物联网安全问题的研究外文文献翻译

合集下载

物联网智能设备网络安全的国际规范和标准发展最新介绍(英文)

物联网智能设备网络安全的国际规范和标准发展最新介绍(英文)

IoT Device Security White Paper2019IoT Security Lab1.I oT Device SummaryA.IoT Device Development1.Applications are like a hundred flowers in bloom, IoTdevices grow exponentiallyIn recent years, new IoT applications come out in anendless stream, like a hundred flowers in bloom. IoTdevices appear in the fields of intelligent transportation,intelligent medical treatment, intelligent power grid,intelligent agriculture, and etc. IoT devices come into thepeople’s daily life and world of work, growingexponentially.Globally, the number of IoT devices grows rapidly. By 2019, the global IoT connected equipment reach 11 billion in total. Among them, consumer IoT devices reach 6 billion, industrial IoT devices 5 billion. According to a forcast from GSMA, 25 billion devices will be connected to IoT by 2025. Among them, consumer IoT 11 billion, industrial 14 billion. In the future, industrial IoT connection will lead the growth, from 2017 to 2025, the number will increase by 4.7 times, with an annual increase of 21%.In China, the evolution and breakthrough of telecom and information technologies, (eg: NB-IoT, eMTC, LoRa, LPWA…) boosts the rapid growth of IoT industry.Recent years, the expansion and coverage of IoT applications boosts the rapid growth furthermore. According to IoT-Analytics, in 2018, Among the announced 1600 IoT projects worldwidely, the intelligent city projects make up 23%, Industrial IoT 17%, the intelligent building, automobile, energy take up 12%, 11%, 10% respectively.2.Pressing need for cellular communications, IoT network cards grow rapidlyIoT network cards are the important media for all types of cellular IoT networks. In China, the 3 telecom infrastructure enterprises all issued IoT network cards. By Oct. 2019, nearly 900 million cards were issued by the 3 ones. Among them, China Telecom issued 150 million, China Mobile 600 million and China Unicom 140 million. Compared to 2018, the total number increased 300 million, that’s a 50% increase.3.The commercial deployment of 5th Generation network, making the network cards and devices a coupleJun.6th2019, China MIIT(Ministry of Industry and Information Technology) issued 4 commercial licenses respectively to China Telecom, China Mobile, China Unicom, and China Radio & Television. Oct. 31th 2019, together with China Telecom, China Mobile, China Unicom and China Tower, MIIT announced the launch of 5th G network commercial service, which means China enters a new era of5th G networks. Currently, the 3 telecom infrastructure enterprises(China Mobile, China Telecom, China Unicom) has started 5th G networking tests and business demonstrations in the cities of Beijing, Shanghai, Chengdu, Wuhan, Hangzhou, Nanjing, Shenzhen, etc. China Radio & Television also plans to build trial networks in 16 cities including Beijing, Tianjin and Shanghai.5G networks are of high speed, low latency and wide connections, satisfying the needs of IoT better. 5G networks’ commercialization boosts the scaled deployments and applications of IoT devices greatly.B.IoT Device Frameworks and Classifications1.Oriented to be general and universal, IoT devicesframeworks are of light load and adjustable.As the nerve endings of IoT, the functions of the devices include: a) Information collecting, analyzing and controlling of objects in the physical world. B) Through the telecom modules in the devices, transmitting information to servers and receiving orders.To realize the above functions, IoT devices normally have 5 functional modules, namely hardware, firmware, applications, data, and connection access.The 1st one is hardware modules, they are the basic modules of IoT devices, including all hardware components and parts. Hardware modules are the physical media of firmware modules, application modules and data modules, and provide hardware bases for telecom modules. Normally in IoT devices, hardware modules include mainboards, which bear processor units, connection modules, debugging interfaces and all other parts and components.The 2nd one is firmware modules, which mainly include system kernels, component drivers, management modules, and etc.Firmware are given with 3 abilities: hardware controlling, remote controlling and computing. The Hardware controlling enables IoT devices to control various other devices, therefore collect, analyze and control information in the physical world. For the unattended devices, remote controlling realizes updates and controlling of firmware andapplication modules. Computing assures the accuracy of the data collected and calculated.The 3rd one is application modules, they are programs or instruction sets, pre-set in the firmware modules to realize certain purposes. Normally in an embedded software system, data collected by hardware modules are preprocessed, and then interact with servers or other devices after transmitted through connection modules.The 4th one is data modules, which run through all device modules. Data are collected through hardware modules, stored in the firmware modules. Data are analyzed and processed by application modules, transmitted and reported by connection modules. Data modules include parameters of hardware, system and configuration data of firmware, and application data of application modules.The 5th one is connection access modules, which transmit data via cellular telecom or non-cellular telecom systems, to the servers directly or indirectly through gateways.IoT device frameworks are designed general and universal, as well as flexible and adjustable. In some cases, IoT device frameworks are adjusted upon certain applications. For example, SCM devices has no firmware modules, but simple application modules.2.By network access classification, IoT devices include card and non-card ones, they coexist.a)Network card IoT devices, or cellular devices, which access the networks of authorized frequency bands such as NB-IoT, eMTC, etc., through IoT network cards provided by telecom infrastructure enterprises.b)Non-network card devices, which access the networks of unauthorized frequency bands such as WiFi, BLE, LoRa, Sigfox, Zigbee, etc, through the embedded modules in the devices.3.By applications, IoT devices are classified into 3 types.a)Consumer IoT devicesAccording to IDC, consumer IoT will be the 2nd largest expense in all IoT industries for the 1st time. At present, various types of smart devices appear continuously. For example, wearable devices, smart hardware, smart home items, smart vehicles, smart facilities for the aged, and etc. Enterprises such as Huawei, Xiaomi and China Mobile are aggressively design and introduce various types of wearable smart devices.b)Public facility IoT devicesPublic facility IoT devices are mostly made for smart city applications, with smart sensors and low energy WAN such as NB-IoT, LoRa. The devices are applied to smart cities, smart securities, smart transportations & parkings, smart lightings, smart garbage disposals, etc. HIkvision, Huawei, and Haier are the industrial enterprise examples.c)Production IoT devicesProduction IoT devices are made for the fields of industry, agriculture and energy, and etc. Now it becomes the key element for conventional industry upgrades. For example, industrial IoT devices are installed in the equipment offactories, collecting data from displacement sensors, GPS,vibration sensors, liquid level sensors, pressure sensors,temperature sensors, etc., and transmitting them toservers for processing, therefor monitoring and controllingthe equipment timely. The example enterprises of it areHoneywell, Siemens, Sanyi, and etc.2.IoT Security Situation and TrendA.Low Capability of IoT Device Securityand Frequent Security IncidentsIn recent years, globally, IoT security incidents occurred frequently, caused by device security problems. Faults and Vulnerabilities are be used by criminals to maliciously attach or control the devices, and steal or tamper with data. The daily operations of connections and the applications are affected seriously. According to the attacking types, IoT security incidents can be classified into the following 3:a)Denial of service attacksOct. of 2016, the attackers took advantage of thevulnerabilities in cameras and controlled large quantity of cameras in the U.S. west coach with the malicious software. They attacked the DNS servers with DDoS.Telecom services were paralyzed on a large scale, including the telecom networks, public services and social platforms, etc. Feb. of 2017, more than 5000 IoT devices were infected by malicious software. They were remotely controlled and turned into a botnet, causing massive service exceptions to the automatic vending machines on the campuses.b)Devices under malicious controlApril of 2017, Samsung Tizen OS were exposed with more than 40 security vulnerabilities, including access bypasses, info leakages, command executions, DoSs, and etc.30 million smart TVs and 10 million smart phones were involved in the incident. Malicious hackers could take advantage of the above vulnerabilities, attack and control the above devices remotely.c)Sensitive data leakagesJul. of 2017, American vending machine maker Avanti Markets were hacked with malicious software in their payment devices.More than 1.6 million users’ personal data were leaked, including credit card accounts, bio-recognition information, etc.B.Vast Influences of Security Incidents And Its Coverage of Vertical IndustriesWith the IoT applications go more and more popular, IoT devices mix together deeply with vertical industries. IoT devices of huge quantities, various types, are gradually covering the industries of healthcare, transportation, power, and agriculture, etc. Security incidents of IoT devices directly affect the daily operation of the vertical industries. Typically the incidents occur in the following 3 industries:1. Smart healthcareIn Oct. 2018, China SFDA (State Food and Drug Administration) issued an announcement of recalling for large quantities of medical equipment. The cause of the recalling was theinsufficient software security, which was very vulnerable to hacking attacks. The vendors on the recalling list included Medtronic, GE, Abbott, and etc. The equipment included MRIs, Anesthesia systems, heart-lung machines, and etc., which was about 240 thousand in total by number.2.Internet of vehiclesJun. 2018, the RobustNet team of University of Michigan found that they could hack into the vehicle terminals and tamper with real-time traffic information, so as to cause traffic jams. Sept. of 2018, researchers in the KU Leuven University of Belgium found that there was a hidden danger in Pektron remote key system. The Tesla Model S cars could be stolen by a special device, which could intercept the signals from the remote keys and capture the codes.3.Smart homeJun. 2017, China CCTV reported that massive home cameras were intruded in by malicious hackers, who stole the camera IP addresses with a piece of scanning software, exploited the weak passwords and remotely controlled the cameras, captured the images in the cameras, peeped people’s daily life,disclosed their personal information. In addition, the IP addresses, user names, passwords and personal information were put up for sale publically.4.Smart citiesAug. 2018, a research team from IBM found 17 vulnerabilities (including default passwords, bypass IDs, etc.) in the smart city systems of Libelium, Echelon and Battelle.5.Smart electricity metersOct. 2014, security researchers found vulnerabilities in smart electricity meters in Spain, which could be used for electricity bill cheatings, and even for shutting down the whole power system. That’s caused by insufficient security protections inside the meters, the electrical system could be attacked and controlled easily.C.Difficulty of Real Name Registration, Making IoT A Hotbed of DefraudingWith the development of mobile internet applications, criminals started network and telecom defrauding directly orindirectly, by taking advantage of the difficulty of real name registration for IoT network cards. Their typical approaches are:a)Indirect network and telecom swindles by networkregistration. Though the real-name registration is requested by the Central Network Information Office, IoT network cards are difficult to register with real-names. Mar.10th of 2019, the Shandong Rizhao police captured a swindling gang of click farming, who registered network IDs with unregistered IoT cards, publishing fake click-faming advertisement. Lots of victims were swindled.b) Direct telecom swindlesAccording to China Business News, there are over 400 thousand malicious network hackers in China. About 40 million “black cards” are abused every year, among them, 80% are IoT network cards. One “black card” could cause RMB100 illegal income, which means a 3.2 billion loss every year.D.Sprouting IoT Device Security Industry, Breeding diversified EcosystemsChina’s rapid development of IoT devices catches the great attention from both domestic and foreign companies. They are speeding up involving in China’s IoT security industry, and aggressively setting up their own ecosystems, and making the overall ecosystem diversified and co-existed.The players in the ecosystem include telecom infrastructure enterprises, internet enterprises and telecom product makers, and etc.Telecom infrastructure enterprises are accelerating to set up their ecosystem alliances. From abroad, Feb. 2017, American AT&T allied itself with Nokia, IBM, Qualcomm, Symantec, Palo Alto networks, and Trustonic, founded the IoT Network Security Alliance. The alliance is set