IEEE - IEEE Communications Society
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
SEPTEMBER 2018, VOL. 1, NO. 1 IEEE • Why Industry needs to AccelerAte Iot stAndArds • drIllIng deep Into dIgItAl IndustrIAl trAnsformAtIon WIll determIne Who survIves And thrIves • connectIng the dots on Iot for the IndustrIAl World Internet of Things Magazine • the future of Iot A Publication of the IEEE Internet of Things Initiative, a Multi-Society Technical Group iot.ieee.org
IoT and the Digital Revolution 2019 IEEE 5TH WORLD FORUM ON THE INTERNET OF THINGS 15-18 April 2019 // Limerick, Ireland Join us for the 2019 IEEE 5th World Forum on Internet of Things (WF-IoT 2019) in beautiful Limerick, Ireland. The theme of the 4-day conference is “IoT and the Digital Revolution” in recognition of strides and leadership that Ireland has shown in the deployment of “smart” technologies, operating principles, and policies. The program will feature the most outstanding participants from the research community, public sector, and industry as well as a vast array of papers and presentations on the latest technological innovations in the many fields and disciplines that drive the utility and vitality of IoT solutions and applications. TOPICAL TRACKS VERTICAL TRACKS • Artificial Intelligence • Agriculture • Communications, Connectivity and • Automotive and Transportation 5G Technologies • Healthcare, Pharmaceuticals, and • Cybersecurity, Data Security, and Privacy Medical Devices • Data and The Internet of Things • Industrial Internet of Things • Green Technologies – Environment, • Maritime Internet of Things Sustainability and the Circular Economy • Smart Cities • Sensors and Sensor Systems The program will also include: • Doctoral Symposium IMPORTANT DEADLINES: • Entrepreneurial and Innovation Workshop Technical Paper Submission: • Industry Panels November 1, 2018 • Tutorials Early Bird Discount Registration: • Special Sessions January 5, 2019 • Women in Engineering Program Visit wfiot2018.iot.ieee.org for • Workshops more information or to register. • Young Professional Program IENYIOT0002.indd 1 24/08/18 11:56 PM
IEEE Internet of Things Magazine SEPTEMBER 2018, VOL. 1, NO. 1 2 Editorial and Introduction to the Issue: Risk and Rewards of the Internet of Things 4 Policy and Regulatory Issues Perspectives on IoT Policy from the U.S. NTIA. 6 IoT Standards On a global basis, one of the challenges is to bring a necessary level of conformance that realistically manages the risks of cyber-threats without impeding the functioning of the Internet of Things. This requires reasonable standards. 8 Privacy and Security When it comes to privacy and security risks, what is implicit across the myriad conceptualizations of IoT lies the key to unearthing why IoT risk heralds a difference with a distinction compared to traditional offline and online contexts. 12 Around the World of IoT We live in a technology-oriented world where the business bottom-line numbers matter more than ever before. The IoT world is in a transition period, where a technology has to convince the world that it can deliver on its promises. FEATURED VERTICALS 14 Why Industry Needs to Accelerate IoT Standards Maciej Kranz 20 Drilling Deep into Digital Industrial Transformation Will Determine Who Survives and Thrives William Ruh 24 Connecting the Dots on IoT for the Industrial World Karine Lavoie-Tremblay 28 The Future of IoT Joern Ploennigs 34 Afterword and Introduction for Issue No. 2 EDITOR-IN-CHIEF COLUMN EDITORS Scanning the Literature Keith Gremban, National Telecommunications and Around the World of IoT To Be Determined Information Administration (NTIA) (USA) Raffaele Giaffreda, FBK CREATE-NET (Italy) Bridging the Physical, the Digital, and the Social PUBLICATIONS STAFF EDITORIAL BOARD Jun Zhang, University of Denver (USA) Joseph Milizzo, Assistant Publisher Nuno Carvalho, Universidade de Aveiro (Portugal) IoT Standards Jennifer Porcello, Production Specialist Shawn Chandler, Pacificorp (USA) Mike Violette, Washington Laboratories (USA) Catherine Kemelmacher, Associate Editor Robert Douglass, Alta Montes (USA) Policy and Regulatory Issues Susan Lange, Digital Production Manager Joern Ploennigs, IBM Research (Ireland) Doug Sicker, Carnegie Mellon University (USA) Arjmand Samuel, Microsoft (USA) Privacy and Security Sachin Seth, Tesla (USA) Erin Kenneally, Department of Homeland Security (USA) Massimo Vecchio, FBK CREATE-NET (Italy) and International Computer Science Institute (USA) IEEE Internet of Things Magazine • September 2018 1
MESSAGE FROM THE EDITOR-IN-CHIEF Editorial and Introduction to the Issue: Risk and Rewards of the Internet of Things W elcome to the inaugural issue of IEEE Internet of Things Magazine (IoTM)! IoTM is sponsored by the IEEE Internet of Things (IoT) Initiative, a multi-disci- plinary initiative with 19 member societies/councils. The mis- sion of the IEEE IoT Initiative is to “serve as the gathering place for the global technical community working on the Internet of of the car and cargo, and inspect the state of the rails and roadbed. • In the agricultural domain, many growers have installed distributed networks of sensors that provide real-time data and historical trends for multiple parameters such as soil moisture, local temperature, humidity, and others. Growers Things; to provide the platform where professionals learn, share use the data to optimize watering, fertilizer application, and knowledge, and collaborate on this sweeping convergence more. Some agribusinesses now employ networked autono- of technologies, markets, applications, and the Internet, and mous systems to observe crop status and apply treatments. together change the world.” • In the industrial domain, miniaturized sensors integrated The IoT is one of the most important, exciting, and trans- into critical equipment monitor performance parameters formational technology developments today. IoT is global in to proactively diagnose maintenance issues, enable trend impact, multi-disciplinary in nature, and spans virtually all indus- analysis of equipment performance, and optimize overall try segments. The IoT is a topic that is growing in interest, yet system operations. The cost of sensors and sensor inte- no concise definition of IoT is universally accepted within the gration is more than offset by the savings in maintenance community of practitioners. A document produced by the IEEE costs and increase in equipment up-time. IoT Initiative states that “Despite the diversity of research on The growth in IoT has been nothing less than astounding, and IoT, its definition remains fuzzy.” The document attempts to is forecast to continue. For example, Cisco projects over 10 bil- address this issue, but concludes with three pages that define lion machine-to-machine IoT devices will be connected in 2019.2 IoT with a list of characteristics of IoT systems.1 Very generally, Intel predicts 200 billion connected devices in 2020.3 McKinsey the IoT refers to collections of things, such as devices, vehicles, Global Institute estimates the economic impact of IoT to be as sensors, and actuators, for example, that interconnect and com- much as $11.1 trillion per year by 2025.4 Many corporations municate over a network to perform some application. IoT inte- now have IoT divisions led by corporate vice-presidents. grates the physical and the digital, providing unique solutions IoTM was proposed to meet the needs of industry, govern- that exploit sensing, aggregation of data from multiple sources, ment, and academic practitioners, who are working to design common infrastructure such as communications, computing and deploy IoT applications every day. Through a mix of articles and storage, to remotely monitor and control physical systems. and regular columns, IoTM will present IoT solutions, report IoT applications range from chemical plant control to personal on IoT experiences throughout the