Ramos Week 3 Assignment 01-27-24.docx

pptx

School

Capella University *

*We aren’t endorsed by this school

Course

8420

Subject

Electrical Engineering

Date

Feb 20, 2024

Type

pptx

Pages

18

Uploaded by ElderFerretPerson41

Report
DB8415 Strategic Decision Making Assignment 1: Industry Gap in Practice Executive Briefing Scenario: The Internet of Things
The Internet of Things (IoT) has grown since its implementation. The trend of devices connecting to the IoT grows daily. The incremental ratio of this trend is expected to be above 1.5% in the next five years until 2025 (Fatima et al., 2020). Information is now much more easily accessible and inexpensive because of the internet (Fatima et al., 2020). The IoT keeps growing in other industries, such as construction, agriculture, etc. The Construction Industry has exciting opportunities to address its resource and time constraints and frequent defaults, thanks to the Internet of Things (IoT) (Ghosh et al., 2020). Other trends happening in IoT are Connectedness Standards, Edge Computing, and Cloud. Part 1: Executive Summary Capella University | Proprietary and confidential. 2
Executive Summary Continues Current Gaps Device compliance and reliability Device security Scalability gaps Desire state of Gaps Implementing standards and certifications Regular testing and auditing And device security are among the desire state of gaps. Capella University | Proprietary and confidential. 3
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
The current state of practice for the Internet of Things (IoT) in 2024 continues to grow as expected; more and more devices are created that can be connected to the Internet and impact our everyday lives significantly. For example, patients use an IoT-connected glucose monitor that can help them keep track of the sugar measurements of their glucose. The IoT could revolutionize the American economy by enabling a fully connected world with on-demand access to data, systems, and each other. The IoT is described by a swiftly growing number of IoT devices and increasing implementation of IoT technology across numerous industries (The Internet of Things, IoT NITS, 2022) Information is now much more easily accessible because of the internet, and it is inexpensive. The advantage of the IoT is that, for example, a user/owner can save time and effort by implementing smart home automation (Fatima et al., 2020). The trend of devices connecting automatically is growing dramatically daily [5]. As Fig. 2 illustrates 2015, there were about 15 billion connected devices; in just five years, this number doubled to around 31 billion in 2020. The incremental ratio of this trend is expected to be above 1.5% in the next five years until 2025 (Fatima et al., 2020). Part 2: Industry Context Capella University | Proprietary and confidential. 4
IoT Capella University | Proprietary and confidential. 5
Commonly used framework for home automation Capella University | Proprietary and confidential. 6
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Part 2 Industry Trends. Capella University | Proprietary and confidential. 7 Industry adoption of IoT. More and more industries are implementing IoT into their process. For example: The construction Industry: has exciting opportunities to address its resource and time constraints and frequent defaults, thanks to the Internet of Things (IoT) (Ghosh et al., 2020). The Healthcare Industry: The development of wearable technology, wireless body area networks, and cloud computing has created a new way for medical practitioners to acquire patient health data, which greatly benefits health monitoring, epidemiological studies, and pharmaceutical research. The healthcare industry is one of the most promising sectors that has adopted IoT solutions since its early stage (Chang & Li, 2019).
IoT Other Trends The state of practice for the Internet of Things (IoT) was defined by continuous improvements and broad industry adoption as of my last knowledge update in January 2022. Note that the information below may not represent the most recent advancements, but it should give you a general understanding of the practices and trends up to that point. Other trends happening are. Connectedness Standards For example, MQTT (Message Queuing Telemetry Transport) and CoAP (Constrained Application Protocol) are common communication protocols and standards that are widely used for IoT device communication (Irmayanti et al., 2021). The development of 5G networks promised to provide faster and more dependable connectivity, further enabling the deployment of IoT devices and applications. More and more internet providers are now offering 5G networks for residential areas due to the demands of Wi-Fi to support smart device use. Edge Computing In the development of edge computing, there have been various new technologies aimed at working at the edge of the network, with the same principles but different focuses, such as Cloudlet [1], Micro Data Centers (MDCs) [2], Fog Computing [3, 4], and Mobile Edge Computing [5] (viz., Multi-access Edge Computing [6] now) (Wang et al., 2020).IoT devices and applications deployment. Capella University | Proprietary and confidential. 8