up for communications and cooperation between the alliance members, facing the IoT security challenges side by side with the strength of each, therefore developing the IoT security ecosystem.In China, the 3 telecom infrastructure enterprises have all set up IoT security organizations of their own. By founding IoT industry alliances, the 3 enterprises is seeking partners toachieve industrial consensus and build up IoT security ecosystems. China Telecom has set up the “Security Ecosystem Promotion Team of Tianyi IoT Industrial Alliance” in Sep. 2019. The team is to carry out researches for IoT security, to promote R&D for IoT security technologies, industries and applications.China Mobile has set up the “Mobile IoT Industrial Alliance”. By now, 928 members are in the alliance. The members come from the industries of chipset, module, device, network, platform, application, and the related. The “IoT Security Executive Committee has been founded, to promote the applications of IoT security related products.China Unicom has formed the “IoT Industrial Alliance”, together with a “Public Security Committee”. There are 30 well-known members including CASIC(China Aerospace Science and Industry Group), CECT(China Electronic Tech. Group).Internet enterprises are actively setting up their dominant ecosystems. In China, Mar. 2018, Alibaba announced to marchtoward the field of IoT comprehensively. They founded “IoT Business Division”, positioning on “the Builder of IoT Infrastructure”. In order to dominate the ecosystem development and pushing forward the standardization constructions, Alibaba organized the “IoT Connectivity Alliance” (ICA), in order to set up security standardizations, and to gather players in the IoT security industrial chain, such as device manufacturers, security chipset makers, module makers, testing labs and etc. Alibaba focuses itself on setting up safe IoT connections, realizing safe solutions for cross-industry integrations, leading IoT security industry development, co-founding a win-win security ecosystem. At present, the security standardization team is active to carry out standardization work for IoT security chipsets, IoT ID recognition systems and the smart lock safety ranking system, and etc. 10 reports of alliance standardizations were issued.In the meantime, Telecom enterprises are carrying out farsighted platform ecosystems. Sep. 2017, Cisco united Bosch, Bank of New York Mellon, blockchain service provider Consensys and Skuchain, info security maker Gemalto and etc, in order to build safe, expandable, inter-operative andtrustable IoT and platforms, and upgrade the overall security of IoT industry.In China, Sep. 2017, Huawei brought out an IoT development strategy named “Platform + Connection + Ecosystem”, aiming to become the builder of the intelligent platforms, the innovator of various connections and the promoter of IoT ecosystems. Huawei has set up a number of open labs globally, orientated to provide end-to-end IoT security tests and certificate service for vertical industries, and to upgrade the security capability of the overall IoT industry.From 2015, Xiaomi started to carry out a comprehensive consumer IoT ecosystem (“Xiaomi Ecosystem”). Xiaomi is dedicated to promote the industrial cooperation, by building “the Xiaomi IoT platform” for developers. By now, the platform has connected 151 million devices (excluding mobile phones or PCs), with over 800 different types. There are over 500 partners on the platform, it is claimed to be the largest consumer IoT platform in the world.3. Risk Analysis on IoT Device SecurityIoT is an expansion to the internet, with a perceptual layer as the most outstanding difference to the internet. The core of the perceptual layer is the IoT devices which are of large numbers, various types, low cost, low energy, and of perception and communication abilities.Compared to conventional network devices, the IoT devices are inferior in security. Therefore, in the IoT circle, IoT device security is the key, and is the importance of the importance.A.Risk Point Analysis on IoT Devicesrge Scale Devices, Difficult to Managea)Difficult to unify and standardizeTo the fragmented demands of the various and complicated IoT applications, devices are designed for various types, various features, various functions, and upon various security requirements, which makes the security unification and standardization difficult.b)Difficult to manage in real-timeIoT devices are normally of large scale, scattered around geographically, furthermore, they are often unattended. The fact is that even there are thefts or damages to the devices, it is difficult to be found and managed in real-time.2.Low device security capability, difficult to resist attacksLimited by the reality of low cost, low energy, low computing capability, it is difficult to set up the security system of PCs or smart phones (such as security policies, encryption algorithms) to the IoT devices. As a result, IoT devices are not well security protected, vulnerable to be hacked or attacked, and hard to resist.The risk points of IoT devices mainly include:a)Hardware risks, vulnerable to damageb)Firmware risks, vulnerable to attacksIoT devices universally have the following problems:No legitimate or integrity verification in start-up code, no in-time fixings for system vulnerabilities, too many open accesses, loose access permissions, weak authentications for IDs or authorizations, etc. Therefore the devices are vulnerable to attacks of user IDs and information disclosures, which could be used for forging IDs or connection nodes, and intruding into other devices or gateways.c)Telecom security risks, vulnerable to be controlledThe weak security protections and the large-sales make the IoT devices the breakthrough points for DDoS attackers. For example, when one single device is attacked and controlled, millions of devices in the connection could be infected. A resulted large-scale botnet initiates service requests to the backbone networks or servers, causing resources overloads and finally service interrupts or paralysis.d)Application security risks, vulnerable to exploitsThe apps in IoT devices generally have problems as logic flaws or coding vulnerabilities. Some device makers just use the third-party components to save costs, which brings in open source vulnerabilities. Attackers exploit the software vulnerabilities, implant Trojans or viruses to intrude into thedevices, and finally causing application failures.e)Data security risks, vulnerable to thefts and tamperingMassive data of personal and industrial information are sensed, collected and stored in huge amount of IoT devices. Limited by hardware resources, IoT devices cannot directly be armed with conventional data security systems. As a result, the sensitive data lack security regulations, sometimes they are transmitted in plain text. Consequently, data are stolen or tampered with, privacies are disclosed. On the other hand, the data resources are polluted.4. IoT Device Security Assurance SystemConfronted by the IoT device security risks, we are going tobuild a full-process working mechanism of “Assessing security risks, enhancing security capabilities, comprehensivemonitoring & control”.Through “Applying new technologies, taking new approaches, building new platforms”, we are going to mitigate the security risks one by one, build up the IoT device security assurancesystem, comprehensively enhance the security capabilities. A.Assessing Security RisksAs for the fact that “large quantities, various types and difficulty to manage” of IoT devices, and the “difficulty to implement real-name registrations and vulnerability to abuse” of IoT network cards, comprehensive security risk assessments are required to be carried out to the IoT devices.Firstly, for the IoT devices, we are going to set up a classification system for the assessments. Considering the current situation of the security capabilities and the security demands, we are going to raise differentiated and targeted requirements, enhance security capabilities accordingly.The 1st step: Based on sufficient and comprehensive investigations and the realities, we are going to set up classification standards, including classification indexes and methods, and assessment methods. The IoT devices are going to be managed by classifications, namely “high risk, medium risk, and low risk”.The 2nd step, we are going to practice the “management by different classifications”. For the high risk devices, the security capabilities are going to be enhanced, they are going be monitored in real-time and equipped with situation awareness system.For the medium risk ones, the security capabilities are going to be enhanced as well, they are going to be monitored at regular time.And for the low risk ones, they are going to be monitored occasionally.Secondly, as for the assessments themselves, we are going to take actions on the hardware modules, firmware modules, applications modules, data modules and the network access modules, and etc.For the IoT network cards, we are going to set up management system for the whole chain. Through technical approaches, the telecom infrastructure enterprises are going to solve thefollowing 5 problems:1. The related parties shall coordinate to collect the dataflow at each link in the network card chain, to reflect the actual procedures.2. Data are not to be tampered with.3. A management and control Center is to be set up.4. Different links in the chain shall have different privacy protection capabilities.5. A real-time and clear dataflow recording mechanism is to be set up in the whole chain.The blockchain technology is naturally suitable for IoT the whole-chain network card management, which can realize the real-name registrations, behavior monitoring, credit assessments and verifications. The core of the blockchain management is to ensure authentic and integral data.The whole data collection and registration procedure includes 4 roles, namely “telecom enterprises – middle companies – sales terminals – consumers”. The data are to upload after the following 3 requirements:1, initial registrations,2, sales qualifications,3, card activationsB.Enhancing Security CapabilitiesAs for the fact that “large quantities, various types and difficulty to manage” of IoT devices, and the “difficulty to implement real-name registrations and vulnerability to abuse” of IoT network cards, security capabilities are required to be enhanced to the IoT devices according to the assessment results. The enhancement is to be realized by the principles of “Interior strengthening, exterior empowerment, safe and trustworthiness”.1)Interior strengthening for IoT network cardsBased on the security capability of network cards, together with the capabilities of devices, networks, and platforms, a security assurance system that combines securityauthentications, data encryptions, and security storages, is to be established.By now, the SE-SIM of China Mobile is qualified with above mentioned capabilities. In addition, some vendors’ chipsets are also qualified with hardware security environment, such as Qualcomm, Hisilicon, etc.2)Exterior empowerment for IoT devicesAs the security risks of “low security capabilities of IoT devices” and the “difficult traffic oriented access of network cards”, devices security can be enhanced by exterior empowerment.Empowering the security capabilities to the devices, and building the security management platforms, putting them together, enables to realize both traffic oriented access and device security management.The “Exterior empowerment” means: Integrating security kits such as modules, SDK, and etc., to the devices or gateways. That is to make the devices or gateways capable of receiving and executing security polices, as well as reporting and accessing behavioral data, and etc. The security policies include setting up black and white lists, controlling andlimiting accesses, etc.The IoT security management platform realizes the traffic oriented access by the following technical ideas:Devices bearing the network cards connect to the security management platform and the application platform. The security management platform dispatches the security policies to the devices. Equipped with the security policies, the devices visit the application platform, distinguishing the coming IP addresses, URIs from the black and white list.For the devices without network cards or security policies, oriented accesses are realized through the connected gateways with security policies.The IoT security management platforms work by the following 3 stages:Stage 1, Prior warning before incidentsThe security management platforms dispatch security policies to the devices, control and limit the accesses. By bigdata analysis and data mining technologies, the platforms obtain feature information, process with statistical analysis, therefore warn on any unusual situations.Stage 2, Monitoring during incidentsThe security capabilities report the execution results and access information to the platforms when they carry out security policies. Simultaneously, the access information of the devices are monitored in real time. The new ID registration information is supervised and reported in regular time.Stage 3, Managing and Controlling after incidentsThe platforms take direct and full control of the devices to avoid further damages when serious incidents or access violations occur.At present, there are a number of similar products, including the “Anlianbao” from China Mobile, the “Security Control SDK” from Qihoo 360, the “IoT Security Center” from Anhen Info, and etc.。

