Several organizations help businesses in using IoT for solving all industry-specific and long-standing issues. IoT solutions are developed by them that helps to collect data, connect things, along with deriving all insights with scalable as well as open solutions to increase revenue, improve productivity, and reduce costs. IoT helps to improve the digitalization of the society along with the economy with the connection of objects, all people with one another through communication and connected medium (Helmi et al. 2021). A client approaches IoT Innovative for designing an IoT system for a cashier-less store within the UK. This paper will provide the functional requirements, challenges associated with such a system, and overall security as well as physical architecture of this IoT system for the client.
This cashier-less process has evolved over the last decade, along with there are several variations upon the theme. There is the use of portable scanner models, and the scanner devices within the stores are connected with the account of the shopper. Such devices could be used by the customers for scanning all products as they include them in the cart along with paying for those products while leaving. Self-checkout has been the staple of the stores for some time now. The customers stand in a line, scan as well as bag their products, and make payment at the counter (Demir et al. 2019). Merchant apps could be used by the shoppers on their mobile devices for scanning all products and paying using the credit cards or their devices at the dedicated aisle around the exit. Functional requirements of the IoT infrastructure remain the same regardless of the technologies used by the users for every function. There are several functional requirements of this IoT infrastructure, such as:
IoT is connecting many more devices daily, and it would change the overall way daily tasks are being carried out by people. However, with all such benefits, there are several risks of using IoT devices. There are several privacy issues of IoT infrastructure that should be addressed properly.
For all reasons to make IoT infrastructures feasible for broader adoption, this is crucial in making this low cost along with increasing the overall supported devices. There are many security issues of IoT infrastructure that should be addressed before achieving the objective of broader IoT adoption.
The growth of IoT is rapidly picking up the pace. Most of such connectivity would be concentrated within the cities, where smart devices along with sensors would be scattered over stores. Such increased connectivity would transform the process of cashier-less stores for the better in several ways which are not imaginable now (Raj, Raman and Subramanian 2022). However, few associated along with unique challenges with this IoT infrastructure should be addressed properly.
The reactive system’ principles define state-of-the-art technology within this IoT infrastructure. As IoT device is sensing along with actuating the physical systems, a few of them are crucial architectures. Communication is done for IoT devices over diverse networks, along with a few devices changing location. IoT is the broad spread strategy, along with it is needed everywhere for fully-fledged deployment (Abbu, Fleischmann and Gopalakrishna 2021). Hence, such technology needs an effective and widely accepted medium for all operations. An effective medium to deploy this IoT infrastructure is wireless medium. RFID is the technology that could be used for transmitting data using radio frequencies. The process would be performed with the use of RFID tags which needs to be deployed at all required spots. Such tags make communication to all RFID readers. RFID technology would offer great potency to this IoT environment. RFID tags’ miniature size would help its deployment within any area (Caruso 2020). RFID’s benchmark innovation is the protocols of anti-collision, which are serving as the boon for avoiding any errors. RFID would help to simplify several activities for this IoT infrastructure.
IPv6 is the communication protocol that could be used for this IoT infrastructure. It encapsulates all IPv6 long headers within small packets of IEEE 802.15.4 efficiently. It supports several low bandwidths, length address, power consumption, mobility, different topologies, scalable networks and unreliability. It could be connected to other IP networks directly without any intermediate entity like proxies or translation gateways. 6LoWPAN communication is based upon IPv6 that allows low-power closed wireless networks in interfacing with the internet, the global network, along with implementing more advanced services of intelligence (Pallitto 2018). This control system of this IoT infrastructure consolidates all information for recognizing all contexts of the real world, giving proper optimized feedback to this environment with the use of actuators. It allows the nodes in directly connecting with the internet with the use of open standards. With several wireless networks with low power designed for tackling certain issues, it is crucial that this system has the defined area that it addresses.
Crucial to secure IoT infrastructure is to understand this architecture along with its components. It should be ensured that appropriate measures are taken for bolstering this IoT network. There are several crucial components included in this IoT architecture.
Figure: IoT System Architecture (Source: Author)
End-to-End (E2E) solution will be used in this IoT architecture for addressing the privacy of the users. All security requirements are balanced by the privacy architecture with the privacy requirements. PETs are integrated by such design following an easy configuration manner into this IoT architecture. This architecture protects the overall privacy as close to that source. Such an approach prevents violation of privacy within consecutive domains along with might reduce the signalling overhead (Mason and WRLC 2020). In this device domain, all data could be dropped as well as aggregated. Aggregation involves the fusion of data of several different sensors along with time aggregates.
Dropping involves the removal of all unnecessary metadata. Such operations could be performed by this IoT gateway. In this connection domain, all data sources could be anonymized. In this cloud domain, all stored data could be used for analyzing new data’s influence. As authentication could clash with the privacy requirements, authenticity could be included through the IdP. Authorization could be decoupled from this IdP through pseudonyms that are issued by Trusted Third Party (Barile, Polese and Sarno 2018). Every PET is controlled through the policies. The privacy boundaries along with default settings would be specified by the service providers. The desired protection levels of privacy would be selected by the customers in such boundaries within this device domain.