Part 3: Industry Gaps in Practice Current State of Practice Device compliance and reliability Device security Scalability gaps Interoperability Security and privacy of data Power consumption gaps Cost effectiveness User experience gaps. Skills and talent gaps Capella University | Proprietary and confidential. 9
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Current Gaps. Security Challenges in the IoT. IoT security is a significant concern. The growing number of connected devices increased the attack surface, making addressing issues such as device vulnerabilities, data privacy, and secure communication crucial. Homeowners have two areas to protect regarding home security; home break-ins are no longer just physical. Hackers can break in and steal your data or corrupt your network. For example, an electric lock means hackers will always check for access to your home and network. These hackers can infect your webcams, digital web recorders, or appliances. Employees are mobile and can access corporate applications using various devices. Applications, workloads, and containers may reside on private or public clouds or event ping pong between the two. Listen to selection Adding more devices, cloud applications, and mobile users dramatically increases the attack surface. CISOs are forced to try and secure this growing pool of IT assets with an understaffed and under-skilled cybersecurity team. Part 3: Industry Gaps in Practice Capella University | Proprietary and confidential. 10
Gaps in IoT Capella University | Proprietary and confidential. 11
Desire State of Practice Implementing standards and certifications that can provide security and privacy. One way to do that is by promoting the adoption of security measures using IoT devices and systems certifications. (Cirne et al., 2022) Regular testing and auditing: an IoT framework must be created to conduct a complex audit of IoT that can identify vulnerabilities (Rizvi et al., 2023). Device Security: Implement end-to-end encryption to secure communication among devices and servers. This prevents unauthorized access and guarantees data privacy (Alluhaidan & Periasamy, 2023). Capella University | Proprietary and confidential. 12
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Part 2 Desire State of Practice Cloud Services: This can be done through Fog computing, which addresses latency, but because of the IoT's dynamic and heterogeneous nature, it complicates the use of these resources (Vasconcelos et al., 2019). Improving Edge Computing when each agent trains its strategy according to its local imperfect observations, and all participating agents work together to optimize edge computing networks. Transition from tactical identity management to a comprehensive identity and access management (IAM) strategy. Assign greater oversight of IAM to CISOs while involving business managers in policy formulation and risk assessment. Aim for increased cooperation among security, IT, and operational technology departments (Oltsik, 2017). Capella University | Proprietary and confidential. 13
Part 2 Adopt Common Standards: To ensure compatibility between various platforms and devices, embrace commonly accepted communication protocols and standards. Middleware Solutions: Use middleware solutions to mediate communication between devices that use disparate protocols (Bellavista et al., 2017). APIs and Integration: Provide thoroughly documented APIs (Application Programming Interfaces) to streamline integration with other systems and devices(Vuković, 2015). Security and Privacy of Data: Encrypt data Capella University | Proprietary and confidential. 14
Industry Gaps in Practice—Summary 15 Current State Desired State Industry Gap in Practice Decision to Be Made  Device compliance and reliability Device security Scalability gaps  Standard Certifications and Audits Implement end-to-end encryption Cloud services  Organizations face compliance issues due to a need for audits Security breaches put at risk important date Lack of data security without cloud services Creating compliance protocols to protect the devices. Implement robust access controls and encryption. Select a cloud provider. Interoperability Security and privacy of data Power consumption gaps  Middleware Solutions Data Encryption Power management strategies  Support widely adopted communication standards Implement encryption for data transmitted between IoT devices Consider energy harvesting solutions, such as solar or kinetic energy  Create Standardized communication protocols to facilitate data exchange Address privacy concerns related to energy consumption data collected Consider Implementing power- efficient sensors Cost-effectiveness User experience gaps Skills and talent gaps  Optimized Infrastructure Personalization Cross functional teams Consider low-cost sensor solutions to reduce implementation costs.  