物联网中英文对照外文翻译文献

物联网中英文对照外文翻译文献

中英文资料外文翻译Internet of Things1.the definition of connotationThe English name of the Internet of Things The Internet of Things, referred to as: the IOT.Internet of Things through the pass, radio frequency identification technology, global positioning system technology, real-time acquisition of any monitoring, connectivity, interactive objects or processes, collecting their sound, light, heat, electricity, mechanics, chemistry, biology, the location of a variety of the information you need network access through a variety of possible things and things, objects and people in the Pan-link intelligent perception of items and processes, identification and management. The Internet of Things IntelliSense recognition technology and pervasive computing, ubiquitous network integration application, known as the third wave of the world's information industry development following the computer, the Internet. Not so much the Internet of Things is a network, as Internet of Things services and applications, Internet of Things is also seen as Internet application development. Therefore, the application of innovation is the core of the development of Internet of Things, and 2.0 of the user experience as the core innovation is the soul of Things.2.The meaning of "material"Where the "objects" to meet the following conditions can be included in the scope of the "Internet of Things":1. Receiver have the appropriate information;2. Have a data transmission path;3. Have a certain storage capabilities;4. To have the CPU;5.To have the operating system;6. Have specialized applications;7. Have a data transmitter;8. Follow the communication protocol of Things;9. World Network, a unique number that can be identified.3. "Chinese style" as defined inInternet of Things (Internet of Things) refers to is the ubiquitous (Ubiquitous) terminal equipment (Devices) and facilities (Facilities), including with the "inner intelligence" sensors, mobile terminals, industrial systems, floor control system, the family of Intelligentfacilities, video surveillance systems, and external can "(Enabled), such as RFID, a variety of assets (the Assets), personal and vehicle carrying the wireless terminal" intelligent objects or animals "or" smart dust "(the Mote), through a variety of wireless and / or cable over long distances and / or short-range communication networks to achieve interoperability (M2M), application integration (the Grand Integration), and based on cloud computing, SaaS operation mode, in internal network (intranet), private network (extranet), and / or the Internet (Internet) environment, the use of appropriate information security mechanisms to provide a safe, controlled and even personalized real-time online monitoring, retrospective positioning, alarm linkage, command and control plan management, remote control, security, remote repair and maintenance, online upgrades, statistical reporting, decision support, the leadership of the desktop (showcase of the Cockpit Dashboard) management and service functions, "Everything," "efficient, energy saving, security environmental protection, "" possession, control, Camp integration [1].4.EU definitionIn September 2009, the Internet of Things and enterprise environments held in Beijing, China-EU Seminar on the European Commission and Social Media Division RFID Division is responsible for Dr. Lorent Ferderix, given the EU's definition of things: the Internet of Things is a dynamic global network infrastructure, it has a standards-based and interoperable communication protocols, self-organizing capabilities, including physical and virtual "objects" of identity, physical attributes, virtual features and smart interface and seamless integration of information networks .Internet of Things Internet and media, the Internet and business Internet one, constitute the future of the Internet.5.changeThe Internet of Things (Internet of Things) the word universally recognized at home and abroad Ashton, Professor of the MIT Auto-ID Center in 1999 first proposed to study RFID. The report of the same name released in 2005, the International Telecommunication Union (ITU), the definition and scope of the Internet of Things has been a change in the coverage of a larger expansion, no longer refers only to the Internet of Things based on RFID technology.Since August 2009, Premier Wen Jiabao put forward the "Experience China" Internet of Things was officially listed as a national one of the five emerging strategic industries, to write the "Government Work Report" Internet of Things in China has been the great concern of the society as a whole degree of concern is unparalleled in the United States, European Union, as well as other countries.The concept of Internet of Things is not so much a foreign concept, as it has been the concept of a "Made in China", his coverage of the times, has gone beyond the scope of the 1999 Ashton professor and the 2005 ITU report referred to, Internet of Things has been labeled a "Chinese style" label.6.BackgroundThe concept of Internet of Things in 1999. Internet-based, RFID technology and EPC standards, on the basis of the computer Internet, the use of radio frequency identification technology, wireless data communication technology, a global items of information to real-time sharing of the physical Internet "Internet of things" (referred to as the Internet of Things) , which is also the basis of the first round of the China Internet of Things boom set off in 2003.The sensor network is built up based on sensing technology network. Chinese Academy of Sciences in 1999 on the start sensor network research and has made some achievements in scientific research, the establishment of applicable sensor network.1999, held in the United States, mobile computing and networking International Conference, "The sensor network is a development opportunity facing humanity in the next century. In 2003, the United States, "Technology Review" proposed sensor network technology will be future changes ten people's lives first.November 17, 2005, the WSIS held in Tunis (WSIS), the International TelecommunicationUnion released ITU Internet Report 2005: Internet of Things ", citing the concept of the" Internet of things ". The report pointed out that the ubiquitous "Internet of Things" communication era is approaching, all the objects in the world, from tires to toothbrushes, from housing to the tissue via the Internet, take the initiative to be exchanged. Radio Frequency Identification (RFID), sensor technology, nanotechnology, intelligent embedded technology will be more widely used.According to the description of the ITU, the era of things, a short-range mobile transceivers embedded in a variety of daily necessities, human beings in the world of information and communication will receive a new communication dimension, from any time communication between people of the place of connection extended to the communication connection between persons and things and things and things. The Internet of Things concept of the rise, largely due to the International Telecommunication Union (ITU), the title of Internet of Things 2005 annual Internet Report. However, the ITU report the lack of a clear definition of Things.Domestic Internet of Things is also there is no single standard definition, but the Internet of Things In essence, the Internet of Things is a polymer application of modern information technology to a certain stage of development and technological upgrading of various sensing technology modern network technology and artificial intelligence and automation technology aggregation and integration of applications, so that the human and material wisdom of dialogue to create a world of wisdom. Because the development of the Internet of Things technology, involving almost all aspects of IT, innovative application and development of a polymer, systematic, and therefore be called revolutionary innovation of information industry. Summed up the nature of the Internet of Things is mainly reflected in three aspects: First, the Internet features that need to be networked objects must be able to achieve the interoperability of the Internet; identification and communication features, that is included in the Internet of Things "objects" must to have the functions of automatic identification and physical objects communication (M2M); intelligent features, the network system should have automated, self-feedback and intelligent control features January 28, 2009, Obama became the President of the United States, held with U.S. business leaders a "round table", as one of the only two representatives, IBM CEO Sam Palmisano for the first time that "the wisdom of the Earth" this concept, it is recommended that the new government to invest in a new generation of intelligent infrastructure.February 24, 2009 news, IBM Greater China CEO money crowd called "Smarter Planet"strategy announced in the forum 2009IBM.This concept was put forth, that is the great concern of the United States from all walks of life, and even analysts believe that IBM's vision is very likely to rise to U.S. national strategy, and caused a sensation in the world. IBM believes that the industry, the next phase of the mission is to make full use of the new generation of IT technology in all walks of life among specifically, is the embedded sensors and equipment to the power grid, railways, bridges, tunnels, highways, buildings, water supply systems dams, oil and gas pipelines and other objects, and is generally connected to the formation of Things.Strategy conference, IBM, and implant the concept of "wisdom" in the implementation of the infrastructure, strong, not only in the short term to stimulate the economy, promote employment, and in a short period of time for China to build a mature wisdom infrastructure platform.IBM "Smarter Planet" strategy will set off again after the wave of Internet technology industrial revolution. Former IBM CEO Lou Gerstner has raised an important point of view, every 15 years, a revolution in computing model. This judgment is the same as Moore's Law accurately call it a "15-year cycle Law". Before and after 1965, changes to the mainframe as a symbol, 1980 marked by the popularization of personal computers, 1995, the Internet revolution. Each such technological change are caused by the enterprise, industry and even the national competitive landscape of major upheaval and change. To a certain extent in the Internet revolution is ripening by the "information superhighway" strategy. 1990s, the Clinton administration plan for 20 years, $ 200 billion to -4000 billion, construction of the U.S. National Information Infrastructure, to create a huge economic and social benefits.Today, the "Smarter Planet" strategy by many Americans that there are many similarities with the "information superhighway", the same they revive the economy, a key strategy for competitive advantage. The strategy can be set off, not only for the United States, such as the Internet revolution was the wave of technological and economic concern, more attention from the world."Internet of Things prospects are very bright, it will dramatically change our current way of life." Demonstration director of the Center of Nanjing University of Aeronautics and Astronautics, National Electrical and Electronic Zhao Guoan said. Industry experts said that the Internet of things to our life personification of the things became a kind of human.Goods (goods) in the world of physical objects associated with each other "exchange", without the need for human intervention.The Internet of Things using radio frequency identification (RFID) technology, to achieve the interconnection and sharing of the automatic identification of goods (products) and information through the computer Internet. It can be said that the Internet of Things depict the world is full of intelligent. In the world of Internet of Things, material objects connected to the dragnet.The second session, held at Peking University in November 2008, China Mobile Government Seminar "Knowledge Society and Innovation 2.0", the experts made the mobile technology, the Internet of Things technology led to the development of economic and social form, innovative forms of change, and promote the The next generation of innovation for the knowledge society as the core of user experience (innovative 2.0) the formation of innovation and development of the form to pay more attention to the user to focus on people-oriented. Research institutions is expected to 10 years, the Internet of Things may be mass adoption of this technology will develop into one of thousands of yuan-scale high-tech market, the industry than the Internet 30 times.It is learned that the things industry chain can be broken down into the identity, perception, processing and information transfer, four links, each link of the key technologies for the wireless transmission network of RFID, sensors, smart chip and telecom operators. EPOSS in the "Internet of Things in 2020" report, an analysis predicted that the future development of the Internet of Things will go through four stages, 2010, RFID is widely used in the field of logistics, retail and pharmaceutical objects interconnect 2010 to 2015, 2015 ~ In 2020, the object into the semi-intelligent, intelligent objects into 2020.As the vanguard of the Internet of Things, RFID has become the most concerned about the technology market. The data show that the global RFID market size in 2008 from $ 4.93 billion in 2007 rose to $ 5.29 billion, this figure covers all aspects of the RFID market, including tags, readers and other infrastructure, software and services. RFID card and card-related infrastructure will account for 57.3 percent of the market, reaching $ 3.03 billion. Application from financial and security industries will drive the market growth of RFID cards. Analysys International forecasts, the Chinese RFID market size in 2009 will reach 5.0 billion, a CAGR of 33%, in which the electronic tag is more than 3.8 billion yuan, the reader close to 700 million yuan, software and services market to reach 500 million yuan pattern.MEMS is the abbreviation of the micro-electromechanical systems, MEMS technology is built on the basis of micro / nano, the market prospect is broad. The main advantage of the MEMS sensoris the small size, large-scale mass production cost reduction, mainly used in two major areas of automotive and consumer electronics. Under ICInsight the latest report is expected in 2007-2012, global sales of semiconductor sensors and actuators based on MEMS will reach 19 percent compound annual growth rate (CAGR), compared with $ 4.1 billion in 2007 to five years will achieve $ 9.7 billion in annual sales.7.PrincipleInternet of Things is on the basis of the computer Internet, RFID, wireless data communications technology, to construct a cover everything in the world's "Internet of Things". In this network, the goods (products) to each other "exchange", without the need for human intervention. Its essence is the use of radio frequency identification (RFID) technology to achieve the interconnection and sharing of the automatic identification of goods (products) and information through the computer Internet.The Internet of Things is a very important technology is radio frequency identification (RFID) technology. RFID is radio frequency identification (Radio Frequency Identification) technology abbreviation, is an automatic identification technology in the 1990s began to rise, the more advanced a non-contact identification technology. The development of RFID technology based on a simple RFID system, combined with existing network technology, database technology, middleware technology, to build a one composed by a large number of networked readers and numerous mobile label, much larger than the Internet of Things trend.RFID, It is able to let items "speak" a technique. In the "Internet of Things" concept, RFID tags are stored in the specification and interoperability information collected automatically by wireless data communications network to a central information system, to achieve the identification of goods (products), and then through the open computer network for information exchange and sharing, items "transparent" management.The information technology revolution in the Internet of Things is referred to as IT mobile Pan of a specific application. Internet of Things through IntelliSense, identification technology and pervasive computing, ubiquitous network convergence applications, breaking the conventional thinking before, human beings can achieve ubiquitous computing and network connectivity [3]. The traditional thinking has been the separation of physical infrastructure and IT infrastructure: on the one hand, airports, roads, buildings, while on the other hand, the data center, PC, broadband. In theera of the "Internet of Things", reinforced concrete, cable with the chip, broadband integration into a unified infrastructure, in this sense, the infrastructure is more like a new site of the Earth, the world really works it, which including economic management, production operation, social and even personal life. "Internet of Things" makes it much more refined and dynamic management of production and life, to manage the future of the city to achieve the status of "wisdom" to improve resource utilization and productivity levels, and improve the relationship between man and nature. 8.Agency1, institution-buildingAs the first national Internet of Things industry community organizations - the application of professional Committee of China Electronic Chamber of Things technology products (referred to as: "objects of the IPCC"), the Ministry of Civil Affairs in June 2010, preliminary approved by the Ministry of August being reported that the Ministry of Civil Affairs for final approval.2, the main taskServe as a bridge between business and government to assist the Government of the industry guidance, coordination, consultation and services to help members to reflect the business requirements to the Government; coordinate the relationship between enterprises to strengthen technical cooperation, product distribution, the elimination of vicious competition ; supervision of members the correct implementation of national laws and regulations, to regulate the industry; member of information communication technology products, cooperation, resource sharing, capital operation, and promote the application of Internet of Things technologies and products, and promote the Internet of Things industrial scale , co-development.9.ConstructionInternet of Things in the practical application to carry out requires the involvement of all walks of life, and need the guidance of the national government as well as related regulations and policies to assist the launching of the Internet of Things has the scale, broad participation, management, technical, and material properties, etc. other features, the technical problem is the most crucial issues of Things billion Bo logistics consulting, Internet of Things technology is an integrated technology, a system not yet which company has overall responsibility for network planning and construction of the entire system, theoretical studies have commenced in all walks of life and the practical application is limited to within the industry. The key is on the planning and design andresearch and development of the Internet of Things research in the field of RFID, sensors, embedded software, and transmission of data calculation. In general, to carry out the steps of the Internet of things mainly as follows:(1) identified the object attributes, properties, including static and dynamic properties of the static property can be stored directly in the label, the dynamic properties need to start with sensors to detect real-time;(2) the need to identify the equipment to complete the reading of object attributes, and information into a data format suitable for network transmission;(3) the object of information transmitted over the network to the information processing center (processing center may be distributed, such as home computers or mobile phones, may also be centralized, such as China Mobile IDC) by the processing center to complete the object communication calculation.10.key areasInternet of Things 4 key areas:(1) RFID;(2) sensor network;(3) The M2M;(4) integration of the two.11.TrendIndustry experts believe that the Internet of things on the one hand can improve economic efficiency and significant cost savings; the other hand, can provide technical impetus to global economic recovery. Currently, the United States, the European Union are all invested heavily in-depth study to explore the Internet of Things. The country is also highly concerned about the emphasis of Things, Industry and Information Technology Ministry in conjunction with the relevant departments are conducting research in a new generation of IT to the formation of policies and measures to support the development of a new generation of IT.China Mobile CEO Wang Jianzhou has repeatedly mentioned the Internet of Things will become the focus of future development of China Mobile. He will be invited to Taiwan to produce RFID, sensors and bar code manufacturers and China Mobile. According to him, the use of the Internet of Things technology, Shanghai Mobile has a number of industrial customers tailor the datacollection, transmission, processing and business management in one set of wireless application solutions. The latest data show that Shanghai Mobile has more than 100,000 chips mounted on a taxi, bus, various forms of matter networking applications in all walks of prowess, to ensure the orderly operation of the city. During the Shanghai World Expo, "the bus services through" will be fully applied to the Shanghai public transport system, the smooth flow traffic to the most advanced technology to protect Expo area; for logistics transportation management, e-logistics ", will provide users with real-time accurate information of Cargo, vehicle tracking and positioning, the transport path selection, logistics network design and optimization services greatly enhance the comprehensive competitiveness of logistics enterprises.In addition, the popularization of the "Internet of Things" for the number of animals, plants and machinery, sensors and RFID tags of items and related interface devices will greatly exceed the number of mobile phones. The promotion of the Internet of Things will become a drive to promote economic development for the industry to open up a potential development opportunities. According to the current demand on the Internet of Things, in recent years, billions of sensors and electronic tags, which will greatly promote the production of IT components, while increasing the number of job opportunities.According to reports, it is necessary to truly build an effective Internet of things, there are two important factors. First, the scale, only with the scale to make the items of intelligence play a role. For example, a city of one million vehicles, if we only 10000 vehicles installed on the smart system, it is impossible to form an intelligent transportation system; two mobility items are usually not static, but in the state of the movement , we must maintain the items in the state of motion, and even high-speed motion state can at any time for dialogue.FORRESTER of the authority of the U.S. advisory body predicted that 2020, the world of business of the Internet of Things, compared with the business of interpersonal communication, will reach 30 to 1, so the "Internet of Things" is known to be the next one trillion communications services.Internet of Things heat wave Why is rapidly growing in China? Internet of Things in China rapid rise thanks to the several advantages of our country in terms of things.In the early 1999 launched the Internet of Things core sensor network technology research, R & D level in the world; the second, sensor network field in the world, China is the standard one ofthe dominant country, the patent owner; third China is one of the countries to achieve a complete industrial chain of Things; Fourth, China's wireless communications network and broadband coverage provides a solid infrastructure to support the development of the Internet of Things; Fifth, China has become the world's first the three major economies, with strong economic strength to support the development of the Internet of Things.12.MythThe current understanding of the Internet of things there are a lot of misunderstanding, which is also a direct impact on our understanding of Things on the development of the logistics industry, it is necessary first to distinguish errors, clarify our thinking.One sensor networks or RFID network equivalent of Things. The fact that sensor technology, or RFID technology, or are simply one of the information collection technology. In addition to the sensor technology and RFID technology, GPS, video recognition, infrared, laser, scanning can be achieved automatically identify physical objects to communicate technical information collection technology can become the Internet of Things. Sensor networks or RFID network is just an application of Things, but not all of Things.Second, the Internet of Things as a myriad of unlimited extension of the Internet of Things as a completely open for all things, all of the interconnections, all shared Internet platform.In fact, the Internet of Things is not simple infinite extension of the global sharing of the Internet. Even if the Internet is also not only refers to we typically think of the international sharing computer network, Internet, WAN and LAN. Internet of Things can be both an extension of our usual sense of the Internet to the matter; LAN, professional can also be based on real needs and industrial applications. The reality is not necessary and can not make all the items networking; no need to make professional, LAN must be connected to the global Internet sharing platform. Of things in the future the Internet will be very different from the professional network of similar smart logistics, smart transportation, smart grid; the intelligence community and other local area network is the largest use of space.Ter, that the ubiquitous network of the Internet of Things Internet of Things, and therefore the Internet of Things is a castle in the air, is difficult to achieve the technology. In fact the Internet of things are real, many of the primary Internet of Things applications already for our services. The Internet of Things concept is introduced in many real-world applications based on polymericintegrated innovation, pre-existing network with the Internet of Things, intelligent, automated system, summarized and upgrading it upgraded from a higher perspective our knowledge.Four of Things as a basket, and everything installed inside; based on self-awareness, and only be able to interact, communication products as the Internet of Things applications. For example, just embedded some of the sensors, to become the so-called Internet of Things appliances; products labeled with RFID tags, became the Internet of Things applications.esThings widely used throughout the intelligent transportation, environmental protection, government, public safety, peace at home, smart fire, industrial monitoring, environmental monitoring, elderly care, personal health, floriculture, water monitoring, food traceability, enemy detection and intelligence collection and other fields.International Telecommunication Union in 2005, a report has portrayed the picture of the era of the "Internet of Things": car when the driver operational errors will automatically alarm; briefcase will remind the owner forgot something; clothes will "tell" washing machine color and water temperature requirements. Billion Bo logistics consulting vivid introduction of Things in the logistics field, for example, a logistics company, application of Things truck, when loading overweight, the car will automatically tell you overloaded and overload how many, but the space remaining , the severity of goods with how to tell you; when handling staff unloading a cargo packaging may be shouting "throw you hurt me", or "My dear, you do not get too barbaric, you can?"; when the driver and others gossip, trucks will pretend boss's voice roaring "stupid, the grid!Internet of things to make full use of a new generation of IT technology in all walks of life among, specifically, is embedded sensors and equipment to the power grid, railways, bridges, tunnels, highways, buildings, water systems, dams, oil and gas pipelines, etc.kinds of objects, and then "Internet of Things" with the existing Internet to integrate and realize the integration of human society and the physical system, which in this integrated network, there is the ability to super-powerful central computer cluster, integrated network staff implementation of real-time management and control of the machinery, equipment and infrastructure, on this basis, the human can be more refined and dynamic management of production and life, to achieve the status of the "wisdom", to improve resource utilization and productivity levels, and improve human the relationship between the natural.。