community, analyze IoT health monitoring, from automobile engines to transportation deployments from a business perspective, and point readers systems, from electrical generators to smart grids, and more. to relevant literature, events, and activities. The objective is Some example IoT applications, which are representative for IoTM to be a forum for practitioners to share experiences, topics for IoTM articles, include: develop best practices, and establish guiding principles for tech- • In the transportation domain, a railroad company uses IoT nical, operational, and business success. technology to instrument thousands of miles of track, as The articles in our inaugural issue present examples of suc- well as every locomotive and railcar. Customized sensor cessful IoT deployments, as well as recommendations for indus- packages placed at various locations along the track mea- try growth, and some perspectives on the future of IoT. sure various externally observable properties of every car IoT is growing rapidly, and more and more organizations are as the train passes by. Communication between sensor appreciating the financial benefits of investing in IoT. However, stations enables observations of trends in the data so that rapid growth is bringing challenges to the IoT community. The proactive maintenance can be scheduled in advance and article “Why Industry Needs to Accelerate IoT Standards” dis- performed when the train reaches a location with a main- cusses two key issues, security and standards, in the context of tenance yard. Similarly, customized sensors on board each representative IoT deployments and makes some recommenda- car monitor various parameters that indicate the stability tions for the IoT community to follow. IEEE INTERNET OF THINGS MAGAZINE (ISSN 2576-3180) is published quarterly by The Institute of Electrical and Electronics Engineers, Inc. Headquarters address: IEEE, 3 Park Avenue, 17th Floor, New York, NY 10016-5997, USA; tel: +1 (212) 705-8900. Responsibility for the contents rests upon authors of signed articles and not the IEEE or its members. Unless otherwise specified, the IEEE neither endorses nor sanctions any positions or actions espoused in IEEE Internet of Things Magazine. ANNUAL SUBSCRIPTION: US$53 print subscription; US$38 electronic subscription; US$624 non-member print subscription. EDITORIAL CORRESPONDENCE: Editor-in-Chief, Keith Gremban, e-mail: kdgremban@gmail.com. COPYRIGHT AND REPRINT PERMISSIONS: Abstracting is permitted with credit to the source. Libraries are permitted to photocopy beyond the limits of U.S. Copyright law for private use of patrons: those post-1977 articles that carry a code on the bottom of the first page provided the per copy fee indicated in the code is paid through the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923. For other copying, reprint, or republication permission, write to Director, Publishing Services, at IEEE Headquarters. All rights reserved. Copyright © 2018 by The Institute of Electrical and Electronics Engineers, Inc. POSTMASTER: Send address changes to IEEE Internet of Things Magazine, IEEE, 445 Hoes Lane, Piscataway, NJ 08855-1331. Printed in USA. Periodicals postage paid at New York, NY and at additional mailing offices. Canadian Post International Publications Mail (Canadian Distribution) Sales Agreement No. 40030962. Return undeliverable Canadian addresses to: Frontier, PO Box 1051, 1031 Helena Street, Fort Eire, ON L2A 6C7. SUBSCRIPTIONS: Orders, address changes — IEEE Service Center, 445 Hoes Lane, Piscataway, NJ 08855-1331, USA; tel: +1 (732) 981-0060; e-mail: address.change@ieee.org. ADVERTISING: Advertising is accepted at the discretion of the publisher. Address correspondence to: Advertising Manager, IEEE Internet of Things Magazine, IEEE, 3 Park Avenue, 17th Floor, New York, NY 10016-5997. SUBMISSIONS: The magazine welcomes high-quality articles on IoT technology and end-to-end IoT solutions. Submissions will normally be approximately 4500 words, accompa- nied by up to six figures and/or tables, with up to fifteen carefully selected references. Electronic submissions are preferred and should be submitted through Manuscript Central: https://mc.manuscriptcentral.com/iotmag. All submissions will be peer reviewed. 2 IEEE Internet of Things Magazine • September 2018
MESSAGE FROM THE EDITOR-IN-CHIEF Keith Gremban (kdgremban@gmail.com) is the Direc- The pace of technological change is driving the rise and fall tor of the Institute for Telecommunication Sciences of companies and even entire industries. IoT is proving to be (ITS), which is the research and engineering laborato- one of those transformational technologies that may determine ry for the National Telecommunications and Informa- the winners and losers in many sectors. The article “Drilling tion Admin-istration (NTIA). Keith has been involved in systems engineering and advanced technology Deep into Digital Industrial Transformation Will Determine Who devel-opment for over thirty years. Prior to arriving Survives and Thrives” uses case studies to present the argument at ITS, he was a Program Manager at the Defense that one type of transformation in particular is required for any Advanced Research Projects Agency (DARPA) where organization that wants to thrive in the 21st century. he managed a portfolio of programs in the areas of wireless communications and electronic warfare. IoT provides a mechanism for organizations to do more with Prior to DARPA, He worked at a variety of compa- less, while providing agility and responsiveness to customer nies and research institutes, managing and leading needs. The article “Connecting the Dots on IoT for the Industri- research and systems engineering pro-jects, includ- al World” presents some examples of the application of dense ing a diverse collection of unmanned systems and command-and-control applications. He received his Ph.D. and M.S. in Computer sensing and near-real-time data analytics to aircraft system main- Science from Carnegie Mellon University, and his M.S. in Applied Mathematics tenance and operations. and B.S. in Mathematics from Michigan State University. Our closing article “The Future of IoT” presents a panel dis- cussion among three experts in IoT regarding the risks and FOOTNOTES rewards of IoT. Additionally, the panel discusses the real and 1 IEEE_IoT_Towards Definition_Internet_of_Things_Revision1_27May15.pdf, potential impact to IoT of some of today’s most anticipated https://iot.ieee.org/images/files/pdf/IEEE_IoT_Towards_Definition_Internet_ of_Things_Revision1_27MAY15.pdf technologies. 2 http://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-net- In closing, the Editorial Board would like to thank the authors working-index-vni/VNI_Hyperconnectivity_WP.html that contributed to this inaugural issue. We hope that the com- 3 http://www.intel.com/content/www/us/en/internet-of-things/infographics/ munity of IoT practitioners will find the articles and columns to guide-to-iot.html 4 https://www.mckinsey.com/business-functions/digital-mckinsey/our-insights/the- be interesting and useful, and provide support for Internet of internet-of-things-the-value-of-digitizing-the-physical-world Things Magazine in the form of articles, columns, references, and, of course, subscriptions. Enjoy the Many Benefits of IEEE EPS Membership JOIN TODAY! EPS.IEEE.ORG • Informative, Educational Conferences • Career Development Tools • Access to the latest technical information • Networking opportunities • Prestigious Awards and Recognition IENYIOT0006.indd 1 02/10/18 2:08 AM IEEE Internet of Things Magazine • September 2018 3
