Читать книгу Building an Effective Security Program for Distributed Energy Resources and Systems - Mariana Hentea - Страница 72

2.1.2 Internet of Everything (IoE)

Оглавление

The Internet of Everything is a technology concept that sees previously unconnected objects and processes converging with the ones that are digital first by their nature. This all‐encompassing convergence of physical and digital domains is set to disrupt individual organizations and entire industries like nothing before [ABI Research 2015b]. ABI Research defines the IoE market as a combination of the IoT, Internet of Digital, and Internet of Humans. Value at stake drives in the connection of everything.

Figure 2.3 represents an infographic of IoE components and subcomponents as perceived by the markets a few years ago. According to [ABI Research 2015b], the market is expected to grow more than 40 billion devices on the IoE by 2020.


Figure 2.3 Infographic of Internet of Everything.

Source: [ABI Research 2015a]. Printed based on courtesy of ABI Research Internet of Everything Market.

According to ABI Research market tracker of 2019 for IoE, the forecast for 2023 is that IoT will represent 54% of IoE, a higher percentage than Internet of Digital evaluated at 43%.

Figure 2.4 shows a chart representing the ABI Research market forecast of IoE for 2023 year, where:

 Internet of Digital includes PCs and digital home and mobile devices.

 Internet of Humans includes wearable computing.

 IoT includes utilities and industrial IoT, smart cities and buildings, retail advertising and supply chain, connected car, and smart home.


Figure 2.4 ABI Research Market Forecast for Internet of Everything.

Source: Based on courtesy of ABI Research Internet of Everything Market Tracker, 2019.

Figure 2.5 shows the overall concept of IoE, a networked connection of people, processes, data, and things. Examples of things include devices, cars, generators, and washing machines. In the context of IoE, cybersecurity is moving away from the traditional centralized view to a decentralized approach whereby security happens as close as possible to the endpoint. Specifically, in IoE, identity must extend beyond conventional identity. However, creating a unified identity that addresses users in both physical world and virtual world is still a challenge.


Figure 2.5 Internet of Everything connected in a large distributed network.

On one hand, the IoE is being enabled by advancements with standardized, ultra‐low‐power wireless technologies (see Figure 2.6). The likes of Bluetooth and ZigBee have proven instrumental in driving sensor and node implementations, while Wi‐Fi technology and cellular connectivity serve as a backbone for transferring the collected data to the cloud.


Figure 2.6 A perspective of the Wi‐Fi Internet of Everything – core attributes.

Consumers in particular expect to integrate all connected devices on a single home network – specifically on Wi‐Fi networks. They may embrace a range of connected applications such as home security, smart energy, and in‐vehicle infotainment. Wi‐Fi enables human interaction with the IoE [Wi‐Fi 2014].

An enormous range of device manufacturers, service providers, and software makers stand to build entirely new businesses addressing the IoE opportunity. However, this opportunity brings more security and privacy concerns for the consumers and businesses that support various applications.

Networked embedded systems have emerged under various names such as Internet/Web of Things/Objects, Internet of Everything, smart objects, Cooperating Objects, Industry 4.0, the Industrial Internet, cyber–physical systems, M2M, the Internet of Everything, the Smarter Planet, TSensors (Trillion Sensors), or the Fog (like the cloud, but closer to the ground). The vision is of a technology that deeply connects our physical world with our information world, although one may argue on the differences and their focus. In this research paper [Karnouskos 2011], the author argues that does not really differentiate when it refers to them as an amalgamation of computational and physical properties.

However, the trend is toward integration and interaction of the physical world with the information world. Recently, the community has come to understand that the principal challenges in embedded systems stem from their interaction with physical processes, and not from their limited resources. Since CPS emerge as a distinct category, the following section is an overview of this concept.

Building an Effective Security Program for Distributed Energy Resources and Systems

Подняться наверх