物联网安全英文演讲稿(3篇)

物联网安全英文演讲稿(3篇)

第1篇Ladies and Gentlemen,Good morning/afternoon. It is an honor to stand before you today to discuss a topic that is not only shaping our future but also posing significant challenges – the Internet of Things (IoT). As we delve deeper into the digital age, the integration of IoT into our daily lives has become increasingly prevalent. However, with this technological advancement comes the pressing need to address its security concerns. In this speech, I will highlight the importance of IoT security, discussthe current challenges, and propose solutions to ensure a safe andsecure connected world.I. IntroductionThe Internet of Things refers to the network of physical devices, vehicles, buildings, and other items embedded with sensors, software,and network connectivity that enables these objects to collect and exchange data. This interconnectedness has revolutionized various industries, from healthcare to transportation, and from agriculture to manufacturing. However, as we rely more on IoT devices, we become more vulnerable to cyber threats.II. The Importance of IoT Security1. Protecting Personal InformationIoT devices collect and store vast amounts of personal data, such as health records, financial information, and location data. Ensuring the security of this information is crucial to prevent identity theft, fraud, and other forms of cybercrime.2. Mitigating Risks to Critical InfrastructureIoT devices are increasingly being used in critical infrastructure, such as power grids, water systems, and transportation networks. A breach in security could lead to significant disruptions, putting lives at riskand causing economic damage.3. Preserving PrivacyAs more devices become interconnected, the potential for privacy breaches also increases. It is essential to implement robust security measures to protect individuals' privacy and maintain trust in the IoT ecosystem.III. Current Challenges in IoT Security1. Device VulnerabilitiesMany IoT devices are equipped with outdated software and hardware, making them easy targets for cyberattacks. Additionally, the sheer number of devices connected to the internet creates a vast attacksurface for hackers.2. Lack of StandardizationThe absence of a unified security standard for IoT devices has led to inconsistencies in security practices, making it difficult to ensure the overall safety of the ecosystem.3. Insufficient User AwarenessEnd-users often lack the necessary knowledge to secure their IoT devices, which can lead to compromised systems and widespread security breaches.IV. Solutions for IoT Security1. Implementing Strong EncryptionEncryption plays a crucial role in protecting data transmitted andstored by IoT devices. Employing robust encryption algorithms and secure key management practices can help prevent unauthorized access tosensitive information.2. Regular Updates and Patch ManagementDevice manufacturers should prioritize regular updates and patch management to address vulnerabilities and ensure that IoT devices remain secure throughout their lifecycle.3. Standardization and CertificationEstablishing a unified security standard for IoT devices and implementing a certification program can help ensure that only secure devices are available to consumers and businesses.4. User Education and AwarenessEducating end-users about IoT security best practices, such as changing default passwords and enabling two-factor authentication, is essential to reduce the risk of security breaches.5. Government and Industry CollaborationGovernment agencies and industry stakeholders must work together to develop policies and regulations that promote IoT security and ensure compliance with best practices.V. ConclusionThe Internet of Things has the potential to transform our world, but it is essential to address its security concerns to avoid potential disasters. By implementing robust security measures, standardizing practices, and fostering collaboration between government and industry, we can ensure a safe and secure connected future. Let us not underestimate the importance of IoT security and take the necessary steps to protect our digital lives.Thank you for your attention.第2篇Ladies and gentlemen,Good morning/afternoon/evening. It is my great honor to stand before you today to discuss a topic that has become increasingly important in our lives: the security of the Internet of Things (IoT). As we all know, the IoT is rapidly expanding, and it has the potential to revolutionize our lives in numerous ways. However, with this expansion comes a significant challenge: ensuring the security of these interconnected devices.Firstly, let us explore what the Internet of Things is. In simple terms, the IoT refers to the network of physical devices, vehicles, appliances, and other items embedded with electronics, software, sensors, and network connectivity, which enables these objects to collect and exchange data. This network of interconnected devices has the potential to make our lives more convenient, efficient, and secure. For example, smart homes can save energy and improve our comfort levels, while smart cities can enhance public safety and reduce traffic congestion.However, the rapid growth of the IoT also brings about significant security concerns. With billions of devices connected to the internet, the attack surface has become vast, and cybercriminals have more opportunities to exploit vulnerabilities. In this speech, I will discuss the following aspects of IoT security:1. The importance of IoT security2. Common vulnerabilities in IoT devices3. Best practices for securing IoT devices4. The role of stakeholders in ensuring IoT security1. The importance of IoT securityThe importance of IoT security cannot be overstated. With the increasing number of devices connected to the internet, the potential for cyber attacks has also increased. These attacks can have severe consequences, including:a. Data breaches: Cybercriminals can steal sensitive data, such as personal information, financial data, and medical records, which can be used for identity theft or other malicious purposes.b. Device hijacking: Cybercriminals can take control of IoT devices, such as smart home appliances or industrial control systems, and use them for malicious purposes, such as creating botnets or causing physical damage.c. Disruption of services: Cyber attacks on IoT devices can lead to the disruption of critical infrastructure, such as power grids, transportation systems, and healthcare facilities.Therefore, ensuring the security of IoT devices is essential to protect our personal information, maintain the integrity of critical infrastructure, and prevent potential harm to society.2. Common vulnerabilities in IoT devicesThere are several common vulnerabilities in IoT devices that can be exploited by cybercriminals. Some of these include:a. Weak passwords: Many IoT devices come with default passwords or weak passwords that are easy to guess or crack.b. Outdated software: Many IoT devices do not receive regular software updates, which can leave them vulnerable to known security flaws.c. Insecure communication protocols: Some IoT devices use outdated or insecure communication protocols, such as SSLv3 or TLS 1.0, which can be exploited by attackers.d. Lack of encryption: Some IoT devices do not encrypt data, which can make it easy for cybercriminals to intercept and steal sensitive information.3. Best practices for securing IoT devicesTo ensure the security of IoT devices, it is essential to implement best practices. Some of these include:a. Strong passwords: Use strong, unique passwords for each IoT device and avoid using default passwords.b. Regular software updates: Keep IoT devices up-to-date with the latest software updates and patches.c. Secure communication protocols: Use secure communication protocols, such as TLS 1.2 or higher, to protect data in transit.d. Encryption: Encrypt sensitive data to prevent interception and theft.e. Device management: Use a centralized device management system to monitor and control IoT devices.4. The role of stakeholders in ensuring IoT securityEnsuring the security of the IoT requires the collaboration of all stakeholders, including device manufacturers, software developers, network providers, and end-users. Some of the responsibilities of these stakeholders include:a. Device manufacturers: Develop and produce secure IoT devices that are resistant to attacks.b. Software developers: Develop secure software that is free from vulnerabilities and can be easily updated.c. Network providers: Provide secure and reliable network infrastructure to support IoT devices.d. End-users: Follow best practices for securing IoT devices and report any security incidents to the appropriate authorities.In conclusion, the security of the Internet of Things is a critical issue that requires the attention of all stakeholders. By implementing best practices and working together, we can ensure the safety and security of our interconnected devices and protect ourselves from potential cyber threats.Thank you for your attention.第3篇Ladies and gentlemen,Good morning/afternoon/evening. It is my great honor to stand before you today to discuss a topic that is of paramount importance in our rapidly evolving digital age – the security of the Internet of Things (IoT). As we embrace the convenience and efficiency that IoT brings to our lives, we must also recognize the critical need to safeguard our connected devices from potential threats and vulnerabilities.The Internet of Things refers to the network of physical devices, vehicles, buildings, and other items embedded with sensors, software, and connectivity to enable these objects to collect and exchange data. With the exponential growth of IoT devices, we are witnessing a world where everything from smart home appliances to industrial machinery is interconnected. However, this interconnectedness also brings about significant security challenges.In this speech, I will explore the importance of IoT security, the current landscape of threats, and the steps we can take to ensure a safer and more secure IoT ecosystem. Let us begin by understanding why IoT security is of utmost importance.I. The Importance of IoT Security1. Protection of Personal Information: As IoT devices collect and transmit vast amounts of personal data, such as health records,financial information, and location data, ensuring their security is crucial to protect individuals from identity theft, financial fraud, and other privacy breaches.2. Safety and Reliability: In critical infrastructure, such as healthcare, transportation, and energy, IoT devices play a vital role in maintaining operations. Ensuring the security of these devices is essential to prevent service disruptions, accidents, and even loss of life.3. Economic Impact: The IoT market is projected to grow exponentially, with a significant portion of the global economy being powered by IoT devices. A compromised IoT ecosystem can lead to substantial financial losses, as well as hinder innovation and growth.II. The Current Landscape of IoT Threats1. Device Hacking: Attackers can exploit vulnerabilities in IoT devices to gain unauthorized access, steal sensitive data, or cause physical damage.2. Botnets: Malicious software can infect IoT devices and form botnets, which can be used to launch distributed denial-of-service (DDoS) attacks, spread malware, or perform other malicious activities.3. Man-in-the-Middle Attacks: Attackers can intercept communication between IoT devices and their intended recipients, allowing them to eavesdrop, manipulate data, or even take control of the devices.4. Data Breaches: With the increasing amount of data collected by IoT devices, there is a higher risk of data breaches, leading to the exposure of personal and sensitive information.III. Steps to Ensure IoT Security1. Implement Strong Authentication and Authorization: Use robust authentication mechanisms, such as multi-factor authentication, toensure that only authorized users can access IoT devices and their data.2. Regularly Update and Patch Devices: Keep IoT devices up-to-date with the latest security patches and updates to address known vulnerabilities.3. Employ Encryption: Use strong encryption protocols to protect data in transit and at rest, ensuring that sensitive information remains secure.4. Develop Secure Development Practices: Adopt secure coding practices during the development of IoT devices to minimize the introduction of vulnerabilities.5. Conduct Regular Security Audits: Perform periodic security assessments to identify and address potential weaknesses in the IoT ecosystem.6. Foster Collaboration and Education: Promote collaboration between industry stakeholders, government agencies, and academia to share knowledge, best practices, and resources for improving IoT security.7. Regulate and Standardize IoT Security: Develop and enforceregulations and standards to ensure that IoT devices meet minimumsecurity requirements.In conclusion, the security of the Internet of Things is a complex and multifaceted challenge that requires a collective effort from all stakeholders. By understanding the importance of IoT security, recognizing the current threats, and implementing robust security measures, we can create a safer and more secure IoT ecosystem for the future.Thank you for your attention. I look forward to your questions and discussions on this critical topic.。