POLICY AND REGULATORY ISSUES Policymakers face a conundrum — promoting the adoption of IoT services to reap its many benefits, while safeguarding societal concerns. This will be a balancing act of oversight and regulation from policymakers to drive investment and consumer adoption while ensuring that safety, security, and privacy frameworks are in place. This column will explore critical national and international IoT policy and regulatory efforts as well as take a deeper dive into specific topics of interest. Introduction Commerce and Administrator of the National Telecommunica- tions and Information Administration (NTIA), David Redl, as our Policymakers face a conundrum: promoting the first contributor to this Regulatory and Policy Column, discuss- adoption of IoT services to reap its many ben- ing key findings of NTIA’s recent green paper on IoT. In future efits, while safeguarding societal concerns. This issues, we will explore critical IoT policy and regulatory issues will be a balancing act of oversight and regula- being considered in other parts of the world as well as take a tion from policymakers to drive investment and deeper dive into specific topics of interest. It is difficult to over- consumer adoption while ensuring that safety, state the impact that IoT will have on our society; therefore, Douglas C. Sicker security, and privacy frameworks are in place. getting the policy and regulatory issues right is critical because Meanwhile, industry must step up to lead and the policies will guide the ultimate success and direction of this adopt best practices and standards, which will allow policymak- important digital evolution. The breadth and depth of policy ers to forbear as appropriate. and regulatory issues facing IoT are surprisingly vast, ranging In this inaugural issue of IEEE Internet of Things Magazine from safety, privacy, security and spectrum policies to issues of (IoTM), we are fortunate to have the Assistant Secretary of infrastructure coordination, rights of way and acceptable use. Perspectives on IoT Policy stakes in the benefits and the risks. In other words, IoT brings new challenges to ongoing and longstanding policy debates. For example, IoT raises particular cybersecurity challenges, but from the U.S. NTIA it would be counter-productive to consider them outside of the context of broader cybersecurity conversations or to reinvent by David J. Redl the wheel where progress has been made elsewhere. Assistant Secretary for Communications and Information and This insight is reflected in the policy paper titled Fostering the Advancement of the Internet of Things (https://www.ntia.doc. Administrator, National Telecommunications and Information gov/files/ntia/publications/iot_green_paper_01122017.pdf) Administration, U.S. Department of Commerce that was released by the Department of Commerce’s Internet Policy Task Force. Informed by public comments from industry, The Internet of Things (IoT) is not the future — it is the present. academia, civil society, individuals and a public workshop, the From smart home devices that open blinds, brew coffee, and paper concludes that the United States’ policy approach that turn on the news in the morning to industrial applications rev- helped lead to the global success of the Internet continues olutionizing supply chain management, connected devices are to be the best way to respond to innovative technologies. It changing how we live, work, and play. also lays out the following four areas that could help guide the At the National Telecommunications and Information Department’s efforts to encourage IoT growth and innovation Administration (NTIA), we understand the potential benefits of in a manner that is inclusive and widely accessible, and is within IoT and are dedicated to ensuring that we have the policies and a stable, secure and trustworthy environment: infrastructure in place to support the innovation behind these Enabling Infrastructure Availability and Access: IoT only advances. In depth technical understanding is vital to well-run works so long as there is connectivity, and that connectivity policy making processes, and it is equally important for the is dependent upon telecommunications infrastructure, both technical community to grapple with the wider impacts of its wireline and wireless. NTIA plays important roles, as our Office work. IEEE IoT Magazine is therefore a welcome addition to the of Telecommunications and Information Applications works to conversation, and I appreciate the opportunity to contribute to ensure that unserved communities gain access to the broad- the inaugural edition. band connectivity necessary for IoT applications, and our Office NTIA is the Executive Branch agency located within the U.S. of Spectrum Management both manages Federal spectrum Department of Commerce that is principally responsible for resources and works with the Federal Communications Com- advising the President on telecommunications and information mission to identify additional spectrum for commercial use. policy issues. NTIA’s programs and policymaking focus large- Our contribution to wireless connectivity also includes the work ly on expanding broadband Internet access and deployment of the Institute for Telecommunication Sciences (ITS), NTIA’s in America, increasing the use of spectrum by all users, and research lab, which is exploring what the real spectrum needs ensuring that the Internet remains an engine for continued are going to be with the onset of IoT. These efforts put us at the innovation and economic growth. This broad mandate includes forefront of working to help enable access to robust and inno- emerging technologies, such as those powering IoT. Within the vative IoT solutions for everyone. Administration’s interagency processes, NTIA is a primary voice Crafting Balanced Policy and Building Coalitions: The at the table focused on innovation and economic growth. advancement and adoption of IoT will also be affected by the Neither the fundamental technologies nor the policy chal- policies that are in place to help encourage trust while safe- lenges of IoT are novel. IoT differs in the sheer number of devic- guarding innovation. This will require close collaboration across es that will be connected to the Internet and to each other, the government with industry and civil society to take on issues, the variety of industries that are newly integrating connectivity such as privacy, cybersecurity, and intellectual property, among into their products and business processes, and the increased others, that will shape the IoT ecosystem. The United States has a successful track record in achieving this balance, but it Editor’s Note: Text appearing in bold indicates a live link in the online version. will take dedication and cooperation across sectors to ensure 4 IEEE Internet of Things Magazine • September 2018
POLICY AND REGULATORY ISSUES that this continues for IoT and other emerging technologies. for Economic Co-operation and Development, and the Inter- NTIA’s Office of Policy Analysis and Development and Office net Governance Forum. We engage as well on the bilateral of International Affairs are key players in helping to shape these and regional level, representing U.S. positions and promoting policies. dialogue. We actively support NIST’s Global Cities Challenge Promoting Standards and Technology Advancement: The work, which has this year added consideration of cybersecurity Department of Commerce, through ITS and the National Insti- issues that smart cities face. tute of Science and Technology (NIST), is committed to ensur- While I highlight cybersecurity, this is only one aspect of IoT ing that the necessary technical standards are developed and in which NTIA is engaged. All of our diverse efforts are predi- in place to support global IoT interoperability, and that the cated on stakeholder engagement and reliance on the expertise technical applications and devices to support IoT continue to of practitioners. So we want to hear from you about the chal- advance. We remain steadfast in our support of industry-driv- lenges that you face and your thoughts on potential solutions. It en, consensus-based, voluntary, global