Focus on personalized services and intuitive interfaces. Invest in training programs for employees. Implement solutions that provide a balance between cost and accuracy Prioritize user-centric design for citizen-facing IoT applications Foster partnerships between technology experts
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Reflection Capella University | Proprietary and confidential. 16 In reviewing the practice gaps, IoT can improve and provide more security to all users. A breakdown of how decisions about filling in IoT practice gaps affect the success of IoT implementations of enhanced security and trustworthiness. Closing security gaps guarantees IoT data's availability, integrity, and confidentiality, improving the overall system's reliability. Decisions about creating value and optimizing utility are critical. Scalable IoT solutions can accommodate expanding deployments without compromising performance. Application: Smart cities and large-scale industrial IoT applications rely on scalable architectures to support their extensive networks of interconnected devices. Addressing scalability gaps allows IoT implementations to oversee growing numbers of devices and increasing data volumes. The choices made about filling in IoT gaps significantly influence IoT solutions' usefulness, worth, and use. Filling in these gaps successfully adds to IoT's general efficacy and adoption across various industries and uses. It improves the functionality and dependability of IoT systems and sets the groundwork for innovation, expansion, and happy users. The more security the IoT provides to all users, the more devices that can be added to the IoT.
•Alluhaidan, A. S., & Periasamy, P. (2023). End-to-End encryption in Resource-Constrained IoT device. IEEE Access , 11, 70040– 70051. https://doi.org/10.1109/access.2023.3292829  •Bellavista, P., Giannelli, C., Lanzone, S., Riberto, G., Stefanelli, C., & Tortonesi, M. (2017). A middleware solution for wireless IoT applications in sparse smart cities. Sensors, 17(11), 2525. https://doi.org/10.3390/s17112525 •Chang, C., & Li, C. (2019). Algebraic secret sharing using privacy homomorphisms for IoT-based healthcare systems. Mathematical Biosciences and Engineering, 16 (5), 3367–3381. https://doi.org/10.3934/mbe.2019168 •Cirne, A., Sousa, P. R., Resende, J. S., & Antunes, L. (2022). IoT security certifications: Challenges and potential approaches. Computers & Security, 116 , 102669. https://doi.org/10.1016/j.cose.2022.102669 •Fatima, S., Aslam, N., Tariq, I., & Ali, N. (2020). Home Security and Automation Based on Internet of Things: A Comprehensive review . IOP Conference Series: Materials Science and Engineering, 899 (1), 012011. https://doi.org/10.1088/1757-899x/899/1/012011 •Ghosh, A., Edwards, D. J., & Hosseini, M. R. (2021). Patterns and trends in Internet of Things (IoT) research: future applications in the construction industry. [Internet of Things research] Engineering, Construction and Architectural Management, 28(2), 457-481. https://doi.org/10.1108/ECAM-04-2020-0271 References Capella University | Proprietary and confidential. 17
•  •Irmayanti, H., Author_Id, N., Tosin, T., L, M. M., Yosafat, B., Author_Id, N., Author_Id, N., & Author_Id, N. (2021). Internet of Things-based Street Lighting System with Message Queuing Telemetry Transport and Progressive Web Application. Journal of Engineering Research . https://doi.org/10.36909/jer.asseee.16097 Internet of Things (IOT) NIST. (2022, February 9). NIST. http://www.nist.gov/internet-things-iot •Oltsik, J. (2017, July 10). The Internet of Identities (IOI). CSO Online. https://www.csoonline.com/article/562213/the-internet- of-identities-ioi.html •Rizvi, S. S., Zwerling, T., Thompson, B., Faiola, S., Campbell, S., Fisanick, S., & Hutnick, C. (2023). A modular framework for auditing IoT devices and networks. Computers & Security , 132, 103327. https://doi.org/10.1016/j.cose.2023.103327 •Vuković, M. (2015). Internet Programmable IoT: On the role of APIs in IoT. Ubiquity , 2015(November), 1–10. https://doi.org/10.1145/2822873 •Wang, X., Han, Y., Leung, V. C. M., Niyato, D., Yan, X., & Chen, X. (2020). Edge AI . In Springer eBooks . https://doi.org/10.1007/978-981-15-6186-3 References Capella University | Proprietary and confidential. 18
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help