物联网外文文献翻译

物联网外文文献翻译

物联网外文文献翻译
物联网是一个由许多设备彼此连接而形成的网络,这些设备可以是智能手机、传感器、汽车等。

物联网允许设备之间相互通信和交换数据,从而实现更智能、更高效和更安全的生活。

在物联网领域,一些外文文献对于我们的研究和研究非常有帮助。

以下是一些常见的物联网外文文献:
- "A Survey on Internet of Things From Industrial Market Perspective":这篇论文介绍了物联网的概念、应用和市场现状,并分析了物联网在未来的趋势。

- "Big Data Analytics for IoT-Based Smart Environments: A Survey":文章描述了如何使用大数据分析来处理物联网设备所产生的数据,并探讨了这种技术如何应用于智能环境中。

- "A Review of Smart Cities Based on the Internet of Things Concept":这篇综述了物联网在智慧城市中的应用,并对物联网在智慧城市化中的挑战和机遇进行了讨论。

通过阅读这些文献,我们可以更深入地了解物联网的应用、市场和发展趋势,并且了解如何将物联网技术应用到实际生活中。

物联网中英文对照外文翻译文献

物联网中英文对照外文翻译文献

中英文资料外文翻译Internet of Things1.the definition of connotationThe English name of the Internet of Things The Internet of Things, referred to as: the IOT.Internet of Things through the pass, radio frequency identification technology, global positioning system technology, real-time acquisition of any monitoring, connectivity, interactive objects or processes, collecting their sound, light, heat, electricity, mechanics, chemistry, biology, the location of a variety of the information you need network access through a variety of possible things and things, objects and people in the Pan-link intelligent perception of items and processes, identification and management. The Internet of Things IntelliSense recognition technology and pervasive computing, ubiquitous network integration application, known as the third wave of the world's information industry development following the computer, the Internet. Not so much the Internet of Things is a network, as Internet of Things services and applications, Internet of Things is also seen as Internet application development. Therefore, the application of innovation is the core of the development of Internet of Things, and 2.0 of the user experience as the core innovation is the soul of Things.2.The meaning of "material"Where the "objects" to meet the following conditions can be included in the scope of the "Internet of Things":1. Receiver have the appropriate information;2. Have a data transmission path;3. Have a certain storage capabilities;4. To have the CPU;5.To have the operating system;6. Have specialized applications;7. Have a data transmitter;8. Follow the communication protocol of Things;9. World Network, a unique number that can be identified.3. "Chinese style" as defined inInternet of Things (Internet of Things) refers to is the ubiquitous (Ubiquitous) terminal equipment (Devices) and facilities (Facilities), including with the "inner intelligence" sensors, mobile terminals, industrial systems, floor control system, the family of Intelligentfacilities, video surveillance systems, and external can "(Enabled), such as RFID, a variety of assets (the Assets), personal and vehicle carrying the wireless terminal" intelligent objects or animals "or" smart dust "(the Mote), through a variety of wireless and / or cable over long distances and / or short-range communication networks to achieve interoperability (M2M), application integration (the Grand Integration), and based on cloud computing, SaaS operation mode, in internal network (intranet), private network (extranet), and / or the Internet (Internet) environment, the use of appropriate information security mechanisms to provide a safe, controlled and even personalized real-time online monitoring, retrospective positioning, alarm linkage, command and control plan management, remote control, security, remote repair and maintenance, online upgrades, statistical reporting, decision support, the leadership of the desktop (showcase of the Cockpit Dashboard) management and service functions, "Everything," "efficient, energy saving, security environmental protection, "" possession, control, Camp integration [1].4.EU definitionIn September 2009, the Internet of Things and enterprise environments held in Beijing, China-EU Seminar on the European Commission and Social Media Division RFID Division is responsible for Dr. Lorent Ferderix, given the EU's definition of things: the Internet of Things is a dynamic global network infrastructure, it has a standards-based and interoperable communication protocols, self-organizing capabilities, including physical and virtual "objects" of identity, physical attributes, virtual features and smart interface and seamless integration of information networks .Internet of Things Internet and media, the Internet and business Internet one, constitute the future of the Internet.5.changeThe Internet of Things (Internet of Things) the word universally recognized at home and abroad Ashton, Professor of the MIT Auto-ID Center in 1999 first proposed to study RFID. The report of the same name released in 2005, the International Telecommunication Union (ITU), the definition and scope of the Internet of Things has been a change in the coverage of a larger expansion, no longer refers only to the Internet of Things based on RFID technology.Since August 2009, Premier Wen Jiabao put forward the "Experience China" Internet of Things was officially listed as a national one of the five emerging strategic industries, to write the "Government Work Report" Internet of Things in China has been the great concern of the society as a whole degree of concern is unparalleled in the United States, European Union, as well as other countries.The concept of Internet of Things is not so much a foreign concept, as it has been the concept of a "Made in China", his coverage of the times, has gone beyond the scope of the 1999 Ashton professor and the 2005 ITU report referred to, Internet of Things has been labeled a "Chinese style" label.6.BackgroundThe concept of Internet of Things in 1999. Internet-based, RFID technology and EPC standards, on the basis of the computer Internet, the use of radio frequency identification technology, wireless data communication technology, a global items of information to real-time sharing of the physical Internet "Internet of things" (referred to as the Internet of Things) , which is also the basis of the first round of the China Internet of Things boom set off in 2003.The sensor network is built up based on sensing technology network. Chinese Academy of Sciences in 1999 on the start sensor network research and has made some achievements in scientific research, the establishment of applicable sensor network.1999, held in the United States, mobile computing and networking International Conference, "The sensor network is a development opportunity facing humanity in the next century. In 2003, the United States, "Technology Review" proposed sensor network technology will be future changes ten people's lives first.November 17, 2005, the WSIS held in Tunis (WSIS), the International TelecommunicationUnion released ITU Internet Report 2005: Internet of Things ", citing the concept of the" Internet of things ". The report pointed out that the ubiquitous "Internet of Things" communication era is approaching, all the objects in the world, from tires to toothbrushes, from housing to the tissue via the Internet, take the initiative to be exchanged. Radio Frequency Identification (RFID), sensor technology, nanotechnology, intelligent embedded technology will be more widely used.According to the description of the ITU, the era of things, a short-range mobile transceivers embedded in a variety of daily necessities, human beings in the world of information and communication will receive a new communication dimension, from any time communication between people of the place of connection extended to the communication connection between persons and things and things and things. The Internet of Things concept of the rise, largely due to the International Telecommunication Union (ITU), the title of Internet of Things 2005 annual Internet Report. However, the ITU report the lack of a clear definition of Things.Domestic Internet of Things is also there is no single standard definition, but the Internet of Things In essence, the Internet of Things is a polymer application of modern information technology to a certain stage of development and technological upgrading of various sensing technology modern network technology and artificial intelligence and automation technology aggregation and integration of applications, so that the human and material wisdom of dialogue to create a world of wisdom. Because the development of the Internet of Things technology, involving almost all aspects of IT, innovative application and development of a polymer, systematic, and therefore be called revolutionary innovation of information industry. Summed up the nature of the Internet of Things is mainly reflected in three aspects: First, the Internet features that need to be networked objects must be able to achieve the interoperability of the Internet; identification and communication features, that is included in the Internet of Things "objects" must to have the functions of automatic identification and physical objects communication (M2M); intelligent features, the network system should have automated, self-feedback and intelligent control features January 28, 2009, Obama became the President of the United States, held with U.S. business leaders a "round table", as one of the only two representatives, IBM CEO Sam Palmisano for the first time that "the wisdom of the Earth" this concept, it is recommended that the new government to invest in a new generation of intelligent infrastructure.February 24, 2009 news, IBM Greater China CEO money crowd called "Smarter Planet"strategy announced in the forum 2009IBM.This concept was put forth, that is the great concern of the United States from all walks of life, and even analysts believe that IBM's vision is very likely to rise to U.S. national strategy, and caused a sensation in the world. IBM believes that the industry, the next phase of the mission is to make full use of the new generation of IT technology in all walks of life among specifically, is the embedded sensors and equipment to the power grid, railways, bridges, tunnels, highways, buildings, water supply systems dams, oil and gas pipelines and other objects, and is generally connected to the formation of Things.Strategy conference, IBM, and implant the concept of "wisdom" in the implementation of the infrastructure, strong, not only in the short term to stimulate the economy, promote employment, and in a short period of time for China to build a mature wisdom infrastructure platform.IBM "Smarter Planet" strategy will set off again after the wave of Internet technology industrial revolution. Former IBM CEO Lou Gerstner has raised an important point of view, every 15 years, a revolution in computing model. This judgment is the same as Moore's Law accurately call it a "15-year cycle Law". Before and after 1965, changes to the mainframe as a symbol, 1980 marked by the popularization of personal computers, 1995, the Internet revolution. Each such technological change are caused by the enterprise, industry and even the national competitive landscape of major upheaval and change. To a certain extent in the Internet revolution is ripening by the "information superhighway" strategy. 1990s, the Clinton administration plan for 20 years, $ 200 billion to -4000 billion, construction of the U.S. National Information Infrastructure, to create a huge economic and social benefits.Today, the "Smarter Planet" strategy by many Americans that there are many similarities with the "information superhighway", the same they revive the economy, a key strategy for competitive advantage. The strategy can be set off, not only for the United States, such as the Internet revolution was the wave of technological and economic concern, more attention from the world."Internet of Things prospects are very bright, it will dramatically change our current way of life." Demonstration director of the Center of Nanjing University of Aeronautics and Astronautics, National Electrical and Electronic Zhao Guoan said. Industry experts said that the Internet of things to our life personification of the things became a kind of human.Goods (goods) in the world of physical objects associated with each other "exchange", without the need for human intervention.The Internet of Things using radio frequency identification (RFID) technology, to achieve the interconnection and sharing of the automatic identification of goods (products) and information through the computer Internet. It can be said that the Internet of Things depict the world is full of intelligent. In the world of Internet of Things, material objects connected to the dragnet.The second session, held at Peking University in November 2008, China Mobile Government Seminar "Knowledge Society and Innovation 2.0", the experts made the mobile technology, the Internet of Things technology led to the development of economic and social form, innovative forms of change, and promote the The next generation of innovation for the knowledge society as the core of user experience (innovative 2.0) the formation of innovation and development of the form to pay more attention to the user to focus on people-oriented. Research institutions is expected to 10 years, the Internet of Things may be mass adoption of this technology will develop into one of thousands of yuan-scale high-tech market, the industry than the Internet 30 times.It is learned that the things industry chain can be broken down into the identity, perception, processing and information transfer, four links, each link of the key technologies for the wireless transmission network of RFID, sensors, smart chip and telecom operators. EPOSS in the "Internet of Things in 2020" report, an analysis predicted that the future development of the Internet of Things will go through four stages, 2010, RFID is widely used in the field of logistics, retail and pharmaceutical objects interconnect 2010 to 2015, 2015 ~ In 2020, the object into the semi-intelligent, intelligent objects into 2020.As the vanguard of the Internet of Things, RFID has become the most concerned about the technology market. The data show that the global RFID market size in 2008 from $ 4.93 billion in 2007 rose to $ 5.29 billion, this figure covers all aspects of the RFID market, including tags, readers and other infrastructure, software and services. RFID card and card-related infrastructure will account for 57.3 percent of the market, reaching $ 3.03 billion. Application from financial and security industries will drive the market growth of RFID cards. Analysys International forecasts, the Chinese RFID market size in 2009 will reach 5.0 billion, a CAGR of 33%, in which the electronic tag is more than 3.8 billion yuan, the reader close to 700 million yuan, software and services market to reach 500 million yuan pattern.MEMS is the abbreviation of the micro-electromechanical systems, MEMS technology is built on the basis of micro / nano, the market prospect is broad. The main advantage of the MEMS sensoris the small size, large-scale