standards. NTIA helps is only through your active participation and sharing of knowl- support these efforts in a number of international organizations. edge that we will be able to craft the informed policy solutions Encouraging Markets: Finally, the Department of Com- that a vibrant IoT ecosystem requires. NTIA is excited to work merce is working to promote IoT through the use of its own IoT with you to ensure that IoT continues to fulfill its extraordinary devices, iterative enhancement, and novel deployment of the potential. technologies. We will also be working with our global partners to help translate the economic benefits and opportunities of David J. Redl was sworn in as Assistant Secretary for Commu- nications and Information at the Department of Commerce in IoT, expanding the market not only domestically but world- November 2017. He serves as Administrator of the National wide. Telecommunications and Information Administration (NTIA), To show how this work is being translated into practice, the Executive Branch agency that is principally responsible for I want to spend some time drilling down into how NTIA is advising the President on telecommunications and information policy. He is a lawyer and communications policy expert with approaching what commenters on our report cited most fre- more than a decade of experience in government and the pri- quently as a challenge to the advancement of IoT: cyberse- vate sector. He was previously the chief counsel at the U.S. House of Representa- curity. NTIA is taking a multipronged approach to addressing tives Committee on Energy and Commerce. In that role, he served as principal legal cybersecurity concerns, takings steps to work with stakeholders advisor to the chairman and members of the Energy and Commerce majority on communications and technology matters. Prior to his time with the committee, he and within the government to craft balanced solutions that can was director of regulatory affairs at CTIA, a trade association that represents the U.S. affect real-world change. wireless communications industry. He earned his J.D. from the Catholic University First, NTIA has convened cybersecurity multi-stakeholder of America with a certificate from the Institute for Communications Law Studies, processes that have brought together representatives of indus- and he is a graduate of Pennsylvania State University with degrees in journalism and political science. He is admitted to the New York and District of Columbia bars. He try, civil society, academia and the security research community lives in Falls Church, Virginia, with his wife, Amy, and their son, Benjamin. to tackle difficult policy issues. The second of these processes focused on patching and upgrading IoT devices to limit vul- Douglas C. Sicker (sicker@cmu.edu) is currently the Lord Endowed Chair in Engi- nerabilities. This process resulted in three finished work prod- neering, department head of Engineering and Public Policy, director of CyLab Security and Privacy Institute, and a professor of engineering and public poli- ucts — a guide for consumers, a technical breakdown of the cy with a joint appointment in the School of Computer Science and courtesy patching process and a discussion of incentives and barriers appointment in the Heinz College at Carnegie Mellon University. He is also the to patching — as well as a compendium of standards and best Executive Director of the Broadband Internet Technical Advisory Group (BITAG). practices, which will be maintained as a living document. These Previously, he was the DBC Endowed Professor in the Department of Computer Science at the University of Colorado at Boulder with a joint appointment in, and documents, as well as more information about our processes, directorship of, the Interdisciplinary Telecommunications Program. He recently can be found on our website here: https://www.ntia.doc.gov/ served as the chief technology officer and senior advisor for Spectrum at the other-publication/2016/multistakeholder-process-iot-security. National Telecommunications and Information Administration (NTIA). He also NTIA has also worked closely with NIST and with the served as the chief technology officer of the Federal Communications Commis- sion (FCC), and prior to that he served as a senior advisor on the FCC National Department of Homeland Security to produce a report on how Broadband Plan. Earlier he was director of Global Architecture at Level 3 Commu- to combat distributed threats on the Internet, which can be nications, Inc. In the late 1990s, he served as Chief of the Network Technology found here: https://www.commerce.gov/page/report-presi- Division at the FCC. He is an active member of ACM, AAAS, and the Internet dent-enhancing-resilience-against-botnets. This report benefited Society. He has served as an advisor to the Department of Justice, the Federal Trade Commission, the FCC, and the Department of State; the Chair of the FCC greatly from stakeholder input through both comments and a Network Reliability and Interoperability Council steering committee; an advisor on workshop and lays out actionable steps that can be taken to the Technical Advisory Council of the FCC, and chair of a recent National Acade- address this abuse of Internet-connected devices. my study on the Boulder Department of Commerce Laboratories. He has chaired NTIA is further engaged at the international level on devel- numerous conferences as well as served on many program committees and sever- al National Academy studies. He has published extensively in the fields of wireless oping cybersecurity policies, working in forums such as the systems, network security, and network policy, and has received funding from International Telecommunications Union, the Organization NSF, DARPA, FAA, Cisco, Intel, IBM, and other sources. IEEE Internet of Things Magazine • September 2018 5
IOT STANDARDS This column will look at different segments of the IoT market as it relates to implementation and use of standards. Each column will select a particular vertical, and lay out the relevant standards and technologies that affect the evolving IoT hyperspace. The pace of the columns will start broadly with the vision of narrowing the subject of subsequent articles toward more specific applications of standards, whether in the development, application, test, or commissioning of IoT technologies. IoT Standards Matters The IEEE is, obviously, an active contributor to the standards world, with many of the IEEE outputs being elevated to Nation- al Standards under the American National Standards Institute by Mike Violette (ANSI), which is celebrating 100 years since its founding in May Washington Laboratories, USA 1918, and whose mission is to “administer and coordinate the U.S. voluntary standards and conformity assessment system.” The universe of standards issues that affect IoT development A sister initiative under the aegis of the IEEE is the 5G Initia- and implementation is vast and complicated, involving many tive, and the overlap of 5G and IoT is significant. One resource organizations, technologies and interests. This article discuss- that has been developed under that initiative is the IEEE 5G es the intersection of three elements of the IoT Standards Eco- Standards Database, found here: https://5g.ieee.org/standards/ system, namely: the principal organizations that drive Global standards-database. This database is a collaborative effort aimed Standards Development, Standards for Functionality and Com- at collecting, in one place, standards that have “something to do patibility, and Standards for Security and Privacy. These topics are with 5G,” and is a crowd-sourced kind of effort. Contributions evolving rapidly and, like the Internet of Things, constantly mor- are welcome and encouraged from interested parties. phing as technology solutions are developed and implemented. Clearly, the efforts undertaken to