物联网(Internet of Things)(也称为“物联网(IoT)”)是智能设备的网络。这些设备需要足够智能以收集、收集和报告数据——无论是原始数据还是处理后的数据。这篇物联网(Internet)( IoT )常见问题解答(FAQ)帖子试图帮助最近被引入这种将不同设备连接到Internet的技术(Internet)的(Things)人们在它们之间或与人类共享数据。
关于物联网(Things)的(Internet)常见问题
我将物联网(Internet of Things)定义如下。
“Internet of Things is an umbrella term for multiple unrelated networks that contain smart devices — each of which, is capable to send, receive, and process data without or with minimum human interference.”
互联网(Internet)上有许多网络为一个或多个组织/实体工作。它们使用防火墙进行保护,并且不允许在没有密码的情况下进行访问。此类内部网是微型网络(LAN和WLAN),其中一部分基于Internet。
Intranet是Internet的一部分。如果Intranet包含智能设备,则可以称为智能网络(Smart Networks)或物联网(Internet)。(Things)这也意味着有更多的网络——(Internet)互联网(Internet)上不仅仅是一个物联网(Things)。这些网络在彼此不知情的情况下工作。这些是小型网络,每个网络都包含能够自行处理信息以完成工作的设备。
什么是智能设备?
一般的概念是任何连接到互联网(Internet)的东西都是智能设备。实际上,设备必须满足某些条件才能称为智能设备。
- 该设备应该能够单独或通过某些触发器连接到Internet。
- 设备必须有一个 IP 地址,以便它可以与其他人通信
- 设备应该能够自动接收数据并按照算法的要求进行处理
- 他们应该能够在不需要人际互动的情况下相互交流,或者他们可以在需要时直接向人报告
您可以在此处查看一些用于物联网 (IoT) 示例的简单设备。
物联网(IoT)的基本要素是什么?
这取决于您如何构建网络。您可以使用客户端-服务器模型或对等 (P2P) 模型( peer to peer (P2P) model)来设置您希望智能设备和计算机如何运行。
在大多数情况下,它们是即插即用型设备。由于连接方便,我们大多数人使用P2P拓扑来创建物联网(Internet)以保持简单。
通常,大多数网络管理员使用P2P并将所有设备放在防火墙的一侧,以防止设备被黑客入侵。
为什么有人会入侵智能(Smart) 设备(Devices)的(’ Internet)物联网(Things)?
因为与更大的计算机和笔记本电脑相比,智能设备更容易被黑客入侵,所以直到现在,设备制造商并不关心黑客攻击和其他问题。但碰巧很少有黑客入侵了许多简单的智能设备(如烤面包机),从而对其他一些网站发起更大的攻击,例如分布式拒绝服务 ( DDoS )。
关于物联网(Things)的(Internet)安全热点是什么?物联网(IoT)危险吗?
物联网(Internet)包含没有任何或许多安全功能的智能设备。(Things)如前所述,在物联网上入侵智能设备(Things)可能(Internet)是(Smart)黑客最简单的方法。他或她可能控制数以百万计的连接设备,并将它们用作僵尸网络,以破坏或破坏银行、政府相关网站或任何公司等机构的更安全网站的服务。
阅读(Read):什么是机器学习和深度学习(Machine Learning and Deep Learning)?
如何保护(Things)物联网(Internet)?
(IoT)一旦所有智能设备和网络在没有任何人为干扰的情况下开始相互通信,物联网就会变得很危险。这可能会发生,因为人工智能 (AI)现在存在于所有操作系统、程序、应用程序等中。人们只需要在互联网(Internet)上找到设备并将它们用于他们想要完成的任何工作。
但是,制造商和网络管理员将安全功能应用于设备时,这种情况很少发生。理想的情况是使用硬件防火墙,使网络在Internet上不可见。网络和所有小工具都在路由器后面,没有节点(网络上的智能设备和其他东西)可以直接访问Internet。实体还需要对员工进行网络钓鱼攻击教育,尤其是社会工程学。
物联网(Internet)使用(Things)什么操作系统?_(Systems)
在物(Things)联网(Internet)的最佳操作系统中,Windows 10 for IoT是我每天最喜欢的——因为它易于在微芯片上安装和使用。
还有其他操作系统,例如Linux和Contiki。虽然Windows 10 for IoT为您提供了构建智能设备的图形界面,但Linux和Contiki等操作系统通过使用需要从头开始编写的脚本来提供对事物的更多控制。尽管物联网的(IoT)Windows 10为您提供了一个良好的界面,以便用户轻松使用,但Contiki可帮助您从头开始创建程序并使用命令行界面添加安全功能。
阅读有关物联网(Things)的(Internet)Windows 10 与 Contiki的比较。您可以看到,在Contiki(Contiki)和Linux上工作的学习曲线太高了,而Windows 10 for IoT预装了许多功能。安全(Security)性就是其中之一(关于安全性的讨论仍然适用)。我们发表了一篇关于Windows 10 的物联网优势针对其他平台的文章。
(The above Frequently Asked Questions (FAQ) for )上述物联网(IoT)常见问题 (FAQ)并不全面。如果您还有其他问题或疑问,请在下面发表评论。( of Things (IoT) are not comprehensive. If you have any more questions or doubts, please leave a comment below.)