mass production cost reduction, mainly used in two major areas of automotive and consumer electronics. Under ICInsight the latest report is expected in 2007-2012, global sales of semiconductor sensors and actuators based on MEMS will reach 19 percent compound annual growth rate (CAGR), compared with $ 4.1 billion in 2007 to five years will achieve $ 9.7 billion in annual sales.7.PrincipleInternet of Things is on the basis of the computer Internet, RFID, wireless data communications technology, to construct a cover everything in the world's "Internet of Things". In this network, the goods (products) to each other "exchange", without the need for human intervention. Its essence is the use of radio frequency identification (RFID) technology to achieve the interconnection and sharing of the automatic identification of goods (products) and information through the computer Internet.The Internet of Things is a very important technology is radio frequency identification (RFID) technology. RFID is radio frequency identification (Radio Frequency Identification) technology abbreviation, is an automatic identification technology in the 1990s began to rise, the more advanced a non-contact identification technology. The development of RFID technology based on a simple RFID system, combined with existing network technology, database technology, middleware technology, to build a one composed by a large number of networked readers and numerous mobile label, much larger than the Internet of Things trend.RFID, It is able to let items "speak" a technique. In the "Internet of Things" concept, RFID tags are stored in the specification and interoperability information collected automatically by wireless data communications network to a central information system, to achieve the identification of goods (products), and then through the open computer network for information exchange and sharing, items "transparent" management.The information technology revolution in the Internet of Things is referred to as IT mobile Pan of a specific application. Internet of Things through IntelliSense, identification technology and pervasive computing, ubiquitous network convergence applications, breaking the conventional thinking before, human beings can achieve ubiquitous computing and network connectivity [3]. The traditional thinking has been the separation of physical infrastructure and IT infrastructure: on the one hand, airports, roads, buildings, while on the other hand, the data center, PC, broadband. In theera of the "Internet of Things", reinforced concrete, cable with the chip, broadband integration into a unified infrastructure, in this sense, the infrastructure is more like a new site of the Earth, the world really works it, which including economic management, production operation, social and even personal life. "Internet of Things" makes it much more refined and dynamic management of production and life, to manage the future of the city to achieve the status of "wisdom" to improve resource utilization and productivity levels, and improve the relationship between man and nature. 8.Agency1, institution-buildingAs the first national Internet of Things industry community organizations - the application of professional Committee of China Electronic Chamber of Things technology products (referred to as: "objects of the IPCC"), the Ministry of Civil Affairs in June 2010, preliminary approved by the Ministry of August being reported that the Ministry of Civil Affairs for final approval.2, the main taskServe as a bridge between business and government to assist the Government of the industry guidance, coordination, consultation and services to help members to reflect the business requirements to the Government; coordinate the relationship between enterprises to strengthen technical cooperation, product distribution, the elimination of vicious competition ; supervision of members the correct implementation of national laws and regulations, to regulate the industry; member of information communication technology products, cooperation, resource sharing, capital operation, and promote the application of Internet of Things technologies and products, and promote the Internet of Things industrial scale , co-development.9.ConstructionInternet of Things in the practical application to carry out requires the involvement of all walks of life, and need the guidance of the national government as well as related regulations and policies to assist the launching of the Internet of Things has the scale, broad participation, management, technical, and material properties, etc. other features, the technical problem is the most crucial issues of Things billion Bo logistics consulting, Internet of Things technology is an integrated technology, a system not yet which company has overall responsibility for network planning and construction of the entire system, theoretical studies have commenced in all walks of life and the practical application is limited to within the industry. The key is on the planning and design andresearch and development of the Internet of Things research in the field of RFID, sensors, embedded software, and transmission of data calculation. In general, to carry out the steps of the Internet of things mainly as follows:(1) identified the object attributes, properties, including static and dynamic properties of the static property can be stored directly in the label, the dynamic properties need to start with sensors to detect real-time;(2) the need to identify the equipment to complete the reading of object attributes, and information into a data format suitable for network transmission;(3) the object of information transmitted over the network to the information processing center (processing center may be distributed, such as home computers or mobile phones, may also be centralized, such as China Mobile IDC) by the processing center to complete the object communication calculation.10.key areasInternet of Things 4 key areas:(1) RFID;(2) sensor network;(3) The M2M;(4) integration of the two.11.TrendIndustry experts believe that the Internet of things on the one hand can improve economic efficiency and significant cost savings; the other hand, can provide technical impetus to global economic recovery. Currently, the United States, the European Union are all invested heavily in-depth study to explore the Internet of Things. The country is also highly concerned about the emphasis of Things, Industry and Information Technology Ministry in conjunction with the relevant departments are conducting research in a new generation of IT to the formation of policies and measures to support the development of a new generation of IT.China Mobile CEO Wang Jianzhou has repeatedly mentioned the Internet of Things will become the focus of future development of China Mobile. He will be invited to Taiwan to produce RFID, sensors and bar code manufacturers and China Mobile. According to him, the use of the Internet of Things technology, Shanghai Mobile has a number of industrial customers tailor the datacollection, transmission, processing and business management in one set of wireless application solutions. The latest data show that Shanghai Mobile has more than 100,000 chips mounted on a taxi, bus, various forms of matter networking applications in all walks of prowess, to ensure the orderly operation of the city. During the Shanghai World Expo, "the bus services through" will be fully applied to the Shanghai public transport system, the smooth flow traffic to the most advanced technology to protect Expo area; for logistics transportation management, e-logistics ", will provide users with real-time accurate information of Cargo, vehicle tracking and positioning, the transport path selection, logistics network design and optimization services greatly enhance the comprehensive competitiveness of logistics enterprises.In addition, the popularization of the "Internet of Things" for the number of animals, plants and machinery, sensors and RFID tags of items and related interface devices will greatly exceed the number of mobile phones. The promotion of the Internet of Things will become a drive to promote economic development for the industry to open up a potential development opportunities. According to the current demand on the Internet of Things, in recent years, billions of sensors and electronic tags, which will greatly promote the production of IT components, while increasing the number of job opportunities.According to reports, it is necessary to truly build an effective Internet of things, there are two important factors. First, the scale, only with the scale to make the items of intelligence play a role. For example, a city of one million vehicles, if we only 10000 vehicles installed on the smart system, it is impossible to form an intelligent transportation system; two mobility items are usually not static, but in the state of the movement , we must maintain the items in the state of motion, and even high-speed motion state can at any time for dialogue.FORRESTER of the authority of the U.S. advisory body predicted that 2020, the world of business of the Internet of Things, compared with the business of interpersonal communication, will reach 30 to 1, so the "Internet of Things" is known to be the next one trillion communications services.Internet of Things heat wave Why is rapidly growing in China? Internet of Things in China rapid rise thanks to the several advantages of our country in terms of things.In the early 1999 launched the Internet of Things core sensor network technology research, R & D level in the world; the second, sensor network field in the world, China is the standard one ofthe dominant country, the patent owner; third China is one of the countries to achieve a complete industrial chain of Things; Fourth, China's wireless communications network and broadband coverage provides a solid infrastructure to support the development of the Internet of Things; Fifth, China has become the world's first the three major economies, with strong economic strength to support the development of the Internet of Things.12.MythThe current understanding of the Internet of things there are a lot of misunderstanding, which is also a direct impact on our understanding of Things on the development of the logistics industry, it is necessary first to distinguish errors, clarify our thinking.One sensor networks or RFID network equivalent of Things. The fact that sensor technology, or RFID technology, or are simply one of the information collection technology. In addition to the sensor technology and RFID technology, GPS, video recognition, infrared, laser, scanning can be achieved automatically identify physical objects to communicate technical information collection technology can become the Internet of Things. Sensor networks or RFID network is just an application of Things, but not all of Things.Second, the Internet of Things as a myriad of unlimited extension of the Internet of Things as a completely open for all things, all of the interconnections, all shared Internet platform.In fact, the Internet of Things is not simple infinite extension of the global sharing of the Internet. Even if the Internet is also not only refers to we typically think of the international sharing computer network, Internet, WAN and LAN. Internet of Things can be both an extension of our usual sense of the Internet to the matter; LAN, professional can also be based on real needs and industrial applications. The reality is not necessary and can not make all the items networking; no need to make professional, LAN must be connected to the global Internet sharing platform. Of things in the future the Internet will be very different from the professional network of similar smart logistics, smart transportation, smart grid; the intelligence community and other local area network is the largest use of space.Ter, that the ubiquitous network of the Internet of Things Internet of Things, and therefore the Internet of Things is a castle in the air, is difficult to achieve the technology. In fact the Internet of things are real, many of the primary Internet of Things applications already for our services. The Internet of Things concept is introduced in many real-world applications based on polymericintegrated innovation, pre-existing network with the Internet of Things, intelligent, automated system, summarized and upgrading it upgraded from a higher perspective our knowledge.Four of Things as a basket, and everything installed inside; based on self-awareness, and only be able to interact, communication products as the Internet of Things applications. For example, just embedded some of the sensors, to become the so-called Internet of Things appliances; products labeled with RFID tags, became the Internet of Things applications.esThings widely used throughout the intelligent transportation, environmental protection, government, public safety, peace at home, smart fire, industrial monitoring, environmental monitoring, elderly care, personal health, floriculture, water monitoring, food traceability, enemy detection and intelligence collection and other fields.International Telecommunication Union in 2005, a report has portrayed the picture of the era of the "Internet of Things": car when the driver operational errors will automatically alarm; briefcase will remind the owner forgot something; clothes will "tell" washing machine color and water temperature requirements. Billion Bo logistics consulting vivid introduction of Things in the logistics field, for example, a logistics company, application of Things truck, when loading overweight, the car will automatically tell you overloaded and overload how many, but the space remaining , the severity of goods with how to tell you; when handling staff unloading a cargo packaging may be shouting "throw you hurt me", or "My dear, you do not get too barbaric, you can?"; when the driver and others gossip, trucks will pretend boss's voice roaring "stupid, the grid!Internet of things to make full use of a new generation of IT technology in all walks of life among, specifically, is embedded sensors and equipment to the power grid, railways, bridges, tunnels, highways, buildings, water systems, dams, oil and gas pipelines, etc.kinds of objects, and then "Internet of Things" with the existing Internet to integrate and realize the integration of human society and the physical system, which in this integrated network, there is the ability to super-powerful central computer cluster, integrated network staff implementation of real-time management and control of the machinery, equipment and infrastructure, on this basis, the human can be more refined and dynamic management of production and life, to achieve the status of the "wisdom", to improve resource utilization and productivity levels, and improve human the relationship between the natural.。