create this broad range of Not being able to swallow the whole thing, our plan is to eat specifications and methods over the past decades has led to the standards watermelon a bit at a time over the next several fundamental changes in our way of life. It is certainly expected issues of IEEE Internet of Things Magazine. to proceed apace and shows no sign of easing as various influ- So, for this inaugural article, I’ve chosen to briefly introduce encers cooperate and compete with each other for standards the standards players by some admittedly subjective, broad, territory. divisions: The Standards Development Organizations (SDO) The interaction between the various SDOs are varied and Space, the Government Space and the Industry Space. A complex and involve a mix of face-to-face get-togethers requir- sample of some of the players will be described and further ing many gallons of coffee as well as significant virtual efforts, explored in future installments. where draft versions of documents whirl about on the Internet as part of consensus efforts that aim to include many voices. SDOs Often, it works well. Not infrequently the process may not work Standards Development Organizations SDOs or Standards Set- so well and there are often winners and losers in the standards tings Organizations SSOs operate, in general, according to certain race (think the long-ago VHS vs BETA square-off). defined processes. Many organizations operate through a con- sensus process that is characterized by openness, transparency, Standards for Functionality balance, and due process or mechanisms for ensuring adherence A second layer of this standards-dive includes functionality. This to organizational procedures, including provision for appeals.” 1 is a pretty critical aspect of the standards biome, and winners The global standards eco-system is varied and vast with a mix of and losers are also defined in this space. players with various, and sometimes opposing, agendas. With so many players in the IoT space, it’s a little dizzying to Figure 1 represents a cross-section of standards-setting bod- determine the dominant drivers for IoT functionality; in fact, to ies that are involved in various IoT standards (among other be honest, the task is a bit overwhelming. Major players in the things, such as EMC, Electrical Safety, Radio/Wireless and industry, from software and hardware developers to govern- Cyber-Security) involved with formally-recognized national ment to network operators, have already staked out decades of standards bodies, committees and global organizations as well operating methods that drive IoT functionality. other “fora and consortia.” This space includes consensus-driven efforts as well as pri- The availability of the standards depends largely on the fund- vate and proprietary standards. One organization that has an ing strategies. Many SDOs charge for their standards (IEC, ISO, open, consensus-based structure is the Internet Engineering IEEE, etc.) while others distribute the standards for free (ETSI, Task Force (IETF), which is a “large open international commu- e.g.) as part of government-sponsored efforts to promulgate nity of network designers, operators, vendors, and researchers the information. In many of the standards-development models, concerned with the evolution of the Internet architecture.” much of the work is performed by volunteers who presumably This particular group has over 100 working groups aimed at have a stake in the outcome of the end-product, whether pro- improving “the smooth operation of the Internet.” The work- moting a certain technology, protecting a bit of existing “real ing groups have defined areas that range from HTTP to Video estate” or staying connected for other reasons. (I have met Codecs to IPv6 Operations to Software Updates for Internet many standards “nerds” who do this for fun!) of Things. This group is open to anyone who is interested in How big is the standards universe? Just a brief perusal of contributing to the IETF’s core mission and there are no mem- the IEEE Standards Association website2 shows a “partial list- bership fees. https://www.ietf.org/about/participate/. ing” of IEEE standards that are related to IoT. This listing has The development and improvement in standards and specifi- over 70 standards, from base standards like IEEE 802.3-2012 cations are conducted through mail lists and collaborative tools, “IEEE Standard for Ethernet” to more esoteric and specific IEEE while face-to-face meetings serve the purpose of putting faces 1609.11™-2010 — “IEEE Standard for Wireless Access in Vehic- with email addys. ular Environments (WAVE) — Over-the-Air Electronic Payment The IETF’s IoT efforts include melding IoT needs with existing Data Exchange Protocol for Intelligent Transportation Systems standards, such as the first WG chartered in 2005 (6LoWPAN) (ITS).” which defined methods for adapting IPv6 to IEEE 802.15.4 (wireless personal area networks (WPANs)). Other wireless Editor’s Note: Text appearing in bold indicates a live link in the online version. technologies are similarly adapted, including flavors of Blue- 6 IEEE Internet of Things Magazine • September 2018
IOT STANDARDS Figure 1. A cross-section of standards-setting bodies that are involved in various IoT standards Figure credit: Dr. Jochen Friedrich, IBM Europe. tooth and Digital Enhanced Cordless Telecommunications (DECT) Ultra Low Energy (ULE) cordless phones. The intent is to make efficiency and reliability a prime feature of the IoT. Naturally, the carriers and big data folks have evolved their own practices and standards. Verizon, for example, has a strong interest in connectivity for Machine-to-Machine (M2M) connec- tions and the revenue that equates to the many billions of over- the-air connections that are growing on its networks. The major themes of its IoT services include the role of M2M connectivity in Smart Cities, route planning and dispatch for delivery ser- vices, mobile commerce and asset tracking. From Verizon’s report, “State of the Market: Internet of Things 2017: Making Way for the Enterprise,” 3 the subject of standards comes up on page 1: “An absence of industry-wide IoT Figure 2. NIST cybersecurity framework. standards, coupled with security, interoperability and cost consid- erations make up over 50 percent of executive concerns around icies and Procedures, System, and Component. The structure IoT, according to Verizon’s survey.” is meant to guide the development of a compliant and secure Clearly, major players are working in many spaces to make process, whether it involves software, hardware or a mix. this uncertainty diminish, and the importance of security is at One aspect of the IEC 62443 structure includes the opportu- the top of the list. nity for systems to be evaluated under a Conformity Assessment process and certification by Certification Bodies accredited for StanDarDS fOr SEcurity anD PriVacy the discipline. Certification has most broadly been applied to The National Institute of Standards and Technology (NIST) devices, either evaluation for conformance with safety require- issued a voluntary “Cybersecurity Framework”4 that “consists ments, spectrum use and related physical conformance. The of standards, guidelines, and best practices to manage cyberse- IEC 62443 Conformance Certification reviews the processes by curity-related risk.” This guidance is broad and intended to be which an organization has assured that their processes, code flexible and adaptable to the many different needs of the IoT and security measures properly implement the applicable IEC space. The word “standard” appears over 30 times in the docu- 62443 requirements. ment, and thus highlights the importance echoed in the words On a global basis, one of the challenges is to bring a neces- of the Verizon report. sary level of conformance that realistically manages the risks of The framework lays out