In this new digital world, everything is being advanced and innovative and enabling individuals to live with more comfort. IoT devices are the top most priority of this report and even it is playing a vital role in transforming this world in far better way. The aim of this report is to provide description on the IoT devices that can be used within the dwelling and enhance the way of live living. This report focuses on some of the devices that are stated in this report and explains how they work and what is new in them. All the devices selected can be the better option for the dwelling. The coin has two sides, similarly application of IoT devices have both advantages and disadvantages. This report also focuses on the issues that can be raised due to incorporation of these devices into daily life.
Belkin Wemo: It is a home automation system produced by Belkin that can control plugs, smart switches, lighting devices, motion sensors, and LED light bulbs that are powered by Belkin using a smartphone application or browser. This product does not require any hub or cable to connect with the device rather it uses free cloud services of Belkin (Choudhary & Muralidharan, 2014). Each device is being operated at unique channel, which can be used to link the devices to online services like triggering specifications via Gmail.
It is an all-in-one home security system in which HD video camera is being incorporated including sensors for motion, air quality, temperature, vibration and sound in a single unit. This device sends alerts and notifications on the mobile applications whenever it senses some change in the environment, using machine learning in order to determine and discriminate between the normal activity and activities that are not normal (Chien, 2017). A user can configure how many users will be alerted whenever changes occur.
It monitors various activities of the devices such as break down activity of the appliance, power use and interpret the activities using machine learning, and also enables an user to get notified whenever some important change occurs like oven is still turned on or many others (Kulla, Elmazi & Baroli, 2016). A Wi-Fi enabled sensor is being enabled inside the electrical panel by Neurio, which works in manner to identify individual appliances and devices by their “power signatures.”
It is another home security device, which is an established product in the sensor market industry that enables being notified via Wi-Fi router and other brands of ConnectSense light, motion, water, humidity, temperature, window and door sensors in order to monitor the security of the home. No hubs or cables are needed for such devices, thus it can be placed at any place at the house even in basement where there is no outlets nearby.
It has a simple look as an automated alarm clock but incorporated with the innovative functions as an interface using voice activation service that enables the user to communicate with the SmartThings smart home monitoring, the Nest smart home thermostat, and the Staples Connected Home and controlling systems. It can also broadcast weather report and other news and information from the internet.
It can be described as the advanced version of the home security appliance, which is a smart home control and monitoring system that can support varieties of smart appliances and devices from sensors for the home security to water usage monitoring through the new technology implementation ‘smart sprinkler system’. The basic service is being offered free for this device while, the premium services which is on monthly basis can be used to create custom rules like video streaming, recording to the cloud, use ivee Sleek voice control and send notifications or alerts to more than one user.
It is a smart home suit with maternally themed that includes cookies (wireless sensors) and Mother (the hub) that helps in attaching with the people or objects and that can be programmed in manner to analyze and monitor the movements that are being made during any activity including temperature and the location.
It can support a variety range smart devices including smart appliances and Sonos sound systems and provides accessibility to the user to manage everything using smartphone. It is a smart home automation system that includes a communication hub that is compatible with the IP-accessible devices, Z-Wave and ZigBee protocols (Sicarin et al., 2015).
It is one of the best color-changing smart bulbs, which are more efficient and brighter than any other bulb, which can be used within the dwelling to improve experience. It does not need any hub so it can be kept at any place and change the mood by changing color of the whole surrounding. It also supports mobile application system in manner to control the device using any mobile device and is integrated with Alexa and IFTTT that enables better user interface and automation to control the color and intense of the light (Tang, 2017).
It is a robot vacuum with best performance than any other device with remote control functionality. Previous version was not remote controlled device but in its new launch it is incorporated with remote control technology that enables using the vacuum with a simple mobile application. Even the cost is high but it is less than any other product of the competitors (Kaminski et al., 2016).
D-Link WI-Fi Water Sensor: It is a smart flood sensor device that enables notification whenever flood seems to rise and push notifications on the smartphone directly that can save extra expanse that is to be made on the smart home hub. It plugs into the wall that enables the facility of device without any battery and works using Wi-Fi (Retting et al., 2014).
SkyBell HD WI-Fi Video Door Bell: It is a smart doorbell, which has 1080p resolution camera and with very good video quality, which is being integrated with the Nest, IFTTT, and Alexa. It can enable the user to check whether door is locked or not and streams video of the individual whenever someone rang the doorbell (Scalisi, 2015). It provides a plus benefit of free online video storage.
The enablement of basic technology services and high speed internet for business, commercial or home purpose in the developing countries are raising certain usage issues with the application of IoT devices (Yoon, Park & Yoo, 2015). There would be no value of devices until and unless there is a basic infrastructure is in the surrounding (Ivanus & Iovan, 2016). Using IoT devices within the Dwelling leads to several layers of complexity that includes user should have proper knowledge on how to use the devices.
There are not any existing legal laws that can address the exposures like security issues that are rising due to the gamut of devices that are connected to each other. The IoT devices have much complex accountability issues, which leads towards the issues, raised lies in whether the current liability laws will be extended for devices or not (Condry & Nelson, 2016).
The exchange of information should take place within the IoT devices that are interconnected to each other in an ideal environment. But the actual scenario is not the same as it is inherently becoming much complex and becoming dependent on the various levels of communication protocols are being on stacks between these IoT devices that raised connectivity issues with its application in the real world (Borgia, 2014).
