The best interface for a system is no User Interface- The screens that are used in this present day are totally depended on unnatural constitution. They are diminishing in nature and are also inhumane (Bertino, 2016). More amount of knowledge is needed to use the user interface. More amount of money and as well as time is also required to use the user interface. Two examples of where user interface is not useful are:
Parking sign that are used in Los Angles in which the data is overloaded.
Mystery Meat Navigation is the site that does not show the destination of the link until when the user takes the cursor on it or clicks the link.
Security from IoT devices- The security that are provided from the Internet of Things devices are-
Confidentiality- The confidentiality of the data is kept secret by the IoT devices. The data that is present in the server of the devices are needed to be kept secret.
Freshness- The devices keep the working of the devices fresh so that the new user can get a chance to use the device in a new way.
Integrity- The integrity of the data should be maintained. It is to be seen that the data remains as original when it is send to receiver from sender (Velandia et al., 2016). The content of the data should not change.
Authenticity- The authentication of the data should be secured. It must be seen that original user uses the device and that is not used by some hackers or intruders.
Availability- The device is available for the entire authenticated user who uses the devices. It must be seen that the entire user uses the device smoothly an in a secure way.
Privacy from IoT devices- Mainly of two types of privacy is achieved from the privacy of IoT devices- Data Oriented Privacy and Context-Oriented Privacy.
Data Oriented Privacy- Data of a asystem is controlled by the data oriented privacy. This has two categories in particular. External type- in this external type attack, unauthorized person not authorized with network knows about the data communication that is connected between the sensor nodes (Hecht, 2015). Internal type- in internal type attack node of the network first of all captured and then the network is reprogrammed by an attacker who gets access on the network to receive all data of the network. Internal attack is much more dangerous than external type attack.
Context-Oriented Privacy- Context oriented privacy protects the information that are contextual in a network. The time and location that are transferred over the server signals falls under the contextual information. Contextual data mainly depends on transmission control devices.
Triggering time of the application: 1s
The propagation of round trip delay between application and sensor: 12ms
Time to process each request: 3ms
Time taken to send or receive any data: 2ms
The total time that the application takes is: 1ms + 12ms + 3ms + 2ms = 18ms
he budget of time that is saved is 18ms. Since the budget time which is saved is 18ms, the present model is less efficient than the application model that is proposed.
Neilsen law states that the bandwidth that is available with the connections of high end broadband will increase by half of its available bandwidth each year, which leads to compound growth of 57x in capacity in ten years (Miguelez, Esser & Slowik, 2015). Neilsen proposed that the connection of high end broadband will get higher by 50% every year whereas Moore stated that in 18 months it will double itself. The law stated that Jakob Neilsen stated is 10% less than the law that is stated by Moore’s Law.
Bertino, E. (2016, December). Data privacy for IoT systems: concepts, approaches, and research directions. In Big Data (Big Data), 2016 IEEE International Conference on (pp. 3645-3647). IEEE.
Hecht, J. (2015). Understanding fiber optics. Jeff Hecht.
Miguelez, P., Esser, S. M., & Slowik, F. (2015). U.S. Patent No. 8,958,694. Washington, DC: U.S. Patent and Trademark Office.
Velandia, D. M. S., Kaur, N., Whittow, W. G., Conway, P. P., & West, A. A. (2016). Towards industrial internet of things: Crankshaft monitoring, traceability and tracking using RFID. Robotics and Computer-Integrated Manufacturing, 41, 66-77.