tools to reach certain desirable out- cyber-threats without impeding the functioning of the Internet comes and is designed to give a methodology for managing of Things. This requires reasonable standards and, for the fore- and reducing cyber threats. The key part of the framework seeable future, will be an active area of development across the relies on implementing these five functions: Identify, Protect, entire IoT space. Detect, Respond and Recover, and can be further broken down into Categories and Subcategories with references that may Michael Violette (mikev@wll.com) is president of Washington Laboratories and director of the American Certification Body. He be used to inform an entities’ structure. Some examples of has over 25 years of experience in the field of EMC evaluation Categories include: “Asset Management, Access Control and and product approvals, and has overseen the development of Detection Processes.” engineering services companies in the United States, Europe, and How an organization implements this framework depends Asia. He is a Professional Engineer, registered in the State of Vir- ginia. He has given numerous presentations on compliance top- on the needs and implementation of whatever operations it is ics and is a regular contributor to technical and trade magazines. engaged in. Coupled with this methodology is a need for Risk Assessment to be overlaid in an organization’s operation. FOOTNOTES Other, international, standards for cyber security exist. One 1 Overview of International Cybersecurity and Privacy Standards Development. example of this is the series of standards under IEC 62443. This 2 Elaine Newton, PhD. Oracle Corporation http://standards.ieee.org/innovate/iot/stds.html particular standard morphed from an ANSI standard (ANSI/ 3 http://www.verizonenterprise.com/verizon-insights-lab/state-of-the-market-inter- ISA-99 or ISA99) to a standard under the International Elec- net-of-things/2017/ trotechnical Committee (IEC). It was originally developed by 4 https://www.nist.gov/cyberframework the International Society for Automation (ISA) and includes four general components or categories, namely: General, Pol- IEEE Internet of Things Magazine • September 2018 7
PRIVACY AND SECURITY This column delves into privacy risks of the IoT using risk concepts that are more native to the security domain in order to conceptu- ally bridge our collective understanding, articulation, and management of privacy concerns in the IoT which otherwise might not be sufficiently considered or foreseen by existing legal and technical controls. Scratching Below the Technical Underpinning The technical canvas of the IoT provides the underpinning and Surface: IoT Privacy Risk precursor for privacy threats, vulnerabilities and harms. The architecture of the IoT reduces friction in the collection, processing, disclosure and actuation of data. The effect is a by Erin Kenneally blurring of temporal, spatial and organizational boundaries that Department of Homeland Security (USA) and have heretofore separated our physical, digital, biological, and International Computer Science Institute (USA) social spheres. IoT sensors act as vectors for digitizing anything that can be sensed, resulting in the reduction of communica- It has become almost cliché that the so called Internet tions, visual, auditory, physical and biological systems to pure of Things (IoT) means different things to different people. information that can then be managed, interconnected and When it comes to privacy and security risks, what is implicit controlled.2 across the myriad conceptualizations of IoT lies the key to According to Boston Consulting Group, there will be 18–50 unearthing why IoT risk heralds a difference with a distinc- billion connected devices by 2020, compared with 6–14 billion tion compared to traditional offline and online contexts. connected devices in 2014.3 Those numbers are aligned with Critics of an exceptionalist view of IoT risk might contend Gartner’s research that forecasts 20.5 billion connected devices that the IoT is really just distributed computing on ste- by 2020, up from 8.4 billion in 2017.4 The scope of digitiza- roids, i.e., the IoT is merely a relabeling and repackaging tion and level of precision of IoT data capture is transforming of technologies past like client-server, web services, SoA, everything into data, and advances beyond a capture of fuzzy mobile, virtualization, and distributed computing, which snapshots of activities and attributes toward advanced, high means that risk management is merely an exercise in graft- resolution data and inferences. It is only logical then to expect ing the decades-long understanding of privacy and security that the scale and opacity of data collection and flows will influ- from those familiar contexts onto the IoT. Without getting ence the relationship between individuals and organizations into a religious debate, it is incontrovertible that there are regarding the collection, use and disclosure of information in advances in the quality and quantity of data collection from ways that have critical privacy implications. The technical drive IoT technologies as opposed to previous generations of to optimize and reduce friction in information flows results in technology, and these are driven by real and prospective increased privacy friction for individuals attempting to maintain socioeconomic value propositions. privacy through control of their information. The ubiquitous and pervasive connections between IoT components (devices, hardware, software, communi- IoT Privacy Threats cations, and applications) are creating and mediating new Privacy threats in the IoT are characterized by access, col- cyber-physical, psychological, and economic seams where lection, use (analysis, actuation) and disclosure of sensitive data is produced, aggregated, fused, consumed, dissemi- information (e.g., personally identifying) information in contra- nated and acted upon. These features quantitatively and vention of individuals’ expectations. This is no different than qualitatively impact the relationships between individuals privacy threats in the online ecosystem we experience on a and organizations implicated by this data in ways heretofore daily basis. However, the scope of threats associated with the unseen or understated. More specifically, we are likely to IoT is arguably more expansive, raising the likelihood of privacy see increasing tensions between equity rights and interests in harm. Unsurprisingly, the threat landscape at play with IoT pri- privacy, security, innovation, free expression and governance vacy should consider the omnipresent attack vector presented playing out, where your right to privacy may conflict with my by malicious actors, where the myriad of sensors and actuators right to security, the government’s interest in infrastructure offer an opportunity to weaponize IoT to collect, use and/or protection and public safety, industry’s right to commercial disclose data in ways that negatively impact privacy. What’s free speech, and other citizens’ interests in open and trans- more interesting, however, is how the IoT drives equity conflicts parent data. between legitimate, non-malicious stakeholders — industry, the Accepting the above framing of our challenge, and government, and fellow citizens — as a function of competing anchoring off the notion that privacy is the rights and inter- rights and interests introduced by IoT capabilities. Take a smart ests between individuals and organizations regarding the cities scenario where sensors collect, analyze and share data collection, use and disclosure of information, we necessar- from light pole sensors that monitor vehicle and pedestrian traf- ily have to think about IoT privacy in socio-technical terms. fic, parking and local transportation. My expectation of privacy This introduces a range of dimensions such as