There are security issues related to the application IoT devices in the real world as if it not properly secured, and then it becomes vulnerable to cyber-attacks that might lead to misusing the devices and cause harm to the users and also cause harm to the devices that are connected in the same network. Cyber-attacks can lead towards the loss of personal data to the individuals a user not want to expose and the trust factor will be ended between the technology and the user (Hossain, Fotouhi & Hasan, 2015). An analyst firm Gartner stated that the “IoT security market will reach $348 million in 2016, a rise of 23.7% from $281.5 million in 2015”.
The possibility of tracking and surveillance of people by government and private agencies increases as the devices are constantly connected to the internet. These devices collect user data without their permission, analyze them for purposes only known to the parent company. The social embrace of the IOT devices leads people to trust these devices with collection of their personal data without understanding the future implications (Borgohain et al., 2015).
By the growth of internet access across globally at the various sectors of the developing countries along with cheap prices for sensors and microprocessors will lead to the accessibility to the households who have low income. There should be proper rules and regulation according to the law for both the organization producing devices and for the customers who are affecting in negative manner by the usage of IoT devices. This will help in eliminating or minimizing the connectivity issues related to the use of IoT devices (Sicari et al., 2015). In manner to evade the scenarios related to the security and privacy issues of the individual, ensuring the security is extremely critical including the reliability and resilience of internet applications in manner to promote the devices that works on enabling internet usage among different users across the world (Yoshigoe et al., 2015).
There are several other measures that could be helpful in mitigating the raised issues like embedding security at various layers like risk management, network and endpoint user approach, application and data and many more. Proper agreement should be made between the user and the product distributor about the specifications and warranty of the device with a long-term agreement (Stankovic, 2014). Another approach could be the revolv’s approach that can be helpful in enabling the customers to buy the products that are best and integrated with latest and advanced hardware and software.
Conclusion:
Based on the above report it can be concluded that IoT devices applications are increasing rapidly and enhancing every activity in automated way with better efficiency and easy manner. Information technology has become the integral part of the life so there is not any way to stop using those technologies in our daily life operations. The devices mentioned in the above report are capable of transforming all the manual activities into automated system and eliminate the efforts that could have consumed during for the processing. Most of the technologies uses wireless connectivity, which raises to certain privacy and security issues as wireless technology are more vulnerable to be misused or breached. The issues that have been stated in the above report can be raised cannot be eliminated completely but can be minimized with certain efforts that has also been depicted in the above report.
References:
Borgia, E. (2014). The Internet of Things vision: Key features, applications and open issues. Computer Communications, 54, 1-31.
Borgohain, T., Kumar, U., & Sanyal, S. (2015). Survey of security and privacy issues of Internet of Things. arXiv preprint arXiv:1501.02211.
Chien, T. L. (2017). U.S. Patent Application No. 15/453,270.
Choudhary, A., & Muralidharan, P. (2014). Analysis of application and impact of disruptive innovation. International Journal of Intercultural Information Management, 4(2-3), 129-141.
Condry, M. W., & Nelson, C. B. (2016). Using smart edge IoT devices for safer, rapid response with industry IoT control operations. Proceedings of the IEEE, 104(5), 938-946.
Hossain, M. M., Fotouhi, M., & Hasan, R. (2015, June). Towards an analysis of security issues, challenges, and open problems in the internet of things. In Services (SERVICES), 2015 IEEE World Congress on (pp. 21-28). IEEE.
IVANUS, C., & IOVAN, ?. (2016). INTERNET OF THINGS AND BUSINESS PROCESS MANAGEMET. Fiability & Durability/Fiabilitate si Durabilitate, (1).
Kaminski, M. E., Rueben, M., Smart, W. D., & Grimm, C. M. (2016). Averting Robot Eyes. Md. L. Rev., 76, 983.
Kulla, E., Elmazi, D., & Barolli, L. (2016, July). Neuro-Adaptive Learning Fuzzy-Based System for Actor Selection inWireless Sensor and Actor Networks. In Complex, Intelligent, and Software Intensive Systems (CISIS), 2016 10th International Conference on (pp. 488-493). IEEE.
Rettig, A. J., Khanna, S., Heintzelman, D., & Beck, R. A. (2014). An open source software approach to geospatial sensor network standardization for urban runoff. Computers, Environment and Urban Systems, 48, 28-34.
Scalisi, J. F. (2015). U.S. Patent No. 8,941,736. Washington, DC: U.S. Patent and Trademark Office.
Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). Security, privacy and trust in Internet of Things: The road ahead. Computer Networks, 76, 146-164.
Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). Security, privacy and trust in Internet of Things: The road ahead. Computer Networks, 76, 146-164.
Stankovic, J. A. (2014). Research directions for the internet of things. IEEE Internet of Things Journal, 1(1), 3-9.
Yoon, S., Park, H., & Yoo, H. S. (2015). Security issues on smarthome in IoT environment. In Computer Science and its Applications (pp. 691-696). Springer, Berlin, Heidelberg.
Yoshigoe, K., Dai, W., Abramson, M., & Jacobs, A. (2015, December). Overcoming invasion of privacy in smart home environment with synthetic packet injection. In TRON Symposium (TRONSHOW), 2015 (pp. 1-7). IEEE.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download