access to the data is logged on the blockchain and
tion
secu g
is therefore transparent for the user. The blockchain can be
miss
menta
imple ost
rity
in
c
Blockchain Acoustic Recognition customized ML and AI models from all available data and only
send out aggregated results. To do this, we need to extend
Robotics Smart Conversational analytic workflow tools that we have in the cloud to include the
Cars Interaction Visual Recognition
Semantic (Deep Learning) edge and form a fog of edge and cloud. The question is then,
Integration how we can split up our algorithms into components that can
be sent and distributed in the fog?
Telephones,
Lo
Augmented Reality Joern: Aren’t the current IoT systems designed oppositely,
w
Webpages
Re
where the devices are rather simple and send all their data
sp
on
Virtual Reality
Tim
Oct 2018
Dec 2018
Feb 2019
Publication Date
Mar 2019
June 2019
Sept 2019
and communications to big data analytics and artificial intelli- IoT and Agriculture May 2019 Dec 2019
gence, to name just a few. IoTM will cover the field by alternat-
ing issues that focus on the “verticals” — that is, the application Communications for IoT —
Aug 2019 Mar 2020
domains — and the “horizontals” — the enabling technologies. Connectivity and Networking
The IoTM Editorial Calendar for 2019 and 2020 is summa-
rized in the accompanying table. Individuals and organizations IoT and the Environment Nov 2019 June 2020
involved in the topic areas listed are invited to submit articles. AI for IoT Feb 2020 Sept 2020
Articles not specifically addressing the topic areas will also be
accepted. The IoTM General Call for Articles can be found at IoT and Privacy May 2020 Dec 2020
https://iot.ieee.org/iot-magazine.html and is reproduced below.
The Internet of Things Magazine (IoTM) publishes high-quali- material along with their articles for review. Authors should tar-
ty articles on IoT technology and end-to-end IoT solutions. IoTM get 4,500 words or less (from introduction through conclusions,
articles are written by and for practitioners and researchers excluding figures, tables, and captions), or six (6) pages. Figures
interested in practice and applications, and selected to repre- and tables should be limited to a combined total of six. The
sent the depth and breadth of the state of the art. The technical number of archival references is recommended not to exceed
focus of IoTM is the multi-disciplinary, systems nature of IoT fifteen (15).
solutions. IoTM is a forum for practitioners to share experienc- IoTM also publishes regular columns on topics of interest to
es, develop best practices, and establish guiding principles for IoT practitioners. Topical columns update readers on issues and
technical, operational and business success. events in the world of IoT. Regular columns are published in the
The magazine is currently soliciting articles for publication. following areas:
Articles should examine one or more actual deployments of an • Around the World of IoT — Recent events or technology
IoT solution and discuss: developments in IoT.
• A high-level operational description of the IoT solution, • Bridging the Physical, the Digital, and the Social — Social-
addressing: the problem space; a summary of systems ly-aware advancements in IoT.
operation; and how the overall problems were solved. * Policy and Regulatory Affairs — Discussions and reports on
• A high-level technical description of the IoT system: What policy issues facing the world of IoT.
technical challenges were encountered? What solutions • IoT Standards — Discussions and reports on efforts in stan-
were developed? What were the technical risks encoun- dardization of IoT technology and systems.
tered in development? How were they overcome? • Privacy and Security — Discussions and reports on interac-
• A summary of the business case: What kind of benefits tion of IoT with privacy and security concerns.
did the stakeholders receive from the solution? Were they • Book Reviews.
greater than or less than expected? Were any policy or Columns should be of general interest to all members of
regulatory issues encountered? the IoT community. Columns should inform the reader about
• Lessons learned from deployment and operation: What issues and events that may affect the business and practice of
were the key lessons learned? Can this experience con- IoT; sales/marketing materials are not appropriate. Authors
tribute to defining best practices? What were the risks and are asked to strive to make their articles understandable by
rewards? the general IoT practitioner. Authors should target 1500 words
Articles should be general and present real-world experienc- or less (from introduction through conclusions, excluding fig-
es, with the intended audience being all members of the IoT ures, tables, and captions), or two (2) pages. Figures and tables
community, independent of technical or business specialty. Arti- should be limited to a combined total of two. The number of
cles are expected to add to the knowledge base or best prac- archival references is recommended not to exceed five (5).
tices of the IoT community; sales/marketing materials are not Authors should submit articles and columns to https://
appropriate. Authors are asked to strive to make their papers mc.manuscriptcentral.com/iotmag
understandable by the general IoT practitioner. Mathematical IoTM does not have a specific template and does not
material should be avoided; instead, references to papers con- require manuscripts to be submitted in any specific layout.
taining the relevant mathematics should be provided. Authors However, authors can use the template for IEEE Transactions
are encouraged to use color figures and submit multimedia to get a rough estimate of the page count: https://www.ieee.
org/publications_standards/publications/authors/author_tem-
Editor’s Note: Text appearing in bold indicates a live link in the online version. plates.html.
1HZ2SWLFDO&RPPXQLFDWLRQ
7HFKQRORJLHVIRU*:LUHOHVV
:HGQHVGD\2FWREHUDPWRSP(DVWHUQ
2QOLQHYLD:HE([
%DFNJURXQG&RQFHSWVRI2SWLFDO
&RPPXQLFDWLRQV6\VWHPV
:HGQHVGD\2FWREHUDPWRSP(DVWHUQ
2QOLQHYLD:HE([
1HZ6RIWZDUH'HILQHG1HWZRUNLQJIRU
2SWLFDO1HWZRUNV$3UDFWLFDO,QWURGXFWLRQ
:HGQHVGD\1RYHPEHUDPWRSP(DVWHUQ
2QOLQHYLD:HE([
&2856()((6
,(((&RP6RF0HPEHU
To learn more or register visit: ,(((0HPEHU
www.comsoc.org/training. 1RQ0HPEHU
Become a published
author in 4 to 6 weeks.
Get on the fast track to publication with the multidisciplinary open
access journal worthy of the IEEE.
IEEE journals are trusted, respected, and rank among the most
highly cited publications in the industry. IEEE Access is no exception;
the journal is included in Scopus, Web of Science, and has
an Impact Factor.
Published online only, IEEE Access is ideal for authors
who want to quickly announce recent developments,
methods, or new products to a global audience.
Prepare yourself to enter the high-tech industry by learning how technical standards
develop, grow, and relate to technologies worldwide.
You can also create and share a professional identity that showcases key
accomplishments and participate in groups focused around mutual interests,
actively learning from and contributing to knowledgeable communities.
All in one place!