governance, (to not be monitored or targeted), may conflict with the gov- economics, management and risk. This inaugural column ernment’s interest in enhanced public services, which may clash delves into privacy risk of the IoT. Risk is typically defined with my fellow citizen’s expectation of safety, which may collide as the severity and likelihood of harm to something of value with industry’s claim to commercial free speech (travel logistics (an asset) when a threat exploits a vulnerability. As such, IoT products and services). privacy risk is the confluence of threats and vulnerabilities that negatively impact privacy rights and interests, the assets Power Imbalance in our risk formula.1s These equity tensions represent another threat posed by the IoT that involves power imbalance. If power is the ability to collect, Editor’s Note: This editorial is an abridged version of a section in a larger co-authored publication, process and actuate data to exert control over individuals in Internet of Things Privacy Forum, “Clearly Opaque: Privacy Risks of the Internet of Things,” (May 2018). ways that negatively impact their self-determination, the IoT 8 IEEE Internet of Things Magazine • September 2018
PRIVACY AND SECURITY threatens to exacerbate disproportionate control of personal products and services are increasingly subject to commercial information and perpetuate a lack of transparency essential pressures to generate revenue. Facebook stands as an obvious to consumers’ exercise of appropriate control. Hence, more reminder of the reality that its social networking platform comes equitable power relations are a prerequisite to and an indicator at the cost of selling access to users’ social activities. While the of meaningful consent, and serve as a social and democratic revenue model for the IoT is still emerging, the expectation of check and balance. Power inequity, on the other hand, is a freely using an IoT service without a transfer of personal data, barrier to meaningful negotiations, competition, and bargaining and for that matter expecting that ownership of a device will over competing rights and interests. In the IoT, power inequi- guarantee privacy, is tenuous. ty will be a threat to privacy to the extent that data control is Consumers are being asked to provide and link more infor- unchecked and consolidated by owners of platforms and ser- mation (e.g., cameras and voice to detect mood, emotion, ges- vices that consumers depend upon, the IoT equivalents of Goo- tures, activities) to avail themselves of IoT functionality, yet so gle, Amazon, Facebook, Microsoft, etc. If these IoT platforms far have been given limited tools to control that personalization. are fueled by data from users, the users’ lack of control over Even when an individual is not the direct target of sensing, inci- that data will threaten their self-determination and ultimately dental data captured by other people’s devices and the inter- create a self-perpetuating power imbalance. If past is prologue connectedness of large volumes of data are another gap in the and IoT privacy threats resemble what has occurred in a pre- IoT that render privacy vulnerabilities. IOT ecosystem, the now infamous Facebook and Cambridge In addition to impacting the degree of vulnerability in the Analytica controversy serves as a crystal ball. previous examples, the IoT introduces a relative difference in the kind of vulnerability that can enhance privacy risk. The sens- Insufficient Understanding of Threat ing and digitization of sentiments and emotions yields a new The scope of the IoT threat landscape is further complicated path to measuring intimate parts of people in ways not seen by a lack of general understanding of how threats will manifest. heretofore. As well, if the current imbalanced control over data This precludes knowing the precautions and mitigation mea- migrates to the IoT, techniques to mitigate IoT privacy vulner- sures to put in place to avoid or minimize adverse impacts. The abilities bode equally unlikely. Examples of imbalances include Mirai botnet in the Fall of 2016 that commandeered hundreds a lack of opt-out mechanisms, uninformed consent such as of thousands of unwitting IoT devices to impose untold millions incomprehensible privacy policies, and the lack of collection of dollars in damage from business interruption, fraud, and and purpose constraints. loss of data and customer loyalty revealed what some believe Similar to how a lack of understanding exacerbates threats to be a tip of the iceberg with regard to the harm potential of because users will not apply appropriate protections to thwart leveraging IoT devices to wreak financial, psychological, and them, the scope of privacy vulnerability is enhanced by a lack physical harm.5 Also, Mirai is widely believed to be collateral of transparency in the collection, use and disclosure of data. damage from a spat between MOOC players, which leaves Opacity of data flows, dissemination and aggregation (pack- open an entirely other dimension of our deficient understand- aging and redistribution of data) can enhance privacy vulner- ing of the adversarial capacities and incentives that drive inten- ability exposure. When exposure of data occurs incrementally tional attacks in the IoT. over time and across locations, the privacy harm may be more serious than acute data breaches because mitigation is never IoT Privacy Vulnerabilities undertaken. Even if knowledge of collection exists, the vulner- Another element in the privacy risk equation involves under- ability may persist due to lack of awareness of the novel ways standing the weaknesses or gaps in protections that can be that data can be combined and augmented to transform seem- exploited by the aforementioned threats to cause privacy harm. ingly benign data into an exposure, including that which is the First of all, the scale and volume of data available for collection basis for the triad of authentication: something you have (e.g., and use expands the range of opportunities to exploit data that smart card), know (e.g., password), or are (e.g., biometric). implicates privacy and therefore increases the probability of realized harm. As discussed above in the technical underpin- IoT Privacy Harms ning, the digitization of anything that leaves a trace or is subject Understanding the negative impacts on privacy rights and inter- to sensing — biometrics, emotions, behaviors — introduces a ests (the assets) comprises the third consideration in the fram- privacy exposure point. ing of IoT privacy risk. Examples of the potential differences Second, the traditional boundaries by which society has con- with distinction, whether in degree or kind, regarding privacy structed privacy expectations are blurring. It is hard for individu- harms in the context of IoT include the following. als to know if the physical features that have assured a sense of solitude, permitted people to act anonymously, and supported Personal Information Breaches and Identity Fraud control over identities are becoming ineffective. This is the case Conspicuous risks of harm in the IoT are those that ensue from when data flows in an opaque, unobtrusive, automatic, regular- inadequate security, such as breaches of personal information ized manner, all promised features of the IoT. and identity theft.6 If an IoT company loses data about users’ Third, even when users are aware of data flows, privacy vul- personal behaviors gathered in their homes or in activities in nerability can stem from inadequate security of IoT devices. IoT public and their identity is linked, this could cause measurable devices are often cheap and developed by companies without harm to consumers. Breaches of personal data may become significant security budgets or incentives. IoT devices are often the next iteration of data breaches with the risk of such breach- low-power and lack large capacities for computation or storage, es likely to be quantitatively higher. The resultant harms may be further complicating efforts to provide the security needed to the most easily quantifiable relative to other harms discussed protect data. below. As well, even when deficient security is not the cause of pri- vacy vulnerabilities, context-shifting and blurring between data Violation of Expectations of Privacy collection for commercial and social settings creates another Law sets formal expectations of privacy rights. When there is type of privacy vulnerability. Personal and social transactions incongruity between what society believes privacy harm to be and activities that are mediated by commercial information and what can be remediated via the law, we have fractured IEEE Internet of Things Magazine • September 2018 9