物联网英文论文

物联网英文论文

Deploying the “Internet of Things”Robert A. DolinChief Technology Officer, Echelon Corporationbob@AbstractThis paper explores the value in distributing and networking intellig ent devices. Value is derived from distributing intelligence to each device locally. Further value is derived from having transparent access to these devices remotely. Extracting this value depends upon overcomin g the issues of transparent connectivity, data concentration, and device interoperability. Some examples of successful, valuable applications are offered to illustrate how one might help deploy the “Internet of things.”1. IntroductionBy now, we are all familiar with Metcalf’s law: that the "value" or "power" of a network increases in proportion to the square of the number of nodes on the network. Echelon Corporation was founded with the goal of vastly increasing the number of networked nodes by making it both economic and valuable to network everyday devices in homes, buildings, factories, transportation systems – in short, just about everywhere. While we are an OEM company, one that sells technology and infrastructure products to others who make finished products, we have learned a great deal about the value in our customer’s applications for networking devices. We have also found that a primary motivator for such networking today is to improve energy efficiency. In this paper, and with additional detail in my talk, I will provide some actual applications along with some of the challenges we all face in deploying the “Internet of things.”2. Energy Savings as a Motivating ForceThere are three case studies I would like to discuss, each having energy related cost savings as a primary motivator. The first example is in building automation, the second is in electrical distribution, and the third demonstrates the economic necessity of networking light bulbs (!) well, at least some of them. In each of these projects, Echelon was more involved than as usual in our supplier role, so I am more familiar with the details and economic rationale than is normally the case.2.1. Demand Reduction On CommandIn commercial office buildings today, about 80% of the energy consumed is for Heating, Ventilation, Air Conditioning (HVAC), and lighting. Echelon’s corporate headquarters in San ose is completely automated with the products of our customers so HVAC, lighting, access control, elevators and other main building systems are all on a single network with transparent access to all the devices. Furthermore, all the building automation devices are certified as interoperable devices by an independent trade association called LonMark® International. This association, made up of companies, installers, and end users of products using Echelon’s LonWorks® technology, certifies products as being open and interoperable. At our headquarters, we are participating in an energy conservation study with Lawrence Livermore National Laboratory (LLL). In this study, LLL provides energy status over the Internet to the building facilities management company we use in San Francisco, some 50 miles north. This company monitors energy price information published by LLL over the Internet. Upon detecting that the price of energy has risen beyond a threshold, they send a SOAP message to our building controllers, which in turn, set each office into energy savings mode. Within minutes of the LLL energy status change, our building’s energy consumption is reduced by one third. We can maintain that state at no significant discomfort to the building occupants for four hours. This system is fully automatic, and requires no human intervention whatsoever. Additionally, it should be noted that our building is not distinctive from a construction standpoint in that it is the typical, poorly insulated, single pane windowed, office building that you would find in Silicon Valley.2.2. Utility AutomationIn June of 2000 ENEL, the largest electric utility in Italy, and Echelon entered into an agreement in which Echelon would supply communications infrastructure components to ENEL. ENEL had decided to replace every residential and light commercial electricity meter in their service area, all27,000,000of them with intelligent,communicating meters of their specification.These meters were designed to provide energy management,load control, and better service to their customer base of over 90% of Italy’s population. This project was essentially completed by the end of 2005. ENEL has given the project costs as approximately 2 Billion Euros, which includes the costs to procure the hardware, install the data systems, procure the meters and install them,and integrate these new devices into their business systems. They have reported publicly that they are now saving in excess of 500 million Euros per year. The system is projected to have a life of at least 15 years.This savings does not come from reading the meters remotely. In Europe, unlike in the U.S., an electricity meter is located inside the house and is read about once every 3 years, or when someone moves out. The bill is estimated monthly in the intervening time between reads. Instead, the savings comes from being able to know and balance the loads in the distribution network, theft prevention, accurate billing due to more precise metering, the integration of pre-pay capabilities within the standard meter, time of use pricing, being able to remotely disconnect electrical service, dynamically being able to adjust how much power a customer may use during times of power shortages, and a host of other applications.Additionally,the system provides ENEL with a platform for offering fee based services within the home should they choose to do so. Based upon this experience, and the favorable economic return that ENEL has and will enjoy, Echelon has designed a system of similar capability that is targeted for the rest of the world rather than being tailored to the Italian environment. We are actively trialing the system, called the Networked Energy Services (NES) system, with utilities around the world today.2.3. Automating Outdoor LightingSurprisingly, there is good economic justification for putting individually controlled outdoor municipal and roadway lights on a network. The city of Oslo in Norway has done a pilot program that proves the point.In Norway, all lighting accounts for 15% to 20% of the TOTAL yearly demand for electricity for the entire country.Street lighting alone is 38% of the energy used for lighting in Norway. Three years ago, to comply with a government directive to remove capacitors containing PCBs, the city of Oslo decided to not only remove those outdoor lights containing the PCBs,but to install a modern system that would save energy, provide better service, and serve as a model for environmental responsibility[1].The new lights come from multiple manufacturers who use Echelon’s power line communication technology within each light fixture for communication.The lights communicate to an Internet edge server provided by Echelon that manages each group of lights and communicates alarms and status back to a central data management site. Also integrated into the system are sensors that measure ambient light and the amount of traffic on the road. In this way, Oslo can control the light on the road providing a safer environment,such as when it rains during the day, as well as an energy saving environment by using individual dimming of the bulbs and dawn and dusk. The pilot project is only 120 of the 250,000 lights managed by the city of Oslo. The pilot has been running for over 6 months and has so far generated an energy savings of 70% over the old lights that it replaced. According to Philips[2], one of the vendors in the project, 45% of the savings is due to dimming the individual bulbs. The balance of the savings is primarily due to more modern bulbs and electronics. The pilot is expected to expand to 20,000 lights by the end of 2007. Hafslund, the company managing the system for Oslo, claims that the pilot system is currently generating a 15% return on the investment, primarily from energy savings, improved billing,and more efficient maintenance. All this with the environmental benefits from reduced energy consumption,fewer bulb replacements due to longer life from dimming, safer lighting and less light pollution.3. Problems, Problems, ProblemsWith all these benefits,one could easily jump to the conclusion that the “Internet of Things” will happen practically overnight. However, it will not. There are alot of non-intelligent things in the world, and replacing them takes time. For example,even with an aggressive installation rate of 700,000 meters per month, it took a total of5years for ENEL to complete their project. Replacing all the lights in a city means closing down one lane of a main road to change out the fixtures. Building Automation systems such as the one we have at Echelon typically are not changed out until they wear out.This can be15years or more. It is just a fact that the things that consume the most energy and thus have the most energy savings potential are large, expensive pieces of equipment. Finally, the people that install these systems need to be trained on the new systems for the installations to be successful. People can only be trained so quickly.Society can make a choice to accelerate these changes. Businesses can be given incentives,laws can be passed,regulations imposed such that society could enjoy a world of less pollution and fewer carbon emissions. And, as Echelon, Enel, and the City of Oslo have all shown, moving to an Internet of things brings positive returns,so that first movers enjoy lower costs and higher quality than their peers. However, this is a difficult choice to make. It always seems (in the short term) less expensive to pollute than not to pollute.It always feels less risky (in the short term) to do things the way they were done before. Nevertheless, the world does change, and in this case it will too.The supply of energy simply cannot continue to increase and easily meet the demands of the developed and quickly developing nations. The only way to have both economic growth and enough energy is to use what we can generate much more efficiently. I believe we are at this point now. As the recent devastation of hurricane Katrina has shown, a disruption of only 1% of the world’s oil and gas processing capability has a dramatic affect on the price of energy around the globe.That is a symptom of a system running at its capacity.These sorts of social issues are not the only impairments to deploying the Internet of things, however. There are a number of technical issues that still need the attention of the technical community.3.1. Internet Communication IssuesIt is still very difficult to place a device with a packet switching wireless modem(GPRS)on the Internet, where another machine connected anywhere can initiate packet communication to that device over the GPRS network. Service providers today balk at the idea of handing out routable IP addresses to always on endpoints, even when they are dynamic and must be resolved with DNS. Without being able to initiate communication from machine to another, the applications in this paper are not possible.It is also very difficult to get a wireless service provider to terminate a VPN at the service center and allow the service center to do the authentication and hand out the IP addresses. This would be an alternative to getting a routable IP address from the service provider, and is what is being used in the Oslo pilot.3.2. SecurityThe devices that are worth networking for energy savings are important ones that we all depend upon. The thought of making them accessible on the Internet always raises the issue of security. Standard means of providing security, SSL and Ipsec, are effective, but difficult to implement in embedded devices. Also there are deployment issues in installing the latest security patches on millions of devices.The solution to this problem also solves a scalability lions of devices can generate an incredible amount of data. This data should not be blindly passed upstream, but instead filtered and concentrated. At the concentration points, one can use standard security protocols and limit the deployment issues. For example,in the ENEL system, there are approximately 250,000 data concentrators for the 27,000,000meters.Of course, below the concentrator one still needs security, but the concentrator can servea firewall function and limit the outside attacks that can be mounted on the devices below it.3.3. InteroperabilityAll these devices will not come from a single source, yet they need to do more than just connect to each other, they need to understand and process what they are saying to each other. This requires standardization above the communication protocol layers. The L ON M ARK International Association provides this for systems using Echelon’s technology, but something is needed for IT systems talking to devices as well. To this end, Echelon and its competitors and customers are trying to develop an open standard with the OASIS organization basedupon SOAP/XML to convey the rich semantics of inter-device communication. Participation from interested parties is most welcome.4. ConclusionsThe distribution of intelligence to ordinary devices, coupled with a transparent, ubiquitous communications infrastructure can yield tangible benefits in energy savings, pollution control, quality of service and convenience. These benefits can result in returns on investment that are very competitive with the sorts of investment decisions companies make to generate superior returns for their shareholders. While issues remain, both technical and structural, first movers today are showing striking economic returns in their applications to network ordinary devices. These successes also fulfill society’s need to reduce conventional and carbon atmospheric pollution. In spite of the force of psychological inertia present in preserving the status quo, the spread of these successes will result in the inevitable deployment of an Internet of Things.5. References[1] Eirik Bjelland, Tom Kristoffersen,“The Intelligent Street Lighting Project for the City of Oslo”, Conference Proceedin g s of L ON W ORLD® 2005, unpublished, Paris, France, October 20, 2005. [2] Gil Soto Tolosa, “Outdoor Lighting Controls,” Conference Proceeding s of L ON W ORLD 2005, unpublished, Paris, France, October 20, 2005.6. About the AuthorRobert A. Dolin is the system architect for Echelon Corporation. He has been with Echelon since 1989. Heis the principle or co-inventor of fourteen of Echelon's patents, and was one of the designers of the LonWorks protocol, the network development system environment, the Neuron® C programming model, and LonWorks network management. In May 1995 he was named as Echelon's Chief Technology Officer. Before joining Echelon, he worked at ROLM Corporation for 11 years, where he was one of the principle developersof its fully distributed PBX telephone system. At ROLM he also held positions of first- and second-line management as well as worldwide responsibility for system architecture. He has a B.S. degree in Electrical Engineering and Computer Science from the University of California at Berkeley.Echelon, LonWorks, L ON M ARK, L ON W ORLD, Neuron, are trademarks of Echelon Corporation registered in the United States and other countries.。

物联网技术的应用及发展研究最新外文文献翻译

物联网技术的应用及发展研究最新外文文献翻译

文献出处:Marisa D. The application and development of the Internet of things technology [J]. Internet Computing, IEEE, 2015, 12(5): 44-55.原文The application and development of the Internet of things technologyMarisa DAbstractInternet of things is considered through monitoring, analysis and control of network information technology, the extension of human perception of control ability has huge potential. Iot research work has been carried out. A lot of Iot demonstration system was also developed, and has made remarkable application effect. But at the same time, the current development of the Internet of things is also facing some fundamental problems: the Internet of things has what special requirements must be met? What phase are you in the Internet of things technology? Where is the development direction of Internet of things? It is worthwhile to explore these issues. This paper reviews the development of the Internet, and according to the experience of the development of the Internet, analyzes the present situation of Internet of things and Internet of things present in the "content - machine connected to the local small-scale network stage, its development direction should be connected to open net of numerous small" net ", namely the "Internet of things". Based on this idea, called WInternet Iot design, and introduces the overall architecture, working mode and protocol system, and also discusses the several other issues worthy of further study. Keywords: Internet of things; Pipeline agreement; Cloud calculation; Technology application1 IntroductionIn recent years, the development of the Internet of things has been attached great importance to, academia, industry, the government to give great attention to the development of the Internet of things. Internet of things is considered can connect hundreds of millions of physical world objects, through monitoring, analysis and control of network information technology, the extension of human perception control ability has huge potential. Iot research work has been carried out. A lot of Iotdemonstration system was also developed, and has made remarkable application effect. But at the same time, the current development of the Internet of things is also facing some problems, especially all kinds of Internet of things generally are connected by "-" in the form of "network", although the implements of all kinds of physical objects in the local scope - machine is linked together, but different "net" resource sharing between the perception and control equipment. And because of the existing "- machine connected to the network is generally based on the special agreement, adapt to the need of the professional custom, cause a physical network is not open, hard to connectivity. To realize all kinds of network connectivity should be a Iot of development trend.2 Internet development history and experience2.1 Electronic equipment network systemsIn the 19th century to early 20th century, electronic equipment network of prototype has emerged. As the time of the telephone network, cable network, and other various types is private network system. Now in retrospect, these networks have been gradually replaced by the Internet; its reason is worth thinking about. Analysis of the network system can be found early, they generally have the following features: (1) Vertical integration, tightly coupledThe network system hardware, software and operation of the upper application mostly belong to an owner. Most of the various components of the integration in the network system is independently by the owner internal personnel, network in each part of the tightly coupled system.(2) The proprietary protocols to exchangeIn the network system of internal communication protocol is often according to the specific needs of each owner, in order to better the optimization and use of all kinds of equipment components are designed. Different owners of intellectual property rights and interests protection often will deal core part try to conceal, difficult to communication between different network systems. This method of "vertical integration, proprietary protocols" to satisfy the various network system of the optimization of resources and interests of the owner to protect specific needs, butalso directly led to the early electronic equipment network problems.(3) Resource sharing difficultBecause every electronic device network system is generally adopts the way of "vertical integration" structure, the network system in all kinds of electronic equipment and software are also often can only be used for the network users of the system. For example in the early days of the telephone network system, multiple phone companies have independent laid their phone lines, set up relevant telephone switching equipment, a relatively independent telephone network. Different lines and equipment cannot be Shared between the telephone network, caused the repeat purchase, resource sharing difficult.(4) Function to replicateAnother problem is that in the different network system to repeat the same or similar functions, such as the telephone network signaling in the instruction and the signal coding implementation. Features to replicate directly lead to two results: one is each owners are required for the design and implementation of general agreement and equipment, but due to the limitation of the technical strength of a single owner, will inevitably extend network independently design and development time; Second, under the limit of time and personnel, the realization of function module final quality more or less is not ideal. If different owners to cooperation, complementary advantages, functional modules will not only greatly shorten the development time, its quality will improve the quality and technology evolution speed will also increase.3 Internet of things present situation and the development direction3.1 The development of Internet of thingsIot technology emerges in various fields has also been a high degree of attention, many of the Internet of things application demonstration is put forward and the construction, especially in environmental monitoring, traffic control, disaster emergency, etc. The application of these systems has also made certain achievements. But at the same time, we can also see the current before the development of the Internet of things is with the Internet electronic networks have similar features, especially the "vertical integration" and "special deal". Currently, many of Iot systemare to solve the problem of specific requirements of a certain area or region, independent each other. Set up in the process of sensing equipment, software module, communication formats tend to be based on specific requirements for customization. Caused by agreement custom complex network connection between works, although perception control equipment resources abundant, but it is share difficulties, such as in the current a lot of video surveillance network, while the erection of all kinds of cameras everywhere, but its share is very difficult.3.2 Development direction of Internet of thingsFrom the development history of the Internet, we believe that the current development of the Internet of things was still in the "machine" of the "net" phase. This network connects many physical objects, can communicate with each other, data exchange, and implement all kinds of monitoring and control functions. Most of these networks for specific needs, using proprietary protocols, solve the problems of the current focus on each network owners. But at the same time, also can see, these of the “net” have a resource sharing and th e needs of each other."Machine" of the "network" become connected to many of the "net" "open net" should be the development trend of the Internet of things. This trend is also our experience on the development course from the Internet.3.3 The design requirements of Internet of thingsMentioned before the Internet of things, it is using electronic technology to the physical world of awareness and control network. This has also led to the Internet of things with the traditional numerical computing systems and the Internet data transmission network system has different characteristics and requirements.(1) Ensure real-time performanceThe numerical simulation of numerical calculation, Internet of things different from traditional problem itself may not be directly brought about changes in the physical world. But the errors of a control instruction in the Internet of things or delay a disaster may directly result in physical space. In smart grid, for example, if an error control instruction is to control equipment in the grid, small causes energy waste, is can cause paralysis of the grid. The error here includes both the wrong instruction,also including the correct instruction at the wrong time to control equipment. In other words, the real time in the Internet of things than the traditional Internet and numerical calculation system has a higher request. The design of the Internet of things should be as guarantee for real-time important consideration.(2) Privacy promiseThe emergence of the Internet of things technology makes the collection of information easier. Perception of physical space object will more or less involve in the privacy of all kinds of people. Iot will cover these private data is connected to the network, it is possible to make these data are all types of users to access remotely. How to safeguard the privacy of data is not abused and theft, this is the Internet of things another design factors must be considered.(3) Calculation to the nearsIn the Internet of things because of the continuous perception of the physical world, the amount of data and therefore is great. Under the traditional centralized data processing for the Internet of things of huge amounts of data may no longer apply. Illegal vehicle tracking, for example, found accident vehicles, such as somewhere we hope in a wider range of the car to track. One option is to all video monitoring data set to the data center. But the time delay of the data set itself will be longer, to the network bandwidth requirement is high. This scheme is difficult. To ensure real-time performance, but also to save resources, it is better near the camera video data analysis and calculation, the identification of license plate and movement track, avoid the time delay of data transmission and network bandwidth, so as to improve timeliness and network efficiency. Similarly, in the field of smart grid wide-area control, similar problems also exist, all the analyses focused on monitoring data to the data center, and then send the result to the remote, the optical signal transmission time needed for this process is likely to exceed system control limit is allowed. In this case, the calculation to the nearest has become a necessity.译文物联网技术的应用及发展研究Marisa D摘要物联网被认为是通过信息技术进行监测、分析和控制的网络,在延伸人类的感知控制能力方面潜力巨大。