Conclusion
IoT Innovative has provided the design of IoT infrastructure that would provide for cashier-less stores within the UK. The system would help the customers in picking up their shopping along with walking out of that store where payments, as well as shelf stock, are handled automatically through this aid of this IoT system. This IoT system will provide reasonable assurances that privacy, as well as security considerations, are inherent within this design. This paper provides the functional requirements, privacy and security requirements, all associated challenges, proposed and state-of-the-art technologies, and overall privacy as well as security architecture of this IoT infrastructure.
References
Abbu, H., Fleischmann, D. and Gopalakrishna, P., 2021, June. The Case of Digital Transformation in Grocery Business: A Conceptual Model of Digital Grocery Ecosystem. In 2021 IEEE International Conference on Engineering, Technology and Innovation (ICE/ITMC) (pp. 1-9). IEEE.
Abbu, H.R., Fleischmann, D. and Gopalakrishna, P., 2021, March. The Digital Transformation of the Grocery Business-Driven by Consumers, Powered by Technology, and Accelerated by the COVID-19 Pandemic. In World Conference on Information Systems and Technologies (pp. 329-339). Springer, Cham.
Alhassoun, N., Uddin, M.Y.S. and Venkatasubramanian, N., 2020, September. Multi-Network Provisioning for Perpetual Operations in IoT-Enabled Smart Spaces. In 2020 IEEE International Conference on Smart Computing (SMARTCOMP) (pp. 89-97). IEEE.
Altuk, V.E. and Kablan, A., 2020. A critical approach to accounting in the digital era: assessment of the impacts of industry 4.0 on financials. In Digital Business Strategies in Blockchain Ecosystems (pp. 439-456). Springer, Cham.
Barile, S., Polese, F. and Sarno, D., 2018. Grocery retailing in the I4. 0 era. Symphonya, (2), pp.38-51.
Caruso, C.E., 2020. How AI can revolutionize modern industries: an analysis of the strategic and ethical implications in business and healthcare.
Demir, K.A., Turan, B., Onel, T., Ekin, T. and Demir, S., 2019. Ambient intelligence in business environments and internet of things transformation guidelines. In Guide to Ambient Intelligence in the IoT Environment (pp. 39-67). Springer, Cham.
Denuwara, N., Maijala, J. and Hakovirta, M., 2021. The impact of unmanned stores’ business models on sustainability. SN Business & Economics, 1(10), pp.1-27.
Dominguez, C.R., 2019. Collaborative Object Identification in Multi-Modal IoT Systems (Doctoral dissertation, Carnegie Mellon University).
Gauri, D.K., Jindal, R.P., Ratchford, B., Fox, E., Bhatnagar, A., Pandey, A., Navallo, J.R., Fogarty, J., Carr, S. and Howerton, E., 2021. Evolution of retail formats: Past, present, and future. Journal of Retailing, 97(1), pp.42-61.
Helmi, R.A.A., Hishamuddin, M.N.B., Jamal, A., Johar, MGM and Sim, LF, 2021, April. Quantum Application: A Smart Cashier-less Shopping Application with Biometric Payment Authentication. In 2021 IEEE 11th IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE) (pp. 157-162). IEEE.
Lee, S.H. and Lee, D.W., 2018. Changes in distribution industry using information and communication technology. Journal Of Advanced Information Technology And Convergence, 8(1), pp.23-30.
Mason, R.B. and WRLC, C., 2020. Project 2019/28: Status and Challenges of Automation in the South African Retail Sector, Including Automated, Self-Service Checkouts.
Pallitto, R.M., 2018. Irresistible bargains: Navigating the surveillance society. First Monday.
Pathak, B.K., 2020. INTERNET OF THINGS ENABLED ELECTRONIC MARKETS: TRANSPARENT, COLLABORATIVE, AND AUTOMATED. Issues in Information Systems, 21(4).
Raj, P., Raman, A.C. and Subramanian, H., 2022. Cognitive Internet of Things: Enabling Technologies, Platforms, and Use Cases. CRC Press.
Shah, S., 2018. Product marketing in the era of Internet of Things (Doctoral dissertation, Massachusetts Institute of Technology).
Shankar, V., Kalyanam, K., Setia, P., Golmohammadi, A., Tirunillai, S., Douglass, T., Hennessey, J., Bull, J.S. and Waddoups, R., 2021. How technology is changing retail. Journal of Retailing, 97(1), pp.13-27.
Srivastava, V., Kishore, S. and Dhingra, D., 2021. Technology and the Future of Customer Experience. In Crafting Customer Experience Strategy. Emerald Publishing Limited.
Sukhani, K., Qomariyah, N.N. and Purwita, A.A., 2022, February. CleverCart: An Eco-Friendly Shopping Self-Checkout System with IoT sensor. In IOP Conference Series: Earth and Environmental Science (Vol. 998, No. 1, p. 012041). IOP Publishing.
Von Briel, F., 2018. The future of omnichannel retail: A four-stage Delphi study. Technological Forecasting and Social Change, 132, pp.217-229.
Yildiz, S., 2019. Artificial intelligence based e-commerce types and consumer behaviours (Master’s thesis, Sosyal Bilimler Enstitüsü).
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download