PRIVACY AND SECURITY expectations of privacy. An abridged waltz down Precedent Diminishment of Private Spaces Lane signals this incongruity with regard to defining privacy All of the privacy-challenging IoT characteristics mentioned harms that emerge as a result of changes wrought by technolo- — proximity, scale, increased monitoring, boundary crossing, gy. The general trend in data breach case law anchors on finan- reduced ability to opt-out of collection — add up to a likely cial or physical harm that has provably already occurred, with diminishment of private spaces. This harms people’s abili- little recognition of future risk of harm or negative impacts that ty to achieve solitude and reserve, both from others and in are cumulative and collective.7 thoughts. This includes a reduction in the availability of spaces Signals of fractured expectations of privacy are also manifest for individuals to be able to retreat to and not be observed, from a regulatory standpoint, although at least as far as enforce- where one can control who can be present, who is listening, ment actions by the leading U.S. consumer protection agency and who is watching; places of seclusion. Diminished private go, the gap between principles and implementation is smaller. spaces translates to reduced ability to withhold data from third The Federal Trade Commission has negotiated consent decrees parties, such as lifestyle preferences, family dynamics, and based on nonmonetary, abstract, autonomy and dignitary-based hobbies. harms.8 The purpose of this deep dive into IoT privacy risk is not In addition, the qualitative and quantitative capture, access to advocate for a retreat from the promise of the IoT. Rather, to and control over sentiment and emotion data can lead to it is meant to highlight and pre-empt some of the risks that behavioral and psychological interactions with industry in ways may impede achieving the full promise of the IoT. As such, that contravene current expectations of privacy, such as interfer- this column series is meant to motivate privacy and security ence, manipulation, and encroachment on emotional privacy. as enablers of businesses rather than as a cost centers. Forth- coming viewpoints in this series on IoT privacy and security Impaired Autonomy are intended to engender this mindset by addressing gov- Autonomy harm is that which impedes self-determination while ernance, economics and incentives, and risk management directly or indirectly engaging with information systems. Auton- dimensions. omy underlies many of the signals that the law uses to proxy privacy harm: psychological (embarrassment, stigmatization, Erin Kenneally (erink@icsi.berkeley.edu) is a currently a pro- gram manager in the Cyber Security Division within the U.S. loss of trust, chilling effects on ordinary behavior, discrimi- Dept of Homeland Security Science & Technology Director- nation, intrusion on seclusion), economic (discrimination in ate. Her portfolio comprises cyber risk economics, data priva- employment, credit, education, and insurance), and physical cy, trusted data sharing and research infrastructure, and ethics (4th Amendment prohibition on unlawful search and seizure in in information and communications technology. She is found- er and CEO of Elchemy, Inc., and served as technology law the U.S.). specialist at the International Computer Science Institute and Collective autonomy harms can have far-reaching disparate the University of California San Diego Supercomputer Center. She is a licensed impact on the economic, physical, and psychological well-being attorney specializing in strategy, research and development, and execution of of individuals and groups. Control of the personal data that challenging and emergent IT legal risk solutions. informs the models produced by machine learning algorithms FOOTNOTES can result in public health and civil services disparities. Similarly, 1 See, e.g., NIST SP 800-30 Risk Management Guide for Information Technology environmental sensor data can fail to aid vulnerable populations Systems, available at http://csrc.nist.gov/publications/nistpubs/800-30/sp800- based on race or socioeconomic conditions. Collective auton- 30.pdf (Risk is a function of the likelihood of a given threat-source’s exercising a omy harm can manifest as unequal access to and control of particular potential vulnerability, and the resulting impact of that adverse event on data. This risks engendering mistrust between individuals and the organization.); The Committee on National Security Systems of United States of America, CNSS Instruction No. 4009 (Apr. 2010) available at http://www.cnss. institutions, resulting in impediments to or disengagement from gov/Assets/pdf/cnssi_4009.pdf. social, political and economic activities that define individual 2 J. Ruiz-Rosero et al., Internet of Things: A Scientometric Review, Symmetry 2017, and collective identities. Collective autonomy harms in the IoT 9, 301. warrant attention because if left unabated, these power imbal- 3 Boston Consulting Group, “Winning in IoT: It’s All About the Business Processes,” (Jan. 2017), available at https://www.bcg.com/publications/2017/hardware-soft- ances get technologically embedded and institutionalized. They ware-energy-environment-winning-in-iot-all-about-winning-processes.aspx. become hard to repeal and impact the entire fabric of social 4 Gartner IoT Report, Feb. 2017, available at https://www.gartner.com/newsroom/ relationships within which privacy interests reside id/3598917. 5 See, e.g., Cogeco “The Cost of DDoS Attacks and Building the Business Case for Protec- Chilling Effects tion,” available at https://www.cogecopeer1.com/wp-content/uploads/2017/03/ Counting-the-Costs-of-DDoS-Attacks-DDoS-Services-Whitepaper.pdf; Altman Lack of control can result in chilling psychological and behav- Vilandrie & Company, Are your company’s IoT devices secure? Internet of Things ioral effects contrary to consumer-users’ intentions. These may Breaches are Common, Costly for U.S Firms (June 2017), http://www.altvil.com/ manifest as reluctance to engage or trepidation when encoun- wp-content/uploads/2017/06/AVCo.-IoT-Security-White-Paper-June-2017.pdf. 6 For example, in 2018 around 150M users’ personal details collected by the Under- tering smart IoT devices. It can further manifest as psychologi- Armour/MyFitnessPal app, including usernames, email addresses and passwords, cal insecurity about unwanted interference and manipulation, were leaked in a data breach. where feelings of malaise, resignation, or helplessness are sub- 7 D. J. Solove, “A Taxonomy of Privacy,” University of Pennsylvania Law Review, vol. jectively real but where people are unable to articulate legally 154, no. 3, p. 477, Jan. 2006; GWU Law School Public Law Research Paper No. 129. Available at SSRN: http://ssrn.com/abstract=667622. cognizable harm due to a lack of information about whether or 8 See, e.g., In the matter of DesignerWare, LLC, No. 112-3151 (Apr. 15, 2013). how data is actually being used. 10 IEEE Internet of Things Magazine • September 2018
You can also read