Internet of Things (IoT) - Frequently Asked Questions (FAQ)
Internet of Things (also called “IoT”) is a network of smart devices. The devices need to be smart enough to gather, collect and report data – whether raw or after processing. This Internet of Things (IoT) FAQ post attempts to assist people who were recently introduced to this technology of connecting different devices to the Internet to share data among them or with the human.
Frequently asked questions about Internet of Things
I would define Internet of Things as follows.
“Internet of Things is an umbrella term for multiple unrelated networks that contain smart devices — each of which, is capable to send, receive, and process data without or with minimum human interference.”
There are many networks on the Internet that work for one or more organizations/entities. They are protected using firewalls and do not allow access without passwords. Such intranets are mini-networks (both LAN and WLAN) part of which, is based on the Internet.
Intranets are parts of the Internet. If Intranet contains smart devices, it can be called Smart Networks or the Internet of Things. This also means that there are more networks – more than just one Internet of Things on the Internet. These networks work unaware of each other. These are small networks, each containing devices capable of processing information on their own to get a job done.
What are Smart devices?
The general conception is that anything that connects to the Internet is a smart device. In reality, there are certain conditions that the device should fulfill to be called a smart device.
- The device should be able to connect to the Internet, on own or with certain triggers.
- The device must have an IP address so that it can communicate with others
- The device should be able to take in data automatically and process it as the algorithms demand
- They should be able to communicate among themselves without the need for human interaction, or they can report directly to a human when required
You can see some simple devices for Internet of Things (IoT) examples here.
What are the basic elements of an IoT?
This depends on how you structure your network. You may use a client-server model or peer to peer (P2P) model to set up how you want your smart devices and computers to function.
In most cases, they are of the plug and play type devices. With that ease of connection, most of us use P2P topology for creating the Internet of things to keep it simple.
Generally, most network admins use P2P and put all of the devices on their side of the firewall so that they can prevent device hacking.
Why would anyone hack Smart Devices’ Internet of Things?
Because smart devices are easier to hack, compared to bigger computers and laptops, until now, the manufacturers of things were not concerned about hacking and other issues. But it happened that few hackers hacked many simple, smart devices, (like a toaster) to launch an even bigger attack on some other websites for attacks like distributed denial of service (DDoS).
What is the security buzz about Internet of Things? Is IoT dangerous?
The Internet of Things contains smart devices without any or many security features. As said earlier, hacking Smart devices on the Internet of Things can be the easiest way for a hacker. He or she may take control of millions of connected devices and use them as botnets for destroying or disrupting services of more secure websites of institutions like banks, government-related websites, or any corporate house.
Read: What is Machine Learning and Deep Learning?
How to secure the Internet of Things?
IoT can be dangerous once all smart devices and networks start communicating among themselves without any human interference. That can happen because Artificial Intelligence (AI) is now present in all operating systems, programs, apps, etc. One just needs to find the devices on the Internet and use them for whatever work they want to be done.
However, that scenario will seldom be possible with manufacturers and network admins applying security features to the devices. The ideal case would be to use a hardware firewall so that the network is not visible on the Internet. The network and all the gadgets go behind the router, and no node (smart devices and other stuff on the network) can access the Internet directly. Entities also need to educate their staff on phishing attacks, especially social engineering.
What Operating Systems do the Internet of Things use?
Among best operating systems for Internet of Things, Windows 10 for IoT is my favorite any day – because of its ease of installation and use on microchips.
There are other operating systems like Linux and Contiki. While Windows 10 for IoT provides you a graphical interface for building a smart device, operating systems like Linux and Contiki provide more control on things by using scripts that need to be written from scratch. Though Windows 10 for IoT gives you a good interface so that it is easy on users, Contiki helps you create a program from scratch and add security features using command-line interface.
Read about the comparison of Windows 10 vs Contiki for Internet of Things. You can see that the learning curve is too high for working on Contiki and Linux while Windows 10 for IoT comes with many features preinstalled. Security is one of them (the discussion about security is still applicable). We published an article on Windows 10 for IoT Advantages against other platforms.
The above Frequently Asked Questions (FAQ) for the Internet of Things (IoT) are not comprehensive. If you have any more questions or doubts, please leave a comment below.