物联网的关键技术的研究和应用大学毕业论文外文文献翻译及原文

物联网的关键技术的研究和应用大学毕业论文外文文献翻译及原文

毕业设计(论文)外文文献翻译文献、资料中文题目:物联网的关键技术的研究和应用文献、资料英文题目:文献、资料来源:文献、资料发表(出版)日期:院(部):专业:班级:姓名:学号:指导教师:翻译日期: 2017.02.14毕业设计(论文)译文及原稿译文题目:物联网的关键技术的研究和应用Research on Key Technology and Applications for Internet of 原稿题目:ThingsXian-Yi Chen1, 2, Zhi-Gang Jin3.[J].SciV erse Sciencedirect,原稿出处:2012,Physics Procedia 33:561-566.物联网的关键技术的研究和应用摘要物联网(IOT)已经在在世界各地的各个行业和政府以及被学术界被越来越多的关注。

本文就物联网的概念和物联网的体系结构进行了讨论。

并且对物联网的关键技术,包括射频识别技术、电子产品代码技术、无线个域网技术进行了分析。

数字农业的框架下也提出了基于物联网的应用。

1.1物联网物联网的概念是在1999年在MIT(麻省理工学院)的Auto-ID实验室首次提出它是指所有的物品为了实现智能识别和网络管理通过类似于RIFD(射频识别RFID)等的传感器设备连接到互联网。

其核心支持技术是无线传感器网络和射频识别技术。

物联网的概念是在2005年在国际电信联盟报告中提出的:物联网,由国际电信联盟(ITU)在突尼斯2005年11月17日的信息社会世界峰会(WSIS)中向全世界正式发布。

据报道,一切在任何地方和任何时间通过无线射频识别技术、无线传感器网络技术、智能嵌入式技术和纳米技术可以连接到对方。

由于没有统一的物联网的定义,它可以从以下技术角度来定义。

物联网是万物的网络,可以实现互连,随时有完整的意识,传输可靠,准确控制,智能处理和其他特征的支持技术,如微型电极、射频识别、无线传感器网络技术、智能嵌入技术,互联网技术,集成智能处理技术,纳米技术。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

物联网安全问题的研究外文文献翻译毕业设计(论文)外文文献翻译院系:年级专业:姓名:学号:附件:指导老师评语:指导教师签名:年月日备注:1.从所引用的与毕业设计(论文)内容相近的外文文献中选择一篇或一部分进行翻译(不少于3000实词);2.外文文献翻译的装订分两部分,第一部分为外文文献;第二部分为该外文文献的中文翻译;3.外文文献正文按毕业设计(论文)格式排版,两部分内容不能联排,用分页符分页。

The Internet of thingsThe Internet of things the Internet of things the Internet of things more and more modules and sensors embedded system to enhance theirability of communication. The resulting information networks will create new business models, improve business processes, risk and reduce costs Michael cui, marcus method, and Roger RobertsIn most organizations, the information spread along the familiar path. Proprietary information is placed in the database and make a analysis in the report and then start the management chain. Information collected from public sources, Internet information collection and information from suppliers to buy.But the forecast information is changing the way: the physical world itself is becoming a kind of information system. In so-called iot, sensors, and micro devices (actuators) is embedded in the physical module from highway to heart pacemakers is through wired or wireless network connections, is often connected to the Internet using the same Internet protocol. The network transmission of data is used for computer analysis. If some modules can sense the environment and can be used for information exchange, so they can become and rapid response to solve the problem of complicated tools. The information revolution in the field of the physical information system is developing continuously, and even some will also be able to work under a single intervention.Pill shape photomicrographic device has successfully through the human digestive tract, and back to the thousands of images to pinpoint the source of the disease. Composed of satellite and ground sensor data acquisition system through the wireless device can detect crop status and connected to the precision agriculture can adjust method for everypart of the farming land. For example, by spreading more chemical fertilizers to increase poor soil fertile. Billboards in Japan, waiting for pedestrians pass by, and can assess the consumption of passers-by, and then according to the evaluation results show that the different advertising information.Yes, in many companies, or even earlier today has been warned many predict the future. With the emergence of new value creation method, the current business model is largely based on static information structure is faced with challenges. If in a specific location to a specific time you will be able to experience the mind of the buyer, then the dynamic pricing may increase the possibility of buying. Know how often, and a deep understanding of the usage of the product might get more harvest, choose addfee instead of direct selling. There are a lot of people responsible for the control of manufacturing process to get a more accurate, and can improve the production efficiency. There are such as the operating system are constantly monitored to prevent the emergence of dangerous or people can take corrective measures to avoid the occurrence of damage, risk, and to reduce the cost. Make the fullest use of these functions of the company will gain more profit than the competitor.The wide application of Internet of things is need time, but thanks to its development technology, got advance time line. Wireless technology and the further standardization of communication protocol makes it possible to collect information from the sensor at any time.Based on this, a small silicon chip is endowed with new functions, and at the same time, based on the pattern of Moore's law, its cost is falling. These largely increase the storage capacity of computer and computing power, some of the digital operation scope has expanded through the cloud computing, and reduces the cost.The Internet of things in the workIot for those technologies and not walk in the forefront of company is the news. But as these technologies mature, the enterprise deployment scope will increase. Now is the manager ofall industries to build ideas, consider the contact from theInternet of things or get potential of the development of The Times. We now know that there are six different types of emerging applications, most of which belong to the following two categories: the first, second, information and analysis, automation and control.Information and analysisDue to network increased with the product, the company's assets or data management environment of the link, they will produce better information and analysis, it is important to improve decision making. Some organizations have begun to use these application deployment in the target region, and more advanced and thirst for application is still in concept or test phase. 1, tracking, behaviorSensors embedded in the product, the enterprise can track the movements of these products, even interaction and monitoring them. Business models can be slightly adjusted to take advantage of thisscience. For example, some insurance companies to provide the carposition sensor installation. That how the insurance company may, according to the car was driven to determine the amount and where is the travel situation. Insurance can be customized to operating the vehicle's actual risk, not based on if the driver's age, gender,or places to live in such a situation.Or consider install the sensor and the network connection to thetaxi will happen: it can be used for a short period of time for the car rental service member, so you no longer need to rental service center, and each car's use can also be optimized for higher revenues. Zipcar company pioneered the use of this model, and a growing number of car rental companies are also beginning to follow suit. In retail, used to display shopping data of sensors can provide more detailed informationor provide discount information, make shopping easier. Leaders such as tesco supermarket in the forefront of the use of this technology.The English name for The Internet of Things The Internet of Things, hereinafter referred to as: The IOT. The Internet of things through the transmission device, radio frequency identification technology, such as global positioning system (GPS) technology, no need to monitor real-time acquisition, connected, interactive object or process, collect the sound, light, heat, electricity, mechanics, chemistry, biology, location and other needed information, through all kinds of possible Internet access, content and the content, the objects and people in the link, to realizeintelligent perception of objects and processes, identification and management. Internet of things is through theintellisense recognition technology and pervasive computing, ubiquitous network integration application, known as the computer andthe Internet after the third wave of world information industry development. Rather than the Internet of things is a network, theInternet of things is the business and application of Internet of things is seen as the Internet application development. The innovation is the core of the development of the Internet of things application, the user experience as the core of innovation is the soul of the development of the Internet of things. 2.0The meaning of "thing" here "objects" to satisfy the following conditions can be incorporated into the scope of the "Internet of things" : 1. The receiver should have corresponding information; 2. Must have the data transmission channel; 3. To have a storage function; 4. Have the CPU; 5. Must have the operating system; 6. There should be special applications; 7. Must have the data sender; 8. To follow the communication protocol of the Internet of things; 9. In the network have the only number can be identified. 3. Definition of "Chinese" Internetof Things (Internet of Things) refers to the Ubiquitous (Ubiquitous) at the end of the equipment (Devices) and facility (Facilities), including "inherent intelligence" of sensors, mobile terminals, industrial system, building control systems, home intelligent Facilities and video monitoring system, etc, and "external Enabled" (Enabled), such as thevarious Assets (Assets), RFID wireless terminal to carry personal and vehicle and so on "intelligent objects or animals" or "smart dust" (Mote), through a variety of wireless and/or cable over long distances and/or short distance communication network connectivity (M2M), application Integration (Grand Integration), and cloud-based SaaS operation mode, in the internal network (Intranet), private network (Extranet), and/or the Internet (Internet) environment, adoptappropriate information security guarantee mechanism, to provide safeand controllable and personalized real-time online monitoring,positioning traces, alarm linkage, dispatch control, program management, remote control, security, remote maintenance, online upgrade, statistics, decision support, leading desktop (Cockpit display Dashboard), etc. Management and service functions,implementation of "all Things" "high efficiency, energy saving, safety, environmental protection" "tube, control, camp" Integration of the. 4. The definition of the eu in September 2009, held in Beijing the china-eu seminar on Internet of things and the enterprise environment, and social media department of RFID, head of the European commission information Lorent Ferderix DrGives the definition of the Internet of things: the Internet ofthings is a dynamic global network infrastructure, it has a standard and interoperable communications protocol based self-organizing ability, including physical and virtual "things" have identification, physical properties, the characteristics of virtual and intelligent interface,and seamless integration and information network. Iot will work with the media, Internet service of the Internet and the Internet, constitute the future Internet.Changes in theIot (Internet of Things), the word widely recognized at home and abroad is a professor at MIT Auto - Ashton ID center in RFID research in 1999 at the earliest. In 2005, the international telecommunication union (ITU) release of the same report, the definition and scope of the Internet of things have changed, coverage has a larger development, is no longer just a iot based on RFID technology.Since August 2009, when prime minister wen jiabao put forward since the "experience China" Internet of things was officially listed as one of five major emerging strategic industries, write "government work report," the Internet of things in China is heavily influenced by the whole society's attention, is the degreeof concern in the United States, European Union, and the rest of the world incomparable.The concept of Internet of things is not so much a foreign concept, as it is already a "made in China" concept, and his coverage of advancing with The Times, professor Ashton has exceeded 1999 and 2005, the scope of the ITU report referred to in the Internet of things has been labeled "Chinese".物联网物联网物联网物联网越来越多的模块与传感器构成嵌入式系统从而增强其通讯能力。

相关文档
最新文档